diff options
author | Martin Willi <martin@revosec.ch> | 2012-06-08 10:35:02 +0200 |
---|---|---|
committer | Martin Willi <martin@revosec.ch> | 2012-06-08 10:35:02 +0200 |
commit | 82ad53b776972782c39c2c49fe7cc040bd56f56f (patch) | |
tree | 8b52d5776a909606ba37024b7065d18cecf1bc87 /src/libhydra/plugins/kernel_pfkey/kernel_pfkey_ipsec.c | |
parent | 2d4c347af9ffe408ba252b1fa3b6c16583a4715c (diff) | |
download | strongswan-82ad53b776972782c39c2c49fe7cc040bd56f56f.tar.bz2 strongswan-82ad53b776972782c39c2c49fe7cc040bd56f56f.tar.xz |
Try to rekey without KE exchange if peer returns INVALID_KE_PAYLOAD(NONE)
According to RFC5996, implementations should just ignore the KE payload
if they select a non-PFS proposals. Some implementations don't, but
return MODP_NONE in INVALID_KE_PAYLOAD, hence we accept that, too.
Diffstat (limited to 'src/libhydra/plugins/kernel_pfkey/kernel_pfkey_ipsec.c')
0 files changed, 0 insertions, 0 deletions