~mamarley/openconnect/+git/gitlab-main:coverity-old

Last commit made on 2019-10-16
Get this branch:
git clone -b coverity-old https://git.launchpad.net/~mamarley/openconnect/+git/gitlab-main

Branch merges

Branch information

Name:
coverity-old
Repository:
lp:~mamarley/openconnect/+git/gitlab-main

Recent commits

d5b6587... by dwmw2

Testing CI

Signed-off-by: David Woodhouse <email address hidden>

f91b42b... by dwmw2

Fix build error in select fix

Bad dwmw2. No biscuit.

Signed-off-by: David Woodhouse <email address hidden>

a52d070... by dwmw2

When select() returns with errno == EINTR, that isn't an error

This stopped us from actually sending the BYE packet and closing the
session cleanly on exit.

Fixes: a07183b79f ("Check select() return value in main loop") et al.

This is why we don't blindly "fix warnings" reported by tools like
Coverity, and should sometimes be a little more reticent, and only
actually fix *bugs* that are highlighted.

Signed-off-by: David Woodhouse <email address hidden>

a3e1d9d... by dwmw2

Fix pulse session kill request

Fixing leaks is good. Fixing them by freeing a string we were about to
use and then setting it to NULL, thus triggering a later check to report
-ENOMEM, less good.

Stupid dwmw2, no biscuit.

Fixes: 097586fe ("Fix leaks in Pulse duplicate session handling")

Signed-off-by: David Woodhouse <email address hidden>

8ae6dd3... by John Spencer <email address hidden>

Fix build with libressl 2.7.x/2.9.x

rather than hardcoding version numbers with ifdefs, we simply check
whether the functionality is available or not.

[dwmw2: Use #ifndef instead of #if !HAVE_SSL_CIPHER_FIND]
Signed-off-by: John Spencer <email address hidden>
Signed-off-by: David Woodhouse <email address hidden>

47efa0b... by Corey Wright <email address hidden>

GlobalProtect: Ensure timeout is less than DPD when DTLS connecting

When transitioning from DTLS_CONNECTING to DTLS_CONNECTED ensure that
the current timeout is less than or equal to 10-second DTLS DPD
otherwise timeout might be greater than 2x DPD, eg set to 60-second
DTLS attempt period from the ESP main loop where we were "connecting",
and we might sleep right through the DTLS DPD period and falsely
detect a dead peer and needlessly fall back to HTTPS.

This is only relevant to reconnects because during the initial
connection the timeout is artificially set low, ie 1 second, by the
OpenConnect mainloop because the TUN device is not yet up.

Signed-off-by: Corey Wright <email address hidden>

8454fe9... by dwmw2

Merge branch 'clarify_cafile_and_no_system_trust' of gitlab.com:dlenski/openconnect

ef4a078... by dwmw2

Merge branch 'correct_mimetype_and_charset_for_XML_post' of gitlab.com:dlenski/openconnect

2ee75ae... by dwmw2

pulse: A value of 0xF for AVP 0xd73 means 'prompt for password only'

I wish I knew how to interpret this sanely.

https://gitlab.com/openconnect/openconnect/issues/82#note_229748355

Signed-off-by: David Woodhouse <email address hidden>

bdf6bff... by dwmw2

Really pull in tpm2-tss for EPEL8 builds

It should be checking for %{?rhel} >= 8, not %{?epel}.

Not that it'll build yet because ocserv isn't there for EPEL8 yet
(https://bugzilla.redhat.com/show_bug.cgi?id=1761396)

Signed-off-by: David Woodhouse <email address hidden>