Go to LoadRunner-->Tools-->SSL Security. This will open the SSL Security utility. Next click on the Test Connection tab. Enter the server name (for example Amazon.com) and the access port. By default, port 443 is used. The click on the ''Connect button''.
The Test Connection tab of the SSL Utility enables you to capture the connection data from an SSL server and save it to a file __ConnectionData.txt in the %temp% directory. Additionally, the file is displayed in a Notepad file when the test is completed.
The text file will contain the Cypher, the SSH method and certificate information. For example:
CONNECTED(0000018C)
---
Certificate chain
0 s:/C=US/ST=Washington/L=Seattle/O=Amazon.com, Inc./CN=www.amazon.com
i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3
1 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3
i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5
2 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5
i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=US/ST=Washington/L=Seattle/O=Amazon.com, Inc./CN=www.amazon.com
issuer=/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3
---
No client certificate CA names sent
---
SSL handshake has read 4652 bytes and written 377 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.1
Cipher : ECDHE-RSA-AES128-SHA
Session-ID: 858FDF97E5458C9A27F01F27FB924C4DE40D7F4C3BB4E9D8