]> www.infradead.org Git - users/dwmw2/openconnect.git/log
users/dwmw2/openconnect.git
8 years agoMerge branch 'globalprotect' of https://github.com/dlenski/openconnect gp
David Woodhouse [Sun, 14 May 2017 07:17:51 +0000 (08:17 +0100)]
Merge branch 'globalprotect' of https://github.com/dlenski/openconnect

8 years agoFix build with LibreSSL 2.5.1 and higher.
Piotr Kubaj [Fri, 12 May 2017 13:24:37 +0000 (14:24 +0100)]
Fix build with LibreSSL 2.5.1 and higher.

We don't actually care if we use the read or write state; we're only
calculating the cipher/protocol overheads which are the same in both
directions.

In LibreSSL they were all removed in
https://github.com/libressl-portable/openbsd/commit/122ecd906da7
and the read side was restored in
https://github.com/libressl-portable/openbsd/commit/0d7a7d5f5a44
so just use that.

Signed-off-by: Piotr Kubaj <pkubaj@anongoth.pl>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoNUL-terminate gai->value for OPT_RESOLVE, fix out-of-bound read
Youfu Zhang [Tue, 2 May 2017 05:31:35 +0000 (13:31 +0800)]
NUL-terminate gai->value for OPT_RESOLVE, fix out-of-bound read

Signed-off-by: Youfu Zhang <zhangyoufu@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agochange README to refer to in-repo doc
Daniel Lenski [Tue, 9 May 2017 18:23:06 +0000 (11:23 -0700)]
change README to refer to in-repo doc

8 years agoMerge branch 'gist' into globalprotect
Daniel Lenski [Tue, 9 May 2017 18:20:49 +0000 (11:20 -0700)]
Merge branch 'gist' into globalprotect

8 years agocaveat about magic ping destination (based on findings/improvement of https://github...
Daniel Lenski [Tue, 9 May 2017 17:53:33 +0000 (10:53 -0700)]
caveat about magic ping destination (based on findings/improvement of https://github.com/dlenski/openconnect/pull/25)

8 years agomore cleanup and clarification of TLS vs. ESP tunnel interaction
Dan Lenski [Wed, 8 Feb 2017 04:55:49 +0000 (20:55 -0800)]
more cleanup and clarification of TLS vs. ESP tunnel interaction

8 years agorename
Dan Lenski [Wed, 8 Feb 2017 04:28:04 +0000 (20:28 -0800)]
rename

8 years agospecify exact client version studied
Dan Lenski [Wed, 8 Feb 2017 04:27:40 +0000 (20:27 -0800)]
specify exact client version studied

8 years agoclarify requirement for correct user-agent, remove irrelevant redundant bits
Dan Lenski [Wed, 8 Feb 2017 04:25:00 +0000 (20:25 -0800)]
clarify requirement for correct user-agent, remove irrelevant redundant bits

8 years agomystery cookie and "magic ping" to initate ESP tunnel
Dan Lenski [Wed, 16 Nov 2016 08:54:44 +0000 (00:54 -0800)]
mystery cookie and "magic ping" to initate ESP tunnel

8 years agoexplanation of purpose
Dan Lenski [Fri, 11 Nov 2016 17:28:55 +0000 (09:28 -0800)]
explanation of purpose

8 years agoclarification
Dan Lenski [Tue, 11 Oct 2016 00:35:11 +0000 (19:35 -0500)]
clarification

8 years agofix endian
Dan Lenski [Sun, 9 Oct 2016 21:32:35 +0000 (14:32 -0700)]
fix endian

8 years agoIP-over-TLS stream format
Dan Lenski [Sat, 8 Oct 2016 07:01:25 +0000 (02:01 -0500)]
IP-over-TLS stream format

8 years agoinitial Gist
Dan Lenski [Wed, 5 Oct 2016 05:04:14 +0000 (22:04 -0700)]
initial Gist

8 years agoI CAN HAZ CODE BLOX KTHXPLZ?
Dan Lenski [Wed, 3 May 2017 22:08:54 +0000 (15:08 -0700)]
I CAN HAZ CODE BLOX KTHXPLZ?

8 years agoadd debug message when GPST <gw-address> differs from external gateway IP
Daniel Lenski [Wed, 19 Apr 2017 21:52:49 +0000 (14:52 -0700)]
add debug message when GPST <gw-address> differs from external gateway IP

(thanks @patchon for the reminder on #25)

8 years agoMerge pull request #25 from dlenski/separate_esp_ping_address
Dan Lenski [Tue, 18 Apr 2017 19:28:29 +0000 (12:28 -0700)]
Merge pull request #25 from dlenski/separate_esp_ping_address

Allow ESP ping address to be distinct from gateway external IP

8 years agosmall tweaks to @patchon's PR
Daniel Lenski [Tue, 18 Apr 2017 17:29:08 +0000 (10:29 -0700)]
small tweaks to @patchon's PR

- moved vpninfo->ip_info.gateway_addr_gp to vpninfo->esp_magic
- added a whole bunch of comments

8 years agoSupport for different gateway address
patchon [Sat, 15 Apr 2017 16:30:19 +0000 (18:30 +0200)]
Support for different gateway address

- This commit simply makes the openconnect global protect protocol to work when
  the global protect portal presents a gateway address that is not the same as
  the actual portal. This is done by parsing the <gw-address>-field of the xml-
  config recieved by the server and save it to the new gateway_addr_gp variable
  in the ip_info struct. This is then used as the destination of the esp icmp-
  packets.

8 years agoMerge pull request #24 from dlenski/give_up_if_cookie_invalid
Dan Lenski [Sun, 16 Apr 2017 05:21:28 +0000 (22:21 -0700)]
Merge pull request #24 from dlenski/give_up_if_cookie_invalid

stop trying to reconnect if authcookie is no longer valid (#22)

8 years agofix a couple small bugs with GP ESP pause/reconnect
Daniel Lenski [Sat, 15 Apr 2017 18:25:53 +0000 (11:25 -0700)]
fix a couple small bugs with GP ESP pause/reconnect

8 years agoMerge branch 'enumerate_protocols' into globalprotect
Daniel Lenski [Sun, 9 Apr 2017 08:31:37 +0000 (01:31 -0700)]
Merge branch 'enumerate_protocols' into globalprotect

8 years agoexport faux-AnyConnect XML config so NM plugin can list portal hosts
Daniel Lenski [Sun, 9 Apr 2017 07:46:43 +0000 (00:46 -0700)]
export faux-AnyConnect XML config so NM plugin can list portal hosts

8 years agoauth_id is used by NM plugin as a hint for remembering form fields
Daniel Lenski [Sun, 9 Apr 2017 06:35:58 +0000 (23:35 -0700)]
auth_id is used by NM plugin as a hint for remembering form fields

8 years agooops, authgroup_opt needs to be in opts for NM plugin to show it
Daniel Lenski [Sun, 9 Apr 2017 05:50:26 +0000 (22:50 -0700)]
oops, authgroup_opt needs to be in opts for NM plugin to show it

8 years agostop trying to reconnect if authcookie is no longer valid (#22)
Daniel Lenski [Sat, 15 Apr 2017 04:56:47 +0000 (00:56 -0400)]
stop trying to reconnect if authcookie is no longer valid (#22)

8 years agoMerge pull request #19 from 0atman/patch-1
Dan Lenski [Tue, 11 Apr 2017 16:50:22 +0000 (12:50 -0400)]
Merge pull request #19 from 0atman/patch-1

README updates

8 years agoadd libtool as an ubuntu dependency
Tristram Oaten [Mon, 10 Apr 2017 11:38:47 +0000 (12:38 +0100)]
add libtool as an ubuntu dependency

8 years agoremoved errent `
Tristram Oaten [Mon, 10 Apr 2017 11:37:48 +0000 (12:37 +0100)]
removed errent `

8 years agolist supported protocols in --version or --help output, using API functions
Daniel Lenski [Tue, 10 Jan 2017 11:45:35 +0000 (03:45 -0800)]
list supported protocols in --version or --help output, using API functions

8 years agoopenconnect_get_supported_protocols should return the number of protocols
Daniel Lenski [Sat, 8 Apr 2017 23:58:46 +0000 (16:58 -0700)]
openconnect_get_supported_protocols should return the number of protocols

8 years agoenumerate supported VPN protocols via openconnect_get_supported_protocols()
Daniel Lenski [Sun, 15 Jan 2017 21:45:23 +0000 (13:45 -0800)]
enumerate supported VPN protocols via openconnect_get_supported_protocols()

Add a new public function, openconnect_get_supported_protocols(), which
returns a list of protocols supported by the client.  Each supported
protocol has a short name (as accepted by the --protocol command-line
option), description, and list of flags.

The flags indicate features that are meaningful for this protocol, to be
used by tools like the Networkmanager configuration UI. Current flags:

  * OC_PROTO_PROXY: can connect via HTTP or SOCKS proxy
  * OC_PROTO_CSD: supports verification of the client via CSD trojan
  * OC_PROTO_AUTH_CERT: supports authentication by client certificate
  * OC_PROTO_AUTH_OTP: supports authentication by OATH HOTP/TOTP token
  * OC_PROTO_AUTH_STOKEN: supports authentication by RSA SecurID token (stoken)

Description of anyconnect protocol adjusted to match IETF draft
standard for openconnect VPN (https://tools.ietf.org/html/draft-mavrogiannopoulos-openconnect-00).

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
8 years agoMerge pull request #18 from dlenski/gp-portal
Dan Lenski [Sat, 8 Apr 2017 06:26:22 +0000 (23:26 -0700)]
Merge pull request #18 from dlenski/gp-portal

Add support for connection via PAN GlobalProtect portal servers

8 years agouse --authgroup to choose gateway from portal
Daniel Lenski [Sat, 8 Apr 2017 06:09:27 +0000 (23:09 -0700)]
use --authgroup to choose gateway from portal

8 years agofix warning
Daniel Lenski [Sat, 8 Apr 2017 05:03:40 +0000 (22:03 -0700)]
fix warning

8 years agoMerge branch 'globalprotect' into gp-portal
Daniel Lenski [Sat, 8 Apr 2017 04:57:03 +0000 (21:57 -0700)]
Merge branch 'globalprotect' into gp-portal

8 years agoWait until getconfig parse succeeds before clearing old IP config (fixes #16)
Daniel Lenski [Thu, 6 Apr 2017 04:54:20 +0000 (21:54 -0700)]
Wait until getconfig parse succeeds before clearing old IP config (fixes #16)

Previously, we would clear ip_info.addr and .netmask before successfully
requesting the new getconfig XML.  This prevented openconnect from correctly
requesting the same IPv4 address that it had previously (via `preferred-ip`
in the query string) in cases where getconfig XML has to be re-requested
multiple times.

Very nice catch by @hatsuyuki15!

8 years agotypo
Daniel Lenski [Wed, 5 Apr 2017 04:48:17 +0000 (21:48 -0700)]
typo

8 years agofix for issue #13
David Šmíd [Thu, 2 Mar 2017 18:34:23 +0000 (10:34 -0800)]
fix for issue #13

8 years agoMerge branch 'login_challenge' into globalprotect
Daniel Lenski [Tue, 21 Feb 2017 10:33:10 +0000 (11:33 +0100)]
Merge branch 'login_challenge' into globalprotect

8 years agoadd OC_FORM_OPT_FILL_{USERNAME,PASSWORD} flags to hint at purpose of a form field...
Daniel Lenski [Tue, 21 Feb 2017 10:31:50 +0000 (11:31 +0100)]
add OC_FORM_OPT_FILL_{USERNAME,PASSWORD} flags to hint at purpose of a form field without requiring a specific name

8 years agocleanup, bug fixes
Daniel Lenski [Fri, 17 Feb 2017 01:02:51 +0000 (17:02 -0800)]
cleanup, bug fixes

8 years agoworking on support for challenge (= secondary login form)
Dan Lenski [Wed, 15 Feb 2017 17:18:20 +0000 (09:18 -0800)]
working on support for challenge (= secondary login form)

8 years agodouble-free bug (do_https_request frees xml_buf if non-NULL)
Daniel Lenski [Fri, 17 Feb 2017 00:30:44 +0000 (16:30 -0800)]
double-free bug (do_https_request frees xml_buf if non-NULL)

8 years agohey, that worked! on the first try!
Daniel Lenski [Tue, 14 Feb 2017 17:58:07 +0000 (09:58 -0800)]
hey, that worked! on the first try!

8 years agoscript that should be able to handle a 2FA "Challenge" in the GP login
Dan Lenski [Tue, 14 Feb 2017 04:47:52 +0000 (20:47 -0800)]
script that should be able to handle a 2FA "Challenge" in the GP login

8 years agoCreate issue_template.md
Dan Lenski [Mon, 13 Feb 2017 00:09:08 +0000 (16:09 -0800)]
Create issue_template.md

8 years agoShow more universally available HTTPS clone URL
Dan Lenski [Fri, 3 Feb 2017 09:16:53 +0000 (01:16 -0800)]
Show more universally available HTTPS clone URL

8 years agoless confusing URLs
Daniel Lenski [Tue, 24 Jan 2017 18:06:30 +0000 (10:06 -0800)]
less confusing URLs

8 years agocleanup, fix redirect
Daniel Lenski [Tue, 24 Jan 2017 18:03:02 +0000 (10:03 -0800)]
cleanup, fix redirect

8 years agoinitial support for login via GlobalProtect portal (instead of gateway)
Daniel Lenski [Mon, 23 Jan 2017 21:08:01 +0000 (13:08 -0800)]
initial support for login via GlobalProtect portal (instead of gateway)

8 years agohave gpst_xml_or_error() return EEXIST instead of EINVAL, in case of nonexistent...
Daniel Lenski [Mon, 23 Jan 2017 21:06:31 +0000 (13:06 -0800)]
have gpst_xml_or_error() return EEXIST instead of EINVAL, in case of nonexistent portal/gateway

8 years agodon't free xml_buf before repeat, since do_https_request() will double-free it
Daniel Lenski [Mon, 23 Jan 2017 21:04:00 +0000 (13:04 -0800)]
don't free xml_buf before repeat, since do_https_request() will double-free it

8 years agotemp
Daniel Lenski [Mon, 23 Jan 2017 16:22:42 +0000 (08:22 -0800)]
temp

8 years agoallow GP password entry via OTP token mode
Daniel Lenski [Wed, 18 Jan 2017 17:55:32 +0000 (09:55 -0800)]
allow GP password entry via OTP token mode

8 years agomore details on Linux build requirements
Daniel Lenski [Mon, 23 Jan 2017 18:18:57 +0000 (10:18 -0800)]
more details on Linux build requirements

8 years agocherry pick of pull request #10
Robert [Mon, 23 Jan 2017 05:48:13 +0000 (21:48 -0800)]
cherry pick of pull request #10

8 years agoMerge pull request #9 from rotx/macos-patch into globalprotect, with a couple extra...
Daniel Lenski [Mon, 23 Jan 2017 17:12:14 +0000 (09:12 -0800)]
Merge pull request #9 from rotx/macos-patch into globalprotect, with a couple extra patches

8 years agofix mixed code/declaration warning and finesse missing strchrnul()
Daniel Lenski [Mon, 23 Jan 2017 16:54:52 +0000 (08:54 -0800)]
fix mixed code/declaration warning and finesse missing strchrnul()

8 years agofix ICMP packet size
Daniel Lenski [Mon, 23 Jan 2017 16:53:17 +0000 (08:53 -0800)]
fix ICMP packet size

8 years agomacOS compile patches
Robert [Mon, 23 Jan 2017 05:40:45 +0000 (23:40 -0600)]
macOS compile patches

Mac doesn’t have struct iphdr, struct icmphdr, and strchrnul.

8 years agodo_https_request needs a malloc()'ed urlpath, otherwise it crashes on redirect
Daniel Lenski [Wed, 11 Jan 2017 03:39:52 +0000 (19:39 -0800)]
do_https_request needs a malloc()'ed urlpath, otherwise it crashes on redirect

8 years agodon't ignore failures in gpst_get_config
Daniel Lenski [Wed, 11 Jan 2017 03:36:16 +0000 (19:36 -0800)]
don't ignore failures in gpst_get_config

8 years agofix wrong direction of outgoing packet display (mistake in 937a87ae)
Daniel Lenski [Tue, 10 Jan 2017 10:49:27 +0000 (02:49 -0800)]
fix wrong direction of outgoing packet display (mistake in 937a87ae)

8 years agoMerge tag 'v7.08' into globalprotect
Daniel Lenski [Tue, 10 Jan 2017 08:16:26 +0000 (00:16 -0800)]
Merge tag 'v7.08' into globalprotect

8 years agotweak docs
Daniel Lenski [Tue, 10 Jan 2017 07:05:58 +0000 (23:05 -0800)]
tweak docs

8 years agoadd oncp_bye() to logout the Juniper session
Daniel Lenski [Sun, 8 Jan 2017 20:27:54 +0000 (12:27 -0800)]
add oncp_bye() to logout the Juniper session

The nc protocol lacked a .vpn_close_session function; without logout, the
VPN cookie remains active and can be used to restart the session, which is a
security hazard—especially when passing around OpenConnect logs on the
mailing list for development and troubleshooting.

Juniper logout is straightforward: GET /dana-na/auth/logout.cgi (with the
appropriate DSID cookie set).

8 years agoMerge branch 'login_response_checker' into globalprotect
Dan Lenski [Sat, 7 Jan 2017 20:59:17 +0000 (12:59 -0800)]
Merge branch 'login_response_checker' into globalprotect

8 years agosimplify logic
Dan Lenski [Sat, 7 Jan 2017 20:59:08 +0000 (12:59 -0800)]
simplify logic

8 years agofancier login-response checker
Dan Lenski [Sat, 7 Jan 2017 20:43:49 +0000 (12:43 -0800)]
fancier login-response checker

8 years agooutput login authentication method as PRG_INFO, and check for clientVer=4100
Dan Lenski [Sat, 7 Jan 2017 19:58:21 +0000 (11:58 -0800)]
output login authentication method as PRG_INFO, and check for clientVer=4100

8 years agoactually, let's use a switch{} instead
Dan Lenski [Sat, 7 Jan 2017 19:57:45 +0000 (11:57 -0800)]
actually, let's use a switch{} instead

8 years agouse a table to translate login response <argument>s to cookie, fix mem leak
Daniel Lenski [Fri, 6 Jan 2017 22:07:10 +0000 (14:07 -0800)]
use a table to translate login response <argument>s to cookie, fix mem leak

8 years agoRely on SoftHSM being installed correctly with a p11-kit .module file
David Woodhouse [Wed, 14 Dec 2016 20:30:47 +0000 (20:30 +0000)]
Rely on SoftHSM being installed correctly with a p11-kit .module file

I don't actually remember why I added my own; it *ought* to be installed
correctly by the distribution's packaging of SoftHSM.

There was a brief discussion about my hard-coded version being
Fedora-specific, followed by a suggestion that I could pick up the
proper path from and existing module file, followed by the realisation
that said existing module file would suffice anyway. So just require it.

Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoAdd support for Google Authenticator 2fa on Juniper VPN
Janne Juntunen [Tue, 29 Nov 2016 22:37:22 +0000 (22:37 +0000)]
Add support for Google Authenticator 2fa on Juniper VPN

We resently changed our Juniper VPN from SMS 2fa to use Google
Authenticator instead. Before it worked perfectly with "openconnect
--juniper" switch, but after the change all we got was:

Unknown form ID 'frmTotpToken'
and a dump of the form.

I spent some time debugging the issue, and managed to write a very
simple fix for it.

Signed-off-by: Janne Juntunen <janne.juntunen@hermanit.fi>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agotests: avoid using eval with variable assignments
Mike Miller [Wed, 14 Dec 2016 18:02:13 +0000 (10:02 -0800)]
tests: avoid using eval with variable assignments

For shell portability, avoid using eval with variable assignments to set
openconnect's environment. Shell implementations vary on whether
variable assignments in front of eval are marked as environment
variables or just treated as ordinary shell assignments.

Every call to $OPENCONNECT already has LD_PRELOAD=libsocket_wrapper.so
in front of it, so the "eval LD_PRELOAD=libsocket_wrapper.so" was
redundant anyway.

Signed-off-by: Mike Miller <mtmiller@debian.org>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoTag version 7.08 v7.08
David Woodhouse [Tue, 13 Dec 2016 12:31:37 +0000 (12:31 +0000)]
Tag version 7.08

Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoResync translations with sources
David Woodhouse [Tue, 13 Dec 2016 12:06:01 +0000 (12:06 +0000)]
Resync translations with sources

Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoUpdate translations from GNOME
David Woodhouse [Tue, 13 Dec 2016 12:05:46 +0000 (12:05 +0000)]
Update translations from GNOME

Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoIPv6 packet size field doesn't include header size, take this into account
Nikolay Martynov [Thu, 17 Nov 2016 03:26:17 +0000 (22:26 -0500)]
IPv6 packet size field doesn't include header size, take this into account

IPv6 packet's 'length' field contains length of payload excluding headers.
Header's length (40) needs to be added to that to get complete packet length.
This patch seems to be fixing random VPN drops.

Signed-off-by: Nikolay Martynov <mar.kolya@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoCorrectly handle IPv4 route specified as either 10.1.2.0/255.255.255.0 or 10.1.2...
Dan Lenski [Sun, 16 Oct 2016 01:56:30 +0000 (18:56 -0700)]
Correctly handle IPv4 route specified as either 10.1.2.0/255.255.255.0 or 10.1.2.0/24

The existing process_split_xxclude() only handles IPv4 routes
formatted as "10.1.2.0/255.255.255.0", not those formatted as
"10.1.2.0/24".

It's possible to unambiguously distinguish the two and handle the
latter case correctly, because no IPv4 netmask address can possibly
have a decimal integer value <= 32.

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoUnset got_cancel_cmd after reacting to it, as is already done for got_pause_cmd
Daniel Lenski [Sat, 15 Oct 2016 01:46:34 +0000 (18:46 -0700)]
Unset got_cancel_cmd after reacting to it, as is already done for got_pause_cmd

Per David Woodhouse (http://lists.infradead.org/pipermail/openconnect-devel/2016-October/004034.html):

> I think it's probably OK to set vpninfo->got_cancel_cmd=0 in the mainloop
> right before calling proto->vpn_close_session.  If we get cancelled
> *again* then we'll give up on that too.

Without this fix, do_https_request() can't be used to close the
session — it interrupts itself as soon as it sees that got_cancel_cmd is
set.

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoMake buf_append_urlencoded() percent-encode fewer characters.
Daniel Lenski [Sun, 16 Oct 2016 19:37:58 +0000 (12:37 -0700)]
Make buf_append_urlencoded() percent-encode fewer characters.

Per RFC 3986, the characters '-', '_', '.', '~' don't need to be
percent-encoded anywhere in a URL or query string.

Removed special case for ' ' → '+' to prevent incompatibility with ocserv:
http://lists.infradead.org/pipermail/openconnect-devel/2016-October/004042.html

/* else if (c==' ')
buf_append_bytes(buf, "+", 1); */

Signed-off-by: Dan Lenski <dlenski@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoappend_opt() and buf_append_urlencoded() should take const char *
Daniel Lenski [Sat, 15 Oct 2016 01:46:32 +0000 (18:46 -0700)]
append_opt() and buf_append_urlencoded() should take const char *

Fixes -Wcast-qual warnings.

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoStop using deprecated LZ4 functions
David Woodhouse [Tue, 13 Dec 2016 11:36:15 +0000 (11:36 +0000)]
Stop using deprecated LZ4 functions

../cstp.c:865:3: warning: ‘LZ4_compress_limitedOutput’ is deprecated: use LZ4_compress_default() instead [-Wdeprecated-declarations]
   ret = LZ4_compress_default((void*)this->data, (void*)vpninfo->deflate_pkt->data,
   ^~~

Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoChangelog entry for SHA256 hashes
David Woodhouse [Tue, 13 Dec 2016 11:10:52 +0000 (11:10 +0000)]
Changelog entry for SHA256 hashes

Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agotests: added check for operation under different --servercert parameters
Nikos Mavrogiannopoulos [Tue, 6 Dec 2016 12:00:27 +0000 (13:00 +0100)]
tests: added check for operation under different --servercert parameters

Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoIntroduced buf_append_hex()
Nikos Mavrogiannopoulos [Tue, 22 Nov 2016 12:40:57 +0000 (13:40 +0100)]
Introduced buf_append_hex()

That is being used by openconnect_bin2hex() for hex-encoding.

[dwmw2: Clean up buf error handling in openconnect_bin2hex()]

Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoopenconnect_check_peer_cert_hash: allow partial server hash matches
Nikos Mavrogiannopoulos [Tue, 1 Nov 2016 08:32:31 +0000 (09:32 +0100)]
openconnect_check_peer_cert_hash: allow partial server hash matches

That is allow the user specifying a small part of the hash (e.g., 'sha256:6429')
in order to be able to connect. This is to ease test connections, when copy-paste
is not possible.

[dwmw2: Fix man page to say 'at least 4 characters' not 'more than']

Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoIntroduce SHA2-256 as a peer certificate hash and make it the default
Nikos Mavrogiannopoulos [Tue, 1 Nov 2016 08:23:48 +0000 (09:23 +0100)]
Introduce SHA2-256 as a peer certificate hash and make it the default

That is, generate and print a SHA256 hash by default, while also
accept the old 'sha1:' type of certificate hashes.

Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
8 years agoclarify a few messages
Dan Lenski [Thu, 17 Nov 2016 05:20:23 +0000 (21:20 -0800)]
clarify a few messages

8 years agoUpdate README.md, and fix get-globalprotect-config.py (Python 2/3 mixup)
Dan Lenski [Mon, 14 Nov 2016 04:13:19 +0000 (20:13 -0800)]
Update README.md, and fix get-globalprotect-config.py (Python 2/3 mixup)

8 years agoUpdate README.md with build requirements
Dan Lenski [Mon, 14 Nov 2016 04:05:21 +0000 (20:05 -0800)]
Update README.md with build requirements

References official OC build reqs, as suggested on issue #3.

8 years agoadd --no-verify option to get-globalprotect-config.py
Daniel Lenski [Sun, 13 Nov 2016 06:50:35 +0000 (22:50 -0800)]
add --no-verify option to get-globalprotect-config.py

8 years agoglobalprotect-list-gateways.py → get-globalprotect-config.py
Daniel Lenski [Sun, 13 Nov 2016 06:20:12 +0000 (22:20 -0800)]
globalprotect-list-gateways.py → get-globalprotect-config.py

8 years agoUpdate README.md
Dan Lenski [Sun, 13 Nov 2016 05:45:01 +0000 (21:45 -0800)]
Update README.md

8 years agoinstructions in README.md
Dan Lenski [Fri, 11 Nov 2016 17:28:13 +0000 (09:28 -0800)]
instructions in README.md

8 years agoassume aes128 means aes-128-cbc (might fix GitHub issue #2)
Daniel Lenski [Wed, 9 Nov 2016 20:11:43 +0000 (12:11 -0800)]
assume aes128 means aes-128-cbc (might fix GitHub issue #2)