aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssh
AgeCommit message (Collapse)Author
2016-10-31ssh: retry in ssh_options_SUITE:ssh_connect_negtimeout_*Hans Nilsson
2016-10-31ssh: make test more precise in ssh_to_openssh_SUITEHans Nilsson
2016-10-31ssh: simplify test in ssh_to_openssh_SUITEHans Nilsson
2016-10-31ssh: skip erlang_server_openssh_client_renegotiate test on non-unixHans Nilsson
2016-10-31ssh: Removed tracing in ssh_to_openssh_SUITEHans Nilsson
2016-10-28ssh: test for rekey with OpenSSH serverHans Nilsson
2016-10-28ssh: move rekeying test to ssh_test_libHans Nilsson
2016-10-28ssh: change of test helper ssh_test_lib:start_shellHans Nilsson
2016-10-28ssh: increase timeout in test in ssh_options_SUITEHans Nilsson
Prevents timeout before the processing is done on slow machines
2016-10-27ssh: trace all messages in ↵Hans Nilsson
ssh_to_openssh_SUITE:erlang_server_openssh_client_renegotiate/1
2016-10-27ssh: more info about shrinked binaries in ssh_dbgHans Nilsson
2016-10-27ssh: Add a 'catch' in ssh_channel.erl to prevent double close errorsHans Nilsson
2016-10-27ssh: better ssh_basic_SUITE:end_per_suite/2Hans Nilsson
The testcases shell_unicode_string and shell_no_unicode in ssh_basic_SUITE could raise an exception in the end_per_suite when stopping the dameon. This is due to a natural race condition between the server and the client.
2016-10-27ssh: improve result processing in testHans Nilsson
2016-10-27ssh: Reduce the renegotiation limit in test with OpenSSH clientHans Nilsson
in ssh_to_openssh_SUITE:erlang_server_openssh_client_renegotiate/1 The reason is that it seems that on some small machines we get an out-of-memory exception if the limit is to high. This is probably because a chunk of data larger than the limit is piped from a file into the OpenSSH runing in a shell in a port.
2016-10-18Merge branch 'maint-19' into maintHans Nilsson
2016-10-17Prepare releaseErlang/OTP
2016-10-17ssh: fix renegotiation problemHans Nilsson
2016-10-17ssh: test case for renegotiation with openssh clientHans Nilsson
2016-10-14Merge branch 'maint-19' into maintHans Nilsson
2016-10-13Prepare releaseErlang/OTP
2016-10-13ssh: Removed matching of 'ok' after send which could cause error reportsHans Nilsson
2016-10-13ssh: ssh_protocol_SUITE test for handling of illegal info_linesHans Nilsson
2016-10-13ssh: property test case for illegal infoline and closeHans Nilsson
This tests an illegal client that sends an info line and closes 'immediatly'.
2016-10-11Merge branch 'maint-19' into maintHans Nilsson
2016-10-10Prepare releaseErlang/OTP
2016-10-10Revert "ssh: Add non-blocking send" since it introduces Error ReportsHans Nilsson
This reverts commit 28baf1314b556bb592c24181f6967e1f324f44a7.
2016-10-06Merge branch 'maint-19' into maintIngela Anderton Andin
2016-10-06Update release notesErlang/OTP
2016-10-05ssh: Prepare releaseIngela Anderton Andin
2016-10-05ssh: Handle gen_server:call/3 exits properlyIngela Anderton Andin
Handle all possible exit values that should be interpreted as {error, closed}. Failing to do so could lead to unexpected crashes for users of the ssh application.
2016-09-28ssh: Update vsn.mkHans Nilsson
2016-09-28Merge branch 'isvilen/ssh_REPL_exit_status/PR-1173/OTP-13905' into maintHans Nilsson
2016-09-20Prepare releaseErlang/OTP
2016-09-19Fix SSH custom REPL exit statusSvilen Ivanov
When user defined SSH shell REPL process exits with reason normal SSH channel callback module should report successful exit status to the SSH client. This provides simple way for SSH clients to check for successful completion of executed commands.
2016-09-19Add SSH custom REPL exit status testSvilen Ivanov
Test that when used defined shell REPL exit with reason normal SSH client receives exit status 0.
2016-09-06Merge branch 'hans/ssh/keyboard_interactive_defensics' into maintHans Nilsson
2016-09-06Merge branch 'hans/ssh/strengthen_pubkey/OTP-13847' into maintHans Nilsson
Conflicts: lib/ssh/src/ssh_auth.erl
2016-09-06Merge branch 'hans/ssh/correct_sha_ecdsa/OTP-13850' into maintHans Nilsson
2016-09-06Merge branch 'hans/ssh/channel_no_detect_close/OTP-13859' into maintHans Nilsson
2016-09-05ssh: add tstflg value one_empty to force daemon send empty ↵Hans Nilsson
ssh_msg_userauth_info_request This behavour is assumed by Codenomicon Defensics.
2016-09-02ssh: pre-verify keyHans Nilsson
Conflicts: lib/ssh/src/ssh_auth.erl
2016-09-02ssh: make ecdsa sha dependent on curveHans Nilsson
Bug fix.
2016-09-02ssh: separate clauses for first and second pk auth msgHans Nilsson
SSH sends the public key and user name twice. If we do not check the validity of that pair at the first time, Codenomicon Defensics will complain.
2016-09-01ssh: fix no detect of tcp closeHans Nilsson
2016-09-01doc: Correct errors introduced by Editorial changesHans Bolinder
Fix some older errors as well.
2016-08-31Merge branch 'raimo/gen_statem-callback_mode/OTP-13752' into maintRaimo Niskanen
* raimo/gen_statem-callback_mode/OTP-13752: ssl: Upgrade suite testing skipped if stdlib upgrade is required Fix version numbers and dependencies Conflicts: lib/ssl/src/ssl.appup.src lib/ssl/vsn.mk
2016-08-31Merge branch 'hans/ssh/test_fixes/OTP-13854' into maintHans Nilsson
Fixes problems found by test suites as well as by Codenomicon/Defensics: - reduce max random padding to 15 bytes (Codenomicon/Defensics) - inclomplete pdu handling (Codenomicon/Defensics) - badmatch - non-blocking send fixes deadlock in ssh_connection_SUITE:interrupted_send
2016-08-31Merge branch 'hans/ssh/ensure_all_started/PR-1147/OTP-13843' into maintHans Nilsson
2016-08-29ssh: reduce random padding to 15 bytesHans Nilsson
This is to get rid of some warnings in Codenomicon/Defensics. It also speeds up the communications.