Subj : New Defects reported by Coverity Scan for Synchronet To : All From : scan-admin@coverity.com Date : Sun Nov 09 2025 13:52:52 ----==_mimepart_69109cb38f643_144442ddf8a1d19a097965 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Hi, Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan. 1 new defect(s) introduced to Synchronet found with Coverity Scan. 4 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan. New defect(s) Reported-by: Coverity Scan Showing 1 of 1 defect(s) ** CID 638545: Control flow issues (MISSING_BREAK) /js_socket.c: 2707 in js_socket_get() _____________________________________________________________________________________________ *** CID 638545: Control flow issues (MISSING_BREAK) /js_socket.c: 2707 in js_socket_get() 2701 case SOCK_PROP_TLS_PSK: 2702 if (p->tls_psk == NULL) 2703 *vp = JSVAL_VOID; 2704 else 2705 *vp = OBJECT_TO_JSVAL(p->tls_psk); 2706 break; >>> CID 638545: Control flow issues (MISSING_BREAK) >>> The case for value "SOCK_PROP_TLS_PSK_ID" is not terminated by a "break" statement. 2707 case SOCK_PROP_TLS_PSK_ID: 2708 if (p->tls_psk == NULL) 2709 *vp = JSVAL_VOID; 2710 else { 2711 int attrval; 2712 if ((cryptGetAttribute(p->session, CRYPT_SESSINFO_TLS_OPTIONS, &attrval) != CRYPT_OK) ________________________________________________________________________________________________________ To view the defects in Coverity Scan visit, https://scan.coverity.com/projects/synchronet?tab=overview ----==_mimepart_69109cb38f643_144442ddf8a1d19a097965 Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: 7bit
Hi,
Please find the latest report on new defect(s) introduced to Synchronet found with Coverity Scan.
** CID 638545: Control flow issues (MISSING_BREAK)
/js_socket.c: 2707 in js_socket_get()
_____________________________________________________________________________________________
*** CID 638545: Control flow issues (MISSING_BREAK)
/js_socket.c: 2707 in js_socket_get()
2701 case SOCK_PROP_TLS_PSK:
2702 if (p->tls_psk == NULL)
2703 *vp = JSVAL_VOID;
2704 else
2705 *vp = OBJECT_TO_JSVAL(p->tls_psk);
2706 break;
>>> CID 638545: Control flow issues (MISSING_BREAK)
>>> The case for value "SOCK_PROP_TLS_PSK_ID" is not terminated by a "break" statement.
2707 case SOCK_PROP_TLS_PSK_ID:
2708 if (p->tls_psk == NULL)
2709 *vp = JSVAL_VOID;
2710 else {
2711 int attrval;
2712 if ((cryptGetAttribute(p->session, CRYPT_SESSINFO_TLS_OPTIONS, &attrval) != CRYPT_OK)
Best regards,
The Coverity Scan Admin Team