Mercurial > 510Connectbot
diff src/ch/ethz/ssh2/crypto/dh/DhGroupExchange.java @ 273:91a31873c42a ganymed
start conversion from trilead to ganymed
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Fri, 18 Jul 2014 11:21:46 -0700 |
parents | |
children | 071eccdff8ea |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/src/ch/ethz/ssh2/crypto/dh/DhGroupExchange.java Fri Jul 18 11:21:46 2014 -0700 @@ -0,0 +1,115 @@ +/* + * Copyright (c) 2006-2011 Christian Plattner. All rights reserved. + * Please refer to the LICENSE.txt for licensing details. + */ +package ch.ethz.ssh2.crypto.dh; + +import java.io.IOException; +import java.math.BigInteger; +import java.security.SecureRandom; + +import ch.ethz.ssh2.DHGexParameters; +import ch.ethz.ssh2.crypto.digest.HashForSSH2Types; + +/** + * DhGroupExchange. + * + * @author Christian Plattner + * @version 2.50, 03/15/10 + */ +public class DhGroupExchange { + /* Given by the standard */ + + private BigInteger p; + private BigInteger g; + + /* Client public and private */ + + private BigInteger e; + private BigInteger x; + + /* Server public */ + + private BigInteger f; + + /* Shared secret */ + + private BigInteger k; + + public DhGroupExchange(BigInteger p, BigInteger g) { + this.p = p; + this.g = g; + } + + public void init(SecureRandom rnd) { + k = null; + + x = new BigInteger(p.bitLength() - 1, rnd); + e = g.modPow(x, p); + } + + /** + * @return Returns the e. + */ + public BigInteger getE() { + if(e == null) { + throw new IllegalStateException("Not initialized!"); + } + + return e; + } + + /** + * @return Returns the shared secret k. + */ + public BigInteger getK() { + if(k == null) { + throw new IllegalStateException("Shared secret not yet known, need f first!"); + } + + return k; + } + + /** + * Sets f and calculates the shared secret. + */ + public void setF(BigInteger f) { + if(e == null) { + throw new IllegalStateException("Not initialized!"); + } + + BigInteger zero = BigInteger.valueOf(0); + + if(zero.compareTo(f) >= 0 || p.compareTo(f) <= 0) { + throw new IllegalArgumentException("Invalid f specified!"); + } + + this.f = f; + this.k = f.modPow(x, p); + } + + public byte[] calculateH(byte[] clientversion, byte[] serverversion, byte[] clientKexPayload, + byte[] serverKexPayload, byte[] hostKey, DHGexParameters para) throws IOException { + HashForSSH2Types hash = new HashForSSH2Types("SHA1"); + + hash.updateByteString(clientversion); + hash.updateByteString(serverversion); + hash.updateByteString(clientKexPayload); + hash.updateByteString(serverKexPayload); + hash.updateByteString(hostKey); + if(para.getMin_group_len() > 0) { + hash.updateUINT32(para.getMin_group_len()); + } + hash.updateUINT32(para.getPref_group_len()); + if(para.getMax_group_len() > 0) { + hash.updateUINT32(para.getMax_group_len()); + } + hash.updateBigInt(p); + hash.updateBigInt(g); + hash.updateBigInt(e); + hash.updateBigInt(f); + hash.updateBigInt(k); + + return hash.getDigest(); + } +}