aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon/transforms/rsa/rsa_private_key.c
diff options
context:
space:
mode:
authorMartin Willi <martin@strongswan.org>2006-03-23 15:25:43 +0000
committerMartin Willi <martin@strongswan.org>2006-03-23 15:25:43 +0000
commitdec598220b9a293c4ec75e593ab642a8945fa4fc (patch)
treea97247afbdb29e2b071933f8c9667a7ffa03cca3 /Source/charon/transforms/rsa/rsa_private_key.c
parent3264ce50b912f2aba09d2d8e7ee7ed9d364d9e46 (diff)
downloadstrongswan-dec598220b9a293c4ec75e593ab642a8945fa4fc.tar.bz2
strongswan-dec598220b9a293c4ec75e593ab642a8945fa4fc.tar.xz
- rewrite of logger_manager, uses now one instance per context
- cleanups for logger here and there - removed critical flag check in payload verification (conformance to IKEv2) - so thats and theres everywere... ;-)
Diffstat (limited to 'Source/charon/transforms/rsa/rsa_private_key.c')
-rw-r--r--Source/charon/transforms/rsa/rsa_private_key.c20
1 files changed, 20 insertions, 0 deletions
diff --git a/Source/charon/transforms/rsa/rsa_private_key.c b/Source/charon/transforms/rsa/rsa_private_key.c
index f6522ab17..34a217c6a 100644
--- a/Source/charon/transforms/rsa/rsa_private_key.c
+++ b/Source/charon/transforms/rsa/rsa_private_key.c
@@ -39,6 +39,21 @@ extern u_int8_t sha256_oid[19];
extern u_int8_t sha384_oid[19];
extern u_int8_t sha512_oid[19];
+/*
+asn1_module_t rsa_private_key_module = {
+ {ASN1_SEQUENCE, 0, 0, 0},
+ { ASN1_INTEGER, 0, offsetof(private_rsa_private_key, version), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, n), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, e), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, d), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, p), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, q), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, exp1), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, exp2), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, coeff), 0},
+ {ASN1_END, 0, 0, 0},
+};*/
+
/**
* Public exponent to use for key generation.
*/
@@ -57,6 +72,11 @@ struct private_rsa_private_key_t {
rsa_private_key_t public;
/**
+ * Version of key, as encoded in PKCS#1
+ */
+ u_int version;
+
+ /**
* Is the key already set ?
*/
bool is_key_set;