mirror of
https://github.com/danog/tgseclib.git
synced 2024-11-27 04:34:45 +01:00
Merge branch 'ssh2-fix-multi-channel-1.0' into 2.0
This commit is contained in:
commit
eeaef39827
@ -100,10 +100,10 @@ class SSH2
|
|||||||
* @see \phpseclib\Net\SSH2::_get_channel_packet()
|
* @see \phpseclib\Net\SSH2::_get_channel_packet()
|
||||||
* @access private
|
* @access private
|
||||||
*/
|
*/
|
||||||
const CHANNEL_EXEC = 0; // PuTTy uses 0x100
|
const CHANNEL_EXEC = 1; // PuTTy uses 0x100
|
||||||
const CHANNEL_SHELL = 1;
|
const CHANNEL_SHELL = 2;
|
||||||
const CHANNEL_SUBSYSTEM = 2;
|
const CHANNEL_SUBSYSTEM = 3;
|
||||||
const CHANNEL_AGENT_FORWARD = 3;
|
const CHANNEL_AGENT_FORWARD = 4;
|
||||||
/**#@-*/
|
/**#@-*/
|
||||||
|
|
||||||
/**#@+
|
/**#@+
|
||||||
@ -910,6 +910,14 @@ class SSH2
|
|||||||
*/
|
*/
|
||||||
var $retry_connect = false;
|
var $retry_connect = false;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Binary Packet Buffer
|
||||||
|
*
|
||||||
|
* @var string|false
|
||||||
|
* @access private
|
||||||
|
*/
|
||||||
|
var $binary_packet_buffer = false;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Default Constructor.
|
* Default Constructor.
|
||||||
*
|
*
|
||||||
@ -2721,7 +2729,7 @@ class SSH2
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
$response = $this->_get_binary_packet();
|
$response = $this->_get_binary_packet(true);
|
||||||
if ($response === false) {
|
if ($response === false) {
|
||||||
user_error('Connection closed by server');
|
user_error('Connection closed by server');
|
||||||
return false;
|
return false;
|
||||||
@ -3203,7 +3211,7 @@ class SSH2
|
|||||||
* @return string
|
* @return string
|
||||||
* @access private
|
* @access private
|
||||||
*/
|
*/
|
||||||
function _get_binary_packet()
|
function _get_binary_packet($filter_channel_packets = false)
|
||||||
{
|
{
|
||||||
if (!is_resource($this->fsock) || feof($this->fsock)) {
|
if (!is_resource($this->fsock) || feof($this->fsock)) {
|
||||||
user_error('Connection closed prematurely');
|
user_error('Connection closed prematurely');
|
||||||
@ -3257,6 +3265,7 @@ class SSH2
|
|||||||
$buffer.= $temp;
|
$buffer.= $temp;
|
||||||
$remaining_length-= strlen($temp);
|
$remaining_length-= strlen($temp);
|
||||||
}
|
}
|
||||||
|
|
||||||
$stop = microtime(true);
|
$stop = microtime(true);
|
||||||
if (strlen($buffer)) {
|
if (strlen($buffer)) {
|
||||||
$raw.= $this->decrypt !== false ? $this->decrypt->decrypt($buffer) : $buffer;
|
$raw.= $this->decrypt !== false ? $this->decrypt->decrypt($buffer) : $buffer;
|
||||||
@ -3292,7 +3301,7 @@ class SSH2
|
|||||||
$this->last_packet = $current;
|
$this->last_packet = $current;
|
||||||
}
|
}
|
||||||
|
|
||||||
return $this->_filter($payload);
|
return $this->_filter($payload, $filter_channel_packets);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -3304,7 +3313,7 @@ class SSH2
|
|||||||
* @return string
|
* @return string
|
||||||
* @access private
|
* @access private
|
||||||
*/
|
*/
|
||||||
function _filter($payload)
|
function _filter($payload, $filter_channel_packets)
|
||||||
{
|
{
|
||||||
switch (ord($payload[0])) {
|
switch (ord($payload[0])) {
|
||||||
case NET_SSH2_MSG_DISCONNECT:
|
case NET_SSH2_MSG_DISCONNECT:
|
||||||
@ -3354,6 +3363,17 @@ class SSH2
|
|||||||
// only called when we've already logged in
|
// only called when we've already logged in
|
||||||
if (($this->bitmap & self::MASK_CONNECTED) && $this->isAuthenticated()) {
|
if (($this->bitmap & self::MASK_CONNECTED) && $this->isAuthenticated()) {
|
||||||
switch (ord($payload[0])) {
|
switch (ord($payload[0])) {
|
||||||
|
case NET_SSH2_MSG_CHANNEL_DATA:
|
||||||
|
case NET_SSH2_MSG_CHANNEL_EXTENDED_DATA:
|
||||||
|
case NET_SSH2_MSG_CHANNEL_REQUEST:
|
||||||
|
case NET_SSH2_MSG_CHANNEL_CLOSE:
|
||||||
|
case NET_SSH2_MSG_CHANNEL_EOF:
|
||||||
|
if ($filter_channel_packets) {
|
||||||
|
$this->binary_packet_buffer = $payload;
|
||||||
|
$this->_get_channel_packet(true);
|
||||||
|
$payload = $this->_get_binary_packet(true);
|
||||||
|
}
|
||||||
|
break;
|
||||||
case NET_SSH2_MSG_GLOBAL_REQUEST: // see http://tools.ietf.org/html/rfc4254#section-4
|
case NET_SSH2_MSG_GLOBAL_REQUEST: // see http://tools.ietf.org/html/rfc4254#section-4
|
||||||
if (strlen($payload) < 4) {
|
if (strlen($payload) < 4) {
|
||||||
return false;
|
return false;
|
||||||
@ -3536,6 +3556,10 @@ class SSH2
|
|||||||
}
|
}
|
||||||
|
|
||||||
while (true) {
|
while (true) {
|
||||||
|
if ($this->binary_packet_buffer !== false) {
|
||||||
|
$response = $this->binary_packet_buffer;
|
||||||
|
$this->binary_packet_buffer = false;
|
||||||
|
} else {
|
||||||
if ($this->curTimeout) {
|
if ($this->curTimeout) {
|
||||||
if ($this->curTimeout < 0) {
|
if ($this->curTimeout < 0) {
|
||||||
$this->is_timeout = true;
|
$this->is_timeout = true;
|
||||||
@ -3562,6 +3586,8 @@ class SSH2
|
|||||||
user_error('Connection closed by server');
|
user_error('Connection closed by server');
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if ($client_channel == -1 && $response === true) {
|
if ($client_channel == -1 && $response === true) {
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user