fix bug in calls to ssl_read and ssl_send where extra verbose flag goes missing (#1033)

-extra verbose has int value of 2, ensure it's not lost when calling
ssl_read and ssl_send
This commit is contained in:
Scott Godin 2022-10-21 14:06:16 -04:00 committed by GitHub
parent 5d38fbab05
commit baa69d0815
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -2584,7 +2584,7 @@ static int socket_input_worker(ioa_socket_handle s)
if(s->ssl && (len>0)) { /* DTLS */
send_ssl_backlog_buffers(s);
buf_elem->buf.len = (size_t)len;
ret = ssl_read(s->fd, s->ssl, (ioa_network_buffer_handle)buf_elem, ((s->e) && s->e->verbose));
ret = ssl_read(s->fd, s->ssl, (ioa_network_buffer_handle)buf_elem, (s->e ? s->e->verbose : TURN_VERBOSE_NONE));
addr_cpy(&remote_addr,&(s->remote_addr));
if(ret < 0) {
len = -1;
@ -3103,7 +3103,7 @@ static int send_ssl_backlog_buffers(ioa_socket_handle s)
if(s) {
stun_buffer_list_elem *buf_elem = s->bufs.head;
while(buf_elem) {
int rc = ssl_send(s, (char*)buf_elem->buf.buf + buf_elem->buf.offset - buf_elem->buf.coffset, (size_t)buf_elem->buf.len, ((s->e) && s->e->verbose));
int rc = ssl_send(s, (char*)buf_elem->buf.buf + buf_elem->buf.offset - buf_elem->buf.coffset, (size_t)buf_elem->buf.len, (s->e ? s->e->verbose : TURN_VERBOSE_NONE));
if(rc<1)
break;
++ret;
@ -3279,7 +3279,7 @@ int send_data_from_ioa_socket_nbh(ioa_socket_handle s, ioa_addr* dest_addr,
s,
(char*) ioa_network_buffer_data(nbh),
ioa_network_buffer_get_size(nbh),
((s->e) && s->e->verbose));
(s->e ? s->e->verbose : TURN_VERBOSE_NONE));
if (ret < 0)
s->tobeclosed = 1;
else if (ret == 0)