X-Git-Url: http://www.privoxy.org/gitweb/?a=blobdiff_plain;f=fuzz.c;h=88fb74ce01e90aee8f37e3fbe1582a7dc4c8cc04;hb=c0a25f49786f337ee14f1825399434c8d446fe07;hp=7cb439de6cb976ebc1c7663ee03c03e759d11948;hpb=a78dfbfe1fafe1c451c312c322e626e9e4b3393c;p=privoxy.git diff --git a/fuzz.c b/fuzz.c index 7cb439de..88fb74ce 100644 --- a/fuzz.c +++ b/fuzz.c @@ -321,7 +321,7 @@ int fuzz_client_header(struct client_state *csp, char *fuzz_input_file) /* XXX: Enable more actions. */ - return(sed(csp, FILTER_CLIENT_HEADERS)); + return(JB_ERR_OK == sed(csp, FILTER_CLIENT_HEADERS)); } @@ -429,7 +429,7 @@ static int fuzz_gzip(struct client_state *csp, char *fuzz_input_file) * Function : fuzz_socks * * Description : Treat the fuzzed input as a socks response. - * XXX: This is pretty useless as parsing socks repsonse + * XXX: This is pretty useless as parsing socks response * is trivial. * * Parameters : @@ -520,7 +520,7 @@ int fuzz_server_header(struct client_state *csp, char *fuzz_input_file) /* XXX: Enable more actions. */ - return(sed(csp, FILTER_SERVER_HEADERS)); + return(JB_ERR_OK == sed(csp, FILTER_SERVER_HEADERS)); } /********************************************************************* @@ -547,6 +547,8 @@ int process_fuzzed_input(char *fuzz_input_type, char *fuzz_input_file) csp = &csp_stack_storage; csp->config = &config_stack_storage; csp->config->buffer_limit = 4096 * 1024; + csp->config->receive_buffer_size = 4096; + /* In --stfu mode, these will be ignored ... */ set_debug_level(LOG_LEVEL_ACTIONS|LOG_LEVEL_CONNECT|LOG_LEVEL_DEANIMATE|LOG_LEVEL_INFO|LOG_LEVEL_ERROR|LOG_LEVEL_RE_FILTER|LOG_LEVEL_HEADER|LOG_LEVEL_WRITING|LOG_LEVEL_RECEIVED);