mirror of
https://github.com/hierynomus/sshj.git
synced 2025-12-08 16:18:05 +03:00
Compare commits
50 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
265e9d2916 | ||
|
|
0b6552654b | ||
|
|
dabe43dfdc | ||
|
|
0f67fa2541 | ||
|
|
54018a4a81 | ||
|
|
ca81c2eea4 | ||
|
|
048f84b42a | ||
|
|
8ca6451d5d | ||
|
|
5e1be8b1b0 | ||
|
|
bc4da2ea8e | ||
|
|
09fb2b9dc2 | ||
|
|
4045d5a7ef | ||
|
|
d0daa2c12f | ||
|
|
64a2a4f779 | ||
|
|
7cb1f8b11c | ||
|
|
73bc785ab4 | ||
|
|
9d697ede12 | ||
|
|
2b62492caf | ||
|
|
a0f1aa7e2c | ||
|
|
0e981f7656 | ||
|
|
a014567c9e | ||
|
|
8454cf1a0c | ||
|
|
663f118d0f | ||
|
|
47d73a9381 | ||
|
|
c4552d5f3d | ||
|
|
7a884d0938 | ||
|
|
661f63eab7 | ||
|
|
a71a7d7d33 | ||
|
|
d2e0f50d0c | ||
|
|
b41f0acd19 | ||
|
|
a1f501a027 | ||
|
|
fef9cfaf79 | ||
|
|
c67ae242f2 | ||
|
|
823f1e5759 | ||
|
|
f046a41750 | ||
|
|
c161fe26f6 | ||
|
|
ec46a7a489 | ||
|
|
762d088388 | ||
|
|
99c85672b8 | ||
|
|
28d57840ab | ||
|
|
2984291d84 | ||
|
|
bdbd9d7eb5 | ||
|
|
9ac55de26c | ||
|
|
a9928c2882 | ||
|
|
c6c9a3f6a8 | ||
|
|
0918bc626f | ||
|
|
aa7748395d | ||
|
|
cf077e2a4f | ||
|
|
c58c7c7c60 | ||
|
|
0b548d9d13 |
1
.gitignore
vendored
1
.gitignore
vendored
@@ -10,6 +10,7 @@
|
|||||||
.settings/
|
.settings/
|
||||||
|
|
||||||
# Output dirs
|
# Output dirs
|
||||||
|
out/
|
||||||
target/
|
target/
|
||||||
classes/
|
classes/
|
||||||
build/
|
build/
|
||||||
|
|||||||
29
.travis.yml
29
.travis.yml
@@ -1,5 +1,30 @@
|
|||||||
language: java
|
language: java
|
||||||
sudo: false
|
dist: trusty
|
||||||
|
sudo: required
|
||||||
|
|
||||||
|
services:
|
||||||
|
- docker
|
||||||
|
|
||||||
jdk:
|
jdk:
|
||||||
- oraclejdk7
|
|
||||||
- oraclejdk8
|
- oraclejdk8
|
||||||
|
- openjdk8
|
||||||
|
- oraclejdk9
|
||||||
|
|
||||||
|
before_cache:
|
||||||
|
- rm -f $HOME/.gradle/caches/modules-2/modules-2.lock
|
||||||
|
- rm -fr $HOME/.gradle/caches/*/plugin-resolution/
|
||||||
|
|
||||||
|
cache:
|
||||||
|
directories:
|
||||||
|
- $HOME/.gradle/caches/
|
||||||
|
- $HOME/.gradle/wrapper/
|
||||||
|
|
||||||
|
before_install:
|
||||||
|
- pip install --user codecov
|
||||||
|
|
||||||
|
script:
|
||||||
|
- ./gradlew check
|
||||||
|
- ./gradlew integrationTest
|
||||||
|
|
||||||
|
after_success:
|
||||||
|
- codecov
|
||||||
|
|||||||
11
README.adoc
11
README.adoc
@@ -1,11 +1,14 @@
|
|||||||
= sshj - SSHv2 library for Java
|
= sshj - SSHv2 library for Java
|
||||||
Jeroen van Erp
|
Jeroen van Erp
|
||||||
:sshj_groupid: com.hierynomus
|
:sshj_groupid: com.hierynomus
|
||||||
:sshj_version: 0.21.1
|
:sshj_version: 0.23.0
|
||||||
:source-highlighter: pygments
|
:source-highlighter: pygments
|
||||||
|
|
||||||
|
image:https://api.bintray.com/packages/hierynomus/maven/sshj/images/download.svg[link="https://bintray.com/hierynomus/maven/sshj/_latestVersion"]
|
||||||
image:https://travis-ci.org/hierynomus/sshj.svg?branch=master[link="https://travis-ci.org/hierynomus/sshj"]
|
image:https://travis-ci.org/hierynomus/sshj.svg?branch=master[link="https://travis-ci.org/hierynomus/sshj"]
|
||||||
image:https://api.codacy.com/project/badge/Grade/14a0a316bb9149739b5ea26dbfa8da8a["Codacy code quality", link="https://www.codacy.com/app/jeroen_2/sshj?utm_source=github.com&utm_medium=referral&utm_content=hierynomus/sshj&utm_campaign=Badge_Grade"]
|
image:https://api.codacy.com/project/badge/Grade/14a0a316bb9149739b5ea26dbfa8da8a["Codacy code quality", link="https://www.codacy.com/app/jeroen_2/sshj?utm_source=github.com&utm_medium=referral&utm_content=hierynomus/sshj&utm_campaign=Badge_Grade"]
|
||||||
|
image:https://codecov.io/gh/hierynomus/sshj/branch/master/graph/badge.svg["codecov", link="https://codecov.io/gh/hierynomus/sshj"]
|
||||||
|
image:http://www.javadoc.io/badge/com.hierynomus/sshj.svg?color=blue["JavaDocs", link="http://www.javadoc.io/doc/com.hierynomus/sshj"]
|
||||||
image:https://maven-badges.herokuapp.com/maven-central/com.hierynomus/sshj/badge.svg["Maven Central",link="https://maven-badges.herokuapp.com/maven-central/com.hierynomus/sshj"]
|
image:https://maven-badges.herokuapp.com/maven-central/com.hierynomus/sshj/badge.svg["Maven Central",link="https://maven-badges.herokuapp.com/maven-central/com.hierynomus/sshj"]
|
||||||
image:https://javadoc-emblem.rhcloud.com/doc/com.hierynomus/sshj/badge.svg["Javadoc",link="http://www.javadoc.io/doc/com.hierynomus/sshj"]
|
image:https://javadoc-emblem.rhcloud.com/doc/com.hierynomus/sshj/badge.svg["Javadoc",link="http://www.javadoc.io/doc/com.hierynomus/sshj"]
|
||||||
|
|
||||||
@@ -104,6 +107,12 @@ Google Group: http://groups.google.com/group/sshj-users
|
|||||||
Fork away!
|
Fork away!
|
||||||
|
|
||||||
== Release history
|
== Release history
|
||||||
|
SSHJ 0.23.0 (2017-10-13)::
|
||||||
|
* Merged https://github.com/hierynomus/sshj/pulls/372[#372]: Upgrade to 'net.i2p.crypto:eddsa:0.2.0'
|
||||||
|
* Fixed https://github.com/hierynomus/sshj/issues/355[#355] and https://github.com/hierynomus/sshj/issues/354[#354]: Correctly decode signature bytes
|
||||||
|
* Fixed https://github.com/hierynomus/sshj/issues/365[#365]: Added support for new-style OpenSSH fingerprints of server keys
|
||||||
|
* Fixed https://github.com/hierynomus/sshj/issues/356[#356]: Fixed key type detection for ECDSA public keys
|
||||||
|
* Made SSHJ Java9 compatible
|
||||||
SSHJ 0.22.0 (2017-08-24)::
|
SSHJ 0.22.0 (2017-08-24)::
|
||||||
* Fixed https://github.com/hierynomus/sshj/pulls/341[#341]: Fixed path walking during recursive copy
|
* Fixed https://github.com/hierynomus/sshj/pulls/341[#341]: Fixed path walking during recursive copy
|
||||||
* Merged https://github.com/hierynomus/sshj/pulls/338[#338]: Added ConsolePasswordFinder to read password from stdin
|
* Merged https://github.com/hierynomus/sshj/pulls/338[#338]: Added ConsolePasswordFinder to read password from stdin
|
||||||
|
|||||||
115
build.gradle
115
build.gradle
@@ -1,22 +1,32 @@
|
|||||||
import java.text.SimpleDateFormat
|
import java.text.SimpleDateFormat
|
||||||
|
import com.bmuschko.gradle.docker.tasks.container.*
|
||||||
|
import com.bmuschko.gradle.docker.tasks.image.*
|
||||||
|
|
||||||
plugins {
|
plugins {
|
||||||
id "java"
|
id "java"
|
||||||
id "groovy"
|
id "groovy"
|
||||||
|
id "jacoco"
|
||||||
id "osgi"
|
id "osgi"
|
||||||
id "maven-publish"
|
id "maven-publish"
|
||||||
id "org.ajoberstar.release-opinion" version "1.4.2"
|
id "com.bmuschko.docker-remote-api" version "3.2.1"
|
||||||
|
id 'pl.allegro.tech.build.axion-release' version '1.8.1'
|
||||||
id "com.github.hierynomus.license" version "0.12.1"
|
id "com.github.hierynomus.license" version "0.12.1"
|
||||||
id "com.jfrog.bintray" version "1.7"
|
id "com.jfrog.bintray" version "1.7"
|
||||||
id 'ru.vyarus.pom' version '1.0.3'
|
id 'ru.vyarus.java-lib' version '1.0.5'
|
||||||
|
// id 'ru.vyarus.pom' version '1.0.3'
|
||||||
id 'ru.vyarus.github-info' version '1.1.0'
|
id 'ru.vyarus.github-info' version '1.1.0'
|
||||||
|
id 'ru.vyarus.animalsniffer' version '1.4.2'
|
||||||
}
|
}
|
||||||
|
|
||||||
group = "com.hierynomus"
|
group = "com.hierynomus"
|
||||||
|
|
||||||
defaultTasks "build"
|
defaultTasks "build"
|
||||||
|
|
||||||
repositories {
|
repositories {
|
||||||
mavenCentral()
|
mavenCentral()
|
||||||
|
maven {
|
||||||
|
url "https://dl.bintray.com/mockito/maven/"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
sourceCompatibility = 1.6
|
sourceCompatibility = 1.6
|
||||||
@@ -24,19 +34,21 @@ targetCompatibility = 1.6
|
|||||||
|
|
||||||
configurations.compile.transitive = false
|
configurations.compile.transitive = false
|
||||||
|
|
||||||
def bouncycastleVersion = "1.56"
|
def bouncycastleVersion = "1.57"
|
||||||
|
|
||||||
dependencies {
|
dependencies {
|
||||||
|
signature 'org.codehaus.mojo.signature:java16:1.1@signature'
|
||||||
|
|
||||||
compile "org.slf4j:slf4j-api:1.7.7"
|
compile "org.slf4j:slf4j-api:1.7.7"
|
||||||
compile "org.bouncycastle:bcprov-jdk15on:$bouncycastleVersion"
|
compile "org.bouncycastle:bcprov-jdk15on:$bouncycastleVersion"
|
||||||
compile "org.bouncycastle:bcpkix-jdk15on:$bouncycastleVersion"
|
compile "org.bouncycastle:bcpkix-jdk15on:$bouncycastleVersion"
|
||||||
compile "com.jcraft:jzlib:1.1.3"
|
compile "com.jcraft:jzlib:1.1.3"
|
||||||
|
|
||||||
compile "net.i2p.crypto:eddsa:0.1.0"
|
compile "net.i2p.crypto:eddsa:0.2.0"
|
||||||
|
|
||||||
testCompile "junit:junit:4.11"
|
testCompile "junit:junit:4.11"
|
||||||
testCompile 'org.spockframework:spock-core:1.0-groovy-2.4'
|
testCompile 'org.spockframework:spock-core:1.0-groovy-2.4'
|
||||||
testCompile "org.mockito:mockito-core:2.8.47"
|
testCompile "org.mockito:mockito-core:2.9.2"
|
||||||
testCompile "org.apache.sshd:sshd-core:1.2.0"
|
testCompile "org.apache.sshd:sshd-core:1.2.0"
|
||||||
testRuntime "ch.qos.logback:logback-classic:1.1.2"
|
testRuntime "ch.qos.logback:logback-classic:1.1.2"
|
||||||
testCompile 'org.glassfish.grizzly:grizzly-http-server:2.3.17'
|
testCompile 'org.glassfish.grizzly:grizzly-http-server:2.3.17'
|
||||||
@@ -53,14 +65,19 @@ license {
|
|||||||
excludes(['**/djb/Curve25519.java', '**/sshj/common/Base64.java'])
|
excludes(['**/djb/Curve25519.java', '**/sshj/common/Base64.java'])
|
||||||
}
|
}
|
||||||
|
|
||||||
if (project.file('.git').isDirectory()) {
|
scmVersion {
|
||||||
release {
|
tag {
|
||||||
grgit = org.ajoberstar.grgit.Grgit.open(project.projectDir)
|
prefix = 'v'
|
||||||
|
versionSeparator = ''
|
||||||
|
}
|
||||||
|
hooks {
|
||||||
|
pre 'fileUpdate', [file: 'README.adoc', pattern: { v, c -> /:sshj_version: .*/}, replacement: { v, c -> ":sshj_version: $v" }]
|
||||||
|
pre 'commit'
|
||||||
}
|
}
|
||||||
} else {
|
|
||||||
version = "0.0.0-no.git"
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
project.version = scmVersion.version
|
||||||
|
|
||||||
// This disables the pedantic doclint feature of JDK8
|
// This disables the pedantic doclint feature of JDK8
|
||||||
if (JavaVersion.current().isJava8Compatible()) {
|
if (JavaVersion.current().isJava8Compatible()) {
|
||||||
tasks.withType(Javadoc) {
|
tasks.withType(Javadoc) {
|
||||||
@@ -78,7 +95,6 @@ task writeSshjVersionProperties {
|
|||||||
}
|
}
|
||||||
|
|
||||||
jar.dependsOn writeSshjVersionProperties
|
jar.dependsOn writeSshjVersionProperties
|
||||||
|
|
||||||
jar {
|
jar {
|
||||||
manifest {
|
manifest {
|
||||||
// please see http://bnd.bndtools.org/chapters/390-wrapping.html
|
// please see http://bnd.bndtools.org/chapters/390-wrapping.html
|
||||||
@@ -99,14 +115,7 @@ jar {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
task javadocJar(type: Jar) {
|
sourcesJar {
|
||||||
classifier = 'javadoc'
|
|
||||||
from javadoc
|
|
||||||
}
|
|
||||||
|
|
||||||
task sourcesJar(type: Jar) {
|
|
||||||
classifier = 'sources'
|
|
||||||
from sourceSets.main.allSource
|
|
||||||
manifest {
|
manifest {
|
||||||
attributes(
|
attributes(
|
||||||
// Add the needed OSGI attributes
|
// Add the needed OSGI attributes
|
||||||
@@ -119,6 +128,27 @@ task sourcesJar(type: Jar) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
configurations {
|
||||||
|
integrationTestCompile.extendsFrom testCompile
|
||||||
|
integrationTestRuntime.extendsFrom testRuntime
|
||||||
|
}
|
||||||
|
|
||||||
|
sourceSets {
|
||||||
|
integrationTest {
|
||||||
|
groovy {
|
||||||
|
compileClasspath += sourceSets.main.output + sourceSets.test.output
|
||||||
|
runtimeClasspath += sourceSets.main.output + sourceSets.test.output
|
||||||
|
srcDir file('src/itest/groovy')
|
||||||
|
}
|
||||||
|
resources.srcDir file('src/itest/resources')
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
task integrationTest(type: Test) {
|
||||||
|
testClassesDirs = sourceSets.integrationTest.output.classesDirs
|
||||||
|
classpath = sourceSets.integrationTest.runtimeClasspath
|
||||||
|
}
|
||||||
|
|
||||||
tasks.withType(Test) {
|
tasks.withType(Test) {
|
||||||
testLogging {
|
testLogging {
|
||||||
exceptionFormat = 'full'
|
exceptionFormat = 'full'
|
||||||
@@ -185,21 +215,12 @@ pom {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
publishing.publications {
|
|
||||||
Sshj(MavenPublication) {
|
|
||||||
from components.java
|
|
||||||
artifact sourcesJar
|
|
||||||
artifact javadocJar
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
if (project.hasProperty("bintrayUsername") && project.hasProperty("bintrayApiKey")) {
|
if (project.hasProperty("bintrayUsername") && project.hasProperty("bintrayApiKey")) {
|
||||||
bintray {
|
bintray {
|
||||||
user = project.property("bintrayUsername")
|
user = project.property("bintrayUsername")
|
||||||
key = project.property("bintrayApiKey")
|
key = project.property("bintrayApiKey")
|
||||||
publish = true
|
publish = true
|
||||||
publications = ["Sshj"]
|
publications = ["maven"]
|
||||||
pkg {
|
pkg {
|
||||||
repo = "maven"
|
repo = "maven"
|
||||||
name = project.name
|
name = project.name
|
||||||
@@ -226,4 +247,38 @@ if (project.hasProperty("bintrayUsername") && project.hasProperty("bintrayApiKey
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
project.tasks.release.dependsOn([project.tasks.build, project.tasks.bintrayUpload])
|
jacocoTestReport {
|
||||||
|
reports {
|
||||||
|
xml.enabled true
|
||||||
|
html.enabled true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
task buildItestImage(type: DockerBuildImage) {
|
||||||
|
inputDir = file('src/itest/docker-image')
|
||||||
|
tag = 'sshj/sshd-itest'
|
||||||
|
}
|
||||||
|
|
||||||
|
task createItestContainer(type: DockerCreateContainer) {
|
||||||
|
dependsOn buildItestImage
|
||||||
|
targetImageId { buildItestImage.getImageId() }
|
||||||
|
portBindings = ['2222:22']
|
||||||
|
}
|
||||||
|
|
||||||
|
task startItestContainer(type: DockerStartContainer) {
|
||||||
|
dependsOn createItestContainer
|
||||||
|
targetContainerId { createItestContainer.getContainerId() }
|
||||||
|
}
|
||||||
|
|
||||||
|
task stopItestContainer(type: DockerStopContainer) {
|
||||||
|
targetContainerId { createItestContainer.getContainerId() }
|
||||||
|
}
|
||||||
|
|
||||||
|
project.tasks.integrationTest.dependsOn(startItestContainer)
|
||||||
|
project.tasks.integrationTest.finalizedBy(stopItestContainer)
|
||||||
|
|
||||||
|
project.tasks.release.dependsOn([project.tasks.integrationTest, project.tasks.build])
|
||||||
|
project.tasks.release.finalizedBy(project.tasks.bintrayUpload)
|
||||||
|
project.tasks.jacocoTestReport.dependsOn(project.tasks.test)
|
||||||
|
project.tasks.check.dependsOn(project.tasks.jacocoTestReport)
|
||||||
|
|||||||
2
gradle/wrapper/gradle-wrapper.properties
vendored
2
gradle/wrapper/gradle-wrapper.properties
vendored
@@ -3,4 +3,4 @@ distributionBase=GRADLE_USER_HOME
|
|||||||
distributionPath=wrapper/dists
|
distributionPath=wrapper/dists
|
||||||
zipStoreBase=GRADLE_USER_HOME
|
zipStoreBase=GRADLE_USER_HOME
|
||||||
zipStorePath=wrapper/dists
|
zipStorePath=wrapper/dists
|
||||||
distributionUrl=https\://services.gradle.org/distributions/gradle-4.0-all.zip
|
distributionUrl=https\://services.gradle.org/distributions/gradle-4.3-all.zip
|
||||||
|
|||||||
16
src/itest/docker-image/Dockerfile
Normal file
16
src/itest/docker-image/Dockerfile
Normal file
@@ -0,0 +1,16 @@
|
|||||||
|
FROM sickp/alpine-sshd:7.5
|
||||||
|
|
||||||
|
ADD id_rsa.pub /home/sshj/.ssh/authorized_keys
|
||||||
|
|
||||||
|
ADD test-container/ssh_host_ecdsa_key /etc/ssh/ssh_host_ecdsa_key
|
||||||
|
ADD test-container/ssh_host_ecdsa_key.pub /etc/ssh/ssh_host_ecdsa_key.pub
|
||||||
|
|
||||||
|
RUN \
|
||||||
|
echo "root:smile" | chpasswd && \
|
||||||
|
adduser -D -s /bin/ash sshj && \
|
||||||
|
passwd -u sshj && \
|
||||||
|
chmod 600 /home/sshj/.ssh/authorized_keys && \
|
||||||
|
chmod 600 /etc/ssh/ssh_host_ecdsa_key && \
|
||||||
|
chmod 644 /etc/ssh/ssh_host_ecdsa_key.pub && \
|
||||||
|
chown -R sshj:sshj /home/sshj
|
||||||
|
|
||||||
1
src/itest/docker-image/id_rsa.pub
Normal file
1
src/itest/docker-image/id_rsa.pub
Normal file
@@ -0,0 +1 @@
|
|||||||
|
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAoZ9l6Tkm2aL1tSBy2yw4xU5s8BE9MfqS/4J7DzvsYJxF6oQmTIjmStuhH/CT7UjuDtKXdXZUsIhKtafiizxGO8kHSzKDeitpth2RSr8ddMzZKyD6RNs7MfsgjA3UTtrrSrCXEY6O43S2cnuJrWzkPxtwxaQ3zOvDbS2tiulzyq0VzYmuhA/a4CyuQtJBuu+P2oqmu6pU/VB6IzONpvBvYbNPsH1WDmP7zko5wHPihXPCliztspKxS4DRtOZ7BGXyvg44UmIy0Kf4jOkaBV/eCCA4qH7ZHz71/5ceMOpszPcNOEmLGGYhwI+P3OuGMpkrSAv1f8IY6R8spZNncP6UaQ== no-passphrase
|
||||||
5
src/itest/docker-image/test-container/ssh_host_ecdsa_key
Normal file
5
src/itest/docker-image/test-container/ssh_host_ecdsa_key
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIOpOBFjqe0hjK/hs4WZ3dZqnzanq1L3/JbvV1TCkbe4ToAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEVzkrS7Yj0nXML7A3mE08YDthfBR/ZbyYJDIq1vTzcqs6KTaCT529
|
||||||
|
swNXWLHO+mbHviZcRiI57ULXHZ1emom/Jw==
|
||||||
|
-----END EC PRIVATE KEY-----
|
||||||
@@ -0,0 +1 @@
|
|||||||
|
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFc5K0u2I9J1zC+wN5hNPGA7YXwUf2W8mCQyKtb083KrOik2gk+dvbMDV1ixzvpmx74mXEYiOe1C1x2dXpqJvyc= root@404b27be2bf4
|
||||||
@@ -0,0 +1,36 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package com.hierynomus.sshj
|
||||||
|
|
||||||
|
import net.schmizz.sshj.DefaultConfig
|
||||||
|
import net.schmizz.sshj.SSHClient
|
||||||
|
import net.schmizz.sshj.transport.verification.PromiscuousVerifier
|
||||||
|
import spock.lang.Specification
|
||||||
|
|
||||||
|
class IntegrationBaseSpec extends Specification {
|
||||||
|
protected static final int DOCKER_PORT = 2222;
|
||||||
|
protected static final String USERNAME = "sshj";
|
||||||
|
protected final static String SERVER_IP = System.getProperty("serverIP", "127.0.0.1");
|
||||||
|
|
||||||
|
protected static SSHClient getConnectedClient() throws IOException {
|
||||||
|
SSHClient sshClient = new SSHClient(new DefaultConfig());
|
||||||
|
sshClient.addHostKeyVerifier(new PromiscuousVerifier());
|
||||||
|
sshClient.connect(SERVER_IP, DOCKER_PORT);
|
||||||
|
|
||||||
|
return sshClient;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
71
src/itest/groovy/com/hierynomus/sshj/IntegrationSpec.groovy
Normal file
71
src/itest/groovy/com/hierynomus/sshj/IntegrationSpec.groovy
Normal file
@@ -0,0 +1,71 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package com.hierynomus.sshj
|
||||||
|
|
||||||
|
import net.schmizz.sshj.DefaultConfig
|
||||||
|
import net.schmizz.sshj.SSHClient
|
||||||
|
import net.schmizz.sshj.transport.TransportException
|
||||||
|
import net.schmizz.sshj.userauth.UserAuthException
|
||||||
|
|
||||||
|
class IntegrationSpec extends IntegrationBaseSpec {
|
||||||
|
|
||||||
|
def "should accept correct key"() {
|
||||||
|
given:
|
||||||
|
SSHClient sshClient = new SSHClient(new DefaultConfig())
|
||||||
|
sshClient.addHostKeyVerifier("d3:6a:a9:52:05:ab:b5:48:dd:73:60:18:0c:3a:f0:a3") // test-containers/ssh_host_ecdsa_key's fingerprint
|
||||||
|
|
||||||
|
when:
|
||||||
|
sshClient.connect(SERVER_IP, DOCKER_PORT)
|
||||||
|
|
||||||
|
then:
|
||||||
|
sshClient.isConnected()
|
||||||
|
}
|
||||||
|
|
||||||
|
def "should decline wrong key"() throws IOException {
|
||||||
|
given:
|
||||||
|
SSHClient sshClient = new SSHClient(new DefaultConfig())
|
||||||
|
sshClient.addHostKeyVerifier("d4:6a:a9:52:05:ab:b5:48:dd:73:60:18:0c:3a:f0:a3")
|
||||||
|
|
||||||
|
when:
|
||||||
|
sshClient.connect(SERVER_IP, DOCKER_PORT)
|
||||||
|
|
||||||
|
then:
|
||||||
|
thrown(TransportException.class)
|
||||||
|
}
|
||||||
|
|
||||||
|
def "should authenticate"() {
|
||||||
|
given:
|
||||||
|
SSHClient client = getConnectedClient()
|
||||||
|
|
||||||
|
when:
|
||||||
|
client.authPublickey("sshj", "src/test/resources/id_rsa")
|
||||||
|
|
||||||
|
then:
|
||||||
|
client.isAuthenticated()
|
||||||
|
}
|
||||||
|
|
||||||
|
def "should not authenticate with wrong key"() {
|
||||||
|
given:
|
||||||
|
SSHClient client = getConnectedClient()
|
||||||
|
|
||||||
|
when:
|
||||||
|
client.authPublickey("sshj", "src/test/resources/id_dsa")
|
||||||
|
|
||||||
|
then:
|
||||||
|
thrown(UserAuthException.class)
|
||||||
|
!client.isAuthenticated()
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,68 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package com.hierynomus.sshj.sftp
|
||||||
|
|
||||||
|
import com.hierynomus.sshj.IntegrationBaseSpec
|
||||||
|
import net.schmizz.sshj.SSHClient
|
||||||
|
import net.schmizz.sshj.sftp.OpenMode
|
||||||
|
import net.schmizz.sshj.sftp.RemoteFile
|
||||||
|
import net.schmizz.sshj.sftp.SFTPClient
|
||||||
|
|
||||||
|
import java.nio.charset.StandardCharsets
|
||||||
|
|
||||||
|
import static org.codehaus.groovy.runtime.IOGroovyMethods.withCloseable
|
||||||
|
|
||||||
|
class FileWriteSpec extends IntegrationBaseSpec {
|
||||||
|
|
||||||
|
def "should append to file (GH issue #390)"() {
|
||||||
|
given:
|
||||||
|
SSHClient client = getConnectedClient()
|
||||||
|
client.authPublickey("sshj", "src/test/resources/id_rsa")
|
||||||
|
SFTPClient sftp = client.newSFTPClient()
|
||||||
|
def file = "/home/sshj/test.txt"
|
||||||
|
def initialText = "This is the initial text.\n".getBytes(StandardCharsets.UTF_16)
|
||||||
|
def appendText = "And here's the appended text.\n".getBytes(StandardCharsets.UTF_16)
|
||||||
|
|
||||||
|
when:
|
||||||
|
withCloseable(sftp.open(file, EnumSet.of(OpenMode.WRITE, OpenMode.CREAT))) { RemoteFile initial ->
|
||||||
|
initial.write(0, initialText, 0, initialText.length)
|
||||||
|
}
|
||||||
|
|
||||||
|
then:
|
||||||
|
withCloseable(sftp.open(file, EnumSet.of(OpenMode.READ))) { RemoteFile read ->
|
||||||
|
def bytes = new byte[initialText.length]
|
||||||
|
read.read(0, bytes, 0, bytes.length)
|
||||||
|
bytes == initialText
|
||||||
|
}
|
||||||
|
|
||||||
|
when:
|
||||||
|
withCloseable(sftp.open(file, EnumSet.of(OpenMode.WRITE, OpenMode.APPEND))) { RemoteFile append ->
|
||||||
|
append.write(0, appendText, 0, appendText.length)
|
||||||
|
}
|
||||||
|
|
||||||
|
then:
|
||||||
|
withCloseable(sftp.open(file, EnumSet.of(OpenMode.READ))) { RemoteFile read ->
|
||||||
|
def bytes = new byte[initialText.length + appendText.length]
|
||||||
|
read.read(0, bytes, 0, bytes.length)
|
||||||
|
Arrays.copyOfRange(bytes, 0, initialText.length) == initialText
|
||||||
|
Arrays.copyOfRange(bytes, initialText.length, initialText.length + appendText.length) == appendText
|
||||||
|
}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
sftp.close()
|
||||||
|
client.close()
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -15,12 +15,12 @@
|
|||||||
*/
|
*/
|
||||||
package com.hierynomus.sshj.backport;
|
package com.hierynomus.sshj.backport;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.IOUtils;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.net.*;
|
import java.net.*;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.IOUtils;
|
|
||||||
|
|
||||||
public class Jdk7HttpProxySocket extends Socket {
|
public class Jdk7HttpProxySocket extends Socket {
|
||||||
|
|
||||||
private Proxy httpProxy = null;
|
private Proxy httpProxy = null;
|
||||||
|
|||||||
@@ -23,8 +23,6 @@ import net.schmizz.sshj.common.SSHRuntimeException;
|
|||||||
|
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
|
|
||||||
import static net.i2p.crypto.eddsa.spec.EdDSANamedCurveTable.CURVE_ED25519_SHA512;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Our own extension of the EdDSAPublicKey that comes from ECC-25519, as that class does not implement equality.
|
* Our own extension of the EdDSAPublicKey that comes from ECC-25519, as that class does not implement equality.
|
||||||
* The code uses the equality of the keys as an indicator whether they're the same during host key verification.
|
* The code uses the equality of the keys as an indicator whether they're the same during host key verification.
|
||||||
@@ -34,7 +32,7 @@ public class Ed25519PublicKey extends EdDSAPublicKey {
|
|||||||
public Ed25519PublicKey(EdDSAPublicKeySpec spec) {
|
public Ed25519PublicKey(EdDSAPublicKeySpec spec) {
|
||||||
super(spec);
|
super(spec);
|
||||||
|
|
||||||
EdDSANamedCurveSpec ed25519 = EdDSANamedCurveTable.getByName(CURVE_ED25519_SHA512);
|
EdDSANamedCurveSpec ed25519 = EdDSANamedCurveTable.getByName("Ed25519");
|
||||||
if (!spec.getParams().getCurve().equals(ed25519.getCurve())) {
|
if (!spec.getParams().getCurve().equals(ed25519.getCurve())) {
|
||||||
throw new SSHRuntimeException("Cannot create Ed25519 Public Key from wrong spec");
|
throw new SSHRuntimeException("Cannot create Ed25519 Public Key from wrong spec");
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -16,14 +16,16 @@
|
|||||||
package com.hierynomus.sshj.signature;
|
package com.hierynomus.sshj.signature;
|
||||||
|
|
||||||
import net.i2p.crypto.eddsa.EdDSAEngine;
|
import net.i2p.crypto.eddsa.EdDSAEngine;
|
||||||
import net.schmizz.sshj.common.Buffer;
|
|
||||||
import net.schmizz.sshj.common.KeyType;
|
import net.schmizz.sshj.common.KeyType;
|
||||||
import net.schmizz.sshj.common.SSHRuntimeException;
|
import net.schmizz.sshj.common.SSHRuntimeException;
|
||||||
|
import net.schmizz.sshj.signature.AbstractSignature;
|
||||||
import net.schmizz.sshj.signature.Signature;
|
import net.schmizz.sshj.signature.Signature;
|
||||||
|
|
||||||
import java.security.*;
|
import java.security.MessageDigest;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.SignatureException;
|
||||||
|
|
||||||
public class SignatureEdDSA implements Signature {
|
public class SignatureEdDSA extends AbstractSignature {
|
||||||
public static class Factory implements net.schmizz.sshj.common.Factory.Named<Signature> {
|
public static class Factory implements net.schmizz.sshj.common.Factory.Named<Signature> {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
@@ -37,54 +39,18 @@ public class SignatureEdDSA implements Signature {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
final EdDSAEngine engine;
|
SignatureEdDSA() {
|
||||||
|
super(getEngine());
|
||||||
|
}
|
||||||
|
|
||||||
protected SignatureEdDSA() {
|
private static EdDSAEngine getEngine() {
|
||||||
try {
|
try {
|
||||||
engine = new EdDSAEngine(MessageDigest.getInstance("SHA-512"));
|
return new EdDSAEngine(MessageDigest.getInstance("SHA-512"));
|
||||||
} catch (NoSuchAlgorithmException e) {
|
} catch (NoSuchAlgorithmException e) {
|
||||||
throw new SSHRuntimeException(e);
|
throw new SSHRuntimeException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public void init(PublicKey pubkey, PrivateKey prvkey) {
|
|
||||||
try {
|
|
||||||
if (pubkey != null) {
|
|
||||||
engine.initVerify(pubkey);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (prvkey != null) {
|
|
||||||
engine.initSign(prvkey);
|
|
||||||
}
|
|
||||||
} catch (InvalidKeyException e) {
|
|
||||||
throw new SSHRuntimeException(e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void update(byte[] H) {
|
|
||||||
update(H, 0, H.length);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void update(byte[] H, int off, int len) {
|
|
||||||
try {
|
|
||||||
engine.update(H, off, len);
|
|
||||||
} catch (SignatureException e) {
|
|
||||||
throw new SSHRuntimeException(e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public byte[] sign() {
|
|
||||||
try {
|
|
||||||
return engine.sign();
|
|
||||||
} catch (SignatureException e) {
|
|
||||||
throw new SSHRuntimeException(e);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public byte[] encode(byte[] signature) {
|
public byte[] encode(byte[] signature) {
|
||||||
return signature;
|
return signature;
|
||||||
@@ -93,17 +59,9 @@ public class SignatureEdDSA implements Signature {
|
|||||||
@Override
|
@Override
|
||||||
public boolean verify(byte[] sig) {
|
public boolean verify(byte[] sig) {
|
||||||
try {
|
try {
|
||||||
Buffer.PlainBuffer plainBuffer = new Buffer.PlainBuffer(sig);
|
return signature.verify(extractSig(sig, "ssh-ed25519"));
|
||||||
String algo = plainBuffer.readString();
|
|
||||||
if (!"ssh-ed25519".equals(algo)) {
|
|
||||||
throw new SSHRuntimeException("Expected 'ssh-ed25519' key algorithm, but was: " + algo);
|
|
||||||
}
|
|
||||||
byte[] bytes = plainBuffer.readBytes();
|
|
||||||
return engine.verify(bytes);
|
|
||||||
} catch (SignatureException e) {
|
} catch (SignatureException e) {
|
||||||
throw new SSHRuntimeException(e);
|
throw new SSHRuntimeException(e);
|
||||||
} catch (Buffer.BufferException e) {
|
|
||||||
throw new SSHRuntimeException(e);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -19,14 +19,15 @@ import net.schmizz.sshj.transport.cipher.BlockCipher;
|
|||||||
import net.schmizz.sshj.transport.cipher.Cipher;
|
import net.schmizz.sshj.transport.cipher.Cipher;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* All BlockCiphers supported by SSH according to the following RFCs
|
* All BlockCiphers supported by SSH according to the following RFCs:
|
||||||
*
|
*
|
||||||
* - https://tools.ietf.org/html/rfc4344#section-3.1
|
* <ul>
|
||||||
* - https://tools.ietf.org/html/rfc4253#section-6.3
|
* <li>https://tools.ietf.org/html/rfc4344#section-3.1</li>
|
||||||
|
* <li>https://tools.ietf.org/html/rfc4253#section-6.3</li>
|
||||||
|
* <li>TODO: https://tools.ietf.org/html/rfc5647</li>
|
||||||
|
* </ul>
|
||||||
*
|
*
|
||||||
* TODO: https://tools.ietf.org/html/rfc5647
|
* Some of the Ciphers are still implemented in net.schmizz.sshj.transport.cipher.*. These are deprecated and scheduled to be removed.
|
||||||
*
|
|
||||||
* Some of the Ciphers are still implemented in net.schmizz.sshj.transport.cipher.*. These are scheduled to be migrated to here.
|
|
||||||
*/
|
*/
|
||||||
@SuppressWarnings("PMD.MethodNamingConventions")
|
@SuppressWarnings("PMD.MethodNamingConventions")
|
||||||
public class BlockCiphers {
|
public class BlockCiphers {
|
||||||
@@ -34,9 +35,30 @@ public class BlockCiphers {
|
|||||||
public static final String COUNTER_MODE = "CTR";
|
public static final String COUNTER_MODE = "CTR";
|
||||||
public static final String CIPHER_BLOCK_CHAINING_MODE = "CBC";
|
public static final String CIPHER_BLOCK_CHAINING_MODE = "CBC";
|
||||||
|
|
||||||
|
public static Factory AES128CTR() {
|
||||||
|
return new Factory(16, 128, "aes128-ctr", "AES", COUNTER_MODE);
|
||||||
|
}
|
||||||
|
public static Factory AES192CTR() {
|
||||||
|
return new Factory(16, 192, "aes192-ctr", "AES", COUNTER_MODE);
|
||||||
|
}
|
||||||
|
public static Factory AES256CTR() {
|
||||||
|
return new Factory(16, 256, "aes256-ctr", "AES", COUNTER_MODE);
|
||||||
|
}
|
||||||
|
public static Factory AES128CBC() {
|
||||||
|
return new Factory(16, 128, "aes128-cbc", "AES", CIPHER_BLOCK_CHAINING_MODE);
|
||||||
|
}
|
||||||
|
public static Factory AES192CBC() {
|
||||||
|
return new Factory(16, 192, "aes192-cbc", "AES", CIPHER_BLOCK_CHAINING_MODE);
|
||||||
|
}
|
||||||
|
public static Factory AES256CBC() {
|
||||||
|
return new Factory(16, 256, "aes256-cbc", "AES", CIPHER_BLOCK_CHAINING_MODE);
|
||||||
|
}
|
||||||
public static Factory BlowfishCTR() {
|
public static Factory BlowfishCTR() {
|
||||||
return new Factory(8, 256, "blowfish-ctr", "Blowfish", COUNTER_MODE);
|
return new Factory(8, 256, "blowfish-ctr", "Blowfish", COUNTER_MODE);
|
||||||
}
|
}
|
||||||
|
public static Factory BlowfishCBC() {
|
||||||
|
return new Factory(8, 128, "blowfish-cbc", "Blowfish", CIPHER_BLOCK_CHAINING_MODE);
|
||||||
|
}
|
||||||
public static Factory Twofish128CTR() {
|
public static Factory Twofish128CTR() {
|
||||||
return new Factory(16, 128, "twofish128-ctr", "Twofish", COUNTER_MODE);
|
return new Factory(16, 128, "twofish128-ctr", "Twofish", COUNTER_MODE);
|
||||||
}
|
}
|
||||||
@@ -91,6 +113,9 @@ public class BlockCiphers {
|
|||||||
public static Factory TripleDESCTR() {
|
public static Factory TripleDESCTR() {
|
||||||
return new Factory(8, 192, "3des-ctr", "DESede", COUNTER_MODE);
|
return new Factory(8, 192, "3des-ctr", "DESede", COUNTER_MODE);
|
||||||
}
|
}
|
||||||
|
public static Factory TripleDESCBC() {
|
||||||
|
return new Factory(8, 192, "3des-cbc", "DESede", CIPHER_BLOCK_CHAINING_MODE);
|
||||||
|
}
|
||||||
|
|
||||||
/** Named factory for BlockCipher */
|
/** Named factory for BlockCipher */
|
||||||
public static class Factory
|
public static class Factory
|
||||||
|
|||||||
@@ -15,14 +15,15 @@
|
|||||||
*/
|
*/
|
||||||
package com.hierynomus.sshj.transport.kex;
|
package com.hierynomus.sshj.transport.kex;
|
||||||
|
|
||||||
import net.schmizz.sshj.transport.digest.*;
|
import net.schmizz.sshj.transport.digest.Digest;
|
||||||
|
import net.schmizz.sshj.transport.digest.SHA1;
|
||||||
|
import net.schmizz.sshj.transport.digest.SHA256;
|
||||||
|
import net.schmizz.sshj.transport.digest.SHA512;
|
||||||
import net.schmizz.sshj.transport.kex.KeyExchange;
|
import net.schmizz.sshj.transport.kex.KeyExchange;
|
||||||
|
|
||||||
import java.math.BigInteger;
|
import java.math.BigInteger;
|
||||||
|
|
||||||
import static net.schmizz.sshj.transport.kex.DHGroupData.*;
|
import static net.schmizz.sshj.transport.kex.DHGroupData.*;
|
||||||
import static net.schmizz.sshj.transport.kex.DHGroupData.P16;
|
|
||||||
import static net.schmizz.sshj.transport.kex.DHGroupData.P18;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Factory methods for Diffie Hellmann KEX algorithms based on MODP groups / Oakley Groups
|
* Factory methods for Diffie Hellmann KEX algorithms based on MODP groups / Oakley Groups
|
||||||
|
|||||||
@@ -135,7 +135,7 @@ public class KnownHostMatchers {
|
|||||||
private final Pattern pattern;
|
private final Pattern pattern;
|
||||||
|
|
||||||
public WildcardHostMatcher(String hostEntry) {
|
public WildcardHostMatcher(String hostEntry) {
|
||||||
this.pattern = Pattern.compile(hostEntry.replace(".", "\\.").replace("*", ".*").replace("?", "."));
|
this.pattern = Pattern.compile("^" + hostEntry.replace("[", "\\[").replace("]", "\\]").replace(".", "\\.").replace("*", ".*").replace("?", ".") + "$");
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|||||||
@@ -15,14 +15,6 @@
|
|||||||
*/
|
*/
|
||||||
package com.hierynomus.sshj.userauth.keyprovider;
|
package com.hierynomus.sshj.userauth.keyprovider;
|
||||||
|
|
||||||
import java.io.BufferedReader;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.security.GeneralSecurityException;
|
|
||||||
import java.security.KeyPair;
|
|
||||||
import java.security.PublicKey;
|
|
||||||
import org.slf4j.Logger;
|
|
||||||
import org.slf4j.LoggerFactory;
|
|
||||||
|
|
||||||
import net.i2p.crypto.eddsa.EdDSAPrivateKey;
|
import net.i2p.crypto.eddsa.EdDSAPrivateKey;
|
||||||
import net.i2p.crypto.eddsa.spec.EdDSANamedCurveTable;
|
import net.i2p.crypto.eddsa.spec.EdDSANamedCurveTable;
|
||||||
import net.i2p.crypto.eddsa.spec.EdDSAPrivateKeySpec;
|
import net.i2p.crypto.eddsa.spec.EdDSAPrivateKeySpec;
|
||||||
@@ -31,8 +23,14 @@ import net.schmizz.sshj.common.Buffer.PlainBuffer;
|
|||||||
import net.schmizz.sshj.userauth.keyprovider.BaseFileKeyProvider;
|
import net.schmizz.sshj.userauth.keyprovider.BaseFileKeyProvider;
|
||||||
import net.schmizz.sshj.userauth.keyprovider.FileKeyProvider;
|
import net.schmizz.sshj.userauth.keyprovider.FileKeyProvider;
|
||||||
import net.schmizz.sshj.userauth.keyprovider.KeyFormat;
|
import net.schmizz.sshj.userauth.keyprovider.KeyFormat;
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import static net.i2p.crypto.eddsa.spec.EdDSANamedCurveTable.CURVE_ED25519_SHA512;
|
import java.io.BufferedReader;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.security.GeneralSecurityException;
|
||||||
|
import java.security.KeyPair;
|
||||||
|
import java.security.PublicKey;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Reads a key file in the new OpenSSH format.
|
* Reads a key file in the new OpenSSH format.
|
||||||
@@ -155,6 +153,6 @@ public class OpenSSHKeyV1KeyFile extends BaseFileKeyProvider {
|
|||||||
throw new IOException("Padding of key format contained wrong byte at position: " + i);
|
throw new IOException("Padding of key format contained wrong byte at position: " + i);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return new KeyPair(publicKey, new EdDSAPrivateKey(new EdDSAPrivateKeySpec(privKey, EdDSANamedCurveTable.getByName(CURVE_ED25519_SHA512))));
|
return new KeyPair(publicKey, new EdDSAPrivateKey(new EdDSAPrivateKeySpec(privKey, EdDSANamedCurveTable.getByName("Ed25519"))));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,11 +15,11 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.concurrent;
|
package net.schmizz.concurrent;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.LoggerFactory;
|
||||||
|
|
||||||
import java.util.concurrent.TimeUnit;
|
import java.util.concurrent.TimeUnit;
|
||||||
import java.util.concurrent.locks.ReentrantLock;
|
import java.util.concurrent.locks.ReentrantLock;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.LoggerFactory;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* An event can be set, cleared, or awaited, similar to Python's {@code threading.event}. The key difference is that a
|
* An event can be set, cleared, or awaited, similar to Python's {@code threading.event}. The key difference is that a
|
||||||
* waiter may be delivered an exception of parameterized type {@code T}.
|
* waiter may be delivered an exception of parameterized type {@code T}.
|
||||||
|
|||||||
@@ -15,6 +15,7 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.concurrent;
|
package net.schmizz.concurrent;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.LoggerFactory;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
|
|
||||||
import java.util.concurrent.TimeUnit;
|
import java.util.concurrent.TimeUnit;
|
||||||
@@ -22,8 +23,6 @@ import java.util.concurrent.TimeoutException;
|
|||||||
import java.util.concurrent.locks.Condition;
|
import java.util.concurrent.locks.Condition;
|
||||||
import java.util.concurrent.locks.ReentrantLock;
|
import java.util.concurrent.locks.ReentrantLock;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.LoggerFactory;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Represents promised data of the parameterized type {@code V} and allows waiting on it. An exception may also be
|
* Represents promised data of the parameterized type {@code V} and allows waiting on it. An exception may also be
|
||||||
* delivered to a waiter, and will be of the parameterized type {@code T}.
|
* delivered to a waiter, and will be of the parameterized type {@code T}.
|
||||||
|
|||||||
@@ -15,6 +15,8 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj;
|
package net.schmizz.sshj;
|
||||||
|
|
||||||
|
import com.hierynomus.sshj.signature.SignatureEdDSA;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.SecurityUtils;
|
import net.schmizz.sshj.common.SecurityUtils;
|
||||||
import net.schmizz.sshj.signature.SignatureDSA;
|
import net.schmizz.sshj.signature.SignatureDSA;
|
||||||
import net.schmizz.sshj.signature.SignatureRSA;
|
import net.schmizz.sshj.signature.SignatureRSA;
|
||||||
@@ -28,9 +30,18 @@ public class AndroidConfig
|
|||||||
SecurityUtils.registerSecurityProvider("org.spongycastle.jce.provider.BouncyCastleProvider");
|
SecurityUtils.registerSecurityProvider("org.spongycastle.jce.provider.BouncyCastleProvider");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public AndroidConfig(){
|
||||||
|
super();
|
||||||
|
initKeyExchangeFactories(true);
|
||||||
|
initRandomFactory(true);
|
||||||
|
initFileKeyProviderFactories(true);
|
||||||
|
}
|
||||||
|
|
||||||
// don't add ECDSA
|
// don't add ECDSA
|
||||||
protected void initSignatureFactories() {
|
protected void initSignatureFactories() {
|
||||||
setSignatureFactories(new SignatureRSA.Factory(), new SignatureDSA.Factory());
|
setSignatureFactories(new SignatureRSA.Factory(), new SignatureDSA.Factory(),
|
||||||
|
// but add EdDSA
|
||||||
|
new SignatureEdDSA.Factory());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|||||||
@@ -16,8 +16,8 @@
|
|||||||
package net.schmizz.sshj;
|
package net.schmizz.sshj;
|
||||||
|
|
||||||
import net.schmizz.keepalive.KeepAliveProvider;
|
import net.schmizz.keepalive.KeepAliveProvider;
|
||||||
import net.schmizz.sshj.common.LoggerFactory;
|
|
||||||
import net.schmizz.sshj.common.Factory;
|
import net.schmizz.sshj.common.Factory;
|
||||||
|
import net.schmizz.sshj.common.LoggerFactory;
|
||||||
import net.schmizz.sshj.signature.Signature;
|
import net.schmizz.sshj.signature.Signature;
|
||||||
import net.schmizz.sshj.transport.cipher.Cipher;
|
import net.schmizz.sshj.transport.cipher.Cipher;
|
||||||
import net.schmizz.sshj.transport.compression.Compression;
|
import net.schmizz.sshj.transport.compression.Compression;
|
||||||
|
|||||||
@@ -15,22 +15,12 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj;
|
package net.schmizz.sshj;
|
||||||
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Iterator;
|
|
||||||
import java.util.LinkedList;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Properties;
|
|
||||||
|
|
||||||
import org.slf4j.Logger;
|
|
||||||
|
|
||||||
import com.hierynomus.sshj.signature.SignatureEdDSA;
|
import com.hierynomus.sshj.signature.SignatureEdDSA;
|
||||||
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
import com.hierynomus.sshj.transport.cipher.StreamCiphers;
|
import com.hierynomus.sshj.transport.cipher.StreamCiphers;
|
||||||
import com.hierynomus.sshj.transport.kex.DHGroups;
|
import com.hierynomus.sshj.transport.kex.DHGroups;
|
||||||
import com.hierynomus.sshj.transport.kex.ExtendedDHGroups;
|
import com.hierynomus.sshj.transport.kex.ExtendedDHGroups;
|
||||||
import com.hierynomus.sshj.userauth.keyprovider.OpenSSHKeyV1KeyFile;
|
import com.hierynomus.sshj.userauth.keyprovider.OpenSSHKeyV1KeyFile;
|
||||||
|
|
||||||
import net.schmizz.keepalive.KeepAliveProvider;
|
import net.schmizz.keepalive.KeepAliveProvider;
|
||||||
import net.schmizz.sshj.common.Factory;
|
import net.schmizz.sshj.common.Factory;
|
||||||
import net.schmizz.sshj.common.LoggerFactory;
|
import net.schmizz.sshj.common.LoggerFactory;
|
||||||
@@ -38,26 +28,13 @@ import net.schmizz.sshj.common.SecurityUtils;
|
|||||||
import net.schmizz.sshj.signature.SignatureDSA;
|
import net.schmizz.sshj.signature.SignatureDSA;
|
||||||
import net.schmizz.sshj.signature.SignatureECDSA;
|
import net.schmizz.sshj.signature.SignatureECDSA;
|
||||||
import net.schmizz.sshj.signature.SignatureRSA;
|
import net.schmizz.sshj.signature.SignatureRSA;
|
||||||
import net.schmizz.sshj.transport.cipher.AES128CBC;
|
import net.schmizz.sshj.transport.cipher.*;
|
||||||
import net.schmizz.sshj.transport.cipher.AES128CTR;
|
|
||||||
import net.schmizz.sshj.transport.cipher.AES192CBC;
|
|
||||||
import net.schmizz.sshj.transport.cipher.AES192CTR;
|
|
||||||
import net.schmizz.sshj.transport.cipher.AES256CBC;
|
|
||||||
import net.schmizz.sshj.transport.cipher.AES256CTR;
|
|
||||||
import net.schmizz.sshj.transport.cipher.BlowfishCBC;
|
|
||||||
import net.schmizz.sshj.transport.cipher.Cipher;
|
|
||||||
import net.schmizz.sshj.transport.cipher.TripleDESCBC;
|
|
||||||
import net.schmizz.sshj.transport.compression.NoneCompression;
|
import net.schmizz.sshj.transport.compression.NoneCompression;
|
||||||
import net.schmizz.sshj.transport.kex.Curve25519SHA256;
|
import net.schmizz.sshj.transport.kex.Curve25519SHA256;
|
||||||
import net.schmizz.sshj.transport.kex.DHGexSHA1;
|
import net.schmizz.sshj.transport.kex.DHGexSHA1;
|
||||||
import net.schmizz.sshj.transport.kex.DHGexSHA256;
|
import net.schmizz.sshj.transport.kex.DHGexSHA256;
|
||||||
import net.schmizz.sshj.transport.kex.ECDHNistP;
|
import net.schmizz.sshj.transport.kex.ECDHNistP;
|
||||||
import net.schmizz.sshj.transport.mac.HMACMD5;
|
import net.schmizz.sshj.transport.mac.*;
|
||||||
import net.schmizz.sshj.transport.mac.HMACMD596;
|
|
||||||
import net.schmizz.sshj.transport.mac.HMACSHA1;
|
|
||||||
import net.schmizz.sshj.transport.mac.HMACSHA196;
|
|
||||||
import net.schmizz.sshj.transport.mac.HMACSHA2256;
|
|
||||||
import net.schmizz.sshj.transport.mac.HMACSHA2512;
|
|
||||||
import net.schmizz.sshj.transport.random.BouncyCastleRandom;
|
import net.schmizz.sshj.transport.random.BouncyCastleRandom;
|
||||||
import net.schmizz.sshj.transport.random.JCERandom;
|
import net.schmizz.sshj.transport.random.JCERandom;
|
||||||
import net.schmizz.sshj.transport.random.SingletonRandomFactory;
|
import net.schmizz.sshj.transport.random.SingletonRandomFactory;
|
||||||
@@ -65,6 +42,10 @@ import net.schmizz.sshj.userauth.keyprovider.OpenSSHKeyFile;
|
|||||||
import net.schmizz.sshj.userauth.keyprovider.PKCS5KeyFile;
|
import net.schmizz.sshj.userauth.keyprovider.PKCS5KeyFile;
|
||||||
import net.schmizz.sshj.userauth.keyprovider.PKCS8KeyFile;
|
import net.schmizz.sshj.userauth.keyprovider.PKCS8KeyFile;
|
||||||
import net.schmizz.sshj.userauth.keyprovider.PuTTYKeyFile;
|
import net.schmizz.sshj.userauth.keyprovider.PuTTYKeyFile;
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.util.*;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A {@link net.schmizz.sshj.Config} that is initialized as follows. Items marked with an asterisk are added to the config only if
|
* A {@link net.schmizz.sshj.Config} that is initialized as follows. Items marked with an asterisk are added to the config only if
|
||||||
@@ -72,9 +53,7 @@ import net.schmizz.sshj.userauth.keyprovider.PuTTYKeyFile;
|
|||||||
* <p/>
|
* <p/>
|
||||||
* <ul>
|
* <ul>
|
||||||
* <li>{@link net.schmizz.sshj.ConfigImpl#setKeyExchangeFactories Key exchange}: {@link net.schmizz.sshj.transport.kex.DHG14}*, {@link net.schmizz.sshj.transport.kex.DHG1}</li>
|
* <li>{@link net.schmizz.sshj.ConfigImpl#setKeyExchangeFactories Key exchange}: {@link net.schmizz.sshj.transport.kex.DHG14}*, {@link net.schmizz.sshj.transport.kex.DHG1}</li>
|
||||||
* <li>{@link net.schmizz.sshj.ConfigImpl#setCipherFactories Ciphers} [1]: {@link net.schmizz.sshj.transport.cipher.AES128CTR}, {@link net.schmizz.sshj.transport.cipher.AES192CTR}, {@link net.schmizz.sshj.transport.cipher.AES256CTR},
|
* <li>{@link net.schmizz.sshj.ConfigImpl#setCipherFactories Ciphers}: {@link BlockCiphers}, {@link StreamCiphers} [1]</li>
|
||||||
* {@link
|
|
||||||
* net.schmizz.sshj.transport.cipher.AES128CBC}, {@link net.schmizz.sshj.transport.cipher.AES192CBC}, {@link net.schmizz.sshj.transport.cipher.AES256CBC}, {@link net.schmizz.sshj.transport.cipher.AES192CBC}, {@link net.schmizz.sshj.transport.cipher.TripleDESCBC}, {@link net.schmizz.sshj.transport.cipher.BlowfishCBC}</li>
|
|
||||||
* <li>{@link net.schmizz.sshj.ConfigImpl#setMACFactories MAC}: {@link net.schmizz.sshj.transport.mac.HMACSHA1}, {@link net.schmizz.sshj.transport.mac.HMACSHA196}, {@link net.schmizz.sshj.transport.mac.HMACMD5}, {@link
|
* <li>{@link net.schmizz.sshj.ConfigImpl#setMACFactories MAC}: {@link net.schmizz.sshj.transport.mac.HMACSHA1}, {@link net.schmizz.sshj.transport.mac.HMACSHA196}, {@link net.schmizz.sshj.transport.mac.HMACMD5}, {@link
|
||||||
* net.schmizz.sshj.transport.mac.HMACMD596}</li>
|
* net.schmizz.sshj.transport.mac.HMACMD596}</li>
|
||||||
* <li>{@link net.schmizz.sshj.ConfigImpl#setCompressionFactories Compression}: {@link net.schmizz.sshj.transport.compression.NoneCompression}</li>
|
* <li>{@link net.schmizz.sshj.ConfigImpl#setCompressionFactories Compression}: {@link net.schmizz.sshj.transport.compression.NoneCompression}</li>
|
||||||
@@ -172,14 +151,13 @@ public class DefaultConfig
|
|||||||
|
|
||||||
protected void initCipherFactories() {
|
protected void initCipherFactories() {
|
||||||
List<Factory.Named<Cipher>> avail = new LinkedList<Factory.Named<Cipher>>(Arrays.<Factory.Named<Cipher>>asList(
|
List<Factory.Named<Cipher>> avail = new LinkedList<Factory.Named<Cipher>>(Arrays.<Factory.Named<Cipher>>asList(
|
||||||
new AES128CTR.Factory(),
|
BlockCiphers.AES128CBC(),
|
||||||
new AES192CTR.Factory(),
|
BlockCiphers.AES128CTR(),
|
||||||
new AES256CTR.Factory(),
|
BlockCiphers.AES192CBC(),
|
||||||
new AES128CBC.Factory(),
|
BlockCiphers.AES192CTR(),
|
||||||
new AES192CBC.Factory(),
|
BlockCiphers.AES256CBC(),
|
||||||
new AES256CBC.Factory(),
|
BlockCiphers.AES256CTR(),
|
||||||
new TripleDESCBC.Factory(),
|
BlockCiphers.BlowfishCBC(),
|
||||||
new BlowfishCBC.Factory(),
|
|
||||||
BlockCiphers.BlowfishCTR(),
|
BlockCiphers.BlowfishCTR(),
|
||||||
BlockCiphers.Cast128CBC(),
|
BlockCiphers.Cast128CBC(),
|
||||||
BlockCiphers.Cast128CTR(),
|
BlockCiphers.Cast128CTR(),
|
||||||
@@ -191,6 +169,7 @@ public class DefaultConfig
|
|||||||
BlockCiphers.Serpent192CTR(),
|
BlockCiphers.Serpent192CTR(),
|
||||||
BlockCiphers.Serpent256CBC(),
|
BlockCiphers.Serpent256CBC(),
|
||||||
BlockCiphers.Serpent256CTR(),
|
BlockCiphers.Serpent256CTR(),
|
||||||
|
BlockCiphers.TripleDESCBC(),
|
||||||
BlockCiphers.TripleDESCTR(),
|
BlockCiphers.TripleDESCTR(),
|
||||||
BlockCiphers.Twofish128CBC(),
|
BlockCiphers.Twofish128CBC(),
|
||||||
BlockCiphers.Twofish128CTR(),
|
BlockCiphers.Twofish128CTR(),
|
||||||
|
|||||||
@@ -15,11 +15,7 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj;
|
package net.schmizz.sshj;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.Factory;
|
import net.schmizz.sshj.common.*;
|
||||||
import net.schmizz.sshj.common.IOUtils;
|
|
||||||
import net.schmizz.sshj.common.LoggerFactory;
|
|
||||||
import net.schmizz.sshj.common.SSHException;
|
|
||||||
import net.schmizz.sshj.common.SecurityUtils;
|
|
||||||
import net.schmizz.sshj.connection.Connection;
|
import net.schmizz.sshj.connection.Connection;
|
||||||
import net.schmizz.sshj.connection.ConnectionException;
|
import net.schmizz.sshj.connection.ConnectionException;
|
||||||
import net.schmizz.sshj.connection.ConnectionImpl;
|
import net.schmizz.sshj.connection.ConnectionImpl;
|
||||||
@@ -42,6 +38,7 @@ import net.schmizz.sshj.transport.compression.DelayedZlibCompression;
|
|||||||
import net.schmizz.sshj.transport.compression.NoneCompression;
|
import net.schmizz.sshj.transport.compression.NoneCompression;
|
||||||
import net.schmizz.sshj.transport.compression.ZlibCompression;
|
import net.schmizz.sshj.transport.compression.ZlibCompression;
|
||||||
import net.schmizz.sshj.transport.verification.AlgorithmsVerifier;
|
import net.schmizz.sshj.transport.verification.AlgorithmsVerifier;
|
||||||
|
import net.schmizz.sshj.transport.verification.FingerprintVerifier;
|
||||||
import net.schmizz.sshj.transport.verification.HostKeyVerifier;
|
import net.schmizz.sshj.transport.verification.HostKeyVerifier;
|
||||||
import net.schmizz.sshj.transport.verification.OpenSSHKnownHosts;
|
import net.schmizz.sshj.transport.verification.OpenSSHKnownHosts;
|
||||||
import net.schmizz.sshj.userauth.UserAuth;
|
import net.schmizz.sshj.userauth.UserAuth;
|
||||||
@@ -173,19 +170,23 @@ public class SSHClient
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Add a {@link HostKeyVerifier} that will verify any host that's able to claim a host key with the given {@code
|
* Add a {@link HostKeyVerifier} that will verify any host that's able to claim a host key with the given {@code
|
||||||
* fingerprint}, e.g. {@code "4b:69:6c:72:6f:79:20:77:61:73:20:68:65:72:65:21"}
|
* fingerprint}.
|
||||||
|
*
|
||||||
|
* The fingerprint can be specified in either an MD5 colon-delimited format (16 hexadecimal octets, delimited by a colon),
|
||||||
|
* or in a Base64 encoded format for SHA-1 or SHA-256 fingerprints.
|
||||||
|
* Valid examples are:
|
||||||
|
*
|
||||||
|
* <ul><li>"SHA1:2Fo8c/96zv32xc8GZWbOGYOlRak="</li>
|
||||||
|
* <li>"SHA256:oQGbQTujGeNIgh0ONthcEpA/BHxtt3rcYY+NxXTxQjs="</li>
|
||||||
|
* <li>"MD5:d3:5e:40:72:db:08:f1:6d:0c:d7:6d:35:0d:ba:7c:32"</li>
|
||||||
|
* <li>"d3:5e:40:72:db:08:f1:6d:0c:d7:6d:35:0d:ba:7c:32"</li></ul>
|
||||||
*
|
*
|
||||||
* @param fingerprint expected fingerprint in colon-delimited format (16 octets in hex delimited by a colon)
|
* @param fingerprint expected fingerprint in colon-delimited format (16 octets in hex delimited by a colon)
|
||||||
*
|
*
|
||||||
* @see SecurityUtils#getFingerprint
|
* @see SecurityUtils#getFingerprint
|
||||||
*/
|
*/
|
||||||
public void addHostKeyVerifier(final String fingerprint) {
|
public void addHostKeyVerifier(final String fingerprint) {
|
||||||
addHostKeyVerifier(new HostKeyVerifier() {
|
addHostKeyVerifier(FingerprintVerifier.getInstance(fingerprint));
|
||||||
@Override
|
|
||||||
public boolean verify(String h, int p, PublicKey k) {
|
|
||||||
return SecurityUtils.getFingerprint(k).equals(fingerprint);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// FIXME: there are way too many auth... overrides. Better API needed.
|
// FIXME: there are way too many auth... overrides. Better API needed.
|
||||||
|
|||||||
@@ -246,7 +246,7 @@ public class Buffer<T extends Buffer<T>> {
|
|||||||
* @return this
|
* @return this
|
||||||
*/
|
*/
|
||||||
public T putBytes(byte[] b, int off, int len) {
|
public T putBytes(byte[] b, int off, int len) {
|
||||||
return putUInt32(len - off).putRawBytes(b, off, len);
|
return putUInt32(len).putRawBytes(b, off, len);
|
||||||
}
|
}
|
||||||
|
|
||||||
public void readRawBytes(byte[] buf)
|
public void readRawBytes(byte[] buf)
|
||||||
|
|||||||
@@ -94,4 +94,34 @@ public class ByteArrayUtils {
|
|||||||
return sb.toString();
|
return sb.toString();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
public static byte[] parseHex(String hex) {
|
||||||
|
if (hex == null) {
|
||||||
|
throw new IllegalArgumentException("Hex string is null");
|
||||||
|
}
|
||||||
|
if (hex.length() % 2 != 0) {
|
||||||
|
throw new IllegalArgumentException("Hex string '" + hex + "' should have even length.");
|
||||||
|
}
|
||||||
|
|
||||||
|
byte[] result = new byte[hex.length() / 2];
|
||||||
|
for (int i = 0; i < result.length; i++) {
|
||||||
|
int hi = parseHexDigit(hex.charAt(i * 2)) << 4;
|
||||||
|
int lo = parseHexDigit(hex.charAt(i * 2 + 1));
|
||||||
|
result[i] = (byte) (hi + lo);
|
||||||
|
}
|
||||||
|
return result;
|
||||||
|
}
|
||||||
|
|
||||||
|
private static int parseHexDigit(char c) {
|
||||||
|
if (c >= '0' && c <= '9') {
|
||||||
|
return c - '0';
|
||||||
|
}
|
||||||
|
if (c >= 'a' && c <= 'f') {
|
||||||
|
return c - 'a' + 10;
|
||||||
|
}
|
||||||
|
if (c >= 'A' && c <= 'F') {
|
||||||
|
return c - 'A' + 10;
|
||||||
|
}
|
||||||
|
throw new IllegalArgumentException("Digit '" + c + "' out of bounds [0-9a-fA-F]");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,26 +15,27 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.common;
|
package net.schmizz.sshj.common;
|
||||||
|
|
||||||
|
import com.hierynomus.sshj.secg.SecgUtils;
|
||||||
|
import org.bouncycastle.asn1.nist.NISTNamedCurves;
|
||||||
|
import org.bouncycastle.asn1.x9.X9ECParameters;
|
||||||
|
import org.bouncycastle.jce.spec.ECNamedCurveSpec;
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import java.math.BigInteger;
|
import java.math.BigInteger;
|
||||||
import java.security.GeneralSecurityException;
|
import java.security.GeneralSecurityException;
|
||||||
|
import java.security.Key;
|
||||||
import java.security.KeyFactory;
|
import java.security.KeyFactory;
|
||||||
import java.security.PublicKey;
|
import java.security.PublicKey;
|
||||||
|
import java.security.interfaces.ECKey;
|
||||||
import java.security.interfaces.ECPublicKey;
|
import java.security.interfaces.ECPublicKey;
|
||||||
|
import java.security.spec.ECPoint;
|
||||||
|
import java.security.spec.ECPublicKeySpec;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
|
|
||||||
import org.bouncycastle.asn1.nist.NISTNamedCurves;
|
class ECDSAVariationsAdapter {
|
||||||
import org.bouncycastle.asn1.x9.X9ECParameters;
|
|
||||||
import org.bouncycastle.jce.spec.ECParameterSpec;
|
|
||||||
import org.bouncycastle.jce.spec.ECPublicKeySpec;
|
|
||||||
import org.bouncycastle.math.ec.ECPoint;
|
|
||||||
import org.slf4j.Logger;
|
|
||||||
import org.slf4j.LoggerFactory;
|
|
||||||
|
|
||||||
import com.hierynomus.sshj.secg.SecgUtils;
|
|
||||||
|
|
||||||
public class ECDSAVariationsAdapter {
|
|
||||||
|
|
||||||
private final static String BASE_ALGORITHM_NAME = "ecdsa-sha2-nistp";
|
private final static String BASE_ALGORITHM_NAME = "ecdsa-sha2-nistp";
|
||||||
|
|
||||||
@@ -53,7 +54,7 @@ public class ECDSAVariationsAdapter {
|
|||||||
SUPPORTED_CURVES.put("521", "nistp521");
|
SUPPORTED_CURVES.put("521", "nistp521");
|
||||||
}
|
}
|
||||||
|
|
||||||
public static PublicKey readPubKeyFromBuffer(Buffer<?> buf, String variation) throws GeneralSecurityException {
|
static PublicKey readPubKeyFromBuffer(Buffer<?> buf, String variation) throws GeneralSecurityException {
|
||||||
String algorithm = BASE_ALGORITHM_NAME + variation;
|
String algorithm = BASE_ALGORITHM_NAME + variation;
|
||||||
if (!SecurityUtils.isBouncyCastleRegistered()) {
|
if (!SecurityUtils.isBouncyCastleRegistered()) {
|
||||||
throw new GeneralSecurityException("BouncyCastle is required to read a key of type " + algorithm);
|
throw new GeneralSecurityException("BouncyCastle is required to read a key of type " + algorithm);
|
||||||
@@ -80,19 +81,20 @@ public class ECDSAVariationsAdapter {
|
|||||||
BigInteger bigX = new BigInteger(1, x);
|
BigInteger bigX = new BigInteger(1, x);
|
||||||
BigInteger bigY = new BigInteger(1, y);
|
BigInteger bigY = new BigInteger(1, y);
|
||||||
|
|
||||||
X9ECParameters ecParams = NISTNamedCurves.getByName(NIST_CURVES_NAMES.get(variation));
|
String name = NIST_CURVES_NAMES.get(variation);
|
||||||
ECPoint pPublicPoint = ecParams.getCurve().createPoint(bigX, bigY);
|
X9ECParameters ecParams = NISTNamedCurves.getByName(name);
|
||||||
ECParameterSpec spec = new ECParameterSpec(ecParams.getCurve(), ecParams.getG(), ecParams.getN());
|
ECNamedCurveSpec ecCurveSpec = new ECNamedCurveSpec(name, ecParams.getCurve(), ecParams.getG(), ecParams.getN());
|
||||||
ECPublicKeySpec publicSpec = new ECPublicKeySpec(pPublicPoint, spec);
|
ECPoint p = new ECPoint(bigX, bigY);
|
||||||
|
ECPublicKeySpec publicKeySpec = new ECPublicKeySpec(p, ecCurveSpec);
|
||||||
|
|
||||||
KeyFactory keyFactory = KeyFactory.getInstance("ECDSA");
|
KeyFactory keyFactory = KeyFactory.getInstance("ECDSA");
|
||||||
return keyFactory.generatePublic(publicSpec);
|
return keyFactory.generatePublic(publicKeySpec);
|
||||||
} catch (Exception ex) {
|
} catch (Exception ex) {
|
||||||
throw new GeneralSecurityException(ex);
|
throw new GeneralSecurityException(ex);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void writePubKeyContentsIntoBuffer(PublicKey pk, Buffer<?> buf) {
|
static void writePubKeyContentsIntoBuffer(PublicKey pk, Buffer<?> buf) {
|
||||||
final ECPublicKey ecdsa = (ECPublicKey) pk;
|
final ECPublicKey ecdsa = (ECPublicKey) pk;
|
||||||
byte[] encoded = SecgUtils.getEncoded(ecdsa.getW(), ecdsa.getParams().getCurve());
|
byte[] encoded = SecgUtils.getEncoded(ecdsa.getW(), ecdsa.getParams().getCurve());
|
||||||
|
|
||||||
@@ -100,8 +102,12 @@ public class ECDSAVariationsAdapter {
|
|||||||
.putBytes(encoded);
|
.putBytes(encoded);
|
||||||
}
|
}
|
||||||
|
|
||||||
public static int fieldSizeFromKey(ECPublicKey ecPublicKey) {
|
static boolean isECKeyWithFieldSize(Key key, int fieldSize) {
|
||||||
return ecPublicKey.getParams().getCurve().getField().getFieldSize();
|
return "ECDSA".equals(key.getAlgorithm())
|
||||||
|
&& fieldSizeFromKey((ECKey) key) == fieldSize;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private static int fieldSizeFromKey(ECKey ecPublicKey) {
|
||||||
|
return ecPublicKey.getParams().getCurve().getField().getFieldSize();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,6 +15,16 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.common;
|
package net.schmizz.sshj.common;
|
||||||
|
|
||||||
|
import com.hierynomus.sshj.signature.Ed25519PublicKey;
|
||||||
|
import com.hierynomus.sshj.userauth.certificate.Certificate;
|
||||||
|
import net.i2p.crypto.eddsa.EdDSAPublicKey;
|
||||||
|
import net.i2p.crypto.eddsa.spec.EdDSANamedCurveSpec;
|
||||||
|
import net.i2p.crypto.eddsa.spec.EdDSANamedCurveTable;
|
||||||
|
import net.i2p.crypto.eddsa.spec.EdDSAPublicKeySpec;
|
||||||
|
import net.schmizz.sshj.common.Buffer.BufferException;
|
||||||
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import java.math.BigInteger;
|
import java.math.BigInteger;
|
||||||
import java.security.GeneralSecurityException;
|
import java.security.GeneralSecurityException;
|
||||||
import java.security.Key;
|
import java.security.Key;
|
||||||
@@ -22,30 +32,11 @@ import java.security.KeyFactory;
|
|||||||
import java.security.PublicKey;
|
import java.security.PublicKey;
|
||||||
import java.security.interfaces.DSAPrivateKey;
|
import java.security.interfaces.DSAPrivateKey;
|
||||||
import java.security.interfaces.DSAPublicKey;
|
import java.security.interfaces.DSAPublicKey;
|
||||||
import java.security.interfaces.ECPublicKey;
|
|
||||||
import java.security.interfaces.RSAPrivateKey;
|
import java.security.interfaces.RSAPrivateKey;
|
||||||
import java.security.interfaces.RSAPublicKey;
|
import java.security.interfaces.RSAPublicKey;
|
||||||
import java.security.spec.DSAPublicKeySpec;
|
import java.security.spec.DSAPublicKeySpec;
|
||||||
import java.security.spec.RSAPublicKeySpec;
|
import java.security.spec.RSAPublicKeySpec;
|
||||||
import java.util.ArrayList;
|
import java.util.*;
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Date;
|
|
||||||
import java.util.LinkedHashMap;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Map;
|
|
||||||
|
|
||||||
import org.slf4j.Logger;
|
|
||||||
import org.slf4j.LoggerFactory;
|
|
||||||
|
|
||||||
import com.hierynomus.sshj.signature.Ed25519PublicKey;
|
|
||||||
import com.hierynomus.sshj.userauth.certificate.Certificate;
|
|
||||||
|
|
||||||
import net.i2p.crypto.eddsa.EdDSAPublicKey;
|
|
||||||
import net.i2p.crypto.eddsa.spec.EdDSANamedCurveSpec;
|
|
||||||
import net.i2p.crypto.eddsa.spec.EdDSANamedCurveTable;
|
|
||||||
import net.i2p.crypto.eddsa.spec.EdDSAPublicKeySpec;
|
|
||||||
import net.schmizz.sshj.common.Buffer.BufferException;
|
|
||||||
|
|
||||||
/** Type of key e.g. rsa, dsa */
|
/** Type of key e.g. rsa, dsa */
|
||||||
public enum KeyType {
|
public enum KeyType {
|
||||||
@@ -130,7 +121,7 @@ public enum KeyType {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected boolean isMyType(Key key) {
|
protected boolean isMyType(Key key) {
|
||||||
return ("ECDSA".equals(key.getAlgorithm()) && ECDSAVariationsAdapter.fieldSizeFromKey((ECPublicKey) key) == 256);
|
return ECDSAVariationsAdapter.isECKeyWithFieldSize(key, 256);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
||||||
@@ -151,7 +142,7 @@ public enum KeyType {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected boolean isMyType(Key key) {
|
protected boolean isMyType(Key key) {
|
||||||
return ("ECDSA".equals(key.getAlgorithm()) && ECDSAVariationsAdapter.fieldSizeFromKey((ECPublicKey) key) == 384);
|
return ECDSAVariationsAdapter.isECKeyWithFieldSize(key, 384);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
||||||
@@ -172,7 +163,7 @@ public enum KeyType {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected boolean isMyType(Key key) {
|
protected boolean isMyType(Key key) {
|
||||||
return ("ECDSA".equals(key.getAlgorithm()) && ECDSAVariationsAdapter.fieldSizeFromKey((ECPublicKey) key) == 521);
|
return ECDSAVariationsAdapter.isECKeyWithFieldSize(key, 521);
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
|
||||||
@@ -192,7 +183,7 @@ public enum KeyType {
|
|||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
EdDSANamedCurveSpec ed25519 = EdDSANamedCurveTable.getByName(EdDSANamedCurveTable.CURVE_ED25519_SHA512);
|
EdDSANamedCurveSpec ed25519 = EdDSANamedCurveTable.getByName("Ed25519");
|
||||||
EdDSAPublicKeySpec publicSpec = new EdDSAPublicKeySpec(p, ed25519);
|
EdDSAPublicKeySpec publicSpec = new EdDSAPublicKeySpec(p, ed25519);
|
||||||
return new Ed25519PublicKey(publicSpec);
|
return new Ed25519PublicKey(publicSpec);
|
||||||
|
|
||||||
|
|||||||
@@ -15,13 +15,14 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.common;
|
package net.schmizz.sshj.common;
|
||||||
|
|
||||||
import java.security.*;
|
import org.slf4j.Logger;
|
||||||
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import javax.crypto.Cipher;
|
import javax.crypto.Cipher;
|
||||||
import javax.crypto.KeyAgreement;
|
import javax.crypto.KeyAgreement;
|
||||||
import javax.crypto.Mac;
|
import javax.crypto.Mac;
|
||||||
import javax.crypto.NoSuchPaddingException;
|
import javax.crypto.NoSuchPaddingException;
|
||||||
import org.slf4j.Logger;
|
import java.security.*;
|
||||||
import org.slf4j.LoggerFactory;
|
|
||||||
|
|
||||||
import static java.lang.String.format;
|
import static java.lang.String.format;
|
||||||
|
|
||||||
@@ -68,15 +69,15 @@ public class SecurityUtils {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (securityProvider == null) {
|
if (securityProvider == null) {
|
||||||
MessageDigest.getInstance("MD5", provider.getName());
|
MessageDigest.getInstance("MD5", provider);
|
||||||
KeyAgreement.getInstance("DH", provider.getName());
|
KeyAgreement.getInstance("DH", provider);
|
||||||
setSecurityProvider(provider.getName());
|
setSecurityProvider(provider.getName());
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
} catch (NoSuchAlgorithmException e) {
|
} catch (NoSuchAlgorithmException e) {
|
||||||
LOG.info(format("Security Provider '%s' does not support necessary algorithm", providerClassName), e);
|
LOG.info(format("Security Provider '%s' does not support necessary algorithm", providerClassName), e);
|
||||||
} catch (NoSuchProviderException e) {
|
} catch (Exception e) {
|
||||||
LOG.info("Registration of Security Provider '{}' unexpectedly failed", providerClassName);
|
LOG.info(format("Registration of Security Provider '%s' unexpectedly failed", providerClassName), e);
|
||||||
}
|
}
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -137,6 +137,15 @@ public class LocalPortForwarder {
|
|||||||
listen(Thread.currentThread());
|
listen(Thread.currentThread());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether this listener is running (ie. whether a thread is attached to it).
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
*/
|
||||||
|
public boolean isRunning() {
|
||||||
|
return this.runningThread != null && !serverSocket.isClosed();
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Start listening for incoming connections and forward to remote host as a channel and ensure that the thread is registered.
|
* Start listening for incoming connections and forward to remote host as a channel and ensure that the thread is registered.
|
||||||
* This is useful if for instance {@link #close() is called from another thread}
|
* This is useful if for instance {@link #close() is called from another thread}
|
||||||
|
|||||||
@@ -82,9 +82,7 @@ public class RemoteFile
|
|||||||
throws IOException {
|
throws IOException {
|
||||||
return requester.request(newRequest(PacketType.WRITE)
|
return requester.request(newRequest(PacketType.WRITE)
|
||||||
.putUInt64(fileOffset)
|
.putUInt64(fileOffset)
|
||||||
// TODO The SFTP spec claims this field is unneeded...? See #187
|
.putString(data, off, len)
|
||||||
.putUInt32(len)
|
|
||||||
.putRawBytes(data, off, len)
|
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -15,34 +15,48 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.signature;
|
package net.schmizz.sshj.signature;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.Buffer;
|
||||||
import net.schmizz.sshj.common.SSHRuntimeException;
|
import net.schmizz.sshj.common.SSHRuntimeException;
|
||||||
import net.schmizz.sshj.common.SecurityUtils;
|
import net.schmizz.sshj.common.SecurityUtils;
|
||||||
|
|
||||||
import java.security.GeneralSecurityException;
|
import java.security.*;
|
||||||
import java.security.PrivateKey;
|
|
||||||
import java.security.PublicKey;
|
|
||||||
import java.security.SignatureException;
|
|
||||||
|
|
||||||
/** An abstract class for {@link Signature} that implements common functionality. */
|
/**
|
||||||
|
* An abstract class for {@link Signature} that implements common functionality.
|
||||||
|
*/
|
||||||
public abstract class AbstractSignature
|
public abstract class AbstractSignature
|
||||||
implements Signature {
|
implements Signature {
|
||||||
|
|
||||||
protected final String algorithm;
|
@SuppressWarnings("PMD.UnnecessaryFullyQualifiedName")
|
||||||
protected java.security.Signature signature;
|
protected final java.security.Signature signature;
|
||||||
|
|
||||||
protected AbstractSignature(String algorithm) {
|
protected AbstractSignature(String algorithm) {
|
||||||
this.algorithm = algorithm;
|
try {
|
||||||
|
this.signature = SecurityUtils.getSignature(algorithm);
|
||||||
|
} catch (GeneralSecurityException e) {
|
||||||
|
throw new SSHRuntimeException(e);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
protected AbstractSignature(@SuppressWarnings("PMD.UnnecessaryFullyQualifiedName")
|
||||||
|
java.security.Signature signatureEngine) {
|
||||||
|
this.signature = signatureEngine;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void init(PublicKey publicKey, PrivateKey privateKey) {
|
public void initVerify(PublicKey publicKey) {
|
||||||
try {
|
try {
|
||||||
signature = SecurityUtils.getSignature(algorithm);
|
signature.initVerify(publicKey);
|
||||||
if (publicKey != null)
|
} catch (InvalidKeyException e) {
|
||||||
signature.initVerify(publicKey);
|
throw new SSHRuntimeException(e);
|
||||||
if (privateKey != null)
|
}
|
||||||
signature.initSign(privateKey);
|
}
|
||||||
} catch (GeneralSecurityException e) {
|
|
||||||
|
@Override
|
||||||
|
public void initSign(PrivateKey privateKey) {
|
||||||
|
try {
|
||||||
|
signature.initSign(privateKey);
|
||||||
|
} catch (InvalidKeyException e) {
|
||||||
throw new SSHRuntimeException(e);
|
throw new SSHRuntimeException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -70,23 +84,24 @@ public abstract class AbstractSignature
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
protected byte[] extractSig(byte[] sig) {
|
/**
|
||||||
if (sig[0] == 0 && sig[1] == 0 && sig[2] == 0) {
|
* Check whether the signature is generated using the expected algorithm, and if so, return the signature blob
|
||||||
int i = 0;
|
*
|
||||||
int j = sig[i++] << 24 & 0xff000000
|
* @param sig The full signature
|
||||||
| sig[i++] << 16 & 0x00ff0000
|
* @param expectedKeyAlgorithm The expected key algorithm
|
||||||
| sig[i++] << 8 & 0x0000ff00
|
* @return The blob part of the signature
|
||||||
| sig[i++] & 0x000000ff;
|
*/
|
||||||
i += j;
|
protected byte[] extractSig(byte[] sig, String expectedKeyAlgorithm) {
|
||||||
j = sig[i++] << 24 & 0xff000000
|
Buffer.PlainBuffer buffer = new Buffer.PlainBuffer(sig);
|
||||||
| sig[i++] << 16 & 0x00ff0000
|
try {
|
||||||
| sig[i++] << 8 & 0x0000ff00
|
String algo = buffer.readString();
|
||||||
| sig[i++] & 0x000000ff;
|
if (!expectedKeyAlgorithm.equals(algo)) {
|
||||||
byte[] newSig = new byte[j];
|
throw new SSHRuntimeException("Expected '" + expectedKeyAlgorithm + "' key algorithm, but got: " + algo);
|
||||||
System.arraycopy(sig, i, newSig, 0, j);
|
}
|
||||||
return newSig;
|
return buffer.readBytes();
|
||||||
|
} catch (Buffer.BufferException e) {
|
||||||
|
throw new SSHRuntimeException(e);
|
||||||
}
|
}
|
||||||
return sig;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -22,13 +22,24 @@ import java.security.PublicKey;
|
|||||||
public interface Signature {
|
public interface Signature {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Initialize this signature with the given public key and private key. If the private key is null, only signature
|
* Initialize this signature with the given public key for signature verification.
|
||||||
* verification can be performed.
|
|
||||||
*
|
*
|
||||||
* @param pubkey (null-ok) specify in case verification is needed
|
* Note that subsequent calls to either {@link #initVerify(PublicKey)} or {@link #initSign(PrivateKey)} will
|
||||||
* @param prvkey (null-ok) specify in case signing is needed
|
* overwrite prior initialization.
|
||||||
|
*
|
||||||
|
* @param pubkey the public key to use for signature verification
|
||||||
*/
|
*/
|
||||||
void init(PublicKey pubkey, PrivateKey prvkey);
|
void initVerify(PublicKey pubkey);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initialize this signature with the given private key for signing.
|
||||||
|
*
|
||||||
|
* Note that subsequent calls to either {@link #initVerify(PublicKey)} or {@link #initSign(PrivateKey)} will
|
||||||
|
* overwrite prior initialization.
|
||||||
|
*
|
||||||
|
* @param prvkey the private key to use for signing
|
||||||
|
*/
|
||||||
|
void initSign(PrivateKey prvkey);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Convenience method, same as calling {@link #update(byte[], int, int)} with offset as {@code 0} and {@code
|
* Convenience method, same as calling {@link #update(byte[], int, int)} with offset as {@code 0} and {@code
|
||||||
|
|||||||
@@ -17,14 +17,23 @@ package net.schmizz.sshj.signature;
|
|||||||
|
|
||||||
import net.schmizz.sshj.common.KeyType;
|
import net.schmizz.sshj.common.KeyType;
|
||||||
import net.schmizz.sshj.common.SSHRuntimeException;
|
import net.schmizz.sshj.common.SSHRuntimeException;
|
||||||
|
import org.bouncycastle.asn1.*;
|
||||||
|
|
||||||
|
import java.io.ByteArrayOutputStream;
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.math.BigInteger;
|
||||||
import java.security.SignatureException;
|
import java.security.SignatureException;
|
||||||
|
import java.util.Arrays;
|
||||||
|
|
||||||
/** DSA {@link Signature} */
|
/**
|
||||||
|
* DSA {@link Signature}
|
||||||
|
*/
|
||||||
public class SignatureDSA
|
public class SignatureDSA
|
||||||
extends AbstractSignature {
|
extends AbstractSignature {
|
||||||
|
|
||||||
/** A named factory for DSA signature */
|
/**
|
||||||
|
* A named factory for DSA signature
|
||||||
|
*/
|
||||||
public static class Factory
|
public static class Factory
|
||||||
implements net.schmizz.sshj.common.Factory.Named<Signature> {
|
implements net.schmizz.sshj.common.Factory.Named<Signature> {
|
||||||
|
|
||||||
@@ -74,33 +83,33 @@ public class SignatureDSA
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean verify(byte[] sig) {
|
public boolean verify(byte[] sig) {
|
||||||
sig = extractSig(sig);
|
|
||||||
|
|
||||||
// ASN.1
|
|
||||||
int frst = (sig[0] & 0x80) != 0 ? 1 : 0;
|
|
||||||
int scnd = (sig[20] & 0x80) != 0 ? 1 : 0;
|
|
||||||
|
|
||||||
int length = sig.length + 6 + frst + scnd;
|
|
||||||
byte[] tmp = new byte[length];
|
|
||||||
tmp[0] = (byte) 0x30;
|
|
||||||
tmp[1] = (byte) 0x2c;
|
|
||||||
tmp[1] += frst;
|
|
||||||
tmp[1] += scnd;
|
|
||||||
tmp[2] = (byte) 0x02;
|
|
||||||
tmp[3] = (byte) 0x14;
|
|
||||||
tmp[3] += frst;
|
|
||||||
System.arraycopy(sig, 0, tmp, 4 + frst, 20);
|
|
||||||
tmp[4 + tmp[3]] = (byte) 0x02;
|
|
||||||
tmp[5 + tmp[3]] = (byte) 0x14;
|
|
||||||
tmp[5 + tmp[3]] += scnd;
|
|
||||||
System.arraycopy(sig, 20, tmp, 6 + tmp[3] + scnd, 20);
|
|
||||||
sig = tmp;
|
|
||||||
|
|
||||||
try {
|
try {
|
||||||
return signature.verify(sig);
|
byte[] sigBlob = extractSig(sig, "ssh-dss");
|
||||||
|
return signature.verify(asnEncode(sigBlob));
|
||||||
} catch (SignatureException e) {
|
} catch (SignatureException e) {
|
||||||
throw new SSHRuntimeException(e);
|
throw new SSHRuntimeException(e);
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new SSHRuntimeException(e);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Encodes the signature as a DER sequence (ASN.1 format).
|
||||||
|
*/
|
||||||
|
private byte[] asnEncode(byte[] sigBlob) throws IOException {
|
||||||
|
byte[] r = new BigInteger(1, Arrays.copyOfRange(sigBlob, 0, 20)).toByteArray();
|
||||||
|
byte[] s = new BigInteger(1, Arrays.copyOfRange(sigBlob, 20, 40)).toByteArray();
|
||||||
|
|
||||||
|
ASN1EncodableVector vector = new ASN1EncodableVector();
|
||||||
|
vector.add(new ASN1Integer(r));
|
||||||
|
vector.add(new ASN1Integer(s));
|
||||||
|
|
||||||
|
ByteArrayOutputStream baos = new ByteArrayOutputStream();
|
||||||
|
ASN1OutputStream asnOS = new ASN1OutputStream(baos);
|
||||||
|
|
||||||
|
asnOS.writeObject(new DERSequence(vector));
|
||||||
|
asnOS.flush();
|
||||||
|
|
||||||
|
return baos.toByteArray();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,19 +15,18 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.signature;
|
package net.schmizz.sshj.signature;
|
||||||
|
|
||||||
import java.io.ByteArrayOutputStream;
|
import net.schmizz.sshj.common.Buffer;
|
||||||
import java.io.IOException;
|
import net.schmizz.sshj.common.KeyType;
|
||||||
import java.math.BigInteger;
|
import net.schmizz.sshj.common.SSHRuntimeException;
|
||||||
import java.security.SignatureException;
|
|
||||||
|
|
||||||
import org.bouncycastle.asn1.ASN1EncodableVector;
|
import org.bouncycastle.asn1.ASN1EncodableVector;
|
||||||
import org.bouncycastle.asn1.ASN1Integer;
|
import org.bouncycastle.asn1.ASN1Integer;
|
||||||
import org.bouncycastle.asn1.ASN1OutputStream;
|
import org.bouncycastle.asn1.ASN1OutputStream;
|
||||||
import org.bouncycastle.asn1.DERSequence;
|
import org.bouncycastle.asn1.DERSequence;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.Buffer;
|
import java.io.ByteArrayOutputStream;
|
||||||
import net.schmizz.sshj.common.KeyType;
|
import java.io.IOException;
|
||||||
import net.schmizz.sshj.common.SSHRuntimeException;
|
import java.math.BigInteger;
|
||||||
|
import java.security.SignatureException;
|
||||||
|
|
||||||
/** ECDSA {@link Signature} */
|
/** ECDSA {@link Signature} */
|
||||||
public class SignatureECDSA extends AbstractSignature {
|
public class SignatureECDSA extends AbstractSignature {
|
||||||
@@ -99,7 +98,7 @@ public class SignatureECDSA extends AbstractSignature {
|
|||||||
System.arraycopy(sig, 4, r, 0, rLen);
|
System.arraycopy(sig, 4, r, 0, rLen);
|
||||||
System.arraycopy(sig, 6 + rLen, s, 0, sLen);
|
System.arraycopy(sig, 6 + rLen, s, 0, sLen);
|
||||||
|
|
||||||
Buffer buf = new Buffer.PlainBuffer();
|
Buffer.PlainBuffer buf = new Buffer.PlainBuffer();
|
||||||
buf.putMPInt(new BigInteger(r));
|
buf.putMPInt(new BigInteger(r));
|
||||||
buf.putMPInt(new BigInteger(s));
|
buf.putMPInt(new BigInteger(s));
|
||||||
|
|
||||||
@@ -108,26 +107,9 @@ public class SignatureECDSA extends AbstractSignature {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean verify(byte[] sig) {
|
public boolean verify(byte[] sig) {
|
||||||
byte[] r;
|
|
||||||
byte[] s;
|
|
||||||
try {
|
try {
|
||||||
Buffer sigbuf = new Buffer.PlainBuffer(sig);
|
byte[] sigBlob = extractSig(sig, keyTypeName);
|
||||||
final String algo = new String(sigbuf.readBytes());
|
return signature.verify(asnEncode(sigBlob));
|
||||||
if (!keyTypeName.equals(algo)) {
|
|
||||||
throw new SSHRuntimeException(String.format("Signature :: " + keyTypeName + " expected, got %s", algo));
|
|
||||||
}
|
|
||||||
final int rsLen = sigbuf.readUInt32AsInt();
|
|
||||||
if (sigbuf.available() != rsLen) {
|
|
||||||
throw new SSHRuntimeException("Invalid key length");
|
|
||||||
}
|
|
||||||
r = sigbuf.readBytes();
|
|
||||||
s = sigbuf.readBytes();
|
|
||||||
} catch (Exception e) {
|
|
||||||
throw new SSHRuntimeException(e);
|
|
||||||
}
|
|
||||||
|
|
||||||
try {
|
|
||||||
return signature.verify(asnEncode(r, s));
|
|
||||||
} catch (SignatureException e) {
|
} catch (SignatureException e) {
|
||||||
throw new SSHRuntimeException(e);
|
throw new SSHRuntimeException(e);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
@@ -135,29 +117,19 @@ public class SignatureECDSA extends AbstractSignature {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private byte[] asnEncode(byte[] r, byte[] s) throws IOException {
|
/**
|
||||||
int rLen = r.length;
|
* Encodes the signature as a DER sequence (ASN.1 format).
|
||||||
int sLen = s.length;
|
*/
|
||||||
|
private byte[] asnEncode(byte[] sigBlob) throws IOException {
|
||||||
/*
|
Buffer.PlainBuffer sigbuf = new Buffer.PlainBuffer(sigBlob);
|
||||||
* We can't have the high bit set, so add an extra zero at the beginning
|
byte[] r = sigbuf.readBytes();
|
||||||
* if so.
|
byte[] s = sigbuf.readBytes();
|
||||||
*/
|
|
||||||
if ((r[0] & 0x80) != 0) {
|
|
||||||
rLen++;
|
|
||||||
}
|
|
||||||
if ((s[0] & 0x80) != 0) {
|
|
||||||
sLen++;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Calculate total output length */
|
|
||||||
int length = 6 + rLen + sLen;
|
|
||||||
|
|
||||||
ASN1EncodableVector vector = new ASN1EncodableVector();
|
ASN1EncodableVector vector = new ASN1EncodableVector();
|
||||||
vector.add(new ASN1Integer(r));
|
vector.add(new ASN1Integer(r));
|
||||||
vector.add(new ASN1Integer(s));
|
vector.add(new ASN1Integer(s));
|
||||||
|
|
||||||
ByteArrayOutputStream baos = new ByteArrayOutputStream(length);
|
ByteArrayOutputStream baos = new ByteArrayOutputStream();
|
||||||
ASN1OutputStream asnOS = new ASN1OutputStream(baos);
|
ASN1OutputStream asnOS = new ASN1OutputStream(baos);
|
||||||
|
|
||||||
asnOS.writeObject(new DERSequence(vector));
|
asnOS.writeObject(new DERSequence(vector));
|
||||||
|
|||||||
@@ -51,7 +51,7 @@ public class SignatureRSA
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean verify(byte[] sig) {
|
public boolean verify(byte[] sig) {
|
||||||
sig = extractSig(sig);
|
sig = extractSig(sig, "ssh-rsa");
|
||||||
try {
|
try {
|
||||||
return signature.verify(sig);
|
return signature.verify(sig);
|
||||||
} catch (SignatureException e) {
|
} catch (SignatureException e) {
|
||||||
|
|||||||
@@ -197,6 +197,12 @@ final class KeyExchanger
|
|||||||
if (hkv.verify(transport.getRemoteHost(), transport.getRemotePort(), key))
|
if (hkv.verify(transport.getRemoteHost(), transport.getRemotePort(), key))
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
log.error("Disconnecting because none of the configured Host key verifiers ({}) could verify '{}' host key with fingerprint {} for {}:{}",
|
||||||
|
hostVerifiers,
|
||||||
|
KeyType.fromKey(key),
|
||||||
|
SecurityUtils.getFingerprint(key),
|
||||||
|
transport.getRemoteHost(),
|
||||||
|
transport.getRemotePort());
|
||||||
|
|
||||||
throw new TransportException(DisconnectReason.HOST_KEY_NOT_VERIFIABLE,
|
throw new TransportException(DisconnectReason.HOST_KEY_NOT_VERIFIABLE,
|
||||||
"Could not verify `" + KeyType.fromKey(key)
|
"Could not verify `" + KeyType.fromKey(key)
|
||||||
|
|||||||
@@ -15,7 +15,14 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.cipher;
|
package net.schmizz.sshj.transport.cipher;
|
||||||
|
|
||||||
/** {@code aes128-cbc} cipher */
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* {@code aes128-cbc} cipher
|
||||||
|
*
|
||||||
|
* @deprecated Use {@link BlockCiphers#AES128CBC()}
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public class AES128CBC
|
public class AES128CBC
|
||||||
extends BlockCipher {
|
extends BlockCipher {
|
||||||
|
|
||||||
@@ -32,6 +39,11 @@ public class AES128CBC
|
|||||||
public String getName() {
|
public String getName() {
|
||||||
return "aes128-cbc";
|
return "aes128-cbc";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return getName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public AES128CBC() {
|
public AES128CBC() {
|
||||||
|
|||||||
@@ -15,11 +15,18 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.cipher;
|
package net.schmizz.sshj.transport.cipher;
|
||||||
|
|
||||||
/** {@code aes128-ctr} cipher */
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* {@code aes128-ctr} cipher
|
||||||
|
*
|
||||||
|
* @deprecated Use {@link BlockCiphers#AES128CTR()}
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public class AES128CTR
|
public class AES128CTR
|
||||||
extends BlockCipher {
|
extends BlockCipher {
|
||||||
|
|
||||||
/** Named factory for AES128CBC Cipher */
|
/** Named factory for AES128CTR Cipher */
|
||||||
public static class Factory
|
public static class Factory
|
||||||
implements net.schmizz.sshj.common.Factory.Named<Cipher> {
|
implements net.schmizz.sshj.common.Factory.Named<Cipher> {
|
||||||
|
|
||||||
@@ -32,6 +39,11 @@ public class AES128CTR
|
|||||||
public String getName() {
|
public String getName() {
|
||||||
return "aes128-ctr";
|
return "aes128-ctr";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return getName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public AES128CTR() {
|
public AES128CTR() {
|
||||||
|
|||||||
@@ -15,7 +15,14 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.cipher;
|
package net.schmizz.sshj.transport.cipher;
|
||||||
|
|
||||||
/** {@code aes192-cbc} cipher */
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* {@code aes192-cbc} cipher
|
||||||
|
*
|
||||||
|
* @deprecated Use {@link BlockCiphers#AES192CBC()}
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public class AES192CBC
|
public class AES192CBC
|
||||||
extends BlockCipher {
|
extends BlockCipher {
|
||||||
|
|
||||||
@@ -32,6 +39,11 @@ public class AES192CBC
|
|||||||
public String getName() {
|
public String getName() {
|
||||||
return "aes192-cbc";
|
return "aes192-cbc";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return getName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public AES192CBC() {
|
public AES192CBC() {
|
||||||
|
|||||||
@@ -15,7 +15,14 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.cipher;
|
package net.schmizz.sshj.transport.cipher;
|
||||||
|
|
||||||
/** {@code aes192-ctr} cipher */
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* {@code aes192-ctr} cipher
|
||||||
|
*
|
||||||
|
* @deprecated Use {@link BlockCiphers#AES192CTR()}
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public class AES192CTR
|
public class AES192CTR
|
||||||
extends BlockCipher {
|
extends BlockCipher {
|
||||||
|
|
||||||
@@ -32,6 +39,11 @@ public class AES192CTR
|
|||||||
public String getName() {
|
public String getName() {
|
||||||
return "aes192-ctr";
|
return "aes192-ctr";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return getName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public AES192CTR() {
|
public AES192CTR() {
|
||||||
|
|||||||
@@ -15,7 +15,14 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.cipher;
|
package net.schmizz.sshj.transport.cipher;
|
||||||
|
|
||||||
/** {@code aes256-ctr} cipher */
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* {@code aes256-cbc} cipher
|
||||||
|
*
|
||||||
|
* @deprecated Use {@link BlockCiphers#AES256CBC()}
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public class AES256CBC
|
public class AES256CBC
|
||||||
extends BlockCipher {
|
extends BlockCipher {
|
||||||
|
|
||||||
@@ -32,6 +39,11 @@ public class AES256CBC
|
|||||||
public String getName() {
|
public String getName() {
|
||||||
return "aes256-cbc";
|
return "aes256-cbc";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return getName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public AES256CBC() {
|
public AES256CBC() {
|
||||||
|
|||||||
@@ -15,11 +15,18 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.cipher;
|
package net.schmizz.sshj.transport.cipher;
|
||||||
|
|
||||||
/** {@code aes256-ctr} cipher */
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* {@code aes256-ctr} cipher
|
||||||
|
*
|
||||||
|
* @deprecated Use {@link BlockCiphers#AES256CTR()}
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public class AES256CTR
|
public class AES256CTR
|
||||||
extends BlockCipher {
|
extends BlockCipher {
|
||||||
|
|
||||||
/** Named factory for AES256CBC Cipher */
|
/** Named factory for AES256CTR Cipher */
|
||||||
public static class Factory
|
public static class Factory
|
||||||
implements net.schmizz.sshj.common.Factory.Named<Cipher> {
|
implements net.schmizz.sshj.common.Factory.Named<Cipher> {
|
||||||
|
|
||||||
@@ -32,6 +39,11 @@ public class AES256CTR
|
|||||||
public String getName() {
|
public String getName() {
|
||||||
return "aes256-ctr";
|
return "aes256-ctr";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return getName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public AES256CTR() {
|
public AES256CTR() {
|
||||||
|
|||||||
@@ -15,7 +15,14 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.cipher;
|
package net.schmizz.sshj.transport.cipher;
|
||||||
|
|
||||||
/** {@code blowfish-ctr} cipher */
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* {@code blowfish-bcb} cipher
|
||||||
|
*
|
||||||
|
* @deprecated Use {@link BlockCiphers#BlowfishCBC()}
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public class BlowfishCBC
|
public class BlowfishCBC
|
||||||
extends BlockCipher {
|
extends BlockCipher {
|
||||||
|
|
||||||
@@ -32,6 +39,11 @@ public class BlowfishCBC
|
|||||||
public String getName() {
|
public String getName() {
|
||||||
return "blowfish-cbc";
|
return "blowfish-cbc";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return getName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public BlowfishCBC() {
|
public BlowfishCBC() {
|
||||||
|
|||||||
@@ -15,7 +15,14 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.cipher;
|
package net.schmizz.sshj.transport.cipher;
|
||||||
|
|
||||||
/** {@code 3des-cbc} cipher */
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* {@code 3des-cbc} cipher
|
||||||
|
*
|
||||||
|
* @deprecated Use {@link BlockCiphers#TripleDESCBC()}
|
||||||
|
*/
|
||||||
|
@Deprecated
|
||||||
public class TripleDESCBC
|
public class TripleDESCBC
|
||||||
extends BlockCipher {
|
extends BlockCipher {
|
||||||
|
|
||||||
@@ -32,6 +39,11 @@ public class TripleDESCBC
|
|||||||
public String getName() {
|
public String getName() {
|
||||||
return "3des-cbc";
|
return "3des-cbc";
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String toString() {
|
||||||
|
return getName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public TripleDESCBC() {
|
public TripleDESCBC() {
|
||||||
|
|||||||
@@ -80,7 +80,7 @@ public abstract class AbstractDHG extends AbstractDH
|
|||||||
|
|
||||||
Signature signature = Factory.Named.Util.create(trans.getConfig().getSignatureFactories(),
|
Signature signature = Factory.Named.Util.create(trans.getConfig().getSignatureFactories(),
|
||||||
KeyType.fromKey(hostKey).toString());
|
KeyType.fromKey(hostKey).toString());
|
||||||
signature.init(hostKey, null);
|
signature.initVerify(hostKey);
|
||||||
signature.update(H, 0, H.length);
|
signature.update(H, 0, H.length);
|
||||||
if (!signature.verify(sig))
|
if (!signature.verify(sig))
|
||||||
throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED,
|
throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED,
|
||||||
|
|||||||
@@ -86,7 +86,7 @@ public abstract class AbstractDHGex extends AbstractDH {
|
|||||||
H = digest.digest();
|
H = digest.digest();
|
||||||
Signature signature = Factory.Named.Util.create(trans.getConfig().getSignatureFactories(),
|
Signature signature = Factory.Named.Util.create(trans.getConfig().getSignatureFactories(),
|
||||||
KeyType.fromKey(hostKey).toString());
|
KeyType.fromKey(hostKey).toString());
|
||||||
signature.init(hostKey, null);
|
signature.initVerify(hostKey);
|
||||||
signature.update(H, 0, H.length);
|
signature.update(H, 0, H.length);
|
||||||
if (!signature.verify(sig))
|
if (!signature.verify(sig))
|
||||||
throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED,
|
throw new TransportException(DisconnectReason.KEY_EXCHANGE_FAILED,
|
||||||
|
|||||||
@@ -15,16 +15,16 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.kex;
|
package net.schmizz.sshj.transport.kex;
|
||||||
|
|
||||||
import java.math.BigInteger;
|
import net.schmizz.sshj.common.Factory;
|
||||||
import java.security.GeneralSecurityException;
|
import net.schmizz.sshj.transport.random.Random;
|
||||||
import java.security.spec.AlgorithmParameterSpec;
|
|
||||||
import java.util.Arrays;
|
|
||||||
import org.bouncycastle.asn1.x9.X9ECParameters;
|
import org.bouncycastle.asn1.x9.X9ECParameters;
|
||||||
import org.bouncycastle.crypto.ec.CustomNamedCurves;
|
import org.bouncycastle.crypto.ec.CustomNamedCurves;
|
||||||
import org.bouncycastle.jce.spec.ECParameterSpec;
|
import org.bouncycastle.jce.spec.ECParameterSpec;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.Factory;
|
import java.math.BigInteger;
|
||||||
import net.schmizz.sshj.transport.random.Random;
|
import java.security.GeneralSecurityException;
|
||||||
|
import java.security.spec.AlgorithmParameterSpec;
|
||||||
|
import java.util.Arrays;
|
||||||
|
|
||||||
public class Curve25519DH extends DHBase {
|
public class Curve25519DH extends DHBase {
|
||||||
|
|
||||||
|
|||||||
@@ -15,10 +15,11 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.transport.random;
|
package net.schmizz.sshj.transport.random;
|
||||||
|
|
||||||
import java.security.SecureRandom;
|
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
|
import java.security.SecureRandom;
|
||||||
|
|
||||||
/** A {@link Random} implementation using the built-in {@link SecureRandom} PRNG. */
|
/** A {@link Random} implementation using the built-in {@link SecureRandom} PRNG. */
|
||||||
public class JCERandom
|
public class JCERandom
|
||||||
implements Random {
|
implements Random {
|
||||||
|
|||||||
@@ -0,0 +1,124 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package net.schmizz.sshj.transport.verification;
|
||||||
|
|
||||||
|
import java.io.IOException;
|
||||||
|
import java.security.GeneralSecurityException;
|
||||||
|
import java.security.MessageDigest;
|
||||||
|
import java.security.PublicKey;
|
||||||
|
import java.util.Arrays;
|
||||||
|
import java.util.regex.Pattern;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.Base64;
|
||||||
|
import net.schmizz.sshj.common.Buffer;
|
||||||
|
import net.schmizz.sshj.common.SSHRuntimeException;
|
||||||
|
import net.schmizz.sshj.common.SecurityUtils;
|
||||||
|
import net.schmizz.sshj.transport.verification.HostKeyVerifier;
|
||||||
|
|
||||||
|
public class FingerprintVerifier implements HostKeyVerifier {
|
||||||
|
private static final Pattern MD5_FINGERPRINT_PATTERN = Pattern.compile("[0-9a-f]{2}+(:[0-9a-f]{2}+){15}+");
|
||||||
|
/**
|
||||||
|
* Valid examples:
|
||||||
|
*
|
||||||
|
* <ul>
|
||||||
|
* <li><code>4b:69:6c:72:6f:79:20:77:61:73:20:68:65:72:65:21</code></li>
|
||||||
|
* <li><code>MD5:4b:69:6c:72:6f:79:20:77:61:73:20:68:65:72:65:21</code></li>
|
||||||
|
* <li><code>SHA1:FghNYu1l/HyE/qWbdQ2mkxrd0rU</code></li>
|
||||||
|
* <li><code>SHA1:FghNYu1l/HyE/qWbdQ2mkxrd0rU=</code></li>
|
||||||
|
* <li><code>SHA256:l/SjyCoKP8jAx3d8k8MWH+UZG0gcuIR7TQRE/A3faQo</code></li>
|
||||||
|
* <li><code>SHA256:l/SjyCoKP8jAx3d8k8MWH+UZG0gcuIR7TQRE/A3faQo=</code></li>
|
||||||
|
* </ul>
|
||||||
|
*
|
||||||
|
*
|
||||||
|
* @param fingerprint of an SSH fingerprint in MD5 (hex), SHA-1 (base64) or SHA-256(base64) format
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
*/
|
||||||
|
public static HostKeyVerifier getInstance(String fingerprint) {
|
||||||
|
|
||||||
|
try {
|
||||||
|
if (fingerprint.startsWith("SHA1:")) {
|
||||||
|
return new FingerprintVerifier("SHA-1", fingerprint.substring(5));
|
||||||
|
}
|
||||||
|
|
||||||
|
if (fingerprint.startsWith("SHA256:")) {
|
||||||
|
return new FingerprintVerifier("SHA-256", fingerprint.substring(7));
|
||||||
|
}
|
||||||
|
|
||||||
|
final String md5;
|
||||||
|
if (fingerprint.startsWith("MD5:")) {
|
||||||
|
md5 = fingerprint.substring(4); // remove the MD5: prefix
|
||||||
|
} else {
|
||||||
|
md5 = fingerprint;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!MD5_FINGERPRINT_PATTERN.matcher(md5).matches()) {
|
||||||
|
throw new SSHRuntimeException("Invalid MD5 fingerprint: " + fingerprint);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Use the old default fingerprint verifier for md5 fingerprints
|
||||||
|
return (new HostKeyVerifier() {
|
||||||
|
@Override
|
||||||
|
public boolean verify(String h, int p, PublicKey k) {
|
||||||
|
return SecurityUtils.getFingerprint(k).equals(md5);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
} catch (SSHRuntimeException e) {
|
||||||
|
throw e;
|
||||||
|
} catch (IOException e) {
|
||||||
|
throw new SSHRuntimeException(e);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
private final String digestAlgorithm;
|
||||||
|
private final byte[] fingerprintData;
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* @param digestAlgorithm
|
||||||
|
* the used digest algorithm
|
||||||
|
* @param base64Fingerprint
|
||||||
|
* base64 encoded fingerprint data
|
||||||
|
*
|
||||||
|
* @throws IOException
|
||||||
|
*/
|
||||||
|
private FingerprintVerifier(String digestAlgorithm, String base64Fingerprint) throws IOException {
|
||||||
|
this.digestAlgorithm = digestAlgorithm;
|
||||||
|
|
||||||
|
// if the length is not padded with "=" chars at the end so that it is divisible by 4 the SSHJ Base64 implementation does not work correctly
|
||||||
|
StringBuilder base64FingerprintBuilder = new StringBuilder(base64Fingerprint);
|
||||||
|
while (base64FingerprintBuilder.length() % 4 != 0) {
|
||||||
|
base64FingerprintBuilder.append("=");
|
||||||
|
}
|
||||||
|
fingerprintData = Base64.decode(base64FingerprintBuilder.toString());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public boolean verify(String hostname, int port, PublicKey key) {
|
||||||
|
MessageDigest digest;
|
||||||
|
try {
|
||||||
|
digest = SecurityUtils.getMessageDigest(digestAlgorithm);
|
||||||
|
} catch (GeneralSecurityException e) {
|
||||||
|
throw new SSHRuntimeException(e);
|
||||||
|
}
|
||||||
|
digest.update(new Buffer.PlainBuffer().putPublicKey(key).getCompactData());
|
||||||
|
|
||||||
|
byte[] digestData = digest.digest();
|
||||||
|
return Arrays.equals(fingerprintData, digestData);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -340,7 +340,7 @@ public class OpenSSHKnownHosts
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean verify(PublicKey key) throws IOException {
|
public boolean verify(PublicKey key) throws IOException {
|
||||||
return key.equals(this.key) && marker != Marker.REVOKED;
|
return getKeyString(key).equals(getKeyString(this.key)) && marker != Marker.REVOKED;
|
||||||
}
|
}
|
||||||
|
|
||||||
public String getLine() {
|
public String getLine() {
|
||||||
@@ -350,17 +350,17 @@ public class OpenSSHKnownHosts
|
|||||||
|
|
||||||
line.append(getHostPart());
|
line.append(getHostPart());
|
||||||
line.append(" ").append(type.toString());
|
line.append(" ").append(type.toString());
|
||||||
line.append(" ").append(getKeyString());
|
line.append(" ").append(getKeyString(key));
|
||||||
return line.toString();
|
return line.toString();
|
||||||
}
|
}
|
||||||
|
|
||||||
private String getKeyString() {
|
private String getKeyString(PublicKey pk) {
|
||||||
final Buffer.PlainBuffer buf = new Buffer.PlainBuffer().putPublicKey(key);
|
final Buffer.PlainBuffer buf = new Buffer.PlainBuffer().putPublicKey(pk);
|
||||||
return Base64.encodeBytes(buf.array(), buf.rpos(), buf.available());
|
return Base64.encodeBytes(buf.array(), buf.rpos(), buf.available());
|
||||||
}
|
}
|
||||||
|
|
||||||
protected String getHostPart() {
|
protected String getHostPart() {
|
||||||
return hostPart;
|
return hostPart;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -15,6 +15,9 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.userauth.keyprovider;
|
package net.schmizz.sshj.userauth.keyprovider;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.KeyType;
|
||||||
|
import net.schmizz.sshj.userauth.password.*;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.Reader;
|
import java.io.Reader;
|
||||||
@@ -22,9 +25,6 @@ import java.security.KeyPair;
|
|||||||
import java.security.PrivateKey;
|
import java.security.PrivateKey;
|
||||||
import java.security.PublicKey;
|
import java.security.PublicKey;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.KeyType;
|
|
||||||
import net.schmizz.sshj.userauth.password.*;
|
|
||||||
|
|
||||||
public abstract class BaseFileKeyProvider implements FileKeyProvider {
|
public abstract class BaseFileKeyProvider implements FileKeyProvider {
|
||||||
protected Resource<?> resource;
|
protected Resource<?> resource;
|
||||||
protected PasswordFinder pwdf;
|
protected PasswordFinder pwdf;
|
||||||
|
|||||||
@@ -15,10 +15,10 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.userauth.keyprovider;
|
package net.schmizz.sshj.userauth.keyprovider;
|
||||||
|
|
||||||
|
import com.hierynomus.sshj.userauth.keyprovider.OpenSSHKeyV1KeyFile;
|
||||||
import net.schmizz.sshj.common.IOUtils;
|
import net.schmizz.sshj.common.IOUtils;
|
||||||
|
|
||||||
import java.io.*;
|
import java.io.*;
|
||||||
import com.hierynomus.sshj.userauth.keyprovider.OpenSSHKeyV1KeyFile;
|
|
||||||
|
|
||||||
public class KeyProviderUtil {
|
public class KeyProviderUtil {
|
||||||
|
|
||||||
|
|||||||
@@ -15,6 +15,15 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.userauth.keyprovider;
|
package net.schmizz.sshj.userauth.keyprovider;
|
||||||
|
|
||||||
|
import com.hierynomus.sshj.transport.cipher.BlockCiphers;
|
||||||
|
import net.schmizz.sshj.common.Base64;
|
||||||
|
import net.schmizz.sshj.common.ByteArrayUtils;
|
||||||
|
import net.schmizz.sshj.common.IOUtils;
|
||||||
|
import net.schmizz.sshj.common.KeyType;
|
||||||
|
import net.schmizz.sshj.transport.cipher.*;
|
||||||
|
import net.schmizz.sshj.transport.digest.Digest;
|
||||||
|
import net.schmizz.sshj.transport.digest.MD5;
|
||||||
|
|
||||||
import java.io.BufferedReader;
|
import java.io.BufferedReader;
|
||||||
import java.io.EOFException;
|
import java.io.EOFException;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
@@ -24,14 +33,6 @@ import java.nio.CharBuffer;
|
|||||||
import java.security.*;
|
import java.security.*;
|
||||||
import java.security.spec.*;
|
import java.security.spec.*;
|
||||||
import java.util.Arrays;
|
import java.util.Arrays;
|
||||||
import javax.xml.bind.DatatypeConverter;
|
|
||||||
|
|
||||||
import net.schmizz.sshj.common.Base64;
|
|
||||||
import net.schmizz.sshj.common.IOUtils;
|
|
||||||
import net.schmizz.sshj.common.KeyType;
|
|
||||||
import net.schmizz.sshj.transport.cipher.*;
|
|
||||||
import net.schmizz.sshj.transport.digest.Digest;
|
|
||||||
import net.schmizz.sshj.transport.digest.MD5;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Represents a PKCS5-encoded key file. This is the format typically used by OpenSSH, OpenSSL, Amazon, etc.
|
* Represents a PKCS5-encoded key file. This is the format typically used by OpenSSH, OpenSSL, Amazon, etc.
|
||||||
@@ -116,17 +117,17 @@ public class PKCS5KeyFile extends BaseFileKeyProvider {
|
|||||||
} else {
|
} else {
|
||||||
String algorithm = line.substring(10, ptr);
|
String algorithm = line.substring(10, ptr);
|
||||||
if ("DES-EDE3-CBC".equals(algorithm)) {
|
if ("DES-EDE3-CBC".equals(algorithm)) {
|
||||||
cipher = new TripleDESCBC();
|
cipher = BlockCiphers.TripleDESCBC().create();
|
||||||
} else if ("AES-128-CBC".equals(algorithm)) {
|
} else if ("AES-128-CBC".equals(algorithm)) {
|
||||||
cipher = new AES128CBC();
|
cipher = BlockCiphers.AES128CBC().create();
|
||||||
} else if ("AES-192-CBC".equals(algorithm)) {
|
} else if ("AES-192-CBC".equals(algorithm)) {
|
||||||
cipher = new AES192CBC();
|
cipher = BlockCiphers.AES192CBC().create();
|
||||||
} else if ("AES-256-CBC".equals(algorithm)) {
|
} else if ("AES-256-CBC".equals(algorithm)) {
|
||||||
cipher = new AES256CBC();
|
cipher = BlockCiphers.AES256CBC().create();
|
||||||
} else {
|
} else {
|
||||||
throw new FormatException("Not a supported algorithm: " + algorithm);
|
throw new FormatException("Not a supported algorithm: " + algorithm);
|
||||||
}
|
}
|
||||||
iv = Arrays.copyOfRange(DatatypeConverter.parseHexBinary(line.substring(ptr + 1)), 0, cipher.getIVSize());
|
iv = Arrays.copyOfRange(ByteArrayUtils.parseHex(line.substring(ptr + 1)), 0, cipher.getIVSize());
|
||||||
}
|
}
|
||||||
} else if (line.length() > 0) {
|
} else if (line.length() > 0) {
|
||||||
sb.append(line);
|
sb.append(line);
|
||||||
|
|||||||
@@ -15,8 +15,8 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.userauth.keyprovider;
|
package net.schmizz.sshj.userauth.keyprovider;
|
||||||
|
|
||||||
import java.io.IOException;
|
import net.schmizz.sshj.common.IOUtils;
|
||||||
import java.security.KeyPair;
|
import net.schmizz.sshj.userauth.password.PasswordUtils;
|
||||||
import org.bouncycastle.openssl.EncryptionException;
|
import org.bouncycastle.openssl.EncryptionException;
|
||||||
import org.bouncycastle.openssl.PEMEncryptedKeyPair;
|
import org.bouncycastle.openssl.PEMEncryptedKeyPair;
|
||||||
import org.bouncycastle.openssl.PEMKeyPair;
|
import org.bouncycastle.openssl.PEMKeyPair;
|
||||||
@@ -26,8 +26,8 @@ import org.bouncycastle.openssl.jcajce.JcePEMDecryptorProviderBuilder;
|
|||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.IOUtils;
|
import java.io.IOException;
|
||||||
import net.schmizz.sshj.userauth.password.PasswordUtils;
|
import java.security.KeyPair;
|
||||||
|
|
||||||
/** Represents a PKCS8-encoded key file. This is the format used by (old-style) OpenSSH and OpenSSL. */
|
/** Represents a PKCS8-encoded key file. This is the format used by (old-style) OpenSSH and OpenSSL. */
|
||||||
public class PKCS8KeyFile extends BaseFileKeyProvider {
|
public class PKCS8KeyFile extends BaseFileKeyProvider {
|
||||||
|
|||||||
@@ -15,21 +15,21 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.userauth.keyprovider;
|
package net.schmizz.sshj.userauth.keyprovider;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.Base64;
|
||||||
|
import net.schmizz.sshj.common.KeyType;
|
||||||
|
import net.schmizz.sshj.userauth.password.PasswordUtils;
|
||||||
|
import org.bouncycastle.util.encoders.Hex;
|
||||||
|
|
||||||
|
import javax.crypto.Cipher;
|
||||||
|
import javax.crypto.Mac;
|
||||||
|
import javax.crypto.spec.IvParameterSpec;
|
||||||
|
import javax.crypto.spec.SecretKeySpec;
|
||||||
import java.io.*;
|
import java.io.*;
|
||||||
import java.math.BigInteger;
|
import java.math.BigInteger;
|
||||||
import java.security.*;
|
import java.security.*;
|
||||||
import java.security.spec.*;
|
import java.security.spec.*;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import javax.crypto.Cipher;
|
|
||||||
import javax.crypto.Mac;
|
|
||||||
import javax.crypto.spec.IvParameterSpec;
|
|
||||||
import javax.crypto.spec.SecretKeySpec;
|
|
||||||
import org.bouncycastle.util.encoders.Hex;
|
|
||||||
|
|
||||||
import net.schmizz.sshj.common.Base64;
|
|
||||||
import net.schmizz.sshj.common.KeyType;
|
|
||||||
import net.schmizz.sshj.userauth.password.PasswordUtils;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* <h2>Sample PuTTY file format</h2>
|
* <h2>Sample PuTTY file format</h2>
|
||||||
|
|||||||
@@ -66,7 +66,7 @@ public abstract class KeyedAuthMethod
|
|||||||
if (signature == null)
|
if (signature == null)
|
||||||
throw new UserAuthException("Could not create signature instance for " + kt + " key");
|
throw new UserAuthException("Could not create signature instance for " + kt + " key");
|
||||||
|
|
||||||
signature.init(null, key);
|
signature.initSign(key);
|
||||||
signature.update(new Buffer.PlainBuffer()
|
signature.update(new Buffer.PlainBuffer()
|
||||||
.putString(params.getTransport().getSessionID())
|
.putString(params.getTransport().getSessionID())
|
||||||
.putBuffer(reqBuf) // & rest of the data for sig
|
.putBuffer(reqBuf) // & rest of the data for sig
|
||||||
|
|||||||
@@ -16,7 +16,6 @@
|
|||||||
package net.schmizz.sshj.xfer;
|
package net.schmizz.sshj.xfer;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.LoggerFactory;
|
import net.schmizz.sshj.common.LoggerFactory;
|
||||||
|
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
|
|
||||||
public abstract class AbstractFileTransfer {
|
public abstract class AbstractFileTransfer {
|
||||||
|
|||||||
@@ -0,0 +1,45 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package com.hierynomus.sshj.common
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.KeyType
|
||||||
|
import net.schmizz.sshj.userauth.keyprovider.OpenSSHKeyFile
|
||||||
|
import spock.lang.Specification
|
||||||
|
import spock.lang.Unroll
|
||||||
|
|
||||||
|
class KeyTypeSpec extends Specification {
|
||||||
|
|
||||||
|
@Unroll
|
||||||
|
def "should determine correct keytype for #type key"() {
|
||||||
|
given:
|
||||||
|
OpenSSHKeyFile kf = new OpenSSHKeyFile()
|
||||||
|
kf.init(privKey, pubKey)
|
||||||
|
|
||||||
|
expect:
|
||||||
|
KeyType.fromKey(kf.getPublic()) == type
|
||||||
|
KeyType.fromKey(kf.getPrivate()) == type
|
||||||
|
|
||||||
|
where:
|
||||||
|
privKey << ["""-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIGhcvG8anyHew/xZJfozh5XIc1kmZZs6o2f0l3KFs4jgoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEDUA1JYVD7URSoOGdwPxjea+ETD6IABMD9CWfk3NVTNkdu/Ksn7uX
|
||||||
|
cLTQhx4N16z1IgW2bRbSbsmM++UKXmeWyg==
|
||||||
|
-----END EC PRIVATE KEY-----"""]
|
||||||
|
pubKey << ["""ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBA1ANSWFQ+1EUqDhncD8Y3mvhEw+iAATA/Qln5NzVUzZHbvyrJ+7l3C00IceDdes9SIFtm0W0m7JjPvlCl5nlso= SSH Key"""]
|
||||||
|
type << [KeyType.ECDSA256]
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -19,6 +19,7 @@ import com.hierynomus.sshj.test.SshFixture
|
|||||||
import net.schmizz.sshj.connection.channel.direct.LocalPortForwarder
|
import net.schmizz.sshj.connection.channel.direct.LocalPortForwarder
|
||||||
import org.junit.Rule
|
import org.junit.Rule
|
||||||
import spock.lang.Specification
|
import spock.lang.Specification
|
||||||
|
import spock.util.concurrent.PollingConditions
|
||||||
|
|
||||||
class LocalPortForwarderSpec extends Specification {
|
class LocalPortForwarderSpec extends Specification {
|
||||||
@Rule
|
@Rule
|
||||||
@@ -44,6 +45,9 @@ class LocalPortForwarderSpec extends Specification {
|
|||||||
thread.start()
|
thread.start()
|
||||||
|
|
||||||
then:
|
then:
|
||||||
|
new PollingConditions().eventually {
|
||||||
|
lpf.isRunning()
|
||||||
|
}
|
||||||
thread.isAlive()
|
thread.isAlive()
|
||||||
|
|
||||||
when:
|
when:
|
||||||
|
|||||||
@@ -15,7 +15,6 @@
|
|||||||
*/
|
*/
|
||||||
package com.hierynomus.sshj.transport.verification
|
package com.hierynomus.sshj.transport.verification
|
||||||
|
|
||||||
import com.hierynomus.sshj.transport.verification.KnownHostMatchers
|
|
||||||
import spock.lang.Specification
|
import spock.lang.Specification
|
||||||
import spock.lang.Unroll
|
import spock.lang.Unroll
|
||||||
|
|
||||||
@@ -50,6 +49,11 @@ class KnownHostMatchersSpec extends Specification {
|
|||||||
"aaa.b??.com" | "aaa.bccd.com" | false
|
"aaa.b??.com" | "aaa.bccd.com" | false
|
||||||
"|1|F1E1KeoE/eEWhi10WpGv4OdiO6Y=|3988QV0VE8wmZL7suNrYQLITLCg=" | "192.168.1.61" | true
|
"|1|F1E1KeoE/eEWhi10WpGv4OdiO6Y=|3988QV0VE8wmZL7suNrYQLITLCg=" | "192.168.1.61" | true
|
||||||
"|1|F1E1KeoE/eEWhi10WpGv4OdiO6Y=|3988QV0VE8wmZL7suNrYQLITLCg=" | "192.168.2.61" | false
|
"|1|F1E1KeoE/eEWhi10WpGv4OdiO6Y=|3988QV0VE8wmZL7suNrYQLITLCg=" | "192.168.2.61" | false
|
||||||
|
"[aaa.bbb.com]:2222" | "aaa.bbb.com" | false
|
||||||
|
"[aaa.bbb.com]:2222" | "[aaa.bbb.com]:2222" | true
|
||||||
|
"[aaa.?bb.com]:2222" | "[aaa.dbb.com]:2222" | true
|
||||||
|
"[aaa.?xb.com]:2222" | "[aaa.dbb.com]:2222" | false
|
||||||
|
"[*.bbb.com]:2222" | "[aaa.bbb.com]:2222" | true
|
||||||
yesno = match ? "" : "no"
|
yesno = match ? "" : "no"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -0,0 +1,126 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package com.hierynomus.sshj.transport.verification
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.KeyType
|
||||||
|
import net.schmizz.sshj.transport.verification.OpenSSHKnownHosts
|
||||||
|
import net.schmizz.sshj.util.KeyUtil
|
||||||
|
import org.junit.Ignore
|
||||||
|
import org.junit.Rule
|
||||||
|
import org.junit.Test
|
||||||
|
import org.junit.rules.TemporaryFolder
|
||||||
|
import spock.lang.Specification
|
||||||
|
import spock.lang.Unroll
|
||||||
|
|
||||||
|
import java.security.GeneralSecurityException
|
||||||
|
import java.security.PublicKey
|
||||||
|
|
||||||
|
import static org.hamcrest.CoreMatchers.equalTo
|
||||||
|
import static org.hamcrest.CoreMatchers.instanceOf
|
||||||
|
import static org.hamcrest.MatcherAssert.assertThat
|
||||||
|
|
||||||
|
class OpenSSHKnownHostsSpec extends Specification {
|
||||||
|
|
||||||
|
@Rule
|
||||||
|
public TemporaryFolder temp = new TemporaryFolder();
|
||||||
|
|
||||||
|
|
||||||
|
@Unroll
|
||||||
|
def "should add comment lines"() {
|
||||||
|
given:
|
||||||
|
def file = writeKnownHosts(contents)
|
||||||
|
|
||||||
|
when:
|
||||||
|
OpenSSHKnownHosts openSSHKnownHosts = new OpenSSHKnownHosts(file)
|
||||||
|
|
||||||
|
then:
|
||||||
|
openSSHKnownHosts.entries().size() == 1
|
||||||
|
openSSHKnownHosts.entries()[0] instanceof OpenSSHKnownHosts.CommentEntry
|
||||||
|
|
||||||
|
where:
|
||||||
|
contents << ["", "# this is a comment"]
|
||||||
|
}
|
||||||
|
|
||||||
|
def "should parse and verify plain host entry with RSA key"() {
|
||||||
|
given:
|
||||||
|
def f = writeKnownHosts("schmizz.net,69.163.155.180 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6P9Hlwdahh250jGZYKg2snRq2j2lFJVdKSHyxqbJiVy9VX9gTkN3K2MD48qyrYLYOyGs3vTttyUk+cK++JMzURWsrP4piby7LpeOT+3Iq8CQNj4gXZdcH9w15Vuk2qS11at6IsQPVHpKD9HGg9//EFUccI/4w06k4XXLm/IxOGUwj6I2AeWmEOL3aDi+fe07TTosSdLUD6INtR0cyKsg0zC7Da24ixoShT8Oy3x2MpR7CY3PQ1pUVmvPkr79VeA+4qV9F1JM09WdboAMZgWQZ+XrbtuBlGsyhpUHSCQOya+kOJ+bYryS+U7A+6nmTW3C9FX4FgFqTF89UHOC7V0zZQ==")
|
||||||
|
final PublicKey key = KeyUtil
|
||||||
|
.newRSAPublicKey(
|
||||||
|
"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",
|
||||||
|
"23");
|
||||||
|
|
||||||
|
when:
|
||||||
|
OpenSSHKnownHosts openSSHKnownHosts = new OpenSSHKnownHosts(f)
|
||||||
|
|
||||||
|
then:
|
||||||
|
openSSHKnownHosts.verify("schmizz.net", 22, key)
|
||||||
|
openSSHKnownHosts.verify("69.163.155.180", 22, key)
|
||||||
|
!openSSHKnownHosts.verify("69.163.155.18", 22, key)
|
||||||
|
}
|
||||||
|
|
||||||
|
def "should parse and verify hashed host entry"() {
|
||||||
|
given:
|
||||||
|
def f = writeKnownHosts("|1|F1E1KeoE/eEWhi10WpGv4OdiO6Y=|3988QV0VE8wmZL7suNrYQLITLCg= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6P9Hlwdahh250jGZYKg2snRq2j2lFJVdKSHyxqbJiVy9VX9gTkN3K2MD48qyrYLYOyGs3vTttyUk+cK++JMzURWsrP4piby7LpeOT+3Iq8CQNj4gXZdcH9w15Vuk2qS11at6IsQPVHpKD9HGg9//EFUccI/4w06k4XXLm/IxOGUwj6I2AeWmEOL3aDi+fe07TTosSdLUD6INtR0cyKsg0zC7Da24ixoShT8Oy3x2MpR7CY3PQ1pUVmvPkr79VeA+4qV9F1JM09WdboAMZgWQZ+XrbtuBlGsyhpUHSCQOya+kOJ+bYryS+U7A+6nmTW3C9FX4FgFqTF89UHOC7V0zZQ==");
|
||||||
|
final PublicKey key = KeyUtil
|
||||||
|
.newRSAPublicKey(
|
||||||
|
"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",
|
||||||
|
"23");
|
||||||
|
|
||||||
|
when:
|
||||||
|
OpenSSHKnownHosts openSSHKnownHosts = new OpenSSHKnownHosts(f)
|
||||||
|
|
||||||
|
then:
|
||||||
|
openSSHKnownHosts.verify("192.168.1.61", 22, key)
|
||||||
|
!openSSHKnownHosts.verify("192.168.1.2", 22, key)
|
||||||
|
}
|
||||||
|
|
||||||
|
def "should parse and verify v1 host entry"() {
|
||||||
|
given:
|
||||||
|
def f = writeKnownHosts("test.com,1.1.1.1 2048 35 22017496617994656680820635966392838863613340434802393112245951008866692373218840197754553998457793202561151141246686162285550121243768846314646395880632789308110750881198697743542374668273149584280424505890648953477691795864456749782348425425954366277600319096366690719901119774784695056100331902394094537054256611668966698242432417382422091372756244612839068092471592121759862971414741954991375710930168229171638843329213652899594987626853020377726482288618521941129157643483558764875338089684351824791983007780922947554898825663693324944982594850256042689880090306493029526546183035567296830604572253312294059766327")
|
||||||
|
def key = KeyUtil.newRSAPublicKey("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",
|
||||||
|
"23")
|
||||||
|
when:
|
||||||
|
OpenSSHKnownHosts knownHosts = new OpenSSHKnownHosts(f)
|
||||||
|
|
||||||
|
then:
|
||||||
|
knownHosts.verify("test.com", 22, key)
|
||||||
|
}
|
||||||
|
|
||||||
|
def "should ignore malformed line"() {
|
||||||
|
given:
|
||||||
|
def f = writeKnownHosts("M36Lo+Ik5ukNugvvoNFlpnyiHMmtKxt3FpyEfYuryXjNqMNWHn/ARVnpUIl5jRLTB7WBzyLYMG7X5nuoFL9zYqKGtHxChbDunxMVbspw5WXI9VN+qxcLwmITmpEvI9ApyS/Ox2ZyN7zw==")
|
||||||
|
|
||||||
|
when:
|
||||||
|
OpenSSHKnownHosts knownHosts = new OpenSSHKnownHosts(f)
|
||||||
|
|
||||||
|
then:
|
||||||
|
knownHosts.entries().size() == 0
|
||||||
|
}
|
||||||
|
|
||||||
|
File writeKnownHosts(String line)
|
||||||
|
throws IOException {
|
||||||
|
File known_hosts = temp.newFile("known_hosts");
|
||||||
|
FileWriter fileWriter = new FileWriter(known_hosts);
|
||||||
|
BufferedWriter writer = new BufferedWriter(fileWriter);
|
||||||
|
writer.write(line);
|
||||||
|
writer.write("\r\n");
|
||||||
|
writer.flush();
|
||||||
|
writer.close();
|
||||||
|
return known_hosts;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,116 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package net.schmizz.sshj.signature
|
||||||
|
|
||||||
|
import spock.lang.Unroll;
|
||||||
|
|
||||||
|
import java.math.BigInteger;
|
||||||
|
import java.security.KeyFactory;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.PublicKey;
|
||||||
|
import java.security.spec.DSAPublicKeySpec;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.List;
|
||||||
|
|
||||||
|
import org.junit.Assert;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
import spock.lang.Specification
|
||||||
|
|
||||||
|
class SignatureDSASpec extends Specification {
|
||||||
|
|
||||||
|
def keyFactory = KeyFactory.getInstance("DSA")
|
||||||
|
|
||||||
|
private PublicKey createPublicKey(final byte[] y, final byte[] p, final byte[] q, final byte[] g) throws Exception {
|
||||||
|
final BigInteger publicKey = new BigInteger(y);
|
||||||
|
final BigInteger prime = new BigInteger(p);
|
||||||
|
final BigInteger subPrime = new BigInteger(q);
|
||||||
|
final BigInteger base = new BigInteger(g);
|
||||||
|
final DSAPublicKeySpec dsaPubKeySpec = new DSAPublicKeySpec(publicKey, prime, subPrime, base);
|
||||||
|
return keyFactory.generatePublic(dsaPubKeySpec);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
@Unroll
|
||||||
|
def "should verify signature"() {
|
||||||
|
given:
|
||||||
|
def signatureDSA = new SignatureDSA()
|
||||||
|
def publicKey = createPublicKey(y, p, q, g)
|
||||||
|
signatureDSA.initVerify(publicKey)
|
||||||
|
|
||||||
|
when:
|
||||||
|
signatureDSA.update(H)
|
||||||
|
|
||||||
|
then:
|
||||||
|
signatureDSA.verify(H_sig)
|
||||||
|
|
||||||
|
where:
|
||||||
|
y << [[103, 23, -102, -4, -110, -90, 66, -52, -14, 125, -16, -76, -110, 33, -111, -113, -46, 27, -118, -73, 0, -19, -48, 43, -102, 56, -49, -84, 118, -10, 76, 84, -5, 84, 55, 72, -115, -34, 95, 80, 32, -120, 57, 101, -64, 111, -37, -26, 96, 55, -98, -24, -99, -81, 60, 22, 5, -55, 119, -95, -28, 114, -40, 13, 97, 65, 22, 33, 117, -59, 22, 81, -56, 98, -112, 103, -62, 90, -12, 81, 61, -67, 104, -24, 67, -18, -60, 78, -127, 44, 13, 11, -117, -118, -69, 89, -25, 26, 103, 72, -83, 114, -40, -124, -10, -31, -34, -49, -54, -15, 92, 79, -40, 14, -12, 58, -112, -30, 11, 48, 26, 121, 105, -68, 92, -93, 99, -78] as byte[],
|
||||||
|
[0, -92, 59, 5, 72, 124, 101, 124, -18, 114, 7, 100, 98, -61, 73, -104, 120, -98, 54, 118, 17, -62, 91, -110, 29, 98, 50, -101, -41, 99, -116, 101, 107, -123, 124, -97, 62, 119, 88, -109, -110, -1, 109, 119, -51, 69, -98, -105, 2, -69, -121, -82, -118, 23, -6, 96, -61, -65, 102, -58, -74, 32, -104, 116, -6, -35, -83, -10, -88, -68, 106, -112, 72, -2, 35, 38, 15, -11, -22, 30, -114, -46, -47, -18, -17, -71, 24, -25, 28, 13, 29, -40, 101, 18, 81, 45, -120, -67, -53, -41, 11, 50, -89, -33, 50, 54, -14, -91, -35, 12, -42, 13, -84, -19, 100, -3, -85, -18, 74, 99, -49, 64, -49, 51, -83, -82, -127, 116, 64] as byte[]]
|
||||||
|
p << [[0, -3, 127, 83, -127, 29, 117, 18, 41, 82, -33, 74, -100, 46, -20, -28, -25, -10, 17, -73, 82, 60, -17, 68,
|
||||||
|
0, -61, 30, 63, -128, -74, 81, 38, 105, 69, 93, 64, 34, 81, -5, 89, 61, -115, 88, -6, -65, -59, -11, -70,
|
||||||
|
48, -10, -53, -101, 85, 108, -41, -127, 59, -128, 29, 52, 111, -14, 102, 96, -73, 107, -103, 80, -91, -92,
|
||||||
|
-97, -97, -24, 4, 123, 16, 34, -62, 79, -69, -87, -41, -2, -73, -58, 27, -8, 59, 87, -25, -58, -88, -90, 21,
|
||||||
|
15, 4, -5, -125, -10, -45, -59, 30, -61, 2, 53, 84, 19, 90, 22, -111, 50, -10, 117, -13, -82, 43, 97, -41,
|
||||||
|
42, -17, -14, 34, 3, 25, -99, -47, 72, 1, -57] as byte[],
|
||||||
|
[0, -3, 127, 83, -127, 29, 117, 18, 41, 82, -33, 74, -100, 46, -20, -28, -25, -10, 17, -73, 82, 60, -17, 68,
|
||||||
|
0, -61, 30, 63, -128, -74, 81, 38, 105, 69, 93, 64, 34, 81, -5, 89, 61, -115, 88, -6, -65, -59, -11, -70,
|
||||||
|
48, -10, -53, -101, 85, 108, -41, -127, 59, -128, 29, 52, 111, -14, 102, 96, -73, 107, -103, 80, -91, -92,
|
||||||
|
-97, -97, -24, 4, 123, 16, 34, -62, 79, -69, -87, -41, -2, -73, -58, 27, -8, 59, 87, -25, -58, -88, -90, 21,
|
||||||
|
15, 4, -5, -125, -10, -45, -59, 30, -61, 2, 53, 84, 19, 90, 22, -111, 50, -10, 117, -13, -82, 43, 97, -41,
|
||||||
|
42, -17, -14, 34, 3, 25, -99, -47, 72, 1, -57] as byte[]]
|
||||||
|
q << [[0, -105, 96, 80, -113, 21, 35, 11, -52, -78, -110, -71, -126, -94, -21, -124, 11, -16, 88, 28, -11] as byte[],
|
||||||
|
[0, -105, 96, 80, -113, 21, 35, 11, -52, -78, -110, -71, -126, -94, -21, -124, 11, -16, 88, 28, -11] as byte[]]
|
||||||
|
g << [[0, -9, -31, -96, -123, -42, -101, 61, -34, -53, -68, -85, 92, 54, -72, 87, -71, 121, -108, -81, -69, -6, 58,
|
||||||
|
-22, -126, -7, 87, 76, 11, 61, 7, -126, 103, 81, 89, 87, -114, -70, -44, 89, 79, -26, 113, 7, 16, -127,
|
||||||
|
-128, -76, 73, 22, 113, 35, -24, 76, 40, 22, 19, -73, -49, 9, 50, -116, -56, -90, -31, 60, 22, 122, -117,
|
||||||
|
84, 124, -115, 40, -32, -93, -82, 30, 43, -77, -90, 117, -111, 110, -93, 127, 11, -6, 33, 53, 98, -15, -5,
|
||||||
|
98, 122, 1, 36, 59, -52, -92, -15, -66, -88, 81, -112, -119, -88, -125, -33, -31, 90, -27, -97, 6, -110,
|
||||||
|
-117, 102, 94, -128, 123, 85, 37, 100, 1, 76, 59, -2, -49, 73, 42] as byte[],
|
||||||
|
[0, -9, -31, -96, -123, -42, -101, 61, -34, -53, -68, -85, 92, 54, -72, 87, -71, 121, -108, -81, -69, -6, 58,
|
||||||
|
-22, -126, -7, 87, 76, 11, 61, 7, -126, 103, 81, 89, 87, -114, -70, -44, 89, 79, -26, 113, 7, 16, -127,
|
||||||
|
-128, -76, 73, 22, 113, 35, -24, 76, 40, 22, 19, -73, -49, 9, 50, -116, -56, -90, -31, 60, 22, 122, -117,
|
||||||
|
84, 124, -115, 40, -32, -93, -82, 30, 43, -77, -90, 117, -111, 110, -93, 127, 11, -6, 33, 53, 98, -15, -5,
|
||||||
|
98, 122, 1, 36, 59, -52, -92, -15, -66, -88, 81, -112, -119, -88, -125, -33, -31, 90, -27, -97, 6, -110,
|
||||||
|
-117, 102, 94, -128, 123, 85, 37, 100, 1, 76, 59, -2, -49, 73, 42] as byte[]]
|
||||||
|
H << [[-13, 20, 103, 73, 115, -68, 113, 74, -25, 12, -90, 19, 56, 73, -7, -49, -118, 107, -69, -39, -6, 82, -123,
|
||||||
|
54, -10, -43, 16, -117, -59, 36, -49, 27] as byte[],
|
||||||
|
[-4, 111, -103, 111, 72, -106, 105, -19, 81, -123, 84, -13, -40, -53, -3, -97, -8, 43, -22, -2, -23, -15, 28,
|
||||||
|
116, -63, 96, -79, -127, -84, 63, -6, -94] as byte[]]
|
||||||
|
H_sig << [[0, 0, 0, 7, 115, 115, 104, 45, 100, 115, 115, 0, 0, 0, 40, -113, -52, 88, -117, 80, -105, -92, -124, -49,
|
||||||
|
56, -35, 90, -9, -128, 31, -33, -18, 13, -5, 7, 108, -2, 92, 108, 85, 58, 39, 99, 122, -118, 125, -121, 21,
|
||||||
|
-37, 2, 55, 109, -23, -125, 4] as byte[],
|
||||||
|
[0, 0, 0, 7, 115, 115, 104, 45, 100, 115, 115, 0, 0, 0, 40, 0, 79, 84, 118, -50, 11, -117, -112, 52, -25,
|
||||||
|
-78, -50, -20, 6, -69, -26, 7, 90, -34, -124, 80, 76, -32, -23, -8, 43, 38, -48, -89, -17, -60, -1, -78,
|
||||||
|
112, -88, 14, -39, -78, -98, -80] as byte[]]
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,58 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package net.schmizz.sshj.transport.verification
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.Base64
|
||||||
|
import net.schmizz.sshj.common.Buffer
|
||||||
|
import spock.lang.Specification
|
||||||
|
import spock.lang.Unroll
|
||||||
|
|
||||||
|
class FingerprintVerifierSpec extends Specification {
|
||||||
|
|
||||||
|
@Unroll
|
||||||
|
def "should accept #digest fingerprints"() {
|
||||||
|
given:
|
||||||
|
def verifier = FingerprintVerifier.getInstance(fingerprint)
|
||||||
|
expect:
|
||||||
|
verifier.verify("", 0, getPublicKey())
|
||||||
|
where:
|
||||||
|
digest << ["SHA-1", "SHA-256", "MD5", "old style"]
|
||||||
|
fingerprint << ["SHA1:2Fo8c/96zv32xc8GZWbOGYOlRak=",
|
||||||
|
"SHA256:oQGbQTujGeNIgh0ONthcEpA/BHxtt3rcYY+NxXTxQjs=",
|
||||||
|
"MD5:d3:5e:40:72:db:08:f1:6d:0c:d7:6d:35:0d:ba:7c:32",
|
||||||
|
"d3:5e:40:72:db:08:f1:6d:0c:d7:6d:35:0d:ba:7c:32"]
|
||||||
|
}
|
||||||
|
|
||||||
|
@Unroll
|
||||||
|
def "should accept too short #digest fingerprints"() {
|
||||||
|
given:
|
||||||
|
def verifier = FingerprintVerifier.getInstance(fingerprint)
|
||||||
|
expect:
|
||||||
|
verifier.verify("", 0, getPublicKey())
|
||||||
|
where:
|
||||||
|
digest << ["SHA-1", "SHA-256"]
|
||||||
|
fingerprint << ["SHA1:2Fo8c/96zv32xc8GZWbOGYOlRak",
|
||||||
|
"SHA256:oQGbQTujGeNIgh0ONthcEpA/BHxtt3rcYY+NxXTxQjs"]
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
def getPublicKey() {
|
||||||
|
def lines = new File("src/test/resources/keytypes/test_ed25519.pub").readLines()
|
||||||
|
def keystring = lines[0].split(" ")[1]
|
||||||
|
return new Buffer.PlainBuffer(Base64.decode(keystring)).readPublicKey()
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,37 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package net.schmizz.sshj.userauth.password
|
||||||
|
|
||||||
|
import spock.lang.Specification
|
||||||
|
|
||||||
|
class ConsolePasswordFinderSpec extends Specification {
|
||||||
|
|
||||||
|
// def "should read password from console"() {
|
||||||
|
// given:
|
||||||
|
// def console = Mock(Console) {
|
||||||
|
// readPassword(*_) >> "password".toCharArray()
|
||||||
|
// }
|
||||||
|
// def cpf = new ConsolePasswordFinder(console)
|
||||||
|
// def resource = new AccountResource("test", "localhost")
|
||||||
|
//
|
||||||
|
// when:
|
||||||
|
// def password = cpf.reqPassword(resource)
|
||||||
|
//
|
||||||
|
// then:
|
||||||
|
// password == "password".toCharArray()
|
||||||
|
//
|
||||||
|
// }
|
||||||
|
}
|
||||||
@@ -1,39 +0,0 @@
|
|||||||
/*
|
|
||||||
* Copyright (C)2009 - SSHJ Contributors
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
package com.hierynomus.sshj;
|
|
||||||
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.IOException;
|
|
||||||
import org.junit.Ignore;
|
|
||||||
import org.junit.Test;
|
|
||||||
|
|
||||||
import net.schmizz.sshj.DefaultConfig;
|
|
||||||
import net.schmizz.sshj.SSHClient;
|
|
||||||
import net.schmizz.sshj.transport.verification.OpenSSHKnownHosts;
|
|
||||||
|
|
||||||
import static org.hamcrest.MatcherAssert.assertThat;
|
|
||||||
|
|
||||||
public class IntegrationTest {
|
|
||||||
|
|
||||||
@Test @Ignore // Should only be enabled for testing against VM
|
|
||||||
public void shouldConnect() throws IOException {
|
|
||||||
SSHClient sshClient = new SSHClient(new DefaultConfig());
|
|
||||||
sshClient.addHostKeyVerifier(new OpenSSHKnownHosts(new File("/Users/ajvanerp/.ssh/known_hosts")));
|
|
||||||
sshClient.connect("172.16.37.147");
|
|
||||||
sshClient.authPublickey("jeroen");
|
|
||||||
assertThat("Is connected", sshClient.isAuthenticated());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -17,12 +17,11 @@ package net.schmizz.sshj.common;
|
|||||||
|
|
||||||
import net.schmizz.sshj.common.Buffer.BufferException;
|
import net.schmizz.sshj.common.Buffer.BufferException;
|
||||||
import net.schmizz.sshj.common.Buffer.PlainBuffer;
|
import net.schmizz.sshj.common.Buffer.PlainBuffer;
|
||||||
|
import org.junit.Test;
|
||||||
import static org.junit.Assert.*;
|
|
||||||
|
|
||||||
import java.math.BigInteger;
|
import java.math.BigInteger;
|
||||||
|
|
||||||
import org.junit.Test;
|
import static org.junit.Assert.*;
|
||||||
|
|
||||||
public class BufferTest {
|
public class BufferTest {
|
||||||
|
|
||||||
|
|||||||
@@ -15,13 +15,18 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.keyprovider;
|
package net.schmizz.sshj.keyprovider;
|
||||||
|
|
||||||
import static org.hamcrest.CoreMatchers.containsString;
|
import com.hierynomus.sshj.userauth.certificate.Certificate;
|
||||||
import static org.hamcrest.CoreMatchers.equalTo;
|
import com.hierynomus.sshj.userauth.keyprovider.OpenSSHKeyV1KeyFile;
|
||||||
import static org.hamcrest.MatcherAssert.assertThat;
|
import net.schmizz.sshj.common.KeyType;
|
||||||
import static org.junit.Assert.assertArrayEquals;
|
import net.schmizz.sshj.userauth.keyprovider.FileKeyProvider;
|
||||||
import static org.junit.Assert.assertEquals;
|
import net.schmizz.sshj.userauth.keyprovider.OpenSSHKeyFile;
|
||||||
import static org.junit.Assert.assertNotNull;
|
import net.schmizz.sshj.userauth.password.PasswordFinder;
|
||||||
import static org.junit.Assert.assertTrue;
|
import net.schmizz.sshj.userauth.password.PasswordUtils;
|
||||||
|
import net.schmizz.sshj.userauth.password.Resource;
|
||||||
|
import net.schmizz.sshj.util.KeyUtil;
|
||||||
|
import org.apache.sshd.common.util.SecurityUtils;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
@@ -39,20 +44,10 @@ import java.util.Date;
|
|||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Scanner;
|
import java.util.Scanner;
|
||||||
|
|
||||||
import org.apache.sshd.common.util.SecurityUtils;
|
import static org.hamcrest.CoreMatchers.containsString;
|
||||||
import org.junit.Before;
|
import static org.hamcrest.CoreMatchers.equalTo;
|
||||||
import org.junit.Test;
|
import static org.hamcrest.MatcherAssert.assertThat;
|
||||||
|
import static org.junit.Assert.*;
|
||||||
import com.hierynomus.sshj.userauth.certificate.Certificate;
|
|
||||||
import com.hierynomus.sshj.userauth.keyprovider.OpenSSHKeyV1KeyFile;
|
|
||||||
|
|
||||||
import net.schmizz.sshj.common.KeyType;
|
|
||||||
import net.schmizz.sshj.userauth.keyprovider.FileKeyProvider;
|
|
||||||
import net.schmizz.sshj.userauth.keyprovider.OpenSSHKeyFile;
|
|
||||||
import net.schmizz.sshj.userauth.password.PasswordFinder;
|
|
||||||
import net.schmizz.sshj.userauth.password.PasswordUtils;
|
|
||||||
import net.schmizz.sshj.userauth.password.Resource;
|
|
||||||
import net.schmizz.sshj.util.KeyUtil;
|
|
||||||
|
|
||||||
public class OpenSSHKeyFileTest {
|
public class OpenSSHKeyFileTest {
|
||||||
|
|
||||||
|
|||||||
@@ -15,13 +15,12 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.sftp;
|
package net.schmizz.sshj.sftp;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.LoggerFactory;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.LoggerFactory;
|
|
||||||
|
|
||||||
import static net.schmizz.sshj.sftp.PathHelper.DEFAULT_PATH_SEPARATOR;
|
import static net.schmizz.sshj.sftp.PathHelper.DEFAULT_PATH_SEPARATOR;
|
||||||
import static org.mockito.Mockito.*;
|
import static org.mockito.Mockito.*;
|
||||||
|
|
||||||
|
|||||||
@@ -0,0 +1,68 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C)2009 - SSHJ Contributors
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package net.schmizz.sshj.signature;
|
||||||
|
|
||||||
|
import java.math.BigInteger;
|
||||||
|
import java.security.KeyFactory;
|
||||||
|
import java.security.NoSuchAlgorithmException;
|
||||||
|
import java.security.spec.DSAPrivateKeySpec;
|
||||||
|
import java.security.spec.DSAPublicKeySpec;
|
||||||
|
import java.util.Arrays;
|
||||||
|
|
||||||
|
import org.junit.Assert;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
import net.schmizz.sshj.common.Buffer;
|
||||||
|
import net.schmizz.sshj.common.IOUtils;
|
||||||
|
|
||||||
|
public class SignatureDSATest {
|
||||||
|
|
||||||
|
private KeyFactory keyFactory;
|
||||||
|
|
||||||
|
@Before
|
||||||
|
public void setUp() throws NoSuchAlgorithmException {
|
||||||
|
keyFactory = KeyFactory.getInstance("DSA");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testSignAndVerify() throws Exception {
|
||||||
|
BigInteger x = new BigInteger(new byte[] { 58, 19, -71, -30, 89, -111, 75, 98, 110, 38, -56, -23, 68, 74, -40, 17, -30, 37, 50, 35 });
|
||||||
|
BigInteger y = new BigInteger(new byte[] { 32, -91, -39, 54, 19, 14, 26, 113, -109, -92, -45, 83, -86, 23, -103, 108, 102, 86, 110, 78, -45, -41, -37, 38, -94, -92, -124, -36, -93, 92, 127, 113, 97, -119, -10, -73, -41, -45, 98, -104, -54, -9, -92, 66, 15, 31, 68, -32, 32, -121, -51, 68, 29, 100, 59, 60, 109, 111, -81, 80, 7, 127, 116, -107, 88, -114, -114, -69, 41, -15, 59, 81, 70, 9, -113, 36, 119, 28, 16, -127, -65, 32, -19, 109, -27, 24, -48, -80, 84, 47, 119, 25, 57, -118, -66, -22, -105, -11, 112, 16, -91, -127, 62, 23, 89, -17, -43, -105, -4, -43, 60, 42, -81, -95, -27, -8, 98, -37, 120, 80, -76, 93, -24, -104, -117, 38, -56, -68 });
|
||||||
|
BigInteger p = new BigInteger(new byte[] { 0, -3, 127, 83, -127, 29, 117, 18, 41, 82, -33, 74, -100, 46, -20, -28, -25, -10, 17, -73, 82, 60, -17, 68, 0, -61, 30, 63, -128, -74, 81, 38, 105, 69, 93, 64, 34, 81, -5, 89, 61, -115, 88, -6, -65, -59, -11, -70, 48, -10, -53, -101, 85, 108, -41, -127, 59, -128, 29, 52, 111, -14, 102, 96, -73, 107, -103, 80, -91, -92, -97, -97, -24, 4, 123, 16, 34, -62, 79, -69, -87, -41, -2, -73, -58, 27, -8, 59, 87, -25, -58, -88, -90, 21, 15, 4, -5, -125, -10, -45, -59, 30, -61, 2, 53, 84, 19, 90, 22, -111, 50, -10, 117, -13, -82, 43, 97, -41, 42, -17, -14, 34, 3, 25, -99, -47, 72, 1, -57 });
|
||||||
|
BigInteger q = new BigInteger(new byte[] { 0, -105, 96, 80, -113, 21, 35, 11, -52, -78, -110, -71, -126, -94, -21, -124, 11, -16, 88, 28, -11 });
|
||||||
|
BigInteger g = new BigInteger(new byte[] { 0, -9, -31, -96, -123, -42, -101, 61, -34, -53, -68, -85, 92, 54, -72, 87, -71, 121, -108, -81, -69, -6, 58, -22, -126, -7, 87, 76, 11, 61, 7, -126, 103, 81, 89, 87, -114, -70, -44, 89, 79, -26, 113, 7, 16, -127, -128, -76, 73, 22, 113, 35, -24, 76, 40, 22, 19, -73, -49, 9, 50, -116, -56, -90, -31, 60, 22, 122, -117, 84, 124, -115, 40, -32, -93, -82, 30, 43, -77, -90, 117, -111, 110, -93, 127, 11, -6, 33, 53, 98, -15, -5, 98, 122, 1, 36, 59, -52, -92, -15, -66, -88, 81, -112, -119, -88, -125, -33, -31, 90, -27, -97, 6, -110, -117, 102, 94, -128, 123, 85, 37, 100, 1, 76, 59, -2, -49, 73, 42 });
|
||||||
|
|
||||||
|
byte[] data = "The Magic Words are Squeamish Ossifrage".getBytes(IOUtils.UTF8);
|
||||||
|
|
||||||
|
// A previously signed and verified signature using the data and DSA key parameters above.
|
||||||
|
byte[] dataSig = new byte[] { 0, 0, 0, 7, 115, 115, 104, 45, 100, 115, 115, 0, 0, 0, 40, 40, -71, 33, 105, -89, -107, 8, 26, -13, -90, 73, -103, 105, 112, 7, -59, -66, 46, 85, -27, 20, 82, 22, -113, -75, -86, -121, -42, -73, 78, 66, 93, -34, 39, -50, -93, 27, -5, 37, -92 };
|
||||||
|
|
||||||
|
SignatureDSA signatureForSigning = new SignatureDSA();
|
||||||
|
signatureForSigning.initSign(keyFactory.generatePrivate(new DSAPrivateKeySpec(x, p, q, g)));
|
||||||
|
signatureForSigning.update(data);
|
||||||
|
byte[] sigBlob = signatureForSigning.encode(signatureForSigning.sign());
|
||||||
|
byte[] sigFull = new Buffer.PlainBuffer().putString("ssh-dss").putBytes(sigBlob).getCompactData();
|
||||||
|
|
||||||
|
SignatureDSA signatureForVerifying = new SignatureDSA();
|
||||||
|
signatureForVerifying.initVerify(keyFactory.generatePublic(new DSAPublicKeySpec(y, p, q, g)));
|
||||||
|
signatureForVerifying.update(data);
|
||||||
|
Assert.assertTrue("Failed to verify signature: " + Arrays.toString(sigFull), signatureForVerifying.verify(sigFull));
|
||||||
|
signatureForVerifying.update(data);
|
||||||
|
Assert.assertTrue("Failed to verify signature: " + Arrays.toString(dataSig), signatureForVerifying.verify(dataSig));
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -15,15 +15,14 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.signature;
|
package net.schmizz.sshj.signature;
|
||||||
|
|
||||||
import java.security.PublicKey;
|
import net.schmizz.sshj.common.Buffer;
|
||||||
|
import net.schmizz.sshj.common.Buffer.BufferException;
|
||||||
import org.junit.Assert;
|
import org.junit.Assert;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
|
||||||
import net.schmizz.sshj.common.Buffer;
|
import java.security.PublicKey;
|
||||||
import net.schmizz.sshj.common.Buffer.BufferException;
|
|
||||||
|
|
||||||
public class VerificationTest {
|
public class SignatureECDSATest {
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testECDSA256Verifies() throws BufferException {
|
public void testECDSA256Verifies() throws BufferException {
|
||||||
@@ -34,7 +33,7 @@ public class VerificationTest {
|
|||||||
PublicKey hostKey = new Buffer.PlainBuffer(K_S).readPublicKey();
|
PublicKey hostKey = new Buffer.PlainBuffer(K_S).readPublicKey();
|
||||||
|
|
||||||
Signature signature = new SignatureECDSA.Factory256().create();
|
Signature signature = new SignatureECDSA.Factory256().create();
|
||||||
signature.init(hostKey, null);
|
signature.initVerify(hostKey);
|
||||||
signature.update(H, 0, H.length);
|
signature.update(H, 0, H.length);
|
||||||
|
|
||||||
Assert.assertTrue("ECDSA256 signature verifies", signature.verify(sig));
|
Assert.assertTrue("ECDSA256 signature verifies", signature.verify(sig));
|
||||||
@@ -49,7 +48,7 @@ public class VerificationTest {
|
|||||||
PublicKey hostKey = new Buffer.PlainBuffer(K_S).readPublicKey();
|
PublicKey hostKey = new Buffer.PlainBuffer(K_S).readPublicKey();
|
||||||
|
|
||||||
Signature signature = new SignatureECDSA.Factory384().create();
|
Signature signature = new SignatureECDSA.Factory384().create();
|
||||||
signature.init(hostKey, null);
|
signature.initVerify(hostKey);
|
||||||
signature.update(H, 0, H.length);
|
signature.update(H, 0, H.length);
|
||||||
|
|
||||||
Assert.assertTrue("ECDSA384 signature verifies", signature.verify(sig));
|
Assert.assertTrue("ECDSA384 signature verifies", signature.verify(sig));
|
||||||
@@ -64,7 +63,7 @@ public class VerificationTest {
|
|||||||
PublicKey hostKey = new Buffer.PlainBuffer(K_S).readPublicKey();
|
PublicKey hostKey = new Buffer.PlainBuffer(K_S).readPublicKey();
|
||||||
|
|
||||||
Signature signature = new SignatureECDSA.Factory521().create();
|
Signature signature = new SignatureECDSA.Factory521().create();
|
||||||
signature.init(hostKey, null);
|
signature.initVerify(hostKey);
|
||||||
signature.update(H, 0, H.length);
|
signature.update(H, 0, H.length);
|
||||||
|
|
||||||
Assert.assertTrue("ECDSA521 signature verifies", signature.verify(sig));
|
Assert.assertTrue("ECDSA521 signature verifies", signature.verify(sig));
|
||||||
@@ -1,88 +0,0 @@
|
|||||||
/*
|
|
||||||
* Copyright (C)2009 - SSHJ Contributors
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
package net.schmizz.sshj.transport.verification;
|
|
||||||
|
|
||||||
import net.schmizz.sshj.util.KeyUtil;
|
|
||||||
import org.junit.Rule;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.rules.TemporaryFolder;
|
|
||||||
|
|
||||||
import java.io.BufferedWriter;
|
|
||||||
import java.io.File;
|
|
||||||
import java.io.FileWriter;
|
|
||||||
import java.io.IOException;
|
|
||||||
import java.security.GeneralSecurityException;
|
|
||||||
import java.security.PublicKey;
|
|
||||||
|
|
||||||
import static org.hamcrest.CoreMatchers.equalTo;
|
|
||||||
import static org.hamcrest.CoreMatchers.instanceOf;
|
|
||||||
import static org.junit.Assert.*;
|
|
||||||
|
|
||||||
public class OpenSSHKnownHostsTest {
|
|
||||||
|
|
||||||
@Rule
|
|
||||||
public TemporaryFolder temp = new TemporaryFolder();
|
|
||||||
|
|
||||||
public File writeKnownHosts(String line)
|
|
||||||
throws IOException {
|
|
||||||
File known_hosts = temp.newFile("known_hosts");
|
|
||||||
FileWriter fileWriter = new FileWriter(known_hosts);
|
|
||||||
BufferedWriter writer = new BufferedWriter(fileWriter);
|
|
||||||
writer.write(line);
|
|
||||||
writer.write("\r\n");
|
|
||||||
writer.flush();
|
|
||||||
writer.close();
|
|
||||||
return known_hosts;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAddCommentForEmptyLine()
|
|
||||||
throws IOException {
|
|
||||||
File file = writeKnownHosts("");
|
|
||||||
OpenSSHKnownHosts openSSHKnownHosts = new OpenSSHKnownHosts(file);
|
|
||||||
assertThat(openSSHKnownHosts.entries().size(), equalTo(1));
|
|
||||||
assertThat(openSSHKnownHosts.entries().get(0), instanceOf(OpenSSHKnownHosts.CommentEntry.class));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void shouldAddCommentForCommentLine()
|
|
||||||
throws IOException {
|
|
||||||
File file = writeKnownHosts("# this is a comment");
|
|
||||||
OpenSSHKnownHosts openSSHKnownHosts = new OpenSSHKnownHosts(file);
|
|
||||||
assertThat(openSSHKnownHosts.entries().size(), equalTo(1));
|
|
||||||
assertThat(openSSHKnownHosts.entries().get(0), instanceOf(OpenSSHKnownHosts.CommentEntry.class));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testSchmizzEntry()
|
|
||||||
throws IOException, GeneralSecurityException {
|
|
||||||
OpenSSHKnownHosts kh = new OpenSSHKnownHosts(new File("src/test/resources/known_hosts"));
|
|
||||||
final PublicKey key = KeyUtil
|
|
||||||
.newRSAPublicKey(
|
|
||||||
"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",
|
|
||||||
"23");
|
|
||||||
|
|
||||||
assertTrue(kh.verify("schmizz.net", 22, key));
|
|
||||||
assertTrue(kh.verify("69.163.155.180", 22, key));
|
|
||||||
assertFalse(kh.verify("69.163.155.18", 22, key));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testVerifyIndexError() throws Exception {
|
|
||||||
final OpenSSHKnownHosts v = new OpenSSHKnownHosts(new File("src/test/resources/known_hosts.invalid"));
|
|
||||||
assertTrue(v.entries().isEmpty());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -32,7 +32,6 @@ package net.schmizz.sshj.util;
|
|||||||
|
|
||||||
import net.schmizz.sshj.common.Buffer;
|
import net.schmizz.sshj.common.Buffer;
|
||||||
import net.schmizz.sshj.common.IOUtils;
|
import net.schmizz.sshj.common.IOUtils;
|
||||||
|
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
|
|
||||||
|
|||||||
@@ -15,9 +15,8 @@
|
|||||||
*/
|
*/
|
||||||
package net.schmizz.sshj.util.gss;
|
package net.schmizz.sshj.util.gss;
|
||||||
|
|
||||||
import org.ietf.jgss.*;
|
|
||||||
|
|
||||||
import net.schmizz.sshj.common.IOUtils;
|
import net.schmizz.sshj.common.IOUtils;
|
||||||
|
import org.ietf.jgss.*;
|
||||||
|
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
import java.io.OutputStream;
|
import java.io.OutputStream;
|
||||||
|
|||||||
@@ -1,4 +0,0 @@
|
|||||||
schmizz.net,69.163.155.180 ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6P9Hlwdahh250jGZYKg2snRq2j2lFJVdKSHyxqbJiVy9VX9gTkN3K2MD48qyrYLYOyGs3vTttyUk+cK++JMzURWsrP4piby7LpeOT+3Iq8CQNj4gXZdcH9w15Vuk2qS11at6IsQPVHpKD9HGg9//EFUccI/4w06k4XXLm/IxOGUwj6I2AeWmEOL3aDi+fe07TTosSdLUD6INtR0cyKsg0zC7Da24ixoShT8Oy3x2MpR7CY3PQ1pUVmvPkr79VeA+4qV9F1JM09WdboAMZgWQZ+XrbtuBlGsyhpUHSCQOya+kOJ+bYryS+U7A+6nmTW3C9FX4FgFqTF89UHOC7V0zZQ==
|
|
||||||
# Above we have a plain line, Below we have a hashed line, Last is a v1 line, This is a garbage line.
|
|
||||||
|1|dy7xSefq6NmJms6AzANG3w45W28=|SSCTlHs4pZbc2uaRoPvjyEAHE1g= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAu64GJcCkdtckPGt8uKTyhG1ShT1Np1kh10eE49imQ4Nh9Y/IrSPzDtYUAazQ88ABc2NffuOKkdn2qtUwZ1ulfcdNfN3oTim3BiVHqa041pKG0L+onQe8Bo+CaG5KBLy/C24eNGM9EcfQvDQOnq1eD3lnR/l8fFckldzjfxZgar0yT9Bb3pwp50oN+1wSEINJEHOgMIW8kZBQmyNr/B+b7yX+Y1s1vuYIP/i4WimCVmkdi9G87Ga8w7GxKalRD2QOG6Xms2YWRQDN6M/MOn4tda3EKolbWkctEWcQf/PcVJffTH4Wv5f0RjVyrQv4ha4FZcNAv6RkRd9WkiCsiTKioQ==
|
|
||||||
test.com,1.1.1.1 2048 35 22017496617994656680820635966392838863613340434802393112245951008866692373218840197754553998457793202561151141246686162285550121243768846314646395880632789308110750881198697743542374668273149584280424505890648953477691795864456749782348425425954366277600319096366690719901119774784695056100331902394094537054256611668966698242432417382422091372756244612839068092471592121759862971414741954991375710930168229171638843329213652899594987626853020377726482288618521941129157643483558764875338089684351824791983007780922947554898825663693324944982594850256042689880090306493029526546183035567296830604572253312294059766327
|
|
||||||
@@ -1 +0,0 @@
|
|||||||
M36Lo+Ik5ukNugvvoNFlpnyiHMmtKxt3FpyEfYuryXjNqMNWHn/ARVnpUIl5jRLTB7WBzyLYMG7X5nuoFL9zYqKGtHxChbDunxMVbspw5WXI9VN+qxcLwmITmpEvI9ApyS/Ox2ZyN7zw==
|
|
||||||
Reference in New Issue
Block a user