From mboxrd@z Thu Jan 1 00:00:00 1970 Path: news.gmane.org!not-for-mail From: Artyom Poptsov Newsgroups: gmane.lisp.guile.user Subject: [ANN] Guile-SSH 0.7.1 released Date: Sat, 11 Oct 2014 23:16:33 +0400 Message-ID: <87k34676y6.fsf@elephant.savannah> NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" X-Trace: ger.gmane.org 1413055043 13505 80.91.229.3 (11 Oct 2014 19:17:23 GMT) X-Complaints-To: usenet@ger.gmane.org NNTP-Posting-Date: Sat, 11 Oct 2014 19:17:23 +0000 (UTC) To: Guile Users' Mailing List Original-X-From: guile-user-bounces+guile-user=m.gmane.org@gnu.org Sat Oct 11 21:17:16 2014 Return-path: Envelope-to: guile-user@m.gmane.org Original-Received: from lists.gnu.org ([208.118.235.17]) by plane.gmane.org with esmtp (Exim 4.69) (envelope-from ) id 1Xd2AD-0008SY-Vt for guile-user@m.gmane.org; Sat, 11 Oct 2014 21:17:14 +0200 Original-Received: from localhost ([::1]:55093 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Xd2AD-0004z1-He for guile-user@m.gmane.org; Sat, 11 Oct 2014 15:17:13 -0400 Original-Received: from eggs.gnu.org ([2001:4830:134:3::10]:44440) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Xd29z-0004yp-Pv for guile-user@gnu.org; Sat, 11 Oct 2014 15:17:03 -0400 Original-Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Xd29v-0007Bh-Lt for guile-user@gnu.org; Sat, 11 Oct 2014 15:16:59 -0400 Original-Received: from mail-la0-x22c.google.com ([2a00:1450:4010:c03::22c]:45985) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Xd29v-0007B8-8i for guile-user@gnu.org; Sat, 11 Oct 2014 15:16:55 -0400 Original-Received: by mail-la0-f44.google.com with SMTP id hs14so4937844lab.17 for ; Sat, 11 Oct 2014 12:16:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:subject:date:message-id:user-agent:mime-version :content-type; bh=xvj4HOoKwuxvp5Enge3tIhyWyP5aAytp5Y0csxTPTbY=; b=MjyDh2sXZ8iU6MATVcQdG28qQg9JfmQcyVzXoccZxrAwN2m8pITKfsgzJZMoDmxya0 l41+aILOoFcMDrHs1Vqd5cLy+uocT8stqvlImKGmUxL8m93wGRf5CeaQ/3p3j3bpX7X6 MQ6oMCg/afaIgfQ9VhT7oYAFQR3eqKLpQ9oZQU5DFqaof2Vy5G5E8s5J1y8Qz/vrvi6n rHG0FBanBmEvnub8ZgsPC2c05f6LcTfzXfDeOKLT//eynpV+dhgcrgaxuTFia/o3VCjS q/E2SilfvcuZXhaOyf+5dHsu7Zj/U2m3yz2mGJnzH/U/4kYCsjx/JI4s97QpS5HeVQVE F3IA== X-Received: by 10.112.56.198 with SMTP id c6mr13165453lbq.43.1413055013529; Sat, 11 Oct 2014 12:16:53 -0700 (PDT) Original-Received: from elephant.savannah (93-120-141-144.dynamic.mts-nn.ru. [93.120.141.144]) by mx.google.com with ESMTPSA id f6sm2973787lbh.10.2014.10.11.12.16.51 for (version=TLSv1.2 cipher=RC4-SHA bits=128/128); Sat, 11 Oct 2014 12:16:52 -0700 (PDT) User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (gnu/linux) X-detected-operating-system: by eggs.gnu.org: Error: Malformed IPv6 address (bad octet value). X-Received-From: 2a00:1450:4010:c03::22c X-BeenThere: guile-user@gnu.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: General Guile related discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guile-user-bounces+guile-user=m.gmane.org@gnu.org Original-Sender: guile-user-bounces+guile-user=m.gmane.org@gnu.org Xref: news.gmane.org gmane.lisp.guile.user:11575 Archived-At: --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hello Guilers! I'm pleased to announce Guile-SSH 0.7.1: https://github.com/artyom-poptsov/guile-ssh/releases/tag/v0.7.1 This release includes some bugfixes in tests and some new procedures such as `make-keypair' which allows to create keypairs with the specified parameters. Full list of user-visible changes is shown below. Guile-SSH is a library that provides access to the SSH protocol for GNU Guile programs. Guile-SSH 0.7.1 API is sufficient for building of SSH servers and SSH clients. In addition, it provides key management facilities that allow to read and manipulate private and public keys, and generate new keypairs. Please *note* that Guile-SSH fails if libssh 0.6.3 is compiled with GCrypt cryptographic library instead of OpenSSL. There is a patch [1] that fixes the issue. One of the ways to get the patch is to compile libssh from `v0-6' Git branch [2] where the patch is already applied. Another issue is that libssh 0.6.3 does not support ECDSA keys if it is compiled with GCrypt, so Guile-SSH won't be able to work with such keys in this case either. Current version was tested on the following GNU/Linux distributions: Gentoo Base System release 2.2 (with OpenSSL and GCrypt), Debian 7.6 (with OpenSSL and GCrypt). Signed package can be found here: - ftp://memory-heap.org/software/guile-ssh/guile-ssh-0.7.1.tar.gz - ftp://memory-heap.org/software/guile-ssh/guile-ssh-0.7.1.tar.gz.sig Here is an excerpt from the NEWS file: =2D-8<---------------cut here---------------start------------->8--- * Changes in version 0.7.1 (2014-10-11) ** New `%get-libssh-version' procedure in (ssh version) The procedure can be used to get libssh version in the "raw" format such as: "0.6.3/openssl/zlib". ** New `get-crypto-library' procedure in (ssh version) The procedure returns name of a cryptographic library with which libssh = was compiled. ** New `zlib-support?' procedure in (ssh version) The procedure checks if zlib support is enabled in libssh. ** New `set-log-verbosity!' procedure in (ssh log) The procedure sets global libssh log verbosity. ** New `get-log-verbosity' procedure in (ssh log) The procedure gets global libssh log verbosity. ** New `make-keypair' procedure in (ssh key) The procedure can be used to generate a new keypair with the specified parameters. ** New `private-key-to-file' procedure in (ssh key) The procedure can be used to export a private key to a file (doesn't work if libssh 0.6.3 is compiled with GCrypt). ** Changes in tests *** Fix "end of file" errors in tests Fix the following kind of errors in tests: #+BEGIN_EXAMPLE ERROR: In procedure scm_i_lreadparen: /path/to/guile-ssh/sources/tests/./cl= ient-server.scm:272:34: end of file #+END_EXAMPLE Thanks to Ludovic Court=C3=A8s for reporting the issue and for a good ad= vice how to fix that. *** Don't perform ECDSA key tests if libssh is compiled with GCrypt libssh 0.6.3 does not support ECDSA keys if compiled with GCrypt instead of OpenSSL. Thus, ECDSA key tests used to fail. Now there is a check that prevents these tests from execution in case when libssh 0.6.3 is compiled with GCrypt. ** Update documentation - Add description of the new procedures. - Add note about ECDSA keys support with GCrypt library. =2D-8<---------------cut here---------------end--------------->8--- Thanks, =2D Artyom [1] http://git.libssh.org/projects/libssh.git/commit/?h=3Dv0-6&id=3Da033b93= c616f4a81afc3fc6a017396d507d96c19 [2] http://git.libssh.org/projects/libssh.git/log/?h=3Dv0-6 =2D-=20 Artyom V. Poptsov ; GPG Key: 0898A02F Home page: http://poptsov-artyom.narod.ru/ --=-=-= Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCgAGBQJUOYISAAoJEOnFotkImKAvPXkIAKcrsh/BdkpfRdj4guNmlwCv POjTIDlRELjqq1dIUxUay+pJSCgrbWghHsvKNtxYZpcnK/FsTFfUDiR4Z1qrQAlx lEhmfZgc6s9MJZr1MuOoIfVpAY4NCdi2nRzTEUxM0sXi3YWSgdGv1mldLPcKKKGX 8j0GKalEd/Ls772MaBb0qLPKt/4xjeJEdlZaJb26QG0Wzm1w8N/+WuBvsTASywuZ Xld90N1j16LuKt/9KvoV/IBnNUX/j4BrkUQs4rjyumKWTbBbnXzc24PkeTlACPml LSL8YQWZQll1cu/VIY/cLkg9+JcnW6vgVBSW/2ERsKxmaZEOoaZG2zmDO4Q5J5U= =t2gS -----END PGP SIGNATURE----- --=-=-=--