summaryrefslogtreecommitdiff
path: root/tls
diff options
context:
space:
mode:
authorPeter Wu <peter@lekensteyn.nl>2015-01-28 19:49:22 +0100
committerPeter Wu <peter@lekensteyn.nl>2015-01-28 19:49:22 +0100
commitf5f31a868db4fc79a430ce264a7c13660f23fbe5 (patch)
treece33af30e68d9e756ba316b93d0a7addd1877f5f /tls
parentbe79d63fbe18d513c3208c324d87982f98445233 (diff)
downloadwireshark-notes-f5f31a868db4fc79a430ce264a7c13660f23fbe5.tar.gz
sslkeylog.c: utility to intercept OpenSSL keys
For a gdb function, see http://security.stackexchange.com/a/80174/2630 To generate the line assuming you have a context with a SSL structure (named "s") run this: python def read_as_hex(name, size): addr = gdb.parse_and_eval(name).address data = gdb.selected_inferior().read_memory(addr, size) return ''.join('%02X' % ord(x) for x in data) def pm(ssl='s'): mk = read_as_hex('%s->session->master_key' % ssl, 48) cr = read_as_hex('%s->s3->client_random' % ssl, 32) print('CLIENT_RANDOM %s %s' % (cr, mk)) end python pm()
Diffstat (limited to 'tls')
0 files changed, 0 insertions, 0 deletions