com.jcraft.jsch.Session Maven / Gradle / Ivy
The newest version!
/* -*-mode:java; c-basic-offset:2; indent-tabs-mode:nil -*- */
/*
Copyright (c) 2002-2009 ymnk, JCraft,Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in
the documentation and/or other materials provided with the distribution.
3. The names of the authors may not be used to endorse or promote products
derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT,
INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
package com.jcraft.jsch;
import java.io.*;
import java.net.*;
public class Session implements Runnable{
static private final String version="JSCH-0.1.42";
// http://ietf.org/internet-drafts/draft-ietf-secsh-assignednumbers-01.txt
static final int SSH_MSG_DISCONNECT= 1;
static final int SSH_MSG_IGNORE= 2;
static final int SSH_MSG_UNIMPLEMENTED= 3;
static final int SSH_MSG_DEBUG= 4;
static final int SSH_MSG_SERVICE_REQUEST= 5;
static final int SSH_MSG_SERVICE_ACCEPT= 6;
static final int SSH_MSG_KEXINIT= 20;
static final int SSH_MSG_NEWKEYS= 21;
static final int SSH_MSG_KEXDH_INIT= 30;
static final int SSH_MSG_KEXDH_REPLY= 31;
static final int SSH_MSG_KEX_DH_GEX_GROUP= 31;
static final int SSH_MSG_KEX_DH_GEX_INIT= 32;
static final int SSH_MSG_KEX_DH_GEX_REPLY= 33;
static final int SSH_MSG_KEX_DH_GEX_REQUEST= 34;
static final int SSH_MSG_GLOBAL_REQUEST= 80;
static final int SSH_MSG_REQUEST_SUCCESS= 81;
static final int SSH_MSG_REQUEST_FAILURE= 82;
static final int SSH_MSG_CHANNEL_OPEN= 90;
static final int SSH_MSG_CHANNEL_OPEN_CONFIRMATION= 91;
static final int SSH_MSG_CHANNEL_OPEN_FAILURE= 92;
static final int SSH_MSG_CHANNEL_WINDOW_ADJUST= 93;
static final int SSH_MSG_CHANNEL_DATA= 94;
static final int SSH_MSG_CHANNEL_EXTENDED_DATA= 95;
static final int SSH_MSG_CHANNEL_EOF= 96;
static final int SSH_MSG_CHANNEL_CLOSE= 97;
static final int SSH_MSG_CHANNEL_REQUEST= 98;
static final int SSH_MSG_CHANNEL_SUCCESS= 99;
static final int SSH_MSG_CHANNEL_FAILURE= 100;
private byte[] V_S; // server version
private byte[] V_C=("SSH-2.0-"+version).getBytes(); // client version
private byte[] I_C; // the payload of the client's SSH_MSG_KEXINIT
private byte[] I_S; // the payload of the server's SSH_MSG_KEXINIT
private byte[] K_S; // the host key
private byte[] session_id;
private byte[] IVc2s;
private byte[] IVs2c;
private byte[] Ec2s;
private byte[] Es2c;
private byte[] MACc2s;
private byte[] MACs2c;
private int seqi=0;
private int seqo=0;
String[] guess=null;
private Cipher s2ccipher;
private Cipher c2scipher;
private MAC s2cmac;
private MAC c2smac;
//private byte[] mac_buf;
private byte[] s2cmac_result1;
private byte[] s2cmac_result2;
private Compression deflater;
private Compression inflater;
private IO io;
private Socket socket;
private int timeout=0;
private boolean isConnected=false;
private boolean isAuthed=false;
private Thread connectThread=null;
private Object lock=new Object();
boolean x11_forwarding=false;
boolean agent_forwarding=false;
InputStream in=null;
OutputStream out=null;
static Random random;
Buffer buf;
Packet packet;
SocketFactory socket_factory=null;
private java.util.Hashtable config=null;
private Proxy proxy=null;
private UserInfo userinfo;
private String hostKeyAlias=null;
private int serverAliveInterval=0;
private int serverAliveCountMax=1;
protected boolean daemon_thread=false;
String host="127.0.0.1";
int port=22;
String username=null;
byte[] password=null;
JSch jsch;
Session(JSch jsch) throws JSchException{
super();
this.jsch=jsch;
buf=new Buffer();
packet=new Packet(buf);
}
public void connect() throws JSchException{
connect(timeout);
}
public void connect(int connectTimeout) throws JSchException{
if(isConnected){
throw new JSchException("session is already connected");
}
io=new IO();
if(random==null){
try{
Class c=Class.forName(getConfig("random"));
random=(Random)(c.newInstance());
}
catch(Exception e){
throw new JSchException(e.toString(), e);
}
}
Packet.setRandom(random);
if(JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"Connecting to "+host+" port "+port);
}
try {
int i, j;
if(proxy==null){
InputStream in;
OutputStream out;
if(socket_factory==null){
socket=Util.createSocket(host, port, connectTimeout);
in=socket.getInputStream();
out=socket.getOutputStream();
}
else{
socket=socket_factory.createSocket(host, port);
in=socket_factory.getInputStream(socket);
out=socket_factory.getOutputStream(socket);
}
//if(timeout>0){ socket.setSoTimeout(timeout); }
socket.setTcpNoDelay(true);
io.setInputStream(in);
io.setOutputStream(out);
}
else{
synchronized(proxy){
proxy.connect(socket_factory, host, port, connectTimeout);
io.setInputStream(proxy.getInputStream());
io.setOutputStream(proxy.getOutputStream());
socket=proxy.getSocket();
}
}
if(connectTimeout>0 && socket!=null){
socket.setSoTimeout(connectTimeout);
}
isConnected=true;
if(JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"Connection established");
}
jsch.addSession(this);
{
// Some Cisco devices will miss to read '\n' if it is sent separately.
byte[] foo=new byte[V_C.length+1];
System.arraycopy(V_C, 0, foo, 0, V_C.length);
foo[foo.length-1]=(byte)'\n';
io.put(foo, 0, foo.length);
}
while(true){
i=0;
j=0;
while(i0 && buf.buffer[i-1]==13){ // 0x0d
i--;
}
}
if(i<=3 ||
((i!=buf.buffer.length) &&
(buf.buffer[0]!='S'||buf.buffer[1]!='S'||
buf.buffer[2]!='H'||buf.buffer[3]!='-'))){
// It must not start with 'SSH-'
//System.err.println(new String(buf.buffer, 0, i);
continue;
}
if(i==buf.buffer.length ||
i<7 || // SSH-1.99 or SSH-2.0
(buf.buffer[4]=='1' && buf.buffer[6]!='9') // SSH-1.5
){
throw new JSchException("invalid server's version string");
}
break;
}
V_S=new byte[i]; System.arraycopy(buf.buffer, 0, V_S, 0, i);
//System.err.println("V_S: ("+i+") ["+new String(V_S)+"]");
if(JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"Remote version string: "+new String(V_S));
JSch.getLogger().log(Logger.INFO,
"Local version string: "+new String(V_C));
}
send_kexinit();
buf=read(buf);
if(buf.getCommand()!=SSH_MSG_KEXINIT){
throw new JSchException("invalid protocol: "+buf.getCommand());
}
if(JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"SSH_MSG_KEXINIT received");
}
KeyExchange kex=receive_kexinit(buf);
while(true){
buf=read(buf);
if(kex.getState()==buf.getCommand()){
boolean result=kex.next(buf);
if(!result){
//System.err.println("verify: "+result);
in_kex=false;
throw new JSchException("verify: "+result);
}
}
else{
in_kex=false;
throw new JSchException("invalid protocol(kex): "+buf.getCommand());
}
if(kex.getState()==KeyExchange.STATE_END){
break;
}
}
try{ checkHost(host, port, kex); }
catch(JSchException ee){
in_kex=false;
throw ee;
}
send_newkeys();
// receive SSH_MSG_NEWKEYS(21)
buf=read(buf);
//System.err.println("read: 21 ? "+buf.getCommand());
if(buf.getCommand()==SSH_MSG_NEWKEYS){
if(JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"SSH_MSG_NEWKEYS received");
}
receive_newkeys(buf, kex);
}
else{
in_kex=false;
throw new JSchException("invalid protocol(newkyes): "+buf.getCommand());
}
boolean auth=false;
boolean auth_cancel=false;
UserAuth ua=null;
try{
Class c=Class.forName(getConfig("userauth.none"));
ua=(UserAuth)(c.newInstance());
}
catch(Exception e){
throw new JSchException(e.toString(), e);
}
auth=ua.start(this);
String cmethods=getConfig("PreferredAuthentications");
String[] cmethoda=Util.split(cmethods, ",");
String smethods=null;
if(!auth){
smethods=((UserAuthNone)ua).getMethods();
if(smethods!=null){
smethods=smethods.toLowerCase();
}
else{
// methods: publickey,password,keyboard-interactive
//smethods="publickey,password,keyboard-interactive";
smethods=cmethods;
}
}
String[] smethoda=Util.split(smethods, ",");
int methodi=0;
loop:
while(true){
//System.err.println("methods: "+methods);
while(!auth &&
cmethoda!=null && methodi0 || timeout>0){
socket.setSoTimeout(timeout);
}
isAuthed=true;
synchronized(lock){
if(isConnected){
connectThread=new Thread(this);
connectThread.setName("Connect thread "+host+" session");
if(daemon_thread){
connectThread.setDaemon(daemon_thread);
}
connectThread.start();
}
else{
// The session has been already down and
// we don't have to start new thread.
}
}
}
catch(Exception e) {
in_kex=false;
if(isConnected){
try{
packet.reset();
buf.putByte((byte)SSH_MSG_DISCONNECT);
buf.putInt(3);
buf.putString(e.toString().getBytes());
buf.putString("en".getBytes());
write(packet);
disconnect();
}
catch(Exception ee){
}
}
isConnected=false;
//e.printStackTrace();
if(e instanceof RuntimeException) throw (RuntimeException)e;
if(e instanceof JSchException) throw (JSchException)e;
throw new JSchException("Session.connect: "+e);
}
finally{
Util.bzero(this.password);
this.password=null;
}
}
private KeyExchange receive_kexinit(Buffer buf) throws Exception {
int j=buf.getInt();
if(j!=buf.getLength()){ // packet was compressed and
buf.getByte(); // j is the size of deflated packet.
I_S=new byte[buf.index-5];
}
else{
I_S=new byte[j-1-buf.getByte()];
}
System.arraycopy(buf.buffer, buf.s, I_S, 0, I_S.length);
if(!in_kex){ // We are in rekeying activated by the remote!
send_kexinit();
}
guess=KeyExchange.guess(I_S, I_C);
if(guess==null){
throw new JSchException("Algorithm negotiation fail");
}
if(!isAuthed &&
(guess[KeyExchange.PROPOSAL_ENC_ALGS_CTOS].equals("none") ||
(guess[KeyExchange.PROPOSAL_ENC_ALGS_STOC].equals("none")))){
throw new JSchException("NONE Cipher should not be chosen before authentification is successed.");
}
KeyExchange kex=null;
try{
Class c=Class.forName(getConfig(guess[KeyExchange.PROPOSAL_KEX_ALGS]));
kex=(KeyExchange)(c.newInstance());
}
catch(Exception e){
throw new JSchException(e.toString(), e);
}
kex.init(this, V_S, V_C, I_S, I_C);
return kex;
}
private boolean in_kex=false;
public void rekey() throws Exception {
send_kexinit();
}
private void send_kexinit() throws Exception {
if(in_kex)
return;
String cipherc2s=getConfig("cipher.c2s");
String ciphers2c=getConfig("cipher.s2c");
String[] not_available=checkCiphers(getConfig("CheckCiphers"));
if(not_available!=null && not_available.length>0){
cipherc2s=Util.diffString(cipherc2s, not_available);
ciphers2c=Util.diffString(ciphers2c, not_available);
if(cipherc2s==null || ciphers2c==null){
throw new JSchException("There are not any available ciphers.");
}
}
in_kex=true;
// byte SSH_MSG_KEXINIT(20)
// byte[16] cookie (random bytes)
// string kex_algorithms
// string server_host_key_algorithms
// string encryption_algorithms_client_to_server
// string encryption_algorithms_server_to_client
// string mac_algorithms_client_to_server
// string mac_algorithms_server_to_client
// string compression_algorithms_client_to_server
// string compression_algorithms_server_to_client
// string languages_client_to_server
// string languages_server_to_client
Buffer buf = new Buffer(); // send_kexinit may be invoked
Packet packet = new Packet(buf); // by user thread.
packet.reset();
buf.putByte((byte) SSH_MSG_KEXINIT);
synchronized(random){
random.fill(buf.buffer, buf.index, 16); buf.skip(16);
}
buf.putString(getConfig("kex").getBytes());
buf.putString(getConfig("server_host_key").getBytes());
buf.putString(cipherc2s.getBytes());
buf.putString(ciphers2c.getBytes());
buf.putString(getConfig("mac.c2s").getBytes());
buf.putString(getConfig("mac.s2c").getBytes());
buf.putString(getConfig("compression.c2s").getBytes());
buf.putString(getConfig("compression.s2c").getBytes());
buf.putString(getConfig("lang.c2s").getBytes());
buf.putString(getConfig("lang.s2c").getBytes());
buf.putByte((byte)0);
buf.putInt(0);
buf.setOffSet(5);
I_C=new byte[buf.getLength()];
buf.getByte(I_C);
write(packet);
if(JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"SSH_MSG_KEXINIT sent");
}
}
private void send_newkeys() throws Exception {
// send SSH_MSG_NEWKEYS(21)
packet.reset();
buf.putByte((byte)SSH_MSG_NEWKEYS);
write(packet);
if(JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"SSH_MSG_NEWKEYS sent");
}
}
private void checkHost(String chost, int port, KeyExchange kex) throws JSchException {
String shkc=getConfig("StrictHostKeyChecking");
if(hostKeyAlias!=null){
chost=hostKeyAlias;
}
//System.err.println("shkc: "+shkc);
byte[] K_S=kex.getHostKey();
String key_type=kex.getKeyType();
String key_fprint=kex.getFingerPrint();
if(hostKeyAlias==null && port!=22){
chost=("["+chost+"]:"+port);
}
// hostkey=new HostKey(chost, K_S);
HostKeyRepository hkr=jsch.getHostKeyRepository();
int i=0;
synchronized(hkr){
i=hkr.check(chost, K_S);
}
boolean insert=false;
if((shkc.equals("ask") || shkc.equals("yes")) &&
i==HostKeyRepository.CHANGED){
String file=null;
synchronized(hkr){
file=hkr.getKnownHostsRepositoryID();
}
if(file==null){file="known_hosts";}
boolean b=false;
if(userinfo!=null){
String message=
"WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!\n"+
"IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!\n"+
"Someone could be eavesdropping on you right now (man-in-the-middle attack)!\n"+
"It is also possible that the "+key_type+" host key has just been changed.\n"+
"The fingerprint for the "+key_type+" key sent by the remote host is\n"+
key_fprint+".\n"+
"Please contact your system administrator.\n"+
"Add correct host key in "+file+" to get rid of this message.";
if(shkc.equals("ask")){
b=userinfo.promptYesNo(message+
"\nDo you want to delete the old key and insert the new key?");
}
else{ // shkc.equals("yes")
userinfo.showMessage(message);
}
}
if(!b){
throw new JSchException("HostKey has been changed: "+chost);
}
synchronized(hkr){
hkr.remove(chost,
(key_type.equals("DSA") ? "ssh-dss" : "ssh-rsa"),
null);
insert=true;
}
}
if((shkc.equals("ask") || shkc.equals("yes")) &&
(i!=HostKeyRepository.OK) && !insert){
if(shkc.equals("yes")){
throw new JSchException("reject HostKey: "+host);
}
//System.err.println("finger-print: "+key_fprint);
if(userinfo!=null){
boolean foo=userinfo.promptYesNo(
"The authenticity of host '"+host+"' can't be established.\n"+
key_type+" key fingerprint is "+key_fprint+".\n"+
"Are you sure you want to continue connecting?"
);
if(!foo){
throw new JSchException("reject HostKey: "+host);
}
insert=true;
}
else{
if(i==HostKeyRepository.NOT_INCLUDED)
throw new JSchException("UnknownHostKey: "+host+". "+key_type+" key fingerprint is "+key_fprint);
else
throw new JSchException("HostKey has been changed: "+host);
}
}
if(shkc.equals("no") &&
HostKeyRepository.NOT_INCLUDED==i){
insert=true;
}
if(i==HostKeyRepository.OK &&
JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"Host '"+host+"' is known and mathces the "+key_type+" host key");
}
if(insert &&
JSch.getLogger().isEnabled(Logger.WARN)){
JSch.getLogger().log(Logger.WARN,
"Permanently added '"+host+"' ("+key_type+") to the list of known hosts.");
}
String hkh=getConfig("HashKnownHosts");
if(hkh.equals("yes") && (hkr instanceof KnownHosts)){
hostkey=((KnownHosts)hkr).createHashedHostKey(chost, K_S);
}
else{
hostkey=new HostKey(chost, K_S);
}
if(insert){
synchronized(hkr){
hkr.add(hostkey, userinfo);
}
}
}
//public void start(){ (new Thread(this)).start(); }
public Channel openChannel(String type) throws JSchException{
if(!isConnected){
throw new JSchException("session is down");
}
try{
Channel channel=Channel.getChannel(type);
addChannel(channel);
channel.init();
return channel;
}
catch(Exception e){
//e.printStackTrace();
}
return null;
}
// encode will bin invoked in write with synchronization.
public void encode(Packet packet) throws Exception{
//System.err.println("encode: "+packet.buffer.getCommand());
//System.err.println(" "+packet.buffer.index);
//if(packet.buffer.getCommand()==96){
//Thread.dumpStack();
//}
if(deflater!=null){
packet.buffer.index=deflater.compress(packet.buffer.buffer,
5, packet.buffer.index);
}
if(c2scipher!=null){
//packet.padding(c2scipher.getIVSize());
packet.padding(c2scipher_size);
int pad=packet.buffer.buffer[4];
synchronized(random){
random.fill(packet.buffer.buffer, packet.buffer.index-pad, pad);
}
}
else{
packet.padding(8);
}
if(c2smac!=null){
c2smac.update(seqo);
c2smac.update(packet.buffer.buffer, 0, packet.buffer.index);
c2smac.doFinal(packet.buffer.buffer, packet.buffer.index);
}
if(c2scipher!=null){
byte[] buf=packet.buffer.buffer;
c2scipher.update(buf, 0, packet.buffer.index, buf, 0);
}
if(c2smac!=null){
packet.buffer.skip(c2smac.getBlockSize());
}
}
int[] uncompress_len=new int[1];
private int s2ccipher_size=8;
private int c2scipher_size=8;
public Buffer read(Buffer buf) throws Exception{
int j=0;
while(true){
buf.reset();
io.getByte(buf.buffer, buf.index, s2ccipher_size);
buf.index+=s2ccipher_size;
if(s2ccipher!=null){
s2ccipher.update(buf.buffer, 0, s2ccipher_size, buf.buffer, 0);
}
j=((buf.buffer[0]<<24)&0xff000000)|
((buf.buffer[1]<<16)&0x00ff0000)|
((buf.buffer[2]<< 8)&0x0000ff00)|
((buf.buffer[3] )&0x000000ff);
// RFC 4253 6.1. Maximum Packet Length
if(j<5 || j>(32768-4)){
throw new IOException("invalid data");
}
j=j+4-s2ccipher_size;
//if(j<0){
// throw new IOException("invalid data");
//}
if((buf.index+j)>buf.buffer.length){
byte[] foo=new byte[buf.index+j];
System.arraycopy(buf.buffer, 0, foo, 0, buf.index);
buf.buffer=foo;
}
if((j%s2ccipher_size)!=0){
String message="Bad packet length "+j;
if(JSch.getLogger().isEnabled(Logger.FATAL)){
JSch.getLogger().log(Logger.FATAL, message);
}
packet.reset();
buf.putByte((byte)SSH_MSG_DISCONNECT);
buf.putInt(3);
buf.putString(message.getBytes());
buf.putString("en".getBytes());
write(packet);
disconnect();
throw new JSchException("SSH_MSG_DISCONNECT: "+message);
}
if(j>0){
io.getByte(buf.buffer, buf.index, j); buf.index+=(j);
if(s2ccipher!=null){
s2ccipher.update(buf.buffer, s2ccipher_size, j, buf.buffer, s2ccipher_size);
}
}
if(s2cmac!=null){
s2cmac.update(seqi);
s2cmac.update(buf.buffer, 0, buf.index);
s2cmac.doFinal(s2cmac_result1, 0);
io.getByte(s2cmac_result2, 0, s2cmac_result2.length);
if(!java.util.Arrays.equals(s2cmac_result1, s2cmac_result2)){
throw new IOException("MAC Error");
}
}
seqi++;
if(inflater!=null){
//inflater.uncompress(buf);
int pad=buf.buffer[4];
uncompress_len[0]=buf.index-5-pad;
byte[] foo=inflater.uncompress(buf.buffer, 5, uncompress_len);
if(foo!=null){
buf.buffer=foo;
buf.index=5+uncompress_len[0];
}
else{
System.err.println("fail in inflater");
break;
}
}
int type=buf.getCommand()&0xff;
//System.err.println("read: "+type);
if(type==SSH_MSG_DISCONNECT){
buf.rewind();
buf.getInt();buf.getShort();
int reason_code=buf.getInt();
byte[] description=buf.getString();
byte[] language_tag=buf.getString();
throw new JSchException("SSH_MSG_DISCONNECT: "+
reason_code+
" "+new String(description)+
" "+new String(language_tag));
//break;
}
else if(type==SSH_MSG_IGNORE){
}
else if(type==SSH_MSG_UNIMPLEMENTED){
buf.rewind();
buf.getInt();buf.getShort();
int reason_id=buf.getInt();
if(JSch.getLogger().isEnabled(Logger.INFO)){
JSch.getLogger().log(Logger.INFO,
"Received SSH_MSG_UNIMPLEMENTED for "+reason_id);
}
}
else if(type==SSH_MSG_DEBUG){
buf.rewind();
buf.getInt();buf.getShort();
/*
byte always_display=(byte)buf.getByte();
byte[] message=buf.getString();
byte[] language_tag=buf.getString();
System.err.println("SSH_MSG_DEBUG:"+
" "+new String(message)+
" "+new String(language_tag));
*/
}
else if(type==SSH_MSG_CHANNEL_WINDOW_ADJUST){
buf.rewind();
buf.getInt();buf.getShort();
Channel c=Channel.getChannel(buf.getInt(), this);
if(c==null){
}
else{
c.addRemoteWindowSize(buf.getInt());
}
}
else if(type==52/*SSH_MSG_USERAUTH_SUCCESS*/){
isAuthed=true;
if(inflater==null && deflater==null){
String method;
method=guess[KeyExchange.PROPOSAL_COMP_ALGS_CTOS];
initDeflater(method);
method=guess[KeyExchange.PROPOSAL_COMP_ALGS_STOC];
initInflater(method);
}
break;
}
else{
break;
}
}
buf.rewind();
return buf;
}
byte[] getSessionId(){
return session_id;
}
private void receive_newkeys(Buffer buf, KeyExchange kex) throws Exception {
updateKeys(kex);
in_kex=false;
}
private void updateKeys(KeyExchange kex) throws Exception{
byte[] K=kex.getK();
byte[] H=kex.getH();
HASH hash=kex.getHash();
// String[] guess=kex.guess;
if(session_id==null){
session_id=new byte[H.length];
System.arraycopy(H, 0, session_id, 0, H.length);
}
/*
Initial IV client to server: HASH (K || H || "A" || session_id)
Initial IV server to client: HASH (K || H || "B" || session_id)
Encryption key client to server: HASH (K || H || "C" || session_id)
Encryption key server to client: HASH (K || H || "D" || session_id)
Integrity key client to server: HASH (K || H || "E" || session_id)
Integrity key server to client: HASH (K || H || "F" || session_id)
*/
buf.reset();
buf.putMPInt(K);
buf.putByte(H);
buf.putByte((byte)0x41);
buf.putByte(session_id);
hash.update(buf.buffer, 0, buf.index);
IVc2s=hash.digest();
int j=buf.index-session_id.length-1;
buf.buffer[j]++;
hash.update(buf.buffer, 0, buf.index);
IVs2c=hash.digest();
buf.buffer[j]++;
hash.update(buf.buffer, 0, buf.index);
Ec2s=hash.digest();
buf.buffer[j]++;
hash.update(buf.buffer, 0, buf.index);
Es2c=hash.digest();
buf.buffer[j]++;
hash.update(buf.buffer, 0, buf.index);
MACc2s=hash.digest();
buf.buffer[j]++;
hash.update(buf.buffer, 0, buf.index);
MACs2c=hash.digest();
try{
Class c;
String method;
method=guess[KeyExchange.PROPOSAL_ENC_ALGS_STOC];
c=Class.forName(getConfig(method));
s2ccipher=(Cipher)(c.newInstance());
while(s2ccipher.getBlockSize()>Es2c.length){
buf.reset();
buf.putMPInt(K);
buf.putByte(H);
buf.putByte(Es2c);
hash.update(buf.buffer, 0, buf.index);
byte[] foo=hash.digest();
byte[] bar=new byte[Es2c.length+foo.length];
System.arraycopy(Es2c, 0, bar, 0, Es2c.length);
System.arraycopy(foo, 0, bar, Es2c.length, foo.length);
Es2c=bar;
}
s2ccipher.init(Cipher.DECRYPT_MODE, Es2c, IVs2c);
s2ccipher_size=s2ccipher.getIVSize();
method=guess[KeyExchange.PROPOSAL_MAC_ALGS_STOC];
c=Class.forName(getConfig(method));
s2cmac=(MAC)(c.newInstance());
s2cmac.init(MACs2c);
//mac_buf=new byte[s2cmac.getBlockSize()];
s2cmac_result1=new byte[s2cmac.getBlockSize()];
s2cmac_result2=new byte[s2cmac.getBlockSize()];
method=guess[KeyExchange.PROPOSAL_ENC_ALGS_CTOS];
c=Class.forName(getConfig(method));
c2scipher=(Cipher)(c.newInstance());
while(c2scipher.getBlockSize()>Ec2s.length){
buf.reset();
buf.putMPInt(K);
buf.putByte(H);
buf.putByte(Ec2s);
hash.update(buf.buffer, 0, buf.index);
byte[] foo=hash.digest();
byte[] bar=new byte[Ec2s.length+foo.length];
System.arraycopy(Ec2s, 0, bar, 0, Ec2s.length);
System.arraycopy(foo, 0, bar, Ec2s.length, foo.length);
Ec2s=bar;
}
c2scipher.init(Cipher.ENCRYPT_MODE, Ec2s, IVc2s);
c2scipher_size=c2scipher.getIVSize();
method=guess[KeyExchange.PROPOSAL_MAC_ALGS_CTOS];
c=Class.forName(getConfig(method));
c2smac=(MAC)(c.newInstance());
c2smac.init(MACc2s);
method=guess[KeyExchange.PROPOSAL_COMP_ALGS_CTOS];
initDeflater(method);
method=guess[KeyExchange.PROPOSAL_COMP_ALGS_STOC];
initInflater(method);
}
catch(Exception e){
if(e instanceof JSchException)
throw e;
throw new JSchException(e.toString(), e);
//System.err.println("updatekeys: "+e);
}
}
/*public*/ /*synchronized*/ void write(Packet packet, Channel c, int length) throws Exception{
while(true){
if(in_kex){
try{Thread.sleep(10);}
catch(java.lang.InterruptedException e){};
continue;
}
synchronized(c){
if(c.rwsize>=length){
c.rwsize-=length;
break;
}
}
if(c.close || !c.isConnected()){
throw new IOException("channel is broken");
}
boolean sendit=false;
int s=0;
byte command=0;
int recipient=-1;
synchronized(c){
if(c.rwsize>0){
int len=c.rwsize;
if(len>length){
len=length;
}
if(len!=length){
s=packet.shift(len, (c2smac!=null ? c2smac.getBlockSize() : 0));
}
command=packet.buffer.getCommand();
recipient=c.getRecipient();
length-=len;
c.rwsize-=len;
sendit=true;
}
}
if(sendit){
_write(packet);
if(length==0){
return;
}
packet.unshift(command, recipient, s, length);
}
synchronized(c){
if(in_kex){
continue;
}
if(c.rwsize>=length){
c.rwsize-=length;
break;
}
try{
c.notifyme++;
c.wait(100);
}
catch(java.lang.InterruptedException e){
}
finally{
c.notifyme--;
}
}
}
_write(packet);
}
public void write(Packet packet) throws Exception{
// System.err.println("in_kex="+in_kex+" "+(packet.buffer.getCommand()));
while(in_kex){
byte command=packet.buffer.getCommand();
//System.err.println("command: "+command);
if(command==SSH_MSG_KEXINIT ||
command==SSH_MSG_NEWKEYS ||
command==SSH_MSG_KEXDH_INIT ||
command==SSH_MSG_KEXDH_REPLY ||
command==SSH_MSG_KEX_DH_GEX_GROUP ||
command==SSH_MSG_KEX_DH_GEX_INIT ||
command==SSH_MSG_KEX_DH_GEX_REPLY ||
command==SSH_MSG_KEX_DH_GEX_REQUEST ||
command==SSH_MSG_DISCONNECT){
break;
}
try{Thread.sleep(10);}
catch(java.lang.InterruptedException e){};
}
_write(packet);
}
private void _write(Packet packet) throws Exception{
synchronized(lock){
encode(packet);
if(io!=null){
io.put(packet);
seqo++;
}
}
}
Runnable thread;
public void run(){
thread=this;
byte[] foo;
Buffer buf=new Buffer();
Packet packet=new Packet(buf);
int i=0;
Channel channel;
int[] start=new int[1];
int[] length=new int[1];
KeyExchange kex=null;
int stimeout=0;
try{
while(isConnected &&
thread!=null){
try{
buf=read(buf);
stimeout=0;
}
catch(InterruptedIOException/*SocketTimeoutException*/ ee){
if(!in_kex && stimeout
© 2015 - 2025 Weber Informatics LLC | Privacy Policy