Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Update version.rbv7.0.0 | Miklós Fazekas | 2022-06-26 | 1 | -1/+1 |
| | |||||
* | v 7.0.0.beta1 release preparev7.0.0.beta1 | Miklós Fazekas | 2022-04-30 | 1 | -2/+2 |
| | |||||
* | Fix #854 regression | Florian Wininger | 2022-04-29 | 1 | -5/+1 |
| | |||||
* | Fix unit tests for OpenSSL 3 | Florian Wininger | 2022-04-29 | 3 | -2/+14 |
| | |||||
* | fix rubocop issues | Florian Wininger | 2022-04-29 | 5 | -44/+64 |
| | |||||
* | diffie-hellman: create the key by generating the PEM file | Simon Chopin | 2022-04-29 | 1 | -17/+17 |
| | | | | | | | | | | This makes the code compatible with OpenSSL 3.0. However, an issue with this is that it is not possible anymore to ensure a specific size for the private key, as indicated in the inline comment. v2: avoid PKey.generate_key on older releases (< 2.7) Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | Use OpenSSL::PKey::EC.generate static method | Simon Chopin | 2022-04-29 | 6 | -12/+12 |
| | | | | | | | | | | | Migrate all instances of the pattern EC.new(foo).generate_key to EC.generate(foo), as the old pattern isn't supported when using OpenSSL 3.0, since one is not allowed to mess with the internal data of already created objects now. The new API has been introduced in Ruby 2.4. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | transport: create EC keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 1 | -3/+11 |
| | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | buffer: create DSA keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 2 | -23/+36 |
| | | | | | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. To add insult to injury, contrary to other types of keys such as RSA, we need to actually build the full PEM data and not just pack the numbers in a simple sequence, making the code even a bit more complicated. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | buffer: create RSA keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 3 | -24/+25 |
| | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | tests: Enable legacy providers if using OpenSSL 3.0 | Simon Chopin | 2022-04-29 | 2 | -0/+31 |
| | | | | | | | Quite a few tests rely on outdated algorithms that have been relegated to the legacy provider in OpenSSL 3.0. `rake test` now loads a custom OpenSSL configuration file to enable said legacy provider, which is usually disabled by default. | ||||
* | update rubocop config | Florian Wininger | 2022-04-29 | 2 | -16/+25 |
| | |||||
* | Test all kex | Florian Wininger | 2022-04-20 | 1 | -0/+16 |
| | |||||
* | Update tests suite | Florian Wininger | 2022-04-15 | 2 | -7/+21 |
| | |||||
* | Fix a typo | Florian Wininger | 2022-04-15 | 1 | -4/+4 |
| | |||||
* | Read ecdsa private key in openssh format | Martin Sander | 2022-04-12 | 2 | -0/+69 |
| | | | | Fixes #657. | ||||
* | Add unit-test for openssl 3 | Florian Wininger | 2022-04-12 | 2 | -0/+31 |
| | |||||
* | Generate all DSA keys with 1024 bits | Simon Chopin | 2022-04-12 | 5 | -11/+11 |
| | | | | | | 512bits keys are refused in newer OpenSSL libraries as too weak. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | openssl: DSA: don't hardcode expected signature size | Antonio Terceiro | 2022-04-12 | 1 | -1/+2 |
| | | | | | | | | | | | The default value of the Q parameters for DSA keys changed in Ruby OpenSSL 3.0.0, and that causes DSA signatures to be longer by default. This change might have been accidental, and this may be reverted; see https://github.com/ruby/openssl/issues/483 This changes the check for the signature length to not be against a hardcoded expected lenght, but against the expected length as calculated from the Q parameter. | ||||
* | Update README.md | Florian Wininger | 2022-04-12 | 1 | -0/+6 |
| | |||||
* | Run only once unit tests | Florian Wininger | 2022-04-12 | 1 | -1/+3 |
| | |||||
* | Run test with docker | Florian Wininger | 2022-04-12 | 4 | -0/+75 |
| | |||||
* | Use ruby 2.6 and newer | Florian Wininger | 2022-04-12 | 1 | -1/+1 |
| | |||||
* | Configure rubocop for gh actions | Florian Wininger | 2022-04-12 | 3 | -94/+128 |
| | |||||
* | Run rubocop on the side | Florian Wininger | 2022-04-12 | 2 | -3/+13 |
| | |||||
* | Fix some nits | Florian Wininger | 2022-04-12 | 2 | -4/+1 |
| | |||||
* | Fix link | Florian Wininger | 2022-04-12 | 1 | -1/+1 |
| | |||||
* | enhance readme | Florian Wininger | 2022-04-12 | 2 | -19/+1 |
| | |||||
* | Remove travis configuration files | Florian Wininger | 2022-04-12 | 1 | -51/+0 |
| | |||||
* | Add support of ruby 3.1 and drop 2.5 | Florian Wininger | 2022-04-11 | 3 | -19/+33 |
| | |||||
* | Merge pull request #855 from zzambers/delegate-fix | Miklós Fazekas | 2022-04-05 | 1 | -0/+1 |
|\ | | | | | known_hosts.rb: Added missing require delegate | ||||
| * | known_hosts.rb: Added missing require delegate | Zdenek Zambersky | 2022-04-05 | 1 | -0/+1 |
|/ | |||||
* | Merge pull request #850 from boblail/lail/expand-paths-to-identity-agent | Miklós Fazekas | 2022-03-28 | 2 | -2/+7 |
|\ | | | | | Support `~` in the path to the SSH agent's unix socket | ||||
| * | Support `~` in the path to the SSH agent's unix socket | Bob Lail | 2022-03-04 | 2 | -2/+7 |
| | | |||||
* | | Added support for RSA client authentication with SHA-2 | Zdenek Zambersky | 2021-11-18 | 9 | -27/+161 |
| | | |||||
* | | Update rubocop version | Florian Wininger | 2021-10-25 | 1 | -1/+1 |
| | | |||||
* | | Fix rubocop coding style. | Florian Wininger | 2021-10-25 | 94 | -545/+475 |
| | | | | | | | | Lot of spacing issues :) | ||||
* | | Fix rubucop config | Florian Wininger | 2021-10-25 | 2 | -126/+146 |
| | | |||||
* | | Disable codecov | Florian Wininger | 2021-10-25 | 1 | -2/+2 |
| | | |||||
* | | Update expired certsv6.3.0.beta1 | Miklós Fazekas | 2021-08-10 | 1 | -8/+8 |
| | | |||||
* | | 6.3.0.beta1 release | Miklós Fazekas | 2021-08-10 | 2 | -2/+3 |
| | | |||||
* | | Merge pull request #765 from dax/fix_translated_strict_host_key_checking | Miklós Fazekas | 2021-08-10 | 2 | -12/+42 |
|\ \ | | | | | | | Fix StrictHostKeyChecking ssh config parameter translation | ||||
| * | | Fix StrictHostKeyChecking ssh config parameter translation | David Rousselie | 2020-10-12 | 2 | -12/+42 |
| | | | |||||
* | | | Merge pull request #781 from haccht/missing_ssh_signature_type | Miklós Fazekas | 2021-08-10 | 1 | -9/+5 |
|\ \ \ | | | | | | | | | Fix missing OpenSSL::Pkey::EC::Point#ssh_signature_type | ||||
| * | | | Make it clear that ssh_signature_type is an alias for ssh_type by using ↵ | haccht | 2020-08-07 | 1 | -12/+4 |
| | | | | | | | | | | | | | | | | alias keyword | ||||
| * | | | Fix missing OpenSSL::Pkey::EC::Point#ssh_signature_type | haccht | 2020-08-06 | 1 | -0/+4 |
| | | | | |||||
* | | | | Merge pull request #835 from net-ssh/mfazekas/frozen-literal | Miklós Fazekas | 2021-08-10 | 18 | -35/+38 |
|\ \ \ \ | | | | | | | | | | | Support frozen_string_literals | ||||
| * | | | | Support frozen_string_literalsmfazekas/frozen-literal | Miklós Fazekas | 2021-08-07 | 18 | -35/+38 |
| | | | | | |||||
* | | | | | Merge pull request #833 from net-ssh/mfazekas/cert-base-auth | Miklós Fazekas | 2021-08-10 | 12 | -25/+257 |
|\ \ \ \ \ | |/ / / / |/| | | | | Cert based host auth | ||||
| * | | | | CHangelog, ignore vedor from rubocopmfazekas/cert-base-auth | Miklós Fazekas | 2021-08-06 | 2 | -0/+7 |
| | | | | |