diff options
author | Peter Wu <peter@lekensteyn.nl> | 2015-02-16 10:50:02 +0100 |
---|---|---|
committer | Anders Broman <a.broman58@gmail.com> | 2015-03-12 16:27:10 +0000 |
commit | 410b40d37145ac217db41ea6bc403c36ab53195d (patch) | |
tree | b5fee07b6d7d30b3658bbb210770139c1a653f4e /debian | |
parent | 6c1e4d2e7a9bd4884feff393fe3cd9b18d8dfee3 (diff) |
Export CLIENT_RANDOM with Export SSL Session Keys
This allows for exporting the SSL session keys for captures which were
decrypted using a RSA certificate, but where the server does not support
session resumption.
To avoid frequent reallocations, the expected length is used as initial
string size.
Tested against a nginx server with ssl_session_cache off.
Note that all keys loaded via ssl.keylog_file are exported, not just the
displayed ones!
Change-Id: Ie3a93d3692885502f46442953fa53303d16672d7
Reviewed-on: https://code.wireshark.org/review/7175
Reviewed-by: Peter Wu <peter@lekensteyn.nl>
Petri-Dish: Peter Wu <peter@lekensteyn.nl>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Alexis La Goutte <alexis.lagoutte@gmail.com>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'debian')
-rw-r--r-- | debian/libwireshark0.symbols | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/debian/libwireshark0.symbols b/debian/libwireshark0.symbols index 0da4300ef8..0e01908d51 100644 --- a/debian/libwireshark0.symbols +++ b/debian/libwireshark0.symbols @@ -1149,6 +1149,7 @@ libwireshark.so.0 libwireshark0 #MINVER# ssl_dissector_add@Base 1.9.1 ssl_dissector_delete@Base 1.9.1 ssl_session_hash@Base 1.9.1 + ssl_crandom_hash@Base 1.99.4 ssl_set_master_secret@Base 1.9.1 start_requested_stats@Base 1.9.1 stat_node_array_sortcmp@Base 1.12.0~rc1 |