]> www.infradead.org Git - users/dwmw2/openconnect.git/commit
fix DTLS_OVERHEAD and GlobalProtect ESP overhead calculation
authorDaniel Lenski <dlenski@gmail.com>
Tue, 15 Aug 2017 18:42:58 +0000 (11:42 -0700)
committerDavid Woodhouse <dwmw2@infradead.org>
Tue, 15 Aug 2017 18:46:02 +0000 (19:46 +0100)
commit2e4a07028e6c9b6e0da29d7eac8b5631ebabf1e7
tree372510a12821c2753579f8e0e380209345d0e3b6
parent1f079924c1684da5958747e24a0e91a3ea12d702
fix DTLS_OVERHEAD and GlobalProtect ESP overhead calculation

GlobalProtect doesn't try to calculate MTU until after it has information on
the ESP ciphersuite, so it can use the real HMAC/encryption key lengths when
calculating ESP overhead.  In practice, I have never seen or heard of a GP
VPN that uses anything other than AES128+SHA1, but both the clients and
servers appear to include support for AES256.

DTLS_OVERHEAD was not correctly accounting for possibility of AES256
(32-byte IV).

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
gpst.c
openconnect-internal.h