Skip to content

Conversation

@anhu
Copy link
Member

@anhu anhu commented Nov 21, 2025

Fixes #7356

@anhu anhu requested a review from wolfSSL-Bot November 21, 2025 17:09
@anhu anhu self-assigned this Nov 21, 2025
@devin-ai-integration
Copy link
Contributor

🛟 Devin Lifeguard found 1 likely issues in this PR

  • pointer-null-check snippet: Add alg_bits != NULL to the condition (e.g., if (c != NULL && alg_bits != NULL) { ... }) before writing to *alg_bits.

@anhu
please take a look at the above issues which Devin flagged. Devin will not fix these issues automatically.

@anhu
Copy link
Member Author

anhu commented Nov 21, 2025

I'm a little weary about this one as I think we were not filling it in on purpose. It doesn't look like that was an accident.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[OpenSSL compatibility]: 5.6.6 and/or v5.6.6-stable-564-g3129e29a1 do not fill int pointed to by 2nd argument to SSL_CIPHER_get_bits(sc, &bitsalg);

1 participant