-
### Version
FreeRTOS V8.2.3 lwip-1.4.1 wolfssh-1.4.14 wolfssl-5.6.4
### Description
We are encountering several compilation issues in our project, these problems primarily involve the integr…
-
#### Environment Versions
1. OS Type: `Alpine Linux Edge`
1. Python version: `Python 3.11.2`
1. pip version: `pip 23.0.1 from /usr/lib/python3.11/site-packages/pip (python 3.11)`
1. pip-tools ve…
-
### Version
5.6.6
### Description
Follow-up on #7155
```
FAILED: esp-idf/wolfssl/CMakeFiles/__idf_wolfssl.dir/wolfcrypt/src/port/Espressif/esp32_sha.c.obj
ccache /opt/esp/tools/xtensa-es…
-
### Version
latest
### Description
so, for context, I'm using arch linux, the project needs to be statically linked, so I chose to link it with musl, I installed the wolfssl package and the musl pa…
-
Env
---
- Ubuntu 22.04
- Gcc 13.1.0
- Wolfssl 5.6.3
- Wolfssh 1.4.13 and master branch
Building
---
Wolfssl built using cmake
```sh
cmake -S /projects/cpp/gamers/3rdparty/wolfssl-5.6.3/ …
-
To reproduce on unix:
1. start the echoserver
2. connect with sftp from the command line
3. start downloading a file from the server
4. press CTRL+Z in the console
The echoserver will start spi…
-
In internal.c, `DoPacket()` updates the input buffer's index unless `WS_OVERFLOW_E` or `WS_BUFFER_E` are returned: https://github.com/wolfSSL/wolfssh/blob/ec5a9560a4d19d8774b17bef2b84549a8ad866ff/src/…
-
The following command causes the SFTP session to bail out with the error **`WS_OVERFLOW_E`**:
```
sftp -o RekeyLimit=100 user@localhost
```
Assuming `user` is a real user on the sftp server, whi…
-
### Contact Details
_No response_
### Version
5.6.4
### Description
AddressSanitizer is reporting a stack-buffer-overflow on a simple test program.
I compiled wolfSSL on Android with CMake:
…
-
### I did this
I built a curl binary with the rustls backend, and openssl explicitly disabled:
```sh
local _configure_options=(
--prefix='/usr'
--mandir='/usr/share/man'
--disabl…