Setting the log level to debug will write a lot of info from SSL (as well as from other places) into the error.log.
Further Investigations
Further investigations can be done with network sniffers like Wireshark used in combination with the openssl utility. The utility is provided in the installed bin directory. For example, on windows using the default installation path do the following:
cd c:\E2E_BRIDGE_PROG\bin
openssl-win32-64.exe s_client -debug -connect <host name>:<port>
An interactive shell opens giving you lots of connection information regarding the initial SSL handshake. To run a request type for example the following line (having deployed the standard example before):
GET /localhost/HttpsProxyExample/HttpsProxyServiceArtifact/Services/httpProxyService/HelloWorldPort/HttpsProxyPort