Signed-off-by: Richard Bonhomme
---
doc/man-sections/windows-options.rst | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/doc/man-sections/windows-options.rst
b/doc/man-sections/windows-options.rst
index 5ae7116c..72424d6b 100644
--- a/doc/man-sections/windows-options.rst
On Mon, 2020-06-29 at 19:51 +0200, Gert Doering wrote:
> The rules to generate $(builddir)/openssl.cnf from
> $(srcdir)/openssl.cnf.in only worked for GNU Make. BSD make needs
> the rules more explicit, and the target must not have a directory
> specification (fixes commit 542c69c37).
This defini
hi,
On 30/06/20 16:11, Gert Doering wrote:
Hi,
On Tue, Jun 30, 2020 at 04:07:52PM +0200, Jan Just Keijser wrote:
@@ -5697,6 +5740,11 @@ build_dhcp_options_string(struct buffer *buf, const
struct tuntap_options *o)
write_dhcp_u32_array(buf, 42, (uint32_t *)o->ntp, o->ntp_len, &error);
Hi,
On Tue, Jun 30, 2020 at 04:07:52PM +0200, Jan Just Keijser wrote:
> @@ -5697,6 +5740,11 @@ build_dhcp_options_string(struct buffer *buf, const
> struct tuntap_options *o)
> write_dhcp_u32_array(buf, 42, (uint32_t *)o->ntp, o->ntp_len, &error);
> write_dhcp_u32_array(buf, 45, (uint32
Hi,
On 24/06/20 12:28, Gert Doering wrote:
Hi,
On Tue, Jun 23, 2020 at 03:53:52PM -0400, Selva Nair wrote:
So what option do we want?
--dhcp-option SEARCH
--dhcp-option DOMAIN-SEARCH
--dhcp-option SEARCH-DOMAIN
RFC 3397 calls it "Domain Search" so it has to be DOMAIN-SEARCH, in my
view. Pla
that makes sense. I updated the patch.
Christopher
---
src/openvpn/tun.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c
index 5567c445..2a2df27f 100644
--- a/src/openvpn/tun.c
+++ b/src/openvpn/tun.c
@@ -5525,7 +5525,7 @@ windows_set_mtu(
On 22-06-2020 19:59, David Sommerseth wrote:
> On 22/06/2020 14:43, Steffan Karger wrote:
>> On 22-06-2020 14:29, David Sommerseth wrote:
>>> On 22/06/2020 14:21, Arne Schwabe wrote:
> PrivateTmp=true
> WorkingDirectory=/etc/openvpn/server
> -ExecStart=@sbindir@/openvpn --status
Hi,
On 22-06-2020 16:01, Arne Schwabe wrote:
> Am 22.06.20 um 14:43 schrieb Steffan Karger:
>> Maybe these should be the steps:
>>
>> 2.4: Use to AES-256-GCM when available (basically what NCP did)
>> 2.5: Switch to AES-256-GCM as the default cipher (but allow overriding)
>> 2.6: Remove support fo
Acked-by: Gert Doering
Stared-at-code, looks good. Test build on ubuntu/mingw, passes.
I have not actually tested that it prints the warnings when expected,
but the code looks good and the change is simple enough :-)
Your patch has been applied to the master branch.
commit 93439307e597007e0d6