summaryrefslogtreecommitdiffstats
path: root/ssl.c
diff options
context:
space:
mode:
authorjames <james@e7ae566f-a301-0410-adde-c780ea21d3b5>2009-09-27 02:12:15 +0000
committerjames <james@e7ae566f-a301-0410-adde-c780ea21d3b5>2009-09-27 02:12:15 +0000
commit3eee126eba7314e203a50b6398fa5333cbf12ff7 (patch)
tree2b07c330d53e1346c5383bfefe1a997d54bbde7c /ssl.c
parent673f583f76358b57e7f610084d3cb28bb2a9c4a2 (diff)
downloadopenvpn-3eee126eba7314e203a50b6398fa5333cbf12ff7.tar.gz
openvpn-3eee126eba7314e203a50b6398fa5333cbf12ff7.tar.xz
openvpn-3eee126eba7314e203a50b6398fa5333cbf12ff7.zip
Eliminated the limitation on the number of options that can be pushed
to clients, including routes. Previously, all pushed options needed to fit within a 1024 byte options string. Remember that to make use of this feature to allow many routes to be pushed to clients, the client config file must specify the max-routes option, and the number of pushed routes cannot exceed this limit. Also, both server and client must include this commit. git-svn-id: http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn@4991 e7ae566f-a301-0410-adde-c780ea21d3b5
Diffstat (limited to 'ssl.c')
-rw-r--r--ssl.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/ssl.c b/ssl.c
index 687c3f3..224721a 100644
--- a/ssl.c
+++ b/ssl.c
@@ -2069,8 +2069,8 @@ key_state_init (struct tls_session *session, struct key_state *ks)
ALLOC_OBJ_CLEAR (ks->rec_ack, struct reliable_ack);
/* allocate buffers */
- ks->plaintext_read_buf = alloc_buf (PLAINTEXT_BUFFER_SIZE);
- ks->plaintext_write_buf = alloc_buf (PLAINTEXT_BUFFER_SIZE);
+ ks->plaintext_read_buf = alloc_buf (TLS_CHANNEL_BUF_SIZE);
+ ks->plaintext_write_buf = alloc_buf (TLS_CHANNEL_BUF_SIZE);
ks->ack_write_buf = alloc_buf (BUF_SIZE (&session->opt->frame));
reliable_init (ks->send_reliable, BUF_SIZE (&session->opt->frame),
FRAME_HEADROOM (&session->opt->frame), TLS_RELIABLE_N_SEND_BUFFERS,
@@ -3750,7 +3750,7 @@ tls_process (struct tls_multi *multi,
int status;
ASSERT (buf_init (buf, 0));
- status = key_state_read_plaintext (multi, ks, buf, PLAINTEXT_BUFFER_SIZE);
+ status = key_state_read_plaintext (multi, ks, buf, TLS_CHANNEL_BUF_SIZE);
update_time ();
if (status == -1)
{