1
0
mirror of https://github.com/SoftEtherVPN/SoftEtherVPN.git synced 2025-11-19 09:51:35 +03:00

6 Commits

Author SHA1 Message Date
acbc514b87 Merge pull request #2170 from kanglongwei/branch2
fix: #2166 L3KnownArp, delete entry from the incorrect list
2025-10-28 21:44:25 +01:00
d9d78a0b2c Merge pull request #2171 from chipitsine/master
CI: modernize freebsd image
2025-10-25 11:26:11 +02:00
1373ed4c6c CI: modernize freebsd image 2025-10-25 10:08:15 +02:00
ffe9ade675 Merge pull request #2169 from kanglongwei/branch1
fix: #2165 memory leak
2025-10-13 14:13:55 +02:00
ab245552b1 fix: #2165 memory leak 2025-10-13 20:05:28 +08:00
fdcb0a207b fix: #2166 L3KnownArp, delete entry from the incorrect list 2025-10-10 21:20:30 +08:00
3 changed files with 6 additions and 6 deletions

View File

@ -4,14 +4,14 @@ FreeBSD_task:
SSL: openssl
OPENSSL_ROOT_DIR: /usr/local
env:
SSL: openssl32
SSL: openssl36
OPENSSL_ROOT_DIR: /usr/local
env:
# base openssl
SSL:
matrix:
freebsd_instance:
image_family: freebsd-14-2
image_family: freebsd-14-3
prepare_script:
- pkg install -y pkgconf cmake git libsodium cpu_features $SSL
- git submodule update --init --recursive

View File

@ -457,10 +457,10 @@ void L3KnownArp(L3IF *f, UINT ip, UCHAR *mac)
// Delete an ARP query entry to this IP address
Zero(&t, sizeof(t));
t.IpAddress = ip;
w = Search(f->IpWaitList, &t);
w = Search(f->ArpWaitTable, &t);
if (w != NULL)
{
Delete(f->IpWaitList, w);
Delete(f->ArpWaitTable, w);
Free(w);
}

View File

@ -5843,7 +5843,6 @@ bool ServerDownloadSignature(CONNECTION *c, char **error_detail_str)
// Target is invalid
HttpSendNotFound(s, h->Target);
Free(data);
FreeHttpHeader(h);
*error_detail_str = "POST_Target_Wrong";
}
else
@ -5861,10 +5860,10 @@ bool ServerDownloadSignature(CONNECTION *c, char **error_detail_str)
{
// WaterMark is incorrect
HttpSendForbidden(s, h->Target, NULL);
FreeHttpHeader(h);
*error_detail_str = "POST_WaterMark_Error";
}
}
FreeHttpHeader(h);
}
else if (StrCmpi(h->Method, "OPTIONS") == 0)
{
@ -5884,6 +5883,7 @@ bool ServerDownloadSignature(CONNECTION *c, char **error_detail_str)
continue;
}
}
FreeHttpHeader(h);
}
else if (StrCmpi(h->Method, "SSTP_DUPLEX_POST") == 0 && (ProtoEnabled(server->Proto, "SSTP") || s->IsReverseAcceptedSocket) && GetServerCapsBool(server, "b_support_sstp"))
{