Change the default EC key to secp384r1

prime256v1 is okay for now, but secp384r1 is more future-proof (gives us
a couple more years) and in this case does not really have any
drawbacks.

Tested: Checked to see that a new secp384r1 key is generated on first
        boot and the generate CSR redfish option works.

Change-Id: I334fc56db3dd55058a4c6780f8966bcc48d8f816
Signed-off-by: Vernon Mauery <vernon.mauery@linux.intel.com>
diff --git a/include/ssl_key_handler.hpp b/include/ssl_key_handler.hpp
index fab31ea..0240712 100644
--- a/include/ssl_key_handler.hpp
+++ b/include/ssl_key_handler.hpp
@@ -255,7 +255,7 @@
 {
     EVP_PKEY *pKey = nullptr;
     int eccgrp = 0;
-    eccgrp = OBJ_txt2nid("prime256v1");
+    eccgrp = OBJ_txt2nid("secp384r1");
 
     EC_KEY *myecc = EC_KEY_new_by_curve_name(eccgrp);
     if (myecc != nullptr)