~mamarley/openconnect/+git/gitlab-main:issue87

Last commit made on 2019-12-16
Get this branch:
git clone -b issue87 https://git.launchpad.net/~mamarley/openconnect/+git/gitlab-main

Branch merges

Branch information

Name:
issue87
Repository:
lp:~mamarley/openconnect/+git/gitlab-main

Recent commits

4fdb8e3... by dwmw2

Detect closed HTTPS socket when sending requests

Fixes: #87

Signed-off-by: David Woodhouse <email address hidden>

48e69d1... by dwmw2

Add password change support

Signed-off-by: David Woodhouse <email address hidden>

5ed7724... by dwmw2

tun-win32: Attempt to open all adapters, don't bail if the first is in use

https://gitlab.com/openconnect/openconnect-gui/issues/278

Signed-off-by: David Woodhouse <email address hidden>

90a5577... by dwmw2

Update translations from GNOME

Signed-off-by: David Woodhouse <email address hidden>

f91b42b... by dwmw2

Fix build error in select fix

Bad dwmw2. No biscuit.

Signed-off-by: David Woodhouse <email address hidden>

a52d070... by dwmw2

When select() returns with errno == EINTR, that isn't an error

This stopped us from actually sending the BYE packet and closing the
session cleanly on exit.

Fixes: a07183b79f ("Check select() return value in main loop") et al.

This is why we don't blindly "fix warnings" reported by tools like
Coverity, and should sometimes be a little more reticent, and only
actually fix *bugs* that are highlighted.

Signed-off-by: David Woodhouse <email address hidden>

a3e1d9d... by dwmw2

Fix pulse session kill request

Fixing leaks is good. Fixing them by freeing a string we were about to
use and then setting it to NULL, thus triggering a later check to report
-ENOMEM, less good.

Stupid dwmw2, no biscuit.

Fixes: 097586fe ("Fix leaks in Pulse duplicate session handling")

Signed-off-by: David Woodhouse <email address hidden>

8ae6dd3... by John Spencer <email address hidden>

Fix build with libressl 2.7.x/2.9.x

rather than hardcoding version numbers with ifdefs, we simply check
whether the functionality is available or not.

[dwmw2: Use #ifndef instead of #if !HAVE_SSL_CIPHER_FIND]
Signed-off-by: John Spencer <email address hidden>
Signed-off-by: David Woodhouse <email address hidden>

47efa0b... by Corey Wright <email address hidden>

GlobalProtect: Ensure timeout is less than DPD when DTLS connecting

When transitioning from DTLS_CONNECTING to DTLS_CONNECTED ensure that
the current timeout is less than or equal to 10-second DTLS DPD
otherwise timeout might be greater than 2x DPD, eg set to 60-second
DTLS attempt period from the ESP main loop where we were "connecting",
and we might sleep right through the DTLS DPD period and falsely
detect a dead peer and needlessly fall back to HTTPS.

This is only relevant to reconnects because during the initial
connection the timeout is artificially set low, ie 1 second, by the
OpenConnect mainloop because the TUN device is not yet up.

Signed-off-by: Corey Wright <email address hidden>

8454fe9... by dwmw2

Merge branch 'clarify_cafile_and_no_system_trust' of gitlab.com:dlenski/openconnect