Add IPsec ESP transport support, packet print debug functions, and misc cleanup.#4
Open
philljj wants to merge 4 commits intowolfSSL:masterfrom
Open
Add IPsec ESP transport support, packet print debug functions, and misc cleanup.#4philljj wants to merge 4 commits intowolfSSL:masterfrom
philljj wants to merge 4 commits intowolfSSL:masterfrom
Conversation
bffa3c2 to
2746fc1
Compare
2746fc1 to
3d47370
Compare
af88689 to
85e2802
Compare
562fc2e to
5b92271
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
esp_sa.txtconfig totools/ip-xfrm/.DHCP_OPT_data_to_u32(),DHCP_OPT_u32_to_data()to trim duplicated code.error: initializer-string for array), etc.packet print functions
Added packet print functions
wolfIP_print_X()foreth,ip,esp:Testing
Added
test_esp.c:Added github workflow that tests aes-gcm and aes-cbc + hmac auth:
rfc4106 gcm example
Setup ip xfrm state/policy with:
then run:
cbc hmac auth example
Set ip xfrm state / policy with script:
test-esp output with debug flags
-DDEBUG_IP -DWOLFIP_DEBUG_ESP: