forked from qt-creator/qt-creator
SSH: Produce "mixed" key files by default.
I.e. the private key in PKCS8 format, the public key in a format suitable for OpenSSH's authorized_keys file. Seems like the most pragmatic solution for now. Change-Id: I02d9bf4d98d836d9fc33453bff0b3f4834e7e173 Reviewed-on: http://codereview.qt.nokia.com/2350 Reviewed-by: Christian Kandeler <christian.kandeler@nokia.com>
This commit is contained in:
@@ -52,17 +52,13 @@ namespace Utils {
|
||||
using namespace Botan;
|
||||
using namespace Internal;
|
||||
|
||||
SshKeyGenerator::SshKeyGenerator()
|
||||
: m_type(Rsa)
|
||||
, m_format(OpenSsl)
|
||||
SshKeyGenerator::SshKeyGenerator() : m_type(Rsa)
|
||||
{
|
||||
}
|
||||
|
||||
bool SshKeyGenerator::generateKeys(KeyType type, PrivateKeyFormat format,
|
||||
int keySize)
|
||||
bool SshKeyGenerator::generateKeys(KeyType type, PrivateKeyFormat format, int keySize)
|
||||
{
|
||||
m_type = type;
|
||||
m_format = format;
|
||||
|
||||
try {
|
||||
AutoSeeded_RNG rng;
|
||||
@@ -70,24 +66,33 @@ bool SshKeyGenerator::generateKeys(KeyType type, PrivateKeyFormat format,
|
||||
if (m_type == Rsa)
|
||||
key = KeyPtr(new RSA_PrivateKey(rng, keySize));
|
||||
else
|
||||
key = KeyPtr(new DSA_PrivateKey(rng, DL_Group(rng, DL_Group::DSA_Kosherizer,
|
||||
keySize)));
|
||||
return m_format == Pkcs8
|
||||
? generatePkcs8Keys(key) : generateOpenSslKeys(key);
|
||||
key = KeyPtr(new DSA_PrivateKey(rng, DL_Group(rng, DL_Group::DSA_Kosherizer, keySize)));
|
||||
switch (format) {
|
||||
case Pkcs8:
|
||||
generatePkcs8KeyStrings(key);
|
||||
break;
|
||||
case OpenSsl:
|
||||
generateOpenSslKeyStrings(key);
|
||||
break;
|
||||
case Mixed:
|
||||
default:
|
||||
generatePkcs8KeyString(key, true);
|
||||
generateOpenSslPublicKeyString(key);
|
||||
}
|
||||
return true;
|
||||
} catch (Botan::Exception &e) {
|
||||
m_error = tr("Error generating key: %1").arg(e.what());
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
||||
bool SshKeyGenerator::generatePkcs8Keys(const KeyPtr &key)
|
||||
void SshKeyGenerator::generatePkcs8KeyStrings(const KeyPtr &key)
|
||||
{
|
||||
generatePkcs8Key(key, false);
|
||||
generatePkcs8Key(key, true);
|
||||
return true;
|
||||
generatePkcs8KeyString(key, false);
|
||||
generatePkcs8KeyString(key, true);
|
||||
}
|
||||
|
||||
void SshKeyGenerator::generatePkcs8Key(const KeyPtr &key, bool privateKey)
|
||||
void SshKeyGenerator::generatePkcs8KeyString(const KeyPtr &key, bool privateKey)
|
||||
{
|
||||
Pipe pipe;
|
||||
pipe.start_msg();
|
||||
@@ -105,45 +110,61 @@ void SshKeyGenerator::generatePkcs8Key(const KeyPtr &key, bool privateKey)
|
||||
pipe.message_count() - 1);
|
||||
}
|
||||
|
||||
bool SshKeyGenerator::generateOpenSslKeys(const KeyPtr &key)
|
||||
void SshKeyGenerator::generateOpenSslKeyStrings(const KeyPtr &key)
|
||||
{
|
||||
QList<BigInt> publicParams;
|
||||
QList<BigInt> allParams;
|
||||
generateOpenSslPublicKeyString(key);
|
||||
generateOpenSslPrivateKeyString(key);
|
||||
}
|
||||
|
||||
void SshKeyGenerator::generateOpenSslPublicKeyString(const KeyPtr &key)
|
||||
{
|
||||
QList<BigInt> params;
|
||||
QByteArray keyId;
|
||||
if (m_type == Rsa) {
|
||||
const QSharedPointer<RSA_PrivateKey> rsaKey
|
||||
= key.dynamicCast<RSA_PrivateKey>();
|
||||
publicParams << rsaKey->get_e() << rsaKey->get_n();
|
||||
allParams << rsaKey->get_n() << rsaKey->get_e() << rsaKey->get_d()
|
||||
<< rsaKey->get_p() << rsaKey->get_q();
|
||||
const QSharedPointer<RSA_PrivateKey> rsaKey = key.dynamicCast<RSA_PrivateKey>();
|
||||
params << rsaKey->get_e() << rsaKey->get_n();
|
||||
keyId = SshCapabilities::PubKeyRsa;
|
||||
} else {
|
||||
const QSharedPointer<DSA_PrivateKey> dsaKey
|
||||
= key.dynamicCast<DSA_PrivateKey>();
|
||||
publicParams << dsaKey->group_p() << dsaKey->group_q()
|
||||
<< dsaKey->group_g() << dsaKey->get_y();
|
||||
allParams << publicParams << dsaKey->get_x();
|
||||
const QSharedPointer<DSA_PrivateKey> dsaKey = key.dynamicCast<DSA_PrivateKey>();
|
||||
params << dsaKey->group_p() << dsaKey->group_q() << dsaKey->group_g() << dsaKey->get_y();
|
||||
keyId = SshCapabilities::PubKeyDss;
|
||||
}
|
||||
|
||||
QByteArray publicKeyBlob = AbstractSshPacket::encodeString(keyId);
|
||||
foreach (const BigInt &b, publicParams)
|
||||
foreach (const BigInt &b, params)
|
||||
publicKeyBlob += AbstractSshPacket::encodeMpInt(b);
|
||||
publicKeyBlob = publicKeyBlob.toBase64();
|
||||
const QByteArray id = "QtCreator/"
|
||||
+ QDateTime::currentDateTime().toString(Qt::ISODate).toUtf8();
|
||||
m_publicKey = keyId + ' ' + publicKeyBlob + ' ' + id;
|
||||
}
|
||||
|
||||
void SshKeyGenerator::generateOpenSslPrivateKeyString(const KeyPtr &key)
|
||||
{
|
||||
QList<BigInt> params;
|
||||
QByteArray keyId;
|
||||
const char *label;
|
||||
if (m_type == Rsa) {
|
||||
const QSharedPointer<RSA_PrivateKey> rsaKey
|
||||
= key.dynamicCast<RSA_PrivateKey>();
|
||||
params << rsaKey->get_n() << rsaKey->get_e() << rsaKey->get_d() << rsaKey->get_p()
|
||||
<< rsaKey->get_q();
|
||||
keyId = SshCapabilities::PubKeyRsa;
|
||||
label = "RSA PRIVATE KEY";
|
||||
} else {
|
||||
const QSharedPointer<DSA_PrivateKey> dsaKey = key.dynamicCast<DSA_PrivateKey>();
|
||||
params << dsaKey->group_p() << dsaKey->group_q() << dsaKey->group_g() << dsaKey->get_y()
|
||||
<< dsaKey->get_x();
|
||||
keyId = SshCapabilities::PubKeyDss;
|
||||
label = "DSA PRIVATE KEY";
|
||||
}
|
||||
|
||||
DER_Encoder encoder;
|
||||
encoder.start_cons(SEQUENCE).encode (0U);
|
||||
foreach (const BigInt &b, allParams)
|
||||
encoder.start_cons(SEQUENCE).encode(0U);
|
||||
foreach (const BigInt &b, params)
|
||||
encoder.encode(b);
|
||||
encoder.end_cons();
|
||||
const char * const label
|
||||
= m_type == Rsa ? "RSA PRIVATE KEY" : "DSA PRIVATE KEY";
|
||||
m_privateKey
|
||||
= QByteArray(PEM_Code::encode (encoder.get_contents(), label).c_str());
|
||||
return true;
|
||||
m_privateKey = QByteArray(PEM_Code::encode (encoder.get_contents(), label).c_str());
|
||||
}
|
||||
|
||||
} // namespace Utils
|
||||
|
||||
Reference in New Issue
Block a user