openssl sess_id [-help] [-inform PEM|DER] [-outform PEM|DER|NSS] [-in
filename] [-out filename] [-text] [-noout] [-context ID]
The sess_id process the encoded version of the SSL session structure
and optionally prints out SSL session details (for example the SSL
session master key) in human readable format. Since this is a
diagnostic tool that needs some knowledge of the SSL protocol to use
properly, most users will not need to use it.
Print out a usage message.
This specifies the input format. The DER option uses an ASN1 DER
encoded format containing session details. The precise format can
vary from one version to the next. The PEM form is the default
format: it consists of the DER format base64 encoded with
additional header and footer lines.
This specifies the output format. The PEM and DER options have the
same meaning as the -inform option. The NSS option outputs the
session id and the master key in NSS keylog format.
This specifies the input filename to read session information from
or standard input by default.
This specifies the output filename to write session information to
or standard output if this option is not specified.
prints out the various public or private key components in plain
text in addition to the encoded version.
if a certificate is present in the session it will be output using
this option, if the -text option is also present then it will be
printed out in text form.
this option prevents output of the encoded version of the session.
this option can set the session id so the output session
information uses the supplied ID. The ID can be any string of
characters. This option won't normally be used.
this is the protocol in use TLSv1.2, TLSv1.1, TLSv1 or SSLv3.
the cipher used this is the actual raw SSL or TLS cipher code, see
the SSL or TLS specifications for more information.
the SSL session ID in hex format.
the session ID context in hex format.
this is the SSL session master key.
this is the session start time represented as an integer in
standard Unix format.
the timeout in seconds.
Verify return code
this is the return code when an SSL client certificate is verified.
The PEM encoded session format uses the header and footer lines:
-----BEGIN SSL SESSION PARAMETERS-----
-----END SSL SESSION PARAMETERS-----
Since the SSL session output contains the master key it is possible to
read the contents of an encrypted session using this information.
Therefore appropriate security precautions should be taken if the
information is being output by a "real" application. This is however
strongly discouraged and should only be used for debugging purposes.
The cipher and start time should be printed out in human readable form.
Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the OpenSSL license (the "License"). You may not use
this file except in compliance with the License. You can obtain a copy
in the file LICENSE in the source distribution or at
1.1.0h 2018-05-12 SESS_ID(1SSL)
Man Pages Copyright Respective Owners. Site Copyright (C) 1994 - 2019
All Rights Reserved.