David Garske
564d43ee4d
Merge pull request #505 from ejohnstown/forking
...
Forking
2023-03-29 11:52:53 -07:00
John Safranek
9c9cb5adbd
Forking
...
1. Updated wolfSSHd with the common practices for starting a daemon.
2. Close std I/O and reopen as /dev/null.
2023-03-29 10:23:32 -07:00
David Garske
07f901d207
Merge pull request #504 from ejohnstown/shadowfix
...
wolfSSHd Shadow Fix
2023-03-24 14:23:12 -07:00
John Safranek
f74c2db6eb
wolfSSHd Shadow Fix
...
1. Checking the string returned from crypt() to make sure it isn't a
"*".
2. Checking the lengths of the strings when checking the password.
2023-03-24 14:06:25 -07:00
Lealem Amedie
f5b551c644
Address feedback & add more relevant files
2023-03-24 13:42:03 -06:00
Lealem Amedie
d0f45f4a2a
Initial support for STM32Cube
2023-03-21 17:20:27 -06:00
John Safranek
17e83731ff
Merge pull request #499 from JacobBarthelmeh/sshd
...
add option to use x509v3 private key in connection without x509 auth
2023-03-16 09:01:10 -07:00
JacobBarthelmeh
d5ecaf4452
update sed command with tests
2023-03-15 10:46:47 -07:00
John Safranek
6a3f9d9ad4
Merge pull request #502 from embhorn/gh501
...
Fix build error in client_test
2023-03-15 09:36:39 -07:00
Eric Blankenhorn
85f904dbfe
Fix build error in client_test
2023-03-15 09:46:01 -05:00
John Safranek
f8651c952b
Merge pull request #498 from JacobBarthelmeh/sshd-forcedcmd
...
remove leading tabs in config file while parsing, add force command test
2023-03-10 15:17:57 -08:00
John Safranek
55f352781e
Merge pull request #489 from JacobBarthelmeh/ip_check
...
add runtime option to override IP check with client
2023-03-10 15:00:46 -08:00
JacobBarthelmeh
1086610fbc
add option to use x509v3 private key in connection without x509 auth
2023-02-24 10:20:25 -08:00
JacobBarthelmeh
196b7d7507
Merge pull request #496 from kareem-wolfssl/gh493
...
Fix 32-bit builds of the SFTP client. Only build SFTP client if building examples is enabled.
2023-02-16 09:24:11 -07:00
Kareem
d1bdc32de1
Fix 32-bit builds of the SFTP client. Only build SFTP client if building examples is enabled.
2023-02-15 16:59:34 -07:00
JacobBarthelmeh
e9ac55507c
Merge pull request #495 from ejohnstown/guard-spelling
...
Guard Spelling
2023-02-13 14:29:47 -07:00
John Safranek
fbbc19cbdc
Guard Spelling
...
1. Fix the spelling on one of the feature disable guards.
2. Add a guard check to disable all things SHA-1.
2023-02-13 10:59:06 -08:00
JacobBarthelmeh
1dc7694d59
Merge pull request #494 from ejohnstown/unused-args
...
Unused Variable Macro
2023-02-13 07:08:29 -07:00
John Safranek
d8c6fe8c8a
Add macro for giving a name to hushing unused variable handling.
2023-02-10 13:41:01 -08:00
David Garske
e8dada5beb
Merge pull request #492 from ejohnstown/build-cleanup
...
Build Cleanup
2023-02-06 09:31:04 -08:00
John Safranek
c59226c36b
Build Cleanup
...
1. Found a few cases where disabling RSA made some things either not
build or run correctly.
2. Hushed a few unused variables in gated-disabled situations.
3. Moved a temp variable closer to where it is used.
2023-02-03 17:18:26 -08:00
JacobBarthelmeh
2273c38f0a
Merge pull request #491 from ejohnstown/stall
...
SFTP Stall Fix
2023-02-02 16:19:33 -07:00
John Safranek
6d6b4686b2
Fix SFTP Upload Stall
...
1. Update README for the change in the default channel receive window size.
2. In the SFTP client, add rekeying as a error that's OK to ignore.
3. In wolfSSH_stream_read(), clear the SSH object's error register.
2023-02-01 17:09:30 -08:00
John Safranek
bdb8cacadb
Channel Sizes
...
1. Increased the channel receive buffer size to 128k.
2. Fixed the max packet size to 32k.
2023-01-31 17:13:48 -08:00
John Safranek
c1569ed31c
Fix SFTP Upload Stall
...
1. Remove the function wolfSSH_stream_adjust_window() and use
_UpdateChannelWindow() in wolfSSH_stream_read().
2. Whitespace.
3. In _UpdateChannelWindow(), add the clause of the channel windowSz
being 0 as a trigger.
4. In _UpdateChannelWindow(), remove redundant code.
5. Channel window can be update during rekey.
2023-01-31 17:03:46 -08:00
John Safranek
7c92e34180
Merge pull request #490 from JacobBarthelmeh/sftp-path
...
handle full path used with SFTP Get-Put commands
2023-01-24 15:46:36 -08:00
John Safranek
1a58568eac
Merge pull request #487 from JacobBarthelmeh/pathing
...
set ssh error in sftp status not ok state
2023-01-24 15:35:32 -08:00
John Safranek
5dd2f84aa9
Merge pull request #486 from JacobBarthelmeh/sshd
...
add handling exec sub shell to wolfsshd app
2023-01-24 15:14:28 -08:00
John Safranek
d63f35cfc7
Merge pull request #485 from JacobBarthelmeh/sftp
...
add '-s' option to print file sizes with 'ls' command
2023-01-24 14:35:02 -08:00
JacobBarthelmeh
f844683c13
remove leading tabs in config file while parsing, add force command test
2023-01-23 14:25:08 -08:00
JacobBarthelmeh
ca36b31666
add IP override for sftp client
2023-01-20 15:48:41 -08:00
JacobBarthelmeh
77ef211997
avoid trying to close a remote file if no handle was parsed
2023-01-20 14:42:27 -08:00
JacobBarthelmeh
4a24202540
Merge pull request #488 from ejohnstown/sftp-speed
...
SFTP Speed
2023-01-20 09:26:03 -07:00
John Safranek
bd60193a87
SFTP Speed
...
1. Improve the througput of SFTP. Clients will request a particular size
chunk of a file at a time. Most clients are flexible with receiving less
than requested. But, sending 1kiB at a time requires many times more
messages, encryptions, and transmits than when sending a larger block.
One particular client requests 32kiB blocks, always, and expects to get
32kiB at a time. This changes the amount buffered to 32kiB. You can
change the value smaller, but may have issues with some clients.
2. The loop on SFTP write needs to take into account WANT_READ while
trying to write to the client. If it doesn't try again, it'll return
and lose part of the data causing other issues.
2023-01-19 21:51:50 -08:00
JacobBarthelmeh
17e2a834ad
handle full path used with SFTP Get-Put commands
2023-01-19 16:14:44 -08:00
JacobBarthelmeh
6c1d0d78ab
add runtime option to override IP check with client
2023-01-19 16:02:33 -08:00
JacobBarthelmeh
203557b350
move authorized and sshd_config creation to before start of server
2023-01-18 15:14:02 -08:00
JacobBarthelmeh
cd70e15d60
add additional sshd test framework
2023-01-18 14:54:39 -08:00
JacobBarthelmeh
f8b46ce1e3
alter setting of ssh->error with SFTP get and return value
2023-01-18 09:27:47 -08:00
JacobBarthelmeh
3135bf87b6
add test for ls -s with sftp
2023-01-17 15:12:37 -08:00
JacobBarthelmeh
cb4a50a764
set ssh error in sftp status not ok state
2023-01-16 09:31:31 -08:00
JacobBarthelmeh
c1ea43d505
add handling exec sub shell to wolfsshd app
2023-01-15 14:36:56 -08:00
JacobBarthelmeh
d82283a8e3
add '-s' option to print file sizes with 'ls' command
2023-01-15 13:44:02 -08:00
JacobBarthelmeh
834a03ce84
Merge pull request #484 from ejohnstown/release-cleanup2
...
Release Cleanup 2
2022-12-28 10:59:28 -07:00
John Safranek
0336676ff7
Release Cleanup 2
...
1. Remove ununsed variable in a function for the Windows build.
2022-12-28 09:51:31 -08:00
JacobBarthelmeh
e4ffaa946f
Merge pull request #483 from ejohnstown/release-cleanup
...
Release Cleanup
2022-12-27 17:55:12 -07:00
John Safranek
99bab74d78
Release Cleanup
...
1. Update the release date in the ChangeLog.
2. Move some compiler guards around to hush warnings depending on the
build options.
3. Fix a string name for ECDSA P521 algo.
4. Fix a stray static function definition.
5. For FIPSv5 builds, add CAST tests to the API test and testsuite.
6. Add the wolfSSH_Init() and wolfSSH_Cleanup() to the unit test.
2022-12-27 16:19:21 -08:00
JacobBarthelmeh
9fc41086b1
Merge pull request #482 from ejohnstown/type-fix
...
Type Fix
2022-12-22 15:43:41 -07:00
John Safranek
5267f6cc4b
Type Fix
...
When building wolfSSH with g++, it was complaining about type issues
with respect to the type enum wc_HashType. It was getting turned into a
byte and then back to an enum wc_HashType implicitly. It should never
have been a byte in the middle.
2022-12-22 14:30:36 -08:00
JacobBarthelmeh
1a3652bbad
Merge pull request #480 from ejohnstown/sftp-big-file
...
SFTP Large File Fix
2022-12-22 13:54:02 -07:00