Ask Your Question

Revision history [back]

What happens in background when I set path to Pre-Master-Secret log file?

I wish to understand what is happening under the hood in wireshark, how is it implemented on a more basic level. Can it be used with tshark? How hard would it be to combine it with other smaller libraries or implement my own script?