I am using openssl command line client (s_client) and wireshark to identify
the behaviour of a server that enforces secure renegotiation for client
certificate verification. Since the Master-Key is printed along with
SSL-Session information, I am able to use it in wireshark to decrypt the
messages up to re-negotiation. Is there a way to get s_client to print the
renegotiated Master-Key ?

Vysakh P Pillai
http://embeddedinn.github.io
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to