diff options
author | Werner Koch <wk@gnupg.org> | 2019-07-05 08:41:42 +0200 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2019-07-05 10:33:13 +0200 |
commit | b0e8724b102535c27a8c973ec038d340858a8eb8 (patch) | |
tree | ab76f4e91090bdfba5aabfdc976860dabee1c16d /tools | |
parent | sm: Return the last error for pubkey decryption. (diff) | |
download | gnupg2-b0e8724b102535c27a8c973ec038d340858a8eb8.tar.xz gnupg2-b0e8724b102535c27a8c973ec038d340858a8eb8.zip |
wkd: Change client/server limit back to 64 KiB
* tools/wks-receive.c (decrypt_data): Change limit.
--
The former limit ~1MiB of was used during development.
Signed-off-by: Werner Koch <wk@gnupg.org>
Diffstat (limited to 'tools')
-rw-r--r-- | tools/wks-receive.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/tools/wks-receive.c b/tools/wks-receive.c index e67da628d..e5d2ed4b2 100644 --- a/tools/wks-receive.c +++ b/tools/wks-receive.c @@ -96,7 +96,7 @@ decrypt_data (receive_ctx_t ctx) /* We limit the output to 64 KiB to avoid DoS using compression * tricks. A regular client will anyway only send a minimal key; * that is one w/o key signatures and attribute packets. */ - ccparray_put (&ccp, "--max-output=0xf0000"); /*FIXME: Change s/F/1/ */ + ccparray_put (&ccp, "--max-output=0x10000"); ccparray_put (&ccp, "--batch"); if (opt.verbose) ccparray_put (&ccp, "--verbose"); |