Tested against the various OpenSSL/LibreSSL variants by pushing to
the buildbot army and GHA.
A minimal local tests shows the new addition to the "Control Channel:"
line...
old:
Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer
certificate: 2048 bit RSA, signature: RSA-SHA1
new:
Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer
certificate: 2048 bits RSA, signature: RSA-SHA1, peer temporary key: 256 bits
ECprime256v1
Your patch has been applied to the master and release/2.6 branch.
commit 4e80aac451b99d5cc0b0cf268ca678e602959191 (master)
commit 1240d97cfe782fa7c3ed0ecadd4fee8a7d4ccc18 (release/2.6)
Author: Arne Schwabe
Date: Mon Oct 9 12:55:18 2023 +0200
Print peer temporary key details
Acked-by: Frank Lichtenheld <[email protected]>
Message-Id: <[email protected]>
URL:
https://www.mail-archive.com/[email protected]/msg27192.html
Signed-off-by: Gert Doering <[email protected]>
--
kind regards,
Gert Doering
_______________________________________________
Openvpn-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-devel