commit | 868bdd798190a689ddebf1fff7c41509e73c7cc0 | [log] [tgz] |
---|---|---|
author | Jason A. Donenfeld <Jason@zx2c4.com> | Wed Jun 12 15:05:50 2019 +0200 |
committer | Jason A. Donenfeld <Jason@zx2c4.com> | Tue Jun 25 16:42:42 2019 +0200 |
tree | eda7b6e3f06ea2e5ae20c175944a433231681b4c | |
parent | 07b71d592d4c172f3311e91a36b65e98cae68198 [diff] |
global: switch to coarse ktime Coarse ktime is broken until [1] in 5.2 and kernels without the backport, so we use fallback code there. The fallback code has also been improved significantly. It now only uses slower clocks on kernels < 3.17, at the expense of some accuracy we're not overly concerned about. [1] https://lore.kernel.org/lkml/tip-e3ff9c3678b4d80e22d2557b68726174578eaf52@git.kernel.org/ Suggested-by: Arnd Bergmann <arnd@arndb.de> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.
More information may be found at WireGuard.com.
This project is released under the GPLv2.