Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 7330] New: Add support for CLIENT_RANDOM lines in SSL keyl

Date: Mon, 4 Jun 2012 14:51:10 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7330

           Summary: Add support for CLIENT_RANDOM lines in SSL keylog.
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Low
         Component: Dissection engine (libwireshark)
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: agl@xxxxxxxxxxxx


Created attachment 8552
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=8552
patch

Build Information:

--
Add support for CLIENT_RANDOM lines in SSL keylog.

The SSL keylog contains information that can be used to decrypt SSL
connections. Currently the formats only work for connections that use RSA
key-agreement, or which use Session IDs. For sites that don't match either of
those, the CLIENT_RANDOM format allows any TLS key-agreement algorithm to be
decrypted.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.