Tested against the various OpenSSL/LibreSSL variants by pushing to
the buildbot army and GHA.

A minimal local tests shows the new addition to the "Control Channel:"
line...

old:
    Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer 
certificate: 2048 bit RSA, signature: RSA-SHA1

new:
    Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer 
certificate: 2048 bits RSA, signature: RSA-SHA1, peer temporary key: 256 bits 
ECprime256v1


Your patch has been applied to the master and release/2.6 branch.

commit 4e80aac451b99d5cc0b0cf268ca678e602959191 (master)
commit 1240d97cfe782fa7c3ed0ecadd4fee8a7d4ccc18 (release/2.6)
Author: Arne Schwabe
Date:   Mon Oct 9 12:55:18 2023 +0200

     Print peer temporary key details

     Acked-by: Frank Lichtenheld <[email protected]>
     Message-Id: <[email protected]>
     URL: 
https://www.mail-archive.com/[email protected]/msg27192.html
     Signed-off-by: Gert Doering <[email protected]>


--
kind regards,

Gert Doering



_______________________________________________
Openvpn-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to