2013-12-16 18:45:37 +00:00
|
|
|
<?php
|
2013-12-17 17:43:37 +00:00
|
|
|
|
2013-12-16 18:45:37 +00:00
|
|
|
/**
|
2014-02-15 18:57:49 +00:00
|
|
|
* @author Marc Scholten <marc@pedigital.de>
|
2014-12-09 23:02:44 +00:00
|
|
|
* @copyright 2013 Marc Scholten
|
2014-02-15 18:57:49 +00:00
|
|
|
* @license http://www.opensource.org/licenses/mit-license.html MIT License
|
2013-12-16 18:45:37 +00:00
|
|
|
*/
|
|
|
|
|
2022-02-23 02:48:51 +00:00
|
|
|
namespace phpseclib3\Tests\Unit\Net;
|
|
|
|
|
2024-07-12 20:40:13 +00:00
|
|
|
use phpseclib3\Common\Functions\Strings;
|
2023-02-23 20:04:30 +00:00
|
|
|
use phpseclib3\Exception\InsufficientSetupException;
|
2024-07-12 20:40:13 +00:00
|
|
|
use phpseclib3\Exception\TimeoutException;
|
2023-03-05 02:47:49 +00:00
|
|
|
use phpseclib3\Net\SSH2;
|
2022-02-23 02:48:51 +00:00
|
|
|
use phpseclib3\Tests\PhpseclibTestCase;
|
|
|
|
|
|
|
|
class SSH2UnitTest extends PhpseclibTestCase
|
2013-12-16 18:45:37 +00:00
|
|
|
{
|
2024-02-08 02:30:21 +00:00
|
|
|
public static function formatLogDataProvider()
|
2013-12-16 18:45:37 +00:00
|
|
|
{
|
2017-11-27 08:30:14 +00:00
|
|
|
return [
|
|
|
|
[
|
|
|
|
['hello world'],
|
|
|
|
['<--'],
|
2013-12-16 18:45:37 +00:00
|
|
|
"<--\r\n00000000 68:65:6c:6c:6f:20:77:6f:72:6c:64 hello world\r\n\r\n"
|
2017-11-27 08:30:14 +00:00
|
|
|
],
|
|
|
|
[
|
|
|
|
['hello', 'world'],
|
|
|
|
['<--', '<--'],
|
2013-12-16 18:45:37 +00:00
|
|
|
"<--\r\n00000000 68:65:6c:6c:6f hello\r\n\r\n" .
|
|
|
|
"<--\r\n00000000 77:6f:72:6c:64 world\r\n\r\n"
|
2017-11-27 08:30:14 +00:00
|
|
|
],
|
|
|
|
];
|
2013-12-16 18:45:37 +00:00
|
|
|
}
|
|
|
|
|
2024-08-14 14:32:36 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
* Verify that MASK_* constants remain distinct
|
|
|
|
*/
|
|
|
|
public function testBitmapMasks()
|
|
|
|
{
|
|
|
|
$reflection = new \ReflectionClass(SSH2::class);
|
|
|
|
$masks = array_filter($reflection->getConstants(), function ($k) {
|
|
|
|
return strpos($k, 'MASK_') === 0;
|
|
|
|
}, ARRAY_FILTER_USE_KEY);
|
|
|
|
$bitmap = 0;
|
|
|
|
foreach ($masks as $mask => $bit) {
|
|
|
|
$this->assertEquals(0, $bitmap & $bit, "Got unexpected mask {$mask}");
|
|
|
|
$bitmap |= $bit;
|
|
|
|
$this->assertEquals($bit, $bitmap & $bit, "Absent expected mask {$mask}");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-16 18:45:37 +00:00
|
|
|
/**
|
|
|
|
* @dataProvider formatLogDataProvider
|
2023-02-05 23:33:16 +00:00
|
|
|
* @requires PHPUnit < 10
|
2013-12-16 18:45:37 +00:00
|
|
|
*/
|
|
|
|
public function testFormatLog(array $message_log, array $message_number_log, $expected)
|
|
|
|
{
|
2013-12-16 19:17:10 +00:00
|
|
|
$ssh = $this->createSSHMock();
|
2013-12-16 18:45:37 +00:00
|
|
|
|
2017-11-27 08:30:14 +00:00
|
|
|
$result = self::callFunc($ssh, 'format_log', [$message_log, $message_number_log]);
|
2013-12-16 18:45:37 +00:00
|
|
|
$this->assertEquals($expected, $result);
|
|
|
|
}
|
2014-01-18 17:29:25 +00:00
|
|
|
|
2023-02-05 23:33:16 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
2014-06-01 19:49:40 +00:00
|
|
|
public function testGenerateIdentifier()
|
2013-12-16 19:17:10 +00:00
|
|
|
{
|
2017-01-08 01:51:56 +00:00
|
|
|
$identifier = self::callFunc($this->createSSHMock(), 'generate_identifier');
|
2020-03-08 03:19:00 +00:00
|
|
|
$this->assertStringStartsWith('SSH-2.0-phpseclib_3.0', $identifier);
|
2015-07-23 01:02:28 +00:00
|
|
|
|
2020-12-13 01:22:36 +00:00
|
|
|
if (function_exists('sodium_crypto_sign_keypair')) {
|
2020-12-13 02:13:42 +00:00
|
|
|
$this->assertStringContainsString('libsodium', $identifier);
|
2015-07-23 01:02:28 +00:00
|
|
|
}
|
2013-12-17 17:43:37 +00:00
|
|
|
|
2014-12-30 06:27:27 +00:00
|
|
|
if (extension_loaded('openssl')) {
|
2020-12-12 21:11:04 +00:00
|
|
|
$this->assertStringContainsString('openssl', $identifier);
|
|
|
|
$this->assertStringNotContainsString('mcrypt', $identifier);
|
2015-07-15 01:52:31 +00:00
|
|
|
} elseif (extension_loaded('mcrypt')) {
|
2020-12-12 21:11:04 +00:00
|
|
|
$this->assertStringNotContainsString('openssl', $identifier);
|
|
|
|
$this->assertStringContainsString('mcrypt', $identifier);
|
2014-06-01 19:49:40 +00:00
|
|
|
} else {
|
2020-12-12 21:11:04 +00:00
|
|
|
$this->assertStringNotContainsString('openssl', $identifier);
|
|
|
|
$this->assertStringNotContainsString('mcrypt', $identifier);
|
2013-12-16 19:17:10 +00:00
|
|
|
}
|
|
|
|
|
2014-06-01 19:49:40 +00:00
|
|
|
if (extension_loaded('gmp')) {
|
2020-12-12 21:11:04 +00:00
|
|
|
$this->assertStringContainsString('gmp', $identifier);
|
|
|
|
$this->assertStringNotContainsString('bcmath', $identifier);
|
2015-07-15 01:52:31 +00:00
|
|
|
} elseif (extension_loaded('bcmath')) {
|
2020-12-12 21:11:04 +00:00
|
|
|
$this->assertStringNotContainsString('gmp', $identifier);
|
|
|
|
$this->assertStringContainsString('bcmath', $identifier);
|
2014-06-01 19:49:40 +00:00
|
|
|
} else {
|
2020-12-12 21:11:04 +00:00
|
|
|
$this->assertStringNotContainsString('gmp', $identifier);
|
|
|
|
$this->assertStringNotContainsString('bcmath', $identifier);
|
2014-06-01 19:49:40 +00:00
|
|
|
}
|
2013-12-16 19:17:10 +00:00
|
|
|
}
|
|
|
|
|
2023-02-05 23:33:16 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
2013-12-28 20:27:02 +00:00
|
|
|
public function testGetExitStatusIfNotConnected()
|
|
|
|
{
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
|
|
|
|
$this->assertFalse($ssh->getExitStatus());
|
|
|
|
}
|
|
|
|
|
2023-02-05 23:33:16 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
2013-12-28 20:27:02 +00:00
|
|
|
public function testPTYIDefaultValue()
|
|
|
|
{
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
$this->assertFalse($ssh->isPTYEnabled());
|
|
|
|
}
|
|
|
|
|
2023-02-05 23:33:16 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
2013-12-28 20:27:02 +00:00
|
|
|
public function testEnablePTY()
|
|
|
|
{
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
|
|
|
|
$ssh->enablePTY();
|
|
|
|
$this->assertTrue($ssh->isPTYEnabled());
|
|
|
|
|
|
|
|
$ssh->disablePTY();
|
|
|
|
$this->assertFalse($ssh->isPTYEnabled());
|
|
|
|
}
|
|
|
|
|
2023-02-05 23:33:16 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
2013-12-28 20:27:02 +00:00
|
|
|
public function testQuietModeDefaultValue()
|
|
|
|
{
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
|
|
|
|
$this->assertFalse($ssh->isQuietModeEnabled());
|
|
|
|
}
|
|
|
|
|
2023-02-05 23:33:16 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
2013-12-28 20:27:02 +00:00
|
|
|
public function testEnableQuietMode()
|
|
|
|
{
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
|
|
|
|
$ssh->enableQuietMode();
|
|
|
|
$this->assertTrue($ssh->isQuietModeEnabled());
|
|
|
|
|
|
|
|
$ssh->disableQuietMode();
|
|
|
|
$this->assertFalse($ssh->isQuietModeEnabled());
|
|
|
|
}
|
2014-04-18 14:54:24 +00:00
|
|
|
|
2016-04-30 21:23:35 +00:00
|
|
|
public function testGetConnectionByResourceId()
|
|
|
|
{
|
2023-03-05 02:47:49 +00:00
|
|
|
$ssh = new SSH2('localhost');
|
2024-08-03 16:11:29 +00:00
|
|
|
$this->assertSame($ssh, SSH2::getConnectionByResourceId($ssh->getResourceId()));
|
2016-04-30 21:23:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
public function testGetResourceId()
|
|
|
|
{
|
2023-03-05 02:47:49 +00:00
|
|
|
$ssh = new SSH2('localhost');
|
2016-04-30 21:23:35 +00:00
|
|
|
$this->assertSame('{' . spl_object_hash($ssh) . '}', $ssh->getResourceId());
|
|
|
|
}
|
|
|
|
|
2023-02-23 20:04:30 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testReadUnauthenticated()
|
|
|
|
{
|
|
|
|
$this->expectException(InsufficientSetupException::class);
|
|
|
|
$this->expectExceptionMessage('Operation disallowed prior to login()');
|
|
|
|
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
|
|
|
|
$ssh->read();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testWriteUnauthenticated()
|
|
|
|
{
|
|
|
|
$this->expectException(InsufficientSetupException::class);
|
|
|
|
$this->expectExceptionMessage('Operation disallowed prior to login()');
|
|
|
|
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
|
|
|
|
$ssh->write('');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testWriteOpensShell()
|
|
|
|
{
|
|
|
|
$ssh = $this->getMockBuilder(SSH2::class)
|
|
|
|
->disableOriginalConstructor()
|
|
|
|
->setMethods(['__destruct', 'isAuthenticated', 'openShell', 'send_channel_packet'])
|
|
|
|
->getMock();
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('isAuthenticated')
|
|
|
|
->willReturn(true);
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('openShell')
|
|
|
|
->willReturn(true);
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('send_channel_packet')
|
|
|
|
->with(SSH2::CHANNEL_SHELL, 'hello');
|
|
|
|
|
|
|
|
$ssh->write('hello');
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testOpenShellWhenOpen()
|
|
|
|
{
|
|
|
|
$ssh = $this->getMockBuilder(SSH2::class)
|
|
|
|
->disableOriginalConstructor()
|
2023-04-14 16:24:31 +00:00
|
|
|
->setMethods(['__destruct'])
|
2023-02-23 20:04:30 +00:00
|
|
|
->getMock();
|
|
|
|
|
2023-04-14 16:24:31 +00:00
|
|
|
$this->expectException(InsufficientSetupException::class);
|
|
|
|
$this->expectExceptionMessage('Operation disallowed prior to login()');
|
2023-02-23 20:04:30 +00:00
|
|
|
|
|
|
|
$this->assertFalse($ssh->openShell());
|
|
|
|
}
|
|
|
|
|
2023-03-05 02:47:49 +00:00
|
|
|
public function testGetTimeout()
|
|
|
|
{
|
|
|
|
$ssh = new SSH2('localhost');
|
|
|
|
$this->assertEquals(10, $ssh->getTimeout());
|
|
|
|
$ssh->setTimeout(0);
|
|
|
|
$this->assertEquals(0, $ssh->getTimeout());
|
|
|
|
$ssh->setTimeout(20);
|
|
|
|
$this->assertEquals(20, $ssh->getTimeout());
|
|
|
|
}
|
|
|
|
|
2024-06-28 14:25:07 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testGetStreamTimeout()
|
2024-06-28 13:39:06 +00:00
|
|
|
{
|
2024-08-01 16:14:33 +00:00
|
|
|
$default = ini_get('default_socket_timeout');
|
2024-06-28 13:39:06 +00:00
|
|
|
// no curTimeout, no keepAlive
|
|
|
|
$ssh = $this->createSSHMock();
|
2024-08-01 16:14:33 +00:00
|
|
|
$this->assertEquals([$default, 0], self::callFunc($ssh, 'get_stream_timeout'));
|
2024-06-28 13:39:06 +00:00
|
|
|
|
|
|
|
// curTimeout, no keepAlive
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
$ssh->setTimeout(1);
|
|
|
|
$this->assertEquals([1, 0], self::callFunc($ssh, 'get_stream_timeout'));
|
|
|
|
|
|
|
|
// no curTimeout, keepAlive
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
$ssh->setKeepAlive(2);
|
|
|
|
self::setVar($ssh, 'last_packet', microtime(true));
|
|
|
|
list($sec, $usec) = self::callFunc($ssh, 'get_stream_timeout');
|
|
|
|
$this->assertGreaterThanOrEqual(1, $sec);
|
|
|
|
$this->assertLessThanOrEqual(2, $sec);
|
|
|
|
|
|
|
|
// smaller curTimeout, keepAlive
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
$ssh->setTimeout(1);
|
|
|
|
$ssh->setKeepAlive(2);
|
|
|
|
self::setVar($ssh, 'last_packet', microtime(true));
|
|
|
|
$this->assertEquals([1, 0], self::callFunc($ssh, 'get_stream_timeout'));
|
|
|
|
|
|
|
|
// curTimeout, smaller keepAlive
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
$ssh->setTimeout(5);
|
|
|
|
$ssh->setKeepAlive(2);
|
|
|
|
self::setVar($ssh, 'last_packet', microtime(true));
|
|
|
|
list($sec, $usec) = self::callFunc($ssh, 'get_stream_timeout');
|
|
|
|
$this->assertGreaterThanOrEqual(1, $sec);
|
|
|
|
$this->assertLessThanOrEqual(2, $sec);
|
|
|
|
|
|
|
|
// no curTimeout, keepAlive, no last_packet
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
$ssh->setKeepAlive(2);
|
|
|
|
$this->assertEquals([0, 0], self::callFunc($ssh, 'get_stream_timeout'));
|
|
|
|
|
|
|
|
// no curTimeout, keepAlive, last_packet exceeds keepAlive
|
|
|
|
$ssh = $this->createSSHMock();
|
|
|
|
$ssh->setKeepAlive(2);
|
|
|
|
self::setVar($ssh, 'last_packet', microtime(true) - 2);
|
|
|
|
$this->assertEquals([0, 0], self::callFunc($ssh, 'get_stream_timeout'));
|
|
|
|
}
|
|
|
|
|
2024-07-12 20:40:13 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testSendChannelPacketNoBufferedData()
|
|
|
|
{
|
|
|
|
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
|
|
|
|
->disableOriginalConstructor()
|
|
|
|
->setMethods(['get_channel_packet', 'send_binary_packet'])
|
|
|
|
->getMock();
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('get_channel_packet')
|
|
|
|
->with(-1)
|
|
|
|
->willReturnCallback(function () use ($ssh) {
|
|
|
|
self::setVar($ssh, 'window_size_client_to_server', [1 => 0x7FFFFFFF]);
|
|
|
|
});
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('send_binary_packet')
|
2024-07-12 21:14:54 +00:00
|
|
|
->with(Strings::packSSH2('CNs', NET_SSH2_MSG_CHANNEL_DATA, 1, 'hello world'));
|
2024-07-12 20:40:13 +00:00
|
|
|
self::setVar($ssh, 'server_channels', [1 => 1]);
|
|
|
|
self::setVar($ssh, 'packet_size_client_to_server', [1 => 0x7FFFFFFF]);
|
|
|
|
self::setVar($ssh, 'window_size_client_to_server', [1 => 0]);
|
|
|
|
self::setVar($ssh, 'window_size_server_to_client', [1 => 0x7FFFFFFF]);
|
|
|
|
|
|
|
|
self::callFunc($ssh, 'send_channel_packet', [1, 'hello world']);
|
|
|
|
$this->assertEmpty(self::getVar($ssh, 'channel_buffers_write'));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testSendChannelPacketBufferedData()
|
|
|
|
{
|
|
|
|
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
|
|
|
|
->disableOriginalConstructor()
|
|
|
|
->setMethods(['get_channel_packet', 'send_binary_packet'])
|
|
|
|
->getMock();
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('get_channel_packet')
|
|
|
|
->with(-1)
|
|
|
|
->willReturnCallback(function () use ($ssh) {
|
|
|
|
self::setVar($ssh, 'window_size_client_to_server', [1 => 0x7FFFFFFF]);
|
|
|
|
});
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('send_binary_packet')
|
2024-07-12 21:14:54 +00:00
|
|
|
->with(Strings::packSSH2('CNs', NET_SSH2_MSG_CHANNEL_DATA, 1, ' world'));
|
2024-07-12 20:40:13 +00:00
|
|
|
self::setVar($ssh, 'channel_buffers_write', [1 => 'hello']);
|
|
|
|
self::setVar($ssh, 'server_channels', [1 => 1]);
|
|
|
|
self::setVar($ssh, 'packet_size_client_to_server', [1 => 0x7FFFFFFF]);
|
|
|
|
self::setVar($ssh, 'window_size_client_to_server', [1 => 0]);
|
|
|
|
self::setVar($ssh, 'window_size_server_to_client', [1 => 0x7FFFFFFF]);
|
|
|
|
|
|
|
|
self::callFunc($ssh, 'send_channel_packet', [1, 'hello world']);
|
|
|
|
$this->assertEmpty(self::getVar($ssh, 'channel_buffers_write'));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testSendChannelPacketTimeout()
|
|
|
|
{
|
|
|
|
$this->expectException(TimeoutException::class);
|
|
|
|
$this->expectExceptionMessage('Timed out waiting for server');
|
|
|
|
|
|
|
|
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
|
|
|
|
->disableOriginalConstructor()
|
|
|
|
->setMethods(['get_channel_packet', 'send_binary_packet'])
|
|
|
|
->getMock();
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('get_channel_packet')
|
|
|
|
->with(-1)
|
|
|
|
->willReturnCallback(function () use ($ssh) {
|
|
|
|
self::setVar($ssh, 'is_timeout', true);
|
|
|
|
});
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('send_binary_packet')
|
2024-07-12 21:14:54 +00:00
|
|
|
->with(Strings::packSSH2('CNs', NET_SSH2_MSG_CHANNEL_DATA, 1, 'hello'));
|
2024-07-12 20:40:13 +00:00
|
|
|
self::setVar($ssh, 'server_channels', [1 => 1]);
|
|
|
|
self::setVar($ssh, 'packet_size_client_to_server', [1 => 0x7FFFFFFF]);
|
|
|
|
self::setVar($ssh, 'window_size_client_to_server', [1 => 5]);
|
|
|
|
self::setVar($ssh, 'window_size_server_to_client', [1 => 0x7FFFFFFF]);
|
|
|
|
|
|
|
|
self::callFunc($ssh, 'send_channel_packet', [1, 'hello world']);
|
|
|
|
$this->assertEquals([1 => 'hello'], self::getVar($ssh, 'channel_buffers_write'));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testSendChannelPacketNoWindowAdjustment()
|
|
|
|
{
|
|
|
|
$this->expectException(\RuntimeException::class);
|
|
|
|
$this->expectExceptionMessage('Data window was not adjusted');
|
|
|
|
|
|
|
|
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
|
|
|
|
->disableOriginalConstructor()
|
|
|
|
->setMethods(['get_channel_packet', 'send_binary_packet'])
|
|
|
|
->getMock();
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('get_channel_packet')
|
|
|
|
->with(-1);
|
|
|
|
$ssh->expects($this->never())
|
|
|
|
->method('send_binary_packet');
|
|
|
|
self::setVar($ssh, 'server_channels', [1 => 1]);
|
|
|
|
self::setVar($ssh, 'packet_size_client_to_server', [1 => 0x7FFFFFFF]);
|
|
|
|
self::setVar($ssh, 'window_size_client_to_server', [1 => 0]);
|
|
|
|
self::setVar($ssh, 'window_size_server_to_client', [1 => 0x7FFFFFFF]);
|
|
|
|
|
|
|
|
self::callFunc($ssh, 'send_channel_packet', [1, 'hello world']);
|
|
|
|
}
|
|
|
|
|
2024-08-14 14:32:36 +00:00
|
|
|
/**
|
|
|
|
* @requires PHPUnit < 10
|
|
|
|
*/
|
|
|
|
public function testDisconnectHelper()
|
|
|
|
{
|
|
|
|
$ssh = $this->getMockBuilder('phpseclib3\Net\SSH2')
|
|
|
|
->disableOriginalConstructor()
|
|
|
|
->setMethods(['__destruct', 'isConnected', 'send_binary_packet'])
|
|
|
|
->getMock();
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('isConnected')
|
|
|
|
->willReturn(true);
|
|
|
|
$ssh->expects($this->once())
|
|
|
|
->method('send_binary_packet')
|
|
|
|
->with($this->isType('string'))
|
|
|
|
->willReturnCallback(function () use ($ssh) {
|
|
|
|
self::callFunc($ssh, 'disconnect_helper', [1]);
|
|
|
|
throw new \Exception('catch me');
|
|
|
|
});
|
|
|
|
|
|
|
|
$this->assertEquals(0, self::getVar($ssh, 'bitmap'));
|
|
|
|
self::callFunc($ssh, 'disconnect_helper', [1]);
|
|
|
|
$this->assertEquals(0, self::getVar($ssh, 'bitmap'));
|
|
|
|
}
|
|
|
|
|
2014-02-15 18:57:49 +00:00
|
|
|
/**
|
2024-08-03 16:11:29 +00:00
|
|
|
* @return SSH2
|
2014-02-15 18:57:49 +00:00
|
|
|
*/
|
|
|
|
protected function createSSHMock()
|
|
|
|
{
|
2019-11-07 05:41:40 +00:00
|
|
|
return $this->getMockBuilder('phpseclib3\Net\SSH2')
|
2014-02-15 18:57:49 +00:00
|
|
|
->disableOriginalConstructor()
|
2017-11-27 08:30:14 +00:00
|
|
|
->setMethods(['__destruct'])
|
2014-02-15 18:57:49 +00:00
|
|
|
->getMock();
|
|
|
|
}
|
2013-12-16 18:45:37 +00:00
|
|
|
}
|