summaryrefslogtreecommitdiff
path: root/lib/net/ssh
Commit message (Collapse)AuthorAgeFilesLines
* 7.1.0 release preparev7.1.0Miklós Fazekas2023-03-121-1/+1
|
* 7.1.0.beta2 release preparev7.1.0.beta2Miklós Fazekas2023-02-271-1/+1
|
* Remove trailing commasBen Schmeckpeper2023-02-081-2/+2
|
* Don't use the deprecated set_XXX methods on RSA keys.Ben Schmeckpeper2023-02-081-21/+21
| | | | This code is taken from https://github.com/nov/json-jwt/pull/102/files
* Merge pull request #876 from bschmeck/raise-on-nil-pbkdfMiklós Fazekas2023-01-241-0/+1
|\ | | | | Raise error when BCryptPbkdf fails
| * Raise an error if BCryptPbkdf doesn't give us a keyBen Schmeckpeper2022-07-201-0/+1
| | | | | | | | | | This can happen if we request fewer than 1 round or if the password or salt are blank or keylen + ivlen is zero.
* | 7.1.0.beta1 releaseMiklós Fazekas2023-01-241-2/+2
| |
* | Update version.rbMiklós Fazekas2023-01-241-2/+2
| |
* | Fix typoRobin Wallin2023-01-171-1/+1
| |
* | Fix certificate signature_valid? checkPhillip Hellewell2022-10-111-2/+2
|/ | | | | Need to pass in :host_key option so it will verify using the correct signature algorithm instead of always using SHA1.
* Update version.rbv7.0.1Miklós Fazekas2022-06-261-1/+1
|
* Merge pull request #866 from terceiro/drop-debugging-statementMiklós Fazekas2022-06-261-1/+0
|\ | | | | Channel: drop debugging statement
| * Channel: drop debugging statementAntonio Terceiro2022-05-191-1/+0
| | | | | | | | | | | | | | After upgrading to net-ssh 7.0.0, I get several lines like `E:TERM V:xterm` printed in the terminal when connecting to hosts. I'm assuming this slipped by mistake in commit 5e79b6687771 ("Fixed integration test opensshd kill")
* | Update version.rbv7.0.0Miklós Fazekas2022-06-261-1/+1
|/
* v 7.0.0.beta1 release preparev7.0.0.beta1Miklós Fazekas2022-04-301-2/+2
|
* Fix #854 regressionFlorian Wininger2022-04-291-5/+1
|
* fix rubocop issuesFlorian Wininger2022-04-292-22/+34
|
* diffie-hellman: create the key by generating the PEM fileSimon Chopin2022-04-291-17/+17
| | | | | | | | | | This makes the code compatible with OpenSSL 3.0. However, an issue with this is that it is not possible anymore to ensure a specific size for the private key, as indicated in the inline comment. v2: avoid PKey.generate_key on older releases (< 2.7) Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* Use OpenSSL::PKey::EC.generate static methodSimon Chopin2022-04-291-1/+1
| | | | | | | | | | | Migrate all instances of the pattern EC.new(foo).generate_key to EC.generate(foo), as the old pattern isn't supported when using OpenSSL 3.0, since one is not allowed to mess with the internal data of already created objects now. The new API has been introduced in Ruby 2.4. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* transport: create EC keys by loading PEM data directlySimon Chopin2022-04-291-3/+11
| | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* buffer: create DSA keys by loading PEM data directlySimon Chopin2022-04-291-13/+18
| | | | | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. To add insult to injury, contrary to other types of keys such as RSA, we need to actually build the full PEM data and not just pack the numbers in a simple sequence, making the code even a bit more complicated. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* buffer: create RSA keys by loading PEM data directlySimon Chopin2022-04-291-9/+9
| | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com>
* Read ecdsa private key in openssh formatMartin Sander2022-04-121-0/+6
| | | | Fixes #657.
* openssl: DSA: don't hardcode expected signature sizeAntonio Terceiro2022-04-121-1/+2
| | | | | | | | | | | The default value of the Q parameters for DSA keys changed in Ruby OpenSSL 3.0.0, and that causes DSA signatures to be longer by default. This change might have been accidental, and this may be reverted; see https://github.com/ruby/openssl/issues/483 This changes the check for the signature length to not be against a hardcoded expected lenght, but against the expected length as calculated from the Q parameter.
* known_hosts.rb: Added missing require delegateZdenek Zambersky2022-04-051-0/+1
|
* Merge pull request #850 from boblail/lail/expand-paths-to-identity-agentMiklós Fazekas2022-03-281-2/+2
|\ | | | | Support `~` in the path to the SSH agent's unix socket
| * Support `~` in the path to the SSH agent's unix socketBob Lail2022-03-041-2/+2
| |
* | Added support for RSA client authentication with SHA-2Zdenek Zambersky2021-11-187-24/+99
| |
* | Fix rubocop coding style.Florian Wininger2021-10-2552-208/+208
| | | | | | | | Lot of spacing issues :)
* | 6.3.0.beta1 releaseMiklós Fazekas2021-08-101-2/+2
| |
* | Merge pull request #765 from dax/fix_translated_strict_host_key_checkingMiklós Fazekas2021-08-101-8/+24
|\ \ | | | | | | Fix StrictHostKeyChecking ssh config parameter translation
| * | Fix StrictHostKeyChecking ssh config parameter translationDavid Rousselie2020-10-121-8/+24
| | |
* | | Merge pull request #781 from haccht/missing_ssh_signature_typeMiklós Fazekas2021-08-101-9/+5
|\ \ \ | | | | | | | | Fix missing OpenSSL::Pkey::EC::Point#ssh_signature_type
| * | | Make it clear that ssh_signature_type is an alias for ssh_type by using ↵haccht2020-08-071-12/+4
| | | | | | | | | | | | | | | | alias keyword
| * | | Fix missing OpenSSL::Pkey::EC::Point#ssh_signature_typehaccht2020-08-061-0/+4
| | | |
* | | | Merge pull request #835 from net-ssh/mfazekas/frozen-literalMiklós Fazekas2021-08-108-16/+21
|\ \ \ \ | | | | | | | | | | Support frozen_string_literals
| * | | | Support frozen_string_literalsmfazekas/frozen-literalMiklós Fazekas2021-08-078-16/+21
| | | | |
* | | | | Merge pull request #833 from net-ssh/mfazekas/cert-base-authMiklós Fazekas2021-08-103-8/+83
|\ \ \ \ \ | |/ / / / |/| | | | Cert based host auth
| * | | | Allow single asterisk in known hosts and asterisk should match mutliple dotsMiklós Fazekas2021-08-061-3/+3
| | | | |
| * | | | Accept all cert host key algsMiklós Fazekas2021-08-061-0/+3
| | | | |
| * | | | Use ports specific formatMiklós Fazekas2021-08-051-15/+17
| | | | |
| * | | | Remove byebugMiklós Fazekas2021-08-051-1/+0
| | | | |
| * | | | Don't call Delegator ctorMiklós Fazekas2021-08-051-2/+1
| | | | |
| * | | | Rubocop fixesMiklós Fazekas2021-08-051-11/+15
| | | | |
| * | | | HostKeyEntries classesMiklós Fazekas2021-08-053-19/+63
| | | | |
| * | | | Initial version of cert base host authMiklós Fazekas2021-08-052-12/+36
| | | | |
* | | | | Remove x25519 workaroundsmfazekas/fix-x25519Miklós Fazekas2021-08-051-1/+0
|/ / / /
* | | | Workaround for https://github.com/RubyCrypto/x25519/issues/22Miklós Fazekas2021-08-041-0/+2
| | | |
* | | | More debuggingMiklós Fazekas2021-08-041-1/+1
| | | |
* | | | Some debuggingMiklós Fazekas2021-08-041-0/+1
| | | |