Wireshark-bugs: [Wireshark-bugs] [Bug 11372] SSL Decryption (RSA private key with p smaller than
Guy Harris
changed
bug 11372
What |
Removed |
Added |
Status |
RESOLVED
|
CONFIRMED
|
Resolution |
FIXED
|
---
|
Comment # 9
on bug 11372
from Guy Harris
Still failing on the Windows buildbot.
I've attached two files containing the command being run, which is a tshark -V,
with the same SSL key arguments as the test, and the output from that command,
on Ubuntu, where it succeeds, and Windows, where it fails. (I've edited the
Windows output to change "Coordinated Universal Time" in the time stamps to
"UTC", to remove an uninteresting difference between the Ubuntu and Windows
output.)
The diff between the two versions is:
1c1
<
/home/wireshark/builders/wireshark-master/ubuntu-14.04-x64/build/test/run_and_catch_crashes
env HOME=/tmp/tmp.GTH16zxa30/home
/home/wireshark/builders/wireshark-master/ubuntu-14.04-x64/build/tshark
-Tfields -e http.request.uri -o
ssl.keys_list:0.0.0.0,443,http,/home/wireshark/builders/wireshark-master/ubuntu-14.04-x64/build/test/keys/rsa-p-lt-q.key
-r
/home/wireshark/builders/wireshark-master/ubuntu-14.04-x64/build/test/captures//rsa-p-lt-q.pcap
-Y http
---
> C:\buildbot\wireshark\wireshark-master-64\win7x64\build\test/run_and_catch_crashes env APPDATA=C:\cygwin\tmp\tmp.Hpckbgyz1H\home /cygdrive/c/buildbot/wireshark/wireshark-master-64/win7x64/build/cmbuild/run/RelWithDebInfo/tshark -Tfields -e http.request.uri -o ssl.keys_list:0.0.0.0,443,http,C:\buildbot\wireshark\wireshark-master-64\win7x64\build\test\keys\rsa-p-lt-q.key -r C:\buildbot\wireshark\wireshark-master-64\win7x64\build\test\captures\/rsa-p-lt-q.pcap -Y http
475c475
< TLSv1.2 Record Layer: Handshake Protocol: Finished
---
> TLSv1.2 Record Layer: Handshake Protocol: Encrypted Handshake Message
479,482c479
< Handshake Protocol: Finished
< Handshake Type: Finished (20)
< Length: 12
< Verify Data
---
> Handshake Protocol: Encrypted Handshake Message
584c581
< TLSv1.2 Record Layer: Handshake Protocol: Finished
---
> TLSv1.2 Record Layer: Handshake Protocol: Encrypted Handshake Message
588,591c585
< Handshake Protocol: Finished
< Handshake Type: Finished (20)
< Length: 12
< Verify Data
---
> Handshake Protocol: Encrypted Handshake Message
606c600
< [Protocols in frame: eth:ethertype:ip:tcp:ssl:http]
---
> [Protocols in frame: eth:ethertype:ip:tcp:ssl]
693,707d686
< Hypertext Transfer Protocol
< GET / HTTP/1.1\r\n
< [Expert Info (Chat/Sequence): GET / HTTP/1.1\r\n]
< [GET / HTTP/1.1\r\n]
< [Severity level: Chat]
< [Group: Sequence]
< Request Method: GET
< Request URI: /
< Request Version: HTTP/1.1
< Host: 10.9.0.2\r\n
< User-Agent: curl/7.43.0\r\n
< Accept: */*\r\n
< \r\n
< [Full request URI: https://10.9.0.2/]
< [HTTP request 1/1]
722c701
< [Protocols in frame: eth:ethertype:ip:tcp:ssl:http]
---
> [Protocols in frame: eth:ethertype:ip:tcp:ssl]
809d787
< SSL segment data (256 bytes)
909c887
< TLSv1.2 Record Layer: Alert (Level: Warning, Description: Close Notify)
---
> TLSv1.2 Record Layer: Encrypted Alert
913,915c891
< Alert Message
< Level: Warning (1)
< Description: Close Notify (0)
---
> Alert Message: Encrypted Alert
You are receiving this mail because:
- You are watching all bug changes.