static KeyPair fromSSHAgent(Buffer buf) throws JSchException { byte[][] tmp = buf.getBytes(7, "invalid key format"); byte[] P_array = tmp[1]; byte[] Q_array = tmp[2]; byte[] G_array = tmp[3]; byte[] pub_array = tmp[4]; byte[] prv_array = tmp[5]; KeyPairDSA kpair = new KeyPairDSA(P_array, Q_array, G_array, pub_array, prv_array); kpair.publicKeyComment = new String(tmp[6]); kpair.vendor = VENDOR_OPENSSH; return kpair; }
byte[] getPrivateKey() { int content = 1 + countLength(1) + 1 + // INTEGER 1 + countLength(P_array.length) + P_array.length + // INTEGER P 1 + countLength(Q_array.length) + Q_array.length + // INTEGER Q 1 + countLength(G_array.length) + G_array.length + // INTEGER G 1 + countLength(pub_array.length) + pub_array.length + // INTEGER pub 1 + countLength(prv_array.length) + prv_array.length; // INTEGER prv int total = 1 + countLength(content) + content; // SEQUENCE byte[] plain = new byte[total]; int index = 0; index = writeSEQUENCE(plain, index, content); index = writeINTEGER(plain, index, new byte[1]); // 0 index = writeINTEGER(plain, index, P_array); index = writeINTEGER(plain, index, Q_array); index = writeINTEGER(plain, index, G_array); index = writeINTEGER(plain, index, pub_array); index = writeINTEGER(plain, index, prv_array); return plain; }
modPow(new BigInteger(prv_array), new BigInteger(P_array)). toByteArray(); KeyPairDSA _key = new KeyPairDSA(P_array, Q_array, G_array, pub_array, prv_array); plain = _key.getPrivateKey(); _kpair = new KeyPairDSA(); _kpair.copy(this); if (_kpair.parse(plain)) {
kpair=KeyPairDSA.fromSSHAgent(jsch, buf); if(type==DSA){ kpair=new KeyPairDSA(jsch); } else if(type==RSA){ kpair=new KeyPairRSA(jsch); } else if(type==ECDSA){ kpair=new KeyPairECDSA(jsch, pubkey); }
public byte[] forSSHAgent() throws JSchException { if (isEncrypted()) { throw new JSchException("key is encrypted."); } Buffer buf = new Buffer(); buf.putString(sshdss); buf.putString(P_array); buf.putString(Q_array); buf.putString(G_array); buf.putString(pub_array); buf.putString(prv_array); buf.putString(Util.str2byte(publicKeyComment)); byte[] result = new byte[buf.getLength()]; buf.getByte(result, 0, result.length); return result; }
public Signature getVerifier() { try { Class<?> c = Class.forName(JSch.getConfig("signature.dss")); SignatureDSA dsa = (SignatureDSA) c.newInstance(); dsa.init(); if (pub_array == null && P_array == null && getPublicKeyBlob() != null) { Buffer buf = new Buffer(getPublicKeyBlob()); buf.getString(); P_array = buf.getString(); Q_array = buf.getString(); G_array = buf.getString(); pub_array = buf.getString(); } dsa.setPubKey(pub_array, P_array, Q_array, G_array); return dsa; } catch (Exception e) { logger.log(Level.SEVERE, e.getMessage(), e); } return null; }
toByteArray(); KeyPairDSA _key = new KeyPairDSA(jsch, P_array, Q_array, G_array, pub_array, prv_array); plain = _key.getPrivateKey(); _kpair = new KeyPairDSA(jsch); _kpair.copy(this); if(_kpair.parse(plain)){
kpair=KeyPairDSA.fromSSHAgent(jsch, buf); if(type==DSA){ kpair=new KeyPairDSA(jsch); } else if(type==RSA){ kpair=new KeyPairRSA(jsch); } else if(type==ECDSA){ kpair=new KeyPairECDSA(jsch); }
public byte[] forSSHAgent() throws JSchException { if(isEncrypted()){ throw new JSchException("key is encrypted."); } Buffer buf = new Buffer(); buf.putString(sshdss); buf.putString(P_array); buf.putString(Q_array); buf.putString(G_array); buf.putString(pub_array); buf.putString(prv_array); buf.putString(Util.str2byte(publicKeyComment)); byte[] result = new byte[buf.getLength()]; buf.getByte(result, 0, result.length); return result; }
public Signature getVerifier(){ try{ Class c=Class.forName((String)jsch.getConfig("signature.dss")); SignatureDSA dsa=(SignatureDSA)(c.newInstance()); dsa.init(); if(pub_array == null && P_array == null && getPublicKeyBlob()!=null){ Buffer buf = new Buffer(getPublicKeyBlob()); buf.getString(); P_array = buf.getString(); Q_array = buf.getString(); G_array = buf.getString(); pub_array = buf.getString(); } dsa.setPubKey(pub_array, P_array, Q_array, G_array); return dsa; } catch(Exception e){ //System.err.println("e "+e); } return null; }
byte[] getPrivateKey(){ int content= 1+countLength(1) + 1 + // INTEGER 1+countLength(P_array.length) + P_array.length + // INTEGER P 1+countLength(Q_array.length) + Q_array.length + // INTEGER Q 1+countLength(G_array.length) + G_array.length + // INTEGER G 1+countLength(pub_array.length) + pub_array.length + // INTEGER pub 1+countLength(prv_array.length) + prv_array.length; // INTEGER prv int total= 1+countLength(content)+content; // SEQUENCE byte[] plain=new byte[total]; int index=0; index=writeSEQUENCE(plain, index, content); index=writeINTEGER(plain, index, new byte[1]); // 0 index=writeINTEGER(plain, index, P_array); index=writeINTEGER(plain, index, Q_array); index=writeINTEGER(plain, index, G_array); index=writeINTEGER(plain, index, pub_array); index=writeINTEGER(plain, index, prv_array); return plain; }
static KeyPair fromSSHAgent(JSch jsch, Buffer buf) throws JSchException { byte[][] tmp = buf.getBytes(7, "invalid key format"); byte[] P_array = tmp[1]; byte[] Q_array = tmp[2]; byte[] G_array = tmp[3]; byte[] pub_array = tmp[4]; byte[] prv_array = tmp[5]; KeyPairDSA kpair = new KeyPairDSA(jsch, P_array, Q_array, G_array, pub_array, prv_array); kpair.publicKeyComment = new String(tmp[6]); kpair.vendor=VENDOR_OPENSSH; return kpair; }
toByteArray(); KeyPairDSA _key = new KeyPairDSA(jsch, P_array, Q_array, G_array, pub_array, prv_array); plain = _key.getPrivateKey(); _kpair = new KeyPairDSA(jsch); _kpair.copy(this); if(_kpair.parse(plain)){
kpair=KeyPairDSA.fromSSHAgent(jsch, buf); if(type==DSA){ kpair=new KeyPairDSA(jsch); } else if(type==RSA){ kpair=new KeyPairRSA(jsch); } else if(type==ECDSA){ kpair=new KeyPairECDSA(jsch); }
public byte[] forSSHAgent() throws JSchException { if(isEncrypted()){ throw new JSchException("key is encrypted."); } Buffer buf = new Buffer(); buf.putString(sshdss); buf.putString(P_array); buf.putString(Q_array); buf.putString(G_array); buf.putString(pub_array); buf.putString(prv_array); buf.putString(Util.str2byte(publicKeyComment)); byte[] result = new byte[buf.getLength()]; buf.getByte(result, 0, result.length); return result; }
public Signature getVerifier(){ try{ Class c=Class.forName((String)jsch.getConfig("signature.dss")); SignatureDSA dsa=(SignatureDSA)(c.newInstance()); dsa.init(); if(pub_array == null && P_array == null && getPublicKeyBlob()!=null){ Buffer buf = new Buffer(getPublicKeyBlob()); buf.getString(); P_array = buf.getString(); Q_array = buf.getString(); G_array = buf.getString(); pub_array = buf.getString(); } dsa.setPubKey(pub_array, P_array, Q_array, G_array); return dsa; } catch(Exception e){ //System.err.println("e "+e); } return null; }
byte[] getPrivateKey(){ int content= 1+countLength(1) + 1 + // INTEGER 1+countLength(P_array.length) + P_array.length + // INTEGER P 1+countLength(Q_array.length) + Q_array.length + // INTEGER Q 1+countLength(G_array.length) + G_array.length + // INTEGER G 1+countLength(pub_array.length) + pub_array.length + // INTEGER pub 1+countLength(prv_array.length) + prv_array.length; // INTEGER prv int total= 1+countLength(content)+content; // SEQUENCE byte[] plain=new byte[total]; int index=0; index=writeSEQUENCE(plain, index, content); index=writeINTEGER(plain, index, new byte[1]); // 0 index=writeINTEGER(plain, index, P_array); index=writeINTEGER(plain, index, Q_array); index=writeINTEGER(plain, index, G_array); index=writeINTEGER(plain, index, pub_array); index=writeINTEGER(plain, index, prv_array); return plain; }
static KeyPair fromSSHAgent(JSch jsch, Buffer buf) throws JSchException { byte[][] tmp = buf.getBytes(7, "invalid key format"); byte[] P_array = tmp[1]; byte[] Q_array = tmp[2]; byte[] G_array = tmp[3]; byte[] pub_array = tmp[4]; byte[] prv_array = tmp[5]; KeyPairDSA kpair = new KeyPairDSA(jsch, P_array, Q_array, G_array, pub_array, prv_array); kpair.publicKeyComment = new String(tmp[6]); kpair.vendor=VENDOR_OPENSSH; return kpair; }
toByteArray(); KeyPairDSA _key = new KeyPairDSA(jsch, P_array, Q_array, G_array, pub_array, prv_array); plain = _key.getPrivateKey(); _kpair = new KeyPairDSA(jsch); _kpair.copy(this); if(_kpair.parse(plain)){
kpair = KeyPairRSA.fromSSHAgent(buf); } else if (_type.equals("ssh-dss")) { kpair = KeyPairDSA.fromSSHAgent(buf); } else if (_type.equals("ecdsa-sha2-nistp256") || _type.equals("ecdsa-sha2-nistp384") || kpair = new KeyPairDSA(); } else if (type == RSA) { kpair = new KeyPairRSA();