mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2025-07-07 00:04:57 +03:00
- Fixed the problem occurs when RPC messages between Cluster Members exceed 64Kbytes.
- Fixed the RADIUS PEAP client to use the standard TLS versioning. - Implementation of a function to fix the MAC address of L3 VPN protocol by entering e.g. "MAC: 112233445566" in the "Notes" field of the user information. - Implementation of a function to fix the virtual MAC address to be assigned to the L3 VPN client as a string attribute from RADIUS server when authentication.
This commit is contained in:
@ -19947,6 +19947,10 @@ void FlushTubeFlushList(TUBE_FLUSH_LIST *f)
|
||||
|
||||
// The server receives a PACK from the client
|
||||
PACK *HttpServerRecv(SOCK *s)
|
||||
{
|
||||
return HttpServerRecvEx(s, 0);
|
||||
}
|
||||
PACK *HttpServerRecvEx(SOCK *s, UINT max_data_size)
|
||||
{
|
||||
BUF *b;
|
||||
PACK *p;
|
||||
@ -19955,6 +19959,7 @@ PACK *HttpServerRecv(SOCK *s)
|
||||
UCHAR *tmp;
|
||||
HTTP_VALUE *v;
|
||||
UINT num_noop = 0;
|
||||
if (max_data_size == 0) max_data_size = HTTP_PACK_MAX_SIZE;
|
||||
// Validate arguments
|
||||
if (s == NULL)
|
||||
{
|
||||
@ -19985,7 +19990,7 @@ START:
|
||||
}
|
||||
|
||||
size = GetContentLength(h);
|
||||
if (size == 0 || size > HTTP_PACK_MAX_SIZE)
|
||||
if (size == 0 || (size > max_data_size))
|
||||
{
|
||||
FreeHttpHeader(h);
|
||||
goto BAD_REQUEST;
|
||||
|
@ -969,6 +969,7 @@ bool HttpSendNotImplemented(SOCK *s, char *method, char *target, char *version);
|
||||
bool HttpServerSend(SOCK *s, PACK *p);
|
||||
bool HttpClientSend(SOCK *s, PACK *p);
|
||||
PACK *HttpServerRecv(SOCK *s);
|
||||
PACK *HttpServerRecvEx(SOCK *s, UINT max_data_size);
|
||||
PACK *HttpClientRecv(SOCK *s);
|
||||
|
||||
bool GetIPViaDnsProxyForJapanFlets(IP *ip_ret, char *hostname, bool ipv6, UINT timeout, bool *cancel, char *dns_proxy_hostname);
|
||||
|
Reference in New Issue
Block a user