Comment # 5
on bug 9044
from Andrea
Created attachment 11477 [details]
follow_tcp.c Patch
There were some errors in follow_tcp.c:
1)The "skip" flag wasn't considered in gzip response which lead to "Server
side" be always visible if gzipped.
2)The "gunzip" flag wasn't reset when closing the first gzip stream, so the
next call to inflate would crash 'cause the stream is invalidated in
inflateEnd()
3)The chunk size was too little to decompress the stream, I set it to 2048
bytes, anyway RFC 1951 says that the maximum size of a gzip chunk is 65,535
bytes so it could be a problem wherever there's a big chunk (over 2048 bytes)
You are receiving this mail because:
- You are watching all bug changes.