summaryrefslogtreecommitdiff
path: root/src/Makefile
diff options
context:
space:
mode:
authorPeter Wu <peter@lekensteyn.nl>2015-01-28 19:49:22 +0100
committerPeter Wu <peter@lekensteyn.nl>2015-01-28 19:49:22 +0100
commitf5f31a868db4fc79a430ce264a7c13660f23fbe5 (patch)
treece33af30e68d9e756ba316b93d0a7addd1877f5f /src/Makefile
parentbe79d63fbe18d513c3208c324d87982f98445233 (diff)
downloadwireshark-notes-f5f31a868db4fc79a430ce264a7c13660f23fbe5.tar.gz
sslkeylog.c: utility to intercept OpenSSL keys
For a gdb function, see http://security.stackexchange.com/a/80174/2630 To generate the line assuming you have a context with a SSL structure (named "s") run this: python def read_as_hex(name, size): addr = gdb.parse_and_eval(name).address data = gdb.selected_inferior().read_memory(addr, size) return ''.join('%02X' % ord(x) for x in data) def pm(ssl='s'): mk = read_as_hex('%s->session->master_key' % ssl, 48) cr = read_as_hex('%s->s3->client_random' % ssl, 32) print('CLIENT_RANDOM %s %s' % (cr, mk)) end python pm()
Diffstat (limited to 'src/Makefile')
-rw-r--r--src/Makefile6
1 files changed, 6 insertions, 0 deletions
diff --git a/src/Makefile b/src/Makefile
new file mode 100644
index 0000000..ea8e7b6
--- /dev/null
+++ b/src/Makefile
@@ -0,0 +1,6 @@
+
+libsslkeylog.so: sslkeylog.c
+ $(CC) $(CFLAGS) sslkeylog.c -shared -o $@ -fPIC -ldl
+
+clean:
+ $(RM) libsslkeylog.so