Mercurial > 510Connectbot
view src/com/trilead/ssh2/crypto/dh/EcDhExchange.java @ 132:265a4733edcb
read deployment.connections on startup for new host entries
author | Carl Byington <carl@five-ten-sg.com> |
---|---|
date | Thu, 19 Jun 2014 15:47:34 -0700 |
parents | 0ce5cc452d02 |
children |
line wrap: on
line source
/** * */ package com.trilead.ssh2.crypto.dh; import java.io.IOException; import java.math.BigInteger; import java.security.InvalidAlgorithmParameterException; import java.security.InvalidKeyException; import java.security.KeyFactory; import java.security.KeyPair; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.interfaces.ECPrivateKey; import java.security.interfaces.ECPublicKey; import java.security.spec.ECParameterSpec; import java.security.spec.ECPoint; import java.security.spec.ECPublicKeySpec; import java.security.spec.InvalidKeySpecException; import javax.crypto.KeyAgreement; import com.trilead.ssh2.signature.ECDSASHA2Verify; /** * @author kenny * */ public class EcDhExchange extends GenericDhExchange { private ECPrivateKey clientPrivate; private ECPublicKey clientPublic; private ECPublicKey serverPublic; @Override public void init(String name) throws IOException { final ECParameterSpec spec; if ("ecdh-sha2-nistp256".equals(name)) { spec = ECDSASHA2Verify.EllipticCurves.nistp256; } else if ("ecdh-sha2-nistp384".equals(name)) { spec = ECDSASHA2Verify.EllipticCurves.nistp384; } else if ("ecdh-sha2-nistp521".equals(name)) { spec = ECDSASHA2Verify.EllipticCurves.nistp521; } else { throw new IllegalArgumentException("Unknown EC curve " + name); } KeyPairGenerator kpg; try { kpg = KeyPairGenerator.getInstance("EC"); kpg.initialize(spec); KeyPair pair = kpg.generateKeyPair(); clientPrivate = (ECPrivateKey) pair.getPrivate(); clientPublic = (ECPublicKey) pair.getPublic(); } catch (NoSuchAlgorithmException e) { throw(IOException) new IOException("No DH keypair generator").initCause(e); } catch (InvalidAlgorithmParameterException e) { throw(IOException) new IOException("Invalid DH parameters").initCause(e); } } @Override public byte[] getE() { return ECDSASHA2Verify.encodeECPoint(clientPublic.getW(), clientPublic.getParams() .getCurve()); } @Override protected byte[] getServerE() { return ECDSASHA2Verify.encodeECPoint(serverPublic.getW(), serverPublic.getParams() .getCurve()); } @Override public void setF(byte[] f) throws IOException { if (clientPublic == null) throw new IllegalStateException("DhDsaExchange not initialized!"); final KeyAgreement ka; try { KeyFactory kf = KeyFactory.getInstance("EC"); ECParameterSpec params = clientPublic.getParams(); ECPoint serverPoint = ECDSASHA2Verify.decodeECPoint(f, params.getCurve()); this.serverPublic = (ECPublicKey) kf.generatePublic(new ECPublicKeySpec(serverPoint, params)); ka = KeyAgreement.getInstance("ECDH"); ka.init(clientPrivate); ka.doPhase(serverPublic, true); } catch (NoSuchAlgorithmException e) { throw(IOException) new IOException("No ECDH key agreement method").initCause(e); } catch (InvalidKeyException e) { throw(IOException) new IOException("Invalid ECDH key").initCause(e); } catch (InvalidKeySpecException e) { throw(IOException) new IOException("Invalid ECDH key").initCause(e); } sharedSecret = new BigInteger(ka.generateSecret()); } @Override public String getHashAlgo() { return ECDSASHA2Verify.getDigestAlgorithmForParams(clientPublic.getParams()); } }