-
Notifications
You must be signed in to change notification settings - Fork 105
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: wolfSSL/wolfssh
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: master@{1day}
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: wolfSSL/wolfssh
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: master
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 11 commits
- 13 files changed
- 3 contributors
Commits on Apr 22, 2026
-
Configuration menu - View commit details
-
Copy full SHA for e7226d0 - Browse repository at this point
Copy the full SHA e7226d0View commit details -
Configuration menu - View commit details
-
Copy full SHA for 19d34a8 - Browse repository at this point
Copy the full SHA 19d34a8View commit details -
Static analysis indicated the potential to double-free a pointer in the `wolfSSH_CTX_UseCert_buffer()` test. Loading the second cert after freeing the first cert could fail and the test cleanup would free the pointer again. Just set pointer to null after freeing.
Configuration menu - View commit details
-
Copy full SHA for afedde7 - Browse repository at this point
Copy the full SHA afedde7View commit details -
Clean up the main set of files to be 7-bit clean ASCII. There were many single and double-quotes and n-dashes.
Configuration menu - View commit details
-
Copy full SHA for bfbf0ed - Browse repository at this point
Copy the full SHA bfbf0edView commit details -
Fix scan-build warning for undefined errno read after execv
Remove the errno check in the condition after execv(). If execv() returns at all, it has failed, so checking ret alone is sufficient. The errno check was flagged by clang scan-build as potentially reading an undefined value (unix.Errno).
Configuration menu - View commit details
-
Copy full SHA for 1b971ff - Browse repository at this point
Copy the full SHA 1b971ffView commit details -
Fix warning for unchecked errno in WREWIND macro
Replace rewind() with fseek(s, 0, SEEK_SET) in the WREWIND macro. rewind() internally clears errno, which scan-build flags as overwriting a previously unchecked errno value. fseek() to offset 0 is functionally equivalent without the implicit errno reset.
Configuration menu - View commit details
-
Copy full SHA for 97ad915 - Browse repository at this point
Copy the full SHA 97ad915View commit details -
Fix warning for unchecked errno in api.c test
Replace rewind() with fseek(f, 0, SEEK_SET) in the test helper function. rewind() internally clears errno, which scan-build flags as overwriting a previously unchecked errno value. fseek() to offset 0 is functionally equivalent without the implicit errno reset.
Configuration menu - View commit details
-
Copy full SHA for aad92b5 - Browse repository at this point
Copy the full SHA aad92b5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 6118655 - Browse repository at this point
Copy the full SHA 6118655View commit details -
First packet follows check needs pubkey guess
When processing the KEX Init message, stash guesses for the peer's KEX and public key algorithms. When reading first_packet_follows, if set check the guesses and set the handshake info flag ignoreNextKexMsg. When processing the KexDhInit message, check that flag. Affected functions: DoKexInit, DoKexDhInit. Issue: F-1686
Configuration menu - View commit details
-
Copy full SHA for 55d48e6 - Browse repository at this point
Copy the full SHA 55d48e6View commit details -
Add a regression for checking the `first_kex_packet_follows` flag versus the guesses for KEX algorithm and public key algorithm.
Configuration menu - View commit details
-
Copy full SHA for 3df6bcf - Browse repository at this point
Copy the full SHA 3df6bcfView commit details -
Configuration menu - View commit details
-
Copy full SHA for 8e2e3c5 - Browse repository at this point
Copy the full SHA 8e2e3c5View commit details
Loading
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff master@{1day}...master