aboutsummaryrefslogtreecommitdiffstats
path: root/Source/charon/transforms
diff options
context:
space:
mode:
Diffstat (limited to 'Source/charon/transforms')
-rw-r--r--Source/charon/transforms/diffie_hellman.h2
-rw-r--r--Source/charon/transforms/rsa/rsa_private_key.c20
2 files changed, 20 insertions, 2 deletions
diff --git a/Source/charon/transforms/diffie_hellman.h b/Source/charon/transforms/diffie_hellman.h
index 9a3608aea..48a165557 100644
--- a/Source/charon/transforms/diffie_hellman.h
+++ b/Source/charon/transforms/diffie_hellman.h
@@ -35,8 +35,6 @@ typedef enum diffie_hellman_group_t diffie_hellman_group_t;
*
* See IKEv2 RFC 3.3.2 and RFC 3526.
*
- * @warning Use of big modulus sizes can be cpu consuming.
- *
* @ingroup transforms
*/
enum diffie_hellman_group_t {
diff --git a/Source/charon/transforms/rsa/rsa_private_key.c b/Source/charon/transforms/rsa/rsa_private_key.c
index f6522ab17..34a217c6a 100644
--- a/Source/charon/transforms/rsa/rsa_private_key.c
+++ b/Source/charon/transforms/rsa/rsa_private_key.c
@@ -39,6 +39,21 @@ extern u_int8_t sha256_oid[19];
extern u_int8_t sha384_oid[19];
extern u_int8_t sha512_oid[19];
+/*
+asn1_module_t rsa_private_key_module = {
+ {ASN1_SEQUENCE, 0, 0, 0},
+ { ASN1_INTEGER, 0, offsetof(private_rsa_private_key, version), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, n), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, e), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, d), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, p), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, q), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, exp1), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, exp2), 0},
+ { ASN1_INTEGER, ASN1_MPZ, offsetof(private_rsa_private_key, coeff), 0},
+ {ASN1_END, 0, 0, 0},
+};*/
+
/**
* Public exponent to use for key generation.
*/
@@ -57,6 +72,11 @@ struct private_rsa_private_key_t {
rsa_private_key_t public;
/**
+ * Version of key, as encoded in PKCS#1
+ */
+ u_int version;
+
+ /**
* Is the key already set ?
*/
bool is_key_set;