Add secp256k1 curve info to README
This commit is contained in:
parent
c8aa5e449c
commit
4487b162de
2 changed files with 3 additions and 3 deletions
|
|
@ -181,7 +181,7 @@ OpenVPN 2.4 added support for ECDSA. Elliptic curve cryptography is faster, ligh
|
|||
|
||||
This script provides:
|
||||
|
||||
- ECDSA: `prime256v1`/`secp384r1`/`secp521r1` curves
|
||||
- ECDSA: `prime256v1`/`secp256k1`/`secp384r1`/`secp521r1` curves
|
||||
- RSA: `2048`/`3072`/`4096` bits keys
|
||||
|
||||
It defaults to ECDSA with `prime256v1`.
|
||||
|
|
@ -246,7 +246,7 @@ Also, generating a classic DH keys can take a long, looong time. ECDH keys are e
|
|||
|
||||
The script provides the following options:
|
||||
|
||||
- ECDH: `prime256v1`/`secp384r1`/`secp521r1` curves
|
||||
- ECDH: `prime256v1`/`secp256k1`/`secp384r1`/`secp521r1` curves
|
||||
- DH: `2048`/`3072`/`4096` bits keys
|
||||
|
||||
It defaults to `prime256v1`.
|
||||
|
|
|
|||
|
|
@ -471,7 +471,7 @@ function installQuestions () {
|
|||
echo " 2) secp256k1"
|
||||
echo " 3) secp384r1"
|
||||
echo " 4) secp521r1"
|
||||
until [[ $DH_CURVE_CHOICE =~ ^[1-4]$ ]]; do
|
||||
until [[ $DH_CURVE_CHOICE =~ ^[1-4]$ ]]; do
|
||||
read -rp"Curve [1-4]: " -e -i 1 DH_CURVE_CHOICE
|
||||
done
|
||||
case $DH_CURVE_CHOICE in
|
||||
|
|
|
|||
Loading…
Reference in a new issue