Package ch.ethz.ssh2.signature

Examples of ch.ethz.ssh2.signature.RSAPublicKey


   */
  public void setstat(String path, SFTPv3FileAttributes attr) throws IOException
  {
    int req_id = generateNextRequestID();

    TypesWriter tw = new TypesWriter();
    tw.writeString(path, charsetName);
    tw.writeBytes(createAttrs(attr));

    if (debug != null)
    {
      debug.println("Sending SSH_FXP_SETSTAT...");
      debug.flush();
    }

    sendMessage(Packet.SSH_FXP_SETSTAT, req_id, tw.getBytes());

    expectStatusOKMessage(req_id);
  }
View Full Code Here


  {
    checkHandleValidAndOpen(handle);

    int req_id = generateNextRequestID();

    TypesWriter tw = new TypesWriter();
    tw.writeString(handle.fileHandle, 0, handle.fileHandle.length);
    tw.writeBytes(createAttrs(attr));

    if (debug != null)
    {
      debug.println("Sending SSH_FXP_FSETSTAT...");
      debug.flush();
    }

    sendMessage(Packet.SSH_FXP_FSETSTAT, req_id, tw.getBytes());

    expectStatusOKMessage(req_id);
  }
View Full Code Here

    /* Either I am too stupid to understand the SFTP draft
     * or the OpenSSH guys changed the semantics of src and target.
     */

    TypesWriter tw = new TypesWriter();
    tw.writeString(target, charsetName);
    tw.writeString(src, charsetName);

    if (debug != null)
    {
      debug.println("Sending SSH_FXP_SYMLINK...");
      debug.flush();
    }

    sendMessage(Packet.SSH_FXP_SYMLINK, req_id, tw.getBytes());

    expectStatusOKMessage(req_id);
  }
View Full Code Here

   */
  public String canonicalPath(String path) throws IOException
  {
    int req_id = generateNextRequestID();

    TypesWriter tw = new TypesWriter();
    tw.writeString(path, charsetName);

    if (debug != null)
    {
      debug.println("Sending SSH_FXP_REALPATH...");
      debug.flush();
    }

    sendMessage(Packet.SSH_FXP_REALPATH, req_id, tw.getBytes());

    byte[] resp = receiveMessage(34000);

    if (debug != null)
    {
View Full Code Here

  private boolean verifySignature(byte[] sig, byte[] hostkey) throws IOException
  {
    if (kxs.np.server_host_key_algo.equals("ssh-rsa"))
    {
      RSASignature rs = RSASHA1Verify.decodeSSHRSASignature(sig);
      RSAPublicKey rpk = RSASHA1Verify.decodeSSHRSAPublicKey(hostkey);

      log.log(50, "Verifying ssh-rsa signature");

      return RSASHA1Verify.verifySignature(kxs.H, rs, rpk);
    }
View Full Code Here

    if (hostnames == null)
      throw new IllegalArgumentException("hostnames may not be null");

    if ("ssh-rsa".equals(serverHostKeyAlgorithm))
    {
      RSAPublicKey rpk = RSASHA1Verify.decodeSSHRSAPublicKey(serverHostKey);

      synchronized (publicKeys)
      {
        publicKeys.add(new KnownHostsEntry(hostnames, rpk));
      }
View Full Code Here

  private final boolean matchKeys(Object key1, Object key2)
  {
    if ((key1 instanceof RSAPublicKey) && (key2 instanceof RSAPublicKey))
    {
      RSAPublicKey savedRSAKey = (RSAPublicKey) key1;
      RSAPublicKey remoteRSAKey = (RSAPublicKey) key2;

      if (savedRSAKey.getE().equals(remoteRSAKey.getE()) == false)
        return false;

      if (savedRSAKey.getN().equals(remoteRSAKey.getN()) == false)
        return false;

      return true;
    }
View Full Code Here

    if (hostnames == null)
      throw new IllegalArgumentException("hostnames may not be null");

    if ("ssh-rsa".equals(serverHostKeyAlgorithm))
    {
      RSAPublicKey rpk = RSASHA1Verify.decodeSSHRSAPublicKey(serverHostKey);

      synchronized (publicKeys)
      {
        publicKeys.add(new KnownHostsEntry(hostnames, rpk));
      }
View Full Code Here

  private final boolean matchKeys(Object key1, Object key2)
  {
    if ((key1 instanceof RSAPublicKey) && (key2 instanceof RSAPublicKey))
    {
      RSAPublicKey savedRSAKey = (RSAPublicKey) key1;
      RSAPublicKey remoteRSAKey = (RSAPublicKey) key2;

      if (savedRSAKey.getE().equals(remoteRSAKey.getE()) == false)
        return false;

      if (savedRSAKey.getN().equals(remoteRSAKey.getN()) == false)
        return false;

      return true;
    }
View Full Code Here

  private boolean verifySignature(byte[] sig, byte[] hostkey) throws IOException
  {
    if (kxs.np.server_host_key_algo.equals("ssh-rsa"))
    {
      RSASignature rs = RSASHA1Verify.decodeSSHRSASignature(sig);
      RSAPublicKey rpk = RSASHA1Verify.decodeSSHRSAPublicKey(hostkey);

      log.log(50, "Verifying ssh-rsa signature");

      return RSASHA1Verify.verifySignature(kxs.H, rs, rpk);
    }
View Full Code Here

TOP

Related Classes of ch.ethz.ssh2.signature.RSAPublicKey

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.