diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-07-03 11:08:49 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-07-13 09:10:24 +0200 |
commit | 3b319a4aa15d779b82e6fe369a4c483b7db64a9a (patch) | |
tree | b894f160090b3ba3b81179a7d977b140ad17cf19 | |
parent | 09306b74543aafd29d4a6337278f156ecad98c85 (diff) | |
download | gnutls-3b319a4aa15d779b82e6fe369a4c483b7db64a9a.tar.gz |
gnutls-serv: allow receiving requests up to 16kb
This makes gnutls-serv useful for few tlsfuzzer test cases.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r-- | src/serv.c | 9 |
1 files changed, 4 insertions, 5 deletions
diff --git a/src/serv.c b/src/serv.c index 04c5ac912f..65bb309e77 100644 --- a/src/serv.c +++ b/src/serv.c @@ -1285,8 +1285,7 @@ static void retry_handshake(listener_item *j) } else if (r < 0) { j->http_state = HTTP_STATE_CLOSING; check_alert(j->tls_session, r); - fprintf(stderr, "Error in handshake\n"); - GERR(r); + fprintf(stderr, "Error in handshake: %s\n", gnutls_strerror(r)); do { ret = gnutls_alert_send_appropriate(j->tls_session, r); @@ -1325,7 +1324,7 @@ int r, ret; do { ret = gnutls_alert_send_appropriate(j->tls_session, r); } while (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED); - GERR(r); + fprintf(stderr, "Error in rehandshake: %s\n", gnutls_strerror(r)); j->http_state = HTTP_STATE_CLOSING; } else { j->http_state = HTTP_STATE_REQUEST; @@ -1458,7 +1457,7 @@ static void tcp_server(const char *name, int port) if (FD_ISSET(j->fd, &rd) && !j->listen_socket) { /* read partial GET request */ - char buf[1024]; + char buf[16*1024]; int r; if (j->handshake_ok == 0) { @@ -1469,7 +1468,7 @@ static void tcp_server(const char *name, int port) r = gnutls_record_recv(j-> tls_session, buf, - MIN(1024, + MIN(sizeof(buf), SMALL_READ_TEST)); if (r == GNUTLS_E_INTERRUPTED || r == GNUTLS_E_AGAIN) { /* do nothing */ |