Commit Graph

2043 Commits (5305170672071dace24462b60ca656dddac1de91)

Author SHA1 Message Date
David Garske 5305170672
Merge pull request #747 from JacobBarthelmeh/release
prepare for release 1.4.19
2024-11-01 12:44:51 -07:00
Daniel Pouzzner d3a8ec6dc0
Merge pull request #743 from JacobBarthelmeh/sftp
keep trailing delimiter with SFTP open
2024-11-01 14:24:23 -05:00
JacobBarthelmeh 7d87c0ef7a prepare for release 1.4.19 2024-10-31 15:05:15 -06:00
JacobBarthelmeh 6037d0bba8 error out when buffer is too small for null terminator 2024-10-30 09:43:13 -06:00
Daniel Pouzzner fe25b4ef99
Merge pull request #746 from JacobBarthelmeh/testing
add CI test against master and last two wolfSSL releases
2024-10-15 12:49:25 -05:00
JacobBarthelmeh b78fad7eef use older ubuntu version with zephyr test 2024-10-14 11:54:11 -06:00
JacobBarthelmeh 9e68977945 test setting different wolfssl version for test 2024-10-11 16:23:20 -06:00
JacobBarthelmeh 8a1b62ffea add sanity checks 2024-10-10 14:28:19 -06:00
Daniel Pouzzner 11fa704548
Merge pull request #740 from JacobBarthelmeh/static
static analysis report review
2024-10-08 18:08:21 -05:00
John Safranek 8d1efe9fdf Testing Update
1. Update the sshd test to use the newer actions.
2. Parameterize the test for macos and ubuntu.
3. Parameterize the version of wolfssl used.
4. Parameterize the wolfSSH options used.
5. Update a couple test scripts to output their $0 variable instead of
   the wrong string.
2024-10-04 15:44:15 -06:00
JacobBarthelmeh 52e4e32529 keep trailing delimiter with SFTP open 2024-10-04 14:59:40 -06:00
David Garske 3cabbdb703
Merge pull request #741 from JacobBarthelmeh/version
show version of wolfSSL linked to
2024-09-27 14:03:22 -07:00
JacobBarthelmeh b8e6f595b4 show version of wolfSSL linked to 2024-09-27 14:36:42 -06:00
JacobBarthelmeh f0922715af adjust macro guard to avoid leak for build without cert support 2024-09-27 11:30:30 -06:00
JacobBarthelmeh df17913967 sanity check on arguments passed in 2024-09-27 11:11:25 -06:00
JacobBarthelmeh 45534b0418 sanity check on state before dereference 2024-09-27 10:59:14 -06:00
JacobBarthelmeh 76a8d8262d adjust sanity check on sz before adding null terminator 2024-09-27 09:54:05 -06:00
JacobBarthelmeh 1dc46d5fe9 remove dead code 2024-09-27 09:31:30 -06:00
JacobBarthelmeh 34dfcec788 use heap hint passed in 2024-09-27 09:27:33 -06:00
JacobBarthelmeh 3e3d6a813b
Merge pull request #739 from ejohnstown/modes-update
Modes Update
2024-09-25 11:16:30 -06:00
John Safranek 7454ed05ee Modes Update
Several of the TTY mode bits we are checking and setting aren't a part
of POSIX, but are available on Linux. Adds guards to the non-POSIX
value checks and updates.
2024-09-25 09:31:56 -07:00
Daniel Pouzzner 958cfacaa7
Merge pull request #738 from ejohnstown/rm-inline
Remove Inline
2024-09-12 16:56:10 -05:00
John Safranek 49eedd26c3 Remove Inline
1. The function HashForId() was declared as INLINE. Remove it. The
   function is getting exported as WOLFSSH_LOCAL which conflicts with
   the inline.
2024-09-12 14:38:25 -07:00
John Safranek ceb461897b
Merge pull request #736 from wolfSSL/rm_oqs_kyber
Purge OQS from wolfSSH. Use kyber from wolfssl.
2024-08-20 15:19:37 -07:00
Anthony Hu 20287f5568 Purge OQS from wolfSSH. Use kyber from wolfssl. 2024-08-20 14:57:39 -04:00
JacobBarthelmeh d57f53b852
Merge pull request #735 from ejohnstown/fixup
Fixup
2024-08-16 16:20:45 -06:00
John Safranek af66f4a9c2 Fixup
1. Initialize a local variable DoKexInit() as a compiler complains it is
   getting used with a garbage value. (Not true, but hushing the
   compiler.)
2. In GetInputText() add braces around the error check if clauses, and
   give the version error its own check instead of a ternary return.
3. In GetInputData(), if the recv return was anything else, return a
   general socket error.
2024-08-16 15:01:04 -07:00
JacobBarthelmeh 456fac474d
Merge pull request #734 from ejohnstown/readme-update
Update Readme
2024-08-12 10:02:42 -06:00
John Safranek e1c9590648 Update Readme
1. Fixed a couple spots where the wolfSSL name was used instead of
   wolfSSH.
2024-08-12 08:55:52 -07:00
John Safranek f51889430f
Merge pull request #732 from JacobBarthelmeh/scp_example
continue to cleanup on fail case and use WLOG for debug messages
2024-08-08 18:11:06 -07:00
John Safranek 468a205cb7
Merge pull request #719 from JacobBarthelmeh/cat
cat of large file with ssh shell
2024-08-08 18:06:21 -07:00
JacobBarthelmeh 2fbe01092d account for partial sends 2024-08-05 14:48:51 -06:00
JacobBarthelmeh 15f4dc9d0f adjustments to test case 2024-08-05 13:31:47 -06:00
JacobBarthelmeh 781aa27582 touch up after rebase 2024-08-05 13:31:47 -06:00
JacobBarthelmeh 46832e46b4 add test case 2024-08-05 13:31:47 -06:00
JacobBarthelmeh 2722cb9da8 handle send retry when SSH window is full 2024-08-05 13:31:47 -06:00
JacobBarthelmeh fdecd765b9 continue to cleanup on fail case and use WLOG for debug messages 2024-08-05 13:23:04 -06:00
David Garske 40aabc253b
Merge pull request #729 from ejohnstown/new-kdf
Use wolfCrypt SSHv2 KDF
2024-07-30 09:42:06 -07:00
John Safranek 6e151e45c5 Use wolfCrypt SSHv2 KDF
1. Switching to use the new SSH-KDF function in wolfCrypt when the
   correct version of wolfSSL (v5.0.0 at a minimum) is used, when
   certified version of wolfCrypt is used or Kyber is disabled.
2. Add WOLFSSL_WOLFSSH to the wolfSSL user_settings files for the Zephyr
   testing.
2024-07-30 08:43:05 -07:00
JacobBarthelmeh 06dc40df87
Merge pull request #731 from ejohnstown/dh-group14-sha256
DH Group 14 with SHA256
2024-07-26 17:30:15 -06:00
John Safranek 9302c73713 DH Group 14 with SHA256
1. Add the strings, switch cases, and guards to support DH Group 14 with
   SHA256.
2. Move a couple constants around.
3. Moved diffie-hellman-group14-sha256 to the head of the list.
2024-07-26 09:13:36 -07:00
John Safranek 4af1312802
Merge pull request #730 from gojimmypi/pr-release-timelib-fix
Adjust Espressif wolfssl_echoserver example timehelper
2024-07-23 09:05:24 -07:00
gojimmypi fa23bf58df
Adjust Espressif wolfssl_echoserver example timehelper 2024-07-22 20:57:03 -07:00
Daniel Pouzzner bbba8aef04
Merge pull request #727 from ejohnstown/release-v1.4.18-2
Release v1.4.18: Release Fixes
2024-07-19 18:25:16 -05:00
John Safranek ee42ef651f Release v1.4.18: Release Fixes
1. Need to use the old RSA key read function if using FIPS wolfCrypt.
2. Update release date.
2024-07-19 15:41:51 -07:00
JacobBarthelmeh 4833238318
Merge pull request #726 from ejohnstown/release-v1.4.18
Prepare Release v1.4.18
2024-07-19 15:58:22 -06:00
John Safranek a4f860d071 Release v1.4.18: Release Fixes
1. Update scp.test to delete the empty test file.
2. In wolfSSHd, when coverting an IP address to a printable
   representation, the destination needs to be able to handle IPv6
   addresses potentially.
2024-07-19 14:38:07 -07:00
John Safranek 1a6225671b Release v1.4.18: Release Testing Fixes (Windows)
1. For the ASCII and Wide versions of types and functions, make sure
   the wolfSSHd is being consistent using them.
2. In SFTP, use WSOCKETCLOSE to close the socket. Use the correct type
   for the socket.
3. Add parens around part of a ternary operator check to clear up some
   ambiguous order of operations.
4. Add a variable initializer for a COORD structure.
5. Add parameter checks to the Base16_Decode function.
6. Fix a double-freed handle.
7. Clean up a bunch of build warnings.
2024-07-19 12:03:32 -07:00
John Safranek dc2065719f Release v1.4.18: Release Testing Fixes
1. Fix echoserver's load_file function. Could potentially dereference
   null if a file size is passed in, but using a null buf to get the
   file's size only.
2024-07-18 14:44:03 -07:00
John Safranek e9ec4fd9fd Release v1.4.18
The usual updates for the release.
2024-07-18 14:43:57 -07:00