summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDiego 'Flameeyes' Pettenò <flameeyes@gmail.com>2006-11-11 00:05:22 +0000
committerDiego 'Flameeyes' Pettenò <flameeyes@gmail.com>2006-11-11 00:05:22 +0000
commitea5467d17ad895e93fc2e824e549733ad80d758e (patch)
tree990ab5cf80c9a025f53215bac42d0323bdc9b6f1
parentc87eb88b9ed442c1592fb123f977b03629b96605 (diff)
downloadxine-lib-ea5467d17ad895e93fc2e824e549733ad80d758e.tar.gz
xine-lib-ea5467d17ad895e93fc2e824e549733ad80d758e.tar.bz2
When reading, read goes to asf_header_buffer, not asf_header (that luckily enough was still NULL so that we didn't end up overwriting the wrong memory location (thus causing more issues). This should fix bug #1582987.
CVS patchset: 8370 CVS date: 2006/11/11 00:05:22
-rw-r--r--src/input/mmsh.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/input/mmsh.c b/src/input/mmsh.c
index 76854b409..889596cf7 100644
--- a/src/input/mmsh.c
+++ b/src/input/mmsh.c
@@ -17,7 +17,7 @@
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
*
- * $Id: mmsh.c,v 1.39 2006/09/07 07:21:06 tmattern Exp $
+ * $Id: mmsh.c,v 1.40 2006/11/11 00:05:22 dgp85 Exp $
*
* MMS over HTTP protocol
* written by Thibaut Mattern
@@ -393,7 +393,7 @@ static int get_header (mmsh_t *this) {
"libmmsh: the asf header exceed %d bytes\n", ASF_HEADER_SIZE);
return 0;
} else {
- len = _x_io_tcp_read(this->stream, this->s, (char*)(this->asf_header + this->asf_header_len),
+ len = _x_io_tcp_read(this->stream, this->s, (char*)(this->asf_header_buffer + this->asf_header_len),
this->chunk_length);
this->asf_header_len += len;
if (len != this->chunk_length) {