home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   SYNC_PROGRAMMING      Synchronet/Baja/XSDK Programming      49,116 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 48,059 of 49,116   
   scan-admin@coverity.com to All   
   New Defects reported by Coverity Scan fo   
   09 Nov 25 13:52:52   
   
   TZUTC: 0000   
   MSGID: 53474.syncprog@1:103/705 2d76a397   
   PID: Synchronet 3.21a-Linux master/d39e01091 Nov 03 2025 GCC 12.2.0   
   TID: SBBSecho 3.31-Linux master/d39e01091 Nov 03 2025 GCC 12.2.0   
   BBSID: VERT   
   CHRS: ASCII 1   
   FORMAT: flowed   
      
   ----==_mimepart_69109cb38f643_144442ddf8a1d19a097965   
   Content-Type: text/plain; charset=us-ascii   
   Content-Transfer-Encoding: 7bit   
      
   Hi,   
      
   Please find the latest report on new defect(s) introduced to Synchronet found   
   with Coverity Scan.   
      
   1 new defect(s) introduced to Synchronet found with Coverity Scan.   
   4 defect(s), reported by Coverity Scan earlier, were marked fixed in the   
   recent build analyzed by Coverity Scan.   
      
   New defect(s) Reported-by: Coverity Scan   
   Showing 1 of 1 defect(s)   
      
      
   ** CID 638545:       Control flow issues  (MISSING_BREAK)   
   /js_socket.c: 2707           in js_socket_get()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 638545:         Control flow issues  (MISSING_BREAK)   
   /js_socket.c: 2707             in js_socket_get()   
   2701     		case SOCK_PROP_TLS_PSK:   
   2702     			if (p->tls_psk == NULL)   
   2703     				*vp = JSVAL_VOID;   
   2704     			else   
   2705     				*vp = OBJECT_TO_JSVAL(p->tls_psk);   
   2706     			break;   
   >>>     CID 638545:         Control flow issues  (MISSING_BREAK)   
   >>>     The case for value "SOCK_PROP_TLS_PSK_ID" is not terminated by a   
   "break" statement.   
   2707     		case SOCK_PROP_TLS_PSK_ID:   
   2708     			if (p->tls_psk == NULL)   
   2709     				*vp = JSVAL_VOID;   
   2710     			else {   
   2711     				int attrval;   
   2712     				if ((cryptGetAttribute(p->session, CRYPT_SESSINFO_TLS_OPTIONS,   
   &attrval) != CRYPT_OK)   
      
      
   ________________________________________________________________   
   _______________________________________   
   To view the defects in Coverity Scan visit, https://scan.coverit   
   .com/projects/synchronet?tab=overview   
      
      
   ----==_mimepart_69109cb38f643_144442ddf8a1d19a097965   
   Content-Type: text/html; charset=us-ascii   
   Content-Transfer-Encoding: 7bit   
      
      
      
      
        
     New Defects Reported - Synchronet   
        
      
      
     

Hi,

              

        Please find the latest report on new defect(s) introduced to       Synchronet        found with Coverity Scan.       

              
           
  • New Defects Found: 1
  •        
  •         4 defect(s), reported by Coverity Scan earlier, were marked fixed in       the recent build analyzed by Coverity Scan.       
  •        
  • Defects Shown: Showing 1 of 1 defect(s)
  •        
              

Defect Details

       
   
   ** CID 638545:       Control flow issues  (MISSING_BREAK)   
   /js_socket.c: 2707           in js_socket_get()   
      
      
   ________________________________________________________________   
   ____________________________   
   *** CID 638545:         Control flow issues  (MISSING_BREAK)   
   /js_socket.c: 2707             in js_socket_get()   
   2701     		case SOCK_PROP_TLS_PSK:   
   2702     			if (p->tls_psk == NULL)   
   2703     				*vp = JSVAL_VOID;   
   2704     			else   
   2705     				*vp = OBJECT_TO_JSVAL(p->tls_psk);   
   2706     			break;   
   >>>     CID 638545:         Control flow issues  (MISSING_BREAK)   
   >>>     The case for value "SOCK_PROP_TLS_PSK_ID" is not   
   terminated by a "break" statement.   
   2707     		case SOCK_PROP_TLS_PSK_ID:   
   2708     			if (p->tls_psk == NULL)   
   2709     				*vp = JSVAL_VOID;   
   2710     			else {   
   2711     				int attrval;   
   2712     				if ((cryptGetAttribute(p->session, CRYPT_SESSINFO_TLS_OPTIONS,   
   &attrval) != CRYPT_OK)   
      
     
              

        View Defects in Coverity Scan       

              

Best regards,

       

The Coverity Scan Admin Team

                             ----==_mimepart_69109cb38f643_144442ddf8a1d19a097965--              --- SBBSecho 3.31-Linux        * Origin: Vertrauen - [vert/cvs/bbs].synchro.net (1:103/705)       SEEN-BY: 103/705 105/81 106/201 124/5016 128/187 129/14 153/757 7715       SEEN-BY: 154/10 30 110 203/0 218/700 221/0 226/30 227/114 229/110       SEEN-BY: 229/206 317 400 426 428 470 700 705 240/1120 5832 263/1 266/512       SEEN-BY: 280/464 5003 5006 291/111 292/8125 301/1 320/219 322/757       SEEN-BY: 341/66 234 342/200 396/45 423/120 460/58 633/267 280 384       SEEN-BY: 633/414 418 420 422 2744 712/848 770/1 902/26 5020/400 5075/35       PATH: 103/705 280/464 633/280 229/426          

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca