Jean-Marc Desperrier a écrit :
Wan-Teh Chang wrote:
You can use the NSS command-line tool 'ssltap' to inspect the SSL handshake messages:http://www.mozilla.org/projects/security/pki/nss/tools/ssltap.html

It's significantly easier to do it with Wireshark.

Is it easier than the selfserv and tstclnt which are 2 tools supplied by NSS ? They print the cipher negociated.
What would be seen in Wireshark ? The cipher's OID ?


--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to