diff options
author | David Benjamin <davidben@chromium.org> | 2015-12-19 22:23:26 +0300 |
---|---|---|
committer | Adam Langley <agl@google.com> | 2015-12-23 02:12:25 +0300 |
commit | 4cc36adf5a62ff1366e8e9a4d40d9c007c0c8927 (patch) | |
tree | 9fb3f856f6704f624667108dd08fcead5a53f17c /tool | |
parent | 4298d773794dcfef675aeeacd970bcc8f2fe406d (diff) |
Make it possible to tell what curve was used on the server.
We don't actually have an API to let you know if the value is legal to
interpret as a curve ID. (This was kind of a poor API. Oh well.) Also add tests
for key_exchange_info. I've intentionally left server-side plain RSA missing
for now because the SSL_PRIVATE_KEY_METHOD abstraction only gives you bytes and
it's probably better to tweak this API instead.
(key_exchange_info also wasn't populated on the server, though due to a
rebasing error, that fix ended up in the parent CL. Oh well.)
Change-Id: I74a322c8ad03f25b02059da7568c9e1a78419069
Reviewed-on: https://boringssl-review.googlesource.com/6783
Reviewed-by: Adam Langley <agl@google.com>
Diffstat (limited to 'tool')
-rw-r--r-- | tool/transport_common.cc | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/tool/transport_common.cc b/tool/transport_common.cc index cfda6c35..2c15c00b 100644 --- a/tool/transport_common.cc +++ b/tool/transport_common.cc @@ -172,6 +172,11 @@ void PrintConnectionInfo(const SSL *ssl) { fprintf(stderr, " Resumed session: %s\n", SSL_session_reused(ssl) ? "yes" : "no"); fprintf(stderr, " Cipher: %s\n", SSL_CIPHER_get_name(cipher)); + if (SSL_CIPHER_is_ECDHE(cipher)) { + fprintf(stderr, " ECDHE curve: %s\n", + SSL_get_curve_name( + SSL_SESSION_get_key_exchange_info(SSL_get_session(ssl)))); + } fprintf(stderr, " Secure renegotiation: %s\n", SSL_get_secure_renegotiation_support(ssl) ? "yes" : "no"); |