summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDavid Woodhouse <David.Woodhouse@intel.com>2013-02-04 15:00:39 +0000
committerDavid Woodhouse <David.Woodhouse@intel.com>2013-02-04 15:00:39 +0000
commit67e0f8216ea375b53575d7bfda2c675bc1195a4e (patch)
tree2e1ebb3ffbe787eb432c5bd785f1cc48e304cb57
parentdc7684d0e2951277ce3a61f652a3251576bcd339 (diff)
downloadopenconnect-67e0f8216ea375b53575d7bfda2c675bc1195a4e.tar.gz
openconnect-67e0f8216ea375b53575d7bfda2c675bc1195a4e.tar.bz2
openconnect-67e0f8216ea375b53575d7bfda2c675bc1195a4e.zip
Reinstate compatibility with test server hack
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
-rw-r--r--http.c5
1 files changed, 5 insertions, 0 deletions
diff --git a/http.c b/http.c
index c05340f..bcc4e98 100644
--- a/http.c
+++ b/http.c
@@ -388,6 +388,7 @@ static int process_http_response(struct openconnect_info *vpninfo, int *result,
if (!closeconn) {
vpn_progress(vpninfo, PRG_ERR,
_("Cannot receive HTTP 1.0 body without closing connection\n"));
+ openconnect_close_https(vpninfo, 0);
return -EINVAL;
}
@@ -989,6 +990,10 @@ int openconnect_obtain_cookie(struct openconnect_info *vpninfo)
free(form_buf);
return result;
}
+ if (form->action) {
+ vpninfo->redirect_url = strdup(form->action);
+ handle_redirect(vpninfo);
+ }
}
/* Step 4: Run the CSD trojan, if applicable */