de.rub.nds.tlsattacker.tls.exceptions.WorkflowExecutionException: EC public key parsing failed

GitHub | BenBE | 8 months ago
tip
Do you know that we can give you better hits? Get more relevant results from Samebug’s stack trace search.
  1. 0

    Unparseable TLS EC Parameters for play.google.com

    GitHub | 8 months ago | BenBE
    de.rub.nds.tlsattacker.tls.exceptions.WorkflowExecutionException: EC public key parsing failed

    Root Cause Analysis

    1. org.bouncycastle.crypto.tls.TlsFatalAlert

      No message provided

      at org.bouncycastle.crypto.tls.TlsECCUtils.deserializeECPublicKey()
    2. BouncyCastle
      TlsECCUtils.deserializeECPublicKey
      1. org.bouncycastle.crypto.tls.TlsECCUtils.deserializeECPublicKey(Unknown Source)
      1 frame
    3. de.rub.nds
      GenericWorkflowExecutor.executeWorkflow
      1. de.rub.nds.tlsattacker.tls.crypto.ECCUtilsBCWrapper.readECParametersWithPublicKey(ECCUtilsBCWrapper.java:82)
      2. de.rub.nds.tlsattacker.tls.protocol.handshake.ECDHEServerKeyExchangeHandler.parseMessageAction(ECDHEServerKeyExchangeHandler.java:88)
      3. de.rub.nds.tlsattacker.tls.protocol.ProtocolMessageHandler.parseMessage(ProtocolMessageHandler.java:76)
      4. de.rub.nds.tlsattacker.tls.workflow.GenericWorkflowExecutor.parseRawBytesIntoProtocolMessages(GenericWorkflowExecutor.java:204)
      5. de.rub.nds.tlsattacker.tls.workflow.GenericWorkflowExecutor.handleProtocolMessagesFromPeer(GenericWorkflowExecutor.java:176)
      6. de.rub.nds.tlsattacker.tls.workflow.GenericWorkflowExecutor.executeWorkflow(GenericWorkflowExecutor.java:83)
      6 frames
    4. de.dogcraft.ssltest
      TLSAttackerClient.main
      1. de.dogcraft.ssltest.TLSAttackerClient$1.executeAttack(TLSAttackerClient.java:65)
      2. de.dogcraft.ssltest.TLSAttackerClient.main(TLSAttackerClient.java:122)
      2 frames