summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Update README.mdHEADmasterFlorian Wininger2023-05-141-18/+18
| | | Update the EOS for weak algorithms
* Merge pull request #904 from net-ssh/mfazekas-try-new-ubuntuMiklós Fazekas2023-03-2215-55/+97
|\ | | | | feat: use new ubuntu - jammy in gh actions and vagrant
| * fix: integration test should use legacy PEM format for private keys if ↵mfazekas-try-new-ubuntuMiklós Fazekas2023-03-228-34/+30
| | | | | | | | ED25519 is not loaded
| * fix: integration test failuresMiklós Fazekas2023-03-225-4/+14
| |
| * upgrade ansible to jammy64Miklós Fazekas2023-03-163-16/+52
| |
| * WIP - try new ubuntu in gh actionsMiklós Fazekas2023-03-121-1/+1
|/
* 7.1.0 release preparev7.1.0Miklós Fazekas2023-03-123-24/+51
|
* Merge pull request #891 from RemcodM/masterMiklós Fazekas2023-02-282-1/+13
|\ | | | | Accept pubkey_algorithms option when starting a new connection
| * Accept pubkey_algorithms option when starting a new connectionRemco de Man2023-01-052-1/+13
| |
* | 7.1.0.beta2 release preparev7.1.0.beta2Miklós Fazekas2023-02-271-1/+1
| |
* | Merge pull request #902 from net-ssh/mfazekas/add-test-for-conn-timeoutMiklós Fazekas2023-02-271-0/+32
|\ \ | | | | | | test: added integration test for connection timeout
| * | test: added integration test for connection timeoutmfazekas/add-test-for-conn-timeoutMiklós Fazekas2023-02-271-0/+32
| | |
* | | Added changelog, implement version bumperMiklós Fazekas2023-02-272-0/+37
|/ /
* | Remove trailing commasBen Schmeckpeper2023-02-081-2/+2
| |
* | Don't use the deprecated set_XXX methods on RSA keys.Ben Schmeckpeper2023-02-081-21/+21
| | | | | | | | This code is taken from https://github.com/nov/json-jwt/pull/102/files
* | doc: use github private vunerability reportingMiklós Fazekas2023-02-062-3/+5
| |
* | Update README.mdMiklós Fazekas2023-02-061-1/+7
| | | | | | Added tidelift security policy for vulnerability
* | Merge pull request #876 from bschmeck/raise-on-nil-pbkdfMiklós Fazekas2023-01-242-0/+27
|\ \ | | | | | | Raise error when BCryptPbkdf fails
| * | Raise an error if BCryptPbkdf doesn't give us a keyBen Schmeckpeper2022-07-201-0/+1
| | | | | | | | | | | | | | | This can happen if we request fewer than 1 round or if the password or salt are blank or keylen + ivlen is zero.
| * | Failing test for passing a blank passwordBen Schmeckpeper2022-07-201-0/+6
| | |
| * | Failing test for a key that specifies no PBKDF roundsBen Schmeckpeper2022-07-201-0/+20
| | |
* | | Merge pull request #884 from tisba/patch-1Miklós Fazekas2023-01-241-0/+14
|\ \ \ | | | | | | | | Add 7.0.0 + 7.0.1 to CHANGES.txt
| * | | Adds 7.0.0 + 7.0.1 changelogSebastian Cohnen2022-11-091-0/+14
| | |/ | |/|
* | | Update expired certv7.1.0.beta1Miklós Fazekas2023-01-241-8/+8
| | |
* | | 7.1.0.beta1 releaseMiklós Fazekas2023-01-241-2/+2
| | |
* | | Update version.rbMiklós Fazekas2023-01-241-2/+2
| | |
* | | Fix typoRobin Wallin2023-01-171-1/+1
|/ /
* | Merge pull request #883 from sshock/fix-cert-sig-valid-checkMiklós Fazekas2022-10-182-7/+30
|\ \ | | | | | | Fix certificate signature valid check
| * | Add tests for a cert with a SHA512 signaturePhillip Hellewell2022-10-111-5/+28
| | |
| * | Fix certificate signature_valid? checkPhillip Hellewell2022-10-111-2/+2
|/ / | | | | | | | | Need to pass in :host_key option so it will verify using the correct signature algorithm instead of always using SHA1.
* | Bump actions/checkout to v3mishina2022-07-223-4/+4
| |
* | andrewmcodes/rubocop-linter-action is deprecatedmishina2022-07-221-5/+8
|/
* Update version.rbv7.0.1Miklós Fazekas2022-06-261-1/+1
|
* Merge pull request #866 from terceiro/drop-debugging-statementMiklós Fazekas2022-06-261-1/+0
|\ | | | | Channel: drop debugging statement
| * Channel: drop debugging statementAntonio Terceiro2022-05-191-1/+0
| | | | | | | | | | | | | | After upgrading to net-ssh 7.0.0, I get several lines like `E:TERM V:xterm` printed in the terminal when connecting to hosts. I'm assuming this slipped by mistake in commit 5e79b6687771 ("Fixed integration test opensshd kill")
* | Update version.rbv7.0.0Miklós Fazekas2022-06-261-1/+1
|/
* v 7.0.0.beta1 release preparev7.0.0.beta1Miklós Fazekas2022-04-301-2/+2
|
* Fix #854 regressionFlorian Wininger2022-04-291-5/+1
|
* Fix unit tests for OpenSSL 3Florian Wininger2022-04-293-2/+14
|
* fix rubocop issuesFlorian Wininger2022-04-295-44/+64
|
* diffie-hellman: create the key by generating the PEM fileSimon Chopin2022-04-291-17/+17
| | | | | | | | | | This makes the code compatible with OpenSSL 3.0. However, an issue with this is that it is not possible anymore to ensure a specific size for the private key, as indicated in the inline comment. v2: avoid PKey.generate_key on older releases (< 2.7) Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* Use OpenSSL::PKey::EC.generate static methodSimon Chopin2022-04-296-12/+12
| | | | | | | | | | | Migrate all instances of the pattern EC.new(foo).generate_key to EC.generate(foo), as the old pattern isn't supported when using OpenSSL 3.0, since one is not allowed to mess with the internal data of already created objects now. The new API has been introduced in Ruby 2.4. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* transport: create EC keys by loading PEM data directlySimon Chopin2022-04-291-3/+11
| | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* buffer: create DSA keys by loading PEM data directlySimon Chopin2022-04-292-23/+36
| | | | | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. To add insult to injury, contrary to other types of keys such as RSA, we need to actually build the full PEM data and not just pack the numbers in a simple sequence, making the code even a bit more complicated. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* buffer: create RSA keys by loading PEM data directlySimon Chopin2022-04-293-24/+25
| | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* tests: Enable legacy providers if using OpenSSL 3.0Simon Chopin2022-04-292-0/+31
| | | | | | | Quite a few tests rely on outdated algorithms that have been relegated to the legacy provider in OpenSSL 3.0. `rake test` now loads a custom OpenSSL configuration file to enable said legacy provider, which is usually disabled by default.
* update rubocop configFlorian Wininger2022-04-292-16/+25
|
* Test all kexFlorian Wininger2022-04-201-0/+16
|
* Update tests suiteFlorian Wininger2022-04-152-7/+21
|
* Fix a typoFlorian Wininger2022-04-151-4/+4
|