summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-07-03 11:08:49 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2017-07-11 09:11:37 +0200
commit2c340608f1ddce3b4922779ced2e5525cffb85b7 (patch)
treee004516be341924a8fad7a90964de232faeb134b
parent5935166b7515173691ab6b61438b2e1b4676348b (diff)
downloadgnutls-2c340608f1ddce3b4922779ced2e5525cffb85b7.tar.gz
gnutls-serv: allow receiving requests up to 16kb
This makes gnutls-serv useful for few tlsfuzzer test cases. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r--src/serv.c9
1 files changed, 4 insertions, 5 deletions
diff --git a/src/serv.c b/src/serv.c
index ef71b47737..c0937b6f7e 100644
--- a/src/serv.c
+++ b/src/serv.c
@@ -1243,8 +1243,7 @@ static void retry_handshake(listener_item *j)
} else if (r < 0) {
j->http_state = HTTP_STATE_CLOSING;
check_alert(j->tls_session, r);
- fprintf(stderr, "Error in handshake\n");
- GERR(r);
+ fprintf(stderr, "Error in handshake: %s\n", gnutls_strerror(r));
do {
ret = gnutls_alert_send_appropriate(j->tls_session, r);
@@ -1283,7 +1282,7 @@ int r, ret;
do {
ret = gnutls_alert_send_appropriate(j->tls_session, r);
} while (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED);
- GERR(r);
+ fprintf(stderr, "Error in rehandshake: %s\n", gnutls_strerror(r));
j->http_state = HTTP_STATE_CLOSING;
} else {
j->http_state = HTTP_STATE_REQUEST;
@@ -1416,7 +1415,7 @@ static void tcp_server(const char *name, int port)
if (FD_ISSET(j->fd, &rd) && !j->listen_socket) {
/* read partial GET request */
- char buf[1024];
+ char buf[16*1024];
int r;
if (j->handshake_ok == 0) {
@@ -1427,7 +1426,7 @@ static void tcp_server(const char *name, int port)
r = gnutls_record_recv(j->
tls_session,
buf,
- MIN(1024,
+ MIN(sizeof(buf),
SMALL_READ_TEST));
if (r == GNUTLS_E_INTERRUPTED || r == GNUTLS_E_AGAIN) {
/* do nothing */