1. Initialize a local variable DoKexInit() as a compiler complains it is
getting used with a garbage value. (Not true, but hushing the
compiler.)
2. In GetInputText() add braces around the error check if clauses, and
give the version error its own check instead of a ternary return.
3. In GetInputData(), if the recv return was anything else, return a
general socket error.
1. Switching to use the new SSH-KDF function in wolfCrypt when the
correct version of wolfSSL (v5.0.0 at a minimum) is used, when
certified version of wolfCrypt is used or Kyber is disabled.
2. Add WOLFSSL_WOLFSSH to the wolfSSL user_settings files for the Zephyr
testing.
1. Add the strings, switch cases, and guards to support DH Group 14 with
SHA256.
2. Move a couple constants around.
3. Moved diffie-hellman-group14-sha256 to the head of the list.
1. Update scp.test to delete the empty test file.
2. In wolfSSHd, when coverting an IP address to a printable
representation, the destination needs to be able to handle IPv6
addresses potentially.
1. For the ASCII and Wide versions of types and functions, make sure
the wolfSSHd is being consistent using them.
2. In SFTP, use WSOCKETCLOSE to close the socket. Use the correct type
for the socket.
3. Add parens around part of a ternary operator check to clear up some
ambiguous order of operations.
4. Add a variable initializer for a COORD structure.
5. Add parameter checks to the Base16_Decode function.
6. Fix a double-freed handle.
7. Clean up a bunch of build warnings.
1. Fix echoserver's load_file function. Could potentially dereference
null if a file size is passed in, but using a null buf to get the
file's size only.
1. Splitting the top level SCP functions for either from or to, and
incorporating the sub-functions in appropriately.
2. Put making the scp command line to send to the peer into its own
function.
1. Rearrange the matching of the MAC Algos when decoding the KEX Init
message. It should only dereference the handshake info to check if it
is using an AEAD cipher if ret is WS_SUCCESS. (If the handshake info
isn't present, there will be an error present.) This prevents a
possible NULL dereference.
1. Initialize all the fds to -1.
2. Add flags for peerConnected and stdoutEmpty.
3. Remove the idle counter.
4. When the socket would block on write, set a flag to check the socket for
writing later to call the worker which will send pending data.
5. When reading the pipes, a 0 returns means the pipe is closed. Deal
with that.
6. If the ssh write fails, interrupt the subordinate process.
7. When waiting for the peer to close its channel and shutdown, sleep
for 100ms, rather than 1us. It takes a little while to tear down.
8. Shutdown the peer socket. Spin on receiving the peer socket until it
closes or has an error.
9. Fixed a few function wrappers; was using Xname instead of Wname.