[Swan-commit] Changes to ref refs/heads/master

2018-01-18 Thread Paul Wouters
New commits: commit 73999c66459f76fb66b0bfd006d458cfc7a6378c Author: Paul Wouters Date: Fri Jan 19 00:19:10 2018 -0500 testing: minor fixup mobike interop tests commit fbbaf9e0bd52e5544d98e7034364774e046e Author: Paul Wouters Date: Thu Jan

Re: [Swan] What ways're possible for bringing a VTI up?

2018-01-18 Thread Paul Wouters
On Thu, 18 Jan 2018, Alex K. wrote: What are the possible ways to bring a Libreswan VTI up? Let me elaborate the situation a little bit - I have a Libreswan 3.21 compiled from sources on Debian Stretch as. Anyhow, I have a basic VTI setup according to the example on Libreswan website. Using

Re: [Swan] Opportunistic encryption with IPSec transport mode

2018-01-18 Thread Paul Wouters
On Fri, 19 Jan 2018, Kenneth Jackson wrote: Suppose I have a set of hosts and I want to leverage Paul’s opportunistic encryption pattern, but I would prefer to use IPSec transport mode (type=transport) instead of tunnel mode so that my IP headers are unaltered. 1. Will the pattern still

[Swan] What ways're possible for bringing a VTI up?

2018-01-18 Thread Alex K.
Hello everyone, What are the possible ways to bring a Libreswan VTI up? Let me elaborate the situation a little bit - I have a Libreswan 3.21 compiled from sources on Debian Stretch as. Anyhow, I have a basic VTI setup according to the example on Libreswan website. On system startup, everything

[Swan] Opportunistic encryption with IPSec transport mode

2018-01-18 Thread Kenneth Jackson
Suppose I have a set of hosts and I want to leverage Paul’s opportunistic encryption pattern, but I would prefer to use IPSec transport mode (type=transport) instead of tunnel mode so that my IP

[Swan-commit] Changes to ref refs/heads/master

2018-01-18 Thread Paul Wouters
New commits: commit e33cd8a7bd09dc4471fe7f82cb0a84efda1791b9 Author: Paul Wouters Date: Thu Jan 18 17:09:57 2018 -0500 testing: added netkey-nopmtudisc-01 commit bb18aeec9a54b0fd91fed2333cb048d1d2f01f81 Author: Paul Wouters Date: Thu Jan 18

[Swan-commit] Changes to ref refs/heads/master

2018-01-18 Thread Paul Wouters
New commits: commit b08c1cd55307bd3ff21d7451378b054680db7829 Author: Paul Wouters Date: Thu Jan 18 16:40:52 2018 -0500 XFRM: Add support for nopmtudisc=yes|no (default no) ___ Swan-commit mailing list

[Swan-commit] Changes to ref refs/heads/master

2018-01-18 Thread Paul Wouters
New commits: commit e88bfd0df226086d9e0f51a7659f14e5152e03a1 Author: Vukasin Date: Thu Jan 18 16:17:13 2018 -0500 pluto: dump NO_PPK_AUTH octets in PRIVATE DBG only Signed-off-by: Paul Wouters

[Swan-commit] Changes to ref refs/heads/master

2018-01-18 Thread Andrew Cagney
New commits: commit 893f9169f44df216ec41b978a1c6e14310e4f7d4 Author: Andrew Cagney Date: Wed Jan 17 15:47:14 2018 -0500 crypto: don't save/restore globals reply_stream/reply_buffer across offloaded crypto calls Follow-up 59ab2fc9afbe07a574f25f9a1522fbeae3b3fe6e

[Swan-commit] Changes to ref refs/heads/master

2018-01-18 Thread Andrew Cagney
New commits: commit bc0e6fb94491bd368359f7765a161e472c6074a2 Author: Andrew Cagney Date: Thu Jan 18 10:14:15 2018 -0500 testing: expect state prefix in retransmit response log messages Follow-up d5dfee4ded8fb06951376ab38947f94387cbda79

[Swan-commit] Changes to ref refs/heads/master

2018-01-18 Thread Andrew Cagney
New commits: commit d5dfee4ded8fb06951376ab38947f94387cbda79 Author: Andrew Cagney Date: Wed Jan 17 16:06:07 2018 -0500 ikev1: wrap duplicate packet code in {push,pop}_cur_state() Was't being set so logging would instead use cur_from as the prefix.

[Swan-commit] Changes to ref refs/heads/master

2018-01-18 Thread Andrew Cagney
New commits: commit 59ab2fc9afbe07a574f25f9a1522fbeae3b3fe6e Author: Andrew Cagney Date: Wed Jan 3 14:25:07 2018 -0500 demux: eliminate 'global' struct msg_digest .rbody; use a stack variable The field .rbody, along with save/restored globals reply_buffer and