mirror of
https://github.com/phpseclib/phpseclib.git
synced 2024-11-16 02:07:09 +00:00
Merge remote-tracking branch 'origin/master' into Bugfixes2
This commit is contained in:
commit
25c1ae6e00
@ -327,10 +327,10 @@ class Blowfish extends BlockCipher
|
|||||||
*
|
*
|
||||||
* @see \phpseclib\Crypt\Common\SymmetricKey::isValidEngine()
|
* @see \phpseclib\Crypt\Common\SymmetricKey::isValidEngine()
|
||||||
* @param int $engine
|
* @param int $engine
|
||||||
* @access public
|
* @access protected
|
||||||
* @return bool
|
* @return bool
|
||||||
*/
|
*/
|
||||||
public function isValidEngine($engine)
|
protected function isValidEngineHelper($engine)
|
||||||
{
|
{
|
||||||
if ($engine == self::ENGINE_OPENSSL) {
|
if ($engine == self::ENGINE_OPENSSL) {
|
||||||
if (version_compare(PHP_VERSION, '5.3.7') < 0 && $this->key_length != 16) {
|
if (version_compare(PHP_VERSION, '5.3.7') < 0 && $this->key_length != 16) {
|
||||||
@ -343,7 +343,7 @@ class Blowfish extends BlockCipher
|
|||||||
$this->cipher_name_openssl = 'bf-' . $this->openssl_translate_mode();
|
$this->cipher_name_openssl = 'bf-' . $this->openssl_translate_mode();
|
||||||
}
|
}
|
||||||
|
|
||||||
return parent::isValidEngine($engine);
|
return parent::isValidEngineHelper($engine);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -1712,10 +1712,10 @@ abstract class SymmetricKey
|
|||||||
*
|
*
|
||||||
* @see self::__construct()
|
* @see self::__construct()
|
||||||
* @param int $engine
|
* @param int $engine
|
||||||
* @access public
|
* @access private
|
||||||
* @return bool
|
* @return bool
|
||||||
*/
|
*/
|
||||||
public function isValidEngine($engine)
|
protected function isValidEngineHelper($engine)
|
||||||
{
|
{
|
||||||
switch ($engine) {
|
switch ($engine) {
|
||||||
case self::ENGINE_OPENSSL:
|
case self::ENGINE_OPENSSL:
|
||||||
@ -1756,6 +1756,29 @@ abstract class SymmetricKey
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Test for engine validity
|
||||||
|
*
|
||||||
|
* @see self::__construct()
|
||||||
|
* @param string $engine
|
||||||
|
* @access public
|
||||||
|
* @return bool
|
||||||
|
*/
|
||||||
|
public function isValidEngine($engine)
|
||||||
|
{
|
||||||
|
static $reverseMap;
|
||||||
|
if (!isset($reverseMap)) {
|
||||||
|
$reverseMap = array_map('strtolower', self::ENGINE_MAP);
|
||||||
|
$reverseMap = array_flip($reverseMap);
|
||||||
|
}
|
||||||
|
$engine = strtolower($engine);
|
||||||
|
if (!isset($reverseMap[$engine])) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
return $this->isValidEngineHelper($reverseMap[$engine]);
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Sets the preferred crypt engine
|
* Sets the preferred crypt engine
|
||||||
*
|
*
|
||||||
@ -1816,7 +1839,7 @@ abstract class SymmetricKey
|
|||||||
self::ENGINE_EVAL
|
self::ENGINE_EVAL
|
||||||
];
|
];
|
||||||
foreach ($candidateEngines as $engine) {
|
foreach ($candidateEngines as $engine) {
|
||||||
if ($this->isValidEngine($engine)) {
|
if ($this->isValidEngineHelper($engine)) {
|
||||||
$this->engine = $engine;
|
$this->engine = $engine;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
@ -603,10 +603,10 @@ class DES extends BlockCipher
|
|||||||
*
|
*
|
||||||
* @see \phpseclib\Crypt\Common\SymmetricKey::isValidEngine()
|
* @see \phpseclib\Crypt\Common\SymmetricKey::isValidEngine()
|
||||||
* @param int $engine
|
* @param int $engine
|
||||||
* @access public
|
* @access protected
|
||||||
* @return bool
|
* @return bool
|
||||||
*/
|
*/
|
||||||
public function isValidEngine($engine)
|
protected function isValidEngineHelper($engine)
|
||||||
{
|
{
|
||||||
if ($this->key_length_max == 8) {
|
if ($this->key_length_max == 8) {
|
||||||
if ($engine == self::ENGINE_OPENSSL) {
|
if ($engine == self::ENGINE_OPENSSL) {
|
||||||
@ -615,7 +615,7 @@ class DES extends BlockCipher
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return parent::isValidEngine($engine);
|
return parent::isValidEngineHelper($engine);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -284,10 +284,10 @@ class RC2 extends BlockCipher
|
|||||||
*
|
*
|
||||||
* @see \phpseclib\Crypt\Common\SymmetricKey::__construct()
|
* @see \phpseclib\Crypt\Common\SymmetricKey::__construct()
|
||||||
* @param int $engine
|
* @param int $engine
|
||||||
* @access public
|
* @access protected
|
||||||
* @return bool
|
* @return bool
|
||||||
*/
|
*/
|
||||||
public function isValidEngine($engine)
|
protected function isValidEngineHelper($engine)
|
||||||
{
|
{
|
||||||
switch ($engine) {
|
switch ($engine) {
|
||||||
case self::ENGINE_OPENSSL:
|
case self::ENGINE_OPENSSL:
|
||||||
@ -298,7 +298,7 @@ class RC2 extends BlockCipher
|
|||||||
$this->cipher_name_openssl = 'rc2-' . $this->openssl_translate_mode();
|
$this->cipher_name_openssl = 'rc2-' . $this->openssl_translate_mode();
|
||||||
}
|
}
|
||||||
|
|
||||||
return parent::isValidEngine($engine);
|
return parent::isValidEngineHelper($engine);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -139,10 +139,10 @@ class RC4 extends StreamCipher
|
|||||||
*
|
*
|
||||||
* @see \phpseclib\Crypt\Common\SymmetricKey::__construct()
|
* @see \phpseclib\Crypt\Common\SymmetricKey::__construct()
|
||||||
* @param int $engine
|
* @param int $engine
|
||||||
* @access public
|
* @access protected
|
||||||
* @return bool
|
* @return bool
|
||||||
*/
|
*/
|
||||||
public function isValidEngine($engine)
|
protected function isValidEngineHelper($engine)
|
||||||
{
|
{
|
||||||
if ($engine == self::ENGINE_OPENSSL) {
|
if ($engine == self::ENGINE_OPENSSL) {
|
||||||
if (version_compare(PHP_VERSION, '5.3.7') >= 0) {
|
if (version_compare(PHP_VERSION, '5.3.7') >= 0) {
|
||||||
@ -164,7 +164,7 @@ class RC4 extends StreamCipher
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return parent::isValidEngine($engine);
|
return parent::isValidEngineHelper($engine);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -273,10 +273,10 @@ class Rijndael extends BlockCipher
|
|||||||
*
|
*
|
||||||
* @see \phpseclib\Crypt\Common\SymmetricKey::__construct()
|
* @see \phpseclib\Crypt\Common\SymmetricKey::__construct()
|
||||||
* @param int $engine
|
* @param int $engine
|
||||||
* @access public
|
* @access protected
|
||||||
* @return bool
|
* @return bool
|
||||||
*/
|
*/
|
||||||
public function isValidEngine($engine)
|
protected function isValidEngineHelper($engine)
|
||||||
{
|
{
|
||||||
switch ($engine) {
|
switch ($engine) {
|
||||||
case self::ENGINE_OPENSSL:
|
case self::ENGINE_OPENSSL:
|
||||||
@ -294,7 +294,7 @@ class Rijndael extends BlockCipher
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return parent::isValidEngine($engine);
|
return parent::isValidEngineHelper($engine);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -178,10 +178,10 @@ class TripleDES extends DES
|
|||||||
*
|
*
|
||||||
* @see \phpseclib\Crypt\Common\SymmetricKey::__construct()
|
* @see \phpseclib\Crypt\Common\SymmetricKey::__construct()
|
||||||
* @param int $engine
|
* @param int $engine
|
||||||
* @access public
|
* @access protected
|
||||||
* @return bool
|
* @return bool
|
||||||
*/
|
*/
|
||||||
public function isValidEngine($engine)
|
protected function isValidEngineHelper($engine)
|
||||||
{
|
{
|
||||||
if ($engine == self::ENGINE_OPENSSL) {
|
if ($engine == self::ENGINE_OPENSSL) {
|
||||||
$this->cipher_name_openssl_ecb = 'des-ede3';
|
$this->cipher_name_openssl_ecb = 'des-ede3';
|
||||||
@ -189,7 +189,7 @@ class TripleDES extends DES
|
|||||||
$this->cipher_name_openssl = $mode == 'ecb' ? 'des-ede3' : 'des-ede3-' . $mode;
|
$this->cipher_name_openssl = $mode == 'ecb' ? 'des-ede3' : 'des-ede3-' . $mode;
|
||||||
}
|
}
|
||||||
|
|
||||||
return parent::isValidEngine($engine);
|
return parent::isValidEngineHelper($engine);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -419,7 +419,7 @@ class ANSI
|
|||||||
|
|
||||||
if ($this->x > $this->max_x) {
|
if ($this->x > $this->max_x) {
|
||||||
$this->x = 0;
|
$this->x = 0;
|
||||||
$this->y++;
|
$this->newLine();
|
||||||
} else {
|
} else {
|
||||||
$this->x++;
|
$this->x++;
|
||||||
}
|
}
|
||||||
|
@ -1349,27 +1349,6 @@ abstract class ASN1
|
|||||||
return $temp != false ? $temp : $str;
|
return $temp != false ? $temp : $str;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* DER-decode the length
|
|
||||||
*
|
|
||||||
* DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4. See
|
|
||||||
* {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
|
|
||||||
*
|
|
||||||
* @access public
|
|
||||||
* @param string $string
|
|
||||||
* @return int
|
|
||||||
*/
|
|
||||||
public static function decodeLength(&$string)
|
|
||||||
{
|
|
||||||
$length = ord(Strings::shift($string));
|
|
||||||
if ($length & 0x80) { // definite length, long form
|
|
||||||
$length&= 0x7F;
|
|
||||||
$temp = Strings::shift($string, $length);
|
|
||||||
list(, $length) = unpack('N', substr(str_pad($temp, 4, chr(0), STR_PAD_LEFT), -4));
|
|
||||||
}
|
|
||||||
return $length;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* DER-encode the length
|
* DER-encode the length
|
||||||
*
|
*
|
||||||
|
@ -3132,12 +3132,13 @@ class X509
|
|||||||
* Returns a list of all extensions in use in certificate, CSR or CRL
|
* Returns a list of all extensions in use in certificate, CSR or CRL
|
||||||
*
|
*
|
||||||
* @param array $cert optional
|
* @param array $cert optional
|
||||||
|
* @param string $path optional
|
||||||
* @access public
|
* @access public
|
||||||
* @return array
|
* @return array
|
||||||
*/
|
*/
|
||||||
public function getExtensions($cert = null)
|
public function getExtensions($cert = null, $path = null)
|
||||||
{
|
{
|
||||||
return $this->getExtensionsHelper($cert);
|
return $this->getExtensionsHelper($cert, $path);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -3689,7 +3690,7 @@ class X509
|
|||||||
|
|
||||||
if (is_array($rclist = $this->subArray($crl, 'tbsCertList/revokedCertificates'))) {
|
if (is_array($rclist = $this->subArray($crl, 'tbsCertList/revokedCertificates'))) {
|
||||||
if (($i = $this->revokedCertificate($rclist, $serial)) !== false) {
|
if (($i = $this->revokedCertificate($rclist, $serial)) !== false) {
|
||||||
return $this->getExtensionsHelper($crl, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
|
return $this->getExtensions($crl, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ abstract class Base extends BCMath
|
|||||||
* @param string $class
|
* @param string $class
|
||||||
* @return \phpseclib\Math\BigInteger\Engines\BCMath
|
* @return \phpseclib\Math\BigInteger\Engines\BCMath
|
||||||
*/
|
*/
|
||||||
public static function powModHelper(BCMath $x, BCMath $e, BCMath $n, $class)
|
protected static function powModHelper(BCMath $x, BCMath $e, BCMath $n, $class)
|
||||||
{
|
{
|
||||||
if (empty($e->value)) {
|
if (empty($e->value)) {
|
||||||
$temp = new $class();
|
$temp = new $class();
|
||||||
|
@ -80,7 +80,7 @@ abstract class Base extends PHP
|
|||||||
* @param string $class
|
* @param string $class
|
||||||
* @return \phpseclib\Math\BigInteger\Engines\PHP
|
* @return \phpseclib\Math\BigInteger\Engines\PHP
|
||||||
*/
|
*/
|
||||||
public static function powModHelper(PHP $x, PHP $e, PHP $n, $class)
|
protected static function powModHelper(PHP $x, PHP $e, PHP $n, $class)
|
||||||
{
|
{
|
||||||
if (empty($e->value)) {
|
if (empty($e->value)) {
|
||||||
$temp = new $class();
|
$temp = new $class();
|
||||||
|
@ -881,6 +881,22 @@ class SSH2
|
|||||||
*/
|
*/
|
||||||
private static $connections;
|
private static $connections;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Send the identification string first?
|
||||||
|
*
|
||||||
|
* @var bool
|
||||||
|
* @access private
|
||||||
|
*/
|
||||||
|
private $send_id_string_first = true;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Send the key exchange initiation packet first?
|
||||||
|
*
|
||||||
|
* @var bool
|
||||||
|
* @access private
|
||||||
|
*/
|
||||||
|
private $send_kex_first = true;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Default Constructor.
|
* Default Constructor.
|
||||||
*
|
*
|
||||||
@ -995,13 +1011,69 @@ class SSH2
|
|||||||
* OpenSSL, mcrypt, Eval, PHP
|
* OpenSSL, mcrypt, Eval, PHP
|
||||||
*
|
*
|
||||||
* @param int $engine
|
* @param int $engine
|
||||||
* @access private
|
* @access public
|
||||||
*/
|
*/
|
||||||
public function setCryptoEngine($engine)
|
public function setCryptoEngine($engine)
|
||||||
{
|
{
|
||||||
$this->crypto_engine = $engine;
|
$this->crypto_engine = $engine;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Send Identification String First
|
||||||
|
*
|
||||||
|
* https://tools.ietf.org/html/rfc4253#section-4.2 says "when the connection has been established,
|
||||||
|
* both sides MUST send an identification string". It does not say which side sends it first. In
|
||||||
|
* theory it shouldn't matter but it is a fact of life that some SSH servers are simply buggy
|
||||||
|
*
|
||||||
|
* @access public
|
||||||
|
*/
|
||||||
|
function sendIdentificationStringFirst()
|
||||||
|
{
|
||||||
|
$this->send_id_string_first = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Send Identification String Last
|
||||||
|
*
|
||||||
|
* https://tools.ietf.org/html/rfc4253#section-4.2 says "when the connection has been established,
|
||||||
|
* both sides MUST send an identification string". It does not say which side sends it first. In
|
||||||
|
* theory it shouldn't matter but it is a fact of life that some SSH servers are simply buggy
|
||||||
|
*
|
||||||
|
* @access public
|
||||||
|
*/
|
||||||
|
function sendIdentificationStringLast()
|
||||||
|
{
|
||||||
|
$this->send_id_string_first = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Send SSH_MSG_KEXINIT First
|
||||||
|
*
|
||||||
|
* https://tools.ietf.org/html/rfc4253#section-7.1 says "key exchange begins by each sending
|
||||||
|
* sending the [SSH_MSG_KEXINIT] packet". It does not say which side sends it first. In theory
|
||||||
|
* it shouldn't matter but it is a fact of life that some SSH servers are simply buggy
|
||||||
|
*
|
||||||
|
* @access public
|
||||||
|
*/
|
||||||
|
function sendKEXINITFirst()
|
||||||
|
{
|
||||||
|
$this->send_kex_first = true;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Send SSH_MSG_KEXINIT Last
|
||||||
|
*
|
||||||
|
* https://tools.ietf.org/html/rfc4253#section-7.1 says "key exchange begins by each sending
|
||||||
|
* sending the [SSH_MSG_KEXINIT] packet". It does not say which side sends it first. In theory
|
||||||
|
* it shouldn't matter but it is a fact of life that some SSH servers are simply buggy
|
||||||
|
*
|
||||||
|
* @access public
|
||||||
|
*/
|
||||||
|
function sendKEXINITLast()
|
||||||
|
{
|
||||||
|
$this->send_kex_first = false;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Connect to an SSHv2 server
|
* Connect to an SSHv2 server
|
||||||
*
|
*
|
||||||
@ -1044,7 +1116,9 @@ class SSH2
|
|||||||
|
|
||||||
$this->identifier = $this->generate_identifier();
|
$this->identifier = $this->generate_identifier();
|
||||||
|
|
||||||
fputs($this->fsock, $this->identifier . "\r\n");
|
if ($this->send_id_string_first) {
|
||||||
|
fputs($this->fsock, $this->identifier . "\r\n");
|
||||||
|
}
|
||||||
|
|
||||||
/* According to the SSH2 specs,
|
/* According to the SSH2 specs,
|
||||||
|
|
||||||
@ -1120,16 +1194,26 @@ class SSH2
|
|||||||
throw new \RuntimeException("Cannot connect to SSH $matches[1] servers");
|
throw new \RuntimeException("Cannot connect to SSH $matches[1] servers");
|
||||||
}
|
}
|
||||||
|
|
||||||
$response = $this->get_binary_packet();
|
if (!$this->send_id_string_first) {
|
||||||
if ($response === false) {
|
fputs($this->fsock, $this->identifier . "\r\n");
|
||||||
throw new \RuntimeException('Connection closed by server');
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!strlen($response) || ord($response[0]) != NET_SSH2_MSG_KEXINIT) {
|
if (!$this->send_kex_first) {
|
||||||
throw new \UnexpectedValueException('Expected SSH_MSG_KEXINIT');
|
$response = $this->get_binary_packet();
|
||||||
|
if ($response === false) {
|
||||||
|
throw new \RuntimeException('Connection closed by server');
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!strlen($response) || ord($response[0]) != NET_SSH2_MSG_KEXINIT) {
|
||||||
|
throw new \UnexpectedValueException('Expected SSH_MSG_KEXINIT');
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!$this->key_exchange($response)) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!$this->key_exchange($response)) {
|
if ($this->send_kex_first && !$this->key_exchange()) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1177,13 +1261,13 @@ class SSH2
|
|||||||
/**
|
/**
|
||||||
* Key Exchange
|
* Key Exchange
|
||||||
*
|
*
|
||||||
* @param string $kexinit_payload_server
|
* @param string $kexinit_payload_server optional
|
||||||
* @throws \UnexpectedValueException on receipt of unexpected packets
|
* @throws \UnexpectedValueException on receipt of unexpected packets
|
||||||
* @throws \RuntimeException on other errors
|
* @throws \RuntimeException on other errors
|
||||||
* @throws \phpseclib\Exception\NoSupportedAlgorithmsException when none of the algorithms phpseclib has loaded are compatible
|
* @throws \phpseclib\Exception\NoSupportedAlgorithmsException when none of the algorithms phpseclib has loaded are compatible
|
||||||
* @access private
|
* @access private
|
||||||
*/
|
*/
|
||||||
private function key_exchange($kexinit_payload_server)
|
private function key_exchange($kexinit_payload_server = false)
|
||||||
{
|
{
|
||||||
$kex_algorithms = [
|
$kex_algorithms = [
|
||||||
// Elliptic Curve Diffie-Hellman Key Agreement (ECDH) using
|
// Elliptic Curve Diffie-Hellman Key Agreement (ECDH) using
|
||||||
@ -1321,6 +1405,49 @@ class SSH2
|
|||||||
|
|
||||||
$client_cookie = Random::string(16);
|
$client_cookie = Random::string(16);
|
||||||
|
|
||||||
|
$kexinit_payload_client = pack(
|
||||||
|
'Ca*Na*Na*Na*Na*Na*Na*Na*Na*Na*Na*CN',
|
||||||
|
NET_SSH2_MSG_KEXINIT,
|
||||||
|
$client_cookie,
|
||||||
|
strlen($str_kex_algorithms),
|
||||||
|
$str_kex_algorithms,
|
||||||
|
strlen($str_server_host_key_algorithms),
|
||||||
|
$str_server_host_key_algorithms,
|
||||||
|
strlen($encryption_algorithms_client_to_server),
|
||||||
|
$encryption_algorithms_client_to_server,
|
||||||
|
strlen($encryption_algorithms_server_to_client),
|
||||||
|
$encryption_algorithms_server_to_client,
|
||||||
|
strlen($mac_algorithms_client_to_server),
|
||||||
|
$mac_algorithms_client_to_server,
|
||||||
|
strlen($mac_algorithms_server_to_client),
|
||||||
|
$mac_algorithms_server_to_client,
|
||||||
|
strlen($compression_algorithms_client_to_server),
|
||||||
|
$compression_algorithms_client_to_server,
|
||||||
|
strlen($compression_algorithms_server_to_client),
|
||||||
|
$compression_algorithms_server_to_client,
|
||||||
|
0,
|
||||||
|
'',
|
||||||
|
0,
|
||||||
|
'',
|
||||||
|
0,
|
||||||
|
0
|
||||||
|
);
|
||||||
|
|
||||||
|
if ($this->send_kex_first) {
|
||||||
|
if (!$this->send_binary_packet($kexinit_payload_client)) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
$kexinit_payload_server = $this->get_binary_packet();
|
||||||
|
if ($kexinit_payload_server === false) {
|
||||||
|
throw new \RuntimeException('Connection closed by server');
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!strlen($kexinit_payload_server) || ord($kexinit_payload_server[0]) != NET_SSH2_MSG_KEXINIT) {
|
||||||
|
throw new \UnexpectedValueException('Expected SSH_MSG_KEXINIT');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
$response = $kexinit_payload_server;
|
$response = $kexinit_payload_server;
|
||||||
Strings::shift($response, 1); // skip past the message number (it should be SSH_MSG_KEXINIT)
|
Strings::shift($response, 1); // skip past the message number (it should be SSH_MSG_KEXINIT)
|
||||||
$server_cookie = Strings::shift($response, 16);
|
$server_cookie = Strings::shift($response, 16);
|
||||||
@ -1392,39 +1519,9 @@ class SSH2
|
|||||||
|
|
||||||
$first_kex_packet_follows = $first_kex_packet_follows != 0;
|
$first_kex_packet_follows = $first_kex_packet_follows != 0;
|
||||||
|
|
||||||
// the sending of SSH2_MSG_KEXINIT could go in one of two places. this is the second place.
|
if (!$this->send_kex_first && !$this->send_binary_packet($kexinit_payload_client)) {
|
||||||
$kexinit_payload_client = pack(
|
|
||||||
'Ca*Na*Na*Na*Na*Na*Na*Na*Na*Na*Na*CN',
|
|
||||||
NET_SSH2_MSG_KEXINIT,
|
|
||||||
$client_cookie,
|
|
||||||
strlen($str_kex_algorithms),
|
|
||||||
$str_kex_algorithms,
|
|
||||||
strlen($str_server_host_key_algorithms),
|
|
||||||
$str_server_host_key_algorithms,
|
|
||||||
strlen($encryption_algorithms_client_to_server),
|
|
||||||
$encryption_algorithms_client_to_server,
|
|
||||||
strlen($encryption_algorithms_server_to_client),
|
|
||||||
$encryption_algorithms_server_to_client,
|
|
||||||
strlen($mac_algorithms_client_to_server),
|
|
||||||
$mac_algorithms_client_to_server,
|
|
||||||
strlen($mac_algorithms_server_to_client),
|
|
||||||
$mac_algorithms_server_to_client,
|
|
||||||
strlen($compression_algorithms_client_to_server),
|
|
||||||
$compression_algorithms_client_to_server,
|
|
||||||
strlen($compression_algorithms_server_to_client),
|
|
||||||
$compression_algorithms_server_to_client,
|
|
||||||
0,
|
|
||||||
'',
|
|
||||||
0,
|
|
||||||
'',
|
|
||||||
0,
|
|
||||||
0
|
|
||||||
);
|
|
||||||
|
|
||||||
if (!$this->send_binary_packet($kexinit_payload_client)) {
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
// here ends the second place.
|
|
||||||
|
|
||||||
// we need to decide upon the symmetric encryption algorithms before we do the diffie-hellman key exchange
|
// we need to decide upon the symmetric encryption algorithms before we do the diffie-hellman key exchange
|
||||||
|
|
||||||
@ -4236,7 +4333,7 @@ class SSH2
|
|||||||
case $r->compare($q) >= 0:
|
case $r->compare($q) >= 0:
|
||||||
case $s->equals($zero):
|
case $s->equals($zero):
|
||||||
case $s->compare($q) >= 0:
|
case $s->compare($q) >= 0:
|
||||||
$this->disconnectHepler(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
$this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
||||||
throw new \RuntimeException('Invalid signature');
|
throw new \RuntimeException('Invalid signature');
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -215,20 +215,20 @@ class Unit_Crypt_RC4Test extends PhpseclibTestCase
|
|||||||
{
|
{
|
||||||
$objects = $engines = array();
|
$objects = $engines = array();
|
||||||
$temp = new RC4(RC4::MODE_CTR);
|
$temp = new RC4(RC4::MODE_CTR);
|
||||||
$temp->setPreferredEngine(RC4::ENGINE_INTERNAL);
|
$temp->setPreferredEngine('internal');
|
||||||
$objects[] = $temp;
|
$objects[] = $temp;
|
||||||
$engines[] = 'internal';
|
$engines[] = 'internal';
|
||||||
|
|
||||||
if ($temp->isValidEngine(RC4::ENGINE_MCRYPT)) {
|
if ($temp->isValidEngine('mcrypt')) {
|
||||||
$temp = new RC4(RC4::MODE_CTR);
|
$temp = new RC4(RC4::MODE_CTR);
|
||||||
$temp->setPreferredEngine(RC4::ENGINE_MCRYPT);
|
$temp->setPreferredEngine('mcrypt');
|
||||||
$objects[] = $temp;
|
$objects[] = $temp;
|
||||||
$engines[] = 'mcrypt';
|
$engines[] = 'mcrypt';
|
||||||
}
|
}
|
||||||
|
|
||||||
if ($temp->isValidEngine(RC4::ENGINE_OPENSSL)) {
|
if ($temp->isValidEngine('openssl')) {
|
||||||
$temp = new RC4(RC4::MODE_CTR);
|
$temp = new RC4(RC4::MODE_CTR);
|
||||||
$temp->setPreferredEngine(RC4::ENGINE_OPENSSL);
|
$temp->setPreferredEngine('openssl');
|
||||||
$objects[] = $temp;
|
$objects[] = $temp;
|
||||||
$engines[] = 'OpenSSL';
|
$engines[] = 'OpenSSL';
|
||||||
}
|
}
|
||||||
|
@ -167,7 +167,7 @@ class Unit_Crypt_TripleDESTest extends PhpseclibTestCase
|
|||||||
$des->disablePadding();
|
$des->disablePadding();
|
||||||
$result = $des->encrypt($plaintext);
|
$result = $des->encrypt($plaintext);
|
||||||
$plaintext = bin2hex($plaintext);
|
$plaintext = bin2hex($plaintext);
|
||||||
$this->assertEquals($result, $expected, "Failed asserting that $plaintext yielded expected output in $engin engine");
|
$this->assertEquals($result, $expected, "Failed asserting that $plaintext yielded expected output in $engine engine");
|
||||||
}
|
}
|
||||||
|
|
||||||
public function testInnerChaining()
|
public function testInnerChaining()
|
||||||
|
@ -44,4 +44,22 @@ class Unit_File_ANSITest extends PhpseclibTestCase
|
|||||||
|
|
||||||
$this->assertSame($ansi->getScreen(), $expected);
|
$this->assertSame($ansi->getScreen(), $expected);
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
public function testLineOverflow()
|
||||||
|
{
|
||||||
|
$str = '';
|
||||||
|
foreach (range('a', 'y') as $char) {
|
||||||
|
$str.= "$char\r\n";
|
||||||
|
}
|
||||||
|
$str.= str_repeat('z', 100);
|
||||||
|
|
||||||
|
$ansi = new ANSI();
|
||||||
|
$ansi->appendString($str);
|
||||||
|
|
||||||
|
$screen = $ansi->getScreen();
|
||||||
|
|
||||||
|
$lines = explode("\r\n", $screen);
|
||||||
|
$this->assertSame(24, count($lines));
|
||||||
|
$this->assertSame(str_repeat('z', 80), $lines[22]);
|
||||||
|
}
|
||||||
|
}
|
24
tests/Unit/File/X509/CRLTest.php
Normal file
24
tests/Unit/File/X509/CRLTest.php
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
<?php
|
||||||
|
/**
|
||||||
|
* @author Jim Wigginton <terrafrost@php.net>
|
||||||
|
* @copyright 2017 Jim Wigginton
|
||||||
|
* @license http://www.opensource.org/licenses/mit-license.html MIT License
|
||||||
|
*/
|
||||||
|
|
||||||
|
use phpseclib\File\X509;
|
||||||
|
|
||||||
|
class Unit_File_X509_CRLTest extends PhpseclibTestCase
|
||||||
|
{
|
||||||
|
public function testLoadCRL()
|
||||||
|
{
|
||||||
|
$test = file_get_contents(__DIR__ . '/crl.bin');
|
||||||
|
|
||||||
|
$x509 = new X509();
|
||||||
|
|
||||||
|
$x509->loadCRL($test);
|
||||||
|
|
||||||
|
$reason = $x509->getRevokedCertificateExtension('9048354325167497831898969642461237543', 'id-ce-cRLReasons');
|
||||||
|
|
||||||
|
$this->assertSame('unspecified', $reason);
|
||||||
|
}
|
||||||
|
}
|
@ -181,6 +181,7 @@ aBtsWpliLSex/HHhtRW9AkBGcq67zKmEpJ9kXcYLEjJii3flFS+Ct/rNm+Hhm1l7
|
|||||||
$issuer->setDN($subject->getDN());
|
$issuer->setDN($subject->getDN());
|
||||||
|
|
||||||
$x509 = new X509();
|
$x509 = new X509();
|
||||||
|
$x509->setEndDate('lifetime');
|
||||||
|
|
||||||
$result = $x509->sign($issuer, $subject);
|
$result = $x509->sign($issuer, $subject);
|
||||||
$cert = $x509->saveX509($result);
|
$cert = $x509->saveX509($result);
|
||||||
|
BIN
tests/Unit/File/X509/crl.bin
Normal file
BIN
tests/Unit/File/X509/crl.bin
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user