summaryrefslogtreecommitdiffhomepage
path: root/tests/test_pkey.py
AgeCommit message (Collapse)Author
2019-06-21Merge branch '2.3' into 2.4Jeff Forcier
2019-06-21Merge branch '2.2' into 2.3Jeff Forcier
2019-06-21BlackenJeff Forcier
2019-06-21Merge branch '2.3' into 2.4Jeff Forcier
2019-06-21Merge branch '2.2' into 2.3Jeff Forcier
2019-06-21Add new keys and tests proving #1306Jeff Forcier
2019-06-08flake8 now applied to tests, huzzahJeff Forcier
2019-06-08Clean up shitty old test names of form test_[9-0A-Z]+_.*Jeff Forcier
2018-09-17Blacken, 2.3 editionJeff Forcier
2018-09-17s/test_path/_support/gJeff Forcier
2018-09-17Merge branch '2.2' into 2.3Jeff Forcier
2018-09-17Blacken, 2.2 editionJeff Forcier
2018-09-17Test-level fixes for pytest & friends, 2.2 editionJeff Forcier
2018-09-17Merge branch '2.1' into 2.2Jeff Forcier
Foregoes a handful of unblackened bits to make the merge easier; will blacken next anyways
2018-09-17Blacken 2.0 with black 18.6b4Jeff Forcier
2018-09-17Import cleanup, mostly focused on s/tests/./Jeff Forcier
2018-09-17Rename util func that trips pytest's default discovery.Jeff Forcier
Wouldn't matter as much under pytest-relaxed discovery, but, eh
2018-08-22Bump black up to 18.6b4Jeff Forcier
2018-05-29Blacken under black 18.5b0Jeff Forcier
2018-05-17Blacken Paramiko on 2.4Chris Rose
2018-03-12Uncaught typo in test suiteJeff Forcier
Was limited to the 2.4 branch, master either never got it or fixed it without a backport.
2017-11-29Merge branch '2.3' into 2.4Jeff Forcier
2017-11-29Merge branch '2.2' into 2.3Jeff Forcier
2017-11-29Test proving #1039 / efficacy of #1051Jeff Forcier
2017-10-23Import cleanup, mostly focused on s/tests/./Jeff Forcier
2017-10-23Rename util func that trips pytest's default discovery.Jeff Forcier
Wouldn't matter as much under pytest-relaxed discovery, but, eh
2017-09-22Comment re: cert testsJeff Forcier
2017-09-22Move cert tests & copies of related keys into separate folder.Jeff Forcier
This prevents non-cert-related tests from incidentally loading the certs, which was masking issues (re #1071)
2017-09-05Merge branch 'master' into 1026-intJeff Forcier
2017-08-28Python 3 fixes re #1042Jeff Forcier
2017-08-28Overhaul PublicBlob and use it better within RSAKey.Jeff Forcier
This allows server-side Paramiko code to correctly create cert-bearing RSAKey objects and thus verify client signatures, and now the test suite passes again, barring the stub tests. Re #1042
2017-08-22Generic certificate supportPaul Kapp
Roll agnostic certificate support into PKey, and tweak publickey authentication to use it only if set. Requires explicit call to PKey.load_certificate() in order to alter the authentication behavior.
2017-07-28Move assertions outside of the open context managerMichal Kuffa
2017-07-28Add file_obj handling to the Ed25519Key constructorMichal Kuffa
2017-06-13WhitespaceJeff Forcier
2017-06-13implement __hash__() method for Ed25519KeyPierce Lopez
makes Ed25519Key objs comparable, needed for host keys
2017-06-06Missed a merge conflict lololJeff Forcier
2017-06-06Merge branch '2.1'Jeff Forcier
2017-06-06Hand-picked backport of #912, fixes #741Jeff Forcier
2017-06-03py3kAlex Gaynor
2017-06-03Support decrypting keysAlex Gaynor
2017-02-20This is awful and I hate my lifeJeff Forcier
2017-02-20Test proving #853, fails on Python 3 but not 2Jeff Forcier
2016-04-25Formatting tweaks re #731Jeff Forcier
2016-04-25Add support for ECDSA key sizes 384 and 521 alongside the existing 256.Alex Orange
Previously only 256-bit was handled and in certain cases (private key reading) 384- and 521-bit keys were treated as 256-bit keys causing silent errors. Tests have been added to specifically test the 384 and 521 keysizes. As RFC 5656 defines 256, 384, and 521 as the required keysizes this seems a good set to test. Also, this will cover the branches at ecdsakey.py:55. Test keys were renamed and test_client.py was modified as a result. This also fixes two bugs in ecdsakey.py. First, when calculating bytes needed to store a key, the assumption was made that the key size (in bits) was divisible by 8 (see line 137). This has been fixed by rounding up (wasn't an issue as only 256-bit keys were used before). Another bug was that the key padding in asbytes was being done backwards (was padding on current_length - needed_length bytes).
2015-03-18Fixed tests.Alex Gaynor
The expected output keys for these tests needed to be rewritten because previously they were generated with a BER encoder, which is basically slopper. Now they're exported as DER, which means they're always as compact as possible. A comparison of the two strings with openssl asn1parse will show that they represent the same data, they the new value is just shorter
2014-09-08Fix a braino in new testJeff Forcier
2014-09-08Test proving #346Jeff Forcier
2014-04-14Merge branch 'master' into use-urandomAlex Gaynor
Conflicts: paramiko/dsskey.py paramiko/ecdsakey.py paramiko/hostkeys.py paramiko/kex_gex.py paramiko/kex_group1.py paramiko/pkey.py paramiko/primes.py paramiko/rsakey.py tests/test_pkey.py
2014-03-29Switch from using PyCrypto's Random to using os.urandom.Alex Gaynor
There's several reasons for this change: 1) It's faster for reads up to 1024 bytes (nearly 10x faster for 16 byte reads) 2) It receives considerably more security review since it's in the kernel. 3) It's yet another step towards running on PyPy. 4) Using userspace CSPRNGs is considered something of an anti-pattern. See: http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/ http://webcache.googleusercontent.com/search?q=cache:2nTvpCgKZXIJ:www.2uo.de/myths-about-urandom/+&cd=3&hl=en&ct=clnk&gl=us