summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Update ruby versions on travismfazekas-rubyversions-updateMiklós Fazekas2020-02-061-4/+5
|
* Merge pull request #735 from anderscarling/patch-1Miklós Fazekas2020-01-191-1/+1
|\ | | | | Fix spelling
| * Fix spellingAnders Carling2020-01-191-1/+1
|/
* beta2 preparev6.0.0.beta2Miklos Fazekas2020-01-191-1/+1
|
* 6.0.0 beta2 prepareMiklós Fazekas2020-01-191-0/+4
|
* Merge pull request #722 from anderscarling/certkeysMiklós Fazekas2020-01-198-77/+279
|\ | | | | Support :certkeys and CertificateFile configuration option
| * Reduce number of lines in method to satisfy rubocopAnders Carling2019-10-311-21/+21
| |
| * Restore accidentally reordered valueAnders Carling2019-10-311-1/+1
| |
| * Reduce number of lines in block to satisfy rubocopAnders Carling2019-10-311-6/+2
| |
| * Place value in globals if we're in a global contextAnders Carling2019-10-311-1/+1
| |
| * Fix rubocop complaintsAnders Carling2019-10-312-2/+1
| |
| * Test signing using explicitly loaded keycertAnders Carling2019-10-311-0/+8
| |
| * Test CertificateFile configuration loadingAnders Carling2019-10-312-1/+6
| |
| * Remove disused variableAnders Carling2019-10-311-1/+1
| |
| * Test handling of keycert listAnders Carling2019-10-311-0/+14
| |
| * Test matching of explicitly configured key certificates to private keysAnders Carling2019-10-311-0/+55
| |
| * Separate public and private keys in testAnders Carling2019-10-311-40/+60
| | | | | | Required to test matching of explicitly configured key certificates to private keys
| * Improve test by providing a real Certificate instance instead of repurposing ↵Anders Carling2019-10-311-6/+24
| | | | | | | | the privat key
| * Test explicit cert configurationAnders Carling2019-10-311-6/+35
| |
| * Add integration test using cert and key from ssh-agentAnders Carling2019-10-311-0/+17
| |
| * Fix signing with private key file existing both on disk and in agent, ↵Anders Carling2019-10-312-15/+10
| | | | | | | | without corresponding public key on disk
| * Support :certkeys and CertificateFile configuration optionAnders Carling2019-10-294-4/+50
| |
* | Merge pull request #724 from tarraschk/remove-old-ruby-compatMiklós Fazekas2019-11-139-21/+0
|\ \ | |/ |/| Remove ruby_compat to comply with the new Ruby >= 2.3 requirement
| * Remove ruby_compat to comply with the new Ruby >= 2.3 requirementMaxime Alay-Eddine2019-11-139-21/+0
|/
* README is markdownv6.0.0.beta1Miklos Fazekas2019-10-252-2/+2
|
* 6.0.0 beta1 prepareMiklos Fazekas2019-10-253-22/+29
|
* Merge pull request #713 from mfazekas/int-test-curve25519sha256Miklós Fazekas2019-10-253-1/+91
|\ | | | | Integration test for Curve25519Sha256Keys
| * Fixed fragile waitpidMiklos Fazekas2019-10-251-1/+6
| |
| * Integration test for Curve25519Sha256Keysint-test-curve25519sha256Miklos Fazekas2019-09-162-0/+85
| |
* | Merge pull request #721 from baweaver/brbrady-alt/fix_host_key_formatMiklós Fazekas2019-10-252-6/+16
|\ \ | | | | | | Add support for all algorithms in Transport::Algorithms#host_key_format
| * | Original (brbrady) Add support for all algorithms in ↵Brandon Weaver2019-10-252-6/+16
|/ / | | | | | | Transport::Algorithms#host_key_format
* | Merge pull request #711 from fwininger/enhancement2Miklós Fazekas2019-10-1115-26/+54
|\ \ | | | | | | Define rubocop metric length
| * | Define rubocop metric lengthFlorian Wininger2019-09-2515-26/+54
|/ / | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | Merge pull request #710 from fwininger/enhancementMiklós Fazekas2019-09-218-88/+55
|\ \ | | | | | | Enhance unit-test and remove unused file archfour_check.rb
| * | Enhance unit-test and remove unused file archfour_check.rbFlorian Wininger2019-09-118-88/+55
| | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | | Merge pull request #714 from graaff/hmac-sha2-512-etmMiklós Fazekas2019-09-2114-31/+332
|\ \ \ | |_|/ |/| | Add sha2-{256,512}-etm@openssh.com MAC algorithms
| * | Add sha2-{256,512}-etm@openssh.com MAC algorithmsHans de Graaff2019-09-1714-31/+332
|/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | Implement the Encrypt-Then-Mac versions of the SHA2-256 and SHA2-512 MACs. These MACs are implemented by openssh and may be the only MACs available on a hardened installation of openssh. With EtM the MAC is calculated over the unencrypted packet length and the encrypted payload (which includes padding length and padding). The main benefit of EtM schemes is that it allows the encrypted payload to be authenticated before it gets passed to the encryption engine. This patch does not implement that mechanism, but this can be added later to the poll_next_packet method. Note that all current MACs already pass unauthenticated data to the encryption engine.
* | Merge pull request #690 from fwininger/support_curve25519Miklós Fazekas2019-09-119-41/+290
|\ \ | |/ |/| Add Curve25519Sha256
| * Add x25519 in the ReadmeFlorian Wininger2019-09-111-0/+3
| | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
| * Update rubocop_todo.ymlFlorian Wininger2019-09-101-16/+18
| | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
| * Add Curve25519Sha256Florian Wininger2019-09-107-25/+269
|/ | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Merge pull request #707 from nickhammond/patch-1Miklós Fazekas2019-09-041-0/+3
|\ | | | | Add changelog_uri to metadata to easily link from rubygems.org
| * Remove extra spaces after spec.metadataNick Hammond2019-08-281-1/+1
| |
| * Add changelog_uri to metadata to easily link from rubygems.orgNick Hammond2019-08-271-0/+3
| | | | | | Reference: https://guides.rubygems.org/specification-reference/#metadata
* | Merge pull request #708 from fwininger/refactoring_kexMiklós Fazekas2019-09-045-89/+115
|\ \ | | | | | | Refactoring kex ecdh with RFC5656
| * | Update rubocop_todo.ymlFlorian Wininger2019-08-281-24/+20
| | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
| * | Refactoring kex ecdh RFC5656Florian Wininger2019-08-284-65/+95
| | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | | Merge pull request #709 from fwininger/remove_unsecure_algs_by_defaultMiklós Fazekas2019-09-044-53/+139
|\ \ \ | |/ / |/| | Remove unsecure algs by default
| * | Add depracted warning in the Readme.md.Florian Wininger2019-09-021-0/+7
| | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
| * | Disable by default unsecure algorithmFlorian Wininger2019-09-023-53/+79
| | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>