summaryrefslogtreecommitdiff
path: root/paramiko/packet.py
diff options
context:
space:
mode:
authorJeff Forcier <jeff@bitprophet.org>2018-05-29 15:18:24 -0700
committerJeff Forcier <jeff@bitprophet.org>2018-05-29 15:18:34 -0700
commitc091e756084ce017d8d872ffeaf95422f79140f1 (patch)
tree4c8c82399a6a21217f78ff36a90c3a355f6a0c23 /paramiko/packet.py
parent0bf3fa458deffe1306f226a7257ceda927ca9e8e (diff)
downloadparamiko-c091e756084ce017d8d872ffeaf95422f79140f1.tar.gz
Blacken under black 18.5b0
Diffstat (limited to 'paramiko/packet.py')
-rw-r--r--paramiko/packet.py45
1 files changed, 19 insertions, 26 deletions
diff --git a/paramiko/packet.py b/paramiko/packet.py
index 20b37ac4..d324fc35 100644
--- a/paramiko/packet.py
+++ b/paramiko/packet.py
@@ -365,7 +365,7 @@ class Packetizer(object):
while linefeed_byte not in buf:
buf += self._read_timeout(timeout)
n = buf.index(linefeed_byte)
- self.__remainder = buf[n + 1:]
+ self.__remainder = buf[n + 1 :]
buf = buf[:n]
if (len(buf) > 0) and (buf[-1] == cr_byte_value):
buf = buf[:-1]
@@ -400,14 +400,12 @@ class Packetizer(object):
out = packet
# + mac
if self.__block_engine_out is not None:
- payload = struct.pack(
- ">I", self.__sequence_number_out
- ) + packet
+ payload = (
+ struct.pack(">I", self.__sequence_number_out) + packet
+ )
out += compute_hmac(
self.__mac_key_out, payload, self.__mac_engine_out
- )[
- :self.__mac_size_out
- ]
+ )[: self.__mac_size_out]
self.__sequence_number_out = (
self.__sequence_number_out + 1
) & xffffffff
@@ -451,8 +449,8 @@ class Packetizer(object):
if (packet_size - len(leftover)) % self.__block_size_in != 0:
raise SSHException("Invalid packet blocking")
buf = self.read_all(packet_size + self.__mac_size_in - len(leftover))
- packet = buf[:packet_size - len(leftover)]
- post_packet = buf[packet_size - len(leftover):]
+ packet = buf[: packet_size - len(leftover)]
+ post_packet = buf[packet_size - len(leftover) :]
if self.__block_engine_in is not None:
packet = self.__block_engine_in.update(packet)
if self.__dump_packets:
@@ -460,19 +458,18 @@ class Packetizer(object):
packet = leftover + packet
if self.__mac_size_in > 0:
- mac = post_packet[:self.__mac_size_in]
- mac_payload = struct.pack(
- ">II", self.__sequence_number_in, packet_size
- ) + packet
+ mac = post_packet[: self.__mac_size_in]
+ mac_payload = (
+ struct.pack(">II", self.__sequence_number_in, packet_size)
+ + packet
+ )
my_mac = compute_hmac(
self.__mac_key_in, mac_payload, self.__mac_engine_in
- )[
- :self.__mac_size_in
- ]
+ )[: self.__mac_size_in]
if not util.constant_time_bytes_eq(my_mac, mac):
raise SSHException("Mismatched MAC")
padding = byte_ord(packet[0])
- payload = packet[1:packet_size - padding]
+ payload = packet[1 : packet_size - padding]
if self.__dump_packets:
self._log(
@@ -499,14 +496,10 @@ class Packetizer(object):
self.__received_bytes_overflow += raw_packet_size
self.__received_packets_overflow += 1
if (
- (
- self.__received_packets_overflow
- >= self.REKEY_PACKETS_OVERFLOW_MAX
- )
- or (
- self.__received_bytes_overflow
- >= self.REKEY_BYTES_OVERFLOW_MAX
- )
+ self.__received_packets_overflow
+ >= self.REKEY_PACKETS_OVERFLOW_MAX
+ ) or (
+ self.__received_bytes_overflow >= self.REKEY_BYTES_OVERFLOW_MAX
):
raise SSHException(
"Remote transport is ignoring rekey requests"
@@ -592,7 +585,7 @@ class Packetizer(object):
# cute trick i caught openssh doing: if we're not encrypting or
# SDCTR mode (RFC4344),
# don't waste random bytes for the padding
- packet += (zero_byte * padding)
+ packet += zero_byte * padding
else:
packet += os.urandom(padding)
return packet