Hide Forgot
Description of problem: Because different TLS servers and clients may support different curves for ECDHE cipher suites, we need to be able to test situations in which the client and server support different curves. Or if the default server curve is unsupported by the client. Version-Release number of selected component (if applicable): openssl-1.0.1e-15.el6.x86_64 How reproducible: Always Steps to Reproduce: 1. Start openssl s_server 2. Grab all packets comming to s_server 3. Try to connect using s_client -named_curve secp256r1 4. Decode packet capture, check curves advertised in ClientHello Actual results: All curves supported are listed Expected results: Only secp256r1 listed Additional info: Needed for automatic verification of bug 1022468
This would have to be consulted with upstream - we in general do not want to add new functionality to openssl that is not accepted upstream.
(In reply to Tomas Mraz from comment #1) > This would have to be consulted with upstream - we in general do not want to > add new functionality to openssl that is not accepted upstream. AFAIK that's the case for all functionality we provide in RHEL packages. We still need a tracking bug to backport it.
Backporting the functionality from upstream master branch is not possible as it would require backporting also completely new SSL_CONF API calls. Writing a patch from scratch would be possible but not trivial and the priority is not high enough to warrant spending time on it.
Development Management has reviewed and declined this request. You may appeal this decision by reopening this request.