Skip to content

Fix potential memory leak when copying into existing SHA contexts and zero init tmpSha #8709

Fix potential memory leak when copying into existing SHA contexts and zero init tmpSha

Fix potential memory leak when copying into existing SHA contexts and zero init tmpSha #8709

Triggered via pull request February 25, 2026 19:50
Status Success
Total duration 11m 17s
Artifacts 1

docker-OpenWrt.yml

on: pull_request
Compile libwolfssl.so
2m 22s
Compile libwolfssl.so
Matrix: Compile container
Fit to window
Zoom out
Zoom in

Annotations

2 warnings
Compile container (21.02.7)
Back off 16.726 seconds before retry.
Compile container (21.02.7)
Failed to download action 'https://api.github.com/repos/docker/build-push-action/tarball/ca052bb54ab0790a636c9b5f226502c73d547a25'. Error: Response status code does not indicate success: 502 (Bad Gateway). 7442:14BB6E:DE4E78:3ACF8F2:699F54D4

Artifacts

Produced during runtime
Name Size Digest
openwrt-libwolfssl.so Expired
2.59 MB
sha256:e21cc03e5340e99cca3d75d3498dbde73748c95467d85758de8770013bf0af39