summaryrefslogblamecommitdiff
path: root/net/rtsp_proxy/files/patch-ac
blob: 459a4e85813ec4359e572d7ad9c58f61020d8f31 (plain) (tree)





















                                                                              





























                                                       
--- ../proxy.c	Tue Jul  6 17:42:19 1999
+++ ../proxy.c	Tue Jul 20 22:26:39 1999
@@ -1142,7 +1142,18 @@
 			}
 			//
 			// did we get a complete response yet?
-			if (! has_two_crlfs(s->sinbuf))
+			//
+
+// this used to look for a blank line, which is a dumb way to check if we 
+// have a complete response since that only means we have a complete header. 
+// the correct method would be to check the 'Content-Length:' header, but 
+// that's too much trouble without a lot of re-writing. so this is a cheap 
+// hack to look and see if the buffer ends on a 'CRLF' pair - this might get 
+// broken if we happen to break on an end-of-line, but it's better than 
+// nothing.  
+
+			pBuf = s->sinbuf + s->amtInServerInBuffer - 2;
+			if ((pBuf[0] != '\r') || (pBuf[1] != '\n'))
 				break;
 
 			//
--- ../proxy.c.orig	Sat Oct 16 10:29:52 1999
+++ ../proxy.c	Sat Oct 16 10:30:01 1999
@@ -127,7 +127,9 @@
 //int		gUDPPortMin = 4000;
 //int		gUDPPortMax = 65535;
 
-int		gProxyIP = -1;
+#define ANY_ADDRESS	-1
+
+int		gProxyIP = ANY_ADDRESS;
 int		gMaxPorts = 0;
 
 unsigned long gBytesReceived = 0;
@@ -137,7 +139,6 @@
 unsigned long gLastPacketsReceived = 0;
 unsigned long gLastPacketsSent = 0;
 
-#define ANY_ADDRESS	-1
 
 /**********************************************/
 #if defined(unix)
@@ -243,7 +244,7 @@
 		add_rtsp_port_listener(listening_port);
 
 	//
-	gProxyIP = get_local_ip_address();
+	//gProxyIP = get_local_ip_address();
 
 	//
 	// compile regular expressions for RTSP