Age | Commit message (Collapse) | Author | |
---|---|---|---|
2017-11-09 | Not sure how this got past me | Jeff Forcier | |
2017-11-09 | Derp, some stuff runs this method w/o run_kwargs | Jeff Forcier | |
2017-11-09 | Implement new passphrase kwarg for SSHClient.connect() | Jeff Forcier | |
2017-11-09 | LOL whoops this was a duplicate | Jeff Forcier | |
2017-11-09 | Write new test subsuite proving lack of connect(passphrase=) | Jeff Forcier | |
2017-11-09 | Tidy up previous change by ensuring cleaner shutdown. | Jeff Forcier | |
Without this, early-failing tests will exhibit extra log spew from the server Transport faceplanting. | |||
2017-11-09 | Prevent test suite hangs | Jeff Forcier | |
2017-11-09 | Split out setup/teardown bits of client tests into its own class. | Jeff Forcier | |
Paves way for multiple client-related groups of tests | |||
2017-10-25 | Mark known slow tests as 'slow' pytest marker, and skip them by default | Jeff Forcier | |
2017-10-23 | Import cleanup, mostly focused on s/tests/./ | Jeff Forcier | |
2017-10-23 | Rename util func that trips pytest's default discovery. | Jeff Forcier | |
Wouldn't matter as much under pytest-relaxed discovery, but, eh | |||
2017-10-10 | Update docs, metadata, test references to 2.6/3.3 | Jeff Forcier | |
2017-10-10 | Skip the now-split-out failure test, since we actually do intend to exit ↵ | Jeff Forcier | |
silently for now | |||
2017-10-10 | Split out env-set failure test | Jeff Forcier | |
2017-10-10 | Update still-failing client test to use contextmanager assertRaises style | Jeff Forcier | |
2017-10-10 | This has been broken since it went in :( the test would never normally pass ↵ | Jeff Forcier | |
otherwise... | |||
2017-10-10 | Use new(er)-style string formatting, {} instead of {0} | Jeff Forcier | |
2017-09-22 | Move cert tests & copies of related keys into separate folder. | Jeff Forcier | |
This prevents non-cert-related tests from incidentally loading the certs, which was masking issues (re #1071) | |||
2017-09-12 | Merge branch '2.2' | Jeff Forcier | |
2017-09-02 | Python 2.6 fixes | Jeff Forcier | |
Fixes #1049 | |||
2017-08-28 | Implement ECDSA certs. | Jeff Forcier | |
So mad at that frickin typo'd specification... | |||
2017-08-28 | Update recent tests to try all main key families. | Jeff Forcier | |
Includes some dummy certificates. Not sure exactly how @radssh generated the RSA one but I'm using ssh-keygen + a randomly made CA key. | |||
2017-08-28 | God damn it, really? Whatever. | Jeff Forcier | |
2017-08-28 | Update first few stub tests + required test-server and PublicBlob impl bits | Jeff Forcier | |
2017-08-28 | Stub tests and partly-working implementation of 'load certs found alongside ↵ | Jeff Forcier | |
key_filenames' behavior re #1042 This actually breaks existing tests due to test server not supporting certs...bah | |||
2017-08-04 | Merge branch '2.1-gsskex-hostkeycheck-fix' into 2.2-gsskex-hostkeycheck-fix | Anselm Kruis | |
2017-08-04 | Merge branch '2.0-gsskex-hostkeycheck-fix' into 2.1-gsskex-hostkeycheck-fix | Anselm Kruis | |
2017-08-04 | SSHClient: fix the host key test | Anselm Kruis | |
Skip the host key check only, if the transport actually used gssapi-keyex. Add tests for the missing-host-key RejectPolicy. Before this change, a man-in-the-middle attack on the paramiko ssh client with gss_kex=True was possible by having a server that does not support gssapi-keyex and gives any or no host key. | |||
2017-06-09 | Merge branch '2.1' | Jeff Forcier | |
2017-06-09 | Merge branch '2.1' into 910-int | Jeff Forcier | |
2017-06-09 | Merge branch '2.0' into 2.1 | Jeff Forcier | |
2017-06-09 | Flake8/etc tweaks re #971 in 2.x | Jeff Forcier | |
2017-06-09 | Import from py3compat directly in test_client | Martin Packman | |
2017-06-09 | Merge branch '2.1' | Jeff Forcier | |
2017-06-09 | Merge branch '2.0' into 2.1 | Jeff Forcier | |
2017-06-07 | tests for host key negotiation when there are multiple | Pierce Lopez | |
2017-06-07 | cleanup/simplify auth_timeout tests | Pierce Lopez | |
2017-06-06 | Merge branch 'master' into 869-int | Jeff Forcier | |
2017-06-06 | Failing test proving need for #857 | Jeff Forcier | |
2017-06-03 | Fixed encoding/decoding of the public key on the wire | Alex Gaynor | |
Public point was accidentally encoded as 32 bytes, with no length prefix. | |||
2017-06-03 | integration test, with ourselves | Alex Gaynor | |
2017-06-02 | re-enable client cleanup test for python3 | Pierce Lopez | |
2017-01-24 | Merge branch '2.0' into 2.1 | Jeff Forcier | |
2017-01-24 | untie agian! | james mike dupont | |
2016-12-23 | Added a test to check that the auth_timeout argument is passed through and ↵ | Tim Savage | |
applied. | |||
2016-12-12 | Remove code re #398 from 2.0 branch, as it's feature work | Jeff Forcier | |
2016-12-05 | Merge branch '1.18' into 2.0 | Jeff Forcier | |
2016-12-05 | Support transmission of environment variables | Philip Lorenz | |
The SSH protocol allows the client to transmit environment variables to the server. This is particularly useful if the user wants to modify the environment of an executed command without having to reexecute the actual command from a shell. This patch extends the Client and Channel interface to allow the transmission of environment variables to the server side. In order to use this feature the SSH server must accept environment variables from the client (e.g. the AcceptEnv configuration directive of OpenSSH). FROM BITPROPHET: backport cherry-pick to 1.x line | |||
2016-11-30 | Merge branch 'master' into 398-int | Jeff Forcier | |
2016-04-25 | Add support for ECDSA key sizes 384 and 521 alongside the existing 256. | Alex Orange | |
Previously only 256-bit was handled and in certain cases (private key reading) 384- and 521-bit keys were treated as 256-bit keys causing silent errors. Tests have been added to specifically test the 384 and 521 keysizes. As RFC 5656 defines 256, 384, and 521 as the required keysizes this seems a good set to test. Also, this will cover the branches at ecdsakey.py:55. Test keys were renamed and test_client.py was modified as a result. This also fixes two bugs in ecdsakey.py. First, when calculating bytes needed to store a key, the assumption was made that the key size (in bits) was divisible by 8 (see line 137). This has been fixed by rounding up (wasn't an issue as only 256-bit keys were used before). Another bug was that the key padding in asbytes was being done backwards (was padding on current_length - needed_length bytes). |