5 sess_id - SSL/TLS session handling utility
12 [B<-outform PEM|DER|NSS>]
21 The B<sess_id> process the encoded version of the SSL session structure
22 and optionally prints out SSL session details (for example the SSL session
23 master key) in human readable format. Since this is a diagnostic tool that
24 needs some knowledge of the SSL protocol to use properly, most users will
33 Print out a usage message.
35 =item B<-inform DER|PEM>
37 This specifies the input format. The B<DER> option uses an ASN1 DER encoded
38 format containing session details. The precise format can vary from one version
39 to the next. The B<PEM> form is the default format: it consists of the B<DER>
40 format base64 encoded with additional header and footer lines.
42 =item B<-outform DER|PEM|NSS>
44 This specifies the output format. The B<PEM> and B<DER> options have the same meaning
45 and default as the B<-inform> option. The B<NSS> option outputs the session id and
46 the master key in NSS keylog format.
50 This specifies the input filename to read session information from or standard
53 =item B<-out filename>
55 This specifies the output filename to write session information to or standard
56 output if this option is not specified.
60 Prints out the various public or private key components in
61 plain text in addition to the encoded version.
65 If a certificate is present in the session it will be output using this option,
66 if the B<-text> option is also present then it will be printed out in text form.
70 This option prevents output of the encoded version of the session.
74 This option can set the session id so the output session information uses the
75 supplied ID. The ID can be any string of characters. This option won't normally
87 Session-ID: 871E62626C554CE95488823752CBD5F3673A3EF3DCE9C67BD916C809914B40ED
88 Session-ID-ctx: 01000000
89 Master-Key: A7CEFC571974BE02CAC305269DC59F76EA9F0B180CB6642697A68251F2D2BB57E51DBBB4C7885573192AE9AEE220FACD
93 Verify return code 0 (ok)
95 Theses are described below in more detail.
101 This is the protocol in use TLSv1.2, TLSv1.1, TLSv1 or SSLv3.
105 The cipher used this is the actual raw SSL or TLS cipher code, see the SSL
106 or TLS specifications for more information.
110 The SSL session ID in hex format.
112 =item B<Session-ID-ctx>
114 The session ID context in hex format.
118 This is the SSL session master key.
122 This is the session start time represented as an integer in standard
127 The timeout in seconds.
129 =item B<Verify return code>
131 This is the return code when an SSL client certificate is verified.
137 The PEM encoded session format uses the header and footer lines:
139 -----BEGIN SSL SESSION PARAMETERS-----
140 -----END SSL SESSION PARAMETERS-----
142 Since the SSL session output contains the master key it is
143 possible to read the contents of an encrypted session using this
144 information. Therefore appropriate security precautions should be taken if
145 the information is being output by a "real" application. This is however
146 strongly discouraged and should only be used for debugging purposes.
150 The cipher and start time should be printed out in human readable form.
154 L<ciphers(1)>, L<s_server(1)>
158 Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved.
160 Licensed under the OpenSSL license (the "License"). You may not use
161 this file except in compliance with the License. You can obtain a copy
162 in the file LICENSE in the source distribution or at
163 L<https://www.openssl.org/source/license.html>.