<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to patches</title><link>https://sourceforge.net/p/jsch/patches/</link><description>Recent changes to patches</description><atom:link href="https://sourceforge.net/p/jsch/patches/feed.rss" rel="self"/><language>en</language><lastBuildDate>Fri, 04 Feb 2022 14:52:02 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/jsch/patches/feed.rss" rel="self" type="application/rss+xml"/><item><title>#10 ecdsa 384 and 521 key verification broken</title><link>https://sourceforge.net/p/jsch/patches/10/?limit=25#044f</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello !&lt;br/&gt;
Can you give me a hint how to applicate the patch using the "patch" comand in linux terminal ? Or is there an other way to get a patched JSCH ? &lt;br/&gt;
Thanks in advance&lt;br/&gt;
Bernhard&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bernhard Falk</dc:creator><pubDate>Fri, 04 Feb 2022 14:52:02 -0000</pubDate><guid>https://sourceforge.netf2c5644408110d1a3cd4c3cce7d71f2107ae4ab9</guid></item><item><title>Unix line-end in PPK files</title><link>https://sourceforge.net/p/jsch/patches/13/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi, I'd like to offer a patch for KeyPair.java that allows handling PPK-files with Unix-style lineends (LF-only). (Actually, it works this with CR-only, LF-only, LCFR, CRLF lineends -- not EBCDIC though)&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lorinczy Zsigmond</dc:creator><pubDate>Thu, 18 Jun 2020 19:56:02 -0000</pubDate><guid>https://sourceforge.net1d2114f197601ebbdbc445871a6b303425413b58</guid></item><item><title>#10 ecdsa 384 and 521 key verification broken</title><link>https://sourceforge.net/p/jsch/patches/10/?limit=25#e6cf</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello.&lt;br/&gt;
Do you have any similar patch for ecdsa-sha2-nistp256 host key algorithm?&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Vineeth Chinmay Karra</dc:creator><pubDate>Thu, 14 Mar 2019 09:36:22 -0000</pubDate><guid>https://sourceforge.net4cbf16b63f60c68efcb1086ee473d1643d626f53</guid></item><item><title>Allow users to set alternate password encodings</title><link>https://sourceforge.net/p/jsch/patches/12/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;It'd be really useful to expose the existing function in Util.java and allow different password encodings than UTF-8 to be set.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sophie Stratton</dc:creator><pubDate>Wed, 06 Mar 2019 17:17:40 -0000</pubDate><guid>https://sourceforge.netbb754508df75385239a2193b612d8dfdb1e935c9</guid></item><item><title>Added support for 256 bit HMAC</title><link>https://sourceforge.net/p/jsch/patches/11/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I am unsure if you're actively accepting patches for this project, but I figured I'd submit this anyways. This change enables support for 256 bit HMAC if JCE supports &amp;gt;= 256 bit AES keys (which is now default behavior).&lt;br/&gt;
One caveat to this is it requires larger buffer sizes for packets sent, so that is now controlled via constant in Channel, which needs to be at least 112 to support the larger MAC.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dylan Katz</dc:creator><pubDate>Wed, 06 Feb 2019 18:56:19 -0000</pubDate><guid>https://sourceforge.netfcd0f686536099274a0f6ffb07fb836829781fc7</guid></item><item><title>ecdsa 384 and 521 key verification broken</title><link>https://sourceforge.net/p/jsch/patches/10/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hello!&lt;/p&gt;
&lt;p&gt;Due to a hardcoded string in com.jcraft.jsch.jce.SignatureECDSA Jsch is unable to connect to any SSH server, providing ecdsa-sha2-nistp384 or ecdsa-sha2-nistp521 keys.&lt;/p&gt;
&lt;p&gt;Attached is a proposed patch.&lt;/p&gt;
&lt;p&gt;Cheers,&lt;br/&gt;
Ilya German&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Iger</dc:creator><pubDate>Thu, 13 Apr 2017 13:59:44 -0000</pubDate><guid>https://sourceforge.netca0d5fdd6698846ea97eb33abb30813012daefb5</guid></item><item><title>Fix crash on corrupt known_hosts file</title><link>https://sourceforge.net/p/jsch/patches/9/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;The exception is raised in the case where a server host key is bad. In&lt;br/&gt;
my case the system administrator had accidentally included the key&lt;br/&gt;
type twice:&lt;/p&gt;
&lt;p&gt;server.company.com,10.0.0.1 ssh-rsa ssh-rsa &amp;lt;key&amp;gt;&lt;/p&gt;
&lt;p&gt;And ssh-rsa was treated as a key. This fails because it is not valid&lt;br/&gt;
Base64. My proposed patch treats this line as an invalid line and&lt;br/&gt;
continues, like JSch does in other cases.&lt;/p&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span class="nv"&gt;$ &lt;/span&gt;diff -u ./src/main/java/com/jcraft/jsch/KnownHosts.java ./src/main/java/com/jcraft/jsch/KnownHosts2.java
--- ./src/main/java/com/jcraft/jsch/KnownHosts.java 2017-03-28 09:55:32.131080050 +0100
+++ ./src/main/java/com/jcraft/jsch/KnownHosts2.java    2017-03-28 09:57:26.322732339 +0100
@@ -215,12 +215,14 @@
    //System.err.println&lt;span class="o"&gt;(&lt;/span&gt;host&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
    //System.err.println&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"|"&lt;/span&gt;+key+&lt;span class="s2"&gt;"|"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

-   HostKey &lt;span class="nv"&gt;hk&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; null&lt;span class="p"&gt;;&lt;/span&gt;
-        &lt;span class="nv"&gt;hk&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; new HashedHostKey&lt;span class="o"&gt;(&lt;/span&gt;marker, host, &lt;span class="nb"&gt;type&lt;/span&gt;, 
-                               Util.fromBase64&lt;span class="o"&gt;(&lt;/span&gt;Util.str2byte&lt;span class="o"&gt;(&lt;/span&gt;key&lt;span class="o"&gt;)&lt;/span&gt;, 0, 
-                                               key.length&lt;span class="o"&gt;())&lt;/span&gt;, comment&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
-   pool.addElement&lt;span class="o"&gt;(&lt;/span&gt;hk&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
-      &lt;span class="o"&gt;}&lt;/span&gt;
+        try &lt;span class="o"&gt;{&lt;/span&gt;
+          pool.addElement&lt;span class="o"&gt;(&lt;/span&gt;new HashedHostKey&lt;span class="o"&gt;(&lt;/span&gt;marker, host, &lt;span class="nb"&gt;type&lt;/span&gt;, 
+                                            Util.fromBase64&lt;span class="o"&gt;(&lt;/span&gt;Util.str2byte&lt;span class="o"&gt;(&lt;/span&gt;key&lt;span class="o"&gt;)&lt;/span&gt;, 0, 
+                                                            key.length&lt;span class="o"&gt;())&lt;/span&gt;, comment&lt;span class="o"&gt;))&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
+        &lt;span class="o"&gt;}&lt;/span&gt; catch &lt;span class="o"&gt;(&lt;/span&gt;JSchException e&lt;span class="o"&gt;)&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;
+          addInvalidLine&lt;span class="o"&gt;(&lt;/span&gt;Util.byte2str&lt;span class="o"&gt;(&lt;/span&gt;buf, 0, bufl&lt;span class="o"&gt;))&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
+        &lt;span class="o"&gt;}&lt;/span&gt;
+
       &lt;span class="k"&gt;if&lt;/span&gt;&lt;span class="o"&gt;(&lt;/span&gt;error&lt;span class="o"&gt;){&lt;/span&gt;
    throw new JSchException&lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;"KnownHosts: invalid format"&lt;/span&gt;&lt;span class="o"&gt;)&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
       &lt;span class="o"&gt;}&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;

&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robin Neatherway</dc:creator><pubDate>Tue, 28 Mar 2017 09:03:22 -0000</pubDate><guid>https://sourceforge.netfd010cade9a21a2fb2066aedb5135daac2a8e0e2</guid></item><item><title>#8 Memory leak in LocalIdentityRepository</title><link>https://sourceforge.net/p/jsch/patches/8/?limit=25#4222</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Thank you! I also got out of memory leaks, I hope your decision will help.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexsey</dc:creator><pubDate>Sun, 13 Mar 2016 21:15:23 -0000</pubDate><guid>https://sourceforge.netf0f24067acda1009caaf727c67e6b68363de157a</guid></item><item><title>#7 Enable DH-SHA2 key exchange</title><link>https://sourceforge.net/p/jsch/patches/7/?limit=25#14cd</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;None, sorry. I only identified the problem and proposed a solution.&lt;br /&gt;
That's a question for the maintainer, Atsuhiko Yamanaka.&lt;br /&gt;
Meanwhile yo can download the source, apply the attached patch and build yourself.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Antonio Eugenio Burriel</dc:creator><pubDate>Mon, 02 Mar 2015 18:25:28 -0000</pubDate><guid>https://sourceforge.netd6f48d7468fe6bc2f01dd81ca3de2ecbce218d43</guid></item><item><title>#7 Enable DH-SHA2 key exchange</title><link>https://sourceforge.net/p/jsch/patches/7/?limit=25#e42f</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Dear Antonio&lt;/p&gt;
&lt;p&gt;Any idea of a possible release day for this patch?&lt;/p&gt;
&lt;p&gt;Thank you in advance&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">yp43X@</dc:creator><pubDate>Mon, 02 Mar 2015 08:57:39 -0000</pubDate><guid>https://sourceforge.net947d8a650f019642e7605f0c2b5865d8af1e9133</guid></item></channel></rss>