diff options
author | Martin Willi <martin@strongswan.org> | 2006-06-09 07:31:30 +0000 |
---|---|---|
committer | Martin Willi <martin@strongswan.org> | 2006-06-09 07:31:30 +0000 |
commit | 5c131a016b61f9f7b6d4249a0d6a84d0cc9f1c66 (patch) | |
tree | 99cf6b8aa6eb5cb4d158a57670d8defbe650abb5 /src/charon/sa/ike_sa.c | |
parent | b7f9ca5837bae541ed789d7a3e194a6347512232 (diff) | |
download | strongswan-5c131a016b61f9f7b6d4249a0d6a84d0cc9f1c66.tar.bz2 strongswan-5c131a016b61f9f7b6d4249a0d6a84d0cc9f1c66.tar.xz |
specifying keysize in bits, as it is required in IKEv2
added generic kernel SA algorithm handling, which brings us:
aes-128, aes-256, blowfish, des, 3des and null encryption for CHILD_SAs
Diffstat (limited to 'src/charon/sa/ike_sa.c')
-rw-r--r-- | src/charon/sa/ike_sa.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/charon/sa/ike_sa.c b/src/charon/sa/ike_sa.c index bc1871317..8dbca1982 100644 --- a/src/charon/sa/ike_sa.c +++ b/src/charon/sa/ike_sa.c @@ -486,8 +486,8 @@ static status_t build_transforms(private_ike_sa_t *this, proposal_t *proposal, d this->crypter_responder->destroy(this->crypter_responder); } - this->crypter_initiator = crypter_create(algo->algorithm, algo->key_size); - this->crypter_responder = crypter_create(algo->algorithm, algo->key_size); + this->crypter_initiator = crypter_create(algo->algorithm, algo->key_size / 8); + this->crypter_responder = crypter_create(algo->algorithm, algo->key_size / 8); if (this->crypter_initiator == NULL || this->crypter_responder == NULL) { this->logger->log(this->logger, ERROR|LEVEL1, |