Commit Graph

2028 Commits (9e689779453ae9ccf305d83c427b6cb6d2223fd1)

Author SHA1 Message Date
JacobBarthelmeh e483578904
Merge pull request #699 from gojimmypi/PR-Espressif-Example-Update
Update Espressif examples for Managed Component publish
2024-05-23 17:25:25 -06:00
JacobBarthelmeh 7d6fbcf770 add test case 2024-05-23 13:57:23 -06:00
JacobBarthelmeh 0e11a143fd error out if unable to open the local file when doing a SCP send 2024-05-23 13:49:48 -06:00
gojimmypi 45a857b960 Update Espressif examples for Managed Component publish 2024-05-22 16:10:44 -07:00
Hideki Miyazaki 3c8939c55d sha1 is only enabled when user intentionally enables NO_SHA1_SOFT_DISABLE 2024-05-22 11:19:19 +09:00
David Garske 702e0ee890
Merge pull request #696 from ejohnstown/update-test
OS Check Test
2024-05-20 09:01:37 -07:00
John Safranek c004c15232 Update Test
1. Change kyber test to use the cache naming in the other test.
2. Remove moving wolfSSL to another directory. Clears a bunch of
   warnings.
3. Build liboqs to install in the same directory as wolfSSL.
2024-05-17 16:32:50 -07:00
John Safranek 5478fda815
Merge pull request #694 from JacobBarthelmeh/544
Key completion callback
2024-05-17 16:18:47 -07:00
John Safranek ed58ea0755 Update Test
1. Add a new test that checks both macOS and Ubuntu in one test, rather
   than as two separate tests.
2. Remove the old ubuntu and macos tests.
2024-05-17 16:10:48 -07:00
JacobBarthelmeh dc66602e12 add example auth pending 2024-05-17 16:11:30 -06:00
Fabio 02a4fad997 Asynchronous server side user authentication. 2024-05-17 15:34:23 -06:00
JacobBarthelmeh 9285a0a38b account for WOLFSSH_NO_DH build 2024-05-17 15:18:24 -06:00
JacobBarthelmeh fa8a8182a8 add sanity checks and adjust parameter name 2024-05-17 14:57:49 -06:00
JacobBarthelmeh ebfd175bf1 add example and account for curve25519 / kyber1 2024-05-17 14:51:46 -06:00
Fabio Alemagna b40dfaf498 Callback on keying completion, plus wolfSSH_GetText. 2024-05-17 14:03:53 -06:00
JacobBarthelmeh 5ef2bc5bbc
Merge pull request #693 from ejohnstown/guards-update
Guards Update: cannedKeyAlgoNames
2024-05-16 14:02:05 -06:00
John Safranek a7bc5f95e9 Guards Update: cannedKeyAlgoNames
1. Update the guards around the strings used to make the
   cannedKeyAlgoNames. If any algorithm is disabled, leave it out of the
   list. (I'm looking at you Ed25519!)
2. Added comments to those guards.
3. Reflow the alignment.
2024-05-16 12:47:52 -07:00
David Garske e12e725678
Merge pull request #692 from ejohnstown/kyber-fancy-action
Kyber Testing
2024-05-16 09:46:05 -07:00
John Safranek 8da722e0ec Kyber Testing
1. Switch to using variables for the versions.
2. Updated cache use per recommondations.
3. Renamed the cached items with "kyber" in the name.
2024-05-16 09:21:34 -07:00
John Safranek 19e39d9491 Kyber Testing
1. Updated to use more standard actions.
2. Cache the outputs of the dependencies.
2024-05-15 18:52:27 -07:00
John Safranek c053303caa Kyber Testing
Add a workflow for a kyber test.
2024-05-15 16:44:07 -07:00
JacobBarthelmeh 5f3a72e5f7
Merge pull request #689 from ejohnstown/ed25519
Add Ed25519
2024-05-15 14:50:53 -06:00
JacobBarthelmeh 23dd6a80d1
Merge pull request #691 from ejohnstown/readdir-override
ReadDir Override
2024-05-15 14:27:55 -06:00
John Safranek 8178c42452 ReadDir Override
1. Whitespace. Reflow some comments.
2. Remove some redundant "TODO" comments.
2024-05-15 12:00:14 -07:00
Fabio Alemagna edb4b4c49b ReadDir Override
Make wolfSSH_SFTPNAME_readdir defining SFTP_Name_readdir. It has to be
defined as a macro, but it can be defined to expand to its own name if
also a function with the same name is defined.

What matters is that it takes 3 arguments:

    1) the filesystem context as first argument;
    2) WDIR* as second argument;
    3) WS_SFTPNAME* as third argument

On successful execution, it returns WS_SUCCESS and the WS_SFTPNAME
structure pointed by the third argument will be filled with the
relevant info, otherwise a WS_* error code is returned.
2024-05-15 11:57:39 -07:00
David Garske 038fa323f1
Merge pull request #687 from lealem47/pack_updates
Updates to STM32Cube Pack
2024-05-15 09:03:46 -07:00
David Garske a08c09dbab
Merge pull request #690 from ejohnstown/zephyr-memory-tweak
Zephyr Memory Tweak
2024-05-15 09:03:22 -07:00
John Safranek c1244c61e4 Zephyr Memory Tweak
For Zephyr, we allocate memory for a thread's stack from the heap.
Recently a thread's stack size was changed from 24k to 48k. wolfSSH
needed the size of the libc memory arena to be increased a bit to
account for this change.
2024-05-15 08:39:46 -07:00
John Safranek 0d887bd644 Add Ed25519
1. Add an error code for Ed25519 signing or verify issues.
2. Add Ed25519 key support to ReadKey.
3. Add client side support for Ed25519.
4. Update some key usage log strings to be more descriptive.
2024-05-13 14:36:28 -07:00
John Safranek 9b97927cd8 Add Ed25519
1. Add testing key for user barney.
2. Remove some instances of the incorrect macro guard WOLFSSH_NO_ECC. We
   deal in ECDSA or ECDHE separately only.
3. Add WIP function for decoding the OpenSSH format Ed25519 key.
2024-05-13 14:36:28 -07:00
John Safranek 8f61e26819 Add Ed25519
1. Remove some redundant (and incorrect) scaffolding for a couple
   algorithms.
2. Whitespace fixes and add some braces to if-else blocks.
3. Fix allocating an ed25519 key, instead of using an ecc_key for it.
4. Replace a crypto failure error with an invalid algo error.
2024-05-13 14:36:28 -07:00
John Safranek 3602bc10ca Add Ed25519
1. Whitespace fixes.
2. Refactor the signing KEX message signing to break the signing into
   functions depending on the key type.
2024-05-13 14:36:28 -07:00
Fabio Alemagna c3086f9611 Add Ed25519
1. Added support for Ed25519 private keys.
2. Added more define guards for ED25519
3. The userAuthResultCb must be invoked only in the case the pubkey has
   a signature.
4. Define WOLFSSH_NO_ED25519 if the ssh-ed25519 pubkey support must not
   be compiled for lack of prerequisites.
2024-05-13 14:36:28 -07:00
JacobBarthelmeh d11ec5f646
Merge pull request #686 from ejohnstown/key-agree-update
Key Agree Update
2024-05-13 15:14:05 -06:00
JacobBarthelmeh 2c5e9581d8
Merge pull request #682 from ejohnstown/static-memory
Static Memory Pools
2024-05-08 11:26:47 -06:00
Lealem Amedie a87fe3fce5 Updates to STM32Cube Pack 2024-05-02 16:33:43 -06:00
John Safranek 8839376d34
Merge pull request #683 from embhorn/zd17917
Fix state in DoUserAuthRequestPublicKey
2024-05-02 14:05:13 -07:00
John Safranek 39bbaffeda
Merge pull request #680 from miyazakh/server_host_kex
Omit comma at the end
2024-05-02 12:13:23 -07:00
John Safranek 2a139c9ed5
Merge pull request #677 from julek-wolfssl/zephyr-nofs
Add NO_FILESYSTEM to Zephyr port
2024-05-02 12:12:47 -07:00
John Safranek 6e93b92b22 Key Agree Update
1. Add a parameter to the client key agree functions for the hashId.
   It's only really used for EcdhKyber1, but it keeps the functions
   parallel.
2. Add and update some top-of-function comments for the key agree
   functions.
3. Renamed the X25519 key agreement functions to Curve25519 to match the
   naming in the RFC.
4. Removed the temporary hashId local in the client EcdhKyber1
   function.
5. Messed around with some variable declarations in a few of the
   functions.
6. Fix a couple breaks for small stack build.
7. Fix where GEX-SHA2 key exchange wasn't allowed to work.
8. Disable EcdhKyber1 is ECDH-NISTP256 is disabled.
2024-05-01 19:43:12 -07:00
John Safranek 49c420d593 Key Agree Update
1. In SendKexDhReply(), break down the key agreement actions for the
   various supported key types into their own functions. Remove
   the redundant variables.
2. In DoKexDhInit(), add flags for the various key agreement types, and
   set them as appropriate when checking the selected kexId. The flags
   are always present no matter the build options.
3. Simplify some of the flag checks for optional options.
2024-05-01 16:45:04 -07:00
John Safranek 5060dc2d2d Key Agree Update
1. In the key signature block, add flag for Ecc, and for the key
   allocation.
2. Add FreePubKey() to delete the pub key stored in the key signature
   block.
3. In DoKexDhReply(), break down the key agreement actions for the
   various supported key types into their own functions. Remove the
   redundant variables.
4. Using flags that are always present, reduce some of the complicated
   flag checks.
5. Fix a compile guard where the ECDH private key used by the client is
   disabled by ECDSA.
2024-05-01 16:38:58 -07:00
JacobBarthelmeh 4974096361
Merge pull request #685 from ejohnstown/kyber-fix
Kyber Fix
2024-05-01 16:51:07 -06:00
John Safranek e01823d8b7 Kyber Testing
1. Fix a couple spots where a flag to use kyber wasn't getting set
   correctly.
2. Changed a check to kyber back to the original source, a local
   variable.
2024-05-01 15:37:21 -07:00
Eric Blankenhorn 7692effba5 Fix state in DoUserAuthRequestPublicKey 2024-04-30 11:41:57 -05:00
Sean Parkinson 9b29ba68cc
Merge pull request #666 from JacobBarthelmeh/progress_bar
refactor windows wolfsshd service to resolve powershell Write-Progress
2024-04-30 08:52:13 +10:00
Hideki Miyazaki 22c31b813a ommit comma at the end 2024-04-27 15:22:31 +09:00
John Safranek 2e1ca68652 Static Memory
1. Update the scpclient's use of the common key and cert function calls to
   pass NULL for the heap.
2024-04-26 10:21:29 -07:00
John Safranek d6d67c889c Static Memory
1. In the echoserver, change the names of the defines for the
   static memory values.
2. Modify the client common functions for keys and certs to take a heap
   value for their allocations.
3. Update the client's use of the common key and cert function calls to
   pass NULL for the heap.
4. Add a static memory description for the sftp client code.
2024-04-26 10:21:29 -07:00
John Safranek 559f24b476 Static Memory
1. Change the static buffer for the echoserver and the memory
   descriptions to be static values.
2. Fixed a double-free on the memory statistics.
2024-04-26 10:21:29 -07:00