After SECBUFFER_MISSING support gets in we could take advantage of it here to make the handshake more efficient.
From: Hans Leidekker hans@codeweavers.com
--- dlls/winhttp/net.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/dlls/winhttp/net.c b/dlls/winhttp/net.c index 40c9f3c8534..be776ae2971 100644 --- a/dlls/winhttp/net.c +++ b/dlls/winhttp/net.c @@ -350,7 +350,7 @@ DWORD netconn_secure_connect( struct netconn *conn, WCHAR *hostname, DWORD secur }
assert(in_bufs[0].BufferType == SECBUFFER_TOKEN); - assert(in_bufs[1].BufferType == SECBUFFER_EMPTY); + in_bufs[1].BufferType = SECBUFFER_EMPTY;
if(in_bufs[0].cbBuffer + 1024 > read_buf_size) { BYTE *new_read_buf;
From: Hans Leidekker hans@codeweavers.com
--- dlls/wininet/netconnection.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/dlls/wininet/netconnection.c b/dlls/wininet/netconnection.c index f89493967a2..a3ca03d3ef1 100644 --- a/dlls/wininet/netconnection.c +++ b/dlls/wininet/netconnection.c @@ -500,7 +500,7 @@ static DWORD netcon_secure_connect_setup(netconn_t *connection, BOOL compat_mode }
assert(in_bufs[0].BufferType == SECBUFFER_TOKEN); - assert(in_bufs[1].BufferType == SECBUFFER_EMPTY); + in_bufs[1].BufferType = SECBUFFER_EMPTY;
if(in_bufs[0].cbBuffer + 1024 > read_buf_size) { BYTE *new_read_buf;