platform/upstream/openconnect.git
13 years agoTag version 2.26 v2.26
David Woodhouse [Tue, 21 Sep 2010 23:05:36 +0000 (00:05 +0100)]
Tag version 2.26

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoUpdate changelog
David Woodhouse [Tue, 21 Sep 2010 22:58:36 +0000 (23:58 +0100)]
Update changelog

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoDon't crash on relative redirect when original urlpath was NULL
David Woodhouse [Fri, 3 Sep 2010 16:47:32 +0000 (17:47 +0100)]
Don't crash on relative redirect when original urlpath was NULL
Red Hat bug #629979

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoAndroid has /dev/tun, not /dev/net/tun
David Woodhouse [Thu, 2 Sep 2010 23:31:09 +0000 (00:31 +0100)]
Android has /dev/tun, not /dev/net/tun

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoUpdate changelog
David Woodhouse [Tue, 31 Aug 2010 23:52:43 +0000 (00:52 +0100)]
Update changelog

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoUpdate --script-tun description, remove non-existent --tun-fd from manpage.
David Woodhouse [Tue, 31 Aug 2010 23:52:15 +0000 (00:52 +0100)]
Update --script-tun description, remove non-existent --tun-fd from manpage.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoFix host selection in NM auth-dialog
David Woodhouse [Tue, 31 Aug 2010 23:19:23 +0000 (00:19 +0100)]
Fix host selection in NM auth-dialog

It wasn't actually clearing vpninfo->peer_addr, so we were always just
reconnecting to the first host, even when the user changed the selection.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoUse SSLv3 not TLSv1
David Woodhouse [Tue, 31 Aug 2010 16:58:04 +0000 (17:58 +0100)]
Use SSLv3 not TLSv1

There are servers (or firewalls) which apparently reject all connections with
any hello extensions. Seen with a Cisco VPN 3000.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoCheck certificate expiry and complain
David Woodhouse [Tue, 31 Aug 2010 16:57:18 +0000 (17:57 +0100)]
Check certificate expiry and complain

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoUpdate status of Debian OpenSSL DTLS support
Dominic Hargreaves [Sat, 28 Aug 2010 12:15:59 +0000 (13:15 +0100)]
Update status of Debian OpenSSL DTLS support

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoNever use protocol family prefixes with a TUN script.
Eric Barkie [Fri, 20 Aug 2010 18:44:57 +0000 (14:44 -0400)]
Never use protocol family prefixes with a TUN script.

Signed-off-by: Eric Barkie <ebarkie@us.ibm.com>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoClose existing connection and discard compressed packet in cstp_reconnect()
David Woodhouse [Thu, 12 Aug 2010 23:37:12 +0000 (00:37 +0100)]
Close existing connection and discard compressed packet in cstp_reconnect()

Both callers need to do this, so move it into the function.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoImplement DTLS and CSTP rekeying.
David Woodhouse [Wed, 11 Aug 2010 23:14:35 +0000 (00:14 +0100)]
Implement DTLS and CSTP rekeying.

Don't know if there's a way to pass a new DTLS master secret and get
back a new session-id over an existing CSTP connection; reconnecting the
CSTP works though. And is the way to rekey CSTP too, since SSL
renegotiation got deprecated (we never got round to doing it that way
either, anyway).

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoClean up option handling to use sane values for long-only options
David Woodhouse [Sat, 7 Aug 2010 18:06:37 +0000 (19:06 +0100)]
Clean up option handling to use sane values for long-only options

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoAdd --force-dpd option
David Woodhouse [Sat, 7 Aug 2010 17:50:40 +0000 (18:50 +0100)]
Add --force-dpd option

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
13 years agoElide webvpn cookie from debugging output.
David Woodhouse [Sat, 7 Aug 2010 09:20:55 +0000 (10:20 +0100)]
Elide webvpn cookie from debugging output.

Hopefully this should help to stop users from posting them to the
mailing list.

The check in Exim to add a warning header if it detects a cookie, and the
Mailman rule to trap messages with that header for moderation, should also
help.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate ConnMan references
David Woodhouse [Thu, 27 May 2010 09:58:49 +0000 (10:58 +0100)]
Update ConnMan references

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoLink to knetworkmanager bug for OpenConnect support
David Woodhouse [Thu, 27 May 2010 09:54:40 +0000 (10:54 +0100)]
Link to knetworkmanager bug for OpenConnect support

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoTag version 2.25 v2.25
David Woodhouse [Sat, 15 May 2010 08:23:37 +0000 (09:23 +0100)]
Tag version 2.25

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoCompare cert IP address with that of the server... not the proxy
David Woodhouse [Thu, 13 May 2010 09:45:12 +0000 (10:45 +0100)]
Compare cert IP address with that of the server... not the proxy

We mustn't use vpninfo->peer_addr when validating the server's
certificate, because that could be the address of the proxy if we're
using one. Use the result of running inet_pton() on the hostname instead.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoPrint UTF8 form of URI in messages, not raw form
David Woodhouse [Wed, 12 May 2010 21:15:50 +0000 (22:15 +0100)]
Print UTF8 form of URI in messages, not raw form

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoMake parse_url preserve its input string
David Woodhouse [Wed, 12 May 2010 21:10:29 +0000 (22:10 +0100)]
Make parse_url preserve its input string

It still screws with it as it parses it, but at least it puts it back now.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoDon't match URIs with a path component
David Woodhouse [Wed, 12 May 2010 21:04:01 +0000 (22:04 +0100)]
Don't match URIs with a path component

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoRemove stray debugging printf
David Woodhouse [Wed, 12 May 2010 21:02:16 +0000 (22:02 +0100)]
Remove stray debugging printf

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoRemove stray break which stopped processing altnames after the first GEN_DNS
David Woodhouse [Wed, 12 May 2010 20:28:15 +0000 (21:28 +0100)]
Remove stray break which stopped processing altnames after the first GEN_DNS

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUse ASN1_STRING_to_UTF8 for altnames
David Woodhouse [Wed, 12 May 2010 20:22:07 +0000 (21:22 +0100)]
Use ASN1_STRING_to_UTF8 for altnames

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix handling of GEN_URI altnames.
David Woodhouse [Wed, 12 May 2010 19:51:50 +0000 (20:51 +0100)]
Fix handling of GEN_URI altnames.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix memory leak on non-200 HTTP result
David Woodhouse [Wed, 12 May 2010 19:37:01 +0000 (20:37 +0100)]
Fix memory leak on non-200 HTTP result

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix handling of GEN_IPADD altnames.
David Woodhouse [Wed, 12 May 2010 18:09:34 +0000 (19:09 +0100)]
Fix handling of GEN_IPADD altnames.

In particular, the length of the altname wasn't the same as the length
of the corresponding sockaddr.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAccept GEN_IPADD certificate altneme for raw IPv6 address without [] too.
David Woodhouse [Wed, 12 May 2010 18:03:40 +0000 (19:03 +0100)]
Accept GEN_IPADD certificate altneme for raw IPv6 address without [] too.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoHandle wildcards in hostname matching
David Woodhouse [Wed, 12 May 2010 14:25:46 +0000 (15:25 +0100)]
Handle wildcards in hostname matching

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAttempt to handle GEN_IPADD in X509 altnames. Or at least not crash.
David Woodhouse [Wed, 12 May 2010 11:39:23 +0000 (12:39 +0100)]
Attempt to handle GEN_IPADD in X509 altnames. Or at least not crash.

In particular, stop assuming that every altname is an ASN1_STRING and
using strlen() on what would be its data. If the untested support for
GEN_IPADD actually works, that's an added bonus.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAdd --no-cert-check option, update changelog
David Woodhouse [Tue, 11 May 2010 12:44:14 +0000 (13:44 +0100)]
Add --no-cert-check option, update changelog

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAdd basic cert hostname matching
David Woodhouse [Tue, 11 May 2010 11:17:57 +0000 (12:17 +0100)]
Add basic cert hostname matching

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAdd text-mode function for validating failed certs
David Woodhouse [Tue, 11 May 2010 10:59:40 +0000 (11:59 +0100)]
Add text-mode function for validating failed certs

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoPass failure reason to validate_peer_cert()
David Woodhouse [Tue, 11 May 2010 10:19:46 +0000 (11:19 +0100)]
Pass failure reason to validate_peer_cert()

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAlways verify server certificate, even with no cafile
David Woodhouse [Tue, 11 May 2010 10:14:41 +0000 (11:14 +0100)]
Always verify server certificate, even with no cafile

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoClean up PKCS12_parse() bug workaround
David Woodhouse [Tue, 11 May 2010 09:42:47 +0000 (10:42 +0100)]
Clean up PKCS12_parse() bug workaround

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix potential memory leak in load_pkcs12_certificate()
David Woodhouse [Mon, 10 May 2010 14:05:05 +0000 (15:05 +0100)]
Fix potential memory leak in load_pkcs12_certificate()

If there were certificates in the PKCS#12 file which didn't get used, they
would never be freed. Increase the refcount on the certs we _do_ use, and
then free the entire stack properly using sk_X509_pop_free().

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix memory leak in verify_peer()
David Woodhouse [Mon, 10 May 2010 14:04:50 +0000 (15:04 +0100)]
Fix memory leak in verify_peer()

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoPackages now in pkgsrc-wip
David Woodhouse [Sun, 9 May 2010 11:45:16 +0000 (12:45 +0100)]
Packages now in pkgsrc-wip

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate changelog, improve requirements documentation
David Woodhouse [Sun, 9 May 2010 00:46:53 +0000 (01:46 +0100)]
Update changelog, improve requirements documentation

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate README.DTLS to reflect current OpenSSL versions
David Woodhouse [Sun, 9 May 2010 00:45:45 +0000 (01:45 +0100)]
Update README.DTLS to reflect current OpenSSL versions

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix libproxy support with pkgsrc
Pouya D. Tafti [Sat, 8 May 2010 20:33:23 +0000 (21:33 +0100)]
Fix libproxy support with pkgsrc

While preparing the new package I noticed that OpenConnect
was being built without libproxy support, due to the fact that
pkgsrc's libproxy installs proxy.h under ${PREFIX}/include and not
under ${PREFIX}/include/libproxy.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
Signed-off-by: Pouya D. Tafti <p@san-serriffe.org>
14 years agoMake Solaris build more user-friendly w.r.t. installing TAP driver.
David Woodhouse [Sat, 8 May 2010 19:14:51 +0000 (20:14 +0100)]
Make Solaris build more user-friendly w.r.t. installing TAP driver.

Tell the user what to do if the TAP driver is missing, and don't rely on them
removing Make.config so that the Makefile goes looking for it again.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoTag version 2.24 v2.24
David Woodhouse [Fri, 7 May 2010 19:11:44 +0000 (20:11 +0100)]
Tag version 2.24

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate to more permanent URL for pkgsrc package
David Woodhouse [Fri, 7 May 2010 19:10:09 +0000 (20:10 +0100)]
Update to more permanent URL for pkgsrc package

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoPointer to pkgsrc package
David Woodhouse [Fri, 7 May 2010 17:58:32 +0000 (18:58 +0100)]
Pointer to pkgsrc package

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoDocument Ubuntu status
David Woodhouse [Fri, 7 May 2010 17:23:35 +0000 (18:23 +0100)]
Document Ubuntu status

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoCreate libopenconnect.a for GUI authentication dialogs to use.
David Woodhouse [Fri, 7 May 2010 16:53:07 +0000 (17:53 +0100)]
Create libopenconnect.a for GUI authentication dialogs to use.

Now that things have stabilised, it ought to be feasible for us to put
the NetworkManager auth-dialog in the network-manager-openconnect
package where it belongs. Knetworkmanager support for openconnect will need
to use it too.

A static library is the first step; ideally we'll be able to do a sane
dynamic library with a reasonable stable ABI and no namespace pollution.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoWork around OpenSSL SEGV when retrying PKCS#12 passphrase
David Woodhouse [Fri, 7 May 2010 15:22:36 +0000 (16:22 +0100)]
Work around OpenSSL SEGV when retrying PKCS#12 passphrase

This seems to have been fixed in OpenSSL 1.0.0-beta2 by
http://cvs.openssl.org/chngview?cn=17957 but still affects 0.9.8n.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAdd DragonFly BSD too
David Woodhouse [Fri, 7 May 2010 12:21:20 +0000 (13:21 +0100)]
Add DragonFly BSD too

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoDocument NetBSD support
David Woodhouse [Fri, 7 May 2010 11:44:30 +0000 (12:44 +0100)]
Document NetBSD support

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix NetBSD build.
David Woodhouse [Fri, 7 May 2010 11:36:15 +0000 (12:36 +0100)]
Fix NetBSD build.

We need to include <netinet/in.h>, so do that unconditionally. And let
NetBSD use the Solaris code path for fsid handling.

Based on a patch from Pouya D. Tafti.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoRemove gratuitous -ldl from static OpenSSL link command
David Woodhouse [Fri, 7 May 2010 11:34:15 +0000 (12:34 +0100)]
Remove gratuitous -ldl from static OpenSSL link command

NetBSD doesn't like it.

Also remove the -lz and add an explicit -lz to LDFLAGS. We use that
directly, so we shouldn't be relying on getting it pulled in indirectly.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoChange OpenSSL version number check for const methods to 0.9.9
David Woodhouse [Fri, 7 May 2010 11:30:01 +0000 (12:30 +0100)]
Change OpenSSL version number check for const methods to 0.9.9

NetBSD 5.0 ships with an old pre-1.0 snapshot of OpenSSL, which has the
const methods already.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate hardware support list
David Woodhouse [Mon, 19 Apr 2010 15:34:30 +0000 (16:34 +0100)]
Update hardware support list

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoMake some functions static
David Woodhouse [Fri, 16 Apr 2010 09:50:23 +0000 (10:50 +0100)]
Make some functions static

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate TODO list to reflect current status
David Woodhouse [Thu, 15 Apr 2010 10:13:12 +0000 (11:13 +0100)]
Update TODO list to reflect current status

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoImprove handling of cert passphrase errors
David Woodhouse [Wed, 14 Apr 2010 13:23:47 +0000 (14:23 +0100)]
Improve handling of cert passphrase errors

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix purpose workaround to build against OpenSSL 0.9.7
David Woodhouse [Wed, 14 Apr 2010 13:15:23 +0000 (14:15 +0100)]
Fix purpose workaround to build against OpenSSL 0.9.7

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoMove unhex() out of DTLS ifdef, to build with OpenSSL 0.9.7 again
David Woodhouse [Wed, 14 Apr 2010 13:13:17 +0000 (14:13 +0100)]
Move unhex() out of DTLS ifdef, to build with OpenSSL 0.9.7 again

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoInclude ctype.h for isxdigit()
David Woodhouse [Wed, 14 Apr 2010 12:58:22 +0000 (13:58 +0100)]
Include ctype.h for isxdigit()

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoForget preconfigured password after one attempt; don't keep retrying.
David Woodhouse [Tue, 13 Apr 2010 08:10:30 +0000 (09:10 +0100)]
Forget preconfigured password after one attempt; don't keep retrying.

Without this, we were seeing infinite retries to post the auth form, when
the password was wrong or the required certificate was absent.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUse X-CSTP-Banner header to set $CISCO_BANNER
David Woodhouse [Sun, 11 Apr 2010 16:39:59 +0000 (17:39 +0100)]
Use X-CSTP-Banner header to set $CISCO_BANNER

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoTag version 2.23 v2.23
David Woodhouse [Fri, 9 Apr 2010 09:55:06 +0000 (10:55 +0100)]
Tag version 2.23

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate changelog
David Woodhouse [Fri, 9 Apr 2010 09:45:44 +0000 (10:45 +0100)]
Update changelog

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAdd --no-http-keepalive option to help work around Cisco incompetence.
David Woodhouse [Fri, 9 Apr 2010 09:29:10 +0000 (10:29 +0100)]
Add --no-http-keepalive option to help work around Cisco incompetence.

We know that certain versions of the ASA software (8.2.2.5 at least) are
buggy and will 'forget' the client's SSL certificate by the time they
receive the second request on a re-used HTTP connection. We have an
unconditional workaround for the case where we _know_ that bug will
trip, in commit 357c85e8 ("Always close HTTP/1.0 connection...").

Cisco's support staff are completely useless and have failed to give any
competent response to the bug report -- so not only does it look like
they won't fix it, but we don't actually know what under _other_
circumstances this same bug might manifest itself.

This patch adds an option to disable _all_ connection re-use. The
intention is that users can try it out if they encounter problems, then
report to the mailing list that it worked so that we can work out how
to trigger it automatically.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix Debian/kFreeBSD build
David Woodhouse [Fri, 9 Apr 2010 09:00:45 +0000 (10:00 +0100)]
Fix Debian/kFreeBSD build

Debian bug #577004

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate instructions to note that script must be executable
David Woodhouse [Tue, 6 Apr 2010 19:10:37 +0000 (20:10 +0100)]
Update instructions to note that script must be executable

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoPrint notice about lack of DNS and routing if no --script
David Woodhouse [Mon, 5 Apr 2010 10:19:48 +0000 (11:19 +0100)]
Print notice about lack of DNS and routing if no --script

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoChange mainloop idle message to look less like 'Did not work'
David Woodhouse [Mon, 5 Apr 2010 09:07:42 +0000 (10:07 +0100)]
Change mainloop idle message to look less like 'Did not work'

That can cause confusion if it's misread.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoPrint failing host name when getaddrinfo() fails
David Woodhouse [Sun, 4 Apr 2010 23:08:21 +0000 (00:08 +0100)]
Print failing host name when getaddrinfo() fails

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoPrint non-200 HTTP responses even without -v
David Woodhouse [Sun, 4 Apr 2010 22:58:00 +0000 (23:58 +0100)]
Print non-200 HTTP responses even without -v

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix SEGV on 404
David Woodhouse [Sun, 4 Apr 2010 18:52:19 +0000 (19:52 +0100)]
Fix SEGV on 404

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoCope with server certs without SSL_SERVER purpose bit set, with old OpenSSL
David Woodhouse [Mon, 29 Mar 2010 09:17:30 +0000 (10:17 +0100)]
Cope with server certs without SSL_SERVER purpose bit set, with old OpenSSL

We already had a workaround, but it didn't work with OpenSSL < 0.9.8k so
we need to do it differently, by providing our own wrapper around
X509_verify_cert().

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoNote DTLS support in 0.9.8m release
David Woodhouse [Wed, 24 Mar 2010 20:59:45 +0000 (20:59 +0000)]
Note DTLS support in 0.9.8m release

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate changelog
David Woodhouse [Thu, 18 Mar 2010 15:58:33 +0000 (15:58 +0000)]
Update changelog

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoReturn error on refusing to run CSD trojan, rather than exiting
David Woodhouse [Thu, 11 Mar 2010 18:38:55 +0000 (10:38 -0800)]
Return error on refusing to run CSD trojan, rather than exiting

This fixes the error handling in the NM auth dialog. Fix the message so that
it doesn't refer to the command-line option, too.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAdd CSD support for NetworkManager auth dialog
David Woodhouse [Thu, 11 Mar 2010 18:04:00 +0000 (10:04 -0800)]
Add CSD support for NetworkManager auth dialog

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoHandle proxy setting in NetworkManager, ignore unnecessary 'authtype'
David Woodhouse [Tue, 9 Mar 2010 00:50:50 +0000 (16:50 -0800)]
Handle proxy setting in NetworkManager, ignore unnecessary 'authtype'

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoTag version 2.22 v2.22
David Woodhouse [Sun, 7 Mar 2010 22:10:55 +0000 (14:10 -0800)]
Tag version 2.22

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate changelog
David Woodhouse [Sun, 7 Mar 2010 21:34:08 +0000 (13:34 -0800)]
Update changelog

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAlways close HTTP/1.0 connection, even after Connection: Keep-Alive header.
David Woodhouse [Sun, 28 Feb 2010 22:39:05 +0000 (23:39 +0100)]
Always close HTTP/1.0 connection, even after Connection: Keep-Alive header.

Some servers seem to fail certificate authentication after the initial
redirect unless you make a new connection. I see no valid reason in the
HTTP spec why we should do this, but it makes things work...

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAvoid using vpninfo->ifname before it's set.
Jørgen Wahlberg [Sat, 27 Feb 2010 13:56:09 +0000 (14:56 +0100)]
Avoid using vpninfo->ifname before it's set.

Commit 78e461ce2d74d7772578a07785fd96c7b784efae ("Set script environment
earlier...") was broken because we end up trying to set the $TUNDEV
environment variable before vpninfo->ifname has actually been set.

[dwmw2: slightly modified Jørgen's original patch so that we do actually
 set $TUNDEV later, otherwise the script won't work.]

Signed-off-by: Jørgen Wahlberg <jorgen@jaws.no>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoSet script environment earlier, so it applies to script_tun too
David Woodhouse [Wed, 24 Feb 2010 12:43:20 +0000 (12:43 +0000)]
Set script environment earlier, so it applies to script_tun too

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix build where AI_NUMERICSERV isn't defined (OSX < 1.6)
David Woodhouse [Tue, 23 Feb 2010 14:03:18 +0000 (14:03 +0000)]
Fix build where AI_NUMERICSERV isn't defined (OSX < 1.6)

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUpdate changelog
David Woodhouse [Tue, 23 Feb 2010 13:51:43 +0000 (13:51 +0000)]
Update changelog

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoPass port number to openconnect from NetworkManager.
David Woodhouse [Tue, 23 Feb 2010 13:48:38 +0000 (13:48 +0000)]
Pass port number to openconnect from NetworkManager.

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAccept full urls in nm-auth-dialog
Jussi Kukkonen [Tue, 23 Feb 2010 09:26:58 +0000 (11:26 +0200)]
Accept full urls in nm-auth-dialog

E.g. "<host>:<port>" will now work.

Signed-off-by: Jussi Kukkonen <jku@linux.intel.com>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix handling of port numbers above 9999
David Woodhouse [Mon, 22 Feb 2010 14:44:49 +0000 (14:44 +0000)]
Fix handling of port numbers above 9999

We need to allow 5 digits in the port number, which means 6 characters
including the terminating NUL. The buffer was already big enough, but
the length argument to snprintf() wasn't. Spotted by Charles Bovy (thanks).

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoHandle relative redirect and form action
David Woodhouse [Mon, 22 Feb 2010 14:43:30 +0000 (14:43 +0000)]
Handle relative redirect and form action

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoHandle allocation failure in HTTP 1.0 loop
David Woodhouse [Mon, 22 Feb 2010 14:09:25 +0000 (14:09 +0000)]
Handle allocation failure in HTTP 1.0 loop

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoAllocate extra byte for NUL termination after HTTP 1.0 read loop, not in it.
Adam Piątyszek [Fri, 12 Feb 2010 21:48:08 +0000 (22:48 +0100)]
Allocate extra byte for NUL termination after HTTP 1.0 read loop, not in it.

Signed-off-by: Adam Piątyszek <ediap@users.sourceforge.net>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFree dynamically allocated memory before returning on errors
Adam Piątyszek [Fri, 12 Feb 2010 21:45:19 +0000 (22:45 +0100)]
Free dynamically allocated memory before returning on errors

Signed-off-by: Adam Piątyszek <ediap@users.sourceforge.net>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoUse the somewhat misnamed proxy_write() function to write the CSD script
Adam Piątyszek [Fri, 12 Feb 2010 14:26:19 +0000 (15:26 +0100)]
Use the somewhat misnamed proxy_write() function to write the CSD script

Signed-off-by: Adam Piątyszek <ediap@users.sourceforge.net>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoDynamically allocate buffer size for downloaded CSD script
Adam Piątyszek [Fri, 12 Feb 2010 14:25:40 +0000 (15:25 +0100)]
Dynamically allocate buffer size for downloaded CSD script

Thanks to David for his help in rewriting this patch and to actually
make it work.

Signed-off-by: Adam Piątyszek <ediap@users.sourceforge.net>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoCase-insensitive comparison for server SHA1 fingerprint
David Woodhouse [Wed, 3 Feb 2010 07:11:27 +0000 (07:11 +0000)]
Case-insensitive comparison for server SHA1 fingerprint

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoFix exit code with --background option
David Woodhouse [Wed, 3 Feb 2010 06:19:34 +0000 (06:19 +0000)]
Fix exit code with --background option

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
14 years agoNo strndup() on Solaris. Yay Solaris!
David Woodhouse [Sun, 24 Jan 2010 19:30:15 +0000 (08:30 +1300)]
No strndup() on Solaris. Yay Solaris!

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>