Python paramiko.ECDSAKey() Examples
The following are 16
code examples of paramiko.ECDSAKey().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
paramiko
, or try the search function
.
Example #1
Source File: handler.py From adminset with GNU General Public License v2.0 | 7 votes |
def get_pkey_obj(cls, privatekey, password, filename): bpass = to_bytes(password) if password else None pkey = cls.get_specific_pkey(paramiko.RSAKey, privatekey, bpass)\ or cls.get_specific_pkey(paramiko.DSSKey, privatekey, bpass)\ or cls.get_specific_pkey(paramiko.ECDSAKey, privatekey, bpass)\ or cls.get_specific_pkey(paramiko.Ed25519Key, privatekey, bpass) if not pkey: if not password: error = 'Invalid private key: {}'.format(filename) else: error = ( 'Wrong password {!r} for decrypting the private key.' ) .format(password) raise InvalidValueError(error) return pkey
Example #2
Source File: main.py From chain with Apache License 2.0 | 6 votes |
def get_pkey(self, privatekey, password): password = password.encode('utf-8') if password else None pkey = self.get_specific_pkey(paramiko.RSAKey, privatekey, password)\ or self.get_specific_pkey(paramiko.DSSKey, privatekey, password)\ or self.get_specific_pkey(paramiko.ECDSAKey, privatekey, password)\ or self.get_specific_pkey(paramiko.Ed25519Key, privatekey, password) if not pkey: raise ValueError('Not a valid private key file or ' 'wrong password for decrypting the private key.') return pkey
Example #3
Source File: __init__.py From pyrexecd with MIT License | 6 votes |
def get_authorized_keys(path): keys = [] with open(path) as fp: for line in fp: flds = line.split(' ') if len(flds) < 2: continue if flds[0] == 'ssh-rsa': f = paramiko.RSAKey elif flds[0] == 'ssh-dss': f = paramiko.DSSKey elif flds[0].startswith('ecdsa-'): f = paramiko.ECDSAKey else: continue data = decodebytes(flds[1].encode('ascii')) keys.append(f(data=data)) return keys # run_server
Example #4
Source File: main.py From autoops with Apache License 2.0 | 6 votes |
def get_pkey(self, privatekey, password): password = password.encode('utf-8') if password else None pkey = self.get_specific_pkey(paramiko.RSAKey, privatekey, password)\ or self.get_specific_pkey(paramiko.DSSKey, privatekey, password)\ or self.get_specific_pkey(paramiko.ECDSAKey, privatekey, password)\ or self.get_specific_pkey(paramiko.Ed25519Key, privatekey, password) if not pkey: raise ValueError('Not a valid private key file or ' 'wrong password for decrypting the private key.') return pkey
Example #5
Source File: test_client.py From python-hpedockerplugin with Apache License 2.0 | 6 votes |
def test_4_auto_add_policy(self): """ verify that SSHClient's AutoAddPolicy works. """ threading.Thread(target=self._run).start() hostname = '[%s]:%d' % (self.addr, self.port) key_file = test_path('test_ecdsa_256.key') public_host_key = paramiko.ECDSAKey.from_private_key_file(key_file) self.tc = paramiko.SSHClient() self.tc.set_missing_host_key_policy(paramiko.AutoAddPolicy()) self.assertEqual(0, len(self.tc.get_host_keys())) self.tc.connect(password='pygmalion', **self.connect_kwargs) self.event.wait(1.0) self.assertTrue(self.event.is_set()) self.assertTrue(self.ts.is_active()) self.assertEqual('slowdive', self.ts.get_username()) self.assertEqual(True, self.ts.is_authenticated()) self.assertEqual(1, len(self.tc.get_host_keys())) new_host_key = list(self.tc.get_host_keys()[hostname].values())[0] self.assertEqual(public_host_key, new_host_key)
Example #6
Source File: ssh.py From django-webssh with Apache License 2.0 | 5 votes |
def connect(self, host, user, password=None, ssh_key=None, port=22, timeout=30, term='xterm', pty_width=80, pty_height=24): try: ssh_client = paramiko.SSHClient() ssh_client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) if ssh_key: key = get_key_obj(paramiko.RSAKey, pkey_obj=ssh_key, password=password) or \ get_key_obj(paramiko.DSSKey, pkey_obj=ssh_key, password=password) or \ get_key_obj(paramiko.ECDSAKey, pkey_obj=ssh_key, password=password) or \ get_key_obj(paramiko.Ed25519Key, pkey_obj=ssh_key, password=password) ssh_client.connect(username=user, hostname=host, port=port, pkey=key, timeout=timeout) else: ssh_client.connect(username=user, password=password, hostname=host, port=port, timeout=timeout) transport = ssh_client.get_transport() self.channel = transport.open_session() self.channel.get_pty(term=term, width=pty_width, height=pty_height) self.channel.invoke_shell() for i in range(2): recv = self.channel.recv(1024).decode('utf-8') self.message['status'] = 0 self.message['message'] = recv message = json.dumps(self.message) self.websocker.send(message) except socket.timeout: self.message['status'] = 1 self.message['message'] = 'ssh 连接超时' message = json.dumps(self.message) self.websocker.send(message) self.close() except: self.close()
Example #7
Source File: patator.py From patator with GNU General Public License v2.0 | 5 votes |
def load_keyfile(keyfile): for cls in (paramiko.RSAKey, paramiko.DSSKey, paramiko.ECDSAKey): try: return cls.from_private_key_file(keyfile) except paramiko.SSHException: pass else: raise
Example #8
Source File: paramiko_ssh.py From st2 with Apache License 2.0 | 5 votes |
def _get_pkey_object(self, key_material, passphrase): """ Try to detect private key type and return paramiko.PKey object. """ for cls in [paramiko.RSAKey, paramiko.DSSKey, paramiko.ECDSAKey]: try: key = cls.from_private_key(StringIO(key_material), password=passphrase) except paramiko.ssh_exception.SSHException: # Invalid key, try other key type pass else: return key # If a user passes in something which looks like file path we throw a more friendly # exception letting the user know we expect the contents a not a path. # Note: We do it here and not up the stack to avoid false positives. contains_header = REMOTE_RUNNER_PRIVATE_KEY_HEADER in key_material.lower() if not contains_header and (key_material.count('/') >= 1 or key_material.count('\\') >= 1): msg = ('"private_key" parameter needs to contain private key data / content and not ' 'a path') elif passphrase: msg = 'Invalid passphrase or invalid/unsupported key type' else: msg = 'Invalid or unsupported key type' raise paramiko.ssh_exception.SSHException(msg)
Example #9
Source File: paramiko_ssh.py From st2 with Apache License 2.0 | 5 votes |
def _is_key_file_needs_passphrase(file): for cls in [paramiko.RSAKey, paramiko.DSSKey, paramiko.ECDSAKey]: try: cls.from_private_key_file(file, password=None) except paramiko.ssh_exception.PasswordRequiredException: return True except paramiko.ssh_exception.SSHException: continue return False
Example #10
Source File: patator_ext.py From project-black with GNU General Public License v2.0 | 5 votes |
def load_keyfile(keyfile): for cls in (paramiko.RSAKey, paramiko.DSSKey, paramiko.ECDSAKey): try: return cls.from_private_key_file(keyfile) except paramiko.SSHException: pass else: raise
Example #11
Source File: test_client.py From python-hpedockerplugin with Apache License 2.0 | 5 votes |
def _run(self, allowed_keys=None, delay=0): if allowed_keys is None: allowed_keys = FINGERPRINTS.keys() self.socks, addr = self.sockl.accept() self.ts = paramiko.Transport(self.socks) keypath = test_path('test_rsa.key') host_key = paramiko.RSAKey.from_private_key_file(keypath) self.ts.add_server_key(host_key) keypath = test_path('test_ecdsa_256.key') host_key = paramiko.ECDSAKey.from_private_key_file(keypath) self.ts.add_server_key(host_key) server = NullServer(allowed_keys=allowed_keys) if delay: time.sleep(delay) self.ts.start_server(self.event, server)
Example #12
Source File: test_client.py From python-hpedockerplugin with Apache License 2.0 | 5 votes |
def test_host_key_negotiation_1(self): host_key = paramiko.ECDSAKey.generate() self._client_host_key_bad(host_key)
Example #13
Source File: test_client.py From python-hpedockerplugin with Apache License 2.0 | 5 votes |
def test_host_key_negotiation_3(self): self._client_host_key_good(paramiko.ECDSAKey, 'test_ecdsa_256.key')
Example #14
Source File: bot_net.py From violent-python3 with GNU General Public License v3.0 | 4 votes |
def load_keyfile(self, keyfile): # if keyfile isn't one of these 3 types it # will be treated as a plaintext password for cls in (paramiko.RSAKey, paramiko.DSSKey, paramiko.ECDSAKey): try: return cls.from_private_key_file(keyfile) except: pass else: return None
Example #15
Source File: sshtunnel.py From sshtunnel with MIT License | 4 votes |
def get_keys(logger=None, host_pkey_directories=None, allow_agent=False): """ Load public keys from any available SSH agent or local .ssh directory. Arguments: logger (Optional[logging.Logger]) host_pkey_directories (Optional[list[str]]): List of local directories where host SSH pkeys in the format "id_*" are searched. For example, ['~/.ssh'] .. versionadded:: 0.1.0 allow_agent (Optional[boolean]): Whether or not load keys from agent Default: False Return: list """ keys = SSHTunnelForwarder.get_agent_keys(logger=logger) \ if allow_agent else [] if host_pkey_directories is not None: paramiko_key_types = {'rsa': paramiko.RSAKey, 'dsa': paramiko.DSSKey, 'ecdsa': paramiko.ECDSAKey, 'ed25519': paramiko.Ed25519Key} for directory in host_pkey_directories or [DEFAULT_SSH_DIRECTORY]: for keytype in paramiko_key_types.keys(): ssh_pkey_expanded = os.path.expanduser( os.path.join(directory, 'id_{}'.format(keytype)) ) if os.path.isfile(ssh_pkey_expanded): ssh_pkey = SSHTunnelForwarder.read_private_key_file( pkey_file=ssh_pkey_expanded, logger=logger, key_type=paramiko_key_types[keytype] ) if ssh_pkey: keys.append(ssh_pkey) if logger: logger.info('{0} keys loaded from host directory'.format( len(keys)) ) return keys
Example #16
Source File: sshtunnel.py From sshtunnel with MIT License | 4 votes |
def read_private_key_file(pkey_file, pkey_password=None, key_type=None, logger=None): """ Get SSH Public key from a private key file, given an optional password Arguments: pkey_file (str): File containing a private key (RSA, DSS or ECDSA) Keyword Arguments: pkey_password (Optional[str]): Password to decrypt the private key logger (Optional[logging.Logger]) Return: paramiko.Pkey """ ssh_pkey = None for pkey_class in (key_type,) if key_type else ( paramiko.RSAKey, paramiko.DSSKey, paramiko.ECDSAKey, paramiko.Ed25519Key ): try: ssh_pkey = pkey_class.from_private_key_file( pkey_file, password=pkey_password ) if logger: logger.debug('Private key file ({0}, {1}) successfully ' 'loaded'.format(pkey_file, pkey_class)) break except paramiko.PasswordRequiredException: if logger: logger.error('Password is required for key {0}' .format(pkey_file)) break except paramiko.SSHException: if logger: logger.debug('Private key file ({0}) could not be loaded ' 'as type {1} or bad password' .format(pkey_file, pkey_class)) return ssh_pkey