Package ch.ethz.ssh2.crypto.digest

Examples of ch.ethz.ssh2.crypto.digest.Digest


   * @param hostkey the hostkey
   * @return the raw fingerprint
   */
  static final private byte[] rawFingerPrint(String type, String keyType, byte[] hostkey)
  {
    Digest dig = null;

    if ("md5".equals(type))
    {
      dig = new MD5();
    }
    else if ("sha1".equals(type))
    {
      dig = new SHA1();
    }
    else
      throw new IllegalArgumentException("Unknown hash type " + type);

    if ("ssh-rsa".equals(keyType))
    {
    }
    else if ("ssh-dss".equals(keyType))
    {
    }
    else
      throw new IllegalArgumentException("Unknown key type " + keyType);

    if (hostkey == null)
      throw new IllegalArgumentException("hostkey is null");

    dig.update(hostkey);
    byte[] res = new byte[dig.getDigestLength()];
    dig.digest(res);
    return res;
  }
View Full Code Here


   * @param hostkey the hostkey
   * @return the raw fingerprint
   */
  static final private byte[] rawFingerPrint(String type, String keyType, byte[] hostkey)
  {
    Digest dig = null;

    if ("md5".equals(type))
    {
      dig = new MD5();
    }
    else if ("sha1".equals(type))
    {
      dig = new SHA1();
    }
    else
      throw new IllegalArgumentException("Unknown hash type " + type);

    if ("ssh-rsa".equals(keyType))
    {
    }
    else if ("ssh-dss".equals(keyType))
    {
    }
    else
      throw new IllegalArgumentException("Unknown key type " + keyType);

    if (hostkey == null)
      throw new IllegalArgumentException("hostkey is null");

    dig.update(hostkey);
    byte[] res = new byte[dig.getDigestLength()];
    dig.digest(res);
    return res;
  }
View Full Code Here

   * @param hostkey the hostkey
   * @return the raw fingerprint
   */
  static final private byte[] rawFingerPrint(String type, String keyType, byte[] hostkey)
  {
    Digest dig = null;

    if ("md5".equals(type))
    {
      dig = new MD5();
    }
    else if ("sha1".equals(type))
    {
      dig = new SHA1();
    }
    else
      throw new IllegalArgumentException("Unknown hash type " + type);

    if ("ssh-rsa".equals(keyType))
    {
    }
    else if ("ssh-dss".equals(keyType))
    {
    }
    else
      throw new IllegalArgumentException("Unknown key type " + keyType);

    if (hostkey == null)
      throw new IllegalArgumentException("hostkey is null");

    dig.update(hostkey);
    byte[] res = new byte[dig.getDigestLength()];
    dig.digest(res);
    return res;
  }
View Full Code Here

   * @param hostkey the hostkey
   * @return the raw fingerprint
   */
  static private byte[] rawFingerPrint(String type, String keyType, byte[] hostkey)
  {
    Digest dig = null;

    if ("md5".equals(type))
    {
      dig = new MD5();
    }
    else if ("sha1".equals(type))
    {
      dig = new SHA1();
    }
    else
    {
      throw new IllegalArgumentException("Unknown hash type " + type);
    }

    if ("ssh-rsa".equals(keyType))
    {
    }
    else if ("ssh-dss".equals(keyType))
    {
    }
    else
    {
      throw new IllegalArgumentException("Unknown key type " + keyType);
    }

    if (hostkey == null)
    {
      throw new IllegalArgumentException("hostkey is null");
    }

    dig.update(hostkey);
    byte[] res = new byte[dig.getDigestLength()];
    dig.digest(res);
    return res;
  }
View Full Code Here

   * @param hostkey the hostkey
   * @return the raw fingerprint
   */
  static private byte[] rawFingerPrint(String type, String keyType, byte[] hostkey)
  {
    Digest dig = null;

    if ("md5".equals(type))
    {
      dig = new MD5();
    }
    else if ("sha1".equals(type))
    {
      dig = new SHA1();
    }
    else
    {
      throw new IllegalArgumentException("Unknown hash type " + type);
    }

    if ("ssh-rsa".equals(keyType))
    {
    }
    else if ("ssh-dss".equals(keyType))
    {
    }
    else
    {
      throw new IllegalArgumentException("Unknown key type " + keyType);
    }

    if (hostkey == null)
    {
      throw new IllegalArgumentException("hostkey is null");
    }

    dig.update(hostkey);
    byte[] res = new byte[dig.getDigestLength()];
    dig.digest(res);
    return res;
  }
View Full Code Here

    PacketNewKeys ign = new PacketNewKeys();
    tm.sendKexMessage(ign.getPayload());

    BlockCipher cbc;
    MAC mac;

    try
    {
      cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_client_to_server, true, km.enc_key_client_to_server,
          km.initial_iv_client_to_server);

      mac = new MAC(kxs.np.mac_algo_client_to_server, km.integrity_key_client_to_server);

    }
    catch (IllegalArgumentException e1)
    {
      throw new IOException("Fatal error during MAC startup!");
View Full Code Here

    {
      if (km == null)
        throw new IOException("Peer sent SSH_MSG_NEWKEYS, but I have no key material ready!");

      BlockCipher cbc;
      MAC mac;

      try
      {
        cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_server_to_client, false,
            km.enc_key_server_to_client, km.initial_iv_server_to_client);

        mac = new MAC(kxs.np.mac_algo_server_to_client, km.integrity_key_server_to_client);

      }
      catch (IllegalArgumentException e1)
      {
        throw new IOException("Fatal error during MAC startup!");
View Full Code Here

        if (kxs.np.kex_algo.equals("diffie-hellman-group1-sha1"))
          kxs.dhx.init(1, rnd);
        else
          kxs.dhx.init(14, rnd);

        PacketKexDHInit kp = new PacketKexDHInit(kxs.dhx.getE());
        tm.sendKexMessage(kp.getPayload());
        kxs.state = 1;
        return;
      }

      throw new IllegalStateException("Unkown KEX method!");
View Full Code Here

        || kxs.np.kex_algo.equals("diffie-hellman-group14-sha1"))
    {
      if (kxs.state == 1)
      {

        PacketKexDHReply dhr = new PacketKexDHReply(msg, 0, msglen);

        kxs.hostkey = dhr.getHostKey();

        if (verifier != null)
        {
          boolean vres = false;

          try
          {
            vres = verifier.verifyServerHostKey(hostname, port, kxs.np.server_host_key_algo, kxs.hostkey);
          }
          catch (Exception e)
          {
            throw (IOException) new IOException(
                "The server hostkey was not accepted by the verifier callback.").initCause(e);
          }

          if (vres == false)
            throw new IOException("The server hostkey was not accepted by the verifier callback");
        }

        kxs.dhx.setF(dhr.getF());

        try
        {
          kxs.H = kxs.dhx.calculateH(csh.getClientString(), csh.getServerString(), kxs.localKEX.getPayload(),
              kxs.remoteKEX.getPayload(), dhr.getHostKey());
        }
        catch (IllegalArgumentException e)
        {
          throw (IOException) new IOException("KEX error.").initCause(e);
        }

        boolean res = verifySignature(dhr.getSignature(), kxs.hostkey);

        if (res == false)
          throw new IOException("Hostkey signature sent by remote is wrong!");

        kxs.K = kxs.dhx.getK();
View Full Code Here

    if (kxs.np.kex_algo.equals("diffie-hellman-group-exchange-sha1"))
    {
      if (kxs.state == 1)
      {
        PacketKexDhGexGroup dhgexgrp = new PacketKexDhGexGroup(msg, 0, msglen);
        kxs.dhgx = new DhGroupExchange(dhgexgrp.getP(), dhgexgrp.getG());
        kxs.dhgx.init(rnd);
        PacketKexDhGexInit dhgexinit = new PacketKexDhGexInit(kxs.dhgx.getE());
        tm.sendKexMessage(dhgexinit.getPayload());
        kxs.state = 2;
        return;
View Full Code Here

TOP

Related Classes of ch.ethz.ssh2.crypto.digest.Digest

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.