summaryrefslogtreecommitdiff
path: root/plugins/openconnect.c
AgeCommit message (Collapse)AuthorFilesLines
2012-04-29plugins: Update copyright informationMarcel Holtmann1-1/+1
2011-11-18plugins: Don't attempt to save strings with value NULLPatrik Flykt1-9/+12
If a string with value NULL is set with g_key_file_set_string(), a critical glib error will be printed.
2011-11-07openconnect: Save support for openconnect VPNPatrik Flykt1-0/+26
Openconnect saves VPN MTU, Server and CA cert file paths.
2011-04-17ipconfig: Fix connman_ipaddress_set_ipv6 prototypeSamuel Ortiz1-1/+1
Switch the gateway and prefix_length order to be consistent with the ipv4 version.
2011-02-25openconnect: Support IPv6 settingsSamuel Ortiz1-7/+45
2011-02-25provider: Remove IPv4 element registrationDaniel Wagner1-6/+26
2011-01-28openconnect: error_code implementationMohamed Abbas1-0/+14
2011-01-27provider: Factorize VPN routing environment variables parsingSamuel Ortiz1-0/+6
2010-12-17openconnect: Remove unused codeDaniel Wagner1-7/+0
2010-11-19openconnect: Fix connect-vpn and plugin indentationSamuel Ortiz1-1/+1
2010-11-19openconnect: Pass server certificate hash directly to openconnectDavid Woodhouse1-1/+7
When we spawn openconnect to make a VPN connection, it obviously needs to validate the server's SSL certificate to protect against a MiTM attack. But it may not have full access to the user's CA chain, or the user may have manually accepted a dubious certificate. To allow for this, the GUI authentication dialog returns a SHA1 of the server's SSL certificate fingerprint, for the *specific* server that it managed to authenticate to. The intention is that this should be passed through to openconnect when it connects. That way, openconnect doesn't need to do any normal validation; it only needs to compare the certificate with what's expected. From openconnect v2.26, certificate validation is enabled by default; rather than only when a --cafile option is given. So it's important that we start passing the certificate fingerprint through, to avoid connection failures (which we don't currently detect and report gracefully, btw).
2010-10-22Split openconnect into generic vpn and openconnect partDaniel Wagner1-314/+33
2010-09-22Fix bug to remove vpn services when turning offline mode onMohamed Abbas1-2/+3
This patch will remove all vpn services on offline mode. It also make sure it exits after releasing all resources. Fixes BMC #6591
2010-08-09Fix provider refcountingSamuel Ortiz1-7/+4
The VPN service refcount is bumped at creation time and decreased at destruction time. The openconnect provider bumps the provider refcount at task creation time and decreases it at task destruction time. The service code bumps the provider refcount at service creation time and decreases it at service releasing time.
2010-08-06Build VPN services based on VPN host and domain stringsSamuel Ortiz1-2/+2
2010-08-02Track and report VPN providers statesSamuel Ortiz1-4/+30
2010-08-02Unref openconnect provider on disconnect and removeSamuel Ortiz1-0/+4
2010-01-03Add basic interfaces for automatic proxy configurationMarcel Holtmann1-0/+3
2010-01-01Update copyright informationMarcel Holtmann1-1/+1
2009-12-09Fix issue with TUN name assignment for VPNMarcel Holtmann1-1/+1
2009-12-09Add OpenConnect provider plugin for AnyConnect VPN supportMohamed Abbas1-0/+425