WireGuard: add keylog for initiation decryption with ephemeral keys
authorPeter Wu <peter@lekensteyn.nl>
Thu, 26 Jul 2018 11:54:43 +0000 (13:54 +0200)
committerAnders Broman <a.broman58@gmail.com>
Wed, 8 Aug 2018 11:25:33 +0000 (11:25 +0000)
commitc30b9fc8917a8c3c3b85ef939d2ebb94e03fb5ee
tree6650724240213308bdd700c2bc58ea77ec374d2c
parent5b61737dc997a63f799680c1d06c80a905d5d929
WireGuard: add keylog for initiation decryption with ephemeral keys

As UATs are currently unable to receive keys dynamically without manual
user interaction followed by rescanning of the pcap, add a mechanism
like ssl.keylog_file. Such keys can be extracted using the tools from
contrib/examples/extract-handshakes/ in the WireGuard source tree.

Now decryption of Initiation messages is also possible when keys
(Epriv_i) are captured from the initiator side.

Bug: 15011
Change-Id: If998bf26e818487187cc618d2eb6d4d8f5b2cc0a
Reviewed-on: https://code.wireshark.org/review/28990
Reviewed-by: Anders Broman <a.broman58@gmail.com>
epan/dissectors/packet-wireguard.c
test/suite_decryption.py