Add secp256k1 curve info to README

This commit is contained in:
Sidd 2018-09-27 23:22:28 -04:00
parent c8aa5e449c
commit 4487b162de
2 changed files with 3 additions and 3 deletions

View file

@ -181,7 +181,7 @@ OpenVPN 2.4 added support for ECDSA. Elliptic curve cryptography is faster, ligh
This script provides:
- ECDSA: `prime256v1`/`secp384r1`/`secp521r1` curves
- ECDSA: `prime256v1`/`secp256k1`/`secp384r1`/`secp521r1` curves
- RSA: `2048`/`3072`/`4096` bits keys
It defaults to ECDSA with `prime256v1`.
@ -246,7 +246,7 @@ Also, generating a classic DH keys can take a long, looong time. ECDH keys are e
The script provides the following options:
- ECDH: `prime256v1`/`secp384r1`/`secp521r1` curves
- ECDH: `prime256v1`/`secp256k1`/`secp384r1`/`secp521r1` curves
- DH: `2048`/`3072`/`4096` bits keys
It defaults to `prime256v1`.

View file

@ -471,7 +471,7 @@ function installQuestions () {
echo " 2) secp256k1"
echo " 3) secp384r1"
echo " 4) secp521r1"
until [[ $DH_CURVE_CHOICE =~ ^[1-4]$ ]]; do
until [[ $DH_CURVE_CHOICE =~ ^[1-4]$ ]]; do
read -rp"Curve [1-4]: " -e -i 1 DH_CURVE_CHOICE
done
case $DH_CURVE_CHOICE in