projects
/
BearSSL
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Activated Curve25519 support for ECDHE cipher suites.
[BearSSL]
/
tools
/
sslio.c
diff --git
a/tools/sslio.c
b/tools/sslio.c
index
7fb73ea
..
14a3138
100644
(file)
--- a/
tools/sslio.c
+++ b/
tools/sslio.c
@@
-213,6
+213,7
@@
run_ssl_engine(br_ssl_engine_context *cc, int fd, unsigned flags)
recvapp = ((st & BR_SSL_RECVAPP) != 0);
if (verbose && sendapp && !hsdetails) {
char csn[80];
recvapp = ((st & BR_SSL_RECVAPP) != 0);
if (verbose && sendapp && !hsdetails) {
char csn[80];
+ const char *pname;
fprintf(stderr, "Handshake completed\n");
fprintf(stderr, " version: ");
fprintf(stderr, "Handshake completed\n");
fprintf(stderr, " version: ");
@@
-238,8
+239,21
@@
run_ssl_engine(br_ssl_engine_context *cc, int fd, unsigned flags)
get_suite_name_ext(
cc->session.cipher_suite, csn, sizeof csn);
fprintf(stderr, " cipher suite: %s\n", csn);
get_suite_name_ext(
cc->session.cipher_suite, csn, sizeof csn);
fprintf(stderr, " cipher suite: %s\n", csn);
+ if (uses_ecdhe(cc->session.cipher_suite)) {
+ get_curve_name_ext(
+ br_ssl_engine_get_ecdhe_curve(cc),
+ csn, sizeof csn);
+ fprintf(stderr,
+ " ECDHE curve: %s\n", csn);
+ }
fprintf(stderr, " secure renegotiation: %s\n",
cc->reneg == 1 ? "no" : "yes");
fprintf(stderr, " secure renegotiation: %s\n",
cc->reneg == 1 ? "no" : "yes");
+ pname = br_ssl_engine_get_selected_protocol(cc);
+ if (pname != NULL) {
+ fprintf(stderr,
+ " protocol name (ALPN): %s\n",
+ pname);
+ }
hsdetails = 1;
}
hsdetails = 1;
}