MAJOR: buffer: replace buf->l with buf->{o+i}

We don't have buf->l anymore. We have buf->i for pending data and
the total length is retrieved by adding buf->o. Some computation
already become simpler.

Despite extreme care, bugs are not excluded.

It's worth noting that msg->err_pos as set by HTTP request/response
analysers becomes relative to pending data and not to the beginning
of the buffer. This has not been completed yet so differences might
occur when outgoing data are left in the buffer.
diff --git a/src/acl.c b/src/acl.c
index 4630743..430f985 100644
--- a/src/acl.c
+++ b/src/acl.c
@@ -102,7 +102,7 @@
 	if (!l4 || !l4->req)
 		return 0;
 
-	temp_pattern.data.integer = l4->req->l;
+	temp_pattern.data.integer = l4->req->i;
 	test->flags = ACL_TEST_F_VOLATILE | ACL_TEST_F_MAY_CHANGE;
 	return 1;
 }
@@ -122,7 +122,7 @@
 
 	b = ((dir & ACL_DIR_MASK) == ACL_DIR_RTR) ? l4->rep : l4->req;
 
-	bleft = b->l;
+	bleft = b->i;
 	data = (const unsigned char *)b->w;
 
 	if (!bleft)
@@ -187,7 +187,7 @@
 		return 0;
 
 	msg_len = 0;
-	bleft = l4->req->l;
+	bleft = l4->req->i;
 	if (!bleft)
 		goto too_short;
 
@@ -324,7 +324,7 @@
 
 	b = ((dir & ACL_DIR_MASK) == ACL_DIR_RTR) ? l4->rep : l4->req;
 
-	bleft = b->l;
+	bleft = b->i;
 	data = (unsigned char *)b->w;
 
 	/* Check for SSL/TLS Handshake */
@@ -459,7 +459,7 @@
 
 	test->flags = 0;
 
-	bleft = l4->req->l;
+	bleft = l4->req->i;
 	if (bleft <= 11)
 		goto too_short;