From 2c340608f1ddce3b4922779ced2e5525cffb85b7 Mon Sep 17 00:00:00 2001 From: Nikos Mavrogiannopoulos Date: Mon, 3 Jul 2017 11:08:49 +0200 Subject: gnutls-serv: allow receiving requests up to 16kb This makes gnutls-serv useful for few tlsfuzzer test cases. Signed-off-by: Nikos Mavrogiannopoulos --- src/serv.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/src/serv.c b/src/serv.c index ef71b47737..c0937b6f7e 100644 --- a/src/serv.c +++ b/src/serv.c @@ -1243,8 +1243,7 @@ static void retry_handshake(listener_item *j) } else if (r < 0) { j->http_state = HTTP_STATE_CLOSING; check_alert(j->tls_session, r); - fprintf(stderr, "Error in handshake\n"); - GERR(r); + fprintf(stderr, "Error in handshake: %s\n", gnutls_strerror(r)); do { ret = gnutls_alert_send_appropriate(j->tls_session, r); @@ -1283,7 +1282,7 @@ int r, ret; do { ret = gnutls_alert_send_appropriate(j->tls_session, r); } while (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED); - GERR(r); + fprintf(stderr, "Error in rehandshake: %s\n", gnutls_strerror(r)); j->http_state = HTTP_STATE_CLOSING; } else { j->http_state = HTTP_STATE_REQUEST; @@ -1416,7 +1415,7 @@ static void tcp_server(const char *name, int port) if (FD_ISSET(j->fd, &rd) && !j->listen_socket) { /* read partial GET request */ - char buf[1024]; + char buf[16*1024]; int r; if (j->handshake_ok == 0) { @@ -1427,7 +1426,7 @@ static void tcp_server(const char *name, int port) r = gnutls_record_recv(j-> tls_session, buf, - MIN(1024, + MIN(sizeof(buf), SMALL_READ_TEST)); if (r == GNUTLS_E_INTERRUPTED || r == GNUTLS_E_AGAIN) { /* do nothing */ -- cgit v1.2.1