python311-paramiko-3.4.0-150400.13.10.4<>,4faqږ:CGtlWC@ZBl7{aid׊ .Tͧ938v%PTdίK$$C_$#~K `ggSm -oi>A?d * @TXdh X     - .t0366909D 9h :, (:a8:h+9;+:>0+FAGXHIXY\]^ bUcdЈeЍfАlВuФvwtxy$zL\`ړڜڨڮCpython311-paramiko3.4.0150400.13.10.4SSH2 protocol libraryThis is a library for making SSH2 connections (client or server). Emphasis is on using SSH2 as an alternative to SSL for making secure connections between python scripts. All major ciphers and hash methods are supported. SFTP client and server mode are both supported too.fLGPL-2.1-or-laterhttps://www.suse.com/Unspecifiedhttps://www.paramiko.org/linuxnoarchT ^iiCC??``NJNJ6U6U%%SSf\f\/)/)@@$$SSJJ ##8787SSNN}}44dkdk__rr  ((((kk!e!egg66*G*GtUtUKK:g:g   P+>,9'Lj 8-!Jw3T(Pl)_$V>(zvG BU<L$1Fp 5%N~Q 8gDAA큤A큤A큤A큤f= 9.6 (or equivalent, such as Paramiko in server mode, as of this patch version) and configured to use the new "strict kex" mode. + Paramiko will now raise an SSHException subclass (MessageOrderError) when protocol messages are received in unexpected order. This includes situations like receiving MSG_DEBUG or MSG_IGNORE during initial key exchange, which are no longer allowed during strict mode. + Key (re)negotiation -- i.e. MSG_NEWKEYS, whenever it is encountered -- now resets packet sequence numbers. (This should be invisible to users during normal operation, only causing exceptions if the exploit is encountered, which will usually result in, again, MessageOrderError.) + Sequence number rollover will now raise SSHException if it occurs during initial key exchange (regardless of strict mode status). * Tweak ext-info-(c|s) detection during KEXINIT protocol phase; the original implementation made assumptions based on an OpenSSH implementation detail. - Add patch use-64-bit-maxsize-everywhere.patch: * Use the 64-bit value of sys.maxsize.- refresh remove-icecream-dep.patch - update to 3.3.1 detailed changelog: https://www.paramiko.org/changelog.html#- Delete paramiko-pr1665-remove-pytest-relaxed.patch - Add remove-icecream-dep.patch - Update to 3.1.0: * [Feature] #2173: Accept single tabs as field separators (in addition to single spaces) in for parity with OpenSSH’s KnownHosts parser. Patched by Alex Chavkin. * [Feature] #2013: (solving #2009, plus others) Add an explicit channel_timeout keyword argument to paramiko.client.SSHClient.connect, allowing users to configure the previously-hardcoded default value of 3600 seconds. Thanks to @VakarisZ and @ilija-lazoroski for the report and patch, with credit to Mike Salvatore for patch review. * [Support] #2178: Apply codespell to the codebase, which found a lot of very old minor spelling mistakes in docstrings. Also modernize many instances of *largs vs *args and **kwarg vs * *kwargs. Patch courtesy of Yaroslav Halchenko, with review from Brian Skinn. - 3.0.0: * [Bug]: A handful of lower-level classes (notably paramiko.message.Message and paramiko.pkey.PKey) previously returned bytes objects from their implementation of __str__, even under Python 3; and there was never any __bytes__ method. * These issues have been fixed by renaming __str__ to __bytes__ and relying on Python’s default “stringification returns the output of __repr__” behavior re: any real attempts to str() such objects. * [Bug] #2165: Streamline some redundant (and costly) byte conversion calls in the packetizer and the core SFTP module. This should lead to some SFTP speedups at the very least. Thanks to Alex Gaynor for the patch. * [Bug] #2110: Remove some unnecessary __repr__ calls when handling bytes-vs-str conversions. This was apparently doing a lot of unintentional data processing, which adds up in some use cases – such as SFTP transfers, which may now be significantly faster. Kudos to Shuhua Zhong for catch & patch. * [Support]: Drop support for Python versions less than 3.6, including Python 2. So long and thanks for all the fish! * [Support]: Remove the now irrelevant paramiko.py3compat module. * [Support]: paramiko.common.asbytes has been moved to paramiko.util.asbytes. * [Support]: PKey.__cmp__ has been removed. Ordering-oriented comparison of key files is unlikely to have ever made sense (the old implementation attempted to order by the hashes of the key material) and so we have not bothered setting up __lt__ and friends at this time. The class continues to have its original __eq__ untouched. * [Support]: The behavior of private key classes’ (ie anything inheriting from PKey) private key writing methods used to perform a manual, extra chmod call after writing. This hasn’t been strictly necessary since the mid 2.x release line (when key writing started giving the mode argument to os.open), and has now been removed entirely. * This should only be observable if you were mocking Paramiko’s system calls during your own testing, or similar. * [Support] #732: (also re: #630) SSHConfig used to straight-up delete the proxycommand key from config lookup results when the source config said ProxyCommand none. This has been altered to preserve the key and give it the Python value None, thus making the Python representation more in line with the source config file. * [Support]: paramiko.util.retry_on_signal (and any internal uses of same, and also any internal retries of EINTR on eg socket operations) has been removed. As of Python 3.5, per PEP 475, this functionality (and retrying EINTR generally) is now part of the standard library.- Move documentation into main package for SLE15- add sle15_python_module_pythons (jsc#PED-68)- Update to 2.12.0 * [Feature] #2125: (also re: #2054) Add a transport_factory kwarg to SSHClient.connect for advanced users to gain more control over early Transport setup and manipulation. Thanks to Noah Pederson for the patch. - Release 2.11.1 * [Bug]: bug:1637 (via #1599) Raise SSHException explicitly when blank private key data is loaded, instead of the natural result of IndexError. This should help more bits of Paramiko or Paramiko-adjacent codebases to correctly handle this class of error. Credit: Nicholas Dietz. * [Bug] #1822: (via, and relating to, far too many other issues to mention here) Update SSHClient so it explicitly closes its wrapped socket object upon encountering socket errors at connection time. This should help somewhat with certain classes of memory leaks, resource warnings, and/or errors (though we hasten to remind everyone that Client and Transport have their own .close() methods for use in non-error situations!). Patch courtesy of @YoavCohen. - Rename and refresh: - paramiko-pr1655-remove-pytest-relaxed.patch + paramiko-pr1665-remove-pytest-relaxed.patch * gh#paramiko/paramiko#1665- update to 2.11.0 * [Feature] #1951: Add SSH config token expansion (eg %h, %p) when parsing ProxyJump directives. * [Support] #2004: (via #2011) Apply unittest skipIf to tests currently using SHA1 in their critical path, to avoid failures on systems starting to disable SHA1 outright in their crypto backends (eg RHEL 9). * [Support] #1838: (via #1870/#2028) Update camelCase method calls against the threading module to be snake_case; this and related tweaks should fix some deprecation warnings under Python 3.10. * [Support] #2038: (via #2039) Recent versions of Cryptography have deprecated Blowfish algorithm support; in lieu of an easy method for users to remove it from the list of algorithms Paramiko tries to import and use, we’ve decided to remove it from our “preferred algorithms” list. This will both discourage use of a weak algorithm, and avoid warnings. - update to 2.10.5 * [Bug] #2008: (via #2010) Windows-native SSH agent support as merged in 2.10 could encounter Errno 22 OSError exceptions in some scenarios (eg server not cleanly closing a relevant named pipe). This has been worked around and should be less problematic. * [Bug] #2017: OpenSSH 7.7 and older has a bug preventing it from understanding how to perform SHA2 signature verification for RSA certificates (specifically certs - not keys), so when we added SHA2 support it broke all clients using RSA certificates with these servers. This has been fixed in a manner similar to what OpenSSH’s own client does: a version check is performed and the algorithm used is downgraded if needed. * [Bug] #1933: Align signature verification algorithm with OpenSSH re: zero-padding signatures which don’t match their nominal size/length. This shouldn’t affect most users, but will help Paramiko-implemented SSH servers handle poorly behaved clients such as PuTTY.- update to 2.10.4: * Servers offering certificate variants of hostkey algorithms (eg ssh-rsa-cert-v01@openssh.com) could not have their host keys verified by Paramiko clients, as it only ever considered non-cert key types for that part of connection handshaking. This has been fixed. * gq PKey instances’ __eq__ did not have the usual safety guard in place to ensure they were being compared to another PKey object, causing occasional spurious BadHostKeyException (among other things). This has been fixed. * Update camelCase method calls against the threading module to be snake_case; this and related tweaks should fix some deprecation warnings under Python 3.10.- do not require python-mock for build- Update to 2.10.3 (bsc#1197279, CVE-2022-24302) Too many changes to be listed here: https://www.paramiko.org/changelog.html- Update to 2.8.0 - [Feature] #1846: Add a prefetch keyword argument to SFTPClient.get/SFTPClient.getfo so users who need to skip SFTP prefetching are able to conditionally turn it off. - [Bug] #1462: (via #1882) Newer server-side key exchange algorithms not intended to use SHA1 (diffie-hellman-group14-sha256, diffie-hellman-group16-sha512) were incorrectly using SHA1 after all, due to a bug causing them to ignore the hash_algo class attribute. This has been corrected. - [Support] #1722: Remove leading whitespace from OpenSSH RSA test suite static key fixture, to conform better to spec. - [Support] #1727: Add missing test suite fixtures directory to MANIFEST.in, reinstating the ability to run Paramiko’s tests from an sdist tarball. - [Support]: Update our CI to catch issues with sdist generation, installation and testing. - [Support]: Administrivia overhaul, including but not limited to: - Migrate CI to CircleCI - Primary dev branch is now main (renamed) - Many README edits for clarity, modernization etc; including a bunch more (and consistent) status badges & unification with main project site index - PyPI page much more fleshed out (long_description is now filled in with the README; sidebar links expanded; etc) - flake8, pytest configs split out of setup.cfg into their own files - Invoke/invocations (used by maintainers/contributors) upgraded to modern versions - Skip python2 to fix build errors for Leap. - Rebase paramiko-pr1655-remove-pytest-relaxed.patch.- Set environment to utf-8 to allow tests to pass on Python 2. (bsc#1178341)- remove dependency on pytest-relaxed * paramiko-pr1655-remove-pytest-relaxed.patch * gh#paramiko/paramiko#1655- update to 2.7.2 (bsc#1166758, bsc#1166758, bsc#1205132) - drop configs.tar.gz * Add missing test suite fixtures directory to MANIFEST.in * Remove leading whitespace from OpenSSH RSA test suite static key fixture, * Fix incorrect string formatting causing unhelpful error message annotation when using Kerberos/GSSAPI. * Fix incorrectly swapped order of p and q numbers when loading OpenSSH-format RSA private keys.- update to 2.7.1 - add configs.tar.gz with missing test data * full changelog at http://www.paramiko.org/changelog.html- update to 2.6.0 (bsc#1200603) - drop relaxed.patch and 1311.patch * add a new keyword argument to SSHClient.connect and paramiko.transport.Transport -> disabled_algorithms * Fix Ed25519 key handling so certain key comment lengths don't cause SSHException("Invalid key") * Add backwards-compatible support for the gssapi- update to 2.5.0 - dropped 1379.patch - refreshed patches: paramiko-test_extend_timeout.patch relaxed.patch 1311.patch * Add support for encrypt-then-MAC (ETM) schemes (hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com) and two newer Diffie-Hellman group key exchange algorithms (group14, using SHA256; and group16, using SHA512). * Add support for Curve25519 key exchange. * Raise Cryptography dependency requirement to version 2.5 * Add support for the modern (as of Python 3.3) import location of MutableMapping- Run tests verbosely - Drop cert_support.tar.gz as it is currently properly in the release- add empty line after %autopatch: build fails up to 42.3 otherwise- drop python-pytest_relaxed dependency - add patches: 1311.patch - fix warnings 1379.patch - fix support for gssapi relaxed.patch - remove unnecessary pytest_relaxed dep - remove patch: disable-gssapi.patch - supersseded- Remove superfluous devel dependency for noarch package- add disable-gssapi.patch - workaround for boo#1115769- update to 2.4.2 (bsc#1111151, CVE-2018-1000805) - refresh paramiko-test_extend_timeout.patch * Fix exploit (CVE pending) in Paramiko's server mode (not client mode) where hostile clients could trick the server into thinking they were authenticated without actually submitting valid authentication. * Modify protocol message handling such that Transport does not respond to MSG_UNIMPLEMENTED with its own MSG_UNIMPLEMENTED * Updated SSHConfig.lookup so it returns a new, type-casting-friendly dict subclass (~paramiko.config.SSHConfigDict) in lieu of dict literals.- add paramiko-test_extend_timeout.patch (bsc#1085529) extend timeout in testsuite to pass on ppc64leupdate to version 2.4.1 (bsc#1085276, CVE-2018-7750): * changelog: update for #1039 / #1051 * Screen off dev version of Python from test matrix * ensure ed25519 password is bytes * Cut 2.0.8 * Cut 2.3.2 * Initial tests proving CVE-2018-7750 / #1175 * Guess something else added this prior to the merge * Fixes CVE-2018-7750 / #1175 * Uncaught typo in test suite * Initial tests proving CVE-2018-7750 / #XXX * Test proving #1039 / efficacy of #1051 * Changelog closes #1175 * Cut 2.1.5 * Allow overriding test client connect kwargs in Transport test suite * Cut 2.4.1 * Fixes CVE-2018-7750 / #XXX * Cut 2.2.3 * flake8- update to 2.4.0 + new pytest based testsuite * dd a new passphrase kwarg to SSHClient.connect so users may disambiguate key-decryption passphrases from password-auth passwords. * Drop Python 2.6 and Python 3.3 support- update to 2.3.1 + cert_support.tar.gz - missing test certificates for testsuite * Certificate support broke the no-certificate case for Ed25519 keys (symptom is an AttributeError about public_blob.) This went uncaught due to cert autoload behavior (i.e. our test suite never actually ran the no-cert case, because the cert existed!) Both issues have been fixed. * Implement basic client-side certificate authentication (as per the OpenSSH vendor extension.) * Added pre-authentication banner support for the server interface (ServerInterface.get_banner plus related support in Transport/AuthHandler.) * Update Ed25519Key so its constructor offers the same file_obj parameter as its sibling key classes. * Add a gss_trust_dns option to Client and Transport to allow explicitly setting whether or not DNS canonicalization should occur when using GSSAPI. * Paramiko originally defaulted to zlib compression level 9 (when one connects with compression=True; it defaults to off.) This has been found to be quite wasteful and tends to cause much longer transfers in most cases, than is necessar * Enhance documentation around the new SFTP.posix_rename method so it’s referenced in the ‘standard’ rename method for increased visibility. * Modify logic around explicit disconnect messages, and unknown-channel situations, so that they rely on centralized shutdown code instead of running their own. This is at worst removing some unnecessary code, and may help with some situations where Paramiko hangs at the end of a session. * Display exception type and message when logging auth-rejection messages (ones reading Auth rejected: unsupported or mangled public key); previously this error case had a bare except and did not display exactly why the key failed. * Ed25519 keys never got proper API documentation support; this has been fixed. * Update how we use Cryptography‘s signature/verification methods so we aren’t relying on a deprecated API.- update to 2.2.2: * SSHClient now requests the type of host key it has (e.g. from known_hosts) and does not consider a different type to be a “Missing” host key. This fixes a common case where an ECDSA key is in known_hosts and the server also has an RSA host key. * Fix up host-key checking in our GSSAPI support, which was previously using an incorrect API call * Fix key exchange (kex) algorithm list for GSSAPI authentication; reviously, the list used solely out-of-date algorithms, and now contains newer ones listed preferentially before the old * Clean up GSSAPI authentication procedures so they do not prevent normal fallback to other authentication methods on failure. * Add rekeying support to GSSAPI connections, which was erroneously missing.- update to 2.2.1: * Missed a spot * Update .travis.yml * Whitespace * Having this in a mini-toctree made the nav look funny and is also just unintuitive * Changelog re #471, re #65 * these are bytes * changelog: update for #990 and #993 * ecdh kex support * flake8/whitespace * Trailing comma * Add test for posix-rename@openssh.com extension for SFTP client * Changelog re #921 * Add a note about new Python-level deps to changelog re: Ed25519 support * Add method for "posix-rename@openssh.com" extension for SFTP client. * Add IOError in posix-rename@openssh.com test for python 2 support. * this isnt bytes * Added a auth_timeout to handle situations where SSH server stops responding during auth. * small cleanups * More changelog flimflammery * Added changelog entry * python 3 compatibility * Incorrect comparison, should be <= * DDD re #857 * Improve __hash__ functions * Hrm that should always have been an h1 * No idea how this got past all the earlier flake8 work... * comments * Fixed test to support python 2.6 * Note ecdh-sha2 preferred-kex placement in changelog entry for #951, re #983 * Changelog language tweaks * Reorder cipher and key preferences to make more sense * Added a test to check that the auth_timeout argument is passed through and applied. * Changelog tweak * Cut 2.2.1 * transport: change order of preferred kex and hmac algorithms * need bcrypt >= 3.1.3 for kdf() ignore_few_rounds kwarg * Changelog re #972, re #325, closes #325 * cleanup/simplify auth_timeout tests * Missed a merge conflict lolol * flake8 * Changelog re #951 * Perplexed at why flake8 did not report this earlier * Add Python 3.6 to classifiers * Add support for posix-rename@openssh.com for the SFTP server side and fix tests accordingly. * sphinx nitpick fixes * Fixed encoding/decoding of the public key on the wire * Added test for authentication timeout from a non-responsive server * refactor files * fixed comment + consistency * Changelog re #857 * Cut 2.2.0 * integration test, with ourselves * TODO * That was easy. Closes #857 * Add sanity note to changelog re #869 * Unit tests * Fixes #325 -- add support for Ed25519 keys * Happy New Year * implement __hash__() method for Ed25519Key * pep8 * Increased auth_timeout to 30 seconds * py3k * fixed long line * Link to the spec * set a minimum version * Support decrypting keys * Failing test proving need for #857 - move demos/ to extra -doc package- update to 2.1.3 * Make util.log_to_file append instead of replace. * SSHClient and Transport could cause a memory leak if there’s a connection problem or protocol error, even if Transport.close() is called. * Prior support for ecdsa-sha2-nistp(384|521) algorithms didn’t fully extend to covering host keys, preventing connection to hosts which only offer these key types and no others. This is now fixed. * Prefer newer ecdsa-sha2-nistp keys over RSA and DSA keys during host key selection. This improves compatibility with OpenSSH, both in terms of general behavior, and also re: ability to properly leverage OpenSSH-modified known_hosts files. * The RC4/arcfour family of ciphers has been broken since version 2.0; but since the algorithm is now known to be completely insecure, we are opting to remove support outright instead of fixing it. * Move sha1 above the now-arguably-broken md5 in the list of preferred MAC algorithms, as an incremental security improvement for users whose target systems offer both. * Writing encrypted/password-protected private key files was silently broken since 2.0 due to an incorrect API call Includes a directly related fix, namely adding the ability to read AES-256-CBC ciphered private keys (which is now what we tend to write out as it is Cryptography’s default private key cipher.) * Allow any type implementing the buffer API to be used with BufferedFile, Channel, and SFTPFile. This resolves a regression introduced in 1.13 with the Python 3 porting changes, when using types such as memoryview. * Enhance default cipher preference order such that aes(192|256)-cbc are preferred over blowfish-cbc. * SSHClient now requests the type of host key it has (e.g. from known_hosts) and does not consider a different type to be a “Missing” host key. This fixes a common case where an ECDSA key is in known_hosts and the server also has an RSA host key. * Overhaul the codebase to be PEP-8- Implement single-spec version.- Fix version setting for cryptography for build- Add python-pyasn1 as Buildrequires for testing- update to 2.1.2 * Fix a bug in server-mode concerning multiple interactive auth steps * SSHClient now gives its internal Transport a handle on itself, preventing garbage collection of the client until the session is closed. Without this, some code which returns stream or transport objects without the client that generated them, would result in premature session closure when the client was GCd * Avoid test suite exceptions on platforms lacking errno.ETIME * weak how RSAKey.__str__ behaves so it doesn’t cause TypeError under Python 3.- update to 2.1.1 * A tweak to the original patch implementing gh#398 was not fully applied, causing calls to ~paramiko.client.SSHClient.invoke_shell to fail with AttributeError. This has been fixed. * Fix the implementation of PKey.write_private_key_file (this method is only publicly defined on subclasses; the fix was in the private real implementation) so it passes the correct params to open() * Add an optional timeout parameter to Transport.start_clienti (and feed it the value of the configured connection timeout when used within SSHClient .) * Catch AssertionError thrown by Cryptography when attempting to load bad ECDSA keys, turning it into an SSHException. * Add a missing .closed attribute (plus ._closed because reasons) to ProxyCommand * Make the subprocess import in proxy.py lazy so users on platforms without it (such as Google App Engine) can import Paramiko successfully * Fix incorrect docstring/param-list for Transport.auth_gssapi_keyex so it matches the real signature. * Add an environment dict argument to Client.exec_command- Fix Requires for python-cryptography - Add missing Requires for python-pyasn1- update to 2.0.2 * [Bug] #758: Apply type definitions to _winapi module from jaraco.windows 3.6.1. This should address issues on Windows platforms that often result in errors like ArgumentError: [...] int too long to convert. Thanks to @swohlerLL for the report and Jason R. Coombs for the patch. * [Bug] #774: Add a _closed private attribute to Channel objects so that they continue functioning when used as proxy sockets under Python 3 (e.g. as direct-tcpip gateways for other Paramiko connections.) * [Bug] #673: (via #681) Fix protocol banner read errors (SSHException) which would occasionally pop up when using ProxyCommand gatewaying. Thanks to @Depado for the initial report and Paul Kapp for the fix.- updated homepage URL - update to 2.0.1: * [Bug] #537: Fix a bug in BufferedPipe.set_event which could cause deadlocks/hangs when one uses select.select against Channel objects (or otherwise calls Channel.fileno after the channel has closed). * [Bug] #520: (Partial fix) Fix at least one instance of race condition driven threading hangs at end of the Python interpreter session. (Includes a docs update as well - always make sure to .close() your clients!)- fix build- fix source url- update to 2.0.0: * Add support for 384- and 512-bit elliptic curve groups in ECDSA key types (aka ecdsa-sha2-nistp384 / ecdsa-sha2-nistp521). * Due to an earlier bugfix, less-specific Host blocks' ProxyCommand values were overriding ProxyCommand none in more-specific Host blocks. This has been fixed in a backwards compatible manner (i.e. ProxyCommand none continues to appear as a total lack of any proxycommand key in parsed config structures). * Fix a backwards incompatibility issue that cropped up in SFTPFile.prefetch <~paramiko.sftp_file.prefetch> re: the erroneously non-optional file_size parameter. Should only affect users who manually call prefetch. * Replace PyCrypto with the Python Cryptographic Authority (PyCA) 'Cryptography' library suite. This improves security, installability, and performance; adds PyPy support; and much more. * Fix stalled/hung SFTP downloads by cleaning up some threading lock issues. * Fix a Python 3 compatibility issue when handling two-factor authentication. * Clean up setup.py to always use setuptools, not doing so was a historical artifact from bygone days. * Update the module in charge of handling SSH moduli so it's consistent with OpenSSH behavior re: prime number selection. * Fix up ~paramiko.ssh_exception.NoValidConnectionsError so it pickles correctly, and fix a related Python 3 compatibility issue. * Update to jaraco.windows 3.4.1 to fix some errors related to ctypes on Windows platforms. * Annotate some public attributes on ~paramiko.channel.Channel such as .closed. * Fix logic bug in the SFTP client's callback-calling functionality; previously there was a chance the given callback would fire twice at the end of a transfer. * Identify & work around a race condition in the test for handshake timeouts, which was causing frequent test failures for a subset of contributors as well as Travis-CI (usually, but not always, limited to Python 3.5). * Remove whitespace in our setup.py's install_requires as it triggers occasional bugs in some versions of setuptools. * Strip trailing/leading whitespace from lines when parsing SSH config files - this brings things in line with OpenSSH behavior. * Fix behavior of gssapi-with-mic auth requests so they fail gracefully (allowing followup via other auth methods) instead of raising an exception. * Add missing file-like object methods for ~paramiko.file.BufferedFile and ~paramiko.sftp_file.SFTPFile. * Clean up and enhance the README (and rename it to README.rst from just README).- Add --no-transport to fix a known issue with the tests https://github.com/paramiko/paramiko/issues/574 Check if still failing on next release. The tests is currently failing on Python 3.5, but it is not actually Python 3.5 specific, it is just more likely to be encountered on Python 3.5 - update to version 1.16.0: * Streamline use of stat when downloading SFTP files via SFTPClient.get ; this avoids triggering bugs in some off-spec SFTP servers such as IBM Sterling. Thanks to @muraleee for the initial report and to Torkil Gustavsen for the patch. * Fully enable two-factor authentication (e.g. when a server requires AuthenticationMethods pubkey,keyboard-interactive). Thanks to @perryjrandall for the patch and to @nevins-b and Matt Robenolt for additional support. * Fix 'exec' requests in server mode to use get_string instead of get_text to avoid UnicodeDecodeError on non-UTF-8 input. Thanks to Anselm Kruis for the patch & discussion. * Fix line number reporting in log output regarding invalid known_hosts line entries. Thanks to Dylan Thacker-Smith for catch & patch. * Update the vendored Windows API addon to a more recent edition. Also fixes :issue:`193`, :issue:`488`, :issue:`498`. Thanks to Jason Coombs.- update to version 1.15.2 (bsc#962291) * [Bug] #320: Update our win_pageant module to be Python 3 compatible * [Bug] #429: Server-level debug message logging was overlooked during the Python 3 compatibility update; Python 3 clients attempting to log SSH debug packets encountered type errors. This is now fixed * [Bug] #459: Tighten up agent connection closure behavior to avoid spurious ResourceWarning display in some situations * [Bug] #266: Change numbering of Transport channels to start at 0 instead of 1 for better compatibility with OpenSSH & certain server implementations which break on 1-indexed channels * [Support] #419: Modernize a bunch of the codebase internals to leverage decorators. Props to @beckjake for realizing we’re no longer on Python 2.2 :D * [Support] #421: Modernize threading calls to user newer API * [Support] #422: Clean up some unused imports * [Support] #431: Replace handrolled ssh_config parsing code with use of the shlex module * [Bug] #415: Fix ssh_config parsing to correctly interpret ProxyCommand none as the lack of a proxy command, instead of as a literal command string of "none" * [Bug] #428: Fix an issue in BufferedFile (primarily used in the SFTP modules) concerning incorrect behavior by readlines on files whose size exceeds the buffer size * [Bug] #455: Tweak packet size handling to conform better to the OpenSSH RFCs; this helps address issues with interactive program cursors * [Bug] #413: (also #414, #420, #454) Be significantly smarter about polling & timing behavior when running proxy commands, to avoid unnecessary (often 100%!) CPU usageh01-ch2d 1715267047  ""$$&&((**,,..0022446688::<<>>@@BBDDFFHHJJLLNNPPRRTTVVXXZZ\\^^``bbddfghijklmnopqrstuvwxyz{|}~3.4.0-150400.13.10.4paramikoparamiko-3.4.0-py3.11.egg-infoPKG-INFOSOURCES.txtdependency_links.txtrequires.txttop_level.txt__init__.py__pycache____init__.cpython-311.opt-1.pyc__init__.cpython-311.pyc_version.cpython-311.opt-1.pyc_version.cpython-311.pyc_winapi.cpython-311.opt-1.pyc_winapi.cpython-311.pycagent.cpython-311.opt-1.pycagent.cpython-311.pycauth_handler.cpython-311.opt-1.pycauth_handler.cpython-311.pycauth_strategy.cpython-311.opt-1.pycauth_strategy.cpython-311.pycber.cpython-311.opt-1.pycber.cpython-311.pycbuffered_pipe.cpython-311.opt-1.pycbuffered_pipe.cpython-311.pycchannel.cpython-311.opt-1.pycchannel.cpython-311.pycclient.cpython-311.opt-1.pycclient.cpython-311.pyccommon.cpython-311.opt-1.pyccommon.cpython-311.pyccompress.cpython-311.opt-1.pyccompress.cpython-311.pycconfig.cpython-311.opt-1.pycconfig.cpython-311.pycdsskey.cpython-311.opt-1.pycdsskey.cpython-311.pycecdsakey.cpython-311.opt-1.pycecdsakey.cpython-311.pyced25519key.cpython-311.opt-1.pyced25519key.cpython-311.pycfile.cpython-311.opt-1.pycfile.cpython-311.pychostkeys.cpython-311.opt-1.pychostkeys.cpython-311.pyckex_curve25519.cpython-311.opt-1.pyckex_curve25519.cpython-311.pyckex_ecdh_nist.cpython-311.opt-1.pyckex_ecdh_nist.cpython-311.pyckex_gex.cpython-311.opt-1.pyckex_gex.cpython-311.pyckex_group1.cpython-311.opt-1.pyckex_group1.cpython-311.pyckex_group14.cpython-311.opt-1.pyckex_group14.cpython-311.pyckex_group16.cpython-311.opt-1.pyckex_group16.cpython-311.pyckex_gss.cpython-311.opt-1.pyckex_gss.cpython-311.pycmessage.cpython-311.opt-1.pycmessage.cpython-311.pycpacket.cpython-311.opt-1.pycpacket.cpython-311.pycpipe.cpython-311.opt-1.pycpipe.cpython-311.pycpkey.cpython-311.opt-1.pycpkey.cpython-311.pycprimes.cpython-311.opt-1.pycprimes.cpython-311.pycproxy.cpython-311.opt-1.pycproxy.cpython-311.pycrsakey.cpython-311.opt-1.pycrsakey.cpython-311.pycserver.cpython-311.opt-1.pycserver.cpython-311.pycsftp.cpython-311.opt-1.pycsftp.cpython-311.pycsftp_attr.cpython-311.opt-1.pycsftp_attr.cpython-311.pycsftp_client.cpython-311.opt-1.pycsftp_client.cpython-311.pycsftp_file.cpython-311.opt-1.pycsftp_file.cpython-311.pycsftp_handle.cpython-311.opt-1.pycsftp_handle.cpython-311.pycsftp_server.cpython-311.opt-1.pycsftp_server.cpython-311.pycsftp_si.cpython-311.opt-1.pycsftp_si.cpython-311.pycssh_exception.cpython-311.opt-1.pycssh_exception.cpython-311.pycssh_gss.cpython-311.opt-1.pycssh_gss.cpython-311.pyctransport.cpython-311.opt-1.pyctransport.cpython-311.pycutil.cpython-311.opt-1.pycutil.cpython-311.pycwin_openssh.cpython-311.opt-1.pycwin_openssh.cpython-311.pycwin_pageant.cpython-311.opt-1.pycwin_pageant.cpython-311.pyc_version.py_winapi.pyagent.pyauth_handler.pyauth_strategy.pyber.pybuffered_pipe.pychannel.pyclient.pycommon.pycompress.pyconfig.pydsskey.pyecdsakey.pyed25519key.pyfile.pyhostkeys.pykex_curve25519.pykex_ecdh_nist.pykex_gex.pykex_group1.pykex_group14.pykex_group16.pykex_gss.pymessage.pypacket.pypipe.pypkey.pyprimes.pyproxy.pyrsakey.pyserver.pysftp.pysftp_attr.pysftp_client.pysftp_file.pysftp_handle.pysftp_server.pysftp_si.pyssh_exception.pyssh_gss.pytransport.pyutil.pywin_openssh.pywin_pageant.pypython311-paramikoREADME.rstpython311-paramikoLICENSE/usr/lib/python3.11/site-packages//usr/lib/python3.11/site-packages/paramiko-3.4.0-py3.11.egg-info//usr/lib/python3.11/site-packages/paramiko//usr/lib/python3.11/site-packages/paramiko/__pycache__//usr/share/doc/packages//usr/share/doc/packages/python311-paramiko//usr/share/licenses//usr/share/licenses/python311-paramiko/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:33743/SUSE_SLE-15-SP4_Update/7d099fac356425a28e7bf2dfd0a5652a-python-paramiko.SUSE_SLE-15-SP4_Updatedrpmxz5noarch-suse-linuxdirectoryASCII textPython script, ASCII text executablePython script, ASCII text executable, with very long lines  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR>m@M&W6hpython311-gssapipython311-invokepython311-pyasn10.1.7 utf-8af9d74d5998a3508a09b7afc59abe36c3f253752543bf63ca9618100b69a3d83?7zXZ !t/!Z ]"k%0a L8WlIcrqef`hBXA;S/4Y+矸O5ڻVӧNq<oюQOk_bDЩ?*(A ߸b1!(nohBm:4`E{M_(<nLst-&2iR;ƆH"9A@nIB$̫6OX``0xd~SmS_p[չݱ`Ks{?ş,f6fƀ[}leyߕ߽1R S}SD-ƞ![]4h}ΞVԥ.e,U TFaQ~{y>#) IX},c,e@(np>#h fڋrPUaٯ،ҋ Wc!År#2֪k=S\q* F+zc}9G{‘5Zpek8Nt`Y)-Cfن"O$dTQעIyѴ@Zj=&5PkAb.cp$"e}N /ù d2ڦ3l 0-"W\{>4 oAIܠ3FGn5#b BdtqK†8ٓ.Z'F:dD,6Dwh}`.ur&2΍q3p?gky1{ujk37wU{;_sGR|{O1#\uw9t^JduO&k.4Jj$$!x4("@;CK{~l1s7_ڛPig߉׵<|cJk`iê#wÃTkK>f8L]rM?Vz@9EvfϠ44 '_ĸD]o8AonE "YTcZ\53~Yv%f_Ԥ_n 8b ꗑٴph?Oikp,wNݢH;fVh Gƒ  7U&OAְkeDZP}kZ<ȳǢO`\`Q meO)I+aM\K†Z9p:]7c(p+oYU:M31Ξ sdFLL^PI{0;K@@J:SXrBEr{2a["-閪8O *o_BiaJc2بs[v[0ua6 c\.hfS=gD>N8yʾ۸--2\m ',ENҦ-"k\Dy*XB;-B@ YZ