Thanks a lot... In deed it was -e... When i used -d i was abel to decrypt the text with
Key : A0C0A4BCDAF92230CDCBCE634F9AFB031427F44BA310C341DA1CBB7E36457142 IV : 2736022241F1EAA189591A1DA4A1E113 But even if i give any initialisation vector i am able to decrypt... So when will it be used? Thanks & Regards On Fri, Jul 10, 2009 at 5:45 PM, sandeep kiran p <[email protected]>wrote: > The option for decrypting data is > openssl enc -d ... > > You gave it as > > openssl enc -e ... > > Can you cross check that again? Secondly, from the .cap file that you have > attached, I see the application data starting from 00 21 9B ... but you > mentioned otherwise. > > Sandeep > > > On Tue, Jul 7, 2009 at 8:23 AM, Harsha gowda <[email protected]>wrote: > >> Hi all, >> >> *key_block = PRF(SecurityParameters.master_secret, "key expansion", >> SecurityParameters.server_random + SecurityParameters.client_random);* >> >> >> Key_block for my capture file is as below. >> >> >> client_write_MAC_secret : 24 37 4F EB 79 47 5F 28 48 5D CB CA BF B2 EF FC >> 09 64 64 F9 >> >> server_write_MAC_secret : C5 89 AD 3E EC 97 B0 85 66 43 DE EA 6A 83 10 16 >> 9A 72 FE 1D >> >> >> client_write_key : A0 C0 A4 BC DA F9 22 30 CD CB CE 63 4F 9A FB 03 14 27 >> F4 4B A3 10 C3 41 DA 1C BB 7E 36 45 71 42 >> >> server_write_key : A6 99 74 CE BE E9 64 4C 6F 5E A3 82 E1 D6 3E 5A E6 B9 >> 36 4C 53 78 45 D4 9B A0 7D 49 F1 88 A2 46 >> >> >> client_write_IV : 27 36 02 22 41 F1 EA A1 89 59 1A 1D A4 A1 E1 13 >> >> server_write_IV : 18 F0 AC B1 DC F3 1B E8 2B F1 5E 97 E9 39 01 11 >> >> >> >> I am unable to decrypt the application data present in frame number 10 >> >> >> can any one help how to decrypt it.. ? >> >> i tried as below >> >> *C:\OpenSSL\bin>*openssl enc -e -in *app1 *-aes-256-cbc -K >> A0C0A4BCDAF92230CDCBCE634F9AFB031427F44BA310C341DA1CBB7E36457142 -iv >> 2736022241F1EAA189591A1DA4A1E113 >> >> and app1 file contains TLS application data e8 e4...cf >> >> >> can any one help me decrypting it >> -- >> ಇಂತಿ >> ಹರ್ಷ ಕೃ ಗೌಡ >> >> > -- ಇಂತಿ ಹರ್ಷ ಕೃ ಗೌಡ
