Fixed one leak from struct_http

dynamic-accesslists
erdgeist 17 years ago
parent 8098adb48e
commit ddd85ec7e0

@ -610,8 +610,9 @@ static void handle_read( const int64 clientsocket ) {
ssize_t l;
if( ( l = io_tryread( clientsocket, static_inbuf, sizeof static_inbuf ) ) <= 0 ) {
if( h && ( h->flag & STRUCT_HTTP_FLAG_ARRAY_USED ) ) {
array_reset( &h->request );
if( h ) {
if( h->flag & STRUCT_HTTP_FLAG_ARRAY_USED )
array_reset( &h->request );
free( h );
}
io_close( clientsocket );
@ -645,7 +646,8 @@ static void handle_read( const int64 clientsocket ) {
static void handle_write( const int64 clientsocket ) {
struct http_data* h=io_getcookie( clientsocket );
if( !h || ( iob_send( clientsocket, &h->batch ) <= 0 ) ) {
if( !h ) return;
if( iob_send( clientsocket, &h->batch ) <= 0 ) {
iob_reset( &h->batch );
io_close( clientsocket );
free( h );
@ -666,14 +668,12 @@ static void handle_accept( const int64 serversocket ) {
io_close( i );
continue;
}
io_setcookie( i, h );
io_wantread( i );
byte_zero( h, sizeof( struct http_data ) );
memmove( h->ip, ip, sizeof( ip ) );
io_setcookie( i, h );
++ot_overall_tcp_connections;
/* That breaks taia encapsulation. But there is no way to take system

Loading…
Cancel
Save