Skip to content

Fix DoChannelOpenConf#920

Merged
JacobBarthelmeh merged 1 commit intowolfSSL:masterfrom
yosuke-wolfssl:f_2880
Apr 15, 2026
Merged

Fix DoChannelOpenConf#920
JacobBarthelmeh merged 1 commit intowolfSSL:masterfrom
yosuke-wolfssl:f_2880

Conversation

@yosuke-wolfssl
Copy link
Copy Markdown
Contributor

This PR fixes DoChannelOpenConf() so that this updates idx with the consumed length.
This issue didn't cause any real problem in current code because the buffer would be unconditionally released later.
But this shall be fixed for consistency and correctness.

@yosuke-wolfssl yosuke-wolfssl self-assigned this Apr 15, 2026
Copilot AI review requested due to automatic review settings April 15, 2026 08:02
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR fixes DoChannelOpenConf() to correctly advance the caller-provided payload index (idx) by the number of bytes consumed while decoding an SSH_MSG_CHANNEL_OPEN_CONFIRMATION, aligning its behavior with other packet decoders in src/internal.c and ensuring the receive path can reliably discard/advance past the parsed payload.

Changes:

  • Update DoChannelOpenConf() to set *idx = begin after successfully decoding the confirmation fields.
  • Ensure the packet processing loop (DoPacket() via payloadIdx) advances correctly past the decoded payload.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

@JacobBarthelmeh JacobBarthelmeh merged commit 53ae73b into wolfSSL:master Apr 15, 2026
135 checks passed
@yosuke-wolfssl yosuke-wolfssl deleted the f_2880 branch April 16, 2026 05:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants