Hi, I generated a PCAP file with TLS session, and I have the matching private key used by my HTTPS server. The TLS session is not using DH for key exchange, so it should be possible to decrypt. I know OpenSSL can be used to connect to a socket to "actively" handle the TLS session, but is there a way to "passively" decode and decrypt a session? How can I "feed" the packets (both directions) into the OpenSSL library?
Thanks!