mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-30 23:22:26 -05:00 
			
		
		
		
	[chore] Update all but bun libraries (#526)
* update all but bun libraries Signed-off-by: kim <grufwub@gmail.com> * remove my personal build script changes Signed-off-by: kim <grufwub@gmail.com>
This commit is contained in:
		
					parent
					
						
							
								e06bf9cc9a
							
						
					
				
			
			
				commit
				
					
						b56dae8120
					
				
			
		
					 350 changed files with 305366 additions and 5943 deletions
				
			
		
							
								
								
									
										25
									
								
								vendor/golang.org/x/crypto/ssh/client.go
									
										
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										25
									
								
								vendor/golang.org/x/crypto/ssh/client.go
									
										
									
										generated
									
									
										vendored
									
									
								
							|  | @ -113,25 +113,16 @@ func (c *connection) clientHandshake(dialAddress string, config *ClientConfig) e | |||
| 	return c.clientAuthenticate(config) | ||||
| } | ||||
| 
 | ||||
| // verifyHostKeySignature verifies the host key obtained in the key | ||||
| // exchange. | ||||
| // verifyHostKeySignature verifies the host key obtained in the key exchange. | ||||
| // algo is the negotiated algorithm, and may be a certificate type. | ||||
| func verifyHostKeySignature(hostKey PublicKey, algo string, result *kexResult) error { | ||||
| 	sig, rest, ok := parseSignatureBody(result.Signature) | ||||
| 	if len(rest) > 0 || !ok { | ||||
| 		return errors.New("ssh: signature parse error") | ||||
| 	} | ||||
| 
 | ||||
| 	// For keys, underlyingAlgo is exactly algo. For certificates, | ||||
| 	// we have to look up the underlying key algorithm that SSH | ||||
| 	// uses to evaluate signatures. | ||||
| 	underlyingAlgo := algo | ||||
| 	for sigAlgo, certAlgo := range certAlgoNames { | ||||
| 		if certAlgo == algo { | ||||
| 			underlyingAlgo = sigAlgo | ||||
| 		} | ||||
| 	} | ||||
| 	if sig.Format != underlyingAlgo { | ||||
| 		return fmt.Errorf("ssh: invalid signature algorithm %q, expected %q", sig.Format, underlyingAlgo) | ||||
| 	if a := underlyingAlgo(algo); sig.Format != a { | ||||
| 		return fmt.Errorf("ssh: invalid signature algorithm %q, expected %q", sig.Format, a) | ||||
| 	} | ||||
| 
 | ||||
| 	return hostKey.Verify(result.H, sig) | ||||
|  | @ -237,11 +228,11 @@ type ClientConfig struct { | |||
| 	// be used for the connection. If empty, a reasonable default is used. | ||||
| 	ClientVersion string | ||||
| 
 | ||||
| 	// HostKeyAlgorithms lists the key types that the client will | ||||
| 	// accept from the server as host key, in order of | ||||
| 	// HostKeyAlgorithms lists the public key algorithms that the client will | ||||
| 	// accept from the server for host key authentication, in order of | ||||
| 	// preference. If empty, a reasonable default is used. Any | ||||
| 	// string returned from PublicKey.Type method may be used, or | ||||
| 	// any of the CertAlgoXxxx and KeyAlgoXxxx constants. | ||||
| 	// string returned from a PublicKey.Type method may be used, or | ||||
| 	// any of the CertAlgo and KeyAlgo constants. | ||||
| 	HostKeyAlgorithms []string | ||||
| 
 | ||||
| 	// Timeout is the maximum amount of time for the TCP connection to establish. | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue