diff options
author | Rob Crittenden <rcritten@redhat.com> | 2015-06-10 18:01:45 -0400 |
---|---|---|
committer | Rob Crittenden <rcritten@redhat.com> | 2015-06-10 18:02:17 -0400 |
commit | a62526d425dcbeaa1486cf685c2927afa0459e1d (patch) | |
tree | 2898f59fbdc2cf7cd9f5184706d7cc05b12df4bb /nss_engine_io.c | |
parent | cc9794ee5309782b5df1b782aa2e15bbd5068612 (diff) | |
download | mod_nss-a62526d425dcbeaa1486cf685c2927afa0459e1d.tar.gz mod_nss-a62526d425dcbeaa1486cf685c2927afa0459e1d.tar.xz mod_nss-a62526d425dcbeaa1486cf685c2927afa0459e1d.zip |
Add RenegBufferSize option
Control the buffer size used on a POST when SSL renegotiation is
being done. The default is 128K.
Resolves BZ 1214366
Diffstat (limited to 'nss_engine_io.c')
-rw-r--r-- | nss_engine_io.c | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/nss_engine_io.c b/nss_engine_io.c index c0fc20c..6e03a11 100644 --- a/nss_engine_io.c +++ b/nss_engine_io.c @@ -929,7 +929,7 @@ struct modnss_buffer_ctx { apr_pool_t *pool; }; -int nss_io_buffer_fill(request_rec *r) +int nss_io_buffer_fill(request_rec *r, apr_size_t maxlen) { conn_rec *c = r->connection; struct modnss_buffer_ctx *ctx; @@ -945,7 +945,8 @@ int nss_io_buffer_fill(request_rec *r) /* ... and a temporary brigade. */ tempb = apr_brigade_create(r->pool, c->bucket_alloc); - ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "filling buffer"); + ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "filling buffer, max size " + "%" APR_SIZE_T_FMT " bytes", maxlen); do { apr_status_t rv; @@ -1001,9 +1002,10 @@ int nss_io_buffer_fill(request_rec *r) total, eos); /* Fail if this exceeds the maximum buffer size. */ - if (total > SSL_MAX_IO_BUFFER) { + if (total > maxlen) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, - "request body exceeds maximum size for SSL buffer"); + "request body exceeds maximum size (%" APR_SIZE_T_FMT + ") for SSL buffer", maxlen); return HTTP_REQUEST_ENTITY_TOO_LARGE; } |