Ecosyste.ms: OpenCollective

An open API service for software projects hosted on Open Collective.

cert-manager

cert-manager is a Kubernetes add-on to automate the management and issuance of TLS certificates.
Collective - Host: opensource - https://opencollective.com/cert-manager - Website: https://cert-manager.io - Code: https://github.com/cert-manager

chacha20poly1305: fix amd64 assembly - replace PINSRB and PEXTRQ

The SSE code of chacha20poly1305 used PINSRB and PEXTRQ, which are only available
on machines su...

github.com/cert-manager/crypto - 5f4e837b98443e9e7a65072235205993af565d85 authored about 8 years ago by Andreas Auernhammer <[email protected]>
chacha20poly1305: clarify the correct attribution for the AMD64 assembly.

I pushed from the wrong terminal when addressing the comments on
https://golang.org/cl/31256/

C...

github.com/cert-manager/crypto - 1ed0c38df5ad473c1d85c1f6490fb2868601a1d3 authored about 8 years ago by Adam Langley <[email protected]>
chacha20poly1305: clarify the correct attribution for the AMD64 assembly.

Change-Id: I9c247e49a13788408b4fe49676520d608d8c4380
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 6bcc37609f9ade634a86e71e651b69aece6cdd57 authored about 8 years ago by Adam Langley <[email protected]>
poly1305, chacha20poly1305: fix build for Go 1.6

Fixes golang/go#17424

Change-Id: I49d6e475c173da6a31542931d555ab87cc45a1c6
Reviewed-on: https:/...

github.com/cert-manager/crypto - 5f31782cfb2b6373211f8f9fbf31283fa234b570 authored about 8 years ago by Brad Fitzpatrick <[email protected]>
poly1305: fix build

Updates golang/go#17422

Change-Id: Ie5f16e24f87b3d800f1182b5b09d6cf638135e33
Reviewed-on: https...

github.com/cert-manager/crypto - 85ce60fb243044b555fe7b6690e555d0c089831f authored about 8 years ago by Brad Fitzpatrick <[email protected]>
crypto/ssh: fix comment for ssh.NewPublicKey

Change-Id: I88bb7859259c82cd77ab2d26b728143281761def
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 4cd25d65a015cc83d41bf3454e6e8d6c116d16da authored about 8 years ago by Dmitry Savintsev <[email protected]>
chacha20poly1305: new package.

This change adds a package, chacha20poly1305, which implements the
ChaCha20-Poly1305 AEAD from R...

github.com/cert-manager/crypto - 594708b89f21ece706681be23d04a6513a22de6e authored about 8 years ago by Adam Langley <[email protected]>
poly1305: rename files to sum_đť‘Ą.s

Since the wrapper files are called sum_đť‘Ą.go, it makes sense that the
assembly files would be nam...

github.com/cert-manager/crypto - a81735b1ea3bbf15601ae3b5a55d8b89d03ebc87 authored about 8 years ago by Adam Langley <[email protected]>
poly1305: minor updates.

This change updates the Poly1305 code in x/crypto to reflect some
comments from the review of
ht...

github.com/cert-manager/crypto - 1265e0190f9f3829c668790458b0bf1bcfa43854 authored about 8 years ago by Adam Langley <[email protected]>
ssh: bound DH public values to [2, p-2].

Previously this code bounded the values to [1, p-1]. This protects
against invalid values that c...

github.com/cert-manager/crypto - dc7f3af03ebbba4b0c90f8d95c682dba7d4c70f5 authored about 8 years ago by Adam Langley <[email protected]>
x/crypto/ocsp: Accept status for multiple certificates in response

This change add a function select to correct response from a responder
that includes multiple ce...

github.com/cert-manager/crypto - d172538b2cfce0c13cee31e647d0367aa8cd2486 authored about 8 years ago by Paul van Brouwershaven <[email protected]>
ocsp: add Request.Marshal method

Tests that Marshaling a parsed response
returns the same bytes as were parsed.

Use Marshal in C...

github.com/cert-manager/crypto - 0e69e08b8a4ea0fbd49846e211075f79ca0fff4f authored about 8 years ago by Roland Shoemaker <[email protected]>
poly1305: add test for carry edge-case.

This change adds a test that catches the bug which existed in
[https://go-review.googlesource.co...

github.com/cert-manager/crypto - 7682e7e3945130cf3cde089834664f68afdd1523 authored about 8 years ago by Adam Langley <[email protected]>
x/crypto/openpgp: support crypto.Signer private keys

This adds support for crypto.Signer-based RSA and ECDSA private keys.
This enables using opaque ...

github.com/cert-manager/crypto - 00c14795774c9a445fbd62be583a905cb2c20e27 authored about 8 years ago by Samuele Pedroni <[email protected]>
ssh: add CryptoPublicKey interface, expose underlying crypto.PublicKey

When implemented by ssh.PublicKey types, the new CryptoPublicKey
interface exposes the public ke...

github.com/cert-manager/crypto - 69267d27d28d489e67367059db7277e24070482a authored about 8 years ago by Martin Garton <[email protected]>
ssh: fix height/width order in RequestPty example

The RequestPty function takes the size arguments in the order height,
then width, instead of the...

github.com/cert-manager/crypto - 2cbd8ea802d1adf67a6ef1df6b9ade342c37241d authored about 8 years ago by Henrik Hodne <[email protected]>
x/crypto/ssh: public key authentication example

Fixes golang/go#13902.

Adds public key authentication to the
password authentication example.

...

github.com/cert-manager/crypto - bde08f269ed27dc9a9c105465110825e04ab3d41 authored about 8 years ago by Emmanuel Odeke <[email protected]>
ssh: Consistent error handling in examples

After discussion around an example SFTP implementation:
https://github.com/pkg/sftp/pull/54
it h...

github.com/cert-manager/crypto - 484eb34681af59703e639b971bc307019182c41f authored about 8 years ago by Mike Houston <[email protected]>
ssh/terminal: implement ReadPassword and IsTerminal

Fixes golang/go#13085.

Change-Id: I2fcdd60e5e8db032d6fa3ce76198bdc7a63f3cf6
Reviewed-on: https:...

github.com/cert-manager/crypto - a19fa444682e099bed1a53260e1d755754cd098a authored about 8 years ago by Fazal Majid <[email protected]>
poly1305: fix bug in amd64 assembly

Add the conditional subtraction of 3 from 'h2' (register R10).

Change-Id: I75615b0375f050a5cd97...

github.com/cert-manager/crypto - 84e98f45760e87786b7f24603b8166a6fa09811d authored about 8 years ago by Andreas Auernhammer <[email protected]>
x/crypto/poly1305: optimize amd64 assembly performance

Improve performance on amd64 through faster assembly.

name old time/op new time/op delta
64...

github.com/cert-manager/crypto - 568507f56e5b05b3c219ffd7fba12655c07bcc86 authored about 8 years ago by Andreas Auernhammer <[email protected]>
x/crypto/ssh: ParsePrivateKey errors out with encrypted private keys

RSA and DSA keys if encrypted have the
phrase ENCRYPTED in their Proc-Type block
header accordin...

github.com/cert-manager/crypto - a20de3fa94e069ec699987416679230d72e030a3 authored about 8 years ago by Emmanuel Odeke <[email protected]>
openpgp: fix a typo in a comment

Change-Id: I9fe23643ae644c4cc4a36b14ad6efe99197c8beb
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 7ac97ebec9cb7ab8b44b571f6ec4cee333dc4309 authored about 8 years ago by Alok Menghrajani <[email protected]>
x/crypto/ssh/agent: honor constraints on keys in the keyring.

If a key is added to an agent keyring with constraints, honor them.
This will remove keys when t...

github.com/cert-manager/crypto - 8e06e8ddd9629eb88639aba897641bff8031f1d3 authored over 8 years ago by Peter Moody <[email protected]>
ssh: properly handle wrong guess for FirstKexFollows in server

In the initial key exchange, a client has the option of sending a
guessed key exchange packet. T...

github.com/cert-manager/crypto - 6ab629be5e31660579425a738ba8870beb5b7404 authored over 8 years ago by Kaleb Elwert <[email protected]>
acme/autocert: cache ACME account key

If no key is provided in the *acme.Client, one is generated, but it
is not cached. This means th...

github.com/cert-manager/crypto - 81372b2fc2f10bef2a7f338da115c315a56b2726 authored over 8 years ago by Jonathan Rudenberg <[email protected]>
opengpg: set SelfSignature.PreferredHash in NewEntity

Say the user wants to create a NewEntity, then Serialize the private and public
keys. Then call ...

github.com/cert-manager/crypto - 119f50887f8fe324fe2386421c27a11af014b64e authored over 8 years ago by Jessica Frazelle <[email protected]>
crypto/sha3: use the assembly optimized KeccakF on amd64

NIST published a Keccak Code Package following the SHA-3 workshop
organized in 2014, containing ...

github.com/cert-manager/crypto - 80b25ed484de142ae08d13ec3ce45de80093b801 authored over 8 years ago by PĂ©ter Szilágyi <[email protected]>
acme: add WithTemplate option for tls-sni certs

This change allows for more customizations when creating a tls-sni
challenge response.

Same rea...

github.com/cert-manager/crypto - e311231e83195f401421a286060d65643f9c9d40 authored over 8 years ago by Alex Vaghin <[email protected]>
acme/autocert: use ECDSA P-256 for account key and issued certs

ECDSA P-256 keys are smaller than RSA 2048 keys and signing
operations are faster.

Change-Id: I...

github.com/cert-manager/crypto - 0e31b188fd38db611d4fbab7de9373a95f36aae5 authored over 8 years ago by Jonathan Rudenberg <[email protected]>
scrypt: fix broken example in documentation

Fixes golang/go#17046

Change-Id: I7fa7e0b700212992125de32524801048b56ac5d1
Reviewed-on: https:/...

github.com/cert-manager/crypto - aa2481cbfe81d911eb62b642b7a6b5ec58bbea71 authored over 8 years ago by Sam Whited <[email protected]>
acme/autocert: make tests more well-behaved

This change also gets the Manager closer to being able
to cleanup in short-lived HTTP servers ru...

github.com/cert-manager/crypto - 05d11b2ca14108dfc7f74f4f66b28c7fe92e1fd0 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: implement authorization revocation

As with other methods of the Client, this is an implementation
for the v2 version of the spec.

...

github.com/cert-manager/crypto - f944096df80415fafc888544caecaab86a991785 authored over 8 years ago by Alex Vaghin <[email protected]>
crypto/openpgp: return error from userIdSignatureHash

Signature#SignUserId was ignoring the error returned by userIdSignatureHash.
This error can happ...

github.com/cert-manager/crypto - 6318898455d3ac20e7e44d0a080d43f8c3ff120b authored over 8 years ago by Reinaldo de Souza Jr <[email protected]>
acme/autocert: fix data race in tests

Change-Id: I0b5001db9a3541592b4ac0d4bba760b974f9b1a0
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 9e590154d2353f3f5e1b24da7275686040dcf491 authored over 8 years ago by Brad Fitzpatrick <[email protected]>
acme/autocert: support earlier versions of Go

The package was incorrectly importing both, x/net/context
and the new context packages.

This ch...

github.com/cert-manager/crypto - f160b6bf95857cd862817875dd958be022e587c4 authored over 8 years ago by Alex Vaghin <[email protected]>
acme/autocert: correct acme package import

An internal import slipped through in autocert renewal tests
during https://go-review.googlesour...

github.com/cert-manager/crypto - dfc9fd3102be8a557dff69d0252d8a606ed271d6 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: expose internal/acme as acme package

This moves all of internal/acme into the acme package,
making the lower level API accessible by ...

github.com/cert-manager/crypto - d3c1194e7ce73913451befd89c26ca6d222f641e authored over 8 years ago by Alex Vaghin <[email protected]>
acme/autocert: implement certificates renewal

A cert renewal loop is started when a certificate is fetched
from cache for the first time or a ...

github.com/cert-manager/crypto - 33b41827e673eff8a3b8c2f2089bf0d14d99e1ef authored over 8 years ago by Alex Vaghin <[email protected]>
nacl/secretbox: add license header and package prefix

Name the example package "secretbox_test" so we use the public
interface for secretbox in exampl...

github.com/cert-manager/crypto - 055d4bfb5c396e3c3dcd9aad97c9086d48b23189 authored over 8 years ago by Kevin Burke <[email protected]>
acme: take a user provided key in TLSSNIxChallengeCert

Some systems can only operate with a certain key type, for instance RSA,
which makes it impossib...

github.com/cert-manager/crypto - b13fc1fd382d01861b16b2e6474487d3d4d27f20 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: add client.DNS01ChallengeRecord

This change adds implementation for dns-01 challenge responses.

Change-Id: I22b2b304ca4a2caeec2...

github.com/cert-manager/crypto - 351dc6a5bf92a5f2ae22fadeee08eb6a45aa2d93 authored over 8 years ago by Alex Vaghin <[email protected]>
crypto/ssh: keep user in ConnMetadata if NoClientAuth is used

The current behaviour of the crypto/ssh server implementation is to
remove the username from Con...

github.com/cert-manager/crypto - 986d3313588aa5c68f1df95eac956f79cf3b2c01 authored over 8 years ago by Sven Blumenstein <[email protected]>
acme: add Client.WaitAuthorization for polling

It is quite often the case users need to poll an authorization until it
reaches a final state.

...

github.com/cert-manager/crypto - b35ccbc95a0eaae49fb65c5d627cb7149ed8d1ab authored over 8 years ago by Alex Vaghin <[email protected]>
acme: add StatusValid to expected values for Authorize

Let's Encrypt may respond with the "valid" value in status
field to authorization requests:
http...

github.com/cert-manager/crypto - 1ba5ec0bf2707bea17c84c4e642fcfda33740480 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: use EC keys where possible

This change improves tests speed further by switching to EC keys where
possible.

We are also sw...

github.com/cert-manager/crypto - 7e016f1856e33d687a3a722085e249982e673aff authored over 8 years ago by Alex Vaghin <[email protected]>
acme: add support for ECDSA-based signatures

A previous change, https://go-review.googlesource.com/25462, added
support only for encoding JWK...

github.com/cert-manager/crypto - 3461a682e191121427304ae785e990685d122377 authored over 8 years ago by Alex Vaghin <[email protected]>
acme/autocert: replace DNSNames with HostPolicy

Sanjay came up with this idea of a more flexible way
to place restrictions on the Manager using ...

github.com/cert-manager/crypto - b3cc7317554b3e708b116d997899e612bab100d6 authored over 8 years ago by Alex Vaghin <[email protected]>
nacl: use HTTPS for nacl.cr.yp.to links

nacl.cr.yp.to is available over HTTPS and presents a valid certificate, so
seems useful to use i...

github.com/cert-manager/crypto - 88d0005bf4c3ec17306ecaca4281a8d8efd73e91 authored over 8 years ago by Kevin Burke <[email protected]>
acme: add Client.RevokeCert for certificate revocation

This change adds RevokeCert method to Client, implemented as described
in https://tools.ietf.org...

github.com/cert-manager/crypto - 9fbab14f903f89e23047b5971369b86380230e56 authored over 8 years ago by Alex Vaghin <[email protected]>
acme/autocert: improve test speed on 386

This change makes the tests run considerably faster on GOARCH=386
by reducing test RSA keys to 5...

github.com/cert-manager/crypto - a8a4eedf8c97852389ea5f2c252660d3616af041 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: improve http-01 challenge API

This makes http-01 handling more consistent with tls-sni-* methods
and, hopefully, future implem...

github.com/cert-manager/crypto - 1f83de14df312a49980cf0b48d13101190615af6 authored over 8 years ago by Alex Vaghin <[email protected]>
acme/autocert: new high-level package for automatic cert management

Package autocert provides automatic access to certificates
from Let's Encrypt and any other ACME...

github.com/cert-manager/crypto - f0e11a3ccc7e5a70a8c6e1cc611a13154965cd08 authored over 8 years ago by Alex Vaghin <[email protected]>
nacl/secretbox: add Seal, Open example

I read the docs and wasn't sure how to use the package - what is
the best way to generate a nonc...

github.com/cert-manager/crypto - 1ce41b6ca7dccc03377edf55652ffa334b6c06ce authored over 8 years ago by Kevin Burke <[email protected]>
acme: context-aware Client methods

This change adds a context to all exported methods of Client
which may perform network requests,...

github.com/cert-manager/crypto - 807ffeae6d033a871e83d8ffa61d51bf75288066 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: build up full chain certs when requested

The latest ACME spec (v3) changed the wording to:

... the server MUST send one or more link...

github.com/cert-manager/crypto - 6575f7ea326e67d12b77872ff66f5ea15f8aefad authored over 8 years ago by Alex Vaghin <[email protected]>
acme: format Client and errors

- move required fields before optional in the Client struct
- prefix all errors with "acme: "
- ...

github.com/cert-manager/crypto - a548aac93ed489257b9d959b40fe1e8c1e20778c authored over 8 years ago by Alex Vaghin <[email protected]>
acme: preserve account URI on get and update

Let's Encrypt has always provided Account URI in a response
to any registration request (new, ge...

github.com/cert-manager/crypto - 6c932297e16070bd20e9384ea78e8afabaa3fae2 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: improve TLSSNI{01,02}ChallengeCert methods

This is a split of https://go-review.googlesource.com/23970 (patch set 8)
to address only Client...

github.com/cert-manager/crypto - 595bbbd7f5f308415a544d3c55743c91427c8d99 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: simplify TLS-SNI challenge cert

There's no need to PEM-encode key/cert pair to create a tls.Certificate.

All tls.X509KeyPair do...

github.com/cert-manager/crypto - 5f961cd492ac9d43fc33a8ef646bae79d113fd97 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: support for ECDSA keys

Change-Id: I4956b8277969718e70bb4f5f9893213b58e159fc
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - e0d166c33c321d0ff863f459a5882096e334f508 authored over 8 years ago by Anmol Sethi <[email protected]>
acme: TLS-SNI challenges implementation

Current and N-1 versions of the spec adopted TLS-SNI-02, but Let's
Encrypt seems to support TLS-...

github.com/cert-manager/crypto - 7a1054f3ac58191481dc500077c6b060f5d6c7e5 authored over 8 years ago by Alex Vaghin <[email protected]>
acme: specify which version exactly is implemented

The WG has recently published v3 of the spec.
The package implementation is still at v2. So is L...

github.com/cert-manager/crypto - 611beeb3d5df450a45f4b67f9e25235f54beda72 authored over 8 years ago by Alex Vaghin <[email protected]>
ssh: clarify error type if a SendRequest goes unanswered

This came up in the discussion of issue #16194.

Change-Id: Ibb4cadf3be975377819eca2e41e0992794a...

github.com/cert-manager/crypto - bc89c496413265e715159bdc8478ee9a92fdc265 authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
x/crypto/ssh/terminal: have MakeRaw mirror cfmakeraw.

Rather than guessing at which terminal flags should be set or cleared by
MakeRaw, this change tr...

github.com/cert-manager/crypto - 911fafb28f4ee7c7bd483539a6c96190bbbccc3f authored over 8 years ago by Faiyaz Ahmed <[email protected]>
ssh: disable known-flaky test from the Go build dashboard

This failure is tracked already. Remove it from the dashboard
while it's fixed so it doesn't hid...

github.com/cert-manager/crypto - f28b56427a527c2e35c0bcac123f0a6a8a943cd3 authored over 8 years ago by Brad Fitzpatrick <[email protected]>
x/crypto/ssh: add ed25519 certs to supportedHostKeyAlgos

Change-Id: I46bb7721c081b8a9b0395a4f7c49b7f3e27bbc49
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 10c26747e67d76ad4fafe6087c6f4073c3b22942 authored over 8 years ago by Peter Moody <[email protected]>
acme: prompt for terms agreement

Allow Client.Register callers to report CA terms agreement,
simplifying the registration usage.
...

github.com/cert-manager/crypto - 1da79bda50e1847d07401c53e007f9069948909c authored over 8 years ago by Alex Vaghin <[email protected]>
ocsp: fix default value of Version in ResponseData

ASN.1 specification of `ResponseData` is:

ResponseData ::= SEQUENCE {
version ...

github.com/cert-manager/crypto - 2c99acdd1e9b90d779ca23f632aad86af9909c62 authored over 8 years ago by Fedor Indutny <[email protected]>
x/crypto/ssh/agent: ecdsa key/cert typo

Introduced by me in 21536

Change-Id: I4a5f3507270a3d6eea9779508642ea5789d1efca
Reviewed-on: htt...

github.com/cert-manager/crypto - 9a6bac9c27397e546ac6f7055e83c1e9ec8405b8 authored over 8 years ago by Peter Moody <[email protected]>
acme: default values and discovery

Add Directory to the Client fields. This removes ACME resource URL
argument from almost all of t...

github.com/cert-manager/crypto - c2f4947f41766b144bb09066e919466da5eddeae authored over 8 years ago by Alex Vaghin <[email protected]>
x/crypto/ssh: handle missing exit status more gracefully.

According to RFC 4254 section 6.10, SSH server implementations may
omit the exit-status and exit...

github.com/cert-manager/crypto - d81fdb778bf2c40a91b24519d60cdc5767318829 authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
x/crypto: fix typos

The typos were found by misspell tool.

Change-Id: I120740f12f7ba48330749ebf84050a7b98e01016
Rev...

github.com/cert-manager/crypto - 077efaa604f994162e3307fafe5954640763fc08 authored over 8 years ago by Martin Hamrle <[email protected]>
x/crypto/ssh: use BigEndian.Uint32 for decoding exit status.

Change-Id: Iab40fe42454088a00abea61dfb6f368da9323eb3
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - cd884d3570d683d80f5344a005056f42c076aa88 authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
x/crypto/ssh: Add support for retryable authentication

Adds a new AuthMethod called "RetryableAuthMethod" which decorates any
other authmethod, allowin...

github.com/cert-manager/crypto - 0c565bf13221fb55497d7ae2bb95694db1fd1bff authored over 8 years ago by Jamie Beverly <[email protected]>
agent: add agent server support for ed25519 keys.

the client library already supports them.

Fixes golang/go#16096

Change-Id: Iaa117ee31f706301e8...

github.com/cert-manager/crypto - 811831de4c4dd03a0b8737233af3b36852386373 authored over 8 years ago by Peter Moody <[email protected]>
crypto/ssh: minor comment change (trivial)

Fixed a function comment.

Change-Id: I1185c0c849abbb8244c6282fa6036fa6939c3309
Reviewed-on: htt...

github.com/cert-manager/crypto - f3241ce8505855877cc8a9717bd61a0f7c4ea83c authored over 8 years ago by Dmitry Savintsev <[email protected]>
go.crypto/blowfish: fix typo in docstring in cipher.go

Change-Id: I1b968decc23de5b7f635dcbc4133b1ab3745ff88
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 77f4136a99ffb5ecdbdd0226bd5cb146cf56bc0e authored over 8 years ago by Joe Farrell <[email protected]>
x/crypto/ssh: set constraints when adding certs to the agent

Fixes golang/go#15953

Change-Id: Ia36b5422bef14609d512c3f5055a3bffad18ce0f
Reviewed-on: https:/...

github.com/cert-manager/crypto - 89d9e62992539701a49a19c52ebb33e84cbbe80f authored over 8 years ago by Niall Sheridan <[email protected]>
ssh: allow adding ed25519 keys to the agent

Fixes golang/go#15701

Change-Id: I561701e38b9d434ef44448bdbcfab203f3c31d99
Reviewed-on: https:/...

github.com/cert-manager/crypto - 5bcd134fee4dd1475da17714aac19c0aa0142e2f authored over 8 years ago by Niall Sheridan <[email protected]>
x/crypto/ssh: return msgNewKeys for a short-circuited first kex.

If one of both sides is slow, the first kex completes implicitly. The
first kex also produces ms...

github.com/cert-manager/crypto - 0a4e4d451b03d07d8e92e07f8d9e1db84e6e89ac authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
x/crypto/ssh: add 3des-cbc as a non-default cipher

3des-cbc is an insecure cipher. As such, you must explictly add it to
Config in order to use it....

github.com/cert-manager/crypto - b6789ab629056511030d652d851e7dc10c9e9c9e authored over 8 years ago by Sam Hug <[email protected]>
x/crypto/ssh: add support for ed25519 keys

Added support for parsing the "new" openssh private key format.
(ed25519 keys only in this forma...

github.com/cert-manager/crypto - 1e61df8d9ea476e2e1504cd9a32b40280c7c6c7e authored over 8 years ago by Martin Garton <[email protected]>
x/crypto/ssh: hide msgNewKeys in the transport layer.

This ensures that extraneous key exchanges cannot confuse application
level code.

Change-Id: I1...

github.com/cert-manager/crypto - b76c864ef1dca1d8f271f917c290cddcce3d9e0d authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
ssh: fix compatibility with recent OpenSSH

Make x/crypto/ssh tests compatible with recent OpenSSH versions.
This means not using rsa keys s...

github.com/cert-manager/crypto - 91ab96ae987aef3e74ab78b3aaf026109d206148 authored over 8 years ago by Martin Garton <[email protected]>
acme: format test data

A test RSA private key was missing "-" in the END delimiter.
While working fine with encoding/pe...

github.com/cert-manager/crypto - 47ff8dfbc528fea3003fc0ce2d88ffbbfbc46a43 authored over 8 years ago by Alex Vaghin <[email protected]>
x/crypto/openpgp/s2k: fix misleading function comment

Remove mention of panic from HashIdToString doc.

Change-Id: If606dc1ebad53ef5c1b052fff36499af2b...

github.com/cert-manager/crypto - 019870fc9d457ee8abd13a2e93e3f2a3b55b7119 authored over 8 years ago by Artyom Pervukhin <[email protected]>
x/crypto/ssh: also log data packets when debugHandshake is set

Change-Id: Ibb26269608e506e8a676c276f847d77fe7014ceb
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 2cb52d93744fdc9a51f5c87b36fe2208d424af5a authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
x/crypto/ssh: fix subsequent key exchanges.

In https://go-review.googlesource.com/#/c/21606/ , kexResult.SessionID
was erroneously not set f...

github.com/cert-manager/crypto - 285fb2ed20d1dc450fc743a1b3ff7c36bef372b9 authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
x/crypto/ed25519: add package.

This change “graduates” the Ed25519 package from my personal GitHub
account to x/crypto. At this...

github.com/cert-manager/crypto - c9aef117f53e16ed3a6cc3d93cd357dbf2005065 authored over 8 years ago by Adam Langley <[email protected]>
x/crypto/ssh: support more keytypes in the agent.

This allows the golang ssh-agent to support the full suite of keys
the library accepts.

Current...

github.com/cert-manager/crypto - e84a34b1eedf81a90fb4f502d02d64ad365ef937 authored over 8 years ago by Peter Moody <[email protected]>
x/crypto/ssh: if debugMux is set, also log global messages.

Change-Id: I685ba7f30f1d2e2bc3c078c7bddb6d383a179113
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - f98fd1f5ecec028d2635baf2e1ba93ee455c06cb authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
x/crypto/ssh: remove misleading comment, add example

Add an example for using the PublicKeys AuthMethod.

Change-Id: I3fe02bb3c9b8ccf313d72858328c857...

github.com/cert-manager/crypto - 7b428712abe956d0e9e1e9a01e163fb6c7171438 authored over 8 years ago by Scott Bell <[email protected]>
sha3: revert alignment optimization on ppc64

A previous fix to improve performance based on alignment
to sha3 was made in both ppc64le and pp...

github.com/cert-manager/crypto - fbbbdbdd6f61a8f86b00866626c2fe3d2a642db0 authored over 8 years ago by Lynn Boger <[email protected]>
x/crypto/ssh/agent: Support v1 remove all message

Some ssh-agent clients expect the server to support remove all messages
for protocols 1 & 2 and ...

github.com/cert-manager/crypto - 3305186468e57f6c7535c9e97cb0bde4b2b65908 authored over 8 years ago by Mark Severson <[email protected]>
x/crypto/ssh: omit empty fields in error message

Although the signal and msg fields are assigned together, their
values originate from the remote...

github.com/cert-manager/crypto - de15db8e4b7d9627c2c0922002d1de9806af8564 authored over 8 years ago by Scott Bell <[email protected]>
x/crypto/ssh: debug support for msgUserAuthSuccess and msgChannelData

Change-Id: I14d59509f22edf01827610a4ef4c50b53cbc8059
Reviewed-on: https://go-review.googlesource...

github.com/cert-manager/crypto - 2f6fccd33b9b1fc23ebb73ad4890698820f7174d authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
acme: initial import of ACME implementation

Originated from github.com/google/goacme.

This does not include goacme command line program
git...

github.com/cert-manager/crypto - 1777f3ba8c1fed80fcaec3317e3aaa4f627764d2 authored over 8 years ago by Alex Vaghin <[email protected]>
x/crypto/ssh: make sure the initial key exchange happens once.

This is done by running the key exchange and setting the session ID
under mutex. If the first ex...

github.com/cert-manager/crypto - d68c3ecb62c850b645dc072a8d78006286bf81ca authored over 8 years ago by Han-Wen Nienhuys <[email protected]>
x/crypto/ssh/terminal: ensure windows MakeRaw returns previous state

The MakeRaw method should be returning the original state so that
it can be restored. However, ...

github.com/cert-manager/crypto - 3fbbcd23f1cb824e69491a5930cfeff09b12f4d2 authored over 8 years ago by John Schnake <[email protected]>