mirror of https://github.com/wolfSSL/wolfssh.git
update copyright, wrap isspace, fix formating
parent
387ac299b0
commit
5a1f42ba07
|
@ -1,6 +1,6 @@
|
||||||
/* auth.c
|
/* auth.c
|
||||||
*
|
*
|
||||||
* Copyright (C) 2014-2021 wolfSSL Inc.
|
* Copyright (C) 2014-2022 wolfSSL Inc.
|
||||||
*
|
*
|
||||||
* This file is part of wolfSSH.
|
* This file is part of wolfSSH.
|
||||||
*
|
*
|
||||||
|
@ -601,7 +601,8 @@ static int RequestAuthentication(const char* usr, int type, const byte* data,
|
||||||
/* temporarily elevate permissions */
|
/* temporarily elevate permissions */
|
||||||
if (ret == WOLFSSH_USERAUTH_SUCCESS &&
|
if (ret == WOLFSSH_USERAUTH_SUCCESS &&
|
||||||
wolfSSHD_AuthRaisePermissions(auth) != WS_SUCCESS) {
|
wolfSSHD_AuthRaisePermissions(auth) != WS_SUCCESS) {
|
||||||
wolfSSH_Log(WS_LOG_ERROR, "[SSHD] Failure to raise permissions for auth");
|
wolfSSH_Log(WS_LOG_ERROR,
|
||||||
|
"[SSHD] Failure to raise permissions for auth");
|
||||||
ret = WOLFSSH_USERAUTH_FAILURE;
|
ret = WOLFSSH_USERAUTH_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
/* auth.h
|
/* auth.h
|
||||||
*
|
*
|
||||||
* Copyright (C) 2014-2021 wolfSSL Inc.
|
* Copyright (C) 2014-2022 wolfSSL Inc.
|
||||||
*
|
*
|
||||||
* This file is part of wolfSSH.
|
* This file is part of wolfSSH.
|
||||||
*
|
*
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
/* configuration.c
|
/* configuration.c
|
||||||
*
|
*
|
||||||
* Copyright (C) 2014-2021 wolfSSL Inc.
|
* Copyright (C) 2014-2022 wolfSSL Inc.
|
||||||
*
|
*
|
||||||
* This file is part of wolfSSH.
|
* This file is part of wolfSSH.
|
||||||
*
|
*
|
||||||
|
@ -445,7 +445,7 @@ static int HandleInclude(WOLFSSHD_CONFIG *conf, const char *value)
|
||||||
/* Ignore trailing whitespace */
|
/* Ignore trailing whitespace */
|
||||||
ptr = value + WSTRLEN(value) - 1;
|
ptr = value + WSTRLEN(value) - 1;
|
||||||
while (ptr != value) {
|
while (ptr != value) {
|
||||||
if (!isspace(*ptr)) {
|
if (!WISSPACE(*ptr)) {
|
||||||
ptr--;
|
ptr--;
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
|
@ -649,12 +649,12 @@ static int CountWhitespace(const char* in, int inSz, byte inv)
|
||||||
if (in != NULL) {
|
if (in != NULL) {
|
||||||
for (; i < inSz; ++i) {
|
for (; i < inSz; ++i) {
|
||||||
if (inv) {
|
if (inv) {
|
||||||
if (isspace(in[i])) {
|
if (WISSPACE(in[i])) {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
if (!isspace(in[i])) {
|
if (!WISSPACE(in[i])) {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
/* configuration.h
|
/* configuration.h
|
||||||
*
|
*
|
||||||
* Copyright (C) 2014-2021 wolfSSL Inc.
|
* Copyright (C) 2014-2022 wolfSSL Inc.
|
||||||
*
|
*
|
||||||
* This file is part of wolfSSH.
|
* This file is part of wolfSSH.
|
||||||
*
|
*
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
/* wolfsshd.c
|
/* wolfsshd.c
|
||||||
*
|
*
|
||||||
* Copyright (C) 2014-2021 wolfSSL Inc.
|
* Copyright (C) 2014-2022 wolfSSL Inc.
|
||||||
*
|
*
|
||||||
* This file is part of wolfSSH.
|
* This file is part of wolfSSH.
|
||||||
*
|
*
|
||||||
|
@ -143,7 +143,8 @@ static void ShowUsage(void)
|
||||||
{
|
{
|
||||||
printf("wolfsshd %s\n", LIBWOLFSSH_VERSION_STRING);
|
printf("wolfsshd %s\n", LIBWOLFSSH_VERSION_STRING);
|
||||||
printf(" -? display this help and exit\n");
|
printf(" -? display this help and exit\n");
|
||||||
printf(" -f <file name> Configuration file to use, default is /etc/ssh/sshd_config\n");
|
printf(" -f <file name> Configuration file to use, default is "
|
||||||
|
"/etc/ssh/sshd_config\n");
|
||||||
printf(" -p <int> Port number to listen on\n");
|
printf(" -p <int> Port number to listen on\n");
|
||||||
printf(" -d Turn on debug mode\n");
|
printf(" -d Turn on debug mode\n");
|
||||||
printf(" -D Run in foreground (do not detach)\n");
|
printf(" -D Run in foreground (do not detach)\n");
|
||||||
|
@ -271,61 +272,7 @@ static int SetupCTX(WOLFSSHD_CONFIG* conf, WOLFSSH_CTX** ctx)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Load in host public key */
|
/* @TODO Load in host public key */
|
||||||
// {
|
|
||||||
// if (userPubKey) {
|
|
||||||
// byte* userBuf = NULL;
|
|
||||||
// word32 userBufSz = 0;
|
|
||||||
//
|
|
||||||
// /* get the files size */
|
|
||||||
// load_file(userPubKey, NULL, &userBufSz);
|
|
||||||
//
|
|
||||||
// /* create temp buffer and load in file */
|
|
||||||
// if (userBufSz == 0) {
|
|
||||||
// fprintf(stderr, "Couldn't find size of file %s.\n", userPubKey);
|
|
||||||
// WEXIT(EXIT_FAILURE);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// userBuf = (byte*)WMALLOC(userBufSz, NULL, 0);
|
|
||||||
// if (userBuf == NULL) {
|
|
||||||
// fprintf(stderr, "WMALLOC failed\n");
|
|
||||||
// WEXIT(EXIT_FAILURE);
|
|
||||||
// }
|
|
||||||
// load_file(userPubKey, userBuf, &userBufSz);
|
|
||||||
// LoadPublicKeyBuffer(userBuf, userBufSz, &pwMapList);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// bufSz = (word32)WSTRLEN(samplePasswordBuffer);
|
|
||||||
// WMEMCPY(keyLoadBuf, samplePasswordBuffer, bufSz);
|
|
||||||
// keyLoadBuf[bufSz] = 0;
|
|
||||||
// LoadPasswordBuffer(keyLoadBuf, bufSz, &pwMapList);
|
|
||||||
//
|
|
||||||
// if (userEcc) {
|
|
||||||
// #ifndef WOLFSSH_NO_ECC
|
|
||||||
// bufName = samplePublicKeyEccBuffer;
|
|
||||||
// #endif
|
|
||||||
// }
|
|
||||||
// else {
|
|
||||||
// #ifndef WOLFSSH_NO_RSA
|
|
||||||
// bufName = samplePublicKeyRsaBuffer;
|
|
||||||
// #endif
|
|
||||||
// }
|
|
||||||
// if (bufName != NULL) {
|
|
||||||
// bufSz = (word32)WSTRLEN(bufName);
|
|
||||||
// WMEMCPY(keyLoadBuf, bufName, bufSz);
|
|
||||||
// keyLoadBuf[bufSz] = 0;
|
|
||||||
// LoadPublicKeyBuffer(keyLoadBuf, bufSz, &pwMapList);
|
|
||||||
// }
|
|
||||||
//
|
|
||||||
// bufSz = (word32)WSTRLEN(sampleNoneBuffer);
|
|
||||||
// WMEMCPY(keyLoadBuf, sampleNoneBuffer, bufSz);
|
|
||||||
// keyLoadBuf[bufSz] = 0;
|
|
||||||
// LoadNoneBuffer(keyLoadBuf, bufSz, &pwMapList);
|
|
||||||
//
|
|
||||||
// #ifdef WOLFSSH_SMALL_STACK
|
|
||||||
// WFREE(keyLoadBuf, NULL, 0);
|
|
||||||
// #endif
|
|
||||||
// }
|
|
||||||
|
|
||||||
/* Set allowed connection type, i.e. public key / password */
|
/* Set allowed connection type, i.e. public key / password */
|
||||||
|
|
||||||
|
|
|
@ -223,7 +223,7 @@ AS_IF([test "x$ENABLED_DISTRO" = "xyes"],
|
||||||
AS_IF([test "x$ENABLED_ALL" = "xyes"],
|
AS_IF([test "x$ENABLED_ALL" = "xyes"],
|
||||||
[ENABLED_KEYGEN=yes; ENABLED_SCP=yes; ENABLED_SFTP=yes; ENABLED_FWD=yes; ENABLED_SHELL=yes; ENABLED_AGENT=yes; ENABLED_SSHD=yes])
|
[ENABLED_KEYGEN=yes; ENABLED_SCP=yes; ENABLED_SFTP=yes; ENABLED_FWD=yes; ENABLED_SHELL=yes; ENABLED_AGENT=yes; ENABLED_SSHD=yes])
|
||||||
AS_IF([test "x$ENABLED_SSHD" = "xyes"],
|
AS_IF([test "x$ENABLED_SSHD" = "xyes"],
|
||||||
[ENABLED_SHELL=yes;])
|
[ENABLED_SHELL=yes])
|
||||||
|
|
||||||
# Set the defined flags for the code.
|
# Set the defined flags for the code.
|
||||||
AS_IF([test "x$ENABLED_INLINE" = "xno"],
|
AS_IF([test "x$ENABLED_INLINE" = "xno"],
|
||||||
|
|
|
@ -41,6 +41,15 @@ extern "C" {
|
||||||
/* This value needs to stay in sync with the actual value of DYNTYPE_STRING
|
/* This value needs to stay in sync with the actual value of DYNTYPE_STRING
|
||||||
* from internal.h. */
|
* from internal.h. */
|
||||||
|
|
||||||
|
#ifdef WOLFSSH_SSHD
|
||||||
|
/* uses isspace (not always available from wolfSSL) */
|
||||||
|
#ifdef XISSPACE
|
||||||
|
#define WISSPACE XISSPACE
|
||||||
|
#else
|
||||||
|
#define WISSPACE isspace
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
/* setup memory handling */
|
/* setup memory handling */
|
||||||
#ifndef WMALLOC_USER
|
#ifndef WMALLOC_USER
|
||||||
#ifdef WOLFSSL_USER_SETTINGS
|
#ifdef WOLFSSL_USER_SETTINGS
|
||||||
|
|
Loading…
Reference in New Issue