I'm using openssl to connect to an SMTP server normally (without encryption), send a STARTTLS command, negotiate the SSL encryption, and then interact with the encrypted session. This is the command I'm using (through telnet): openssl s_client -starttls smtp -crlf -connect 1.2.3.4:25 How can I ensure that TLS handshake was successful? This is the sequence of commands used so far: << 220 example.co
![openssl to negotiate SSL encryption for STARTTLS](https://cdn-ak-scissors.b.st-hatena.com/image/square/98d6f053a97a87156775f60757c60865d0f2c47d/height=288;version=1;width=512/https%3A%2F%2Fcdn.sstatic.net%2FSites%2Fstackoverflow%2FImg%2Fapple-touch-icon%402.png%3Fv%3D73d79a89bded)