Package ch.ethz.ssh2.crypto

Examples of ch.ethz.ssh2.crypto.SimpleDERReader


      Session sess = conn.openSession();

      sess.execCommand("echo \"Text on STDOUT\"; echo \"Text on STDERR\" >&2");

      InputStream stdout = new StreamGobbler(sess.getStdout());
      InputStream stderr = new StreamGobbler(sess.getStderr());
 
      BufferedReader stdoutReader = new BufferedReader(new InputStreamReader(stdout));
      BufferedReader stderrReader = new BufferedReader(new InputStreamReader(stderr));
     
      System.out.println("Here is the output from stdout:");
View Full Code Here


      Session sess = conn.openSession();

      sess.execCommand("uname -a && date && uptime && who");

      InputStream stdout = new StreamGobbler(sess.getStdout());
      BufferedReader br = new BufferedReader(new InputStreamReader(stdout));

      System.out.println("Here is some information about the remote host:");

      while (true)
View Full Code Here

      Session sess = conn.openSession();

      sess.execCommand("uname -a && date && uptime && who");

      InputStream stdout = new StreamGobbler(sess.getStdout());

      BufferedReader br = new BufferedReader(new InputStreamReader(stdout));

      System.out.println("Here is some information about the remote host:");
View Full Code Here

      objSSHSession = this.getSshConnection().openSession();
      logger.debug("Executing command " + checkShellCommand);
      objSSHSession.execCommand(checkShellCommand);

      logger.debug("output to stdout for remote command: " + checkShellCommand);
      ipsStdOut = new StreamGobbler(objSSHSession.getStdout());
      ipsStdErr = new StreamGobbler(objSSHSession.getStderr());
      BufferedReader stdoutReader = new BufferedReader(new InputStreamReader(ipsStdOut));
      String stdOut = "";
      while (true) {
        String line = stdoutReader.readLine();
        if (line == null)
View Full Code Here

      this.getSshSession().execCommand(strCmd);

      logger.info("output to stdout for remote command: " + strCmd);

      ipsStdOut = new StreamGobbler(this.getSshSession().getStdout());
      ipsStdErr = new StreamGobbler(this.getSshSession().getStderr());
      BufferedReader stdoutReader = new BufferedReader(new InputStreamReader(ipsStdOut));
      strbStdoutOutput = new StringBuffer();
      while (true) {
        String line = stdoutReader.readLine();
        if (line == null)
View Full Code Here

        {
            String message = "Cannot execute remote command: " + command;
            throw new CommandAbortedException( message, message );
        }

        InputStream stdout = new StreamGobbler( session.getStdout() );
        InputStream stderr = new StreamGobbler( session.getStderr() );
        stderrReader = new BufferedReader( new InputStreamReader( stderr ) );
        setInputStream( new LoggedDataInputStream( stdout ) );
        setOutputStream( new LoggedDataOutputStream( session.getStdin() ) );
    }
View Full Code Here

    {
      log.log(20, "ssh-rsa signature: pos >= v.length");
      return false;
    }

    SimpleDERReader dr = new SimpleDERReader(v, pos, v.length - pos);

    byte[] seq = dr.readSequenceAsByteArray();

    if (dr.available() != 0)
    {
      log.log(20, "ssh-rsa signature: dr.available() != 0");
      return false;
    }

    dr.resetInput(seq);

    /* Read digestAlgorithm */

    byte digestAlgorithm[] = dr.readSequenceAsByteArray();

    /* Inspired by RFC 3347, however, ignoring the comment regarding old BER based implementations */

    if ((digestAlgorithm.length < 8) || (digestAlgorithm.length > 9))
    {
      log.log(20, "ssh-rsa signature: (digestAlgorithm.length < 8) || (digestAlgorithm.length > 9)");
      return false;
    }

    byte[] digestAlgorithm_sha1 = new byte[] { 0x06, 0x05, 0x2b, 0x0e, 0x03, 0x02, 0x1a, 0x05, 0x00 };

    for (int i = 0; i < digestAlgorithm.length; i++)
    {
      if (digestAlgorithm[i] != digestAlgorithm_sha1[i])
      {
        log.log(20, "ssh-rsa signature: digestAlgorithm[i] != digestAlgorithm_sha1[i]");
        return false;
      }
    }

    byte[] digest = dr.readOctetString();

    if (dr.available() != 0)
    {
      log.log(20, "ssh-rsa signature: dr.available() != 0 (II)");
      return false;
    }
     
View Full Code Here

    {
      log.log(20, "ssh-rsa signature: pos >= v.length");
      return false;
    }

    SimpleDERReader dr = new SimpleDERReader(v, pos, v.length - pos);

    byte[] seq = dr.readSequenceAsByteArray();

    if (dr.available() != 0)
    {
      log.log(20, "ssh-rsa signature: dr.available() != 0");
      return false;
    }

    dr.resetInput(seq);

    /* Read digestAlgorithm */

    byte digestAlgorithm[] = dr.readSequenceAsByteArray();

    /* Inspired by RFC 3347, however, ignoring the comment regarding old BER based implementations */

    if ((digestAlgorithm.length < 8) || (digestAlgorithm.length > 9))
    {
      log.log(20, "ssh-rsa signature: (digestAlgorithm.length < 8) || (digestAlgorithm.length > 9)");
      return false;
    }

    byte[] digestAlgorithm_sha1 = new byte[] { 0x06, 0x05, 0x2b, 0x0e, 0x03, 0x02, 0x1a, 0x05, 0x00 };

    for (int i = 0; i < digestAlgorithm.length; i++)
    {
      if (digestAlgorithm[i] != digestAlgorithm_sha1[i])
      {
        log.log(20, "ssh-rsa signature: digestAlgorithm[i] != digestAlgorithm_sha1[i]");
        return false;
      }
    }

    byte[] digest = dr.readOctetString();

    if (dr.available() != 0)
    {
      log.log(20, "ssh-rsa signature: dr.available() != 0 (II)");
      return false;
    }
     
View Full Code Here

    {
      log.warning("ssh-rsa signature: pos >= v.length");
      return false;
    }

    SimpleDERReader dr = new SimpleDERReader(v, pos, v.length - pos);

    byte[] seq = dr.readSequenceAsByteArray();

    if (dr.available() != 0)
    {
      log.warning("ssh-rsa signature: dr.available() != 0");
      return false;
    }

    dr.resetInput(seq);

    /* Read digestAlgorithm */

    byte digestAlgorithm[] = dr.readSequenceAsByteArray();

    /* Inspired by RFC 3347, however, ignoring the comment regarding old BER based implementations */

    if ((digestAlgorithm.length < 8) || (digestAlgorithm.length > 9))
    {
      log.warning("ssh-rsa signature: (digestAlgorithm.length < 8) || (digestAlgorithm.length > 9)");
      return false;
    }

    byte[] digestAlgorithm_sha1 = new byte[] { 0x06, 0x05, 0x2b, 0x0e, 0x03, 0x02, 0x1a, 0x05, 0x00 };

    for (int i = 0; i < digestAlgorithm.length; i++)
    {
      if (digestAlgorithm[i] != digestAlgorithm_sha1[i])
      {
        log.warning("ssh-rsa signature: digestAlgorithm[i] != digestAlgorithm_sha1[i]");
        return false;
      }
    }

    byte[] digest = dr.readOctetString();

    if (dr.available() != 0)
    {
      log.warning("ssh-rsa signature: dr.available() != 0 (II)");
      return false;
    }
     
View Full Code Here

    /* Tell the other side that we start using the new material */

    PacketNewKeys ign = new PacketNewKeys();
    tm.sendKexMessage(ign.getPayload());

    BlockCipher cbc;
    MAC mac;

    try
    {
      cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_client_to_server, true, km.enc_key_client_to_server,
View Full Code Here

TOP

Related Classes of ch.ethz.ssh2.crypto.SimpleDERReader

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.