Commit Graph

1609 Commits (61fdf5cb0b66d1ae97c967d8b89acca9235f614d)

Author SHA1 Message Date
David Garske 564d43ee4d
Merge pull request #505 from ejohnstown/forking
Forking
2023-03-29 11:52:53 -07:00
John Safranek 9c9cb5adbd
Forking
1. Updated wolfSSHd with the common practices for starting a daemon.
2. Close std I/O and reopen as /dev/null.
2023-03-29 10:23:32 -07:00
David Garske 07f901d207
Merge pull request #504 from ejohnstown/shadowfix
wolfSSHd Shadow Fix
2023-03-24 14:23:12 -07:00
John Safranek f74c2db6eb
wolfSSHd Shadow Fix
1. Checking the string returned from crypt() to make sure it isn't a
   "*".
2. Checking the lengths of the strings when checking the password.
2023-03-24 14:06:25 -07:00
Lealem Amedie f5b551c644 Address feedback & add more relevant files 2023-03-24 13:42:03 -06:00
Lealem Amedie d0f45f4a2a Initial support for STM32Cube 2023-03-21 17:20:27 -06:00
John Safranek 17e83731ff
Merge pull request #499 from JacobBarthelmeh/sshd
add option to use x509v3 private key in connection without x509 auth
2023-03-16 09:01:10 -07:00
JacobBarthelmeh d5ecaf4452 update sed command with tests 2023-03-15 10:46:47 -07:00
John Safranek 6a3f9d9ad4
Merge pull request #502 from embhorn/gh501
Fix build error in client_test
2023-03-15 09:36:39 -07:00
Eric Blankenhorn 85f904dbfe Fix build error in client_test 2023-03-15 09:46:01 -05:00
John Safranek f8651c952b
Merge pull request #498 from JacobBarthelmeh/sshd-forcedcmd
remove leading tabs in config file while parsing, add force command test
2023-03-10 15:17:57 -08:00
John Safranek 55f352781e
Merge pull request #489 from JacobBarthelmeh/ip_check
add runtime option to override IP check with client
2023-03-10 15:00:46 -08:00
JacobBarthelmeh 1086610fbc add option to use x509v3 private key in connection without x509 auth 2023-02-24 10:20:25 -08:00
JacobBarthelmeh 196b7d7507
Merge pull request #496 from kareem-wolfssl/gh493
Fix 32-bit builds of the SFTP client.  Only build SFTP client if building examples is enabled.
2023-02-16 09:24:11 -07:00
Kareem d1bdc32de1 Fix 32-bit builds of the SFTP client. Only build SFTP client if building examples is enabled. 2023-02-15 16:59:34 -07:00
JacobBarthelmeh e9ac55507c
Merge pull request #495 from ejohnstown/guard-spelling
Guard Spelling
2023-02-13 14:29:47 -07:00
John Safranek fbbc19cbdc
Guard Spelling
1. Fix the spelling on one of the feature disable guards.
2. Add a guard check to disable all things SHA-1.
2023-02-13 10:59:06 -08:00
JacobBarthelmeh 1dc7694d59
Merge pull request #494 from ejohnstown/unused-args
Unused Variable Macro
2023-02-13 07:08:29 -07:00
John Safranek d8c6fe8c8a
Add macro for giving a name to hushing unused variable handling. 2023-02-10 13:41:01 -08:00
David Garske e8dada5beb
Merge pull request #492 from ejohnstown/build-cleanup
Build Cleanup
2023-02-06 09:31:04 -08:00
John Safranek c59226c36b
Build Cleanup
1. Found a few cases where disabling RSA made some things either not
   build or run correctly.
2. Hushed a few unused variables in gated-disabled situations.
3. Moved a temp variable closer to where it is used.
2023-02-03 17:18:26 -08:00
JacobBarthelmeh 2273c38f0a
Merge pull request #491 from ejohnstown/stall
SFTP Stall Fix
2023-02-02 16:19:33 -07:00
John Safranek 6d6b4686b2
Fix SFTP Upload Stall
1. Update README for the change in the default channel receive window size.
2. In the SFTP client, add rekeying as a error that's OK to ignore.
3. In wolfSSH_stream_read(), clear the SSH object's error register.
2023-02-01 17:09:30 -08:00
John Safranek bdb8cacadb
Channel Sizes
1. Increased the channel receive buffer size to 128k.
2. Fixed the max packet size to 32k.
2023-01-31 17:13:48 -08:00
John Safranek c1569ed31c
Fix SFTP Upload Stall
1. Remove the function wolfSSH_stream_adjust_window() and use
    _UpdateChannelWindow() in wolfSSH_stream_read().
2. Whitespace.
3. In _UpdateChannelWindow(), add the clause of the channel windowSz
    being 0 as a trigger.
4. In _UpdateChannelWindow(), remove redundant code.
5. Channel window can be update during rekey.
2023-01-31 17:03:46 -08:00
John Safranek 7c92e34180
Merge pull request #490 from JacobBarthelmeh/sftp-path
handle full path used with SFTP Get-Put commands
2023-01-24 15:46:36 -08:00
John Safranek 1a58568eac
Merge pull request #487 from JacobBarthelmeh/pathing
set ssh error in sftp status not ok state
2023-01-24 15:35:32 -08:00
John Safranek 5dd2f84aa9
Merge pull request #486 from JacobBarthelmeh/sshd
add handling exec sub shell to wolfsshd app
2023-01-24 15:14:28 -08:00
John Safranek d63f35cfc7
Merge pull request #485 from JacobBarthelmeh/sftp
add '-s' option to print file sizes with 'ls' command
2023-01-24 14:35:02 -08:00
JacobBarthelmeh f844683c13 remove leading tabs in config file while parsing, add force command test 2023-01-23 14:25:08 -08:00
JacobBarthelmeh ca36b31666 add IP override for sftp client 2023-01-20 15:48:41 -08:00
JacobBarthelmeh 77ef211997 avoid trying to close a remote file if no handle was parsed 2023-01-20 14:42:27 -08:00
JacobBarthelmeh 4a24202540
Merge pull request #488 from ejohnstown/sftp-speed
SFTP Speed
2023-01-20 09:26:03 -07:00
John Safranek bd60193a87
SFTP Speed
1. Improve the througput of SFTP. Clients will request a particular size
   chunk of a file at a time. Most clients are flexible with receiving less
   than requested. But, sending 1kiB at a time requires many times more
   messages, encryptions, and transmits than when sending a larger block.
   One particular client requests 32kiB blocks, always, and expects to get
   32kiB at a time. This changes the amount buffered to 32kiB. You can
   change the value smaller, but may have issues with some clients.
2. The loop on SFTP write needs to take into account WANT_READ while
   trying to write to the client. If it doesn't try again, it'll return
   and lose part of the data causing other issues.
2023-01-19 21:51:50 -08:00
JacobBarthelmeh 17e2a834ad handle full path used with SFTP Get-Put commands 2023-01-19 16:14:44 -08:00
JacobBarthelmeh 6c1d0d78ab add runtime option to override IP check with client 2023-01-19 16:02:33 -08:00
JacobBarthelmeh 203557b350 move authorized and sshd_config creation to before start of server 2023-01-18 15:14:02 -08:00
JacobBarthelmeh cd70e15d60 add additional sshd test framework 2023-01-18 14:54:39 -08:00
JacobBarthelmeh f8b46ce1e3 alter setting of ssh->error with SFTP get and return value 2023-01-18 09:27:47 -08:00
JacobBarthelmeh 3135bf87b6 add test for ls -s with sftp 2023-01-17 15:12:37 -08:00
JacobBarthelmeh cb4a50a764 set ssh error in sftp status not ok state 2023-01-16 09:31:31 -08:00
JacobBarthelmeh c1ea43d505 add handling exec sub shell to wolfsshd app 2023-01-15 14:36:56 -08:00
JacobBarthelmeh d82283a8e3 add '-s' option to print file sizes with 'ls' command 2023-01-15 13:44:02 -08:00
JacobBarthelmeh 834a03ce84
Merge pull request #484 from ejohnstown/release-cleanup2
Release Cleanup 2
2022-12-28 10:59:28 -07:00
John Safranek 0336676ff7
Release Cleanup 2
1. Remove ununsed variable in a function for the Windows build.
2022-12-28 09:51:31 -08:00
JacobBarthelmeh e4ffaa946f
Merge pull request #483 from ejohnstown/release-cleanup
Release Cleanup
2022-12-27 17:55:12 -07:00
John Safranek 99bab74d78
Release Cleanup
1. Update the release date in the ChangeLog.
2. Move some compiler guards around to hush warnings depending on the
   build options.
3. Fix a string name for ECDSA P521 algo.
4. Fix a stray static function definition.
5. For FIPSv5 builds, add CAST tests to the API test and testsuite.
6. Add the wolfSSH_Init() and wolfSSH_Cleanup() to the unit test.
2022-12-27 16:19:21 -08:00
JacobBarthelmeh 9fc41086b1
Merge pull request #482 from ejohnstown/type-fix
Type Fix
2022-12-22 15:43:41 -07:00
John Safranek 5267f6cc4b
Type Fix
When building wolfSSH with g++, it was complaining about type issues
with respect to the type enum wc_HashType. It was getting turned into a
byte and then back to an enum wc_HashType implicitly. It should never
have been a byte in the middle.
2022-12-22 14:30:36 -08:00
JacobBarthelmeh 1a3652bbad
Merge pull request #480 from ejohnstown/sftp-big-file
SFTP Large File Fix
2022-12-22 13:54:02 -07:00