diff options
author | Tobias Brunner <tobias@strongswan.org> | 2015-03-16 18:25:22 +0100 |
---|---|---|
committer | Tobias Brunner <tobias@strongswan.org> | 2015-03-23 17:22:31 +0100 |
commit | ae0604f58334c72f9969fdc1a6425adb948da0e9 (patch) | |
tree | 13a634c61a531391a93e8de6d4aca385ba0899a1 /src/pki/commands/issue.c | |
parent | 7fa03b308cb73c68ea7e944fcbc19073d3a3f5fa (diff) | |
download | strongswan-ae0604f58334c72f9969fdc1a6425adb948da0e9.tar.bz2 strongswan-ae0604f58334c72f9969fdc1a6425adb948da0e9.tar.xz |
pki: Use SHA-256 as default for signatures
Since the BLISS private key supports this we don't do any special
handling anymore (if the user choses a digest that is not supported,
signing will simply fail later because no signature scheme will be found).
Diffstat (limited to 'src/pki/commands/issue.c')
-rw-r--r-- | src/pki/commands/issue.c | 12 |
1 files changed, 2 insertions, 10 deletions
diff --git a/src/pki/commands/issue.c b/src/pki/commands/issue.c index fba0238ae..050ead77c 100644 --- a/src/pki/commands/issue.c +++ b/src/pki/commands/issue.c @@ -60,7 +60,7 @@ static void destroy_cdp(x509_cdp_t *this) static int issue() { cred_encoding_type_t form = CERT_ASN1_DER; - hash_algorithm_t digest = HASH_SHA1; + hash_algorithm_t digest = HASH_SHA256; certificate_t *cert_req = NULL, *cert = NULL, *ca =NULL; private_key_t *private = NULL; public_key_t *public = NULL; @@ -364,14 +364,6 @@ static int issue() } public->destroy(public); - if (private->get_type(private) == KEY_BLISS) - { - /* the default hash function is SHA512. SHA1 is not supported */ - if (digest == HASH_SHA1) - { - digest = HASH_SHA512; - } - } if (hex) { serial = chunk_from_hex(chunk_create(hex, strlen(hex)), NULL); @@ -599,7 +591,7 @@ static void __attribute__ ((constructor))reg() {"crl", 'u', 1, "CRL distribution point URI to include"}, {"crlissuer", 'I', 1, "CRL Issuer for CRL at distribution point"}, {"ocsp", 'o', 1, "OCSP AuthorityInfoAccess URI to include"}, - {"digest", 'g', 1, "digest for signature creation, default: sha1"}, + {"digest", 'g', 1, "digest for signature creation, default: sha256"}, {"outform", 'f', 1, "encoding of generated cert, default: der"}, } }); |