X-Git-Url: https://bearssl.org/gitweb//home/git/?p=BearSSL;a=blobdiff_plain;f=tools%2Fsslio.c;h=14a3138825d3985f5645027c9309d758c60dfb45;hp=7fb73eade56cb1b1b9ee55a5f4ed770265a9470e;hb=3655193439d4e093bb80a2f0d9e02179d424de08;hpb=ab68048011dee644262fd0190a83a13162c14140 diff --git a/tools/sslio.c b/tools/sslio.c index 7fb73ea..14a3138 100644 --- a/tools/sslio.c +++ b/tools/sslio.c @@ -213,6 +213,7 @@ run_ssl_engine(br_ssl_engine_context *cc, int fd, unsigned flags) recvapp = ((st & BR_SSL_RECVAPP) != 0); if (verbose && sendapp && !hsdetails) { char csn[80]; + const char *pname; fprintf(stderr, "Handshake completed\n"); fprintf(stderr, " version: "); @@ -238,8 +239,21 @@ run_ssl_engine(br_ssl_engine_context *cc, int fd, unsigned flags) get_suite_name_ext( cc->session.cipher_suite, csn, sizeof csn); fprintf(stderr, " cipher suite: %s\n", csn); + if (uses_ecdhe(cc->session.cipher_suite)) { + get_curve_name_ext( + br_ssl_engine_get_ecdhe_curve(cc), + csn, sizeof csn); + fprintf(stderr, + " ECDHE curve: %s\n", csn); + } fprintf(stderr, " secure renegotiation: %s\n", cc->reneg == 1 ? "no" : "yes"); + pname = br_ssl_engine_get_selected_protocol(cc); + if (pname != NULL) { + fprintf(stderr, + " protocol name (ALPN): %s\n", + pname); + } hsdetails = 1; }