Jeff Forcier
a1d291e047
Merge branch '1.13'
2014-04-16 15:51:04 -04:00
Jeff Forcier
9b2388cad5
Merge branch '1.12' into 1.13
2014-04-16 15:51:04 -04:00
Jeff Forcier
4947a726c1
Merge branch '1.11' into 1.12
2014-04-16 15:51:04 -04:00
Jeff Forcier
30f6f98afd
Added self.args for exception classes. Used for unpickling
...
Related to fabric/fabric#986 and fabric/fabric#714
Conflicts:
sites/www/changelog.rst
2014-04-16 15:51:01 -04:00
Jeff Forcier
1b796861aa
Merge branch '1.13'
2014-04-16 15:24:09 -04:00
Jeff Forcier
ba017e9e6c
Merge branch '1.12' into 1.13
...
Conflicts:
paramiko/sftp_client.py
sites/www/changelog.rst
tests/test_sftp.py
2014-04-16 15:24:04 -04:00
Jeff Forcier
a0b2ae293f
Merge branch '1.11' into 1.12
2014-04-16 15:09:30 -04:00
Jeff Forcier
6e9abc39cf
Fix logging error in sftp_client for filenames containing the character.
...
Bug reported here:
http://vlists.pepperfish.net/pipermail/obnam-flarn.net/2013-May/000767.html
Antoine Brenner
Backported to 1.11 by @bitprophet
Conflicts:
paramiko/sftp_client.py
sites/www/changelog.rst
tests/test_sftp.py
2014-04-16 15:07:56 -04:00
Jeff Forcier
c14de1d935
Show Travis status in website sidebar
2014-04-15 15:04:46 -04:00
Jeff Forcier
e05276b6ab
Merge branch '1.13'
...
Conflicts:
sites/www/changelog.rst
2014-04-14 18:54:32 -04:00
Jeff Forcier
6dee34648e
Merge pull request #310 from offbyone/fix-sporadic-test-failures
...
Revert a regression in DSS key generation
2014-04-14 18:52:43 -04:00
Chris Rose
34d03ae3dc
Revert a regression in DSS key generation
...
A change in f0017b8330
caused a random regression in DSS key signing
due to moving the padding on the integers generated by DSA from the left
to the right.
So, for example, if signing the test case string "jerri blank", the
random number might be generated as:
k=703745698612177278239572677252380378525350342103
If so, the signature parts will be:
r=184615963997659989901526712385095827509599268253
s=2682547683721156713440053885014828604195555319
Note the s being shorter.
Prior to f0017b8330
, s would be right-padded with zeros:
s=268254768372115671344005388501482860419555531900
After, it would be left-padded:
s=002682547683721156713440053885014828604195555319
When converting back to a long, that loses the padding. This change
restores the behaviour.
Fixes #308
2014-04-14 18:50:10 -04:00
Jeff Forcier
d02ae56601
Note changelog location in contribution docs
2014-04-14 18:28:03 -04:00
Jeff Forcier
e96e2653a2
Changelog, closes #299
2014-04-14 11:29:41 -04:00
Alex Gaynor
91ab5f0c75
Merge branch 'master' into ecdsa-deterministic
...
Conflicts:
paramiko/ecdsakey.py
2014-04-14 11:06:44 -04:00
Jeff Forcier
9e2e981224
Changelog, closes #297
2014-04-14 11:05:25 -04:00
Alex Gaynor
b0876fa013
Merge branch 'master' into ecdsa-deterministic
...
Conflicts:
paramiko/ecdsakey.py
2014-04-14 10:58:43 -04:00
Alex Gaynor
191fd465f1
Merge branch 'master' into use-urandom
...
Conflicts:
paramiko/dsskey.py
paramiko/ecdsakey.py
paramiko/hostkeys.py
paramiko/kex_gex.py
paramiko/kex_group1.py
paramiko/pkey.py
paramiko/primes.py
paramiko/rsakey.py
tests/test_pkey.py
2014-04-14 10:56:05 -04:00
Jeff Forcier
fa86d655dc
Merge pull request #296 from alex/remove-unused
...
Remove unused function
2014-04-14 10:50:28 -04:00
Jeff Forcier
1e0e296b05
Derp
2014-04-14 10:50:12 -04:00
Jeff Forcier
59a696cef2
Merge branch '295-int'
2014-04-14 10:49:54 -04:00
Jeff Forcier
160e2c08e0
Changelog, closes #295
2014-04-14 10:48:59 -04:00
Jeff Forcier
be7c679942
Errything uses intersphinx to Python
2014-04-14 10:48:33 -04:00
Jeff Forcier
c8cc53940c
Merge remote-tracking branch 'alex/hashlib-hashes' into 295-int
2014-04-14 10:31:10 -04:00
Jeff Forcier
d31373f0ef
Merge pull request #232 from alex/patch-1
...
Removed an unused import.
2014-04-14 10:27:43 -04:00
Jeff Forcier
57e647341f
Nuke Fab-oriented link color override
2014-04-06 18:52:58 -07:00
Jeff Forcier
8b9e60f4ce
Wow. Just wow.
2014-04-06 16:25:02 -07:00
Jeff Forcier
1103416d83
Put blog into a branch
2014-04-06 16:24:43 -07:00
Jeff Forcier
b85a09673a
Use newer alabaster w/ showhidden in sidebar TOC
...
Lets us not have 2x TOCs on landing page
2014-04-06 16:19:09 -07:00
Jeff Forcier
b81025e3d2
Formatting
2014-04-06 12:36:50 -07:00
Jeff Forcier
f22fe4b600
Merge branch '1.11' into 1.12
2014-04-01 13:28:56 -07:00
Jeff Forcier
dd2e23a23e
Merge branch '1.10' into 1.11
2014-04-01 13:28:56 -07:00
Jeff Forcier
ab08ef6651
Merge branch '1.12' into 1.13
2014-04-01 13:28:56 -07:00
Jeff Forcier
4781f190cf
Merge branch '1.13'
2014-04-01 13:28:56 -07:00
Jeff Forcier
658d202cc7
This setting no longer needed & causes warnings if left in
2014-04-01 13:28:54 -07:00
Jeff Forcier
80aff93d3f
Fix broken tag-tree links in changelog
2014-04-01 12:36:21 -07:00
Jeff Forcier
cb6c4bec5d
Merge branch '1.11' into 1.12
2014-04-01 11:13:28 -07:00
Jeff Forcier
e65b627021
Merge branch '1.10' into 1.11
2014-04-01 11:13:28 -07:00
Jeff Forcier
6c4bea5673
Merge branch '1.12' into 1.13
2014-04-01 11:13:28 -07:00
Jeff Forcier
36bd5b2ffb
Merge branch '1.13'
2014-04-01 11:13:28 -07:00
Jeff Forcier
e1d92087fa
Minor site cleanup
2014-04-01 11:13:26 -07:00
Alex Gaynor
fded67e712
Use deterministic signatures for ECDSA keys.
...
This is now considered the preffered approach across the board for ECDSA. This
is because with the traditional, random "k" parameter for ECDSA, any entropy
problems at all, even a single bit, about "k", results in a complete compromise
(see https://en.wikipedia.org/wiki/ECDSA#Security ). The deterministic algorithm
doesn't have this downside.
2014-04-01 08:09:34 -07:00
Jeff Forcier
619b24738a
Merge branch '1.11' into 1.12
2014-03-31 16:19:55 -07:00
Jeff Forcier
9044860b41
Merge branch '1.10' into 1.11
2014-03-31 16:19:55 -07:00
Jeff Forcier
196b3cc110
Merge branch '1.12' into 1.13
2014-03-31 16:19:55 -07:00
Jeff Forcier
4eb7720fae
Merge branch '1.13'
2014-03-31 16:19:55 -07:00
Jeff Forcier
c9aa83b63e
Link back to WWW in docs sidebar
2014-03-31 16:19:40 -07:00
Alex Gaynor
6c6969c188
The ecdsa module already defaults to using urandom.
2014-03-31 16:09:45 -07:00
Alex Gaynor
6f211115f4
Switch from using PyCrypto's Random to using os.urandom.
...
There's several reasons for this change:
1) It's faster for reads up to 1024 bytes (nearly 10x faster for 16 byte reads)
2) It receives considerably more security review since it's in the kernel.
3) It's yet another step towards running on PyPy.
4) Using userspace CSPRNGs is considered something of an anti-pattern. See:
http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/
http://webcache.googleusercontent.com/search?q=cache:2nTvpCgKZXIJ:www.2uo.de/myths-about-urandom/+&cd=3&hl=en&ct=clnk&gl=us
2014-03-29 19:22:36 -07:00
Alex Gaynor
23528069ec
Remove unused function
2014-03-29 17:17:20 -07:00