summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Start documenting PKCS11 more explicitly, plus related tweaks. Re #827final-827-intJeff Forcier2017-09-115-9/+43
|
* Not sure why these were not reported as flake8 E211 but they suckJeff Forcier2017-09-1142-75/+75
|
* Fixup #827-oriented refactoring to account for new certificate functionalityJeff Forcier2017-09-113-13/+18
|
* WhitespaceJeff Forcier2017-09-111-1/+0
|
* Refactor auth_handler.auth_*Jeff Forcier2017-09-111-32/+26
|
* Overhaul all appropriate lock use to use contextmanagersJeff Forcier2017-09-119-225/+58
| | | | | | Squeaky clean! Remotely possible a few threading bugs got fixed here too, but seems unlikely (reasonably sure extraneous lock releases doesn't hurt anything)
* Tidy up some bits re #827Jeff Forcier2017-09-111-20/+19
|
* Merge branch '827-int' into final-827-intJeff Forcier2017-09-1128-168/+773
|\
| * fixed compatibility with python3. fixed exceptions that were not raised ↵David Whiteside2017-09-105-12/+183
| | | | | | | | correctly. added unit tests
| * pep8 cleanupDavid Whiteside2017-09-104-24/+27
| |
| * Merge branch 'master' into smartcard_pkcs11David Whiteside2017-09-1024-82/+507
| |\
| | * GahJeff Forcier2017-09-051-1/+1
| | |
| | * Changelog re #979Jeff Forcier2017-09-051-0/+8
| | |
| | * Merge branch 'master' into 979-intJeff Forcier2017-09-0525-57/+504
| | |\
| | | * Changelog update for #1026 plus related changesJeff Forcier2017-09-051-0/+5
| | | |
| | | * Document Ed25519 keys =/Jeff Forcier2017-09-052-0/+15
| | | | | | | | | | | | | | | | I didn't badger people about docs so there were none
| | | * Merge branch 'master' into 1026-intJeff Forcier2017-09-0522-55/+453
| | | |\
| | | | * Really, really gotta get better about enforcing theseJeff Forcier2017-09-051-0/+2
| | | | |
| | | | * Changelog re #1013Jeff Forcier2017-09-051-0/+4
| | | | |
| | | | * Merge branch 'master' into 1013-intJeff Forcier2017-09-0523-55/+446
| | | | |\
| | | | | * Overhaul changelog re #1037, closes #60Jeff Forcier2017-09-051-3/+12
| | | | | |
| | | | | * Merge branch 'master' into 1037-intJeff Forcier2017-09-0520-54/+414
| | | | | |\
| | | | | | * Python 2.6 fixesJeff Forcier2017-09-022-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes #1049
| | | | | | * Python 3 fixes re #10421042-intJeff Forcier2017-08-282-3/+3
| | | | | | |
| | | | | | * flake8Jeff Forcier2017-08-281-8/+8
| | | | | | |
| | | | | | * This isn't required when one is just calling asbytes()Jeff Forcier2017-08-281-1/+0
| | | | | | |
| | | | | | * Implement ed25519 certs.Jeff Forcier2017-08-283-4/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | God damn it took me ages to notice that frickin self.public_blob = None bit :( :( :( :(
| | | | | | * Implement ECDSA certs.Jeff Forcier2017-08-284-10/+47
| | | | | | | | | | | | | | | | | | | | | | | | | | | | So mad at that frickin typo'd specification...
| | | | | | * Tweak exceptions to at least have better strings, if not new classes yetJeff Forcier2017-08-281-3/+4
| | | | | | |
| | | | | | * Implement DSS certsJeff Forcier2017-08-282-4/+6
| | | | | | |
| | | | | | * Update recent tests to try all main key families.Jeff Forcier2017-08-284-11/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Includes some dummy certificates. Not sure exactly how @radssh generated the RSA one but I'm using ssh-keygen + a randomly made CA key.
| | | | | | * Factor out type checking & cert loading into PKeyJeff Forcier2017-08-282-22/+37
| | | | | | |
| | | | | | * God damn it, really? Whatever.Jeff Forcier2017-08-281-2/+3
| | | | | | |
| | | | | | * Update first few stub tests + required test-server and PublicBlob impl bitsJeff Forcier2017-08-282-13/+44
| | | | | | |
| | | | | | * Update changelog re: recent changes re: #1042Jeff Forcier2017-08-281-5/+13
| | | | | | |
| | | | | | * Overhaul PublicBlob and use it better within RSAKey.Jeff Forcier2017-08-285-35/+102
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This allows server-side Paramiko code to correctly create cert-bearing RSAKey objects and thus verify client signatures, and now the test suite passes again, barring the stub tests. Re #1042
| | | | | | * Stub tests and partly-working implementation of 'load certs found alongside ↵Jeff Forcier2017-08-283-10/+36
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | key_filenames' behavior re #1042 This actually breaks existing tests due to test server not supporting certs...bah
| | | | | | * 2nd amendment doesn't grant the right to bare exceptsJeff Forcier2017-08-282-4/+8
| | | | | | |
| | | | | | * Docstring/TODO tweaksJeff Forcier2017-08-281-1/+2
| | | | | | |
| | | | | | * Refactor and clean up recently tweaked key loading bits in SSHClientJeff Forcier2017-08-281-20/+26
| | | | | | |
| | | | | | * Changelog and docs re #1042Jeff Forcier2017-08-282-2/+31
| | | | | | |
| | | | | | * flake8Jeff Forcier2017-08-281-1/+2
| | | | | | |
| | | | | | * Merge branch 'master' into 1042-intJeff Forcier2017-08-233-5/+8
| | | | | | |\
| | | | | | | * Changelog re #1041Jeff Forcier2017-08-231-0/+5
| | | | | | | |
| | | | | | | * Pull in count-errors from invocationsJeff Forcier2017-08-231-1/+2
| | | | | | | |
| | | | | | | * Common up break out of Transport.run() loopPaul Kapp2017-08-181-4/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Can’t seem to reason out any advantage of clearing self.active and calling self.packetizer.close() in these situations instead of simply breaking out of loop and allowing the additional conditional cleanups to be done. Currently looking into tackling some needed cleanup in auth_handler, and not having the auth_handler.abort() called on server disconnect feels like a bug - who knows?
| | | | | | * | string slice instead of rstrip, thanks ploxilnPaul Kapp2017-08-221-1/+1
| | | | | | | |
| | | | | | * | Add certificate filenames to look_for_keysPaul Kapp2017-08-221-5/+15
| | | | | | | |
| | | | | | * | amendmentPaul Kapp2017-08-222-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Forgot about AgentKey, and put ECDSA line in wrong __init__. That’s what I get for only screening with test_pkey…
| | | | | | * | Generic certificate supportPaul Kapp2017-08-2210-6/+115
| | | | | | |/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Roll agnostic certificate support into PKey, and tweak publickey authentication to use it only if set. Requires explicit call to PKey.load_certificate() in order to alter the authentication behavior.