ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 9144] [PATCH] Support for Camellia/more TLS ciphers

Date: Sat, 14 Sep 2013 17:49:53 +0000

Comment # 5 on bug 9144 from
Created attachment 11569 [details]
premaster.txt (for non-TLS ciphers, dump is attachment id 11568)

This premaster was extracted from openssl s_client output using the following
hackery:

openssl s_client -connect "$host" -no_tls1 |
awk '/Master-Key:/{key=$2} {b=1;e=16;if(l==3)b=7;if(l==1)e=6;
for(i=b;i<=e;i++)s=s$i;if(l--==1)r[s]=1}
/ ClientHello|ServerHello$/{l=3;s=""}
END{for(rnd in r)print "CLIENT_RANDOM",rnd,key}'

I do not know if it is correct to use the same master key for the server and
client random, but it seems to work.


You are receiving this mail because:
  • You are watching all bug changes.