SSH.java 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654
  1. package de.tudarmstadt.informatik.hostage.protocol;
  2. import java.io.IOException;
  3. import java.math.BigInteger;
  4. import java.nio.ByteBuffer;
  5. import java.security.SecureRandom;
  6. import java.util.ArrayList;
  7. import java.util.List;
  8. import de.tudarmstadt.informatik.hostage.commons.HelperUtils;
  9. import de.tudarmstadt.informatik.hostage.ssh.crypto.KeyMaterial;
  10. import de.tudarmstadt.informatik.hostage.ssh.crypto.PEMDecoder;
  11. import de.tudarmstadt.informatik.hostage.ssh.crypto.cipher.CBCMode;
  12. import de.tudarmstadt.informatik.hostage.ssh.crypto.cipher.DESede;
  13. import de.tudarmstadt.informatik.hostage.ssh.crypto.dh.DhExchange;
  14. import de.tudarmstadt.informatik.hostage.ssh.crypto.digest.MAC;
  15. import de.tudarmstadt.informatik.hostage.ssh.signature.DSAPrivateKey;
  16. import de.tudarmstadt.informatik.hostage.ssh.signature.DSASHA1Verify;
  17. import de.tudarmstadt.informatik.hostage.ssh.signature.DSASignature;
  18. import de.tudarmstadt.informatik.hostage.ssh.util.TypesReader;
  19. import de.tudarmstadt.informatik.hostage.ssh.util.TypesWriter;
  20. import de.tudarmstadt.informatik.hostage.wrapper.Packet;
  21. /**
  22. * SSH protocol. Implementation of RFC documents 4250, 4251, 4252, 4253, 4254.
  23. * It can handle the following requests: Server Protocol, Key Exchange Init,
  24. * Diffie-Hellman Key Exchange Init, New Keys, Service Request, Connection
  25. * Request, Channel Open Request, Channel Request.
  26. *
  27. * @author Wulf Pfeiffer
  28. */
  29. public class SSH implements Protocol {
  30. /**
  31. * Represents the states of the protocol.
  32. */
  33. private enum STATE {
  34. NONE, SERVER_VERSION, CLIENT_VERSION, KEX_INIT, NEW_KEYS, USERAUTH, CONNECTION, CHANNEL, TERMINAL_CMD, TERMINAL_ENTER, CLOSED
  35. }
  36. /**
  37. * Converts a byte[] to int
  38. *
  39. * @param bytes
  40. * that are converted
  41. * @return converted byte[] as int
  42. */
  43. private int byteToInt(byte[] bytes) {
  44. int convertedInteger = 0;
  45. for (int i = 0; i < bytes.length; i++) {
  46. convertedInteger <<= 8;
  47. convertedInteger |= bytes[i] & 0xFF;
  48. }
  49. return convertedInteger;
  50. }
  51. private String initSshType() {
  52. SecureRandom rnd = new SecureRandom();
  53. int majorVersion = rnd.nextInt(possibleSshTypes.length);
  54. return "OpenSSH_"
  55. + possibleSshTypes[majorVersion][0][0]
  56. + possibleSshTypes[majorVersion][1][rnd
  57. .nextInt(possibleSshTypes[majorVersion][1].length)];
  58. }
  59. /**
  60. * Denotes in which state the protocol is right now.
  61. */
  62. private STATE state = STATE.NONE;
  63. private boolean useEncryption = false;
  64. // version stuff
  65. private String[][][] possibleSshTypes = {
  66. { { "3." }, { "4", "5", "6", "7", "8", "9" } },
  67. { { "4." }, { "0", "1", "2", "3", "4", "5", "6", "7", "9" } },
  68. { { "5." }, { "0", "1", "2", "3", "4", "5", "6", "7", "8", "9" } },
  69. { { "6." }, { "0", "1", "2", "3", "4" } } };
  70. // server infos
  71. private String serverVersion = "SSH-2.0-";
  72. private String serverType = initSshType();
  73. private String serverName = HelperUtils.getRandomString(16, false);
  74. private int packetNumber = 0;
  75. private int recipientChannel;
  76. private String userName;
  77. private String terminalPrefix;
  78. private StringBuffer command = new StringBuffer();
  79. private SecureRandom random = new SecureRandom();
  80. // SSH Parameters for Kex etc.
  81. private byte[] V_S = (serverVersion + serverType).getBytes();
  82. private byte[] V_C;
  83. private byte[] I_S;
  84. private byte[] I_C;
  85. private byte[] e;
  86. private BigInteger f;
  87. private byte[] h;
  88. private BigInteger k;
  89. private byte[] K_S;
  90. private byte[] signature;
  91. // allowed algorithms for kexinit
  92. private static final String KEX_ALG = "diffie-hellman-group1-sha1";
  93. private static final String SERVER_ALG = "ssh-dss";
  94. private static final String ENCRYPT_ALG_C = "3des-cbc";
  95. private static final String ENCRYPT_ALG_S = "3des-cbc";
  96. private static final String MAC_ALG_C = "hmac-sha1";
  97. private static final String MAC_ALG_S = "hmac-sha1";
  98. private static final String COMP_ALG_C = "none";
  99. private static final String COMP_ALG_S = "none";
  100. private int cipherBlockSize = 16;
  101. // for en- and decryption
  102. private DESede desEncryption;
  103. private DESede desDecryption;
  104. private CBCMode cbcEncryption;
  105. private CBCMode cbcDecryption;
  106. private MAC macEncryption;
  107. // private MAC macDec;
  108. // dsa private key
  109. private final char[] dsaPem = ("-----BEGIN DSA PRIVATE KEY-----\n"
  110. + "MIIBugIBAAKBgQCDZ9R2vfCPwjv5vKF1igIv9drrZ7G0dhMkGT9AZTjgI34Qm4w0\n"
  111. + "0iWeCqO7SmqiaMIjbRIm91MeDed4ObAq4sAkqRE/2P4mTbzFx5KhEczRRiDoqQBX\n"
  112. + "xYa0yWKJpeZ94SGM6DEPuBTxKo0T4uMjbq2FzHL2FXT1/WoNCmRU6gFSiwIVAMK4\n"
  113. + "Epz3JiwDUbkSpLOjIqtEhJmVAoGAL6zlXRI4Q8iwvSDh0vDf1j9a5Aaaq+93LTjK\n"
  114. + "SwL4nvUWBl2Aa0vqu05ZS5rOD1I+/naLMg0fNgFJRhA03sl+12MI3a2HXJWXRSdj\n"
  115. + "m1Vq9cUXqiYrX6+iGfEaA/y9UO4ZPF6if6eLypXB8VuqjtjDCiMMsM6+qQki7L71\n"
  116. + "yN4M75ICgYAcFXUhN2zRug3JvwmGxW8gMgHquSiBnbx1582KGh2B/ukE/kOrbKYD\n"
  117. + "HUkBzolcm4x1Odq5apowlriFxY6zMQP615plIK4x9NaU6dvc/HoTkjzT5EYSMN39\n"
  118. + "eAGufJ0jrtIpKL4lP8o8yrAHfmbR7bjecWc0viTH0+OWlyVsex/bZAIUEKn310Li\n"
  119. + "v62Zs4hlDvhwvx8MQ+A=\n" + "-----END DSA PRIVATE KEY-----")
  120. .toCharArray();
  121. @Override
  122. public int getPort() {
  123. return 22;
  124. }
  125. @Override
  126. public boolean isClosed() {
  127. return (state == STATE.CLOSED);
  128. }
  129. @Override
  130. public boolean isSecure() {
  131. return false;
  132. }
  133. @Override
  134. public List<Packet> processMessage(Packet requestPacket) {
  135. List<Packet> responsePackets = new ArrayList<Packet>();
  136. byte[] request = null;
  137. if (requestPacket != null) {
  138. request = requestPacket.getBytes();
  139. if (useEncryption) {
  140. request = decryptBytes(request);
  141. }
  142. }
  143. switch (state) {
  144. case NONE:
  145. responsePackets
  146. .add(new Packet(serverVersion + serverType + "\r\n", toString()));
  147. responsePackets.add(kexInit());
  148. state = STATE.SERVER_VERSION;
  149. break;
  150. case SERVER_VERSION:
  151. extractType(request);
  152. extractPayload(request);
  153. extractPubKey(request);
  154. responsePackets.add(dhKexReply());
  155. state = STATE.KEX_INIT;
  156. break;
  157. case CLIENT_VERSION:
  158. responsePackets.add(dhKexReply());
  159. state = STATE.KEX_INIT;
  160. break;
  161. case KEX_INIT:
  162. responsePackets.add(newKeys());
  163. useEncryption = true;
  164. state = STATE.NEW_KEYS;
  165. break;
  166. case NEW_KEYS:
  167. responsePackets.add(serviceReply(request));
  168. state = STATE.USERAUTH;
  169. break;
  170. case USERAUTH:
  171. responsePackets.add(connectionReply(request));
  172. state = STATE.CONNECTION;
  173. break;
  174. case CONNECTION:
  175. responsePackets.add(channelOpenReply(request));
  176. state = STATE.CHANNEL;
  177. break;
  178. case CHANNEL:
  179. responsePackets.add(channelSuccessReply(request));
  180. responsePackets.add(terminalPrefix());
  181. state = STATE.TERMINAL_CMD;
  182. break;
  183. case TERMINAL_CMD:
  184. responsePackets.add(terminalReply(request));
  185. break;
  186. case CLOSED:
  187. break;
  188. default:
  189. state = STATE.CLOSED;
  190. break;
  191. }
  192. return responsePackets;
  193. }
  194. @Override
  195. public String toString() {
  196. return "SSH";
  197. }
  198. @Override
  199. public TALK_FIRST whoTalksFirst() {
  200. return TALK_FIRST.CLIENT;
  201. }
  202. /**
  203. * Channel Open Reply.
  204. *
  205. * @param request
  206. * from client.
  207. * @return Channel Open Reply.
  208. */
  209. private Packet channelOpenReply(byte[] request) {
  210. if (!(HelperUtils.byteToStr(request).contains("session"))) {
  211. return disconnectReply(2); // if contains "session" ok else disc
  212. }
  213. TypesReader tr = new TypesReader(request, 6);
  214. TypesWriter tw = new TypesWriter();
  215. try {
  216. tr.readString();
  217. recipientChannel = tr.readUINT32();
  218. int senderChannel = recipientChannel;
  219. int initialWindowSize = tr.readUINT32();
  220. int maximumPacketSize = tr.readUINT32();
  221. tw.writeByte(0x5b); // msgcode
  222. tw.writeUINT32(recipientChannel);
  223. tw.writeUINT32(senderChannel);
  224. tw.writeUINT32(initialWindowSize);
  225. tw.writeUINT32(maximumPacketSize);
  226. } catch (IOException e) {
  227. e.printStackTrace();
  228. }
  229. return wrapPacket(tw.getBytes());
  230. }
  231. /**
  232. * Channel Success Reply.
  233. *
  234. * @param request
  235. * from client.
  236. * @return Channel Success Reply.
  237. */
  238. private Packet channelSuccessReply(byte[] request) {
  239. if (!(HelperUtils.byteToStr(request)).contains("pty-req")) {
  240. return disconnectReply(2);
  241. }
  242. TypesWriter tw = new TypesWriter();
  243. tw.writeByte(0x63); // msgcode
  244. tw.writeUINT32(recipientChannel);
  245. return wrapPacket(tw.getBytes());
  246. }
  247. /**
  248. * Userauth ssh-connection reply.
  249. *
  250. * @param request
  251. * from the client.
  252. * @return ssh-connection reply.
  253. */
  254. private Packet connectionReply(byte[] request) {
  255. if (request[5] != 0x32
  256. && !(HelperUtils.byteToStr(request).contains("ssh-connection"))) {
  257. return disconnectReply(14);// disconnect because its not
  258. // servicerequest ssh-connect
  259. }
  260. try {
  261. TypesReader tr = new TypesReader(request, 6);
  262. userName = tr.readString();
  263. terminalPrefix = "[" + userName + "@" + serverName + " ~]$ ";
  264. } catch (IOException e) {
  265. e.printStackTrace();
  266. }
  267. byte[] msgcode = { 0x34 };
  268. return wrapPacket(msgcode);
  269. }
  270. /**
  271. * Creates the SHA1 Mac with the given bytes.
  272. *
  273. * @param bytes
  274. * that are used for the Mac.
  275. * @return Mac.
  276. */
  277. private byte[] createMac(byte[] bytes) {
  278. byte[] mac = new byte[20];
  279. macEncryption.initMac(packetNumber);
  280. macEncryption.update(bytes, 0, bytes.length);
  281. macEncryption.getMac(mac, 0);
  282. return mac;
  283. }
  284. /**
  285. * Decrypts a request with triple DES.
  286. *
  287. * @param request
  288. * that is decrypted.
  289. * @return decrypted request.
  290. */
  291. private byte[] decryptBytes(byte[] request) {
  292. byte[] decryptedRequest = new byte[request.length
  293. - ((request.length % 8 == 0) ? 0 : 20)];
  294. for (int i = 0; i < decryptedRequest.length; i += 8) { // -12 wegen MAC
  295. cbcDecryption.transformBlock(request, i, decryptedRequest, i);
  296. }
  297. return decryptedRequest;
  298. }
  299. /**
  300. * Builds the Diffie-Hellman Kex Reply, containing the host key,f and the
  301. * signature.
  302. *
  303. * @return Diffie-Hellman Kex Reply packet.
  304. */
  305. private Packet dhKexReply() {
  306. byte[] response = null;
  307. try {
  308. DhExchange dhx = new DhExchange();
  309. dhx.serverInit(1, random);
  310. dhx.setE(new BigInteger(e));
  311. f = dhx.getF();
  312. DSAPrivateKey dsa = (DSAPrivateKey) PEMDecoder.decode(dsaPem, null);
  313. K_S = DSASHA1Verify.encodeSSHDSAPublicKey(dsa.getPublicKey());
  314. h = dhx.calculateH(V_C, V_S, I_C, I_S, K_S);
  315. k = dhx.getK();
  316. DSASignature ds = DSASHA1Verify.generateSignature(h, dsa, random);
  317. signature = DSASHA1Verify.encodeSSHDSASignature(ds);
  318. TypesWriter tw = new TypesWriter();
  319. tw.writeByte(31);
  320. tw.writeString(K_S, 0, K_S.length);
  321. tw.writeMPInt(f);
  322. tw.writeString(signature, 0, signature.length);
  323. response = tw.getBytes();
  324. // init for decryption and encryption
  325. KeyMaterial km = KeyMaterial.create("SHA1", h, k, h, 24, 8, 20, 24,
  326. 8, 20); // alg, h, k, keylength, blocklength, maclength,
  327. // keylength, blocklength, maclength
  328. desEncryption = new DESede();
  329. desDecryption = new DESede();
  330. desEncryption.init(true, km.enc_key_server_to_client);
  331. desDecryption.init(false, km.enc_key_client_to_server);
  332. cbcEncryption = new CBCMode(desEncryption,
  333. km.initial_iv_server_to_client, true);
  334. cbcDecryption = new CBCMode(desDecryption,
  335. km.initial_iv_client_to_server, false);
  336. macEncryption = new MAC("hmac-sha1",
  337. km.integrity_key_server_to_client);
  338. } catch (Exception e) {
  339. e.printStackTrace();
  340. }
  341. return wrapPacket(response);
  342. }
  343. /**
  344. * Disconnect Reply using the given number as reason code.
  345. *
  346. * @param reasonCode
  347. * for disconnect reply. Must be between 1 and 15, default is 2.
  348. * @return Disconnect Reply.
  349. */
  350. private Packet disconnectReply(int reasonCode) {
  351. TypesWriter tw = new TypesWriter();
  352. tw.writeByte(0x01);
  353. switch (reasonCode) {
  354. case 1:
  355. tw.writeUINT32(1);
  356. tw.writeString("SSH_DISCONNECT_HOST_NOT_ALLOWED_TO_CONNECT");
  357. break;
  358. case 7:
  359. tw.writeUINT32(7);
  360. tw.writeString("SSH_DISCONNECT_SERVICE_NOT_AVAILABLE");
  361. break;
  362. case 14:
  363. tw.writeUINT32(14);
  364. tw.writeString("SSH_DISCONNECT_NO_MORE_AUTH_METHODS_AVAILABLE");
  365. break;
  366. default:
  367. tw.writeUINT32(2);
  368. tw.writeString("SSH_DISCONNECT_PROTOCOL_ERROR");
  369. break;
  370. }
  371. return wrapPacket(tw.getBytes());
  372. }
  373. /**
  374. * Encrypts a request with triple DES.
  375. *
  376. * @param request
  377. * that is encrypted.
  378. * @return encrypted request.
  379. */
  380. private byte[] encryptBytes(byte[] bytes) {
  381. byte[] responseEncrypted = new byte[bytes.length];
  382. for (int i = 0; i < bytes.length; i += 8) {
  383. cbcEncryption.transformBlock(bytes, i, responseEncrypted, i);
  384. }
  385. return responseEncrypted;
  386. }
  387. /**
  388. * Extracts the payload of a packet and writes it in I_C.
  389. *
  390. * @param request
  391. * packet of which the payload is extracted.
  392. */
  393. private void extractPayload(byte[] request) {
  394. int position = 0;
  395. if (request[5] != 0x14) {
  396. position = 1;
  397. for (int i = 0; i < request.length; i++, position++) {
  398. if (request[i] == 0x0a)
  399. break;
  400. }
  401. }
  402. int packetLength = byteToInt(new byte[] { request[position],
  403. request[1 + position], request[2 + position],
  404. request[3 + position] });
  405. int paddingLength = byteToInt(new byte[] { request[4 + position] });
  406. byte[] payload = new byte[packetLength - paddingLength - 1];
  407. for (int i = 6; i < packetLength - paddingLength - 1; i++) {
  408. payload[i - 6] = request[i + position];
  409. }
  410. I_C = payload;
  411. System.out.println(HelperUtils.bytesToHexString(I_C));
  412. }
  413. /**
  414. * Extracts the public key from the DH Kex Request
  415. *
  416. * @param request
  417. * containing the clients public key
  418. */
  419. private void extractPubKey(byte[] request) {
  420. int packetLength = byteToInt(new byte[] { request[0],
  421. request[1], request[2],
  422. request[3] });
  423. int paddingLength = byteToInt(new byte[] { request[4] });
  424. byte[] len = new byte[] { request[2+packetLength + paddingLength], request[3+ packetLength + paddingLength], request[4 + paddingLength + packetLength],
  425. request[5 + packetLength + paddingLength] };
  426. e = new byte[byteToInt(len)];
  427. for (int i = 0; i < e.length; i++) {
  428. e[i] = request[i+packetLength + paddingLength+6];
  429. }
  430. }
  431. /**
  432. * Extracts the type of the client
  433. *
  434. * @param request
  435. * containing the clients type
  436. */
  437. private void extractType(byte[] request) {
  438. int length = 0;
  439. for (int i = 0; i < request.length; i++, length++) {
  440. if (request[i] == 0x0d)
  441. break; // find the end of the type: '\r'
  442. }
  443. V_C = new byte[length];
  444. System.arraycopy(request, 0, V_C, 0, length);
  445. }
  446. /**
  447. * Builds the Kex Init packet that contains all the allowed algorithms by
  448. * the server.
  449. *
  450. * @return Kex Init packet.
  451. */
  452. private Packet kexInit() {
  453. TypesWriter tw = new TypesWriter();
  454. tw.writeByte(0x14);
  455. tw.writeBytes(HelperUtils.randomBytes(16)); // cookie
  456. tw.writeString(KEX_ALG);
  457. tw.writeString(SERVER_ALG);
  458. tw.writeString(ENCRYPT_ALG_C);
  459. tw.writeString(ENCRYPT_ALG_S);
  460. tw.writeString(MAC_ALG_C);
  461. tw.writeString(MAC_ALG_S);
  462. tw.writeString(COMP_ALG_C);
  463. tw.writeString(COMP_ALG_S);
  464. tw.writeBytes(new byte[] { 0x00, 0x00, 0x00, 0x00 }); // language client
  465. // to server
  466. tw.writeBytes(new byte[] { 0x00, 0x00, 0x00, 0x00 }); // language server
  467. // to client
  468. tw.writeByte(0x00); // no guess from server
  469. tw.writeBytes(new byte[] { 0x00, 0x00, 0x00, 0x00 }); // reserved
  470. byte[] response = tw.getBytes();
  471. I_S = response;
  472. return wrapPacket(response);
  473. }
  474. /**
  475. * New Keys response.
  476. *
  477. * @return New Keys response.
  478. */
  479. private Packet newKeys() {
  480. byte[] msgCode = { 0x15 };
  481. return wrapPacket(msgCode);
  482. }
  483. /**
  484. * Service ssh-userauth reply.
  485. *
  486. * @param request
  487. * from the client.
  488. * @return Service reply.
  489. */
  490. private Packet serviceReply(byte[] request) {
  491. byte[] message;
  492. if (request[5] == 0x15) { // if newkeys request is included in the same
  493. // packet
  494. message = new byte[request.length - 16]; // remove it
  495. System.arraycopy(request, 16, message, 0, request.length - 16);
  496. } else {
  497. message = request;
  498. }
  499. if (message[5] != 0x05
  500. && !(HelperUtils.byteToStr(message).contains("ssh-userauth"))) {
  501. return disconnectReply(7); // disconnect because its not
  502. // servicerequest ssh-userauth
  503. }
  504. TypesWriter tw = new TypesWriter();
  505. tw.writeByte(0x06);
  506. tw.writeString("ssh-userauth");
  507. return wrapPacket(tw.getBytes());
  508. }
  509. /**
  510. * Returns the terminal prefix for the client.
  511. *
  512. * @return terminal prefix.
  513. */
  514. private Packet terminalPrefix() {
  515. TypesWriter tw = new TypesWriter();
  516. tw.writeByte(0x5e);
  517. tw.writeUINT32(recipientChannel);
  518. tw.writeString(terminalPrefix);
  519. return wrapPacket(tw.getBytes());
  520. }
  521. /**
  522. * Computes the reply for the client input.
  523. *
  524. * @param request
  525. * client input.
  526. * @return input reply.
  527. */
  528. private Packet terminalReply(byte[] request) {
  529. TypesReader tr = new TypesReader(request, 6);
  530. String message = "";
  531. try {
  532. tr.readUINT32();
  533. message = tr.readString();
  534. if (message.contains("\r")) {
  535. if (command.toString().contains("exit")) {
  536. state = STATE.CLOSED; // ugly style
  537. return disconnectReply(2);
  538. }
  539. message = "\r\nbash: " + command + " :command not found\r\n"
  540. + terminalPrefix;
  541. command = new StringBuffer();
  542. } else if (message.contains(new String(new char[] { '\u007F' }))
  543. && command.length() > 0) {
  544. command = command
  545. .delete(command.length() - 1, command.length());
  546. } else {
  547. command.append(message);
  548. }
  549. } catch (IOException e) {
  550. e.printStackTrace();
  551. }
  552. TypesWriter tw = new TypesWriter();
  553. tw.writeByte(0x5e); // msgcode
  554. tw.writeUINT32(recipientChannel);
  555. tw.writeString(message);
  556. return wrapPacket(tw.getBytes());
  557. }
  558. /**
  559. * Wraps the packets with packet length and padding.
  560. *
  561. * @param response
  562. * content that is wrapped.
  563. * @return wrapped packet.
  564. */
  565. private Packet wrapPacket(byte[] response) {
  566. // 4 byte packet length, 1 byte padding length, payload length
  567. int packetLength = 5 + response.length;
  568. int paddingLengthCBS = cipherBlockSize
  569. - (packetLength % cipherBlockSize);
  570. int paddingLength8 = 8 - (packetLength % 8);
  571. int paddingLength = paddingLengthCBS > paddingLength8 ? paddingLengthCBS
  572. : paddingLength8;
  573. if (paddingLength < 4)
  574. paddingLength += cipherBlockSize;
  575. // add padding string length to packet length
  576. packetLength = packetLength + paddingLength - 4;
  577. byte[] packetLen = ByteBuffer.allocate(4).putInt(packetLength).array();
  578. byte[] paddingLen = { (byte) paddingLength };
  579. byte[] paddingString = HelperUtils.randomBytes(paddingLength);
  580. byte[] wrappedResponse = HelperUtils.concat(packetLen, paddingLen,
  581. response, paddingString);
  582. if (useEncryption) {
  583. byte[] mac = createMac(wrappedResponse);
  584. byte[] responseEnc = encryptBytes(wrappedResponse);
  585. wrappedResponse = HelperUtils.concat(responseEnc, mac);
  586. }
  587. packetNumber++;
  588. return new Packet(wrappedResponse, toString());
  589. }
  590. }