wininet: Remove MSG_PEEK hack from HTTP_GetResponseHeaders.

Fixes Quicken 2009. Aric said he added this hack back in 2002
to work around a bug in the IE6 installer, which installs fine
now without this hack.
This commit is contained in:
Hans Leidekker 2009-03-04 12:42:43 +01:00 committed by Alexandre Julliard
parent f716306f36
commit 96b639dc8a
1 changed files with 2 additions and 7 deletions

View File

@ -3832,18 +3832,13 @@ static INT HTTP_GetResponseHeaders(LPWININETHTTPREQW lpwhr, BOOL clear)
goto lend; goto lend;
do { do {
/*
* HACK peek at the buffer
*/
buflen = MAX_REPLY_LEN;
NETCON_recv(&lpwhr->netConnection, buffer, buflen, MSG_PEEK, &rc);
/* /*
* We should first receive 'HTTP/1.x nnn OK' where nnn is the status code. * We should first receive 'HTTP/1.x nnn OK' where nnn is the status code.
*/ */
memset(buffer, 0, MAX_REPLY_LEN); buflen = MAX_REPLY_LEN;
if (!NETCON_getNextLine(&lpwhr->netConnection, bufferA, &buflen)) if (!NETCON_getNextLine(&lpwhr->netConnection, bufferA, &buflen))
goto lend; goto lend;
rc += buflen;
MultiByteToWideChar( CP_ACP, 0, bufferA, buflen, buffer, MAX_REPLY_LEN ); MultiByteToWideChar( CP_ACP, 0, bufferA, buflen, buffer, MAX_REPLY_LEN );
/* split the version from the status code */ /* split the version from the status code */