/* -*-mode:java; c-basic-offset:2; indent-tabs-mode:nil -*- */ /* Copyright (c) 2002-2012 ymnk, JCraft,Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The names of the authors may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ package com.jcraft.jsch; import java.io.InputStream; import java.util.Vector; public class JSch{ /** * The version number. */ public static final String VERSION = "0.1.50"; static java.util.Hashtable config=new java.util.Hashtable(); static{ config.put("kex", "diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1"); config.put("server_host_key", "ssh-rsa,ssh-dss"); config.put("cipher.s2c", "aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-cbc,aes256-cbc"); config.put("cipher.c2s", "aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-cbc,aes256-cbc"); config.put("mac.s2c", "hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96"); config.put("mac.c2s", "hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96"); config.put("compression.s2c", "none"); config.put("compression.c2s", "none"); config.put("lang.s2c", ""); config.put("lang.c2s", ""); config.put("compression_level", "6"); config.put("diffie-hellman-group-exchange-sha1", "com.jcraft.jsch.DHGEX"); config.put("diffie-hellman-group1-sha1", "com.jcraft.jsch.DHG1"); config.put("diffie-hellman-group14-sha1", "com.jcraft.jsch.DHG14"); config.put("diffie-hellman-group-exchange-sha256", "com.jcraft.jsch.DHGEX256"); // avaibale since JDK1.4.2. config.put("dh", "com.jcraft.jsch.jce.DH"); config.put("3des-cbc", "com.jcraft.jsch.jce.TripleDESCBC"); config.put("blowfish-cbc", "com.jcraft.jsch.jce.BlowfishCBC"); config.put("hmac-sha1", "com.jcraft.jsch.jce.HMACSHA1"); config.put("hmac-sha1-96", "com.jcraft.jsch.jce.HMACSHA196"); config.put("hmac-sha2-256", "com.jcraft.jsch.jce.HMACSHA256"); // The "hmac-sha2-512" will require the key-length 2048 for DH, // but Sun's JCE has not allowed to use such a long key. //config.put("hmac-sha2-512", "com.jcraft.jsch.jce.HMACSHA512"); config.put("hmac-md5", "com.jcraft.jsch.jce.HMACMD5"); config.put("hmac-md5-96", "com.jcraft.jsch.jce.HMACMD596"); config.put("sha-1", "com.jcraft.jsch.jce.SHA1"); config.put("sha-256", "com.jcraft.jsch.jce.SHA256"); config.put("md5", "com.jcraft.jsch.jce.MD5"); config.put("signature.dss", "com.jcraft.jsch.jce.SignatureDSA"); config.put("signature.rsa", "com.jcraft.jsch.jce.SignatureRSA"); config.put("keypairgen.dsa", "com.jcraft.jsch.jce.KeyPairGenDSA"); config.put("keypairgen.rsa", "com.jcraft.jsch.jce.KeyPairGenRSA"); config.put("random", "com.jcraft.jsch.jce.Random"); config.put("none", "com.jcraft.jsch.CipherNone"); config.put("aes128-cbc", "com.jcraft.jsch.jce.AES128CBC"); config.put("aes192-cbc", "com.jcraft.jsch.jce.AES192CBC"); config.put("aes256-cbc", "com.jcraft.jsch.jce.AES256CBC"); config.put("aes128-ctr", "com.jcraft.jsch.jce.AES128CTR"); config.put("aes192-ctr", "com.jcraft.jsch.jce.AES192CTR"); config.put("aes256-ctr", "com.jcraft.jsch.jce.AES256CTR"); config.put("3des-ctr", "com.jcraft.jsch.jce.TripleDESCTR"); config.put("arcfour", "com.jcraft.jsch.jce.ARCFOUR"); config.put("arcfour128", "com.jcraft.jsch.jce.ARCFOUR128"); config.put("arcfour256", "com.jcraft.jsch.jce.ARCFOUR256"); config.put("userauth.none", "com.jcraft.jsch.UserAuthNone"); config.put("userauth.password", "com.jcraft.jsch.UserAuthPassword"); config.put("userauth.keyboard-interactive", "com.jcraft.jsch.UserAuthKeyboardInteractive"); config.put("userauth.publickey", "com.jcraft.jsch.UserAuthPublicKey"); config.put("userauth.gssapi-with-mic", "com.jcraft.jsch.UserAuthGSSAPIWithMIC"); config.put("gssapi-with-mic.krb5", "com.jcraft.jsch.jgss.GSSContextKrb5"); config.put("zlib", "com.jcraft.jsch.jcraft.Compression"); config.put("zlib@openssh.com", "com.jcraft.jsch.jcraft.Compression"); config.put("StrictHostKeyChecking", "ask"); config.put("HashKnownHosts", "no"); config.put("PreferredAuthentications", "gssapi-with-mic,publickey,keyboard-interactive,password"); config.put("CheckCiphers", "aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-ctr,arcfour,arcfour128,arcfour256"); config.put("CheckKexes", "diffie-hellman-group14-sha1"); config.put("MaxAuthTries", "6"); config.put("ClearAllForwardings", "no"); } private java.util.Vector sessionPool = new java.util.Vector(); private IdentityRepository defaultIdentityRepository = new LocalIdentityRepository(this); private IdentityRepository identityRepository = defaultIdentityRepository; private ConfigRepository configRepository = null; /** * Sets the identityRepository, which will be referred * in the public key authentication. * * @param identityRepository if null is given, * the default repository, which usually refers to ~/.ssh/, will be used. * * @see #getIdentityRepository() */ public synchronized void setIdentityRepository(IdentityRepository identityRepository){ if(identityRepository == null){ this.identityRepository = defaultIdentityRepository; } else{ this.identityRepository = identityRepository; } } public synchronized IdentityRepository getIdentityRepository(){ return this.identityRepository; } public ConfigRepository getConfigRepository() { return this.configRepository; } public void setConfigRepository(ConfigRepository configRepository) { this.configRepository = configRepository; } private HostKeyRepository known_hosts=null; private static final Logger DEVNULL=new Logger(){ public boolean isEnabled(int level){return false;} public void log(int level, String message){} }; static Logger logger=DEVNULL; public JSch(){ try{ String osname=(String)(System.getProperties().get("os.name")); if(osname!=null && osname.equals("Mac OS X")){ config.put("hmac-sha1", "com.jcraft.jsch.jcraft.HMACSHA1"); config.put("hmac-md5", "com.jcraft.jsch.jcraft.HMACMD5"); config.put("hmac-md5-96", "com.jcraft.jsch.jcraft.HMACMD596"); config.put("hmac-sha1-96", "com.jcraft.jsch.jcraft.HMACSHA196"); } } catch(Exception e){ } } /** * Instantiates the Session object with * host. The user name and port number will be retrieved from * ConfigRepository. If user name is not given, * the system property "user.name" will be referred. * * @param host hostname * * @throws JSchException * if username or host are invalid. * * @return the instance of Session class. * * @see #getSession(String username, String host, int port) * @see com.jcraft.jsch.Session * @see com.jcraft.jsch.ConfigRepository */ public Session getSession(String host) throws JSchException { return getSession(null, host, 22); } /** * Instantiates the Session object with * username and host. * The TCP port 22 will be used in making the connection. * Note that the TCP connection must not be established * until Session#connect(). * * @param username user name * @param host hostname * * @throws JSchException * if username or host are invalid. * * @return the instance of Session class. * * @see #getSession(String username, String host, int port) * @see com.jcraft.jsch.Session */ public Session getSession(String username, String host) throws JSchException { return getSession(username, host, 22); } /** * Instantiates the Session object with given * username, host and port. * Note that the TCP connection must not be established * until Session#connect(). * * @param username user name * @param host hostname * @param port port number * * @throws JSchException * if username or host are invalid. * * @return the instance of Session class. * * @see #getSession(String username, String host, int port) * @see com.jcraft.jsch.Session */ public Session getSession(String username, String host, int port) throws JSchException { if(host==null){ throw new JSchException("host must not be null."); } Session s = new Session(this, username, host, port); return s; } protected void addSession(Session session){ synchronized(sessionPool){ sessionPool.addElement(session); } } protected boolean removeSession(Session session){ synchronized(sessionPool){ return sessionPool.remove(session); } } /** * Sets the hostkey repository. * * @param hkrepo * * @see com.jcraft.jsch.HostKeyRepository * @see com.jcraft.jsch.KnownHosts */ public void setHostKeyRepository(HostKeyRepository hkrepo){ known_hosts=hkrepo; } /** * Sets the instance of KnownHosts, which refers * to filename. * * @param filename filename of known_hosts file. * * @throws JSchException * if the given filename is invalid. * * @see com.jcraft.jsch.KnownHosts */ public void setKnownHosts(String filename) throws JSchException{ if(known_hosts==null) known_hosts=new KnownHosts(this); if(known_hosts instanceof KnownHosts){ synchronized(known_hosts){ ((KnownHosts)known_hosts).setKnownHosts(filename); } } } /** * Sets the instance of KnownHosts generated with * stream. * * @param stream the instance of InputStream from known_hosts file. * * @throws JSchException * if an I/O error occurs. * * @see com.jcraft.jsch.KnownHosts */ public void setKnownHosts(InputStream stream) throws JSchException{ if(known_hosts==null) known_hosts=new KnownHosts(this); if(known_hosts instanceof KnownHosts){ synchronized(known_hosts){ ((KnownHosts)known_hosts).setKnownHosts(stream); } } } /** * Returns the current hostkey repository. * By the default, this method will the instance of KnownHosts. * * @return current hostkey repository. * * @see com.jcraft.jsch.HostKeyRepository * @see com.jcraft.jsch.KnownHosts */ public HostKeyRepository getHostKeyRepository(){ if(known_hosts==null) known_hosts=new KnownHosts(this); return known_hosts; } /** * Sets the private key, which will be referred in * the public key authentication. * * @param prvkey filename of the private key. * * @throws JSchException if prvkey is invalid. * * @see #addIdentity(String prvkey, String passphrase) */ public void addIdentity(String prvkey) throws JSchException{ addIdentity(prvkey, (byte[])null); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered with passphrase. * * @param prvkey filename of the private key. * @param passphrase passphrase for prvkey. * * @throws JSchException if passphrase is not right. * * @see #addIdentity(String prvkey, byte[] passphrase) */ public void addIdentity(String prvkey, String passphrase) throws JSchException{ byte[] _passphrase=null; if(passphrase!=null){ _passphrase=Util.str2byte(passphrase); } addIdentity(prvkey, _passphrase); if(_passphrase!=null) Util.bzero(_passphrase); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered with passphrase. * * @param prvkey filename of the private key. * @param passphrase passphrase for prvkey. * * @throws JSchException if passphrase is not right. * * @see #addIdentity(String prvkey, String pubkey, byte[] passphrase) */ public void addIdentity(String prvkey, byte[] passphrase) throws JSchException{ Identity identity=IdentityFile.newInstance(prvkey, null, this); addIdentity(identity, passphrase); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered with passphrase. * * @param prvkey filename of the private key. * @param pubkey filename of the public key. * @param passphrase passphrase for prvkey. * * @throws JSchException if passphrase is not right. */ public void addIdentity(String prvkey, String pubkey, byte[] passphrase) throws JSchException{ Identity identity=IdentityFile.newInstance(prvkey, pubkey, this); addIdentity(identity, passphrase); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered with passphrase. * * @param name name of the identity to be used to retrieve it in the identityRepository. * @param prvkey private key in byte array. * @param pubkey public key in byte array. * @param passphrase passphrase for prvkey. * */ public void addIdentity(String name, byte[]prvkey, byte[]pubkey, byte[] passphrase) throws JSchException{ Identity identity=IdentityFile.newInstance(name, prvkey, pubkey, this); addIdentity(identity, passphrase); } /** * Sets the private key, which will be referred in * the public key authentication. * Before registering it into identityRepository, * it will be deciphered with passphrase. * * @param identity private key. * @param passphrase passphrase for identity. * * @throws JSchException if passphrase is not right. */ public void addIdentity(Identity identity, byte[] passphrase) throws JSchException{ if(passphrase!=null){ try{ byte[] goo=new byte[passphrase.length]; System.arraycopy(passphrase, 0, goo, 0, passphrase.length); passphrase=goo; identity.setPassphrase(passphrase); } finally{ Util.bzero(passphrase); } } if(identityRepository instanceof LocalIdentityRepository){ ((LocalIdentityRepository)identityRepository).add(identity); } else if(identity instanceof IdentityFile && !identity.isEncrypted()) { identityRepository.add(((IdentityFile)identity).getKeyPair().forSSHAgent()); } else { synchronized(this){ if(!(identityRepository instanceof IdentityRepository.Wrapper)){ setIdentityRepository(new IdentityRepository.Wrapper(identityRepository)); } } ((IdentityRepository.Wrapper)identityRepository).add(identity); } } /** * @deprecated use #removeIdentity(Identity identity) */ public void removeIdentity(String name) throws JSchException{ Vector identities = identityRepository.getIdentities(); for(int i=0; iidentity is invalid. */ public void removeIdentity(Identity identity) throws JSchException{ identityRepository.remove(identity.getPublicKeyBlob()); } /** * Lists names of identities included in the identityRepository. * * @return names of identities * * @throws JSchException if identityReposory has problems. */ public Vector getIdentityNames() throws JSchException{ Vector foo=new Vector(); Vector identities = identityRepository.getIdentities(); for(int i=0; i