/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.sshd.deprecated; import java.io.IOException; import java.security.KeyPair; import org.apache.sshd.client.auth.pubkey.UserAuthPublicKeyFactory; import org.apache.sshd.client.session.ClientSession; import org.apache.sshd.common.NamedFactory; import org.apache.sshd.common.SshConstants; import org.apache.sshd.common.config.keys.KeyUtils; import org.apache.sshd.common.signature.Signature; import org.apache.sshd.common.util.ValidateUtils; import org.apache.sshd.common.util.buffer.Buffer; import org.apache.sshd.common.util.buffer.ByteArrayBuffer; /** * TODO Add javadoc * * @author <a href="mailto:dev@mina.apache.org">Apache MINA SSHD Project</a> */ // CHECKSTYLE:OFF public class UserAuthPublicKey extends AbstractUserAuth { private final KeyPair key; public UserAuthPublicKey(ClientSession session, String service, KeyPair key) { super(session, service); this.key = key; } @Override public Result next(Buffer buffer) throws IOException { ClientSession session = getClientSession(); String service = getService(); if (buffer == null) { try { log.debug("Send SSH_MSG_USERAUTH_REQUEST for publickey"); buffer = session.createBuffer(SshConstants.SSH_MSG_USERAUTH_REQUEST); buffer.putString(session.getUsername()); buffer.putString(service); buffer.putString(UserAuthPublicKeyFactory.NAME); buffer.putBoolean(true); String alg = KeyUtils.getKeyType(key); buffer.putString(alg); buffer.putPublicKey(key.getPublic()); Signature verif = ValidateUtils.checkNotNull(NamedFactory.create(session.getSignatureFactories(), alg), "No signature factory located for algorithm=%s", alg); verif.initSigner(key.getPrivate()); Buffer bs = new ByteArrayBuffer(); bs.putBytes(session.getKex().getH()); bs.putByte(SshConstants.SSH_MSG_USERAUTH_REQUEST); bs.putString(session.getUsername()); bs.putString(service); bs.putString(UserAuthPublicKeyFactory.NAME); bs.putBoolean(true); bs.putString(alg); bs.putPublicKey(key.getPublic()); verif.update(bs.array(), bs.rpos(), bs.available()); byte[] signature = verif.sign(); bs = new ByteArrayBuffer(alg.length() + signature.length + Long.SIZE, false); bs.putString(alg); bs.putBytes(signature); buffer.putBytes(bs.array(), bs.rpos(), bs.available()); session.writePacket(buffer); return Result.Continued; } catch (IOException e) { throw e; } catch (Exception e) { throw new IOException("Error performing public key authentication", e); } } else { int cmd = buffer.getUByte(); if (cmd == SshConstants.SSH_MSG_USERAUTH_SUCCESS) { if (log.isDebugEnabled()) { log.debug("Received SSH_MSG_USERAUTH_SUCCESS"); } return Result.Success; } if (cmd == SshConstants.SSH_MSG_USERAUTH_FAILURE) { String methods = buffer.getString(); boolean partial = buffer.getBoolean(); if (log.isDebugEnabled()) { log.debug("Received SSH_MSG_USERAUTH_FAILURE - partial={}, methods={}", partial, methods); } return Result.Failure; } else { if (log.isDebugEnabled()) { log.debug("Received unknown packet {}", cmd); } // TODO: check packets return Result.Continued; } } } } // CHECKSTYLE:ON