Tested against the various OpenSSL/LibreSSL variants by pushing to the buildbot army and GHA.
A minimal local tests shows the new addition to the "Control Channel:" line... old: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA1 new: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA1, peer temporary key: 256 bits ECprime256v1 Your patch has been applied to the master and release/2.6 branch. commit 4e80aac451b99d5cc0b0cf268ca678e602959191 (master) commit 1240d97cfe782fa7c3ed0ecadd4fee8a7d4ccc18 (release/2.6) Author: Arne Schwabe Date: Mon Oct 9 12:55:18 2023 +0200 Print peer temporary key details Acked-by: Frank Lichtenheld <fr...@lichtenheld.com> Message-Id: <20231009105518.34432-1-fr...@lichtenheld.com> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg27192.html Signed-off-by: Gert Doering <g...@greenie.muc.de> -- kind regards, Gert Doering _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel