lp:~mamarley/openconnect/+git/gitlab-main

Owned by Michael Marley
Get this repository:
git clone https://git.launchpad.net/~mamarley/openconnect/+git/gitlab-main

Import details

Import Status: Reviewed

This repository is an import of the Git repository at https://gitlab.com/openconnect/openconnect.git.

The next import is scheduled to run .

Last successful import was .

Import started on juju-98ee42-prod-launchpad-codeimport-4 and finished taking 25 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-1 and finished taking 30 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-0 and finished taking 40 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-5 and finished taking 25 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-5 and finished taking 30 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-4 and finished taking 25 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-1 and finished taking 20 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-1 and finished taking 25 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-0 and finished taking 30 seconds — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-0 and finished taking 25 seconds — see the log

Branches

Name Last Modified Last Commit
stop_hardcoding_GP_UA_by_default 2020-05-05 22:27:01 UTC
stop sending 'PAN GlobalProtect' as UA; recent server versions don't appear t...

Author: Dan Lenski
Author Date: 2020-04-04 16:59:16 UTC

stop sending 'PAN GlobalProtect' as UA; recent server versions don't appear to enforce this

Add a comment in the manual about older servers where spoofing this value may still may be necessary.

See https://gitlab.com/openconnect/openconnect/-/issues/118#note_317598039
for one reason why spoofing official UAs is counterproductive.

Signed-off-by: Daniel Lenski <dlenski@gmail.com>

explain_exit_status_in_HIP_and_CSD_scripts 2020-04-21 23:25:17 UTC
explain exit status in HIP/CSD scripts

Author: Dan Lenski
Author Date: 2020-04-04 22:49:25 UTC

explain exit status in HIP/CSD scripts

Follow-up to b2a2c7a9c2445057f8ed22192486480c431d0438.

Signed-off-by: Daniel Lenski <dlenski@gmail.com>

webview 2020-04-14 15:15:58 UTC
Start attempting NC webview support

Author: dwmw2
Author Date: 2020-04-14 14:29:11 UTC

Start attempting NC webview support

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

issue123 2020-04-14 12:48:09 UTC
Log in slots with CKF_USER_PIN_INITIALIZED and not CKF_LOGIN_REQUIRED

Author: dwmw2
Author Date: 2020-04-14 12:48:09 UTC

Log in slots with CKF_USER_PIN_INITIALIZED and not CKF_LOGIN_REQUIRED

Fixes: #123 (for OpenSSL build)
Signed-off-by: David Woodhouse <dwmw2@infradead.org>

bash_completion 2020-04-07 13:54:52 UTC
Add bash completion

Author: dwmw2
Author Date: 2020-04-07 13:12:27 UTC

Add bash completion

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

ppahacks 2020-04-02 16:26:42 UTC
ppa hacks

Author: dwmw2
Author Date: 2020-04-02 16:10:17 UTC

ppa hacks

j2hack 2020-03-12 16:21:49 UTC
j/5 is longer, which implies that it really is different but let's try anyway...

Author: dwmw2
Author Date: 2020-03-12 16:21:49 UTC

j/5 is longer, which implies that it really is different but let's try anyway...

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

ttlsfrag 2019-12-29 13:58:10 UTC
pulse: Attempt to handle EAP-TTLS fragmentation

Author: dwmw2
Author Date: 2019-12-29 13:58:10 UTC

pulse: Attempt to handle EAP-TTLS fragmentation

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

issue90 2019-12-19 11:55:50 UTC
Add -mwin32 for Windows builds

Author: dwmw2
Author Date: 2019-12-19 11:35:57 UTC

Add -mwin32 for Windows builds

It seems that MSYS2 needs this in order to make it define _WIN32.

Fixes: #90

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

stokenrc 2019-12-17 14:30:41 UTC
Allow custom stoken rcfile to be specfied

Author: dwmw2
Author Date: 2019-12-17 14:28:54 UTC

Allow custom stoken rcfile to be specfied

Fixes: #71

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

issue87 2019-12-16 14:34:09 UTC
Detect closed HTTPS socket when sending requests

Author: dwmw2
Author Date: 2019-12-16 13:15:43 UTC

Detect closed HTTPS socket when sending requests

Fixes: #87

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

coverity-old 2019-10-16 22:16:23 UTC
Testing CI

Author: dwmw2
Author Date: 2019-10-16 22:16:23 UTC

Testing CI

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

pulsev6 2019-06-28 15:00:51 UTC
For Pulse, send ESP only of the same IP protocol as we're connected over

Author: dwmw2
Author Date: 2019-06-14 00:13:47 UTC

For Pulse, send ESP only of the same IP protocol as we're connected over

It really seems that when we're connected over Legacy IP, it only accepts
Legacy IP packets in ESP. And when we're connected over IPv6, it only
accepts IPv6 packets in ESP.

Unless we're supposed to (have a public IPv6 route to the server and)
establish ESP over *both* Legacy IP and IPv6, and send the right packets
over each? Which would be insane.

Someone please tell me this isn't true. But it matches the behaviour
of the Windows client too.

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

pulseotp 2019-06-15 14:51:28 UTC
Add tokencode support for Pulse

Author: dwmw2
Author Date: 2019-06-14 22:48:11 UTC

Add tokencode support for Pulse

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

pulse 2019-06-07 18:54:53 UTC
EAP-TTLS for OpenSSL too

Author: dwmw2
Author Date: 2019-06-07 18:54:53 UTC

EAP-TTLS for OpenSSL too

perfhacks 2019-04-11 16:46:26 UTC
avx

Author: dwmw2
Author Date: 2019-04-11 16:46:26 UTC

avx

keychain 2018-11-04 08:02:17 UTC
Add `--save-to-keychain` option.

Author: Yoshimasa Niwa
Author Date: 2018-11-04 07:53:37 UTC

Add `--save-to-keychain` option.

gpst 2018-03-06 09:11:51 UTC
GlobalProtect: Fix potential NULL dereference in parse_login_xml()

Author: dwmw2
Author Date: 2018-03-06 09:11:51 UTC

GlobalProtect: Fix potential NULL dereference in parse_login_xml()

... and some other cosmetic changes.

Signed-off-by: David Woodhouse <dwmw2@infradead.org>

globalprotect 2017-08-17 18:43:12 UTC
improved MTU calculation for GlobalProtect ESP

Author: Dan Lenski
Author Date: 2017-08-17 03:07:45 UTC

improved MTU calculation for GlobalProtect ESP

On Wed, Aug 16, 2017 at 8:03 PM, Daniel Lenski wrote:

> I believe the correct [ESP padding] algorithm is actually as follows:
>
> * From payload MTU, add 2 footer bytes, round *up* to a multiple of
> the blocksize. Add the size of the MAC, IV, and other headers. That's
> the size of the packet on the wire.
> * From wire packet MTU, subtract headers and MAC and IV, round *down*
> to a multiple of blocksize, subtract TWO footer bytes, and that's the
> largest payload you can carry.

Signed-off-by: Daniel Lenski <dlenski@gmail.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>

gp 2017-05-14 07:17:51 UTC
Merge branch 'globalprotect' of https://github.com/dlenski/openconnect

Author: dwmw2
Author Date: 2017-05-14 07:17:51 UTC

Merge branch 'globalprotect' of https://github.com/dlenski/openconnect

nmav-auth 2015-02-24 12:04:29 UTC
Fix HTTP auth some more

Author: David Woodhouse
Author Date: 2015-02-24 11:59:19 UTC

Fix HTTP auth some more

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>

dwmw2-auth 2015-02-24 11:59:19 UTC
Fix HTTP auth some more

Author: David Woodhouse
Author Date: 2015-02-24 11:59:19 UTC

Fix HTTP auth some more

Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>

101122 of 122 results
This repository contains Public information 
Everyone can see this information.

Subscribers