From ea5467d17ad895e93fc2e824e549733ad80d758e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Diego=20=27Flameeyes=27=20Petten=C3=B2?= Date: Sat, 11 Nov 2006 00:05:22 +0000 Subject: When reading, read goes to asf_header_buffer, not asf_header (that luckily enough was still NULL so that we didn't end up overwriting the wrong memory location (thus causing more issues). This should fix bug #1582987. CVS patchset: 8370 CVS date: 2006/11/11 00:05:22 --- src/input/mmsh.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/input/mmsh.c b/src/input/mmsh.c index 76854b409..889596cf7 100644 --- a/src/input/mmsh.c +++ b/src/input/mmsh.c @@ -17,7 +17,7 @@ * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA * - * $Id: mmsh.c,v 1.39 2006/09/07 07:21:06 tmattern Exp $ + * $Id: mmsh.c,v 1.40 2006/11/11 00:05:22 dgp85 Exp $ * * MMS over HTTP protocol * written by Thibaut Mattern @@ -393,7 +393,7 @@ static int get_header (mmsh_t *this) { "libmmsh: the asf header exceed %d bytes\n", ASF_HEADER_SIZE); return 0; } else { - len = _x_io_tcp_read(this->stream, this->s, (char*)(this->asf_header + this->asf_header_len), + len = _x_io_tcp_read(this->stream, this->s, (char*)(this->asf_header_buffer + this->asf_header_len), this->chunk_length); this->asf_header_len += len; if (len != this->chunk_length) { -- cgit v1.2.3