Commit Graph

1370 Commits

Author SHA1 Message Date
Jeff Forcier a1d291e047 Merge branch '1.13' 2014-04-16 15:51:04 -04:00
Jeff Forcier 9b2388cad5 Merge branch '1.12' into 1.13 2014-04-16 15:51:04 -04:00
Jeff Forcier 4947a726c1 Merge branch '1.11' into 1.12 2014-04-16 15:51:04 -04:00
Jeff Forcier 30f6f98afd Added self.args for exception classes. Used for unpickling
Related to fabric/fabric#986 and fabric/fabric#714

Conflicts:
	sites/www/changelog.rst
2014-04-16 15:51:01 -04:00
Jeff Forcier 1b796861aa Merge branch '1.13' 2014-04-16 15:24:09 -04:00
Jeff Forcier ba017e9e6c Merge branch '1.12' into 1.13
Conflicts:
	paramiko/sftp_client.py
	sites/www/changelog.rst
	tests/test_sftp.py
2014-04-16 15:24:04 -04:00
Jeff Forcier a0b2ae293f Merge branch '1.11' into 1.12 2014-04-16 15:09:30 -04:00
Jeff Forcier 6e9abc39cf Fix logging error in sftp_client for filenames containing the character.
Bug reported here:
http://vlists.pepperfish.net/pipermail/obnam-flarn.net/2013-May/000767.html

Antoine Brenner

Backported to 1.11 by @bitprophet

Conflicts:
	paramiko/sftp_client.py
	sites/www/changelog.rst
	tests/test_sftp.py
2014-04-16 15:07:56 -04:00
Jeff Forcier c14de1d935 Show Travis status in website sidebar 2014-04-15 15:04:46 -04:00
Jeff Forcier e05276b6ab Merge branch '1.13'
Conflicts:
	sites/www/changelog.rst
2014-04-14 18:54:32 -04:00
Jeff Forcier 6dee34648e Merge pull request #310 from offbyone/fix-sporadic-test-failures
Revert a regression in DSS key generation
2014-04-14 18:52:43 -04:00
Chris Rose 34d03ae3dc Revert a regression in DSS key generation
A change in f0017b8330 caused a random regression in DSS key signing
due to moving the padding on the integers generated by DSA from the left
to the right.

So, for example, if signing the test case string "jerri blank", the
random number might be generated as:

k=703745698612177278239572677252380378525350342103

If so, the signature parts will be:
r=184615963997659989901526712385095827509599268253
s=2682547683721156713440053885014828604195555319

Note the s being shorter.

Prior to f0017b8330, s would be right-padded with zeros:
s=268254768372115671344005388501482860419555531900

After, it would be left-padded:
s=002682547683721156713440053885014828604195555319

When converting back to a long, that loses the padding. This change
restores the behaviour.

Fixes #308
2014-04-14 18:50:10 -04:00
Jeff Forcier d02ae56601 Note changelog location in contribution docs 2014-04-14 18:28:03 -04:00
Jeff Forcier e96e2653a2 Changelog, closes #299 2014-04-14 11:29:41 -04:00
Alex Gaynor 91ab5f0c75 Merge branch 'master' into ecdsa-deterministic
Conflicts:
	paramiko/ecdsakey.py
2014-04-14 11:06:44 -04:00
Jeff Forcier 9e2e981224 Changelog, closes #297 2014-04-14 11:05:25 -04:00
Alex Gaynor b0876fa013 Merge branch 'master' into ecdsa-deterministic
Conflicts:
	paramiko/ecdsakey.py
2014-04-14 10:58:43 -04:00
Alex Gaynor 191fd465f1 Merge branch 'master' into use-urandom
Conflicts:
	paramiko/dsskey.py
	paramiko/ecdsakey.py
	paramiko/hostkeys.py
	paramiko/kex_gex.py
	paramiko/kex_group1.py
	paramiko/pkey.py
	paramiko/primes.py
	paramiko/rsakey.py
	tests/test_pkey.py
2014-04-14 10:56:05 -04:00
Jeff Forcier fa86d655dc Merge pull request #296 from alex/remove-unused
Remove unused function
2014-04-14 10:50:28 -04:00
Jeff Forcier 1e0e296b05 Derp 2014-04-14 10:50:12 -04:00
Jeff Forcier 59a696cef2 Merge branch '295-int' 2014-04-14 10:49:54 -04:00
Jeff Forcier 160e2c08e0 Changelog, closes #295 2014-04-14 10:48:59 -04:00
Jeff Forcier be7c679942 Errything uses intersphinx to Python 2014-04-14 10:48:33 -04:00
Jeff Forcier c8cc53940c Merge remote-tracking branch 'alex/hashlib-hashes' into 295-int 2014-04-14 10:31:10 -04:00
Jeff Forcier d31373f0ef Merge pull request #232 from alex/patch-1
Removed an unused import.
2014-04-14 10:27:43 -04:00
Jeff Forcier 57e647341f Nuke Fab-oriented link color override 2014-04-06 18:52:58 -07:00
Jeff Forcier 8b9e60f4ce Wow. Just wow. 2014-04-06 16:25:02 -07:00
Jeff Forcier 1103416d83 Put blog into a branch 2014-04-06 16:24:43 -07:00
Jeff Forcier b85a09673a Use newer alabaster w/ showhidden in sidebar TOC
Lets us not have 2x TOCs on landing page
2014-04-06 16:19:09 -07:00
Jeff Forcier b81025e3d2 Formatting 2014-04-06 12:36:50 -07:00
Jeff Forcier f22fe4b600 Merge branch '1.11' into 1.12 2014-04-01 13:28:56 -07:00
Jeff Forcier dd2e23a23e Merge branch '1.10' into 1.11 2014-04-01 13:28:56 -07:00
Jeff Forcier ab08ef6651 Merge branch '1.12' into 1.13 2014-04-01 13:28:56 -07:00
Jeff Forcier 4781f190cf Merge branch '1.13' 2014-04-01 13:28:56 -07:00
Jeff Forcier 658d202cc7 This setting no longer needed & causes warnings if left in 2014-04-01 13:28:54 -07:00
Jeff Forcier 80aff93d3f Fix broken tag-tree links in changelog 2014-04-01 12:36:21 -07:00
Jeff Forcier cb6c4bec5d Merge branch '1.11' into 1.12 2014-04-01 11:13:28 -07:00
Jeff Forcier e65b627021 Merge branch '1.10' into 1.11 2014-04-01 11:13:28 -07:00
Jeff Forcier 6c4bea5673 Merge branch '1.12' into 1.13 2014-04-01 11:13:28 -07:00
Jeff Forcier 36bd5b2ffb Merge branch '1.13' 2014-04-01 11:13:28 -07:00
Jeff Forcier e1d92087fa Minor site cleanup 2014-04-01 11:13:26 -07:00
Alex Gaynor fded67e712 Use deterministic signatures for ECDSA keys.
This is now considered the preffered approach across the board for ECDSA. This
is because with the traditional, random "k" parameter for ECDSA, any entropy
problems at all, even a single bit, about "k", results in a complete compromise
(see https://en.wikipedia.org/wiki/ECDSA#Security). The deterministic algorithm
doesn't have this downside.
2014-04-01 08:09:34 -07:00
Jeff Forcier 619b24738a Merge branch '1.11' into 1.12 2014-03-31 16:19:55 -07:00
Jeff Forcier 9044860b41 Merge branch '1.10' into 1.11 2014-03-31 16:19:55 -07:00
Jeff Forcier 196b3cc110 Merge branch '1.12' into 1.13 2014-03-31 16:19:55 -07:00
Jeff Forcier 4eb7720fae Merge branch '1.13' 2014-03-31 16:19:55 -07:00
Jeff Forcier c9aa83b63e Link back to WWW in docs sidebar 2014-03-31 16:19:40 -07:00
Alex Gaynor 6c6969c188 The ecdsa module already defaults to using urandom. 2014-03-31 16:09:45 -07:00
Alex Gaynor 6f211115f4 Switch from using PyCrypto's Random to using os.urandom.
There's several reasons for this change:

1) It's faster for reads up to 1024 bytes (nearly 10x faster for 16 byte reads)
2) It receives considerably more security review since it's in the kernel.
3) It's yet another step towards running on PyPy.
4) Using userspace CSPRNGs is considered something of an anti-pattern. See:
   http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/
   http://webcache.googleusercontent.com/search?q=cache:2nTvpCgKZXIJ:www.2uo.de/myths-about-urandom/+&cd=3&hl=en&ct=clnk&gl=us
2014-03-29 19:22:36 -07:00
Alex Gaynor 23528069ec Remove unused function 2014-03-29 17:17:20 -07:00