Commit Graph

1304 Commits (331753c7763256e8cc788724b7b179f19301288c)

Author SHA1 Message Date
JacobBarthelmeh 331753c776 fix up if statement after cherry pick 2022-09-01 13:08:05 -07:00
JacobBarthelmeh fb0d3ba3d1 fix for DIR with QNX 2022-09-01 12:56:50 -07:00
JacobBarthelmeh 67878bbec2
Merge pull request #448 from ejohnstown/old-gcc
Old Compiler Warning Cleanup (GCC 4.0.2)
2022-08-31 16:36:22 -06:00
JacobBarthelmeh d1171d417e
Merge pull request #447 from ejohnstown/certs-keys
Update CA Key
2022-08-31 16:36:04 -06:00
John Safranek f2c30ac368
Old Compiler Warning Cleanup (GCC 4.0.2)
1. Initialize a variable that might be used unset later.
2022-08-30 11:50:16 -07:00
John Safranek 33da820e45
Update CA Key
1. Add the CA key used with the CA cert.
2. Rename the ca-cert to follow the pattern.
3. Update readme and the keys include file.
2022-08-30 09:38:01 -07:00
Hayden Roche 8cda0c4cc9
Merge pull request #445 from ejohnstown/wildcard 2022-08-29 17:44:45 -07:00
John Safranek 79ddd784c7
Scan-Build Cleaning
1. The portfwd example had a couple spots in command line option
   processing where atol could get called with a null pointer.
2022-08-29 17:13:12 -07:00
John Safranek 76417aca88
Wildcard Config
1. Modify HandleInclude() to have a single return point, and minimize
   the places where free() needs to be called.
2. Modify the config test wildcard include test file creation to return
   error similar other test functions.
3. Fix leak of the test configuration object in the wolfSSHd
   configuration test.
2022-08-29 17:12:55 -07:00
David Garske 86360a4fe2
Merge pull request #415 from ejohnstown/cert
Add support for X509 certificates
2022-08-29 15:51:28 -07:00
JacobBarthelmeh e2a7f496f2 fix include.am for dist 2022-08-29 13:46:52 -07:00
John Safranek 4d43d8406e
Wildcard Config
1. Update WMALLOCs to use the config's heap and proper DYNTYPE values.
2. Covert more STDC functions to use the wrapper macros.
3. Check some missed return values on mallocs, and make sure to free
   all allocated buffers.
2022-08-29 13:45:45 -07:00
John Safranek 82172d0e43
Merge pull request #446 from JacobBarthelmeh/sshd-priv
modify starting new processes with SSHD
2022-08-29 09:16:02 -07:00
John Safranek c90a235cc6
Wildcard
1. Add a guard around the directory porting wrappers for wolfSSHd.
2022-08-27 19:16:23 -07:00
JacobBarthelmeh 5d8922e5a2 update readme for certs., add examples certs. to include.am, update comment in example 2022-08-26 23:41:50 -07:00
JacobBarthelmeh 0830b56fab fix for permissions level seperation 2022-08-26 23:07:32 -07:00
John Safranek a01d31592c
Wildcard
1. Revise to use the porting functions.
2. Add test cases to check the config wildcards.
3. Generate test files for the wildcard test, and delete them after.
2022-08-26 12:41:00 -07:00
John Safranek c42f8fc2fe
Wildcard Config
1. Process the included config files in strcmp order.
2022-08-25 14:08:34 -07:00
John Safranek 85069b816e
Wildcard Config
1. Fix the wildcard config file include.
2. Update the guard flags so macOS can also use wildcards.
3. Change the user priviledge separating setting to a bitfield.
4. Add test_configuration test to gitignore.
2022-08-25 10:58:10 -07:00
JacobBarthelmeh 2abce6326e turn off FPKI if not enabled, check CERTMAN log in SSHD 2022-08-24 06:55:25 -07:00
JacobBarthelmeh 5acfa4e17b interop testing with multiple certificates sent 2022-08-24 06:35:40 -07:00
JacobBarthelmeh 6cfbd653ed clean up memory after use 2022-08-24 06:35:40 -07:00
JacobBarthelmeh e40e852bc2 handle certificate chains 2022-08-24 06:35:40 -07:00
JacobBarthelmeh 69e1cde58f update macro guard in echoserver 2022-08-24 06:35:40 -07:00
JacobBarthelmeh 71d7f9c8cc more return code checking 2022-08-24 06:35:40 -07:00
JacobBarthelmeh 8fa67a041b add argument to client for loading certificate 2022-08-24 06:35:40 -07:00
JacobBarthelmeh c507c77431 add UUID and FASC-N 2022-08-24 06:35:40 -07:00
JacobBarthelmeh 91f2ea7e97 check on ca subject vs issuer, validate that pathlen is 0 2022-08-24 06:35:40 -07:00
John Safranek d842c213bc Certificate checks
1. Fix the logic on the CheckPolicy() checks. If any pass, it should be
   a pass.
2. Fix the check for the key usage extensions. The check should be that
   the usages are present to be valid.
3. Remove the redundant check for the optional key usages.
2022-08-24 06:35:40 -07:00
JacobBarthelmeh 0af8043110 more strict date checking on utc before year 2049 2022-08-24 06:35:40 -07:00
JacobBarthelmeh 5f783c30c7 gcc compiler warnings 2022-08-24 06:35:40 -07:00
John Safranek f929c5e0b6 Added RSA cert support 2022-08-24 06:35:40 -07:00
John Safranek 269c7f56df Move the ECC key initializer before checking the cert. 2022-08-24 06:35:40 -07:00
John Safranek 2385e0d266 User Authentication Result Callback
1. Add a callback function for public key user authenticaiton after
   checking the signature. Calls in success and failure cases.
2022-08-24 06:35:40 -07:00
John Safranek bb4b4ffc38 Remove a debugging statement that forced OCSP lookups to always succeed. 2022-08-24 06:35:40 -07:00
John Safranek 13e525478c X.509 Certificate Support
1. Quality of Life improvements to echoserver: command line user config
2. adding policy checking
2022-08-24 06:35:40 -07:00
John Safranek a8fa38d7f8 OCSP Lookups
1. Changed to use the new set of certs.
2. Do an actual cert check and report errors.
3. Do an actual OCSP lookup and report errors.
2022-08-24 06:35:40 -07:00
John Safranek 1405eeae62 X.509 Certificate Support
1. Fix build error when building without certificates.
2. Add the root CA option to the echoserver usage.
3. Update the readme file to include the new certificate option.
4. Added command line option to load a CA cert into the echoserver.
2022-08-24 06:35:40 -07:00
John Safranek 93996f1942 X.509 Certificates
1. Added the IDs needed for X.509 certificates.
2. Added strings needed for the KEX Init function.
2022-08-24 06:34:55 -07:00
John Safranek 57cbcbd8ca Cert Manager
1. Add allocators for cert manager wrapper.
2. Add test cases for the allocators.
2022-08-24 06:34:55 -07:00
John Safranek 09e3446b96 Add Certificate Manager Stub File
1. For the new X.509 user certificate support, add a new stub source
   file for the wrapper code around wolfSSL's CertManager.
2. Update the makefile includes to use the new source file and header.
3. Update configure with the `--enable-certs` option.
2022-08-24 06:34:30 -07:00
John Safranek d42230d629
Merge pull request #444 from JacobBarthelmeh/release
fix for include with FIPS build and cast with g++ build
2022-08-23 08:49:35 -07:00
JacobBarthelmeh 20ace73349 fix new scan-build warning 2022-08-22 18:09:07 -06:00
JacobBarthelmeh 3f52af5e45 g++ fix warning on define 2022-08-22 17:34:49 -06:00
JacobBarthelmeh 0a93923067 g++ warning fixes 2022-08-22 17:31:02 -06:00
JacobBarthelmeh 1f280647c8 include header for FIPS callback function 2022-08-22 17:29:13 -06:00
David Garske ed751da24b
Merge pull request #443 from JacobBarthelmeh/release
prepare for release v1.4.11
2022-08-22 15:33:32 -07:00
JacobBarthelmeh 99fd7c964f
Merge pull request #440 from ejohnstown/real-path
SFTP RealPath
2022-08-22 16:03:38 -06:00
Jacob Barthelmeh 8e118ef222 prepare for release v1.4.11 2022-08-22 10:08:55 -06:00
John Safranek 185a730752
SFTP RealPath
1. Add a function for returning a RealPath per the SFTP RFC.
2. Add a test function for the RealPath to test against.
2022-08-21 21:32:25 -07:00