improve binary compatibility
This commit is contained in:
@@ -162,7 +162,7 @@ static int ssl3_read_n(SSL *s, int n, int max, int extend)
|
||||
|
||||
{
|
||||
/* avoid buffer overflow */
|
||||
int max_max = s->s3->rbuf.len - s->packet_length;
|
||||
int max_max = s->s3->rbuf_len - s->packet_length;
|
||||
if (max > max_max)
|
||||
max = max_max;
|
||||
}
|
||||
@@ -245,7 +245,7 @@ static int ssl3_get_record(SSL *s)
|
||||
extra=SSL3_RT_MAX_EXTRA;
|
||||
else
|
||||
extra=0;
|
||||
if (extra != (s->s3->rbuf.len - SSL3_RT_MAX_PACKET_SIZE))
|
||||
if (extra != (s->s3->rbuf_len - SSL3_RT_MAX_PACKET_SIZE))
|
||||
{
|
||||
/* actually likely an application error: SLS_OP_MICROSOFT_BIG_SSLV3_BUFFER
|
||||
* set after ssl3_setup_buffers() was done */
|
||||
@@ -258,7 +258,7 @@ again:
|
||||
if ( (s->rstate != SSL_ST_READ_BODY) ||
|
||||
(s->packet_length < SSL3_RT_HEADER_LENGTH))
|
||||
{
|
||||
n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf.len, 0);
|
||||
n=ssl3_read_n(s, SSL3_RT_HEADER_LENGTH, s->s3->rbuf_len, 0);
|
||||
if (n <= 0) return(n); /* error or non-blocking */
|
||||
s->rstate=SSL_ST_READ_BODY;
|
||||
|
||||
@@ -605,7 +605,7 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
|
||||
if (prefix_len <= 0)
|
||||
goto err;
|
||||
|
||||
if (s->s3->wbuf.len < prefix_len + SSL3_RT_MAX_PACKET_SIZE)
|
||||
if (s->s3->wbuf_len < prefix_len + SSL3_RT_MAX_PACKET_SIZE)
|
||||
{
|
||||
/* insufficient space */
|
||||
SSLerr(SSL_F_DO_SSL3_WRITE, SSL_R_INTERNAL_ERROR);
|
||||
|
Reference in New Issue
Block a user