X-Git-Url: https://ruderich.org/simon/gitweb/?a=blobdiff_plain;f=src%2Fconnection.c;h=4e98f309dd063bfa5ba4eec470396cfe1c789468;hb=5b89dd9a588526e83fe43ca54c3caec96fca9575;hp=e4b0b29f1b1575dcefb32518c58eb9ef43f3357e;hpb=0b7b01d255126abef7b882c894412a85ad2bdecc;p=tlsproxy%2Ftlsproxy.git diff --git a/src/connection.c b/src/connection.c index e4b0b29..4e98f30 100644 --- a/src/connection.c +++ b/src/connection.c @@ -199,7 +199,7 @@ void handle_connection(int client_socket) { * certificate then just pass through the connection and let the client * verify the server certificate. */ if (global_passthrough_unknown) { - char path[1024]; + char path[TLSPROXY_MAX_PATH_LENGTH]; FILE *file = NULL; if (-2 == server_certificate_file(&file, host, path, sizeof(path))) { @@ -353,7 +353,7 @@ static int initialize_tls_session_client(int peer_socket, gnutls_certificate_credentials_t *x509_cred) { int result; int use_invalid_cert; - char path[1024]; + char path[TLSPROXY_MAX_PATH_LENGTH]; /* The "invalid" hostname is special. If it's used we send an invalid * certificate to let the client know something is wrong. */