Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

python313-asyncssh-2.18.0-1.2 RPM for noarch

From OpenSuSE Tumbleweed for noarch

Name: python313-asyncssh Distribution: openSUSE Tumbleweed
Version: 2.18.0 Vendor: openSUSE
Release: 1.2 Build date: Thu Nov 7 13:11:27 2024
Group: Development/Languages/Python Build host: reproducible
Size: 5202666 Source RPM: python-asyncssh-2.18.0-1.2.src.rpm
Packager: https://bugs.opensuse.org
Url: https://github.com/ronf/asyncssh
Summary: Asynchronous SSHv2 client and server library
AsyncSSH is a Python package which provides an asynchronous client and
server implementation of the SSHv2 protocol on top of the Python asyncio framework.

Provides

Requires

License

EPL-2.0 OR GPL-2.0-or-later

Changelog

* Thu Nov 07 2024 John Paul Adrian Glaubitz <[email protected]>
  - Update to 2.18.0
    * Added support for post-quantum ML-KEM key exchange algorithms,
      interoperable with OpenSSH 9.9.
    * Added support for the OpenSSH "limits" extension, allowing the
      client to query server limits such as the maximum supported read
      and write sizes. The client will automatically default to the reported
      maximum size on servers that support this extension.
    * Added more ways to specify environment variables via the `env` option.
      Sequences of either 'key=value' strings or (key, value) tuples are now
      supported, in addition to a dict.
    * Added support for getting/setting environment variables as byte strings
      on platforms which support it. Previously, only Unicode strings were
      accepted and they were always encoded on the wire using UTF-8.
    * Added support for non-TCP sockets (such as a socketpair) as the `sock`
      parameter in connect calls. Thanks go to Christian Wendt for reporting
      this problem and proposing a fix.
    * Changed compression to be disabled by default to avoid it becoming a
      performance bottleneck on high-bandwidth connections. This now also
      matches the OpenSSH default.
    * Improved speed of parallelized SFTP reads when read-ahead goes beyond
      the end of the file. Thanks go to Maximilian Knespel for reporting
      this issue and providing performance measurements on the code before
      and after the change.
    * Improved cancellation handling during SCP transfers.
    * Improved support for selecting the currently available security key
      when the application lists multiple keys to try. Thanks go to GitHub
      user zanda8893 for reporting the issue and helping to work out the
      details of the problem.
    * Improved handling of reverse DNS failures in host-based authentication.
      Thanks go to GitHub user xBiggs for suggesting this change.
    * Improved debug logging of byte strings with non-printable characters.
    * Switched to using an executor on GSSAPI calls to avoid blocking the
      event loop.
    * Fixed handling of "UserKnownHostsFile none" in config files. This
      previously caused it to use the default known hosts, rather than
      disabling known host checking.
    * Fixed a runtime warning about not awaiting a coroutine in unit tests.
    * Fixed a unit test failure on Windows when calling abort on a transport.
    * Fixed a problem where a "MAC verification failed" error was sometimes
      sent on connection close.
    * Fixed SSHClientProcess code to not raise a runtime exception when
      waiting more than once for a process to finish. Thanks go to GitHub
      user starflows for reporting this issue.
    * Handled an error when attempting to import older verions of pyOpenSSL.
      Thanks go to Maximilian Knespel for reporting this issue and testing
      the fix.
    * Updated simple_server example code to switch from crypt to bcrypt,
      since crypt has been removed in Python 3.13. Thanks go to Colin
      Watson for providing this update.
* Thu Sep 26 2024 Antonio Larrosa <[email protected]>
  - update to 2.17.0:
    * Add support for specifying a per-connection credential store
      for GSSAPI authentication.
    * Fixed a regression introduced in AsyncSSH 2.15.0 which could
      cause connections to be closed with an uncaught exception when
      a session on the connection was closed.
    * Added a workaround where getaddrinfo() on some systems may
      return duplicate entries, causing bind() to fail when opening
      a listener.
    * Relaxed padding length check on OpenSSH private keys to
      provide better compatibility with keys generated by PuTTYgen.
    * Improved documentation on SSHClient and SSHServer classes to
      explain when they are created and their relationship to the
      SSHClientConnection and SSHServerConnection classes.
    * Updated examples to use Python 3.7 and made some minor
      improvements.
  - update to 2.16.0:
    * Added client and server support for the OpenSSH "hostkeys"
      extension. When using known_hosts, clients can provide a
      handler which will be called with the changes between the
      keys currently trusted in the client's known hosts and those
      available on the server. On the server side, an application
      can choose whether or not to enable the sending of this host
      key information.
    * Related to the above, AsyncSSH now allows the configuration of
      multiple server host keys of the same type when the
      send_server_host_keys option is enabled. Only the first key of
      each type will be used in the SSH handshake, but the others can
      appear in the list of supported host keys for clients to begin
      trusting, allowing for smoother key rotation.
    * Fixed logging and typing issues in SFTP high-level copy
      functions. A mix of bytes, str, and PurePath entries are now
      supported in places where a list of file paths is allowed, and
      the type signatures have been updated to reflect that the
      functions accept either a single path or a list of paths.
    * Improved typing on SFTP listdir() function.
    * Reworked the config file parser to improve on a previous fix
      related to handling key/value pairs with an equals delimiter.
    * Improved handling of ciphers deprecated in cryptography 43.0.0.
    * Improved support for use of Windows pathnames in ProxyCommand.
* Fri Aug 09 2024 Dirk Müller <[email protected]>
  - update to 2.15.0:
    * Added experimental support for tunneling of TUN/TAP network
      interfaces on Linux and macOS, allowing for either automatic
      packet forwarding or explicit reading and writing of packets
      sent through the tunnel by the application. Both callback and
      stream APIs are available.
    * Added support for forwarding terminal size and terminal size
      changes when stdin on an SSHServerProcess is redirected to a
      local TTY.
    * Added support for multiple tunnel/ProxyJump hosts. Thanks go
      to Adam Martin for suggesting this enhancement and proposing
      a solution.
    * Added support for OpenSSH lsetstat SFTP extension to set
      attributes on symbolic links on platforms which support that
      and use it to improve symlink handling in the SFTP get, put,
      and copy methods. In addition, a follow_symlinks option has
      been added on various SFTPClient methods which get and set
      these attributes. Thanks go to GitHub user eyalgolan1337 for
      reporting this issue.
    * Added support for password and passphrase arguments to be a
      callable or awaitable, called when performing authentication
      or loading encrypted private keys. Thanks go to GitHub user
      goblin for suggesting this enhancement.
    * Added support for proper flow control when using
      AsyncFileWriter or StreamWriter classes to do SSH process
      redirection. Thanks go to Benjy Wiener for reporting this
      issue and providing feedback on the fix.
    * Added is_closed() method
      SSHClientConnection/SSHServerConnection to return whether the
      associated network connection is closed or not.
    * Added support for setting and matching tags in OpenSSH config
      files.
    * Added an example of using "await" in addition to "async with"
      when opening a new SSHClientConnection. Thanks go to Michael
      Davis for suggesting this added documentation.
    * Improved handling CancelledError in SCP, avoiding an issue
      where AsyncSSH could sometimes get stuck waiting for the
      channel to close. Thanks go to Max Orlov for reporting the
      problem and providing code to reproduce it.
    * Fixed a regression from 2.14.1 related to rekeying an SSH
      connection when there's acitivty on the connection in the
      middle of rekeying. Thanks go to GitHub user eyalgolan1337
      for helping to narrow down this problem and test the fix.
    * Fixed a problem with process redirection when a close is
      received without a preceding EOF. Thanks go to GitHub user
      xuoguoto who helped to provide sample scripts and ran tests
      to help track this down.
    * Fixed the processing of paths in SFTP client symlink
      requests. Thanks go to André Glüpker for reporting the
      problem and providing test code to demonstrate it.
    * Fixed an OpenSSH config file parsing issue. Thanks go to
      Siddh Raman Pant for reporting this issue.
    * Worked around a bug in a user auth banner generated by the
      cryptlib library. Thanks go to GitHub user mmayomoar for
      reporting this issue and suggesting a fix.
* Mon Dec 18 2023 Dirk Müller <[email protected]>
  - update to 2.14.2 (bsc#1218165, CVE-2023-48795):
    * Implemented "strict kex" support and other countermeasures to
    * protect against the Terrapin Attack described in
      CVE-2023-48795
    * Fixed config parser to properly an optional equals delimiter
      in all config arguments.
    * Fixed TCP send error handling to avoid race condition when
      receiving incoming disconnect message.
    * Improved type signature in SSHConnection async context
      manager.
* Fri Nov 10 2023 Dirk Müller <[email protected]>
  - update to 2.14.1 (bsc#1217028, CVE-2023-46445):
    * Hardened AsyncSSH state machine against potential message
      injection attacks, described in more detail in
      `CVE-2023-46445 and CVE-2023-46446
    * Added support for passing in a regex in readuntil in
      SSHReader,
    * Added support for get_addresses() and get_port() methods on
    * SSHAcceptor.
    * Fixed an issue with AsyncFileWriter potentially writing data
    * out of order.
    * Updated testing to include Python 3.12.
    * Updated readthedocs integration to use YAML config file.
* Thu Oct 05 2023 Dirk Müller <[email protected]>
  - update to 2.14.0:
    * Added support for a new accept_handler argument when setting
      up local port forwarding, allowing the client host and port to
      be validated and/or logged for each new forwarded connection.
    * Added an option to disable expensive RSA private key checks
      when using OpenSSL 3.x. Functions that read private keys have
      been modified to include a new unsafe_skip_rsa_key_validation
      argument which can be used to avoid these additional checks,
      if you are loading keys from a trusted source.
    * Added host information into AsyncSSH exceptions when host key
      validation fails, and a few other improvements related to
      X.509 certificate validation errors.
    * Fixed a regression which prevented keys loaded into an SSH
      agent with a certificate from working correctly beginning in
      AsyncSSH after version 2.5.0.
    * Fixed an issue which was triggering an internal exception
      when shutting down server sessions with the line editor enabled
      which could cause some output to be lost on exit, especially when
      running on Windows.
    * Fixed a documentation error in SSHClientConnectionOptions and
      SSHServerConnectionOptions.
* Sat Jul 01 2023 Dirk Müller <[email protected]>
  - update to 2.13.2:
    * Fixed an issue with host-based authentication when using
      proxy_command, allowing it to be used if the caller
      explicitly specifies client_host.
    * Improved handling of signature algorithms for OpenSSH
      certificates so that RSA SHA-2 signatures will work with
      both older and newer versions of OpenSSH.
    * Worked around an issue with some Cisco SSH implementations
      generating invalid "ignore" packets.
    * Fixed unit tests to avoid errors when cryptography's version
      of * OpenSSL disables support for SHA-1 signatures.
    * Fixed unit tests to avoid errors when the filesystem enforces
      that filenames be valid UTF-8 strings.
    * Added documentation about which config options apply when
      passing a string as a tunnel argument.
* Mon Mar 06 2023 Dirk Müller <[email protected]>
  - update to 2.13.1:
    * Updated type definitions for mypy 1.0.0, removing a
      dependency on implicit Optional types, and working around an
      issue that could trigger a mypy internal error.
    * Updated unit tests to avoid calculation of SHA-1 signatures,
      which are no longer allowed in cryptography 39.0.0.
  - drop remove-sha1.patch (upstream)
* Wed Jan 25 2023 Daniel Garcia <[email protected]>
  - Add remove-sha1.patch to make it compatible with latests versions of
    cryptography gh#ronf/asyncssh@fae5a9e8baad
* Thu Jan 05 2023 Dirk Müller <[email protected]>
  - update to 2.13.0:
    * Updated testing and coverage to drop Python 3.6 and add Python 3.11.
    * Added new "recv_eof" option to not pass an EOF from a channel to a
      redirected target, allowing output from multiple SSH sessions to be
      sent and mixed with other direct output to that target.
    * Added new methods to make it easy to perform forwarding between TCP
      ports and UNIX domain sockets.
    * Added a workaround for a problem seen on a Huawei SFTP server where
      it sends an invalid combination of file attribute flags.
    * Fixed an issue with copying files to SFTP servers that don't support
      random access I/O.
    * Fixed an issue when requesting remote port forwarding on a dynamically
      allocated port.
    * Fixed an issue where readexactly could block indefinitely when a signal
      is delivered in the stream before the requested number of bytes are
      available.
    * Fixed an interoperability issue with OpenSSH when using SSH certificates
      with RSA keys with a SHA-2 signature.
    * Fixed an issue with handling "None" in ProxyCommand, GlobalKnownHostsFile,
      and UserKnownHostsFile config file options.
* Fri Sep 23 2022 Yogalakshmi Arunachalam <[email protected]>
  - Update to 2.12.0
    * Fix an issue with SFTP servers which don't support random access I/O
    * Fix "Recceived window change" in log message (#509)
    * Fix forwarding a dynamically allocated port in the server (#512)
    * Fix type of SSHServerProcessFactory
    * Bump version number up to 2.12.0 and update change log
* Thu Aug 04 2022 Otto Hollmann <[email protected]>
  - Update to 2.11.0:
    * Made a number of improvements in SFTP glob support, with thanks to Github
      user LuckyDams for all the help working out these changes!
    * Added a new glob_sftpname() method which returns glob matches together
      with attribute information, avoiding the need for a caller to make
      separate calls to stat() on the returned results.
    * Switched from listdir() to scandir() to reduce the number of stat()
      operations required while finding matches.
    * Added code to remove duplicates when glob() is called with multiple
      patterns that match the same path.
    * Added a cache of directory listing and stat results to improve performance
      when matching patterns with overlapping paths.
    * Fixed an "index out of range" bug in recursive glob matching and aligned
      it better with results reeturned by UNIX shells.
    * Changed matching to ignore inaccessible or non-existent paths in a glob
      pattern, to allow accessible paths to be fully explored before returning
      an error. The error handler will now be called only if a pattern results
      in no matches, or if a more serious error occurs while scanning.
    * Changed SFTP makedirs() method to work better cases where parts of requested
      path already exist but don't allow read access. As long as the entire path
      can be created, makedirs() will succeed, even if some directories on the
      path don't allow their contents to be read. Thanks go to Peter Rowlands for
      providing this fix.
    * Replaced custom Diffie Hellman implementation in AsyncSSH with the one in
      the cryptography package, resulting in an over 10x speedup. Thanks go to
      Github user iwanb for suggesting this change.
    * Fixed AsyncSSH to re-acquire GSS credentials when performing key
      renegotiation to avoid expired credentials on long-lived connections. Thanks
      go to Github user PromyLOPh for pointing out this issue and suggesting a fix.
    * Fixed GSS MIC to work properly with GSS key exchange when AsyncSSH is
      running as a server. This was previously fixed on the client side, but a
      similar fix for the server was missed.
    * Changed connection timeout unit tests to work better in environments where a
      firewall is present. Thanks go to Stefano Rivera for reporting this issue.
    * Improved unit tests of Windows SSPI GSSAPI module.
    * Improved speed of unit tests by reducing the number of key generation calls.
      RSA key generation in particular has gotten much more expensive in OpenSSL 3.
  - Changes from 2.10.1:
    * Added a workaround for a bug in dropbear which can improperly reject
      full-sized data packets when compression is enabled. Thanks go to Matti
      Niemenmaa for reporting this issue and helping to reproduce it.
    * Added support for "Match Exec" in config files and updated AsyncSSH API
      calls to do config parsing in an executor to avoid blocking the event loop
      if a "Match Exec" command doesn't return immediately.
    * Fixed an issue where settings associated with server channels set when
      creating a listener rather than at the time a new channel is opened were not
      always being applied correctly.
    * Fixed config file handling to be more consistent with OpenSSH, making all
      relative paths be evaluated relative to ~/.ssh and allowing references to
      config file patterns which don't match anything to only trigger a debug
      message rather than an error. Thanks go to Caleb Ho for reporting this issue!
    * Updated minimum required version of cryprography package to 3.1, to allow
      calls to it to be made without passing in a "backend" argument. This was
      missed back in the 2.9 release. Thanks go to Github users sebby97 and
      JavaScriptDude for reporting this issue!
  - Changes from 2.10.0:
    * Added new get_server_auth_methods() function which returns the set of auth
      methods available for a given user and SSH server.
    * Added support for new line_echo argument when creating a server channel
      which controls whether input in the line editor is echoed to the output
      immediately or under the control of the application, allowing more control
      over the ordering of input and output.
    * Added explicit support for RSA SHA-2 certificate algorithms. Previously
      SHA-2 signatures were supported using the original
      [email protected] algorithm name, but recent versions of SSH now
      disable this algorithm by default, so the new SHA-2 algorithm names need to
      be advertised for SHA-2 signatures to work when using OpenSSH certificates.
    * Improved handling of config file loading when options argument is used
      allowing config loading to be overridden at connect() time even if the
      options passed in referenced a config file.
    * Improved speed of unit tests by avoiding some network timeouts when
      connecting to invalid addresses.
    * Merged GitHub workflows contributed by GitHub user hexchain to run unit
      tests and collect code coverage information on multiple platforms and Python
      versions. Thanks so much for this work!
    * Fixed issue with GSS auth unit tests hanging on Windows.
    * Fixed issue with known_hosts matching when ProxyJump is being used. Thanks
      go to GitHub user velavokr for reporting this and helping to debug it.
    * Fixed type annotations for SFTP client and server open methods. Thanks go to
      Marat Sharafutdinov for reporting this!
* Mon Jan 31 2022 Steve Kowalik <[email protected]>
  - Skip more tests that are unstable.
* Fri Jan 28 2022 Matej Cepl <[email protected]>
  - Update to 2.9.0:
    - Added mypy-compatible type annotations to all AsyncSSH
      modules, and a "py.typed" file to signal that annotations are
      now available for this package.
    - Added experimental support for SFTP versions 4-6. While
      AsyncSSH still defaults to only advertising version 3 when
      acting as both a client and a server, applications can
      explicitly enable support for later versions, which will be
      used if both ends of the connection agree. Not all features
      are fully supported, but a number of useful enhancements are
      now available, including as users and groups specified by
      name, higher resolution timestamps, and more granular error
      reporting.
    - Updated documentation to make it clear that keys from
      a PKCS11 provider or ssh-agent will be used even when
      client_keys is specified, unless those sources are explicitly
      disabled.
    - Improved handling of task cancellation in AsyncSSH to
      avoid triggering an error of "Future exception was never
      retrieved". Thanks go to Krzysztof Kotlenga for reporting
      this issue and providing test code to reliably reproduce it.
    - Changed implementation of OpenSSH keepalive handler to
      improve interoperability with servers which don't expect a
      "success" response when this message is sent.
* Fri Dec 17 2021 Michael Ströder <[email protected]>
  - Update to v2.8.1
    Way too many changes to be listed here.
  - use pytest to exclude test_connect_timeout_exceeded_* due to
    OBS network restrictions
* Fri Sep 17 2021 Dominique Leuenberger <[email protected]>
  - Do not build for python 3.6: the required dependency uvloop does
    no longer support Python 3.6 since version 0.16.
* Mon Feb 22 2021 John Vandenberg <[email protected]>
  - Update URL
  - Add missing test dependencis fido2 and libnettle8
  - Recommend libnettle8
  - Update to v2.5.0
    * Added support for limiting which identities in an SSH agent
      will be used when making a connection, via a new
      "agent_identities" config option. This change also adds
      compatibility with the OpenSSL config file option "IdentitiesOnly".
    * Added support for including Subject Key Identifier and
      Authority Key Identifier extensions in generated
      X.509 certificates to better comply with RFC 5280.
    * Added support for makedirs() and rmtree() methods in the
      AsyncSSH SFTP client, as well as a new scandir() method
      which returns an async iterator to more efficiently process
      very large directories.
    * Significantly reworked AsyncSSH line editor support to
      improve its performance by several orders of magnitude on
      long input lines, and added a configurable maximum line
      length when the editor is in use to avoid potential
      denial-of-service attacks. This limit defaults to 1024 bytes,
      but with the improvements it can reasonably handle lines
      which are megabytes in size if needed.
    * Changed AsyncSSH to allow SSH agent identities to still be
      used when an explicit list of client keys is specified, for
      better compatibility with OpenSSH. The previous behavior
      can still be achieved by explicitly setting the agent_path
      option to None when setting client_keys.
    * Changed AsyncSSH to enforce a limit of 1024 characters on
      usernames when acting as a server to avoid a potential
      denial-of-service issue related to SASLprep username
      normalization.
    * Changed SCP implementation to explicitly yield to other
      coroutines when sending a large file to better share an
      event loop.
    * Fixed a few potential race conditions related to cleanup of
      objects during connection close.
    * Re-applied a previous fix which was unintentionally lost to
      allow Pageant to be used by default on Windows.
  - from v2.4.2
    * Fixed a potential race condition when receiving EOF right
      after a channel is opened.
    * Fixed a couple of issues related to the error_handler and
      progress_handler callbacks in AsyncSSH SFTP/SCP.
    * Fixed a couple of issues related to using pathlib objects
      with AsyncSSH SCP.
  - from v2.4.1
    * Fixed SCP server to send back an exit status when closing the
      SSH channel, since the OpenSSH scp client returns this status
      to the shell which executed it.
    * Fixed listeners created by forward_local_port(),
      forward_local_path(), and forward_socks() to automatically
      close when the SSH connection closes, unblocking any
      wait_closed() calls which are in progress.
    * Fixed a potential exception that could trigger when the SSH
      connection is closed while authentication is in progress.
    * Fixed tunnel connect code to properly clean up an implicitly
      created tunnel when a failure occurs in trying to open a
      connection over that tunnel.
  - from v2.4.0
    * Added support for accessing keys through a PKCS#11 provider,
      allowing keys on PIV security tokens to be used directly by
      AsyncSSH without the need to run an SSH agent. X.509
      certificates can also be retrieved from the security token
      and used with SSH servers which support that.
    * Added support for using Ed25519 and Ed448 keys in X.509
      certificates, and the corresponding SSH certificate and
      signature algorithms. Certificates can use these keys as
      either subject keys or signing keys, and certificates can
      be generated by either AsyncSSH or by OpenSSL version 1.1.1
      or later.
    * Added support for feed_data() and feed_eof() methods in
      SSHReader, mirroring methods of the same name in asyncio's
      StreamReader to improve interoperability between the two APIs.
    * Updated unit tests to test interoperability with OpenSSL 1.1.1
      when reading and writing Ed25519 and Ed448 public and private
      key files. Previously, due to lack of support in OpenSSL,
      AsyncSSH could only test against OpenSSH, and only in OpenSSH
      key formats. With OpenSSL 1.1.1, testing is now also done
      using PKCS#8 format.
    * Fixed config file parser to properly ignore all comment lines,
      even if the lines contain unbalanced quotes.
    * Removed a note about the lack of a timeout parameter in the
      AsyncSSH connect() method, now that it supports a login_timeout
      argument.

Files

/usr/lib/python3.13/site-packages/asyncssh
/usr/lib/python3.13/site-packages/asyncssh-2.18.0-py3.13.egg-info
/usr/lib/python3.13/site-packages/asyncssh-2.18.0-py3.13.egg-info/PKG-INFO
/usr/lib/python3.13/site-packages/asyncssh-2.18.0-py3.13.egg-info/SOURCES.txt
/usr/lib/python3.13/site-packages/asyncssh-2.18.0-py3.13.egg-info/dependency_links.txt
/usr/lib/python3.13/site-packages/asyncssh-2.18.0-py3.13.egg-info/requires.txt
/usr/lib/python3.13/site-packages/asyncssh-2.18.0-py3.13.egg-info/top_level.txt
/usr/lib/python3.13/site-packages/asyncssh/__init__.py
/usr/lib/python3.13/site-packages/asyncssh/__pycache__
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/__init__.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/__init__.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/agent.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/agent.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/agent_unix.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/agent_unix.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/agent_win32.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/agent_win32.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/asn1.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/asn1.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/auth.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/auth.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/auth_keys.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/auth_keys.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/channel.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/channel.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/client.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/client.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/compression.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/compression.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/config.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/config.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/connection.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/connection.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/constants.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/constants.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/dsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/dsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/ecdsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/ecdsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/eddsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/eddsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/editor.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/editor.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/encryption.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/encryption.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/forward.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/forward.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/gss.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/gss.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/gss_unix.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/gss_unix.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/gss_win32.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/gss_win32.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/kex.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/kex.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/kex_dh.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/kex_dh.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/kex_rsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/kex_rsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/keysign.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/keysign.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/known_hosts.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/known_hosts.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/listener.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/listener.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/logging.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/logging.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/mac.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/mac.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/misc.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/misc.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/packet.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/packet.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/pattern.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/pattern.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/pbe.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/pbe.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/pkcs11.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/pkcs11.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/process.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/process.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/public_key.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/public_key.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/rsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/rsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/saslprep.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/saslprep.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/scp.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/scp.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/server.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/server.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/session.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/session.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/sftp.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/sftp.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/sk.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/sk.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/sk_ecdsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/sk_ecdsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/sk_eddsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/sk_eddsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/socks.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/socks.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/stream.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/stream.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/subprocess.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/subprocess.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/tuntap.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/tuntap.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/version.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/version.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/x11.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/__pycache__/x11.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/agent.py
/usr/lib/python3.13/site-packages/asyncssh/agent_unix.py
/usr/lib/python3.13/site-packages/asyncssh/agent_win32.py
/usr/lib/python3.13/site-packages/asyncssh/asn1.py
/usr/lib/python3.13/site-packages/asyncssh/auth.py
/usr/lib/python3.13/site-packages/asyncssh/auth_keys.py
/usr/lib/python3.13/site-packages/asyncssh/channel.py
/usr/lib/python3.13/site-packages/asyncssh/client.py
/usr/lib/python3.13/site-packages/asyncssh/compression.py
/usr/lib/python3.13/site-packages/asyncssh/config.py
/usr/lib/python3.13/site-packages/asyncssh/connection.py
/usr/lib/python3.13/site-packages/asyncssh/constants.py
/usr/lib/python3.13/site-packages/asyncssh/crypto
/usr/lib/python3.13/site-packages/asyncssh/crypto/__init__.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/__init__.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/__init__.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/chacha.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/chacha.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/cipher.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/cipher.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/dh.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/dh.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/dsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/dsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/ec.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/ec.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/ec_params.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/ec_params.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/ed.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/ed.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/kdf.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/kdf.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/misc.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/misc.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/pq.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/pq.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/rsa.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/rsa.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/umac.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/umac.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/x509.cpython-313.opt-1.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/__pycache__/x509.cpython-313.pyc
/usr/lib/python3.13/site-packages/asyncssh/crypto/chacha.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/cipher.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/dh.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/dsa.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/ec.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/ec_params.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/ed.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/kdf.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/misc.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/pq.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/rsa.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/umac.py
/usr/lib/python3.13/site-packages/asyncssh/crypto/x509.py
/usr/lib/python3.13/site-packages/asyncssh/dsa.py
/usr/lib/python3.13/site-packages/asyncssh/ecdsa.py
/usr/lib/python3.13/site-packages/asyncssh/eddsa.py
/usr/lib/python3.13/site-packages/asyncssh/editor.py
/usr/lib/python3.13/site-packages/asyncssh/encryption.py
/usr/lib/python3.13/site-packages/asyncssh/forward.py
/usr/lib/python3.13/site-packages/asyncssh/gss.py
/usr/lib/python3.13/site-packages/asyncssh/gss_unix.py
/usr/lib/python3.13/site-packages/asyncssh/gss_win32.py
/usr/lib/python3.13/site-packages/asyncssh/kex.py
/usr/lib/python3.13/site-packages/asyncssh/kex_dh.py
/usr/lib/python3.13/site-packages/asyncssh/kex_rsa.py
/usr/lib/python3.13/site-packages/asyncssh/keysign.py
/usr/lib/python3.13/site-packages/asyncssh/known_hosts.py
/usr/lib/python3.13/site-packages/asyncssh/listener.py
/usr/lib/python3.13/site-packages/asyncssh/logging.py
/usr/lib/python3.13/site-packages/asyncssh/mac.py
/usr/lib/python3.13/site-packages/asyncssh/misc.py
/usr/lib/python3.13/site-packages/asyncssh/packet.py
/usr/lib/python3.13/site-packages/asyncssh/pattern.py
/usr/lib/python3.13/site-packages/asyncssh/pbe.py
/usr/lib/python3.13/site-packages/asyncssh/pkcs11.py
/usr/lib/python3.13/site-packages/asyncssh/process.py
/usr/lib/python3.13/site-packages/asyncssh/public_key.py
/usr/lib/python3.13/site-packages/asyncssh/py.typed
/usr/lib/python3.13/site-packages/asyncssh/rsa.py
/usr/lib/python3.13/site-packages/asyncssh/saslprep.py
/usr/lib/python3.13/site-packages/asyncssh/scp.py
/usr/lib/python3.13/site-packages/asyncssh/server.py
/usr/lib/python3.13/site-packages/asyncssh/session.py
/usr/lib/python3.13/site-packages/asyncssh/sftp.py
/usr/lib/python3.13/site-packages/asyncssh/sk.py
/usr/lib/python3.13/site-packages/asyncssh/sk_ecdsa.py
/usr/lib/python3.13/site-packages/asyncssh/sk_eddsa.py
/usr/lib/python3.13/site-packages/asyncssh/socks.py
/usr/lib/python3.13/site-packages/asyncssh/stream.py
/usr/lib/python3.13/site-packages/asyncssh/subprocess.py
/usr/lib/python3.13/site-packages/asyncssh/tuntap.py
/usr/lib/python3.13/site-packages/asyncssh/version.py
/usr/lib/python3.13/site-packages/asyncssh/x11.py
/usr/share/doc/packages/python313-asyncssh
/usr/share/doc/packages/python313-asyncssh/README.rst
/usr/share/licenses/python313-asyncssh
/usr/share/licenses/python313-asyncssh/COPYRIGHT
/usr/share/licenses/python313-asyncssh/LICENSE


Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Dec 2 00:38:50 2024