Only support >= 256-bit elliptic curves with ecdh_auto (server) or by default (client).
authorEmilia Kasper <emilia@openssl.org>
Wed, 20 May 2015 13:47:51 +0000 (15:47 +0200)
committerEmilia Kasper <emilia@openssl.org>
Wed, 20 May 2015 13:47:51 +0000 (15:47 +0200)
commitde57d2372985d2640ae82f7954bf9dc07caf2f09
tree62ce809bf90d041fe75baaae1361ef37a7b6dd8d
parent1554d55318a7bb3347f4ccfadf78cca56e51ee79
Only support >= 256-bit elliptic curves with ecdh_auto (server) or by default (client).

Also reorder preferences to prefer prime curves to binary curves, and P-256 to everything else.

The result:

$ openssl s_server -named_curves "auto"

This command will negotiate an ECDHE ciphersuite with P-256:

$ openssl s_client

This command will negotiate P-384:

$ openssl s_client -curves "P-384"

This command will not negotiate ECDHE because P-224 is disabled with "auto":

$ openssl s_client -curves "P-224"

Reviewed-by: Kurt Roeckx <kurt@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
CHANGES
ssl/t1_lib.c
test/ssltest.c