mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
9b86974e0c
L<foo|foo> is sub-optimal If the xref is the same as the title, which is what we do, then you only need L<foo>. This fixes all 1457 occurrences in 349 files. Approximately. (And pod used to need both.) Reviewed-by: Richard Levitte <levitte@openssl.org>
149 lines
3.7 KiB
Plaintext
149 lines
3.7 KiB
Plaintext
|
|
=pod
|
|
|
|
=head1 NAME
|
|
|
|
sess_id - SSL/TLS session handling utility
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
B<openssl> B<sess_id>
|
|
[B<-inform PEM|DER>]
|
|
[B<-outform PEM|DER|NSS>]
|
|
[B<-in filename>]
|
|
[B<-out filename>]
|
|
[B<-text>]
|
|
[B<-noout>]
|
|
[B<-context ID>]
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
The B<sess_id> process the encoded version of the SSL session structure
|
|
and optionally prints out SSL session details (for example the SSL session
|
|
master key) in human readable format. Since this is a diagnostic tool that
|
|
needs some knowledge of the SSL protocol to use properly, most users will
|
|
not need to use it.
|
|
|
|
=over 4
|
|
|
|
=item B<-inform DER|PEM>
|
|
|
|
This specifies the input format. The B<DER> option uses an ASN1 DER encoded
|
|
format containing session details. The precise format can vary from one version
|
|
to the next. The B<PEM> form is the default format: it consists of the B<DER>
|
|
format base64 encoded with additional header and footer lines.
|
|
|
|
=item B<-outform DER|PEM|NSS>
|
|
|
|
This specifies the output format. The B<PEM> and B<DER> options have the same meaning
|
|
as the B<-inform> option. The B<NSS> option outputs the session id and the master key
|
|
in NSS keylog format.
|
|
|
|
=item B<-in filename>
|
|
|
|
This specifies the input filename to read session information from or standard
|
|
input by default.
|
|
|
|
=item B<-out filename>
|
|
|
|
This specifies the output filename to write session information to or standard
|
|
output if this option is not specified.
|
|
|
|
=item B<-text>
|
|
|
|
prints out the various public or private key components in
|
|
plain text in addition to the encoded version.
|
|
|
|
=item B<-cert>
|
|
|
|
if a certificate is present in the session it will be output using this option,
|
|
if the B<-text> option is also present then it will be printed out in text form.
|
|
|
|
=item B<-noout>
|
|
|
|
this option prevents output of the encoded version of the session.
|
|
|
|
=item B<-context ID>
|
|
|
|
this option can set the session id so the output session information uses the
|
|
supplied ID. The ID can be any string of characters. This option wont normally
|
|
be used.
|
|
|
|
=back
|
|
|
|
=head1 OUTPUT
|
|
|
|
Typical output:
|
|
|
|
SSL-Session:
|
|
Protocol : TLSv1
|
|
Cipher : 0016
|
|
Session-ID: 871E62626C554CE95488823752CBD5F3673A3EF3DCE9C67BD916C809914B40ED
|
|
Session-ID-ctx: 01000000
|
|
Master-Key: A7CEFC571974BE02CAC305269DC59F76EA9F0B180CB6642697A68251F2D2BB57E51DBBB4C7885573192AE9AEE220FACD
|
|
Key-Arg : None
|
|
Start Time: 948459261
|
|
Timeout : 300 (sec)
|
|
Verify return code 0 (ok)
|
|
|
|
Theses are described below in more detail.
|
|
|
|
=over 4
|
|
|
|
=item B<Protocol>
|
|
|
|
this is the protocol in use TLSv1.2, TLSv1.1, TLSv1 or SSLv3.
|
|
|
|
=item B<Cipher>
|
|
|
|
the cipher used this is the actual raw SSL or TLS cipher code, see the SSL
|
|
or TLS specifications for more information.
|
|
|
|
=item B<Session-ID>
|
|
|
|
the SSL session ID in hex format.
|
|
|
|
=item B<Session-ID-ctx>
|
|
|
|
the session ID context in hex format.
|
|
|
|
=item B<Master-Key>
|
|
|
|
this is the SSL session master key.
|
|
|
|
=item B<Start Time>
|
|
|
|
this is the session start time represented as an integer in standard Unix format.
|
|
|
|
=item B<Timeout>
|
|
|
|
the timeout in seconds.
|
|
|
|
=item B<Verify return code>
|
|
|
|
this is the return code when an SSL client certificate is verified.
|
|
|
|
=back
|
|
|
|
=head1 NOTES
|
|
|
|
The PEM encoded session format uses the header and footer lines:
|
|
|
|
-----BEGIN SSL SESSION PARAMETERS-----
|
|
-----END SSL SESSION PARAMETERS-----
|
|
|
|
Since the SSL session output contains the master key it is possible to read the contents
|
|
of an encrypted session using this information. Therefore appropriate security precautions
|
|
should be taken if the information is being output by a "real" application. This is
|
|
however strongly discouraged and should only be used for debugging purposes.
|
|
|
|
=head1 BUGS
|
|
|
|
The cipher and start time should be printed out in human readable form.
|
|
|
|
=head1 SEE ALSO
|
|
|
|
L<ciphers(1)>, L<s_server(1)>
|
|
|
|
=cut
|