summaryrefslogtreecommitdiff
path: root/pysnmp/proto/secmod/rfc3414/service.py
Commit message (Collapse)AuthorAgeFilesLines
* Uppercase global constants (#238)Ilya Etingof2019-02-101-97/+102
| | | | | | | | | This is a massive patch essentially upper-casing global/class attributes that mean to be constants. Some previously exposed constants have been preserved for compatibility reasons (notably, in `hlapi`), though the rest might break user code relying on pysnmp 4.
* Drop Python < 2.6 except statement compatibility trickIlya Etingof2019-02-091-16/+16
|
* Drop Python < 2.6 kwargs expansion compatibility trickIlya Etingof2019-02-091-2/+2
|
* Extend copyright notice to year 2019Ilya Etingof2018-12-301-1/+1
|
* Redesigned SMI objects management model (#214)Ilya Etingof2018-12-291-3/+8
| | | | | | | | | | | | | | The primary motivation behind this redesign is to allow asynchronous operations between SNMP responder and the data source feeding its MIB. This is achieved by redesigning all `read*`, `write*`, `create*` and `destroy*` methods of the `SNMPv2-SMI` MIB objects to return immediately and deliver their results via a call back. This modification brings significant and backward incompatible changes to the low-level MIB operations. The pysnmp MIB modules compiled for older pysnmp remain compatible.
* Overhaul SMI/MIB instrumentation API (#161)Ilya Etingof2018-06-301-4/+5
| | | | | | | | | | | Overhaul SMI/MIB instrumentation API SMI/MIB managed objects API overhauled for simplicity and flexibility breaking backward compatibility. This change would allow way more control over custom MIB managed objects and also is the prerequisite for asynchronous MIB instrumentation.
* fixed zero boots/time values put into SNMPv3 TRAPIlya Etingof2018-04-211-24/+29
|
* copyright notice extendedv4.4.4Ilya Etingof2018-01-031-1/+1
|
* migrated references from SourceForge (#110)Ilya Etingof2017-11-171-1/+1
|
* refactor digest size getter into property, handle the case of unavailable cryptoIlya Etingof2017-08-031-1/+1
|
* add support for USM SHA-2 algorithms (RFC 7860) (#71)verrio2017-08-031-2/+8
|
* fixed a crash happening on incomplete inbound SNMP messageIlya Etingof2017-07-131-12/+4
|
* Added instrumentation hooks to catch SNMP auth/crypto failures (#59)Ilya Etingof2017-05-271-8/+25
| | | | | | * security module failure instrumentation hook added also fixed mistyped 'unsupportedSecLevel' object
* minor pep8 improvementsIlya Etingof2017-05-271-17/+17
|
* required pyasn1 version is now 0.2.3Ilya Etingof2017-02-141-9/+9
| | | | added matchTags, matchConstraints flags to .setComponentBy() call
* email changed, copyright extended to the year 2017Ilya Etingof2017-01-121-1/+1
|
* Reeder key localization refactoredIlya Etingof2016-08-211-4/+4
|
* Reeder key localization for AES192/256 encryption implementedIlya Etingof2016-08-211-0/+2
|
* work even if transport dispatcher is not availableIlya Etingof2016-04-171-2/+5
|
* pep8 reformattedIlya Etingof2016-04-031-98/+180
|
* copyright updatedelie2015-12-291-1/+1
|
* two more execution observer points added: rfc2576.processIncomingMsgelie2015-12-191-26/+42
| | | | | and rfc3414.processIncomingMsg to give an insignt on security modules internals
* fix to USM: extra user entry clone removed on incoming messageelie2015-12-191-62/+48
| | | | | processing. It made USM accepting SNMPv3 TRAPs from unknown SNMP engine IDs
* typoselie2015-12-191-2/+2
|
* all SNMP counters now incremented via '+= 1' rather than 'x = x + 1'elie2015-12-121-8/+8
|
* copyright notice added to source codeelie2015-11-201-1/+6
|
* linted for bad-whitespace and some other issueselie2015-10-171-5/+5
|
* linted the bad-continuation issue as well as some otherselie2015-10-171-350/+224
|
* linted for trailing whitespaceselie2015-10-171-34/+34
|
* fix to authoritative engine side snmpEngineID discovery procedure:elie2014-04-231-7/+10
| | | | | respond with notInTimeWindows rather then with unsupportedSecurityLevel at time synchronization phase
* missing check for null scopedPDU addedelie2014-03-211-0/+5
|
* fixes to verify pyasn1 decoder.decode() return to withstandelie2014-03-211-2/+7
| | | | broken SNMP messages or its components
* gracefully handle malformed SnmpEngineID coming from SNMPv3 headerelie2013-09-141-0/+14
|
* cache and uncache usmUserSecurityName for debugging purposeselie2013-06-261-0/+5
|
* Fix to SnmpUSMSecurityModel._sec2usr() - raise NoSuchInstance errorelie2013-06-101-3/+6
| | | | | | to emulate MIB lookup failure. Previous version of the code always succeeded returning securityName on failure. That screwed new row creation logic.
* unused variables, imports; wrong indentation; undefined prototype attribueselie2013-06-041-18/+18
| | | | all the things that bothers linter
* the userName parameter is now fully separated from securityName atelie2013-05-251-45/+99
| | | | usmUserTable.
* SNMP credentials management reworked to allow multiple securityNames's inelie2013-05-181-7/+16
| | | | | snmpCommunityEntry and usmUserEntry tables. Changes made to addV1System(), addV3User() functions as well as to their oneliner's wrappers.
* delV3User() function improved to drop all rows from USM table thatelie2013-04-171-17/+26
| | | | were cloned from the target one
* catch possible exceptions on pyasn1 encoder invocationelie2012-12-041-10/+35
| | | | | report SerializationError indication in those cases addded DeserializationError indication alias to Parse Error for clarity
* maxSizeResponseScopedPDU must not be a [constrained] instance of maxMessageSizeelie2012-08-281-1/+1
|
* hexdump() addedelie2012-07-231-1/+1
|
* cast transportDispatcher's timing values into ints to match incrementingelie2012-07-221-3/+3
| | | | integer counter
* local timeouts made dependant on system timer resolutionelie2012-07-211-2/+2
|
* perform securityLevel verification for authoritative SNMP engine onlyelie2012-06-261-31/+33
|
* hex dumps of binary parts of the protocol added to ease systemelie2012-06-251-2/+8
| | | | operations analysis.
* SECURITY FIX: USM subsystem did not verify securityLevel of inboundelie2012-06-251-17/+31
| | | | | | message against auth/priv protocols configured for the user in question. That allowed unauthenticated/unciphered access to pysnmp-based Agent even if USM user is configured to provide one.
* added pyasn1 decoder failures diagnistics in debug modeelie2012-04-201-5/+6
|
* fix to non-MT-safe class attributes at SNMPv3 MP & SEC moduleselie2012-04-171-3/+3
|
* exlicit repr() calls replaced with '%r'elie2011-11-081-11/+11
|