]> www.infradead.org Git - users/dwmw2/openconnect.git/commit
fix DTLS_OVERHEAD and GlobalProtect ESP overhead calculation
authorDaniel Lenski <dlenski@gmail.com>
Tue, 15 Aug 2017 18:42:58 +0000 (11:42 -0700)
committerDavid Woodhouse <dwmw2@infradead.org>
Tue, 27 Feb 2018 15:27:03 +0000 (16:27 +0100)
commit1e64f931c1cc1575a61ceac4552bdb30c28c0558
treedd48f910ffc548f0cfa112592ac747a04181cde7
parent913c0c322145032f858dfed1f459be1da52c0517
fix DTLS_OVERHEAD and GlobalProtect ESP overhead calculation

GlobalProtect doesn't try to calculate MTU until after it has information on
the ESP ciphersuite, so it can use the real HMAC/encryption key lengths when
calculating ESP overhead.  In practice, I have never seen or heard of a GP
VPN that uses anything other than AES128+SHA1, but both the clients and
servers appear to include support for AES256.

DTLS_OVERHEAD was not correctly accounting for possibility of AES256
(32-byte IV).

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
gpst.c
openconnect-internal.h