wininet: Remove MSG_PEEK hack from HTTP_GetResponseHeaders.
Fixes Quicken 2009. Aric said he added this hack back in 2002 to work around a bug in the IE6 installer, which installs fine now without this hack.
This commit is contained in:
parent
f716306f36
commit
96b639dc8a
|
@ -3832,18 +3832,13 @@ static INT HTTP_GetResponseHeaders(LPWININETHTTPREQW lpwhr, BOOL clear)
|
||||||
goto lend;
|
goto lend;
|
||||||
|
|
||||||
do {
|
do {
|
||||||
/*
|
|
||||||
* HACK peek at the buffer
|
|
||||||
*/
|
|
||||||
buflen = MAX_REPLY_LEN;
|
|
||||||
NETCON_recv(&lpwhr->netConnection, buffer, buflen, MSG_PEEK, &rc);
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* We should first receive 'HTTP/1.x nnn OK' where nnn is the status code.
|
* We should first receive 'HTTP/1.x nnn OK' where nnn is the status code.
|
||||||
*/
|
*/
|
||||||
memset(buffer, 0, MAX_REPLY_LEN);
|
buflen = MAX_REPLY_LEN;
|
||||||
if (!NETCON_getNextLine(&lpwhr->netConnection, bufferA, &buflen))
|
if (!NETCON_getNextLine(&lpwhr->netConnection, bufferA, &buflen))
|
||||||
goto lend;
|
goto lend;
|
||||||
|
rc += buflen;
|
||||||
MultiByteToWideChar( CP_ACP, 0, bufferA, buflen, buffer, MAX_REPLY_LEN );
|
MultiByteToWideChar( CP_ACP, 0, bufferA, buflen, buffer, MAX_REPLY_LEN );
|
||||||
|
|
||||||
/* split the version from the status code */
|
/* split the version from the status code */
|
||||||
|
|
Loading…
Reference in New Issue