On Wednesday, February 1, 2017 at 10:48:52 PM UTC+2, Kyle Hamilton wrote:
> https://bugzilla.mozilla.org/show_bug.cgi?id=1183318 is a thing. If
> this is related to a communication from Firefox, SSLKEYLOGFILE doesn't work.
>
> Memory dumps can be created by malware. Packet captures can be create
I know about SSLKEYLOGFILE environment path, but I can't use it. I extracted
master secret from a memory dump and I need to unwrap it in order to use it to
decrypt the wireshark ssl communication.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinf
On Wednesday, January 25, 2017 at 8:12:59 AM UTC+2, Maxim Rise wrote:
> I need to know only for current version or older version.
Let's say the NSS version is 3.28. I know the values of the fields from
sslSessionIDStr.
How can I unwrap the master secret in order to use the unwrappe
I need to know only for current version or older version.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Hello.
I am trying to write a python script for unwrapping wrapped_master_secret
for a given wrapped_master_secret in the command line. Can
wrapped_master_secret be unwrapped only using fields from sslSessionIDStr
structure (masterModuleID, masterSlotID, masterWrapIndex, masterWrapMech,
masterWrap
5 matches
Mail list logo