Commit Graph

1753 Commits (25a4984e59b0b1ca92f599e7e7b231a6a0572f13)

Author SHA1 Message Date
John Safranek 25a4984e59
Remove Example Server
The example server was never used. All new behaviors were added to the
echoserver only. Now with wolfSSHd, the server example can finally be
removed.

1. Remove the example server from the build.
2. Remove the file notes.md.
3. Update the readme.
2023-12-28 12:28:16 -08:00
Daniel Pouzzner 60a29602e5
Merge pull request #637 from ejohnstown/release-v1.4.15-2
Release v1.4.15: Last Second Fixes
2023-12-22 19:36:34 -05:00
John Safranek 271e560045
Release v1.4.15: Last Second Fixes
1. Added a UNICODE define to the Windows build of the wolfSSHd auth
   module so it picked the correct strings.
2. Fixed a typo in the ChangeLog.
2023-12-22 15:28:21 -08:00
John Safranek c5d37047f0
Merge pull request #636 from JacobBarthelmeh/warnings
resolving build warnings
2023-12-22 15:15:48 -08:00
Daniel Pouzzner 51cce7bfff
Merge pull request #635 from ejohnstown/release-v1.4.15
Release v1.4.15
2023-12-22 17:59:18 -05:00
John Safranek 948b545ad8
Release v1.4.15: Release Testing Fixes
1. Fix an instance in the example sftpclient where the size of something
   is treated as an int and may have caused trouble, per the pedantic
   compiler settings.
2. Changed a check for snprintf where we checked the lengths of
   everything before calling snprintf. Turned it around where we check
   the return of snprintf and error if the process would have output too
   much.
2023-12-22 14:43:34 -08:00
JacobBarthelmeh 0e3ec03c2d resolving build warnings 2023-12-22 14:24:59 -07:00
John Safranek 3feaad95af
Release v1.4.15: Release Testing Fixes
1. Add a check for limits.h to configure.ac.
2. In wolfSSHd's configuration.c file, add an include of limits.h if
   available. It is including the header indirectly while using it
   directly.
2023-12-22 11:05:15 -08:00
John Safranek b87f0f5e2a
Release v1.4.15
The usual updates for the release.
2023-12-21 14:02:56 -08:00
JacobBarthelmeh 7f5f9299c9
Merge pull request #634 from ejohnstown/rsa-check
RSA Verify Check
2023-12-21 14:55:45 -07:00
John Safranek b97b6c73b8
RSA Verify
1. Added function wolfSSH_RsaVerify() which verifies the provided
   RSA signature with the provided key.
2. Call wolfSSH_RsaVerify() after all calls to wc_RsaSSL_Sign().
3. Changed a comparison between an unsigned and 0 to == from <=.
4. Fixed a spot where we still tried to sign a digest when the call
   to wc_DigestFinal() failed.
2023-12-21 12:06:11 -08:00
John Safranek 7f52e23a5a
Merge pull request #629 from JacobBarthelmeh/usr
add override for default sshd user
2023-12-08 16:11:40 -08:00
JacobBarthelmeh bb62158b67
Merge pull request #630 from ejohnstown/sftp-zero
SFTP Regular Files
2023-12-07 09:46:58 -07:00
John Safranek 59e7b37136
Zephyr File Permissions
When populating the file permission status for a file vs directory in
the zephyr porting, use the new constants for the file permissions being
a regular file or directory. Not (the wrong) bare numbers.
2023-12-06 14:05:24 -08:00
John Safranek f35cab9e86 SFTP Zero Byte Files
1. When putting a file with SFTP, the client should check that the
   requested file is a regular file based on its attributes.
 2. Add the attributes to check in the permissions.
 3. Add server checking for non-regular files and not allowing them to
    be opened for reading or writing.
2023-12-06 14:04:27 -08:00
John Safranek 9d92672931 SFTP Zero Byte Files
1. When getting a file with SFTP, the client should check that the
   requested file is a regular file based on its attributes.
2. Add the attributes to check in the permissions.
3. Add a new error for a non-regular file.
2023-12-06 14:04:27 -08:00
JacobBarthelmeh 3905a05d41
Merge pull request #632 from ejohnstown/disable-grace
Test Fixes
2023-12-06 13:41:26 -07:00
John Safranek 7e17dc9d39
Test Fixes
1. Remove the grace period wolfSSHd test. It asks for a password, and
   when running as an action it doesn't have stdin, so it fails. The
   test works when stdin is available.
2. Remove the check for __uint128_t from configure. wolfSSL exports this
   value, if present, in its options.h. After wolfSSL v5.6.4, wolfSSL
   also exports this to options.h when building it with CMake. The check
   in wolfSSH isn't necessary now.
2023-12-06 12:08:48 -08:00
John Safranek fb21190055
Merge pull request #616 from falemagn/pull-reqs/make-sftp-setmode-portable
Made setting file modes portable
2023-12-05 10:48:49 -08:00
John Safranek 7892d65aaa
Merge pull request #622 from falemagn/pull-reqs/fix-buffer-issue-in-DoReceive
Update the buffer's index in DoReceive() any time the buffer's index is updated in DoPacket().
2023-12-05 10:19:13 -08:00
John Safranek 086cb8ecd4
Merge pull request #624 from JacobBarthelmeh/test
add sshd test run
2023-12-05 10:14:09 -08:00
JacobBarthelmeh 9cc9711dc8 add override for default sshd user 2023-12-05 10:39:52 -07:00
John Safranek c5cb920892
Merge pull request #628 from JacobBarthelmeh/debugging
avoid zombie processes
2023-12-04 14:24:28 -08:00
JacobBarthelmeh 47ce821b33 avoid zombie processes 2023-12-04 00:13:39 -07:00
John Safranek 76c6c9974f
Merge pull request #627 from JacobBarthelmeh/term
add terminal resize callback for unix like use
2023-12-01 15:39:11 -08:00
JacobBarthelmeh 7e300b5109 add terminal size test case 2023-12-01 13:56:40 -08:00
JacobBarthelmeh e2ee49f064
Merge pull request #625 from ejohnstown/known-hosts-fix
Known Hosts Update
2023-12-01 10:42:01 -07:00
John Safranek c674f6935f
Merge pull request #623 from JacobBarthelmeh/sshd
fix for grace period login and add test case
2023-12-01 09:22:51 -08:00
John Safranek d004536aa7
Known Hosts Fix
1. Didn't take into account of getenv() returning NULL. Fixed.
2023-11-30 16:53:09 -08:00
JacobBarthelmeh 0a49c5ff22
Merge pull request #626 from ejohnstown/unused-heap
Unused Heap
2023-11-30 17:13:30 -07:00
JacobBarthelmeh a5103bf885 add terminal resize callback for unix like use 2023-11-30 16:12:06 -08:00
John Safranek 72888da82b
Unused Heap
1. Moved the heap variable declaration to the top of the function
   ChannelUpdateForward().
2. Only set heap if channel is non-null.
3. Tag heap as unused. Depending on the build environment, it might be
   left out by the preprocessor.
4. Fix a bad memory type name used in a malloc in the agent.
5. Fix a use of heap when ctx->heap was intended.
6. Fix a typo where ssh->ctx->heap was intended.
2023-11-30 15:09:56 -08:00
JacobBarthelmeh 6d22e040d7 update to test case 2023-11-30 15:40:29 -07:00
John Safranek 979801a05d
Known Hosts Update
1. Move setting a nul termination on the knownHosts data until after
   checking the size is reasonable.
2. A temporary keySz variable was getting used to get the length of the
   key type value, but it wasn't used to copy the value. Deleted it and
   used the other sz value.
3. Fix the leaking of the known hosts filename.
2023-11-30 13:18:30 -08:00
JacobBarthelmeh 7569d45b69 remove debugging comment in test 2023-11-28 13:22:18 -07:00
JacobBarthelmeh c6bc8992e6 add sshd test run 2023-11-28 10:29:31 -07:00
JacobBarthelmeh 9a33bed122 add regression test for grace period login 2023-11-28 10:04:11 -07:00
JacobBarthelmeh 82323db6f8 cancel alarm timer after connected 2023-11-28 08:01:05 -07:00
JacobBarthelmeh 0c6d34fc67
Merge pull request #620 from ejohnstown/known-hosts
Known Hosts
2023-11-27 13:36:39 -07:00
John Safranek 8bcb466f92
Known Hosts: PR Review
1. Fix a few stdC function calls to use the porting wrappers.
2. Missing some error checking, added it.
3. Add some bounds checking to the sz usage when checking for the
   server's key in the known hosts file.
4. Move the temp buffers from the stack to the heap.
5. Make sure to nul terminate the read known_hosts file.
2023-11-22 16:46:53 -08:00
Fabio 205cec1f3c Update the buffer's index in DoReceive() any time the buffer's index is updated in DoPacket(). Fixes #621 2023-11-22 13:33:29 +01:00
John Safranek 0074ead857
Known Hosts
1. Add porting layer wrapper macros for strcat, strcpy, and strsep.
2. Use port layer macros for the known hosts additions.
2023-11-21 16:47:21 -08:00
John Safranek efd7ed01da
Known Hosts
1. Update the logic for checking the key name and key against the known
   hosts file.
2. Key fingerprinting for user confirmation.
3. Add user confirmation of host key additions.
4. Remove old debugging for known hosts.
2023-11-21 16:34:24 -08:00
John Safranek 51f4f48901 Known Hosts
1. Comment out the original known hosts check for another method.
2. Implement new key checking method.
2023-11-21 16:33:00 -08:00
John Safranek e16c247a4b Known Hosts
1. Added support to the wolfSSH client for a known hosts file.
2. In the client's common.c file, moved the functions ato32() and
   load_der_file() around so the known hosts callback can uses them.
2023-11-20 13:24:14 -08:00
John Safranek ec5a9560a4
Merge pull request #619 from JacobBarthelmeh/qnx
add include of select.h
2023-11-20 13:22:25 -08:00
JacobBarthelmeh 19a60a06c6 add include of select.h 2023-11-20 10:43:34 -08:00
JacobBarthelmeh b7aaabc898
Merge pull request #604 from ejohnstown/wolfssh-client-2
wolfSSH Client with OpenSSH-format Keys
2023-11-17 10:08:20 -07:00
Fabio a60df27e51
Added missing semicolons. 2023-11-17 17:34:22 +01:00
John Safranek 3bc4fa956e
Merge pull request #618 from JacobBarthelmeh/files
when getting failure status packets return failure error code
2023-11-16 16:45:31 -08:00