generator-kotlin-android
                                
                                 generator-kotlin-android copied to clipboard
                                
                                    generator-kotlin-android copied to clipboard
                            
                            
                            
                        Bump sshpk from 1.7.4 to 1.16.1
Bumps sshpk from 1.7.4 to 1.16.1.
Release notes
Sourced from sshpk's releases.
v1.16.1
- Fixes for #60 (correctly encoding certificates with expiry dates >=2050), #62 (accepting PKCS#8 EC private keys with missing public key parts)
v1.16.0
- Add support for SPKI fingerprints, PuTTY PPK format (public-key only for now), PKCS#8 PBKDF2 encrypted private keys
- Fix for #48
v1.15.2
v1.14.1
- Remove all remaining usage of jodid25519 (abandoned dep)
- Add support for DNSSEC key format
- Add support for Ed25519 keys in PEM format (according to draft-curdle-pkix)
- Fixes for X.509 encoding issues (asn.1 NULLs in RSA certs, cert string type mangling)
- Performance issues parsing long SSH public keys
v1.13.0
- Support SSH-format rsa-sha2-256 signatures (e.g. so the SSH agent can sign using RSA-SHA256)
v1.12.0
- Support for generating ECDSA keys using
generatePrivateKey()- Minimum for
sshpk-agentto be able to sign new certificates using an agent keyv1.11.0
- Added support for X.509 extKeyUsage
v1.10.0
- Added support for OpenSSH format encrypted private keys (the
ssh-keygen -oformat, with a passphrase)v1.9.1
- New
CertificateAPI, basic support for OpenSSH and X.509 certificates- Fixed a bug with padding on DSA signatures
v1.8.3
- Use plain hash algorithm names as the argument to
crypto.createSignandcreateVerify-- avoids the output of spuriousUnknown message digestto stdout on node 0.10.xv1.8.2
- joyent/node-sshpk#3 Update ecc-jsbn dependency -- fixes installation on machines without the
gitclient installedv1.8.1
- Dropped support for node.js v0.8 and earlier
- Support for reading encrypted (password-protected) PEM files (no support for writing yet)
- Change to
parseKey()andparsePrivateKey()API (the oldnameargument has becomeoptions-- if given as a string will be used the same as before for backwards compatibility)
Commits
- 1aece0djoyent/node-sshpk#60 certs should generate GeneralizedTime values for dates >...
- 684dbe6joyent/node-sshpk#62 handle pkcs8 ECDSA keys with missing public parts
- 574ff21joyent/node-sshpk#18 support for PKCS8 encrypted private keys
- f647cf2joyent/node-sshpk#27 Add support for PuTTY PPK format
- 44aec4ajoyent/node-sshpk#59 want support for SPKI fingerprint format
- 385ff11joyent/node-sshpk#48 wish: add support for x509 certificates in text form
- c7a6c68joyent/node-sshpk#58 des-ede3-cbc encrypted keys broken
- 2ab4f2ajoyent/node-sshpk#56 md5 fingerprints not quite right
- 026ef47joyent/node-sshpk#53 stop using optional deps to fix webpack
- 53e23fejoyent/node-sshpk#50 Support PKCS#5 AES-256-CBC encrypted private keys
- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
- @dependabot rebasewill rebase this PR
- @dependabot recreatewill recreate this PR, overwriting any edits that have been made to it
- @dependabot mergewill merge this PR after your CI passes on it
- @dependabot squash and mergewill squash and merge this PR after your CI passes on it
- @dependabot cancel mergewill cancel a previously requested merge and block automerging
- @dependabot reopenwill reopen this PR if it is closed
- @dependabot ignore this [patch|minor|major] versionwill close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it yourself)
- @dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
- @dependabot use these labelswill set the current labels as the default for future PRs for this repo and language
- @dependabot use these reviewerswill set the current reviewers as the default for future PRs for this repo and language
- @dependabot use these assigneeswill set the current assignees as the default for future PRs for this repo and language
- @dependabot use this milestonewill set the current milestone as the default for future PRs for this repo and language
You can disable automated security fix PRs for this repo from the Security Alerts page.