aboutsummaryrefslogtreecommitdiffstats
path: root/src/pki/commands/req.c
diff options
context:
space:
mode:
authorAndreas Steffen <andreas.steffen@strongswan.org>2014-11-28 13:13:47 +0100
committerAndreas Steffen <andreas.steffen@strongswan.org>2014-11-29 14:51:18 +0100
commitb6bb32e658347ac150478959c0f15caab0fdea88 (patch)
treed1481682d60927c96d23bd0d11faac8e9b0f2a0f /src/pki/commands/req.c
parent43d92475998f85b977ca98dd8ac81fc630a19000 (diff)
downloadstrongswan-b6bb32e658347ac150478959c0f15caab0fdea88.tar.bz2
strongswan-b6bb32e658347ac150478959c0f15caab0fdea88.tar.xz
Implemented full BLISS support for IKEv2 public key authentication and the pki tool
Diffstat (limited to 'src/pki/commands/req.c')
-rw-r--r--src/pki/commands/req.c11
1 files changed, 10 insertions, 1 deletions
diff --git a/src/pki/commands/req.c b/src/pki/commands/req.c
index 023683569..fbe47ecc8 100644
--- a/src/pki/commands/req.c
+++ b/src/pki/commands/req.c
@@ -57,6 +57,10 @@ static int req()
{
type = KEY_ECDSA;
}
+ else if (streq(arg, "bliss"))
+ {
+ type = KEY_BLISS;
+ }
else
{
error = "invalid input type";
@@ -98,6 +102,11 @@ static int req()
break;
}
+ if (type == KEY_BLISS)
+ {
+ /* currently only SHA-512 is supported */
+ digest = HASH_SHA512;
+ }
if (!dn)
{
error = "--dn is required";
@@ -185,7 +194,7 @@ static void __attribute__ ((constructor))reg()
command_register((command_t) {
req, 'r', "req",
"create a PKCS#10 certificate request",
- {" [--in file] [--type rsa|ecdsa] --dn distinguished-name",
+ {" [--in file] [--type rsa|ecdsa|bliss] --dn distinguished-name",
"[--san subjectAltName]+ [--password challengePassword]",
"[--digest md5|sha1|sha224|sha256|sha384|sha512] [--outform der|pem]"},
{