aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon/encoding
diff options
context:
space:
mode:
authorMartin Willi <martin@strongswan.org>2005-12-12 12:52:59 +0000
committerMartin Willi <martin@strongswan.org>2005-12-12 12:52:59 +0000
commit6db4e80b569137103b5003b9585e32c12af1a694 (patch)
tree7b640e5aa7bf9895ab3efc50be6e363158783b48 /Source/charon/encoding
parent7fa8decb78f5062a124fd0d37ba51360100f9bfa (diff)
downloadstrongswan-6db4e80b569137103b5003b9585e32c12af1a694.tar.bz2
strongswan-6db4e80b569137103b5003b9585e32c12af1a694.tar.xz
- fixed some BAD bugs
- clean localhost-testcases for bad_dh, shared and rsa
Diffstat (limited to 'Source/charon/encoding')
-rw-r--r--Source/charon/encoding/payloads/notify_payload.c1
-rw-r--r--Source/charon/encoding/payloads/sa_payload.c1
2 files changed, 2 insertions, 0 deletions
diff --git a/Source/charon/encoding/payloads/notify_payload.c b/Source/charon/encoding/payloads/notify_payload.c
index 36a9930dc..dccc9d169 100644
--- a/Source/charon/encoding/payloads/notify_payload.c
+++ b/Source/charon/encoding/payloads/notify_payload.c
@@ -395,6 +395,7 @@ notify_payload_t *notify_payload_create()
this->notify_message_type = 0;
this->spi.ptr = NULL;
this->spi.len = 0;
+ this->spi_size = 0;
this->notification_data.ptr = NULL;
this->notification_data.len = 0;
diff --git a/Source/charon/encoding/payloads/sa_payload.c b/Source/charon/encoding/payloads/sa_payload.c
index 0cae8948f..1ef67a2c9 100644
--- a/Source/charon/encoding/payloads/sa_payload.c
+++ b/Source/charon/encoding/payloads/sa_payload.c
@@ -761,6 +761,7 @@ sa_payload_t *sa_payload_create_from_ike_proposals(ike_proposal_t *proposals, si
proposal_substructure = proposal_substructure_create();
proposal_substructure->set_protocol_id(proposal_substructure,IKE);
proposal_substructure->set_proposal_number(proposal_substructure,(i + 1));
+
/* create transform substructures to hold each specific transform for an ike proposal */
encryption_algorithm = transform_substructure_create_type(ENCRYPTION_ALGORITHM,proposals[i].encryption_algorithm,proposals[i].encryption_algorithm_key_length);