summaryrefslogtreecommitdiff
path: root/paramiko/ecdsakey.py
Commit message (Collapse)AuthorAgeFilesLines
* No more (object)ionsJeff Forcier2023-01-161-2/+2
|
* Fix spelling mistake of distributedBenjamin Drung2022-04-121-1/+1
| | | | | | Spelling mistake was found by lintian. Signed-off-by: Benjamin Drung <bdrung@ubuntu.com>
* Fix Free Software Foundation addressPaul Howarth2022-03-151-1/+1
| | | | They moved from Temple Place to Franklin Street in 2005.
* Add support for RSA SHA2 host and public keysJeff Forcier2021-12-231-1/+1
| | | | | | Includes a handful of refactors and new semiprivate attributes on Transport and AuthHandler for better test visibility.
* Catch TypeError and UnsupportedAlgorithm when using Cryptography to load ↵Jeff Forcier2021-11-281-2/+7
| | | | | | | private key material Prior to this change, these exceptions bubble up as-is instead of becoming SSHException instances like most other key-loading errors
* Blacken patch.Jeff Forcier2021-11-281-4/+4
|
* Check all data on keys when comparing for equalityJosh Snyder2021-11-281-8/+7
| | | | | This eliminates the possibility that a hash collision results in two PKey objects that == each other.
* fix loading ECDSA keys in new openssh private key formatPierce Lopez2019-12-051-3/+14
| | | | (also Blacken new ecdsa format key test)
* Modify exception raised by weird key subclasses w/ bad pkformatJeff Forcier2019-12-031-1/+1
| | | | Not sure this can even really happen though
* Privatize new pkformat variableJeff Forcier2019-12-031-2/+2
| | | | Would like to rewrite later probably
* Merge branch 'master' into 1343-intJeff Forcier2019-12-031-2/+2
|\
| * Fix line lengthAndrew Wason2019-02-091-1/+2
| |
| * Fix numbers vs key mixupsAndrew Wason2019-02-091-3/+2
| |
| * Move to cryptography 2.5 and stop using deprecated APIs.Andrew Wason2019-02-061-2/+2
| | | | | | Fixes #1369
* | blacken, testsJared Hobbs2018-11-271-1/+1
| |
* | blackenJared Hobbs2018-11-271-2/+2
| |
* | add support for new OpenSSH private key formatJared Hobbs2018-11-271-6/+16
|/ | | | This work is based off the work done in https://github.com/paramiko/paramiko/pull/618
* Blacken under black 18.5b0Jeff Forcier2018-05-291-1/+1
|
* Blacken Paramiko on 2.4Chris Rose2018-05-171-23/+38
|
* flake8 for previous changesetJeff Forcier2017-10-111-1/+3
|
* String format modernization, part 11070-remove-python26-and-33Jeff Forcier2017-10-101-2/+2
| | | | | | | Choosing to skip it in some edge/corner cases where it's more harmful than helpful. Also choosing to replace many non-%s specifiers with regular old {} since I don't see why one would normally care. Again, eschewing that in spots where it seems like it might matter.
* Use new(er)-style string formatting, {} instead of {0}Jeff Forcier2017-10-101-1/+1
|
* Merge branch 'master' into 979-intJeff Forcier2017-09-051-5/+23
|\
| * Python 2.6 fixesJeff Forcier2017-09-021-1/+1
| | | | | | | | Fixes #1049
| * Implement ECDSA certs.Jeff Forcier2017-08-281-5/+22
| | | | | | | | So mad at that frickin typo'd specification...
| * amendmentPaul Kapp2017-08-221-1/+1
| | | | | | | | | | Forgot about AgentKey, and put ECDSA line in wrong __init__. That’s what I get for only screening with test_pkey…
| * Generic certificate supportPaul Kapp2017-08-221-0/+1
| | | | | | | | | | | | Roll agnostic certificate support into PKey, and tweak publickey authentication to use it only if set. Requires explicit call to PKey.load_certificate() in order to alter the authentication behavior.
* | Merge branch 'master' into one-shot-methodsPaul Kehrer2017-06-251-5/+3
|\ \ | |/
| * Merge branch 'master' into 921-intJeff Forcier2017-06-061-3/+3
| |\
| | * Move to 'inv sites' style doc nitpicking.Jeff Forcier2017-06-051-1/+1
| | | | | | | | | | | | | | | | | | | | | Existing just-warnings setup was old and not as rigorous as my usual. Required a lot of stupid little changes, but now same tooling for all projects, toot toot.
| * | Improve __hash__ functionsFrancisco Couzo2017-03-221-4/+2
| | |
* | | use cryptography's sign/verify methods instead of signer/verifierPaul Kehrer2017-06-051-8/+4
| |/ |/|
* | Additional PEP8 fixes.Dorian Pula2017-05-311-2/+2
|/
* Update ecdsakey.pyMengHuan Yu2016-12-051-1/+1
|
* Patch fix via @alex on #731, tests pass locally againJeff Forcier2016-04-281-1/+1
|
* Merge branch 'master' into 731-intJeff Forcier2016-04-281-18/+10
|\
| * Use a more recent cryptography and call a functionAlex Gaynor2016-04-271-15/+10
| |
* | Formatting tweaks re #731Jeff Forcier2016-04-251-4/+5
| |
* | Add support for ECDSA key sizes 384 and 521 alongside the existing 256.Alex Orange2016-04-251-19/+98
|/ | | | | | | | | | | | | | | | | | Previously only 256-bit was handled and in certain cases (private key reading) 384- and 521-bit keys were treated as 256-bit keys causing silent errors. Tests have been added to specifically test the 384 and 521 keysizes. As RFC 5656 defines 256, 384, and 521 as the required keysizes this seems a good set to test. Also, this will cover the branches at ecdsakey.py:55. Test keys were renamed and test_client.py was modified as a result. This also fixes two bugs in ecdsakey.py. First, when calculating bytes needed to store a key, the assumption was made that the key size (in bits) was divisible by 8 (see line 137). This has been fixed by rounding up (wasn't an issue as only 256-bit keys were used before). Another bug was that the key padding in asbytes was being done backwards (was padding on current_length - needed_length bytes).
* remove unused thingAlex Gaynor2016-04-231-5/+1
|
* handle invalid keys in ecdsaAlex Gaynor2016-04-231-2/+10
|
* Merge branch 'master' into switch-to-cryptographyAlex Gaynor2015-11-041-3/+3
|\ | | | | | | | | | | | | Conflicts: .travis.yml paramiko/ecdsakey.py paramiko/transport.py
| * Fix ECDSA generate documentation.Jared Hance2015-10-021-5/+3
| | | | | | | | Was a blatant copy of a comment from RSAKey.
* | Fixes. Deleting codeAlex Gaynor2015-03-181-2/+2
| |
* | More progress towards cleanupAlex Gaynor2015-03-181-15/+12
| |
* | Rmoeved unused importsAlex Gaynor2015-03-151-3/+1
| |
* | This wants a string, not bytes, apparentlyAlex Gaynor2015-03-151-2/+2
| |
* | 0.8 doesn't support DER yet, just export PEM, that's what we wanted to do in ↵Alex Gaynor2015-03-151-6/+10
| | | | | | | | the first place
* | WhoopsAlex Gaynor2015-03-151-1/+1
| |
* | Update for cryptography 0.8 and general cleanupsAlex Gaynor2015-03-151-65/+5
| |