forked from wolfSSL/wolfssl
release lock on client side cache bad hash
This commit is contained in:
@@ -5777,8 +5777,7 @@ int AddSession(CYASSL* ssl)
|
||||
&error) % SESSION_ROWS;
|
||||
if (error != 0) {
|
||||
CYASSL_MSG("Hash session failed");
|
||||
return error;
|
||||
}
|
||||
} else {
|
||||
clientIdx = ClientCache[clientRow].nextIdx++;
|
||||
|
||||
ClientCache[clientRow].Clients[clientIdx].serverRow = (word16)row;
|
||||
@@ -5788,6 +5787,7 @@ int AddSession(CYASSL* ssl)
|
||||
if (ClientCache[clientRow].nextIdx == SESSIONS_PER_ROW)
|
||||
ClientCache[clientRow].nextIdx = 0;
|
||||
}
|
||||
}
|
||||
else
|
||||
SessionCache[row].Sessions[idx].idLen = 0;
|
||||
#endif /* NO_CLIENT_CACHE */
|
||||
@@ -5795,7 +5795,7 @@ int AddSession(CYASSL* ssl)
|
||||
if (UnLockMutex(&session_mutex) != 0)
|
||||
return BAD_MUTEX_E;
|
||||
|
||||
return 0;
|
||||
return error;
|
||||
}
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user