Certificates based on SHA-1 are being phased out[1].
So we should expect a rise in certificates based on SHA-2.
Adding SHA-384 as a valid signature algorithm.
[1] https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/
Signed-off-by: Bruno Thomsen <bth@kamstrup.dk>
Valid algorithms are:
.RS
-ALL, NONE, MD5 (default), SHA1, SHA256, SHA512
+ALL, NONE, MD5 (default), SHA1, SHA256, SHA384, SHA512
.RE
.IP -u
unlink (remove) certdata.txt after processing
# If the OpenSSL commandline is not in search path you can configure it here!
my $openssl = 'openssl';
-my $version = '1.23';
+my $version = '1.24';
$opt_w = 76; # default base64 encoded lines length
"MD5",
"SHA1",
"SHA256",
+ "SHA384",
"SHA512"
);