summaryrefslogtreecommitdiffhomepage
path: root/tests/test_client.py
AgeCommit message (Collapse)Author
2017-11-09Not sure how this got past meJeff Forcier
2017-11-09Derp, some stuff runs this method w/o run_kwargsJeff Forcier
2017-11-09Implement new passphrase kwarg for SSHClient.connect()Jeff Forcier
2017-11-09LOL whoops this was a duplicateJeff Forcier
2017-11-09Write new test subsuite proving lack of connect(passphrase=)Jeff Forcier
2017-11-09Tidy up previous change by ensuring cleaner shutdown.Jeff Forcier
Without this, early-failing tests will exhibit extra log spew from the server Transport faceplanting.
2017-11-09Prevent test suite hangsJeff Forcier
2017-11-09Split out setup/teardown bits of client tests into its own class.Jeff Forcier
Paves way for multiple client-related groups of tests
2017-10-25Mark known slow tests as 'slow' pytest marker, and skip them by defaultJeff Forcier
2017-10-23Import cleanup, mostly focused on s/tests/./Jeff Forcier
2017-10-23Rename util func that trips pytest's default discovery.Jeff Forcier
Wouldn't matter as much under pytest-relaxed discovery, but, eh
2017-10-10Update docs, metadata, test references to 2.6/3.3Jeff Forcier
2017-10-10Skip the now-split-out failure test, since we actually do intend to exit ↵Jeff Forcier
silently for now
2017-10-10Split out env-set failure testJeff Forcier
2017-10-10Update still-failing client test to use contextmanager assertRaises styleJeff Forcier
2017-10-10This has been broken since it went in :( the test would never normally pass ↵Jeff Forcier
otherwise...
2017-10-10Use new(er)-style string formatting, {} instead of {0}Jeff Forcier
2017-09-22Move cert tests & copies of related keys into separate folder.Jeff Forcier
This prevents non-cert-related tests from incidentally loading the certs, which was masking issues (re #1071)
2017-09-12Merge branch '2.2'Jeff Forcier
2017-09-02Python 2.6 fixesJeff Forcier
Fixes #1049
2017-08-28Implement ECDSA certs.Jeff Forcier
So mad at that frickin typo'd specification...
2017-08-28Update recent tests to try all main key families.Jeff Forcier
Includes some dummy certificates. Not sure exactly how @radssh generated the RSA one but I'm using ssh-keygen + a randomly made CA key.
2017-08-28God damn it, really? Whatever.Jeff Forcier
2017-08-28Update first few stub tests + required test-server and PublicBlob impl bitsJeff Forcier
2017-08-28Stub tests and partly-working implementation of 'load certs found alongside ↵Jeff Forcier
key_filenames' behavior re #1042 This actually breaks existing tests due to test server not supporting certs...bah
2017-08-04Merge branch '2.1-gsskex-hostkeycheck-fix' into 2.2-gsskex-hostkeycheck-fixAnselm Kruis
2017-08-04Merge branch '2.0-gsskex-hostkeycheck-fix' into 2.1-gsskex-hostkeycheck-fixAnselm Kruis
2017-08-04SSHClient: fix the host key testAnselm Kruis
Skip the host key check only, if the transport actually used gssapi-keyex. Add tests for the missing-host-key RejectPolicy. Before this change, a man-in-the-middle attack on the paramiko ssh client with gss_kex=True was possible by having a server that does not support gssapi-keyex and gives any or no host key.
2017-06-09Merge branch '2.1'Jeff Forcier
2017-06-09Merge branch '2.1' into 910-intJeff Forcier
2017-06-09Merge branch '2.0' into 2.1Jeff Forcier
2017-06-09Flake8/etc tweaks re #971 in 2.xJeff Forcier
2017-06-09Import from py3compat directly in test_clientMartin Packman
2017-06-09Merge branch '2.1'Jeff Forcier
2017-06-09Merge branch '2.0' into 2.1Jeff Forcier
2017-06-07tests for host key negotiation when there are multiplePierce Lopez
2017-06-07cleanup/simplify auth_timeout testsPierce Lopez
2017-06-06Merge branch 'master' into 869-intJeff Forcier
2017-06-06Failing test proving need for #857Jeff Forcier
2017-06-03Fixed encoding/decoding of the public key on the wireAlex Gaynor
Public point was accidentally encoded as 32 bytes, with no length prefix.
2017-06-03integration test, with ourselvesAlex Gaynor
2017-06-02re-enable client cleanup test for python3Pierce Lopez
2017-01-24Merge branch '2.0' into 2.1Jeff Forcier
2017-01-24untie agian!james mike dupont
2016-12-23Added a test to check that the auth_timeout argument is passed through and ↵Tim Savage
applied.
2016-12-12Remove code re #398 from 2.0 branch, as it's feature workJeff Forcier
2016-12-05Merge branch '1.18' into 2.0Jeff Forcier
2016-12-05Support transmission of environment variablesPhilip Lorenz
The SSH protocol allows the client to transmit environment variables to the server. This is particularly useful if the user wants to modify the environment of an executed command without having to reexecute the actual command from a shell. This patch extends the Client and Channel interface to allow the transmission of environment variables to the server side. In order to use this feature the SSH server must accept environment variables from the client (e.g. the AcceptEnv configuration directive of OpenSSH). FROM BITPROPHET: backport cherry-pick to 1.x line
2016-11-30Merge branch 'master' into 398-intJeff Forcier
2016-04-25Add support for ECDSA key sizes 384 and 521 alongside the existing 256.Alex Orange
Previously only 256-bit was handled and in certain cases (private key reading) 384- and 521-bit keys were treated as 256-bit keys causing silent errors. Tests have been added to specifically test the 384 and 521 keysizes. As RFC 5656 defines 256, 384, and 521 as the required keysizes this seems a good set to test. Also, this will cover the branches at ecdsakey.py:55. Test keys were renamed and test_client.py was modified as a result. This also fixes two bugs in ecdsakey.py. First, when calculating bytes needed to store a key, the assumption was made that the key size (in bits) was divisible by 8 (see line 137). This has been fixed by rounding up (wasn't an issue as only 256-bit keys were used before). Another bug was that the key padding in asbytes was being done backwards (was padding on current_length - needed_length bytes).