diff options
author | Nick Mathewson <nickm@torproject.org> | 2009-08-14 14:34:16 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2010-09-27 12:31:14 -0400 |
commit | bd3612cd2b4c49fd9f9aec68b6268973e43f2b63 (patch) | |
tree | ec5e092ec63d687a326618e805066731abac637b /src/or/buffers.c | |
parent | fc4ddafab81d5ca229436eeb0c460634e03cb2ca (diff) | |
download | tor-bd3612cd2b4c49fd9f9aec68b6268973e43f2b63.tar tor-bd3612cd2b4c49fd9f9aec68b6268973e43f2b63.tar.gz |
Get SSL connections and linked connections working with bufferevents.
Clients are now verified to work and build circuits correctly. There
are still a few warnings given here and there that I need to look into.
Diffstat (limited to 'src/or/buffers.c')
-rw-r--r-- | src/or/buffers.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/or/buffers.c b/src/or/buffers.c index b750a0540..ffdbcd3b4 100644 --- a/src/or/buffers.c +++ b/src/or/buffers.c @@ -1083,7 +1083,7 @@ fetch_var_cell_from_evbuffer(struct evbuffer *buf, var_cell_t **out, goto done; } n = inspect_evbuffer(buf, &hdr, VAR_CELL_HEADER_SIZE, &free_hdr, NULL); - tor_assert(n == VAR_CELL_HEADER_SIZE); + tor_assert(n >= VAR_CELL_HEADER_SIZE); command = get_uint8(hdr+2); if (!(CELL_COMMAND_IS_VAR_LENGTH(command))) { |