[openssl/openssl] e56f19: To reliably trigger HRR we must use P-384 group
Tomáš Mráz
noreply at github.com
Mon Jul 1 08:07:53 UTC 2024
Branch: refs/heads/openssl-3.0
Home: https://github.com/openssl/openssl
Commit: e56f195cd3b7b793ef3b6807d23b3c39aa3fb8cd
https://github.com/openssl/openssl/commit/e56f195cd3b7b793ef3b6807d23b3c39aa3fb8cd
Author: Tomas Mraz <tomas at openssl.org>
Date: 2024-07-01 (Mon, 01 Jul 2024)
Changed paths:
M test/sslapitest.c
Log Message:
-----------
To reliably trigger HRR we must use P-384 group
Otherwise with newer FIPS providers P-256 is the first group
supported.
Reviewed-by: Matt Caswell <matt at openssl.org>
Reviewed-by: Neil Horman <nhorman at openssl.org>
Reviewed-by: Tim Hudson <tjh at openssl.org>
Reviewed-by: Paul Dale <ppzgs1 at gmail.com>
(Merged from https://github.com/openssl/openssl/pull/24763)
(cherry picked from commit 0da6d328d5f6d0fe0aca47a94bb55a9f2ed0628b)
To unsubscribe from these emails, change your notification settings at https://github.com/openssl/openssl/settings/notifications
More information about the openssl-commits
mailing list