749353
diff --git a/modules/ssl/ssl_engine_io.c b/modules/ssl/ssl_engine_io.c
749353
index 85c6ce7..4a9fc9a 100644
749353
--- a/modules/ssl/ssl_engine_io.c
749353
+++ b/modules/ssl/ssl_engine_io.c
749353
@@ -834,19 +834,20 @@ static apr_status_t ssl_filter_write(ap_filter_t *f,
749353
  * establish an outgoing SSL connection. */
749353
 #define MODSSL_ERROR_BAD_GATEWAY (APR_OS_START_USERERR + 1)
749353
 
749353
-static void ssl_io_filter_disable(SSLConnRec *sslconn, ap_filter_t *f)
749353
+static void ssl_io_filter_disable(SSLConnRec *sslconn, 
749353
+                                  bio_filter_in_ctx_t *inctx)
749353
 {
749353
-    bio_filter_in_ctx_t *inctx = f->ctx;
749353
     SSL_free(inctx->ssl);
749353
     sslconn->ssl = NULL;
749353
     inctx->ssl = NULL;
749353
     inctx->filter_ctx->pssl = NULL;
749353
 }
749353
 
749353
-static apr_status_t ssl_io_filter_error(ap_filter_t *f,
749353
+static apr_status_t ssl_io_filter_error(bio_filter_in_ctx_t *inctx,
749353
                                         apr_bucket_brigade *bb,
749353
                                         apr_status_t status)
749353
 {
749353
+    ap_filter_t *f = inctx->f;
749353
     SSLConnRec *sslconn = myConnConfig(f->c);
749353
     apr_bucket *bucket;
749353
     int send_eos = 1;
749353
@@ -860,7 +861,7 @@ static apr_status_t ssl_io_filter_error(ap_filter_t *f,
749353
             ssl_log_ssl_error(SSLLOG_MARK, APLOG_INFO, sslconn->server);
749353
 
749353
             sslconn->non_ssl_request = NON_SSL_SEND_HDR_SEP;
749353
-            ssl_io_filter_disable(sslconn, f);
749353
+            ssl_io_filter_disable(sslconn, inctx);
749353
 
749353
             /* fake the request line */
749353
             bucket = HTTP_ON_HTTPS_PORT_BUCKET(f->c->bucket_alloc);
749353
@@ -1342,7 +1343,7 @@ static apr_status_t ssl_io_filter_input(ap_filter_t *f,
749353
      * rather than have SSLEngine On configured.
749353
      */
749353
     if ((status = ssl_io_filter_handshake(inctx->filter_ctx)) != APR_SUCCESS) {
749353
-        return ssl_io_filter_error(f, bb, status);
749353
+        return ssl_io_filter_error(inctx, bb, status);
749353
     }
749353
 
749353
     if (is_init) {
749353
@@ -1396,7 +1397,7 @@ static apr_status_t ssl_io_filter_input(ap_filter_t *f,
749353
 
749353
     /* Handle custom errors. */
749353
     if (status != APR_SUCCESS) {
749353
-        return ssl_io_filter_error(f, bb, status);
749353
+        return ssl_io_filter_error(inctx, bb, status);
749353
     }
749353
 
749353
     /* Create a transient bucket out of the decrypted data. */
749353
@@ -1613,7 +1614,7 @@ static apr_status_t ssl_io_filter_output(ap_filter_t *f,
749353
     inctx->block = APR_BLOCK_READ;
749353
 
749353
     if ((status = ssl_io_filter_handshake(filter_ctx)) != APR_SUCCESS) {
749353
-        return ssl_io_filter_error(f, bb, status);
749353
+        return ssl_io_filter_error(inctx, bb, status);
749353
     }
749353
 
749353
     while (!APR_BRIGADE_EMPTY(bb)) {