Wireshark SSL debug log GnuTLS version: 3.7.3 Libgcrypt version: 1.9.4 dissect_dtls enter frame #2 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 0 dissect_dtls_record: content_type 22 epoch 0 seq 1 dissect_dtls enter frame #3 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 2asfasf dissect_dtls enter frame #4 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #5 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 4 dissect_dtls_record: content_type 22 epoch 0 seq 5 dissect_dtls_record: content_type 22 epoch 0 seq 6 dissect_dtls enter frame #6 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 1 dissect_dtls enter frame #7 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 2 dissect_dtls enter frame #8 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #9 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 20 epoch 0 seq 4 dissect_dtls enter frame #10 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 1 seq 0 dissect_dtls enter frame #11 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 7 dissect_dtls enter frame #1 (first time) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 0 decrypt_dtls_record: no session key Calculating hash with offset 13 75 ssl_dissect_hnd_hello_common found CLIENT RANDOM -> state 0x01 dissect_dtls enter frame #2 (first time) packet_from_server: is from server - TRUE ssl_try_set_version found version 0xFEFD -> state 0x11 dissect_dtls_record: content_type 22 epoch 0 seq 0 decrypt_dtls_record: no session key Calculating hash with offset 13 93 ssl_try_set_version found version 0xFEFD -> state 0x11 ssl_dissect_hnd_hello_common found SERVER RANDOM -> state 0x13 ssl_set_cipher found CIPHER 0x002F TLS_RSA_WITH_AES_128_CBC_SHA -> state 0x17 dissect_dtls_record: content_type 22 epoch 0 seq 1 decrypt_dtls_record: no session key dissect_dtls enter frame #3 (first time) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 2 decrypt_dtls_record: no session key dissect_dtls enter frame #4 (first time) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 3 decrypt_dtls_record: no session key dissect_dtls enter frame #5 (first time) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 4 decrypt_dtls_record: no session key Calculating hash with offset 13 6 Calculating hash with offset 0 3 Calculating hash with offset 14 3 Calculating hash with offset 0 689 Certificate.KeyID[20]: | ad 8c 9f b0 7c a4 5a 6f 33 2a 81 40 a4 bf 71 74 |....|.Zo3*.@..qt| | bb f2 72 f4 |..r. | dissect_dtls_record: content_type 22 epoch 0 seq 5 decrypt_dtls_record: no session key Calculating hash with offset 140 60 dissect_dtls_record: content_type 22 epoch 0 seq 6 decrypt_dtls_record: no session key Calculating hash with offset 213 12 dissect_dtls enter frame #6 (first time) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 1 decrypt_dtls_record: no session key Calculating hash with offset 13 774 dissect_dtls enter frame #7 (first time) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 2 decrypt_dtls_record: no session key Calculating hash with offset 13 270 trying to use TLS keylog in /home/usama/learn/webrtc-from-scrach/test/mastersecretkey.txt checking keylog line: checking keylog line: # Cipher Suite RSA-AES128-CBC-SHA checking keylog line: CLIENT_RANDOM 63613831383764642d623839612d343334332d613135612d3262653237376333 0E41B618BD5EC7590E1A2704FC419A0BBD775D4C5CBA484C6805ED15435630509DAB9DB1A22651EF5A29D42F827DA88D matched client_random checking keylog line: CLIENT_RANDOM 63613831383764642d623839612d343334332d613135612d3262653237376333 0E41B618BD5EC7590E1A2704FC419A0BBD775D4C5CBA484C6805ED15435630509DAB9DB1A22651EF5A29D42F827DA88D matched client_random ssl_generate_pre_master_secret: found SSL_HND_CLIENT_KEY_EXCHG, state 17 ssl_restore_master_key can't find pre-master secret by Unencrypted pre-master secret pre master encrypted[256]: | 0e ba 30 0c 5b 74 2b d2 14 56 58 9b 00 6c 5a 02 |..0.[t+..VX..lZ.| | 2f 3b 21 31 30 86 eb 32 c6 2e 7b 75 10 cc 06 62 |/;!10..2..{u...b| | 64 2d e2 dd d6 c7 84 b0 a9 52 7d 07 3f de f5 ad |d-.......R}.?...| | bf 38 e8 96 94 04 f6 ef cb 82 0f 75 06 87 9f b1 |.8.........u....| | 1d 2d 06 b7 83 b5 88 a7 de 2f 34 19 ba 99 5a f3 |.-......./4...Z.| | 5c 16 c4 67 1c f2 66 ae 73 46 72 16 13 71 92 78 |\..g..f.sFr..q.x| | 5c a3 3c d9 7d 7a f9 14 84 76 44 a9 97 c1 b6 2c |\.<.}z...vD....,| | 8a 4a 73 52 b7 b8 d5 5b 04 5e 66 35 71 04 11 27 |.JsR...[.^f5q..'| | 8b 45 0c 16 e2 80 e7 1e 1d 0a fc 0c f3 1b 48 aa |.E............H.| | 31 4b f1 c3 e4 f5 e0 7d 92 4b ff f5 45 e3 0f e1 |1K.....}.K..E...| | 58 47 69 af 47 8b 50 65 5c 9e e8 e7 ca ef 7f 8e |XGi.G.Pe\.......| | 48 59 c8 5a 2a 44 c6 3c 63 d2 f0 3d af a7 3c a8 |HY.Z*D.<c..=..<.| | df b8 43 c9 c1 35 be ca 9c 91 8b 64 a5 59 34 7e |..C..5.....d.Y4~| | 8d 5e b8 1d 52 56 11 fb c1 10 2c 87 7a 3f 2f 01 |.^..RV....,.z?/.| | 4a d6 5e 06 67 35 93 46 a9 ac f2 91 4b fe 3e 11 |J.^.g5.F....K.>.| | c4 40 58 08 8e a1 a8 71 e0 ec d3 1c 3f 17 b4 0c |.@X....q....?...| ssl_decrypt_pre_master_secret: RSA_private_decrypt ssl_decrypt_pre_master_secret: decryption failed: -49 (No certificate was found.) ssl_generate_pre_master_secret: can't decrypt pre-master secret ssl_restore_master_key can't find pre-master secret by Encrypted pre-master secret dissect_dtls_handshake can't generate pre master secret dissect_dtls enter frame #8 (first time) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 3 decrypt_dtls_record: no session key dissect_dtls enter frame #9 (first time) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 20 epoch 0 seq 4 decrypt_dtls_record: no session key trying to use TLS keylog in /home/usama/learn/webrtc-from-scrach/test/mastersecretkey.txt ssl_finalize_decryption state = 0x17 ssl_restore_master_key can't find master secret by Session ID ssl_restore_master_key master secret retrieved using Client Random Client Random[32]: | 63 61 38 31 38 37 64 64 2d 62 38 39 61 2d 34 33 |ca8187dd-b89a-43| | 34 33 2d 61 31 35 61 2d 32 62 65 32 37 37 63 33 |43-a15a-2be277c3| (pre-)master secret[48]: | 0e 41 b6 18 bd 5e c7 59 0e 1a 27 04 fc 41 9a 0b |.A...^.Y..'..A..| | bd 77 5d 4c 5c ba 48 4c 68 05 ed 15 43 56 30 50 |.w]L\.HLh...CV0P| | 9d ab 9d b1 a2 26 51 ef 5a 29 d4 2f 82 7d a8 8d |.....&Q.Z)./.}..| ssl_generate_keyring_material CIPHER: AES ssl_generate_keyring_material sess key generation tls12_prf: tls_hash(hash_alg SHA256 secret_len 48 seed_len 77 ) tls_hash: hash secret[48]: | 0e 41 b6 18 bd 5e c7 59 0e 1a 27 04 fc 41 9a 0b |.A...^.Y..'..A..| | bd 77 5d 4c 5c ba 48 4c 68 05 ed 15 43 56 30 50 |.w]L\.HLh...CV0P| | 9d ab 9d b1 a2 26 51 ef 5a 29 d4 2f 82 7d a8 8d |.....&Q.Z)./.}..| tls_hash: hash seed[77]: | 6b 65 79 20 65 78 70 61 6e 73 69 6f 6e 91 81 dc |key expansion...| | 97 e8 0e d8 43 4a 08 ea f7 dc 6d ab 0e b6 68 bf |....CJ....m...h.| | 6b 1b a6 90 62 8e 79 26 5f 71 a9 66 65 63 61 38 |k...b.y&_q.feca8| | 31 38 37 64 64 2d 62 38 39 61 2d 34 33 34 33 2d |187dd-b89a-4343-| | 61 31 35 61 2d 32 62 65 32 37 37 63 33 |a15a-2be277c3 | hash out[104]: | b8 58 63 e2 cf 6c d3 4c 1f 47 63 5f d2 c6 ee 7d |.Xc..l.L.Gc_...}| | 1d 6e 59 0b 6a 83 a9 67 16 3c 21 34 15 3e ca c2 |.nY.j..g.<!4.>..| | d4 26 b0 0b db c7 5d 9f d9 50 4a 12 01 4d f9 bc |.&....]..PJ..M..| | d1 75 8c 2c 19 c8 03 38 e5 71 e3 72 e1 d4 a1 ba |.u.,...8.q.r....| | 23 d3 f1 bd 3c f9 82 24 5a 12 da 32 b7 b3 4e de |#...<..$Z..2..N.| | a2 c9 80 b9 70 f9 ed 05 d6 37 7b 60 60 7b 41 fc |....p....7{``{A.| | 9e 18 6a f0 b4 ad da eb |..j..... | PRF out[104]: | b8 58 63 e2 cf 6c d3 4c 1f 47 63 5f d2 c6 ee 7d |.Xc..l.L.Gc_...}| | 1d 6e 59 0b 6a 83 a9 67 16 3c 21 34 15 3e ca c2 |.nY.j..g.<!4.>..| | d4 26 b0 0b db c7 5d 9f d9 50 4a 12 01 4d f9 bc |.&....]..PJ..M..| | d1 75 8c 2c 19 c8 03 38 e5 71 e3 72 e1 d4 a1 ba |.u.,...8.q.r....| | 23 d3 f1 bd 3c f9 82 24 5a 12 da 32 b7 b3 4e de |#...<..$Z..2..N.| | a2 c9 80 b9 70 f9 ed 05 d6 37 7b 60 60 7b 41 fc |....p....7{``{A.| | 9e 18 6a f0 b4 ad da eb |..j..... | key expansion[104]: | b8 58 63 e2 cf 6c d3 4c 1f 47 63 5f d2 c6 ee 7d |.Xc..l.L.Gc_...}| | 1d 6e 59 0b 6a 83 a9 67 16 3c 21 34 15 3e ca c2 |.nY.j..g.<!4.>..| | d4 26 b0 0b db c7 5d 9f d9 50 4a 12 01 4d f9 bc |.&....]..PJ..M..| | d1 75 8c 2c 19 c8 03 38 e5 71 e3 72 e1 d4 a1 ba |.u.,...8.q.r....| | 23 d3 f1 bd 3c f9 82 24 5a 12 da 32 b7 b3 4e de |#...<..$Z..2..N.| | a2 c9 80 b9 70 f9 ed 05 d6 37 7b 60 60 7b 41 fc |....p....7{``{A.| | 9e 18 6a f0 b4 ad da eb |..j..... | Client MAC key[20]: | b8 58 63 e2 cf 6c d3 4c 1f 47 63 5f d2 c6 ee 7d |.Xc..l.L.Gc_...}| | 1d 6e 59 0b |.nY. | Server MAC key[20]: | 6a 83 a9 67 16 3c 21 34 15 3e ca c2 d4 26 b0 0b |j..g.<!4.>...&..| | db c7 5d 9f |..]. | Client Write key[16]: | d9 50 4a 12 01 4d f9 bc d1 75 8c 2c 19 c8 03 38 |.PJ..M...u.,...8| Server Write key[16]: | e5 71 e3 72 e1 d4 a1 ba 23 d3 f1 bd 3c f9 82 24 |.q.r....#...<..$| Client Write IV[16]: | 5a 12 da 32 b7 b3 4e de a2 c9 80 b9 70 f9 ed 05 |Z..2..N.....p...| Server Write IV[16]: | d6 37 7b 60 60 7b 41 fc 9e 18 6a f0 b4 ad da eb |.7{``{A...j.....| ssl_generate_keyring_material ssl_create_decoder(client) decoder initialized (digest len 20) ssl_generate_keyring_material ssl_create_decoder(server) decoder initialized (digest len 20) ssl_generate_keyring_material: client seq 0, server seq 0 ssl_save_master_key inserted (pre-)master secret for Client Random stored key[32]: | 63 61 38 31 38 37 64 64 2d 62 38 39 61 2d 34 33 |ca8187dd-b89a-43| | 34 33 2d 61 31 35 61 2d 32 62 65 32 37 37 63 33 |43-a15a-2be277c3| stored (pre-)master secret[48]: | 0e 41 b6 18 bd 5e c7 59 0e 1a 27 04 fc 41 9a 0b |.A...^.Y..'..A..| | bd 77 5d 4c 5c ba 48 4c 68 05 ed 15 43 56 30 50 |.w]L\.HLh...CV0P| | 9d ab 9d b1 a2 26 51 ef 5a 29 d4 2f 82 7d a8 8d |.....&Q.Z)./.}..| ssl_save_master_key inserted (pre-)master secret for Session ID stored key[32]: | ae 09 ff 64 6d ac fa ad fa 4d 4b 28 85 3c 9f bf |...dm....MK(.<..| | 2f bd ef 05 4a 6a cd 2c a2 aa 84 92 7a 44 13 94 |/...Jj.,....zD..| stored (pre-)master secret[48]: | 0e 41 b6 18 bd 5e c7 59 0e 1a 27 04 fc 41 9a 0b |.A...^.Y..'..A..| | bd 77 5d 4c 5c ba 48 4c 68 05 ed 15 43 56 30 50 |.w]L\.HLh...CV0P| | 9d ab 9d b1 a2 26 51 ef 5a 29 d4 2f 82 7d a8 8d |.....&Q.Z)./.}..| ssl_change_cipher CLIENT dissect_dtls enter frame #10 (first time) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 1 seq 0 decrypt_dtls_record: app_data len 64, ssl state 3F packet_from_server: is from server - FALSE decrypt_dtls_record: using client decoder decrypt_dtls_record: allocating 96 bytes for decrypt data (old len 32) ssl_decrypt_record ciphertext len 64 Ciphertext[64]: | 5a 12 da 32 b7 b3 4e de a2 c9 80 b9 70 f9 ed 05 |Z..2..N.....p...| | 0e 5e d4 27 65 72 28 e4 27 b1 e6 26 04 68 c7 7f |.^.'er(.'..&.h..| | ee 73 c7 fc 61 7e cf 2d 8f b5 7f 46 b0 98 0d b2 |.s..a~.-...F....| | 5b 22 13 cf 08 3e 79 66 72 6c 38 90 50 5b 27 71 |["...>yfrl8.P['q| Plaintext[48]: | 14 00 00 0c 00 05 00 00 00 00 00 0c f1 87 20 d1 |.............. .| | 99 1f 2a bd 69 23 a6 64 b5 05 0d cc 0d bd d8 91 |..*.i#.d........| | fb bb 79 3a 4c 96 16 15 6e dd 90 f8 03 03 03 03 |..y:L...n.......| ssl_decrypt_record found padding 3 final len 44 checking mac (len 24, version FEFD, ct 22 seq 0) dtls_check_mac mac type:SHA1 md 2 dtls_check_mac seq: 0 epoch: 1 Mac[20]: | b5 05 0d cc 0d bd d8 91 fb bb 79 3a 4c 96 16 15 |..........y:L...| | 6e dd 90 f8 |n... | ssl_decrypt_record: mac ok dissect_dtls enter frame #11 (first time) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 7 decrypt_dtls_record: app_data len 93, ssl state 3F packet_from_server: is from server - TRUE decrypt_dtls_record: using server decoder decrypt_dtls_record: no decoder available ssl_try_set_version found version 0xFEFD -> state 0x3F ssl_reset_session detected renegotiation, clearing 0x28 (server side) ssl_dissect_hnd_hello_common found SERVER RANDOM -> state 0x17 ssl_set_cipher found CIPHER 0x002F TLS_RSA_WITH_AES_128_CBC_SHA -> state 0x17 dissect_dtls enter frame #1 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 0 dissect_dtls enter frame #2 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 0 dissect_dtls_record: content_type 22 epoch 0 seq 1 dissect_dtls enter frame #3 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 2 dissect_dtls enter frame #4 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #5 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 4 dissect_dtls_record: content_type 22 epoch 0 seq 5 dissect_dtls_record: content_type 22 epoch 0 seq 6 dissect_dtls enter frame #6 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 1 dissect_dtls enter frame #7 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 2 dissect_dtls enter frame #8 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #9 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 20 epoch 0 seq 4 dissect_dtls enter frame #10 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 1 seq 0 dissect_dtls enter frame #11 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 7 dissect_dtls enter frame #1 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 0 dissect_dtls enter frame #8 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #2 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 0 dissect_dtls_record: content_type 22 epoch 0 seq 1 dissect_dtls enter frame #3 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 2 dissect_dtls enter frame #4 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #5 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 4 dissect_dtls_record: content_type 22 epoch 0 seq 5 dissect_dtls_record: content_type 22 epoch 0 seq 6 dissect_dtls enter frame #6 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 1 dissect_dtls enter frame #7 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 2 dissect_dtls enter frame #8 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #9 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 20 epoch 0 seq 4 dissect_dtls enter frame #10 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 1 seq 0 dissect_dtls enter frame #11 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 7 dissect_dtls enter frame #1 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 0 dissect_dtls enter frame #2 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 0 dissect_dtls_record: content_type 22 epoch 0 seq 1 dissect_dtls enter frame #3 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 2 dissect_dtls enter frame #4 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #5 (already visited) packet_from_server: is from server - TRUE dissect_dtls_record: content_type 22 epoch 0 seq 4 dissect_dtls_record: content_type 22 epoch 0 seq 5 dissect_dtls_record: content_type 22 epoch 0 seq 6 dissect_dtls enter frame #6 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 1 dissect_dtls enter frame #7 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 2 dissect_dtls enter frame #8 (already visited) packet_from_server: is from server - FALSE dissect_dtls_record: content_type 22 epoch 0 seq 3 dissect_dtls enter frame #9 (already visited) packet_from_server: is from server - FALSE dissect_dtls_reco