|
|
fff44d |
From 43392d48924d6d50ef2712947ddea424e723e171 Mon Sep 17 00:00:00 2001
|
|
|
fff44d |
From: Trevor Vaughan <tvaughan@onyxpoint.com>
|
|
|
fff44d |
Date: Tue, 27 Mar 2018 09:28:28 -0400
|
|
|
fff44d |
Subject: [PATCH 23/25] Updates per Feedback
|
|
|
fff44d |
|
|
|
fff44d |
Ref: #89
|
|
|
fff44d |
---
|
|
|
fff44d |
src/scepgen-o.c | 9 +++++----
|
|
|
fff44d |
1 file changed, 5 insertions(+), 4 deletions(-)
|
|
|
fff44d |
|
|
|
fff44d |
diff --git a/src/scepgen-o.c b/src/scepgen-o.c
|
|
|
fff44d |
index 07c2b8b..05fc437 100644
|
|
|
fff44d |
--- a/src/scepgen-o.c
|
|
|
fff44d |
+++ b/src/scepgen-o.c
|
|
|
fff44d |
@@ -457,7 +457,7 @@ cm_scepgen_o_cooked(struct cm_store_ca *ca, struct cm_store_entry *entry,
|
|
|
fff44d |
_exit(1);
|
|
|
fff44d |
}
|
|
|
fff44d |
|
|
|
fff44d |
- cm_log(1, "SCEP cipher authoritatively set to: '%s'\n", scep_cipher);
|
|
|
fff44d |
+ cm_log(1, "SCEP cipher set from configuration to: '%s'\n", scep_cipher);
|
|
|
fff44d |
}
|
|
|
fff44d |
else {
|
|
|
fff44d |
cipher = cm_prefs_nocipher;
|
|
|
fff44d |
@@ -527,11 +527,11 @@ cm_scepgen_o_cooked(struct cm_store_ca *ca, struct cm_store_entry *entry,
|
|
|
fff44d |
digest = cm_prefs_md5;
|
|
|
fff44d |
}
|
|
|
fff44d |
else {
|
|
|
fff44d |
- cm_log(1, "Option 'scep_digest' must be one of AES256, AES192, AES128, DES3, or DES. Got '%s'\n", scep_digest);
|
|
|
fff44d |
+ cm_log(1, "Option 'scep_digest' must be one of SHA512, SHA384, SHA256, SHA1, or MD5. Got '%s'\n", scep_digest);
|
|
|
fff44d |
_exit(1);
|
|
|
fff44d |
}
|
|
|
fff44d |
|
|
|
fff44d |
- cm_log(1, "SCEP digest authoritatively set to: '%s'\n", scep_digest);
|
|
|
fff44d |
+ cm_log(1, "SCEP digest set from configuration to: '%s'\n", scep_digest);
|
|
|
fff44d |
}
|
|
|
fff44d |
else {
|
|
|
fff44d |
pref_digest = cm_prefs_preferred_digest();
|
|
|
fff44d |
@@ -578,7 +578,8 @@ cm_scepgen_o_cooked(struct cm_store_ca *ca, struct cm_store_entry *entry,
|
|
|
fff44d |
}
|
|
|
fff44d |
}
|
|
|
fff44d |
if (digest == cm_prefs_nodigest) {
|
|
|
fff44d |
- /* Per the latest Draft RFC */
|
|
|
fff44d |
+ /* Per SCEP RFC draft-gutmann-scep-10 - March 1, 2018 */
|
|
|
fff44d |
+ /* https://www.ietf.org/id/draft-gutmann-scep-10.txt */
|
|
|
fff44d |
cm_log(1, "Could not determine supported CA capabilities, using SHA256.\n");
|
|
|
fff44d |
digest = cm_prefs_sha256;
|
|
|
fff44d |
}
|
|
|
fff44d |
--
|
|
|
fff44d |
1.8.3.1
|
|
|
fff44d |
|