-
Notifications
You must be signed in to change notification settings - Fork 130
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expect SHA-256 instead of MD5 fingerprint flag value #160
Conversation
README.md
Outdated
@@ -119,7 +119,7 @@ cat - > /tmp/scep.csr | |||
$ ./scepclient-linux-amd64 -help | |||
Usage of ./scepclient-linux-amd64: | |||
-ca-fingerprint string | |||
md5 fingerprint of CA certificate for NDES server. | |||
(Note: Changed from MD5) SHA-256 digest of CA certificate for NDES server. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: see note below
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also, thanks for remember to update the docs! :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done. thanks :)
cmd/scepclient/scepclient.go
Outdated
@@ -268,7 +269,7 @@ func main() { | |||
|
|||
// in case of multiple certificate authorities, we need to figure out who the recipient of the encrypted | |||
// data is. | |||
flCAFingerprint = flag.String("ca-fingerprint", "", "md5 fingerprint of CA certificate for NDES server.") | |||
flCAFingerprint = flag.String("ca-fingerprint", "", "(Note: Changed from MD5) SHA-256 digest of CA certificate for NDES server.") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: place note behind new description
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done.
This PR solves issue #156.
Copying the issue description here to save readers' time.
This is to complete pull request #144 which should have removed all weak hash functions usages.
scep/cmd/scepclient/scepclient.go
Line 271 in c892534