diff options
author | Fabiano Fidêncio <fidencio@redhat.com> | 2015-09-25 00:34:42 +0200 |
---|---|---|
committer | Fabiano Fidêncio <fidencio@redhat.com> | 2015-10-12 13:56:21 +0200 |
commit | d1de73c7aaa65b2a137ada57b479d5a42e4c212f (patch) | |
tree | e1796b2137d3c6553dfbb4bf6af9aef7889f2d9d /src/gzip.c | |
parent | c12915e5037fe37fabf17126e57f08e5c4a49971 (diff) | |
download | libssh-d1de73c7aaa65b2a137ada57b479d5a42e4c212f.tar.gz libssh-d1de73c7aaa65b2a137ada57b479d5a42e4c212f.tar.xz libssh-d1de73c7aaa65b2a137ada57b479d5a42e4c212f.zip |
buffer: do not use ssh_buffer_get_rest_len()
As ssh_buffer_get_len() actually calls ssh_buffer_get_rest_len(), let's
just use the first one. This is a preparatory step for removing
ssh_buffer_get_rest_len().
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
Diffstat (limited to 'src/gzip.c')
-rw-r--r-- | src/gzip.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -59,7 +59,7 @@ static z_stream *initcompress(ssh_session session, int level) { static ssh_buffer gzip_compress(ssh_session session,ssh_buffer source,int level){ z_stream *zout = session->current_crypto->compress_out_ctx; void *in_ptr = ssh_buffer_get(source); - unsigned long in_size = ssh_buffer_get_rest_len(source); + unsigned long in_size = ssh_buffer_get_len(source); ssh_buffer dest = NULL; unsigned char out_buf[BLOCKSIZE] = {0}; unsigned long len; @@ -113,7 +113,7 @@ int compress_buffer(ssh_session session, ssh_buffer buf) { return -1; } - if (ssh_buffer_add_data(buf, ssh_buffer_get(dest), ssh_buffer_get_rest_len(dest)) < 0) { + if (ssh_buffer_add_data(buf, ssh_buffer_get(dest), ssh_buffer_get_len(dest)) < 0) { ssh_buffer_free(dest); return -1; } @@ -148,7 +148,7 @@ static z_stream *initdecompress(ssh_session session) { static ssh_buffer gzip_decompress(ssh_session session, ssh_buffer source, size_t maxlen) { z_stream *zin = session->current_crypto->compress_in_ctx; void *in_ptr = ssh_buffer_get(source); - unsigned long in_size = ssh_buffer_get_rest_len(source); + unsigned long in_size = ssh_buffer_get_len(source); unsigned char out_buf[BLOCKSIZE] = {0}; ssh_buffer dest = NULL; unsigned long len; @@ -185,7 +185,7 @@ static ssh_buffer gzip_decompress(ssh_session session, ssh_buffer source, size_t ssh_buffer_free(dest); return NULL; } - if (ssh_buffer_get_rest_len(dest) > maxlen){ + if (ssh_buffer_get_len(dest) > maxlen){ /* Size of packet exceeded, avoid a denial of service attack */ ssh_buffer_free(dest); return NULL; @@ -209,7 +209,7 @@ int decompress_buffer(ssh_session session,ssh_buffer buf, size_t maxlen){ return -1; } - if (ssh_buffer_add_data(buf, ssh_buffer_get(dest), ssh_buffer_get_rest_len(dest)) < 0) { + if (ssh_buffer_add_data(buf, ssh_buffer_get(dest), ssh_buffer_get_len(dest)) < 0) { ssh_buffer_free(dest); return -1; } |