strongswan/conf
Tobias Brunner ce048c30ff ha: Double receive buffer size for HA messages and make it configurable
With IKEv1 we transmit both public DH factors (used to derive the initial
IV) besides the shared secret.  So these messages could get significantly
larger than 1024 bytes, depending on the DH group (modp2048 just about
fits into it).  The new default of 2048 bytes should be fine up to modp4096
and for larger groups the buffer size may be increased (an error is
logged should this happen).
2018-02-14 14:52:18 +01:00
..
options Fixed some typos, courtesy of codespell 2018-02-13 12:19:54 +01:00
plugins ha: Double receive buffer size for HA messages and make it configurable 2018-02-14 14:52:18 +01:00
.gitignore conf: Ignore generated strongswan.conf.5.main 2014-02-18 10:08:54 +01:00
Makefile.am The pacman tool got replaced by the sec-updater tool 2017-11-15 12:18:17 +01:00
default.opt conf: Generate and install config sippets for option descriptions 2014-02-12 14:34:33 +01:00
format-options.py conf: Match more characters in _ and ** 2017-08-07 14:22:27 +02:00
strongswan.conf conf: Generate and install config sippets for option descriptions 2014-02-12 14:34:33 +01:00
strongswan.conf.5.head.in conf: Split strongswan.conf(5) man page and use generated snippet 2014-02-12 14:34:33 +01:00
strongswan.conf.5.tail.in ike: Use optional jitter to calculate retransmission timeouts 2017-05-23 18:02:15 +02:00