--- /dev/null
+/*
+ * Copyright (c) 2017 Brocade Communication Systems and others. All rights reserved.
+ *
+ * This program and the accompanying materials are made available under the
+ * terms of the Eclipse Public License v1.0 which accompanies this distribution,
+ * and is available at http://www.eclipse.org/legal/epl-v10.html
+ */
+package org.opendaylight.netconf.nettyutil.handler.ssh.authentication;
+
+import com.google.common.base.Strings;
+import java.io.IOException;
+import java.security.KeyPair;
+import org.apache.sshd.ClientSession;
+import org.apache.sshd.client.future.AuthFuture;
+import org.opendaylight.aaa.encrypt.AAAEncryptionService;
+import org.opendaylight.aaa.encrypt.PKIUtil;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+/**
+ * Represents Auth information for the public key based authentication for netconf.
+ */
+public class PublicKeyAuth extends LoginPassword {
+ private KeyPair keyPair = null;
+ private static final Logger LOG = LoggerFactory.getLogger(PublicKeyAuth.class);
+
+ public PublicKeyAuth(String username, String password, String keyPath,
+ String passPhrase, AAAEncryptionService encryptionService) {
+ super(username, password, encryptionService);
+ try {
+ boolean isKeyPathAbsent = Strings.isNullOrEmpty(keyPath);
+ passPhrase = Strings.isNullOrEmpty(passPhrase) ? "" : passPhrase;
+ if (!isKeyPathAbsent) {
+ this.keyPair = new PKIUtil().decodePrivateKey(keyPath, passPhrase);
+ } else {
+ LOG.info("Private key path not specified in the config file.");
+ }
+ } catch (IOException ioEx) {
+ LOG.warn("Not able to read the private key and passphrase for netconf client", ioEx);
+ }
+ }
+
+ @Override
+ public AuthFuture authenticate(final ClientSession session) throws IOException {
+ if (keyPair != null) {
+ session.addPublicKeyIdentity(keyPair);
+ }
+
+ return super.authenticate(session);
+ }
+}