@DinoThanks for the response.
The handshake was working and I am able to view it in the trace. As pointed out by you, we cant view the cause of a handshake failure. However, I am looking for a detailed tracing similar to the one we enable in Curl. eg shown below :
13:49:47.031000 * Adding handle: conn: 0x21881c0
13:49:47.031000 * Adding handle: send: 0
13:49:47.031000 * Adding handle: recv: 0
13:49:47.031000 * Curl_addHandleToPipeline: length: 1
13:49:47.031000 * - Conn 0 (0x21881c0) send_pipe: 1, recv_pipe: 0
13:49:47.046000 * About to connect() to ******
.com port 443 (#0)
13:49:47.046000 * Trying 185.5.121.147…
13:49:47.218000 * Connected to ****** (10.10.10.100) port 443 (#0)
13:49:47.406000 * SSLv3, TLS handshake, Client hello (1):
13:49:47.578000 * SSLv3, TLS handshake, Server hello (2):
13:49:47.578000 * SSLv3, TLS handshake, CERT (11):
13:49:47.578000 * SSLv3, TLS handshake, Server key exchange (12):
We were running some load test and wanted to evaluate the number of times the handshake was performed.