Age | Commit message (Collapse) | Author |
|
|
|
|
|
* maint:
ssh: Dump 64 bytes in case of unexpected info line
ssh: Add hexdump utility in ssh_dbg
|
|
|
|
|
|
'hans/ssh/new_supports', 'hans/crypto/remove_warnings' and 'hans/ssh/remove_warnings'
* hans/crypto/new_supports_1/OTP-15771:
crypto: New function supports/1
* hans/ssh/new_supports:
ssh: Use new api for aead ciphers
ssh: Use correct names of ciphers
* hans/crypto/remove_warnings:
ssh: Fix deprecation warnings in tests
crypto: Remove unused var warning in tests
* hans/ssh/remove_warnings:
ssh: Fix deprecation warnings in tests
ssh: Remove unused function warning in tests
ssh: Remove unused var warning in tests
ssh: Remove unused var warning
|
|
|
|
|
|
aes_cbc -> aes_128_cbc
aes_gcm -> aes_128_gcm, aes_256_gcm
|
|
* maint:
ssh: Present peername for accept_callback fun also for Sockets
ssh: Add ssh_channel:init/1
|
|
* hans/ssh/accept_callback_socket/OTP-15763:
ssh: Present peername for accept_callback fun also for Sockets
|
|
|
|
that was misstakeingly lost when introducing ssh_client_channel.erl
|
|
|
|
|
|
|
|
Some SFTP client's have been discover to claim one version of the
protocol and send messages in a different version.
In the spirit of Postel's law, we can for SSH_FXP_STAT, ignore the
differences in the protocol, as we are not doing anything with the flags
anyway.
|
|
* hans/ssh/port_leak/OTP-15397:
ssh: Fix port leakage for daemons failing at start
ssh: Add port close test
# Conflicts:
# lib/ssh/test/ssh_basic_SUITE.erl
|
|
|
|
* hans/ssh/eddsa/OTP-15094:
ssh: Add Edward curves to the documentation
ssh: Update test cases for eddsa
ssh: Add public keys 'ssh-ed25519' and 'ssh-ed448'
|
|
This will prevent crashes in ssh_file for public key types which have no passphrase option although being supported.
Also centralize host key checking to avoid code duplication. This was already done for user keys.
|
|
Also rename the corresponding testcase in ssh_options_SUITE and add logging.
|
|
No intentional api changes. Only to make the code less hard to read.
|
|
|
|
Requires OpenSSL-1.1.1
https://tools.ietf.org/html/draft-ietf-curdle-ssh-ed25519-ed448-00
|
|
|
|
* hans/ssh/fix_ext_info/OTP-15413:
ssh: Fix ssh_options checking for ext_info
ssh: Fix SSH_MSG_EXT_INFO bug for OTP SSH as server
ssh: Fix SSH_MSG_EXT_INFO bug for OTP SSH as client
|
|
|
|
A bug for SSH_MSG_EXT_INFO was fixed both for client and server. Before that fix, wrong
option was read for the information sent to the peer.
This commit adapts the option checking so that the correct option now used is available
not only for servers but also for clients.
|
|
The wrong set of supported public keys was sent to the client.
|
|
The message could not be received in connected state
|
|
|
|
user_dir
user_dir_fun (missing previously)
*_passphrase
system_dir
|
|
|
|
|
|
* hans/ssh/x25519_x448/OTP-15133:
ssh: Doc updates
ssh: spec curve25519 & curve448
ssh: Fix non-conforming key generation in kex for x25519 and x448
ssh: Enable curve448-sha512 and curve25519-sha256
ssh: Remove the term 'eddh'
|
|
|
|
That is, curve25519-sha256, [email protected] and curve448-sha512
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
* maint-20:
Updated OTP version
Prepare release
ssh: Report the signal name if there is an exit-signal to sftpd
ssh: Bug fix sftp error codes
ssh: Fix ssh_xfer decode_ATTR error for Vsn=4
syntax_tools: Fix a bug regarding reverting map types.
Conflicts:
OTP_VERSION
lib/inets/doc/src/notes.xml
lib/inets/vsn.mk
lib/ssh/doc/src/notes.xml
lib/ssh/vsn.mk
lib/syntax_tools/doc/src/notes.xml
lib/syntax_tools/vsn.mk
otp_versions.table
|
|
* hans/ssh/sftp_ver4_xfer/ERIERL-199/OTP-15149:
ssh: Fix ssh_xfer decode_ATTR error for Vsn=4
|
|
|
|
Report the signal name if the signal error message is ""
Do not report a return code of 0 as an error.
|