diff options
author | Diego 'Flameeyes' Pettenò <flameeyes@gmail.com> | 2006-11-11 00:05:22 +0000 |
---|---|---|
committer | Diego 'Flameeyes' Pettenò <flameeyes@gmail.com> | 2006-11-11 00:05:22 +0000 |
commit | ea5467d17ad895e93fc2e824e549733ad80d758e (patch) | |
tree | 990ab5cf80c9a025f53215bac42d0323bdc9b6f1 | |
parent | c87eb88b9ed442c1592fb123f977b03629b96605 (diff) | |
download | xine-lib-ea5467d17ad895e93fc2e824e549733ad80d758e.tar.gz xine-lib-ea5467d17ad895e93fc2e824e549733ad80d758e.tar.bz2 |
When reading, read goes to asf_header_buffer, not asf_header (that luckily enough was still NULL so that we didn't end up overwriting the wrong memory location (thus causing more issues). This should fix bug #1582987.
CVS patchset: 8370
CVS date: 2006/11/11 00:05:22
-rw-r--r-- | src/input/mmsh.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/input/mmsh.c b/src/input/mmsh.c index 76854b409..889596cf7 100644 --- a/src/input/mmsh.c +++ b/src/input/mmsh.c @@ -17,7 +17,7 @@ * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA * - * $Id: mmsh.c,v 1.39 2006/09/07 07:21:06 tmattern Exp $ + * $Id: mmsh.c,v 1.40 2006/11/11 00:05:22 dgp85 Exp $ * * MMS over HTTP protocol * written by Thibaut Mattern @@ -393,7 +393,7 @@ static int get_header (mmsh_t *this) { "libmmsh: the asf header exceed %d bytes\n", ASF_HEADER_SIZE); return 0; } else { - len = _x_io_tcp_read(this->stream, this->s, (char*)(this->asf_header + this->asf_header_len), + len = _x_io_tcp_read(this->stream, this->s, (char*)(this->asf_header_buffer + this->asf_header_len), this->chunk_length); this->asf_header_len += len; if (len != this->chunk_length) { |