📄 sendcert-forced.txt
字号:
{left}sendcert=forced is a new certificate sending policy.When sending the certificate is forced, then the certificate file is sentwithout any interpretation. Normally one would send a certificate (X.509 orPGP) based upon: 1) if they asked for it, which CA did they request? 2) what we found on the disk, and interpreted 3) it would include whatever chains, etc. that might have been configured.sendcert=forced causes pluto to send the entire contents of the file givenas {left}cert=. The certificate payload type is forced to be of the typegiven by {left}certtype=<INTEGER>.This feature is mostly used in testing, but it may be useful for doing interop with very weird kinds of peers. It will also get use in prototypingof Me-Tarzan-You-Jane.{left}certtype= numbers are taken from the IKEv1 IANA registry. A copy ofthem can be found in linux/include/openswan/ipsec_policy.h as the"ipsec_cert_type" enum. It is reproduced below:/* Certificate type values * RFC 2408 ISAKMP, chapter 3.9 */enum ipsec_cert_type { CERT_NONE= 0, /* none, or guess from file contents */ CERT_PKCS7_WRAPPED_X509= 1, /* self-signed certificate from disk */ CERT_PGP= 2, CERT_DNS_SIGNED_KEY= 3, /* KEY RR from DNS */ CERT_X509_SIGNATURE= 4, CERT_X509_KEY_EXCHANGE= 5, CERT_KERBEROS_TOKENS= 6, CERT_CRL= 7, CERT_ARL= 8, CERT_SPKI= 9, CERT_X509_ATTRIBUTE= 10, CERT_RAW_RSA= 11, /* raw RSA from config file */ };
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -