-
rswindell authored
1: Wrap SSH cryptDestroySession() calls in a wrapper that tracks the number of open sessions and logs errors upon failure (and remaining session count). This is how I found the SSH session leak in sbbs_t::hangup(). Also found multiple cals to SSH_END() which were invalid (no session to destroy) and removed them. 2: If errors are detected when unpacking a REP packet, save the .rep file (in data/file/<filename.rep>.<timestamp>.bad) for later inspection. Also added some VOTING.DAT debug output (to be removed later). Trying to the get to the bottom of the "smb_addvote thread_back field missing" errors.
61dd1bf0