|
|
|
@ -800,9 +800,6 @@ static void *__sxmpl_thread(void *b)
|
|
|
|
|
goto __finish; /* go away if required asap */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#ifdef _VERBOSE_DEBUG
|
|
|
|
|
dumphead(mhead);
|
|
|
|
|
#endif
|
|
|
|
|
if(rd < 0) {
|
|
|
|
|
__sslproto_error:
|
|
|
|
|
co->flags |= SXMP_CLOSED;
|
|
|
|
@ -948,7 +945,7 @@ static void *__sxmpl_thread(void *b)
|
|
|
|
|
} else if((!(mhead->attr & SXMSG_CLOSED) && !(mhead->attr & SXMSG_OPEN)) &&
|
|
|
|
|
(mhead->attr & SXMSG_REPLYREQ)) { /* ongoing dialog */
|
|
|
|
|
/* check for the message */
|
|
|
|
|
if(mhead->msgid >= 1024) goto __inval_idx_nor;
|
|
|
|
|
if(mhead->msgid >= MAX_MSGINPROCESS) goto __inval_idx_nor;
|
|
|
|
|
mid = mhead->msgid;
|
|
|
|
|
msg = co->messages[mid];
|
|
|
|
|
if(!msg) goto __inval_idx_nor;
|
|
|
|
@ -1068,9 +1065,7 @@ sxlink_t *sxlink_master_accept(sxhub_t *ssys, int sck, struct in_addr *addr)
|
|
|
|
|
SSL_set_ex_data(co->ssl, ex_ssldata_index, (void *)co);
|
|
|
|
|
SSL_set_accept_state(co->ssl);
|
|
|
|
|
if(SSL_accept(co->ssl) == -1) { r = SXE_EPERM; goto __fail; } /* leak here ? */
|
|
|
|
|
// SSL_do_handshake(co->ssl);
|
|
|
|
|
|
|
|
|
|
/* ok, now we are able to allocate and so on */
|
|
|
|
|
/* set connection to the batch mode */
|
|
|
|
|
co->flags |= SXMP_BATCHMODE;
|
|
|
|
|
/* allocate our first buffer */
|
|
|
|
|