Tested against the various OpenSSL/LibreSSL variants by pushing to
the buildbot army and GHA.

A minimal local tests shows the new addition to the "Control Channel:"
line...

old:
    Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer 
certificate: 2048 bit RSA, signature: RSA-SHA1

new:
    Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer 
certificate: 2048 bits RSA, signature: RSA-SHA1, peer temporary key: 256 bits 
ECprime256v1


Your patch has been applied to the master and release/2.6 branch.

commit 4e80aac451b99d5cc0b0cf268ca678e602959191 (master)
commit 1240d97cfe782fa7c3ed0ecadd4fee8a7d4ccc18 (release/2.6)
Author: Arne Schwabe
Date:   Mon Oct 9 12:55:18 2023 +0200

     Print peer temporary key details

     Acked-by: Frank Lichtenheld <fr...@lichtenheld.com>
     Message-Id: <20231009105518.34432-1-fr...@lichtenheld.com>
     URL: 
https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg27192.html
     Signed-off-by: Gert Doering <g...@greenie.muc.de>


--
kind regards,

Gert Doering



_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to