diff options
author | 2016-09-24 12:44:31 -0500 | |
---|---|---|
committer | 2016-09-24 12:44:31 -0500 | |
commit | 5f9049c9da39886975077c93c119129cd31e8f88 (patch) | |
tree | 074c75f591276a762ac8aada23fc92d37aaa83bc /net-misc/openconnect/files | |
parent | sci-chemistry/pymol: Version bump (diff) | |
download | gentoo-5f9049c9da39886975077c93c119129cd31e8f88.tar.gz gentoo-5f9049c9da39886975077c93c119129cd31e8f88.tar.bz2 gentoo-5f9049c9da39886975077c93c119129cd31e8f88.zip |
net-misc/openconnect: 7.07-r2 revbump to fix pulse secure
Current stable openconnect is broken for newer releases of pulse secure [1].
This revbump fixes that issue. I have verified it on amd64 so I'm going
straight to stable since the previous revision is stable.
[1] http://lists.infradead.org/pipermail/openconnect-devel/2016-September/003952.html
Package-Manager: portage-2.2.28
RepoMan-Options: --force
Diffstat (limited to 'net-misc/openconnect/files')
-rw-r--r-- | net-misc/openconnect/files/openconnect-7.07-mimic-pulse-client.patch | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/net-misc/openconnect/files/openconnect-7.07-mimic-pulse-client.patch b/net-misc/openconnect/files/openconnect-7.07-mimic-pulse-client.patch new file mode 100644 index 000000000000..5cfeca6ec52d --- /dev/null +++ b/net-misc/openconnect/files/openconnect-7.07-mimic-pulse-client.patch @@ -0,0 +1,38 @@ +From 4ce9c9241f5707917e87e93a055f757cea5fb84d Mon Sep 17 00:00:00 2001 +From: Jon DeVree <nuxi@vault24.org> +Date: Mon, 19 Sep 2016 21:00:18 -0400 +Subject: [PATCH] Add Content-Length header to mimic official pulse client + +The official pulse client sends in a fixed "Content-Length: 256" header +with these two HTTP requests. Some versions of the VPN server will +reject requests with an HTTP 400 error if they do not have this header. + +Signed-off-by: Jon DeVree <nuxi@vault24.org> +Signed-off-by: David Woodhouse <David.Woodhouse@intel.com> +--- + oncp.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/oncp.c b/oncp.c +index cc9a223..2bf1571 100644 +--- a/oncp.c ++++ b/oncp.c +@@ -562,6 +562,7 @@ int oncp_connect(struct openconnect_info *vpninfo) + + buf_append(reqbuf, "POST /dana/js?prot=1&svc=1 HTTP/1.1\r\n"); + oncp_common_headers(vpninfo, reqbuf); ++ buf_append(reqbuf, "Content-Length: 256\r\n"); + buf_append(reqbuf, "\r\n"); + + if (buf_error(reqbuf)) { +@@ -606,6 +607,7 @@ int oncp_connect(struct openconnect_info *vpninfo) + buf_truncate(reqbuf); + buf_append(reqbuf, "POST /dana/js?prot=1&svc=4 HTTP/1.1\r\n"); + oncp_common_headers(vpninfo, reqbuf); ++ buf_append(reqbuf, "Content-Length: 256\r\n"); + buf_append(reqbuf, "\r\n"); + + if (buf_error(reqbuf)) { +-- +2.7.3 + |