Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | 7.1.0 release preparev7.1.0 | Miklós Fazekas | 2023-03-12 | 1 | -1/+1 |
| | |||||
* | Merge pull request #891 from RemcodM/master | Miklós Fazekas | 2023-02-28 | 1 | -1/+6 |
|\ | | | | | Accept pubkey_algorithms option when starting a new connection | ||||
| * | Accept pubkey_algorithms option when starting a new connection | Remco de Man | 2023-01-05 | 1 | -1/+6 |
| | | |||||
* | | 7.1.0.beta2 release preparev7.1.0.beta2 | Miklós Fazekas | 2023-02-27 | 1 | -1/+1 |
| | | |||||
* | | Remove trailing commas | Ben Schmeckpeper | 2023-02-08 | 1 | -2/+2 |
| | | |||||
* | | Don't use the deprecated set_XXX methods on RSA keys. | Ben Schmeckpeper | 2023-02-08 | 1 | -21/+21 |
| | | | | | | | | This code is taken from https://github.com/nov/json-jwt/pull/102/files | ||||
* | | Merge pull request #876 from bschmeck/raise-on-nil-pbkdf | Miklós Fazekas | 2023-01-24 | 1 | -0/+1 |
|\ \ | | | | | | | Raise error when BCryptPbkdf fails | ||||
| * | | Raise an error if BCryptPbkdf doesn't give us a key | Ben Schmeckpeper | 2022-07-20 | 1 | -0/+1 |
| | | | | | | | | | | | | | | | This can happen if we request fewer than 1 round or if the password or salt are blank or keylen + ivlen is zero. | ||||
* | | | 7.1.0.beta1 release | Miklós Fazekas | 2023-01-24 | 1 | -2/+2 |
| | | | |||||
* | | | Update version.rb | Miklós Fazekas | 2023-01-24 | 1 | -2/+2 |
| | | | |||||
* | | | Fix typo | Robin Wallin | 2023-01-17 | 1 | -1/+1 |
| |/ |/| | |||||
* | | Fix certificate signature_valid? check | Phillip Hellewell | 2022-10-11 | 1 | -2/+2 |
|/ | | | | | Need to pass in :host_key option so it will verify using the correct signature algorithm instead of always using SHA1. | ||||
* | Update version.rbv7.0.1 | Miklós Fazekas | 2022-06-26 | 1 | -1/+1 |
| | |||||
* | Merge pull request #866 from terceiro/drop-debugging-statement | Miklós Fazekas | 2022-06-26 | 1 | -1/+0 |
|\ | | | | | Channel: drop debugging statement | ||||
| * | Channel: drop debugging statement | Antonio Terceiro | 2022-05-19 | 1 | -1/+0 |
| | | | | | | | | | | | | | | After upgrading to net-ssh 7.0.0, I get several lines like `E:TERM V:xterm` printed in the terminal when connecting to hosts. I'm assuming this slipped by mistake in commit 5e79b6687771 ("Fixed integration test opensshd kill") | ||||
* | | Update version.rbv7.0.0 | Miklós Fazekas | 2022-06-26 | 1 | -1/+1 |
|/ | |||||
* | v 7.0.0.beta1 release preparev7.0.0.beta1 | Miklós Fazekas | 2022-04-30 | 1 | -2/+2 |
| | |||||
* | Fix #854 regression | Florian Wininger | 2022-04-29 | 1 | -5/+1 |
| | |||||
* | fix rubocop issues | Florian Wininger | 2022-04-29 | 2 | -22/+34 |
| | |||||
* | diffie-hellman: create the key by generating the PEM file | Simon Chopin | 2022-04-29 | 1 | -17/+17 |
| | | | | | | | | | | This makes the code compatible with OpenSSL 3.0. However, an issue with this is that it is not possible anymore to ensure a specific size for the private key, as indicated in the inline comment. v2: avoid PKey.generate_key on older releases (< 2.7) Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | Use OpenSSL::PKey::EC.generate static method | Simon Chopin | 2022-04-29 | 1 | -1/+1 |
| | | | | | | | | | | | Migrate all instances of the pattern EC.new(foo).generate_key to EC.generate(foo), as the old pattern isn't supported when using OpenSSL 3.0, since one is not allowed to mess with the internal data of already created objects now. The new API has been introduced in Ruby 2.4. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | transport: create EC keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 1 | -3/+11 |
| | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | buffer: create DSA keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 1 | -13/+18 |
| | | | | | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. To add insult to injury, contrary to other types of keys such as RSA, we need to actually build the full PEM data and not just pack the numbers in a simple sequence, making the code even a bit more complicated. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | buffer: create RSA keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 1 | -9/+9 |
| | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | Read ecdsa private key in openssh format | Martin Sander | 2022-04-12 | 1 | -0/+6 |
| | | | | Fixes #657. | ||||
* | openssl: DSA: don't hardcode expected signature size | Antonio Terceiro | 2022-04-12 | 1 | -1/+2 |
| | | | | | | | | | | | The default value of the Q parameters for DSA keys changed in Ruby OpenSSL 3.0.0, and that causes DSA signatures to be longer by default. This change might have been accidental, and this may be reverted; see https://github.com/ruby/openssl/issues/483 This changes the check for the signature length to not be against a hardcoded expected lenght, but against the expected length as calculated from the Q parameter. | ||||
* | known_hosts.rb: Added missing require delegate | Zdenek Zambersky | 2022-04-05 | 1 | -0/+1 |
| | |||||
* | Merge pull request #850 from boblail/lail/expand-paths-to-identity-agent | Miklós Fazekas | 2022-03-28 | 1 | -2/+2 |
|\ | | | | | Support `~` in the path to the SSH agent's unix socket | ||||
| * | Support `~` in the path to the SSH agent's unix socket | Bob Lail | 2022-03-04 | 1 | -2/+2 |
| | | |||||
* | | Added support for RSA client authentication with SHA-2 | Zdenek Zambersky | 2021-11-18 | 7 | -24/+99 |
| | | |||||
* | | Fix rubocop coding style. | Florian Wininger | 2021-10-25 | 53 | -211/+211 |
| | | | | | | | | Lot of spacing issues :) | ||||
* | | 6.3.0.beta1 release | Miklós Fazekas | 2021-08-10 | 1 | -2/+2 |
| | | |||||
* | | Merge pull request #765 from dax/fix_translated_strict_host_key_checking | Miklós Fazekas | 2021-08-10 | 1 | -8/+24 |
|\ \ | | | | | | | Fix StrictHostKeyChecking ssh config parameter translation | ||||
| * | | Fix StrictHostKeyChecking ssh config parameter translation | David Rousselie | 2020-10-12 | 1 | -8/+24 |
| | | | |||||
* | | | Merge pull request #781 from haccht/missing_ssh_signature_type | Miklós Fazekas | 2021-08-10 | 1 | -9/+5 |
|\ \ \ | | | | | | | | | Fix missing OpenSSL::Pkey::EC::Point#ssh_signature_type | ||||
| * | | | Make it clear that ssh_signature_type is an alias for ssh_type by using ↵ | haccht | 2020-08-07 | 1 | -12/+4 |
| | | | | | | | | | | | | | | | | alias keyword | ||||
| * | | | Fix missing OpenSSL::Pkey::EC::Point#ssh_signature_type | haccht | 2020-08-06 | 1 | -0/+4 |
| | | | | |||||
* | | | | Merge pull request #835 from net-ssh/mfazekas/frozen-literal | Miklós Fazekas | 2021-08-10 | 8 | -16/+21 |
|\ \ \ \ | | | | | | | | | | | Support frozen_string_literals | ||||
| * | | | | Support frozen_string_literalsmfazekas/frozen-literal | Miklós Fazekas | 2021-08-07 | 8 | -16/+21 |
| | | | | | |||||
* | | | | | Merge pull request #833 from net-ssh/mfazekas/cert-base-auth | Miklós Fazekas | 2021-08-10 | 4 | -9/+84 |
|\ \ \ \ \ | |/ / / / |/| | | | | Cert based host auth | ||||
| * | | | | Allow single asterisk in known hosts and asterisk should match mutliple dots | Miklós Fazekas | 2021-08-06 | 1 | -3/+3 |
| | | | | | |||||
| * | | | | Accept all cert host key algs | Miklós Fazekas | 2021-08-06 | 1 | -0/+3 |
| | | | | | |||||
| * | | | | Use ports specific format | Miklós Fazekas | 2021-08-05 | 1 | -15/+17 |
| | | | | | |||||
| * | | | | Remove byebug | Miklós Fazekas | 2021-08-05 | 1 | -1/+0 |
| | | | | | |||||
| * | | | | Don't call Delegator ctor | Miklós Fazekas | 2021-08-05 | 1 | -2/+1 |
| | | | | | |||||
| * | | | | Rubocop fixes | Miklós Fazekas | 2021-08-05 | 1 | -11/+15 |
| | | | | | |||||
| * | | | | HostKeyEntries classes | Miklós Fazekas | 2021-08-05 | 4 | -20/+64 |
| | | | | | |||||
| * | | | | Initial version of cert base host auth | Miklós Fazekas | 2021-08-05 | 2 | -12/+36 |
| | | | | | |||||
* | | | | | Remove x25519 workaroundsmfazekas/fix-x25519 | Miklós Fazekas | 2021-08-05 | 1 | -1/+0 |
|/ / / / | |||||
* | | | | Workaround for https://github.com/RubyCrypto/x25519/issues/22 | Miklós Fazekas | 2021-08-04 | 1 | -0/+2 |
| | | | |