mirror of
https://github.com/phpseclib/phpseclib.git
synced 2024-11-11 16:15:52 +00:00
Merge branch '1.0' into 2.0
This commit is contained in:
commit
2b08c31fb7
@ -1541,8 +1541,8 @@ class SSH2
|
|||||||
if ($kex_algorithm === 'curve25519-sha256@libssh.org') {
|
if ($kex_algorithm === 'curve25519-sha256@libssh.org') {
|
||||||
$x = Random::string(32);
|
$x = Random::string(32);
|
||||||
$eBytes = sodium_crypto_box_publickey_from_secretkey($x);
|
$eBytes = sodium_crypto_box_publickey_from_secretkey($x);
|
||||||
$clientKexInitMessage = NET_SSH2_MSG_KEX_ECDH_INIT;
|
$clientKexInitMessage = 'NET_SSH2_MSG_KEX_ECDH_INIT';
|
||||||
$serverKexReplyMessage = NET_SSH2_MSG_KEX_ECDH_REPLY;
|
$serverKexReplyMessage = 'NET_SSH2_MSG_KEX_ECDH_REPLY';
|
||||||
$kexHash = new Hash('sha256');
|
$kexHash = new Hash('sha256');
|
||||||
} else {
|
} else {
|
||||||
if (strpos($kex_algorithm, 'diffie-hellman-group-exchange') === 0) {
|
if (strpos($kex_algorithm, 'diffie-hellman-group-exchange') === 0) {
|
||||||
@ -1596,8 +1596,8 @@ class SSH2
|
|||||||
$gBytes
|
$gBytes
|
||||||
);
|
);
|
||||||
|
|
||||||
$clientKexInitMessage = NET_SSH2_MSG_KEXDH_GEX_INIT;
|
$clientKexInitMessage = 'NET_SSH2_MSG_KEXDH_GEX_INIT';
|
||||||
$serverKexReplyMessage = NET_SSH2_MSG_KEXDH_GEX_REPLY;
|
$serverKexReplyMessage = 'NET_SSH2_MSG_KEXDH_GEX_REPLY';
|
||||||
} else {
|
} else {
|
||||||
switch ($kex_algorithm) {
|
switch ($kex_algorithm) {
|
||||||
// see http://tools.ietf.org/html/rfc2409#section-6.2 and
|
// see http://tools.ietf.org/html/rfc2409#section-6.2 and
|
||||||
@ -1624,8 +1624,8 @@ class SSH2
|
|||||||
// the generator field element is 2 (decimal) and the hash function is sha1.
|
// the generator field element is 2 (decimal) and the hash function is sha1.
|
||||||
$g = new BigInteger(2);
|
$g = new BigInteger(2);
|
||||||
$prime = new BigInteger($prime, 16);
|
$prime = new BigInteger($prime, 16);
|
||||||
$clientKexInitMessage = NET_SSH2_MSG_KEXDH_INIT;
|
$clientKexInitMessage = 'NET_SSH2_MSG_KEXDH_INIT';
|
||||||
$serverKexReplyMessage = NET_SSH2_MSG_KEXDH_REPLY;
|
$serverKexReplyMessage = 'NET_SSH2_MSG_KEXDH_REPLY';
|
||||||
}
|
}
|
||||||
|
|
||||||
switch ($kex_algorithm) {
|
switch ($kex_algorithm) {
|
||||||
@ -1653,13 +1653,20 @@ class SSH2
|
|||||||
|
|
||||||
$eBytes = $e->toBytes(true);
|
$eBytes = $e->toBytes(true);
|
||||||
}
|
}
|
||||||
$data = pack('CNa*', $clientKexInitMessage, strlen($eBytes), $eBytes);
|
$data = pack('CNa*', constant($clientKexInitMessage), strlen($eBytes), $eBytes);
|
||||||
|
|
||||||
if (!$this->_send_binary_packet($data)) {
|
if (!$this->_send_binary_packet($data)) {
|
||||||
$this->bitmap = 0;
|
$this->bitmap = 0;
|
||||||
user_error('Connection closed by server');
|
user_error('Connection closed by server');
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
switch ($clientKexInitMessage) {
|
||||||
|
case 'NET_SSH2_MSG_KEX_ECDH_INIT':
|
||||||
|
$this->_updateLogHistory('NET_SSH2_MSG_KEXDH_INIT', 'NET_SSH2_MSG_KEX_ECDH_INIT');
|
||||||
|
break;
|
||||||
|
case 'NET_SSH2_MSG_KEXDH_GEX_INIT':
|
||||||
|
$this->_updateLogHistory('UNKNOWN', 'NET_SSH2_MSG_KEXDH_GEX_INIT');
|
||||||
|
}
|
||||||
|
|
||||||
$response = $this->_get_binary_packet();
|
$response = $this->_get_binary_packet();
|
||||||
if ($response === false) {
|
if ($response === false) {
|
||||||
@ -1672,10 +1679,17 @@ class SSH2
|
|||||||
}
|
}
|
||||||
extract(unpack('Ctype', $this->_string_shift($response, 1)));
|
extract(unpack('Ctype', $this->_string_shift($response, 1)));
|
||||||
|
|
||||||
if ($type != $serverKexReplyMessage) {
|
if ($type != constant($serverKexReplyMessage)) {
|
||||||
user_error('Expected SSH_MSG_KEXDH_REPLY');
|
user_error("Expected $serverKexReplyMessage");
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
switch ($serverKexReplyMessage) {
|
||||||
|
case 'NET_SSH2_MSG_KEX_ECDH_REPLY':
|
||||||
|
$this->_updateLogHistory('NET_SSH2_MSG_KEXDH_REPLY', 'NET_SSH2_MSG_KEX_ECDH_REPLY');
|
||||||
|
break;
|
||||||
|
case 'NET_SSH2_MSG_KEXDH_GEX_REPLY':
|
||||||
|
$this->_updateLogHistory('UNKNOWN', 'NET_SSH2_MSG_KEXDH_GEX_REPLY');
|
||||||
|
}
|
||||||
|
|
||||||
if (strlen($response) < 4) {
|
if (strlen($response) < 4) {
|
||||||
return false;
|
return false;
|
||||||
@ -2298,9 +2312,7 @@ class SSH2
|
|||||||
|
|
||||||
switch ($type) {
|
switch ($type) {
|
||||||
case NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ: // in theory, the password can be changed
|
case NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ: // in theory, the password can be changed
|
||||||
if (defined('NET_SSH2_LOGGING')) {
|
$this->_updateLogHistory('UNKNOWN', 'NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ');
|
||||||
$this->message_number_log[count($this->message_number_log) - 1] = 'NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ';
|
|
||||||
}
|
|
||||||
if (strlen($response) < 4) {
|
if (strlen($response) < 4) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
@ -2451,12 +2463,8 @@ class SSH2
|
|||||||
// see http://tools.ietf.org/html/rfc4256#section-3.2
|
// see http://tools.ietf.org/html/rfc4256#section-3.2
|
||||||
if (strlen($this->last_interactive_response)) {
|
if (strlen($this->last_interactive_response)) {
|
||||||
$this->last_interactive_response = '';
|
$this->last_interactive_response = '';
|
||||||
} elseif (defined('NET_SSH2_LOGGING')) {
|
} else {
|
||||||
$this->message_number_log[count($this->message_number_log) - 1] = str_replace(
|
$this->_updateLogHistory('UNKNOWN', 'NET_SSH2_MSG_USERAUTH_INFO_REQUEST');
|
||||||
'UNKNOWN',
|
|
||||||
'NET_SSH2_MSG_USERAUTH_INFO_REQUEST',
|
|
||||||
$this->message_number_log[count($this->message_number_log) - 1]
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!count($responses) && $num_prompts) {
|
if (!count($responses) && $num_prompts) {
|
||||||
@ -2479,13 +2487,7 @@ class SSH2
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (defined('NET_SSH2_LOGGING') && NET_SSH2_LOGGING == self::LOG_COMPLEX) {
|
$this->_updateLogHistory('UNKNOWN', 'NET_SSH2_MSG_USERAUTH_INFO_RESPONSE');
|
||||||
$this->message_number_log[count($this->message_number_log) - 1] = str_replace(
|
|
||||||
'UNKNOWN',
|
|
||||||
'NET_SSH2_MSG_USERAUTH_INFO_RESPONSE',
|
|
||||||
$this->message_number_log[count($this->message_number_log) - 1]
|
|
||||||
);
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
After receiving the response, the server MUST send either an
|
After receiving the response, the server MUST send either an
|
||||||
@ -2612,13 +2614,7 @@ class SSH2
|
|||||||
case NET_SSH2_MSG_USERAUTH_PK_OK:
|
case NET_SSH2_MSG_USERAUTH_PK_OK:
|
||||||
// we'll just take it on faith that the public key blob and the public key algorithm name are as
|
// we'll just take it on faith that the public key blob and the public key algorithm name are as
|
||||||
// they should be
|
// they should be
|
||||||
if (defined('NET_SSH2_LOGGING') && NET_SSH2_LOGGING == self::LOG_COMPLEX) {
|
$this->_updateLogHistory('UNKNOWN', 'NET_SSH2_MSG_USERAUTH_PK_OK');
|
||||||
$this->message_number_log[count($this->message_number_log) - 1] = str_replace(
|
|
||||||
'UNKNOWN',
|
|
||||||
'NET_SSH2_MSG_USERAUTH_PK_OK',
|
|
||||||
$this->message_number_log[count($this->message_number_log) - 1]
|
|
||||||
);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
$packet = $part1 . chr(1) . $part2;
|
$packet = $part1 . chr(1) . $part2;
|
||||||
@ -5060,4 +5056,22 @@ class SSH2
|
|||||||
$this->windowColumns = $columns;
|
$this->windowColumns = $columns;
|
||||||
$this->windowRows = $rows;
|
$this->windowRows = $rows;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Update packet types in log history
|
||||||
|
*
|
||||||
|
* @param string $old
|
||||||
|
* @param string $new
|
||||||
|
* @access private
|
||||||
|
*/
|
||||||
|
function _updateLogHistory($old, $new)
|
||||||
|
{
|
||||||
|
if (defined('NET_SSH2_LOGGING') && NET_SSH2_LOGGING == self::LOG_COMPLEX) {
|
||||||
|
$this->message_number_log[count($this->message_number_log) - 1] = str_replace(
|
||||||
|
$old,
|
||||||
|
$new,
|
||||||
|
$this->message_number_log[count($this->message_number_log) - 1]
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user