Your patch has been applied to the master branch.

I have fixed a few misspellings in the commit message and reformatted
it slightly (git am wraps too long lines, resulting in funny output).

Code lightly tested (t_client) and stared-at-it a bit.

The algorithm is not very smart on the client side (yet), so if you put
100x the same client cipher on the command line, it will send exactly this
as IV_CIPHERS= to the remote side.  Not understanding the TLS handshake
bits well enough, I'm not sure what is happening but the string does
get capped after about 300 characters.  So, no ill effects, except an
incomplete string (5/5 will improve that).

commit 5bb71ab599a6c382b6bdc9e9cb449d11d64353b8
Author: Arne Schwabe
Date:   Mon Feb 17 15:43:37 2020 +0100

     Implement dynamic NCP negotiation

     Signed-off-by: Arne Schwabe <a...@rfc2549.org>
     Acked-by: Lev Stipakov <lstipa...@gmail.com>
     Message-Id: <20200217144339.3273-4-a...@rfc2549.org>
     URL: 
https://www.mail-archive.com/search?l=mid&q=20200217144339.3273-4-a...@rfc2549.org
     Signed-off-by: Gert Doering <g...@greenie.muc.de>


--
kind regards,

Gert Doering



_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to