diff --git a/README.md b/README.md index f2a6324..1a314b7 100644 --- a/README.md +++ b/README.md @@ -181,7 +181,7 @@ OpenVPN 2.4 added support for ECDSA. Elliptic curve cryptography is faster, ligh This script provides: -- ECDSA: `prime256v1`/`secp384r1`/`secp521r1` curves +- ECDSA: `prime256v1`/`secp256k1`/`secp384r1`/`secp521r1` curves - RSA: `2048`/`3072`/`4096` bits keys It defaults to ECDSA with `prime256v1`. @@ -246,7 +246,7 @@ Also, generating a classic DH keys can take a long, looong time. ECDH keys are e The script provides the following options: -- ECDH: `prime256v1`/`secp384r1`/`secp521r1` curves +- ECDH: `prime256v1`/`secp256k1`/`secp384r1`/`secp521r1` curves - DH: `2048`/`3072`/`4096` bits keys It defaults to `prime256v1`. diff --git a/openvpn-install.sh b/openvpn-install.sh index a881869..0e424bf 100644 --- a/openvpn-install.sh +++ b/openvpn-install.sh @@ -471,7 +471,7 @@ function installQuestions () { echo " 2) secp256k1" echo " 3) secp384r1" echo " 4) secp521r1" - until [[ $DH_CURVE_CHOICE =~ ^[1-4]$ ]]; do + until [[ $DH_CURVE_CHOICE =~ ^[1-4]$ ]]; do read -rp"Curve [1-4]: " -e -i 1 DH_CURVE_CHOICE done case $DH_CURVE_CHOICE in