aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssh/src
AgeCommit message (Collapse)Author
2017-01-31ssh: optimize kex dh_gex using new crypto functionalityHans Nilsson
Conflicts: lib/ssh/src/ssh_connection_handler.erl lib/ssh/src/ssh_transport.erl
2017-01-31ssh,crypto: prepare for releaseHans Nilsson
2016-08-04ssh: sshc_sup to use worker for ssh_con_handlerLukas Larsson
2016-06-22ssh: polishing of password prompt's linefeedHans Nilsson
2016-06-22ssh: Fix a hazard bug in ssh_authHans Nilsson
2016-06-22ssh: Some code cuddling in ssh_ioHans Nilsson
2016-06-22ssh: Fix type error in args of ssh_auth:sort_selected_mthdsHans Nilsson
2016-06-22ssh: Make client send a faulty pwd only once, ssh_connection_handler partHans Nilsson
2016-06-22ssh: Make client send a faulty pwd only once, ssh_auth partHans Nilsson
Conflicts: lib/ssh/src/ssh_connection_handler.erl
2016-01-08ssh: handle secondary ssh_msg_userauth_info_request messageHans Nilsson
2015-12-07ssh: fix error for data fields errorsHans Nilsson
2015-12-07ssh: fix error for bad packet lengths found by DefensicsHans Nilsson
2015-12-04ssh: ssh_auth checks support for user pubkey algHans Nilsson
2015-12-03ssh: client pub key opt implementedHans Nilsson
2015-12-01Support SSH key callback module optionsVipin Nair
This patch allows extra callback options to be passed to the module implementing the SSH callback module behaviour. A module implementing the SSH key callback API is used to customize the handling of public key. This patch allows extra callback options to be passed to the module implementing the SSH callback module behaviour. The key_cb option has been changed: {key_cb, atom()} -> {key_cb, key_cb()} Where: key_cb() :: atom() | {atom(), list()} The callback options, if specified, is made available to the callback module via the options passed to it under the key 'key_cb_private'. More details and some backgorund is available here[1]. [1]: http://erlang.org/pipermail/erlang-patches/2015-November/004800.html
2015-11-27Merge branch 'maint-18' into maintHans Nilsson
* maint-18: Updated OTP version Update release notes ssh: vsn.mk updated ssh: New test cases for SSH_MSG_KEX_DH_GEX_REQUEST_OLD ssh: update existing testcases ssh: Improve group selection ssh: implemented server side SSH_MSG_KEX_DH_GEX_REQUEST_OLD for putty client Conflicts: lib/ssh/src/ssh_transport.erl lib/ssh/test/ssh_protocol_SUITE.erl lib/ssh/vsn.mk
2015-11-26ssh: Improve group selectionHans Nilsson
Now it chooses the first found if no exact match.
2015-11-26ssh: implemented server side SSH_MSG_KEX_DH_GEX_REQUEST_OLD for putty clientHans Nilsson
2015-11-25ssh: sftpd callback takes new option 'recv_window_size', defaults to 1000000Hans Nilsson
2015-11-25ssh: added 'pending' in recv_window handling and limit sendingHans Nilsson
2015-11-24Merge branch 'hans/ssh/fd_more/OTP-12966' into maintHans Nilsson
* hans/ssh/fd_more/OTP-12966: ssh: testcases for starting daemon with given fd ssh: Make it possible for more than one daemon started with option fd
2015-11-23ssh: fix dialyzer reported errorHans Nilsson
2015-11-23ssh: AEAD_AES_(128|256)_GCM and aes(128|256)[email protected] cryptoHans Nilsson
Note that the rfc5647 is ambigous so this implementation of AEAD_AES_(128|256)_GCM may or may not be compatible with others. They are note enabled by default but may be enabled by the user. See the Reference Manual, Application SSH for details of how we interpret the rfc. To be safe, use [email protected] or [email protected] instead.
2015-11-23ssh: refactor packet receptionHans Nilsson
There was an assymetric relationship between receiving a ssh-packet (decrypting-mac-decompress) and sending one. When sending, most of the work was defined in the ssh_transport module, while at reception the ssh_connection_handler was the one knowing what to do. This commit moves the reception down to the ssh_transport module where it belongs.
2015-11-19ssh: Make it possible for more than one daemon started with option fdHans Nilsson
2015-11-17Merge branch 'hans/ssh/sshdir_search_order/OTP-13109' into maintHans Nilsson
* hans/ssh/sshdir_search_order/OTP-13109: ssh: ssh_file:default_user_dir/0 - try HOME env var first
2015-11-16Merge branch 'kanatohodets/ssh-subsystem-typo' into maintHenrik Nord
* kanatohodets/ssh-subsystem-typo: Fix spelling of ssh 'subsystem' OTP-13108
2015-11-13ssh: ssh_file:default_user_dir/0 - try HOME env var firstHans Nilsson
2015-11-11ssh: add better error handling in ssh_fileHans Nilsson
ssh_file:lookup_user_key_fd and ssh_file:lookup_host_key
2015-11-09ssh: use crypto for ecdh point validationHans Nilsson
2015-11-06Merge branch 'hans/ssh/pwdfun/OTP-13055' into maintHans Nilsson
* hans/ssh/pwdfun/OTP-13055: ssh: changes after doc review ssh: Document pwdfun ssh: make corrections of keyboard-interactive client ssh: enable users to give option keyboard_interact_fun ssh: pwdfun/4 and simple tests Conflicts: lib/ssh/doc/src/ssh.xml
2015-11-05Fix spelling of ssh 'subsystem'Ben Tyler
This commit does not change any behaviour, since the spelling was internally consistent.
2015-11-04ssh: extend 'dh_gex_limits' to server sideHans Nilsson
OTP-13066
2015-11-04ssh: option dh_gex_groups with tag ssh_moduli_fileHans Nilsson
Makes this existing option also accept a file in openssh format OTP-13052
2015-11-04ssh, public_key: random selection of diffie-hellman moduliHans Nilsson
Also tool (public_key:gen_moduli_hrl) to convert an openssh moduli file to erlang format.
2015-11-04ssh: make corrections of keyboard-interactive clientHans Nilsson
* Newlines should be added after Name and Instructions field according to rfc4256. * There was an error in the argument list of the last clause of ssh_auth:keyboard_interact_get_responses/9 * Correct client kb-interactive behaviour at auth failure
2015-11-04ssh: enable users to give option keyboard_interact_funHans Nilsson
It is on purpose not documented. It needs more thinking before being finalized.
2015-11-04ssh: pwdfun/4 and simple testsHans Nilsson
Also solves OTP-13053
2015-11-02ssh: Make tests for bad packet_len and field lengths inside packetsHans Nilsson
Includes a ssh_transport:pack/3 function for generating invalid packets
2015-10-19Merge branch 'hans/ssh/cuddle_spec' into maintHans Nilsson
* hans/ssh/cuddle_spec: ssh: dialyzer fix
2015-10-19ssh: Implemented ssh_transport:ecdh_validate_public_key (partly)Hans Nilsson
Defined in http://www.secg.org/sec1-v2.pdf '3.2.2 Validation of Elliptic Curve Public Keys' according to RFC 5656 ch 4. More to be done: check singularities, implement reading compressed points....
2015-10-16ssh: dialyzer fixHans Nilsson
2015-10-16public_key: add/update -spec for ssh functionsHans Nilsson
2015-10-16ssh, public_key: use pubkey encode/decode in app public_keyHans Nilsson
2015-10-16ssh, public_key: Change EC Public Key representation to what was intendedHans Nilsson
2015-10-16Merge branch 'maint-18' into maintHenrik Nord
Conflicts: lib/ssh/vsn.mk
2015-10-15ssh: set dh_gex default to group14Hans Nilsson
2015-10-15ssh: Add a 1024 group to the list of key gex groupsHans Nilsson
2015-10-14Merge branch 'maint-18' into maintHenrik Nord
Conflicts: lib/ssh/vsn.mk
2015-10-13Merge branch 'hans/ssh/cuddle_tests' into maintHans Nilsson