Граф коммитов

161 Коммитов

Автор SHA1 Сообщение Дата
Kevin Jones 5ac7be5c74
Merge pull request #67 from github/add-codeowners
Add CODEOWNERS
2024-08-15 10:22:39 -04:00
Kevin Jones 5b126ada1d
Add authentication to codeowners list. 2024-08-15 10:14:21 -04:00
Kevin Jones 219bbcbd67
Add CODEOWNERS 2024-08-15 09:51:00 -04:00
Kevin Jones fc98dfe053
Merge pull request #65 from github/vcsjones-workflow-perms
Add permissions to workflow
2024-08-14 16:41:03 -04:00
Kevin Jones e9537fac87
Add permissions to workflow 2024-08-14 16:37:38 -04:00
Kevin Jones 8dd6f3906e
Merge pull request #61 from github/ruby-3.3
Updates for ruby 3.3
2024-01-16 11:13:20 -05:00
Kevin Jones 2045fa77fc
Remove install bundler step 2023-12-25 16:07:01 -05:00
Kevin Jones 79ba25ecbb
Updates for Ruby 3.3 2023-12-25 16:02:07 -05:00
Kylie Stradley 4ec1875211
Merge pull request #52 from github/memoize-pub-key
Memoize the public key in SSH signature
2023-08-04 07:59:18 -04:00
Kevin Jones 7c9505e35d
Memoize the public key so that we do not re-create it every time it is accessed 2023-08-03 21:01:22 -04:00
Kevin Jones 42b8065c44
Merge pull request #51 from github/diminished-rsa
Handle diminished RSA signatures.
2023-04-26 14:33:45 -04:00
Kevin Jones 24e07071a1
Update comment to use bytes instead of bits. 2023-04-25 10:52:46 -04:00
Kevin Jones 9b29a3bc55
Handle diminished RSA signatures.
If an RSA signature length, in bytes, is less than the RSA modulus length, in bytes, prepend the signature with zeros.

OpenSSH supports diminished RSA signatures where "leading" zeros do not need to be explicitly encoded. This handles RSA signatures similarly to how OpenSSH handles them.
2023-04-24 13:06:24 -04:00
Kevin Jones 997af7f5e2
Change documentation return type of PrivateKey::RSA.from_openssl 2023-03-30 12:50:51 -04:00
Jesse Shawl 612f1ab34c
Change return type of PrivateKey::RSA.from_openssl
This PR updates the documentation comment to return an `OpenSSL::PKey::RSA` instance instead of `OpenSSL::PKey::DSA`
2023-03-29 17:22:54 -05:00
Kevin Jones 33f7512375
Merge pull request #49 from jshawl/patch-1 2023-03-26 13:09:48 -04:00
Jesse Shawl 8dda472871
fix documentation typo 2023-03-26 06:58:52 -05:00
Kevin Jones f66b42380c
Merge pull request #47 from jshawl/fix-typo
fix typos
2023-03-07 09:10:38 -05:00
Jesse Shawl 6fafd8c6dd
fix typos 2023-03-07 06:00:46 -06:00
Kevin Jones c28f6a1568
Add support for OpenSSL 3 and test against Ruby 3.2 2023-01-09 14:47:10 -05:00
Kevin Jones bed8c96486
Use generate to construct key instead of mutating the PKEY instance for OpenSSL 3.0 compatibility 2023-01-05 18:18:51 -05:00
Kevin Jones b28ddc9eeb
Add Ruby 3.2 to test matrix 2023-01-05 16:02:02 -05:00
Kevin Jones 3970557452
Merge pull request #36 from Brcrwilliams/refactor-signature-spec
Refactor signature spec
2022-05-26 10:09:36 -04:00
Kevin Jones 2f09ec25f3
Merge pull request #38 from github/drop-ruby-26
Remove Ruby 2.6 that is EOL from the test matrix
2022-05-26 10:00:39 -04:00
Kevin Jones 4273e85d19
Remove Ruby 2.6 that is EOL from the test matrix 2022-05-26 09:57:41 -04:00
Kevin Jones 974b50407e
Merge pull request #37 from github/actions-on-prs
Run actions on pull requests
2022-05-26 09:31:19 -04:00
Kevin Jones 9e198ad2bc
Run actions on pull requests 2022-05-26 09:29:28 -04:00
Brian Williams 36fd213604 Refactor signature spec 2022-05-26 06:46:02 -05:00
Kevin Jones a1b98d5fdf
Merge pull request #34 from github/release-1.3.0
Prepare for 1.3.0 release
2022-01-21 10:41:39 -05:00
Kevin Jones 41e4e893dc
Prepare for 1.3.0 release 2022-01-21 10:40:12 -05:00
Kevin Jones c78ca22f5b
Merge pull request #32 from github/update-ruby-tests
Support Ruby 3.1 and fix Q size to 160 bits
2022-01-05 12:24:54 -05:00
Kevin Jones ff034d52fd
Test default parameters for DSA 2021-12-29 17:38:27 -05:00
Kevin Jones 6e1bb8edfb
Fix DSA key generation to use a 160 Q bit value in Ruby 3.1 / OpenSSL 3.0. 2021-12-29 17:14:53 -05:00
Kevin Jones e7c2b70c92
Merge pull request #31 from github/full-sig-support
Support SSHSIG and SK verification
2021-12-29 12:47:28 -05:00
Kevin Jones c77dba477f
Fix ruby 2.6 syntax error 2021-12-29 12:44:43 -05:00
Kevin Jones 51dfdffca8
Test against Ruby 3.1 and update the setup-ruby action. 2021-12-29 12:41:44 -05:00
Kevin Jones f26e94fc93
Add tests for failing to decode a signature 2021-12-29 12:34:02 -05:00
Kevin Jones 5f3cbdfe45
Code review feedback.
* Move some things in to a more specific module for security keys.
* Comment on the security key defaults.
* Rework code so that flag checks are independent for security keys.
2021-12-29 11:58:57 -05:00
Kevin Jones 4233196772
Add support for SSHSIG with certificates 2021-12-19 15:50:58 -05:00
Kevin Jones 07d2424db4
Test various security key options 2021-12-19 12:36:00 -05:00
Kevin Jones c16b90ac63
Support checking the sk_flags 2021-12-19 11:43:40 -05:00
Kevin Jones b4b7cb649a
Remove re-check of hash algorithm since it's checked in initialize 2021-12-17 13:53:26 -05:00
Kevin Jones 0b1f519e5a
Rename hashalgorithm to hash_algorithm to match spec 2021-12-17 13:51:44 -05:00
Kevin Jones d74f25829f
Fix decode_openssh_signature to respect offset 2021-12-17 13:47:24 -05:00
Kevin Jones e0c24b2c39
Support SSHSIG and SK verification.
This adds support for OpenSSH SSHSIG signatures, used for signing
arbitrary payloads.

This also adds support for public-key verification from -SK algorithms
so that signatures from security keys can be verified. This enables
using security keys for SSHSIG, as well as using security keys as
SSH-cert CAs.
2021-12-13 11:07:22 -05:00
Kevin Jones 1890c4bfc4
Merge pull request #30 from github/update-lock
Update lockfile version
2021-12-02 11:07:20 -05:00
Kevin Jones 20f2680c94
Update lockfile version 2021-12-02 11:05:34 -05:00
Kevin Jones 2d04bec7cd
Merge pull request #29 from github/bump-version
Bump version
2021-12-02 10:46:44 -05:00
Kevin Jones fd2ef08043
Bump version
Bump the version in preparation for a new release.
2021-12-02 10:37:34 -05:00
Kevin Jones 1c4cacb58f
Merge pull request #21 from github/sk-keys
Support parsing SK-* keys
2021-03-11 12:48:20 -05:00