mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2025-07-08 08:44:57 +03:00
- Fixed the problem occurs when RPC messages between Cluster Members exceed 64Kbytes.
- Fixed the RADIUS PEAP client to use the standard TLS versioning. - Implementation of a function to fix the MAC address of L3 VPN protocol by entering e.g. "MAC: 112233445566" in the "Notes" field of the user information. - Implementation of a function to fix the virtual MAC address to be assigned to the L3 VPN client as a string attribute from RADIUS server when authentication.
This commit is contained in:
@ -19947,6 +19947,10 @@ void FlushTubeFlushList(TUBE_FLUSH_LIST *f)
|
||||
|
||||
// The server receives a PACK from the client
|
||||
PACK *HttpServerRecv(SOCK *s)
|
||||
{
|
||||
return HttpServerRecvEx(s, 0);
|
||||
}
|
||||
PACK *HttpServerRecvEx(SOCK *s, UINT max_data_size)
|
||||
{
|
||||
BUF *b;
|
||||
PACK *p;
|
||||
@ -19955,6 +19959,7 @@ PACK *HttpServerRecv(SOCK *s)
|
||||
UCHAR *tmp;
|
||||
HTTP_VALUE *v;
|
||||
UINT num_noop = 0;
|
||||
if (max_data_size == 0) max_data_size = HTTP_PACK_MAX_SIZE;
|
||||
// Validate arguments
|
||||
if (s == NULL)
|
||||
{
|
||||
@ -19985,7 +19990,7 @@ START:
|
||||
}
|
||||
|
||||
size = GetContentLength(h);
|
||||
if (size == 0 || size > HTTP_PACK_MAX_SIZE)
|
||||
if (size == 0 || (size > max_data_size))
|
||||
{
|
||||
FreeHttpHeader(h);
|
||||
goto BAD_REQUEST;
|
||||
|
Reference in New Issue
Block a user