Jeroen van Erp
eb8b7b51ca
Added callback to request updated password for a user in case of USERAUTH_PASSWD_CHANGEREQ ( Fixes #193 )
2016-03-18 15:24:58 +01:00
Jeroen van Erp
a2cccd5cef
Added javadoc to indicate that close() should always be called on a Command, before inspecting the result(s) ( Fixes #114 )
2016-03-18 13:31:25 +01:00
Jeroen van Erp
50403483da
Implemented switch for waiting on server ident before sending client ident. ( Fixes #118 )
2016-03-18 13:24:33 +01:00
Jeroen van Erp
3c230a0fc4
Fixed potential race condition identified in #203
2016-03-18 13:11:59 +01:00
Jeroen van Erp
4f152749ce
JavaDoc fixes
2016-03-18 13:11:03 +01:00
Jeroen van Erp
e0df6a5fb5
Organised some imports
2016-03-18 13:09:28 +01:00
Jeroen van Erp
bd67135ffa
Fixed race condition in global request response handling
2016-03-18 11:17:09 +01:00
Jeroen van Erp
ca49ca324f
Added reproducing testcase
2016-03-18 10:53:15 +01:00
Jeroen van Erp
dbb0eb0238
Ingoring integration test
2015-11-20 15:00:02 +01:00
Jeroen van Erp
c0487c9ee5
v0.15.0
2015-11-20 14:46:06 +01:00
Jeroen van Erp
db75bad25c
Added support for ed25519 keys ( Fixes #220 )
2015-11-20 13:48:59 +01:00
Jeroen van Erp
a73776ad40
Merge pull request #226 from hierynomus/ecdsa_fix
...
Correctly calculating ECDSA key fingerprint (Fixes #225 )
2015-11-18 22:30:57 +01:00
Jeroen van Erp
237c7d18b6
Correctly calculating ECDSA key fingerprint ( Fixes #225 )
2015-11-18 22:19:15 +01:00
Jeroen van Erp
b7c8cda851
Refactored test to be reusable for other algorithm variants
2015-11-18 12:41:11 +01:00
Jeroen van Erp
2b6fedc939
Added all RFC Ciphers and some extended ones
2015-11-11 22:10:29 +01:00
Jeroen van Erp
a2a5923767
Added todo comment
2015-11-04 10:27:39 +01:00
Jeroen van Erp
afdfa91eb7
Added curve25519-sha256@libssh.org to the default config
2015-11-03 16:22:18 +01:00
Jeroen van Erp
29a6cf6f79
Added support for curve25519-sha256@libssh.org ( Fixes #171 )
2015-11-03 16:18:53 +01:00
Jeroen van Erp
eece80cf48
Enabled ecdh-sha2-nistp521
2015-11-03 13:47:04 +01:00
Jeroen van Erp
7973cb1ff6
Upgraded Apache SSHD to 1.0.0
2015-11-03 13:43:00 +01:00
Jeroen van Erp
f2314e74ed
Added support for ecdh-sha2-nistp256 and ecdh-sha2-nistp384 key exchange algorithms
2015-11-02 15:29:47 +01:00
Jeroen van Erp
47df71c836
Implemented diffie-hellman-group-exchange Kex methods ( Fixes #167 )
2015-10-29 12:30:58 +01:00
gaddiej
10f8645ecd
Throw a SCPRemoteException when an error occurs on the remote server. SCPRemoteException contains the error message returned from the remote server.
2015-10-24 13:54:49 +00:00
Jeroen van Erp
d520585a09
SCP remote path escaping is now configurable ( Fixes #212 , #184 , #152 )
2015-09-21 14:51:57 +02:00
Jeroen van Erp
28a11b0b45
Merge pull request #210 from iterate-ch/issue-209
...
Fix issue 209.
2015-08-18 18:55:50 +02:00
Jeroen van Erp
74a4012023
Merge pull request #208 from lguerin/bandwidth
...
SCP : limit the used bandwidth
2015-08-18 17:23:55 +02:00
Billy Keyes
c98ad22a7a
Skip blank lines when detecting key formats
...
Some private keys found in the wild start with a blank line, which
breaks SSHJ. OpenSSH utilities worked as expected with these key files.
Also add some basic tests for key formats.
2015-08-18 14:25:13 +02:00
David Kocher
5d81e87bce
Fix issue 209.
2015-08-17 10:11:55 +02:00
lguerin
d18e9d9961
Refactor SCP arguments
2015-08-13 14:44:45 +02:00
lguerin
84990ada08
Fix typo
2015-08-13 14:41:09 +02:00
lguerin
9c424f9431
Remove underscores from Test method's name
2015-08-13 11:37:15 +02:00
lguerin
dec00efcaa
Fix typo and clarify rate transfer comment
2015-08-13 10:49:56 +02:00
lguerin
782ff9b83e
Add an option to limit the used bandwidth with SCP upload and download features
2015-08-12 16:55:08 +02:00
Jeroen van Erp
9982e5c30e
Added testcase for #194
2015-06-17 21:49:05 +02:00
Jeroen van Erp
3f340d6927
Updated version in default config
2015-06-17 16:17:36 +02:00
Jeroen van Erp
b8eec64a37
Added tests and categories
2015-06-17 16:04:01 +02:00
Jeroen van Erp
9529c30105
Reformatted
2015-06-17 12:36:31 +02:00
Jeroen van Erp
6a476858d1
Added RemoteFileTest
2015-06-17 12:28:57 +02:00
Jeroen van Erp
6bfb268c11
Merge branch 'issue-183' of https://github.com/bkarge/sshj into bkarge-issue-183
2015-06-17 12:12:56 +02:00
Jeroen van Erp
e334525da5
Rewritten integration tests
2015-06-17 12:12:37 +02:00
Jeroen van Erp
8776500fa0
Merge pull request #201 from iterate-ch/feature/algorithms-verifier
...
Add option for client to verify negotiated key exchange algorithms.
2015-06-16 15:50:06 +02:00
David Kocher
a747db88ed
Add option for client to verify negotiated key exchange algorithms.
2015-06-16 15:42:01 +02:00
Jeroen van Erp
97065264de
Cleared some JavaDoc warnings
2015-06-16 14:12:36 +02:00
Jeroen van Erp
7c26ac669a
Started better integration testing setup with Mina
2015-06-16 14:12:24 +02:00
Jeroen van Erp
1c5b462206
Merge pull request #195 from bluekeyes/feature/gss-api
...
Add support for "gssapi-with-mic" authentication (Kerberos)
2015-06-16 10:33:44 +02:00
Billy Keyes
b9d0a03cb3
Add simple test for AuthGssApiWithMic
...
Mock enough of the JGSS API to avoid needing a real Kerberos
environment. I'm not sure how accurate this is, but it should test that
the client is sending the correct packets in the corect order.
2015-06-11 11:44:44 -07:00
Billy Keyes
4adc83b9df
Expose GSSManager in AuthGssApiWithMic
...
The default implementation only supports Kerberos and encourages
subclassing, so there should be a way to provide subclasses.
2015-06-11 11:38:02 -07:00
Björn Karge
14edb33fa9
fix for issue 183 (sftp.RemoteFile.ReadAheadRemoteFileInputStream) (revised)
2015-06-04 10:50:13 +08:00
Björn Karge
8e74330b0b
fix for issue 183 (sftp.RemoteFile.ReadAheadRemoteFileInputStream)
2015-06-03 14:36:23 +08:00
Boris Wachtmeister
5217d34198
bugfix: match complete host instead of contains on the hoststring
...
The SimpleEntry currently matches the hostname of the connection against
the complete hoststring of the entry. This way substrings also match, so
for example "10.0.0.1" matches on an entry for "10.0.0.10", resulting in
a host-key-changed message if the key differs which is usually does.
2015-05-28 21:57:25 +02:00