Vladimir Lagunov
d5c045defd
Fix non-ASCII passwords
2019-09-18 14:36:20 +02:00
Adam Iwaniuk
fdf08ef3c9
Add support for tunneling via channels ( #511 )
2019-06-03 16:33:39 +02:00
Adam Iwaniuk
633b42fec8
Added support for RSA certificates as host key ( #514 )
...
* Added support for RSA certificates as host key
* removed not needed check
* added rsa cert signature verification test
2019-05-27 10:46:01 +02:00
Adam Iwaniuk
3c594d9a1c
fix exception when parsing max possible date ( #513 )
...
* fix exception when parsing max possible date
* added test with rsa cert with large date
2019-05-27 10:12:45 +02:00
Jeroen van Erp
c2b9c0266d
Refactored out duplicate code.
2019-05-08 14:07:46 +02:00
Jeroen van Erp
0e784dd171
Merge branch 'master' into jumping
2019-03-01 21:45:09 +01:00
Michał Wyrzykowski
0cd19284ee
Fix local port forwarding disconnecting issue ( #491 )
...
* `SocketStreamCopyMonitor` closes channel after setting the one event. It doesn't wait for the second stream to finish the job.
* #317 Fix `SocketStreamCopyMonitor` to wait for all events before closing the channel.
2019-02-20 15:18:58 +01:00
Jeroen van Erp
a5017d55c8
Cleanup some code
2019-01-24 15:09:00 +01:00
Jeroen van Erp
cac340dd43
Add support for other keytypes to openssh-key-v1 keyfiles ( #485 )
...
* Added support for RSA to openssh-key-v1 keyfile
* Fixed exception
* Added ECDSA support to openssh-key-v1
* Added integration tests for different keytypes
2019-01-17 13:01:49 +01:00
Jeroen van Erp
00cd335f47
Moved tests to spock
2018-11-27 11:27:45 +01:00
Andremoniy
e14fb2f695
Expose the numeric code of the Response.StatusCode #473 ( #474 )
...
* Expose the numeric code of the Response.StatusCode #473
* Expose the numeric code of the Response.StatusCode #473
2018-11-27 10:22:00 +01:00
Pepijn Van Eeckhoudt
b0dee02bf9
Handle server initiated global requests ( #472 )
...
* Handle server initiated global requests
* Code layout
2018-11-26 15:16:43 +01:00
Jeroen van Erp
17c09eb471
Fixed integration test
2018-11-16 12:29:45 +01:00
Jeroen van Erp
0301d4537f
Enable 'curve25519-sha256@libssh.org' in DefaultConfig ( Fixes #464 )
2018-11-16 11:48:15 +01:00
Jeroen van Erp
254f739ac1
Upgraded sshd to 2.1.0
2018-11-16 11:12:58 +01:00
Jeroen van Erp
aa201fa08c
Add AES256-CBC to OpenSSHKeyV1KeyFile ( Fixes #467 )
2018-11-16 10:39:20 +01:00
Jeroen van Erp
8721269d0f
Added EdDSA as first signature factory ( Fixed #470 )
2018-11-16 10:07:32 +01:00
Ben Manes
971ccf6273
Add lock timeout for remote action ( fixes #466 ) ( #468 )
...
When the remove window size is expanded, a condition is waited on until
the remote server acknowledges and completes the action. If the server
does not respond, e.g. due to a connectivity issue, then this blocks the
client indefinitely. Instead the client waits up to the connection's
timeout (500 min default) and fails. This allows users to set a reasonable
timeout, fail their operations, and retry accordingly.
2018-11-16 09:33:48 +01:00
Andremoniy
813469646e
Improving logging for KeyExchanger ( #458 )
2018-10-23 10:47:34 +02:00
OlivierSalasc
17c368f9c2
add Buffer capacity check for type UInt64 ( #454 )
2018-09-27 14:49:25 +02:00
Jeroen van Erp
4de9f8ab9f
Add support for Encrypt-then-MAC MAC Algorithms ( #450 )
2018-08-28 13:22:31 +02:00
Jeroen van Erp
deff097170
Fix SFTPClient.mkdirs to not inadvertently prefix with '/' ( #415 )
2018-08-02 13:11:09 +02:00
Jeroen van Erp
7556a7f6f6
Updated license header
2018-07-25 12:59:25 +02:00
Jeroen van Erp
c5792fe4a8
Added Kex integration test
2018-07-25 10:34:52 +02:00
Jeroen van Erp
5e771382fe
Updated license header
2018-07-24 14:24:28 +02:00
Jeroen van Erp
7d07c1bb46
Refactored Macs and added hmac-ripemd1600@openssh.com
2018-07-24 14:18:02 +02:00
Jeroen van Erp
5bebe044aa
Code cleanup, add { to single-line if
2018-07-12 14:55:03 +02:00
Jeroen van Erp
adc0451b3f
Cleanup OpenSSHKeyFile and add Disconnection test
2018-07-10 16:29:09 +02:00
Jeroen van Erp
df5e73f1e8
Close before interrupt LocalPortForwarder ( Fixes #426 )
2018-07-10 16:28:28 +02:00
Jeroen van Erp
eeeba57c73
Code formatting improvements.
2018-07-10 16:15:37 +02:00
Jeroen van Erp
db48ff85c0
Add support for encrypted ed25519 openssh-key-v1 files ( Fixes #427 ) ( #429 )
2018-06-19 11:53:32 +02:00
Jeroen van Erp
49a450fb53
Fixed some codacy issues
2018-06-18 14:27:45 +02:00
Jeroen van Erp
42c52e4fe6
Fixed logging of Encoder to log correct sequence number
2018-04-30 09:30:28 +02:00
Jeroen van Erp
329966ecc4
Using UTF-8 encoding for PrivateKeyFileResource ( Fixes #413 )
2018-04-30 09:30:00 +02:00
Jeroen van Erp
76e6e572b4
Merge branch 'master' into issue-358
2018-03-22 22:50:37 +01:00
Jeroen van Erp
2003a9f8c9
Add support for verifying multiple host entries ( Fixes #405 )
2018-03-21 23:54:25 +01:00
Jeroen van Erp
84a7677a62
Add support for hmac-ripemd-160
2018-03-05 13:00:41 +01:00
Jeroen van Erp
3bcd3530cf
Renamed test to spec
2018-03-05 13:00:41 +01:00
Jeroen van Erp
a63f9ee8fd
New version Base64 class
2018-03-05 13:00:41 +01:00
Maxim Dobryakov
26df2f3c23
HostEntry constructor must be public
...
Reasons:
1) SimpleEntry (was replaced to HostEntry) class had public constructor
2) HostEntry class can be used outside of sshj library to add entries to .known_hosts file (i.e. for implementation of interactive HostKeyVerifier)
2018-02-20 22:59:36 +03:00
Michael Prankl
39b72eed62
Android Compability, again ;-) ( #392 )
...
* Rework SecurityUtils and PKCS8KeyFile for usage with SpongyCastle.
* Specifying providerName for registration is unneccessary.
* Update AndroidConfig, fix imports.
* Workaround for Android 5.0 bug when SpongyCastle is the default JCE provider.
On Android 5.0 reading the version from the jar does throw a SecurityException due to a bug in Android (see https://issuetracker.google.com/issues/36993752 ). Including that Exception in the catch provides a workaround for that issue.
2018-01-30 16:22:05 +01:00
Jeroen van Erp
d55eb6d02e
Fix build for windows
2018-01-24 21:34:29 +01:00
Jeroen van Erp
265e9d2916
Add extra logging in OpenSSHKnownHosts and extra test
2018-01-24 15:53:12 +01:00
Jeroen van Erp
0b6552654b
Fix 'key spec not recognized' exception with ECDSA keys
2018-01-23 19:58:04 +01:00
Jeroen van Erp
dabe43dfdc
Fixed headers
2017-12-28 13:18:30 +01:00
Jeroen van Erp
0f67fa2541
Added integration test for append scenario ( Fixes #390 )
2017-12-28 13:00:49 +01:00
Michael Prankl
54018a4a81
Update AndroidConfig ( #389 )
...
* Add EdDSA signature for AndroidConfig.
* Initialize KeyExchange- and FileKeyProviderFactories with registered "bouncyCastle" (in fact, SpongyCastle is registered).
See #308 for discussion.
2017-12-28 11:55:36 +01:00
Jeroen van Erp
8ca6451d5d
Fixed length bug in putString ( Fixes #187 )
2017-12-27 23:02:41 +01:00
Jeroen van Erp
5e1be8b1b0
Separated out integration tests
2017-12-27 23:01:59 +01:00
Iger
4045d5a7ef
- One more time
2017-12-03 23:10:56 +02:00