diff options
author | Andreas Steffen <andreas.steffen@strongswan.org> | 2014-11-28 13:13:47 +0100 |
---|---|---|
committer | Andreas Steffen <andreas.steffen@strongswan.org> | 2014-11-29 14:51:18 +0100 |
commit | b6bb32e658347ac150478959c0f15caab0fdea88 (patch) | |
tree | d1481682d60927c96d23bd0d11faac8e9b0f2a0f /src/pki/commands/req.c | |
parent | 43d92475998f85b977ca98dd8ac81fc630a19000 (diff) | |
download | strongswan-b6bb32e658347ac150478959c0f15caab0fdea88.tar.bz2 strongswan-b6bb32e658347ac150478959c0f15caab0fdea88.tar.xz |
Implemented full BLISS support for IKEv2 public key authentication and the pki tool
Diffstat (limited to 'src/pki/commands/req.c')
-rw-r--r-- | src/pki/commands/req.c | 11 |
1 files changed, 10 insertions, 1 deletions
diff --git a/src/pki/commands/req.c b/src/pki/commands/req.c index 023683569..fbe47ecc8 100644 --- a/src/pki/commands/req.c +++ b/src/pki/commands/req.c @@ -57,6 +57,10 @@ static int req() { type = KEY_ECDSA; } + else if (streq(arg, "bliss")) + { + type = KEY_BLISS; + } else { error = "invalid input type"; @@ -98,6 +102,11 @@ static int req() break; } + if (type == KEY_BLISS) + { + /* currently only SHA-512 is supported */ + digest = HASH_SHA512; + } if (!dn) { error = "--dn is required"; @@ -185,7 +194,7 @@ static void __attribute__ ((constructor))reg() command_register((command_t) { req, 'r', "req", "create a PKCS#10 certificate request", - {" [--in file] [--type rsa|ecdsa] --dn distinguished-name", + {" [--in file] [--type rsa|ecdsa|bliss] --dn distinguished-name", "[--san subjectAltName]+ [--password challengePassword]", "[--digest md5|sha1|sha224|sha256|sha384|sha512] [--outform der|pem]"}, { |