diff options
author | Kenny Root <kenny@the-b.org> | 2015-10-08 09:47:55 -0700 |
---|---|---|
committer | Kenny Root <kenny@the-b.org> | 2015-10-08 09:47:56 -0700 |
commit | 0c73789e89238324ddcb233bda972c48ac94a1e2 (patch) | |
tree | 29adf3e8b356acbd868f41deeb7592f40ce653ec | |
parent | 08ab36bc773b1c270585d8020a65d6cd5e84a207 (diff) | |
download | sshlib-0c73789e89238324ddcb233bda972c48ac94a1e2.tar.gz sshlib-0c73789e89238324ddcb233bda972c48ac94a1e2.tar.bz2 sshlib-0c73789e89238324ddcb233bda972c48ac94a1e2.zip |
Remove the authenticateWithDSA method
This has been deprecated for quite a while and using DSA should be
discouraged.
-rw-r--r-- | sshlib/src/main/java/com/trilead/ssh2/Connection.java | 59 |
1 files changed, 0 insertions, 59 deletions
diff --git a/sshlib/src/main/java/com/trilead/ssh2/Connection.java b/sshlib/src/main/java/com/trilead/ssh2/Connection.java index 1f605e0..efb84b8 100644 --- a/sshlib/src/main/java/com/trilead/ssh2/Connection.java +++ b/sshlib/src/main/java/com/trilead/ssh2/Connection.java @@ -9,8 +9,6 @@ import java.net.InetSocketAddress; import java.net.SocketTimeoutException; import java.security.KeyPair; import java.security.SecureRandom; -import java.security.Security; -import java.util.Set; import java.util.Vector; import com.trilead.ssh2.auth.AuthenticationManager; @@ -139,63 +137,6 @@ public class Connection } /** - * After a successful connect, one has to authenticate oneself. This method - * is based on DSA (it uses DSA to sign a challenge sent by the server). - * <p> - * If the authentication phase is complete, <code>true</code> will be - * returned. If the server does not accept the request (or if further - * authentication steps are needed), <code>false</code> is returned and - * one can retry either by using this or any other authentication method - * (use the <code>getRemainingAuthMethods</code> method to get a list of - * the remaining possible methods). - * - * @param user - * A <code>String</code> holding the username. - * @param pem - * A <code>String</code> containing the DSA private key of the - * user in OpenSSH key format (PEM, you can't miss the - * "-----BEGIN DSA PRIVATE KEY-----" tag). The string may contain - * linefeeds. - * @param password - * If the PEM string is 3DES encrypted ("DES-EDE3-CBC"), then you - * must specify the password. Otherwise, this argument will be - * ignored and can be set to <code>null</code>. - * - * @return whether the connection is now authenticated. - * @throws IOException - * - * @deprecated You should use one of the - * {@link #authenticateWithPublicKey(String, File, String) authenticateWithPublicKey()} - * methods, this method is just a wrapper for it and will - * disappear in future builds. - * - */ - public synchronized boolean authenticateWithDSA(String user, String pem, String password) throws IOException - { - if (tm == null) - throw new IllegalStateException("Connection is not established!"); - - if (authenticated) - throw new IllegalStateException("Connection is already authenticated!"); - - if (am == null) - am = new AuthenticationManager(tm); - - if (cm == null) - cm = new ChannelManager(tm); - - if (user == null) - throw new IllegalArgumentException("user argument is null"); - - if (pem == null) - throw new IllegalArgumentException("pem argument is null"); - - authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND()); - - return authenticated; - } - - /** * A wrapper that calls * {@link #authenticateWithKeyboardInteractive(String, String[], InteractiveCallback) * authenticateWithKeyboardInteractivewith} a <code>null</code> submethod |