Commit Graph

916 Commits (6452ea136629ef16df53a8d4cc50e6366050b83b)

Author SHA1 Message Date
Guido Vranken 6452ea1366 Correct references to return values in comments around wsScpSendCallback 2021-01-08 23:30:22 +01:00
Chris Conlon 707312065b
Merge pull request #294 from kojo1/mqx
add ide/MQX
2020-12-29 13:56:39 -07:00
JacobBarthelmeh 0d08f069bf
Merge pull request #301 from ejohnstown/hide-sha
Hide SHA from Echoserver
2020-12-11 02:33:31 +07:00
John Safranek 31912462a0
Hide SHA from Echoserver
1. Remove calls to wc_Sha256 Init, Update, and Final and remove the
   instances of the wc_Sha256 structure.
2. Remove the c32toa function, it isn't used at this point.
3. Add calls to wc_Sha256Hash().

This removes the Sha256 structure off the stack and replaces it with the
direct call to the single-shot hash routine. Flattening the size of the
hashed data and hashing it in was removed as redundant.
2020-12-10 08:42:37 -08:00
John Safranek ee139f8e0d
Merge pull request #291 from JacobBarthelmeh/sftp
add special case for real path and refactor clean_path
2020-11-09 09:02:03 -08:00
Jacob Barthelmeh 7acf574001 add test case for updated realpath 2020-11-09 22:54:38 +07:00
JacobBarthelmeh 86fdc40a58
Merge pull request #297 from ejohnstown/agent-null
Null Agent
2020-10-29 11:42:22 +08:00
John Safranek 7900d47036
Check that the agent was set in the SSH session before trying to set its channel ID. (ZD 11099) 2020-10-28 15:50:10 -07:00
John Safranek 1cd6d4c29c
Merge pull request #295 from douzzer/ZD11139-SendKexDhReply-clear-sigKeyBlock
in SendKexDhReply(), clear sigKeyBlock before use (fixes ZD11139).
2020-10-27 16:13:56 -07:00
Daniel Pouzzner d80f141569 in SendKexDhReply(), clear sigKeyBlock before use (fixes ZD11139). 2020-10-27 16:58:16 -05:00
JacobBarthelmeh 36bbb9f9ec
Merge pull request #296 from ejohnstown/skip-bad-guess
KEX Packet Follows Fix
2020-10-27 13:02:19 -06:00
John Safranek 79d2ff2760
KEX Packet Follows Fix
1. When filtering out the unknown names from name lists, the one that
   will be the client's guess KEX type can get removed if unknown. Let
   the first item in the client's list be added if unknown.
2020-10-27 09:38:02 -07:00
Takashi Kojo 94bf4a83c8 add ide/MQX/include.am, README, Makefile 2020-10-22 06:55:01 +09:00
Jacob Barthelmeh 209d5f5c16 fix heap hint and type 2020-10-16 10:57:27 -06:00
Jacob Barthelmeh e693e159a0 fix variable type 2020-10-15 15:29:57 -06:00
JacobBarthelmeh dec94e79af
Merge pull request #293 from ejohnstown/more-options
More Options
2020-10-15 15:19:33 -06:00
John Safranek 22c67b26ce
More Options
1. Moved the options checking to internal.h so other sources can use it.
2. Added some additional option checks and groups.
3. Added some guard checksto the key exchange.
2020-10-15 13:51:10 -07:00
John Safranek 28f5d750c9
More Options
1. Fix the key offerings in the echoserver and client with ifdef guards.
2. Fix a couple guards that weren't copy-pasted correctly.
2020-10-15 08:48:02 -07:00
John Safranek b9ccb6f4fb
Fix a couple dead stores. 2020-10-14 16:44:50 -07:00
John Safranek 91ca3ee43b
Fix a mix up between two prime names in a lookup table. 2020-10-14 15:23:04 -07:00
John Safranek 740d47d0b7
More Options
1. Wrapped the user keys in client.c with guards.
2. Added the ECC-521 key for hansel.
3. Touched up the loads of the keys with guards.
2020-10-14 14:28:26 -07:00
John Safranek 4d5ce88cc9
More Options
Wrapped more items with guards to disable them if not usable.
2020-10-13 17:42:02 -07:00
John Safranek b63d3c4914
More Options
Added many more guards for algorithms that may be disabled in wolfCrypt
including DH, AES-GCM-CTR-CBC, SHA1, ECC, RSA, etc.
2020-10-13 17:42:02 -07:00
John Safranek 6849e6bd09
Merge pull request #292 from kojo1/mqx
minor fix for MQX
2020-10-13 13:42:31 -07:00
Takashi Kojo 69791e1ff2 moving WOLFSSH_TEST guard into test.h 2020-10-11 11:54:39 +09:00
Takashi Kojo 28b8e745b1 fix for MQX 2020-10-11 06:53:46 +09:00
Jacob Barthelmeh a83a0c62f5 add special case for real path and refactor clean_path 2020-10-09 13:27:57 -06:00
JacobBarthelmeh b2d2edc6d9
Merge pull request #290 from ejohnstown/user-auth-bounds
User Authentication Bounds Checks
2020-10-07 17:15:57 -06:00
John Safranek 0e065459bc
User Authentication Bounds Checks
Added some additional bounds checking to some of the parameters in the
public key user auth messages. There was a chance that an out of bounds
buffer read could happen.
2020-10-07 15:46:23 -07:00
John Safranek 06ea6eb2d0
Merge pull request #289 from JacobBarthelmeh/interop
add peek when waiting for data
2020-10-01 12:05:06 -07:00
John Safranek b7a6a51f4f
Merge pull request #284 from JacobBarthelmeh/sftp
add example timeout to sftp example
2020-10-01 11:48:20 -07:00
Jacob Barthelmeh 000b8544c6 add peek when waiting for data 2020-09-30 13:22:07 -06:00
Jacob Barthelmeh a4b2c693fe use word32 type with timeout example 2020-09-30 11:45:33 -06:00
JacobBarthelmeh 0b1e0345c4
Merge pull request #288 from ejohnstown/ecc-keys
ECC Key Reading
2020-09-29 10:04:52 -06:00
John Safranek b44ba5b1e3
Remove redundant printf() from testing. 2020-09-29 08:54:23 -07:00
John Safranek 82c69b9758
Keys
1. Add P-384 and P-521 sample user public and private keys.
2. Add DER format versions of the sample user private keys.
3. Add the sample user public keys for P-256 and RSA-2048.
4. Fix a bug where the user authentication signing would fail if using an ECDSA curve other than P-256.
2020-09-25 16:59:44 -07:00
John Safranek a269b1e843
ECC Key Reading
Update wolfSSH_ReadKey_buffer() to handle P-384 and P-521 when reading a key from a buffer.
2020-09-25 14:45:12 -07:00
JacobBarthelmeh 962540fd4e
Merge pull request #286 from ejohnstown/include-guard
Include File Guards
2020-09-25 10:53:47 -06:00
John Safranek 1be4042711
Change examples' header file including guard from pragma-once to ifndef-define. 2020-09-24 16:50:35 -07:00
John Safranek 6cbc0d855e
Change file including guard from pragma-once to ifndef-define. 2020-09-24 09:06:10 -07:00
John Safranek c37e54b2bf
Merge pull request #285 from JacobBarthelmeh/auth
add debug message
2020-09-24 08:45:01 -07:00
Jacob Barthelmeh 496754c12f add debug message 2020-09-23 11:36:45 -06:00
Jacob Barthelmeh 69b91a3a2e adjust size of strncpy and time limit 2020-09-17 11:16:22 -06:00
Jacob Barthelmeh f8b092c5b4 add example timeout to sftp example 2020-09-17 10:43:38 -06:00
JacobBarthelmeh 4dad28da55
Merge pull request #280 from ejohnstown/fix-id-list
Fix ID List
2020-09-11 11:41:51 -06:00
JacobBarthelmeh a3dd039224
Merge pull request #283 from ejohnstown/hmac-free
HMAC Free
2020-09-08 15:21:16 -06:00
JacobBarthelmeh c4578da7a2
Merge pull request #282 from ejohnstown/optional-build
Optional Builds
2020-09-08 15:15:22 -06:00
JacobBarthelmeh a859ca4184
Merge pull request #281 from ejohnstown/fix-mem
Fix Memory
2020-09-08 14:42:31 -06:00
John Safranek cacea588b5
Add calls to wc_HmacFree(). Normally, HMAC isn't allocating resources.
This is future proofing when using wolfSSH with async crypto.
2020-09-08 10:22:32 -07:00
John Safranek 9fced1fe7d
Optional DH
1. If DH is disabled in the wolfCrypt build, the DH related code
   in wolfSSH shall be disabled.
2020-09-08 09:48:40 -07:00