From: Alan T. DeKok Date: Thu, 23 Feb 2012 15:29:28 +0000 (+0100) Subject: Use correct structure for TLS fragment size X-Git-Tag: release_3_0_0_beta0~282 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=36698fcc91369f5f1214a58eadda27c9b0eecc21;p=thirdparty%2Ffreeradius-server.git Use correct structure for TLS fragment size set ssn->offset, and use that in proxy_tls_recv --- diff --git a/src/main/tls.c b/src/main/tls.c index c6c51ee99bc..ecc36ce67de 100644 --- a/src/main/tls.c +++ b/src/main/tls.c @@ -136,6 +136,8 @@ tls_session_t *tls_new_client_session(fr_tls_server_conf_t *conf, int fd) return NULL; } + ssn->offset = conf->fragment_size; + return ssn; } diff --git a/src/main/tls_listen.c b/src/main/tls_listen.c index b059b1ede37..e8537891f8b 100644 --- a/src/main/tls_listen.c +++ b/src/main/tls_listen.c @@ -475,7 +475,7 @@ int proxy_tls_recv(rad_listen_t *listener) RAD_REQUEST_FUNP fun = NULL; uint8_t *data; - if (!sock->data) sock->data = rad_malloc(listener->tls->fragment_size); + if (!sock->data) sock->data = rad_malloc(sock->ssn->offset); data = sock->data; DEBUG3("Proxy SSL socket has data to read"); @@ -513,7 +513,7 @@ redo: DEBUG3("Proxy received header saying we have a packet of %u bytes", (unsigned int) length); - if (length > listener->tls->fragment_size) { + if (length > sock->ssn->offset) { radlog(L_INFO, "Received packet will be too large! Set \"fragment_size=%u\"", (data[2] << 8) | data[3]);