Version Description
2022/Dec/08 =
TWEAK: Update URL reference to current location
Download this release
Release Info
Developer | DavidAnderson |
Plugin | SSH SFTP Updater Support |
Version | 0.8.5 |
Comparing to | |
See all releases |
Code changes from version 0.8.4 to 0.8.5
- phpseclib/Crypt/Base.php +46 -22
- phpseclib/Crypt/Hash.php +1 -2
- phpseclib/Crypt/RSA.php +84 -20
- phpseclib/File/ANSI.php +24 -24
- phpseclib/File/ASN1.php +66 -21
- phpseclib/File/X509.php +21 -16
- phpseclib/Math/BigInteger.php +14 -14
- phpseclib/Net/SFTP.php +747 -125
- phpseclib/Net/SFTP/Stream.php +6 -5
- phpseclib/Net/SSH1.php +3 -2
- phpseclib/Net/SSH2.php +460 -162
- phpseclib/bootstrap.php +2 -1
- readme.txt +8 -4
- sftp.php +2 -2
phpseclib/Crypt/Base.php
CHANGED
@@ -821,12 +821,13 @@ class Crypt_Base
|
|
821 |
}
|
822 |
|
823 |
if ($this->engine === CRYPT_ENGINE_MCRYPT) {
|
|
|
824 |
if ($this->changed) {
|
825 |
$this->_setupMcrypt();
|
826 |
$this->changed = false;
|
827 |
}
|
828 |
if ($this->enchanged) {
|
829 |
-
|
830 |
$this->enchanged = false;
|
831 |
}
|
832 |
|
@@ -859,15 +860,15 @@ class Crypt_Base
|
|
859 |
if ($len >= $block_size) {
|
860 |
if ($this->enbuffer['enmcrypt_init'] === false || $len > $this->cfb_init_len) {
|
861 |
if ($this->enbuffer['enmcrypt_init'] === true) {
|
862 |
-
|
863 |
$this->enbuffer['enmcrypt_init'] = false;
|
864 |
}
|
865 |
-
$ciphertext.=
|
866 |
$iv = substr($ciphertext, -$block_size);
|
867 |
$len%= $block_size;
|
868 |
} else {
|
869 |
while ($len >= $block_size) {
|
870 |
-
$iv =
|
871 |
$ciphertext.= $iv;
|
872 |
$len-= $block_size;
|
873 |
$i+= $block_size;
|
@@ -876,22 +877,26 @@ class Crypt_Base
|
|
876 |
}
|
877 |
|
878 |
if ($len) {
|
879 |
-
$iv =
|
880 |
$block = $iv ^ substr($plaintext, -$len);
|
881 |
$iv = substr_replace($iv, $block, 0, $len);
|
882 |
$ciphertext.= $block;
|
883 |
$pos = $len;
|
884 |
}
|
885 |
|
|
|
|
|
886 |
return $ciphertext;
|
887 |
}
|
888 |
|
889 |
-
$ciphertext =
|
890 |
|
891 |
if (!$this->continuousBuffer) {
|
892 |
-
|
893 |
}
|
894 |
|
|
|
|
|
895 |
return $ciphertext;
|
896 |
}
|
897 |
|
@@ -1132,13 +1137,14 @@ class Crypt_Base
|
|
1132 |
}
|
1133 |
|
1134 |
if ($this->engine === CRYPT_ENGINE_MCRYPT) {
|
|
|
1135 |
$block_size = $this->block_size;
|
1136 |
if ($this->changed) {
|
1137 |
$this->_setupMcrypt();
|
1138 |
$this->changed = false;
|
1139 |
}
|
1140 |
if ($this->dechanged) {
|
1141 |
-
|
1142 |
$this->dechanged = false;
|
1143 |
}
|
1144 |
|
@@ -1166,26 +1172,30 @@ class Crypt_Base
|
|
1166 |
}
|
1167 |
if ($len >= $block_size) {
|
1168 |
$cb = substr($ciphertext, $i, $len - $len % $block_size);
|
1169 |
-
$plaintext.=
|
1170 |
$iv = substr($cb, -$block_size);
|
1171 |
$len%= $block_size;
|
1172 |
}
|
1173 |
if ($len) {
|
1174 |
-
$iv =
|
1175 |
$plaintext.= $iv ^ substr($ciphertext, -$len);
|
1176 |
$iv = substr_replace($iv, substr($ciphertext, -$len), 0, $len);
|
1177 |
$pos = $len;
|
1178 |
}
|
1179 |
|
|
|
|
|
1180 |
return $plaintext;
|
1181 |
}
|
1182 |
|
1183 |
-
$plaintext =
|
1184 |
|
1185 |
if (!$this->continuousBuffer) {
|
1186 |
-
|
1187 |
}
|
1188 |
|
|
|
|
|
1189 |
return $this->paddable ? $this->_unpad($plaintext) : $plaintext;
|
1190 |
}
|
1191 |
|
@@ -1643,9 +1653,12 @@ class Crypt_Base
|
|
1643 |
}
|
1644 |
return false;
|
1645 |
case CRYPT_ENGINE_MCRYPT:
|
1646 |
-
|
|
|
1647 |
extension_loaded('mcrypt') &&
|
1648 |
-
in_array($this->cipher_name_mcrypt,
|
|
|
|
|
1649 |
case CRYPT_ENGINE_INTERNAL:
|
1650 |
return true;
|
1651 |
}
|
@@ -1722,17 +1735,19 @@ class Crypt_Base
|
|
1722 |
}
|
1723 |
|
1724 |
if ($this->engine != CRYPT_ENGINE_MCRYPT && $this->enmcrypt) {
|
|
|
1725 |
// Closing the current mcrypt resource(s). _mcryptSetup() will, if needed,
|
1726 |
// (re)open them with the module named in $this->cipher_name_mcrypt
|
1727 |
-
|
1728 |
-
|
1729 |
$this->enmcrypt = null;
|
1730 |
$this->demcrypt = null;
|
1731 |
|
1732 |
if ($this->ecb) {
|
1733 |
-
|
1734 |
$this->ecb = null;
|
1735 |
}
|
|
|
1736 |
}
|
1737 |
|
1738 |
$this->changed = true;
|
@@ -1850,19 +1865,19 @@ class Crypt_Base
|
|
1850 |
CRYPT_MODE_STREAM => MCRYPT_MODE_STREAM,
|
1851 |
);
|
1852 |
|
1853 |
-
$this->demcrypt =
|
1854 |
-
$this->enmcrypt =
|
1855 |
|
1856 |
// we need the $ecb mcrypt resource (only) in MODE_CFB with enableContinuousBuffer()
|
1857 |
// to workaround mcrypt's broken ncfb implementation in buffered mode
|
1858 |
// see: {@link http://phpseclib.sourceforge.net/cfb-demo.phps}
|
1859 |
if ($this->mode == CRYPT_MODE_CFB) {
|
1860 |
-
$this->ecb =
|
1861 |
}
|
1862 |
} // else should mcrypt_generic_deinit be called?
|
1863 |
|
1864 |
if ($this->mode == CRYPT_MODE_CFB) {
|
1865 |
-
|
1866 |
}
|
1867 |
}
|
1868 |
|
@@ -2584,7 +2599,7 @@ class Crypt_Base
|
|
2584 |
*
|
2585 |
* @see self::_setupInlineCrypt()
|
2586 |
* @access private
|
2587 |
-
* @param $bytes
|
2588 |
* @return string
|
2589 |
*/
|
2590 |
function _hashInlineCryptFunction($bytes)
|
@@ -2657,4 +2672,13 @@ class Crypt_Base
|
|
2657 |
return $safeint . '((fmod(floor($temp / 0x80000000), 2) & 1) << 31))';
|
2658 |
}
|
2659 |
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2660 |
}
|
821 |
}
|
822 |
|
823 |
if ($this->engine === CRYPT_ENGINE_MCRYPT) {
|
824 |
+
set_error_handler(array($this, 'do_nothing'));
|
825 |
if ($this->changed) {
|
826 |
$this->_setupMcrypt();
|
827 |
$this->changed = false;
|
828 |
}
|
829 |
if ($this->enchanged) {
|
830 |
+
mcrypt_generic_init($this->enmcrypt, $this->key, $this->encryptIV);
|
831 |
$this->enchanged = false;
|
832 |
}
|
833 |
|
860 |
if ($len >= $block_size) {
|
861 |
if ($this->enbuffer['enmcrypt_init'] === false || $len > $this->cfb_init_len) {
|
862 |
if ($this->enbuffer['enmcrypt_init'] === true) {
|
863 |
+
mcrypt_generic_init($this->enmcrypt, $this->key, $iv);
|
864 |
$this->enbuffer['enmcrypt_init'] = false;
|
865 |
}
|
866 |
+
$ciphertext.= mcrypt_generic($this->enmcrypt, substr($plaintext, $i, $len - $len % $block_size));
|
867 |
$iv = substr($ciphertext, -$block_size);
|
868 |
$len%= $block_size;
|
869 |
} else {
|
870 |
while ($len >= $block_size) {
|
871 |
+
$iv = mcrypt_generic($this->ecb, $iv) ^ substr($plaintext, $i, $block_size);
|
872 |
$ciphertext.= $iv;
|
873 |
$len-= $block_size;
|
874 |
$i+= $block_size;
|
877 |
}
|
878 |
|
879 |
if ($len) {
|
880 |
+
$iv = mcrypt_generic($this->ecb, $iv);
|
881 |
$block = $iv ^ substr($plaintext, -$len);
|
882 |
$iv = substr_replace($iv, $block, 0, $len);
|
883 |
$ciphertext.= $block;
|
884 |
$pos = $len;
|
885 |
}
|
886 |
|
887 |
+
restore_error_handler();
|
888 |
+
|
889 |
return $ciphertext;
|
890 |
}
|
891 |
|
892 |
+
$ciphertext = mcrypt_generic($this->enmcrypt, $plaintext);
|
893 |
|
894 |
if (!$this->continuousBuffer) {
|
895 |
+
mcrypt_generic_init($this->enmcrypt, $this->key, $this->encryptIV);
|
896 |
}
|
897 |
|
898 |
+
restore_error_handler();
|
899 |
+
|
900 |
return $ciphertext;
|
901 |
}
|
902 |
|
1137 |
}
|
1138 |
|
1139 |
if ($this->engine === CRYPT_ENGINE_MCRYPT) {
|
1140 |
+
set_error_handler(array($this, 'do_nothing'));
|
1141 |
$block_size = $this->block_size;
|
1142 |
if ($this->changed) {
|
1143 |
$this->_setupMcrypt();
|
1144 |
$this->changed = false;
|
1145 |
}
|
1146 |
if ($this->dechanged) {
|
1147 |
+
mcrypt_generic_init($this->demcrypt, $this->key, $this->decryptIV);
|
1148 |
$this->dechanged = false;
|
1149 |
}
|
1150 |
|
1172 |
}
|
1173 |
if ($len >= $block_size) {
|
1174 |
$cb = substr($ciphertext, $i, $len - $len % $block_size);
|
1175 |
+
$plaintext.= mcrypt_generic($this->ecb, $iv . $cb) ^ $cb;
|
1176 |
$iv = substr($cb, -$block_size);
|
1177 |
$len%= $block_size;
|
1178 |
}
|
1179 |
if ($len) {
|
1180 |
+
$iv = mcrypt_generic($this->ecb, $iv);
|
1181 |
$plaintext.= $iv ^ substr($ciphertext, -$len);
|
1182 |
$iv = substr_replace($iv, substr($ciphertext, -$len), 0, $len);
|
1183 |
$pos = $len;
|
1184 |
}
|
1185 |
|
1186 |
+
restore_error_handler();
|
1187 |
+
|
1188 |
return $plaintext;
|
1189 |
}
|
1190 |
|
1191 |
+
$plaintext = mdecrypt_generic($this->demcrypt, $ciphertext);
|
1192 |
|
1193 |
if (!$this->continuousBuffer) {
|
1194 |
+
mcrypt_generic_init($this->demcrypt, $this->key, $this->decryptIV);
|
1195 |
}
|
1196 |
|
1197 |
+
restore_error_handler();
|
1198 |
+
|
1199 |
return $this->paddable ? $this->_unpad($plaintext) : $plaintext;
|
1200 |
}
|
1201 |
|
1653 |
}
|
1654 |
return false;
|
1655 |
case CRYPT_ENGINE_MCRYPT:
|
1656 |
+
set_error_handler(array($this, 'do_nothing'));
|
1657 |
+
$result = $this->cipher_name_mcrypt &&
|
1658 |
extension_loaded('mcrypt') &&
|
1659 |
+
in_array($this->cipher_name_mcrypt, mcrypt_list_algorithms());
|
1660 |
+
restore_error_handler();
|
1661 |
+
return $result;
|
1662 |
case CRYPT_ENGINE_INTERNAL:
|
1663 |
return true;
|
1664 |
}
|
1735 |
}
|
1736 |
|
1737 |
if ($this->engine != CRYPT_ENGINE_MCRYPT && $this->enmcrypt) {
|
1738 |
+
set_error_handler(array($this, 'do_nothing'));
|
1739 |
// Closing the current mcrypt resource(s). _mcryptSetup() will, if needed,
|
1740 |
// (re)open them with the module named in $this->cipher_name_mcrypt
|
1741 |
+
mcrypt_module_close($this->enmcrypt);
|
1742 |
+
mcrypt_module_close($this->demcrypt);
|
1743 |
$this->enmcrypt = null;
|
1744 |
$this->demcrypt = null;
|
1745 |
|
1746 |
if ($this->ecb) {
|
1747 |
+
mcrypt_module_close($this->ecb);
|
1748 |
$this->ecb = null;
|
1749 |
}
|
1750 |
+
restore_error_handler();
|
1751 |
}
|
1752 |
|
1753 |
$this->changed = true;
|
1865 |
CRYPT_MODE_STREAM => MCRYPT_MODE_STREAM,
|
1866 |
);
|
1867 |
|
1868 |
+
$this->demcrypt = mcrypt_module_open($this->cipher_name_mcrypt, '', $mcrypt_modes[$this->mode], '');
|
1869 |
+
$this->enmcrypt = mcrypt_module_open($this->cipher_name_mcrypt, '', $mcrypt_modes[$this->mode], '');
|
1870 |
|
1871 |
// we need the $ecb mcrypt resource (only) in MODE_CFB with enableContinuousBuffer()
|
1872 |
// to workaround mcrypt's broken ncfb implementation in buffered mode
|
1873 |
// see: {@link http://phpseclib.sourceforge.net/cfb-demo.phps}
|
1874 |
if ($this->mode == CRYPT_MODE_CFB) {
|
1875 |
+
$this->ecb = mcrypt_module_open($this->cipher_name_mcrypt, '', MCRYPT_MODE_ECB, '');
|
1876 |
}
|
1877 |
} // else should mcrypt_generic_deinit be called?
|
1878 |
|
1879 |
if ($this->mode == CRYPT_MODE_CFB) {
|
1880 |
+
mcrypt_generic_init($this->ecb, $this->key, str_repeat("\0", $this->block_size));
|
1881 |
}
|
1882 |
}
|
1883 |
|
2599 |
*
|
2600 |
* @see self::_setupInlineCrypt()
|
2601 |
* @access private
|
2602 |
+
* @param string $bytes
|
2603 |
* @return string
|
2604 |
*/
|
2605 |
function _hashInlineCryptFunction($bytes)
|
2672 |
return $safeint . '((fmod(floor($temp / 0x80000000), 2) & 1) << 31))';
|
2673 |
}
|
2674 |
}
|
2675 |
+
|
2676 |
+
/**
|
2677 |
+
* Dummy error handler to suppress mcrypt errors
|
2678 |
+
*
|
2679 |
+
* @access private
|
2680 |
+
*/
|
2681 |
+
function do_nothing()
|
2682 |
+
{
|
2683 |
+
}
|
2684 |
}
|
phpseclib/Crypt/Hash.php
CHANGED
@@ -191,7 +191,7 @@ class Crypt_Hash
|
|
191 |
* PHP4 compatible Default Constructor.
|
192 |
*
|
193 |
* @see self::__construct()
|
194 |
-
* @param
|
195 |
* @access public
|
196 |
*/
|
197 |
function Crypt_Hash($hash = 'sha1')
|
@@ -879,7 +879,6 @@ class Crypt_Hash
|
|
879 |
* _sha256() adds multiple unsigned 32-bit integers. Since PHP doesn't support unsigned integers and since the
|
880 |
* possibility of overflow exists, care has to be taken. Math_BigInteger() could be used but this should be faster.
|
881 |
*
|
882 |
-
* @param int $...
|
883 |
* @return int
|
884 |
* @see self::_sha256()
|
885 |
* @access private
|
191 |
* PHP4 compatible Default Constructor.
|
192 |
*
|
193 |
* @see self::__construct()
|
194 |
+
* @param string $hash
|
195 |
* @access public
|
196 |
*/
|
197 |
function Crypt_Hash($hash = 'sha1')
|
879 |
* _sha256() adds multiple unsigned 32-bit integers. Since PHP doesn't support unsigned integers and since the
|
880 |
* possibility of overflow exists, care has to be taken. Math_BigInteger() could be used but this should be faster.
|
881 |
*
|
|
|
882 |
* @return int
|
883 |
* @see self::_sha256()
|
884 |
* @access private
|
phpseclib/Crypt/RSA.php
CHANGED
@@ -515,7 +515,7 @@ class Crypt_RSA
|
|
515 |
case !function_exists('openssl_pkey_get_details'):
|
516 |
define('CRYPT_RSA_MODE', CRYPT_RSA_MODE_INTERNAL);
|
517 |
break;
|
518 |
-
case extension_loaded('openssl') && version_compare(PHP_VERSION, '4.2.0', '>=') && file_exists($this->configFile):
|
519 |
// some versions of XAMPP have mismatched versions of OpenSSL which causes it not to work
|
520 |
ob_start();
|
521 |
@phpinfo();
|
@@ -589,7 +589,7 @@ class Crypt_RSA
|
|
589 |
* @access public
|
590 |
* @param int $bits
|
591 |
* @param int $timeout
|
592 |
-
* @param
|
593 |
*/
|
594 |
function createKey($bits = 1024, $timeout = false, $partial = array())
|
595 |
{
|
@@ -768,7 +768,12 @@ class Crypt_RSA
|
|
768 |
*
|
769 |
* @access private
|
770 |
* @see self::setPrivateKeyFormat()
|
771 |
-
* @param
|
|
|
|
|
|
|
|
|
|
|
772 |
* @return string
|
773 |
*/
|
774 |
function _convertPrivateKey($n, $e, $d, $primes, $exponents, $coefficients)
|
@@ -931,9 +936,9 @@ class Crypt_RSA
|
|
931 |
);
|
932 |
$key = "openssh-key-v1\0$key";
|
933 |
|
934 |
-
return "-----BEGIN OPENSSH PRIVATE KEY-----\
|
935 |
-
chunk_split(base64_encode($key), 70) .
|
936 |
-
"-----END OPENSSH PRIVATE KEY
|
937 |
default: // eg. CRYPT_RSA_PRIVATE_FORMAT_PKCS1
|
938 |
$components = array();
|
939 |
foreach ($raw as $name => $value) {
|
@@ -1061,8 +1066,9 @@ class Crypt_RSA
|
|
1061 |
*
|
1062 |
* @access private
|
1063 |
* @see self::setPublicKeyFormat()
|
1064 |
-
* @param
|
1065 |
-
* @
|
|
|
1066 |
*/
|
1067 |
function _convertPublicKey($n, $e)
|
1068 |
{
|
@@ -1292,6 +1298,7 @@ class Crypt_RSA
|
|
1292 |
$length = $this->_decodeLength($temp);
|
1293 |
switch ($this->_string_shift($temp, $length)) {
|
1294 |
case "\x2a\x86\x48\x86\xf7\x0d\x01\x01\x01": // rsaEncryption
|
|
|
1295 |
break;
|
1296 |
case "\x2a\x86\x48\x86\xf7\x0d\x01\x05\x03": // pbeWithMD5AndDES-CBC
|
1297 |
/*
|
@@ -1624,6 +1631,8 @@ class Crypt_RSA
|
|
1624 |
|
1625 |
return $components;
|
1626 |
}
|
|
|
|
|
1627 |
}
|
1628 |
|
1629 |
/**
|
@@ -1962,7 +1971,6 @@ class Crypt_RSA
|
|
1962 |
*
|
1963 |
* @see self::getPublicKey()
|
1964 |
* @access public
|
1965 |
-
* @param string $key
|
1966 |
* @param int $type optional
|
1967 |
*/
|
1968 |
function getPublicKey($type = CRYPT_RSA_PUBLIC_FORMAT_PKCS8)
|
@@ -2020,7 +2028,6 @@ class Crypt_RSA
|
|
2020 |
*
|
2021 |
* @see self::getPublicKey()
|
2022 |
* @access public
|
2023 |
-
* @param string $key
|
2024 |
* @param int $type optional
|
2025 |
* @return mixed
|
2026 |
*/
|
@@ -2045,8 +2052,7 @@ class Crypt_RSA
|
|
2045 |
*
|
2046 |
* @see self::getPrivateKey()
|
2047 |
* @access private
|
2048 |
-
* @param
|
2049 |
-
* @param int $type optional
|
2050 |
*/
|
2051 |
function _getPrivatePublicKey($mode = CRYPT_RSA_PUBLIC_FORMAT_PKCS8)
|
2052 |
{
|
@@ -2263,7 +2269,7 @@ class Crypt_RSA
|
|
2263 |
* of the hash function Hash) and 0.
|
2264 |
*
|
2265 |
* @access public
|
2266 |
-
* @param int $
|
2267 |
*/
|
2268 |
function setSaltLength($sLen)
|
2269 |
{
|
@@ -2296,7 +2302,7 @@ class Crypt_RSA
|
|
2296 |
* See {@link http://tools.ietf.org/html/rfc3447#section-4.2 RFC3447#section-4.2}.
|
2297 |
*
|
2298 |
* @access private
|
2299 |
-
* @param string $x
|
2300 |
* @return Math_BigInteger
|
2301 |
*/
|
2302 |
function _os2ip($x)
|
@@ -2523,7 +2529,7 @@ class Crypt_RSA
|
|
2523 |
*
|
2524 |
* @access private
|
2525 |
* @param string $mgfSeed
|
2526 |
-
* @param int $
|
2527 |
* @return string
|
2528 |
*/
|
2529 |
function _mgf1($mgfSeed, $maskLen)
|
@@ -2658,9 +2664,9 @@ class Crypt_RSA
|
|
2658 |
$offset+= $patternMatch ? 0 : 1;
|
2659 |
}
|
2660 |
|
2661 |
-
// we do
|
2662 |
// to protect against timing attacks
|
2663 |
-
if (!$hashesMatch
|
2664 |
user_error('Decryption error');
|
2665 |
return false;
|
2666 |
}
|
@@ -2995,6 +3001,59 @@ class Crypt_RSA
|
|
2995 |
return $em;
|
2996 |
}
|
2997 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2998 |
/**
|
2999 |
* RSASSA-PKCS1-V1_5-SIGN
|
3000 |
*
|
@@ -3032,6 +3091,7 @@ class Crypt_RSA
|
|
3032 |
*
|
3033 |
* @access private
|
3034 |
* @param string $m
|
|
|
3035 |
* @return string
|
3036 |
*/
|
3037 |
function _rsassa_pkcs1_v1_5_verify($m, $s)
|
@@ -3060,13 +3120,17 @@ class Crypt_RSA
|
|
3060 |
// EMSA-PKCS1-v1_5 encoding
|
3061 |
|
3062 |
$em2 = $this->_emsa_pkcs1_v1_5_encode($m, $this->k);
|
3063 |
-
|
|
|
|
|
3064 |
user_error('RSA modulus too short');
|
3065 |
return false;
|
3066 |
}
|
3067 |
|
3068 |
// Compare
|
3069 |
-
|
|
|
|
|
3070 |
}
|
3071 |
|
3072 |
/**
|
@@ -3172,7 +3236,7 @@ class Crypt_RSA
|
|
3172 |
*
|
3173 |
* @see self::encrypt()
|
3174 |
* @access public
|
3175 |
-
* @param string $
|
3176 |
* @return string
|
3177 |
*/
|
3178 |
function decrypt($ciphertext)
|
515 |
case !function_exists('openssl_pkey_get_details'):
|
516 |
define('CRYPT_RSA_MODE', CRYPT_RSA_MODE_INTERNAL);
|
517 |
break;
|
518 |
+
case function_exists('phpinfo') && extension_loaded('openssl') && version_compare(PHP_VERSION, '4.2.0', '>=') && file_exists($this->configFile):
|
519 |
// some versions of XAMPP have mismatched versions of OpenSSL which causes it not to work
|
520 |
ob_start();
|
521 |
@phpinfo();
|
589 |
* @access public
|
590 |
* @param int $bits
|
591 |
* @param int $timeout
|
592 |
+
* @param array $partial
|
593 |
*/
|
594 |
function createKey($bits = 1024, $timeout = false, $partial = array())
|
595 |
{
|
768 |
*
|
769 |
* @access private
|
770 |
* @see self::setPrivateKeyFormat()
|
771 |
+
* @param Math_BigInteger $n
|
772 |
+
* @param Math_BigInteger $e
|
773 |
+
* @param Math_BigInteger $d
|
774 |
+
* @param array<int,Math_BigInteger> $primes
|
775 |
+
* @param array<int,Math_BigInteger> $exponents
|
776 |
+
* @param array<int,Math_BigInteger> $coefficients
|
777 |
* @return string
|
778 |
*/
|
779 |
function _convertPrivateKey($n, $e, $d, $primes, $exponents, $coefficients)
|
936 |
);
|
937 |
$key = "openssh-key-v1\0$key";
|
938 |
|
939 |
+
return "-----BEGIN OPENSSH PRIVATE KEY-----\n" .
|
940 |
+
chunk_split(base64_encode($key), 70, "\n") .
|
941 |
+
"-----END OPENSSH PRIVATE KEY-----\n";
|
942 |
default: // eg. CRYPT_RSA_PRIVATE_FORMAT_PKCS1
|
943 |
$components = array();
|
944 |
foreach ($raw as $name => $value) {
|
1066 |
*
|
1067 |
* @access private
|
1068 |
* @see self::setPublicKeyFormat()
|
1069 |
+
* @param Math_BigInteger $n
|
1070 |
+
* @param Math_BigInteger $e
|
1071 |
+
* @return string|array<string,Math_BigInteger>
|
1072 |
*/
|
1073 |
function _convertPublicKey($n, $e)
|
1074 |
{
|
1298 |
$length = $this->_decodeLength($temp);
|
1299 |
switch ($this->_string_shift($temp, $length)) {
|
1300 |
case "\x2a\x86\x48\x86\xf7\x0d\x01\x01\x01": // rsaEncryption
|
1301 |
+
case "\x2A\x86\x48\x86\xF7\x0D\x01\x01\x0A": // rsaPSS
|
1302 |
break;
|
1303 |
case "\x2a\x86\x48\x86\xf7\x0d\x01\x05\x03": // pbeWithMD5AndDES-CBC
|
1304 |
/*
|
1631 |
|
1632 |
return $components;
|
1633 |
}
|
1634 |
+
|
1635 |
+
return false;
|
1636 |
}
|
1637 |
|
1638 |
/**
|
1971 |
*
|
1972 |
* @see self::getPublicKey()
|
1973 |
* @access public
|
|
|
1974 |
* @param int $type optional
|
1975 |
*/
|
1976 |
function getPublicKey($type = CRYPT_RSA_PUBLIC_FORMAT_PKCS8)
|
2028 |
*
|
2029 |
* @see self::getPublicKey()
|
2030 |
* @access public
|
|
|
2031 |
* @param int $type optional
|
2032 |
* @return mixed
|
2033 |
*/
|
2052 |
*
|
2053 |
* @see self::getPrivateKey()
|
2054 |
* @access private
|
2055 |
+
* @param int $mode optional
|
|
|
2056 |
*/
|
2057 |
function _getPrivatePublicKey($mode = CRYPT_RSA_PUBLIC_FORMAT_PKCS8)
|
2058 |
{
|
2269 |
* of the hash function Hash) and 0.
|
2270 |
*
|
2271 |
* @access public
|
2272 |
+
* @param int $sLen
|
2273 |
*/
|
2274 |
function setSaltLength($sLen)
|
2275 |
{
|
2302 |
* See {@link http://tools.ietf.org/html/rfc3447#section-4.2 RFC3447#section-4.2}.
|
2303 |
*
|
2304 |
* @access private
|
2305 |
+
* @param int|string|resource $x
|
2306 |
* @return Math_BigInteger
|
2307 |
*/
|
2308 |
function _os2ip($x)
|
2529 |
*
|
2530 |
* @access private
|
2531 |
* @param string $mgfSeed
|
2532 |
+
* @param int $maskLen
|
2533 |
* @return string
|
2534 |
*/
|
2535 |
function _mgf1($mgfSeed, $maskLen)
|
2664 |
$offset+= $patternMatch ? 0 : 1;
|
2665 |
}
|
2666 |
|
2667 |
+
// we do | instead of || to avoid https://en.wikipedia.org/wiki/Short-circuit_evaluation
|
2668 |
// to protect against timing attacks
|
2669 |
+
if (!$hashesMatch | !$patternMatch) {
|
2670 |
user_error('Decryption error');
|
2671 |
return false;
|
2672 |
}
|
3001 |
return $em;
|
3002 |
}
|
3003 |
|
3004 |
+
/**
|
3005 |
+
* EMSA-PKCS1-V1_5-ENCODE (without NULL)
|
3006 |
+
*
|
3007 |
+
* Quoting https://tools.ietf.org/html/rfc8017#page-65,
|
3008 |
+
*
|
3009 |
+
* "The parameters field associated with id-sha1, id-sha224, id-sha256,
|
3010 |
+
* id-sha384, id-sha512, id-sha512/224, and id-sha512/256 should
|
3011 |
+
* generally be omitted, but if present, it shall have a value of type
|
3012 |
+
* NULL"
|
3013 |
+
*
|
3014 |
+
* @access private
|
3015 |
+
* @param string $m
|
3016 |
+
* @param int $emLen
|
3017 |
+
* @return string
|
3018 |
+
*/
|
3019 |
+
function _emsa_pkcs1_v1_5_encode_without_null($m, $emLen)
|
3020 |
+
{
|
3021 |
+
$h = $this->hash->hash($m);
|
3022 |
+
if ($h === false) {
|
3023 |
+
return false;
|
3024 |
+
}
|
3025 |
+
|
3026 |
+
switch ($this->hashName) {
|
3027 |
+
case 'sha1':
|
3028 |
+
$t = pack('H*', '301f300706052b0e03021a0414');
|
3029 |
+
break;
|
3030 |
+
case 'sha256':
|
3031 |
+
$t = pack('H*', '302f300b06096086480165030402010420');
|
3032 |
+
break;
|
3033 |
+
case 'sha384':
|
3034 |
+
$t = pack('H*', '303f300b06096086480165030402020430');
|
3035 |
+
break;
|
3036 |
+
case 'sha512':
|
3037 |
+
$t = pack('H*', '304f300b06096086480165030402030440');
|
3038 |
+
break;
|
3039 |
+
default:
|
3040 |
+
return false;
|
3041 |
+
}
|
3042 |
+
$t.= $h;
|
3043 |
+
$tLen = strlen($t);
|
3044 |
+
|
3045 |
+
if ($emLen < $tLen + 11) {
|
3046 |
+
user_error('Intended encoded message length too short');
|
3047 |
+
return false;
|
3048 |
+
}
|
3049 |
+
|
3050 |
+
$ps = str_repeat(chr(0xFF), $emLen - $tLen - 3);
|
3051 |
+
|
3052 |
+
$em = "\0\1$ps\0$t";
|
3053 |
+
|
3054 |
+
return $em;
|
3055 |
+
}
|
3056 |
+
|
3057 |
/**
|
3058 |
* RSASSA-PKCS1-V1_5-SIGN
|
3059 |
*
|
3091 |
*
|
3092 |
* @access private
|
3093 |
* @param string $m
|
3094 |
+
* @param string $s
|
3095 |
* @return string
|
3096 |
*/
|
3097 |
function _rsassa_pkcs1_v1_5_verify($m, $s)
|
3120 |
// EMSA-PKCS1-v1_5 encoding
|
3121 |
|
3122 |
$em2 = $this->_emsa_pkcs1_v1_5_encode($m, $this->k);
|
3123 |
+
$em3 = $this->_emsa_pkcs1_v1_5_encode_without_null($m, $this->k);
|
3124 |
+
|
3125 |
+
if ($em2 === false && $em3 === false) {
|
3126 |
user_error('RSA modulus too short');
|
3127 |
return false;
|
3128 |
}
|
3129 |
|
3130 |
// Compare
|
3131 |
+
|
3132 |
+
return ($em2 !== false && $this->_equals($em, $em2)) ||
|
3133 |
+
($em3 !== false && $this->_equals($em, $em3));
|
3134 |
}
|
3135 |
|
3136 |
/**
|
3236 |
*
|
3237 |
* @see self::encrypt()
|
3238 |
* @access public
|
3239 |
+
* @param string $ciphertext
|
3240 |
* @return string
|
3241 |
*/
|
3242 |
function decrypt($ciphertext)
|
phpseclib/File/ANSI.php
CHANGED
@@ -230,8 +230,7 @@ class File_ANSI
|
|
230 |
/**
|
231 |
* Set the number of lines that should be logged past the terminal height
|
232 |
*
|
233 |
-
* @param int $
|
234 |
-
* @param int $y
|
235 |
* @access public
|
236 |
*/
|
237 |
function setHistory($history)
|
@@ -343,19 +342,20 @@ class File_ANSI
|
|
343 |
$mods = explode(';', $match[1]);
|
344 |
foreach ($mods as $mod) {
|
345 |
switch ($mod) {
|
346 |
-
case
|
|
|
347 |
$attr_cell = clone($this->base_attr_cell);
|
348 |
break;
|
349 |
-
case 1: // Turn bold mode on
|
350 |
$attr_cell->bold = true;
|
351 |
break;
|
352 |
-
case 4: // Turn underline mode on
|
353 |
$attr_cell->underline = true;
|
354 |
break;
|
355 |
-
case 5: // Turn blinking mode on
|
356 |
$attr_cell->blink = true;
|
357 |
break;
|
358 |
-
case 7: // Turn reverse video on
|
359 |
$attr_cell->reverse = !$attr_cell->reverse;
|
360 |
$temp = $attr_cell->background;
|
361 |
$attr_cell->background = $attr_cell->foreground;
|
@@ -368,23 +368,23 @@ class File_ANSI
|
|
368 |
$back = &$attr_cell->{ $attr_cell->reverse ? 'foreground' : 'background' };
|
369 |
switch ($mod) {
|
370 |
// @codingStandardsIgnoreStart
|
371 |
-
case 30: $front = 'black'; break;
|
372 |
-
case 31: $front = 'red'; break;
|
373 |
-
case 32: $front = 'green'; break;
|
374 |
-
case 33: $front = 'yellow'; break;
|
375 |
-
case 34: $front = 'blue'; break;
|
376 |
-
case 35: $front = 'magenta'; break;
|
377 |
-
case 36: $front = 'cyan'; break;
|
378 |
-
case 37: $front = 'white'; break;
|
379 |
-
|
380 |
-
case 40: $back = 'black'; break;
|
381 |
-
case 41: $back = 'red'; break;
|
382 |
-
case 42: $back = 'green'; break;
|
383 |
-
case 43: $back = 'yellow'; break;
|
384 |
-
case 44: $back = 'blue'; break;
|
385 |
-
case 45: $back = 'magenta'; break;
|
386 |
-
case 46: $back = 'cyan'; break;
|
387 |
-
case 47: $back = 'white'; break;
|
388 |
// @codingStandardsIgnoreEnd
|
389 |
|
390 |
default:
|
230 |
/**
|
231 |
* Set the number of lines that should be logged past the terminal height
|
232 |
*
|
233 |
+
* @param int $history
|
|
|
234 |
* @access public
|
235 |
*/
|
236 |
function setHistory($history)
|
342 |
$mods = explode(';', $match[1]);
|
343 |
foreach ($mods as $mod) {
|
344 |
switch ($mod) {
|
345 |
+
case '':
|
346 |
+
case '0': // Turn off character attributes
|
347 |
$attr_cell = clone($this->base_attr_cell);
|
348 |
break;
|
349 |
+
case '1': // Turn bold mode on
|
350 |
$attr_cell->bold = true;
|
351 |
break;
|
352 |
+
case '4': // Turn underline mode on
|
353 |
$attr_cell->underline = true;
|
354 |
break;
|
355 |
+
case '5': // Turn blinking mode on
|
356 |
$attr_cell->blink = true;
|
357 |
break;
|
358 |
+
case '7': // Turn reverse video on
|
359 |
$attr_cell->reverse = !$attr_cell->reverse;
|
360 |
$temp = $attr_cell->background;
|
361 |
$attr_cell->background = $attr_cell->foreground;
|
368 |
$back = &$attr_cell->{ $attr_cell->reverse ? 'foreground' : 'background' };
|
369 |
switch ($mod) {
|
370 |
// @codingStandardsIgnoreStart
|
371 |
+
case '30': $front = 'black'; break;
|
372 |
+
case '31': $front = 'red'; break;
|
373 |
+
case '32': $front = 'green'; break;
|
374 |
+
case '33': $front = 'yellow'; break;
|
375 |
+
case '34': $front = 'blue'; break;
|
376 |
+
case '35': $front = 'magenta'; break;
|
377 |
+
case '36': $front = 'cyan'; break;
|
378 |
+
case '37': $front = 'white'; break;
|
379 |
+
|
380 |
+
case '40': $back = 'black'; break;
|
381 |
+
case '41': $back = 'red'; break;
|
382 |
+
case '42': $back = 'green'; break;
|
383 |
+
case '43': $back = 'yellow'; break;
|
384 |
+
case '44': $back = 'blue'; break;
|
385 |
+
case '45': $back = 'magenta'; break;
|
386 |
+
case '46': $back = 'cyan'; break;
|
387 |
+
case '47': $back = 'white'; break;
|
388 |
// @codingStandardsIgnoreEnd
|
389 |
|
390 |
default:
|
phpseclib/File/ASN1.php
CHANGED
@@ -140,7 +140,7 @@ class File_ASN1_Element
|
|
140 |
* PHP4 compatible Default Constructor.
|
141 |
*
|
142 |
* @see self::__construct()
|
143 |
-
* @param
|
144 |
* @access public
|
145 |
*/
|
146 |
function File_ASN1_Element($encoded)
|
@@ -316,8 +316,11 @@ class File_ASN1
|
|
316 |
{
|
317 |
$current = array('start' => $start);
|
318 |
|
|
|
|
|
|
|
319 |
$type = ord($encoded[$encoded_pos++]);
|
320 |
-
$
|
321 |
|
322 |
$constructed = ($type >> 5) & 1;
|
323 |
|
@@ -326,15 +329,28 @@ class File_ASN1
|
|
326 |
$tag = 0;
|
327 |
// process septets (since the eighth bit is ignored, it's not an octet)
|
328 |
do {
|
|
|
|
|
|
|
329 |
$temp = ord($encoded[$encoded_pos++]);
|
|
|
330 |
$loop = $temp >> 7;
|
331 |
$tag <<= 7;
|
332 |
-
$
|
333 |
-
|
|
|
|
|
|
|
|
|
334 |
} while ($loop);
|
335 |
}
|
336 |
|
|
|
|
|
337 |
// Length, as discussed in paragraph 8.1.3 of X.690-0207.pdf#page=13
|
|
|
|
|
|
|
338 |
$length = ord($encoded[$encoded_pos++]);
|
339 |
$start++;
|
340 |
if ($length == 0x80) { // indefinite length
|
@@ -426,13 +442,16 @@ class File_ASN1
|
|
426 |
switch ($tag) {
|
427 |
case FILE_ASN1_TYPE_BOOLEAN:
|
428 |
// "The contents octets shall consist of a single octet." -- paragraph 8.2.1
|
429 |
-
|
430 |
-
|
431 |
-
|
432 |
$current['content'] = (bool) ord($content[$content_pos]);
|
433 |
break;
|
434 |
case FILE_ASN1_TYPE_INTEGER:
|
435 |
case FILE_ASN1_TYPE_ENUMERATED:
|
|
|
|
|
|
|
436 |
$current['content'] = new Math_BigInteger(substr($content, $content_pos), -256);
|
437 |
break;
|
438 |
case FILE_ASN1_TYPE_REAL: // not currently supported
|
@@ -452,15 +471,15 @@ class File_ASN1
|
|
452 |
$last = count($temp) - 1;
|
453 |
for ($i = 0; $i < $last; $i++) {
|
454 |
// all subtags should be bit strings
|
455 |
-
|
456 |
-
|
457 |
-
|
458 |
$current['content'].= substr($temp[$i]['content'], 1);
|
459 |
}
|
460 |
// all subtags should be bit strings
|
461 |
-
|
462 |
-
|
463 |
-
|
464 |
$current['content'] = $temp[$last]['content'][0] . $current['content'] . substr($temp[$i]['content'], 1);
|
465 |
}
|
466 |
break;
|
@@ -477,9 +496,9 @@ class File_ASN1
|
|
477 |
}
|
478 |
$content_pos += $temp['length'];
|
479 |
// all subtags should be octet strings
|
480 |
-
|
481 |
-
|
482 |
-
|
483 |
$current['content'].= $temp['content'];
|
484 |
$length+= $temp['length'];
|
485 |
}
|
@@ -490,12 +509,15 @@ class File_ASN1
|
|
490 |
break;
|
491 |
case FILE_ASN1_TYPE_NULL:
|
492 |
// "The contents octets shall not contain any octets." -- paragraph 8.8.2
|
493 |
-
|
494 |
-
|
495 |
-
|
496 |
break;
|
497 |
case FILE_ASN1_TYPE_SEQUENCE:
|
498 |
case FILE_ASN1_TYPE_SET:
|
|
|
|
|
|
|
499 |
$offset = 0;
|
500 |
$current['content'] = array();
|
501 |
$content_len = strlen($content);
|
@@ -516,7 +538,13 @@ class File_ASN1
|
|
516 |
}
|
517 |
break;
|
518 |
case FILE_ASN1_TYPE_OBJECT_IDENTIFIER:
|
|
|
|
|
|
|
519 |
$current['content'] = $this->_decodeOID(substr($content, $content_pos));
|
|
|
|
|
|
|
520 |
break;
|
521 |
/* Each character string type shall be encoded as if it had been declared:
|
522 |
[UNIVERSAL x] IMPLICIT OCTET STRING
|
@@ -546,14 +574,22 @@ class File_ASN1
|
|
546 |
case FILE_ASN1_TYPE_UTF8_STRING:
|
547 |
// ????
|
548 |
case FILE_ASN1_TYPE_BMP_STRING:
|
|
|
|
|
|
|
549 |
$current['content'] = substr($content, $content_pos);
|
550 |
break;
|
551 |
case FILE_ASN1_TYPE_UTC_TIME:
|
552 |
case FILE_ASN1_TYPE_GENERALIZED_TIME:
|
|
|
|
|
|
|
553 |
$current['content'] = class_exists('DateTime') ?
|
554 |
$this->_decodeDateTime(substr($content, $content_pos), $tag) :
|
555 |
$this->_decodeUnixTime(substr($content, $content_pos), $tag);
|
|
|
556 |
default:
|
|
|
557 |
}
|
558 |
|
559 |
$start+= $length;
|
@@ -887,7 +923,7 @@ class File_ASN1
|
|
887 |
*
|
888 |
* @param string $source
|
889 |
* @param string $mapping
|
890 |
-
* @param
|
891 |
* @return string
|
892 |
* @access public
|
893 |
*/
|
@@ -903,6 +939,7 @@ class File_ASN1
|
|
903 |
* @param string $source
|
904 |
* @param string $mapping
|
905 |
* @param int $idx
|
|
|
906 |
* @return string
|
907 |
* @access private
|
908 |
*/
|
@@ -1065,7 +1102,10 @@ class File_ASN1
|
|
1065 |
if (!class_exists('DateTime')) {
|
1066 |
$value = @gmdate($format, strtotime($source)) . 'Z';
|
1067 |
} else {
|
|
|
1068 |
$date = new DateTime($source, new DateTimeZone('GMT'));
|
|
|
|
|
1069 |
$value = $date->format($format) . 'Z';
|
1070 |
}
|
1071 |
break;
|
@@ -1227,6 +1267,11 @@ class File_ASN1
|
|
1227 |
$oid = array();
|
1228 |
$pos = 0;
|
1229 |
$len = strlen($content);
|
|
|
|
|
|
|
|
|
|
|
1230 |
$n = new Math_BigInteger();
|
1231 |
while ($pos < $len) {
|
1232 |
$temp = ord($content[$pos++]);
|
@@ -1262,7 +1307,7 @@ class File_ASN1
|
|
1262 |
* Called by _encode_der()
|
1263 |
*
|
1264 |
* @access private
|
1265 |
-
* @param string $
|
1266 |
* @return string
|
1267 |
*/
|
1268 |
function _encodeOID($source)
|
140 |
* PHP4 compatible Default Constructor.
|
141 |
*
|
142 |
* @see self::__construct()
|
143 |
+
* @param string $encoded
|
144 |
* @access public
|
145 |
*/
|
146 |
function File_ASN1_Element($encoded)
|
316 |
{
|
317 |
$current = array('start' => $start);
|
318 |
|
319 |
+
if (!isset($encoded[$encoded_pos])) {
|
320 |
+
return false;
|
321 |
+
}
|
322 |
$type = ord($encoded[$encoded_pos++]);
|
323 |
+
$startOffset = 1;
|
324 |
|
325 |
$constructed = ($type >> 5) & 1;
|
326 |
|
329 |
$tag = 0;
|
330 |
// process septets (since the eighth bit is ignored, it's not an octet)
|
331 |
do {
|
332 |
+
if (!isset($encoded[$encoded_pos])) {
|
333 |
+
return false;
|
334 |
+
}
|
335 |
$temp = ord($encoded[$encoded_pos++]);
|
336 |
+
$startOffset++;
|
337 |
$loop = $temp >> 7;
|
338 |
$tag <<= 7;
|
339 |
+
$temp &= 0x7F;
|
340 |
+
// "bits 7 to 1 of the first subsequent octet shall not all be zero"
|
341 |
+
if ($startOffset == 2 && $temp == 0) {
|
342 |
+
return false;
|
343 |
+
}
|
344 |
+
$tag |= $temp;
|
345 |
} while ($loop);
|
346 |
}
|
347 |
|
348 |
+
$start+= $startOffset;
|
349 |
+
|
350 |
// Length, as discussed in paragraph 8.1.3 of X.690-0207.pdf#page=13
|
351 |
+
if (!isset($encoded[$encoded_pos])) {
|
352 |
+
return false;
|
353 |
+
}
|
354 |
$length = ord($encoded[$encoded_pos++]);
|
355 |
$start++;
|
356 |
if ($length == 0x80) { // indefinite length
|
442 |
switch ($tag) {
|
443 |
case FILE_ASN1_TYPE_BOOLEAN:
|
444 |
// "The contents octets shall consist of a single octet." -- paragraph 8.2.1
|
445 |
+
if ($constructed || strlen($content) != 1) {
|
446 |
+
return false;
|
447 |
+
}
|
448 |
$current['content'] = (bool) ord($content[$content_pos]);
|
449 |
break;
|
450 |
case FILE_ASN1_TYPE_INTEGER:
|
451 |
case FILE_ASN1_TYPE_ENUMERATED:
|
452 |
+
if ($constructed) {
|
453 |
+
return false;
|
454 |
+
}
|
455 |
$current['content'] = new Math_BigInteger(substr($content, $content_pos), -256);
|
456 |
break;
|
457 |
case FILE_ASN1_TYPE_REAL: // not currently supported
|
471 |
$last = count($temp) - 1;
|
472 |
for ($i = 0; $i < $last; $i++) {
|
473 |
// all subtags should be bit strings
|
474 |
+
if ($temp[$i]['type'] != FILE_ASN1_TYPE_BIT_STRING) {
|
475 |
+
return false;
|
476 |
+
}
|
477 |
$current['content'].= substr($temp[$i]['content'], 1);
|
478 |
}
|
479 |
// all subtags should be bit strings
|
480 |
+
if ($temp[$last]['type'] != FILE_ASN1_TYPE_BIT_STRING) {
|
481 |
+
return false;
|
482 |
+
}
|
483 |
$current['content'] = $temp[$last]['content'][0] . $current['content'] . substr($temp[$i]['content'], 1);
|
484 |
}
|
485 |
break;
|
496 |
}
|
497 |
$content_pos += $temp['length'];
|
498 |
// all subtags should be octet strings
|
499 |
+
if ($temp['type'] != FILE_ASN1_TYPE_OCTET_STRING) {
|
500 |
+
return false;
|
501 |
+
}
|
502 |
$current['content'].= $temp['content'];
|
503 |
$length+= $temp['length'];
|
504 |
}
|
509 |
break;
|
510 |
case FILE_ASN1_TYPE_NULL:
|
511 |
// "The contents octets shall not contain any octets." -- paragraph 8.8.2
|
512 |
+
if ($constructed || strlen($content)) {
|
513 |
+
return false;
|
514 |
+
}
|
515 |
break;
|
516 |
case FILE_ASN1_TYPE_SEQUENCE:
|
517 |
case FILE_ASN1_TYPE_SET:
|
518 |
+
if (!$constructed) {
|
519 |
+
return false;
|
520 |
+
}
|
521 |
$offset = 0;
|
522 |
$current['content'] = array();
|
523 |
$content_len = strlen($content);
|
538 |
}
|
539 |
break;
|
540 |
case FILE_ASN1_TYPE_OBJECT_IDENTIFIER:
|
541 |
+
if ($constructed) {
|
542 |
+
return false;
|
543 |
+
}
|
544 |
$current['content'] = $this->_decodeOID(substr($content, $content_pos));
|
545 |
+
if ($current['content'] === false) {
|
546 |
+
return false;
|
547 |
+
}
|
548 |
break;
|
549 |
/* Each character string type shall be encoded as if it had been declared:
|
550 |
[UNIVERSAL x] IMPLICIT OCTET STRING
|
574 |
case FILE_ASN1_TYPE_UTF8_STRING:
|
575 |
// ????
|
576 |
case FILE_ASN1_TYPE_BMP_STRING:
|
577 |
+
if ($constructed) {
|
578 |
+
return false;
|
579 |
+
}
|
580 |
$current['content'] = substr($content, $content_pos);
|
581 |
break;
|
582 |
case FILE_ASN1_TYPE_UTC_TIME:
|
583 |
case FILE_ASN1_TYPE_GENERALIZED_TIME:
|
584 |
+
if ($constructed) {
|
585 |
+
return false;
|
586 |
+
}
|
587 |
$current['content'] = class_exists('DateTime') ?
|
588 |
$this->_decodeDateTime(substr($content, $content_pos), $tag) :
|
589 |
$this->_decodeUnixTime(substr($content, $content_pos), $tag);
|
590 |
+
break;
|
591 |
default:
|
592 |
+
return false;
|
593 |
}
|
594 |
|
595 |
$start+= $length;
|
923 |
*
|
924 |
* @param string $source
|
925 |
* @param string $mapping
|
926 |
+
* @param array $special
|
927 |
* @return string
|
928 |
* @access public
|
929 |
*/
|
939 |
* @param string $source
|
940 |
* @param string $mapping
|
941 |
* @param int $idx
|
942 |
+
* @param array $special
|
943 |
* @return string
|
944 |
* @access private
|
945 |
*/
|
1102 |
if (!class_exists('DateTime')) {
|
1103 |
$value = @gmdate($format, strtotime($source)) . 'Z';
|
1104 |
} else {
|
1105 |
+
// if $source does _not_ include timezone information within it then assume that the timezone is GMT
|
1106 |
$date = new DateTime($source, new DateTimeZone('GMT'));
|
1107 |
+
// if $source _does_ include timezone information within it then convert the time to GMT
|
1108 |
+
$date->setTimezone(new DateTimeZone('GMT'));
|
1109 |
$value = $date->format($format) . 'Z';
|
1110 |
}
|
1111 |
break;
|
1267 |
$oid = array();
|
1268 |
$pos = 0;
|
1269 |
$len = strlen($content);
|
1270 |
+
|
1271 |
+
if (ord($content[$len - 1]) & 0x80) {
|
1272 |
+
return false;
|
1273 |
+
}
|
1274 |
+
|
1275 |
$n = new Math_BigInteger();
|
1276 |
while ($pos < $len) {
|
1277 |
$temp = ord($content[$pos++]);
|
1307 |
* Called by _encode_der()
|
1308 |
*
|
1309 |
* @access private
|
1310 |
+
* @param string $source
|
1311 |
* @return string
|
1312 |
*/
|
1313 |
function _encodeOID($source)
|
phpseclib/File/X509.php
CHANGED
@@ -1638,7 +1638,7 @@ class File_X509
|
|
1638 |
* Map extension values from octet string to extension-specific internal
|
1639 |
* format.
|
1640 |
*
|
1641 |
-
* @param array
|
1642 |
* @param string $path
|
1643 |
* @param object $asn1
|
1644 |
* @access private
|
@@ -1652,7 +1652,6 @@ class File_X509
|
|
1652 |
$id = $extensions[$i]['extnId'];
|
1653 |
$value = &$extensions[$i]['extnValue'];
|
1654 |
$value = base64_decode($value);
|
1655 |
-
$decoded = $asn1->decodeBER($value);
|
1656 |
/* [extnValue] contains the DER encoding of an ASN.1 value
|
1657 |
corresponding to the extension type identified by extnID */
|
1658 |
$map = $this->_getMapping($id);
|
@@ -1660,6 +1659,7 @@ class File_X509
|
|
1660 |
$decoder = $id == 'id-ce-nameConstraints' ?
|
1661 |
array($this, '_decodeNameConstraintIP') :
|
1662 |
array($this, '_decodeIP');
|
|
|
1663 |
$mapped = $asn1->asn1map($decoded[0], $map, array('iPAddress' => $decoder));
|
1664 |
$value = $mapped === false ? $decoded[0] : $mapped;
|
1665 |
|
@@ -1691,7 +1691,7 @@ class File_X509
|
|
1691 |
* Map extension values from extension-specific internal format to
|
1692 |
* octet string.
|
1693 |
*
|
1694 |
-
* @param array
|
1695 |
* @param string $path
|
1696 |
* @param object $asn1
|
1697 |
* @access private
|
@@ -1757,7 +1757,7 @@ class File_X509
|
|
1757 |
* Map attribute values from ANY type to attribute-specific internal
|
1758 |
* format.
|
1759 |
*
|
1760 |
-
* @param array
|
1761 |
* @param string $path
|
1762 |
* @param object $asn1
|
1763 |
* @access private
|
@@ -1798,7 +1798,7 @@ class File_X509
|
|
1798 |
* Map attribute values from attribute-specific internal format to
|
1799 |
* ANY type.
|
1800 |
*
|
1801 |
-
* @param array
|
1802 |
* @param string $path
|
1803 |
* @param object $asn1
|
1804 |
* @access private
|
@@ -1841,7 +1841,7 @@ class File_X509
|
|
1841 |
* Map DN values from ANY type to DN-specific internal
|
1842 |
* format.
|
1843 |
*
|
1844 |
-
* @param array
|
1845 |
* @param string $path
|
1846 |
* @param object $asn1
|
1847 |
* @access private
|
@@ -1871,7 +1871,7 @@ class File_X509
|
|
1871 |
* Map DN values from DN-specific internal format to
|
1872 |
* ANY type.
|
1873 |
*
|
1874 |
-
* @param array
|
1875 |
* @param string $path
|
1876 |
* @param object $asn1
|
1877 |
* @access private
|
@@ -3243,7 +3243,8 @@ class File_X509
|
|
3243 |
/**
|
3244 |
* Load a Certificate Signing Request
|
3245 |
*
|
3246 |
-
* @param string $csr
|
|
|
3247 |
* @access public
|
3248 |
* @return mixed
|
3249 |
*/
|
@@ -3383,7 +3384,7 @@ class File_X509
|
|
3383 |
*
|
3384 |
* https://developer.mozilla.org/en-US/docs/HTML/Element/keygen
|
3385 |
*
|
3386 |
-
* @param string $
|
3387 |
* @access public
|
3388 |
* @return mixed
|
3389 |
*/
|
@@ -3457,7 +3458,7 @@ class File_X509
|
|
3457 |
/**
|
3458 |
* Save a SPKAC CSR request
|
3459 |
*
|
3460 |
-
* @param array $
|
3461 |
* @param int $format optional
|
3462 |
* @access public
|
3463 |
* @return string
|
@@ -3501,6 +3502,7 @@ class File_X509
|
|
3501 |
* Load a Certificate Revocation List
|
3502 |
*
|
3503 |
* @param string $crl
|
|
|
3504 |
* @access public
|
3505 |
* @return mixed
|
3506 |
*/
|
@@ -4114,7 +4116,6 @@ class File_X509
|
|
4114 |
* X.509 certificate signing helper function.
|
4115 |
*
|
4116 |
* @param object $key
|
4117 |
-
* @param File_X509 $subject
|
4118 |
* @param string $signatureAlgorithm
|
4119 |
* @access public
|
4120 |
* @return mixed
|
@@ -4192,7 +4193,7 @@ class File_X509
|
|
4192 |
* Set Serial Number
|
4193 |
*
|
4194 |
* @param string $serial
|
4195 |
-
* @param $base optional
|
4196 |
* @access public
|
4197 |
*/
|
4198 |
function setSerialNumber($serial, $base = -256)
|
@@ -4866,7 +4867,6 @@ class File_X509
|
|
4866 |
* Set the IP Addresses's which the cert is to be valid for
|
4867 |
*
|
4868 |
* @access public
|
4869 |
-
* @param string $ipAddress optional
|
4870 |
*/
|
4871 |
function setIPAddress()
|
4872 |
{
|
@@ -5144,11 +5144,16 @@ class File_X509
|
|
5144 |
* subject=/O=organization/OU=org unit/CN=common name
|
5145 |
* issuer=/O=organization/CN=common name
|
5146 |
*/
|
5147 |
-
$
|
5148 |
-
|
5149 |
-
|
|
|
|
|
|
|
5150 |
// remove new lines
|
5151 |
$temp = str_replace(array("\r", "\n", ' '), '', $temp);
|
|
|
|
|
5152 |
$temp = preg_match('#^[a-zA-Z\d/+]*={0,2}$#', $temp) ? base64_decode($temp) : false;
|
5153 |
return $temp != false ? $temp : $str;
|
5154 |
}
|
1638 |
* Map extension values from octet string to extension-specific internal
|
1639 |
* format.
|
1640 |
*
|
1641 |
+
* @param array $root (by reference)
|
1642 |
* @param string $path
|
1643 |
* @param object $asn1
|
1644 |
* @access private
|
1652 |
$id = $extensions[$i]['extnId'];
|
1653 |
$value = &$extensions[$i]['extnValue'];
|
1654 |
$value = base64_decode($value);
|
|
|
1655 |
/* [extnValue] contains the DER encoding of an ASN.1 value
|
1656 |
corresponding to the extension type identified by extnID */
|
1657 |
$map = $this->_getMapping($id);
|
1659 |
$decoder = $id == 'id-ce-nameConstraints' ?
|
1660 |
array($this, '_decodeNameConstraintIP') :
|
1661 |
array($this, '_decodeIP');
|
1662 |
+
$decoded = $asn1->decodeBER($value);
|
1663 |
$mapped = $asn1->asn1map($decoded[0], $map, array('iPAddress' => $decoder));
|
1664 |
$value = $mapped === false ? $decoded[0] : $mapped;
|
1665 |
|
1691 |
* Map extension values from extension-specific internal format to
|
1692 |
* octet string.
|
1693 |
*
|
1694 |
+
* @param array $root (by reference)
|
1695 |
* @param string $path
|
1696 |
* @param object $asn1
|
1697 |
* @access private
|
1757 |
* Map attribute values from ANY type to attribute-specific internal
|
1758 |
* format.
|
1759 |
*
|
1760 |
+
* @param array $root (by reference)
|
1761 |
* @param string $path
|
1762 |
* @param object $asn1
|
1763 |
* @access private
|
1798 |
* Map attribute values from attribute-specific internal format to
|
1799 |
* ANY type.
|
1800 |
*
|
1801 |
+
* @param array $root (by reference)
|
1802 |
* @param string $path
|
1803 |
* @param object $asn1
|
1804 |
* @access private
|
1841 |
* Map DN values from ANY type to DN-specific internal
|
1842 |
* format.
|
1843 |
*
|
1844 |
+
* @param array $root (by reference)
|
1845 |
* @param string $path
|
1846 |
* @param object $asn1
|
1847 |
* @access private
|
1871 |
* Map DN values from DN-specific internal format to
|
1872 |
* ANY type.
|
1873 |
*
|
1874 |
+
* @param array $root (by reference)
|
1875 |
* @param string $path
|
1876 |
* @param object $asn1
|
1877 |
* @access private
|
3243 |
/**
|
3244 |
* Load a Certificate Signing Request
|
3245 |
*
|
3246 |
+
* @param string|array $csr
|
3247 |
+
* @param int $mode
|
3248 |
* @access public
|
3249 |
* @return mixed
|
3250 |
*/
|
3384 |
*
|
3385 |
* https://developer.mozilla.org/en-US/docs/HTML/Element/keygen
|
3386 |
*
|
3387 |
+
* @param string|array $spkac
|
3388 |
* @access public
|
3389 |
* @return mixed
|
3390 |
*/
|
3458 |
/**
|
3459 |
* Save a SPKAC CSR request
|
3460 |
*
|
3461 |
+
* @param string|array $spkac
|
3462 |
* @param int $format optional
|
3463 |
* @access public
|
3464 |
* @return string
|
3502 |
* Load a Certificate Revocation List
|
3503 |
*
|
3504 |
* @param string $crl
|
3505 |
+
* @param int $mode
|
3506 |
* @access public
|
3507 |
* @return mixed
|
3508 |
*/
|
4116 |
* X.509 certificate signing helper function.
|
4117 |
*
|
4118 |
* @param object $key
|
|
|
4119 |
* @param string $signatureAlgorithm
|
4120 |
* @access public
|
4121 |
* @return mixed
|
4193 |
* Set Serial Number
|
4194 |
*
|
4195 |
* @param string $serial
|
4196 |
+
* @param int $base optional
|
4197 |
* @access public
|
4198 |
*/
|
4199 |
function setSerialNumber($serial, $base = -256)
|
4867 |
* Set the IP Addresses's which the cert is to be valid for
|
4868 |
*
|
4869 |
* @access public
|
|
|
4870 |
*/
|
4871 |
function setIPAddress()
|
4872 |
{
|
5144 |
* subject=/O=organization/OU=org unit/CN=common name
|
5145 |
* issuer=/O=organization/CN=common name
|
5146 |
*/
|
5147 |
+
if (strlen($str) > ini_get('pcre.backtrack_limit')) {
|
5148 |
+
$temp = $str;
|
5149 |
+
} else {
|
5150 |
+
$temp = preg_replace('#.*?^-+[^-]+-+[\r\n ]*$#ms', '', $str, 1);
|
5151 |
+
$temp = preg_replace('#-+END.*[\r\n ]*.*#ms', '', $temp, 1);
|
5152 |
+
}
|
5153 |
// remove new lines
|
5154 |
$temp = str_replace(array("\r", "\n", ' '), '', $temp);
|
5155 |
+
// remove the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- stuff
|
5156 |
+
$temp = preg_replace('#^-+[^-]+-+|-+[^-]+-+$#', '', $temp);
|
5157 |
$temp = preg_match('#^[a-zA-Z\d/+]*={0,2}$#', $temp) ? base64_decode($temp) : false;
|
5158 |
return $temp != false ? $temp : $str;
|
5159 |
}
|
phpseclib/Math/BigInteger.php
CHANGED
@@ -237,7 +237,7 @@ class Math_BigInteger
|
|
237 |
* ?>
|
238 |
* </code>
|
239 |
*
|
240 |
-
* @param $x base-10 number or base-$base number if $base set.
|
241 |
* @param int $base
|
242 |
* @return Math_BigInteger
|
243 |
* @access public
|
@@ -257,7 +257,7 @@ class Math_BigInteger
|
|
257 |
}
|
258 |
}
|
259 |
|
260 |
-
if (extension_loaded('openssl') && !defined('MATH_BIGINTEGER_OPENSSL_DISABLE') && !defined('MATH_BIGINTEGER_OPENSSL_ENABLED')) {
|
261 |
// some versions of XAMPP have mismatched versions of OpenSSL which causes it not to work
|
262 |
ob_start();
|
263 |
@phpinfo();
|
@@ -673,11 +673,11 @@ class Math_BigInteger
|
|
673 |
{
|
674 |
$hex = $this->toHex($twos_compliment);
|
675 |
$bits = '';
|
676 |
-
for ($i = strlen($hex) -
|
677 |
-
$bits = str_pad(decbin(hexdec(substr($hex, $i,
|
678 |
}
|
679 |
if ($start) { // hexdec('') == 0
|
680 |
-
$bits = str_pad(decbin(hexdec(substr($hex, 0, $start))), 8, '0', STR_PAD_LEFT) . $bits;
|
681 |
}
|
682 |
$result = $this->precision > 0 ? substr($bits, -$this->precision) : ltrim($bits, '0');
|
683 |
|
@@ -2021,7 +2021,7 @@ class Math_BigInteger
|
|
2021 |
*
|
2022 |
* @see self::_slidingWindow()
|
2023 |
* @access private
|
2024 |
-
* @param Math_BigInteger
|
2025 |
* @return Math_BigInteger
|
2026 |
*/
|
2027 |
function _mod2($n)
|
@@ -3136,7 +3136,7 @@ class Math_BigInteger
|
|
3136 |
*
|
3137 |
* Byte length is equal to $length. Uses crypt_random if it's loaded and mt_rand if it's not.
|
3138 |
*
|
3139 |
-
* @param int $
|
3140 |
* @return Math_BigInteger
|
3141 |
* @access private
|
3142 |
*/
|
@@ -3603,7 +3603,7 @@ class Math_BigInteger
|
|
3603 |
*
|
3604 |
* Removes leading zeros and truncates (if necessary) to maintain the appropriate precision
|
3605 |
*
|
3606 |
-
* @param Math_BigInteger
|
3607 |
* @return Math_BigInteger
|
3608 |
* @see self::_trim()
|
3609 |
* @access private
|
@@ -3680,8 +3680,8 @@ class Math_BigInteger
|
|
3680 |
/**
|
3681 |
* Array Repeat
|
3682 |
*
|
3683 |
-
* @param $input
|
3684 |
-
* @param $multiplier
|
3685 |
* @return array
|
3686 |
* @access private
|
3687 |
*/
|
@@ -3695,8 +3695,8 @@ class Math_BigInteger
|
|
3695 |
*
|
3696 |
* Shifts binary strings $shift bits, essentially multiplying by 2**$shift.
|
3697 |
*
|
3698 |
-
* @param $x
|
3699 |
-
* @param $shift
|
3700 |
* @return string
|
3701 |
* @access private
|
3702 |
*/
|
@@ -3724,8 +3724,8 @@ class Math_BigInteger
|
|
3724 |
*
|
3725 |
* Shifts binary strings $shift bits, essentially dividing by 2**$shift and returning the remainder.
|
3726 |
*
|
3727 |
-
* @param $x
|
3728 |
-
* @param $shift
|
3729 |
* @return string
|
3730 |
* @access private
|
3731 |
*/
|
237 |
* ?>
|
238 |
* </code>
|
239 |
*
|
240 |
+
* @param int|string|resource $x base-10 number or base-$base number if $base set.
|
241 |
* @param int $base
|
242 |
* @return Math_BigInteger
|
243 |
* @access public
|
257 |
}
|
258 |
}
|
259 |
|
260 |
+
if (function_exists('phpinfo') && extension_loaded('openssl') && !defined('MATH_BIGINTEGER_OPENSSL_DISABLE') && !defined('MATH_BIGINTEGER_OPENSSL_ENABLED')) {
|
261 |
// some versions of XAMPP have mismatched versions of OpenSSL which causes it not to work
|
262 |
ob_start();
|
263 |
@phpinfo();
|
673 |
{
|
674 |
$hex = $this->toHex($twos_compliment);
|
675 |
$bits = '';
|
676 |
+
for ($i = strlen($hex) - 6, $start = strlen($hex) % 6; $i >= $start; $i-=6) {
|
677 |
+
$bits = str_pad(decbin(hexdec(substr($hex, $i, 6))), 24, '0', STR_PAD_LEFT) . $bits;
|
678 |
}
|
679 |
if ($start) { // hexdec('') == 0
|
680 |
+
$bits = str_pad(decbin(hexdec(substr($hex, 0, $start))), 8 * $start, '0', STR_PAD_LEFT) . $bits;
|
681 |
}
|
682 |
$result = $this->precision > 0 ? substr($bits, -$this->precision) : ltrim($bits, '0');
|
683 |
|
2021 |
*
|
2022 |
* @see self::_slidingWindow()
|
2023 |
* @access private
|
2024 |
+
* @param Math_BigInteger $n
|
2025 |
* @return Math_BigInteger
|
2026 |
*/
|
2027 |
function _mod2($n)
|
3136 |
*
|
3137 |
* Byte length is equal to $length. Uses crypt_random if it's loaded and mt_rand if it's not.
|
3138 |
*
|
3139 |
+
* @param int $size
|
3140 |
* @return Math_BigInteger
|
3141 |
* @access private
|
3142 |
*/
|
3603 |
*
|
3604 |
* Removes leading zeros and truncates (if necessary) to maintain the appropriate precision
|
3605 |
*
|
3606 |
+
* @param Math_BigInteger $result
|
3607 |
* @return Math_BigInteger
|
3608 |
* @see self::_trim()
|
3609 |
* @access private
|
3680 |
/**
|
3681 |
* Array Repeat
|
3682 |
*
|
3683 |
+
* @param array $input
|
3684 |
+
* @param mixed $multiplier
|
3685 |
* @return array
|
3686 |
* @access private
|
3687 |
*/
|
3695 |
*
|
3696 |
* Shifts binary strings $shift bits, essentially multiplying by 2**$shift.
|
3697 |
*
|
3698 |
+
* @param string $x (by reference)
|
3699 |
+
* @param int $shift
|
3700 |
* @return string
|
3701 |
* @access private
|
3702 |
*/
|
3724 |
*
|
3725 |
* Shifts binary strings $shift bits, essentially dividing by 2**$shift and returning the remainder.
|
3726 |
*
|
3727 |
+
* @param string $x (by referenc)
|
3728 |
+
* @param int $shift
|
3729 |
* @return string
|
3730 |
* @access private
|
3731 |
*/
|
phpseclib/Net/SFTP.php
CHANGED
@@ -5,9 +5,7 @@
|
|
5 |
*
|
6 |
* PHP versions 4 and 5
|
7 |
*
|
8 |
-
*
|
9 |
-
* implemented by the popular OpenSSH SFTP server". If you want SFTPv4/5/6 support, provide me with access
|
10 |
-
* to an SFTPv4/5/6 server.
|
11 |
*
|
12 |
* The API for this library is modeled after the API from PHP's {@link http://php.net/book.ftp FTP extension}.
|
13 |
*
|
@@ -195,6 +193,24 @@ class Net_SFTP extends Net_SSH2
|
|
195 |
*/
|
196 |
var $version;
|
197 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
198 |
/**
|
199 |
* Current working directory
|
200 |
*
|
@@ -300,6 +316,49 @@ class Net_SFTP extends Net_SSH2
|
|
300 |
*/
|
301 |
var $requestBuffer = array();
|
302 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
303 |
/**
|
304 |
* Default Constructor.
|
305 |
*
|
@@ -320,15 +379,13 @@ class Net_SFTP extends Net_SSH2
|
|
320 |
$this->packet_types = array(
|
321 |
1 => 'NET_SFTP_INIT',
|
322 |
2 => 'NET_SFTP_VERSION',
|
323 |
-
/* the format of SSH_FXP_OPEN changed between SFTPv4 and SFTPv5+:
|
324 |
-
SFTPv5+: http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.1.1
|
325 |
-
pre-SFTPv5 : http://tools.ietf.org/html/draft-ietf-secsh-filexfer-04#section-6.3 */
|
326 |
3 => 'NET_SFTP_OPEN',
|
327 |
4 => 'NET_SFTP_CLOSE',
|
328 |
5 => 'NET_SFTP_READ',
|
329 |
6 => 'NET_SFTP_WRITE',
|
330 |
7 => 'NET_SFTP_LSTAT',
|
331 |
9 => 'NET_SFTP_SETSTAT',
|
|
|
332 |
11 => 'NET_SFTP_OPENDIR',
|
333 |
12 => 'NET_SFTP_READDIR',
|
334 |
13 => 'NET_SFTP_REMOVE',
|
@@ -336,18 +393,13 @@ class Net_SFTP extends Net_SSH2
|
|
336 |
15 => 'NET_SFTP_RMDIR',
|
337 |
16 => 'NET_SFTP_REALPATH',
|
338 |
17 => 'NET_SFTP_STAT',
|
339 |
-
/* the format of SSH_FXP_RENAME changed between SFTPv4 and SFTPv5+:
|
340 |
-
SFTPv5+: http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.3
|
341 |
-
pre-SFTPv5 : http://tools.ietf.org/html/draft-ietf-secsh-filexfer-04#section-6.5 */
|
342 |
18 => 'NET_SFTP_RENAME',
|
343 |
19 => 'NET_SFTP_READLINK',
|
344 |
20 => 'NET_SFTP_SYMLINK',
|
|
|
345 |
|
346 |
101=> 'NET_SFTP_STATUS',
|
347 |
102=> 'NET_SFTP_HANDLE',
|
348 |
-
/* the format of SSH_FXP_NAME changed between SFTPv3 and SFTPv4+:
|
349 |
-
SFTPv4+: http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-9.4
|
350 |
-
pre-SFTPv4 : http://tools.ietf.org/html/draft-ietf-secsh-filexfer-02#section-7 */
|
351 |
103=> 'NET_SFTP_DATA',
|
352 |
104=> 'NET_SFTP_NAME',
|
353 |
105=> 'NET_SFTP_ATTRS',
|
@@ -392,25 +444,59 @@ class Net_SFTP extends Net_SSH2
|
|
392 |
// the order, in this case, matters quite a lot - see Net_SFTP::_parseAttributes() to understand why
|
393 |
$this->attributes = array(
|
394 |
0x00000001 => 'NET_SFTP_ATTR_SIZE',
|
395 |
-
0x00000002 => 'NET_SFTP_ATTR_UIDGID',
|
|
|
396 |
0x00000004 => 'NET_SFTP_ATTR_PERMISSIONS',
|
397 |
0x00000008 => 'NET_SFTP_ATTR_ACCESSTIME',
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
398 |
// 0x80000000 will yield a floating point on 32-bit systems and converting floating points to integers
|
399 |
// yields inconsistent behavior depending on how php is compiled. so we left shift -1 (which, in
|
400 |
// two's compliment, consists of all 1 bits) by 31. on 64-bit systems this'll yield 0xFFFFFFFF80000000.
|
401 |
// that's not a problem, however, and 'anded' and a 32-bit number, as all the leading 1 bits are ignored.
|
402 |
(-1 << 31) & 0xFFFFFFFF => 'NET_SFTP_ATTR_EXTENDED'
|
403 |
);
|
404 |
-
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-04#section-6.3
|
405 |
-
// the flag definitions change somewhat in SFTPv5+. if SFTPv5+ support is added to this library, maybe name
|
406 |
-
// the array for that $this->open5_flags and similarly alter the constant names.
|
407 |
$this->open_flags = array(
|
408 |
0x00000001 => 'NET_SFTP_OPEN_READ',
|
409 |
0x00000002 => 'NET_SFTP_OPEN_WRITE',
|
410 |
0x00000004 => 'NET_SFTP_OPEN_APPEND',
|
411 |
0x00000008 => 'NET_SFTP_OPEN_CREATE',
|
412 |
0x00000010 => 'NET_SFTP_OPEN_TRUNCATE',
|
413 |
-
0x00000020 => 'NET_SFTP_OPEN_EXCL'
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
414 |
);
|
415 |
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-04#section-5.2
|
416 |
// see Net_SFTP::_parseLongname() for an explanation
|
@@ -432,6 +518,7 @@ class Net_SFTP extends Net_SSH2
|
|
432 |
$this->status_codes,
|
433 |
$this->attributes,
|
434 |
$this->open_flags,
|
|
|
435 |
$this->file_types
|
436 |
);
|
437 |
|
@@ -458,23 +545,32 @@ class Net_SFTP extends Net_SSH2
|
|
458 |
}
|
459 |
|
460 |
/**
|
461 |
-
*
|
462 |
*
|
463 |
-
* @param string $username
|
464 |
-
* @param string $password
|
465 |
* @return bool
|
466 |
* @access public
|
467 |
*/
|
468 |
-
function
|
469 |
{
|
470 |
-
$
|
471 |
-
$callback = version_compare(PHP_VERSION, '5.3.0') < 0 ?
|
472 |
-
array(&$this, 'parent::login') :
|
473 |
-
'parent::login';
|
474 |
-
if (!call_user_func_array($callback, $args)) {
|
475 |
return false;
|
476 |
}
|
477 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
478 |
$this->window_size_server_to_client[NET_SFTP_CHANNEL] = $this->window_size;
|
479 |
|
480 |
$packet = pack(
|
@@ -496,6 +592,8 @@ class Net_SFTP extends Net_SSH2
|
|
496 |
$response = $this->_get_channel_packet(NET_SFTP_CHANNEL, true);
|
497 |
if ($response === false) {
|
498 |
return false;
|
|
|
|
|
499 |
}
|
500 |
|
501 |
$packet = pack(
|
@@ -542,6 +640,8 @@ class Net_SFTP extends Net_SSH2
|
|
542 |
if ($response === false) {
|
543 |
return false;
|
544 |
}
|
|
|
|
|
545 |
}
|
546 |
|
547 |
$this->channel_status[NET_SFTP_CHANNEL] = NET_SSH2_MSG_CHANNEL_DATA;
|
@@ -556,11 +656,13 @@ class Net_SFTP extends Net_SSH2
|
|
556 |
return false;
|
557 |
}
|
558 |
|
|
|
|
|
559 |
if (strlen($response) < 4) {
|
560 |
return false;
|
561 |
}
|
562 |
extract(unpack('Nversion', $this->_string_shift($response, 4)));
|
563 |
-
$this->
|
564 |
while (!empty($response)) {
|
565 |
if (strlen($response) < 4) {
|
566 |
return false;
|
@@ -575,21 +677,22 @@ class Net_SFTP extends Net_SSH2
|
|
575 |
$this->extensions[$key] = $value;
|
576 |
}
|
577 |
|
578 |
-
|
579 |
-
SFTPv4+ defines a 'newline' extension. SFTPv3 seems to have unofficial support for it via 'newline@vandyke.com',
|
580 |
-
however, I'm not sure what 'newline@vandyke.com' is supposed to do (the fact that it's unofficial means that it's
|
581 |
-
not in the official SFTPv3 specs) and 'newline@vandyke.com' / 'newline' are likely not drop-in substitutes for
|
582 |
-
one another due to the fact that 'newline' comes with a SSH_FXF_TEXT bitmask whereas it seems unlikely that
|
583 |
-
'newline@vandyke.com' would.
|
584 |
-
*/
|
585 |
-
/*
|
586 |
-
if (isset($this->extensions['newline@vandyke.com'])) {
|
587 |
-
$this->extensions['newline'] = $this->extensions['newline@vandyke.com'];
|
588 |
-
unset($this->extensions['newline@vandyke.com']);
|
589 |
-
}
|
590 |
-
*/
|
591 |
|
592 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
593 |
|
594 |
/*
|
595 |
A Note on SFTPv4/5/6 support:
|
@@ -614,12 +717,60 @@ class Net_SFTP extends Net_SSH2
|
|
614 |
in draft-ietf-secsh-filexfer-13 would be quite impossible. As such, what Net_SFTP would do is close the
|
615 |
channel and reopen it with a new and updated SSH_FXP_INIT packet.
|
616 |
*/
|
617 |
-
|
618 |
-
|
619 |
-
|
620 |
-
|
621 |
-
|
622 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
623 |
}
|
624 |
|
625 |
$this->pwd = $this->_realpath('.');
|
@@ -679,6 +830,26 @@ class Net_SFTP extends Net_SSH2
|
|
679 |
$this->canonicalize_paths = false;
|
680 |
}
|
681 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
682 |
/**
|
683 |
* Returns the current directory name
|
684 |
*
|
@@ -687,6 +858,10 @@ class Net_SFTP extends Net_SSH2
|
|
687 |
*/
|
688 |
function pwd()
|
689 |
{
|
|
|
|
|
|
|
|
|
690 |
return $this->pwd;
|
691 |
}
|
692 |
|
@@ -728,6 +903,10 @@ class Net_SFTP extends Net_SSH2
|
|
728 |
*/
|
729 |
function realpath($path)
|
730 |
{
|
|
|
|
|
|
|
|
|
731 |
return $this->_realpath($path);
|
732 |
}
|
733 |
|
@@ -810,7 +989,7 @@ class Net_SFTP extends Net_SSH2
|
|
810 |
*/
|
811 |
function chdir($dir)
|
812 |
{
|
813 |
-
if (
|
814 |
return false;
|
815 |
}
|
816 |
|
@@ -967,7 +1146,7 @@ class Net_SFTP extends Net_SSH2
|
|
967 |
*/
|
968 |
function _list($dir, $raw = true)
|
969 |
{
|
970 |
-
if (
|
971 |
return false;
|
972 |
}
|
973 |
|
@@ -1022,13 +1201,17 @@ class Net_SFTP extends Net_SSH2
|
|
1022 |
}
|
1023 |
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
1024 |
$shortname = $this->_string_shift($response, $length);
|
1025 |
-
|
1026 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
1027 |
}
|
1028 |
-
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
1029 |
-
$longname = $this->_string_shift($response, $length);
|
1030 |
$attributes = $this->_parseAttributes($response);
|
1031 |
-
if (!isset($attributes['type'])) {
|
1032 |
$fileType = $this->_parseLongname($longname);
|
1033 |
if ($fileType) {
|
1034 |
$attributes['type'] = $fileType;
|
@@ -1074,7 +1257,7 @@ class Net_SFTP extends Net_SSH2
|
|
1074 |
uasort($contents, array(&$this, '_comparator'));
|
1075 |
}
|
1076 |
|
1077 |
-
return $raw ? $contents : array_keys($contents);
|
1078 |
}
|
1079 |
|
1080 |
/**
|
@@ -1188,10 +1371,6 @@ class Net_SFTP extends Net_SSH2
|
|
1188 |
*/
|
1189 |
function size($filename)
|
1190 |
{
|
1191 |
-
if (!($this->bitmap & NET_SSH2_MASK_LOGIN)) {
|
1192 |
-
return false;
|
1193 |
-
}
|
1194 |
-
|
1195 |
$result = $this->stat($filename);
|
1196 |
if ($result === false) {
|
1197 |
return false;
|
@@ -1276,7 +1455,7 @@ class Net_SFTP extends Net_SSH2
|
|
1276 |
*
|
1277 |
* Mainly used by file_exists
|
1278 |
*
|
1279 |
-
* @param string $
|
1280 |
* @return mixed
|
1281 |
* @access private
|
1282 |
*/
|
@@ -1308,7 +1487,7 @@ class Net_SFTP extends Net_SSH2
|
|
1308 |
*/
|
1309 |
function stat($filename)
|
1310 |
{
|
1311 |
-
if (
|
1312 |
return false;
|
1313 |
}
|
1314 |
|
@@ -1365,7 +1544,7 @@ class Net_SFTP extends Net_SSH2
|
|
1365 |
*/
|
1366 |
function lstat($filename)
|
1367 |
{
|
1368 |
-
if (
|
1369 |
return false;
|
1370 |
}
|
1371 |
|
@@ -1479,7 +1658,7 @@ class Net_SFTP extends Net_SSH2
|
|
1479 |
*/
|
1480 |
function touch($filename, $time = null, $atime = null)
|
1481 |
{
|
1482 |
-
if (
|
1483 |
return false;
|
1484 |
}
|
1485 |
|
@@ -1495,9 +1674,25 @@ class Net_SFTP extends Net_SSH2
|
|
1495 |
$atime = $time;
|
1496 |
}
|
1497 |
|
1498 |
-
$
|
1499 |
-
|
1500 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1501 |
if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
|
1502 |
return false;
|
1503 |
}
|
@@ -1520,19 +1715,47 @@ class Net_SFTP extends Net_SSH2
|
|
1520 |
/**
|
1521 |
* Changes file or directory owner
|
1522 |
*
|
|
|
|
|
|
|
|
|
|
|
1523 |
* Returns true on success or false on error.
|
1524 |
*
|
1525 |
* @param string $filename
|
1526 |
-
* @param int $uid
|
1527 |
* @param bool $recursive
|
1528 |
* @return bool
|
1529 |
* @access public
|
1530 |
*/
|
1531 |
function chown($filename, $uid, $recursive = false)
|
1532 |
{
|
1533 |
-
|
1534 |
-
|
1535 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1536 |
|
1537 |
return $this->_setstat($filename, $attr, $recursive);
|
1538 |
}
|
@@ -1540,17 +1763,24 @@ class Net_SFTP extends Net_SSH2
|
|
1540 |
/**
|
1541 |
* Changes file or directory group
|
1542 |
*
|
|
|
|
|
|
|
|
|
|
|
1543 |
* Returns true on success or false on error.
|
1544 |
*
|
1545 |
* @param string $filename
|
1546 |
-
* @param int $gid
|
1547 |
* @param bool $recursive
|
1548 |
* @return bool
|
1549 |
* @access public
|
1550 |
*/
|
1551 |
function chgrp($filename, $gid, $recursive = false)
|
1552 |
{
|
1553 |
-
$attr =
|
|
|
|
|
1554 |
|
1555 |
return $this->_setstat($filename, $attr, $recursive);
|
1556 |
}
|
@@ -1617,7 +1847,7 @@ class Net_SFTP extends Net_SSH2
|
|
1617 |
*/
|
1618 |
function _setstat($filename, $attr, $recursive)
|
1619 |
{
|
1620 |
-
if (
|
1621 |
return false;
|
1622 |
}
|
1623 |
|
@@ -1635,9 +1865,10 @@ class Net_SFTP extends Net_SSH2
|
|
1635 |
return $result;
|
1636 |
}
|
1637 |
|
1638 |
-
|
1639 |
-
|
1640 |
-
|
|
|
1641 |
return false;
|
1642 |
}
|
1643 |
|
@@ -1707,7 +1938,10 @@ class Net_SFTP extends Net_SSH2
|
|
1707 |
return false;
|
1708 |
}
|
1709 |
} else {
|
1710 |
-
|
|
|
|
|
|
|
1711 |
return false;
|
1712 |
}
|
1713 |
|
@@ -1722,7 +1956,10 @@ class Net_SFTP extends Net_SSH2
|
|
1722 |
}
|
1723 |
}
|
1724 |
|
1725 |
-
|
|
|
|
|
|
|
1726 |
return false;
|
1727 |
}
|
1728 |
|
@@ -1747,7 +1984,7 @@ class Net_SFTP extends Net_SSH2
|
|
1747 |
*/
|
1748 |
function readlink($link)
|
1749 |
{
|
1750 |
-
if (
|
1751 |
return false;
|
1752 |
}
|
1753 |
|
@@ -1797,15 +2034,44 @@ class Net_SFTP extends Net_SSH2
|
|
1797 |
*/
|
1798 |
function symlink($target, $link)
|
1799 |
{
|
1800 |
-
if (
|
1801 |
return false;
|
1802 |
}
|
1803 |
|
1804 |
//$target = $this->_realpath($target);
|
1805 |
$link = $this->_realpath($link);
|
1806 |
|
1807 |
-
|
1808 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1809 |
return false;
|
1810 |
}
|
1811 |
|
@@ -1831,12 +2097,14 @@ class Net_SFTP extends Net_SSH2
|
|
1831 |
* Creates a directory.
|
1832 |
*
|
1833 |
* @param string $dir
|
|
|
|
|
1834 |
* @return bool
|
1835 |
* @access public
|
1836 |
*/
|
1837 |
function mkdir($dir, $mode = -1, $recursive = false)
|
1838 |
{
|
1839 |
-
if (
|
1840 |
return false;
|
1841 |
}
|
1842 |
|
@@ -1863,6 +2131,7 @@ class Net_SFTP extends Net_SSH2
|
|
1863 |
* Helper function for directory creation
|
1864 |
*
|
1865 |
* @param string $dir
|
|
|
1866 |
* @return bool
|
1867 |
* @access private
|
1868 |
*/
|
@@ -1904,7 +2173,7 @@ class Net_SFTP extends Net_SSH2
|
|
1904 |
*/
|
1905 |
function rmdir($dir)
|
1906 |
{
|
1907 |
-
if (
|
1908 |
return false;
|
1909 |
}
|
1910 |
|
@@ -1955,7 +2224,6 @@ class Net_SFTP extends Net_SSH2
|
|
1955 |
*
|
1956 |
* If $data is a resource then it'll be used as a resource instead.
|
1957 |
*
|
1958 |
-
*
|
1959 |
* Setting $mode to NET_SFTP_CALLBACK will use $data as callback function, which gets only one parameter -- number
|
1960 |
* of bytes to return, and returns a string if there is some data or null if there is no more data
|
1961 |
*
|
@@ -1991,7 +2259,7 @@ class Net_SFTP extends Net_SSH2
|
|
1991 |
*/
|
1992 |
function put($remote_file, $data, $mode = NET_SFTP_STRING, $start = -1, $local_start = -1, $progressCallback = null)
|
1993 |
{
|
1994 |
-
if (
|
1995 |
return false;
|
1996 |
}
|
1997 |
|
@@ -2002,10 +2270,14 @@ class Net_SFTP extends Net_SSH2
|
|
2002 |
|
2003 |
$this->_remove_from_stat_cache($remote_file);
|
2004 |
|
2005 |
-
$
|
2006 |
-
|
2007 |
-
|
2008 |
-
|
|
|
|
|
|
|
|
|
2009 |
|
2010 |
if ($start >= 0) {
|
2011 |
$offset = $start;
|
@@ -2015,10 +2287,17 @@ class Net_SFTP extends Net_SSH2
|
|
2015 |
$offset = $size !== false ? $size : 0;
|
2016 |
} else {
|
2017 |
$offset = 0;
|
2018 |
-
$
|
|
|
|
|
|
|
|
|
2019 |
}
|
2020 |
|
2021 |
-
$packet = pack('Na*
|
|
|
|
|
|
|
2022 |
if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
|
2023 |
return false;
|
2024 |
}
|
@@ -2085,8 +2364,8 @@ class Net_SFTP extends Net_SSH2
|
|
2085 |
$sent = 0;
|
2086 |
$size = $size < 0 ? ($size & 0x7FFFFFFF) + 0x80000000 : $size;
|
2087 |
|
2088 |
-
$sftp_packet_size =
|
2089 |
-
// make the SFTP packet be exactly
|
2090 |
$sftp_packet_size-= strlen($handle) + 25;
|
2091 |
$i = $j = 0;
|
2092 |
while ($dataCallback || ($size === 0 || $sent < $size)) {
|
@@ -2127,6 +2406,8 @@ class Net_SFTP extends Net_SSH2
|
|
2127 |
}
|
2128 |
}
|
2129 |
|
|
|
|
|
2130 |
if (!$this->_read_put_responses($i)) {
|
2131 |
if ($mode & NET_SFTP_LOCAL_FILE) {
|
2132 |
fclose($fp);
|
@@ -2136,10 +2417,32 @@ class Net_SFTP extends Net_SSH2
|
|
2136 |
}
|
2137 |
|
2138 |
if ($mode & NET_SFTP_LOCAL_FILE) {
|
2139 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2140 |
}
|
2141 |
|
2142 |
-
return $
|
2143 |
}
|
2144 |
|
2145 |
/**
|
@@ -2226,7 +2529,7 @@ class Net_SFTP extends Net_SSH2
|
|
2226 |
*/
|
2227 |
function get($remote_file, $local_file = false, $offset = 0, $length = -1, $progressCallback = null)
|
2228 |
{
|
2229 |
-
if (
|
2230 |
return false;
|
2231 |
}
|
2232 |
|
@@ -2235,7 +2538,10 @@ class Net_SFTP extends Net_SSH2
|
|
2235 |
return false;
|
2236 |
}
|
2237 |
|
2238 |
-
$packet = pack('Na*
|
|
|
|
|
|
|
2239 |
if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
|
2240 |
return false;
|
2241 |
}
|
@@ -2259,7 +2565,7 @@ class Net_SFTP extends Net_SSH2
|
|
2259 |
$res_offset = $stat['size'];
|
2260 |
} else {
|
2261 |
$res_offset = 0;
|
2262 |
-
if ($local_file !== false) {
|
2263 |
$fp = fopen($local_file, 'wb');
|
2264 |
if (!$fp) {
|
2265 |
return false;
|
@@ -2269,7 +2575,7 @@ class Net_SFTP extends Net_SSH2
|
|
2269 |
}
|
2270 |
}
|
2271 |
|
2272 |
-
$fclose_check = $local_file !== false && !is_resource($local_file);
|
2273 |
|
2274 |
$start = $offset;
|
2275 |
$read = 0;
|
@@ -2290,9 +2596,6 @@ class Net_SFTP extends Net_SSH2
|
|
2290 |
}
|
2291 |
$packet = null;
|
2292 |
$read+= $packet_size;
|
2293 |
-
if (is_callable($progressCallback)) {
|
2294 |
-
call_user_func($progressCallback, $read);
|
2295 |
-
}
|
2296 |
$i++;
|
2297 |
}
|
2298 |
|
@@ -2319,9 +2622,14 @@ class Net_SFTP extends Net_SSH2
|
|
2319 |
$offset+= strlen($temp);
|
2320 |
if ($local_file === false) {
|
2321 |
$content.= $temp;
|
|
|
|
|
2322 |
} else {
|
2323 |
fputs($fp, $temp);
|
2324 |
}
|
|
|
|
|
|
|
2325 |
$temp = null;
|
2326 |
break;
|
2327 |
case NET_SFTP_STATUS:
|
@@ -2333,7 +2641,14 @@ class Net_SFTP extends Net_SSH2
|
|
2333 |
if ($fclose_check) {
|
2334 |
fclose($fp);
|
2335 |
}
|
2336 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2337 |
}
|
2338 |
$response = null;
|
2339 |
}
|
@@ -2353,6 +2668,11 @@ class Net_SFTP extends Net_SSH2
|
|
2353 |
|
2354 |
if ($fclose_check) {
|
2355 |
fclose($fp);
|
|
|
|
|
|
|
|
|
|
|
2356 |
}
|
2357 |
|
2358 |
if (!$this->_close_handle($handle)) {
|
@@ -2373,7 +2693,7 @@ class Net_SFTP extends Net_SSH2
|
|
2373 |
*/
|
2374 |
function delete($path, $recursive = true)
|
2375 |
{
|
2376 |
-
if (
|
2377 |
return false;
|
2378 |
}
|
2379 |
|
@@ -2502,6 +2822,10 @@ class Net_SFTP extends Net_SSH2
|
|
2502 |
function file_exists($path)
|
2503 |
{
|
2504 |
if ($this->use_stat_cache) {
|
|
|
|
|
|
|
|
|
2505 |
$path = $this->_realpath($path);
|
2506 |
|
2507 |
$result = $this->_query_stat_cache($path);
|
@@ -2572,6 +2896,10 @@ class Net_SFTP extends Net_SSH2
|
|
2572 |
*/
|
2573 |
function is_readable($path)
|
2574 |
{
|
|
|
|
|
|
|
|
|
2575 |
$path = $this->_realpath($path);
|
2576 |
|
2577 |
$packet = pack('Na*N2', strlen($path), $path, NET_SFTP_OPEN_READ, 0);
|
@@ -2600,6 +2928,10 @@ class Net_SFTP extends Net_SSH2
|
|
2600 |
*/
|
2601 |
function is_writable($path)
|
2602 |
{
|
|
|
|
|
|
|
|
|
2603 |
$path = $this->_realpath($path);
|
2604 |
|
2605 |
$packet = pack('Na*N2', strlen($path), $path, NET_SFTP_OPEN_WRITE, 0);
|
@@ -2774,11 +3106,16 @@ class Net_SFTP extends Net_SSH2
|
|
2774 |
*
|
2775 |
* @param string $path
|
2776 |
* @param string $prop
|
|
|
2777 |
* @return mixed
|
2778 |
* @access private
|
2779 |
*/
|
2780 |
function _get_xstat_cache_prop($path, $prop, $type)
|
2781 |
{
|
|
|
|
|
|
|
|
|
2782 |
if ($this->use_stat_cache) {
|
2783 |
$path = $this->_realpath($path);
|
2784 |
|
@@ -2799,7 +3136,9 @@ class Net_SFTP extends Net_SSH2
|
|
2799 |
}
|
2800 |
|
2801 |
/**
|
2802 |
-
* Renames a file or a directory on the SFTP server
|
|
|
|
|
2803 |
*
|
2804 |
* @param string $oldname
|
2805 |
* @param string $newname
|
@@ -2808,7 +3147,7 @@ class Net_SFTP extends Net_SSH2
|
|
2808 |
*/
|
2809 |
function rename($oldname, $newname)
|
2810 |
{
|
2811 |
-
if (
|
2812 |
return false;
|
2813 |
}
|
2814 |
|
@@ -2820,6 +3159,18 @@ class Net_SFTP extends Net_SSH2
|
|
2820 |
|
2821 |
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.3
|
2822 |
$packet = pack('Na*Na*', strlen($oldname), $oldname, strlen($newname), $newname);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2823 |
if (!$this->_send_sftp_packet(NET_SFTP_RENAME, $packet)) {
|
2824 |
return false;
|
2825 |
}
|
@@ -2849,6 +3200,31 @@ class Net_SFTP extends Net_SSH2
|
|
2849 |
return true;
|
2850 |
}
|
2851 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2852 |
/**
|
2853 |
* Parse Attributes
|
2854 |
*
|
@@ -2860,16 +3236,56 @@ class Net_SFTP extends Net_SSH2
|
|
2860 |
*/
|
2861 |
function _parseAttributes(&$response)
|
2862 |
{
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2863 |
$attr = array();
|
2864 |
-
if (strlen($response) <
|
2865 |
user_error('Malformed file attributes');
|
2866 |
return array();
|
2867 |
}
|
2868 |
-
extract(unpack(
|
2869 |
-
|
|
|
|
|
2870 |
foreach ($this->attributes as $key => $value) {
|
2871 |
switch ($flags & $key) {
|
2872 |
-
case
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2873 |
// The size attribute is defined as an unsigned 64-bit integer.
|
2874 |
// The following will use floats on 32-bit platforms, if necessary.
|
2875 |
// As can be seen in the BigInteger class, floats are generally
|
@@ -2878,14 +3294,14 @@ class Net_SFTP extends Net_SSH2
|
|
2878 |
// of precision. Interpreted in filesize, 2^50 bytes = 1024 TiB.
|
2879 |
$attr['size'] = hexdec(bin2hex($this->_string_shift($response, 8)));
|
2880 |
break;
|
2881 |
-
case NET_SFTP_ATTR_UIDGID:
|
2882 |
if (strlen($response) < 8) {
|
2883 |
user_error('Malformed file attributes');
|
2884 |
return $attr;
|
2885 |
}
|
2886 |
$attr+= unpack('Nuid/Ngid', $this->_string_shift($response, 8));
|
2887 |
break;
|
2888 |
-
case NET_SFTP_ATTR_PERMISSIONS:
|
2889 |
if (strlen($response) < 4) {
|
2890 |
user_error('Malformed file attributes');
|
2891 |
return $attr;
|
@@ -2899,14 +3315,134 @@ class Net_SFTP extends Net_SSH2
|
|
2899 |
$attr+= array('type' => $fileType);
|
2900 |
}
|
2901 |
break;
|
2902 |
-
case NET_SFTP_ATTR_ACCESSTIME:
|
|
|
|
|
|
|
|
|
2903 |
if (strlen($response) < 8) {
|
2904 |
user_error('Malformed file attributes');
|
2905 |
return $attr;
|
2906 |
}
|
2907 |
$attr+= unpack('Natime/Nmtime', $this->_string_shift($response, 8));
|
2908 |
break;
|
2909 |
-
case
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2910 |
if (strlen($response) < 4) {
|
2911 |
user_error('Malformed file attributes');
|
2912 |
return $attr;
|
@@ -3014,6 +3550,7 @@ class Net_SFTP extends Net_SSH2
|
|
3014 |
*
|
3015 |
* @param int $type
|
3016 |
* @param string $data
|
|
|
3017 |
* @see self::_get_sftp_packet()
|
3018 |
* @see Net_SSH2::_send_channel_packet()
|
3019 |
* @return bool
|
@@ -3021,6 +3558,10 @@ class Net_SFTP extends Net_SSH2
|
|
3021 |
*/
|
3022 |
function _send_sftp_packet($type, $data, $request_id = 1)
|
3023 |
{
|
|
|
|
|
|
|
|
|
3024 |
$packet = $this->use_request_id ?
|
3025 |
pack('NCNa*', strlen($data) + 5, $type, $request_id, $data) :
|
3026 |
pack('NCa*', strlen($data) + 1, $type, $data);
|
@@ -3033,9 +3574,17 @@ class Net_SFTP extends Net_SSH2
|
|
3033 |
$packet_type = '-> ' . $this->packet_types[$type] .
|
3034 |
' (' . round($stop - $start, 4) . 's)';
|
3035 |
if (NET_SFTP_LOGGING == NET_SFTP_LOG_REALTIME) {
|
3036 |
-
|
3037 |
-
|
3038 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3039 |
} else {
|
3040 |
$this->packet_type_log[] = $packet_type;
|
3041 |
if (NET_SFTP_LOGGING == NET_SFTP_LOG_COMPLEX) {
|
@@ -3076,6 +3625,8 @@ class Net_SFTP extends Net_SSH2
|
|
3076 |
*/
|
3077 |
function _get_sftp_packet($request_id = null)
|
3078 |
{
|
|
|
|
|
3079 |
if (isset($request_id) && isset($this->requestBuffer[$request_id])) {
|
3080 |
$this->packet_type = $this->requestBuffer[$request_id]['packet_type'];
|
3081 |
$temp = $this->requestBuffer[$request_id]['packet'];
|
@@ -3092,11 +3643,17 @@ class Net_SFTP extends Net_SSH2
|
|
3092 |
// SFTP packet length
|
3093 |
while (strlen($this->packet_buffer) < 4) {
|
3094 |
$temp = $this->_get_channel_packet(NET_SFTP_CHANNEL, true);
|
3095 |
-
if (
|
|
|
|
|
|
|
3096 |
$this->packet_type = false;
|
3097 |
$this->packet_buffer = '';
|
3098 |
return false;
|
3099 |
}
|
|
|
|
|
|
|
3100 |
$this->packet_buffer.= $temp;
|
3101 |
}
|
3102 |
if (strlen($this->packet_buffer) < 4) {
|
@@ -3106,9 +3663,8 @@ class Net_SFTP extends Net_SSH2
|
|
3106 |
$tempLength = $length;
|
3107 |
$tempLength-= strlen($this->packet_buffer);
|
3108 |
|
3109 |
-
|
3110 |
// 256 * 1024 is what SFTP_MAX_MSG_LENGTH is set to in OpenSSH's sftp-common.h
|
3111 |
-
if ($tempLength > 256 * 1024) {
|
3112 |
user_error('Invalid SFTP packet size');
|
3113 |
return false;
|
3114 |
}
|
@@ -3142,9 +3698,17 @@ class Net_SFTP extends Net_SSH2
|
|
3142 |
$packet_type = '<- ' . $this->packet_types[$this->packet_type] .
|
3143 |
' (' . round($stop - $start, 4) . 's)';
|
3144 |
if (NET_SFTP_LOGGING == NET_SFTP_LOG_REALTIME) {
|
3145 |
-
|
3146 |
-
|
3147 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3148 |
} else {
|
3149 |
$this->packet_type_log[] = $packet_type;
|
3150 |
if (NET_SFTP_LOGGING == NET_SFTP_LOG_COMPLEX) {
|
@@ -3218,13 +3782,51 @@ class Net_SFTP extends Net_SSH2
|
|
3218 |
*/
|
3219 |
function getSupportedVersions()
|
3220 |
{
|
3221 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3222 |
if (isset($this->extensions['versions'])) {
|
3223 |
$temp['extensions'] = $this->extensions['versions'];
|
3224 |
}
|
3225 |
return $temp;
|
3226 |
}
|
3227 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3228 |
/**
|
3229 |
* Disconnect
|
3230 |
*
|
@@ -3237,4 +3839,24 @@ class Net_SFTP extends Net_SSH2
|
|
3237 |
$this->pwd = false;
|
3238 |
parent::_disconnect($reason);
|
3239 |
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3240 |
}
|
5 |
*
|
6 |
* PHP versions 4 and 5
|
7 |
*
|
8 |
+
* Supports SFTPv2/3/4/5/6. Defaults to v3.
|
|
|
|
|
9 |
*
|
10 |
* The API for this library is modeled after the API from PHP's {@link http://php.net/book.ftp FTP extension}.
|
11 |
*
|
193 |
*/
|
194 |
var $version;
|
195 |
|
196 |
+
/**
|
197 |
+
* Default Server SFTP version
|
198 |
+
*
|
199 |
+
* @var int
|
200 |
+
* @see self::_initChannel()
|
201 |
+
* @access private
|
202 |
+
*/
|
203 |
+
var $defaultVersion;
|
204 |
+
|
205 |
+
/**
|
206 |
+
* Preferred SFTP version
|
207 |
+
*
|
208 |
+
* @var int
|
209 |
+
* @see self::_initChannel()
|
210 |
+
* @access private
|
211 |
+
*/
|
212 |
+
var $preferredVersion = 3;
|
213 |
+
|
214 |
/**
|
215 |
* Current working directory
|
216 |
*
|
316 |
*/
|
317 |
var $requestBuffer = array();
|
318 |
|
319 |
+
/**
|
320 |
+
* Preserve timestamps on file downloads / uploads
|
321 |
+
*
|
322 |
+
* @see self::get()
|
323 |
+
* @see self::put()
|
324 |
+
* @var bool
|
325 |
+
* @access private
|
326 |
+
*/
|
327 |
+
var $preserveTime = false;
|
328 |
+
|
329 |
+
/**
|
330 |
+
* Arbitrary Length Packets Flag
|
331 |
+
*
|
332 |
+
* Determines whether or not packets of any length should be allowed,
|
333 |
+
* in cases where the server chooses the packet length (such as
|
334 |
+
* directory listings). By default, packets are only allowed to be
|
335 |
+
* 256 * 1024 bytes (SFTP_MAX_MSG_LENGTH from OpenSSH's sftp-common.h)
|
336 |
+
*
|
337 |
+
* @see self::enableArbitraryLengthPackets()
|
338 |
+
* @see self::_get_sftp_packet()
|
339 |
+
* @var bool
|
340 |
+
* @access private
|
341 |
+
*/
|
342 |
+
var $allow_arbitrary_length_packets = false;
|
343 |
+
|
344 |
+
/**
|
345 |
+
* Was the last packet due to the channels being closed or not?
|
346 |
+
*
|
347 |
+
* @see self::get()
|
348 |
+
* @see self::get_sftp_packet()
|
349 |
+
* @var bool
|
350 |
+
* @access private
|
351 |
+
*/
|
352 |
+
var $channel_close = false;
|
353 |
+
|
354 |
+
/**
|
355 |
+
* Has the SFTP channel been partially negotiated?
|
356 |
+
*
|
357 |
+
* @var bool
|
358 |
+
* @access private
|
359 |
+
*/
|
360 |
+
var $partial_init = false;
|
361 |
+
|
362 |
/**
|
363 |
* Default Constructor.
|
364 |
*
|
379 |
$this->packet_types = array(
|
380 |
1 => 'NET_SFTP_INIT',
|
381 |
2 => 'NET_SFTP_VERSION',
|
|
|
|
|
|
|
382 |
3 => 'NET_SFTP_OPEN',
|
383 |
4 => 'NET_SFTP_CLOSE',
|
384 |
5 => 'NET_SFTP_READ',
|
385 |
6 => 'NET_SFTP_WRITE',
|
386 |
7 => 'NET_SFTP_LSTAT',
|
387 |
9 => 'NET_SFTP_SETSTAT',
|
388 |
+
10 => 'NET_SFTP_FSETSTAT',
|
389 |
11 => 'NET_SFTP_OPENDIR',
|
390 |
12 => 'NET_SFTP_READDIR',
|
391 |
13 => 'NET_SFTP_REMOVE',
|
393 |
15 => 'NET_SFTP_RMDIR',
|
394 |
16 => 'NET_SFTP_REALPATH',
|
395 |
17 => 'NET_SFTP_STAT',
|
|
|
|
|
|
|
396 |
18 => 'NET_SFTP_RENAME',
|
397 |
19 => 'NET_SFTP_READLINK',
|
398 |
20 => 'NET_SFTP_SYMLINK',
|
399 |
+
21 => 'NET_SFTP_LINK',
|
400 |
|
401 |
101=> 'NET_SFTP_STATUS',
|
402 |
102=> 'NET_SFTP_HANDLE',
|
|
|
|
|
|
|
403 |
103=> 'NET_SFTP_DATA',
|
404 |
104=> 'NET_SFTP_NAME',
|
405 |
105=> 'NET_SFTP_ATTRS',
|
444 |
// the order, in this case, matters quite a lot - see Net_SFTP::_parseAttributes() to understand why
|
445 |
$this->attributes = array(
|
446 |
0x00000001 => 'NET_SFTP_ATTR_SIZE',
|
447 |
+
0x00000002 => 'NET_SFTP_ATTR_UIDGID', // defined in SFTPv3, removed in SFTPv4+
|
448 |
+
0x00000080 => 'NET_SFTP_ATTR_OWNERGROUP', // defined in SFTPv4+
|
449 |
0x00000004 => 'NET_SFTP_ATTR_PERMISSIONS',
|
450 |
0x00000008 => 'NET_SFTP_ATTR_ACCESSTIME',
|
451 |
+
0x00000010 => 'NET_SFTP_ATTR_CREATETIME', // SFTPv4+
|
452 |
+
0x00000020 => 'NET_SFTP_ATTR_MODIFYTIME',
|
453 |
+
0x00000040 => 'NET_SFTP_ATTR_ACL',
|
454 |
+
0x00000100 => 'NET_SFTP_ATTR_SUBSECOND_TIMES',
|
455 |
+
0x00000200 => 'NET_SFTP_ATTR_BITS', // SFTPv5+
|
456 |
+
0x00000400 => 'NET_SFTP_ATTR_ALLOCATION_SIZE', // SFTPv6+
|
457 |
+
0x00000800 => 'NET_SFTP_ATTR_TEXT_HINT',
|
458 |
+
0x00001000 => 'NET_SFTP_ATTR_MIME_TYPE',
|
459 |
+
0x00002000 => 'NET_SFTP_ATTR_LINK_COUNT',
|
460 |
+
0x00004000 => 'NET_SFTP_ATTR_UNTRANSLATED_NAME',
|
461 |
+
0x00008000 => 'NET_SFTP_ATTR_CTIME',
|
462 |
// 0x80000000 will yield a floating point on 32-bit systems and converting floating points to integers
|
463 |
// yields inconsistent behavior depending on how php is compiled. so we left shift -1 (which, in
|
464 |
// two's compliment, consists of all 1 bits) by 31. on 64-bit systems this'll yield 0xFFFFFFFF80000000.
|
465 |
// that's not a problem, however, and 'anded' and a 32-bit number, as all the leading 1 bits are ignored.
|
466 |
(-1 << 31) & 0xFFFFFFFF => 'NET_SFTP_ATTR_EXTENDED'
|
467 |
);
|
|
|
|
|
|
|
468 |
$this->open_flags = array(
|
469 |
0x00000001 => 'NET_SFTP_OPEN_READ',
|
470 |
0x00000002 => 'NET_SFTP_OPEN_WRITE',
|
471 |
0x00000004 => 'NET_SFTP_OPEN_APPEND',
|
472 |
0x00000008 => 'NET_SFTP_OPEN_CREATE',
|
473 |
0x00000010 => 'NET_SFTP_OPEN_TRUNCATE',
|
474 |
+
0x00000020 => 'NET_SFTP_OPEN_EXCL',
|
475 |
+
0x00000040 => 'NET_SFTP_OPEN_TEXT' // defined in SFTPv4
|
476 |
+
);
|
477 |
+
// SFTPv5+ changed the flags up:
|
478 |
+
// https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-8.1.1.3
|
479 |
+
$this->open_flags5 = array(
|
480 |
+
// when SSH_FXF_ACCESS_DISPOSITION is a 3 bit field that controls how the file is opened
|
481 |
+
0x00000000 => 'NET_SFTP_OPEN_CREATE_NEW',
|
482 |
+
0x00000001 => 'NET_SFTP_OPEN_CREATE_TRUNCATE',
|
483 |
+
0x00000002 => 'NET_SFTP_OPEN_OPEN_EXISTING',
|
484 |
+
0x00000003 => 'NET_SFTP_OPEN_OPEN_OR_CREATE',
|
485 |
+
0x00000004 => 'NET_SFTP_OPEN_TRUNCATE_EXISTING',
|
486 |
+
// the rest of the flags are not supported
|
487 |
+
0x00000008 => 'NET_SFTP_OPEN_APPEND_DATA', // "the offset field of SS_FXP_WRITE requests is ignored"
|
488 |
+
0x00000010 => 'NET_SFTP_OPEN_APPEND_DATA_ATOMIC',
|
489 |
+
0x00000020 => 'NET_SFTP_OPEN_TEXT_MODE',
|
490 |
+
0x00000040 => 'NET_SFTP_OPEN_BLOCK_READ',
|
491 |
+
0x00000080 => 'NET_SFTP_OPEN_BLOCK_WRITE',
|
492 |
+
0x00000100 => 'NET_SFTP_OPEN_BLOCK_DELETE',
|
493 |
+
0x00000200 => 'NET_SFTP_OPEN_BLOCK_ADVISORY',
|
494 |
+
0x00000400 => 'NET_SFTP_OPEN_NOFOLLOW',
|
495 |
+
0x00000800 => 'NET_SFTP_OPEN_DELETE_ON_CLOSE',
|
496 |
+
0x00001000 => 'NET_SFTP_OPEN_ACCESS_AUDIT_ALARM_INFO',
|
497 |
+
0x00002000 => 'NET_SFTP_OPEN_ACCESS_BACKUP',
|
498 |
+
0x00004000 => 'NET_SFTP_OPEN_BACKUP_STREAM',
|
499 |
+
0x00008000 => 'NET_SFTP_OPEN_OVERRIDE_OWNER',
|
500 |
);
|
501 |
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-04#section-5.2
|
502 |
// see Net_SFTP::_parseLongname() for an explanation
|
518 |
$this->status_codes,
|
519 |
$this->attributes,
|
520 |
$this->open_flags,
|
521 |
+
$this->open_flags5,
|
522 |
$this->file_types
|
523 |
);
|
524 |
|
545 |
}
|
546 |
|
547 |
/**
|
548 |
+
* Check a few things before SFTP functions are called
|
549 |
*
|
|
|
|
|
550 |
* @return bool
|
551 |
* @access public
|
552 |
*/
|
553 |
+
function _precheck()
|
554 |
{
|
555 |
+
if (!($this->bitmap & NET_SSH2_MASK_LOGIN)) {
|
|
|
|
|
|
|
|
|
556 |
return false;
|
557 |
}
|
558 |
|
559 |
+
if ($this->pwd === false) {
|
560 |
+
return $this->_init_sftp_connection();
|
561 |
+
}
|
562 |
+
|
563 |
+
return true;
|
564 |
+
}
|
565 |
+
|
566 |
+
/**
|
567 |
+
* Partially initialize an SFTP connection
|
568 |
+
*
|
569 |
+
* @return bool
|
570 |
+
* @access public
|
571 |
+
*/
|
572 |
+
function _partial_init_sftp_connection()
|
573 |
+
{
|
574 |
$this->window_size_server_to_client[NET_SFTP_CHANNEL] = $this->window_size;
|
575 |
|
576 |
$packet = pack(
|
592 |
$response = $this->_get_channel_packet(NET_SFTP_CHANNEL, true);
|
593 |
if ($response === false) {
|
594 |
return false;
|
595 |
+
} elseif ($response === true && $this->isTimeout()) {
|
596 |
+
return false;
|
597 |
}
|
598 |
|
599 |
$packet = pack(
|
640 |
if ($response === false) {
|
641 |
return false;
|
642 |
}
|
643 |
+
} elseif ($response === true && $this->isTimeout()) {
|
644 |
+
return false;
|
645 |
}
|
646 |
|
647 |
$this->channel_status[NET_SFTP_CHANNEL] = NET_SSH2_MSG_CHANNEL_DATA;
|
656 |
return false;
|
657 |
}
|
658 |
|
659 |
+
$this->use_request_id = true;
|
660 |
+
|
661 |
if (strlen($response) < 4) {
|
662 |
return false;
|
663 |
}
|
664 |
extract(unpack('Nversion', $this->_string_shift($response, 4)));
|
665 |
+
$this->defaultVersion = $version;
|
666 |
while (!empty($response)) {
|
667 |
if (strlen($response) < 4) {
|
668 |
return false;
|
677 |
$this->extensions[$key] = $value;
|
678 |
}
|
679 |
|
680 |
+
$this->partial_init = true;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
681 |
|
682 |
+
return true;
|
683 |
+
}
|
684 |
+
|
685 |
+
/**
|
686 |
+
* (Re)initializes the SFTP channel
|
687 |
+
*
|
688 |
+
* @return bool
|
689 |
+
* @access private
|
690 |
+
*/
|
691 |
+
function _init_sftp_connection()
|
692 |
+
{
|
693 |
+
if (!$this->partial_init && !$this->_partial_init_sftp_connection()) {
|
694 |
+
return false;
|
695 |
+
}
|
696 |
|
697 |
/*
|
698 |
A Note on SFTPv4/5/6 support:
|
717 |
in draft-ietf-secsh-filexfer-13 would be quite impossible. As such, what Net_SFTP would do is close the
|
718 |
channel and reopen it with a new and updated SSH_FXP_INIT packet.
|
719 |
*/
|
720 |
+
$this->version = $this->defaultVersion;
|
721 |
+
if (isset($this->extensions['versions']) && (!$this->preferredVersion || $this->preferredVersion != $this->version)) {
|
722 |
+
$versions = explode(',', $this->extensions['versions']);
|
723 |
+
$supported = array(6, 5, 4);
|
724 |
+
if ($this->preferredVersion) {
|
725 |
+
$supported = array_diff($supported, array($this->preferredVersion));
|
726 |
+
array_unshift($supported, $this->preferredVersion);
|
727 |
+
}
|
728 |
+
foreach ($supported as $ver) {
|
729 |
+
if (in_array($ver, $versions)) {
|
730 |
+
if ($ver === $this->version) {
|
731 |
+
break;
|
732 |
+
}
|
733 |
+
$this->version = (int) $ver;
|
734 |
+
$packet = pack('Na*Na*', strlen('version-select'), 'version-select', strlen($ver), $ver);
|
735 |
+
if (!$this->_send_sftp_packet(NET_SFTP_EXTENDED, $packet)) {
|
736 |
+
return false;
|
737 |
+
}
|
738 |
+
$response = $this->_get_sftp_packet();
|
739 |
+
if ($this->packet_type != NET_SFTP_STATUS) {
|
740 |
+
user_error('Expected SSH_FXP_STATUS');
|
741 |
+
return false;
|
742 |
+
}
|
743 |
+
|
744 |
+
if (strlen($response) < 4) {
|
745 |
+
return false;
|
746 |
+
}
|
747 |
+
extract(unpack('Nstatus', $this->_string_shift($response, 4)));
|
748 |
+
if ($status != NET_SFTP_STATUS_OK) {
|
749 |
+
$this->_logError($response, $status);
|
750 |
+
return false;
|
751 |
+
}
|
752 |
+
|
753 |
+
break;
|
754 |
+
}
|
755 |
+
}
|
756 |
+
}
|
757 |
+
|
758 |
+
/*
|
759 |
+
SFTPv4+ defines a 'newline' extension. SFTPv3 seems to have unofficial support for it via 'newline@vandyke.com',
|
760 |
+
however, I'm not sure what 'newline@vandyke.com' is supposed to do (the fact that it's unofficial means that it's
|
761 |
+
not in the official SFTPv3 specs) and 'newline@vandyke.com' / 'newline' are likely not drop-in substitutes for
|
762 |
+
one another due to the fact that 'newline' comes with a SSH_FXF_TEXT bitmask whereas it seems unlikely that
|
763 |
+
'newline@vandyke.com' would.
|
764 |
+
*/
|
765 |
+
/*
|
766 |
+
if (isset($this->extensions['newline@vandyke.com'])) {
|
767 |
+
$this->extensions['newline'] = $this->extensions['newline@vandyke.com'];
|
768 |
+
unset($this->extensions['newline@vandyke.com']);
|
769 |
+
}
|
770 |
+
*/
|
771 |
+
|
772 |
+
if ($this->version < 2 || $this->version > 6) {
|
773 |
+
return false;
|
774 |
}
|
775 |
|
776 |
$this->pwd = $this->_realpath('.');
|
830 |
$this->canonicalize_paths = false;
|
831 |
}
|
832 |
|
833 |
+
/**
|
834 |
+
* Enable arbitrary length packets
|
835 |
+
*
|
836 |
+
* @access public
|
837 |
+
*/
|
838 |
+
function enableArbitraryLengthPackets()
|
839 |
+
{
|
840 |
+
$this->allow_arbitrary_length_packets = true;
|
841 |
+
}
|
842 |
+
|
843 |
+
/**
|
844 |
+
* Disable arbitrary length packets
|
845 |
+
*
|
846 |
+
* @access public
|
847 |
+
*/
|
848 |
+
function disableArbitraryLengthPackets()
|
849 |
+
{
|
850 |
+
$this->allow_arbitrary_length_packets = false;
|
851 |
+
}
|
852 |
+
|
853 |
/**
|
854 |
* Returns the current directory name
|
855 |
*
|
858 |
*/
|
859 |
function pwd()
|
860 |
{
|
861 |
+
if (!$this->_precheck()) {
|
862 |
+
return false;
|
863 |
+
}
|
864 |
+
|
865 |
return $this->pwd;
|
866 |
}
|
867 |
|
903 |
*/
|
904 |
function realpath($path)
|
905 |
{
|
906 |
+
if (!$this->_precheck()) {
|
907 |
+
return false;
|
908 |
+
}
|
909 |
+
|
910 |
return $this->_realpath($path);
|
911 |
}
|
912 |
|
989 |
*/
|
990 |
function chdir($dir)
|
991 |
{
|
992 |
+
if (!$this->_precheck()) {
|
993 |
return false;
|
994 |
}
|
995 |
|
1146 |
*/
|
1147 |
function _list($dir, $raw = true)
|
1148 |
{
|
1149 |
+
if (!$this->_precheck()) {
|
1150 |
return false;
|
1151 |
}
|
1152 |
|
1201 |
}
|
1202 |
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
1203 |
$shortname = $this->_string_shift($response, $length);
|
1204 |
+
// SFTPv4 "removed the long filename from the names structure-- it can now be
|
1205 |
+
// built from information available in the attrs structure."
|
1206 |
+
if ($this->version < 4) {
|
1207 |
+
if (strlen($response) < 4) {
|
1208 |
+
return false;
|
1209 |
+
}
|
1210 |
+
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
1211 |
+
$longname = $this->_string_shift($response, $length);
|
1212 |
}
|
|
|
|
|
1213 |
$attributes = $this->_parseAttributes($response);
|
1214 |
+
if (!isset($attributes['type']) && $this->version < 4) {
|
1215 |
$fileType = $this->_parseLongname($longname);
|
1216 |
if ($fileType) {
|
1217 |
$attributes['type'] = $fileType;
|
1257 |
uasort($contents, array(&$this, '_comparator'));
|
1258 |
}
|
1259 |
|
1260 |
+
return $raw ? $contents : array_map('strval', array_keys($contents));
|
1261 |
}
|
1262 |
|
1263 |
/**
|
1371 |
*/
|
1372 |
function size($filename)
|
1373 |
{
|
|
|
|
|
|
|
|
|
1374 |
$result = $this->stat($filename);
|
1375 |
if ($result === false) {
|
1376 |
return false;
|
1455 |
*
|
1456 |
* Mainly used by file_exists
|
1457 |
*
|
1458 |
+
* @param string $path
|
1459 |
* @return mixed
|
1460 |
* @access private
|
1461 |
*/
|
1487 |
*/
|
1488 |
function stat($filename)
|
1489 |
{
|
1490 |
+
if (!$this->_precheck()) {
|
1491 |
return false;
|
1492 |
}
|
1493 |
|
1544 |
*/
|
1545 |
function lstat($filename)
|
1546 |
{
|
1547 |
+
if (!$this->_precheck()) {
|
1548 |
return false;
|
1549 |
}
|
1550 |
|
1658 |
*/
|
1659 |
function touch($filename, $time = null, $atime = null)
|
1660 |
{
|
1661 |
+
if (!$this->_precheck()) {
|
1662 |
return false;
|
1663 |
}
|
1664 |
|
1674 |
$atime = $time;
|
1675 |
}
|
1676 |
|
1677 |
+
if ($this->version < 4) {
|
1678 |
+
$attr = pack('N3', NET_SFTP_ATTR_ACCESSTIME, $atime, $time);
|
1679 |
+
} else {
|
1680 |
+
$attr = pack(
|
1681 |
+
'N5',
|
1682 |
+
NET_SFTP_ATTR_ACCESSTIME | NET_SFTP_ATTR_MODIFYTIME,
|
1683 |
+
$atime / 4294967296,
|
1684 |
+
$atime,
|
1685 |
+
$time / 4294967296,
|
1686 |
+
$time
|
1687 |
+
);
|
1688 |
+
}
|
1689 |
+
|
1690 |
+
$packet = pack('Na*', strlen($filename), $filename);
|
1691 |
+
$packet.= $this->version >= 5 ?
|
1692 |
+
pack('N2', 0, NET_SFTP_OPEN_OPEN_EXISTING) :
|
1693 |
+
pack('N', NET_SFTP_OPEN_WRITE | NET_SFTP_OPEN_CREATE | NET_SFTP_OPEN_EXCL);
|
1694 |
+
$packet.= $attr;
|
1695 |
+
|
1696 |
if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
|
1697 |
return false;
|
1698 |
}
|
1715 |
/**
|
1716 |
* Changes file or directory owner
|
1717 |
*
|
1718 |
+
* $uid should be an int for SFTPv3 and a string for SFTPv4+. Ideally the string
|
1719 |
+
* would be of the form "user@dns_domain" but it does not need to be.
|
1720 |
+
* `$sftp->getSupportedVersions()['version']` will return the specific version
|
1721 |
+
* that's being used.
|
1722 |
+
*
|
1723 |
* Returns true on success or false on error.
|
1724 |
*
|
1725 |
* @param string $filename
|
1726 |
+
* @param int|string $uid
|
1727 |
* @param bool $recursive
|
1728 |
* @return bool
|
1729 |
* @access public
|
1730 |
*/
|
1731 |
function chown($filename, $uid, $recursive = false)
|
1732 |
{
|
1733 |
+
/*
|
1734 |
+
quoting <https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-7.5>,
|
1735 |
+
|
1736 |
+
"To avoid a representation that is tied to a particular underlying
|
1737 |
+
implementation at the client or server, the use of UTF-8 strings has
|
1738 |
+
been chosen. The string should be of the form "user@dns_domain".
|
1739 |
+
This will allow for a client and server that do not use the same
|
1740 |
+
local representation the ability to translate to a common syntax that
|
1741 |
+
can be interpreted by both. In the case where there is no
|
1742 |
+
translation available to the client or server, the attribute value
|
1743 |
+
must be constructed without the "@"."
|
1744 |
+
|
1745 |
+
phpseclib _could_ auto append the dns_domain to $uid BUT what if it shouldn't
|
1746 |
+
have one? phpseclib would have no way of knowing so rather than guess phpseclib
|
1747 |
+
will just use whatever value the user provided
|
1748 |
+
*/
|
1749 |
+
|
1750 |
+
$attr = $this->version < 4 ?
|
1751 |
+
// quoting <http://www.kernel.org/doc/man-pages/online/pages/man2/chown.2.html>,
|
1752 |
+
// "if the owner or group is specified as -1, then that ID is not changed"
|
1753 |
+
pack('N3', NET_SFTP_ATTR_UIDGID, $uid, -1) :
|
1754 |
+
// quoting <https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-7.5>,
|
1755 |
+
// "If either the owner or group field is zero length, the field should be
|
1756 |
+
// considered absent, and no change should be made to that specific field
|
1757 |
+
// during a modification operation"
|
1758 |
+
pack('NNa*Na*', NET_SFTP_ATTR_OWNERGROUP, strlen($uid), $uid, 0, '');
|
1759 |
|
1760 |
return $this->_setstat($filename, $attr, $recursive);
|
1761 |
}
|
1763 |
/**
|
1764 |
* Changes file or directory group
|
1765 |
*
|
1766 |
+
* $gid should be an int for SFTPv3 and a string for SFTPv4+. Ideally the string
|
1767 |
+
* would be of the form "user@dns_domain" but it does not need to be.
|
1768 |
+
* `$sftp->getSupportedVersions()['version']` will return the specific version
|
1769 |
+
* that's being used.
|
1770 |
+
*
|
1771 |
* Returns true on success or false on error.
|
1772 |
*
|
1773 |
* @param string $filename
|
1774 |
+
* @param int|string $gid
|
1775 |
* @param bool $recursive
|
1776 |
* @return bool
|
1777 |
* @access public
|
1778 |
*/
|
1779 |
function chgrp($filename, $gid, $recursive = false)
|
1780 |
{
|
1781 |
+
$attr = $this->version < 4 ?
|
1782 |
+
pack('N3', NET_SFTP_ATTR_UIDGID, $gid, -1) :
|
1783 |
+
pack('NNa*Na*', NET_SFTP_ATTR_OWNERGROUP, 0, '', strlen($gid), $gid);
|
1784 |
|
1785 |
return $this->_setstat($filename, $attr, $recursive);
|
1786 |
}
|
1847 |
*/
|
1848 |
function _setstat($filename, $attr, $recursive)
|
1849 |
{
|
1850 |
+
if (!$this->_precheck()) {
|
1851 |
return false;
|
1852 |
}
|
1853 |
|
1865 |
return $result;
|
1866 |
}
|
1867 |
|
1868 |
+
$packet = $this->version >= 4 ?
|
1869 |
+
pack('Na*a*Ca*', strlen($filename), $filename, substr($attr, 0, 4), NET_SFTP_TYPE_UNKNOWN, substr($attr, 4)) :
|
1870 |
+
pack('Na*a*', strlen($filename), $filename, $attr);
|
1871 |
+
if (!$this->_send_sftp_packet(NET_SFTP_SETSTAT, $packet)) {
|
1872 |
return false;
|
1873 |
}
|
1874 |
|
1938 |
return false;
|
1939 |
}
|
1940 |
} else {
|
1941 |
+
$packet = $this->version >= 4 ?
|
1942 |
+
pack('Na*Ca*', strlen($temp), $temp, NET_SFTP_TYPE_UNKNOWN, $attr) :
|
1943 |
+
pack('Na*a*', strlen($temp), $temp, $attr);
|
1944 |
+
if (!$this->_send_sftp_packet(NET_SFTP_SETSTAT, $packet)) {
|
1945 |
return false;
|
1946 |
}
|
1947 |
|
1956 |
}
|
1957 |
}
|
1958 |
|
1959 |
+
$packet = $this->version >= 4 ?
|
1960 |
+
pack('Na*Ca*', strlen($temp), $temp, NET_SFTP_TYPE_UNKNOWN, $attr) :
|
1961 |
+
pack('Na*a*', strlen($temp), $temp, $attr);
|
1962 |
+
if (!$this->_send_sftp_packet(NET_SFTP_SETSTAT, $packet)) {
|
1963 |
return false;
|
1964 |
}
|
1965 |
|
1984 |
*/
|
1985 |
function readlink($link)
|
1986 |
{
|
1987 |
+
if (!$this->_precheck()) {
|
1988 |
return false;
|
1989 |
}
|
1990 |
|
2034 |
*/
|
2035 |
function symlink($target, $link)
|
2036 |
{
|
2037 |
+
if (!$this->_precheck()) {
|
2038 |
return false;
|
2039 |
}
|
2040 |
|
2041 |
//$target = $this->_realpath($target);
|
2042 |
$link = $this->_realpath($link);
|
2043 |
|
2044 |
+
/* quoting https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-09#section-12.1 :
|
2045 |
+
|
2046 |
+
Changed the SYMLINK packet to be LINK and give it the ability to
|
2047 |
+
create hard links. Also change it's packet number because many
|
2048 |
+
implementation implemented SYMLINK with the arguments reversed.
|
2049 |
+
Hopefully the new argument names make it clear which way is which.
|
2050 |
+
*/
|
2051 |
+
if ($this->version == 6) {
|
2052 |
+
$type = NET_SFTP_LINK;
|
2053 |
+
$packet = pack('Na*Na*C', strlen($link), $link, strlen($target), $target, 1);
|
2054 |
+
} else {
|
2055 |
+
$type = NET_SFTP_SYMLINK;
|
2056 |
+
/* quoting http://bxr.su/OpenBSD/usr.bin/ssh/PROTOCOL#347 :
|
2057 |
+
|
2058 |
+
3.1. sftp: Reversal of arguments to SSH_FXP_SYMLINK
|
2059 |
+
|
2060 |
+
When OpenSSH's sftp-server was implemented, the order of the arguments
|
2061 |
+
to the SSH_FXP_SYMLINK method was inadvertently reversed. Unfortunately,
|
2062 |
+
the reversal was not noticed until the server was widely deployed. Since
|
2063 |
+
fixing this to follow the specification would cause incompatibility, the
|
2064 |
+
current order was retained. For correct operation, clients should send
|
2065 |
+
SSH_FXP_SYMLINK as follows:
|
2066 |
+
|
2067 |
+
uint32 id
|
2068 |
+
string targetpath
|
2069 |
+
string linkpath */
|
2070 |
+
$packet = substr($this->server_identifier, 0, 15) == 'SSH-2.0-OpenSSH' ?
|
2071 |
+
pack('Na*Na*', strlen($target), $target, strlen($link), $link) :
|
2072 |
+
pack('Na*Na*', strlen($link), $link, strlen($target), $target);
|
2073 |
+
}
|
2074 |
+
if (!$this->_send_sftp_packet($type, $packet)) {
|
2075 |
return false;
|
2076 |
}
|
2077 |
|
2097 |
* Creates a directory.
|
2098 |
*
|
2099 |
* @param string $dir
|
2100 |
+
* @param int $mode
|
2101 |
+
* @param bool $recursive
|
2102 |
* @return bool
|
2103 |
* @access public
|
2104 |
*/
|
2105 |
function mkdir($dir, $mode = -1, $recursive = false)
|
2106 |
{
|
2107 |
+
if (!$this->_precheck()) {
|
2108 |
return false;
|
2109 |
}
|
2110 |
|
2131 |
* Helper function for directory creation
|
2132 |
*
|
2133 |
* @param string $dir
|
2134 |
+
* @param int $mode
|
2135 |
* @return bool
|
2136 |
* @access private
|
2137 |
*/
|
2173 |
*/
|
2174 |
function rmdir($dir)
|
2175 |
{
|
2176 |
+
if (!$this->_precheck()) {
|
2177 |
return false;
|
2178 |
}
|
2179 |
|
2224 |
*
|
2225 |
* If $data is a resource then it'll be used as a resource instead.
|
2226 |
*
|
|
|
2227 |
* Setting $mode to NET_SFTP_CALLBACK will use $data as callback function, which gets only one parameter -- number
|
2228 |
* of bytes to return, and returns a string if there is some data or null if there is no more data
|
2229 |
*
|
2259 |
*/
|
2260 |
function put($remote_file, $data, $mode = NET_SFTP_STRING, $start = -1, $local_start = -1, $progressCallback = null)
|
2261 |
{
|
2262 |
+
if (!$this->_precheck()) {
|
2263 |
return false;
|
2264 |
}
|
2265 |
|
2270 |
|
2271 |
$this->_remove_from_stat_cache($remote_file);
|
2272 |
|
2273 |
+
if ($this->version >= 5) {
|
2274 |
+
$flags = NET_SFTP_OPEN_OPEN_OR_CREATE;
|
2275 |
+
} else {
|
2276 |
+
$flags = NET_SFTP_OPEN_WRITE | NET_SFTP_OPEN_CREATE;
|
2277 |
+
// according to the SFTP specs, NET_SFTP_OPEN_APPEND should "force all writes to append data at the end of the file."
|
2278 |
+
// in practice, it doesn't seem to do that.
|
2279 |
+
//$flags|= ($mode & NET_SFTP_RESUME) ? NET_SFTP_OPEN_APPEND : NET_SFTP_OPEN_TRUNCATE;
|
2280 |
+
}
|
2281 |
|
2282 |
if ($start >= 0) {
|
2283 |
$offset = $start;
|
2287 |
$offset = $size !== false ? $size : 0;
|
2288 |
} else {
|
2289 |
$offset = 0;
|
2290 |
+
if ($this->version >= 5) {
|
2291 |
+
$flags = NET_SFTP_OPEN_CREATE_TRUNCATE;
|
2292 |
+
} else {
|
2293 |
+
$flags|= NET_SFTP_OPEN_TRUNCATE;
|
2294 |
+
}
|
2295 |
}
|
2296 |
|
2297 |
+
$packet = pack('Na*', strlen($remote_file), $remote_file);
|
2298 |
+
$packet.= $this->version >= 5 ?
|
2299 |
+
pack('N3', 0, $flags, 0) :
|
2300 |
+
pack('N2', $flags, 0);
|
2301 |
if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
|
2302 |
return false;
|
2303 |
}
|
2364 |
$sent = 0;
|
2365 |
$size = $size < 0 ? ($size & 0x7FFFFFFF) + 0x80000000 : $size;
|
2366 |
|
2367 |
+
$sftp_packet_size = $this->max_sftp_packet;
|
2368 |
+
// make the SFTP packet be exactly the SFTP packet size by including the bytes in the NET_SFTP_WRITE packets "header"
|
2369 |
$sftp_packet_size-= strlen($handle) + 25;
|
2370 |
$i = $j = 0;
|
2371 |
while ($dataCallback || ($size === 0 || $sent < $size)) {
|
2406 |
}
|
2407 |
}
|
2408 |
|
2409 |
+
$result = $this->_close_handle($handle);
|
2410 |
+
|
2411 |
if (!$this->_read_put_responses($i)) {
|
2412 |
if ($mode & NET_SFTP_LOCAL_FILE) {
|
2413 |
fclose($fp);
|
2417 |
}
|
2418 |
|
2419 |
if ($mode & NET_SFTP_LOCAL_FILE) {
|
2420 |
+
if (isset($fp) && is_resource($fp)) {
|
2421 |
+
fclose($fp);
|
2422 |
+
}
|
2423 |
+
|
2424 |
+
if ($this->preserveTime) {
|
2425 |
+
$stat = stat($data);
|
2426 |
+
if ($this->version < 4) {
|
2427 |
+
$attr = pack('N3', NET_SFTP_ATTR_ACCESSTIME, $stat['atime'], $stat['mtime']);
|
2428 |
+
} else {
|
2429 |
+
$attr = pack(
|
2430 |
+
'N5',
|
2431 |
+
NET_SFTP_ATTR_ACCESSTIME | NET_SFTP_ATTR_MODIFYTIME,
|
2432 |
+
$stat['atime'] / 4294967296,
|
2433 |
+
$stat['atime'],
|
2434 |
+
$stat['mtime'] / 4294967296,
|
2435 |
+
$stat['mtime']
|
2436 |
+
);
|
2437 |
+
}
|
2438 |
+
|
2439 |
+
if (!$this->_setstat($remote_file, $attr, false)) {
|
2440 |
+
user_error('Error setting file time');
|
2441 |
+
}
|
2442 |
+
}
|
2443 |
}
|
2444 |
|
2445 |
+
return $result;
|
2446 |
}
|
2447 |
|
2448 |
/**
|
2529 |
*/
|
2530 |
function get($remote_file, $local_file = false, $offset = 0, $length = -1, $progressCallback = null)
|
2531 |
{
|
2532 |
+
if (!$this->_precheck()) {
|
2533 |
return false;
|
2534 |
}
|
2535 |
|
2538 |
return false;
|
2539 |
}
|
2540 |
|
2541 |
+
$packet = pack('Na*', strlen($remote_file), $remote_file);
|
2542 |
+
$packet.= $this->version >= 5 ?
|
2543 |
+
pack('N3', 0, NET_SFTP_OPEN_OPEN_EXISTING, 0) :
|
2544 |
+
pack('N2', NET_SFTP_OPEN_READ, 0);
|
2545 |
if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
|
2546 |
return false;
|
2547 |
}
|
2565 |
$res_offset = $stat['size'];
|
2566 |
} else {
|
2567 |
$res_offset = 0;
|
2568 |
+
if ($local_file !== false && !is_callable($local_file)) {
|
2569 |
$fp = fopen($local_file, 'wb');
|
2570 |
if (!$fp) {
|
2571 |
return false;
|
2575 |
}
|
2576 |
}
|
2577 |
|
2578 |
+
$fclose_check = $local_file !== false && !is_callable($local_file) && !is_resource($local_file);
|
2579 |
|
2580 |
$start = $offset;
|
2581 |
$read = 0;
|
2596 |
}
|
2597 |
$packet = null;
|
2598 |
$read+= $packet_size;
|
|
|
|
|
|
|
2599 |
$i++;
|
2600 |
}
|
2601 |
|
2622 |
$offset+= strlen($temp);
|
2623 |
if ($local_file === false) {
|
2624 |
$content.= $temp;
|
2625 |
+
} elseif (is_callable($local_file)) {
|
2626 |
+
$local_file($temp);
|
2627 |
} else {
|
2628 |
fputs($fp, $temp);
|
2629 |
}
|
2630 |
+
if (is_callable($progressCallback)) {
|
2631 |
+
call_user_func($progressCallback, $offset);
|
2632 |
+
}
|
2633 |
$temp = null;
|
2634 |
break;
|
2635 |
case NET_SFTP_STATUS:
|
2641 |
if ($fclose_check) {
|
2642 |
fclose($fp);
|
2643 |
}
|
2644 |
+
// maybe the file was successfully transferred, maybe it wasn't
|
2645 |
+
if ($this->channel_close) {
|
2646 |
+
$this->partial_init = false;
|
2647 |
+
$this->_init_sftp_connection();
|
2648 |
+
return false;
|
2649 |
+
} else {
|
2650 |
+
user_error('Expected SSH_FX_DATA or SSH_FXP_STATUS');
|
2651 |
+
}
|
2652 |
}
|
2653 |
$response = null;
|
2654 |
}
|
2668 |
|
2669 |
if ($fclose_check) {
|
2670 |
fclose($fp);
|
2671 |
+
|
2672 |
+
if ($this->preserveTime) {
|
2673 |
+
$stat = $this->stat($remote_file);
|
2674 |
+
touch($local_file, $stat['mtime'], $stat['atime']);
|
2675 |
+
}
|
2676 |
}
|
2677 |
|
2678 |
if (!$this->_close_handle($handle)) {
|
2693 |
*/
|
2694 |
function delete($path, $recursive = true)
|
2695 |
{
|
2696 |
+
if (!$this->_precheck()) {
|
2697 |
return false;
|
2698 |
}
|
2699 |
|
2822 |
function file_exists($path)
|
2823 |
{
|
2824 |
if ($this->use_stat_cache) {
|
2825 |
+
if (!$this->_precheck()) {
|
2826 |
+
return false;
|
2827 |
+
}
|
2828 |
+
|
2829 |
$path = $this->_realpath($path);
|
2830 |
|
2831 |
$result = $this->_query_stat_cache($path);
|
2896 |
*/
|
2897 |
function is_readable($path)
|
2898 |
{
|
2899 |
+
if (!$this->_precheck()) {
|
2900 |
+
return false;
|
2901 |
+
}
|
2902 |
+
|
2903 |
$path = $this->_realpath($path);
|
2904 |
|
2905 |
$packet = pack('Na*N2', strlen($path), $path, NET_SFTP_OPEN_READ, 0);
|
2928 |
*/
|
2929 |
function is_writable($path)
|
2930 |
{
|
2931 |
+
if (!$this->_precheck()) {
|
2932 |
+
return false;
|
2933 |
+
}
|
2934 |
+
|
2935 |
$path = $this->_realpath($path);
|
2936 |
|
2937 |
$packet = pack('Na*N2', strlen($path), $path, NET_SFTP_OPEN_WRITE, 0);
|
3106 |
*
|
3107 |
* @param string $path
|
3108 |
* @param string $prop
|
3109 |
+
* @param mixed $type
|
3110 |
* @return mixed
|
3111 |
* @access private
|
3112 |
*/
|
3113 |
function _get_xstat_cache_prop($path, $prop, $type)
|
3114 |
{
|
3115 |
+
if (!$this->_precheck()) {
|
3116 |
+
return false;
|
3117 |
+
}
|
3118 |
+
|
3119 |
if ($this->use_stat_cache) {
|
3120 |
$path = $this->_realpath($path);
|
3121 |
|
3136 |
}
|
3137 |
|
3138 |
/**
|
3139 |
+
* Renames a file or a directory on the SFTP server.
|
3140 |
+
*
|
3141 |
+
* If the file already exists this will return false
|
3142 |
*
|
3143 |
* @param string $oldname
|
3144 |
* @param string $newname
|
3147 |
*/
|
3148 |
function rename($oldname, $newname)
|
3149 |
{
|
3150 |
+
if (!$this->_precheck()) {
|
3151 |
return false;
|
3152 |
}
|
3153 |
|
3159 |
|
3160 |
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.3
|
3161 |
$packet = pack('Na*Na*', strlen($oldname), $oldname, strlen($newname), $newname);
|
3162 |
+
if ($this->version >= 5) {
|
3163 |
+
/* quoting https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-05#section-6.5 ,
|
3164 |
+
|
3165 |
+
'flags' is 0 or a combination of:
|
3166 |
+
|
3167 |
+
SSH_FXP_RENAME_OVERWRITE 0x00000001
|
3168 |
+
SSH_FXP_RENAME_ATOMIC 0x00000002
|
3169 |
+
SSH_FXP_RENAME_NATIVE 0x00000004
|
3170 |
+
|
3171 |
+
(none of these are currently supported) */
|
3172 |
+
$packet.= "\0\0\0\0";
|
3173 |
+
}
|
3174 |
if (!$this->_send_sftp_packet(NET_SFTP_RENAME, $packet)) {
|
3175 |
return false;
|
3176 |
}
|
3200 |
return true;
|
3201 |
}
|
3202 |
|
3203 |
+
/**
|
3204 |
+
* Parse Time
|
3205 |
+
*
|
3206 |
+
* See '7.7. Times' of draft-ietf-secsh-filexfer-13 for more info.
|
3207 |
+
*
|
3208 |
+
* @param string $key
|
3209 |
+
* @param int $flags
|
3210 |
+
* @param string $response
|
3211 |
+
* @return array
|
3212 |
+
* @access private
|
3213 |
+
*/
|
3214 |
+
function _parseTime($key, $flags, &$response)
|
3215 |
+
{
|
3216 |
+
if (strlen($response) < 8) {
|
3217 |
+
user_error('Malformed file attributes');
|
3218 |
+
return array();
|
3219 |
+
}
|
3220 |
+
$attr = array();
|
3221 |
+
$attr[$key] = hexdec(bin2hex($this->_string_shift($response, 8)));
|
3222 |
+
if ($flags & NET_SFTP_ATTR_SUBSECOND_TIMES) {
|
3223 |
+
$attr+= extract(unpack('N' . $key . '_nseconds', $this->_string_shift($response, 4)));
|
3224 |
+
}
|
3225 |
+
return $attr;
|
3226 |
+
}
|
3227 |
+
|
3228 |
/**
|
3229 |
* Parse Attributes
|
3230 |
*
|
3236 |
*/
|
3237 |
function _parseAttributes(&$response)
|
3238 |
{
|
3239 |
+
if ($this->version >= 4) {
|
3240 |
+
$length = 5;
|
3241 |
+
$format = 'Nflags/Ctype';
|
3242 |
+
} else {
|
3243 |
+
$length = 4;
|
3244 |
+
$format = 'Nflags';
|
3245 |
+
}
|
3246 |
+
|
3247 |
$attr = array();
|
3248 |
+
if (strlen($response) < $length) {
|
3249 |
user_error('Malformed file attributes');
|
3250 |
return array();
|
3251 |
}
|
3252 |
+
extract(unpack($format, $this->_string_shift($response, $length)));
|
3253 |
+
if (isset($type)) {
|
3254 |
+
$attr['type'] = $type;
|
3255 |
+
}
|
3256 |
foreach ($this->attributes as $key => $value) {
|
3257 |
switch ($flags & $key) {
|
3258 |
+
case NET_SFTP_ATTR_UIDGID:
|
3259 |
+
if ($this->version > 3) {
|
3260 |
+
continue 2;
|
3261 |
+
}
|
3262 |
+
break;
|
3263 |
+
case NET_SFTP_ATTR_CREATETIME:
|
3264 |
+
case NET_SFTP_ATTR_MODIFYTIME:
|
3265 |
+
case NET_SFTP_ATTR_ACL:
|
3266 |
+
case NET_SFTP_ATTR_OWNERGROUP:
|
3267 |
+
case NET_SFTP_ATTR_SUBSECOND_TIMES:
|
3268 |
+
if ($this->version < 4) {
|
3269 |
+
continue 2;
|
3270 |
+
}
|
3271 |
+
break;
|
3272 |
+
case NET_SFTP_ATTR_BITS:
|
3273 |
+
if ($this->version < 5) {
|
3274 |
+
continue 2;
|
3275 |
+
}
|
3276 |
+
break;
|
3277 |
+
case NET_SFTP_ATTR_ALLOCATION_SIZE:
|
3278 |
+
case NET_SFTP_ATTR_TEXT_HINT:
|
3279 |
+
case NET_SFTP_ATTR_MIME_TYPE:
|
3280 |
+
case NET_SFTP_ATTR_LINK_COUNT:
|
3281 |
+
case NET_SFTP_ATTR_UNTRANSLATED_NAME:
|
3282 |
+
case NET_SFTP_ATTR_CTIME:
|
3283 |
+
if ($this->version < 6) {
|
3284 |
+
continue 2;
|
3285 |
+
}
|
3286 |
+
}
|
3287 |
+
switch ($flags & $key) {
|
3288 |
+
case NET_SFTP_ATTR_SIZE: // 0x00000001
|
3289 |
// The size attribute is defined as an unsigned 64-bit integer.
|
3290 |
// The following will use floats on 32-bit platforms, if necessary.
|
3291 |
// As can be seen in the BigInteger class, floats are generally
|
3294 |
// of precision. Interpreted in filesize, 2^50 bytes = 1024 TiB.
|
3295 |
$attr['size'] = hexdec(bin2hex($this->_string_shift($response, 8)));
|
3296 |
break;
|
3297 |
+
case NET_SFTP_ATTR_UIDGID: // 0x00000002 (SFTPv3 or earlier)
|
3298 |
if (strlen($response) < 8) {
|
3299 |
user_error('Malformed file attributes');
|
3300 |
return $attr;
|
3301 |
}
|
3302 |
$attr+= unpack('Nuid/Ngid', $this->_string_shift($response, 8));
|
3303 |
break;
|
3304 |
+
case NET_SFTP_ATTR_PERMISSIONS: // 0x00000004
|
3305 |
if (strlen($response) < 4) {
|
3306 |
user_error('Malformed file attributes');
|
3307 |
return $attr;
|
3315 |
$attr+= array('type' => $fileType);
|
3316 |
}
|
3317 |
break;
|
3318 |
+
case NET_SFTP_ATTR_ACCESSTIME: // 0x00000008
|
3319 |
+
if ($this->version >= 4) {
|
3320 |
+
$attr+= $this->_parseTime('atime', $flags, $response);
|
3321 |
+
break;
|
3322 |
+
}
|
3323 |
if (strlen($response) < 8) {
|
3324 |
user_error('Malformed file attributes');
|
3325 |
return $attr;
|
3326 |
}
|
3327 |
$attr+= unpack('Natime/Nmtime', $this->_string_shift($response, 8));
|
3328 |
break;
|
3329 |
+
case NET_SFTP_ATTR_CREATETIME: // 0x00000010 (SFTPv4+)
|
3330 |
+
$attr+= $this->_parseTime('createtime', $flags, $response);
|
3331 |
+
break;
|
3332 |
+
case NET_SFTP_ATTR_MODIFYTIME: // 0x00000020
|
3333 |
+
$attr+= $this->_parseTime('mtime', $flags, $response);
|
3334 |
+
break;
|
3335 |
+
case NET_SFTP_ATTR_ACL: // 0x00000040
|
3336 |
+
// access control list
|
3337 |
+
// see https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-04#section-5.7
|
3338 |
+
// currently unsupported
|
3339 |
+
if (strlen($response) < 4) {
|
3340 |
+
user_error('Malformed file attributes');
|
3341 |
+
return $attr;
|
3342 |
+
}
|
3343 |
+
extract(unpack('Ncount', $this->_string_shift($response, 4)));
|
3344 |
+
for ($i = 0; $i < $count; $i++) {
|
3345 |
+
if (strlen($response) < 16) {
|
3346 |
+
user_error('Malformed file attributes');
|
3347 |
+
return $attr;
|
3348 |
+
}
|
3349 |
+
extract(unpack('Ntype/Nflag/Nmask/Nlength', $this->_string_shift($response, 16)));
|
3350 |
+
if (strlen($response) < $length) {
|
3351 |
+
user_error('Malformed file attributes');
|
3352 |
+
return $attr;
|
3353 |
+
}
|
3354 |
+
$this->_string_shift($response, $length); // who
|
3355 |
+
}
|
3356 |
+
break;
|
3357 |
+
case NET_SFTP_ATTR_OWNERGROUP: // 0x00000080
|
3358 |
+
if (strlen($response) < 4) {
|
3359 |
+
user_error('Malformed file attributes');
|
3360 |
+
return $attr;
|
3361 |
+
}
|
3362 |
+
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
3363 |
+
if (strlen($response) < $length) {
|
3364 |
+
user_error('Malformed file attributes');
|
3365 |
+
return $attr;
|
3366 |
+
}
|
3367 |
+
$attr['owner'] = $this->_string_shift($response, $length);
|
3368 |
+
|
3369 |
+
if (strlen($response) < 4) {
|
3370 |
+
user_error('Malformed file attributes');
|
3371 |
+
return $attr;
|
3372 |
+
}
|
3373 |
+
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
3374 |
+
if (strlen($response) < $length) {
|
3375 |
+
user_error('Malformed file attributes');
|
3376 |
+
return $attr;
|
3377 |
+
}
|
3378 |
+
$attr['group'] = $this->_string_shift($response, $length);
|
3379 |
+
break;
|
3380 |
+
case NET_SFTP_ATTR_SUBSECOND_TIMES: // 0x00000100
|
3381 |
+
break;
|
3382 |
+
case NET_SFTP_ATTR_BITS: // 0x00000200 (SFTPv5+)
|
3383 |
+
// see https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-05#section-5.8
|
3384 |
+
// currently unsupported
|
3385 |
+
// tells if you file is:
|
3386 |
+
// readonly, system, hidden, case inensitive, archive, encrypted, compressed, sparse
|
3387 |
+
// append only, immutable, sync
|
3388 |
+
if (strlen($response) < 8) {
|
3389 |
+
user_error('Malformed file attributes');
|
3390 |
+
return $attr;
|
3391 |
+
}
|
3392 |
+
extract(unpack('Nattrib-bits/Nattrib-bits-valid', $this->_string_shift($response, 8)));
|
3393 |
+
break;
|
3394 |
+
case NET_SFTP_ATTR_ALLOCATION_SIZE: // 0x00000400 (SFTPv6+)
|
3395 |
+
// see https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-7.4
|
3396 |
+
// represents the number of bytes htat the file consumes on the disk. will
|
3397 |
+
// usually be larger than the 'size' field
|
3398 |
+
$attr['allocation-size'] = hexdec(bin2hex($this->_string_shift($response, 8)));
|
3399 |
+
break;
|
3400 |
+
case NET_SFTP_ATTR_TEXT_HINT: // 0x00000800
|
3401 |
+
// https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-7.10
|
3402 |
+
// currently unsupported
|
3403 |
+
// tells if file is "known text", "guessed text", "known binary", "guessed binary"
|
3404 |
+
extract(unpack('Ctext-hint', $this->_string_shift($response)));
|
3405 |
+
break;
|
3406 |
+
case NET_SFTP_ATTR_MIME_TYPE: // 0x00001000
|
3407 |
+
// see https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-7.11
|
3408 |
+
if (strlen($response) < 4) {
|
3409 |
+
user_error('Malformed file attributes');
|
3410 |
+
return $attr;
|
3411 |
+
}
|
3412 |
+
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
3413 |
+
if (strlen($response) < $length) {
|
3414 |
+
user_error('Malformed file attributes');
|
3415 |
+
return $attr;
|
3416 |
+
}
|
3417 |
+
$attr['mime-type'] = $this->_string_shift($response, $length);
|
3418 |
+
break;
|
3419 |
+
case NET_SFTP_ATTR_LINK_COUNT: // 0x00002000
|
3420 |
+
// see https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-7.12
|
3421 |
+
if (strlen($response) < 4) {
|
3422 |
+
user_error('Malformed file attributes');
|
3423 |
+
return $attr;
|
3424 |
+
}
|
3425 |
+
$attr+= unpack('Nlink-count', $this->_string_shift($response, 4));
|
3426 |
+
break;
|
3427 |
+
case NET_SFTP_ATTR_UNTRANSLATED_NAME:// 0x00004000
|
3428 |
+
// see https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-7.13
|
3429 |
+
if (strlen($response) < 4) {
|
3430 |
+
user_error('Malformed file attributes');
|
3431 |
+
return $attr;
|
3432 |
+
}
|
3433 |
+
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
3434 |
+
if (strlen($response) < $length) {
|
3435 |
+
user_error('Malformed file attributes');
|
3436 |
+
return $attr;
|
3437 |
+
}
|
3438 |
+
$attr['untranslated-name'] = $this->_string_shift($response, $length);
|
3439 |
+
break;
|
3440 |
+
case NET_SFTP_ATTR_CTIME: // 0x00008000
|
3441 |
+
// 'ctime' contains the last time the file attributes were changed. The
|
3442 |
+
// exact meaning of this field depends on the server.
|
3443 |
+
$attr+= $this->_parseTime('ctime', $flags, $response);
|
3444 |
+
break;
|
3445 |
+
case NET_SFTP_ATTR_EXTENDED: // 0x80000000
|
3446 |
if (strlen($response) < 4) {
|
3447 |
user_error('Malformed file attributes');
|
3448 |
return $attr;
|
3550 |
*
|
3551 |
* @param int $type
|
3552 |
* @param string $data
|
3553 |
+
* @param int $request_id
|
3554 |
* @see self::_get_sftp_packet()
|
3555 |
* @see Net_SSH2::_send_channel_packet()
|
3556 |
* @return bool
|
3558 |
*/
|
3559 |
function _send_sftp_packet($type, $data, $request_id = 1)
|
3560 |
{
|
3561 |
+
// in SSH2.php the timeout is cumulative per function call. eg. exec() will
|
3562 |
+
// timeout after 10s. but for SFTP.php it's cumulative per packet
|
3563 |
+
$this->curTimeout = $this->timeout;
|
3564 |
+
|
3565 |
$packet = $this->use_request_id ?
|
3566 |
pack('NCNa*', strlen($data) + 5, $type, $request_id, $data) :
|
3567 |
pack('NCa*', strlen($data) + 1, $type, $data);
|
3574 |
$packet_type = '-> ' . $this->packet_types[$type] .
|
3575 |
' (' . round($stop - $start, 4) . 's)';
|
3576 |
if (NET_SFTP_LOGGING == NET_SFTP_LOG_REALTIME) {
|
3577 |
+
switch (PHP_SAPI) {
|
3578 |
+
case 'cli':
|
3579 |
+
$start = $stop = "\r\n";
|
3580 |
+
break;
|
3581 |
+
default:
|
3582 |
+
$start = '<pre>';
|
3583 |
+
$stop = '</pre>';
|
3584 |
+
}
|
3585 |
+
echo $start . $this->_format_log(array($data), array($packet_type)) . $stop;
|
3586 |
+
@flush();
|
3587 |
+
@ob_flush();
|
3588 |
} else {
|
3589 |
$this->packet_type_log[] = $packet_type;
|
3590 |
if (NET_SFTP_LOGGING == NET_SFTP_LOG_COMPLEX) {
|
3625 |
*/
|
3626 |
function _get_sftp_packet($request_id = null)
|
3627 |
{
|
3628 |
+
$this->channel_close = false;
|
3629 |
+
|
3630 |
if (isset($request_id) && isset($this->requestBuffer[$request_id])) {
|
3631 |
$this->packet_type = $this->requestBuffer[$request_id]['packet_type'];
|
3632 |
$temp = $this->requestBuffer[$request_id]['packet'];
|
3643 |
// SFTP packet length
|
3644 |
while (strlen($this->packet_buffer) < 4) {
|
3645 |
$temp = $this->_get_channel_packet(NET_SFTP_CHANNEL, true);
|
3646 |
+
if ($temp === true) {
|
3647 |
+
if ($this->channel_status[NET_SFTP_CHANNEL] === NET_SSH2_MSG_CHANNEL_CLOSE) {
|
3648 |
+
$this->channel_close = true;
|
3649 |
+
}
|
3650 |
$this->packet_type = false;
|
3651 |
$this->packet_buffer = '';
|
3652 |
return false;
|
3653 |
}
|
3654 |
+
if ($temp === false) {
|
3655 |
+
return false;
|
3656 |
+
}
|
3657 |
$this->packet_buffer.= $temp;
|
3658 |
}
|
3659 |
if (strlen($this->packet_buffer) < 4) {
|
3663 |
$tempLength = $length;
|
3664 |
$tempLength-= strlen($this->packet_buffer);
|
3665 |
|
|
|
3666 |
// 256 * 1024 is what SFTP_MAX_MSG_LENGTH is set to in OpenSSH's sftp-common.h
|
3667 |
+
if (!$this->allow_arbitrary_length_packets && !$this->use_request_id && $tempLength > 256 * 1024) {
|
3668 |
user_error('Invalid SFTP packet size');
|
3669 |
return false;
|
3670 |
}
|
3698 |
$packet_type = '<- ' . $this->packet_types[$this->packet_type] .
|
3699 |
' (' . round($stop - $start, 4) . 's)';
|
3700 |
if (NET_SFTP_LOGGING == NET_SFTP_LOG_REALTIME) {
|
3701 |
+
switch (PHP_SAPI) {
|
3702 |
+
case 'cli':
|
3703 |
+
$start = $stop = "\r\n";
|
3704 |
+
break;
|
3705 |
+
default:
|
3706 |
+
$start = '<pre>';
|
3707 |
+
$stop = '</pre>';
|
3708 |
+
}
|
3709 |
+
echo $start . $this->_format_log(array($packet), array($packet_type)) . $stop;
|
3710 |
+
@flush();
|
3711 |
+
@ob_flush();
|
3712 |
} else {
|
3713 |
$this->packet_type_log[] = $packet_type;
|
3714 |
if (NET_SFTP_LOGGING == NET_SFTP_LOG_COMPLEX) {
|
3782 |
*/
|
3783 |
function getSupportedVersions()
|
3784 |
{
|
3785 |
+
if (!($this->bitmap & NET_SSH2_MASK_LOGIN)) {
|
3786 |
+
return false;
|
3787 |
+
}
|
3788 |
+
|
3789 |
+
if (!$this->partial_init) {
|
3790 |
+
$this->_partial_init_sftp_connection();
|
3791 |
+
}
|
3792 |
+
|
3793 |
+
$temp = array('version' => $this->defaultVersion);
|
3794 |
if (isset($this->extensions['versions'])) {
|
3795 |
$temp['extensions'] = $this->extensions['versions'];
|
3796 |
}
|
3797 |
return $temp;
|
3798 |
}
|
3799 |
|
3800 |
+
/**
|
3801 |
+
* Get supported SFTP versions
|
3802 |
+
*
|
3803 |
+
* @return array
|
3804 |
+
* @access public
|
3805 |
+
*/
|
3806 |
+
function getNegotiatedVersion()
|
3807 |
+
{
|
3808 |
+
if (!$this->_precheck()) {
|
3809 |
+
return false;
|
3810 |
+
}
|
3811 |
+
|
3812 |
+
return $this->version;
|
3813 |
+
}
|
3814 |
+
|
3815 |
+
/**
|
3816 |
+
* Set preferred version
|
3817 |
+
*
|
3818 |
+
* If you're preferred version isn't supported then the highest supported
|
3819 |
+
* version of SFTP will be utilized. Set to null or false or int(0) to
|
3820 |
+
* unset the preferred version
|
3821 |
+
*
|
3822 |
+
* @param int $version
|
3823 |
+
* @access public
|
3824 |
+
*/
|
3825 |
+
function setPreferredVersion($version)
|
3826 |
+
{
|
3827 |
+
$this->preferredVersion = $version;
|
3828 |
+
}
|
3829 |
+
|
3830 |
/**
|
3831 |
* Disconnect
|
3832 |
*
|
3839 |
$this->pwd = false;
|
3840 |
parent::_disconnect($reason);
|
3841 |
}
|
3842 |
+
|
3843 |
+
/**
|
3844 |
+
* Enable Date Preservation
|
3845 |
+
*
|
3846 |
+
* @access public
|
3847 |
+
*/
|
3848 |
+
function enableDatePreservation()
|
3849 |
+
{
|
3850 |
+
$this->preserveTime = true;
|
3851 |
+
}
|
3852 |
+
|
3853 |
+
/**
|
3854 |
+
* Disable Date Preservation
|
3855 |
+
*
|
3856 |
+
* @access public
|
3857 |
+
*/
|
3858 |
+
function disableDatePreservation()
|
3859 |
+
{
|
3860 |
+
$this->preserveTime = false;
|
3861 |
+
}
|
3862 |
}
|
phpseclib/Net/SFTP/Stream.php
CHANGED
@@ -428,7 +428,7 @@ class Net_SFTP_Stream
|
|
428 |
{
|
429 |
switch ($whence) {
|
430 |
case SEEK_SET:
|
431 |
-
if ($offset
|
432 |
return false;
|
433 |
}
|
434 |
break;
|
@@ -465,7 +465,9 @@ class Net_SFTP_Stream
|
|
465 |
// and https://github.com/php/php-src/blob/master/main/php_streams.h#L592
|
466 |
switch ($option) {
|
467 |
case 1: // PHP_STREAM_META_TOUCH
|
468 |
-
|
|
|
|
|
469 |
case 2: // PHP_STREAM_OWNER_NAME
|
470 |
case 3: // PHP_STREAM_GROUP_NAME
|
471 |
return false;
|
@@ -644,7 +646,6 @@ class Net_SFTP_Stream
|
|
644 |
* $options. What does 8 correspond to?
|
645 |
*
|
646 |
* @param string $path
|
647 |
-
* @param int $mode
|
648 |
* @param int $options
|
649 |
* @return bool
|
650 |
* @access public
|
@@ -786,8 +787,8 @@ class Net_SFTP_Stream
|
|
786 |
* If NET_SFTP_STREAM_LOGGING is defined all calls will be output on the screen and then (regardless of whether or not
|
787 |
* NET_SFTP_STREAM_LOGGING is enabled) the parameters will be passed through to the appropriate method.
|
788 |
*
|
789 |
-
* @param string
|
790 |
-
* @param array
|
791 |
* @return mixed
|
792 |
* @access public
|
793 |
*/
|
428 |
{
|
429 |
switch ($whence) {
|
430 |
case SEEK_SET:
|
431 |
+
if ($offset < 0) {
|
432 |
return false;
|
433 |
}
|
434 |
break;
|
465 |
// and https://github.com/php/php-src/blob/master/main/php_streams.h#L592
|
466 |
switch ($option) {
|
467 |
case 1: // PHP_STREAM_META_TOUCH
|
468 |
+
$time = isset($var[0]) ? $var[0] : null;
|
469 |
+
$atime = isset($var[1]) ? $var[1] : null;
|
470 |
+
return $this->sftp->touch($path, $time, $atime);
|
471 |
case 2: // PHP_STREAM_OWNER_NAME
|
472 |
case 3: // PHP_STREAM_GROUP_NAME
|
473 |
return false;
|
646 |
* $options. What does 8 correspond to?
|
647 |
*
|
648 |
* @param string $path
|
|
|
649 |
* @param int $options
|
650 |
* @return bool
|
651 |
* @access public
|
787 |
* If NET_SFTP_STREAM_LOGGING is defined all calls will be output on the screen and then (regardless of whether or not
|
788 |
* NET_SFTP_STREAM_LOGGING is enabled) the parameters will be passed through to the appropriate method.
|
789 |
*
|
790 |
+
* @param string $name
|
791 |
+
* @param array $arguments
|
792 |
* @return mixed
|
793 |
* @access public
|
794 |
*/
|
phpseclib/Net/SSH1.php
CHANGED
@@ -857,6 +857,7 @@ class Net_SSH1
|
|
857 |
* @see self::interactiveRead()
|
858 |
* @see self::interactiveWrite()
|
859 |
* @param string $cmd
|
|
|
860 |
* @return mixed
|
861 |
* @access public
|
862 |
*/
|
@@ -1434,7 +1435,6 @@ class Net_SSH1
|
|
1434 |
* named constants from it, using the value as the name of the constant and the index as the value of the constant.
|
1435 |
* If any of the constants that would be defined already exists, none of the constants will be defined.
|
1436 |
*
|
1437 |
-
* @param array $array
|
1438 |
* @access private
|
1439 |
*/
|
1440 |
function _define_array()
|
@@ -1633,7 +1633,8 @@ class Net_SSH1
|
|
1633 |
*
|
1634 |
* Makes sure that only the last 1MB worth of packets will be logged
|
1635 |
*
|
1636 |
-
* @param
|
|
|
1637 |
* @access private
|
1638 |
*/
|
1639 |
function _append_log($protocol_flags, $message)
|
857 |
* @see self::interactiveRead()
|
858 |
* @see self::interactiveWrite()
|
859 |
* @param string $cmd
|
860 |
+
* @param bool $block
|
861 |
* @return mixed
|
862 |
* @access public
|
863 |
*/
|
1435 |
* named constants from it, using the value as the name of the constant and the index as the value of the constant.
|
1436 |
* If any of the constants that would be defined already exists, none of the constants will be defined.
|
1437 |
*
|
|
|
1438 |
* @access private
|
1439 |
*/
|
1440 |
function _define_array()
|
1633 |
*
|
1634 |
* Makes sure that only the last 1MB worth of packets will be logged
|
1635 |
*
|
1636 |
+
* @param int $protocol_flags
|
1637 |
+
* @param string $message
|
1638 |
* @access private
|
1639 |
*/
|
1640 |
function _append_log($protocol_flags, $message)
|
phpseclib/Net/SSH2.php
CHANGED
@@ -150,6 +150,23 @@ define('NET_SSH2_READ_REGEX', 2);
|
|
150 |
define('NET_SSH2_READ_NEXT', 3);
|
151 |
/**#@-*/
|
152 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
153 |
/**
|
154 |
* Pure-PHP implementation of SSHv2.
|
155 |
*
|
@@ -692,6 +709,14 @@ class Net_SSH2
|
|
692 |
*/
|
693 |
var $curTimeout;
|
694 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
695 |
/**
|
696 |
* Real-time log file pointer
|
697 |
*
|
@@ -967,6 +992,71 @@ class Net_SSH2
|
|
967 |
*/
|
968 |
var $auth = array();
|
969 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
970 |
/**
|
971 |
* Default Constructor.
|
972 |
*
|
@@ -1352,6 +1442,7 @@ class Net_SSH2
|
|
1352 |
function _key_exchange($kexinit_payload_server = false)
|
1353 |
{
|
1354 |
$preferred = $this->preferred;
|
|
|
1355 |
|
1356 |
$kex_algorithms = isset($preferred['kex']) ?
|
1357 |
$preferred['kex'] :
|
@@ -1435,7 +1526,7 @@ class Net_SSH2
|
|
1435 |
0
|
1436 |
);
|
1437 |
|
1438 |
-
if ($
|
1439 |
if (!$this->_send_binary_packet($kexinit_payload_client)) {
|
1440 |
return false;
|
1441 |
}
|
@@ -1451,6 +1542,8 @@ class Net_SSH2
|
|
1451 |
user_error('Expected SSH_MSG_KEXINIT');
|
1452 |
return false;
|
1453 |
}
|
|
|
|
|
1454 |
}
|
1455 |
|
1456 |
$response = $kexinit_payload_server;
|
@@ -1523,7 +1616,7 @@ class Net_SSH2
|
|
1523 |
extract(unpack('Cfirst_kex_packet_follows', $this->_string_shift($response, 1)));
|
1524 |
$first_kex_packet_follows = $first_kex_packet_follows != 0;
|
1525 |
|
1526 |
-
if (
|
1527 |
return false;
|
1528 |
}
|
1529 |
|
@@ -1552,6 +1645,45 @@ class Net_SSH2
|
|
1552 |
user_error('No compatible key exchange algorithms found');
|
1553 |
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1554 |
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1555 |
if (strpos($kex_algorithm, 'diffie-hellman-group-exchange') === 0) {
|
1556 |
$dh_group_sizes_packed = pack(
|
1557 |
'NNN',
|
@@ -1759,12 +1891,6 @@ class Net_SSH2
|
|
1759 |
$this->session_id = $this->exchange_hash;
|
1760 |
}
|
1761 |
|
1762 |
-
$server_host_key_algorithm = $this->_array_intersect_first($server_host_key_algorithms, $this->server_host_key_algorithms);
|
1763 |
-
if ($server_host_key_algorithm === false) {
|
1764 |
-
user_error('No compatible server host key algorithms found');
|
1765 |
-
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1766 |
-
}
|
1767 |
-
|
1768 |
switch ($server_host_key_algorithm) {
|
1769 |
case 'ssh-dss':
|
1770 |
$expected_key_format = 'ssh-dss';
|
@@ -1884,14 +2010,8 @@ class Net_SSH2
|
|
1884 |
$this->decrypt->decrypt(str_repeat("\0", 1536));
|
1885 |
}
|
1886 |
|
1887 |
-
$mac_algorithm = $this->_array_intersect_first($c2s_mac_algorithms, $this->mac_algorithms_client_to_server);
|
1888 |
-
if ($mac_algorithm === false) {
|
1889 |
-
user_error('No compatible client to server message authentication algorithms found');
|
1890 |
-
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1891 |
-
}
|
1892 |
-
|
1893 |
$createKeyLength = 0; // ie. $mac_algorithm == 'none'
|
1894 |
-
switch ($
|
1895 |
case 'hmac-sha2-256':
|
1896 |
$this->hmac_create = new Crypt_Hash('sha256');
|
1897 |
$createKeyLength = 32;
|
@@ -1912,17 +2032,11 @@ class Net_SSH2
|
|
1912 |
$this->hmac_create = new Crypt_Hash('md5-96');
|
1913 |
$createKeyLength = 16;
|
1914 |
}
|
1915 |
-
$this->hmac_create->name = $
|
1916 |
-
|
1917 |
-
$mac_algorithm = $this->_array_intersect_first($s2c_mac_algorithms, $this->mac_algorithms_server_to_client);
|
1918 |
-
if ($mac_algorithm === false) {
|
1919 |
-
user_error('No compatible server to client message authentication algorithms found');
|
1920 |
-
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1921 |
-
}
|
1922 |
|
1923 |
$checkKeyLength = 0;
|
1924 |
$this->hmac_size = 0;
|
1925 |
-
switch ($
|
1926 |
case 'hmac-sha2-256':
|
1927 |
$this->hmac_check = new Crypt_Hash('sha256');
|
1928 |
$checkKeyLength = 32;
|
@@ -1948,7 +2062,7 @@ class Net_SSH2
|
|
1948 |
$checkKeyLength = 16;
|
1949 |
$this->hmac_size = 12;
|
1950 |
}
|
1951 |
-
$this->hmac_check->name = $
|
1952 |
|
1953 |
$key = $kexHash->hash($keyBytes . $this->exchange_hash . 'E' . $this->session_id);
|
1954 |
while ($createKeyLength > strlen($key)) {
|
@@ -1962,19 +2076,7 @@ class Net_SSH2
|
|
1962 |
}
|
1963 |
$this->hmac_check->setKey(substr($key, 0, $checkKeyLength));
|
1964 |
|
1965 |
-
$
|
1966 |
-
if ($compression_algorithm === false) {
|
1967 |
-
user_error('No compatible client to server compression algorithms found');
|
1968 |
-
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1969 |
-
}
|
1970 |
-
//$this->decompress = $compression_algorithm == 'zlib';
|
1971 |
-
|
1972 |
-
$compression_algorithm = $this->_array_intersect_first($s2c_compression_algorithms, $this->compression_algorithms_client_to_server);
|
1973 |
-
if ($compression_algorithm === false) {
|
1974 |
-
user_error('No compatible server to client compression algorithms found');
|
1975 |
-
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1976 |
-
}
|
1977 |
-
//$this->compress = $compression_algorithm == 'zlib';
|
1978 |
|
1979 |
return true;
|
1980 |
}
|
@@ -2122,8 +2224,6 @@ class Net_SSH2
|
|
2122 |
* The $password parameter can be a plaintext password, a Crypt_RSA object or an array
|
2123 |
*
|
2124 |
* @param string $username
|
2125 |
-
* @param mixed $password
|
2126 |
-
* @param mixed $...
|
2127 |
* @return bool
|
2128 |
* @see self::_login()
|
2129 |
* @access public
|
@@ -2135,11 +2235,13 @@ class Net_SSH2
|
|
2135 |
|
2136 |
// try logging with 'none' as an authentication method first since that's what
|
2137 |
// PuTTY does
|
2138 |
-
if ($this->
|
2139 |
-
|
2140 |
-
|
2141 |
-
|
2142 |
-
|
|
|
|
|
2143 |
}
|
2144 |
return call_user_func_array(array(&$this, '_login'), $args);
|
2145 |
}
|
@@ -2148,8 +2250,6 @@ class Net_SSH2
|
|
2148 |
* Login Helper
|
2149 |
*
|
2150 |
* @param string $username
|
2151 |
-
* @param mixed $password
|
2152 |
-
* @param mixed $...
|
2153 |
* @return bool
|
2154 |
* @see self::_login_helper()
|
2155 |
* @access private
|
@@ -2167,9 +2267,61 @@ class Net_SSH2
|
|
2167 |
return $this->_login_helper($username);
|
2168 |
}
|
2169 |
|
2170 |
-
|
2171 |
-
if (
|
2172 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2173 |
}
|
2174 |
}
|
2175 |
return false;
|
@@ -2283,7 +2435,9 @@ class Net_SSH2
|
|
2283 |
case NET_SSH2_MSG_USERAUTH_SUCCESS:
|
2284 |
$this->bitmap |= NET_SSH2_MASK_LOGIN;
|
2285 |
return true;
|
2286 |
-
|
|
|
|
|
2287 |
default:
|
2288 |
return false;
|
2289 |
}
|
@@ -2355,6 +2509,7 @@ class Net_SSH2
|
|
2355 |
}
|
2356 |
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
2357 |
$auth_methods = explode(',', $this->_string_shift($response, $length));
|
|
|
2358 |
if (!strlen($response)) {
|
2359 |
return false;
|
2360 |
}
|
@@ -2414,7 +2569,6 @@ class Net_SSH2
|
|
2414 |
/**
|
2415 |
* Handle the keyboard-interactive requests / responses.
|
2416 |
*
|
2417 |
-
* @param string $responses...
|
2418 |
* @return bool
|
2419 |
* @access private
|
2420 |
*/
|
@@ -2528,6 +2682,8 @@ class Net_SSH2
|
|
2528 |
case NET_SSH2_MSG_USERAUTH_SUCCESS:
|
2529 |
return true;
|
2530 |
case NET_SSH2_MSG_USERAUTH_FAILURE:
|
|
|
|
|
2531 |
return false;
|
2532 |
}
|
2533 |
|
@@ -2559,7 +2715,7 @@ class Net_SSH2
|
|
2559 |
* Login with an RSA private key
|
2560 |
*
|
2561 |
* @param string $username
|
2562 |
-
* @param Crypt_RSA $
|
2563 |
* @return bool
|
2564 |
* @access private
|
2565 |
* @internal It might be worthwhile, at some point, to protect against {@link http://tools.ietf.org/html/rfc4251#section-9.3.9 traffic analysis}
|
@@ -2636,13 +2792,21 @@ class Net_SSH2
|
|
2636 |
if (strlen($response) < 4) {
|
2637 |
return false;
|
2638 |
}
|
2639 |
-
extract(unpack('
|
2640 |
-
$this->
|
|
|
2641 |
return false;
|
2642 |
case NET_SSH2_MSG_USERAUTH_PK_OK:
|
2643 |
// we'll just take it on faith that the public key blob and the public key algorithm name are as
|
2644 |
// they should be
|
2645 |
$this->_updateLogHistory('UNKNOWN (60)', 'NET_SSH2_MSG_USERAUTH_PK_OK');
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2646 |
}
|
2647 |
|
2648 |
$packet = $part1 . chr(1) . $part2;
|
@@ -2671,13 +2835,16 @@ class Net_SSH2
|
|
2671 |
switch ($type) {
|
2672 |
case NET_SSH2_MSG_USERAUTH_FAILURE:
|
2673 |
// either the login is bad or the server employs multi-factor authentication
|
|
|
|
|
2674 |
return false;
|
2675 |
case NET_SSH2_MSG_USERAUTH_SUCCESS:
|
2676 |
$this->bitmap |= NET_SSH2_MASK_LOGIN;
|
2677 |
return true;
|
2678 |
}
|
2679 |
|
2680 |
-
|
|
|
2681 |
}
|
2682 |
|
2683 |
/**
|
@@ -2694,6 +2861,19 @@ class Net_SSH2
|
|
2694 |
$this->timeout = $this->curTimeout = $timeout;
|
2695 |
}
|
2696 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2697 |
/**
|
2698 |
* Get the output from stdError
|
2699 |
*
|
@@ -2783,26 +2963,13 @@ class Net_SSH2
|
|
2783 |
return false;
|
2784 |
}
|
2785 |
|
2786 |
-
$
|
2787 |
-
if ($response === false) {
|
2788 |
-
$this->bitmap = 0;
|
2789 |
-
user_error('Connection closed by server');
|
2790 |
-
return false;
|
2791 |
-
}
|
2792 |
|
2793 |
-
if (
|
2794 |
-
|
|
|
2795 |
}
|
2796 |
-
list(, $type) = unpack('C', $this->_string_shift($response, 1));
|
2797 |
|
2798 |
-
switch ($type) {
|
2799 |
-
case NET_SSH2_MSG_CHANNEL_SUCCESS:
|
2800 |
-
break;
|
2801 |
-
case NET_SSH2_MSG_CHANNEL_FAILURE:
|
2802 |
-
default:
|
2803 |
-
user_error('Unable to request pseudo-terminal');
|
2804 |
-
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
2805 |
-
}
|
2806 |
$this->in_request_pty_exec = true;
|
2807 |
}
|
2808 |
|
@@ -2924,26 +3091,11 @@ class Net_SSH2
|
|
2924 |
return false;
|
2925 |
}
|
2926 |
|
2927 |
-
$
|
2928 |
-
if ($response === false) {
|
2929 |
-
$this->bitmap = 0;
|
2930 |
-
user_error('Connection closed by server');
|
2931 |
-
return false;
|
2932 |
-
}
|
2933 |
-
|
2934 |
-
if (!strlen($response)) {
|
2935 |
-
return false;
|
2936 |
-
}
|
2937 |
-
list(, $type) = unpack('C', $this->_string_shift($response, 1));
|
2938 |
|
2939 |
-
|
2940 |
-
|
2941 |
-
|
2942 |
-
case NET_SSH2_MSG_CHANNEL_FAILURE:
|
2943 |
-
break;
|
2944 |
-
default:
|
2945 |
-
user_error('Unable to request pseudo-terminal');
|
2946 |
-
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
2947 |
}
|
2948 |
|
2949 |
$packet = pack(
|
@@ -2958,8 +3110,6 @@ class Net_SSH2
|
|
2958 |
return false;
|
2959 |
}
|
2960 |
|
2961 |
-
$this->channel_status[NET_SSH2_CHANNEL_SHELL] = NET_SSH2_MSG_CHANNEL_REQUEST;
|
2962 |
-
|
2963 |
$response = $this->_get_channel_packet(NET_SSH2_CHANNEL_SHELL);
|
2964 |
if ($response === false) {
|
2965 |
return false;
|
@@ -3333,9 +3483,57 @@ class Net_SSH2
|
|
3333 |
*/
|
3334 |
function _get_binary_packet($skip_channel_filter = false)
|
3335 |
{
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3336 |
if (!is_resource($this->fsock) || feof($this->fsock)) {
|
3337 |
$this->bitmap = 0;
|
3338 |
-
user_error('Connection closed prematurely');
|
3339 |
return false;
|
3340 |
}
|
3341 |
|
@@ -3343,7 +3541,8 @@ class Net_SSH2
|
|
3343 |
$raw = fread($this->fsock, $this->decrypt_block_size);
|
3344 |
|
3345 |
if (!strlen($raw)) {
|
3346 |
-
|
|
|
3347 |
}
|
3348 |
|
3349 |
if ($this->decrypt !== false) {
|
@@ -3406,9 +3605,41 @@ class Net_SSH2
|
|
3406 |
}
|
3407 |
}
|
3408 |
|
3409 |
-
|
3410 |
-
|
3411 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3412 |
|
3413 |
$this->get_seq_no++;
|
3414 |
|
@@ -3483,10 +3714,24 @@ class Net_SSH2
|
|
3483 |
|
3484 |
// only called when we've already logged in
|
3485 |
if (($this->bitmap & NET_SSH2_MASK_CONNECTED) && $this->isAuthenticated()) {
|
|
|
|
|
|
|
|
|
3486 |
switch (ord($payload[0])) {
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3487 |
case NET_SSH2_MSG_CHANNEL_DATA:
|
3488 |
case NET_SSH2_MSG_CHANNEL_EXTENDED_DATA:
|
3489 |
-
case NET_SSH2_MSG_CHANNEL_REQUEST:
|
3490 |
case NET_SSH2_MSG_CHANNEL_CLOSE:
|
3491 |
case NET_SSH2_MSG_CHANNEL_EOF:
|
3492 |
if (!$skip_channel_filter && !empty($this->server_channels)) {
|
@@ -3668,14 +3913,28 @@ class Net_SSH2
|
|
3668 |
*
|
3669 |
* Returns the data as a string if it's available and false if not.
|
3670 |
*
|
3671 |
-
* @param $client_channel
|
3672 |
-
* @
|
|
|
3673 |
* @access private
|
3674 |
*/
|
3675 |
function _get_channel_packet($client_channel, $skip_extended = false)
|
3676 |
{
|
3677 |
if (!empty($this->channel_buffers[$client_channel])) {
|
3678 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3679 |
}
|
3680 |
|
3681 |
while (true) {
|
@@ -3683,36 +3942,13 @@ class Net_SSH2
|
|
3683 |
$response = $this->binary_packet_buffer;
|
3684 |
$this->binary_packet_buffer = false;
|
3685 |
} else {
|
3686 |
-
$
|
3687 |
-
$
|
3688 |
-
|
3689 |
-
|
3690 |
-
@stream_select($read, $write, $except, null);
|
3691 |
-
} else {
|
3692 |
-
if ($this->curTimeout < 0) {
|
3693 |
-
$this->is_timeout = true;
|
3694 |
-
return true;
|
3695 |
-
}
|
3696 |
-
|
3697 |
-
$read = array($this->fsock);
|
3698 |
-
$write = $except = null;
|
3699 |
-
|
3700 |
-
$start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
|
3701 |
-
$sec = floor($this->curTimeout);
|
3702 |
-
$usec = 1000000 * ($this->curTimeout - $sec);
|
3703 |
-
// on windows this returns a "Warning: Invalid CRT parameters detected" error
|
3704 |
-
if (!@stream_select($read, $write, $except, $sec, $usec) && !count($read)) {
|
3705 |
-
$this->is_timeout = true;
|
3706 |
-
if ($client_channel == NET_SSH2_CHANNEL_EXEC && !$this->request_pty) {
|
3707 |
-
$this->_close_channel($client_channel);
|
3708 |
-
}
|
3709 |
-
return true;
|
3710 |
}
|
3711 |
-
|
3712 |
-
$this->curTimeout-= $elapsed;
|
3713 |
}
|
3714 |
-
|
3715 |
-
$response = $this->_get_binary_packet(true);
|
3716 |
if ($response === false) {
|
3717 |
$this->bitmap = 0;
|
3718 |
user_error('Connection closed by server');
|
@@ -3772,10 +4008,7 @@ class Net_SSH2
|
|
3772 |
if ($client_channel == $channel && $this->channel_status[$channel] == NET_SSH2_MSG_CHANNEL_DATA) {
|
3773 |
return $data;
|
3774 |
}
|
3775 |
-
|
3776 |
-
$this->channel_buffers[$channel] = array();
|
3777 |
-
}
|
3778 |
-
$this->channel_buffers[$channel][] = $data;
|
3779 |
|
3780 |
continue 2;
|
3781 |
case NET_SSH2_MSG_CHANNEL_REQUEST:
|
@@ -3854,10 +4087,15 @@ class Net_SSH2
|
|
3854 |
$result = $client_channel == $channel ? true : $this->_get_channel_packet($client_channel, $skip_extended);
|
3855 |
$this->_on_channel_open();
|
3856 |
return $result;
|
3857 |
-
|
3858 |
-
default:
|
3859 |
user_error('Unable to open channel');
|
3860 |
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
|
|
|
|
|
|
|
|
|
|
|
|
3861 |
}
|
3862 |
break;
|
3863 |
case NET_SSH2_MSG_CHANNEL_REQUEST:
|
@@ -3866,6 +4104,14 @@ class Net_SSH2
|
|
3866 |
return true;
|
3867 |
case NET_SSH2_MSG_CHANNEL_FAILURE:
|
3868 |
return false;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3869 |
default:
|
3870 |
user_error('Unable to fulfill channel request');
|
3871 |
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
@@ -3905,10 +4151,7 @@ class Net_SSH2
|
|
3905 |
if ($client_channel == $channel) {
|
3906 |
return $data;
|
3907 |
}
|
3908 |
-
|
3909 |
-
$this->channel_buffers[$channel] = array();
|
3910 |
-
}
|
3911 |
-
$this->channel_buffers[$channel][] = $data;
|
3912 |
break;
|
3913 |
case NET_SSH2_MSG_CHANNEL_CLOSE:
|
3914 |
$this->curTimeout = 5;
|
@@ -3927,7 +4170,7 @@ class Net_SSH2
|
|
3927 |
case NET_SSH2_MSG_CHANNEL_EOF:
|
3928 |
break;
|
3929 |
default:
|
3930 |
-
user_error(
|
3931 |
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
3932 |
}
|
3933 |
}
|
@@ -3952,11 +4195,27 @@ class Net_SSH2
|
|
3952 |
return false;
|
3953 |
}
|
3954 |
|
3955 |
-
|
3956 |
-
|
3957 |
-
|
3958 |
-
|
3959 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3960 |
|
3961 |
// 4 (packet length) + 1 (padding length) + 4 (minimal padding amount) == 9
|
3962 |
$packet_length = strlen($data) + 9;
|
@@ -3979,15 +4238,15 @@ class Net_SSH2
|
|
3979 |
$packet.= $hmac;
|
3980 |
|
3981 |
$start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
|
3982 |
-
$result = strlen($packet) == fputs($this->fsock, $packet);
|
3983 |
$stop = strtok(microtime(), ' ') + strtok('');
|
3984 |
|
3985 |
if (defined('NET_SSH2_LOGGING')) {
|
3986 |
$current = strtok(microtime(), ' ') + strtok('');
|
3987 |
-
$message_number = isset($this->message_numbers[ord($
|
3988 |
$message_number = '-> ' . $message_number .
|
3989 |
' (since last: ' . round($current - $this->last_packet, 4) . ', network: ' . round($stop - $start, 4) . 's)';
|
3990 |
-
$this->_append_log($message_number,
|
3991 |
$this->last_packet = $current;
|
3992 |
}
|
3993 |
|
@@ -3999,7 +4258,8 @@ class Net_SSH2
|
|
3999 |
*
|
4000 |
* Makes sure that only the last 1MB worth of packets will be logged
|
4001 |
*
|
4002 |
-
* @param string $
|
|
|
4003 |
* @access private
|
4004 |
*/
|
4005 |
function _append_log($message_number, $message)
|
@@ -4204,7 +4464,6 @@ class Net_SSH2
|
|
4204 |
* named constants from it, using the value as the name of the constant and the index as the value of the constant.
|
4205 |
* If any of the constants that would be defined already exists, none of the constants will be defined.
|
4206 |
*
|
4207 |
-
* @param array $array
|
4208 |
* @access private
|
4209 |
*/
|
4210 |
function _define_array()
|
@@ -4608,11 +4867,15 @@ class Net_SSH2
|
|
4608 |
//'none' // OPTIONAL no encryption; NOT RECOMMENDED
|
4609 |
);
|
4610 |
|
4611 |
-
$
|
4612 |
-
|
4613 |
-
|
4614 |
-
|
4615 |
-
|
|
|
|
|
|
|
|
|
4616 |
|
4617 |
$ciphers = array();
|
4618 |
foreach ($engines as $engine) {
|
@@ -4666,10 +4929,12 @@ class Net_SSH2
|
|
4666 |
*/
|
4667 |
function getSupportedCompressionAlgorithms()
|
4668 |
{
|
4669 |
-
|
4670 |
-
|
4671 |
-
|
4672 |
-
|
|
|
|
|
4673 |
}
|
4674 |
|
4675 |
/**
|
@@ -4684,18 +4949,24 @@ class Net_SSH2
|
|
4684 |
{
|
4685 |
$this->_connect();
|
4686 |
|
|
|
|
|
|
|
|
|
|
|
|
|
4687 |
return array(
|
4688 |
'kex' => $this->kex_algorithm,
|
4689 |
'hostkey' => $this->signature_format,
|
4690 |
'client_to_server' => array(
|
4691 |
'crypt' => $this->encrypt->name,
|
4692 |
'mac' => $this->hmac_create->name,
|
4693 |
-
'comp' =>
|
4694 |
),
|
4695 |
'server_to_client' => array(
|
4696 |
'crypt' => $this->decrypt->name,
|
4697 |
'mac' => $this->hmac_check->name,
|
4698 |
-
'comp' =>
|
4699 |
)
|
4700 |
);
|
4701 |
}
|
@@ -5100,4 +5371,31 @@ class Net_SSH2
|
|
5100 |
);
|
5101 |
}
|
5102 |
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5103 |
}
|
150 |
define('NET_SSH2_READ_NEXT', 3);
|
151 |
/**#@-*/
|
152 |
|
153 |
+
/**#@+
|
154 |
+
* @access private
|
155 |
+
*/
|
156 |
+
/**
|
157 |
+
* No compression
|
158 |
+
*/
|
159 |
+
define('NET_SSH2_COMPRESSION_NONE', 1);
|
160 |
+
/**
|
161 |
+
* zlib compression
|
162 |
+
*/
|
163 |
+
define('NET_SSH2_COMPRESSION_ZLIB', 2);
|
164 |
+
/**
|
165 |
+
* zlib@openssh.com
|
166 |
+
*/
|
167 |
+
define('NET_SSH2_COMPRESSION_ZLIB_AT_OPENSSH', 3);
|
168 |
+
/**#@-*/
|
169 |
+
|
170 |
/**
|
171 |
* Pure-PHP implementation of SSHv2.
|
172 |
*
|
709 |
*/
|
710 |
var $curTimeout;
|
711 |
|
712 |
+
/**
|
713 |
+
* Keep Alive Interval
|
714 |
+
*
|
715 |
+
* @see self::setKeepAlive()
|
716 |
+
* @access private
|
717 |
+
*/
|
718 |
+
var $keepAlive;
|
719 |
+
|
720 |
/**
|
721 |
* Real-time log file pointer
|
722 |
*
|
992 |
*/
|
993 |
var $auth = array();
|
994 |
|
995 |
+
/**
|
996 |
+
* The authentication methods that may productively continue authentication.
|
997 |
+
*
|
998 |
+
* @see https://tools.ietf.org/html/rfc4252#section-5.1
|
999 |
+
* @var array|null
|
1000 |
+
* @access private
|
1001 |
+
*/
|
1002 |
+
var $auth_methods_to_continue = null;
|
1003 |
+
|
1004 |
+
/**
|
1005 |
+
* Compression method
|
1006 |
+
*
|
1007 |
+
* @var int
|
1008 |
+
* @access private
|
1009 |
+
*/
|
1010 |
+
var $compress = NET_SSH2_COMPRESSION_NONE;
|
1011 |
+
|
1012 |
+
/**
|
1013 |
+
* Decompression method
|
1014 |
+
*
|
1015 |
+
* @var resource|object
|
1016 |
+
* @access private
|
1017 |
+
*/
|
1018 |
+
var $decompress = NET_SSH2_COMPRESSION_NONE;
|
1019 |
+
|
1020 |
+
/**
|
1021 |
+
* Compression context
|
1022 |
+
*
|
1023 |
+
* @var int
|
1024 |
+
* @access private
|
1025 |
+
*/
|
1026 |
+
var $compress_context;
|
1027 |
+
|
1028 |
+
/**
|
1029 |
+
* Decompression context
|
1030 |
+
*
|
1031 |
+
* @var resource|object
|
1032 |
+
* @access private
|
1033 |
+
*/
|
1034 |
+
var $decompress_context;
|
1035 |
+
|
1036 |
+
/**
|
1037 |
+
* Regenerate Compression Context
|
1038 |
+
*
|
1039 |
+
* @var bool
|
1040 |
+
* @access private
|
1041 |
+
*/
|
1042 |
+
var $regenerate_compression_context = false;
|
1043 |
+
|
1044 |
+
/**
|
1045 |
+
* Regenerate Decompression Context
|
1046 |
+
*
|
1047 |
+
* @var bool
|
1048 |
+
* @access private
|
1049 |
+
*/
|
1050 |
+
var $regenerate_decompression_context = false;
|
1051 |
+
|
1052 |
+
/**
|
1053 |
+
* Smart multi-factor authentication flag
|
1054 |
+
*
|
1055 |
+
* @var bool
|
1056 |
+
* @access private
|
1057 |
+
*/
|
1058 |
+
var $smartMFA = true;
|
1059 |
+
|
1060 |
/**
|
1061 |
* Default Constructor.
|
1062 |
*
|
1442 |
function _key_exchange($kexinit_payload_server = false)
|
1443 |
{
|
1444 |
$preferred = $this->preferred;
|
1445 |
+
$send_kex = true;
|
1446 |
|
1447 |
$kex_algorithms = isset($preferred['kex']) ?
|
1448 |
$preferred['kex'] :
|
1526 |
0
|
1527 |
);
|
1528 |
|
1529 |
+
if ($kexinit_payload_server === false) {
|
1530 |
if (!$this->_send_binary_packet($kexinit_payload_client)) {
|
1531 |
return false;
|
1532 |
}
|
1542 |
user_error('Expected SSH_MSG_KEXINIT');
|
1543 |
return false;
|
1544 |
}
|
1545 |
+
|
1546 |
+
$send_kex = false;
|
1547 |
}
|
1548 |
|
1549 |
$response = $kexinit_payload_server;
|
1616 |
extract(unpack('Cfirst_kex_packet_follows', $this->_string_shift($response, 1)));
|
1617 |
$first_kex_packet_follows = $first_kex_packet_follows != 0;
|
1618 |
|
1619 |
+
if ($send_kex && !$this->_send_binary_packet($kexinit_payload_client)) {
|
1620 |
return false;
|
1621 |
}
|
1622 |
|
1645 |
user_error('No compatible key exchange algorithms found');
|
1646 |
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1647 |
}
|
1648 |
+
|
1649 |
+
$server_host_key_algorithm = $this->_array_intersect_first($server_host_key_algorithms, $this->server_host_key_algorithms);
|
1650 |
+
if ($server_host_key_algorithm === false) {
|
1651 |
+
user_error('No compatible server host key algorithms found');
|
1652 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1653 |
+
}
|
1654 |
+
|
1655 |
+
$mac_algorithm_out = $this->_array_intersect_first($c2s_mac_algorithms, $this->mac_algorithms_client_to_server);
|
1656 |
+
if ($mac_algorithm_out === false) {
|
1657 |
+
user_error('No compatible client to server message authentication algorithms found');
|
1658 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1659 |
+
}
|
1660 |
+
|
1661 |
+
$mac_algorithm_in = $this->_array_intersect_first($s2c_mac_algorithms, $this->mac_algorithms_server_to_client);
|
1662 |
+
if ($mac_algorithm_in === false) {
|
1663 |
+
user_error('No compatible server to client message authentication algorithms found');
|
1664 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1665 |
+
}
|
1666 |
+
|
1667 |
+
$compression_map = array(
|
1668 |
+
'none' => NET_SSH2_COMPRESSION_NONE,
|
1669 |
+
'zlib' => NET_SSH2_COMPRESSION_ZLIB,
|
1670 |
+
'zlib@openssh.com' => NET_SSH2_COMPRESSION_ZLIB_AT_OPENSSH
|
1671 |
+
);
|
1672 |
+
|
1673 |
+
$compression_algorithm_out = $this->_array_intersect_first($c2s_compression_algorithms, $this->compression_algorithms_client_to_server);
|
1674 |
+
if ($compression_algorithm_out === false) {
|
1675 |
+
user_error('No compatible client to server compression algorithms found');
|
1676 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1677 |
+
}
|
1678 |
+
$this->compress = $compression_map[$compression_algorithm_out];
|
1679 |
+
|
1680 |
+
$compression_algorithm_in = $this->_array_intersect_first($s2c_compression_algorithms, $this->compression_algorithms_server_to_client);
|
1681 |
+
if ($compression_algorithm_in === false) {
|
1682 |
+
user_error('No compatible server to client compression algorithms found');
|
1683 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
|
1684 |
+
}
|
1685 |
+
$this->decompress = $compression_map[$compression_algorithm_in];
|
1686 |
+
|
1687 |
if (strpos($kex_algorithm, 'diffie-hellman-group-exchange') === 0) {
|
1688 |
$dh_group_sizes_packed = pack(
|
1689 |
'NNN',
|
1891 |
$this->session_id = $this->exchange_hash;
|
1892 |
}
|
1893 |
|
|
|
|
|
|
|
|
|
|
|
|
|
1894 |
switch ($server_host_key_algorithm) {
|
1895 |
case 'ssh-dss':
|
1896 |
$expected_key_format = 'ssh-dss';
|
2010 |
$this->decrypt->decrypt(str_repeat("\0", 1536));
|
2011 |
}
|
2012 |
|
|
|
|
|
|
|
|
|
|
|
|
|
2013 |
$createKeyLength = 0; // ie. $mac_algorithm == 'none'
|
2014 |
+
switch ($mac_algorithm_out) {
|
2015 |
case 'hmac-sha2-256':
|
2016 |
$this->hmac_create = new Crypt_Hash('sha256');
|
2017 |
$createKeyLength = 32;
|
2032 |
$this->hmac_create = new Crypt_Hash('md5-96');
|
2033 |
$createKeyLength = 16;
|
2034 |
}
|
2035 |
+
$this->hmac_create->name = $mac_algorithm_out;
|
|
|
|
|
|
|
|
|
|
|
|
|
2036 |
|
2037 |
$checkKeyLength = 0;
|
2038 |
$this->hmac_size = 0;
|
2039 |
+
switch ($mac_algorithm_in) {
|
2040 |
case 'hmac-sha2-256':
|
2041 |
$this->hmac_check = new Crypt_Hash('sha256');
|
2042 |
$checkKeyLength = 32;
|
2062 |
$checkKeyLength = 16;
|
2063 |
$this->hmac_size = 12;
|
2064 |
}
|
2065 |
+
$this->hmac_check->name = $mac_algorithm_in;
|
2066 |
|
2067 |
$key = $kexHash->hash($keyBytes . $this->exchange_hash . 'E' . $this->session_id);
|
2068 |
while ($createKeyLength > strlen($key)) {
|
2076 |
}
|
2077 |
$this->hmac_check->setKey(substr($key, 0, $checkKeyLength));
|
2078 |
|
2079 |
+
$this->regenerate_compression_context = $this->regenerate_decompression_context = true;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2080 |
|
2081 |
return true;
|
2082 |
}
|
2224 |
* The $password parameter can be a plaintext password, a Crypt_RSA object or an array
|
2225 |
*
|
2226 |
* @param string $username
|
|
|
|
|
2227 |
* @return bool
|
2228 |
* @see self::_login()
|
2229 |
* @access public
|
2235 |
|
2236 |
// try logging with 'none' as an authentication method first since that's what
|
2237 |
// PuTTY does
|
2238 |
+
if (substr($this->server_identifier, 0, 15) != 'SSH-2.0-CoreFTP' && $this->auth_methods_to_continue === null) {
|
2239 |
+
if ($this->_login($username)) {
|
2240 |
+
return true;
|
2241 |
+
}
|
2242 |
+
if (count($args) == 1) {
|
2243 |
+
return false;
|
2244 |
+
}
|
2245 |
}
|
2246 |
return call_user_func_array(array(&$this, '_login'), $args);
|
2247 |
}
|
2250 |
* Login Helper
|
2251 |
*
|
2252 |
* @param string $username
|
|
|
|
|
2253 |
* @return bool
|
2254 |
* @see self::_login_helper()
|
2255 |
* @access private
|
2267 |
return $this->_login_helper($username);
|
2268 |
}
|
2269 |
|
2270 |
+
while (count($args)) {
|
2271 |
+
if (!$this->auth_methods_to_continue || !$this->smartMFA) {
|
2272 |
+
$newargs = $args;
|
2273 |
+
$args = array();
|
2274 |
+
} else {
|
2275 |
+
$newargs = array();
|
2276 |
+
foreach ($this->auth_methods_to_continue as $method) {
|
2277 |
+
switch ($method) {
|
2278 |
+
case 'publickey':
|
2279 |
+
foreach ($args as $key => $arg) {
|
2280 |
+
if (is_object($arg)) {
|
2281 |
+
$newargs[] = $arg;
|
2282 |
+
unset($args[$key]);
|
2283 |
+
break;
|
2284 |
+
}
|
2285 |
+
}
|
2286 |
+
break;
|
2287 |
+
case 'keyboard-interactive':
|
2288 |
+
$hasArray = $hasString = false;
|
2289 |
+
foreach ($args as $arg) {
|
2290 |
+
if ($hasArray || is_array($arg)) {
|
2291 |
+
$hasArray = true;
|
2292 |
+
break;
|
2293 |
+
}
|
2294 |
+
if ($hasString || is_string($arg)) {
|
2295 |
+
$hasString = true;
|
2296 |
+
break;
|
2297 |
+
}
|
2298 |
+
}
|
2299 |
+
if ($hasArray && $hasString) {
|
2300 |
+
foreach ($args as $key => $arg) {
|
2301 |
+
if (is_array($arg)) {
|
2302 |
+
$newargs[] = $arg;
|
2303 |
+
break 2;
|
2304 |
+
}
|
2305 |
+
}
|
2306 |
+
}
|
2307 |
+
case 'password':
|
2308 |
+
foreach ($args as $key => $arg) {
|
2309 |
+
$newargs[] = $arg;
|
2310 |
+
unset($args[$key]);
|
2311 |
+
break;
|
2312 |
+
}
|
2313 |
+
}
|
2314 |
+
}
|
2315 |
+
}
|
2316 |
+
|
2317 |
+
if (!count($newargs)) {
|
2318 |
+
return false;
|
2319 |
+
}
|
2320 |
+
|
2321 |
+
foreach ($newargs as $arg) {
|
2322 |
+
if ($this->_login_helper($username, $arg)) {
|
2323 |
+
return true;
|
2324 |
+
}
|
2325 |
}
|
2326 |
}
|
2327 |
return false;
|
2435 |
case NET_SSH2_MSG_USERAUTH_SUCCESS:
|
2436 |
$this->bitmap |= NET_SSH2_MASK_LOGIN;
|
2437 |
return true;
|
2438 |
+
case NET_SSH2_MSG_USERAUTH_FAILURE:
|
2439 |
+
extract(unpack('Nmethodlistlen', $this->_string_shift($response, 4)));
|
2440 |
+
$this->auth_methods_to_continue = explode(',', $this->_string_shift($response, $methodlistlen));
|
2441 |
default:
|
2442 |
return false;
|
2443 |
}
|
2509 |
}
|
2510 |
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
2511 |
$auth_methods = explode(',', $this->_string_shift($response, $length));
|
2512 |
+
$this->auth_methods_to_continue = $auth_methods;
|
2513 |
if (!strlen($response)) {
|
2514 |
return false;
|
2515 |
}
|
2569 |
/**
|
2570 |
* Handle the keyboard-interactive requests / responses.
|
2571 |
*
|
|
|
2572 |
* @return bool
|
2573 |
* @access private
|
2574 |
*/
|
2682 |
case NET_SSH2_MSG_USERAUTH_SUCCESS:
|
2683 |
return true;
|
2684 |
case NET_SSH2_MSG_USERAUTH_FAILURE:
|
2685 |
+
extract(unpack('Nmethodlistlen', $this->_string_shift($response, 4)));
|
2686 |
+
$this->auth_methods_to_continue = explode(',', $this->_string_shift($response, $methodlistlen));
|
2687 |
return false;
|
2688 |
}
|
2689 |
|
2715 |
* Login with an RSA private key
|
2716 |
*
|
2717 |
* @param string $username
|
2718 |
+
* @param Crypt_RSA $privatekey
|
2719 |
* @return bool
|
2720 |
* @access private
|
2721 |
* @internal It might be worthwhile, at some point, to protect against {@link http://tools.ietf.org/html/rfc4251#section-9.3.9 traffic analysis}
|
2792 |
if (strlen($response) < 4) {
|
2793 |
return false;
|
2794 |
}
|
2795 |
+
extract(unpack('Nmethodlistlen', $this->_string_shift($response, 4)));
|
2796 |
+
$this->auth_methods_to_continue = explode(',', $this->_string_shift($response, $methodlistlen));
|
2797 |
+
$this->errors[] = 'SSH_MSG_USERAUTH_FAILURE';
|
2798 |
return false;
|
2799 |
case NET_SSH2_MSG_USERAUTH_PK_OK:
|
2800 |
// we'll just take it on faith that the public key blob and the public key algorithm name are as
|
2801 |
// they should be
|
2802 |
$this->_updateLogHistory('UNKNOWN (60)', 'NET_SSH2_MSG_USERAUTH_PK_OK');
|
2803 |
+
break;
|
2804 |
+
case NET_SSH2_MSG_USERAUTH_SUCCESS:
|
2805 |
+
$this->bitmap |= NET_SSH2_MASK_LOGIN;
|
2806 |
+
return true;
|
2807 |
+
default:
|
2808 |
+
user_error('Unexpected response to publickey authentication pt 1');
|
2809 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
2810 |
}
|
2811 |
|
2812 |
$packet = $part1 . chr(1) . $part2;
|
2835 |
switch ($type) {
|
2836 |
case NET_SSH2_MSG_USERAUTH_FAILURE:
|
2837 |
// either the login is bad or the server employs multi-factor authentication
|
2838 |
+
extract(unpack('Nmethodlistlen', $this->_string_shift($response, 4)));
|
2839 |
+
$this->auth_methods_to_continue = explode(',', $this->_string_shift($response, $methodlistlen));
|
2840 |
return false;
|
2841 |
case NET_SSH2_MSG_USERAUTH_SUCCESS:
|
2842 |
$this->bitmap |= NET_SSH2_MASK_LOGIN;
|
2843 |
return true;
|
2844 |
}
|
2845 |
|
2846 |
+
user_error('Unexpected response to publickey authentication pt 2');
|
2847 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
2848 |
}
|
2849 |
|
2850 |
/**
|
2861 |
$this->timeout = $this->curTimeout = $timeout;
|
2862 |
}
|
2863 |
|
2864 |
+
/**
|
2865 |
+
* Set Keep Alive
|
2866 |
+
*
|
2867 |
+
* Sends an SSH2_MSG_IGNORE message every x seconds, if x is a positive non-zero number.
|
2868 |
+
*
|
2869 |
+
* @param int $interval
|
2870 |
+
* @access public
|
2871 |
+
*/
|
2872 |
+
function setKeepAlive($interval)
|
2873 |
+
{
|
2874 |
+
$this->keepAlive = $interval;
|
2875 |
+
}
|
2876 |
+
|
2877 |
/**
|
2878 |
* Get the output from stdError
|
2879 |
*
|
2963 |
return false;
|
2964 |
}
|
2965 |
|
2966 |
+
$this->channel_status[NET_SSH2_CHANNEL_EXEC] = NET_SSH2_MSG_CHANNEL_REQUEST;
|
|
|
|
|
|
|
|
|
|
|
2967 |
|
2968 |
+
if (!$this->_get_channel_packet(NET_SSH2_CHANNEL_EXEC)) {
|
2969 |
+
user_error('Unable to request pseudo-terminal');
|
2970 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
2971 |
}
|
|
|
2972 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2973 |
$this->in_request_pty_exec = true;
|
2974 |
}
|
2975 |
|
3091 |
return false;
|
3092 |
}
|
3093 |
|
3094 |
+
$this->channel_status[NET_SSH2_CHANNEL_SHELL] = NET_SSH2_MSG_CHANNEL_REQUEST;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3095 |
|
3096 |
+
if (!$this->_get_channel_packet(NET_SSH2_CHANNEL_SHELL)) {
|
3097 |
+
user_error('Unable to request pseudo-terminal');
|
3098 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
|
|
|
|
|
|
|
|
|
|
3099 |
}
|
3100 |
|
3101 |
$packet = pack(
|
3110 |
return false;
|
3111 |
}
|
3112 |
|
|
|
|
|
3113 |
$response = $this->_get_channel_packet(NET_SSH2_CHANNEL_SHELL);
|
3114 |
if ($response === false) {
|
3115 |
return false;
|
3483 |
*/
|
3484 |
function _get_binary_packet($skip_channel_filter = false)
|
3485 |
{
|
3486 |
+
if ($skip_channel_filter) {
|
3487 |
+
$read = array($this->fsock);
|
3488 |
+
$write = $except = null;
|
3489 |
+
|
3490 |
+
if (!$this->curTimeout) {
|
3491 |
+
if ($this->keepAlive <= 0) {
|
3492 |
+
@stream_select($read, $write, $except, null);
|
3493 |
+
} else {
|
3494 |
+
if (!@stream_select($read, $write, $except, $this->keepAlive) && !count($read)) {
|
3495 |
+
$this->_send_binary_packet(pack('CN', NET_SSH2_MSG_IGNORE, 0));
|
3496 |
+
return $this->_get_binary_packet(true);
|
3497 |
+
}
|
3498 |
+
}
|
3499 |
+
} else {
|
3500 |
+
if ($this->curTimeout < 0) {
|
3501 |
+
$this->is_timeout = true;
|
3502 |
+
return true;
|
3503 |
+
}
|
3504 |
+
|
3505 |
+
$read = array($this->fsock);
|
3506 |
+
$write = $except = null;
|
3507 |
+
|
3508 |
+
$start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
|
3509 |
+
|
3510 |
+
if ($this->keepAlive > 0 && $this->keepAlive < $this->curTimeout) {
|
3511 |
+
if (!@stream_select($read, $write, $except, $this->keepAlive) && !count($read)) {
|
3512 |
+
$this->_send_binary_packet(pack('CN', NET_SSH2_MSG_IGNORE, 0));
|
3513 |
+
$elapsed = strtok(microtime(), ' ') + strtok('') - $start;
|
3514 |
+
$this->curTimeout-= $elapsed;
|
3515 |
+
return $this->_get_binary_packet(true);
|
3516 |
+
}
|
3517 |
+
$elapsed = strtok(microtime(), ' ') + strtok('') - $start;
|
3518 |
+
$this->curTimeout-= $elapsed;
|
3519 |
+
}
|
3520 |
+
|
3521 |
+
$sec = floor($this->curTimeout);
|
3522 |
+
$usec = 1000000 * ($this->curTimeout - $sec);
|
3523 |
+
|
3524 |
+
// on windows this returns a "Warning: Invalid CRT parameters detected" error
|
3525 |
+
if (!@stream_select($read, $write, $except, $sec, $usec) && !count($read)) {
|
3526 |
+
$this->is_timeout = true;
|
3527 |
+
return true;
|
3528 |
+
}
|
3529 |
+
$elapsed = strtok(microtime(), ' ') + strtok('') - $start;
|
3530 |
+
$this->curTimeout-= $elapsed;
|
3531 |
+
}
|
3532 |
+
}
|
3533 |
+
|
3534 |
if (!is_resource($this->fsock) || feof($this->fsock)) {
|
3535 |
$this->bitmap = 0;
|
3536 |
+
user_error('Connection closed (by server) prematurely ' . $elapsed . 's');
|
3537 |
return false;
|
3538 |
}
|
3539 |
|
3541 |
$raw = fread($this->fsock, $this->decrypt_block_size);
|
3542 |
|
3543 |
if (!strlen($raw)) {
|
3544 |
+
user_error('No data received from server');
|
3545 |
+
return false;
|
3546 |
}
|
3547 |
|
3548 |
if ($this->decrypt !== false) {
|
3605 |
}
|
3606 |
}
|
3607 |
|
3608 |
+
switch ($this->decompress) {
|
3609 |
+
case NET_SSH2_COMPRESSION_ZLIB_AT_OPENSSH:
|
3610 |
+
if (!$this->isAuthenticated()) {
|
3611 |
+
break;
|
3612 |
+
}
|
3613 |
+
case NET_SSH2_COMPRESSION_ZLIB:
|
3614 |
+
if ($this->regenerate_decompression_context) {
|
3615 |
+
$this->regenerate_decompression_context = false;
|
3616 |
+
|
3617 |
+
$cmf = ord($payload[0]);
|
3618 |
+
$cm = $cmf & 0x0F;
|
3619 |
+
if ($cm != 8) { // deflate
|
3620 |
+
user_error("Only CM = 8 ('deflate') is supported ($cm)");
|
3621 |
+
}
|
3622 |
+
$cinfo = ($cmf & 0xF0) >> 4;
|
3623 |
+
if ($cinfo > 7) {
|
3624 |
+
user_error("CINFO above 7 is not allowed ($cinfo)");
|
3625 |
+
}
|
3626 |
+
$windowSize = 1 << ($cinfo + 8);
|
3627 |
+
|
3628 |
+
$flg = ord($payload[1]);
|
3629 |
+
//$fcheck = $flg && 0x0F;
|
3630 |
+
if ((($cmf << 8) | $flg) % 31) {
|
3631 |
+
user_error('fcheck failed');
|
3632 |
+
}
|
3633 |
+
$fdict = boolval($flg & 0x20);
|
3634 |
+
$flevel = ($flg & 0xC0) >> 6;
|
3635 |
+
|
3636 |
+
$this->decompress_context = inflate_init(ZLIB_ENCODING_RAW, array('window' => $cinfo + 8));
|
3637 |
+
$payload = substr($payload, 2);
|
3638 |
+
}
|
3639 |
+
if ($this->decompress_context) {
|
3640 |
+
$payload = inflate_add($this->decompress_context, $payload, ZLIB_PARTIAL_FLUSH);
|
3641 |
+
}
|
3642 |
+
}
|
3643 |
|
3644 |
$this->get_seq_no++;
|
3645 |
|
3714 |
|
3715 |
// only called when we've already logged in
|
3716 |
if (($this->bitmap & NET_SSH2_MASK_CONNECTED) && $this->isAuthenticated()) {
|
3717 |
+
if (is_bool($payload)) {
|
3718 |
+
return $payload;
|
3719 |
+
}
|
3720 |
+
|
3721 |
switch (ord($payload[0])) {
|
3722 |
+
case NET_SSH2_MSG_CHANNEL_REQUEST:
|
3723 |
+
if (strlen($payload) == 31) {
|
3724 |
+
extract(unpack('cpacket_type/Nchannel/Nlength', $payload));
|
3725 |
+
if (substr($payload, 9, $length) == 'keepalive@openssh.com' && isset($this->server_channels[$channel])) {
|
3726 |
+
if (ord(substr($payload, 9 + $length))) { // want reply
|
3727 |
+
$this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_SUCCESS, $this->server_channels[$channel]));
|
3728 |
+
}
|
3729 |
+
$payload = $this->_get_binary_packet($skip_channel_filter);
|
3730 |
+
}
|
3731 |
+
}
|
3732 |
+
break;
|
3733 |
case NET_SSH2_MSG_CHANNEL_DATA:
|
3734 |
case NET_SSH2_MSG_CHANNEL_EXTENDED_DATA:
|
|
|
3735 |
case NET_SSH2_MSG_CHANNEL_CLOSE:
|
3736 |
case NET_SSH2_MSG_CHANNEL_EOF:
|
3737 |
if (!$skip_channel_filter && !empty($this->server_channels)) {
|
3913 |
*
|
3914 |
* Returns the data as a string if it's available and false if not.
|
3915 |
*
|
3916 |
+
* @param int $client_channel
|
3917 |
+
* @param bool $skip_extended
|
3918 |
+
* @return mixed|bool
|
3919 |
* @access private
|
3920 |
*/
|
3921 |
function _get_channel_packet($client_channel, $skip_extended = false)
|
3922 |
{
|
3923 |
if (!empty($this->channel_buffers[$client_channel])) {
|
3924 |
+
switch ($this->channel_status[$client_channel]) {
|
3925 |
+
case NET_SSH2_MSG_CHANNEL_REQUEST:
|
3926 |
+
foreach ($this->channel_buffers[$client_channel] as $i => $packet) {
|
3927 |
+
switch (ord($packet[0])) {
|
3928 |
+
case NET_SSH2_MSG_CHANNEL_SUCCESS:
|
3929 |
+
case NET_SSH2_MSG_CHANNEL_FAILURE:
|
3930 |
+
unset($this->channel_buffers[$client_channel][$i]);
|
3931 |
+
return substr($packet, 1);
|
3932 |
+
}
|
3933 |
+
}
|
3934 |
+
break;
|
3935 |
+
default:
|
3936 |
+
return substr(array_shift($this->channel_buffers[$client_channel]), 1);
|
3937 |
+
}
|
3938 |
}
|
3939 |
|
3940 |
while (true) {
|
3942 |
$response = $this->binary_packet_buffer;
|
3943 |
$this->binary_packet_buffer = false;
|
3944 |
} else {
|
3945 |
+
$response = $this->_get_binary_packet(true);
|
3946 |
+
if ($response === true && $this->is_timeout) {
|
3947 |
+
if ($client_channel == NET_SSH2_CHANNEL_EXEC && !$this->request_pty) {
|
3948 |
+
$this->_close_channel($client_channel);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3949 |
}
|
3950 |
+
return true;
|
|
|
3951 |
}
|
|
|
|
|
3952 |
if ($response === false) {
|
3953 |
$this->bitmap = 0;
|
3954 |
user_error('Connection closed by server');
|
4008 |
if ($client_channel == $channel && $this->channel_status[$channel] == NET_SSH2_MSG_CHANNEL_DATA) {
|
4009 |
return $data;
|
4010 |
}
|
4011 |
+
$this->channel_buffers[$channel][] = chr($type) . $data;
|
|
|
|
|
|
|
4012 |
|
4013 |
continue 2;
|
4014 |
case NET_SSH2_MSG_CHANNEL_REQUEST:
|
4087 |
$result = $client_channel == $channel ? true : $this->_get_channel_packet($client_channel, $skip_extended);
|
4088 |
$this->_on_channel_open();
|
4089 |
return $result;
|
4090 |
+
case NET_SSH2_MSG_CHANNEL_OPEN_FAILURE:
|
|
|
4091 |
user_error('Unable to open channel');
|
4092 |
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
4093 |
+
default:
|
4094 |
+
if ($client_channel == $channel) {
|
4095 |
+
user_error('Unexpected response to open request');
|
4096 |
+
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
4097 |
+
}
|
4098 |
+
return $this->_get_channel_packet($client_channel, $skip_extended);
|
4099 |
}
|
4100 |
break;
|
4101 |
case NET_SSH2_MSG_CHANNEL_REQUEST:
|
4104 |
return true;
|
4105 |
case NET_SSH2_MSG_CHANNEL_FAILURE:
|
4106 |
return false;
|
4107 |
+
case NET_SSH2_MSG_CHANNEL_DATA:
|
4108 |
+
if (strlen($response) < 4) {
|
4109 |
+
return false;
|
4110 |
+
}
|
4111 |
+
extract(unpack('Nlength', $this->_string_shift($response, 4)));
|
4112 |
+
$data = $this->_string_shift($response, $length);
|
4113 |
+
$this->channel_buffers[$channel][] = chr($type) . $data;
|
4114 |
+
return $this->_get_channel_packet($client_channel, $skip_extended);
|
4115 |
default:
|
4116 |
user_error('Unable to fulfill channel request');
|
4117 |
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
4151 |
if ($client_channel == $channel) {
|
4152 |
return $data;
|
4153 |
}
|
4154 |
+
$this->channel_buffers[$channel][] = chr($type) . $data;
|
|
|
|
|
|
|
4155 |
break;
|
4156 |
case NET_SSH2_MSG_CHANNEL_CLOSE:
|
4157 |
$this->curTimeout = 5;
|
4170 |
case NET_SSH2_MSG_CHANNEL_EOF:
|
4171 |
break;
|
4172 |
default:
|
4173 |
+
user_error("Error reading channel data ($type)");
|
4174 |
return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
|
4175 |
}
|
4176 |
}
|
4195 |
return false;
|
4196 |
}
|
4197 |
|
4198 |
+
if (!isset($logged)) {
|
4199 |
+
$logged = $data;
|
4200 |
+
}
|
4201 |
+
|
4202 |
+
switch ($this->compress) {
|
4203 |
+
case NET_SSH2_COMPRESSION_ZLIB_AT_OPENSSH:
|
4204 |
+
if (!$this->isAuthenticated()) {
|
4205 |
+
break;
|
4206 |
+
}
|
4207 |
+
case NET_SSH2_COMPRESSION_ZLIB:
|
4208 |
+
if (!$this->regenerate_compression_context) {
|
4209 |
+
$header = '';
|
4210 |
+
} else {
|
4211 |
+
$this->regenerate_compression_context = false;
|
4212 |
+
$this->compress_context = deflate_init(ZLIB_ENCODING_RAW, ['window' => 15]);
|
4213 |
+
$header = "\x78\x9C";
|
4214 |
+
}
|
4215 |
+
if ($this->compress_context) {
|
4216 |
+
$data = $header . deflate_add($this->compress_context, $data, ZLIB_PARTIAL_FLUSH);
|
4217 |
+
}
|
4218 |
+
}
|
4219 |
|
4220 |
// 4 (packet length) + 1 (padding length) + 4 (minimal padding amount) == 9
|
4221 |
$packet_length = strlen($data) + 9;
|
4238 |
$packet.= $hmac;
|
4239 |
|
4240 |
$start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
|
4241 |
+
$result = strlen($packet) == @fputs($this->fsock, $packet);
|
4242 |
$stop = strtok(microtime(), ' ') + strtok('');
|
4243 |
|
4244 |
if (defined('NET_SSH2_LOGGING')) {
|
4245 |
$current = strtok(microtime(), ' ') + strtok('');
|
4246 |
+
$message_number = isset($this->message_numbers[ord($logged[0])]) ? $this->message_numbers[ord($logged[0])] : 'UNKNOWN (' . ord($logged[0]) . ')';
|
4247 |
$message_number = '-> ' . $message_number .
|
4248 |
' (since last: ' . round($current - $this->last_packet, 4) . ', network: ' . round($stop - $start, 4) . 's)';
|
4249 |
+
$this->_append_log($message_number, $logged);
|
4250 |
$this->last_packet = $current;
|
4251 |
}
|
4252 |
|
4258 |
*
|
4259 |
* Makes sure that only the last 1MB worth of packets will be logged
|
4260 |
*
|
4261 |
+
* @param string $message_number
|
4262 |
+
* @param string $message
|
4263 |
* @access private
|
4264 |
*/
|
4265 |
function _append_log($message_number, $message)
|
4464 |
* named constants from it, using the value as the name of the constant and the index as the value of the constant.
|
4465 |
* If any of the constants that would be defined already exists, none of the constants will be defined.
|
4466 |
*
|
|
|
4467 |
* @access private
|
4468 |
*/
|
4469 |
function _define_array()
|
4867 |
//'none' // OPTIONAL no encryption; NOT RECOMMENDED
|
4868 |
);
|
4869 |
|
4870 |
+
if ($this->crypto_engine) {
|
4871 |
+
$engines = array($this->crypto_engine);
|
4872 |
+
} else {
|
4873 |
+
$engines = array(
|
4874 |
+
CRYPT_ENGINE_OPENSSL,
|
4875 |
+
CRYPT_ENGINE_MCRYPT,
|
4876 |
+
CRYPT_ENGINE_INTERNAL
|
4877 |
+
);
|
4878 |
+
}
|
4879 |
|
4880 |
$ciphers = array();
|
4881 |
foreach ($engines as $engine) {
|
4929 |
*/
|
4930 |
function getSupportedCompressionAlgorithms()
|
4931 |
{
|
4932 |
+
$algos = array('none'); // REQUIRED no compression
|
4933 |
+
if (function_exists('deflate_init')) {
|
4934 |
+
$algos[] = 'zlib@openssh.com'; // https://datatracker.ietf.org/doc/html/draft-miller-secsh-compression-delayed
|
4935 |
+
$algos[] = 'zlib';
|
4936 |
+
}
|
4937 |
+
return $algos;
|
4938 |
}
|
4939 |
|
4940 |
/**
|
4949 |
{
|
4950 |
$this->_connect();
|
4951 |
|
4952 |
+
$compression_map = array(
|
4953 |
+
NET_SSH2_COMPRESSION_NONE => 'none',
|
4954 |
+
NET_SSH2_COMPRESSION_ZLIB => 'zlib',
|
4955 |
+
NET_SSH2_COMPRESSION_ZLIB_AT_OPENSSH => 'zlib@openssh.com'
|
4956 |
+
);
|
4957 |
+
|
4958 |
return array(
|
4959 |
'kex' => $this->kex_algorithm,
|
4960 |
'hostkey' => $this->signature_format,
|
4961 |
'client_to_server' => array(
|
4962 |
'crypt' => $this->encrypt->name,
|
4963 |
'mac' => $this->hmac_create->name,
|
4964 |
+
'comp' => $compression_map[$this->compress],
|
4965 |
),
|
4966 |
'server_to_client' => array(
|
4967 |
'crypt' => $this->decrypt->name,
|
4968 |
'mac' => $this->hmac_check->name,
|
4969 |
+
'comp' => $compression_map[$this->decompress],
|
4970 |
)
|
4971 |
);
|
4972 |
}
|
5371 |
);
|
5372 |
}
|
5373 |
}
|
5374 |
+
|
5375 |
+
/**
|
5376 |
+
* Return the list of authentication methods that may productively continue authentication.
|
5377 |
+
*
|
5378 |
+
* @see https://tools.ietf.org/html/rfc4252#section-5.1
|
5379 |
+
* @return array|null
|
5380 |
+
*/
|
5381 |
+
function getAuthMethodsToContinue()
|
5382 |
+
{
|
5383 |
+
return $this->auth_methods_to_continue;
|
5384 |
+
}
|
5385 |
+
|
5386 |
+
/**
|
5387 |
+
* Enables "smart" multi-factor authentication (MFA)
|
5388 |
+
*/
|
5389 |
+
function enableSmartMFA()
|
5390 |
+
{
|
5391 |
+
$this->smartMFA = true;
|
5392 |
+
}
|
5393 |
+
|
5394 |
+
/**
|
5395 |
+
* Disables "smart" multi-factor authentication (MFA)
|
5396 |
+
*/
|
5397 |
+
function disableSmartMFA()
|
5398 |
+
{
|
5399 |
+
$this->smartMFA = false;
|
5400 |
+
}
|
5401 |
}
|
phpseclib/bootstrap.php
CHANGED
@@ -7,7 +7,8 @@
|
|
7 |
|
8 |
if (extension_loaded('mbstring')) {
|
9 |
// 2 - MB_OVERLOAD_STRING
|
10 |
-
|
|
|
11 |
throw new \UnexpectedValueException(
|
12 |
'Overloading of string functions using mbstring.func_overload ' .
|
13 |
'is not supported by phpseclib.'
|
7 |
|
8 |
if (extension_loaded('mbstring')) {
|
9 |
// 2 - MB_OVERLOAD_STRING
|
10 |
+
// mbstring.func_overload is deprecated in php 7.2 and removed in php 8.0.
|
11 |
+
if (version_compare(PHP_VERSION, '8.0.0') < 0 && ini_get('mbstring.func_overload') & 2) {
|
12 |
throw new \UnexpectedValueException(
|
13 |
'Overloading of string functions using mbstring.func_overload ' .
|
14 |
'is not supported by phpseclib.'
|
readme.txt
CHANGED
@@ -4,7 +4,7 @@ Donate link: https://sourceforge.net/donate/index.php?group_id=198487
|
|
4 |
Tags: ssh, sftp
|
5 |
Requires at least: 3.1
|
6 |
Tested up to: 6.1
|
7 |
-
Stable tag: 0.8.
|
8 |
|
9 |
"SSH SFTP Updater Support" is the easiest way to keep your WordPress installation up-to-date with SFTP.
|
10 |
|
@@ -16,7 +16,7 @@ To use it, after installing and activating the plugins, add the necessary consta
|
|
16 |
|
17 |
a) `define('FS_METHOD', 'ssh2');`
|
18 |
|
19 |
-
b) Others as <a href="https://
|
20 |
|
21 |
This plugin is offered and maintained as a free service to the WP community. You might also be interested in enhancing your WordPress site with our other top plugins, below.
|
22 |
|
@@ -35,10 +35,14 @@ This plugin is offered and maintained as a free service to the WP community. You
|
|
35 |
|
36 |
a) `define('FS_METHOD', 'ssh2');`
|
37 |
|
38 |
-
b) Others as <a href="https://
|
39 |
|
40 |
== Changelog ==
|
41 |
|
|
|
|
|
|
|
|
|
42 |
= 0.8.4 - 2020/Dec/30 =
|
43 |
|
44 |
* TWEAK: Remove obsolete references to other plugins
|
@@ -124,4 +128,4 @@ b) Others as <a href="https://codex.wordpress.org/Editing_wp-config.php#WordPres
|
|
124 |
* Initial Release
|
125 |
|
126 |
== Upgrade Notice ==
|
127 |
-
* 0.8.
|
4 |
Tags: ssh, sftp
|
5 |
Requires at least: 3.1
|
6 |
Tested up to: 6.1
|
7 |
+
Stable tag: 0.8.5
|
8 |
|
9 |
"SSH SFTP Updater Support" is the easiest way to keep your WordPress installation up-to-date with SFTP.
|
10 |
|
16 |
|
17 |
a) `define('FS_METHOD', 'ssh2');`
|
18 |
|
19 |
+
b) Others as <a href="https://developer.wordpress.org/apis/wp-config-php/#wordpress-upgrade-constants">detailed in the official WP codex</a>
|
20 |
|
21 |
This plugin is offered and maintained as a free service to the WP community. You might also be interested in enhancing your WordPress site with our other top plugins, below.
|
22 |
|
35 |
|
36 |
a) `define('FS_METHOD', 'ssh2');`
|
37 |
|
38 |
+
b) Others as <a href="https://developer.wordpress.org/apis/wp-config-php/#wordpress-upgrade-constants">detailed in the official WP codex</a> or various other articles (Google for things like WordPress updates via SFTP).
|
39 |
|
40 |
== Changelog ==
|
41 |
|
42 |
+
= 0.8.5 - 2022/Dec/08 =
|
43 |
+
|
44 |
+
* TWEAK: Update URL reference to current location
|
45 |
+
|
46 |
= 0.8.4 - 2020/Dec/30 =
|
47 |
|
48 |
* TWEAK: Remove obsolete references to other plugins
|
128 |
* Initial Release
|
129 |
|
130 |
== Upgrade Notice ==
|
131 |
+
* 0.8.5 : Update URL reference to current location
|
sftp.php
CHANGED
@@ -3,7 +3,7 @@
|
|
3 |
Plugin Name: SSH SFTP Updater Support
|
4 |
Plugin URI: https://wordpress.org/plugins/ssh-sftp-updater-support/
|
5 |
Description: Update your WordPress blog / plugins via SFTP without libssh2
|
6 |
-
Version: 0.8.
|
7 |
Author: TerraFrost, David Anderson + Team Updraft
|
8 |
Author URI: https://updraftplus.com/
|
9 |
*/
|
@@ -12,7 +12,7 @@ if (!defined('ABSPATH')) die('No direct access allowed');
|
|
12 |
|
13 |
define('SSH_SFTP_UPDATER_SUPPORT_MAIN_PATH', plugin_dir_path(__FILE__));
|
14 |
define('SSH_SFTP_UPDATER_SUPPORT_BASENAME', plugin_basename(__FILE__));
|
15 |
-
define('SSH_SFTP_UPDATER_SUPPORT_VERSION', '0.8.
|
16 |
define('SSH_SFTP_UPDATER_SUPPORT_URL', plugin_dir_url(__FILE__));
|
17 |
// see http://adambrown.info/p/wp_hooks/hook/<filter name>
|
18 |
add_filter('filesystem_method', 'phpseclib_filesystem_method', 10, 2); // since 2.6 - WordPress will ignore the ssh option if the php ssh extension is not loaded
|
3 |
Plugin Name: SSH SFTP Updater Support
|
4 |
Plugin URI: https://wordpress.org/plugins/ssh-sftp-updater-support/
|
5 |
Description: Update your WordPress blog / plugins via SFTP without libssh2
|
6 |
+
Version: 0.8.5
|
7 |
Author: TerraFrost, David Anderson + Team Updraft
|
8 |
Author URI: https://updraftplus.com/
|
9 |
*/
|
12 |
|
13 |
define('SSH_SFTP_UPDATER_SUPPORT_MAIN_PATH', plugin_dir_path(__FILE__));
|
14 |
define('SSH_SFTP_UPDATER_SUPPORT_BASENAME', plugin_basename(__FILE__));
|
15 |
+
define('SSH_SFTP_UPDATER_SUPPORT_VERSION', '0.8.5');
|
16 |
define('SSH_SFTP_UPDATER_SUPPORT_URL', plugin_dir_url(__FILE__));
|
17 |
// see http://adambrown.info/p/wp_hooks/hook/<filter name>
|
18 |
add_filter('filesystem_method', 'phpseclib_filesystem_method', 10, 2); // since 2.6 - WordPress will ignore the ssh option if the php ssh extension is not loaded
|