acscommons.com.jcraft.jsch.JSch Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of acs-aem-commons-bundle Show documentation
Show all versions of acs-aem-commons-bundle Show documentation
Main ACS AEM Commons OSGi Bundle. Includes commons utilities.
/* -*-mode:java; c-basic-offset:2; indent-tabs-mode:nil -*- */ /* Copyright (c) 2002-2018 ymnk, JCraft,Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The names of the authors may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ package acscommons.com.jcraft.jsch; import java.io.InputStream; import java.util.Vector; public class JSch{ /** * The version number. */ public static final String VERSION = "0.1.54"; static java.util.Hashtable config=new java.util.Hashtable(); static{ config.put("kex", "ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1"); config.put("server_host_key", "ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521"); config.put("cipher.s2c", "aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc"); config.put("cipher.c2s", "aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc"); config.put("mac.s2c", "hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96"); config.put("mac.c2s", "hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96"); config.put("compression.s2c", "none"); config.put("compression.c2s", "none"); config.put("lang.s2c", ""); config.put("lang.c2s", ""); config.put("compression_level", "6"); config.put("diffie-hellman-group-exchange-sha1", "acscommons.com.jcraft.jsch.DHGEX"); config.put("diffie-hellman-group1-sha1", "acscommons.com.jcraft.jsch.DHG1"); config.put("diffie-hellman-group14-sha1", "acscommons.com.jcraft.jsch.DHG14"); // available since JDK8. config.put("diffie-hellman-group-exchange-sha256", "acscommons.com.jcraft.jsch.DHGEX256"); // available since JDK1.4.2. // On JDK8, 2048bits will be used. config.put("ecdsa-sha2-nistp256", "acscommons.com.jcraft.jsch.jce.SignatureECDSA256"); config.put("ecdsa-sha2-nistp384", "acscommons.com.jcraft.jsch.jce.SignatureECDSA384"); config.put("ecdsa-sha2-nistp521", "acscommons.com.jcraft.jsch.jce.SignatureECDSA521"); config.put("ecdh-sha2-nistp256", "acscommons.com.jcraft.jsch.DHEC256"); config.put("ecdh-sha2-nistp384", "acscommons.com.jcraft.jsch.DHEC384"); config.put("ecdh-sha2-nistp521", "acscommons.com.jcraft.jsch.DHEC521"); config.put("ecdh-sha2-nistp", "acscommons.com.jcraft.jsch.jce.ECDHN"); config.put("dh", "acscommons.com.jcraft.jsch.jce.DH"); config.put("3des-cbc", "acscommons.com.jcraft.jsch.jce.TripleDESCBC"); config.put("blowfish-cbc", "acscommons.com.jcraft.jsch.jce.BlowfishCBC"); config.put("hmac-sha1", "acscommons.com.jcraft.jsch.jce.HMACSHA1"); config.put("hmac-sha1-96", "acscommons.com.jcraft.jsch.jce.HMACSHA196"); config.put("hmac-sha2-256", "acscommons.com.jcraft.jsch.jce.HMACSHA256"); // The "hmac-sha2-512" will require the key-length 2048 for DH, // but Sun's JCE has not allowed to use such a long key. //config.put("hmac-sha2-512", "acscommons.com.jcraft.jsch.jce.HMACSHA512"); config.put("hmac-md5", "acscommons.com.jcraft.jsch.jce.HMACMD5"); config.put("hmac-md5-96", "acscommons.com.jcraft.jsch.jce.HMACMD596"); config.put("sha-1", "acscommons.com.jcraft.jsch.jce.SHA1"); config.put("sha-256", "acscommons.com.jcraft.jsch.jce.SHA256"); config.put("sha-384", "acscommons.com.jcraft.jsch.jce.SHA384"); config.put("sha-512", "acscommons.com.jcraft.jsch.jce.SHA512"); config.put("md5", "acscommons.com.jcraft.jsch.jce.MD5"); config.put("signature.dss", "acscommons.com.jcraft.jsch.jce.SignatureDSA"); config.put("signature.rsa", "acscommons.com.jcraft.jsch.jce.SignatureRSA"); config.put("keypairgen.dsa", "acscommons.com.jcraft.jsch.jce.KeyPairGenDSA"); config.put("keypairgen.rsa", "acscommons.com.jcraft.jsch.jce.KeyPairGenRSA"); config.put("keypairgen.ecdsa", "acscommons.com.jcraft.jsch.jce.KeyPairGenECDSA"); config.put("random", "acscommons.com.jcraft.jsch.jce.Random"); config.put("none", "acscommons.com.jcraft.jsch.CipherNone"); config.put("aes128-cbc", "acscommons.com.jcraft.jsch.jce.AES128CBC"); config.put("aes192-cbc", "acscommons.com.jcraft.jsch.jce.AES192CBC"); config.put("aes256-cbc", "acscommons.com.jcraft.jsch.jce.AES256CBC"); config.put("aes128-ctr", "acscommons.com.jcraft.jsch.jce.AES128CTR"); config.put("aes192-ctr", "acscommons.com.jcraft.jsch.jce.AES192CTR"); config.put("aes256-ctr", "acscommons.com.jcraft.jsch.jce.AES256CTR"); config.put("3des-ctr", "acscommons.com.jcraft.jsch.jce.TripleDESCTR"); config.put("arcfour", "acscommons.com.jcraft.jsch.jce.ARCFOUR"); config.put("arcfour128", "acscommons.com.jcraft.jsch.jce.ARCFOUR128"); config.put("arcfour256", "acscommons.com.jcraft.jsch.jce.ARCFOUR256"); config.put("userauth.none", "acscommons.com.jcraft.jsch.UserAuthNone"); config.put("userauth.password", "acscommons.com.jcraft.jsch.UserAuthPassword"); config.put("userauth.keyboard-interactive", "acscommons.com.jcraft.jsch.UserAuthKeyboardInteractive"); config.put("userauth.publickey", "acscommons.com.jcraft.jsch.UserAuthPublicKey"); config.put("userauth.gssapi-with-mic", "acscommons.com.jcraft.jsch.UserAuthGSSAPIWithMIC"); config.put("gssapi-with-mic.krb5", "acscommons.com.jcraft.jsch.jgss.GSSContextKrb5"); config.put("zlib", "acscommons.com.jcraft.jsch.jcraft.Compression"); config.put("[email protected]", "acscommons.com.jcraft.jsch.jcraft.Compression"); config.put("pbkdf", "acscommons.com.jcraft.jsch.jce.PBKDF"); config.put("StrictHostKeyChecking", "ask"); config.put("HashKnownHosts", "no"); config.put("PreferredAuthentications", "gssapi-with-mic,publickey,keyboard-interactive,password"); config.put("CheckCiphers", "aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-ctr,arcfour,arcfour128,arcfour256"); config.put("CheckKexes", "diffie-hellman-group14-sha1,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521"); config.put("CheckSignatures", "ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521"); config.put("MaxAuthTries", "6"); config.put("ClearAllForwardings", "no"); } private java.util.Vector sessionPool = new java.util.Vector(); private IdentityRepository defaultIdentityRepository = new LocalIdentityRepository(this); private IdentityRepository identityRepository = defaultIdentityRepository; private ConfigRepository configRepository = null; /** * Sets the
is invalid. */ public void removeIdentity(Identity identity) throws JSchException{ identityRepository.remove(identity.getPublicKeyBlob()); } /** * Lists names of identities included in the identityRepository. * * @return names of identities * * @throws JSchException if identityReposory has problems. */ public Vector getIdentityNames() throws JSchException{ Vector foo=new Vector(); Vector identities = identityRepository.getIdentities(); for(int i=0; iidentityRepository
, which will be referred * in the public key authentication. * * @param identityRepository ifnull
is given, * the default repository, which usually refers to ~/.ssh/, will be used. * * @see #getIdentityRepository() */ public synchronized void setIdentityRepository(IdentityRepository identityRepository){ if(identityRepository == null){ this.identityRepository = defaultIdentityRepository; } else{ this.identityRepository = identityRepository; } } public synchronized IdentityRepository getIdentityRepository(){ return this.identityRepository; } public ConfigRepository getConfigRepository() { return this.configRepository; } public void setConfigRepository(ConfigRepository configRepository) { this.configRepository = configRepository; } private HostKeyRepository known_hosts=null; private static final Logger DEVNULL=new Logger(){ public boolean isEnabled(int level){return false;} public void log(int level, String message){} }; static Logger logger=DEVNULL; public JSch(){ /* // The JCE of Sun's Java5 on Mac OS X has the resource leak bug // in calculating HMAC, so we need to use our own implementations. try{ String osname=(String)(System.getProperties().get("os.name")); if(osname!=null && osname.equals("Mac OS X")){ config.put("hmac-sha1", "acscommons.com.jcraft.jsch.jcraft.HMACSHA1"); config.put("hmac-md5", "acscommons.com.jcraft.jsch.jcraft.HMACMD5"); config.put("hmac-md5-96", "acscommons.com.jcraft.jsch.jcraft.HMACMD596"); config.put("hmac-sha1-96", "acscommons.com.jcraft.jsch.jcraft.HMACSHA196"); } } catch(Exception e){ } */ } /** * Instantiates theSession
object with *host
. The user name and port number will be retrieved from * ConfigRepository. If user name is not given, * the system property "user.name" will be referred. * * @param host hostname * * @throws JSchException * ifusername
orhost
are invalid. * * @return the instance ofSession
class. * * @see #getSession(String username, String host, int port) * @see acscommons.com.jcraft.jsch.Session * @see acscommons.com.jcraft.jsch.ConfigRepository */ public Session getSession(String host) throws JSchException { return getSession(null, host, 22); } /** * Instantiates theSession
object with *username
andhost
. * The TCP port 22 will be used in making the connection. * Note that the TCP connection must not be established * until Session#connect(). * * @param username user name * @param host hostname * * @throws JSchException * ifusername
orhost
are invalid. * * @return the instance ofSession
class. * * @see #getSession(String username, String host, int port) * @see acscommons.com.jcraft.jsch.Session */ public Session getSession(String username, String host) throws JSchException { return getSession(username, host, 22); } /** * Instantiates theSession
object with given *username
,host
andport
. * Note that the TCP connection must not be established * until Session#connect(). * * @param username user name * @param host hostname * @param port port number * * @throws JSchException * ifusername
orhost
are invalid. * * @return the instance ofSession
class. * * @see #getSession(String username, String host, int port) * @see acscommons.com.jcraft.jsch.Session */ public Session getSession(String username, String host, int port) throws JSchException { if(host==null){ throw new JSchException("host must not be null."); } Session s = new Session(this, username, host, port); return s; } protected void addSession(Session session){ synchronized(sessionPool){ sessionPool.addElement(session); } } protected boolean removeSession(Session session){ synchronized(sessionPool){ return sessionPool.remove(session); } } /** * Sets the hostkey repository. * * @param hkrepo * * @see acscommons.com.jcraft.jsch.HostKeyRepository * @see acscommons.com.jcraft.jsch.KnownHosts */ public void setHostKeyRepository(HostKeyRepository hkrepo){ known_hosts=hkrepo; } /** * Sets the instance ofKnownHosts
, which refers * tofilename
. * * @param filename filename of known_hosts file. * * @throws JSchException * if the given filename is invalid. * * @see acscommons.com.jcraft.jsch.KnownHosts */ public void setKnownHosts(String filename) throws JSchException{ if(known_hosts==null) known_hosts=new KnownHosts(this); if(known_hosts instanceof KnownHosts){ synchronized(known_hosts){ ((KnownHosts)known_hosts).setKnownHosts(filename); } } } /** * Sets the instance ofKnownHosts
generated with *stream
. * * @param stream the instance of InputStream from known_hosts file. * * @throws JSchException * if an I/O error occurs. * * @see acscommons.com.jcraft.jsch.KnownHosts */ public void setKnownHosts(InputStream stream) throws JSchException{ if(known_hosts==null) known_hosts=new KnownHosts(this); if(known_hosts instanceof KnownHosts){ synchronized(known_hosts){ ((KnownHosts)known_hosts).setKnownHosts(stream); } } } /** * Returns the current hostkey repository. * By the default, this method will the instance ofKnownHosts
. * * @return current hostkey repository. * * @see acscommons.com.jcraft.jsch.HostKeyRepository * @see acscommons.com.jcraft.jsch.KnownHosts */ public HostKeyRepository getHostKeyRepository(){ if(known_hosts==null) known_hosts=new KnownHosts(this); return known_hosts; } /** * Sets the private key, which will be referred in * the public key authentication. * * @param prvkey filename of the private key. * * @throws JSchException ifprvkey
is invalid. * * @see #addIdentity(String prvkey, String passphrase) */ public void addIdentity(String prvkey) throws JSchException{ addIdentity(prvkey, (byte[])null); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered withpassphrase
. * * @param prvkey filename of the private key. * @param passphrase passphrase forprvkey
. * * @throws JSchException ifpassphrase
is not right. * * @see #addIdentity(String prvkey, byte[] passphrase) */ public void addIdentity(String prvkey, String passphrase) throws JSchException{ byte[] _passphrase=null; if(passphrase!=null){ _passphrase=Util.str2byte(passphrase); } addIdentity(prvkey, _passphrase); if(_passphrase!=null) Util.bzero(_passphrase); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered withpassphrase
. * * @param prvkey filename of the private key. * @param passphrase passphrase forprvkey
. * * @throws JSchException ifpassphrase
is not right. * * @see #addIdentity(String prvkey, String pubkey, byte[] passphrase) */ public void addIdentity(String prvkey, byte[] passphrase) throws JSchException{ Identity identity=IdentityFile.newInstance(prvkey, null, this); addIdentity(identity, passphrase); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered withpassphrase
. * * @param prvkey filename of the private key. * @param pubkey filename of the public key. * @param passphrase passphrase forprvkey
. * * @throws JSchException ifpassphrase
is not right. */ public void addIdentity(String prvkey, String pubkey, byte[] passphrase) throws JSchException{ Identity identity=IdentityFile.newInstance(prvkey, pubkey, this); addIdentity(identity, passphrase); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered withpassphrase
. * * @param name name of the identity to be used to retrieve it in the identityRepository. * @param prvkey private key in byte array. * @param pubkey public key in byte array. * @param passphrase passphrase forprvkey
. * */ public void addIdentity(String name, byte[]prvkey, byte[]pubkey, byte[] passphrase) throws JSchException{ Identity identity=IdentityFile.newInstance(name, prvkey, pubkey, this); addIdentity(identity, passphrase); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered withpassphrase
. * * @param identity private key. * @param passphrase passphrase foridentity
. * * @throws JSchException ifpassphrase
is not right. */ public void addIdentity(Identity identity, byte[] passphrase) throws JSchException{ if(passphrase!=null){ try{ byte[] goo=new byte[passphrase.length]; System.arraycopy(passphrase, 0, goo, 0, passphrase.length); passphrase=goo; identity.setPassphrase(passphrase); } finally{ Util.bzero(passphrase); } } if(identityRepository instanceof LocalIdentityRepository){ ((LocalIdentityRepository)identityRepository).add(identity); } else if(identity instanceof IdentityFile && !identity.isEncrypted()) { identityRepository.add(((IdentityFile)identity).getKeyPair().forSSHAgent()); } else { synchronized(this){ if(!(identityRepository instanceof IdentityRepository.Wrapper)){ setIdentityRepository(new IdentityRepository.Wrapper(identityRepository)); } } ((IdentityRepository.Wrapper)identityRepository).add(identity); } } /** * @deprecated use #removeIdentity(Identity identity) */ public void removeIdentity(String name) throws JSchException{ Vector identities = identityRepository.getIdentities(); for(int i=0; iidentity
© 2015 - 2024 Weber Informatics LLC | Privacy Policy