1. For a Zephyr build setup, the compiler was complaining about some
uninitialized variables that were getting used. Set them to 0 or NULL
to make the compiler happy.
1. Treat any non-zero response from any of the channel request callback
functions as a rejection of the channel request.
2. If a channel request reply is wanted, return the failure message if
the callback function had rejected the request.
1. Move the session types earlier in the ssh.h header.
2. Add functions wolfSSH_ChannelGetSessionType() and
wolfSSH_ChannelGetSessionCommand() to requestion information about a
session.
1. Add callback for the "shell" Channel Request message for the server.
2. Whitespace and braces changes.
3. Relabel the string for administratively prohibited channel opens.
4. Add some comment.
1. Added callbacks for receiving a Channel EOF message and a Channel
Close message.
2. Added accessors for the new callback's ctx parameters.
3. Add some missing comments on the channel open callbacks.
1. Add the code from wolfsshd that initially sets up the terminal
settings to the echoserver.
2. Add the WOLFSSH_TERM flag to the build of the echoserver.
1. When the server tries to open a file, get the attributes following
links.
2. Add decoding links from the file attributes when making a long name.
3. When the server gets a file attributes for the file list, do not
follow links.
4. When the client tries to stat a file before getting it, it should use
the stat that follows links.
1. If the signature to verify is short, pad it to the key length with
leading zeros. Some implementations of SSH will prune leading zeros
from an mpint value as a string for the signature.
2. Change some of the GetSize() and play with pointers to using
GetStringRef() or GetMpint().
3. Added an RSA private key for testing with PuTTY client.
1. Fix the typecasting when signing H with RSA.
2. Assign the sign return value to ret, then assign it to *sigSz if
successful.
3. Similar change for the encoded sign value.
1. If wc_RsaPrivateKeyDecodeRaw() is available, use it to load the
private key from GetOpenSshKeyRsa(). If unavailable, process the key
the original way.
2. Check for wolfSSL version and if greater than v5.7.0, the new
function is available.
3. When loading an OpenSSH format RSA key, if wolfSSL's RSA_LOW_MEM is
set, skip the u value, and do not calculate dP and dQ.
4. Rename RsaCalcInverses() to RsaCalcDX().
1. Change kyber test to use the cache naming in the other test.
2. Remove moving wolfSSL to another directory. Clears a bunch of
warnings.
3. Build liboqs to install in the same directory as wolfSSL.