return -EINVAL;
}
+ vpn_progress(vpninfo, PRG_INFO,
+ _("Trying to run TNCC/Host Checker Trojan script '%s'.\n"),
+ vpninfo->csd_wrapper);
+
#ifdef SOCK_CLOEXEC
if (socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0, sockfd))
#endif
return -EPERM;
}
-#ifndef __linux__
- vpn_progress(vpninfo, PRG_INFO,
- _("Trying to run Linux CSD trojan script.\n"));
-#endif
-
fname[0] = 0;
if (buflen) {
struct oc_vpn_option *opt;
close(fd);
}
+ vpn_progress(vpninfo, PRG_INFO,
+ _("Trying to run CSD Trojan script '%s'.\n"),
+ vpninfo->csd_wrapper ?: fname);
+
child = fork();
if (child == -1) {
goto out;
vpn_progress(vpninfo, PRG_ERR,
_("Authentication may fail. If your script is not returning zero, fix it.\n"
"Future versions of openconnect will abort on this error.\n"));
+ } else {
+ vpn_progress(vpninfo, PRG_INFO,
+ _("CSD script '%s' completed successfully.\n"),
+ vpninfo->csd_wrapper ?: fname);
}
free(vpninfo->urlpath);
result = -EINVAL;
goto out;
}
- }
+ } else
+ vpn_progress(vpninfo, PRG_INFO,
+ _("Fetched CSD stub for %s platform (size is %d bytes).\n"),
+ vpninfo->platname, buflen);
}
/* This is the CSD stub script, which we now need to run */
_("Error: Running the 'HIP Report' script on this platform is not yet implemented.\n"));
return -EPERM;
#else
+
+ vpn_progress(vpninfo, PRG_INFO,
+ _("Trying to run HIP Trojan script '%s'.\n"),
+ vpninfo->csd_wrapper);
+
#ifdef __linux__
if (pipe2(pipefd, O_CLOEXEC))
#endif
vpninfo->csd_wrapper, WEXITSTATUS(status));
ret = -EINVAL;
} else {
+ vpn_progress(vpninfo, PRG_INFO,
+ _("HIP script '%s' completed successfully (report is %d bytes).\n"),
+ vpninfo->csd_wrapper, report_buf->pos);
+
ret = check_or_submit_hip_report(vpninfo, report_buf->data);
if (ret < 0)
vpn_progress(vpninfo, PRG_ERR, _("HIP report submission failed.\n"));