diff options
-rw-r--r-- | paramiko/ecdsakey.py | 2 | ||||
-rw-r--r-- | tests/test_client.py | 4 |
2 files changed, 3 insertions, 3 deletions
diff --git a/paramiko/ecdsakey.py b/paramiko/ecdsakey.py index fd876298..5a0164d8 100644 --- a/paramiko/ecdsakey.py +++ b/paramiko/ecdsakey.py @@ -134,7 +134,7 @@ class ECDSAKey(PKey): ) key_types = self._ECDSA_CURVES.get_key_format_identifier_list() cert_types = [ - '{}-cert-v01@openssh.com'.format(x) + '{0}-cert-v01@openssh.com'.format(x) for x in key_types ] self._check_type_and_load_cert( diff --git a/tests/test_client.py b/tests/test_client.py index f0808c4b..7ada13da 100644 --- a/tests/test_client.py +++ b/tests/test_client.py @@ -265,7 +265,7 @@ class SSHClientTest (unittest.TestCase): # server-side behavior is 100% identical.) # NOTE: only bothered whipping up one cert per overall class/family. for type_ in ('rsa', 'dss', 'ecdsa_256', 'ed25519'): - cert_path = test_path('test_{}.key-cert.pub'.format(type_)) + cert_path = test_path('test_{0}.key-cert.pub'.format(type_)) self._test_connection( key_filename=cert_path, public_blob=PublicBlob.from_file(cert_path), @@ -279,7 +279,7 @@ class SSHClientTest (unittest.TestCase): # that a specific cert was found, along with regular authorization # succeeding proving that the overall flow works. for type_ in ('rsa', 'dss', 'ecdsa_256', 'ed25519'): - key_path = test_path('test_{}.key'.format(type_)) + key_path = test_path('test_{0}.key'.format(type_)) self._test_connection( key_filename=key_path, public_blob=PublicBlob.from_file( |