X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;ds=sidebyside;f=fuzz.c;h=88fb74ce01e90aee8f37e3fbe1582a7dc4c8cc04;hb=c232134d35de4cb1f62b895961838db6b7c37774;hp=e483ba322160e78fa847b9b52543e522e717068a;hpb=83acee61d2f7e4a3c2e6e9e6b582849867d2324e;p=privoxy.git diff --git a/fuzz.c b/fuzz.c index e483ba32..88fb74ce 100644 --- a/fuzz.c +++ b/fuzz.c @@ -321,7 +321,7 @@ int fuzz_client_header(struct client_state *csp, char *fuzz_input_file) /* XXX: Enable more actions. */ - return(sed(csp, FILTER_CLIENT_HEADERS)); + return(JB_ERR_OK == sed(csp, FILTER_CLIENT_HEADERS)); } @@ -429,7 +429,7 @@ static int fuzz_gzip(struct client_state *csp, char *fuzz_input_file) * Function : fuzz_socks * * Description : Treat the fuzzed input as a socks response. - * XXX: This is pretty useless as parsing socks repsonse + * XXX: This is pretty useless as parsing socks response * is trivial. * * Parameters : @@ -520,7 +520,7 @@ int fuzz_server_header(struct client_state *csp, char *fuzz_input_file) /* XXX: Enable more actions. */ - return(sed(csp, FILTER_SERVER_HEADERS)); + return(JB_ERR_OK == sed(csp, FILTER_SERVER_HEADERS)); } /********************************************************************* @@ -530,8 +530,6 @@ int fuzz_server_header(struct client_state *csp, char *fuzz_input_file) * Description : Process the fuzzed input in a specified file treating * it like the input type specified. * - * XXX: Does not check malloc succcess. - * * Parameters : * 1 : fuzz_input_type = Type of input. * 2 : fuzz_input_file = File to read the input from. @@ -549,6 +547,8 @@ int process_fuzzed_input(char *fuzz_input_type, char *fuzz_input_file) csp = &csp_stack_storage; csp->config = &config_stack_storage; csp->config->buffer_limit = 4096 * 1024; + csp->config->receive_buffer_size = 4096; + /* In --stfu mode, these will be ignored ... */ set_debug_level(LOG_LEVEL_ACTIONS|LOG_LEVEL_CONNECT|LOG_LEVEL_DEANIMATE|LOG_LEVEL_INFO|LOG_LEVEL_ERROR|LOG_LEVEL_RE_FILTER|LOG_LEVEL_HEADER|LOG_LEVEL_WRITING|LOG_LEVEL_RECEIVED);