{
picotls_ctx_t *ptls_ctx = (picotls_ctx_t *) ctx;
vec_free (ptls_ctx->rx_content);
+ ptls_free (ptls_ctx->tls);
vec_free (ptls_ctx->write_content);
pool_put_index (picotls_main.ctx_pool[ctx->c_thread_index],
ptls_ctx->ptls_ctx_idx);
picotls_handle_handshake_failure (ctx);
return 0;
}
- picotls_ctx_t *ptls_ctx = (picotls_ctx_t *) ctx;
- ptls_free (ptls_ctx->tls);
session_transport_closing_notify (&ctx->connection);
return 0;
}
int off = 0, ret, i = 0, read = 0, len;
const int n_segs = 4, max_len = 32768;
svm_fifo_t *tcp_rx_fifo, *app_rx_fifo;
+ picotls_main_t *pm = &picotls_main;
svm_fifo_seg_t fs[n_segs];
session_t *app_session;
+ u32 thread_index;
uword deq_now;
if (PREDICT_FALSE (!ptls_handshake_is_complete (ptls_ctx->tls)))
if (len <= 0)
goto final_checks;
- ptls_buffer_init (buf, "", 0);
+ thread_index = ptls_ctx->ctx.c_thread_index;
+ vec_validate (pm->rx_bufs[thread_index], 2 * max_len);
+ ptls_buffer_init (buf, pm->rx_bufs[thread_index], 2 * max_len);
ptls_ctx->read_buffer_offset = 0;
while (read < len && i < n_segs)
}
else
{
- ptls_buffer_dispose (buf);
+ buf->off = 0;
+ ptls_ctx->read_buffer_offset = 0;
}
if (app_session->session_state >= SESSION_STATE_READY)
num_threads = 1 + vtm->n_threads;
vec_validate (pm->ctx_pool, num_threads - 1);
-
+ vec_validate (pm->rx_bufs, num_threads - 1);
clib_rwlock_init (&picotls_main.crypto_keys_rw_lock);
tls_register_engine (&picotls_engine, CRYPTO_ENGINE_PICOTLS);