You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-F <fprint> Fingerprint of ephemeral public key (first 80-bit of pkey hash as hex string)
162
-
-C <ctxstr> Context string (used for multiple servers)
164
+
-F <fprint> Fingerprint to find (first 80-bit of pkey hash as hex string)
165
+
-C <name> Unique key name (used for multiple servers)
163
166
```
164
167
165
168
This client also support stress testing options:
@@ -225,8 +228,15 @@ This is a passive way to decrypt TLS traffic including Perfect Forward Secrecy (
225
228
This can be run in a real-time mode capturing ethernet traffic on a port for one or more server interfaces. It can also be run passing a previously captured pcap file.
226
229
227
230
```sh
228
-
./examples/middlebox/decrypt -?
229
-
usage: ./decrypt or ./decrypt dumpFile keyServerURL [server] [port] [password]
231
+
$ ./examples/middlebox/decrypt -?
232
+
decrypt 1.1
233
+
usage: ./decrypt or ./decrypt pcapFile keyServerURL [server] [port] [password]
234
+
-? Help, print this usage
235
+
pcapFile A previously saved pcap file
236
+
keyServerURL Key Manager URL or private key as PEM (default https://localhost:8119)
237
+
server The server’s IP address (v4 or v6) (default 127.0.0.1)
0 commit comments