diff options
author | Martin Willi <martin@strongswan.org> | 2006-03-23 15:25:43 +0000 |
---|---|---|
committer | Martin Willi <martin@strongswan.org> | 2006-03-23 15:25:43 +0000 |
commit | dec598220b9a293c4ec75e593ab642a8945fa4fc (patch) | |
tree | a97247afbdb29e2b071933f8c9667a7ffa03cca3 /Source/charon/transforms | |
parent | 3264ce50b912f2aba09d2d8e7ee7ed9d364d9e46 (diff) | |
download | strongswan-dec598220b9a293c4ec75e593ab642a8945fa4fc.tar.bz2 strongswan-dec598220b9a293c4ec75e593ab642a8945fa4fc.tar.xz |
- rewrite of logger_manager, uses now one instance per context
- cleanups for logger here and there
- removed critical flag check in payload verification (conformance to IKEv2)
- so thats and theres everywere... ;-)
Diffstat (limited to 'Source/charon/transforms')
-rw-r--r-- | Source/charon/transforms/diffie_hellman.h | 2 | ||||
-rw-r--r-- | Source/charon/transforms/rsa/rsa_private_key.c | 20 |
2 files changed, 20 insertions, 2 deletions
diff --git a/Source/charon/transforms/diffie_hellman.h b/Source/charon/transforms/diffie_hellman.h index 9a3608aea..48a165557 100644 --- a/Source/charon/transforms/diffie_hellman.h +++ b/Source/charon/transforms/diffie_hellman.h @@ -35,8 +35,6 @@ typedef enum diffie_hellman_group_t diffie_hellman_group_t; * * See IKEv2 RFC 3.3.2 and RFC 3526. * - * @warning Use of big modulus sizes can be cpu consuming. - * * @ingroup transforms */ enum diffie_hellman_group_t { diff --git a/Source/charon/transforms/rsa/rsa_private_key.c b/Source/charon/transforms/rsa/rsa_private_key.c index f6522ab17..34a217c6a 100644 --- a/Source/charon/transforms/rsa/rsa_private_key.c +++ b/Source/charon/transforms/rsa/rsa_private_key.c @@ -39,6 +39,21 @@ extern u_int8_t sha256_oid[19]; extern u_int8_t sha384_oid[19]; extern u_int8_t sha512_oid[19]; +/* +asn1_module_t rsa_private_key_module = { + {ASN1_SEQUENCE, 0, 0, 0}, + { ASN1_INTEGER, 0, offsetof(private_rsa_private_key, version), 0}, + { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, n), 0}, + { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, e), 0}, + { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, d), 0}, + { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, p), 0}, + { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, q), 0}, + { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, exp1), 0}, + { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, exp2), 0}, + { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, coeff), 0}, + {ASN1_END, 0, 0, 0}, +};*/ + /** * Public exponent to use for key generation. */ @@ -57,6 +72,11 @@ struct private_rsa_private_key_t { rsa_private_key_t public; /** + * Version of key, as encoded in PKCS#1 + */ + u_int version; + + /** * Is the key already set ? */ bool is_key_set; |