Coverty Scan findings
14175 Large stack use
Excessive stack use may cause stack overflow in embedded applications. Stack size limits are configurable. In run_upload_test(ssh_session_struct *): Excessive use of stack memory by local variables or parameters (CWE-400)
14372 Large stack use
Excessive stack use may cause stack overflow in embedded applications. Stack size limits are configurable. In run_download_test(ssh_session_struct *): Excessive use of stack memory by local variables or parameters (CWE-400)
14453 Large stack use
Excessive stack use may cause stack overflow in embedded applications. Stack size limits are configurable. In run_download_test(ssh_session_struct *): Excessive use of stack memory by local variables or parameters (CWE-400)
14663 Truncated stdio return value
It will not be possible to distinguish between EOF and a valid character. In keyboard_wait(): Stdio character-oriented I/O functions return int values such as EOF not representable by char variables (CWE-197)
14664 Large stack use
Excessive stack use may cause stack overflow in embedded applications. Stack size limits are configurable. In run_upload_test(ssh_session_struct *): Excessive use of stack memory by local variables or parameters (CWE-400)