Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-06-21 | Merge branch '2.3' into 2.4 | Jeff Forcier | |
2019-06-21 | Merge branch '2.2' into 2.3 | Jeff Forcier | |
2019-06-21 | Blacken | Jeff Forcier | |
2019-06-21 | Merge branch '2.3' into 2.4 | Jeff Forcier | |
2019-06-21 | Merge branch '2.2' into 2.3 | Jeff Forcier | |
2019-06-21 | Add new keys and tests proving #1306 | Jeff Forcier | |
2019-06-08 | flake8 now applied to tests, huzzah | Jeff Forcier | |
2019-06-08 | Clean up shitty old test names of form test_[9-0A-Z]+_.* | Jeff Forcier | |
2018-09-17 | Blacken, 2.3 edition | Jeff Forcier | |
2018-09-17 | s/test_path/_support/g | Jeff Forcier | |
2018-09-17 | Merge branch '2.2' into 2.3 | Jeff Forcier | |
2018-09-17 | Blacken, 2.2 edition | Jeff Forcier | |
2018-09-17 | Test-level fixes for pytest & friends, 2.2 edition | Jeff Forcier | |
2018-09-17 | Merge branch '2.1' into 2.2 | Jeff Forcier | |
Foregoes a handful of unblackened bits to make the merge easier; will blacken next anyways | |||
2018-09-17 | Blacken 2.0 with black 18.6b4 | Jeff Forcier | |
2018-09-17 | Import cleanup, mostly focused on s/tests/./ | Jeff Forcier | |
2018-09-17 | Rename util func that trips pytest's default discovery. | Jeff Forcier | |
Wouldn't matter as much under pytest-relaxed discovery, but, eh | |||
2018-08-22 | Bump black up to 18.6b4 | Jeff Forcier | |
2018-05-29 | Blacken under black 18.5b0 | Jeff Forcier | |
2018-05-17 | Blacken Paramiko on 2.4 | Chris Rose | |
2018-03-12 | Uncaught typo in test suite | Jeff Forcier | |
Was limited to the 2.4 branch, master either never got it or fixed it without a backport. | |||
2017-11-29 | Merge branch '2.3' into 2.4 | Jeff Forcier | |
2017-11-29 | Merge branch '2.2' into 2.3 | Jeff Forcier | |
2017-11-29 | Test proving #1039 / efficacy of #1051 | Jeff Forcier | |
2017-10-23 | Import cleanup, mostly focused on s/tests/./ | Jeff Forcier | |
2017-10-23 | Rename util func that trips pytest's default discovery. | Jeff Forcier | |
Wouldn't matter as much under pytest-relaxed discovery, but, eh | |||
2017-09-22 | Comment re: cert tests | Jeff Forcier | |
2017-09-22 | Move cert tests & copies of related keys into separate folder. | Jeff Forcier | |
This prevents non-cert-related tests from incidentally loading the certs, which was masking issues (re #1071) | |||
2017-09-05 | Merge branch 'master' into 1026-int | Jeff Forcier | |
2017-08-28 | Python 3 fixes re #1042 | Jeff Forcier | |
2017-08-28 | Overhaul PublicBlob and use it better within RSAKey. | Jeff Forcier | |
This allows server-side Paramiko code to correctly create cert-bearing RSAKey objects and thus verify client signatures, and now the test suite passes again, barring the stub tests. Re #1042 | |||
2017-08-22 | Generic certificate support | Paul Kapp | |
Roll agnostic certificate support into PKey, and tweak publickey authentication to use it only if set. Requires explicit call to PKey.load_certificate() in order to alter the authentication behavior. | |||
2017-07-28 | Move assertions outside of the open context manager | Michal Kuffa | |
2017-07-28 | Add file_obj handling to the Ed25519Key constructor | Michal Kuffa | |
2017-06-13 | Whitespace | Jeff Forcier | |
2017-06-13 | implement __hash__() method for Ed25519Key | Pierce Lopez | |
makes Ed25519Key objs comparable, needed for host keys | |||
2017-06-06 | Missed a merge conflict lolol | Jeff Forcier | |
2017-06-06 | Merge branch '2.1' | Jeff Forcier | |
2017-06-06 | Hand-picked backport of #912, fixes #741 | Jeff Forcier | |
2017-06-03 | py3k | Alex Gaynor | |
2017-06-03 | Support decrypting keys | Alex Gaynor | |
2017-02-20 | This is awful and I hate my life | Jeff Forcier | |
2017-02-20 | Test proving #853, fails on Python 3 but not 2 | Jeff Forcier | |
2016-04-25 | Formatting tweaks re #731 | Jeff Forcier | |
2016-04-25 | Add support for ECDSA key sizes 384 and 521 alongside the existing 256. | Alex Orange | |
Previously only 256-bit was handled and in certain cases (private key reading) 384- and 521-bit keys were treated as 256-bit keys causing silent errors. Tests have been added to specifically test the 384 and 521 keysizes. As RFC 5656 defines 256, 384, and 521 as the required keysizes this seems a good set to test. Also, this will cover the branches at ecdsakey.py:55. Test keys were renamed and test_client.py was modified as a result. This also fixes two bugs in ecdsakey.py. First, when calculating bytes needed to store a key, the assumption was made that the key size (in bits) was divisible by 8 (see line 137). This has been fixed by rounding up (wasn't an issue as only 256-bit keys were used before). Another bug was that the key padding in asbytes was being done backwards (was padding on current_length - needed_length bytes). | |||
2015-03-18 | Fixed tests. | Alex Gaynor | |
The expected output keys for these tests needed to be rewritten because previously they were generated with a BER encoder, which is basically slopper. Now they're exported as DER, which means they're always as compact as possible. A comparison of the two strings with openssl asn1parse will show that they represent the same data, they the new value is just shorter | |||
2014-09-08 | Fix a braino in new test | Jeff Forcier | |
2014-09-08 | Test proving #346 | Jeff Forcier | |
2014-04-14 | Merge branch 'master' into use-urandom | Alex Gaynor | |
Conflicts: paramiko/dsskey.py paramiko/ecdsakey.py paramiko/hostkeys.py paramiko/kex_gex.py paramiko/kex_group1.py paramiko/pkey.py paramiko/primes.py paramiko/rsakey.py tests/test_pkey.py | |||
2014-03-29 | Switch from using PyCrypto's Random to using os.urandom. | Alex Gaynor | |
There's several reasons for this change: 1) It's faster for reads up to 1024 bytes (nearly 10x faster for 16 byte reads) 2) It receives considerably more security review since it's in the kernel. 3) It's yet another step towards running on PyPy. 4) Using userspace CSPRNGs is considered something of an anti-pattern. See: http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/ http://webcache.googleusercontent.com/search?q=cache:2nTvpCgKZXIJ:www.2uo.de/myths-about-urandom/+&cd=3&hl=en&ct=clnk&gl=us |