C:\Users\IC002275>openssl s_client -connect localhost:5671 -cert D:\sprint43\tls-gen-master\result\client_certificate.pem -key D:\sprint43\tls-gen-master\result\client_key.pem -CAfile D:\sprint43\tls-gen-master\result\ca_certificate.pem
CONNECTED(00000004)
depth=1 CN = TLSGenSelfSignedtRootCA, L = $$$$
verify return:1
depth=0 CN = md1uu1ec, O = server
verify return:1
---
Certificate chain
0 s:CN = md1uu1ec, O = server
i:CN = TLSGenSelfSignedtRootCA, L = $$$$
1 s:CN = TLSGenSelfSignedtRootCA, L = $$$$
i:CN = TLSGenSelfSignedtRootCA, L = $$$$
---
Server certificate
subject=CN = md1uu1ec, O = server
issuer=CN = TLSGenSelfSignedtRootCA, L = $$$$
---
Acceptable client certificate CA names
CN = TLSGenSelfSignedtRootCA, L = $$$$
Client Certificate Types: ECDSA sign, RSA sign, DSA sign
Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:ECDSA+SHA224:RSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1
Shared Requested Signature Algorithms: ECDSA+SHA512:RSA+SHA512:ECDSA+SHA384:RSA+SHA384:ECDSA+SHA256:RSA+SHA256:ECDSA+SHA224:RSA+SHA224:ECDSA+SHA1:RSA+SHA1:DSA+SHA1
Peer signing digest: SHA256
Peer signature type: RSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 3611 bytes and written 3669 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 4096 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: D84EF0A2D932FE83764818EAD06674271BC8259892EBB56118F96CD4783DA480
Session-ID-ctx:
Master-Key: 3F84DED5ACF6780185188A04D511A39648816348BC9624DDAAE551096CA2B0191BE0CEBAA8B5393C279BD7DD277B6BC1
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1557381400
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
---
read:errno=104