I am using openssl command line client (s_client) and wireshark to identify the behaviour of a server that enforces secure renegotiation for client certificate verification. Since the Master-Key is printed along with SSL-Session information, I am able to use it in wireshark to decrypt the messages up to re-negotiation. Is there a way to get s_client to print the renegotiated Master-Key ?
Vysakh P Pillai
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users