openhub.net
Black Duck Software, Inc.
Open Hub
Follow @
OH
Sign In
Join Now
Projects
People
Organizations
Tools
Blog
BDSA
Projects
People
Projects
Organizations
Forums
P
paramiko-ng
Settings
|
Report Duplicate
0
I Use This!
×
Login Required
Log in to Open Hub
Remember Me
Very Low Activity
Commits
: Listings
Analyzed
1 day
ago. based on code collected
1 day
ago.
Jul 29, 2024 — Jul 29, 2025
Showing page 111 of 113
Search / Filter on:
Commit Message
Contributor
Files Modified
Lines Added
Lines Removed
Code Location
Date
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-69] clean up SecurityOptions the preferences are now tuples in Transport, and passed as tuples out of SecurityOptions, so that the options can't be modified without setting them back to the options field again. the algorithm lists in Transport are used to validate the fields.
Robey Pointer
More...
almost 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-68] added Transport.get_security_options() just something i wanted to play with: added Transport.get_security_options() which returns a SecurityOptions object. this object is a kind of proxy for the 4 "preferred_*" fields in Transport, and lets me avoid exposing those fields directly in case i change my mind later about how they should be stored.
Robey Pointer
More...
almost 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-67] replay patch 63 (missing channel changes) i'm still getting the hang of tla/arch, obviously.
Robey Pointer
More...
almost 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-66] new ServerInterface class, outbound rekey works, etc. a bunch of changes that i'm too lazy to split out into individual patches: * all the server overrides from transport.py have been moved into a separate class ServerInterface, so server code doesn't have to subclass the whole paramiko library * updated demo_server to subclass ServerInterface * when re-keying during a session, block other messages until the new keys are activated (openssh doensn't like any other traffic during a rekey) * re-key when outbound limits are tripped too (was only counting inbound traffic) * don't log scary things on EOF
Robey Pointer
More...
almost 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-65] add settimeout/gettimeout/setblocking, some bugfixes. hide the command and response codes in sftp so they aren't exported. add settimeout/gettimeout/setblocking that just wrap calls to the underlying socket or channel. fix _read_all to not catch timeout exceptions.
Robey Pointer
More...
almost 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-64] reverse messed-up patch Patches applied:
Robey Pointer
More...
almost 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-63] add settimeout/gettimeout/setblocking, some bugfixes. hide the command and response codes in sftp so they aren't exported. add settimeout/gettimeout/setblocking that just wrap calls to the underlying socket or channel. fix _read_all to not catch timeout exceptions.
Robey Pointer
More...
almost 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-62] version -> horsea up version to horsea.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-61] no more Foobar fix "Foobar" to be "Paramiko" in the one place i missed it in all the gpl headers. sigh. :)
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-60] limit read/write requests to 32KB, advertise 32KB max packet size one of the unit tests was failing because the openssh sftp server was dropping the connection without any error. turns out they have a maximum allowed write size (possibly around 64KB). the sftp rfcs have a small hint that some servers may drop read/write requests of greater than 32KB.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-59] speed up parts of BufferedFile BufferedFile uses cStringIO for the write buffer now (i don't actually notice any speed difference so this might revert later) and the default buffer size has been upped from 1KB to 8KB.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-58] some Channel fixes for max packet size & blocking on zero window some clean-ups and fixes to channels: * when send() is blocked on a zero-width window, check that the channel is still open. this was causing some lockups. * set a lower bound to the "maximum packet size" we accept from the remote host. if they tell us anything less than 1KB, assume they meant 1KB. (it's not reasonable to fragment below that.) * leave a little padding instead of cutting right up to the maximum packet size: some space will be taken up by protocol overhead. * turn off some of the debug log lines unless "ultra_debug" is on (nobody cares about the feed info)
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-57] more unit tests add a unit test for sending a large (1MB) file with line buffering but no linefeeds (this triggered several bugs and inefficiencies), and another test to verify that the write buffer is flushed on seek.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-56] add forward.py demo script; bump to gyarados add a demo script to show how to do local port forwarding.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-55] add an sftp unit test for making 100 files create 100 files on the remote server, set their mode with chmod, then verify that they're all there and contain the right data. valeriy is reporting that sometimes he's getting stuck after 20 and though i'm not seeing it, i want to add a test to try to pin it down.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-54] add direct-tcpip ability to open_channel open_channel can now be given a dest_addr and src_addr, which are filled in if the channel type is "forwarded-tcpip" or "direct-tcpip". these channel types are used in remote & local port forwarding, respectively. i've only tested "direct-tcpip" but i think if one works, they both should work.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-53] add note about utf8 encodings add info to the README about what to do if python complains about missing encodings. veleriy pogrebitskiy ran into this and had advice.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-52] fix deadlock in closing a channel closing a channel would enter an odd codepath where the lock was grabbed, some stuff was done, then another function was called where the lock was grabbed again. unfortunately python locks aren't monitors so this would deadlock. instead, make the smaller function lock-free with an explicit notice that you must be holding the lock before calling.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-51] fix utf8, raise packet size, log exceptions, be more lax with sfp servers explicitly import utf8 encodings for "freezing" (and also because not all platforms come with utf8, apparently). raise the max acceptable packet size to 8kB, cuz 2kB was too low. log exceptions at error level instead of debug level. and don't reject older sftp servers.
Robey Pointer
More...
about 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-50] fearow date and last-minute fixes update release date of fearow to 23apr. fix channel._set_closed() to grab the lock before notifying the in/out buffers that the channel is closed. try roger's trick for finding the home folder on windows.
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-49] fix doc typos
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-48] set version number to fearow set version number to fearow.
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-47] add socket.timeout for py22 oops, forgot this vital part of the py22 patches. roger binns sent me a code patch that included this snip.
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-46] README update notes added notes on what's new, what to watch out for in py22. added a "since: fearow" to all the relevant API calls that are new.
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-45] add set_keepalive() add set_keepalive() to set an automatic keepalive mechanism. (while waiting for a packet on a connection, we periodically check if it's time to send a keepalive packet.)
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-44] add get_username() method for remembering who you auth'd as add get_username() method for remembering who you auth'd as. also, fix these bugs: * "continue" auth response counted as a failure (in server mode). * try to import 'logging' in py22 before falling back to the fake logger, in case they have a backported version of 'logger' * raise the right exception when told to read a private key from a file that isn't a private key file * tell channels to close when the transport dies
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-43] fix encrypted private key files the random byte padding on private key files' BER data was confusing openssh, so switch to null-byte padding, which is slightly less secure but works with crappy old openssh. also, enforce the mode when writing the private key file. we really really want it to be 0600. (python seems to ignore the mode normally.)
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-42] support py22, more or less add roger binns' patches for supporting python 2.2. i hedged a bit on the logging stuff and just added some trickery to let logging be stubbed out for python 2.2. this changed a lot of import statements but i managed to avoid hacking at any of the existing logging.
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-41] make get_remote_server_key() return a PKey object a good suggestion from roger binns: make get_remote_server_key() just return a pkey object instead of a tuple of strings. all the strings can be extracted from the pkey object, as well as other potentially useful things.
Robey Pointer
More...
over 21 years ago
[project @ Arch-1:
[email protected]
%secsh--dev--1.0--patch-40] add dss key generation too, and fix some bugs added the ability to generate dss keys and write private dss key files, similar to rsa. in the process, fixed a couple of bugs with ber encoding and writing password-encrypted key files. the key has to be padded to the iblock size of the cipher -- it's very difficult to determine how the others do this, so i just add random bytes to the end.
Robey Pointer
More...
over 21 years ago
←
1
2
…
105
106
107
108
109
110
111
112
113
→
This site uses cookies to give you the best possible experience. By using the site, you consent to our use of cookies. For more information, please see our
Privacy Policy
Agree