This repository has been archived on 2024-01-23. You can view files and clone it, but cannot push or open issues or pull requests.
wireguard-tools/contrib/extract-keys
Jason A. Donenfeld 396dc76a04 Update copyright
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2017-01-10 06:36:19 +01:00
..
.gitignore git: organize ignore files 2016-09-29 19:31:22 +02:00
Makefile examples: add key extractor 2016-08-26 04:52:50 +02:00
README examples: add key extractor 2016-08-26 04:52:50 +02:00
config.c Update copyright 2017-01-10 06:36:19 +01:00
extract-keys.c Update copyright 2017-01-10 06:36:19 +01:00

README

Key Extractor
=============

This will extract the symmetric ChaCha20Poly1305 session keys from the kernel
for a WireGuard interface, for use in making packet dissectors.


Build:
    $ make

Run (as root):
    # ./extract-keys INTERFACE

Output:
    REMOTE_KEY_ID SENDING_KEY
    LOCAL_KEY_ID RECEIVING_KEY

Example:
    # ./extract-keys wg0
    0x57b56068 tMTSEOJpEYFAQV2UviDiYooX0A1AD/ONqrzoQVHa1rQ=
    0xa182fd19 xvQSkQ5HTX5RUeJ74eAAb/xfNhdrDThxG91GXZIPKmY=
    0x01662508 LbMc84JULzXJiHotSkdSOPZ0bHh6IDwOrbxWLfwosTs=
    0xbd819021 4VA8lZ3I1HjnJcWTmhEzBdC92W1Aag9Lnyy2GkroOYI=