Hi,

On Mon, Mar 18, 2013 at 05:37:31PM +0100, steffan.kar...@fox-it.com wrote:
> --- a/src/openvpn/options.c
> +++ b/src/openvpn/options.c
> @@ -6223,7 +6223,7 @@ add_option (struct options *options,
>      {
>        VERIFY_PERMISSION (OPT_P_CRYPTO);
>        options->ciphername_defined = true;
> -      options->ciphername = p[1];
> +      options->ciphername = translate_cipher_name(p[1]);
>        if (streq (options->ciphername, "none"))
>       {
>         options->ciphername_defined = false;

Uh.  NAK, unfortunately, because while this should work for the actual
cipher translation, it fails OCC...

Tue Mar 19 15:45:01 2013 WARNING: 'cipher' is used inconsistently, 
local='cipher BLOWFISH-CBC', remote='cipher BF-CBC'

... incidentially, OCC also gives a hint why the interop test failed...

Tue Mar 19 15:45:01 2013 WARNING: 'keysize' is used inconsistently, 
local='keysize 32', remote='keysize 128'
Tue Mar 19 15:45:01 2013 Data Channel Encrypt: Cipher 'BLOWFISH-CBC' 
initialized with 32 bit key

"wut?"

gert
-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: pgpjD9HHHBHkY.pgp
Description: PGP signature

Reply via email to