aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMario Vavti <mario@mariovavti.com>2021-02-04 21:01:25 +0100
committerMario Vavti <mario@mariovavti.com>2021-02-04 21:01:25 +0100
commita6162d3134cd7fcde4f45064b75f90008a7f8177 (patch)
tree7721c9cb8e5f23823bc0315429a7c638b65f5b4a
parent34b28cd8d36c7805e65c442ff1588ccf5165387a (diff)
downloadvolse-hubzilla-a6162d3134cd7fcde4f45064b75f90008a7f8177.tar.gz
volse-hubzilla-a6162d3134cd7fcde4f45064b75f90008a7f8177.tar.bz2
volse-hubzilla-a6162d3134cd7fcde4f45064b75f90008a7f8177.zip
downgrade phpseclib to version 2
-rw-r--r--composer.json2
-rw-r--r--composer.lock139
-rw-r--r--include/crypto.php97
-rw-r--r--vendor/composer/ClassLoader.php32
-rw-r--r--vendor/composer/InstalledVersions.php151
-rw-r--r--vendor/composer/autoload_classmap.php368
-rw-r--r--vendor/composer/autoload_psr4.php3
-rw-r--r--vendor/composer/autoload_real.php2
-rw-r--r--vendor/composer/autoload_static.php377
-rw-r--r--vendor/composer/installed.json145
-rw-r--r--vendor/composer/installed.php36
-rw-r--r--vendor/paragonie/constant_time_encoding/.gitignore2
-rw-r--r--vendor/paragonie/constant_time_encoding/.travis.yml24
-rw-r--r--vendor/paragonie/constant_time_encoding/LICENSE.txt48
-rw-r--r--vendor/paragonie/constant_time_encoding/README.md84
-rw-r--r--vendor/paragonie/constant_time_encoding/composer.json51
-rw-r--r--vendor/paragonie/constant_time_encoding/phpunit.xml.dist13
-rw-r--r--vendor/paragonie/constant_time_encoding/psalm.xml9
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Base32.php471
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Base32Hex.php111
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Base64.php271
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Base64DotSlash.php88
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Base64DotSlashOrdered.php82
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Base64UrlSafe.php95
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Binary.php85
-rw-r--r--vendor/paragonie/constant_time_encoding/src/EncoderInterface.php52
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Encoding.php260
-rw-r--r--vendor/paragonie/constant_time_encoding/src/Hex.php159
-rw-r--r--vendor/paragonie/constant_time_encoding/src/RFC4648.php175
-rw-r--r--vendor/paragonie/random_compat/LICENSE22
-rwxr-xr-xvendor/paragonie/random_compat/build-phar.sh5
-rw-r--r--vendor/paragonie/random_compat/composer.json34
-rw-r--r--vendor/paragonie/random_compat/dist/random_compat.phar.pubkey5
-rw-r--r--vendor/paragonie/random_compat/dist/random_compat.phar.pubkey.asc11
-rw-r--r--vendor/paragonie/random_compat/lib/random.php32
-rw-r--r--vendor/paragonie/random_compat/other/build_phar.php57
-rw-r--r--vendor/paragonie/random_compat/psalm-autoload.php9
-rw-r--r--vendor/paragonie/random_compat/psalm.xml19
-rw-r--r--vendor/phpseclib/phpseclib/.github/FUNDING.yml12
-rw-r--r--vendor/phpseclib/phpseclib/README.md4
-rw-r--r--vendor/phpseclib/phpseclib/composer.json8
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Common/Functions/Strings.php387
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/AES.php61
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php339
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/ChaCha20.php797
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/AsymmetricKey.php492
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/BlockCipher.php27
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/OpenSSH.php234
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS.php80
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS1.php223
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS8.php702
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PuTTY.php261
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Signature/Raw.php66
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/PrivateKey.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/PublicKey.php29
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/StreamCipher.php59
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/SymmetricKey.php3271
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/Fingerprint.php62
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/PasswordProtected.php51
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DES.php502
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DH.php400
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS1.php83
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS8.php157
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Parameters.php40
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/PrivateKey.php82
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/PublicKey.php53
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA.php344
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/OpenSSH.php126
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS1.php151
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS8.php170
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PuTTY.php118
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/Raw.php92
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/XML.php133
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/ASN1.php68
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/Raw.php29
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/SSH2.php78
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Parameters.php40
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/PrivateKey.php159
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/PublicKey.php91
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC.php477
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Base.php220
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Binary.php378
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/KoblitzPrime.php325
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Montgomery.php285
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Prime.php774
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/TwistedEdwards.php219
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve25519.php64
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve448.php71
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed25519.php334
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed448.php267
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160t1.php49
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192t1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224t1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256t1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320r1.php42
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320t1.php42
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384r1.php48
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384t1.php48
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512r1.php48
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512t1.php48
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb233.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb409.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk163.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk233.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk283.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk409.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp192.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp224.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp256.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp384.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp521.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistt571.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v1.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v2.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v3.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v2.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v3.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime256v1.php20
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r2.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r2.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160k1.php48
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r2.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192k1.php47
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192r1.php80
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224k1.php47
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256k1.php51
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp384r1.php54
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp521r1.php48
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r2.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r2.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163k1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r2.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r2.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233k1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect239k1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283k1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283r1.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409k1.php39
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409r1.php39
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php43
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php43
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/Common.php555
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPrivate.php108
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPublic.php79
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/OpenSSH.php216
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS1.php203
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS8.php249
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PuTTY.php146
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/XML.php484
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/libsodium.php122
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/ASN1.php68
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/Raw.php29
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/SSH2.php100
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Parameters.php40
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/PrivateKey.php258
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/PublicKey.php177
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Hash.php1555
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/PublicKeyLoader.php64
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RC2.php399
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RC4.php157
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA.php3206
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/MSBLOB.php242
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/OpenSSH.php140
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS1.php167
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS8.php149
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PSS.php250
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PuTTY.php130
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/Raw.php108
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/XML.php173
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/PrivateKey.php556
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/PublicKey.php507
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Random.php150
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php662
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Salsa20.php529
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php226
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php424
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/BadConfigurationException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/BadDecryptionException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/BadModeException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/ConnectionClosedException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/FileNotFoundException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/InconsistentSetupException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/InsufficientSetupException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/NoKeyLoadedException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/NoSupportedAlgorithmsException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/UnableToConnectException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedAlgorithmException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedCurveException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedFormatException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedOperationException.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ANSI.php87
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1.php469
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php16
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AccessDescription.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AdministrationDomainName.php40
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AlgorithmIdentifier.php39
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AnotherName.php41
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attribute.php41
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeType.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeTypeAndValue.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeValue.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attributes.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityInfoAccessSyntax.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityKeyIdentifier.php49
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BaseDistance.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BasicConstraints.php43
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttribute.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttributes.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInStandardAttributes.php71
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CPSuri.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLDistributionPoints.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLNumber.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLReason.php45
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertPolicyId.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Certificate.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateIssuer.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateList.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificatePolicies.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateSerialNumber.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequest.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequestInfo.php45
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Characteristic_two.php40
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CountryName.php40
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Curve.php40
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DHParameter.php42
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAParams.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPrivateKey.php40
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPublicKey.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DigestInfo.php38
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DirectoryString.php39
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DisplayText.php38
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPoint.php49
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPointName.php44
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DssSigValue.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECParameters.php49
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPoint.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPrivateKey.php52
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EDIPartyName.php46
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EcdsaSigValue.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedData.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedPrivateKeyInfo.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtKeyUsageSyntax.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extension.php47
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttribute.php46
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttributes.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extensions.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldElement.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldID.php39
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralName.php84
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralNames.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtree.php46
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtrees.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HashAlgorithm.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HoldInstructionCode.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/InvalidityDate.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuerAltName.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuingDistributionPoint.php72
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyIdentifier.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyPurposeId.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyUsage.php43
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/MaskGenAlgorithm.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Name.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NameConstraints.php44
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NetworkAddress.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NoticeReference.php41
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NumericUserIdentifier.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ORAddress.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OneAsymmetricKey.php52
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationName.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationalUnitNames.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfo.php38
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfos.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBEParameter.php38
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBES2params.php38
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBKDF2params.php45
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBMAC1params.php38
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PKCS9String.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Pentanomial.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PersonalName.php58
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyInformation.php42
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyMappings.php41
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierId.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierInfo.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PostalAddress.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Prime_p.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateDomainName.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKey.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyInfo.php45
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyUsagePeriod.php44
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKey.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyAndChallenge.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyInfo.php39
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RC2CBCParameter.php41
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RDNSequence.php42
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPrivateKey.php48
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPublicKey.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSASSA_PSS_params.php62
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ReasonFlags.php43
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RelativeDistinguishedName.php41
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RevokedCertificate.php39
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SignedPublicKeyAndChallenge.php37
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SpecifiedECDomain.php49
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectAltName.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectDirectoryAttributes.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectInfoAccessSyntax.php35
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectPublicKeyInfo.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertList.php58
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertificate.php69
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TerminalIdentifier.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Time.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Trinomial.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UniqueIdentifier.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UserNotice.php42
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Validity.php36
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_ca_policy_url.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_cert_type.php44
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_comment.php30
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/File/X509.php2834
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger.php3737
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath.php742
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Base.php116
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/BuiltIn.php44
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/DefaultEngine.php29
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/OpenSSL.php29
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/Barrett.php193
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/EvalBarrett.php117
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/Engine.php1219
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP.php751
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP/DefaultEngine.php44
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/OpenSSL.php75
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP.php1316
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Base.php149
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/DefaultEngine.php29
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Montgomery.php93
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/OpenSSL.php29
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Barrett.php284
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Classic.php46
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/EvalBarrett.php492
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Montgomery.php130
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/MontgomeryMult.php81
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/PowerOfTwo.php63
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP32.php418
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP64.php422
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BinaryField.php196
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/BinaryField/Integer.php520
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField/Integer.php26
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/PrimeField.php114
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Math/PrimeField/Integer.php399
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Net/SFTP.php1091
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php126
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/Net/SSH2.php3202
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php208
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php277
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/System/SSH/Common/Traits/ReadBytes.php42
-rw-r--r--vendor/phpseclib/phpseclib/phpseclib/bootstrap.php8
371 files changed, 13136 insertions, 44483 deletions
diff --git a/composer.json b/composer.json
index 8aecd896a..f5654858d 100644
--- a/composer.json
+++ b/composer.json
@@ -46,7 +46,7 @@
"twbs/bootstrap": "^4.3.1",
"blueimp/jquery-file-upload": "^10.3",
"desandro/imagesloaded": "^4.1",
- "phpseclib/phpseclib": "~3.0"
+ "phpseclib/phpseclib": "~2.0"
},
"require-dev": {
"phpunit/phpunit": "^9.4",
diff --git a/composer.lock b/composer.lock
index 466aa08b7..fcd90e12d 100644
--- a/composer.lock
+++ b/composer.lock
@@ -4,7 +4,7 @@
"Read more about it at https://getcomposer.org/doc/01-basic-usage.md#installing-dependencies",
"This file is @generated automatically"
],
- "content-hash": "49baaaa19b27cdfbb644c7ab94b45bce",
+ "content-hash": "bc4a925533b7fe89fd5c8e94075835c6",
"packages": [
{
"name": "blueimp/jquery-file-upload",
@@ -514,123 +514,6 @@
"time": "2019-12-02T02:32:27+00:00"
},
{
- "name": "paragonie/constant_time_encoding",
- "version": "v2.4.0",
- "source": {
- "type": "git",
- "url": "https://github.com/paragonie/constant_time_encoding.git",
- "reference": "f34c2b11eb9d2c9318e13540a1dbc2a3afbd939c"
- },
- "dist": {
- "type": "zip",
- "url": "https://api.github.com/repos/paragonie/constant_time_encoding/zipball/f34c2b11eb9d2c9318e13540a1dbc2a3afbd939c",
- "reference": "f34c2b11eb9d2c9318e13540a1dbc2a3afbd939c",
- "shasum": ""
- },
- "require": {
- "php": "^7|^8"
- },
- "require-dev": {
- "phpunit/phpunit": "^6|^7|^8|^9",
- "vimeo/psalm": "^1|^2|^3|^4"
- },
- "type": "library",
- "autoload": {
- "psr-4": {
- "ParagonIE\\ConstantTime\\": "src/"
- }
- },
- "notification-url": "https://packagist.org/downloads/",
- "license": [
- "MIT"
- ],
- "authors": [
- {
- "name": "Paragon Initiative Enterprises",
- "email": "security@paragonie.com",
- "homepage": "https://paragonie.com",
- "role": "Maintainer"
- },
- {
- "name": "Steve 'Sc00bz' Thomas",
- "email": "steve@tobtu.com",
- "homepage": "https://www.tobtu.com",
- "role": "Original Developer"
- }
- ],
- "description": "Constant-time Implementations of RFC 4648 Encoding (Base-64, Base-32, Base-16)",
- "keywords": [
- "base16",
- "base32",
- "base32_decode",
- "base32_encode",
- "base64",
- "base64_decode",
- "base64_encode",
- "bin2hex",
- "encoding",
- "hex",
- "hex2bin",
- "rfc4648"
- ],
- "support": {
- "email": "info@paragonie.com",
- "issues": "https://github.com/paragonie/constant_time_encoding/issues",
- "source": "https://github.com/paragonie/constant_time_encoding"
- },
- "time": "2020-12-06T15:14:20+00:00"
- },
- {
- "name": "paragonie/random_compat",
- "version": "v9.99.100",
- "source": {
- "type": "git",
- "url": "https://github.com/paragonie/random_compat.git",
- "reference": "996434e5492cb4c3edcb9168db6fbb1359ef965a"
- },
- "dist": {
- "type": "zip",
- "url": "https://api.github.com/repos/paragonie/random_compat/zipball/996434e5492cb4c3edcb9168db6fbb1359ef965a",
- "reference": "996434e5492cb4c3edcb9168db6fbb1359ef965a",
- "shasum": ""
- },
- "require": {
- "php": ">= 7"
- },
- "require-dev": {
- "phpunit/phpunit": "4.*|5.*",
- "vimeo/psalm": "^1"
- },
- "suggest": {
- "ext-libsodium": "Provides a modern crypto API that can be used to generate random bytes."
- },
- "type": "library",
- "notification-url": "https://packagist.org/downloads/",
- "license": [
- "MIT"
- ],
- "authors": [
- {
- "name": "Paragon Initiative Enterprises",
- "email": "security@paragonie.com",
- "homepage": "https://paragonie.com"
- }
- ],
- "description": "PHP 5.x polyfill for random_bytes() and random_int() from PHP 7",
- "keywords": [
- "csprng",
- "polyfill",
- "pseudorandom",
- "random"
- ],
- "support": {
- "email": "info@paragonie.com",
- "issues": "https://github.com/paragonie/random_compat/issues",
- "source": "https://github.com/paragonie/random_compat"
- },
- "time": "2020-10-15T08:29:30+00:00"
- },
- {
"name": "pear/text_languagedetect",
"version": "v1.0.1",
"source": {
@@ -680,26 +563,24 @@
},
{
"name": "phpseclib/phpseclib",
- "version": "3.0.4",
+ "version": "2.0.30",
"source": {
"type": "git",
"url": "https://github.com/phpseclib/phpseclib.git",
- "reference": "845a2275e886ba9fb386c8f59cb383dd9c8963e9"
+ "reference": "136b9ca7eebef78be14abf90d65c5e57b6bc5d36"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/phpseclib/phpseclib/zipball/845a2275e886ba9fb386c8f59cb383dd9c8963e9",
- "reference": "845a2275e886ba9fb386c8f59cb383dd9c8963e9",
+ "url": "https://api.github.com/repos/phpseclib/phpseclib/zipball/136b9ca7eebef78be14abf90d65c5e57b6bc5d36",
+ "reference": "136b9ca7eebef78be14abf90d65c5e57b6bc5d36",
"shasum": ""
},
"require": {
- "paragonie/constant_time_encoding": "^1|^2",
- "paragonie/random_compat": "^1.4|^2.0|^9.99.99",
- "php": ">=5.6.1"
+ "php": ">=5.3.3"
},
"require-dev": {
"phing/phing": "~2.7",
- "phpunit/phpunit": "^5.7|^6.0|^9.4",
+ "phpunit/phpunit": "^4.8.35|^5.7|^6.0|^9.4",
"squizlabs/php_codesniffer": "~2.0"
},
"suggest": {
@@ -714,7 +595,7 @@
"phpseclib/bootstrap.php"
],
"psr-4": {
- "phpseclib3\\": "phpseclib/"
+ "phpseclib\\": "phpseclib/"
}
},
"notification-url": "https://packagist.org/downloads/",
@@ -771,7 +652,7 @@
],
"support": {
"issues": "https://github.com/phpseclib/phpseclib/issues",
- "source": "https://github.com/phpseclib/phpseclib/tree/3.0.4"
+ "source": "https://github.com/phpseclib/phpseclib/tree/2.0.30"
},
"funding": [
{
@@ -787,7 +668,7 @@
"type": "tidelift"
}
],
- "time": "2021-01-25T19:02:05+00:00"
+ "time": "2020-12-17T05:42:04+00:00"
},
{
"name": "psr/log",
diff --git a/include/crypto.php b/include/crypto.php
index 39bfd8d43..0d3a5842d 100644
--- a/include/crypto.php
+++ b/include/crypto.php
@@ -1,5 +1,8 @@
<?php /** @file */
+use phpseclib3\Crypt\PublicKeyLoader;
+use phpseclib3\Math\BigInteger;
+
require_once('library/ASNValue.class.php');
require_once('library/asn1.php');
@@ -25,7 +28,7 @@ function rsa_verify($data,$sig,$key,$alg = 'sha256') {
if($verify === (-1)) {
while($msg = openssl_error_string())
logger('openssl_verify: ' . $msg,LOGGER_NORMAL,LOG_ERR);
- btlogger('openssl_verify: key: ' . $key, LOGGER_DEBUG, LOG_ERR);
+ btlogger('openssl_verify: key: ' . $key, LOGGER_DEBUG, LOG_ERR);
}
return (($verify > 0) ? true : false);
@@ -110,7 +113,7 @@ function CAST5CFB_decrypt($data,$key,$iv) {
function crypto_encapsulate($data,$pubkey,$alg='aes256cbc') {
$fn = strtoupper($alg) . '_encrypt';
-
+
if($alg === 'aes256cbc')
return aes_encapsulate($data,$pubkey);
@@ -150,7 +153,7 @@ function other_encapsulate($data,$pubkey,$alg) {
// assurance of security since it is meaningless if the source algorithms
// have been compromised. Also none of this matters if RSA has been
// compromised by state actors and evidence is mounting that this has
- // already happened.
+ // already happened.
$result = [ 'encrypted' => true ];
$key = openssl_random_pseudo_bytes(256);
@@ -177,11 +180,11 @@ function other_encapsulate($data,$pubkey,$alg) {
function crypto_methods() {
- // aes256cbc is provided for compatibility with earlier zot implementations which assume 32-byte key and 16-byte iv.
+ // aes256cbc is provided for compatibility with earlier zot implementations which assume 32-byte key and 16-byte iv.
// other_encapsulate() now produces these longer keys/ivs by default so that it is difficult to guess a
- // particular implementation or choice of underlying implementations based on the key/iv length.
+ // particular implementation or choice of underlying implementations based on the key/iv length.
// The actual methods are responsible for deriving the actual key/iv from the provided parameters;
- // possibly by truncation or segmentation - though many other methods could be used.
+ // possibly by truncation or segmentation - though many other methods could be used.
$r = [ 'aes256ctr.oaep', 'camellia256cfb.oaep', 'cast5cfb.oaep', 'aes256ctr', 'camellia256cfb', 'cast5cfb', 'aes256cbc', 'aes128cbc', 'cast5cbc' ];
call_hooks('crypto_methods',$r);
@@ -280,13 +283,13 @@ function new_keypair($bits) {
$openssl_options = array(
'digest_alg' => 'sha1',
'private_key_bits' => $bits,
- 'encrypt_key' => false
+ 'encrypt_key' => false
);
$conf = get_config('system','openssl_conf_file');
if($conf)
$openssl_options['config'] = $conf;
-
+
$result = openssl_pkey_new($openssl_options);
if(empty($result)) {
@@ -321,7 +324,7 @@ function DerToPem($Der, $Private=false)
$result = "-----BEGIN {$title}-----\n";
$result .= $body . "\n";
$result .= "-----END {$title}-----\n";
-
+
return $result;
}
@@ -338,7 +341,7 @@ function DerToRsa($Der)
$result = "-----BEGIN {$title}-----\n";
$result .= $body . "\n";
$result .= "-----END {$title}-----\n";
-
+
return $result;
}
@@ -383,11 +386,24 @@ function pkcs1_encode($Modulus,$PublicExponent) {
// http://stackoverflow.com/questions/27568570/how-to-convert-raw-modulus-exponent-to-rsa-public-key-pem-format
-function metopem($m,$e) {
- $der = pkcs8_encode($m,$e);
+/**
+ * @param string $m modulo
+ * @param string $e exponent
+ * @return string
+ */
+function metopem($m, $e) {
+
+ $key = PublicKeyLoader::load([
+ 'e' => new BigInteger($e, 256),
+ 'n' => new BigInteger($m, 256)
+ ]);
+ hz_syslog('metopem: ' . $key->toString('PKCS8'));
+ return $key->toString('PKCS8');
+
+/* $der = pkcs8_encode($m,$e);
$key = DerToPem($der,false);
- return $key;
-}
+ return $key;*/
+}
function pubrsatome($key,&$m,&$e) {
@@ -406,16 +422,44 @@ function pubrsatome($key,&$m,&$e) {
function rsatopem($key) {
- pubrsatome($key,$m,$e);
- return(metopem($m,$e));
+
+ $key = PublicKeyLoader::load($key);
+ hz_syslog('rsatopem: ' . $key->toString('PKCS8'));
+
+ return $key->toString('PKCS8');
+
+
+/* pubrsatome($key,$m,$e);
+ return(metopem($m,$e));*/
}
function pemtorsa($key) {
- pemtome($key,$m,$e);
- return(metorsa($m,$e));
+ $key = PublicKeyLoader::load($key);
+ hz_syslog('pemtorsa: ' . $key->toString('PKCS1'));
+
+ return $key->toString('PKCS1');
+
+/* pemtome($key,$m,$e);
+ return(metorsa($m,$e));*/
+
}
function pemtome($key,&$m,&$e) {
+
+ $key = PublicKeyLoader::load($key);
+ $m = new BigInteger($key->n, 256);
+ $e = new BigInteger($key->e, 256);
+
+
+/* $rsa = new RSA();
+ $rsa->loadKey($key);
+ $rsa->setPublicKey();
+
+ $modulus = $rsa->modulus->toBytes();
+ $exponent = $rsa->exponent->toBytes();
+
+
+
$lines = explode("\n",$key);
unset($lines[0]);
unset($lines[count($lines)]);
@@ -424,14 +468,23 @@ function pemtome($key,&$m,&$e) {
$r = ASN_BASE::parseASNString($x);
$m = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[0]->asnData);
- $e = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[1]->asnData);
+ $e = base64url_decode($r[0]->asnData[1]->asnData[0]->asnData[1]->asnData);*/
}
function metorsa($m,$e) {
- $der = pkcs1_encode($m,$e);
+
+ $key = PublicKeyLoader::load([
+ 'e' => new BigInteger($e, 256),
+ 'n' => new BigInteger($m, 256)
+ ]);
+ hz_syslog('metorsa: ' . $key->toString('PKCS8'));
+
+ return $key->toString('PKCS8');
+
+/* $der = pkcs1_encode($m,$e);
$key = DerToRsa($der);
- return $key;
-}
+ return $key;*/
+}
diff --git a/vendor/composer/ClassLoader.php b/vendor/composer/ClassLoader.php
index 1a58957d2..4d989a212 100644
--- a/vendor/composer/ClassLoader.php
+++ b/vendor/composer/ClassLoader.php
@@ -42,6 +42,8 @@ namespace Composer\Autoload;
*/
class ClassLoader
{
+ private $vendorDir;
+
// PSR-4
private $prefixLengthsPsr4 = array();
private $prefixDirsPsr4 = array();
@@ -57,6 +59,13 @@ class ClassLoader
private $missingClasses = array();
private $apcuPrefix;
+ private static $registeredLoaders = array();
+
+ public function __construct($vendorDir = null)
+ {
+ $this->vendorDir = $vendorDir;
+ }
+
public function getPrefixes()
{
if (!empty($this->prefixesPsr0)) {
@@ -300,6 +309,15 @@ class ClassLoader
public function register($prepend = false)
{
spl_autoload_register(array($this, 'loadClass'), true, $prepend);
+
+ if (null === $this->vendorDir) {
+ //no-op
+ } elseif ($prepend) {
+ self::$registeredLoaders = array($this->vendorDir => $this) + self::$registeredLoaders;
+ } else {
+ unset(self::$registeredLoaders[$this->vendorDir]);
+ self::$registeredLoaders[$this->vendorDir] = $this;
+ }
}
/**
@@ -308,6 +326,10 @@ class ClassLoader
public function unregister()
{
spl_autoload_unregister(array($this, 'loadClass'));
+
+ if (null !== $this->vendorDir) {
+ unset(self::$registeredLoaders[$this->vendorDir]);
+ }
}
/**
@@ -367,6 +389,16 @@ class ClassLoader
return $file;
}
+ /**
+ * Returns the currently registered loaders indexed by their corresponding vendor directories.
+ *
+ * @return self[]
+ */
+ public static function getRegisteredLoaders()
+ {
+ return self::$registeredLoaders;
+ }
+
private function findFileWithExtension($class, $ext)
{
// PSR-4 lookup
diff --git a/vendor/composer/InstalledVersions.php b/vendor/composer/InstalledVersions.php
index d46574ac8..97df88926 100644
--- a/vendor/composer/InstalledVersions.php
+++ b/vendor/composer/InstalledVersions.php
@@ -12,6 +12,7 @@
namespace Composer;
+use Composer\Autoload\ClassLoader;
use Composer\Semver\VersionParser;
@@ -24,12 +25,12 @@ class InstalledVersions
private static $installed = array (
'root' =>
array (
- 'pretty_version' => 'dev-master',
- 'version' => 'dev-master',
+ 'pretty_version' => 'dev-5.2RC',
+ 'version' => 'dev-5.2RC',
'aliases' =>
array (
),
- 'reference' => '08c9152abdfa90da09931bdcc6e6c81ea243434c',
+ 'reference' => '34b28cd8d36c7805e65c442ff1588ccf5165387a',
'name' => 'zotlabs/hubzilla',
),
'versions' =>
@@ -115,24 +116,6 @@ private static $installed = array (
),
'reference' => 'c83178d49e372ca967d1a8c77ae4e051b3a3c75c',
),
- 'paragonie/constant_time_encoding' =>
- array (
- 'pretty_version' => 'v2.4.0',
- 'version' => '2.4.0.0',
- 'aliases' =>
- array (
- ),
- 'reference' => 'f34c2b11eb9d2c9318e13540a1dbc2a3afbd939c',
- ),
- 'paragonie/random_compat' =>
- array (
- 'pretty_version' => 'v9.99.100',
- 'version' => '9.99.100.0',
- 'aliases' =>
- array (
- ),
- 'reference' => '996434e5492cb4c3edcb9168db6fbb1359ef965a',
- ),
'pear/text_languagedetect' =>
array (
'pretty_version' => 'v1.0.1',
@@ -144,12 +127,12 @@ private static $installed = array (
),
'phpseclib/phpseclib' =>
array (
- 'pretty_version' => '3.0.4',
- 'version' => '3.0.4.0',
+ 'pretty_version' => '2.0.30',
+ 'version' => '2.0.30.0',
'aliases' =>
array (
),
- 'reference' => '845a2275e886ba9fb386c8f59cb383dd9c8963e9',
+ 'reference' => '136b9ca7eebef78be14abf90d65c5e57b6bc5d36',
),
'psr/log' =>
array (
@@ -284,15 +267,17 @@ private static $installed = array (
),
'zotlabs/hubzilla' =>
array (
- 'pretty_version' => 'dev-master',
- 'version' => 'dev-master',
+ 'pretty_version' => 'dev-5.2RC',
+ 'version' => 'dev-5.2RC',
'aliases' =>
array (
),
- 'reference' => '08c9152abdfa90da09931bdcc6e6c81ea243434c',
+ 'reference' => '34b28cd8d36c7805e65c442ff1588ccf5165387a',
),
),
);
+private static $canGetVendors;
+private static $installedByVendor = array();
@@ -302,7 +287,17 @@ private static $installed = array (
public static function getInstalledPackages()
{
-return array_keys(self::$installed['versions']);
+$packages = array();
+foreach (self::getInstalled() as $installed) {
+$packages[] = array_keys($installed['versions']);
+}
+
+
+if (1 === \count($packages)) {
+return $packages[0];
+}
+
+return array_keys(array_flip(\call_user_func_array('array_merge', $packages)));
}
@@ -315,7 +310,13 @@ return array_keys(self::$installed['versions']);
public static function isInstalled($packageName)
{
-return isset(self::$installed['versions'][$packageName]);
+foreach (self::getInstalled() as $installed) {
+if (isset($installed['versions'][$packageName])) {
+return true;
+}
+}
+
+return false;
}
@@ -350,42 +351,50 @@ return $provided->matches($constraint);
public static function getVersionRanges($packageName)
{
-if (!isset(self::$installed['versions'][$packageName])) {
-throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+foreach (self::getInstalled() as $installed) {
+if (!isset($installed['versions'][$packageName])) {
+continue;
}
$ranges = array();
-if (isset(self::$installed['versions'][$packageName]['pretty_version'])) {
-$ranges[] = self::$installed['versions'][$packageName]['pretty_version'];
+if (isset($installed['versions'][$packageName]['pretty_version'])) {
+$ranges[] = $installed['versions'][$packageName]['pretty_version'];
}
-if (array_key_exists('aliases', self::$installed['versions'][$packageName])) {
-$ranges = array_merge($ranges, self::$installed['versions'][$packageName]['aliases']);
+if (array_key_exists('aliases', $installed['versions'][$packageName])) {
+$ranges = array_merge($ranges, $installed['versions'][$packageName]['aliases']);
}
-if (array_key_exists('replaced', self::$installed['versions'][$packageName])) {
-$ranges = array_merge($ranges, self::$installed['versions'][$packageName]['replaced']);
+if (array_key_exists('replaced', $installed['versions'][$packageName])) {
+$ranges = array_merge($ranges, $installed['versions'][$packageName]['replaced']);
}
-if (array_key_exists('provided', self::$installed['versions'][$packageName])) {
-$ranges = array_merge($ranges, self::$installed['versions'][$packageName]['provided']);
+if (array_key_exists('provided', $installed['versions'][$packageName])) {
+$ranges = array_merge($ranges, $installed['versions'][$packageName]['provided']);
}
return implode(' || ', $ranges);
}
+throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+}
+
public static function getVersion($packageName)
{
-if (!isset(self::$installed['versions'][$packageName])) {
-throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+foreach (self::getInstalled() as $installed) {
+if (!isset($installed['versions'][$packageName])) {
+continue;
}
-if (!isset(self::$installed['versions'][$packageName]['version'])) {
+if (!isset($installed['versions'][$packageName]['version'])) {
return null;
}
-return self::$installed['versions'][$packageName]['version'];
+return $installed['versions'][$packageName]['version'];
+}
+
+throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
}
@@ -394,15 +403,19 @@ return self::$installed['versions'][$packageName]['version'];
public static function getPrettyVersion($packageName)
{
-if (!isset(self::$installed['versions'][$packageName])) {
-throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+foreach (self::getInstalled() as $installed) {
+if (!isset($installed['versions'][$packageName])) {
+continue;
}
-if (!isset(self::$installed['versions'][$packageName]['pretty_version'])) {
+if (!isset($installed['versions'][$packageName]['pretty_version'])) {
return null;
}
-return self::$installed['versions'][$packageName]['pretty_version'];
+return $installed['versions'][$packageName]['pretty_version'];
+}
+
+throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
}
@@ -411,15 +424,19 @@ return self::$installed['versions'][$packageName]['pretty_version'];
public static function getReference($packageName)
{
-if (!isset(self::$installed['versions'][$packageName])) {
-throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
+foreach (self::getInstalled() as $installed) {
+if (!isset($installed['versions'][$packageName])) {
+continue;
}
-if (!isset(self::$installed['versions'][$packageName]['reference'])) {
+if (!isset($installed['versions'][$packageName]['reference'])) {
return null;
}
-return self::$installed['versions'][$packageName]['reference'];
+return $installed['versions'][$packageName]['reference'];
+}
+
+throw new \OutOfBoundsException('Package "' . $packageName . '" is not installed');
}
@@ -428,7 +445,9 @@ return self::$installed['versions'][$packageName]['reference'];
public static function getRootPackage()
{
-return self::$installed['root'];
+$installed = self::getInstalled();
+
+return $installed[0]['root'];
}
@@ -463,5 +482,33 @@ return self::$installed;
public static function reload($data)
{
self::$installed = $data;
+self::$installedByVendor = array();
+}
+
+
+
+
+private static function getInstalled()
+{
+if (null === self::$canGetVendors) {
+self::$canGetVendors = method_exists('Composer\Autoload\ClassLoader', 'getRegisteredLoaders');
+}
+
+$installed = array();
+
+if (self::$canGetVendors) {
+
+foreach (ClassLoader::getRegisteredLoaders() as $vendorDir => $loader) {
+if (isset(self::$installedByVendor[$vendorDir])) {
+$installed[] = self::$installedByVendor[$vendorDir];
+} elseif (is_file($vendorDir.'/composer/installed.php')) {
+$installed[] = self::$installedByVendor[$vendorDir] = require $vendorDir.'/composer/installed.php';
+}
+}
+}
+
+$installed[] = self::$installed;
+
+return $installed;
}
}
diff --git a/vendor/composer/autoload_classmap.php b/vendor/composer/autoload_classmap.php
index 1eef57c4a..da2dfa8f4 100644
--- a/vendor/composer/autoload_classmap.php
+++ b/vendor/composer/autoload_classmap.php
@@ -376,17 +376,6 @@ return array(
'OAuth2\\TokenType\\Bearer' => $vendorDir . '/bshaffer/oauth2-server-php/src/OAuth2/TokenType/Bearer.php',
'OAuth2\\TokenType\\Mac' => $vendorDir . '/bshaffer/oauth2-server-php/src/OAuth2/TokenType/Mac.php',
'OAuth2\\TokenType\\TokenTypeInterface' => $vendorDir . '/bshaffer/oauth2-server-php/src/OAuth2/TokenType/TokenTypeInterface.php',
- 'ParagonIE\\ConstantTime\\Base32' => $vendorDir . '/paragonie/constant_time_encoding/src/Base32.php',
- 'ParagonIE\\ConstantTime\\Base32Hex' => $vendorDir . '/paragonie/constant_time_encoding/src/Base32Hex.php',
- 'ParagonIE\\ConstantTime\\Base64' => $vendorDir . '/paragonie/constant_time_encoding/src/Base64.php',
- 'ParagonIE\\ConstantTime\\Base64DotSlash' => $vendorDir . '/paragonie/constant_time_encoding/src/Base64DotSlash.php',
- 'ParagonIE\\ConstantTime\\Base64DotSlashOrdered' => $vendorDir . '/paragonie/constant_time_encoding/src/Base64DotSlashOrdered.php',
- 'ParagonIE\\ConstantTime\\Base64UrlSafe' => $vendorDir . '/paragonie/constant_time_encoding/src/Base64UrlSafe.php',
- 'ParagonIE\\ConstantTime\\Binary' => $vendorDir . '/paragonie/constant_time_encoding/src/Binary.php',
- 'ParagonIE\\ConstantTime\\EncoderInterface' => $vendorDir . '/paragonie/constant_time_encoding/src/EncoderInterface.php',
- 'ParagonIE\\ConstantTime\\Encoding' => $vendorDir . '/paragonie/constant_time_encoding/src/Encoding.php',
- 'ParagonIE\\ConstantTime\\Hex' => $vendorDir . '/paragonie/constant_time_encoding/src/Hex.php',
- 'ParagonIE\\ConstantTime\\RFC4648' => $vendorDir . '/paragonie/constant_time_encoding/src/RFC4648.php',
'Psr\\Log\\AbstractLogger' => $vendorDir . '/psr/log/Psr/Log/AbstractLogger.php',
'Psr\\Log\\InvalidArgumentException' => $vendorDir . '/psr/log/Psr/Log/InvalidArgumentException.php',
'Psr\\Log\\LogLevel' => $vendorDir . '/psr/log/Psr/Log/LogLevel.php',
@@ -395,9 +384,6 @@ return array(
'Psr\\Log\\LoggerInterface' => $vendorDir . '/psr/log/Psr/Log/LoggerInterface.php',
'Psr\\Log\\LoggerTrait' => $vendorDir . '/psr/log/Psr/Log/LoggerTrait.php',
'Psr\\Log\\NullLogger' => $vendorDir . '/psr/log/Psr/Log/NullLogger.php',
- 'Psr\\Log\\Test\\DummyTest' => $vendorDir . '/psr/log/Psr/Log/Test/DummyTest.php',
- 'Psr\\Log\\Test\\LoggerInterfaceTest' => $vendorDir . '/psr/log/Psr/Log/Test/LoggerInterfaceTest.php',
- 'Psr\\Log\\Test\\TestLogger' => $vendorDir . '/psr/log/Psr/Log/Test/TestLogger.php',
'Ramsey\\Collection\\AbstractArray' => $vendorDir . '/ramsey/collection/src/AbstractArray.php',
'Ramsey\\Collection\\AbstractCollection' => $vendorDir . '/ramsey/collection/src/AbstractCollection.php',
'Ramsey\\Collection\\AbstractSet' => $vendorDir . '/ramsey/collection/src/AbstractSet.php',
@@ -1146,6 +1132,7 @@ return array(
'Zotlabs\\Lib\\IConfig' => $baseDir . '/Zotlabs/Lib/IConfig.php',
'Zotlabs\\Lib\\Img_filesize' => $baseDir . '/Zotlabs/Lib/Img_filesize.php',
'Zotlabs\\Lib\\JSalmon' => $baseDir . '/Zotlabs/Lib/JSalmon.php',
+ 'Zotlabs\\Lib\\Keyutils' => $baseDir . '/Zotlabs/Lib/Keyutils.php',
'Zotlabs\\Lib\\LDSignatures' => $baseDir . '/Zotlabs/Lib/LDSignatures.php',
'Zotlabs\\Lib\\Libsync' => $baseDir . '/Zotlabs/Lib/Libsync.php',
'Zotlabs\\Lib\\Libzot' => $baseDir . '/Zotlabs/Lib/Libzot.php',
@@ -1744,333 +1731,28 @@ return array(
'Zotlabs\\Zot\\IHandler' => $baseDir . '/Zotlabs/Zot/IHandler.php',
'Zotlabs\\Zot\\Receiver' => $baseDir . '/Zotlabs/Zot/Receiver.php',
'Zotlabs\\Zot\\ZotHandler' => $baseDir . '/Zotlabs/Zot/ZotHandler.php',
- 'phpseclib3\\Common\\Functions\\Strings' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Common/Functions/Strings.php',
- 'phpseclib3\\Crypt\\AES' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/AES.php',
- 'phpseclib3\\Crypt\\Blowfish' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php',
- 'phpseclib3\\Crypt\\ChaCha20' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/ChaCha20.php',
- 'phpseclib3\\Crypt\\Common\\AsymmetricKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/AsymmetricKey.php',
- 'phpseclib3\\Crypt\\Common\\BlockCipher' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/BlockCipher.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\OpenSSH' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/OpenSSH.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\PKCS' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\PKCS1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\PKCS8' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\PuTTY' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PuTTY.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Signature\\Raw' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Signature/Raw.php',
- 'phpseclib3\\Crypt\\Common\\PrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/PrivateKey.php',
- 'phpseclib3\\Crypt\\Common\\PublicKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/PublicKey.php',
- 'phpseclib3\\Crypt\\Common\\StreamCipher' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/StreamCipher.php',
- 'phpseclib3\\Crypt\\Common\\SymmetricKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/SymmetricKey.php',
- 'phpseclib3\\Crypt\\Common\\Traits\\Fingerprint' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/Fingerprint.php',
- 'phpseclib3\\Crypt\\Common\\Traits\\PasswordProtected' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/PasswordProtected.php',
- 'phpseclib3\\Crypt\\DES' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DES.php',
- 'phpseclib3\\Crypt\\DH' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DH.php',
- 'phpseclib3\\Crypt\\DH\\Formats\\Keys\\PKCS1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\DH\\Formats\\Keys\\PKCS8' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\DH\\Parameters' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DH/Parameters.php',
- 'phpseclib3\\Crypt\\DH\\PrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DH/PrivateKey.php',
- 'phpseclib3\\Crypt\\DH\\PublicKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DH/PublicKey.php',
- 'phpseclib3\\Crypt\\DSA' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\OpenSSH' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/OpenSSH.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\PKCS1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\PKCS8' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\PuTTY' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PuTTY.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\Raw' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/Raw.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\XML' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/XML.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Signature\\ASN1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/ASN1.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Signature\\Raw' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/Raw.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Signature\\SSH2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/SSH2.php',
- 'phpseclib3\\Crypt\\DSA\\Parameters' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Parameters.php',
- 'phpseclib3\\Crypt\\DSA\\PrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/PrivateKey.php',
- 'phpseclib3\\Crypt\\DSA\\PublicKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/PublicKey.php',
- 'phpseclib3\\Crypt\\EC' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\Base' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Base.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\Binary' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Binary.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\KoblitzPrime' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/KoblitzPrime.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\Montgomery' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Montgomery.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\Prime' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Prime.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\TwistedEdwards' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/TwistedEdwards.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\Curve25519' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve25519.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\Curve448' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve448.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\Ed25519' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed25519.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\Ed448' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed448.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP160r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP160t1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP192r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP192t1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP224r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP224t1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP256r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP256t1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP320r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP320t1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP384r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP384t1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP512r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP512t1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistb233' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb233.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistb409' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb409.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistk163' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk163.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistk233' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk233.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistk283' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk283.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistk409' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk409.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp192' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp192.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp224' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp224.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp256' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp256.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp384' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp384.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp521' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp521.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistt571' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistt571.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime192v1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime192v2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime192v3' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v3.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime239v1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime239v2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime239v3' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v3.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime256v1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime256v1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp112r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp112r2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp128r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp128r2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp160k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp160r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp160r2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp192k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp192r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp224k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp224r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp256k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp256r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp384r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp384r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp521r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp521r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect113r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect113r2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect131r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect131r2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect163k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect163r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect163r2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect193r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect193r2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect233k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect233r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect239k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect239k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect283k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect283r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect409k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect409r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect571k1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect571r1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\Common' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/Common.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\MontgomeryPrivate' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPrivate.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\MontgomeryPublic' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPublic.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\OpenSSH' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/OpenSSH.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\PKCS1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\PKCS8' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\PuTTY' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PuTTY.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\XML' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/XML.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\libsodium' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/libsodium.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Signature\\ASN1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/ASN1.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Signature\\Raw' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/Raw.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Signature\\SSH2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/SSH2.php',
- 'phpseclib3\\Crypt\\EC\\Parameters' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Parameters.php',
- 'phpseclib3\\Crypt\\EC\\PrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/PrivateKey.php',
- 'phpseclib3\\Crypt\\EC\\PublicKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/EC/PublicKey.php',
- 'phpseclib3\\Crypt\\Hash' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Hash.php',
- 'phpseclib3\\Crypt\\PublicKeyLoader' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/PublicKeyLoader.php',
- 'phpseclib3\\Crypt\\RC2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RC2.php',
- 'phpseclib3\\Crypt\\RC4' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RC4.php',
- 'phpseclib3\\Crypt\\RSA' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\MSBLOB' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/MSBLOB.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\OpenSSH' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/OpenSSH.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\PKCS1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\PKCS8' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\PSS' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PSS.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\PuTTY' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PuTTY.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\Raw' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/Raw.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\XML' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/XML.php',
- 'phpseclib3\\Crypt\\RSA\\PrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/PrivateKey.php',
- 'phpseclib3\\Crypt\\RSA\\PublicKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/PublicKey.php',
- 'phpseclib3\\Crypt\\Random' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Random.php',
- 'phpseclib3\\Crypt\\Rijndael' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php',
- 'phpseclib3\\Crypt\\Salsa20' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Salsa20.php',
- 'phpseclib3\\Crypt\\TripleDES' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php',
- 'phpseclib3\\Crypt\\Twofish' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php',
- 'phpseclib3\\Exception\\BadConfigurationException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/BadConfigurationException.php',
- 'phpseclib3\\Exception\\BadDecryptionException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/BadDecryptionException.php',
- 'phpseclib3\\Exception\\BadModeException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/BadModeException.php',
- 'phpseclib3\\Exception\\ConnectionClosedException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/ConnectionClosedException.php',
- 'phpseclib3\\Exception\\FileNotFoundException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/FileNotFoundException.php',
- 'phpseclib3\\Exception\\InconsistentSetupException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/InconsistentSetupException.php',
- 'phpseclib3\\Exception\\InsufficientSetupException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/InsufficientSetupException.php',
- 'phpseclib3\\Exception\\NoKeyLoadedException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/NoKeyLoadedException.php',
- 'phpseclib3\\Exception\\NoSupportedAlgorithmsException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/NoSupportedAlgorithmsException.php',
- 'phpseclib3\\Exception\\UnableToConnectException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/UnableToConnectException.php',
- 'phpseclib3\\Exception\\UnsupportedAlgorithmException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/UnsupportedAlgorithmException.php',
- 'phpseclib3\\Exception\\UnsupportedCurveException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/UnsupportedCurveException.php',
- 'phpseclib3\\Exception\\UnsupportedFormatException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/UnsupportedFormatException.php',
- 'phpseclib3\\Exception\\UnsupportedOperationException' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Exception/UnsupportedOperationException.php',
- 'phpseclib3\\File\\ANSI' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ANSI.php',
- 'phpseclib3\\File\\ASN1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1.php',
- 'phpseclib3\\File\\ASN1\\Element' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AccessDescription' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AccessDescription.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AdministrationDomainName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AdministrationDomainName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AlgorithmIdentifier' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AlgorithmIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AnotherName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AnotherName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Attribute' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attribute.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AttributeType' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeType.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AttributeTypeAndValue' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeTypeAndValue.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AttributeValue' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeValue.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Attributes' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AuthorityInfoAccessSyntax' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityInfoAccessSyntax.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AuthorityKeyIdentifier' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityKeyIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BaseDistance' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BaseDistance.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BasicConstraints' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BasicConstraints.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BuiltInDomainDefinedAttribute' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttribute.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BuiltInDomainDefinedAttributes' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BuiltInStandardAttributes' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInStandardAttributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CPSuri' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CPSuri.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CRLDistributionPoints' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLDistributionPoints.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CRLNumber' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLNumber.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CRLReason' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLReason.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertPolicyId' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertPolicyId.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Certificate' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Certificate.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificateIssuer' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateIssuer.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificateList' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateList.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificatePolicies' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificatePolicies.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificateSerialNumber' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateSerialNumber.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificationRequest' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequest.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificationRequestInfo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequestInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Characteristic_two' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Characteristic_two.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CountryName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CountryName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Curve' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Curve.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DHParameter' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DHParameter.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DSAParams' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAParams.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DSAPrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPrivateKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DSAPublicKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPublicKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DigestInfo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DigestInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DirectoryString' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DirectoryString.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DisplayText' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DisplayText.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DistributionPoint' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPoint.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DistributionPointName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPointName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DssSigValue' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DssSigValue.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ECParameters' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECParameters.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ECPoint' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPoint.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ECPrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPrivateKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\EDIPartyName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EDIPartyName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\EcdsaSigValue' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EcdsaSigValue.php',
- 'phpseclib3\\File\\ASN1\\Maps\\EncryptedData' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedData.php',
- 'phpseclib3\\File\\ASN1\\Maps\\EncryptedPrivateKeyInfo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedPrivateKeyInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ExtKeyUsageSyntax' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtKeyUsageSyntax.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Extension' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extension.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ExtensionAttribute' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttribute.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ExtensionAttributes' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Extensions' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extensions.php',
- 'phpseclib3\\File\\ASN1\\Maps\\FieldElement' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldElement.php',
- 'phpseclib3\\File\\ASN1\\Maps\\FieldID' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldID.php',
- 'phpseclib3\\File\\ASN1\\Maps\\GeneralName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\GeneralNames' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralNames.php',
- 'phpseclib3\\File\\ASN1\\Maps\\GeneralSubtree' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtree.php',
- 'phpseclib3\\File\\ASN1\\Maps\\GeneralSubtrees' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtrees.php',
- 'phpseclib3\\File\\ASN1\\Maps\\HashAlgorithm' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HashAlgorithm.php',
- 'phpseclib3\\File\\ASN1\\Maps\\HoldInstructionCode' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HoldInstructionCode.php',
- 'phpseclib3\\File\\ASN1\\Maps\\InvalidityDate' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/InvalidityDate.php',
- 'phpseclib3\\File\\ASN1\\Maps\\IssuerAltName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuerAltName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\IssuingDistributionPoint' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuingDistributionPoint.php',
- 'phpseclib3\\File\\ASN1\\Maps\\KeyIdentifier' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\KeyPurposeId' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyPurposeId.php',
- 'phpseclib3\\File\\ASN1\\Maps\\KeyUsage' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyUsage.php',
- 'phpseclib3\\File\\ASN1\\Maps\\MaskGenAlgorithm' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/MaskGenAlgorithm.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Name' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Name.php',
- 'phpseclib3\\File\\ASN1\\Maps\\NameConstraints' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NameConstraints.php',
- 'phpseclib3\\File\\ASN1\\Maps\\NetworkAddress' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NetworkAddress.php',
- 'phpseclib3\\File\\ASN1\\Maps\\NoticeReference' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NoticeReference.php',
- 'phpseclib3\\File\\ASN1\\Maps\\NumericUserIdentifier' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NumericUserIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ORAddress' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ORAddress.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OneAsymmetricKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OneAsymmetricKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OrganizationName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OrganizationalUnitNames' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationalUnitNames.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OtherPrimeInfo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OtherPrimeInfos' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfos.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PBEParameter' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBEParameter.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PBES2params' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBES2params.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PBKDF2params' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBKDF2params.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PBMAC1params' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBMAC1params.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PKCS9String' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PKCS9String.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Pentanomial' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Pentanomial.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PersonalName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PersonalName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PolicyInformation' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyInformation.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PolicyMappings' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyMappings.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PolicyQualifierId' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierId.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PolicyQualifierInfo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PostalAddress' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PostalAddress.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Prime_p' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Prime_p.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PrivateDomainName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateDomainName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PrivateKeyInfo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PrivateKeyUsagePeriod' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyUsagePeriod.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PublicKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PublicKeyAndChallenge' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyAndChallenge.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PublicKeyInfo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RC2CBCParameter' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RC2CBCParameter.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RDNSequence' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RDNSequence.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RSAPrivateKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPrivateKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RSAPublicKey' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPublicKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RSASSA_PSS_params' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSASSA_PSS_params.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ReasonFlags' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ReasonFlags.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RelativeDistinguishedName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RelativeDistinguishedName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RevokedCertificate' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RevokedCertificate.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SignedPublicKeyAndChallenge' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SignedPublicKeyAndChallenge.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SpecifiedECDomain' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SpecifiedECDomain.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SubjectAltName' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectAltName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SubjectDirectoryAttributes' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectDirectoryAttributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SubjectInfoAccessSyntax' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectInfoAccessSyntax.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SubjectPublicKeyInfo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectPublicKeyInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\TBSCertList' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertList.php',
- 'phpseclib3\\File\\ASN1\\Maps\\TBSCertificate' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertificate.php',
- 'phpseclib3\\File\\ASN1\\Maps\\TerminalIdentifier' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TerminalIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Time' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Time.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Trinomial' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Trinomial.php',
- 'phpseclib3\\File\\ASN1\\Maps\\UniqueIdentifier' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UniqueIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\UserNotice' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UserNotice.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Validity' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Validity.php',
- 'phpseclib3\\File\\ASN1\\Maps\\netscape_ca_policy_url' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_ca_policy_url.php',
- 'phpseclib3\\File\\ASN1\\Maps\\netscape_cert_type' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_cert_type.php',
- 'phpseclib3\\File\\ASN1\\Maps\\netscape_comment' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_comment.php',
- 'phpseclib3\\File\\X509' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/X509.php',
- 'phpseclib3\\Math\\BigInteger' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\Base' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Base.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\BuiltIn' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/BuiltIn.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\DefaultEngine' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/DefaultEngine.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\OpenSSL' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/OpenSSL.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\Reductions\\Barrett' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/Barrett.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\Reductions\\EvalBarrett' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/EvalBarrett.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\Engine' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/Engine.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\GMP' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\GMP\\DefaultEngine' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP/DefaultEngine.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\OpenSSL' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/OpenSSL.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP32' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP32.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP64' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP64.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Base' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Base.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\DefaultEngine' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/DefaultEngine.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Montgomery' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Montgomery.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\OpenSSL' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/OpenSSL.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\Barrett' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Barrett.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\Classic' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Classic.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\EvalBarrett' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/EvalBarrett.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\Montgomery' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Montgomery.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\MontgomeryMult' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/MontgomeryMult.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\PowerOfTwo' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/PowerOfTwo.php',
- 'phpseclib3\\Math\\BinaryField' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BinaryField.php',
- 'phpseclib3\\Math\\BinaryField\\Integer' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BinaryField/Integer.php',
- 'phpseclib3\\Math\\Common\\FiniteField' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField.php',
- 'phpseclib3\\Math\\Common\\FiniteField\\Integer' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField/Integer.php',
- 'phpseclib3\\Math\\PrimeField' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/PrimeField.php',
- 'phpseclib3\\Math\\PrimeField\\Integer' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/PrimeField/Integer.php',
- 'phpseclib3\\Net\\SFTP' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Net/SFTP.php',
- 'phpseclib3\\Net\\SFTP\\Stream' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php',
- 'phpseclib3\\Net\\SSH2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Net/SSH2.php',
- 'phpseclib3\\System\\SSH\\Agent' => $vendorDir . '/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php',
- 'phpseclib3\\System\\SSH\\Agent\\Identity' => $vendorDir . '/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php',
- 'phpseclib3\\System\\SSH\\Common\\Traits\\ReadBytes' => $vendorDir . '/phpseclib/phpseclib/phpseclib/System/SSH/Common/Traits/ReadBytes.php',
+ 'phpseclib\\Crypt\\AES' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/AES.php',
+ 'phpseclib\\Crypt\\Base' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Base.php',
+ 'phpseclib\\Crypt\\Blowfish' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php',
+ 'phpseclib\\Crypt\\DES' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/DES.php',
+ 'phpseclib\\Crypt\\Hash' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Hash.php',
+ 'phpseclib\\Crypt\\RC2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RC2.php',
+ 'phpseclib\\Crypt\\RC4' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RC4.php',
+ 'phpseclib\\Crypt\\RSA' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/RSA.php',
+ 'phpseclib\\Crypt\\Random' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Random.php',
+ 'phpseclib\\Crypt\\Rijndael' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php',
+ 'phpseclib\\Crypt\\TripleDES' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php',
+ 'phpseclib\\Crypt\\Twofish' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php',
+ 'phpseclib\\File\\ANSI' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ANSI.php',
+ 'phpseclib\\File\\ASN1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1.php',
+ 'phpseclib\\File\\ASN1\\Element' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php',
+ 'phpseclib\\File\\X509' => $vendorDir . '/phpseclib/phpseclib/phpseclib/File/X509.php',
+ 'phpseclib\\Math\\BigInteger' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Math/BigInteger.php',
+ 'phpseclib\\Net\\SCP' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Net/SCP.php',
+ 'phpseclib\\Net\\SFTP' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Net/SFTP.php',
+ 'phpseclib\\Net\\SFTP\\Stream' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php',
+ 'phpseclib\\Net\\SSH1' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Net/SSH1.php',
+ 'phpseclib\\Net\\SSH2' => $vendorDir . '/phpseclib/phpseclib/phpseclib/Net/SSH2.php',
+ 'phpseclib\\System\\SSH\\Agent' => $vendorDir . '/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php',
+ 'phpseclib\\System\\SSH\\Agent\\Identity' => $vendorDir . '/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php',
);
diff --git a/vendor/composer/autoload_psr4.php b/vendor/composer/autoload_psr4.php
index 973842971..b6a4c826f 100644
--- a/vendor/composer/autoload_psr4.php
+++ b/vendor/composer/autoload_psr4.php
@@ -6,7 +6,7 @@ $vendorDir = dirname(dirname(__FILE__));
$baseDir = dirname($vendorDir);
return array(
- 'phpseclib3\\' => array($vendorDir . '/phpseclib/phpseclib/phpseclib'),
+ 'phpseclib\\' => array($vendorDir . '/phpseclib/phpseclib/phpseclib'),
'Zotlabs\\' => array($baseDir . '/Zotlabs'),
'Symfony\\Polyfill\\Ctype\\' => array($vendorDir . '/symfony/polyfill-ctype'),
'Sabre\\Xml\\' => array($vendorDir . '/sabre/xml/lib'),
@@ -21,7 +21,6 @@ return array(
'Ramsey\\Uuid\\' => array($vendorDir . '/ramsey/uuid/src'),
'Ramsey\\Collection\\' => array($vendorDir . '/ramsey/collection/src'),
'Psr\\Log\\' => array($vendorDir . '/psr/log/Psr/Log'),
- 'ParagonIE\\ConstantTime\\' => array($vendorDir . '/paragonie/constant_time_encoding/src'),
'Michelf\\' => array($vendorDir . '/michelf/php-markdown/Michelf'),
'League\\HTMLToMarkdown\\' => array($vendorDir . '/league/html-to-markdown/src'),
'ID3Parser\\' => array($vendorDir . '/lukasreschke/id3parser/src'),
diff --git a/vendor/composer/autoload_real.php b/vendor/composer/autoload_real.php
index 264e26beb..fbfac821c 100644
--- a/vendor/composer/autoload_real.php
+++ b/vendor/composer/autoload_real.php
@@ -25,7 +25,7 @@ class ComposerAutoloaderInit7b34d7e50a62201ec5d5e526a5b8b35d
require __DIR__ . '/platform_check.php';
spl_autoload_register(array('ComposerAutoloaderInit7b34d7e50a62201ec5d5e526a5b8b35d', 'loadClassLoader'), true, true);
- self::$loader = $loader = new \Composer\Autoload\ClassLoader();
+ self::$loader = $loader = new \Composer\Autoload\ClassLoader(\dirname(\dirname(__FILE__)));
spl_autoload_unregister(array('ComposerAutoloaderInit7b34d7e50a62201ec5d5e526a5b8b35d', 'loadClassLoader'));
$includePaths = require __DIR__ . '/include_paths.php';
diff --git a/vendor/composer/autoload_static.php b/vendor/composer/autoload_static.php
index eb0766ee9..5abdb7dce 100644
--- a/vendor/composer/autoload_static.php
+++ b/vendor/composer/autoload_static.php
@@ -23,7 +23,7 @@ class ComposerStaticInit7b34d7e50a62201ec5d5e526a5b8b35d
public static $prefixLengthsPsr4 = array (
'p' =>
array (
- 'phpseclib3\\' => 11,
+ 'phpseclib\\' => 10,
),
'Z' =>
array (
@@ -50,7 +50,6 @@ class ComposerStaticInit7b34d7e50a62201ec5d5e526a5b8b35d
'P' =>
array (
'Psr\\Log\\' => 8,
- 'ParagonIE\\ConstantTime\\' => 23,
),
'M' =>
array (
@@ -79,7 +78,7 @@ class ComposerStaticInit7b34d7e50a62201ec5d5e526a5b8b35d
);
public static $prefixDirsPsr4 = array (
- 'phpseclib3\\' =>
+ 'phpseclib\\' =>
array (
0 => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib',
),
@@ -139,10 +138,6 @@ class ComposerStaticInit7b34d7e50a62201ec5d5e526a5b8b35d
array (
0 => __DIR__ . '/..' . '/psr/log/Psr/Log',
),
- 'ParagonIE\\ConstantTime\\' =>
- array (
- 0 => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src',
- ),
'Michelf\\' =>
array (
0 => __DIR__ . '/..' . '/michelf/php-markdown/Michelf',
@@ -571,17 +566,6 @@ class ComposerStaticInit7b34d7e50a62201ec5d5e526a5b8b35d
'OAuth2\\TokenType\\Bearer' => __DIR__ . '/..' . '/bshaffer/oauth2-server-php/src/OAuth2/TokenType/Bearer.php',
'OAuth2\\TokenType\\Mac' => __DIR__ . '/..' . '/bshaffer/oauth2-server-php/src/OAuth2/TokenType/Mac.php',
'OAuth2\\TokenType\\TokenTypeInterface' => __DIR__ . '/..' . '/bshaffer/oauth2-server-php/src/OAuth2/TokenType/TokenTypeInterface.php',
- 'ParagonIE\\ConstantTime\\Base32' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Base32.php',
- 'ParagonIE\\ConstantTime\\Base32Hex' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Base32Hex.php',
- 'ParagonIE\\ConstantTime\\Base64' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Base64.php',
- 'ParagonIE\\ConstantTime\\Base64DotSlash' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Base64DotSlash.php',
- 'ParagonIE\\ConstantTime\\Base64DotSlashOrdered' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Base64DotSlashOrdered.php',
- 'ParagonIE\\ConstantTime\\Base64UrlSafe' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Base64UrlSafe.php',
- 'ParagonIE\\ConstantTime\\Binary' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Binary.php',
- 'ParagonIE\\ConstantTime\\EncoderInterface' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/EncoderInterface.php',
- 'ParagonIE\\ConstantTime\\Encoding' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Encoding.php',
- 'ParagonIE\\ConstantTime\\Hex' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/Hex.php',
- 'ParagonIE\\ConstantTime\\RFC4648' => __DIR__ . '/..' . '/paragonie/constant_time_encoding/src/RFC4648.php',
'Psr\\Log\\AbstractLogger' => __DIR__ . '/..' . '/psr/log/Psr/Log/AbstractLogger.php',
'Psr\\Log\\InvalidArgumentException' => __DIR__ . '/..' . '/psr/log/Psr/Log/InvalidArgumentException.php',
'Psr\\Log\\LogLevel' => __DIR__ . '/..' . '/psr/log/Psr/Log/LogLevel.php',
@@ -590,9 +574,6 @@ class ComposerStaticInit7b34d7e50a62201ec5d5e526a5b8b35d
'Psr\\Log\\LoggerInterface' => __DIR__ . '/..' . '/psr/log/Psr/Log/LoggerInterface.php',
'Psr\\Log\\LoggerTrait' => __DIR__ . '/..' . '/psr/log/Psr/Log/LoggerTrait.php',
'Psr\\Log\\NullLogger' => __DIR__ . '/..' . '/psr/log/Psr/Log/NullLogger.php',
- 'Psr\\Log\\Test\\DummyTest' => __DIR__ . '/..' . '/psr/log/Psr/Log/Test/DummyTest.php',
- 'Psr\\Log\\Test\\LoggerInterfaceTest' => __DIR__ . '/..' . '/psr/log/Psr/Log/Test/LoggerInterfaceTest.php',
- 'Psr\\Log\\Test\\TestLogger' => __DIR__ . '/..' . '/psr/log/Psr/Log/Test/TestLogger.php',
'Ramsey\\Collection\\AbstractArray' => __DIR__ . '/..' . '/ramsey/collection/src/AbstractArray.php',
'Ramsey\\Collection\\AbstractCollection' => __DIR__ . '/..' . '/ramsey/collection/src/AbstractCollection.php',
'Ramsey\\Collection\\AbstractSet' => __DIR__ . '/..' . '/ramsey/collection/src/AbstractSet.php',
@@ -1341,6 +1322,7 @@ class ComposerStaticInit7b34d7e50a62201ec5d5e526a5b8b35d
'Zotlabs\\Lib\\IConfig' => __DIR__ . '/../..' . '/Zotlabs/Lib/IConfig.php',
'Zotlabs\\Lib\\Img_filesize' => __DIR__ . '/../..' . '/Zotlabs/Lib/Img_filesize.php',
'Zotlabs\\Lib\\JSalmon' => __DIR__ . '/../..' . '/Zotlabs/Lib/JSalmon.php',
+ 'Zotlabs\\Lib\\Keyutils' => __DIR__ . '/../..' . '/Zotlabs/Lib/Keyutils.php',
'Zotlabs\\Lib\\LDSignatures' => __DIR__ . '/../..' . '/Zotlabs/Lib/LDSignatures.php',
'Zotlabs\\Lib\\Libsync' => __DIR__ . '/../..' . '/Zotlabs/Lib/Libsync.php',
'Zotlabs\\Lib\\Libzot' => __DIR__ . '/../..' . '/Zotlabs/Lib/Libzot.php',
@@ -1939,335 +1921,30 @@ class ComposerStaticInit7b34d7e50a62201ec5d5e526a5b8b35d
'Zotlabs\\Zot\\IHandler' => __DIR__ . '/../..' . '/Zotlabs/Zot/IHandler.php',
'Zotlabs\\Zot\\Receiver' => __DIR__ . '/../..' . '/Zotlabs/Zot/Receiver.php',
'Zotlabs\\Zot\\ZotHandler' => __DIR__ . '/../..' . '/Zotlabs/Zot/ZotHandler.php',
- 'phpseclib3\\Common\\Functions\\Strings' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Common/Functions/Strings.php',
- 'phpseclib3\\Crypt\\AES' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/AES.php',
- 'phpseclib3\\Crypt\\Blowfish' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php',
- 'phpseclib3\\Crypt\\ChaCha20' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/ChaCha20.php',
- 'phpseclib3\\Crypt\\Common\\AsymmetricKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/AsymmetricKey.php',
- 'phpseclib3\\Crypt\\Common\\BlockCipher' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/BlockCipher.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\OpenSSH' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/OpenSSH.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\PKCS' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\PKCS1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\PKCS8' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Keys\\PuTTY' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PuTTY.php',
- 'phpseclib3\\Crypt\\Common\\Formats\\Signature\\Raw' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Signature/Raw.php',
- 'phpseclib3\\Crypt\\Common\\PrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/PrivateKey.php',
- 'phpseclib3\\Crypt\\Common\\PublicKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/PublicKey.php',
- 'phpseclib3\\Crypt\\Common\\StreamCipher' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/StreamCipher.php',
- 'phpseclib3\\Crypt\\Common\\SymmetricKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/SymmetricKey.php',
- 'phpseclib3\\Crypt\\Common\\Traits\\Fingerprint' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/Fingerprint.php',
- 'phpseclib3\\Crypt\\Common\\Traits\\PasswordProtected' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/PasswordProtected.php',
- 'phpseclib3\\Crypt\\DES' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DES.php',
- 'phpseclib3\\Crypt\\DH' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DH.php',
- 'phpseclib3\\Crypt\\DH\\Formats\\Keys\\PKCS1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\DH\\Formats\\Keys\\PKCS8' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\DH\\Parameters' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DH/Parameters.php',
- 'phpseclib3\\Crypt\\DH\\PrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DH/PrivateKey.php',
- 'phpseclib3\\Crypt\\DH\\PublicKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DH/PublicKey.php',
- 'phpseclib3\\Crypt\\DSA' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\OpenSSH' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/OpenSSH.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\PKCS1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\PKCS8' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\PuTTY' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PuTTY.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\Raw' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/Raw.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Keys\\XML' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/XML.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Signature\\ASN1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/ASN1.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Signature\\Raw' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/Raw.php',
- 'phpseclib3\\Crypt\\DSA\\Formats\\Signature\\SSH2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/SSH2.php',
- 'phpseclib3\\Crypt\\DSA\\Parameters' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/Parameters.php',
- 'phpseclib3\\Crypt\\DSA\\PrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/PrivateKey.php',
- 'phpseclib3\\Crypt\\DSA\\PublicKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DSA/PublicKey.php',
- 'phpseclib3\\Crypt\\EC' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\Base' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Base.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\Binary' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Binary.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\KoblitzPrime' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/KoblitzPrime.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\Montgomery' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Montgomery.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\Prime' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Prime.php',
- 'phpseclib3\\Crypt\\EC\\BaseCurves\\TwistedEdwards' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/TwistedEdwards.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\Curve25519' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve25519.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\Curve448' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve448.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\Ed25519' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed25519.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\Ed448' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed448.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP160r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP160t1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP192r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP192t1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP224r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP224t1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP256r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP256t1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP320r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP320t1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP384r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP384t1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP512r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\brainpoolP512t1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512t1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistb233' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb233.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistb409' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb409.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistk163' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk163.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistk233' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk233.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistk283' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk283.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistk409' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk409.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp192' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp192.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp224' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp224.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp256' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp256.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp384' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp384.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistp521' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp521.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\nistt571' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistt571.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime192v1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime192v2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime192v3' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v3.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime239v1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime239v2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime239v3' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v3.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\prime256v1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime256v1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp112r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp112r2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp128r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp128r2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp160k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp160r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp160r2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp192k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp192r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp224k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp224r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp256k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp256r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp384r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp384r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\secp521r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp521r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect113r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect113r2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect131r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect131r2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect163k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect163r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect163r2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect193r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect193r2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r2.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect233k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect233r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect239k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect239k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect283k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect283r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect409k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect409r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409r1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect571k1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php',
- 'phpseclib3\\Crypt\\EC\\Curves\\sect571r1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\Common' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/Common.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\MontgomeryPrivate' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPrivate.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\MontgomeryPublic' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPublic.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\OpenSSH' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/OpenSSH.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\PKCS1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\PKCS8' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\PuTTY' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PuTTY.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\XML' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/XML.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Keys\\libsodium' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/libsodium.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Signature\\ASN1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/ASN1.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Signature\\Raw' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/Raw.php',
- 'phpseclib3\\Crypt\\EC\\Formats\\Signature\\SSH2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/SSH2.php',
- 'phpseclib3\\Crypt\\EC\\Parameters' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/Parameters.php',
- 'phpseclib3\\Crypt\\EC\\PrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/PrivateKey.php',
- 'phpseclib3\\Crypt\\EC\\PublicKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/EC/PublicKey.php',
- 'phpseclib3\\Crypt\\Hash' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Hash.php',
- 'phpseclib3\\Crypt\\PublicKeyLoader' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/PublicKeyLoader.php',
- 'phpseclib3\\Crypt\\RC2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RC2.php',
- 'phpseclib3\\Crypt\\RC4' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RC4.php',
- 'phpseclib3\\Crypt\\RSA' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\MSBLOB' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/MSBLOB.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\OpenSSH' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/OpenSSH.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\PKCS1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS1.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\PKCS8' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS8.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\PSS' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PSS.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\PuTTY' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PuTTY.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\Raw' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/Raw.php',
- 'phpseclib3\\Crypt\\RSA\\Formats\\Keys\\XML' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/XML.php',
- 'phpseclib3\\Crypt\\RSA\\PrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/PrivateKey.php',
- 'phpseclib3\\Crypt\\RSA\\PublicKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA/PublicKey.php',
- 'phpseclib3\\Crypt\\Random' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Random.php',
- 'phpseclib3\\Crypt\\Rijndael' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php',
- 'phpseclib3\\Crypt\\Salsa20' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Salsa20.php',
- 'phpseclib3\\Crypt\\TripleDES' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php',
- 'phpseclib3\\Crypt\\Twofish' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php',
- 'phpseclib3\\Exception\\BadConfigurationException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/BadConfigurationException.php',
- 'phpseclib3\\Exception\\BadDecryptionException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/BadDecryptionException.php',
- 'phpseclib3\\Exception\\BadModeException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/BadModeException.php',
- 'phpseclib3\\Exception\\ConnectionClosedException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/ConnectionClosedException.php',
- 'phpseclib3\\Exception\\FileNotFoundException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/FileNotFoundException.php',
- 'phpseclib3\\Exception\\InconsistentSetupException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/InconsistentSetupException.php',
- 'phpseclib3\\Exception\\InsufficientSetupException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/InsufficientSetupException.php',
- 'phpseclib3\\Exception\\NoKeyLoadedException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/NoKeyLoadedException.php',
- 'phpseclib3\\Exception\\NoSupportedAlgorithmsException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/NoSupportedAlgorithmsException.php',
- 'phpseclib3\\Exception\\UnableToConnectException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/UnableToConnectException.php',
- 'phpseclib3\\Exception\\UnsupportedAlgorithmException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/UnsupportedAlgorithmException.php',
- 'phpseclib3\\Exception\\UnsupportedCurveException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/UnsupportedCurveException.php',
- 'phpseclib3\\Exception\\UnsupportedFormatException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/UnsupportedFormatException.php',
- 'phpseclib3\\Exception\\UnsupportedOperationException' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Exception/UnsupportedOperationException.php',
- 'phpseclib3\\File\\ANSI' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ANSI.php',
- 'phpseclib3\\File\\ASN1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1.php',
- 'phpseclib3\\File\\ASN1\\Element' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AccessDescription' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AccessDescription.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AdministrationDomainName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AdministrationDomainName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AlgorithmIdentifier' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AlgorithmIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AnotherName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AnotherName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Attribute' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attribute.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AttributeType' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeType.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AttributeTypeAndValue' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeTypeAndValue.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AttributeValue' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeValue.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Attributes' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AuthorityInfoAccessSyntax' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityInfoAccessSyntax.php',
- 'phpseclib3\\File\\ASN1\\Maps\\AuthorityKeyIdentifier' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityKeyIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BaseDistance' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BaseDistance.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BasicConstraints' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BasicConstraints.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BuiltInDomainDefinedAttribute' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttribute.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BuiltInDomainDefinedAttributes' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\BuiltInStandardAttributes' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInStandardAttributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CPSuri' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CPSuri.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CRLDistributionPoints' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLDistributionPoints.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CRLNumber' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLNumber.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CRLReason' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLReason.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertPolicyId' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertPolicyId.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Certificate' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Certificate.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificateIssuer' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateIssuer.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificateList' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateList.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificatePolicies' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificatePolicies.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificateSerialNumber' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateSerialNumber.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificationRequest' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequest.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CertificationRequestInfo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequestInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Characteristic_two' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Characteristic_two.php',
- 'phpseclib3\\File\\ASN1\\Maps\\CountryName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CountryName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Curve' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Curve.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DHParameter' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DHParameter.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DSAParams' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAParams.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DSAPrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPrivateKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DSAPublicKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPublicKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DigestInfo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DigestInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DirectoryString' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DirectoryString.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DisplayText' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DisplayText.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DistributionPoint' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPoint.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DistributionPointName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPointName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\DssSigValue' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DssSigValue.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ECParameters' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECParameters.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ECPoint' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPoint.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ECPrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPrivateKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\EDIPartyName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EDIPartyName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\EcdsaSigValue' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EcdsaSigValue.php',
- 'phpseclib3\\File\\ASN1\\Maps\\EncryptedData' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedData.php',
- 'phpseclib3\\File\\ASN1\\Maps\\EncryptedPrivateKeyInfo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedPrivateKeyInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ExtKeyUsageSyntax' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtKeyUsageSyntax.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Extension' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extension.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ExtensionAttribute' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttribute.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ExtensionAttributes' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Extensions' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extensions.php',
- 'phpseclib3\\File\\ASN1\\Maps\\FieldElement' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldElement.php',
- 'phpseclib3\\File\\ASN1\\Maps\\FieldID' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldID.php',
- 'phpseclib3\\File\\ASN1\\Maps\\GeneralName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\GeneralNames' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralNames.php',
- 'phpseclib3\\File\\ASN1\\Maps\\GeneralSubtree' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtree.php',
- 'phpseclib3\\File\\ASN1\\Maps\\GeneralSubtrees' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtrees.php',
- 'phpseclib3\\File\\ASN1\\Maps\\HashAlgorithm' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HashAlgorithm.php',
- 'phpseclib3\\File\\ASN1\\Maps\\HoldInstructionCode' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HoldInstructionCode.php',
- 'phpseclib3\\File\\ASN1\\Maps\\InvalidityDate' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/InvalidityDate.php',
- 'phpseclib3\\File\\ASN1\\Maps\\IssuerAltName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuerAltName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\IssuingDistributionPoint' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuingDistributionPoint.php',
- 'phpseclib3\\File\\ASN1\\Maps\\KeyIdentifier' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\KeyPurposeId' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyPurposeId.php',
- 'phpseclib3\\File\\ASN1\\Maps\\KeyUsage' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyUsage.php',
- 'phpseclib3\\File\\ASN1\\Maps\\MaskGenAlgorithm' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/MaskGenAlgorithm.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Name' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Name.php',
- 'phpseclib3\\File\\ASN1\\Maps\\NameConstraints' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NameConstraints.php',
- 'phpseclib3\\File\\ASN1\\Maps\\NetworkAddress' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NetworkAddress.php',
- 'phpseclib3\\File\\ASN1\\Maps\\NoticeReference' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NoticeReference.php',
- 'phpseclib3\\File\\ASN1\\Maps\\NumericUserIdentifier' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NumericUserIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ORAddress' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ORAddress.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OneAsymmetricKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OneAsymmetricKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OrganizationName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OrganizationalUnitNames' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationalUnitNames.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OtherPrimeInfo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\OtherPrimeInfos' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfos.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PBEParameter' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBEParameter.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PBES2params' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBES2params.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PBKDF2params' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBKDF2params.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PBMAC1params' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBMAC1params.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PKCS9String' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PKCS9String.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Pentanomial' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Pentanomial.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PersonalName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PersonalName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PolicyInformation' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyInformation.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PolicyMappings' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyMappings.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PolicyQualifierId' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierId.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PolicyQualifierInfo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PostalAddress' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PostalAddress.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Prime_p' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Prime_p.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PrivateDomainName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateDomainName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PrivateKeyInfo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PrivateKeyUsagePeriod' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyUsagePeriod.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PublicKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PublicKeyAndChallenge' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyAndChallenge.php',
- 'phpseclib3\\File\\ASN1\\Maps\\PublicKeyInfo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RC2CBCParameter' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RC2CBCParameter.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RDNSequence' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RDNSequence.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RSAPrivateKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPrivateKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RSAPublicKey' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPublicKey.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RSASSA_PSS_params' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSASSA_PSS_params.php',
- 'phpseclib3\\File\\ASN1\\Maps\\ReasonFlags' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ReasonFlags.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RelativeDistinguishedName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RelativeDistinguishedName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\RevokedCertificate' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RevokedCertificate.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SignedPublicKeyAndChallenge' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SignedPublicKeyAndChallenge.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SpecifiedECDomain' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SpecifiedECDomain.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SubjectAltName' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectAltName.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SubjectDirectoryAttributes' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectDirectoryAttributes.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SubjectInfoAccessSyntax' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectInfoAccessSyntax.php',
- 'phpseclib3\\File\\ASN1\\Maps\\SubjectPublicKeyInfo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectPublicKeyInfo.php',
- 'phpseclib3\\File\\ASN1\\Maps\\TBSCertList' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertList.php',
- 'phpseclib3\\File\\ASN1\\Maps\\TBSCertificate' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertificate.php',
- 'phpseclib3\\File\\ASN1\\Maps\\TerminalIdentifier' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TerminalIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Time' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Time.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Trinomial' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Trinomial.php',
- 'phpseclib3\\File\\ASN1\\Maps\\UniqueIdentifier' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UniqueIdentifier.php',
- 'phpseclib3\\File\\ASN1\\Maps\\UserNotice' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UserNotice.php',
- 'phpseclib3\\File\\ASN1\\Maps\\Validity' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Validity.php',
- 'phpseclib3\\File\\ASN1\\Maps\\netscape_ca_policy_url' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_ca_policy_url.php',
- 'phpseclib3\\File\\ASN1\\Maps\\netscape_cert_type' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_cert_type.php',
- 'phpseclib3\\File\\ASN1\\Maps\\netscape_comment' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_comment.php',
- 'phpseclib3\\File\\X509' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/X509.php',
- 'phpseclib3\\Math\\BigInteger' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\Base' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Base.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\BuiltIn' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/BuiltIn.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\DefaultEngine' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/DefaultEngine.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\OpenSSL' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/OpenSSL.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\Reductions\\Barrett' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/Barrett.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\BCMath\\Reductions\\EvalBarrett' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/EvalBarrett.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\Engine' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/Engine.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\GMP' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\GMP\\DefaultEngine' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP/DefaultEngine.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\OpenSSL' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/OpenSSL.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP32' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP32.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP64' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP64.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Base' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Base.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\DefaultEngine' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/DefaultEngine.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Montgomery' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Montgomery.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\OpenSSL' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/OpenSSL.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\Barrett' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Barrett.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\Classic' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Classic.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\EvalBarrett' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/EvalBarrett.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\Montgomery' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Montgomery.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\MontgomeryMult' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/MontgomeryMult.php',
- 'phpseclib3\\Math\\BigInteger\\Engines\\PHP\\Reductions\\PowerOfTwo' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/PowerOfTwo.php',
- 'phpseclib3\\Math\\BinaryField' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BinaryField.php',
- 'phpseclib3\\Math\\BinaryField\\Integer' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BinaryField/Integer.php',
- 'phpseclib3\\Math\\Common\\FiniteField' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField.php',
- 'phpseclib3\\Math\\Common\\FiniteField\\Integer' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField/Integer.php',
- 'phpseclib3\\Math\\PrimeField' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/PrimeField.php',
- 'phpseclib3\\Math\\PrimeField\\Integer' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/PrimeField/Integer.php',
- 'phpseclib3\\Net\\SFTP' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Net/SFTP.php',
- 'phpseclib3\\Net\\SFTP\\Stream' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php',
- 'phpseclib3\\Net\\SSH2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Net/SSH2.php',
- 'phpseclib3\\System\\SSH\\Agent' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php',
- 'phpseclib3\\System\\SSH\\Agent\\Identity' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php',
- 'phpseclib3\\System\\SSH\\Common\\Traits\\ReadBytes' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/System/SSH/Common/Traits/ReadBytes.php',
+ 'phpseclib\\Crypt\\AES' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/AES.php',
+ 'phpseclib\\Crypt\\Base' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Base.php',
+ 'phpseclib\\Crypt\\Blowfish' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php',
+ 'phpseclib\\Crypt\\DES' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/DES.php',
+ 'phpseclib\\Crypt\\Hash' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Hash.php',
+ 'phpseclib\\Crypt\\RC2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RC2.php',
+ 'phpseclib\\Crypt\\RC4' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RC4.php',
+ 'phpseclib\\Crypt\\RSA' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/RSA.php',
+ 'phpseclib\\Crypt\\Random' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Random.php',
+ 'phpseclib\\Crypt\\Rijndael' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php',
+ 'phpseclib\\Crypt\\TripleDES' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php',
+ 'phpseclib\\Crypt\\Twofish' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php',
+ 'phpseclib\\File\\ANSI' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ANSI.php',
+ 'phpseclib\\File\\ASN1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1.php',
+ 'phpseclib\\File\\ASN1\\Element' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php',
+ 'phpseclib\\File\\X509' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/File/X509.php',
+ 'phpseclib\\Math\\BigInteger' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Math/BigInteger.php',
+ 'phpseclib\\Net\\SCP' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Net/SCP.php',
+ 'phpseclib\\Net\\SFTP' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Net/SFTP.php',
+ 'phpseclib\\Net\\SFTP\\Stream' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php',
+ 'phpseclib\\Net\\SSH1' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Net/SSH1.php',
+ 'phpseclib\\Net\\SSH2' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/Net/SSH2.php',
+ 'phpseclib\\System\\SSH\\Agent' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php',
+ 'phpseclib\\System\\SSH\\Agent\\Identity' => __DIR__ . '/..' . '/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php',
);
public static function getInitializer(ClassLoader $loader)
diff --git a/vendor/composer/installed.json b/vendor/composer/installed.json
index 06d6df515..3fa4a6fac 100644
--- a/vendor/composer/installed.json
+++ b/vendor/composer/installed.json
@@ -507,129 +507,6 @@
"install-path": "../michelf/php-markdown"
},
{
- "name": "paragonie/constant_time_encoding",
- "version": "v2.4.0",
- "version_normalized": "2.4.0.0",
- "source": {
- "type": "git",
- "url": "https://github.com/paragonie/constant_time_encoding.git",
- "reference": "f34c2b11eb9d2c9318e13540a1dbc2a3afbd939c"
- },
- "dist": {
- "type": "zip",
- "url": "https://api.github.com/repos/paragonie/constant_time_encoding/zipball/f34c2b11eb9d2c9318e13540a1dbc2a3afbd939c",
- "reference": "f34c2b11eb9d2c9318e13540a1dbc2a3afbd939c",
- "shasum": ""
- },
- "require": {
- "php": "^7|^8"
- },
- "require-dev": {
- "phpunit/phpunit": "^6|^7|^8|^9",
- "vimeo/psalm": "^1|^2|^3|^4"
- },
- "time": "2020-12-06T15:14:20+00:00",
- "type": "library",
- "installation-source": "dist",
- "autoload": {
- "psr-4": {
- "ParagonIE\\ConstantTime\\": "src/"
- }
- },
- "notification-url": "https://packagist.org/downloads/",
- "license": [
- "MIT"
- ],
- "authors": [
- {
- "name": "Paragon Initiative Enterprises",
- "email": "security@paragonie.com",
- "homepage": "https://paragonie.com",
- "role": "Maintainer"
- },
- {
- "name": "Steve 'Sc00bz' Thomas",
- "email": "steve@tobtu.com",
- "homepage": "https://www.tobtu.com",
- "role": "Original Developer"
- }
- ],
- "description": "Constant-time Implementations of RFC 4648 Encoding (Base-64, Base-32, Base-16)",
- "keywords": [
- "base16",
- "base32",
- "base32_decode",
- "base32_encode",
- "base64",
- "base64_decode",
- "base64_encode",
- "bin2hex",
- "encoding",
- "hex",
- "hex2bin",
- "rfc4648"
- ],
- "support": {
- "email": "info@paragonie.com",
- "issues": "https://github.com/paragonie/constant_time_encoding/issues",
- "source": "https://github.com/paragonie/constant_time_encoding"
- },
- "install-path": "../paragonie/constant_time_encoding"
- },
- {
- "name": "paragonie/random_compat",
- "version": "v9.99.100",
- "version_normalized": "9.99.100.0",
- "source": {
- "type": "git",
- "url": "https://github.com/paragonie/random_compat.git",
- "reference": "996434e5492cb4c3edcb9168db6fbb1359ef965a"
- },
- "dist": {
- "type": "zip",
- "url": "https://api.github.com/repos/paragonie/random_compat/zipball/996434e5492cb4c3edcb9168db6fbb1359ef965a",
- "reference": "996434e5492cb4c3edcb9168db6fbb1359ef965a",
- "shasum": ""
- },
- "require": {
- "php": ">= 7"
- },
- "require-dev": {
- "phpunit/phpunit": "4.*|5.*",
- "vimeo/psalm": "^1"
- },
- "suggest": {
- "ext-libsodium": "Provides a modern crypto API that can be used to generate random bytes."
- },
- "time": "2020-10-15T08:29:30+00:00",
- "type": "library",
- "installation-source": "dist",
- "notification-url": "https://packagist.org/downloads/",
- "license": [
- "MIT"
- ],
- "authors": [
- {
- "name": "Paragon Initiative Enterprises",
- "email": "security@paragonie.com",
- "homepage": "https://paragonie.com"
- }
- ],
- "description": "PHP 5.x polyfill for random_bytes() and random_int() from PHP 7",
- "keywords": [
- "csprng",
- "polyfill",
- "pseudorandom",
- "random"
- ],
- "support": {
- "email": "info@paragonie.com",
- "issues": "https://github.com/paragonie/random_compat/issues",
- "source": "https://github.com/paragonie/random_compat"
- },
- "install-path": "../paragonie/random_compat"
- },
- {
"name": "pear/text_languagedetect",
"version": "v1.0.1",
"version_normalized": "1.0.1.0",
@@ -682,27 +559,25 @@
},
{
"name": "phpseclib/phpseclib",
- "version": "3.0.4",
- "version_normalized": "3.0.4.0",
+ "version": "2.0.30",
+ "version_normalized": "2.0.30.0",
"source": {
"type": "git",
"url": "https://github.com/phpseclib/phpseclib.git",
- "reference": "845a2275e886ba9fb386c8f59cb383dd9c8963e9"
+ "reference": "136b9ca7eebef78be14abf90d65c5e57b6bc5d36"
},
"dist": {
"type": "zip",
- "url": "https://api.github.com/repos/phpseclib/phpseclib/zipball/845a2275e886ba9fb386c8f59cb383dd9c8963e9",
- "reference": "845a2275e886ba9fb386c8f59cb383dd9c8963e9",
+ "url": "https://api.github.com/repos/phpseclib/phpseclib/zipball/136b9ca7eebef78be14abf90d65c5e57b6bc5d36",
+ "reference": "136b9ca7eebef78be14abf90d65c5e57b6bc5d36",
"shasum": ""
},
"require": {
- "paragonie/constant_time_encoding": "^1|^2",
- "paragonie/random_compat": "^1.4|^2.0|^9.99.99",
- "php": ">=5.6.1"
+ "php": ">=5.3.3"
},
"require-dev": {
"phing/phing": "~2.7",
- "phpunit/phpunit": "^5.7|^6.0|^9.4",
+ "phpunit/phpunit": "^4.8.35|^5.7|^6.0|^9.4",
"squizlabs/php_codesniffer": "~2.0"
},
"suggest": {
@@ -711,7 +586,7 @@
"ext-mcrypt": "Install the Mcrypt extension in order to speed up a few other cryptographic operations.",
"ext-openssl": "Install the OpenSSL extension in order to speed up a wide variety of cryptographic operations."
},
- "time": "2021-01-25T19:02:05+00:00",
+ "time": "2020-12-17T05:42:04+00:00",
"type": "library",
"installation-source": "dist",
"autoload": {
@@ -719,7 +594,7 @@
"phpseclib/bootstrap.php"
],
"psr-4": {
- "phpseclib3\\": "phpseclib/"
+ "phpseclib\\": "phpseclib/"
}
},
"notification-url": "https://packagist.org/downloads/",
@@ -776,7 +651,7 @@
],
"support": {
"issues": "https://github.com/phpseclib/phpseclib/issues",
- "source": "https://github.com/phpseclib/phpseclib/tree/3.0.4"
+ "source": "https://github.com/phpseclib/phpseclib/tree/2.0.30"
},
"funding": [
{
diff --git a/vendor/composer/installed.php b/vendor/composer/installed.php
index d8bea317c..9ddb06cc3 100644
--- a/vendor/composer/installed.php
+++ b/vendor/composer/installed.php
@@ -1,12 +1,12 @@
<?php return array (
'root' =>
array (
- 'pretty_version' => 'dev-master',
- 'version' => 'dev-master',
+ 'pretty_version' => 'dev-5.2RC',
+ 'version' => 'dev-5.2RC',
'aliases' =>
array (
),
- 'reference' => '08c9152abdfa90da09931bdcc6e6c81ea243434c',
+ 'reference' => '34b28cd8d36c7805e65c442ff1588ccf5165387a',
'name' => 'zotlabs/hubzilla',
),
'versions' =>
@@ -92,24 +92,6 @@
),
'reference' => 'c83178d49e372ca967d1a8c77ae4e051b3a3c75c',
),
- 'paragonie/constant_time_encoding' =>
- array (
- 'pretty_version' => 'v2.4.0',
- 'version' => '2.4.0.0',
- 'aliases' =>
- array (
- ),
- 'reference' => 'f34c2b11eb9d2c9318e13540a1dbc2a3afbd939c',
- ),
- 'paragonie/random_compat' =>
- array (
- 'pretty_version' => 'v9.99.100',
- 'version' => '9.99.100.0',
- 'aliases' =>
- array (
- ),
- 'reference' => '996434e5492cb4c3edcb9168db6fbb1359ef965a',
- ),
'pear/text_languagedetect' =>
array (
'pretty_version' => 'v1.0.1',
@@ -121,12 +103,12 @@
),
'phpseclib/phpseclib' =>
array (
- 'pretty_version' => '3.0.4',
- 'version' => '3.0.4.0',
+ 'pretty_version' => '2.0.30',
+ 'version' => '2.0.30.0',
'aliases' =>
array (
),
- 'reference' => '845a2275e886ba9fb386c8f59cb383dd9c8963e9',
+ 'reference' => '136b9ca7eebef78be14abf90d65c5e57b6bc5d36',
),
'psr/log' =>
array (
@@ -261,12 +243,12 @@
),
'zotlabs/hubzilla' =>
array (
- 'pretty_version' => 'dev-master',
- 'version' => 'dev-master',
+ 'pretty_version' => 'dev-5.2RC',
+ 'version' => 'dev-5.2RC',
'aliases' =>
array (
),
- 'reference' => '08c9152abdfa90da09931bdcc6e6c81ea243434c',
+ 'reference' => '34b28cd8d36c7805e65c442ff1588ccf5165387a',
),
),
);
diff --git a/vendor/paragonie/constant_time_encoding/.gitignore b/vendor/paragonie/constant_time_encoding/.gitignore
deleted file mode 100644
index e0caea8fc..000000000
--- a/vendor/paragonie/constant_time_encoding/.gitignore
+++ /dev/null
@@ -1,2 +0,0 @@
-.idea/
-vendor/ \ No newline at end of file
diff --git a/vendor/paragonie/constant_time_encoding/.travis.yml b/vendor/paragonie/constant_time_encoding/.travis.yml
deleted file mode 100644
index 117c114a1..000000000
--- a/vendor/paragonie/constant_time_encoding/.travis.yml
+++ /dev/null
@@ -1,24 +0,0 @@
-language: php
-sudo: false
-
-matrix:
- fast_finish: true
- include:
- - php: "7.1"
- - php: "7.2"
- - php: "7.3"
- - php: "7.4"
- - php: "8.0"
- - php: "nightly"
- allow_failures:
- - php: "nightly"
- - php: "7.4"
- - php: "8.0"
-
-install:
- - composer self-update
- - composer update
-
-script:
- - vendor/bin/phpunit
- - vendor/bin/psalm
diff --git a/vendor/paragonie/constant_time_encoding/LICENSE.txt b/vendor/paragonie/constant_time_encoding/LICENSE.txt
deleted file mode 100644
index f424f5ecc..000000000
--- a/vendor/paragonie/constant_time_encoding/LICENSE.txt
+++ /dev/null
@@ -1,48 +0,0 @@
-The MIT License (MIT)
-
-Copyright (c) 2016 - 2020 Paragon Initiative Enterprises
-
-Permission is hereby granted, free of charge, to any person obtaining a copy
-of this software and associated documentation files (the "Software"), to deal
-in the Software without restriction, including without limitation the rights
-to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-copies of the Software, and to permit persons to whom the Software is
-furnished to do so, subject to the following conditions:
-
-The above copyright notice and this permission notice shall be included in all
-copies or substantial portions of the Software.
-
-THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
-SOFTWARE.
-
-------------------------------------------------------------------------------
-This library was based on the work of Steve "Sc00bz" Thomas.
-------------------------------------------------------------------------------
-
-The MIT License (MIT)
-
-Copyright (c) 2014 Steve Thomas
-
-Permission is hereby granted, free of charge, to any person obtaining a copy
-of this software and associated documentation files (the "Software"), to deal
-in the Software without restriction, including without limitation the rights
-to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-copies of the Software, and to permit persons to whom the Software is
-furnished to do so, subject to the following conditions:
-
-The above copyright notice and this permission notice shall be included in all
-copies or substantial portions of the Software.
-
-THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
-SOFTWARE.
-
diff --git a/vendor/paragonie/constant_time_encoding/README.md b/vendor/paragonie/constant_time_encoding/README.md
deleted file mode 100644
index d7db2a2d0..000000000
--- a/vendor/paragonie/constant_time_encoding/README.md
+++ /dev/null
@@ -1,84 +0,0 @@
-# Constant-Time Encoding
-
-[![Build Status](https://travis-ci.org/paragonie/constant_time_encoding.svg?branch=master)](https://travis-ci.org/paragonie/constant_time_encoding)
-[![Latest Stable Version](https://poser.pugx.org/paragonie/constant_time_encoding/v/stable)](https://packagist.org/packages/paragonie/constant_time_encoding)
-[![Latest Unstable Version](https://poser.pugx.org/paragonie/constant_time_encoding/v/unstable)](https://packagist.org/packages/paragonie/constant_time_encoding)
-[![License](https://poser.pugx.org/paragonie/constant_time_encoding/license)](https://packagist.org/packages/paragonie/constant_time_encoding)
-[![Downloads](https://img.shields.io/packagist/dt/paragonie/constant_time_encoding.svg)](https://packagist.org/packages/paragonie/constant_time_encoding)
-
-Based on the [constant-time base64 implementation made by Steve "Sc00bz" Thomas](https://github.com/Sc00bz/ConstTimeEncoding),
-this library aims to offer character encoding functions that do not leak
-information about what you are encoding/decoding via processor cache
-misses. Further reading on [cache-timing attacks](http://blog.ircmaxell.com/2014/11/its-all-about-time.html).
-
-Our fork offers the following enchancements:
-
-* `mbstring.func_overload` resistance
-* Unit tests
-* Composer- and Packagist-ready
-* Base16 encoding
-* Base32 encoding
-* Uses `pack()` and `unpack()` instead of `chr()` and `ord()`
-
-## PHP Version Requirements
-
-Version 2 of this library should work on **PHP 7** or newer. For PHP 5
-support, see [the v1.x branch](https://github.com/paragonie/constant_time_encoding/tree/v1.x).
-
-If you are adding this as a dependency to a project intended to work on both PHP 5 and PHP 7, please set the required version to `^1|^2` instead of just `^1` or `^2`.
-
-## How to Install
-
-```sh
-composer require paragonie/constant_time_encoding
-```
-
-## How to Use
-
-```php
-use \ParagonIE\ConstantTime\Encoding;
-
-// possibly (if applicable):
-// require 'vendor/autoload.php';
-
-$data = random_bytes(32);
-echo Encoding::base64Encode($data), "\n";
-echo Encoding::base32EncodeUpper($data), "\n";
-echo Encoding::base32Encode($data), "\n";
-echo Encoding::hexEncode($data), "\n";
-echo Encoding::hexEncodeUpper($data), "\n";
-```
-
-Example output:
-
-```
-1VilPkeVqirlPifk5scbzcTTbMT2clp+Zkyv9VFFasE=
-2VMKKPSHSWVCVZJ6E7SONRY3ZXCNG3GE6ZZFU7TGJSX7KUKFNLAQ====
-2vmkkpshswvcvzj6e7sonry3zxcng3ge6zzfu7tgjsx7kukfnlaq====
-d558a53e4795aa2ae53e27e4e6c71bcdc4d36cc4f6725a7e664caff551456ac1
-D558A53E4795AA2AE53E27E4E6C71BDCC4D36CC4F6725A7E664CAFF551456AC1
-```
-
-If you only need a particular variant, you can just reference the
-required class like so:
-
-```php
-use \ParagonIE\ConstantTime\Base64;
-use \ParagonIE\ConstantTime\Base32;
-
-$data = random_bytes(32);
-echo Base64::encode($data), "\n";
-echo Base32::encode($data), "\n";
-```
-
-Example output:
-
-```
-1VilPkeVqirlPifk5scbzcTTbMT2clp+Zkyv9VFFasE=
-2vmkkpshswvcvzj6e7sonry3zxcng3ge6zzfu7tgjsx7kukfnlaq====
-```
-
-## Support Contracts
-
-If your company uses this library in their products or services, you may be
-interested in [purchasing a support contract from Paragon Initiative Enterprises](https://paragonie.com/enterprise).
diff --git a/vendor/paragonie/constant_time_encoding/composer.json b/vendor/paragonie/constant_time_encoding/composer.json
deleted file mode 100644
index 583fe366f..000000000
--- a/vendor/paragonie/constant_time_encoding/composer.json
+++ /dev/null
@@ -1,51 +0,0 @@
-{
- "name": "paragonie/constant_time_encoding",
- "description": "Constant-time Implementations of RFC 4648 Encoding (Base-64, Base-32, Base-16)",
- "keywords": [
- "base64",
- "encoding",
- "rfc4648",
- "base32",
- "base16",
- "hex",
- "bin2hex",
- "hex2bin",
- "base64_encode",
- "base64_decode",
- "base32_encode",
- "base32_decode"
- ],
- "license": "MIT",
- "type": "library",
- "authors": [
- {
- "name": "Paragon Initiative Enterprises",
- "email": "security@paragonie.com",
- "homepage": "https://paragonie.com",
- "role": "Maintainer"
- },
- {
- "name": "Steve 'Sc00bz' Thomas",
- "email": "steve@tobtu.com",
- "homepage": "https://www.tobtu.com",
- "role": "Original Developer"
- }
- ],
- "support": {
- "issues": "https://github.com/paragonie/constant_time_encoding/issues",
- "email": "info@paragonie.com",
- "source": "https://github.com/paragonie/constant_time_encoding"
- },
- "require": {
- "php": "^7|^8"
- },
- "require-dev": {
- "phpunit/phpunit": "^6|^7|^8|^9",
- "vimeo/psalm": "^1|^2|^3|^4"
- },
- "autoload": {
- "psr-4": {
- "ParagonIE\\ConstantTime\\": "src/"
- }
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/phpunit.xml.dist b/vendor/paragonie/constant_time_encoding/phpunit.xml.dist
deleted file mode 100644
index 4d090343e..000000000
--- a/vendor/paragonie/constant_time_encoding/phpunit.xml.dist
+++ /dev/null
@@ -1,13 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<phpunit xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" backupGlobals="true" backupStaticAttributes="false" bootstrap="vendor/autoload.php" colors="true" convertErrorsToExceptions="true" convertNoticesToExceptions="true" convertWarningsToExceptions="true" processIsolation="false" stopOnError="false" stopOnFailure="false" xsi:noNamespaceSchemaLocation="https://schema.phpunit.de/9.3/phpunit.xsd">
- <coverage processUncoveredFiles="true">
- <include>
- <directory suffix=".php">./src</directory>
- </include>
- </coverage>
- <testsuites>
- <testsuite name="Constant Time Encoding Test Suite">
- <directory suffix="Test.php">./tests</directory>
- </testsuite>
- </testsuites>
-</phpunit>
diff --git a/vendor/paragonie/constant_time_encoding/psalm.xml b/vendor/paragonie/constant_time_encoding/psalm.xml
deleted file mode 100644
index 0a17264b0..000000000
--- a/vendor/paragonie/constant_time_encoding/psalm.xml
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0"?>
-<psalm
- useDocblockTypes="true"
- totallyTyped="true"
->
- <projectFiles>
- <directory name="src" />
- </projectFiles>
-</psalm>
diff --git a/vendor/paragonie/constant_time_encoding/src/Base32.php b/vendor/paragonie/constant_time_encoding/src/Base32.php
deleted file mode 100644
index 7784bafbf..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Base32.php
+++ /dev/null
@@ -1,471 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Base32
- * [A-Z][2-7]
- *
- * @package ParagonIE\ConstantTime
- */
-abstract class Base32 implements EncoderInterface
-{
- /**
- * Decode a Base32-encoded string into raw binary
- *
- * @param string $encodedString
- * @param bool $strictPadding
- * @return string
- */
- public static function decode(string $encodedString, bool $strictPadding = false): string
- {
- return static::doDecode($encodedString, false, $strictPadding);
- }
-
- /**
- * Decode an uppercase Base32-encoded string into raw binary
- *
- * @param string $src
- * @param bool $strictPadding
- * @return string
- */
- public static function decodeUpper(string $src, bool $strictPadding = false): string
- {
- return static::doDecode($src, true, $strictPadding);
- }
-
- /**
- * Encode into Base32 (RFC 4648)
- *
- * @param string $src
- * @return string
- * @throws \TypeError
- */
- public static function encode(string $src): string
- {
- return static::doEncode($src, false, true);
- }
- /**
- * Encode into Base32 (RFC 4648)
- *
- * @param string $src
- * @return string
- * @throws \TypeError
- */
- public static function encodeUnpadded(string $src): string
- {
- return static::doEncode($src, false, false);
- }
-
- /**
- * Encode into uppercase Base32 (RFC 4648)
- *
- * @param string $src
- * @return string
- * @throws \TypeError
- */
- public static function encodeUpper(string $src): string
- {
- return static::doEncode($src, true, true);
- }
-
- /**
- * Encode into uppercase Base32 (RFC 4648)
- *
- * @param string $src
- * @return string
- * @throws \TypeError
- */
- public static function encodeUpperUnpadded(string $src): string
- {
- return static::doEncode($src, true, false);
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 5-bit integers
- * into 8-bit integers.
- *
- * @param int $src
- * @return int
- */
- protected static function decode5Bits(int $src): int
- {
- $ret = -1;
-
- // if ($src > 96 && $src < 123) $ret += $src - 97 + 1; // -64
- $ret += (((0x60 - $src) & ($src - 0x7b)) >> 8) & ($src - 96);
-
- // if ($src > 0x31 && $src < 0x38) $ret += $src - 24 + 1; // -23
- $ret += (((0x31 - $src) & ($src - 0x38)) >> 8) & ($src - 23);
-
- return $ret;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 5-bit integers
- * into 8-bit integers.
- *
- * Uppercase variant.
- *
- * @param int $src
- * @return int
- */
- protected static function decode5BitsUpper(int $src): int
- {
- $ret = -1;
-
- // if ($src > 64 && $src < 91) $ret += $src - 65 + 1; // -64
- $ret += (((0x40 - $src) & ($src - 0x5b)) >> 8) & ($src - 64);
-
- // if ($src > 0x31 && $src < 0x38) $ret += $src - 24 + 1; // -23
- $ret += (((0x31 - $src) & ($src - 0x38)) >> 8) & ($src - 23);
-
- return $ret;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 8-bit integers
- * into 5-bit integers.
- *
- * @param int $src
- * @return string
- */
- protected static function encode5Bits(int $src): string
- {
- $diff = 0x61;
-
- // if ($src > 25) $ret -= 72;
- $diff -= ((25 - $src) >> 8) & 73;
-
- return \pack('C', $src + $diff);
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 8-bit integers
- * into 5-bit integers.
- *
- * Uppercase variant.
- *
- * @param int $src
- * @return string
- */
- protected static function encode5BitsUpper(int $src): string
- {
- $diff = 0x41;
-
- // if ($src > 25) $ret -= 40;
- $diff -= ((25 - $src) >> 8) & 41;
-
- return \pack('C', $src + $diff);
- }
-
-
- /**
- * Base32 decoding
- *
- * @param string $src
- * @param bool $upper
- * @param bool $strictPadding
- * @return string
- * @throws \TypeError
- * @psalm-suppress RedundantCondition
- */
- protected static function doDecode(string $src, bool $upper = false, bool $strictPadding = false): string
- {
- // We do this to reduce code duplication:
- $method = $upper
- ? 'decode5BitsUpper'
- : 'decode5Bits';
-
- // Remove padding
- $srcLen = Binary::safeStrlen($src);
- if ($srcLen === 0) {
- return '';
- }
- if ($strictPadding) {
- if (($srcLen & 7) === 0) {
- for ($j = 0; $j < 7; ++$j) {
- if ($src[$srcLen - 1] === '=') {
- $srcLen--;
- } else {
- break;
- }
- }
- }
- if (($srcLen & 7) === 1) {
- throw new \RangeException(
- 'Incorrect padding'
- );
- }
- } else {
- $src = \rtrim($src, '=');
- $srcLen = Binary::safeStrlen($src);
- }
-
- $err = 0;
- $dest = '';
- // Main loop (no padding):
- for ($i = 0; $i + 8 <= $srcLen; $i += 8) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', Binary::safeSubstr($src, $i, 8));
- /** @var int $c0 */
- $c0 = static::$method($chunk[1]);
- /** @var int $c1 */
- $c1 = static::$method($chunk[2]);
- /** @var int $c2 */
- $c2 = static::$method($chunk[3]);
- /** @var int $c3 */
- $c3 = static::$method($chunk[4]);
- /** @var int $c4 */
- $c4 = static::$method($chunk[5]);
- /** @var int $c5 */
- $c5 = static::$method($chunk[6]);
- /** @var int $c6 */
- $c6 = static::$method($chunk[7]);
- /** @var int $c7 */
- $c7 = static::$method($chunk[8]);
-
- $dest .= \pack(
- 'CCCCC',
- (($c0 << 3) | ($c1 >> 2) ) & 0xff,
- (($c1 << 6) | ($c2 << 1) | ($c3 >> 4)) & 0xff,
- (($c3 << 4) | ($c4 >> 1) ) & 0xff,
- (($c4 << 7) | ($c5 << 2) | ($c6 >> 3)) & 0xff,
- (($c6 << 5) | ($c7 ) ) & 0xff
- );
- $err |= ($c0 | $c1 | $c2 | $c3 | $c4 | $c5 | $c6 | $c7) >> 8;
- }
- // The last chunk, which may have padding:
- if ($i < $srcLen) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', Binary::safeSubstr($src, $i, $srcLen - $i));
- /** @var int $c0 */
- $c0 = static::$method($chunk[1]);
-
- if ($i + 6 < $srcLen) {
- /** @var int $c1 */
- $c1 = static::$method($chunk[2]);
- /** @var int $c2 */
- $c2 = static::$method($chunk[3]);
- /** @var int $c3 */
- $c3 = static::$method($chunk[4]);
- /** @var int $c4 */
- $c4 = static::$method($chunk[5]);
- /** @var int $c5 */
- $c5 = static::$method($chunk[6]);
- /** @var int $c6 */
- $c6 = static::$method($chunk[7]);
-
- $dest .= \pack(
- 'CCCC',
- (($c0 << 3) | ($c1 >> 2) ) & 0xff,
- (($c1 << 6) | ($c2 << 1) | ($c3 >> 4)) & 0xff,
- (($c3 << 4) | ($c4 >> 1) ) & 0xff,
- (($c4 << 7) | ($c5 << 2) | ($c6 >> 3)) & 0xff
- );
- $err |= ($c0 | $c1 | $c2 | $c3 | $c4 | $c5 | $c6) >> 8;
- } elseif ($i + 5 < $srcLen) {
- /** @var int $c1 */
- $c1 = static::$method($chunk[2]);
- /** @var int $c2 */
- $c2 = static::$method($chunk[3]);
- /** @var int $c3 */
- $c3 = static::$method($chunk[4]);
- /** @var int $c4 */
- $c4 = static::$method($chunk[5]);
- /** @var int $c5 */
- $c5 = static::$method($chunk[6]);
-
- $dest .= \pack(
- 'CCCC',
- (($c0 << 3) | ($c1 >> 2) ) & 0xff,
- (($c1 << 6) | ($c2 << 1) | ($c3 >> 4)) & 0xff,
- (($c3 << 4) | ($c4 >> 1) ) & 0xff,
- (($c4 << 7) | ($c5 << 2) ) & 0xff
- );
- $err |= ($c0 | $c1 | $c2 | $c3 | $c4 | $c5) >> 8;
- } elseif ($i + 4 < $srcLen) {
- /** @var int $c1 */
- $c1 = static::$method($chunk[2]);
- /** @var int $c2 */
- $c2 = static::$method($chunk[3]);
- /** @var int $c3 */
- $c3 = static::$method($chunk[4]);
- /** @var int $c4 */
- $c4 = static::$method($chunk[5]);
-
- $dest .= \pack(
- 'CCC',
- (($c0 << 3) | ($c1 >> 2) ) & 0xff,
- (($c1 << 6) | ($c2 << 1) | ($c3 >> 4)) & 0xff,
- (($c3 << 4) | ($c4 >> 1) ) & 0xff
- );
- $err |= ($c0 | $c1 | $c2 | $c3 | $c4) >> 8;
- } elseif ($i + 3 < $srcLen) {
- /** @var int $c1 */
- $c1 = static::$method($chunk[2]);
- /** @var int $c2 */
- $c2 = static::$method($chunk[3]);
- /** @var int $c3 */
- $c3 = static::$method($chunk[4]);
-
- $dest .= \pack(
- 'CC',
- (($c0 << 3) | ($c1 >> 2) ) & 0xff,
- (($c1 << 6) | ($c2 << 1) | ($c3 >> 4)) & 0xff
- );
- $err |= ($c0 | $c1 | $c2 | $c3) >> 8;
- } elseif ($i + 2 < $srcLen) {
- /** @var int $c1 */
- $c1 = static::$method($chunk[2]);
- /** @var int $c2 */
- $c2 = static::$method($chunk[3]);
-
- $dest .= \pack(
- 'CC',
- (($c0 << 3) | ($c1 >> 2) ) & 0xff,
- (($c1 << 6) | ($c2 << 1) ) & 0xff
- );
- $err |= ($c0 | $c1 | $c2) >> 8;
- } elseif ($i + 1 < $srcLen) {
- /** @var int $c1 */
- $c1 = static::$method($chunk[2]);
-
- $dest .= \pack(
- 'C',
- (($c0 << 3) | ($c1 >> 2) ) & 0xff
- );
- $err |= ($c0 | $c1) >> 8;
- } else {
- $dest .= \pack(
- 'C',
- (($c0 << 3) ) & 0xff
- );
- $err |= ($c0) >> 8;
- }
- }
- /** @var bool $check */
- $check = ($err === 0);
- if (!$check) {
- throw new \RangeException(
- 'Base32::doDecode() only expects characters in the correct base32 alphabet'
- );
- }
- return $dest;
- }
-
- /**
- * Base32 Encoding
- *
- * @param string $src
- * @param bool $upper
- * @param bool $pad
- * @return string
- * @throws \TypeError
- */
- protected static function doEncode(string $src, bool $upper = false, $pad = true): string
- {
- // We do this to reduce code duplication:
- $method = $upper
- ? 'encode5BitsUpper'
- : 'encode5Bits';
-
- $dest = '';
- $srcLen = Binary::safeStrlen($src);
-
- // Main loop (no padding):
- for ($i = 0; $i + 5 <= $srcLen; $i += 5) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', Binary::safeSubstr($src, $i, 5));
- $b0 = $chunk[1];
- $b1 = $chunk[2];
- $b2 = $chunk[3];
- $b3 = $chunk[4];
- $b4 = $chunk[5];
- $dest .=
- static::$method( ($b0 >> 3) & 31) .
- static::$method((($b0 << 2) | ($b1 >> 6)) & 31) .
- static::$method((($b1 >> 1) ) & 31) .
- static::$method((($b1 << 4) | ($b2 >> 4)) & 31) .
- static::$method((($b2 << 1) | ($b3 >> 7)) & 31) .
- static::$method((($b3 >> 2) ) & 31) .
- static::$method((($b3 << 3) | ($b4 >> 5)) & 31) .
- static::$method( $b4 & 31);
- }
- // The last chunk, which may have padding:
- if ($i < $srcLen) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', Binary::safeSubstr($src, $i, $srcLen - $i));
- $b0 = $chunk[1];
- if ($i + 3 < $srcLen) {
- $b1 = $chunk[2];
- $b2 = $chunk[3];
- $b3 = $chunk[4];
- $dest .=
- static::$method( ($b0 >> 3) & 31) .
- static::$method((($b0 << 2) | ($b1 >> 6)) & 31) .
- static::$method((($b1 >> 1) ) & 31) .
- static::$method((($b1 << 4) | ($b2 >> 4)) & 31) .
- static::$method((($b2 << 1) | ($b3 >> 7)) & 31) .
- static::$method((($b3 >> 2) ) & 31) .
- static::$method((($b3 << 3) ) & 31);
- if ($pad) {
- $dest .= '=';
- }
- } elseif ($i + 2 < $srcLen) {
- $b1 = $chunk[2];
- $b2 = $chunk[3];
- $dest .=
- static::$method( ($b0 >> 3) & 31) .
- static::$method((($b0 << 2) | ($b1 >> 6)) & 31) .
- static::$method((($b1 >> 1) ) & 31) .
- static::$method((($b1 << 4) | ($b2 >> 4)) & 31) .
- static::$method((($b2 << 1) ) & 31);
- if ($pad) {
- $dest .= '===';
- }
- } elseif ($i + 1 < $srcLen) {
- $b1 = $chunk[2];
- $dest .=
- static::$method( ($b0 >> 3) & 31) .
- static::$method((($b0 << 2) | ($b1 >> 6)) & 31) .
- static::$method((($b1 >> 1) ) & 31) .
- static::$method((($b1 << 4) ) & 31);
- if ($pad) {
- $dest .= '====';
- }
- } else {
- $dest .=
- static::$method( ($b0 >> 3) & 31) .
- static::$method( ($b0 << 2) & 31);
- if ($pad) {
- $dest .= '======';
- }
- }
- }
- return $dest;
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/Base32Hex.php b/vendor/paragonie/constant_time_encoding/src/Base32Hex.php
deleted file mode 100644
index 68fdad52c..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Base32Hex.php
+++ /dev/null
@@ -1,111 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Base32Hex
- * [0-9][A-V]
- *
- * @package ParagonIE\ConstantTime
- */
-abstract class Base32Hex extends Base32
-{
- /**
- * Uses bitwise operators instead of table-lookups to turn 5-bit integers
- * into 8-bit integers.
- *
- * @param int $src
- * @return int
- */
- protected static function decode5Bits(int $src): int
- {
- $ret = -1;
-
- // if ($src > 0x30 && $src < 0x3a) ret += $src - 0x2e + 1; // -47
- $ret += (((0x2f - $src) & ($src - 0x3a)) >> 8) & ($src - 47);
-
- // if ($src > 0x60 && $src < 0x77) ret += $src - 0x61 + 10 + 1; // -86
- $ret += (((0x60 - $src) & ($src - 0x77)) >> 8) & ($src - 86);
-
- return $ret;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 5-bit integers
- * into 8-bit integers.
- *
- * @param int $src
- * @return int
- */
- protected static function decode5BitsUpper(int $src): int
- {
- $ret = -1;
-
- // if ($src > 0x30 && $src < 0x3a) ret += $src - 0x2e + 1; // -47
- $ret += (((0x2f - $src) & ($src - 0x3a)) >> 8) & ($src - 47);
-
- // if ($src > 0x40 && $src < 0x57) ret += $src - 0x41 + 10 + 1; // -54
- $ret += (((0x40 - $src) & ($src - 0x57)) >> 8) & ($src - 54);
-
- return $ret;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 8-bit integers
- * into 5-bit integers.
- *
- * @param int $src
- * @return string
- */
- protected static function encode5Bits(int $src): string
- {
- $src += 0x30;
-
- // if ($src > 0x39) $src += 0x61 - 0x3a; // 39
- $src += ((0x39 - $src) >> 8) & 39;
-
- return \pack('C', $src);
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 8-bit integers
- * into 5-bit integers.
- *
- * Uppercase variant.
- *
- * @param int $src
- * @return string
- */
- protected static function encode5BitsUpper(int $src): string
- {
- $src += 0x30;
-
- // if ($src > 0x39) $src += 0x41 - 0x3a; // 7
- $src += ((0x39 - $src) >> 8) & 7;
-
- return \pack('C', $src);
- }
-} \ No newline at end of file
diff --git a/vendor/paragonie/constant_time_encoding/src/Base64.php b/vendor/paragonie/constant_time_encoding/src/Base64.php
deleted file mode 100644
index 4739e4895..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Base64.php
+++ /dev/null
@@ -1,271 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Base64
- * [A-Z][a-z][0-9]+/
- *
- * @package ParagonIE\ConstantTime
- */
-abstract class Base64 implements EncoderInterface
-{
- /**
- * Encode into Base64
- *
- * Base64 character set "[A-Z][a-z][0-9]+/"
- *
- * @param string $src
- * @return string
- * @throws \TypeError
- */
- public static function encode(string $src): string
- {
- return static::doEncode($src, true);
- }
-
- /**
- * Encode into Base64, no = padding
- *
- * Base64 character set "[A-Z][a-z][0-9]+/"
- *
- * @param string $src
- * @return string
- * @throws \TypeError
- */
- public static function encodeUnpadded(string $src): string
- {
- return static::doEncode($src, false);
- }
-
- /**
- * @param string $src
- * @param bool $pad Include = padding?
- * @return string
- * @throws \TypeError
- */
- protected static function doEncode(string $src, bool $pad = true): string
- {
- $dest = '';
- $srcLen = Binary::safeStrlen($src);
- // Main loop (no padding):
- for ($i = 0; $i + 3 <= $srcLen; $i += 3) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', Binary::safeSubstr($src, $i, 3));
- $b0 = $chunk[1];
- $b1 = $chunk[2];
- $b2 = $chunk[3];
-
- $dest .=
- static::encode6Bits( $b0 >> 2 ) .
- static::encode6Bits((($b0 << 4) | ($b1 >> 4)) & 63) .
- static::encode6Bits((($b1 << 2) | ($b2 >> 6)) & 63) .
- static::encode6Bits( $b2 & 63);
- }
- // The last chunk, which may have padding:
- if ($i < $srcLen) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', Binary::safeSubstr($src, $i, $srcLen - $i));
- $b0 = $chunk[1];
- if ($i + 1 < $srcLen) {
- $b1 = $chunk[2];
- $dest .=
- static::encode6Bits($b0 >> 2) .
- static::encode6Bits((($b0 << 4) | ($b1 >> 4)) & 63) .
- static::encode6Bits(($b1 << 2) & 63);
- if ($pad) {
- $dest .= '=';
- }
- } else {
- $dest .=
- static::encode6Bits( $b0 >> 2) .
- static::encode6Bits(($b0 << 4) & 63);
- if ($pad) {
- $dest .= '==';
- }
- }
- }
- return $dest;
- }
-
- /**
- * decode from base64 into binary
- *
- * Base64 character set "./[A-Z][a-z][0-9]"
- *
- * @param string $encodedString
- * @param bool $strictPadding
- * @return string
- * @throws \RangeException
- * @throws \TypeError
- * @psalm-suppress RedundantCondition
- */
- public static function decode(string $encodedString, bool $strictPadding = false): string
- {
- // Remove padding
- $srcLen = Binary::safeStrlen($encodedString);
- if ($srcLen === 0) {
- return '';
- }
-
- if ($strictPadding) {
- if (($srcLen & 3) === 0) {
- if ($encodedString[$srcLen - 1] === '=') {
- $srcLen--;
- if ($encodedString[$srcLen - 1] === '=') {
- $srcLen--;
- }
- }
- }
- if (($srcLen & 3) === 1) {
- throw new \RangeException(
- 'Incorrect padding'
- );
- }
- if ($encodedString[$srcLen - 1] === '=') {
- throw new \RangeException(
- 'Incorrect padding'
- );
- }
- } else {
- $encodedString = \rtrim($encodedString, '=');
- $srcLen = Binary::safeStrlen($encodedString);
- }
-
- $err = 0;
- $dest = '';
- // Main loop (no padding):
- for ($i = 0; $i + 4 <= $srcLen; $i += 4) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', Binary::safeSubstr($encodedString, $i, 4));
- $c0 = static::decode6Bits($chunk[1]);
- $c1 = static::decode6Bits($chunk[2]);
- $c2 = static::decode6Bits($chunk[3]);
- $c3 = static::decode6Bits($chunk[4]);
-
- $dest .= \pack(
- 'CCC',
- ((($c0 << 2) | ($c1 >> 4)) & 0xff),
- ((($c1 << 4) | ($c2 >> 2)) & 0xff),
- ((($c2 << 6) | $c3 ) & 0xff)
- );
- $err |= ($c0 | $c1 | $c2 | $c3) >> 8;
- }
- // The last chunk, which may have padding:
- if ($i < $srcLen) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', Binary::safeSubstr($encodedString, $i, $srcLen - $i));
- $c0 = static::decode6Bits($chunk[1]);
-
- if ($i + 2 < $srcLen) {
- $c1 = static::decode6Bits($chunk[2]);
- $c2 = static::decode6Bits($chunk[3]);
- $dest .= \pack(
- 'CC',
- ((($c0 << 2) | ($c1 >> 4)) & 0xff),
- ((($c1 << 4) | ($c2 >> 2)) & 0xff)
- );
- $err |= ($c0 | $c1 | $c2) >> 8;
- } elseif ($i + 1 < $srcLen) {
- $c1 = static::decode6Bits($chunk[2]);
- $dest .= \pack(
- 'C',
- ((($c0 << 2) | ($c1 >> 4)) & 0xff)
- );
- $err |= ($c0 | $c1) >> 8;
- } elseif ($i < $srcLen && $strictPadding) {
- $err |= 1;
- }
- }
- /** @var bool $check */
- $check = ($err === 0);
- if (!$check) {
- throw new \RangeException(
- 'Base64::decode() only expects characters in the correct base64 alphabet'
- );
- }
- return $dest;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 6-bit integers
- * into 8-bit integers.
- *
- * Base64 character set:
- * [A-Z] [a-z] [0-9] + /
- * 0x41-0x5a, 0x61-0x7a, 0x30-0x39, 0x2b, 0x2f
- *
- * @param int $src
- * @return int
- */
- protected static function decode6Bits(int $src): int
- {
- $ret = -1;
-
- // if ($src > 0x40 && $src < 0x5b) $ret += $src - 0x41 + 1; // -64
- $ret += (((0x40 - $src) & ($src - 0x5b)) >> 8) & ($src - 64);
-
- // if ($src > 0x60 && $src < 0x7b) $ret += $src - 0x61 + 26 + 1; // -70
- $ret += (((0x60 - $src) & ($src - 0x7b)) >> 8) & ($src - 70);
-
- // if ($src > 0x2f && $src < 0x3a) $ret += $src - 0x30 + 52 + 1; // 5
- $ret += (((0x2f - $src) & ($src - 0x3a)) >> 8) & ($src + 5);
-
- // if ($src == 0x2b) $ret += 62 + 1;
- $ret += (((0x2a - $src) & ($src - 0x2c)) >> 8) & 63;
-
- // if ($src == 0x2f) ret += 63 + 1;
- $ret += (((0x2e - $src) & ($src - 0x30)) >> 8) & 64;
-
- return $ret;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 8-bit integers
- * into 6-bit integers.
- *
- * @param int $src
- * @return string
- */
- protected static function encode6Bits(int $src): string
- {
- $diff = 0x41;
-
- // if ($src > 25) $diff += 0x61 - 0x41 - 26; // 6
- $diff += ((25 - $src) >> 8) & 6;
-
- // if ($src > 51) $diff += 0x30 - 0x61 - 26; // -75
- $diff -= ((51 - $src) >> 8) & 75;
-
- // if ($src > 61) $diff += 0x2b - 0x30 - 10; // -15
- $diff -= ((61 - $src) >> 8) & 15;
-
- // if ($src > 62) $diff += 0x2f - 0x2b - 1; // 3
- $diff += ((62 - $src) >> 8) & 3;
-
- return \pack('C', $src + $diff);
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/Base64DotSlash.php b/vendor/paragonie/constant_time_encoding/src/Base64DotSlash.php
deleted file mode 100644
index 8ad2e2bf1..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Base64DotSlash.php
+++ /dev/null
@@ -1,88 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Base64DotSlash
- * ./[A-Z][a-z][0-9]
- *
- * @package ParagonIE\ConstantTime
- */
-abstract class Base64DotSlash extends Base64
-{
- /**
- * Uses bitwise operators instead of table-lookups to turn 6-bit integers
- * into 8-bit integers.
- *
- * Base64 character set:
- * ./ [A-Z] [a-z] [0-9]
- * 0x2e-0x2f, 0x41-0x5a, 0x61-0x7a, 0x30-0x39
- *
- * @param int $src
- * @return int
- */
- protected static function decode6Bits(int $src): int
- {
- $ret = -1;
-
- // if ($src > 0x2d && $src < 0x30) ret += $src - 0x2e + 1; // -45
- $ret += (((0x2d - $src) & ($src - 0x30)) >> 8) & ($src - 45);
-
- // if ($src > 0x40 && $src < 0x5b) ret += $src - 0x41 + 2 + 1; // -62
- $ret += (((0x40 - $src) & ($src - 0x5b)) >> 8) & ($src - 62);
-
- // if ($src > 0x60 && $src < 0x7b) ret += $src - 0x61 + 28 + 1; // -68
- $ret += (((0x60 - $src) & ($src - 0x7b)) >> 8) & ($src - 68);
-
- // if ($src > 0x2f && $src < 0x3a) ret += $src - 0x30 + 54 + 1; // 7
- $ret += (((0x2f - $src) & ($src - 0x3a)) >> 8) & ($src + 7);
-
- return $ret;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 8-bit integers
- * into 6-bit integers.
- *
- * @param int $src
- * @return string
- */
- protected static function encode6Bits(int $src): string
- {
- $src += 0x2e;
-
- // if ($src > 0x2f) $src += 0x41 - 0x30; // 17
- $src += ((0x2f - $src) >> 8) & 17;
-
- // if ($src > 0x5a) $src += 0x61 - 0x5b; // 6
- $src += ((0x5a - $src) >> 8) & 6;
-
- // if ($src > 0x7a) $src += 0x30 - 0x7b; // -75
- $src -= ((0x7a - $src) >> 8) & 75;
-
- return \pack('C', $src);
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/Base64DotSlashOrdered.php b/vendor/paragonie/constant_time_encoding/src/Base64DotSlashOrdered.php
deleted file mode 100644
index dd1459e85..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Base64DotSlashOrdered.php
+++ /dev/null
@@ -1,82 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Base64DotSlashOrdered
- * ./[0-9][A-Z][a-z]
- *
- * @package ParagonIE\ConstantTime
- */
-abstract class Base64DotSlashOrdered extends Base64
-{
- /**
- * Uses bitwise operators instead of table-lookups to turn 6-bit integers
- * into 8-bit integers.
- *
- * Base64 character set:
- * [.-9] [A-Z] [a-z]
- * 0x2e-0x39, 0x41-0x5a, 0x61-0x7a
- *
- * @param int $src
- * @return int
- */
- protected static function decode6Bits(int $src): int
- {
- $ret = -1;
-
- // if ($src > 0x2d && $src < 0x3a) ret += $src - 0x2e + 1; // -45
- $ret += (((0x2d - $src) & ($src - 0x3a)) >> 8) & ($src - 45);
-
- // if ($src > 0x40 && $src < 0x5b) ret += $src - 0x41 + 12 + 1; // -52
- $ret += (((0x40 - $src) & ($src - 0x5b)) >> 8) & ($src - 52);
-
- // if ($src > 0x60 && $src < 0x7b) ret += $src - 0x61 + 38 + 1; // -58
- $ret += (((0x60 - $src) & ($src - 0x7b)) >> 8) & ($src - 58);
-
- return $ret;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 8-bit integers
- * into 6-bit integers.
- *
- * @param int $src
- * @return string
- */
- protected static function encode6Bits(int $src): string
- {
- $src += 0x2e;
-
- // if ($src > 0x39) $src += 0x41 - 0x3a; // 7
- $src += ((0x39 - $src) >> 8) & 7;
-
- // if ($src > 0x5a) $src += 0x61 - 0x5b; // 6
- $src += ((0x5a - $src) >> 8) & 6;
-
- return \pack('C', $src);
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/Base64UrlSafe.php b/vendor/paragonie/constant_time_encoding/src/Base64UrlSafe.php
deleted file mode 100644
index 1a4107527..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Base64UrlSafe.php
+++ /dev/null
@@ -1,95 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Base64UrlSafe
- * [A-Z][a-z][0-9]\-_
- *
- * @package ParagonIE\ConstantTime
- */
-abstract class Base64UrlSafe extends Base64
-{
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 6-bit integers
- * into 8-bit integers.
- *
- * Base64 character set:
- * [A-Z] [a-z] [0-9] - _
- * 0x41-0x5a, 0x61-0x7a, 0x30-0x39, 0x2d, 0x5f
- *
- * @param int $src
- * @return int
- */
- protected static function decode6Bits(int $src): int
- {
- $ret = -1;
-
- // if ($src > 0x40 && $src < 0x5b) $ret += $src - 0x41 + 1; // -64
- $ret += (((0x40 - $src) & ($src - 0x5b)) >> 8) & ($src - 64);
-
- // if ($src > 0x60 && $src < 0x7b) $ret += $src - 0x61 + 26 + 1; // -70
- $ret += (((0x60 - $src) & ($src - 0x7b)) >> 8) & ($src - 70);
-
- // if ($src > 0x2f && $src < 0x3a) $ret += $src - 0x30 + 52 + 1; // 5
- $ret += (((0x2f - $src) & ($src - 0x3a)) >> 8) & ($src + 5);
-
- // if ($src == 0x2c) $ret += 62 + 1;
- $ret += (((0x2c - $src) & ($src - 0x2e)) >> 8) & 63;
-
- // if ($src == 0x5f) ret += 63 + 1;
- $ret += (((0x5e - $src) & ($src - 0x60)) >> 8) & 64;
-
- return $ret;
- }
-
- /**
- * Uses bitwise operators instead of table-lookups to turn 8-bit integers
- * into 6-bit integers.
- *
- * @param int $src
- * @return string
- */
- protected static function encode6Bits(int $src): string
- {
- $diff = 0x41;
-
- // if ($src > 25) $diff += 0x61 - 0x41 - 26; // 6
- $diff += ((25 - $src) >> 8) & 6;
-
- // if ($src > 51) $diff += 0x30 - 0x61 - 26; // -75
- $diff -= ((51 - $src) >> 8) & 75;
-
- // if ($src > 61) $diff += 0x2d - 0x30 - 10; // -13
- $diff -= ((61 - $src) >> 8) & 13;
-
- // if ($src > 62) $diff += 0x5f - 0x2b - 1; // 3
- $diff += ((62 - $src) >> 8) & 49;
-
- return \pack('C', $src + $diff);
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/Binary.php b/vendor/paragonie/constant_time_encoding/src/Binary.php
deleted file mode 100644
index 38dbc4e66..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Binary.php
+++ /dev/null
@@ -1,85 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Binary
- *
- * Binary string operators that don't choke on
- * mbstring.func_overload
- *
- * @package ParagonIE\ConstantTime
- */
-abstract class Binary
-{
- /**
- * Safe string length
- *
- * @ref mbstring.func_overload
- *
- * @param string $str
- * @return int
- */
- public static function safeStrlen(string $str): int
- {
- if (\function_exists('mb_strlen')) {
- return (int) \mb_strlen($str, '8bit');
- } else {
- return \strlen($str);
- }
- }
-
- /**
- * Safe substring
- *
- * @ref mbstring.func_overload
- *
- * @staticvar boolean $exists
- * @param string $str
- * @param int $start
- * @param int $length
- * @return string
- * @throws \TypeError
- */
- public static function safeSubstr(
- string $str,
- int $start = 0,
- $length = null
- ): string {
- if ($length === 0) {
- return '';
- }
- if (\function_exists('mb_substr')) {
- return \mb_substr($str, $start, $length, '8bit');
- }
- // Unlike mb_substr(), substr() doesn't accept NULL for length
- if ($length !== null) {
- return \substr($str, $start, $length);
- } else {
- return \substr($str, $start);
- }
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/EncoderInterface.php b/vendor/paragonie/constant_time_encoding/src/EncoderInterface.php
deleted file mode 100644
index 7aeee55a8..000000000
--- a/vendor/paragonie/constant_time_encoding/src/EncoderInterface.php
+++ /dev/null
@@ -1,52 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Interface EncoderInterface
- * @package ParagonIE\ConstantTime
- */
-interface EncoderInterface
-{
- /**
- * Convert a binary string into a hexadecimal string without cache-timing
- * leaks
- *
- * @param string $binString (raw binary)
- * @return string
- */
- public static function encode(string $binString): string;
-
- /**
- * Convert a binary string into a hexadecimal string without cache-timing
- * leaks
- *
- * @param string $encodedString
- * @param bool $strictPadding Error on invalid padding
- * @return string (raw binary)
- */
- public static function decode(string $encodedString, bool $strictPadding = false): string;
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/Encoding.php b/vendor/paragonie/constant_time_encoding/src/Encoding.php
deleted file mode 100644
index 896a66841..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Encoding.php
+++ /dev/null
@@ -1,260 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Encoding
- * @package ParagonIE\ConstantTime
- */
-abstract class Encoding
-{
- /**
- * RFC 4648 Base32 encoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32Encode(string $str): string
- {
- return Base32::encode($str);
- }
-
- /**
- * RFC 4648 Base32 encoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32EncodeUpper(string $str): string
- {
- return Base32::encodeUpper($str);
- }
-
- /**
- * RFC 4648 Base32 decoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32Decode(string $str): string
- {
- return Base32::decode($str);
- }
-
- /**
- * RFC 4648 Base32 decoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32DecodeUpper(string $str): string
- {
- return Base32::decodeUpper($str);
- }
-
- /**
- * RFC 4648 Base32 encoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32HexEncode(string $str): string
- {
- return Base32Hex::encode($str);
- }
-
- /**
- * RFC 4648 Base32Hex encoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32HexEncodeUpper(string $str): string
- {
- return Base32Hex::encodeUpper($str);
- }
-
- /**
- * RFC 4648 Base32Hex decoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32HexDecode(string $str): string
- {
- return Base32Hex::decode($str);
- }
-
- /**
- * RFC 4648 Base32Hex decoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32HexDecodeUpper(string $str): string
- {
- return Base32Hex::decodeUpper($str);
- }
-
- /**
- * RFC 4648 Base64 encoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base64Encode(string $str): string
- {
- return Base64::encode($str);
- }
-
- /**
- * RFC 4648 Base64 decoding
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base64Decode(string $str): string
- {
- return Base64::decode($str);
- }
-
- /**
- * Encode into Base64
- *
- * Base64 character set "./[A-Z][a-z][0-9]"
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base64EncodeDotSlash(string $str): string
- {
- return Base64DotSlash::encode($str);
- }
-
- /**
- * Decode from base64 to raw binary
- *
- * Base64 character set "./[A-Z][a-z][0-9]"
- *
- * @param string $str
- * @return string
- * @throws \RangeException
- * @throws \TypeError
- */
- public static function base64DecodeDotSlash(string $str): string
- {
- return Base64DotSlash::decode($str);
- }
-
- /**
- * Encode into Base64
- *
- * Base64 character set "[.-9][A-Z][a-z]" or "./[0-9][A-Z][a-z]"
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base64EncodeDotSlashOrdered(string $str): string
- {
- return Base64DotSlashOrdered::encode($str);
- }
-
- /**
- * Decode from base64 to raw binary
- *
- * Base64 character set "[.-9][A-Z][a-z]" or "./[0-9][A-Z][a-z]"
- *
- * @param string $str
- * @return string
- * @throws \RangeException
- * @throws \TypeError
- */
- public static function base64DecodeDotSlashOrdered(string $str): string
- {
- return Base64DotSlashOrdered::decode($str);
- }
-
- /**
- * Convert a binary string into a hexadecimal string without cache-timing
- * leaks
- *
- * @param string $bin_string (raw binary)
- * @return string
- * @throws \TypeError
- */
- public static function hexEncode(string $bin_string): string
- {
- return Hex::encode($bin_string);
- }
-
- /**
- * Convert a hexadecimal string into a binary string without cache-timing
- * leaks
- *
- * @param string $hex_string
- * @return string (raw binary)
- * @throws \RangeException
- */
- public static function hexDecode(string $hex_string): string
- {
- return Hex::decode($hex_string);
- }
-
- /**
- * Convert a binary string into a hexadecimal string without cache-timing
- * leaks
- *
- * @param string $bin_string (raw binary)
- * @return string
- * @throws \TypeError
- */
- public static function hexEncodeUpper(string $bin_string): string
- {
- return Hex::encodeUpper($bin_string);
- }
-
- /**
- * Convert a binary string into a hexadecimal string without cache-timing
- * leaks
- *
- * @param string $bin_string (raw binary)
- * @return string
- */
- public static function hexDecodeUpper(string $bin_string): string
- {
- return Hex::decode($bin_string);
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/Hex.php b/vendor/paragonie/constant_time_encoding/src/Hex.php
deleted file mode 100644
index b1b05a098..000000000
--- a/vendor/paragonie/constant_time_encoding/src/Hex.php
+++ /dev/null
@@ -1,159 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class Hex
- * @package ParagonIE\ConstantTime
- */
-abstract class Hex implements EncoderInterface
-{
- /**
- * Convert a binary string into a hexadecimal string without cache-timing
- * leaks
- *
- * @param string $binString (raw binary)
- * @return string
- * @throws \TypeError
- */
- public static function encode(string $binString): string
- {
- /** @var string $hex */
- $hex = '';
- $len = Binary::safeStrlen($binString);
- for ($i = 0; $i < $len; ++$i) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C', Binary::safeSubstr($binString, $i, 1));
- /** @var int $c */
- $c = $chunk[1] & 0xf;
- /** @var int $b */
- $b = $chunk[1] >> 4;
-
- $hex .= pack(
- 'CC',
- (87 + $b + ((($b - 10) >> 8) & ~38)),
- (87 + $c + ((($c - 10) >> 8) & ~38))
- );
- }
- return $hex;
- }
-
- /**
- * Convert a binary string into a hexadecimal string without cache-timing
- * leaks, returning uppercase letters (as per RFC 4648)
- *
- * @param string $binString (raw binary)
- * @return string
- * @throws \TypeError
- */
- public static function encodeUpper(string $binString): string
- {
- /** @var string $hex */
- $hex = '';
- /** @var int $len */
- $len = Binary::safeStrlen($binString);
-
- for ($i = 0; $i < $len; ++$i) {
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C', Binary::safeSubstr($binString, $i, 2));
- /** @var int $c */
- $c = $chunk[1] & 0xf;
- /** @var int $b */
- $b = $chunk[1] >> 4;
-
- $hex .= pack(
- 'CC',
- (55 + $b + ((($b - 10) >> 8) & ~6)),
- (55 + $c + ((($c - 10) >> 8) & ~6))
- );
- }
- return $hex;
- }
-
- /**
- * Convert a hexadecimal string into a binary string without cache-timing
- * leaks
- *
- * @param string $encodedString
- * @param bool $strictPadding
- * @return string (raw binary)
- * @throws \RangeException
- */
- public static function decode(string $encodedString, bool $strictPadding = false): string
- {
- /** @var int $hex_pos */
- $hex_pos = 0;
- /** @var string $bin */
- $bin = '';
- /** @var int $c_acc */
- $c_acc = 0;
- /** @var int $hex_len */
- $hex_len = Binary::safeStrlen($encodedString);
- /** @var int $state */
- $state = 0;
- if (($hex_len & 1) !== 0) {
- if ($strictPadding) {
- throw new \RangeException(
- 'Expected an even number of hexadecimal characters'
- );
- } else {
- $encodedString = '0' . $encodedString;
- ++$hex_len;
- }
- }
-
- /** @var array<int, int> $chunk */
- $chunk = \unpack('C*', $encodedString);
- while ($hex_pos < $hex_len) {
- ++$hex_pos;
- /** @var int $c */
- $c = $chunk[$hex_pos];
- /** @var int $c_num */
- $c_num = $c ^ 48;
- /** @var int $c_num0 */
- $c_num0 = ($c_num - 10) >> 8;
- /** @var int $c_alpha */
- $c_alpha = ($c & ~32) - 55;
- /** @var int $c_alpha0 */
- $c_alpha0 = (($c_alpha - 10) ^ ($c_alpha - 16)) >> 8;
-
- if (($c_num0 | $c_alpha0) === 0) {
- throw new \RangeException(
- 'Expected hexadecimal character'
- );
- }
- /** @var int $c_val */
- $c_val = ($c_num0 & $c_num) | ($c_alpha & $c_alpha0);
- if ($state === 0) {
- $c_acc = $c_val * 16;
- } else {
- $bin .= \pack('C', $c_acc | $c_val);
- }
- $state ^= 1;
- }
- return $bin;
- }
-}
diff --git a/vendor/paragonie/constant_time_encoding/src/RFC4648.php b/vendor/paragonie/constant_time_encoding/src/RFC4648.php
deleted file mode 100644
index 492cad00e..000000000
--- a/vendor/paragonie/constant_time_encoding/src/RFC4648.php
+++ /dev/null
@@ -1,175 +0,0 @@
-<?php
-declare(strict_types=1);
-namespace ParagonIE\ConstantTime;
-
-/**
- * Copyright (c) 2016 - 2018 Paragon Initiative Enterprises.
- * Copyright (c) 2014 Steve "Sc00bz" Thomas (steve at tobtu dot com)
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in all
- * copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-/**
- * Class RFC4648
- *
- * This class conforms strictly to the RFC
- *
- * @package ParagonIE\ConstantTime
- */
-abstract class RFC4648
-{
- /**
- * RFC 4648 Base64 encoding
- *
- * "foo" -> "Zm9v"
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base64Encode(string $str): string
- {
- return Base64::encode($str);
- }
-
- /**
- * RFC 4648 Base64 decoding
- *
- * "Zm9v" -> "foo"
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base64Decode(string $str): string
- {
- return Base64::decode($str, true);
- }
-
- /**
- * RFC 4648 Base64 (URL Safe) encoding
- *
- * "foo" -> "Zm9v"
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base64UrlSafeEncode(string $str): string
- {
- return Base64UrlSafe::encode($str);
- }
-
- /**
- * RFC 4648 Base64 (URL Safe) decoding
- *
- * "Zm9v" -> "foo"
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base64UrlSafeDecode(string $str): string
- {
- return Base64UrlSafe::decode($str, true);
- }
-
- /**
- * RFC 4648 Base32 encoding
- *
- * "foo" -> "MZXW6==="
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32Encode(string $str): string
- {
- return Base32::encodeUpper($str);
- }
-
- /**
- * RFC 4648 Base32 encoding
- *
- * "MZXW6===" -> "foo"
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32Decode(string $str): string
- {
- return Base32::decodeUpper($str, true);
- }
-
- /**
- * RFC 4648 Base32-Hex encoding
- *
- * "foo" -> "CPNMU==="
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32HexEncode(string $str): string
- {
- return Base32::encodeUpper($str);
- }
-
- /**
- * RFC 4648 Base32-Hex decoding
- *
- * "CPNMU===" -> "foo"
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base32HexDecode(string $str): string
- {
- return Base32::decodeUpper($str, true);
- }
-
- /**
- * RFC 4648 Base16 decoding
- *
- * "foo" -> "666F6F"
- *
- * @param string $str
- * @return string
- * @throws \TypeError
- */
- public static function base16Encode(string $str): string
- {
- return Hex::encodeUpper($str);
- }
-
- /**
- * RFC 4648 Base16 decoding
- *
- * "666F6F" -> "foo"
- *
- * @param string $str
- * @return string
- */
- public static function base16Decode(string $str): string
- {
- return Hex::decode($str, true);
- }
-} \ No newline at end of file
diff --git a/vendor/paragonie/random_compat/LICENSE b/vendor/paragonie/random_compat/LICENSE
deleted file mode 100644
index 45c7017df..000000000
--- a/vendor/paragonie/random_compat/LICENSE
+++ /dev/null
@@ -1,22 +0,0 @@
-The MIT License (MIT)
-
-Copyright (c) 2015 Paragon Initiative Enterprises
-
-Permission is hereby granted, free of charge, to any person obtaining a copy
-of this software and associated documentation files (the "Software"), to deal
-in the Software without restriction, including without limitation the rights
-to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
-copies of the Software, and to permit persons to whom the Software is
-furnished to do so, subject to the following conditions:
-
-The above copyright notice and this permission notice shall be included in all
-copies or substantial portions of the Software.
-
-THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
-IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
-FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
-AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
-LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
-SOFTWARE.
-
diff --git a/vendor/paragonie/random_compat/build-phar.sh b/vendor/paragonie/random_compat/build-phar.sh
deleted file mode 100755
index b4a5ba31c..000000000
--- a/vendor/paragonie/random_compat/build-phar.sh
+++ /dev/null
@@ -1,5 +0,0 @@
-#!/usr/bin/env bash
-
-basedir=$( dirname $( readlink -f ${BASH_SOURCE[0]} ) )
-
-php -dphar.readonly=0 "$basedir/other/build_phar.php" $* \ No newline at end of file
diff --git a/vendor/paragonie/random_compat/composer.json b/vendor/paragonie/random_compat/composer.json
deleted file mode 100644
index f2b9c4e51..000000000
--- a/vendor/paragonie/random_compat/composer.json
+++ /dev/null
@@ -1,34 +0,0 @@
-{
- "name": "paragonie/random_compat",
- "description": "PHP 5.x polyfill for random_bytes() and random_int() from PHP 7",
- "keywords": [
- "csprng",
- "random",
- "polyfill",
- "pseudorandom"
- ],
- "license": "MIT",
- "type": "library",
- "authors": [
- {
- "name": "Paragon Initiative Enterprises",
- "email": "security@paragonie.com",
- "homepage": "https://paragonie.com"
- }
- ],
- "support": {
- "issues": "https://github.com/paragonie/random_compat/issues",
- "email": "info@paragonie.com",
- "source": "https://github.com/paragonie/random_compat"
- },
- "require": {
- "php": ">= 7"
- },
- "require-dev": {
- "vimeo/psalm": "^1",
- "phpunit/phpunit": "4.*|5.*"
- },
- "suggest": {
- "ext-libsodium": "Provides a modern crypto API that can be used to generate random bytes."
- }
-}
diff --git a/vendor/paragonie/random_compat/dist/random_compat.phar.pubkey b/vendor/paragonie/random_compat/dist/random_compat.phar.pubkey
deleted file mode 100644
index eb50ebfcd..000000000
--- a/vendor/paragonie/random_compat/dist/random_compat.phar.pubkey
+++ /dev/null
@@ -1,5 +0,0 @@
------BEGIN PUBLIC KEY-----
-MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEEd+wCqJDrx5B4OldM0dQE0ZMX+lx1ZWm
-pui0SUqD4G29L3NGsz9UhJ/0HjBdbnkhIK5xviT0X5vtjacF6ajgcCArbTB+ds+p
-+h7Q084NuSuIpNb6YPfoUFgC/CL9kAoc
------END PUBLIC KEY-----
diff --git a/vendor/paragonie/random_compat/dist/random_compat.phar.pubkey.asc b/vendor/paragonie/random_compat/dist/random_compat.phar.pubkey.asc
deleted file mode 100644
index 6a1d7f300..000000000
--- a/vendor/paragonie/random_compat/dist/random_compat.phar.pubkey.asc
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.22 (MingW32)
-
-iQEcBAABAgAGBQJWtW1hAAoJEGuXocKCZATaJf0H+wbZGgskK1dcRTsuVJl9IWip
-QwGw/qIKI280SD6/ckoUMxKDCJiFuPR14zmqnS36k7N5UNPnpdTJTS8T11jttSpg
-1LCmgpbEIpgaTah+cELDqFCav99fS+bEiAL5lWDAHBTE/XPjGVCqeehyPYref4IW
-NDBIEsvnHPHPLsn6X5jq4+Yj5oUixgxaMPiR+bcO4Sh+RzOVB6i2D0upWfRXBFXA
-NNnsg9/zjvoC7ZW73y9uSH+dPJTt/Vgfeiv52/v41XliyzbUyLalf02GNPY+9goV
-JHG1ulEEBJOCiUD9cE1PUIJwHA/HqyhHIvV350YoEFiHl8iSwm7SiZu5kPjaq74=
-=B6+8
------END PGP SIGNATURE-----
diff --git a/vendor/paragonie/random_compat/lib/random.php b/vendor/paragonie/random_compat/lib/random.php
deleted file mode 100644
index c7731a56f..000000000
--- a/vendor/paragonie/random_compat/lib/random.php
+++ /dev/null
@@ -1,32 +0,0 @@
-<?php
-/**
- * Random_* Compatibility Library
- * for using the new PHP 7 random_* API in PHP 5 projects
- *
- * @version 2.99.99
- * @released 2018-06-06
- *
- * The MIT License (MIT)
- *
- * Copyright (c) 2015 - 2018 Paragon Initiative Enterprises
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to deal
- * in the Software without restriction, including without limitation the rights
- * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
- * copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in
- * all copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
- * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
- * SOFTWARE.
- */
-
-// NOP
diff --git a/vendor/paragonie/random_compat/other/build_phar.php b/vendor/paragonie/random_compat/other/build_phar.php
deleted file mode 100644
index 70ef4b2ed..000000000
--- a/vendor/paragonie/random_compat/other/build_phar.php
+++ /dev/null
@@ -1,57 +0,0 @@
-<?php
-$dist = dirname(__DIR__).'/dist';
-if (!is_dir($dist)) {
- mkdir($dist, 0755);
-}
-if (file_exists($dist.'/random_compat.phar')) {
- unlink($dist.'/random_compat.phar');
-}
-$phar = new Phar(
- $dist.'/random_compat.phar',
- FilesystemIterator::CURRENT_AS_FILEINFO | \FilesystemIterator::KEY_AS_FILENAME,
- 'random_compat.phar'
-);
-rename(
- dirname(__DIR__).'/lib/random.php',
- dirname(__DIR__).'/lib/index.php'
-);
-$phar->buildFromDirectory(dirname(__DIR__).'/lib');
-rename(
- dirname(__DIR__).'/lib/index.php',
- dirname(__DIR__).'/lib/random.php'
-);
-
-/**
- * If we pass an (optional) path to a private key as a second argument, we will
- * sign the Phar with OpenSSL.
- *
- * If you leave this out, it will produce an unsigned .phar!
- */
-if ($argc > 1) {
- if (!@is_readable($argv[1])) {
- echo 'Could not read the private key file:', $argv[1], "\n";
- exit(255);
- }
- $pkeyFile = file_get_contents($argv[1]);
-
- $private = openssl_get_privatekey($pkeyFile);
- if ($private !== false) {
- $pkey = '';
- openssl_pkey_export($private, $pkey);
- $phar->setSignatureAlgorithm(Phar::OPENSSL, $pkey);
-
- /**
- * Save the corresponding public key to the file
- */
- if (!@is_readable($dist.'/random_compat.phar.pubkey')) {
- $details = openssl_pkey_get_details($private);
- file_put_contents(
- $dist.'/random_compat.phar.pubkey',
- $details['key']
- );
- }
- } else {
- echo 'An error occurred reading the private key from OpenSSL.', "\n";
- exit(255);
- }
-}
diff --git a/vendor/paragonie/random_compat/psalm-autoload.php b/vendor/paragonie/random_compat/psalm-autoload.php
deleted file mode 100644
index d71d1b818..000000000
--- a/vendor/paragonie/random_compat/psalm-autoload.php
+++ /dev/null
@@ -1,9 +0,0 @@
-<?php
-
-require_once 'lib/byte_safe_strings.php';
-require_once 'lib/cast_to_int.php';
-require_once 'lib/error_polyfill.php';
-require_once 'other/ide_stubs/libsodium.php';
-require_once 'lib/random.php';
-
-$int = random_int(0, 65536);
diff --git a/vendor/paragonie/random_compat/psalm.xml b/vendor/paragonie/random_compat/psalm.xml
deleted file mode 100644
index 596d99dd6..000000000
--- a/vendor/paragonie/random_compat/psalm.xml
+++ /dev/null
@@ -1,19 +0,0 @@
-<?xml version="1.0"?>
-<psalm
- autoloader="psalm-autoload.php"
- stopOnFirstError="false"
- useDocblockTypes="true"
->
- <projectFiles>
- <directory name="lib" />
- </projectFiles>
- <issueHandlers>
- <RedundantConditionGivenDocblockType errorLevel="info" />
- <UnresolvableInclude errorLevel="info" />
- <DuplicateClass errorLevel="info" />
- <InvalidOperand errorLevel="info" />
- <UndefinedConstant errorLevel="info" />
- <MissingReturnType errorLevel="info" />
- <InvalidReturnType errorLevel="info" />
- </issueHandlers>
-</psalm>
diff --git a/vendor/phpseclib/phpseclib/.github/FUNDING.yml b/vendor/phpseclib/phpseclib/.github/FUNDING.yml
deleted file mode 100644
index dc4ccd96e..000000000
--- a/vendor/phpseclib/phpseclib/.github/FUNDING.yml
+++ /dev/null
@@ -1,12 +0,0 @@
-# These are supported funding model platforms
-
-github: terrafrost
-patreon: phpseclib
-open_collective: # Replace with a single Open Collective username
-ko_fi: # Replace with a single Ko-fi username
-tidelift: "packagist/phpseclib/phpseclib"
-community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
-liberapay: # Replace with a single Liberapay username
-issuehunt: # Replace with a single IssueHunt username
-otechie: # Replace with a single Otechie username
-custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2']
diff --git a/vendor/phpseclib/phpseclib/README.md b/vendor/phpseclib/phpseclib/README.md
index 7df111bf5..099486dc9 100644
--- a/vendor/phpseclib/phpseclib/README.md
+++ b/vendor/phpseclib/phpseclib/README.md
@@ -1,6 +1,6 @@
# phpseclib - PHP Secure Communications Library
-[![Build Status](https://travis-ci.com/phpseclib/phpseclib.svg?branch=3.0)](https://travis-ci.com/phpseclib/phpseclib)
+[![Build Status](https://travis-ci.com/phpseclib/phpseclib.svg?branch=2.0)](https://travis-ci.com/phpseclib/phpseclib)
## Supporting phpseclib
@@ -19,7 +19,7 @@ SSH-2, SFTP, X.509, an arbitrary-precision integer arithmetic library, Ed25519 /
## Documentation
* [Documentation / Manual](https://phpseclib.com/)
-* [API Documentation](https://api.phpseclib.com/3.0/) (generated by Doctum)
+* [API Documentation](https://api.phpseclib.com/2.0/) (generated by Doctum)
## Branches
diff --git a/vendor/phpseclib/phpseclib/composer.json b/vendor/phpseclib/phpseclib/composer.json
index 34dc9993d..08b9c7c91 100644
--- a/vendor/phpseclib/phpseclib/composer.json
+++ b/vendor/phpseclib/phpseclib/composer.json
@@ -51,13 +51,11 @@
}
],
"require": {
- "paragonie/constant_time_encoding": "^1|^2",
- "paragonie/random_compat": "^1.4|^2.0|^9.99.99",
- "php": ">=5.6.1"
+ "php": ">=5.3.3"
},
"require-dev": {
"phing/phing": "~2.7",
- "phpunit/phpunit": "^5.7|^6.0|^9.4",
+ "phpunit/phpunit": "^4.8.35|^5.7|^6.0|^9.4",
"squizlabs/php_codesniffer": "~2.0"
},
"suggest": {
@@ -71,7 +69,7 @@
"phpseclib/bootstrap.php"
],
"psr-4": {
- "phpseclib3\\": "phpseclib/"
+ "phpseclib\\": "phpseclib/"
}
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Common/Functions/Strings.php b/vendor/phpseclib/phpseclib/phpseclib/Common/Functions/Strings.php
deleted file mode 100644
index 666fce59f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Common/Functions/Strings.php
+++ /dev/null
@@ -1,387 +0,0 @@
-<?php
-
-/**
- * Common String Functions
- *
- * PHP version 5
- *
- * @category Common
- * @package Functions\Strings
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Common\Functions;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Math\Common\FiniteField;
-
-/**
- * Common String Functions
- *
- * @package Functions\Strings
- * @author Jim Wigginton <terrafrost@php.net>
- */
-abstract class Strings
-{
- /**
- * String Shift
- *
- * Inspired by array_shift
- *
- * @param string $string
- * @param int $index
- * @access public
- * @return string
- */
- public static function shift(&$string, $index = 1)
- {
- $substr = substr($string, 0, $index);
- $string = substr($string, $index);
- return $substr;
- }
-
- /**
- * String Pop
- *
- * Inspired by array_pop
- *
- * @param string $string
- * @param int $index
- * @access public
- * @return string
- */
- public static function pop(&$string, $index = 1)
- {
- $substr = substr($string, -$index);
- $string = substr($string, 0, -$index);
- return $substr;
- }
-
- /**
- * Parse SSH2-style string
- *
- * Returns either an array or a boolean if $data is malformed.
- *
- * Valid characters for $format are as follows:
- *
- * C = byte
- * b = boolean (true/false)
- * N = uint32
- * s = string
- * i = mpint
- * L = name-list
- *
- * uint64 is not supported.
- *
- * @param string $format
- * @param string $data
- * @return mixed
- */
- public static function unpackSSH2($format, &$data)
- {
- $format = self::formatPack($format);
- $result = [];
- for ($i = 0; $i < strlen($format); $i++) {
- switch ($format[$i]) {
- case 'C':
- case 'b':
- if (!strlen($data)) {
- throw new \LengthException('At least one byte needs to be present for successful C / b decodes');
- }
- break;
- case 'N':
- case 'i':
- case 's':
- case 'L':
- if (strlen($data) < 4) {
- throw new \LengthException('At least four byte needs to be present for successful N / i / s / L decodes');
- }
- break;
- default:
- throw new \InvalidArgumentException('$format contains an invalid character');
- }
- switch ($format[$i]) {
- case 'C':
- $result[] = ord(self::shift($data));
- continue 2;
- case 'b':
- $result[] = ord(self::shift($data)) != 0;
- continue 2;
- case 'N':
- list(, $temp) = unpack('N', self::shift($data, 4));
- $result[] = $temp;
- continue 2;
- }
- list(, $length) = unpack('N', self::shift($data, 4));
- if (strlen($data) < $length) {
- throw new \LengthException("$length bytes needed; " . strlen($data) . ' bytes available');
- }
- $temp = self::shift($data, $length);
- switch ($format[$i]) {
- case 'i':
- $result[] = new BigInteger($temp, -256);
- break;
- case 's':
- $result[] = $temp;
- break;
- case 'L':
- $result[] = explode(',', $temp);
- }
- }
-
- return $result;
- }
-
- /**
- * Create SSH2-style string
- *
- * @param string[] ...$elements
- * @access public
- * @return mixed
- */
- public static function packSSH2(...$elements)
- {
- $format = self::formatPack($elements[0]);
- array_shift($elements);
- if (strlen($format) != count($elements)) {
- throw new \InvalidArgumentException('There must be as many arguments as there are characters in the $format string');
- }
- $result = '';
- for ($i = 0; $i < strlen($format); $i++) {
- $element = $elements[$i];
- switch ($format[$i]) {
- case 'C':
- if (!is_int($element)) {
- throw new \InvalidArgumentException('Bytes must be represented as an integer between 0 and 255, inclusive.');
- }
- $result.= pack('C', $element);
- break;
- case 'b':
- if (!is_bool($element)) {
- throw new \InvalidArgumentException('A boolean parameter was expected.');
- }
- $result.= $element ? "\1" : "\0";
- break;
- case 'N':
- if (is_float($element)) {
- $element = (int) $element;
- }
- if (!is_int($element)) {
- throw new \InvalidArgumentException('An integer was expected.');
- }
- $result.= pack('N', $element);
- break;
- case 's':
- if (!self::is_stringable($element)) {
- throw new \InvalidArgumentException('A string was expected.');
- }
- $result.= pack('Na*', strlen($element), $element);
- break;
- case 'i':
- if (!$element instanceof BigInteger && !$element instanceof FiniteField\Integer) {
- throw new \InvalidArgumentException('A phpseclib3\Math\BigInteger or phpseclib3\Math\Common\FiniteField\Integer object was expected.');
- }
- $element = $element->toBytes(true);
- $result.= pack('Na*', strlen($element), $element);
- break;
- case 'L':
- if (!is_array($element)) {
- throw new \InvalidArgumentException('An array was expected.');
- }
- $element = implode(',', $element);
- $result.= pack('Na*', strlen($element), $element);
- break;
- default:
- throw new \InvalidArgumentException('$format contains an invalid character');
- }
- }
- return $result;
- }
-
- /**
- * Expand a pack string
- *
- * Converts C5 to CCCCC, for example.
- *
- * @access private
- * @param string $format
- * @return string
- */
- private static function formatPack($format)
- {
- $parts = preg_split('#(\d+)#', $format, -1, PREG_SPLIT_DELIM_CAPTURE);
- $format = '';
- for ($i = 1; $i < count($parts); $i+=2) {
- $format.= substr($parts[$i - 1], 0, -1) . str_repeat(substr($parts[$i - 1], -1), $parts[$i]);
- }
- $format.= $parts[$i - 1];
-
- return $format;
- }
-
- /**
- * Convert binary data into bits
- *
- * bin2hex / hex2bin refer to base-256 encoded data as binary, whilst
- * decbin / bindec refer to base-2 encoded data as binary. For the purposes
- * of this function, bin refers to base-256 encoded data whilst bits refers
- * to base-2 encoded data
- *
- * @access public
- * @param string $x
- * @return string
- */
- public static function bits2bin($x)
- {
- /*
- // the pure-PHP approach is faster than the GMP approach
- if (function_exists('gmp_export')) {
- return strlen($x) ? gmp_export(gmp_init($x, 2)) : gmp_init(0);
- }
- */
-
- if (preg_match('#[^01]#', $x)) {
- throw new \RuntimeException('The only valid characters are 0 and 1');
- }
-
- if (!defined('PHP_INT_MIN')) {
- define('PHP_INT_MIN', ~PHP_INT_MAX);
- }
-
- $length = strlen($x);
- if (!$length) {
- return '';
- }
- $block_size = PHP_INT_SIZE << 3;
- $pad = $block_size - ($length % $block_size);
- if ($pad != $block_size) {
- $x = str_repeat('0', $pad) . $x;
- }
-
- $parts = str_split($x, $block_size);
- $str = '';
- foreach ($parts as $part) {
- $xor = $part[0] == '1' ? PHP_INT_MIN : 0;
- $part[0] = '0';
- $str.= pack(
- PHP_INT_SIZE == 4 ? 'N' : 'J',
- $xor ^ eval('return 0b' . $part . ';')
- );
- }
- return ltrim($str, "\0");
- }
-
- /**
- * Convert bits to binary data
- *
- * @access public
- * @param string $x
- * @return string
- */
- public static function bin2bits($x)
- {
- /*
- // the pure-PHP approach is slower than the GMP approach BUT
- // i want to the pure-PHP version to be easily unit tested as well
- if (function_exists('gmp_import')) {
- return gmp_strval(gmp_import($x), 2);
- }
- */
-
- $len = strlen($x);
- $mod = $len % PHP_INT_SIZE;
- if ($mod) {
- $x = str_pad($x, $len + PHP_INT_SIZE - $mod, "\0", STR_PAD_LEFT);
- }
-
- $bits = '';
- if (PHP_INT_SIZE == 4) {
- $digits = unpack('N*', $x);
- foreach ($digits as $digit) {
- $bits.= sprintf('%032b', $digit);
- }
- } else {
- $digits = unpack('J*', $x);
- foreach ($digits as $digit) {
- $bits.= sprintf('%064b', $digit);
- }
- }
-
- return ltrim($bits, '0');
- }
-
- /**
- * Switch Endianness Bit Order
- *
- * @access public
- * @param string $x
- * @return string
- */
- public static function switchEndianness($x)
- {
- $r = '';
- // from http://graphics.stanford.edu/~seander/bithacks.html#ReverseByteWith32Bits
- for ($i = strlen($x) - 1; $i >= 0; $i--) {
- $b = ord($x[$i]);
- $p1 = ($b * 0x0802) & 0x22110;
- $p2 = ($b * 0x8020) & 0x88440;
- $r.= chr(
- (($p1 | $p2) * 0x10101) >> 16
- );
- }
- return $r;
- }
-
- /**
- * Increment the current string
- *
- * @param string $var
- * @return string
- * @access public
- */
- public static function increment_str(&$var)
- {
- for ($i = 4; $i <= strlen($var); $i+= 4) {
- $temp = substr($var, -$i, 4);
- switch ($temp) {
- case "\xFF\xFF\xFF\xFF":
- $var = substr_replace($var, "\x00\x00\x00\x00", -$i, 4);
- break;
- case "\x7F\xFF\xFF\xFF":
- $var = substr_replace($var, "\x80\x00\x00\x00", -$i, 4);
- return $var;
- default:
- $temp = unpack('Nnum', $temp);
- $var = substr_replace($var, pack('N', $temp['num'] + 1), -$i, 4);
- return $var;
- }
- }
-
- $remainder = strlen($var) % 4;
-
- if ($remainder == 0) {
- return $var;
- }
-
- $temp = unpack('Nnum', str_pad(substr($var, 0, $remainder), 4, "\0", STR_PAD_LEFT));
- $temp = substr(pack('N', $temp['num'] + 1), -$remainder);
- $var = substr_replace($var, $temp, 0, $remainder);
-
- return $var;
- }
-
- /**
- * Find whether the type of a variable is string (or could be converted to one)
- *
- * @param string|object $var
- * @return boolean
- * @access public
- */
- public static function is_stringable($var)
- {
- return is_string($var) || (is_object($var) && method_exists($var, '__toString'));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/AES.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/AES.php
index 23ea6e146..7d8cb8b03 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/AES.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/AES.php
@@ -16,7 +16,7 @@
* it'll be null-padded to 192-bits and 192 bits will be the key length until {@link self::setKey() setKey()}
* is called, again, at which point, it'll be recalculated.
*
- * Since \phpseclib3\Crypt\AES extends \phpseclib3\Crypt\Rijndael, some functions are available to be called that, in the context of AES, don't
+ * Since \phpseclib\Crypt\AES extends \phpseclib\Crypt\Rijndael, some functions are available to be called that, in the context of AES, don't
* make a whole lot of sense. {@link self::setBlockLength() setBlockLength()}, for instance. Calling that function,
* however possible, won't do anything (AES has a fixed block length whereas Rijndael has a variable one).
*
@@ -25,7 +25,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $aes = new \phpseclib3\Crypt\AES();
+ * $aes = new \phpseclib\Crypt\AES();
*
* $aes->setKey('abcdefghijklmnop');
*
@@ -47,7 +47,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
+namespace phpseclib\Crypt;
/**
* Pure-PHP implementation of AES.
@@ -61,37 +61,35 @@ class AES extends Rijndael
/**
* Dummy function
*
- * Since \phpseclib3\Crypt\AES extends \phpseclib3\Crypt\Rijndael, this function is, technically, available, but it doesn't do anything.
+ * Since \phpseclib\Crypt\AES extends \phpseclib\Crypt\Rijndael, this function is, technically, available, but it doesn't do anything.
*
- * @see \phpseclib3\Crypt\Rijndael::setBlockLength()
+ * @see \phpseclib\Crypt\Rijndael::setBlockLength()
* @access public
* @param int $length
- * @throws \BadMethodCallException anytime it's called
*/
- public function setBlockLength($length)
+ function setBlockLength($length)
{
- throw new \BadMethodCallException('The block length cannot be set for AES.');
+ return;
}
/**
* Sets the key length
*
- * Valid key lengths are 128, 192, and 256. Set the link to bool(false) to disable a fixed key length
+ * Valid key lengths are 128, 192, and 256. If the length is less than 128, it will be rounded up to
+ * 128. If the length is greater than 128 and invalid, it will be rounded down to the closest valid amount.
*
- * @see \phpseclib3\Crypt\Rijndael:setKeyLength()
+ * @see \phpseclib\Crypt\Rijndael:setKeyLength()
* @access public
* @param int $length
- * @throws \LengthException if the key length isn't supported
*/
- public function setKeyLength($length)
+ function setKeyLength($length)
{
switch ($length) {
- case 128:
- case 192:
- case 256:
+ case 160:
+ $length = 192;
break;
- default:
- throw new \LengthException('Key of size ' . $length . ' not supported by this algorithm. Only keys of sizes 128, 192 or 256 supported');
+ case 224:
+ $length = 256;
}
parent::setKeyLength($length);
}
@@ -101,23 +99,28 @@ class AES extends Rijndael
*
* Rijndael supports five different key lengths, AES only supports three.
*
- * @see \phpseclib3\Crypt\Rijndael:setKey()
+ * @see \phpseclib\Crypt\Rijndael:setKey()
* @see setKeyLength()
* @access public
* @param string $key
- * @throws \LengthException if the key length isn't supported
*/
- public function setKey($key)
+ function setKey($key)
{
- switch (strlen($key)) {
- case 16:
- case 24:
- case 32:
- break;
- default:
- throw new \LengthException('Key of size ' . strlen($key) . ' not supported by this algorithm. Only keys of sizes 16, 24 or 32 supported');
- }
-
parent::setKey($key);
+
+ if (!$this->explicit_key_length) {
+ $length = strlen($key);
+ switch (true) {
+ case $length <= 16:
+ $this->key_length = 16;
+ break;
+ case $length <= 24:
+ $this->key_length = 24;
+ break;
+ default:
+ $this->key_length = 32;
+ }
+ $this->_setEngine();
+ }
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php
index c75d983ab..74cc49de8 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php
@@ -16,7 +16,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $blowfish = new \phpseclib3\Crypt\Blowfish();
+ * $blowfish = new \phpseclib\Crypt\Blowfish();
*
* $blowfish->setKey('12345678901234567890123456789012');
*
@@ -35,9 +35,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\BlockCipher;
+namespace phpseclib\Crypt;
/**
* Pure-PHP implementation of Blowfish.
@@ -47,34 +45,34 @@ use phpseclib3\Crypt\Common\BlockCipher;
* @author Hans-Juergen Petrich <petrich@tronic-media.com>
* @access public
*/
-class Blowfish extends BlockCipher
+class Blowfish extends Base
{
/**
* Block Length of the cipher
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::block_size
+ * @see \phpseclib\Crypt\Base::block_size
* @var int
* @access private
*/
- protected $block_size = 8;
+ var $block_size = 8;
/**
* The mcrypt specific name of the cipher
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cipher_name_mcrypt
+ * @see \phpseclib\Crypt\Base::cipher_name_mcrypt
* @var string
* @access private
*/
- protected $cipher_name_mcrypt = 'blowfish';
+ var $cipher_name_mcrypt = 'blowfish';
/**
* Optimizing value while CFB-encrypting
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cfb_init_len
+ * @see \phpseclib\Crypt\Base::cfb_init_len
* @var int
* @access private
*/
- protected $cfb_init_len = 500;
+ var $cfb_init_len = 500;
/**
* The fixed subkeys boxes ($sbox0 - $sbox3) with 256 entries each
@@ -84,7 +82,7 @@ class Blowfish extends BlockCipher
* @access private
* @var array
*/
- private static $sbox0 = [
+ var $sbox0 = array(
0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7, 0xb8e1afed, 0x6a267e96, 0xba7c9045, 0xf12c7f99,
0x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc16, 0x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e,
0x0d95748f, 0x728eb658, 0x718bcd58, 0x82154aee, 0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013,
@@ -117,7 +115,7 @@ class Blowfish extends BlockCipher
0x83260376, 0x6295cfa9, 0x11c81968, 0x4e734a41, 0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400, 0x08ba6fb5, 0x571be91f, 0xf296ec6b, 0x2a0dd915,
0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664, 0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a
- ];
+ );
/**
* S-Box 1
@@ -125,7 +123,7 @@ class Blowfish extends BlockCipher
* @access private
* @var array
*/
- private static $sbox1 = [
+ var $sbox1 = array(
0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623, 0xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb266,
0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1, 0x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e,
0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6, 0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1,
@@ -158,7 +156,7 @@ class Blowfish extends BlockCipher
0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d99735, 0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,
0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9, 0xdb73dbd3, 0x105588cd, 0x675fda79, 0xe3674340,
0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20, 0x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7
- ];
+ );
/**
* S-Box 2
@@ -166,7 +164,7 @@ class Blowfish extends BlockCipher
* @access private
* @var array
*/
- private static $sbox2 = [
+ var $sbox2 = array(
0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934, 0x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a20068,
0xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af, 0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840,
0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45, 0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504,
@@ -199,7 +197,7 @@ class Blowfish extends BlockCipher
0x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c24, 0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,
0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4, 0x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c,
0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c837, 0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0
- ];
+ );
/**
* S-Box 3
@@ -207,7 +205,7 @@ class Blowfish extends BlockCipher
* @access private
* @var array
*/
- private static $sbox3 = [
+ var $sbox3 = array(
0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b, 0x5cb0679e, 0x4fa33742, 0xd3822740, 0x99bc9bbe,
0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b, 0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4,
0x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c8, 0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,
@@ -240,7 +238,7 @@ class Blowfish extends BlockCipher
0x53113ec0, 0x1640e3d3, 0x38abbd60, 0x2547adf0, 0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e, 0x1948c25c, 0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f9,
0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f, 0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6
- ];
+ );
/**
* P-Array consists of 18 32-bit subkeys
@@ -248,11 +246,11 @@ class Blowfish extends BlockCipher
* @var array
* @access private
*/
- private static $parray = [
+ var $parray = array(
0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344, 0xa4093822, 0x299f31d0,
0x082efa98, 0xec4e6c89, 0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,
0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917, 0x9216d5d9, 0x8979fb1b
- ];
+ );
/**
* The BCTX-working Array
@@ -262,7 +260,7 @@ class Blowfish extends BlockCipher
* @var array
* @access private
*/
- private $bctx;
+ var $bctx;
/**
* Holds the last used key
@@ -270,36 +268,20 @@ class Blowfish extends BlockCipher
* @var array
* @access private
*/
- private $kl;
+ var $kl;
/**
* The Key Length (in bytes)
- * {@internal The max value is 256 / 8 = 32, the min value is 128 / 8 = 16. Exists in conjunction with $Nk
- * because the encryption / decryption / key schedule creation requires this number and not $key_length. We could
- * derive this from $key_length or vice versa, but that'd mean we'd have to do multiple shift operations, so in lieu
- * of that, we'll just precompute it once.}
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setKeyLength()
+ * @see \phpseclib\Crypt\Base::setKeyLength()
* @var int
* @access private
+ * @internal The max value is 256 / 8 = 32, the min value is 128 / 8 = 16. Exists in conjunction with $Nk
+ * because the encryption / decryption / key schedule creation requires this number and not $key_length. We could
+ * derive this from $key_length or vice versa, but that'd mean we'd have to do multiple shift operations, so in lieu
+ * of that, we'll just precompute it once.
*/
- protected $key_length = 16;
-
- /**
- * Default Constructor.
- *
- * @param string $mode
- * @access public
- * @throws \InvalidArgumentException if an invalid / unsupported mode is provided
- */
- public function __construct($mode)
- {
- parent::__construct($mode);
-
- if ($this->mode == self::MODE_STREAM) {
- throw new \InvalidArgumentException('Block ciphers cannot be ran in stream mode');
- }
- }
+ var $key_length = 16;
/**
* Sets the key length.
@@ -309,28 +291,30 @@ class Blowfish extends BlockCipher
* @access public
* @param int $length
*/
- public function setKeyLength($length)
+ function setKeyLength($length)
{
- if ($length < 32 || $length > 448) {
- throw new \LengthException('Key size of ' . $length . ' bits is not supported by this algorithm. Only keys of sizes between 32 and 448 bits are supported');
+ if ($length < 32) {
+ $this->key_length = 4;
+ } elseif ($length > 448) {
+ $this->key_length = 56;
+ } else {
+ $this->key_length = $length >> 3;
}
- $this->key_length = $length >> 3;
-
parent::setKeyLength($length);
}
/**
* Test for engine validity
*
- * This is mainly just a wrapper to set things up for \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
+ * This is mainly just a wrapper to set things up for \phpseclib\Crypt\Base::isValidEngine()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
+ * @see \phpseclib\Crypt\Base::isValidEngine()
* @param int $engine
- * @access protected
+ * @access public
* @return bool
*/
- protected function isValidEngineHelper($engine)
+ function isValidEngine($engine)
{
if ($engine == self::ENGINE_OPENSSL) {
if (version_compare(PHP_VERSION, '5.3.7') < 0 && $this->key_length != 16) {
@@ -339,37 +323,37 @@ class Blowfish extends BlockCipher
if ($this->key_length < 16) {
return false;
}
- self::$cipher_name_openssl_ecb = 'bf-ecb';
- $this->cipher_name_openssl = 'bf-' . $this->openssl_translate_mode();
+ $this->cipher_name_openssl_ecb = 'bf-ecb';
+ $this->cipher_name_openssl = 'bf-' . $this->_openssl_translate_mode();
}
- return parent::isValidEngineHelper($engine);
+ return parent::isValidEngine($engine);
}
/**
* Setup the key (expansion)
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::_setupKey()
+ * @see \phpseclib\Crypt\Base::_setupKey()
* @access private
*/
- protected function setupKey()
+ function _setupKey()
{
if (isset($this->kl['key']) && $this->key === $this->kl['key']) {
// already expanded
return;
}
- $this->kl = ['key' => $this->key];
+ $this->kl = array('key' => $this->key);
/* key-expanding p[] and S-Box building sb[] */
- $this->bctx = [
- 'p' => [],
- 'sb' => [
- self::$sbox0,
- self::$sbox1,
- self::$sbox2,
- self::$sbox3
- ]
- ];
+ $this->bctx = array(
+ 'p' => array(),
+ 'sb' => array(
+ $this->sbox0,
+ $this->sbox1,
+ $this->sbox2,
+ $this->sbox3
+ )
+ );
// unpack binary string in unsigned chars
$key = array_values(unpack('C*', $this->key));
@@ -382,20 +366,20 @@ class Blowfish extends BlockCipher
$j = 0;
}
}
- $this->bctx['p'][] = self::$parray[$i] ^ $data;
+ $this->bctx['p'][] = $this->parray[$i] ^ $data;
}
// encrypt the zero-string, replace P1 and P2 with the encrypted data,
// encrypt P3 and P4 with the new P1 and P2, do it with all P-array and subkeys
$data = "\0\0\0\0\0\0\0\0";
for ($i = 0; $i < 18; $i += 2) {
- list($l, $r) = array_values(unpack('N*', $data = $this->encryptBlock($data)));
+ list($l, $r) = array_values(unpack('N*', $data = $this->_encryptBlock($data)));
$this->bctx['p'][$i ] = $l;
$this->bctx['p'][$i + 1] = $r;
}
for ($i = 0; $i < 4; ++$i) {
for ($j = 0; $j < 256; $j += 2) {
- list($l, $r) = array_values(unpack('N*', $data = $this->encryptBlock($data)));
+ list($l, $r) = array_values(unpack('N*', $data = $this->_encryptBlock($data)));
$this->bctx['sb'][$i][$j ] = $l;
$this->bctx['sb'][$i][$j + 1] = $r;
}
@@ -409,31 +393,31 @@ class Blowfish extends BlockCipher
* @param string $in
* @return string
*/
- protected function encryptBlock($in)
+ function _encryptBlock($in)
{
- $p = $this->bctx['p'];
- // extract($this->bctx['sb'], EXTR_PREFIX_ALL, 'sb'); // slower
- $sb_0 = $this->bctx['sb'][0];
- $sb_1 = $this->bctx['sb'][1];
- $sb_2 = $this->bctx['sb'][2];
- $sb_3 = $this->bctx['sb'][3];
-
- $in = unpack('N*', $in);
+ $p = $this->bctx["p"];
+ // extract($this->bctx["sb"], EXTR_PREFIX_ALL, "sb"); // slower
+ $sb_0 = $this->bctx["sb"][0];
+ $sb_1 = $this->bctx["sb"][1];
+ $sb_2 = $this->bctx["sb"][2];
+ $sb_3 = $this->bctx["sb"][3];
+
+ $in = unpack("N*", $in);
$l = $in[1];
$r = $in[2];
for ($i = 0; $i < 16; $i+= 2) {
$l^= $p[$i];
- $r^= self::safe_intval((self::safe_intval($sb_0[$l >> 24 & 0xff] + $sb_1[$l >> 16 & 0xff]) ^
+ $r^= $this->safe_intval(($this->safe_intval($sb_0[$l >> 24 & 0xff] + $sb_1[$l >> 16 & 0xff]) ^
$sb_2[$l >> 8 & 0xff]) +
$sb_3[$l & 0xff]);
$r^= $p[$i + 1];
- $l^= self::safe_intval((self::safe_intval($sb_0[$r >> 24 & 0xff] + $sb_1[$r >> 16 & 0xff]) ^
+ $l^= $this->safe_intval(($this->safe_intval($sb_0[$r >> 24 & 0xff] + $sb_1[$r >> 16 & 0xff]) ^
$sb_2[$r >> 8 & 0xff]) +
$sb_3[$r & 0xff]);
}
- return pack('N*', $r ^ $p[17], $l ^ $p[16]);
+ return pack("N*", $r ^ $p[17], $l ^ $p[16]);
}
/**
@@ -443,114 +427,145 @@ class Blowfish extends BlockCipher
* @param string $in
* @return string
*/
- protected function decryptBlock($in)
+ function _decryptBlock($in)
{
- $p = $this->bctx['p'];
- $sb_0 = $this->bctx['sb'][0];
- $sb_1 = $this->bctx['sb'][1];
- $sb_2 = $this->bctx['sb'][2];
- $sb_3 = $this->bctx['sb'][3];
+ $p = $this->bctx["p"];
+ $sb_0 = $this->bctx["sb"][0];
+ $sb_1 = $this->bctx["sb"][1];
+ $sb_2 = $this->bctx["sb"][2];
+ $sb_3 = $this->bctx["sb"][3];
- $in = unpack('N*', $in);
+ $in = unpack("N*", $in);
$l = $in[1];
$r = $in[2];
for ($i = 17; $i > 2; $i-= 2) {
$l^= $p[$i];
- $r^= self::safe_intval((self::safe_intval($sb_0[$l >> 24 & 0xff] + $sb_1[$l >> 16 & 0xff]) ^
+ $r^= $this->safe_intval(($this->safe_intval($sb_0[$l >> 24 & 0xff] + $sb_1[$l >> 16 & 0xff]) ^
$sb_2[$l >> 8 & 0xff]) +
$sb_3[$l & 0xff]);
$r^= $p[$i - 1];
- $l^= self::safe_intval((self::safe_intval($sb_0[$r >> 24 & 0xff] + $sb_1[$r >> 16 & 0xff]) ^
+ $l^= $this->safe_intval(($this->safe_intval($sb_0[$r >> 24 & 0xff] + $sb_1[$r >> 16 & 0xff]) ^
$sb_2[$r >> 8 & 0xff]) +
$sb_3[$r & 0xff]);
}
- return pack('N*', $r ^ $p[0], $l ^ $p[1]);
+ return pack("N*", $r ^ $p[0], $l ^ $p[1]);
}
/**
* Setup the performance-optimized function for de/encrypt()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::_setupInlineCrypt()
+ * @see \phpseclib\Crypt\Base::_setupInlineCrypt()
* @access private
*/
- protected function setupInlineCrypt()
+ function _setupInlineCrypt()
{
- $p = $this->bctx['p'];
- $init_crypt = '
- static $sb_0, $sb_1, $sb_2, $sb_3;
- if (!$sb_0) {
- $sb_0 = $this->bctx["sb"][0];
- $sb_1 = $this->bctx["sb"][1];
- $sb_2 = $this->bctx["sb"][2];
- $sb_3 = $this->bctx["sb"][3];
- }
- ';
+ $lambda_functions =& self::_getLambdaFunctions();
- $safeint = self::safe_intval_inline();
+ // We create max. 10 hi-optimized code for memory reason. Means: For each $key one ultra fast inline-crypt function.
+ // (Currently, for Blowfish, one generated $lambda_function cost on php5.5@32bit ~100kb unfreeable mem and ~180kb on php5.5@64bit)
+ // After that, we'll still create very fast optimized code but not the hi-ultimative code, for each $mode one.
+ $gen_hi_opt_code = (bool)(count($lambda_functions) < 10);
- // Generating encrypt code:
- $encrypt_block = '
- $in = unpack("N*", $in);
- $l = $in[1];
- $r = $in[2];
- ';
- for ($i = 0; $i < 16; $i+= 2) {
+ // Generation of a unique hash for our generated code
+ $code_hash = "Crypt_Blowfish, {$this->mode}";
+ if ($gen_hi_opt_code) {
+ $code_hash = str_pad($code_hash, 32) . $this->_hashInlineCryptFunction($this->key);
+ }
+
+ $safeint = $this->safe_intval_inline();
+
+ if (!isset($lambda_functions[$code_hash])) {
+ switch (true) {
+ case $gen_hi_opt_code:
+ $p = $this->bctx['p'];
+ $init_crypt = '
+ static $sb_0, $sb_1, $sb_2, $sb_3;
+ if (!$sb_0) {
+ $sb_0 = $self->bctx["sb"][0];
+ $sb_1 = $self->bctx["sb"][1];
+ $sb_2 = $self->bctx["sb"][2];
+ $sb_3 = $self->bctx["sb"][3];
+ }
+ ';
+ break;
+ default:
+ $p = array();
+ for ($i = 0; $i < 18; ++$i) {
+ $p[] = '$p_' . $i;
+ }
+ $init_crypt = '
+ list($sb_0, $sb_1, $sb_2, $sb_3) = $self->bctx["sb"];
+ list(' . implode(',', $p) . ') = $self->bctx["p"];
+
+ ';
+ }
+
+ // Generating encrypt code:
+ $encrypt_block = '
+ $in = unpack("N*", $in);
+ $l = $in[1];
+ $r = $in[2];
+ ';
+ for ($i = 0; $i < 16; $i+= 2) {
+ $encrypt_block.= '
+ $l^= ' . $p[$i] . ';
+ $r^= ' . sprintf($safeint, '(' . sprintf($safeint, '$sb_0[$l >> 24 & 0xff] + $sb_1[$l >> 16 & 0xff]') . ' ^
+ $sb_2[$l >> 8 & 0xff]) +
+ $sb_3[$l & 0xff]') . ';
+
+ $r^= ' . $p[$i + 1] . ';
+ $l^= ' . sprintf($safeint, '(' . sprintf($safeint, '$sb_0[$r >> 24 & 0xff] + $sb_1[$r >> 16 & 0xff]') . ' ^
+ $sb_2[$r >> 8 & 0xff]) +
+ $sb_3[$r & 0xff]') . ';
+ ';
+ }
$encrypt_block.= '
- $l^= ' . $p[$i] . ';
- $r^= ' . sprintf($safeint, '(' . sprintf($safeint, '$sb_0[$l >> 24 & 0xff] + $sb_1[$l >> 16 & 0xff]') . ' ^
- $sb_2[$l >> 8 & 0xff]) +
- $sb_3[$l & 0xff]') . ';
-
- $r^= ' . $p[$i + 1] . ';
- $l^= ' . sprintf($safeint, '(' . sprintf($safeint, '$sb_0[$r >> 24 & 0xff] + $sb_1[$r >> 16 & 0xff]') . ' ^
- $sb_2[$r >> 8 & 0xff]) +
- $sb_3[$r & 0xff]') . ';
+ $in = pack("N*",
+ $r ^ ' . $p[17] . ',
+ $l ^ ' . $p[16] . '
+ );
';
- }
- $encrypt_block.= '
- $in = pack("N*",
- $r ^ ' . $p[17] . ',
- $l ^ ' . $p[16] . '
- );
- ';
- // Generating decrypt code:
- $decrypt_block = '
- $in = unpack("N*", $in);
- $l = $in[1];
- $r = $in[2];
- ';
- for ($i = 17; $i > 2; $i-= 2) {
+ // Generating decrypt code:
+ $decrypt_block = '
+ $in = unpack("N*", $in);
+ $l = $in[1];
+ $r = $in[2];
+ ';
+
+ for ($i = 17; $i > 2; $i-= 2) {
+ $decrypt_block.= '
+ $l^= ' . $p[$i] . ';
+ $r^= ' . sprintf($safeint, '(' . sprintf($safeint, '$sb_0[$l >> 24 & 0xff] + $sb_1[$l >> 16 & 0xff]') . ' ^
+ $sb_2[$l >> 8 & 0xff]) +
+ $sb_3[$l & 0xff]') . ';
+
+ $r^= ' . $p[$i - 1] . ';
+ $l^= ' . sprintf($safeint, '(' . sprintf($safeint, '$sb_0[$r >> 24 & 0xff] + $sb_1[$r >> 16 & 0xff]') . ' ^
+ $sb_2[$r >> 8 & 0xff]) +
+ $sb_3[$r & 0xff]') . ';
+ ';
+ }
+
$decrypt_block.= '
- $l^= ' . $p[$i] . ';
- $r^= ' . sprintf($safeint, '(' . sprintf($safeint, '$sb_0[$l >> 24 & 0xff] + $sb_1[$l >> 16 & 0xff]') . ' ^
- $sb_2[$l >> 8 & 0xff]) +
- $sb_3[$l & 0xff]') . ';
-
- $r^= ' . $p[$i - 1] . ';
- $l^= ' . sprintf($safeint, '(' . sprintf($safeint, '$sb_0[$r >> 24 & 0xff] + $sb_1[$r >> 16 & 0xff]') . ' ^
- $sb_2[$r >> 8 & 0xff]) +
- $sb_3[$r & 0xff]') . ';
+ $in = pack("N*",
+ $r ^ ' . $p[0] . ',
+ $l ^ ' . $p[1] . '
+ );
';
- }
- $decrypt_block.= '
- $in = pack("N*",
- $r ^ ' . $p[0] . ',
- $l ^ ' . $p[1] . '
+ $lambda_functions[$code_hash] = $this->_createInlineCryptFunction(
+ array(
+ 'init_crypt' => $init_crypt,
+ 'init_encrypt' => '',
+ 'init_decrypt' => '',
+ 'encrypt_block' => $encrypt_block,
+ 'decrypt_block' => $decrypt_block
+ )
);
- ';
-
- $this->inline_crypt = $this->createInlineCryptFunction(
- [
- 'init_crypt' => $init_crypt,
- 'init_encrypt' => '',
- 'init_decrypt' => '',
- 'encrypt_block' => $encrypt_block,
- 'decrypt_block' => $decrypt_block
- ]
- );
+ }
+ $this->inline_crypt = $lambda_functions[$code_hash];
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/ChaCha20.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/ChaCha20.php
deleted file mode 100644
index 0bf1c2eba..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/ChaCha20.php
+++ /dev/null
@@ -1,797 +0,0 @@
-<?php
-
-/**
- * Pure-PHP implementation of ChaCha20.
- *
- * PHP version 5
- *
- * @category Crypt
- * @package ChaCha20
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2019 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Exception\InsufficientSetupException;
-use phpseclib3\Exception\BadDecryptionException;
-
-/**
- * Pure-PHP implementation of ChaCha20.
- *
- * @package ChaCha20
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class ChaCha20 extends Salsa20
-{
- /**
- * The OpenSSL specific name of the cipher
- *
- * @var string
- */
- protected $cipher_name_openssl = 'chacha20';
-
- /**
- * Test for engine validity
- *
- * This is mainly just a wrapper to set things up for \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
- *
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- * @param int $engine
- * @access protected
- * @return bool
- */
- protected function isValidEngineHelper($engine)
- {
- switch ($engine) {
- case self::ENGINE_LIBSODIUM:
- // PHP 7.2.0 (30 Nov 2017) added support for libsodium
-
- // we could probably make it so that if $this->counter == 0 then the first block would be done with either OpenSSL
- // or PHP and then subsequent blocks would then be done with libsodium but idk - it's not a high priority atm
-
- // we could also make it so that if $this->counter == 0 and $this->continuousBuffer then do the first string
- // with libsodium and subsequent strings with openssl or pure-PHP but again not a high priority
- return function_exists('sodium_crypto_aead_chacha20poly1305_ietf_encrypt') &&
- $this->key_length == 32 &&
- (($this->usePoly1305 && !isset($this->poly1305Key) && $this->counter == 0) || $this->counter == 1) &&
- !$this->continuousBuffer;
- case self::ENGINE_OPENSSL:
- // OpenSSL 1.1.0 (released 25 Aug 2016) added support for chacha20.
- // PHP didn't support OpenSSL 1.1.0 until 7.0.19 (11 May 2017)
-
- // if you attempt to provide openssl with a 128 bit key (as opposed to a 256 bit key) openssl will null
- // pad the key to 256 bits and still use the expansion constant for 256-bit keys. the fact that
- // openssl treats the IV as both the counter and nonce, however, let's us use openssl in continuous mode
- // whereas libsodium does not
- if ($this->key_length != 32) {
- return false;
- }
- }
-
- return parent::isValidEngineHelper($engine);
- }
-
- /**
- * Encrypts a message.
- *
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- * @see self::crypt()
- * @param string $plaintext
- * @return string $ciphertext
- */
- public function encrypt($plaintext)
- {
- $this->setup();
-
- if ($this->engine == self::ENGINE_LIBSODIUM) {
- return $this->encrypt_with_libsodium($plaintext);
- }
-
- return parent::encrypt($plaintext);
- }
-
- /**
- * Decrypts a message.
- *
- * $this->decrypt($this->encrypt($plaintext)) == $this->encrypt($this->encrypt($plaintext)).
- * At least if the continuous buffer is disabled.
- *
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see self::crypt()
- * @param string $ciphertext
- * @return string $plaintext
- */
- public function decrypt($ciphertext)
- {
- $this->setup();
-
- if ($this->engine == self::ENGINE_LIBSODIUM) {
- return $this->decrypt_with_libsodium($ciphertext);
- }
-
- return parent::decrypt($ciphertext);
- }
-
- /**
- * Encrypts a message with libsodium
- *
- * @see self::encrypt()
- * @param string $plaintext
- * @return string $text
- */
- private function encrypt_with_libsodium($plaintext)
- {
- $params = [$plaintext, $this->aad, $this->nonce, $this->key];
- $ciphertext = strlen($this->nonce) == 8 ?
- sodium_crypto_aead_chacha20poly1305_encrypt(...$params) :
- sodium_crypto_aead_chacha20poly1305_ietf_encrypt(...$params);
- if (!$this->usePoly1305) {
- return substr($ciphertext, 0, strlen($plaintext));
- }
-
- $newciphertext = substr($ciphertext, 0, strlen($plaintext));
-
- $this->newtag = $this->usingGeneratedPoly1305Key && strlen($this->nonce) == 12 ?
- substr($ciphertext, strlen($plaintext)) :
- $this->poly1305($newciphertext);
-
- return $newciphertext;
- }
-
- /**
- * Decrypts a message with libsodium
- *
- * @see self::decrypt()
- * @param string $ciphertext
- * @return string $text
- */
- private function decrypt_with_libsodium($ciphertext)
- {
- $params = [$ciphertext, $this->aad, $this->nonce, $this->key];
-
- if (isset($this->poly1305Key)) {
- if ($this->oldtag === false) {
- throw new InsufficientSetupException('Authentication Tag has not been set');
- }
- if ($this->usingGeneratedPoly1305Key && strlen($this->nonce) == 12) {
- $plaintext = sodium_crypto_aead_chacha20poly1305_ietf_decrypt(...$params);
- $this->oldtag = false;
- if ($plaintext === false) {
- throw new BadDecryptionException('Derived authentication tag and supplied authentication tag do not match');
- }
- return $plaintext;
- }
- $newtag = $this->poly1305($ciphertext);
- if ($this->oldtag != substr($newtag, 0, strlen($this->oldtag))) {
- $this->oldtag = false;
- throw new BadDecryptionException('Derived authentication tag and supplied authentication tag do not match');
- }
- $this->oldtag = false;
- }
-
- $plaintext = strlen($this->nonce) == 8 ?
- sodium_crypto_aead_chacha20poly1305_encrypt(...$params) :
- sodium_crypto_aead_chacha20poly1305_ietf_encrypt(...$params);
-
- return substr($plaintext, 0, strlen($ciphertext));
- }
-
- /**
- * Sets the nonce.
- *
- * @param string $nonce
- */
- public function setNonce($nonce)
- {
- if (!is_string($nonce)) {
- throw new \UnexpectedValueException('The nonce should be a string');
- }
-
- /*
- from https://tools.ietf.org/html/rfc7539#page-7
-
- "Note also that the original ChaCha had a 64-bit nonce and 64-bit
- block count. We have modified this here to be more consistent with
- recommendations in Section 3.2 of [RFC5116]."
- */
- switch (strlen($nonce)) {
- case 8: // 64 bits
- case 12: // 96 bits
- break;
- default:
- throw new \LengthException('Nonce of size ' . strlen($nonce) . ' not supported by this algorithm. Only 64-bit nonces or 96-bit nonces are supported');
- }
-
- $this->nonce = $nonce;
- $this->changed = true;
- $this->setEngine();
- }
-
- /**
- * Setup the self::ENGINE_INTERNAL $engine
- *
- * (re)init, if necessary, the internal cipher $engine
- *
- * _setup() will be called each time if $changed === true
- * typically this happens when using one or more of following public methods:
- *
- * - setKey()
- *
- * - setNonce()
- *
- * - First run of encrypt() / decrypt() with no init-settings
- *
- * @see self::setKey()
- * @see self::setNonce()
- * @see self::disableContinuousBuffer()
- */
- protected function setup()
- {
- if (!$this->changed) {
- return;
- }
-
- $this->enbuffer = $this->debuffer = ['ciphertext' => '', 'counter' => $this->counter];
-
- $this->changed = $this->nonIVChanged = false;
-
- if ($this->nonce === false) {
- throw new InsufficientSetupException('No nonce has been defined');
- }
-
- if ($this->key === false) {
- throw new InsufficientSetupException('No key has been defined');
- }
-
- if ($this->usePoly1305 && !isset($this->poly1305Key)) {
- $this->usingGeneratedPoly1305Key = true;
- if ($this->engine == self::ENGINE_LIBSODIUM) {
- return;
- }
- $this->createPoly1305Key();
- }
-
- $key = $this->key;
- if (strlen($key) == 16) {
- $constant = 'expand 16-byte k';
- $key.= $key;
- } else {
- $constant = 'expand 32-byte k';
- }
-
- $this->p1 = $constant . $key;
- $this->p2 = $this->nonce;
- if (strlen($this->nonce) == 8) {
- $this->p2 = "\0\0\0\0" . $this->p2;
- }
- }
-
- /**
- * The quarterround function
- *
- * @param int $a
- * @param int $b
- * @param int $c
- * @param int $d
- */
- protected static function quarterRound(&$a, &$b, &$c, &$d)
- {
- $a+= $b; $d = self::leftRotate($d ^ $a, 16);
- $c+= $d; $b = self::leftRotate($b ^ $c, 12);
- $a+= $b; $d = self::leftRotate($d ^ $a, 8);
- $c+= $d; $b = self::leftRotate($b ^ $c, 7);
- }
-
- /**
- * The doubleround function
- *
- * @param int $x0 (by reference)
- * @param int $x1 (by reference)
- * @param int $x2 (by reference)
- * @param int $x3 (by reference)
- * @param int $x4 (by reference)
- * @param int $x5 (by reference)
- * @param int $x6 (by reference)
- * @param int $x7 (by reference)
- * @param int $x8 (by reference)
- * @param int $x9 (by reference)
- * @param int $x10 (by reference)
- * @param int $x11 (by reference)
- * @param int $x12 (by reference)
- * @param int $x13 (by reference)
- * @param int $x14 (by reference)
- * @param int $x15 (by reference)
- */
- protected static function doubleRound(&$x0, &$x1, &$x2, &$x3, &$x4, &$x5, &$x6, &$x7, &$x8, &$x9, &$x10, &$x11, &$x12, &$x13, &$x14, &$x15)
- {
- // columnRound
- static::quarterRound($x0, $x4, $x8, $x12);
- static::quarterRound($x1, $x5, $x9, $x13);
- static::quarterRound($x2, $x6, $x10, $x14);
- static::quarterRound($x3, $x7, $x11, $x15);
- // rowRound
- static::quarterRound($x0, $x5, $x10, $x15);
- static::quarterRound($x1, $x6, $x11, $x12);
- static::quarterRound($x2, $x7, $x8, $x13);
- static::quarterRound($x3, $x4, $x9, $x14);
- }
-
- /**
- * The Salsa20 hash function function
- *
- * On my laptop this loop unrolled / function dereferenced version of parent::salsa20 encrypts 1mb of text in
- * 0.65s vs the 0.85s that it takes with the parent method.
- *
- * If we were free to assume that the host OS would always be 64-bits then the if condition in leftRotate could
- * be eliminated and we could knock this done to 0.60s.
- *
- * For comparison purposes, RC4 takes 0.16s and AES in CTR mode with the Eval engine takes 0.48s.
- * AES in CTR mode with the PHP engine takes 1.19s. Salsa20 / ChaCha20 do not benefit as much from the Eval
- * approach due to the fact that there are a lot less variables to de-reference, fewer loops to unroll, etc
- *
- * @param string $x
- */
- protected static function salsa20($x)
- {
- list(, $x0, $x1, $x2, $x3, $x4, $x5, $x6, $x7, $x8, $x9, $x10, $x11, $x12, $x13, $x14, $x15) = unpack('V*', $x);
- $z0 = $x0;
- $z1 = $x1;
- $z2 = $x2;
- $z3 = $x3;
- $z4 = $x4;
- $z5 = $x5;
- $z6 = $x6;
- $z7 = $x7;
- $z8 = $x8;
- $z9 = $x9;
- $z10 = $x10;
- $z11 = $x11;
- $z12 = $x12;
- $z13 = $x13;
- $z14 = $x14;
- $z15 = $x15;
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- // columnRound
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 16);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 12);
- $x0+= $x4; $x12 = self::leftRotate($x12 ^ $x0, 8);
- $x8+= $x12; $x4 = self::leftRotate($x4 ^ $x8, 7);
-
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 16);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 12);
- $x1+= $x5; $x13 = self::leftRotate($x13 ^ $x1, 8);
- $x9+= $x13; $x5 = self::leftRotate($x5 ^ $x9, 7);
-
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 16);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 12);
- $x2+= $x6; $x14 = self::leftRotate($x14 ^ $x2, 8);
- $x10+= $x14; $x6 = self::leftRotate($x6 ^ $x10, 7);
-
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 16);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 12);
- $x3+= $x7; $x15 = self::leftRotate($x15 ^ $x3, 8);
- $x11+= $x15; $x7 = self::leftRotate($x7 ^ $x11, 7);
-
- // rowRound
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 16);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 12);
- $x0+= $x5; $x15 = self::leftRotate($x15 ^ $x0, 8);
- $x10+= $x15; $x5 = self::leftRotate($x5 ^ $x10, 7);
-
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 16);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 12);
- $x1+= $x6; $x12 = self::leftRotate($x12 ^ $x1, 8);
- $x11+= $x12; $x6 = self::leftRotate($x6 ^ $x11, 7);
-
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 16);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 12);
- $x2+= $x7; $x13 = self::leftRotate($x13 ^ $x2, 8);
- $x8+= $x13; $x7 = self::leftRotate($x7 ^ $x8, 7);
-
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 16);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 12);
- $x3+= $x4; $x14 = self::leftRotate($x14 ^ $x3, 8);
- $x9+= $x14; $x4 = self::leftRotate($x4 ^ $x9, 7);
-
- $x0+= $z0;
- $x1+= $z1;
- $x2+= $z2;
- $x3+= $z3;
- $x4+= $z4;
- $x5+= $z5;
- $x6+= $z6;
- $x7+= $z7;
- $x8+= $z8;
- $x9+= $z9;
- $x10+= $z10;
- $x11+= $z11;
- $x12+= $z12;
- $x13+= $z13;
- $x14+= $z14;
- $x15+= $z15;
-
- return pack('V*', $x0, $x1, $x2, $x3, $x4, $x5, $x6, $x7, $x8, $x9, $x10, $x11, $x12, $x13, $x14, $x15);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/AsymmetricKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/AsymmetricKey.php
deleted file mode 100644
index 9c368ebb8..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/AsymmetricKey.php
+++ /dev/null
@@ -1,492 +0,0 @@
-<?php
-
-/**
- * Base Class for all asymmetric key ciphers
- *
- * PHP version 5
- *
- * @category Crypt
- * @package AsymmetricKey
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common;
-
-use phpseclib3\Exception\UnsupportedFormatException;
-use phpseclib3\Exception\NoKeyLoadedException;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Crypt\RSA;
-use phpseclib3\Crypt\DSA;
-use phpseclib3\Crypt\ECDSA;
-
-/**
- * Base Class for all asymmetric cipher classes
- *
- * @package AsymmetricKey
- * @author Jim Wigginton <terrafrost@php.net>
- */
-abstract class AsymmetricKey
-{
- /**
- * Precomputed Zero
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected static $zero;
-
- /**
- * Precomputed One
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected static $one;
-
- /**
- * Format of the loaded key
- *
- * @var string
- * @access private
- */
- protected $format;
-
- /**
- * Hash function
- *
- * @var \phpseclib3\Crypt\Hash
- * @access private
- */
- protected $hash;
-
- /**
- * HMAC function
- *
- * @var \phpseclib3\Crypt\Hash
- * @access private
- */
- private $hmac;
-
- /**
- * Supported plugins (lower case)
- *
- * @see self::initialize_static_variables()
- * @var array
- * @access private
- */
- private static $plugins = [];
-
- /**
- * Invisible plugins
- *
- * @see self::initialize_static_variables()
- * @var array
- * @access private
- */
- private static $invisiblePlugins = [];
-
- /**
- * Supported signature formats (lower case)
- *
- * @see self::initialize_static_variables()
- * @var array
- * @access private
- */
- private static $signatureFormats = [];
-
- /**
- * Supported signature formats (original case)
- *
- * @see self::initialize_static_variables()
- * @var array
- * @access private
- */
- private static $signatureFileFormats = [];
-
- /**
- * Available Engines
- *
- * @var boolean[]
- * @access private
- */
- protected static $engines = [];
-
- /**
- * The constructor
- */
- protected function __construct()
- {
- self::initialize_static_variables();
-
- $this->hash = new Hash('sha256');
- $this->hmac = new Hash('sha256');
- }
-
- /**
- * Initialize static variables
- */
- protected static function initialize_static_variables()
- {
- if (!isset(self::$zero)) {
- self::$zero= new BigInteger(0);
- self::$one = new BigInteger(1);
- }
-
- self::loadPlugins('Keys');
- if (static::ALGORITHM != 'RSA' && static::ALGORITHM != 'DH') {
- self::loadPlugins('Signature');
- }
- }
-
- /**
- * Load the key
- *
- * @param string $key
- * @param string $password optional
- * @return AsymmetricKey
- */
- public static function load($key, $password = false)
- {
- self::initialize_static_variables();
-
- $components = false;
- foreach (self::$plugins[static::ALGORITHM]['Keys'] as $format) {
- if (isset(self::$invisiblePlugins[static::ALGORITHM]) && in_array($format, self::$invisiblePlugins[static::ALGORITHM])) {
- continue;
- }
- try {
- $components = $format::load($key, $password);
- } catch (\Exception $e) {
- $components = false;
- }
- if ($components !== false) {
- break;
- }
- }
-
- if ($components === false) {
- throw new NoKeyLoadedException('Unable to read key');
- }
-
- $components['format'] = $format;
- $new = static::onLoad($components);
- $new->format = $format;
- return $new instanceof PrivateKey ?
- $new->withPassword($password) :
- $new;
- }
-
- /**
- * Load the key, assuming a specific format
- *
- * @param string $type
- * @param string $key
- * @param string $password optional
- * @return AsymmetricKey
- */
- public static function loadFormat($type, $key, $password = false)
- {
- self::initialize_static_variables();
-
- $components = false;
- $format = strtolower($type);
- if (isset(self::$plugins[static::ALGORITHM]['Keys'][$format])) {
- $format = self::$plugins[static::ALGORITHM]['Keys'][$format];
- $components = $format::load($key, $password);
- }
-
- if ($components === false) {
- throw new NoKeyLoadedException('Unable to read key');
- }
-
- $components['format'] = $format;
-
- $new = static::onLoad($components);
- $new->format = $format;
- return $new instanceof PrivateKey ?
- $new->withPassword($password) :
- $new;
- }
-
- /**
- * Validate Plugin
- *
- * @access private
- * @param string $format
- * @param string $type
- * @param string $method optional
- * @return mixed
- */
- protected static function validatePlugin($format, $type, $method = NULL)
- {
- $type = strtolower($type);
- if (!isset(self::$plugins[static::ALGORITHM][$format][$type])) {
- throw new UnsupportedFormatException("$type is not a supported format");
- }
- $type = self::$plugins[static::ALGORITHM][$format][$type];
- if (isset($method) && !method_exists($type, $method)) {
- throw new UnsupportedFormatException("$type does not implement $method");
- }
-
- return $type;
- }
-
- /**
- * Load Plugins
- *
- * @access private
- * @param string $format
- */
- private static function loadPlugins($format)
- {
- if (!isset(self::$plugins[static::ALGORITHM][$format])) {
- self::$plugins[static::ALGORITHM][$format] = [];
- foreach (new \DirectoryIterator(__DIR__ . '/../' . static::ALGORITHM . '/Formats/' . $format . '/') as $file) {
- if ($file->getExtension() != 'php') {
- continue;
- }
- $name = $file->getBasename('.php');
- $type = 'phpseclib3\Crypt\\' . static::ALGORITHM . '\\Formats\\' . $format . '\\' . $name;
- $reflect = new \ReflectionClass($type);
- if ($reflect->isTrait()) {
- continue;
- }
- self::$plugins[static::ALGORITHM][$format][strtolower($name)] = $type;
- if ($reflect->hasConstant('IS_INVISIBLE')) {
- self::$invisiblePlugins[static::ALGORITHM][] = $type;
- }
- }
- }
- }
-
- /**
- * Returns a list of supported formats.
- *
- * @access public
- * @return array
- */
- public static function getSupportedKeyFormats()
- {
- self::initialize_static_variables();
-
- return self::$plugins[static::ALGORITHM]['Keys'];
- }
-
- /**
- * Add a fileformat plugin
- *
- * The plugin needs to either already be loaded or be auto-loadable.
- * Loading a plugin whose shortname overwrite an existing shortname will overwrite the old plugin.
- *
- * @see self::load()
- * @param string $fullname
- * @access public
- * @return bool
- */
- public static function addFileFormat($fullname)
- {
- self::initialize_static_variables();
-
- if (class_exists($fullname)) {
- $meta = new \ReflectionClass($fullname);
- $shortname = $meta->getShortName();
- self::$plugins[static::ALGORITHM]['Keys'][strtolower($shortname)] = $fullname;
- if ($meta->hasConstant('IS_INVISIBLE')) {
- self::$invisiblePlugins[static::ALGORITHM] = strtolower($name);
- }
- }
- }
-
- /**
- * Returns the format of the loaded key.
- *
- * If the key that was loaded wasn't in a valid or if the key was auto-generated
- * with RSA::createKey() then this will throw an exception.
- *
- * @see self::load()
- * @access public
- * @return mixed
- */
- public function getLoadedFormat()
- {
- if (empty($this->format)) {
- throw new NoKeyLoadedException('This key was created with createKey - it was not loaded with load. Therefore there is no "loaded format"');
- }
-
- $meta = new \ReflectionClass($this->format);
- return $meta->getShortName();
- }
-
- /**
- * Tests engine validity
- *
- * @access public
- */
- public static function useBestEngine()
- {
- static::$engines = [
- 'PHP' => true,
- 'OpenSSL' => extension_loaded('openssl'),
- // this test can be satisfied by either of the following:
- // http://php.net/manual/en/book.sodium.php
- // https://github.com/paragonie/sodium_compat
- 'libsodium' => function_exists('sodium_crypto_sign_keypair')
- ];
-
- return static::$engines;
- }
-
- /**
- * Flag to use internal engine only (useful for unit testing)
- *
- * @access public
- */
- public static function useInternalEngine()
- {
- static::$engines = [
- 'PHP' => true,
- 'OpenSSL' => false,
- 'libsodium' => false
- ];
- }
-
- /**
- * __toString() magic method
- *
- * @return string
- */
- public function __toString()
- {
- return $this->toString('PKCS8');
- }
-
- /**
- * Determines which hashing function should be used
- *
- * @access public
- * @param string $hash
- */
- public function withHash($hash)
- {
- $new = clone $this;
-
- $new->hash = new Hash($hash);
- $new->hmac = new Hash($hash);
-
- return $new;
- }
-
- /**
- * Returns the hash algorithm currently being used
- *
- * @access public
- */
- public function getHash()
- {
- return clone $this->hash;
- }
-
- /**
- * Compute the pseudorandom k for signature generation,
- * using the process specified for deterministic DSA.
- *
- * @access public
- * @param string $h1
- * @return string
- */
- protected function computek($h1)
- {
- $v = str_repeat("\1", strlen($h1));
-
- $k = str_repeat("\0", strlen($h1));
-
- $x = $this->int2octets($this->x);
- $h1 = $this->bits2octets($h1);
-
- $this->hmac->setKey($k);
- $k = $this->hmac->hash($v . "\0" . $x . $h1);
- $this->hmac->setKey($k);
- $v = $this->hmac->hash($v);
- $k = $this->hmac->hash($v . "\1" . $x . $h1);
- $this->hmac->setKey($k);
- $v = $this->hmac->hash($v);
-
- $qlen = $this->q->getLengthInBytes();
-
- while (true) {
- $t = '';
- while (strlen($t) < $qlen) {
- $v = $this->hmac->hash($v);
- $t = $t . $v;
- }
- $k = $this->bits2int($t);
-
- if (!$k->equals(self::$zero) && $k->compare($this->q) < 0) {
- break;
- }
- $k = $this->hmac->hash($v . "\0");
- $this->hmac->setKey($k);
- $v = $this->hmac->hash($v);
- }
-
- return $k;
- }
-
- /**
- * Integer to Octet String
- *
- * @access private
- * @param \phpseclib3\Math\BigInteger $v
- * @return string
- */
- private function int2octets($v)
- {
- $out = $v->toBytes();
- $rolen = $this->q->getLengthInBytes();
- if (strlen($out) < $rolen) {
- return str_pad($out, $rolen, "\0", STR_PAD_LEFT);
- } else if (strlen($out) > $rolen) {
- return substr($out, -$rolen);
- } else {
- return $out;
- }
- }
-
- /**
- * Bit String to Integer
- *
- * @access private
- * @param string $in
- * @return \phpseclib3\Math\BigInteger
- */
- protected function bits2int($in)
- {
- $v = new BigInteger($in, 256);
- $vlen = strlen($in) << 3;
- $qlen = $this->q->getLength();
- if ($vlen > $qlen) {
- return $v->bitwise_rightShift($vlen - $qlen);
- }
- return $v;
- }
-
- /**
- * Bit String to Octet String
- *
- * @access private
- * @param string $in
- * @return string
- */
- private function bits2octets($in)
- {
- $z1 = $this->bits2int($in);
- $z2 = $z1->subtract($this->q);
- return $z2->compare(self::$zero) < 0 ?
- $this->int2octets($z1) :
- $this->int2octets($z2);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/BlockCipher.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/BlockCipher.php
deleted file mode 100644
index a8ed74d86..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/BlockCipher.php
+++ /dev/null
@@ -1,27 +0,0 @@
-<?php
-
-/**
- * Base Class for all block ciphers
- *
- * PHP version 5
- *
- * @category Crypt
- * @package BlockCipher
- * @author Jim Wigginton <terrafrost@php.net>
- * @author Hans-Juergen Petrich <petrich@tronic-media.com>
- * @copyright 2007 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common;
-
-/**
- * Base Class for all block cipher classes
- *
- * @package BlockCipher
- * @author Jim Wigginton <terrafrost@php.net>
- */
-abstract class BlockCipher extends SymmetricKey
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/OpenSSH.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/OpenSSH.php
deleted file mode 100644
index 7c51dd391..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/OpenSSH.php
+++ /dev/null
@@ -1,234 +0,0 @@
-<?php
-
-/**
- * OpenSSH Key Handler
- *
- * PHP version 5
- *
- * Place in $HOME/.ssh/authorized_keys
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Exception\UnsupportedFormatException;
-
-/**
- * OpenSSH Formatted RSA Key Handler
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OpenSSH
-{
- /**
- * Default comment
- *
- * @var string
- * @access private
- */
- protected static $comment = 'phpseclib-generated-key';
-
- /**
- * Binary key flag
- *
- * @var bool
- * @access private
- */
- protected static $binary = false;
-
- /**
- * Sets the default comment
- *
- * @access public
- * @param string $comment
- */
- public static function setComment($comment)
- {
- self::$comment = str_replace(["\r", "\n"], '', $comment);
- }
-
- /**
- * Break a public or private key down into its constituent components
- *
- * $type can be either ssh-dss or ssh-rsa
- *
- * @access public
- * @param string $key
- * @param string $password
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- // key format is described here:
- // https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?annotate=HEAD
-
- if (strpos($key, 'BEGIN OPENSSH PRIVATE KEY') !== false) {
- $key = preg_replace('#(?:^-.*?-[\r\n]*$)|\s#ms', '', $key);
- $key = Base64::decode($key);
- $magic = Strings::shift($key, 15);
- if ($magic != "openssh-key-v1\0") {
- throw new \RuntimeException('Expected openssh-key-v1');
- }
- list($ciphername, $kdfname, $kdfoptions, $numKeys) = Strings::unpackSSH2('sssN', $key);
- if ($numKeys != 1) {
- // if we wanted to support multiple keys we could update PublicKeyLoader to preview what the # of keys
- // would be; it'd then call Common\Keys\OpenSSH.php::load() and get the paddedKey. it'd then pass
- // that to the appropriate key loading parser $numKey times or something
- throw new \RuntimeException('Although the OpenSSH private key format supports multiple keys phpseclib does not');
- }
- if (strlen($kdfoptions) || $kdfname != 'none' || $ciphername != 'none') {
- /*
- OpenSSH private keys use a customized version of bcrypt. specifically, instead of encrypting
- OrpheanBeholderScryDoubt 64 times OpenSSH's bcrypt variant encrypts
- OxychromaticBlowfishSwatDynamite 64 times. so we can't use crypt().
-
- bcrypt is basically Blowfish with an altered key expansion. whereas Blowfish just runs the
- key through the key expansion bcrypt interleaves the key expansion with the salt and
- password. this renders openssl / mcrypt unusuable. this forces us to use a pure-PHP implementation
- of bcrypt. the problem with that is that pure-PHP is too slow to be practically useful.
-
- in addition to encrypting a different string 64 times the OpenSSH implementation also performs bcrypt
- from scratch $rounds times. calling crypt() 64x with bcrypt takes 0.7s. PHP is going to be naturally
- slower. pure-PHP is 215x slower than OpenSSL for AES and pure-PHP is 43x slower for bcrypt.
- 43 * 0.7 = 30s. no one wants to wait 30s to load a private key.
-
- another way to think about this.. according to wikipedia's article on Blowfish,
- "Each new key requires pre-processing equivalent to encrypting about 4 kilobytes of text".
- key expansion is done (9+64*2)*160 times. multiply that by 4 and it turns out that Blowfish,
- OpenSSH style, is the equivalent of encrypting ~80mb of text.
-
- more supporting evidence: sodium_compat does not implement Argon2 (another password hashing
- algorithm) because "It's not feasible to polyfill scrypt or Argon2 into PHP and get reasonable
- performance. Users would feel motivated to select parameters that downgrade security to avoid
- denial of service (DoS) attacks. The only winning move is not to play"
- -- https://github.com/paragonie/sodium_compat/blob/master/README.md
- */
- throw new \RuntimeException('Encrypted OpenSSH private keys are not supported');
- //list($salt, $rounds) = Strings::unpackSSH2('sN', $kdfoptions);
- }
-
- list($publicKey, $paddedKey) = Strings::unpackSSH2('ss', $key);
- list($type) = Strings::unpackSSH2('s', $publicKey);
- list($checkint1, $checkint2) = Strings::unpackSSH2('NN', $paddedKey);
- // any leftover bytes in $paddedKey are for padding? but they should be sequential bytes. eg. 1, 2, 3, etc.
- if ($checkint1 != $checkint2) {
- throw new \RuntimeException('The two checkints do not match');
- }
- self::checkType($type);
-
- return compact('type', 'publicKey', 'paddedKey');
- }
-
- $parts = explode(' ', $key, 3);
-
- if (!isset($parts[1])) {
- $key = base64_decode($parts[0]);
- $comment = isset($parts[1]) ? $parts[1] : false;
- } else {
- $asciiType = $parts[0];
- self::checkType($parts[0]);
- $key = base64_decode($parts[1]);
- $comment = isset($parts[2]) ? $parts[2] : false;
- }
- if ($key === false) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- list($type) = Strings::unpackSSH2('s', $key);
- self::checkType($type);
- if (isset($asciiType) && $asciiType != $type) {
- throw new \RuntimeException('Two different types of keys are claimed: ' . $asciiType . ' and ' . $type);
- }
- if (strlen($key) <= 4) {
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
-
- $publicKey = $key;
-
- return compact('type', 'publicKey', 'comment');
- }
-
- /**
- * Toggle between binary and printable keys
- *
- * Printable keys are what are generated by default. These are the ones that go in
- * $HOME/.ssh/authorized_key.
- *
- * @access public
- * @param bool $enabled
- */
- public static function setBinaryOutput($enabled)
- {
- self::$binary = $enabled;
- }
-
- /**
- * Checks to see if the type is valid
- *
- * @access private
- * @param string $candidate
- */
- private static function checkType($candidate)
- {
- if (!in_array($candidate, static::$types)) {
- throw new \RuntimeException("The key type ($candidate) is not equal to: " . implode(',', static::$types));
- }
- }
-
- /**
- * Wrap a private key appropriately
- *
- * @access public
- * @param string $publicKey
- * @param string $privateKey
- * @param string $password
- * @param array $options
- * @return string
- */
- protected static function wrapPrivateKey($publicKey, $privateKey, $password, $options)
- {
- if (!empty($password) && is_string($password)) {
- throw new UnsupportedFormatException('Encrypted OpenSSH private keys are not supported');
- }
-
- list(, $checkint) = unpack('N', Random::string(4));
-
- $comment = isset($options['comment']) ? $options['comment'] : self::$comment;
- $paddedKey = Strings::packSSH2('NN', $checkint, $checkint) .
- $privateKey .
- Strings::packSSH2('s', $comment);
-
- /*
- from http://tools.ietf.org/html/rfc4253#section-6 :
-
- Note that the length of the concatenation of 'packet_length',
- 'padding_length', 'payload', and 'random padding' MUST be a multiple
- of the cipher block size or 8, whichever is larger.
- */
- $paddingLength = (7 * strlen($paddedKey)) % 8;
- for ($i = 1; $i <= $paddingLength; $i++) {
- $paddedKey.= chr($i);
- }
- $key = Strings::packSSH2('sssNss', 'none', 'none', '', 1, $publicKey, $paddedKey);
- $key = "openssh-key-v1\0$key";
-
- return "-----BEGIN OPENSSH PRIVATE KEY-----\r\n" .
- chunk_split(Base64::encode($key), 70) .
- "-----END OPENSSH PRIVATE KEY-----";
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS.php
deleted file mode 100644
index 3550cc531..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS.php
+++ /dev/null
@@ -1,80 +0,0 @@
-<?php
-
-/**
- * PKCS Formatted Key Handler
- *
- * PHP version 5
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common\Formats\Keys;
-
-/**
- * PKCS1 Formatted Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS
-{
- /**
- * Auto-detect the format
- */
- const MODE_ANY = 0;
- /**
- * Require base64-encoded PEM's be supplied
- */
- const MODE_PEM = 1;
- /**
- * Require raw DER's be supplied
- */
- const MODE_DER = 2;
- /**#@-*/
-
- /**
- * Is the key a base-64 encoded PEM, DER or should it be auto-detected?
- *
- * @access private
- * @var int
- */
- protected static $format = self::MODE_ANY;
-
- /**
- * Require base64-encoded PEM's be supplied
- *
- * @access public
- */
- public static function requirePEM()
- {
- self::$format = self::MODE_PEM;
- }
-
- /**
- * Require raw DER's be supplied
- *
- * @access public
- */
- public static function requireDER()
- {
- self::$format = self::MODE_DER;
- }
-
- /**
- * Accept any format and auto detect the format
- *
- * This is the default setting
- *
- * @access public
- */
- public static function requireAny()
- {
- self::$format = self::MODE_ANY;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS1.php
deleted file mode 100644
index a362d938b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS1.php
+++ /dev/null
@@ -1,223 +0,0 @@
-<?php
-
-/**
- * PKCS1 Formatted Key Handler
- *
- * PHP version 5
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Crypt\AES;
-use phpseclib3\Crypt\DES;
-use phpseclib3\Crypt\TripleDES;
-use phpseclib3\File\ASN1;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-
-/**
- * PKCS1 Formatted Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS1 extends PKCS
-{
- /**
- * Default encryption algorithm
- *
- * @var string
- * @access private
- */
- private static $defaultEncryptionAlgorithm = 'AES-128-CBC';
-
- /**
- * Sets the default encryption algorithm
- *
- * @access public
- * @param string $algo
- */
- public static function setEncryptionAlgorithm($algo)
- {
- self::$defaultEncryptionAlgorithm = $algo;
- }
-
- /**
- * Returns the mode constant corresponding to the mode string
- *
- * @access public
- * @param string $mode
- * @return int
- * @throws \UnexpectedValueException if the block cipher mode is unsupported
- */
- private static function getEncryptionMode($mode)
- {
- switch ($mode) {
- case 'CBC':
- case 'ECB':
- case 'CFB':
- case 'OFB':
- case 'CTR':
- return $mode;
- }
- throw new \UnexpectedValueException('Unsupported block cipher mode of operation');
- }
-
- /**
- * Returns a cipher object corresponding to a string
- *
- * @access public
- * @param string $algo
- * @return string
- * @throws \UnexpectedValueException if the encryption algorithm is unsupported
- */
- private static function getEncryptionObject($algo)
- {
- $modes = '(CBC|ECB|CFB|OFB|CTR)';
- switch (true) {
- case preg_match("#^AES-(128|192|256)-$modes$#", $algo, $matches):
- $cipher = new AES(self::getEncryptionMode($matches[2]));
- $cipher->setKeyLength($matches[1]);
- return $cipher;
- case preg_match("#^DES-EDE3-$modes$#", $algo, $matches):
- return new TripleDES(self::getEncryptionMode($matches[1]));
- case preg_match("#^DES-$modes$#", $algo, $matches):
- return new DES(self::getEncryptionMode($matches[1]));
- default:
- throw new UnsupportedAlgorithmException($algo . ' is not a supported algorithm');
- }
- }
-
- /**
- * Generate a symmetric key for PKCS#1 keys
- *
- * @access private
- * @param string $password
- * @param string $iv
- * @param int $length
- * @return string
- */
- private static function generateSymmetricKey($password, $iv, $length)
- {
- $symkey = '';
- $iv = substr($iv, 0, 8);
- while (strlen($symkey) < $length) {
- $symkey.= md5($symkey . $password . $iv, true);
- }
- return substr($symkey, 0, $length);
- }
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- protected static function load($key, $password)
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- /* Although PKCS#1 proposes a format that public and private keys can use, encrypting them is
- "outside the scope" of PKCS#1. PKCS#1 then refers you to PKCS#12 and PKCS#15 if you're wanting to
- protect private keys, however, that's not what OpenSSL* does. OpenSSL protects private keys by adding
- two new "fields" to the key - DEK-Info and Proc-Type. These fields are discussed here:
-
- http://tools.ietf.org/html/rfc1421#section-4.6.1.1
- http://tools.ietf.org/html/rfc1421#section-4.6.1.3
-
- DES-EDE3-CBC as an algorithm, however, is not discussed anywhere, near as I can tell.
- DES-CBC and DES-EDE are discussed in RFC1423, however, DES-EDE3-CBC isn't, nor is its key derivation
- function. As is, the definitive authority on this encoding scheme isn't the IETF but rather OpenSSL's
- own implementation. ie. the implementation *is* the standard and any bugs that may exist in that
- implementation are part of the standard, as well.
-
- * OpenSSL is the de facto standard. It's utilized by OpenSSH and other projects */
- if (preg_match('#DEK-Info: (.+),(.+)#', $key, $matches)) {
- $iv = Hex::decode(trim($matches[2]));
- // remove the Proc-Type / DEK-Info sections as they're no longer needed
- $key = preg_replace('#^(?:Proc-Type|DEK-Info): .*#m', '', $key);
- $ciphertext = ASN1::extractBER($key);
- if ($ciphertext === false) {
- $ciphertext = $key;
- }
- $crypto = self::getEncryptionObject($matches[1]);
- $crypto->setKey(self::generateSymmetricKey($password, $iv, $crypto->getKeyLength() >> 3));
- $crypto->setIV($iv);
- $key = $crypto->decrypt($ciphertext);
- } else {
- if (self::$format != self::MODE_DER) {
- $decoded = ASN1::extractBER($key);
- if ($decoded !== false) {
- $key = $decoded;
- } elseif (self::$format == self::MODE_PEM) {
- throw new \UnexpectedValueException('Expected base64-encoded PEM format but was unable to decode base64 text');
- }
- }
- }
-
- return $key;
- }
-
- /**
- * Wrap a private key appropriately
- *
- * @access public
- * @param string $key
- * @param string $type
- * @param string $password
- * @param array $options optional
- * @return string
- */
- protected static function wrapPrivateKey($key, $type, $password, array $options = [])
- {
- if (empty($password) || !is_string($password)) {
- return "-----BEGIN $type PRIVATE KEY-----\r\n" .
- chunk_split(Base64::encode($key), 64) .
- "-----END $type PRIVATE KEY-----";
- }
-
- $encryptionAlgorithm = isset($options['encryptionAlgorithm']) ? $options['encryptionAlgorithm'] : self::$defaultEncryptionAlgorithm;
-
- $cipher = self::getEncryptionObject($encryptionAlgorithm);
- $iv = Random::string($cipher->getBlockLength() >> 3);
- $cipher->setKey(self::generateSymmetricKey($password, $iv, $cipher->getKeyLength() >> 3));
- $cipher->setIV($iv);
- $iv = strtoupper(Hex::encode($iv));
- return "-----BEGIN $type PRIVATE KEY-----\r\n" .
- "Proc-Type: 4,ENCRYPTED\r\n" .
- "DEK-Info: " . $encryptionAlgorithm. ",$iv\r\n" .
- "\r\n" .
- chunk_split(Base64::encode($cipher->encrypt($key)), 64) .
- "-----END $type PRIVATE KEY-----";
- }
-
- /**
- * Wrap a public key appropriately
- *
- * @access public
- * @param string $key
- * @param string $type
- * @return string
- */
- protected static function wrapPublicKey($key, $type)
- {
- return "-----BEGIN $type PUBLIC KEY-----\r\n" .
- chunk_split(Base64::encode($key), 64) .
- "-----END $type PUBLIC KEY-----";
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS8.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS8.php
deleted file mode 100644
index cb6d83ced..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS8.php
+++ /dev/null
@@ -1,702 +0,0 @@
-<?php
-
-/**
- * PKCS#8 Formatted Key Handler
- *
- * PHP version 5
- *
- * Used by PHP's openssl_public_encrypt() and openssl's rsautl (when -pubin is set)
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN ENCRYPTED PRIVATE KEY-----
- * -----BEGIN PRIVATE KEY-----
- * -----BEGIN PUBLIC KEY-----
- *
- * Analogous to ssh-keygen's pkcs8 format (as specified by -m). Although PKCS8
- * is specific to private keys it's basically creating a DER-encoded wrapper
- * for keys. This just extends that same concept to public keys (much like ssh-keygen)
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Crypt\DES;
-use phpseclib3\Crypt\RC2;
-use phpseclib3\Crypt\RC4;
-use phpseclib3\Crypt\AES;
-use phpseclib3\Crypt\TripleDES;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-
-/**
- * PKCS#8 Formatted Key Handler
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS8 extends PKCS
-{
- /**
- * Default encryption algorithm
- *
- * @var string
- * @access private
- */
- private static $defaultEncryptionAlgorithm = 'id-PBES2';
-
- /**
- * Default encryption scheme
- *
- * Only used when defaultEncryptionAlgorithm is id-PBES2
- *
- * @var string
- * @access private
- */
- private static $defaultEncryptionScheme = 'aes128-CBC-PAD';
-
- /**
- * Default PRF
- *
- * Only used when defaultEncryptionAlgorithm is id-PBES2
- *
- * @var string
- * @access private
- */
- private static $defaultPRF = 'id-hmacWithSHA256';
-
- /**
- * Default Iteration Count
- *
- * @var int
- * @access private
- */
- private static $defaultIterationCount = 2048;
-
- /**
- * OIDs loaded
- *
- * @var bool
- * @access private
- */
- private static $oidsLoaded = false;
-
- /**
- * Sets the default encryption algorithm
- *
- * @access public
- * @param string $algo
- */
- public static function setEncryptionAlgorithm($algo)
- {
- self::$defaultEncryptionAlgorithm = $algo;
- }
-
- /**
- * Sets the default encryption algorithm for PBES2
- *
- * @access public
- * @param string $algo
- */
- public static function setEncryptionScheme($algo)
- {
- self::$defaultEncryptionScheme = $algo;
- }
-
- /**
- * Sets the iteration count
- *
- * @access public
- * @param int $count
- */
- public static function setIterationCount($count)
- {
- self::$defaultIterationCount = $count;
- }
-
- /**
- * Sets the PRF for PBES2
- *
- * @access public
- * @param string $algo
- */
- public static function setPRF($algo)
- {
- self::$defaultPRF = $algo;
- }
-
- /**
- * Returns a SymmetricKey object based on a PBES1 $algo
- *
- * @return \phpseclib3\Crypt\Common\SymmetricKey
- * @access public
- * @param string $algo
- */
- private static function getPBES1EncryptionObject($algo)
- {
- $algo = preg_match('#^pbeWith(?:MD2|MD5|SHA1|SHA)And(.*?)-CBC$#', $algo, $matches) ?
- $matches[1] :
- substr($algo, 13); // strlen('pbeWithSHAAnd') == 13
-
- switch ($algo) {
- case 'DES':
- $cipher = new DES('cbc');
- break;
- case 'RC2':
- $cipher = new RC2('cbc');
- break;
- case '3-KeyTripleDES':
- $cipher = new TripleDES('cbc');
- break;
- case '2-KeyTripleDES':
- $cipher = new TripleDES('cbc');
- $cipher->setKeyLength(128);
- break;
- case '128BitRC2':
- $cipher = new RC2('cbc');
- $cipher->setKeyLength(128);
- break;
- case '40BitRC2':
- $cipher = new RC2('cbc');
- $cipher->setKeyLength(40);
- break;
- case '128BitRC4':
- $cipher = new RC4();
- $cipher->setKeyLength(128);
- break;
- case '40BitRC4':
- $cipher = new RC4();
- $cipher->setKeyLength(40);
- break;
- default:
- throw new UnsupportedAlgorithmException("$algo is not a supported algorithm");
- }
-
- return $cipher;
- }
-
- /**
- * Returns a hash based on a PBES1 $algo
- *
- * @return string
- * @access public
- * @param string $algo
- */
- private static function getPBES1Hash($algo)
- {
- if (preg_match('#^pbeWith(MD2|MD5|SHA1|SHA)And.*?-CBC$#', $algo, $matches)) {
- return $matches[1] == 'SHA' ? 'sha1' : $matches[1];
- }
-
- return 'sha1';
- }
-
- /**
- * Returns a KDF baesd on a PBES1 $algo
- *
- * @return string
- * @access public
- * @param string $algo
- */
- private static function getPBES1KDF($algo)
- {
- switch ($algo) {
- case 'pbeWithMD2AndDES-CBC':
- case 'pbeWithMD2AndRC2-CBC':
- case 'pbeWithMD5AndDES-CBC':
- case 'pbeWithMD5AndRC2-CBC':
- case 'pbeWithSHA1AndDES-CBC':
- case 'pbeWithSHA1AndRC2-CBC':
- return 'pbkdf1';
- }
-
- return 'pkcs12';
- }
-
- /**
- * Returns a SymmetricKey object baesd on a PBES2 $algo
- *
- * @return SymmetricKey
- * @access public
- * @param string $algo
- */
- private static function getPBES2EncryptionObject($algo)
- {
- switch ($algo) {
- case 'desCBC':
- $cipher = new TripleDES('cbc');
- break;
- case 'des-EDE3-CBC':
- $cipher = new TripleDES('cbc');
- break;
- case 'rc2CBC':
- $cipher = new RC2('cbc');
- // in theory this can be changed
- $cipher->setKeyLength(128);
- break;
- case 'rc5-CBC-PAD':
- throw new UnsupportedAlgorithmException('rc5-CBC-PAD is not supported for PBES2 PKCS#8 keys');
- case 'aes128-CBC-PAD':
- case 'aes192-CBC-PAD':
- case 'aes256-CBC-PAD':
- $cipher = new AES('cbc');
- $cipher->setKeyLength(substr($algo, 3, 3));
- break;
- default:
- throw new UnsupportedAlgorithmException("$algo is not supported");
- }
-
- return $cipher;
- }
-
- /**
- * Initialize static variables
- *
- * @access private
- */
- private static function initialize_static_variables()
- {
- if (!static::$childOIDsLoaded) {
- ASN1::loadOIDs(is_array(static::OID_NAME) ?
- array_combine(static::OID_NAME, static::OID_VALUE) :
- [static::OID_NAME => static::OID_VALUE]
- );
- static::$childOIDsLoaded = true;
- }
- if (!self::$oidsLoaded) {
- // from https://tools.ietf.org/html/rfc2898
- ASN1::loadOIDs([
- // PBES1 encryption schemes
- 'pbeWithMD2AndDES-CBC' => '1.2.840.113549.1.5.1',
- 'pbeWithMD2AndRC2-CBC' => '1.2.840.113549.1.5.4',
- 'pbeWithMD5AndDES-CBC' => '1.2.840.113549.1.5.3',
- 'pbeWithMD5AndRC2-CBC' => '1.2.840.113549.1.5.6',
- 'pbeWithSHA1AndDES-CBC'=> '1.2.840.113549.1.5.10',
- 'pbeWithSHA1AndRC2-CBC'=> '1.2.840.113549.1.5.11',
-
- // from PKCS#12:
- // https://tools.ietf.org/html/rfc7292
- 'pbeWithSHAAnd128BitRC4' => '1.2.840.113549.1.12.1.1',
- 'pbeWithSHAAnd40BitRC4' => '1.2.840.113549.1.12.1.2',
- 'pbeWithSHAAnd3-KeyTripleDES-CBC' => '1.2.840.113549.1.12.1.3',
- 'pbeWithSHAAnd2-KeyTripleDES-CBC' => '1.2.840.113549.1.12.1.4',
- 'pbeWithSHAAnd128BitRC2-CBC' => '1.2.840.113549.1.12.1.5',
- 'pbeWithSHAAnd40BitRC2-CBC' => '1.2.840.113549.1.12.1.6',
-
- 'id-PBKDF2' => '1.2.840.113549.1.5.12',
- 'id-PBES2' => '1.2.840.113549.1.5.13',
- 'id-PBMAC1' => '1.2.840.113549.1.5.14',
-
- // from PKCS#5 v2.1:
- // http://www.rsa.com/rsalabs/pkcs/files/h11302-wp-pkcs5v2-1-password-based-cryptography-standard.pdf
- 'id-hmacWithSHA1' => '1.2.840.113549.2.7',
- 'id-hmacWithSHA224' => '1.2.840.113549.2.8',
- 'id-hmacWithSHA256' => '1.2.840.113549.2.9',
- 'id-hmacWithSHA384'=> '1.2.840.113549.2.10',
- 'id-hmacWithSHA512'=> '1.2.840.113549.2.11',
- 'id-hmacWithSHA512-224'=> '1.2.840.113549.2.12',
- 'id-hmacWithSHA512-256'=> '1.2.840.113549.2.13',
-
- 'desCBC' => '1.3.14.3.2.7',
- 'des-EDE3-CBC' => '1.2.840.113549.3.7',
- 'rc2CBC' => '1.2.840.113549.3.2',
- 'rc5-CBC-PAD' => '1.2.840.113549.3.9',
-
- 'aes128-CBC-PAD' => '2.16.840.1.101.3.4.1.2',
- 'aes192-CBC-PAD'=> '2.16.840.1.101.3.4.1.22',
- 'aes256-CBC-PAD'=> '2.16.840.1.101.3.4.1.42'
- ]);
- self::$oidsLoaded = true;
- }
- }
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- protected static function load($key, $password = '')
- {
- $decoded = self::preParse($key);
-
- $meta = [];
-
- $decrypted = ASN1::asn1map($decoded[0], Maps\EncryptedPrivateKeyInfo::MAP);
- if (strlen($password) && is_array($decrypted)) {
- $algorithm = $decrypted['encryptionAlgorithm']['algorithm'];
- switch ($algorithm) {
- // PBES1
- case 'pbeWithMD2AndDES-CBC':
- case 'pbeWithMD2AndRC2-CBC':
- case 'pbeWithMD5AndDES-CBC':
- case 'pbeWithMD5AndRC2-CBC':
- case 'pbeWithSHA1AndDES-CBC':
- case 'pbeWithSHA1AndRC2-CBC':
- case 'pbeWithSHAAnd3-KeyTripleDES-CBC':
- case 'pbeWithSHAAnd2-KeyTripleDES-CBC':
- case 'pbeWithSHAAnd128BitRC2-CBC':
- case 'pbeWithSHAAnd40BitRC2-CBC':
- case 'pbeWithSHAAnd128BitRC4':
- case 'pbeWithSHAAnd40BitRC4':
- $cipher = self::getPBES1EncryptionObject($algorithm);
- $hash = self::getPBES1Hash($algorithm);
- $kdf = self::getPBES1KDF($algorithm);
-
- $meta['meta']['algorithm'] = $algorithm;
-
- $temp = ASN1::decodeBER($decrypted['encryptionAlgorithm']['parameters']);
- extract(ASN1::asn1map($temp[0], Maps\PBEParameter::MAP));
- $iterationCount = (int) $iterationCount->toString();
- $cipher->setPassword($password, $kdf, $hash, $salt, $iterationCount);
- $key = $cipher->decrypt($decrypted['encryptedData']);
- $decoded = ASN1::decodeBER($key);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER 2');
- }
-
- break;
- case 'id-PBES2':
- $meta['meta']['algorithm'] = $algorithm;
-
- $temp = ASN1::decodeBER($decrypted['encryptionAlgorithm']['parameters']);
- $temp = ASN1::asn1map($temp[0], Maps\PBES2params::MAP);
- extract($temp);
-
- $cipher = self::getPBES2EncryptionObject($encryptionScheme['algorithm']);
- $meta['meta']['cipher'] = $encryptionScheme['algorithm'];
-
- $temp = ASN1::decodeBER($decrypted['encryptionAlgorithm']['parameters']);
- $temp = ASN1::asn1map($temp[0], Maps\PBES2params::MAP);
- extract($temp);
-
- if (!$cipher instanceof RC2) {
- $cipher->setIV($encryptionScheme['parameters']['octetString']);
- } else {
- $temp = ASN1::decodeBER($encryptionScheme['parameters']);
- extract(ASN1::asn1map($temp[0], Maps\RC2CBCParameter::MAP));
- $effectiveKeyLength = (int) $rc2ParametersVersion->toString();
- switch ($effectiveKeyLength) {
- case 160:
- $effectiveKeyLength = 40;
- break;
- case 120:
- $effectiveKeyLength = 64;
- break;
- case 58:
- $effectiveKeyLength = 128;
- break;
- //default: // should be >= 256
- }
- $cipher->setIV($iv);
- $cipher->setKeyLength($effectiveKeyLength);
- }
-
- $meta['meta']['keyDerivationFunc'] = $keyDerivationFunc['algorithm'];
- switch ($keyDerivationFunc['algorithm']) {
- case 'id-PBKDF2':
- $temp = ASN1::decodeBER($keyDerivationFunc['parameters']);
- $prf = ['algorithm' => 'id-hmacWithSHA1'];
- $params = ASN1::asn1map($temp[0], Maps\PBKDF2params::MAP);
- extract($params);
- $meta['meta']['prf'] = $prf['algorithm'];
- $hash = str_replace('-', '/', substr($prf['algorithm'], 11));
- $params = [
- $password,
- 'pbkdf2',
- $hash,
- $salt,
- (int) $iterationCount->toString()
- ];
- if (isset($keyLength)) {
- $params[] = (int) $keyLength->toString();
- }
- $cipher->setPassword(...$params);
- $key = $cipher->decrypt($decrypted['encryptedData']);
- $decoded = ASN1::decodeBER($key);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER 3');
- }
- break;
- default:
- throw new UnsupportedAlgorithmException('Only PBKDF2 is supported for PBES2 PKCS#8 keys');
- }
- break;
- case 'id-PBMAC1':
- //$temp = ASN1::decodeBER($decrypted['encryptionAlgorithm']['parameters']);
- //$value = ASN1::asn1map($temp[0], Maps\PBMAC1params::MAP);
- // since i can't find any implementation that does PBMAC1 it is unsupported
- throw new UnsupportedAlgorithmException('Only PBES1 and PBES2 PKCS#8 keys are supported.');
- // at this point we'll assume that the key conforms to PublicKeyInfo
- }
- }
-
- $private = ASN1::asn1map($decoded[0], Maps\OneAsymmetricKey::MAP);
- if (is_array($private)) {
- if (isset($private['privateKeyAlgorithm']['parameters']) && !$private['privateKeyAlgorithm']['parameters'] instanceof ASN1\Element && isset($decoded[0]['content'][1]['content'][1])) {
- $temp = $decoded[0]['content'][1]['content'][1];
- $private['privateKeyAlgorithm']['parameters'] = new ASN1\Element(substr($key, $temp['start'], $temp['length']));
- }
- if (is_array(static::OID_NAME)) {
- if (!in_array($private['privateKeyAlgorithm']['algorithm'], static::OID_NAME)) {
- throw new UnsupportedAlgorithmException($private['privateKeyAlgorithm']['algorithm'] . ' is not a supported key type');
- }
- } else {
- if ($private['privateKeyAlgorithm']['algorithm'] != static::OID_NAME) {
- throw new UnsupportedAlgorithmException('Only ' . static::OID_NAME . ' keys are supported; this is a ' . $private['privateKeyAlgorithm']['algorithm'] . ' key');
- }
- }
- if (isset($private['publicKey'])) {
- if ($private['publicKey'][0] != "\0") {
- throw new \UnexpectedValueException('The first byte of the public key should be null - not ' . bin2hex($private['publicKey'][0]));
- }
- $private['publicKey'] = substr($private['publicKey'], 1);
- }
- return $private + $meta;
- }
-
- // EncryptedPrivateKeyInfo and PublicKeyInfo have largely identical "signatures". the only difference
- // is that the former has an octet string and the later has a bit string. the first byte of a bit
- // string represents the number of bits in the last byte that are to be ignored but, currently,
- // bit strings wanting a non-zero amount of bits trimmed are not supported
- $public = ASN1::asn1map($decoded[0], Maps\PublicKeyInfo::MAP);
-
- if (is_array($public)) {
- if ($public['publicKey'][0] != "\0") {
- throw new \UnexpectedValueException('The first byte of the public key should be null - not ' . bin2hex($public['publicKey'][0]));
- }
- if (is_array(static::OID_NAME)) {
- if (!in_array($public['publicKeyAlgorithm']['algorithm'], static::OID_NAME)) {
- throw new UnsupportedAlgorithmException($public['publicKeyAlgorithm']['algorithm'] . ' is not a supported key type');
- }
- } else {
- if ($public['publicKeyAlgorithm']['algorithm'] != static::OID_NAME) {
- throw new UnsupportedAlgorithmException('Only ' . static::OID_NAME . ' keys are supported; this is a ' . $public['publicKeyAlgorithm']['algorithm'] . ' key');
- }
- }
- if (isset($public['publicKeyAlgorithm']['parameters']) && !$public['publicKeyAlgorithm']['parameters'] instanceof ASN1\Element && isset($decoded[0]['content'][0]['content'][1])) {
- $temp = $decoded[0]['content'][0]['content'][1];
- $public['publicKeyAlgorithm']['parameters'] = new ASN1\Element(substr($key, $temp['start'], $temp['length']));
- }
- $public['publicKey'] = substr($public['publicKey'], 1);
- return $public;
- }
-
- throw new \RuntimeException('Unable to parse using either OneAsymmetricKey or PublicKeyInfo ASN1 maps');
- }
-
- /**
- * Wrap a private key appropriately
- *
- * @access public
- * @param string $key
- * @param string $attr
- * @param mixed $params
- * @param string $password
- * @param string $oid optional
- * @param string $publicKey optional
- * @param array $options optional
- * @return string
- */
- protected static function wrapPrivateKey($key, $attr, $params, $password, $oid = null, $publicKey = '', array $options = [])
- {
- self::initialize_static_variables();
-
- $key = [
- 'version' => 'v1',
- 'privateKeyAlgorithm' => [
- 'algorithm' => is_string(static::OID_NAME) ? static::OID_NAME : $oid,
- 'parameters' => $params
- ],
- 'privateKey' => $key
- ];
- if (!empty($attr)) {
- $key['attributes'] = $attr;
- }
- if (!empty($publicKey)) {
- $key['version'] = 'v2';
- $key['publicKey'] = $publicKey;
- }
- $key = ASN1::encodeDER($key, Maps\OneAsymmetricKey::MAP);
- if (!empty($password) && is_string($password)) {
- $salt = Random::string(8);
-
- $iterationCount = isset($options['iterationCount']) ? $options['iterationCount'] : self::$defaultIterationCount;
- $encryptionAlgorithm = isset($options['encryptionAlgorithm']) ? $options['encryptionAlgorithm'] : self::$defaultEncryptionAlgorithm;
- $encryptionScheme = isset($options['encryptionScheme']) ? $options['encryptionScheme'] : self::$defaultEncryptionScheme;
- $prf = isset($options['PRF']) ? $options['PRF'] : self::$defaultPRF;
-
- if ($encryptionAlgorithm == 'id-PBES2') {
- $crypto = self::getPBES2EncryptionObject($encryptionScheme);
- $hash = str_replace('-', '/', substr($prf, 11));
- $kdf = 'pbkdf2';
- $iv = Random::string($crypto->getBlockLength() >> 3);
-
- $PBKDF2params = [
- 'salt' => $salt,
- 'iterationCount' => $iterationCount,
- 'prf' => ['algorithm' => $prf, 'parameters' => null]
- ];
- $PBKDF2params = ASN1::encodeDER($PBKDF2params, Maps\PBKDF2params::MAP);
-
- if (!$crypto instanceof RC2) {
- $params = ['octetString' => $iv];
- } else {
- $params = [
- 'rc2ParametersVersion' => 58,
- 'iv' => $iv
- ];
- $params = ASN1::encodeDER($params, Maps\RC2CBCParameter::MAP);
- $params = new ASN1\Element($params);
- }
-
- $params = [
- 'keyDerivationFunc' => [
- 'algorithm' => 'id-PBKDF2',
- 'parameters' => new ASN1\Element($PBKDF2params)
- ],
- 'encryptionScheme' => [
- 'algorithm' => $encryptionScheme,
- 'parameters' => $params
- ]
- ];
- $params = ASN1::encodeDER($params, Maps\PBES2params::MAP);
-
- $crypto->setIV($iv);
- } else {
- $crypto = self::getPBES1EncryptionObject($encryptionAlgorithm);
- $hash = self::getPBES1Hash($encryptionAlgorithm);
- $kdf = self::getPBES1KDF($encryptionAlgorithm);
-
- $params = [
- 'salt' => $salt,
- 'iterationCount' => $iterationCount
- ];
- $params = ASN1::encodeDER($params, Maps\PBEParameter::MAP);
- }
- $crypto->setPassword($password, $kdf, $hash, $salt, $iterationCount);
- $key = $crypto->encrypt($key);
-
- $key = [
- 'encryptionAlgorithm' => [
- 'algorithm' => $encryptionAlgorithm,
- 'parameters' => new ASN1\Element($params)
- ],
- 'encryptedData' => $key
- ];
-
- $key = ASN1::encodeDER($key, Maps\EncryptedPrivateKeyInfo::MAP);
-
- return "-----BEGIN ENCRYPTED PRIVATE KEY-----\r\n" .
- chunk_split(Base64::encode($key), 64) .
- "-----END ENCRYPTED PRIVATE KEY-----";
- }
-
- return "-----BEGIN PRIVATE KEY-----\r\n" .
- chunk_split(Base64::encode($key), 64) .
- "-----END PRIVATE KEY-----";
- }
-
- /**
- * Wrap a public key appropriately
- *
- * @access public
- * @param string $key
- * @param mixed $params
- * @param string $oid
- * @return string
- */
- protected static function wrapPublicKey($key, $params, $oid = null)
- {
- self::initialize_static_variables();
-
- $key = [
- 'publicKeyAlgorithm' => [
- 'algorithm' => is_string(static::OID_NAME) ? static::OID_NAME : $oid,
- 'parameters' => $params
- ],
- 'publicKey' => "\0" . $key
- ];
-
- $key = ASN1::encodeDER($key, Maps\PublicKeyInfo::MAP);
-
- return "-----BEGIN PUBLIC KEY-----\r\n" .
- chunk_split(Base64::encode($key), 64) .
- "-----END PUBLIC KEY-----";
- }
-
- /**
- * Perform some preliminary parsing of the key
- *
- * @param string $key
- * @return array
- */
- private static function preParse(&$key)
- {
- self::initialize_static_variables();
-
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- if (self::$format != self::MODE_DER) {
- $decoded = ASN1::extractBER($key);
- if ($decoded !== false) {
- $key = $decoded;
- } elseif (self::$format == self::MODE_PEM) {
- throw new \UnexpectedValueException('Expected base64-encoded PEM format but was unable to decode base64 text');
- }
- }
-
- $decoded = ASN1::decodeBER($key);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER');
- }
-
- return $decoded;
- }
-
- /**
- * Returns the encryption parameters used by the key
- *
- * @param string $key
- * @return array
- */
- public static function extractEncryptionAlgorithm($key)
- {
- $decoded = self::preParse($key);
-
- $r = ASN1::asn1map($decoded[0], ASN1\Maps\EncryptedPrivateKeyInfo::MAP);
- if (!is_array($r)) {
- throw new \RuntimeException('Unable to parse using EncryptedPrivateKeyInfo map');
- }
-
- if ($r['encryptionAlgorithm']['algorithm'] == 'id-PBES2') {
- $decoded = ASN1::decodeBER($r['encryptionAlgorithm']['parameters']->element);
- $r['encryptionAlgorithm']['parameters'] = ASN1::asn1map($decoded[0], ASN1\Maps\PBES2params::MAP);
-
- $kdf = &$r['encryptionAlgorithm']['parameters']['keyDerivationFunc'];
- switch ($kdf['algorithm']) {
- case 'id-PBKDF2':
- $decoded = ASN1::decodeBER($kdf['parameters']->element);
- $kdf['parameters'] = ASN1::asn1map($decoded[0], Maps\PBKDF2params::MAP);
- }
- }
-
- return $r['encryptionAlgorithm'];
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PuTTY.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PuTTY.php
deleted file mode 100644
index ccd06f75e..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PuTTY.php
+++ /dev/null
@@ -1,261 +0,0 @@
-<?php
-
-/**
- * PuTTY Formatted Key Handler
- *
- * PHP version 5
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Crypt\AES;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-
-/**
- * PuTTY Formatted Key Handler
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PuTTY
-{
- /**
- * Default comment
- *
- * @var string
- * @access private
- */
- private static $comment = 'phpseclib-generated-key';
-
- /**
- * Sets the default comment
- *
- * @access public
- * @param string $comment
- */
- public static function setComment($comment)
- {
- self::$comment = str_replace(["\r", "\n"], '', $comment);
- }
-
- /**
- * Generate a symmetric key for PuTTY keys
- *
- * @access public
- * @param string $password
- * @param int $length
- * @return string
- */
- private static function generateSymmetricKey($password, $length)
- {
- $symkey = '';
- $sequence = 0;
- while (strlen($symkey) < $length) {
- $temp = pack('Na*', $sequence++, $password);
- $symkey.= Hex::decode(sha1($temp));
- }
- return substr($symkey, 0, $length);
- }
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password
- * @return array
- */
- public static function load($key, $password)
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- if (strpos($key, 'BEGIN SSH2 PUBLIC KEY') !== false) {
- $lines = preg_split('#[\r\n]+#', $key);
- switch (true) {
- case $lines[0] != '---- BEGIN SSH2 PUBLIC KEY ----':
- throw new \UnexpectedValueException('Key doesn\'t start with ---- BEGIN SSH2 PUBLIC KEY ----');
- case $lines[count($lines) - 1] != '---- END SSH2 PUBLIC KEY ----':
- throw new \UnexpectedValueException('Key doesn\'t end with ---- END SSH2 PUBLIC KEY ----');
- }
- $lines = array_splice($lines, 1, -1);
- $lines = array_map(function ($line) {
- return rtrim($line, "\r\n");
- }, $lines);
- $data = $current = '';
- $values = [];
- $in_value = false;
- foreach ($lines as $line) {
- switch (true) {
- case preg_match('#^(.*?): (.*)#', $line, $match):
- $in_value = $line[strlen($line) - 1] == '\\';
- $current = strtolower($match[1]);
- $values[$current] = $in_value ? substr($match[2], 0, -1) : $match[2];
- break;
- case $in_value:
- $in_value = $line[strlen($line) - 1] == '\\';
- $values[$current].= $in_value ? substr($line, 0, -1) : $line;
- break;
- default:
- $data.= $line;
- }
- }
-
- $components = call_user_func([static::PUBLIC_HANDLER, 'load'], $data);
- if ($components === false) {
- throw new \UnexpectedValueException('Unable to decode public key');
- }
- $components+= $values;
- $components['comment'] = str_replace(['\\\\', '\"'], ['\\', '"'], $values['comment']);
-
- return $components;
- }
-
- $components = [];
-
- $key = preg_split('#\r\n|\r|\n#', trim($key));
- $type = trim(preg_replace('#PuTTY-User-Key-File-2: (.+)#', '$1', $key[0]));
- $components['type'] = $type;
- if (!in_array($type, static::$types)) {
- $error = count(static::$types) == 1 ?
- 'Only ' . static::$types[0] . ' keys are supported. ' :
- '';
- throw new UnsupportedAlgorithmException($error . 'This is an unsupported ' . $type . ' key');
- }
- $encryption = trim(preg_replace('#Encryption: (.+)#', '$1', $key[1]));
- $components['comment'] = trim(preg_replace('#Comment: (.+)#', '$1', $key[2]));
-
- $publicLength = trim(preg_replace('#Public-Lines: (\d+)#', '$1', $key[3]));
- $public = Base64::decode(implode('', array_map('trim', array_slice($key, 4, $publicLength))));
-
- $source = Strings::packSSH2('ssss', $type, $encryption, $components['comment'], $public);
-
- extract(unpack('Nlength', Strings::shift($public, 4)));
- $newtype = Strings::shift($public, $length);
- if ($newtype != $type) {
- throw new \RuntimeException('The binary type does not match the human readable type field');
- }
-
- $components['public'] = $public;
-
- $privateLength = trim(preg_replace('#Private-Lines: (\d+)#', '$1', $key[$publicLength + 4]));
- $private = Base64::decode(implode('', array_map('trim', array_slice($key, $publicLength + 5, $privateLength))));
-
- switch ($encryption) {
- case 'aes256-cbc':
- $symkey = self::generateSymmetricKey($password, 32);
- $crypto = new AES('cbc');
- }
-
- $hashkey = 'putty-private-key-file-mac-key';
-
- if ($encryption != 'none') {
- $hashkey.= $password;
- $crypto->setKey($symkey);
- $crypto->setIV(str_repeat("\0", $crypto->getBlockLength() >> 3));
- $crypto->disablePadding();
- $private = $crypto->decrypt($private);
- }
-
- $source.= Strings::packSSH2('s', $private);
-
- $hash = new Hash('sha1');
- $hash->setKey(sha1($hashkey, true));
- $hmac = trim(preg_replace('#Private-MAC: (.+)#', '$1', $key[$publicLength + $privateLength + 5]));
- $hmac = Hex::decode($hmac);
-
- if (!hash_equals($hash->hash($source), $hmac)) {
- throw new \UnexpectedValueException('MAC validation error');
- }
-
- $components['private'] = $private;
-
- return $components;
- }
-
- /**
- * Wrap a private key appropriately
- *
- * @access private
- * @param string $public
- * @param string $private
- * @param string $type
- * @param string $password
- * @param array $options optional
- * @return string
- */
- protected static function wrapPrivateKey($public, $private, $type, $password, array $options = [])
- {
- $encryption = (!empty($password) || is_string($password)) ? 'aes256-cbc' : 'none';
- $comment = isset($options['comment']) ? $options['comment'] : self::$comment;
-
- $key = "PuTTY-User-Key-File-2: " . $type . "\r\nEncryption: "; $key.= $encryption;
- $key.= "\r\nComment: " . $comment . "\r\n";
-
- $public = Strings::packSSH2('s', $type) . $public;
-
- $source = Strings::packSSH2('ssss', $type, $encryption, $comment, $public);
-
- $public = Base64::encode($public);
- $key.= "Public-Lines: " . ((strlen($public) + 63) >> 6) . "\r\n";
- $key.= chunk_split($public, 64);
-
- if (empty($password) && !is_string($password)) {
- $source.= Strings::packSSH2('s', $private);
- $hashkey = 'putty-private-key-file-mac-key';
- } else {
- $private.= Random::string(16 - (strlen($private) & 15));
- $source.= Strings::packSSH2('s', $private);
- $crypto = new AES('cbc');
-
- $crypto->setKey(self::generateSymmetricKey($password, 32));
- $crypto->setIV(str_repeat("\0", $crypto->getBlockLength() >> 3));
- $crypto->disablePadding();
- $private = $crypto->encrypt($private);
- $hashkey = 'putty-private-key-file-mac-key' . $password;
- }
-
- $private = Base64::encode($private);
- $key.= 'Private-Lines: ' . ((strlen($private) + 63) >> 6) . "\r\n";
- $key.= chunk_split($private, 64);
- $hash = new Hash('sha1');
- $hash->setKey(sha1($hashkey, true));
- $key.= 'Private-MAC: ' . Hex::encode($hash->hash($source)) . "\r\n";
-
- return $key;
- }
-
- /**
- * Wrap a public key appropriately
- *
- * This is basically the format described in RFC 4716 (https://tools.ietf.org/html/rfc4716)
- *
- * @access private
- * @param string $key
- * @param string $type
- * @return string
- */
- protected static function wrapPublicKey($key, $type)
- {
- $key = pack('Na*a*', strlen($type), $type, $key);
- $key = "---- BEGIN SSH2 PUBLIC KEY ----\r\n" .
- 'Comment: "' . str_replace(['\\', '"'], ['\\\\', '\"'], self::$comment) . "\"\r\n" .
- chunk_split(Base64::encode($key), 64) .
- '---- END SSH2 PUBLIC KEY ----';
- return $key;
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Signature/Raw.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Signature/Raw.php
deleted file mode 100644
index 13e56e3b5..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Signature/Raw.php
+++ /dev/null
@@ -1,66 +0,0 @@
-<?php
-
-/**
- * Raw Signature Handler
- *
- * PHP version 5
- *
- * Handles signatures as arrays
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common\Formats\Signature;
-
-use phpseclib3\Math\BigInteger;
-
-/**
- * Raw Signature Handler
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Raw
-{
- /**
- * Loads a signature
- *
- * @access public
- * @param array $sig
- * @return array|bool
- */
- public static function load($sig)
- {
- switch (true) {
- case !is_array($sig):
- case !isset($sig['r']) || !isset($sig['s']):
- case !$sig['r'] instanceof BigInteger:
- case !$sig['s'] instanceof BigInteger:
- return false;
- }
-
- return [
- 'r' => $sig['r'],
- 's' => $sig['s']
- ];
- }
-
- /**
- * Returns a signature in the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $r
- * @param \phpseclib3\Math\BigInteger $s
- * @return string
- */
- public static function save(BigInteger $r, BigInteger $s)
- {
- return compact('r', 's');
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/PrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/PrivateKey.php
deleted file mode 100644
index 007123283..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/PrivateKey.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * PrivateKey interface
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2009 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common;
-
-/**
- * PrivateKey interface
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-interface PrivateKey
-{
- public function sign($message);
- //public function decrypt($ciphertext);
- public function getPublicKey();
- public function toString($type, array $options = []);
- public function withPassword($string);
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/PublicKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/PublicKey.php
deleted file mode 100644
index 0696de18c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/PublicKey.php
+++ /dev/null
@@ -1,29 +0,0 @@
-<?php
-
-/**
- * PublicKey interface
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2009 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common;
-
-/**
- * PublicKey interface
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-interface PublicKey
-{
- public function verify($message, $signature);
- //public function encrypt($plaintext);
- public function toString($type, array $options = []);
- public function getFingerprint($algorithm);
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/StreamCipher.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/StreamCipher.php
deleted file mode 100644
index f4d076d06..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/StreamCipher.php
+++ /dev/null
@@ -1,59 +0,0 @@
-<?php
-
-/**
- * Base Class for all stream ciphers
- *
- * PHP version 5
- *
- * @category Crypt
- * @package StreamCipher
- * @author Jim Wigginton <terrafrost@php.net>
- * @author Hans-Juergen Petrich <petrich@tronic-media.com>
- * @copyright 2007 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common;
-
-/**
- * Base Class for all stream cipher classes
- *
- * @package StreamCipher
- * @author Jim Wigginton <terrafrost@php.net>
- */
-abstract class StreamCipher extends SymmetricKey
-{
- /**
- * Block Length of the cipher
- *
- * Stream ciphers do not have a block size
- *
- * @see \phpseclib3\Crypt\Common\SymmetricKey::block_size
- * @var int
- * @access private
- */
- protected $block_size = 0;
-
- /**
- * Default Constructor.
- *
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- * @return \phpseclib3\Crypt\Common\StreamCipher
- */
- public function __construct()
- {
- parent::__construct('stream');
- }
-
- /**
- * Stream ciphers not use an IV
- *
- * @access public
- * @return bool
- */
- public function usesIV()
- {
- return false;
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/SymmetricKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/SymmetricKey.php
deleted file mode 100644
index 76019337f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/SymmetricKey.php
+++ /dev/null
@@ -1,3271 +0,0 @@
-<?php
-
-/**
- * Base Class for all \phpseclib3\Crypt\* cipher classes
- *
- * PHP version 5
- *
- * Internally for phpseclib developers:
- * If you plan to add a new cipher class, please note following rules:
- *
- * - The new \phpseclib3\Crypt\* cipher class should extend \phpseclib3\Crypt\Common\SymmetricKey
- *
- * - Following methods are then required to be overridden/overloaded:
- *
- * - encryptBlock()
- *
- * - decryptBlock()
- *
- * - setupKey()
- *
- * - All other methods are optional to be overridden/overloaded
- *
- * - Look at the source code of the current ciphers how they extend \phpseclib3\Crypt\Common\SymmetricKey
- * and take one of them as a start up for the new cipher class.
- *
- * - Please read all the other comments/notes/hints here also for each class var/method
- *
- * @category Crypt
- * @package Base
- * @author Jim Wigginton <terrafrost@php.net>
- * @author Hans-Juergen Petrich <petrich@tronic-media.com>
- * @copyright 2007 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common;
-
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Math\BinaryField;
-use phpseclib3\Math\PrimeField;
-use phpseclib3\Exception\BadDecryptionException;
-use phpseclib3\Exception\BadModeException;
-use phpseclib3\Exception\InconsistentSetupException;
-use phpseclib3\Exception\InsufficientSetupException;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-
-/**
- * Base Class for all \phpseclib3\Crypt\* cipher classes
- *
- * @package Base
- * @author Jim Wigginton <terrafrost@php.net>
- * @author Hans-Juergen Petrich <petrich@tronic-media.com>
- */
-abstract class SymmetricKey
-{
- /**
- * Encrypt / decrypt using the Counter mode.
- *
- * Set to -1 since that's what Crypt/Random.php uses to index the CTR mode.
- *
- * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Counter_.28CTR.29
- * @access public
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- */
- const MODE_CTR = -1;
- /**
- * Encrypt / decrypt using the Electronic Code Book mode.
- *
- * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Electronic_codebook_.28ECB.29
- * @access public
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- */
- const MODE_ECB = 1;
- /**
- * Encrypt / decrypt using the Code Book Chaining mode.
- *
- * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher-block_chaining_.28CBC.29
- * @access public
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- */
- const MODE_CBC = 2;
- /**
- * Encrypt / decrypt using the Cipher Feedback mode.
- *
- * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher_feedback_.28CFB.29
- * @access public
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- */
- const MODE_CFB = 3;
- /**
- * Encrypt / decrypt using the Cipher Feedback mode (8bit)
- *
- * @access public
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- */
- const MODE_CFB8 = 38;
- /**
- * Encrypt / decrypt using the Output Feedback mode.
- *
- * @link http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Output_feedback_.28OFB.29
- * @access public
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- */
- const MODE_OFB = 4;
- /**
- * Encrypt / decrypt using Galois/Counter mode.
- *
- * @link https://en.wikipedia.org/wiki/Galois/Counter_Mode
- * @access public
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- */
- const MODE_GCM = 5;
- /**
- * Encrypt / decrypt using streaming mode.
- *
- * @access public
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- */
- const MODE_STREAM = 6;
-
- /**
- * Mode Map
- *
- * @access private
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- */
- const MODE_MAP = [
- 'ctr' => self::MODE_CTR,
- 'ecb' => self::MODE_ECB,
- 'cbc' => self::MODE_CBC,
- 'cfb' => self::MODE_CFB,
- 'cfb8' => self::MODE_CFB8,
- 'ofb' => self::MODE_OFB,
- 'gcm' => self::MODE_GCM,
- 'stream' => self::MODE_STREAM
- ];
-
- /**
- * Base value for the internal implementation $engine switch
- *
- * @access private
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- */
- const ENGINE_INTERNAL = 1;
- /**
- * Base value for the eval() implementation $engine switch
- *
- * @access private
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- */
- const ENGINE_EVAL = 2;
- /**
- * Base value for the mcrypt implementation $engine switch
- *
- * @access private
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- */
- const ENGINE_MCRYPT = 3;
- /**
- * Base value for the openssl implementation $engine switch
- *
- * @access private
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- */
- const ENGINE_OPENSSL = 4;
- /**
- * Base value for the libsodium implementation $engine switch
- *
- * @access private
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- */
- const ENGINE_LIBSODIUM = 5;
- /**
- * Base value for the openssl / gcm implementation $engine switch
- *
- * @access private
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- */
- const ENGINE_OPENSSL_GCM = 6;
-
- /**
- * Engine Reverse Map
- *
- * @access private
- * @see \phpseclib3\Crypt\Common\SymmetricKey::getEngine()
- */
- const ENGINE_MAP = [
- self::ENGINE_INTERNAL => 'PHP',
- self::ENGINE_EVAL => 'Eval',
- self::ENGINE_MCRYPT => 'mcrypt',
- self::ENGINE_OPENSSL => 'OpenSSL',
- self::ENGINE_LIBSODIUM => 'libsodium',
- self::ENGINE_OPENSSL_GCM => 'OpenSSL (GCM)'
- ];
-
- /**
- * The Encryption Mode
- *
- * @see self::__construct()
- * @var int
- * @access private
- */
- protected $mode;
-
- /**
- * The Block Length of the block cipher
- *
- * @var int
- * @access private
- */
- protected $block_size = 16;
-
- /**
- * The Key
- *
- * @see self::setKey()
- * @var string
- * @access private
- */
- protected $key = false;
-
- /**
- * The Initialization Vector
- *
- * @see self::setIV()
- * @var string
- * @access private
- */
- private $iv = false;
-
- /**
- * A "sliding" Initialization Vector
- *
- * @see self::enableContinuousBuffer()
- * @see self::clearBuffers()
- * @var string
- * @access private
- */
- protected $encryptIV;
-
- /**
- * A "sliding" Initialization Vector
- *
- * @see self::enableContinuousBuffer()
- * @see self::clearBuffers()
- * @var string
- * @access private
- */
- protected $decryptIV;
-
- /**
- * Continuous Buffer status
- *
- * @see self::enableContinuousBuffer()
- * @var bool
- * @access private
- */
- protected $continuousBuffer = false;
-
- /**
- * Encryption buffer for CTR, OFB and CFB modes
- *
- * @see self::encrypt()
- * @see self::clearBuffers()
- * @var array
- * @access private
- */
- protected $enbuffer;
-
- /**
- * Decryption buffer for CTR, OFB and CFB modes
- *
- * @see self::decrypt()
- * @see self::clearBuffers()
- * @var array
- * @access private
- */
- protected $debuffer;
-
- /**
- * mcrypt resource for encryption
- *
- * The mcrypt resource can be recreated every time something needs to be created or it can be created just once.
- * Since mcrypt operates in continuous mode, by default, it'll need to be recreated when in non-continuous mode.
- *
- * @see self::encrypt()
- * @var resource
- * @access private
- */
- private $enmcrypt;
-
- /**
- * mcrypt resource for decryption
- *
- * The mcrypt resource can be recreated every time something needs to be created or it can be created just once.
- * Since mcrypt operates in continuous mode, by default, it'll need to be recreated when in non-continuous mode.
- *
- * @see self::decrypt()
- * @var resource
- * @access private
- */
- private $demcrypt;
-
- /**
- * Does the enmcrypt resource need to be (re)initialized?
- *
- * @see \phpseclib3\Crypt\Twofish::setKey()
- * @see \phpseclib3\Crypt\Twofish::setIV()
- * @var bool
- * @access private
- */
- private $enchanged = true;
-
- /**
- * Does the demcrypt resource need to be (re)initialized?
- *
- * @see \phpseclib3\Crypt\Twofish::setKey()
- * @see \phpseclib3\Crypt\Twofish::setIV()
- * @var bool
- * @access private
- */
- private $dechanged = true;
-
- /**
- * mcrypt resource for CFB mode
- *
- * mcrypt's CFB mode, in (and only in) buffered context,
- * is broken, so phpseclib implements the CFB mode by it self,
- * even when the mcrypt php extension is available.
- *
- * In order to do the CFB-mode work (fast) phpseclib
- * use a separate ECB-mode mcrypt resource.
- *
- * @link http://phpseclib.sourceforge.net/cfb-demo.phps
- * @see self::encrypt()
- * @see self::decrypt()
- * @see self::setupMcrypt()
- * @var resource
- * @access private
- */
- private $ecb;
-
- /**
- * Optimizing value while CFB-encrypting
- *
- * Only relevant if $continuousBuffer enabled
- * and $engine == self::ENGINE_MCRYPT
- *
- * It's faster to re-init $enmcrypt if
- * $buffer bytes > $cfb_init_len than
- * using the $ecb resource furthermore.
- *
- * This value depends of the chosen cipher
- * and the time it would be needed for it's
- * initialization [by mcrypt_generic_init()]
- * which, typically, depends on the complexity
- * on its internaly Key-expanding algorithm.
- *
- * @see self::encrypt()
- * @var int
- * @access private
- */
- protected $cfb_init_len = 600;
-
- /**
- * Does internal cipher state need to be (re)initialized?
- *
- * @see self::setKey()
- * @see self::setIV()
- * @see self::disableContinuousBuffer()
- * @var bool
- * @access private
- */
- protected $changed = true;
-
- /**
- * Does Eval engie need to be (re)initialized?
- *
- * @see self::setup()
- * @var bool
- * @access private
- */
- protected $nonIVChanged = true;
-
- /**
- * Padding status
- *
- * @see self::enablePadding()
- * @var bool
- * @access private
- */
- private $padding = true;
-
- /**
- * Is the mode one that is paddable?
- *
- * @see self::__construct()
- * @var bool
- * @access private
- */
- private $paddable = false;
-
- /**
- * Holds which crypt engine internaly should be use,
- * which will be determined automatically on __construct()
- *
- * Currently available $engines are:
- * - self::ENGINE_LIBSODIUM (very fast, php-extension: libsodium, extension_loaded('libsodium') required)
- * - self::ENGINE_OPENSSL_GCM (very fast, php-extension: openssl, extension_loaded('openssl') required)
- * - self::ENGINE_OPENSSL (very fast, php-extension: openssl, extension_loaded('openssl') required)
- * - self::ENGINE_MCRYPT (fast, php-extension: mcrypt, extension_loaded('mcrypt') required)
- * - self::ENGINE_EVAL (medium, pure php-engine, no php-extension required)
- * - self::ENGINE_INTERNAL (slower, pure php-engine, no php-extension required)
- *
- * @see self::setEngine()
- * @see self::encrypt()
- * @see self::decrypt()
- * @var int
- * @access private
- */
- protected $engine;
-
- /**
- * Holds the preferred crypt engine
- *
- * @see self::setEngine()
- * @see self::setPreferredEngine()
- * @var int
- * @access private
- */
- private $preferredEngine;
-
- /**
- * The mcrypt specific name of the cipher
- *
- * Only used if $engine == self::ENGINE_MCRYPT
- *
- * @link http://www.php.net/mcrypt_module_open
- * @link http://www.php.net/mcrypt_list_algorithms
- * @see self::setupMcrypt()
- * @var string
- * @access private
- */
- protected $cipher_name_mcrypt;
-
- /**
- * The openssl specific name of the cipher
- *
- * Only used if $engine == self::ENGINE_OPENSSL
- *
- * @link http://www.php.net/openssl-get-cipher-methods
- * @var string
- * @access private
- */
- protected $cipher_name_openssl;
-
- /**
- * The openssl specific name of the cipher in ECB mode
- *
- * If OpenSSL does not support the mode we're trying to use (CTR)
- * it can still be emulated with ECB mode.
- *
- * @link http://www.php.net/openssl-get-cipher-methods
- * @var string
- * @access private
- */
- protected static $cipher_name_openssl_ecb;
-
- /**
- * The default salt used by setPassword()
- *
- * @see self::setPassword()
- * @var string
- * @access private
- */
- private $password_default_salt = 'phpseclib/salt';
-
- /**
- * The name of the performance-optimized callback function
- *
- * Used by encrypt() / decrypt()
- * only if $engine == self::ENGINE_INTERNAL
- *
- * @see self::encrypt()
- * @see self::decrypt()
- * @see self::setupInlineCrypt()
- * @var Callback
- * @access private
- */
- protected $inline_crypt;
-
- /**
- * If OpenSSL can be used in ECB but not in CTR we can emulate CTR
- *
- * @see self::openssl_ctr_process()
- * @var bool
- * @access private
- */
- private $openssl_emulate_ctr = false;
-
- /**
- * Don't truncate / null pad key
- *
- * @see self::clearBuffers()
- * @var bool
- * @access private
- */
- private $skip_key_adjustment = false;
-
- /**
- * Has the key length explicitly been set or should it be derived from the key, itself?
- *
- * @see self::setKeyLength()
- * @var bool
- * @access private
- */
- protected $explicit_key_length = false;
-
- /**
- * Hash subkey for GHASH
- *
- * @see self::setupGCM()
- * @see self::ghash()
- * @var BinaryField\Integer
- * @access private
- */
- private $h;
-
- /**
- * Additional authenticated data
- *
- * @var string
- * @access private
- */
- protected $aad = '';
-
- /**
- * Authentication Tag produced after a round of encryption
- *
- * @var string
- * @access private
- */
- protected $newtag = false;
-
- /**
- * Authentication Tag to be verified during decryption
- *
- * @var string
- * @access private
- */
- protected $oldtag = false;
-
- /**
- * GCM Binary Field
- *
- * @see self::__construct()
- * @see self::ghash()
- * @var BinaryField
- * @access private
- */
- private static $gcmField;
-
- /**
- * Poly1305 Prime Field
- *
- * @see self::enablePoly1305()
- * @see self::poly1305()
- * @var PrimeField
- * @access private
- */
- private static $poly1305Field;
-
- /**
- * Poly1305 Key
- *
- * @see self::setPoly1305Key()
- * @see self::poly1305()
- * @var string
- * @access private
- */
- protected $poly1305Key;
-
- /**
- * Poly1305 Flag
- *
- * @see self::setPoly1305Key()
- * @see self::enablePoly1305()
- * @var boolean
- * @access private
- */
- protected $usePoly1305 = false;
-
- /**
- * The Original Initialization Vector
- *
- * GCM uses the nonce to build the IV but we want to be able to distinguish between nonce-derived
- * IV's and user-set IV's
- *
- * @see self::setIV()
- * @var string
- * @access private
- */
- private $origIV = false;
-
- /**
- * Nonce
- *
- * Only used with GCM. We could re-use setIV() but nonce's can be of a different length and
- * toggling between GCM and other modes could be more complicated if we re-used setIV()
- *
- * @see self::setNonce()
- * @var string
- * @access private
- */
- protected $nonce = false;
-
- /**
- * Default Constructor.
- *
- * $mode could be:
- *
- * - ecb
- *
- * - cbc
- *
- * - ctr
- *
- * - cfb
- *
- * - cfb8
- *
- * - ofb
- *
- * - gcm
- *
- * @param string $mode
- * @access public
- * @throws BadModeException if an invalid / unsupported mode is provided
- */
- public function __construct($mode)
- {
- $mode = strtolower($mode);
- // necessary because of 5.6 compatibility; we can't do isset(self::MODE_MAP[$mode]) in 5.6
- $map = self::MODE_MAP;
- if (!isset($map[$mode])) {
- throw new BadModeException('No valid mode has been specified');
- }
-
- $mode = self::MODE_MAP[$mode];
-
- // $mode dependent settings
- switch ($mode) {
- case self::MODE_ECB:
- case self::MODE_CBC:
- $this->paddable = true;
- break;
- case self::MODE_CTR:
- case self::MODE_CFB:
- case self::MODE_CFB8:
- case self::MODE_OFB:
- case self::MODE_STREAM:
- $this->paddable = false;
- break;
- case self::MODE_GCM:
- if ($this->block_size != 16) {
- throw new BadModeException('GCM is only valid for block ciphers with a block size of 128 bits');
- }
- if (!isset(self::$gcmField)) {
- self::$gcmField = new BinaryField(128, 7, 2, 1, 0);
- }
- $this->paddable = false;
- break;
- default:
- throw new BadModeException('No valid mode has been specified');
- }
-
- $this->mode = $mode;
- }
-
- /**
- * Sets the initialization vector.
- *
- * setIV() is not required when ecb or gcm modes are being used.
- *
- * {@internal Can be overwritten by a sub class, but does not have to be}
- *
- * @access public
- * @param string $iv
- * @throws \LengthException if the IV length isn't equal to the block size
- * @throws \BadMethodCallException if an IV is provided when one shouldn't be
- */
- public function setIV($iv)
- {
- if ($this->mode == self::MODE_ECB) {
- throw new \BadMethodCallException('This mode does not require an IV.');
- }
-
- if ($this->mode == self::MODE_GCM) {
- throw new \BadMethodCallException('Use setNonce instead');
- }
-
- if (!$this->usesIV()) {
- throw new \BadMethodCallException('This algorithm does not use an IV.');
- }
-
- if (strlen($iv) != $this->block_size) {
- throw new \LengthException('Received initialization vector of size ' . strlen($iv) . ', but size ' . $this->block_size . ' is required');
- }
-
- $this->iv = $this->origIV = $iv;
- $this->changed = true;
- }
-
- /**
- * Enables Poly1305 mode.
- *
- * Once enabled Poly1305 cannot be disabled.
- *
- * @access public
- * @throws \BadMethodCallException if Poly1305 is enabled whilst in GCM mode
- */
- public function enablePoly1305()
- {
- if ($this->mode == self::MODE_GCM) {
- throw new \BadMethodCallException('Poly1305 cannot be used in GCM mode');
- }
-
- $this->usePoly1305 = true;
- }
-
- /**
- * Enables Poly1305 mode.
- *
- * Once enabled Poly1305 cannot be disabled. If $key is not passed then an attempt to call createPoly1305Key
- * will be made.
- *
- * @access public
- * @param string $key optional
- * @throws \LengthException if the key isn't long enough
- * @throws \BadMethodCallException if Poly1305 is enabled whilst in GCM mode
- */
- public function setPoly1305Key($key = null)
- {
- if ($this->mode == self::MODE_GCM) {
- throw new \BadMethodCallException('Poly1305 cannot be used in GCM mode');
- }
-
- if (!is_string($key) || strlen($key) != 32) {
- throw new \LengthException('The Poly1305 key must be 32 bytes long (256 bits)');
- }
-
- if (!isset(self::$poly1305Field)) {
- // 2^130-5
- self::$poly1305Field = new PrimeField(new BigInteger('3fffffffffffffffffffffffffffffffb', 16));
- }
-
- $this->poly1305Key = $key;
- $this->usePoly1305 = true;
- }
-
- /**
- * Sets the nonce.
- *
- * setNonce() is only required when gcm is used
- *
- * @access public
- * @param string $nonce
- * @throws \BadMethodCallException if an nonce is provided when one shouldn't be
- */
- public function setNonce($nonce)
- {
- if ($this->mode != self::MODE_GCM) {
- throw new \BadMethodCallException('Nonces are only used in GCM mode.');
- }
-
- $this->nonce = $nonce;
- $this->setEngine();
- }
-
- /**
- * Sets additional authenticated data
- *
- * setAAD() is only used by gcm or in poly1305 mode
- *
- * @access public
- * @param string $aad
- * @throws \BadMethodCallException if mode isn't GCM or if poly1305 isn't being utilized
- */
- public function setAAD($aad)
- {
- if ($this->mode != self::MODE_GCM && !$this->usePoly1305) {
- throw new \BadMethodCallException('Additional authenticated data is only utilized in GCM mode or with Poly1305');
- }
-
- $this->aad = $aad;
- }
-
- /**
- * Returns whether or not the algorithm uses an IV
- *
- * @access public
- * @return bool
- */
- public function usesIV()
- {
- return $this->mode != self::MODE_GCM && $this->mode != self::MODE_ECB;
- }
-
- /**
- * Returns whether or not the algorithm uses a nonce
- *
- * @access public
- * @return bool
- */
- public function usesNonce()
- {
- return $this->mode == self::MODE_GCM;
- }
-
- /**
- * Returns the current key length in bits
- *
- * @access public
- * @return int
- */
- public function getKeyLength()
- {
- return $this->key_length << 3;
- }
-
- /**
- * Returns the current block length in bits
- *
- * @access public
- * @return int
- */
- public function getBlockLength()
- {
- return $this->block_size << 3;
- }
-
- /**
- * Returns the current block length in bytes
- *
- * @access public
- * @return int
- */
- public function getBlockLengthInBytes()
- {
- return $this->block_size;
- }
-
- /**
- * Sets the key length.
- *
- * Keys with explicitly set lengths need to be treated accordingly
- *
- * @access public
- * @param int $length
- */
- public function setKeyLength($length)
- {
- $this->explicit_key_length = $length >> 3;
-
- if (is_string($this->key) && strlen($this->key) != $this->explicit_key_length) {
- $this->key = false;
- throw new InconsistentSetupException('Key has already been set and is not ' .$this->explicit_key_length . ' bytes long');
- }
- }
-
- /**
- * Sets the key.
- *
- * The min/max length(s) of the key depends on the cipher which is used.
- * If the key not fits the length(s) of the cipher it will paded with null bytes
- * up to the closest valid key length. If the key is more than max length,
- * we trim the excess bits.
- *
- * If the key is not explicitly set, it'll be assumed to be all null bytes.
- *
- * {@internal Could, but not must, extend by the child Crypt_* class}
- *
- * @access public
- * @param string $key
- */
- public function setKey($key)
- {
- if ($this->explicit_key_length !== false && strlen($key) != $this->explicit_key_length) {
- throw new InconsistentSetupException('Key length has already been set to ' . $this->explicit_key_length . ' bytes and this key is ' . strlen($key) . ' bytes');
- }
-
- $this->key = $key;
- $this->key_length = strlen($key);
- $this->setEngine();
- }
-
- /**
- * Sets the password.
- *
- * Depending on what $method is set to, setPassword()'s (optional) parameters are as follows:
- * {@link http://en.wikipedia.org/wiki/PBKDF2 pbkdf2} or pbkdf1:
- * $hash, $salt, $count, $dkLen
- *
- * Where $hash (default = sha1) currently supports the following hashes: see: Crypt/Hash.php
- *
- * {@internal Could, but not must, extend by the child Crypt_* class}
- *
- * @see Crypt/Hash.php
- * @param string $password
- * @param string $method
- * @param string[] ...$func_args
- * @throws \LengthException if pbkdf1 is being used and the derived key length exceeds the hash length
- * @return bool
- * @access public
- */
- public function setPassword($password, $method = 'pbkdf2', ...$func_args)
- {
- $key = '';
-
- $method = strtolower($method);
- switch ($method) {
- case 'pkcs12': // from https://tools.ietf.org/html/rfc7292#appendix-B.2
- case 'pbkdf1':
- case 'pbkdf2':
- // Hash function
- $hash = isset($func_args[0]) ? strtolower($func_args[0]) : 'sha1';
- $hashObj = new Hash();
- $hashObj->setHash($hash);
-
- // WPA and WPA2 use the SSID as the salt
- $salt = isset($func_args[1]) ? $func_args[1] : $this->password_default_salt;
-
- // RFC2898#section-4.2 uses 1,000 iterations by default
- // WPA and WPA2 use 4,096.
- $count = isset($func_args[2]) ? $func_args[2] : 1000;
-
- // Keylength
- if (isset($func_args[3])) {
- if ($func_args[3] <= 0) {
- throw new \LengthException('Derived key length cannot be longer 0 or less');
- }
- $dkLen = $func_args[3];
- } else {
- $key_length = $this->explicit_key_length !== false ? $this->explicit_key_length : $this->key_length;
- $dkLen = $method == 'pbkdf1' ? 2 * $key_length : $key_length;
- }
-
- switch (true) {
- case $method == 'pkcs12':
- /*
- In this specification, however, all passwords are created from
- BMPStrings with a NULL terminator. This means that each character in
- the original BMPString is encoded in 2 bytes in big-endian format
- (most-significant byte first). There are no Unicode byte order
- marks. The 2 bytes produced from the last character in the BMPString
- are followed by 2 additional bytes with the value 0x00.
-
- -- https://tools.ietf.org/html/rfc7292#appendix-B.1
- */
- $password = "\0". chunk_split($password, 1, "\0") . "\0";
-
- /*
- This standard specifies 3 different values for the ID byte mentioned
- above:
-
- 1. If ID=1, then the pseudorandom bits being produced are to be used
- as key material for performing encryption or decryption.
-
- 2. If ID=2, then the pseudorandom bits being produced are to be used
- as an IV (Initial Value) for encryption or decryption.
-
- 3. If ID=3, then the pseudorandom bits being produced are to be used
- as an integrity key for MACing.
- */
- // Construct a string, D (the "diversifier"), by concatenating v/8
- // copies of ID.
- $blockLength = $hashObj->getBlockLengthInBytes();
- $d1 = str_repeat(chr(1), $blockLength);
- $d2 = str_repeat(chr(2), $blockLength);
- $s = '';
- if (strlen($salt)) {
- while (strlen($s) < $blockLength) {
- $s.= $salt;
- }
- }
- $s = substr($s, 0, $blockLength);
-
- $p = '';
- if (strlen($password)) {
- while (strlen($p) < $blockLength) {
- $p.= $password;
- }
- }
- $p = substr($p, 0, $blockLength);
-
- $i = $s . $p;
-
- $this->setKey(self::pkcs12helper($dkLen, $hashObj, $i, $d1, $count));
- if ($this->usesIV()) {
- $this->setIV(self::pkcs12helper($this->block_size, $hashObj, $i, $d2, $count));
- }
-
- return true;
- case $method == 'pbkdf1':
- if ($dkLen > $hashObj->getLengthInBytes()) {
- throw new \LengthException('Derived key length cannot be longer than the hash length');
- }
- $t = $password . $salt;
- for ($i = 0; $i < $count; ++$i) {
- $t = $hashObj->hash($t);
- }
- $key = substr($t, 0, $dkLen);
-
- $this->setKey(substr($key, 0, $dkLen >> 1));
- if ($this->usesIV()) {
- $this->setIV(substr($key, $dkLen >> 1));
- }
-
- return true;
- case !in_array($hash, hash_algos()):
- $i = 1;
- $hashObj->setKey($password);
- while (strlen($key) < $dkLen) {
- $f = $u = $hashObj->hash($salt . pack('N', $i++));
- for ($j = 2; $j <= $count; ++$j) {
- $u = $hashObj->hash($u);
- $f^= $u;
- }
- $key.= $f;
- }
- $key = substr($key, 0, $dkLen);
- break;
- default:
- $key = hash_pbkdf2($hash, $password, $salt, $count, $dkLen, true);
- }
- break;
- default:
- throw new UnsupportedAlgorithmException($method . ' is not a supported password hashing method');
- }
-
- $this->setKey($key);
-
- return true;
- }
-
- /**
- * PKCS#12 KDF Helper Function
- *
- * As discussed here:
- *
- * {@link https://tools.ietf.org/html/rfc7292#appendix-B}
- *
- * @see self::setPassword()
- * @access private
- * @param int $n
- * @param \phpseclib3\Crypt\Hash $hashObj
- * @param string $i
- * @param string $d
- * @param int $count
- * @return string $a
- */
- private static function pkcs12helper($n, $hashObj, $i, $d, $count)
- {
- static $one;
- if (!isset($one)) {
- $one = new BigInteger(1);
- }
-
- $blockLength = $hashObj->getBlockLength() >> 3;
-
- $c = ceil($n / $hashObj->getLengthInBytes());
- $a = '';
- for ($j = 1; $j <= $c; $j++) {
- $ai = $d . $i;
- for ($k = 0; $k < $count; $k++) {
- $ai = $hashObj->hash($ai);
- }
- $b = '';
- while (strlen($b) < $blockLength) {
- $b.= $ai;
- }
- $b = substr($b, 0, $blockLength);
- $b = new BigInteger($b, 256);
- $newi = '';
- for ($k = 0; $k < strlen($i); $k+= $blockLength) {
- $temp = substr($i, $k, $blockLength);
- $temp = new BigInteger($temp, 256);
- $temp->setPrecision($blockLength << 3);
- $temp = $temp->add($b);
- $temp = $temp->add($one);
- $newi.= $temp->toBytes(false);
- }
- $i = $newi;
- $a.= $ai;
- }
-
- return substr($a, 0, $n);
- }
-
- /**
- * Encrypts a message.
- *
- * $plaintext will be padded with additional bytes such that it's length is a multiple of the block size. Other cipher
- * implementations may or may not pad in the same manner. Other common approaches to padding and the reasons why it's
- * necessary are discussed in the following
- * URL:
- *
- * {@link http://www.di-mgt.com.au/cryptopad.html http://www.di-mgt.com.au/cryptopad.html}
- *
- * An alternative to padding is to, separately, send the length of the file. This is what SSH, in fact, does.
- * strlen($plaintext) will still need to be a multiple of the block size, however, arbitrary values can be added to make it that
- * length.
- *
- * {@internal Could, but not must, extend by the child Crypt_* class}
- *
- * @see self::decrypt()
- * @access public
- * @param string $plaintext
- * @return string $ciphertext
- */
- public function encrypt($plaintext)
- {
- if ($this->paddable) {
- $plaintext = $this->pad($plaintext);
- }
-
- $this->setup();
-
- if ($this->mode == self::MODE_GCM) {
- $oldIV = $this->iv;
- Strings::increment_str($this->iv);
- $cipher = new static('ctr');
- $cipher->setKey($this->key);
- $cipher->setIV($this->iv);
- $ciphertext = $cipher->encrypt($plaintext);
-
- $s = $this->ghash(
- self::nullPad128($this->aad) .
- self::nullPad128($ciphertext) .
- self::len64($this->aad) .
- self::len64($ciphertext)
- );
- $cipher->encryptIV = $this->iv = $this->encryptIV = $this->decryptIV = $oldIV;
- $this->newtag = $cipher->encrypt($s);
- return $ciphertext;
- }
-
- if (isset($this->poly1305Key)) {
- $cipher = clone $this;
- unset($cipher->poly1305Key);
- $this->usePoly1305 = false;
- $ciphertext = $cipher->encrypt($plaintext);
- $this->newtag = $this->poly1305($ciphertext);
- return $ciphertext;
- }
-
- if ($this->engine === self::ENGINE_OPENSSL) {
- switch ($this->mode) {
- case self::MODE_STREAM:
- return openssl_encrypt($plaintext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING);
- case self::MODE_ECB:
- return openssl_encrypt($plaintext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING);
- case self::MODE_CBC:
- $result = openssl_encrypt($plaintext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $this->encryptIV);
- if ($this->continuousBuffer) {
- $this->encryptIV = substr($result, -$this->block_size);
- }
- return $result;
- case self::MODE_CTR:
- return $this->openssl_ctr_process($plaintext, $this->encryptIV, $this->enbuffer);
- case self::MODE_CFB:
- // cfb loosely routines inspired by openssl's:
- // {@link http://cvs.openssl.org/fileview?f=openssl/crypto/modes/cfb128.c&v=1.3.2.2.2.1}
- $ciphertext = '';
- if ($this->continuousBuffer) {
- $iv = &$this->encryptIV;
- $pos = &$this->enbuffer['pos'];
- } else {
- $iv = $this->encryptIV;
- $pos = 0;
- }
- $len = strlen($plaintext);
- $i = 0;
- if ($pos) {
- $orig_pos = $pos;
- $max = $this->block_size - $pos;
- if ($len >= $max) {
- $i = $max;
- $len-= $max;
- $pos = 0;
- } else {
- $i = $len;
- $pos+= $len;
- $len = 0;
- }
- // ie. $i = min($max, $len), $len-= $i, $pos+= $i, $pos%= $blocksize
- $ciphertext = substr($iv, $orig_pos) ^ $plaintext;
- $iv = substr_replace($iv, $ciphertext, $orig_pos, $i);
- $plaintext = substr($plaintext, $i);
- }
-
- $overflow = $len % $this->block_size;
-
- if ($overflow) {
- $ciphertext.= openssl_encrypt(substr($plaintext, 0, -$overflow) . str_repeat("\0", $this->block_size), $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $iv);
- $iv = Strings::pop($ciphertext, $this->block_size);
-
- $size = $len - $overflow;
- $block = $iv ^ substr($plaintext, -$overflow);
- $iv = substr_replace($iv, $block, 0, $overflow);
- $ciphertext.= $block;
- $pos = $overflow;
- } elseif ($len) {
- $ciphertext = openssl_encrypt($plaintext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $iv);
- $iv = substr($ciphertext, -$this->block_size);
- }
-
- return $ciphertext;
- case self::MODE_CFB8:
- $ciphertext = openssl_encrypt($plaintext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $this->encryptIV);
- if ($this->continuousBuffer) {
- if (($len = strlen($ciphertext)) >= $this->block_size) {
- $this->encryptIV = substr($ciphertext, -$this->block_size);
- } else {
- $this->encryptIV = substr($this->encryptIV, $len - $this->block_size) . substr($ciphertext, -$len);
- }
- }
- return $ciphertext;
- case self::MODE_OFB:
- return $this->openssl_ofb_process($plaintext, $this->encryptIV, $this->enbuffer);
- }
- }
-
- if ($this->engine === self::ENGINE_MCRYPT) {
- if ($this->enchanged) {
- @mcrypt_generic_init($this->enmcrypt, $this->key, $this->getIV($this->encryptIV));
- $this->enchanged = false;
- }
-
- // re: {@link http://phpseclib.sourceforge.net/cfb-demo.phps}
- // using mcrypt's default handing of CFB the above would output two different things. using phpseclib's
- // rewritten CFB implementation the above outputs the same thing twice.
- if ($this->mode == self::MODE_CFB && $this->continuousBuffer) {
- $block_size = $this->block_size;
- $iv = &$this->encryptIV;
- $pos = &$this->enbuffer['pos'];
- $len = strlen($plaintext);
- $ciphertext = '';
- $i = 0;
- if ($pos) {
- $orig_pos = $pos;
- $max = $block_size - $pos;
- if ($len >= $max) {
- $i = $max;
- $len-= $max;
- $pos = 0;
- } else {
- $i = $len;
- $pos+= $len;
- $len = 0;
- }
- $ciphertext = substr($iv, $orig_pos) ^ $plaintext;
- $iv = substr_replace($iv, $ciphertext, $orig_pos, $i);
- $this->enbuffer['enmcrypt_init'] = true;
- }
- if ($len >= $block_size) {
- if ($this->enbuffer['enmcrypt_init'] === false || $len > $this->cfb_init_len) {
- if ($this->enbuffer['enmcrypt_init'] === true) {
- @mcrypt_generic_init($this->enmcrypt, $this->key, $iv);
- $this->enbuffer['enmcrypt_init'] = false;
- }
- $ciphertext.= @mcrypt_generic($this->enmcrypt, substr($plaintext, $i, $len - $len % $block_size));
- $iv = substr($ciphertext, -$block_size);
- $len%= $block_size;
- } else {
- while ($len >= $block_size) {
- $iv = @mcrypt_generic($this->ecb, $iv) ^ substr($plaintext, $i, $block_size);
- $ciphertext.= $iv;
- $len-= $block_size;
- $i+= $block_size;
- }
- }
- }
-
- if ($len) {
- $iv = @mcrypt_generic($this->ecb, $iv);
- $block = $iv ^ substr($plaintext, -$len);
- $iv = substr_replace($iv, $block, 0, $len);
- $ciphertext.= $block;
- $pos = $len;
- }
-
- return $ciphertext;
- }
-
- $ciphertext = @mcrypt_generic($this->enmcrypt, $plaintext);
-
- if (!$this->continuousBuffer) {
- @mcrypt_generic_init($this->enmcrypt, $this->key, $this->getIV($this->encryptIV));
- }
-
- return $ciphertext;
- }
-
- if ($this->engine === self::ENGINE_EVAL) {
- $inline = $this->inline_crypt;
- return $inline('encrypt', $plaintext);
- }
-
- $buffer = &$this->enbuffer;
- $block_size = $this->block_size;
- $ciphertext = '';
- switch ($this->mode) {
- case self::MODE_ECB:
- for ($i = 0; $i < strlen($plaintext); $i+=$block_size) {
- $ciphertext.= $this->encryptBlock(substr($plaintext, $i, $block_size));
- }
- break;
- case self::MODE_CBC:
- $xor = $this->encryptIV;
- for ($i = 0; $i < strlen($plaintext); $i+=$block_size) {
- $block = substr($plaintext, $i, $block_size);
- $block = $this->encryptBlock($block ^ $xor);
- $xor = $block;
- $ciphertext.= $block;
- }
- if ($this->continuousBuffer) {
- $this->encryptIV = $xor;
- }
- break;
- case self::MODE_CTR:
- $xor = $this->encryptIV;
- if (strlen($buffer['ciphertext'])) {
- for ($i = 0; $i < strlen($plaintext); $i+=$block_size) {
- $block = substr($plaintext, $i, $block_size);
- if (strlen($block) > strlen($buffer['ciphertext'])) {
- $buffer['ciphertext'].= $this->encryptBlock($xor);
- }
- Strings::increment_str($xor);
- $key = Strings::shift($buffer['ciphertext'], $block_size);
- $ciphertext.= $block ^ $key;
- }
- } else {
- for ($i = 0; $i < strlen($plaintext); $i+=$block_size) {
- $block = substr($plaintext, $i, $block_size);
- $key = $this->encryptBlock($xor);
- Strings::increment_str($xor);
- $ciphertext.= $block ^ $key;
- }
- }
- if ($this->continuousBuffer) {
- $this->encryptIV = $xor;
- if ($start = strlen($plaintext) % $block_size) {
- $buffer['ciphertext'] = substr($key, $start) . $buffer['ciphertext'];
- }
- }
- break;
- case self::MODE_CFB:
- // cfb loosely routines inspired by openssl's:
- // {@link http://cvs.openssl.org/fileview?f=openssl/crypto/modes/cfb128.c&v=1.3.2.2.2.1}
- if ($this->continuousBuffer) {
- $iv = &$this->encryptIV;
- $pos = &$buffer['pos'];
- } else {
- $iv = $this->encryptIV;
- $pos = 0;
- }
- $len = strlen($plaintext);
- $i = 0;
- if ($pos) {
- $orig_pos = $pos;
- $max = $block_size - $pos;
- if ($len >= $max) {
- $i = $max;
- $len-= $max;
- $pos = 0;
- } else {
- $i = $len;
- $pos+= $len;
- $len = 0;
- }
- // ie. $i = min($max, $len), $len-= $i, $pos+= $i, $pos%= $blocksize
- $ciphertext = substr($iv, $orig_pos) ^ $plaintext;
- $iv = substr_replace($iv, $ciphertext, $orig_pos, $i);
- }
- while ($len >= $block_size) {
- $iv = $this->encryptBlock($iv) ^ substr($plaintext, $i, $block_size);
- $ciphertext.= $iv;
- $len-= $block_size;
- $i+= $block_size;
- }
- if ($len) {
- $iv = $this->encryptBlock($iv);
- $block = $iv ^ substr($plaintext, $i);
- $iv = substr_replace($iv, $block, 0, $len);
- $ciphertext.= $block;
- $pos = $len;
- }
- break;
- case self::MODE_CFB8:
- $ciphertext = '';
- $len = strlen($plaintext);
- $iv = $this->encryptIV;
-
- for ($i = 0; $i < $len; ++$i) {
- $ciphertext .= ($c = $plaintext[$i] ^ $this->encryptBlock($iv));
- $iv = substr($iv, 1) . $c;
- }
-
- if ($this->continuousBuffer) {
- if ($len >= $block_size) {
- $this->encryptIV = substr($ciphertext, -$block_size);
- } else {
- $this->encryptIV = substr($this->encryptIV, $len - $block_size) . substr($ciphertext, -$len);
- }
- }
- break;
- case self::MODE_OFB:
- $xor = $this->encryptIV;
- if (strlen($buffer['xor'])) {
- for ($i = 0; $i < strlen($plaintext); $i+=$block_size) {
- $block = substr($plaintext, $i, $block_size);
- if (strlen($block) > strlen($buffer['xor'])) {
- $xor = $this->encryptBlock($xor);
- $buffer['xor'].= $xor;
- }
- $key = Strings::shift($buffer['xor'], $block_size);
- $ciphertext.= $block ^ $key;
- }
- } else {
- for ($i = 0; $i < strlen($plaintext); $i+=$block_size) {
- $xor = $this->encryptBlock($xor);
- $ciphertext.= substr($plaintext, $i, $block_size) ^ $xor;
- }
- $key = $xor;
- }
- if ($this->continuousBuffer) {
- $this->encryptIV = $xor;
- if ($start = strlen($plaintext) % $block_size) {
- $buffer['xor'] = substr($key, $start) . $buffer['xor'];
- }
- }
- break;
- case self::MODE_STREAM:
- $ciphertext = $this->encryptBlock($plaintext);
- break;
- }
-
- return $ciphertext;
- }
-
- /**
- * Decrypts a message.
- *
- * If strlen($ciphertext) is not a multiple of the block size, null bytes will be added to the end of the string until
- * it is.
- *
- * {@internal Could, but not must, extend by the child Crypt_* class}
- *
- * @see self::encrypt()
- * @access public
- * @param string $ciphertext
- * @return string $plaintext
- * @throws \LengthException if we're inside a block cipher and the ciphertext length is not a multiple of the block size
- */
- public function decrypt($ciphertext)
- {
- if ($this->paddable && strlen($ciphertext) % $this->block_size) {
- throw new \LengthException('The ciphertext length (' . strlen($ciphertext) . ') needs to be a multiple of the block size (' . $this->block_size . ')');
- }
-
- $this->setup();
-
- if ($this->mode == self::MODE_GCM || isset($this->poly1305Key)) {
- if ($this->oldtag === false) {
- throw new InsufficientSetupException('Authentication Tag has not been set');
- }
-
- if (isset($this->poly1305Key)) {
- $newtag = $this->poly1305($ciphertext);
- } else {
- $oldIV = $this->iv;
- Strings::increment_str($this->iv);
- $cipher = new static('ctr');
- $cipher->setKey($this->key);
- $cipher->setIV($this->iv);
- $plaintext = $cipher->decrypt($ciphertext);
-
- $s = $this->ghash(
- self::nullPad128($this->aad) .
- self::nullPad128($ciphertext) .
- self::len64($this->aad) .
- self::len64($ciphertext)
- );
- $cipher->encryptIV = $this->iv = $this->encryptIV = $this->decryptIV = $oldIV;
- $newtag = $cipher->encrypt($s);
- }
- if ($this->oldtag != substr($newtag, 0, strlen($newtag))) {
- $cipher = clone $this;
- unset($cipher->poly1305Key);
- $this->usePoly1305 = false;
- $plaintext = $cipher->decrypt($ciphertext);
- $this->oldtag = false;
- throw new BadDecryptionException('Derived authentication tag and supplied authentication tag do not match');
- }
- $this->oldtag = false;
- return $plaintext;
- }
-
- if ($this->engine === self::ENGINE_OPENSSL) {
- switch ($this->mode) {
- case self::MODE_STREAM:
- $plaintext = openssl_decrypt($ciphertext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING);
- break;
- case self::MODE_ECB:
- $plaintext = openssl_decrypt($ciphertext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING);
- break;
- case self::MODE_CBC:
- $offset = $this->block_size;
- $plaintext = openssl_decrypt($ciphertext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $this->decryptIV);
- if ($this->continuousBuffer) {
- $this->decryptIV = substr($ciphertext, -$offset, $this->block_size);
- }
- break;
- case self::MODE_CTR:
- $plaintext = $this->openssl_ctr_process($ciphertext, $this->decryptIV, $this->debuffer);
- break;
- case self::MODE_CFB:
- // cfb loosely routines inspired by openssl's:
- // {@link http://cvs.openssl.org/fileview?f=openssl/crypto/modes/cfb128.c&v=1.3.2.2.2.1}
- $plaintext = '';
- if ($this->continuousBuffer) {
- $iv = &$this->decryptIV;
- $pos = &$this->buffer['pos'];
- } else {
- $iv = $this->decryptIV;
- $pos = 0;
- }
- $len = strlen($ciphertext);
- $i = 0;
- if ($pos) {
- $orig_pos = $pos;
- $max = $this->block_size - $pos;
- if ($len >= $max) {
- $i = $max;
- $len-= $max;
- $pos = 0;
- } else {
- $i = $len;
- $pos+= $len;
- $len = 0;
- }
- // ie. $i = min($max, $len), $len-= $i, $pos+= $i, $pos%= $this->blocksize
- $plaintext = substr($iv, $orig_pos) ^ $ciphertext;
- $iv = substr_replace($iv, substr($ciphertext, 0, $i), $orig_pos, $i);
- $ciphertext = substr($ciphertext, $i);
- }
- $overflow = $len % $this->block_size;
- if ($overflow) {
- $plaintext.= openssl_decrypt(substr($ciphertext, 0, -$overflow), $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $iv);
- if ($len - $overflow) {
- $iv = substr($ciphertext, -$overflow - $this->block_size, -$overflow);
- }
- $iv = openssl_encrypt(str_repeat("\0", $this->block_size), $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $iv);
- $plaintext.= $iv ^ substr($ciphertext, -$overflow);
- $iv = substr_replace($iv, substr($ciphertext, -$overflow), 0, $overflow);
- $pos = $overflow;
- } elseif ($len) {
- $plaintext.= openssl_decrypt($ciphertext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $iv);
- $iv = substr($ciphertext, -$this->block_size);
- }
- break;
- case self::MODE_CFB8:
- $plaintext = openssl_decrypt($ciphertext, $this->cipher_name_openssl, $this->key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $this->decryptIV);
- if ($this->continuousBuffer) {
- if (($len = strlen($ciphertext)) >= $this->block_size) {
- $this->decryptIV = substr($ciphertext, -$this->block_size);
- } else {
- $this->decryptIV = substr($this->decryptIV, $len - $this->block_size) . substr($ciphertext, -$len);
- }
- }
- break;
- case self::MODE_OFB:
- $plaintext = $this->openssl_ofb_process($ciphertext, $this->decryptIV, $this->debuffer);
- }
-
- return $this->paddable ? $this->unpad($plaintext) : $plaintext;
- }
-
- if ($this->engine === self::ENGINE_MCRYPT) {
- $block_size = $this->block_size;
- if ($this->dechanged) {
- @mcrypt_generic_init($this->demcrypt, $this->key, $this->getIV($this->decryptIV));
- $this->dechanged = false;
- }
-
- if ($this->mode == self::MODE_CFB && $this->continuousBuffer) {
- $iv = &$this->decryptIV;
- $pos = &$this->debuffer['pos'];
- $len = strlen($ciphertext);
- $plaintext = '';
- $i = 0;
- if ($pos) {
- $orig_pos = $pos;
- $max = $block_size - $pos;
- if ($len >= $max) {
- $i = $max;
- $len-= $max;
- $pos = 0;
- } else {
- $i = $len;
- $pos+= $len;
- $len = 0;
- }
- // ie. $i = min($max, $len), $len-= $i, $pos+= $i, $pos%= $blocksize
- $plaintext = substr($iv, $orig_pos) ^ $ciphertext;
- $iv = substr_replace($iv, substr($ciphertext, 0, $i), $orig_pos, $i);
- }
- if ($len >= $block_size) {
- $cb = substr($ciphertext, $i, $len - $len % $block_size);
- $plaintext.= @mcrypt_generic($this->ecb, $iv . $cb) ^ $cb;
- $iv = substr($cb, -$block_size);
- $len%= $block_size;
- }
- if ($len) {
- $iv = @mcrypt_generic($this->ecb, $iv);
- $plaintext.= $iv ^ substr($ciphertext, -$len);
- $iv = substr_replace($iv, substr($ciphertext, -$len), 0, $len);
- $pos = $len;
- }
-
- return $plaintext;
- }
-
- $plaintext = @mdecrypt_generic($this->demcrypt, $ciphertext);
-
- if (!$this->continuousBuffer) {
- @mcrypt_generic_init($this->demcrypt, $this->key, $this->getIV($this->decryptIV));
- }
-
- return $this->paddable ? $this->unpad($plaintext) : $plaintext;
- }
-
- if ($this->engine === self::ENGINE_EVAL) {
- $inline = $this->inline_crypt;
- return $inline('decrypt', $ciphertext);
- }
-
- $block_size = $this->block_size;
-
- $buffer = &$this->debuffer;
- $plaintext = '';
- switch ($this->mode) {
- case self::MODE_ECB:
- for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) {
- $plaintext.= $this->decryptBlock(substr($ciphertext, $i, $block_size));
- }
- break;
- case self::MODE_CBC:
- $xor = $this->decryptIV;
- for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) {
- $block = substr($ciphertext, $i, $block_size);
- $plaintext.= $this->decryptBlock($block) ^ $xor;
- $xor = $block;
- }
- if ($this->continuousBuffer) {
- $this->decryptIV = $xor;
- }
- break;
- case self::MODE_CTR:
- $xor = $this->decryptIV;
- if (strlen($buffer['ciphertext'])) {
- for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) {
- $block = substr($ciphertext, $i, $block_size);
- if (strlen($block) > strlen($buffer['ciphertext'])) {
- $buffer['ciphertext'].= $this->encryptBlock($xor);
- }
- Strings::increment_str($xor);
- $key = Strings::shift($buffer['ciphertext'], $block_size);
- $plaintext.= $block ^ $key;
- }
- } else {
- for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) {
- $block = substr($ciphertext, $i, $block_size);
- $key = $this->encryptBlock($xor);
- Strings::increment_str($xor);
- $plaintext.= $block ^ $key;
- }
- }
- if ($this->continuousBuffer) {
- $this->decryptIV = $xor;
- if ($start = strlen($ciphertext) % $block_size) {
- $buffer['ciphertext'] = substr($key, $start) . $buffer['ciphertext'];
- }
- }
- break;
- case self::MODE_CFB:
- if ($this->continuousBuffer) {
- $iv = &$this->decryptIV;
- $pos = &$buffer['pos'];
- } else {
- $iv = $this->decryptIV;
- $pos = 0;
- }
- $len = strlen($ciphertext);
- $i = 0;
- if ($pos) {
- $orig_pos = $pos;
- $max = $block_size - $pos;
- if ($len >= $max) {
- $i = $max;
- $len-= $max;
- $pos = 0;
- } else {
- $i = $len;
- $pos+= $len;
- $len = 0;
- }
- // ie. $i = min($max, $len), $len-= $i, $pos+= $i, $pos%= $blocksize
- $plaintext = substr($iv, $orig_pos) ^ $ciphertext;
- $iv = substr_replace($iv, substr($ciphertext, 0, $i), $orig_pos, $i);
- }
- while ($len >= $block_size) {
- $iv = $this->encryptBlock($iv);
- $cb = substr($ciphertext, $i, $block_size);
- $plaintext.= $iv ^ $cb;
- $iv = $cb;
- $len-= $block_size;
- $i+= $block_size;
- }
- if ($len) {
- $iv = $this->encryptBlock($iv);
- $plaintext.= $iv ^ substr($ciphertext, $i);
- $iv = substr_replace($iv, substr($ciphertext, $i), 0, $len);
- $pos = $len;
- }
- break;
- case self::MODE_CFB8:
- $plaintext = '';
- $len = strlen($ciphertext);
- $iv = $this->decryptIV;
-
- for ($i = 0; $i < $len; ++$i) {
- $plaintext .= $ciphertext[$i] ^ $this->encryptBlock($iv);
- $iv = substr($iv, 1) . $ciphertext[$i];
- }
-
- if ($this->continuousBuffer) {
- if ($len >= $block_size) {
- $this->decryptIV = substr($ciphertext, -$block_size);
- } else {
- $this->decryptIV = substr($this->decryptIV, $len - $block_size) . substr($ciphertext, -$len);
- }
- }
- break;
- case self::MODE_OFB:
- $xor = $this->decryptIV;
- if (strlen($buffer['xor'])) {
- for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) {
- $block = substr($ciphertext, $i, $block_size);
- if (strlen($block) > strlen($buffer['xor'])) {
- $xor = $this->encryptBlock($xor);
- $buffer['xor'].= $xor;
- }
- $key = Strings::shift($buffer['xor'], $block_size);
- $plaintext.= $block ^ $key;
- }
- } else {
- for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) {
- $xor = $this->encryptBlock($xor);
- $plaintext.= substr($ciphertext, $i, $block_size) ^ $xor;
- }
- $key = $xor;
- }
- if ($this->continuousBuffer) {
- $this->decryptIV = $xor;
- if ($start = strlen($ciphertext) % $block_size) {
- $buffer['xor'] = substr($key, $start) . $buffer['xor'];
- }
- }
- break;
- case self::MODE_STREAM:
- $plaintext = $this->decryptBlock($ciphertext);
- break;
- }
- return $this->paddable ? $this->unpad($plaintext) : $plaintext;
- }
-
- /**
- * Get the authentication tag
- *
- * Only used in GCM or Poly1305 mode
- *
- * @see self::encrypt()
- * @param int $length optional
- * @return string
- * @access public
- * @throws \LengthException if $length isn't of a sufficient length
- * @throws \RuntimeException if GCM mode isn't being used
- */
- public function getTag($length = 16)
- {
- if ($this->mode != self::MODE_GCM && !$this->usePoly1305) {
- throw new \BadMethodCallException('Authentication tags are only utilized in GCM mode or with Poly1305');
- }
-
- if ($this->newtag === false) {
- throw new \BadMethodCallException('A tag can only be returned after a round of encryption has been performed');
- }
-
- // the tag is 128-bits. it can't be greater than 16 bytes because that's bigger than the tag is. if it
- // were 0 you might as well be doing CTR and less than 4 provides minimal security that could be trivially
- // easily brute forced.
- // see https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf#page=36
- // for more info
- if ($length < 4 || $length > 16) {
- throw new \LengthException('The authentication tag must be between 4 and 16 bytes long');
- }
-
- return $length == 16 ?
- $this->newtag :
- substr($this->newtag, 0, $length);
- }
-
- /**
- * Sets the authentication tag
- *
- * Only used in GCM mode
- *
- * @see self::decrypt()
- * @param string $tag
- * @access public
- * @throws \LengthException if $length isn't of a sufficient length
- * @throws \RuntimeException if GCM mode isn't being used
- */
- public function setTag($tag)
- {
- if ($this->usePoly1305 && !isset($this->poly1305Key) && method_exists($this, 'createPoly1305Key')) {
- $this->createPoly1305Key();
- }
-
- if ($this->mode != self::MODE_GCM && !$this->usePoly1305) {
- throw new \BadMethodCallException('Authentication tags are only utilized in GCM mode or with Poly1305');
- }
-
- $length = strlen($tag);
- if ($length < 4 || $length > 16) {
- throw new \LengthException('The authentication tag must be between 4 and 16 bytes long');
- }
- $this->oldtag = $tag;
- }
-
- /**
- * Get the IV
- *
- * mcrypt requires an IV even if ECB is used
- *
- * @see self::encrypt()
- * @see self::decrypt()
- * @param string $iv
- * @return string
- * @access private
- */
- protected function getIV($iv)
- {
- return $this->mode == self::MODE_ECB ? str_repeat("\0", $this->block_size) : $iv;
- }
-
- /**
- * OpenSSL CTR Processor
- *
- * PHP's OpenSSL bindings do not operate in continuous mode so we'll wrap around it. Since the keystream
- * for CTR is the same for both encrypting and decrypting this function is re-used by both SymmetricKey::encrypt()
- * and SymmetricKey::decrypt(). Also, OpenSSL doesn't implement CTR for all of it's symmetric ciphers so this
- * function will emulate CTR with ECB when necessary.
- *
- * @see self::encrypt()
- * @see self::decrypt()
- * @param string $plaintext
- * @param string $encryptIV
- * @param array $buffer
- * @return string
- * @access private
- */
- private function openssl_ctr_process($plaintext, &$encryptIV, &$buffer)
- {
- $ciphertext = '';
-
- $block_size = $this->block_size;
- $key = $this->key;
-
- if ($this->openssl_emulate_ctr) {
- $xor = $encryptIV;
- if (strlen($buffer['ciphertext'])) {
- for ($i = 0; $i < strlen($plaintext); $i+=$block_size) {
- $block = substr($plaintext, $i, $block_size);
- if (strlen($block) > strlen($buffer['ciphertext'])) {
- $buffer['ciphertext'].= openssl_encrypt($xor, static::$cipher_name_openssl_ecb, $key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING);
- }
- Strings::increment_str($xor);
- $otp = Strings::shift($buffer['ciphertext'], $block_size);
- $ciphertext.= $block ^ $otp;
- }
- } else {
- for ($i = 0; $i < strlen($plaintext); $i+=$block_size) {
- $block = substr($plaintext, $i, $block_size);
- $otp = openssl_encrypt($xor, static::$cipher_name_openssl_ecb, $key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING);
- Strings::increment_str($xor);
- $ciphertext.= $block ^ $otp;
- }
- }
- if ($this->continuousBuffer) {
- $encryptIV = $xor;
- if ($start = strlen($plaintext) % $block_size) {
- $buffer['ciphertext'] = substr($key, $start) . $buffer['ciphertext'];
- }
- }
-
- return $ciphertext;
- }
-
- if (strlen($buffer['ciphertext'])) {
- $ciphertext = $plaintext ^ Strings::shift($buffer['ciphertext'], strlen($plaintext));
- $plaintext = substr($plaintext, strlen($ciphertext));
-
- if (!strlen($plaintext)) {
- return $ciphertext;
- }
- }
-
- $overflow = strlen($plaintext) % $block_size;
- if ($overflow) {
- $plaintext2 = Strings::pop($plaintext, $overflow); // ie. trim $plaintext to a multiple of $block_size and put rest of $plaintext in $plaintext2
- $encrypted = openssl_encrypt($plaintext . str_repeat("\0", $block_size), $this->cipher_name_openssl, $key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $encryptIV);
- $temp = Strings::pop($encrypted, $block_size);
- $ciphertext.= $encrypted . ($plaintext2 ^ $temp);
- if ($this->continuousBuffer) {
- $buffer['ciphertext'] = substr($temp, $overflow);
- $encryptIV = $temp;
- }
- } elseif (!strlen($buffer['ciphertext'])) {
- $ciphertext.= openssl_encrypt($plaintext . str_repeat("\0", $block_size), $this->cipher_name_openssl, $key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $encryptIV);
- $temp = Strings::pop($ciphertext, $block_size);
- if ($this->continuousBuffer) {
- $encryptIV = $temp;
- }
- }
- if ($this->continuousBuffer) {
- $encryptIV = openssl_decrypt($encryptIV, static::$cipher_name_openssl_ecb, $key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING);
- if ($overflow) {
- Strings::increment_str($encryptIV);
- }
- }
-
- return $ciphertext;
- }
-
- /**
- * OpenSSL OFB Processor
- *
- * PHP's OpenSSL bindings do not operate in continuous mode so we'll wrap around it. Since the keystream
- * for OFB is the same for both encrypting and decrypting this function is re-used by both SymmetricKey::encrypt()
- * and SymmetricKey::decrypt().
- *
- * @see self::encrypt()
- * @see self::decrypt()
- * @param string $plaintext
- * @param string $encryptIV
- * @param array $buffer
- * @return string
- * @access private
- */
- private function openssl_ofb_process($plaintext, &$encryptIV, &$buffer)
- {
- if (strlen($buffer['xor'])) {
- $ciphertext = $plaintext ^ $buffer['xor'];
- $buffer['xor'] = substr($buffer['xor'], strlen($ciphertext));
- $plaintext = substr($plaintext, strlen($ciphertext));
- } else {
- $ciphertext = '';
- }
-
- $block_size = $this->block_size;
-
- $len = strlen($plaintext);
- $key = $this->key;
- $overflow = $len % $block_size;
-
- if (strlen($plaintext)) {
- if ($overflow) {
- $ciphertext.= openssl_encrypt(substr($plaintext, 0, -$overflow) . str_repeat("\0", $block_size), $this->cipher_name_openssl, $key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $encryptIV);
- $xor = Strings::pop($ciphertext, $block_size);
- if ($this->continuousBuffer) {
- $encryptIV = $xor;
- }
- $ciphertext.= Strings::shift($xor, $overflow) ^ substr($plaintext, -$overflow);
- if ($this->continuousBuffer) {
- $buffer['xor'] = $xor;
- }
- } else {
- $ciphertext = openssl_encrypt($plaintext, $this->cipher_name_openssl, $key, OPENSSL_RAW_DATA | OPENSSL_ZERO_PADDING, $encryptIV);
- if ($this->continuousBuffer) {
- $encryptIV = substr($ciphertext, -$block_size) ^ substr($plaintext, -$block_size);
- }
- }
- }
-
- return $ciphertext;
- }
-
- /**
- * phpseclib <-> OpenSSL Mode Mapper
- *
- * May need to be overwritten by classes extending this one in some cases
- *
- * @return string
- * @access private
- */
- protected function openssl_translate_mode()
- {
- switch ($this->mode) {
- case self::MODE_ECB:
- return 'ecb';
- case self::MODE_CBC:
- return 'cbc';
- case self::MODE_CTR:
- case self::MODE_GCM:
- return 'ctr';
- case self::MODE_CFB:
- return 'cfb';
- case self::MODE_CFB8:
- return 'cfb8';
- case self::MODE_OFB:
- return 'ofb';
- }
- }
-
- /**
- * Pad "packets".
- *
- * Block ciphers working by encrypting between their specified [$this->]block_size at a time
- * If you ever need to encrypt or decrypt something that isn't of the proper length, it becomes necessary to
- * pad the input so that it is of the proper length.
- *
- * Padding is enabled by default. Sometimes, however, it is undesirable to pad strings. Such is the case in SSH,
- * where "packets" are padded with random bytes before being encrypted. Unpad these packets and you risk stripping
- * away characters that shouldn't be stripped away. (SSH knows how many bytes are added because the length is
- * transmitted separately)
- *
- * @see self::disablePadding()
- * @access public
- */
- public function enablePadding()
- {
- $this->padding = true;
- }
-
- /**
- * Do not pad packets.
- *
- * @see self::enablePadding()
- * @access public
- */
- public function disablePadding()
- {
- $this->padding = false;
- }
-
- /**
- * Treat consecutive "packets" as if they are a continuous buffer.
- *
- * Say you have a 32-byte plaintext $plaintext. Using the default behavior, the two following code snippets
- * will yield different outputs:
- *
- * <code>
- * echo $rijndael->encrypt(substr($plaintext, 0, 16));
- * echo $rijndael->encrypt(substr($plaintext, 16, 16));
- * </code>
- * <code>
- * echo $rijndael->encrypt($plaintext);
- * </code>
- *
- * The solution is to enable the continuous buffer. Although this will resolve the above discrepancy, it creates
- * another, as demonstrated with the following:
- *
- * <code>
- * $rijndael->encrypt(substr($plaintext, 0, 16));
- * echo $rijndael->decrypt($rijndael->encrypt(substr($plaintext, 16, 16)));
- * </code>
- * <code>
- * echo $rijndael->decrypt($rijndael->encrypt(substr($plaintext, 16, 16)));
- * </code>
- *
- * With the continuous buffer disabled, these would yield the same output. With it enabled, they yield different
- * outputs. The reason is due to the fact that the initialization vector's change after every encryption /
- * decryption round when the continuous buffer is enabled. When it's disabled, they remain constant.
- *
- * Put another way, when the continuous buffer is enabled, the state of the \phpseclib3\Crypt\*() object changes after each
- * encryption / decryption round, whereas otherwise, it'd remain constant. For this reason, it's recommended that
- * continuous buffers not be used. They do offer better security and are, in fact, sometimes required (SSH uses them),
- * however, they are also less intuitive and more likely to cause you problems.
- *
- * {@internal Could, but not must, extend by the child Crypt_* class}
- *
- * @see self::disableContinuousBuffer()
- * @access public
- */
- public function enableContinuousBuffer()
- {
- if ($this->mode == self::MODE_ECB) {
- return;
- }
-
- if ($this->mode == self::MODE_GCM) {
- throw new \BadMethodCallException('This mode does not run in continuous mode');
- }
-
- $this->continuousBuffer = true;
-
- $this->setEngine();
- }
-
- /**
- * Treat consecutive packets as if they are a discontinuous buffer.
- *
- * The default behavior.
- *
- * {@internal Could, but not must, extend by the child Crypt_* class}
- *
- * @see self::enableContinuousBuffer()
- * @access public
- */
- public function disableContinuousBuffer()
- {
- if ($this->mode == self::MODE_ECB) {
- return;
- }
- if (!$this->continuousBuffer) {
- return;
- }
-
- $this->continuousBuffer = false;
-
- $this->setEngine();
- }
-
- /**
- * Test for engine validity
- *
- * @see self::__construct()
- * @param int $engine
- * @access private
- * @return bool
- */
- protected function isValidEngineHelper($engine)
- {
- switch ($engine) {
- case self::ENGINE_OPENSSL:
- $this->openssl_emulate_ctr = false;
- $result = $this->cipher_name_openssl &&
- extension_loaded('openssl');
- if (!$result) {
- return false;
- }
-
- $methods = openssl_get_cipher_methods();
- if (in_array($this->cipher_name_openssl, $methods)) {
- return true;
- }
- // not all of openssl's symmetric cipher's support ctr. for those
- // that don't we'll emulate it
- switch ($this->mode) {
- case self::MODE_CTR:
- if (in_array(static::$cipher_name_openssl_ecb, $methods)) {
- $this->openssl_emulate_ctr = true;
- return true;
- }
- }
- return false;
- case self::ENGINE_MCRYPT:
- return $this->cipher_name_mcrypt &&
- extension_loaded('mcrypt') &&
- in_array($this->cipher_name_mcrypt, @mcrypt_list_algorithms());
- case self::ENGINE_EVAL:
- return method_exists($this, 'setupInlineCrypt');
- case self::ENGINE_INTERNAL:
- return true;
- }
-
- return false;
- }
-
- /**
- * Test for engine validity
- *
- * @see self::__construct()
- * @param string $engine
- * @access public
- * @return bool
- */
- public function isValidEngine($engine)
- {
- static $reverseMap;
- if (!isset($reverseMap)) {
- $reverseMap = array_map('strtolower', self::ENGINE_MAP);
- $reverseMap = array_flip($reverseMap);
- }
- $engine = strtolower($engine);
- if (!isset($reverseMap[$engine])) {
- return false;
- }
-
- return $this->isValidEngineHelper($reverseMap[$engine]);
- }
-
- /**
- * Sets the preferred crypt engine
- *
- * Currently, $engine could be:
- *
- * - libsodium[very fast]
- *
- * - OpenSSL [very fast]
- *
- * - mcrypt [fast]
- *
- * - Eval [slow]
- *
- * - PHP [slowest]
- *
- * If the preferred crypt engine is not available the fastest available one will be used
- *
- * @see self::__construct()
- * @param string $engine
- * @access public
- */
- public function setPreferredEngine($engine)
- {
- static $reverseMap;
- if (!isset($reverseMap)) {
- $reverseMap = array_map('strtolower', self::ENGINE_MAP);
- $reverseMap = array_flip($reverseMap);
- }
- $engine = strtolower($engine);
- $this->preferredEngine = isset($reverseMap[$engine]) ? $reverseMap[$engine] : self::ENGINE_LIBSODIUM;
-
- $this->setEngine();
- }
-
- /**
- * Returns the engine currently being utilized
- *
- * @see self::setEngine()
- * @access public
- */
- public function getEngine()
- {
- return self::ENGINE_MAP[$this->engine];
- }
-
- /**
- * Sets the engine as appropriate
- *
- * @see self::__construct()
- * @access private
- */
- protected function setEngine()
- {
- $this->engine = null;
-
- $candidateEngines = [
- self::ENGINE_LIBSODIUM,
- self::ENGINE_OPENSSL_GCM,
- self::ENGINE_OPENSSL,
- self::ENGINE_MCRYPT,
- self::ENGINE_EVAL
- ];
- if (isset($this->preferredEngine)) {
- $temp = [$this->preferredEngine];
- $candidateEngines = array_merge(
- $temp,
- array_diff($candidateEngines, $temp)
- );
- }
- foreach ($candidateEngines as $engine) {
- if ($this->isValidEngineHelper($engine)) {
- $this->engine = $engine;
- break;
- }
- }
- if (!$this->engine) {
- $this->engine = self::ENGINE_INTERNAL;
- }
-
- if ($this->engine != self::ENGINE_MCRYPT && $this->enmcrypt) {
- // Closing the current mcrypt resource(s). _mcryptSetup() will, if needed,
- // (re)open them with the module named in $this->cipher_name_mcrypt
- @mcrypt_module_close($this->enmcrypt);
- @mcrypt_module_close($this->demcrypt);
- $this->enmcrypt = null;
- $this->demcrypt = null;
-
- if ($this->ecb) {
- @mcrypt_module_close($this->ecb);
- $this->ecb = null;
- }
- }
-
- $this->changed = $this->nonIVChanged = true;
- }
-
- /**
- * Encrypts a block
- *
- * Note: Must be extended by the child \phpseclib3\Crypt\* class
- *
- * @access private
- * @param string $in
- * @return string
- */
- abstract protected function encryptBlock($in);
-
- /**
- * Decrypts a block
- *
- * Note: Must be extended by the child \phpseclib3\Crypt\* class
- *
- * @access private
- * @param string $in
- * @return string
- */
- abstract protected function decryptBlock($in);
-
- /**
- * Setup the key (expansion)
- *
- * Only used if $engine == self::ENGINE_INTERNAL
- *
- * Note: Must extend by the child \phpseclib3\Crypt\* class
- *
- * @see self::setup()
- * @access private
- */
- abstract protected function setupKey();
-
- /**
- * Setup the self::ENGINE_INTERNAL $engine
- *
- * (re)init, if necessary, the internal cipher $engine and flush all $buffers
- * Used (only) if $engine == self::ENGINE_INTERNAL
- *
- * _setup() will be called each time if $changed === true
- * typically this happens when using one or more of following public methods:
- *
- * - setKey()
- *
- * - setIV()
- *
- * - disableContinuousBuffer()
- *
- * - First run of encrypt() / decrypt() with no init-settings
- *
- * {@internal setup() is always called before en/decryption.}
- *
- * {@internal Could, but not must, extend by the child Crypt_* class}
- *
- * @see self::setKey()
- * @see self::setIV()
- * @see self::disableContinuousBuffer()
- * @access private
- */
- protected function setup()
- {
- if (!$this->changed) {
- return;
- }
-
- $this->changed = false;
-
- if ($this->usePoly1305 && !isset($this->poly1305Key) && method_exists($this, 'createPoly1305Key')) {
- $this->createPoly1305Key();
- }
-
- $this->enbuffer = $this->debuffer = ['ciphertext' => '', 'xor' => '', 'pos' => 0, 'enmcrypt_init' => true];
- //$this->newtag = $this->oldtag = false;
-
- if ($this->usesNonce()) {
- if ($this->nonce === false) {
- throw new InsufficientSetupException('No nonce has been defined');
- }
- if ($this->mode == self::MODE_GCM && !in_array($this->engine, [self::ENGINE_LIBSODIUM, self::ENGINE_OPENSSL_GCM])) {
- $this->setupGCM();
- }
- } else {
- $this->iv = $this->origIV;
- }
-
- if ($this->iv === false && !in_array($this->mode, [self::MODE_STREAM, self::MODE_ECB])) {
- if ($this->mode != self::MODE_GCM || !in_array($this->engine, [self::ENGINE_LIBSODIUM, self::ENGINE_OPENSSL_GCM])) {
- throw new InsufficientSetupException('No IV has been defined');
- }
- }
-
- if ($this->key === false) {
- throw new InsufficientSetupException('No key has been defined');
- }
-
- $this->encryptIV = $this->decryptIV = $this->iv;
-
- switch ($this->engine) {
- case self::ENGINE_MCRYPT:
- $this->enchanged = $this->dechanged = true;
-
- if (!isset($this->enmcrypt)) {
- static $mcrypt_modes = [
- self::MODE_CTR => 'ctr',
- self::MODE_ECB => MCRYPT_MODE_ECB,
- self::MODE_CBC => MCRYPT_MODE_CBC,
- self::MODE_CFB => 'ncfb',
- self::MODE_CFB8 => MCRYPT_MODE_CFB,
- self::MODE_OFB => MCRYPT_MODE_NOFB,
- self::MODE_STREAM => MCRYPT_MODE_STREAM,
- ];
-
- $this->demcrypt = @mcrypt_module_open($this->cipher_name_mcrypt, '', $mcrypt_modes[$this->mode], '');
- $this->enmcrypt = @mcrypt_module_open($this->cipher_name_mcrypt, '', $mcrypt_modes[$this->mode], '');
-
- // we need the $ecb mcrypt resource (only) in MODE_CFB with enableContinuousBuffer()
- // to workaround mcrypt's broken ncfb implementation in buffered mode
- // see: {@link http://phpseclib.sourceforge.net/cfb-demo.phps}
- if ($this->mode == self::MODE_CFB) {
- $this->ecb = @mcrypt_module_open($this->cipher_name_mcrypt, '', MCRYPT_MODE_ECB, '');
- }
- } // else should mcrypt_generic_deinit be called?
-
- if ($this->mode == self::MODE_CFB) {
- @mcrypt_generic_init($this->ecb, $this->key, str_repeat("\0", $this->block_size));
- }
- break;
- case self::ENGINE_INTERNAL:
- $this->setupKey();
- break;
- case self::ENGINE_EVAL:
- if ($this->nonIVChanged) {
- $this->setupKey();
- $this->setupInlineCrypt();
- }
- }
-
- $this->nonIVChanged = false;
- }
-
- /**
- * Pads a string
- *
- * Pads a string using the RSA PKCS padding standards so that its length is a multiple of the blocksize.
- * $this->block_size - (strlen($text) % $this->block_size) bytes are added, each of which is equal to
- * chr($this->block_size - (strlen($text) % $this->block_size)
- *
- * If padding is disabled and $text is not a multiple of the blocksize, the string will be padded regardless
- * and padding will, hence forth, be enabled.
- *
- * @see self::unpad()
- * @param string $text
- * @throws \LengthException if padding is disabled and the plaintext's length is not a multiple of the block size
- * @access private
- * @return string
- */
- protected function pad($text)
- {
- $length = strlen($text);
-
- if (!$this->padding) {
- if ($length % $this->block_size == 0) {
- return $text;
- } else {
- throw new \LengthException("The plaintext's length ($length) is not a multiple of the block size ({$this->block_size}). Try enabling padding.");
- }
- }
-
- $pad = $this->block_size - ($length % $this->block_size);
-
- return str_pad($text, $length + $pad, chr($pad));
- }
-
- /**
- * Unpads a string.
- *
- * If padding is enabled and the reported padding length is invalid the encryption key will be assumed to be wrong
- * and false will be returned.
- *
- * @see self::pad()
- * @param string $text
- * @throws \LengthException if the ciphertext's length is not a multiple of the block size
- * @access private
- * @return string
- */
- protected function unpad($text)
- {
- if (!$this->padding) {
- return $text;
- }
-
- $length = ord($text[strlen($text) - 1]);
-
- if (!$length || $length > $this->block_size) {
- throw new BadDecryptionException("The ciphertext has an invalid padding length ($length) compared to the block size ({$this->block_size})");
- }
-
- return substr($text, 0, -$length);
- }
-
- /**
- * Setup the performance-optimized function for de/encrypt()
- *
- * Stores the created (or existing) callback function-name
- * in $this->inline_crypt
- *
- * Internally for phpseclib developers:
- *
- * _setupInlineCrypt() would be called only if:
- *
- * - $this->engine === self::ENGINE_EVAL
- *
- * - each time on _setup(), after(!) _setupKey()
- *
- *
- * This ensures that _setupInlineCrypt() has always a
- * full ready2go initializated internal cipher $engine state
- * where, for example, the keys already expanded,
- * keys/block_size calculated and such.
- *
- * It is, each time if called, the responsibility of _setupInlineCrypt():
- *
- * - to set $this->inline_crypt to a valid and fully working callback function
- * as a (faster) replacement for encrypt() / decrypt()
- *
- * - NOT to create unlimited callback functions (for memory reasons!)
- * no matter how often _setupInlineCrypt() would be called. At some
- * point of amount they must be generic re-useable.
- *
- * - the code of _setupInlineCrypt() it self,
- * and the generated callback code,
- * must be, in following order:
- * - 100% safe
- * - 100% compatible to encrypt()/decrypt()
- * - using only php5+ features/lang-constructs/php-extensions if
- * compatibility (down to php4) or fallback is provided
- * - readable/maintainable/understandable/commented and... not-cryptic-styled-code :-)
- * - >= 10% faster than encrypt()/decrypt() [which is, by the way,
- * the reason for the existence of _setupInlineCrypt() :-)]
- * - memory-nice
- * - short (as good as possible)
- *
- * Note: - _setupInlineCrypt() is using _createInlineCryptFunction() to create the full callback function code.
- * - In case of using inline crypting, _setupInlineCrypt() must extend by the child \phpseclib3\Crypt\* class.
- * - The following variable names are reserved:
- * - $_* (all variable names prefixed with an underscore)
- * - $self (object reference to it self. Do not use $this, but $self instead)
- * - $in (the content of $in has to en/decrypt by the generated code)
- * - The callback function should not use the 'return' statement, but en/decrypt'ing the content of $in only
- *
- * {@internal If a Crypt_* class providing inline crypting it must extend _setupInlineCrypt()}
- *
- * @see self::setup()
- * @see self::createInlineCryptFunction()
- * @see self::encrypt()
- * @see self::decrypt()
- * @access private
- */
- //protected function setupInlineCrypt();
-
- /**
- * Creates the performance-optimized function for en/decrypt()
- *
- * Internally for phpseclib developers:
- *
- * _createInlineCryptFunction():
- *
- * - merge the $cipher_code [setup'ed by _setupInlineCrypt()]
- * with the current [$this->]mode of operation code
- *
- * - create the $inline function, which called by encrypt() / decrypt()
- * as its replacement to speed up the en/decryption operations.
- *
- * - return the name of the created $inline callback function
- *
- * - used to speed up en/decryption
- *
- *
- *
- * The main reason why can speed up things [up to 50%] this way are:
- *
- * - using variables more effective then regular.
- * (ie no use of expensive arrays but integers $k_0, $k_1 ...
- * or even, for example, the pure $key[] values hardcoded)
- *
- * - avoiding 1000's of function calls of ie _encryptBlock()
- * but inlining the crypt operations.
- * in the mode of operation for() loop.
- *
- * - full loop unroll the (sometimes key-dependent) rounds
- * avoiding this way ++$i counters and runtime-if's etc...
- *
- * The basic code architectur of the generated $inline en/decrypt()
- * lambda function, in pseudo php, is:
- *
- * <code>
- * +----------------------------------------------------------------------------------------------+
- * | callback $inline = create_function: |
- * | lambda_function_0001_crypt_ECB($action, $text) |
- * | { |
- * | INSERT PHP CODE OF: |
- * | $cipher_code['init_crypt']; // general init code. |
- * | // ie: $sbox'es declarations used for |
- * | // encrypt and decrypt'ing. |
- * | |
- * | switch ($action) { |
- * | case 'encrypt': |
- * | INSERT PHP CODE OF: |
- * | $cipher_code['init_encrypt']; // encrypt sepcific init code. |
- * | ie: specified $key or $box |
- * | declarations for encrypt'ing. |
- * | |
- * | foreach ($ciphertext) { |
- * | $in = $block_size of $ciphertext; |
- * | |
- * | INSERT PHP CODE OF: |
- * | $cipher_code['encrypt_block']; // encrypt's (string) $in, which is always: |
- * | // strlen($in) == $this->block_size |
- * | // here comes the cipher algorithm in action |
- * | // for encryption. |
- * | // $cipher_code['encrypt_block'] has to |
- * | // encrypt the content of the $in variable |
- * | |
- * | $plaintext .= $in; |
- * | } |
- * | return $plaintext; |
- * | |
- * | case 'decrypt': |
- * | INSERT PHP CODE OF: |
- * | $cipher_code['init_decrypt']; // decrypt sepcific init code |
- * | ie: specified $key or $box |
- * | declarations for decrypt'ing. |
- * | foreach ($plaintext) { |
- * | $in = $block_size of $plaintext; |
- * | |
- * | INSERT PHP CODE OF: |
- * | $cipher_code['decrypt_block']; // decrypt's (string) $in, which is always |
- * | // strlen($in) == $this->block_size |
- * | // here comes the cipher algorithm in action |
- * | // for decryption. |
- * | // $cipher_code['decrypt_block'] has to |
- * | // decrypt the content of the $in variable |
- * | $ciphertext .= $in; |
- * | } |
- * | return $ciphertext; |
- * | } |
- * | } |
- * +----------------------------------------------------------------------------------------------+
- * </code>
- *
- * See also the \phpseclib3\Crypt\*::_setupInlineCrypt()'s for
- * productive inline $cipher_code's how they works.
- *
- * Structure of:
- * <code>
- * $cipher_code = [
- * 'init_crypt' => (string) '', // optional
- * 'init_encrypt' => (string) '', // optional
- * 'init_decrypt' => (string) '', // optional
- * 'encrypt_block' => (string) '', // required
- * 'decrypt_block' => (string) '' // required
- * ];
- * </code>
- *
- * @see self::setupInlineCrypt()
- * @see self::encrypt()
- * @see self::decrypt()
- * @param array $cipher_code
- * @access private
- * @return string (the name of the created callback function)
- */
- protected function createInlineCryptFunction($cipher_code)
- {
- $block_size = $this->block_size;
-
- // optional
- $init_crypt = isset($cipher_code['init_crypt']) ? $cipher_code['init_crypt'] : '';
- $init_encrypt = isset($cipher_code['init_encrypt']) ? $cipher_code['init_encrypt'] : '';
- $init_decrypt = isset($cipher_code['init_decrypt']) ? $cipher_code['init_decrypt'] : '';
- // required
- $encrypt_block = $cipher_code['encrypt_block'];
- $decrypt_block = $cipher_code['decrypt_block'];
-
- // Generating mode of operation inline code,
- // merged with the $cipher_code algorithm
- // for encrypt- and decryption.
- switch ($this->mode) {
- case self::MODE_ECB:
- $encrypt = $init_encrypt . '
- $_ciphertext = "";
- $_plaintext_len = strlen($_text);
-
- for ($_i = 0; $_i < $_plaintext_len; $_i+= '.$block_size.') {
- $in = substr($_text, $_i, '.$block_size.');
- '.$encrypt_block.'
- $_ciphertext.= $in;
- }
-
- return $_ciphertext;
- ';
-
- $decrypt = $init_decrypt . '
- $_plaintext = "";
- $_text = str_pad($_text, strlen($_text) + ('.$block_size.' - strlen($_text) % '.$block_size.') % '.$block_size.', chr(0));
- $_ciphertext_len = strlen($_text);
-
- for ($_i = 0; $_i < $_ciphertext_len; $_i+= '.$block_size.') {
- $in = substr($_text, $_i, '.$block_size.');
- '.$decrypt_block.'
- $_plaintext.= $in;
- }
-
- return $this->unpad($_plaintext);
- ';
- break;
- case self::MODE_CTR:
- $encrypt = $init_encrypt . '
- $_ciphertext = "";
- $_plaintext_len = strlen($_text);
- $_xor = $this->encryptIV;
- $_buffer = &$this->enbuffer;
- if (strlen($_buffer["ciphertext"])) {
- for ($_i = 0; $_i < $_plaintext_len; $_i+= '.$block_size.') {
- $_block = substr($_text, $_i, '.$block_size.');
- if (strlen($_block) > strlen($_buffer["ciphertext"])) {
- $in = $_xor;
- '.$encrypt_block.'
- \phpseclib3\Common\Functions\Strings::increment_str($_xor);
- $_buffer["ciphertext"].= $in;
- }
- $_key = \phpseclib3\Common\Functions\Strings::shift($_buffer["ciphertext"], '.$block_size.');
- $_ciphertext.= $_block ^ $_key;
- }
- } else {
- for ($_i = 0; $_i < $_plaintext_len; $_i+= '.$block_size.') {
- $_block = substr($_text, $_i, '.$block_size.');
- $in = $_xor;
- '.$encrypt_block.'
- \phpseclib3\Common\Functions\Strings::increment_str($_xor);
- $_key = $in;
- $_ciphertext.= $_block ^ $_key;
- }
- }
- if ($this->continuousBuffer) {
- $this->encryptIV = $_xor;
- if ($_start = $_plaintext_len % '.$block_size.') {
- $_buffer["ciphertext"] = substr($_key, $_start) . $_buffer["ciphertext"];
- }
- }
-
- return $_ciphertext;
- ';
-
- $decrypt = $init_encrypt . '
- $_plaintext = "";
- $_ciphertext_len = strlen($_text);
- $_xor = $this->decryptIV;
- $_buffer = &$this->debuffer;
-
- if (strlen($_buffer["ciphertext"])) {
- for ($_i = 0; $_i < $_ciphertext_len; $_i+= '.$block_size.') {
- $_block = substr($_text, $_i, '.$block_size.');
- if (strlen($_block) > strlen($_buffer["ciphertext"])) {
- $in = $_xor;
- '.$encrypt_block.'
- \phpseclib3\Common\Functions\Strings::increment_str($_xor);
- $_buffer["ciphertext"].= $in;
- }
- $_key = \phpseclib3\Common\Functions\Strings::shift($_buffer["ciphertext"], '.$block_size.');
- $_plaintext.= $_block ^ $_key;
- }
- } else {
- for ($_i = 0; $_i < $_ciphertext_len; $_i+= '.$block_size.') {
- $_block = substr($_text, $_i, '.$block_size.');
- $in = $_xor;
- '.$encrypt_block.'
- \phpseclib3\Common\Functions\Strings::increment_str($_xor);
- $_key = $in;
- $_plaintext.= $_block ^ $_key;
- }
- }
- if ($this->continuousBuffer) {
- $this->decryptIV = $_xor;
- if ($_start = $_ciphertext_len % '.$block_size.') {
- $_buffer["ciphertext"] = substr($_key, $_start) . $_buffer["ciphertext"];
- }
- }
-
- return $_plaintext;
- ';
- break;
- case self::MODE_CFB:
- $encrypt = $init_encrypt . '
- $_ciphertext = "";
- $_buffer = &$this->enbuffer;
-
- if ($this->continuousBuffer) {
- $_iv = &$this->encryptIV;
- $_pos = &$_buffer["pos"];
- } else {
- $_iv = $this->encryptIV;
- $_pos = 0;
- }
- $_len = strlen($_text);
- $_i = 0;
- if ($_pos) {
- $_orig_pos = $_pos;
- $_max = '.$block_size.' - $_pos;
- if ($_len >= $_max) {
- $_i = $_max;
- $_len-= $_max;
- $_pos = 0;
- } else {
- $_i = $_len;
- $_pos+= $_len;
- $_len = 0;
- }
- $_ciphertext = substr($_iv, $_orig_pos) ^ $_text;
- $_iv = substr_replace($_iv, $_ciphertext, $_orig_pos, $_i);
- }
- while ($_len >= '.$block_size.') {
- $in = $_iv;
- '.$encrypt_block.';
- $_iv = $in ^ substr($_text, $_i, '.$block_size.');
- $_ciphertext.= $_iv;
- $_len-= '.$block_size.';
- $_i+= '.$block_size.';
- }
- if ($_len) {
- $in = $_iv;
- '.$encrypt_block.'
- $_iv = $in;
- $_block = $_iv ^ substr($_text, $_i);
- $_iv = substr_replace($_iv, $_block, 0, $_len);
- $_ciphertext.= $_block;
- $_pos = $_len;
- }
- return $_ciphertext;
- ';
-
- $decrypt = $init_encrypt . '
- $_plaintext = "";
- $_buffer = &$this->debuffer;
-
- if ($this->continuousBuffer) {
- $_iv = &$this->decryptIV;
- $_pos = &$_buffer["pos"];
- } else {
- $_iv = $this->decryptIV;
- $_pos = 0;
- }
- $_len = strlen($_text);
- $_i = 0;
- if ($_pos) {
- $_orig_pos = $_pos;
- $_max = '.$block_size.' - $_pos;
- if ($_len >= $_max) {
- $_i = $_max;
- $_len-= $_max;
- $_pos = 0;
- } else {
- $_i = $_len;
- $_pos+= $_len;
- $_len = 0;
- }
- $_plaintext = substr($_iv, $_orig_pos) ^ $_text;
- $_iv = substr_replace($_iv, substr($_text, 0, $_i), $_orig_pos, $_i);
- }
- while ($_len >= '.$block_size.') {
- $in = $_iv;
- '.$encrypt_block.'
- $_iv = $in;
- $cb = substr($_text, $_i, '.$block_size.');
- $_plaintext.= $_iv ^ $cb;
- $_iv = $cb;
- $_len-= '.$block_size.';
- $_i+= '.$block_size.';
- }
- if ($_len) {
- $in = $_iv;
- '.$encrypt_block.'
- $_iv = $in;
- $_plaintext.= $_iv ^ substr($_text, $_i);
- $_iv = substr_replace($_iv, substr($_text, $_i), 0, $_len);
- $_pos = $_len;
- }
-
- return $_plaintext;
- ';
- break;
- case self::MODE_CFB8:
- $encrypt = $init_encrypt . '
- $_ciphertext = "";
- $_len = strlen($_text);
- $_iv = $this->encryptIV;
-
- for ($_i = 0; $_i < $_len; ++$_i) {
- $in = $_iv;
- '.$encrypt_block.'
- $_ciphertext .= ($_c = $_text[$_i] ^ $in);
- $_iv = substr($_iv, 1) . $_c;
- }
-
- if ($this->continuousBuffer) {
- if ($_len >= '.$block_size.') {
- $this->encryptIV = substr($_ciphertext, -'.$block_size.');
- } else {
- $this->encryptIV = substr($this->encryptIV, $_len - '.$block_size.') . substr($_ciphertext, -$_len);
- }
- }
-
- return $_ciphertext;
- ';
- $decrypt = $init_encrypt . '
- $_plaintext = "";
- $_len = strlen($_text);
- $_iv = $this->decryptIV;
-
- for ($_i = 0; $_i < $_len; ++$_i) {
- $in = $_iv;
- '.$encrypt_block.'
- $_plaintext .= $_text[$_i] ^ $in;
- $_iv = substr($_iv, 1) . $_text[$_i];
- }
-
- if ($this->continuousBuffer) {
- if ($_len >= '.$block_size.') {
- $this->decryptIV = substr($_text, -'.$block_size.');
- } else {
- $this->decryptIV = substr($this->decryptIV, $_len - '.$block_size.') . substr($_text, -$_len);
- }
- }
-
- return $_plaintext;
- ';
- break;
- case self::MODE_OFB:
- $encrypt = $init_encrypt . '
- $_ciphertext = "";
- $_plaintext_len = strlen($_text);
- $_xor = $this->encryptIV;
- $_buffer = &$this->enbuffer;
-
- if (strlen($_buffer["xor"])) {
- for ($_i = 0; $_i < $_plaintext_len; $_i+= '.$block_size.') {
- $_block = substr($_text, $_i, '.$block_size.');
- if (strlen($_block) > strlen($_buffer["xor"])) {
- $in = $_xor;
- '.$encrypt_block.'
- $_xor = $in;
- $_buffer["xor"].= $_xor;
- }
- $_key = \phpseclib3\Common\Functions\Strings::shift($_buffer["xor"], '.$block_size.');
- $_ciphertext.= $_block ^ $_key;
- }
- } else {
- for ($_i = 0; $_i < $_plaintext_len; $_i+= '.$block_size.') {
- $in = $_xor;
- '.$encrypt_block.'
- $_xor = $in;
- $_ciphertext.= substr($_text, $_i, '.$block_size.') ^ $_xor;
- }
- $_key = $_xor;
- }
- if ($this->continuousBuffer) {
- $this->encryptIV = $_xor;
- if ($_start = $_plaintext_len % '.$block_size.') {
- $_buffer["xor"] = substr($_key, $_start) . $_buffer["xor"];
- }
- }
- return $_ciphertext;
- ';
-
- $decrypt = $init_encrypt . '
- $_plaintext = "";
- $_ciphertext_len = strlen($_text);
- $_xor = $this->decryptIV;
- $_buffer = &$this->debuffer;
-
- if (strlen($_buffer["xor"])) {
- for ($_i = 0; $_i < $_ciphertext_len; $_i+= '.$block_size.') {
- $_block = substr($_text, $_i, '.$block_size.');
- if (strlen($_block) > strlen($_buffer["xor"])) {
- $in = $_xor;
- '.$encrypt_block.'
- $_xor = $in;
- $_buffer["xor"].= $_xor;
- }
- $_key = \phpseclib3\Common\Functions\Strings::shift($_buffer["xor"], '.$block_size.');
- $_plaintext.= $_block ^ $_key;
- }
- } else {
- for ($_i = 0; $_i < $_ciphertext_len; $_i+= '.$block_size.') {
- $in = $_xor;
- '.$encrypt_block.'
- $_xor = $in;
- $_plaintext.= substr($_text, $_i, '.$block_size.') ^ $_xor;
- }
- $_key = $_xor;
- }
- if ($this->continuousBuffer) {
- $this->decryptIV = $_xor;
- if ($_start = $_ciphertext_len % '.$block_size.') {
- $_buffer["xor"] = substr($_key, $_start) . $_buffer["xor"];
- }
- }
- return $_plaintext;
- ';
- break;
- case self::MODE_STREAM:
- $encrypt = $init_encrypt . '
- $_ciphertext = "";
- '.$encrypt_block.'
- return $_ciphertext;
- ';
- $decrypt = $init_decrypt . '
- $_plaintext = "";
- '.$decrypt_block.'
- return $_plaintext;
- ';
- break;
- // case self::MODE_CBC:
- default:
- $encrypt = $init_encrypt . '
- $_ciphertext = "";
- $_plaintext_len = strlen($_text);
-
- $in = $this->encryptIV;
-
- for ($_i = 0; $_i < $_plaintext_len; $_i+= '.$block_size.') {
- $in = substr($_text, $_i, '.$block_size.') ^ $in;
- '.$encrypt_block.'
- $_ciphertext.= $in;
- }
-
- if ($this->continuousBuffer) {
- $this->encryptIV = $in;
- }
-
- return $_ciphertext;
- ';
-
- $decrypt = $init_decrypt . '
- $_plaintext = "";
- $_text = str_pad($_text, strlen($_text) + ('.$block_size.' - strlen($_text) % '.$block_size.') % '.$block_size.', chr(0));
- $_ciphertext_len = strlen($_text);
-
- $_iv = $this->decryptIV;
-
- for ($_i = 0; $_i < $_ciphertext_len; $_i+= '.$block_size.') {
- $in = $_block = substr($_text, $_i, '.$block_size.');
- '.$decrypt_block.'
- $_plaintext.= $in ^ $_iv;
- $_iv = $_block;
- }
-
- if ($this->continuousBuffer) {
- $this->decryptIV = $_iv;
- }
-
- return $this->unpad($_plaintext);
- ';
- break;
- }
-
- // Before discrediting this, please read the following:
- // @see https://github.com/phpseclib/phpseclib/issues/1293
- // @see https://github.com/phpseclib/phpseclib/pull/1143
- eval('$func = function ($_action, $_text) { ' . $init_crypt . 'if ($_action == "encrypt") { ' . $encrypt . ' } else { ' . $decrypt . ' }};');
-
- return \Closure::bind($func, $this, static::class);
- }
-
- /**
- * Convert float to int
- *
- * On ARM CPUs converting floats to ints doesn't always work
- *
- * @access private
- * @param string $x
- * @return int
- */
- protected static function safe_intval($x)
- {
- switch (true) {
- case is_int($x):
- // PHP 5.3, per http://php.net/releases/5_3_0.php, introduced "more consistent float rounding"
- case (php_uname('m') & "\xDF\xDF\xDF") != 'ARM':
- return $x;
- }
- return (fmod($x, 0x80000000) & 0x7FFFFFFF) |
- ((fmod(floor($x / 0x80000000), 2) & 1) << 31);
- }
-
- /**
- * eval()'able string for in-line float to int
- *
- * @access private
- * @return string
- */
- protected static function safe_intval_inline()
- {
- switch (true) {
- case defined('PHP_INT_SIZE') && PHP_INT_SIZE == 8:
- case (php_uname('m') & "\xDF\xDF\xDF") != 'ARM':
- return '%s';
- break;
- default:
- $safeint = '(is_int($temp = %s) ? $temp : (fmod($temp, 0x80000000) & 0x7FFFFFFF) | ';
- return $safeint . '((fmod(floor($temp / 0x80000000), 2) & 1) << 31))';
- }
- }
-
- /**
- * Sets up GCM parameters
- *
- * See steps 1-2 of https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf#page=23
- * for more info
- *
- * @access private
- */
- private function setupGCM()
- {
- // don't keep on re-calculating $this->h
- if (!$this->h || $this->h->key != $this->key) {
- $cipher = new static('ecb');
- $cipher->setKey($this->key);
- $cipher->disablePadding();
-
- $this->h = self::$gcmField->newInteger(
- Strings::switchEndianness($cipher->encrypt("\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"))
- );
- $this->h->key = $this->key;
- }
-
- if (strlen($this->nonce) == 12) {
- $this->iv = $this->nonce . "\0\0\0\1";
- } else {
- $this->iv = $this->ghash(
- self::nullPad128($this->nonce) . str_repeat("\0", 8) . self::len64($this->nonce)
- );
- }
- }
-
- /**
- * Performs GHASH operation
- *
- * See https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf#page=20
- * for more info
- *
- * @see self::decrypt()
- * @see self::encrypt()
- * @access private
- * @param string $x
- * @return string
- */
- private function ghash($x)
- {
- $h = $this->h;
- $y = ["\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0"];
- $x = str_split($x, 16);
- $n = 0;
- // the switchEndianness calls are necessary because the multiplication algorithm in BinaryField/Integer
- // interprets strings as polynomials in big endian order whereas in GCM they're interpreted in little
- // endian order per https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38d.pdf#page=19.
- // big endian order is what binary field elliptic curves use per http://www.secg.org/sec1-v2.pdf#page=18.
-
- // we could switchEndianness here instead of in the while loop but doing so in the while loop seems like it
- // might be slightly more performant
- //$x = Strings::switchEndianness($x);
- foreach ($x as $xn) {
- $xn = Strings::switchEndianness($xn);
- $t = $y[$n] ^ $xn;
- $temp = self::$gcmField->newInteger($t);
- $y[++$n] = $temp->multiply($h)->toBytes();
- $y[$n] = substr($y[$n], 1);
- }
- $y[$n] = Strings::switchEndianness($y[$n]);
- return $y[$n];
- }
-
- /**
- * Returns the bit length of a string in a packed format
- *
- * @see self::decrypt()
- * @see self::encrypt()
- * @see self::setupGCM()
- * @access private
- * @param string $str
- * @return string
- */
- private static function len64($str)
- {
- return "\0\0\0\0" . pack('N', 8 * strlen($str));
- }
-
- /**
- * NULL pads a string to be a multiple of 128
- *
- * @see self::decrypt()
- * @see self::encrypt()
- * @see self::setupGCM()
- * @access private
- * @param string $str
- * @return string
- */
- protected static function nullPad128($str)
- {
- $len = strlen($str);
- return $str . str_repeat("\0", 16 * ceil($len / 16) - $len);
- }
-
- /**
- * Calculates Poly1305 MAC
- *
- * On my system ChaCha20, with libsodium, takes 0.5s. With this custom Poly1305 implementation
- * it takes 1.2s.
- *
- * @see self::decrypt()
- * @see self::encrypt()
- * @access private
- * @param string $text
- * @return string
- */
- protected function poly1305($text)
- {
- $s = $this->poly1305Key; // strlen($this->poly1305Key) == 32
- $r = Strings::shift($s, 16);
- $r = strrev($r);
- $r&= "\x0f\xff\xff\xfc\x0f\xff\xff\xfc\x0f\xff\xff\xfc\x0f\xff\xff\xff";
- $s = strrev($s);
-
- $r = self::$poly1305Field->newInteger(new BigInteger($r, 256));
- $s = self::$poly1305Field->newInteger(new BigInteger($s, 256));
- $a = self::$poly1305Field->newInteger(new BigInteger());
-
- $blocks = str_split($text, 16);
- foreach ($blocks as $block) {
- $n = strrev($block . chr(1));
- $n = self::$poly1305Field->newInteger(new BigInteger($n, 256));
- $a = $a->add($n);
- $a = $a->multiply($r);
- }
- $r = $a->toBigInteger()->add($s->toBigInteger());
- $mask = "\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF";
- return strrev($r->toBytes()) & $mask;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/Fingerprint.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/Fingerprint.php
deleted file mode 100644
index 0db9c84ab..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/Fingerprint.php
+++ /dev/null
@@ -1,62 +0,0 @@
-<?php
-
-/**
- * Fingerprint Trait for Public Keys
- *
- * PHP version 5
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common\Traits;
-
-use phpseclib3\Crypt\Hash;
-
-/**
- * Fingerprint Trait for Private Keys
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-trait Fingerprint
-{
- /**
- * Returns the public key's fingerprint
- *
- * The public key's fingerprint is returned, which is equivalent to running `ssh-keygen -lf rsa.pub`. If there is
- * no public key currently loaded, false is returned.
- * Example output (md5): "c1:b1:30:29:d7:b8:de:6c:97:77:10:d7:46:41:63:87" (as specified by RFC 4716)
- *
- * @access public
- * @param string $algorithm The hashing algorithm to be used. Valid options are 'md5' and 'sha256'. False is returned
- * for invalid values.
- * @return mixed
- */
- public function getFingerprint($algorithm = 'md5')
- {
- $type = self::validatePlugin('Keys', 'OpenSSH', 'savePublicKey');
- if ($type === false) {
- return false;
- }
- $key = $this->toString('OpenSSH', ['binary' => true]);
- if ($key === false) {
- return false;
- }
- switch ($algorithm) {
- case 'sha256':
- $hash = new Hash('sha256');
- $base = base64_encode($hash->hash($key));
- return substr($base, 0, strlen($base) - 1);
- case 'md5':
- return substr(chunk_split(md5($key), 2, ':'), 0, -1);
- default:
- return false;
- }
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/PasswordProtected.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/PasswordProtected.php
deleted file mode 100644
index 058f9b949..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Traits/PasswordProtected.php
+++ /dev/null
@@ -1,51 +0,0 @@
-<?php
-
-/**
- * Password Protected Trait for Private Keys
- *
- * PHP version 5
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\Common\Traits;
-
-/**
- * Password Protected Trait for Private Keys
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-trait PasswordProtected
-{
- /**
- * Password
- *
- * @var string|bool
- */
- private $password = false;
-
- /**
- * Sets the password
- *
- * Private keys can be encrypted with a password. To unset the password, pass in the empty string or false.
- * Or rather, pass in $password such that empty($password) && !is_string($password) is true.
- *
- * @see self::createKey()
- * @see self::load()
- * @access public
- * @param string|boolean $password
- */
- public function withPassword($password = false)
- {
- $new = clone $this;
- $new->password = $password;
- return $new;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DES.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DES.php
index cbde382fd..9a8225fb5 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DES.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DES.php
@@ -18,7 +18,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $des = new \phpseclib3\Crypt\DES();
+ * $des = new \phpseclib\Crypt\DES();
*
* $des->setKey('abcdefgh');
*
@@ -40,10 +40,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\BlockCipher;
-use phpseclib3\Exception\BadModeException;
+namespace phpseclib\Crypt;
/**
* Pure-PHP implementation of DES.
@@ -52,87 +49,85 @@ use phpseclib3\Exception\BadModeException;
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
-class DES extends BlockCipher
+class DES extends Base
{
+ /**#@+
+ * @access private
+ * @see \phpseclib\Crypt\DES::_setupKey()
+ * @see \phpseclib\Crypt\DES::_processBlock()
+ */
/**
* Contains $keys[self::ENCRYPT]
- *
- * @access private
- * @see \phpseclib3\Crypt\DES::setupKey()
- * @see \phpseclib3\Crypt\DES::processBlock()
*/
const ENCRYPT = 0;
/**
* Contains $keys[self::DECRYPT]
- *
- * @access private
- * @see \phpseclib3\Crypt\DES::setupKey()
- * @see \phpseclib3\Crypt\DES::processBlock()
*/
const DECRYPT = 1;
+ /**#@-*/
/**
* Block Length of the cipher
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::block_size
+ * @see \phpseclib\Crypt\Base::block_size
* @var int
* @access private
*/
- protected $block_size = 8;
+ var $block_size = 8;
/**
* Key Length (in bytes)
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setKeyLength()
+ * @see \phpseclib\Crypt\Base::setKeyLength()
* @var int
* @access private
*/
- protected $key_length = 8;
+ var $key_length = 8;
/**
* The mcrypt specific name of the cipher
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cipher_name_mcrypt
+ * @see \phpseclib\Crypt\Base::cipher_name_mcrypt
* @var string
* @access private
*/
- protected $cipher_name_mcrypt = 'des';
+ var $cipher_name_mcrypt = 'des';
/**
* The OpenSSL names of the cipher / modes
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::openssl_mode_names
+ * @see \phpseclib\Crypt\Base::openssl_mode_names
* @var array
* @access private
*/
- protected $openssl_mode_names = [
+ var $openssl_mode_names = array(
self::MODE_ECB => 'des-ecb',
self::MODE_CBC => 'des-cbc',
self::MODE_CFB => 'des-cfb',
self::MODE_OFB => 'des-ofb'
// self::MODE_CTR is undefined for DES
- ];
+ );
/**
* Optimizing value while CFB-encrypting
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cfb_init_len
+ * @see \phpseclib\Crypt\Base::cfb_init_len
* @var int
* @access private
*/
- protected $cfb_init_len = 500;
+ var $cfb_init_len = 500;
/**
* Switch for DES/3DES encryption
*
* Used only if $engine == self::ENGINE_INTERNAL
*
- * @see self::setupKey()
- * @see self::processBlock()
+ * @see self::_setupKey()
+ * @see self::_processBlock()
* @var int
* @access private
*/
- protected $des_rounds = 1;
+ var $des_rounds = 1;
/**
* max possible size of $key
@@ -141,16 +136,16 @@ class DES extends BlockCipher
* @var string
* @access private
*/
- protected $key_length_max = 8;
+ var $key_length_max = 8;
/**
* The Key Schedule
*
- * @see self::setupKey()
+ * @see self::_setupKey()
* @var array
* @access private
*/
- private $keys;
+ var $keys;
/**
* Shuffle table.
@@ -159,12 +154,12 @@ class DES extends BlockCipher
* with each byte containing all bits in the same state as the
* corresponding bit in the index value.
*
- * @see self::processBlock()
- * @see self::setupKey()
+ * @see self::_processBlock()
+ * @see self::_setupKey()
* @var array
* @access private
*/
- protected static $shuffle = [
+ var $shuffle = array(
"\x00\x00\x00\x00\x00\x00\x00\x00", "\x00\x00\x00\x00\x00\x00\x00\xFF",
"\x00\x00\x00\x00\x00\x00\xFF\x00", "\x00\x00\x00\x00\x00\x00\xFF\xFF",
"\x00\x00\x00\x00\x00\xFF\x00\x00", "\x00\x00\x00\x00\x00\xFF\x00\xFF",
@@ -293,7 +288,7 @@ class DES extends BlockCipher
"\xFF\xFF\xFF\xFF\xFF\x00\xFF\x00", "\xFF\xFF\xFF\xFF\xFF\x00\xFF\xFF",
"\xFF\xFF\xFF\xFF\xFF\xFF\x00\x00", "\xFF\xFF\xFF\xFF\xFF\xFF\x00\xFF",
"\xFF\xFF\xFF\xFF\xFF\xFF\xFF\x00", "\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
- ];
+ );
/**
* IP mapping helper table.
@@ -303,7 +298,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $ipmap = [
+ var $ipmap = array(
0x00, 0x10, 0x01, 0x11, 0x20, 0x30, 0x21, 0x31,
0x02, 0x12, 0x03, 0x13, 0x22, 0x32, 0x23, 0x33,
0x40, 0x50, 0x41, 0x51, 0x60, 0x70, 0x61, 0x71,
@@ -336,7 +331,7 @@ class DES extends BlockCipher
0x8E, 0x9E, 0x8F, 0x9F, 0xAE, 0xBE, 0xAF, 0xBF,
0xCC, 0xDC, 0xCD, 0xDD, 0xEC, 0xFC, 0xED, 0xFD,
0xCE, 0xDE, 0xCF, 0xDF, 0xEE, 0xFE, 0xEF, 0xFF
- ];
+ );
/**
* Inverse IP mapping helper table.
@@ -345,7 +340,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $invipmap = [
+ var $invipmap = array(
0x00, 0x80, 0x40, 0xC0, 0x20, 0xA0, 0x60, 0xE0,
0x10, 0x90, 0x50, 0xD0, 0x30, 0xB0, 0x70, 0xF0,
0x08, 0x88, 0x48, 0xC8, 0x28, 0xA8, 0x68, 0xE8,
@@ -378,7 +373,7 @@ class DES extends BlockCipher
0x17, 0x97, 0x57, 0xD7, 0x37, 0xB7, 0x77, 0xF7,
0x0F, 0x8F, 0x4F, 0xCF, 0x2F, 0xAF, 0x6F, 0xEF,
0x1F, 0x9F, 0x5F, 0xDF, 0x3F, 0xBF, 0x7F, 0xFF
- ];
+ );
/**
* Pre-permuted S-box1
@@ -389,7 +384,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $sbox1 = [
+ var $sbox1 = array(
0x00808200, 0x00000000, 0x00008000, 0x00808202,
0x00808002, 0x00008202, 0x00000002, 0x00008000,
0x00000200, 0x00808200, 0x00808202, 0x00000200,
@@ -406,7 +401,7 @@ class DES extends BlockCipher
0x00800002, 0x00000202, 0x00008202, 0x00808200,
0x00000202, 0x00800200, 0x00800200, 0x00000000,
0x00008002, 0x00008200, 0x00000000, 0x00808002
- ];
+ );
/**
* Pre-permuted S-box2
@@ -414,7 +409,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $sbox2 = [
+ var $sbox2 = array(
0x40084010, 0x40004000, 0x00004000, 0x00084010,
0x00080000, 0x00000010, 0x40080010, 0x40004010,
0x40000010, 0x40084010, 0x40084000, 0x40000000,
@@ -431,7 +426,7 @@ class DES extends BlockCipher
0x00080010, 0x40004010, 0x40000010, 0x00080010,
0x00084000, 0x00000000, 0x40004000, 0x00004010,
0x40000000, 0x40080010, 0x40084010, 0x00084000
- ];
+ );
/**
* Pre-permuted S-box3
@@ -439,7 +434,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $sbox3 = [
+ var $sbox3 = array(
0x00000104, 0x04010100, 0x00000000, 0x04010004,
0x04000100, 0x00000000, 0x00010104, 0x04000100,
0x00010004, 0x04000004, 0x04000004, 0x00010000,
@@ -456,7 +451,7 @@ class DES extends BlockCipher
0x00000004, 0x00010104, 0x00010100, 0x04000004,
0x04010000, 0x04000104, 0x00000104, 0x04010000,
0x00010104, 0x00000004, 0x04010004, 0x00010100
- ];
+ );
/**
* Pre-permuted S-box4
@@ -464,7 +459,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $sbox4 = [
+ var $sbox4 = array(
0x80401000, 0x80001040, 0x80001040, 0x00000040,
0x00401040, 0x80400040, 0x80400000, 0x80001000,
0x00000000, 0x00401000, 0x00401000, 0x80401040,
@@ -481,7 +476,7 @@ class DES extends BlockCipher
0x80400000, 0x80001000, 0x00401040, 0x80400040,
0x80001000, 0x00001040, 0x00400000, 0x80401000,
0x00000040, 0x00400000, 0x00001000, 0x00401040
- ];
+ );
/**
* Pre-permuted S-box5
@@ -489,7 +484,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $sbox5 = [
+ var $sbox5 = array(
0x00000080, 0x01040080, 0x01040000, 0x21000080,
0x00040000, 0x00000080, 0x20000000, 0x01040000,
0x20040080, 0x00040000, 0x01000080, 0x20040080,
@@ -506,7 +501,7 @@ class DES extends BlockCipher
0x01040000, 0x00000000, 0x20040000, 0x21000000,
0x00040080, 0x01000080, 0x20000080, 0x00040000,
0x00000000, 0x20040000, 0x01040080, 0x20000080
- ];
+ );
/**
* Pre-permuted S-box6
@@ -514,7 +509,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $sbox6 = [
+ var $sbox6 = array(
0x10000008, 0x10200000, 0x00002000, 0x10202008,
0x10200000, 0x00000008, 0x10202008, 0x00200000,
0x10002000, 0x00202008, 0x00200000, 0x10000008,
@@ -531,7 +526,7 @@ class DES extends BlockCipher
0x00000008, 0x00002000, 0x10200000, 0x00202008,
0x00002000, 0x00200008, 0x10002008, 0x00000000,
0x10202000, 0x10000000, 0x00200008, 0x10002008
- ];
+ );
/**
* Pre-permuted S-box7
@@ -539,7 +534,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $sbox7 = [
+ var $sbox7 = array(
0x00100000, 0x02100001, 0x02000401, 0x00000000,
0x00000400, 0x02000401, 0x00100401, 0x02100400,
0x02100401, 0x00100000, 0x00000000, 0x02000001,
@@ -556,7 +551,7 @@ class DES extends BlockCipher
0x00100400, 0x00000000, 0x00000001, 0x02100401,
0x00000000, 0x00100401, 0x02100000, 0x00000400,
0x02000001, 0x02000400, 0x00000400, 0x00100001
- ];
+ );
/**
* Pre-permuted S-box8
@@ -564,7 +559,7 @@ class DES extends BlockCipher
* @var array
* @access private
*/
- protected static $sbox8 = [
+ var $sbox8 = array(
0x08000820, 0x00000800, 0x00020000, 0x08020820,
0x08000000, 0x08000820, 0x00000020, 0x08000000,
0x00020020, 0x08020000, 0x08020820, 0x00020800,
@@ -581,61 +576,51 @@ class DES extends BlockCipher
0x08020000, 0x08000800, 0x08000820, 0x00000000,
0x08020820, 0x00020800, 0x00020800, 0x00000820,
0x00000820, 0x00020020, 0x08000000, 0x08020800
- ];
-
- /**
- * Default Constructor.
- *
- * @param string $mode
- * @access public
- * @throws BadModeException if an invalid / unsupported mode is provided
- */
- public function __construct($mode)
- {
- parent::__construct($mode);
-
- if ($this->mode == self::MODE_STREAM) {
- throw new BadModeException('Block ciphers cannot be ran in stream mode');
- }
- }
+ );
/**
* Test for engine validity
*
- * This is mainly just a wrapper to set things up for \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
+ * This is mainly just a wrapper to set things up for \phpseclib\Crypt\Base::isValidEngine()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
+ * @see \phpseclib\Crypt\Base::isValidEngine()
* @param int $engine
- * @access protected
+ * @access public
* @return bool
*/
- protected function isValidEngineHelper($engine)
+ function isValidEngine($engine)
{
if ($this->key_length_max == 8) {
if ($engine == self::ENGINE_OPENSSL) {
- self::$cipher_name_openssl_ecb = 'des-ecb';
- $this->cipher_name_openssl = 'des-' . $this->openssl_translate_mode();
+ $this->cipher_name_openssl_ecb = 'des-ecb';
+ $this->cipher_name_openssl = 'des-' . $this->_openssl_translate_mode();
}
}
- return parent::isValidEngineHelper($engine);
+ return parent::isValidEngine($engine);
}
/**
* Sets the key.
*
- * Keys must be 64-bits long or 8 bytes long.
+ * Keys can be of any length. DES, itself, uses 64-bit keys (eg. strlen($key) == 8), however, we
+ * only use the first eight, if $key has more then eight characters in it, and pad $key with the
+ * null byte if it is less then eight characters long.
*
* DES also requires that every eighth bit be a parity bit, however, we'll ignore that.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setKey()
+ * If the key is not explicitly set, it'll be assumed to be all zero's.
+ *
+ * @see \phpseclib\Crypt\Base::setKey()
* @access public
* @param string $key
*/
- public function setKey($key)
+ function setKey($key)
{
- if (!($this instanceof TripleDES) && strlen($key) != 8) {
- throw new \LengthException('Key of size ' . strlen($key) . ' not supported by this algorithm. Only keys of size 8 are supported');
+ // We check/cut here only up to max length of the key.
+ // Key padding to the proper length will be done in _setupKey()
+ if (strlen($key) > $this->key_length_max) {
+ $key = substr($key, 0, $this->key_length_max);
}
// Sets the key
@@ -645,31 +630,31 @@ class DES extends BlockCipher
/**
* Encrypts a block
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encryptBlock()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
+ * @see \phpseclib\Crypt\Base::_encryptBlock()
+ * @see \phpseclib\Crypt\Base::encrypt()
* @see self::encrypt()
* @access private
* @param string $in
* @return string
*/
- protected function encryptBlock($in)
+ function _encryptBlock($in)
{
- return $this->processBlock($in, self::ENCRYPT);
+ return $this->_processBlock($in, self::ENCRYPT);
}
/**
* Decrypts a block
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decryptBlock()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
+ * @see \phpseclib\Crypt\Base::_decryptBlock()
+ * @see \phpseclib\Crypt\Base::decrypt()
* @see self::decrypt()
* @access private
* @param string $in
* @return string
*/
- protected function decryptBlock($in)
+ function _decryptBlock($in)
{
- return $this->processBlock($in, self::DECRYPT);
+ return $this->_processBlock($in, self::DECRYPT);
}
/**
@@ -679,29 +664,29 @@ class DES extends BlockCipher
* {@link http://en.wikipedia.org/wiki/Image:Feistel.png Feistel.png} to get a general
* idea of what this function does.
*
- * @see self::encryptBlock()
- * @see self::decryptBlock()
+ * @see self::_encryptBlock()
+ * @see self::_decryptBlock()
* @access private
* @param string $block
* @param int $mode
* @return string
*/
- private function processBlock($block, $mode)
+ function _processBlock($block, $mode)
{
static $sbox1, $sbox2, $sbox3, $sbox4, $sbox5, $sbox6, $sbox7, $sbox8, $shuffleip, $shuffleinvip;
if (!$sbox1) {
- $sbox1 = array_map('intval', self::$sbox1);
- $sbox2 = array_map('intval', self::$sbox2);
- $sbox3 = array_map('intval', self::$sbox3);
- $sbox4 = array_map('intval', self::$sbox4);
- $sbox5 = array_map('intval', self::$sbox5);
- $sbox6 = array_map('intval', self::$sbox6);
- $sbox7 = array_map('intval', self::$sbox7);
- $sbox8 = array_map('intval', self::$sbox8);
+ $sbox1 = array_map("intval", $this->sbox1);
+ $sbox2 = array_map("intval", $this->sbox2);
+ $sbox3 = array_map("intval", $this->sbox3);
+ $sbox4 = array_map("intval", $this->sbox4);
+ $sbox5 = array_map("intval", $this->sbox5);
+ $sbox6 = array_map("intval", $this->sbox6);
+ $sbox7 = array_map("intval", $this->sbox7);
+ $sbox8 = array_map("intval", $this->sbox8);
/* Merge $shuffle with $[inv]ipmap */
for ($i = 0; $i < 256; ++$i) {
- $shuffleip[] = self::$shuffle[self::$ipmap[$i]];
- $shuffleinvip[] = self::$shuffle[self::$invipmap[$i]];
+ $shuffleip[] = $this->shuffle[$this->ipmap[$i]];
+ $shuffleinvip[] = $this->shuffle[$this->invipmap[$i]];
}
}
@@ -710,7 +695,7 @@ class DES extends BlockCipher
// Do the initial IP permutation.
$t = unpack('Nl/Nr', $block);
- list($l, $r) = [$t['l'], $t['r']];
+ list($l, $r) = array($t['l'], $t['r']);
$block = ($shuffleip[ $r & 0xFF] & "\x80\x80\x80\x80\x80\x80\x80\x80") |
($shuffleip[($r >> 8) & 0xFF] & "\x40\x40\x40\x40\x40\x40\x40\x40") |
($shuffleip[($r >> 16) & 0xFF] & "\x20\x20\x20\x20\x20\x20\x20\x20") |
@@ -722,7 +707,7 @@ class DES extends BlockCipher
// Extract L0 and R0.
$t = unpack('Nl/Nr', $block);
- list($l, $r) = [$t['l'], $t['r']];
+ list($l, $r) = array($t['l'], $t['r']);
for ($des_round = 0; $des_round < $this->des_rounds; ++$des_round) {
// Perform the 16 steps.
@@ -764,22 +749,22 @@ class DES extends BlockCipher
/**
* Creates the key schedule
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setupKey()
+ * @see \phpseclib\Crypt\Base::_setupKey()
* @access private
*/
- protected function setupKey()
+ function _setupKey()
{
if (isset($this->kl['key']) && $this->key === $this->kl['key'] && $this->des_rounds === $this->kl['des_rounds']) {
// already expanded
return;
}
- $this->kl = ['key' => $this->key, 'des_rounds' => $this->des_rounds];
+ $this->kl = array('key' => $this->key, 'des_rounds' => $this->des_rounds);
- static $shifts = [ // number of key bits shifted per round
+ static $shifts = array( // number of key bits shifted per round
1, 1, 2, 2, 2, 2, 2, 2, 1, 2, 2, 2, 2, 2, 2, 1
- ];
+ );
- static $pc1map = [
+ static $pc1map = array(
0x00, 0x00, 0x08, 0x08, 0x04, 0x04, 0x0C, 0x0C,
0x02, 0x02, 0x0A, 0x0A, 0x06, 0x06, 0x0E, 0x0E,
0x10, 0x10, 0x18, 0x18, 0x14, 0x14, 0x1C, 0x1C,
@@ -812,16 +797,16 @@ class DES extends BlockCipher
0xE2, 0xE2, 0xEA, 0xEA, 0xE6, 0xE6, 0xEE, 0xEE,
0xF0, 0xF0, 0xF8, 0xF8, 0xF4, 0xF4, 0xFC, 0xFC,
0xF2, 0xF2, 0xFA, 0xFA, 0xF6, 0xF6, 0xFE, 0xFE
- ];
+ );
// Mapping tables for the PC-2 transformation.
- static $pc2mapc1 = [
+ static $pc2mapc1 = array(
0x00000000, 0x00000400, 0x00200000, 0x00200400,
0x00000001, 0x00000401, 0x00200001, 0x00200401,
0x02000000, 0x02000400, 0x02200000, 0x02200400,
0x02000001, 0x02000401, 0x02200001, 0x02200401
- ];
- static $pc2mapc2 = [
+ );
+ static $pc2mapc2 = array(
0x00000000, 0x00000800, 0x08000000, 0x08000800,
0x00010000, 0x00010800, 0x08010000, 0x08010800,
0x00000000, 0x00000800, 0x08000000, 0x08000800,
@@ -886,8 +871,8 @@ class DES extends BlockCipher
0x01050110, 0x01050910, 0x09050110, 0x09050910,
0x01040110, 0x01040910, 0x09040110, 0x09040910,
0x01050110, 0x01050910, 0x09050110, 0x09050910
- ];
- static $pc2mapc3 = [
+ );
+ static $pc2mapc3 = array(
0x00000000, 0x00000004, 0x00001000, 0x00001004,
0x00000000, 0x00000004, 0x00001000, 0x00001004,
0x10000000, 0x10000004, 0x10001000, 0x10001004,
@@ -952,8 +937,8 @@ class DES extends BlockCipher
0x20080022, 0x20080026, 0x20081022, 0x20081026,
0x30080022, 0x30080026, 0x30081022, 0x30081026,
0x30080022, 0x30080026, 0x30081022, 0x30081026
- ];
- static $pc2mapc4 = [
+ );
+ static $pc2mapc4 = array(
0x00000000, 0x00100000, 0x00000008, 0x00100008,
0x00000200, 0x00100200, 0x00000208, 0x00100208,
0x00000000, 0x00100000, 0x00000008, 0x00100008,
@@ -1018,14 +1003,14 @@ class DES extends BlockCipher
0x04022200, 0x04122200, 0x04022208, 0x04122208,
0x04022000, 0x04122000, 0x04022008, 0x04122008,
0x04022200, 0x04122200, 0x04022208, 0x04122208
- ];
- static $pc2mapd1 = [
+ );
+ static $pc2mapd1 = array(
0x00000000, 0x00000001, 0x08000000, 0x08000001,
0x00200000, 0x00200001, 0x08200000, 0x08200001,
0x00000002, 0x00000003, 0x08000002, 0x08000003,
0x00200002, 0x00200003, 0x08200002, 0x08200003
- ];
- static $pc2mapd2 = [
+ );
+ static $pc2mapd2 = array(
0x00000000, 0x00100000, 0x00000800, 0x00100800,
0x00000000, 0x00100000, 0x00000800, 0x00100800,
0x04000000, 0x04100000, 0x04000800, 0x04100800,
@@ -1090,8 +1075,8 @@ class DES extends BlockCipher
0x00020204, 0x00120204, 0x00020A04, 0x00120A04,
0x04020204, 0x04120204, 0x04020A04, 0x04120A04,
0x04020204, 0x04120204, 0x04020A04, 0x04120A04
- ];
- static $pc2mapd3 = [
+ );
+ static $pc2mapd3 = array(
0x00000000, 0x00010000, 0x02000000, 0x02010000,
0x00000020, 0x00010020, 0x02000020, 0x02010020,
0x00040000, 0x00050000, 0x02040000, 0x02050000,
@@ -1156,8 +1141,8 @@ class DES extends BlockCipher
0x20002030, 0x20012030, 0x22002030, 0x22012030,
0x20042010, 0x20052010, 0x22042010, 0x22052010,
0x20042030, 0x20052030, 0x22042030, 0x22052030
- ];
- static $pc2mapd4 = [
+ );
+ static $pc2mapd4 = array(
0x00000000, 0x00000400, 0x01000000, 0x01000400,
0x00000000, 0x00000400, 0x01000000, 0x01000400,
0x00000100, 0x00000500, 0x01000100, 0x01000500,
@@ -1222,32 +1207,32 @@ class DES extends BlockCipher
0x10081008, 0x10081408, 0x11081008, 0x11081408,
0x10081108, 0x10081508, 0x11081108, 0x11081508,
0x10081108, 0x10081508, 0x11081108, 0x11081508
- ];
+ );
- $keys = [];
+ $keys = array();
for ($des_round = 0; $des_round < $this->des_rounds; ++$des_round) {
// pad the key and remove extra characters as appropriate.
$key = str_pad(substr($this->key, $des_round * 8, 8), 8, "\0");
// Perform the PC/1 transformation and compute C and D.
$t = unpack('Nl/Nr', $key);
- list($l, $r) = [$t['l'], $t['r']];
- $key = (self::$shuffle[$pc1map[ $r & 0xFF]] & "\x80\x80\x80\x80\x80\x80\x80\x00") |
- (self::$shuffle[$pc1map[($r >> 8) & 0xFF]] & "\x40\x40\x40\x40\x40\x40\x40\x00") |
- (self::$shuffle[$pc1map[($r >> 16) & 0xFF]] & "\x20\x20\x20\x20\x20\x20\x20\x00") |
- (self::$shuffle[$pc1map[($r >> 24) & 0xFF]] & "\x10\x10\x10\x10\x10\x10\x10\x00") |
- (self::$shuffle[$pc1map[ $l & 0xFF]] & "\x08\x08\x08\x08\x08\x08\x08\x00") |
- (self::$shuffle[$pc1map[($l >> 8) & 0xFF]] & "\x04\x04\x04\x04\x04\x04\x04\x00") |
- (self::$shuffle[$pc1map[($l >> 16) & 0xFF]] & "\x02\x02\x02\x02\x02\x02\x02\x00") |
- (self::$shuffle[$pc1map[($l >> 24) & 0xFF]] & "\x01\x01\x01\x01\x01\x01\x01\x00");
+ list($l, $r) = array($t['l'], $t['r']);
+ $key = ($this->shuffle[$pc1map[ $r & 0xFF]] & "\x80\x80\x80\x80\x80\x80\x80\x00") |
+ ($this->shuffle[$pc1map[($r >> 8) & 0xFF]] & "\x40\x40\x40\x40\x40\x40\x40\x00") |
+ ($this->shuffle[$pc1map[($r >> 16) & 0xFF]] & "\x20\x20\x20\x20\x20\x20\x20\x00") |
+ ($this->shuffle[$pc1map[($r >> 24) & 0xFF]] & "\x10\x10\x10\x10\x10\x10\x10\x00") |
+ ($this->shuffle[$pc1map[ $l & 0xFF]] & "\x08\x08\x08\x08\x08\x08\x08\x00") |
+ ($this->shuffle[$pc1map[($l >> 8) & 0xFF]] & "\x04\x04\x04\x04\x04\x04\x04\x00") |
+ ($this->shuffle[$pc1map[($l >> 16) & 0xFF]] & "\x02\x02\x02\x02\x02\x02\x02\x00") |
+ ($this->shuffle[$pc1map[($l >> 24) & 0xFF]] & "\x01\x01\x01\x01\x01\x01\x01\x00");
$key = unpack('Nc/Nd', $key);
$c = ( $key['c'] >> 4) & 0x0FFFFFFF;
$d = (($key['d'] >> 4) & 0x0FFFFFF0) | ($key['c'] & 0x0F);
- $keys[$des_round] = [
- self::ENCRYPT => [],
+ $keys[$des_round] = array(
+ self::ENCRYPT => array(),
self::DECRYPT => array_fill(0, 32, 0)
- ];
+ );
for ($i = 0, $ki = 31; $i < 16; ++$i, $ki-= 2) {
$c <<= $shifts[$i];
$c = ($c | ($c >> 28)) & 0x0FFFFFFF;
@@ -1274,7 +1259,7 @@ class DES extends BlockCipher
switch ($this->des_rounds) {
case 3: // 3DES keys
- $this->keys = [
+ $this->keys = array(
self::ENCRYPT => array_merge(
$keys[0][self::ENCRYPT],
$keys[1][self::DECRYPT],
@@ -1285,127 +1270,174 @@ class DES extends BlockCipher
$keys[1][self::ENCRYPT],
$keys[0][self::DECRYPT]
)
- ];
+ );
break;
// case 1: // DES keys
default:
- $this->keys = [
+ $this->keys = array(
self::ENCRYPT => $keys[0][self::ENCRYPT],
self::DECRYPT => $keys[0][self::DECRYPT]
- ];
+ );
}
}
/**
* Setup the performance-optimized function for de/encrypt()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setupInlineCrypt()
+ * @see \phpseclib\Crypt\Base::_setupInlineCrypt()
* @access private
*/
- protected function setupInlineCrypt()
+ function _setupInlineCrypt()
{
+ $lambda_functions =& self::_getLambdaFunctions();
+
// Engine configuration for:
// - DES ($des_rounds == 1) or
// - 3DES ($des_rounds == 3)
$des_rounds = $this->des_rounds;
- $init_crypt = 'static $sbox1, $sbox2, $sbox3, $sbox4, $sbox5, $sbox6, $sbox7, $sbox8, $shuffleip, $shuffleinvip;
- if (!$sbox1) {
- $sbox1 = array_map("intval", self::$sbox1);
- $sbox2 = array_map("intval", self::$sbox2);
- $sbox3 = array_map("intval", self::$sbox3);
- $sbox4 = array_map("intval", self::$sbox4);
- $sbox5 = array_map("intval", self::$sbox5);
- $sbox6 = array_map("intval", self::$sbox6);
- $sbox7 = array_map("intval", self::$sbox7);
- $sbox8 = array_map("intval", self::$sbox8);'
- /* Merge $shuffle with $[inv]ipmap */ . '
- for ($i = 0; $i < 256; ++$i) {
- $shuffleip[] = self::$shuffle[self::$ipmap[$i]];
- $shuffleinvip[] = self::$shuffle[self::$invipmap[$i]];
- }
- }
- ';
+ // We create max. 10 hi-optimized code for memory reason. Means: For each $key one ultra fast inline-crypt function.
+ // (Currently, for DES, one generated $lambda_function cost on php5.5@32bit ~135kb unfreeable mem and ~230kb on php5.5@64bit)
+ // (Currently, for TripleDES, one generated $lambda_function cost on php5.5@32bit ~240kb unfreeable mem and ~340kb on php5.5@64bit)
+ // After that, we'll still create very fast optimized code but not the hi-ultimative code, for each $mode one
+ $gen_hi_opt_code = (bool)( count($lambda_functions) < 10 );
- $k = [
- self::ENCRYPT => $this->keys[self::ENCRYPT],
- self::DECRYPT => $this->keys[self::DECRYPT]
- ];
- $init_encrypt = '';
- $init_decrypt = '';
+ // Generation of a unique hash for our generated code
+ $code_hash = "Crypt_DES, $des_rounds, {$this->mode}";
+ if ($gen_hi_opt_code) {
+ // For hi-optimized code, we create for each combination of
+ // $mode, $des_rounds and $this->key its own encrypt/decrypt function.
+ // After max 10 hi-optimized functions, we create generic
+ // (still very fast.. but not ultra) functions for each $mode/$des_rounds
+ // Currently 2 * 5 generic functions will be then max. possible.
+ $code_hash = str_pad($code_hash, 32) . $this->_hashInlineCryptFunction($this->key);
+ }
- // Creating code for en- and decryption.
- $crypt_block = [];
- foreach ([self::ENCRYPT, self::DECRYPT] as $c) {
- /* Do the initial IP permutation. */
- $crypt_block[$c] = '
- $in = unpack("N*", $in);
- $l = $in[1];
- $r = $in[2];
- $in = unpack("N*",
- ($shuffleip[ $r & 0xFF] & "\x80\x80\x80\x80\x80\x80\x80\x80") |
- ($shuffleip[($r >> 8) & 0xFF] & "\x40\x40\x40\x40\x40\x40\x40\x40") |
- ($shuffleip[($r >> 16) & 0xFF] & "\x20\x20\x20\x20\x20\x20\x20\x20") |
- ($shuffleip[($r >> 24) & 0xFF] & "\x10\x10\x10\x10\x10\x10\x10\x10") |
- ($shuffleip[ $l & 0xFF] & "\x08\x08\x08\x08\x08\x08\x08\x08") |
- ($shuffleip[($l >> 8) & 0xFF] & "\x04\x04\x04\x04\x04\x04\x04\x04") |
- ($shuffleip[($l >> 16) & 0xFF] & "\x02\x02\x02\x02\x02\x02\x02\x02") |
- ($shuffleip[($l >> 24) & 0xFF] & "\x01\x01\x01\x01\x01\x01\x01\x01")
- );
- ' . /* Extract L0 and R0 */ '
- $l = $in[1];
- $r = $in[2];
+ // Is there a re-usable $lambda_functions in there? If not, we have to create it.
+ if (!isset($lambda_functions[$code_hash])) {
+ // Init code for both, encrypt and decrypt.
+ $init_crypt = 'static $sbox1, $sbox2, $sbox3, $sbox4, $sbox5, $sbox6, $sbox7, $sbox8, $shuffleip, $shuffleinvip;
+ if (!$sbox1) {
+ $sbox1 = array_map("intval", $self->sbox1);
+ $sbox2 = array_map("intval", $self->sbox2);
+ $sbox3 = array_map("intval", $self->sbox3);
+ $sbox4 = array_map("intval", $self->sbox4);
+ $sbox5 = array_map("intval", $self->sbox5);
+ $sbox6 = array_map("intval", $self->sbox6);
+ $sbox7 = array_map("intval", $self->sbox7);
+ $sbox8 = array_map("intval", $self->sbox8);'
+ /* Merge $shuffle with $[inv]ipmap */ . '
+ for ($i = 0; $i < 256; ++$i) {
+ $shuffleip[] = $self->shuffle[$self->ipmap[$i]];
+ $shuffleinvip[] = $self->shuffle[$self->invipmap[$i]];
+ }
+ }
';
- $l = '$l';
- $r = '$r';
+ switch (true) {
+ case $gen_hi_opt_code:
+ // In Hi-optimized code mode, we use our [3]DES key schedule as hardcoded integers.
+ // No futher initialisation of the $keys schedule is necessary.
+ // That is the extra performance boost.
+ $k = array(
+ self::ENCRYPT => $this->keys[self::ENCRYPT],
+ self::DECRYPT => $this->keys[self::DECRYPT]
+ );
+ $init_encrypt = '';
+ $init_decrypt = '';
+ break;
+ default:
+ // In generic optimized code mode, we have to use, as the best compromise [currently],
+ // our key schedule as $ke/$kd arrays. (with hardcoded indexes...)
+ $k = array(
+ self::ENCRYPT => array(),
+ self::DECRYPT => array()
+ );
+ for ($i = 0, $c = count($this->keys[self::ENCRYPT]); $i < $c; ++$i) {
+ $k[self::ENCRYPT][$i] = '$ke[' . $i . ']';
+ $k[self::DECRYPT][$i] = '$kd[' . $i . ']';
+ }
+ $init_encrypt = '$ke = $self->keys[$self::ENCRYPT];';
+ $init_decrypt = '$kd = $self->keys[$self::DECRYPT];';
+ break;
+ }
+
+ // Creating code for en- and decryption.
+ $crypt_block = array();
+ foreach (array(self::ENCRYPT, self::DECRYPT) as $c) {
+ /* Do the initial IP permutation. */
+ $crypt_block[$c] = '
+ $in = unpack("N*", $in);
+ $l = $in[1];
+ $r = $in[2];
+ $in = unpack("N*",
+ ($shuffleip[ $r & 0xFF] & "\x80\x80\x80\x80\x80\x80\x80\x80") |
+ ($shuffleip[($r >> 8) & 0xFF] & "\x40\x40\x40\x40\x40\x40\x40\x40") |
+ ($shuffleip[($r >> 16) & 0xFF] & "\x20\x20\x20\x20\x20\x20\x20\x20") |
+ ($shuffleip[($r >> 24) & 0xFF] & "\x10\x10\x10\x10\x10\x10\x10\x10") |
+ ($shuffleip[ $l & 0xFF] & "\x08\x08\x08\x08\x08\x08\x08\x08") |
+ ($shuffleip[($l >> 8) & 0xFF] & "\x04\x04\x04\x04\x04\x04\x04\x04") |
+ ($shuffleip[($l >> 16) & 0xFF] & "\x02\x02\x02\x02\x02\x02\x02\x02") |
+ ($shuffleip[($l >> 24) & 0xFF] & "\x01\x01\x01\x01\x01\x01\x01\x01")
+ );
+ ' . /* Extract L0 and R0 */ '
+ $l = $in[1];
+ $r = $in[2];
+ ';
+
+ $l = '$l';
+ $r = '$r';
- // Perform DES or 3DES.
- for ($ki = -1, $des_round = 0; $des_round < $des_rounds; ++$des_round) {
- // Perform the 16 steps.
- for ($i = 0; $i < 16; ++$i) {
- // start of "the Feistel (F) function" - see the following URL:
- // http://en.wikipedia.org/wiki/Image:Data_Encryption_Standard_InfoBox_Diagram.png
- // Merge key schedule.
- $crypt_block[$c].= '
- $b1 = ((' . $r . ' >> 3) & 0x1FFFFFFF) ^ (' . $r . ' << 29) ^ ' . $k[$c][++$ki] . ';
- $b2 = ((' . $r . ' >> 31) & 0x00000001) ^ (' . $r . ' << 1) ^ ' . $k[$c][++$ki] . ';' .
- /* S-box indexing. */
- $l . ' = $sbox1[($b1 >> 24) & 0x3F] ^ $sbox2[($b2 >> 24) & 0x3F] ^
- $sbox3[($b1 >> 16) & 0x3F] ^ $sbox4[($b2 >> 16) & 0x3F] ^
- $sbox5[($b1 >> 8) & 0x3F] ^ $sbox6[($b2 >> 8) & 0x3F] ^
- $sbox7[ $b1 & 0x3F] ^ $sbox8[ $b2 & 0x3F] ^ ' . $l . ';
- ';
- // end of "the Feistel (F) function"
+ // Perform DES or 3DES.
+ for ($ki = -1, $des_round = 0; $des_round < $des_rounds; ++$des_round) {
+ // Perform the 16 steps.
+ for ($i = 0; $i < 16; ++$i) {
+ // start of "the Feistel (F) function" - see the following URL:
+ // http://en.wikipedia.org/wiki/Image:Data_Encryption_Standard_InfoBox_Diagram.png
+ // Merge key schedule.
+ $crypt_block[$c].= '
+ $b1 = ((' . $r . ' >> 3) & 0x1FFFFFFF) ^ (' . $r . ' << 29) ^ ' . $k[$c][++$ki] . ';
+ $b2 = ((' . $r . ' >> 31) & 0x00000001) ^ (' . $r . ' << 1) ^ ' . $k[$c][++$ki] . ';' .
+ /* S-box indexing. */
+ $l . ' = $sbox1[($b1 >> 24) & 0x3F] ^ $sbox2[($b2 >> 24) & 0x3F] ^
+ $sbox3[($b1 >> 16) & 0x3F] ^ $sbox4[($b2 >> 16) & 0x3F] ^
+ $sbox5[($b1 >> 8) & 0x3F] ^ $sbox6[($b2 >> 8) & 0x3F] ^
+ $sbox7[ $b1 & 0x3F] ^ $sbox8[ $b2 & 0x3F] ^ ' . $l . ';
+ ';
+ // end of "the Feistel (F) function"
- // swap L & R
- list($l, $r) = [$r, $l];
+ // swap L & R
+ list($l, $r) = array($r, $l);
+ }
+ list($l, $r) = array($r, $l);
}
- list($l, $r) = [$r, $l];
+
+ // Perform the inverse IP permutation.
+ $crypt_block[$c].= '$in =
+ ($shuffleinvip[($l >> 24) & 0xFF] & "\x80\x80\x80\x80\x80\x80\x80\x80") |
+ ($shuffleinvip[($r >> 24) & 0xFF] & "\x40\x40\x40\x40\x40\x40\x40\x40") |
+ ($shuffleinvip[($l >> 16) & 0xFF] & "\x20\x20\x20\x20\x20\x20\x20\x20") |
+ ($shuffleinvip[($r >> 16) & 0xFF] & "\x10\x10\x10\x10\x10\x10\x10\x10") |
+ ($shuffleinvip[($l >> 8) & 0xFF] & "\x08\x08\x08\x08\x08\x08\x08\x08") |
+ ($shuffleinvip[($r >> 8) & 0xFF] & "\x04\x04\x04\x04\x04\x04\x04\x04") |
+ ($shuffleinvip[ $l & 0xFF] & "\x02\x02\x02\x02\x02\x02\x02\x02") |
+ ($shuffleinvip[ $r & 0xFF] & "\x01\x01\x01\x01\x01\x01\x01\x01");
+ ';
}
- // Perform the inverse IP permutation.
- $crypt_block[$c].= '$in =
- ($shuffleinvip[($l >> 24) & 0xFF] & "\x80\x80\x80\x80\x80\x80\x80\x80") |
- ($shuffleinvip[($r >> 24) & 0xFF] & "\x40\x40\x40\x40\x40\x40\x40\x40") |
- ($shuffleinvip[($l >> 16) & 0xFF] & "\x20\x20\x20\x20\x20\x20\x20\x20") |
- ($shuffleinvip[($r >> 16) & 0xFF] & "\x10\x10\x10\x10\x10\x10\x10\x10") |
- ($shuffleinvip[($l >> 8) & 0xFF] & "\x08\x08\x08\x08\x08\x08\x08\x08") |
- ($shuffleinvip[($r >> 8) & 0xFF] & "\x04\x04\x04\x04\x04\x04\x04\x04") |
- ($shuffleinvip[ $l & 0xFF] & "\x02\x02\x02\x02\x02\x02\x02\x02") |
- ($shuffleinvip[ $r & 0xFF] & "\x01\x01\x01\x01\x01\x01\x01\x01");
- ';
+ // Creates the inline-crypt function
+ $lambda_functions[$code_hash] = $this->_createInlineCryptFunction(
+ array(
+ 'init_crypt' => $init_crypt,
+ 'init_encrypt' => $init_encrypt,
+ 'init_decrypt' => $init_decrypt,
+ 'encrypt_block' => $crypt_block[self::ENCRYPT],
+ 'decrypt_block' => $crypt_block[self::DECRYPT]
+ )
+ );
}
- // Creates the inline-crypt function
- $this->inline_crypt = $this->createInlineCryptFunction(
- [
- 'init_crypt' => $init_crypt,
- 'init_encrypt' => $init_encrypt,
- 'init_decrypt' => $init_decrypt,
- 'encrypt_block' => $crypt_block[self::ENCRYPT],
- 'decrypt_block' => $crypt_block[self::DECRYPT]
- ]
- );
+ // Set the inline-crypt function as callback in: $this->inline_crypt
+ $this->inline_crypt = $lambda_functions[$code_hash];
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH.php
deleted file mode 100644
index 9337200cf..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH.php
+++ /dev/null
@@ -1,400 +0,0 @@
-<?php
-
-/**
- * Pure-PHP (EC)DH implementation
- *
- * PHP version 5
- *
- * Here's an example of how to compute a shared secret with this library:
- * <code>
- * <?php
- * include 'vendor/autoload.php';
- *
- * $ourPrivate = \phpseclib3\Crypt\DH::createKey();
- * $secret = DH::computeSecret($ourPrivate, $theirPublic);
- *
- * ?>
- * </code>
- *
- * @category Crypt
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Exception\NoKeyLoadedException;
-use phpseclib3\Exception\UnsupportedOperationException;
-use phpseclib3\Crypt\Common\AsymmetricKey;
-use phpseclib3\Crypt\DH\PrivateKey;
-use phpseclib3\Crypt\DH\PublicKey;
-use phpseclib3\Crypt\DH\Parameters;
-use phpseclib3\Math\BigInteger;
-
-/**
- * Pure-PHP (EC)DH implementation
- *
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DH extends AsymmetricKey
-{
- /**
- * Algorithm Name
- *
- * @var string
- * @access private
- */
- const ALGORITHM = 'DH';
-
- /**
- * DH prime
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $prime;
-
- /**
- * DH Base
- *
- * Prime divisor of p-1
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $base;
-
- /**
- * Create DH parameters
- *
- * This method is a bit polymorphic. It can take any of the following:
- * - two BigInteger's (prime and base)
- * - an integer representing the size of the prime in bits (the base is assumed to be 2)
- * - a string (eg. diffie-hellman-group14-sha1)
- *
- * @access public
- * @return \phpseclib3\Crypt\DH|bool
- */
- public static function createParameters(...$args)
- {
- $params = new Parameters;
- if (count($args) == 2 && $args[0] instanceof BigInteger && $args[1] instanceof BigInteger) {
- //if (!$args[0]->isPrime()) {
- // throw new \InvalidArgumentException('The first parameter should be a prime number');
- //}
- $params->prime = $args[0];
- $params->base = $args[1];
- return $params;
- } elseif (count($args) == 1 && is_numeric($args[0])) {
- $params->prime = BigInteger::randomPrime($args[0]);
- $params->base = new BigInteger(2);
- return $params;
- } elseif (count($args) != 1 || !is_string($args[0])) {
- throw new \InvalidArgumentException('Valid parameters are either: two BigInteger\'s (prime and base), a single integer (the length of the prime; base is assumed to be 2) or a string');
- }
- switch ($args[0]) {
- // see http://tools.ietf.org/html/rfc2409#section-6.2 and
- // http://tools.ietf.org/html/rfc2412, appendex E
- case 'diffie-hellman-group1-sha1':
- $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
- '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
- '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' .
- 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF';
- break;
- // see http://tools.ietf.org/html/rfc3526#section-3
- case 'diffie-hellman-group14-sha1': // 2048-bit MODP Group
- case 'diffie-hellman-group14-sha256':
- $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
- '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
- '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' .
- 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05' .
- '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB' .
- '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' .
- 'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718' .
- '3995497CEA956AE515D2261898FA051015728E5A8AACAA68FFFFFFFFFFFFFFFF';
- break;
- // see https://tools.ietf.org/html/rfc3526#section-4
- case 'diffie-hellman-group15-sha512': // 3072-bit MODP Group
- $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
- '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
- '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' .
- 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05' .
- '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB' .
- '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' .
- 'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718' .
- '3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D04507A33' .
- 'A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7' .
- 'ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6BF12FFA06D98A0864' .
- 'D87602733EC86A64521F2B18177B200CBBE117577A615D6C770988C0BAD946E2' .
- '08E24FA074E5AB3143DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF';
- break;
- // see https://tools.ietf.org/html/rfc3526#section-5
- case 'diffie-hellman-group16-sha512': // 4096-bit MODP Group
- $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
- '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
- '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' .
- 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05' .
- '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB' .
- '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' .
- 'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718' .
- '3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D04507A33' .
- 'A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7' .
- 'ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6BF12FFA06D98A0864' .
- 'D87602733EC86A64521F2B18177B200CBBE117577A615D6C770988C0BAD946E2' .
- '08E24FA074E5AB3143DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7' .
- '88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8' .
- 'DBBBC2DB04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2' .
- '233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9' .
- '93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199FFFFFFFFFFFFFFFF';
- break;
- // see https://tools.ietf.org/html/rfc3526#section-6
- case 'diffie-hellman-group17-sha512': // 6144-bit MODP Group
- $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
- '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
- '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' .
- 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05' .
- '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB' .
- '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' .
- 'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718' .
- '3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D04507A33' .
- 'A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7' .
- 'ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6BF12FFA06D98A0864' .
- 'D87602733EC86A64521F2B18177B200CBBE117577A615D6C770988C0BAD946E2' .
- '08E24FA074E5AB3143DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7' .
- '88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8' .
- 'DBBBC2DB04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2' .
- '233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9' .
- '93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C93402849236C3FAB4D27C7026' .
- 'C1D4DCB2602646DEC9751E763DBA37BDF8FF9406AD9E530EE5DB382F413001AE' .
- 'B06A53ED9027D831179727B0865A8918DA3EDBEBCF9B14ED44CE6CBACED4BB1B' .
- 'DB7F1447E6CC254B332051512BD7AF426FB8F401378CD2BF5983CA01C64B92EC' .
- 'F032EA15D1721D03F482D7CE6E74FEF6D55E702F46980C82B5A84031900B1C9E' .
- '59E7C97FBEC7E8F323A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA' .
- 'CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE32806A1D58BB7C5DA76' .
- 'F550AA3D8A1FBFF0EB19CCB1A313D55CDA56C9EC2EF29632387FE8D76E3C0468' .
- '043E8F663F4860EE12BF2D5B0B7474D6E694F91E6DCC4024FFFFFFFFFFFFFFFF';
- break;
- // see https://tools.ietf.org/html/rfc3526#section-7
- case 'diffie-hellman-group18-sha512': // 8192-bit MODP Group
- $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
- '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
- '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' .
- 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05' .
- '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB' .
- '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' .
- 'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718' .
- '3995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D04507A33' .
- 'A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7' .
- 'ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6BF12FFA06D98A0864' .
- 'D87602733EC86A64521F2B18177B200CBBE117577A615D6C770988C0BAD946E2' .
- '08E24FA074E5AB3143DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7' .
- '88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8' .
- 'DBBBC2DB04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2' .
- '233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9' .
- '93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C93402849236C3FAB4D27C7026' .
- 'C1D4DCB2602646DEC9751E763DBA37BDF8FF9406AD9E530EE5DB382F413001AE' .
- 'B06A53ED9027D831179727B0865A8918DA3EDBEBCF9B14ED44CE6CBACED4BB1B' .
- 'DB7F1447E6CC254B332051512BD7AF426FB8F401378CD2BF5983CA01C64B92EC' .
- 'F032EA15D1721D03F482D7CE6E74FEF6D55E702F46980C82B5A84031900B1C9E' .
- '59E7C97FBEC7E8F323A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA' .
- 'CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE32806A1D58BB7C5DA76' .
- 'F550AA3D8A1FBFF0EB19CCB1A313D55CDA56C9EC2EF29632387FE8D76E3C0468' .
- '043E8F663F4860EE12BF2D5B0B7474D6E694F91E6DBE115974A3926F12FEE5E4' .
- '38777CB6A932DF8CD8BEC4D073B931BA3BC832B68D9DD300741FA7BF8AFC47ED' .
- '2576F6936BA424663AAB639C5AE4F5683423B4742BF1C978238F16CBE39D652D' .
- 'E3FDB8BEFC848AD922222E04A4037C0713EB57A81A23F0C73473FC646CEA306B' .
- '4BCBC8862F8385DDFA9D4B7FA2C087E879683303ED5BDD3A062B3CF5B3A278A6' .
- '6D2A13F83F44F82DDF310EE074AB6A364597E899A0255DC164F31CC50846851D' .
- 'F9AB48195DED7EA1B1D510BD7EE74D73FAF36BC31ECFA268359046F4EB879F92' .
- '4009438B481C6CD7889A002ED5EE382BC9190DA6FC026E479558E4475677E9AA' .
- '9E3050E2765694DFC81F56E880B96E7160C980DD98EDD3DFFFFFFFFFFFFFFFFF';
- break;
- default:
- throw new \InvalidArgumentException('Invalid named prime provided');
- }
-
- $params->prime = new BigInteger($prime, 16);
- $params->base = new BigInteger(2);
-
- return $params;
- }
-
- /**
- * Create public / private key pair.
- *
- * The rationale for the second parameter is described in http://tools.ietf.org/html/rfc4419#section-6.2 :
- *
- * "To increase the speed of the key exchange, both client and server may
- * reduce the size of their private exponents. It should be at least
- * twice as long as the key material that is generated from the shared
- * secret. For more details, see the paper by van Oorschot and Wiener
- * [VAN-OORSCHOT]."
- *
- * $length is in bits
- *
- * @param Parameters $params
- * @param int $length optional
- * @access public
- * @return DH\PrivateKey
- */
- public static function createKey(Parameters $params, $length = 0)
- {
- $one = new BigInteger(1);
- if ($length) {
- $max = $one->bitwise_leftShift($length);
- $max = $max->subtract($one);
- } else {
- $max = $params->prime->subtract($one);
- }
-
- $key = new PrivateKey;
- $key->prime = $params->prime;
- $key->base = $params->base;
- $key->privateKey = BigInteger::randomRange($one, $max);
- $key->publicKey = $key->base->powMod($key->privateKey, $key->prime);
- return $key;
- }
-
- /**
- * Compute Shared Secret
- *
- * @param PrivateKey|EC $private
- * @param PublicKey|BigInteger|string $public
- * @access public
- * @return mixed
- */
- public static function computeSecret($private, $public)
- {
- if ($private instanceof PrivateKey) { // DH\PrivateKey
- switch (true) {
- case $public instanceof PublicKey:
- if (!$private->prime->equals($public->prime) || !$private->base->equals($public->base)) {
- throw new \InvalidArgumentException('The public and private key do not share the same prime and / or base numbers');
- }
- return $public->publicKey->powMod($private->privateKey, $private->prime)->toBytes(true);
- case is_string($public):
- $public = new BigInteger($public, -256);
- case $public instanceof BigInteger:
- return $public->powMod($private->privateKey, $private->prime)->toBytes(true);
- default:
- throw new \InvalidArgumentException('$public needs to be an instance of DH\PublicKey, a BigInteger or a string');
- }
- }
-
- if ($private instanceof EC\PrivateKey) {
- switch (true) {
- case $public instanceof EC\PublicKey:
- $public = $public->getEncodedCoordinates();
- case is_string($public):
- $point = $private->multiply($public);
- switch ($private->getCurve()) {
- case 'Curve25519':
- case 'Curve448':
- $secret = $point;
- break;
- default:
- // according to https://www.secg.org/sec1-v2.pdf#page=33 only X is returned
- $secret = substr($point, 1, (strlen($point) - 1) >> 1);
- }
- /*
- if (($secret[0] & "\x80") === "\x80") {
- $secret = "\0$secret";
- }
- */
- return $secret;
- default:
- throw new \InvalidArgumentException('$public needs to be an instance of EC\PublicKey or a string (an encoded coordinate)');
- }
- }
- }
-
- /**
- * Load the key
- *
- * @param string $key
- * @param string $password optional
- * @return AsymmetricKey
- */
- public static function load($key, $password = false)
- {
- try {
- return EC::load($key, $password);
- } catch (NoKeyLoadedException $e) {}
-
- return parent::load($key, $password);
- }
-
- /**
- * OnLoad Handler
- *
- * @return bool
- * @access protected
- * @param array $components
- */
- protected static function onLoad($components)
- {
- if (!isset($components['privateKey']) && !isset($components['publicKey'])) {
- $new = new Parameters;
- } else {
- $new = isset($components['privateKey']) ?
- new PrivateKey :
- new PublicKey;
- }
-
- $new->prime = $components['prime'];
- $new->base = $components['base'];
-
- if (isset($components['privateKey'])) {
- $new->privateKey = $components['privateKey'];
- }
- if (isset($components['publicKey'])) {
- $new->publicKey = $components['publicKey'];
- }
-
- return $new;
- }
-
- /**
- * Determines which hashing function should be used
- *
- * @access public
- * @param string $hash
- */
- public function withHash($hash)
- {
- throw new UnsupportedOperationException('DH does not use a hash algorithm');
- }
-
- /**
- * Returns the hash algorithm currently being used
- *
- * @access public
- */
- public function getHash()
- {
- throw new UnsupportedOperationException('DH does not use a hash algorithm');
- }
-
- /**
- * Returns the parameters
- *
- * A public / private key is only returned if the currently loaded "key" contains an x or y
- * value.
- *
- * @see self::getPublicKey()
- * @access public
- * @return mixed
- */
- public function getParameters()
- {
- $type = self::validatePlugin('Keys', 'PKCS1', 'saveParameters');
-
- $key = $type::saveParameters($this->prime, $this->base);
- return self::load($key, 'PKCS1');
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS1.php
deleted file mode 100644
index 368b187fe..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS1.php
+++ /dev/null
@@ -1,83 +0,0 @@
-<?php
-
-/**
- * "PKCS1" Formatted EC Key Handler
- *
- * PHP version 5
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN DH PARAMETERS-----
- *
- * Technically, PKCS1 is for RSA keys, only, but we're using PKCS1 to describe
- * DSA, whose format isn't really formally described anywhere, so might as well
- * use it to describe this, too.
- *
- * @category Crypt
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DH\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS1 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-
-/**
- * "PKCS1" Formatted DH Key Handler
- *
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS1 extends Progenitor
-{
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- $key = parent::load($key, $password);
-
- $decoded = ASN1::decodeBER($key);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER');
- }
-
- $components = ASN1::asn1map($decoded[0], Maps\DHParameter::MAP);
- if (!is_array($components)) {
- throw new \RuntimeException('Unable to perform ASN1 mapping on parameters');
- }
-
- return $components;
- }
-
- /**
- * Convert EC parameters to the appropriate format
- *
- * @access public
- * @return string
- */
- public static function saveParameters(BigInteger $prime, BigInteger $base, array $options = [])
- {
- $params = [
- 'prime' => $prime,
- 'base' => $base
- ];
- $params = ASN1::encodeDER($params, Maps\DHParameter::MAP);
-
- return "-----BEGIN DH PARAMETERS-----\r\n" .
- chunk_split(base64_encode($params), 64) .
- "-----END DH PARAMETERS-----\r\n";
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS8.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS8.php
deleted file mode 100644
index e69fcee6e..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS8.php
+++ /dev/null
@@ -1,157 +0,0 @@
-<?php
-
-/**
- * PKCS#8 Formatted DH Key Handler
- *
- * PHP version 5
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN ENCRYPTED PRIVATE KEY-----
- * -----BEGIN PRIVATE KEY-----
- * -----BEGIN PUBLIC KEY-----
- *
- * @category Crypt
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DH\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * PKCS#8 Formatted DH Key Handler
- *
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS8 extends Progenitor
-{
- /**
- * OID Name
- *
- * @var string
- * @access private
- */
- const OID_NAME = 'dhKeyAgreement';
-
- /**
- * OID Value
- *
- * @var string
- * @access private
- */
- const OID_VALUE = '1.2.840.113549.1.3.1';
-
- /**
- * Child OIDs loaded
- *
- * @var bool
- * @access private
- */
- protected static $childOIDsLoaded = false;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- $isPublic = strpos($key, 'PUBLIC') !== false;
-
- $key = parent::load($key, $password);
-
- $type = isset($key['privateKey']) ? 'privateKey' : 'publicKey';
-
- switch (true) {
- case !$isPublic && $type == 'publicKey':
- throw new \UnexpectedValueException('Human readable string claims non-public key but DER encoded string claims public key');
- case $isPublic && $type == 'privateKey':
- throw new \UnexpectedValueException('Human readable string claims public key but DER encoded string claims private key');
- }
-
- $decoded = ASN1::decodeBER($key[$type . 'Algorithm']['parameters']->element);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER of parameters');
- }
- $components = ASN1::asn1map($decoded[0], Maps\DHParameter::MAP);
- if (!is_array($components)) {
- throw new \RuntimeException('Unable to perform ASN1 mapping on parameters');
- }
-
- $decoded = ASN1::decodeBER($key[$type]);
- switch (true) {
- case empty($decoded):
- case !is_array($decoded):
- case !isset($decoded[0]['content']):
- case !$decoded[0]['content'] instanceof BigInteger:
- throw new \RuntimeException('Unable to decode BER of parameters');
- }
- $components[$type] = $decoded[0]['content'];
-
- return $components;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $prime
- * @param \phpseclib3\Math\BigInteger $base
- * @param \phpseclib3\Math\BigInteger $privateKey
- * @param \phpseclib3\Math\BigInteger $publicKey
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $prime, BigInteger $base, BigInteger $privateKey, BigInteger $publicKey, $password = '', array $options = [])
- {
- $params = [
- 'prime' => $prime,
- 'base' => $base
- ];
- $params = ASN1::encodeDER($params, Maps\DHParameter::MAP);
- $params = new ASN1\Element($params);
- $key = ASN1::encodeDER($privateKey, ['type' => ASN1::TYPE_INTEGER]);
- return self::wrapPrivateKey($key, [], $params, $password, $options);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $prime
- * @param \phpseclib3\Math\BigInteger $base
- * @param \phpseclib3\Math\BigInteger $publicKey
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BigInteger $prime, BigInteger $base, BigInteger $publicKey, array $options = [])
- {
- $params = [
- 'prime' => $prime,
- 'base' => $base
- ];
- $params = ASN1::encodeDER($params, Maps\DHParameter::MAP);
- $params = new ASN1\Element($params);
- $key = ASN1::encodeDER($publicKey, ['type' => ASN1::TYPE_INTEGER]);
- return self::wrapPublicKey($key, $params);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Parameters.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Parameters.php
deleted file mode 100644
index d36283d03..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Parameters.php
+++ /dev/null
@@ -1,40 +0,0 @@
-<?php
-
-/**
- * DH Parameters
- *
- * @category Crypt
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DH;
-
-use phpseclib3\Crypt\DH;
-
-/**
- * DH Parameters
- *
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Parameters extends DH
-{
- /**
- * Returns the parameters
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type = 'PKCS1', array $options = [])
- {
- $type = self::validatePlugin('Keys', 'PKCS1', 'saveParameters');
-
- return $type::saveParameters($this->prime, $this->base, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/PrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/PrivateKey.php
deleted file mode 100644
index 8756b4197..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/PrivateKey.php
+++ /dev/null
@@ -1,82 +0,0 @@
-<?php
-
-/**
- * DH Private Key
- *
- * @category Crypt
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DH;
-
-use phpseclib3\Crypt\DH;
-use phpseclib3\Crypt\Common;
-
-/**
- * DH Private Key
- *
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PrivateKey extends DH
-{
- use Common\Traits\PasswordProtected;
-
- /**
- * Private Key
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $privateKey;
-
- /**
- * Public Key
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $publicKey;
-
- /**
- * Returns the public key
- *
- * @access public
- * @return DH
- */
- public function getPublicKey()
- {
- $type = self::validatePlugin('Keys', 'PKCS8', 'savePublicKey');
-
- if (!isset($this->publicKey)) {
- $this->publicKey = $this->base->powMod($this->privateKey, $this->prime);
- }
-
- $key = $type::savePublicKey($this->prime, $this->base, $this->publicKey);
-
- return DH::loadFormat('PKCS8', $key);
- }
-
- /**
- * Returns the private key
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type, array $options = [])
- {
- $type = self::validatePlugin('Keys', $type, 'savePrivateKey');
-
- if (!isset($this->publicKey)) {
- $this->publicKey = $this->base->powMod($this->privateKey, $this->prime);
- }
-
- return $type::savePrivateKey($this->prime, $this->base, $this->privateKey, $this->publicKey, $this->password, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/PublicKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/PublicKey.php
deleted file mode 100644
index 9670e28a1..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/PublicKey.php
+++ /dev/null
@@ -1,53 +0,0 @@
-<?php
-
-/**
- * DH Public Key
- *
- * @category Crypt
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DH;
-
-use phpseclib3\Crypt\DH;
-use phpseclib3\Crypt\Common;
-
-/**
- * DH Public Key
- *
- * @package DH
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PublicKey extends DH
-{
- use Common\Traits\Fingerprint;
-
- /**
- * Returns the public key
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type, array $options = [])
- {
- $type = self::validatePlugin('Keys', $type, 'savePublicKey');
-
- return $type::savePublicKey($this->prime, $this->base, $this->publicKey, $options);
- }
-
- /**
- * Returns the public key as a BigInteger
- *
- * @return \phpseclib3\Math\BigInteger
- */
- public function toBigInteger()
- {
- return $this->publicKey;
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA.php
deleted file mode 100644
index b368d83f5..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA.php
+++ /dev/null
@@ -1,344 +0,0 @@
-<?php
-
-/**
- * Pure-PHP FIPS 186-4 compliant implementation of DSA.
- *
- * PHP version 5
- *
- * Here's an example of how to create signatures and verify signatures with this library:
- * <code>
- * <?php
- * include 'vendor/autoload.php';
- *
- * $private = \phpseclib3\Crypt\DSA::createKey();
- * $public = $private->getPublicKey();
- *
- * $plaintext = 'terrafrost';
- *
- * $signature = $private->sign($plaintext);
- *
- * echo $public->verify($plaintext, $signature) ? 'verified' : 'unverified';
- * ?>
- * </code>
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\AsymmetricKey;
-use phpseclib3\Crypt\DSA\PrivateKey;
-use phpseclib3\Crypt\DSA\PublicKey;
-use phpseclib3\Crypt\DSA\Parameters;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Exception\InsufficientSetupException;
-
-/**
- * Pure-PHP FIPS 186-4 compliant implementation of DSA.
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DSA extends AsymmetricKey
-{
- /**
- * Algorithm Name
- *
- * @var string
- * @access private
- */
- const ALGORITHM = 'DSA';
-
- /**
- * DSA Prime P
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $p;
-
- /**
- * DSA Group Order q
- *
- * Prime divisor of p-1
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $q;
-
- /**
- * DSA Group Generator G
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $g;
-
- /**
- * DSA public key value y
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $y;
-
- /**
- * Signature Format
- *
- * @var string
- * @access private
- */
- protected $sigFormat;
-
- /**
- * Signature Format (Short)
- *
- * @var string
- * @access private
- */
- protected $shortFormat;
-
- /**
- * Create DSA parameters
- *
- * @access public
- * @param int $L
- * @param int $N
- * @return \phpseclib3\Crypt\DSA|bool
- */
- public static function createParameters($L = 2048, $N = 224)
- {
- self::initialize_static_variables();
-
- if (!isset(self::$engines['PHP'])) {
- self::useBestEngine();
- }
-
- switch (true) {
- case $N == 160:
- /*
- in FIPS 186-1 and 186-2 N was fixed at 160 whereas K had an upper bound of 1024.
- RFC 4253 (SSH Transport Layer Protocol) references FIPS 186-2 and as such most
- SSH DSA implementations only support keys with an N of 160.
- puttygen let's you set the size of L (but not the size of N) and uses 2048 as the
- default L value. that's not really compliant with any of the FIPS standards, however,
- for the purposes of maintaining compatibility with puttygen, we'll support it
- */
- //case ($L >= 512 || $L <= 1024) && (($L & 0x3F) == 0) && $N == 160:
- // FIPS 186-3 changed this as follows:
- //case $L == 1024 && $N == 160:
- case $L == 2048 && $N == 224:
- case $L == 2048 && $N == 256:
- case $L == 3072 && $N == 256:
- break;
- default:
- throw new \InvalidArgumentException('Invalid values for N and L');
- }
-
- $two = new BigInteger(2);
-
- $q = BigInteger::randomPrime($N);
- $divisor = $q->multiply($two);
-
- do {
- $x = BigInteger::random($L);
- list(, $c) = $x->divide($divisor);
- $p = $x->subtract($c->subtract(self::$one));
- } while ($p->getLength() != $L || !$p->isPrime());
-
- $p_1 = $p->subtract(self::$one);
- list($e) = $p_1->divide($q);
-
- // quoting http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf#page=50 ,
- // "h could be obtained from a random number generator or from a counter that
- // changes after each use". PuTTY (sshdssg.c) starts h off at 1 and increments
- // it on each loop. wikipedia says "commonly h = 2 is used" so we'll just do that
- $h = clone $two;
- while (true) {
- $g = $h->powMod($e, $p);
- if (!$g->equals(self::$one)) {
- break;
- }
- $h = $h->add(self::$one);
- }
-
- $dsa = new Parameters;
- $dsa->p = $p;
- $dsa->q = $q;
- $dsa->g = $g;
-
- return $dsa;
- }
-
- /**
- * Create public / private key pair.
- *
- * This method is a bit polymorphic. It can take a DSA/Parameters object, L / N as two distinct parameters or
- * no parameters (at which point L and N will be generated with this method)
- *
- * Returns the private key, from which the publickey can be extracted
- *
- * @param int[] ...$args
- * @access public
- * @return DSA\PrivateKey
- */
- public static function createKey(...$args)
- {
- self::initialize_static_variables();
-
- if (!isset(self::$engines['PHP'])) {
- self::useBestEngine();
- }
-
- if (count($args) == 2 && is_int($args[0]) && is_int($args[1])) {
- $params = self::createParameters($args[0], $args[1]);
- } else if (count($args) == 1 && $args[0] instanceof Parameters) {
- $params = $args[0];
- } else if (!count($args)) {
- $params = self::createParameters();
- } else {
- throw new InsufficientSetupException('Valid parameters are either two integers (L and N), a single DSA object or no parameters at all.');
- }
-
- $private = new PrivateKey;
- $private->p = $params->p;
- $private->q = $params->q;
- $private->g = $params->g;
-
- $private->x = BigInteger::randomRange(self::$one, $private->q->subtract(self::$one));
- $private->y = $private->g->powMod($private->x, $private->p);
-
- //$public = clone $private;
- //unset($public->x);
-
- return $private
- ->withHash($params->hash->getHash())
- ->withSignatureFormat($params->shortFormat);
- }
-
- /**
- * OnLoad Handler
- *
- * @return bool
- * @access protected
- * @param array $components
- */
- protected static function onLoad($components)
- {
- if (!isset(self::$engines['PHP'])) {
- self::useBestEngine();
- }
-
- if (!isset($components['x']) && !isset($components['y'])) {
- $new = new Parameters;
- } else if (isset($components['x'])) {
- $new = new PrivateKey;
- $new->x = $components['x'];
- } else {
- $new = new PublicKey;
- }
-
- $new->p = $components['p'];
- $new->q = $components['q'];
- $new->g = $components['g'];
-
- if (isset($components['y'])) {
- $new->y = $components['y'];
- }
-
- return $new;
- }
-
- /**
- * Constructor
- *
- * PublicKey and PrivateKey objects can only be created from abstract RSA class
- */
- protected function __construct()
- {
- $this->sigFormat = self::validatePlugin('Signature', 'ASN1');
- $this->shortFormat = 'ASN1';
-
- parent::__construct();
- }
-
- /**
- * Returns the key size
- *
- * More specifically, this L (the length of DSA Prime P) and N (the length of DSA Group Order q)
- *
- * @access public
- * @return array
- */
- public function getLength()
- {
- return ['L' => $this->p->getLength(), 'N' => $this->q->getLength()];
- }
-
- /**
- * Returns the current engine being used
- *
- * @see self::useInternalEngine()
- * @see self::useBestEngine()
- * @access public
- * @return string
- */
- public function getEngine()
- {
- return self::$engines['OpenSSL'] && in_array($this->hash->getHash(), openssl_get_md_methods()) ?
- 'OpenSSL' : 'PHP';
- }
-
- /**
- * Returns the parameters
- *
- * A public / private key is only returned if the currently loaded "key" contains an x or y
- * value.
- *
- * @see self::getPublicKey()
- * @access public
- * @return mixed
- */
- public function getParameters()
- {
- $type = self::validatePlugin('Keys', 'PKCS1', 'saveParameters');
-
- $key = $type::saveParameters($this->p, $this->q, $this->g);
- return DSA::load($key, 'PKCS1')
- ->withHash($this->hash->getHash())
- ->withSignatureFormat($this->shortFormat);
- }
-
- /**
- * Determines the signature padding mode
- *
- * Valid values are: ASN1, SSH2, Raw
- *
- * @access public
- * @param string $format
- */
- public function withSignatureFormat($format)
- {
- $new = clone $this;
- $new->shortFormat = $format;
- $new->sigFormat = self::validatePlugin('Signature', $format);
- return $new;
- }
-
- /**
- * Returns the signature format currently being used
- *
- * @access public
- */
- public function getSignatureFormat()
- {
- return $this->shortFormat;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/OpenSSH.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/OpenSSH.php
deleted file mode 100644
index bf2d9860c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/OpenSSH.php
+++ /dev/null
@@ -1,126 +0,0 @@
-<?php
-
-/**
- * OpenSSH Formatted DSA Key Handler
- *
- * PHP version 5
- *
- * Place in $HOME/.ssh/authorized_keys
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Common\Formats\Keys\OpenSSH as Progenitor;
-
-/**
- * OpenSSH Formatted DSA Key Handler
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OpenSSH extends Progenitor
-{
- /**
- * Supported Key Types
- *
- * @var array
- */
- protected static $types = ['ssh-dss'];
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- $parsed = parent::load($key, $password);
-
- if (isset($parsed['paddedKey'])) {
- list($type) = Strings::unpackSSH2('s', $parsed['paddedKey']);
- if ($type != $parsed['type']) {
- throw new \RuntimeException("The public and private keys are not of the same type ($type vs $parsed[type])");
- }
-
- list($p, $q, $g, $y, $x, $comment) = Strings::unpackSSH2('i5s', $parsed['paddedKey']);
-
- return compact('p', 'q', 'g', 'y', 'x', 'comment');
- }
-
- list($p, $q, $g, $y) = Strings::unpackSSH2('iiii', $parsed['publicKey']);
-
- $comment = $parsed['comment'];
-
- return compact('p', 'q', 'g', 'y', 'comment');
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y, array $options = [])
- {
- if ($q->getLength() != 160) {
- throw new \InvalidArgumentException('SSH only supports keys with an N (length of Group Order q) of 160');
- }
-
- // from <http://tools.ietf.org/html/rfc4253#page-15>:
- // string "ssh-dss"
- // mpint p
- // mpint q
- // mpint g
- // mpint y
- $DSAPublicKey = Strings::packSSH2('siiii', 'ssh-dss', $p, $q, $g, $y);
-
- if (isset($options['binary']) ? $options['binary'] : self::$binary) {
- return $DSAPublicKey;
- }
-
- $comment = isset($options['comment']) ? $options['comment'] : self::$comment;
- $DSAPublicKey = 'ssh-dss ' . base64_encode($DSAPublicKey) . ' ' . $comment;
-
- return $DSAPublicKey;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @param \phpseclib3\Math\BigInteger $x
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y, BigInteger $x, $password = '', array $options = [])
- {
- $publicKey = self::savePublicKey($p, $q, $g, $y, ['binary' => true]);
- $privateKey = Strings::packSSH2('si5', 'ssh-dss', $p, $q, $g, $y, $x);
-
- return self::wrapPrivateKey($publicKey, $privateKey, $password, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS1.php
deleted file mode 100644
index 757487377..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS1.php
+++ /dev/null
@@ -1,151 +0,0 @@
-<?php
-
-/**
- * PKCS#1 Formatted DSA Key Handler
- *
- * PHP version 5
- *
- * Used by File/X509.php
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN DSA PRIVATE KEY-----
- * -----BEGIN DSA PUBLIC KEY-----
- * -----BEGIN DSA PARAMETERS-----
- *
- * Analogous to ssh-keygen's pem format (as specified by -m)
- *
- * Also, technically, PKCS1 decribes RSA but I am not aware of a formal specification for DSA.
- * The DSA private key format seems to have been adapted from the RSA private key format so
- * we're just re-using that as the name.
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS1 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use ParagonIE\ConstantTime\Base64;
-
-/**
- * PKCS#1 Formatted DSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS1 extends Progenitor
-{
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- $key = parent::load($key, $password);
-
- $decoded = ASN1::decodeBER($key);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER');
- }
-
- $key = ASN1::asn1map($decoded[0], Maps\DSAParams::MAP);
- if (is_array($key)) {
- return $key;
- }
-
- $key = ASN1::asn1map($decoded[0], Maps\DSAPrivateKey::MAP);
- if (is_array($key)) {
- return $key;
- }
-
- $key = ASN1::asn1map($decoded[0], Maps\DSAPublicKey::MAP);
- if (is_array($key)) {
- return $key;
- }
-
- throw new \RuntimeException('Unable to perform ASN1 mapping');
- }
-
- /**
- * Convert DSA parameters to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @return string
- */
- public static function saveParameters(BigInteger $p, BigInteger $q, BigInteger $g)
- {
- $key = [
- 'p' => $p,
- 'q' => $q,
- 'g' => $g
- ];
-
- $key = ASN1::encodeDER($key, Maps\DSAParams::MAP);
-
- return "-----BEGIN DSA PARAMETERS-----\r\n" .
- chunk_split(Base64::encode($key), 64) .
- "-----END DSA PARAMETERS-----\r\n";
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @param \phpseclib3\Math\BigInteger $x
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y, BigInteger $x, $password = '', array $options = [])
- {
- $key = [
- 'version' => 0,
- 'p' => $p,
- 'q' => $q,
- 'g' => $g,
- 'y' => $y,
- 'x' => $x
- ];
-
- $key = ASN1::encodeDER($key, Maps\DSAPrivateKey::MAP);
-
- return self::wrapPrivateKey($key, 'DSA', $password, $options);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @return string
- */
- public static function savePublicKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y)
- {
- $key = ASN1::encodeDER($y, Maps\DSAPublicKey::MAP);
-
- return self::wrapPublicKey($key, 'DSA');
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS8.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS8.php
deleted file mode 100644
index 71f66eb06..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS8.php
+++ /dev/null
@@ -1,170 +0,0 @@
-<?php
-
-/**
- * PKCS#8 Formatted DSA Key Handler
- *
- * PHP version 5
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN ENCRYPTED PRIVATE KEY-----
- * -----BEGIN PRIVATE KEY-----
- * -----BEGIN PUBLIC KEY-----
- *
- * Analogous to ssh-keygen's pkcs8 format (as specified by -m). Although PKCS8
- * is specific to private keys it's basically creating a DER-encoded wrapper
- * for keys. This just extends that same concept to public keys (much like ssh-keygen)
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * PKCS#8 Formatted DSA Key Handler
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS8 extends Progenitor
-{
- /**
- * OID Name
- *
- * @var string
- * @access private
- */
- const OID_NAME = 'id-dsa';
-
- /**
- * OID Value
- *
- * @var string
- * @access private
- */
- const OID_VALUE = '1.2.840.10040.4.1';
-
- /**
- * Child OIDs loaded
- *
- * @var bool
- * @access private
- */
- protected static $childOIDsLoaded = false;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- $isPublic = strpos($key, 'PUBLIC') !== false;
-
- $key = parent::load($key, $password);
-
- $type = isset($key['privateKey']) ? 'privateKey' : 'publicKey';
-
- switch (true) {
- case !$isPublic && $type == 'publicKey':
- throw new \UnexpectedValueException('Human readable string claims non-public key but DER encoded string claims public key');
- case $isPublic && $type == 'privateKey':
- throw new \UnexpectedValueException('Human readable string claims public key but DER encoded string claims private key');
- }
-
- $decoded = ASN1::decodeBER($key[$type . 'Algorithm']['parameters']->element);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER of parameters');
- }
- $components = ASN1::asn1map($decoded[0], Maps\DSAParams::MAP);
- if (!is_array($components)) {
- throw new \RuntimeException('Unable to perform ASN1 mapping on parameters');
- }
-
- $decoded = ASN1::decodeBER($key[$type]);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER');
- }
-
- $var = $type == 'privateKey' ? 'x' : 'y';
- $components[$var] = ASN1::asn1map($decoded[0], Maps\DSAPublicKey::MAP);
- if (!$components[$var] instanceof BigInteger) {
- throw new \RuntimeException('Unable to perform ASN1 mapping');
- }
-
- if (isset($key['meta'])) {
- $components['meta'] = $key['meta'];
- }
-
- return $components;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @param \phpseclib3\Math\BigInteger $x
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y, BigInteger $x, $password = '', array $options = [])
- {
- $params = [
- 'p' => $p,
- 'q' => $q,
- 'g' => $g
- ];
- $params = ASN1::encodeDER($params, Maps\DSAParams::MAP);
- $params = new ASN1\Element($params);
- $key = ASN1::encodeDER($x, Maps\DSAPublicKey::MAP);
- return self::wrapPrivateKey($key, [], $params, $password, $options);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y, array $options = [])
- {
- $params = [
- 'p' => $p,
- 'q' => $q,
- 'g' => $g
- ];
- $params = ASN1::encodeDER($params, Maps\DSAParams::MAP);
- $params = new ASN1\Element($params);
- $key = ASN1::encodeDER($y, Maps\DSAPublicKey::MAP);
- return self::wrapPublicKey($key, $params);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PuTTY.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PuTTY.php
deleted file mode 100644
index 5f71e6840..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PuTTY.php
+++ /dev/null
@@ -1,118 +0,0 @@
-<?php
-
-/**
- * PuTTY Formatted DSA Key Handler
- *
- * puttygen does not generate DSA keys with an N of anything other than 160, however,
- * it can still load them and convert them. PuTTY will load them, too, but SSH servers
- * won't accept them. Since PuTTY formatted keys are primarily used with SSH this makes
- * keys with N > 160 kinda useless, hence this handlers not supporting such keys.
- *
- * PHP version 5
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Common\Formats\Keys\PuTTY as Progenitor;
-
-/**
- * PuTTY Formatted DSA Key Handler
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PuTTY extends Progenitor
-{
- /**
- * Public Handler
- *
- * @var string
- * @access private
- */
- const PUBLIC_HANDLER = 'phpseclib3\Crypt\DSA\Formats\Keys\OpenSSH';
-
- /**
- * Algorithm Identifier
- *
- * @var array
- * @access private
- */
- protected static $types = ['ssh-dss'];
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- $components = parent::load($key, $password);
- if (!isset($components['private'])) {
- return $components;
- }
- extract($components);
- unset($components['public'], $components['private']);
-
- list($p, $q, $g, $y) = Strings::unpackSSH2('iiii', $public);
- list($x) = Strings::unpackSSH2('i', $private);
-
- return compact('p', 'q', 'g', 'y', 'x', 'comment');
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @param \phpseclib3\Math\BigInteger $x
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y, BigInteger $x, $password = false, array $options = [])
- {
- if ($q->getLength() != 160) {
- throw new \InvalidArgumentException('SSH only supports keys with an N (length of Group Order q) of 160');
- }
-
- $public = Strings::packSSH2('iiii', $p, $q, $g, $y);
- $private = Strings::packSSH2('i', $x);
-
- return self::wrapPrivateKey($public, $private, 'ssh-dsa', $password, $options);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @return string
- */
- public static function savePublicKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y)
- {
- if ($q->getLength() != 160) {
- throw new \InvalidArgumentException('SSH only supports keys with an N (length of Group Order q) of 160');
- }
-
- return self::wrapPublicKey(Strings::packSSH2('iiii', $p, $q, $g, $y), 'ssh-dsa');
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/Raw.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/Raw.php
deleted file mode 100644
index 04eba721b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/Raw.php
+++ /dev/null
@@ -1,92 +0,0 @@
-<?php
-
-/**
- * Raw DSA Key Handler
- *
- * PHP version 5
- *
- * Reads and creates arrays as DSA keys
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-
-/**
- * Raw DSA Key Handler
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Raw
-{
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param array $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!is_array($key)) {
- throw new \UnexpectedValueException('Key should be a array - not a ' . gettype($key));
- }
-
- switch (true) {
- case !isset($key['p']) || !isset($key['q']) || !isset($key['g']):
- case !$key['p'] instanceof BigInteger:
- case !$key['q'] instanceof BigInteger:
- case !$key['g'] instanceof BigInteger:
- case !isset($key['x']) && !isset($key['y']):
- case isset($key['x']) && !$key['x'] instanceof BigInteger:
- case isset($key['y']) && !$key['y'] instanceof BigInteger:
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
-
- $options = ['p' => 1, 'q' => 1, 'g' => 1, 'x' => 1, 'y' => 1];
-
- return array_intersect_key($key, $options);
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @param \phpseclib3\Math\BigInteger $x
- * @param string $password optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y, BigInteger $x, $password = '')
- {
- return compact('p', 'q', 'g', 'y', 'x');
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @return string
- */
- public static function savePublicKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y)
- {
- return compact('p', 'q', 'g', 'y');
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/XML.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/XML.php
deleted file mode 100644
index 42b3bbb99..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/XML.php
+++ /dev/null
@@ -1,133 +0,0 @@
-<?php
-
-/**
- * XML Formatted DSA Key Handler
- *
- * While XKMS defines a private key format for RSA it does not do so for DSA. Quoting that standard:
- *
- * "[XKMS] does not specify private key parameters for the DSA signature algorithm since the algorithm only
- * supports signature modes and so the application of server generated keys and key recovery is of limited
- * value"
- *
- * PHP version 5
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * XML Formatted DSA Key Handler
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class XML
-{
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- $use_errors = libxml_use_internal_errors(true);
-
- $dom = new \DOMDocument();
- if (substr($key, 0, 5) != '<?xml') {
- $key = '<xml>' . $key . '</xml>';
- }
- if (!$dom->loadXML($key)) {
- throw new \UnexpectedValueException('Key does not appear to contain XML');
- }
- $xpath = new \DOMXPath($dom);
- $keys = ['p', 'q', 'g', 'y', 'j', 'seed', 'pgencounter'];
- foreach ($keys as $key) {
- // $dom->getElementsByTagName($key) is case-sensitive
- $temp = $xpath->query("//*[translate(local-name(), 'ABCDEFGHIJKLMNOPQRSTUVWXYZ','abcdefghijklmnopqrstuvwxyz')='$key']");
- if (!$temp->length) {
- continue;
- }
- $value = new BigInteger(Base64::decode($temp->item(0)->nodeValue), 256);
- switch ($key) {
- case 'p': // a prime modulus meeting the [DSS] requirements
- // Parameters P, Q, and G can be public and common to a group of users. They might be known
- // from application context. As such, they are optional but P and Q must either both appear
- // or both be absent
- $components['p'] = $value;
- break;
- case 'q': // an integer in the range 2**159 < Q < 2**160 which is a prime divisor of P-1
- $components['q'] = $value;
- break;
- case 'g': // an integer with certain properties with respect to P and Q
- $components['g'] = $value;
- break;
- case 'y': // G**X mod P (where X is part of the private key and not made public)
- $components['y'] = $value;
- // the remaining options do not do anything
- case 'j': // (P - 1) / Q
- // Parameter J is available for inclusion solely for efficiency as it is calculatable from
- // P and Q
- case 'seed': // a DSA prime generation seed
- // Parameters seed and pgenCounter are used in the DSA prime number generation algorithm
- // specified in [DSS]. As such, they are optional but must either both be present or both
- // be absent
- case 'pgencounter': // a DSA prime generation counter
- }
- }
-
- libxml_use_internal_errors($use_errors);
-
- if (!isset($components['y'])) {
- throw new \UnexpectedValueException('Key is missing y component');
- }
-
- switch (true) {
- case !isset($components['p']):
- case !isset($components['q']):
- case !isset($components['g']):
- return ['y' => $components['y']];
- }
-
- return $components;
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * See https://www.w3.org/TR/xmldsig-core/#sec-DSAKeyValue
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $p
- * @param \phpseclib3\Math\BigInteger $q
- * @param \phpseclib3\Math\BigInteger $g
- * @param \phpseclib3\Math\BigInteger $y
- * @return string
- */
- public static function savePublicKey(BigInteger $p, BigInteger $q, BigInteger $g, BigInteger $y)
- {
- return "<DSAKeyValue>\r\n" .
- ' <P>' . Base64::encode($p->toBytes()) . "</P>\r\n" .
- ' <Q>' . Base64::encode($q->toBytes()) . "</Q>\r\n" .
- ' <G>' . Base64::encode($g->toBytes()) . "</G>\r\n" .
- ' <Y>' . Base64::encode($y->toBytes()) . "</Y>\r\n" .
- '</DSAKeyValue>';
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/ASN1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/ASN1.php
deleted file mode 100644
index a9c29a346..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/ASN1.php
+++ /dev/null
@@ -1,68 +0,0 @@
-<?php
-
-/**
- * ASN1 Signature Handler
- *
- * PHP version 5
- *
- * Handles signatures in the format described in
- * https://tools.ietf.org/html/rfc3279#section-2.2.2
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Signature;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\File\ASN1 as Encoder;
-use phpseclib3\File\ASN1\Maps;
-
-/**
- * ASN1 Signature Handler
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ASN1
-{
- /**
- * Loads a signature
- *
- * @access public
- * @param string $sig
- * @return array|bool
- */
- public static function load($sig)
- {
- if (!is_string($sig)) {
- return false;
- }
-
- $decoded = Encoder::decodeBER($sig);
- if (empty($decoded)) {
- return false;
- }
- $components = Encoder::asn1map($decoded[0], Maps\DssSigValue::MAP);
-
- return $components;
- }
-
- /**
- * Returns a signature in the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $r
- * @param \phpseclib3\Math\BigInteger $s
- * @return string
- */
- public static function save(BigInteger $r, BigInteger $s)
- {
- return Encoder::encodeDER(compact('r', 's'), Maps\DssSigValue::MAP);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/Raw.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/Raw.php
deleted file mode 100644
index e362e41bb..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/Raw.php
+++ /dev/null
@@ -1,29 +0,0 @@
-<?php
-
-/**
- * Raw DSA Signature Handler
- *
- * PHP version 5
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Signature;
-
-use phpseclib3\Crypt\Common\Formats\Signature\Raw as Progenitor;
-
-/**
- * Raw DSA Signature Handler
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Raw extends Progenitor
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/SSH2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/SSH2.php
deleted file mode 100644
index 39f1f6cef..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Signature/SSH2.php
+++ /dev/null
@@ -1,78 +0,0 @@
-<?php
-
-/**
- * SSH2 Signature Handler
- *
- * PHP version 5
- *
- * Handles signatures in the format used by SSH2
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA\Formats\Signature;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * SSH2 Signature Handler
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class SSH2
-{
- /**
- * Loads a signature
- *
- * @access public
- * @param string $sig
- * @return mixed
- */
- public static function load($sig)
- {
- if (!is_string($sig)) {
- return false;
- }
-
- $result = Strings::unpackSSH2('ss', $sig);
- if ($result === false) {
- return false;
- }
- list($type, $blob) = $result;
- if ($type != 'ssh-dss' || strlen($blob) != 40) {
- return false;
- }
-
- return [
- 'r' => new BigInteger(substr($blob, 0, 20), 256),
- 's' => new BigInteger(substr($blob, 20), 256)
- ];
- }
-
- /**
- * Returns a signature in the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $r
- * @param \phpseclib3\Math\BigInteger $s
- * @return string
- */
- public static function save(BigInteger $r, BigInteger $s)
- {
- if ($r->getLength() > 160 || $s->getLength() > 160) {
- return false;
- }
- return Strings::packSSH2('ss', 'ssh-dss',
- str_pad($r->toBytes(), 20, "\0", STR_PAD_LEFT) .
- str_pad($s->toBytes(), 20, "\0", STR_PAD_LEFT)
- );
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Parameters.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Parameters.php
deleted file mode 100644
index 3f36e9624..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Parameters.php
+++ /dev/null
@@ -1,40 +0,0 @@
-<?php
-
-/**
- * DSA Parameters
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA;
-
-use phpseclib3\Crypt\DSA;
-
-/**
- * DSA Parameters
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Parameters extends DSA
-{
- /**
- * Returns the parameters
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type = 'PKCS1', array $options = [])
- {
- $type = self::validatePlugin('Keys', 'PKCS1', 'saveParameters');
-
- return $type::saveParameters($this->p, $this->q, $this->g, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/PrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/PrivateKey.php
deleted file mode 100644
index c976f2cf6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/PrivateKey.php
+++ /dev/null
@@ -1,159 +0,0 @@
-<?php
-
-/**
- * DSA Private Key
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA;
-
-use phpseclib3\Crypt\DSA;
-use phpseclib3\Crypt\DSA\Formats\Signature\ASN1 as ASN1Signature;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common;
-
-/**
- * DSA Private Key
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PrivateKey extends DSA implements Common\PrivateKey
-{
- use Common\Traits\PasswordProtected;
-
- /**
- * DSA secret exponent x
- *
- * @var \phpseclib3\Math\BigInteger
- * @access private
- */
- protected $x;
-
- /**
- * Returns the public key
- *
- * If you do "openssl rsa -in private.rsa -pubout -outform PEM" you get a PKCS8 formatted key
- * that contains a publicKeyAlgorithm AlgorithmIdentifier and a publicKey BIT STRING.
- * An AlgorithmIdentifier contains an OID and a parameters field. With RSA public keys this
- * parameters field is NULL. With DSA PKCS8 public keys it is not - it contains the p, q and g
- * variables. The publicKey BIT STRING contains, simply, the y variable. This can be verified
- * by getting a DSA PKCS8 public key:
- *
- * "openssl dsa -in private.dsa -pubout -outform PEM"
- *
- * ie. just swap out rsa with dsa in the rsa command above.
- *
- * A PKCS1 public key corresponds to the publicKey portion of the PKCS8 key. In the case of RSA
- * the publicKey portion /is/ the key. In the case of DSA it is not. You cannot verify a signature
- * without the parameters and the PKCS1 DSA public key format does not include the parameters.
- *
- * @see self::getPrivateKey()
- * @access public
- * @return mixed
- */
- public function getPublicKey()
- {
- $type = self::validatePlugin('Keys', 'PKCS8', 'savePublicKey');
-
- if (!isset($this->y)) {
- $this->y = $this->g->powMod($this->x, $this->p);
- }
-
- $key = $type::savePublicKey($this->p, $this->q, $this->g, $this->y);
-
- return DSA::loadFormat('PKCS8', $key)
- ->withHash($this->hash->getHash())
- ->withSignatureFormat($this->shortFormat);
- }
-
- /**
- * Create a signature
- *
- * @see self::verify()
- * @access public
- * @param string $message
- * @return mixed
- */
- public function sign($message)
- {
- $format = $this->sigFormat;
-
- if (self::$engines['OpenSSL'] && in_array($this->hash->getHash(), openssl_get_md_methods())) {
- $signature = '';
- $result = openssl_sign($message, $signature, $this->toString('PKCS8'), $this->hash->getHash());
-
- if ($result) {
- if ($this->shortFormat == 'ASN1') {
- return $signature;
- }
-
- extract(ASN1Signature::load($signature));
-
- return $format::save($r, $s);
- }
- }
-
- $h = $this->hash->hash($message);
- $h = $this->bits2int($h);
-
- while (true) {
- $k = BigInteger::randomRange(self::$one, $this->q->subtract(self::$one));
- $r = $this->g->powMod($k, $this->p);
- list(, $r) = $r->divide($this->q);
- if ($r->equals(self::$zero)) {
- continue;
- }
- $kinv = $k->modInverse($this->q);
- $temp = $h->add($this->x->multiply($r));
- $temp = $kinv->multiply($temp);
- list(, $s) = $temp->divide($this->q);
- if (!$s->equals(self::$zero)) {
- break;
- }
- }
-
- // the following is an RFC6979 compliant implementation of deterministic DSA
- // it's unused because it's mainly intended for use when a good CSPRNG isn't
- // available. if phpseclib's CSPRNG isn't good then even key generation is
- // suspect
- /*
- $h1 = $this->hash->hash($message);
- $k = $this->computek($h1);
- $r = $this->g->powMod($k, $this->p);
- list(, $r) = $r->divide($this->q);
- $kinv = $k->modInverse($this->q);
- $h1 = $this->bits2int($h1);
- $temp = $h1->add($this->x->multiply($r));
- $temp = $kinv->multiply($temp);
- list(, $s) = $temp->divide($this->q);
- */
-
- return $format::save($r, $s);
- }
-
- /**
- * Returns the private key
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type, array $options = [])
- {
- $type = self::validatePlugin('Keys', $type, 'savePrivateKey');
-
- if (!isset($this->y)) {
- $this->y = $this->g->powMod($this->x, $this->p);
- }
-
- return $type::savePrivateKey($this->p, $this->q, $this->g, $this->y, $this->x, $this->password, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/PublicKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/PublicKey.php
deleted file mode 100644
index 156476f06..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/PublicKey.php
+++ /dev/null
@@ -1,91 +0,0 @@
-<?php
-
-/**
- * DSA Public Key
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\DSA;
-
-use phpseclib3\Crypt\DSA;
-use phpseclib3\Crypt\DSA\Formats\Signature\ASN1 as ASN1Signature;
-use phpseclib3\Crypt\Common;
-
-/**
- * DSA Public Key
- *
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PublicKey extends DSA implements Common\PublicKey
-{
- use Common\Traits\Fingerprint;
-
- /**
- * Verify a signature
- *
- * @see self::verify()
- * @access public
- * @param string $message
- * @param string $signature
- * @return mixed
- */
- public function verify($message, $signature)
- {
- $format = $this->sigFormat;
-
- $params = $format::load($signature);
- if ($params === false || count($params) != 2) {
- return false;
- }
- extract($params);
-
- if (self::$engines['OpenSSL'] && in_array($this->hash->getHash(), openssl_get_md_methods())) {
- $sig = $format != 'ASN1' ? ASN1Signature::save($r, $s) : $signature;
-
- $result = openssl_verify($message, $sig, $this->toString('PKCS8'), $this->hash->getHash());
-
- if ($result != -1) {
- return (bool) $result;
- }
- }
-
- $q_1 = $this->q->subtract(self::$one);
- if (!$r->between(self::$one, $q_1) || !$s->between(self::$one, $q_1)) {
- return false;
- }
-
- $w = $s->modInverse($this->q);
- $h = $this->hash->hash($message);
- $h = $this->bits2int($h);
- list(, $u1) = $h->multiply($w)->divide($this->q);
- list(, $u2) = $r->multiply($w)->divide($this->q);
- $v1 = $this->g->powMod($u1, $this->p);
- $v2 = $this->y->powMod($u2, $this->p);
- list(, $v) = $v1->multiply($v2)->divide($this->p);
- list(, $v) = $v->divide($this->q);
-
- return $v->equals($r);
- }
-
- /**
- * Returns the public key
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type, array $options = [])
- {
- $type = self::validatePlugin('Keys', $type, 'savePublicKey');
-
- return $type::savePublicKey($this->p, $this->q, $this->g, $this->y, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC.php
deleted file mode 100644
index 2c0ab1979..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC.php
+++ /dev/null
@@ -1,477 +0,0 @@
-<?php
-
-/**
- * Pure-PHP implementation of EC.
- *
- * PHP version 5
- *
- * Here's an example of how to create signatures and verify signatures with this library:
- * <code>
- * <?php
- * include 'vendor/autoload.php';
- *
- * $private = \phpseclib3\Crypt\EC::createKey('secp256k1');
- * $public = $private->getPublicKey();
- *
- * $plaintext = 'terrafrost';
- *
- * $signature = $private->sign($plaintext);
- *
- * echo $public->verify($plaintext, $signature) ? 'verified' : 'unverified';
- * ?>
- * </code>
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\AsymmetricKey;
-use phpseclib3\Crypt\EC\PrivateKey;
-use phpseclib3\Crypt\EC\PublicKey;
-use phpseclib3\Crypt\EC\Parameters;
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards as TwistedEdwardsCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve;
-use phpseclib3\Crypt\EC\Curves\Curve25519;
-use phpseclib3\Crypt\EC\Curves\Ed25519;
-use phpseclib3\Crypt\EC\Curves\Ed448;
-use phpseclib3\Crypt\EC\Formats\Keys\PKCS1;
-use phpseclib3\File\ASN1\Maps\ECParameters;
-use phpseclib3\File\ASN1;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Exception\UnsupportedCurveException;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-use phpseclib3\Exception\UnsupportedOperationException;
-
-/**
- * Pure-PHP implementation of EC.
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class EC extends AsymmetricKey
-{
- /**
- * Algorithm Name
- *
- * @var string
- * @access private
- */
- const ALGORITHM = 'EC';
-
- /**
- * Public Key QA
- *
- * @var object[]
- */
- protected $QA;
-
- /**
- * Curve
- *
- * @var \phpseclib3\Crypt\EC\BaseCurves\Base
- */
- protected $curve;
-
- /**
- * Signature Format
- *
- * @var string
- * @access private
- */
- protected $format;
-
- /**
- * Signature Format (Short)
- *
- * @var string
- * @access private
- */
- protected $shortFormat;
-
- /**
- * Curve Name
- *
- * @var string
- */
- private $curveName;
-
- /**
- * Curve Order
- *
- * Used for deterministic ECDSA
- *
- * @var \phpseclib3\Math\BigInteger
- */
- protected $q;
-
- /**
- * Alias for the private key
- *
- * Used for deterministic ECDSA. AsymmetricKey expects $x. I don't like x because
- * with x you have x * the base point yielding an (x, y)-coordinate that is the
- * public key. But the x is different depending on which side of the equal sign
- * you're on. It's less ambiguous if you do dA * base point = (x, y)-coordinate.
- *
- * @var \phpseclib3\Math\BigInteger
- */
- protected $x;
-
- /**
- * Context
- *
- * @var string
- */
- protected $context;
-
- /**
- * Create public / private key pair.
- *
- * @access public
- * @param string $curve
- * @return \phpseclib3\Crypt\EC\PrivateKey
- */
- public static function createKey($curve)
- {
- self::initialize_static_variables();
-
- if (!isset(self::$engines['PHP'])) {
- self::useBestEngine();
- }
-
- $curve = strtolower($curve);
- if (self::$engines['libsodium'] && $curve == 'ed25519' && function_exists('sodium_crypto_sign_keypair')) {
- $kp = sodium_crypto_sign_keypair();
-
- $privatekey = EC::loadFormat('libsodium', sodium_crypto_sign_secretkey($kp));
- //$publickey = EC::loadFormat('libsodium', sodium_crypto_sign_publickey($kp));
-
- $privatekey->curveName = 'Ed25519';
- //$publickey->curveName = $curve;
-
- return $privatekey;
- }
-
- $privatekey = new PrivateKey;
-
- $curveName = $curve;
- if (preg_match('#(?:^curve|^ed)\d+$#', $curveName)) {
- $curveName = ucfirst($curveName);
- } elseif (substr($curveName, 0, 10) == 'brainpoolp') {
- $curveName = 'brainpoolP' . substr($curveName, 10);
- }
- $curve = '\phpseclib3\Crypt\EC\Curves\\' . $curveName;
-
- if (!class_exists($curve)) {
- throw new UnsupportedCurveException('Named Curve of ' . $curveName . ' is not supported');
- }
-
- $reflect = new \ReflectionClass($curve);
- $curveName = $reflect->isFinal() ?
- $reflect->getParentClass()->getShortName() :
- $reflect->getShortName();
-
- $curve = new $curve();
- $privatekey->dA = $dA = $curve->createRandomMultiplier();
- if ($curve instanceof Curve25519 && self::$engines['libsodium']) {
- //$r = pack('H*', '0900000000000000000000000000000000000000000000000000000000000000');
- //$QA = sodium_crypto_scalarmult($dA->toBytes(), $r);
- $QA = sodium_crypto_box_publickey_from_secretkey($dA->toBytes());
- $privatekey->QA = [$curve->convertInteger(new BigInteger(strrev($QA), 256))];
- } else {
- $privatekey->QA = $curve->multiplyPoint($curve->getBasePoint(), $dA);
- }
- $privatekey->curve = $curve;
-
- //$publickey = clone $privatekey;
- //unset($publickey->dA);
- //unset($publickey->x);
-
- $privatekey->curveName = $curveName;
- //$publickey->curveName = $curveName;
-
- if ($privatekey->curve instanceof TwistedEdwardsCurve) {
- return $privatekey->withHash($curve::HASH);
- }
-
- return $privatekey;
- }
-
- /**
- * OnLoad Handler
- *
- * @return bool
- * @access protected
- * @param array $components
- */
- protected static function onLoad($components)
- {
- if (!isset(self::$engines['PHP'])) {
- self::useBestEngine();
- }
-
- if (!isset($components['dA']) && !isset($components['QA'])) {
- $new = new Parameters;
- $new->curve = $components['curve'];
- return $new;
- }
-
- $new = isset($components['dA']) ?
- new PrivateKey :
- new PublicKey;
- $new->curve = $components['curve'];
- $new->QA = $components['QA'];
-
- if (isset($components['dA'])) {
- $new->dA = $components['dA'];
- }
-
- if ($new->curve instanceof TwistedEdwardsCurve) {
- return $new->withHash($components['curve']::HASH);
- }
-
- return $new;
- }
-
- /**
- * Constructor
- *
- * PublicKey and PrivateKey objects can only be created from abstract RSA class
- */
- protected function __construct()
- {
- $this->sigFormat = self::validatePlugin('Signature', 'ASN1');
- $this->shortFormat = 'ASN1';
-
- parent::__construct();
- }
-
- /**
- * Returns the curve
- *
- * Returns a string if it's a named curve, an array if not
- *
- * @access public
- * @return string|array
- */
- public function getCurve()
- {
- if ($this->curveName) {
- return $this->curveName;
- }
-
- if ($this->curve instanceof MontgomeryCurve) {
- $this->curveName = $this->curve instanceof Curve25519 ? 'Curve25519' : 'Curve448';
- return $this->curveName;
- }
-
- if ($this->curve instanceof TwistedEdwardsCurve) {
- $this->curveName = $this->curve instanceof Ed25519 ? 'Ed25519' : 'Ed448';
- return $this->curveName;
- }
-
- $params = $this->getParameters()->toString('PKCS8', ['namedCurve' => true]);
- $decoded = ASN1::extractBER($params);
- $decoded = ASN1::decodeBER($decoded);
- $decoded = ASN1::asn1map($decoded[0], ECParameters::MAP);
- if (isset($decoded['namedCurve'])) {
- $this->curveName = $decoded['namedCurve'];
- return $decoded['namedCurve'];
- }
-
- if (!$namedCurves) {
- PKCS1::useSpecifiedCurve();
- }
-
- return $decoded;
- }
-
- /**
- * Returns the key size
- *
- * Quoting https://tools.ietf.org/html/rfc5656#section-2,
- *
- * "The size of a set of elliptic curve domain parameters on a prime
- * curve is defined as the number of bits in the binary representation
- * of the field order, commonly denoted by p. Size on a
- * characteristic-2 curve is defined as the number of bits in the binary
- * representation of the field, commonly denoted by m. A set of
- * elliptic curve domain parameters defines a group of order n generated
- * by a base point P"
- *
- * @access public
- * @return int
- */
- public function getLength()
- {
- return $this->curve->getLength();
- }
-
- /**
- * Returns the current engine being used
- *
- * @see self::useInternalEngine()
- * @see self::useBestEngine()
- * @access public
- * @return string
- */
- public function getEngine()
- {
- if ($this->curve instanceof TwistedEdwardsCurve) {
- return $this->curve instanceof Ed25519 && self::$engines['libsodium'] && !isset($this->context) ?
- 'libsodium' : 'PHP';
- }
-
- return self::$engines['OpenSSL'] && in_array($this->hash->getHash(), openssl_get_md_methods()) ?
- 'OpenSSL' : 'PHP';
- }
-
- /**
- * Returns the public key coordinates as a string
- *
- * Used by ECDH
- *
- * @return string
- */
- public function getEncodedCoordinates()
- {
- if ($this->curve instanceof MontgomeryCurve) {
- return strrev($this->QA[0]->toBytes(true));
- }
- if ($this->curve instanceof TwistedEdwardsCurve) {
- return $this->curve->encodePoint($this->QA);
- }
- return "\4" . $this->QA[0]->toBytes(true) . $this->QA[1]->toBytes(true);
- }
-
- /**
- * Returns the parameters
- *
- * @see self::getPublicKey()
- * @access public
- * @param string $type optional
- * @return mixed
- */
- public function getParameters($type = 'PKCS1')
- {
- $type = self::validatePlugin('Keys', $type, 'saveParameters');
-
- $key = $type::saveParameters($this->curve);
-
- return EC::load($key, 'PKCS1')
- ->withHash($this->hash->getHash())
- ->withSignatureFormat($this->shortFormat);
- }
-
- /**
- * Determines the signature padding mode
- *
- * Valid values are: ASN1, SSH2, Raw
- *
- * @access public
- * @param string $format
- */
- public function withSignatureFormat($format)
- {
- if ($this->curve instanceof MontgomeryCurve) {
- throw new UnsupportedOperationException('Montgomery Curves cannot be used to create signatures');
- }
-
- $new = clone $this;
- $new->shortFormat = $format;
- $new->sigFormat = self::validatePlugin('Signature', $format);
- return $new;
- }
-
- /**
- * Returns the signature format currently being used
- *
- * @access public
- */
- public function getSignatureFormat()
- {
- return $this->shortFormat;
- }
-
- /**
- * Sets the context
- *
- * Used by Ed25519 / Ed448.
- *
- * @see self::sign()
- * @see self::verify()
- * @access public
- * @param string $context optional
- */
- public function withContext($context = null)
- {
- if (!$this->curve instanceof TwistedEdwardsCurve) {
- throw new UnsupportedCurveException('Only Ed25519 and Ed448 support contexts');
- }
-
- $new = clone $this;
- if (!isset($context)) {
- $new->context = null;
- return $new;
- }
- if (!is_string($context)) {
- throw new \InvalidArgumentException('setContext expects a string');
- }
- if (strlen($context) > 255) {
- throw new \LengthException('The context is supposed to be, at most, 255 bytes long');
- }
- $new->context = $context;
- return $new;
- }
-
- /**
- * Returns the signature format currently being used
- *
- * @access public
- */
- public function getContext()
- {
- return $this->context;
- }
-
- /**
- * Determines which hashing function should be used
- *
- * @access public
- * @param string $hash
- */
- public function withHash($hash)
- {
- if ($this->curve instanceof MontgomeryCurve) {
- throw new UnsupportedOperationException('Montgomery Curves cannot be used to create signatures');
- }
- if ($this->curve instanceof Ed25519 && $hash != 'sha512') {
- throw new UnsupportedAlgorithmException('Ed25519 only supports sha512 as a hash');
- }
- if ($this->curve instanceof Ed448 && $hash != 'shake256-912') {
- throw new UnsupportedAlgorithmException('Ed448 only supports shake256 with a length of 114 bytes');
- }
-
- return parent::withHash($hash);
- }
-
- /**
- * __toString() magic method
- *
- * @return string
- */
- public function __toString()
- {
- if ($this->curve instanceof MontgomeryCurve) {
- return '';
- }
-
- return parent::__toString();
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Base.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Base.php
deleted file mode 100644
index 6102c0630..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Base.php
+++ /dev/null
@@ -1,220 +0,0 @@
-<?php
-
-/**
- * Curve methods common to all curves
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\BaseCurves;
-
-use phpseclib3\Math\Common\FiniteField;
-use phpseclib3\Math\BigInteger;
-
-/**
- * Base
- *
- * @package Prime
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Base
-{
- /**
- * Doubles
- *
- * @var object[]
- */
- protected $doubles;
-
- /**
- * NAF Points
- *
- * @var int[]
- */
- private $naf;
-
- /**
- * The Order
- *
- * @var BigInteger
- */
- protected $order;
-
- /**
- * Finite Field Integer factory
- *
- * @var \phpseclib3\Math\FiniteField\Integer
- */
- protected $factory;
-
- /**
- * Returns a random integer
- *
- * @return object
- */
- public function randomInteger()
- {
- return $this->factory->randomInteger();
- }
-
- /**
- * Converts a BigInteger to a FiniteField integer
- *
- * @return object
- */
- public function convertInteger(BigInteger $x)
- {
- return $this->factory->newInteger($x);
- }
-
- /**
- * Returns the length, in bytes, of the modulo
- *
- * @return integer
- */
- public function getLengthInBytes()
- {
- return $this->factory->getLengthInBytes();
- }
-
- /**
- * Returns the length, in bits, of the modulo
- *
- * @return integer
- */
- public function getLength()
- {
- return $this->factory->getLength();
- }
-
- /**
- * Multiply a point on the curve by a scalar
- *
- * Uses the montgomery ladder technique as described here:
- *
- * https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#Montgomery_ladder
- * https://github.com/phpecc/phpecc/issues/16#issuecomment-59176772
- *
- * @return array
- */
- public function multiplyPoint(array $p, FiniteField\Integer $d)
- {
- $alreadyInternal = isset($p[2]);
- $r = $alreadyInternal ?
- [[], $p] :
- [[], $this->convertToInternal($p)];
-
- $d = $d->toBits();
- for ($i = 0; $i < strlen($d); $i++) {
- $d_i = (int) $d[$i];
- $r[1 - $d_i] = $this->addPoint($r[0], $r[1]);
- $r[$d_i] = $this->doublePoint($r[$d_i]);
- }
-
- return $alreadyInternal ? $r[0] : $this->convertToAffine($r[0]);
- }
-
- /**
- * Creates a random scalar multiplier
- *
- * @return FiniteField
- */
- public function createRandomMultiplier()
- {
- static $one;
- if (!isset($one)) {
- $one = new BigInteger(1);
- }
-
- $dA = BigInteger::randomRange($one, $this->order->subtract($one));
- return $this->factory->newInteger($dA);
- }
-
- /**
- * Sets the Order
- */
- public function setOrder(BigInteger $order)
- {
- $this->order = $order;
- }
-
- /**
- * Returns the Order
- *
- * @return \phpseclib3\Math\BigInteger
- */
- public function getOrder()
- {
- return $this->order;
- }
-
- /**
- * Use a custom defined modular reduction function
- *
- * @return object
- */
- public function setReduction(callable $func)
- {
- $this->factory->setReduction($func);
- }
-
- /**
- * Returns the affine point
- *
- * @return object[]
- */
- public function convertToAffine(array $p)
- {
- return $p;
- }
-
- /**
- * Converts an affine point to a jacobian coordinate
- *
- * @return object[]
- */
- public function convertToInternal(array $p)
- {
- return $p;
- }
-
- /**
- * Negates a point
- *
- * @return object[]
- */
- public function negatePoint(array $p)
- {
- $temp = [
- $p[0],
- $p[1]->negate()
- ];
- if (isset($p[2])) {
- $temp[] = $p[2];
- }
- return $temp;
- }
-
- /**
- * Multiply and Add Points
- *
- * @return int[]
- */
- public function multiplyAddPoints(array $points, array $scalars)
- {
- $p1 = $this->convertToInternal($points[0]);
- $p2 = $this->convertToInternal($points[1]);
- $p1 = $this->multiplyPoint($p1, $scalars[0]);
- $p2 = $this->multiplyPoint($p2, $scalars[1]);
- $r = $this->addPoint($p1, $p2);
- return $this->convertToAffine($r);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Binary.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Binary.php
deleted file mode 100644
index d984ba4b4..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Binary.php
+++ /dev/null
@@ -1,378 +0,0 @@
-<?php
-
-/**
- * Curves over y^2 + x*y = x^3 + a*x^2 + b
- *
- * These are curves used in SEC 2 over prime fields: http://www.secg.org/SEC2-Ver-1.0.pdf
- * The curve is a weierstrass curve with a[3] and a[2] set to 0.
- *
- * Uses Jacobian Coordinates for speed if able:
- *
- * https://en.wikipedia.org/wiki/Jacobian_curve
- * https://en.wikibooks.org/wiki/Cryptography/Prime_Curve/Jacobian_Coordinates
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\BaseCurves;
-
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Math\BinaryField;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Math\BinaryField\Integer as BinaryInteger;
-
-/**
- * Curves over y^2 + x*y = x^3 + a*x^2 + b
- *
- * @package Binary
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Binary extends Base
-{
- /**
- * Binary Field Integer factory
- *
- * @var \phpseclib3\Math\BinaryField
- */
- protected $factory;
-
- /**
- * Cofficient for x^1
- *
- * @var object
- */
- protected $a;
-
- /**
- * Cofficient for x^0
- *
- * @var object
- */
- protected $b;
-
- /**
- * Base Point
- *
- * @var object
- */
- protected $p;
-
- /**
- * The number one over the specified finite field
- *
- * @var object
- */
- protected $one;
-
- /**
- * The modulo
- *
- * @var BigInteger
- */
- protected $modulo;
-
- /**
- * The Order
- *
- * @var BigInteger
- */
- protected $order;
-
- /**
- * Sets the modulo
- */
- public function setModulo(...$modulo)
- {
- $this->modulo = $modulo;
- $this->factory = new BinaryField(...$modulo);
-
- $this->one = $this->factory->newInteger("\1");
- }
-
- /**
- * Set coefficients a and b
- *
- * @param string $a
- * @param string $b
- */
- public function setCoefficients($a, $b)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- $this->a = $this->factory->newInteger(pack('H*', $a));
- $this->b = $this->factory->newInteger(pack('H*', $b));
- }
-
- /**
- * Set x and y coordinates for the base point
- *
- * @param string|BinaryInteger $x
- * @param string|BinaryInteger $y
- */
- public function setBasePoint($x, $y)
- {
- switch (true) {
- case !is_string($x) && !$x instanceof BinaryInteger:
- throw new \UnexpectedValueException('Argument 1 passed to Binary::setBasePoint() must be a string or an instance of BinaryField\Integer');
- case !is_string($y) && !$y instanceof BinaryInteger:
- throw new \UnexpectedValueException('Argument 2 passed to Binary::setBasePoint() must be a string or an instance of BinaryField\Integer');
- }
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- $this->p = [
- is_string($x) ? $this->factory->newInteger(pack('H*', $x)) : $x,
- is_string($y) ? $this->factory->newInteger(pack('H*', $y)) : $y
- ];
- }
-
- /**
- * Retrieve the base point as an array
- *
- * @return array
- */
- public function getBasePoint()
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- /*
- if (!isset($this->p)) {
- throw new \RuntimeException('setBasePoint needs to be called before this method');
- }
- */
- return $this->p;
- }
-
- /**
- * Adds two points on the curve
- *
- * @return FiniteField[]
- */
- public function addPoint(array $p, array $q)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p) || !count($q)) {
- if (count($q)) {
- return $q;
- }
- if (count($p)) {
- return $p;
- }
- return [];
- }
-
- if (!isset($p[2]) || !isset($q[2])) {
- throw new \RuntimeException('Affine coordinates need to be manually converted to "Jacobi" coordinates or vice versa');
- }
-
- if ($p[0]->equals($q[0])) {
- return !$p[1]->equals($q[1]) ? [] : $this->doublePoint($p);
- }
-
- // formulas from http://hyperelliptic.org/EFD/g12o/auto-shortw-jacobian.html
-
- list($x1, $y1, $z1) = $p;
- list($x2, $y2, $z2) = $q;
-
- $o1 = $z1->multiply($z1);
- $b = $x2->multiply($o1);
-
- if ($z2->equals($this->one)) {
- $d = $y2->multiply($o1)->multiply($z1);
- $e = $x1->add($b);
- $f = $y1->add($d);
- $z3 = $e->multiply($z1);
- $h = $f->multiply($x2)->add($z3->multiply($y2));
- $i = $f->add($z3);
- $g = $z3->multiply($z3);
- $p1 = $this->a->multiply($g);
- $p2 = $f->multiply($i);
- $p3 = $e->multiply($e)->multiply($e);
- $x3 = $p1->add($p2)->add($p3);
- $y3 = $i->multiply($x3)->add($g->multiply($h));
-
- return [$x3, $y3, $z3];
- }
-
- $o2 = $z2->multiply($z2);
- $a = $x1->multiply($o2);
- $c = $y1->multiply($o2)->multiply($z2);
- $d = $y2->multiply($o1)->multiply($z1);
- $e = $a->add($b);
- $f = $c->add($d);
- $g = $e->multiply($z1);
- $h = $f->multiply($x2)->add($g->multiply($y2));
- $z3 = $g->multiply($z2);
- $i = $f->add($z3);
- $p1 = $this->a->multiply($z3->multiply($z3));
- $p2 = $f->multiply($i);
- $p3 = $e->multiply($e)->multiply($e);
- $x3 = $p1->add($p2)->add($p3);
- $y3 = $i->multiply($x3)->add($g->multiply($g)->multiply($h));
-
- return [$x3, $y3, $z3];
- }
-
- /**
- * Doubles a point on a curve
- *
- * @return FiniteField[]
- */
- public function doublePoint(array $p)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p)) {
- return [];
- }
-
- if (!isset($p[2])) {
- throw new \RuntimeException('Affine coordinates need to be manually converted to "Jacobi" coordinates or vice versa');
- }
-
- // formulas from http://hyperelliptic.org/EFD/g12o/auto-shortw-jacobian.html
-
- list($x1, $y1, $z1) = $p;
-
- $a = $x1->multiply($x1);
- $b = $a->multiply($a);
-
- if ($z1->equals($this->one)) {
- $x3 = $b->add($this->b);
- $z3 = clone $x1;
- $p1 = $a->add($y1)->add($z3)->multiply($this->b);
- $p2 = $a->add($y1)->multiply($b);
- $y3 = $p1->add($p2);
-
- return [$x3, $y3, $z3];
- }
-
- $c = $z1->multiply($z1);
- $d = $c->multiply($c);
- $x3 = $b->add($this->b->multiply($d->multiply($d)));
- $z3 = $x1->multiply($c);
- $p1 = $b->multiply($z3);
- $p2 = $a->add($y1->multiply($z1))->add($z3)->multiply($x3);
- $y3 = $p1->add($p2);
-
- return [$x3, $y3, $z3];
- }
-
- /**
- * Returns the X coordinate and the derived Y coordinate
- *
- * Not supported because it is covered by patents.
- * Quoting https://www.openssl.org/docs/man1.1.0/apps/ecparam.html ,
- *
- * "Due to patent issues the compressed option is disabled by default for binary curves
- * and can be enabled by defining the preprocessor macro OPENSSL_EC_BIN_PT_COMP at
- * compile time."
- *
- * @return array
- */
- public function derivePoint($m)
- {
- throw new \RuntimeException('Point compression on binary finite field elliptic curves is not supported');
- }
-
- /**
- * Tests whether or not the x / y values satisfy the equation
- *
- * @return boolean
- */
- public function verifyPoint(array $p)
- {
- list($x, $y) = $p;
- $lhs = $y->multiply($y);
- $lhs = $lhs->add($x->multiply($y));
- $x2 = $x->multiply($x);
- $x3 = $x2->multiply($x);
- $rhs = $x3->add($this->a->multiply($x2))->add($this->b);
-
- return $lhs->equals($rhs);
- }
-
- /**
- * Returns the modulo
- *
- * @return \phpseclib3\Math\BigInteger
- */
- public function getModulo()
- {
- return $this->modulo;
- }
-
- /**
- * Returns the a coefficient
- *
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function getA()
- {
- return $this->a;
- }
-
- /**
- * Returns the a coefficient
- *
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function getB()
- {
- return $this->b;
- }
-
- /**
- * Returns the affine point
- *
- * A Jacobian Coordinate is of the form (x, y, z).
- * To convert a Jacobian Coordinate to an Affine Point
- * you do (x / z^2, y / z^3)
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToAffine(array $p)
- {
- if (!isset($p[2])) {
- return $p;
- }
- list($x, $y, $z) = $p;
- $z = $this->one->divide($z);
- $z2 = $z->multiply($z);
- return [
- $x->multiply($z2),
- $y->multiply($z2)->multiply($z)
- ];
- }
-
- /**
- * Converts an affine point to a jacobian coordinate
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToInternal(array $p)
- {
- if (isset($p[2])) {
- return $p;
- }
-
- $p[2] = clone $this->one;
- $p['fresh'] = true;
- return $p;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/KoblitzPrime.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/KoblitzPrime.php
deleted file mode 100644
index 0a93f5126..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/KoblitzPrime.php
+++ /dev/null
@@ -1,325 +0,0 @@
-<?php
-
-/**
- * Generalized Koblitz Curves over y^2 = x^3 + b.
- *
- * According to http://www.secg.org/SEC2-Ver-1.0.pdf Koblitz curves are over the GF(2**m)
- * finite field. Both the $a$ and $b$ coefficients are either 0 or 1. However, SEC2
- * generalizes the definition to include curves over GF(P) "which possess an efficiently
- * computable endomorphism".
- *
- * For these generalized Koblitz curves $b$ doesn't have to be 0 or 1. Whether or not $a$
- * has any restrictions on it is unclear, however, for all the GF(P) Koblitz curves defined
- * in SEC2 v1.0 $a$ is $0$ so all of the methods defined herein will assume that it is.
- *
- * I suppose we could rename the $b$ coefficient to $a$, however, the documentation refers
- * to $b$ so we'll just keep it.
- *
- * If a later version of SEC2 comes out wherein some $a$ values are non-zero we can create a
- * new method for those. eg. KoblitzA1Prime.php or something.
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\BaseCurves;
-
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Math\PrimeField;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Math\PrimeField\Integer as PrimeInteger;
-
-/**
- * Curves over y^2 = x^3 + b
- *
- * @package KoblitzPrime
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class KoblitzPrime extends Prime
-{
- // don't overwrite setCoefficients() with one that only accepts one parameter so that
- // one might be able to switch between KoblitzPrime and Prime more easily (for benchmarking
- // purposes).
-
- /**
- * Multiply and Add Points
- *
- * Uses a efficiently computable endomorphism to achieve a slight speedup
- *
- * Adapted from https://git.io/vxbrP
- *
- * @return int[]
- */
- public function multiplyAddPoints(array $points, array $scalars)
- {
- static $zero, $one, $two;
- if (!isset($two)) {
- $two = new BigInteger(2);
- $one = new BigInteger(1);
- }
-
- if (!isset($this->beta)) {
- // get roots
- $inv = $this->one->divide($this->two)->negate();
- $s = $this->three->negate()->squareRoot()->multiply($inv);
- $betas = [
- $inv->add($s),
- $inv->subtract($s)
- ];
- $this->beta = $betas[0]->compare($betas[1]) < 0 ? $betas[0] : $betas[1];
- //echo strtoupper($this->beta->toHex(true)) . "\n"; exit;
- }
-
- if (!isset($this->basis)) {
- $factory = new PrimeField($this->order);
- $tempOne = $factory->newInteger($one);
- $tempTwo = $factory->newInteger($two);
- $tempThree = $factory->newInteger(new BigInteger(3));
-
- $inv = $tempOne->divide($tempTwo)->negate();
- $s = $tempThree->negate()->squareRoot()->multiply($inv);
-
- $lambdas = [
- $inv->add($s),
- $inv->subtract($s)
- ];
-
- $lhs = $this->multiplyPoint($this->p, $lambdas[0])[0];
- $rhs = $this->p[0]->multiply($this->beta);
- $lambda = $lhs->equals($rhs) ? $lambdas[0] : $lambdas[1];
-
- $this->basis = static::extendedGCD($lambda->toBigInteger(), $this->order);
- ///*
- foreach ($this->basis as $basis) {
- echo strtoupper($basis['a']->toHex(true)) . "\n";
- echo strtoupper($basis['b']->toHex(true)) . "\n\n";
- }
- exit;
- //*/
- }
-
- $npoints = $nscalars = [];
- for ($i = 0; $i < count($points); $i++) {
- $p = $points[$i];
- $k = $scalars[$i]->toBigInteger();
-
- // begin split
- list($v1, $v2) = $this->basis;
-
- $c1 = $v2['b']->multiply($k);
- list($c1, $r) = $c1->divide($this->order);
- if ($this->order->compare($r->multiply($two)) <= 0) {
- $c1 = $c1->add($one);
- }
-
- $c2 = $v1['b']->negate()->multiply($k);
- list($c2, $r) = $c2->divide($this->order);
- if ($this->order->compare($r->multiply($two)) <= 0) {
- $c2 = $c2->add($one);
- }
-
- $p1 = $c1->multiply($v1['a']);
- $p2 = $c2->multiply($v2['a']);
- $q1 = $c1->multiply($v1['b']);
- $q2 = $c2->multiply($v2['b']);
-
- $k1 = $k->subtract($p1)->subtract($p2);
- $k2 = $q1->add($q2)->negate();
- // end split
-
- $beta = [
- $p[0]->multiply($this->beta),
- $p[1],
- clone $this->one
- ];
-
- if (isset($p['naf'])) {
- $beta['naf'] = array_map(function($p) {
- return [
- $p[0]->multiply($this->beta),
- $p[1],
- clone $this->one
- ];
- }, $p['naf']);
- $beta['nafwidth'] = $p['nafwidth'];
- }
-
- if ($k1->isNegative()) {
- $k1 = $k1->negate();
- $p = $this->negatePoint($p);
- }
-
- if ($k2->isNegative()) {
- $k2 = $k2->negate();
- $beta = $this->negatePoint($beta);
- }
-
- $pos = 2 * $i;
- $npoints[$pos] = $p;
- $nscalars[$pos] = $this->factory->newInteger($k1);
-
- $pos++;
- $npoints[$pos] = $beta;
- $nscalars[$pos] = $this->factory->newInteger($k2);
- }
-
- return parent::multiplyAddPoints($npoints, $nscalars);
- }
-
- /**
- * Returns the numerator and denominator of the slope
- *
- * @return FiniteField[]
- */
- protected function doublePointHelper(array $p)
- {
- $numerator = $this->three->multiply($p[0])->multiply($p[0]);
- $denominator = $this->two->multiply($p[1]);
- return [$numerator, $denominator];
- }
-
- /**
- * Doubles a jacobian coordinate on the curve
- *
- * See http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-0.html#doubling-dbl-2009-l
- *
- * @return FiniteField[]
- */
- protected function jacobianDoublePoint(array $p)
- {
- list($x1, $y1, $z1) = $p;
- $a = $x1->multiply($x1);
- $b = $y1->multiply($y1);
- $c = $b->multiply($b);
- $d = $x1->add($b);
- $d = $d->multiply($d)->subtract($a)->subtract($c)->multiply($this->two);
- $e = $this->three->multiply($a);
- $f = $e->multiply($e);
- $x3 = $f->subtract($this->two->multiply($d));
- $y3 = $e->multiply($d->subtract($x3))->subtract(
- $this->eight->multiply($c));
- $z3 = $this->two->multiply($y1)->multiply($z1);
- return [$x3, $y3, $z3];
- }
-
- /**
- * Doubles a "fresh" jacobian coordinate on the curve
- *
- * See http://hyperelliptic.org/EFD/g1p/auto-shortw-jacobian-0.html#doubling-mdbl-2007-bl
- *
- * @return FiniteField[]
- */
- protected function jacobianDoublePointMixed(array $p)
- {
- list($x1, $y1) = $p;
- $xx = $x1->multiply($x1);
- $yy = $y1->multiply($y1);
- $yyyy = $yy->multiply($yy);
- $s = $x1->add($yy);
- $s = $s->multiply($s)->subtract($xx)->subtract($yyyy)->multiply($this->two);
- $m = $this->three->multiply($xx);
- $t = $m->multiply($m)->subtract($this->two->multiply($s));
- $x3 = $t;
- $y3 = $s->subtract($t);
- $y3 = $m->multiply($y3)->subtract($this->eight->multiply($yyyy));
- $z3 = $this->two->multiply($y1);
- return [$x3, $y3, $z3];
- }
-
- /**
- * Tests whether or not the x / y values satisfy the equation
- *
- * @return boolean
- */
- public function verifyPoint(array $p)
- {
- list($x, $y) = $p;
- $lhs = $y->multiply($y);
- $temp = $x->multiply($x)->multiply($x);
- $rhs = $temp->add($this->b);
-
- return $lhs->equals($rhs);
- }
-
- /**
- * Calculates the parameters needed from the Euclidean algorithm as discussed at
- * http://diamond.boisestate.edu/~liljanab/MATH308/GuideToECC.pdf#page=148
- *
- * @param BigInteger $u
- * @param BigInteger $v
- * @return BigInteger[]
- */
- protected static function extendedGCD(BigInteger $u, BigInteger $v)
- {
- $one = new BigInteger(1);
- $zero = new BigInteger();
-
- $a = clone $one;
- $b = clone $zero;
- $c = clone $zero;
- $d = clone $one;
-
- $stop = $v->bitwise_rightShift($v->getLength() >> 1);
-
- $a1 = clone $zero;
- $b1 = clone $zero;
- $a2 = clone $zero;
- $b2 = clone $zero;
-
- $postGreatestIndex = 0;
-
- while (!$v->equals($zero)) {
- list($q) = $u->divide($v);
-
- $temp = $u;
- $u = $v;
- $v = $temp->subtract($v->multiply($q));
-
- $temp = $a;
- $a = $c;
- $c = $temp->subtract($a->multiply($q));
-
- $temp = $b;
- $b = $d;
- $d = $temp->subtract($b->multiply($q));
-
- if ($v->compare($stop) > 0) {
- $a0 = $v;
- $b0 = $c;
- } else {
- $postGreatestIndex++;
- }
-
- if ($postGreatestIndex == 1) {
- $a1 = $v;
- $b1 = $c->negate();
- }
-
- if ($postGreatestIndex == 2) {
- $rhs = $a0->multiply($a0)->add($b0->multiply($b0));
- $lhs = $v->multiply($v)->add($b->multiply($b));
- if ($lhs->compare($rhs) <= 0) {
- $a2 = $a0;
- $b2 = $b0->negate();
- } else {
- $a2 = $v;
- $b2 = $c->negate();
- }
-
- break;
- }
- }
-
- return [
- ['a' => $a1, 'b' => $b1],
- ['a' => $a2, 'b' => $b2]
- ];
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Montgomery.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Montgomery.php
deleted file mode 100644
index b4bba650a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Montgomery.php
+++ /dev/null
@@ -1,285 +0,0 @@
-<?php
-
-/**
- * Curves over y^2 = x^3 + a*x + x
- *
- * Technically, a Montgomery curve has a coefficient for y^2 but for Curve25519 and Curve448 that
- * coefficient is 1.
- *
- * Curve25519 and Curve448 do not make use of the y coordinate, which makes it unsuitable for use
- * with ECDSA / EdDSA. A few other differences between Curve25519 and Ed25519 are discussed at
- * https://crypto.stackexchange.com/a/43058/4520
- *
- * More info:
- *
- * https://en.wikipedia.org/wiki/Montgomery_curve
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2019 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\BaseCurves;
-
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Math\PrimeField;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\EC\Curves\Curve25519;
-use phpseclib3\Math\PrimeField\Integer as PrimeInteger;
-
-/**
- * Curves over y^2 = x^3 + a*x + x
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Montgomery extends Base
-{
- /**
- * Prime Field Integer factory
- *
- * @var \phpseclib3\Math\PrimeField
- */
- protected $factory;
-
- /**
- * Cofficient for x
- *
- * @var object
- */
- protected $a;
-
- /**
- * Constant used for point doubling
- *
- * @var object
- */
- protected $a24;
-
- /**
- * The Number Zero
- *
- * @var object
- */
- protected $zero;
-
- /**
- * The Number One
- *
- * @var object
- */
- protected $one;
-
- /**
- * Base Point
- *
- * @var object
- */
- protected $p;
-
- /**
- * The modulo
- *
- * @var BigInteger
- */
- protected $modulo;
-
- /**
- * The Order
- *
- * @var BigInteger
- */
- protected $order;
-
- /**
- * Sets the modulo
- */
- public function setModulo(BigInteger $modulo)
- {
- $this->modulo = $modulo;
- $this->factory = new PrimeField($modulo);
- $this->zero = $this->factory->newInteger(new BigInteger());
- $this->one = $this->factory->newInteger(new BigInteger(1));
- }
-
- /**
- * Set coefficients a
- */
- public function setCoefficients(BigInteger $a)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- $this->a = $this->factory->newInteger($a);
- $two = $this->factory->newInteger(new BigInteger(2));
- $four = $this->factory->newInteger(new BigInteger(4));
- $this->a24 = $this->a->subtract($two)->divide($four);
- }
-
- /**
- * Set x and y coordinates for the base point
- *
- * @param BigInteger|PrimeInteger $x
- * @param BigInteger|PrimeInteger $y
- * @return PrimeInteger[]
- */
- public function setBasePoint($x, $y)
- {
- switch (true) {
- case !$x instanceof BigInteger && !$x instanceof PrimeInteger:
- throw new \UnexpectedValueException('Argument 1 passed to Prime::setBasePoint() must be an instance of either BigInteger or PrimeField\Integer');
- case !$y instanceof BigInteger && !$y instanceof PrimeInteger:
- throw new \UnexpectedValueException('Argument 2 passed to Prime::setBasePoint() must be an instance of either BigInteger or PrimeField\Integer');
- }
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- $this->p = [
- $x instanceof BigInteger ? $this->factory->newInteger($x) : $x,
- $y instanceof BigInteger ? $this->factory->newInteger($y) : $y
- ];
- }
-
- /**
- * Retrieve the base point as an array
- *
- * @return array
- */
- public function getBasePoint()
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- /*
- if (!isset($this->p)) {
- throw new \RuntimeException('setBasePoint needs to be called before this method');
- }
- */
- return $this->p;
- }
-
- /**
- * Doubles and adds a point on a curve
- *
- * See https://tools.ietf.org/html/draft-ietf-tls-curve25519-01#appendix-A.1.3
- *
- * @return FiniteField[][]
- */
- private function doubleAndAddPoint(array $p, array $q, PrimeInteger $x1)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p) || !count($q)) {
- return [];
- }
-
- if (!isset($p[1])) {
- throw new \RuntimeException('Affine coordinates need to be manually converted to XZ coordinates');
- }
-
- list($x2, $z2) = $p;
- list($x3, $z3) = $q;
-
- $a = $x2->add($z2);
- $aa = $a->multiply($a);
- $b = $x2->subtract($z2);
- $bb = $b->multiply($b);
- $e = $aa->subtract($bb);
- $c = $x3->add($z3);
- $d = $x3->subtract($z3);
- $da = $d->multiply($a);
- $cb = $c->multiply($b);
- $temp = $da->add($cb);
- $x5 = $temp->multiply($temp);
- $temp = $da->subtract($cb);
- $z5 = $x1->multiply($temp->multiply($temp));
- $x4 = $aa->multiply($bb);
- $temp = static::class == Curve25519::class ? $bb : $aa;
- $z4 = $e->multiply($temp->add($this->a24->multiply($e)));
-
- return [
- [$x4, $z4],
- [$x5, $z5]
- ];
- }
-
- /**
- * Multiply a point on the curve by a scalar
- *
- * Uses the montgomery ladder technique as described here:
- *
- * https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#Montgomery_ladder
- * https://github.com/phpecc/phpecc/issues/16#issuecomment-59176772
- *
- * @return array
- */
- public function multiplyPoint(array $p, Integer $d)
- {
- $p1 = [$this->one, $this->zero];
- $alreadyInternal = isset($x[1]);
- $p2 = $this->convertToInternal($p);
- $x = $p[0];
-
- $b = $d->toBits();
- $b = str_pad($b, 256, '0', STR_PAD_LEFT);
- for ($i = 0; $i < strlen($b); $i++) {
- $b_i = (int) $b[$i];
- if ($b_i) {
- list($p2, $p1) = $this->doubleAndAddPoint($p2, $p1, $x);
- } else {
- list($p1, $p2) = $this->doubleAndAddPoint($p1, $p2, $x);
- }
- }
-
- return $alreadyInternal ? $p1 : $this->convertToAffine($p1);
- }
-
- /**
- * Converts an affine point to an XZ coordinate
- *
- * From https://hyperelliptic.org/EFD/g1p/auto-montgom-xz.html
- *
- * XZ coordinates represent x y as X Z satsfying the following equations:
- *
- * x=X/Z
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToInternal(array $p)
- {
- if (empty($p)) {
- return [clone $this->zero, clone $this->one];
- }
-
- if (isset($p[1])) {
- return $p;
- }
-
- $p[1] = clone $this->one;
-
- return $p;
- }
-
- /**
- * Returns the affine point
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToAffine(array $p)
- {
- if (!isset($p[1])) {
- return $p;
- }
- list($x, $z) = $p;
- return [$x->divide($z)];
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Prime.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Prime.php
deleted file mode 100644
index 07606cfa7..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/Prime.php
+++ /dev/null
@@ -1,774 +0,0 @@
-<?php
-
-/**
- * Curves over y^2 = x^3 + a*x + b
- *
- * These are curves used in SEC 2 over prime fields: http://www.secg.org/SEC2-Ver-1.0.pdf
- * The curve is a weierstrass curve with a[1], a[3] and a[2] set to 0.
- *
- * Uses Jacobian Coordinates for speed if able:
- *
- * https://en.wikipedia.org/wiki/Jacobian_curve
- * https://en.wikibooks.org/wiki/Cryptography/Prime_Curve/Jacobian_Coordinates
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\BaseCurves;
-
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Math\PrimeField;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Math\PrimeField\Integer as PrimeInteger;
-
-/**
- * Curves over y^2 = x^3 + a*x + b
- *
- * @package Prime
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Prime extends Base
-{
- /**
- * Prime Field Integer factory
- *
- * @var \phpseclib3\Math\PrimeFields
- */
- protected $factory;
-
- /**
- * Cofficient for x^1
- *
- * @var object
- */
- protected $a;
-
- /**
- * Cofficient for x^0
- *
- * @var object
- */
- protected $b;
-
- /**
- * Base Point
- *
- * @var object
- */
- protected $p;
-
- /**
- * The number one over the specified finite field
- *
- * @var object
- */
- protected $one;
-
- /**
- * The number two over the specified finite field
- *
- * @var object
- */
- protected $two;
-
- /**
- * The number three over the specified finite field
- *
- * @var object
- */
- protected $three;
-
- /**
- * The number four over the specified finite field
- *
- * @var object
- */
- protected $four;
-
- /**
- * The number eight over the specified finite field
- *
- * @var object
- */
- protected $eight;
-
- /**
- * The modulo
- *
- * @var BigInteger
- */
- protected $modulo;
-
- /**
- * The Order
- *
- * @var BigInteger
- */
- protected $order;
-
- /**
- * Sets the modulo
- */
- public function setModulo(BigInteger $modulo)
- {
- $this->modulo = $modulo;
- $this->factory = new PrimeField($modulo);
- $this->two = $this->factory->newInteger(new BigInteger(2));
- $this->three = $this->factory->newInteger(new BigInteger(3));
- // used by jacobian coordinates
- $this->one = $this->factory->newInteger(new BigInteger(1));
- $this->four = $this->factory->newInteger(new BigInteger(4));
- $this->eight = $this->factory->newInteger(new BigInteger(8));
- }
-
- /**
- * Set coefficients a and b
- */
- public function setCoefficients(BigInteger $a, BigInteger $b)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- $this->a = $this->factory->newInteger($a);
- $this->b = $this->factory->newInteger($b);
- }
-
- /**
- * Set x and y coordinates for the base point
- *
- * @param BigInteger|PrimeInteger $x
- * @param BigInteger|PrimeInteger $y
- * @return PrimeInteger[]
- */
- public function setBasePoint($x, $y)
- {
- switch (true) {
- case !$x instanceof BigInteger && !$x instanceof PrimeInteger:
- throw new \UnexpectedValueException('Argument 1 passed to Prime::setBasePoint() must be an instance of either BigInteger or PrimeField\Integer');
- case !$y instanceof BigInteger && !$y instanceof PrimeInteger:
- throw new \UnexpectedValueException('Argument 2 passed to Prime::setBasePoint() must be an instance of either BigInteger or PrimeField\Integer');
- }
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- $this->p = [
- $x instanceof BigInteger ? $this->factory->newInteger($x) : $x,
- $y instanceof BigInteger ? $this->factory->newInteger($y) : $y
- ];
- }
-
- /**
- * Retrieve the base point as an array
- *
- * @return array
- */
- public function getBasePoint()
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- /*
- if (!isset($this->p)) {
- throw new \RuntimeException('setBasePoint needs to be called before this method');
- }
- */
- return $this->p;
- }
-
- /**
- * Adds two "fresh" jacobian form on the curve
- *
- * @return FiniteField[]
- */
- protected function jacobianAddPointMixedXY(array $p, array $q)
- {
- list($u1, $s1) = $p;
- list($u2, $s2) = $q;
- if ($u1->equals($u2)) {
- if (!$s1->equals($s2)) {
- return [];
- } else {
- return $this->doublePoint($p);
- }
- }
- $h = $u2->subtract($u1);
- $r = $s2->subtract($s1);
- $h2 = $h->multiply($h);
- $h3 = $h2->multiply($h);
- $v = $u1->multiply($h2);
- $x3 = $r->multiply($r)->subtract($h3)->subtract($v->multiply($this->two));
- $y3 = $r->multiply(
- $v->subtract($x3))->subtract(
- $s1->multiply($h3));
- return [$x3, $y3, $h];
- }
-
- /**
- * Adds one "fresh" jacobian form on the curve
- *
- * The second parameter should be the "fresh" one
- *
- * @return FiniteField[]
- */
- protected function jacobianAddPointMixedX(array $p, array $q)
- {
- list($u1, $s1, $z1) = $p;
- list($x2, $y2) = $q;
-
- $z12 = $z1->multiply($z1);
-
- $u2 = $x2->multiply($z12);
- $s2 = $y2->multiply($z12->multiply($z1));
- if ($u1->equals($u2)) {
- if (!$s1->equals($s2)) {
- return [];
- } else {
- return $this->doublePoint($p);
- }
- }
- $h = $u2->subtract($u1);
- $r = $s2->subtract($s1);
- $h2 = $h->multiply($h);
- $h3 = $h2->multiply($h);
- $v = $u1->multiply($h2);
- $x3 = $r->multiply($r)->subtract($h3)->subtract($v->multiply($this->two));
- $y3 = $r->multiply(
- $v->subtract($x3))->subtract(
- $s1->multiply($h3));
- $z3 = $h->multiply($z1);
- return [$x3, $y3, $z3];
- }
-
- /**
- * Adds two jacobian coordinates on the curve
- *
- * @return FiniteField[]
- */
- protected function jacobianAddPoint(array $p, array $q)
- {
- list($x1, $y1, $z1) = $p;
- list($x2, $y2, $z2) = $q;
-
- $z12 = $z1->multiply($z1);
- $z22 = $z2->multiply($z2);
-
- $u1 = $x1->multiply($z22);
- $u2 = $x2->multiply($z12);
- $s1 = $y1->multiply($z22->multiply($z2));
- $s2 = $y2->multiply($z12->multiply($z1));
- if ($u1->equals($u2)) {
- if (!$s1->equals($s2)) {
- return [];
- } else {
- return $this->doublePoint($p);
- }
- }
- $h = $u2->subtract($u1);
- $r = $s2->subtract($s1);
- $h2 = $h->multiply($h);
- $h3 = $h2->multiply($h);
- $v = $u1->multiply($h2);
- $x3 = $r->multiply($r)->subtract($h3)->subtract($v->multiply($this->two));
- $y3 = $r->multiply(
- $v->subtract($x3))->subtract(
- $s1->multiply($h3));
- $z3 = $h->multiply($z1)->multiply($z2);
- return [$x3, $y3, $z3];
- }
-
- /**
- * Adds two points on the curve
- *
- * @return FiniteField[]
- */
- public function addPoint(array $p, array $q)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p) || !count($q)) {
- if (count($q)) {
- return $q;
- }
- if (count($p)) {
- return $p;
- }
- return [];
- }
-
- // use jacobian coordinates
- if (isset($p[2]) && isset($q[2])) {
- if (isset($p['fresh']) && isset($q['fresh'])) {
- return $this->jacobianAddPointMixedXY($p, $q);
- }
- if (isset($p['fresh'])) {
- return $this->jacobianAddPointMixedX($q, $p);
- }
- if (isset($q['fresh'])) {
- return $this->jacobianAddPointMixedX($p, $q);
- }
- return $this->jacobianAddPoint($p, $q);
- }
-
- if (isset($p[2]) || isset($q[2])) {
- throw new \RuntimeException('Affine coordinates need to be manually converted to Jacobi coordinates or vice versa');
- }
-
- if ($p[0]->equals($q[0])) {
- if (!$p[1]->equals($q[1])) {
- return [];
- } else { // eg. doublePoint
- list($numerator, $denominator) = $this->doublePointHelper($p);
- }
- } else {
- $numerator = $q[1]->subtract($p[1]);
- $denominator = $q[0]->subtract($p[0]);
- }
- $slope = $numerator->divide($denominator);
- $x = $slope->multiply($slope)->subtract($p[0])->subtract($q[0]);
- $y = $slope->multiply($p[0]->subtract($x))->subtract($p[1]);
-
- return [$x, $y];
- }
-
- /**
- * Returns the numerator and denominator of the slope
- *
- * @return FiniteField[]
- */
- protected function doublePointHelper(array $p)
- {
- $numerator = $this->three->multiply($p[0])->multiply($p[0])->add($this->a);
- $denominator = $this->two->multiply($p[1]);
- return [$numerator, $denominator];
- }
-
- /**
- * Doubles a jacobian coordinate on the curve
- *
- * @return FiniteField[]
- */
- protected function jacobianDoublePoint(array $p)
- {
- list($x, $y, $z) = $p;
- $x2 = $x->multiply($x);
- $y2 = $y->multiply($y);
- $z2 = $z->multiply($z);
- $s = $this->four->multiply($x)->multiply($y2);
- $m1 = $this->three->multiply($x2);
- $m2 = $this->a->multiply($z2->multiply($z2));
- $m = $m1->add($m2);
- $x1 = $m->multiply($m)->subtract($this->two->multiply($s));
- $y1 = $m->multiply($s->subtract($x1))->subtract(
- $this->eight->multiply($y2->multiply($y2)));
- $z1 = $this->two->multiply($y)->multiply($z);
- return [$x1, $y1, $z1];
- }
-
- /**
- * Doubles a "fresh" jacobian coordinate on the curve
- *
- * @return FiniteField[]
- */
- protected function jacobianDoublePointMixed(array $p)
- {
- list($x, $y) = $p;
- $x2 = $x->multiply($x);
- $y2 = $y->multiply($y);
- $s = $this->four->multiply($x)->multiply($y2);
- $m1 = $this->three->multiply($x2);
- $m = $m1->add($this->a);
- $x1 = $m->multiply($m)->subtract($this->two->multiply($s));
- $y1 = $m->multiply($s->subtract($x1))->subtract(
- $this->eight->multiply($y2->multiply($y2)));
- $z1 = $this->two->multiply($y);
- return [$x1, $y1, $z1];
- }
-
- /**
- * Doubles a point on a curve
- *
- * @return FiniteField[]
- */
- public function doublePoint(array $p)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p)) {
- return [];
- }
-
- // use jacobian coordinates
- if (isset($p[2])) {
- if (isset($p['fresh'])) {
- return $this->jacobianDoublePointMixed($p);
- }
- return $this->jacobianDoublePoint($p);
- }
-
- list($numerator, $denominator) = $this->doublePointHelper($p);
-
- $slope = $numerator->divide($denominator);
-
- $x = $slope->multiply($slope)->subtract($p[0])->subtract($p[0]);
- $y = $slope->multiply($p[0]->subtract($x))->subtract($p[1]);
-
- return [$x, $y];
- }
-
- /**
- * Returns the X coordinate and the derived Y coordinate
- *
- * @return array
- */
- public function derivePoint($m)
- {
- $y = ord(Strings::shift($m));
- $x = new BigInteger($m, 256);
- $xp = $this->convertInteger($x);
- switch ($y) {
- case 2: $ypn = false; break;
- case 3: $ypn = true; break;
- default:
- throw new \RuntimeException('Coordinate not in recognized format');
- }
- $temp = $xp->multiply($this->a);
- $temp = $xp->multiply($xp)->multiply($xp)->add($temp);
- $temp = $temp->add($this->b);
- $b = $temp->squareRoot();
- if (!$b) {
- throw new \RuntimeException('Unable to derive Y coordinate');
- }
- $bn = $b->isOdd();
- $yp = $ypn == $bn ? $b : $b->negate();
- return [$xp, $yp];
- }
-
- /**
- * Tests whether or not the x / y values satisfy the equation
- *
- * @return boolean
- */
- public function verifyPoint(array $p)
- {
- list($x, $y) = $p;
- $lhs = $y->multiply($y);
- $temp = $x->multiply($this->a);
- $temp = $x->multiply($x)->multiply($x)->add($temp);
- $rhs = $temp->add($this->b);
-
- return $lhs->equals($rhs);
- }
-
- /**
- * Returns the modulo
- *
- * @return \phpseclib3\Math\BigInteger
- */
- public function getModulo()
- {
- return $this->modulo;
- }
-
- /**
- * Returns the a coefficient
- *
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function getA()
- {
- return $this->a;
- }
-
- /**
- * Returns the a coefficient
- *
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function getB()
- {
- return $this->b;
- }
-
- /**
- * Multiply and Add Points
- *
- * Adapted from https://git.io/vxPUH
- *
- * @return int[]
- */
- public function multiplyAddPoints(array $points, array $scalars)
- {
- $length = count($points);
-
- foreach ($points as &$point) {
- $point = $this->convertToInternal($point);
- }
-
- $wnd = [$this->getNAFPoints($points[0], 7)];
- $wndWidth = [isset($points[0]['nafwidth']) ? $points[0]['nafwidth'] : 7];
- for ($i = 1; $i < $length; $i++) {
- $wnd[] = $this->getNAFPoints($points[$i], 1);
- $wndWidth[] = isset($points[$i]['nafwidth']) ? $points[$i]['nafwidth'] : 1;
- }
-
- $naf = [];
-
- // comb all window NAFs
-
- $max = 0;
- for ($i = $length - 1; $i >= 1; $i-= 2) {
- $a = $i - 1;
- $b = $i;
- if ($wndWidth[$a] != 1 || $wndWidth[$b] != 1) {
- $naf[$a] = $scalars[$a]->getNAF($wndWidth[$a]);
- $naf[$b] = $scalars[$b]->getNAF($wndWidth[$b]);
- $max = max(count($naf[$a]), count($naf[$b]), $max);
- continue;
- }
-
- $comb = [
- $points[$a], // 1
- null, // 3
- null, // 5
- $points[$b] // 7
- ];
-
- $comb[1] = $this->addPoint($points[$a], $points[$b]);
- $comb[2] = $this->addPoint($points[$a], $this->negatePoint($points[$b]));
-
- $index = [
- -3, /* -1 -1 */
- -1, /* -1 0 */
- -5, /* -1 1 */
- -7, /* 0 -1 */
- 0, /* 0 -1 */
- 7, /* 0 1 */
- 5, /* 1 -1 */
- 1, /* 1 0 */
- 3 /* 1 1 */
- ];
-
- $jsf = self::getJSFPoints($scalars[$a], $scalars[$b]);
-
- $max = max(count($jsf[0]), $max);
- if ($max > 0) {
- $naf[$a] = array_fill(0, $max, 0);
- $naf[$b] = array_fill(0, $max, 0);
- } else {
- $naf[$a] = [];
- $naf[$b] = [];
- }
-
- for ($j = 0; $j < $max; $j++) {
- $ja = isset($jsf[0][$j]) ? $jsf[0][$j] : 0;
- $jb = isset($jsf[1][$j]) ? $jsf[1][$j] : 0;
-
- $naf[$a][$j] = $index[3 * ($ja + 1) + $jb + 1];
- $naf[$b][$j] = 0;
- $wnd[$a] = $comb;
- }
- }
-
- $acc = [];
- $temp = [0, 0, 0, 0];
- for ($i = $max; $i >= 0; $i--) {
- $k = 0;
- while ($i >= 0) {
- $zero = true;
- for ($j = 0; $j < $length; $j++) {
- $temp[$j] = isset($naf[$j][$i]) ? $naf[$j][$i] : 0;
- if ($temp[$j] != 0) {
- $zero = false;
- }
- }
- if (!$zero) {
- break;
- }
- $k++;
- $i--;
- }
-
- if ($i >= 0) {
- $k++;
- }
- while ($k--) {
- $acc = $this->doublePoint($acc);
- }
-
- if ($i < 0) {
- break;
- }
-
- for ($j = 0; $j < $length; $j++) {
- $z = $temp[$j];
- $p = null;
- if ($z == 0) {
- continue;
- }
- $p = $z > 0 ?
- $wnd[$j][($z - 1) >> 1] :
- $this->negatePoint($wnd[$j][(-$z - 1) >> 1]);
- $acc = $this->addPoint($acc, $p);
- }
- }
-
- return $this->convertToAffine($acc);
- }
-
- /**
- * Precomputes NAF points
- *
- * Adapted from https://git.io/vxY1f
- *
- * @return int[]
- */
- private function getNAFPoints($point, $wnd)
- {
- if (isset($point['naf'])) {
- return $point['naf'];
- }
-
- $res = [$point];
- $max = (1 << $wnd) - 1;
- $dbl = $max == 1 ? null : $this->doublePoint($point);
- for ($i = 1; $i < $max; $i++) {
- $res[] = $this->addPoint($res[$i - 1], $dbl);
- }
-
- $point['naf'] = $res;
-
- /*
- $str = '';
- foreach ($res as $re) {
- $re[0] = bin2hex($re[0]->toBytes());
- $re[1] = bin2hex($re[1]->toBytes());
- $str.= " ['$re[0]', '$re[1]'],\r\n";
- }
- file_put_contents('temp.txt', $str);
- exit;
- */
-
- return $res;
- }
-
- /**
- * Precomputes points in Joint Sparse Form
- *
- * Adapted from https://git.io/vxrpD
- *
- * @return int[]
- */
- private static function getJSFPoints(Integer $k1, Integer $k2)
- {
- static $three;
- if (!isset($three)) {
- $three = new BigInteger(3);
- }
-
- $jsf = [[], []];
- $k1 = $k1->toBigInteger();
- $k2 = $k2->toBigInteger();
- $d1 = 0;
- $d2 = 0;
-
- while ($k1->compare(new BigInteger(-$d1)) > 0 || $k2->compare(new BigInteger(-$d2)) > 0) {
- // first phase
- $m14 = $k1->testBit(0) + 2 * $k1->testBit(1);
- $m14+= $d1;
- $m14&= 3;
-
- $m24 = $k2->testBit(0) + 2 * $k2->testBit(1);
- $m24+= $d2;
- $m24&= 3;
-
- if ($m14 == 3) {
- $m14 = -1;
- }
- if ($m24 == 3) {
- $m24 = -1;
- }
-
- $u1 = 0;
- if ($m14 & 1) { // if $m14 is odd
- $m8 = $k1->testBit(0) + 2 * $k1->testBit(1) + 4 * $k1->testBit(2);
- $m8+= $d1;
- $m8&= 7;
- $u1 = ($m8 == 3 || $m8 == 5) && $m24 == 2 ? -$m14 : $m14;
- }
- $jsf[0][] = $u1;
-
- $u2 = 0;
- if ($m24 & 1) { // if $m24 is odd
- $m8 = $k2->testBit(0) + 2 * $k2->testBit(1) + 4 * $k2->testBit(2);
- $m8+= $d2;
- $m8&= 7;
- $u2 = ($m8 == 3 || $m8 == 5) && $m14 == 2 ? -$m24 : $m24;
- }
- $jsf[1][] = $u2;
-
- // second phase
- if (2 * $d1 == $u1 + 1) {
- $d1 = 1 - $d1;
- }
- if (2 * $d2 == $u2 + 1) {
- $d2 = 1 - $d2;
- }
- $k1 = $k1->bitwise_rightShift(1);
- $k2 = $k2->bitwise_rightShift(1);
- }
-
- return $jsf;
- }
-
- /**
- * Returns the affine point
- *
- * A Jacobian Coordinate is of the form (x, y, z).
- * To convert a Jacobian Coordinate to an Affine Point
- * you do (x / z^2, y / z^3)
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToAffine(array $p)
- {
- if (!isset($p[2])) {
- return $p;
- }
- list($x, $y, $z) = $p;
- $z = $this->one->divide($z);
- $z2 = $z->multiply($z);
- return [
- $x->multiply($z2),
- $y->multiply($z2)->multiply($z)
- ];
- }
-
- /**
- * Converts an affine point to a jacobian coordinate
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToInternal(array $p)
- {
- if (isset($p[2])) {
- return $p;
- }
-
- $p[2] = clone $this->one;
- $p['fresh'] = true;
- return $p;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/TwistedEdwards.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/TwistedEdwards.php
deleted file mode 100644
index ff4ff2d4f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/BaseCurves/TwistedEdwards.php
+++ /dev/null
@@ -1,219 +0,0 @@
-<?php
-
-/**
- * Curves over a*x^2 + y^2 = 1 + d*x^2*y^2
- *
- * http://www.secg.org/SEC2-Ver-1.0.pdf provides for curves with custom parameters.
- * ie. the coefficients can be arbitrary set through specially formatted keys, etc.
- * As such, Prime.php is built very generically and it's not able to take full
- * advantage of curves with 0 coefficients to produce simplified point doubling,
- * point addition. Twisted Edwards curves, in contrast, do not have a way, currently,
- * to customize them. As such, we can omit the super generic stuff from this class
- * and let the named curves (Ed25519 and Ed448) define their own custom tailored
- * point addition and point doubling methods.
- *
- * More info:
- *
- * https://en.wikipedia.org/wiki/Twisted_Edwards_curve
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\BaseCurves;
-
-use phpseclib3\Math\PrimeField;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Math\PrimeField\Integer as PrimeInteger;
-
-/**
- * Curves over a*x^2 + y^2 = 1 + d*x^2*y^2
- *
- * @package Prime
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class TwistedEdwards extends Base
-{
- /**
- * The modulo
- *
- * @var BigInteger
- */
- protected $modulo;
-
- /**
- * Cofficient for x^2
- *
- * @var object
- */
- protected $a;
-
- /**
- * Cofficient for x^2*y^2
- *
- * @var object
- */
- protected $d;
-
- /**
- * Base Point
- *
- * @var object[]
- */
- protected $p;
-
- /**
- * The number zero over the specified finite field
- *
- * @var object
- */
- protected $zero;
-
- /**
- * The number one over the specified finite field
- *
- * @var object
- */
- protected $one;
-
- /**
- * The number two over the specified finite field
- *
- * @var object
- */
- protected $two;
-
- /**
- * Sets the modulo
- */
- public function setModulo(BigInteger $modulo)
- {
- $this->modulo = $modulo;
- $this->factory = new PrimeField($modulo);
- $this->zero = $this->factory->newInteger(new BigInteger(0));
- $this->one = $this->factory->newInteger(new BigInteger(1));
- $this->two = $this->factory->newInteger(new BigInteger(2));
- }
-
- /**
- * Set coefficients a and b
- */
- public function setCoefficients(BigInteger $a, BigInteger $d)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- $this->a = $this->factory->newInteger($a);
- $this->d = $this->factory->newInteger($d);
- }
-
- /**
- * Set x and y coordinates for the base point
- */
- public function setBasePoint($x, $y)
- {
- switch (true) {
- case !$x instanceof BigInteger && !$x instanceof PrimeInteger:
- throw new \UnexpectedValueException('Argument 1 passed to Prime::setBasePoint() must be an instance of either BigInteger or PrimeField\Integer');
- case !$y instanceof BigInteger && !$y instanceof PrimeInteger:
- throw new \UnexpectedValueException('Argument 2 passed to Prime::setBasePoint() must be an instance of either BigInteger or PrimeField\Integer');
- }
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- $this->p = [
- $x instanceof BigInteger ? $this->factory->newInteger($x) : $x,
- $y instanceof BigInteger ? $this->factory->newInteger($y) : $y
- ];
- }
-
- /**
- * Returns the a coefficient
- *
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function getA()
- {
- return $this->a;
- }
-
- /**
- * Returns the a coefficient
- *
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function getD()
- {
- return $this->d;
- }
-
- /**
- * Retrieve the base point as an array
- *
- * @return array
- */
- public function getBasePoint()
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
- /*
- if (!isset($this->p)) {
- throw new \RuntimeException('setBasePoint needs to be called before this method');
- }
- */
- return $this->p;
- }
-
- /**
- * Returns the affine point
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToAffine(array $p)
- {
- if (!isset($p[2])) {
- return $p;
- }
- list($x, $y, $z) = $p;
- $z = $this->one->divide($z);
- return [
- $x->multiply($z),
- $y->multiply($z)
- ];
- }
-
- /**
- * Returns the modulo
- *
- * @return \phpseclib3\Math\BigInteger
- */
- public function getModulo()
- {
- return $this->modulo;
- }
-
- /**
- * Tests whether or not the x / y values satisfy the equation
- *
- * @return boolean
- */
- public function verifyPoint(array $p)
- {
- list($x, $y) = $p;
- $x2 = $x->multiply($x);
- $y2 = $y->multiply($y);
-
- $lhs = $this->a->multiply($x2)->add($y2);
- $rhs = $this->d->multiply($x2)->multiply($y2)->add($this->one);
-
- return $lhs->equals($rhs);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve25519.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve25519.php
deleted file mode 100644
index 06842d8cd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve25519.php
+++ /dev/null
@@ -1,64 +0,0 @@
-<?php
-
-/**
- * Curve25519
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2019 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery;
-use phpseclib3\Math\BigInteger;
-
-class Curve25519 extends Montgomery
-{
- public function __construct()
- {
- // 2^255 - 19
- $this->setModulo(new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFED', 16));
- $this->a24 = $this->factory->newInteger(new BigInteger('121666'));
- $this->p = [$this->factory->newInteger(new BigInteger(9))];
- // 2^252 + 0x14def9dea2f79cd65812631a5cf5d3ed
- $this->setOrder(new BigInteger('1000000000000000000000000000000014DEF9DEA2F79CD65812631A5CF5D3ED', 16));
-
- /*
- $this->setCoefficients(
- new BigInteger('486662'), // a
- );
- $this->setBasePoint(
- new BigInteger(9),
- new BigInteger('14781619447589544791020593568409986887264606134616475288964881837755586237401')
- );
- */
- }
-
- /**
- * Multiply a point on the curve by a scalar
- *
- * Modifies the scalar as described at https://tools.ietf.org/html/rfc7748#page-8
- *
- * @return array
- */
- public function multiplyPoint(array $p, Integer $d)
- {
- //$r = strrev(sodium_crypto_scalarmult($d->toBytes(), strrev($p[0]->toBytes())));
- //return [$this->factory->newInteger(new BigInteger($r, 256))];
-
- $d = $d->toBytes();
- $d&= "\xF8" . str_repeat("\xFF", 30) . "\x7F";
- $d = strrev($d);
- $d|= "\x40";
- $d = $this->factory->newInteger(new BigInteger($d, -256));
-
- return parent::multiplyPoint($p, $d);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve448.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve448.php
deleted file mode 100644
index 7dcf70847..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Curve448.php
+++ /dev/null
@@ -1,71 +0,0 @@
-<?php
-
-/**
- * Curve448
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2019 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery;
-use phpseclib3\Math\BigInteger;
-
-class Curve448 extends Montgomery
-{
- public function __construct()
- {
- // 2^448 - 2^224 - 1
- $this->setModulo(new BigInteger(
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE' .
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF', 16));
- $this->a24 = $this->factory->newInteger(new BigInteger('39081'));
- $this->p = [$this->factory->newInteger(new BigInteger(5))];
- // 2^446 - 0x8335dc163bb124b65129c96fde933d8d723a70aadc873d6d54a7bb0d
- $this->setOrder(new BigInteger(
- '3FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF' .
- '7CCA23E9C44EDB49AED63690216CC2728DC58F552378C292AB5844F3', 16));
-
- /*
- $this->setCoefficients(
- new BigInteger('156326'), // a
- );
- $this->setBasePoint(
- new BigInteger(5),
- new BigInteger(
- '355293926785568175264127502063783334808976399387714271831880898' .
- '435169088786967410002932673765864550910142774147268105838985595290' .
- '606362')
- );
- */
- }
-
- /**
- * Multiply a point on the curve by a scalar
- *
- * Modifies the scalar as described at https://tools.ietf.org/html/rfc7748#page-8
- *
- * @return array
- */
- public function multiplyPoint(array $p, Integer $d)
- {
- //$r = strrev(sodium_crypto_scalarmult($d->toBytes(), strrev($p[0]->toBytes())));
- //return [$this->factory->newInteger(new BigInteger($r, 256))];
-
- $d = $d->toBytes();
- $d[0] = $d[0] & "\xFC";
- $d = strrev($d);
- $d|= "\x80";
- $d = $this->factory->newInteger(new BigInteger($d, 256));
-
- return parent::multiplyPoint($p, $d);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed25519.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed25519.php
deleted file mode 100644
index d4c3e37a1..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed25519.php
+++ /dev/null
@@ -1,334 +0,0 @@
-<?php
-
-/**
- * Ed25519
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Crypt\Random;
-
-class Ed25519 extends TwistedEdwards
-{
- const HASH = 'sha512';
- /*
- Per https://tools.ietf.org/html/rfc8032#page-6 EdDSA has several parameters, one of which is b:
-
- 2. An integer b with 2^(b-1) > p. EdDSA public keys have exactly b
- bits, and EdDSA signatures have exactly 2*b bits. b is
- recommended to be a multiple of 8, so public key and signature
- lengths are an integral number of octets.
-
- SIZE corresponds to b
- */
- const SIZE = 32;
-
- public function __construct()
- {
- // 2^255 - 19
- $this->setModulo(new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFED', 16));
- $this->setCoefficients(
- // -1
- new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEC', 16), // a
- // -121665/121666
- new BigInteger('52036CEE2B6FFE738CC740797779E89800700A4D4141D8AB75EB4DCA135978A3', 16) // d
- );
- $this->setBasePoint(
- new BigInteger('216936D3CD6E53FEC0A4E231FDD6DC5C692CC7609525A7B2C9562D608F25D51A', 16),
- new BigInteger('6666666666666666666666666666666666666666666666666666666666666658', 16)
- );
- $this->setOrder(new BigInteger('1000000000000000000000000000000014DEF9DEA2F79CD65812631A5CF5D3ED', 16));
- // algorithm 14.47 from http://cacr.uwaterloo.ca/hac/about/chap14.pdf#page=16
- /*
- $this->setReduction(function($x) {
- $parts = $x->bitwise_split(255);
- $className = $this->className;
-
- if (count($parts) > 2) {
- list(, $r) = $x->divide($className::$modulo);
- return $r;
- }
-
- $zero = new BigInteger();
- $c = new BigInteger(19);
-
- switch (count($parts)) {
- case 2:
- list($qi, $ri) = $parts;
- break;
- case 1:
- $qi = $zero;
- list($ri) = $parts;
- break;
- case 0:
- return $zero;
- }
- $r = $ri;
-
- while ($qi->compare($zero) > 0) {
- $temp = $qi->multiply($c)->bitwise_split(255);
- if (count($temp) == 2) {
- list($qi, $ri) = $temp;
- } else {
- $qi = $zero;
- list($ri) = $temp;
- }
- $r = $r->add($ri);
- }
-
- while ($r->compare($className::$modulo) > 0) {
- $r = $r->subtract($className::$modulo);
- }
- return $r;
- });
- */
- }
-
- /**
- * Recover X from Y
- *
- * Implements steps 2-4 at https://tools.ietf.org/html/rfc8032#section-5.1.3
- *
- * Used by EC\Keys\Common.php
- *
- * @param BigInteger $y
- * @param boolean $sign
- * @return object[]
- */
- public function recoverX(BigInteger $y, $sign)
- {
- $y = $this->factory->newInteger($y);
-
- $y2 = $y->multiply($y);
- $u = $y2->subtract($this->one);
- $v = $this->d->multiply($y2)->add($this->one);
- $x2 = $u->divide($v);
- if ($x2->equals($this->zero)) {
- if ($sign) {
- throw new \RuntimeException('Unable to recover X coordinate (x2 = 0)');
- }
- return clone $this->zero;
- }
- // find the square root
- /* we don't do $x2->squareRoot() because, quoting from
- https://tools.ietf.org/html/rfc8032#section-5.1.1:
-
- "For point decoding or "decompression", square roots modulo p are
- needed. They can be computed using the Tonelli-Shanks algorithm or
- the special case for p = 5 (mod 8). To find a square root of a,
- first compute the candidate root x = a^((p+3)/8) (mod p)."
- */
- $exp = $this->getModulo()->add(new BigInteger(3));
- $exp = $exp->bitwise_rightShift(3);
- $x = $x2->pow($exp);
-
- // If v x^2 = -u (mod p), set x <-- x * 2^((p-1)/4), which is a square root.
- if (!$x->multiply($x)->subtract($x2)->equals($this->zero)) {
- $temp = $this->getModulo()->subtract(new BigInteger(1));
- $temp = $temp->bitwise_rightShift(2);
- $temp = $this->two->pow($temp);
- $x = $x->multiply($temp);
- if (!$x->multiply($x)->subtract($x2)->equals($this->zero)) {
- throw new \RuntimeException('Unable to recover X coordinate');
- }
- }
- if ($x->isOdd() != $sign) {
- $x = $x->negate();
- }
-
- return [$x, $y];
- }
-
- /**
- * Extract Secret Scalar
- *
- * Implements steps 1-3 at https://tools.ietf.org/html/rfc8032#section-5.1.5
- *
- * Used by the various key handlers
- *
- * @param string $str
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function extractSecret($str)
- {
- if (strlen($str) != 32) {
- throw new \LengthException('Private Key should be 32-bytes long');
- }
- // 1. Hash the 32-byte private key using SHA-512, storing the digest in
- // a 64-octet large buffer, denoted h. Only the lower 32 bytes are
- // used for generating the public key.
- $hash = new Hash('sha512');
- $h = $hash->hash($str);
- $h = substr($h, 0, 32);
- // 2. Prune the buffer: The lowest three bits of the first octet are
- // cleared, the highest bit of the last octet is cleared, and the
- // second highest bit of the last octet is set.
- $h[0] = $h[0] & chr(0xF8);
- $h = strrev($h);
- $h[0] = ($h[0] & chr(0x3F)) | chr(0x40);
- // 3. Interpret the buffer as the little-endian integer, forming a
- // secret scalar s.
- $dA = new BigInteger($h, 256);
- $dA = $this->factory->newInteger($dA);
-
- $dA->secret = $str;
- return $dA;
- }
-
- /**
- * Encode a point as a string
- *
- * @param array $point
- * @return string
- */
- public function encodePoint($point)
- {
- list($x, $y) = $point;
- $y = $y->toBytes();
- $y[0] = $y[0] & chr(0x7F);
- if ($x->isOdd()) {
- $y[0] = $y[0] | chr(0x80);
- }
- $y = strrev($y);
-
- return $y;
- }
-
- /**
- * Creates a random scalar multiplier
- *
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function createRandomMultiplier()
- {
- return $this->extractSecret(Random::string(32));
- }
-
- /**
- * Converts an affine point to an extended homogeneous coordinate
- *
- * From https://tools.ietf.org/html/rfc8032#section-5.1.4 :
- *
- * A point (x,y) is represented in extended homogeneous coordinates (X, Y, Z, T),
- * with x = X/Z, y = Y/Z, x * y = T/Z.
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToInternal(array $p)
- {
- if (empty($p)) {
- return [clone $this->zero, clone $this->one, clone $this->one, clone $this->zero];
- }
-
- if (isset($p[2])) {
- return $p;
- }
-
- $p[2] = clone $this->one;
- $p[3] = $p[0]->multiply($p[1]);
-
- return $p;
- }
-
- /**
- * Doubles a point on a curve
- *
- * @return FiniteField[]
- */
- public function doublePoint(array $p)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p)) {
- return [];
- }
-
- if (!isset($p[2])) {
- throw new \RuntimeException('Affine coordinates need to be manually converted to "Jacobi" coordinates or vice versa');
- }
-
- // from https://tools.ietf.org/html/rfc8032#page-12
-
- list($x1, $y1, $z1, $t1) = $p;
-
- $a = $x1->multiply($x1);
- $b = $y1->multiply($y1);
- $c = $this->two->multiply($z1)->multiply($z1);
- $h = $a->add($b);
- $temp = $x1->add($y1);
- $e = $h->subtract($temp->multiply($temp));
- $g = $a->subtract($b);
- $f = $c->add($g);
-
- $x3 = $e->multiply($f);
- $y3 = $g->multiply($h);
- $t3 = $e->multiply($h);
- $z3 = $f->multiply($g);
-
- return [$x3, $y3, $z3, $t3];
- }
-
- /**
- * Adds two points on the curve
- *
- * @return FiniteField[]
- */
- public function addPoint(array $p, array $q)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p) || !count($q)) {
- if (count($q)) {
- return $q;
- }
- if (count($p)) {
- return $p;
- }
- return [];
- }
-
- if (!isset($p[2]) || !isset($q[2])) {
- throw new \RuntimeException('Affine coordinates need to be manually converted to "Jacobi" coordinates or vice versa');
- }
-
- if ($p[0]->equals($q[0])) {
- return !$p[1]->equals($q[1]) ? [] : $this->doublePoint($p);
- }
-
- // from https://tools.ietf.org/html/rfc8032#page-12
-
- list($x1, $y1, $z1, $t1) = $p;
- list($x2, $y2, $z2, $t2) = $q;
-
- $a = $y1->subtract($x1)->multiply($y2->subtract($x2));
- $b = $y1->add($x1)->multiply($y2->add($x2));
- $c = $t1->multiply($this->two)->multiply($this->d)->multiply($t2);
- $d = $z1->multiply($this->two)->multiply($z2);
- $e = $b->subtract($a);
- $f = $d->subtract($c);
- $g = $d->add($c);
- $h = $b->add($a);
-
- $x3 = $e->multiply($f);
- $y3 = $g->multiply($h);
- $t3 = $e->multiply($h);
- $z3 = $f->multiply($g);
-
- return [$x3, $y3, $z3, $t3];
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed448.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed448.php
deleted file mode 100644
index 80ed33a8b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/Ed448.php
+++ /dev/null
@@ -1,267 +0,0 @@
-<?php
-
-/**
- * Ed448
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Crypt\Random;
-
-class Ed448 extends TwistedEdwards
-{
- const HASH = 'shake256-912';
- const SIZE = 57;
-
- public function __construct()
- {
- // 2^448 - 2^224 - 1
- $this->setModulo(new BigInteger(
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE' .
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger(1),
- // -39081
- new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE' .
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF6756', 16)
- );
- $this->setBasePoint(
- new BigInteger('4F1970C66BED0DED221D15A622BF36DA9E146570470F1767EA6DE324' .
- 'A3D3A46412AE1AF72AB66511433B80E18B00938E2626A82BC70CC05E', 16),
- new BigInteger('693F46716EB6BC248876203756C9C7624BEA73736CA3984087789C1E' .
- '05A0C2D73AD3FF1CE67C39C4FDBD132C4ED7C8AD9808795BF230FA14', 16)
- );
- $this->setOrder(new BigInteger(
- '3FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF' .
- '7CCA23E9C44EDB49AED63690216CC2728DC58F552378C292AB5844F3', 16));
- }
-
- /**
- * Recover X from Y
- *
- * Implements steps 2-4 at https://tools.ietf.org/html/rfc8032#section-5.2.3
- *
- * Used by EC\Keys\Common.php
- *
- * @param BigInteger $y
- * @param boolean $sign
- * @return object[]
- */
- public function recoverX(BigInteger $y, $sign)
- {
- $y = $this->factory->newInteger($y);
-
- $y2 = $y->multiply($y);
- $u = $y2->subtract($this->one);
- $v = $this->d->multiply($y2)->subtract($this->one);
- $x2 = $u->divide($v);
- if ($x2->equals($this->zero)) {
- if ($sign) {
- throw new \RuntimeException('Unable to recover X coordinate (x2 = 0)');
- }
- return clone $this->zero;
- }
- // find the square root
- $exp = $this->getModulo()->add(new BigInteger(1));
- $exp = $exp->bitwise_rightShift(2);
- $x = $x2->pow($exp);
-
- if (!$x->multiply($x)->subtract($x2)->equals($this->zero)) {
- throw new \RuntimeException('Unable to recover X coordinate');
- }
- if ($x->isOdd() != $sign) {
- $x = $x->negate();
- }
-
- return [$x, $y];
- }
-
- /**
- * Extract Secret Scalar
- *
- * Implements steps 1-3 at https://tools.ietf.org/html/rfc8032#section-5.2.5
- *
- * Used by the various key handlers
- *
- * @param string $str
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function extractSecret($str)
- {
- if (strlen($str) != 57) {
- throw new \LengthException('Private Key should be 57-bytes long');
- }
- // 1. Hash the 57-byte private key using SHAKE256(x, 114), storing the
- // digest in a 114-octet large buffer, denoted h. Only the lower 57
- // bytes are used for generating the public key.
- $hash = new Hash('shake256-912');
- $h = $hash->hash($str);
- $h = substr($h, 0, 57);
- // 2. Prune the buffer: The two least significant bits of the first
- // octet are cleared, all eight bits the last octet are cleared, and
- // the highest bit of the second to last octet is set.
- $h[0] = $h[0] & chr(0xFC);
- $h = strrev($h);
- $h[0] = "\0";
- $h[1] = $h[1] | chr(0x80);
- // 3. Interpret the buffer as the little-endian integer, forming a
- // secret scalar s.
- $dA = new BigInteger($h, 256);
- $dA = $this->factory->newInteger($dA);
-
- $dA->secret = $str;
- return $dA;
- }
-
- /**
- * Encode a point as a string
- *
- * @param array $point
- * @return string
- */
- public function encodePoint($point)
- {
- list($x, $y) = $point;
- $y = "\0" . $y->toBytes();
- if ($x->isOdd()) {
- $y[0] = $y[0] | chr(0x80);
- }
- $y = strrev($y);
-
- return $y;
- }
-
- /**
- * Creates a random scalar multiplier
- *
- * @return \phpseclib3\Math\PrimeField\Integer
- */
- public function createRandomMultiplier()
- {
- return $this->extractSecret(Random::string(57));
- }
-
- /**
- * Converts an affine point to an extended homogeneous coordinate
- *
- * From https://tools.ietf.org/html/rfc8032#section-5.2.4 :
- *
- * A point (x,y) is represented in extended homogeneous coordinates (X, Y, Z, T),
- * with x = X/Z, y = Y/Z, x * y = T/Z.
- *
- * @return \phpseclib3\Math\PrimeField\Integer[]
- */
- public function convertToInternal(array $p)
- {
- if (empty($p)) {
- return [clone $this->zero, clone $this->one, clone $this->one];
- }
-
- if (isset($p[2])) {
- return $p;
- }
-
- $p[2] = clone $this->one;
-
- return $p;
- }
-
- /**
- * Doubles a point on a curve
- *
- * @return FiniteField[]
- */
- public function doublePoint(array $p)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p)) {
- return [];
- }
-
- if (!isset($p[2])) {
- throw new \RuntimeException('Affine coordinates need to be manually converted to "Jacobi" coordinates or vice versa');
- }
-
- // from https://tools.ietf.org/html/rfc8032#page-18
-
- list($x1, $y1, $z1) = $p;
-
- $b = $x1->add($y1);
- $b = $b->multiply($b);
- $c = $x1->multiply($x1);
- $d = $y1->multiply($y1);
- $e = $c->add($d);
- $h = $z1->multiply($z1);
- $j = $e->subtract($this->two->multiply($h));
-
- $x3 = $b->subtract($e)->multiply($j);
- $y3 = $c->subtract($d)->multiply($e);
- $z3 = $e->multiply($j);
-
- return [$x3, $y3, $z3];
- }
-
- /**
- * Adds two points on the curve
- *
- * @return FiniteField[]
- */
- public function addPoint(array $p, array $q)
- {
- if (!isset($this->factory)) {
- throw new \RuntimeException('setModulo needs to be called before this method');
- }
-
- if (!count($p) || !count($q)) {
- if (count($q)) {
- return $q;
- }
- if (count($p)) {
- return $p;
- }
- return [];
- }
-
- if (!isset($p[2]) || !isset($q[2])) {
- throw new \RuntimeException('Affine coordinates need to be manually converted to "Jacobi" coordinates or vice versa');
- }
-
- if ($p[0]->equals($q[0])) {
- return !$p[1]->equals($q[1]) ? [] : $this->doublePoint($p);
- }
-
- // from https://tools.ietf.org/html/rfc8032#page-17
-
- list($x1, $y1, $z1) = $p;
- list($x2, $y2, $z2) = $q;
-
- $a = $z1->multiply($z2);
- $b = $a->multiply($a);
- $c = $x1->multiply($x2);
- $d = $y1->multiply($y2);
- $e = $this->d->multiply($c)->multiply($d);
- $f = $b->subtract($e);
- $g = $b->add($e);
- $h = $x1->add($y1)->multiply($x2->add($y2));
-
- $x3 = $a->multiply($f)->multiply($h->subtract($c)->subtract($d));
- $y3 = $a->multiply($g)->multiply($d->subtract($c));
- $z3 = $f->multiply($g);
-
- return [$x3, $y3, $z3];
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160r1.php
deleted file mode 100644
index 23a4e6d27..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * brainpoolP160r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP160r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('E95E4A5F737059DC60DFC7AD95B3D8139515620F', 16));
- $this->setCoefficients(
- new BigInteger('340E7BE2A280EB74E2BE61BADA745D97E8F7C300', 16),
- new BigInteger('1E589A8595423412134FAA2DBDEC95C8D8675E58', 16)
- );
- $this->setBasePoint(
- new BigInteger('BED5AF16EA3F6A4F62938C4631EB5AF7BDBCDBC3', 16),
- new BigInteger('1667CB477A1A8EC338F94741669C976316DA6321', 16)
- );
- $this->setOrder(new BigInteger('E95E4A5F737059DC60DF5991D45029409E60FC09', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160t1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160t1.php
deleted file mode 100644
index beafc34ba..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP160t1.php
+++ /dev/null
@@ -1,49 +0,0 @@
-<?php
-
-/**
- * brainpoolP160t1
- *
- * This curve is a twisted version of brainpoolP160r1 with A = -3. With brainpool,
- * the curves ending in r1 are the "regular" curves and the curves ending in "t1"
- * are the twisted version of the r1 curves. Per https://tools.ietf.org/html/rfc5639#page-7
- * you can convert a point on an r1 curve to a point on a t1 curve thusly:
- *
- * F(x,y) := (x*Z^2, y*Z^3)
- *
- * The advantage of A = -3 is that some of the point doubling and point addition can be
- * slightly optimized. See http://hyperelliptic.org/EFD/g1p/auto-shortw-projective-3.html
- * vs http://hyperelliptic.org/EFD/g1p/auto-shortw-projective.html for example.
- *
- * phpseclib does not currently take advantage of this optimization opportunity
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP160t1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('E95E4A5F737059DC60DFC7AD95B3D8139515620F', 16));
- $this->setCoefficients(
- new BigInteger('E95E4A5F737059DC60DFC7AD95B3D8139515620C', 16), // eg. -3
- new BigInteger('7A556B6DAE535B7B51ED2C4D7DAA7A0B5C55F380', 16)
- );
- $this->setBasePoint(
- new BigInteger('B199B13B9B34EFC1397E64BAEB05ACC265FF2378', 16),
- new BigInteger('ADD6718B7C7C1961F0991B842443772152C9E0AD', 16)
- );
- $this->setOrder(new BigInteger('E95E4A5F737059DC60DF5991D45029409E60FC09', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192r1.php
deleted file mode 100644
index 11afdadb0..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * brainpoolP192r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP192r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86297', 16));
- $this->setCoefficients(
- new BigInteger('6A91174076B1E0E19C39C031FE8685C1CAE040E5C69A28EF', 16),
- new BigInteger('469A28EF7C28CCA3DC721D044F4496BCCA7EF4146FBF25C9', 16)
- );
- $this->setBasePoint(
- new BigInteger('C0A0647EAAB6A48753B033C56CB0F0900A2F5C4853375FD6', 16),
- new BigInteger('14B690866ABD5BB88B5F4828C1490002E6773FA2FA299B8F', 16)
- );
- $this->setOrder(new BigInteger('C302F41D932A36CDA7A3462F9E9E916B5BE8F1029AC4ACC1', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192t1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192t1.php
deleted file mode 100644
index 71f956f29..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP192t1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * brainpoolP192t1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP192t1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86297', 16));
- $this->setCoefficients(
- new BigInteger('C302F41D932A36CDA7A3463093D18DB78FCE476DE1A86294', 16), // eg. -3
- new BigInteger('13D56FFAEC78681E68F9DEB43B35BEC2FB68542E27897B79', 16)
- );
- $this->setBasePoint(
- new BigInteger('3AE9E58C82F63C30282E1FE7BBF43FA72C446AF6F4618129', 16),
- new BigInteger('097E2C5667C2223A902AB5CA449D0084B7E5B3DE7CCC01C9', 16)
- );
- $this->setOrder(new BigInteger('C302F41D932A36CDA7A3462F9E9E916B5BE8F1029AC4ACC1', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224r1.php
deleted file mode 100644
index 83e49b026..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * brainpoolP224r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP224r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FF', 16));
- $this->setCoefficients(
- new BigInteger('68A5E62CA9CE6C1C299803A6C1530B514E182AD8B0042A59CAD29F43', 16),
- new BigInteger('2580F63CCFE44138870713B1A92369E33E2135D266DBB372386C400B', 16)
- );
- $this->setBasePoint(
- new BigInteger('0D9029AD2C7E5CF4340823B2A87DC68C9E4CE3174C1E6EFDEE12C07D', 16),
- new BigInteger('58AA56F772C0726F24C6B89E4ECDAC24354B9E99CAA3F6D3761402CD', 16)
- );
- $this->setOrder(new BigInteger('D7C134AA264366862A18302575D0FB98D116BC4B6DDEBCA3A5A7939F', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224t1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224t1.php
deleted file mode 100644
index 97032a48c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP224t1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * brainpoolP224t1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP224t1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FF', 16));
- $this->setCoefficients(
- new BigInteger('D7C134AA264366862A18302575D1D787B09F075797DA89F57EC8C0FC', 16), // eg. -3
- new BigInteger('4B337D934104CD7BEF271BF60CED1ED20DA14C08B3BB64F18A60888D', 16)
- );
- $this->setBasePoint(
- new BigInteger('6AB1E344CE25FF3896424E7FFE14762ECB49F8928AC0C76029B4D580', 16),
- new BigInteger('0374E9F5143E568CD23F3F4D7C0D4B1E41C8CC0D1C6ABD5F1A46DB4C', 16)
- );
- $this->setOrder(new BigInteger('D7C134AA264366862A18302575D0FB98D116BC4B6DDEBCA3A5A7939F', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256r1.php
deleted file mode 100644
index 0d3860041..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * brainpoolP256r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP256r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5377', 16));
- $this->setCoefficients(
- new BigInteger('7D5A0975FC2C3057EEF67530417AFFE7FB8055C126DC5C6CE94A4B44F330B5D9', 16),
- new BigInteger('26DC5C6CE94A4B44F330B5D9BBD77CBF958416295CF7E1CE6BCCDC18FF8C07B6', 16)
- );
- $this->setBasePoint(
- new BigInteger('8BD2AEB9CB7E57CB2C4B482FFC81B7AFB9DE27E1E3BD23C23A4453BD9ACE3262', 16),
- new BigInteger('547EF835C3DAC4FD97F8461A14611DC9C27745132DED8E545C1D54C72F046997', 16)
- );
- $this->setOrder(new BigInteger('A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256t1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256t1.php
deleted file mode 100644
index 9c1d1cdbe..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP256t1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * brainpoolP256t1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP256t1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5377', 16));
- $this->setCoefficients(
- new BigInteger('A9FB57DBA1EEA9BC3E660A909D838D726E3BF623D52620282013481D1F6E5374', 16), // eg. -3
- new BigInteger('662C61C430D84EA4FE66A7733D0B76B7BF93EBC4AF2F49256AE58101FEE92B04', 16)
- );
- $this->setBasePoint(
- new BigInteger('A3E8EB3CC1CFE7B7732213B23A656149AFA142C47AAFBC2B79A191562E1305F4', 16),
- new BigInteger('2D996C823439C56D7F7B22E14644417E69BCB6DE39D027001DABE8F35B25C9BE', 16)
- );
- $this->setOrder(new BigInteger('A9FB57DBA1EEA9BC3E660A909D838D718C397AA3B561A6F7901E0E82974856A7', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320r1.php
deleted file mode 100644
index a6253a714..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320r1.php
+++ /dev/null
@@ -1,42 +0,0 @@
-<?php
-
-/**
- * brainpoolP320r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP320r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F9' .
- '2B9EC7893EC28FCD412B1F1B32E27', 16));
- $this->setCoefficients(
- new BigInteger('3EE30B568FBAB0F883CCEBD46D3F3BB8A2A73513F5EB79DA66190EB085FFA9F4' .
- '92F375A97D860EB4', 16),
- new BigInteger('520883949DFDBC42D3AD198640688A6FE13F41349554B49ACC31DCCD88453981' .
- '6F5EB4AC8FB1F1A6', 16)
- );
- $this->setBasePoint(
- new BigInteger('43BD7E9AFB53D8B85289BCC48EE5BFE6F20137D10A087EB6E7871E2A10A599C7' .
- '10AF8D0D39E20611', 16),
- new BigInteger('14FDD05545EC1CC8AB4093247F77275E0743FFED117182EAA9C77877AAAC6AC7' .
- 'D35245D1692E8EE1', 16)
- );
- $this->setOrder(new BigInteger('D35E472036BC4FB7E13C785ED201E065F98FCFA5B68F12A32D4' .
- '82EC7EE8658E98691555B44C59311', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320t1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320t1.php
deleted file mode 100644
index e62771859..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP320t1.php
+++ /dev/null
@@ -1,42 +0,0 @@
-<?php
-
-/**
- * brainpoolP320t1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP320t1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F9' .
- '2B9EC7893EC28FCD412B1F1B32E27', 16));
- $this->setCoefficients(
- new BigInteger('D35E472036BC4FB7E13C785ED201E065F98FCFA6F6F40DEF4F92B9EC7893EC28' .
- 'FCD412B1F1B32E24', 16), // eg. -3
- new BigInteger('A7F561E038EB1ED560B3D147DB782013064C19F27ED27C6780AAF77FB8A547CE' .
- 'B5B4FEF422340353', 16)
- );
- $this->setBasePoint(
- new BigInteger('925BE9FB01AFC6FB4D3E7D4990010F813408AB106C4F09CB7EE07868CC136FFF' .
- '3357F624A21BED52', 16),
- new BigInteger('63BA3A7A27483EBF6671DBEF7ABB30EBEE084E58A0B077AD42A5A0989D1EE71B' .
- '1B9BC0455FB0D2C3', 16)
- );
- $this->setOrder(new BigInteger('D35E472036BC4FB7E13C785ED201E065F98FCFA5B68F12A32D4' .
- '82EC7EE8658E98691555B44C59311', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384r1.php
deleted file mode 100644
index 5bc8a6d53..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384r1.php
+++ /dev/null
@@ -1,48 +0,0 @@
-<?php
-
-/**
- * brainpoolP384r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP384r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger(
- '8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A729901D1A7' .
- '1874700133107EC53', 16));
- $this->setCoefficients(
- new BigInteger(
- '7BC382C63D8C150C3C72080ACE05AFA0C2BEA28E4FB22787139165EFBA91F90F8AA5814A503' .
- 'AD4EB04A8C7DD22CE2826', 16),
- new BigInteger(
- '4A8C7DD22CE28268B39B55416F0447C2FB77DE107DCD2A62E880EA53EEB62D57CB4390295DB' .
- 'C9943AB78696FA504C11', 16)
- );
- $this->setBasePoint(
- new BigInteger(
- '1D1C64F068CF45FFA2A63A81B7C13F6B8847A3E77EF14FE3DB7FCAFE0CBD10E8E826E03436D' .
- '646AAEF87B2E247D4AF1E', 16),
- new BigInteger(
- '8ABE1D7520F9C2A45CB1EB8E95CFD55262B70B29FEEC5864E19C054FF99129280E464621779' .
- '1811142820341263C5315', 16)
- );
- $this->setOrder(new BigInteger(
- '8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7CF3AB6AF6B7FC31' .
- '03B883202E9046565', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384t1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384t1.php
deleted file mode 100644
index 8bd4a790f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP384t1.php
+++ /dev/null
@@ -1,48 +0,0 @@
-<?php
-
-/**
- * brainpoolP384t1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP384t1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger(
- '8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A729901D1A7' .
- '1874700133107EC53', 16));
- $this->setCoefficients(
- new BigInteger(
- '8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B412B1DA197FB71123ACD3A729901' .
- 'D1A71874700133107EC50', 16), // eg. -3
- new BigInteger(
- '7F519EADA7BDA81BD826DBA647910F8C4B9346ED8CCDC64E4B1ABD11756DCE1D2074AA263B8' .
- '8805CED70355A33B471EE', 16)
- );
- $this->setBasePoint(
- new BigInteger(
- '18DE98B02DB9A306F2AFCD7235F72A819B80AB12EBD653172476FECD462AABFFC4FF191B946' .
- 'A5F54D8D0AA2F418808CC', 16),
- new BigInteger(
- '25AB056962D30651A114AFD2755AD336747F93475B7A1FCA3B88F2B6A208CCFE469408584DC' .
- '2B2912675BF5B9E582928', 16)
- );
- $this->setOrder(new BigInteger(
- '8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7CF3AB6AF6B7FC31' .
- '03B883202E9046565', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512r1.php
deleted file mode 100644
index 8d22120fa..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512r1.php
+++ /dev/null
@@ -1,48 +0,0 @@
-<?php
-
-/**
- * brainpoolP512r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP512r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger(
- 'AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B009BC' .
- '66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F3', 16));
- $this->setCoefficients(
- new BigInteger(
- '7830A3318B603B89E2327145AC234CC594CBDD8D3DF91610A83441CAEA9863BC2DED5D5AA82' .
- '53AA10A2EF1C98B9AC8B57F1117A72BF2C7B9E7C1AC4D77FC94CA', 16),
- new BigInteger(
- '3DF91610A83441CAEA9863BC2DED5D5AA8253AA10A2EF1C98B9AC8B57F1117A72BF2C7B9E7C' .
- '1AC4D77FC94CADC083E67984050B75EBAE5DD2809BD638016F723', 16)
- );
- $this->setBasePoint(
- new BigInteger(
- '81AEE4BDD82ED9645A21322E9C4C6A9385ED9F70B5D916C1B43B62EEF4D0098EFF3B1F78E2D' .
- '0D48D50D1687B93B97D5F7C6D5047406A5E688B352209BCB9F822', 16),
- new BigInteger(
- '7DDE385D566332ECC0EABFA9CF7822FDF209F70024A57B1AA000C55B881F8111B2DCDE494A5' .
- 'F485E5BCA4BD88A2763AED1CA2B2FA8F0540678CD1E0F3AD80892', 16)
- );
- $this->setOrder(new BigInteger(
- 'AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA70330870553E5C414CA' .
- '92619418661197FAC10471DB1D381085DDADDB58796829CA90069', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512t1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512t1.php
deleted file mode 100644
index 8566182e4..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/brainpoolP512t1.php
+++ /dev/null
@@ -1,48 +0,0 @@
-<?php
-
-/**
- * brainpoolP512t1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class brainpoolP512t1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger(
- 'AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B009BC' .
- '66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F3', 16));
- $this->setCoefficients(
- new BigInteger(
- 'AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA703308717D4D9B009BC' .
- '66842AECDA12AE6A380E62881FF2F2D82C68528AA6056583A48F0', 16), // eg. -3
- new BigInteger(
- '7CBBBCF9441CFAB76E1890E46884EAE321F70C0BCB4981527897504BEC3E36A62BCDFA23049' .
- '76540F6450085F2DAE145C22553B465763689180EA2571867423E', 16)
- );
- $this->setBasePoint(
- new BigInteger(
- '640ECE5C12788717B9C1BA06CBC2A6FEBA85842458C56DDE9DB1758D39C0313D82BA51735CD' .
- 'B3EA499AA77A7D6943A64F7A3F25FE26F06B51BAA2696FA9035DA', 16),
- new BigInteger(
- '5B534BD595F5AF0FA2C892376C84ACE1BB4E3019B71634C01131159CAE03CEE9D9932184BEE' .
- 'F216BD71DF2DADF86A627306ECFF96DBB8BACE198B61E00F8B332', 16)
- );
- $this->setOrder(new BigInteger(
- 'AADD9DB8DBE9C48B3FD4E6AE33C9FC07CB308DB3B3C9D20ED6639CCA70330870553E5C414CA' .
- '92619418661197FAC10471DB1D381085DDADDB58796829CA90069', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb233.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb233.php
deleted file mode 100644
index a2e974ace..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb233.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistb233
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistb233 extends sect233r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb409.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb409.php
deleted file mode 100644
index c3f25829f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistb409.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistb409
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistb409 extends sect409r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk163.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk163.php
deleted file mode 100644
index 2d3add6eb..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk163.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistk163
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistk163 extends sect163k1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk233.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk233.php
deleted file mode 100644
index 05efea40b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk233.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistk233
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistk233 extends sect233k1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk283.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk283.php
deleted file mode 100644
index 95420587e..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk283.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * sect283k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistk283 extends sect283k1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk409.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk409.php
deleted file mode 100644
index eb55ce7bd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistk409.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistk409
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistk409 extends sect409k1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp192.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp192.php
deleted file mode 100644
index c600d79fb..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp192.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistp192
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistp192 extends secp192r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp224.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp224.php
deleted file mode 100644
index 5c4320ecf..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp224.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistp224
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistp224 extends secp224r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp256.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp256.php
deleted file mode 100644
index 56d0b5ad3..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp256.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistp256
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistp256 extends secp256r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp384.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp384.php
deleted file mode 100644
index 7a45babfc..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp384.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistp384
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistp384 extends secp384r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp521.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp521.php
deleted file mode 100644
index 167b058f6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistp521.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistp521
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistp521 extends secp521r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistt571.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistt571.php
deleted file mode 100644
index df92a3951..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/nistt571.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * nistt571
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class nistt571 extends sect571k1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v1.php
deleted file mode 100644
index d329122a8..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v1.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * prime192v1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class prime192v1 extends secp192r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v2.php
deleted file mode 100644
index f5dbfa6bf..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v2.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * prime192v2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class prime192v2 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC', 16),
- new BigInteger('CC22D6DFB95C6B25E49C0D6364A4E5980C393AA21668D953', 16)
- );
- $this->setBasePoint(
- new BigInteger('EEA2BAE7E1497842F2DE7769CFE9C989C072AD696F48034A', 16),
- new BigInteger('6574D11D69B6EC7A672BB82A083DF2F2B0847DE970B2DE15', 16)
- );
- $this->setOrder(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFE5FB1A724DC80418648D8DD31', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v3.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v3.php
deleted file mode 100644
index 0bd83d372..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime192v3.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * prime192v3
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class prime192v3 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC', 16),
- new BigInteger('22123DC2395A05CAA7423DAECCC94760A7D462256BD56916', 16)
- );
- $this->setBasePoint(
- new BigInteger('7D29778100C65A1DA1783716588DCE2B8B4AEE8E228F1896', 16),
- new BigInteger('38A90F22637337334B49DCB66A6DC8F9978ACA7648A943B0', 16)
- );
- $this->setOrder(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFF7A62D031C83F4294F640EC13', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v1.php
deleted file mode 100644
index e42e69256..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * prime239v1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class prime239v1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC', 16),
- new BigInteger('6B016C3BDCF18941D0D654921475CA71A9DB2FB27D1D37796185C2942C0A', 16)
- );
- $this->setBasePoint(
- new BigInteger('0FFA963CDCA8816CCC33B8642BEDF905C3D358573D3F27FBBD3B3CB9AAAF', 16),
- new BigInteger('7DEBE8E4E90A5DAE6E4054CA530BA04654B36818CE226B39FCCB7B02F1AE', 16)
- );
- $this->setOrder(new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF7FFFFF9E5E9A9F5D9071FBD1522688909D0B', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v2.php
deleted file mode 100644
index ad6a3a866..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v2.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * prime239v2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class prime239v2 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC', 16),
- new BigInteger('617FAB6832576CBBFED50D99F0249C3FEE58B94BA0038C7AE84C8C832F2C', 16)
- );
- $this->setBasePoint(
- new BigInteger('38AF09D98727705120C921BB5E9E26296A3CDCF2F35757A0EAFD87B830E7', 16),
- new BigInteger('5B0125E4DBEA0EC7206DA0FC01D9B081329FB555DE6EF460237DFF8BE4BA', 16)
- );
- $this->setOrder(new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF800000CFA7E8594377D414C03821BC582063', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v3.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v3.php
deleted file mode 100644
index ad41cfe02..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime239v3.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * prime239v3
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class prime239v3 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF7FFFFFFFFFFF8000000000007FFFFFFFFFFC', 16),
- new BigInteger('255705FA2A306654B1F4CB03D6A750A30C250102D4988717D9BA15AB6D3E', 16)
- );
- $this->setBasePoint(
- new BigInteger('6768AE8E18BB92CFCF005C949AA2C6D94853D0E660BBF854B1C9505FE95A', 16),
- new BigInteger('1607E6898F390C06BC1D552BAD226F3B6FCFE48B6E818499AF18E3ED6CF3', 16)
- );
- $this->setOrder(new BigInteger('7FFFFFFFFFFFFFFFFFFFFFFF7FFFFF975DEB41B3A6057C3C432146526551', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime256v1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime256v1.php
deleted file mode 100644
index 8440514aa..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/prime256v1.php
+++ /dev/null
@@ -1,20 +0,0 @@
-<?php
-
-/**
- * prime256v1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-final class prime256v1 extends secp256r1
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r1.php
deleted file mode 100644
index 4f0600180..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * secp112r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp112r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('DB7C2ABF62E35E668076BEAD208B', 16));
- $this->setCoefficients(
- new BigInteger('DB7C2ABF62E35E668076BEAD2088', 16),
- new BigInteger('659EF8BA043916EEDE8911702B22', 16)
- );
- $this->setBasePoint(
- new BigInteger('09487239995A5EE76B55F9C2F098', 16),
- new BigInteger('A89CE5AF8724C0A23E0E0FF77500', 16)
- );
- $this->setOrder(new BigInteger('DB7C2ABF62E35E7628DFAC6561C5', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r2.php
deleted file mode 100644
index e23e6b54d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp112r2.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * secp112r2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp112r2 extends Prime
-{
- public function __construct()
- {
- // same modulo as secp112r1
- $this->setModulo(new BigInteger('DB7C2ABF62E35E668076BEAD208B', 16));
- $this->setCoefficients(
- new BigInteger('6127C24C05F38A0AAAF65C0EF02C', 16),
- new BigInteger('51DEF1815DB5ED74FCC34C85D709', 16)
- );
- $this->setBasePoint(
- new BigInteger('4BA30AB5E892B4E1649DD0928643', 16),
- new BigInteger('ADCD46F5882E3747DEF36E956E97', 16)
- );
- $this->setOrder(new BigInteger('36DF0AAFD8B8D7597CA10520D04B', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r1.php
deleted file mode 100644
index afe1336be..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * secp128r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp128r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFC', 16),
- new BigInteger('E87579C11079F43DD824993C2CEE5ED3', 16)
- );
- $this->setBasePoint(
- new BigInteger('161FF7528B899B2D0C28607CA52C5B86', 16),
- new BigInteger('CF5AC8395BAFEB13C02DA292DDED7A83', 16)
- );
- $this->setOrder(new BigInteger('FFFFFFFE0000000075A30D1B9038A115', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r2.php
deleted file mode 100644
index 4e2719b12..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp128r2.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * secp128r2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp128r2 extends Prime
-{
- public function __construct()
- {
- // same as secp128r1
- $this->setModulo(new BigInteger('FFFFFFFDFFFFFFFFFFFFFFFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('D6031998D1B3BBFEBF59CC9BBFF9AEE1', 16),
- new BigInteger('5EEEFCA380D02919DC2C6558BB6D8A5D', 16)
- );
- $this->setBasePoint(
- new BigInteger('7B6AA5D85E572983E6FB32A7CDEBC140', 16),
- new BigInteger('27B6916A894D3AEE7106FE805FC34B44', 16)
- );
- $this->setOrder(new BigInteger('3FFFFFFF7FFFFFFFBE0024720613B5A3', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160k1.php
deleted file mode 100644
index 80ff73e32..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160k1.php
+++ /dev/null
@@ -1,48 +0,0 @@
-<?php
-
-/**
- * secp160k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\KoblitzPrime;
-use phpseclib3\Math\BigInteger;
-
-class secp160k1 extends KoblitzPrime
-{
- public function __construct()
- {
- // same as secp160r2
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC73', 16));
- $this->setCoefficients(
- new BigInteger('0000000000000000000000000000000000000000', 16),
- new BigInteger('0000000000000000000000000000000000000007', 16)
- );
- $this->setBasePoint(
- new BigInteger('3B4C382CE37AA192A4019E763036F4F5DD4D7EBB', 16),
- new BigInteger('938CF935318FDCED6BC28286531733C3F03C4FEE', 16)
- );
- $this->setOrder(new BigInteger('0100000000000000000001B8FA16DFAB9ACA16B6B3', 16));
-
- $this->basis = [];
- $this->basis[] = [
- 'a' => new BigInteger('0096341F1138933BC2F505', -16),
- 'b' => new BigInteger('FF6E9D0418C67BB8D5F562', -16)
- ];
- $this->basis[] = [
- 'a' => new BigInteger('01BDCB3A09AAAABEAFF4A8', -16),
- 'b' => new BigInteger('04D12329FF0EF498EA67', -16)
- ];
- $this->beta = $this->factory->newInteger(new BigInteger('645B7345A143464942CC46D7CF4D5D1E1E6CBB68', -16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r1.php
deleted file mode 100644
index 5d7739c48..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * secp160r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp160r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7FFFFFFC', 16),
- new BigInteger('1C97BEFC54BD7A8B65ACF89F81D4D4ADC565FA45', 16)
- );
- $this->setBasePoint(
- new BigInteger('4A96B5688EF573284664698968C38BB913CBFC82', 16),
- new BigInteger('23A628553168947D59DCC912042351377AC5FB32', 16)
- );
- $this->setOrder(new BigInteger('0100000000000000000001F4C8F927AED3CA752257', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r2.php
deleted file mode 100644
index 9b2789b41..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp160r2.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * secp160r2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp160r2 extends Prime
-{
- public function __construct()
- {
- // same as secp160k1
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC73', 16));
- $this->setCoefficients(
- new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFAC70', 16),
- new BigInteger('B4E134D3FB59EB8BAB57274904664D5AF50388BA', 16)
- );
- $this->setBasePoint(
- new BigInteger('52DCB034293A117E1F4FF11B30F7199D3144CE6D', 16),
- new BigInteger('FEAFFEF2E331F296E071FA0DF9982CFEA7D43F2E', 16)
- );
- $this->setOrder(new BigInteger('0100000000000000000000351EE786A818F3A1A16B', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192k1.php
deleted file mode 100644
index 79ff610cf..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192k1.php
+++ /dev/null
@@ -1,47 +0,0 @@
-<?php
-
-/**
- * secp192k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\KoblitzPrime;
-use phpseclib3\Math\BigInteger;
-
-class secp192k1 extends KoblitzPrime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFEE37', 16));
- $this->setCoefficients(
- new BigInteger('000000000000000000000000000000000000000000000000', 16),
- new BigInteger('000000000000000000000000000000000000000000000003', 16)
- );
- $this->setBasePoint(
- new BigInteger('DB4FF10EC057E9AE26B07D0280B7F4341DA5D1B1EAE06C7D', 16),
- new BigInteger('9B2F2F6D9C5628A7844163D015BE86344082AA88D95E2F9D', 16)
- );
- $this->setOrder(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFE26F2FC170F69466A74DEFD8D', 16));
-
- $this->basis = [];
- $this->basis[] = [
- 'a' => new BigInteger('00B3FB3400DEC5C4ADCEB8655C', -16),
- 'b' => new BigInteger('8EE96418CCF4CFC7124FDA0F', -16)
- ];
- $this->basis[] = [
- 'a' => new BigInteger('01D90D03E8F096B9948B20F0A9', -16),
- 'b' => new BigInteger('42E49819ABBA9474E1083F6B', -16)
- ];
- $this->beta = $this->factory->newInteger(new BigInteger('447A96E6C647963E2F7809FEAAB46947F34B0AA3CA0BBA74', -16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192r1.php
deleted file mode 100644
index be7d38987..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp192r1.php
+++ /dev/null
@@ -1,80 +0,0 @@
-<?php
-
-/**
- * secp192r1
- *
- * This is the NIST P-192 curve
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp192r1 extends Prime
-{
- public function __construct()
- {
- $modulo = new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFF', 16);
- $this->setModulo($modulo);
-
- // algorithm 2.27 from http://diamond.boisestate.edu/~liljanab/MATH308/GuideToECC.pdf#page=66
- /* in theory this should be faster than regular modular reductions save for one small issue.
- to convert to / from base-2**8 with BCMath you have to call bcmul() and bcdiv() a lot.
- to convert to / from base-2**8 with PHP64 you have to call base256_rshift() a lot.
- in short, converting to / from base-2**8 is pretty expensive and that expense is
- enough to offset whatever else might be gained by a simplified reduction algorithm.
- now, if PHP supported unsigned integers things might be different. no bit-shifting
- would be required for the PHP engine and it'd be a lot faster. but as is, BigInteger
- uses base-2**31 or base-2**26 depending on whether or not the system is has a 32-bit
- or a 64-bit OS.
- */
- /*
- $m_length = $this->getLengthInBytes();
- $this->setReduction(function($c) use ($m_length) {
- $cBytes = $c->toBytes();
- $className = $this->className;
-
- if (strlen($cBytes) > 2 * $m_length) {
- list(, $r) = $c->divide($className::$modulo);
- return $r;
- }
-
- $c = str_pad($cBytes, 48, "\0", STR_PAD_LEFT);
- $c = array_reverse(str_split($c, 8));
-
- $null = "\0\0\0\0\0\0\0\0";
- $s1 = new BigInteger($c[2] . $c[1] . $c[0], 256);
- $s2 = new BigInteger($null . $c[3] . $c[3], 256);
- $s3 = new BigInteger($c[4] . $c[4] . $null, 256);
- $s4 = new BigInteger($c[5] . $c[5] . $c[5], 256);
-
- $r = $s1->add($s2)->add($s3)->add($s4);
- while ($r->compare($className::$modulo) >= 0) {
- $r = $r->subtract($className::$modulo);
- }
-
- return $r;
- });
- */
-
- $this->setCoefficients(
- new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFC', 16),
- new BigInteger('64210519E59C80E70FA7E9AB72243049FEB8DEECC146B9B1', 16)
- );
- $this->setBasePoint(
- new BigInteger('188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF1012', 16),
- new BigInteger('07192B95FFC8DA78631011ED6B24CDD573F977A11E794811', 16)
- );
- $this->setOrder(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22831', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224k1.php
deleted file mode 100644
index 6a2b9a82c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224k1.php
+++ /dev/null
@@ -1,47 +0,0 @@
-<?php
-
-/**
- * secp224k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\KoblitzPrime;
-use phpseclib3\Math\BigInteger;
-
-class secp224k1 extends KoblitzPrime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFE56D', 16));
- $this->setCoefficients(
- new BigInteger('00000000000000000000000000000000000000000000000000000000', 16),
- new BigInteger('00000000000000000000000000000000000000000000000000000005', 16)
- );
- $this->setBasePoint(
- new BigInteger('A1455B334DF099DF30FC28A169A467E9E47075A90F7E650EB6B7A45C', 16),
- new BigInteger('7E089FED7FBA344282CAFBD6F7E319F7C0B0BD59E2CA4BDB556D61A5', 16)
- );
- $this->setOrder(new BigInteger('010000000000000000000000000001DCE8D2EC6184CAF0A971769FB1F7', 16));
-
- $this->basis = [];
- $this->basis[] = [
- 'a' => new BigInteger('00B8ADF1378A6EB73409FA6C9C637D', -16),
- 'b' => new BigInteger('94730F82B358A3776A826298FA6F', -16)
- ];
- $this->basis[] = [
- 'a' => new BigInteger('01DCE8D2EC6184CAF0A972769FCC8B', -16),
- 'b' => new BigInteger('4D2100BA3DC75AAB747CCF355DEC', -16)
- ];
- $this->beta = $this->factory->newInteger(new BigInteger('01F178FFA4B17C89E6F73AECE2AAD57AF4C0A748B63C830947B27E04', -16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224r1.php
deleted file mode 100644
index 23ac22979..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp224r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * secp224r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp224r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000001', 16));
- $this->setCoefficients(
- new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFE', 16),
- new BigInteger('B4050A850C04B3ABF54132565044B0B7D7BFD8BA270B39432355FFB4', 16)
- );
- $this->setBasePoint(
- new BigInteger('B70E0CBD6BB4BF7F321390B94A03C1D356C21122343280D6115C1D21', 16),
- new BigInteger('BD376388B5F723FB4C22DFE6CD4375A05A07476444D5819985007E34', 16)
- );
- $this->setOrder(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFF16A2E0B8F03E13DD29455C5C2A3D', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256k1.php
deleted file mode 100644
index 958a48479..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256k1.php
+++ /dev/null
@@ -1,51 +0,0 @@
-<?php
-
-/**
- * secp256k1
- *
- * This is the curve used in Bitcoin
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-//use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Crypt\EC\BaseCurves\KoblitzPrime;
-use phpseclib3\Math\BigInteger;
-
-//class secp256k1 extends Prime
-class secp256k1 extends KoblitzPrime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFC2F', 16));
- $this->setCoefficients(
- new BigInteger('0000000000000000000000000000000000000000000000000000000000000000', 16),
- new BigInteger('0000000000000000000000000000000000000000000000000000000000000007', 16)
- );
- $this->setOrder(new BigInteger('FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141', 16));
- $this->setBasePoint(
- new BigInteger('79BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798', 16),
- new BigInteger('483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8', 16)
- );
-
- $this->basis = [];
- $this->basis[] = [
- 'a' => new BigInteger('3086D221A7D46BCDE86C90E49284EB15', -16),
- 'b' => new BigInteger('FF1BBC8129FEF177D790AB8056F5401B3D', -16)
- ];
- $this->basis[] = [
- 'a' => new BigInteger('114CA50F7A8E2F3F657C1108D9D44CFD8', -16),
- 'b' => new BigInteger('3086D221A7D46BCDE86C90E49284EB15', -16)
- ];
- $this->beta = $this->factory->newInteger(new BigInteger('7AE96A2B657C07106E64479EAC3434E99CF0497512F58995C1396C28719501EE', -16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256r1.php
deleted file mode 100644
index f929f4fa9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp256r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * secp256r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp256r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFF', 16));
- $this->setCoefficients(
- new BigInteger('FFFFFFFF00000001000000000000000000000000FFFFFFFFFFFFFFFFFFFFFFFC', 16),
- new BigInteger('5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B', 16)
- );
- $this->setBasePoint(
- new BigInteger('6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296', 16),
- new BigInteger('4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5', 16)
- );
- $this->setOrder(new BigInteger('FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp384r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp384r1.php
deleted file mode 100644
index 8c01a761c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp384r1.php
+++ /dev/null
@@ -1,54 +0,0 @@
-<?php
-
-/**
- * secp384r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp384r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger(
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFF',
- 16
- ));
- $this->setCoefficients(
- new BigInteger(
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEFFFFFFFF0000000000000000FFFFFFFC',
- 16
- ),
- new BigInteger(
- 'B3312FA7E23EE7E4988E056BE3F82D19181D9C6EFE8141120314088F5013875AC656398D8A2ED19D2A85C8EDD3EC2AEF',
- 16
- )
- );
- $this->setBasePoint(
- new BigInteger(
- 'AA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F25DBF55296C3A545E3872760AB7',
- 16
- ),
- new BigInteger(
- '3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B1CE1D7E819D7A431D7C90EA0E5F',
- 16
- )
- );
- $this->setOrder(new BigInteger(
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFC7634D81F4372DDF581A0DB248B0A77AECEC196ACCC52973',
- 16
- ));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp521r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp521r1.php
deleted file mode 100644
index 8c2b9bbd1..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/secp521r1.php
+++ /dev/null
@@ -1,48 +0,0 @@
-<?php
-
-/**
- * secp521r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Prime;
-use phpseclib3\Math\BigInteger;
-
-class secp521r1 extends Prime
-{
- public function __construct()
- {
- $this->setModulo(new BigInteger('01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF' .
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF' .
- 'FFFF', 16));
- $this->setCoefficients(
- new BigInteger('01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF' .
- 'FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF' .
- 'FFFC', 16),
- new BigInteger('0051953EB9618E1C9A1F929A21A0B68540EEA2DA725B99B315F3B8B489918EF1' .
- '09E156193951EC7E937B1652C0BD3BB1BF073573DF883D2C34F1EF451FD46B50' .
- '3F00', 16)
- );
- $this->setBasePoint(
- new BigInteger('00C6858E06B70404E9CD9E3ECB662395B4429C648139053FB521F828AF606B4D' .
- '3DBAA14B5E77EFE75928FE1DC127A2FFA8DE3348B3C1856A429BF97E7E31C2E5' .
- 'BD66', 16),
- new BigInteger('011839296A789A3BC0045C8A5FB42C7D1BD998F54449579B446817AFBD17273E' .
- '662C97EE72995EF42640C550B9013FAD0761353C7086A272C24088BE94769FD1' .
- '6650', 16)
- );
- $this->setOrder(new BigInteger('01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF' .
- 'FFFA51868783BF2F966B7FCC0148F709A5D03BB5C9B8899C47AEBB6FB71E9138' .
- '6409', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r1.php
deleted file mode 100644
index 958082a35..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect113r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect113r1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(113, 9, 0);
- $this->setCoefficients(
- '003088250CA6E7C7FE649CE85820F7',
- '00E8BEE4D3E2260744188BE0E9C723'
- );
- $this->setBasePoint(
- '009D73616F35F4AB1407D73562C10F',
- '00A52830277958EE84D1315ED31886'
- );
- $this->setOrder(new BigInteger('0100000000000000D9CCEC8A39E56F', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r2.php
deleted file mode 100644
index 9683c28f0..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect113r2.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect113r2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect113r2 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(113, 9, 0);
- $this->setCoefficients(
- '00689918DBEC7E5A0DD6DFC0AA55C7',
- '0095E9A9EC9B297BD4BF36E059184F'
- );
- $this->setBasePoint(
- '01A57A6A7B26CA5EF52FCDB8164797',
- '00B3ADC94ED1FE674C06E695BABA1D'
- );
- $this->setOrder(new BigInteger('010000000000000108789B2496AF93', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r1.php
deleted file mode 100644
index f1585b7f3..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect131r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect131r1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(131, 8, 3, 2, 0);
- $this->setCoefficients(
- '07A11B09A76B562144418FF3FF8C2570B8',
- '0217C05610884B63B9C6C7291678F9D341'
- );
- $this->setBasePoint(
- '0081BAF91FDF9833C40F9C181343638399',
- '078C6E7EA38C001F73C8134B1B4EF9E150'
- );
- $this->setOrder(new BigInteger('0400000000000000023123953A9464B54D', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r2.php
deleted file mode 100644
index ecf7f99e0..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect131r2.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect131r2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect131r2 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(131, 8, 3, 2, 0);
- $this->setCoefficients(
- '03E5A88919D7CAFCBF415F07C2176573B2',
- '04B8266A46C55657AC734CE38F018F2192'
- );
- $this->setBasePoint(
- '0356DCD8F2F95031AD652D23951BB366A8',
- '0648F06D867940A5366D9E265DE9EB240F'
- );
- $this->setOrder(new BigInteger('0400000000000000016954A233049BA98F', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163k1.php
deleted file mode 100644
index cf51933b9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163k1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect163k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect163k1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(163, 7, 6, 3, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000001',
- '000000000000000000000000000000000000000001'
- );
- $this->setBasePoint(
- '02FE13C0537BBC11ACAA07D793DE4E6D5E5C94EEE8',
- '0289070FB05D38FF58321F2E800536D538CCDAA3D9'
- );
- $this->setOrder(new BigInteger('04000000000000000000020108A2E0CC0D99F8A5EF', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r1.php
deleted file mode 100644
index ca1c00ff2..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect163r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect163r1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(163, 7, 6, 3, 0);
- $this->setCoefficients(
- '07B6882CAAEFA84F9554FF8428BD88E246D2782AE2',
- '0713612DCDDCB40AAB946BDA29CA91F73AF958AFD9'
- );
- $this->setBasePoint(
- '0369979697AB43897789566789567F787A7876A654',
- '00435EDB42EFAFB2989D51FEFCE3C80988F41FF883'
- );
- $this->setOrder(new BigInteger('03FFFFFFFFFFFFFFFFFFFF48AAB689C29CA710279B', 16));
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r2.php
deleted file mode 100644
index c473b9408..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect163r2.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect163r2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect163r2 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(163, 7, 6, 3, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000001',
- '020A601907B8C953CA1481EB10512F78744A3205FD'
- );
- $this->setBasePoint(
- '03F0EBA16286A2D57EA0991168D4994637E8343E36',
- '00D51FBC6C71A0094FA2CDD545B11C5C0C797324F1'
- );
- $this->setOrder(new BigInteger('040000000000000000000292FE77E70C12A4234C33', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r1.php
deleted file mode 100644
index 830f1ba2d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect193r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect193r1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(193, 15, 0);
- $this->setCoefficients(
- '0017858FEB7A98975169E171F77B4087DE098AC8A911DF7B01',
- '00FDFB49BFE6C3A89FACADAA7A1E5BBC7CC1C2E5D831478814'
- );
- $this->setBasePoint(
- '01F481BC5F0FF84A74AD6CDF6FDEF4BF6179625372D8C0C5E1',
- '0025E399F2903712CCF3EA9E3A1AD17FB0B3201B6AF7CE1B05'
- );
- $this->setOrder(new BigInteger('01000000000000000000000000C7F34A778F443ACC920EBA49', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r2.php
deleted file mode 100644
index 6bf2462b6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect193r2.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect193r2
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect193r2 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(193, 15, 0);
- $this->setCoefficients(
- '0163F35A5137C2CE3EA6ED8667190B0BC43ECD69977702709B',
- '00C9BB9E8927D4D64C377E2AB2856A5B16E3EFB7F61D4316AE'
- );
- $this->setBasePoint(
- '00D9B67D192E0367C803F39E1A7E82CA14A651350AAE617E8F',
- '01CE94335607C304AC29E7DEFBD9CA01F596F927224CDECF6C'
- );
- $this->setOrder(new BigInteger('010000000000000000000000015AAB561B005413CCD4EE99D5', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233k1.php
deleted file mode 100644
index 7a42f299b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233k1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect233k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect233k1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(233, 74, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000000000000000000000000',
- '000000000000000000000000000000000000000000000000000000000001'
- );
- $this->setBasePoint(
- '017232BA853A7E731AF129F22FF4149563A419C26BF50A4C9D6EEFAD6126',
- '01DB537DECE819B7F70F555A67C427A8CD9BF18AEB9B56E0C11056FAE6A3'
- );
- $this->setOrder(new BigInteger('8000000000000000000000000000069D5BB915BCD46EFB1AD5F173ABDF', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233r1.php
deleted file mode 100644
index 86d910c11..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect233r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect233r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect233r1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(233, 74, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000000000000000000000001',
- '0066647EDE6C332C7F8C0923BB58213B333B20E9CE4281FE115F7D8F90AD'
- );
- $this->setBasePoint(
- '00FAC9DFCBAC8313BB2139F1BB755FEF65BC391F8B36F8F8EB7371FD558B',
- '01006A08A41903350678E58528BEBF8A0BEFF867A7CA36716F7E01F81052'
- );
- $this->setOrder(new BigInteger('01000000000000000000000000000013E974E72F8A6922031D2603CFE0D7', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect239k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect239k1.php
deleted file mode 100644
index 1c8fcd1f0..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect239k1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect239k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wiggint on <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect239k1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(239, 158, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000000000000000000000000',
- '000000000000000000000000000000000000000000000000000000000001'
- );
- $this->setBasePoint(
- '29A0B6A887A983E9730988A68727A8B2D126C44CC2CC7B2A6555193035DC',
- '76310804F12E549BDB011C103089E73510ACB275FC312A5DC6B76553F0CA'
- );
- $this->setOrder(new BigInteger('2000000000000000000000000000005A79FEC67CB6E91F1C1DA800E478A5', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283k1.php
deleted file mode 100644
index fdd48226f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283k1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect283k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wiggint on <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect283k1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(283, 12, 7, 5, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000000000000000000000000000000000000',
- '000000000000000000000000000000000000000000000000000000000000000000000001'
- );
- $this->setBasePoint(
- '0503213F78CA44883F1A3B8162F188E553CD265F23C1567A16876913B0C2AC2458492836',
- '01CCDA380F1C9E318D90F95D07E5426FE87E45C0E8184698E45962364E34116177DD2259'
- );
- $this->setOrder(new BigInteger('01FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE9AE2ED07577265DFF7F94451E061E163C61', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283r1.php
deleted file mode 100644
index 32a52e66b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect283r1.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * sect283r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wiggint on <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect283r1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(283, 12, 7, 5, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000000000000000000000000000000000001',
- '027B680AC8B8596DA5A4AF8A19A0303FCA97FD7645309FA2A581485AF6263E313B79A2F5'
- );
- $this->setBasePoint(
- '05F939258DB7DD90E1934F8C70B0DFEC2EED25B8557EAC9C80E2E198F8CDBECD86B12053',
- '03676854FE24141CB98FE6D4B20D02B4516FF702350EDDB0826779C813F0DF45BE8112F4'
- );
- $this->setOrder(new BigInteger('03FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEF90399660FC938A90165B042A7CEFADB307', 16));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409k1.php
deleted file mode 100644
index d9c798a27..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409k1.php
+++ /dev/null
@@ -1,39 +0,0 @@
-<?php
-
-/**
- * sect409k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wiggint on <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect409k1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(409, 87, 0);
- $this->setCoefficients(
- '00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000',
- '00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001'
- );
- $this->setBasePoint(
- '0060F05F658F49C1AD3AB1890F7184210EFD0987E307C84C27ACCFB8F9F67CC2C460189EB5AAAA62EE222EB1B35540CFE9023746',
- '01E369050B7C4E42ACBA1DACBF04299C3460782F918EA427E6325165E9EA10E3DA5F6C42E9C55215AA9CA27A5863EC48D8E0286B'
- );
- $this->setOrder(new BigInteger(
- '7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFE5F' .
- '83B2D4EA20400EC4557D5ED3E3E7CA5B4B5C83B8E01E5FCF', 16
- ));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409r1.php
deleted file mode 100644
index c441180c7..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect409r1.php
+++ /dev/null
@@ -1,39 +0,0 @@
-<?php
-
-/**
- * sect409r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wiggint on <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect409r1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(409, 87, 0);
- $this->setCoefficients(
- '00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001',
- '0021A5C2C8EE9FEB5C4B9A753B7B476B7FD6422EF1F3DD674761FA99D6AC27C8A9A197B272822F6CD57A55AA4F50AE317B13545F'
- );
- $this->setBasePoint(
- '015D4860D088DDB3496B0C6064756260441CDE4AF1771D4DB01FFE5B34E59703DC255A868A1180515603AEAB60794E54BB7996A7',
- '0061B1CFAB6BE5F32BBFA78324ED106A7636B9C5A7BD198D0158AA4F5488D08F38514F1FDF4B4F40D2181B3681C364BA0273C706'
- );
- $this->setOrder(new BigInteger(
- '010000000000000000000000000000000000000000000000000001E2' .
- 'AAD6A612F33307BE5FA47C3C9E052F838164CD37D9A21173', 16
- ));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php
deleted file mode 100644
index c1dd4f11c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php
+++ /dev/null
@@ -1,43 +0,0 @@
-<?php
-
-/**
- * sect571k1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wiggint on <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect571k1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(571, 10, 5, 2, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000000000000000000000000000000000000' .
- '000000000000000000000000000000000000000000000000000000000000000000000000',
- '000000000000000000000000000000000000000000000000000000000000000000000000' .
- '000000000000000000000000000000000000000000000000000000000000000000000001'
- );
- $this->setBasePoint(
- '026EB7A859923FBC82189631F8103FE4AC9CA2970012D5D46024804801841CA443709584' .
- '93B205E647DA304DB4CEB08CBBD1BA39494776FB988B47174DCA88C7E2945283A01C8972',
- '0349DC807F4FBF374F4AEADE3BCA95314DD58CEC9F307A54FFC61EFC006D8A2C9D4979C0' .
- 'AC44AEA74FBEBBB9F772AEDCB620B01A7BA7AF1B320430C8591984F601CD4C143EF1C7A3'
- );
- $this->setOrder(new BigInteger(
- '020000000000000000000000000000000000000000000000000000000000000000000000' .
- '131850E1F19A63E4B391A8DB917F4138B630D84BE5D639381E91DEB45CFE778F637C1001', 16
- ));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php
deleted file mode 100644
index 95239342b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php
+++ /dev/null
@@ -1,43 +0,0 @@
-<?php
-
-/**
- * sect571r1
- *
- * PHP version 5 and 7
- *
- * @category Crypt
- * @package EC
- * @author Jim Wiggint on <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Crypt\EC\Curves;
-
-use phpseclib3\Crypt\EC\BaseCurves\Binary;
-use phpseclib3\Math\BigInteger;
-
-class sect571r1 extends Binary
-{
- public function __construct()
- {
- $this->setModulo(571, 10, 5, 2, 0);
- $this->setCoefficients(
- '000000000000000000000000000000000000000000000000000000000000000000000000' .
- '000000000000000000000000000000000000000000000000000000000000000000000001',
- '02F40E7E2221F295DE297117B7F3D62F5C6A97FFCB8CEFF1CD6BA8CE4A9A18AD84FFABBD' .
- '8EFA59332BE7AD6756A66E294AFD185A78FF12AA520E4DE739BACA0C7FFEFF7F2955727A'
- );
- $this->setBasePoint(
- '0303001D34B856296C16C0D40D3CD7750A93D1D2955FA80AA5F40FC8DB7B2ABDBDE53950' .
- 'F4C0D293CDD711A35B67FB1499AE60038614F1394ABFA3B4C850D927E1E7769C8EEC2D19',
- '037BF27342DA639B6DCCFFFEB73D69D78C6C27A6009CBBCA1980F8533921E8A684423E43' .
- 'BAB08A576291AF8F461BB2A8B3531D2F0485C19B16E2F1516E23DD3C1A4827AF1B8AC15B'
- );
- $this->setOrder(new BigInteger(
- '03FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF' .
- 'E661CE18FF55987308059B186823851EC7DD9CA1161DE93D5174D66E8382E9BB2FE84E47', 16
- ));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/Common.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/Common.php
deleted file mode 100644
index 1993002fc..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/Common.php
+++ /dev/null
@@ -1,555 +0,0 @@
-<?php
-
-/**
- * Generic EC Key Parsing Helper functions
- *
- * PHP version 5
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Crypt\EC\BaseCurves\Base as BaseCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Prime as PrimeCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Binary as BinaryCurve;
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards as TwistedEdwardsCurve;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Math\PrimeField;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Exception\UnsupportedCurveException;
-
-/**
- * Generic EC Key Parsing Helper functions
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-trait Common
-{
- /**
- * Curve OIDs
- *
- * @var array
- */
- private static $curveOIDs = [];
-
- /**
- * Child OIDs loaded
- *
- * @var bool
- */
- protected static $childOIDsLoaded = false;
-
- /**
- * Use Named Curves
- *
- * @var bool
- */
- private static $useNamedCurves = true;
-
- /**
- * Initialize static variables
- */
- private static function initialize_static_variables()
- {
- if (empty(self::$curveOIDs)) {
- // the sec* curves are from the standards for efficient cryptography group
- // sect* curves are curves over binary finite fields
- // secp* curves are curves over prime finite fields
- // sec*r* curves are regular curves; sec*k* curves are koblitz curves
- // brainpool*r* curves are regular prime finite field curves
- // brainpool*t* curves are twisted versions of the brainpool*r* curves
- self::$curveOIDs = [
- 'prime192v1' => '1.2.840.10045.3.1.1', // J.5.1, example 1 (aka secp192r1)
- 'prime192v2' => '1.2.840.10045.3.1.2', // J.5.1, example 2
- 'prime192v3' => '1.2.840.10045.3.1.3', // J.5.1, example 3
- 'prime239v1' => '1.2.840.10045.3.1.4', // J.5.2, example 1
- 'prime239v2' => '1.2.840.10045.3.1.5', // J.5.2, example 2
- 'prime239v3' => '1.2.840.10045.3.1.6', // J.5.2, example 3
- 'prime256v1' => '1.2.840.10045.3.1.7', // J.5.3, example 1 (aka secp256r1)
-
- // https://tools.ietf.org/html/rfc5656#section-10
- 'nistp256' => '1.2.840.10045.3.1.7', // aka secp256r1
- 'nistp384' => '1.3.132.0.34', // aka secp384r1
- 'nistp521' => '1.3.132.0.35', // aka secp521r1
-
- 'nistk163' => '1.3.132.0.1', // aka sect163k1
- 'nistp192' => '1.2.840.10045.3.1.1', // aka secp192r1
- 'nistp224' => '1.3.132.0.33', // aka secp224r1
- 'nistk233' => '1.3.132.0.26', // aka sect233k1
- 'nistb233' => '1.3.132.0.27', // aka sect233r1
- 'nistk283' => '1.3.132.0.16', // aka sect283k1
- 'nistk409' => '1.3.132.0.36', // aka sect409k1
- 'nistb409' => '1.3.132.0.37', // aka sect409r1
- 'nistt571' => '1.3.132.0.38', // aka sect571k1
-
- // from https://tools.ietf.org/html/rfc5915
- 'secp192r1' => '1.2.840.10045.3.1.1', // aka prime192v1
- 'sect163k1' => '1.3.132.0.1',
- 'sect163r2' => '1.3.132.0.15',
- 'secp224r1' => '1.3.132.0.33',
- 'sect233k1'=> '1.3.132.0.26',
- 'sect233r1'=> '1.3.132.0.27',
- 'secp256r1' => '1.2.840.10045.3.1.7', // aka prime256v1
- 'sect283k1' => '1.3.132.0.16',
- 'sect283r1' => '1.3.132.0.17',
- 'secp384r1' => '1.3.132.0.34',
- 'sect409k1' => '1.3.132.0.36',
- 'sect409r1' => '1.3.132.0.37',
- 'secp521r1' => '1.3.132.0.35',
- 'sect571k1' => '1.3.132.0.38',
- 'sect571r1' => '1.3.132.0.39',
- // from http://www.secg.org/SEC2-Ver-1.0.pdf
- 'secp112r1' => '1.3.132.0.6',
- 'secp112r2' => '1.3.132.0.7',
- 'secp128r1' => '1.3.132.0.28',
- 'secp128r2' => '1.3.132.0.29',
- 'secp160k1' => '1.3.132.0.9',
- 'secp160r1' => '1.3.132.0.8',
- 'secp160r2' => '1.3.132.0.30',
- 'secp192k1' => '1.3.132.0.31',
- 'secp224k1' => '1.3.132.0.32',
- 'secp256k1' => '1.3.132.0.10',
-
- 'sect113r1' => '1.3.132.0.4',
- 'sect113r2' => '1.3.132.0.5',
- 'sect131r1' => '1.3.132.0.22',
- 'sect131r2' => '1.3.132.0.23',
- 'sect163r1' => '1.3.132.0.2',
- 'sect193r1' => '1.3.132.0.24',
- 'sect193r2' => '1.3.132.0.25',
- 'sect239k1' => '1.3.132.0.3',
-
- // from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.202.2977&rep=rep1&type=pdf#page=36
- /*
- 'c2pnb163v1' => '1.2.840.10045.3.0.1', // J.4.1, example 1
- 'c2pnb163v2' => '1.2.840.10045.3.0.2', // J.4.1, example 2
- 'c2pnb163v3' => '1.2.840.10045.3.0.3', // J.4.1, example 3
- 'c2pnb172w1' => '1.2.840.10045.3.0.4', // J.4.2, example 1
- 'c2tnb191v1' => '1.2.840.10045.3.0.5', // J.4.3, example 1
- 'c2tnb191v2' => '1.2.840.10045.3.0.6', // J.4.3, example 2
- 'c2tnb191v3' => '1.2.840.10045.3.0.7', // J.4.3, example 3
- 'c2onb191v4' => '1.2.840.10045.3.0.8', // J.4.3, example 4
- 'c2onb191v5' => '1.2.840.10045.3.0.9', // J.4.3, example 5
- 'c2pnb208w1' => '1.2.840.10045.3.0.10', // J.4.4, example 1
- 'c2tnb239v1' => '1.2.840.10045.3.0.11', // J.4.5, example 1
- 'c2tnb239v2' => '1.2.840.10045.3.0.12', // J.4.5, example 2
- 'c2tnb239v3' => '1.2.840.10045.3.0.13', // J.4.5, example 3
- 'c2onb239v4' => '1.2.840.10045.3.0.14', // J.4.5, example 4
- 'c2onb239v5' => '1.2.840.10045.3.0.15', // J.4.5, example 5
- 'c2pnb272w1' => '1.2.840.10045.3.0.16', // J.4.6, example 1
- 'c2pnb304w1' => '1.2.840.10045.3.0.17', // J.4.7, example 1
- 'c2tnb359v1' => '1.2.840.10045.3.0.18', // J.4.8, example 1
- 'c2pnb368w1' => '1.2.840.10045.3.0.19', // J.4.9, example 1
- 'c2tnb431r1' => '1.2.840.10045.3.0.20', // J.4.10, example 1
- */
-
- // http://www.ecc-brainpool.org/download/Domain-parameters.pdf
- // https://tools.ietf.org/html/rfc5639
- 'brainpoolP160r1' => '1.3.36.3.3.2.8.1.1.1',
- 'brainpoolP160t1' => '1.3.36.3.3.2.8.1.1.2',
- 'brainpoolP192r1' => '1.3.36.3.3.2.8.1.1.3',
- 'brainpoolP192t1' => '1.3.36.3.3.2.8.1.1.4',
- 'brainpoolP224r1' => '1.3.36.3.3.2.8.1.1.5',
- 'brainpoolP224t1' => '1.3.36.3.3.2.8.1.1.6',
- 'brainpoolP256r1' => '1.3.36.3.3.2.8.1.1.7',
- 'brainpoolP256t1' => '1.3.36.3.3.2.8.1.1.8',
- 'brainpoolP320r1' => '1.3.36.3.3.2.8.1.1.9',
- 'brainpoolP320t1' => '1.3.36.3.3.2.8.1.1.10',
- 'brainpoolP384r1' => '1.3.36.3.3.2.8.1.1.11',
- 'brainpoolP384t1' => '1.3.36.3.3.2.8.1.1.12',
- 'brainpoolP512r1' => '1.3.36.3.3.2.8.1.1.13',
- 'brainpoolP512t1' => '1.3.36.3.3.2.8.1.1.14'
- ];
- ASN1::loadOIDs([
- 'prime-field' => '1.2.840.10045.1.1',
- 'characteristic-two-field' => '1.2.840.10045.1.2',
- 'characteristic-two-basis' => '1.2.840.10045.1.2.3',
- // per http://www.secg.org/SEC1-Ver-1.0.pdf#page=84, gnBasis "not used here"
- 'gnBasis' => '1.2.840.10045.1.2.3.1', // NULL
- 'tpBasis' => '1.2.840.10045.1.2.3.2', // Trinomial
- 'ppBasis' => '1.2.840.10045.1.2.3.3' // Pentanomial
- ] + self::$curveOIDs);
- }
- }
-
- /**
- * Explicitly set the curve
- *
- * If the key contains an implicit curve phpseclib needs the curve
- * to be explicitly provided
- *
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- */
- public static function setImplicitCurve(BaseCurve $curve)
- {
- self::$implicitCurve = $curve;
- }
-
- /**
- * Returns an instance of \phpseclib3\Crypt\EC\BaseCurves\Base based
- * on the curve parameters
- *
- * @param array $params
- * @return \phpseclib3\Crypt\EC\BaseCurves\Base|false
- */
- protected static function loadCurveByParam(array $params)
- {
- if (count($params) > 1) {
- throw new \RuntimeException('No parameters are present');
- }
- if (isset($params['namedCurve'])) {
- $curve = '\phpseclib3\Crypt\EC\Curves\\' . $params['namedCurve'];
- if (!class_exists($curve)) {
- throw new UnsupportedCurveException('Named Curve of ' . $params['namedCurve'] . ' is not supported');
- }
- return new $curve();
- }
- if (isset($params['implicitCurve'])) {
- if (!isset(self::$implicitCurve)) {
- throw new \RuntimeException('Implicit curves can be provided by calling setImplicitCurve');
- }
- return self::$implicitCurve;
- }
- if (isset($params['specifiedCurve'])) {
- $data = $params['specifiedCurve'];
- switch ($data['fieldID']['fieldType']) {
- case 'prime-field':
- $curve = new PrimeCurve();
- $curve->setModulo($data['fieldID']['parameters']);
- $curve->setCoefficients(
- new BigInteger($data['curve']['a'], 256),
- new BigInteger($data['curve']['b'], 256)
- );
- $point = self::extractPoint("\0" . $data['base'], $curve);
- $curve->setBasePoint(...$point);
- $curve->setOrder($data['order']);
- return $curve;
- case 'characteristic-two-field':
- $curve = new BinaryCurve();
- $params = ASN1::decodeBER($data['fieldID']['parameters']);
- $params = ASN1::asn1map($params[0], Maps\Characteristic_two::MAP);
- $modulo = [(int) $params['m']->toString()];
- switch ($params['basis']) {
- case 'tpBasis':
- $modulo[] = (int) $params['parameters']->toString();
- break;
- case 'ppBasis':
- $temp = ASN1::decodeBER($params['parameters']);
- $temp = ASN1::asn1map($temp[0], Maps\Pentanomial::MAP);
- $modulo[] = (int) $temp['k3']->toString();
- $modulo[] = (int) $temp['k2']->toString();
- $modulo[] = (int) $temp['k1']->toString();
- }
- $modulo[] = 0;
- $curve->setModulo(...$modulo);
- $len = ceil($modulo[0] / 8);
- $curve->setCoefficients(
- Hex::encode($data['curve']['a']),
- Hex::encode($data['curve']['b'])
- );
- $point = self::extractPoint("\0" . $data['base'], $curve);
- $curve->setBasePoint(...$point);
- $curve->setOrder($data['order']);
- return $curve;
- default:
- throw new UnsupportedCurveException('Field Type of ' . $data['fieldID']['fieldType'] . ' is not supported');
- }
- }
- throw new \RuntimeException('No valid parameters are present');
- }
-
- /**
- * Extract points from a string
- *
- * Supports both compressed and uncompressed points
- *
- * @param string $str
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @return object[]
- */
- public static function extractPoint($str, BaseCurve $curve)
- {
- if ($curve instanceof TwistedEdwardsCurve) {
- // first step of point deciding as discussed at the following URL's:
- // https://tools.ietf.org/html/rfc8032#section-5.1.3
- // https://tools.ietf.org/html/rfc8032#section-5.2.3
- $y = $str;
- $y = strrev($y);
- $sign = (bool) (ord($y[0]) & 0x80);
- $y[0] = $y[0] & chr(0x7F);
- $y = new BigInteger($y, 256);
- if ($y->compare($curve->getModulo()) >= 0) {
- throw new \RuntimeException('The Y coordinate should not be >= the modulo');
- }
- $point = $curve->recoverX($y, $sign);
- if (!$curve->verifyPoint($point)) {
- throw new \RuntimeException('Unable to verify that point exists on curve');
- }
- return $point;
- }
-
- // the first byte of a bit string represents the number of bits in the last byte that are to be ignored but,
- // currently, bit strings wanting a non-zero amount of bits trimmed are not supported
- if (($val = Strings::shift($str)) != "\0") {
- throw new \UnexpectedValueException('extractPoint expects the first byte to be null - not ' . Hex::encode($val));
- }
- if ($str == "\0") {
- return [];
- }
-
- $keylen = strlen($str);
- $order = $curve->getLengthInBytes();
- // point compression is being used
- if ($keylen == $order + 1) {
- return $curve->derivePoint($str);
- }
-
- // point compression is not being used
- if ($keylen == 2 * $order + 1) {
- preg_match("#(.)(.{{$order}})(.{{$order}})#s", $str, $matches);
- list(, $w, $x, $y) = $matches;
- if ($w != "\4") {
- throw new \UnexpectedValueException('The first byte of an uncompressed point should be 04 - not ' . Hex::encode($val));
- }
- $point = [
- $curve->convertInteger(new BigInteger($x, 256)),
- $curve->convertInteger(new BigInteger($y, 256))
- ];
-
- if (!$curve->verifyPoint($point)) {
- throw new \RuntimeException('Unable to verify that point exists on curve');
- }
-
- return $point;
- }
-
- throw new \UnexpectedValueException('The string representation of the points is not of an appropriate length');
- }
-
- /**
- * Encode Parameters
- *
- * @todo Maybe at some point this could be moved to __toString() for each of the curves?
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param bool $returnArray optional
- * @param array $options optional
- * @return string|false
- */
- private static function encodeParameters(BaseCurve $curve, $returnArray = false, array $options = [])
- {
- $useNamedCurves = isset($options['namedCurve']) ? $options['namedCurve'] : self::$useNamedCurves;
-
- $reflect = new \ReflectionClass($curve);
- $name = $reflect->getShortName();
- if ($useNamedCurves) {
- if (isset(self::$curveOIDs[$name])) {
- if ($reflect->isFinal()) {
- $reflect = $reflect->getParentClass();
- $name = $reflect->getShortName();
- }
- return $returnArray ?
- ['namedCurve' => $name] :
- ASN1::encodeDER(['namedCurve' => $name], Maps\ECParameters::MAP);
- }
- foreach (new \DirectoryIterator(__DIR__ . '/../../Curves/') as $file) {
- if ($file->getExtension() != 'php') {
- continue;
- }
- $testName = $file->getBasename('.php');
- $class = 'phpseclib3\Crypt\EC\Curves\\' . $testName;
- $reflect = new \ReflectionClass($class);
- if ($reflect->isFinal()) {
- continue;
- }
- $candidate = new $class();
- switch ($name) {
- case 'Prime':
- if (!$candidate instanceof PrimeCurve) {
- break;
- }
- if (!$candidate->getModulo()->equals($curve->getModulo())) {
- break;
- }
- if ($candidate->getA()->toBytes() != $curve->getA()->toBytes()) {
- break;
- }
- if ($candidate->getB()->toBytes() != $curve->getB()->toBytes()) {
- break;
- }
-
- list($candidateX, $candidateY) = $candidate->getBasePoint();
- list($curveX, $curveY) = $curve->getBasePoint();
- if ($candidateX->toBytes() != $curveX->toBytes()) {
- break;
- }
- if ($candidateY->toBytes() != $curveY->toBytes()) {
- break;
- }
-
- return $returnArray ?
- ['namedCurve' => $testName] :
- ASN1::encodeDER(['namedCurve' => $testName], Maps\ECParameters::MAP);
- case 'Binary':
- if (!$candidate instanceof BinaryCurve) {
- break;
- }
- if ($candidate->getModulo() != $curve->getModulo()) {
- break;
- }
- if ($candidate->getA()->toBytes() != $curve->getA()->toBytes()) {
- break;
- }
- if ($candidate->getB()->toBytes() != $curve->getB()->toBytes()) {
- break;
- }
-
- list($candidateX, $candidateY) = $candidate->getBasePoint();
- list($curveX, $curveY) = $curve->getBasePoint();
- if ($candidateX->toBytes() != $curveX->toBytes()) {
- break;
- }
- if ($candidateY->toBytes() != $curveY->toBytes()) {
- break;
- }
-
- return $returnArray ?
- ['namedCurve' => $testName] :
- ASN1::encodeDER(['namedCurve' => $testName], Maps\ECParameters::MAP);
- }
- }
- }
-
- $order = $curve->getOrder();
- // we could try to calculate the order thusly:
- // https://crypto.stackexchange.com/a/27914/4520
- // https://en.wikipedia.org/wiki/Schoof%E2%80%93Elkies%E2%80%93Atkin_algorithm
- if (!$order) {
- throw new \RuntimeException('Specified Curves need the order to be specified');
- }
- $point = $curve->getBasePoint();
- $x = $point[0]->toBytes();
- $y = $point[1]->toBytes();
-
- if ($curve instanceof PrimeCurve) {
- /*
- * valid versions are:
- *
- * ecdpVer1:
- * - neither the curve or the base point are generated verifiably randomly.
- * ecdpVer2:
- * - curve and base point are generated verifiably at random and curve.seed is present
- * ecdpVer3:
- * - base point is generated verifiably at random but curve is not. curve.seed is present
- */
- // other (optional) parameters can be calculated using the methods discused at
- // https://crypto.stackexchange.com/q/28947/4520
- $data = [
- 'version' => 'ecdpVer1',
- 'fieldID' => [
- 'fieldType' => 'prime-field',
- 'parameters' => $curve->getModulo()
- ],
- 'curve' => [
- 'a' => $curve->getA()->toBytes(),
- 'b' => $curve->getB()->toBytes()
- ],
- 'base' => "\4" . $x . $y,
- 'order' => $order
- ];
-
- return $returnArray ?
- ['specifiedCurve' => $data] :
- ASN1::encodeDER(['specifiedCurve' => $data], Maps\ECParameters::MAP);
- }
- if ($curve instanceof BinaryCurve) {
- $modulo = $curve->getModulo();
- $basis = count($modulo);
- $m = array_shift($modulo);
- array_pop($modulo); // the last parameter should always be 0
- //rsort($modulo);
- switch ($basis) {
- case 3:
- $basis = 'tpBasis';
- $modulo = new BigInteger($modulo[0]);
- break;
- case 5:
- $basis = 'ppBasis';
- // these should be in strictly ascending order (hence the commented out rsort above)
- $modulo = [
- 'k1' => new BigInteger($modulo[2]),
- 'k2' => new BigInteger($modulo[1]),
- 'k3' => new BigInteger($modulo[0])
- ];
- $modulo = ASN1::encodeDER($modulo, Maps\Pentanomial::MAP);
- $modulo = new ASN1\Element($modulo);
- }
- $params = ASN1::encodeDER([
- 'm' => new BigInteger($m),
- 'basis' => $basis,
- 'parameters' => $modulo
- ], Maps\Characteristic_two::MAP);
- $params = new ASN1\Element($params);
- $a = ltrim($curve->getA()->toBytes(), "\0");
- if (!strlen($a)) {
- $a = "\0";
- }
- $b = ltrim($curve->getB()->toBytes(), "\0");
- if (!strlen($b)) {
- $b = "\0";
- }
- $data = [
- 'version' => 'ecdpVer1',
- 'fieldID' => [
- 'fieldType' => 'characteristic-two-field',
- 'parameters' => $params
- ],
- 'curve' => [
- 'a' => $a,
- 'b' => $b
- ],
- 'base' => "\4" . $x . $y,
- 'order' => $order
- ];
-
- return $returnArray ?
- ['specifiedCurve' => $data] :
- ASN1::encodeDER(['specifiedCurve' => $data], Maps\ECParameters::MAP);
- }
-
- throw new UnsupportedCurveException('Curve cannot be serialized');
- }
-
- /**
- * Use Specified Curve
- *
- * A specified curve has all the coefficients, the base points, etc, explicitely included.
- * A specified curve is a more verbose way of representing a curve
- */
- public static function useSpecifiedCurve()
- {
- self::$useNamedCurves = false;
- }
-
- /**
- * Use Named Curve
- *
- * A named curve does not include any parameters. It is up to the EC parameters to
- * know what the coefficients, the base points, etc, are from the name of the curve.
- * A named curve is a more concise way of representing a curve
- */
- public static function useNamedCurve()
- {
- self::$useNamedCurves = true;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPrivate.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPrivate.php
deleted file mode 100644
index b0c850100..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPrivate.php
+++ /dev/null
@@ -1,108 +0,0 @@
-<?php
-
-/**
- * Montgomery Private Key Handler
- *
- * "Naked" Curve25519 private keys can pretty much be any sequence of random 32x bytes so unless
- * we have a "hidden" key handler pretty much every 32 byte string will be loaded as a curve25519
- * private key even if it probably isn't one by PublicKeyLoader.
- *
- * "Naked" Curve25519 public keys also a string of 32 bytes so distinguishing between a "naked"
- * curve25519 private key and a public key is nigh impossible, hence separate plugins for each
- *
- * PHP version 5
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use phpseclib3\Crypt\EC\Curves\Curve25519;
-use phpseclib3\Crypt\EC\Curves\Curve448;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve;
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Exception\UnsupportedFormatException;
-
-/**
- * Montgomery Curve Private Key Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class MontgomeryPrivate
-{
- /**
- * Is invisible flag
- *
- * @access private
- */
- const IS_INVISIBLE = true;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- switch (strlen($key)) {
- case 32:
- $curve = new Curve25519;
- break;
- case 56:
- $curve = new Curve448;
- break;
- default:
- throw new \LengthException('The only supported lengths are 32 and 56');
- }
-
- $components = ['curve' => $curve];
- $components['dA'] = $components['curve']->convertInteger(new BigInteger($key, 256));
- // note that EC::getEncodedCoordinates does some additional "magic" (it does strrev on the result)
- $components['QA'] = $components['curve']->multiplyPoint($components['curve']->getBasePoint(), $components['dA']);
-
- return $components;
- }
-
- /**
- * Convert an EC public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Crypt\EC\BaseCurves\Montgomery $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @return string
- */
- public static function savePublicKey(MontgomeryCurve $curve, array $publicKey)
- {
- return strrev($publicKey[0]->toBytes());
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\Common\FiniteField\Integer $privateKey
- * @param \phpseclib3\Crypt\EC\BaseCurves\Montgomery $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param string $password optional
- * @return string
- */
- public static function savePrivateKey(Integer $privateKey, MontgomeryCurve $curve, array $publicKey, $password = '')
- {
- if (!empty($password) && is_string($password)) {
- throw new UnsupportedFormatException('MontgomeryPrivate private keys do not support encryption');
- }
-
- return $privateKey->toBytes();
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPublic.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPublic.php
deleted file mode 100644
index 72dc80b17..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/MontgomeryPublic.php
+++ /dev/null
@@ -1,79 +0,0 @@
-<?php
-
-/**
- * Montgomery Public Key Handler
- *
- * PHP version 5
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use phpseclib3\Crypt\EC\Curves\Curve25519;
-use phpseclib3\Crypt\EC\Curves\Curve448;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve;
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Math\BigInteger;
-
-/**
- * Montgomery Public Key Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class MontgomeryPublic
-{
- /**
- * Is invisible flag
- *
- * @access private
- */
- const IS_INVISIBLE = true;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- switch (strlen($key)) {
- case 32:
- $curve = new Curve25519;
- break;
- case 56:
- $curve = new Curve448;
- break;
- default:
- throw new \LengthException('The only supported lengths are 32 and 56');
- }
-
- $components = ['curve' => $curve];
- $components['QA'] = [$components['curve']->convertInteger(new BigInteger(strrev($key), 256))];
-
- return $components;
- }
-
- /**
- * Convert an EC public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Crypt\EC\BaseCurves\Montgomery $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @return string
- */
- public static function savePublicKey(MontgomeryCurve $curve, array $publicKey)
- {
- return strrev($publicKey[0]->toBytes());
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/OpenSSH.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/OpenSSH.php
deleted file mode 100644
index 5372e11bb..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/OpenSSH.php
+++ /dev/null
@@ -1,216 +0,0 @@
-<?php
-
-/**
- * OpenSSH Formatted EC Key Handler
- *
- * PHP version 5
- *
- * Place in $HOME/.ssh/authorized_keys
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Common\Formats\Keys\OpenSSH as Progenitor;
-use phpseclib3\Crypt\EC\BaseCurves\Base as BaseCurve;
-use phpseclib3\Exception\UnsupportedCurveException;
-use phpseclib3\Crypt\EC\Curves\Ed25519;
-use phpseclib3\Math\Common\FiniteField\Integer;
-
-/**
- * OpenSSH Formatted EC Key Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OpenSSH extends Progenitor
-{
- use Common;
-
- /**
- * Supported Key Types
- *
- * @var array
- */
- protected static $types = [
- 'ecdsa-sha2-nistp256',
- 'ecdsa-sha2-nistp384',
- 'ecdsa-sha2-nistp521',
- 'ssh-ed25519'
- ];
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- $parsed = parent::load($key, $password);
-
- if (isset($parsed['paddedKey'])) {
- $paddedKey = $parsed['paddedKey'];
- list($type) = Strings::unpackSSH2('s', $paddedKey);
- if ($type != $parsed['type']) {
- throw new \RuntimeException("The public and private keys are not of the same type ($type vs $parsed[type])");
- }
- if ($type == 'ssh-ed25519' ) {
- list(, $key, $comment) = Strings::unpackSSH2('sss', $paddedKey);
- $key = libsodium::load($key);
- $key['comment'] = $comment;
- return $key;
- }
- list($curveName, $publicKey, $privateKey, $comment) = Strings::unpackSSH2('ssis', $paddedKey);
- $curve = self::loadCurveByParam(['namedCurve' => $curveName]);
- return [
- 'curve' => $curve,
- 'dA' => $curve->convertInteger($privateKey),
- 'QA' => self::extractPoint("\0$publicKey", $curve),
- 'comment' => $comment
- ];
- }
-
- if ($parsed['type'] == 'ssh-ed25519') {
- if (Strings::shift($parsed['publicKey'], 4) != "\0\0\0\x20") {
- throw new \RuntimeException('Length of ssh-ed25519 key should be 32');
- }
-
- $curve = new Ed25519();
- $qa = self::extractPoint($parsed['publicKey'], $curve);
- } else {
- list($curveName, $publicKey) = Strings::unpackSSH2('ss', $parsed['publicKey']);
- $curveName = '\phpseclib3\Crypt\EC\Curves\\' . $curveName;
- $curve = new $curveName();
-
- $qa = self::extractPoint("\0" . $publicKey, $curve);
- }
-
- return [
- 'curve' => $curve,
- 'QA' => $qa,
- 'comment' => $parsed['comment']
- ];
- }
-
- /**
- * Returns the alias that corresponds to a curve
- *
- * @return string
- */
- private static function getAlias(BaseCurve $curve)
- {
- self::initialize_static_variables();
-
- $reflect = new \ReflectionClass($curve);
- $name = $reflect->getShortName();
-
- $oid = self::$curveOIDs[$name];
- $aliases = array_filter(self::$curveOIDs, function($v) use ($oid) {
- return $v == $oid;
- });
- $aliases = array_keys($aliases);
-
- for ($i = 0; $i < count($aliases); $i++) {
- if (in_array('ecdsa-sha2-' . $aliases[$i], self::$types)) {
- $alias = $aliases[$i];
- break;
- }
- }
-
- if (!isset($alias)) {
- throw new UnsupportedCurveException($name . ' is not a curve that the OpenSSH plugin supports');
- }
-
- return $alias;
- }
-
- /**
- * Convert an EC public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BaseCurve $curve, array $publicKey, array $options = [])
- {
- $comment = isset($options['comment']) ? $options['comment'] : self::$comment;
-
- if ($curve instanceof Ed25519) {
- $key = Strings::packSSH2('ss', 'ssh-ed25519', $curve->encodePoint($publicKey));
-
- if (isset($options['binary']) ? $options['binary'] : self::$binary) {
- return $key;
- }
-
- $key = 'ssh-ed25519 ' . base64_encode($key) . ' ' . $comment;
- return $key;
- }
-
- $alias = self::getAlias($curve);
-
- $points = "\4" . $publicKey[0]->toBytes() . $publicKey[1]->toBytes();
- $key = Strings::packSSH2('sss', 'ecdsa-sha2-' . $alias, $alias, $points);
-
- if (isset($options['binary']) ? $options['binary'] : self::$binary) {
- return $key;
- }
-
- $key = 'ecdsa-sha2-' . $alias . ' ' . base64_encode($key) . ' ' . $comment;
-
- return $key;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\Common\FiniteField\Integer $privateKey
- * @param \phpseclib3\Crypt\EC\Curves\Ed25519 $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(Integer $privateKey, BaseCurve $curve, array $publicKey, $password = '', array $options = [])
- {
- if ($curve instanceof Ed25519) {
- if (!isset($privateKey->secret)) {
- throw new \RuntimeException('Private Key does not have a secret set');
- }
- if (strlen($privateKey->secret) != 32) {
- throw new \RuntimeException('Private Key secret is not of the correct length');
- }
-
- $pubKey = $curve->encodePoint($publicKey);
-
- $publicKey = Strings::packSSH2('ss', 'ssh-ed25519', $pubKey);
- $privateKey = Strings::packSSH2('sss', 'ssh-ed25519', $pubKey, $privateKey->secret . $pubKey);
-
- return self::wrapPrivateKey($publicKey, $privateKey, $password, $options);
- }
-
- $alias = self::getAlias($curve);
-
- $points = "\4" . $publicKey[0]->toBytes() . $publicKey[1]->toBytes();
- $publicKey = self::savePublicKey($curve, $publicKey, ['binary' => true]);
-
- $privateKey = Strings::packSSH2('sssi', 'ecdsa-sha2-' . $alias, $alias, $points, $privateKey);
-
- return self::wrapPrivateKey($publicKey, $privateKey, $password, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS1.php
deleted file mode 100644
index b28492bcd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS1.php
+++ /dev/null
@@ -1,203 +0,0 @@
-<?php
-
-/**
- * "PKCS1" (RFC5915) Formatted EC Key Handler
- *
- * PHP version 5
- *
- * Used by File/X509.php
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN EC PRIVATE KEY-----
- * -----BEGIN EC PARAMETERS-----
- *
- * Technically, PKCS1 is for RSA keys, only, but we're using PKCS1 to describe
- * DSA, whose format isn't really formally described anywhere, so might as well
- * use it to describe this, too. PKCS1 is easier to remember than RFC5915, after
- * all. I suppose this could also be named IETF but idk
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS1 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Crypt\EC\BaseCurves\Base as BaseCurve;
-use phpseclib3\Math\BigInteger;
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards as TwistedEdwardsCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve;
-use phpseclib3\Exception\UnsupportedCurveException;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * "PKCS1" (RFC5915) Formatted EC Key Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS1 extends Progenitor
-{
- use Common;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- self::initialize_static_variables();
-
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- if (strpos($key, 'BEGIN EC PARAMETERS') && strpos($key, 'BEGIN EC PRIVATE KEY')) {
- $components = [];
-
- preg_match('#-*BEGIN EC PRIVATE KEY-*[^-]*-*END EC PRIVATE KEY-*#s', $key, $matches);
- $decoded = parent::load($matches[0], $password);
- $decoded = ASN1::decodeBER($decoded);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER');
- }
-
- $ecPrivate = ASN1::asn1map($decoded[0], Maps\ECPrivateKey::MAP);
- if (!is_array($ecPrivate)) {
- throw new \RuntimeException('Unable to perform ASN1 mapping');
- }
-
- if (isset($ecPrivate['parameters'])) {
- $components['curve'] = self::loadCurveByParam($ecPrivate['parameters']);
- }
-
- preg_match('#-*BEGIN EC PARAMETERS-*[^-]*-*END EC PARAMETERS-*#s', $key, $matches);
- $decoded = parent::load($matches[0], '');
- $decoded = ASN1::decodeBER($decoded);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER');
- }
- $ecParams = ASN1::asn1map($decoded[0], Maps\ECParameters::MAP);
- if (!is_array($ecParams)) {
- throw new \RuntimeException('Unable to perform ASN1 mapping');
- }
- $ecParams = self::loadCurveByParam($ecParams);
-
- // comparing $ecParams and $components['curve'] directly won't work because they'll have different Math\Common\FiniteField classes
- // even if the modulo is the same
- if (isset($components['curve']) && self::encodeParameters($ecParams, false, []) != self::encodeParameters($components['curve'], false, [])) {
- throw new \RuntimeException('EC PARAMETERS does not correspond to EC PRIVATE KEY');
- }
-
- if (!isset($components['curve'])) {
- $components['curve'] = $ecParams;
- }
-
- $temp = new BigInteger($ecPrivate['privateKey'], 256);
- $components['dA'] = $components['curve']->convertInteger($temp);
- $components['QA'] = isset($ecPrivate['publicKey']) ?
- self::extractPoint($ecPrivate['publicKey'], $components['curve']) :
- $components['curve']->multiplyPoint($components['curve']->getBasePoint(), $components['dA']);
-
- return $components;
- }
-
- $key = parent::load($key, $password);
-
- $decoded = ASN1::decodeBER($key);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER');
- }
-
- $key = ASN1::asn1map($decoded[0], Maps\ECParameters::MAP);
- if (is_array($key)) {
- return ['curve' => self::loadCurveByParam($key)];
- }
-
- $key = ASN1::asn1map($decoded[0], Maps\ECPrivateKey::MAP);
- if (!is_array($key)) {
- throw new \RuntimeException('Unable to perform ASN1 mapping');
- }
- if (!isset($key['parameters'])) {
- throw new \RuntimeException('Key cannot be loaded without parameters');
- }
-
- $components = [];
- $components['curve'] = self::loadCurveByParam($key['parameters']);
- $temp = new BigInteger($key['privateKey'], 256);
- $components['dA'] = $components['curve']->convertInteger($temp);
- $components['QA'] = isset($ecPrivate['publicKey']) ?
- self::extractPoint($ecPrivate['publicKey'], $components['curve']) :
- $components['curve']->multiplyPoint($components['curve']->getBasePoint(), $components['dA']);
-
- return $components;
- }
-
- /**
- * Convert EC parameters to the appropriate format
- *
- * @access public
- * @return string
- */
- public static function saveParameters(BaseCurve $curve, array $options = [])
- {
- self::initialize_static_variables();
-
- if ($curve instanceof TwistedEdwardsCurve || $curve instanceof MontgomeryCurve) {
- throw new UnsupportedCurveException('TwistedEdwards and Montgomery Curves are not supported');
- }
-
- $key = self::encodeParameters($curve, false, $options);
-
- return "-----BEGIN EC PARAMETERS-----\r\n" .
- chunk_split(Base64::encode($key), 64) .
- "-----END EC PARAMETERS-----\r\n";
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\Common\FiniteField\Integer $privateKey
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(Integer $privateKey, BaseCurve $curve, array $publicKey, $password = '', array $options = [])
- {
- self::initialize_static_variables();
-
- if ($curve instanceof TwistedEdwardsCurve || $curve instanceof MontgomeryCurve) {
- throw new UnsupportedCurveException('TwistedEdwards Curves are not supported');
- }
-
- $publicKey = "\4" . $publicKey[0]->toBytes() . $publicKey[1]->toBytes();
-
- $key = [
- 'version' => 'ecPrivkeyVer1',
- 'privateKey' => $privateKey->toBytes(),
- 'parameters' => new ASN1\Element(self::encodeParameters($curve)),
- 'publicKey' => "\0" . $publicKey
- ];
-
- $key = ASN1::encodeDER($key, Maps\ECPrivateKey::MAP);
-
- return self::wrapPrivateKey($key, 'EC', $password, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS8.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS8.php
deleted file mode 100644
index 247beedb2..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS8.php
+++ /dev/null
@@ -1,249 +0,0 @@
-<?php
-
-/**
- * PKCS#8 Formatted EC Key Handler
- *
- * PHP version 5
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN ENCRYPTED PRIVATE KEY-----
- * -----BEGIN PRIVATE KEY-----
- * -----BEGIN PUBLIC KEY-----
- *
- * Analogous to ssh-keygen's pkcs8 format (as specified by -m). Although PKCS8
- * is specific to private keys it's basically creating a DER-encoded wrapper
- * for keys. This just extends that same concept to public keys (much like ssh-keygen)
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Crypt\EC\BaseCurves\Base as BaseCurve;
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards as TwistedEdwardsCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve;
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Crypt\EC\Curves\Ed25519;
-use phpseclib3\Crypt\EC\Curves\Ed448;
-use phpseclib3\Exception\UnsupportedCurveException;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * PKCS#8 Formatted EC Key Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS8 extends Progenitor
-{
- use Common;
-
- /**
- * OID Name
- *
- * @var array
- * @access private
- */
- const OID_NAME = ['id-ecPublicKey', 'id-Ed25519', 'id-Ed448'];
-
- /**
- * OID Value
- *
- * @var string
- * @access private
- */
- const OID_VALUE = ['1.2.840.10045.2.1', '1.3.101.112', '1.3.101.113'];
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- // initialize_static_variables() is defined in both the trait and the parent class
- // when it's defined in two places it's the traits one that's called
- // the parent one is needed, as well, but the parent one is called by other methods
- // in the parent class as needed and in the context of the parent it's the parent
- // one that's called
- self::initialize_static_variables();
-
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- $isPublic = strpos($key, 'PUBLIC') !== false;
-
- $key = parent::load($key, $password);
-
- $type = isset($key['privateKey']) ? 'privateKey' : 'publicKey';
-
- switch (true) {
- case !$isPublic && $type == 'publicKey':
- throw new \UnexpectedValueException('Human readable string claims non-public key but DER encoded string claims public key');
- case $isPublic && $type == 'privateKey':
- throw new \UnexpectedValueException('Human readable string claims public key but DER encoded string claims private key');
- }
-
- switch ($key[$type . 'Algorithm']['algorithm']) {
- case 'id-Ed25519':
- case 'id-Ed448':
- return self::loadEdDSA($key);
- }
-
- $decoded = ASN1::decodeBER($key[$type . 'Algorithm']['parameters']->element);
- $params = ASN1::asn1map($decoded[0], Maps\ECParameters::MAP);
- if (!$params) {
- throw new \RuntimeException('Unable to decode the parameters using Maps\ECParameters');
- }
-
- $components = [];
- $components['curve'] = self::loadCurveByParam($params);
-
- if ($isPublic) {
- $components['QA'] = self::extractPoint("\0" . $key['publicKey'], $components['curve']);
-
- return $components;
- }
-
- $decoded = ASN1::decodeBER($key['privateKey']);
- $key = ASN1::asn1map($decoded[0], Maps\ECPrivateKey::MAP);
- if (isset($key['parameters']) && $params != $key['parameters']) {
- throw new \RuntimeException('The PKCS8 parameter field does not match the private key parameter field');
- }
-
- $temp = new BigInteger($key['privateKey'], 256);
- $components['dA'] = $components['curve']->convertInteger($temp);
-
- $components['QA'] = self::extractPoint($key['publicKey'], $components['curve']);
-
- return $components;
- }
-
- /**
- * Break a public or private EdDSA key down into its constituent components
- *
- * @return array
- */
- private static function loadEdDSA(array $key)
- {
- $components = [];
-
- if (isset($key['privateKey'])) {
- $components['curve'] = $key['privateKeyAlgorithm']['algorithm'] == 'id-Ed25519' ? new Ed25519() : new Ed448();
-
- // 0x04 == octet string
- // 0x20 == length (32 bytes)
- if (substr($key['privateKey'], 0, 2) != "\x04\x20") {
- throw new \RuntimeException('The first two bytes of the private key field should be 0x0420');
- }
- $components['dA'] = $components['curve']->extractSecret(substr($key['privateKey'], 2));
- }
-
- if (isset($key['publicKey'])) {
- if (!isset($components['curve'])) {
- $components['curve'] = $key['publicKeyAlgorithm']['algorithm'] == 'id-Ed25519' ? new Ed25519() : new Ed448();
- }
-
- $components['QA'] = self::extractPoint($key['publicKey'], $components['curve']);
- }
-
- if (isset($key['privateKey']) && !isset($components['QA'])) {
- $components['QA'] = $components['curve']->multiplyPoint($components['curve']->getBasePoint(), $components['dA']);
- }
-
- return $components;
- }
-
- /**
- * Convert an EC public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BaseCurve $curve, array $publicKey, array $options = [])
- {
- self::initialize_static_variables();
-
- if ($curve instanceof MontgomeryCurve) {
- throw new UnsupportedCurveException('Montgomery Curves are not supported');
- }
-
- if ($curve instanceof TwistedEdwardsCurve) {
- return self::wrapPublicKey(
- $curve->encodePoint($publicKey),
- null,
- $curve instanceof Ed25519 ? 'id-Ed25519' : 'id-Ed448'
- );
- }
-
- $params = new ASN1\Element(self::encodeParameters($curve, false, $options));
-
- $key = "\4" . $publicKey[0]->toBytes() . $publicKey[1]->toBytes();
-
- return self::wrapPublicKey($key, $params, 'id-ecPublicKey');
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\Common\FiniteField\Integer $privateKey
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(Integer $privateKey, BaseCurve $curve, array $publicKey, $password = '', array $options = [])
- {
- self::initialize_static_variables();
-
- if ($curve instanceof MontgomeryCurve) {
- throw new UnsupportedCurveException('Montgomery Curves are not supported');
- }
-
- if ($curve instanceof TwistedEdwardsCurve) {
- return self::wrapPrivateKey(
- "\x04\x20" . $privateKey->secret,
- [],
- null,
- $password,
- $curve instanceof Ed25519 ? 'id-Ed25519' : 'id-Ed448',
- "\0" . $curve->encodePoint($publicKey)
- );
- }
-
- $publicKey = "\4" . $publicKey[0]->toBytes() . $publicKey[1]->toBytes();
-
- $params = new ASN1\Element(self::encodeParameters($curve, false, $options));
-
- $key = [
- 'version' => 'ecPrivkeyVer1',
- 'privateKey' => $privateKey->toBytes(),
- //'parameters' => $params,
- 'publicKey' => "\0" . $publicKey
- ];
-
- $key = ASN1::encodeDER($key, Maps\ECPrivateKey::MAP);
-
- return self::wrapPrivateKey($key, [], $params, $password, 'id-ecPublicKey', '', $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PuTTY.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PuTTY.php
deleted file mode 100644
index 181ab76c9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PuTTY.php
+++ /dev/null
@@ -1,146 +0,0 @@
-<?php
-
-/**
- * PuTTY Formatted EC Key Handler
- *
- * PHP version 5
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Common\Formats\Keys\PuTTY as Progenitor;
-use phpseclib3\Crypt\EC\BaseCurves\Base as BaseCurve;
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards as TwistedEdwardsCurve;
-
-/**
- * PuTTY Formatted EC Key Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PuTTY extends Progenitor
-{
- use Common;
-
- /**
- * Public Handler
- *
- * @var string
- * @access private
- */
- const PUBLIC_HANDLER = 'phpseclib3\Crypt\EC\Formats\Keys\OpenSSH';
-
- /**
- * Supported Key Types
- *
- * @var array
- * @access private
- */
- protected static $types = [
- 'ecdsa-sha2-nistp256',
- 'ecdsa-sha2-nistp384',
- 'ecdsa-sha2-nistp521',
- 'ssh-ed25519'
- ];
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- $components = parent::load($key, $password);
- if (!isset($components['private'])) {
- return $components;
- }
-
- $private = $components['private'];
-
- $temp = Base64::encode(Strings::packSSH2('s', $components['type']) . $components['public']);
- $components = OpenSSH::load($components['type'] . ' ' . $temp . ' ' . $components['comment']);
-
- if ($components['curve'] instanceof TwistedEdwardsCurve) {
- if (Strings::shift($private, 4) != "\0\0\0\x20") {
- throw new \RuntimeException('Length of ssh-ed25519 key should be 32');
- }
- $components['dA'] = $components['curve']->extractSecret($private);
- } else {
- list($temp) = Strings::unpackSSH2('i', $private);
- $components['dA'] = $components['curve']->convertInteger($temp);
- }
-
- return $components;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\Common\FiniteField\Integer $privateKey
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(Integer $privateKey, BaseCurve $curve, array $publicKey, $password = false, array $options = [])
- {
- self::initialize_static_variables();
-
- $public = explode(' ', OpenSSH::savePublicKey($curve, $publicKey));
- $name = $public[0];
- $public = Base64::decode($public[1]);
- list(, $length) = unpack('N', Strings::shift($public, 4));
- Strings::shift($public, $length);
-
- // PuTTY pads private keys with a null byte per the following:
- // https://github.com/github/putty/blob/a3d14d77f566a41fc61dfdc5c2e0e384c9e6ae8b/sshecc.c#L1926
- if (!$curve instanceof TwistedEdwardsCurve) {
- $private = $privateKey->toBytes();
- if (!(strlen($privateKey->toBits()) & 7)) {
- $private ="\0$private";
- }
- }
-
- $private = $curve instanceof TwistedEdwardsCurve ?
- Strings::packSSH2('s', $privateKey->secret) :
- Strings::packSSH2('s', $private);
-
- return self::wrapPrivateKey($public, $private, $name, $password, $options);
- }
-
- /**
- * Convert an EC public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param \phpseclib3\Math\Common\FiniteField[] $publicKey
- * @return string
- */
- public static function savePublicKey(BaseCurve $curve, array $publicKey)
- {
- $public = explode(' ', OpenSSH::savePublicKey($curve, $publicKey));
- $type = $public[0];
- $public = Base64::decode($public[1]);
- list(, $length) = unpack('N', Strings::shift($public, 4));
- Strings::shift($public, $length);
-
- return self::wrapPublicKey($public, $type);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/XML.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/XML.php
deleted file mode 100644
index d6d8018ad..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/XML.php
+++ /dev/null
@@ -1,484 +0,0 @@
-<?php
-
-/**
- * XML Formatted EC Key Handler
- *
- * More info:
- *
- * https://www.w3.org/TR/xmldsig-core/#sec-ECKeyValue
- * http://en.wikipedia.org/wiki/XML_Signature
- *
- * PHP version 5
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\EC\BaseCurves\Base as BaseCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Prime as PrimeCurve;
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards as TwistedEdwardsCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Exception\UnsupportedCurveException;
-
-/**
- * XML Formatted EC Key Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class XML
-{
- use Common;
-
- /**
- * Default namespace
- *
- * @var string
- */
- private static $namespace;
-
- /**
- * Flag for using RFC4050 syntax
- *
- * @var bool
- */
- private static $rfc4050 = false;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- self::initialize_static_variables();
-
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- $use_errors = libxml_use_internal_errors(true);
-
- $temp = self::isolateNamespace($key, 'http://www.w3.org/2009/xmldsig11#');
- if ($temp) {
- $key = $temp;
- }
-
- $temp = self::isolateNamespace($key, 'http://www.w3.org/2001/04/xmldsig-more#');
- if ($temp) {
- $key = $temp;
- }
-
- $dom = new \DOMDocument();
- if (substr($key, 0, 5) != '<?xml') {
- $key = '<xml>' . $key . '</xml>';
- }
-
- if (!$dom->loadXML($key)) {
- libxml_use_internal_errors($use_errors);
- throw new \UnexpectedValueException('Key does not appear to contain XML');
- }
- $xpath = new \DOMXPath($dom);
- libxml_use_internal_errors($use_errors);
- $curve = self::loadCurveByParam($xpath);
-
- $pubkey = self::query($xpath, 'publickey', 'Public Key is not present');
-
- $QA = self::query($xpath, 'ecdsakeyvalue')->length ?
- self::extractPointRFC4050($xpath, $curve) :
- self::extractPoint("\0" . $pubkey, $curve);
-
- libxml_use_internal_errors($use_errors);
-
- return compact('curve', 'QA');
- }
-
- /**
- * Case-insensitive xpath query
- *
- * @param \DOMXPath $xpath
- * @param string $name
- * @param string $error optional
- * @param bool $decode optional
- * @return \DOMNodeList
- */
- private static function query($xpath, $name, $error = null, $decode = true)
- {
- $query = '/';
- $names = explode('/', $name);
- foreach ($names as $name) {
- $query.= "/*[translate(local-name(), 'ABCDEFGHIJKLMNOPQRSTUVWXYZ','abcdefghijklmnopqrstuvwxyz')='$name']";
- }
- $result = $xpath->query($query);
- if (!isset($error)) {
- return $result;
- }
-
- if (!$result->length) {
- throw new \RuntimeException($error);
- }
- return $decode ? self::decodeValue($result->item(0)->textContent) : $result->item(0)->textContent;
- }
-
- /**
- * Finds the first element in the relevant namespace, strips the namespacing and returns the XML for that element.
- *
- * @param string $xml
- * @param string $ns
- */
- private static function isolateNamespace($xml, $ns)
- {
- $dom = new \DOMDocument();
- if (!$dom->loadXML($xml)) {
- return false;
- }
- $xpath = new \DOMXPath($dom);
- $nodes = $xpath->query("//*[namespace::*[.='$ns'] and not(../namespace::*[.='$ns'])]");
- if (!$nodes->length) {
- return false;
- }
- $node = $nodes->item(0);
- $ns_name = $node->lookupPrefix($ns);
- $node->removeAttributeNS($ns, $ns_name);
- return $dom->saveXML($node);
- }
-
- /**
- * Decodes the value
- *
- * @param string $value
- */
- private static function decodeValue($value)
- {
- return Base64::decode(str_replace(["\r", "\n", ' ', "\t"], '', $value));
- }
-
- /**
- * Extract points from an XML document
- *
- * @param \DOMXPath $xpath
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @return object[]
- */
- private static function extractPointRFC4050(\DOMXPath $xpath, BaseCurve $curve)
- {
- $x = self::query($xpath, 'publickey/x');
- $y = self::query($xpath, 'publickey/y');
- if (!$x->length || !$x->item(0)->hasAttribute('Value')) {
- throw new \RuntimeException('Public Key / X coordinate not found');
- }
- if (!$y->length || !$y->item(0)->hasAttribute('Value')) {
- throw new \RuntimeException('Public Key / Y coordinate not found');
- }
- $point = [
- $curve->convertInteger(new BigInteger($x->item(0)->getAttribute('Value'))),
- $curve->convertInteger(new BigInteger($y->item(0)->getAttribute('Value')))
- ];
- if (!$curve->verifyPoint($point)) {
- throw new \RuntimeException('Unable to verify that point exists on curve');
- }
- return $point;
- }
-
- /**
- * Returns an instance of \phpseclib3\Crypt\EC\BaseCurves\Base based
- * on the curve parameters
- *
- * @param \DomXPath $xpath
- * @return \phpseclib3\Crypt\EC\BaseCurves\Base|false
- */
- private static function loadCurveByParam(\DOMXPath $xpath)
- {
- $namedCurve = self::query($xpath, 'namedcurve');
- if ($namedCurve->length == 1) {
- $oid = $namedCurve->item(0)->getAttribute('URN');
- $oid = preg_replace('#[^\d.]#', '', $oid);
- $name = array_search($oid, self::$curveOIDs);
- if ($name === false) {
- throw new UnsupportedCurveException('Curve with OID of ' . $oid . ' is not supported');
- }
-
- $curve = '\phpseclib3\Crypt\EC\Curves\\' . $name;
- if (!class_exists($curve)) {
- throw new UnsupportedCurveException('Named Curve of ' . $name . ' is not supported');
- }
- return new $curve();
- }
-
- $params = self::query($xpath, 'explicitparams');
- if ($params->length) {
- return self::loadCurveByParamRFC4050($xpath);
- }
-
- $params = self::query($xpath, 'ecparameters');
- if (!$params->length) {
- throw new \RuntimeException('No parameters are present');
- }
-
- $fieldTypes = [
- 'prime-field' => ['fieldid/prime/p'],
- 'gnb' => ['fieldid/gnb/m'],
- 'tnb' => ['fieldid/tnb/k'],
- 'pnb' => ['fieldid/pnb/k1', 'fieldid/pnb/k2', 'fieldid/pnb/k3'],
- 'unknown' => []
- ];
-
- foreach ($fieldTypes as $type => $queries) {
- foreach ($queries as $query) {
- $result = self::query($xpath, $query);
- if (!$result->length) {
- continue 2;
- }
- $param = preg_replace('#.*/#', '', $query);
- $$param = self::decodeValue($result->item(0)->textContent);
- }
- break;
- }
-
- $a = self::query($xpath, 'curve/a', 'A coefficient is not present');
- $b = self::query($xpath, 'curve/b', 'B coefficient is not present');
- $base = self::query($xpath, 'base', 'Base point is not present');
- $order = self::query($xpath, 'order', 'Order is not present');
-
- switch ($type) {
- case 'prime-field':
- $curve = new PrimeCurve();
- $curve->setModulo(new BigInteger($p, 256));
- $curve->setCoefficients(
- new BigInteger($a, 256),
- new BigInteger($b, 256)
- );
- $point = self::extractPoint("\0" . $base, $curve);
- $curve->setBasePoint(...$point);
- $curve->setOrder(new BigInteger($order, 256));
- return $curve;
- case 'gnb':
- case 'tnb':
- case 'pnb':
- default:
- throw new UnsupportedCurveException('Field Type of ' . $type . ' is not supported');
- }
- }
-
- /**
- * Returns an instance of \phpseclib3\Crypt\EC\BaseCurves\Base based
- * on the curve parameters
- *
- * @param \DomXPath $xpath
- * @return \phpseclib3\Crypt\EC\BaseCurves\Base|false
- */
- private static function loadCurveByParamRFC4050(\DOMXPath $xpath)
- {
- $fieldTypes = [
- 'prime-field' => ['primefieldparamstype/p'],
- 'unknown' => []
- ];
-
- foreach ($fieldTypes as $type => $queries) {
- foreach ($queries as $query) {
- $result = self::query($xpath, $query);
- if (!$result->length) {
- continue 2;
- }
- $param = preg_replace('#.*/#', '', $query);
- $$param = $result->item(0)->textContent;
- }
- break;
- }
-
- $a = self::query($xpath, 'curveparamstype/a', 'A coefficient is not present', false);
- $b = self::query($xpath, 'curveparamstype/b', 'B coefficient is not present', false);
- $x = self::query($xpath, 'basepointparams/basepoint/ecpointtype/x', 'Base Point X is not present', false);
- $y = self::query($xpath, 'basepointparams/basepoint/ecpointtype/y', 'Base Point Y is not present', false);
- $order = self::query($xpath, 'order', 'Order is not present', false);
-
- switch ($type) {
- case 'prime-field':
- $curve = new PrimeCurve();
-
- $p = str_replace(["\r", "\n", ' ', "\t"], '', $p);
- $curve->setModulo(new BigInteger($p));
-
- $a = str_replace(["\r", "\n", ' ', "\t"], '', $a);
- $b = str_replace(["\r", "\n", ' ', "\t"], '', $b);
- $curve->setCoefficients(
- new BigInteger($a),
- new BigInteger($b)
- );
-
- $x = str_replace(["\r", "\n", ' ', "\t"], '', $x);
- $y = str_replace(["\r", "\n", ' ', "\t"], '', $y);
- $curve->setBasePoint(
- new BigInteger($x),
- new BigInteger($y)
- );
-
- $order = str_replace(["\r", "\n", ' ', "\t"], '', $order);
- $curve->setOrder(new BigInteger($order));
- return $curve;
- default:
- throw new UnsupportedCurveException('Field Type of ' . $type . ' is not supported');
- }
- }
-
- /**
- * Sets the namespace. dsig11 is the most common one.
- *
- * Set to null to unset. Used only for creating public keys.
- *
- * @param string $namespace
- */
- public static function setNamespace($namespace)
- {
- self::$namespace = $namespace;
- }
-
- /**
- * Uses the XML syntax specified in https://tools.ietf.org/html/rfc4050
- */
- public static function enableRFC4050Syntax()
- {
- self::$rfc4050 = true;
- }
-
- /**
- * Uses the XML syntax specified in https://www.w3.org/TR/xmldsig-core/#sec-ECParameters
- */
- public static function disableRFC4050Syntax()
- {
- self::$rfc4050 = false;
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BaseCurve $curve, array $publicKey, array $options = [])
- {
- self::initialize_static_variables();
-
- if ($curve instanceof TwistedEdwardsCurve || $curve instanceof MontgomeryCurve) {
- throw new UnsupportedCurveException('TwistedEdwards and Montgomery Curves are not supported');
- }
-
- if (empty(static::$namespace)) {
- $pre = $post = '';
- } else {
- $pre = static::$namespace . ':';
- $post = ':' . static::$namespace;
- }
-
- if (self::$rfc4050) {
- return '<' . $pre . 'ECDSAKeyValue xmlns' . $post . '="http://www.w3.org/2001/04/xmldsig-more#">' . "\r\n" .
- self::encodeXMLParameters($curve, $pre, $options) . "\r\n" .
- '<' . $pre . 'PublicKey>' . "\r\n" .
- '<' . $pre . 'X Value="' . $publicKey[0] . '" />' . "\r\n" .
- '<' . $pre . 'Y Value="' . $publicKey[1] . '" />' . "\r\n" .
- '</' . $pre . 'PublicKey>' . "\r\n" .
- '</' . $pre . 'ECDSAKeyValue>';
- }
-
- $publicKey = "\4" . $publicKey[0]->toBytes() . $publicKey[1]->toBytes();
-
- return '<' . $pre . 'ECDSAKeyValue xmlns' . $post . '="http://www.w3.org/2009/xmldsig11#">' . "\r\n" .
- self::encodeXMLParameters($curve, $pre, $options) . "\r\n" .
- '<' . $pre . 'PublicKey>' . Base64::encode($publicKey) . '</' . $pre . 'PublicKey>' . "\r\n" .
- '</' . $pre . 'ECDSAKeyValue>';
- }
-
- /**
- * Encode Parameters
- *
- * @param \phpseclib3\Crypt\EC\BaseCurves\Base $curve
- * @param string $pre
- * @param array $options optional
- * @return string|false
- */
- private static function encodeXMLParameters(BaseCurve $curve, $pre, array $options = [])
- {
- $result = self::encodeParameters($curve, true, $options);
-
- if (isset($result['namedCurve'])) {
- $namedCurve = '<' . $pre . 'NamedCurve URI="urn:oid:' . self::$curveOIDs[$result['namedCurve']] . '" />';
- return self::$rfc4050 ?
- '<DomainParameters>' . str_replace('URI', 'URN', $namedCurve) . '</DomainParameters>' :
- $namedCurve;
- }
-
- if (self::$rfc4050) {
- $xml = '<' . $pre . 'ExplicitParams>' . "\r\n" .
- '<' . $pre . 'FieldParams>' . "\r\n";
- $temp = $result['specifiedCurve'];
- switch ($temp['fieldID']['fieldType']) {
- case 'prime-field':
- $xml.= '<' . $pre . 'PrimeFieldParamsType>' . "\r\n" .
- '<' . $pre . 'P>' . $temp['fieldID']['parameters'] . '</' . $pre . 'P>' . "\r\n" .
- '</' . $pre . 'PrimeFieldParamsType>' . "\r\n";
- $a = $curve->getA();
- $b = $curve->getB();
- list($x, $y) = $curve->getBasePoint();
- break;
- default:
- throw new UnsupportedCurveException('Field Type of ' . $temp['fieldID']['fieldType'] . ' is not supported');
- }
- $xml.= '</' . $pre . 'FieldParams>' . "\r\n" .
- '<' . $pre . 'CurveParamsType>' . "\r\n" .
- '<' . $pre . 'A>' . $a . '</' . $pre . 'A>' . "\r\n" .
- '<' . $pre . 'B>' . $b . '</' . $pre . 'B>' . "\r\n" .
- '</' . $pre . 'CurveParamsType>' . "\r\n" .
- '<' . $pre . 'BasePointParams>' . "\r\n" .
- '<' . $pre . 'BasePoint>' . "\r\n" .
- '<' . $pre . 'ECPointType>' . "\r\n" .
- '<' . $pre . 'X>' . $x . '</' . $pre . 'X>' . "\r\n" .
- '<' . $pre . 'Y>' . $y . '</' . $pre . 'Y>' . "\r\n" .
- '</' . $pre . 'ECPointType>' . "\r\n" .
- '</' . $pre . 'BasePoint>' . "\r\n" .
- '<' . $pre . 'Order>' . $curve->getOrder() . '</' . $pre . 'Order>' . "\r\n" .
- '</' . $pre . 'BasePointParams>' . "\r\n" .
- '</' . $pre . 'ExplicitParams>' . "\r\n";
-
- return $xml;
- }
-
- if (isset($result['specifiedCurve'])) {
- $xml = '<' . $pre . 'ECParameters>' . "\r\n" .
- '<' . $pre . 'FieldID>' . "\r\n";
- $temp = $result['specifiedCurve'];
- switch ($temp['fieldID']['fieldType']) {
- case 'prime-field':
- $xml.= '<' . $pre . 'Prime>' . "\r\n" .
- '<' . $pre . 'P>' . Base64::encode($temp['fieldID']['parameters']->toBytes()) . '</' . $pre . 'P>' . "\r\n" .
- '</' . $pre . 'Prime>' . "\r\n" ;
- break;
- default:
- throw new UnsupportedCurveException('Field Type of ' . $temp['fieldID']['fieldType'] . ' is not supported');
- }
- $xml.= '</' . $pre . 'FieldID>' . "\r\n" .
- '<' . $pre . 'Curve>' . "\r\n" .
- '<' . $pre . 'A>' . Base64::encode($temp['curve']['a']) . '</' . $pre . 'A>' . "\r\n" .
- '<' . $pre . 'B>' . Base64::encode($temp['curve']['b']) . '</' . $pre . 'B>' . "\r\n" .
- '</' . $pre . 'Curve>' . "\r\n" .
- '<' . $pre . 'Base>' . Base64::encode($temp['base']) . '</' . $pre . 'Base>' . "\r\n" .
- '<' . $pre . 'Order>' . Base64::encode($temp['order']) . '</' . $pre . 'Order>' . "\r\n" .
- '</' . $pre . 'ECParameters>';
- return $xml;
- }
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/libsodium.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/libsodium.php
deleted file mode 100644
index b8be19444..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/libsodium.php
+++ /dev/null
@@ -1,122 +0,0 @@
-<?php
-
-/**
- * libsodium Key Handler
- *
- * Different NaCl implementations store the key differently.
- * https://blog.mozilla.org/warner/2011/11/29/ed25519-keys/ elaborates.
- * libsodium appears to use the same format as SUPERCOP.
- *
- * PHP version 5
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Keys;
-
-use phpseclib3\Crypt\EC\Curves\Ed25519;
-use phpseclib3\Math\Common\FiniteField\Integer;
-use phpseclib3\Exception\UnsupportedFormatException;
-
-/**
- * libsodium Key Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class libsodium
-{
- use Common;
-
- /**
- * Is invisible flag
- *
- * @access private
- */
- const IS_INVISIBLE = true;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- switch (strlen($key)) {
- case 32:
- $public = $key;
- break;
- case 64:
- $private = substr($key, 0, 32);
- $public = substr($key, -32);
- break;
- case 96:
- $public = substr($key, -32);
- if (substr($key, 32, 32) != $public) {
- throw new \RuntimeException('Keys with 96 bytes should have the 2nd and 3rd set of 32 bytes match');
- }
- $private = substr($key, 0, 32);
- break;
- default:
- throw new \RuntimeException('libsodium keys need to either be 32 bytes long, 64 bytes long or 96 bytes long');
- }
-
- $curve = new Ed25519();
- $components = ['curve' => $curve];
- if (isset($private)) {
- $components['dA'] = $curve->extractSecret($private);
- }
- $components['QA'] = isset($public) ?
- self::extractPoint($public, $curve) :
- $curve->multiplyPoint($curve->getBasePoint(), $components['dA']);
-
-
- return $components;
- }
-
- /**
- * Convert an EC public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Crypt\EC\Curves\Ed25519 $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @return string
- */
- public static function savePublicKey(Ed25519 $curve, array $publicKey)
- {
- return $curve->encodePoint($publicKey);
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\Common\FiniteField\Integer $privateKey
- * @param \phpseclib3\Crypt\EC\Curves\Ed25519 $curve
- * @param \phpseclib3\Math\Common\FiniteField\Integer[] $publicKey
- * @param string $password optional
- * @return string
- */
- public static function savePrivateKey(Integer $privateKey, Ed25519 $curve, array $publicKey, $password = '')
- {
- if (!isset($privateKey->secret)) {
- throw new \RuntimeException('Private Key does not have a secret set');
- }
- if (strlen($privateKey->secret) != 32) {
- throw new \RuntimeException('Private Key secret is not of the correct length');
- }
- if (!empty($password) && is_string($password)) {
- throw new UnsupportedFormatException('libsodium private keys do not support encryption');
- }
- return $privateKey->secret . $curve->encodePoint($publicKey);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/ASN1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/ASN1.php
deleted file mode 100644
index 3509eb61e..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/ASN1.php
+++ /dev/null
@@ -1,68 +0,0 @@
-<?php
-
-/**
- * ASN1 Signature Handler
- *
- * PHP version 5
- *
- * Handles signatures in the format described in
- * https://tools.ietf.org/html/rfc3279#section-2.2.3
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Signature;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\File\ASN1 as Encoder;
-use phpseclib3\File\ASN1\Maps\EcdsaSigValue;
-
-/**
- * ASN1 Signature Handler
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ASN1
-{
- /**
- * Loads a signature
- *
- * @access public
- * @param string $sig
- * @return array
- */
- public static function load($sig)
- {
- if (!is_string($sig)) {
- return false;
- }
-
- $decoded = Encoder::decodeBER($sig);
- if (empty($decoded)) {
- return false;
- }
- $components = Encoder::asn1map($decoded[0], EcdsaSigValue::MAP);
-
- return $components;
- }
-
- /**
- * Returns a signature in the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $r
- * @param \phpseclib3\Math\BigInteger $s
- * @return string
- */
- public static function save(BigInteger $r, BigInteger $s)
- {
- return Encoder::encodeDER(compact('r', 's'), EcdsaSigValue::MAP);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/Raw.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/Raw.php
deleted file mode 100644
index eebef46b2..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/Raw.php
+++ /dev/null
@@ -1,29 +0,0 @@
-<?php
-
-/**
- * Raw EC Signature Handler
- *
- * PHP version 5
- *
- * @category Crypt
- * @package DSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Signature;
-
-use phpseclib3\Crypt\Common\Formats\Signature\Raw as Progenitor;
-
-/**
- * Raw DSA Signature Handler
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Raw extends Progenitor
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/SSH2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/SSH2.php
deleted file mode 100644
index 261100dbe..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Signature/SSH2.php
+++ /dev/null
@@ -1,100 +0,0 @@
-<?php
-
-/**
- * SSH2 Signature Handler
- *
- * PHP version 5
- *
- * Handles signatures in the format used by SSH2
- *
- * @category Crypt
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC\Formats\Signature;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * SSH2 Signature Handler
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class SSH2
-{
- /**
- * Loads a signature
- *
- * @access public
- * @param string $sig
- * @return mixed
- */
- public static function load($sig)
- {
- if (!is_string($sig)) {
- return false;
- }
-
- $result = Strings::unpackSSH2('ss', $sig);
- if ($result === false) {
- return false;
- }
- list($type, $blob) = $result;
- switch ($type) {
- // see https://tools.ietf.org/html/rfc5656#section-3.1.2
- case 'ecdsa-sha2-nistp256':
- case 'ecdsa-sha2-nistp384':
- case 'ecdsa-sha2-nistp521':
- break;
- default:
- return false;
- }
-
- $result = Strings::unpackSSH2('ii', $blob);
- if ($result === false) {
- return false;
- }
-
- return [
- 'r' => $result[0],
- 's' => $result[1]
- ];
- }
-
- /**
- * Returns a signature in the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $r
- * @param \phpseclib3\Math\BigInteger $s
- * @param string $curve
- * @return string
- */
- public static function save(BigInteger $r, BigInteger $s, $curve)
- {
- switch ($curve) {
- case 'secp256r1':
- $curve = 'nistp256';
- break;
- case 'secp384r1':
- $curve = 'nistp384';
- break;
- case 'secp521r1':
- $curve = 'nistp521';
- break;
- default:
- return false;
- }
-
- $blob = Strings::packSSH2('ii', $r, $s);
-
- return Strings::packSSH2('ss', 'ecdsa-sha2-' . $curve, $blob);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Parameters.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Parameters.php
deleted file mode 100644
index 96527c754..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Parameters.php
+++ /dev/null
@@ -1,40 +0,0 @@
-<?php
-
-/**
- * EC Parameters
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC;
-
-use phpseclib3\Crypt\EC;
-
-/**
- * EC Parameters
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Parameters extends EC
-{
- /**
- * Returns the parameters
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type = 'PKCS1', array $options = [])
- {
- $type = self::validatePlugin('Keys', 'PKCS1', 'saveParameters');
-
- return $type::saveParameters($this->curve, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/PrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/PrivateKey.php
deleted file mode 100644
index 4ffa5fdf5..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/PrivateKey.php
+++ /dev/null
@@ -1,258 +0,0 @@
-<?php
-
-/**
- * EC Private Key
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC;
-
-use phpseclib3\Crypt\EC;
-use phpseclib3\Crypt\EC\Formats\Signature\ASN1 as ASN1Signature;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards as TwistedEdwardsCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Crypt\EC\Curves\Ed25519;
-use phpseclib3\Crypt\EC\Curves\Curve25519;
-use phpseclib3\Crypt\EC\Formats\Keys\PKCS1;
-use phpseclib3\Crypt\Common;
-use phpseclib3\Exception\UnsupportedOperationException;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * EC Private Key
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PrivateKey extends EC implements Common\PrivateKey
-{
- use Common\Traits\PasswordProtected;
-
- /**
- * Private Key dA
- *
- * sign() converts this to a BigInteger so one might wonder why this is a FiniteFieldInteger instead of
- * a BigInteger. That's because a FiniteFieldInteger, when converted to a byte string, is null padded by
- * a certain amount whereas a BigInteger isn't.
- *
- * @var object
- */
- protected $dA;
-
- /**
- * Multiplies an encoded point by the private key
- *
- * Used by ECDH
- *
- * @param string $coordinates
- * @return string
- */
- public function multiply($coordinates)
- {
- if ($this->curve instanceof MontgomeryCurve) {
- if ($this->curve instanceof Curve25519 && self::$engines['libsodium']) {
- return sodium_crypto_scalarmult($this->dA->toBytes(), $coordinates);
- }
-
- $point = [$this->curve->convertInteger(new BigInteger(strrev($coordinates), 256))];
- $point = $this->curve->multiplyPoint($point, $this->dA);
- return strrev($point[0]->toBytes(true));
- }
- if (!$this->curve instanceof TwistedEdwardsCurve) {
- $coordinates = "\0$coordinates";
- }
- $point = PKCS1::extractPoint($coordinates, $this->curve);
- $point = $this->curve->multiplyPoint($point, $this->dA);
- if ($this->curve instanceof TwistedEdwardsCurve) {
- return $this->curve->encodePoint($point);
- }
- if (empty($point)) {
- throw new \RuntimeException('The infinity point is invalid');
- }
- return "\4" . $point[0]->toBytes(true) . $point[1]->toBytes(true);
- }
-
- /**
- * Create a signature
- *
- * @see self::verify()
- * @access public
- * @param string $message
- * @return mixed
- */
- public function sign($message)
- {
- if ($this->curve instanceof MontgomeryCurve) {
- throw new UnsupportedOperationException('Montgomery Curves cannot be used to create signatures');
- }
-
- $dA = $this->dA->toBigInteger();
-
- $order = $this->curve->getOrder();
-
- $shortFormat = $this->shortFormat;
- $format = $this->sigFormat;
- if ($format === false) {
- return false;
- }
-
- if ($this->curve instanceof TwistedEdwardsCurve) {
- if ($this->curve instanceof Ed25519 && self::$engines['libsodium'] && !isset($this->context)) {
- $result = sodium_crypto_sign_detached($message, $this->toString('libsodium'));
- return $shortFormat == 'SSH2' ? Strings::packSSH2('ss', 'ssh-' . strtolower($this->getCurve()), $result) : $result;
- }
-
- // contexts (Ed25519ctx) are supported but prehashing (Ed25519ph) is not.
- // quoting https://tools.ietf.org/html/rfc8032#section-8.5 ,
- // "The Ed25519ph and Ed448ph variants ... SHOULD NOT be used"
- $A = $this->curve->encodePoint($this->QA);
- $curve = $this->curve;
- $hash = new Hash($curve::HASH);
-
- $secret = substr($hash->hash($this->dA->secret), $curve::SIZE);
-
- if ($curve instanceof Ed25519) {
- $dom = !isset($this->context) ? '' :
- 'SigEd25519 no Ed25519 collisions' . "\0" . chr(strlen($this->context)) . $this->context;
- } else {
- $context = isset($this->context) ? $this->context : '';
- $dom = 'SigEd448' . "\0" . chr(strlen($context)) . $context;
- }
- // SHA-512(dom2(F, C) || prefix || PH(M))
- $r = $hash->hash($dom . $secret . $message);
- $r = strrev($r);
- $r = new BigInteger($r, 256);
- list(, $r) = $r->divide($order);
- $R = $curve->multiplyPoint($curve->getBasePoint(), $curve->convertInteger($r));
- $R = $curve->encodePoint($R);
- $k = $hash->hash($dom . $R . $A . $message);
- $k = strrev($k);
- $k = new BigInteger($k, 256);
- list(, $k) = $k->divide($order);
- $S = $k->multiply($dA)->add($r);
- list(, $S) = $S->divide($order);
- $S = str_pad(strrev($S->toBytes()), $curve::SIZE, "\0");
- return $shortFormat == 'SSH2' ? Strings::packSSH2('ss', 'ssh-' . strtolower($this->getCurve()), $R . $S) : $R . $S;
- }
-
- if (self::$engines['OpenSSL'] && in_array($this->hash->getHash(), openssl_get_md_methods())) {
- $signature = '';
- // altho PHP's OpenSSL bindings only supported EC key creation in PHP 7.1 they've long
- // supported signing / verification
- // we use specified curves to avoid issues with OpenSSL possibly not supporting a given named curve;
- // doing this may mean some curve-specific optimizations can't be used but idk if OpenSSL even
- // has curve-specific optimizations
- $result = openssl_sign($message, $signature, $this->toString('PKCS8', ['namedCurve' => false]), $this->hash->getHash());
-
- if ($result) {
- if ($shortFormat == 'ASN1') {
- return $signature;
- }
-
- extract(ASN1Signature::load($signature));
-
- return $shortFormat == 'SSH2' ? $format::save($r, $s, $this->getCurve()) : $format::save($r, $s);
- }
- }
-
- $e = $this->hash->hash($message);
- $e = new BigInteger($e, 256);
-
- $Ln = $this->hash->getLength() - $order->getLength();
- $z = $Ln > 0 ? $e->bitwise_rightShift($Ln) : $e;
-
- while (true) {
- $k = BigInteger::randomRange(self::$one, $order->subtract(self::$one));
- list($x, $y) = $this->curve->multiplyPoint($this->curve->getBasePoint(), $this->curve->convertInteger($k));
- $x = $x->toBigInteger();
- list(, $r) = $x->divide($order);
- if ($r->equals(self::$zero)) {
- continue;
- }
- $kinv = $k->modInverse($order);
- $temp = $z->add($dA->multiply($r));
- $temp = $kinv->multiply($temp);
- list(, $s) = $temp->divide($order);
- if (!$s->equals(self::$zero)) {
- break;
- }
- }
-
- // the following is an RFC6979 compliant implementation of deterministic ECDSA
- // it's unused because it's mainly intended for use when a good CSPRNG isn't
- // available. if phpseclib's CSPRNG isn't good then even key generation is
- // suspect
- /*
- // if this were actually being used it'd probably be better if this lived in load() and createKey()
- $this->q = $this->curve->getOrder();
- $dA = $this->dA->toBigInteger();
- $this->x = $dA;
-
- $h1 = $this->hash->hash($message);
- $k = $this->computek($h1);
- list($x, $y) = $this->curve->multiplyPoint($this->curve->getBasePoint(), $this->curve->convertInteger($k));
- $x = $x->toBigInteger();
- list(, $r) = $x->divide($this->q);
- $kinv = $k->modInverse($this->q);
- $h1 = $this->bits2int($h1);
- $temp = $h1->add($dA->multiply($r));
- $temp = $kinv->multiply($temp);
- list(, $s) = $temp->divide($this->q);
- */
-
- return $shortFormat == 'SSH2' ? $format::save($r, $s, $this->getCurve()) : $format::save($r, $s);
- }
-
- /**
- * Returns the private key
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type, array $options = [])
- {
- $type = self::validatePlugin('Keys', $type, 'savePrivateKey');
-
- return $type::savePrivateKey($this->dA, $this->curve, $this->QA, $this->password, $options);
- }
-
- /**
- * Returns the public key
- *
- * @see self::getPrivateKey()
- * @access public
- * @return mixed
- */
- public function getPublicKey()
- {
- $format = 'PKCS8';
- if ($this->curve instanceof MontgomeryCurve) {
- $format = 'MontgomeryPublic';
- }
-
- $type = self::validatePlugin('Keys', $format, 'savePublicKey');
-
- $key = $type::savePublicKey($this->curve, $this->QA);
- $key = EC::loadFormat($format, $key);
- if ($this->curve instanceof MontgomeryCurve) {
- return $key;
- }
- $key = $key
- ->withHash($this->hash->getHash())
- ->withSignatureFormat($this->shortFormat);
- if ($this->curve instanceof TwistedEdwardsCurve) {
- $key = $key->withContext($this->context);
- }
- return $key;
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/PublicKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/PublicKey.php
deleted file mode 100644
index 2cb92ab68..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/PublicKey.php
+++ /dev/null
@@ -1,177 +0,0 @@
-<?php
-
-/**
- * EC Public Key
- *
- * @category Crypt
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\EC;
-
-use phpseclib3\Crypt\EC;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\EC\Formats\Signature\ASN1 as ASN1Signature;
-use phpseclib3\Crypt\EC\BaseCurves\TwistedEdwards as TwistedEdwardsCurve;
-use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve;
-use phpseclib3\Crypt\EC\Curves\Ed25519;
-use phpseclib3\Crypt\EC\Formats\Keys\PKCS1;
-use phpseclib3\Crypt\Common;
-use phpseclib3\Exception\UnsupportedOperationException;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * EC Public Key
- *
- * @package EC
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PublicKey extends EC implements Common\PublicKey
-{
- use Common\Traits\Fingerprint;
-
- /**
- * Verify a signature
- *
- * @see self::verify()
- * @access public
- * @param string $message
- * @param string $signature
- * @return mixed
- */
- public function verify($message, $signature)
- {
- if ($this->curve instanceof MontgomeryCurve) {
- throw new UnsupportedOperationException('Montgomery Curves cannot be used to create signatures');
- }
-
- $shortFormat = $this->shortFormat;
- $format = $this->sigFormat;
- if ($format === false) {
- return false;
- }
-
- $order = $this->curve->getOrder();
-
- if ($this->curve instanceof TwistedEdwardsCurve) {
- if ($shortFormat == 'SSH2') {
- list(, $signature) = Strings::unpackSSH2('ss', $signature);
- }
-
- if ($this->curve instanceof Ed25519 && self::$engines['libsodium'] && !isset($this->context)) {
- return sodium_crypto_sign_verify_detached($signature, $message, $this->toString('libsodium'));
- }
-
- $curve = $this->curve;
- if (strlen($signature) != 2 * $curve::SIZE) {
- return false;
- }
-
- $R = substr($signature, 0, $curve::SIZE);
- $S = substr($signature, $curve::SIZE);
-
- try {
- $R = PKCS1::extractPoint($R, $curve);
- $R = $this->curve->convertToInternal($R);
- } catch (\Exception $e) {
- return false;
- }
-
- $S = strrev($S);
- $S = new BigInteger($S, 256);
-
- if ($S->compare($order) >= 0) {
- return false;
- }
-
- $A = $curve->encodePoint($this->QA);
-
- if ($curve instanceof Ed25519) {
- $dom2 = !isset($this->context) ? '' :
- 'SigEd25519 no Ed25519 collisions' . "\0" . chr(strlen($this->context)) . $this->context;
- } else {
- $context = isset($this->context) ? $this->context : '';
- $dom2 = 'SigEd448' . "\0" . chr(strlen($context)) . $context;
- }
-
- $hash = new Hash($curve::HASH);
- $k = $hash->hash($dom2 . substr($signature, 0, $curve::SIZE) . $A . $message);
- $k = strrev($k);
- $k = new BigInteger($k, 256);
- list(, $k) = $k->divide($order);
-
- $qa = $curve->convertToInternal($this->QA);
-
- $lhs = $curve->multiplyPoint($curve->getBasePoint(), $curve->convertInteger($S));
- $rhs = $curve->multiplyPoint($qa, $curve->convertInteger($k));
- $rhs = $curve->addPoint($rhs, $R);
- $rhs = $curve->convertToAffine($rhs);
-
- return $lhs[0]->equals($rhs[0]) && $lhs[1]->equals($rhs[1]);
- }
-
- $params = $format::load($signature);
- if ($params === false || count($params) != 2) {
- return false;
- }
- extract($params);
-
- if (self::$engines['OpenSSL'] && in_array($this->hash->getHash(), openssl_get_md_methods())) {
- $sig = $format != 'ASN1' ? ASN1Signature::save($r, $s) : $signature;
-
- $result = openssl_verify($message, $sig, $this->toString('PKCS8', ['namedCurve' => false]), $this->hash->getHash());
-
- if ($result != -1) {
- return (bool) $result;
- }
- }
-
- $n_1 = $order->subtract(self::$one);
- if (!$r->between(self::$one, $n_1) || !$s->between(self::$one, $n_1)) {
- return false;
- }
-
- $e = $this->hash->hash($message);
- $e = new BigInteger($e, 256);
-
- $Ln = $this->hash->getLength() - $order->getLength();
- $z = $Ln > 0 ? $e->bitwise_rightShift($Ln) : $e;
-
- $w = $s->modInverse($order);
- list(, $u1) = $z->multiply($w)->divide($order);
- list(, $u2) = $r->multiply($w)->divide($order);
-
- $u1 = $this->curve->convertInteger($u1);
- $u2 = $this->curve->convertInteger($u2);
-
- list($x1, $y1) = $this->curve->multiplyAddPoints(
- [$this->curve->getBasePoint(), $this->QA],
- [$u1, $u2]
- );
-
- $x1 = $x1->toBigInteger();
- list(, $x1) = $x1->divide($order);
-
- return $x1->equals($r);
- }
-
- /**
- * Returns the public key
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type, array $options = [])
- {
- $type = self::validatePlugin('Keys', $type, 'savePublicKey');
-
- return $type::savePublicKey($this->curve, $this->QA, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Hash.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Hash.php
index 706de2147..248b65ef7 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Hash.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Hash.php
@@ -1,19 +1,26 @@
<?php
/**
- * Wrapper around hash() and hash_hmac() functions supporting truncated hashes
- * such as sha256-96. Any hash algorithm returned by hash_algos() (and
- * truncated versions thereof) are supported.
+ * Pure-PHP implementations of keyed-hash message authentication codes (HMACs) and various cryptographic hashing functions.
*
- * If {@link self::setKey() setKey()} is called, {@link self::hash() hash()} will
- * return the HMAC as opposed to the hash.
+ * Uses hash() or mhash() if available and an internal implementation, otherwise. Currently supports the following:
+ *
+ * md2, md5, md5-96, sha1, sha1-96, sha256, sha256-96, sha384, and sha512, sha512-96
+ *
+ * If {@link self::setKey() setKey()} is called, {@link self::hash() hash()} will return the HMAC as opposed to
+ * the hash. If no valid algorithm is provided, sha1 will be used.
+ *
+ * PHP version 5
+ *
+ * {@internal The variable names are the same as those in
+ * {@link http://tools.ietf.org/html/rfc2104#section-2 RFC2104}.}}
*
* Here's a short example of how to use this library:
* <code>
* <?php
* include 'vendor/autoload.php';
*
- * $hash = new \phpseclib3\Crypt\Hash('sha512');
+ * $hash = new \phpseclib\Crypt\Hash('sha1');
*
* $hash->setKey('abcdefg');
*
@@ -24,69 +31,59 @@
* @category Crypt
* @package Hash
* @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @author Andreas Fischer <bantu@phpbb.com>
- * @copyright 2015 Andreas Fischer
+ * @copyright 2007 Jim Wigginton
* @license http://www.opensource.org/licenses/mit-license.html MIT License
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
+namespace phpseclib\Crypt;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-use phpseclib3\Exception\InsufficientSetupException;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\AES;
-use phpseclib3\Math\PrimeField;
+use phpseclib\Math\BigInteger;
/**
+ * Pure-PHP implementations of keyed-hash message authentication codes (HMACs) and various cryptographic hashing functions.
+ *
* @package Hash
* @author Jim Wigginton <terrafrost@php.net>
- * @author Andreas Fischer <bantu@phpbb.com>
* @access public
*/
class Hash
{
- /**
- * Padding Types
- *
+ /**#@+
* @access private
+ * @see \phpseclib\Crypt\Hash::__construct()
*/
- //const PADDING_KECCAK = 1;
-
/**
- * Padding Types
- *
- * @access private
+ * Toggles the internal implementation
*/
- const PADDING_SHA3 = 2;
-
+ const MODE_INTERNAL = 1;
/**
- * Padding Types
- *
- * @access private
+ * Toggles the mhash() implementation, which has been deprecated on PHP 5.3.0+.
*/
- const PADDING_SHAKE = 3;
+ const MODE_MHASH = 2;
+ /**
+ * Toggles the hash() implementation, which works on PHP 5.1.2+.
+ */
+ const MODE_HASH = 3;
+ /**#@-*/
/**
- * Padding Type
- *
- * Only used by SHA3
+ * Hash Parameter
*
+ * @see self::setHash()
* @var int
* @access private
*/
- private $paddingType = 0;
+ var $hashParam;
/**
- * Hash Parameter
+ * Byte-length of compression blocks / key (Internal HMAC)
*
- * @see self::setHash()
+ * @see self::setAlgorithm()
* @var int
* @access private
*/
- private $hashParam;
+ var $b;
/**
* Byte-length of hash output (Internal HMAC)
@@ -95,7 +92,7 @@ class Hash
* @var int
* @access private
*/
- private $length;
+ var $l = false;
/**
* Hash Algorithm
@@ -104,7 +101,7 @@ class Hash
* @var string
* @access private
*/
- private $algo;
+ var $hash;
/**
* Key
@@ -113,24 +110,7 @@ class Hash
* @var string
* @access private
*/
- private $key = false;
-
- /**
- * Nonce
- *
- * @see self::setNonce()
- * @var string
- * @access private
- */
- private $nonce = false;
-
- /**
- * Hash Parameters
- *
- * @var array
- * @access private
- */
- private $parameters = [];
+ var $key = false;
/**
* Computed Key
@@ -139,83 +119,57 @@ class Hash
* @var string
* @access private
*/
- private $computedKey = false;
+ var $computedKey = false;
/**
* Outer XOR (Internal HMAC)
*
- * Used only for sha512/*
- *
- * @see self::hash()
+ * @see self::setKey()
* @var string
* @access private
*/
- private $opad;
+ var $opad;
/**
* Inner XOR (Internal HMAC)
*
- * Used only for sha512/*
- *
- * @see self::hash()
+ * @see self::setKey()
* @var string
* @access private
*/
- private $ipad;
-
- /**
- * Recompute AES Key
- *
- * Used only for umac
- *
- * @see self::hash()
- * @var boolean
- * @access private
- */
- private $recomputeAESKey;
-
- /**
- * umac cipher object
- *
- * @see self::hash()
- * @var \phpseclib3\Crypt\AES
- * @access private
- */
- private $c;
+ var $ipad;
/**
- * umac pad
+ * Engine
*
- * @see self::hash()
+ * @see self::setHash()
* @var string
* @access private
*/
- private $pad;
-
- /**#@+
- * UMAC variables
- *
- * @var PrimeField
- */
- private static $factory36;
- private static $factory64;
- private static $factory128;
- private static $offset64;
- private static $offset128;
- private static $marker64;
- private static $marker128;
- private static $maxwordrange64;
- private static $maxwordrange128;
- /**#@-*/
+ var $engine;
/**
* Default Constructor.
*
* @param string $hash
+ * @return \phpseclib\Crypt\Hash
* @access public
*/
- public function __construct($hash = 'sha256')
+ function __construct($hash = 'sha1')
{
+ if (!defined('CRYPT_HASH_MODE')) {
+ switch (true) {
+ case extension_loaded('hash'):
+ define('CRYPT_HASH_MODE', self::MODE_HASH);
+ break;
+ case extension_loaded('mhash'):
+ define('CRYPT_HASH_MODE', self::MODE_MHASH);
+ break;
+ default:
+ define('CRYPT_HASH_MODE', self::MODE_INTERNAL);
+ }
+ }
+
$this->setHash($hash);
}
@@ -227,32 +181,10 @@ class Hash
* @access public
* @param string $key
*/
- public function setKey($key = false)
+ function setKey($key = false)
{
$this->key = $key;
- $this->computeKey();
- $this->recomputeAESKey = true;
- }
-
- /**
- * Sets the nonce for UMACs
- *
- * Keys can be of any length.
- *
- * @access public
- * @param string $nonce
- */
- public function setNonce($nonce = false)
- {
- switch (true) {
- case !is_string($nonce):
- case strlen($nonce) > 0 && strlen($nonce) <= 16:
- $this->recomputeAESKey = true;
- $this->nonce = $nonce;
- return;
- }
-
- throw new \LengthException('The nonce length must be between 1 and 16 bytes, inclusive');
+ $this->_computeKey();
}
/**
@@ -267,21 +199,28 @@ class Hash
*
* @access private
*/
- private function computeKey()
+ function _computeKey()
{
if ($this->key === false) {
$this->computedKey = false;
return;
}
- if (strlen($this->key) <= $this->getBlockLengthInBytes()) {
+ if (strlen($this->key) <= $this->b) {
$this->computedKey = $this->key;
return;
}
- $this->computedKey = is_array($this->algo) ?
- call_user_func($this->algo, $this->key) :
- hash($this->algo, $this->key, true);
+ switch ($this->engine) {
+ case self::MODE_MHASH:
+ $this->computedKey = mhash($this->hash, $this->key);
+ break;
+ case self::MODE_HASH:
+ $this->computedKey = hash($this->hash, $this->key, true);
+ break;
+ case self::MODE_INTERNAL:
+ $this->computedKey = call_user_func($this->hash, $this->key);
+ }
}
/**
@@ -292,7 +231,7 @@ class Hash
* @access public
* @return string
*/
- public function getHash()
+ function getHash()
{
return $this->hashParam;
}
@@ -303,588 +242,165 @@ class Hash
* @access public
* @param string $hash
*/
- public function setHash($hash)
+ function setHash($hash)
{
$this->hashParam = $hash = strtolower($hash);
switch ($hash) {
- case 'umac-32':
- case 'umac-64':
- case 'umac-96':
- case 'umac-128':
- $this->blockSize = 128;
- $this->length = abs(substr($hash, -3)) >> 3;
- $this->algo = 'umac';
- return;
- case 'md2-96':
case 'md5-96':
case 'sha1-96':
- case 'sha224-96':
case 'sha256-96':
- case 'sha384-96':
case 'sha512-96':
- case 'sha512/224-96':
- case 'sha512/256-96':
$hash = substr($hash, 0, -3);
- $this->length = 12; // 96 / 8 = 12
+ $this->l = 12; // 96 / 8 = 12
break;
case 'md2':
case 'md5':
- $this->length = 16;
+ $this->l = 16;
break;
case 'sha1':
- $this->length = 20;
- break;
- case 'sha224':
- case 'sha512/224':
- case 'sha3-224':
- $this->length = 28;
+ $this->l = 20;
break;
case 'sha256':
- case 'sha512/256':
- case 'sha3-256':
- $this->length = 32;
+ $this->l = 32;
break;
case 'sha384':
- case 'sha3-384':
- $this->length = 48;
+ $this->l = 48;
break;
case 'sha512':
- case 'sha3-512':
- $this->length = 64;
- break;
- default:
- if (preg_match('#^(shake(?:128|256))-(\d+)$#', $hash, $matches)) {
- $this->paddingType = self::PADDING_SHAKE;
- $hash = $matches[1];
- $this->length = $matches[2] >> 3;
- } else {
- throw new UnsupportedAlgorithmException(
- "$hash is not a supported algorithm"
- );
- }
+ $this->l = 64;
}
switch ($hash) {
- case 'md2':
case 'md2-96':
- $this->blockSize = 128;
- break;
+ case 'md2':
+ $this->b = 16;
case 'md5-96':
case 'sha1-96':
case 'sha224-96':
case 'sha256-96':
+ case 'md2':
case 'md5':
case 'sha1':
case 'sha224':
case 'sha256':
- $this->blockSize = 512;
- break;
- case 'sha3-224':
- $this->blockSize = 1152; // 1600 - 2*224
- break;
- case 'sha3-256':
- case 'shake256':
- $this->blockSize = 1088; // 1600 - 2*256
+ $this->b = 64;
break;
- case 'sha3-384':
- $this->blockSize = 832; // 1600 - 2*384
- break;
- case 'sha3-512':
- $this->blockSize = 576; // 1600 - 2*512
+ default:
+ $this->b = 128;
+ }
+
+ switch ($hash) {
+ case 'md2':
+ $this->engine = CRYPT_HASH_MODE == self::MODE_HASH && in_array('md2', hash_algos()) ?
+ self::MODE_HASH : self::MODE_INTERNAL;
break;
- case 'shake128':
- $this->blockSize = 1344; // 1600 - 2*128
+ case 'sha384':
+ case 'sha512':
+ $this->engine = CRYPT_HASH_MODE == self::MODE_MHASH ? self::MODE_INTERNAL : CRYPT_HASH_MODE;
break;
default:
- $this->blockSize = 1024;
+ $this->engine = CRYPT_HASH_MODE;
}
- if (in_array(substr($hash, 0, 5), ['sha3-', 'shake'])) {
- // PHP 7.1.0 introduced support for "SHA3 fixed mode algorithms":
- // http://php.net/ChangeLog-7.php#7.1.0
- if (version_compare(PHP_VERSION, '7.1.0') < 0 || substr($hash, 0,5) == 'shake') {
- //preg_match('#(\d+)$#', $hash, $matches);
- //$this->parameters['capacity'] = 2 * $matches[1]; // 1600 - $this->blockSize
- //$this->parameters['rate'] = 1600 - $this->parameters['capacity']; // == $this->blockSize
- if (!$this->paddingType) {
- $this->paddingType = self::PADDING_SHA3;
+ switch ($this->engine) {
+ case self::MODE_MHASH:
+ switch ($hash) {
+ case 'md5':
+ $this->hash = MHASH_MD5;
+ break;
+ case 'sha256':
+ $this->hash = MHASH_SHA256;
+ break;
+ case 'sha1':
+ default:
+ $this->hash = MHASH_SHA1;
}
- $this->parameters = [
- 'capacity' => 1600 - $this->blockSize,
- 'rate' => $this->blockSize,
- 'length' => $this->length,
- 'padding' => $this->paddingType
- ];
- $hash = ['phpseclib3\Crypt\Hash', PHP_INT_SIZE == 8 ? 'sha3_64' : 'sha3_32'];
- }
- }
-
- if ($hash == 'sha512/224' || $hash == 'sha512/256') {
- // PHP 7.1.0 introduced sha512/224 and sha512/256 support:
- // http://php.net/ChangeLog-7.php#7.1.0
- if (version_compare(PHP_VERSION, '7.1.0') < 0) {
- // from http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf#page=24
- $initial = $hash == 'sha512/256' ?
- [
- '22312194FC2BF72C', '9F555FA3C84C64C2', '2393B86B6F53B151', '963877195940EABD',
- '96283EE2A88EFFE3', 'BE5E1E2553863992', '2B0199FC2C85B8AA', '0EB72DDC81C52CA2'
- ] :
- [
- '8C3D37C819544DA2', '73E1996689DCD4D6', '1DFAB7AE32FF9C82', '679DD514582F9FCF',
- '0F6D2B697BD44DA8', '77E36F7304C48942', '3F9D85A86A1D36C8', '1112E6AD91D692A1'
- ];
- for ($i = 0; $i < 8; $i++) {
- $initial[$i] = new BigInteger($initial[$i], 16);
- $initial[$i]->setPrecision(64);
+ $this->_computeKey(self::MODE_MHASH);
+ return;
+ case self::MODE_HASH:
+ switch ($hash) {
+ case 'md5':
+ $this->hash = 'md5';
+ return;
+ case 'md2':
+ case 'sha256':
+ case 'sha384':
+ case 'sha512':
+ $this->hash = $hash;
+ return;
+ case 'sha1':
+ default:
+ $this->hash = 'sha1';
}
-
- $this->parameters = compact('initial');
-
- $hash = ['phpseclib3\Crypt\Hash', 'sha512'];
- }
- }
-
- if (is_array($hash)) {
- $b = $this->blockSize >> 3;
- $this->ipad = str_repeat(chr(0x36), $b);
- $this->opad = str_repeat(chr(0x5C), $b);
- }
-
- $this->algo = $hash;
-
- $this->computeKey();
- }
-
- /**
- * KDF: Key-Derivation Function
- *
- * The key-derivation function generates pseudorandom bits used to key the hash functions.
- *
- * @param int $index a non-negative integer less than 2^64
- * @param int $numbytes a non-negative integer less than 2^64
- * @return string string of length numbytes bytes
- */
- private function kdf($index, $numbytes)
- {
- $this->c->setIV(pack('N4', 0, $index, 0, 1));
-
- return $this->c->encrypt(str_repeat("\0", $numbytes));
- }
-
- /**
- * PDF Algorithm
- *
- * @return string string of length taglen bytes.
- */
- private function pdf()
- {
- $k = $this->key;
- $nonce = $this->nonce;
- $taglen = $this->length;
-
- //
- // Extract and zero low bit(s) of Nonce if needed
- //
- if ($taglen <= 8) {
- $last = strlen($nonce) - 1;
- $mask = $taglen == 4 ? "\3" : "\1";
- $index = $nonce[$last] & $mask;
- $nonce[$last] = $nonce[$last] ^ $index;
- }
-
- //
- // Make Nonce BLOCKLEN bytes by appending zeroes if needed
- //
- $nonce = str_pad($nonce, 16, "\0");
-
- //
- // Generate subkey, encipher and extract indexed substring
- //
- $kp = $this->kdf(0, 16);
- $c = new AES('ctr');
- $c->disablePadding();
- $c->setKey($kp);
- $c->setIV($nonce);
- $t = $c->encrypt("\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0");
-
- // we could use ord() but per https://paragonie.com/blog/2016/06/constant-time-encoding-boring-cryptography-rfc-4648-and-you
- // unpack() doesn't leak timing info
- return $taglen <= 8 ?
- substr($t, unpack('C', $index)[1] * $taglen, $taglen) :
- substr($t, 0, $taglen);
- }
-
- /**
- * UHASH Algorithm
- *
- * @param string $m string of length less than 2^67 bits.
- * @param int $taglen the integer 4, 8, 12 or 16.
- * @return string string of length taglen bytes.
- */
- private function uhash($m, $taglen)
- {
- //
- // One internal iteration per 4 bytes of output
- //
- $iters = $taglen >> 2;
-
- //
- // Define total key needed for all iterations using KDF.
- // L1Key reuses most key material between iterations.
- //
- //$L1Key = $this->kdf(1, 1024 + ($iters - 1) * 16);
- $L1Key = $this->kdf(1, (1024 + ($iters - 1)) * 16);
- $L2Key = $this->kdf(2, $iters * 24);
- $L3Key1 = $this->kdf(3, $iters * 64);
- $L3Key2 = $this->kdf(4, $iters * 4);
-
- //
- // For each iteration, extract key and do three-layer hash.
- // If bytelength(M) <= 1024, then skip L2-HASH.
- //
- $y = '';
- for ($i = 0; $i < $iters; $i++) {
- $L1Key_i = substr($L1Key, $i * 16, 1024);
- $L2Key_i = substr($L2Key, $i * 24, 24);
- $L3Key1_i = substr($L3Key1, $i * 64, 64);
- $L3Key2_i = substr($L3Key2, $i * 4, 4);
-
- $a = self::L1Hash($L1Key_i, $m);
- $b = strlen($m) <= 1024 ? "\0\0\0\0\0\0\0\0$a" : self::L2Hash($L2Key_i, $a);
- $c = self::L3Hash($L3Key1_i, $L3Key2_i, $b);
- $y.= $c;
- }
-
- return $y;
- }
-
- /**
- * L1-HASH Algorithm
- *
- * The first-layer hash breaks the message into 1024-byte chunks and
- * hashes each with a function called NH. Concatenating the results
- * forms a string, which is up to 128 times shorter than the original.
- *
- * @param string $k string of length 1024 bytes.
- * @param string $m string of length less than 2^67 bits.
- * @return string string of length (8 * ceil(bitlength(M)/8192)) bytes.
- */
- private static function L1Hash($k, $m)
- {
- //
- // Break M into 1024 byte chunks (final chunk may be shorter)
- //
- $m = str_split($m, 1024);
-
- //
- // For each chunk, except the last: endian-adjust, NH hash
- // and add bit-length. Use results to build Y.
- //
- $length = new BigInteger(1024 * 8);
- $y = '';
- for ($i = 0; $i < count($m) - 1; $i++) {
- $m[$i] = pack('N*', ...unpack('V*', $m[$i])); // ENDIAN-SWAP
- $y.= static::nh($k, $m[$i], $length);
- }
-
- //
- // For the last chunk: pad to 32-byte boundary, endian-adjust,
- // NH hash and add bit-length. Concatenate the result to Y.
- //
- $length = strlen($m[$i]);
- $pad = 32 - ($length % 32);
- $pad = max(32, $length + $pad % 32);
- $m[$i] = str_pad($m[$i], $pad, "\0"); // zeropad
- $m[$i] = pack('N*', ...unpack('V*', $m[$i])); // ENDIAN-SWAP
-
- $y.= static::nh($k, $m[$i], new BigInteger($length * 8));
-
- return $y;
- }
-
- /**
- * NH Algorithm
- *
- * @param string $k string of length 1024 bytes.
- * @param string $m string with length divisible by 32 bytes.
- * @return string string of length 8 bytes.
- */
- private static function nh($k, $m, $length)
- {
- $toUInt32 = function($x) {
- $x = new BigInteger($x, 256);
- $x->setPrecision(32);
- return $x;
- };
-
- //
- // Break M and K into 4-byte chunks
- //
- //$t = strlen($m) >> 2;
- $m = str_split($m, 4);
- $t = count($m);
- $k = str_split($k, 4);
- $k = array_pad(array_slice($k, 0, $t), $t, 0);
-
- $m = array_map($toUInt32, $m);
- $k = array_map($toUInt32, $k);
-
- //
- // Perform NH hash on the chunks, pairing words for multiplication
- // which are 4 apart to accommodate vector-parallelism.
- //
- $y = new BigInteger;
- $y->setPrecision(64);
- $i = 0;
- while ($i < $t) {
- $temp = $m[$i]->add($k[$i]);
- $temp->setPrecision(64);
- $temp = $temp->multiply($m[$i + 4]->add($k[$i + 4]));
- $y = $y->add($temp);
-
- $temp = $m[$i + 1]->add($k[$i + 1]);
- $temp->setPrecision(64);
- $temp = $temp->multiply($m[$i + 5]->add($k[$i + 5]));
- $y = $y->add($temp);
-
- $temp = $m[$i + 2]->add($k[$i + 2]);
- $temp->setPrecision(64);
- $temp = $temp->multiply($m[$i + 6]->add($k[$i + 6]));
- $y = $y->add($temp);
-
- $temp = $m[$i + 3]->add($k[$i + 3]);
- $temp->setPrecision(64);
- $temp = $temp->multiply($m[$i + 7]->add($k[$i + 7]));
- $y = $y->add($temp);
-
- $i+= 8;
- }
-
- return $y->add($length)->toBytes();
- }
-
- /**
- * L2-HASH: Second-Layer Hash
- *
- * The second-layer rehashes the L1-HASH output using a polynomial hash
- * called POLY. If the L1-HASH output is long, then POLY is called once
- * on a prefix of the L1-HASH output and called using different settings
- * on the remainder. (This two-step hashing of the L1-HASH output is
- * needed only if the message length is greater than 16 megabytes.)
- * Careful implementation of POLY is necessary to avoid a possible
- * timing attack (see Section 6.6 for more information).
- *
- * @param string $k string of length 24 bytes.
- * @param string $m string of length less than 2^64 bytes.
- * @return string string of length 16 bytes.
- */
- private static function L2Hash($k, $m)
- {
- //
- // Extract keys and restrict to special key-sets
- //
- $k64 = $k & "\x01\xFF\xFF\xFF\x01\xFF\xFF\xFF";
- $k64 = new BigInteger($k64, 256);
- $k128 = substr($k, 8) & "\x01\xFF\xFF\xFF\x01\xFF\xFF\xFF\x01\xFF\xFF\xFF\x01\xFF\xFF\xFF";
- $k128 = new BigInteger($k128, 256);
-
- //
- // If M is no more than 2^17 bytes, hash under 64-bit prime,
- // otherwise, hash first 2^17 bytes under 64-bit prime and
- // remainder under 128-bit prime.
- //
- if (strlen($m) <= 0x20000) { // 2^14 64-bit words
- $y = self::poly(64, self::$maxwordrange64, $k64, $m);
- } else {
- $m_1 = substr($m, 0, 0x20000); // 1 << 17
- $m_2 = substr($m, 0x20000) . "\x80";
- $length = strlen($m_2);
- $pad = 16 - ($length % 16);
- $pad%= 16;
- $m_2 = str_pad($m_2, $length + $pad, "\0"); // zeropad
- $y = self::poly(64, self::$maxwordrange64, $k64, $m_1);
- $y = str_pad($y, 16, "\0", STR_PAD_LEFT);
- $y = self::poly(128, self::$maxwordrange128, $k128, $y . $m_2);
- }
-
- return str_pad($y, 16, "\0", STR_PAD_LEFT);
- }
-
- /**
- * POLY Algorithm
- *
- * @param int $wordbits the integer 64 or 128.
- * @param BigInteger $maxwordrange positive integer less than 2^wordbits.
- * @param BigInteger $k integer in the range 0 ... prime(wordbits) - 1.
- * @param string $m string with length divisible by (wordbits / 8) bytes.
- * @return integer in the range 0 ... prime(wordbits) - 1.
- */
- private static function poly($wordbits, $maxwordrange, $k, $m)
- {
- //
- // Define constants used for fixing out-of-range words
- //
- $wordbytes = $wordbits >> 3;
- if ($wordbits == 128) {
- $factory = self::$factory128;
- $offset = self::$offset128;
- $marker = self::$marker128;
- } else {
- $factory = self::$factory64;
- $offset = self::$offset64;
- $marker = self::$marker64;
+ $this->_computeKey(self::MODE_HASH);
+ return;
}
- $k = $factory->newInteger($k);
-
- //
- // Break M into chunks of length wordbytes bytes
- //
- $m_i = str_split($m, $wordbytes);
-
- //
- // Each input word m is compared with maxwordrange. If not smaller
- // then 'marker' and (m - offset), both in range, are hashed.
- //
- $y = $factory->newInteger(new BigInteger(1));
- foreach ($m_i as $m) {
- $m = $factory->newInteger(new BigInteger($m, 256));
- if ($m->compare($maxwordrange) >= 0) {
- $y = $k->multiply($y)->add($marker);
- $y = $k->multiply($y)->add($m->subtract($offset));
- } else {
- $y = $k->multiply($y)->add($m);
- }
+ switch ($hash) {
+ case 'md2':
+ $this->hash = array($this, '_md2');
+ break;
+ case 'md5':
+ $this->hash = array($this, '_md5');
+ break;
+ case 'sha256':
+ $this->hash = array($this, '_sha256');
+ break;
+ case 'sha384':
+ case 'sha512':
+ $this->hash = array($this, '_sha512');
+ break;
+ case 'sha1':
+ default:
+ $this->hash = array($this, '_sha1');
}
- return $y->toBytes();
- }
-
- /**
- * L3-HASH: Third-Layer Hash
- *
- * The output from L2-HASH is 16 bytes long. This final hash function
- * hashes the 16-byte string to a fixed length of 4 bytes.
- *
- * @param string $k1 string of length 64 bytes.
- * @param string $k2 string of length 4 bytes.
- * @param string $m string of length 16 bytes.
- * @return string string of length 4 bytes.
- */
- private static function L3Hash($k1, $k2, $m)
- {
- $factory = self::$factory36;
-
- $y = $factory->newInteger(new BigInteger());
- for ($i = 0; $i < 8; $i++) {
- $m_i = $factory->newInteger(new BigInteger(substr($m, 2 * $i, 2), 256));
- $k_i = $factory->newInteger(new BigInteger(substr($k1, 8 * $i, 8), 256));
- $y = $y->add($m_i->multiply($k_i));
- }
- $y = str_pad(substr($y->toBytes(), -4), 4, "\0", STR_PAD_LEFT);
- $y = $y ^ $k2;
+ $this->ipad = str_repeat(chr(0x36), $this->b);
+ $this->opad = str_repeat(chr(0x5C), $this->b);
- return $y;
+ $this->_computeKey(self::MODE_INTERNAL);
}
/**
- * Compute the Hash / HMAC / UMAC.
+ * Compute the HMAC.
*
* @access public
* @param string $text
* @return string
*/
- public function hash($text)
+ function hash($text)
{
- $algo = $this->algo;
- if ($algo == 'umac') {
- if ($this->recomputeAESKey) {
- if (!is_string($this->nonce)) {
- throw new InsufficientSetupException('No nonce has been set');
- }
- if (!is_string($this->key)) {
- throw new InsufficientSetupException('No key has been set');
- }
- if (strlen($this->key) != 16) {
- throw new \LengthException('Key must be 16 bytes long');
- }
-
- if (!isset(self::$maxwordrange64)) {
- $one = new BigInteger(1);
-
- $prime36 = new BigInteger("\x00\x00\x00\x0F\xFF\xFF\xFF\xFB", 256);
- self::$factory36 = new PrimeField($prime36);
-
- $prime64 = new BigInteger("\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xC5", 256);
- self::$factory64 = new PrimeField($prime64);
-
- $prime128 = new BigInteger("\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\x61", 256);
- self::$factory128 = new PrimeField($prime128);
-
- self::$offset64 = new BigInteger("\1\0\0\0\0\0\0\0\0", 256);
- self::$offset64 = self::$factory64->newInteger(self::$offset64->subtract($prime64));
- self::$offset128 = new BigInteger("\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 256);
- self::$offset128 = self::$factory128->newInteger(self::$offset128->subtract($prime128));
-
- self::$marker64 = self::$factory64->newInteger($prime64->subtract($one));
- self::$marker128 = self::$factory128->newInteger($prime128->subtract($one));
-
- $maxwordrange64 = $one->bitwise_leftShift(64)->subtract($one->bitwise_leftShift(32));
- self::$maxwordrange64 = self::$factory64->newInteger($maxwordrange64);
-
- $maxwordrange128 = $one->bitwise_leftShift(128)->subtract($one->bitwise_leftShift(96));
- self::$maxwordrange128 = self::$factory128->newInteger($maxwordrange128);
- }
-
- $this->c = new AES('ctr');
- $this->c->disablePadding();
- $this->c->setKey($this->key);
-
- $this->pad = $this->pdf();
-
- $this->recomputeAESKey = false;
+ if (!empty($this->key) || is_string($this->key)) {
+ switch ($this->engine) {
+ case self::MODE_MHASH:
+ $output = mhash($this->hash, $text, $this->computedKey);
+ break;
+ case self::MODE_HASH:
+ $output = hash_hmac($this->hash, $text, $this->computedKey, true);
+ break;
+ case self::MODE_INTERNAL:
+ $key = str_pad($this->computedKey, $this->b, chr(0)); // step 1
+ $temp = $this->ipad ^ $key; // step 2
+ $temp .= $text; // step 3
+ $temp = call_user_func($this->hash, $temp); // step 4
+ $output = $this->opad ^ $key; // step 5
+ $output.= $temp; // step 6
+ $output = call_user_func($this->hash, $output); // step 7
}
-
- $hashedmessage = $this->uhash($text, $this->length);
- return $hashedmessage ^ $this->pad;
- }
-
- if (is_array($algo)) {
- if (empty($this->key) || !is_string($this->key)) {
- return substr($algo($text, ...array_values($this->parameters)), 0, $this->length);
+ } else {
+ switch ($this->engine) {
+ case self::MODE_MHASH:
+ $output = mhash($this->hash, $text);
+ break;
+ case self::MODE_HASH:
+ $output = hash($this->hash, $text, true);
+ break;
+ case self::MODE_INTERNAL:
+ $output = call_user_func($this->hash, $text);
}
-
- // SHA3 HMACs are discussed at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf#page=30
-
- $key = str_pad($this->computedKey, $b, chr(0));
- $temp = $this->ipad ^ $key;
- $temp .= $text;
- $temp = substr($algo($temp, ...array_values($this->parameters)), 0, $this->length);
- $output = $this->opad ^ $key;
- $output.= $temp;
- $output = $algo($output, ...array_values($this->parameters));
-
- return substr($output, 0, $this->length);
}
- $output = !empty($this->key) || is_string($this->key) ?
- hash_hmac($algo, $text, $this->computedKey, true) :
- hash($algo, $text, true);
-
- return strlen($output) > $this->length
- ? substr($output, 0, $this->length)
- : $output;
- }
-
- /**
- * Returns the hash length (in bits)
- *
- * @access public
- * @return int
- */
- public function getLength()
- {
- return $this->length << 3;
+ return substr($output, 0, $this->l);
}
/**
@@ -893,444 +409,248 @@ class Hash
* @access public
* @return int
*/
- public function getLengthInBytes()
+ function getLength()
{
- return $this->length;
+ return $this->l;
}
/**
- * Returns the block length (in bits)
+ * Wrapper for MD5
*
- * @access public
- * @return int
- */
- public function getBlockLength()
- {
- return $this->blockSize;
- }
-
- /**
- * Returns the block length (in bytes)
- *
- * @access public
- * @return int
+ * @access private
+ * @param string $m
*/
- public function getBlockLengthInBytes()
+ function _md5($m)
{
- return $this->blockSize >> 3;
+ return pack('H*', md5($m));
}
/**
- * Pads SHA3 based on the mode
+ * Wrapper for SHA1
*
* @access private
- * @param int $padLength
- * @param int $padType
- * @return string
+ * @param string $m
*/
- private static function sha3_pad($padLength, $padType)
+ function _sha1($m)
{
- switch ($padType) {
- //case self::PADDING_KECCAK:
- // $temp = chr(0x06) . str_repeat("\0", $padLength - 1);
- // $temp[$padLength - 1] = $temp[$padLength - 1] | chr(0x80);
- // return $temp
- case self::PADDING_SHAKE:
- $temp = chr(0x1F) . str_repeat("\0", $padLength - 1);
- $temp[$padLength - 1] = $temp[$padLength - 1] | chr(0x80);
- return $temp;
- //case self::PADDING_SHA3:
- default:
- // from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf#page=36
- return $padLength == 1 ? chr(0x86) : chr(0x06) . str_repeat("\0", $padLength - 2) . chr(0x80);
- }
+ return pack('H*', sha1($m));
}
/**
- * Pure-PHP 32-bit implementation of SHA3
+ * Pure-PHP implementation of MD2
*
- * Whereas BigInteger.php's 32-bit engine works on PHP 64-bit this 32-bit implementation
- * of SHA3 will *not* work on PHP 64-bit. This is because this implementation
- * employees bitwise NOTs and bitwise left shifts. And the round constants only work
- * on 32-bit PHP. eg. dechex(-2147483648) returns 80000000 on 32-bit PHP and
- * FFFFFFFF80000000 on 64-bit PHP. Sure, we could do bitwise ANDs but that would slow
- * things down.
- *
- * SHA512 requires BigInteger to simulate 64-bit unsigned integers because SHA2 employees
- * addition whereas SHA3 just employees bitwise operators. PHP64 only supports signed
- * 64-bit integers, which complicates addition, whereas that limitation isn't an issue
- * for SHA3.
- *
- * In https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=919061#page=16 KECCAK[C] is
- * defined as "the KECCAK instance with KECCAK-f[1600] as the underlying permutation and
- * capacity c". This is relevant because, altho the KECCAK standard defines a mode
- * (KECCAK-f[800]) designed for 32-bit machines that mode is incompatible with SHA3
+ * See {@link http://tools.ietf.org/html/rfc1319 RFC1319}.
*
* @access private
- * @param string $p
- * @param int $c
- * @param int $r
- * @param int $d
- * @param int $padType
+ * @param string $m
*/
- private static function sha3_32($p, $c, $r, $d, $padType)
+ function _md2($m)
{
- $block_size = $r >> 3;
- $padLength = $block_size - (strlen($p) % $block_size);
- $num_ints = $block_size >> 2;
-
- $p.= static::sha3_pad($padLength, $padType);
-
- $n = strlen($p) / $r; // number of blocks
-
- $s = [
- [[0, 0], [0, 0], [0, 0], [0, 0], [0, 0]],
- [[0, 0], [0, 0], [0, 0], [0, 0], [0, 0]],
- [[0, 0], [0, 0], [0, 0], [0, 0], [0, 0]],
- [[0, 0], [0, 0], [0, 0], [0, 0], [0, 0]],
- [[0, 0], [0, 0], [0, 0], [0, 0], [0, 0]]
- ];
-
- $p = str_split($p, $block_size);
-
- foreach ($p as $pi) {
- $pi = unpack('V*', $pi);
- $x = $y = 0;
- for ($i = 1; $i <= $num_ints; $i+=2) {
- $s[$x][$y][0]^= $pi[$i + 1];
- $s[$x][$y][1]^= $pi[$i];
- if (++$y == 5) {
- $y = 0;
- $x++;
- }
- }
- static::processSHA3Block32($s);
- }
+ static $s = array(
+ 41, 46, 67, 201, 162, 216, 124, 1, 61, 54, 84, 161, 236, 240, 6,
+ 19, 98, 167, 5, 243, 192, 199, 115, 140, 152, 147, 43, 217, 188,
+ 76, 130, 202, 30, 155, 87, 60, 253, 212, 224, 22, 103, 66, 111, 24,
+ 138, 23, 229, 18, 190, 78, 196, 214, 218, 158, 222, 73, 160, 251,
+ 245, 142, 187, 47, 238, 122, 169, 104, 121, 145, 21, 178, 7, 63,
+ 148, 194, 16, 137, 11, 34, 95, 33, 128, 127, 93, 154, 90, 144, 50,
+ 39, 53, 62, 204, 231, 191, 247, 151, 3, 255, 25, 48, 179, 72, 165,
+ 181, 209, 215, 94, 146, 42, 172, 86, 170, 198, 79, 184, 56, 210,
+ 150, 164, 125, 182, 118, 252, 107, 226, 156, 116, 4, 241, 69, 157,
+ 112, 89, 100, 113, 135, 32, 134, 91, 207, 101, 230, 45, 168, 2, 27,
+ 96, 37, 173, 174, 176, 185, 246, 28, 70, 97, 105, 52, 64, 126, 15,
+ 85, 71, 163, 35, 221, 81, 175, 58, 195, 92, 249, 206, 186, 197,
+ 234, 38, 44, 83, 13, 110, 133, 40, 132, 9, 211, 223, 205, 244, 65,
+ 129, 77, 82, 106, 220, 55, 200, 108, 193, 171, 250, 36, 225, 123,
+ 8, 12, 189, 177, 74, 120, 136, 149, 139, 227, 99, 232, 109, 233,
+ 203, 213, 254, 59, 0, 29, 57, 242, 239, 183, 14, 102, 88, 208, 228,
+ 166, 119, 114, 248, 235, 117, 75, 10, 49, 68, 80, 180, 143, 237,
+ 31, 26, 219, 153, 141, 51, 159, 17, 131, 20
+ );
+
+ // Step 1. Append Padding Bytes
+ $pad = 16 - (strlen($m) & 0xF);
+ $m.= str_repeat(chr($pad), $pad);
- $z = '';
- $i = $j = 0;
- while (strlen($z) < $d) {
- $z.= pack('V2', $s[$i][$j][1], $s[$i][$j++][0]);
- if ($j == 5) {
- $j = 0;
- $i++;
- if ($i == 5) {
- $i = 0;
- static::processSHA3Block32($s);
- }
+ $length = strlen($m);
+
+ // Step 2. Append Checksum
+ $c = str_repeat(chr(0), 16);
+ $l = chr(0);
+ for ($i = 0; $i < $length; $i+= 16) {
+ for ($j = 0; $j < 16; $j++) {
+ // RFC1319 incorrectly states that C[j] should be set to S[c xor L]
+ //$c[$j] = chr($s[ord($m[$i + $j] ^ $l)]);
+ // per <http://www.rfc-editor.org/errata_search.php?rfc=1319>, however, C[j] should be set to S[c xor L] xor C[j]
+ $c[$j] = chr($s[ord($m[$i + $j] ^ $l)] ^ ord($c[$j]));
+ $l = $c[$j];
}
}
+ $m.= $c;
- return $z;
- }
+ $length+= 16;
- /**
- * 32-bit block processing method for SHA3
- *
- * @access private
- * @param array $s
- */
- private static function processSHA3Block32(&$s)
- {
- static $rotationOffsets = [
- [ 0, 1, 62, 28, 27],
- [36, 44, 6, 55, 20],
- [ 3, 10, 43, 25, 39],
- [41, 45, 15, 21, 8],
- [18, 2, 61, 56, 14]
- ];
-
- // the standards give these constants in hexadecimal notation. it's tempting to want to use
- // that same notation, here, however, we can't, because 0x80000000, on PHP32, is a positive
- // float - not the negative int that we need to be in PHP32. so we use -2147483648 instead
- static $roundConstants = [
- [0, 1],
- [0, 32898],
- [-2147483648, 32906],
- [-2147483648, -2147450880],
- [0, 32907],
- [0, -2147483647],
- [-2147483648, -2147450751],
- [-2147483648, 32777],
- [0, 138],
- [0, 136],
- [0, -2147450871],
- [0, -2147483638],
- [0, -2147450741],
- [-2147483648, 139],
- [-2147483648, 32905],
- [-2147483648, 32771],
- [-2147483648, 32770],
- [-2147483648, 128],
- [0, 32778],
- [-2147483648, -2147483638],
- [-2147483648, -2147450751],
- [-2147483648, 32896],
- [0, -2147483647],
- [-2147483648, -2147450872]
- ];
-
- for ($round = 0; $round < 24; $round++) {
- // theta step
- $parity = $rotated = [];
- for ($i = 0; $i < 5; $i++) {
- $parity[] = [
- $s[0][$i][0] ^ $s[1][$i][0] ^ $s[2][$i][0] ^ $s[3][$i][0] ^ $s[4][$i][0],
- $s[0][$i][1] ^ $s[1][$i][1] ^ $s[2][$i][1] ^ $s[3][$i][1] ^ $s[4][$i][1]
- ];
- $rotated[] = static::rotateLeft32($parity[$i], 1);
- }
+ // Step 3. Initialize MD Buffer
+ $x = str_repeat(chr(0), 48);
- $temp = [
- [$parity[4][0] ^ $rotated[1][0], $parity[4][1] ^ $rotated[1][1]],
- [$parity[0][0] ^ $rotated[2][0], $parity[0][1] ^ $rotated[2][1]],
- [$parity[1][0] ^ $rotated[3][0], $parity[1][1] ^ $rotated[3][1]],
- [$parity[2][0] ^ $rotated[4][0], $parity[2][1] ^ $rotated[4][1]],
- [$parity[3][0] ^ $rotated[0][0], $parity[3][1] ^ $rotated[0][1]]
- ];
- for ($i = 0; $i < 5; $i++) {
- for ($j = 0; $j < 5; $j++) {
- $s[$i][$j][0]^= $temp[$j][0];
- $s[$i][$j][1]^= $temp[$j][1];
- }
+ // Step 4. Process Message in 16-Byte Blocks
+ for ($i = 0; $i < $length; $i+= 16) {
+ for ($j = 0; $j < 16; $j++) {
+ $x[$j + 16] = $m[$i + $j];
+ $x[$j + 32] = $x[$j + 16] ^ $x[$j];
}
-
- $st = $s;
-
- // rho and pi steps
- for ($i = 0; $i < 5; $i++) {
- for ($j = 0; $j < 5; $j++) {
- $st[(2 * $i + 3 * $j) % 5][$j] = static::rotateLeft32($s[$j][$i], $rotationOffsets[$j][$i]);
+ $t = chr(0);
+ for ($j = 0; $j < 18; $j++) {
+ for ($k = 0; $k < 48; $k++) {
+ $x[$k] = $t = $x[$k] ^ chr($s[ord($t)]);
+ //$t = $x[$k] = $x[$k] ^ chr($s[ord($t)]);
}
+ $t = chr(ord($t) + $j);
}
-
- // chi step
- for ($i = 0; $i < 5; $i++) {
- $s[$i][0] = [
- $st[$i][0][0] ^ (~$st[$i][1][0] & $st[$i][2][0]),
- $st[$i][0][1] ^ (~$st[$i][1][1] & $st[$i][2][1])
- ];
- $s[$i][1] = [
- $st[$i][1][0] ^ (~$st[$i][2][0] & $st[$i][3][0]),
- $st[$i][1][1] ^ (~$st[$i][2][1] & $st[$i][3][1])
- ];
- $s[$i][2] = [
- $st[$i][2][0] ^ (~$st[$i][3][0] & $st[$i][4][0]),
- $st[$i][2][1] ^ (~$st[$i][3][1] & $st[$i][4][1])
- ];
- $s[$i][3] = [
- $st[$i][3][0] ^ (~$st[$i][4][0] & $st[$i][0][0]),
- $st[$i][3][1] ^ (~$st[$i][4][1] & $st[$i][0][1])
- ];
- $s[$i][4] = [
- $st[$i][4][0] ^ (~$st[$i][0][0] & $st[$i][1][0]),
- $st[$i][4][1] ^ (~$st[$i][0][1] & $st[$i][1][1])
- ];
- }
-
- // iota step
- $s[0][0][0]^= $roundConstants[$round][0];
- $s[0][0][1]^= $roundConstants[$round][1];
}
- }
- /**
- * Rotate 32-bit int
- *
- * @access private
- * @param array $x
- * @param int $shift
- */
- private static function rotateLeft32($x, $shift)
- {
- if ($shift < 32) {
- list($hi, $lo) = $x;
- } else {
- $shift-= 32;
- list($lo, $hi) = $x;
- }
-
- return [
- ($hi << $shift) | (($lo >> (32 - $shift)) & (1 << $shift) - 1),
- ($lo << $shift) | (($hi >> (32 - $shift)) & (1 << $shift) - 1)
- ];
+ // Step 5. Output
+ return substr($x, 0, 16);
}
/**
- * Pure-PHP 64-bit implementation of SHA3
+ * Pure-PHP implementation of SHA256
+ *
+ * See {@link http://en.wikipedia.org/wiki/SHA_hash_functions#SHA-256_.28a_SHA-2_variant.29_pseudocode SHA-256 (a SHA-2 variant) pseudocode - Wikipedia}.
*
* @access private
- * @param string $p
- * @param int $c
- * @param int $r
- * @param int $d
- * @param int $padType
+ * @param string $m
*/
- private static function sha3_64($p, $c, $r, $d, $padType)
+ function _sha256($m)
{
- $block_size = $r >> 3;
- $padLength = $block_size - (strlen($p) % $block_size);
- $num_ints = $block_size >> 2;
-
- $p.= static::sha3_pad($padLength, $padType);
-
- $n = strlen($p) / $r; // number of blocks
-
- $s = [
- [0, 0, 0, 0, 0],
- [0, 0, 0, 0, 0],
- [0, 0, 0, 0, 0],
- [0, 0, 0, 0, 0],
- [0, 0, 0, 0, 0]
- ];
-
- $p = str_split($p, $block_size);
-
- foreach ($p as $pi) {
- $pi = unpack('P*', $pi);
- $x = $y = 0;
- foreach ($pi as $subpi) {
- $s[$x][$y++]^= $subpi;
- if ($y == 5) {
- $y = 0;
- $x++;
- }
- }
- static::processSHA3Block64($s);
+ if (extension_loaded('suhosin')) {
+ return pack('H*', sha256($m));
}
- $z = '';
- $i = $j = 0;
- while (strlen($z) < $d) {
- $z.= pack('P', $s[$i][$j++]);
- if ($j == 5) {
- $j = 0;
- $i++;
- if ($i == 5) {
- $i = 0;
- static::processSHA3Block64($s);
- }
- }
- }
+ // Initialize variables
+ $hash = array(
+ 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19
+ );
+ // Initialize table of round constants
+ // (first 32 bits of the fractional parts of the cube roots of the first 64 primes 2..311)
+ static $k = array(
+ 0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
+ 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
+ 0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
+ 0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
+ 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
+ 0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
+ 0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
+ 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
+ );
- return $z;
- }
+ // Pre-processing
+ $length = strlen($m);
+ // to round to nearest 56 mod 64, we'll add 64 - (length + (64 - 56)) % 64
+ $m.= str_repeat(chr(0), 64 - (($length + 8) & 0x3F));
+ $m[$length] = chr(0x80);
+ // we don't support hashing strings 512MB long
+ $m.= pack('N2', 0, $length << 3);
- /**
- * 64-bit block processing method for SHA3
- *
- * @access private
- * @param array $s
- */
- private static function processSHA3Block64(&$s)
- {
- static $rotationOffsets = [
- [ 0, 1, 62, 28, 27],
- [36, 44, 6, 55, 20],
- [ 3, 10, 43, 25, 39],
- [41, 45, 15, 21, 8],
- [18, 2, 61, 56, 14]
- ];
-
- static $roundConstants = [
- 1,
- 32898,
- -9223372036854742902,
- -9223372034707259392,
- 32907,
- 2147483649,
- -9223372034707259263,
- -9223372036854743031,
- 138,
- 136,
- 2147516425,
- 2147483658,
- 2147516555,
- -9223372036854775669,
- -9223372036854742903,
- -9223372036854743037,
- -9223372036854743038,
- -9223372036854775680,
- 32778,
- -9223372034707292150,
- -9223372034707259263,
- -9223372036854742912,
- 2147483649,
- -9223372034707259384
- ];
-
- for ($round = 0; $round < 24; $round++) {
- // theta step
- $parity = [];
- for ($i = 0; $i < 5; $i++) {
- $parity[] = $s[0][$i] ^ $s[1][$i] ^ $s[2][$i] ^ $s[3][$i] ^ $s[4][$i];
- }
- $temp = [
- $parity[4] ^ static::rotateLeft64($parity[1], 1),
- $parity[0] ^ static::rotateLeft64($parity[2], 1),
- $parity[1] ^ static::rotateLeft64($parity[3], 1),
- $parity[2] ^ static::rotateLeft64($parity[4], 1),
- $parity[3] ^ static::rotateLeft64($parity[0], 1)
- ];
- for ($i = 0; $i < 5; $i++) {
- for ($j = 0; $j < 5; $j++) {
- $s[$i][$j]^= $temp[$j];
- }
+ // Process the message in successive 512-bit chunks
+ $chunks = str_split($m, 64);
+ foreach ($chunks as $chunk) {
+ $w = array();
+ for ($i = 0; $i < 16; $i++) {
+ extract(unpack('Ntemp', $this->_string_shift($chunk, 4)));
+ $w[] = $temp;
}
- $st = $s;
-
- // rho and pi steps
- for ($i = 0; $i < 5; $i++) {
- for ($j = 0; $j < 5; $j++) {
- $st[(2 * $i + 3 * $j) % 5][$j] = static::rotateLeft64($s[$j][$i], $rotationOffsets[$j][$i]);
- }
+ // Extend the sixteen 32-bit words into sixty-four 32-bit words
+ for ($i = 16; $i < 64; $i++) {
+ // @codingStandardsIgnoreStart
+ $s0 = $this->_rightRotate($w[$i - 15], 7) ^
+ $this->_rightRotate($w[$i - 15], 18) ^
+ $this->_rightShift( $w[$i - 15], 3);
+ $s1 = $this->_rightRotate($w[$i - 2], 17) ^
+ $this->_rightRotate($w[$i - 2], 19) ^
+ $this->_rightShift( $w[$i - 2], 10);
+ // @codingStandardsIgnoreEnd
+ $w[$i] = $this->_add($w[$i - 16], $s0, $w[$i - 7], $s1);
}
- // chi step
- for ($i = 0; $i < 5; $i++) {
- $s[$i] = [
- $st[$i][0] ^ (~$st[$i][1] & $st[$i][2]),
- $st[$i][1] ^ (~$st[$i][2] & $st[$i][3]),
- $st[$i][2] ^ (~$st[$i][3] & $st[$i][4]),
- $st[$i][3] ^ (~$st[$i][4] & $st[$i][0]),
- $st[$i][4] ^ (~$st[$i][0] & $st[$i][1])
- ];
+ // Initialize hash value for this chunk
+ list($a, $b, $c, $d, $e, $f, $g, $h) = $hash;
+
+ // Main loop
+ for ($i = 0; $i < 64; $i++) {
+ $s0 = $this->_rightRotate($a, 2) ^
+ $this->_rightRotate($a, 13) ^
+ $this->_rightRotate($a, 22);
+ $maj = ($a & $b) ^
+ ($a & $c) ^
+ ($b & $c);
+ $t2 = $this->_add($s0, $maj);
+
+ $s1 = $this->_rightRotate($e, 6) ^
+ $this->_rightRotate($e, 11) ^
+ $this->_rightRotate($e, 25);
+ $ch = ($e & $f) ^
+ ($this->_not($e) & $g);
+ $t1 = $this->_add($h, $s1, $ch, $k[$i], $w[$i]);
+
+ $h = $g;
+ $g = $f;
+ $f = $e;
+ $e = $this->_add($d, $t1);
+ $d = $c;
+ $c = $b;
+ $b = $a;
+ $a = $this->_add($t1, $t2);
}
- // iota step
- $s[0][0]^= $roundConstants[$round];
+ // Add this chunk's hash to result so far
+ $hash = array(
+ $this->_add($hash[0], $a),
+ $this->_add($hash[1], $b),
+ $this->_add($hash[2], $c),
+ $this->_add($hash[3], $d),
+ $this->_add($hash[4], $e),
+ $this->_add($hash[5], $f),
+ $this->_add($hash[6], $g),
+ $this->_add($hash[7], $h)
+ );
}
- }
- /**
- * Rotate 64-bit int
- *
- * @access private
- * @param int $x
- * @param int $shift
- */
- private static function rotateLeft64($x, $shift)
- {
- return ($x << $shift) | (($x >> (64 - $shift)) & ((1 << $shift) - 1));
+ // Produce the final hash value (big-endian)
+ return pack('N8', $hash[0], $hash[1], $hash[2], $hash[3], $hash[4], $hash[5], $hash[6], $hash[7]);
}
/**
- * Pure-PHP implementation of SHA512
+ * Pure-PHP implementation of SHA384 and SHA512
*
* @access private
* @param string $m
- * @param array $hash
- * @return string
*/
- private static function sha512($m, $hash)
+ function _sha512($m)
{
- static $k;
+ static $init384, $init512, $k;
if (!isset($k)) {
+ // Initialize variables
+ $init384 = array( // initial values for SHA384
+ 'cbbb9d5dc1059ed8', '629a292a367cd507', '9159015a3070dd17', '152fecd8f70e5939',
+ '67332667ffc00b31', '8eb44a8768581511', 'db0c2e0d64f98fa7', '47b5481dbefa4fa4'
+ );
+ $init512 = array( // initial values for SHA512
+ '6a09e667f3bcc908', 'bb67ae8584caa73b', '3c6ef372fe94f82b', 'a54ff53a5f1d36f1',
+ '510e527fade682d1', '9b05688c2b3e6c1f', '1f83d9abfb41bd6b', '5be0cd19137e2179'
+ );
+
+ for ($i = 0; $i < 8; $i++) {
+ $init384[$i] = new BigInteger($init384[$i], 16);
+ $init384[$i]->setPrecision(64);
+ $init512[$i] = new BigInteger($init512[$i], 16);
+ $init512[$i]->setPrecision(64);
+ }
+
// Initialize table of round constants
// (first 64 bits of the fractional parts of the cube roots of the first 80 primes 2..409)
- $k = [
+ $k = array(
'428a2f98d728ae22', '7137449123ef65cd', 'b5c0fbcfec4d3b2f', 'e9b5dba58189dbbc',
'3956c25bf348b538', '59f111f1b605d019', '923f82a4af194f9b', 'ab1c5ed5da6d8118',
'd807aa98a3030242', '12835b0145706fbe', '243185be4ee4b28c', '550c7dc3d5ffb4e2',
@@ -1351,13 +671,15 @@ class Hash
'06f067aa72176fba', '0a637dc5a2c898a6', '113f9804bef90dae', '1b710b35131c471b',
'28db77f523047d84', '32caab7b40c72493', '3c9ebe0a15c9bebc', '431d67c49c100d4c',
'4cc5d4becb3e42b6', '597f299cfc657e2a', '5fcb6fab3ad6faec', '6c44198c4a475817'
- ];
+ );
for ($i = 0; $i < 80; $i++) {
$k[$i] = new BigInteger($k[$i], 16);
}
}
+ $hash = $this->l == 48 ? $init384 : $init512;
+
// Pre-processing
$length = strlen($m);
// to round to nearest 112 mod 128, we'll add 128 - (length + (128 - 112)) % 128
@@ -1369,92 +691,92 @@ class Hash
// Process the message in successive 1024-bit chunks
$chunks = str_split($m, 128);
foreach ($chunks as $chunk) {
- $w = [];
+ $w = array();
for ($i = 0; $i < 16; $i++) {
- $temp = new BigInteger(Strings::shift($chunk, 8), 256);
+ $temp = new BigInteger($this->_string_shift($chunk, 8), 256);
$temp->setPrecision(64);
$w[] = $temp;
}
// Extend the sixteen 32-bit words into eighty 32-bit words
for ($i = 16; $i < 80; $i++) {
- $temp = [
+ $temp = array(
$w[$i - 15]->bitwise_rightRotate(1),
$w[$i - 15]->bitwise_rightRotate(8),
$w[$i - 15]->bitwise_rightShift(7)
- ];
+ );
$s0 = $temp[0]->bitwise_xor($temp[1]);
$s0 = $s0->bitwise_xor($temp[2]);
- $temp = [
+ $temp = array(
$w[$i - 2]->bitwise_rightRotate(19),
$w[$i - 2]->bitwise_rightRotate(61),
$w[$i - 2]->bitwise_rightShift(6)
- ];
+ );
$s1 = $temp[0]->bitwise_xor($temp[1]);
$s1 = $s1->bitwise_xor($temp[2]);
- $w[$i] = clone $w[$i - 16];
+ $w[$i] = $w[$i - 16]->copy();
$w[$i] = $w[$i]->add($s0);
$w[$i] = $w[$i]->add($w[$i - 7]);
$w[$i] = $w[$i]->add($s1);
}
// Initialize hash value for this chunk
- $a = clone $hash[0];
- $b = clone $hash[1];
- $c = clone $hash[2];
- $d = clone $hash[3];
- $e = clone $hash[4];
- $f = clone $hash[5];
- $g = clone $hash[6];
- $h = clone $hash[7];
+ $a = $hash[0]->copy();
+ $b = $hash[1]->copy();
+ $c = $hash[2]->copy();
+ $d = $hash[3]->copy();
+ $e = $hash[4]->copy();
+ $f = $hash[5]->copy();
+ $g = $hash[6]->copy();
+ $h = $hash[7]->copy();
// Main loop
for ($i = 0; $i < 80; $i++) {
- $temp = [
+ $temp = array(
$a->bitwise_rightRotate(28),
$a->bitwise_rightRotate(34),
$a->bitwise_rightRotate(39)
- ];
+ );
$s0 = $temp[0]->bitwise_xor($temp[1]);
$s0 = $s0->bitwise_xor($temp[2]);
- $temp = [
+ $temp = array(
$a->bitwise_and($b),
$a->bitwise_and($c),
$b->bitwise_and($c)
- ];
+ );
$maj = $temp[0]->bitwise_xor($temp[1]);
$maj = $maj->bitwise_xor($temp[2]);
$t2 = $s0->add($maj);
- $temp = [
+ $temp = array(
$e->bitwise_rightRotate(14),
$e->bitwise_rightRotate(18),
$e->bitwise_rightRotate(41)
- ];
+ );
$s1 = $temp[0]->bitwise_xor($temp[1]);
$s1 = $s1->bitwise_xor($temp[2]);
- $temp = [
+ $temp = array(
$e->bitwise_and($f),
$g->bitwise_and($e->bitwise_not())
- ];
+ );
$ch = $temp[0]->bitwise_xor($temp[1]);
$t1 = $h->add($s1);
$t1 = $t1->add($ch);
$t1 = $t1->add($k[$i]);
$t1 = $t1->add($w[$i]);
- $h = clone $g;
- $g = clone $f;
- $f = clone $e;
+ $h = $g->copy();
+ $g = $f->copy();
+ $f = $e->copy();
$e = $d->add($t1);
- $d = clone $c;
- $c = clone $b;
- $b = clone $a;
+ $d = $c->copy();
+ $c = $b->copy();
+ $b = $a->copy();
$a = $t1->add($t2);
}
// Add this chunk's hash to result so far
- $hash = [
+ $hash = array(
$hash[0]->add($a),
$hash[1]->add($b),
$hash[2]->add($c),
@@ -1463,22 +785,109 @@ class Hash
$hash[5]->add($f),
$hash[6]->add($g),
$hash[7]->add($h)
- ];
+ );
}
// Produce the final hash value (big-endian)
- // (\phpseclib3\Crypt\Hash::hash() trims the output for hashes but not for HMACs. as such, we trim the output here)
+ // (\phpseclib\Crypt\Hash::hash() trims the output for hashes but not for HMACs. as such, we trim the output here)
$temp = $hash[0]->toBytes() . $hash[1]->toBytes() . $hash[2]->toBytes() . $hash[3]->toBytes() .
- $hash[4]->toBytes() . $hash[5]->toBytes() . $hash[6]->toBytes() . $hash[7]->toBytes();
+ $hash[4]->toBytes() . $hash[5]->toBytes();
+ if ($this->l != 48) {
+ $temp.= $hash[6]->toBytes() . $hash[7]->toBytes();
+ }
return $temp;
}
/**
- * __toString() magic method
+ * Right Rotate
+ *
+ * @access private
+ * @param int $int
+ * @param int $amt
+ * @see self::_sha256()
+ * @return int
+ */
+ function _rightRotate($int, $amt)
+ {
+ $invamt = 32 - $amt;
+ $mask = (1 << $invamt) - 1;
+ return (($int << $invamt) & 0xFFFFFFFF) | (($int >> $amt) & $mask);
+ }
+
+ /**
+ * Right Shift
+ *
+ * @access private
+ * @param int $int
+ * @param int $amt
+ * @see self::_sha256()
+ * @return int
+ */
+ function _rightShift($int, $amt)
+ {
+ $mask = (1 << (32 - $amt)) - 1;
+ return ($int >> $amt) & $mask;
+ }
+
+ /**
+ * Not
+ *
+ * @access private
+ * @param int $int
+ * @see self::_sha256()
+ * @return int
+ */
+ function _not($int)
+ {
+ return ~$int & 0xFFFFFFFF;
+ }
+
+ /**
+ * Add
+ *
+ * _sha256() adds multiple unsigned 32-bit integers. Since PHP doesn't support unsigned integers and since the
+ * possibility of overflow exists, care has to be taken. BigInteger could be used but this should be faster.
+ *
+ * @return int
+ * @see self::_sha256()
+ * @access private
+ */
+ function _add()
+ {
+ static $mod;
+ if (!isset($mod)) {
+ $mod = pow(2, 32);
+ }
+
+ $result = 0;
+ $arguments = func_get_args();
+ foreach ($arguments as $argument) {
+ $result+= $argument < 0 ? ($argument & 0x7FFFFFFF) + 0x80000000 : $argument;
+ }
+
+ if ((php_uname('m') & "\xDF\xDF\xDF") != 'ARM') {
+ return fmod($result, $mod);
+ }
+
+ return (fmod($result, 0x80000000) & 0x7FFFFFFF) |
+ ((fmod(floor($result / 0x80000000), 2) & 1) << 31);
+ }
+
+ /**
+ * String Shift
+ *
+ * Inspired by array_shift
+ *
+ * @param string $string
+ * @param int $index
+ * @return string
+ * @access private
*/
- public function __toString()
+ function _string_shift(&$string, $index = 1)
{
- return $this->getHash();
+ $substr = substr($string, 0, $index);
+ $string = substr($string, $index);
+ return $substr;
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/PublicKeyLoader.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/PublicKeyLoader.php
deleted file mode 100644
index c7c7e0af4..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/PublicKeyLoader.php
+++ /dev/null
@@ -1,64 +0,0 @@
-<?php
-
-/**
- * PublicKeyLoader
- *
- * Returns a PublicKey or PrivateKey object.
- *
- * @category Crypt
- * @package PublicKeyLoader
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2009 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\AsymmetricKey;
-use phpseclib3\Exception\NoKeyLoadedException;
-use phpseclib3\File\X509;
-
-/**
- * PublicKeyLoader
- *
- * @package Common
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PublicKeyLoader
-{
- /**
- * Loads a public or private key
- *
- * @return AsymmetricKey
- * @access public
- * @param string|array $key
- * @param string $password optional
- */
- public static function load($key, $password = false)
- {
- try {
- return EC::load($key, $password);
- } catch (NoKeyLoadedException $e) {}
-
- try {
- return RSA::load($key, $password);
- } catch (NoKeyLoadedException $e) {}
-
- try {
- return DSA::load($key, $password);
- } catch (NoKeyLoadedException $e) {}
-
- try {
- $x509 = new X509();
- $x509->loadX509($key);
- $key = $x509->getPublicKey();
- if ($key) {
- return $key;
- }
- } catch (\Exception $e) {}
-
- throw new NoKeyLoadedException('Unable to read key');
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RC2.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RC2.php
index 813eeca45..b2b9d48ea 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RC2.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RC2.php
@@ -16,7 +16,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $rc2 = new \phpseclib3\Crypt\RC2();
+ * $rc2 = new \phpseclib\Crypt\RC2();
*
* $rc2->setKey('abcdefgh');
*
@@ -33,10 +33,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\BlockCipher;
-use phpseclib3\Exception\BadModeException;
+namespace phpseclib\Crypt;
/**
* Pure-PHP implementation of RC2.
@@ -44,109 +41,106 @@ use phpseclib3\Exception\BadModeException;
* @package RC2
* @access public
*/
-class RC2 extends BlockCipher
+class RC2 extends Base
{
/**
* Block Length of the cipher
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::block_size
+ * @see \phpseclib\Crypt\Base::block_size
* @var int
* @access private
*/
- protected $block_size = 8;
+ var $block_size = 8;
/**
* The Key
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::key
+ * @see \phpseclib\Crypt\Base::key
* @see self::setKey()
* @var string
* @access private
*/
- protected $key;
+ var $key;
/**
* The Original (unpadded) Key
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::key
+ * @see \phpseclib\Crypt\Base::key
* @see self::setKey()
* @see self::encrypt()
* @see self::decrypt()
* @var string
* @access private
*/
- private $orig_key;
+ var $orig_key;
/**
* Don't truncate / null pad key
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::clearBuffers()
+ * @see \phpseclib\Crypt\Base::_clearBuffers()
* @var bool
* @access private
*/
- private $skip_key_adjustment = true;
+ var $skip_key_adjustment = true;
/**
* Key Length (in bytes)
*
- * @see \phpseclib3\Crypt\RC2::setKeyLength()
+ * @see \phpseclib\Crypt\RC2::setKeyLength()
* @var int
* @access private
*/
- protected $key_length = 16; // = 128 bits
+ var $key_length = 16; // = 128 bits
/**
* The mcrypt specific name of the cipher
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cipher_name_mcrypt
+ * @see \phpseclib\Crypt\Base::cipher_name_mcrypt
* @var string
* @access private
*/
- protected $cipher_name_mcrypt = 'rc2';
+ var $cipher_name_mcrypt = 'rc2';
/**
* Optimizing value while CFB-encrypting
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cfb_init_len
+ * @see \phpseclib\Crypt\Base::cfb_init_len
* @var int
* @access private
*/
- protected $cfb_init_len = 500;
+ var $cfb_init_len = 500;
/**
* The key length in bits.
*
- * {@internal Should be in range [1..1024].}
- *
- * {@internal Changing this value after setting the key has no effect.}
- *
* @see self::setKeyLength()
* @see self::setKey()
* @var int
* @access private
+ * @internal Should be in range [1..1024].
+ * @internal Changing this value after setting the key has no effect.
*/
- private $default_key_length = 1024;
+ var $default_key_length = 1024;
/**
* The key length in bits.
*
- * {@internal Should be in range [1..1024].}
- *
* @see self::isValidEnine()
* @see self::setKey()
* @var int
* @access private
+ * @internal Should be in range [1..1024].
*/
- private $current_key_length;
+ var $current_key_length;
/**
* The Key Schedule
*
- * @see self::setupKey()
+ * @see self::_setupKey()
* @var array
* @access private
*/
- private $keys;
+ var $keys;
/**
* Key expansion randomization table.
@@ -156,7 +150,7 @@ class RC2 extends BlockCipher
* @var array
* @access private
*/
- private static $pitable = [
+ var $pitable = array(
0xD9, 0x78, 0xF9, 0xC4, 0x19, 0xDD, 0xB5, 0xED,
0x28, 0xE9, 0xFD, 0x79, 0x4A, 0xA0, 0xD8, 0x9D,
0xC6, 0x7E, 0x37, 0x83, 0x2B, 0x76, 0x53, 0x8E,
@@ -221,7 +215,7 @@ class RC2 extends BlockCipher
0xBB, 0x48, 0x0C, 0x5F, 0xB9, 0xB1, 0xCD, 0x2E,
0xC5, 0xF3, 0xDB, 0x47, 0xE5, 0xA5, 0x9C, 0x77,
0x0A, 0xA6, 0x20, 0x68, 0xFE, 0x7F, 0xC1, 0xAD
- ];
+ );
/**
* Inverse key expansion randomization table.
@@ -230,7 +224,7 @@ class RC2 extends BlockCipher
* @var array
* @access private
*/
- private static $invpitable = [
+ var $invpitable = array(
0xD1, 0xDA, 0xB9, 0x6F, 0x9C, 0xC8, 0x78, 0x66,
0x80, 0x2C, 0xF8, 0x37, 0xEA, 0xE0, 0x62, 0xA4,
0xCB, 0x71, 0x50, 0x27, 0x4B, 0x95, 0xD9, 0x20,
@@ -263,46 +257,30 @@ class RC2 extends BlockCipher
0x81, 0x09, 0x82, 0x33, 0x9F, 0x07, 0x86, 0x75,
0x38, 0x4E, 0x69, 0xF1, 0xAD, 0x23, 0x73, 0x87,
0x70, 0x02, 0xC2, 0x1E, 0xB8, 0x0A, 0xFC, 0xE6
- ];
-
- /**
- * Default Constructor.
- *
- * @param string $mode
- * @access public
- * @throws \InvalidArgumentException if an invalid / unsupported mode is provided
- */
- public function __construct($mode)
- {
- parent::__construct($mode);
-
- if ($this->mode == self::MODE_STREAM) {
- throw new BadModeException('Block ciphers cannot be ran in stream mode');
- }
- }
+ );
/**
* Test for engine validity
*
- * This is mainly just a wrapper to set things up for \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
+ * This is mainly just a wrapper to set things up for \phpseclib\Crypt\Base::isValidEngine()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
+ * @see \phpseclib\Crypt\Base::__construct()
* @param int $engine
- * @access protected
+ * @access public
* @return bool
*/
- protected function isValidEngineHelper($engine)
+ function isValidEngine($engine)
{
switch ($engine) {
case self::ENGINE_OPENSSL:
if ($this->current_key_length != 128 || strlen($this->orig_key) < 16) {
return false;
}
- self::$cipher_name_openssl_ecb = 'rc2-ecb';
- $this->cipher_name_openssl = 'rc2-' . $this->openssl_translate_mode();
+ $this->cipher_name_openssl_ecb = 'rc2-ecb';
+ $this->cipher_name_openssl = 'rc2-' . $this->_openssl_translate_mode();
}
- return parent::isValidEngineHelper($engine);
+ return parent::isValidEngine($engine);
}
/**
@@ -310,20 +288,23 @@ class RC2 extends BlockCipher
*
* Valid key lengths are 8 to 1024.
* Calling this function after setting the key has no effect until the next
- * \phpseclib3\Crypt\RC2::setKey() call.
+ * \phpseclib\Crypt\RC2::setKey() call.
*
* @access public
* @param int $length in bits
- * @throws \LengthException if the key length isn't supported
*/
- public function setKeyLength($length)
+ function setKeyLength($length)
{
- if ($length < 8 || $length > 1024) {
- throw new \LengthException('Key size of ' . $length . ' bits is not supported by this algorithm. Only keys between 1 and 1024 bits, inclusive, are supported');
+ if ($length < 8) {
+ $this->default_key_length = 1;
+ } elseif ($length > 1024) {
+ $this->default_key_length = 128;
+ } else {
+ $this->default_key_length = $length;
}
+ $this->current_key_length = $this->default_key_length;
- $this->default_key_length = $this->current_key_length = $length;
- $this->explicit_key_length = $length >> 3;
+ parent::setKeyLength($length);
}
/**
@@ -332,7 +313,7 @@ class RC2 extends BlockCipher
* @access public
* @return int
*/
- public function getKeyLength()
+ function getKeyLength()
{
return $this->current_key_length;
}
@@ -345,29 +326,26 @@ class RC2 extends BlockCipher
* has more then 128 bytes in it, and set $key to a single null byte if
* it is empty.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setKey()
+ * If the key is not explicitly set, it'll be assumed to be a single
+ * null byte.
+ *
+ * @see \phpseclib\Crypt\Base::setKey()
* @access public
* @param string $key
- * @param int|boolean $t1 optional Effective key length in bits.
- * @throws \LengthException if the key length isn't supported
+ * @param int $t1 optional Effective key length in bits.
*/
- public function setKey($key, $t1 = false)
+ function setKey($key, $t1 = 0)
{
$this->orig_key = $key;
- if ($t1 === false) {
+ if ($t1 <= 0) {
$t1 = $this->default_key_length;
+ } elseif ($t1 > 1024) {
+ $t1 = 1024;
}
-
- if ($t1 < 1 || $t1 > 1024) {
- throw new \LengthException('Key size of ' . $length . ' bits is not supported by this algorithm. Only keys between 1 and 1024 bits, inclusive, are supported');
- }
-
$this->current_key_length = $t1;
- if (strlen($key) < 1 || strlen($key) > 128) {
- throw new \LengthException('Key of size ' . strlen($key) . ' not supported by this algorithm. Only keys of sizes between 8 and 1024 bits, inclusive, are supported');
- }
-
+ // Key byte count should be 1..128.
+ $key = strlen($key) ? substr($key, 0, 128) : "\x00";
$t = strlen($key);
// The mcrypt RC2 implementation only supports effective key length
@@ -382,7 +360,7 @@ class RC2 extends BlockCipher
$tm = 0xFF >> (8 * $t8 - $t1);
// Expand key.
- $pitable = self::$pitable;
+ $pitable = $this->pitable;
for ($i = $t; $i < 128; $i++) {
$l[$i] = $pitable[$l[$i - 1] + $l[$i - $t]];
}
@@ -393,26 +371,23 @@ class RC2 extends BlockCipher
}
// Prepare the key for mcrypt.
- $l[0] = self::$invpitable[$l[0]];
+ $l[0] = $this->invpitable[$l[0]];
array_unshift($l, 'C*');
- $this->key = pack(...$l);
- $this->key_length = strlen($this->key);
- $this->changed = $this->nonIVChanged = true;
- $this->setEngine();
+ parent::setKey(call_user_func_array('pack', $l));
}
/**
* Encrypts a message.
*
- * Mostly a wrapper for \phpseclib3\Crypt\Common\SymmetricKey::encrypt, with some additional OpenSSL handling code
+ * Mostly a wrapper for \phpseclib\Crypt\Base::encrypt, with some additional OpenSSL handling code
*
* @see self::decrypt()
* @access public
* @param string $plaintext
* @return string $ciphertext
*/
- public function encrypt($plaintext)
+ function encrypt($plaintext)
{
if ($this->engine == self::ENGINE_OPENSSL) {
$temp = $this->key;
@@ -428,14 +403,14 @@ class RC2 extends BlockCipher
/**
* Decrypts a message.
*
- * Mostly a wrapper for \phpseclib3\Crypt\Common\SymmetricKey::decrypt, with some additional OpenSSL handling code
+ * Mostly a wrapper for \phpseclib\Crypt\Base::decrypt, with some additional OpenSSL handling code
*
* @see self::encrypt()
* @access public
* @param string $ciphertext
* @return string $plaintext
*/
- public function decrypt($ciphertext)
+ function decrypt($ciphertext)
{
if ($this->engine == self::ENGINE_OPENSSL) {
$temp = $this->key;
@@ -451,18 +426,18 @@ class RC2 extends BlockCipher
/**
* Encrypts a block
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encryptBlock()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
+ * @see \phpseclib\Crypt\Base::_encryptBlock()
+ * @see \phpseclib\Crypt\Base::encrypt()
* @access private
* @param string $in
* @return string
*/
- protected function encryptBlock($in)
+ function _encryptBlock($in)
{
list($r0, $r1, $r2, $r3) = array_values(unpack('v*', $in));
$keys = $this->keys;
$limit = 20;
- $actions = [$limit => 44, 44 => 64];
+ $actions = array($limit => 44, 44 => 64);
$j = 0;
for (;;) {
@@ -496,18 +471,18 @@ class RC2 extends BlockCipher
/**
* Decrypts a block
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decryptBlock()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
+ * @see \phpseclib\Crypt\Base::_decryptBlock()
+ * @see \phpseclib\Crypt\Base::decrypt()
* @access private
* @param string $in
* @return string
*/
- protected function decryptBlock($in)
+ function _decryptBlock($in)
{
list($r0, $r1, $r2, $r3) = array_values(unpack('v*', $in));
$keys = $this->keys;
$limit = 44;
- $actions = [$limit => 20, 20 => 0];
+ $actions = array($limit => 20, 20 => 0);
$j = 64;
for (;;) {
@@ -539,21 +514,36 @@ class RC2 extends BlockCipher
}
/**
+ * Setup the \phpseclib\Crypt\Base::ENGINE_MCRYPT $engine
+ *
+ * @see \phpseclib\Crypt\Base::_setupMcrypt()
+ * @access private
+ */
+ function _setupMcrypt()
+ {
+ if (!isset($this->key)) {
+ $this->setKey('');
+ }
+
+ parent::_setupMcrypt();
+ }
+
+ /**
* Creates the key schedule
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setupKey()
+ * @see \phpseclib\Crypt\Base::_setupKey()
* @access private
*/
- protected function setupKey()
+ function _setupKey()
{
if (!isset($this->key)) {
$this->setKey('');
}
- // Key has already been expanded in \phpseclib3\Crypt\RC2::setKey():
+ // Key has already been expanded in \phpseclib\Crypt\RC2::setKey():
// Only the first value must be altered.
$l = unpack('Ca/Cb/v*', $this->key);
- array_unshift($l, self::$pitable[$l['a']] | ($l['b'] << 8));
+ array_unshift($l, $this->pitable[$l['a']] | ($l['b'] << 8));
unset($l['a']);
unset($l['b']);
$this->keys = $l;
@@ -562,108 +552,137 @@ class RC2 extends BlockCipher
/**
* Setup the performance-optimized function for de/encrypt()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setupInlineCrypt()
+ * @see \phpseclib\Crypt\Base::_setupInlineCrypt()
* @access private
*/
- protected function setupInlineCrypt()
+ function _setupInlineCrypt()
{
- // Init code for both, encrypt and decrypt.
- $init_crypt = '$keys = $this->keys;';
-
- $keys = $this->keys;
-
- // $in is the current 8 bytes block which has to be en/decrypt
- $encrypt_block = $decrypt_block = '
- $in = unpack("v4", $in);
- $r0 = $in[1];
- $r1 = $in[2];
- $r2 = $in[3];
- $r3 = $in[4];
- ';
-
- // Create code for encryption.
- $limit = 20;
- $actions = [$limit => 44, 44 => 64];
- $j = 0;
-
- for (;;) {
- // Mixing round.
- $encrypt_block .= '
- $r0 = (($r0 + ' . $keys[$j++] . ' +
- ((($r1 ^ $r2) & $r3) ^ $r1)) & 0xFFFF) << 1;
- $r0 |= $r0 >> 16;
- $r1 = (($r1 + ' . $keys[$j++] . ' +
- ((($r2 ^ $r3) & $r0) ^ $r2)) & 0xFFFF) << 2;
- $r1 |= $r1 >> 16;
- $r2 = (($r2 + ' . $keys[$j++] . ' +
- ((($r3 ^ $r0) & $r1) ^ $r3)) & 0xFFFF) << 3;
- $r2 |= $r2 >> 16;
- $r3 = (($r3 + ' . $keys[$j++] . ' +
- ((($r0 ^ $r1) & $r2) ^ $r0)) & 0xFFFF) << 5;
- $r3 |= $r3 >> 16;';
+ $lambda_functions =& self::_getLambdaFunctions();
+
+ // The first 10 generated $lambda_functions will use the $keys hardcoded as integers
+ // for the mixing rounds, for better inline crypt performance [~20% faster].
+ // But for memory reason we have to limit those ultra-optimized $lambda_functions to an amount of 10.
+ // (Currently, for Crypt_RC2, one generated $lambda_function cost on php5.5@32bit ~60kb unfreeable mem and ~100kb on php5.5@64bit)
+ $gen_hi_opt_code = (bool)(count($lambda_functions) < 10);
+
+ // Generation of a unique hash for our generated code
+ $code_hash = "Crypt_RC2, {$this->mode}";
+ if ($gen_hi_opt_code) {
+ $code_hash = str_pad($code_hash, 32) . $this->_hashInlineCryptFunction($this->key);
+ }
- if ($j === $limit) {
- if ($limit === 64) {
- break;
- }
+ // Is there a re-usable $lambda_functions in there?
+ // If not, we have to create it.
+ if (!isset($lambda_functions[$code_hash])) {
+ // Init code for both, encrypt and decrypt.
+ $init_crypt = '$keys = $self->keys;';
+
+ switch (true) {
+ case $gen_hi_opt_code:
+ $keys = $this->keys;
+ default:
+ $keys = array();
+ foreach ($this->keys as $k => $v) {
+ $keys[$k] = '$keys[' . $k . ']';
+ }
+ }
- // Mashing round.
+ // $in is the current 8 bytes block which has to be en/decrypt
+ $encrypt_block = $decrypt_block = '
+ $in = unpack("v4", $in);
+ $r0 = $in[1];
+ $r1 = $in[2];
+ $r2 = $in[3];
+ $r3 = $in[4];
+ ';
+
+ // Create code for encryption.
+ $limit = 20;
+ $actions = array($limit => 44, 44 => 64);
+ $j = 0;
+
+ for (;;) {
+ // Mixing round.
$encrypt_block .= '
- $r0 += $keys[$r3 & 0x3F];
- $r1 += $keys[$r0 & 0x3F];
- $r2 += $keys[$r1 & 0x3F];
- $r3 += $keys[$r2 & 0x3F];';
- $limit = $actions[$limit];
+ $r0 = (($r0 + ' . $keys[$j++] . ' +
+ ((($r1 ^ $r2) & $r3) ^ $r1)) & 0xFFFF) << 1;
+ $r0 |= $r0 >> 16;
+ $r1 = (($r1 + ' . $keys[$j++] . ' +
+ ((($r2 ^ $r3) & $r0) ^ $r2)) & 0xFFFF) << 2;
+ $r1 |= $r1 >> 16;
+ $r2 = (($r2 + ' . $keys[$j++] . ' +
+ ((($r3 ^ $r0) & $r1) ^ $r3)) & 0xFFFF) << 3;
+ $r2 |= $r2 >> 16;
+ $r3 = (($r3 + ' . $keys[$j++] . ' +
+ ((($r0 ^ $r1) & $r2) ^ $r0)) & 0xFFFF) << 5;
+ $r3 |= $r3 >> 16;';
+
+ if ($j === $limit) {
+ if ($limit === 64) {
+ break;
+ }
+
+ // Mashing round.
+ $encrypt_block .= '
+ $r0 += $keys[$r3 & 0x3F];
+ $r1 += $keys[$r0 & 0x3F];
+ $r2 += $keys[$r1 & 0x3F];
+ $r3 += $keys[$r2 & 0x3F];';
+ $limit = $actions[$limit];
+ }
}
- }
- $encrypt_block .= '$in = pack("v4", $r0, $r1, $r2, $r3);';
+ $encrypt_block .= '$in = pack("v4", $r0, $r1, $r2, $r3);';
- // Create code for decryption.
- $limit = 44;
- $actions = [$limit => 20, 20 => 0];
- $j = 64;
-
- for (;;) {
- // R-mixing round.
- $decrypt_block .= '
- $r3 = ($r3 | ($r3 << 16)) >> 5;
- $r3 = ($r3 - ' . $keys[--$j] . ' -
- ((($r0 ^ $r1) & $r2) ^ $r0)) & 0xFFFF;
- $r2 = ($r2 | ($r2 << 16)) >> 3;
- $r2 = ($r2 - ' . $keys[--$j] . ' -
- ((($r3 ^ $r0) & $r1) ^ $r3)) & 0xFFFF;
- $r1 = ($r1 | ($r1 << 16)) >> 2;
- $r1 = ($r1 - ' . $keys[--$j] . ' -
- ((($r2 ^ $r3) & $r0) ^ $r2)) & 0xFFFF;
- $r0 = ($r0 | ($r0 << 16)) >> 1;
- $r0 = ($r0 - ' . $keys[--$j] . ' -
- ((($r1 ^ $r2) & $r3) ^ $r1)) & 0xFFFF;';
-
- if ($j === $limit) {
- if ($limit === 0) {
- break;
- }
+ // Create code for decryption.
+ $limit = 44;
+ $actions = array($limit => 20, 20 => 0);
+ $j = 64;
- // R-mashing round.
+ for (;;) {
+ // R-mixing round.
$decrypt_block .= '
- $r3 = ($r3 - $keys[$r2 & 0x3F]) & 0xFFFF;
- $r2 = ($r2 - $keys[$r1 & 0x3F]) & 0xFFFF;
- $r1 = ($r1 - $keys[$r0 & 0x3F]) & 0xFFFF;
- $r0 = ($r0 - $keys[$r3 & 0x3F]) & 0xFFFF;';
- $limit = $actions[$limit];
+ $r3 = ($r3 | ($r3 << 16)) >> 5;
+ $r3 = ($r3 - ' . $keys[--$j] . ' -
+ ((($r0 ^ $r1) & $r2) ^ $r0)) & 0xFFFF;
+ $r2 = ($r2 | ($r2 << 16)) >> 3;
+ $r2 = ($r2 - ' . $keys[--$j] . ' -
+ ((($r3 ^ $r0) & $r1) ^ $r3)) & 0xFFFF;
+ $r1 = ($r1 | ($r1 << 16)) >> 2;
+ $r1 = ($r1 - ' . $keys[--$j] . ' -
+ ((($r2 ^ $r3) & $r0) ^ $r2)) & 0xFFFF;
+ $r0 = ($r0 | ($r0 << 16)) >> 1;
+ $r0 = ($r0 - ' . $keys[--$j] . ' -
+ ((($r1 ^ $r2) & $r3) ^ $r1)) & 0xFFFF;';
+
+ if ($j === $limit) {
+ if ($limit === 0) {
+ break;
+ }
+
+ // R-mashing round.
+ $decrypt_block .= '
+ $r3 = ($r3 - $keys[$r2 & 0x3F]) & 0xFFFF;
+ $r2 = ($r2 - $keys[$r1 & 0x3F]) & 0xFFFF;
+ $r1 = ($r1 - $keys[$r0 & 0x3F]) & 0xFFFF;
+ $r0 = ($r0 - $keys[$r3 & 0x3F]) & 0xFFFF;';
+ $limit = $actions[$limit];
+ }
}
- }
- $decrypt_block .= '$in = pack("v4", $r0, $r1, $r2, $r3);';
+ $decrypt_block .= '$in = pack("v4", $r0, $r1, $r2, $r3);';
+
+ // Creates the inline-crypt function
+ $lambda_functions[$code_hash] = $this->_createInlineCryptFunction(
+ array(
+ 'init_crypt' => $init_crypt,
+ 'encrypt_block' => $encrypt_block,
+ 'decrypt_block' => $decrypt_block
+ )
+ );
+ }
- // Creates the inline-crypt function
- $this->inline_crypt = $this->createInlineCryptFunction(
- [
- 'init_crypt' => $init_crypt,
- 'encrypt_block' => $encrypt_block,
- 'decrypt_block' => $decrypt_block
- ]
- );
+ // Set the inline-crypt function as callback in: $this->inline_crypt
+ $this->inline_crypt = $lambda_functions[$code_hash];
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RC4.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RC4.php
index d2d3a71c0..25e4ff854 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RC4.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RC4.php
@@ -20,7 +20,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $rc4 = new \phpseclib3\Crypt\RC4();
+ * $rc4 = new \phpseclib\Crypt\RC4();
*
* $rc4->setKey('abcdefgh');
*
@@ -42,9 +42,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\StreamCipher;
+namespace phpseclib\Crypt;
/**
* Pure-PHP implementation of RC4.
@@ -53,37 +51,54 @@ use phpseclib3\Crypt\Common\StreamCipher;
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
-class RC4 extends StreamCipher
+class RC4 extends Base
{
- /**
+ /**#@+
* @access private
- * @see \phpseclib3\Crypt\RC4::_crypt()
- */
+ * @see \phpseclib\Crypt\RC4::_crypt()
+ */
const ENCRYPT = 0;
+ const DECRYPT = 1;
+ /**#@-*/
/**
+ * Block Length of the cipher
+ *
+ * RC4 is a stream cipher
+ * so we the block_size to 0
+ *
+ * @see \phpseclib\Crypt\Base::block_size
+ * @var int
* @access private
- * @see \phpseclib3\Crypt\RC4::_crypt()
*/
- const DECRYPT = 1;
+ var $block_size = 0;
/**
* Key Length (in bytes)
*
- * @see \phpseclib3\Crypt\RC4::setKeyLength()
+ * @see \phpseclib\Crypt\RC4::setKeyLength()
* @var int
* @access private
*/
- protected $key_length = 128; // = 1024 bits
+ var $key_length = 128; // = 1024 bits
/**
* The mcrypt specific name of the cipher
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cipher_name_mcrypt
+ * @see \phpseclib\Crypt\Base::cipher_name_mcrypt
* @var string
* @access private
*/
- protected $cipher_name_mcrypt = 'arcfour';
+ var $cipher_name_mcrypt = 'arcfour';
+
+ /**
+ * Holds whether performance-optimized $inline_crypt() can/should be used.
+ *
+ * @see \phpseclib\Crypt\Base::inline_crypt
+ * @var mixed
+ * @access private
+ */
+ var $use_inline_crypt = false; // currently not available
/**
* The Key
@@ -92,7 +107,7 @@ class RC4 extends StreamCipher
* @var string
* @access private
*/
- protected $key;
+ var $key;
/**
* The Key Stream for decryption and encryption
@@ -101,24 +116,35 @@ class RC4 extends StreamCipher
* @var array
* @access private
*/
- private $stream;
+ var $stream;
+
+ /**
+ * Default Constructor.
+ *
+ * Determines whether or not the mcrypt extension should be used.
+ *
+ * @see \phpseclib\Crypt\Base::__construct()
+ * @return \phpseclib\Crypt\RC4
+ * @access public
+ */
+ function __construct()
+ {
+ parent::__construct(Base::MODE_STREAM);
+ }
/**
* Test for engine validity
*
- * This is mainly just a wrapper to set things up for \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
+ * This is mainly just a wrapper to set things up for \phpseclib\Crypt\Base::isValidEngine()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
+ * @see \phpseclib\Crypt\Base::__construct()
* @param int $engine
- * @access protected
+ * @access public
* @return bool
*/
- protected function isValidEngineHelper($engine)
+ function isValidEngine($engine)
{
- if ($engine == self::ENGINE_OPENSSL) {
- if ($this->continuousBuffer) {
- return false;
- }
+ if ($engine == Base::ENGINE_OPENSSL) {
if (version_compare(PHP_VERSION, '5.3.7') >= 0) {
$this->cipher_name_openssl = 'rc4-40';
} else {
@@ -138,27 +164,30 @@ class RC4 extends StreamCipher
}
}
- return parent::isValidEngineHelper($engine);
+ return parent::isValidEngine($engine);
}
/**
- * Sets the key length
+ * Dummy function.
*
- * Keys can be between 1 and 256 bytes long.
+ * Some protocols, such as WEP, prepend an "initialization vector" to the key, effectively creating a new key [1].
+ * If you need to use an initialization vector in this manner, feel free to prepend it to the key, yourself, before
+ * calling setKey().
+ *
+ * [1] WEP's initialization vectors (IV's) are used in a somewhat insecure way. Since, in that protocol,
+ * the IV's are relatively easy to predict, an attack described by
+ * {@link http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf Scott Fluhrer, Itsik Mantin, and Adi Shamir}
+ * can be used to quickly guess at the rest of the key. The following links elaborate:
+ *
+ * {@link http://www.rsa.com/rsalabs/node.asp?id=2009 http://www.rsa.com/rsalabs/node.asp?id=2009}
+ * {@link http://en.wikipedia.org/wiki/Related_key_attack http://en.wikipedia.org/wiki/Related_key_attack}
*
+ * @param string $iv
+ * @see self::setKey()
* @access public
- * @param int $length
- * @throws \LengthException if the key length is invalid
*/
- public function setKeyLength($length)
+ function setIV($iv)
{
- if ($length < 8 || $length > 2048) {
- throw new \LengthException('Key size of ' . $length . ' bits is not supported by this algorithm. Only keys between 1 and 256 bytes are supported');
- }
-
- $this->key_length = $length >> 3;
-
- parent::setKeyLength($length);
}
/**
@@ -167,33 +196,36 @@ class RC4 extends StreamCipher
* Keys can be between 1 and 256 bytes long.
*
* @access public
- * @param string $key
+ * @param int $length
*/
- public function setKey($key)
+ function setKeyLength($length)
{
- $length = strlen($key);
- if ($length < 1 || $length > 256) {
- throw new \LengthException('Key size of ' . $length . ' bytes is not supported by RC4. Keys must be between 1 and 256 bytes long');
+ if ($length < 8) {
+ $this->key_length = 1;
+ } elseif ($length > 2048) {
+ $this->key_length = 256;
+ } else {
+ $this->key_length = $length >> 3;
}
- parent::setKey($key);
+ parent::setKeyLength($length);
}
/**
* Encrypts a message.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- * @see self::crypt()
+ * @see \phpseclib\Crypt\Base::decrypt()
+ * @see self::_crypt()
* @access public
* @param string $plaintext
* @return string $ciphertext
*/
- public function encrypt($plaintext)
+ function encrypt($plaintext)
{
- if ($this->engine != self::ENGINE_INTERNAL) {
+ if ($this->engine != Base::ENGINE_INTERNAL) {
return parent::encrypt($plaintext);
}
- return $this->crypt($plaintext, self::ENCRYPT);
+ return $this->_crypt($plaintext, self::ENCRYPT);
}
/**
@@ -202,18 +234,18 @@ class RC4 extends StreamCipher
* $this->decrypt($this->encrypt($plaintext)) == $this->encrypt($this->encrypt($plaintext)).
* At least if the continuous buffer is disabled.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see self::crypt()
+ * @see \phpseclib\Crypt\Base::encrypt()
+ * @see self::_crypt()
* @access public
* @param string $ciphertext
* @return string $plaintext
*/
- public function decrypt($ciphertext)
+ function decrypt($ciphertext)
{
- if ($this->engine != self::ENGINE_INTERNAL) {
+ if ($this->engine != Base::ENGINE_INTERNAL) {
return parent::decrypt($ciphertext);
}
- return $this->crypt($ciphertext, self::DECRYPT);
+ return $this->_crypt($ciphertext, self::DECRYPT);
}
/**
@@ -222,7 +254,7 @@ class RC4 extends StreamCipher
* @access private
* @param string $in
*/
- protected function encryptBlock($in)
+ function _encryptBlock($in)
{
// RC4 does not utilize this method
}
@@ -233,7 +265,7 @@ class RC4 extends StreamCipher
* @access private
* @param string $in
*/
- protected function decryptBlock($in)
+ function _decryptBlock($in)
{
// RC4 does not utilize this method
}
@@ -241,10 +273,10 @@ class RC4 extends StreamCipher
/**
* Setup the key (expansion)
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::_setupKey()
+ * @see \phpseclib\Crypt\Base::_setupKey()
* @access private
*/
- protected function setupKey()
+ function _setupKey()
{
$key = $this->key;
$keyLength = strlen($key);
@@ -257,12 +289,12 @@ class RC4 extends StreamCipher
$keyStream[$j] = $temp;
}
- $this->stream = [];
- $this->stream[self::DECRYPT] = $this->stream[self::ENCRYPT] = [
+ $this->stream = array();
+ $this->stream[self::DECRYPT] = $this->stream[self::ENCRYPT] = array(
0, // index $i
0, // index $j
$keyStream
- ];
+ );
}
/**
@@ -275,10 +307,11 @@ class RC4 extends StreamCipher
* @param int $mode
* @return string $text
*/
- private function crypt($text, $mode)
+ function _crypt($text, $mode)
{
if ($this->changed) {
- $this->setup();
+ $this->_setup();
+ $this->changed = false;
}
$stream = &$this->stream[$mode];
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA.php
index 9ff33e677..17e2b8329 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA.php
@@ -8,43 +8,39 @@
* Here's an example of how to encrypt and decrypt text with this library:
* <code>
* <?php
- * include 'vendor/autoload.php';
+ * include 'vendor/autoload.php';
*
- * $private = \phpseclib3\Crypt\RSA::createKey();
- * $public = $private->getPublicKey();
+ * $rsa = new \phpseclib\Crypt\RSA();
+ * extract($rsa->createKey());
*
- * $plaintext = 'terrafrost';
+ * $plaintext = 'terrafrost';
*
- * $ciphertext = $public->encrypt($plaintext);
+ * $rsa->loadKey($privatekey);
+ * $ciphertext = $rsa->encrypt($plaintext);
*
- * echo $private->decrypt($ciphertext);
+ * $rsa->loadKey($publickey);
+ * echo $rsa->decrypt($ciphertext);
* ?>
* </code>
*
* Here's an example of how to create signatures and verify signatures with this library:
* <code>
* <?php
- * include 'vendor/autoload.php';
+ * include 'vendor/autoload.php';
*
- * $private = \phpseclib3\Crypt\RSA::createKey();
- * $public = $private->getPublicKey();
+ * $rsa = new \phpseclib\Crypt\RSA();
+ * extract($rsa->createKey());
*
- * $plaintext = 'terrafrost';
+ * $plaintext = 'terrafrost';
*
- * $signature = $private->sign($plaintext);
+ * $rsa->loadKey($privatekey);
+ * $signature = $rsa->sign($plaintext);
*
- * echo $public->verify($plaintext, $signature) ? 'verified' : 'unverified';
+ * $rsa->loadKey($publickey);
+ * echo $rsa->verify($plaintext, $signature) ? 'verified' : 'unverified';
* ?>
* </code>
*
- * One thing to consider when using this: so phpseclib uses PSS mode by default.
- * Technically, id-RSASSA-PSS has a different key format than rsaEncryption. So
- * should phpseclib save to the id-RSASSA-PSS format by default or the
- * rsaEncryption format? For stand-alone keys I figure rsaEncryption is better
- * because SSH doesn't use PSS and idk how many SSH servers would be able to
- * decode an id-RSASSA-PSS key. For X.509 certificates the id-RSASSA-PSS
- * format is used by default (unless you change it up to use PKCS1 instead)
- *
* @category Crypt
* @package RSA
* @author Jim Wigginton <terrafrost@php.net>
@@ -53,15 +49,9 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
+namespace phpseclib\Crypt;
-use phpseclib3\Crypt\Common\AsymmetricKey;
-use phpseclib3\Crypt\RSA\PrivateKey;
-use phpseclib3\Crypt\RSA\PublicKey;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-use phpseclib3\Exception\InconsistentSetupException;
-use phpseclib3\Crypt\RSA\Formats\Keys\PSS;
+use phpseclib\Math\BigInteger;
/**
* Pure-PHP PKCS#1 compliant implementation of RSA.
@@ -70,38 +60,28 @@ use phpseclib3\Crypt\RSA\Formats\Keys\PSS;
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
-abstract class RSA extends AsymmetricKey
+class RSA
{
- /**
- * Algorithm Name
- *
- * @var string
- * @access private
+ /**#@+
+ * @access public
+ * @see self::encrypt()
+ * @see self::decrypt()
*/
- const ALGORITHM = 'RSA';
-
/**
* Use {@link http://en.wikipedia.org/wiki/Optimal_Asymmetric_Encryption_Padding Optimal Asymmetric Encryption Padding}
* (OAEP) for encryption / decryption.
*
- * Uses sha256 by default
+ * Uses sha1 by default.
*
* @see self::setHash()
* @see self::setMGFHash()
- * @access public
- * @see self::encrypt()
- * @see self::decrypt()
*/
const ENCRYPTION_OAEP = 1;
/**
* Use PKCS#1 padding.
*
- * Although self::PADDING_OAEP / self::PADDING_PSS offers more security, including PKCS#1 padding is necessary for purposes of backwards
+ * Although self::ENCRYPTION_OAEP offers more security, including PKCS#1 padding is necessary for purposes of backwards
* compatibility with protocols (like SSH-1) written before OAEP's introduction.
- *
- * @access public
- * @see self::encrypt()
- * @see self::decrypt()
*/
const ENCRYPTION_PKCS1 = 2;
/**
@@ -109,93 +89,282 @@ abstract class RSA extends AsymmetricKey
*
* Although this method is not recommended it can none-the-less sometimes be useful if you're trying to decrypt some legacy
* stuff, if you're trying to diagnose why an encrypted message isn't decrypting, etc.
- *
- * @access public
- * @see self::encrypt()
- * @see self::decrypt()
*/
- const ENCRYPTION_NONE = 4;
+ const ENCRYPTION_NONE = 3;
+ /**#@-*/
+ /**#@+
+ * @access public
+ * @see self::sign()
+ * @see self::verify()
+ * @see self::setHash()
+ */
/**
* Use the Probabilistic Signature Scheme for signing
*
- * Uses sha256 and 0 as the salt length
+ * Uses sha1 by default.
*
* @see self::setSaltLength()
* @see self::setMGFHash()
- * @see self::setHash()
- * @see self::sign()
- * @see self::verify()
- * @see self::setHash()
- * @access public
*/
- const SIGNATURE_PSS = 16;
+ const SIGNATURE_PSS = 1;
/**
- * Use a relaxed version of PKCS#1 padding for signature verification
+ * Use the PKCS#1 scheme by default.
*
- * @see self::sign()
- * @see self::verify()
- * @see self::setHash()
- * @access public
+ * Although self::SIGNATURE_PSS offers more security, including PKCS#1 signing is necessary for purposes of backwards
+ * compatibility with protocols (like SSH-2) written before PSS's introduction.
*/
- const SIGNATURE_RELAXED_PKCS1 = 32;
+ const SIGNATURE_PKCS1 = 2;
+ /**#@-*/
+
+ /**#@+
+ * @access private
+ * @see \phpseclib\Crypt\RSA::createKey()
+ */
+ /**
+ * ASN1 Integer
+ */
+ const ASN1_INTEGER = 2;
+ /**
+ * ASN1 Bit String
+ */
+ const ASN1_BITSTRING = 3;
+ /**
+ * ASN1 Octet String
+ */
+ const ASN1_OCTETSTRING = 4;
+ /**
+ * ASN1 Object Identifier
+ */
+ const ASN1_OBJECT = 6;
+ /**
+ * ASN1 Sequence (with the constucted bit set)
+ */
+ const ASN1_SEQUENCE = 48;
+ /**#@-*/
+
+ /**#@+
+ * @access private
+ * @see \phpseclib\Crypt\RSA::__construct()
+ */
+ /**
+ * To use the pure-PHP implementation
+ */
+ const MODE_INTERNAL = 1;
/**
- * Use PKCS#1 padding for signature verification
+ * To use the OpenSSL library
*
- * @see self::sign()
- * @see self::verify()
- * @see self::setHash()
+ * (if enabled; otherwise, the internal implementation will be used)
+ */
+ const MODE_OPENSSL = 2;
+ /**#@-*/
+
+ /**#@+
* @access public
+ * @see \phpseclib\Crypt\RSA::createKey()
+ * @see \phpseclib\Crypt\RSA::setPrivateKeyFormat()
+ */
+ /**
+ * PKCS#1 formatted private key
+ *
+ * Used by OpenSSH
+ */
+ const PRIVATE_FORMAT_PKCS1 = 0;
+ /**
+ * PuTTY formatted private key
+ */
+ const PRIVATE_FORMAT_PUTTY = 1;
+ /**
+ * XML formatted private key
+ */
+ const PRIVATE_FORMAT_XML = 2;
+ /**
+ * PKCS#8 formatted private key
+ */
+ const PRIVATE_FORMAT_PKCS8 = 8;
+ /**
+ * OpenSSH formatted private key
*/
- const SIGNATURE_PKCS1 = 64;
+ const PRIVATE_FORMAT_OPENSSH = 9;
+ /**#@-*/
+ /**#@+
+ * @access public
+ * @see \phpseclib\Crypt\RSA::createKey()
+ * @see \phpseclib\Crypt\RSA::setPublicKeyFormat()
+ */
/**
- * Encryption padding mode
+ * Raw public key
*
- * @var int
+ * An array containing two \phpseclib\Math\BigInteger objects.
+ *
+ * The exponent can be indexed with any of the following:
+ *
+ * 0, e, exponent, publicExponent
+ *
+ * The modulus can be indexed with any of the following:
+ *
+ * 1, n, modulo, modulus
+ */
+ const PUBLIC_FORMAT_RAW = 3;
+ /**
+ * PKCS#1 formatted public key (raw)
+ *
+ * Used by File/X509.php
+ *
+ * Has the following header:
+ *
+ * -----BEGIN RSA PUBLIC KEY-----
+ *
+ * Analogous to ssh-keygen's pem format (as specified by -m)
+ */
+ const PUBLIC_FORMAT_PKCS1 = 4;
+ const PUBLIC_FORMAT_PKCS1_RAW = 4;
+ /**
+ * XML formatted public key
+ */
+ const PUBLIC_FORMAT_XML = 5;
+ /**
+ * OpenSSH formatted public key
+ *
+ * Place in $HOME/.ssh/authorized_keys
+ */
+ const PUBLIC_FORMAT_OPENSSH = 6;
+ /**
+ * PKCS#1 formatted public key (encapsulated)
+ *
+ * Used by PHP's openssl_public_encrypt() and openssl's rsautl (when -pubin is set)
+ *
+ * Has the following header:
+ *
+ * -----BEGIN PUBLIC KEY-----
+ *
+ * Analogous to ssh-keygen's pkcs8 format (as specified by -m). Although PKCS8
+ * is specific to private keys it's basically creating a DER-encoded wrapper
+ * for keys. This just extends that same concept to public keys (much like ssh-keygen)
+ */
+ const PUBLIC_FORMAT_PKCS8 = 7;
+ /**#@-*/
+
+ /**
+ * Precomputed Zero
+ *
+ * @var \phpseclib\Math\BigInteger
* @access private
*/
- protected $encryptionPadding = self::ENCRYPTION_OAEP;
+ var $zero;
/**
- * Signature padding mode
+ * Precomputed One
*
- * @var int
+ * @var \phpseclib\Math\BigInteger
* @access private
*/
- protected $signaturePadding = self::SIGNATURE_PSS;
+ var $one;
/**
- * Length of hash function output
+ * Private Key Format
*
* @var int
* @access private
*/
- protected $hLen;
+ var $privateKeyFormat = self::PRIVATE_FORMAT_PKCS1;
/**
- * Length of salt
+ * Public Key Format
*
* @var int
+ * @access public
+ */
+ var $publicKeyFormat = self::PUBLIC_FORMAT_PKCS8;
+
+ /**
+ * Modulus (ie. n)
+ *
+ * @var \phpseclib\Math\BigInteger
+ * @access private
+ */
+ var $modulus;
+
+ /**
+ * Modulus length
+ *
+ * @var \phpseclib\Math\BigInteger
+ * @access private
+ */
+ var $k;
+
+ /**
+ * Exponent (ie. e or d)
+ *
+ * @var \phpseclib\Math\BigInteger
+ * @access private
+ */
+ var $exponent;
+
+ /**
+ * Primes for Chinese Remainder Theorem (ie. p and q)
+ *
+ * @var array
+ * @access private
+ */
+ var $primes;
+
+ /**
+ * Exponents for Chinese Remainder Theorem (ie. dP and dQ)
+ *
+ * @var array
+ * @access private
+ */
+ var $exponents;
+
+ /**
+ * Coefficients for Chinese Remainder Theorem (ie. qInv)
+ *
+ * @var array
* @access private
*/
- protected $sLen;
+ var $coefficients;
/**
- * Label
+ * Hash name
*
* @var string
* @access private
*/
- protected $label = '';
+ var $hashName;
+
+ /**
+ * Hash function
+ *
+ * @var \phpseclib\Crypt\Hash
+ * @access private
+ */
+ var $hash;
+
+ /**
+ * Length of hash function output
+ *
+ * @var int
+ * @access private
+ */
+ var $hLen;
+
+ /**
+ * Length of salt
+ *
+ * @var int
+ * @access private
+ */
+ var $sLen;
/**
* Hash function for the Mask Generation Function
*
- * @var \phpseclib3\Crypt\Hash
+ * @var \phpseclib\Crypt\Hash
* @access private
*/
- protected $mgfHash;
+ var $mgfHash;
/**
* Length of MGF hash function output
@@ -203,136 +372,295 @@ abstract class RSA extends AsymmetricKey
* @var int
* @access private
*/
- protected $mgfHLen;
+ var $mgfHLen;
/**
- * Modulus (ie. n)
+ * Encryption mode
*
- * @var \phpseclib3\Math\BigInteger
+ * @var int
* @access private
*/
- protected $modulus;
+ var $encryptionMode = self::ENCRYPTION_OAEP;
/**
- * Modulus length
+ * Signature mode
*
- * @var \phpseclib3\Math\BigInteger
+ * @var int
* @access private
*/
- protected $k;
+ var $signatureMode = self::SIGNATURE_PSS;
/**
- * Exponent (ie. e or d)
+ * Public Exponent
*
- * @var \phpseclib3\Math\BigInteger
+ * @var mixed
* @access private
*/
- protected $exponent;
+ var $publicExponent = false;
/**
- * Default public exponent
+ * Password
*
- * @var int
- * @link http://en.wikipedia.org/wiki/65537_%28number%29
+ * @var string
* @access private
*/
- private static $defaultExponent = 65537;
+ var $password = false;
/**
- * Enable Blinding?
+ * Components
+ *
+ * For use with parsing XML formatted keys. PHP's XML Parser functions use utilized - instead of PHP's DOM functions -
+ * because PHP's XML Parser functions work on PHP4 whereas PHP's DOM functions - although surperior - don't.
*
- * @var bool
+ * @see self::_start_element_handler()
+ * @var array
* @access private
*/
- protected static $enableBlinding = true;
+ var $components = array();
/**
- * Smallest Prime
+ * Current String
*
- * Per <http://cseweb.ucsd.edu/~hovav/dist/survey.pdf#page=5>, this number ought not result in primes smaller
- * than 256 bits. As a consequence if the key you're trying to create is 1024 bits and you've set smallestPrime
- * to 384 bits then you're going to get a 384 bit prime and a 640 bit prime (384 + 1024 % 384). At least if
- * engine is set to self::ENGINE_INTERNAL. If Engine is set to self::ENGINE_OPENSSL then smallest Prime is
- * ignored (ie. multi-prime RSA support is more intended as a way to speed up RSA key generation when there's
- * a chance neither gmp nor OpenSSL are installed)
+ * For use with parsing XML formatted keys.
*
- * @var int
+ * @see self::_character_handler()
+ * @see self::_stop_element_handler()
+ * @var mixed
* @access private
*/
- private static $smallestPrime = 4096;
+ var $current;
/**
- * Sets the public exponent for key generation
+ * OpenSSL configuration file name.
*
- * This will be 65537 unless changed.
+ * Set to null to use system configuration file.
+ * @see self::createKey()
+ * @var mixed
+ * @Access public
+ */
+ var $configFile;
+
+ /**
+ * Public key comment field.
*
- * @access public
- * @param int $val
+ * @var string
+ * @access private
*/
- public static function setExponent($val)
- {
- self::$defaultExponent = $val;
- }
+ var $comment = 'phpseclib-generated-key';
/**
- * Sets the smallest prime number in bits. Used for key generation
+ * The constructor
*
- * This will be 4096 unless changed.
+ * If you want to make use of the openssl extension, you'll need to set the mode manually, yourself. The reason
+ * \phpseclib\Crypt\RSA doesn't do it is because OpenSSL doesn't fail gracefully. openssl_pkey_new(), in particular, requires
+ * openssl.cnf be present somewhere and, unfortunately, the only real way to find out is too late.
*
+ * @return \phpseclib\Crypt\RSA
* @access public
- * @param int $val
*/
- public static function setSmallestPrime($val)
+ function __construct()
{
- self::$smallestPrime = $val;
+ $this->configFile = dirname(__FILE__) . '/../openssl.cnf';
+
+ if (!defined('CRYPT_RSA_MODE')) {
+ switch (true) {
+ // Math/BigInteger's openssl requirements are a little less stringent than Crypt/RSA's. in particular,
+ // Math/BigInteger doesn't require an openssl.cfg file whereas Crypt/RSA does. so if Math/BigInteger
+ // can't use OpenSSL it can be pretty trivially assumed, then, that Crypt/RSA can't either.
+ case defined('MATH_BIGINTEGER_OPENSSL_DISABLE'):
+ define('CRYPT_RSA_MODE', self::MODE_INTERNAL);
+ break;
+ case extension_loaded('openssl') && file_exists($this->configFile):
+ // some versions of XAMPP have mismatched versions of OpenSSL which causes it not to work
+ $versions = array();
+
+ // avoid generating errors (even with suppression) when phpinfo() is disabled (common in production systems)
+ if (strpos(ini_get('disable_functions'), 'phpinfo') === false) {
+ ob_start();
+ @phpinfo();
+ $content = ob_get_contents();
+ ob_end_clean();
+
+ preg_match_all('#OpenSSL (Header|Library) Version(.*)#im', $content, $matches);
+
+ if (!empty($matches[1])) {
+ for ($i = 0; $i < count($matches[1]); $i++) {
+ $fullVersion = trim(str_replace('=>', '', strip_tags($matches[2][$i])));
+
+ // Remove letter part in OpenSSL version
+ if (!preg_match('/(\d+\.\d+\.\d+)/i', $fullVersion, $m)) {
+ $versions[$matches[1][$i]] = $fullVersion;
+ } else {
+ $versions[$matches[1][$i]] = $m[0];
+ }
+ }
+ }
+ }
+
+ // it doesn't appear that OpenSSL versions were reported upon until PHP 5.3+
+ switch (true) {
+ case !isset($versions['Header']):
+ case !isset($versions['Library']):
+ case $versions['Header'] == $versions['Library']:
+ case version_compare($versions['Header'], '1.0.0') >= 0 && version_compare($versions['Library'], '1.0.0') >= 0:
+ define('CRYPT_RSA_MODE', self::MODE_OPENSSL);
+ break;
+ default:
+ define('CRYPT_RSA_MODE', self::MODE_INTERNAL);
+ define('MATH_BIGINTEGER_OPENSSL_DISABLE', true);
+ }
+ break;
+ default:
+ define('CRYPT_RSA_MODE', self::MODE_INTERNAL);
+ }
+ }
+
+ $this->zero = new BigInteger();
+ $this->one = new BigInteger(1);
+
+ $this->hash = new Hash('sha1');
+ $this->hLen = $this->hash->getLength();
+ $this->hashName = 'sha1';
+ $this->mgfHash = new Hash('sha1');
+ $this->mgfHLen = $this->mgfHash->getLength();
}
/**
- * Create a private key
+ * Create public / private key pair
*
- * The public key can be extracted from the private key
+ * Returns an array with the following three elements:
+ * - 'privatekey': The private key.
+ * - 'publickey': The public key.
+ * - 'partialkey': A partially computed key (if the execution time exceeded $timeout).
+ * Will need to be passed back to \phpseclib\Crypt\RSA::createKey() as the third parameter for further processing.
*
- * @return RSA
* @access public
* @param int $bits
+ * @param int $timeout
+ * @param array $partial
*/
- public static function createKey($bits = 2048)
+ function createKey($bits = 1024, $timeout = false, $partial = array())
{
- self::initialize_static_variables();
+ if (!defined('CRYPT_RSA_EXPONENT')) {
+ // http://en.wikipedia.org/wiki/65537_%28number%29
+ define('CRYPT_RSA_EXPONENT', '65537');
+ }
+ // per <http://cseweb.ucsd.edu/~hovav/dist/survey.pdf#page=5>, this number ought not result in primes smaller
+ // than 256 bits. as a consequence if the key you're trying to create is 1024 bits and you've set CRYPT_RSA_SMALLEST_PRIME
+ // to 384 bits then you're going to get a 384 bit prime and a 640 bit prime (384 + 1024 % 384). at least if
+ // CRYPT_RSA_MODE is set to self::MODE_INTERNAL. if CRYPT_RSA_MODE is set to self::MODE_OPENSSL then
+ // CRYPT_RSA_SMALLEST_PRIME is ignored (ie. multi-prime RSA support is more intended as a way to speed up RSA key
+ // generation when there's a chance neither gmp nor OpenSSL are installed)
+ if (!defined('CRYPT_RSA_SMALLEST_PRIME')) {
+ define('CRYPT_RSA_SMALLEST_PRIME', 4096);
+ }
+
+ // OpenSSL uses 65537 as the exponent and requires RSA keys be 384 bits minimum
+ if (CRYPT_RSA_MODE == self::MODE_OPENSSL && $bits >= 384 && CRYPT_RSA_EXPONENT == 65537) {
+ $config = array();
+ if (isset($this->configFile)) {
+ $config['config'] = $this->configFile;
+ }
+ $rsa = openssl_pkey_new(array('private_key_bits' => $bits) + $config);
+ openssl_pkey_export($rsa, $privatekey, null, $config);
+ $publickey = openssl_pkey_get_details($rsa);
+ $publickey = $publickey['key'];
+
+ $privatekey = call_user_func_array(array($this, '_convertPrivateKey'), array_values($this->_parseKey($privatekey, self::PRIVATE_FORMAT_PKCS1)));
+ $publickey = call_user_func_array(array($this, '_convertPublicKey'), array_values($this->_parseKey($publickey, self::PUBLIC_FORMAT_PKCS1)));
+
+ // clear the buffer of error strings stemming from a minimalistic openssl.cnf
+ while (openssl_error_string() !== false) {
+ }
+
+ return array(
+ 'privatekey' => $privatekey,
+ 'publickey' => $publickey,
+ 'partialkey' => false
+ );
+ }
static $e;
if (!isset($e)) {
- $e = new BigInteger(self::$defaultExponent);
+ $e = new BigInteger(CRYPT_RSA_EXPONENT);
}
- $regSize = $bits >> 1; // divide by two to see how many bits P and Q would be
- if ($regSize > self::$smallestPrime) {
- $num_primes = floor($bits / self::$smallestPrime);
- $regSize = self::$smallestPrime;
+ extract($this->_generateMinMax($bits));
+ $absoluteMin = $min;
+ $temp = $bits >> 1; // divide by two to see how many bits P and Q would be
+ if ($temp > CRYPT_RSA_SMALLEST_PRIME) {
+ $num_primes = floor($bits / CRYPT_RSA_SMALLEST_PRIME);
+ $temp = CRYPT_RSA_SMALLEST_PRIME;
} else {
$num_primes = 2;
}
+ extract($this->_generateMinMax($temp + $bits % $temp));
+ $finalMax = $max;
+ extract($this->_generateMinMax($temp));
+
+ $generator = new BigInteger();
+
+ $n = $this->one->copy();
+ if (!empty($partial)) {
+ extract(unserialize($partial));
+ } else {
+ $exponents = $coefficients = $primes = array();
+ $lcm = array(
+ 'top' => $this->one->copy(),
+ 'bottom' => false
+ );
+ }
- $n = clone self::$one;
- $exponents = $coefficients = $primes = [];
- $lcm = [
- 'top' => clone self::$one,
- 'bottom' => false
- ];
+ $start = time();
+ $i0 = count($primes) + 1;
do {
- for ($i = 1; $i <= $num_primes; $i++) {
- if ($i != $num_primes) {
- $primes[$i] = BigInteger::randomPrime($regSize);
+ for ($i = $i0; $i <= $num_primes; $i++) {
+ if ($timeout !== false) {
+ $timeout-= time() - $start;
+ $start = time();
+ if ($timeout <= 0) {
+ return array(
+ 'privatekey' => '',
+ 'publickey' => '',
+ 'partialkey' => serialize(array(
+ 'primes' => $primes,
+ 'coefficients' => $coefficients,
+ 'lcm' => $lcm,
+ 'exponents' => $exponents
+ ))
+ );
+ }
+ }
+
+ if ($i == $num_primes) {
+ list($min, $temp) = $absoluteMin->divide($n);
+ if (!$temp->equals($this->zero)) {
+ $min = $min->add($this->one); // ie. ceil()
+ }
+ $primes[$i] = $generator->randomPrime($min, $finalMax, $timeout);
} else {
- extract(BigInteger::minMaxBits($bits));
- /** @var BigInteger $min
- * @var BigInteger $max
- */
- list($min) = $min->divide($n);
- $min = $min->add(self::$one);
- list($max) = $max->divide($n);
- $primes[$i] = BigInteger::randomRangePrime($min, $max);
+ $primes[$i] = $generator->randomPrime($min, $max, $timeout);
+ }
+
+ if ($primes[$i] === false) { // if we've reached the timeout
+ if (count($primes) > 1) {
+ $partialkey = '';
+ } else {
+ array_pop($primes);
+ $partialkey = serialize(array(
+ 'primes' => $primes,
+ 'coefficients' => $coefficients,
+ 'lcm' => $lcm,
+ 'exponents' => $exponents
+ ));
+ }
+
+ return array(
+ 'privatekey' => '',
+ 'publickey' => '',
+ 'partialkey' => $partialkey
+ );
}
// the first coefficient is calculated differently from the rest
@@ -343,27 +671,24 @@ abstract class RSA extends AsymmetricKey
$n = $n->multiply($primes[$i]);
- $temp = $primes[$i]->subtract(self::$one);
+ $temp = $primes[$i]->subtract($this->one);
// textbook RSA implementations use Euler's totient function instead of the least common multiple.
// see http://en.wikipedia.org/wiki/Euler%27s_totient_function
$lcm['top'] = $lcm['top']->multiply($temp);
$lcm['bottom'] = $lcm['bottom'] === false ? $temp : $lcm['bottom']->gcd($temp);
+
+ $exponents[$i] = $e->modInverse($temp);
}
list($temp) = $lcm['top']->divide($lcm['bottom']);
$gcd = $temp->gcd($e);
$i0 = 1;
- } while (!$gcd->equals(self::$one));
-
- $coefficients[2] = $primes[2]->modInverse($primes[1]);
+ } while (!$gcd->equals($this->one));
$d = $e->modInverse($temp);
- foreach ($primes as $i => $prime) {
- $temp = $prime->subtract(self::$one);
- $exponents[$i] = $e->modInverse($temp);
- }
+ $coefficients[2] = $primes[2]->modInverse($primes[1]);
// from <http://tools.ietf.org/html/rfc3447#appendix-A.1.2>:
// RSAPrivateKey ::= SEQUENCE {
@@ -378,460 +703,2505 @@ abstract class RSA extends AsymmetricKey
// coefficient INTEGER, -- (inverse of q) mod p
// otherPrimeInfos OtherPrimeInfos OPTIONAL
// }
- $privatekey = new PrivateKey;
- $privatekey->modulus = $n;
- $privatekey->k = $bits >> 3;
- $privatekey->publicExponent = $e;
- $privatekey->exponent = $d;
- $privatekey->privateExponent = $e;
- $privatekey->primes = $primes;
- $privatekey->exponents = $exponents;
- $privatekey->coefficients = $coefficients;
-
- /*
- $publickey = new PublicKey;
- $publickey->modulus = $n;
- $publickey->k = $bits >> 3;
- $publickey->exponent = $e;
- $publickey->publicExponent = $e;
- $publickey->isPublic = true;
- */
- return $privatekey;
+ return array(
+ 'privatekey' => $this->_convertPrivateKey($n, $e, $d, $primes, $exponents, $coefficients),
+ 'publickey' => $this->_convertPublicKey($n, $e),
+ 'partialkey' => false
+ );
}
/**
- * OnLoad Handler
+ * Convert a private key to the appropriate format.
*
- * @return bool
- * @access protected
- * @param array $components
+ * @access private
+ * @see self::setPrivateKeyFormat()
+ * @param Math_BigInteger $n
+ * @param Math_BigInteger $e
+ * @param Math_BigInteger $d
+ * @param array<int,Math_BigInteger> $primes
+ * @param array<int,Math_BigInteger> $exponents
+ * @param array<int,Math_BigInteger> $coefficients
+ * @return string
*/
- protected static function onLoad($components)
+ function _convertPrivateKey($n, $e, $d, $primes, $exponents, $coefficients)
{
- $key = $components['isPublicKey'] ?
- new PublicKey :
- new PrivateKey;
+ $signed = $this->privateKeyFormat != self::PRIVATE_FORMAT_XML;
+ $num_primes = count($primes);
+ $raw = array(
+ 'version' => $num_primes == 2 ? chr(0) : chr(1), // two-prime vs. multi
+ 'modulus' => $n->toBytes($signed),
+ 'publicExponent' => $e->toBytes($signed),
+ 'privateExponent' => $d->toBytes($signed),
+ 'prime1' => $primes[1]->toBytes($signed),
+ 'prime2' => $primes[2]->toBytes($signed),
+ 'exponent1' => $exponents[1]->toBytes($signed),
+ 'exponent2' => $exponents[2]->toBytes($signed),
+ 'coefficient' => $coefficients[2]->toBytes($signed)
+ );
+
+ // if the format in question does not support multi-prime rsa and multi-prime rsa was used,
+ // call _convertPublicKey() instead.
+ switch ($this->privateKeyFormat) {
+ case self::PRIVATE_FORMAT_XML:
+ if ($num_primes != 2) {
+ return false;
+ }
+ return "<RSAKeyValue>\r\n" .
+ ' <Modulus>' . base64_encode($raw['modulus']) . "</Modulus>\r\n" .
+ ' <Exponent>' . base64_encode($raw['publicExponent']) . "</Exponent>\r\n" .
+ ' <P>' . base64_encode($raw['prime1']) . "</P>\r\n" .
+ ' <Q>' . base64_encode($raw['prime2']) . "</Q>\r\n" .
+ ' <DP>' . base64_encode($raw['exponent1']) . "</DP>\r\n" .
+ ' <DQ>' . base64_encode($raw['exponent2']) . "</DQ>\r\n" .
+ ' <InverseQ>' . base64_encode($raw['coefficient']) . "</InverseQ>\r\n" .
+ ' <D>' . base64_encode($raw['privateExponent']) . "</D>\r\n" .
+ '</RSAKeyValue>';
+ break;
+ case self::PRIVATE_FORMAT_PUTTY:
+ if ($num_primes != 2) {
+ return false;
+ }
+ $key = "PuTTY-User-Key-File-2: ssh-rsa\r\nEncryption: ";
+ $encryption = (!empty($this->password) || is_string($this->password)) ? 'aes256-cbc' : 'none';
+ $key.= $encryption;
+ $key.= "\r\nComment: " . $this->comment . "\r\n";
+ $public = pack(
+ 'Na*Na*Na*',
+ strlen('ssh-rsa'),
+ 'ssh-rsa',
+ strlen($raw['publicExponent']),
+ $raw['publicExponent'],
+ strlen($raw['modulus']),
+ $raw['modulus']
+ );
+ $source = pack(
+ 'Na*Na*Na*Na*',
+ strlen('ssh-rsa'),
+ 'ssh-rsa',
+ strlen($encryption),
+ $encryption,
+ strlen($this->comment),
+ $this->comment,
+ strlen($public),
+ $public
+ );
+ $public = base64_encode($public);
+ $key.= "Public-Lines: " . ((strlen($public) + 63) >> 6) . "\r\n";
+ $key.= chunk_split($public, 64);
+ $private = pack(
+ 'Na*Na*Na*Na*',
+ strlen($raw['privateExponent']),
+ $raw['privateExponent'],
+ strlen($raw['prime1']),
+ $raw['prime1'],
+ strlen($raw['prime2']),
+ $raw['prime2'],
+ strlen($raw['coefficient']),
+ $raw['coefficient']
+ );
+ if (empty($this->password) && !is_string($this->password)) {
+ $source.= pack('Na*', strlen($private), $private);
+ $hashkey = 'putty-private-key-file-mac-key';
+ } else {
+ $private.= Random::string(16 - (strlen($private) & 15));
+ $source.= pack('Na*', strlen($private), $private);
+ $sequence = 0;
+ $symkey = '';
+ while (strlen($symkey) < 32) {
+ $temp = pack('Na*', $sequence++, $this->password);
+ $symkey.= pack('H*', sha1($temp));
+ }
+ $symkey = substr($symkey, 0, 32);
+ $crypto = new AES();
+
+ $crypto->setKey($symkey);
+ $crypto->disablePadding();
+ $private = $crypto->encrypt($private);
+ $hashkey = 'putty-private-key-file-mac-key' . $this->password;
+ }
- $key->modulus = $components['modulus'];
- $key->publicExponent = $components['publicExponent'];
- $key->k = $key->modulus->getLengthInBytes();
+ $private = base64_encode($private);
+ $key.= 'Private-Lines: ' . ((strlen($private) + 63) >> 6) . "\r\n";
+ $key.= chunk_split($private, 64);
+ $hash = new Hash('sha1');
+ $hash->setKey(pack('H*', sha1($hashkey)));
+ $key.= 'Private-MAC: ' . bin2hex($hash->hash($source)) . "\r\n";
+
+ return $key;
+ case self::PRIVATE_FORMAT_OPENSSH:
+ if ($num_primes != 2) {
+ return false;
+ }
+ $publicKey = pack('Na*Na*Na*', strlen('ssh-rsa'), 'ssh-rsa', strlen($raw['publicExponent']), $raw['publicExponent'], strlen($raw['modulus']), $raw['modulus']);
+ $privateKey = pack(
+ 'Na*Na*Na*Na*Na*Na*Na*',
+ strlen('ssh-rsa'),
+ 'ssh-rsa',
+ strlen($raw['modulus']),
+ $raw['modulus'],
+ strlen($raw['publicExponent']),
+ $raw['publicExponent'],
+ strlen($raw['privateExponent']),
+ $raw['privateExponent'],
+ strlen($raw['coefficient']),
+ $raw['coefficient'],
+ strlen($raw['prime1']),
+ $raw['prime1'],
+ strlen($raw['prime2']),
+ $raw['prime2']
+ );
+ $checkint = Random::string(4);
+ $paddedKey = pack(
+ 'a*Na*',
+ $checkint . $checkint . $privateKey,
+ strlen($this->comment),
+ $this->comment
+ );
+ $paddingLength = (7 * strlen($paddedKey)) % 8;
+ for ($i = 1; $i <= $paddingLength; $i++) {
+ $paddedKey.= chr($i);
+ }
+ $key = pack(
+ 'Na*Na*Na*NNa*Na*',
+ strlen('none'),
+ 'none',
+ strlen('none'),
+ 'none',
+ 0,
+ '',
+ 1,
+ strlen($publicKey),
+ $publicKey,
+ strlen($paddedKey),
+ $paddedKey
+ );
+ $key = "openssh-key-v1\0$key";
+
+ return "-----BEGIN OPENSSH PRIVATE KEY-----\r\n" .
+ chunk_split(base64_encode($key), 70) .
+ "-----END OPENSSH PRIVATE KEY-----";
+ default: // eg. self::PRIVATE_FORMAT_PKCS1
+ $components = array();
+ foreach ($raw as $name => $value) {
+ $components[$name] = pack('Ca*a*', self::ASN1_INTEGER, $this->_encodeLength(strlen($value)), $value);
+ }
- if ($components['isPublicKey'] || !isset($components['privateExponent'])) {
- $key->exponent = $key->publicExponent;
- } else {
- $key->privateExponent = $components['privateExponent'];
- $key->exponent = $key->privateExponent;
- $key->primes = $components['primes'];
- $key->exponents = $components['exponents'];
- $key->coefficients = $components['coefficients'];
- }
-
- if ($components['format'] == PSS::class) {
- // in the X509 world RSA keys are assumed to use PKCS1 padding by default. only if the key is
- // explicitly a PSS key is the use of PSS assumed. phpseclib does not work like this. phpseclib
- // uses PSS padding by default. it assumes the more secure method by default and altho it provides
- // for the less secure PKCS1 method you have to go out of your way to use it. this is consistent
- // with the latest trends in crypto. libsodium (NaCl) is actually a little more extreme in that
- // not only does it defaults to the most secure methods - it doesn't even let you choose less
- // secure methods
- //$key = $key->withPadding(self::SIGNATURE_PSS);
- if (isset($components['hash'])) {
- $key = $key->withHash($components['hash']);
- }
- if (isset($components['MGFHash'])) {
- $key = $key->withMGFHash($components['MGFHash']);
- }
- if (isset($components['saltLength'])) {
- $key = $key->withSaltLength($components['saltLength']);
- }
- }
+ $RSAPrivateKey = implode('', $components);
+
+ if ($num_primes > 2) {
+ $OtherPrimeInfos = '';
+ for ($i = 3; $i <= $num_primes; $i++) {
+ // OtherPrimeInfos ::= SEQUENCE SIZE(1..MAX) OF OtherPrimeInfo
+ //
+ // OtherPrimeInfo ::= SEQUENCE {
+ // prime INTEGER, -- ri
+ // exponent INTEGER, -- di
+ // coefficient INTEGER -- ti
+ // }
+ $OtherPrimeInfo = pack('Ca*a*', self::ASN1_INTEGER, $this->_encodeLength(strlen($primes[$i]->toBytes(true))), $primes[$i]->toBytes(true));
+ $OtherPrimeInfo.= pack('Ca*a*', self::ASN1_INTEGER, $this->_encodeLength(strlen($exponents[$i]->toBytes(true))), $exponents[$i]->toBytes(true));
+ $OtherPrimeInfo.= pack('Ca*a*', self::ASN1_INTEGER, $this->_encodeLength(strlen($coefficients[$i]->toBytes(true))), $coefficients[$i]->toBytes(true));
+ $OtherPrimeInfos.= pack('Ca*a*', self::ASN1_SEQUENCE, $this->_encodeLength(strlen($OtherPrimeInfo)), $OtherPrimeInfo);
+ }
+ $RSAPrivateKey.= pack('Ca*a*', self::ASN1_SEQUENCE, $this->_encodeLength(strlen($OtherPrimeInfos)), $OtherPrimeInfos);
+ }
- return $key;
+ $RSAPrivateKey = pack('Ca*a*', self::ASN1_SEQUENCE, $this->_encodeLength(strlen($RSAPrivateKey)), $RSAPrivateKey);
+
+ if ($this->privateKeyFormat == self::PRIVATE_FORMAT_PKCS8) {
+ $rsaOID = pack('H*', '300d06092a864886f70d0101010500'); // hex version of MA0GCSqGSIb3DQEBAQUA
+ $RSAPrivateKey = pack(
+ 'Ca*a*Ca*a*',
+ self::ASN1_INTEGER,
+ "\01\00",
+ $rsaOID,
+ 4,
+ $this->_encodeLength(strlen($RSAPrivateKey)),
+ $RSAPrivateKey
+ );
+ $RSAPrivateKey = pack('Ca*a*', self::ASN1_SEQUENCE, $this->_encodeLength(strlen($RSAPrivateKey)), $RSAPrivateKey);
+ if (!empty($this->password) || is_string($this->password)) {
+ $salt = Random::string(8);
+ $iterationCount = 2048;
+
+ $crypto = new DES();
+ $crypto->setPassword($this->password, 'pbkdf1', 'md5', $salt, $iterationCount);
+ $RSAPrivateKey = $crypto->encrypt($RSAPrivateKey);
+
+ $parameters = pack(
+ 'Ca*a*Ca*N',
+ self::ASN1_OCTETSTRING,
+ $this->_encodeLength(strlen($salt)),
+ $salt,
+ self::ASN1_INTEGER,
+ $this->_encodeLength(4),
+ $iterationCount
+ );
+ $pbeWithMD5AndDES_CBC = "\x2a\x86\x48\x86\xf7\x0d\x01\x05\x03";
+
+ $encryptionAlgorithm = pack(
+ 'Ca*a*Ca*a*',
+ self::ASN1_OBJECT,
+ $this->_encodeLength(strlen($pbeWithMD5AndDES_CBC)),
+ $pbeWithMD5AndDES_CBC,
+ self::ASN1_SEQUENCE,
+ $this->_encodeLength(strlen($parameters)),
+ $parameters
+ );
+
+ $RSAPrivateKey = pack(
+ 'Ca*a*Ca*a*',
+ self::ASN1_SEQUENCE,
+ $this->_encodeLength(strlen($encryptionAlgorithm)),
+ $encryptionAlgorithm,
+ self::ASN1_OCTETSTRING,
+ $this->_encodeLength(strlen($RSAPrivateKey)),
+ $RSAPrivateKey
+ );
+
+ $RSAPrivateKey = pack('Ca*a*', self::ASN1_SEQUENCE, $this->_encodeLength(strlen($RSAPrivateKey)), $RSAPrivateKey);
+
+ $RSAPrivateKey = "-----BEGIN ENCRYPTED PRIVATE KEY-----\r\n" .
+ chunk_split(base64_encode($RSAPrivateKey), 64) .
+ '-----END ENCRYPTED PRIVATE KEY-----';
+ } else {
+ $RSAPrivateKey = "-----BEGIN PRIVATE KEY-----\r\n" .
+ chunk_split(base64_encode($RSAPrivateKey), 64) .
+ '-----END PRIVATE KEY-----';
+ }
+ return $RSAPrivateKey;
+ }
+
+ if (!empty($this->password) || is_string($this->password)) {
+ $iv = Random::string(8);
+ $symkey = pack('H*', md5($this->password . $iv)); // symkey is short for symmetric key
+ $symkey.= substr(pack('H*', md5($symkey . $this->password . $iv)), 0, 8);
+ $des = new TripleDES();
+ $des->setKey($symkey);
+ $des->setIV($iv);
+ $iv = strtoupper(bin2hex($iv));
+ $RSAPrivateKey = "-----BEGIN RSA PRIVATE KEY-----\r\n" .
+ "Proc-Type: 4,ENCRYPTED\r\n" .
+ "DEK-Info: DES-EDE3-CBC,$iv\r\n" .
+ "\r\n" .
+ chunk_split(base64_encode($des->encrypt($RSAPrivateKey)), 64) .
+ '-----END RSA PRIVATE KEY-----';
+ } else {
+ $RSAPrivateKey = "-----BEGIN RSA PRIVATE KEY-----\r\n" .
+ chunk_split(base64_encode($RSAPrivateKey), 64) .
+ '-----END RSA PRIVATE KEY-----';
+ }
+
+ return $RSAPrivateKey;
+ }
}
/**
- * Constructor
+ * Convert a public key to the appropriate format
*
- * PublicKey and PrivateKey objects can only be created from abstract RSA class
+ * @access private
+ * @see self::setPublicKeyFormat()
+ * @param Math_BigInteger $n
+ * @param Math_BigInteger $e
+ * @return string|array<string,Math_BigInteger>
*/
- protected function __construct()
+ function _convertPublicKey($n, $e)
{
- parent::__construct();
+ $signed = $this->publicKeyFormat != self::PUBLIC_FORMAT_XML;
+
+ $modulus = $n->toBytes($signed);
+ $publicExponent = $e->toBytes($signed);
+
+ switch ($this->publicKeyFormat) {
+ case self::PUBLIC_FORMAT_RAW:
+ return array('e' => $e->copy(), 'n' => $n->copy());
+ case self::PUBLIC_FORMAT_XML:
+ return "<RSAKeyValue>\r\n" .
+ ' <Modulus>' . base64_encode($modulus) . "</Modulus>\r\n" .
+ ' <Exponent>' . base64_encode($publicExponent) . "</Exponent>\r\n" .
+ '</RSAKeyValue>';
+ break;
+ case self::PUBLIC_FORMAT_OPENSSH:
+ // from <http://tools.ietf.org/html/rfc4253#page-15>:
+ // string "ssh-rsa"
+ // mpint e
+ // mpint n
+ $RSAPublicKey = pack('Na*Na*Na*', strlen('ssh-rsa'), 'ssh-rsa', strlen($publicExponent), $publicExponent, strlen($modulus), $modulus);
+ $RSAPublicKey = 'ssh-rsa ' . base64_encode($RSAPublicKey) . ' ' . $this->comment;
+
+ return $RSAPublicKey;
+ default: // eg. self::PUBLIC_FORMAT_PKCS1_RAW or self::PUBLIC_FORMAT_PKCS1
+ // from <http://tools.ietf.org/html/rfc3447#appendix-A.1.1>:
+ // RSAPublicKey ::= SEQUENCE {
+ // modulus INTEGER, -- n
+ // publicExponent INTEGER -- e
+ // }
+ $components = array(
+ 'modulus' => pack('Ca*a*', self::ASN1_INTEGER, $this->_encodeLength(strlen($modulus)), $modulus),
+ 'publicExponent' => pack('Ca*a*', self::ASN1_INTEGER, $this->_encodeLength(strlen($publicExponent)), $publicExponent)
+ );
+
+ $RSAPublicKey = pack(
+ 'Ca*a*a*',
+ self::ASN1_SEQUENCE,
+ $this->_encodeLength(strlen($components['modulus']) + strlen($components['publicExponent'])),
+ $components['modulus'],
+ $components['publicExponent']
+ );
+
+ if ($this->publicKeyFormat == self::PUBLIC_FORMAT_PKCS1_RAW) {
+ $RSAPublicKey = "-----BEGIN RSA PUBLIC KEY-----\r\n" .
+ chunk_split(base64_encode($RSAPublicKey), 64) .
+ '-----END RSA PUBLIC KEY-----';
+ } else {
+ // sequence(oid(1.2.840.113549.1.1.1), null)) = rsaEncryption.
+ $rsaOID = pack('H*', '300d06092a864886f70d0101010500'); // hex version of MA0GCSqGSIb3DQEBAQUA
+ $RSAPublicKey = chr(0) . $RSAPublicKey;
+ $RSAPublicKey = chr(3) . $this->_encodeLength(strlen($RSAPublicKey)) . $RSAPublicKey;
+
+ $RSAPublicKey = pack(
+ 'Ca*a*',
+ self::ASN1_SEQUENCE,
+ $this->_encodeLength(strlen($rsaOID . $RSAPublicKey)),
+ $rsaOID . $RSAPublicKey
+ );
+
+ $RSAPublicKey = "-----BEGIN PUBLIC KEY-----\r\n" .
+ chunk_split(base64_encode($RSAPublicKey), 64) .
+ '-----END PUBLIC KEY-----';
+ }
- $this->hLen = $this->hash->getLengthInBytes();
- $this->mgfHash = new Hash('sha256');
- $this->mgfHLen = $this->mgfHash->getLengthInBytes();
+ return $RSAPublicKey;
+ }
}
/**
- * Integer-to-Octet-String primitive
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-4.1 RFC3447#section-4.1}.
+ * Break a public or private key down into its constituant components
*
* @access private
- * @param bool|\phpseclib3\Math\BigInteger $x
- * @param int $xLen
- * @return bool|string
+ * @see self::_convertPublicKey()
+ * @see self::_convertPrivateKey()
+ * @param string|array $key
+ * @param int $type
+ * @return array|bool
*/
- protected function i2osp($x, $xLen)
+ function _parseKey($key, $type)
{
- if ($x === false) {
+ if ($type != self::PUBLIC_FORMAT_RAW && !is_string($key)) {
return false;
}
- $x = $x->toBytes();
- if (strlen($x) > $xLen) {
- throw new \OutOfRangeException('Resultant string length out of range');
+
+ switch ($type) {
+ case self::PUBLIC_FORMAT_RAW:
+ if (!is_array($key)) {
+ return false;
+ }
+ $components = array();
+ switch (true) {
+ case isset($key['e']):
+ $components['publicExponent'] = $key['e']->copy();
+ break;
+ case isset($key['exponent']):
+ $components['publicExponent'] = $key['exponent']->copy();
+ break;
+ case isset($key['publicExponent']):
+ $components['publicExponent'] = $key['publicExponent']->copy();
+ break;
+ case isset($key[0]):
+ $components['publicExponent'] = $key[0]->copy();
+ }
+ switch (true) {
+ case isset($key['n']):
+ $components['modulus'] = $key['n']->copy();
+ break;
+ case isset($key['modulo']):
+ $components['modulus'] = $key['modulo']->copy();
+ break;
+ case isset($key['modulus']):
+ $components['modulus'] = $key['modulus']->copy();
+ break;
+ case isset($key[1]):
+ $components['modulus'] = $key[1]->copy();
+ }
+ return isset($components['modulus']) && isset($components['publicExponent']) ? $components : false;
+ case self::PRIVATE_FORMAT_PKCS1:
+ case self::PRIVATE_FORMAT_PKCS8:
+ case self::PUBLIC_FORMAT_PKCS1:
+ /* Although PKCS#1 proposes a format that public and private keys can use, encrypting them is
+ "outside the scope" of PKCS#1. PKCS#1 then refers you to PKCS#12 and PKCS#15 if you're wanting to
+ protect private keys, however, that's not what OpenSSL* does. OpenSSL protects private keys by adding
+ two new "fields" to the key - DEK-Info and Proc-Type. These fields are discussed here:
+
+ http://tools.ietf.org/html/rfc1421#section-4.6.1.1
+ http://tools.ietf.org/html/rfc1421#section-4.6.1.3
+
+ DES-EDE3-CBC as an algorithm, however, is not discussed anywhere, near as I can tell.
+ DES-CBC and DES-EDE are discussed in RFC1423, however, DES-EDE3-CBC isn't, nor is its key derivation
+ function. As is, the definitive authority on this encoding scheme isn't the IETF but rather OpenSSL's
+ own implementation. ie. the implementation *is* the standard and any bugs that may exist in that
+ implementation are part of the standard, as well.
+
+ * OpenSSL is the de facto standard. It's utilized by OpenSSH and other projects */
+ if (preg_match('#DEK-Info: (.+),(.+)#', $key, $matches)) {
+ $iv = pack('H*', trim($matches[2]));
+ $symkey = pack('H*', md5($this->password . substr($iv, 0, 8))); // symkey is short for symmetric key
+ $symkey.= pack('H*', md5($symkey . $this->password . substr($iv, 0, 8)));
+ // remove the Proc-Type / DEK-Info sections as they're no longer needed
+ $key = preg_replace('#^(?:Proc-Type|DEK-Info): .*#m', '', $key);
+ $ciphertext = $this->_extractBER($key);
+ if ($ciphertext === false) {
+ $ciphertext = $key;
+ }
+ switch ($matches[1]) {
+ case 'AES-256-CBC':
+ $crypto = new AES();
+ break;
+ case 'AES-128-CBC':
+ $symkey = substr($symkey, 0, 16);
+ $crypto = new AES();
+ break;
+ case 'DES-EDE3-CFB':
+ $crypto = new TripleDES(Base::MODE_CFB);
+ break;
+ case 'DES-EDE3-CBC':
+ $symkey = substr($symkey, 0, 24);
+ $crypto = new TripleDES();
+ break;
+ case 'DES-CBC':
+ $crypto = new DES();
+ break;
+ default:
+ return false;
+ }
+ $crypto->setKey($symkey);
+ $crypto->setIV($iv);
+ $decoded = $crypto->decrypt($ciphertext);
+ } else {
+ $decoded = $this->_extractBER($key);
+ }
+
+ if ($decoded !== false) {
+ $key = $decoded;
+ }
+
+ $components = array();
+
+ if (ord($this->_string_shift($key)) != self::ASN1_SEQUENCE) {
+ return false;
+ }
+ if ($this->_decodeLength($key) != strlen($key)) {
+ return false;
+ }
+
+ $tag = ord($this->_string_shift($key));
+ /* intended for keys for which OpenSSL's asn1parse returns the following:
+
+ 0:d=0 hl=4 l= 631 cons: SEQUENCE
+ 4:d=1 hl=2 l= 1 prim: INTEGER :00
+ 7:d=1 hl=2 l= 13 cons: SEQUENCE
+ 9:d=2 hl=2 l= 9 prim: OBJECT :rsaEncryption
+ 20:d=2 hl=2 l= 0 prim: NULL
+ 22:d=1 hl=4 l= 609 prim: OCTET STRING
+
+ ie. PKCS8 keys*/
+
+ if ($tag == self::ASN1_INTEGER && substr($key, 0, 3) == "\x01\x00\x30") {
+ $this->_string_shift($key, 3);
+ $tag = self::ASN1_SEQUENCE;
+ }
+
+ if ($tag == self::ASN1_SEQUENCE) {
+ $temp = $this->_string_shift($key, $this->_decodeLength($key));
+ if (ord($this->_string_shift($temp)) != self::ASN1_OBJECT) {
+ return false;
+ }
+ $length = $this->_decodeLength($temp);
+ switch ($this->_string_shift($temp, $length)) {
+ case "\x2a\x86\x48\x86\xf7\x0d\x01\x01\x01": // rsaEncryption
+ break;
+ case "\x2a\x86\x48\x86\xf7\x0d\x01\x05\x03": // pbeWithMD5AndDES-CBC
+ /*
+ PBEParameter ::= SEQUENCE {
+ salt OCTET STRING (SIZE(8)),
+ iterationCount INTEGER }
+ */
+ if (ord($this->_string_shift($temp)) != self::ASN1_SEQUENCE) {
+ return false;
+ }
+ if ($this->_decodeLength($temp) != strlen($temp)) {
+ return false;
+ }
+ $this->_string_shift($temp); // assume it's an octet string
+ $salt = $this->_string_shift($temp, $this->_decodeLength($temp));
+ if (ord($this->_string_shift($temp)) != self::ASN1_INTEGER) {
+ return false;
+ }
+ $this->_decodeLength($temp);
+ list(, $iterationCount) = unpack('N', str_pad($temp, 4, chr(0), STR_PAD_LEFT));
+ $this->_string_shift($key); // assume it's an octet string
+ $length = $this->_decodeLength($key);
+ if (strlen($key) != $length) {
+ return false;
+ }
+
+ $crypto = new DES();
+ $crypto->setPassword($this->password, 'pbkdf1', 'md5', $salt, $iterationCount);
+ $key = $crypto->decrypt($key);
+ if ($key === false) {
+ return false;
+ }
+ return $this->_parseKey($key, self::PRIVATE_FORMAT_PKCS1);
+ default:
+ return false;
+ }
+ /* intended for keys for which OpenSSL's asn1parse returns the following:
+
+ 0:d=0 hl=4 l= 290 cons: SEQUENCE
+ 4:d=1 hl=2 l= 13 cons: SEQUENCE
+ 6:d=2 hl=2 l= 9 prim: OBJECT :rsaEncryption
+ 17:d=2 hl=2 l= 0 prim: NULL
+ 19:d=1 hl=4 l= 271 prim: BIT STRING */
+ $tag = ord($this->_string_shift($key)); // skip over the BIT STRING / OCTET STRING tag
+ $this->_decodeLength($key); // skip over the BIT STRING / OCTET STRING length
+ // "The initial octet shall encode, as an unsigned binary integer wtih bit 1 as the least significant bit, the number of
+ // unused bits in the final subsequent octet. The number shall be in the range zero to seven."
+ // -- http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf (section 8.6.2.2)
+ if ($tag == self::ASN1_BITSTRING) {
+ $this->_string_shift($key);
+ }
+ if (ord($this->_string_shift($key)) != self::ASN1_SEQUENCE) {
+ return false;
+ }
+ if ($this->_decodeLength($key) != strlen($key)) {
+ return false;
+ }
+ $tag = ord($this->_string_shift($key));
+ }
+ if ($tag != self::ASN1_INTEGER) {
+ return false;
+ }
+
+ $length = $this->_decodeLength($key);
+ $temp = $this->_string_shift($key, $length);
+ if (strlen($temp) != 1 || ord($temp) > 2) {
+ $components['modulus'] = new BigInteger($temp, 256);
+ $this->_string_shift($key); // skip over self::ASN1_INTEGER
+ $length = $this->_decodeLength($key);
+ $components[$type == self::PUBLIC_FORMAT_PKCS1 ? 'publicExponent' : 'privateExponent'] = new BigInteger($this->_string_shift($key, $length), 256);
+
+ return $components;
+ }
+ if (ord($this->_string_shift($key)) != self::ASN1_INTEGER) {
+ return false;
+ }
+ $length = $this->_decodeLength($key);
+ $components['modulus'] = new BigInteger($this->_string_shift($key, $length), 256);
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['publicExponent'] = new BigInteger($this->_string_shift($key, $length), 256);
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['privateExponent'] = new BigInteger($this->_string_shift($key, $length), 256);
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['primes'] = array(1 => new BigInteger($this->_string_shift($key, $length), 256));
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['primes'][] = new BigInteger($this->_string_shift($key, $length), 256);
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['exponents'] = array(1 => new BigInteger($this->_string_shift($key, $length), 256));
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['exponents'][] = new BigInteger($this->_string_shift($key, $length), 256);
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['coefficients'] = array(2 => new BigInteger($this->_string_shift($key, $length), 256));
+
+ if (!empty($key)) {
+ if (ord($this->_string_shift($key)) != self::ASN1_SEQUENCE) {
+ return false;
+ }
+ $this->_decodeLength($key);
+ while (!empty($key)) {
+ if (ord($this->_string_shift($key)) != self::ASN1_SEQUENCE) {
+ return false;
+ }
+ $this->_decodeLength($key);
+ $key = substr($key, 1);
+ $length = $this->_decodeLength($key);
+ $components['primes'][] = new BigInteger($this->_string_shift($key, $length), 256);
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['exponents'][] = new BigInteger($this->_string_shift($key, $length), 256);
+ $this->_string_shift($key);
+ $length = $this->_decodeLength($key);
+ $components['coefficients'][] = new BigInteger($this->_string_shift($key, $length), 256);
+ }
+ }
+
+ return $components;
+ case self::PUBLIC_FORMAT_OPENSSH:
+ $parts = explode(' ', $key, 3);
+
+ $key = isset($parts[1]) ? base64_decode($parts[1]) : false;
+ if ($key === false) {
+ return false;
+ }
+
+ $comment = isset($parts[2]) ? $parts[2] : false;
+
+ $cleanup = substr($key, 0, 11) == "\0\0\0\7ssh-rsa";
+
+ if (strlen($key) <= 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($key, 4)));
+ $publicExponent = new BigInteger($this->_string_shift($key, $length), -256);
+ if (strlen($key) <= 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($key, 4)));
+ $modulus = new BigInteger($this->_string_shift($key, $length), -256);
+
+ if ($cleanup && strlen($key)) {
+ if (strlen($key) <= 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($key, 4)));
+ $realModulus = new BigInteger($this->_string_shift($key, $length), -256);
+ return strlen($key) ? false : array(
+ 'modulus' => $realModulus,
+ 'publicExponent' => $modulus,
+ 'comment' => $comment
+ );
+ } else {
+ return strlen($key) ? false : array(
+ 'modulus' => $modulus,
+ 'publicExponent' => $publicExponent,
+ 'comment' => $comment
+ );
+ }
+ // http://www.w3.org/TR/xmldsig-core/#sec-RSAKeyValue
+ // http://en.wikipedia.org/wiki/XML_Signature
+ case self::PRIVATE_FORMAT_XML:
+ case self::PUBLIC_FORMAT_XML:
+ $this->components = array();
+
+ $xml = xml_parser_create('UTF-8');
+ xml_set_object($xml, $this);
+ xml_set_element_handler($xml, '_start_element_handler', '_stop_element_handler');
+ xml_set_character_data_handler($xml, '_data_handler');
+ // add <xml></xml> to account for "dangling" tags like <BitStrength>...</BitStrength> that are sometimes added
+ if (!xml_parse($xml, '<xml>' . $key . '</xml>')) {
+ xml_parser_free($xml);
+ unset($xml);
+ return false;
+ }
+
+ xml_parser_free($xml);
+ unset($xml);
+
+ return isset($this->components['modulus']) && isset($this->components['publicExponent']) ? $this->components : false;
+ // from PuTTY's SSHPUBK.C
+ case self::PRIVATE_FORMAT_PUTTY:
+ $components = array();
+ $key = preg_split('#\r\n|\r|\n#', $key);
+ $type = trim(preg_replace('#PuTTY-User-Key-File-2: (.+)#', '$1', $key[0]));
+ if ($type != 'ssh-rsa') {
+ return false;
+ }
+ $encryption = trim(preg_replace('#Encryption: (.+)#', '$1', $key[1]));
+ $comment = trim(preg_replace('#Comment: (.+)#', '$1', $key[2]));
+
+ $publicLength = trim(preg_replace('#Public-Lines: (\d+)#', '$1', $key[3]));
+ $public = base64_decode(implode('', array_map('trim', array_slice($key, 4, $publicLength))));
+ $public = substr($public, 11);
+ extract(unpack('Nlength', $this->_string_shift($public, 4)));
+ $components['publicExponent'] = new BigInteger($this->_string_shift($public, $length), -256);
+ extract(unpack('Nlength', $this->_string_shift($public, 4)));
+ $components['modulus'] = new BigInteger($this->_string_shift($public, $length), -256);
+
+ $privateLength = trim(preg_replace('#Private-Lines: (\d+)#', '$1', $key[$publicLength + 4]));
+ $private = base64_decode(implode('', array_map('trim', array_slice($key, $publicLength + 5, $privateLength))));
+
+ switch ($encryption) {
+ case 'aes256-cbc':
+ $symkey = '';
+ $sequence = 0;
+ while (strlen($symkey) < 32) {
+ $temp = pack('Na*', $sequence++, $this->password);
+ $symkey.= pack('H*', sha1($temp));
+ }
+ $symkey = substr($symkey, 0, 32);
+ $crypto = new AES();
+ }
+
+ if ($encryption != 'none') {
+ $crypto->setKey($symkey);
+ $crypto->disablePadding();
+ $private = $crypto->decrypt($private);
+ if ($private === false) {
+ return false;
+ }
+ }
+
+ extract(unpack('Nlength', $this->_string_shift($private, 4)));
+ if (strlen($private) < $length) {
+ return false;
+ }
+ $components['privateExponent'] = new BigInteger($this->_string_shift($private, $length), -256);
+ extract(unpack('Nlength', $this->_string_shift($private, 4)));
+ if (strlen($private) < $length) {
+ return false;
+ }
+ $components['primes'] = array(1 => new BigInteger($this->_string_shift($private, $length), -256));
+ extract(unpack('Nlength', $this->_string_shift($private, 4)));
+ if (strlen($private) < $length) {
+ return false;
+ }
+ $components['primes'][] = new BigInteger($this->_string_shift($private, $length), -256);
+
+ $temp = $components['primes'][1]->subtract($this->one);
+ $components['exponents'] = array(1 => $components['publicExponent']->modInverse($temp));
+ $temp = $components['primes'][2]->subtract($this->one);
+ $components['exponents'][] = $components['publicExponent']->modInverse($temp);
+
+ extract(unpack('Nlength', $this->_string_shift($private, 4)));
+ if (strlen($private) < $length) {
+ return false;
+ }
+ $components['coefficients'] = array(2 => new BigInteger($this->_string_shift($private, $length), -256));
+
+ return $components;
+ case self::PRIVATE_FORMAT_OPENSSH:
+ $components = array();
+ $decoded = $this->_extractBER($key);
+ $magic = $this->_string_shift($decoded, 15);
+ if ($magic !== "openssh-key-v1\0") {
+ return false;
+ }
+ $options = $this->_string_shift($decoded, 24);
+ // \0\0\0\4none = ciphername
+ // \0\0\0\4none = kdfname
+ // \0\0\0\0 = kdfoptions
+ // \0\0\0\1 = numkeys
+ if ($options != "\0\0\0\4none\0\0\0\4none\0\0\0\0\0\0\0\1") {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($decoded, 4)));
+ if (strlen($decoded) < $length) {
+ return false;
+ }
+ $publicKey = $this->_string_shift($decoded, $length);
+ extract(unpack('Nlength', $this->_string_shift($decoded, 4)));
+ if (strlen($decoded) < $length) {
+ return false;
+ }
+ $paddedKey = $this->_string_shift($decoded, $length);
+
+ if ($this->_string_shift($publicKey, 11) !== "\0\0\0\7ssh-rsa") {
+ return false;
+ }
+
+ $checkint1 = $this->_string_shift($paddedKey, 4);
+ $checkint2 = $this->_string_shift($paddedKey, 4);
+ if (strlen($checkint1) != 4 || $checkint1 !== $checkint2) {
+ return false;
+ }
+
+ if ($this->_string_shift($paddedKey, 11) !== "\0\0\0\7ssh-rsa") {
+ return false;
+ }
+
+ $values = array(
+ &$components['modulus'],
+ &$components['publicExponent'],
+ &$components['privateExponent'],
+ &$components['coefficients'][2],
+ &$components['primes'][1],
+ &$components['primes'][2]
+ );
+
+ foreach ($values as &$value) {
+ extract(unpack('Nlength', $this->_string_shift($paddedKey, 4)));
+ if (strlen($paddedKey) < $length) {
+ return false;
+ }
+ $value = new BigInteger($this->_string_shift($paddedKey, $length), -256);
+ }
+
+ extract(unpack('Nlength', $this->_string_shift($paddedKey, 4)));
+ if (strlen($paddedKey) < $length) {
+ return false;
+ }
+ $components['comment'] = $this->_string_shift($decoded, $length);
+
+ $temp = $components['primes'][1]->subtract($this->one);
+ $components['exponents'] = array(1 => $components['publicExponent']->modInverse($temp));
+ $temp = $components['primes'][2]->subtract($this->one);
+ $components['exponents'][] = $components['publicExponent']->modInverse($temp);
+
+ return $components;
}
- return str_pad($x, $xLen, chr(0), STR_PAD_LEFT);
+
+ return false;
}
/**
- * Octet-String-to-Integer primitive
+ * Returns the key size
*
- * See {@link http://tools.ietf.org/html/rfc3447#section-4.2 RFC3447#section-4.2}.
+ * More specifically, this returns the size of the modulo in bits.
*
- * @access private
- * @param string $x
- * @return \phpseclib3\Math\BigInteger
+ * @access public
+ * @return int
*/
- protected function os2ip($x)
+ function getSize()
{
- return new BigInteger($x, 256);
+ return !isset($this->modulus) ? 0 : strlen($this->modulus->toBits());
}
/**
- * EMSA-PKCS1-V1_5-ENCODE
+ * Start Element Handler
*
- * See {@link http://tools.ietf.org/html/rfc3447#section-9.2 RFC3447#section-9.2}.
+ * Called by xml_set_element_handler()
*
* @access private
- * @param string $m
- * @param int $emLen
- * @throws \LengthException if the intended encoded message length is too short
- * @return string
+ * @param resource $parser
+ * @param string $name
+ * @param array $attribs
*/
- protected function emsa_pkcs1_v1_5_encode($m, $emLen)
+ function _start_element_handler($parser, $name, $attribs)
{
- $h = $this->hash->hash($m);
-
- // see http://tools.ietf.org/html/rfc3447#page-43
- switch ($this->hash->getHash()) {
- case 'md2':
- $t = "\x30\x20\x30\x0c\x06\x08\x2a\x86\x48\x86\xf7\x0d\x02\x02\x05\x00\x04\x10";
+ //$name = strtoupper($name);
+ switch ($name) {
+ case 'MODULUS':
+ $this->current = &$this->components['modulus'];
break;
- case 'md5':
- $t = "\x30\x20\x30\x0c\x06\x08\x2a\x86\x48\x86\xf7\x0d\x02\x05\x05\x00\x04\x10";
+ case 'EXPONENT':
+ $this->current = &$this->components['publicExponent'];
break;
- case 'sha1':
- $t = "\x30\x21\x30\x09\x06\x05\x2b\x0e\x03\x02\x1a\x05\x00\x04\x14";
+ case 'P':
+ $this->current = &$this->components['primes'][1];
break;
- case 'sha256':
- $t = "\x30\x31\x30\x0d\x06\x09\x60\x86\x48\x01\x65\x03\x04\x02\x01\x05\x00\x04\x20";
+ case 'Q':
+ $this->current = &$this->components['primes'][2];
break;
- case 'sha384':
- $t = "\x30\x41\x30\x0d\x06\x09\x60\x86\x48\x01\x65\x03\x04\x02\x02\x05\x00\x04\x30";
+ case 'DP':
+ $this->current = &$this->components['exponents'][1];
break;
- case 'sha512':
- $t = "\x30\x51\x30\x0d\x06\x09\x60\x86\x48\x01\x65\x03\x04\x02\x03\x05\x00\x04\x40";
+ case 'DQ':
+ $this->current = &$this->components['exponents'][2];
break;
- // from https://www.emc.com/collateral/white-papers/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp.pdf#page=40
- case 'sha224':
- $t = "\x30\x2d\x30\x0d\x06\x09\x60\x86\x48\x01\x65\x03\x04\x02\x04\x05\x00\x04\x1c";
+ case 'INVERSEQ':
+ $this->current = &$this->components['coefficients'][2];
break;
- case 'sha512/224':
- $t = "\x30\x2d\x30\x0d\x06\x09\x60\x86\x48\x01\x65\x03\x04\x02\x05\x05\x00\x04\x1c";
+ case 'D':
+ $this->current = &$this->components['privateExponent'];
+ }
+ $this->current = '';
+ }
+
+ /**
+ * Stop Element Handler
+ *
+ * Called by xml_set_element_handler()
+ *
+ * @access private
+ * @param resource $parser
+ * @param string $name
+ */
+ function _stop_element_handler($parser, $name)
+ {
+ if (isset($this->current)) {
+ $this->current = new BigInteger(base64_decode($this->current), 256);
+ unset($this->current);
+ }
+ }
+
+ /**
+ * Data Handler
+ *
+ * Called by xml_set_character_data_handler()
+ *
+ * @access private
+ * @param resource $parser
+ * @param string $data
+ */
+ function _data_handler($parser, $data)
+ {
+ if (!isset($this->current) || is_object($this->current)) {
+ return;
+ }
+ $this->current.= trim($data);
+ }
+
+ /**
+ * Loads a public or private key
+ *
+ * Returns true on success and false on failure (ie. an incorrect password was provided or the key was malformed)
+ *
+ * @access public
+ * @param string|RSA|array $key
+ * @param bool|int $type optional
+ * @return bool
+ */
+ function loadKey($key, $type = false)
+ {
+ if ($key instanceof RSA) {
+ $this->privateKeyFormat = $key->privateKeyFormat;
+ $this->publicKeyFormat = $key->publicKeyFormat;
+ $this->k = $key->k;
+ $this->hLen = $key->hLen;
+ $this->sLen = $key->sLen;
+ $this->mgfHLen = $key->mgfHLen;
+ $this->encryptionMode = $key->encryptionMode;
+ $this->signatureMode = $key->signatureMode;
+ $this->password = $key->password;
+ $this->configFile = $key->configFile;
+ $this->comment = $key->comment;
+
+ if (is_object($key->hash)) {
+ $this->hash = new Hash($key->hash->getHash());
+ }
+ if (is_object($key->mgfHash)) {
+ $this->mgfHash = new Hash($key->mgfHash->getHash());
+ }
+
+ if (is_object($key->modulus)) {
+ $this->modulus = $key->modulus->copy();
+ }
+ if (is_object($key->exponent)) {
+ $this->exponent = $key->exponent->copy();
+ }
+ if (is_object($key->publicExponent)) {
+ $this->publicExponent = $key->publicExponent->copy();
+ }
+
+ $this->primes = array();
+ $this->exponents = array();
+ $this->coefficients = array();
+
+ foreach ($this->primes as $prime) {
+ $this->primes[] = $prime->copy();
+ }
+ foreach ($this->exponents as $exponent) {
+ $this->exponents[] = $exponent->copy();
+ }
+ foreach ($this->coefficients as $coefficient) {
+ $this->coefficients[] = $coefficient->copy();
+ }
+
+ return true;
+ }
+
+ if ($type === false) {
+ $types = array(
+ self::PUBLIC_FORMAT_RAW,
+ self::PRIVATE_FORMAT_PKCS1,
+ self::PRIVATE_FORMAT_XML,
+ self::PRIVATE_FORMAT_PUTTY,
+ self::PUBLIC_FORMAT_OPENSSH,
+ self::PRIVATE_FORMAT_OPENSSH
+ );
+ foreach ($types as $type) {
+ $components = $this->_parseKey($key, $type);
+ if ($components !== false) {
+ break;
+ }
+ }
+ } else {
+ $components = $this->_parseKey($key, $type);
+ }
+
+ if ($components === false) {
+ $this->comment = null;
+ $this->modulus = null;
+ $this->k = null;
+ $this->exponent = null;
+ $this->primes = null;
+ $this->exponents = null;
+ $this->coefficients = null;
+ $this->publicExponent = null;
+
+ return false;
+ }
+
+ if (isset($components['comment']) && $components['comment'] !== false) {
+ $this->comment = $components['comment'];
+ }
+ $this->modulus = $components['modulus'];
+ $this->k = strlen($this->modulus->toBytes());
+ $this->exponent = isset($components['privateExponent']) ? $components['privateExponent'] : $components['publicExponent'];
+ if (isset($components['primes'])) {
+ $this->primes = $components['primes'];
+ $this->exponents = $components['exponents'];
+ $this->coefficients = $components['coefficients'];
+ $this->publicExponent = $components['publicExponent'];
+ } else {
+ $this->primes = array();
+ $this->exponents = array();
+ $this->coefficients = array();
+ $this->publicExponent = false;
+ }
+
+ switch ($type) {
+ case self::PUBLIC_FORMAT_OPENSSH:
+ case self::PUBLIC_FORMAT_RAW:
+ $this->setPublicKey();
break;
- case 'sha512/256':
- $t = "\x30\x31\x30\x0d\x06\x09\x60\x86\x48\x01\x65\x03\x04\x02\x06\x05\x00\x04\x20";
+ case self::PRIVATE_FORMAT_PKCS1:
+ switch (true) {
+ case strpos($key, '-BEGIN PUBLIC KEY-') !== false:
+ case strpos($key, '-BEGIN RSA PUBLIC KEY-') !== false:
+ $this->setPublicKey();
+ }
}
- $t.= $h;
- $tLen = strlen($t);
- if ($emLen < $tLen + 11) {
- throw new \LengthException('Intended encoded message length too short');
+ return true;
+ }
+
+ /**
+ * Sets the password
+ *
+ * Private keys can be encrypted with a password. To unset the password, pass in the empty string or false.
+ * Or rather, pass in $password such that empty($password) && !is_string($password) is true.
+ *
+ * @see self::createKey()
+ * @see self::loadKey()
+ * @access public
+ * @param string $password
+ */
+ function setPassword($password = false)
+ {
+ $this->password = $password;
+ }
+
+ /**
+ * Defines the public key
+ *
+ * Some private key formats define the public exponent and some don't. Those that don't define it are problematic when
+ * used in certain contexts. For example, in SSH-2, RSA authentication works by sending the public key along with a
+ * message signed by the private key to the server. The SSH-2 server looks the public key up in an index of public keys
+ * and if it's present then proceeds to verify the signature. Problem is, if your private key doesn't include the public
+ * exponent this won't work unless you manually add the public exponent. phpseclib tries to guess if the key being used
+ * is the public key but in the event that it guesses incorrectly you might still want to explicitly set the key as being
+ * public.
+ *
+ * Do note that when a new key is loaded the index will be cleared.
+ *
+ * Returns true on success, false on failure
+ *
+ * @see self::getPublicKey()
+ * @access public
+ * @param string $key optional
+ * @param int $type optional
+ * @return bool
+ */
+ function setPublicKey($key = false, $type = false)
+ {
+ // if a public key has already been loaded return false
+ if (!empty($this->publicExponent)) {
+ return false;
}
- $ps = str_repeat(chr(0xFF), $emLen - $tLen - 3);
+ if ($key === false && !empty($this->modulus)) {
+ $this->publicExponent = $this->exponent;
+ return true;
+ }
- $em = "\0\1$ps\0$t";
+ if ($type === false) {
+ $types = array(
+ self::PUBLIC_FORMAT_RAW,
+ self::PUBLIC_FORMAT_PKCS1,
+ self::PUBLIC_FORMAT_XML,
+ self::PUBLIC_FORMAT_OPENSSH
+ );
+ foreach ($types as $type) {
+ $components = $this->_parseKey($key, $type);
+ if ($components !== false) {
+ break;
+ }
+ }
+ } else {
+ $components = $this->_parseKey($key, $type);
+ }
- return $em;
+ if ($components === false) {
+ return false;
+ }
+
+ if (empty($this->modulus) || !$this->modulus->equals($components['modulus'])) {
+ $this->modulus = $components['modulus'];
+ $this->exponent = $this->publicExponent = $components['publicExponent'];
+ return true;
+ }
+
+ $this->publicExponent = $components['publicExponent'];
+
+ return true;
}
/**
- * MGF1
+ * Defines the private key
*
- * See {@link http://tools.ietf.org/html/rfc3447#appendix-B.2.1 RFC3447#appendix-B.2.1}.
+ * If phpseclib guessed a private key was a public key and loaded it as such it might be desirable to force
+ * phpseclib to treat the key as a private key. This function will do that.
+ *
+ * Do note that when a new key is loaded the index will be cleared.
+ *
+ * Returns true on success, false on failure
+ *
+ * @see self::getPublicKey()
+ * @access public
+ * @param string $key optional
+ * @param int $type optional
+ * @return bool
+ */
+ function setPrivateKey($key = false, $type = false)
+ {
+ if ($key === false && !empty($this->publicExponent)) {
+ $this->publicExponent = false;
+ return true;
+ }
+
+ $rsa = new RSA();
+ if (!$rsa->loadKey($key, $type)) {
+ return false;
+ }
+ $rsa->publicExponent = false;
+
+ // don't overwrite the old key if the new key is invalid
+ $this->loadKey($rsa);
+ return true;
+ }
+
+ /**
+ * Returns the public key
+ *
+ * The public key is only returned under two circumstances - if the private key had the public key embedded within it
+ * or if the public key was set via setPublicKey(). If the currently loaded key is supposed to be the public key this
+ * function won't return it since this library, for the most part, doesn't distinguish between public and private keys.
+ *
+ * @see self::getPublicKey()
+ * @access public
+ * @param int $type optional
+ */
+ function getPublicKey($type = self::PUBLIC_FORMAT_PKCS8)
+ {
+ if (empty($this->modulus) || empty($this->publicExponent)) {
+ return false;
+ }
+
+ $oldFormat = $this->publicKeyFormat;
+ $this->publicKeyFormat = $type;
+ $temp = $this->_convertPublicKey($this->modulus, $this->publicExponent);
+ $this->publicKeyFormat = $oldFormat;
+ return $temp;
+ }
+
+ /**
+ * Returns the public key's fingerprint
+ *
+ * The public key's fingerprint is returned, which is equivalent to running `ssh-keygen -lf rsa.pub`. If there is
+ * no public key currently loaded, false is returned.
+ * Example output (md5): "c1:b1:30:29:d7:b8:de:6c:97:77:10:d7:46:41:63:87" (as specified by RFC 4716)
+ *
+ * @access public
+ * @param string $algorithm The hashing algorithm to be used. Valid options are 'md5' and 'sha256'. False is returned
+ * for invalid values.
+ * @return mixed
+ */
+ function getPublicKeyFingerprint($algorithm = 'md5')
+ {
+ if (empty($this->modulus) || empty($this->publicExponent)) {
+ return false;
+ }
+
+ $modulus = $this->modulus->toBytes(true);
+ $publicExponent = $this->publicExponent->toBytes(true);
+
+ $RSAPublicKey = pack('Na*Na*Na*', strlen('ssh-rsa'), 'ssh-rsa', strlen($publicExponent), $publicExponent, strlen($modulus), $modulus);
+
+ switch ($algorithm) {
+ case 'sha256':
+ $hash = new Hash('sha256');
+ $base = base64_encode($hash->hash($RSAPublicKey));
+ return substr($base, 0, strlen($base) - 1);
+ case 'md5':
+ return substr(chunk_split(md5($RSAPublicKey), 2, ':'), 0, -1);
+ default:
+ return false;
+ }
+ }
+
+ /**
+ * Returns the private key
+ *
+ * The private key is only returned if the currently loaded key contains the constituent prime numbers.
+ *
+ * @see self::getPublicKey()
+ * @access public
+ * @param int $type optional
+ * @return mixed
+ */
+ function getPrivateKey($type = self::PUBLIC_FORMAT_PKCS1)
+ {
+ if (empty($this->primes)) {
+ return false;
+ }
+
+ $oldFormat = $this->privateKeyFormat;
+ $this->privateKeyFormat = $type;
+ $temp = $this->_convertPrivateKey($this->modulus, $this->publicExponent, $this->exponent, $this->primes, $this->exponents, $this->coefficients);
+ $this->privateKeyFormat = $oldFormat;
+ return $temp;
+ }
+
+ /**
+ * Returns a minimalistic private key
*
+ * Returns the private key without the prime number constituants. Structurally identical to a public key that
+ * hasn't been set as the public key
+ *
+ * @see self::getPrivateKey()
* @access private
- * @param string $mgfSeed
- * @param int $maskLen
+ * @param int $mode optional
+ */
+ function _getPrivatePublicKey($mode = self::PUBLIC_FORMAT_PKCS8)
+ {
+ if (empty($this->modulus) || empty($this->exponent)) {
+ return false;
+ }
+
+ $oldFormat = $this->publicKeyFormat;
+ $this->publicKeyFormat = $mode;
+ $temp = $this->_convertPublicKey($this->modulus, $this->exponent);
+ $this->publicKeyFormat = $oldFormat;
+ return $temp;
+ }
+
+ /**
+ * __toString() magic method
+ *
+ * @access public
* @return string
*/
- protected function mgf1($mgfSeed, $maskLen)
+ function __toString()
{
- // if $maskLen would yield strings larger than 4GB, PKCS#1 suggests a "Mask too long" error be output.
+ $key = $this->getPrivateKey($this->privateKeyFormat);
+ if ($key !== false) {
+ return $key;
+ }
+ $key = $this->_getPrivatePublicKey($this->publicKeyFormat);
+ return $key !== false ? $key : '';
+ }
- $t = '';
- $count = ceil($maskLen / $this->mgfHLen);
- for ($i = 0; $i < $count; $i++) {
- $c = pack('N', $i);
- $t.= $this->mgfHash->hash($mgfSeed . $c);
+ /**
+ * __clone() magic method
+ *
+ * @access public
+ * @return Crypt_RSA
+ */
+ function __clone()
+ {
+ $key = new RSA();
+ $key->loadKey($this);
+ return $key;
+ }
+
+ /**
+ * Generates the smallest and largest numbers requiring $bits bits
+ *
+ * @access private
+ * @param int $bits
+ * @return array
+ */
+ function _generateMinMax($bits)
+ {
+ $bytes = $bits >> 3;
+ $min = str_repeat(chr(0), $bytes);
+ $max = str_repeat(chr(0xFF), $bytes);
+ $msb = $bits & 7;
+ if ($msb) {
+ $min = chr(1 << ($msb - 1)) . $min;
+ $max = chr((1 << $msb) - 1) . $max;
+ } else {
+ $min[0] = chr(0x80);
}
- return substr($t, 0, $maskLen);
+ return array(
+ 'min' => new BigInteger($min, 256),
+ 'max' => new BigInteger($max, 256)
+ );
}
/**
- * Returns the key size
+ * DER-decode the length
*
- * More specifically, this returns the size of the modulo in bits.
+ * DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4. See
+ * {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
*
- * @access public
+ * @access private
+ * @param string $string
* @return int
*/
- public function getLength()
+ function _decodeLength(&$string)
{
- return !isset($this->modulus) ? 0 : $this->modulus->getLength();
+ $length = ord($this->_string_shift($string));
+ if ($length & 0x80) { // definite length, long form
+ $length&= 0x7F;
+ $temp = $this->_string_shift($string, $length);
+ list(, $length) = unpack('N', substr(str_pad($temp, 4, chr(0), STR_PAD_LEFT), -4));
+ }
+ return $length;
+ }
+
+ /**
+ * DER-encode the length
+ *
+ * DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4. See
+ * {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
+ *
+ * @access private
+ * @param int $length
+ * @return string
+ */
+ function _encodeLength($length)
+ {
+ if ($length <= 0x7F) {
+ return chr($length);
+ }
+
+ $temp = ltrim(pack('N', $length), chr(0));
+ return pack('Ca*', 0x80 | strlen($temp), $temp);
+ }
+
+ /**
+ * String Shift
+ *
+ * Inspired by array_shift
+ *
+ * @param string $string
+ * @param int $index
+ * @return string
+ * @access private
+ */
+ function _string_shift(&$string, $index = 1)
+ {
+ $substr = substr($string, 0, $index);
+ $string = substr($string, $index);
+ return $substr;
+ }
+
+ /**
+ * Determines the private key format
+ *
+ * @see self::createKey()
+ * @access public
+ * @param int $format
+ */
+ function setPrivateKeyFormat($format)
+ {
+ $this->privateKeyFormat = $format;
+ }
+
+ /**
+ * Determines the public key format
+ *
+ * @see self::createKey()
+ * @access public
+ * @param int $format
+ */
+ function setPublicKeyFormat($format)
+ {
+ $this->publicKeyFormat = $format;
}
/**
* Determines which hashing function should be used
*
- * Used with signature production / verification and (if the encryption mode is self::PADDING_OAEP) encryption and
- * decryption.
+ * Used with signature production / verification and (if the encryption mode is self::ENCRYPTION_OAEP) encryption and
+ * decryption. If $hash isn't supported, sha1 is used.
*
* @access public
* @param string $hash
*/
- public function withHash($hash)
+ function setHash($hash)
{
- $new = clone $this;
-
- // \phpseclib3\Crypt\Hash supports algorithms that PKCS#1 doesn't support. md5-96 and sha1-96, for example.
- switch (strtolower($hash)) {
+ // \phpseclib\Crypt\Hash supports algorithms that PKCS#1 doesn't support. md5-96 and sha1-96, for example.
+ switch ($hash) {
case 'md2':
case 'md5':
case 'sha1':
case 'sha256':
case 'sha384':
case 'sha512':
- case 'sha224':
- case 'sha512/224':
- case 'sha512/256':
- $new->hash = new Hash($hash);
+ $this->hash = new Hash($hash);
+ $this->hashName = $hash;
break;
default:
- throw new UnsupportedAlgorithmException(
- 'The only supported hash algorithms are: md2, md5, sha1, sha256, sha384, sha512, sha224, sha512/224, sha512/256'
- );
+ $this->hash = new Hash('sha1');
+ $this->hashName = 'sha1';
}
- $new->hLen = $new->hash->getLengthInBytes();
-
- return $new;
+ $this->hLen = $this->hash->getLength();
}
/**
* Determines which hashing function should be used for the mask generation function
*
- * The mask generation function is used by self::PADDING_OAEP and self::PADDING_PSS and although it's
+ * The mask generation function is used by self::ENCRYPTION_OAEP and self::SIGNATURE_PSS and although it's
* best if Hash and MGFHash are set to the same thing this is not a requirement.
*
* @access public
* @param string $hash
*/
- public function withMGFHash($hash)
+ function setMGFHash($hash)
{
- $new = clone $this;
-
- // \phpseclib3\Crypt\Hash supports algorithms that PKCS#1 doesn't support. md5-96 and sha1-96, for example.
- switch (strtolower($hash)) {
+ // \phpseclib\Crypt\Hash supports algorithms that PKCS#1 doesn't support. md5-96 and sha1-96, for example.
+ switch ($hash) {
case 'md2':
case 'md5':
case 'sha1':
case 'sha256':
case 'sha384':
case 'sha512':
- case 'sha224':
- case 'sha512/224':
- case 'sha512/256':
- $new->mgfHash = new Hash($hash);
+ $this->mgfHash = new Hash($hash);
break;
default:
- throw new UnsupportedAlgorithmException(
- 'The only supported hash algorithms are: md2, md5, sha1, sha256, sha384, sha512, sha224, sha512/224, sha512/256'
- );
+ $this->mgfHash = new Hash('sha1');
}
- $new->mgfHLen = $new->mgfHash->getLengthInBytes();
-
- return $new;
+ $this->mgfHLen = $this->mgfHash->getLength();
}
/**
- * Returns the MGF hash algorithm currently being used
+ * Determines the salt length
+ *
+ * To quote from {@link http://tools.ietf.org/html/rfc3447#page-38 RFC3447#page-38}:
+ *
+ * Typical salt lengths in octets are hLen (the length of the output
+ * of the hash function Hash) and 0.
*
* @access public
+ * @param int $sLen
*/
- public function getMGFHash()
+ function setSaltLength($sLen)
{
- return clone $this->mgfHash;
+ $this->sLen = $sLen;
}
/**
- * Determines the salt length
+ * Integer-to-Octet-String primitive
*
- * Used by RSA::PADDING_PSS
+ * See {@link http://tools.ietf.org/html/rfc3447#section-4.1 RFC3447#section-4.1}.
*
- * To quote from {@link http://tools.ietf.org/html/rfc3447#page-38 RFC3447#page-38}:
+ * @access private
+ * @param \phpseclib\Math\BigInteger $x
+ * @param int $xLen
+ * @return string
+ */
+ function _i2osp($x, $xLen)
+ {
+ $x = $x->toBytes();
+ if (strlen($x) > $xLen) {
+ user_error('Integer too large');
+ return false;
+ }
+ return str_pad($x, $xLen, chr(0), STR_PAD_LEFT);
+ }
+
+ /**
+ * Octet-String-to-Integer primitive
*
- * Typical salt lengths in octets are hLen (the length of the output
- * of the hash function Hash) and 0.
+ * See {@link http://tools.ietf.org/html/rfc3447#section-4.2 RFC3447#section-4.2}.
*
- * @access public
- * @param int $sLen
+ * @access private
+ * @param int|string|resource $x
+ * @return \phpseclib\Math\BigInteger
*/
- public function withSaltLength($sLen)
+ function _os2ip($x)
{
- $new = clone $this;
- $new->sLen = $sLen;
- return $new;
+ return new BigInteger($x, 256);
}
/**
- * Returns the salt length currently being used
+ * Exponentiate with or without Chinese Remainder Theorem
*
- * @access public
+ * See {@link http://tools.ietf.org/html/rfc3447#section-5.1.1 RFC3447#section-5.1.2}.
+ *
+ * @access private
+ * @param \phpseclib\Math\BigInteger $x
+ * @return \phpseclib\Math\BigInteger
+ */
+ function _exponentiate($x)
+ {
+ switch (true) {
+ case empty($this->primes):
+ case $this->primes[1]->equals($this->zero):
+ case empty($this->coefficients):
+ case $this->coefficients[2]->equals($this->zero):
+ case empty($this->exponents):
+ case $this->exponents[1]->equals($this->zero):
+ return $x->modPow($this->exponent, $this->modulus);
+ }
+
+ $num_primes = count($this->primes);
+
+ if (defined('CRYPT_RSA_DISABLE_BLINDING')) {
+ $m_i = array(
+ 1 => $x->modPow($this->exponents[1], $this->primes[1]),
+ 2 => $x->modPow($this->exponents[2], $this->primes[2])
+ );
+ $h = $m_i[1]->subtract($m_i[2]);
+ $h = $h->multiply($this->coefficients[2]);
+ list(, $h) = $h->divide($this->primes[1]);
+ $m = $m_i[2]->add($h->multiply($this->primes[2]));
+
+ $r = $this->primes[1];
+ for ($i = 3; $i <= $num_primes; $i++) {
+ $m_i = $x->modPow($this->exponents[$i], $this->primes[$i]);
+
+ $r = $r->multiply($this->primes[$i - 1]);
+
+ $h = $m_i->subtract($m);
+ $h = $h->multiply($this->coefficients[$i]);
+ list(, $h) = $h->divide($this->primes[$i]);
+
+ $m = $m->add($r->multiply($h));
+ }
+ } else {
+ $smallest = $this->primes[1];
+ for ($i = 2; $i <= $num_primes; $i++) {
+ if ($smallest->compare($this->primes[$i]) > 0) {
+ $smallest = $this->primes[$i];
+ }
+ }
+
+ $one = new BigInteger(1);
+
+ $r = $one->random($one, $smallest->subtract($one));
+
+ $m_i = array(
+ 1 => $this->_blind($x, $r, 1),
+ 2 => $this->_blind($x, $r, 2)
+ );
+ $h = $m_i[1]->subtract($m_i[2]);
+ $h = $h->multiply($this->coefficients[2]);
+ list(, $h) = $h->divide($this->primes[1]);
+ $m = $m_i[2]->add($h->multiply($this->primes[2]));
+
+ $r = $this->primes[1];
+ for ($i = 3; $i <= $num_primes; $i++) {
+ $m_i = $this->_blind($x, $r, $i);
+
+ $r = $r->multiply($this->primes[$i - 1]);
+
+ $h = $m_i->subtract($m);
+ $h = $h->multiply($this->coefficients[$i]);
+ list(, $h) = $h->divide($this->primes[$i]);
+
+ $m = $m->add($r->multiply($h));
+ }
+ }
+
+ return $m;
+ }
+
+ /**
+ * Performs RSA Blinding
+ *
+ * Protects against timing attacks by employing RSA Blinding.
+ * Returns $x->modPow($this->exponents[$i], $this->primes[$i])
+ *
+ * @access private
+ * @param \phpseclib\Math\BigInteger $x
+ * @param \phpseclib\Math\BigInteger $r
+ * @param int $i
+ * @return \phpseclib\Math\BigInteger
+ */
+ function _blind($x, $r, $i)
+ {
+ $x = $x->multiply($r->modPow($this->publicExponent, $this->primes[$i]));
+ $x = $x->modPow($this->exponents[$i], $this->primes[$i]);
+
+ $r = $r->modInverse($this->primes[$i]);
+ $x = $x->multiply($r);
+ list(, $x) = $x->divide($this->primes[$i]);
+
+ return $x;
+ }
+
+ /**
+ * Performs blinded RSA equality testing
+ *
+ * Protects against a particular type of timing attack described.
+ *
+ * See {@link http://codahale.com/a-lesson-in-timing-attacks/ A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals)}
+ *
+ * Thanks for the heads up singpolyma!
+ *
+ * @access private
+ * @param string $x
+ * @param string $y
+ * @return bool
+ */
+ function _equals($x, $y)
+ {
+ if (function_exists('hash_equals')) {
+ return hash_equals($x, $y);
+ }
+
+ if (strlen($x) != strlen($y)) {
+ return false;
+ }
+
+ $result = "\0";
+ $x^= $y;
+ for ($i = 0; $i < strlen($x); $i++) {
+ $result|= $x[$i];
+ }
+
+ return $result === "\0";
+ }
+
+ /**
+ * RSAEP
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-5.1.1 RFC3447#section-5.1.1}.
+ *
+ * @access private
+ * @param \phpseclib\Math\BigInteger $m
+ * @return \phpseclib\Math\BigInteger
*/
- public function getSaltLength()
+ function _rsaep($m)
{
- return $this->sLen !== null ? $this->sLen : $this->hLen;
+ if ($m->compare($this->zero) < 0 || $m->compare($this->modulus) > 0) {
+ user_error('Message representative out of range');
+ return false;
+ }
+ return $this->_exponentiate($m);
}
/**
- * Determines the label
+ * RSADP
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-5.1.2 RFC3447#section-5.1.2}.
*
- * Used by RSA::PADDING_OAEP
+ * @access private
+ * @param \phpseclib\Math\BigInteger $c
+ * @return \phpseclib\Math\BigInteger
+ */
+ function _rsadp($c)
+ {
+ if ($c->compare($this->zero) < 0 || $c->compare($this->modulus) > 0) {
+ user_error('Ciphertext representative out of range');
+ return false;
+ }
+ return $this->_exponentiate($c);
+ }
+
+ /**
+ * RSASP1
*
- * To quote from {@link http://tools.ietf.org/html/rfc3447#page-17 RFC3447#page-17}:
+ * See {@link http://tools.ietf.org/html/rfc3447#section-5.2.1 RFC3447#section-5.2.1}.
+ *
+ * @access private
+ * @param \phpseclib\Math\BigInteger $m
+ * @return \phpseclib\Math\BigInteger
+ */
+ function _rsasp1($m)
+ {
+ if ($m->compare($this->zero) < 0 || $m->compare($this->modulus) > 0) {
+ user_error('Message representative out of range');
+ return false;
+ }
+ return $this->_exponentiate($m);
+ }
+
+ /**
+ * RSAVP1
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-5.2.2 RFC3447#section-5.2.2}.
+ *
+ * @access private
+ * @param \phpseclib\Math\BigInteger $s
+ * @return \phpseclib\Math\BigInteger
+ */
+ function _rsavp1($s)
+ {
+ if ($s->compare($this->zero) < 0 || $s->compare($this->modulus) > 0) {
+ user_error('Signature representative out of range');
+ return false;
+ }
+ return $this->_exponentiate($s);
+ }
+
+ /**
+ * MGF1
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#appendix-B.2.1 RFC3447#appendix-B.2.1}.
+ *
+ * @access private
+ * @param string $mgfSeed
+ * @param int $maskLen
+ * @return string
+ */
+ function _mgf1($mgfSeed, $maskLen)
+ {
+ // if $maskLen would yield strings larger than 4GB, PKCS#1 suggests a "Mask too long" error be output.
+
+ $t = '';
+ $count = ceil($maskLen / $this->mgfHLen);
+ for ($i = 0; $i < $count; $i++) {
+ $c = pack('N', $i);
+ $t.= $this->mgfHash->hash($mgfSeed . $c);
+ }
+
+ return substr($t, 0, $maskLen);
+ }
+
+ /**
+ * RSAES-OAEP-ENCRYPT
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-7.1.1 RFC3447#section-7.1.1} and
+ * {http://en.wikipedia.org/wiki/Optimal_Asymmetric_Encryption_Padding OAES}.
+ *
+ * @access private
+ * @param string $m
+ * @param string $l
+ * @return string
+ */
+ function _rsaes_oaep_encrypt($m, $l = '')
+ {
+ $mLen = strlen($m);
+
+ // Length checking
+
+ // if $l is larger than two million terrabytes and you're using sha1, PKCS#1 suggests a "Label too long" error
+ // be output.
+
+ if ($mLen > $this->k - 2 * $this->hLen - 2) {
+ user_error('Message too long');
+ return false;
+ }
+
+ // EME-OAEP encoding
+
+ $lHash = $this->hash->hash($l);
+ $ps = str_repeat(chr(0), $this->k - $mLen - 2 * $this->hLen - 2);
+ $db = $lHash . $ps . chr(1) . $m;
+ $seed = Random::string($this->hLen);
+ $dbMask = $this->_mgf1($seed, $this->k - $this->hLen - 1);
+ $maskedDB = $db ^ $dbMask;
+ $seedMask = $this->_mgf1($maskedDB, $this->hLen);
+ $maskedSeed = $seed ^ $seedMask;
+ $em = chr(0) . $maskedSeed . $maskedDB;
+
+ // RSA encryption
+
+ $m = $this->_os2ip($em);
+ $c = $this->_rsaep($m);
+ $c = $this->_i2osp($c, $this->k);
+
+ // Output the ciphertext C
+
+ return $c;
+ }
+
+ /**
+ * RSAES-OAEP-DECRYPT
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-7.1.2 RFC3447#section-7.1.2}. The fact that the error
+ * messages aren't distinguishable from one another hinders debugging, but, to quote from RFC3447#section-7.1.2:
+ *
+ * Note. Care must be taken to ensure that an opponent cannot
+ * distinguish the different error conditions in Step 3.g, whether by
+ * error message or timing, or, more generally, learn partial
+ * information about the encoded message EM. Otherwise an opponent may
+ * be able to obtain useful information about the decryption of the
+ * ciphertext C, leading to a chosen-ciphertext attack such as the one
+ * observed by Manger [36].
+ *
+ * As for $l... to quote from {@link http://tools.ietf.org/html/rfc3447#page-17 RFC3447#page-17}:
*
* Both the encryption and the decryption operations of RSAES-OAEP take
* the value of a label L as input. In this version of PKCS #1, L is
* the empty string; other uses of the label are outside the scope of
* this document.
*
- * @access public
- * @param string $label
+ * @access private
+ * @param string $c
+ * @param string $l
+ * @return string
*/
- public function withLabel($label)
+ function _rsaes_oaep_decrypt($c, $l = '')
{
- $new = clone $this;
- $new->label = $label;
- return $new;
+ // Length checking
+
+ // if $l is larger than two million terrabytes and you're using sha1, PKCS#1 suggests a "Label too long" error
+ // be output.
+
+ if (strlen($c) != $this->k || $this->k < 2 * $this->hLen + 2) {
+ user_error('Decryption error');
+ return false;
+ }
+
+ // RSA decryption
+
+ $c = $this->_os2ip($c);
+ $m = $this->_rsadp($c);
+ if ($m === false) {
+ user_error('Decryption error');
+ return false;
+ }
+ $em = $this->_i2osp($m, $this->k);
+
+ // EME-OAEP decoding
+
+ $lHash = $this->hash->hash($l);
+ $y = ord($em[0]);
+ $maskedSeed = substr($em, 1, $this->hLen);
+ $maskedDB = substr($em, $this->hLen + 1);
+ $seedMask = $this->_mgf1($maskedDB, $this->hLen);
+ $seed = $maskedSeed ^ $seedMask;
+ $dbMask = $this->_mgf1($seed, $this->k - $this->hLen - 1);
+ $db = $maskedDB ^ $dbMask;
+ $lHash2 = substr($db, 0, $this->hLen);
+ $m = substr($db, $this->hLen);
+ $hashesMatch = $this->_equals($lHash, $lHash2);
+ $leadingZeros = 1;
+ $patternMatch = 0;
+ $offset = 0;
+ for ($i = 0; $i < strlen($m); $i++) {
+ $patternMatch|= $leadingZeros & ($m[$i] === "\1");
+ $leadingZeros&= $m[$i] === "\0";
+ $offset+= $patternMatch ? 0 : 1;
+ }
+
+ // we do & instead of && to avoid https://en.wikipedia.org/wiki/Short-circuit_evaluation
+ // to protect against timing attacks
+ if (!$hashesMatch & !$patternMatch) {
+ user_error('Decryption error');
+ return false;
+ }
+
+ // Output the message M
+
+ return substr($m, $offset + 1);
}
/**
- * Returns the label currently being used
+ * Raw Encryption / Decryption
*
- * @access public
+ * Doesn't use padding and is not recommended.
+ *
+ * @access private
+ * @param string $m
+ * @return string
*/
- public function getLabel()
+ function _raw_encrypt($m)
{
- return $this->label;
+ $temp = $this->_os2ip($m);
+ $temp = $this->_rsaep($temp);
+ return $this->_i2osp($temp, $this->k);
}
/**
- * Determines the padding modes
+ * RSAES-PKCS1-V1_5-ENCRYPT
*
- * Example: $key->withPadding(RSA::ENCRYPTION_PKCS1 | RSA::SIGNATURE_PKCS1);
+ * See {@link http://tools.ietf.org/html/rfc3447#section-7.2.1 RFC3447#section-7.2.1}.
*
- * @access public
- * @param int $padding
- */
- public function withPadding($padding)
- {
- $masks = [
- self::ENCRYPTION_OAEP,
- self::ENCRYPTION_PKCS1,
- self::ENCRYPTION_NONE
- ];
- $numSelected = 0;
- $selected = 0;
- foreach ($masks as $mask) {
- if ($padding & $mask) {
- $selected = $mask;
- $numSelected++;
- }
+ * @access private
+ * @param string $m
+ * @return string
+ */
+ function _rsaes_pkcs1_v1_5_encrypt($m)
+ {
+ $mLen = strlen($m);
+
+ // Length checking
+
+ if ($mLen > $this->k - 11) {
+ user_error('Message too long');
+ return false;
}
- if ($numSelected > 1) {
- throw new InconsistentSetupException('Multiple encryption padding modes have been selected; at most only one should be selected');
- }
- $encryptionPadding = $selected;
-
- $masks = [
- self::SIGNATURE_PSS,
- self::SIGNATURE_RELAXED_PKCS1,
- self::SIGNATURE_PKCS1
- ];
- $numSelected = 0;
- $selected = 0;
- foreach ($masks as $mask) {
- if ($padding & $mask) {
- $selected = $mask;
- $numSelected++;
- }
+
+ // EME-PKCS1-v1_5 encoding
+
+ $psLen = $this->k - $mLen - 3;
+ $ps = '';
+ while (strlen($ps) != $psLen) {
+ $temp = Random::string($psLen - strlen($ps));
+ $temp = str_replace("\x00", '', $temp);
+ $ps.= $temp;
}
- if ($numSelected > 1) {
- throw new InconsistentSetupException('Multiple signature padding modes have been selected; at most only one should be selected');
+ $type = 2;
+ // see the comments of _rsaes_pkcs1_v1_5_decrypt() to understand why this is being done
+ if (defined('CRYPT_RSA_PKCS15_COMPAT') && (!isset($this->publicExponent) || $this->exponent !== $this->publicExponent)) {
+ $type = 1;
+ // "The padding string PS shall consist of k-3-||D|| octets. ... for block type 01, they shall have value FF"
+ $ps = str_repeat("\xFF", $psLen);
}
- $signaturePadding = $selected;
+ $em = chr(0) . chr($type) . $ps . chr(0) . $m;
+
+ // RSA encryption
+ $m = $this->_os2ip($em);
+ $c = $this->_rsaep($m);
+ $c = $this->_i2osp($c, $this->k);
- $new = clone $this;
- $new->encryptionPadding = $encryptionPadding;
- $new->signaturePadding = $signaturePadding;
- return $new;
+ // Output the ciphertext C
+
+ return $c;
}
/**
- * Returns the padding currently being used
+ * RSAES-PKCS1-V1_5-DECRYPT
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-7.2.2 RFC3447#section-7.2.2}.
*
+ * For compatibility purposes, this function departs slightly from the description given in RFC3447.
+ * The reason being that RFC2313#section-8.1 (PKCS#1 v1.5) states that ciphertext's encrypted by the
+ * private key should have the second byte set to either 0 or 1 and that ciphertext's encrypted by the
+ * public key should have the second byte set to 2. In RFC3447 (PKCS#1 v2.1), the second byte is supposed
+ * to be 2 regardless of which key is used. For compatibility purposes, we'll just check to make sure the
+ * second byte is 2 or less. If it is, we'll accept the decrypted string as valid.
+ *
+ * As a consequence of this, a private key encrypted ciphertext produced with \phpseclib\Crypt\RSA may not decrypt
+ * with a strictly PKCS#1 v1.5 compliant RSA implementation. Public key encrypted ciphertext's should but
+ * not private key encrypted ciphertext's.
+ *
+ * @access private
+ * @param string $c
+ * @return string
+ */
+ function _rsaes_pkcs1_v1_5_decrypt($c)
+ {
+ // Length checking
+
+ if (strlen($c) != $this->k) { // or if k < 11
+ user_error('Decryption error');
+ return false;
+ }
+
+ // RSA decryption
+
+ $c = $this->_os2ip($c);
+ $m = $this->_rsadp($c);
+
+ if ($m === false) {
+ user_error('Decryption error');
+ return false;
+ }
+ $em = $this->_i2osp($m, $this->k);
+
+ // EME-PKCS1-v1_5 decoding
+
+ if (ord($em[0]) != 0 || ord($em[1]) > 2) {
+ user_error('Decryption error');
+ return false;
+ }
+
+ $ps = substr($em, 2, strpos($em, chr(0), 2) - 2);
+ $m = substr($em, strlen($ps) + 3);
+
+ if (strlen($ps) < 8) {
+ user_error('Decryption error');
+ return false;
+ }
+
+ // Output M
+
+ return $m;
+ }
+
+ /**
+ * EMSA-PSS-ENCODE
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-9.1.1 RFC3447#section-9.1.1}.
+ *
+ * @access private
+ * @param string $m
+ * @param int $emBits
+ */
+ function _emsa_pss_encode($m, $emBits)
+ {
+ // if $m is larger than two million terrabytes and you're using sha1, PKCS#1 suggests a "Label too long" error
+ // be output.
+
+ $emLen = ($emBits + 1) >> 3; // ie. ceil($emBits / 8)
+ $sLen = $this->sLen !== null ? $this->sLen : $this->hLen;
+
+ $mHash = $this->hash->hash($m);
+ if ($emLen < $this->hLen + $sLen + 2) {
+ user_error('Encoding error');
+ return false;
+ }
+
+ $salt = Random::string($sLen);
+ $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
+ $h = $this->hash->hash($m2);
+ $ps = str_repeat(chr(0), $emLen - $sLen - $this->hLen - 2);
+ $db = $ps . chr(1) . $salt;
+ $dbMask = $this->_mgf1($h, $emLen - $this->hLen - 1);
+ $maskedDB = $db ^ $dbMask;
+ $maskedDB[0] = ~chr(0xFF << ($emBits & 7)) & $maskedDB[0];
+ $em = $maskedDB . $h . chr(0xBC);
+
+ return $em;
+ }
+
+ /**
+ * EMSA-PSS-VERIFY
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-9.1.2 RFC3447#section-9.1.2}.
+ *
+ * @access private
+ * @param string $m
+ * @param string $em
+ * @param int $emBits
+ * @return string
+ */
+ function _emsa_pss_verify($m, $em, $emBits)
+ {
+ // if $m is larger than two million terrabytes and you're using sha1, PKCS#1 suggests a "Label too long" error
+ // be output.
+
+ $emLen = ($emBits + 7) >> 3; // ie. ceil($emBits / 8);
+ $sLen = $this->sLen !== null ? $this->sLen : $this->hLen;
+
+ $mHash = $this->hash->hash($m);
+ if ($emLen < $this->hLen + $sLen + 2) {
+ return false;
+ }
+
+ if ($em[strlen($em) - 1] != chr(0xBC)) {
+ return false;
+ }
+
+ $maskedDB = substr($em, 0, -$this->hLen - 1);
+ $h = substr($em, -$this->hLen - 1, $this->hLen);
+ $temp = chr(0xFF << ($emBits & 7));
+ if ((~$maskedDB[0] & $temp) != $temp) {
+ return false;
+ }
+ $dbMask = $this->_mgf1($h, $emLen - $this->hLen - 1);
+ $db = $maskedDB ^ $dbMask;
+ $db[0] = ~chr(0xFF << ($emBits & 7)) & $db[0];
+ $temp = $emLen - $this->hLen - $sLen - 2;
+ if (substr($db, 0, $temp) != str_repeat(chr(0), $temp) || ord($db[$temp]) != 1) {
+ return false;
+ }
+ $salt = substr($db, $temp + 1); // should be $sLen long
+ $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
+ $h2 = $this->hash->hash($m2);
+ return $this->_equals($h, $h2);
+ }
+
+ /**
+ * RSASSA-PSS-SIGN
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-8.1.1 RFC3447#section-8.1.1}.
+ *
+ * @access private
+ * @param string $m
+ * @return string
+ */
+ function _rsassa_pss_sign($m)
+ {
+ // EMSA-PSS encoding
+
+ $em = $this->_emsa_pss_encode($m, 8 * $this->k - 1);
+
+ // RSA signature
+
+ $m = $this->_os2ip($em);
+ $s = $this->_rsasp1($m);
+ $s = $this->_i2osp($s, $this->k);
+
+ // Output the signature S
+
+ return $s;
+ }
+
+ /**
+ * RSASSA-PSS-VERIFY
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-8.1.2 RFC3447#section-8.1.2}.
+ *
+ * @access private
+ * @param string $m
+ * @param string $s
+ * @return string
+ */
+ function _rsassa_pss_verify($m, $s)
+ {
+ // Length checking
+
+ if (strlen($s) != $this->k) {
+ user_error('Invalid signature');
+ return false;
+ }
+
+ // RSA verification
+
+ $modBits = strlen($this->modulus->toBits());
+
+ $s2 = $this->_os2ip($s);
+ $m2 = $this->_rsavp1($s2);
+ if ($m2 === false) {
+ user_error('Invalid signature');
+ return false;
+ }
+ $em = $this->_i2osp($m2, $this->k);
+ if ($em === false) {
+ user_error('Invalid signature');
+ return false;
+ }
+
+ // EMSA-PSS verification
+
+ return $this->_emsa_pss_verify($m, $em, $modBits - 1);
+ }
+
+ /**
+ * EMSA-PKCS1-V1_5-ENCODE
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-9.2 RFC3447#section-9.2}.
+ *
+ * @access private
+ * @param string $m
+ * @param int $emLen
+ * @return string
+ */
+ function _emsa_pkcs1_v1_5_encode($m, $emLen)
+ {
+ $h = $this->hash->hash($m);
+ if ($h === false) {
+ return false;
+ }
+
+ // see http://tools.ietf.org/html/rfc3447#page-43
+ switch ($this->hashName) {
+ case 'md2':
+ $t = pack('H*', '3020300c06082a864886f70d020205000410');
+ break;
+ case 'md5':
+ $t = pack('H*', '3020300c06082a864886f70d020505000410');
+ break;
+ case 'sha1':
+ $t = pack('H*', '3021300906052b0e03021a05000414');
+ break;
+ case 'sha256':
+ $t = pack('H*', '3031300d060960864801650304020105000420');
+ break;
+ case 'sha384':
+ $t = pack('H*', '3041300d060960864801650304020205000430');
+ break;
+ case 'sha512':
+ $t = pack('H*', '3051300d060960864801650304020305000440');
+ }
+ $t.= $h;
+ $tLen = strlen($t);
+
+ if ($emLen < $tLen + 11) {
+ user_error('Intended encoded message length too short');
+ return false;
+ }
+
+ $ps = str_repeat(chr(0xFF), $emLen - $tLen - 3);
+
+ $em = "\0\1$ps\0$t";
+
+ return $em;
+ }
+
+ /**
+ * RSASSA-PKCS1-V1_5-SIGN
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-8.2.1 RFC3447#section-8.2.1}.
+ *
+ * @access private
+ * @param string $m
+ * @return string
+ */
+ function _rsassa_pkcs1_v1_5_sign($m)
+ {
+ // EMSA-PKCS1-v1_5 encoding
+
+ $em = $this->_emsa_pkcs1_v1_5_encode($m, $this->k);
+ if ($em === false) {
+ user_error('RSA modulus too short');
+ return false;
+ }
+
+ // RSA signature
+
+ $m = $this->_os2ip($em);
+ $s = $this->_rsasp1($m);
+ $s = $this->_i2osp($s, $this->k);
+
+ // Output the signature S
+
+ return $s;
+ }
+
+ /**
+ * RSASSA-PKCS1-V1_5-VERIFY
+ *
+ * See {@link http://tools.ietf.org/html/rfc3447#section-8.2.2 RFC3447#section-8.2.2}.
+ *
+ * @access private
+ * @param string $m
+ * @param string $s
+ * @return string
+ */
+ function _rsassa_pkcs1_v1_5_verify($m, $s)
+ {
+ // Length checking
+
+ if (strlen($s) != $this->k) {
+ user_error('Invalid signature');
+ return false;
+ }
+
+ // RSA verification
+
+ $s = $this->_os2ip($s);
+ $m2 = $this->_rsavp1($s);
+ if ($m2 === false) {
+ user_error('Invalid signature');
+ return false;
+ }
+ $em = $this->_i2osp($m2, $this->k);
+ if ($em === false) {
+ user_error('Invalid signature');
+ return false;
+ }
+
+ // EMSA-PKCS1-v1_5 encoding
+
+ $em2 = $this->_emsa_pkcs1_v1_5_encode($m, $this->k);
+ if ($em2 === false) {
+ user_error('RSA modulus too short');
+ return false;
+ }
+
+ // Compare
+ return $this->_equals($em, $em2);
+ }
+
+ /**
+ * Set Encryption Mode
+ *
+ * Valid values include self::ENCRYPTION_OAEP and self::ENCRYPTION_PKCS1.
+ *
+ * @access public
+ * @param int $mode
+ */
+ function setEncryptionMode($mode)
+ {
+ $this->encryptionMode = $mode;
+ }
+
+ /**
+ * Set Signature Mode
+ *
+ * Valid values include self::SIGNATURE_PSS and self::SIGNATURE_PKCS1
+ *
+ * @access public
+ * @param int $mode
+ */
+ function setSignatureMode($mode)
+ {
+ $this->signatureMode = $mode;
+ }
+
+ /**
+ * Set public key comment.
+ *
+ * @access public
+ * @param string $comment
+ */
+ function setComment($comment)
+ {
+ $this->comment = $comment;
+ }
+
+ /**
+ * Get public key comment.
+ *
+ * @access public
+ * @return string
+ */
+ function getComment()
+ {
+ return $this->comment;
+ }
+
+ /**
+ * Encryption
+ *
+ * Both self::ENCRYPTION_OAEP and self::ENCRYPTION_PKCS1 both place limits on how long $plaintext can be.
+ * If $plaintext exceeds those limits it will be broken up so that it does and the resultant ciphertext's will
+ * be concatenated together.
+ *
+ * @see self::decrypt()
* @access public
+ * @param string $plaintext
+ * @return string
*/
- public function getPadding()
+ function encrypt($plaintext)
{
- return $this->signaturePadding | $this->encryptionPadding;
+ switch ($this->encryptionMode) {
+ case self::ENCRYPTION_NONE:
+ $plaintext = str_split($plaintext, $this->k);
+ $ciphertext = '';
+ foreach ($plaintext as $m) {
+ $ciphertext.= $this->_raw_encrypt($m);
+ }
+ return $ciphertext;
+ case self::ENCRYPTION_PKCS1:
+ $length = $this->k - 11;
+ if ($length <= 0) {
+ return false;
+ }
+
+ $plaintext = str_split($plaintext, $length);
+ $ciphertext = '';
+ foreach ($plaintext as $m) {
+ $ciphertext.= $this->_rsaes_pkcs1_v1_5_encrypt($m);
+ }
+ return $ciphertext;
+ //case self::ENCRYPTION_OAEP:
+ default:
+ $length = $this->k - 2 * $this->hLen - 2;
+ if ($length <= 0) {
+ return false;
+ }
+
+ $plaintext = str_split($plaintext, $length);
+ $ciphertext = '';
+ foreach ($plaintext as $m) {
+ $ciphertext.= $this->_rsaes_oaep_encrypt($m);
+ }
+ return $ciphertext;
+ }
}
/**
- * Returns the current engine being used
+ * Decryption
*
- * @see self::useInternalEngine()
- * @see self::useBestEngine()
+ * @see self::encrypt()
* @access public
+ * @param string $ciphertext
* @return string
*/
- public function getEngine()
+ function decrypt($ciphertext)
{
- return 'PHP';
+ if ($this->k <= 0) {
+ return false;
+ }
+
+ $ciphertext = str_split($ciphertext, $this->k);
+ $ciphertext[count($ciphertext) - 1] = str_pad($ciphertext[count($ciphertext) - 1], $this->k, chr(0), STR_PAD_LEFT);
+
+ $plaintext = '';
+
+ switch ($this->encryptionMode) {
+ case self::ENCRYPTION_NONE:
+ $decrypt = '_raw_encrypt';
+ break;
+ case self::ENCRYPTION_PKCS1:
+ $decrypt = '_rsaes_pkcs1_v1_5_decrypt';
+ break;
+ //case self::ENCRYPTION_OAEP:
+ default:
+ $decrypt = '_rsaes_oaep_decrypt';
+ }
+
+ foreach ($ciphertext as $c) {
+ $temp = $this->$decrypt($c);
+ if ($temp === false) {
+ return false;
+ }
+ $plaintext.= $temp;
+ }
+
+ return $plaintext;
}
/**
- * Enable RSA Blinding
+ * Create a signature
*
+ * @see self::verify()
* @access public
+ * @param string $message
+ * @return string
*/
- public static function enableBlinding()
+ function sign($message)
{
- static::$enableBlinding = true;
+ if (empty($this->modulus) || empty($this->exponent)) {
+ return false;
+ }
+
+ switch ($this->signatureMode) {
+ case self::SIGNATURE_PKCS1:
+ return $this->_rsassa_pkcs1_v1_5_sign($message);
+ //case self::SIGNATURE_PSS:
+ default:
+ return $this->_rsassa_pss_sign($message);
+ }
}
/**
- * Disable RSA Blinding
+ * Verifies a signature
*
+ * @see self::sign()
* @access public
+ * @param string $message
+ * @param string $signature
+ * @return bool
+ */
+ function verify($message, $signature)
+ {
+ if (empty($this->modulus) || empty($this->exponent)) {
+ return false;
+ }
+
+ switch ($this->signatureMode) {
+ case self::SIGNATURE_PKCS1:
+ return $this->_rsassa_pkcs1_v1_5_verify($message, $signature);
+ //case self::SIGNATURE_PSS:
+ default:
+ return $this->_rsassa_pss_verify($message, $signature);
+ }
+ }
+
+ /**
+ * Extract raw BER from Base64 encoding
+ *
+ * @access private
+ * @param string $str
+ * @return string
*/
- public static function disableBlinding()
+ function _extractBER($str)
{
- static::$enableBlinding = false;
+ /* X.509 certs are assumed to be base64 encoded but sometimes they'll have additional things in them
+ * above and beyond the ceritificate.
+ * ie. some may have the following preceding the -----BEGIN CERTIFICATE----- line:
+ *
+ * Bag Attributes
+ * localKeyID: 01 00 00 00
+ * subject=/O=organization/OU=org unit/CN=common name
+ * issuer=/O=organization/CN=common name
+ */
+ $temp = preg_replace('#.*?^-+[^-]+-+[\r\n ]*$#ms', '', $str, 1);
+ // remove the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- stuff
+ $temp = preg_replace('#-+[^-]+-+#', '', $temp);
+ // remove new lines
+ $temp = str_replace(array("\r", "\n", ' '), '', $temp);
+ $temp = preg_match('#^[a-zA-Z\d/+]*={0,2}$#', $temp) ? base64_decode($temp) : false;
+ return $temp != false ? $temp : $str;
}
-} \ No newline at end of file
+}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/MSBLOB.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/MSBLOB.php
deleted file mode 100644
index 74771204d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/MSBLOB.php
+++ /dev/null
@@ -1,242 +0,0 @@
-<?php
-
-/**
- * Miccrosoft BLOB Formatted RSA Key Handler
- *
- * More info:
- *
- * https://msdn.microsoft.com/en-us/library/windows/desktop/aa375601(v=vs.85).aspx
- *
- * PHP version 5
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Exception\UnsupportedFormatException;
-
-/**
- * Microsoft BLOB Formatted RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class MSBLOB
-{
- /**
- * Public/Private Key Pair
- *
- * @access private
- */
- const PRIVATEKEYBLOB = 0x7;
- /**
- * Public Key
- *
- * @access private
- */
- const PUBLICKEYBLOB = 0x6;
- /**
- * Public Key
- *
- * @access private
- */
- const PUBLICKEYBLOBEX = 0xA;
- /**
- * RSA public key exchange algorithm
- *
- * @access private
- */
- const CALG_RSA_KEYX = 0x0000A400;
- /**
- * RSA public key exchange algorithm
- *
- * @access private
- */
- const CALG_RSA_SIGN = 0x00002400;
- /**
- * Public Key
- *
- * @access private
- */
- const RSA1 = 0x31415352;
- /**
- * Private Key
- *
- * @access private
- */
- const RSA2 = 0x32415352;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- $key = Base64::decode($key);
-
- if (!is_string($key)) {
- throw new \UnexpectedValueException('Base64 decoding produced an error');
- }
- if (strlen($key) < 20) {
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
-
- // PUBLICKEYSTRUC publickeystruc
- // https://msdn.microsoft.com/en-us/library/windows/desktop/aa387453(v=vs.85).aspx
- extract(unpack('atype/aversion/vreserved/Valgo', Strings::shift($key, 8)));
- /**
- * @var string $type
- * @var string $version
- * @var integer $reserved
- * @var integer $algo
- */
- switch (ord($type)) {
- case self::PUBLICKEYBLOB:
- case self::PUBLICKEYBLOBEX:
- $publickey = true;
- break;
- case self::PRIVATEKEYBLOB:
- $publickey = false;
- break;
- default:
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
-
- $components = ['isPublicKey' => $publickey];
-
- // https://msdn.microsoft.com/en-us/library/windows/desktop/aa375549(v=vs.85).aspx
- switch ($algo) {
- case self::CALG_RSA_KEYX:
- case self::CALG_RSA_SIGN:
- break;
- default:
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
-
- // RSAPUBKEY rsapubkey
- // https://msdn.microsoft.com/en-us/library/windows/desktop/aa387685(v=vs.85).aspx
- // could do V for pubexp but that's unsigned 32-bit whereas some PHP installs only do signed 32-bit
- extract(unpack('Vmagic/Vbitlen/a4pubexp', Strings::shift($key, 12)));
- /**
- * @var integer $magic
- * @var integer $bitlen
- * @var string $pubexp
- */
- switch ($magic) {
- case self::RSA2:
- $components['isPublicKey'] = false;
- case self::RSA1:
- break;
- default:
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
-
- $baseLength = $bitlen / 16;
- if (strlen($key) != 2 * $baseLength && strlen($key) != 9 * $baseLength) {
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
-
- $components[$components['isPublicKey'] ? 'publicExponent' : 'privateExponent'] = new BigInteger(strrev($pubexp), 256);
- // BYTE modulus[rsapubkey.bitlen/8]
- $components['modulus'] = new BigInteger(strrev(Strings::shift($key, $bitlen / 8)), 256);
-
- if ($publickey) {
- return $components;
- }
-
- $components['isPublicKey'] = false;
-
- // BYTE prime1[rsapubkey.bitlen/16]
- $components['primes'] = [1 => new BigInteger(strrev(Strings::shift($key, $bitlen / 16)), 256)];
- // BYTE prime2[rsapubkey.bitlen/16]
- $components['primes'][] = new BigInteger(strrev(Strings::shift($key, $bitlen / 16)), 256);
- // BYTE exponent1[rsapubkey.bitlen/16]
- $components['exponents'] = [1 => new BigInteger(strrev(Strings::shift($key, $bitlen / 16)), 256)];
- // BYTE exponent2[rsapubkey.bitlen/16]
- $components['exponents'][] = new BigInteger(strrev(Strings::shift($key, $bitlen / 16)), 256);
- // BYTE coefficient[rsapubkey.bitlen/16]
- $components['coefficients'] = [2 => new BigInteger(strrev(Strings::shift($key, $bitlen / 16)), 256)];
- if (isset($components['privateExponent'])) {
- $components['publicExponent'] = $components['privateExponent'];
- }
- // BYTE privateExponent[rsapubkey.bitlen/8]
- $components['privateExponent'] = new BigInteger(strrev(Strings::shift($key, $bitlen / 8)), 256);
-
- return $components;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param \phpseclib3\Math\BigInteger $d
- * @param array $primes
- * @param array $exponents
- * @param array $coefficients
- * @param string $password optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $n, BigInteger $e, BigInteger $d, array $primes, array $exponents, array $coefficients, $password = '')
- {
- if (count($primes) != 2) {
- throw new \InvalidArgumentException('MSBLOB does not support multi-prime RSA keys');
- }
-
- if (!empty($password) && is_string($password)) {
- throw new UnsupportedFormatException('MSBLOB private keys do not support encryption');
- }
-
- $n = strrev($n->toBytes());
- $e = str_pad(strrev($e->toBytes()), 4, "\0");
- $key = pack('aavV', chr(self::PRIVATEKEYBLOB), chr(2), 0, self::CALG_RSA_KEYX);
- $key.= pack('VVa*', self::RSA2, 8 * strlen($n), $e);
- $key.= $n;
- $key.= strrev($primes[1]->toBytes());
- $key.= strrev($primes[2]->toBytes());
- $key.= strrev($exponents[1]->toBytes());
- $key.= strrev($exponents[2]->toBytes());
- $key.= strrev($coefficients[2]->toBytes());
- $key.= strrev($d->toBytes());
-
- return Base64::encode($key);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @return string
- */
- public static function savePublicKey(BigInteger $n, BigInteger $e)
- {
- $n = strrev($n->toBytes());
- $e = str_pad(strrev($e->toBytes()), 4, "\0");
- $key = pack('aavV', chr(self::PUBLICKEYBLOB), chr(2), 0, self::CALG_RSA_KEYX);
- $key.= pack('VVa*', self::RSA1, 8 * strlen($n), $e);
- $key.= $n;
-
- return Base64::encode($key);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/OpenSSH.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/OpenSSH.php
deleted file mode 100644
index 0f92c1003..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/OpenSSH.php
+++ /dev/null
@@ -1,140 +0,0 @@
-<?php
-
-/**
- * OpenSSH Formatted RSA Key Handler
- *
- * PHP version 5
- *
- * Place in $HOME/.ssh/authorized_keys
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Common\Formats\Keys\OpenSSH as Progenitor;
-
-/**
- * OpenSSH Formatted RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OpenSSH extends Progenitor
-{
- /**
- * Supported Key Types
- *
- * @var array
- */
- protected static $types = ['ssh-rsa'];
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- static $one;
- if (!isset($one)) {
- $one = new BigInteger(1);
- }
-
- $parsed = parent::load($key, $password);
-
- if (isset($parsed['paddedKey'])) {
- list($type) = Strings::unpackSSH2('s', $parsed['paddedKey']);
- if ($type != $parsed['type']) {
- throw new \RuntimeException("The public and private keys are not of the same type ($type vs $parsed[type])");
- }
-
- $primes = $coefficients = [];
-
- list(
- $modulus,
- $publicExponent,
- $privateExponent,
- $coefficients[2],
- $primes[1],
- $primes[2],
- $comment,
- ) = Strings::unpackSSH2('i6s', $parsed['paddedKey']);
-
- $temp = $primes[1]->subtract($one);
- $exponents = [1 => $publicExponent->modInverse($temp)];
- $temp = $primes[2]->subtract($one);
- $exponents[] = $publicExponent->modInverse($temp);
-
- $isPublicKey = false;
-
- return compact('publicExponent', 'modulus', 'privateExponent', 'primes', 'coefficients', 'exponents', 'comment', 'isPublicKey');
- }
-
- list($publicExponent, $modulus) = Strings::unpackSSH2('ii', $parsed['publicKey']);
-
- return [
- 'isPublicKey' => true,
- 'modulus' => $modulus,
- 'publicExponent' => $publicExponent,
- 'comment' => $parsed['comment']
- ];
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BigInteger $n, BigInteger $e, array $options = [])
- {
- $RSAPublicKey = Strings::packSSH2('sii', 'ssh-rsa', $e, $n);
-
- if (isset($options['binary']) ? $options['binary'] : self::$binary) {
- return $RSAPublicKey;
- }
-
- $comment = isset($options['comment']) ? $options['comment'] : self::$comment;
- $RSAPublicKey = 'ssh-rsa ' . base64_encode($RSAPublicKey) . ' ' . $comment;
-
- return $RSAPublicKey;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param \phpseclib3\Math\BigInteger $d
- * @param array $primes
- * @param array $exponents
- * @param array $coefficients
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $n, BigInteger $e, BigInteger $d, array $primes, array $exponents, array $coefficients, $password = '', array $options = [])
- {
- $publicKey = self::savePublicKey($n, $e, ['binary' => true]);
- $privateKey = Strings::packSSH2('si6', 'ssh-rsa', $n, $e, $d, $coefficients[2], $primes[1], $primes[2]);
-
- return self::wrapPrivateKey($publicKey, $privateKey, $password, $options);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS1.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS1.php
deleted file mode 100644
index 5203e4631..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS1.php
+++ /dev/null
@@ -1,167 +0,0 @@
-<?php
-
-/**
- * PKCS#1 Formatted RSA Key Handler
- *
- * PHP version 5
- *
- * Used by File/X509.php
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN RSA PRIVATE KEY-----
- * -----BEGIN RSA PUBLIC KEY-----
- *
- * Analogous to ssh-keygen's pem format (as specified by -m)
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS1 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * PKCS#1 Formatted RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS1 extends Progenitor
-{
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- if (strpos($key, 'PUBLIC') !== false) {
- $components = ['isPublicKey' => true];
- } elseif (strpos($key, 'PRIVATE') !== false) {
- $components = ['isPublicKey' => false];
- } else {
- $components = [];
- }
-
- $key = parent::load($key, $password);
-
- $decoded = ASN1::decodeBER($key);
- if (empty($decoded)) {
- throw new \RuntimeException('Unable to decode BER');
- }
-
- $key = ASN1::asn1map($decoded[0], Maps\RSAPrivateKey::MAP);
- if (is_array($key)) {
- $components+= [
- 'modulus' => $key['modulus'],
- 'publicExponent' => $key['publicExponent'],
- 'privateExponent' => $key['privateExponent'],
- 'primes' => [1 => $key['prime1'], $key['prime2']],
- 'exponents' => [1 => $key['exponent1'], $key['exponent2']],
- 'coefficients' => [2 => $key['coefficient']]
- ];
- if ($key['version'] == 'multi') {
- foreach ($key['otherPrimeInfos'] as $primeInfo) {
- $components['primes'][] = $primeInfo['prime'];
- $components['exponents'][] = $primeInfo['exponent'];
- $components['coefficients'][] = $primeInfo['coefficient'];
- }
- }
- if (!isset($components['isPublicKey'])) {
- $components['isPublicKey'] = false;
- }
- return $components;
- }
-
- $key = ASN1::asn1map($decoded[0], Maps\RSAPublicKey::MAP);
-
- if (!is_array($key)) {
- throw new \RuntimeException('Unable to perform ASN1 mapping');
- }
-
- if (!isset($components['isPublicKey'])) {
- $components['isPublicKey'] = true;
- }
-
- return $components + $key;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param \phpseclib3\Math\BigInteger $d
- * @param array $primes
- * @param array $exponents
- * @param array $coefficients
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $n, BigInteger $e, BigInteger $d, array $primes, array $exponents, array $coefficients, $password = '', array $options = [])
- {
- $num_primes = count($primes);
- $key = [
- 'version' => $num_primes == 2 ? 'two-prime' : 'multi',
- 'modulus' => $n,
- 'publicExponent' => $e,
- 'privateExponent' => $d,
- 'prime1' => $primes[1],
- 'prime2' => $primes[2],
- 'exponent1' => $exponents[1],
- 'exponent2' => $exponents[2],
- 'coefficient' => $coefficients[2]
- ];
- for ($i = 3; $i <= $num_primes; $i++) {
- $key['otherPrimeInfos'][] = [
- 'prime' => $primes[$i],
- 'exponent' => $exponents[$i],
- 'coefficient' => $coefficients[$i]
- ];
- }
-
- $key = ASN1::encodeDER($key, Maps\RSAPrivateKey::MAP);
-
- return self::wrapPrivateKey($key, 'RSA', $password, $options);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @return string
- */
- public static function savePublicKey(BigInteger $n, BigInteger $e)
- {
- $key = [
- 'modulus' => $n,
- 'publicExponent' => $e
- ];
-
- $key = ASN1::encodeDER($key, Maps\RSAPublicKey::MAP);
-
- return self::wrapPublicKey($key, 'RSA');
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS8.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS8.php
deleted file mode 100644
index 8ead2c95b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS8.php
+++ /dev/null
@@ -1,149 +0,0 @@
-<?php
-
-/**
- * PKCS#8 Formatted RSA Key Handler
- *
- * PHP version 5
- *
- * Used by PHP's openssl_public_encrypt() and openssl's rsautl (when -pubin is set)
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN ENCRYPTED PRIVATE KEY-----
- * -----BEGIN PRIVATE KEY-----
- * -----BEGIN PUBLIC KEY-----
- *
- * Analogous to ssh-keygen's pkcs8 format (as specified by -m). Although PKCS8
- * is specific to private keys it's basically creating a DER-encoded wrapper
- * for keys. This just extends that same concept to public keys (much like ssh-keygen)
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * PKCS#8 Formatted RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS8 extends Progenitor
-{
- /**
- * OID Name
- *
- * @var string
- * @access private
- */
- const OID_NAME = 'rsaEncryption';
-
- /**
- * OID Value
- *
- * @var string
- * @access private
- */
- const OID_VALUE = '1.2.840.113549.1.1.1';
-
- /**
- * Child OIDs loaded
- *
- * @var bool
- * @access private
- */
- protected static $childOIDsLoaded = false;
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- if (strpos($key, 'PUBLIC') !== false) {
- $components = ['isPublicKey' => true];
- } elseif (strpos($key, 'PRIVATE') !== false) {
- $components = ['isPublicKey' => false];
- } else {
- $components = [];
- }
-
- $key = parent::load($key, $password);
-
- if (isset($key['privateKey'])) {
- if (!isset($components['isPublicKey'])) {
- $components['isPublicKey'] = false;
- }
- $type = 'private';
- } else {
- if (!isset($components['isPublicKey'])) {
- $components['isPublicKey'] = true;
- }
- $type = 'public';
- }
-
- $result = $components + PKCS1::load($key[$type . 'Key']);
-
- if (isset($key['meta'])) {
- $result['meta'] = $key['meta'];
- }
-
- return $result;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param \phpseclib3\Math\BigInteger $d
- * @param array $primes
- * @param array $exponents
- * @param array $coefficients
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $n, BigInteger $e, BigInteger $d, array $primes, array $exponents, array $coefficients, $password = '', array $options = [])
- {
- $key = PKCS1::savePrivateKey($n, $e, $d, $primes, $exponents, $coefficients);
- $key = ASN1::extractBER($key);
- return self::wrapPrivateKey($key, [], null, $password, $options);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BigInteger $n, BigInteger $e, array $options = [])
- {
- $key = PKCS1::savePublicKey($n, $e);
- $key = ASN1::extractBER($key);
- return self::wrapPublicKey($key, null);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PSS.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PSS.php
deleted file mode 100644
index 813653aef..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PSS.php
+++ /dev/null
@@ -1,250 +0,0 @@
-<?php
-
-/**
- * PKCS#8 Formatted RSA-PSS Key Handler
- *
- * PHP version 5
- *
- * Used by PHP's openssl_public_encrypt() and openssl's rsautl (when -pubin is set)
- *
- * Processes keys with the following headers:
- *
- * -----BEGIN ENCRYPTED PRIVATE KEY-----
- * -----BEGIN PRIVATE KEY-----
- * -----BEGIN PUBLIC KEY-----
- *
- * Analogous to "openssl genpkey -algorithm rsa-pss".
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor;
-use phpseclib3\File\ASN1;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * PKCS#8 Formatted RSA-PSS Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PSS extends Progenitor
-{
- /**
- * OID Name
- *
- * @var string
- * @access private
- */
- const OID_NAME = 'id-RSASSA-PSS';
-
- /**
- * OID Value
- *
- * @var string
- * @access private
- */
- const OID_VALUE = '1.2.840.113549.1.1.10';
-
- /**
- * OIDs loaded
- *
- * @var bool
- * @access private
- */
- private static $oidsLoaded = false;
-
- /**
- * Child OIDs loaded
- *
- * @var bool
- * @access private
- */
- protected static $childOIDsLoaded = false;
-
- /**
- * Initialize static variables
- */
- private static function initialize_static_variables()
- {
- if (!self::$oidsLoaded) {
- ASN1::loadOIDs([
- 'md2' => '1.2.840.113549.2.2',
- 'md4' => '1.2.840.113549.2.4',
- 'md5' => '1.2.840.113549.2.5',
- 'id-sha1' => '1.3.14.3.2.26',
- 'id-sha256' => '2.16.840.1.101.3.4.2.1',
- 'id-sha384' => '2.16.840.1.101.3.4.2.2',
- 'id-sha512' => '2.16.840.1.101.3.4.2.3',
- 'id-sha224' => '2.16.840.1.101.3.4.2.4',
- 'id-sha512/224' => '2.16.840.1.101.3.4.2.5',
- 'id-sha512/256' => '2.16.840.1.101.3.4.2.6',
-
- 'id-mgf1' => '1.2.840.113549.1.1.8'
- ]);
- self::$oidsLoaded = true;
- }
- }
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- self::initialize_static_variables();
-
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- $components = ['isPublicKey' => strpos($key, 'PUBLIC') !== false];
-
- $key = parent::load($key, $password);
-
- $type = isset($key['privateKey']) ? 'private' : 'public';
-
- $result = $components + PKCS1::load($key[$type . 'Key']);
-
- if (isset($key[$type . 'KeyAlgorithm']['parameters'])) {
- $decoded = ASN1::decodeBER($key[$type . 'KeyAlgorithm']['parameters']);
- if ($decoded === false) {
- throw new \UnexpectedValueException('Unable to decode parameters');
- }
- $params = ASN1::asn1map($decoded[0], Maps\RSASSA_PSS_params::MAP);
- } else {
- $params = [];
- }
-
- if (isset($params['maskGenAlgorithm']['parameters'])) {
- $decoded = ASN1::decodeBER($params['maskGenAlgorithm']['parameters']);
- if ($decoded === false) {
- throw new \UnexpectedValueException('Unable to decode parameters');
- }
- $params['maskGenAlgorithm']['parameters'] = ASN1::asn1map($decoded[0], Maps\HashAlgorithm::MAP);
- } else {
- $params['maskGenAlgorithm'] = [
- 'algorithm' => 'id-mgf1',
- 'parameters' => ['algorithm' => 'id-sha1']
- ];
- }
-
- if (!isset($params['hashAlgorithm']['algorithm'])) {
- $params['hashAlgorithm']['algorithm'] = 'id-sha1';
- }
-
- $result['hash'] = str_replace('id-', '', $params['hashAlgorithm']['algorithm']);
- $result['MGFHash'] = str_replace('id-', '', $params['maskGenAlgorithm']['parameters']['algorithm']);
- if (isset($params['saltLength'])) {
- $result['saltLength'] = (int) $params['saltLength']->toString();
- }
-
- if (isset($key['meta'])) {
- $result['meta'] = $key['meta'];
- }
-
- return $result;
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param \phpseclib3\Math\BigInteger $d
- * @param array $primes
- * @param array $exponents
- * @param array $coefficients
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $n, BigInteger $e, BigInteger $d, array $primes, array $exponents, array $coefficients, $password = '', array $options = [])
- {
- self::initialize_static_variables();
-
- $key = PKCS1::savePrivateKey($n, $e, $d, $primes, $exponents, $coefficients);
- $key = ASN1::extractBER($key);
- $params = self::savePSSParams($options);
- return self::wrapPrivateKey($key, [], $params, $password, $options);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param array $options optional
- * @return string
- */
- public static function savePublicKey(BigInteger $n, BigInteger $e, array $options = [])
- {
- self::initialize_static_variables();
-
- $key = PKCS1::savePublicKey($n, $e);
- $key = ASN1::extractBER($key);
- $params = self::savePSSParams($options);
- return self::wrapPublicKey($key, $params);
- }
-
- /**
- * Encodes PSS parameters
- *
- * @access public
- * @param array $options
- * @return string
- */
- public static function savePSSParams(array $options)
- {
- /*
- The trailerField field is an integer. It provides
- compatibility with IEEE Std 1363a-2004 [P1363A]. The value
- MUST be 1, which represents the trailer field with hexadecimal
- value 0xBC. Other trailer fields, including the trailer field
- composed of HashID concatenated with 0xCC that is specified in
- IEEE Std 1363a, are not supported. Implementations that
- perform signature generation MUST omit the trailerField field,
- indicating that the default trailer field value was used.
- Implementations that perform signature validation MUST
- recognize both a present trailerField field with value 1 and an
- absent trailerField field.
-
- source: https://tools.ietf.org/html/rfc4055#page-9
- */
- $params = [
- 'trailerField' => new BigInteger(1)
- ];
- if (isset($options['hash'])) {
- $params['hashAlgorithm']['algorithm'] = 'id-' . $options['hash'];
- }
- if (isset($options['MGFHash'])) {
- $temp = ['algorithm' => 'id-' . $options['MGFHash']];
- $temp = ASN1::encodeDER($temp, Maps\HashAlgorithm::MAP);
- $params['maskGenAlgorithm'] = [
- 'algorithm' => 'id-mgf1',
- 'parameters' => new ASN1\Element($temp)
- ];
- }
- if (isset($options['saltLength'])) {
- $params['saltLength'] = new BigInteger($options['saltLength']);
- }
-
- return new ASN1\Element(ASN1::encodeDER($params, Maps\RSASSA_PSS_params::MAP));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PuTTY.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PuTTY.php
deleted file mode 100644
index 4c93b873d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PuTTY.php
+++ /dev/null
@@ -1,130 +0,0 @@
-<?php
-
-/**
- * PuTTY Formatted RSA Key Handler
- *
- * PHP version 5
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Common\Formats\Keys\PuTTY as Progenitor;
-
-/**
- * PuTTY Formatted RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PuTTY extends Progenitor
-{
- /**
- * Public Handler
- *
- * @var string
- * @access private
- */
- const PUBLIC_HANDLER = 'phpseclib3\Crypt\RSA\Formats\Keys\OpenSSH';
-
- /**
- * Algorithm Identifier
- *
- * @var array
- * @access private
- */
- protected static $types = ['ssh-rsa'];
-
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- static $one;
- if (!isset($one)) {
- $one = new BigInteger(1);
- }
-
- $components = parent::load($key, $password);
- if (!isset($components['private'])) {
- return $components;
- }
- extract($components);
- unset($components['public'], $components['private']);
-
- $isPublicKey = false;
-
- $result = Strings::unpackSSH2('ii', $public);
- if ($result === false) {
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
- list($publicExponent, $modulus) = $result;
-
- $result = Strings::unpackSSH2('iiii', $private);
- if ($result === false) {
- throw new \UnexpectedValueException('Key appears to be malformed');
- }
- $primes = $coefficients = [];
- list($privateExponent, $primes[1], $primes[2], $coefficients[2]) = $result;
-
- $temp = $primes[1]->subtract($one);
- $exponents = [1 => $publicExponent->modInverse($temp)];
- $temp = $primes[2]->subtract($one);
- $exponents[] = $publicExponent->modInverse($temp);
-
- return compact('publicExponent', 'modulus', 'privateExponent', 'primes', 'coefficients', 'exponents', 'comment', 'isPublicKey');
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param \phpseclib3\Math\BigInteger $d
- * @param array $primes
- * @param array $exponents
- * @param array $coefficients
- * @param string $password optional
- * @param array $options optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $n, BigInteger $e, BigInteger $d, array $primes, array $exponents, array $coefficients, $password = '', array $options = [])
- {
- if (count($primes) != 2) {
- throw new \InvalidArgumentException('PuTTY does not support multi-prime RSA keys');
- }
-
- $public = Strings::packSSH2('ii', $e, $n);
- $private = Strings::packSSH2('iiii', $d, $primes[1], $primes[2], $coefficients[2]);
-
- return self::wrapPrivateKey($public, $private, 'ssh-rsa', $password, $options);
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @return string
- */
- public static function savePublicKey(BigInteger $n, BigInteger $e)
- {
- return self::wrapPublicKey(Strings::packSSH2('ii', $e, $n), 'ssh-rsa');
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/Raw.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/Raw.php
deleted file mode 100644
index 49d789285..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/Raw.php
+++ /dev/null
@@ -1,108 +0,0 @@
-<?php
-
-/**
- * Raw RSA Key Handler
- *
- * PHP version 5
- *
- * An array containing two \phpseclib3\Math\BigInteger objects.
- *
- * The exponent can be indexed with any of the following:
- *
- * 0, e, exponent, publicExponent
- *
- * The modulus can be indexed with any of the following:
- *
- * 1, n, modulo, modulus
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA\Formats\Keys;
-
-use phpseclib3\Math\BigInteger;
-
-/**
- * Raw RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Raw
-{
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!is_array($key)) {
- throw new \UnexpectedValueException('Key should be a array - not a ' . gettype($key));
- }
- if (isset($key['isPublicKey']) && isset($key['modulus'])) {
- if (isset($key['privateExponent']) || isset($key['publicExponent'])) {
- if (!isset($key['primes'])) {
- return $key;
- }
- if (isset($key['exponents']) && isset($key['coefficients']) && isset($key['publicExponent']) && isset($key['privateExponent'])) {
- return $key;
- }
- }
- }
- $components = ['isPublicKey' => true];
- switch (true) {
- case isset($key['e']):
- $components['publicExponent'] = $key['e'];
- break;
- case isset($key['exponent']):
- $components['publicExponent'] = $key['exponent'];
- break;
- case isset($key['publicExponent']):
- $components['publicExponent'] = $key['publicExponent'];
- break;
- case isset($key[0]):
- $components['publicExponent'] = $key[0];
- }
- switch (true) {
- case isset($key['n']):
- $components['modulus'] = $key['n'];
- break;
- case isset($key['modulo']):
- $components['modulus'] = $key['modulo'];
- break;
- case isset($key['modulus']):
- $components['modulus'] = $key['modulus'];
- break;
- case isset($key[1]):
- $components['modulus'] = $key[1];
- }
- if (isset($components['modulus']) && isset($components['publicExponent'])) {
- return $components;
- }
-
- throw new \UnexpectedValueException('Modulus / exponent not present');
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @return array
- */
- public static function savePublicKey(BigInteger $n, BigInteger $e)
- {
- return ['e' => clone $e, 'n' => clone $n];
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/XML.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/XML.php
deleted file mode 100644
index 389f93a82..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/XML.php
+++ /dev/null
@@ -1,173 +0,0 @@
-<?php
-
-/**
- * XML Formatted RSA Key Handler
- *
- * More info:
- *
- * http://www.w3.org/TR/xmldsig-core/#sec-RSAKeyValue
- * http://www.w3.org/TR/xkms2/#XKMS_2_0_Paragraph_269
- * http://en.wikipedia.org/wiki/XML_Signature
- * http://en.wikipedia.org/wiki/XKMS
- *
- * PHP version 5
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA\Formats\Keys;
-
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Exception\UnsupportedFormatException;
-
-/**
- * XML Formatted RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class XML
-{
- /**
- * Break a public or private key down into its constituent components
- *
- * @access public
- * @param string $key
- * @param string $password optional
- * @return array
- */
- public static function load($key, $password = '')
- {
- if (!Strings::is_stringable($key)) {
- throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key));
- }
-
- $components = [
- 'isPublicKey' => false,
- 'primes' => [],
- 'exponents' => [],
- 'coefficients' => []
- ];
-
- $use_errors = libxml_use_internal_errors(true);
-
- $dom = new \DOMDocument();
- if (substr($key, 0, 5) != '<?xml') {
- $key = '<xml>' . $key . '</xml>';
- }
- if (!$dom->loadXML($key)) {
- throw new \UnexpectedValueException('Key does not appear to contain XML');
- }
- $xpath = new \DOMXPath($dom);
- $keys = ['modulus', 'exponent', 'p', 'q', 'dp', 'dq', 'inverseq', 'd'];
- foreach ($keys as $key) {
- // $dom->getElementsByTagName($key) is case-sensitive
- $temp = $xpath->query("//*[translate(local-name(), 'ABCDEFGHIJKLMNOPQRSTUVWXYZ','abcdefghijklmnopqrstuvwxyz')='$key']");
- if (!$temp->length) {
- continue;
- }
- $value = new BigInteger(Base64::decode($temp->item(0)->nodeValue), 256);
- switch ($key) {
- case 'modulus':
- $components['modulus'] = $value;
- break;
- case 'exponent':
- $components['publicExponent'] = $value;
- break;
- case 'p':
- $components['primes'][1] = $value;
- break;
- case 'q':
- $components['primes'][2] = $value;
- break;
- case 'dp':
- $components['exponents'][1] = $value;
- break;
- case 'dq':
- $components['exponents'][2] = $value;
- break;
- case 'inverseq':
- $components['coefficients'][2] = $value;
- break;
- case 'd':
- $components['privateExponent'] = $value;
- }
- }
-
- libxml_use_internal_errors($use_errors);
-
- foreach ($components as $key => $value) {
- if (is_array($value) && !count($value)) {
- unset($components[$key]);
- }
- }
-
- if (isset($components['modulus']) && isset($components['publicExponent'])) {
- if (count($components) == 3) {
- $components['isPublicKey'] = true;
- }
- return $components;
- }
-
- throw new \UnexpectedValueException('Modulus / exponent not present');
- }
-
- /**
- * Convert a private key to the appropriate format.
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @param \phpseclib3\Math\BigInteger $d
- * @param array $primes
- * @param array $exponents
- * @param array $coefficients
- * @param string $password optional
- * @return string
- */
- public static function savePrivateKey(BigInteger $n, BigInteger $e, BigInteger $d, array $primes, array $exponents, array $coefficients, $password = '')
- {
- if (count($primes) != 2) {
- throw new \InvalidArgumentException('XML does not support multi-prime RSA keys');
- }
-
- if (!empty($password) && is_string($password)) {
- throw new UnsupportedFormatException('XML private keys do not support encryption');
- }
-
- return "<RSAKeyPair>\r\n" .
- ' <Modulus>' . Base64::encode($n->toBytes()) . "</Modulus>\r\n" .
- ' <Exponent>' . Base64::encode($e->toBytes()) . "</Exponent>\r\n" .
- ' <P>' . Base64::encode($primes[1]->toBytes()) . "</P>\r\n" .
- ' <Q>' . Base64::encode($primes[2]->toBytes()) . "</Q>\r\n" .
- ' <DP>' . Base64::encode($exponents[1]->toBytes()) . "</DP>\r\n" .
- ' <DQ>' . Base64::encode($exponents[2]->toBytes()) . "</DQ>\r\n" .
- ' <InverseQ>' . Base64::encode($coefficients[2]->toBytes()) . "</InverseQ>\r\n" .
- ' <D>' . Base64::encode($d->toBytes()) . "</D>\r\n" .
- '</RSAKeyPair>';
- }
-
- /**
- * Convert a public key to the appropriate format
- *
- * @access public
- * @param \phpseclib3\Math\BigInteger $n
- * @param \phpseclib3\Math\BigInteger $e
- * @return string
- */
- public static function savePublicKey(BigInteger $n, BigInteger $e)
- {
- return "<RSAKeyValue>\r\n" .
- ' <Modulus>' . Base64::encode($n->toBytes()) . "</Modulus>\r\n" .
- ' <Exponent>' . Base64::encode($e->toBytes()) . "</Exponent>\r\n" .
- '</RSAKeyValue>';
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/PrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/PrivateKey.php
deleted file mode 100644
index 5205ce63d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/PrivateKey.php
+++ /dev/null
@@ -1,556 +0,0 @@
-<?php
-
-/**
- * RSA Private Key
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA;
-
-use phpseclib3\Crypt\RSA;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\File\ASN1;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Exceptions\NoKeyLoadedException;
-use phpseclib3\Exception\UnsupportedFormatException;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Crypt\Common;
-use phpseclib3\Crypt\RSA\Formats\Keys\PSS;
-
-/**
- * Raw RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PrivateKey extends RSA implements Common\PrivateKey
-{
- use Common\Traits\PasswordProtected;
-
- /**
- * Primes for Chinese Remainder Theorem (ie. p and q)
- *
- * @var array
- * @access private
- */
- protected $primes;
-
- /**
- * Exponents for Chinese Remainder Theorem (ie. dP and dQ)
- *
- * @var array
- * @access private
- */
- protected $exponents;
-
- /**
- * Coefficients for Chinese Remainder Theorem (ie. qInv)
- *
- * @var array
- * @access private
- */
- protected $coefficients;
-
- /**
- * Public Exponent
- *
- * @var mixed
- * @access private
- */
- protected $publicExponent = false;
-
- /**
- * RSADP
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-5.1.2 RFC3447#section-5.1.2}.
- *
- * @access private
- * @param \phpseclib3\Math\BigInteger $c
- * @return bool|\phpseclib3\Math\BigInteger
- */
- private function rsadp($c)
- {
- if ($c->compare(self::$zero) < 0 || $c->compare($this->modulus) > 0) {
- throw new \OutOfRangeException('Ciphertext representative out of range');
- }
- return $this->exponentiate($c);
- }
-
- /**
- * RSASP1
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-5.2.1 RFC3447#section-5.2.1}.
- *
- * @access private
- * @param \phpseclib3\Math\BigInteger $m
- * @return bool|\phpseclib3\Math\BigInteger
- */
- private function rsasp1($m)
- {
- if ($m->compare(self::$zero) < 0 || $m->compare($this->modulus) > 0) {
- throw new \OutOfRangeException('Signature representative out of range');
- }
- return $this->exponentiate($m);
- }
-
- /**
- * Exponentiate
- *
- * @param \phpseclib3\Math\BigInteger $x
- * @return \phpseclib3\Math\BigInteger
- */
- protected function exponentiate(BigInteger $x)
- {
- switch (true) {
- case empty($this->primes):
- case $this->primes[1]->equals(self::$zero):
- case empty($this->coefficients):
- case $this->coefficients[2]->equals(self::$zero):
- case empty($this->exponents):
- case $this->exponents[1]->equals(self::$zero):
- return $x->modPow($this->exponent, $this->modulus);
- }
-
- $num_primes = count($this->primes);
-
- if (!static::$enableBlinding) {
- $m_i = [
- 1 => $x->modPow($this->exponents[1], $this->primes[1]),
- 2 => $x->modPow($this->exponents[2], $this->primes[2])
- ];
- $h = $m_i[1]->subtract($m_i[2]);
- $h = $h->multiply($this->coefficients[2]);
- list(, $h) = $h->divide($this->primes[1]);
- $m = $m_i[2]->add($h->multiply($this->primes[2]));
-
- $r = $this->primes[1];
- for ($i = 3; $i <= $num_primes; $i++) {
- $m_i = $x->modPow($this->exponents[$i], $this->primes[$i]);
-
- $r = $r->multiply($this->primes[$i - 1]);
-
- $h = $m_i->subtract($m);
- $h = $h->multiply($this->coefficients[$i]);
- list(, $h) = $h->divide($this->primes[$i]);
-
- $m = $m->add($r->multiply($h));
- }
- } else {
- $smallest = $this->primes[1];
- for ($i = 2; $i <= $num_primes; $i++) {
- if ($smallest->compare($this->primes[$i]) > 0) {
- $smallest = $this->primes[$i];
- }
- }
-
- $r = BigInteger::randomRange(self::$one, $smallest->subtract(self::$one));
-
- $m_i = [
- 1 => $this->blind($x, $r, 1),
- 2 => $this->blind($x, $r, 2)
- ];
- $h = $m_i[1]->subtract($m_i[2]);
- $h = $h->multiply($this->coefficients[2]);
- list(, $h) = $h->divide($this->primes[1]);
- $m = $m_i[2]->add($h->multiply($this->primes[2]));
-
- $r = $this->primes[1];
- for ($i = 3; $i <= $num_primes; $i++) {
- $m_i = $this->blind($x, $r, $i);
-
- $r = $r->multiply($this->primes[$i - 1]);
-
- $h = $m_i->subtract($m);
- $h = $h->multiply($this->coefficients[$i]);
- list(, $h) = $h->divide($this->primes[$i]);
-
- $m = $m->add($r->multiply($h));
- }
- }
-
- return $m;
- }
-
- /**
- * Performs RSA Blinding
- *
- * Protects against timing attacks by employing RSA Blinding.
- * Returns $x->modPow($this->exponents[$i], $this->primes[$i])
- *
- * @access private
- * @param \phpseclib3\Math\BigInteger $x
- * @param \phpseclib3\Math\BigInteger $r
- * @param int $i
- * @return \phpseclib3\Math\BigInteger
- */
- private function blind($x, $r, $i)
- {
- $x = $x->multiply($r->modPow($this->publicExponent, $this->primes[$i]));
- $x = $x->modPow($this->exponents[$i], $this->primes[$i]);
-
- $r = $r->modInverse($this->primes[$i]);
- $x = $x->multiply($r);
- list(, $x) = $x->divide($this->primes[$i]);
-
- return $x;
- }
-
- /**
- * EMSA-PSS-ENCODE
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-9.1.1 RFC3447#section-9.1.1}.
- *
- * @return string
- * @access private
- * @param string $m
- * @throws \RuntimeException on encoding error
- * @param int $emBits
- */
- private function emsa_pss_encode($m, $emBits)
- {
- // if $m is larger than two million terrabytes and you're using sha1, PKCS#1 suggests a "Label too long" error
- // be output.
-
- $emLen = ($emBits + 1) >> 3; // ie. ceil($emBits / 8)
- $sLen = $this->sLen !== null ? $this->sLen : $this->hLen;
-
- $mHash = $this->hash->hash($m);
- if ($emLen < $this->hLen + $sLen + 2) {
- throw new \LengthException('RSA modulus too short');
- }
-
- $salt = Random::string($sLen);
- $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
- $h = $this->hash->hash($m2);
- $ps = str_repeat(chr(0), $emLen - $sLen - $this->hLen - 2);
- $db = $ps . chr(1) . $salt;
- $dbMask = $this->mgf1($h, $emLen - $this->hLen - 1);
- $maskedDB = $db ^ $dbMask;
- $maskedDB[0] = ~chr(0xFF << ($emBits & 7)) & $maskedDB[0];
- $em = $maskedDB . $h . chr(0xBC);
-
- return $em;
- }
-
- /**
- * RSASSA-PSS-SIGN
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-8.1.1 RFC3447#section-8.1.1}.
- *
- * @access private
- * @param string $m
- * @return bool|string
- */
- private function rsassa_pss_sign($m)
- {
- // EMSA-PSS encoding
-
- $em = $this->emsa_pss_encode($m, 8 * $this->k - 1);
-
- // RSA signature
-
- $m = $this->os2ip($em);
- $s = $this->rsasp1($m);
- $s = $this->i2osp($s, $this->k);
-
- // Output the signature S
-
- return $s;
- }
-
- /**
- * RSASSA-PKCS1-V1_5-SIGN
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-8.2.1 RFC3447#section-8.2.1}.
- *
- * @access private
- * @param string $m
- * @throws \LengthException if the RSA modulus is too short
- * @return bool|string
- */
- private function rsassa_pkcs1_v1_5_sign($m)
- {
- // EMSA-PKCS1-v1_5 encoding
-
- // If the encoding operation outputs "intended encoded message length too short," output "RSA modulus
- // too short" and stop.
- try {
- $em = $this->emsa_pkcs1_v1_5_encode($m, $this->k);
- } catch (\LengthException $e) {
- throw new \LengthException('RSA modulus too short');
- }
-
- // RSA signature
-
- $m = $this->os2ip($em);
- $s = $this->rsasp1($m);
- $s = $this->i2osp($s, $this->k);
-
- // Output the signature S
-
- return $s;
- }
-
- /**
- * Create a signature
- *
- * @see self::verify()
- * @access public
- * @param string $message
- * @return string
- */
- public function sign($message)
- {
- switch ($this->signaturePadding) {
- case self::SIGNATURE_PKCS1:
- case self::SIGNATURE_RELAXED_PKCS1:
- return $this->rsassa_pkcs1_v1_5_sign($message);
- //case self::SIGNATURE_PSS:
- default:
- return $this->rsassa_pss_sign($message);
- }
- }
-
- /**
- * RSAES-PKCS1-V1_5-DECRYPT
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-7.2.2 RFC3447#section-7.2.2}.
- *
- * @access private
- * @param string $c
- * @return bool|string
- */
- private function rsaes_pkcs1_v1_5_decrypt($c)
- {
- // Length checking
-
- if (strlen($c) != $this->k) { // or if k < 11
- throw new \LengthException('Ciphertext representative too long');
- }
-
- // RSA decryption
-
- $c = $this->os2ip($c);
- $m = $this->rsadp($c);
- $em = $this->i2osp($m, $this->k);
-
- // EME-PKCS1-v1_5 decoding
-
- if (ord($em[0]) != 0 || ord($em[1]) > 2) {
- throw new \RuntimeException('Decryption error');
- }
-
- $ps = substr($em, 2, strpos($em, chr(0), 2) - 2);
- $m = substr($em, strlen($ps) + 3);
-
- if (strlen($ps) < 8) {
- throw new \RuntimeException('Decryption error');
- }
-
- // Output M
-
- return $m;
- }
-
- /**
- * RSAES-OAEP-DECRYPT
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-7.1.2 RFC3447#section-7.1.2}. The fact that the error
- * messages aren't distinguishable from one another hinders debugging, but, to quote from RFC3447#section-7.1.2:
- *
- * Note. Care must be taken to ensure that an opponent cannot
- * distinguish the different error conditions in Step 3.g, whether by
- * error message or timing, or, more generally, learn partial
- * information about the encoded message EM. Otherwise an opponent may
- * be able to obtain useful information about the decryption of the
- * ciphertext C, leading to a chosen-ciphertext attack such as the one
- * observed by Manger [36].
- *
- * @access private
- * @param string $c
- * @return bool|string
- */
- private function rsaes_oaep_decrypt($c)
- {
- // Length checking
-
- // if $l is larger than two million terrabytes and you're using sha1, PKCS#1 suggests a "Label too long" error
- // be output.
-
- if (strlen($c) != $this->k || $this->k < 2 * $this->hLen + 2) {
- throw new \LengthException('Ciphertext representative too long');
- }
-
- // RSA decryption
-
- $c = $this->os2ip($c);
- $m = $this->rsadp($c);
- $em = $this->i2osp($m, $this->k);
-
- // EME-OAEP decoding
-
- $lHash = $this->hash->hash($this->label);
- $y = ord($em[0]);
- $maskedSeed = substr($em, 1, $this->hLen);
- $maskedDB = substr($em, $this->hLen + 1);
- $seedMask = $this->mgf1($maskedDB, $this->hLen);
- $seed = $maskedSeed ^ $seedMask;
- $dbMask = $this->mgf1($seed, $this->k - $this->hLen - 1);
- $db = $maskedDB ^ $dbMask;
- $lHash2 = substr($db, 0, $this->hLen);
- $m = substr($db, $this->hLen);
- $hashesMatch = hash_equals($lHash, $lHash2);
- $leadingZeros = 1;
- $patternMatch = 0;
- $offset = 0;
- for ($i = 0; $i < strlen($m); $i++) {
- $patternMatch|= $leadingZeros & ($m[$i] === "\1");
- $leadingZeros&= $m[$i] === "\0";
- $offset+= $patternMatch ? 0 : 1;
- }
-
- // we do & instead of && to avoid https://en.wikipedia.org/wiki/Short-circuit_evaluation
- // to protect against timing attacks
- if (!$hashesMatch & !$patternMatch) {
- throw new \RuntimeException('Decryption error');
- }
-
- // Output the message M
-
- return substr($m, $offset + 1);
- }
-
- /**
- * Raw Encryption / Decryption
- *
- * Doesn't use padding and is not recommended.
- *
- * @access private
- * @param string $m
- * @return bool|string
- * @throws \LengthException if strlen($m) > $this->k
- */
- private function raw_encrypt($m)
- {
- if (strlen($m) > $this->k) {
- throw new \LengthException('Ciphertext representative too long');
- }
-
- $temp = $this->os2ip($m);
- $temp = $this->rsadp($temp);
- return $this->i2osp($temp, $this->k);
- }
-
- /**
- * Decryption
- *
- * @see self::encrypt()
- * @access public
- * @param string $ciphertext
- * @return bool|string
- */
- public function decrypt($ciphertext)
- {
- switch ($this->encryptionPadding) {
- case self::ENCRYPTION_NONE:
- return $this->raw_encrypt($ciphertext);
- case self::ENCRYPTION_PKCS1:
- return $this->rsaes_pkcs1_v1_5_decrypt($ciphertext);
- //case self::ENCRYPTION_OAEP:
- default:
- return $this->rsaes_oaep_decrypt($ciphertext);
- }
- }
-
- /**
- * Returns the public key
- *
- * @access public
- * @return mixed
- */
- public function getPublicKey()
- {
- $type = self::validatePlugin('Keys', 'PKCS8', 'savePublicKey');
- if (empty($this->modulus) || empty($this->publicExponent)) {
- throw new \RuntimeException('Public key components not found');
- }
-
- $key = $type::savePublicKey($this->modulus, $this->publicExponent);
- return RSA::loadFormat('PKCS8', $key)
- ->withHash($this->hash->getHash())
- ->withMGFHash($this->mgfHash->getHash())
- ->withSaltLength($this->sLen)
- ->withLabel($this->label)
- ->withPadding($this->signaturePadding | $this->encryptionPadding);
- }
-
- /**
- * Returns the private key
- *
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type, array $options = [])
- {
- $type = self::validatePlugin(
- 'Keys',
- $type,
- empty($this->primes) ? 'savePublicKey' : 'savePrivateKey'
- );
-
- if ($type == PSS::class) {
- if ($this->signaturePadding == self::SIGNATURE_PSS) {
- $options+= [
- 'hash' => $this->hash->getHash(),
- 'MGFHash' => $this->mgfHash->getHash(),
- 'saltLength' => $this->getSaltLength()
- ];
- } else {
- throw new UnsupportedFormatException('The PSS format can only be used when the signature method has been explicitly set to PSS');
- }
- }
-
- if (empty($this->primes)) {
- return $type::savePublicKey($this->modulus, $this->exponent, $options);
- }
-
- return $type::savePrivateKey($this->modulus, $this->publicExponent, $this->exponent, $this->primes, $this->exponents, $this->coefficients, $this->password, $options);
-
- /*
- $key = $type::savePrivateKey($this->modulus, $this->publicExponent, $this->exponent, $this->primes, $this->exponents, $this->coefficients, $this->password, $options);
- if ($key !== false || count($this->primes) == 2) {
- return $key;
- }
-
- $nSize = $this->getSize() >> 1;
-
- $primes = [1 => clone self::$one, clone self::$one];
- $i = 1;
- foreach ($this->primes as $prime) {
- $primes[$i] = $primes[$i]->multiply($prime);
- if ($primes[$i]->getLength() >= $nSize) {
- $i++;
- }
- }
-
- $exponents = [];
- $coefficients = [2 => $primes[2]->modInverse($primes[1])];
-
- foreach ($primes as $i => $prime) {
- $temp = $prime->subtract(self::$one);
- $exponents[$i] = $this->modulus->modInverse($temp);
- }
-
- return $type::savePrivateKey($this->modulus, $this->publicExponent, $this->exponent, $primes, $exponents, $coefficients, $this->password, $options);
- */
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/PublicKey.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/PublicKey.php
deleted file mode 100644
index 3475ad999..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/PublicKey.php
+++ /dev/null
@@ -1,507 +0,0 @@
-<?php
-
-/**
- * RSA Public Key
- *
- * @category Crypt
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt\RSA;
-
-use phpseclib3\Crypt\RSA;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\File\ASN1;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Exception\NoKeyLoadedException;
-use phpseclib3\Exception\UnsupportedFormatException;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Crypt\Common;
-use phpseclib3\File\ASN1\Maps\DigestInfo;
-use phpseclib3\Crypt\RSA\Formats\Keys\PSS;
-
-/**
- * Raw RSA Key Handler
- *
- * @package RSA
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PublicKey extends RSA implements Common\PublicKey
-{
- use Common\Traits\Fingerprint;
-
- /**
- * Exponentiate
- *
- * @param \phpseclib3\Math\BigInteger $x
- * @return \phpseclib3\Math\BigInteger
- */
- private function exponentiate(BigInteger $x)
- {
- return $x->modPow($this->exponent, $this->modulus);
- }
-
- /**
- * RSAVP1
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-5.2.2 RFC3447#section-5.2.2}.
- *
- * @access private
- * @param \phpseclib3\Math\BigInteger $s
- * @return bool|\phpseclib3\Math\BigInteger
- */
- private function rsavp1($s)
- {
- if ($s->compare(self::$zero) < 0 || $s->compare($this->modulus) > 0) {
- return false;
- }
- return $this->exponentiate($s);
- }
-
- /**
- * RSASSA-PKCS1-V1_5-VERIFY
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-8.2.2 RFC3447#section-8.2.2}.
- *
- * @access private
- * @param string $m
- * @param string $s
- * @throws \LengthException if the RSA modulus is too short
- * @return bool
- */
- private function rsassa_pkcs1_v1_5_verify($m, $s)
- {
- // Length checking
-
- if (strlen($s) != $this->k) {
- return false;
- }
-
- // RSA verification
-
- $s = $this->os2ip($s);
- $m2 = $this->rsavp1($s);
- if ($m2 === false) {
- return false;
- }
- $em = $this->i2osp($m2, $this->k);
- if ($em === false) {
- return false;
- }
-
- // EMSA-PKCS1-v1_5 encoding
-
- // If the encoding operation outputs "intended encoded message length too short," output "RSA modulus
- // too short" and stop.
- try {
- $em2 = $this->emsa_pkcs1_v1_5_encode($m, $this->k);
- } catch (\LengthException $e) {
- throw new \LengthException('RSA modulus too short');
- }
-
- // Compare
- return hash_equals($em, $em2);
- }
-
- /**
- * RSASSA-PKCS1-V1_5-VERIFY (relaxed matching)
- *
- * Per {@link http://tools.ietf.org/html/rfc3447#page-43 RFC3447#page-43} PKCS1 v1.5
- * specified the use BER encoding rather than DER encoding that PKCS1 v2.0 specified.
- * This means that under rare conditions you can have a perfectly valid v1.5 signature
- * that fails to validate with _rsassa_pkcs1_v1_5_verify(). PKCS1 v2.1 also recommends
- * that if you're going to validate these types of signatures you "should indicate
- * whether the underlying BER encoding is a DER encoding and hence whether the signature
- * is valid with respect to the specification given in [PKCS1 v2.0+]". so if you do
- * $rsa->getLastPadding() and get RSA::PADDING_RELAXED_PKCS1 back instead of
- * RSA::PADDING_PKCS1... that means BER encoding was used.
- *
- * @access private
- * @param string $m
- * @param string $s
- * @return bool
- */
- private function rsassa_pkcs1_v1_5_relaxed_verify($m, $s)
- {
- // Length checking
-
- if (strlen($s) != $this->k) {
- return false;
- }
-
- // RSA verification
-
- $s = $this->os2ip($s);
- $m2 = $this->rsavp1($s);
- if ($m2 === false) {
- return false;
- }
- $em = $this->i2osp($m2, $this->k);
- if ($em === false) {
- return false;
- }
-
- if (Strings::shift($em, 2) != "\0\1") {
- return false;
- }
-
- $em = ltrim($em, "\xFF");
- if (Strings::shift($em) != "\0") {
- return false;
- }
-
- $decoded = ASN1::decodeBER($em);
- if (!is_array($decoded) || empty($decoded[0]) || strlen($em) > $decoded[0]['length']) {
- return false;
- }
-
- static $oids;
- if (!isset($oids)) {
- $oids = [
- 'md2' => '1.2.840.113549.2.2',
- 'md4' => '1.2.840.113549.2.4', // from PKCS1 v1.5
- 'md5' => '1.2.840.113549.2.5',
- 'id-sha1' => '1.3.14.3.2.26',
- 'id-sha256' => '2.16.840.1.101.3.4.2.1',
- 'id-sha384' => '2.16.840.1.101.3.4.2.2',
- 'id-sha512' => '2.16.840.1.101.3.4.2.3',
- // from PKCS1 v2.2
- 'id-sha224' => '2.16.840.1.101.3.4.2.4',
- 'id-sha512/224' => '2.16.840.1.101.3.4.2.5',
- 'id-sha512/256' => '2.16.840.1.101.3.4.2.6',
- ];
- ASN1::loadOIDs($oids);
- }
-
- $decoded = ASN1::asn1map($decoded[0], DigestInfo::MAP);
- if (!isset($decoded) || $decoded === false) {
- return false;
- }
-
- if (!isset($oids[$decoded['digestAlgorithm']['algorithm']])) {
- return false;
- }
-
- $hash = $decoded['digestAlgorithm']['algorithm'];
- $hash = substr($hash, 0, 3) == 'id-' ?
- substr($hash, 3) :
- $hash;
- $hash = new Hash($hash);
- $em = $hash->hash($m);
- $em2 = $decoded['digest'];
-
- return hash_equals($em, $em2);
- }
-
- /**
- * EMSA-PSS-VERIFY
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-9.1.2 RFC3447#section-9.1.2}.
- *
- * @access private
- * @param string $m
- * @param string $em
- * @param int $emBits
- * @return string
- */
- private function emsa_pss_verify($m, $em, $emBits)
- {
- // if $m is larger than two million terrabytes and you're using sha1, PKCS#1 suggests a "Label too long" error
- // be output.
-
- $emLen = ($emBits + 7) >> 3; // ie. ceil($emBits / 8);
- $sLen = $this->sLen !== null ? $this->sLen : $this->hLen;
-
- $mHash = $this->hash->hash($m);
- if ($emLen < $this->hLen + $sLen + 2) {
- return false;
- }
-
- if ($em[strlen($em) - 1] != chr(0xBC)) {
- return false;
- }
-
- $maskedDB = substr($em, 0, -$this->hLen - 1);
- $h = substr($em, -$this->hLen - 1, $this->hLen);
- $temp = chr(0xFF << ($emBits & 7));
- if ((~$maskedDB[0] & $temp) != $temp) {
- return false;
- }
- $dbMask = $this->mgf1($h, $emLen - $this->hLen - 1);
- $db = $maskedDB ^ $dbMask;
- $db[0] = ~chr(0xFF << ($emBits & 7)) & $db[0];
- $temp = $emLen - $this->hLen - $sLen - 2;
- if (substr($db, 0, $temp) != str_repeat(chr(0), $temp) || ord($db[$temp]) != 1) {
- return false;
- }
- $salt = substr($db, $temp + 1); // should be $sLen long
- $m2 = "\0\0\0\0\0\0\0\0" . $mHash . $salt;
- $h2 = $this->hash->hash($m2);
- return hash_equals($h, $h2);
- }
-
- /**
- * RSASSA-PSS-VERIFY
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-8.1.2 RFC3447#section-8.1.2}.
- *
- * @access private
- * @param string $m
- * @param string $s
- * @return bool|string
- */
- private function rsassa_pss_verify($m, $s)
- {
- // Length checking
-
- if (strlen($s) != $this->k) {
- return false;
- }
-
- // RSA verification
-
- $modBits = strlen($this->modulus->toBits());
-
- $s2 = $this->os2ip($s);
- $m2 = $this->rsavp1($s2);
- $em = $this->i2osp($m2, $this->k);
- if ($em === false) {
- return false;
- }
-
- // EMSA-PSS verification
-
- return $this->emsa_pss_verify($m, $em, $modBits - 1);
- }
-
- /**
- * Verifies a signature
- *
- * @see self::sign()
- * @param string $message
- * @param string $signature
- * @return bool
- */
- public function verify($message, $signature)
- {
- switch ($this->signaturePadding) {
- case self::SIGNATURE_RELAXED_PKCS1:
- return $this->rsassa_pkcs1_v1_5_relaxed_verify($message, $signature);
- case self::SIGNATURE_PKCS1:
- return $this->rsassa_pkcs1_v1_5_verify($message, $signature);
- //case self::SIGNATURE_PSS:
- default:
- return $this->rsassa_pss_verify($message, $signature);
- }
- }
-
- /**
- * RSAES-PKCS1-V1_5-ENCRYPT
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-7.2.1 RFC3447#section-7.2.1}.
- *
- * @access private
- * @param string $m
- * @param bool $pkcs15_compat optional
- * @throws \LengthException if strlen($m) > $this->k - 11
- * @return bool|string
- */
- private function rsaes_pkcs1_v1_5_encrypt($m, $pkcs15_compat = false)
- {
- $mLen = strlen($m);
-
- // Length checking
-
- if ($mLen > $this->k - 11) {
- throw new \LengthException('Message too long');
- }
-
- // EME-PKCS1-v1_5 encoding
-
- $psLen = $this->k - $mLen - 3;
- $ps = '';
- while (strlen($ps) != $psLen) {
- $temp = Random::string($psLen - strlen($ps));
- $temp = str_replace("\x00", '', $temp);
- $ps.= $temp;
- }
- $type = 2;
- $em = chr(0) . chr($type) . $ps . chr(0) . $m;
-
- // RSA encryption
- $m = $this->os2ip($em);
- $c = $this->rsaep($m);
- $c = $this->i2osp($c, $this->k);
-
- // Output the ciphertext C
-
- return $c;
- }
-
- /**
- * RSAES-OAEP-ENCRYPT
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-7.1.1 RFC3447#section-7.1.1} and
- * {http://en.wikipedia.org/wiki/Optimal_Asymmetric_Encryption_Padding OAES}.
- *
- * @access private
- * @param string $m
- * @throws \LengthException if strlen($m) > $this->k - 2 * $this->hLen - 2
- * @return string
- */
- private function rsaes_oaep_encrypt($m)
- {
- $mLen = strlen($m);
-
- // Length checking
-
- // if $l is larger than two million terrabytes and you're using sha1, PKCS#1 suggests a "Label too long" error
- // be output.
-
- if ($mLen > $this->k - 2 * $this->hLen - 2) {
- throw new \LengthException('Message too long');
- }
-
- // EME-OAEP encoding
-
- $lHash = $this->hash->hash($this->label);
- $ps = str_repeat(chr(0), $this->k - $mLen - 2 * $this->hLen - 2);
- $db = $lHash . $ps . chr(1) . $m;
- $seed = Random::string($this->hLen);
- $dbMask = $this->mgf1($seed, $this->k - $this->hLen - 1);
- $maskedDB = $db ^ $dbMask;
- $seedMask = $this->mgf1($maskedDB, $this->hLen);
- $maskedSeed = $seed ^ $seedMask;
- $em = chr(0) . $maskedSeed . $maskedDB;
-
- // RSA encryption
-
- $m = $this->os2ip($em);
- $c = $this->rsaep($m);
- $c = $this->i2osp($c, $this->k);
-
- // Output the ciphertext C
-
- return $c;
- }
-
- /**
- * RSAEP
- *
- * See {@link http://tools.ietf.org/html/rfc3447#section-5.1.1 RFC3447#section-5.1.1}.
- *
- * @access private
- * @param \phpseclib3\Math\BigInteger $m
- * @return bool|\phpseclib3\Math\BigInteger
- */
- private function rsaep($m)
- {
- if ($m->compare(self::$zero) < 0 || $m->compare($this->modulus) > 0) {
- throw new \OutOfRangeException('Message representative out of range');
- }
- return $this->exponentiate($m);
- }
-
- /**
- * Raw Encryption / Decryption
- *
- * Doesn't use padding and is not recommended.
- *
- * @access private
- * @param string $m
- * @return bool|string
- * @throws \LengthException if strlen($m) > $this->k
- */
- private function raw_encrypt($m)
- {
- if (strlen($m) > $this->k) {
- throw new \LengthException('Message too long');
- }
-
- $temp = $this->os2ip($m);
- $temp = $this->rsaep($temp);
- return $this->i2osp($temp, $this->k);
- }
-
- /**
- * Encryption
- *
- * Both self::PADDING_OAEP and self::PADDING_PKCS1 both place limits on how long $plaintext can be.
- * If $plaintext exceeds those limits it will be broken up so that it does and the resultant ciphertext's will
- * be concatenated together.
- *
- * @see self::decrypt()
- * @access public
- * @param string $plaintext
- * @return bool|string
- * @throws \LengthException if the RSA modulus is too short
- */
- public function encrypt($plaintext)
- {
- switch ($this->encryptionPadding) {
- case self::ENCRYPTION_NONE:
- return $this->raw_encrypt($plaintext);
- case self::ENCRYPTION_PKCS1:
- return $this->rsaes_pkcs1_v1_5_encrypt($plaintext);
- //case self::ENCRYPTION_OAEP:
- default:
- return $this->rsaes_oaep_encrypt($plaintext);
- }
- }
-
- /**
- * Returns the public key
- *
- * The public key is only returned under two circumstances - if the private key had the public key embedded within it
- * or if the public key was set via setPublicKey(). If the currently loaded key is supposed to be the public key this
- * function won't return it since this library, for the most part, doesn't distinguish between public and private keys.
- *
- * @param string $type
- * @param array $options optional
- * @return mixed
- */
- public function toString($type, array $options = [])
- {
- $type = self::validatePlugin('Keys', $type, 'savePublicKey');
-
- if ($type == PSS::class) {
- if ($this->signaturePadding == self::SIGNATURE_PSS) {
- $options+= [
- 'hash' => $this->hash->getHash(),
- 'MGFHash' => $this->mgfHash->getHash(),
- 'saltLength' => $this->getSaltLength()
- ];
- } else {
- throw new UnsupportedFormatException('The PSS format can only be used when the signature method has been explicitly set to PSS');
- }
- }
-
- return $type::savePublicKey($this->modulus, $this->publicExponent, $options);
- }
-
- /**
- * Converts a public key to a private key
- *
- * @return RSA
- */
- public function asPrivateKey()
- {
- $new = new PrivateKey;
- $new->exponent = $this->exponent;
- $new->modulus = $this->modulus;
- $new->k = $this->k;
- $new->format = $this->format;
- return $new
- ->withHash($this->hash->getHash())
- ->withMGFHash($this->mgfHash->getHash())
- ->withSaltLength($this->sLen)
- ->withLabel($this->label)
- ->withPadding($this->signaturePadding | $this->encryptionPadding);
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Random.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Random.php
index b05f040eb..8f53eb319 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Random.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Random.php
@@ -10,7 +10,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * echo bin2hex(\phpseclib3\Crypt\Random::string(8));
+ * echo bin2hex(\phpseclib\Crypt\Random::string(8));
* ?>
* </code>
*
@@ -22,7 +22,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
+namespace phpseclib\Crypt;
/**
* Pure-PHP Random Number Generator
@@ -31,7 +31,7 @@ namespace phpseclib3\Crypt;
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
-abstract class Random
+class Random
{
/**
* Generate a random string.
@@ -41,26 +41,75 @@ abstract class Random
* eg. for RSA key generation.
*
* @param int $length
- * @throws \RuntimeException if a symmetric cipher is needed but not loaded
* @return string
*/
- public static function string($length)
+ static function string($length)
{
if (!$length) {
return '';
}
- try {
- return \random_bytes($length);
- } catch (\Exception $e) {
- // random_compat will throw an Exception, which in PHP 5 does not implement Throwable
- } catch (\Throwable $e) {
- // If a sufficient source of randomness is unavailable, random_bytes() will throw an
- // object that implements the Throwable interface (Exception, TypeError, Error).
- // We don't actually need to do anything here. The string() method should just continue
- // as normal. Note, however, that if we don't have a sufficient source of randomness for
- // random_bytes(), most of the other calls here will fail too, so we'll end up using
- // the PHP implementation.
+ if (version_compare(PHP_VERSION, '7.0.0', '>=')) {
+ try {
+ return \random_bytes($length);
+ } catch (\Throwable $e) {
+ // If a sufficient source of randomness is unavailable, random_bytes() will throw an
+ // object that implements the Throwable interface (Exception, TypeError, Error).
+ // We don't actually need to do anything here. The string() method should just continue
+ // as normal. Note, however, that if we don't have a sufficient source of randomness for
+ // random_bytes(), most of the other calls here will fail too, so we'll end up using
+ // the PHP implementation.
+ }
+ }
+
+ if (strtoupper(substr(PHP_OS, 0, 3)) === 'WIN') {
+ // method 1. prior to PHP 5.3 this would call rand() on windows hence the function_exists('class_alias') call.
+ // ie. class_alias is a function that was introduced in PHP 5.3
+ if (extension_loaded('mcrypt') && function_exists('class_alias')) {
+ return @mcrypt_create_iv($length);
+ }
+ // method 2. openssl_random_pseudo_bytes was introduced in PHP 5.3.0 but prior to PHP 5.3.4 there was,
+ // to quote <http://php.net/ChangeLog-5.php#5.3.4>, "possible blocking behavior". as of 5.3.4
+ // openssl_random_pseudo_bytes and mcrypt_create_iv do the exact same thing on Windows. ie. they both
+ // call php_win32_get_random_bytes():
+ //
+ // https://github.com/php/php-src/blob/7014a0eb6d1611151a286c0ff4f2238f92c120d6/ext/openssl/openssl.c#L5008
+ // https://github.com/php/php-src/blob/7014a0eb6d1611151a286c0ff4f2238f92c120d6/ext/mcrypt/mcrypt.c#L1392
+ //
+ // php_win32_get_random_bytes() is defined thusly:
+ //
+ // https://github.com/php/php-src/blob/7014a0eb6d1611151a286c0ff4f2238f92c120d6/win32/winutil.c#L80
+ //
+ // we're calling it, all the same, in the off chance that the mcrypt extension is not available
+ if (extension_loaded('openssl') && version_compare(PHP_VERSION, '5.3.4', '>=')) {
+ return openssl_random_pseudo_bytes($length);
+ }
+ } else {
+ // method 1. the fastest
+ if (extension_loaded('openssl')) {
+ return openssl_random_pseudo_bytes($length);
+ }
+ // method 2
+ static $fp = true;
+ if ($fp === true) {
+ // warning's will be output unles the error suppression operator is used. errors such as
+ // "open_basedir restriction in effect", "Permission denied", "No such file or directory", etc.
+ $fp = @fopen('/dev/urandom', 'rb');
+ }
+ if ($fp !== true && $fp !== false) { // surprisingly faster than !is_bool() or is_resource()
+ $temp = fread($fp, $length);
+ if (strlen($temp) == $length) {
+ return $temp;
+ }
+ }
+ // method 3. pretty much does the same thing as method 2 per the following url:
+ // https://github.com/php/php-src/blob/7014a0eb6d1611151a286c0ff4f2238f92c120d6/ext/mcrypt/mcrypt.c#L1391
+ // surprisingly slower than method 2. maybe that's because mcrypt_create_iv does a bunch of error checking that we're
+ // not doing. regardless, this'll only be called if this PHP script couldn't open /dev/urandom due to open_basedir
+ // restrictions or some such
+ if (extension_loaded('mcrypt')) {
+ return @mcrypt_create_iv($length, MCRYPT_DEV_URANDOM);
+ }
}
// at this point we have no choice but to use a pure-PHP CSPRNG
@@ -73,11 +122,11 @@ abstract class Random
// PHP isn't low level to be able to use those as sources and on a web server there's not likely
// going to be a ton of keyboard or mouse action. web servers do have one thing that we can use
// however, a ton of people visiting the website. obviously you don't want to base your seeding
- // solely on parameters a potential attacker sends but (1) not everything in $_SERVER is controlled
+ // soley on parameters a potential attacker sends but (1) not everything in $_SERVER is controlled
// by the user and (2) this isn't just looking at the data sent by the current user - it's based
// on the data sent by all users. one user requests the page and a hash of their info is saved.
// another user visits the page and the serialization of their data is utilized along with the
- // server environment stuff and a hash of the previous http request data (which itself utilizes
+ // server envirnment stuff and a hash of the previous http request data (which itself utilizes
// a hash of the session data before that). certainly an attacker should be assumed to have
// full control over his own http requests. he, however, is not going to have control over
// everyone's http requests.
@@ -97,14 +146,15 @@ abstract class Random
session_cache_limiter('');
session_start();
- $v = (isset($_SERVER) ? self::safe_serialize($_SERVER) : '') .
- (isset($_POST) ? self::safe_serialize($_POST) : '') .
- (isset($_GET) ? self::safe_serialize($_GET) : '') .
- (isset($_COOKIE) ? self::safe_serialize($_COOKIE) : '') .
- self::safe_serialize($GLOBALS) .
- self::safe_serialize($_SESSION) .
- self::safe_serialize($_OLD_SESSION);
- $v = $seed = $_SESSION['seed'] = sha1($v, true);
+ $v = $seed = $_SESSION['seed'] = pack('H*', sha1(
+ (isset($_SERVER) ? phpseclib_safe_serialize($_SERVER) : '') .
+ (isset($_POST) ? phpseclib_safe_serialize($_POST) : '') .
+ (isset($_GET) ? phpseclib_safe_serialize($_GET) : '') .
+ (isset($_COOKIE) ? phpseclib_safe_serialize($_COOKIE) : '') .
+ phpseclib_safe_serialize($GLOBALS) .
+ phpseclib_safe_serialize($_SESSION) .
+ phpseclib_safe_serialize($_OLD_SESSION)
+ ));
if (!isset($_SESSION['count'])) {
$_SESSION['count'] = 0;
}
@@ -135,37 +185,38 @@ abstract class Random
// http://tools.ietf.org/html/rfc4253#section-7.2
//
// see the is_string($crypto) part for an example of how to expand the keys
- $key = sha1($seed . 'A', true);
- $iv = sha1($seed . 'C', true);
+ $key = pack('H*', sha1($seed . 'A'));
+ $iv = pack('H*', sha1($seed . 'C'));
// ciphers are used as per the nist.gov link below. also, see this link:
//
// http://en.wikipedia.org/wiki/Cryptographically_secure_pseudorandom_number_generator#Designs_based_on_cryptographic_primitives
switch (true) {
- case class_exists('\phpseclib3\Crypt\AES'):
- $crypto = new AES('ctr');
+ case class_exists('\phpseclib\Crypt\AES'):
+ $crypto = new AES(Base::MODE_CTR);
break;
- case class_exists('\phpseclib3\Crypt\Twofish'):
- $crypto = new Twofish('ctr');
+ case class_exists('\phpseclib\Crypt\Twofish'):
+ $crypto = new Twofish(Base::MODE_CTR);
break;
- case class_exists('\phpseclib3\Crypt\Blowfish'):
- $crypto = new Blowfish('ctr');
+ case class_exists('\phpseclib\Crypt\Blowfish'):
+ $crypto = new Blowfish(Base::MODE_CTR);
break;
- case class_exists('\phpseclib3\Crypt\TripleDES'):
- $crypto = new TripleDES('ctr');
+ case class_exists('\phpseclib\Crypt\TripleDES'):
+ $crypto = new TripleDES(Base::MODE_CTR);
break;
- case class_exists('\phpseclib3\Crypt\DES'):
- $crypto = new DES('ctr');
+ case class_exists('\phpseclib\Crypt\DES'):
+ $crypto = new DES(Base::MODE_CTR);
break;
- case class_exists('\phpseclib3\Crypt\RC4'):
+ case class_exists('\phpseclib\Crypt\RC4'):
$crypto = new RC4();
break;
default:
- throw new \RuntimeException(__CLASS__ . ' requires at least one symmetric cipher be loaded');
+ user_error(__CLASS__ . ' requires at least one symmetric cipher be loaded');
+ return false;
}
- $crypto->setKey(substr($key, 0, $crypto->getKeyLength() >> 3));
- $crypto->setIV(substr($iv, 0, $crypto->getBlockLength() >> 3));
+ $crypto->setKey($key);
+ $crypto->setIV($iv);
$crypto->enableContinuousBuffer();
}
@@ -186,18 +237,21 @@ abstract class Random
$v = $crypto->encrypt($r ^ $i); // strlen($r) == 20
$result.= $r;
}
-
return substr($result, 0, $length);
}
+}
+if (!function_exists('phpseclib_safe_serialize')) {
/**
* Safely serialize variables
*
- * If a class has a private __sleep() it'll emit a warning
- * @return mixed
+ * If a class has a private __sleep() method it'll give a fatal error on PHP 5.2 and earlier.
+ * PHP 5.3 will emit a warning.
+ *
* @param mixed $arr
+ * @access public
*/
- private static function safe_serialize(&$arr)
+ function phpseclib_safe_serialize(&$arr)
{
if (is_object($arr)) {
return '';
@@ -209,12 +263,12 @@ abstract class Random
if (isset($arr['__phpseclib_marker'])) {
return '';
}
- $safearr = [];
+ $safearr = array();
$arr['__phpseclib_marker'] = true;
foreach (array_keys($arr) as $key) {
// do not recurse on the '__phpseclib_marker' key itself, for smaller memory usage
if ($key !== '__phpseclib_marker') {
- $safearr[$key] = self::safe_serialize($arr[$key]);
+ $safearr[$key] = phpseclib_safe_serialize($arr[$key]);
}
}
unset($arr['__phpseclib_marker']);
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php
index fb1edcf6e..3648a1972 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Rijndael.php
@@ -30,7 +30,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $rijndael = new \phpseclib3\Crypt\Rijndael();
+ * $rijndael = new \phpseclib\Crypt\Rijndael();
*
* $rijndael->setKey('abcdefghijklmnop');
*
@@ -52,14 +52,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\BlockCipher;
-
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Exception\BadModeException;
-use phpseclib3\Exception\InsufficientSetupException;
-use phpseclib3\Exception\BadDecryptionException;
+namespace phpseclib\Crypt;
/**
* Pure-PHP implementation of Rijndael.
@@ -68,69 +61,77 @@ use phpseclib3\Exception\BadDecryptionException;
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
-class Rijndael extends BlockCipher
+class Rijndael extends Base
{
/**
* The mcrypt specific name of the cipher
*
* Mcrypt is useable for 128/192/256-bit $block_size/$key_length. For 160/224 not.
- * \phpseclib3\Crypt\Rijndael determines automatically whether mcrypt is useable
+ * \phpseclib\Crypt\Rijndael determines automatically whether mcrypt is useable
* or not for the current $block_size/$key_length.
* In case of, $cipher_name_mcrypt will be set dynamically at run time accordingly.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cipher_name_mcrypt
- * @see \phpseclib3\Crypt\Common\SymmetricKey::engine
+ * @see \phpseclib\Crypt\Base::cipher_name_mcrypt
+ * @see \phpseclib\Crypt\Base::engine
* @see self::isValidEngine()
* @var string
* @access private
*/
- protected $cipher_name_mcrypt = 'rijndael-128';
+ var $cipher_name_mcrypt = 'rijndael-128';
+
+ /**
+ * The default salt used by setPassword()
+ *
+ * @see \phpseclib\Crypt\Base::password_default_salt
+ * @see \phpseclib\Crypt\Base::setPassword()
+ * @var string
+ * @access private
+ */
+ var $password_default_salt = 'phpseclib';
/**
* The Key Schedule
*
- * @see self::setup()
+ * @see self::_setup()
* @var array
* @access private
*/
- private $w;
+ var $w;
/**
* The Inverse Key Schedule
*
- * @see self::setup()
+ * @see self::_setup()
* @var array
* @access private
*/
- private $dw;
+ var $dw;
/**
* The Block Length divided by 32
*
- * {@internal The max value is 256 / 32 = 8, the min value is 128 / 32 = 4. Exists in conjunction with $block_size
- * because the encryption / decryption / key schedule creation requires this number and not $block_size. We could
- * derive this from $block_size or vice versa, but that'd mean we'd have to do multiple shift operations, so in lieu
- * of that, we'll just precompute it once.}
- *
* @see self::setBlockLength()
* @var int
* @access private
+ * @internal The max value is 256 / 32 = 8, the min value is 128 / 32 = 4. Exists in conjunction with $block_size
+ * because the encryption / decryption / key schedule creation requires this number and not $block_size. We could
+ * derive this from $block_size or vice versa, but that'd mean we'd have to do multiple shift operations, so in lieu
+ * of that, we'll just precompute it once.
*/
- private $Nb = 4;
+ var $Nb = 4;
/**
* The Key Length (in bytes)
*
- * {@internal The max value is 256 / 8 = 32, the min value is 128 / 8 = 16. Exists in conjunction with $Nk
- * because the encryption / decryption / key schedule creation requires this number and not $key_length. We could
- * derive this from $key_length or vice versa, but that'd mean we'd have to do multiple shift operations, so in lieu
- * of that, we'll just precompute it once.}
- *
* @see self::setKeyLength()
* @var int
* @access private
+ * @internal The max value is 256 / 8 = 32, the min value is 128 / 8 = 16. Exists in conjunction with $Nk
+ * because the encryption / decryption / key schedule creation requires this number and not $key_length. We could
+ * derive this from $key_length or vice versa, but that'd mean we'd have to do multiple shift operations, so in lieu
+ * of that, we'll just precompute it once.
*/
- protected $key_length = 16;
+ var $key_length = 16;
/**
* The Key Length divided by 32
@@ -140,17 +141,16 @@ class Rijndael extends BlockCipher
* @access private
* @internal The max value is 256 / 32 = 8, the min value is 128 / 32 = 4
*/
- private $Nk = 4;
+ var $Nk = 4;
/**
* The Number of Rounds
*
- * {@internal The max value is 14, the min value is 10.}
- *
* @var int
* @access private
+ * @internal The max value is 14, the min value is 10.
*/
- private $Nr;
+ var $Nr;
/**
* Shift offsets
@@ -158,7 +158,7 @@ class Rijndael extends BlockCipher
* @var array
* @access private
*/
- private $c;
+ var $c;
/**
* Holds the last used key- and block_size information
@@ -166,28 +166,13 @@ class Rijndael extends BlockCipher
* @var array
* @access private
*/
- private $kl;
-
- /**
- * Default Constructor.
- *
- * @param string $mode
- * @access public
- * @throws \InvalidArgumentException if an invalid / unsupported mode is provided
- */
- public function __construct($mode)
- {
- parent::__construct($mode);
-
- if ($this->mode == self::MODE_STREAM) {
- throw new BadModeException('Block ciphers cannot be ran in stream mode');
- }
- }
+ var $kl;
/**
* Sets the key length.
*
- * Valid key lengths are 128, 160, 192, 224, and 256.
+ * Valid key lengths are 128, 160, 192, 224, and 256. If the length is less than 128, it will be rounded up to
+ * 128. If the length is greater than 128 and invalid, it will be rounded down to the closest valid amount.
*
* Note: phpseclib extends Rijndael (and AES) for using 160- and 224-bit keys but they are officially not defined
* and the most (if not all) implementations are not able using 160/224-bit keys but round/pad them up to
@@ -201,114 +186,72 @@ class Rijndael extends BlockCipher
* This results then in slower encryption.
*
* @access public
- * @throws \LengthException if the key length is invalid
* @param int $length
*/
- public function setKeyLength($length)
+ function setKeyLength($length)
{
- switch ($length) {
- case 128:
- case 160:
- case 192:
- case 224:
- case 256:
- $this->key_length = $length >> 3;
+ switch (true) {
+ case $length <= 128:
+ $this->key_length = 16;
break;
- default:
- throw new \LengthException('Key size of ' . $length . ' bits is not supported by this algorithm. Only keys of sizes 128, 160, 192, 224 or 256 bits are supported');
- }
-
- parent::setKeyLength($length);
- }
-
- /**
- * Sets the key.
- *
- * Rijndael supports five different key lengths
- *
- * @see setKeyLength()
- * @access public
- * @param string $key
- * @throws \LengthException if the key length isn't supported
- */
- public function setKey($key)
- {
- switch (strlen($key)) {
- case 16:
- case 20:
- case 24:
- case 28:
- case 32:
+ case $length <= 160:
+ $this->key_length = 20;
+ break;
+ case $length <= 192:
+ $this->key_length = 24;
+ break;
+ case $length <= 224:
+ $this->key_length = 28;
break;
default:
- throw new \LengthException('Key of size ' . strlen($key) . ' not supported by this algorithm. Only keys of sizes 16, 20, 24, 28 or 32 are supported');
+ $this->key_length = 32;
}
- parent::setKey($key);
+ parent::setKeyLength($length);
}
/**
* Sets the block length
*
- * Valid block lengths are 128, 160, 192, 224, and 256.
+ * Valid block lengths are 128, 160, 192, 224, and 256. If the length is less than 128, it will be rounded up to
+ * 128. If the length is greater than 128 and invalid, it will be rounded down to the closest valid amount.
*
* @access public
* @param int $length
*/
- public function setBlockLength($length)
+ function setBlockLength($length)
{
- switch ($length) {
- case 128:
- case 160:
- case 192:
- case 224:
- case 256:
- break;
- default:
- throw new \LengthException('Key size of ' . $length . ' bits is not supported by this algorithm. Only keys of sizes 128, 160, 192, 224 or 256 bits are supported');
- }
-
- $this->Nb = $length >> 5;
- $this->block_size = $length >> 3;
- $this->changed = $this->nonIVChanged = true;
- $this->setEngine();
+ $length >>= 5;
+ if ($length > 8) {
+ $length = 8;
+ } elseif ($length < 4) {
+ $length = 4;
+ }
+ $this->Nb = $length;
+ $this->block_size = $length << 2;
+ $this->changed = true;
+ $this->_setEngine();
}
/**
* Test for engine validity
*
- * This is mainly just a wrapper to set things up for \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
+ * This is mainly just a wrapper to set things up for \phpseclib\Crypt\Base::isValidEngine()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
+ * @see \phpseclib\Crypt\Base::__construct()
* @param int $engine
- * @access protected
+ * @access public
* @return bool
*/
- protected function isValidEngineHelper($engine)
+ function isValidEngine($engine)
{
switch ($engine) {
- case self::ENGINE_LIBSODIUM:
- return function_exists('sodium_crypto_aead_aes256gcm_is_available') &&
- sodium_crypto_aead_aes256gcm_is_available() &&
- $this->mode == self::MODE_GCM &&
- $this->key_length == 32 &&
- $this->nonce && strlen($this->nonce) == 12 &&
- $this->block_size == 16;
- case self::ENGINE_OPENSSL_GCM:
- if (!extension_loaded('openssl')) {
- return false;
- }
- $methods = openssl_get_cipher_methods();
- return $this->mode == self::MODE_GCM &&
- version_compare(PHP_VERSION, '7.1.0', '>=') &&
- in_array('aes-' . $this->getKeyLength() . '-gcm', $methods) &&
- $this->block_size == 16;
case self::ENGINE_OPENSSL:
if ($this->block_size != 16) {
return false;
}
- self::$cipher_name_openssl_ecb = 'aes-' . ($this->key_length << 3) . '-ecb';
- $this->cipher_name_openssl = 'aes-' . ($this->key_length << 3) . '-' . $this->openssl_translate_mode();
+ $this->cipher_name_openssl_ecb = 'aes-' . ($this->key_length << 3) . '-ecb';
+ $this->cipher_name_openssl = 'aes-' . ($this->key_length << 3) . '-' . $this->_openssl_translate_mode();
break;
case self::ENGINE_MCRYPT:
$this->cipher_name_mcrypt = 'rijndael-' . ($this->block_size << 3);
@@ -318,7 +261,7 @@ class Rijndael extends BlockCipher
}
}
- return parent::isValidEngineHelper($engine);
+ return parent::isValidEngine($engine);
}
/**
@@ -328,11 +271,11 @@ class Rijndael extends BlockCipher
* @param string $in
* @return string
*/
- protected function encryptBlock($in)
+ function _encryptBlock($in)
{
static $tables;
if (empty($tables)) {
- $tables = &$this->getTables();
+ $tables = &$this->_getTables();
}
$t0 = $tables[0];
$t1 = $tables[1];
@@ -340,7 +283,7 @@ class Rijndael extends BlockCipher
$t3 = $tables[3];
$sbox = $tables[4];
- $state = [];
+ $state = array();
$words = unpack('N*', $in);
$c = $this->c;
@@ -362,7 +305,7 @@ class Rijndael extends BlockCipher
// equation (7.4.7) is supposed to use addition instead of subtraction, so we'll do that here, as well.
// [1] http://fp.gladman.plus.com/cryptography_technology/rijndael/aes.spec.v316.pdf
- $temp = [];
+ $temp = array();
for ($round = 1; $round < $Nr; ++$round) {
$i = 0; // $c[0] == 0
$j = $c[1];
@@ -408,7 +351,18 @@ class Rijndael extends BlockCipher
$l = ($l + 1) % $Nb;
}
- return pack('N*', ...$temp);
+ switch ($Nb) {
+ case 8:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3], $temp[4], $temp[5], $temp[6], $temp[7]);
+ case 7:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3], $temp[4], $temp[5], $temp[6]);
+ case 6:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3], $temp[4], $temp[5]);
+ case 5:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3], $temp[4]);
+ default:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3]);
+ }
}
/**
@@ -418,11 +372,11 @@ class Rijndael extends BlockCipher
* @param string $in
* @return string
*/
- protected function decryptBlock($in)
+ function _decryptBlock($in)
{
static $invtables;
if (empty($invtables)) {
- $invtables = &$this->getInvTables();
+ $invtables = &$this->_getInvTables();
}
$dt0 = $invtables[0];
$dt1 = $invtables[1];
@@ -430,7 +384,7 @@ class Rijndael extends BlockCipher
$dt3 = $invtables[3];
$isbox = $invtables[4];
- $state = [];
+ $state = array();
$words = unpack('N*', $in);
$c = $this->c;
@@ -444,7 +398,7 @@ class Rijndael extends BlockCipher
$state[] = $word ^ $dw[++$wc];
}
- $temp = [];
+ $temp = array();
for ($round = $Nr - 1; $round > 0; --$round) {
$i = 0; // $c[0] == 0
$j = $Nb - $c[1];
@@ -487,33 +441,44 @@ class Rijndael extends BlockCipher
$l = ($l + 1) % $Nb;
}
- return pack('N*', ...$temp);
+ switch ($Nb) {
+ case 8:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3], $temp[4], $temp[5], $temp[6], $temp[7]);
+ case 7:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3], $temp[4], $temp[5], $temp[6]);
+ case 6:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3], $temp[4], $temp[5]);
+ case 5:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3], $temp[4]);
+ default:
+ return pack('N*', $temp[0], $temp[1], $temp[2], $temp[3]);
+ }
}
/**
* Setup the key (expansion)
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setupKey()
+ * @see \phpseclib\Crypt\Base::_setupKey()
* @access private
*/
- protected function setupKey()
+ function _setupKey()
{
// Each number in $rcon is equal to the previous number multiplied by two in Rijndael's finite field.
// See http://en.wikipedia.org/wiki/Finite_field_arithmetic#Multiplicative_inverse
- static $rcon = [0,
+ static $rcon = array(0,
0x01000000, 0x02000000, 0x04000000, 0x08000000, 0x10000000,
0x20000000, 0x40000000, 0x80000000, 0x1B000000, 0x36000000,
0x6C000000, 0xD8000000, 0xAB000000, 0x4D000000, 0x9A000000,
0x2F000000, 0x5E000000, 0xBC000000, 0x63000000, 0xC6000000,
0x97000000, 0x35000000, 0x6A000000, 0xD4000000, 0xB3000000,
0x7D000000, 0xFA000000, 0xEF000000, 0xC5000000, 0x91000000
- ];
+ );
if (isset($this->kl['key']) && $this->key === $this->kl['key'] && $this->key_length === $this->kl['key_length'] && $this->block_size === $this->kl['block_size']) {
// already expanded
return;
}
- $this->kl = ['key' => $this->key, 'key_length' => $this->key_length, 'block_size' => $this->block_size];
+ $this->kl = array('key' => $this->key, 'key_length' => $this->key_length, 'block_size' => $this->block_size);
$this->Nk = $this->key_length >> 2;
// see Rijndael-ammended.pdf#page=44
@@ -527,13 +492,13 @@ class Rijndael extends BlockCipher
case 4:
case 5:
case 6:
- $this->c = [0, 1, 2, 3];
+ $this->c = array(0, 1, 2, 3);
break;
case 7:
- $this->c = [0, 1, 2, 4];
+ $this->c = array(0, 1, 2, 4);
break;
case 8:
- $this->c = [0, 1, 3, 4];
+ $this->c = array(0, 1, 3, 4);
}
$w = array_values(unpack('N*words', $this->key));
@@ -547,9 +512,9 @@ class Rijndael extends BlockCipher
// 0xFFFFFFFF << 8 == 0xFFFFFF00, but on a 64-bit machine, it equals 0xFFFFFFFF00. as such, doing 'and'
// with 0xFFFFFFFF (or 0xFFFFFF00) on a 32-bit machine is unnecessary, but on a 64-bit machine, it is.
$temp = (($temp << 8) & 0xFFFFFF00) | (($temp >> 24) & 0x000000FF); // rotWord
- $temp = $this->subWord($temp) ^ $rcon[$i / $this->Nk];
+ $temp = $this->_subWord($temp) ^ $rcon[$i / $this->Nk];
} elseif ($this->Nk > 6 && $i % $this->Nk == 4) {
- $temp = $this->subWord($temp);
+ $temp = $this->_subWord($temp);
}
$w[$i] = $w[$i - $this->Nk] ^ $temp;
}
@@ -561,8 +526,8 @@ class Rijndael extends BlockCipher
// 1. Apply the Key Expansion.
// 2. Apply InvMixColumn to all Round Keys except the first and the last one."
// also, see fips-197.pdf#page=27, "5.3.5 Equivalent Inverse Cipher"
- list($dt0, $dt1, $dt2, $dt3) = $this->getInvTables();
- $temp = $this->w = $this->dw = [];
+ list($dt0, $dt1, $dt2, $dt3) = $this->_getInvTables();
+ $temp = $this->w = $this->dw = array();
for ($i = $row = $col = 0; $i < $length; $i++, $col++) {
if ($col == $this->Nb) {
if ($row == 0) {
@@ -571,7 +536,7 @@ class Rijndael extends BlockCipher
// subWord + invMixColumn + invSubWord = invMixColumn
$j = 0;
while ($j < $this->Nb) {
- $dw = $this->subWord($this->w[$row][$j]);
+ $dw = $this->_subWord($this->w[$row][$j]);
$temp[$j] = $dt0[$dw >> 24 & 0x000000FF] ^
$dt1[$dw >> 16 & 0x000000FF] ^
$dt2[$dw >> 8 & 0x000000FF] ^
@@ -606,15 +571,14 @@ class Rijndael extends BlockCipher
/**
* Performs S-Box substitutions
*
- * @return array
* @access private
* @param int $word
*/
- private function subWord($word)
+ function _subWord($word)
{
static $sbox;
if (empty($sbox)) {
- list(, , , , $sbox) = self::getTables();
+ list(, , , , $sbox) = $this->_getTables();
}
return $sbox[$word & 0x000000FF] |
@@ -626,20 +590,20 @@ class Rijndael extends BlockCipher
/**
* Provides the mixColumns and sboxes tables
*
- * @see self::encryptBlock()
- * @see self::setupInlineCrypt()
- * @see self::subWord()
+ * @see self::_encryptBlock()
+ * @see self::_setupInlineCrypt()
+ * @see self::_subWord()
* @access private
* @return array &$tables
*/
- protected function &getTables()
+ function &_getTables()
{
static $tables;
if (empty($tables)) {
// according to <http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf#page=19> (section 5.2.1),
// precomputed tables can be used in the mixColumns phase. in that example, they're assigned t0...t3, so
// those are the names we'll use.
- $t3 = array_map('intval', [
+ $t3 = array_map('intval', array(
// with array_map('intval', ...) we ensure we have only int's and not
// some slower floats converted by php automatically on high values
0x6363A5C6, 0x7C7C84F8, 0x777799EE, 0x7B7B8DF6, 0xF2F20DFF, 0x6B6BBDD6, 0x6F6FB1DE, 0xC5C55491,
@@ -674,7 +638,7 @@ class Rijndael extends BlockCipher
0x9B9BB62D, 0x1E1E223C, 0x87879215, 0xE9E920C9, 0xCECE4987, 0x5555FFAA, 0x28287850, 0xDFDF7AA5,
0x8C8C8F03, 0xA1A1F859, 0x89898009, 0x0D0D171A, 0xBFBFDA65, 0xE6E631D7, 0x4242C684, 0x6868B8D0,
0x4141C382, 0x9999B029, 0x2D2D775A, 0x0F0F111E, 0xB0B0CB7B, 0x5454FCA8, 0xBBBBD66D, 0x16163A2C
- ]);
+ ));
foreach ($t3 as $t3i) {
$t0[] = (($t3i << 24) & 0xFF000000) | (($t3i >> 8) & 0x00FFFFFF);
@@ -682,14 +646,14 @@ class Rijndael extends BlockCipher
$t2[] = (($t3i << 8) & 0xFFFFFF00) | (($t3i >> 24) & 0x000000FF);
}
- $tables = [
+ $tables = array(
// The Precomputed mixColumns tables t0 - t3
$t0,
$t1,
$t2,
$t3,
// The SubByte S-Box
- [
+ array(
0x63, 0x7C, 0x77, 0x7B, 0xF2, 0x6B, 0x6F, 0xC5, 0x30, 0x01, 0x67, 0x2B, 0xFE, 0xD7, 0xAB, 0x76,
0xCA, 0x82, 0xC9, 0x7D, 0xFA, 0x59, 0x47, 0xF0, 0xAD, 0xD4, 0xA2, 0xAF, 0x9C, 0xA4, 0x72, 0xC0,
0xB7, 0xFD, 0x93, 0x26, 0x36, 0x3F, 0xF7, 0xCC, 0x34, 0xA5, 0xE5, 0xF1, 0x71, 0xD8, 0x31, 0x15,
@@ -706,8 +670,8 @@ class Rijndael extends BlockCipher
0x70, 0x3E, 0xB5, 0x66, 0x48, 0x03, 0xF6, 0x0E, 0x61, 0x35, 0x57, 0xB9, 0x86, 0xC1, 0x1D, 0x9E,
0xE1, 0xF8, 0x98, 0x11, 0x69, 0xD9, 0x8E, 0x94, 0x9B, 0x1E, 0x87, 0xE9, 0xCE, 0x55, 0x28, 0xDF,
0x8C, 0xA1, 0x89, 0x0D, 0xBF, 0xE6, 0x42, 0x68, 0x41, 0x99, 0x2D, 0x0F, 0xB0, 0x54, 0xBB, 0x16
- ]
- ];
+ )
+ );
}
return $tables;
}
@@ -715,17 +679,17 @@ class Rijndael extends BlockCipher
/**
* Provides the inverse mixColumns and inverse sboxes tables
*
- * @see self::decryptBlock()
- * @see self::setupInlineCrypt()
- * @see self::setupKey()
+ * @see self::_decryptBlock()
+ * @see self::_setupInlineCrypt()
+ * @see self::_setupKey()
* @access private
* @return array &$tables
*/
- protected function &getInvTables()
+ function &_getInvTables()
{
static $tables;
if (empty($tables)) {
- $dt3 = array_map('intval', [
+ $dt3 = array_map('intval', array(
0xF4A75051, 0x4165537E, 0x17A4C31A, 0x275E963A, 0xAB6BCB3B, 0x9D45F11F, 0xFA58ABAC, 0xE303934B,
0x30FA5520, 0x766DF6AD, 0xCC769188, 0x024C25F5, 0xE5D7FC4F, 0x2ACBD7C5, 0x35448026, 0x62A38FB5,
0xB15A49DE, 0xBA1B6725, 0xEA0E9845, 0xFEC0E15D, 0x2F7502C3, 0x4CF01281, 0x4697A38D, 0xD3F9C66B,
@@ -758,7 +722,7 @@ class Rijndael extends BlockCipher
0xD2DF599C, 0xF2733F55, 0x14CE7918, 0xC737BF73, 0xF7CDEA53, 0xFDAA5B5F, 0x3D6F14DF, 0x44DB8678,
0xAFF381CA, 0x68C43EB9, 0x24342C38, 0xA3405FC2, 0x1DC37216, 0xE2250CBC, 0x3C498B28, 0x0D9541FF,
0xA8017139, 0x0CB3DE08, 0xB4E49CD8, 0x56C19064, 0xCB84617B, 0x32B670D5, 0x6C5C7448, 0xB85742D0
- ]);
+ ));
foreach ($dt3 as $dt3i) {
$dt0[] = (($dt3i << 24) & 0xFF000000) | (($dt3i >> 8) & 0x00FFFFFF);
@@ -766,14 +730,14 @@ class Rijndael extends BlockCipher
$dt2[] = (($dt3i << 8) & 0xFFFFFF00) | (($dt3i >> 24) & 0x000000FF);
};
- $tables = [
+ $tables = array(
// The Precomputed inverse mixColumns tables dt0 - dt3
$dt0,
$dt1,
$dt2,
$dt3,
// The inverse SubByte S-Box
- [
+ array(
0x52, 0x09, 0x6A, 0xD5, 0x30, 0x36, 0xA5, 0x38, 0xBF, 0x40, 0xA3, 0x9E, 0x81, 0xF3, 0xD7, 0xFB,
0x7C, 0xE3, 0x39, 0x82, 0x9B, 0x2F, 0xFF, 0x87, 0x34, 0x8E, 0x43, 0x44, 0xC4, 0xDE, 0xE9, 0xCB,
0x54, 0x7B, 0x94, 0x32, 0xA6, 0xC2, 0x23, 0x3D, 0xEE, 0x4C, 0x95, 0x0B, 0x42, 0xFA, 0xC3, 0x4E,
@@ -790,8 +754,8 @@ class Rijndael extends BlockCipher
0x60, 0x51, 0x7F, 0xA9, 0x19, 0xB5, 0x4A, 0x0D, 0x2D, 0xE5, 0x7A, 0x9F, 0x93, 0xC9, 0x9C, 0xEF,
0xA0, 0xE0, 0x3B, 0x4D, 0xAE, 0x2A, 0xF5, 0xB0, 0xC8, 0xEB, 0xBB, 0x3C, 0x83, 0x53, 0x99, 0x61,
0x17, 0x2B, 0x04, 0x7E, 0xBA, 0x77, 0xD6, 0x26, 0xE1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0C, 0x7D
- ]
- ];
+ )
+ );
}
return $tables;
}
@@ -799,224 +763,174 @@ class Rijndael extends BlockCipher
/**
* Setup the performance-optimized function for de/encrypt()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setupInlineCrypt()
+ * @see \phpseclib\Crypt\Base::_setupInlineCrypt()
* @access private
*/
- protected function setupInlineCrypt()
+ function _setupInlineCrypt()
{
- $w = $this->w;
- $dw = $this->dw;
- $init_encrypt = '';
- $init_decrypt = '';
+ // Note: _setupInlineCrypt() will be called only if $this->changed === true
+ // So here we are'nt under the same heavy timing-stress as we are in _de/encryptBlock() or de/encrypt().
+ // However...the here generated function- $code, stored as php callback in $this->inline_crypt, must work as fast as even possible.
+
+ $lambda_functions =& self::_getLambdaFunctions();
+
+ // We create max. 10 hi-optimized code for memory reason. Means: For each $key one ultra fast inline-crypt function.
+ // (Currently, for Crypt_Rijndael/AES, one generated $lambda_function cost on php5.5@32bit ~80kb unfreeable mem and ~130kb on php5.5@64bit)
+ // After that, we'll still create very fast optimized code but not the hi-ultimative code, for each $mode one.
+ $gen_hi_opt_code = (bool)(count($lambda_functions) < 10);
+
+ // Generation of a uniqe hash for our generated code
+ $code_hash = "Crypt_Rijndael, {$this->mode}, {$this->Nr}, {$this->Nb}";
+ if ($gen_hi_opt_code) {
+ $code_hash = str_pad($code_hash, 32) . $this->_hashInlineCryptFunction($this->key);
+ }
+
+ if (!isset($lambda_functions[$code_hash])) {
+ switch (true) {
+ case $gen_hi_opt_code:
+ // The hi-optimized $lambda_functions will use the key-words hardcoded for better performance.
+ $w = $this->w;
+ $dw = $this->dw;
+ $init_encrypt = '';
+ $init_decrypt = '';
+ break;
+ default:
+ for ($i = 0, $cw = count($this->w); $i < $cw; ++$i) {
+ $w[] = '$w[' . $i . ']';
+ $dw[] = '$dw[' . $i . ']';
+ }
+ $init_encrypt = '$w = $self->w;';
+ $init_decrypt = '$dw = $self->dw;';
+ }
- $Nr = $this->Nr;
- $Nb = $this->Nb;
- $c = $this->c;
+ $Nr = $this->Nr;
+ $Nb = $this->Nb;
+ $c = $this->c;
- // Generating encrypt code:
- $init_encrypt.= '
- static $tables;
- if (empty($tables)) {
- $tables = &$this->getTables();
+ // Generating encrypt code:
+ $init_encrypt.= '
+ static $tables;
+ if (empty($tables)) {
+ $tables = &$self->_getTables();
+ }
+ $t0 = $tables[0];
+ $t1 = $tables[1];
+ $t2 = $tables[2];
+ $t3 = $tables[3];
+ $sbox = $tables[4];
+ ';
+
+ $s = 'e';
+ $e = 's';
+ $wc = $Nb - 1;
+
+ // Preround: addRoundKey
+ $encrypt_block = '$in = unpack("N*", $in);'."\n";
+ for ($i = 0; $i < $Nb; ++$i) {
+ $encrypt_block .= '$s'.$i.' = $in['.($i + 1).'] ^ '.$w[++$wc].";\n";
}
- $t0 = $tables[0];
- $t1 = $tables[1];
- $t2 = $tables[2];
- $t3 = $tables[3];
- $sbox = $tables[4];
- ';
-
- $s = 'e';
- $e = 's';
- $wc = $Nb - 1;
- // Preround: addRoundKey
- $encrypt_block = '$in = unpack("N*", $in);'."\n";
- for ($i = 0; $i < $Nb; ++$i) {
- $encrypt_block .= '$s'.$i.' = $in['.($i + 1).'] ^ '.$w[++$wc].";\n";
- }
+ // Mainrounds: shiftRows + subWord + mixColumns + addRoundKey
+ for ($round = 1; $round < $Nr; ++$round) {
+ list($s, $e) = array($e, $s);
+ for ($i = 0; $i < $Nb; ++$i) {
+ $encrypt_block.=
+ '$'.$e.$i.' =
+ $t0[($'.$s.$i .' >> 24) & 0xff] ^
+ $t1[($'.$s.(($i + $c[1]) % $Nb).' >> 16) & 0xff] ^
+ $t2[($'.$s.(($i + $c[2]) % $Nb).' >> 8) & 0xff] ^
+ $t3[ $'.$s.(($i + $c[3]) % $Nb).' & 0xff] ^
+ '.$w[++$wc].";\n";
+ }
+ }
- // Mainrounds: shiftRows + subWord + mixColumns + addRoundKey
- for ($round = 1; $round < $Nr; ++$round) {
- list($s, $e) = [$e, $s];
+ // Finalround: subWord + shiftRows + addRoundKey
for ($i = 0; $i < $Nb; ++$i) {
$encrypt_block.=
'$'.$e.$i.' =
- $t0[($'.$s.$i .' >> 24) & 0xff] ^
- $t1[($'.$s.(($i + $c[1]) % $Nb).' >> 16) & 0xff] ^
- $t2[($'.$s.(($i + $c[2]) % $Nb).' >> 8) & 0xff] ^
- $t3[ $'.$s.(($i + $c[3]) % $Nb).' & 0xff] ^
- '.$w[++$wc].";\n";
+ $sbox[ $'.$e.$i.' & 0xff] |
+ ($sbox[($'.$e.$i.' >> 8) & 0xff] << 8) |
+ ($sbox[($'.$e.$i.' >> 16) & 0xff] << 16) |
+ ($sbox[($'.$e.$i.' >> 24) & 0xff] << 24);'."\n";
}
- }
-
- // Finalround: subWord + shiftRows + addRoundKey
- for ($i = 0; $i < $Nb; ++$i) {
- $encrypt_block.=
- '$'.$e.$i.' =
- $sbox[ $'.$e.$i.' & 0xff] |
- ($sbox[($'.$e.$i.' >> 8) & 0xff] << 8) |
- ($sbox[($'.$e.$i.' >> 16) & 0xff] << 16) |
- ($sbox[($'.$e.$i.' >> 24) & 0xff] << 24);'."\n";
- }
- $encrypt_block .= '$in = pack("N*"'."\n";
- for ($i = 0; $i < $Nb; ++$i) {
- $encrypt_block.= ',
- ($'.$e.$i .' & '.((int)0xFF000000).') ^
- ($'.$e.(($i + $c[1]) % $Nb).' & 0x00FF0000 ) ^
- ($'.$e.(($i + $c[2]) % $Nb).' & 0x0000FF00 ) ^
- ($'.$e.(($i + $c[3]) % $Nb).' & 0x000000FF ) ^
- '.$w[$i]."\n";
- }
- $encrypt_block .= ');';
+ $encrypt_block .= '$in = pack("N*"'."\n";
+ for ($i = 0; $i < $Nb; ++$i) {
+ $encrypt_block.= ',
+ ($'.$e.$i .' & '.((int)0xFF000000).') ^
+ ($'.$e.(($i + $c[1]) % $Nb).' & 0x00FF0000 ) ^
+ ($'.$e.(($i + $c[2]) % $Nb).' & 0x0000FF00 ) ^
+ ($'.$e.(($i + $c[3]) % $Nb).' & 0x000000FF ) ^
+ '.$w[$i]."\n";
+ }
+ $encrypt_block .= ');';
- // Generating decrypt code:
- $init_decrypt.= '
- static $invtables;
- if (empty($invtables)) {
- $invtables = &$this->getInvTables();
+ // Generating decrypt code:
+ $init_decrypt.= '
+ static $invtables;
+ if (empty($invtables)) {
+ $invtables = &$self->_getInvTables();
+ }
+ $dt0 = $invtables[0];
+ $dt1 = $invtables[1];
+ $dt2 = $invtables[2];
+ $dt3 = $invtables[3];
+ $isbox = $invtables[4];
+ ';
+
+ $s = 'e';
+ $e = 's';
+ $wc = $Nb - 1;
+
+ // Preround: addRoundKey
+ $decrypt_block = '$in = unpack("N*", $in);'."\n";
+ for ($i = 0; $i < $Nb; ++$i) {
+ $decrypt_block .= '$s'.$i.' = $in['.($i + 1).'] ^ '.$dw[++$wc].';'."\n";
}
- $dt0 = $invtables[0];
- $dt1 = $invtables[1];
- $dt2 = $invtables[2];
- $dt3 = $invtables[3];
- $isbox = $invtables[4];
- ';
-
- $s = 'e';
- $e = 's';
- $wc = $Nb - 1;
- // Preround: addRoundKey
- $decrypt_block = '$in = unpack("N*", $in);'."\n";
- for ($i = 0; $i < $Nb; ++$i) {
- $decrypt_block .= '$s'.$i.' = $in['.($i + 1).'] ^ '.$dw[++$wc].';'."\n";
- }
+ // Mainrounds: shiftRows + subWord + mixColumns + addRoundKey
+ for ($round = 1; $round < $Nr; ++$round) {
+ list($s, $e) = array($e, $s);
+ for ($i = 0; $i < $Nb; ++$i) {
+ $decrypt_block.=
+ '$'.$e.$i.' =
+ $dt0[($'.$s.$i .' >> 24) & 0xff] ^
+ $dt1[($'.$s.(($Nb + $i - $c[1]) % $Nb).' >> 16) & 0xff] ^
+ $dt2[($'.$s.(($Nb + $i - $c[2]) % $Nb).' >> 8) & 0xff] ^
+ $dt3[ $'.$s.(($Nb + $i - $c[3]) % $Nb).' & 0xff] ^
+ '.$dw[++$wc].";\n";
+ }
+ }
- // Mainrounds: shiftRows + subWord + mixColumns + addRoundKey
- for ($round = 1; $round < $Nr; ++$round) {
- list($s, $e) = [$e, $s];
+ // Finalround: subWord + shiftRows + addRoundKey
for ($i = 0; $i < $Nb; ++$i) {
$decrypt_block.=
'$'.$e.$i.' =
- $dt0[($'.$s.$i .' >> 24) & 0xff] ^
- $dt1[($'.$s.(($Nb + $i - $c[1]) % $Nb).' >> 16) & 0xff] ^
- $dt2[($'.$s.(($Nb + $i - $c[2]) % $Nb).' >> 8) & 0xff] ^
- $dt3[ $'.$s.(($Nb + $i - $c[3]) % $Nb).' & 0xff] ^
- '.$dw[++$wc].";\n";
+ $isbox[ $'.$e.$i.' & 0xff] |
+ ($isbox[($'.$e.$i.' >> 8) & 0xff] << 8) |
+ ($isbox[($'.$e.$i.' >> 16) & 0xff] << 16) |
+ ($isbox[($'.$e.$i.' >> 24) & 0xff] << 24);'."\n";
}
- }
-
- // Finalround: subWord + shiftRows + addRoundKey
- for ($i = 0; $i < $Nb; ++$i) {
- $decrypt_block.=
- '$'.$e.$i.' =
- $isbox[ $'.$e.$i.' & 0xff] |
- ($isbox[($'.$e.$i.' >> 8) & 0xff] << 8) |
- ($isbox[($'.$e.$i.' >> 16) & 0xff] << 16) |
- ($isbox[($'.$e.$i.' >> 24) & 0xff] << 24);'."\n";
- }
- $decrypt_block .= '$in = pack("N*"'."\n";
- for ($i = 0; $i < $Nb; ++$i) {
- $decrypt_block.= ',
- ($'.$e.$i. ' & '.((int)0xFF000000).') ^
- ($'.$e.(($Nb + $i - $c[1]) % $Nb).' & 0x00FF0000 ) ^
- ($'.$e.(($Nb + $i - $c[2]) % $Nb).' & 0x0000FF00 ) ^
- ($'.$e.(($Nb + $i - $c[3]) % $Nb).' & 0x000000FF ) ^
- '.$dw[$i]."\n";
- }
- $decrypt_block .= ');';
-
- $this->inline_crypt = $this->createInlineCryptFunction(
- [
- 'init_crypt' => '',
- 'init_encrypt' => $init_encrypt,
- 'init_decrypt' => $init_decrypt,
- 'encrypt_block' => $encrypt_block,
- 'decrypt_block' => $decrypt_block
- ]
- );
- }
-
- /**
- * Encrypts a message.
- *
- * @see self::decrypt()
- * @see parent::encrypt()
- * @access public
- * @param string $plaintext
- * @return string
- */
- public function encrypt($plaintext)
- {
- $this->setup();
-
- switch ($this->engine) {
- case self::ENGINE_LIBSODIUM:
- $this->newtag = sodium_crypto_aead_aes256gcm_encrypt($plaintext, $this->aad, $this->nonce, $this->key);
- return Strings::shift($this->newtag, strlen($plaintext));
- case self::ENGINE_OPENSSL_GCM:
- return openssl_encrypt(
- $plaintext,
- 'aes-' . $this->getKeyLength() . '-gcm',
- $this->key,
- OPENSSL_RAW_DATA,
- $this->nonce,
- $this->newtag,
- $this->aad
- );
- }
-
- return parent::encrypt($plaintext);
- }
-
- /**
- * Decrypts a message.
- *
- * @see self::encrypt()
- * @see parent::decrypt()
- * @access public
- * @param string $ciphertext
- * @return string
- */
- public function decrypt($ciphertext)
- {
- $this->setup();
-
- switch ($this->engine) {
- case self::ENGINE_LIBSODIUM:
- if ($this->oldtag === false) {
- throw new InsufficientSetupException('Authentication Tag has not been set');
- }
- if (strlen($this->oldtag) != 16) {
- break;
- }
- $plaintext = sodium_crypto_aead_aes256gcm_decrypt($ciphertext . $this->oldtag, $this->aad, $this->nonce, $this->key);
- if ($plaintext === false) {
- $this->oldtag = false;
- throw new BadDecryptionException('Error decrypting ciphertext with libsodium');
- }
- return $plaintext;
- case self::ENGINE_OPENSSL_GCM:
- if ($this->oldtag === false) {
- throw new InsufficientSetupException('Authentication Tag has not been set');
- }
- $plaintext = openssl_decrypt(
- $ciphertext,
- 'aes-' . $this->getKeyLength() . '-gcm',
- $this->key,
- OPENSSL_RAW_DATA,
- $this->nonce,
- $this->oldtag,
- $this->aad
- );
- if ($plaintext === false) {
- $this->oldtag = false;
- throw new BadDecryptionException('Error decrypting ciphertext with OpenSSL');
- }
- return $plaintext;
- }
-
- return parent::decrypt($ciphertext);
+ $decrypt_block .= '$in = pack("N*"'."\n";
+ for ($i = 0; $i < $Nb; ++$i) {
+ $decrypt_block.= ',
+ ($'.$e.$i. ' & '.((int)0xFF000000).') ^
+ ($'.$e.(($Nb + $i - $c[1]) % $Nb).' & 0x00FF0000 ) ^
+ ($'.$e.(($Nb + $i - $c[2]) % $Nb).' & 0x0000FF00 ) ^
+ ($'.$e.(($Nb + $i - $c[3]) % $Nb).' & 0x000000FF ) ^
+ '.$dw[$i]."\n";
+ }
+ $decrypt_block .= ');';
+
+ $lambda_functions[$code_hash] = $this->_createInlineCryptFunction(
+ array(
+ 'init_crypt' => '',
+ 'init_encrypt' => $init_encrypt,
+ 'init_decrypt' => $init_decrypt,
+ 'encrypt_block' => $encrypt_block,
+ 'decrypt_block' => $decrypt_block
+ )
+ );
+ }
+ $this->inline_crypt = $lambda_functions[$code_hash];
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Salsa20.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Salsa20.php
deleted file mode 100644
index d76af6af0..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Salsa20.php
+++ /dev/null
@@ -1,529 +0,0 @@
-<?php
-
-/**
- * Pure-PHP implementation of Salsa20.
- *
- * PHP version 5
- *
- * @category Crypt
- * @package Salsa20
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2019 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\StreamCipher;
-use phpseclib3\Exception\InsufficientSetupException;
-use phpseclib3\Exception\BadDecryptionException;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * Pure-PHP implementation of Salsa20.
- *
- * @package Salsa20
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Salsa20 extends StreamCipher
-{
- /**
- * Part 1 of the state
- *
- * @var string|false
- */
- protected $p1 = false;
-
- /**
- * Part 2 of the state
- *
- * @var string|false
- */
- protected $p2 = false;
-
- /**
- * Key Length (in bytes)
- *
- * @var int
- */
- protected $key_length = 32; // = 256 bits
-
- /**
- * @access private
- * @see \phpseclib3\Crypt\Salsa20::crypt()
- */
- const ENCRYPT = 0;
-
- /**
- * @access private
- * @see \phpseclib3\Crypt\Salsa20::crypt()
- */
- const DECRYPT = 1;
-
- /**
- * Encryption buffer for continuous mode
- *
- * @var array
- */
- protected $enbuffer;
-
- /**
- * Decryption buffer for continuous mode
- *
- * @var array
- */
- protected $debuffer;
-
- /**
- * Counter
- *
- * @var int
- */
- protected $counter = 0;
-
- /**
- * Using Generated Poly1305 Key
- *
- * @var boolean
- */
- protected $usingGeneratedPoly1305Key = false;
-
- /**
- * Salsa20 uses a nonce
- *
- * @return bool
- */
- public function usesNonce()
- {
- return true;
- }
-
- /**
- * Sets the key.
- *
- * @param string $key
- * @throws \LengthException if the key length isn't supported
- */
- public function setKey($key)
- {
- switch (strlen($key)) {
- case 16:
- case 32:
- break;
- default:
- throw new \LengthException('Key of size ' . strlen($key) . ' not supported by this algorithm. Only keys of sizes 16 or 32 are supported');
- }
-
- parent::setKey($key);
- }
-
- /**
- * Sets the nonce.
- *
- * @param string $nonce
- */
- public function setNonce($nonce)
- {
- if (strlen($nonce) != 8) {
- throw new \LengthException('Nonce of size ' . strlen($key) . ' not supported by this algorithm. Only an 64-bit nonce is supported');
- }
-
- $this->nonce = $nonce;
- $this->changed = true;
- $this->setEngine();
- }
-
- /**
- * Sets the counter.
- *
- * @param int $counter
- */
- public function setCounter($counter)
- {
- $this->counter = $counter;
- $this->setEngine();
- }
-
- /**
- * Creates a Poly1305 key using the method discussed in RFC8439
- *
- * See https://tools.ietf.org/html/rfc8439#section-2.6.1
- */
- protected function createPoly1305Key()
- {
- if ($this->nonce === false) {
- throw new InsufficientSetupException('No nonce has been defined');
- }
-
- if ($this->key === false) {
- throw new InsufficientSetupException('No key has been defined');
- }
-
- $c = clone $this;
- $c->setCounter(0);
- $c->usePoly1305 = false;
- $block = $c->encrypt(str_repeat("\0", 256));
- $this->setPoly1305Key(substr($block, 0, 32));
-
- if ($this->counter == 0) {
- $this->counter++;
- }
- }
-
- /**
- * Setup the self::ENGINE_INTERNAL $engine
- *
- * (re)init, if necessary, the internal cipher $engine
- *
- * _setup() will be called each time if $changed === true
- * typically this happens when using one or more of following public methods:
- *
- * - setKey()
- *
- * - setNonce()
- *
- * - First run of encrypt() / decrypt() with no init-settings
- *
- * @see self::setKey()
- * @see self::setNonce()
- * @see self::disableContinuousBuffer()
- */
- protected function setup()
- {
- if (!$this->changed) {
- return;
- }
-
- $this->enbuffer = $this->debuffer = ['ciphertext' => '', 'counter' => $this->counter];
-
- $this->changed = $this->nonIVChanged = false;
-
- if ($this->nonce === false) {
- throw new InsufficientSetupException('No nonce has been defined');
- }
-
- if ($this->key === false) {
- throw new InsufficientSetupException('No key has been defined');
- }
-
- if ($this->usePoly1305 && !isset($this->poly1305Key)) {
- $this->usingGeneratedPoly1305Key = true;
- $this->createPoly1305Key();
- }
-
- $key = $this->key;
- if (strlen($key) == 16) {
- $constant = 'expand 16-byte k';
- $key.= $key;
- } else {
- $constant = 'expand 32-byte k';
- }
-
- $this->p1 = substr($constant, 0, 4) .
- substr($key, 0, 16) .
- substr($constant, 4, 4) .
- $this->nonce .
- "\0\0\0\0";
- $this->p2 = substr($constant, 8, 4) .
- substr($key, 16, 16) .
- substr($constant, 12, 4);
- }
-
- /**
- * Setup the key (expansion)
- */
- protected function setupKey()
- {
- // Salsa20 does not utilize this method
- }
-
- /**
- * Encrypts a message.
- *
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
- * @see self::crypt()
- * @param string $plaintext
- * @return string $ciphertext
- */
- public function encrypt($plaintext)
- {
- $ciphertext = $this->crypt($plaintext, self::ENCRYPT);
- if (isset($this->poly1305Key)) {
- $this->newtag = $this->poly1305($ciphertext);
- }
- return $ciphertext;
- }
-
- /**
- * Decrypts a message.
- *
- * $this->decrypt($this->encrypt($plaintext)) == $this->encrypt($this->encrypt($plaintext)).
- * At least if the continuous buffer is disabled.
- *
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
- * @see self::crypt()
- * @param string $ciphertext
- * @return string $plaintext
- */
- public function decrypt($ciphertext)
- {
- if (isset($this->poly1305Key)) {
- if ($this->oldtag === false) {
- throw new InsufficientSetupException('Authentication Tag has not been set');
- }
- $newtag = $this->poly1305($ciphertext);
- if ($this->oldtag != substr($newtag, 0, strlen($this->oldtag))) {
- $this->oldtag = false;
- throw new BadDecryptionException('Derived authentication tag and supplied authentication tag do not match');
- }
- $this->oldtag = false;
- }
-
- return $this->crypt($ciphertext, self::DECRYPT);
- }
-
- /**
- * Encrypts a block
- *
- * @param string $in
- */
- protected function encryptBlock($in)
- {
- // Salsa20 does not utilize this method
- }
-
- /**
- * Decrypts a block
- *
- * @param string $in
- */
- protected function decryptBlock($in)
- {
- // Salsa20 does not utilize this method
- }
-
- /**
- * Encrypts or decrypts a message.
- *
- * @see self::encrypt()
- * @see self::decrypt()
- * @param string $text
- * @param int $mode
- * @return string $text
- */
- private function crypt($text, $mode)
- {
- $this->setup();
- if (!$this->continuousBuffer) {
- if ($this->engine == self::ENGINE_OPENSSL) {
- $iv = pack('V', $this->counter) . $this->p2;
- return openssl_encrypt(
- $text,
- $this->cipher_name_openssl,
- $this->key,
- OPENSSL_RAW_DATA,
- $iv
- );
- }
- $i = $this->counter;
- $blocks = str_split($text, 64);
- foreach ($blocks as &$block) {
- $block^= static::salsa20($this->p1 . pack('V', $i++) . $this->p2);
- }
-
- return implode('', $blocks);
- }
-
- if ($mode == self::ENCRYPT) {
- $buffer = &$this->enbuffer;
- } else {
- $buffer = &$this->debuffer;
- }
- if (strlen($buffer['ciphertext'])) {
- $ciphertext = $text ^ Strings::shift($buffer['ciphertext'], strlen($text));
- $text = substr($text, strlen($ciphertext));
- if (!strlen($text)) {
- return $ciphertext;
- }
- }
-
- $overflow = strlen($text) % 64; // & 0x3F
- if ($overflow) {
- $text2 = Strings::pop($text, $overflow);
- if ($this->engine == self::ENGINE_OPENSSL) {
- $iv = pack('V', $buffer['counter']) . $this->p2;
- // at this point $text should be a multiple of 64
- $buffer['counter']+= (strlen($text) >> 6) + 1; // ie. divide by 64
- $encrypted = openssl_encrypt(
- $text . str_repeat("\0", 64),
- $this->cipher_name_openssl,
- $this->key,
- OPENSSL_RAW_DATA,
- $iv
- );
- $temp = Strings::pop($encrypted, 64);
- } else {
- $blocks = str_split($text, 64);
- if (strlen($text)) {
- foreach ($blocks as &$block) {
- $block^= static::salsa20($this->p1 . pack('V', $buffer['counter']++) . $this->p2);
- }
- }
- $encrypted = implode('', $blocks);
- $temp = static::salsa20($this->p1 . pack('V', $buffer['counter']++) . $this->p2);
- }
- $ciphertext.= $encrypted . ($text2 ^ $temp);
- $buffer['ciphertext'] = substr($temp, $overflow);
- } elseif (!strlen($buffer['ciphertext'])) {
- if ($this->engine == self::ENGINE_OPENSSL) {
- $iv = pack('V', $buffer['counter']) . $this->p2;
- $buffer['counter']+= (strlen($text) >> 6);
- $ciphertext.= openssl_encrypt(
- $text,
- $this->cipher_name_openssl,
- $this->key,
- OPENSSL_RAW_DATA,
- $iv
- );
- } else {
- $blocks = str_split($text, 64);
- foreach ($blocks as &$block) {
- $block^= static::salsa20($this->p1 . pack('V', $buffer['counter']++) . $this->p2);
- }
- $ciphertext.= implode('', $blocks);
- }
- }
-
- return $ciphertext;
- }
-
- /**
- * Left Rotate
- *
- * @param int $x
- * @param int $n
- * @return int
- */
- protected static function leftRotate($x, $n)
- {
- $r1 = $x << $n;
- if (PHP_INT_SIZE == 8) {
- $r1&= 0xFFFFFFFF;
- $r2 = ($x & 0xFFFFFFFF) >> (32 - $n);
- } else {
- $r2 = $x >> (32 - $n);
- $r2&= (1 << $n) - 1;
- }
- return $r1 | $r2;
- }
-
- /**
- * The quarterround function
- *
- * @param int $a
- * @param int $b
- * @param int $c
- * @param int $d
- */
- protected static function quarterRound(&$a, &$b, &$c, &$d)
- {
- $b^= self::leftRotate($a + $d, 7);
- $c^= self::leftRotate($b + $a, 9);
- $d^= self::leftRotate($c + $b, 13);
- $a^= self::leftRotate($d + $c, 18);
- }
-
- /**
- * The doubleround function
- *
- * @param int $x0 (by reference)
- * @param int $x1 (by reference)
- * @param int $x2 (by reference)
- * @param int $x3 (by reference)
- * @param int $x4 (by reference)
- * @param int $x5 (by reference)
- * @param int $x6 (by reference)
- * @param int $x7 (by reference)
- * @param int $x8 (by reference)
- * @param int $x9 (by reference)
- * @param int $x10 (by reference)
- * @param int $x11 (by reference)
- * @param int $x12 (by reference)
- * @param int $x13 (by reference)
- * @param int $x14 (by reference)
- * @param int $x15 (by reference)
- */
- protected static function doubleRound(&$x0, &$x1, &$x2, &$x3, &$x4, &$x5, &$x6, &$x7, &$x8, &$x9, &$x10, &$x11, &$x12, &$x13, &$x14, &$x15)
- {
- // columnRound
- static::quarterRound( $x0, $x4, $x8, $x12);
- static::quarterRound( $x5, $x9, $x13, $x1);
- static::quarterRound($x10, $x14, $x2, $x6);
- static::quarterRound($x15, $x3, $x7, $x11);
- // rowRound
- static::quarterRound( $x0, $x1, $x2, $x3);
- static::quarterRound( $x5, $x6, $x7, $x4);
- static::quarterRound($x10, $x11, $x8, $x9);
- static::quarterRound($x15, $x12, $x13, $x14);
- }
-
- /**
- * The Salsa20 hash function function
- *
- * @param string $x
- */
- protected static function salsa20($x)
- {
- $z = $x = unpack('V*', $x);
- for ($i = 0; $i < 10; $i++) {
- static::doubleRound(...$z);
- }
-
- for ($i = 1; $i <= 16; $i++) {
- $x[$i]+= $z[$i];
- }
-
- return pack('V*', ...$x);
- }
-
- /**
- * Calculates Poly1305 MAC
- *
- * @see self::decrypt()
- * @see self::encrypt()
- * @access private
- * @param string $ciphertext
- * @return string
- */
- protected function poly1305($ciphertext)
- {
- if (!$this->usingGeneratedPoly1305Key) {
- return parent::poly1305($this->aad . $ciphertext);
- } else {
- /*
- sodium_crypto_aead_chacha20poly1305_encrypt does not calculate the poly1305 tag
- the same way sodium_crypto_aead_chacha20poly1305_ietf_encrypt does. you can see
- how the latter encrypts it in Salsa20::encrypt(). here's how the former encrypts
- it:
-
- $this->newtag = $this->poly1305(
- $this->aad .
- pack('V', strlen($this->aad)) . "\0\0\0\0" .
- $ciphertext .
- pack('V', strlen($ciphertext)) . "\0\0\0\0"
- );
-
- phpseclib opts to use the IETF construction, even when the nonce is 64-bits
- instead of 96-bits
- */
- return parent::poly1305(
- self::nullPad128($this->aad) .
- self::nullPad128($ciphertext) .
- pack('V', strlen($this->aad)) . "\0\0\0\0" .
- pack('V', strlen($ciphertext)) . "\0\0\0\0"
- );
- }
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php
index 2c98d6392..a2c41668a 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/TripleDES.php
@@ -12,7 +12,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $des = new \phpseclib3\Crypt\TripleDES();
+ * $des = new \phpseclib\Crypt\TripleDES();
*
* $des->setKey('abcdefghijklmnopqrstuvwx');
*
@@ -34,7 +34,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
+namespace phpseclib\Crypt;
/**
* Pure-PHP implementation of Triple DES.
@@ -55,47 +55,57 @@ class TripleDES extends DES
/**
* Encrypt / decrypt using outer chaining
*
- * Outer chaining is used by SSH-2 and when the mode is set to \phpseclib3\Crypt\Common\BlockCipher::MODE_CBC.
+ * Outer chaining is used by SSH-2 and when the mode is set to \phpseclib\Crypt\Base::MODE_CBC.
*/
- const MODE_CBC3 = self::MODE_CBC;
+ const MODE_CBC3 = Base::MODE_CBC;
/**
* Key Length (in bytes)
*
- * @see \phpseclib3\Crypt\TripleDES::setKeyLength()
+ * @see \phpseclib\Crypt\TripleDES::setKeyLength()
* @var int
* @access private
*/
- protected $key_length = 24;
+ var $key_length = 24;
+
+ /**
+ * The default salt used by setPassword()
+ *
+ * @see \phpseclib\Crypt\Base::password_default_salt
+ * @see \phpseclib\Crypt\Base::setPassword()
+ * @var string
+ * @access private
+ */
+ var $password_default_salt = 'phpseclib';
/**
* The mcrypt specific name of the cipher
*
- * @see \phpseclib3\Crypt\DES::cipher_name_mcrypt
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cipher_name_mcrypt
+ * @see \phpseclib\Crypt\DES::cipher_name_mcrypt
+ * @see \phpseclib\Crypt\Base::cipher_name_mcrypt
* @var string
* @access private
*/
- protected $cipher_name_mcrypt = 'tripledes';
+ var $cipher_name_mcrypt = 'tripledes';
/**
* Optimizing value while CFB-encrypting
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cfb_init_len
+ * @see \phpseclib\Crypt\Base::cfb_init_len
* @var int
* @access private
*/
- protected $cfb_init_len = 750;
+ var $cfb_init_len = 750;
/**
* max possible size of $key
*
* @see self::setKey()
- * @see \phpseclib3\Crypt\DES::setKey()
+ * @see \phpseclib\Crypt\DES::setKey()
* @var string
* @access private
*/
- protected $key_length_max = 24;
+ var $key_length_max = 24;
/**
* Internal flag whether using self::MODE_3CBC or not
@@ -103,108 +113,103 @@ class TripleDES extends DES
* @var bool
* @access private
*/
- private $mode_3cbc;
+ var $mode_3cbc;
/**
- * The \phpseclib3\Crypt\DES objects
+ * The \phpseclib\Crypt\DES objects
*
* Used only if $mode_3cbc === true
*
* @var array
* @access private
*/
- private $des;
+ var $des;
/**
* Default Constructor.
*
- * Determines whether or not the mcrypt or OpenSSL extensions should be used.
+ * Determines whether or not the mcrypt extension should be used.
*
* $mode could be:
*
- * - ecb
+ * - \phpseclib\Crypt\Base::MODE_ECB
*
- * - cbc
+ * - \phpseclib\Crypt\Base::MODE_CBC
*
- * - ctr
+ * - \phpseclib\Crypt\Base::MODE_CTR
*
- * - cfb
+ * - \phpseclib\Crypt\Base::MODE_CFB
*
- * - ofb
+ * - \phpseclib\Crypt\Base::MODE_OFB
*
- * - 3cbc
+ * - \phpseclib\Crypt\TripleDES::MODE_3CBC
*
- * - cbc3 (same as cbc)
+ * If not explicitly set, \phpseclib\Crypt\Base::MODE_CBC will be used.
*
- * @see \phpseclib3\Crypt\DES::__construct()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- * @param string $mode
+ * @see \phpseclib\Crypt\DES::__construct()
+ * @see \phpseclib\Crypt\Base::__construct()
+ * @param int $mode
* @access public
*/
- public function __construct($mode)
+ function __construct($mode = Base::MODE_CBC)
{
- switch (strtolower($mode)) {
+ switch ($mode) {
// In case of self::MODE_3CBC, we init as CRYPT_DES_MODE_CBC
// and additional flag us internally as 3CBC
- case '3cbc':
- parent::__construct('cbc');
+ case self::MODE_3CBC:
+ parent::__construct(Base::MODE_CBC);
$this->mode_3cbc = true;
// This three $des'es will do the 3CBC work (if $key > 64bits)
- $this->des = [
- new DES('cbc'),
- new DES('cbc'),
- new DES('cbc'),
- ];
+ $this->des = array(
+ new DES(Base::MODE_CBC),
+ new DES(Base::MODE_CBC),
+ new DES(Base::MODE_CBC),
+ );
- // we're going to be doing the padding, ourselves, so disable it in the \phpseclib3\Crypt\DES objects
+ // we're going to be doing the padding, ourselves, so disable it in the \phpseclib\Crypt\DES objects
$this->des[0]->disablePadding();
$this->des[1]->disablePadding();
$this->des[2]->disablePadding();
break;
- case 'cbc3':
- $mode = 'cbc';
// If not 3CBC, we init as usual
default:
parent::__construct($mode);
-
- if ($this->mode == self::MODE_STREAM) {
- throw new BadModeException('Block ciphers cannot be ran in stream mode');
- }
}
}
/**
* Test for engine validity
*
- * This is mainly just a wrapper to set things up for \phpseclib3\Crypt\Common\SymmetricKey::isValidEngine()
+ * This is mainly just a wrapper to set things up for \phpseclib\Crypt\Base::isValidEngine()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
+ * @see \phpseclib\Crypt\Base::__construct()
* @param int $engine
- * @access protected
+ * @access public
* @return bool
*/
- protected function isValidEngineHelper($engine)
+ function isValidEngine($engine)
{
if ($engine == self::ENGINE_OPENSSL) {
- self::$cipher_name_openssl_ecb = 'des-ede3';
- $mode = $this->openssl_translate_mode();
+ $this->cipher_name_openssl_ecb = 'des-ede3';
+ $mode = $this->_openssl_translate_mode();
$this->cipher_name_openssl = $mode == 'ecb' ? 'des-ede3' : 'des-ede3-' . $mode;
}
- return parent::isValidEngineHelper($engine);
+ return parent::isValidEngine($engine);
}
/**
- * Sets the initialization vector.
+ * Sets the initialization vector. (optional)
*
- * SetIV is not required when \phpseclib3\Crypt\Common\SymmetricKey::MODE_ECB is being used.
+ * SetIV is not required when \phpseclib\Crypt\Base::MODE_ECB is being used. If not explicitly set, it'll be assumed
+ * to be all zero's.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setIV()
+ * @see \phpseclib\Crypt\Base::setIV()
* @access public
* @param string $iv
*/
- public function setIV($iv)
+ function setIV($iv)
{
parent::setIV($iv);
if ($this->mode_3cbc) {
@@ -217,23 +222,24 @@ class TripleDES extends DES
/**
* Sets the key length.
*
- * Valid key lengths are 128 and 192 bits.
- *
- * If you want to use a 64-bit key use DES.php
+ * Valid key lengths are 64, 128 and 192
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey:setKeyLength()
+ * @see \phpseclib\Crypt\Base:setKeyLength()
* @access public
- * @throws \LengthException if the key length is invalid
* @param int $length
*/
- public function setKeyLength($length)
+ function setKeyLength($length)
{
- switch ($length) {
- case 128:
- case 192:
+ $length >>= 3;
+ switch (true) {
+ case $length <= 8:
+ $this->key_length = 8;
+ break;
+ case $length <= 16:
+ $this->key_length = 16;
break;
default:
- throw new \LengthException('Key size of ' . $length . ' bits is not supported by this algorithm. Only keys of sizes 128 or 192 bits are supported');
+ $this->key_length = 24;
}
parent::setKeyLength($length);
@@ -242,39 +248,36 @@ class TripleDES extends DES
/**
* Sets the key.
*
- * Triple DES can use 128-bit (eg. strlen($key) == 16) or 192-bit (eg. strlen($key) == 24) keys.
+ * Keys can be of any length. Triple DES, itself, can use 128-bit (eg. strlen($key) == 16) or
+ * 192-bit (eg. strlen($key) == 24) keys. This function pads and truncates $key as appropriate.
*
* DES also requires that every eighth bit be a parity bit, however, we'll ignore that.
*
+ * If the key is not explicitly set, it'll be assumed to be all null bytes.
+ *
* @access public
- * @see \phpseclib3\Crypt\DES::setKey()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setKey()
- * @throws \LengthException if the key length is invalid
+ * @see \phpseclib\Crypt\DES::setKey()
+ * @see \phpseclib\Crypt\Base::setKey()
* @param string $key
*/
- public function setKey($key)
+ function setKey($key)
{
- if ($this->explicit_key_length !== false && strlen($key) != $this->explicit_key_length) {
- throw new \LengthException('Key length has already been set to ' . $this->explicit_key_length . ' bytes and this key is ' . strlen($key) . ' bytes');
- }
-
- switch (strlen($key)) {
- case 16:
- $key.= substr($key, 0, 8);
- break;
- case 24:
- break;
- default:
- throw new \LengthException('Key of size ' . strlen($key) . ' not supported by this algorithm. Only keys of sizes 16 or 24 are supported');
+ $length = $this->explicit_key_length ? $this->key_length : strlen($key);
+ if ($length > 8) {
+ $key = str_pad(substr($key, 0, 24), 24, chr(0));
+ // if $key is between 64 and 128-bits, use the first 64-bits as the last, per this:
+ // http://php.net/function.mcrypt-encrypt#47973
+ $key = $length <= 16 ? substr_replace($key, substr($key, 0, 8), 16) : substr($key, 0, 24);
+ } else {
+ $key = str_pad($key, 8, chr(0));
}
+ parent::setKey($key);
- // copied from self::setKey()
- $this->key = $key;
- $this->key_length = strlen($key);
- $this->changed = $this->nonIVChanged = true;
- $this->setEngine();
-
- if ($this->mode_3cbc) {
+ // And in case of self::MODE_3CBC:
+ // if key <= 64bits we not need the 3 $des to work,
+ // because we will then act as regular DES-CBC with just a <= 64bit key.
+ // So only if the key > 64bits (> 8 bytes) we will call setKey() for the 3 $des.
+ if ($this->mode_3cbc && $length > 8) {
$this->des[0]->setKey(substr($key, 0, 8));
$this->des[1]->setKey(substr($key, 8, 8));
$this->des[2]->setKey(substr($key, 16, 8));
@@ -284,12 +287,12 @@ class TripleDES extends DES
/**
* Encrypts a message.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::encrypt()
+ * @see \phpseclib\Crypt\Base::encrypt()
* @access public
* @param string $plaintext
* @return string $cipertext
*/
- public function encrypt($plaintext)
+ function encrypt($plaintext)
{
// parent::en/decrypt() is able to do all the work for all modes and keylengths,
// except for: self::MODE_3CBC (inner chaining CBC) with a key > 64bits
@@ -299,7 +302,7 @@ class TripleDES extends DES
return $this->des[2]->encrypt(
$this->des[1]->decrypt(
$this->des[0]->encrypt(
- $this->pad($plaintext)
+ $this->_pad($plaintext)
)
)
);
@@ -311,15 +314,15 @@ class TripleDES extends DES
/**
* Decrypts a message.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::decrypt()
+ * @see \phpseclib\Crypt\Base::decrypt()
* @access public
* @param string $ciphertext
* @return string $plaintext
*/
- public function decrypt($ciphertext)
+ function decrypt($ciphertext)
{
if ($this->mode_3cbc && strlen($this->key) > 8) {
- return $this->unpad(
+ return $this->_unpad(
$this->des[0]->decrypt(
$this->des[1]->encrypt(
$this->des[2]->decrypt(
@@ -362,16 +365,16 @@ class TripleDES extends DES
* outputs. The reason is due to the fact that the initialization vector's change after every encryption /
* decryption round when the continuous buffer is enabled. When it's disabled, they remain constant.
*
- * Put another way, when the continuous buffer is enabled, the state of the \phpseclib3\Crypt\DES() object changes after each
+ * Put another way, when the continuous buffer is enabled, the state of the \phpseclib\Crypt\DES() object changes after each
* encryption / decryption round, whereas otherwise, it'd remain constant. For this reason, it's recommended that
* continuous buffers not be used. They do offer better security and are, in fact, sometimes required (SSH uses them),
* however, they are also less intuitive and more likely to cause you problems.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::enableContinuousBuffer()
+ * @see \phpseclib\Crypt\Base::enableContinuousBuffer()
* @see self::disableContinuousBuffer()
* @access public
*/
- public function enableContinuousBuffer()
+ function enableContinuousBuffer()
{
parent::enableContinuousBuffer();
if ($this->mode_3cbc) {
@@ -386,11 +389,11 @@ class TripleDES extends DES
*
* The default behavior.
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::disableContinuousBuffer()
+ * @see \phpseclib\Crypt\Base::disableContinuousBuffer()
* @see self::enableContinuousBuffer()
* @access public
*/
- public function disableContinuousBuffer()
+ function disableContinuousBuffer()
{
parent::disableContinuousBuffer();
if ($this->mode_3cbc) {
@@ -403,11 +406,11 @@ class TripleDES extends DES
/**
* Creates the key schedule
*
- * @see \phpseclib3\Crypt\DES::setupKey()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setupKey()
+ * @see \phpseclib\Crypt\DES::_setupKey()
+ * @see \phpseclib\Crypt\Base::_setupKey()
* @access private
*/
- protected function setupKey()
+ function _setupKey()
{
switch (true) {
// if $key <= 64bits we configure our internal pure-php cipher engine
@@ -422,28 +425,29 @@ class TripleDES extends DES
// (only) if 3CBC is used we have, of course, to setup the $des[0-2] keys also separately.
if ($this->mode_3cbc) {
- $this->des[0]->setupKey();
- $this->des[1]->setupKey();
- $this->des[2]->setupKey();
+ $this->des[0]->_setupKey();
+ $this->des[1]->_setupKey();
+ $this->des[2]->_setupKey();
// because $des[0-2] will, now, do all the work we can return here
- // not need unnecessary stress parent::setupKey() with our, now unused, $key.
+ // not need unnecessary stress parent::_setupKey() with our, now unused, $key.
return;
}
}
// setup our key
- parent::setupKey();
+ parent::_setupKey();
}
/**
* Sets the internal crypt engine
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::__construct()
- * @see \phpseclib3\Crypt\Common\SymmetricKey::setPreferredEngine()
+ * @see \phpseclib\Crypt\Base::__construct()
+ * @see \phpseclib\Crypt\Base::setPreferredEngine()
* @param int $engine
* @access public
+ * @return int
*/
- public function setPreferredEngine($engine)
+ function setPreferredEngine($engine)
{
if ($this->mode_3cbc) {
$this->des[0]->setPreferredEngine($engine);
@@ -451,6 +455,6 @@ class TripleDES extends DES
$this->des[2]->setPreferredEngine($engine);
}
- parent::setPreferredEngine($engine);
+ return parent::setPreferredEngine($engine);
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php
index c9cc5b46c..70980a2ff 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Crypt/Twofish.php
@@ -16,7 +16,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $twofish = new \phpseclib3\Crypt\Twofish();
+ * $twofish = new \phpseclib\Crypt\Twofish();
*
* $twofish->setKey('12345678901234567890123456789012');
*
@@ -35,10 +35,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Crypt;
-
-use phpseclib3\Crypt\Common\BlockCipher;
-use phpseclib3\Exception\BadModeException;
+namespace phpseclib\Crypt;
/**
* Pure-PHP implementation of Twofish.
@@ -48,25 +45,25 @@ use phpseclib3\Exception\BadModeException;
* @author Hans-Juergen Petrich <petrich@tronic-media.com>
* @access public
*/
-class Twofish extends BlockCipher
+class Twofish extends Base
{
/**
* The mcrypt specific name of the cipher
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cipher_name_mcrypt
+ * @see \phpseclib\Crypt\Base::cipher_name_mcrypt
* @var string
* @access private
*/
- protected $cipher_name_mcrypt = 'twofish';
+ var $cipher_name_mcrypt = 'twofish';
/**
* Optimizing value while CFB-encrypting
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::cfb_init_len
+ * @see \phpseclib\Crypt\Base::cfb_init_len
* @var int
* @access private
*/
- protected $cfb_init_len = 800;
+ var $cfb_init_len = 800;
/**
* Q-Table
@@ -74,7 +71,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private static $q0 = [
+ var $q0 = array(
0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76,
0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1, 0x38,
0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C,
@@ -107,7 +104,7 @@ class Twofish extends BlockCipher
0xC8, 0xA8, 0x2B, 0x40, 0xDC, 0xFE, 0x32, 0xA4,
0xCA, 0x10, 0x21, 0xF0, 0xD3, 0x5D, 0x0F, 0x00,
0x6F, 0x9D, 0x36, 0x42, 0x4A, 0x5E, 0xC1, 0xE0
- ];
+ );
/**
* Q-Table
@@ -115,7 +112,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private static $q1 = [
+ var $q1 = array(
0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8,
0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8, 0x4B,
0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1,
@@ -148,7 +145,7 @@ class Twofish extends BlockCipher
0x12, 0xA2, 0x0D, 0x52, 0xBB, 0x02, 0x2F, 0xA9,
0xD7, 0x61, 0x1E, 0xB4, 0x50, 0x04, 0xF6, 0xC2,
0x16, 0x25, 0x86, 0x56, 0x55, 0x09, 0xBE, 0x91
- ];
+ );
/**
* M-Table
@@ -156,7 +153,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private static $m0 = [
+ var $m0 = array(
0xBCBC3275, 0xECEC21F3, 0x202043C6, 0xB3B3C9F4, 0xDADA03DB, 0x02028B7B, 0xE2E22BFB, 0x9E9EFAC8,
0xC9C9EC4A, 0xD4D409D3, 0x18186BE6, 0x1E1E9F6B, 0x98980E45, 0xB2B2387D, 0xA6A6D2E8, 0x2626B74B,
0x3C3C57D6, 0x93938A32, 0x8282EED8, 0x525298FD, 0x7B7BD437, 0xBBBB3771, 0x5B5B97F1, 0x474783E1,
@@ -189,7 +186,7 @@ class Twofish extends BlockCipher
0xABABA212, 0x6F6F3EA2, 0xE6E6540D, 0xDBDBF252, 0x92927BBB, 0xB7B7B602, 0x6969CA2F, 0x3939D9A9,
0xD3D30CD7, 0xA7A72361, 0xA2A2AD1E, 0xC3C399B4, 0x6C6C4450, 0x07070504, 0x04047FF6, 0x272746C2,
0xACACA716, 0xD0D07625, 0x50501386, 0xDCDCF756, 0x84841A55, 0xE1E15109, 0x7A7A25BE, 0x1313EF91
- ];
+ );
/**
* M-Table
@@ -197,7 +194,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private static $m1 = [
+ var $m1 = array(
0xA9D93939, 0x67901717, 0xB3719C9C, 0xE8D2A6A6, 0x04050707, 0xFD985252, 0xA3658080, 0x76DFE4E4,
0x9A084545, 0x92024B4B, 0x80A0E0E0, 0x78665A5A, 0xE4DDAFAF, 0xDDB06A6A, 0xD1BF6363, 0x38362A2A,
0x0D54E6E6, 0xC6432020, 0x3562CCCC, 0x98BEF2F2, 0x181E1212, 0xF724EBEB, 0xECD7A1A1, 0x6C774141,
@@ -230,7 +227,7 @@ class Twofish extends BlockCipher
0xC8FA9E9E, 0xA882D6D6, 0x2BCF6E6E, 0x40507070, 0xDCEB8585, 0xFE750A0A, 0x328A9393, 0xA48DDFDF,
0xCA4C2929, 0x10141C1C, 0x2173D7D7, 0xF0CCB4B4, 0xD309D4D4, 0x5D108A8A, 0x0FE25151, 0x00000000,
0x6F9A1919, 0x9DE01A1A, 0x368F9494, 0x42E6C7C7, 0x4AECC9C9, 0x5EFDD2D2, 0xC1AB7F7F, 0xE0D8A8A8
- ];
+ );
/**
* M-Table
@@ -238,7 +235,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private static $m2 = [
+ var $m2 = array(
0xBC75BC32, 0xECF3EC21, 0x20C62043, 0xB3F4B3C9, 0xDADBDA03, 0x027B028B, 0xE2FBE22B, 0x9EC89EFA,
0xC94AC9EC, 0xD4D3D409, 0x18E6186B, 0x1E6B1E9F, 0x9845980E, 0xB27DB238, 0xA6E8A6D2, 0x264B26B7,
0x3CD63C57, 0x9332938A, 0x82D882EE, 0x52FD5298, 0x7B377BD4, 0xBB71BB37, 0x5BF15B97, 0x47E14783,
@@ -271,7 +268,7 @@ class Twofish extends BlockCipher
0xAB12ABA2, 0x6FA26F3E, 0xE60DE654, 0xDB52DBF2, 0x92BB927B, 0xB702B7B6, 0x692F69CA, 0x39A939D9,
0xD3D7D30C, 0xA761A723, 0xA21EA2AD, 0xC3B4C399, 0x6C506C44, 0x07040705, 0x04F6047F, 0x27C22746,
0xAC16ACA7, 0xD025D076, 0x50865013, 0xDC56DCF7, 0x8455841A, 0xE109E151, 0x7ABE7A25, 0x139113EF
- ];
+ );
/**
* M-Table
@@ -279,7 +276,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private static $m3 = [
+ var $m3 = array(
0xD939A9D9, 0x90176790, 0x719CB371, 0xD2A6E8D2, 0x05070405, 0x9852FD98, 0x6580A365, 0xDFE476DF,
0x08459A08, 0x024B9202, 0xA0E080A0, 0x665A7866, 0xDDAFE4DD, 0xB06ADDB0, 0xBF63D1BF, 0x362A3836,
0x54E60D54, 0x4320C643, 0x62CC3562, 0xBEF298BE, 0x1E12181E, 0x24EBF724, 0xD7A1ECD7, 0x77416C77,
@@ -312,7 +309,7 @@ class Twofish extends BlockCipher
0xFA9EC8FA, 0x82D6A882, 0xCF6E2BCF, 0x50704050, 0xEB85DCEB, 0x750AFE75, 0x8A93328A, 0x8DDFA48D,
0x4C29CA4C, 0x141C1014, 0x73D72173, 0xCCB4F0CC, 0x09D4D309, 0x108A5D10, 0xE2510FE2, 0x00000000,
0x9A196F9A, 0xE01A9DE0, 0x8F94368F, 0xE6C742E6, 0xECC94AEC, 0xFDD25EFD, 0xAB7FC1AB, 0xD8A8E0D8
- ];
+ );
/**
* The Key Schedule Array
@@ -320,7 +317,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private $K = [];
+ var $K = array();
/**
* The Key depended S-Table 0
@@ -328,7 +325,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private $S0 = [];
+ var $S0 = array();
/**
* The Key depended S-Table 1
@@ -336,7 +333,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private $S1 = [];
+ var $S1 = array();
/**
* The Key depended S-Table 2
@@ -344,7 +341,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private $S2 = [];
+ var $S2 = array();
/**
* The Key depended S-Table 3
@@ -352,7 +349,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private $S3 = [];
+ var $S3 = array();
/**
* Holds the last used key
@@ -360,7 +357,7 @@ class Twofish extends BlockCipher
* @var array
* @access private
*/
- private $kl;
+ var $kl;
/**
* The Key Length (in bytes)
@@ -369,23 +366,7 @@ class Twofish extends BlockCipher
* @var int
* @access private
*/
- protected $key_length = 16;
-
- /**
- * Default Constructor.
- *
- * @param string $mode
- * @access public
- * @throws BadModeException if an invalid / unsupported mode is provided
- */
- public function __construct($mode)
- {
- parent::__construct($mode);
-
- if ($this->mode == self::MODE_STREAM) {
- throw new BadModeException('Block ciphers cannot be ran in stream mode');
- }
- }
+ var $key_length = 16;
/**
* Sets the key length.
@@ -395,74 +376,52 @@ class Twofish extends BlockCipher
* @access public
* @param int $length
*/
- public function setKeyLength($length)
+ function setKeyLength($length)
{
- switch ($length) {
- case 128:
- case 192:
- case 256:
+ switch (true) {
+ case $length <= 128:
+ $this->key_length = 16;
break;
- default:
- throw new \LengthException('Key of size ' . $length . ' not supported by this algorithm. Only keys of sizes 16, 24 or 32 supported');
- }
-
- parent::setKeyLength($length);
- }
-
- /**
- * Sets the key.
- *
- * Rijndael supports five different key lengths
- *
- * @see setKeyLength()
- * @access public
- * @param string $key
- * @throws \LengthException if the key length isn't supported
- */
- public function setKey($key)
- {
- switch (strlen($key)) {
- case 16:
- case 24:
- case 32:
+ case $length <= 192:
+ $this->key_length = 24;
break;
default:
- throw new \LengthException('Key of size ' . strlen($key) . ' not supported by this algorithm. Only keys of sizes 16, 24 or 32 supported');
+ $this->key_length = 32;
}
- parent::setKey($key);
+ parent::setKeyLength($length);
}
/**
* Setup the key (expansion)
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::_setupKey()
+ * @see \phpseclib\Crypt\Base::_setupKey()
* @access private
*/
- protected function setupKey()
+ function _setupKey()
{
if (isset($this->kl['key']) && $this->key === $this->kl['key']) {
// already expanded
return;
}
- $this->kl = ['key' => $this->key];
+ $this->kl = array('key' => $this->key);
/* Key expanding and generating the key-depended s-boxes */
$le_longs = unpack('V*', $this->key);
$key = unpack('C*', $this->key);
- $m0 = self::$m0;
- $m1 = self::$m1;
- $m2 = self::$m2;
- $m3 = self::$m3;
- $q0 = self::$q0;
- $q1 = self::$q1;
+ $m0 = $this->m0;
+ $m1 = $this->m1;
+ $m2 = $this->m2;
+ $m3 = $this->m3;
+ $q0 = $this->q0;
+ $q1 = $this->q1;
- $K = $S0 = $S1 = $S2 = $S3 = [];
+ $K = $S0 = $S1 = $S2 = $S3 = array();
switch (strlen($this->key)) {
case 16:
- list($s7, $s6, $s5, $s4) = $this->mdsrem($le_longs[1], $le_longs[2]);
- list($s3, $s2, $s1, $s0) = $this->mdsrem($le_longs[3], $le_longs[4]);
+ list($s7, $s6, $s5, $s4) = $this->_mdsrem($le_longs[1], $le_longs[2]);
+ list($s3, $s2, $s1, $s0) = $this->_mdsrem($le_longs[3], $le_longs[4]);
for ($i = 0, $j = 1; $i < 40; $i+= 2, $j+= 2) {
$A = $m0[$q0[$q0[$i] ^ $key[ 9]] ^ $key[1]] ^
$m1[$q0[$q1[$i] ^ $key[10]] ^ $key[2]] ^
@@ -473,9 +432,9 @@ class Twofish extends BlockCipher
$m2[$q1[$q0[$j] ^ $key[15]] ^ $key[7]] ^
$m3[$q1[$q1[$j] ^ $key[16]] ^ $key[8]];
$B = ($B << 8) | ($B >> 24 & 0xff);
- $A = self::safe_intval($A + $B);
+ $A = $this->safe_intval($A + $B);
$K[] = $A;
- $A = self::safe_intval($A + $B);
+ $A = $this->safe_intval($A + $B);
$K[] = ($A << 9 | $A >> 23 & 0x1ff);
}
for ($i = 0; $i < 256; ++$i) {
@@ -486,9 +445,9 @@ class Twofish extends BlockCipher
}
break;
case 24:
- list($sb, $sa, $s9, $s8) = $this->mdsrem($le_longs[1], $le_longs[2]);
- list($s7, $s6, $s5, $s4) = $this->mdsrem($le_longs[3], $le_longs[4]);
- list($s3, $s2, $s1, $s0) = $this->mdsrem($le_longs[5], $le_longs[6]);
+ list($sb, $sa, $s9, $s8) = $this->_mdsrem($le_longs[1], $le_longs[2]);
+ list($s7, $s6, $s5, $s4) = $this->_mdsrem($le_longs[3], $le_longs[4]);
+ list($s3, $s2, $s1, $s0) = $this->_mdsrem($le_longs[5], $le_longs[6]);
for ($i = 0, $j = 1; $i < 40; $i+= 2, $j+= 2) {
$A = $m0[$q0[$q0[$q1[$i] ^ $key[17]] ^ $key[ 9]] ^ $key[1]] ^
$m1[$q0[$q1[$q1[$i] ^ $key[18]] ^ $key[10]] ^ $key[2]] ^
@@ -499,9 +458,9 @@ class Twofish extends BlockCipher
$m2[$q1[$q0[$q0[$j] ^ $key[23]] ^ $key[15]] ^ $key[7]] ^
$m3[$q1[$q1[$q0[$j] ^ $key[24]] ^ $key[16]] ^ $key[8]];
$B = ($B << 8) | ($B >> 24 & 0xff);
- $A = self::safe_intval($A + $B);
+ $A = $this->safe_intval($A + $B);
$K[] = $A;
- $A = self::safe_intval($A + $B);
+ $A = $this->safe_intval($A + $B);
$K[] = ($A << 9 | $A >> 23 & 0x1ff);
}
for ($i = 0; $i < 256; ++$i) {
@@ -512,10 +471,10 @@ class Twofish extends BlockCipher
}
break;
default: // 32
- list($sf, $se, $sd, $sc) = $this->mdsrem($le_longs[1], $le_longs[2]);
- list($sb, $sa, $s9, $s8) = $this->mdsrem($le_longs[3], $le_longs[4]);
- list($s7, $s6, $s5, $s4) = $this->mdsrem($le_longs[5], $le_longs[6]);
- list($s3, $s2, $s1, $s0) = $this->mdsrem($le_longs[7], $le_longs[8]);
+ list($sf, $se, $sd, $sc) = $this->_mdsrem($le_longs[1], $le_longs[2]);
+ list($sb, $sa, $s9, $s8) = $this->_mdsrem($le_longs[3], $le_longs[4]);
+ list($s7, $s6, $s5, $s4) = $this->_mdsrem($le_longs[5], $le_longs[6]);
+ list($s3, $s2, $s1, $s0) = $this->_mdsrem($le_longs[7], $le_longs[8]);
for ($i = 0, $j = 1; $i < 40; $i+= 2, $j+= 2) {
$A = $m0[$q0[$q0[$q1[$q1[$i] ^ $key[25]] ^ $key[17]] ^ $key[ 9]] ^ $key[1]] ^
$m1[$q0[$q1[$q1[$q0[$i] ^ $key[26]] ^ $key[18]] ^ $key[10]] ^ $key[2]] ^
@@ -526,9 +485,9 @@ class Twofish extends BlockCipher
$m2[$q1[$q0[$q0[$q0[$j] ^ $key[31]] ^ $key[23]] ^ $key[15]] ^ $key[7]] ^
$m3[$q1[$q1[$q0[$q1[$j] ^ $key[32]] ^ $key[24]] ^ $key[16]] ^ $key[8]];
$B = ($B << 8) | ($B >> 24 & 0xff);
- $A = self::safe_intval($A + $B);
+ $A = $this->safe_intval($A + $B);
$K[] = $A;
- $A = self::safe_intval($A + $B);
+ $A = $this->safe_intval($A + $B);
$K[] = ($A << 9 | $A >> 23 & 0x1ff);
}
for ($i = 0; $i < 256; ++$i) {
@@ -554,7 +513,7 @@ class Twofish extends BlockCipher
* @param string $B
* @return array
*/
- private function mdsrem($A, $B)
+ function _mdsrem($A, $B)
{
// No gain by unrolling this loop.
for ($i = 0; $i < 8; ++$i) {
@@ -587,11 +546,11 @@ class Twofish extends BlockCipher
$B^= ($u << 24) | ($u << 8);
}
- return [
+ return array(
0xff & $B >> 24,
0xff & $B >> 16,
0xff & $B >> 8,
- 0xff & $B];
+ 0xff & $B);
}
/**
@@ -601,7 +560,7 @@ class Twofish extends BlockCipher
* @param string $in
* @return string
*/
- protected function encryptBlock($in)
+ function _encryptBlock($in)
{
$S0 = $this->S0;
$S1 = $this->S1;
@@ -625,9 +584,9 @@ class Twofish extends BlockCipher
$S1[ $R1 & 0xff] ^
$S2[($R1 >> 8) & 0xff] ^
$S3[($R1 >> 16) & 0xff];
- $R2^= self::safe_intval($t0 + $t1 + $K[++$ki]);
+ $R2^= $this->safe_intval($t0 + $t1 + $K[++$ki]);
$R2 = ($R2 >> 1 & 0x7fffffff) | ($R2 << 31);
- $R3 = ((($R3 >> 31) & 1) | ($R3 << 1)) ^ self::safe_intval($t0 + ($t1 << 1) + $K[++$ki]);
+ $R3 = ((($R3 >> 31) & 1) | ($R3 << 1)) ^ $this->safe_intval($t0 + ($t1 << 1) + $K[++$ki]);
$t0 = $S0[ $R2 & 0xff] ^
$S1[($R2 >> 8) & 0xff] ^
@@ -637,9 +596,9 @@ class Twofish extends BlockCipher
$S1[ $R3 & 0xff] ^
$S2[($R3 >> 8) & 0xff] ^
$S3[($R3 >> 16) & 0xff];
- $R0^= self::safe_intval($t0 + $t1 + $K[++$ki]);
+ $R0^= $this->safe_intval($t0 + $t1 + $K[++$ki]);
$R0 = ($R0 >> 1 & 0x7fffffff) | ($R0 << 31);
- $R1 = ((($R1 >> 31) & 1) | ($R1 << 1)) ^ self::safe_intval($t0 + ($t1 << 1) + $K[++$ki]);
+ $R1 = ((($R1 >> 31) & 1) | ($R1 << 1)) ^ $this->safe_intval($t0 + ($t1 << 1) + $K[++$ki]);
}
// @codingStandardsIgnoreStart
@@ -657,7 +616,7 @@ class Twofish extends BlockCipher
* @param string $in
* @return string
*/
- protected function decryptBlock($in)
+ function _decryptBlock($in)
{
$S0 = $this->S0;
$S1 = $this->S1;
@@ -681,9 +640,9 @@ class Twofish extends BlockCipher
$S1[$R1 & 0xff] ^
$S2[$R1 >> 8 & 0xff] ^
$S3[$R1 >> 16 & 0xff];
- $R3^= self::safe_intval($t0 + ($t1 << 1) + $K[--$ki]);
+ $R3^= $this->safe_intval($t0 + ($t1 << 1) + $K[--$ki]);
$R3 = $R3 >> 1 & 0x7fffffff | $R3 << 31;
- $R2 = ($R2 >> 31 & 0x1 | $R2 << 1) ^ self::safe_intval($t0 + $t1 + $K[--$ki]);
+ $R2 = ($R2 >> 31 & 0x1 | $R2 << 1) ^ $this->safe_intval($t0 + $t1 + $K[--$ki]);
$t0 = $S0[$R2 & 0xff] ^
$S1[$R2 >> 8 & 0xff] ^
@@ -693,9 +652,9 @@ class Twofish extends BlockCipher
$S1[$R3 & 0xff] ^
$S2[$R3 >> 8 & 0xff] ^
$S3[$R3 >> 16 & 0xff];
- $R1^= self::safe_intval($t0 + ($t1 << 1) + $K[--$ki]);
+ $R1^= $this->safe_intval($t0 + ($t1 << 1) + $K[--$ki]);
$R1 = $R1 >> 1 & 0x7fffffff | $R1 << 31;
- $R0 = ($R0 >> 31 & 0x1 | $R0 << 1) ^ self::safe_intval($t0 + $t1 + $K[--$ki]);
+ $R0 = ($R0 >> 31 & 0x1 | $R0 << 1) ^ $this->safe_intval($t0 + $t1 + $K[--$ki]);
}
// @codingStandardsIgnoreStart
@@ -709,118 +668,149 @@ class Twofish extends BlockCipher
/**
* Setup the performance-optimized function for de/encrypt()
*
- * @see \phpseclib3\Crypt\Common\SymmetricKey::_setupInlineCrypt()
+ * @see \phpseclib\Crypt\Base::_setupInlineCrypt()
* @access private
*/
- protected function setupInlineCrypt()
+ function _setupInlineCrypt()
{
- $K = $this->K;
- $init_crypt = '
- static $S0, $S1, $S2, $S3;
- if (!$S0) {
- for ($i = 0; $i < 256; ++$i) {
- $S0[] = (int)$this->S0[$i];
- $S1[] = (int)$this->S1[$i];
- $S2[] = (int)$this->S2[$i];
- $S3[] = (int)$this->S3[$i];
- }
+ $lambda_functions =& self::_getLambdaFunctions();
+
+ // Max. 10 Ultra-Hi-optimized inline-crypt functions. After that, we'll (still) create very fast code, but not the ultimate fast one.
+ // (Currently, for Crypt_Twofish, one generated $lambda_function cost on php5.5@32bit ~140kb unfreeable mem and ~240kb on php5.5@64bit)
+ $gen_hi_opt_code = (bool)(count($lambda_functions) < 10);
+
+ // Generation of a unique hash for our generated code
+ $code_hash = "Crypt_Twofish, {$this->mode}";
+ if ($gen_hi_opt_code) {
+ $code_hash = str_pad($code_hash, 32) . $this->_hashInlineCryptFunction($this->key);
+ }
+
+ $safeint = $this->safe_intval_inline();
+
+ if (!isset($lambda_functions[$code_hash])) {
+ switch (true) {
+ case $gen_hi_opt_code:
+ $K = $this->K;
+ $init_crypt = '
+ static $S0, $S1, $S2, $S3;
+ if (!$S0) {
+ for ($i = 0; $i < 256; ++$i) {
+ $S0[] = (int)$self->S0[$i];
+ $S1[] = (int)$self->S1[$i];
+ $S2[] = (int)$self->S2[$i];
+ $S3[] = (int)$self->S3[$i];
+ }
+ }
+ ';
+ break;
+ default:
+ $K = array();
+ for ($i = 0; $i < 40; ++$i) {
+ $K[] = '$K_' . $i;
+ }
+ $init_crypt = '
+ $S0 = $self->S0;
+ $S1 = $self->S1;
+ $S2 = $self->S2;
+ $S3 = $self->S3;
+ list(' . implode(',', $K) . ') = $self->K;
+ ';
}
- ';
-
- $safeint = self::safe_intval_inline();
-
- // Generating encrypt code:
- $encrypt_block = '
- $in = unpack("V4", $in);
- $R0 = '.$K[0].' ^ $in[1];
- $R1 = '.$K[1].' ^ $in[2];
- $R2 = '.$K[2].' ^ $in[3];
- $R3 = '.$K[3].' ^ $in[4];
- ';
- for ($ki = 7, $i = 0; $i < 8; ++$i) {
- $encrypt_block.= '
- $t0 = $S0[ $R0 & 0xff] ^
- $S1[($R0 >> 8) & 0xff] ^
- $S2[($R0 >> 16) & 0xff] ^
- $S3[($R0 >> 24) & 0xff];
- $t1 = $S0[($R1 >> 24) & 0xff] ^
- $S1[ $R1 & 0xff] ^
- $S2[($R1 >> 8) & 0xff] ^
- $S3[($R1 >> 16) & 0xff];
+
+ // Generating encrypt code:
+ $encrypt_block = '
+ $in = unpack("V4", $in);
+ $R0 = '.$K[0].' ^ $in[1];
+ $R1 = '.$K[1].' ^ $in[2];
+ $R2 = '.$K[2].' ^ $in[3];
+ $R3 = '.$K[3].' ^ $in[4];
+ ';
+ for ($ki = 7, $i = 0; $i < 8; ++$i) {
+ $encrypt_block.= '
+ $t0 = $S0[ $R0 & 0xff] ^
+ $S1[($R0 >> 8) & 0xff] ^
+ $S2[($R0 >> 16) & 0xff] ^
+ $S3[($R0 >> 24) & 0xff];
+ $t1 = $S0[($R1 >> 24) & 0xff] ^
+ $S1[ $R1 & 0xff] ^
+ $S2[($R1 >> 8) & 0xff] ^
+ $S3[($R1 >> 16) & 0xff];
$R2^= ' . sprintf($safeint, '$t0 + $t1 + ' . $K[++$ki]) . ';
- $R2 = ($R2 >> 1 & 0x7fffffff) | ($R2 << 31);
- $R3 = ((($R3 >> 31) & 1) | ($R3 << 1)) ^ ' . sprintf($safeint, '($t0 + ($t1 << 1) + ' . $K[++$ki] . ')') . ';
-
- $t0 = $S0[ $R2 & 0xff] ^
- $S1[($R2 >> 8) & 0xff] ^
- $S2[($R2 >> 16) & 0xff] ^
- $S3[($R2 >> 24) & 0xff];
- $t1 = $S0[($R3 >> 24) & 0xff] ^
- $S1[ $R3 & 0xff] ^
- $S2[($R3 >> 8) & 0xff] ^
- $S3[($R3 >> 16) & 0xff];
- $R0^= ' . sprintf($safeint, '($t0 + $t1 + ' . $K[++$ki] . ')') . ';
- $R0 = ($R0 >> 1 & 0x7fffffff) | ($R0 << 31);
- $R1 = ((($R1 >> 31) & 1) | ($R1 << 1)) ^ ' . sprintf($safeint, '($t0 + ($t1 << 1) + ' . $K[++$ki] . ')') . ';
+ $R2 = ($R2 >> 1 & 0x7fffffff) | ($R2 << 31);
+ $R3 = ((($R3 >> 31) & 1) | ($R3 << 1)) ^ ' . sprintf($safeint, '($t0 + ($t1 << 1) + ' . $K[++$ki] . ')') . ';
+
+ $t0 = $S0[ $R2 & 0xff] ^
+ $S1[($R2 >> 8) & 0xff] ^
+ $S2[($R2 >> 16) & 0xff] ^
+ $S3[($R2 >> 24) & 0xff];
+ $t1 = $S0[($R3 >> 24) & 0xff] ^
+ $S1[ $R3 & 0xff] ^
+ $S2[($R3 >> 8) & 0xff] ^
+ $S3[($R3 >> 16) & 0xff];
+ $R0^= ' . sprintf($safeint, '($t0 + $t1 + ' . $K[++$ki] . ')') . ';
+ $R0 = ($R0 >> 1 & 0x7fffffff) | ($R0 << 31);
+ $R1 = ((($R1 >> 31) & 1) | ($R1 << 1)) ^ ' . sprintf($safeint, '($t0 + ($t1 << 1) + ' . $K[++$ki] . ')') . ';
+ ';
+ }
+ $encrypt_block.= '
+ $in = pack("V4", ' . $K[4] . ' ^ $R2,
+ ' . $K[5] . ' ^ $R3,
+ ' . $K[6] . ' ^ $R0,
+ ' . $K[7] . ' ^ $R1);
';
- }
- $encrypt_block.= '
- $in = pack("V4", '.$K[4].' ^ $R2,
- '.$K[5].' ^ $R3,
- '.$K[6].' ^ $R0,
- '.$K[7].' ^ $R1);
- ';
-
- // Generating decrypt code:
- $decrypt_block = '
- $in = unpack("V4", $in);
- $R0 = '.$K[4].' ^ $in[1];
- $R1 = '.$K[5].' ^ $in[2];
- $R2 = '.$K[6].' ^ $in[3];
- $R3 = '.$K[7].' ^ $in[4];
- ';
- for ($ki = 40, $i = 0; $i < 8; ++$i) {
+
+ // Generating decrypt code:
+ $decrypt_block = '
+ $in = unpack("V4", $in);
+ $R0 = '.$K[4].' ^ $in[1];
+ $R1 = '.$K[5].' ^ $in[2];
+ $R2 = '.$K[6].' ^ $in[3];
+ $R3 = '.$K[7].' ^ $in[4];
+ ';
+ for ($ki = 40, $i = 0; $i < 8; ++$i) {
+ $decrypt_block.= '
+ $t0 = $S0[$R0 & 0xff] ^
+ $S1[$R0 >> 8 & 0xff] ^
+ $S2[$R0 >> 16 & 0xff] ^
+ $S3[$R0 >> 24 & 0xff];
+ $t1 = $S0[$R1 >> 24 & 0xff] ^
+ $S1[$R1 & 0xff] ^
+ $S2[$R1 >> 8 & 0xff] ^
+ $S3[$R1 >> 16 & 0xff];
+ $R3^= ' . sprintf($safeint, '$t0 + ($t1 << 1) + ' . $K[--$ki]) . ';
+ $R3 = $R3 >> 1 & 0x7fffffff | $R3 << 31;
+ $R2 = ($R2 >> 31 & 0x1 | $R2 << 1) ^ ' . sprintf($safeint, '($t0 + $t1 + '.$K[--$ki] . ')') . ';
+
+ $t0 = $S0[$R2 & 0xff] ^
+ $S1[$R2 >> 8 & 0xff] ^
+ $S2[$R2 >> 16 & 0xff] ^
+ $S3[$R2 >> 24 & 0xff];
+ $t1 = $S0[$R3 >> 24 & 0xff] ^
+ $S1[$R3 & 0xff] ^
+ $S2[$R3 >> 8 & 0xff] ^
+ $S3[$R3 >> 16 & 0xff];
+ $R1^= ' . sprintf($safeint, '$t0 + ($t1 << 1) + ' . $K[--$ki]) . ';
+ $R1 = $R1 >> 1 & 0x7fffffff | $R1 << 31;
+ $R0 = ($R0 >> 31 & 0x1 | $R0 << 1) ^ ' . sprintf($safeint, '($t0 + $t1 + '.$K[--$ki] . ')') . ';
+ ';
+ }
$decrypt_block.= '
- $t0 = $S0[$R0 & 0xff] ^
- $S1[$R0 >> 8 & 0xff] ^
- $S2[$R0 >> 16 & 0xff] ^
- $S3[$R0 >> 24 & 0xff];
- $t1 = $S0[$R1 >> 24 & 0xff] ^
- $S1[$R1 & 0xff] ^
- $S2[$R1 >> 8 & 0xff] ^
- $S3[$R1 >> 16 & 0xff];
- $R3^= ' . sprintf($safeint, '$t0 + ($t1 << 1) + ' . $K[--$ki]) . ';
- $R3 = $R3 >> 1 & 0x7fffffff | $R3 << 31;
- $R2 = ($R2 >> 31 & 0x1 | $R2 << 1) ^ ' . sprintf($safeint, '($t0 + $t1 + '.$K[--$ki] . ')') . ';
-
- $t0 = $S0[$R2 & 0xff] ^
- $S1[$R2 >> 8 & 0xff] ^
- $S2[$R2 >> 16 & 0xff] ^
- $S3[$R2 >> 24 & 0xff];
- $t1 = $S0[$R3 >> 24 & 0xff] ^
- $S1[$R3 & 0xff] ^
- $S2[$R3 >> 8 & 0xff] ^
- $S3[$R3 >> 16 & 0xff];
- $R1^= ' . sprintf($safeint, '$t0 + ($t1 << 1) + ' . $K[--$ki]) . ';
- $R1 = $R1 >> 1 & 0x7fffffff | $R1 << 31;
- $R0 = ($R0 >> 31 & 0x1 | $R0 << 1) ^ ' . sprintf($safeint, '($t0 + $t1 + '.$K[--$ki] . ')') . ';
+ $in = pack("V4", ' . $K[0] . ' ^ $R2,
+ ' . $K[1] . ' ^ $R3,
+ ' . $K[2] . ' ^ $R0,
+ ' . $K[3] . ' ^ $R1);
';
+
+ $lambda_functions[$code_hash] = $this->_createInlineCryptFunction(
+ array(
+ 'init_crypt' => $init_crypt,
+ 'init_encrypt' => '',
+ 'init_decrypt' => '',
+ 'encrypt_block' => $encrypt_block,
+ 'decrypt_block' => $decrypt_block
+ )
+ );
}
- $decrypt_block.= '
- $in = pack("V4", '.$K[0].' ^ $R2,
- '.$K[1].' ^ $R3,
- '.$K[2].' ^ $R0,
- '.$K[3].' ^ $R1);
- ';
-
- $this->inline_crypt = $this->createInlineCryptFunction(
- [
- 'init_crypt' => $init_crypt,
- 'init_encrypt' => '',
- 'init_decrypt' => '',
- 'encrypt_block' => $encrypt_block,
- 'decrypt_block' => $decrypt_block
- ]
- );
+ $this->inline_crypt = $lambda_functions[$code_hash];
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/BadConfigurationException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/BadConfigurationException.php
deleted file mode 100644
index fa5a818ac..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/BadConfigurationException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * BadConfigurationException
- *
- * PHP version 5
- *
- * @category Exception
- * @package BadConfigurationException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * BadConfigurationException
- *
- * @package BadConfigurationException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class BadConfigurationException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/BadDecryptionException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/BadDecryptionException.php
deleted file mode 100644
index c1171b159..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/BadDecryptionException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * BadDecryptionException
- *
- * PHP version 5
- *
- * @category Exception
- * @package BadDecryptionException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * BadDecryptionException
- *
- * @package BadDecryptionException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class BadDecryptionException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/BadModeException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/BadModeException.php
deleted file mode 100644
index ace9f578d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/BadModeException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * BadModeException
- *
- * PHP version 5
- *
- * @category Exception
- * @package BadModeException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * BadModeException
- *
- * @package BadModeException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class BadModeException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/ConnectionClosedException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/ConnectionClosedException.php
deleted file mode 100644
index d6300d5c6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/ConnectionClosedException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * ConnectionClosedException
- *
- * PHP version 5
- *
- * @category Exception
- * @package ConnectionClosedException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * ConnectionClosedException
- *
- * @package ConnectionClosedException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class ConnectionClosedException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/FileNotFoundException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/FileNotFoundException.php
deleted file mode 100644
index bc1b91898..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/FileNotFoundException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * FileNotFoundException
- *
- * PHP version 5
- *
- * @category Exception
- * @package FileNotFoundException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * FileNotFoundException
- *
- * @package FileNotFoundException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class FileNotFoundException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/InconsistentSetupException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/InconsistentSetupException.php
deleted file mode 100644
index 77db4a0e2..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/InconsistentSetupException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * InconsistentSetupException
- *
- * PHP version 5
- *
- * @category Exception
- * @package InconsistentSetupException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * InconsistentSetupException
- *
- * @package InconsistentSetupException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class InconsistentSetupException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/InsufficientSetupException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/InsufficientSetupException.php
deleted file mode 100644
index 27f49f2f8..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/InsufficientSetupException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * InsufficientSetupException
- *
- * PHP version 5
- *
- * @category Exception
- * @package InsufficientSetupException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * InsufficientSetupException
- *
- * @package InsufficientSetupException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class InsufficientSetupException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/NoKeyLoadedException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/NoKeyLoadedException.php
deleted file mode 100644
index 95152eb46..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/NoKeyLoadedException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * NoKeyLoadedException
- *
- * PHP version 5
- *
- * @category Exception
- * @package NoKeyLoadedException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * NoKeyLoadedException
- *
- * @package NoKeyLoadedException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class NoKeyLoadedException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/NoSupportedAlgorithmsException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/NoSupportedAlgorithmsException.php
deleted file mode 100644
index 7a7471dca..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/NoSupportedAlgorithmsException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * NoSupportedAlgorithmsException
- *
- * PHP version 5
- *
- * @category Exception
- * @package NoSupportedAlgorithmsException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * NoSupportedAlgorithmsException
- *
- * @package NoSupportedAlgorithmsException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class NoSupportedAlgorithmsException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnableToConnectException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/UnableToConnectException.php
deleted file mode 100644
index 909ef67fa..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnableToConnectException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * UnableToConnectException
- *
- * PHP version 5
- *
- * @category Exception
- * @package UnableToConnectException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * UnableToConnectException
- *
- * @package UnableToConnectException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class UnableToConnectException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedAlgorithmException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedAlgorithmException.php
deleted file mode 100644
index e0c07a436..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedAlgorithmException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * UnsupportedAlgorithmException
- *
- * PHP version 5
- *
- * @category Exception
- * @package UnsupportedAlgorithmException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * UnsupportedAlgorithmException
- *
- * @package UnsupportedAlgorithmException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class UnsupportedAlgorithmException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedCurveException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedCurveException.php
deleted file mode 100644
index 6d746ab1b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedCurveException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * UnsupportedCurveException
- *
- * PHP version 5
- *
- * @category Exception
- * @package UnsupportedCurveException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * UnsupportedCurveException
- *
- * @package UnsupportedCurveException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class UnsupportedCurveException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedFormatException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedFormatException.php
deleted file mode 100644
index f58f812d3..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedFormatException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * UnsupportedFormatException
- *
- * PHP version 5
- *
- * @category Exception
- * @package UnsupportedFormatException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * UnsupportedFormatException
- *
- * @package UnsupportedFormatException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class UnsupportedFormatException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedOperationException.php b/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedOperationException.php
deleted file mode 100644
index 7872a1a82..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Exception/UnsupportedOperationException.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * UnsupportedOperationException
- *
- * PHP version 5
- *
- * @category Exception
- * @package UnsupportedOperationException
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\Exception;
-
-/**
- * UnsupportedOperationException
- *
- * @package UnsupportedOperationException
- * @author Jim Wigginton <terrafrost@php.net>
- */
-class UnsupportedOperationException extends \RuntimeException
-{
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ANSI.php b/vendor/phpseclib/phpseclib/phpseclib/File/ANSI.php
index f0dc19618..b6874d357 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ANSI.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/File/ANSI.php
@@ -5,10 +5,10 @@
*
* PHP version 5
*
- * If you call read() in \phpseclib3\Net\SSH2 you may get {@link http://en.wikipedia.org/wiki/ANSI_escape_code ANSI escape codes} back.
+ * If you call read() in \phpseclib\Net\SSH2 you may get {@link http://en.wikipedia.org/wiki/ANSI_escape_code ANSI escape codes} back.
* They'd look like chr(0x1B) . '[00m' or whatever (0x1B = ESC). They tell a
* {@link http://en.wikipedia.org/wiki/Terminal_emulator terminal emulator} how to format the characters, what
- * color to display them in, etc. \phpseclib3\File\ANSI is a {@link http://en.wikipedia.org/wiki/VT100 VT100} terminal emulator.
+ * color to display them in, etc. \phpseclib\File\ANSI is a {@link http://en.wikipedia.org/wiki/VT100 VT100} terminal emulator.
*
* @category File
* @package ANSI
@@ -18,7 +18,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\File;
+namespace phpseclib\File;
/**
* Pure-PHP ANSI Decoder
@@ -35,7 +35,7 @@ class ANSI
* @var int
* @access private
*/
- private $max_x;
+ var $max_x;
/**
* Max Height
@@ -43,7 +43,7 @@ class ANSI
* @var int
* @access private
*/
- private $max_y;
+ var $max_y;
/**
* Max History
@@ -51,7 +51,7 @@ class ANSI
* @var int
* @access private
*/
- private $max_history;
+ var $max_history;
/**
* History
@@ -59,7 +59,7 @@ class ANSI
* @var array
* @access private
*/
- private $history;
+ var $history;
/**
* History Attributes
@@ -67,7 +67,7 @@ class ANSI
* @var array
* @access private
*/
- private $history_attrs;
+ var $history_attrs;
/**
* Current Column
@@ -75,7 +75,7 @@ class ANSI
* @var int
* @access private
*/
- private $x;
+ var $x;
/**
* Current Row
@@ -83,7 +83,7 @@ class ANSI
* @var int
* @access private
*/
- private $y;
+ var $y;
/**
* Old Column
@@ -91,7 +91,7 @@ class ANSI
* @var int
* @access private
*/
- private $old_x;
+ var $old_x;
/**
* Old Row
@@ -99,7 +99,7 @@ class ANSI
* @var int
* @access private
*/
- private $old_y;
+ var $old_y;
/**
* An empty attribute cell
@@ -107,7 +107,7 @@ class ANSI
* @var object
* @access private
*/
- private $base_attr_cell;
+ var $base_attr_cell;
/**
* The current attribute cell
@@ -115,7 +115,7 @@ class ANSI
* @var object
* @access private
*/
- private $attr_cell;
+ var $attr_cell;
/**
* An empty attribute row
@@ -123,7 +123,7 @@ class ANSI
* @var array
* @access private
*/
- private $attr_row;
+ var $attr_row;
/**
* The current screen text
@@ -131,7 +131,7 @@ class ANSI
* @var array
* @access private
*/
- private $screen;
+ var $screen;
/**
* The current screen attributes
@@ -139,7 +139,7 @@ class ANSI
* @var array
* @access private
*/
- private $attrs;
+ var $attrs;
/**
* Current ANSI code
@@ -147,7 +147,7 @@ class ANSI
* @var string
* @access private
*/
- private $ansi;
+ var $ansi;
/**
* Tokenization
@@ -155,15 +155,15 @@ class ANSI
* @var array
* @access private
*/
- private $tokenization;
+ var $tokenization;
/**
* Default Constructor.
*
- * @return \phpseclib3\File\ANSI
+ * @return \phpseclib\File\ANSI
* @access public
*/
- public function __construct()
+ function __construct()
{
$attr_cell = new \stdClass();
$attr_cell->bold = false;
@@ -188,12 +188,12 @@ class ANSI
* @param int $y
* @access public
*/
- public function setDimensions($x, $y)
+ function setDimensions($x, $y)
{
$this->max_x = $x - 1;
$this->max_y = $y - 1;
$this->x = $this->y = 0;
- $this->history = $this->history_attrs = [];
+ $this->history = $this->history_attrs = array();
$this->attr_row = array_fill(0, $this->max_x + 2, $this->base_attr_cell);
$this->screen = array_fill(0, $this->max_y + 1, '');
$this->attrs = array_fill(0, $this->max_y + 1, $this->attr_row);
@@ -206,7 +206,7 @@ class ANSI
* @param int $history
* @access public
*/
- public function setHistory($history)
+ function setHistory($history)
{
$this->max_history = $history;
}
@@ -217,7 +217,7 @@ class ANSI
* @param string $source
* @access public
*/
- public function loadString($source)
+ function loadString($source)
{
$this->setDimensions($this->max_x + 1, $this->max_y + 1);
$this->appendString($source);
@@ -229,9 +229,9 @@ class ANSI
* @param string $source
* @access public
*/
- public function appendString($source)
+ function appendString($source)
{
- $this->tokenization = [''];
+ $this->tokenization = array('');
for ($i = 0; $i < strlen($source); $i++) {
if (strlen($this->ansi)) {
$this->ansi.= $source[$i];
@@ -282,7 +282,7 @@ class ANSI
case "\x1B(B": // set united states g0 character set
break;
case "\x1BE": // Move to next line
- $this->newLine();
+ $this->_newLine();
$this->x = 0;
break;
default:
@@ -382,7 +382,7 @@ class ANSI
$this->x = 0;
break;
case "\n":
- $this->newLine();
+ $this->_newLine();
break;
case "\x08": // backspace
if ($this->x) {
@@ -419,7 +419,7 @@ class ANSI
if ($this->x > $this->max_x) {
$this->x = 0;
- $this->newLine();
+ $this->_newLine();
} else {
$this->x++;
}
@@ -434,17 +434,17 @@ class ANSI
*
* @access private
*/
- private function newLine()
+ function _newLine()
{
//if ($this->y < $this->max_y) {
// $this->y++;
//}
while ($this->y >= $this->max_y) {
- $this->history = array_merge($this->history, [array_shift($this->screen)]);
+ $this->history = array_merge($this->history, array(array_shift($this->screen)));
$this->screen[] = '';
- $this->history_attrs = array_merge($this->history_attrs, [array_shift($this->attrs)]);
+ $this->history_attrs = array_merge($this->history_attrs, array(array_shift($this->attrs)));
$this->attrs[] = $this->attr_row;
if (count($this->history) >= $this->max_history) {
@@ -461,12 +461,9 @@ class ANSI
* Returns the current coordinate without preformating
*
* @access private
- * @param \stdClass $last_attr
- * @param \stdClass $cur_attr
- * @param string $char
* @return string
*/
- private function processCoordinate($last_attr, $cur_attr, $char)
+ function _processCoordinate($last_attr, $cur_attr, $char)
{
$output = '';
@@ -523,21 +520,21 @@ class ANSI
* @access private
* @return string
*/
- private function getScreenHelper()
+ function _getScreen()
{
$output = '';
$last_attr = $this->base_attr_cell;
for ($i = 0; $i <= $this->max_y; $i++) {
for ($j = 0; $j <= $this->max_x; $j++) {
$cur_attr = $this->attrs[$i][$j];
- $output.= $this->processCoordinate($last_attr, $cur_attr, isset($this->screen[$i][$j]) ? $this->screen[$i][$j] : '');
+ $output.= $this->_processCoordinate($last_attr, $cur_attr, isset($this->screen[$i][$j]) ? $this->screen[$i][$j] : '');
$last_attr = $this->attrs[$i][$j];
}
$output.= "\r\n";
}
$output = substr($output, 0, -2);
// close any remaining open tags
- $output.= $this->processCoordinate($last_attr, $this->base_attr_cell, '');
+ $output.= $this->_processCoordinate($last_attr, $this->base_attr_cell, '');
return rtrim($output);
}
@@ -547,9 +544,9 @@ class ANSI
* @access public
* @return string
*/
- public function getScreen()
+ function getScreen()
{
- return '<pre width="' . ($this->max_x + 1) . '" style="color: white; background: black">' . $this->getScreenHelper() . '</pre>';
+ return '<pre width="' . ($this->max_x + 1) . '" style="color: white; background: black">' . $this->_getScreen() . '</pre>';
}
/**
@@ -558,21 +555,21 @@ class ANSI
* @access public
* @return string
*/
- public function getHistory()
+ function getHistory()
{
$scrollback = '';
$last_attr = $this->base_attr_cell;
for ($i = 0; $i < count($this->history); $i++) {
for ($j = 0; $j <= $this->max_x + 1; $j++) {
$cur_attr = $this->history_attrs[$i][$j];
- $scrollback.= $this->processCoordinate($last_attr, $cur_attr, isset($this->history[$i][$j]) ? $this->history[$i][$j] : '');
+ $scrollback.= $this->_processCoordinate($last_attr, $cur_attr, isset($this->history[$i][$j]) ? $this->history[$i][$j] : '');
$last_attr = $this->history_attrs[$i][$j];
}
$scrollback.= "\r\n";
}
$base_attr_cell = $this->base_attr_cell;
$this->base_attr_cell = $last_attr;
- $scrollback.= $this->getScreen();
+ $scrollback.= $this->_getScreen();
$this->base_attr_cell = $base_attr_cell;
return '<pre width="' . ($this->max_x + 1) . '" style="color: white; background: black">' . $scrollback . '</span></pre>';
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1.php
index cdc5b697d..807ca88ce 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1.php
@@ -9,7 +9,7 @@
* utilized scheme is DER or the "Distinguished Encoding Rules". PEM's are base64 encoded
* DER blobs.
*
- * \phpseclib3\File\ASN1 decodes and encodes DER formatted messages and places them in a semantic context.
+ * \phpseclib\File\ASN1 decodes and encodes DER formatted messages and places them in a semantic context.
*
* Uses the 1988 ASN.1 syntax.
*
@@ -21,12 +21,10 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\File;
+namespace phpseclib\File;
-use ParagonIE\ConstantTime\Base64;
-use phpseclib3\File\ASN1\Element;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
+use phpseclib\File\ASN1\Element;
+use phpseclib\Math\BigInteger;
use DateTime;
use DateTimeZone;
@@ -37,17 +35,26 @@ use DateTimeZone;
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
-abstract class ASN1
+class ASN1
{
- // Tag Classes
- // http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#page=12
+ /**#@+
+ * Tag Classes
+ *
+ * @access private
+ * @link http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#page=12
+ */
const CLASS_UNIVERSAL = 0;
const CLASS_APPLICATION = 1;
const CLASS_CONTEXT_SPECIFIC = 2;
const CLASS_PRIVATE = 3;
+ /**#@-*/
- // Tag Classes
- // http://www.obj-sys.com/asn1tutorial/node124.html
+ /**#@+
+ * Tag Classes
+ *
+ * @access private
+ * @link http://www.obj-sys.com/asn1tutorial/node124.html
+ */
const TYPE_BOOLEAN = 1;
const TYPE_INTEGER = 2;
const TYPE_BIT_STRING = 3;
@@ -63,9 +70,13 @@ abstract class ASN1
//const TYPE_RELATIVE_OID = 13;
const TYPE_SEQUENCE = 16; // SEQUENCE OF
const TYPE_SET = 17; // SET OF
-
- // More Tag Classes
- // http://www.obj-sys.com/asn1tutorial/node10.html
+ /**#@-*/
+ /**#@+
+ * More Tag Classes
+ *
+ * @access private
+ * @link http://www.obj-sys.com/asn1tutorial/node10.html
+ */
const TYPE_NUMERIC_STRING = 18;
const TYPE_PRINTABLE_STRING = 19;
const TYPE_TELETEX_STRING = 20; // T61String
@@ -79,28 +90,27 @@ abstract class ASN1
const TYPE_UNIVERSAL_STRING = 28;
//const TYPE_CHARACTER_STRING = 29;
const TYPE_BMP_STRING = 30;
+ /**#@-*/
- // Tag Aliases
- // These tags are kinda place holders for other tags.
+ /**#@+
+ * Tag Aliases
+ *
+ * These tags are kinda place holders for other tags.
+ *
+ * @access private
+ */
const TYPE_CHOICE = -1;
const TYPE_ANY = -2;
+ /**#@-*/
/**
- * ASN.1 object identifiers
+ * ASN.1 object identifier
*
* @var array
* @access private
* @link http://en.wikipedia.org/wiki/Object_identifier
*/
- private static $oids = [];
-
- /**
- * ASN.1 object identifier reverse mapping
- *
- * @var array
- * @access private
- */
- private static $reverseOIDs = [];
+ var $oids = array();
/**
* Default date format
@@ -109,52 +119,41 @@ abstract class ASN1
* @access private
* @link http://php.net/class.datetime
*/
- private static $format = 'D, d M Y H:i:s O';
+ var $format = 'D, d M Y H:i:s O';
/**
- * Filters
- *
- * If the mapping type is self::TYPE_ANY what do we actually encode it as?
+ * Default date format
*
* @var array
* @access private
- * @see self::encode_der()
+ * @see self::setTimeFormat()
+ * @see self::asn1map()
+ * @link http://php.net/class.datetime
*/
- private static $filters;
+ var $encoded;
/**
- * Current Location of most recent ASN.1 encode process
+ * Filters
*
- * Useful for debug purposes
+ * If the mapping type is self::TYPE_ANY what do we actually encode it as?
*
* @var array
* @access private
- * @see self::encode_der()
+ * @see self::_encode_der()
*/
- private static $location;
-
- /**
- * DER Encoded String
- *
- * In case we need to create ASN1\Element object's..
- *
- * @var string
- * @access private
- * @see self::decodeDER()
- */
- private static $encoded;
+ var $filters;
/**
* Type mapping table for the ANY type.
*
- * Structured or unknown types are mapped to a \phpseclib3\File\ASN1\Element.
+ * Structured or unknown types are mapped to a \phpseclib\File\ASN1\Element.
* Unambiguous types get the direct mapping (int/real/bool).
* Others are mapped as a choice, with an extra indexing level.
*
* @var array
* @access public
*/
- const ANY_MAP = [
+ var $ANYmap = array(
self::TYPE_BOOLEAN => true,
self::TYPE_INTEGER => true,
self::TYPE_BIT_STRING => 'bitString',
@@ -177,7 +176,7 @@ abstract class ASN1
self::TYPE_UNIVERSAL_STRING => 'universalString',
//self::TYPE_CHARACTER_STRING => 'characterString',
self::TYPE_BMP_STRING => 'bmpString'
- ];
+ );
/**
* String type to character size mapping table.
@@ -188,7 +187,7 @@ abstract class ASN1
* @var array
* @access public
*/
- const STRING_TYPE_SIZE = [
+ var $stringTypeSize = array(
self::TYPE_UTF8_STRING => 0,
self::TYPE_BMP_STRING => 2,
self::TYPE_UNIVERSAL_STRING => 4,
@@ -196,7 +195,7 @@ abstract class ASN1
self::TYPE_TELETEX_STRING => 1,
self::TYPE_IA5_STRING => 1,
self::TYPE_VISIBLE_STRING => 1,
- ];
+ );
/**
* Parse BER-encoding
@@ -207,18 +206,15 @@ abstract class ASN1
* @return array
* @access public
*/
- public static function decodeBER($encoded)
+ function decodeBER($encoded)
{
if ($encoded instanceof Element) {
$encoded = $encoded->element;
}
- self::$encoded = $encoded;
-
- $decoded = [self::decode_ber($encoded)];
-
+ $this->encoded = $encoded;
// encapsulate in an array for BC with the old decodeBER
- return $decoded;
+ return array($this->_decode_ber($encoded));
}
/**
@@ -231,12 +227,12 @@ abstract class ASN1
* @param string $encoded
* @param int $start
* @param int $encoded_pos
- * @return array|bool
+ * @return array
* @access private
*/
- private static function decode_ber($encoded, $start = 0, $encoded_pos = 0)
+ function _decode_ber($encoded, $start = 0, $encoded_pos = 0)
{
- $current = ['start' => $start];
+ $current = array('start' => $start);
$type = ord($encoded[$encoded_pos++]);
$start++;
@@ -270,12 +266,11 @@ abstract class ASN1
$temp = substr($encoded, $encoded_pos, $length);
$encoded_pos += $length;
// tags of indefinte length don't really have a header length; this length includes the tag
- $current+= ['headerlength' => $length + 2];
+ $current+= array('headerlength' => $length + 2);
$start+= $length;
extract(unpack('Nlength', substr(str_pad($temp, 4, chr(0), STR_PAD_LEFT), -4)));
- /** @var integer $length */
} else {
- $current+= ['headerlength' => 2];
+ $current+= array('headerlength' => 2);
}
if ($length > (strlen($encoded) - $encoded_pos)) {
@@ -302,18 +297,18 @@ abstract class ASN1
case self::CLASS_PRIVATE:
case self::CLASS_CONTEXT_SPECIFIC:
if (!$constructed) {
- return [
+ return array(
'type' => $class,
'constant' => $tag,
'content' => $content,
'length' => $length + $start - $current['start']
- ] + $current;
+ );
}
- $newcontent = [];
+ $newcontent = array();
$remainingLength = $length;
while ($remainingLength > 0) {
- $temp = self::decode_ber($content, $start, $content_pos);
+ $temp = $this->_decode_ber($content, $start, $content_pos);
if ($temp === false) {
break;
}
@@ -331,7 +326,7 @@ abstract class ASN1
$content_pos += $length;
}
- return [
+ return array(
'type' => $class,
'constant' => $tag,
// the array encapsulation is for BC with the old format
@@ -340,10 +335,10 @@ abstract class ASN1
// the absence of $content['headerlength'] is how we know if something is indefinite or not.
// technically, it could be defined to be 2 and then another indicator could be used but whatever.
'length' => $start - $current['start']
- ] + $current;
+ ) + $current;
}
- $current+= ['type' => $tag];
+ $current+= array('type' => $tag);
// decode UNIVERSAL tags
switch ($tag) {
@@ -367,7 +362,7 @@ abstract class ASN1
if (!$constructed) {
$current['content'] = substr($content, $content_pos);
} else {
- $temp = self::decode_ber($content, $start, $content_pos);
+ $temp = $this->_decode_ber($content, $start, $content_pos);
if ($temp === false) {
return false;
}
@@ -394,7 +389,7 @@ abstract class ASN1
$current['content'] = '';
$length = 0;
while (substr($content, $content_pos, 2) != "\0\0") {
- $temp = self::decode_ber($content, $length + $start, $content_pos);
+ $temp = $this->_decode_ber($content, $length + $start, $content_pos);
if ($temp === false) {
return false;
}
@@ -420,7 +415,7 @@ abstract class ASN1
case self::TYPE_SEQUENCE:
case self::TYPE_SET:
$offset = 0;
- $current['content'] = [];
+ $current['content'] = array();
$content_len = strlen($content);
while ($content_pos < $content_len) {
// if indefinite length construction was used and we have an end-of-content string next
@@ -429,7 +424,7 @@ abstract class ASN1
$length = $offset + 2; // +2 for the EOC
break 2;
}
- $temp = self::decode_ber($content, $start + $offset, $content_pos);
+ $temp = $this->_decode_ber($content, $start + $offset, $content_pos);
if ($temp === false) {
return false;
}
@@ -439,7 +434,7 @@ abstract class ASN1
}
break;
case self::TYPE_OBJECT_IDENTIFIER:
- $current['content'] = self::decodeOID(substr($content, $content_pos));
+ $current['content'] = $this->_decodeOID(substr($content, $content_pos));
break;
/* Each character string type shall be encoded as if it had been declared:
[UNIVERSAL x] IMPLICIT OCTET STRING
@@ -473,14 +468,14 @@ abstract class ASN1
break;
case self::TYPE_UTC_TIME:
case self::TYPE_GENERALIZED_TIME:
- $current['content'] = self::decodeTime(substr($content, $content_pos), $tag);
+ $current['content'] = $this->_decodeTime(substr($content, $content_pos), $tag);
default:
}
$start+= $length;
// ie. length is the length of the full TLV encoding - it's not just the length of the value
- return $current + ['length' => $start - $current['start']];
+ return $current + array('length' => $start - $current['start']);
}
/**
@@ -493,10 +488,10 @@ abstract class ASN1
* @param array $decoded
* @param array $mapping
* @param array $special
- * @return array|bool|Element
+ * @return array
* @access public
*/
- public static function asn1map($decoded, $mapping, $special = [])
+ function asn1map($decoded, $mapping, $special = array())
{
if (!is_array($decoded)) {
return false;
@@ -509,13 +504,12 @@ abstract class ASN1
switch (true) {
case $mapping['type'] == self::TYPE_ANY:
$intype = $decoded['type'];
- // !isset(self::ANY_MAP[$intype]) produces a fatal error on PHP 5.6
- if (isset($decoded['constant']) || !array_key_exists($intype, self::ANY_MAP) || (ord(self::$encoded[$decoded['start']]) & 0x20)) {
- return new Element(substr(self::$encoded, $decoded['start'], $decoded['length']));
+ if (isset($decoded['constant']) || !isset($this->ANYmap[$intype]) || (ord($this->encoded[$decoded['start']]) & 0x20)) {
+ return new Element(substr($this->encoded, $decoded['start'], $decoded['length']));
}
- $inmap = self::ANY_MAP[$intype];
+ $inmap = $this->ANYmap[$intype];
if (is_string($inmap)) {
- return [$inmap => self::asn1map($decoded, ['type' => $intype] + $mapping, $special)];
+ return array($inmap => $this->asn1map($decoded, array('type' => $intype) + $mapping, $special));
}
break;
case $mapping['type'] == self::TYPE_CHOICE:
@@ -523,19 +517,19 @@ abstract class ASN1
switch (true) {
case isset($option['constant']) && $option['constant'] == $decoded['constant']:
case !isset($option['constant']) && $option['type'] == $decoded['type']:
- $value = self::asn1map($decoded, $option, $special);
+ $value = $this->asn1map($decoded, $option, $special);
break;
case !isset($option['constant']) && $option['type'] == self::TYPE_CHOICE:
- $v = self::asn1map($decoded, $option, $special);
+ $v = $this->asn1map($decoded, $option, $special);
if (isset($v)) {
$value = $v;
}
}
if (isset($value)) {
if (isset($special[$key])) {
- $value = $special[$key]($value);
+ $value = call_user_func($special[$key], $value);
}
- return [$key => $value];
+ return array($key => $value);
}
}
return null;
@@ -561,13 +555,13 @@ abstract class ASN1
switch ($decoded['type']) {
case self::TYPE_SEQUENCE:
- $map = [];
+ $map = array();
// ignore the min and max
if (isset($mapping['min']) && isset($mapping['max'])) {
$child = $mapping['children'];
foreach ($decoded['content'] as $content) {
- if (($map[] = self::asn1map($content, $child, $special)) === null) {
+ if (($map[] = $this->asn1map($content, $child, $special)) === null) {
return null;
}
}
@@ -603,37 +597,26 @@ abstract class ASN1
$maymatch = $constant == $temp['constant'] && $childClass == $tempClass;
} else {
// Can only match if no constant expected and type matches or is generic.
- $maymatch = !isset($child['constant']) && array_search($child['type'], [$temp['type'], self::TYPE_ANY, self::TYPE_CHOICE]) !== false;
+ $maymatch = !isset($child['constant']) && array_search($child['type'], array($temp['type'], self::TYPE_ANY, self::TYPE_CHOICE)) !== false;
}
}
}
if ($maymatch) {
// Attempt submapping.
- $candidate = self::asn1map($temp, $child, $special);
+ $candidate = $this->asn1map($temp, $child, $special);
$maymatch = $candidate !== null;
}
if ($maymatch) {
// Got the match: use it.
if (isset($special[$key])) {
- $candidate = $special[$key]($candidate);
+ $candidate = call_user_func($special[$key], $candidate);
}
$map[$key] = $candidate;
$i++;
} elseif (isset($child['default'])) {
- switch ($child['type']) {
- case ASN1::TYPE_INTEGER:
- $map[$key] = new BigInteger($child['default']);
- break;
- //case self::TYPE_OBJECT_IDENTIFIER:
- // if (!isset(self::$reverseOIDs[$name])) {
- // return null;
- // }
- //case ASN1::TYPE_BOOLEAN:
- default:
- $map[$key] = $child['default'];
- }
+ $map[$key] = $child['default']; // Use default.
} elseif (!isset($child['optional'])) {
return null; // Syntax error.
}
@@ -644,13 +627,13 @@ abstract class ASN1
// the main diff between sets and sequences is the encapsulation of the foreach in another for loop
case self::TYPE_SET:
- $map = [];
+ $map = array();
// ignore the min and max
if (isset($mapping['min']) && isset($mapping['max'])) {
$child = $mapping['children'];
foreach ($decoded['content'] as $content) {
- if (($map[] = self::asn1map($content, $child, $special)) === null) {
+ if (($map[] = $this->asn1map($content, $child, $special)) === null) {
return null;
}
}
@@ -686,13 +669,13 @@ abstract class ASN1
$maymatch = $constant == $temp['constant'] && $childClass == $tempClass;
} else {
// Can only match if no constant expected and type matches or is generic.
- $maymatch = !isset($child['constant']) && array_search($child['type'], [$temp['type'], self::TYPE_ANY, self::TYPE_CHOICE]) !== false;
+ $maymatch = !isset($child['constant']) && array_search($child['type'], array($temp['type'], self::TYPE_ANY, self::TYPE_CHOICE)) !== false;
}
}
if ($maymatch) {
// Attempt submapping.
- $candidate = self::asn1map($temp, $child, $special);
+ $candidate = $this->asn1map($temp, $child, $special);
$maymatch = $candidate !== null;
}
@@ -702,7 +685,7 @@ abstract class ASN1
// Got the match: use it.
if (isset($special[$key])) {
- $candidate = $special[$key]($candidate);
+ $candidate = call_user_func($special[$key], $candidate);
}
$map[$key] = $candidate;
break;
@@ -720,7 +703,7 @@ abstract class ASN1
}
return $map;
case self::TYPE_OBJECT_IDENTIFIER:
- return isset(self::$oids[$decoded['content']]) ? self::$oids[$decoded['content']] : $decoded['content'];
+ return isset($this->oids[$decoded['content']]) ? $this->oids[$decoded['content']] : $decoded['content'];
case self::TYPE_UTC_TIME:
case self::TYPE_GENERALIZED_TIME:
// for explicitly tagged optional stuff
@@ -731,9 +714,9 @@ abstract class ASN1
// in theory, doing isset($mapping['implicit']) would work but malformed certs do exist
// in the wild that OpenSSL decodes without issue so we'll support them as well
if (!is_object($decoded['content'])) {
- $decoded['content'] = self::decodeTime($decoded['content'], $decoded['type']);
+ $decoded['content'] = $this->_decodeTime($decoded['content'], $decoded['type']);
}
- return $decoded['content'] ? $decoded['content']->format(self::$format) : false;
+ return $decoded['content'] ? $decoded['content']->format($this->format) : false;
case self::TYPE_BIT_STRING:
if (isset($mapping['mapping'])) {
$offset = ord($decoded['content'][0]);
@@ -746,7 +729,7 @@ abstract class ASN1
therefore ensure that different semantics are not associated with such values which differ only in the number of trailing
0 bits."
*/
- $bits = count($mapping['mapping']) == $size ? [] : array_fill(0, count($mapping['mapping']) - $size, false);
+ $bits = count($mapping['mapping']) == $size ? array() : array_fill(0, count($mapping['mapping']) - $size, false);
for ($i = strlen($decoded['content']) - 1; $i > 0; $i--) {
$current = ord($decoded['content'][$i]);
for ($j = $offset; $j < 8; $j++) {
@@ -754,7 +737,7 @@ abstract class ASN1
}
$offset = 0;
}
- $values = [];
+ $values = array();
$map = array_reverse($mapping['mapping']);
foreach ($map as $i => $value) {
if ($bits[$i]) {
@@ -764,7 +747,7 @@ abstract class ASN1
return $values;
}
case self::TYPE_OCTET_STRING:
- return $decoded['content'];
+ return base64_encode($decoded['content']);
case self::TYPE_NULL:
return '';
case self::TYPE_BOOLEAN:
@@ -798,27 +781,6 @@ abstract class ASN1
}
/**
- * DER-decode the length
- *
- * DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4. See
- * {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
- *
- * @access public
- * @param string $string
- * @return int
- */
- public static function decodeLength(&$string)
- {
- $length = ord(Strings::shift($string));
- if ($length & 0x80) { // definite length, long form
- $length&= 0x7F;
- $temp = Strings::shift($string, $length);
- list(, $length) = unpack('N', substr(str_pad($temp, 4, chr(0), STR_PAD_LEFT), -4));
- }
- return $length;
- }
-
- /**
* ASN.1 Encode
*
* DER-encodes an ASN.1 semantic mapping ($mapping). Some libraries would probably call this function
@@ -826,29 +788,29 @@ abstract class ASN1
*
* "Special" mappings can be applied via $special.
*
- * @param Element|string|array $source
- * @param array $mapping
+ * @param string $source
+ * @param string $mapping
* @param array $special
* @return string
* @access public
*/
- public static function encodeDER($source, $mapping, $special = [])
+ function encodeDER($source, $mapping, $special = array())
{
- self::$location = [];
- return self::encode_der($source, $mapping, null, $special);
+ $this->location = array();
+ return $this->_encode_der($source, $mapping, null, $special);
}
/**
* ASN.1 Encode (Helper function)
*
- * @param Element|string|array $source
- * @param array $mapping
+ * @param string $source
+ * @param string $mapping
* @param int $idx
* @param array $special
* @return string
* @access private
*/
- private static function encode_der($source, $mapping, $idx = null, $special = [])
+ function _encode_der($source, $mapping, $idx = null, $special = array())
{
if ($source instanceof Element) {
return $source->element;
@@ -861,9 +823,9 @@ abstract class ASN1
if (isset($idx)) {
if (isset($special[$idx])) {
- $source = $special[$idx]($source);
+ $source = call_user_func($special[$idx], $source);
}
- self::$location[] = $idx;
+ $this->location[] = $idx;
}
$tag = $mapping['type'];
@@ -875,11 +837,11 @@ abstract class ASN1
// ignore the min and max
if (isset($mapping['min']) && isset($mapping['max'])) {
- $value = [];
+ $value = array();
$child = $mapping['children'];
foreach ($source as $content) {
- $temp = self::encode_der($content, $child, null, $special);
+ $temp = $this->_encode_der($content, $child, null, $special);
if ($temp === false) {
return false;
}
@@ -906,7 +868,7 @@ abstract class ASN1
continue;
}
- $temp = self::encode_der($source[$key], $child, $key, $special);
+ $temp = $this->_encode_der($source[$key], $child, $key, $special);
if ($temp === false) {
return false;
}
@@ -930,7 +892,7 @@ abstract class ASN1
*/
if (isset($child['explicit']) || $child['type'] == self::TYPE_CHOICE) {
$subtag = chr((self::CLASS_CONTEXT_SPECIFIC << 6) | 0x20 | $child['constant']);
- $temp = $subtag . self::encodeLength(strlen($temp)) . $temp;
+ $temp = $subtag . $this->_encodeLength(strlen($temp)) . $temp;
} else {
$subtag = chr((self::CLASS_CONTEXT_SPECIFIC << 6) | (ord($temp[0]) & 0x20) | $child['constant']);
$temp = $subtag . substr($temp, 1);
@@ -947,7 +909,7 @@ abstract class ASN1
continue;
}
- $temp = self::encode_der($source[$key], $child, $key, $special);
+ $temp = $this->_encode_der($source[$key], $child, $key, $special);
if ($temp === false) {
return false;
}
@@ -964,7 +926,7 @@ abstract class ASN1
if (isset($child['constant'])) {
if (isset($child['explicit']) || $child['type'] == self::TYPE_CHOICE) {
$subtag = chr((self::CLASS_CONTEXT_SPECIFIC << 6) | 0x20 | $child['constant']);
- $temp = $subtag . self::encodeLength(strlen($temp)) . $temp;
+ $temp = $subtag . $this->_encodeLength(strlen($temp)) . $temp;
} else {
$subtag = chr((self::CLASS_CONTEXT_SPECIFIC << 6) | (ord($temp[0]) & 0x20) | $child['constant']);
$temp = $subtag . substr($temp, 1);
@@ -973,7 +935,7 @@ abstract class ASN1
}
if (isset($idx)) {
- array_pop(self::$location);
+ array_pop($this->location);
}
if ($temp && isset($mapping['cast'])) {
@@ -1044,36 +1006,36 @@ abstract class ASN1
the number of unused bits in the final subsequent octet. The number shall be in the range zero to seven.
-- http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#page=16 */
- $value = $source;
+ $value = base64_decode($source);
break;
case self::TYPE_OBJECT_IDENTIFIER:
- $value = self::encodeOID($source);
+ $value = $this->_encodeOID($source);
break;
case self::TYPE_ANY:
- $loc = self::$location;
+ $loc = $this->location;
if (isset($idx)) {
- array_pop(self::$location);
+ array_pop($this->location);
}
switch (true) {
case !isset($source):
- return self::encode_der(null, ['type' => self::TYPE_NULL] + $mapping, null, $special);
+ return $this->_encode_der(null, array('type' => self::TYPE_NULL) + $mapping, null, $special);
case is_int($source):
case $source instanceof BigInteger:
- return self::encode_der($source, ['type' => self::TYPE_INTEGER] + $mapping, null, $special);
+ return $this->_encode_der($source, array('type' => self::TYPE_INTEGER) + $mapping, null, $special);
case is_float($source):
- return self::encode_der($source, ['type' => self::TYPE_REAL] + $mapping, null, $special);
+ return $this->_encode_der($source, array('type' => self::TYPE_REAL) + $mapping, null, $special);
case is_bool($source):
- return self::encode_der($source, ['type' => self::TYPE_BOOLEAN] + $mapping, null, $special);
+ return $this->_encode_der($source, array('type' => self::TYPE_BOOLEAN) + $mapping, null, $special);
case is_array($source) && count($source) == 1:
$typename = implode('', array_keys($source));
- $outtype = array_search($typename, self::ANY_MAP, true);
+ $outtype = array_search($typename, $this->ANYmap, true);
if ($outtype !== false) {
- return self::encode_der($source[$typename], ['type' => $outtype] + $mapping, null, $special);
+ return $this->_encode_der($source[$typename], array('type' => $outtype) + $mapping, null, $special);
}
}
- $filters = self::$filters;
+ $filters = $this->filters;
foreach ($loc as $part) {
if (!isset($filters[$part])) {
$filters = false;
@@ -1082,9 +1044,10 @@ abstract class ASN1
$filters = $filters[$part];
}
if ($filters === false) {
- throw new \RuntimeException('No filters defined for ' . implode('/', $loc));
+ user_error('No filters defined for ' . implode('/', $loc));
+ return false;
}
- return self::encode_der($source, $filters + $mapping, null, $special);
+ return $this->_encode_der($source, $filters + $mapping, null, $special);
case self::TYPE_NULL:
$value = '';
break;
@@ -1105,23 +1068,44 @@ abstract class ASN1
$value = $source ? "\xFF" : "\x00";
break;
default:
- throw new \RuntimeException('Mapping provides no type definition for ' . implode('/', self::$location));
+ user_error('Mapping provides no type definition for ' . implode('/', $this->location));
+ return false;
}
if (isset($idx)) {
- array_pop(self::$location);
+ array_pop($this->location);
}
if (isset($mapping['cast'])) {
if (isset($mapping['explicit']) || $mapping['type'] == self::TYPE_CHOICE) {
- $value = chr($tag) . self::encodeLength(strlen($value)) . $value;
+ $value = chr($tag) . $this->_encodeLength(strlen($value)) . $value;
$tag = ($mapping['class'] << 6) | 0x20 | $mapping['cast'];
} else {
$tag = ($mapping['class'] << 6) | (ord($temp[0]) & 0x20) | $mapping['cast'];
}
}
- return chr($tag) . self::encodeLength(strlen($value)) . $value;
+ return chr($tag) . $this->_encodeLength(strlen($value)) . $value;
+ }
+
+ /**
+ * DER-encode the length
+ *
+ * DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4. See
+ * {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
+ *
+ * @access private
+ * @param int $length
+ * @return string
+ */
+ function _encodeLength($length)
+ {
+ if ($length <= 0x7F) {
+ return chr($length);
+ }
+
+ $temp = ltrim(pack('N', $length), chr(0));
+ return pack('Ca*', 0x80 | strlen($temp), $temp);
}
/**
@@ -1129,11 +1113,11 @@ abstract class ASN1
*
* Called by _decode_ber()
*
- * @access public
+ * @access private
* @param string $content
* @return string
*/
- public static function decodeOID($content)
+ function _decodeOID($content)
{
static $eighty;
if (!$eighty) {
@@ -1177,11 +1161,11 @@ abstract class ASN1
*
* Called by _encode_der()
*
- * @access public
+ * @access private
* @param string $source
* @return string
*/
- public static function encodeOID($source)
+ function _encodeOID($source)
{
static $mask, $zero, $forty;
if (!$mask) {
@@ -1190,15 +1174,11 @@ abstract class ASN1
$forty = new BigInteger(40);
}
- if (!preg_match('#(?:\d+\.)+#', $source)) {
- $oid = isset(self::$reverseOIDs[$source]) ? self::$reverseOIDs[$source] : false;
- } else {
- $oid = $source;
- }
+ $oid = preg_match('#(?:\d+\.)+#', $source) ? $source : array_search($source, $this->oids);
if ($oid === false) {
- throw new \RuntimeException('Invalid OID');
+ user_error('Invalid OID');
+ return false;
}
-
$parts = explode('.', $oid);
$part1 = array_shift($parts);
$part2 = array_shift($parts);
@@ -1240,7 +1220,7 @@ abstract class ASN1
* @param int $tag
* @return string
*/
- private static function decodeTime($content, $tag)
+ function _decodeTime($content, $tag)
{
/* UTCTime:
http://tools.ietf.org/html/rfc5280#section-4.1.2.5.1
@@ -1286,38 +1266,52 @@ abstract class ASN1
* @access public
* @param string $format
*/
- public static function setTimeFormat($format)
+ function setTimeFormat($format)
{
- self::$format = $format;
+ $this->format = $format;
}
/**
* Load OIDs
*
* Load the relevant OIDs for a particular ASN.1 semantic mapping.
- * Previously loaded OIDs are retained.
*
* @access public
* @param array $oids
*/
- public static function loadOIDs($oids)
+ function loadOIDs($oids)
{
- self::$reverseOIDs+= $oids;
- self::$oids = array_flip(self::$reverseOIDs);
+ $this->oids = $oids;
}
/**
- * Set filters
+ * Load filters
*
- * See \phpseclib3\File\X509, etc, for an example.
- * Previously loaded filters are not retained.
+ * See \phpseclib\File\X509, etc, for an example.
*
* @access public
* @param array $filters
*/
- public static function setFilters($filters)
+ function loadFilters($filters)
{
- self::$filters = $filters;
+ $this->filters = $filters;
+ }
+
+ /**
+ * String Shift
+ *
+ * Inspired by array_shift
+ *
+ * @param string $string
+ * @param int $index
+ * @return string
+ * @access private
+ */
+ function _string_shift(&$string, $index = 1)
+ {
+ $substr = substr($string, 0, $index);
+ $string = substr($string, $index);
+ return $substr;
}
/**
@@ -1332,14 +1326,13 @@ abstract class ASN1
* @return string
* @access public
*/
- public static function convert($in, $from = self::TYPE_UTF8_STRING, $to = self::TYPE_UTF8_STRING)
+ function convert($in, $from = self::TYPE_UTF8_STRING, $to = self::TYPE_UTF8_STRING)
{
- // isset(self::STRING_TYPE_SIZE[$from] returns a fatal error on PHP 5.6
- if (!array_key_exists($from, self::STRING_TYPE_SIZE) || !array_key_exists($to, self::STRING_TYPE_SIZE)) {
+ if (!isset($this->stringTypeSize[$from]) || !isset($this->stringTypeSize[$to])) {
return false;
}
- $insize = self::STRING_TYPE_SIZE[$from];
- $outsize = self::STRING_TYPE_SIZE[$to];
+ $insize = $this->stringTypeSize[$from];
+ $outsize = $this->stringTypeSize[$to];
$inlength = strlen($in);
$out = '';
@@ -1419,80 +1412,4 @@ abstract class ASN1
}
return $out;
}
-
- /**
- * Extract raw BER from Base64 encoding
- *
- * @access private
- * @param string $str
- * @return string
- */
- public static function extractBER($str)
- {
- /* X.509 certs are assumed to be base64 encoded but sometimes they'll have additional things in them
- * above and beyond the ceritificate.
- * ie. some may have the following preceding the -----BEGIN CERTIFICATE----- line:
- *
- * Bag Attributes
- * localKeyID: 01 00 00 00
- * subject=/O=organization/OU=org unit/CN=common name
- * issuer=/O=organization/CN=common name
- */
- if (strlen($str) > ini_get('pcre.backtrack_limit')) {
- $temp = $str;
- } else {
- $temp = preg_replace('#.*?^-+[^-]+-+[\r\n ]*$#ms', '', $str, 1);
- $temp = preg_replace('#-+END.*[\r\n ]*.*#ms', '', $str, 1);
- }
- // remove new lines
- $temp = str_replace(["\r", "\n", ' '], '', $temp);
- // remove the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- stuff
- $temp = preg_replace('#^-+[^-]+-+|-+[^-]+-+$#', '', $temp);
- $temp = preg_match('#^[a-zA-Z\d/+]*={0,2}$#', $temp) ? Base64::decode($temp) : false;
- return $temp != false ? $temp : $str;
- }
-
- /**
- * DER-encode the length
- *
- * DER supports lengths up to (2**8)**127, however, we'll only support lengths up to (2**8)**4. See
- * {@link http://itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#p=13 X.690 paragraph 8.1.3} for more information.
- *
- * @access public
- * @param int $length
- * @return string
- */
- public static function encodeLength($length)
- {
- if ($length <= 0x7F) {
- return chr($length);
- }
-
- $temp = ltrim(pack('N', $length), chr(0));
- return pack('Ca*', 0x80 | strlen($temp), $temp);
- }
-
- /**
- * Returns the OID corresponding to a name
- *
- * What's returned in the associative array returned by loadX509() (or load*()) is either a name or an OID if
- * no OID to name mapping is available. The problem with this is that what may be an unmapped OID in one version
- * of phpseclib may not be unmapped in the next version, so apps that are looking at this OID may not be able
- * to work from version to version.
- *
- * This method will return the OID if a name is passed to it and if no mapping is avialable it'll assume that
- * what's being passed to it already is an OID and return that instead. A few examples.
- *
- * getOID('2.16.840.1.101.3.4.2.1') == '2.16.840.1.101.3.4.2.1'
- * getOID('id-sha256') == '2.16.840.1.101.3.4.2.1'
- * getOID('zzz') == 'zzz'
- *
- * @access public
- * @param string $name
- * @return string
- */
- public static function getOID($name)
- {
- return isset(self::$reverseOIDs[$name]) ? self::$reverseOIDs[$name] : $name;
- }
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php
index ade26ae51..68246e2b5 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Element.php
@@ -1,7 +1,6 @@
<?php
-
/**
- * ASN.1 Raw Element
+ * Pure-PHP ASN.1 Parser
*
* PHP version 5
*
@@ -13,13 +12,12 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\File\ASN1;
+namespace phpseclib\File\ASN1;
/**
- * ASN.1 Raw Element
+ * ASN.1 Element
*
- * An ASN.1 ANY mapping will return an ASN1\Element object. Use of this object
- * will also bypass the normal encoding rules in ASN1::encodeDER()
+ * Bypass normal encoding rules in phpseclib\File\ASN1::encodeDER()
*
* @package ASN1
* @author Jim Wigginton <terrafrost@php.net>
@@ -33,16 +31,16 @@ class Element
* @var string
* @access private
*/
- public $element;
+ var $element;
/**
* Constructor
*
* @param string $encoded
- * @return \phpseclib3\File\ASN1\Element
+ * @return \phpseclib\File\ASN1\Element
* @access public
*/
- public function __construct($encoded)
+ function __construct($encoded)
{
$this->element = $encoded;
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AccessDescription.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AccessDescription.php
deleted file mode 100644
index 969de8c44..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AccessDescription.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * AccessDescription
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AccessDescription
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AccessDescription
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'accessMethod' => ['type' => ASN1::TYPE_OBJECT_IDENTIFIER],
- 'accessLocation' => GeneralName::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AdministrationDomainName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AdministrationDomainName.php
deleted file mode 100644
index 1b607e7cd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AdministrationDomainName.php
+++ /dev/null
@@ -1,40 +0,0 @@
-<?php
-
-/**
- * AdministrationDomainName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AdministrationDomainName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AdministrationDomainName
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- // if class isn't present it's assumed to be \phpseclib3\File\ASN1::CLASS_UNIVERSAL or
- // (if constant is present) \phpseclib3\File\ASN1::CLASS_CONTEXT_SPECIFIC
- 'class' => ASN1::CLASS_APPLICATION,
- 'cast' => 2,
- 'children' => [
- 'numeric' => ['type' => ASN1::TYPE_NUMERIC_STRING],
- 'printable' => ['type' => ASN1::TYPE_PRINTABLE_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AlgorithmIdentifier.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AlgorithmIdentifier.php
deleted file mode 100644
index f9f25334a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AlgorithmIdentifier.php
+++ /dev/null
@@ -1,39 +0,0 @@
-<?php
-
-/**
- * AlgorithmIdentifier
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AlgorithmIdentifier
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AlgorithmIdentifier
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'algorithm' => ['type' => ASN1::TYPE_OBJECT_IDENTIFIER],
- 'parameters' => [
- 'type' => ASN1::TYPE_ANY,
- 'optional' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AnotherName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AnotherName.php
deleted file mode 100644
index 3fe2ba0bd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AnotherName.php
+++ /dev/null
@@ -1,41 +0,0 @@
-<?php
-
-/**
- * AnotherName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AnotherName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AnotherName
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'type-id' => ['type' => ASN1::TYPE_OBJECT_IDENTIFIER],
- 'value' => [
- 'type' => ASN1::TYPE_ANY,
- 'constant' => 0,
- 'optional' => true,
- 'explicit' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attribute.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attribute.php
deleted file mode 100644
index a80dad31c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attribute.php
+++ /dev/null
@@ -1,41 +0,0 @@
-<?php
-
-/**
- * Attribute
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Attribute
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Attribute
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'type' => AttributeType::MAP,
- 'value'=> [
- 'type' => ASN1::TYPE_SET,
- 'min' => 1,
- 'max' => -1,
- 'children' => AttributeValue::MAP
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeType.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeType.php
deleted file mode 100644
index 891b80825..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeType.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * AttributeType
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AttributeType
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AttributeType
-{
- const MAP = ['type' => ASN1::TYPE_OBJECT_IDENTIFIER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeTypeAndValue.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeTypeAndValue.php
deleted file mode 100644
index ff4faa078..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeTypeAndValue.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * AttributeTypeAndValue
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AttributeTypeAndValue
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AttributeTypeAndValue
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'type' => AttributeType::MAP,
- 'value'=> AttributeValue::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeValue.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeValue.php
deleted file mode 100644
index eca03273c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AttributeValue.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * AttributeValue
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AttributeValue
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AttributeValue
-{
- const MAP = ['type' => ASN1::TYPE_ANY];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attributes.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attributes.php
deleted file mode 100644
index 563a69001..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Attributes.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * Attributes
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Attributes
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Attributes
-{
- const MAP = [
- 'type' => ASN1::TYPE_SET,
- 'min' => 1,
- 'max' => -1,
- 'children' => Attribute::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityInfoAccessSyntax.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityInfoAccessSyntax.php
deleted file mode 100644
index 38c714d5a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityInfoAccessSyntax.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * AuthorityInfoAccessSyntax
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AuthorityInfoAccessSyntax
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AuthorityInfoAccessSyntax
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => AccessDescription::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityKeyIdentifier.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityKeyIdentifier.php
deleted file mode 100644
index b6b08ae01..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/AuthorityKeyIdentifier.php
+++ /dev/null
@@ -1,49 +0,0 @@
-<?php
-
-/**
- * AuthorityKeyIdentifier
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * AuthorityKeyIdentifier
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class AuthorityKeyIdentifier
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'keyIdentifier' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + KeyIdentifier::MAP,
- 'authorityCertIssuer' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ] + GeneralNames::MAP,
- 'authorityCertSerialNumber' => [
- 'constant' => 2,
- 'optional' => true,
- 'implicit' => true
- ] + CertificateSerialNumber::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BaseDistance.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BaseDistance.php
deleted file mode 100644
index 8453e49d9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BaseDistance.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * BaseDistance
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * BaseDistance
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class BaseDistance
-{
- const MAP = ['type' => ASN1::TYPE_INTEGER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BasicConstraints.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BasicConstraints.php
deleted file mode 100644
index 490bc9201..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BasicConstraints.php
+++ /dev/null
@@ -1,43 +0,0 @@
-<?php
-
-/**
- * BasicConstraints
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * BasicConstraints
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class BasicConstraints
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'cA' => [
- 'type' => ASN1::TYPE_BOOLEAN,
- 'optional' => true,
- 'default' => false
- ],
- 'pathLenConstraint' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'optional' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttribute.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttribute.php
deleted file mode 100644
index 19f31c24a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttribute.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * BuiltInDomainDefinedAttribute
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * BuiltInDomainDefinedAttribute
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class BuiltInDomainDefinedAttribute
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'type' => ['type' => ASN1::TYPE_PRINTABLE_STRING],
- 'value' => ['type' => ASN1::TYPE_PRINTABLE_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttributes.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttributes.php
deleted file mode 100644
index dc412118c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInDomainDefinedAttributes.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * BuiltInDomainDefinedAttributes
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * BuiltInDomainDefinedAttributes
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class BuiltInDomainDefinedAttributes
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => 4, // ub-domain-defined-attributes
- 'children' => BuiltInDomainDefinedAttribute::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInStandardAttributes.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInStandardAttributes.php
deleted file mode 100644
index 4cbe0b09f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/BuiltInStandardAttributes.php
+++ /dev/null
@@ -1,71 +0,0 @@
-<?php
-
-/**
- * BuiltInStandardAttributes
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * BuiltInStandardAttributes
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class BuiltInStandardAttributes
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'country-name' => ['optional' => true] + CountryName::MAP,
- 'administration-domain-name' => ['optional' => true] + AdministrationDomainName::MAP,
- 'network-address' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + NetworkAddress::MAP,
- 'terminal-identifier' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ] + TerminalIdentifier::MAP,
- 'private-domain-name' => [
- 'constant' => 2,
- 'optional' => true,
- 'explicit' => true
- ] + PrivateDomainName::MAP,
- 'organization-name' => [
- 'constant' => 3,
- 'optional' => true,
- 'implicit' => true
- ] + OrganizationName::MAP,
- 'numeric-user-identifier' => [
- 'constant' => 4,
- 'optional' => true,
- 'implicit' => true
- ] + NumericUserIdentifier::MAP,
- 'personal-name' => [
- 'constant' => 5,
- 'optional' => true,
- 'implicit' => true
- ] + PersonalName::MAP,
- 'organizational-unit-names' => [
- 'constant' => 6,
- 'optional' => true,
- 'implicit' => true
- ] + OrganizationalUnitNames::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CPSuri.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CPSuri.php
deleted file mode 100644
index 78733df9a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CPSuri.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * CPSuri
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CPSuri
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CPSuri
-{
- const MAP = ['type' => ASN1::TYPE_IA5_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLDistributionPoints.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLDistributionPoints.php
deleted file mode 100644
index 21ab66236..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLDistributionPoints.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * CRLDistributionPoints
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CRLDistributionPoints
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CRLDistributionPoints
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => DistributionPoint::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLNumber.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLNumber.php
deleted file mode 100644
index 921fdd529..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLNumber.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * CRLNumber
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CRLNumber
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CRLNumber
-{
- const MAP = ['type' => ASN1::TYPE_INTEGER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLReason.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLReason.php
deleted file mode 100644
index e43e4dd75..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CRLReason.php
+++ /dev/null
@@ -1,45 +0,0 @@
-<?php
-
-/**
- * CRLReason
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CRLReason
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CRLReason
-{
- const MAP = [
- 'type' => ASN1::TYPE_ENUMERATED,
- 'mapping' => [
- 'unspecified',
- 'keyCompromise',
- 'cACompromise',
- 'affiliationChanged',
- 'superseded',
- 'cessationOfOperation',
- 'certificateHold',
- // Value 7 is not used.
- 8 => 'removeFromCRL',
- 'privilegeWithdrawn',
- 'aACompromise'
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertPolicyId.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertPolicyId.php
deleted file mode 100644
index a4620e7d0..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertPolicyId.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * CertPolicyId
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CertPolicyId
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CertPolicyId
-{
- const MAP = ['type' => ASN1::TYPE_OBJECT_IDENTIFIER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Certificate.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Certificate.php
deleted file mode 100644
index f8ff4130f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Certificate.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * Certificate
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Certificate
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Certificate
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'tbsCertificate' => TBSCertificate::MAP,
- 'signatureAlgorithm' => AlgorithmIdentifier::MAP,
- 'signature' => ['type' => ASN1::TYPE_BIT_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateIssuer.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateIssuer.php
deleted file mode 100644
index ba4504afc..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateIssuer.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * CertificateIssuer
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CertificateIssuer
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CertificateIssuer
-{
- const MAP = GeneralNames::MAP;
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateList.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateList.php
deleted file mode 100644
index 79a1f3242..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateList.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * CertificateList
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CertificateList
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CertificateList
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'tbsCertList' => TBSCertList::MAP,
- 'signatureAlgorithm' => AlgorithmIdentifier::MAP,
- 'signature' => ['type' => ASN1::TYPE_BIT_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificatePolicies.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificatePolicies.php
deleted file mode 100644
index e9f9354af..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificatePolicies.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * CertificatePolicies
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CertificatePolicies
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CertificatePolicies
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => PolicyInformation::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateSerialNumber.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateSerialNumber.php
deleted file mode 100644
index 83f26d311..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificateSerialNumber.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * CertificateSerialNumber
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CertificateSerialNumber
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CertificateSerialNumber
-{
- const MAP = ['type' => ASN1::TYPE_INTEGER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequest.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequest.php
deleted file mode 100644
index 23587f087..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequest.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * CertificationRequest
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CertificationRequest
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CertificationRequest
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'certificationRequestInfo' => CertificationRequestInfo::MAP,
- 'signatureAlgorithm' => AlgorithmIdentifier::MAP,
- 'signature' => ['type' => ASN1::TYPE_BIT_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequestInfo.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequestInfo.php
deleted file mode 100644
index 1ebff5ff6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CertificationRequestInfo.php
+++ /dev/null
@@ -1,45 +0,0 @@
-<?php
-
-/**
- * CertificationRequestInfo
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CertificationRequestInfo
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CertificationRequestInfo
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'version' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'mapping' => ['v1']
- ],
- 'subject' => Name::MAP,
- 'subjectPKInfo' => SubjectPublicKeyInfo::MAP,
- 'attributes' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + Attributes::MAP,
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Characteristic_two.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Characteristic_two.php
deleted file mode 100644
index b73e0ba2d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Characteristic_two.php
+++ /dev/null
@@ -1,40 +0,0 @@
-<?php
-
-/**
- * Characteristic_two
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Characteristic_two
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Characteristic_two
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'm' => ['type' => ASN1::TYPE_INTEGER], // field size 2**m
- 'basis' => ['type' => ASN1::TYPE_OBJECT_IDENTIFIER],
- 'parameters' => [
- 'type' => ASN1::TYPE_ANY,
- 'optional' => true
- ]
- ]
- ];
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CountryName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CountryName.php
deleted file mode 100644
index 83b3a2c3f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/CountryName.php
+++ /dev/null
@@ -1,40 +0,0 @@
-<?php
-
-/**
- * CountryName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * CountryName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class CountryName
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- // if class isn't present it's assumed to be \phpseclib3\File\ASN1::CLASS_UNIVERSAL or
- // (if constant is present) \phpseclib3\File\ASN1::CLASS_CONTEXT_SPECIFIC
- 'class' => ASN1::CLASS_APPLICATION,
- 'cast' => 1,
- 'children' => [
- 'x121-dcc-code' => ['type' => ASN1::TYPE_NUMERIC_STRING],
- 'iso-3166-alpha2-code' => ['type' => ASN1::TYPE_PRINTABLE_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Curve.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Curve.php
deleted file mode 100644
index 1a574583b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Curve.php
+++ /dev/null
@@ -1,40 +0,0 @@
-<?php
-
-/**
- * Curve
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Curve
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Curve
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'a' => FieldElement::MAP,
- 'b' => FieldElement::MAP,
- 'seed' => [
- 'type' => ASN1::TYPE_BIT_STRING,
- 'optional' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DHParameter.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DHParameter.php
deleted file mode 100644
index 8edd9d06b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DHParameter.php
+++ /dev/null
@@ -1,42 +0,0 @@
-<?php
-
-/**
- * DHParameter
- *
- * From: https://www.teletrust.de/fileadmin/files/oid/oid_pkcs-3v1-4.pdf#page=6
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DHParameter
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DHParameter
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'prime' => ['type' => ASN1::TYPE_INTEGER],
- 'base' => ['type' => ASN1::TYPE_INTEGER],
- 'privateValueLength' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'optional' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAParams.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAParams.php
deleted file mode 100644
index c89fd84b4..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAParams.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * DSAParams
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DSAParams
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DSAParams
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'p' => ['type' => ASN1::TYPE_INTEGER],
- 'q' => ['type' => ASN1::TYPE_INTEGER],
- 'g' => ['type' => ASN1::TYPE_INTEGER]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPrivateKey.php
deleted file mode 100644
index eaec347da..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPrivateKey.php
+++ /dev/null
@@ -1,40 +0,0 @@
-<?php
-
-/**
- * DSAPrivateKey
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DSAPrivateKey
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DSAPrivateKey
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'version' => ['type' => ASN1::TYPE_INTEGER],
- 'p' => ['type' => ASN1::TYPE_INTEGER],
- 'q' => ['type' => ASN1::TYPE_INTEGER],
- 'g' => ['type' => ASN1::TYPE_INTEGER],
- 'y' => ['type' => ASN1::TYPE_INTEGER],
- 'x' => ['type' => ASN1::TYPE_INTEGER]
- ]
- ];
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPublicKey.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPublicKey.php
deleted file mode 100644
index 867d80b7d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DSAPublicKey.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * DSAPublicKey
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DSAPublicKey
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DSAPublicKey
-{
- const MAP = ['type' => ASN1::TYPE_INTEGER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DigestInfo.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DigestInfo.php
deleted file mode 100644
index 828c27989..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DigestInfo.php
+++ /dev/null
@@ -1,38 +0,0 @@
-<?php
-
-/**
- * DigestInfo
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DigestInfo
- *
- * from https://tools.ietf.org/html/rfc2898#appendix-A.3
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DigestInfo
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'digestAlgorithm' => AlgorithmIdentifier::MAP,
- 'digest' => ['type' => ASN1::TYPE_OCTET_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DirectoryString.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DirectoryString.php
deleted file mode 100644
index 458acab19..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DirectoryString.php
+++ /dev/null
@@ -1,39 +0,0 @@
-<?php
-
-/**
- * DirectoryString
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DirectoryString
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DirectoryString
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'teletexString' => ['type' => ASN1::TYPE_TELETEX_STRING],
- 'printableString' => ['type' => ASN1::TYPE_PRINTABLE_STRING],
- 'universalString' => ['type' => ASN1::TYPE_UNIVERSAL_STRING],
- 'utf8String' => ['type' => ASN1::TYPE_UTF8_STRING],
- 'bmpString' => ['type' => ASN1::TYPE_BMP_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DisplayText.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DisplayText.php
deleted file mode 100644
index 6c88b41cb..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DisplayText.php
+++ /dev/null
@@ -1,38 +0,0 @@
-<?php
-
-/**
- * DisplayText
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DisplayText
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DisplayText
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'ia5String' => ['type' => ASN1::TYPE_IA5_STRING],
- 'visibleString' => ['type' => ASN1::TYPE_VISIBLE_STRING],
- 'bmpString' => ['type' => ASN1::TYPE_BMP_STRING],
- 'utf8String' => ['type' => ASN1::TYPE_UTF8_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPoint.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPoint.php
deleted file mode 100644
index 91b3feef5..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPoint.php
+++ /dev/null
@@ -1,49 +0,0 @@
-<?php
-
-/**
- * DistributionPoint
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DistributionPoint
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DistributionPoint
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'distributionPoint' => [
- 'constant' => 0,
- 'optional' => true,
- 'explicit' => true
- ] + DistributionPointName::MAP,
- 'reasons' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ] + ReasonFlags::MAP,
- 'cRLIssuer' => [
- 'constant' => 2,
- 'optional' => true,
- 'implicit' => true
- ] + GeneralNames::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPointName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPointName.php
deleted file mode 100644
index fc157bcae..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DistributionPointName.php
+++ /dev/null
@@ -1,44 +0,0 @@
-<?php
-
-/**
- * DistributionPointName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DistributionPointName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DistributionPointName
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'fullName' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + GeneralNames::MAP,
- 'nameRelativeToCRLIssuer' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ] + RelativeDistinguishedName::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DssSigValue.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DssSigValue.php
deleted file mode 100644
index 1bffe9253..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/DssSigValue.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * DssSigValue
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * DssSigValue
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DssSigValue
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'r' => ['type' => ASN1::TYPE_INTEGER],
- 's' => ['type' => ASN1::TYPE_INTEGER]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECParameters.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECParameters.php
deleted file mode 100644
index c27d16f9e..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECParameters.php
+++ /dev/null
@@ -1,49 +0,0 @@
-<?php
-
-/**
- * ECParameters
- *
- * From: https://tools.ietf.org/html/rfc5915
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * ECParameters
- *
- * ECParameters ::= CHOICE {
- * namedCurve OBJECT IDENTIFIER
- * -- implicitCurve NULL
- * -- specifiedCurve SpecifiedECDomain
- * }
- * -- implicitCurve and specifiedCurve MUST NOT be used in PKIX.
- * -- Details for SpecifiedECDomain can be found in [X9.62].
- * -- Any future additions to this CHOICE should be coordinated
- * -- with ANSI X9.
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ECParameters
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'namedCurve' => ['type' => ASN1::TYPE_OBJECT_IDENTIFIER],
- 'implicitCurve' => ['type' => ASN1::TYPE_NULL],
- 'specifiedCurve' => SpecifiedECDomain::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPoint.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPoint.php
deleted file mode 100644
index 1a9429a44..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPoint.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * ECPoint
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * ECPoint
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ECPoint
-{
- const MAP = ['type' => ASN1::TYPE_OCTET_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPrivateKey.php
deleted file mode 100644
index a0d7a066c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ECPrivateKey.php
+++ /dev/null
@@ -1,52 +0,0 @@
-<?php
-
-/**
- * ECPrivateKey
- *
- * From: https://tools.ietf.org/html/rfc5915
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * ECPrivateKey
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ECPrivateKey
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'version' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'mapping' => [1 => 'ecPrivkeyVer1']
- ],
- 'privateKey' => ['type' => ASN1::TYPE_OCTET_STRING],
- 'parameters' => [
- 'constant' => 0,
- 'optional' => true,
- 'explicit' => true
- ] + ECParameters::MAP,
- 'publicKey' => [
- 'type' => ASN1::TYPE_BIT_STRING,
- 'constant' => 1,
- 'optional' => true,
- 'explicit' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EDIPartyName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EDIPartyName.php
deleted file mode 100644
index 0c2327b8e..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EDIPartyName.php
+++ /dev/null
@@ -1,46 +0,0 @@
-<?php
-
-/**
- * EDIPartyName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * EDIPartyName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class EDIPartyName
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'nameAssigner' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + DirectoryString::MAP,
- // partyName is technically required but \phpseclib3\File\ASN1 doesn't currently support non-optional constants and
- // setting it to optional gets the job done in any event.
- 'partyName' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ] + DirectoryString::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EcdsaSigValue.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EcdsaSigValue.php
deleted file mode 100644
index 98dd965aa..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EcdsaSigValue.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * EcdsaSigValue
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * EcdsaSigValue
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class EcdsaSigValue
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'r' => ['type' => ASN1::TYPE_INTEGER],
- 's' => ['type' => ASN1::TYPE_INTEGER]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedData.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedData.php
deleted file mode 100644
index 7873579fd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedData.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * EncryptedData
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * EncryptedData
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class EncryptedData
-{
- const MAP = ['type' => ASN1::TYPE_OCTET_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedPrivateKeyInfo.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedPrivateKeyInfo.php
deleted file mode 100644
index 5d409eb1a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/EncryptedPrivateKeyInfo.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * EncryptedPrivateKeyInfo
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * EncryptedPrivateKeyInfo
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class EncryptedPrivateKeyInfo
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'encryptionAlgorithm' => AlgorithmIdentifier::MAP,
- 'encryptedData' => EncryptedData::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtKeyUsageSyntax.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtKeyUsageSyntax.php
deleted file mode 100644
index c61116df4..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtKeyUsageSyntax.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * ExtKeyUsageSyntax
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * ExtKeyUsageSyntax
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ExtKeyUsageSyntax
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => KeyPurposeId::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extension.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extension.php
deleted file mode 100644
index 392007938..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extension.php
+++ /dev/null
@@ -1,47 +0,0 @@
-<?php
-
-/**
- * Extension
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Extension
- *
- * A certificate using system MUST reject the certificate if it encounters
- * a critical extension it does not recognize; however, a non-critical
- * extension may be ignored if it is not recognized.
- *
- * http://tools.ietf.org/html/rfc5280#section-4.2
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Extension
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'extnId' => ['type' => ASN1::TYPE_OBJECT_IDENTIFIER],
- 'critical' => [
- 'type' => ASN1::TYPE_BOOLEAN,
- 'optional' => true,
- 'default' => false
- ],
- 'extnValue' => ['type' => ASN1::TYPE_OCTET_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttribute.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttribute.php
deleted file mode 100644
index 6455e1898..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttribute.php
+++ /dev/null
@@ -1,46 +0,0 @@
-<?php
-
-/**
- * ExtensionAttribute
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * ExtensionAttribute
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ExtensionAttribute
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'extension-attribute-type' => [
- 'type' => ASN1::TYPE_PRINTABLE_STRING,
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ],
- 'extension-attribute-value' => [
- 'type' => ASN1::TYPE_ANY,
- 'constant' => 1,
- 'optional' => true,
- 'explicit' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttributes.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttributes.php
deleted file mode 100644
index 047bb29a4..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ExtensionAttributes.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * ExtensionAttributes
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * ExtensionAttributes
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ExtensionAttributes
-{
- const MAP = [
- 'type' => ASN1::TYPE_SET,
- 'min' => 1,
- 'max' => 256, // ub-extension-attributes
- 'children' => ExtensionAttribute::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extensions.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extensions.php
deleted file mode 100644
index e3d528d45..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Extensions.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * Extensions
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Extensions
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Extensions
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- // technically, it's MAX, but we'll assume anything < 0 is MAX
- 'max' => -1,
- // if 'children' isn't an array then 'min' and 'max' must be defined
- 'children' => Extension::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldElement.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldElement.php
deleted file mode 100644
index 6666e2ade..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldElement.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * FieldElement
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * FieldElement
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class FieldElement
-{
- const MAP = ['type' => ASN1::TYPE_OCTET_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldID.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldID.php
deleted file mode 100644
index 13c6ac490..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/FieldID.php
+++ /dev/null
@@ -1,39 +0,0 @@
-<?php
-
-/**
- * FieldID
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * FieldID
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class FieldID
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'fieldType' => ['type' => ASN1::TYPE_OBJECT_IDENTIFIER],
- 'parameters' => [
- 'type' => ASN1::TYPE_ANY,
- 'optional' => true
- ]
- ]
- ];
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralName.php
deleted file mode 100644
index ba0b9e484..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralName.php
+++ /dev/null
@@ -1,84 +0,0 @@
-<?php
-
-/**
- * GeneralName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * GeneralName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class GeneralName
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'otherName' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + AnotherName::MAP,
- 'rfc822Name' => [
- 'type' => ASN1::TYPE_IA5_STRING,
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ],
- 'dNSName' => [
- 'type' => ASN1::TYPE_IA5_STRING,
- 'constant' => 2,
- 'optional' => true,
- 'implicit' => true
- ],
- 'x400Address' => [
- 'constant' => 3,
- 'optional' => true,
- 'implicit' => true
- ] + ORAddress::MAP,
- 'directoryName' => [
- 'constant' => 4,
- 'optional' => true,
- 'explicit' => true
- ] + Name::MAP,
- 'ediPartyName' => [
- 'constant' => 5,
- 'optional' => true,
- 'implicit' => true
- ] + EDIPartyName::MAP,
- 'uniformResourceIdentifier' => [
- 'type' => ASN1::TYPE_IA5_STRING,
- 'constant' => 6,
- 'optional' => true,
- 'implicit' => true
- ],
- 'iPAddress' => [
- 'type' => ASN1::TYPE_OCTET_STRING,
- 'constant' => 7,
- 'optional' => true,
- 'implicit' => true
- ],
- 'registeredID' => [
- 'type' => ASN1::TYPE_OBJECT_IDENTIFIER,
- 'constant' => 8,
- 'optional' => true,
- 'implicit' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralNames.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralNames.php
deleted file mode 100644
index c8a3c89bd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralNames.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * GeneralNames
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * GeneralNames
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class GeneralNames
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => GeneralName::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtree.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtree.php
deleted file mode 100644
index 15d954304..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtree.php
+++ /dev/null
@@ -1,46 +0,0 @@
-<?php
-
-/**
- * GeneralSubtree
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * GeneralSubtree
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class GeneralSubtree
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'base' => GeneralName::MAP,
- 'minimum' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true,
- 'default' => '0'
- ] + BaseDistance::MAP,
- 'maximum' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true,
- ] + BaseDistance::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtrees.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtrees.php
deleted file mode 100644
index 3b10265cd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/GeneralSubtrees.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * GeneralSubtrees
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * GeneralSubtrees
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class GeneralSubtrees
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => GeneralSubtree::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HashAlgorithm.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HashAlgorithm.php
deleted file mode 100644
index 02f587d13..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HashAlgorithm.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * HashAglorithm
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * HashAglorithm
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class HashAlgorithm
-{
- const MAP = AlgorithmIdentifier::MAP;
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HoldInstructionCode.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HoldInstructionCode.php
deleted file mode 100644
index 7d4959614..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/HoldInstructionCode.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * HoldInstructionCode
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * HoldInstructionCode
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class HoldInstructionCode
-{
- const MAP = ['type' => ASN1::TYPE_OBJECT_IDENTIFIER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/InvalidityDate.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/InvalidityDate.php
deleted file mode 100644
index 0ae964ce9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/InvalidityDate.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * InvalidityDate
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * InvalidityDate
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class InvalidityDate
-{
- const MAP = ['type' => ASN1::TYPE_GENERALIZED_TIME];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuerAltName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuerAltName.php
deleted file mode 100644
index 5f71db8f7..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuerAltName.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * IssuerAltName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * IssuerAltName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class IssuerAltName
-{
- const MAP = GeneralNames::MAP;
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuingDistributionPoint.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuingDistributionPoint.php
deleted file mode 100644
index f4b35b380..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/IssuingDistributionPoint.php
+++ /dev/null
@@ -1,72 +0,0 @@
-<?php
-
-/**
- * IssuingDistributionPoint
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * IssuingDistributionPoint
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class IssuingDistributionPoint
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'distributionPoint' => [
- 'constant' => 0,
- 'optional' => true,
- 'explicit' => true
- ] + DistributionPointName::MAP,
- 'onlyContainsUserCerts' => [
- 'type' => ASN1::TYPE_BOOLEAN,
- 'constant' => 1,
- 'optional' => true,
- 'default' => false,
- 'implicit' => true
- ],
- 'onlyContainsCACerts' => [
- 'type' => ASN1::TYPE_BOOLEAN,
- 'constant' => 2,
- 'optional' => true,
- 'default' => false,
- 'implicit' => true
- ],
- 'onlySomeReasons' => [
- 'constant' => 3,
- 'optional' => true,
- 'implicit' => true
- ] + ReasonFlags::MAP,
- 'indirectCRL' => [
- 'type' => ASN1::TYPE_BOOLEAN,
- 'constant' => 4,
- 'optional' => true,
- 'default' => false,
- 'implicit' => true
- ],
- 'onlyContainsAttributeCerts' =>[
- 'type' => ASN1::TYPE_BOOLEAN,
- 'constant' => 5,
- 'optional' => true,
- 'default' => false,
- 'implicit' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyIdentifier.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyIdentifier.php
deleted file mode 100644
index eb2939b85..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyIdentifier.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * KeyIdentifier
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * KeyIdentifier
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class KeyIdentifier
-{
- const MAP = ['type' => ASN1::TYPE_OCTET_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyPurposeId.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyPurposeId.php
deleted file mode 100644
index 7aee54ada..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyPurposeId.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * KeyPurposeId
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * KeyPurposeId
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class KeyPurposeId
-{
- const MAP = ['type' => ASN1::TYPE_OBJECT_IDENTIFIER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyUsage.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyUsage.php
deleted file mode 100644
index abf599ed1..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/KeyUsage.php
+++ /dev/null
@@ -1,43 +0,0 @@
-<?php
-
-/**
- * KeyUsage
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * KeyUsage
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class KeyUsage
-{
- const MAP = [
- 'type' => ASN1::TYPE_BIT_STRING,
- 'mapping' => [
- 'digitalSignature',
- 'nonRepudiation',
- 'keyEncipherment',
- 'dataEncipherment',
- 'keyAgreement',
- 'keyCertSign',
- 'cRLSign',
- 'encipherOnly',
- 'decipherOnly'
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/MaskGenAlgorithm.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/MaskGenAlgorithm.php
deleted file mode 100644
index 5e0e26f07..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/MaskGenAlgorithm.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * MaskGenAglorithm
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * MaskGenAglorithm
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class MaskGenAlgorithm
-{
- const MAP = AlgorithmIdentifier::MAP;
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Name.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Name.php
deleted file mode 100644
index a4ba82a0e..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Name.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * Name
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Name
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Name
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'rdnSequence' => RDNSequence::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NameConstraints.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NameConstraints.php
deleted file mode 100644
index 518e68f6b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NameConstraints.php
+++ /dev/null
@@ -1,44 +0,0 @@
-<?php
-
-/**
- * NameConstraints
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * NameConstraints
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class NameConstraints
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'permittedSubtrees' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + GeneralSubtrees::MAP,
- 'excludedSubtrees' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ] + GeneralSubtrees::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NetworkAddress.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NetworkAddress.php
deleted file mode 100644
index a67c0276c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NetworkAddress.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * NetworkAddress
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * NetworkAddress
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class NetworkAddress
-{
- const MAP = ['type' => ASN1::TYPE_NUMERIC_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NoticeReference.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NoticeReference.php
deleted file mode 100644
index cea267733..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NoticeReference.php
+++ /dev/null
@@ -1,41 +0,0 @@
-<?php
-
-/**
- * NoticeReference
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * NoticeReference
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class NoticeReference
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'organization' => DisplayText::MAP,
- 'noticeNumbers' => [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => 200,
- 'children' => ['type' => ASN1::TYPE_INTEGER]
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NumericUserIdentifier.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NumericUserIdentifier.php
deleted file mode 100644
index 04998393c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/NumericUserIdentifier.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * NumericUserIdentifier
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * NumericUserIdentifier
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class NumericUserIdentifier
-{
- const MAP = ['type' => ASN1::TYPE_NUMERIC_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ORAddress.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ORAddress.php
deleted file mode 100644
index cde7b3d6c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ORAddress.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * ORAddress
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * ORAddress
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ORAddress
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'built-in-standard-attributes' => BuiltInStandardAttributes::MAP,
- 'built-in-domain-defined-attributes' => ['optional' => true] + BuiltInDomainDefinedAttributes::MAP,
- 'extension-attributes' => ['optional' => true] + ExtensionAttributes::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OneAsymmetricKey.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OneAsymmetricKey.php
deleted file mode 100644
index 9a5c16873..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OneAsymmetricKey.php
+++ /dev/null
@@ -1,52 +0,0 @@
-<?php
-
-/**
- * OneAsymmetricKey
- *
- * See https://tools.ietf.org/html/rfc5958
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * OneAsymmetricKey
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OneAsymmetricKey
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'version' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'mapping' => ['v1', 'v2']
- ],
- 'privateKeyAlgorithm'=> AlgorithmIdentifier::MAP,
- 'privateKey' => PrivateKey::MAP,
- 'attributes' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + Attributes::MAP,
- 'publicKey' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ] + PublicKey::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationName.php
deleted file mode 100644
index 250c92774..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationName.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * OrganizationName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * OrganizationName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OrganizationName
-{
- const MAP = ['type' => ASN1::TYPE_PRINTABLE_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationalUnitNames.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationalUnitNames.php
deleted file mode 100644
index eb2ac677a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OrganizationalUnitNames.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * OrganizationalUnitNames
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * OrganizationalUnitNames
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OrganizationalUnitNames
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => 4, // ub-organizational-units
- 'children' => ['type' => ASN1::TYPE_PRINTABLE_STRING]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfo.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfo.php
deleted file mode 100644
index d75fa3f7c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfo.php
+++ /dev/null
@@ -1,38 +0,0 @@
-<?php
-
-/**
- * OtherPrimeInfo
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * OtherPrimeInfo
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OtherPrimeInfo
-{
- // version must be multi if otherPrimeInfos present
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'prime' => ['type' => ASN1::TYPE_INTEGER], // ri
- 'exponent' => ['type' => ASN1::TYPE_INTEGER], // di
- 'coefficient' => ['type' => ASN1::TYPE_INTEGER] // ti
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfos.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfos.php
deleted file mode 100644
index bb833171d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/OtherPrimeInfos.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * OtherPrimeInfos
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * OtherPrimeInfos
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OtherPrimeInfos
-{
- // version must be multi if otherPrimeInfos present
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => OtherPrimeInfo::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBEParameter.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBEParameter.php
deleted file mode 100644
index bd17291fd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBEParameter.php
+++ /dev/null
@@ -1,38 +0,0 @@
-<?php
-
-/**
- * PBEParameter
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PBEParameter
- *
- * from https://tools.ietf.org/html/rfc2898#appendix-A.3
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PBEParameter
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'salt' => ['type' => ASN1::TYPE_OCTET_STRING],
- 'iterationCount' => ['type' => ASN1::TYPE_INTEGER]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBES2params.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBES2params.php
deleted file mode 100644
index 1d807db70..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBES2params.php
+++ /dev/null
@@ -1,38 +0,0 @@
-<?php
-
-/**
- * PBES2params
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PBES2params
- *
- * from https://tools.ietf.org/html/rfc2898#appendix-A.3
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PBES2params
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'keyDerivationFunc'=> AlgorithmIdentifier::MAP,
- 'encryptionScheme' => AlgorithmIdentifier::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBKDF2params.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBKDF2params.php
deleted file mode 100644
index 16d37a95b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBKDF2params.php
+++ /dev/null
@@ -1,45 +0,0 @@
-<?php
-
-/**
- * PBKDF2params
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PBKDF2params
- *
- * from https://tools.ietf.org/html/rfc2898#appendix-A.3
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PBKDF2params
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- // technically, this is a CHOICE in RFC2898 but the other "choice" is, currently, more of a placeholder
- // in the RFC
- 'salt'=> ['type' => ASN1::TYPE_OCTET_STRING],
- 'iterationCount'=> ['type' => ASN1::TYPE_INTEGER],
- 'keyLength' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'optional' => true
- ],
- 'prf' => AlgorithmIdentifier::MAP + ['optional' => true]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBMAC1params.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBMAC1params.php
deleted file mode 100644
index f375aa16b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PBMAC1params.php
+++ /dev/null
@@ -1,38 +0,0 @@
-<?php
-
-/**
- * PBMAC1params
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PBMAC1params
- *
- * from https://tools.ietf.org/html/rfc2898#appendix-A.3
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PBMAC1params
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'keyDerivationFunc'=> AlgorithmIdentifier::MAP,
- 'messageAuthScheme'=> AlgorithmIdentifier::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PKCS9String.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PKCS9String.php
deleted file mode 100644
index 11c638bdf..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PKCS9String.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * PKCS9String
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PKCS9String
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PKCS9String
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'ia5String' => ['type' => ASN1::TYPE_IA5_STRING],
- 'directoryString' => DirectoryString::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Pentanomial.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Pentanomial.php
deleted file mode 100644
index 493cd2992..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Pentanomial.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * Pentanomial
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Pentanomial
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Pentanomial
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'k1' => ['type' => ASN1::TYPE_INTEGER], // k1 > 0
- 'k2' => ['type' => ASN1::TYPE_INTEGER], // k2 > k1
- 'k3' => ['type' => ASN1::TYPE_INTEGER], // k3 > h2
- ]
- ];
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PersonalName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PersonalName.php
deleted file mode 100644
index c9492c9ef..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PersonalName.php
+++ /dev/null
@@ -1,58 +0,0 @@
-<?php
-
-/**
- * PersonalName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PersonalName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PersonalName
-{
- const MAP = [
- 'type' => ASN1::TYPE_SET,
- 'children' => [
- 'surname' => [
- 'type' => ASN1::TYPE_PRINTABLE_STRING,
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ],
- 'given-name' => [
- 'type' => ASN1::TYPE_PRINTABLE_STRING,
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ],
- 'initials' => [
- 'type' => ASN1::TYPE_PRINTABLE_STRING,
- 'constant' => 2,
- 'optional' => true,
- 'implicit' => true
- ],
- 'generation-qualifier' => [
- 'type' => ASN1::TYPE_PRINTABLE_STRING,
- 'constant' => 3,
- 'optional' => true,
- 'implicit' => true
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyInformation.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyInformation.php
deleted file mode 100644
index cfda3990c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyInformation.php
+++ /dev/null
@@ -1,42 +0,0 @@
-<?php
-
-/**
- * PolicyInformation
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PolicyInformation
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PolicyInformation
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'policyIdentifier' => CertPolicyId::MAP,
- 'policyQualifiers' => [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 0,
- 'max' => -1,
- 'optional' => true,
- 'children' => PolicyQualifierInfo::MAP
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyMappings.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyMappings.php
deleted file mode 100644
index c1086477a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyMappings.php
+++ /dev/null
@@ -1,41 +0,0 @@
-<?php
-
-/**
- * PolicyMappings
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PolicyMappings
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PolicyMappings
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'issuerDomainPolicy' => CertPolicyId::MAP,
- 'subjectDomainPolicy' => CertPolicyId::MAP
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierId.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierId.php
deleted file mode 100644
index 454a9d1a9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierId.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * PolicyQualifierId
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PolicyQualifierId
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PolicyQualifierId
-{
- const MAP = ['type' => ASN1::TYPE_OBJECT_IDENTIFIER];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierInfo.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierInfo.php
deleted file mode 100644
index a1d7e1727..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PolicyQualifierInfo.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * PolicyQualifierInfo
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PolicyQualifierInfo
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PolicyQualifierInfo
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'policyQualifierId' => PolicyQualifierId::MAP,
- 'qualifier' => ['type' => ASN1::TYPE_ANY]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PostalAddress.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PostalAddress.php
deleted file mode 100644
index ec8354fa0..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PostalAddress.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * PostalAddress
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PostalAddress
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PostalAddress
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'optional' => true,
- 'min' => 1,
- 'max' => -1,
- 'children' => DirectoryString::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Prime_p.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Prime_p.php
deleted file mode 100644
index 09c8006be..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Prime_p.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * Prime_p
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Prime_p
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Prime_p
-{
- const MAP = ['type' => ASN1::TYPE_INTEGER];
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateDomainName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateDomainName.php
deleted file mode 100644
index b26c0cbaa..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateDomainName.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * PrivateDomainName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PrivateDomainName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PrivateDomainName
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'numeric' => ['type' => ASN1::TYPE_NUMERIC_STRING],
- 'printable' => ['type' => ASN1::TYPE_PRINTABLE_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKey.php
deleted file mode 100644
index 7670f4add..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKey.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * PrivateKey
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PrivateKey
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PrivateKey
-{
- const MAP = ['type' => ASN1::TYPE_OCTET_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyInfo.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyInfo.php
deleted file mode 100644
index 170f6f276..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyInfo.php
+++ /dev/null
@@ -1,45 +0,0 @@
-<?php
-
-/**
- * PrivateKeyInfo
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PrivateKeyInfo
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PrivateKeyInfo
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'version' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'mapping' => ['v1']
- ],
- 'privateKeyAlgorithm'=> AlgorithmIdentifier::MAP,
- 'privateKey' => PrivateKey::MAP,
- 'attributes' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true
- ] + Attributes::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyUsagePeriod.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyUsagePeriod.php
deleted file mode 100644
index 8c396a000..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PrivateKeyUsagePeriod.php
+++ /dev/null
@@ -1,44 +0,0 @@
-<?php
-
-/**
- * PrivateKeyUsagePeriod
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PrivateKeyUsagePeriod
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PrivateKeyUsagePeriod
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'notBefore' => [
- 'constant' => 0,
- 'optional' => true,
- 'implicit' => true,
- 'type' => ASN1::TYPE_GENERALIZED_TIME],
- 'notAfter' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true,
- 'type' => ASN1::TYPE_GENERALIZED_TIME]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKey.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKey.php
deleted file mode 100644
index b8239aa6a..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKey.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * PublicKey
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PublicKey
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PublicKey
-{
- const MAP = ['type' => ASN1::TYPE_BIT_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyAndChallenge.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyAndChallenge.php
deleted file mode 100644
index ef212812d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyAndChallenge.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * PublicKeyAndChallenge
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PublicKeyAndChallenge
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PublicKeyAndChallenge
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'spki' => SubjectPublicKeyInfo::MAP,
- 'challenge' => ['type' => ASN1::TYPE_IA5_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyInfo.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyInfo.php
deleted file mode 100644
index 587230bc3..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/PublicKeyInfo.php
+++ /dev/null
@@ -1,39 +0,0 @@
-<?php
-
-/**
- * PublicKeyInfo
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * PublicKeyInfo
- *
- * this format is not formally defined anywhere but is none-the-less the form you
- * get when you do "openssl rsa -in private.pem -outform PEM -pubout"
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PublicKeyInfo
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'publicKeyAlgorithm'=> AlgorithmIdentifier::MAP,
- 'publicKey' => ['type' => ASN1::TYPE_BIT_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RC2CBCParameter.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RC2CBCParameter.php
deleted file mode 100644
index 3697f103b..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RC2CBCParameter.php
+++ /dev/null
@@ -1,41 +0,0 @@
-<?php
-
-/**
- * RC2CBCParameter
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * RC2CBCParameter
- *
- * from https://tools.ietf.org/html/rfc2898#appendix-A.3
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class RC2CBCParameter
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'rc2ParametersVersion'=> [
- 'type' => ASN1::TYPE_INTEGER,
- 'optional' => true
- ],
- 'iv'=> ['type' => ASN1::TYPE_OCTET_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RDNSequence.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RDNSequence.php
deleted file mode 100644
index 848e2c938..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RDNSequence.php
+++ /dev/null
@@ -1,42 +0,0 @@
-<?php
-
-/**
- * RDNSequence
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * RDNSequence
- *
- * In practice, RDNs containing multiple name-value pairs (called "multivalued RDNs") are rare,
- * but they can be useful at times when either there is no unique attribute in the entry or you
- * want to ensure that the entry's DN contains some useful identifying information.
- *
- * - https://www.opends.org/wiki/page/DefinitionRelativeDistinguishedName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class RDNSequence
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- // RDNSequence does not define a min or a max, which means it doesn't have one
- 'min' => 0,
- 'max' => -1,
- 'children' => RelativeDistinguishedName::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPrivateKey.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPrivateKey.php
deleted file mode 100644
index fbbb0f7cf..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPrivateKey.php
+++ /dev/null
@@ -1,48 +0,0 @@
-<?php
-
-/**
- * RSAPrivateKey
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * RSAPrivateKey
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class RSAPrivateKey
-{
- // version must be multi if otherPrimeInfos present
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'version' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'mapping' => ['two-prime', 'multi']
- ],
- 'modulus' => ['type' => ASN1::TYPE_INTEGER], // n
- 'publicExponent' => ['type' => ASN1::TYPE_INTEGER], // e
- 'privateExponent' => ['type' => ASN1::TYPE_INTEGER], // d
- 'prime1' => ['type' => ASN1::TYPE_INTEGER], // p
- 'prime2' => ['type' => ASN1::TYPE_INTEGER], // q
- 'exponent1' => ['type' => ASN1::TYPE_INTEGER], // d mod (p-1)
- 'exponent2' => ['type' => ASN1::TYPE_INTEGER], // d mod (q-1)
- 'coefficient' => ['type' => ASN1::TYPE_INTEGER], // (inverse of q) mod p
- 'otherPrimeInfos' => OtherPrimeInfos::MAP + ['optional' => true]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPublicKey.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPublicKey.php
deleted file mode 100644
index 1ea441d03..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSAPublicKey.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * RSAPublicKey
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * RSAPublicKey
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class RSAPublicKey
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'modulus' => ['type' => ASN1::TYPE_INTEGER],
- 'publicExponent' => ['type' => ASN1::TYPE_INTEGER]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSASSA_PSS_params.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSASSA_PSS_params.php
deleted file mode 100644
index b9ad46b01..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RSASSA_PSS_params.php
+++ /dev/null
@@ -1,62 +0,0 @@
-<?php
-
-/**
- * RSASSA_PSS_params
- *
- * As defined in https://tools.ietf.org/html/rfc4055#section-3.1
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * RSASSA_PSS_params
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class RSASSA_PSS_params
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'hashAlgorithm' => [
- 'constant' => 0,
- 'optional' => true,
- 'explicit' => true,
- //'default' => 'sha1Identifier'
- ] + HashAlgorithm::MAP,
- 'maskGenAlgorithm' => [
- 'constant' => 1,
- 'optional' => true,
- 'explicit' => true,
- //'default' => 'mgf1SHA1Identifier'
- ] + MaskGenAlgorithm::MAP,
- 'saltLength' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'constant' => 2,
- 'optional' => true,
- 'explicit' => true,
- 'default' => 20
- ],
- 'trailerField' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'constant' => 3,
- 'optional' => true,
- 'explicit' => true,
- 'default' => 1
- ]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ReasonFlags.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ReasonFlags.php
deleted file mode 100644
index 3cb32c480..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/ReasonFlags.php
+++ /dev/null
@@ -1,43 +0,0 @@
-<?php
-
-/**
- * ReasonFlags
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * ReasonFlags
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class ReasonFlags
-{
- const MAP = [
- 'type' => ASN1::TYPE_BIT_STRING,
- 'mapping' => [
- 'unused',
- 'keyCompromise',
- 'cACompromise',
- 'affiliationChanged',
- 'superseded',
- 'cessationOfOperation',
- 'certificateHold',
- 'privilegeWithdrawn',
- 'aACompromise'
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RelativeDistinguishedName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RelativeDistinguishedName.php
deleted file mode 100644
index de9dfaf60..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RelativeDistinguishedName.php
+++ /dev/null
@@ -1,41 +0,0 @@
-<?php
-
-/**
- * RelativeDistinguishedName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * RelativeDistinguishedName
- *
- * In practice, RDNs containing multiple name-value pairs (called "multivalued RDNs") are rare,
- * but they can be useful at times when either there is no unique attribute in the entry or you
- * want to ensure that the entry's DN contains some useful identifying information.
- *
- * - https://www.opends.org/wiki/page/DefinitionRelativeDistinguishedName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class RelativeDistinguishedName
-{
- const MAP = [
- 'type' => ASN1::TYPE_SET,
- 'min' => 1,
- 'max' => -1,
- 'children' => AttributeTypeAndValue::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RevokedCertificate.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RevokedCertificate.php
deleted file mode 100644
index b012d9dff..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/RevokedCertificate.php
+++ /dev/null
@@ -1,39 +0,0 @@
-<?php
-
-/**
- * RevokedCertificate
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * RevokedCertificate
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class RevokedCertificate
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'userCertificate' => CertificateSerialNumber::MAP,
- 'revocationDate' => Time::MAP,
- 'crlEntryExtensions' => [
- 'optional' => true
- ] + Extensions::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SignedPublicKeyAndChallenge.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SignedPublicKeyAndChallenge.php
deleted file mode 100644
index c3591e2ff..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SignedPublicKeyAndChallenge.php
+++ /dev/null
@@ -1,37 +0,0 @@
-<?php
-
-/**
- * SignedPublicKeyAndChallenge
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * SignedPublicKeyAndChallenge
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class SignedPublicKeyAndChallenge
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'publicKeyAndChallenge' => PublicKeyAndChallenge::MAP,
- 'signatureAlgorithm' => AlgorithmIdentifier::MAP,
- 'signature' => ['type' => ASN1::TYPE_BIT_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SpecifiedECDomain.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SpecifiedECDomain.php
deleted file mode 100644
index fb437eab4..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SpecifiedECDomain.php
+++ /dev/null
@@ -1,49 +0,0 @@
-<?php
-
-/**
- * SpecifiedECDomain
- *
- * From: http://www.secg.org/sec1-v2.pdf#page=109
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * SpecifiedECDomain
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class SpecifiedECDomain
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'version' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'mapping' => [1 => 'ecdpVer1', 'ecdpVer2', 'ecdpVer3']
- ],
- 'fieldID' => FieldID::MAP,
- 'curve' => Curve::MAP,
- 'base' => ECPoint::MAP,
- 'order' => ['type' => ASN1::TYPE_INTEGER],
- 'cofactor' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'optional' => true
- ],
- 'hash' => ['optional' => true] + HashAlgorithm::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectAltName.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectAltName.php
deleted file mode 100644
index 02d2d6d49..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectAltName.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * SubjectAltName
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * SubjectAltName
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class SubjectAltName
-{
- const MAP = GeneralNames::MAP;
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectDirectoryAttributes.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectDirectoryAttributes.php
deleted file mode 100644
index 1eff925a2..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectDirectoryAttributes.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * SubjectDirectoryAttributes
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * SubjectDirectoryAttributes
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class SubjectDirectoryAttributes
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => Attribute::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectInfoAccessSyntax.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectInfoAccessSyntax.php
deleted file mode 100644
index 98ab3ddd6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectInfoAccessSyntax.php
+++ /dev/null
@@ -1,35 +0,0 @@
-<?php
-
-/**
- * SubjectInfoAccessSyntax
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * SubjectInfoAccessSyntax
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class SubjectInfoAccessSyntax
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'min' => 1,
- 'max' => -1,
- 'children' => AccessDescription::MAP
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectPublicKeyInfo.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectPublicKeyInfo.php
deleted file mode 100644
index c367608cd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/SubjectPublicKeyInfo.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * SubjectPublicKeyInfo
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * SubjectPublicKeyInfo
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class SubjectPublicKeyInfo
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'algorithm' => AlgorithmIdentifier::MAP,
- 'subjectPublicKey' => ['type' => ASN1::TYPE_BIT_STRING]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertList.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertList.php
deleted file mode 100644
index 49be58eb9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertList.php
+++ /dev/null
@@ -1,58 +0,0 @@
-<?php
-
-/**
- * TBSCertList
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * TBSCertList
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class TBSCertList
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'version' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'mapping' => ['v1', 'v2', 'v3'],
- 'optional' => true,
- 'default' => 'v2'
- ],
- 'signature' => AlgorithmIdentifier::MAP,
- 'issuer' => Name::MAP,
- 'thisUpdate' => Time::MAP,
- 'nextUpdate' => [
- 'optional' => true
- ] + Time::MAP,
- 'revokedCertificates' => [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'optional' => true,
- 'min' => 0,
- 'max' => -1,
- 'children' => RevokedCertificate::MAP
- ],
- 'crlExtensions' => [
- 'constant' => 0,
- 'optional' => true,
- 'explicit' => true
- ] + Extensions::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertificate.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertificate.php
deleted file mode 100644
index dc5fe2aa3..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TBSCertificate.php
+++ /dev/null
@@ -1,69 +0,0 @@
-<?php
-
-/**
- * TBSCertificate
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * TBSCertificate
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class TBSCertificate
-{
- // assert($TBSCertificate['children']['signature'] == $Certificate['children']['signatureAlgorithm'])
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- // technically, default implies optional, but we'll define it as being optional, none-the-less, just to
- // reenforce that fact
- 'version' => [
- 'type' => ASN1::TYPE_INTEGER,
- 'constant' => 0,
- 'optional' => true,
- 'explicit' => true,
- 'mapping' => ['v1', 'v2', 'v3'],
- 'default' => 'v1'
- ],
- 'serialNumber' => CertificateSerialNumber::MAP,
- 'signature' => AlgorithmIdentifier::MAP,
- 'issuer' => Name::MAP,
- 'validity' => Validity::MAP,
- 'subject' => Name::MAP,
- 'subjectPublicKeyInfo' => SubjectPublicKeyInfo::MAP,
- // implicit means that the T in the TLV structure is to be rewritten, regardless of the type
- 'issuerUniqueID' => [
- 'constant' => 1,
- 'optional' => true,
- 'implicit' => true
- ] + UniqueIdentifier::MAP,
- 'subjectUniqueID' => [
- 'constant' => 2,
- 'optional' => true,
- 'implicit' => true
- ] + UniqueIdentifier::MAP,
- // <http://tools.ietf.org/html/rfc2459#page-74> doesn't use the EXPLICIT keyword but if
- // it's not IMPLICIT, it's EXPLICIT
- 'extensions' => [
- 'constant' => 3,
- 'optional' => true,
- 'explicit' => true
- ] + Extensions::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TerminalIdentifier.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TerminalIdentifier.php
deleted file mode 100644
index 5c6fdddb6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/TerminalIdentifier.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * TerminalIdentifier
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * TerminalIdentifier
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class TerminalIdentifier
-{
- const MAP = ['type' => ASN1::TYPE_PRINTABLE_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Time.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Time.php
deleted file mode 100644
index a673c3afc..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Time.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * Time
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Time
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Time
-{
- const MAP = [
- 'type' => ASN1::TYPE_CHOICE,
- 'children' => [
- 'utcTime' => ['type' => ASN1::TYPE_UTC_TIME],
- 'generalTime' => ['type' => ASN1::TYPE_GENERALIZED_TIME]
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Trinomial.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Trinomial.php
deleted file mode 100644
index 7cd4ba27c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Trinomial.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * Trinomial
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Trinomial
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Trinomial
-{
- const MAP = ['type' => ASN1::TYPE_INTEGER];
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UniqueIdentifier.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UniqueIdentifier.php
deleted file mode 100644
index 64645773d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UniqueIdentifier.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * UniqueIdentifier
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * UniqueIdentifier
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class UniqueIdentifier
-{
- const MAP = ['type' => ASN1::TYPE_BIT_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UserNotice.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UserNotice.php
deleted file mode 100644
index 2a0c86542..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/UserNotice.php
+++ /dev/null
@@ -1,42 +0,0 @@
-<?php
-
-/**
- * UserNotice
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * UserNotice
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class UserNotice
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'noticeRef' => [
- 'optional' => true,
- 'implicit' => true
- ] + NoticeReference::MAP,
- 'explicitText' => [
- 'optional' => true,
- 'implicit' => true
- ] + DisplayText::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Validity.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Validity.php
deleted file mode 100644
index 040aa7f59..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/Validity.php
+++ /dev/null
@@ -1,36 +0,0 @@
-<?php
-
-/**
- * Validity
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * Validity
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Validity
-{
- const MAP = [
- 'type' => ASN1::TYPE_SEQUENCE,
- 'children' => [
- 'notBefore' => Time::MAP,
- 'notAfter' => Time::MAP
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_ca_policy_url.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_ca_policy_url.php
deleted file mode 100644
index 1da389a72..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_ca_policy_url.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * netscape_ca_policy_url
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * netscape_ca_policy_url
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class netscape_ca_policy_url
-{
- const MAP = ['type' => ASN1::TYPE_IA5_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_cert_type.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_cert_type.php
deleted file mode 100644
index c5845b594..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_cert_type.php
+++ /dev/null
@@ -1,44 +0,0 @@
-<?php
-
-/**
- * netscape_cert_type
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * netscape_cert_type
- *
- * mapping is from <http://www.mozilla.org/projects/security/pki/nss/tech-notes/tn3.html>
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class netscape_cert_type
-{
- const MAP = [
- 'type' => ASN1::TYPE_BIT_STRING,
- 'mapping' => [
- 'SSLClient',
- 'SSLServer',
- 'Email',
- 'ObjectSigning',
- 'Reserved',
- 'SSLCA',
- 'EmailCA',
- 'ObjectSigningCA'
- ]
- ];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_comment.php b/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_comment.php
deleted file mode 100644
index 8ff14dacc..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/File/ASN1/Maps/netscape_comment.php
+++ /dev/null
@@ -1,30 +0,0 @@
-<?php
-
-/**
- * netscape_comment
- *
- * PHP version 5
- *
- * @category File
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2016 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\File\ASN1\Maps;
-
-use phpseclib3\File\ASN1;
-
-/**
- * netscape_comment
- *
- * @package ASN1
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class netscape_comment
-{
- const MAP = ['type' => ASN1::TYPE_IA5_STRING];
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/File/X509.php b/vendor/phpseclib/phpseclib/phpseclib/File/X509.php
index eb122b6bb..3520efdc1 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/File/X509.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/File/X509.php
@@ -24,26 +24,15 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\File;
-
-use DateTimeImmutable;
-use DateTimeInterface;
+namespace phpseclib\File;
+
+use phpseclib\Crypt\Hash;
+use phpseclib\Crypt\Random;
+use phpseclib\Crypt\RSA;
+use phpseclib\File\ASN1\Element;
+use phpseclib\Math\BigInteger;
+use DateTime;
use DateTimeZone;
-use ParagonIE\ConstantTime\Base64;
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Crypt\Common\PrivateKey;
-use phpseclib3\Crypt\Common\PublicKey;
-use phpseclib3\Crypt\DSA;
-use phpseclib3\Crypt\EC;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Crypt\RSA;
-use phpseclib3\Crypt\RSA\Formats\Keys\PSS;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-use phpseclib3\File\ASN1\Element;
-use phpseclib3\File\ASN1\Maps;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Crypt\PublicKeyLoader;
/**
* Pure-PHP X.509 Parser
@@ -63,77 +52,55 @@ class X509
*/
const VALIDATE_SIGNATURE_BY_CA = 1;
+ /**#@+
+ * @access public
+ * @see \phpseclib\File\X509::getDN()
+ */
/**
* Return internal array representation
- *
- * @access public
- * @see \phpseclib3\File\X509::getDN()
*/
const DN_ARRAY = 0;
/**
* Return string
- *
- * @access public
- * @see \phpseclib3\File\X509::getDN()
*/
const DN_STRING = 1;
/**
* Return ASN.1 name string
- *
- * @access public
- * @see \phpseclib3\File\X509::getDN()
*/
const DN_ASN1 = 2;
/**
* Return OpenSSL compatible array
- *
- * @access public
- * @see \phpseclib3\File\X509::getDN()
*/
const DN_OPENSSL = 3;
/**
* Return canonical ASN.1 RDNs string
- *
- * @access public
- * @see \phpseclib3\File\X509::getDN()
*/
const DN_CANON = 4;
/**
* Return name hash for file indexing
- *
- * @access public
- * @see \phpseclib3\File\X509::getDN()
*/
const DN_HASH = 5;
+ /**#@-*/
+ /**#@+
+ * @access public
+ * @see \phpseclib\File\X509::saveX509()
+ * @see \phpseclib\File\X509::saveCSR()
+ * @see \phpseclib\File\X509::saveCRL()
+ */
/**
* Save as PEM
*
* ie. a base64-encoded PEM with a header and a footer
- *
- * @access public
- * @see \phpseclib3\File\X509::saveX509()
- * @see \phpseclib3\File\X509::saveCSR()
- * @see \phpseclib3\File\X509::saveCRL()
*/
const FORMAT_PEM = 0;
/**
* Save as DER
- *
- * @access public
- * @see \phpseclib3\File\X509::saveX509()
- * @see \phpseclib3\File\X509::saveCSR()
- * @see \phpseclib3\File\X509::saveCRL()
*/
const FORMAT_DER = 1;
/**
* Save as a SPKAC
*
- * @access public
- * @see \phpseclib3\File\X509::saveX509()
- * @see \phpseclib3\File\X509::saveCSR()
- * @see \phpseclib3\File\X509::saveCRL()
- *
* Only works on CSRs. Not currently supported.
*/
const FORMAT_SPKAC = 2;
@@ -141,13 +108,9 @@ class X509
* Auto-detect the format
*
* Used only by the load*() functions
- *
- * @access public
- * @see \phpseclib3\File\X509::saveX509()
- * @see \phpseclib3\File\X509::saveCSR()
- * @see \phpseclib3\File\X509::saveCRL()
*/
const FORMAT_AUTO_DETECT = 3;
+ /**#@-*/
/**
* Attribute value disposition.
@@ -158,12 +121,86 @@ class X509
const ATTR_REPLACE = -3; // Clear first, then add a value.
/**
+ * ASN.1 syntax for X.509 certificates
+ *
+ * @var array
+ * @access private
+ */
+ var $Certificate;
+
+ /**#@+
+ * ASN.1 syntax for various extensions
+ *
+ * @access private
+ */
+ var $DirectoryString;
+ var $PKCS9String;
+ var $AttributeValue;
+ var $Extensions;
+ var $KeyUsage;
+ var $ExtKeyUsageSyntax;
+ var $BasicConstraints;
+ var $KeyIdentifier;
+ var $CRLDistributionPoints;
+ var $AuthorityKeyIdentifier;
+ var $CertificatePolicies;
+ var $AuthorityInfoAccessSyntax;
+ var $SubjectAltName;
+ var $SubjectDirectoryAttributes;
+ var $PrivateKeyUsagePeriod;
+ var $IssuerAltName;
+ var $PolicyMappings;
+ var $NameConstraints;
+
+ var $CPSuri;
+ var $UserNotice;
+
+ var $netscape_cert_type;
+ var $netscape_comment;
+ var $netscape_ca_policy_url;
+
+ var $Name;
+ var $RelativeDistinguishedName;
+ var $CRLNumber;
+ var $CRLReason;
+ var $IssuingDistributionPoint;
+ var $InvalidityDate;
+ var $CertificateIssuer;
+ var $HoldInstructionCode;
+ var $SignedPublicKeyAndChallenge;
+ /**#@-*/
+
+ /**#@+
+ * ASN.1 syntax for various DN attributes
+ *
+ * @access private
+ */
+ var $PostalAddress;
+ /**#@-*/
+
+ /**
+ * ASN.1 syntax for Certificate Signing Requests (RFC2986)
+ *
+ * @var array
+ * @access private
+ */
+ var $CertificationRequest;
+
+ /**
+ * ASN.1 syntax for Certificate Revocation Lists (RFC5280)
+ *
+ * @var array
+ * @access private
+ */
+ var $CertificateList;
+
+ /**
* Distinguished Name
*
* @var array
* @access private
*/
- private $dn;
+ var $dn;
/**
* Public key
@@ -171,7 +208,7 @@ class X509
* @var string
* @access private
*/
- private $publicKey;
+ var $publicKey;
/**
* Private key
@@ -179,7 +216,7 @@ class X509
* @var string
* @access private
*/
- private $privateKey;
+ var $privateKey;
/**
* Object identifiers for X.509 certificates
@@ -188,7 +225,7 @@ class X509
* @access private
* @link http://en.wikipedia.org/wiki/Object_identifier
*/
- private $oids;
+ var $oids;
/**
* The certificate authorities
@@ -196,7 +233,7 @@ class X509
* @var array
* @access private
*/
- private $CAs;
+ var $CAs;
/**
* The currently loaded certificate
@@ -204,18 +241,18 @@ class X509
* @var array
* @access private
*/
- private $currentCert;
+ var $currentCert;
/**
* The signature subject
*
- * There's no guarantee \phpseclib3\File\X509 is going to re-encode an X.509 cert in the same way it was originally
+ * There's no guarantee \phpseclib\File\X509 is going to re-encode an X.509 cert in the same way it was originally
* encoded so we take save the portion of the original cert that the signature would have made for.
*
* @var string
* @access private
*/
- private $signatureSubject;
+ var $signatureSubject;
/**
* Certificate Start Date
@@ -223,7 +260,7 @@ class X509
* @var string
* @access private
*/
- private $startDate;
+ var $startDate;
/**
* Certificate End Date
@@ -231,7 +268,7 @@ class X509
* @var string
* @access private
*/
- private $endDate;
+ var $endDate;
/**
* Serial Number
@@ -239,7 +276,7 @@ class X509
* @var string
* @access private
*/
- private $serialNumber;
+ var $serialNumber;
/**
* Key Identifier
@@ -250,7 +287,7 @@ class X509
* @var string
* @access private
*/
- private $currentKeyIdentifier;
+ var $currentKeyIdentifier;
/**
* CA Flag
@@ -258,7 +295,7 @@ class X509
* @var bool
* @access private
*/
- private $caFlag = false;
+ var $caFlag = false;
/**
* SPKAC Challenge
@@ -266,21 +303,7 @@ class X509
* @var string
* @access private
*/
- private $challenge;
-
- /**
- * @var array
- * @access private
- */
- private $extensionValues = [];
-
- /**
- * OIDs loaded
- *
- * @var bool
- * @access private
- */
- private static $oidsLoaded = false;
+ var $challenge;
/**
* Recursion Limit
@@ -288,7 +311,7 @@ class X509
* @var int
* @access private
*/
- private static $recur_limit = 5;
+ static $recur_limit = 5;
/**
* URL fetch flag
@@ -296,172 +319,1137 @@ class X509
* @var bool
* @access private
*/
- private static $disable_url_fetch = false;
-
- /**
- * @var array
- * @access private
- */
- private static $extensions = [];
-
- /**
- * @var ?array
- * @access private
- */
- private $ipAddresses = null;
-
- /**
- * @var ?array
- * @access private
- */
- private $domains = null;
+ static $disable_url_fetch = false;
/**
* Default Constructor.
*
- * @return \phpseclib3\File\X509
+ * @return \phpseclib\File\X509
* @access public
*/
- public function __construct()
+ function __construct()
{
// Explicitly Tagged Module, 1988 Syntax
// http://tools.ietf.org/html/rfc5280#appendix-A.1
- if (!self::$oidsLoaded) {
- // OIDs from RFC5280 and those RFCs mentioned in RFC5280#section-4.1.1.2
- ASN1::loadOIDs([
- //'id-pkix' => '1.3.6.1.5.5.7',
- //'id-pe' => '1.3.6.1.5.5.7.1',
- //'id-qt' => '1.3.6.1.5.5.7.2',
- //'id-kp' => '1.3.6.1.5.5.7.3',
- //'id-ad' => '1.3.6.1.5.5.7.48',
- 'id-qt-cps' => '1.3.6.1.5.5.7.2.1',
- 'id-qt-unotice' => '1.3.6.1.5.5.7.2.2',
- 'id-ad-ocsp' =>'1.3.6.1.5.5.7.48.1',
- 'id-ad-caIssuers' => '1.3.6.1.5.5.7.48.2',
- 'id-ad-timeStamping' => '1.3.6.1.5.5.7.48.3',
- 'id-ad-caRepository' => '1.3.6.1.5.5.7.48.5',
- //'id-at' => '2.5.4',
- 'id-at-name' => '2.5.4.41',
- 'id-at-surname' => '2.5.4.4',
- 'id-at-givenName' => '2.5.4.42',
- 'id-at-initials' => '2.5.4.43',
- 'id-at-generationQualifier' => '2.5.4.44',
- 'id-at-commonName' => '2.5.4.3',
- 'id-at-localityName' => '2.5.4.7',
- 'id-at-stateOrProvinceName' => '2.5.4.8',
- 'id-at-organizationName' => '2.5.4.10',
- 'id-at-organizationalUnitName' => '2.5.4.11',
- 'id-at-title' => '2.5.4.12',
- 'id-at-description' => '2.5.4.13',
- 'id-at-dnQualifier' => '2.5.4.46',
- 'id-at-countryName' => '2.5.4.6',
- 'id-at-serialNumber' => '2.5.4.5',
- 'id-at-pseudonym' => '2.5.4.65',
- 'id-at-postalCode' => '2.5.4.17',
- 'id-at-streetAddress' => '2.5.4.9',
- 'id-at-uniqueIdentifier' => '2.5.4.45',
- 'id-at-role' => '2.5.4.72',
- 'id-at-postalAddress' => '2.5.4.16',
-
- //'id-domainComponent' => '0.9.2342.19200300.100.1.25',
- //'pkcs-9' => '1.2.840.113549.1.9',
- 'pkcs-9-at-emailAddress' => '1.2.840.113549.1.9.1',
- //'id-ce' => '2.5.29',
- 'id-ce-authorityKeyIdentifier' => '2.5.29.35',
- 'id-ce-subjectKeyIdentifier' => '2.5.29.14',
- 'id-ce-keyUsage' => '2.5.29.15',
- 'id-ce-privateKeyUsagePeriod' => '2.5.29.16',
- 'id-ce-certificatePolicies' => '2.5.29.32',
- //'anyPolicy' => '2.5.29.32.0',
-
- 'id-ce-policyMappings' => '2.5.29.33',
-
- 'id-ce-subjectAltName' => '2.5.29.17',
- 'id-ce-issuerAltName' => '2.5.29.18',
- 'id-ce-subjectDirectoryAttributes' => '2.5.29.9',
- 'id-ce-basicConstraints' => '2.5.29.19',
- 'id-ce-nameConstraints' => '2.5.29.30',
- 'id-ce-policyConstraints' => '2.5.29.36',
- 'id-ce-cRLDistributionPoints' => '2.5.29.31',
- 'id-ce-extKeyUsage' => '2.5.29.37',
- //'anyExtendedKeyUsage' => '2.5.29.37.0',
- 'id-kp-serverAuth' => '1.3.6.1.5.5.7.3.1',
- 'id-kp-clientAuth' => '1.3.6.1.5.5.7.3.2',
- 'id-kp-codeSigning' => '1.3.6.1.5.5.7.3.3',
- 'id-kp-emailProtection' => '1.3.6.1.5.5.7.3.4',
- 'id-kp-timeStamping' => '1.3.6.1.5.5.7.3.8',
- 'id-kp-OCSPSigning' => '1.3.6.1.5.5.7.3.9',
- 'id-ce-inhibitAnyPolicy' => '2.5.29.54',
- 'id-ce-freshestCRL' => '2.5.29.46',
- 'id-pe-authorityInfoAccess' => '1.3.6.1.5.5.7.1.1',
- 'id-pe-subjectInfoAccess' => '1.3.6.1.5.5.7.1.11',
- 'id-ce-cRLNumber' => '2.5.29.20',
- 'id-ce-issuingDistributionPoint' => '2.5.29.28',
- 'id-ce-deltaCRLIndicator' => '2.5.29.27',
- 'id-ce-cRLReasons' => '2.5.29.21',
- 'id-ce-certificateIssuer' => '2.5.29.29',
- 'id-ce-holdInstructionCode' => '2.5.29.23',
- //'holdInstruction' => '1.2.840.10040.2',
- 'id-holdinstruction-none' => '1.2.840.10040.2.1',
- 'id-holdinstruction-callissuer' => '1.2.840.10040.2.2',
- 'id-holdinstruction-reject' => '1.2.840.10040.2.3',
- 'id-ce-invalidityDate' => '2.5.29.24',
-
- 'rsaEncryption' => '1.2.840.113549.1.1.1',
- 'md2WithRSAEncryption' => '1.2.840.113549.1.1.2',
- 'md5WithRSAEncryption' => '1.2.840.113549.1.1.4',
- 'sha1WithRSAEncryption' => '1.2.840.113549.1.1.5',
- 'sha224WithRSAEncryption' => '1.2.840.113549.1.1.14',
- 'sha256WithRSAEncryption' => '1.2.840.113549.1.1.11',
- 'sha384WithRSAEncryption' => '1.2.840.113549.1.1.12',
- 'sha512WithRSAEncryption' => '1.2.840.113549.1.1.13',
-
- 'id-ecPublicKey' => '1.2.840.10045.2.1',
- 'ecdsa-with-SHA1' => '1.2.840.10045.4.1',
- // from https://tools.ietf.org/html/rfc5758#section-3.2
- 'ecdsa-with-SHA224' => '1.2.840.10045.4.3.1',
- 'ecdsa-with-SHA256' => '1.2.840.10045.4.3.2',
- 'ecdsa-with-SHA384' => '1.2.840.10045.4.3.3',
- 'ecdsa-with-SHA512' => '1.2.840.10045.4.3.4',
-
- 'id-dsa' => '1.2.840.10040.4.1',
- 'id-dsa-with-sha1' => '1.2.840.10040.4.3',
- // from https://tools.ietf.org/html/rfc5758#section-3.1
- 'id-dsa-with-sha224' => '2.16.840.1.101.3.4.3.1',
- 'id-dsa-with-sha256' => '2.16.840.1.101.3.4.3.2',
-
- // from https://tools.ietf.org/html/rfc8410:
- 'id-Ed25519' => '1.3.101.112',
- 'id-Ed448' => '1.3.101.113',
-
- 'id-RSASSA-PSS' => '1.2.840.113549.1.1.10',
-
- //'id-sha224' => '2.16.840.1.101.3.4.2.4',
- //'id-sha256' => '2.16.840.1.101.3.4.2.1',
- //'id-sha384' => '2.16.840.1.101.3.4.2.2',
- //'id-sha512' => '2.16.840.1.101.3.4.2.3',
- //'id-GostR3411-94-with-GostR3410-94' => '1.2.643.2.2.4',
- //'id-GostR3411-94-with-GostR3410-2001' => '1.2.643.2.2.3',
- //'id-GostR3410-2001' => '1.2.643.2.2.20',
- //'id-GostR3410-94' => '1.2.643.2.2.19',
- // Netscape Object Identifiers from "Netscape Certificate Extensions"
- 'netscape' => '2.16.840.1.113730',
- 'netscape-cert-extension' => '2.16.840.1.113730.1',
- 'netscape-cert-type' => '2.16.840.1.113730.1.1',
- 'netscape-comment' => '2.16.840.1.113730.1.13',
- 'netscape-ca-policy-url' => '2.16.840.1.113730.1.8',
- // the following are X.509 extensions not supported by phpseclib
- 'id-pe-logotype' => '1.3.6.1.5.5.7.1.12',
- 'entrustVersInfo' => '1.2.840.113533.7.65.0',
- 'verisignPrivate' => '2.16.840.1.113733.1.6.9',
- // for Certificate Signing Requests
- // see http://tools.ietf.org/html/rfc2985
- 'pkcs-9-at-unstructuredName' => '1.2.840.113549.1.9.2', // PKCS #9 unstructured name
- 'pkcs-9-at-challengePassword' => '1.2.840.113549.1.9.7', // Challenge password for certificate revocations
- 'pkcs-9-at-extensionRequest' => '1.2.840.113549.1.9.14' // Certificate extension request
- ]);
- }
+ $this->DirectoryString = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ 'children' => array(
+ 'teletexString' => array('type' => ASN1::TYPE_TELETEX_STRING),
+ 'printableString' => array('type' => ASN1::TYPE_PRINTABLE_STRING),
+ 'universalString' => array('type' => ASN1::TYPE_UNIVERSAL_STRING),
+ 'utf8String' => array('type' => ASN1::TYPE_UTF8_STRING),
+ 'bmpString' => array('type' => ASN1::TYPE_BMP_STRING)
+ )
+ );
+
+ $this->PKCS9String = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ 'children' => array(
+ 'ia5String' => array('type' => ASN1::TYPE_IA5_STRING),
+ 'directoryString' => $this->DirectoryString
+ )
+ );
+
+ $this->AttributeValue = array('type' => ASN1::TYPE_ANY);
+
+ $AttributeType = array('type' => ASN1::TYPE_OBJECT_IDENTIFIER);
+
+ $AttributeTypeAndValue = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'type' => $AttributeType,
+ 'value'=> $this->AttributeValue
+ )
+ );
+
+ /*
+ In practice, RDNs containing multiple name-value pairs (called "multivalued RDNs") are rare,
+ but they can be useful at times when either there is no unique attribute in the entry or you
+ want to ensure that the entry's DN contains some useful identifying information.
+
+ - https://www.opends.org/wiki/page/DefinitionRelativeDistinguishedName
+ */
+ $this->RelativeDistinguishedName = array(
+ 'type' => ASN1::TYPE_SET,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $AttributeTypeAndValue
+ );
+
+ // http://tools.ietf.org/html/rfc5280#section-4.1.2.4
+ $RDNSequence = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ // RDNSequence does not define a min or a max, which means it doesn't have one
+ 'min' => 0,
+ 'max' => -1,
+ 'children' => $this->RelativeDistinguishedName
+ );
+
+ $this->Name = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ 'children' => array(
+ 'rdnSequence' => $RDNSequence
+ )
+ );
+
+ // http://tools.ietf.org/html/rfc5280#section-4.1.1.2
+ $AlgorithmIdentifier = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'algorithm' => array('type' => ASN1::TYPE_OBJECT_IDENTIFIER),
+ 'parameters' => array(
+ 'type' => ASN1::TYPE_ANY,
+ 'optional' => true
+ )
+ )
+ );
+
+ /*
+ A certificate using system MUST reject the certificate if it encounters
+ a critical extension it does not recognize; however, a non-critical
+ extension may be ignored if it is not recognized.
+
+ http://tools.ietf.org/html/rfc5280#section-4.2
+ */
+ $Extension = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'extnId' => array('type' => ASN1::TYPE_OBJECT_IDENTIFIER),
+ 'critical' => array(
+ 'type' => ASN1::TYPE_BOOLEAN,
+ 'optional' => true,
+ 'default' => false
+ ),
+ 'extnValue' => array('type' => ASN1::TYPE_OCTET_STRING)
+ )
+ );
+
+ $this->Extensions = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ // technically, it's MAX, but we'll assume anything < 0 is MAX
+ 'max' => -1,
+ // if 'children' isn't an array then 'min' and 'max' must be defined
+ 'children' => $Extension
+ );
+
+ $SubjectPublicKeyInfo = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'algorithm' => $AlgorithmIdentifier,
+ 'subjectPublicKey' => array('type' => ASN1::TYPE_BIT_STRING)
+ )
+ );
+
+ $UniqueIdentifier = array('type' => ASN1::TYPE_BIT_STRING);
+
+ $Time = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ 'children' => array(
+ 'utcTime' => array('type' => ASN1::TYPE_UTC_TIME),
+ 'generalTime' => array('type' => ASN1::TYPE_GENERALIZED_TIME)
+ )
+ );
+
+ // http://tools.ietf.org/html/rfc5280#section-4.1.2.5
+ $Validity = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'notBefore' => $Time,
+ 'notAfter' => $Time
+ )
+ );
+
+ $CertificateSerialNumber = array('type' => ASN1::TYPE_INTEGER);
+
+ $Version = array(
+ 'type' => ASN1::TYPE_INTEGER,
+ 'mapping' => array('v1', 'v2', 'v3')
+ );
+
+ // assert($TBSCertificate['children']['signature'] == $Certificate['children']['signatureAlgorithm'])
+ $TBSCertificate = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ // technically, default implies optional, but we'll define it as being optional, none-the-less, just to
+ // reenforce that fact
+ 'version' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'explicit' => true,
+ 'default' => 'v1'
+ ) + $Version,
+ 'serialNumber' => $CertificateSerialNumber,
+ 'signature' => $AlgorithmIdentifier,
+ 'issuer' => $this->Name,
+ 'validity' => $Validity,
+ 'subject' => $this->Name,
+ 'subjectPublicKeyInfo' => $SubjectPublicKeyInfo,
+ // implicit means that the T in the TLV structure is to be rewritten, regardless of the type
+ 'issuerUniqueID' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $UniqueIdentifier,
+ 'subjectUniqueID' => array(
+ 'constant' => 2,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $UniqueIdentifier,
+ // <http://tools.ietf.org/html/rfc2459#page-74> doesn't use the EXPLICIT keyword but if
+ // it's not IMPLICIT, it's EXPLICIT
+ 'extensions' => array(
+ 'constant' => 3,
+ 'optional' => true,
+ 'explicit' => true
+ ) + $this->Extensions
+ )
+ );
+
+ $this->Certificate = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'tbsCertificate' => $TBSCertificate,
+ 'signatureAlgorithm' => $AlgorithmIdentifier,
+ 'signature' => array('type' => ASN1::TYPE_BIT_STRING)
+ )
+ );
+
+ $this->KeyUsage = array(
+ 'type' => ASN1::TYPE_BIT_STRING,
+ 'mapping' => array(
+ 'digitalSignature',
+ 'nonRepudiation',
+ 'keyEncipherment',
+ 'dataEncipherment',
+ 'keyAgreement',
+ 'keyCertSign',
+ 'cRLSign',
+ 'encipherOnly',
+ 'decipherOnly'
+ )
+ );
+
+ $this->BasicConstraints = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'cA' => array(
+ 'type' => ASN1::TYPE_BOOLEAN,
+ 'optional' => true,
+ 'default' => false
+ ),
+ 'pathLenConstraint' => array(
+ 'type' => ASN1::TYPE_INTEGER,
+ 'optional' => true
+ )
+ )
+ );
+
+ $this->KeyIdentifier = array('type' => ASN1::TYPE_OCTET_STRING);
+
+ $OrganizationalUnitNames = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => 4, // ub-organizational-units
+ 'children' => array('type' => ASN1::TYPE_PRINTABLE_STRING)
+ );
+
+ $PersonalName = array(
+ 'type' => ASN1::TYPE_SET,
+ 'children' => array(
+ 'surname' => array(
+ 'type' => ASN1::TYPE_PRINTABLE_STRING,
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ),
+ 'given-name' => array(
+ 'type' => ASN1::TYPE_PRINTABLE_STRING,
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ),
+ 'initials' => array(
+ 'type' => ASN1::TYPE_PRINTABLE_STRING,
+ 'constant' => 2,
+ 'optional' => true,
+ 'implicit' => true
+ ),
+ 'generation-qualifier' => array(
+ 'type' => ASN1::TYPE_PRINTABLE_STRING,
+ 'constant' => 3,
+ 'optional' => true,
+ 'implicit' => true
+ )
+ )
+ );
+
+ $NumericUserIdentifier = array('type' => ASN1::TYPE_NUMERIC_STRING);
+
+ $OrganizationName = array('type' => ASN1::TYPE_PRINTABLE_STRING);
+
+ $PrivateDomainName = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ 'children' => array(
+ 'numeric' => array('type' => ASN1::TYPE_NUMERIC_STRING),
+ 'printable' => array('type' => ASN1::TYPE_PRINTABLE_STRING)
+ )
+ );
+
+ $TerminalIdentifier = array('type' => ASN1::TYPE_PRINTABLE_STRING);
+
+ $NetworkAddress = array('type' => ASN1::TYPE_NUMERIC_STRING);
+
+ $AdministrationDomainName = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ // if class isn't present it's assumed to be \phpseclib\File\ASN1::CLASS_UNIVERSAL or
+ // (if constant is present) \phpseclib\File\ASN1::CLASS_CONTEXT_SPECIFIC
+ 'class' => ASN1::CLASS_APPLICATION,
+ 'cast' => 2,
+ 'children' => array(
+ 'numeric' => array('type' => ASN1::TYPE_NUMERIC_STRING),
+ 'printable' => array('type' => ASN1::TYPE_PRINTABLE_STRING)
+ )
+ );
+
+ $CountryName = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ // if class isn't present it's assumed to be \phpseclib\File\ASN1::CLASS_UNIVERSAL or
+ // (if constant is present) \phpseclib\File\ASN1::CLASS_CONTEXT_SPECIFIC
+ 'class' => ASN1::CLASS_APPLICATION,
+ 'cast' => 1,
+ 'children' => array(
+ 'x121-dcc-code' => array('type' => ASN1::TYPE_NUMERIC_STRING),
+ 'iso-3166-alpha2-code' => array('type' => ASN1::TYPE_PRINTABLE_STRING)
+ )
+ );
+
+ $AnotherName = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'type-id' => array('type' => ASN1::TYPE_OBJECT_IDENTIFIER),
+ 'value' => array(
+ 'type' => ASN1::TYPE_ANY,
+ 'constant' => 0,
+ 'optional' => true,
+ 'explicit' => true
+ )
+ )
+ );
+
+ $ExtensionAttribute = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'extension-attribute-type' => array(
+ 'type' => ASN1::TYPE_PRINTABLE_STRING,
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ),
+ 'extension-attribute-value' => array(
+ 'type' => ASN1::TYPE_ANY,
+ 'constant' => 1,
+ 'optional' => true,
+ 'explicit' => true
+ )
+ )
+ );
+
+ $ExtensionAttributes = array(
+ 'type' => ASN1::TYPE_SET,
+ 'min' => 1,
+ 'max' => 256, // ub-extension-attributes
+ 'children' => $ExtensionAttribute
+ );
+
+ $BuiltInDomainDefinedAttribute = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'type' => array('type' => ASN1::TYPE_PRINTABLE_STRING),
+ 'value' => array('type' => ASN1::TYPE_PRINTABLE_STRING)
+ )
+ );
+
+ $BuiltInDomainDefinedAttributes = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => 4, // ub-domain-defined-attributes
+ 'children' => $BuiltInDomainDefinedAttribute
+ );
+
+ $BuiltInStandardAttributes = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'country-name' => array('optional' => true) + $CountryName,
+ 'administration-domain-name' => array('optional' => true) + $AdministrationDomainName,
+ 'network-address' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $NetworkAddress,
+ 'terminal-identifier' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $TerminalIdentifier,
+ 'private-domain-name' => array(
+ 'constant' => 2,
+ 'optional' => true,
+ 'explicit' => true
+ ) + $PrivateDomainName,
+ 'organization-name' => array(
+ 'constant' => 3,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $OrganizationName,
+ 'numeric-user-identifier' => array(
+ 'constant' => 4,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $NumericUserIdentifier,
+ 'personal-name' => array(
+ 'constant' => 5,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $PersonalName,
+ 'organizational-unit-names' => array(
+ 'constant' => 6,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $OrganizationalUnitNames
+ )
+ );
+
+ $ORAddress = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'built-in-standard-attributes' => $BuiltInStandardAttributes,
+ 'built-in-domain-defined-attributes' => array('optional' => true) + $BuiltInDomainDefinedAttributes,
+ 'extension-attributes' => array('optional' => true) + $ExtensionAttributes
+ )
+ );
+
+ $EDIPartyName = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'nameAssigner' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $this->DirectoryString,
+ // partyName is technically required but \phpseclib\File\ASN1 doesn't currently support non-optional constants and
+ // setting it to optional gets the job done in any event.
+ 'partyName' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $this->DirectoryString
+ )
+ );
+
+ $GeneralName = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ 'children' => array(
+ 'otherName' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $AnotherName,
+ 'rfc822Name' => array(
+ 'type' => ASN1::TYPE_IA5_STRING,
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ),
+ 'dNSName' => array(
+ 'type' => ASN1::TYPE_IA5_STRING,
+ 'constant' => 2,
+ 'optional' => true,
+ 'implicit' => true
+ ),
+ 'x400Address' => array(
+ 'constant' => 3,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $ORAddress,
+ 'directoryName' => array(
+ 'constant' => 4,
+ 'optional' => true,
+ 'explicit' => true
+ ) + $this->Name,
+ 'ediPartyName' => array(
+ 'constant' => 5,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $EDIPartyName,
+ 'uniformResourceIdentifier' => array(
+ 'type' => ASN1::TYPE_IA5_STRING,
+ 'constant' => 6,
+ 'optional' => true,
+ 'implicit' => true
+ ),
+ 'iPAddress' => array(
+ 'type' => ASN1::TYPE_OCTET_STRING,
+ 'constant' => 7,
+ 'optional' => true,
+ 'implicit' => true
+ ),
+ 'registeredID' => array(
+ 'type' => ASN1::TYPE_OBJECT_IDENTIFIER,
+ 'constant' => 8,
+ 'optional' => true,
+ 'implicit' => true
+ )
+ )
+ );
+
+ $GeneralNames = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $GeneralName
+ );
+
+ $this->IssuerAltName = $GeneralNames;
+
+ $ReasonFlags = array(
+ 'type' => ASN1::TYPE_BIT_STRING,
+ 'mapping' => array(
+ 'unused',
+ 'keyCompromise',
+ 'cACompromise',
+ 'affiliationChanged',
+ 'superseded',
+ 'cessationOfOperation',
+ 'certificateHold',
+ 'privilegeWithdrawn',
+ 'aACompromise'
+ )
+ );
+
+ $DistributionPointName = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ 'children' => array(
+ 'fullName' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $GeneralNames,
+ 'nameRelativeToCRLIssuer' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $this->RelativeDistinguishedName
+ )
+ );
+
+ $DistributionPoint = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'distributionPoint' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'explicit' => true
+ ) + $DistributionPointName,
+ 'reasons' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $ReasonFlags,
+ 'cRLIssuer' => array(
+ 'constant' => 2,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $GeneralNames
+ )
+ );
+
+ $this->CRLDistributionPoints = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $DistributionPoint
+ );
+
+ $this->AuthorityKeyIdentifier = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'keyIdentifier' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $this->KeyIdentifier,
+ 'authorityCertIssuer' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $GeneralNames,
+ 'authorityCertSerialNumber' => array(
+ 'constant' => 2,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $CertificateSerialNumber
+ )
+ );
+
+ $PolicyQualifierId = array('type' => ASN1::TYPE_OBJECT_IDENTIFIER);
+
+ $PolicyQualifierInfo = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'policyQualifierId' => $PolicyQualifierId,
+ 'qualifier' => array('type' => ASN1::TYPE_ANY)
+ )
+ );
+
+ $CertPolicyId = array('type' => ASN1::TYPE_OBJECT_IDENTIFIER);
+
+ $PolicyInformation = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'policyIdentifier' => $CertPolicyId,
+ 'policyQualifiers' => array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 0,
+ 'max' => -1,
+ 'optional' => true,
+ 'children' => $PolicyQualifierInfo
+ )
+ )
+ );
+
+ $this->CertificatePolicies = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $PolicyInformation
+ );
+
+ $this->PolicyMappings = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'issuerDomainPolicy' => $CertPolicyId,
+ 'subjectDomainPolicy' => $CertPolicyId
+ )
+ )
+ );
+
+ $KeyPurposeId = array('type' => ASN1::TYPE_OBJECT_IDENTIFIER);
+
+ $this->ExtKeyUsageSyntax = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $KeyPurposeId
+ );
+
+ $AccessDescription = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'accessMethod' => array('type' => ASN1::TYPE_OBJECT_IDENTIFIER),
+ 'accessLocation' => $GeneralName
+ )
+ );
+
+ $this->AuthorityInfoAccessSyntax = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $AccessDescription
+ );
+
+ $this->SubjectInfoAccessSyntax = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $AccessDescription
+ );
+
+ $this->SubjectAltName = $GeneralNames;
+
+ $this->PrivateKeyUsagePeriod = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'notBefore' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true,
+ 'type' => ASN1::TYPE_GENERALIZED_TIME),
+ 'notAfter' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true,
+ 'type' => ASN1::TYPE_GENERALIZED_TIME)
+ )
+ );
+
+ $BaseDistance = array('type' => ASN1::TYPE_INTEGER);
+
+ $GeneralSubtree = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'base' => $GeneralName,
+ 'minimum' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true,
+ 'default' => new BigInteger(0)
+ ) + $BaseDistance,
+ 'maximum' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true,
+ ) + $BaseDistance
+ )
+ );
+
+ $GeneralSubtrees = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $GeneralSubtree
+ );
+
+ $this->NameConstraints = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'permittedSubtrees' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $GeneralSubtrees,
+ 'excludedSubtrees' => array(
+ 'constant' => 1,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $GeneralSubtrees
+ )
+ );
+
+ $this->CPSuri = array('type' => ASN1::TYPE_IA5_STRING);
+
+ $DisplayText = array(
+ 'type' => ASN1::TYPE_CHOICE,
+ 'children' => array(
+ 'ia5String' => array('type' => ASN1::TYPE_IA5_STRING),
+ 'visibleString' => array('type' => ASN1::TYPE_VISIBLE_STRING),
+ 'bmpString' => array('type' => ASN1::TYPE_BMP_STRING),
+ 'utf8String' => array('type' => ASN1::TYPE_UTF8_STRING)
+ )
+ );
+
+ $NoticeReference = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'organization' => $DisplayText,
+ 'noticeNumbers' => array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => 200,
+ 'children' => array('type' => ASN1::TYPE_INTEGER)
+ )
+ )
+ );
+
+ $this->UserNotice = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'noticeRef' => array(
+ 'optional' => true,
+ 'implicit' => true
+ ) + $NoticeReference,
+ 'explicitText' => array(
+ 'optional' => true,
+ 'implicit' => true
+ ) + $DisplayText
+ )
+ );
+
+ // mapping is from <http://www.mozilla.org/projects/security/pki/nss/tech-notes/tn3.html>
+ $this->netscape_cert_type = array(
+ 'type' => ASN1::TYPE_BIT_STRING,
+ 'mapping' => array(
+ 'SSLClient',
+ 'SSLServer',
+ 'Email',
+ 'ObjectSigning',
+ 'Reserved',
+ 'SSLCA',
+ 'EmailCA',
+ 'ObjectSigningCA'
+ )
+ );
+
+ $this->netscape_comment = array('type' => ASN1::TYPE_IA5_STRING);
+ $this->netscape_ca_policy_url = array('type' => ASN1::TYPE_IA5_STRING);
+
+ // attribute is used in RFC2986 but we're using the RFC5280 definition
+
+ $Attribute = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'type' => $AttributeType,
+ 'value'=> array(
+ 'type' => ASN1::TYPE_SET,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $this->AttributeValue
+ )
+ )
+ );
+
+ $this->SubjectDirectoryAttributes = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $Attribute
+ );
+
+ // adapted from <http://tools.ietf.org/html/rfc2986>
+
+ $Attributes = array(
+ 'type' => ASN1::TYPE_SET,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $Attribute
+ );
+
+ $CertificationRequestInfo = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'version' => array(
+ 'type' => ASN1::TYPE_INTEGER,
+ 'mapping' => array('v1')
+ ),
+ 'subject' => $this->Name,
+ 'subjectPKInfo' => $SubjectPublicKeyInfo,
+ 'attributes' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $Attributes,
+ )
+ );
+
+ $this->CertificationRequest = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'certificationRequestInfo' => $CertificationRequestInfo,
+ 'signatureAlgorithm' => $AlgorithmIdentifier,
+ 'signature' => array('type' => ASN1::TYPE_BIT_STRING)
+ )
+ );
+
+ $RevokedCertificate = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'userCertificate' => $CertificateSerialNumber,
+ 'revocationDate' => $Time,
+ 'crlEntryExtensions' => array(
+ 'optional' => true
+ ) + $this->Extensions
+ )
+ );
+
+ $TBSCertList = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'version' => array(
+ 'optional' => true,
+ 'default' => 'v1'
+ ) + $Version,
+ 'signature' => $AlgorithmIdentifier,
+ 'issuer' => $this->Name,
+ 'thisUpdate' => $Time,
+ 'nextUpdate' => array(
+ 'optional' => true
+ ) + $Time,
+ 'revokedCertificates' => array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'optional' => true,
+ 'min' => 0,
+ 'max' => -1,
+ 'children' => $RevokedCertificate
+ ),
+ 'crlExtensions' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'explicit' => true
+ ) + $this->Extensions
+ )
+ );
+
+ $this->CertificateList = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'tbsCertList' => $TBSCertList,
+ 'signatureAlgorithm' => $AlgorithmIdentifier,
+ 'signature' => array('type' => ASN1::TYPE_BIT_STRING)
+ )
+ );
+
+ $this->CRLNumber = array('type' => ASN1::TYPE_INTEGER);
+
+ $this->CRLReason = array('type' => ASN1::TYPE_ENUMERATED,
+ 'mapping' => array(
+ 'unspecified',
+ 'keyCompromise',
+ 'cACompromise',
+ 'affiliationChanged',
+ 'superseded',
+ 'cessationOfOperation',
+ 'certificateHold',
+ // Value 7 is not used.
+ 8 => 'removeFromCRL',
+ 'privilegeWithdrawn',
+ 'aACompromise'
+ )
+ );
+
+ $this->IssuingDistributionPoint = array('type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'distributionPoint' => array(
+ 'constant' => 0,
+ 'optional' => true,
+ 'explicit' => true
+ ) + $DistributionPointName,
+ 'onlyContainsUserCerts' => array(
+ 'type' => ASN1::TYPE_BOOLEAN,
+ 'constant' => 1,
+ 'optional' => true,
+ 'default' => false,
+ 'implicit' => true
+ ),
+ 'onlyContainsCACerts' => array(
+ 'type' => ASN1::TYPE_BOOLEAN,
+ 'constant' => 2,
+ 'optional' => true,
+ 'default' => false,
+ 'implicit' => true
+ ),
+ 'onlySomeReasons' => array(
+ 'constant' => 3,
+ 'optional' => true,
+ 'implicit' => true
+ ) + $ReasonFlags,
+ 'indirectCRL' => array(
+ 'type' => ASN1::TYPE_BOOLEAN,
+ 'constant' => 4,
+ 'optional' => true,
+ 'default' => false,
+ 'implicit' => true
+ ),
+ 'onlyContainsAttributeCerts' => array(
+ 'type' => ASN1::TYPE_BOOLEAN,
+ 'constant' => 5,
+ 'optional' => true,
+ 'default' => false,
+ 'implicit' => true
+ )
+ )
+ );
+
+ $this->InvalidityDate = array('type' => ASN1::TYPE_GENERALIZED_TIME);
+
+ $this->CertificateIssuer = $GeneralNames;
+
+ $this->HoldInstructionCode = array('type' => ASN1::TYPE_OBJECT_IDENTIFIER);
+
+ $PublicKeyAndChallenge = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'spki' => $SubjectPublicKeyInfo,
+ 'challenge' => array('type' => ASN1::TYPE_IA5_STRING)
+ )
+ );
+
+ $this->SignedPublicKeyAndChallenge = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'children' => array(
+ 'publicKeyAndChallenge' => $PublicKeyAndChallenge,
+ 'signatureAlgorithm' => $AlgorithmIdentifier,
+ 'signature' => array('type' => ASN1::TYPE_BIT_STRING)
+ )
+ );
+
+ $this->PostalAddress = array(
+ 'type' => ASN1::TYPE_SEQUENCE,
+ 'optional' => true,
+ 'min' => 1,
+ 'max' => -1,
+ 'children' => $this->DirectoryString
+ );
+
+ // OIDs from RFC5280 and those RFCs mentioned in RFC5280#section-4.1.1.2
+ $this->oids = array(
+ '1.3.6.1.5.5.7' => 'id-pkix',
+ '1.3.6.1.5.5.7.1' => 'id-pe',
+ '1.3.6.1.5.5.7.2' => 'id-qt',
+ '1.3.6.1.5.5.7.3' => 'id-kp',
+ '1.3.6.1.5.5.7.48' => 'id-ad',
+ '1.3.6.1.5.5.7.2.1' => 'id-qt-cps',
+ '1.3.6.1.5.5.7.2.2' => 'id-qt-unotice',
+ '1.3.6.1.5.5.7.48.1' =>'id-ad-ocsp',
+ '1.3.6.1.5.5.7.48.2' => 'id-ad-caIssuers',
+ '1.3.6.1.5.5.7.48.3' => 'id-ad-timeStamping',
+ '1.3.6.1.5.5.7.48.5' => 'id-ad-caRepository',
+ '2.5.4' => 'id-at',
+ '2.5.4.41' => 'id-at-name',
+ '2.5.4.4' => 'id-at-surname',
+ '2.5.4.42' => 'id-at-givenName',
+ '2.5.4.43' => 'id-at-initials',
+ '2.5.4.44' => 'id-at-generationQualifier',
+ '2.5.4.3' => 'id-at-commonName',
+ '2.5.4.7' => 'id-at-localityName',
+ '2.5.4.8' => 'id-at-stateOrProvinceName',
+ '2.5.4.10' => 'id-at-organizationName',
+ '2.5.4.11' => 'id-at-organizationalUnitName',
+ '2.5.4.12' => 'id-at-title',
+ '2.5.4.13' => 'id-at-description',
+ '2.5.4.46' => 'id-at-dnQualifier',
+ '2.5.4.6' => 'id-at-countryName',
+ '2.5.4.5' => 'id-at-serialNumber',
+ '2.5.4.65' => 'id-at-pseudonym',
+ '2.5.4.17' => 'id-at-postalCode',
+ '2.5.4.9' => 'id-at-streetAddress',
+ '2.5.4.45' => 'id-at-uniqueIdentifier',
+ '2.5.4.72' => 'id-at-role',
+ '2.5.4.16' => 'id-at-postalAddress',
+
+ '0.9.2342.19200300.100.1.25' => 'id-domainComponent',
+ '1.2.840.113549.1.9' => 'pkcs-9',
+ '1.2.840.113549.1.9.1' => 'pkcs-9-at-emailAddress',
+ '2.5.29' => 'id-ce',
+ '2.5.29.35' => 'id-ce-authorityKeyIdentifier',
+ '2.5.29.14' => 'id-ce-subjectKeyIdentifier',
+ '2.5.29.15' => 'id-ce-keyUsage',
+ '2.5.29.16' => 'id-ce-privateKeyUsagePeriod',
+ '2.5.29.32' => 'id-ce-certificatePolicies',
+ '2.5.29.32.0' => 'anyPolicy',
+
+ '2.5.29.33' => 'id-ce-policyMappings',
+ '2.5.29.17' => 'id-ce-subjectAltName',
+ '2.5.29.18' => 'id-ce-issuerAltName',
+ '2.5.29.9' => 'id-ce-subjectDirectoryAttributes',
+ '2.5.29.19' => 'id-ce-basicConstraints',
+ '2.5.29.30' => 'id-ce-nameConstraints',
+ '2.5.29.36' => 'id-ce-policyConstraints',
+ '2.5.29.31' => 'id-ce-cRLDistributionPoints',
+ '2.5.29.37' => 'id-ce-extKeyUsage',
+ '2.5.29.37.0' => 'anyExtendedKeyUsage',
+ '1.3.6.1.5.5.7.3.1' => 'id-kp-serverAuth',
+ '1.3.6.1.5.5.7.3.2' => 'id-kp-clientAuth',
+ '1.3.6.1.5.5.7.3.3' => 'id-kp-codeSigning',
+ '1.3.6.1.5.5.7.3.4' => 'id-kp-emailProtection',
+ '1.3.6.1.5.5.7.3.8' => 'id-kp-timeStamping',
+ '1.3.6.1.5.5.7.3.9' => 'id-kp-OCSPSigning',
+ '2.5.29.54' => 'id-ce-inhibitAnyPolicy',
+ '2.5.29.46' => 'id-ce-freshestCRL',
+ '1.3.6.1.5.5.7.1.1' => 'id-pe-authorityInfoAccess',
+ '1.3.6.1.5.5.7.1.11' => 'id-pe-subjectInfoAccess',
+ '2.5.29.20' => 'id-ce-cRLNumber',
+ '2.5.29.28' => 'id-ce-issuingDistributionPoint',
+ '2.5.29.27' => 'id-ce-deltaCRLIndicator',
+ '2.5.29.21' => 'id-ce-cRLReasons',
+ '2.5.29.29' => 'id-ce-certificateIssuer',
+ '2.5.29.23' => 'id-ce-holdInstructionCode',
+ '1.2.840.10040.2' => 'holdInstruction',
+ '1.2.840.10040.2.1' => 'id-holdinstruction-none',
+ '1.2.840.10040.2.2' => 'id-holdinstruction-callissuer',
+ '1.2.840.10040.2.3' => 'id-holdinstruction-reject',
+ '2.5.29.24' => 'id-ce-invalidityDate',
+
+ '1.2.840.113549.2.2' => 'md2',
+ '1.2.840.113549.2.5' => 'md5',
+ '1.3.14.3.2.26' => 'id-sha1',
+ '1.2.840.10040.4.1' => 'id-dsa',
+ '1.2.840.10040.4.3' => 'id-dsa-with-sha1',
+ '1.2.840.113549.1.1' => 'pkcs-1',
+ '1.2.840.113549.1.1.1' => 'rsaEncryption',
+ '1.2.840.113549.1.1.2' => 'md2WithRSAEncryption',
+ '1.2.840.113549.1.1.4' => 'md5WithRSAEncryption',
+ '1.2.840.113549.1.1.5' => 'sha1WithRSAEncryption',
+ '1.2.840.10046.2.1' => 'dhpublicnumber',
+ '2.16.840.1.101.2.1.1.22' => 'id-keyExchangeAlgorithm',
+ '1.2.840.10045' => 'ansi-X9-62',
+ '1.2.840.10045.4' => 'id-ecSigType',
+ '1.2.840.10045.4.1' => 'ecdsa-with-SHA1',
+ '1.2.840.10045.1' => 'id-fieldType',
+ '1.2.840.10045.1.1' => 'prime-field',
+ '1.2.840.10045.1.2' => 'characteristic-two-field',
+ '1.2.840.10045.1.2.3' => 'id-characteristic-two-basis',
+ '1.2.840.10045.1.2.3.1' => 'gnBasis',
+ '1.2.840.10045.1.2.3.2' => 'tpBasis',
+ '1.2.840.10045.1.2.3.3' => 'ppBasis',
+ '1.2.840.10045.2' => 'id-publicKeyType',
+ '1.2.840.10045.2.1' => 'id-ecPublicKey',
+ '1.2.840.10045.3' => 'ellipticCurve',
+ '1.2.840.10045.3.0' => 'c-TwoCurve',
+ '1.2.840.10045.3.0.1' => 'c2pnb163v1',
+ '1.2.840.10045.3.0.2' => 'c2pnb163v2',
+ '1.2.840.10045.3.0.3' => 'c2pnb163v3',
+ '1.2.840.10045.3.0.4' => 'c2pnb176w1',
+ '1.2.840.10045.3.0.5' => 'c2pnb191v1',
+ '1.2.840.10045.3.0.6' => 'c2pnb191v2',
+ '1.2.840.10045.3.0.7' => 'c2pnb191v3',
+ '1.2.840.10045.3.0.8' => 'c2pnb191v4',
+ '1.2.840.10045.3.0.9' => 'c2pnb191v5',
+ '1.2.840.10045.3.0.10' => 'c2pnb208w1',
+ '1.2.840.10045.3.0.11' => 'c2pnb239v1',
+ '1.2.840.10045.3.0.12' => 'c2pnb239v2',
+ '1.2.840.10045.3.0.13' => 'c2pnb239v3',
+ '1.2.840.10045.3.0.14' => 'c2pnb239v4',
+ '1.2.840.10045.3.0.15' => 'c2pnb239v5',
+ '1.2.840.10045.3.0.16' => 'c2pnb272w1',
+ '1.2.840.10045.3.0.17' => 'c2pnb304w1',
+ '1.2.840.10045.3.0.18' => 'c2pnb359v1',
+ '1.2.840.10045.3.0.19' => 'c2pnb368w1',
+ '1.2.840.10045.3.0.20' => 'c2pnb431r1',
+ '1.2.840.10045.3.1' => 'primeCurve',
+ '1.2.840.10045.3.1.1' => 'prime192v1',
+ '1.2.840.10045.3.1.2' => 'prime192v2',
+ '1.2.840.10045.3.1.3' => 'prime192v3',
+ '1.2.840.10045.3.1.4' => 'prime239v1',
+ '1.2.840.10045.3.1.5' => 'prime239v2',
+ '1.2.840.10045.3.1.6' => 'prime239v3',
+ '1.2.840.10045.3.1.7' => 'prime256v1',
+ '1.2.840.113549.1.1.7' => 'id-RSAES-OAEP',
+ '1.2.840.113549.1.1.9' => 'id-pSpecified',
+ '1.2.840.113549.1.1.10' => 'id-RSASSA-PSS',
+ '1.2.840.113549.1.1.8' => 'id-mgf1',
+ '1.2.840.113549.1.1.14' => 'sha224WithRSAEncryption',
+ '1.2.840.113549.1.1.11' => 'sha256WithRSAEncryption',
+ '1.2.840.113549.1.1.12' => 'sha384WithRSAEncryption',
+ '1.2.840.113549.1.1.13' => 'sha512WithRSAEncryption',
+ '2.16.840.1.101.3.4.2.4' => 'id-sha224',
+ '2.16.840.1.101.3.4.2.1' => 'id-sha256',
+ '2.16.840.1.101.3.4.2.2' => 'id-sha384',
+ '2.16.840.1.101.3.4.2.3' => 'id-sha512',
+ '1.2.643.2.2.4' => 'id-GostR3411-94-with-GostR3410-94',
+ '1.2.643.2.2.3' => 'id-GostR3411-94-with-GostR3410-2001',
+ '1.2.643.2.2.20' => 'id-GostR3410-2001',
+ '1.2.643.2.2.19' => 'id-GostR3410-94',
+ // Netscape Object Identifiers from "Netscape Certificate Extensions"
+ '2.16.840.1.113730' => 'netscape',
+ '2.16.840.1.113730.1' => 'netscape-cert-extension',
+ '2.16.840.1.113730.1.1' => 'netscape-cert-type',
+ '2.16.840.1.113730.1.13' => 'netscape-comment',
+ '2.16.840.1.113730.1.8' => 'netscape-ca-policy-url',
+ // the following are X.509 extensions not supported by phpseclib
+ '1.3.6.1.5.5.7.1.12' => 'id-pe-logotype',
+ '1.2.840.113533.7.65.0' => 'entrustVersInfo',
+ '2.16.840.1.113733.1.6.9' => 'verisignPrivate',
+ // for Certificate Signing Requests
+ // see http://tools.ietf.org/html/rfc2985
+ '1.2.840.113549.1.9.2' => 'pkcs-9-at-unstructuredName', // PKCS #9 unstructured name
+ '1.2.840.113549.1.9.7' => 'pkcs-9-at-challengePassword', // Challenge password for certificate revocations
+ '1.2.840.113549.1.9.14' => 'pkcs-9-at-extensionRequest' // Certificate extension request
+ );
}
/**
@@ -474,7 +1462,7 @@ class X509
* @access public
* @return mixed
*/
- public function loadX509($cert, $mode = self::FORMAT_AUTO_DETECT)
+ function loadX509($cert, $mode = self::FORMAT_AUTO_DETECT)
{
if (is_array($cert) && isset($cert['tbsCertificate'])) {
unset($this->currentCert);
@@ -493,8 +1481,10 @@ class X509
return $cert;
}
+ $asn1 = new ASN1();
+
if ($mode != self::FORMAT_DER) {
- $newcert = ASN1::extractBER($cert);
+ $newcert = $this->_extractBER($cert);
if ($mode == self::FORMAT_PEM && $cert == $newcert) {
return false;
}
@@ -506,10 +1496,11 @@ class X509
return false;
}
- $decoded = ASN1::decodeBER($cert);
+ $asn1->loadOIDs($this->oids);
+ $decoded = $asn1->decodeBER($cert);
if (!empty($decoded)) {
- $x509 = ASN1::asn1map($decoded[0], Maps\Certificate::MAP);
+ $x509 = $asn1->asn1map($decoded[0], $this->Certificate);
}
if (!isset($x509) || $x509 === false) {
$this->currentCert = false;
@@ -518,18 +1509,14 @@ class X509
$this->signatureSubject = substr($cert, $decoded[0]['content'][0]['start'], $decoded[0]['content'][0]['length']);
- if ($this->isSubArrayValid($x509, 'tbsCertificate/extensions')) {
- $this->mapInExtensions($x509, 'tbsCertificate/extensions');
+ if ($this->_isSubArrayValid($x509, 'tbsCertificate/extensions')) {
+ $this->_mapInExtensions($x509, 'tbsCertificate/extensions', $asn1);
}
- $this->mapInDNs($x509, 'tbsCertificate/issuer/rdnSequence');
- $this->mapInDNs($x509, 'tbsCertificate/subject/rdnSequence');
+ $this->_mapInDNs($x509, 'tbsCertificate/issuer/rdnSequence', $asn1);
+ $this->_mapInDNs($x509, 'tbsCertificate/subject/rdnSequence', $asn1);
- $key = $x509['tbsCertificate']['subjectPublicKeyInfo'];
- $key = ASN1::encodeDER($key, Maps\SubjectPublicKeyInfo::MAP);
- $x509['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey'] =
- "-----BEGIN PUBLIC KEY-----\r\n" .
- chunk_split(base64_encode($key), 64) .
- "-----END PUBLIC KEY-----";
+ $key = &$x509['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey'];
+ $key = $this->_reformatKey($x509['tbsCertificate']['subjectPublicKeyInfo']['algorithm']['algorithm'], $key);
$this->currentCert = $x509;
$this->dn = $x509['tbsCertificate']['subject'];
@@ -548,7 +1535,7 @@ class X509
* @access public
* @return string
*/
- public function saveX509($cert, $format = self::FORMAT_PEM)
+ function saveX509($cert, $format = self::FORMAT_PEM)
{
if (!is_array($cert) || !isset($cert['tbsCertificate'])) {
return false;
@@ -556,22 +1543,32 @@ class X509
switch (true) {
// "case !$a: case !$b: break; default: whatever();" is the same thing as "if ($a && $b) whatever()"
- case !($algorithm = $this->subArray($cert, 'tbsCertificate/subjectPublicKeyInfo/algorithm/algorithm')):
+ case !($algorithm = $this->_subArray($cert, 'tbsCertificate/subjectPublicKeyInfo/algorithm/algorithm')):
case is_object($cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']):
break;
default:
- $cert['tbsCertificate']['subjectPublicKeyInfo'] = new Element(
- base64_decode(preg_replace('#-.+-|[\r\n]#', '', $cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']))
- );
+ switch ($algorithm) {
+ case 'rsaEncryption':
+ $cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']
+ = base64_encode("\0" . base64_decode(preg_replace('#-.+-|[\r\n]#', '', $cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey'])));
+ /* "[For RSA keys] the parameters field MUST have ASN.1 type NULL for this algorithm identifier."
+ -- https://tools.ietf.org/html/rfc3279#section-2.3.1
+
+ given that and the fact that RSA keys appear ot be the only key type for which the parameters field can be blank,
+ it seems like perhaps the ASN.1 description ought not say the parameters field is OPTIONAL, but whatever.
+ */
+ $cert['tbsCertificate']['subjectPublicKeyInfo']['algorithm']['parameters'] = null;
+ // https://tools.ietf.org/html/rfc3279#section-2.2.1
+ $cert['signatureAlgorithm']['parameters'] = null;
+ $cert['tbsCertificate']['signature']['parameters'] = null;
+ }
}
- if ($algorithm == 'rsaEncryption') {
- $cert['signatureAlgorithm']['parameters'] = null;
- $cert['tbsCertificate']['signature']['parameters'] = null;
- }
+ $asn1 = new ASN1();
+ $asn1->loadOIDs($this->oids);
- $filters = [];
- $type_utf8_string = ['type' => ASN1::TYPE_UTF8_STRING];
+ $filters = array();
+ $type_utf8_string = array('type' => ASN1::TYPE_UTF8_STRING);
$filters['tbsCertificate']['signature']['parameters'] = $type_utf8_string;
$filters['tbsCertificate']['signature']['issuer']['rdnSequence']['value'] = $type_utf8_string;
$filters['tbsCertificate']['issuer']['rdnSequence']['value'] = $type_utf8_string;
@@ -583,31 +1580,27 @@ class X509
$filters['distributionPoint']['fullName']['directoryName']['rdnSequence']['value'] = $type_utf8_string;
$filters['directoryName']['rdnSequence']['value'] = $type_utf8_string;
- foreach (self::$extensions as $extension) {
- $filters['tbsCertificate']['extensions'][] = $extension;
- }
-
- /* in the case of policyQualifiers/qualifier, the type has to be \phpseclib3\File\ASN1::TYPE_IA5_STRING.
- \phpseclib3\File\ASN1::TYPE_PRINTABLE_STRING will cause OpenSSL's X.509 parser to spit out random
+ /* in the case of policyQualifiers/qualifier, the type has to be \phpseclib\File\ASN1::TYPE_IA5_STRING.
+ \phpseclib\File\ASN1::TYPE_PRINTABLE_STRING will cause OpenSSL's X.509 parser to spit out random
characters.
*/
$filters['policyQualifiers']['qualifier']
- = ['type' => ASN1::TYPE_IA5_STRING];
+ = array('type' => ASN1::TYPE_IA5_STRING);
- ASN1::setFilters($filters);
+ $asn1->loadFilters($filters);
- $this->mapOutExtensions($cert, 'tbsCertificate/extensions');
- $this->mapOutDNs($cert, 'tbsCertificate/issuer/rdnSequence');
- $this->mapOutDNs($cert, 'tbsCertificate/subject/rdnSequence');
+ $this->_mapOutExtensions($cert, 'tbsCertificate/extensions', $asn1);
+ $this->_mapOutDNs($cert, 'tbsCertificate/issuer/rdnSequence', $asn1);
+ $this->_mapOutDNs($cert, 'tbsCertificate/subject/rdnSequence', $asn1);
- $cert = ASN1::encodeDER($cert, Maps\Certificate::MAP);
+ $cert = $asn1->encodeDER($cert, $this->Certificate);
switch ($format) {
case self::FORMAT_DER:
return $cert;
// case self::FORMAT_PEM:
default:
- return "-----BEGIN CERTIFICATE-----\r\n" . chunk_split(Base64::encode($cert), 64) . '-----END CERTIFICATE-----';
+ return "-----BEGIN CERTIFICATE-----\r\n" . chunk_split(base64_encode($cert), 64) . '-----END CERTIFICATE-----';
}
}
@@ -617,25 +1610,27 @@ class X509
*
* @param array $root (by reference)
* @param string $path
+ * @param object $asn1
* @access private
*/
- private function mapInExtensions(&$root, $path)
+ function _mapInExtensions(&$root, $path, $asn1)
{
- $extensions = &$this->subArrayUnchecked($root, $path);
+ $extensions = &$this->_subArrayUnchecked($root, $path);
if ($extensions) {
for ($i = 0; $i < count($extensions); $i++) {
$id = $extensions[$i]['extnId'];
$value = &$extensions[$i]['extnValue'];
- $decoded = ASN1::decodeBER($value);
+ $value = base64_decode($value);
+ $decoded = $asn1->decodeBER($value);
/* [extnValue] contains the DER encoding of an ASN.1 value
corresponding to the extension type identified by extnID */
- $map = $this->getMapping($id);
+ $map = $this->_getMapping($id);
if (!is_bool($map)) {
$decoder = $id == 'id-ce-nameConstraints' ?
- [static::class, 'decodeNameConstraintIP'] :
- [static::class, 'decodeIP'];
- $mapped = ASN1::asn1map($decoded[0], $map, ['iPAddress' => $decoder]);
+ array($this, '_decodeNameConstraintIP') :
+ array($this, '_decodeIP');
+ $mapped = $asn1->asn1map($decoded[0], $map, array('iPAddress' => $decoder));
$value = $mapped === false ? $decoded[0] : $mapped;
if ($id == 'id-ce-certificatePolicies') {
@@ -645,16 +1640,18 @@ class X509
}
for ($k = 0; $k < count($value[$j]['policyQualifiers']); $k++) {
$subid = $value[$j]['policyQualifiers'][$k]['policyQualifierId'];
- $map = $this->getMapping($subid);
+ $map = $this->_getMapping($subid);
$subvalue = &$value[$j]['policyQualifiers'][$k]['qualifier'];
if ($map !== false) {
- $decoded = ASN1::decodeBER($subvalue);
- $mapped = ASN1::asn1map($decoded[0], $map);
+ $decoded = $asn1->decodeBER($subvalue);
+ $mapped = $asn1->asn1map($decoded[0], $map);
$subvalue = $mapped === false ? $decoded[0] : $mapped;
}
}
}
}
+ } else {
+ $value = base64_encode($value);
}
}
}
@@ -666,18 +1663,12 @@ class X509
*
* @param array $root (by reference)
* @param string $path
+ * @param object $asn1
* @access private
*/
- private function mapOutExtensions(&$root, $path)
+ function _mapOutExtensions(&$root, $path, $asn1)
{
- foreach ($this->extensionValues as $id => $value) {
- $root['tbsCertificate']['extensions'][] = [
- 'extnId' => $id,
- 'extnValue' => $value,
- ];
- }
-
- $extensions = &$this->subArray($root, $path);
+ $extensions = &$this->_subArray($root, $path);
if (is_array($extensions)) {
$size = count($extensions);
@@ -697,12 +1688,12 @@ class X509
}
for ($k = 0; $k < count($value[$j]['policyQualifiers']); $k++) {
$subid = $value[$j]['policyQualifiers'][$k]['policyQualifierId'];
- $map = $this->getMapping($subid);
+ $map = $this->_getMapping($subid);
$subvalue = &$value[$j]['policyQualifiers'][$k]['qualifier'];
if ($map !== false) {
- // by default \phpseclib3\File\ASN1 will try to render qualifier as a \phpseclib3\File\ASN1::TYPE_IA5_STRING since it's
- // actual type is \phpseclib3\File\ASN1::TYPE_ANY
- $subvalue = new Element(ASN1::encodeDER($subvalue, $map));
+ // by default \phpseclib\File\ASN1 will try to render qualifier as a \phpseclib\File\ASN1::TYPE_IA5_STRING since it's
+ // actual type is \phpseclib\File\ASN1::TYPE_ANY
+ $subvalue = new Element($asn1->encodeDER($subvalue, $map));
}
}
}
@@ -718,14 +1709,15 @@ class X509
/* [extnValue] contains the DER encoding of an ASN.1 value
corresponding to the extension type identified by extnID */
- $map = $this->getMapping($id);
+ $map = $this->_getMapping($id);
if (is_bool($map)) {
if (!$map) {
- //user_error($id . ' is not a currently supported extension');
+ user_error($id . ' is not a currently supported extension');
unset($extensions[$i]);
}
} else {
- $value = ASN1::encodeDER($value, $map, ['iPAddress' => [static::class, 'encodeIP']]);
+ $temp = $asn1->encodeDER($value, $map, array('iPAddress' => array($this, '_encodeIP')));
+ $value = base64_encode($temp);
}
}
}
@@ -737,33 +1729,34 @@ class X509
*
* @param array $root (by reference)
* @param string $path
+ * @param object $asn1
* @access private
*/
- private function mapInAttributes(&$root, $path)
+ function _mapInAttributes(&$root, $path, $asn1)
{
- $attributes = &$this->subArray($root, $path);
+ $attributes = &$this->_subArray($root, $path);
if (is_array($attributes)) {
for ($i = 0; $i < count($attributes); $i++) {
$id = $attributes[$i]['type'];
/* $value contains the DER encoding of an ASN.1 value
corresponding to the attribute type identified by type */
- $map = $this->getMapping($id);
+ $map = $this->_getMapping($id);
if (is_array($attributes[$i]['value'])) {
$values = &$attributes[$i]['value'];
for ($j = 0; $j < count($values); $j++) {
- $value = ASN1::encodeDER($values[$j], Maps\AttributeValue::MAP);
- $decoded = ASN1::decodeBER($value);
+ $value = $asn1->encodeDER($values[$j], $this->AttributeValue);
+ $decoded = $asn1->decodeBER($value);
if (!is_bool($map)) {
- $mapped = ASN1::asn1map($decoded[0], $map);
+ $mapped = $asn1->asn1map($decoded[0], $map);
if ($mapped !== false) {
$values[$j] = $mapped;
}
- if ($id == 'pkcs-9-at-extensionRequest' && $this->isSubArrayValid($values, $j)) {
- $this->mapInExtensions($values, $j);
+ if ($id == 'pkcs-9-at-extensionRequest' && $this->_isSubArrayValid($values, $j)) {
+ $this->_mapInExtensions($values, $j, $asn1);
}
} elseif ($map) {
- $values[$j] = $value;
+ $values[$j] = base64_encode($value);
}
}
}
@@ -777,11 +1770,12 @@ class X509
*
* @param array $root (by reference)
* @param string $path
+ * @param object $asn1
* @access private
*/
- private function mapOutAttributes(&$root, $path)
+ function _mapOutAttributes(&$root, $path, $asn1)
{
- $attributes = &$this->subArray($root, $path);
+ $attributes = &$this->_subArray($root, $path);
if (is_array($attributes)) {
$size = count($attributes);
@@ -789,23 +1783,23 @@ class X509
/* [value] contains the DER encoding of an ASN.1 value
corresponding to the attribute type identified by type */
$id = $attributes[$i]['type'];
- $map = $this->getMapping($id);
+ $map = $this->_getMapping($id);
if ($map === false) {
- //user_error($id . ' is not a currently supported attribute', E_USER_NOTICE);
+ user_error($id . ' is not a currently supported attribute', E_USER_NOTICE);
unset($attributes[$i]);
} elseif (is_array($attributes[$i]['value'])) {
$values = &$attributes[$i]['value'];
for ($j = 0; $j < count($values); $j++) {
switch ($id) {
case 'pkcs-9-at-extensionRequest':
- $this->mapOutExtensions($values, $j);
+ $this->_mapOutExtensions($values, $j, $asn1);
break;
}
if (!is_bool($map)) {
- $temp = ASN1::encodeDER($values[$j], $map);
- $decoded = ASN1::decodeBER($temp);
- $values[$j] = ASN1::asn1map($decoded[0], Maps\AttributeValue::MAP);
+ $temp = $asn1->encodeDER($values[$j], $map);
+ $decoded = $asn1->decodeBER($temp);
+ $values[$j] = $asn1->asn1map($decoded[0], $this->AttributeValue);
}
}
}
@@ -819,11 +1813,12 @@ class X509
*
* @param array $root (by reference)
* @param string $path
+ * @param object $asn1
* @access private
*/
- private function mapInDNs(&$root, $path)
+ function _mapInDNs(&$root, $path, $asn1)
{
- $dns = &$this->subArray($root, $path);
+ $dns = &$this->_subArray($root, $path);
if (is_array($dns)) {
for ($i = 0; $i < count($dns); $i++) {
@@ -831,10 +1826,10 @@ class X509
$type = $dns[$i][$j]['type'];
$value = &$dns[$i][$j]['value'];
if (is_object($value) && $value instanceof Element) {
- $map = $this->getMapping($type);
+ $map = $this->_getMapping($type);
if (!is_bool($map)) {
- $decoded = ASN1::decodeBER($value);
- $value = ASN1::asn1map($decoded[0], $map);
+ $decoded = $asn1->decodeBER($value);
+ $value = $asn1->asn1map($decoded[0], $map);
}
}
}
@@ -848,11 +1843,12 @@ class X509
*
* @param array $root (by reference)
* @param string $path
+ * @param object $asn1
* @access private
*/
- private function mapOutDNs(&$root, $path)
+ function _mapOutDNs(&$root, $path, $asn1)
{
- $dns = &$this->subArray($root, $path);
+ $dns = &$this->_subArray($root, $path);
if (is_array($dns)) {
$size = count($dns);
@@ -864,9 +1860,9 @@ class X509
continue;
}
- $map = $this->getMapping($type);
+ $map = $this->_getMapping($type);
if (!is_bool($map)) {
- $value = new Element(ASN1::encodeDER($value, $map));
+ $value = new Element($asn1->encodeDER($value, $map));
}
}
}
@@ -880,59 +1876,57 @@ class X509
* @access private
* @return mixed
*/
- private function getMapping($extnId)
+ function _getMapping($extnId)
{
- if (!is_string($extnId)) { // eg. if it's a \phpseclib3\File\ASN1\Element object
+ if (!is_string($extnId)) { // eg. if it's a \phpseclib\File\ASN1\Element object
return true;
}
- if (isset(self::$extensions[$extnId])) {
- return self::$extensions[$extnId];
- }
-
switch ($extnId) {
case 'id-ce-keyUsage':
- return Maps\KeyUsage::MAP;
+ return $this->KeyUsage;
case 'id-ce-basicConstraints':
- return Maps\BasicConstraints::MAP;
+ return $this->BasicConstraints;
case 'id-ce-subjectKeyIdentifier':
- return Maps\KeyIdentifier::MAP;
+ return $this->KeyIdentifier;
case 'id-ce-cRLDistributionPoints':
- return Maps\CRLDistributionPoints::MAP;
+ return $this->CRLDistributionPoints;
case 'id-ce-authorityKeyIdentifier':
- return Maps\AuthorityKeyIdentifier::MAP;
+ return $this->AuthorityKeyIdentifier;
case 'id-ce-certificatePolicies':
- return Maps\CertificatePolicies::MAP;
+ return $this->CertificatePolicies;
case 'id-ce-extKeyUsage':
- return Maps\ExtKeyUsageSyntax::MAP;
+ return $this->ExtKeyUsageSyntax;
case 'id-pe-authorityInfoAccess':
- return Maps\AuthorityInfoAccessSyntax::MAP;
+ return $this->AuthorityInfoAccessSyntax;
+ case 'id-pe-subjectInfoAccess':
+ return $this->SubjectInfoAccessSyntax;
case 'id-ce-subjectAltName':
- return Maps\SubjectAltName::MAP;
+ return $this->SubjectAltName;
case 'id-ce-subjectDirectoryAttributes':
- return Maps\SubjectDirectoryAttributes::MAP;
+ return $this->SubjectDirectoryAttributes;
case 'id-ce-privateKeyUsagePeriod':
- return Maps\PrivateKeyUsagePeriod::MAP;
+ return $this->PrivateKeyUsagePeriod;
case 'id-ce-issuerAltName':
- return Maps\IssuerAltName::MAP;
+ return $this->IssuerAltName;
case 'id-ce-policyMappings':
- return Maps\PolicyMappings::MAP;
+ return $this->PolicyMappings;
case 'id-ce-nameConstraints':
- return Maps\NameConstraints::MAP;
+ return $this->NameConstraints;
case 'netscape-cert-type':
- return Maps\netscape_cert_type::MAP;
+ return $this->netscape_cert_type;
case 'netscape-comment':
- return Maps\netscape_comment::MAP;
+ return $this->netscape_comment;
case 'netscape-ca-policy-url':
- return Maps\netscape_ca_policy_url::MAP;
+ return $this->netscape_ca_policy_url;
// since id-qt-cps isn't a constructed type it will have already been decoded as a string by the time it gets
// back around to asn1map() and we don't want it decoded again.
//case 'id-qt-cps':
- // return Maps\CPSuri::MAP;
+ // return $this->CPSuri;
case 'id-qt-unotice':
- return Maps\UserNotice::MAP;
+ return $this->UserNotice;
// the following OIDs are unsupported but we don't want them to give notices when calling saveX509().
case 'id-pe-logotype': // http://www.ietf.org/rfc/rfc3709.txt
@@ -953,31 +1947,31 @@ class X509
// CSR attributes
case 'pkcs-9-at-unstructuredName':
- return Maps\PKCS9String::MAP;
+ return $this->PKCS9String;
case 'pkcs-9-at-challengePassword':
- return Maps\DirectoryString::MAP;
+ return $this->DirectoryString;
case 'pkcs-9-at-extensionRequest':
- return Maps\Extensions::MAP;
+ return $this->Extensions;
// CRL extensions.
case 'id-ce-cRLNumber':
- return Maps\CRLNumber::MAP;
+ return $this->CRLNumber;
case 'id-ce-deltaCRLIndicator':
- return Maps\CRLNumber::MAP;
+ return $this->CRLNumber;
case 'id-ce-issuingDistributionPoint':
- return Maps\IssuingDistributionPoint::MAP;
+ return $this->IssuingDistributionPoint;
case 'id-ce-freshestCRL':
- return Maps\CRLDistributionPoints::MAP;
+ return $this->CRLDistributionPoints;
case 'id-ce-cRLReasons':
- return Maps\CRLReason::MAP;
+ return $this->CRLReason;
case 'id-ce-invalidityDate':
- return Maps\InvalidityDate::MAP;
+ return $this->InvalidityDate;
case 'id-ce-certificateIssuer':
- return Maps\CertificateIssuer::MAP;
+ return $this->CertificateIssuer;
case 'id-ce-holdInstructionCode':
- return Maps\HoldInstructionCode::MAP;
+ return $this->HoldInstructionCode;
case 'id-at-postalAddress':
- return Maps\PostalAddress::MAP;
+ return $this->PostalAddress;
}
return false;
@@ -990,7 +1984,7 @@ class X509
* @access public
* @return bool
*/
- public function loadCA($cert)
+ function loadCA($cert)
{
$olddn = $this->dn;
$oldcert = $this->currentCert;
@@ -1057,7 +2051,7 @@ class X509
* @access public
* @return bool
*/
- public function validateURL($url)
+ function validateURL($url)
{
if (!is_array($this->currentCert) || !isset($this->currentCert['tbsCertificate'])) {
return false;
@@ -1071,7 +2065,7 @@ class X509
if ($names = $this->getExtension('id-ce-subjectAltName')) {
foreach ($names as $name) {
foreach ($name as $key => $value) {
- $value = str_replace(['.', '*'], ['\.', '[^.]*'], $value);
+ $value = str_replace(array('.', '*'), array('\.', '[^.]*'), $value);
switch ($key) {
case 'dNSName':
/* From RFC2818 "HTTP over TLS":
@@ -1101,7 +2095,7 @@ class X509
}
if ($value = $this->getDNProp('id-at-commonName')) {
- $value = str_replace(['.', '*'], ['\.', '[^.]*'], $value[0]);
+ $value = str_replace(array('.', '*'), array('\.', '[^.]*'), $value[0]);
return preg_match('#^' . $value . '$#', $components['host']);
}
@@ -1113,18 +2107,17 @@ class X509
*
* If $date isn't defined it is assumed to be the current date.
*
- * @param DateTimeInterface|string $date optional
+ * @param \DateTime|string $date optional
* @access public
- * @return boolean
*/
- public function validateDate($date = null)
+ function validateDate($date = null)
{
if (!is_array($this->currentCert) || !isset($this->currentCert['tbsCertificate'])) {
return false;
}
if (!isset($date)) {
- $date = new DateTimeImmutable(null, new DateTimeZone(@date_default_timezone_get()));
+ $date = new DateTime(null, new DateTimeZone(@date_default_timezone_get()));
}
$notBefore = $this->currentCert['tbsCertificate']['validity']['notBefore'];
@@ -1134,13 +2127,19 @@ class X509
$notAfter = isset($notAfter['generalTime']) ? $notAfter['generalTime'] : $notAfter['utcTime'];
if (is_string($date)) {
- $date = new DateTimeImmutable($date, new DateTimeZone(@date_default_timezone_get()));
+ $date = new DateTime($date, new DateTimeZone(@date_default_timezone_get()));
}
- $notBefore = new DateTimeImmutable($notBefore, new DateTimeZone(@date_default_timezone_get()));
- $notAfter = new DateTimeImmutable($notAfter, new DateTimeZone(@date_default_timezone_get()));
+ $notBefore = new DateTime($notBefore, new DateTimeZone(@date_default_timezone_get()));
+ $notAfter = new DateTime($notAfter, new DateTimeZone(@date_default_timezone_get()));
- return $date >= $notBefore && $date<= $notAfter;
+ switch (true) {
+ case $date < $notBefore:
+ case $date > $notAfter:
+ return false;
+ }
+
+ return true;
}
/**
@@ -1150,7 +2149,7 @@ class X509
* @access private
* @return bool|string
*/
- private static function fetchURL($url)
+ static function _fetchURL($url)
{
if (self::$disable_url_fetch) {
return false;
@@ -1206,7 +2205,7 @@ class X509
* @access private
* @return bool
*/
- private function testForIntermediate($caonly, $count)
+ function _testForIntermediate($caonly, $count)
{
$opts = $this->getExtension('id-pe-authorityInfoAccess');
if (!is_array($opts)) {
@@ -1228,7 +2227,7 @@ class X509
return false;
}
- $cert = static::fetchURL($url);
+ $cert = static::_fetchURL($url);
if (!is_string($cert)) {
return false;
}
@@ -1248,7 +2247,7 @@ class X509
return false;
}
- if (!$parent->validateSignatureCountable($caonly, ++$count)) {
+ if (!$parent->_validateSignatureCountable($caonly, ++$count)) {
return false;
}
@@ -1273,9 +2272,9 @@ class X509
* @access public
* @return mixed
*/
- public function validateSignature($caonly = true)
+ function validateSignature($caonly = true)
{
- return $this->validateSignatureCountable($caonly, 0);
+ return $this->_validateSignatureCountable($caonly, 0);
}
/**
@@ -1288,7 +2287,7 @@ class X509
* @access private
* @return mixed
*/
- private function validateSignatureCountable($caonly, $count)
+ function _validateSignatureCountable($caonly, $count)
{
if (!is_array($this->currentCert) || !isset($this->signatureSubject)) {
return null;
@@ -1343,32 +2342,32 @@ class X509
}
}
if (count($this->CAs) == $i && $caonly) {
- return $this->testForIntermediate($caonly, $count) && $this->validateSignature($caonly);
+ return $this->_testForIntermediate($caonly, $count) && $this->validateSignature($caonly);
}
} elseif (!isset($signingCert) || $caonly) {
- return $this->testForIntermediate($caonly, $count) && $this->validateSignature($caonly);
+ return $this->_testForIntermediate($caonly, $count) && $this->validateSignature($caonly);
}
- return $this->validateSignatureHelper(
+ return $this->_validateSignature(
$signingCert['tbsCertificate']['subjectPublicKeyInfo']['algorithm']['algorithm'],
$signingCert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey'],
$this->currentCert['signatureAlgorithm']['algorithm'],
- substr($this->currentCert['signature'], 1),
+ substr(base64_decode($this->currentCert['signature']), 1),
$this->signatureSubject
);
case isset($this->currentCert['certificationRequestInfo']):
- return $this->validateSignatureHelper(
+ return $this->_validateSignature(
$this->currentCert['certificationRequestInfo']['subjectPKInfo']['algorithm']['algorithm'],
$this->currentCert['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey'],
$this->currentCert['signatureAlgorithm']['algorithm'],
- substr($this->currentCert['signature'], 1),
+ substr(base64_decode($this->currentCert['signature']), 1),
$this->signatureSubject
);
case isset($this->currentCert['publicKeyAndChallenge']):
- return $this->validateSignatureHelper(
+ return $this->_validateSignature(
$this->currentCert['publicKeyAndChallenge']['spki']['algorithm']['algorithm'],
$this->currentCert['publicKeyAndChallenge']['spki']['subjectPublicKey'],
$this->currentCert['signatureAlgorithm']['algorithm'],
- substr($this->currentCert['signature'], 1),
+ substr(base64_decode($this->currentCert['signature']), 1),
$this->signatureSubject
);
case isset($this->currentCert['tbsCertList']):
@@ -1396,11 +2395,11 @@ class X509
if (!isset($signingCert)) {
return false;
}
- return $this->validateSignatureHelper(
+ return $this->_validateSignature(
$signingCert['tbsCertificate']['subjectPublicKeyInfo']['algorithm']['algorithm'],
$signingCert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey'],
$this->currentCert['signatureAlgorithm']['algorithm'],
- substr($this->currentCert['signature'], 1),
+ substr(base64_decode($this->currentCert['signature']), 1),
$this->signatureSubject
);
default:
@@ -1411,8 +2410,7 @@ class X509
/**
* Validates a signature
*
- * Returns true if the signature is verified and false if it is not correct.
- * If the algorithms are unsupposed an exception is thrown.
+ * Returns true if the signature is verified, false if it is not correct or null on error
*
* @param string $publicKeyAlgorithm
* @param string $publicKey
@@ -1420,17 +2418,15 @@ class X509
* @param string $signature
* @param string $signatureSubject
* @access private
- * @throws \phpseclib3\Exception\UnsupportedAlgorithmException if the algorithm is unsupported
- * @return bool
+ * @return int
*/
- private function validateSignatureHelper($publicKeyAlgorithm, $publicKey, $signatureAlgorithm, $signature, $signatureSubject)
+ function _validateSignature($publicKeyAlgorithm, $publicKey, $signatureAlgorithm, $signature, $signatureSubject)
{
switch ($publicKeyAlgorithm) {
- case 'id-RSASSA-PSS':
- $key = RSA::loadFormat('PSS', $publicKey);
- break;
case 'rsaEncryption':
- $key = RSA::loadFormat('PKCS8', $publicKey);
+ $rsa = new RSA();
+ $rsa->loadKey($publicKey);
+
switch ($signatureAlgorithm) {
case 'md2WithRSAEncryption':
case 'md5WithRSAEncryption':
@@ -1439,51 +2435,21 @@ class X509
case 'sha256WithRSAEncryption':
case 'sha384WithRSAEncryption':
case 'sha512WithRSAEncryption':
- $key = $key
- ->withHash(preg_replace('#WithRSAEncryption$#', '', $signatureAlgorithm))
- ->withPadding(RSA::SIGNATURE_PKCS1);
- break;
- default:
- throw new UnsupportedAlgorithmException('Signature algorithm unsupported');
- }
- break;
- case 'id-Ed25519':
- case 'id-Ed448':
- $key = EC::loadFormat('PKCS8', $publicKey);
- break;
- case 'id-ecPublicKey':
- $key = EC::loadFormat('PKCS8', $publicKey);
- switch ($signatureAlgorithm) {
- case 'ecdsa-with-SHA1':
- case 'ecdsa-with-SHA224':
- case 'ecdsa-with-SHA256':
- case 'ecdsa-with-SHA384':
- case 'ecdsa-with-SHA512':
- $key = $key
- ->withHash(preg_replace('#^ecdsa-with-#', '', strtolower($signatureAlgorithm)));
- break;
- default:
- throw new UnsupportedAlgorithmException('Signature algorithm unsupported');
- }
- break;
- case 'id-dsa':
- $key = DSA::loadFormat('PKCS8', $publicKey);
- switch ($signatureAlgorithm) {
- case 'id-dsa-with-sha1':
- case 'id-dsa-with-sha224':
- case 'id-dsa-with-sha256':
- $key = $key
- ->withHash(preg_replace('#^id-dsa-with-#', '', strtolower($signatureAlgorithm)));
+ $rsa->setHash(preg_replace('#WithRSAEncryption$#', '', $signatureAlgorithm));
+ $rsa->setSignatureMode(RSA::SIGNATURE_PKCS1);
+ if (!@$rsa->verify($signatureSubject, $signature)) {
+ return false;
+ }
break;
default:
- throw new UnsupportedAlgorithmException('Signature algorithm unsupported');
+ return null;
}
break;
default:
- throw new UnsupportedAlgorithmException('Public key algorithm unsupported');
+ return null;
}
- return $key->verify($signatureSubject, $signature);
+ return true;
}
/**
@@ -1496,7 +2462,7 @@ class X509
* @param int $count
* @access public
*/
- public static function setRecurLimit($count)
+ static function setRecurLimit($count)
{
self::$recur_limit = $count;
}
@@ -1506,7 +2472,7 @@ class X509
*
* @access public
*/
- public static function disableURLFetch()
+ static function disableURLFetch()
{
self::$disable_url_fetch = true;
}
@@ -1516,12 +2482,38 @@ class X509
*
* @access public
*/
- public static function enableURLFetch()
+ static function enableURLFetch()
{
self::$disable_url_fetch = false;
}
/**
+ * Reformat public keys
+ *
+ * Reformats a public key to a format supported by phpseclib (if applicable)
+ *
+ * @param string $algorithm
+ * @param string $key
+ * @access private
+ * @return string
+ */
+ function _reformatKey($algorithm, $key)
+ {
+ switch ($algorithm) {
+ case 'rsaEncryption':
+ return
+ "-----BEGIN RSA PUBLIC KEY-----\r\n" .
+ // subjectPublicKey is stored as a bit string in X.509 certs. the first byte of a bit string represents how many bits
+ // in the last byte should be ignored. the following only supports non-zero stuff but as none of the X.509 certs Firefox
+ // uses as a cert authority actually use a non-zero bit I think it's safe to assume that none do.
+ chunk_split(base64_encode(substr(base64_decode($key), 1)), 64) .
+ '-----END RSA PUBLIC KEY-----';
+ default:
+ return $key;
+ }
+ }
+
+ /**
* Decodes an IP address
*
* Takes in a base64 encoded "blob" and returns a human readable IP address
@@ -1530,9 +2522,9 @@ class X509
* @access private
* @return string
*/
- public static function decodeIP($ip)
+ function _decodeIP($ip)
{
- return inet_ntop($ip);
+ return inet_ntop(base64_decode($ip));
}
/**
@@ -1544,12 +2536,13 @@ class X509
* @access private
* @return array
*/
- public static function decodeNameConstraintIP($ip)
+ function _decodeNameConstraintIP($ip)
{
+ $ip = base64_decode($ip);
$size = strlen($ip) >> 1;
$mask = substr($ip, $size);
$ip = substr($ip, 0, $size);
- return [inet_ntop($ip), inet_ntop($mask)];
+ return array(inet_ntop($ip), inet_ntop($mask));
}
/**
@@ -1561,11 +2554,11 @@ class X509
* @access private
* @return string
*/
- public static function encodeIP($ip)
+ function _encodeIP($ip)
{
return is_string($ip) ?
- inet_pton($ip) :
- inet_pton($ip[0]) . inet_pton($ip[1]);
+ base64_encode(inet_pton($ip)) :
+ base64_encode(inet_pton($ip[0]) . inet_pton($ip[1]));
}
/**
@@ -1575,7 +2568,7 @@ class X509
* @access private
* @return mixed
*/
- private function translateDNProp($propName)
+ function _translateDNProp($propName)
{
switch (strtolower($propName)) {
case 'id-at-countryname':
@@ -1669,26 +2662,26 @@ class X509
* @access public
* @return bool
*/
- public function setDNProp($propName, $propValue, $type = 'utf8String')
+ function setDNProp($propName, $propValue, $type = 'utf8String')
{
if (empty($this->dn)) {
- $this->dn = ['rdnSequence' => []];
+ $this->dn = array('rdnSequence' => array());
}
- if (($propName = $this->translateDNProp($propName)) === false) {
+ if (($propName = $this->_translateDNProp($propName)) === false) {
return false;
}
foreach ((array) $propValue as $v) {
if (!is_array($v) && isset($type)) {
- $v = [$type => $v];
+ $v = array($type => $v);
}
- $this->dn['rdnSequence'][] = [
- [
+ $this->dn['rdnSequence'][] = array(
+ array(
'type' => $propName,
'value'=> $v
- ]
- ];
+ )
+ );
}
return true;
@@ -1700,13 +2693,13 @@ class X509
* @param string $propName
* @access public
*/
- public function removeDNProp($propName)
+ function removeDNProp($propName)
{
if (empty($this->dn)) {
return;
}
- if (($propName = $this->translateDNProp($propName)) === false) {
+ if (($propName = $this->_translateDNProp($propName)) === false) {
return;
}
@@ -1734,7 +2727,7 @@ class X509
* @return mixed
* @access public
*/
- public function getDNProp($propName, $dn = null, $withType = false)
+ function getDNProp($propName, $dn = null, $withType = false)
{
if (!isset($dn)) {
$dn = $this->dn;
@@ -1744,25 +2737,27 @@ class X509
return false;
}
- if (($propName = $this->translateDNProp($propName)) === false) {
+ if (($propName = $this->_translateDNProp($propName)) === false) {
return false;
}
- $filters = [];
- $filters['value'] = ['type' => ASN1::TYPE_UTF8_STRING];
- ASN1::setFilters($filters);
- $this->mapOutDNs($dn, 'rdnSequence');
+ $asn1 = new ASN1();
+ $asn1->loadOIDs($this->oids);
+ $filters = array();
+ $filters['value'] = array('type' => ASN1::TYPE_UTF8_STRING);
+ $asn1->loadFilters($filters);
+ $this->_mapOutDNs($dn, 'rdnSequence', $asn1);
$dn = $dn['rdnSequence'];
- $result = [];
+ $result = array();
for ($i = 0; $i < count($dn); $i++) {
if ($dn[$i][0]['type'] == $propName) {
$v = $dn[$i][0]['value'];
if (!$withType) {
if (is_array($v)) {
foreach ($v as $type => $s) {
- $type = array_search($type, ASN1::ANY_MAP);
- if ($type !== false && array_key_exists($type, ASN1::STRING_TYPE_SIZE)) {
- $s = ASN1::convert($s, $type);
+ $type = array_search($type, $asn1->ANYmap, true);
+ if ($type !== false && isset($asn1->stringTypeSize[$type])) {
+ $s = $asn1->convert($s, $type);
if ($s !== false) {
$v = $s;
break;
@@ -1773,10 +2768,10 @@ class X509
$v = array_pop($v); // Always strip data type.
}
} elseif (is_object($v) && $v instanceof Element) {
- $map = $this->getMapping($propName);
+ $map = $this->_getMapping($propName);
if (!is_bool($map)) {
- $decoded = ASN1::decodeBER($v);
- $v = ASN1::asn1map($decoded[0], $map);
+ $decoded = $asn1->decodeBER($v);
+ $v = $asn1->asn1map($decoded[0], $map);
}
}
}
@@ -1796,7 +2791,7 @@ class X509
* @access public
* @return bool
*/
- public function setDN($dn, $merge = false, $type = 'utf8String')
+ function setDN($dn, $merge = false, $type = 'utf8String')
{
if (!$merge) {
$this->dn = null;
@@ -1836,9 +2831,9 @@ class X509
* @param mixed $format optional
* @param array $dn optional
* @access public
- * @return array|bool
+ * @return bool
*/
- public function getDN($format = self::DN_ARRAY, $dn = null)
+ function getDN($format = self::DN_ARRAY, $dn = null)
{
if (!isset($dn)) {
$dn = isset($this->currentCert['tbsCertList']) ? $this->currentCert['tbsCertList']['issuer'] : $this->dn;
@@ -1848,28 +2843,32 @@ class X509
case self::DN_ARRAY:
return $dn;
case self::DN_ASN1:
- $filters = [];
- $filters['rdnSequence']['value'] = ['type' => ASN1::TYPE_UTF8_STRING];
- ASN1::setFilters($filters);
- $this->mapOutDNs($dn, 'rdnSequence');
- return ASN1::encodeDER($dn, Maps\Name::MAP);
+ $asn1 = new ASN1();
+ $asn1->loadOIDs($this->oids);
+ $filters = array();
+ $filters['rdnSequence']['value'] = array('type' => ASN1::TYPE_UTF8_STRING);
+ $asn1->loadFilters($filters);
+ $this->_mapOutDNs($dn, 'rdnSequence', $asn1);
+ return $asn1->encodeDER($dn, $this->Name);
case self::DN_CANON:
// No SEQUENCE around RDNs and all string values normalized as
// trimmed lowercase UTF-8 with all spacing as one blank.
// constructed RDNs will not be canonicalized
- $filters = [];
- $filters['value'] = ['type' => ASN1::TYPE_UTF8_STRING];
- ASN1::setFilters($filters);
+ $asn1 = new ASN1();
+ $asn1->loadOIDs($this->oids);
+ $filters = array();
+ $filters['value'] = array('type' => ASN1::TYPE_UTF8_STRING);
+ $asn1->loadFilters($filters);
$result = '';
- $this->mapOutDNs($dn, 'rdnSequence');
+ $this->_mapOutDNs($dn, 'rdnSequence', $asn1);
foreach ($dn['rdnSequence'] as $rdn) {
foreach ($rdn as $i => $attr) {
$attr = &$rdn[$i];
if (is_array($attr['value'])) {
foreach ($attr['value'] as $type => $v) {
- $type = array_search($type, ASN1::ANY_MAP, true);
- if ($type !== false && array_key_exists($type, ASN1::STRING_TYPE_SIZE)) {
- $v = ASN1::convert($v, $type);
+ $type = array_search($type, $asn1->ANYmap, true);
+ if ($type !== false && isset($asn1->stringTypeSize[$type])) {
+ $v = $asn1->convert($v, $type);
if ($v !== false) {
$v = preg_replace('/\s+/', ' ', $v);
$attr['value'] = strtolower(trim($v));
@@ -1879,7 +2878,7 @@ class X509
}
}
}
- $result .= ASN1::encodeDER($rdn, Maps\RelativeDistinguishedName::MAP);
+ $result .= $asn1->encodeDER($rdn, $this->RelativeDistinguishedName);
}
return $result;
case self::DN_HASH:
@@ -1887,18 +2886,20 @@ class X509
$hash = new Hash('sha1');
$hash = $hash->hash($dn);
extract(unpack('Vhash', $hash));
- return strtolower(Hex::encode(pack('N', $hash)));
+ return strtolower(bin2hex(pack('N', $hash)));
}
// Default is to return a string.
$start = true;
$output = '';
- $result = [];
- $filters = [];
- $filters['rdnSequence']['value'] = ['type' => ASN1::TYPE_UTF8_STRING];
- ASN1::setFilters($filters);
- $this->mapOutDNs($dn, 'rdnSequence');
+ $result = array();
+ $asn1 = new ASN1();
+ $asn1->loadOIDs($this->oids);
+ $filters = array();
+ $filters['rdnSequence']['value'] = array('type' => ASN1::TYPE_UTF8_STRING);
+ $asn1->loadFilters($filters);
+ $this->_mapOutDNs($dn, 'rdnSequence', $asn1);
foreach ($dn['rdnSequence'] as $field) {
$prop = $field[0]['type'];
@@ -1945,9 +2946,9 @@ class X509
}
if (is_array($value)) {
foreach ($value as $type => $v) {
- $type = array_search($type, ASN1::ANY_MAP, true);
- if ($type !== false && array_key_exists($type, ASN1::STRING_TYPE_SIZE)) {
- $v = ASN1::convert($v, $type);
+ $type = array_search($type, $asn1->ANYmap, true);
+ if ($type !== false && isset($asn1->stringTypeSize[$type])) {
+ $v = $asn1->convert($v, $type);
if ($v !== false) {
$value = $v;
break;
@@ -1958,12 +2959,14 @@ class X509
$value = array_pop($value); // Always strip data type.
}
} elseif (is_object($value) && $value instanceof Element) {
- $callback = function($x) { return '\x' . bin2hex($x[0]); };
+ $callback = function ($x) {
+ return "\x" . bin2hex($x[0]);
+ };
$value = strtoupper(preg_replace_callback('#[^\x20-\x7E]#', $callback, $value->element));
}
$output.= $desc . '=' . $value;
$result[$desc] = isset($result[$desc]) ?
- array_merge((array) $result[$desc], [$value]) :
+ array_merge((array) $result[$desc], array($value)) :
$value;
$start = false;
}
@@ -1978,7 +2981,7 @@ class X509
* @access public
* @return mixed
*/
- public function getIssuerDN($format = self::DN_ARRAY)
+ function getIssuerDN($format = self::DN_ARRAY)
{
switch (true) {
case !isset($this->currentCert) || !is_array($this->currentCert):
@@ -2000,7 +3003,7 @@ class X509
* @access public
* @return mixed
*/
- public function getSubjectDN($format = self::DN_ARRAY)
+ function getSubjectDN($format = self::DN_ARRAY)
{
switch (true) {
case !empty($this->dn):
@@ -2024,7 +3027,7 @@ class X509
* @access public
* @return mixed
*/
- public function getIssuerDNProp($propName, $withType = false)
+ function getIssuerDNProp($propName, $withType = false)
{
switch (true) {
case !isset($this->currentCert) || !is_array($this->currentCert):
@@ -2046,7 +3049,7 @@ class X509
* @access public
* @return mixed
*/
- public function getSubjectDNProp($propName, $withType = false)
+ function getSubjectDNProp($propName, $withType = false)
{
switch (true) {
case !empty($this->dn):
@@ -2068,9 +3071,9 @@ class X509
* @access public
* @return mixed
*/
- public function getChain()
+ function getChain()
{
- $chain = [$this->currentCert];
+ $chain = array($this->currentCert);
if (!is_array($this->currentCert) || !isset($this->currentCert['tbsCertificate'])) {
return false;
@@ -2110,26 +3113,27 @@ class X509
/**
* Set public key
*
- * Key needs to be a \phpseclib3\Crypt\RSA object
+ * Key needs to be a \phpseclib\Crypt\RSA object
*
- * @param PublicKey $key
+ * @param object $key
* @access public
* @return bool
*/
- public function setPublicKey(PublicKey $key)
+ function setPublicKey($key)
{
+ $key->setPublicKey();
$this->publicKey = $key;
}
/**
* Set private key
*
- * Key needs to be a \phpseclib3\Crypt\RSA object
+ * Key needs to be a \phpseclib\Crypt\RSA object
*
- * @param PrivateKey $key
+ * @param object $key
* @access public
*/
- public function setPrivateKey(PrivateKey $key)
+ function setPrivateKey($key)
{
$this->privateKey = $key;
}
@@ -2142,7 +3146,7 @@ class X509
* @param string $challenge
* @access public
*/
- public function setChallenge($challenge)
+ function setChallenge($challenge)
{
$this->challenge = $challenge;
}
@@ -2150,25 +3154,20 @@ class X509
/**
* Gets the public key
*
- * Returns a \phpseclib3\Crypt\RSA object or a false.
+ * Returns a \phpseclib\Crypt\RSA object or a false.
*
* @access public
* @return mixed
*/
- public function getPublicKey()
+ function getPublicKey()
{
if (isset($this->publicKey)) {
return $this->publicKey;
}
if (isset($this->currentCert) && is_array($this->currentCert)) {
- $paths = [
- 'tbsCertificate/subjectPublicKeyInfo',
- 'certificationRequestInfo/subjectPKInfo',
- 'publicKeyAndChallenge/spki'
- ];
- foreach ($paths as $path) {
- $keyinfo = $this->subArray($this->currentCert, $path);
+ foreach (array('tbsCertificate/subjectPublicKeyInfo', 'certificationRequestInfo/subjectPKInfo') as $path) {
+ $keyinfo = $this->_subArray($this->currentCert, $path);
if (!empty($keyinfo)) {
break;
}
@@ -2182,27 +3181,26 @@ class X509
switch ($keyinfo['algorithm']['algorithm']) {
case 'rsaEncryption':
- return RSA::loadFormat('PKCS8', $key);
- case 'id-ecPublicKey':
- case 'id-Ed25519':
- case 'id-Ed448':
- return EC::loadFormat('PKCS8', $key);
- case 'id-dsa':
- return DSA::loadFormat('PKCS8', $key);
+ $publicKey = new RSA();
+ $publicKey->loadKey($key);
+ $publicKey->setPublicKey();
+ break;
+ default:
+ return false;
}
- return false;
+ return $publicKey;
}
/**
* Load a Certificate Signing Request
*
- * @param string $csr
+ * @param string|array $csr
* @param int $mode
- * @return mixed
* @access public
+ * @return mixed
*/
- public function loadCSR($csr, $mode = self::FORMAT_AUTO_DETECT)
+ function loadCSR($csr, $mode = self::FORMAT_AUTO_DETECT)
{
if (is_array($csr) && isset($csr['certificationRequestInfo'])) {
unset($this->currentCert);
@@ -2219,8 +3217,10 @@ class X509
// see http://tools.ietf.org/html/rfc2986
+ $asn1 = new ASN1();
+
if ($mode != self::FORMAT_DER) {
- $newcsr = ASN1::extractBER($csr);
+ $newcsr = $this->_extractBER($csr);
if ($mode == self::FORMAT_PEM && $csr == $newcsr) {
return false;
}
@@ -2233,39 +3233,44 @@ class X509
return false;
}
- $decoded = ASN1::decodeBER($csr);
+ $asn1->loadOIDs($this->oids);
+ $decoded = $asn1->decodeBER($csr);
if (empty($decoded)) {
$this->currentCert = false;
return false;
}
- $csr = ASN1::asn1map($decoded[0], Maps\CertificationRequest::MAP);
+ $csr = $asn1->asn1map($decoded[0], $this->CertificationRequest);
if (!isset($csr) || $csr === false) {
$this->currentCert = false;
return false;
}
- $this->mapInAttributes($csr, 'certificationRequestInfo/attributes');
- $this->mapInDNs($csr, 'certificationRequestInfo/subject/rdnSequence');
+ $this->_mapInAttributes($csr, 'certificationRequestInfo/attributes', $asn1);
+ $this->_mapInDNs($csr, 'certificationRequestInfo/subject/rdnSequence', $asn1);
$this->dn = $csr['certificationRequestInfo']['subject'];
$this->signatureSubject = substr($orig, $decoded[0]['content'][0]['start'], $decoded[0]['content'][0]['length']);
- $key = $csr['certificationRequestInfo']['subjectPKInfo'];
- $key = ASN1::encodeDER($key, Maps\SubjectPublicKeyInfo::MAP);
- $csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey'] =
- "-----BEGIN PUBLIC KEY-----\r\n" .
- chunk_split(base64_encode($key), 64) .
- "-----END PUBLIC KEY-----";
+ $algorithm = &$csr['certificationRequestInfo']['subjectPKInfo']['algorithm']['algorithm'];
+ $key = &$csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey'];
+ $key = $this->_reformatKey($algorithm, $key);
+
+ switch ($algorithm) {
+ case 'rsaEncryption':
+ $this->publicKey = new RSA();
+ $this->publicKey->loadKey($key);
+ $this->publicKey->setPublicKey();
+ break;
+ default:
+ $this->publicKey = null;
+ }
$this->currentKeyIdentifier = null;
$this->currentCert = $csr;
- $this->publicKey = null;
- $this->publicKey = $this->getPublicKey();
-
return $csr;
}
@@ -2277,38 +3282,47 @@ class X509
* @access public
* @return string
*/
- public function saveCSR($csr, $format = self::FORMAT_PEM)
+ function saveCSR($csr, $format = self::FORMAT_PEM)
{
if (!is_array($csr) || !isset($csr['certificationRequestInfo'])) {
return false;
}
switch (true) {
- case !($algorithm = $this->subArray($csr, 'certificationRequestInfo/subjectPKInfo/algorithm/algorithm')):
+ case !($algorithm = $this->_subArray($csr, 'certificationRequestInfo/subjectPKInfo/algorithm/algorithm')):
case is_object($csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey']):
break;
default:
- $csr['certificationRequestInfo']['subjectPKInfo'] = new Element(
- base64_decode(preg_replace('#-.+-|[\r\n]#', '', $csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey']))
- );
+ switch ($algorithm) {
+ case 'rsaEncryption':
+ $csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey']
+ = base64_encode("\0" . base64_decode(preg_replace('#-.+-|[\r\n]#', '', $csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey'])));
+ $csr['certificationRequestInfo']['subjectPKInfo']['algorithm']['parameters'] = null;
+ $csr['signatureAlgorithm']['parameters'] = null;
+ $csr['certificationRequestInfo']['signature']['parameters'] = null;
+ }
}
- $filters = [];
+ $asn1 = new ASN1();
+
+ $asn1->loadOIDs($this->oids);
+
+ $filters = array();
$filters['certificationRequestInfo']['subject']['rdnSequence']['value']
- = ['type' => ASN1::TYPE_UTF8_STRING];
+ = array('type' => ASN1::TYPE_UTF8_STRING);
- ASN1::setFilters($filters);
+ $asn1->loadFilters($filters);
- $this->mapOutDNs($csr, 'certificationRequestInfo/subject/rdnSequence');
- $this->mapOutAttributes($csr, 'certificationRequestInfo/attributes');
- $csr = ASN1::encodeDER($csr, Maps\CertificationRequest::MAP);
+ $this->_mapOutDNs($csr, 'certificationRequestInfo/subject/rdnSequence', $asn1);
+ $this->_mapOutAttributes($csr, 'certificationRequestInfo/attributes', $asn1);
+ $csr = $asn1->encodeDER($csr, $this->CertificationRequest);
switch ($format) {
case self::FORMAT_DER:
return $csr;
// case self::FORMAT_PEM:
default:
- return "-----BEGIN CERTIFICATE REQUEST-----\r\n" . chunk_split(Base64::encode($csr), 64) . '-----END CERTIFICATE REQUEST-----';
+ return "-----BEGIN CERTIFICATE REQUEST-----\r\n" . chunk_split(base64_encode($csr), 64) . '-----END CERTIFICATE REQUEST-----';
}
}
@@ -2319,11 +3333,11 @@ class X509
*
* https://developer.mozilla.org/en-US/docs/HTML/Element/keygen
*
- * @param string $spkac
+ * @param string|array $spkac
* @access public
* @return mixed
*/
- public function loadSPKAC($spkac)
+ function loadSPKAC($spkac)
{
if (is_array($spkac) && isset($spkac['publicKeyAndChallenge'])) {
unset($this->currentCert);
@@ -2335,9 +3349,11 @@ class X509
// see http://www.w3.org/html/wg/drafts/html/master/forms.html#signedpublickeyandchallenge
+ $asn1 = new ASN1();
+
// OpenSSL produces SPKAC's that are preceded by the string SPKAC=
$temp = preg_replace('#(?:SPKAC=)|[ \r\n\\\]#', '', $spkac);
- $temp = preg_match('#^[a-zA-Z\d/+]*={0,2}$#', $temp) ? Base64::decode($temp) : false;
+ $temp = preg_match('#^[a-zA-Z\d/+]*={0,2}$#', $temp) ? base64_decode($temp) : false;
if ($temp != false) {
$spkac = $temp;
}
@@ -2348,14 +3364,15 @@ class X509
return false;
}
- $decoded = ASN1::decodeBER($spkac);
+ $asn1->loadOIDs($this->oids);
+ $decoded = $asn1->decodeBER($spkac);
if (empty($decoded)) {
$this->currentCert = false;
return false;
}
- $spkac = ASN1::asn1map($decoded[0], Maps\SignedPublicKeyAndChallenge::MAP);
+ $spkac = $asn1->asn1map($decoded[0], $this->SignedPublicKeyAndChallenge);
if (!isset($spkac) || $spkac === false) {
$this->currentCert = false;
@@ -2364,48 +3381,57 @@ class X509
$this->signatureSubject = substr($orig, $decoded[0]['content'][0]['start'], $decoded[0]['content'][0]['length']);
- $key = $spkac['publicKeyAndChallenge']['spki'];
- $key = ASN1::encodeDER($key, Maps\SubjectPublicKeyInfo::MAP);
- $spkac['publicKeyAndChallenge']['spki']['subjectPublicKey'] =
- "-----BEGIN PUBLIC KEY-----\r\n" .
- chunk_split(base64_encode($key), 64) .
- "-----END PUBLIC KEY-----";
+ $algorithm = &$spkac['publicKeyAndChallenge']['spki']['algorithm']['algorithm'];
+ $key = &$spkac['publicKeyAndChallenge']['spki']['subjectPublicKey'];
+ $key = $this->_reformatKey($algorithm, $key);
+
+ switch ($algorithm) {
+ case 'rsaEncryption':
+ $this->publicKey = new RSA();
+ $this->publicKey->loadKey($key);
+ $this->publicKey->setPublicKey();
+ break;
+ default:
+ $this->publicKey = null;
+ }
$this->currentKeyIdentifier = null;
$this->currentCert = $spkac;
- $this->publicKey = null;
- $this->publicKey = $this->getPublicKey();
-
return $spkac;
}
/**
* Save a SPKAC CSR request
*
- * @param array $spkac
+ * @param string|array $spkac
* @param int $format optional
* @access public
* @return string
*/
- public function saveSPKAC($spkac, $format = self::FORMAT_PEM)
+ function saveSPKAC($spkac, $format = self::FORMAT_PEM)
{
if (!is_array($spkac) || !isset($spkac['publicKeyAndChallenge'])) {
return false;
}
- $algorithm = $this->subArray($spkac, 'publicKeyAndChallenge/spki/algorithm/algorithm');
+ $algorithm = $this->_subArray($spkac, 'publicKeyAndChallenge/spki/algorithm/algorithm');
switch (true) {
case !$algorithm:
case is_object($spkac['publicKeyAndChallenge']['spki']['subjectPublicKey']):
break;
default:
- $spkac['publicKeyAndChallenge']['spki'] = new Element(
- base64_decode(preg_replace('#-.+-|[\r\n]#', '', $spkac['publicKeyAndChallenge']['spki']['subjectPublicKey']))
- );
+ switch ($algorithm) {
+ case 'rsaEncryption':
+ $spkac['publicKeyAndChallenge']['spki']['subjectPublicKey']
+ = base64_encode("\0" . base64_decode(preg_replace('#-.+-|[\r\n]#', '', $spkac['publicKeyAndChallenge']['spki']['subjectPublicKey'])));
+ }
}
- $spkac = ASN1::encodeDER($spkac, Maps\SignedPublicKeyAndChallenge::MAP);
+ $asn1 = new ASN1();
+
+ $asn1->loadOIDs($this->oids);
+ $spkac = $asn1->encodeDER($spkac, $this->SignedPublicKeyAndChallenge);
switch ($format) {
case self::FORMAT_DER:
@@ -2414,7 +3440,7 @@ class X509
default:
// OpenSSL's implementation of SPKAC requires the SPKAC be preceded by SPKAC= and since there are pretty much
// no other SPKAC decoders phpseclib will use that same format
- return 'SPKAC=' . Base64::encode($spkac);
+ return 'SPKAC=' . base64_encode($spkac);
}
}
@@ -2423,10 +3449,10 @@ class X509
*
* @param string $crl
* @param int $mode
- * @return mixed
* @access public
+ * @return mixed
*/
- public function loadCRL($crl, $mode = self::FORMAT_AUTO_DETECT)
+ function loadCRL($crl, $mode = self::FORMAT_AUTO_DETECT)
{
if (is_array($crl) && isset($crl['tbsCertList'])) {
$this->currentCert = $crl;
@@ -2434,8 +3460,10 @@ class X509
return $crl;
}
+ $asn1 = new ASN1();
+
if ($mode != self::FORMAT_DER) {
- $newcrl = ASN1::extractBER($crl);
+ $newcrl = $this->_extractBER($crl);
if ($mode == self::FORMAT_PEM && $crl == $newcrl) {
return false;
}
@@ -2448,14 +3476,15 @@ class X509
return false;
}
- $decoded = ASN1::decodeBER($crl);
+ $asn1->loadOIDs($this->oids);
+ $decoded = $asn1->decodeBER($crl);
if (empty($decoded)) {
$this->currentCert = false;
return false;
}
- $crl = ASN1::asn1map($decoded[0], Maps\CertificateList::MAP);
+ $crl = $asn1->asn1map($decoded[0], $this->CertificateList);
if (!isset($crl) || $crl === false) {
$this->currentCert = false;
return false;
@@ -2463,17 +3492,17 @@ class X509
$this->signatureSubject = substr($orig, $decoded[0]['content'][0]['start'], $decoded[0]['content'][0]['length']);
- $this->mapInDNs($crl, 'tbsCertList/issuer/rdnSequence');
- if ($this->isSubArrayValid($crl, 'tbsCertList/crlExtensions')) {
- $this->mapInExtensions($crl, 'tbsCertList/crlExtensions');
+ $this->_mapInDNs($crl, 'tbsCertList/issuer/rdnSequence', $asn1);
+ if ($this->_isSubArrayValid($crl, 'tbsCertList/crlExtensions')) {
+ $this->_mapInExtensions($crl, 'tbsCertList/crlExtensions', $asn1);
}
- if ($this->isSubArrayValid($crl, 'tbsCertList/revokedCertificates')) {
- $rclist_ref = &$this->subArrayUnchecked($crl, 'tbsCertList/revokedCertificates');
+ if ($this->_isSubArrayValid($crl, 'tbsCertList/revokedCertificates')) {
+ $rclist_ref = &$this->_subArrayUnchecked($crl, 'tbsCertList/revokedCertificates');
if ($rclist_ref) {
$rclist = $crl['tbsCertList']['revokedCertificates'];
foreach ($rclist as $i => $extension) {
- if ($this->isSubArrayValid($rclist, "$i/crlEntryExtensions")) {
- $this->mapInExtensions($rclist_ref, "$i/crlEntryExtensions");
+ if ($this->_isSubArrayValid($rclist, "$i/crlEntryExtensions", $asn1)) {
+ $this->_mapInExtensions($rclist_ref, "$i/crlEntryExtensions", $asn1);
}
}
}
@@ -2493,49 +3522,53 @@ class X509
* @access public
* @return string
*/
- public function saveCRL($crl, $format = self::FORMAT_PEM)
+ function saveCRL($crl, $format = self::FORMAT_PEM)
{
if (!is_array($crl) || !isset($crl['tbsCertList'])) {
return false;
}
- $filters = [];
+ $asn1 = new ASN1();
+
+ $asn1->loadOIDs($this->oids);
+
+ $filters = array();
$filters['tbsCertList']['issuer']['rdnSequence']['value']
- = ['type' => ASN1::TYPE_UTF8_STRING];
+ = array('type' => ASN1::TYPE_UTF8_STRING);
$filters['tbsCertList']['signature']['parameters']
- = ['type' => ASN1::TYPE_UTF8_STRING];
+ = array('type' => ASN1::TYPE_UTF8_STRING);
$filters['signatureAlgorithm']['parameters']
- = ['type' => ASN1::TYPE_UTF8_STRING];
+ = array('type' => ASN1::TYPE_UTF8_STRING);
if (empty($crl['tbsCertList']['signature']['parameters'])) {
$filters['tbsCertList']['signature']['parameters']
- = ['type' => ASN1::TYPE_NULL];
+ = array('type' => ASN1::TYPE_NULL);
}
if (empty($crl['signatureAlgorithm']['parameters'])) {
$filters['signatureAlgorithm']['parameters']
- = ['type' => ASN1::TYPE_NULL];
+ = array('type' => ASN1::TYPE_NULL);
}
- ASN1::setFilters($filters);
+ $asn1->loadFilters($filters);
- $this->mapOutDNs($crl, 'tbsCertList/issuer/rdnSequence');
- $this->mapOutExtensions($crl, 'tbsCertList/crlExtensions');
- $rclist = &$this->subArray($crl, 'tbsCertList/revokedCertificates');
+ $this->_mapOutDNs($crl, 'tbsCertList/issuer/rdnSequence', $asn1);
+ $this->_mapOutExtensions($crl, 'tbsCertList/crlExtensions', $asn1);
+ $rclist = &$this->_subArray($crl, 'tbsCertList/revokedCertificates');
if (is_array($rclist)) {
foreach ($rclist as $i => $extension) {
- $this->mapOutExtensions($rclist, "$i/crlEntryExtensions");
+ $this->_mapOutExtensions($rclist, "$i/crlEntryExtensions", $asn1);
}
}
- $crl = ASN1::encodeDER($crl, Maps\CertificateList::MAP);
+ $crl = $asn1->encodeDER($crl, $this->CertificateList);
switch ($format) {
case self::FORMAT_DER:
return $crl;
// case self::FORMAT_PEM:
default:
- return "-----BEGIN X509 CRL-----\r\n" . chunk_split(Base64::encode($crl), 64) . '-----END X509 CRL-----';
+ return "-----BEGIN X509 CRL-----\r\n" . chunk_split(base64_encode($crl), 64) . '-----END X509 CRL-----';
}
}
@@ -2549,19 +3582,19 @@ class X509
*
* @param string $date in format date('D, d M Y H:i:s O')
* @access private
- * @return array|Element
+ * @return array
*/
- private function timeField($date)
+ function _timeField($date)
{
if ($date instanceof Element) {
return $date;
}
- $dateObj = new DateTimeImmutable($date, new DateTimeZone('GMT'));
+ $dateObj = new DateTime($date, new DateTimeZone('GMT'));
$year = $dateObj->format('Y'); // the same way ASN1.php parses this
if ($year < 2050) {
- return ['utcTime' => $date];
+ return array('utcTime' => $date);
} else {
- return ['generalTime' => $date];
+ return array('generalTime' => $date);
}
}
@@ -2572,45 +3605,35 @@ class X509
* $subject can be either an existing X.509 cert (if you want to resign it),
* a CSR or something with the DN and public key explicitly set.
*
- * @param \phpseclib3\File\X509 $issuer
- * @param \phpseclib3\File\X509 $subject
+ * @param \phpseclib\File\X509 $issuer
+ * @param \phpseclib\File\X509 $subject
+ * @param string $signatureAlgorithm optional
* @access public
* @return mixed
*/
- public function sign($issuer, $subject)
+ function sign($issuer, $subject, $signatureAlgorithm = 'sha1WithRSAEncryption')
{
if (!is_object($issuer->privateKey) || empty($issuer->dn)) {
return false;
}
- if (isset($subject->publicKey) && !($subjectPublicKey = $subject->formatSubjectPublicKey())) {
+ if (isset($subject->publicKey) && !($subjectPublicKey = $subject->_formatSubjectPublicKey())) {
return false;
}
$currentCert = isset($this->currentCert) ? $this->currentCert : null;
- $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject : null;
- $signatureAlgorithm = self::identifySignatureAlgorithm($issuer->privateKey);
- if ($signatureAlgorithm != 'id-RSASSA-PSS') {
- $signatureAlgorithm = ['algorithm' => $signatureAlgorithm];
- } else {
- $r = PSS::load($issuer->privateKey->toString('PSS'));
- $signatureAlgorithm = [
- 'algorithm' => 'id-RSASSA-PSS',
- 'parameters' => PSS::savePSSParams($r)
- ];
- }
+ $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject: null;
if (isset($subject->currentCert) && is_array($subject->currentCert) && isset($subject->currentCert['tbsCertificate'])) {
$this->currentCert = $subject->currentCert;
- $this->currentCert['tbsCertificate']['signature'] = $signatureAlgorithm;
- $this->currentCert['signatureAlgorithm'] = $signatureAlgorithm;
-
+ $this->currentCert['tbsCertificate']['signature']['algorithm'] = $signatureAlgorithm;
+ $this->currentCert['signatureAlgorithm']['algorithm'] = $signatureAlgorithm;
if (!empty($this->startDate)) {
- $this->currentCert['tbsCertificate']['validity']['notBefore'] = $this->timeField($this->startDate);
+ $this->currentCert['tbsCertificate']['validity']['notBefore'] = $this->_timeField($this->startDate);
}
if (!empty($this->endDate)) {
- $this->currentCert['tbsCertificate']['validity']['notAfter'] = $this->timeField($this->endDate);
+ $this->currentCert['tbsCertificate']['validity']['notAfter'] = $this->_timeField($this->endDate);
}
if (!empty($this->serialNumber)) {
$this->currentCert['tbsCertificate']['serialNumber'] = $this->serialNumber;
@@ -2632,10 +3655,10 @@ class X509
return false;
}
- $startDate = new DateTimeImmutable('now', new DateTimeZone(@date_default_timezone_get()));
+ $startDate = new DateTime('now', new DateTimeZone(@date_default_timezone_get()));
$startDate = !empty($this->startDate) ? $this->startDate : $startDate->format('D, d M Y H:i:s O');
- $endDate = new DateTimeImmutable('+1 year', new DateTimeZone(@date_default_timezone_get()));
+ $endDate = new DateTime('+1 year', new DateTimeZone(@date_default_timezone_get()));
$endDate = !empty($this->endDate) ? $this->endDate : $endDate->format('D, d M Y H:i:s O');
/* "The serial number MUST be a positive integer"
@@ -2649,23 +3672,23 @@ class X509
$this->serialNumber :
new BigInteger(Random::string(20) & ("\x7F" . str_repeat("\xFF", 19)), 256);
- $this->currentCert = [
+ $this->currentCert = array(
'tbsCertificate' =>
- [
+ array(
'version' => 'v3',
'serialNumber' => $serialNumber, // $this->setSerialNumber()
- 'signature' => $signatureAlgorithm,
+ 'signature' => array('algorithm' => $signatureAlgorithm),
'issuer' => false, // this is going to be overwritten later
- 'validity' => [
- 'notBefore' => $this->timeField($startDate), // $this->setStartDate()
- 'notAfter' => $this->timeField($endDate) // $this->setEndDate()
- ],
+ 'validity' => array(
+ 'notBefore' => $this->_timeField($startDate), // $this->setStartDate()
+ 'notAfter' => $this->_timeField($endDate) // $this->setEndDate()
+ ),
'subject' => $subject->dn,
'subjectPublicKeyInfo' => $subjectPublicKey
- ],
- 'signatureAlgorithm' => $signatureAlgorithm,
+ ),
+ 'signatureAlgorithm' => array('algorithm' => $signatureAlgorithm),
'signature' => false // this is going to be overwritten later
- ];
+ );
// Copy extensions from CSR.
$csrexts = $subject->getAttribute('pkcs-9-at-extensionRequest', 0);
@@ -2678,14 +3701,14 @@ class X509
$this->currentCert['tbsCertificate']['issuer'] = $issuer->dn;
if (isset($issuer->currentKeyIdentifier)) {
- $this->setExtension('id-ce-authorityKeyIdentifier', [
+ $this->setExtension('id-ce-authorityKeyIdentifier', array(
//'authorityCertIssuer' => array(
// array(
// 'directoryName' => $issuer->dn
// )
//),
'keyIdentifier' => $issuer->currentKeyIdentifier
- ]);
+ ));
//$extensions = &$this->currentCert['tbsCertificate']['extensions'];
//if (isset($issuer->serialNumber)) {
// $extensions[count($extensions) - 1]['authorityCertSerialNumber'] = $issuer->serialNumber;
@@ -2697,18 +3720,18 @@ class X509
$this->setExtension('id-ce-subjectKeyIdentifier', $subject->currentKeyIdentifier);
}
- $altName = [];
+ $altName = array();
if (isset($subject->domains) && count($subject->domains)) {
- $altName = array_map(['\phpseclib3\File\X509', 'dnsName'], $subject->domains);
+ $altName = array_map(array('\phpseclib\File\X509', '_dnsName'), $subject->domains);
}
if (isset($subject->ipAddresses) && count($subject->ipAddresses)) {
// should an IP address appear as the CN if no domain name is specified? idk
//$ips = count($subject->domains) ? $subject->ipAddresses : array_slice($subject->ipAddresses, 1);
- $ipAddresses = [];
+ $ipAddresses = array();
foreach ($subject->ipAddresses as $ipAddress) {
- $encoded = $subject->ipAddress($ipAddress);
+ $encoded = $subject->_ipAddress($ipAddress);
if ($encoded !== false) {
$ipAddresses[] = $encoded;
}
@@ -2725,37 +3748,36 @@ class X509
if ($this->caFlag) {
$keyUsage = $this->getExtension('id-ce-keyUsage');
if (!$keyUsage) {
- $keyUsage = [];
+ $keyUsage = array();
}
$this->setExtension(
'id-ce-keyUsage',
- array_values(array_unique(array_merge($keyUsage, ['cRLSign', 'keyCertSign'])))
+ array_values(array_unique(array_merge($keyUsage, array('cRLSign', 'keyCertSign'))))
);
$basicConstraints = $this->getExtension('id-ce-basicConstraints');
if (!$basicConstraints) {
- $basicConstraints = [];
+ $basicConstraints = array();
}
$this->setExtension(
'id-ce-basicConstraints',
- array_unique(array_merge(['cA' => true], $basicConstraints)),
+ array_unique(array_merge(array('cA' => true), $basicConstraints)),
true
);
if (!isset($subject->currentKeyIdentifier)) {
- $this->setExtension('id-ce-subjectKeyIdentifier', $this->computeKeyIdentifier($this->currentCert), false, false);
+ $this->setExtension('id-ce-subjectKeyIdentifier', base64_encode($this->computeKeyIdentifier($this->currentCert)), false, false);
}
}
// resync $this->signatureSubject
- // save $tbsCertificate in case there are any \phpseclib3\File\ASN1\Element objects in it
+ // save $tbsCertificate in case there are any \phpseclib\File\ASN1\Element objects in it
$tbsCertificate = $this->currentCert['tbsCertificate'];
$this->loadX509($this->saveX509($this->currentCert));
- $result = $this->currentCert;
- $this->currentCert['signature'] = $result['signature'] = "\0" . $issuer->privateKey->sign($this->signatureSubject);
+ $result = $this->_sign($issuer->privateKey, $signatureAlgorithm);
$result['tbsCertificate'] = $tbsCertificate;
$this->currentCert = $currentCert;
@@ -2770,20 +3792,24 @@ class X509
* @access public
* @return mixed
*/
- public function signCSR()
+ function signCSR($signatureAlgorithm = 'sha1WithRSAEncryption')
{
if (!is_object($this->privateKey) || empty($this->dn)) {
return false;
}
$origPublicKey = $this->publicKey;
- $this->publicKey = $this->privateKey->getPublicKey();
- $publicKey = $this->formatSubjectPublicKey();
+ $class = get_class($this->privateKey);
+ $this->publicKey = new $class();
+ $this->publicKey->loadKey($this->privateKey->getPublicKey());
+ $this->publicKey->setPublicKey();
+ if (!($publicKey = $this->_formatSubjectPublicKey())) {
+ return false;
+ }
$this->publicKey = $origPublicKey;
$currentCert = isset($this->currentCert) ? $this->currentCert : null;
- $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject : null;
- $signatureAlgorithm = self::identifySignatureAlgorithm($this->privateKey);
+ $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject: null;
if (isset($this->currentCert) && is_array($this->currentCert) && isset($this->currentCert['certificationRequestInfo'])) {
$this->currentCert['signatureAlgorithm']['algorithm'] = $signatureAlgorithm;
@@ -2792,25 +3818,24 @@ class X509
}
$this->currentCert['certificationRequestInfo']['subjectPKInfo'] = $publicKey;
} else {
- $this->currentCert = [
+ $this->currentCert = array(
'certificationRequestInfo' =>
- [
+ array(
'version' => 'v1',
'subject' => $this->dn,
'subjectPKInfo' => $publicKey
- ],
- 'signatureAlgorithm' => ['algorithm' => $signatureAlgorithm],
+ ),
+ 'signatureAlgorithm' => array('algorithm' => $signatureAlgorithm),
'signature' => false // this is going to be overwritten later
- ];
+ );
}
// resync $this->signatureSubject
- // save $certificationRequestInfo in case there are any \phpseclib3\File\ASN1\Element objects in it
+ // save $certificationRequestInfo in case there are any \phpseclib\File\ASN1\Element objects in it
$certificationRequestInfo = $this->currentCert['certificationRequestInfo'];
$this->loadCSR($this->saveCSR($this->currentCert));
- $result = $this->currentCert;
- $this->currentCert['signature'] = $result['signature'] = "\0" . $this->privateKey->sign($this->signatureSubject);
+ $result = $this->_sign($this->privateKey, $signatureAlgorithm);
$result['certificationRequestInfo'] = $certificationRequestInfo;
$this->currentCert = $currentCert;
@@ -2825,20 +3850,25 @@ class X509
* @access public
* @return mixed
*/
- public function signSPKAC()
+ function signSPKAC($signatureAlgorithm = 'sha1WithRSAEncryption')
{
if (!is_object($this->privateKey)) {
return false;
}
$origPublicKey = $this->publicKey;
- $this->publicKey = $this->privateKey->getPublicKey();
- $publicKey = $this->formatSubjectPublicKey();
+ $class = get_class($this->privateKey);
+ $this->publicKey = new $class();
+ $this->publicKey->loadKey($this->privateKey->getPublicKey());
+ $this->publicKey->setPublicKey();
+ $publicKey = $this->_formatSubjectPublicKey();
+ if (!$publicKey) {
+ return false;
+ }
$this->publicKey = $origPublicKey;
$currentCert = isset($this->currentCert) ? $this->currentCert : null;
- $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject : null;
- $signatureAlgorithm = self::identifySignatureAlgorithm($this->privateKey);
+ $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject: null;
// re-signing a SPKAC seems silly but since everything else supports re-signing why not?
if (isset($this->currentCert) && is_array($this->currentCert) && isset($this->currentCert['publicKeyAndChallenge'])) {
@@ -2849,9 +3879,9 @@ class X509
$this->currentCert['publicKeyAndChallenge']['challenge'] = $this->challenge & str_repeat("\x7F", strlen($this->challenge));
}
} else {
- $this->currentCert = [
+ $this->currentCert = array(
'publicKeyAndChallenge' =>
- [
+ array(
'spki' => $publicKey,
// quoting <https://developer.mozilla.org/en-US/docs/Web/HTML/Element/keygen>,
// "A challenge string that is submitted along with the public key. Defaults to an empty string if not specified."
@@ -2859,19 +3889,18 @@ class X509
// we could alternatively do this instead if we ignored the specs:
// Random::string(8) & str_repeat("\x7F", 8)
'challenge' => !empty($this->challenge) ? $this->challenge : ''
- ],
- 'signatureAlgorithm' => ['algorithm' => $signatureAlgorithm],
+ ),
+ 'signatureAlgorithm' => array('algorithm' => $signatureAlgorithm),
'signature' => false // this is going to be overwritten later
- ];
+ );
}
// resync $this->signatureSubject
- // save $publicKeyAndChallenge in case there are any \phpseclib3\File\ASN1\Element objects in it
+ // save $publicKeyAndChallenge in case there are any \phpseclib\File\ASN1\Element objects in it
$publicKeyAndChallenge = $this->currentCert['publicKeyAndChallenge'];
$this->loadSPKAC($this->saveSPKAC($this->currentCert));
- $result = $this->currentCert;
- $this->currentCert['signature'] = $result['signature'] = "\0" . $this->privateKey->sign($this->signatureSubject);
+ $result = $this->_sign($this->privateKey, $signatureAlgorithm);
$result['publicKeyAndChallenge'] = $publicKeyAndChallenge;
$this->currentCert = $currentCert;
@@ -2885,12 +3914,13 @@ class X509
*
* $issuer's private key needs to be loaded.
*
- * @param \phpseclib3\File\X509 $issuer
- * @param \phpseclib3\File\X509 $crl
+ * @param \phpseclib\File\X509 $issuer
+ * @param \phpseclib\File\X509 $crl
+ * @param string $signatureAlgorithm optional
* @access public
* @return mixed
*/
- public function signCRL($issuer, $crl)
+ function signCRL($issuer, $crl, $signatureAlgorithm = 'sha1WithRSAEncryption')
{
if (!is_object($issuer->privateKey) || empty($issuer->dn)) {
return false;
@@ -2898,9 +3928,8 @@ class X509
$currentCert = isset($this->currentCert) ? $this->currentCert : null;
$signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject : null;
- $signatureAlgorithm = self::identifySignatureAlgorithm($issuer->privateKey);
- $thisUpdate = new DateTimeImmutable('now', new DateTimeZone(@date_default_timezone_get()));
+ $thisUpdate = new DateTime('now', new DateTimeZone(@date_default_timezone_get()));
$thisUpdate = !empty($this->startDate) ? $this->startDate : $thisUpdate->format('D, d M Y H:i:s O');
if (isset($crl->currentCert) && is_array($crl->currentCert) && isset($crl->currentCert['tbsCertList'])) {
@@ -2908,25 +3937,25 @@ class X509
$this->currentCert['tbsCertList']['signature']['algorithm'] = $signatureAlgorithm;
$this->currentCert['signatureAlgorithm']['algorithm'] = $signatureAlgorithm;
} else {
- $this->currentCert = [
+ $this->currentCert = array(
'tbsCertList' =>
- [
+ array(
'version' => 'v2',
- 'signature' => ['algorithm' => $signatureAlgorithm],
+ 'signature' => array('algorithm' => $signatureAlgorithm),
'issuer' => false, // this is going to be overwritten later
- 'thisUpdate' => $this->timeField($thisUpdate) // $this->setStartDate()
- ],
- 'signatureAlgorithm' => ['algorithm' => $signatureAlgorithm],
+ 'thisUpdate' => $this->_timeField($thisUpdate) // $this->setStartDate()
+ ),
+ 'signatureAlgorithm' => array('algorithm' => $signatureAlgorithm),
'signature' => false // this is going to be overwritten later
- ];
+ );
}
$tbsCertList = &$this->currentCert['tbsCertList'];
$tbsCertList['issuer'] = $issuer->dn;
- $tbsCertList['thisUpdate'] = $this->timeField($thisUpdate);
+ $tbsCertList['thisUpdate'] = $this->_timeField($thisUpdate);
if (!empty($this->endDate)) {
- $tbsCertList['nextUpdate'] = $this->timeField($this->endDate); // $this->setEndDate()
+ $tbsCertList['nextUpdate'] = $this->_timeField($this->endDate); // $this->setEndDate()
} else {
unset($tbsCertList['nextUpdate']);
}
@@ -2971,14 +4000,14 @@ class X509
}
if (isset($issuer->currentKeyIdentifier)) {
- $this->setExtension('id-ce-authorityKeyIdentifier', [
+ $this->setExtension('id-ce-authorityKeyIdentifier', array(
//'authorityCertIssuer' => array(
- // ]
+ // array(
// 'directoryName' => $issuer->dn
- // ]
+ // )
//),
'keyIdentifier' => $issuer->currentKeyIdentifier
- ]);
+ ));
//$extensions = &$tbsCertList['crlExtensions'];
//if (isset($issuer->serialNumber)) {
// $extensions[count($extensions) - 1]['authorityCertSerialNumber'] = $issuer->serialNumber;
@@ -3000,12 +4029,11 @@ class X509
unset($tbsCertList);
// resync $this->signatureSubject
- // save $tbsCertList in case there are any \phpseclib3\File\ASN1\Element objects in it
+ // save $tbsCertList in case there are any \phpseclib\File\ASN1\Element objects in it
$tbsCertList = $this->currentCert['tbsCertList'];
$this->loadCRL($this->saveCRL($this->currentCert));
- $result = $this->currentCert;
- $this->currentCert['signature'] = $result['signature'] = "\0" . $issuer->privateKey->sign($this->signatureSubject);
+ $result = $this->_sign($issuer->privateKey, $signatureAlgorithm);
$result['tbsCertList'] = $tbsCertList;
$this->currentCert = $currentCert;
@@ -3015,72 +4043,45 @@ class X509
}
/**
- * Identify signature algorithm from key settings
+ * X.509 certificate signing helper function.
*
- * @param PrivateKey $key
- * @access private
- * @throws \phpseclib3\Exception\UnsupportedAlgorithmException if the algorithm is unsupported
- * @return string
+ * @param \phpseclib\File\X509 $key
+ * @param string $signatureAlgorithm
+ * @access public
+ * @return mixed
*/
- private static function identifySignatureAlgorithm(PrivateKey $key)
+ function _sign($key, $signatureAlgorithm)
{
if ($key instanceof RSA) {
- if ($key->getPadding() & RSA::SIGNATURE_PSS) {
- return 'id-RSASSA-PSS';
+ switch ($signatureAlgorithm) {
+ case 'md2WithRSAEncryption':
+ case 'md5WithRSAEncryption':
+ case 'sha1WithRSAEncryption':
+ case 'sha224WithRSAEncryption':
+ case 'sha256WithRSAEncryption':
+ case 'sha384WithRSAEncryption':
+ case 'sha512WithRSAEncryption':
+ $key->setHash(preg_replace('#WithRSAEncryption$#', '', $signatureAlgorithm));
+ $key->setSignatureMode(RSA::SIGNATURE_PKCS1);
+
+ $this->currentCert['signature'] = base64_encode("\0" . $key->sign($this->signatureSubject));
+ return $this->currentCert;
}
- switch ($key->getHash()) {
- case 'md2':
- case 'md5':
- case 'sha1':
- case 'sha224':
- case 'sha256':
- case 'sha384':
- case 'sha512':
- return $key->getHash() . 'WithRSAEncryption';
- }
- throw new UnsupportedAlgorithmException('The only supported hash algorithms for RSA are: md2, md5, sha1, sha224, sha256, sha384, sha512');
- }
-
- if ($key instanceof DSA) {
- switch ($key->getHash()) {
- case 'sha1':
- case 'sha224':
- case 'sha256':
- return 'id-dsa-with-' . $key->getHash();
- }
- throw new UnsupportedAlgorithmException('The only supported hash algorithms for DSA are: sha1, sha224, sha256');
- }
-
- if ($key instanceof EC) {
- switch ($key->getCurve()) {
- case 'Ed25519':
- case 'Ed448':
- return 'id-' . $key->getCurve();
- }
- switch ($key->getHash()) {
- case 'sha1':
- case 'sha224':
- case 'sha256':
- case 'sha384':
- case 'sha512':
- return 'ecdsa-with-' . strtoupper($key->getHash());
- }
- throw new UnsupportedAlgorithmException('The only supported hash algorithms for EC are: sha1, sha224, sha256, sha384, sha512');
}
- throw new UnsupportedAlgorithmException('The only supported public key classes are: RSA, DSA, EC');
+ return false;
}
/**
* Set certificate start date
*
- * @param DateTimeInterface|string $date
+ * @param string $date
* @access public
*/
- public function setStartDate($date)
+ function setStartDate($date)
{
- if (!is_object($date) || !($date instanceof DateTimeInterface)) {
- $date = new DateTimeImmutable($date, new DateTimeZone(@date_default_timezone_get()));
+ if (!is_object($date) || !is_a($date, 'DateTime')) {
+ $date = new DateTime($date, new DateTimeZone(@date_default_timezone_get()));
}
$this->startDate = $date->format('D, d M Y H:i:s O');
@@ -3089,10 +4090,10 @@ class X509
/**
* Set certificate end date
*
- * @param DateTimeInterface|string $date
+ * @param string $date
* @access public
*/
- public function setEndDate($date)
+ function setEndDate($date)
{
/*
To indicate that a certificate has no well-defined expiration date,
@@ -3101,13 +4102,14 @@ class X509
-- http://tools.ietf.org/html/rfc5280#section-4.1.2.5
*/
- if (is_string($date) && strtolower($date) === 'lifetime') {
+ if (strtolower($date) == 'lifetime') {
$temp = '99991231235959Z';
- $temp = chr(ASN1::TYPE_GENERALIZED_TIME) . ASN1::encodeLength(strlen($temp)) . $temp;
+ $asn1 = new ASN1();
+ $temp = chr(ASN1::TYPE_GENERALIZED_TIME) . $asn1->_encodeLength(strlen($temp)) . $temp;
$this->endDate = new Element($temp);
} else {
- if (!is_object($date) || !($date instanceof DateTimeInterface)) {
- $date = new DateTimeImmutable($date, new DateTimeZone(@date_default_timezone_get()));
+ if (!is_object($date) || !is_a($date, 'DateTime')) {
+ $date = new DateTime($date, new DateTimeZone(@date_default_timezone_get()));
}
$this->endDate = $date->format('D, d M Y H:i:s O');
@@ -3121,7 +4123,7 @@ class X509
* @param int $base optional
* @access public
*/
- public function setSerialNumber($serial, $base = -256)
+ function setSerialNumber($serial, $base = -256)
{
$this->serialNumber = new BigInteger($serial, $base);
}
@@ -3131,7 +4133,7 @@ class X509
*
* @access public
*/
- public function makeCA()
+ function makeCA()
{
$this->caFlag = true;
}
@@ -3148,7 +4150,7 @@ class X509
* @return boolean
* @access private
*/
- private function isSubArrayValid($root, $path)
+ function _isSubArrayValid($root, $path)
{
if (!is_array($root)) {
return false;
@@ -3185,7 +4187,7 @@ class X509
* @access private
* @return array|false
*/
- private function &subArrayUnchecked(&$root, $path, $create = false)
+ function &_subArrayUnchecked(&$root, $path, $create = false)
{
$false = false;
@@ -3195,7 +4197,7 @@ class X509
return $false;
}
- $root[$i] = [];
+ $root[$i] = array();
}
$root = &$root[$i];
@@ -3213,7 +4215,7 @@ class X509
* @access private
* @return array|false
*/
- private function &subArray(&$root, $path, $create = false)
+ function &_subArray(&$root, $path, $create = false)
{
$false = false;
@@ -3231,7 +4233,7 @@ class X509
return $false;
}
- $root[$i] = [];
+ $root[$i] = array();
}
$root = &$root[$i];
@@ -3249,7 +4251,7 @@ class X509
* @access private
* @return array|false
*/
- private function &extensions(&$root, $path = null, $create = false)
+ function &_extensions(&$root, $path = null, $create = false)
{
if (!isset($root)) {
$root = $this->currentCert;
@@ -3267,7 +4269,7 @@ class X509
break;
case isset($root['certificationRequestInfo']):
$pth = 'certificationRequestInfo/attributes';
- $attributes = &$this->subArray($root, $pth, $create);
+ $attributes = &$this->_subArray($root, $pth, $create);
if (is_array($attributes)) {
foreach ($attributes as $key => $value) {
@@ -3278,14 +4280,14 @@ class X509
}
if ($create) {
$key = count($attributes);
- $attributes[] = ['type' => 'pkcs-9-at-extensionRequest', 'value' => []];
+ $attributes[] = array('type' => 'pkcs-9-at-extensionRequest', 'value' => array());
$path = "$pth/$key/value/0";
}
}
break;
}
- $extensions = &$this->subArray($root, $path, $create);
+ $extensions = &$this->_subArray($root, $path, $create);
if (!is_array($extensions)) {
$false = false;
@@ -3303,9 +4305,9 @@ class X509
* @access private
* @return bool
*/
- private function removeExtensionHelper($id, $path = null)
+ function _removeExtension($id, $path = null)
{
- $extensions = &$this->extensions($this->currentCert, $path);
+ $extensions = &$this->_extensions($this->currentCert, $path);
if (!is_array($extensions)) {
return false;
@@ -3338,9 +4340,9 @@ class X509
* @access private
* @return mixed
*/
- private function getExtensionHelper($id, $cert = null, $path = null)
+ function _getExtension($id, $cert = null, $path = null)
{
- $extensions = $this->extensions($cert, $path);
+ $extensions = $this->_extensions($cert, $path);
if (!is_array($extensions)) {
return false;
@@ -3363,10 +4365,10 @@ class X509
* @access private
* @return array
*/
- private function getExtensionsHelper($cert = null, $path = null)
+ function _getExtensions($cert = null, $path = null)
{
- $exts = $this->extensions($cert, $path);
- $extensions = [];
+ $exts = $this->_extensions($cert, $path);
+ $extensions = array();
if (is_array($exts)) {
foreach ($exts as $extension) {
@@ -3388,15 +4390,15 @@ class X509
* @access private
* @return bool
*/
- private function setExtensionHelper($id, $value, $critical = false, $replace = true, $path = null)
+ function _setExtension($id, $value, $critical = false, $replace = true, $path = null)
{
- $extensions = &$this->extensions($this->currentCert, $path, true);
+ $extensions = &$this->_extensions($this->currentCert, $path, true);
if (!is_array($extensions)) {
return false;
}
- $newext = ['extnId' => $id, 'critical' => $critical, 'extnValue' => $value];
+ $newext = array('extnId' => $id, 'critical' => $critical, 'extnValue' => $value);
foreach ($extensions as $key => $value) {
if ($value['extnId'] == $id) {
@@ -3420,9 +4422,9 @@ class X509
* @access public
* @return bool
*/
- public function removeExtension($id)
+ function removeExtension($id)
{
- return $this->removeExtensionHelper($id);
+ return $this->_removeExtension($id);
}
/**
@@ -3432,26 +4434,24 @@ class X509
*
* @param string $id
* @param array $cert optional
- * @param string $path
* @access public
* @return mixed
*/
- public function getExtension($id, $cert = null, $path=null)
+ function getExtension($id, $cert = null)
{
- return $this->getExtensionHelper($id, $cert, $path);
+ return $this->_getExtension($id, $cert);
}
/**
* Returns a list of all extensions in use in certificate, CSR or CRL
*
* @param array $cert optional
- * @param string $path optional
* @access public
* @return array
*/
- public function getExtensions($cert = null, $path = null)
+ function getExtensions($cert = null)
{
- return $this->getExtensionsHelper($cert, $path);
+ return $this->_getExtensions($cert);
}
/**
@@ -3464,9 +4464,9 @@ class X509
* @access public
* @return bool
*/
- public function setExtension($id, $value, $critical = false, $replace = true)
+ function setExtension($id, $value, $critical = false, $replace = true)
{
- return $this->setExtensionHelper($id, $value, $critical, $replace);
+ return $this->_setExtension($id, $value, $critical, $replace);
}
/**
@@ -3477,9 +4477,9 @@ class X509
* @access public
* @return bool
*/
- public function removeAttribute($id, $disposition = self::ATTR_ALL)
+ function removeAttribute($id, $disposition = self::ATTR_ALL)
{
- $attributes = &$this->subArray($this->currentCert, 'certificationRequestInfo/attributes');
+ $attributes = &$this->_subArray($this->currentCert, 'certificationRequestInfo/attributes');
if (!is_array($attributes)) {
return false;
@@ -3528,13 +4528,13 @@ class X509
* @access public
* @return mixed
*/
- public function getAttribute($id, $disposition = self::ATTR_ALL, $csr = null)
+ function getAttribute($id, $disposition = self::ATTR_ALL, $csr = null)
{
if (empty($csr)) {
$csr = $this->currentCert;
}
- $attributes = $this->subArray($csr, 'certificationRequestInfo/attributes');
+ $attributes = $this->_subArray($csr, 'certificationRequestInfo/attributes');
if (!is_array($attributes)) {
return false;
@@ -3568,14 +4568,14 @@ class X509
* @access public
* @return array
*/
- public function getAttributes($csr = null)
+ function getAttributes($csr = null)
{
if (empty($csr)) {
$csr = $this->currentCert;
}
- $attributes = $this->subArray($csr, 'certificationRequestInfo/attributes');
- $attrs = [];
+ $attributes = $this->_subArray($csr, 'certificationRequestInfo/attributes');
+ $attrs = array();
if (is_array($attributes)) {
foreach ($attributes as $attribute) {
@@ -3591,13 +4591,13 @@ class X509
*
* @param string $id
* @param mixed $value
- * @param int $disposition optional
+ * @param bool $disposition optional
* @access public
* @return bool
*/
- public function setAttribute($id, $value, $disposition = self::ATTR_ALL)
+ function setAttribute($id, $value, $disposition = self::ATTR_ALL)
{
- $attributes = &$this->subArray($this->currentCert, 'certificationRequestInfo/attributes', true);
+ $attributes = &$this->_subArray($this->currentCert, 'certificationRequestInfo/attributes', true);
if (!is_array($attributes)) {
return false;
@@ -3635,7 +4635,7 @@ class X509
$attributes[$last]['value'][] = $value;
break;
default:
- $attributes[] = ['type' => $id, 'value' => $disposition == self::ATTR_ALL ? $value: [$value]];
+ $attributes[] = array('type' => $id, 'value' => $disposition == self::ATTR_ALL ? $value: array($value));
break;
}
@@ -3650,12 +4650,12 @@ class X509
* @param string $value
* @access public
*/
- public function setKeyIdentifier($value)
+ function setKeyIdentifier($value)
{
if (empty($value)) {
unset($this->currentKeyIdentifier);
} else {
- $this->currentKeyIdentifier = $value;
+ $this->currentKeyIdentifier = base64_encode($value);
}
}
@@ -3667,9 +4667,9 @@ class X509
* recommended methods (4.2.1.2 RFC 3280).
* Highly polymorphic: try to accept all possible forms of key:
* - Key object
- * - \phpseclib3\File\X509 object with public or private key defined
+ * - \phpseclib\File\X509 object with public or private key defined
* - Certificate or CSR array
- * - \phpseclib3\File\ASN1\Element object
+ * - \phpseclib\File\ASN1\Element object
* - PEM or DER string
*
* @param mixed $key optional
@@ -3677,7 +4677,7 @@ class X509
* @access public
* @return string binary key identifier
*/
- public function computeKeyIdentifier($key = null, $method = 1)
+ function computeKeyIdentifier($key = null, $method = 1)
{
if (is_null($key)) {
$key = $this;
@@ -3694,20 +4694,25 @@ class X509
return false;
case $key instanceof Element:
// Assume the element is a bitstring-packed key.
- $decoded = ASN1::decodeBER($key->element);
+ $asn1 = new ASN1();
+ $decoded = $asn1->decodeBER($key->element);
if (empty($decoded)) {
return false;
}
- $raw = ASN1::asn1map($decoded[0], ['type' => ASN1::TYPE_BIT_STRING]);
+ $raw = $asn1->asn1map($decoded[0], array('type' => ASN1::TYPE_BIT_STRING));
if (empty($raw)) {
return false;
}
+ $raw = base64_decode($raw);
// If the key is private, compute identifier from its corresponding public key.
- $key = PublicKeyLoader::load($raw);
- if ($key instanceof PrivateKey) { // If private.
+ $key = new RSA();
+ if (!$key->loadKey($raw)) {
+ return false; // Not an unencrypted RSA key.
+ }
+ if ($key->getPrivateKey() !== false) { // If private.
return $this->computeKeyIdentifier($key, $method);
}
- $key = $raw; // Is a public key.
+ $key = $raw; // Is a public key.
break;
case $key instanceof X509:
if (isset($key->publicKey)) {
@@ -3720,13 +4725,13 @@ class X509
return $this->computeKeyIdentifier($key->currentCert, $method);
}
return false;
- default: // Should be a key object (i.e.: \phpseclib3\Crypt\RSA).
- $key = $key->getPublicKey();
+ default: // Should be a key object (i.e.: \phpseclib\Crypt\RSA).
+ $key = $key->getPublicKey(RSA::PUBLIC_FORMAT_PKCS1);
break;
}
// If in PEM format, convert to binary.
- $key = ASN1::extractBER($key);
+ $key = $this->_extractBER($key);
// Now we have the key string: compute its sha-1 sum.
$hash = new Hash('sha1');
@@ -3744,34 +4749,32 @@ class X509
* Format a public key as appropriate
*
* @access private
- * @return array|bool
+ * @return array
*/
- private function formatSubjectPublicKey()
+ function _formatSubjectPublicKey()
{
- $format = $this->publicKey instanceof RSA && ($this->publicKey->getPadding() & RSA::SIGNATURE_PSS) ?
- 'PSS' :
- 'PKCS8';
-
- $publicKey = base64_decode(preg_replace('#-.+-|[\r\n]#', '', $this->publicKey->toString($format)));
-
- $decoded = ASN1::decodeBER($publicKey);
- $mapped = ASN1::asn1map($decoded[0], Maps\SubjectPublicKeyInfo::MAP);
-
- $mapped['subjectPublicKey'] = $this->publicKey->toString($format);
+ if ($this->publicKey instanceof RSA) {
+ // the following two return statements do the same thing. i dunno.. i just prefer the later for some reason.
+ // the former is a good example of how to do fuzzing on the public key
+ //return new Element(base64_decode(preg_replace('#-.+-|[\r\n]#', '', $this->publicKey->getPublicKey())));
+ return array(
+ 'algorithm' => array('algorithm' => 'rsaEncryption'),
+ 'subjectPublicKey' => $this->publicKey->getPublicKey(RSA::PUBLIC_FORMAT_PKCS1)
+ );
+ }
- return $mapped;
+ return false;
}
/**
* Set the domain name's which the cert is to be valid for
*
- * @param mixed[] ...$domains
* @access public
* @return array
*/
- public function setDomain(...$domains)
+ function setDomain()
{
- $this->domains = $domains;
+ $this->domains = func_get_args();
$this->removeDNProp('id-at-commonName');
$this->setDNProp('id-at-commonName', $this->domains[0]);
}
@@ -3780,11 +4783,10 @@ class X509
* Set the IP Addresses's which the cert is to be valid for
*
* @access public
- * @param mixed[] ...$ipAddresses
*/
- public function setIPAddress(...$ipAddresses)
+ function setIPAddress()
{
- $this->ipAddresses = $ipAddresses;
+ $this->ipAddresses = func_get_args();
/*
if (!isset($this->domains)) {
$this->removeDNProp('id-at-commonName');
@@ -3800,9 +4802,9 @@ class X509
* @param string $domain
* @return array
*/
- private function dnsName($domain)
+ function _dnsName($domain)
{
- return ['dNSName' => $domain];
+ return array('dNSName' => $domain);
}
/**
@@ -3814,9 +4816,9 @@ class X509
* @param string $address
* @return array
*/
- private function iPAddress($address)
+ function _iPAddress($address)
{
- return ['iPAddress' => $address];
+ return array('iPAddress' => $address);
}
/**
@@ -3828,7 +4830,7 @@ class X509
* @access private
* @return int|false
*/
- private function revokedCertificate(&$rclist, $serial, $create = false)
+ function _revokedCertificate(&$rclist, $serial, $create = false)
{
$serial = new BigInteger($serial);
@@ -3843,9 +4845,9 @@ class X509
}
$i = count($rclist);
- $revocationDate = new DateTimeImmutable('now', new DateTimeZone(@date_default_timezone_get()));
- $rclist[] = ['userCertificate' => $serial,
- 'revocationDate' => $this->timeField($revocationDate->format('D, d M Y H:i:s O'))];
+ $revocationDate = new DateTime('now', new DateTimeZone(@date_default_timezone_get()));
+ $rclist[] = array('userCertificate' => $serial,
+ 'revocationDate' => $this->_timeField($revocationDate->format('D, d M Y H:i:s O')));
return $i;
}
@@ -3857,14 +4859,14 @@ class X509
* @access public
* @return bool
*/
- public function revoke($serial, $date = null)
+ function revoke($serial, $date = null)
{
if (isset($this->currentCert['tbsCertList'])) {
- if (is_array($rclist = &$this->subArray($this->currentCert, 'tbsCertList/revokedCertificates', true))) {
- if ($this->revokedCertificate($rclist, $serial) === false) { // If not yet revoked
- if (($i = $this->revokedCertificate($rclist, $serial, true)) !== false) {
+ if (is_array($rclist = &$this->_subArray($this->currentCert, 'tbsCertList/revokedCertificates', true))) {
+ if ($this->_revokedCertificate($rclist, $serial) === false) { // If not yet revoked
+ if (($i = $this->_revokedCertificate($rclist, $serial, true)) !== false) {
if (!empty($date)) {
- $rclist[$i]['revocationDate'] = $this->timeField($date);
+ $rclist[$i]['revocationDate'] = $this->_timeField($date);
}
return true;
@@ -3883,10 +4885,10 @@ class X509
* @access public
* @return bool
*/
- public function unrevoke($serial)
+ function unrevoke($serial)
{
- if (is_array($rclist = &$this->subArray($this->currentCert, 'tbsCertList/revokedCertificates'))) {
- if (($i = $this->revokedCertificate($rclist, $serial)) !== false) {
+ if (is_array($rclist = &$this->_subArray($this->currentCert, 'tbsCertList/revokedCertificates'))) {
+ if (($i = $this->_revokedCertificate($rclist, $serial)) !== false) {
unset($rclist[$i]);
$rclist = array_values($rclist);
return true;
@@ -3903,10 +4905,10 @@ class X509
* @access public
* @return mixed
*/
- public function getRevoked($serial)
+ function getRevoked($serial)
{
- if (is_array($rclist = $this->subArray($this->currentCert, 'tbsCertList/revokedCertificates'))) {
- if (($i = $this->revokedCertificate($rclist, $serial)) !== false) {
+ if (is_array($rclist = $this->_subArray($this->currentCert, 'tbsCertList/revokedCertificates'))) {
+ if (($i = $this->_revokedCertificate($rclist, $serial)) !== false) {
return $rclist[$i];
}
}
@@ -3919,9 +4921,9 @@ class X509
*
* @param array $crl optional
* @access public
- * @return array|bool
+ * @return array
*/
- public function listRevoked($crl = null)
+ function listRevoked($crl = null)
{
if (!isset($crl)) {
$crl = $this->currentCert;
@@ -3931,9 +4933,9 @@ class X509
return false;
}
- $result = [];
+ $result = array();
- if (is_array($rclist = $this->subArray($crl, 'tbsCertList/revokedCertificates'))) {
+ if (is_array($rclist = $this->_subArray($crl, 'tbsCertList/revokedCertificates'))) {
foreach ($rclist as $rc) {
$result[] = $rc['userCertificate']->toString();
}
@@ -3950,11 +4952,11 @@ class X509
* @access public
* @return bool
*/
- public function removeRevokedCertificateExtension($serial, $id)
+ function removeRevokedCertificateExtension($serial, $id)
{
- if (is_array($rclist = &$this->subArray($this->currentCert, 'tbsCertList/revokedCertificates'))) {
- if (($i = $this->revokedCertificate($rclist, $serial)) !== false) {
- return $this->removeExtensionHelper($id, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
+ if (is_array($rclist = &$this->_subArray($this->currentCert, 'tbsCertList/revokedCertificates'))) {
+ if (($i = $this->_revokedCertificate($rclist, $serial)) !== false) {
+ return $this->_removeExtension($id, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
}
}
@@ -3972,15 +4974,15 @@ class X509
* @access public
* @return mixed
*/
- public function getRevokedCertificateExtension($serial, $id, $crl = null)
+ function getRevokedCertificateExtension($serial, $id, $crl = null)
{
if (!isset($crl)) {
$crl = $this->currentCert;
}
- if (is_array($rclist = $this->subArray($crl, 'tbsCertList/revokedCertificates'))) {
- if (($i = $this->revokedCertificate($rclist, $serial)) !== false) {
- return $this->getExtension($id, $crl, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
+ if (is_array($rclist = $this->_subArray($crl, 'tbsCertList/revokedCertificates'))) {
+ if (($i = $this->_revokedCertificate($rclist, $serial)) !== false) {
+ return $this->_getExtension($id, $crl, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
}
}
@@ -3993,17 +4995,17 @@ class X509
* @param string $serial
* @param array $crl optional
* @access public
- * @return array|bool
+ * @return array
*/
- public function getRevokedCertificateExtensions($serial, $crl = null)
+ function getRevokedCertificateExtensions($serial, $crl = null)
{
if (!isset($crl)) {
$crl = $this->currentCert;
}
- if (is_array($rclist = $this->subArray($crl, 'tbsCertList/revokedCertificates'))) {
- if (($i = $this->revokedCertificate($rclist, $serial)) !== false) {
- return $this->getExtensions($crl, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
+ if (is_array($rclist = $this->_subArray($crl, 'tbsCertList/revokedCertificates'))) {
+ if (($i = $this->_revokedCertificate($rclist, $serial)) !== false) {
+ return $this->_getExtensions($crl, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
}
}
@@ -4021,12 +5023,12 @@ class X509
* @access public
* @return bool
*/
- public function setRevokedCertificateExtension($serial, $id, $value, $critical = false, $replace = true)
+ function setRevokedCertificateExtension($serial, $id, $value, $critical = false, $replace = true)
{
if (isset($this->currentCert['tbsCertList'])) {
- if (is_array($rclist = &$this->subArray($this->currentCert, 'tbsCertList/revokedCertificates', true))) {
- if (($i = $this->revokedCertificate($rclist, $serial, true)) !== false) {
- return $this->setExtensionHelper($id, $value, $critical, $replace, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
+ if (is_array($rclist = &$this->_subArray($this->currentCert, 'tbsCertList/revokedCertificates', true))) {
+ if (($i = $this->_revokedCertificate($rclist, $serial, true)) !== false) {
+ return $this->_setExtension($id, $value, $critical, $replace, "tbsCertList/revokedCertificates/$i/crlEntryExtensions");
}
}
}
@@ -4035,42 +5037,58 @@ class X509
}
/**
- * Register the mapping for a custom/unsupported extension.
+ * Extract raw BER from Base64 encoding
*
- * @param string $id
- * @param array $mapping
+ * @access private
+ * @param string $str
+ * @return string
*/
- public static function registerExtension($id, array $mapping)
+ function _extractBER($str)
{
- if (isset(self::$extensions[$id]) && self::$extensions[$id] !== $mapping) {
- throw new \RuntimeException(
- 'Extension ' . $id . ' has already been defined with a different mapping.'
- );
- }
-
- self::$extensions[$id] = $mapping;
+ /* X.509 certs are assumed to be base64 encoded but sometimes they'll have additional things in them
+ * above and beyond the ceritificate.
+ * ie. some may have the following preceding the -----BEGIN CERTIFICATE----- line:
+ *
+ * Bag Attributes
+ * localKeyID: 01 00 00 00
+ * subject=/O=organization/OU=org unit/CN=common name
+ * issuer=/O=organization/CN=common name
+ */
+ $temp = strlen($str) <= ini_get('pcre.backtrack_limit') ?
+ preg_replace('#.*?^-+[^-]+-+[\r\n ]*$#ms', '', $str, 1) :
+ $str;
+ // remove new lines
+ $temp = str_replace(array("\r", "\n", ' '), '', $temp);
+ // remove the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- stuff
+ $temp = preg_replace('#^-+[^-]+-+|-+[^-]+-+$#', '', $temp);
+ $temp = preg_match('#^[a-zA-Z\d/+]*={0,2}$#', $temp) ? base64_decode($temp) : false;
+ return $temp != false ? $temp : $str;
}
/**
- * Register the mapping for a custom/unsupported extension.
+ * Returns the OID corresponding to a name
*
- * @param string $id
+ * What's returned in the associative array returned by loadX509() (or load*()) is either a name or an OID if
+ * no OID to name mapping is available. The problem with this is that what may be an unmapped OID in one version
+ * of phpseclib may not be unmapped in the next version, so apps that are looking at this OID may not be able
+ * to work from version to version.
*
- * @return array|null
- */
- public static function getRegisteredExtension($id)
- {
- return isset(self::$extensions[$id]) ? self::$extensions[$id] : null;
- }
-
- /**
- * Register the mapping for a custom/unsupported extension.
+ * This method will return the OID if a name is passed to it and if no mapping is avialable it'll assume that
+ * what's being passed to it already is an OID and return that instead. A few examples.
*
- * @param string $id
- * @param mixed $value
+ * getOID('2.16.840.1.101.3.4.2.1') == '2.16.840.1.101.3.4.2.1'
+ * getOID('id-sha256') == '2.16.840.1.101.3.4.2.1'
+ * getOID('zzz') == 'zzz'
+ *
+ * @access public
+ * @return string
*/
- public function setExtensionValue($id, $value)
+ function getOID($name)
{
- $this->extensionValues[$id] = $value;
+ static $reverseMap;
+ if (!isset($reverseMap)) {
+ $reverseMap = array_flip($this->oids);
+ }
+ return isset($reverseMap[$name]) ? $reverseMap[$name] : $name;
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger.php
index f6ff12ed5..9df0bf0f2 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger.php
@@ -6,13 +6,33 @@
* Supports base-2, base-10, base-16, and base-256 numbers. Uses the GMP or BCMath extensions, if available,
* and an internal implementation, otherwise.
*
- * PHP version 5 and 7
+ * PHP version 5
+ *
+ * {@internal (all DocBlock comments regarding implementation - such as the one that follows - refer to the
+ * {@link self::MODE_INTERNAL self::MODE_INTERNAL} mode)
+ *
+ * BigInteger uses base-2**26 to perform operations such as multiplication and division and
+ * base-2**52 (ie. two base 2**26 digits) to perform addition and subtraction. Because the largest possible
+ * value when multiplying two base-2**26 numbers together is a base-2**52 number, double precision floating
+ * point numbers - numbers that should be supported on most hardware and whose significand is 53 bits - are
+ * used. As a consequence, bitwise operators such as >> and << cannot be used, nor can the modulo operator %,
+ * which only supports integers. Although this fact will slow this library down, the fact that such a high
+ * base is being used should more than compensate.
+ *
+ * Numbers are stored in {@link http://en.wikipedia.org/wiki/Endianness little endian} format. ie.
+ * (new \phpseclib\Math\BigInteger(pow(2, 26)))->value = array(0, 1)
+ *
+ * Useful resources are as follows:
+ *
+ * - {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf Handbook of Applied Cryptography (HAC)}
+ * - {@link http://math.libtomcrypt.com/files/tommath.pdf Multi-Precision Math (MPM)}
+ * - Java's BigInteger classes. See /j2se/src/share/classes/java/math in jdk-1_5_0-src-jrl.zip
*
* Here's an example of how to use this library:
* <code>
* <?php
- * $a = new \phpseclib3\Math\BigInteger(2);
- * $b = new \phpseclib3\Math\BigInteger(3);
+ * $a = new \phpseclib\Math\BigInteger(2);
+ * $b = new \phpseclib\Math\BigInteger(3);
*
* $c = $a->add($b);
*
@@ -23,13 +43,13 @@
* @category Math
* @package BigInteger
* @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
+ * @copyright 2006 Jim Wigginton
* @license http://www.opensource.org/licenses/mit-license.html MIT License
*/
-namespace phpseclib3\Math;
+namespace phpseclib\Math;
-use phpseclib3\Exception\BadConfigurationException;
+use phpseclib\Crypt\Random;
/**
* Pure-PHP arbitrary precision integer arithmetic library. Supports base-2, base-10, base-16, and base-256
@@ -39,233 +59,1337 @@ use phpseclib3\Exception\BadConfigurationException;
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
-class BigInteger implements \Serializable
+class BigInteger
{
+ /**#@+
+ * Reduction constants
+ *
+ * @access private
+ * @see BigInteger::_reduce()
+ */
+ /**
+ * @see BigInteger::_montgomery()
+ * @see BigInteger::_prepMontgomery()
+ */
+ const MONTGOMERY = 0;
+ /**
+ * @see BigInteger::_barrett()
+ */
+ const BARRETT = 1;
+ /**
+ * @see BigInteger::_mod2()
+ */
+ const POWEROF2 = 2;
+ /**
+ * @see BigInteger::_remainder()
+ */
+ const CLASSIC = 3;
+ /**
+ * @see BigInteger::__clone()
+ */
+ const NONE = 4;
+ /**#@-*/
+
+ /**#@+
+ * Array constants
+ *
+ * Rather than create a thousands and thousands of new BigInteger objects in repeated function calls to add() and
+ * multiply() or whatever, we'll just work directly on arrays, taking them in as parameters and returning them.
+ *
+ * @access private
+ */
+ /**
+ * $result[self::VALUE] contains the value.
+ */
+ const VALUE = 0;
/**
- * Main Engine
+ * $result[self::SIGN] contains the sign.
+ */
+ const SIGN = 1;
+ /**#@-*/
+
+ /**#@+
+ * @access private
+ * @see BigInteger::_montgomery()
+ * @see BigInteger::_barrett()
+ */
+ /**
+ * Cache constants
*
- * @var string
+ * $cache[self::VARIABLE] tells us whether or not the cached data is still valid.
*/
- private static $mainEngine;
+ const VARIABLE = 0;
+ /**
+ * $cache[self::DATA] contains the cached data.
+ */
+ const DATA = 1;
+ /**#@-*/
+ /**#@+
+ * Mode constants.
+ *
+ * @access private
+ * @see BigInteger::__construct()
+ */
+ /**
+ * To use the pure-PHP implementation
+ */
+ const MODE_INTERNAL = 1;
/**
- * Modular Exponentiation Engine
+ * To use the BCMath library
*
- * @var string
+ * (if enabled; otherwise, the internal implementation will be used)
+ */
+ const MODE_BCMATH = 2;
+ /**
+ * To use the GMP library
+ *
+ * (if present; otherwise, either the BCMath or the internal implementation will be used)
*/
- private static $modexpEngine;
+ const MODE_GMP = 3;
+ /**#@-*/
/**
- * Selected Engines
+ * Karatsuba Cutoff
+ *
+ * At what point do we switch between Karatsuba multiplication and schoolbook long multiplication?
+ *
+ * @access private
+ */
+ const KARATSUBA_CUTOFF = 25;
+
+ /**#@+
+ * Static properties used by the pure-PHP implementation.
+ *
+ * @see __construct()
+ */
+ protected static $base;
+ protected static $baseFull;
+ protected static $maxDigit;
+ protected static $msb;
+
+ /**
+ * $max10 in greatest $max10Len satisfying
+ * $max10 = 10**$max10Len <= 2**$base.
+ */
+ protected static $max10;
+
+ /**
+ * $max10Len in greatest $max10Len satisfying
+ * $max10 = 10**$max10Len <= 2**$base.
+ */
+ protected static $max10Len;
+ protected static $maxDigit2;
+ /**#@-*/
+
+ /**
+ * Holds the BigInteger's value.
*
* @var array
+ * @access private
+ */
+ var $value;
+
+ /**
+ * Holds the BigInteger's magnitude.
+ *
+ * @var bool
+ * @access private
+ */
+ var $is_negative = false;
+
+ /**
+ * Precision
+ *
+ * @see self::setPrecision()
+ * @access private
*/
- private static $engines;
+ var $precision = -1;
/**
- * The actual BigInteger object
+ * Precision Bitmask
*
- * @var object
+ * @see self::setPrecision()
+ * @access private
*/
- private $value;
+ var $bitmask = false;
/**
- * Sets engine type.
+ * Mode independent value used for serialization.
+ *
+ * If the bcmath or gmp extensions are installed $this->value will be a non-serializable resource, hence the need for
+ * a variable that'll be serializable regardless of whether or not extensions are being used. Unlike $this->value,
+ * however, $this->hex is only calculated when $this->__sleep() is called.
+ *
+ * @see self::__sleep()
+ * @see self::__wakeup()
+ * @var string
+ * @access private
+ */
+ var $hex;
+
+ /**
+ * Converts base-2, base-10, base-16, and binary strings (base-256) to BigIntegers.
+ *
+ * If the second parameter - $base - is negative, then it will be assumed that the number's are encoded using
+ * two's compliment. The sole exception to this is -10, which is treated the same as 10 is.
+ *
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('0x32', 16); // 50 in base-16
*
- * Throws an exception if the type is invalid
+ * echo $a->toString(); // outputs 50
+ * ?>
+ * </code>
*
- * @param string $main
- * @param array $modexps optional
+ * @param int|string|resource $x base-10 number or base-$base number if $base set.
+ * @param int $base
+ * @return \phpseclib\Math\BigInteger
+ * @access public
*/
- public static function setEngine($main, $modexps = ['DefaultEngine'])
+ function __construct($x = 0, $base = 10)
{
- self::$engines = [];
+ if (!defined('MATH_BIGINTEGER_MODE')) {
+ switch (true) {
+ case extension_loaded('gmp'):
+ define('MATH_BIGINTEGER_MODE', self::MODE_GMP);
+ break;
+ case extension_loaded('bcmath'):
+ define('MATH_BIGINTEGER_MODE', self::MODE_BCMATH);
+ break;
+ default:
+ define('MATH_BIGINTEGER_MODE', self::MODE_INTERNAL);
+ }
+ }
+
+ if (extension_loaded('openssl') && !defined('MATH_BIGINTEGER_OPENSSL_DISABLE') && !defined('MATH_BIGINTEGER_OPENSSL_ENABLED')) {
+ // some versions of XAMPP have mismatched versions of OpenSSL which causes it not to work
+ $versions = array();
+
+ // avoid generating errors (even with suppression) when phpinfo() is disabled (common in production systems)
+ if (strpos(ini_get('disable_functions'), 'phpinfo') === false) {
+ ob_start();
+ @phpinfo();
+ $content = ob_get_contents();
+ ob_end_clean();
+
+ preg_match_all('#OpenSSL (Header|Library) Version(.*)#im', $content, $matches);
+
+ if (!empty($matches[1])) {
+ for ($i = 0; $i < count($matches[1]); $i++) {
+ $fullVersion = trim(str_replace('=>', '', strip_tags($matches[2][$i])));
+
+ // Remove letter part in OpenSSL version
+ if (!preg_match('/(\d+\.\d+\.\d+)/i', $fullVersion, $m)) {
+ $versions[$matches[1][$i]] = $fullVersion;
+ } else {
+ $versions[$matches[1][$i]] = $m[0];
+ }
+ }
+ }
+ }
- $fqmain = 'phpseclib3\\Math\\BigInteger\\Engines\\' . $main;
- if (!class_exists($fqmain) || !method_exists($fqmain, 'isValidEngine')) {
- throw new \InvalidArgumentException("$main is not a valid engine");
+ // it doesn't appear that OpenSSL versions were reported upon until PHP 5.3+
+ switch (true) {
+ case !isset($versions['Header']):
+ case !isset($versions['Library']):
+ case $versions['Header'] == $versions['Library']:
+ case version_compare($versions['Header'], '1.0.0') >= 0 && version_compare($versions['Library'], '1.0.0') >= 0:
+ define('MATH_BIGINTEGER_OPENSSL_ENABLED', true);
+ break;
+ default:
+ define('MATH_BIGINTEGER_OPENSSL_DISABLE', true);
+ }
}
- if (!$fqmain::isValidEngine()) {
- throw new BadConfigurationException("$main is not setup correctly on this system");
+
+ if (!defined('PHP_INT_SIZE')) {
+ define('PHP_INT_SIZE', 4);
}
- self::$mainEngine = $fqmain;
- if (!in_array('Default', $modexps)) {
- $modexps[] = 'DefaultEngine';
+ if (empty(self::$base) && MATH_BIGINTEGER_MODE == self::MODE_INTERNAL) {
+ switch (PHP_INT_SIZE) {
+ case 8: // use 64-bit integers if int size is 8 bytes
+ self::$base = 31;
+ self::$baseFull = 0x80000000;
+ self::$maxDigit = 0x7FFFFFFF;
+ self::$msb = 0x40000000;
+ self::$max10 = 1000000000;
+ self::$max10Len = 9;
+ self::$maxDigit2 = pow(2, 62);
+ break;
+ //case 4: // use 64-bit floats if int size is 4 bytes
+ default:
+ self::$base = 26;
+ self::$baseFull = 0x4000000;
+ self::$maxDigit = 0x3FFFFFF;
+ self::$msb = 0x2000000;
+ self::$max10 = 10000000;
+ self::$max10Len = 7;
+ self::$maxDigit2 = pow(2, 52); // pow() prevents truncation
+ }
}
- $found = false;
- foreach ($modexps as $modexp) {
- try {
- $fqmain::setModExpEngine($modexp);
- $found = true;
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ switch (true) {
+ case is_resource($x) && get_resource_type($x) == 'GMP integer':
+ // PHP 5.6 switched GMP from using resources to objects
+ case $x instanceof \GMP:
+ $this->value = $x;
+ return;
+ }
+ $this->value = gmp_init(0);
break;
- } catch (\Exception $e) {
- }
+ case self::MODE_BCMATH:
+ $this->value = '0';
+ break;
+ default:
+ $this->value = array();
}
- if (!$found) {
- throw new BadConfigurationException("No valid modular exponentiation engine found for $main");
+ // '0' counts as empty() but when the base is 256 '0' is equal to ord('0') or 48
+ // '0' is the only value like this per http://php.net/empty
+ if (empty($x) && (abs($base) != 256 || $x !== '0')) {
+ return;
}
- self::$modexpEngine = $modexp;
+ switch ($base) {
+ case -256:
+ if (ord($x[0]) & 0x80) {
+ $x = ~$x;
+ $this->is_negative = true;
+ }
+ case 256:
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $this->value = function_exists('gmp_import') ?
+ gmp_import($x) :
+ gmp_init('0x' . bin2hex($x));
+ if ($this->is_negative) {
+ $this->value = gmp_neg($this->value);
+ }
+ break;
+ case self::MODE_BCMATH:
+ // round $len to the nearest 4 (thanks, DavidMJ!)
+ $len = (strlen($x) + 3) & 0xFFFFFFFC;
+
+ $x = str_pad($x, $len, chr(0), STR_PAD_LEFT);
+
+ for ($i = 0; $i < $len; $i+= 4) {
+ $this->value = bcmul($this->value, '4294967296', 0); // 4294967296 == 2**32
+ $this->value = bcadd($this->value, 0x1000000 * ord($x[$i]) + ((ord($x[$i + 1]) << 16) | (ord($x[$i + 2]) << 8) | ord($x[$i + 3])), 0);
+ }
+
+ if ($this->is_negative) {
+ $this->value = '-' . $this->value;
+ }
+
+ break;
+ // converts a base-2**8 (big endian / msb) number to base-2**26 (little endian / lsb)
+ default:
+ while (strlen($x)) {
+ $this->value[] = $this->_bytes2int($this->_base256_rshift($x, self::$base));
+ }
+ }
+
+ if ($this->is_negative) {
+ if (MATH_BIGINTEGER_MODE != self::MODE_INTERNAL) {
+ $this->is_negative = false;
+ }
+ $temp = $this->add(new static('-1'));
+ $this->value = $temp->value;
+ }
+ break;
+ case 16:
+ case -16:
+ if ($base > 0 && $x[0] == '-') {
+ $this->is_negative = true;
+ $x = substr($x, 1);
+ }
+
+ $x = preg_replace('#^(?:0x)?([A-Fa-f0-9]*).*#', '$1', $x);
+
+ $is_negative = false;
+ if ($base < 0 && hexdec($x[0]) >= 8) {
+ $this->is_negative = $is_negative = true;
+ $x = bin2hex(~pack('H*', $x));
+ }
+
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp = $this->is_negative ? '-0x' . $x : '0x' . $x;
+ $this->value = gmp_init($temp);
+ $this->is_negative = false;
+ break;
+ case self::MODE_BCMATH:
+ $x = (strlen($x) & 1) ? '0' . $x : $x;
+ $temp = new static(pack('H*', $x), 256);
+ $this->value = $this->is_negative ? '-' . $temp->value : $temp->value;
+ $this->is_negative = false;
+ break;
+ default:
+ $x = (strlen($x) & 1) ? '0' . $x : $x;
+ $temp = new static(pack('H*', $x), 256);
+ $this->value = $temp->value;
+ }
+
+ if ($is_negative) {
+ $temp = $this->add(new static('-1'));
+ $this->value = $temp->value;
+ }
+ break;
+ case 10:
+ case -10:
+ // (?<!^)(?:-).*: find any -'s that aren't at the beginning and then any characters that follow that
+ // (?<=^|-)0*: find any 0's that are preceded by the start of the string or by a - (ie. octals)
+ // [^-0-9].*: find any non-numeric characters and then any characters that follow that
+ $x = preg_replace('#(?<!^)(?:-).*|(?<=^|-)0*|[^-0-9].*#', '', $x);
+ if (!strlen($x) || $x == '-') {
+ $x = '0';
+ }
+
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $this->value = gmp_init($x);
+ break;
+ case self::MODE_BCMATH:
+ // explicitly casting $x to a string is necessary, here, since doing $x[0] on -1 yields different
+ // results then doing it on '-1' does (modInverse does $x[0])
+ $this->value = $x === '-' ? '0' : (string) $x;
+ break;
+ default:
+ $temp = new static();
+
+ $multiplier = new static();
+ $multiplier->value = array(self::$max10);
+
+ if ($x[0] == '-') {
+ $this->is_negative = true;
+ $x = substr($x, 1);
+ }
+
+ $x = str_pad($x, strlen($x) + ((self::$max10Len - 1) * strlen($x)) % self::$max10Len, 0, STR_PAD_LEFT);
+ while (strlen($x)) {
+ $temp = $temp->multiply($multiplier);
+ $temp = $temp->add(new static($this->_int2bytes(substr($x, 0, self::$max10Len)), 256));
+ $x = substr($x, self::$max10Len);
+ }
+
+ $this->value = $temp->value;
+ }
+ break;
+ case 2: // base-2 support originally implemented by Lluis Pamies - thanks!
+ case -2:
+ if ($base > 0 && $x[0] == '-') {
+ $this->is_negative = true;
+ $x = substr($x, 1);
+ }
+
+ $x = preg_replace('#^([01]*).*#', '$1', $x);
+ $x = str_pad($x, strlen($x) + (3 * strlen($x)) % 4, 0, STR_PAD_LEFT);
+
+ $str = '0x';
+ while (strlen($x)) {
+ $part = substr($x, 0, 4);
+ $str.= dechex(bindec($part));
+ $x = substr($x, 4);
+ }
- self::$engines = [$main, $modexp];
+ if ($this->is_negative) {
+ $str = '-' . $str;
+ }
+
+ $temp = new static($str, 8 * $base); // ie. either -16 or +16
+ $this->value = $temp->value;
+ $this->is_negative = $temp->is_negative;
+
+ break;
+ default:
+ // base not supported, so we'll let $this == 0
+ }
}
/**
- * Returns the engine type
+ * Converts a BigInteger to a byte string (eg. base-256).
+ *
+ * Negative numbers are saved as positive numbers, unless $twos_compliment is set to true, at which point, they're
+ * saved as two's compliment.
+ *
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('65');
*
- * @return string[]
+ * echo $a->toBytes(); // outputs chr(65)
+ * ?>
+ * </code>
+ *
+ * @param bool $twos_compliment
+ * @return string
+ * @access public
+ * @internal Converts a base-2**26 number to base-2**8
*/
- public static function getEngine()
+ function toBytes($twos_compliment = false)
{
- self::initialize_static_variables();
+ if ($twos_compliment) {
+ $comparison = $this->compare(new static());
+ if ($comparison == 0) {
+ return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : '';
+ }
+
+ $temp = $comparison < 0 ? $this->add(new static(1)) : $this->copy();
+ $bytes = $temp->toBytes();
+
+ if (!strlen($bytes)) { // eg. if the number we're trying to convert is -1
+ $bytes = chr(0);
+ }
+
+ if ($this->precision <= 0 && (ord($bytes[0]) & 0x80)) {
+ $bytes = chr(0) . $bytes;
+ }
- return self::$engines;
+ return $comparison < 0 ? ~$bytes : $bytes;
+ }
+
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ if (gmp_cmp($this->value, gmp_init(0)) == 0) {
+ return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : '';
+ }
+
+ if (function_exists('gmp_export')) {
+ $temp = gmp_export($this->value);
+ } else {
+ $temp = gmp_strval(gmp_abs($this->value), 16);
+ $temp = (strlen($temp) & 1) ? '0' . $temp : $temp;
+ $temp = pack('H*', $temp);
+ }
+
+ return $this->precision > 0 ?
+ substr(str_pad($temp, $this->precision >> 3, chr(0), STR_PAD_LEFT), -($this->precision >> 3)) :
+ ltrim($temp, chr(0));
+ case self::MODE_BCMATH:
+ if ($this->value === '0') {
+ return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : '';
+ }
+
+ $value = '';
+ $current = $this->value;
+
+ if ($current[0] == '-') {
+ $current = substr($current, 1);
+ }
+
+ while (bccomp($current, '0', 0) > 0) {
+ $temp = bcmod($current, '16777216');
+ $value = chr($temp >> 16) . chr($temp >> 8) . chr($temp) . $value;
+ $current = bcdiv($current, '16777216', 0);
+ }
+
+ return $this->precision > 0 ?
+ substr(str_pad($value, $this->precision >> 3, chr(0), STR_PAD_LEFT), -($this->precision >> 3)) :
+ ltrim($value, chr(0));
+ }
+
+ if (!count($this->value)) {
+ return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : '';
+ }
+ $result = $this->_int2bytes($this->value[count($this->value) - 1]);
+
+ $temp = $this->copy();
+
+ for ($i = count($temp->value) - 2; $i >= 0; --$i) {
+ $temp->_base256_lshift($result, self::$base);
+ $result = $result | str_pad($temp->_int2bytes($temp->value[$i]), strlen($result), chr(0), STR_PAD_LEFT);
+ }
+
+ return $this->precision > 0 ?
+ str_pad(substr($result, -(($this->precision + 7) >> 3)), ($this->precision + 7) >> 3, chr(0), STR_PAD_LEFT) :
+ $result;
}
/**
- * Initialize static variables
+ * Converts a BigInteger to a hex string (eg. base-16)).
+ *
+ * Negative numbers are saved as positive numbers, unless $twos_compliment is set to true, at which point, they're
+ * saved as two's compliment.
+ *
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('65');
+ *
+ * echo $a->toHex(); // outputs '41'
+ * ?>
+ * </code>
+ *
+ * @param bool $twos_compliment
+ * @return string
+ * @access public
+ * @internal Converts a base-2**26 number to base-2**8
*/
- private static function initialize_static_variables()
+ function toHex($twos_compliment = false)
{
- if (!isset(self::$mainEngine)) {
- $engines = [
- ['GMP'],
- ['PHP64', ['OpenSSL']],
- ['BCMath', ['OpenSSL']],
- ['PHP32', ['OpenSSL']]
- ];
- foreach ($engines as $engine) {
- try {
- self::setEngine($engine[0], isset($engine[1]) ? $engine[1] : []);
- break;
- } catch (\Exception $e) {
- }
- }
- }
+ return bin2hex($this->toBytes($twos_compliment));
}
/**
- * Converts base-2, base-10, base-16, and binary strings (base-256) to BigIntegers.
+ * Converts a BigInteger to a bit string (eg. base-2).
*
- * If the second parameter - $base - is negative, then it will be assumed that the number's are encoded using
- * two's compliment. The sole exception to this is -10, which is treated the same as 10 is.
+ * Negative numbers are saved as positive numbers, unless $twos_compliment is set to true, at which point, they're
+ * saved as two's compliment.
*
- * @param int|BigInteger\Engines\Engine $x Base-10 number or base-$base number if $base set.
- * @param int $base
- * @return BigInteger
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('65');
+ *
+ * echo $a->toBits(); // outputs '1000001'
+ * ?>
+ * </code>
+ *
+ * @param bool $twos_compliment
+ * @return string
+ * @access public
+ * @internal Converts a base-2**26 number to base-2**2
*/
- public function __construct($x = 0, $base = 10)
+ function toBits($twos_compliment = false)
{
- self::initialize_static_variables();
+ $hex = $this->toHex($twos_compliment);
+ $bits = '';
+ for ($i = strlen($hex) - 8, $start = strlen($hex) & 7; $i >= $start; $i-=8) {
+ $bits = str_pad(decbin(hexdec(substr($hex, $i, 8))), 32, '0', STR_PAD_LEFT) . $bits;
+ }
+ if ($start) { // hexdec('') == 0
+ $bits = str_pad(decbin(hexdec(substr($hex, 0, $start))), 8, '0', STR_PAD_LEFT) . $bits;
+ }
+ $result = $this->precision > 0 ? substr($bits, -$this->precision) : ltrim($bits, '0');
- if ($x instanceof self::$mainEngine) {
- $this->value = clone $x;
- } elseif ($x instanceof BigInteger\Engines\Engine) {
- $this->value = new static("$x");
- $this->value->setPrecision($x->getPrecision());
- } else {
- $this->value = new self::$mainEngine($x, $base);
+ if ($twos_compliment && $this->compare(new static()) > 0 && $this->precision <= 0) {
+ return '0' . $result;
}
+
+ return $result;
}
/**
* Converts a BigInteger to a base-10 number.
*
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('50');
+ *
+ * echo $a->toString(); // outputs 50
+ * ?>
+ * </code>
+ *
* @return string
+ * @access public
+ * @internal Converts a base-2**26 number to base-10**7 (which is pretty much base-10)
*/
- public function toString()
+ function toString()
{
- return $this->value->toString();
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ return gmp_strval($this->value);
+ case self::MODE_BCMATH:
+ if ($this->value === '0') {
+ return '0';
+ }
+
+ return ltrim($this->value, '0');
+ }
+
+ if (!count($this->value)) {
+ return '0';
+ }
+
+ $temp = $this->copy();
+ $temp->bitmask = false;
+ $temp->is_negative = false;
+
+ $divisor = new static();
+ $divisor->value = array(self::$max10);
+ $result = '';
+ while (count($temp->value)) {
+ list($temp, $mod) = $temp->divide($divisor);
+ $result = str_pad(isset($mod->value[0]) ? $mod->value[0] : '', self::$max10Len, '0', STR_PAD_LEFT) . $result;
+ }
+ $result = ltrim($result, '0');
+ if (empty($result)) {
+ $result = '0';
+ }
+
+ if ($this->is_negative) {
+ $result = '-' . $result;
+ }
+
+ return $result;
+ }
+
+ /**
+ * Copy an object
+ *
+ * PHP5 passes objects by reference while PHP4 passes by value. As such, we need a function to guarantee
+ * that all objects are passed by value, when appropriate. More information can be found here:
+ *
+ * {@link http://php.net/language.oop5.basic#51624}
+ *
+ * @access public
+ * @see self::__clone()
+ * @return \phpseclib\Math\BigInteger
+ */
+ function copy()
+ {
+ $temp = new static();
+ $temp->value = $this->value;
+ $temp->is_negative = $this->is_negative;
+ $temp->precision = $this->precision;
+ $temp->bitmask = $this->bitmask;
+ return $temp;
}
/**
* __toString() magic method
+ *
+ * Will be called, automatically, if you're supporting just PHP5. If you're supporting PHP4, you'll need to call
+ * toString().
+ *
+ * @access public
+ * @internal Implemented per a suggestion by Techie-Michael - thanks!
*/
- public function __toString()
+ function __toString()
{
- return (string) $this->value;
+ return $this->toString();
}
/**
- * __debugInfo() magic method
+ * __clone() magic method
*
- * Will be called, automatically, when print_r() or var_dump() are called
+ * Although you can call BigInteger::__toString() directly in PHP5, you cannot call BigInteger::__clone() directly
+ * in PHP5. You can in PHP4 since it's not a magic method, but in PHP5, you have to call it by using the PHP5
+ * only syntax of $y = clone $x. As such, if you're trying to write an application that works on both PHP4 and
+ * PHP5, call BigInteger::copy(), instead.
+ *
+ * @access public
+ * @see self::copy()
+ * @return \phpseclib\Math\BigInteger
*/
- public function __debugInfo()
+ function __clone()
{
- return $this->value->__debugInfo();
+ return $this->copy();
}
/**
- * Converts a BigInteger to a byte string (eg. base-256).
+ * __sleep() magic method
*
- * @param bool $twos_compliment
- * @return string
+ * Will be called, automatically, when serialize() is called on a BigInteger object.
+ *
+ * @see self::__wakeup()
+ * @access public
*/
- public function toBytes($twos_compliment = false)
+ function __sleep()
{
- return $this->value->toBytes($twos_compliment);
+ $this->hex = $this->toHex(true);
+ $vars = array('hex');
+ if ($this->precision > 0) {
+ $vars[] = 'precision';
+ }
+ return $vars;
}
/**
- * Converts a BigInteger to a hex string (eg. base-16).
+ * __wakeup() magic method
*
- * @param bool $twos_compliment
- * @return string
+ * Will be called, automatically, when unserialize() is called on a BigInteger object.
+ *
+ * @see self::__sleep()
+ * @access public
*/
- public function toHex($twos_compliment = false)
+ function __wakeup()
{
- return $this->value->toHex($twos_compliment);
+ $temp = new static($this->hex, -16);
+ $this->value = $temp->value;
+ $this->is_negative = $temp->is_negative;
+ if ($this->precision > 0) {
+ // recalculate $this->bitmask
+ $this->setPrecision($this->precision);
+ }
}
/**
- * Converts a BigInteger to a bit string (eg. base-2).
+ * __debugInfo() magic method
*
- * Negative numbers are saved as positive numbers, unless $twos_compliment is set to true, at which point, they're
- * saved as two's compliment.
+ * Will be called, automatically, when print_r() or var_dump() are called
*
- * @param bool $twos_compliment
- * @return string
+ * @access public
*/
- function toBits($twos_compliment = false)
+ function __debugInfo()
{
- return $this->value->toBits($twos_compliment);
+ $opts = array();
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $engine = 'gmp';
+ break;
+ case self::MODE_BCMATH:
+ $engine = 'bcmath';
+ break;
+ case self::MODE_INTERNAL:
+ $engine = 'internal';
+ $opts[] = PHP_INT_SIZE == 8 ? '64-bit' : '32-bit';
+ }
+ if (MATH_BIGINTEGER_MODE != self::MODE_GMP && defined('MATH_BIGINTEGER_OPENSSL_ENABLED')) {
+ $opts[] = 'OpenSSL';
+ }
+ if (!empty($opts)) {
+ $engine.= ' (' . implode('.', $opts) . ')';
+ }
+ return array(
+ 'value' => '0x' . $this->toHex(true),
+ 'engine' => $engine
+ );
}
/**
* Adds two BigIntegers.
*
- * @param BigInteger $y
- * @return BigInteger
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('10');
+ * $b = new \phpseclib\Math\BigInteger('20');
+ *
+ * $c = $a->add($b);
+ *
+ * echo $c->toString(); // outputs 30
+ * ?>
+ * </code>
+ *
+ * @param \phpseclib\Math\BigInteger $y
+ * @return \phpseclib\Math\BigInteger
+ * @access public
+ * @internal Performs base-2**52 addition
*/
- public function add(BigInteger $y)
+ function add($y)
{
- return new static($this->value->add($y->value));
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp = new static();
+ $temp->value = gmp_add($this->value, $y->value);
+
+ return $this->_normalize($temp);
+ case self::MODE_BCMATH:
+ $temp = new static();
+ $temp->value = bcadd($this->value, $y->value, 0);
+
+ return $this->_normalize($temp);
+ }
+
+ $temp = $this->_add($this->value, $this->is_negative, $y->value, $y->is_negative);
+
+ $result = new static();
+ $result->value = $temp[self::VALUE];
+ $result->is_negative = $temp[self::SIGN];
+
+ return $this->_normalize($result);
+ }
+
+ /**
+ * Performs addition.
+ *
+ * @param array $x_value
+ * @param bool $x_negative
+ * @param array $y_value
+ * @param bool $y_negative
+ * @return array
+ * @access private
+ */
+ function _add($x_value, $x_negative, $y_value, $y_negative)
+ {
+ $x_size = count($x_value);
+ $y_size = count($y_value);
+
+ if ($x_size == 0) {
+ return array(
+ self::VALUE => $y_value,
+ self::SIGN => $y_negative
+ );
+ } elseif ($y_size == 0) {
+ return array(
+ self::VALUE => $x_value,
+ self::SIGN => $x_negative
+ );
+ }
+
+ // subtract, if appropriate
+ if ($x_negative != $y_negative) {
+ if ($x_value == $y_value) {
+ return array(
+ self::VALUE => array(),
+ self::SIGN => false
+ );
+ }
+
+ $temp = $this->_subtract($x_value, false, $y_value, false);
+ $temp[self::SIGN] = $this->_compare($x_value, false, $y_value, false) > 0 ?
+ $x_negative : $y_negative;
+
+ return $temp;
+ }
+
+ if ($x_size < $y_size) {
+ $size = $x_size;
+ $value = $y_value;
+ } else {
+ $size = $y_size;
+ $value = $x_value;
+ }
+
+ $value[count($value)] = 0; // just in case the carry adds an extra digit
+
+ $carry = 0;
+ for ($i = 0, $j = 1; $j < $size; $i+=2, $j+=2) {
+ $sum = $x_value[$j] * self::$baseFull + $x_value[$i] + $y_value[$j] * self::$baseFull + $y_value[$i] + $carry;
+ $carry = $sum >= self::$maxDigit2; // eg. floor($sum / 2**52); only possible values (in any base) are 0 and 1
+ $sum = $carry ? $sum - self::$maxDigit2 : $sum;
+
+ $temp = self::$base === 26 ? intval($sum / 0x4000000) : ($sum >> 31);
+
+ $value[$i] = (int) ($sum - self::$baseFull * $temp); // eg. a faster alternative to fmod($sum, 0x4000000)
+ $value[$j] = $temp;
+ }
+
+ if ($j == $size) { // ie. if $y_size is odd
+ $sum = $x_value[$i] + $y_value[$i] + $carry;
+ $carry = $sum >= self::$baseFull;
+ $value[$i] = $carry ? $sum - self::$baseFull : $sum;
+ ++$i; // ie. let $i = $j since we've just done $value[$i]
+ }
+
+ if ($carry) {
+ for (; $value[$i] == self::$maxDigit; ++$i) {
+ $value[$i] = 0;
+ }
+ ++$value[$i];
+ }
+
+ return array(
+ self::VALUE => $this->_trim($value),
+ self::SIGN => $x_negative
+ );
}
/**
* Subtracts two BigIntegers.
*
- * @param BigInteger $y
- * @return BigInteger
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('10');
+ * $b = new \phpseclib\Math\BigInteger('20');
+ *
+ * $c = $a->subtract($b);
+ *
+ * echo $c->toString(); // outputs -10
+ * ?>
+ * </code>
+ *
+ * @param \phpseclib\Math\BigInteger $y
+ * @return \phpseclib\Math\BigInteger
+ * @access public
+ * @internal Performs base-2**52 subtraction
*/
- function subtract(BigInteger $y)
+ function subtract($y)
{
- return new static($this->value->subtract($y->value));
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp = new static();
+ $temp->value = gmp_sub($this->value, $y->value);
+
+ return $this->_normalize($temp);
+ case self::MODE_BCMATH:
+ $temp = new static();
+ $temp->value = bcsub($this->value, $y->value, 0);
+
+ return $this->_normalize($temp);
+ }
+
+ $temp = $this->_subtract($this->value, $this->is_negative, $y->value, $y->is_negative);
+
+ $result = new static();
+ $result->value = $temp[self::VALUE];
+ $result->is_negative = $temp[self::SIGN];
+
+ return $this->_normalize($result);
+ }
+
+ /**
+ * Performs subtraction.
+ *
+ * @param array $x_value
+ * @param bool $x_negative
+ * @param array $y_value
+ * @param bool $y_negative
+ * @return array
+ * @access private
+ */
+ function _subtract($x_value, $x_negative, $y_value, $y_negative)
+ {
+ $x_size = count($x_value);
+ $y_size = count($y_value);
+
+ if ($x_size == 0) {
+ return array(
+ self::VALUE => $y_value,
+ self::SIGN => !$y_negative
+ );
+ } elseif ($y_size == 0) {
+ return array(
+ self::VALUE => $x_value,
+ self::SIGN => $x_negative
+ );
+ }
+
+ // add, if appropriate (ie. -$x - +$y or +$x - -$y)
+ if ($x_negative != $y_negative) {
+ $temp = $this->_add($x_value, false, $y_value, false);
+ $temp[self::SIGN] = $x_negative;
+
+ return $temp;
+ }
+
+ $diff = $this->_compare($x_value, $x_negative, $y_value, $y_negative);
+
+ if (!$diff) {
+ return array(
+ self::VALUE => array(),
+ self::SIGN => false
+ );
+ }
+
+ // switch $x and $y around, if appropriate.
+ if ((!$x_negative && $diff < 0) || ($x_negative && $diff > 0)) {
+ $temp = $x_value;
+ $x_value = $y_value;
+ $y_value = $temp;
+
+ $x_negative = !$x_negative;
+
+ $x_size = count($x_value);
+ $y_size = count($y_value);
+ }
+
+ // at this point, $x_value should be at least as big as - if not bigger than - $y_value
+
+ $carry = 0;
+ for ($i = 0, $j = 1; $j < $y_size; $i+=2, $j+=2) {
+ $sum = $x_value[$j] * self::$baseFull + $x_value[$i] - $y_value[$j] * self::$baseFull - $y_value[$i] - $carry;
+ $carry = $sum < 0; // eg. floor($sum / 2**52); only possible values (in any base) are 0 and 1
+ $sum = $carry ? $sum + self::$maxDigit2 : $sum;
+
+ $temp = self::$base === 26 ? intval($sum / 0x4000000) : ($sum >> 31);
+
+ $x_value[$i] = (int) ($sum - self::$baseFull * $temp);
+ $x_value[$j] = $temp;
+ }
+
+ if ($j == $y_size) { // ie. if $y_size is odd
+ $sum = $x_value[$i] - $y_value[$i] - $carry;
+ $carry = $sum < 0;
+ $x_value[$i] = $carry ? $sum + self::$baseFull : $sum;
+ ++$i;
+ }
+
+ if ($carry) {
+ for (; !$x_value[$i]; ++$i) {
+ $x_value[$i] = self::$maxDigit;
+ }
+ --$x_value[$i];
+ }
+
+ return array(
+ self::VALUE => $this->_trim($x_value),
+ self::SIGN => $x_negative
+ );
}
/**
* Multiplies two BigIntegers
*
- * @param BigInteger $x
- * @return BigInteger
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('10');
+ * $b = new \phpseclib\Math\BigInteger('20');
+ *
+ * $c = $a->multiply($b);
+ *
+ * echo $c->toString(); // outputs 200
+ * ?>
+ * </code>
+ *
+ * @param \phpseclib\Math\BigInteger $x
+ * @return \phpseclib\Math\BigInteger
+ * @access public
+ */
+ function multiply($x)
+ {
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp = new static();
+ $temp->value = gmp_mul($this->value, $x->value);
+
+ return $this->_normalize($temp);
+ case self::MODE_BCMATH:
+ $temp = new static();
+ $temp->value = bcmul($this->value, $x->value, 0);
+
+ return $this->_normalize($temp);
+ }
+
+ $temp = $this->_multiply($this->value, $this->is_negative, $x->value, $x->is_negative);
+
+ $product = new static();
+ $product->value = $temp[self::VALUE];
+ $product->is_negative = $temp[self::SIGN];
+
+ return $this->_normalize($product);
+ }
+
+ /**
+ * Performs multiplication.
+ *
+ * @param array $x_value
+ * @param bool $x_negative
+ * @param array $y_value
+ * @param bool $y_negative
+ * @return array
+ * @access private
+ */
+ function _multiply($x_value, $x_negative, $y_value, $y_negative)
+ {
+ //if ( $x_value == $y_value ) {
+ // return array(
+ // self::VALUE => $this->_square($x_value),
+ // self::SIGN => $x_sign != $y_value
+ // );
+ //}
+
+ $x_length = count($x_value);
+ $y_length = count($y_value);
+
+ if (!$x_length || !$y_length) { // a 0 is being multiplied
+ return array(
+ self::VALUE => array(),
+ self::SIGN => false
+ );
+ }
+
+ return array(
+ self::VALUE => min($x_length, $y_length) < 2 * self::KARATSUBA_CUTOFF ?
+ $this->_trim($this->_regularMultiply($x_value, $y_value)) :
+ $this->_trim($this->_karatsuba($x_value, $y_value)),
+ self::SIGN => $x_negative != $y_negative
+ );
+ }
+
+ /**
+ * Performs long multiplication on two BigIntegers
+ *
+ * Modeled after 'multiply' in MutableBigInteger.java.
+ *
+ * @param array $x_value
+ * @param array $y_value
+ * @return array
+ * @access private
+ */
+ function _regularMultiply($x_value, $y_value)
+ {
+ $x_length = count($x_value);
+ $y_length = count($y_value);
+
+ if (!$x_length || !$y_length) { // a 0 is being multiplied
+ return array();
+ }
+
+ if ($x_length < $y_length) {
+ $temp = $x_value;
+ $x_value = $y_value;
+ $y_value = $temp;
+
+ $x_length = count($x_value);
+ $y_length = count($y_value);
+ }
+
+ $product_value = $this->_array_repeat(0, $x_length + $y_length);
+
+ // the following for loop could be removed if the for loop following it
+ // (the one with nested for loops) initially set $i to 0, but
+ // doing so would also make the result in one set of unnecessary adds,
+ // since on the outermost loops first pass, $product->value[$k] is going
+ // to always be 0
+
+ $carry = 0;
+
+ for ($j = 0; $j < $x_length; ++$j) { // ie. $i = 0
+ $temp = $x_value[$j] * $y_value[0] + $carry; // $product_value[$k] == 0
+ $carry = self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
+ $product_value[$j] = (int) ($temp - self::$baseFull * $carry);
+ }
+
+ $product_value[$j] = $carry;
+
+ // the above for loop is what the previous comment was talking about. the
+ // following for loop is the "one with nested for loops"
+ for ($i = 1; $i < $y_length; ++$i) {
+ $carry = 0;
+
+ for ($j = 0, $k = $i; $j < $x_length; ++$j, ++$k) {
+ $temp = $product_value[$k] + $x_value[$j] * $y_value[$i] + $carry;
+ $carry = self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
+ $product_value[$k] = (int) ($temp - self::$baseFull * $carry);
+ }
+
+ $product_value[$k] = $carry;
+ }
+
+ return $product_value;
+ }
+
+ /**
+ * Performs Karatsuba multiplication on two BigIntegers
+ *
+ * See {@link http://en.wikipedia.org/wiki/Karatsuba_algorithm Karatsuba algorithm} and
+ * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=120 MPM 5.2.3}.
+ *
+ * @param array $x_value
+ * @param array $y_value
+ * @return array
+ * @access private
*/
- public function multiply(BigInteger $x)
+ function _karatsuba($x_value, $y_value)
{
- return new static($this->value->multiply($x->value));
+ $m = min(count($x_value) >> 1, count($y_value) >> 1);
+
+ if ($m < self::KARATSUBA_CUTOFF) {
+ return $this->_regularMultiply($x_value, $y_value);
+ }
+
+ $x1 = array_slice($x_value, $m);
+ $x0 = array_slice($x_value, 0, $m);
+ $y1 = array_slice($y_value, $m);
+ $y0 = array_slice($y_value, 0, $m);
+
+ $z2 = $this->_karatsuba($x1, $y1);
+ $z0 = $this->_karatsuba($x0, $y0);
+
+ $z1 = $this->_add($x1, false, $x0, false);
+ $temp = $this->_add($y1, false, $y0, false);
+ $z1 = $this->_karatsuba($z1[self::VALUE], $temp[self::VALUE]);
+ $temp = $this->_add($z2, false, $z0, false);
+ $z1 = $this->_subtract($z1, false, $temp[self::VALUE], false);
+
+ $z2 = array_merge(array_fill(0, 2 * $m, 0), $z2);
+ $z1[self::VALUE] = array_merge(array_fill(0, $m, 0), $z1[self::VALUE]);
+
+ $xy = $this->_add($z2, false, $z1[self::VALUE], $z1[self::SIGN]);
+ $xy = $this->_add($xy[self::VALUE], $xy[self::SIGN], $z0, false);
+
+ return $xy[self::VALUE];
+ }
+
+ /**
+ * Performs squaring
+ *
+ * @param array $x
+ * @return array
+ * @access private
+ */
+ function _square($x = false)
+ {
+ return count($x) < 2 * self::KARATSUBA_CUTOFF ?
+ $this->_trim($this->_baseSquare($x)) :
+ $this->_trim($this->_karatsubaSquare($x));
+ }
+
+ /**
+ * Performs traditional squaring on two BigIntegers
+ *
+ * Squaring can be done faster than multiplying a number by itself can be. See
+ * {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=7 HAC 14.2.4} /
+ * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=141 MPM 5.3} for more information.
+ *
+ * @param array $value
+ * @return array
+ * @access private
+ */
+ function _baseSquare($value)
+ {
+ if (empty($value)) {
+ return array();
+ }
+ $square_value = $this->_array_repeat(0, 2 * count($value));
+
+ for ($i = 0, $max_index = count($value) - 1; $i <= $max_index; ++$i) {
+ $i2 = $i << 1;
+
+ $temp = $square_value[$i2] + $value[$i] * $value[$i];
+ $carry = self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
+ $square_value[$i2] = (int) ($temp - self::$baseFull * $carry);
+
+ // note how we start from $i+1 instead of 0 as we do in multiplication.
+ for ($j = $i + 1, $k = $i2 + 1; $j <= $max_index; ++$j, ++$k) {
+ $temp = $square_value[$k] + 2 * $value[$j] * $value[$i] + $carry;
+ $carry = self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
+ $square_value[$k] = (int) ($temp - self::$baseFull * $carry);
+ }
+
+ // the following line can yield values larger 2**15. at this point, PHP should switch
+ // over to floats.
+ $square_value[$i + $max_index + 1] = $carry;
+ }
+
+ return $square_value;
+ }
+
+ /**
+ * Performs Karatsuba "squaring" on two BigIntegers
+ *
+ * See {@link http://en.wikipedia.org/wiki/Karatsuba_algorithm Karatsuba algorithm} and
+ * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=151 MPM 5.3.4}.
+ *
+ * @param array $value
+ * @return array
+ * @access private
+ */
+ function _karatsubaSquare($value)
+ {
+ $m = count($value) >> 1;
+
+ if ($m < self::KARATSUBA_CUTOFF) {
+ return $this->_baseSquare($value);
+ }
+
+ $x1 = array_slice($value, $m);
+ $x0 = array_slice($value, 0, $m);
+
+ $z2 = $this->_karatsubaSquare($x1);
+ $z0 = $this->_karatsubaSquare($x0);
+
+ $z1 = $this->_add($x1, false, $x0, false);
+ $z1 = $this->_karatsubaSquare($z1[self::VALUE]);
+ $temp = $this->_add($z2, false, $z0, false);
+ $z1 = $this->_subtract($z1, false, $temp[self::VALUE], false);
+
+ $z2 = array_merge(array_fill(0, 2 * $m, 0), $z2);
+ $z1[self::VALUE] = array_merge(array_fill(0, $m, 0), $z1[self::VALUE]);
+
+ $xx = $this->_add($z2, false, $z1[self::VALUE], $z1[self::SIGN]);
+ $xx = $this->_add($xx[self::VALUE], $xx[self::SIGN], $z0, false);
+
+ return $xx[self::VALUE];
}
/**
@@ -279,8 +1403,8 @@ class BigInteger implements \Serializable
* Here's an example:
* <code>
* <?php
- * $a = new \phpseclib3\Math\BigInteger('10');
- * $b = new \phpseclib3\Math\BigInteger('20');
+ * $a = new \phpseclib\Math\BigInteger('10');
+ * $b = new \phpseclib\Math\BigInteger('20');
*
* list($quotient, $remainder) = $a->divide($b);
*
@@ -290,164 +1414,1265 @@ class BigInteger implements \Serializable
* ?>
* </code>
*
- * @param BigInteger $y
- * @return BigInteger[]
+ * @param \phpseclib\Math\BigInteger $y
+ * @return array
+ * @access public
+ * @internal This function is based off of {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=9 HAC 14.20}.
*/
- public function divide(BigInteger $y)
+ function divide($y)
{
- list($q, $r) = $this->value->divide($y->value);
- return [
- new static($q),
- new static($r)
- ];
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $quotient = new static();
+ $remainder = new static();
+
+ list($quotient->value, $remainder->value) = gmp_div_qr($this->value, $y->value);
+
+ if (gmp_sign($remainder->value) < 0) {
+ $remainder->value = gmp_add($remainder->value, gmp_abs($y->value));
+ }
+
+ return array($this->_normalize($quotient), $this->_normalize($remainder));
+ case self::MODE_BCMATH:
+ $quotient = new static();
+ $remainder = new static();
+
+ $quotient->value = bcdiv($this->value, $y->value, 0);
+ $remainder->value = bcmod($this->value, $y->value);
+
+ if ($remainder->value[0] == '-') {
+ $remainder->value = bcadd($remainder->value, $y->value[0] == '-' ? substr($y->value, 1) : $y->value, 0);
+ }
+
+ return array($this->_normalize($quotient), $this->_normalize($remainder));
+ }
+
+ if (count($y->value) == 1) {
+ list($q, $r) = $this->_divide_digit($this->value, $y->value[0]);
+ $quotient = new static();
+ $remainder = new static();
+ $quotient->value = $q;
+ $remainder->value = array($r);
+ $quotient->is_negative = $this->is_negative != $y->is_negative;
+ return array($this->_normalize($quotient), $this->_normalize($remainder));
+ }
+
+ static $zero;
+ if (!isset($zero)) {
+ $zero = new static();
+ }
+
+ $x = $this->copy();
+ $y = $y->copy();
+
+ $x_sign = $x->is_negative;
+ $y_sign = $y->is_negative;
+
+ $x->is_negative = $y->is_negative = false;
+
+ $diff = $x->compare($y);
+
+ if (!$diff) {
+ $temp = new static();
+ $temp->value = array(1);
+ $temp->is_negative = $x_sign != $y_sign;
+ return array($this->_normalize($temp), $this->_normalize(new static()));
+ }
+
+ if ($diff < 0) {
+ // if $x is negative, "add" $y.
+ if ($x_sign) {
+ $x = $y->subtract($x);
+ }
+ return array($this->_normalize(new static()), $this->_normalize($x));
+ }
+
+ // normalize $x and $y as described in HAC 14.23 / 14.24
+ $msb = $y->value[count($y->value) - 1];
+ for ($shift = 0; !($msb & self::$msb); ++$shift) {
+ $msb <<= 1;
+ }
+ $x->_lshift($shift);
+ $y->_lshift($shift);
+ $y_value = &$y->value;
+
+ $x_max = count($x->value) - 1;
+ $y_max = count($y->value) - 1;
+
+ $quotient = new static();
+ $quotient_value = &$quotient->value;
+ $quotient_value = $this->_array_repeat(0, $x_max - $y_max + 1);
+
+ static $temp, $lhs, $rhs;
+ if (!isset($temp)) {
+ $temp = new static();
+ $lhs = new static();
+ $rhs = new static();
+ }
+ $temp_value = &$temp->value;
+ $rhs_value = &$rhs->value;
+
+ // $temp = $y << ($x_max - $y_max-1) in base 2**26
+ $temp_value = array_merge($this->_array_repeat(0, $x_max - $y_max), $y_value);
+
+ while ($x->compare($temp) >= 0) {
+ // calculate the "common residue"
+ ++$quotient_value[$x_max - $y_max];
+ $x = $x->subtract($temp);
+ $x_max = count($x->value) - 1;
+ }
+
+ for ($i = $x_max; $i >= $y_max + 1; --$i) {
+ $x_value = &$x->value;
+ $x_window = array(
+ isset($x_value[$i]) ? $x_value[$i] : 0,
+ isset($x_value[$i - 1]) ? $x_value[$i - 1] : 0,
+ isset($x_value[$i - 2]) ? $x_value[$i - 2] : 0
+ );
+ $y_window = array(
+ $y_value[$y_max],
+ ($y_max > 0) ? $y_value[$y_max - 1] : 0
+ );
+
+ $q_index = $i - $y_max - 1;
+ if ($x_window[0] == $y_window[0]) {
+ $quotient_value[$q_index] = self::$maxDigit;
+ } else {
+ $quotient_value[$q_index] = $this->_safe_divide(
+ $x_window[0] * self::$baseFull + $x_window[1],
+ $y_window[0]
+ );
+ }
+
+ $temp_value = array($y_window[1], $y_window[0]);
+
+ $lhs->value = array($quotient_value[$q_index]);
+ $lhs = $lhs->multiply($temp);
+
+ $rhs_value = array($x_window[2], $x_window[1], $x_window[0]);
+
+ while ($lhs->compare($rhs) > 0) {
+ --$quotient_value[$q_index];
+
+ $lhs->value = array($quotient_value[$q_index]);
+ $lhs = $lhs->multiply($temp);
+ }
+
+ $adjust = $this->_array_repeat(0, $q_index);
+ $temp_value = array($quotient_value[$q_index]);
+ $temp = $temp->multiply($y);
+ $temp_value = &$temp->value;
+ if (count($temp_value)) {
+ $temp_value = array_merge($adjust, $temp_value);
+ }
+
+ $x = $x->subtract($temp);
+
+ if ($x->compare($zero) < 0) {
+ $temp_value = array_merge($adjust, $y_value);
+ $x = $x->add($temp);
+
+ --$quotient_value[$q_index];
+ }
+
+ $x_max = count($x_value) - 1;
+ }
+
+ // unnormalize the remainder
+ $x->_rshift($shift);
+
+ $quotient->is_negative = $x_sign != $y_sign;
+
+ // calculate the "common residue", if appropriate
+ if ($x_sign) {
+ $y->_rshift($shift);
+ $x = $y->subtract($x);
+ }
+
+ return array($this->_normalize($quotient), $this->_normalize($x));
}
/**
- * Calculates modular inverses.
+ * Divides a BigInteger by a regular integer
*
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- * @return BigInteger
- * @param BigInteger $n
+ * abc / x = a00 / x + b0 / x + c / x
+ *
+ * @param array $dividend
+ * @param array $divisor
+ * @return array
+ * @access private
*/
- public function modInverse(BigInteger $n)
+ function _divide_digit($dividend, $divisor)
{
- return new static($this->value->modInverse($n->value));
+ $carry = 0;
+ $result = array();
+
+ for ($i = count($dividend) - 1; $i >= 0; --$i) {
+ $temp = self::$baseFull * $carry + $dividend[$i];
+ $result[$i] = $this->_safe_divide($temp, $divisor);
+ $carry = (int) ($temp - $divisor * $result[$i]);
+ }
+
+ return array($result, $carry);
}
/**
- * Calculates modular inverses.
+ * Performs modular exponentiation.
*
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- * @return BigInteger[]
- * @param BigInteger $n
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger('10');
+ * $b = new \phpseclib\Math\BigInteger('20');
+ * $c = new \phpseclib\Math\BigInteger('30');
+ *
+ * $c = $a->modPow($b, $c);
+ *
+ * echo $c->toString(); // outputs 10
+ * ?>
+ * </code>
+ *
+ * @param \phpseclib\Math\BigInteger $e
+ * @param \phpseclib\Math\BigInteger $n
+ * @return \phpseclib\Math\BigInteger
+ * @access public
+ * @internal The most naive approach to modular exponentiation has very unreasonable requirements, and
+ * and although the approach involving repeated squaring does vastly better, it, too, is impractical
+ * for our purposes. The reason being that division - by far the most complicated and time-consuming
+ * of the basic operations (eg. +,-,*,/) - occurs multiple times within it.
+ *
+ * Modular reductions resolve this issue. Although an individual modular reduction takes more time
+ * then an individual division, when performed in succession (with the same modulo), they're a lot faster.
+ *
+ * The two most commonly used modular reductions are Barrett and Montgomery reduction. Montgomery reduction,
+ * although faster, only works when the gcd of the modulo and of the base being used is 1. In RSA, when the
+ * base is a power of two, the modulo - a product of two primes - is always going to have a gcd of 1 (because
+ * the product of two odd numbers is odd), but what about when RSA isn't used?
+ *
+ * In contrast, Barrett reduction has no such constraint. As such, some bigint implementations perform a
+ * Barrett reduction after every operation in the modpow function. Others perform Barrett reductions when the
+ * modulo is even and Montgomery reductions when the modulo is odd. BigInteger.java's modPow method, however,
+ * uses a trick involving the Chinese Remainder Theorem to factor the even modulo into two numbers - one odd and
+ * the other, a power of two - and recombine them, later. This is the method that this modPow function uses.
+ * {@link http://islab.oregonstate.edu/papers/j34monex.pdf Montgomery Reduction with Even Modulus} elaborates.
*/
- public function extendedGCD(BigInteger $n)
+ function modPow($e, $n)
{
- extract($this->value->extendedGCD($n->value));
- /**
- * @var BigInteger $gcd
- * @var BigInteger $x
- * @var BigInteger $y
- */
- return [
- 'gcd' => new static($gcd),
- 'x' => new static($x),
- 'y' => new static($y)
- ];
+ $n = $this->bitmask !== false && $this->bitmask->compare($n) < 0 ? $this->bitmask : $n->abs();
+
+ if ($e->compare(new static()) < 0) {
+ $e = $e->abs();
+
+ $temp = $this->modInverse($n);
+ if ($temp === false) {
+ return false;
+ }
+
+ return $this->_normalize($temp->modPow($e, $n));
+ }
+
+ if (MATH_BIGINTEGER_MODE == self::MODE_GMP) {
+ $temp = new static();
+ $temp->value = gmp_powm($this->value, $e->value, $n->value);
+
+ return $this->_normalize($temp);
+ }
+
+ if ($this->compare(new static()) < 0 || $this->compare($n) > 0) {
+ list(, $temp) = $this->divide($n);
+ return $temp->modPow($e, $n);
+ }
+
+ if (defined('MATH_BIGINTEGER_OPENSSL_ENABLED')) {
+ $components = array(
+ 'modulus' => $n->toBytes(true),
+ 'publicExponent' => $e->toBytes(true)
+ );
+
+ $components = array(
+ 'modulus' => pack('Ca*a*', 2, $this->_encodeASN1Length(strlen($components['modulus'])), $components['modulus']),
+ 'publicExponent' => pack('Ca*a*', 2, $this->_encodeASN1Length(strlen($components['publicExponent'])), $components['publicExponent'])
+ );
+
+ $RSAPublicKey = pack(
+ 'Ca*a*a*',
+ 48,
+ $this->_encodeASN1Length(strlen($components['modulus']) + strlen($components['publicExponent'])),
+ $components['modulus'],
+ $components['publicExponent']
+ );
+
+ $rsaOID = pack('H*', '300d06092a864886f70d0101010500'); // hex version of MA0GCSqGSIb3DQEBAQUA
+ $RSAPublicKey = chr(0) . $RSAPublicKey;
+ $RSAPublicKey = chr(3) . $this->_encodeASN1Length(strlen($RSAPublicKey)) . $RSAPublicKey;
+
+ $encapsulated = pack(
+ 'Ca*a*',
+ 48,
+ $this->_encodeASN1Length(strlen($rsaOID . $RSAPublicKey)),
+ $rsaOID . $RSAPublicKey
+ );
+
+ $RSAPublicKey = "-----BEGIN PUBLIC KEY-----\r\n" .
+ chunk_split(base64_encode($encapsulated)) .
+ '-----END PUBLIC KEY-----';
+
+ $plaintext = str_pad($this->toBytes(), strlen($n->toBytes(true)) - 1, "\0", STR_PAD_LEFT);
+
+ if (openssl_public_encrypt($plaintext, $result, $RSAPublicKey, OPENSSL_NO_PADDING)) {
+ return new static($result, 256);
+ }
+ }
+
+ if (MATH_BIGINTEGER_MODE == self::MODE_BCMATH) {
+ $temp = new static();
+ $temp->value = bcpowmod($this->value, $e->value, $n->value, 0);
+
+ return $this->_normalize($temp);
+ }
+
+ if (empty($e->value)) {
+ $temp = new static();
+ $temp->value = array(1);
+ return $this->_normalize($temp);
+ }
+
+ if ($e->value == array(1)) {
+ list(, $temp) = $this->divide($n);
+ return $this->_normalize($temp);
+ }
+
+ if ($e->value == array(2)) {
+ $temp = new static();
+ $temp->value = $this->_square($this->value);
+ list(, $temp) = $temp->divide($n);
+ return $this->_normalize($temp);
+ }
+
+ return $this->_normalize($this->_slidingWindow($e, $n, self::BARRETT));
+
+ // the following code, although not callable, can be run independently of the above code
+ // although the above code performed better in my benchmarks the following could might
+ // perform better under different circumstances. in lieu of deleting it it's just been
+ // made uncallable
+
+ // is the modulo odd?
+ if ($n->value[0] & 1) {
+ return $this->_normalize($this->_slidingWindow($e, $n, self::MONTGOMERY));
+ }
+ // if it's not, it's even
+
+ // find the lowest set bit (eg. the max pow of 2 that divides $n)
+ for ($i = 0; $i < count($n->value); ++$i) {
+ if ($n->value[$i]) {
+ $temp = decbin($n->value[$i]);
+ $j = strlen($temp) - strrpos($temp, '1') - 1;
+ $j+= 26 * $i;
+ break;
+ }
+ }
+ // at this point, 2^$j * $n/(2^$j) == $n
+
+ $mod1 = $n->copy();
+ $mod1->_rshift($j);
+ $mod2 = new static();
+ $mod2->value = array(1);
+ $mod2->_lshift($j);
+
+ $part1 = ($mod1->value != array(1)) ? $this->_slidingWindow($e, $mod1, self::MONTGOMERY) : new static();
+ $part2 = $this->_slidingWindow($e, $mod2, self::POWEROF2);
+
+ $y1 = $mod2->modInverse($mod1);
+ $y2 = $mod1->modInverse($mod2);
+
+ $result = $part1->multiply($mod2);
+ $result = $result->multiply($y1);
+
+ $temp = $part2->multiply($mod1);
+ $temp = $temp->multiply($y2);
+
+ $result = $result->add($temp);
+ list(, $result) = $result->divide($n);
+
+ return $this->_normalize($result);
}
/**
- * Calculates the greatest common divisor
+ * Performs modular exponentiation.
*
- * Say you have 693 and 609. The GCD is 21.
+ * Alias for modPow().
*
- * @param BigInteger $n
- * @return BigInteger
+ * @param \phpseclib\Math\BigInteger $e
+ * @param \phpseclib\Math\BigInteger $n
+ * @return \phpseclib\Math\BigInteger
+ * @access public
*/
- public function gcd(BigInteger $n)
+ function powMod($e, $n)
{
- return new static($this->value->gcd($n->value));
+ return $this->modPow($e, $n);
}
/**
- * Absolute value.
+ * Sliding Window k-ary Modular Exponentiation
+ *
+ * Based on {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=27 HAC 14.85} /
+ * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=210 MPM 7.7}. In a departure from those algorithims,
+ * however, this function performs a modular reduction after every multiplication and squaring operation.
+ * As such, this function has the same preconditions that the reductions being used do.
+ *
+ * @param \phpseclib\Math\BigInteger $e
+ * @param \phpseclib\Math\BigInteger $n
+ * @param int $mode
+ * @return \phpseclib\Math\BigInteger
+ * @access private
+ */
+ function _slidingWindow($e, $n, $mode)
+ {
+ static $window_ranges = array(7, 25, 81, 241, 673, 1793); // from BigInteger.java's oddModPow function
+ //static $window_ranges = array(0, 7, 36, 140, 450, 1303, 3529); // from MPM 7.3.1
+
+ $e_value = $e->value;
+ $e_length = count($e_value) - 1;
+ $e_bits = decbin($e_value[$e_length]);
+ for ($i = $e_length - 1; $i >= 0; --$i) {
+ $e_bits.= str_pad(decbin($e_value[$i]), self::$base, '0', STR_PAD_LEFT);
+ }
+
+ $e_length = strlen($e_bits);
+
+ // calculate the appropriate window size.
+ // $window_size == 3 if $window_ranges is between 25 and 81, for example.
+ for ($i = 0, $window_size = 1; $i < count($window_ranges) && $e_length > $window_ranges[$i]; ++$window_size, ++$i) {
+ }
+
+ $n_value = $n->value;
+
+ // precompute $this^0 through $this^$window_size
+ $powers = array();
+ $powers[1] = $this->_prepareReduce($this->value, $n_value, $mode);
+ $powers[2] = $this->_squareReduce($powers[1], $n_value, $mode);
+
+ // we do every other number since substr($e_bits, $i, $j+1) (see below) is supposed to end
+ // in a 1. ie. it's supposed to be odd.
+ $temp = 1 << ($window_size - 1);
+ for ($i = 1; $i < $temp; ++$i) {
+ $i2 = $i << 1;
+ $powers[$i2 + 1] = $this->_multiplyReduce($powers[$i2 - 1], $powers[2], $n_value, $mode);
+ }
+
+ $result = array(1);
+ $result = $this->_prepareReduce($result, $n_value, $mode);
+
+ for ($i = 0; $i < $e_length;) {
+ if (!$e_bits[$i]) {
+ $result = $this->_squareReduce($result, $n_value, $mode);
+ ++$i;
+ } else {
+ for ($j = $window_size - 1; $j > 0; --$j) {
+ if (!empty($e_bits[$i + $j])) {
+ break;
+ }
+ }
+
+ // eg. the length of substr($e_bits, $i, $j + 1)
+ for ($k = 0; $k <= $j; ++$k) {
+ $result = $this->_squareReduce($result, $n_value, $mode);
+ }
+
+ $result = $this->_multiplyReduce($result, $powers[bindec(substr($e_bits, $i, $j + 1))], $n_value, $mode);
+
+ $i += $j + 1;
+ }
+ }
+
+ $temp = new static();
+ $temp->value = $this->_reduce($result, $n_value, $mode);
+
+ return $temp;
+ }
+
+ /**
+ * Modular reduction
*
- * @return BigInteger
- * @access public
+ * For most $modes this will return the remainder.
+ *
+ * @see self::_slidingWindow()
+ * @access private
+ * @param array $x
+ * @param array $n
+ * @param int $mode
+ * @return array
*/
- public function abs()
+ function _reduce($x, $n, $mode)
{
- return new static($this->value->abs());
+ switch ($mode) {
+ case self::MONTGOMERY:
+ return $this->_montgomery($x, $n);
+ case self::BARRETT:
+ return $this->_barrett($x, $n);
+ case self::POWEROF2:
+ $lhs = new static();
+ $lhs->value = $x;
+ $rhs = new static();
+ $rhs->value = $n;
+ return $x->_mod2($n);
+ case self::CLASSIC:
+ $lhs = new static();
+ $lhs->value = $x;
+ $rhs = new static();
+ $rhs->value = $n;
+ list(, $temp) = $lhs->divide($rhs);
+ return $temp->value;
+ case self::NONE:
+ return $x;
+ default:
+ // an invalid $mode was provided
+ }
}
/**
- * Set Precision
+ * Modular reduction preperation
+ *
+ * @see self::_slidingWindow()
+ * @access private
+ * @param array $x
+ * @param array $n
+ * @param int $mode
+ * @return array
+ */
+ function _prepareReduce($x, $n, $mode)
+ {
+ if ($mode == self::MONTGOMERY) {
+ return $this->_prepMontgomery($x, $n);
+ }
+ return $this->_reduce($x, $n, $mode);
+ }
+
+ /**
+ * Modular multiply
+ *
+ * @see self::_slidingWindow()
+ * @access private
+ * @param array $x
+ * @param array $y
+ * @param array $n
+ * @param int $mode
+ * @return array
+ */
+ function _multiplyReduce($x, $y, $n, $mode)
+ {
+ if ($mode == self::MONTGOMERY) {
+ return $this->_montgomeryMultiply($x, $y, $n);
+ }
+ $temp = $this->_multiply($x, false, $y, false);
+ return $this->_reduce($temp[self::VALUE], $n, $mode);
+ }
+
+ /**
+ * Modular square
+ *
+ * @see self::_slidingWindow()
+ * @access private
+ * @param array $x
+ * @param array $n
+ * @param int $mode
+ * @return array
+ */
+ function _squareReduce($x, $n, $mode)
+ {
+ if ($mode == self::MONTGOMERY) {
+ return $this->_montgomeryMultiply($x, $x, $n);
+ }
+ return $this->_reduce($this->_square($x), $n, $mode);
+ }
+
+ /**
+ * Modulos for Powers of Two
*
- * Some bitwise operations give different results depending on the precision being used. Examples include left
- * shift, not, and rotates.
+ * Calculates $x%$n, where $n = 2**$e, for some $e. Since this is basically the same as doing $x & ($n-1),
+ * we'll just use this function as a wrapper for doing that.
*
- * @param int $bits
+ * @see self::_slidingWindow()
+ * @access private
+ * @param \phpseclib\Math\BigInteger $n
+ * @return \phpseclib\Math\BigInteger
*/
- public function setPrecision($bits)
+ function _mod2($n)
{
- $this->value->setPrecision($bits);
+ $temp = new static();
+ $temp->value = array(1);
+ return $this->bitwise_and($n->subtract($temp));
+ }
+
+ /**
+ * Barrett Modular Reduction
+ *
+ * See {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=14 HAC 14.3.3} /
+ * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=165 MPM 6.2.5} for more information. Modified slightly,
+ * so as not to require negative numbers (initially, this script didn't support negative numbers).
+ *
+ * Employs "folding", as described at
+ * {@link http://www.cosic.esat.kuleuven.be/publications/thesis-149.pdf#page=66 thesis-149.pdf#page=66}. To quote from
+ * it, "the idea [behind folding] is to find a value x' such that x (mod m) = x' (mod m), with x' being smaller than x."
+ *
+ * Unfortunately, the "Barrett Reduction with Folding" algorithm described in thesis-149.pdf is not, as written, all that
+ * usable on account of (1) its not using reasonable radix points as discussed in
+ * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=162 MPM 6.2.2} and (2) the fact that, even with reasonable
+ * radix points, it only works when there are an even number of digits in the denominator. The reason for (2) is that
+ * (x >> 1) + (x >> 1) != x / 2 + x / 2. If x is even, they're the same, but if x is odd, they're not. See the in-line
+ * comments for details.
+ *
+ * @see self::_slidingWindow()
+ * @access private
+ * @param array $n
+ * @param array $m
+ * @return array
+ */
+ function _barrett($n, $m)
+ {
+ static $cache = array(
+ self::VARIABLE => array(),
+ self::DATA => array()
+ );
+
+ $m_length = count($m);
+
+ // if ($this->_compare($n, $this->_square($m)) >= 0) {
+ if (count($n) > 2 * $m_length) {
+ $lhs = new static();
+ $rhs = new static();
+ $lhs->value = $n;
+ $rhs->value = $m;
+ list(, $temp) = $lhs->divide($rhs);
+ return $temp->value;
+ }
+
+ // if (m.length >> 1) + 2 <= m.length then m is too small and n can't be reduced
+ if ($m_length < 5) {
+ return $this->_regularBarrett($n, $m);
+ }
+
+ // n = 2 * m.length
+
+ if (($key = array_search($m, $cache[self::VARIABLE])) === false) {
+ $key = count($cache[self::VARIABLE]);
+ $cache[self::VARIABLE][] = $m;
+
+ $lhs = new static();
+ $lhs_value = &$lhs->value;
+ $lhs_value = $this->_array_repeat(0, $m_length + ($m_length >> 1));
+ $lhs_value[] = 1;
+ $rhs = new static();
+ $rhs->value = $m;
+
+ list($u, $m1) = $lhs->divide($rhs);
+ $u = $u->value;
+ $m1 = $m1->value;
+
+ $cache[self::DATA][] = array(
+ 'u' => $u, // m.length >> 1 (technically (m.length >> 1) + 1)
+ 'm1'=> $m1 // m.length
+ );
+ } else {
+ extract($cache[self::DATA][$key]);
+ }
+
+ $cutoff = $m_length + ($m_length >> 1);
+ $lsd = array_slice($n, 0, $cutoff); // m.length + (m.length >> 1)
+ $msd = array_slice($n, $cutoff); // m.length >> 1
+ $lsd = $this->_trim($lsd);
+ $temp = $this->_multiply($msd, false, $m1, false);
+ $n = $this->_add($lsd, false, $temp[self::VALUE], false); // m.length + (m.length >> 1) + 1
+
+ if ($m_length & 1) {
+ return $this->_regularBarrett($n[self::VALUE], $m);
+ }
+
+ // (m.length + (m.length >> 1) + 1) - (m.length - 1) == (m.length >> 1) + 2
+ $temp = array_slice($n[self::VALUE], $m_length - 1);
+ // if even: ((m.length >> 1) + 2) + (m.length >> 1) == m.length + 2
+ // if odd: ((m.length >> 1) + 2) + (m.length >> 1) == (m.length - 1) + 2 == m.length + 1
+ $temp = $this->_multiply($temp, false, $u, false);
+ // if even: (m.length + 2) - ((m.length >> 1) + 1) = m.length - (m.length >> 1) + 1
+ // if odd: (m.length + 1) - ((m.length >> 1) + 1) = m.length - (m.length >> 1)
+ $temp = array_slice($temp[self::VALUE], ($m_length >> 1) + 1);
+ // if even: (m.length - (m.length >> 1) + 1) + m.length = 2 * m.length - (m.length >> 1) + 1
+ // if odd: (m.length - (m.length >> 1)) + m.length = 2 * m.length - (m.length >> 1)
+ $temp = $this->_multiply($temp, false, $m, false);
+
+ // at this point, if m had an odd number of digits, we'd be subtracting a 2 * m.length - (m.length >> 1) digit
+ // number from a m.length + (m.length >> 1) + 1 digit number. ie. there'd be an extra digit and the while loop
+ // following this comment would loop a lot (hence our calling _regularBarrett() in that situation).
+
+ $result = $this->_subtract($n[self::VALUE], false, $temp[self::VALUE], false);
+
+ while ($this->_compare($result[self::VALUE], $result[self::SIGN], $m, false) >= 0) {
+ $result = $this->_subtract($result[self::VALUE], $result[self::SIGN], $m, false);
+ }
+
+ return $result[self::VALUE];
}
/**
- * Get Precision
+ * (Regular) Barrett Modular Reduction
*
- * Returns the precision if it exists, false if it doesn't
+ * For numbers with more than four digits BigInteger::_barrett() is faster. The difference between that and this
+ * is that this function does not fold the denominator into a smaller form.
*
- * @return int|bool
+ * @see self::_slidingWindow()
+ * @access private
+ * @param array $x
+ * @param array $n
+ * @return array
+ */
+ function _regularBarrett($x, $n)
+ {
+ static $cache = array(
+ self::VARIABLE => array(),
+ self::DATA => array()
+ );
+
+ $n_length = count($n);
+
+ if (count($x) > 2 * $n_length) {
+ $lhs = new static();
+ $rhs = new static();
+ $lhs->value = $x;
+ $rhs->value = $n;
+ list(, $temp) = $lhs->divide($rhs);
+ return $temp->value;
+ }
+
+ if (($key = array_search($n, $cache[self::VARIABLE])) === false) {
+ $key = count($cache[self::VARIABLE]);
+ $cache[self::VARIABLE][] = $n;
+ $lhs = new static();
+ $lhs_value = &$lhs->value;
+ $lhs_value = $this->_array_repeat(0, 2 * $n_length);
+ $lhs_value[] = 1;
+ $rhs = new static();
+ $rhs->value = $n;
+ list($temp, ) = $lhs->divide($rhs); // m.length
+ $cache[self::DATA][] = $temp->value;
+ }
+
+ // 2 * m.length - (m.length - 1) = m.length + 1
+ $temp = array_slice($x, $n_length - 1);
+ // (m.length + 1) + m.length = 2 * m.length + 1
+ $temp = $this->_multiply($temp, false, $cache[self::DATA][$key], false);
+ // (2 * m.length + 1) - (m.length - 1) = m.length + 2
+ $temp = array_slice($temp[self::VALUE], $n_length + 1);
+
+ // m.length + 1
+ $result = array_slice($x, 0, $n_length + 1);
+ // m.length + 1
+ $temp = $this->_multiplyLower($temp, false, $n, false, $n_length + 1);
+ // $temp == array_slice($temp->_multiply($temp, false, $n, false)->value, 0, $n_length + 1)
+
+ if ($this->_compare($result, false, $temp[self::VALUE], $temp[self::SIGN]) < 0) {
+ $corrector_value = $this->_array_repeat(0, $n_length + 1);
+ $corrector_value[count($corrector_value)] = 1;
+ $result = $this->_add($result, false, $corrector_value, false);
+ $result = $result[self::VALUE];
+ }
+
+ // at this point, we're subtracting a number with m.length + 1 digits from another number with m.length + 1 digits
+ $result = $this->_subtract($result, false, $temp[self::VALUE], $temp[self::SIGN]);
+ while ($this->_compare($result[self::VALUE], $result[self::SIGN], $n, false) > 0) {
+ $result = $this->_subtract($result[self::VALUE], $result[self::SIGN], $n, false);
+ }
+
+ return $result[self::VALUE];
+ }
+
+ /**
+ * Performs long multiplication up to $stop digits
+ *
+ * If you're going to be doing array_slice($product->value, 0, $stop), some cycles can be saved.
+ *
+ * @see self::_regularBarrett()
+ * @param array $x_value
+ * @param bool $x_negative
+ * @param array $y_value
+ * @param bool $y_negative
+ * @param int $stop
+ * @return array
+ * @access private
+ */
+ function _multiplyLower($x_value, $x_negative, $y_value, $y_negative, $stop)
+ {
+ $x_length = count($x_value);
+ $y_length = count($y_value);
+
+ if (!$x_length || !$y_length) { // a 0 is being multiplied
+ return array(
+ self::VALUE => array(),
+ self::SIGN => false
+ );
+ }
+
+ if ($x_length < $y_length) {
+ $temp = $x_value;
+ $x_value = $y_value;
+ $y_value = $temp;
+
+ $x_length = count($x_value);
+ $y_length = count($y_value);
+ }
+
+ $product_value = $this->_array_repeat(0, $x_length + $y_length);
+
+ // the following for loop could be removed if the for loop following it
+ // (the one with nested for loops) initially set $i to 0, but
+ // doing so would also make the result in one set of unnecessary adds,
+ // since on the outermost loops first pass, $product->value[$k] is going
+ // to always be 0
+
+ $carry = 0;
+
+ for ($j = 0; $j < $x_length; ++$j) { // ie. $i = 0, $k = $i
+ $temp = $x_value[$j] * $y_value[0] + $carry; // $product_value[$k] == 0
+ $carry = self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
+ $product_value[$j] = (int) ($temp - self::$baseFull * $carry);
+ }
+
+ if ($j < $stop) {
+ $product_value[$j] = $carry;
+ }
+
+ // the above for loop is what the previous comment was talking about. the
+ // following for loop is the "one with nested for loops"
+
+ for ($i = 1; $i < $y_length; ++$i) {
+ $carry = 0;
+
+ for ($j = 0, $k = $i; $j < $x_length && $k < $stop; ++$j, ++$k) {
+ $temp = $product_value[$k] + $x_value[$j] * $y_value[$i] + $carry;
+ $carry = self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
+ $product_value[$k] = (int) ($temp - self::$baseFull * $carry);
+ }
+
+ if ($k < $stop) {
+ $product_value[$k] = $carry;
+ }
+ }
+
+ return array(
+ self::VALUE => $this->_trim($product_value),
+ self::SIGN => $x_negative != $y_negative
+ );
+ }
+
+ /**
+ * Montgomery Modular Reduction
+ *
+ * ($x->_prepMontgomery($n))->_montgomery($n) yields $x % $n.
+ * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=170 MPM 6.3} provides insights on how this can be
+ * improved upon (basically, by using the comba method). gcd($n, 2) must be equal to one for this function
+ * to work correctly.
+ *
+ * @see self::_prepMontgomery()
+ * @see self::_slidingWindow()
+ * @access private
+ * @param array $x
+ * @param array $n
+ * @return array
+ */
+ function _montgomery($x, $n)
+ {
+ static $cache = array(
+ self::VARIABLE => array(),
+ self::DATA => array()
+ );
+
+ if (($key = array_search($n, $cache[self::VARIABLE])) === false) {
+ $key = count($cache[self::VARIABLE]);
+ $cache[self::VARIABLE][] = $x;
+ $cache[self::DATA][] = $this->_modInverse67108864($n);
+ }
+
+ $k = count($n);
+
+ $result = array(self::VALUE => $x);
+
+ for ($i = 0; $i < $k; ++$i) {
+ $temp = $result[self::VALUE][$i] * $cache[self::DATA][$key];
+ $temp = $temp - self::$baseFull * (self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31));
+ $temp = $this->_regularMultiply(array($temp), $n);
+ $temp = array_merge($this->_array_repeat(0, $i), $temp);
+ $result = $this->_add($result[self::VALUE], false, $temp, false);
+ }
+
+ $result[self::VALUE] = array_slice($result[self::VALUE], $k);
+
+ if ($this->_compare($result, false, $n, false) >= 0) {
+ $result = $this->_subtract($result[self::VALUE], false, $n, false);
+ }
+
+ return $result[self::VALUE];
+ }
+
+ /**
+ * Montgomery Multiply
+ *
+ * Interleaves the montgomery reduction and long multiplication algorithms together as described in
+ * {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=13 HAC 14.36}
+ *
+ * @see self::_prepMontgomery()
+ * @see self::_montgomery()
+ * @access private
+ * @param array $x
+ * @param array $y
+ * @param array $m
+ * @return array
*/
- public function getPrecision()
+ function _montgomeryMultiply($x, $y, $m)
{
- return $this->value->getPrecision();
+ $temp = $this->_multiply($x, false, $y, false);
+ return $this->_montgomery($temp[self::VALUE], $m);
+
+ // the following code, although not callable, can be run independently of the above code
+ // although the above code performed better in my benchmarks the following could might
+ // perform better under different circumstances. in lieu of deleting it it's just been
+ // made uncallable
+
+ static $cache = array(
+ self::VARIABLE => array(),
+ self::DATA => array()
+ );
+
+ if (($key = array_search($m, $cache[self::VARIABLE])) === false) {
+ $key = count($cache[self::VARIABLE]);
+ $cache[self::VARIABLE][] = $m;
+ $cache[self::DATA][] = $this->_modInverse67108864($m);
+ }
+
+ $n = max(count($x), count($y), count($m));
+ $x = array_pad($x, $n, 0);
+ $y = array_pad($y, $n, 0);
+ $m = array_pad($m, $n, 0);
+ $a = array(self::VALUE => $this->_array_repeat(0, $n + 1));
+ for ($i = 0; $i < $n; ++$i) {
+ $temp = $a[self::VALUE][0] + $x[$i] * $y[0];
+ $temp = $temp - self::$baseFull * (self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31));
+ $temp = $temp * $cache[self::DATA][$key];
+ $temp = $temp - self::$baseFull * (self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31));
+ $temp = $this->_add($this->_regularMultiply(array($x[$i]), $y), false, $this->_regularMultiply(array($temp), $m), false);
+ $a = $this->_add($a[self::VALUE], false, $temp[self::VALUE], false);
+ $a[self::VALUE] = array_slice($a[self::VALUE], 1);
+ }
+ if ($this->_compare($a[self::VALUE], false, $m, false) >= 0) {
+ $a = $this->_subtract($a[self::VALUE], false, $m, false);
+ }
+ return $a[self::VALUE];
+ }
+
+ /**
+ * Prepare a number for use in Montgomery Modular Reductions
+ *
+ * @see self::_montgomery()
+ * @see self::_slidingWindow()
+ * @access private
+ * @param array $x
+ * @param array $n
+ * @return array
+ */
+ function _prepMontgomery($x, $n)
+ {
+ $lhs = new static();
+ $lhs->value = array_merge($this->_array_repeat(0, count($n)), $x);
+ $rhs = new static();
+ $rhs->value = $n;
+
+ list(, $temp) = $lhs->divide($rhs);
+ return $temp->value;
}
/**
- * Serialize
+ * Modular Inverse of a number mod 2**26 (eg. 67108864)
*
- * Will be called, automatically, when serialize() is called on a BigInteger object.
+ * Based off of the bnpInvDigit function implemented and justified in the following URL:
*
- * phpseclib 1.0 serialized strings look like this:
- * O:15:"Math_BigInteger":1:{s:3:"hex";s:18:"00ab54a98ceb1f0ad2";}
+ * {@link http://www-cs-students.stanford.edu/~tjw/jsbn/jsbn.js}
*
- * phpseclib 3.0 serialized strings look like this:
- * C:25:"phpseclib\Math\BigInteger":42:{a:1:{s:3:"hex";s:18:"00ab54a98ceb1f0ad2";}}
+ * The following URL provides more info:
*
- * @return string
+ * {@link http://groups.google.com/group/sci.crypt/msg/7a137205c1be7d85}
+ *
+ * As for why we do all the bitmasking... strange things can happen when converting from floats to ints. For
+ * instance, on some computers, var_dump((int) -4294967297) yields int(-1) and on others, it yields
+ * int(-2147483648). To avoid problems stemming from this, we use bitmasks to guarantee that ints aren't
+ * auto-converted to floats. The outermost bitmask is present because without it, there's no guarantee that
+ * the "residue" returned would be the so-called "common residue". We use fmod, in the last step, because the
+ * maximum possible $x is 26 bits and the maximum $result is 16 bits. Thus, we have to be able to handle up to
+ * 40 bits, which only 64-bit floating points will support.
+ *
+ * Thanks to Pedro Gimeno Fortea for input!
+ *
+ * @see self::_montgomery()
+ * @access private
+ * @param array $x
+ * @return int
+ */
+ function _modInverse67108864($x) // 2**26 == 67,108,864
+ {
+ $x = -$x[0];
+ $result = $x & 0x3; // x**-1 mod 2**2
+ $result = ($result * (2 - $x * $result)) & 0xF; // x**-1 mod 2**4
+ $result = ($result * (2 - ($x & 0xFF) * $result)) & 0xFF; // x**-1 mod 2**8
+ $result = ($result * ((2 - ($x & 0xFFFF) * $result) & 0xFFFF)) & 0xFFFF; // x**-1 mod 2**16
+ $result = fmod($result * (2 - fmod($x * $result, self::$baseFull)), self::$baseFull); // x**-1 mod 2**26
+ return $result & self::$maxDigit;
+ }
+
+ /**
+ * Calculates modular inverses.
+ *
+ * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
+ *
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger(30);
+ * $b = new \phpseclib\Math\BigInteger(17);
+ *
+ * $c = $a->modInverse($b);
+ * echo $c->toString(); // outputs 4
+ *
+ * echo "\r\n";
+ *
+ * $d = $a->multiply($c);
+ * list(, $d) = $d->divide($b);
+ * echo $d; // outputs 1 (as per the definition of modular inverse)
+ * ?>
+ * </code>
+ *
+ * @param \phpseclib\Math\BigInteger $n
+ * @return \phpseclib\Math\BigInteger|false
+ * @access public
+ * @internal See {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=21 HAC 14.64} for more information.
*/
- public function serialize()
+ function modInverse($n)
{
- $val = ['hex' => $this->toHex(true)];
- $precision = $this->value->getPrecision();
- if ($precision > 0) {
- $val['precision'] = $precision;
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp = new static();
+ $temp->value = gmp_invert($this->value, $n->value);
+
+ return ($temp->value === false) ? false : $this->_normalize($temp);
+ }
+
+ static $zero, $one;
+ if (!isset($zero)) {
+ $zero = new static();
+ $one = new static(1);
+ }
+
+ // $x mod -$n == $x mod $n.
+ $n = $n->abs();
+
+ if ($this->compare($zero) < 0) {
+ $temp = $this->abs();
+ $temp = $temp->modInverse($n);
+ return $this->_normalize($n->subtract($temp));
+ }
+
+ extract($this->extendedGCD($n));
+
+ if (!$gcd->equals($one)) {
+ return false;
}
- return serialize($val);
+
+ $x = $x->compare($zero) < 0 ? $x->add($n) : $x;
+
+ return $this->compare($zero) < 0 ? $this->_normalize($n->subtract($x)) : $this->_normalize($x);
}
/**
- * Serialize
+ * Calculates the greatest common divisor and Bezout's identity.
*
- * Will be called, automatically, when unserialize() is called on a BigInteger object.
+ * Say you have 693 and 609. The GCD is 21. Bezout's identity states that there exist integers x and y such that
+ * 693*x + 609*y == 21. In point of fact, there are actually an infinite number of x and y combinations and which
+ * combination is returned is dependent upon which mode is in use. See
+ * {@link http://en.wikipedia.org/wiki/B%C3%A9zout%27s_identity Bezout's identity - Wikipedia} for more information.
+ *
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger(693);
+ * $b = new \phpseclib\Math\BigInteger(609);
+ *
+ * extract($a->extendedGCD($b));
*
- * @param string $serialized
+ * echo $gcd->toString() . "\r\n"; // outputs 21
+ * echo $a->toString() * $x->toString() + $b->toString() * $y->toString(); // outputs 21
+ * ?>
+ * </code>
+ *
+ * @param \phpseclib\Math\BigInteger $n
+ * @return \phpseclib\Math\BigInteger
+ * @access public
+ * @internal Calculates the GCD using the binary xGCD algorithim described in
+ * {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=19 HAC 14.61}. As the text above 14.61 notes,
+ * the more traditional algorithim requires "relatively costly multiple-precision divisions".
*/
- public function unserialize($serialized)
+ function extendedGCD($n)
{
- $r = unserialize($serialized);
- $temp = new static($r['hex'], -16);
- $this->value = $temp->value;
- if (isset($r['precision'])) {
- // recalculate $this->bitmask
- $this->setPrecision($r['precision']);
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ extract(gmp_gcdext($this->value, $n->value));
+
+ return array(
+ 'gcd' => $this->_normalize(new static($g)),
+ 'x' => $this->_normalize(new static($s)),
+ 'y' => $this->_normalize(new static($t))
+ );
+ case self::MODE_BCMATH:
+ // it might be faster to use the binary xGCD algorithim here, as well, but (1) that algorithim works
+ // best when the base is a power of 2 and (2) i don't think it'd make much difference, anyway. as is,
+ // the basic extended euclidean algorithim is what we're using.
+
+ $u = $this->value;
+ $v = $n->value;
+
+ $a = '1';
+ $b = '0';
+ $c = '0';
+ $d = '1';
+
+ while (bccomp($v, '0', 0) != 0) {
+ $q = bcdiv($u, $v, 0);
+
+ $temp = $u;
+ $u = $v;
+ $v = bcsub($temp, bcmul($v, $q, 0), 0);
+
+ $temp = $a;
+ $a = $c;
+ $c = bcsub($temp, bcmul($a, $q, 0), 0);
+
+ $temp = $b;
+ $b = $d;
+ $d = bcsub($temp, bcmul($b, $q, 0), 0);
+ }
+
+ return array(
+ 'gcd' => $this->_normalize(new static($u)),
+ 'x' => $this->_normalize(new static($a)),
+ 'y' => $this->_normalize(new static($b))
+ );
}
+
+ $y = $n->copy();
+ $x = $this->copy();
+ $g = new static();
+ $g->value = array(1);
+
+ while (!(($x->value[0] & 1)|| ($y->value[0] & 1))) {
+ $x->_rshift(1);
+ $y->_rshift(1);
+ $g->_lshift(1);
+ }
+
+ $u = $x->copy();
+ $v = $y->copy();
+
+ $a = new static();
+ $b = new static();
+ $c = new static();
+ $d = new static();
+
+ $a->value = $d->value = $g->value = array(1);
+ $b->value = $c->value = array();
+
+ while (!empty($u->value)) {
+ while (!($u->value[0] & 1)) {
+ $u->_rshift(1);
+ if ((!empty($a->value) && ($a->value[0] & 1)) || (!empty($b->value) && ($b->value[0] & 1))) {
+ $a = $a->add($y);
+ $b = $b->subtract($x);
+ }
+ $a->_rshift(1);
+ $b->_rshift(1);
+ }
+
+ while (!($v->value[0] & 1)) {
+ $v->_rshift(1);
+ if ((!empty($d->value) && ($d->value[0] & 1)) || (!empty($c->value) && ($c->value[0] & 1))) {
+ $c = $c->add($y);
+ $d = $d->subtract($x);
+ }
+ $c->_rshift(1);
+ $d->_rshift(1);
+ }
+
+ if ($u->compare($v) >= 0) {
+ $u = $u->subtract($v);
+ $a = $a->subtract($c);
+ $b = $b->subtract($d);
+ } else {
+ $v = $v->subtract($u);
+ $c = $c->subtract($a);
+ $d = $d->subtract($b);
+ }
+ }
+
+ return array(
+ 'gcd' => $this->_normalize($g->multiply($v)),
+ 'x' => $this->_normalize($c),
+ 'y' => $this->_normalize($d)
+ );
}
/**
- * Performs modular exponentiation.
+ * Calculates the greatest common divisor
+ *
+ * Say you have 693 and 609. The GCD is 21.
*
- * @param BigInteger $e
- * @param BigInteger $n
- * @return BigInteger
+ * Here's an example:
+ * <code>
+ * <?php
+ * $a = new \phpseclib\Math\BigInteger(693);
+ * $b = new \phpseclib\Math\BigInteger(609);
+ *
+ * $gcd = a->extendedGCD($b);
+ *
+ * echo $gcd->toString() . "\r\n"; // outputs 21
+ * ?>
+ * </code>
+ *
+ * @param \phpseclib\Math\BigInteger $n
+ * @return \phpseclib\Math\BigInteger
+ * @access public
*/
- public function powMod(BigInteger $e, BigInteger $n)
+ function gcd($n)
{
- return new static($this->value->powMod($e->value, $n->value));
+ extract($this->extendedGCD($n));
+ return $gcd;
}
/**
- * Performs modular exponentiation.
+ * Absolute value.
*
- * @param BigInteger $e
- * @param BigInteger $n
- * @return BigInteger
+ * @return \phpseclib\Math\BigInteger
+ * @access public
*/
- public function modPow(BigInteger $e, BigInteger $n)
+ function abs()
{
- return new static($this->value->modPow($e->value, $n->value));
+ $temp = new static();
+
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp->value = gmp_abs($this->value);
+ break;
+ case self::MODE_BCMATH:
+ $temp->value = (bccomp($this->value, '0', 0) < 0) ? substr($this->value, 1) : $this->value;
+ break;
+ default:
+ $temp->value = $this->value;
+ }
+
+ return $temp;
}
/**
@@ -462,16 +2687,65 @@ class BigInteger implements \Serializable
*
* Note how the same comparison operator is used. If you want to test for equality, use $x->equals($y).
*
- * {@internal Could return $this->subtract($x), but that's not as fast as what we do do.}
- *
- * @param BigInteger $y
- * @return int in case < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal.
+ * @param \phpseclib\Math\BigInteger $y
+ * @return int that is < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal.
* @access public
* @see self::equals()
+ * @internal Could return $this->subtract($x), but that's not as fast as what we do do.
*/
- public function compare(BigInteger $y)
+ function compare($y)
{
- return $this->value->compare($y->value);
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $r = gmp_cmp($this->value, $y->value);
+ if ($r < -1) {
+ $r = -1;
+ }
+ if ($r > 1) {
+ $r = 1;
+ }
+ return $r;
+ case self::MODE_BCMATH:
+ return bccomp($this->value, $y->value, 0);
+ }
+
+ return $this->_compare($this->value, $this->is_negative, $y->value, $y->is_negative);
+ }
+
+ /**
+ * Compares two numbers.
+ *
+ * @param array $x_value
+ * @param bool $x_negative
+ * @param array $y_value
+ * @param bool $y_negative
+ * @return int
+ * @see self::compare()
+ * @access private
+ */
+ function _compare($x_value, $x_negative, $y_value, $y_negative)
+ {
+ if ($x_negative != $y_negative) {
+ return (!$x_negative && $y_negative) ? 1 : -1;
+ }
+
+ $result = $x_negative ? -1 : 1;
+
+ if (count($x_value) != count($y_value)) {
+ return (count($x_value) > count($y_value)) ? $result : -$result;
+ }
+ $size = max(count($x_value), count($y_value));
+
+ $x_value = array_pad($x_value, $size, 0);
+ $y_value = array_pad($y_value, $size, 0);
+
+ for ($i = count($x_value) - 1; $i >= 0; --$i) {
+ if ($x_value[$i] != $y_value[$i]) {
+ return ($x_value[$i] > $y_value[$i]) ? $result : -$result;
+ }
+ }
+
+ return 0;
}
/**
@@ -479,55 +2753,201 @@ class BigInteger implements \Serializable
*
* If you need to see if one number is greater than or less than another number, use BigInteger::compare()
*
- * @param BigInteger $x
+ * @param \phpseclib\Math\BigInteger $x
* @return bool
+ * @access public
+ * @see self::compare()
*/
- public function equals(BigInteger $x)
+ function equals($x)
{
- return $this->value->equals($x->value);
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ return gmp_cmp($this->value, $x->value) == 0;
+ default:
+ return $this->value === $x->value && $this->is_negative == $x->is_negative;
+ }
}
/**
- * Logical Not
+ * Set Precision
+ *
+ * Some bitwise operations give different results depending on the precision being used. Examples include left
+ * shift, not, and rotates.
*
- * @return BigInteger
+ * @param int $bits
+ * @access public
*/
- public function bitwise_not()
+ function setPrecision($bits)
{
- return new static($this->value->bitwise_not());
+ $this->precision = $bits;
+ if (MATH_BIGINTEGER_MODE != self::MODE_BCMATH) {
+ $this->bitmask = new static(chr((1 << ($bits & 0x7)) - 1) . str_repeat(chr(0xFF), $bits >> 3), 256);
+ } else {
+ $this->bitmask = new static(bcpow('2', $bits, 0));
+ }
+
+ $temp = $this->_normalize($this);
+ $this->value = $temp->value;
}
/**
* Logical And
*
- * @param BigInteger $x
- * @return BigInteger
+ * @param \phpseclib\Math\BigInteger $x
+ * @access public
+ * @internal Implemented per a request by Lluis Pamies i Juarez <lluis _a_ pamies.cat>
+ * @return \phpseclib\Math\BigInteger
*/
- public function bitwise_and(BigInteger $x)
+ function bitwise_and($x)
{
- return new static($this->value->bitwise_and($x->value));
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp = new static();
+ $temp->value = gmp_and($this->value, $x->value);
+
+ return $this->_normalize($temp);
+ case self::MODE_BCMATH:
+ $left = $this->toBytes();
+ $right = $x->toBytes();
+
+ $length = max(strlen($left), strlen($right));
+
+ $left = str_pad($left, $length, chr(0), STR_PAD_LEFT);
+ $right = str_pad($right, $length, chr(0), STR_PAD_LEFT);
+
+ return $this->_normalize(new static($left & $right, 256));
+ }
+
+ $result = $this->copy();
+
+ $length = min(count($x->value), count($this->value));
+
+ $result->value = array_slice($result->value, 0, $length);
+
+ for ($i = 0; $i < $length; ++$i) {
+ $result->value[$i]&= $x->value[$i];
+ }
+
+ return $this->_normalize($result);
}
/**
* Logical Or
*
- * @param BigInteger $x
- * @return BigInteger
+ * @param \phpseclib\Math\BigInteger $x
+ * @access public
+ * @internal Implemented per a request by Lluis Pamies i Juarez <lluis _a_ pamies.cat>
+ * @return \phpseclib\Math\BigInteger
+ */
+ function bitwise_or($x)
+ {
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp = new static();
+ $temp->value = gmp_or($this->value, $x->value);
+
+ return $this->_normalize($temp);
+ case self::MODE_BCMATH:
+ $left = $this->toBytes();
+ $right = $x->toBytes();
+
+ $length = max(strlen($left), strlen($right));
+
+ $left = str_pad($left, $length, chr(0), STR_PAD_LEFT);
+ $right = str_pad($right, $length, chr(0), STR_PAD_LEFT);
+
+ return $this->_normalize(new static($left | $right, 256));
+ }
+
+ $length = max(count($this->value), count($x->value));
+ $result = $this->copy();
+ $result->value = array_pad($result->value, $length, 0);
+ $x->value = array_pad($x->value, $length, 0);
+
+ for ($i = 0; $i < $length; ++$i) {
+ $result->value[$i]|= $x->value[$i];
+ }
+
+ return $this->_normalize($result);
+ }
+
+ /**
+ * Logical Exclusive-Or
+ *
+ * @param \phpseclib\Math\BigInteger $x
+ * @access public
+ * @internal Implemented per a request by Lluis Pamies i Juarez <lluis _a_ pamies.cat>
+ * @return \phpseclib\Math\BigInteger
*/
- public function bitwise_or(BigInteger $x)
+ function bitwise_xor($x)
{
- return new static($this->value->bitwise_or($x->value));
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ $temp = new static();
+ $temp->value = gmp_xor(gmp_abs($this->value), gmp_abs($x->value));
+ return $this->_normalize($temp);
+ case self::MODE_BCMATH:
+ $left = $this->toBytes();
+ $right = $x->toBytes();
+
+ $length = max(strlen($left), strlen($right));
+
+ $left = str_pad($left, $length, chr(0), STR_PAD_LEFT);
+ $right = str_pad($right, $length, chr(0), STR_PAD_LEFT);
+
+ return $this->_normalize(new static($left ^ $right, 256));
+ }
+
+ $length = max(count($this->value), count($x->value));
+ $result = $this->copy();
+ $result->is_negative = false;
+ $result->value = array_pad($result->value, $length, 0);
+ $x->value = array_pad($x->value, $length, 0);
+
+ for ($i = 0; $i < $length; ++$i) {
+ $result->value[$i]^= $x->value[$i];
+ }
+
+ return $this->_normalize($result);
}
/**
- * Logical Exclusive Or
+ * Logical Not
*
- * @param BigInteger $x
- * @return BigInteger
+ * @access public
+ * @internal Implemented per a request by Lluis Pamies i Juarez <lluis _a_ pamies.cat>
+ * @return \phpseclib\Math\BigInteger
*/
- public function bitwise_xor(BigInteger $x)
+ function bitwise_not()
{
- return new static($this->value->bitwise_xor($x->value));
+ // calculuate "not" without regard to $this->precision
+ // (will always result in a smaller number. ie. ~1 isn't 1111 1110 - it's 0)
+ $temp = $this->toBytes();
+ if ($temp == '') {
+ return $this->_normalize(new static());
+ }
+ $pre_msb = decbin(ord($temp[0]));
+ $temp = ~$temp;
+ $msb = decbin(ord($temp[0]));
+ if (strlen($msb) == 8) {
+ $msb = substr($msb, strpos($msb, '0'));
+ }
+ $temp[0] = chr(bindec($msb));
+
+ // see if we need to add extra leading 1's
+ $current_bits = strlen($pre_msb) + 8 * strlen($temp) - 8;
+ $new_bits = $this->precision - $current_bits;
+ if ($new_bits <= 0) {
+ return $this->_normalize(new static($temp, 256));
+ }
+
+ // generate as many leading 1's as we need to.
+ $leading_ones = chr((1 << ($new_bits & 0x7)) - 1) . str_repeat(chr(0xFF), $new_bits >> 3);
+ $this->_base256_lshift($leading_ones, $current_bits);
+
+ $temp = str_pad($temp, strlen($leading_ones), chr(0), STR_PAD_LEFT);
+
+ return $this->_normalize(new static($leading_ones | $temp, 256));
}
/**
@@ -536,11 +2956,36 @@ class BigInteger implements \Serializable
* Shifts BigInteger's by $shift bits, effectively dividing by 2**$shift.
*
* @param int $shift
- * @return BigInteger
+ * @return \phpseclib\Math\BigInteger
+ * @access public
+ * @internal The only version that yields any speed increases is the internal version.
*/
- public function bitwise_rightShift($shift)
+ function bitwise_rightShift($shift)
{
- return new static($this->value->bitwise_rightShift($shift));
+ $temp = new static();
+
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ static $two;
+
+ if (!isset($two)) {
+ $two = gmp_init('2');
+ }
+
+ $temp->value = gmp_div_q($this->value, gmp_pow($two, $shift));
+
+ break;
+ case self::MODE_BCMATH:
+ $temp->value = bcdiv($this->value, bcpow('2', $shift, 0), 0);
+
+ break;
+ default: // could just replace _lshift with this, but then all _lshift() calls would need to be rewritten
+ // and I don't want to do that...
+ $temp->value = $this->value;
+ $temp->_rshift($shift);
+ }
+
+ return $this->_normalize($temp);
}
/**
@@ -549,11 +2994,36 @@ class BigInteger implements \Serializable
* Shifts BigInteger's by $shift bits, effectively multiplying by 2**$shift.
*
* @param int $shift
- * @return BigInteger
+ * @return \phpseclib\Math\BigInteger
+ * @access public
+ * @internal The only version that yields any speed increases is the internal version.
*/
- public function bitwise_leftShift($shift)
+ function bitwise_leftShift($shift)
{
- return new static($this->value->bitwise_leftShift($shift));
+ $temp = new static();
+
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ static $two;
+
+ if (!isset($two)) {
+ $two = gmp_init('2');
+ }
+
+ $temp->value = gmp_mul($this->value, gmp_pow($two, $shift));
+
+ break;
+ case self::MODE_BCMATH:
+ $temp->value = bcmul($this->value, bcpow('2', $shift, 0), 0);
+
+ break;
+ default: // could just replace _rshift with this, but then all _lshift() calls would need to be rewritten
+ // and I don't want to do that...
+ $temp->value = $this->value;
+ $temp->_lshift($shift);
+ }
+
+ return $this->_normalize($temp);
}
/**
@@ -562,11 +3032,43 @@ class BigInteger implements \Serializable
* Instead of the top x bits being dropped they're appended to the shifted bit string.
*
* @param int $shift
- * @return BigInteger
+ * @return \phpseclib\Math\BigInteger
+ * @access public
*/
- public function bitwise_leftRotate($shift)
+ function bitwise_leftRotate($shift)
{
- return new static($this->value->bitwise_leftRotate($shift));
+ $bits = $this->toBytes();
+
+ if ($this->precision > 0) {
+ $precision = $this->precision;
+ if (MATH_BIGINTEGER_MODE == self::MODE_BCMATH) {
+ $mask = $this->bitmask->subtract(new static(1));
+ $mask = $mask->toBytes();
+ } else {
+ $mask = $this->bitmask->toBytes();
+ }
+ } else {
+ $temp = ord($bits[0]);
+ for ($i = 0; $temp >> $i; ++$i) {
+ }
+ $precision = 8 * strlen($bits) - 8 + $i;
+ $mask = chr((1 << ($precision & 0x7)) - 1) . str_repeat(chr(0xFF), $precision >> 3);
+ }
+
+ if ($shift < 0) {
+ $shift+= $precision;
+ }
+ $shift%= $precision;
+
+ if (!$shift) {
+ return $this->copy();
+ }
+
+ $left = $this->bitwise_leftShift($shift);
+ $left = $left->bitwise_and(new static($mask, 256));
+ $right = $this->bitwise_rightShift($precision - $shift);
+ $result = MATH_BIGINTEGER_MODE != self::MODE_BCMATH ? $left->bitwise_or($right) : $left->add($right);
+ return $this->_normalize($result);
}
/**
@@ -575,118 +3077,255 @@ class BigInteger implements \Serializable
* Instead of the bottom x bits being dropped they're prepended to the shifted bit string.
*
* @param int $shift
- * @return BigInteger
+ * @return \phpseclib\Math\BigInteger
+ * @access public
*/
- public function bitwise_rightRotate($shift)
+ function bitwise_rightRotate($shift)
{
- return new static($this->value->bitwise_rightRotate($shift));
+ return $this->bitwise_leftRotate(-$shift);
}
/**
- * Returns the smallest and largest n-bit number
+ * Generates a random BigInteger
*
- * @param int $bits
- * @return BigInteger[]
+ * Byte length is equal to $length. Uses \phpseclib\Crypt\Random if it's loaded and mt_rand if it's not.
+ *
+ * @param int $size
+ * @return \phpseclib\Math\BigInteger
+ * @access private
*/
- public static function minMaxBits($bits)
+ function _random_number_helper($size)
{
- self::initialize_static_variables();
+ if (class_exists('\phpseclib\Crypt\Random')) {
+ $random = Random::string($size);
+ } else {
+ $random = '';
- $class = self::$mainEngine;
- extract($class::minMaxBits($bits));
- /** @var BigInteger $min
- * @var BigInteger $max
- */
- return [
- 'min' => new static($min),
- 'max' => new static($max)
- ];
- }
+ if ($size & 1) {
+ $random.= chr(mt_rand(0, 255));
+ }
- /**
- * Return the size of a BigInteger in bits
- *
- * @return int
- */
- public function getLength()
- {
- return $this->value->getLength();
- }
+ $blocks = $size >> 1;
+ for ($i = 0; $i < $blocks; ++$i) {
+ // mt_rand(-2147483648, 0x7FFFFFFF) always produces -2147483648 on some systems
+ $random.= pack('n', mt_rand(0, 0xFFFF));
+ }
+ }
- /**
- * Return the size of a BigInteger in bytes
- *
- * @return int
- */
- public function getLengthInBytes()
- {
- return $this->value->getLengthInBytes();
+ return new static($random, 256);
}
/**
- * Generates a random number of a certain size
+ * Generate a random number
*
- * Bit length is equal to $size
+ * Returns a random number between $min and $max where $min and $max
+ * can be defined using one of the two methods:
*
- * @param int $size
- * @return BigInteger
+ * $min->random($max)
+ * $max->random($min)
+ *
+ * @param \phpseclib\Math\BigInteger $arg1
+ * @param \phpseclib\Math\BigInteger $arg2
+ * @return \phpseclib\Math\BigInteger
+ * @access public
+ * @internal The API for creating random numbers used to be $a->random($min, $max), where $a was a BigInteger object.
+ * That method is still supported for BC purposes.
*/
- public static function random($size)
+ function random($arg1, $arg2 = false)
{
- self::initialize_static_variables();
+ if ($arg1 === false) {
+ return false;
+ }
- $class = self::$mainEngine;
- return new static($class::random($size));
- }
+ if ($arg2 === false) {
+ $max = $arg1;
+ $min = $this;
+ } else {
+ $min = $arg1;
+ $max = $arg2;
+ }
- /**
- * Generates a random prime number of a certain size
- *
- * Bit length is equal to $size
- *
- * @param int $size
- * @return BigInteger
- */
- public static function randomPrime($size)
- {
- self::initialize_static_variables();
+ $compare = $max->compare($min);
+
+ if (!$compare) {
+ return $this->_normalize($min);
+ } elseif ($compare < 0) {
+ // if $min is bigger then $max, swap $min and $max
+ $temp = $max;
+ $max = $min;
+ $min = $temp;
+ }
+
+ static $one;
+ if (!isset($one)) {
+ $one = new static(1);
+ }
+
+ $max = $max->subtract($min->subtract($one));
+ $size = strlen(ltrim($max->toBytes(), chr(0)));
+
+ /*
+ doing $random % $max doesn't work because some numbers will be more likely to occur than others.
+ eg. if $max is 140 and $random's max is 255 then that'd mean both $random = 5 and $random = 145
+ would produce 5 whereas the only value of random that could produce 139 would be 139. ie.
+ not all numbers would be equally likely. some would be more likely than others.
+
+ creating a whole new random number until you find one that is within the range doesn't work
+ because, for sufficiently small ranges, the likelihood that you'd get a number within that range
+ would be pretty small. eg. with $random's max being 255 and if your $max being 1 the probability
+ would be pretty high that $random would be greater than $max.
+
+ phpseclib works around this using the technique described here:
+
+ http://crypto.stackexchange.com/questions/5708/creating-a-small-number-from-a-cryptographically-secure-random-string
+ */
+ $random_max = new static(chr(1) . str_repeat("\0", $size), 256);
+ $random = $this->_random_number_helper($size);
+
+ list($max_multiple) = $random_max->divide($max);
+ $max_multiple = $max_multiple->multiply($max);
+
+ while ($random->compare($max_multiple) >= 0) {
+ $random = $random->subtract($max_multiple);
+ $random_max = $random_max->subtract($max_multiple);
+ $random = $random->bitwise_leftShift(8);
+ $random = $random->add($this->_random_number_helper(1));
+ $random_max = $random_max->bitwise_leftShift(8);
+ list($max_multiple) = $random_max->divide($max);
+ $max_multiple = $max_multiple->multiply($max);
+ }
+ list(, $random) = $random->divide($max);
- $class = self::$mainEngine;
- return new static($class::randomPrime($size));
+ return $this->_normalize($random->add($min));
}
/**
- * Generate a random prime number between a range
+ * Generate a random prime number.
*
* If there's not a prime within the given range, false will be returned.
+ * If more than $timeout seconds have elapsed, give up and return false.
*
- * @param BigInteger $min
- * @param BigInteger $max
- * @return false|BigInteger
+ * @param \phpseclib\Math\BigInteger $arg1
+ * @param \phpseclib\Math\BigInteger $arg2
+ * @param int $timeout
+ * @return Math_BigInteger|false
+ * @access public
+ * @internal See {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap4.pdf#page=15 HAC 4.44}.
*/
- public static function randomRangePrime(BigInteger $min, BigInteger $max)
+ function randomPrime($arg1, $arg2 = false, $timeout = false)
{
- $class = self::$mainEngine;
- return new static($class::randomRangePrime($min->value, $max->value));
+ if ($arg1 === false) {
+ return false;
+ }
+
+ if ($arg2 === false) {
+ $max = $arg1;
+ $min = $this;
+ } else {
+ $min = $arg1;
+ $max = $arg2;
+ }
+
+ $compare = $max->compare($min);
+
+ if (!$compare) {
+ return $min->isPrime() ? $min : false;
+ } elseif ($compare < 0) {
+ // if $min is bigger then $max, swap $min and $max
+ $temp = $max;
+ $max = $min;
+ $min = $temp;
+ }
+
+ static $one, $two;
+ if (!isset($one)) {
+ $one = new static(1);
+ $two = new static(2);
+ }
+
+ $start = time();
+
+ $x = $this->random($min, $max);
+
+ // gmp_nextprime() requires PHP 5 >= 5.2.0 per <http://php.net/gmp-nextprime>.
+ if (MATH_BIGINTEGER_MODE == self::MODE_GMP && extension_loaded('gmp')) {
+ $p = new static();
+ $p->value = gmp_nextprime($x->value);
+
+ if ($p->compare($max) <= 0) {
+ return $p;
+ }
+
+ if (!$min->equals($x)) {
+ $x = $x->subtract($one);
+ }
+
+ return $x->randomPrime($min, $x);
+ }
+
+ if ($x->equals($two)) {
+ return $x;
+ }
+
+ $x->_make_odd();
+ if ($x->compare($max) > 0) {
+ // if $x > $max then $max is even and if $min == $max then no prime number exists between the specified range
+ if ($min->equals($max)) {
+ return false;
+ }
+ $x = $min->copy();
+ $x->_make_odd();
+ }
+
+ $initial_x = $x->copy();
+
+ while (true) {
+ if ($timeout !== false && time() - $start > $timeout) {
+ return false;
+ }
+
+ if ($x->isPrime()) {
+ return $x;
+ }
+
+ $x = $x->add($two);
+
+ if ($x->compare($max) > 0) {
+ $x = $min->copy();
+ if ($x->equals($two)) {
+ return $x;
+ }
+ $x->_make_odd();
+ }
+
+ if ($x->equals($initial_x)) {
+ return false;
+ }
+ }
}
/**
- * Generate a random number between a range
+ * Make the current number odd
*
- * Returns a random number between $min and $max where $min and $max
- * can be defined using one of the two methods:
+ * If the current number is odd it'll be unchanged. If it's even, one will be added to it.
*
- * BigInteger::randomRange($min, $max)
- * BigInteger::randomRange($max, $min)
- *
- * @param BigInteger $min
- * @param BigInteger $max
- * @return BigInteger
+ * @see self::randomPrime()
+ * @access private
*/
- public static function randomRange(BigInteger $min, BigInteger $max)
+ function _make_odd()
{
- $class = self::$mainEngine;
- return new static($class::randomRange($min->value, $max->value));
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ gmp_setbit($this->value, 0);
+ break;
+ case self::MODE_BCMATH:
+ if ($this->value[strlen($this->value) - 1] % 2 == 0) {
+ $this->value = bcadd($this->value, '1');
+ }
+ break;
+ default:
+ $this->value[0] |= 1;
+ }
}
/**
@@ -696,169 +3335,453 @@ class BigInteger implements \Serializable
* $t parameter is distributability. BigInteger::randomPrime() can be distributed across multiple pageloads
* on a website instead of just one.
*
- * @param int|bool $t
+ * @param \phpseclib\Math\BigInteger $t
* @return bool
+ * @access public
+ * @internal Uses the
+ * {@link http://en.wikipedia.org/wiki/Miller%E2%80%93Rabin_primality_test Miller-Rabin primality test}. See
+ * {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap4.pdf#page=8 HAC 4.24}.
*/
- public function isPrime($t = false)
+ function isPrime($t = false)
{
- return $this->value->isPrime($t);
+ $length = strlen($this->toBytes());
+
+ if (!$t) {
+ // see HAC 4.49 "Note (controlling the error probability)"
+ // @codingStandardsIgnoreStart
+ if ($length >= 163) { $t = 2; } // floor(1300 / 8)
+ else if ($length >= 106) { $t = 3; } // floor( 850 / 8)
+ else if ($length >= 81 ) { $t = 4; } // floor( 650 / 8)
+ else if ($length >= 68 ) { $t = 5; } // floor( 550 / 8)
+ else if ($length >= 56 ) { $t = 6; } // floor( 450 / 8)
+ else if ($length >= 50 ) { $t = 7; } // floor( 400 / 8)
+ else if ($length >= 43 ) { $t = 8; } // floor( 350 / 8)
+ else if ($length >= 37 ) { $t = 9; } // floor( 300 / 8)
+ else if ($length >= 31 ) { $t = 12; } // floor( 250 / 8)
+ else if ($length >= 25 ) { $t = 15; } // floor( 200 / 8)
+ else if ($length >= 18 ) { $t = 18; } // floor( 150 / 8)
+ else { $t = 27; }
+ // @codingStandardsIgnoreEnd
+ }
+
+ // ie. gmp_testbit($this, 0)
+ // ie. isEven() or !isOdd()
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ return gmp_prob_prime($this->value, $t) != 0;
+ case self::MODE_BCMATH:
+ if ($this->value === '2') {
+ return true;
+ }
+ if ($this->value[strlen($this->value) - 1] % 2 == 0) {
+ return false;
+ }
+ break;
+ default:
+ if ($this->value == array(2)) {
+ return true;
+ }
+ if (~$this->value[0] & 1) {
+ return false;
+ }
+ }
+
+ static $primes, $zero, $one, $two;
+
+ if (!isset($primes)) {
+ $primes = array(
+ 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59,
+ 61, 67, 71, 73, 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137,
+ 139, 149, 151, 157, 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227,
+ 229, 233, 239, 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313,
+ 317, 331, 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419,
+ 421, 431, 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509,
+ 521, 523, 541, 547, 557, 563, 569, 571, 577, 587, 593, 599, 601, 607, 613, 617,
+ 619, 631, 641, 643, 647, 653, 659, 661, 673, 677, 683, 691, 701, 709, 719, 727,
+ 733, 739, 743, 751, 757, 761, 769, 773, 787, 797, 809, 811, 821, 823, 827, 829,
+ 839, 853, 857, 859, 863, 877, 881, 883, 887, 907, 911, 919, 929, 937, 941, 947,
+ 953, 967, 971, 977, 983, 991, 997
+ );
+
+ if (MATH_BIGINTEGER_MODE != self::MODE_INTERNAL) {
+ for ($i = 0; $i < count($primes); ++$i) {
+ $primes[$i] = new static($primes[$i]);
+ }
+ }
+
+ $zero = new static();
+ $one = new static(1);
+ $two = new static(2);
+ }
+
+ if ($this->equals($one)) {
+ return false;
+ }
+
+ // see HAC 4.4.1 "Random search for probable primes"
+ if (MATH_BIGINTEGER_MODE != self::MODE_INTERNAL) {
+ foreach ($primes as $prime) {
+ list(, $r) = $this->divide($prime);
+ if ($r->equals($zero)) {
+ return $this->equals($prime);
+ }
+ }
+ } else {
+ $value = $this->value;
+ foreach ($primes as $prime) {
+ list(, $r) = $this->_divide_digit($value, $prime);
+ if (!$r) {
+ return count($value) == 1 && $value[0] == $prime;
+ }
+ }
+ }
+
+ $n = $this->copy();
+ $n_1 = $n->subtract($one);
+ $n_2 = $n->subtract($two);
+
+ $r = $n_1->copy();
+ $r_value = $r->value;
+ // ie. $s = gmp_scan1($n, 0) and $r = gmp_div_q($n, gmp_pow(gmp_init('2'), $s));
+ if (MATH_BIGINTEGER_MODE == self::MODE_BCMATH) {
+ $s = 0;
+ // if $n was 1, $r would be 0 and this would be an infinite loop, hence our $this->equals($one) check earlier
+ while ($r->value[strlen($r->value) - 1] % 2 == 0) {
+ $r->value = bcdiv($r->value, '2', 0);
+ ++$s;
+ }
+ } else {
+ for ($i = 0, $r_length = count($r_value); $i < $r_length; ++$i) {
+ $temp = ~$r_value[$i] & 0xFFFFFF;
+ for ($j = 1; ($temp >> $j) & 1; ++$j) {
+ }
+ if ($j != 25) {
+ break;
+ }
+ }
+ $s = 26 * $i + $j;
+ $r->_rshift($s);
+ }
+
+ for ($i = 0; $i < $t; ++$i) {
+ $a = $this->random($two, $n_2);
+ $y = $a->modPow($r, $n);
+
+ if (!$y->equals($one) && !$y->equals($n_1)) {
+ for ($j = 1; $j < $s && !$y->equals($n_1); ++$j) {
+ $y = $y->modPow($two, $n);
+ if ($y->equals($one)) {
+ return false;
+ }
+ }
+
+ if (!$y->equals($n_1)) {
+ return false;
+ }
+ }
+ }
+ return true;
}
/**
- * Calculates the nth root of a biginteger.
+ * Logical Left Shift
*
- * Returns the nth root of a positive biginteger, where n defaults to 2
+ * Shifts BigInteger's by $shift bits.
*
- * @param int $n optional
- * @return BigInteger
+ * @param int $shift
+ * @access private
*/
- public function root($n = 2)
+ function _lshift($shift)
{
- return new static($this->value->root($n));
- }
+ if ($shift == 0) {
+ return;
+ }
- /**
- * Performs exponentiation.
- *
- * @param BigInteger $n
- * @return BigInteger
- */
- public function pow(BigInteger $n)
- {
- return new static($this->value->pow($n->value));
+ $num_digits = (int) ($shift / self::$base);
+ $shift %= self::$base;
+ $shift = 1 << $shift;
+
+ $carry = 0;
+
+ for ($i = 0; $i < count($this->value); ++$i) {
+ $temp = $this->value[$i] * $shift + $carry;
+ $carry = self::$base === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
+ $this->value[$i] = (int) ($temp - $carry * self::$baseFull);
+ }
+
+ if ($carry) {
+ $this->value[count($this->value)] = $carry;
+ }
+
+ while ($num_digits--) {
+ array_unshift($this->value, 0);
+ }
}
/**
- * Return the minimum BigInteger between an arbitrary number of BigIntegers.
+ * Logical Right Shift
*
- * @param BigInteger ...$nums
- * @return BigInteger
+ * Shifts BigInteger's by $shift bits.
+ *
+ * @param int $shift
+ * @access private
*/
- public static function min(BigInteger ...$nums)
+ function _rshift($shift)
{
- $class = self::$mainEngine;
- $nums = array_map(function($num) { return $num->value; }, $nums);
- return new static($class::min(...$nums));
+ if ($shift == 0) {
+ return;
+ }
+
+ $num_digits = (int) ($shift / self::$base);
+ $shift %= self::$base;
+ $carry_shift = self::$base - $shift;
+ $carry_mask = (1 << $shift) - 1;
+
+ if ($num_digits) {
+ $this->value = array_slice($this->value, $num_digits);
+ }
+
+ $carry = 0;
+
+ for ($i = count($this->value) - 1; $i >= 0; --$i) {
+ $temp = $this->value[$i] >> $shift | $carry;
+ $carry = ($this->value[$i] & $carry_mask) << $carry_shift;
+ $this->value[$i] = $temp;
+ }
+
+ $this->value = $this->_trim($this->value);
}
/**
- * Return the maximum BigInteger between an arbitrary number of BigIntegers.
+ * Normalize
+ *
+ * Removes leading zeros and truncates (if necessary) to maintain the appropriate precision
*
- * @param BigInteger ...$nums
- * @return BigInteger
+ * @param \phpseclib\Math\BigInteger $result
+ * @return \phpseclib\Math\BigInteger
+ * @see self::_trim()
+ * @access private
*/
- public static function max(BigInteger ...$nums)
+ function _normalize($result)
{
- $class = self::$mainEngine;
- $nums = array_map(function($num) { return $num->value; }, $nums);
- return new static($class::max(...$nums));
+ $result->precision = $this->precision;
+ $result->bitmask = $this->bitmask;
+
+ switch (MATH_BIGINTEGER_MODE) {
+ case self::MODE_GMP:
+ if ($this->bitmask !== false) {
+ $flip = gmp_cmp($result->value, gmp_init(0)) < 0;
+ if ($flip) {
+ $result->value = gmp_neg($result->value);
+ }
+ $result->value = gmp_and($result->value, $result->bitmask->value);
+ if ($flip) {
+ $result->value = gmp_neg($result->value);
+ }
+ }
+
+ return $result;
+ case self::MODE_BCMATH:
+ if (!empty($result->bitmask->value)) {
+ $result->value = bcmod($result->value, $result->bitmask->value);
+ }
+
+ return $result;
+ }
+
+ $value = &$result->value;
+
+ if (!count($value)) {
+ $result->is_negative = false;
+ return $result;
+ }
+
+ $value = $this->_trim($value);
+
+ if (!empty($result->bitmask->value)) {
+ $length = min(count($value), count($this->bitmask->value));
+ $value = array_slice($value, 0, $length);
+
+ for ($i = 0; $i < $length; ++$i) {
+ $value[$i] = $value[$i] & $this->bitmask->value[$i];
+ }
+ }
+
+ return $result;
}
/**
- * Tests BigInteger to see if it is between two integers, inclusive
+ * Trim
*
- * @param BigInteger $min
- * @param BigInteger $max
- * @return bool
+ * Removes leading zeros
+ *
+ * @param array $value
+ * @return \phpseclib\Math\BigInteger
+ * @access private
*/
- public function between(BigInteger $min, BigInteger $max)
+ function _trim($value)
{
- return $this->value->between($min->value, $max->value);
- }
+ for ($i = count($value) - 1; $i >= 0; --$i) {
+ if ($value[$i]) {
+ break;
+ }
+ unset($value[$i]);
+ }
- /**
- * Clone
- */
- public function __clone()
- {
- $this->value = clone $this->value;
+ return $value;
}
/**
- * Is Odd?
+ * Array Repeat
*
- * @return boolean
+ * @param array $input
+ * @param mixed $multiplier
+ * @return array
+ * @access private
*/
- public function isOdd()
+ function _array_repeat($input, $multiplier)
{
- return $this->value->isOdd();
+ return ($multiplier) ? array_fill(0, $multiplier, $input) : array();
}
/**
- * Tests if a bit is set
+ * Logical Left Shift
*
- * @param int $x
- * @return boolean
+ * Shifts binary strings $shift bits, essentially multiplying by 2**$shift.
+ *
+ * @param string $x (by reference)
+ * @param int $shift
+ * @return string
+ * @access private
*/
- public function testBit($x)
+ function _base256_lshift(&$x, $shift)
{
- return $this->value->testBit($x);
+ if ($shift == 0) {
+ return;
+ }
+
+ $num_bytes = $shift >> 3; // eg. floor($shift/8)
+ $shift &= 7; // eg. $shift % 8
+
+ $carry = 0;
+ for ($i = strlen($x) - 1; $i >= 0; --$i) {
+ $temp = ord($x[$i]) << $shift | $carry;
+ $x[$i] = chr($temp);
+ $carry = $temp >> 8;
+ }
+ $carry = ($carry != 0) ? chr($carry) : '';
+ $x = $carry . $x . str_repeat(chr(0), $num_bytes);
}
/**
- * Is Negative?
+ * Logical Right Shift
+ *
+ * Shifts binary strings $shift bits, essentially dividing by 2**$shift and returning the remainder.
*
- * @return boolean
+ * @param string $x (by referenc)
+ * @param int $shift
+ * @return string
+ * @access private
*/
- public function isNegative()
+ function _base256_rshift(&$x, $shift)
{
- return $this->value->isNegative();
+ if ($shift == 0) {
+ $x = ltrim($x, chr(0));
+ return '';
+ }
+
+ $num_bytes = $shift >> 3; // eg. floor($shift/8)
+ $shift &= 7; // eg. $shift % 8
+
+ $remainder = '';
+ if ($num_bytes) {
+ $start = $num_bytes > strlen($x) ? -strlen($x) : -$num_bytes;
+ $remainder = substr($x, $start);
+ $x = substr($x, 0, -$num_bytes);
+ }
+
+ $carry = 0;
+ $carry_shift = 8 - $shift;
+ for ($i = 0; $i < strlen($x); ++$i) {
+ $temp = (ord($x[$i]) >> $shift) | $carry;
+ $carry = (ord($x[$i]) << $carry_shift) & 0xFF;
+ $x[$i] = chr($temp);
+ }
+ $x = ltrim($x, chr(0));
+
+ $remainder = chr($carry >> $carry_shift) . $remainder;
+
+ return ltrim($remainder, chr(0));
}
+ // one quirk about how the following functions are implemented is that PHP defines N to be an unsigned long
+ // at 32-bits, while java's longs are 64-bits.
+
/**
- * Negate
- *
- * Given $k, returns -$k
+ * Converts 32-bit integers to bytes.
*
- * @return BigInteger
+ * @param int $x
+ * @return string
+ * @access private
*/
- public function negate()
+ function _int2bytes($x)
{
- return new static($this->value->negate());
+ return ltrim(pack('N', $x), chr(0));
}
/**
- * Scan for 1 and right shift by that amount
+ * Converts bytes to 32-bit integers
*
- * ie. $s = gmp_scan1($n, 0) and $r = gmp_div_q($n, gmp_pow(gmp_init('2'), $s));
- *
- * @param BigInteger $r
+ * @param string $x
* @return int
+ * @access private
*/
- public static function scan1divide(BigInteger $r)
+ function _bytes2int($x)
{
- $class = self::$mainEngine;
- return $class::scan1divide($r->value);
+ $temp = unpack('Nint', str_pad($x, 4, chr(0), STR_PAD_LEFT));
+ return $temp['int'];
}
/**
- * Create Recurring Modulo Function
+ * DER-encode an integer
*
- * Sometimes it may be desirable to do repeated modulos with the same number outside of
- * modular exponentiation
+ * The ability to DER-encode integers is needed to create RSA public keys for use with OpenSSL
*
- * @return callable
+ * @see self::modPow()
+ * @access private
+ * @param int $length
+ * @return string
*/
- public function createRecurringModuloFunction()
+ function _encodeASN1Length($length)
{
- $func = $this->value->createRecurringModuloFunction();
- return function(BigInteger $x) use ($func) {
- return new static($func($x->value));
- };
+ if ($length <= 0x7F) {
+ return chr($length);
+ }
+
+ $temp = ltrim(pack('N', $length), chr(0));
+ return pack('Ca*', 0x80 | strlen($temp), $temp);
}
/**
- * Bitwise Split
+ * Single digit division
*
- * Splits BigInteger's into chunks of $split bits
+ * Even if int64 is being used the division operator will return a float64 value
+ * if the dividend is not evenly divisible by the divisor. Since a float64 doesn't
+ * have the precision of int64 this is a problem so, when int64 is being used,
+ * we'll guarantee that the dividend is divisible by first subtracting the remainder.
*
- * @param int $split
- * @return \phpseclib3\Math\BigInteger[]
+ * @access private
+ * @param int $x
+ * @param int $y
+ * @return int
*/
- public function bitwise_split($split)
+ function _safe_divide($x, $y)
{
- return array_map(function($val) {
- return new static($val);
- }, $this->value->bitwise_split($split));
+ if (self::$base === 26) {
+ return (int) ($x / $y);
+ }
+
+ // self::$base === 31
+ return ($x - ($x % $y)) / $y;
}
-} \ No newline at end of file
+}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath.php
deleted file mode 100644
index b97392432..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath.php
+++ /dev/null
@@ -1,742 +0,0 @@
-<?php
-
-/**
- * BCMath BigInteger Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines;
-
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Exception\BadConfigurationException;
-
-/**
- * BCMath Engine.
- *
- * @package BCMath
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class BCMath extends Engine
-{
- /**
- * Can Bitwise operations be done fast?
- *
- * @see parent::bitwise_leftRotate()
- * @see parent::bitwise_rightRotate()
- * @access protected
- */
- const FAST_BITWISE = false;
-
- /**
- * Engine Directory
- *
- * @see parent::setModExpEngine
- * @access protected
- */
- const ENGINE_DIR = 'BCMath';
-
- /**
- * Modular Exponentiation Engine
- *
- * @var string
- */
- protected static $modexpEngine;
-
- /**
- * Engine Validity Flag
- *
- * @var bool
- */
- protected static $isValidEngine;
-
- /**
- * BigInteger(0)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\BCMath
- */
- protected static $zero;
-
- /**
- * BigInteger(1)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\BCMath
- */
- protected static $one;
-
- /**
- * BigInteger(2)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\BCMath
- */
- protected static $two;
-
- /**
- * Primes > 2 and < 1000
- *
- * @var array
- */
- protected static $primes;
-
- /**
- * Test for engine validity
- *
- * @see parent::__construct()
- * @return bool
- */
- public static function isValidEngine()
- {
- return extension_loaded('bcmath');
- }
-
- /**
- * Default constructor
- *
- * @param mixed $x integer Base-10 number or base-$base number if $base set.
- * @param int $base
- * @see parent::__construct()
- * @return \phpseclib3\Math\BigInteger\Engines\BCMath
- */
- public function __construct($x = 0, $base = 10)
- {
- if (!isset(self::$isValidEngine)) {
- self::$isValidEngine = self::isValidEngine();
- }
- if (!self::$isValidEngine) {
- throw new BadConfigurationException('BCMath is not setup correctly on this system');
- }
-
- $this->value = '0';
-
- parent::__construct($x, $base);
- }
-
- /**
- * Initialize a BCMath BigInteger Engine instance
- *
- * @param int $base
- * @see parent::__construct()
- */
- protected function initialize($base)
- {
- switch (abs($base)) {
- case 256:
- // round $len to the nearest 4
- $len = (strlen($this->value) + 3) & 0xFFFFFFFC;
-
- $x = str_pad($this->value, $len, chr(0), STR_PAD_LEFT);
-
- $this->value = '0';
- for ($i = 0; $i < $len; $i+= 4) {
- $this->value = bcmul($this->value, '4294967296', 0); // 4294967296 == 2**32
- $this->value = bcadd($this->value, 0x1000000 * ord($x[$i]) + ((ord($x[$i + 1]) << 16) | (ord($x[$i + 2]) << 8) | ord($x[$i + 3])), 0);
- }
-
- if ($this->is_negative) {
- $this->value = '-' . $this->value;
- }
- break;
- case 16:
- $x = (strlen($this->value) & 1) ? '0' . $this->value : $this->value;
- $temp = new self(Hex::decode($x), 256);
- $this->value = $this->is_negative ? '-' . $temp->value : $temp->value;
- $this->is_negative = false;
- break;
- case 10:
- // explicitly casting $x to a string is necessary, here, since doing $x[0] on -1 yields different
- // results then doing it on '-1' does (modInverse does $x[0])
- $this->value = $this->value === '-' ? '0' : (string) $this->value;
- }
- }
-
- /**
- * Converts a BigInteger to a base-10 number.
- *
- * @return string
- */
- public function toString()
- {
- if ($this->value === '0') {
- return '0';
- }
-
- return ltrim($this->value, '0');
- }
-
- /**
- * Converts a BigInteger to a byte string (eg. base-256).
- *
- * @param bool $twos_compliment
- * @return string
- */
- function toBytes($twos_compliment = false)
- {
- if ($twos_compliment) {
- return $this->toBytesHelper();
- }
-
- $value = '';
- $current = $this->value;
-
- if ($current[0] == '-') {
- $current = substr($current, 1);
- }
-
- while (bccomp($current, '0', 0) > 0) {
- $temp = bcmod($current, '16777216');
- $value = chr($temp >> 16) . chr($temp >> 8) . chr($temp) . $value;
- $current = bcdiv($current, '16777216', 0);
- }
-
- return $this->precision > 0 ?
- substr(str_pad($value, $this->precision >> 3, chr(0), STR_PAD_LEFT), -($this->precision >> 3)) :
- ltrim($value, chr(0));
- }
-
- /**
- * Adds two BigIntegers.
- *
- * @param BCMath $y
- * @return BCMath
- */
- public function add(BCMath $y)
- {
- $temp = new self();
- $temp->value = bcadd($this->value, $y->value);
-
- return $this->normalize($temp);
- }
-
- /**
- * Subtracts two BigIntegers.
- *
- * @param BCMath $y
- * @return BCMath
- */
- public function subtract(BCMath $y)
- {
- $temp = new self();
- $temp->value = bcsub($this->value, $y->value);
-
- return $this->normalize($temp);
- }
-
- /**
- * Multiplies two BigIntegers.
- *
- * @param BCMath $x
- * @return BCMath
- */
- public function multiply(BCMath $x)
- {
- $temp = new self();
- $temp->value = bcmul($this->value, $x->value);
-
- return $this->normalize($temp);
- }
-
- /**
- * Divides two BigIntegers.
- *
- * Returns an array whose first element contains the quotient and whose second element contains the
- * "common residue". If the remainder would be positive, the "common residue" and the remainder are the
- * same. If the remainder would be negative, the "common residue" is equal to the sum of the remainder
- * and the divisor (basically, the "common residue" is the first positive modulo).
- *
- * @param BCMath $y
- * @return BCMath
- */
- public function divide(BCMath $y)
- {
- $quotient = new self();
- $remainder = new self();
-
- $quotient->value = bcdiv($this->value, $y->value, 0);
- $remainder->value = bcmod($this->value, $y->value);
-
- if ($remainder->value[0] == '-') {
- $remainder->value = bcadd($remainder->value, $y->value[0] == '-' ? substr($y->value, 1) : $y->value, 0);
- }
-
- return [$this->normalize($quotient), $this->normalize($remainder)];
- }
-
- /**
- * Calculates modular inverses.
- *
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- *
- * @return false|BCMath
- * @param \phpseclib3\Math\BigInteger\Engines\BCMath $n
- */
- public function modInverse(BCMath $n)
- {
- return $this->modInverseHelper($n);
- }
-
- /**
- * Calculates the greatest common divisor and Bezout's identity.
- *
- * Say you have 693 and 609. The GCD is 21. Bezout's identity states that there exist integers x and y such that
- * 693*x + 609*y == 21. In point of fact, there are actually an infinite number of x and y combinations and which
- * combination is returned is dependent upon which mode is in use. See
- * {@link http://en.wikipedia.org/wiki/B%C3%A9zout%27s_identity Bezout's identity - Wikipedia} for more information.
- *
- * @param BCMath $n
- * @return BCMath
- */
- public function extendedGCD(BCMath $n)
- {
- // it might be faster to use the binary xGCD algorithim here, as well, but (1) that algorithim works
- // best when the base is a power of 2 and (2) i don't think it'd make much difference, anyway. as is,
- // the basic extended euclidean algorithim is what we're using.
-
- $u = $this->value;
- $v = $n->value;
-
- $a = '1';
- $b = '0';
- $c = '0';
- $d = '1';
-
- while (bccomp($v, '0', 0) != 0) {
- $q = bcdiv($u, $v, 0);
-
- $temp = $u;
- $u = $v;
- $v = bcsub($temp, bcmul($v, $q, 0), 0);
-
- $temp = $a;
- $a = $c;
- $c = bcsub($temp, bcmul($a, $q, 0), 0);
-
- $temp = $b;
- $b = $d;
- $d = bcsub($temp, bcmul($b, $q, 0), 0);
- }
-
- return [
- 'gcd' => $this->normalize(new static($u)),
- 'x' => $this->normalize(new static($a)),
- 'y' => $this->normalize(new static($b))
- ];
- }
-
- /**
- * Calculates the greatest common divisor
- *
- * Say you have 693 and 609. The GCD is 21.
- *
- * @param BCMath $n
- * @return BCMath
- */
- public function gcd(BCMath $n)
- {
- extract($this->extendedGCD($n));
- /** @var BCMath $gcd */
- return $gcd;
- }
-
- /**
- * Absolute value.
- *
- * @return \phpseclib3\Math\BigInteger\Engines\BCMath
- */
- public function abs()
- {
- $temp = new static();
- $temp->value = strlen($this->value) && $this->value[0] == '-' ?
- substr($this->value, 1) :
- $this->value;
-
- return $temp;
- }
-
- /**
- * Logical And
- *
- * @param BCMath $x
- * @return BCMath
- */
- public function bitwise_and(BCMath $x)
- {
- return $this->bitwiseAndHelper($x);
- }
-
- /**
- * Logical Or
- *
- * @param BCMath $x
- * @return BCMath
- */
- public function bitwise_or(BCMath $x)
- {
- return $this->bitwiseXorHelper($x);
- }
-
- /**
- * Logical Exclusive Or
- *
- * @param BCMath $x
- * @return BCMath
- */
- public function bitwise_xor(BCMath $x)
- {
- return $this->bitwiseXorHelper($x);
- }
-
- /**
- * Logical Right Shift
- *
- * Shifts BigInteger's by $shift bits, effectively dividing by 2**$shift.
- *
- * @param int $shift
- * @return \phpseclib3\Math\BigInteger\Engines\BCMath
- */
- public function bitwise_rightShift($shift)
- {
- $temp = new static();
- $temp->value = bcdiv($this->value, bcpow('2', $shift, 0), 0);
-
- return $this->normalize($temp);
- }
-
- /**
- * Logical Left Shift
- *
- * Shifts BigInteger's by $shift bits, effectively multiplying by 2**$shift.
- *
- * @param int $shift
- * @return \phpseclib3\Math\BigInteger\Engines\BCMath
- */
- public function bitwise_leftShift($shift)
- {
- $temp = new static();
- $temp->value = bcmul($this->value, bcpow('2', $shift, 0), 0);
-
- return $this->normalize($temp);
- }
-
- /**
- * Compares two numbers.
- *
- * Although one might think !$x->compare($y) means $x != $y, it, in fact, means the opposite. The reason for this is
- * demonstrated thusly:
- *
- * $x > $y: $x->compare($y) > 0
- * $x < $y: $x->compare($y) < 0
- * $x == $y: $x->compare($y) == 0
- *
- * Note how the same comparison operator is used. If you want to test for equality, use $x->equals($y).
- *
- * {@internal Could return $this->subtract($x), but that's not as fast as what we do do.}
- *
- * @param BCMath $y
- * @return int in case < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal.
- * @see self::equals()
- */
- public function compare(BCMath $y)
- {
- return bccomp($this->value, $y->value, 0);
- }
-
- /**
- * Tests the equality of two numbers.
- *
- * If you need to see if one number is greater than or less than another number, use BigInteger::compare()
- *
- * @param BCMath $x
- * @return bool
- */
- public function equals(BCMath $x)
- {
- return $this->value == $x->value;
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param BCMath $e
- * @param BCMath $n
- * @return BCMath
- */
- public function modPow(BCMath $e, BCMath $n)
- {
- return $this->powModOuter($e, $n);
- }
-
- /**
- * Performs modular exponentiation.
- *
- * Alias for modPow().
- *
- * @param BCMath $e
- * @param BCMath $n
- * @return BCMath
- */
- public function powMod(BCMath $e, BCMath $n)
- {
- return $this->powModOuter($e, $n);
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param BCMath $e
- * @param BCMath $n
- * @return BCMath
- */
- protected function powModInner(BCMath $e, BCMath $n)
- {
- try {
- $class = self::$modexpEngine;
- return $class::powModHelper($this, $e, $n, static::class);
- } catch (\Exception $err) {
- return BCMath\DefaultEngine::powModHelper($this, $e, $n, static::class);
- }
- }
-
- /**
- * Normalize
- *
- * Removes leading zeros and truncates (if necessary) to maintain the appropriate precision
- *
- * @param BCMath $result
- * @return BCMath
- */
- protected function normalize(BCMath $result)
- {
- unset($result->reduce);
-
- $result->precision = $this->precision;
- $result->bitmask = $this->bitmask;
-
- if ($result->bitmask !== false) {
- $result->value = bcmod($result->value, $result->bitmask->value);
- }
-
- return $result;
- }
-
- /**
- * Generate a random prime number between a range
- *
- * If there's not a prime within the given range, false will be returned.
- *
- * @param BCMath $min
- * @param BCMath $max
- * @return false|BCMath
- */
- public static function randomRangePrime(BCMath $min, BCMath $max)
- {
- return self::randomRangePrimeOuter($min, $max);
- }
-
- /**
- * Generate a random number between a range
- *
- * Returns a random number between $min and $max where $min and $max
- * can be defined using one of the two methods:
- *
- * BigInteger::randomRange($min, $max)
- * BigInteger::randomRange($max, $min)
- *
- * @param BCMath $min
- * @param BCMath $max
- * @return BCMath
- */
- public static function randomRange(BCMath $min, BCMath $max)
- {
- return self::randomRangeHelper($min, $max);
- }
-
- /**
- * Make the current number odd
- *
- * If the current number is odd it'll be unchanged. If it's even, one will be added to it.
- *
- * @see self::randomPrime()
- */
- protected function make_odd()
- {
- if (!$this->isOdd()) {
- $this->value = bcadd($this->value, '1');
- }
- }
-
- /**
- * Test the number against small primes.
- *
- * @see self::isPrime()
- */
- protected function testSmallPrimes()
- {
- if ($this->value === '1') {
- return false;
- }
- if ($this->value === '2') {
- return true;
- }
- if ($this->value[strlen($this->value) - 1] % 2 == 0) {
- return false;
- }
-
- $value = $this->value;
-
- foreach (self::$primes as $prime) {
- $r = bcmod($this->value, $prime);
- if ($r == '0') {
- return $this->value == $prime;
- }
- }
-
- return true;
- }
-
- /**
- * Scan for 1 and right shift by that amount
- *
- * ie. $s = gmp_scan1($n, 0) and $r = gmp_div_q($n, gmp_pow(gmp_init('2'), $s));
- *
- * @see self::isPrime()
- * @param BCMath $r
- * @return int
- */
- public static function scan1divide(BCMath $r)
- {
- $r_value = &$r->value;
- $s = 0;
- // if $n was 1, $r would be 0 and this would be an infinite loop, hence our $this->equals(static::$one) check earlier
- while ($r_value[strlen($r_value) - 1] % 2 == 0) {
- $r_value = bcdiv($r_value, '2', 0);
- ++$s;
- }
-
- return $s;
- }
-
- /**
- * Performs exponentiation.
- *
- * @param BCMath $n
- * @return BCMath
- */
- public function pow(BCMath $n)
- {
- $temp = new self();
- $temp->value = bcpow($this->value, $n->value);
-
- return $this->normalize($temp);
- }
-
- /**
- * Return the minimum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param BCMath ...$nums
- * @return BCMath
- */
- public static function min(BCMath ...$nums)
- {
- return self::minHelper($nums);
- }
-
- /**
- * Return the maximum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param BCMath ...$nums
- * @return BCMath
- */
- public static function max(BCMath ...$nums)
- {
- return self::maxHelper($nums);
- }
-
- /**
- * Tests BigInteger to see if it is between two integers, inclusive
- *
- * @param BCMath $min
- * @param BCMath $max
- * @return bool
- */
- public function between(BCMath $min, BCMath $max)
- {
- return $this->compare($min) >= 0 && $this->compare($max) <= 0;
- }
-
- /**
- * Set Bitmask
- *
- * @return Engine
- * @param int $bits
- * @see self::setPrecision()
- */
- protected static function setBitmask($bits)
- {
- $temp = parent::setBitmask($bits);
- return $temp->add(static::$one);
- }
-
- /**
- * Is Odd?
- *
- * @return boolean
- */
- public function isOdd()
- {
- return $this->value[strlen($this->value) - 1] % 2 == 1;
- }
-
- /**
- * Tests if a bit is set
- *
- * @return boolean
- */
- public function testBit($x)
- {
- return bccomp(
- bcmod($this->value, bcpow('2', $x + 1, 0), 0),
- bcpow('2', $x, 0),
- 0
- ) >= 0;
- }
-
- /**
- * Is Negative?
- *
- * @return boolean
- */
- public function isNegative()
- {
- return strlen($this->value) && $this->value[0] == '-';
- }
-
- /**
- * Negate
- *
- * Given $k, returns -$k
- *
- * @return BCMath
- */
- public function negate()
- {
- $temp = clone $this;
-
- if (!strlen($temp->value)) {
- return $temp;
- }
-
- $temp->value = $temp->value[0] == '-' ?
- substr($this->value, 1) :
- '-' . $this->value;
-
- return $temp;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Base.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Base.php
deleted file mode 100644
index 0e189b707..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Base.php
+++ /dev/null
@@ -1,116 +0,0 @@
-<?php
-
-/**
- * Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\BCMath;
-
-use phpseclib3\Math\BigInteger\Engines\BCMath;
-
-/**
- * Sliding Window Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Base extends BCMath
-{
- /**
- * Cache constants
- *
- * $cache[self::VARIABLE] tells us whether or not the cached data is still valid.
- *
- * @access private
- */
- const VARIABLE = 0;
- /**
- * $cache[self::DATA] contains the cached data.
- *
- * @access private
- */
- const DATA = 1;
-
- /**
- * Test for engine validity
- *
- * @return bool
- */
- public static function isValidEngine()
- {
- return static::class != __CLASS__;
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param \phpseclib3\Math\BigInteger\Engines\BCMath $x
- * @param \phpseclib3\Math\BigInteger\Engines\BCMath $e
- * @param \phpseclib3\Math\BigInteger\Engines\BCMath $n
- * @param string $class
- * @return \phpseclib3\Math\BigInteger\Engines\BCMath
- */
- protected static function powModHelper(BCMath $x, BCMath $e, BCMath $n, $class)
- {
- if (empty($e->value)) {
- $temp = new $class();
- $temp->value = '1';
- return $x->normalize($temp);
- }
-
- return $x->normalize(static::slidingWindow($x, $e, $n, $class));
- }
-
- /**
- * Modular reduction preparation
- *
- * @param string $x
- * @param string $n
- * @param string $class
- * @see self::slidingWindow()
- * @return string
- */
- protected static function prepareReduce($x, $n, $class)
- {
- return static::reduce($x, $n);
- }
-
- /**
- * Modular multiply
- *
- * @param string $x
- * @param string $y
- * @param string $n
- * @param string $class
- * @see self::slidingWindow()
- * @return string
- */
- protected static function multiplyReduce($x, $y, $n, $class)
- {
- return static::reduce(bcmul($x, $y), $n);
- }
-
- /**
- * Modular square
- *
- * @param string $x
- * @param string $n
- * @param string $class
- * @see self::slidingWindow()
- * @return string
- */
- protected static function squareReduce($x, $n, $class)
- {
- return static::reduce(bcmul($x, $x), $n);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/BuiltIn.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/BuiltIn.php
deleted file mode 100644
index f312be15e..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/BuiltIn.php
+++ /dev/null
@@ -1,44 +0,0 @@
-<?php
-
-/**
- * Built-In BCMath Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\BCMath;
-
-use phpseclib3\Math\BigInteger\Engines\BCMath;
-
-/**
- * Built-In BCMath Modular Exponentiation Engine
- *
- * @package BCMath
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class BuiltIn extends BCMath
-{
- /**
- * Performs modular exponentiation.
- *
- * @param BCMath $x
- * @param BCMath $e
- * @param BCMath $n
- * @return BCMath
- */
- protected static function powModHelper(BCMath $x, BCMath $e, BCMath $n)
- {
- $temp = new BCMath();
- $temp->value = bcpowmod($x->value, $e->value, $n->value);
-
- return $x->normalize($temp);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/DefaultEngine.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/DefaultEngine.php
deleted file mode 100644
index a6d175f5c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/DefaultEngine.php
+++ /dev/null
@@ -1,29 +0,0 @@
-<?php
-
-/**
- * BCMath Default Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\BCMath;
-
-use phpseclib3\Math\BigInteger\Engines\BCMath\Reductions\Barrett;
-
-/**
- * PHP Default Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DefaultEngine extends Barrett
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/OpenSSL.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/OpenSSL.php
deleted file mode 100644
index df7c965d6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/OpenSSL.php
+++ /dev/null
@@ -1,29 +0,0 @@
-<?php
-
-/**
- * OpenSSL Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\BCMath;
-
-use phpseclib3\Math\BigInteger\Engines\OpenSSL as Progenitor;
-
-/**
- * OpenSSL Modular Exponentiation Engine
- *
- * @package BCMath
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OpenSSL extends Progenitor
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/Barrett.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/Barrett.php
deleted file mode 100644
index 32b16dca6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/Barrett.php
+++ /dev/null
@@ -1,193 +0,0 @@
-<?php
-
-/**
- * BCMath Barrett Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\BCMath\Reductions;
-
-use phpseclib3\Math\BigInteger\Engines\BCMath\Base;
-
-/**
- * PHP Barrett Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Barrett extends Base
-{
- /**
- * Cache constants
- *
- * $cache[self::VARIABLE] tells us whether or not the cached data is still valid.
- *
- * @access private
- */
- const VARIABLE = 0;
- /**
- * $cache[self::DATA] contains the cached data.
- *
- * @access private
- */
- const DATA = 1;
-
- /**
- * Barrett Modular Reduction
- *
- * See {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=14 HAC 14.3.3} /
- * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=165 MPM 6.2.5} for more information. Modified slightly,
- * so as not to require negative numbers (initially, this script didn't support negative numbers).
- *
- * Employs "folding", as described at
- * {@link http://www.cosic.esat.kuleuven.be/publications/thesis-149.pdf#page=66 thesis-149.pdf#page=66}. To quote from
- * it, "the idea [behind folding] is to find a value x' such that x (mod m) = x' (mod m), with x' being smaller than x."
- *
- * Unfortunately, the "Barrett Reduction with Folding" algorithm described in thesis-149.pdf is not, as written, all that
- * usable on account of (1) its not using reasonable radix points as discussed in
- * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=162 MPM 6.2.2} and (2) the fact that, even with reasonable
- * radix points, it only works when there are an even number of digits in the denominator. The reason for (2) is that
- * (x >> 1) + (x >> 1) != x / 2 + x / 2. If x is even, they're the same, but if x is odd, they're not. See the in-line
- * comments for details.
- *
- * @param string $n
- * @param string $m
- * @return array|string
- */
- protected static function reduce($n, $m)
- {
- static $cache = [
- self::VARIABLE => [],
- self::DATA => []
- ];
-
- $m_length = strlen($m);
-
- if (strlen($n) > 2 * $m_length) {
- return bcmod($n, $m);
- }
-
- // if (m.length >> 1) + 2 <= m.length then m is too small and n can't be reduced
- if ($m_length < 5) {
- return self::regularBarrett($n, $m);
- }
- // n = 2 * m.length
-
- if (($key = array_search($m, $cache[self::VARIABLE])) === false) {
- $key = count($cache[self::VARIABLE]);
- $cache[self::VARIABLE][] = $m;
-
- $lhs = '1' . str_repeat('0', $m_length + ($m_length >> 1));
- $u = bcdiv($lhs, $m, 0);
- $m1 = bcsub($lhs, bcmul($u, $m));
-
- $cache[self::DATA][] = [
- 'u' => $u, // m.length >> 1 (technically (m.length >> 1) + 1)
- 'm1'=> $m1 // m.length
- ];
- } else {
- extract($cache[self::DATA][$key]);
- }
-
- $cutoff = $m_length + ($m_length >> 1);
-
- $lsd = substr($n, -$cutoff);
- $msd = substr($n, 0, -$cutoff);
-
- $temp = bcmul($msd, $m1); // m.length + (m.length >> 1)
- $n = bcadd($lsd, $temp); // m.length + (m.length >> 1) + 1 (so basically we're adding two same length numbers)
- //if ($m_length & 1) {
- // return self::regularBarrett($n, $m);
- //}
-
- // (m.length + (m.length >> 1) + 1) - (m.length - 1) == (m.length >> 1) + 2
- $temp = substr($n, 0, -$m_length + 1);
- // if even: ((m.length >> 1) + 2) + (m.length >> 1) == m.length + 2
- // if odd: ((m.length >> 1) + 2) + (m.length >> 1) == (m.length - 1) + 2 == m.length + 1
- $temp = bcmul($temp, $u);
- // if even: (m.length + 2) - ((m.length >> 1) + 1) = m.length - (m.length >> 1) + 1
- // if odd: (m.length + 1) - ((m.length >> 1) + 1) = m.length - (m.length >> 1)
- $temp = substr($temp, 0, -($m_length >> 1) - 1);
- // if even: (m.length - (m.length >> 1) + 1) + m.length = 2 * m.length - (m.length >> 1) + 1
- // if odd: (m.length - (m.length >> 1)) + m.length = 2 * m.length - (m.length >> 1)
- $temp = bcmul($temp, $m);
-
- // at this point, if m had an odd number of digits, we'd be subtracting a 2 * m.length - (m.length >> 1) digit
- // number from a m.length + (m.length >> 1) + 1 digit number. ie. there'd be an extra digit and the while loop
- // following this comment would loop a lot (hence our calling _regularBarrett() in that situation).
-
- $result = bcsub($n, $temp);
-
- //if (bccomp($result, '0') < 0) {
- if ($result[0] == '-') {
- $temp = '1' . str_repeat('0', $m_length + 1);
- $result = bcadd($result, $temp);
- }
-
- while (bccomp($result, $m) >= 0) {
- $result = bcsub($result, $m);
- }
-
- return $result;
- }
-
- /**
- * (Regular) Barrett Modular Reduction
- *
- * For numbers with more than four digits BigInteger::_barrett() is faster. The difference between that and this
- * is that this function does not fold the denominator into a smaller form.
- *
- * @param string $x
- * @param string $n
- * @return string
- */
- private static function regularBarrett($x, $n)
- {
- static $cache = [
- self::VARIABLE => [],
- self::DATA => []
- ];
-
- $n_length = strlen($n);
-
- if (strlen($x) > 2 * $n_length) {
- return bcmod($x, $n);
- }
-
- if (($key = array_search($n, $cache[self::VARIABLE])) === false) {
- $key = count($cache[self::VARIABLE]);
- $cache[self::VARIABLE][] = $n;
- $lhs = '1' . str_repeat('0', 2 * $n_length);
- $cache[self::DATA][] = bcdiv($lhs, $n, 0);
- }
-
- $temp = substr($x, 0, -$n_length + 1);
- $temp = bcmul($temp, $cache[self::DATA][$key]);
- $temp = substr($temp, 0, -$n_length - 1);
-
- $r1 = substr($x, -$n_length - 1);
- $r2 = substr(bcmul($temp, $n), -$n_length - 1);
- $result = bcsub($r1, $r2);
-
- //if (bccomp($result, '0') < 0) {
- if ($result[0] == '-') {
- $q = '1' . str_repeat('0', $n_length + 1);
- $result = bcadd($result, $q);
- }
-
- while (bccomp($result, $n) >= 0) {
- $result = bcsub($result, $n);
- }
-
- return $result;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/EvalBarrett.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/EvalBarrett.php
deleted file mode 100644
index 27530ec7d..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/BCMath/Reductions/EvalBarrett.php
+++ /dev/null
@@ -1,117 +0,0 @@
-<?php
-
-/**
- * BCMath Dynamic Barrett Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\BCMath\Reductions;
-
-use phpseclib3\Math\BigInteger\Engines\BCMath\Base;
-use phpseclib3\Math\BigInteger\Engines\BCMath;
-
-/**
- * PHP Barrett Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class EvalBarrett extends Base
-{
- /**
- * Custom Reduction Function
- *
- * @see self::generateCustomReduction
- */
- private static $custom_reduction;
-
- /**
- * Barrett Modular Reduction
- *
- * This calls a dynamically generated loop unrolled function that's specific to a given modulo.
- * Array lookups are avoided as are if statements testing for how many bits the host OS supports, etc.
- *
- * @param string $n
- * @param string $m
- * @return string
- */
- protected static function reduce($n, $m)
- {
- $inline = self::$custom_reduction;
- return $inline($n);
- }
-
- /**
- * Generate Custom Reduction
- *
- * @param BCMath $m
- * @param string $class
- * @return callable|void
- */
- protected static function generateCustomReduction(BCMath $m, $class)
- {
- if (isset($n->reduce)) {
- self::$custom_reduction = $n->reduce;
- return $n->reduce;
- }
-
- $m_length = strlen($m);
-
- if ($m_length < 5) {
- $code = 'return bcmod($x, $n);';
- eval('$func = function ($n) { ' . $code . '};');
- self::$custom_reduction = $func;
- return;
- }
-
- $lhs = '1' . str_repeat('0', $m_length + ($m_length >> 1));
- $u = bcdiv($lhs, $m, 0);
- $m1 = bcsub($lhs, bcmul($u, $m));
-
- $cutoff = $m_length + ($m_length >> 1);
-
- $m = "'$m'";
- $u = "'$u'";
- $m1= "'$m1'";
-
- $code.= '
- $lsd = substr($n, -' . $cutoff . ');
- $msd = substr($n, 0, -' . $cutoff . ');
-
- $temp = bcmul($msd, ' . $m1 . ');
- $n = bcadd($lsd, $temp);
-
- $temp = substr($n, 0, ' . (-$m_length + 1) . ');
- $temp = bcmul($temp, ' . $u . ');
- $temp = substr($temp, 0, ' . (-($m_length >> 1) - 1) . ');
- $temp = bcmul($temp, ' . $m . ');
-
- $result = bcsub($n, $temp);
-
- if ($result[0] == \'-\') {
- $temp = \'1' . str_repeat('0', $m_length + 1) . '\';
- $result = bcadd($result, $temp);
- }
-
- while (bccomp($result, ' . $m . ') >= 0) {
- $result = bcsub($result, ' . $m . ');
- }
-
- return $result;';
-
- eval('$func = function ($n) { ' . $code . '};');
-
- self::$custom_reduction = $func;
-
- return $func;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/Engine.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/Engine.php
deleted file mode 100644
index 10dd994bd..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/Engine.php
+++ /dev/null
@@ -1,1219 +0,0 @@
-<?php
-
-/**
- * Base BigInteger Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines;
-
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Exception\BadConfigurationException;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * Base Engine.
- *
- * @package Engine
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Engine implements \Serializable
-{
- /**
- * Holds the BigInteger's value
- *
- * @var mixed
- */
- protected $value;
-
- /**
- * Holds the BigInteger's sign
- *
- * @var bool
- */
- protected $is_negative;
-
- /**
- * Precision
- *
- * @see static::setPrecision()
- */
- protected $precision = -1;
-
- /**
- * Precision Bitmask
- *
- * @see static::setPrecision()
- */
- protected $bitmask = false;
-
- /**
- * Recurring Modulo Function
- *
- * @var callable
- */
- protected $reduce;
-
- /**
- * Default constructor
- *
- * @param mixed $x integer Base-10 number or base-$base number if $base set.
- * @param int $base
- */
- public function __construct($x, $base)
- {
- if (!isset(static::$primes)) {
- static::$primes = [
- 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59,
- 61, 67, 71, 73, 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137,
- 139, 149, 151, 157, 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227,
- 229, 233, 239, 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313,
- 317, 331, 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419,
- 421, 431, 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509,
- 521, 523, 541, 547, 557, 563, 569, 571, 577, 587, 593, 599, 601, 607, 613, 617,
- 619, 631, 641, 643, 647, 653, 659, 661, 673, 677, 683, 691, 701, 709, 719, 727,
- 733, 739, 743, 751, 757, 761, 769, 773, 787, 797, 809, 811, 821, 823, 827, 829,
- 839, 853, 857, 859, 863, 877, 881, 883, 887, 907, 911, 919, 929, 937, 941, 947,
- 953, 967, 971, 977, 983, 991, 997
- ];
- static::$zero = new static(0);
- static::$one = new static(1);
- static::$two = new static(2);
- }
-
- // '0' counts as empty() but when the base is 256 '0' is equal to ord('0') or 48
- // '0' is the only value like this per http://php.net/empty
- if (empty($x) && (abs($base) != 256 || $x !== '0')) {
- return;
- }
-
- switch ($base) {
- case -256:
- case 256:
- if ($base == -256 && (ord($x[0]) & 0x80)) {
- $this->value = ~$x;
- $this->is_negative = true;
- } else {
- $this->value = $x;
- $this->is_negative = false;
- }
-
- static::initialize($base);
-
- if ($this->is_negative) {
- $temp = $this->add(new static('-1'));
- $this->value = $temp->value;
- }
- break;
- case -16:
- case 16:
- if ($base > 0 && $x[0] == '-') {
- $this->is_negative = true;
- $x = substr($x, 1);
- }
-
- $x = preg_replace('#^(?:0x)?([A-Fa-f0-9]*).*#', '$1', $x);
-
- $is_negative = false;
- if ($base < 0 && hexdec($x[0]) >= 8) {
- $this->is_negative = $is_negative = true;
- $x = Hex::encode(~Hex::decode($x));
- }
-
- $this->value = $x;
- static::initialize($base);
-
- if ($is_negative) {
- $temp = $this->add(new static('-1'));
- $this->value = $temp->value;
- }
- break;
- case -10:
- case 10:
- // (?<!^)(?:-).*: find any -'s that aren't at the beginning and then any characters that follow that
- // (?<=^|-)0*: find any 0's that are preceded by the start of the string or by a - (ie. octals)
- // [^-0-9].*: find any non-numeric characters and then any characters that follow that
- $this->value = preg_replace('#(?<!^)(?:-).*|(?<=^|-)0*|[^-0-9].*#', '', $x);
- if (!strlen($this->value) || $this->value == '-') {
- $this->value = '0';
- }
- static::initialize($base);
- break;
- case -2:
- case 2:
- if ($base > 0 && $x[0] == '-') {
- $this->is_negative = true;
- $x = substr($x, 1);
- }
-
- $x = preg_replace('#^([01]*).*#', '$1', $x);
-
- $temp = new static(Strings::bits2bin($x), 128 * $base); // ie. either -16 or +16
- $this->value = $temp->value;
- if ($temp->is_negative) {
- $this->is_negative = true;
- }
-
- break;
- default:
- // base not supported, so we'll let $this == 0
- }
- }
-
- /**
- * Sets engine type.
- *
- * Throws an exception if the type is invalid
- *
- * @param string $engine
- */
- public static function setModExpEngine($engine)
- {
- $fqengine = '\\phpseclib3\\Math\\BigInteger\\Engines\\' . static::ENGINE_DIR . '\\' . $engine;
- if (!class_exists($fqengine) || !method_exists($fqengine, 'isValidEngine')) {
- throw new \InvalidArgumentException("$engine is not a valid engine");
- }
- if (!$fqengine::isValidEngine()) {
- throw new BadConfigurationException("$engine is not setup correctly on this system");
- }
- static::$modexpEngine = $fqengine;
- }
-
- /**
- * Converts a BigInteger to a byte string (eg. base-256).
- *
- * Negative numbers are saved as positive numbers, unless $twos_compliment is set to true, at which point, they're
- * saved as two's compliment.
- * @return string
- */
- protected function toBytesHelper()
- {
- $comparison = $this->compare(new static());
- if ($comparison == 0) {
- return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : '';
- }
-
- $temp = $comparison < 0 ? $this->add(new static(1)) : $this;
- $bytes = $temp->toBytes();
-
- if (!strlen($bytes)) { // eg. if the number we're trying to convert is -1
- $bytes = chr(0);
- }
-
- if (ord($bytes[0]) & 0x80) {
- $bytes = chr(0) . $bytes;
- }
-
- return $comparison < 0 ? ~$bytes : $bytes;
- }
-
- /**
- * Converts a BigInteger to a hex string (eg. base-16).
- *
- * @param bool $twos_compliment
- * @return string
- */
- public function toHex($twos_compliment = false)
- {
- return Hex::encode($this->toBytes($twos_compliment));
- }
-
- /**
- * Converts a BigInteger to a bit string (eg. base-2).
- *
- * Negative numbers are saved as positive numbers, unless $twos_compliment is set to true, at which point, they're
- * saved as two's compliment.
- *
- * @param bool $twos_compliment
- * @return string
- */
- public function toBits($twos_compliment = false)
- {
- $hex = $this->toBytes($twos_compliment);
- $bits = Strings::bin2bits($hex);
-
- $result = $this->precision > 0 ? substr($bits, -$this->precision) : ltrim($bits, '0');
-
- if ($twos_compliment && $this->compare(new static()) > 0 && $this->precision <= 0) {
- return '0' . $result;
- }
-
- return $result;
- }
-
- /**
- * Calculates modular inverses.
- *
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- *
- * {@internal See {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=21 HAC 14.64} for more information.}
- *
- * @param \phpseclib3\Math\BigInteger\Engines\Engine $n
- * @return \phpseclib3\Math\BigInteger\Engines\Engine|false
- */
- protected function modInverseHelper(Engine $n)
- {
- // $x mod -$n == $x mod $n.
- $n = $n->abs();
-
- if ($this->compare(static::$zero) < 0) {
- $temp = $this->abs();
- $temp = $temp->modInverse($n);
- return $this->normalize($n->subtract($temp));
- }
-
- extract($this->extendedGCD($n));
- /**
- * @var BigInteger $gcd
- * @var BigInteger $x
- */
-
- if (!$gcd->equals(static::$one)) {
- return false;
- }
-
- $x = $x->compare(static::$zero) < 0 ? $x->add($n) : $x;
-
- return $this->compare(static::$zero) < 0 ? $this->normalize($n->subtract($x)) : $this->normalize($x);
- }
-
- /**
- * Serialize
- *
- * Will be called, automatically, when serialize() is called on a BigInteger object.
- *
- * @return string
- */
- public function serialize()
- {
- $val = ['hex' => $this->toHex(true)];
- if ($this->precision > 0) {
- $val['precision'] = $this->precision;
- }
- return serialize($val);
- }
-
- /**
- * Serialize
- *
- * Will be called, automatically, when unserialize() is called on a BigInteger object.
- *
- * @param string $serialized
- */
- public function unserialize($serialized)
- {
- $r = unserialize($serialized);
- $temp = new static($r['hex'], -16);
- $this->value = $temp->value;
- $this->is_negative = $temp->is_negative;
- if (isset($r['precision'])) {
- // recalculate $this->bitmask
- $this->setPrecision($r['precision']);
- }
- }
-
- /**
- * Converts a BigInteger to a base-10 number.
- *
- * @return string
- */
- public function __toString()
- {
- return $this->toString();
- }
-
- /**
- * __debugInfo() magic method
- *
- * Will be called, automatically, when print_r() or var_dump() are called
- */
- public function __debugInfo()
- {
- return [
- 'value' => '0x' . $this->toHex(true),
- 'engine' => basename(static::class)
- ];
- }
-
- /**
- * Set Precision
- *
- * Some bitwise operations give different results depending on the precision being used. Examples include left
- * shift, not, and rotates.
- *
- * @param int $bits
- */
- public function setPrecision($bits)
- {
- if ($bits < 1) {
- $this->precision = -1;
- $this->bitmask = false;
-
- return;
- }
- $this->precision = $bits;
- $this->bitmask = static::setBitmask($bits);
-
- $temp = $this->normalize($this);
- $this->value = $temp->value;
- }
-
- /**
- * Get Precision
- *
- * Returns the precision if it exists, -1 if it doesn't
- *
- * @return int
- */
- public function getPrecision()
- {
- return $this->precision;
- }
-
- /**
- * Set Bitmask
- * @return Engine
- * @param int $bits
- * @see self::setPrecision()
- */
- protected static function setBitmask($bits)
- {
- return new static(chr((1 << ($bits & 0x7)) - 1) . str_repeat(chr(0xFF), $bits >> 3), 256);
- }
-
- /**
- * Logical Not
- *
- * @return Engine|string
- */
- public function bitwise_not()
- {
- // calculuate "not" without regard to $this->precision
- // (will always result in a smaller number. ie. ~1 isn't 1111 1110 - it's 0)
- $temp = $this->toBytes();
- if ($temp == '') {
- return $this->normalize(static::$zero);
- }
- $pre_msb = decbin(ord($temp[0]));
- $temp = ~$temp;
- $msb = decbin(ord($temp[0]));
- if (strlen($msb) == 8) {
- $msb = substr($msb, strpos($msb, '0'));
- }
- $temp[0] = chr(bindec($msb));
-
- // see if we need to add extra leading 1's
- $current_bits = strlen($pre_msb) + 8 * strlen($temp) - 8;
- $new_bits = $this->precision - $current_bits;
- if ($new_bits <= 0) {
- return $this->normalize(new static($temp, 256));
- }
-
- // generate as many leading 1's as we need to.
- $leading_ones = chr((1 << ($new_bits & 0x7)) - 1) . str_repeat(chr(0xFF), $new_bits >> 3);
-
- self::base256_lshift($leading_ones, $current_bits);
-
- $temp = str_pad($temp, strlen($leading_ones), chr(0), STR_PAD_LEFT);
-
- return $this->normalize(new static($leading_ones | $temp, 256));
- }
-
- /**
- * Logical Left Shift
- *
- * Shifts binary strings $shift bits, essentially multiplying by 2**$shift.
- *
- * @param string $x
- * @param int $shift
- * @return string
- */
- protected static function base256_lshift(&$x, $shift)
- {
- if ($shift == 0) {
- return;
- }
-
- $num_bytes = $shift >> 3; // eg. floor($shift/8)
- $shift &= 7; // eg. $shift % 8
-
- $carry = 0;
- for ($i = strlen($x) - 1; $i >= 0; --$i) {
- $temp = ord($x[$i]) << $shift | $carry;
- $x[$i] = chr($temp);
- $carry = $temp >> 8;
- }
- $carry = ($carry != 0) ? chr($carry) : '';
- $x = $carry . $x . str_repeat(chr(0), $num_bytes);
- }
-
- /**
- * Logical Left Rotate
- *
- * Instead of the top x bits being dropped they're appended to the shifted bit string.
- *
- * @param int $shift
- * @return \phpseclib3\Math\BigInteger\Engines\Engine
- */
- public function bitwise_leftRotate($shift)
- {
- $bits = $this->toBytes();
-
- if ($this->precision > 0) {
- $precision = $this->precision;
- if (static::FAST_BITWISE) {
- $mask = $this->bitmask->toBytes();
- } else {
- $mask = $this->bitmask->subtract(new static(1));
- $mask = $mask->toBytes();
- }
- } else {
- $temp = ord($bits[0]);
- for ($i = 0; $temp >> $i; ++$i) {
- }
- $precision = 8 * strlen($bits) - 8 + $i;
- $mask = chr((1 << ($precision & 0x7)) - 1) . str_repeat(chr(0xFF), $precision >> 3);
- }
-
- if ($shift < 0) {
- $shift+= $precision;
- }
- $shift%= $precision;
-
- if (!$shift) {
- return clone $this;
- }
-
- $left = $this->bitwise_leftShift($shift);
- $left = $left->bitwise_and(new static($mask, 256));
- $right = $this->bitwise_rightShift($precision - $shift);
- $result = static::FAST_BITWISE ? $left->bitwise_or($right) : $left->add($right);
- return $this->normalize($result);
- }
-
- /**
- * Logical Right Rotate
- *
- * Instead of the bottom x bits being dropped they're prepended to the shifted bit string.
- *
- * @param int $shift
- * @return \phpseclib3\Math\BigInteger\Engines\Engine
- */
- public function bitwise_rightRotate($shift)
- {
- return $this->bitwise_leftRotate(-$shift);
- }
-
- /**
- * Returns the smallest and largest n-bit number
- *
- * @param int $bits
- * @return \phpseclib3\Math\BigInteger\Engines\Engine[]
- */
- public static function minMaxBits($bits)
- {
- $bytes = $bits >> 3;
- $min = str_repeat(chr(0), $bytes);
- $max = str_repeat(chr(0xFF), $bytes);
- $msb = $bits & 7;
- if ($msb) {
- $min = chr(1 << ($msb - 1)) . $min;
- $max = chr((1 << $msb) - 1) . $max;
- } else {
- $min[0] = chr(0x80);
- }
- return [
- 'min' => new static($min, 256),
- 'max' => new static($max, 256)
- ];
- }
-
- /**
- * Return the size of a BigInteger in bits
- *
- * @return int
- */
- public function getLength()
- {
- return strlen($this->toBits());
- }
-
- /**
- * Return the size of a BigInteger in bytes
- *
- * @return int
- */
- public function getLengthInBytes()
- {
- return strlen($this->toBytes());
- }
-
- /**
- * Performs some pre-processing for powMod
- *
- * @param Engine $e
- * @param Engine $n
- * @return bool|Engine
- */
- protected function powModOuter(Engine $e, Engine $n)
- {
- $n = $this->bitmask !== false && $this->bitmask->compare($n) < 0 ? $this->bitmask : $n->abs();
-
- if ($e->compare(new static()) < 0) {
- $e = $e->abs();
-
- $temp = $this->modInverse($n);
- if ($temp === false) {
- return false;
- }
-
- return $this->normalize($temp->powModInner($e, $n));
- }
-
- return $this->powModInner($e, $n);
- }
-
- /**
- * Sliding Window k-ary Modular Exponentiation
- *
- * Based on {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=27 HAC 14.85} /
- * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=210 MPM 7.7}. In a departure from those algorithims,
- * however, this function performs a modular reduction after every multiplication and squaring operation.
- * As such, this function has the same preconditions that the reductions being used do.
- *
- * @param \phpseclib3\Math\BigInteger\Engines\Engine $x
- * @param \phpseclib3\Math\BigInteger\Engines\Engine $e
- * @param \phpseclib3\Math\BigInteger\Engines\Engine $n
- * @param string $class
- * @return \phpseclib3\Math\BigInteger\Engines\Engine
- */
- protected static function slidingWindow(Engine $x, Engine $e, Engine $n, $class)
- {
- static $window_ranges = [7, 25, 81, 241, 673, 1793]; // from BigInteger.java's oddModPow function
- //static $window_ranges = [0, 7, 36, 140, 450, 1303, 3529]; // from MPM 7.3.1
-
- $e_bits = $e->toBits();
- $e_length = strlen($e_bits);
-
- // calculate the appropriate window size.
- // $window_size == 3 if $window_ranges is between 25 and 81, for example.
- for ($i = 0, $window_size = 1; $i < count($window_ranges) && $e_length > $window_ranges[$i]; ++$window_size, ++$i) {
- }
-
- $n_value = $n->value;
-
- if (method_exists(static::class, 'generateCustomReduction')) {
- static::generateCustomReduction($n, $class);
- }
-
- // precompute $this^0 through $this^$window_size
- $powers = [];
- $powers[1] = static::prepareReduce($x->value, $n_value, $class);
- $powers[2] = static::squareReduce($powers[1], $n_value, $class);
-
- // we do every other number since substr($e_bits, $i, $j+1) (see below) is supposed to end
- // in a 1. ie. it's supposed to be odd.
- $temp = 1 << ($window_size - 1);
- for ($i = 1; $i < $temp; ++$i) {
- $i2 = $i << 1;
- $powers[$i2 + 1] = static::multiplyReduce($powers[$i2 - 1], $powers[2], $n_value, $class);
- }
-
- $result = new $class(1);
- $result = static::prepareReduce($result->value, $n_value, $class);
-
- for ($i = 0; $i < $e_length;) {
- if (!$e_bits[$i]) {
- $result = static::squareReduce($result, $n_value, $class);
- ++$i;
- } else {
- for ($j = $window_size - 1; $j > 0; --$j) {
- if (!empty($e_bits[$i + $j])) {
- break;
- }
- }
-
- // eg. the length of substr($e_bits, $i, $j + 1)
- for ($k = 0; $k <= $j; ++$k) {
- $result = static::squareReduce($result, $n_value, $class);
- }
-
- $result = static::multiplyReduce($result, $powers[bindec(substr($e_bits, $i, $j + 1))], $n_value, $class);
-
- $i += $j + 1;
- }
- }
-
- $temp = new $class();
- $temp->value = static::reduce($result, $n_value, $class);
-
- return $temp;
- }
-
- /**
- * Generates a random number of a certain size
- *
- * Bit length is equal to $size
- *
- * @param int $size
- * @return \phpseclib3\Math\BigInteger\Engines\Engine
- */
- public static function random($size)
- {
- extract(static::minMaxBits($size));
- /**
- * @var BigInteger $min
- * @var BigInteger $max
- */
- return static::randomRange($min, $max);
- }
-
- /**
- * Generates a random prime number of a certain size
- *
- * Bit length is equal to $size
- *
- * @param int $size
- * @return \phpseclib3\Math\BigInteger\Engines\Engine
- */
- public static function randomPrime($size)
- {
- extract(static::minMaxBits($size));
- /**
- * @var BigInteger $min
- * @var BigInteger $max
- */
- return static::randomRangePrime($min, $max);
- }
-
- /**
- * Performs some pre-processing for randomRangePrime
- *
- * @param Engine $min
- * @param Engine $max
- * @return bool|Engine
- */
- protected static function randomRangePrimeOuter(Engine $min, Engine $max)
- {
- $compare = $max->compare($min);
-
- if (!$compare) {
- return $min->isPrime() ? $min : false;
- } elseif ($compare < 0) {
- // if $min is bigger then $max, swap $min and $max
- $temp = $max;
- $max = $min;
- $min = $temp;
- }
-
- $x = static::randomRange($min, $max);
-
- return static::randomRangePrimeInner($x, $min, $max);
- }
-
- /**
- * Generate a random number between a range
- *
- * Returns a random number between $min and $max where $min and $max
- * can be defined using one of the two methods:
- *
- * BigInteger::randomRange($min, $max)
- * BigInteger::randomRange($max, $min)
- *
- * @param Engine $min
- * @param Engine $max
- * @return Engine
- */
- protected static function randomRangeHelper(Engine $min, Engine $max)
- {
- $compare = $max->compare($min);
-
- if (!$compare) {
- return $min;
- } elseif ($compare < 0) {
- // if $min is bigger then $max, swap $min and $max
- $temp = $max;
- $max = $min;
- $min = $temp;
- }
-
- if (!isset(static::$one)) {
- static::$one = new static(1);
- }
-
- $max = $max->subtract($min->subtract(static::$one));
-
- $size = strlen(ltrim($max->toBytes(), chr(0)));
-
- /*
- doing $random % $max doesn't work because some numbers will be more likely to occur than others.
- eg. if $max is 140 and $random's max is 255 then that'd mean both $random = 5 and $random = 145
- would produce 5 whereas the only value of random that could produce 139 would be 139. ie.
- not all numbers would be equally likely. some would be more likely than others.
-
- creating a whole new random number until you find one that is within the range doesn't work
- because, for sufficiently small ranges, the likelihood that you'd get a number within that range
- would be pretty small. eg. with $random's max being 255 and if your $max being 1 the probability
- would be pretty high that $random would be greater than $max.
-
- phpseclib works around this using the technique described here:
-
- http://crypto.stackexchange.com/questions/5708/creating-a-small-number-from-a-cryptographically-secure-random-string
- */
- $random_max = new static(chr(1) . str_repeat("\0", $size), 256);
- $random = new static(Random::string($size), 256);
-
- list($max_multiple) = $random_max->divide($max);
- $max_multiple = $max_multiple->multiply($max);
-
- while ($random->compare($max_multiple) >= 0) {
- $random = $random->subtract($max_multiple);
- $random_max = $random_max->subtract($max_multiple);
- $random = $random->bitwise_leftShift(8);
- $random = $random->add(new static(Random::string(1), 256));
- $random_max = $random_max->bitwise_leftShift(8);
- list($max_multiple) = $random_max->divide($max);
- $max_multiple = $max_multiple->multiply($max);
- }
- list(, $random) = $random->divide($max);
-
- return $random->add($min);
- }
-
- /**
- * Performs some post-processing for randomRangePrime
- *
- * @param Engine $x
- * @param Engine $min
- * @param Engine $max
- * @return bool|Engine
- */
- protected static function randomRangePrimeInner(Engine $x, Engine $min, Engine $max)
- {
- if (!isset(static::$two)) {
- static::$two = new static('2');
- }
-
- $x->make_odd();
- if ($x->compare($max) > 0) {
- // if $x > $max then $max is even and if $min == $max then no prime number exists between the specified range
- if ($min->equals($max)) {
- return false;
- }
- $x = clone $min;
- $x->make_odd();
- }
-
- $initial_x = clone $x;
-
- while (true) {
- if ($x->isPrime()) {
- return $x;
- }
-
- $x = $x->add(static::$two);
-
- if ($x->compare($max) > 0) {
- $x = clone $min;
- if ($x->equals(static::$two)) {
- return $x;
- }
- $x->make_odd();
- }
-
- if ($x->equals($initial_x)) {
- return false;
- }
- }
- }
-
- /**
- * Sets the $t parameter for primality testing
- *
- * @return int
- */
- protected function setupIsPrime()
- {
- $length = $this->getLengthInBytes();
-
- // see HAC 4.49 "Note (controlling the error probability)"
- // @codingStandardsIgnoreStart
- if ($length >= 163) { $t = 2; } // floor(1300 / 8)
- else if ($length >= 106) { $t = 3; } // floor( 850 / 8)
- else if ($length >= 81 ) { $t = 4; } // floor( 650 / 8)
- else if ($length >= 68 ) { $t = 5; } // floor( 550 / 8)
- else if ($length >= 56 ) { $t = 6; } // floor( 450 / 8)
- else if ($length >= 50 ) { $t = 7; } // floor( 400 / 8)
- else if ($length >= 43 ) { $t = 8; } // floor( 350 / 8)
- else if ($length >= 37 ) { $t = 9; } // floor( 300 / 8)
- else if ($length >= 31 ) { $t = 12; } // floor( 250 / 8)
- else if ($length >= 25 ) { $t = 15; } // floor( 200 / 8)
- else if ($length >= 18 ) { $t = 18; } // floor( 150 / 8)
- else { $t = 27; }
- // @codingStandardsIgnoreEnd
-
- return $t;
- }
-
- /**
- * Tests Primality
- *
- * Uses the {@link http://en.wikipedia.org/wiki/Miller%E2%80%93Rabin_primality_test Miller-Rabin primality test}.
- * See {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap4.pdf#page=8 HAC 4.24} for more info.
- *
- * @param int $t
- * @return bool
- */
- protected function testPrimality($t)
- {
- if (!$this->testSmallPrimes()) {
- return false;
- }
-
- $n = clone $this;
- $n_1 = $n->subtract(static::$one);
- $n_2 = $n->subtract(static::$two);
-
- $r = clone $n_1;
- $s = static::scan1divide($r);
-
- for ($i = 0; $i < $t; ++$i) {
- $a = static::randomRange(static::$two, $n_2);
- $y = $a->modPow($r, $n);
-
- if (!$y->equals(static::$one) && !$y->equals($n_1)) {
- for ($j = 1; $j < $s && !$y->equals($n_1); ++$j) {
- $y = $y->modPow(static::$two, $n);
- if ($y->equals(static::$one)) {
- return false;
- }
- }
-
- if (!$y->equals($n_1)) {
- return false;
- }
- }
- }
-
- return true;
- }
-
- /**
- * Checks a numer to see if it's prime
- *
- * Assuming the $t parameter is not set, this function has an error rate of 2**-80. The main motivation for the
- * $t parameter is distributability. BigInteger::randomPrime() can be distributed across multiple pageloads
- * on a website instead of just one.
- *
- * @param int|bool $t
- * @return bool
- */
- public function isPrime($t = false)
- {
- if (!$t) {
- $t = $this->setupIsPrime();
- }
- return $this->testPrimality($t);
- }
-
- /**
- * Performs a few preliminary checks on root
- *
- * @param int $n
- * @return \phpseclib3\Math\BigInteger\Engines\Engine
- */
- protected function rootHelper($n)
- {
- if ($n < 1) {
- return clone static::$zero;
- } // we want positive exponents
- if ($this->compare(static::$one) < 0) {
- return clone static::$zero;
- } // we want positive numbers
- if ($this->compare(static::$two) < 0) {
- return clone static::$one;
- } // n-th root of 1 or 2 is 1
-
- return $this->rootInner($n);
- }
-
- /**
- * Calculates the nth root of a biginteger.
- *
- * Returns the nth root of a positive biginteger, where n defaults to 2
- *
- * {@internal This function is based off of {@link http://mathforum.org/library/drmath/view/52605.html this page} and {@link http://stackoverflow.com/questions/11242920/calculating-nth-root-with-bcmath-in-php this stackoverflow question}.}
- *
- * @param int $n
- * @return \phpseclib3\Math\BigInteger\Engines\Engine
- */
- protected function rootInner($n)
- {
- $n = new static($n);
-
- // g is our guess number
- $g = static::$two;
- // while (g^n < num) g=g*2
- while ($g->pow($n)->compare($this) < 0) {
- $g = $g->multiply(static::$two);
- }
- // if (g^n==num) num is a power of 2, we're lucky, end of job
- // == 0 bccomp(bcpow($g, $n), $n->value)==0
- if ($g->pow($n)->equals($this) > 0) {
- $root = $g;
- return $this->normalize($root);
- }
-
- // if we're here num wasn't a power of 2 :(
- $og = $g; // og means original guess and here is our upper bound
- $g = $g->divide(static::$two)[0]; // g is set to be our lower bound
- $step = $og->subtract($g)->divide(static::$two)[0]; // step is the half of upper bound - lower bound
- $g = $g->add($step); // we start at lower bound + step , basically in the middle of our interval
-
- // while step>1
-
- while ($step->compare(static::$one) == 1) {
- $guess = $g->pow($n);
- $step = $step->divide(static::$two)[0];
- $comp = $guess->compare($this); // compare our guess with real number
- switch ($comp) {
- case -1: // if guess is lower we add the new step
- $g = $g->add($step);
- break;
- case 1: // if guess is higher we sub the new step
- $g = $g->subtract($step);
- break;
- case 0: // if guess is exactly the num we're done, we return the value
- $root = $g;
- break 2;
- }
- }
-
- if ($comp == 1) {
- $g = $g->subtract($step);
- }
-
- // whatever happened, g is the closest guess we can make so return it
- $root = $g;
-
- return $this->normalize($root);
- }
-
- /**
- * Calculates the nth root of a biginteger.
- *
- * @param int $n
- * @return Engine
- */
- public function root($n = 2)
- {
- return $this->rootHelper($n);
- }
-
- /**
- * Return the minimum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param array $nums
- * @return Engine
- */
- protected static function minHelper(array $nums)
- {
- if (count($nums) == 1) {
- return $nums[0];
- }
- $min = $nums[0];
- for ($i = 1; $i < count($nums); $i++) {
- $min = $min->compare($nums[$i]) > 0 ? $nums[$i] : $min;
- }
- return $min;
- }
-
- /**
- * Return the minimum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param array $nums
- * @return Engine
- */
- protected static function maxHelper(array $nums)
- {
- if (count($nums) == 1) {
- return $nums[0];
- }
- $max = $nums[0];
- for ($i = 1; $i < count($nums); $i++) {
- $max = $max->compare($nums[$i]) < 0 ? $nums[$i] : $max;
- }
- return $max;
- }
-
- /**
- * Create Recurring Modulo Function
- *
- * Sometimes it may be desirable to do repeated modulos with the same number outside of
- * modular exponentiation
- *
- * @return callable
- */
- public function createRecurringModuloFunction()
- {
- $class = static::class;
-
- $fqengine = !method_exists(static::$modexpEngine, 'reduce') ?
- '\\phpseclib3\\Math\\BigInteger\\Engines\\' . static::ENGINE_DIR . '\\DefaultEngine' :
- static::$modexpEngine;
- if (method_exists($fqengine, 'generateCustomReduction')) {
- $func = $fqengine::generateCustomReduction($this, static::class);
- $this->reduce = eval('return function(' . static::class . ' $x) use ($func, $class) {
- $r = new $class();
- $r->value = $func($x->value);
- return $r;
- };');
- return clone $this->reduce;
- }
- $n = $this->value;
- $this->reduce = eval('return function(' . static::class . ' $x) use ($n, $fqengine, $class) {
- $r = new $class();
- $r->value = $fqengine::reduce($x->value, $n, $class);
- return $r;
- };');
- return clone $this->reduce;
- }
-
- /**
- * Calculates the greatest common divisor and Bezout's identity.
- *
- * @param Engine $n
- * @param Engine $stop (optional)
- * @return Engine
- */
- protected function extendedGCDHelper(Engine $n, Engine $stop = null)
- {
- $u = clone $this;
- $v = clone $n;
-
- $one = new static(1);
- $zero = new static();
-
- $a = clone $one;
- $b = clone $zero;
- $c = clone $zero;
- $d = clone $one;
-
- while (!$v->equals($zero)) {
- list($q) = $u->divide($v);
-
- $temp = $u;
- $u = $v;
- $v = $temp->subtract($v->multiply($q));
-
- $temp = $a;
- $a = $c;
- $c = $temp->subtract($a->multiply($q));
-
- $temp = $b;
- $b = $d;
- $d = $temp->subtract($b->multiply($q));
- }
-
- return [
- 'gcd'=> $u,
- 'x' => $a,
- 'y' => $b
- ];
- }
-
- /**
- * Bitwise Split
- *
- * Splits BigInteger's into chunks of $split bits
- *
- * @param int $split
- * @return \phpseclib3\Math\BigInteger\Engines\Engine[]
- */
- public function bitwise_split($split)
- {
- if ($split < 1) {
- throw new \RuntimeException('Offset must be greater than 1');
- }
-
- $mask = static::$one->bitwise_leftShift($split)->subtract(static::$one);
-
- $num = clone $this;
-
- $vals = [];
- while (!$num->equals(static::$zero)) {
- $vals[] = $num->bitwise_and($mask);
- $num = $num->bitwise_rightShift($split);
- }
-
- return array_reverse($vals);
- }
-
- /**
- * Logical And
- *
- * @param Engine $x
- * @return Engine
- */
- protected function bitwiseAndHelper(Engine $x)
- {
- $left = $this->toBytes(true);
- $right = $x->toBytes(true);
-
- $length = max(strlen($left), strlen($right));
-
- $left = str_pad($left, $length, chr(0), STR_PAD_LEFT);
- $right = str_pad($right, $length, chr(0), STR_PAD_LEFT);
-
- return $this->normalize(new static($left & $right, -256));
- }
-
- /**
- * Logical Or
- *
- * @param Engine $x
- * @return Engine
- */
- protected function bitwiseOrHelper(Engine $x)
- {
- $left = $this->toBytes(true);
- $right = $x->toBytes(true);
-
- $length = max(strlen($left), strlen($right));
-
- $left = str_pad($left, $length, chr(0), STR_PAD_LEFT);
- $right = str_pad($right, $length, chr(0), STR_PAD_LEFT);
-
- return $this->normalize(new static($left | $right, -256));
- }
-
- /**
- * Logical Exclusive Or
- *
- * @param Engine $x
- * @return Engine
- */
- protected function bitwiseXorHelper(Engine $x)
- {
- $left = $this->toBytes(true);
- $right = $x->toBytes(true);
-
- $length = max(strlen($left), strlen($right));
-
-
- $left = str_pad($left, $length, chr(0), STR_PAD_LEFT);
- $right = str_pad($right, $length, chr(0), STR_PAD_LEFT);
- return $this->normalize(new static($left ^ $right, -256));
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP.php
deleted file mode 100644
index 2cbc9cbed..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP.php
+++ /dev/null
@@ -1,751 +0,0 @@
-<?php
-
-/**
- * GMP BigInteger Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines;
-
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Exception\BadConfigurationException;
-
-/**
- * GMP Engine.
- *
- * @package GMP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class GMP extends Engine
-{
- /**
- * Can Bitwise operations be done fast?
- *
- * @see parent::bitwise_leftRotate()
- * @see parent::bitwise_rightRotate()
- * @access protected
- */
- const FAST_BITWISE = true;
-
- /**
- * Engine Directory
- *
- * @see parent::setModExpEngine
- * @access protected
- */
- const ENGINE_DIR = 'GMP';
-
- /**
- * Modular Exponentiation Engine
- *
- * @var string
- */
- protected static $modexpEngine;
-
- /**
- * Engine Validity Flag
- *
- * @var bool
- */
- protected static $isValidEngine;
-
- /**
- * BigInteger(0)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\GMP
- */
- protected static $zero;
-
- /**
- * BigInteger(1)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\GMP
- */
- protected static $one;
-
- /**
- * BigInteger(2)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\GMP
- */
- protected static $two;
-
- /**
- * Primes > 2 and < 1000
- *
- * Unused for GMP Engine
- *
- * @var mixed
- */
- protected static $primes;
-
- /**
- * Test for engine validity
- *
- * @see parent::__construct()
- * @return bool
- */
- public static function isValidEngine()
- {
- return extension_loaded('gmp');
- }
-
- /**
- * Default constructor
- *
- * @param mixed $x integer Base-10 number or base-$base number if $base set.
- * @param int $base
- * @see parent::__construct()
- * @return \phpseclib3\Math\BigInteger\Engines\GMP
- */
- public function __construct($x = 0, $base = 10)
- {
- if (!isset(self::$isValidEngine)) {
- self::$isValidEngine = self::isValidEngine();
- }
- if (!self::$isValidEngine) {
- throw new BadConfigurationException('GMP is not setup correctly on this system');
- }
-
- if ($x instanceof \GMP) {
- $this->value = $x;
- return;
- }
-
- $this->value = gmp_init(0);
-
- parent::__construct($x, $base);
- }
-
- /**
- * Initialize a GMP BigInteger Engine instance
- *
- * @param int $base
- * @see parent::__construct()
- */
- protected function initialize($base)
- {
- switch (abs($base)) {
- case 256:
- $this->value = gmp_import($this->value);
- if ($this->is_negative) {
- $this->value = -$this->value;
- }
- break;
- case 16:
- $temp = $this->is_negative ? '-0x' . $this->value : '0x' . $this->value;
- $this->value = gmp_init($temp);
- break;
- case 10:
- $this->value = gmp_init(isset($this->value) ? $this->value : '0');
- }
- }
-
- /**
- * Converts a BigInteger to a base-10 number.
- *
- * @return string
- */
- public function toString()
- {
- return (string) $this->value;
- }
-
- /**
- * Converts a BigInteger to a bit string (eg. base-2).
- *
- * Negative numbers are saved as positive numbers, unless $twos_compliment is set to true, at which point, they're
- * saved as two's compliment.
- *
- * @param bool $twos_compliment
- * @return string
- */
- public function toBits($twos_compliment = false)
- {
- $hex = $this->toHex($twos_compliment);
-
- $bits = gmp_strval(gmp_init($hex, 16), 2);
-
- if ($this->precision > 0) {
- $bits = substr($bits, -$this->precision);
- }
-
- if ($twos_compliment && $this->compare(new static()) > 0 && $this->precision <= 0) {
- return '0' . $bits;
- }
-
- return $bits;
- }
-
- /**
- * Converts a BigInteger to a byte string (eg. base-256).
- *
- * @param bool $twos_compliment
- * @return string
- */
- function toBytes($twos_compliment = false)
- {
- if ($twos_compliment) {
- return $this->toBytesHelper();
- }
-
- if (gmp_cmp($this->value, gmp_init(0)) == 0) {
- return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : '';
- }
-
- $temp = gmp_export($this->value);
-
- return $this->precision > 0 ?
- substr(str_pad($temp, $this->precision >> 3, chr(0), STR_PAD_LEFT), -($this->precision >> 3)) :
- ltrim($temp, chr(0));
- }
-
- /**
- * Adds two BigIntegers.
- *
- * @param GMP $y
- * @return GMP
- */
- public function add(GMP $y)
- {
- $temp = new self();
- $temp->value = $this->value + $y->value;
-
- return $this->normalize($temp);
- }
-
- /**
- * Subtracts two BigIntegers.
- *
- * @param GMP $y
- * @return GMP
- */
- public function subtract(GMP $y)
- {
- $temp = new self();
- $temp->value = $this->value - $y->value;
-
- return $this->normalize($temp);
- }
-
- /**
- * Multiplies two BigIntegers.
- *
- * @param GMP $x
- * @return GMP
- */
- public function multiply(GMP $x)
- {
- $temp = new self();
- $temp->value = $this->value * $x->value;
-
- return $this->normalize($temp);
- }
-
- /**
- * Divides two BigIntegers.
- *
- * Returns an array whose first element contains the quotient and whose second element contains the
- * "common residue". If the remainder would be positive, the "common residue" and the remainder are the
- * same. If the remainder would be negative, the "common residue" is equal to the sum of the remainder
- * and the divisor (basically, the "common residue" is the first positive modulo).
- *
- * @param GMP $y
- * @return GMP
- */
- public function divide(GMP $y)
- {
- $quotient = new self();
- $remainder = new self();
-
- list($quotient->value, $remainder->value) = gmp_div_qr($this->value, $y->value);
-
- if (gmp_sign($remainder->value) < 0) {
- $remainder->value = $remainder->value + gmp_abs($y->value);
- }
-
- return [$this->normalize($quotient), $this->normalize($remainder)];
- }
-
- /**
- * Compares two numbers.
- *
- * Although one might think !$x->compare($y) means $x != $y, it, in fact, means the opposite. The reason for this is
- * demonstrated thusly:
- *
- * $x > $y: $x->compare($y) > 0
- * $x < $y: $x->compare($y) < 0
- * $x == $y: $x->compare($y) == 0
- *
- * Note how the same comparison operator is used. If you want to test for equality, use $x->equals($y).
- *
- * {@internal Could return $this->subtract($x), but that's not as fast as what we do do.}
- *
- * @param GMP $y
- * @return int in case < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal.
- * @access public
- * @see self::equals()
- */
- public function compare(GMP $y)
- {
- $r = gmp_cmp($this->value, $y->value);
- if ($r < -1) {
- $r = -1;
- }
- if ($r > 1) {
- $r = 1;
- }
- return $r;
- }
-
- /**
- * Tests the equality of two numbers.
- *
- * If you need to see if one number is greater than or less than another number, use BigInteger::compare()
- *
- * @param GMP $x
- * @return bool
- */
- public function equals(GMP $x)
- {
- return $this->value == $x->value;
- }
-
- /**
- * Calculates modular inverses.
- *
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- *
- * @param GMP $n
- * @return false|GMP
- */
- public function modInverse(GMP $n)
- {
- $temp = new self();
- $temp->value = gmp_invert($this->value, $n->value);
-
- return $temp->value === false ? false : $this->normalize($temp);
- }
-
- /**
- * Calculates the greatest common divisor and Bezout's identity.
- *
- * Say you have 693 and 609. The GCD is 21. Bezout's identity states that there exist integers x and y such that
- * 693*x + 609*y == 21. In point of fact, there are actually an infinite number of x and y combinations and which
- * combination is returned is dependent upon which mode is in use. See
- * {@link http://en.wikipedia.org/wiki/B%C3%A9zout%27s_identity Bezout's identity - Wikipedia} for more information.
- *
- * @param \phpseclib3\Math\BigInteger\Engines\GMP $n
- * @return \phpseclib3\Math\BigInteger\Engines\GMP[]
- */
- public function extendedGCD(GMP $n)
- {
- extract(gmp_gcdext($this->value, $n->value));
-
- return [
- 'gcd' => $this->normalize(new self($g)),
- 'x' => $this->normalize(new self($s)),
- 'y' => $this->normalize(new self($t))
- ];
- }
-
- /**
- * Calculates the greatest common divisor
- *
- * Say you have 693 and 609. The GCD is 21.
- *
- * @param GMP $n
- * @return GMP
- */
- public function gcd(GMP $n)
- {
- $r = gmp_gcd($this->value, $n->value);
- return $this->normalize(new self($r));
- }
-
- /**
- * Absolute value.
- *
- * @return \phpseclib3\Math\BigInteger\Engines\GMP
- * @access public
- */
- public function abs()
- {
- $temp = new self();
- $temp->value = gmp_abs($this->value);
-
- return $temp;
- }
-
- /**
- * Logical And
- *
- * @param GMP $x
- * @return GMP
- */
- public function bitwise_and(GMP $x)
- {
- $temp = new self();
- $temp->value = $this->value & $x->value;
-
- return $this->normalize($temp);
- }
-
- /**
- * Logical Or
- *
- * @param GMP $x
- * @return GMP
- */
- public function bitwise_or(GMP $x)
- {
- $temp = new self();
- $temp->value = $this->value | $x->value;
-
- return $this->normalize($temp);
- }
-
- /**
- * Logical Exclusive Or
- *
- * @param GMP $x
- * @return GMP
- */
- public function bitwise_xor(GMP $x)
- {
- $temp = new self();
- $temp->value = $this->value ^ $x->value;
-
- return $this->normalize($temp);
- }
-
- /**
- * Logical Right Shift
- *
- * Shifts BigInteger's by $shift bits, effectively dividing by 2**$shift.
- *
- * @param int $shift
- * @return \phpseclib3\Math\BigInteger\Engines\GMP
- */
- public function bitwise_rightShift($shift)
- {
- // 0xFFFFFFFF >> 2 == -1 (on 32-bit systems)
- // gmp_init('0xFFFFFFFF') >> 2 == gmp_init('0x3FFFFFFF')
-
- $temp = new self();
- $temp->value = $this->value >> $shift;
-
- return $this->normalize($temp);
- }
-
- /**
- * Logical Left Shift
- *
- * Shifts BigInteger's by $shift bits, effectively multiplying by 2**$shift.
- *
- * @param int $shift
- * @return \phpseclib3\Math\BigInteger\Engines\GMP
- */
- public function bitwise_leftShift($shift)
- {
- $temp = new self();
- $temp->value = $this->value << $shift;
-
- return $this->normalize($temp);
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param GMP $e
- * @param GMP $n
- * @return GMP
- */
- public function modPow(GMP $e, GMP $n)
- {
- return $this->powModOuter($e, $n);
- }
-
- /**
- * Performs modular exponentiation.
- *
- * Alias for modPow().
- *
- * @param GMP $e
- * @param GMP $n
- * @return GMP
- */
- public function powMod(GMP $e, GMP $n)
- {
- return $this->powModOuter($e, $n);
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param GMP $e
- * @param GMP $n
- * @return GMP
- */
- protected function powModInner(GMP $e, GMP $n)
- {
- $class = self::$modexpEngine;
- return $class::powModHelper($this, $e, $n);
- }
-
- /**
- * Normalize
- *
- * Removes leading zeros and truncates (if necessary) to maintain the appropriate precision
- *
- * @param GMP $result
- * @return GMP
- */
- protected function normalize(GMP $result)
- {
- unset($result->reduce);
-
- $result->precision = $this->precision;
- $result->bitmask = $this->bitmask;
-
- if ($result->bitmask !== false) {
- $flip = $result->value < 0;
- if ($flip) {
- $result->value = -$result->value;
- }
- $result->value = $result->value & $result->bitmask->value;
- if ($flip) {
- $result->value = -$result->value;
- }
- }
-
- return $result;
- }
-
- /**
- * Performs some post-processing for randomRangePrime
- *
- * @param Engine $x
- * @param Engine $min
- * @param Engine $max
- * @return GMP
- */
- protected static function randomRangePrimeInner(Engine $x, Engine $min, Engine $max)
- {
- $p = gmp_nextprime($x->value);
-
- if ($p <= $max->value) {
- return new self($p);
- }
-
- if ($min->value != $x->value) {
- $x = new self($x->value - 1);
- }
-
- return self::randomRangePrime($min, $x);
- }
-
- /**
- * Generate a random prime number between a range
- *
- * If there's not a prime within the given range, false will be returned.
- *
- * @param GMP $min
- * @param GMP $max
- * @return false|GMP
- */
- public static function randomRangePrime(GMP $min, GMP $max)
- {
- return self::randomRangePrimeOuter($min, $max);
- }
-
- /**
- * Generate a random number between a range
- *
- * Returns a random number between $min and $max where $min and $max
- * can be defined using one of the two methods:
- *
- * BigInteger::randomRange($min, $max)
- * BigInteger::randomRange($max, $min)
- *
- * @param GMP $min
- * @param GMP $max
- * @return GMP
- */
- public static function randomRange(GMP $min, GMP $max)
- {
- return self::randomRangeHelper($min, $max);
- }
-
- /**
- * Make the current number odd
- *
- * If the current number is odd it'll be unchanged. If it's even, one will be added to it.
- *
- * @see self::randomPrime()
- */
- protected function make_odd()
- {
- gmp_setbit($this->value, 0);
- }
-
- /**
- * Tests Primality
- *
- * @param int $t
- * @return bool
- */
- protected function testPrimality($t)
- {
- return gmp_prob_prime($this->value, $t) != 0;
- }
-
- /**
- * Calculates the nth root of a biginteger.
- *
- * Returns the nth root of a positive biginteger, where n defaults to 2
- *
- * @param int $n
- * @return GMP
- */
- protected function rootInner($n)
- {
- $root = new self();
- $root->value = gmp_root($this->value, $n);
- return $this->normalize($root);
- }
-
- /**
- * Performs exponentiation.
- *
- * @param GMP $n
- * @return GMP
- */
- public function pow(GMP $n)
- {
- $temp = new self();
- $temp->value = $this->value ** $n->value;
-
- return $this->normalize($temp);
- }
-
- /**
- * Return the minimum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param GMP ...$nums
- * @return GMP
- */
- public static function min(GMP ...$nums)
- {
- return self::minHelper($nums);
- }
-
- /**
- * Return the maximum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param GMP ...$nums
- * @return GMP
- */
- public static function max(GMP ...$nums)
- {
- return self::maxHelper($nums);
- }
-
- /**
- * Tests BigInteger to see if it is between two integers, inclusive
- *
- * @param GMP $min
- * @param GMP $max
- * @return bool
- */
- public function between(GMP $min, GMP $max)
- {
- return $this->compare($min) >= 0 && $this->compare($max) <= 0;
- }
-
- /**
- * Create Recurring Modulo Function
- *
- * Sometimes it may be desirable to do repeated modulos with the same number outside of
- * modular exponentiation
- *
- * @return callable
- */
- public function createRecurringModuloFunction()
- {
- $temp = $this->value;
- $this->reduce = function(GMP $x) use ($temp) {
- return new GMP($x->value % $temp);
- };
- return $this->reduce;
- }
-
- /**
- * Scan for 1 and right shift by that amount
- *
- * ie. $s = gmp_scan1($n, 0) and $r = gmp_div_q($n, gmp_pow(gmp_init('2'), $s));
- *
- * @param GMP $r
- * @return int
- */
- public static function scan1divide(GMP $r)
- {
- $s = gmp_scan1($r->value, 0);
- $r->value >>= $s;
- return $s;
- }
-
- /**
- * Is Odd?
- *
- * @return boolean
- */
- public function isOdd()
- {
- return gmp_testbit($this->value, 0);
- }
-
- /**
- * Tests if a bit is set
- *
- * @return boolean
- */
- public function testBit($x)
- {
- return gmp_testbit($this->value, $x);
- }
-
- /**
- * Is Negative?
- *
- * @return boolean
- */
- public function isNegative()
- {
- return gmp_sign($this->value) == -1;
- }
-
- /**
- * Negate
- *
- * Given $k, returns -$k
- *
- * @return GMP
- */
- public function negate()
- {
- $temp = clone $this;
- $temp->value = -$this->value;
-
- return $temp;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP/DefaultEngine.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP/DefaultEngine.php
deleted file mode 100644
index 9889271ec..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/GMP/DefaultEngine.php
+++ /dev/null
@@ -1,44 +0,0 @@
-<?php
-
-/**
- * GMP Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\GMP;
-
-use phpseclib3\Math\BigInteger\Engines\GMP;
-
-/**
- * GMP Modular Exponentiation Engine
- *
- * @package GMP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DefaultEngine extends GMP
-{
- /**
- * Performs modular exponentiation.
- *
- * @param GMP $x
- * @param GMP $e
- * @param GMP $n
- * @return GMP
- */
- protected static function powModHelper(GMP $x, GMP $e, GMP $n)
- {
- $temp = new GMP();
- $temp->value = gmp_powm($x->value, $e->value, $n->value);
-
- return $x->normalize($temp);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/OpenSSL.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/OpenSSL.php
deleted file mode 100644
index ce4d18a3f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/OpenSSL.php
+++ /dev/null
@@ -1,75 +0,0 @@
-<?php
-
-/**
- * OpenSSL Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines;
-
-use phpseclib3\Crypt\RSA;
-use phpseclib3\Crypt\RSA\Formats\Keys\PKCS8;
-use phpseclib3\Math\BigInteger;
-
-/**
- * OpenSSL Modular Exponentiation Engine
- *
- * @package Engines
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OpenSSL
-{
- /**
- * Test for engine validity
- *
- * @return bool
- */
- public static function isValidEngine()
- {
- return extension_loaded('openssl') && static::class != __CLASS__;
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param Engine $x
- * @param Engine $e
- * @param Engine $n
- * @return Engine
- */
- public static function powModHelper(Engine $x, Engine $e, Engine $n)
- {
- if ($n->getLengthInBytes() < 31 || $n->getLengthInBytes() > 16384) {
- throw new \OutOfRangeException('Only modulo between 31 and 16384 bits are accepted');
- }
-
- $key = PKCS8::savePublicKey(
- new BigInteger($n),
- new BigInteger($e)
- );
- $rsa = RSA::load($key);
- //$rsa->setPublicKeyFormat('PKCS1');
-
- $plaintext = str_pad($x->toBytes(), strlen($n->toBytes(true)) - 1, "\0", STR_PAD_LEFT);
-
- // this is easily prone to failure. if the modulo is a multiple of 2 or 3 or whatever it
- // won't work and you'll get a "failure: error:0906D06C:PEM routines:PEM_read_bio:no start line"
- // error. i suppose, for even numbers, we could do what PHP\Montgomery.php does, but then what
- // about odd numbers divisible by 3, by 5, etc?
- if (!openssl_public_encrypt($plaintext, $result, "$rsa", OPENSSL_NO_PADDING)) {
- throw new \UnexpectedValueException(openssl_error_string());
- }
-
- $class = get_class($x);
- return new $class($result, 256);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP.php
deleted file mode 100644
index 5f94e68ba..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP.php
+++ /dev/null
@@ -1,1316 +0,0 @@
-<?php
-
-/**
- * Pure-PHP BigInteger Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines;
-
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Exception\BadConfigurationException;
-
-/**
- * Pure-PHP Engine.
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PHP extends Engine
-{
- /**#@+
- * Array constants
- *
- * Rather than create a thousands and thousands of new BigInteger objects in repeated function calls to add() and
- * multiply() or whatever, we'll just work directly on arrays, taking them in as parameters and returning them.
- *
- * @access protected
- */
- /**
- * $result[self::VALUE] contains the value.
- */
- const VALUE = 0;
- /**
- * $result[self::SIGN] contains the sign.
- */
- const SIGN = 1;
- /**#@-*/
-
- /**
- * Karatsuba Cutoff
- *
- * At what point do we switch between Karatsuba multiplication and schoolbook long multiplication?
- *
- * @access private
- */
- const KARATSUBA_CUTOFF = 25;
-
- /**
- * Can Bitwise operations be done fast?
- *
- * @see parent::bitwise_leftRotate()
- * @see parent::bitwise_rightRotate()
- * @access protected
- */
- const FAST_BITWISE = true;
-
- /**
- * Engine Directory
- *
- * @see parent::setModExpEngine
- * @access protected
- */
- const ENGINE_DIR = 'PHP';
-
- /**
- * Default constructor
- *
- * @param mixed $x integer Base-10 number or base-$base number if $base set.
- * @param int $base
- * @see parent::__construct()
- * @return \phpseclib3\Math\BigInteger\Engines\PHP
- */
- public function __construct($x = 0, $base = 10)
- {
- if (!isset(static::$isValidEngine)) {
- static::$isValidEngine = static::isValidEngine();
- }
- if (!static::$isValidEngine) {
- throw new BadConfigurationException(static::class . ' is not setup correctly on this system');
- }
-
- $this->value = [];
- parent::__construct($x, $base);
- }
-
- /**
- * Initialize a PHP BigInteger Engine instance
- *
- * @param int $base
- * @see parent::__construct()
- */
- protected function initialize($base)
- {
- switch (abs($base)) {
- case 16:
- $x = (strlen($this->value) & 1) ? '0' . $this->value : $this->value;
- $temp = new static(Hex::decode($x), 256);
- $this->value = $temp->value;
- break;
- case 10:
- $temp = new static();
-
- $multiplier = new static();
- $multiplier->value = [static::MAX10];
-
- $x = $this->value;
-
- if ($x[0] == '-') {
- $this->is_negative = true;
- $x = substr($x, 1);
- }
-
- $x = str_pad($x, strlen($x) + ((static::MAX10LEN - 1) * strlen($x)) % static::MAX10LEN, 0, STR_PAD_LEFT);
- while (strlen($x)) {
- $temp = $temp->multiply($multiplier);
- $temp = $temp->add(new static($this->int2bytes(substr($x, 0, static::MAX10LEN)), 256));
- $x = substr($x, static::MAX10LEN);
- }
-
- $this->value = $temp->value;
- }
- }
-
- /**
- * Pads strings so that unpack may be used on them
- *
- * @param string $str
- * @return string
- */
- protected function pad($str)
- {
- $length = strlen($str);
-
- $pad = 4 - (strlen($str) % 4);
-
- return str_pad($str, $length + $pad, "\0", STR_PAD_LEFT);
- }
-
- /**
- * Converts a BigInteger to a base-10 number.
- *
- * @return string
- */
- public function toString()
- {
- if (!count($this->value)) {
- return '0';
- }
-
- $temp = clone $this;
- $temp->bitmask = false;
- $temp->is_negative = false;
-
- $divisor = new static();
- $divisor->value = [static::MAX10];
- $result = '';
- while (count($temp->value)) {
- list($temp, $mod) = $temp->divide($divisor);
- $result = str_pad(isset($mod->value[0]) ? $mod->value[0] : '', static::MAX10LEN, '0', STR_PAD_LEFT) . $result;
- }
- $result = ltrim($result, '0');
- if (empty($result)) {
- $result = '0';
- }
-
- if ($this->is_negative) {
- $result = '-' . $result;
- }
-
- return $result;
- }
-
- /**
- * Converts a BigInteger to a byte string (eg. base-256).
- *
- * @param bool $twos_compliment
- * @return string
- */
- public function toBytes($twos_compliment = false)
- {
- if ($twos_compliment) {
- return $this->toBytesHelper();
- }
-
- if (!count($this->value)) {
- return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : '';
- }
-
- $result = $this->bitwise_small_split(8);
- $result = implode('', array_map('chr', $result));
-
- return $this->precision > 0 ?
- str_pad(substr($result, -(($this->precision + 7) >> 3)), ($this->precision + 7) >> 3, chr(0), STR_PAD_LEFT) :
- $result;
- }
-
- /**
- * Performs addition.
- *
- * @param array $x_value
- * @param bool $x_negative
- * @param array $y_value
- * @param bool $y_negative
- * @return array
- */
- protected static function addHelper(array $x_value, $x_negative, array $y_value, $y_negative)
- {
- $x_size = count($x_value);
- $y_size = count($y_value);
-
- if ($x_size == 0) {
- return [
- self::VALUE => $y_value,
- self::SIGN => $y_negative
- ];
- } elseif ($y_size == 0) {
- return [
- self::VALUE => $x_value,
- self::SIGN => $x_negative
- ];
- }
-
- // subtract, if appropriate
- if ($x_negative != $y_negative) {
- if ($x_value == $y_value) {
- return [
- self::VALUE => [],
- self::SIGN => false
- ];
- }
-
- $temp = self::subtractHelper($x_value, false, $y_value, false);
- $temp[self::SIGN] = self::compareHelper($x_value, false, $y_value, false) > 0 ?
- $x_negative : $y_negative;
-
- return $temp;
- }
-
- if ($x_size < $y_size) {
- $size = $x_size;
- $value = $y_value;
- } else {
- $size = $y_size;
- $value = $x_value;
- }
-
- $value[count($value)] = 0; // just in case the carry adds an extra digit
-
- $carry = 0;
- for ($i = 0, $j = 1; $j < $size; $i+=2, $j+=2) {
- //$sum = $x_value[$j] * static::BASE_FULL + $x_value[$i] + $y_value[$j] * static::BASE_FULL + $y_value[$i] + $carry;
- $sum = ($x_value[$j] + $y_value[$j]) * static::BASE_FULL + $x_value[$i] + $y_value[$i] + $carry;
- $carry = $sum >= static::MAX_DIGIT2; // eg. floor($sum / 2**52); only possible values (in any base) are 0 and 1
- $sum = $carry ? $sum - static::MAX_DIGIT2 : $sum;
-
- $temp = static::BASE === 26 ? intval($sum / 0x4000000) : ($sum >> 31);
-
- $value[$i] = (int) ($sum - static::BASE_FULL * $temp); // eg. a faster alternative to fmod($sum, 0x4000000)
- $value[$j] = $temp;
- }
-
- if ($j == $size) { // ie. if $y_size is odd
- $sum = $x_value[$i] + $y_value[$i] + $carry;
- $carry = $sum >= static::BASE_FULL;
- $value[$i] = $carry ? $sum - static::BASE_FULL : $sum;
- ++$i; // ie. let $i = $j since we've just done $value[$i]
- }
-
- if ($carry) {
- for (; $value[$i] == static::MAX_DIGIT; ++$i) {
- $value[$i] = 0;
- }
- ++$value[$i];
- }
-
- return [
- self::VALUE => self::trim($value),
- self::SIGN => $x_negative
- ];
- }
-
- /**
- * Performs subtraction.
- *
- * @param array $x_value
- * @param bool $x_negative
- * @param array $y_value
- * @param bool $y_negative
- * @return array
- */
- static function subtractHelper(array $x_value, $x_negative, array $y_value, $y_negative)
- {
- $x_size = count($x_value);
- $y_size = count($y_value);
-
- if ($x_size == 0) {
- return [
- self::VALUE => $y_value,
- self::SIGN => !$y_negative
- ];
- } elseif ($y_size == 0) {
- return [
- self::VALUE => $x_value,
- self::SIGN => $x_negative
- ];
- }
-
- // add, if appropriate (ie. -$x - +$y or +$x - -$y)
- if ($x_negative != $y_negative) {
- $temp = self::addHelper($x_value, false, $y_value, false);
- $temp[self::SIGN] = $x_negative;
-
- return $temp;
- }
-
- $diff = self::compareHelper($x_value, $x_negative, $y_value, $y_negative);
-
- if (!$diff) {
- return [
- self::VALUE => [],
- self::SIGN => false
- ];
- }
-
- // switch $x and $y around, if appropriate.
- if ((!$x_negative && $diff < 0) || ($x_negative && $diff > 0)) {
- $temp = $x_value;
- $x_value = $y_value;
- $y_value = $temp;
-
- $x_negative = !$x_negative;
-
- $x_size = count($x_value);
- $y_size = count($y_value);
- }
-
- // at this point, $x_value should be at least as big as - if not bigger than - $y_value
-
- $carry = 0;
- for ($i = 0, $j = 1; $j < $y_size; $i+=2, $j+=2) {
- $sum = ($x_value[$j] - $y_value[$j]) * static::BASE_FULL + $x_value[$i] - $y_value[$i] - $carry;
-
- $carry = $sum < 0; // eg. floor($sum / 2**52); only possible values (in any base) are 0 and 1
- $sum = $carry ? $sum + static::MAX_DIGIT2 : $sum;
-
- $temp = static::BASE === 26 ? intval($sum / 0x4000000) : ($sum >> 31);
-
- $x_value[$i] = (int) ($sum - static::BASE_FULL * $temp);
- $x_value[$j] = $temp;
- }
-
- if ($j == $y_size) { // ie. if $y_size is odd
- $sum = $x_value[$i] - $y_value[$i] - $carry;
- $carry = $sum < 0;
- $x_value[$i] = $carry ? $sum + static::BASE_FULL : $sum;
- ++$i;
- }
-
- if ($carry) {
- for (; !$x_value[$i]; ++$i) {
- $x_value[$i] = static::MAX_DIGIT;
- }
- --$x_value[$i];
- }
-
- return [
- self::VALUE => self::trim($x_value),
- self::SIGN => $x_negative
- ];
- }
-
- /**
- * Performs multiplication.
- *
- * @param array $x_value
- * @param bool $x_negative
- * @param array $y_value
- * @param bool $y_negative
- * @return array
- */
- protected static function multiplyHelper(array $x_value, $x_negative, array $y_value, $y_negative)
- {
- //if ( $x_value == $y_value ) {
- // return [
- // self::VALUE => self::square($x_value),
- // self::SIGN => $x_sign != $y_value
- // ];
- //}
-
- $x_length = count($x_value);
- $y_length = count($y_value);
-
- if (!$x_length || !$y_length) { // a 0 is being multiplied
- return [
- self::VALUE => [],
- self::SIGN => false
- ];
- }
-
- return [
- self::VALUE => min($x_length, $y_length) < 2 * self::KARATSUBA_CUTOFF ?
- self::trim(self::regularMultiply($x_value, $y_value)) :
- self::trim(self::karatsuba($x_value, $y_value)),
- self::SIGN => $x_negative != $y_negative
- ];
- }
-
- /**
- * Performs Karatsuba multiplication on two BigIntegers
- *
- * See {@link http://en.wikipedia.org/wiki/Karatsuba_algorithm Karatsuba algorithm} and
- * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=120 MPM 5.2.3}.
- *
- * @param array $x_value
- * @param array $y_value
- * @return array
- */
- private static function karatsuba(array $x_value, array $y_value)
- {
- $m = min(count($x_value) >> 1, count($y_value) >> 1);
-
- if ($m < self::KARATSUBA_CUTOFF) {
- return self::regularMultiply($x_value, $y_value);
- }
-
- $x1 = array_slice($x_value, $m);
- $x0 = array_slice($x_value, 0, $m);
- $y1 = array_slice($y_value, $m);
- $y0 = array_slice($y_value, 0, $m);
-
- $z2 = self::karatsuba($x1, $y1);
- $z0 = self::karatsuba($x0, $y0);
-
- $z1 = self::addHelper($x1, false, $x0, false);
- $temp = self::addHelper($y1, false, $y0, false);
- $z1 = self::karatsuba($z1[self::VALUE], $temp[self::VALUE]);
- $temp = self::addHelper($z2, false, $z0, false);
- $z1 = self::subtractHelper($z1, false, $temp[self::VALUE], false);
-
- $z2 = array_merge(array_fill(0, 2 * $m, 0), $z2);
- $z1[self::VALUE] = array_merge(array_fill(0, $m, 0), $z1[self::VALUE]);
-
- $xy = self::addHelper($z2, false, $z1[self::VALUE], $z1[self::SIGN]);
- $xy = self::addHelper($xy[self::VALUE], $xy[self::SIGN], $z0, false);
-
- return $xy[self::VALUE];
- }
-
- /**
- * Performs long multiplication on two BigIntegers
- *
- * Modeled after 'multiply' in MutableBigInteger.java.
- *
- * @param array $x_value
- * @param array $y_value
- * @return array
- */
- protected static function regularMultiply(array $x_value, array $y_value)
- {
- $x_length = count($x_value);
- $y_length = count($y_value);
-
- if (!$x_length || !$y_length) { // a 0 is being multiplied
- return [];
- }
-
- $product_value = self::array_repeat(0, $x_length + $y_length);
-
- // the following for loop could be removed if the for loop following it
- // (the one with nested for loops) initially set $i to 0, but
- // doing so would also make the result in one set of unnecessary adds,
- // since on the outermost loops first pass, $product->value[$k] is going
- // to always be 0
-
- $carry = 0;
- for ($j = 0; $j < $x_length; ++$j) { // ie. $i = 0
- $temp = $x_value[$j] * $y_value[0] + $carry; // $product_value[$k] == 0
- $carry = static::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
- $product_value[$j] = (int) ($temp - static::BASE_FULL * $carry);
- }
-
- $product_value[$j] = $carry;
-
- // the above for loop is what the previous comment was talking about. the
- // following for loop is the "one with nested for loops"
- for ($i = 1; $i < $y_length; ++$i) {
- $carry = 0;
-
- for ($j = 0, $k = $i; $j < $x_length; ++$j, ++$k) {
- $temp = $product_value[$k] + $x_value[$j] * $y_value[$i] + $carry;
- $carry = static::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
- $product_value[$k] = (int) ($temp - static::BASE_FULL * $carry);
- }
-
- $product_value[$k] = $carry;
- }
-
- return $product_value;
- }
-
- /**
- * Divides two BigIntegers.
- *
- * Returns an array whose first element contains the quotient and whose second element contains the
- * "common residue". If the remainder would be positive, the "common residue" and the remainder are the
- * same. If the remainder would be negative, the "common residue" is equal to the sum of the remainder
- * and the divisor (basically, the "common residue" is the first positive modulo).
- *
- * @param \phpseclib3\Math\BigInteger\engines\PHP $y
- * @return array
- * @internal This function is based off of {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=9 HAC 14.20}.
- */
- protected function divideHelper(PHP $y)
- {
- if (count($y->value) == 1) {
- list($q, $r) = $this->divide_digit($this->value, $y->value[0]);
- $quotient = new static();
- $remainder = new static();
- $quotient->value = $q;
- $remainder->value = [$r];
- $quotient->is_negative = $this->is_negative != $y->is_negative;
- return [$this->normalize($quotient), $this->normalize($remainder)];
- }
-
- $x = clone $this;
- $y = clone $y;
-
- $x_sign = $x->is_negative;
- $y_sign = $y->is_negative;
-
- $x->is_negative = $y->is_negative = false;
-
- $diff = $x->compare($y);
-
- if (!$diff) {
- $temp = new static();
- $temp->value = [1];
- $temp->is_negative = $x_sign != $y_sign;
- return [$this->normalize($temp), $this->normalize(static::$zero)];
- }
-
- if ($diff < 0) {
- // if $x is negative, "add" $y.
- if ($x_sign) {
- $x = $y->subtract($x);
- }
- return [$this->normalize(static::$zero), $this->normalize($x)];
- }
-
- // normalize $x and $y as described in HAC 14.23 / 14.24
- $msb = $y->value[count($y->value) - 1];
- for ($shift = 0; !($msb & static::MSB); ++$shift) {
- $msb <<= 1;
- }
- $x->lshift($shift);
- $y->lshift($shift);
- $y_value = &$y->value;
-
- $x_max = count($x->value) - 1;
- $y_max = count($y->value) - 1;
-
- $quotient = new static();
- $quotient_value = &$quotient->value;
- $quotient_value = self::array_repeat(0, $x_max - $y_max + 1);
-
- static $temp, $lhs, $rhs;
- if (!isset($temp)) {
- $temp = new static();
- $lhs = new static();
- $rhs = new static();
- }
- $temp_value = &$temp->value;
- $rhs_value = &$rhs->value;
-
- // $temp = $y << ($x_max - $y_max-1) in base 2**26
- $temp_value = array_merge(self::array_repeat(0, $x_max - $y_max), $y_value);
-
- while ($x->compare($temp) >= 0) {
- // calculate the "common residue"
- ++$quotient_value[$x_max - $y_max];
- $x = $x->subtract($temp);
- $x_max = count($x->value) - 1;
- }
-
- for ($i = $x_max; $i >= $y_max + 1; --$i) {
- $x_value = &$x->value;
- $x_window = [
- isset($x_value[$i]) ? $x_value[$i] : 0,
- isset($x_value[$i - 1]) ? $x_value[$i - 1] : 0,
- isset($x_value[$i - 2]) ? $x_value[$i - 2] : 0
- ];
- $y_window = [
- $y_value[$y_max],
- ($y_max > 0) ? $y_value[$y_max - 1] : 0
- ];
-
- $q_index = $i - $y_max - 1;
- if ($x_window[0] == $y_window[0]) {
- $quotient_value[$q_index] = static::MAX_DIGIT;
- } else {
- $quotient_value[$q_index] = self::safe_divide(
- $x_window[0] * static::BASE_FULL + $x_window[1],
- $y_window[0]
- );
- }
-
- $temp_value = [$y_window[1], $y_window[0]];
-
- $lhs->value = [$quotient_value[$q_index]];
- $lhs = $lhs->multiply($temp);
-
- $rhs_value = [$x_window[2], $x_window[1], $x_window[0]];
-
- while ($lhs->compare($rhs) > 0) {
- --$quotient_value[$q_index];
-
- $lhs->value = [$quotient_value[$q_index]];
- $lhs = $lhs->multiply($temp);
- }
-
- $adjust = self::array_repeat(0, $q_index);
- $temp_value = [$quotient_value[$q_index]];
- $temp = $temp->multiply($y);
- $temp_value = &$temp->value;
- if (count($temp_value)) {
- $temp_value = array_merge($adjust, $temp_value);
- }
-
- $x = $x->subtract($temp);
-
- if ($x->compare(static::$zero) < 0) {
- $temp_value = array_merge($adjust, $y_value);
- $x = $x->add($temp);
-
- --$quotient_value[$q_index];
- }
-
- $x_max = count($x_value) - 1;
- }
-
- // unnormalize the remainder
- $x->rshift($shift);
-
- $quotient->is_negative = $x_sign != $y_sign;
-
- // calculate the "common residue", if appropriate
- if ($x_sign) {
- $y->rshift($shift);
- $x = $y->subtract($x);
- }
-
- return [$this->normalize($quotient), $this->normalize($x)];
- }
-
- /**
- * Divides a BigInteger by a regular integer
- *
- * abc / x = a00 / x + b0 / x + c / x
- *
- * @param array $dividend
- * @param int $divisor
- * @return array
- */
- private static function divide_digit(array $dividend, $divisor)
- {
- $carry = 0;
- $result = [];
-
- for ($i = count($dividend) - 1; $i >= 0; --$i) {
- $temp = static::BASE_FULL * $carry + $dividend[$i];
- $result[$i] = self::safe_divide($temp, $divisor);
- $carry = (int) ($temp - $divisor * $result[$i]);
- }
-
- return [$result, $carry];
- }
-
- /**
- * Single digit division
- *
- * Even if int64 is being used the division operator will return a float64 value
- * if the dividend is not evenly divisible by the divisor. Since a float64 doesn't
- * have the precision of int64 this is a problem so, when int64 is being used,
- * we'll guarantee that the dividend is divisible by first subtracting the remainder.
- *
- * @param int $x
- * @param int $y
- * @return int
- */
- private static function safe_divide($x, $y)
- {
- if (static::BASE === 26) {
- return (int) ($x / $y);
- }
-
- // static::BASE === 31
- return ($x - ($x % $y)) / $y;
- }
-
- /*
- * Convert an array / boolean to a PHP BigInteger object
- *
- * @param array $arr
- * @return \phpseclib3\Math\BigInteger\Engines\PHP
- */
- protected function convertToObj(array $arr)
- {
- $result = new static();
- $result->value = $arr[self::VALUE];
- $result->is_negative = $arr[self::SIGN];
-
- return $this->normalize($result);
- }
-
- /**
- * Normalize
- *
- * Removes leading zeros and truncates (if necessary) to maintain the appropriate precision
- *
- * @param PHP $result
- * @return PHP
- */
- protected function normalize(PHP $result)
- {
- unset($result->reduce);
-
- $result->precision = $this->precision;
- $result->bitmask = $this->bitmask;
-
- $value = &$result->value;
-
- if (!count($value)) {
- $result->is_negative = false;
- return $result;
- }
-
- $value = static::trim($value);
-
- if (!empty($result->bitmask->value)) {
- $length = min(count($value), count($result->bitmask->value));
- $value = array_slice($value, 0, $length);
-
- for ($i = 0; $i < $length; ++$i) {
- $value[$i] = $value[$i] & $result->bitmask->value[$i];
- }
- }
-
- return $result;
- }
-
- /*
- * Compares two numbers.
- *
- * @param array $x_value
- * @param bool $x_negative
- * @param array $y_value
- * @param bool $y_negative
- * @return int
- * @see static::compare()
- */
- protected static function compareHelper(array $x_value, $x_negative, array $y_value, $y_negative)
- {
- if ($x_negative != $y_negative) {
- return (!$x_negative && $y_negative) ? 1 : -1;
- }
-
- $result = $x_negative ? -1 : 1;
-
- if (count($x_value) != count($y_value)) {
- return (count($x_value) > count($y_value)) ? $result : -$result;
- }
- $size = max(count($x_value), count($y_value));
-
- $x_value = array_pad($x_value, $size, 0);
- $y_value = array_pad($y_value, $size, 0);
-
- for ($i = count($x_value) - 1; $i >= 0; --$i) {
- if ($x_value[$i] != $y_value[$i]) {
- return ($x_value[$i] > $y_value[$i]) ? $result : -$result;
- }
- }
-
- return 0;
- }
-
- /**
- * Absolute value.
- *
- * @return \phpseclib3\Math\BigInteger\Engines\PHP
- */
- public function abs()
- {
- $temp = new static();
- $temp->value = $this->value;
-
- return $temp;
- }
-
- /**
- * Trim
- *
- * Removes leading zeros
- *
- * @param array $value
- * @return PHP
- */
- protected static function trim(array $value)
- {
- for ($i = count($value) - 1; $i >= 0; --$i) {
- if ($value[$i]) {
- break;
- }
- unset($value[$i]);
- }
-
- return $value;
- }
-
- /**
- * Logical Right Shift
- *
- * Shifts BigInteger's by $shift bits, effectively dividing by 2**$shift.
- *
- * @param int $shift
- * @return \phpseclib3\Math\BigInteger\Engines\PHP
- */
- public function bitwise_rightShift($shift)
- {
- $temp = new static();
-
- // could just replace lshift with this, but then all lshift() calls would need to be rewritten
- // and I don't want to do that...
- $temp->value = $this->value;
- $temp->rshift($shift);
-
- return $this->normalize($temp);
- }
-
- /**
- * Logical Left Shift
- *
- * Shifts BigInteger's by $shift bits, effectively multiplying by 2**$shift.
- *
- * @param int $shift
- * @return \phpseclib3\Math\BigInteger\Engines\PHP
- */
- public function bitwise_leftShift($shift)
- {
- $temp = new static();
- // could just replace _rshift with this, but then all _lshift() calls would need to be rewritten
- // and I don't want to do that...
- $temp->value = $this->value;
- $temp->lshift($shift);
-
- return $this->normalize($temp);
- }
-
- /**
- * Converts 32-bit integers to bytes.
- *
- * @param int $x
- * @return string
- */
- private static function int2bytes($x)
- {
- return ltrim(pack('N', $x), chr(0));
- }
-
- /**
- * Array Repeat
- *
- * @param int $input
- * @param int $multiplier
- * @return array
- */
- protected static function array_repeat($input, $multiplier)
- {
- return $multiplier ? array_fill(0, $multiplier, $input) : [];
- }
-
- /**
- * Logical Left Shift
- *
- * Shifts BigInteger's by $shift bits.
- *
- * @param int $shift
- */
- protected function lshift($shift)
- {
- if ($shift == 0) {
- return;
- }
-
- $num_digits = (int) ($shift / static::BASE);
- $shift %= static::BASE;
- $shift = 1 << $shift;
-
- $carry = 0;
-
- for ($i = 0; $i < count($this->value); ++$i) {
- $temp = $this->value[$i] * $shift + $carry;
- $carry = static::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
- $this->value[$i] = (int) ($temp - $carry * static::BASE_FULL);
- }
-
- if ($carry) {
- $this->value[count($this->value)] = $carry;
- }
-
- while ($num_digits--) {
- array_unshift($this->value, 0);
- }
- }
-
- /**
- * Logical Right Shift
- *
- * Shifts BigInteger's by $shift bits.
- *
- * @param int $shift
- */
- protected function rshift($shift)
- {
- if ($shift == 0) {
- return;
- }
-
- $num_digits = (int) ($shift / static::BASE);
- $shift %= static::BASE;
- $carry_shift = static::BASE - $shift;
- $carry_mask = (1 << $shift) - 1;
-
- if ($num_digits) {
- $this->value = array_slice($this->value, $num_digits);
- }
-
- $carry = 0;
-
- for ($i = count($this->value) - 1; $i >= 0; --$i) {
- $temp = $this->value[$i] >> $shift | $carry;
- $carry = ($this->value[$i] & $carry_mask) << $carry_shift;
- $this->value[$i] = $temp;
- }
-
- $this->value = static::trim($this->value);
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param PHP $e
- * @param PHP $n
- * @return PHP
- */
- protected function powModInner(PHP $e, PHP $n)
- {
- try {
- $class = static::$modexpEngine;
- return $class::powModHelper($this, $e, $n, static::class);
- } catch (\Exception $err) {
- return PHP\DefaultEngine::powModHelper($this, $e, $n, static::class);
- }
- }
-
- /**
- * Performs squaring
- *
- * @param array $x
- * @return array
- */
- protected static function square(array $x)
- {
- return count($x) < 2 * self::KARATSUBA_CUTOFF ?
- self::trim(self::baseSquare($x)) :
- self::trim(self::karatsubaSquare($x));
- }
-
- /**
- * Performs traditional squaring on two BigIntegers
- *
- * Squaring can be done faster than multiplying a number by itself can be. See
- * {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=7 HAC 14.2.4} /
- * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=141 MPM 5.3} for more information.
- *
- * @param array $value
- * @return array
- */
- protected static function baseSquare(array $value)
- {
- if (empty($value)) {
- return [];
- }
- $square_value = self::array_repeat(0, 2 * count($value));
-
- for ($i = 0, $max_index = count($value) - 1; $i <= $max_index; ++$i) {
- $i2 = $i << 1;
-
- $temp = $square_value[$i2] + $value[$i] * $value[$i];
- $carry = static::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
- $square_value[$i2] = (int) ($temp - static::BASE_FULL * $carry);
-
- // note how we start from $i+1 instead of 0 as we do in multiplication.
- for ($j = $i + 1, $k = $i2 + 1; $j <= $max_index; ++$j, ++$k) {
- $temp = $square_value[$k] + 2 * $value[$j] * $value[$i] + $carry;
- $carry = static::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
- $square_value[$k] = (int) ($temp - static::BASE_FULL * $carry);
- }
-
- // the following line can yield values larger 2**15. at this point, PHP should switch
- // over to floats.
- $square_value[$i + $max_index + 1] = $carry;
- }
-
- return $square_value;
- }
-
- /**
- * Performs Karatsuba "squaring" on two BigIntegers
- *
- * See {@link http://en.wikipedia.org/wiki/Karatsuba_algorithm Karatsuba algorithm} and
- * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=151 MPM 5.3.4}.
- *
- * @param array $value
- * @return array
- */
- protected static function karatsubaSquare(array $value)
- {
- $m = count($value) >> 1;
-
- if ($m < self::KARATSUBA_CUTOFF) {
- return self::baseSquare($value);
- }
-
- $x1 = array_slice($value, $m);
- $x0 = array_slice($value, 0, $m);
-
- $z2 = self::karatsubaSquare($x1);
- $z0 = self::karatsubaSquare($x0);
-
- $z1 = self::addHelper($x1, false, $x0, false);
- $z1 = self::karatsubaSquare($z1[self::VALUE]);
- $temp = self::addHelper($z2, false, $z0, false);
- $z1 = self::subtractHelper($z1, false, $temp[self::VALUE], false);
-
- $z2 = array_merge(array_fill(0, 2 * $m, 0), $z2);
- $z1[self::VALUE] = array_merge(array_fill(0, $m, 0), $z1[self::VALUE]);
-
- $xx = self::addHelper($z2, false, $z1[self::VALUE], $z1[self::SIGN]);
- $xx = self::addHelper($xx[self::VALUE], $xx[self::SIGN], $z0, false);
-
- return $xx[self::VALUE];
- }
-
- /**
- * Make the current number odd
- *
- * If the current number is odd it'll be unchanged. If it's even, one will be added to it.
- *
- * @see self::randomPrime()
- */
- protected function make_odd()
- {
- $this->value[0] |= 1;
- }
-
- /**
- * Test the number against small primes.
- *
- * @see self::isPrime()
- */
- protected function testSmallPrimes()
- {
- if ($this->value == [1]) {
- return false;
- }
- if ($this->value == [2]) {
- return true;
- }
- if (~$this->value[0] & 1) {
- return false;
- }
-
- $value = $this->value;
- foreach (static::$primes as $prime) {
- list(, $r) = self::divide_digit($value, $prime);
- if (!$r) {
- return count($value) == 1 && $value[0] == $prime;
- }
- }
-
- return true;
- }
-
- /**
- * Scan for 1 and right shift by that amount
- *
- * ie. $s = gmp_scan1($n, 0) and $r = gmp_div_q($n, gmp_pow(gmp_init('2'), $s));
- *
- * @see self::isPrime()
- * @param PHP $r
- * @return int
- */
- public static function scan1divide(PHP $r)
- {
- $r_value = &$r->value;
- for ($i = 0, $r_length = count($r_value); $i < $r_length; ++$i) {
- $temp = ~$r_value[$i] & static::MAX_DIGIT;
- for ($j = 1; ($temp >> $j) & 1; ++$j) {
- }
- if ($j <= static::BASE) {
- break;
- }
- }
- $s = static::BASE * $i + $j;
- $r->rshift($s);
- return $s;
- }
-
- /**
- * Performs exponentiation.
- *
- * @param PHP $n
- * @return PHP
- */
- protected function powHelper(PHP $n)
- {
- if ($n->compare(static::$zero) == 0) {
- return new static(1);
- } // n^0 = 1
-
- $temp = clone $this;
- while (!$n->equals(static::$one)) {
- $temp = $temp->multiply($this);
- $n = $n->subtract(static::$one);
- }
-
- return $temp;
- }
-
- /**
- * Is Odd?
- *
- * @return boolean
- */
- public function isOdd()
- {
- return (bool) ($this->value[0] & 1);
- }
-
- /**
- * Tests if a bit is set
- *
- * @return boolean
- */
- public function testBit($x)
- {
- $digit = floor($x / static::BASE);
- $bit = $x % static::BASE;
-
- if (!isset($this->value[$digit])) {
- return false;
- }
-
- return (bool) ($this->value[$digit] & (1 << $bit));
- }
-
- /**
- * Is Negative?
- *
- * @return boolean
- */
- public function isNegative()
- {
- return $this->is_negative;
- }
-
- /**
- * Negate
- *
- * Given $k, returns -$k
- *
- * @return BigInteger
- */
- public function negate()
- {
- $temp = clone $this;
- $temp->is_negative = !$temp->is_negative;
-
- return $temp;
- }
-
- /**
- * Bitwise Split
- *
- * Splits BigInteger's into chunks of $split bits
- *
- * @param int $split
- * @return \phpseclib3\Math\BigInteger\Engines\PHP[]
- */
- public function bitwise_split($split)
- {
- if ($split < 1) {
- throw new \RuntimeException('Offset must be greater than 1');
- }
-
- $width = (int) ($split / static::BASE);
- if (!$width) {
- $arr = $this->bitwise_small_split($split);
- return array_map(function ($digit) {
- $temp = new static();
- $temp->value = $digit != 0 ? [$digit] : [];
- return $temp;
- }, $arr);
- }
-
- $vals = [];
- $val = $this->value;
-
- $i = $overflow = 0;
- $len = count($val);
- while ($i < $len) {
- $digit = [];
- if (!$overflow) {
- $digit = array_slice($val, $i, $width);
- $i+= $width;
- $overflow = $split % static::BASE;
- if ($overflow) {
- $mask = (1 << $overflow) - 1;
- $temp = isset($val[$i]) ? $val[$i] : 0;
- $digit[] = $temp & $mask;
- }
- } else {
- $remaining = static::BASE - $overflow;
- $tempsplit = $split - $remaining;
- $tempwidth = (int) ($tempsplit / static::BASE + 1);
- $digit = array_slice($val, $i, $tempwidth);
- $i+= $tempwidth;
- $tempoverflow = $tempsplit % static::BASE;
- if ($tempoverflow) {
- $tempmask = (1 << $tempoverflow) - 1;
- $temp = isset($val[$i]) ? $val[$i] : 0;
- $digit[] = $temp & $tempmask;
- }
- $newbits = 0;
- for ($j = count($digit) - 1; $j >= 0; $j--) {
- $temp = $digit[$j] & $mask;
- $digit[$j] = ($digit[$j] >> $overflow) | ($newbits << $remaining);
- $newbits = $temp;
- }
- $overflow = $tempoverflow;
- $mask = $tempmask;
- }
- $temp = new static();
- $temp->value = static::trim($digit);
- $vals[] = $temp;
- }
-
- return array_reverse($vals);
- }
-
- /**
- * Bitwise Split where $split < static::BASE
- *
- * @param int $split
- * @return \phpseclib3\Math\BigInteger\Engines\PHP[]
- */
- private function bitwise_small_split($split)
- {
- $vals = [];
- $val = $this->value;
-
- $mask = (1 << $split) - 1;
-
- $i = $overflow = 0;
- $len = count($val);
- $val[] = 0;
- $remaining = static::BASE;
- while ($i != $len) {
- $digit = $val[$i] & $mask;
- $val[$i]>>= $split;
- if (!$overflow) {
- $remaining-= $split;
- $overflow = $split <= $remaining ? 0 : $split - $remaining;
-
- if (!$remaining) {
- $i++;
- $remaining = static::BASE;
- $overflow = 0;
- }
- } else if (++$i != $len) {
- $tempmask = (1 << $overflow) - 1;
- $digit|= ($val[$i] & $tempmask) << $remaining;
- $val[$i]>>= $overflow;
- $remaining = static::BASE - $overflow;
- $overflow = $split <= $remaining ? 0 : $split - $remaining;
- }
-
- $vals[] = $digit;
- }
-
- while ($vals[count($vals) - 1] == 0) {
- unset($vals[count($vals) - 1]);
- }
-
- return array_reverse($vals);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Base.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Base.php
deleted file mode 100644
index fb781c945..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Base.php
+++ /dev/null
@@ -1,149 +0,0 @@
-<?php
-
-/**
- * PHP Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP;
-
-use phpseclib3\Math\BigInteger\Engines\PHP;
-
-/**
- * PHP Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Base extends PHP
-{
- /**
- * Cache constants
- *
- * $cache[self::VARIABLE] tells us whether or not the cached data is still valid.
- *
- * @access private
- */
- const VARIABLE = 0;
- /**
- * $cache[self::DATA] contains the cached data.
- *
- * @access private
- */
- const DATA = 1;
-
- /**
- * Test for engine validity
- *
- * @return bool
- */
- public static function isValidEngine()
- {
- return static::class != __CLASS__;
- }
-
- /**
- * Performs modular exponentiation.
- *
- * The most naive approach to modular exponentiation has very unreasonable requirements, and
- * and although the approach involving repeated squaring does vastly better, it, too, is impractical
- * for our purposes. The reason being that division - by far the most complicated and time-consuming
- * of the basic operations (eg. +,-,*,/) - occurs multiple times within it.
- *
- * Modular reductions resolve this issue. Although an individual modular reduction takes more time
- * then an individual division, when performed in succession (with the same modulo), they're a lot faster.
- *
- * The two most commonly used modular reductions are Barrett and Montgomery reduction. Montgomery reduction,
- * although faster, only works when the gcd of the modulo and of the base being used is 1. In RSA, when the
- * base is a power of two, the modulo - a product of two primes - is always going to have a gcd of 1 (because
- * the product of two odd numbers is odd), but what about when RSA isn't used?
- *
- * In contrast, Barrett reduction has no such constraint. As such, some bigint implementations perform a
- * Barrett reduction after every operation in the modpow function. Others perform Barrett reductions when the
- * modulo is even and Montgomery reductions when the modulo is odd. BigInteger.java's modPow method, however,
- * uses a trick involving the Chinese Remainder Theorem to factor the even modulo into two numbers - one odd and
- * the other, a power of two - and recombine them, later. This is the method that this modPow function uses.
- * {@link http://islab.oregonstate.edu/papers/j34monex.pdf Montgomery Reduction with Even Modulus} elaborates.
- *
- * @param \phpseclib3\Math\BigInteger\Engines\PHP $x
- * @param \phpseclib3\Math\BigInteger\Engines\PHP $e
- * @param \phpseclib3\Math\BigInteger\Engines\PHP $n
- * @param string $class
- * @return \phpseclib3\Math\BigInteger\Engines\PHP
- */
- protected static function powModHelper(PHP $x, PHP $e, PHP $n, $class)
- {
- if (empty($e->value)) {
- $temp = new $class();
- $temp->value = [1];
- return $x->normalize($temp);
- }
-
- if ($e->value == [1]) {
- list(, $temp) = $x->divide($n);
- return $x->normalize($temp);
- }
-
- if ($e->value == [2]) {
- $temp = new $class;
- $temp->value = $class::square($x->value);
- list(, $temp) = $temp->divide($n);
- return $x->normalize($temp);
- }
-
- return $x->normalize(static::slidingWindow($x, $e, $n, $class));
- }
-
- /**
- * Modular reduction preparation
- *
- * @param array $x
- * @param array $n
- * @param string $class
- * @see self::slidingWindow()
- * @return array
- */
- protected static function prepareReduce(array $x, array $n, $class)
- {
- return static::reduce($x, $n, $class);
- }
-
- /**
- * Modular multiply
- *
- * @param array $x
- * @param array $y
- * @param array $n
- * @param string $class
- * @see self::slidingWindow()
- * @return array
- */
- protected static function multiplyReduce(array $x, array $y, array $n, $class)
- {
- $temp = $class::multiplyHelper($x, false, $y, false);
- return static::reduce($temp[self::VALUE], $n, $class);
- }
-
- /**
- * Modular square
- *
- * @param array $x
- * @param array $n
- * @param string $class
- * @see self::slidingWindow()
- * @return array
- */
- protected static function squareReduce(array $x, array $n, $class)
- {
- return static::reduce($class::square($x), $n, $class);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/DefaultEngine.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/DefaultEngine.php
deleted file mode 100644
index 138deb1f6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/DefaultEngine.php
+++ /dev/null
@@ -1,29 +0,0 @@
-<?php
-
-/**
- * PHP Default Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP;
-
-use phpseclib3\Math\BigInteger\Engines\PHP\Reductions\EvalBarrett;
-
-/**
- * PHP Default Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class DefaultEngine extends EvalBarrett
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Montgomery.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Montgomery.php
deleted file mode 100644
index 0ebbd71a8..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Montgomery.php
+++ /dev/null
@@ -1,93 +0,0 @@
-<?php
-
-/**
- * PHP Montgomery Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP;
-
-use phpseclib3\Math\BigInteger\Engines\PHP\Reductions\PowerOfTwo;
-use phpseclib3\Math\BigInteger\Engines\PHP;
-use phpseclib3\Math\BigInteger\Engines\PHP\Base;
-use phpseclib3\Math\BigInteger\Engines\Engine;
-
-/**
- * PHP Montgomery Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Montgomery extends Base
-{
- /**
- * Test for engine validity
- *
- * @return bool
- */
- public static function isValidEngine()
- {
- return static::class != __CLASS__;
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param \phpseclib3\Math\BigInteger\Engines\Engine $x
- * @param \phpseclib3\Math\BigInteger\Engines\Engine $e
- * @param \phpseclib3\Math\BigInteger\Engines\Engine $n
- * @param string $class
- * @return \phpseclib3\Math\BigInteger\Engines\Engine
- */
- protected static function slidingWindow(Engine $x, Engine $e, Engine $n, $class)
- {
- // is the modulo odd?
- if ($n->value[0] & 1) {
- return parent::slidingWindow($x, $e, $n, $class);
- }
- // if it's not, it's even
-
- // find the lowest set bit (eg. the max pow of 2 that divides $n)
- for ($i = 0; $i < count($n->value); ++$i) {
- if ($n->value[$i]) {
- $temp = decbin($n->value[$i]);
- $j = strlen($temp) - strrpos($temp, '1') - 1;
- $j+= $class::BASE * $i;
- break;
- }
- }
- // at this point, 2^$j * $n/(2^$j) == $n
-
- $mod1 = clone $n;
- $mod1->rshift($j);
- $mod2 = new $class();
- $mod2->value = [1];
- $mod2->lshift($j);
-
- $part1 = $mod1->value != [1] ? parent::slidingWindow($x, $e, $mod1, $class) : new $class();
- $part2 = PowerOfTwo::slidingWindow($x, $e, $mod2, $class);
-
- $y1 = $mod2->modInverse($mod1);
- $y2 = $mod1->modInverse($mod2);
-
- $result = $part1->multiply($mod2);
- $result = $result->multiply($y1);
-
- $temp = $part2->multiply($mod1);
- $temp = $temp->multiply($y2);
-
- $result = $result->add($temp);
- list(, $result) = $result->divide($n);
-
- return $result;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/OpenSSL.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/OpenSSL.php
deleted file mode 100644
index 1b7b5b401..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/OpenSSL.php
+++ /dev/null
@@ -1,29 +0,0 @@
-<?php
-
-/**
- * OpenSSL Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP;
-
-use phpseclib3\Math\BigInteger\Engines\OpenSSL as Progenitor;
-
-/**
- * OpenSSL Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class OpenSSL extends Progenitor
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Barrett.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Barrett.php
deleted file mode 100644
index 03e0f8aaa..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Barrett.php
+++ /dev/null
@@ -1,284 +0,0 @@
-<?php
-
-/**
- * PHP Barrett Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP\Reductions;
-
-use phpseclib3\Math\BigInteger\Engines\PHP\Base;
-
-/**
- * PHP Barrett Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Barrett extends Base
-{
- /**
- * Barrett Modular Reduction
- *
- * See {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=14 HAC 14.3.3} /
- * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=165 MPM 6.2.5} for more information. Modified slightly,
- * so as not to require negative numbers (initially, this script didn't support negative numbers).
- *
- * Employs "folding", as described at
- * {@link http://www.cosic.esat.kuleuven.be/publications/thesis-149.pdf#page=66 thesis-149.pdf#page=66}. To quote from
- * it, "the idea [behind folding] is to find a value x' such that x (mod m) = x' (mod m), with x' being smaller than x."
- *
- * Unfortunately, the "Barrett Reduction with Folding" algorithm described in thesis-149.pdf is not, as written, all that
- * usable on account of (1) its not using reasonable radix points as discussed in
- * {@link http://math.libtomcrypt.com/files/tommath.pdf#page=162 MPM 6.2.2} and (2) the fact that, even with reasonable
- * radix points, it only works when there are an even number of digits in the denominator. The reason for (2) is that
- * (x >> 1) + (x >> 1) != x / 2 + x / 2. If x is even, they're the same, but if x is odd, they're not. See the in-line
- * comments for details.
- *
- * @param array $n
- * @param array $m
- * @param string $class
- * @return array
- */
- protected static function reduce(array $n, array $m, $class)
- {
- static $cache = [
- self::VARIABLE => [],
- self::DATA => []
- ];
-
- $m_length = count($m);
-
- // if (self::compareHelper($n, $static::square($m)) >= 0) {
- if (count($n) > 2 * $m_length) {
- $lhs = new $class();
- $rhs = new $class();
- $lhs->value = $n;
- $rhs->value = $m;
- list(, $temp) = $lhs->divide($rhs);
- return $temp->value;
- }
-
- // if (m.length >> 1) + 2 <= m.length then m is too small and n can't be reduced
- if ($m_length < 5) {
- return self::regularBarrett($n, $m, $class);
- }
- // n = 2 * m.length
-
- if (($key = array_search($m, $cache[self::VARIABLE])) === false) {
- $key = count($cache[self::VARIABLE]);
- $cache[self::VARIABLE][] = $m;
-
- $lhs = new $class();
- $lhs_value = &$lhs->value;
- $lhs_value = self::array_repeat(0, $m_length + ($m_length >> 1));
- $lhs_value[] = 1;
- $rhs = new $class();
- $rhs->value = $m;
-
- list($u, $m1) = $lhs->divide($rhs);
- $u = $u->value;
- $m1 = $m1->value;
-
- $cache[self::DATA][] = [
- 'u' => $u, // m.length >> 1 (technically (m.length >> 1) + 1)
- 'm1'=> $m1 // m.length
- ];
- } else {
- extract($cache[self::DATA][$key]);
- }
-
- $cutoff = $m_length + ($m_length >> 1);
- $lsd = array_slice($n, 0, $cutoff); // m.length + (m.length >> 1)
- $msd = array_slice($n, $cutoff); // m.length >> 1
-
- $lsd = self::trim($lsd);
- $temp = $class::multiplyHelper($msd, false, $m1, false); // m.length + (m.length >> 1)
- $n = $class::addHelper($lsd, false, $temp[self::VALUE], false); // m.length + (m.length >> 1) + 1 (so basically we're adding two same length numbers)
- //if ($m_length & 1) {
- // return self::regularBarrett($n[self::VALUE], $m, $class);
- //}
-
- // (m.length + (m.length >> 1) + 1) - (m.length - 1) == (m.length >> 1) + 2
- $temp = array_slice($n[self::VALUE], $m_length - 1);
- // if even: ((m.length >> 1) + 2) + (m.length >> 1) == m.length + 2
- // if odd: ((m.length >> 1) + 2) + (m.length >> 1) == (m.length - 1) + 2 == m.length + 1
- $temp = $class::multiplyHelper($temp, false, $u, false);
- // if even: (m.length + 2) - ((m.length >> 1) + 1) = m.length - (m.length >> 1) + 1
- // if odd: (m.length + 1) - ((m.length >> 1) + 1) = m.length - (m.length >> 1)
- $temp = array_slice($temp[self::VALUE], ($m_length >> 1) + 1);
- // if even: (m.length - (m.length >> 1) + 1) + m.length = 2 * m.length - (m.length >> 1) + 1
- // if odd: (m.length - (m.length >> 1)) + m.length = 2 * m.length - (m.length >> 1)
- $temp = $class::multiplyHelper($temp, false, $m, false);
-
- // at this point, if m had an odd number of digits, we'd be subtracting a 2 * m.length - (m.length >> 1) digit
- // number from a m.length + (m.length >> 1) + 1 digit number. ie. there'd be an extra digit and the while loop
- // following this comment would loop a lot (hence our calling _regularBarrett() in that situation).
-
- $result = $class::subtractHelper($n[self::VALUE], false, $temp[self::VALUE], false);
-
- while (self::compareHelper($result[self::VALUE], $result[self::SIGN], $m, false) >= 0) {
- $result = $class::subtractHelper($result[self::VALUE], $result[self::SIGN], $m, false);
- }
-
- return $result[self::VALUE];
- }
-
- /**
- * (Regular) Barrett Modular Reduction
- *
- * For numbers with more than four digits BigInteger::_barrett() is faster. The difference between that and this
- * is that this function does not fold the denominator into a smaller form.
- *
- * @param array $x
- * @param array $n
- * @param string $class
- * @return array
- */
- private static function regularBarrett(array $x, array $n, $class)
- {
- static $cache = [
- self::VARIABLE => [],
- self::DATA => []
- ];
-
- $n_length = count($n);
-
- if (count($x) > 2 * $n_length) {
- $lhs = new $class();
- $rhs = new $class();
- $lhs->value = $x;
- $rhs->value = $n;
- list(, $temp) = $lhs->divide($rhs);
- return $temp->value;
- }
-
- if (($key = array_search($n, $cache[self::VARIABLE])) === false) {
- $key = count($cache[self::VARIABLE]);
- $cache[self::VARIABLE][] = $n;
- $lhs = new $class();
- $lhs_value = &$lhs->value;
- $lhs_value = self::array_repeat(0, 2 * $n_length);
- $lhs_value[] = 1;
- $rhs = new $class();
- $rhs->value = $n;
- list($temp, ) = $lhs->divide($rhs); // m.length
- $cache[self::DATA][] = $temp->value;
- }
-
- // 2 * m.length - (m.length - 1) = m.length + 1
- $temp = array_slice($x, $n_length - 1);
- // (m.length + 1) + m.length = 2 * m.length + 1
- $temp = $class::multiplyHelper($temp, false, $cache[self::DATA][$key], false);
- // (2 * m.length + 1) - (m.length - 1) = m.length + 2
- $temp = array_slice($temp[self::VALUE], $n_length + 1);
-
- // m.length + 1
- $result = array_slice($x, 0, $n_length + 1);
- // m.length + 1
- $temp = self::multiplyLower($temp, false, $n, false, $n_length + 1, $class);
- // $temp == array_slice($class::regularMultiply($temp, false, $n, false)->value, 0, $n_length + 1)
-
- if (self::compareHelper($result, false, $temp[self::VALUE], $temp[self::SIGN]) < 0) {
- $corrector_value = self::array_repeat(0, $n_length + 1);
- $corrector_value[count($corrector_value)] = 1;
- $result = $class::addHelper($result, false, $corrector_value, false);
- $result = $result[self::VALUE];
- }
-
- // at this point, we're subtracting a number with m.length + 1 digits from another number with m.length + 1 digits
- $result = $class::subtractHelper($result, false, $temp[self::VALUE], $temp[self::SIGN]);
- while (self::compareHelper($result[self::VALUE], $result[self::SIGN], $n, false) > 0) {
- $result = $class::subtractHelper($result[self::VALUE], $result[self::SIGN], $n, false);
- }
-
- return $result[self::VALUE];
- }
-
- /**
- * Performs long multiplication up to $stop digits
- *
- * If you're going to be doing array_slice($product->value, 0, $stop), some cycles can be saved.
- *
- * @see self::regularBarrett()
- * @param array $x_value
- * @param bool $x_negative
- * @param array $y_value
- * @param bool $y_negative
- * @param int $stop
- * @param string $class
- * @return array
- */
- private static function multiplyLower(array $x_value, $x_negative, array $y_value, $y_negative, $stop, $class)
- {
- $x_length = count($x_value);
- $y_length = count($y_value);
-
- if (!$x_length || !$y_length) { // a 0 is being multiplied
- return [
- self::VALUE => [],
- self::SIGN => false
- ];
- }
-
- if ($x_length < $y_length) {
- $temp = $x_value;
- $x_value = $y_value;
- $y_value = $temp;
-
- $x_length = count($x_value);
- $y_length = count($y_value);
- }
-
- $product_value = self::array_repeat(0, $x_length + $y_length);
-
- // the following for loop could be removed if the for loop following it
- // (the one with nested for loops) initially set $i to 0, but
- // doing so would also make the result in one set of unnecessary adds,
- // since on the outermost loops first pass, $product->value[$k] is going
- // to always be 0
-
- $carry = 0;
-
- for ($j = 0; $j < $x_length; ++$j) { // ie. $i = 0, $k = $i
- $temp = $x_value[$j] * $y_value[0] + $carry; // $product_value[$k] == 0
- $carry = $class::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
- $product_value[$j] = (int) ($temp - $class::BASE_FULL * $carry);
- }
-
- if ($j < $stop) {
- $product_value[$j] = $carry;
- }
-
- // the above for loop is what the previous comment was talking about. the
- // following for loop is the "one with nested for loops"
-
- for ($i = 1; $i < $y_length; ++$i) {
- $carry = 0;
-
- for ($j = 0, $k = $i; $j < $x_length && $k < $stop; ++$j, ++$k) {
- $temp = $product_value[$k] + $x_value[$j] * $y_value[$i] + $carry;
- $carry = $class::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31);
- $product_value[$k] = (int) ($temp - $class::BASE_FULL * $carry);
- }
-
- if ($k < $stop) {
- $product_value[$k] = $carry;
- }
- }
-
- return [
- self::VALUE => self::trim($product_value),
- self::SIGN => $x_negative != $y_negative
- ];
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Classic.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Classic.php
deleted file mode 100644
index aef167de9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Classic.php
+++ /dev/null
@@ -1,46 +0,0 @@
-<?php
-
-/**
- * PHP Classic Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP\Reductions;
-
-use phpseclib3\Math\BigInteger\Engines\PHP\Base;
-
-/**
- * PHP Classic Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Classic extends Base
-{
- /**
- * Regular Division
- *
- * @param array $x
- * @param array $n
- * @param string $class
- * @return array
- */
- protected static function reduce(array $x, array $n, $class)
- {
- $lhs = new $class();
- $lhs->value = $x;
- $rhs = new $class();
- $rhs->value = $n;
- list(, $temp) = $lhs->divide($rhs);
- return $temp->value;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/EvalBarrett.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/EvalBarrett.php
deleted file mode 100644
index 7c81071da..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/EvalBarrett.php
+++ /dev/null
@@ -1,492 +0,0 @@
-<?php
-
-/**
- * PHP Dynamic Barrett Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP\Reductions;
-
-use phpseclib3\Math\BigInteger\Engines\PHP\Base;
-use phpseclib3\Math\BigInteger\Engines\PHP;
-
-/**
- * PHP Dynamic Barrett Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class EvalBarrett extends Base
-{
- /**
- * Custom Reduction Function
- *
- * @see self::generateCustomReduction
- */
- private static $custom_reduction;
-
- /**
- * Barrett Modular Reduction
- *
- * This calls a dynamically generated loop unrolled function that's specific to a given modulo.
- * Array lookups are avoided as are if statements testing for how many bits the host OS supports, etc.
- *
- * @param array $n
- * @param array $m
- * @param string $class
- * @return array
- */
- protected static function reduce(array $n, array $m, $class)
- {
- $inline = self::$custom_reduction;
- return $inline($n);
- }
-
- /**
- * Generate Custom Reduction
- *
- * @param PHP $m
- * @param string $class
- * @return callable
- */
- protected static function generateCustomReduction(PHP $m, $class)
- {
- if (isset($n->reduce)) {
- self::$custom_reduction = $n->reduce;
- return $n->reduce;
- }
-
- $m_length = count($m->value);
-
- if ($m_length < 5) {
- $code = '
- $lhs = new ' . $class . '();
- $lhs->value = $x;
- $rhs = new ' . $class . '();
- $rhs->value = [' .
- implode(',', array_map('self::float2string', $m->value)) . '];
- list(, $temp) = $lhs->divide($rhs);
- return $temp->value;
- ';
- eval('$func = function ($x) { ' . $code . '};');
- self::$custom_reduction = $func;
- //self::$custom_reduction = \Closure::bind($func, $m, $class);
- return $func;
- }
-
- $lhs = new $class();
- $lhs_value = &$lhs->value;
-
- $lhs_value = self::array_repeat(0, $m_length + ($m_length >> 1));
- $lhs_value[] = 1;
- $rhs = new $class();
-
- list($u, $m1) = $lhs->divide($m);
-
- if ($class::BASE != 26) {
- $u = $u->value;
- } else {
- $lhs_value = self::array_repeat(0, 2 * $m_length);
- $lhs_value[] = 1;
- $rhs = new $class();
-
- list($u) = $lhs->divide($m);
- $u = $u->value;
- }
-
- $m = $m->value;
- $m1 = $m1->value;
-
- $cutoff = count($m) + (count($m) >> 1);
-
- $code = '
- if (count($n) > ' . (2 * count($m)) . ') {
- $lhs = new ' . $class . '();
- $rhs = new ' . $class . '();
- $lhs->value = $n;
- $rhs->value = [' .
- implode(',', array_map('self::float2string', $m)) . '];
- list(, $temp) = $lhs->divide($rhs);
- return $temp->value;
- }
-
- $lsd = array_slice($n, 0, ' . $cutoff . ');
- $msd = array_slice($n, ' . $cutoff . ');';
-
- $code.= self::generateInlineTrim('msd');
- $code.= self::generateInlineMultiply('msd', $m1, 'temp', $class);
- $code.= self::generateInlineAdd('lsd', 'temp', 'n', $class);
-
- $code.= '$temp = array_slice($n, ' . (count($m) - 1) . ');';
- $code.= self::generateInlineMultiply('temp', $u, 'temp2', $class);
- $code.= self::generateInlineTrim('temp2');
-
- $code.= $class::BASE == 26 ?
- '$temp = array_slice($temp2, ' . (count($m) + 1) . ');' :
- '$temp = array_slice($temp2, ' . ((count($m) >> 1) + 1) . ');';
- $code.= self::generateInlineMultiply('temp', $m, 'temp2', $class);
- $code.= self::generateInlineTrim('temp2');
-
- /*
- if ($class::BASE == 26) {
- $code.= '$n = array_slice($n, 0, ' . (count($m) + 1) . ');
- $temp2 = array_slice($temp2, 0, ' . (count($m) + 1) . ');';
- }
- */
-
- $code.= self::generateInlineSubtract2('n', 'temp2', 'temp', $class);
-
- $subcode = self::generateInlineSubtract1('temp', $m, 'temp2', $class);
- $subcode.= '$temp = $temp2;';
-
- $code.= self::generateInlineCompare($m, 'temp', $subcode);
-
- $code.= 'return $temp;';
-
- eval('$func = function ($n) { ' . $code . '};');
-
- self::$custom_reduction = $func;
-
- return $func;
-
- //self::$custom_reduction = \Closure::bind($func, $m, $class);
- }
-
- /**
- * Inline Trim
- *
- * Removes leading zeros
- *
- * @param string $name
- * @return string
- */
- private static function generateInlineTrim($name)
- {
- return '
- for ($i = count($' . $name . ') - 1; $i >= 0; --$i) {
- if ($' . $name . '[$i]) {
- break;
- }
- unset($' . $name . '[$i]);
- }';
- }
-
- /**
- * Inline Multiply (unknown, known)
- *
- * @param string $input
- * @param array $arr
- * @param string $output
- * @param string $class
- * @return string
- */
- private static function generateInlineMultiply($input, array $arr, $output, $class)
- {
- if (!count($arr)) {
- return 'return [];';
- }
-
- $regular = '
- $length = count($' . $input . ');
- if (!$length) {
- $' . $output . ' = [];
- }else{
- $' . $output . ' = array_fill(0, $length + ' . count($arr) . ', 0);
- $carry = 0;';
-
- for ($i = 0; $i < count($arr); $i++) {
- $regular.= '
- $subtemp = $' . $input . '[0] * ' . $arr[$i];
- $regular.= $i ? ' + $carry;' : ';';
-
- $regular.= '$carry = ';
- $regular.= $class::BASE === 26 ?
- 'intval($subtemp / 0x4000000);' :
- '$subtemp >> 31;';
- $regular.=
- '$' . $output . '[' . $i . '] = ';
- if ($class::BASE === 26) {
- $regular.= '(int) (';
- }
- $regular.= '$subtemp - ' . $class::BASE_FULL . ' * $carry';
- $regular.= $class::BASE === 26 ? ');' : ';';
- }
-
- $regular.= '$' . $output . '[' . count($arr) . '] = $carry;';
-
- $regular.= '
- for ($i = 1; $i < $length; ++$i) {';
-
- for ($j = 0; $j < count($arr); $j++) {
- $regular.= $j ? '$k++;' : '$k = $i;';
- $regular.= '
- $subtemp = $' . $output . '[$k] + $' . $input . '[$i] * ' . $arr[$j];
- $regular.= $j ? ' + $carry;' : ';';
-
- $regular.= '$carry = ';
- $regular.= $class::BASE === 26 ?
- 'intval($subtemp / 0x4000000);' :
- '$subtemp >> 31;';
- $regular.=
- '$' . $output . '[$k] = ';
- if ($class::BASE === 26) {
- $regular.= '(int) (';
- }
- $regular.= '$subtemp - ' . $class::BASE_FULL . ' * $carry';
- $regular.= $class::BASE === 26 ? ');' : ';';
- }
-
- $regular.= '$' . $output. '[++$k] = $carry; $carry = 0;';
-
- $regular.= '}}';
-
- //if (count($arr) < 2 * self::KARATSUBA_CUTOFF) {
- //}
-
- return $regular;
- }
-
- /**
- * Inline Addition
- *
- * @param string $x
- * @param string $y
- * @param string $result
- * @param string $class
- * @return string
- */
- private static function generateInlineAdd($x, $y, $result, $class)
- {
- $code = '
- $length = max(count($' . $x . '), count($' . $y . '));
- $' . $result . ' = array_pad($' . $x . ', $length + 1, 0);
- $_' . $y . ' = array_pad($' . $y . ', $length, 0);
- $carry = 0;
- for ($i = 0, $j = 1; $j < $length; $i+=2, $j+=2) {
- $sum = ($' . $result . '[$j] + $_' . $y . '[$j]) * ' . $class::BASE_FULL . '
- + $' . $result . '[$i] + $_' . $y . '[$i] +
- $carry;
- $carry = $sum >= ' . self::float2string($class::MAX_DIGIT2) . ';
- $sum = $carry ? $sum - ' . self::float2string($class::MAX_DIGIT2) . ' : $sum;';
-
- $code.= $class::BASE === 26 ?
- '$upper = intval($sum / 0x4000000); $' . $result . '[$i] = (int) ($sum - ' . $class::BASE_FULL . ' * $upper);' :
- '$upper = $sum >> 31; $' . $result . '[$i] = $sum - ' . $class::BASE_FULL . ' * $upper;';
- $code.= '
- $' . $result . '[$j] = $upper;
- }
- if ($j == $length) {
- $sum = $' . $result . '[$i] + $_' . $y . '[$i] + $carry;
- $carry = $sum >= ' . self::float2string($class::BASE_FULL) . ';
- $' . $result . '[$i] = $carry ? $sum - ' . self::float2string($class::BASE_FULL) . ' : $sum;
- }
- if ($carry) {
- for (; $' . $result . '[$i] == ' . $class::MAX_DIGIT . '; ++$i) {
- $' . $result . '[$i] = 0;
- }
- ++$' . $result . '[$i];
- }';
- $code.= self::generateInlineTrim($result);
-
- return $code;
- }
-
- /**
- * Inline Subtraction 2
- *
- * For when $known is more digits than $unknown. This is the harder use case to optimize for.
- *
- * @param string $known
- * @param string $unknown
- * @param string $result
- * @param string $class
- * @return string
- */
- private static function generateInlineSubtract2($known, $unknown, $result, $class)
- {
- $code = '
- $' . $result .' = $' . $known . ';
- $carry = 0;
- $size = count($' . $unknown . ');
- for ($i = 0, $j = 1; $j < $size; $i+= 2, $j+= 2) {
- $sum = ($' . $known . '[$j] - $' . $unknown . '[$j]) * ' . $class::BASE_FULL . ' + $' . $known . '[$i]
- - $' . $unknown . '[$i]
- - $carry;
- $carry = $sum < 0;
- if ($carry) {
- $sum+= ' . self::float2string($class::MAX_DIGIT2) . ';
- }
- $subtemp = ';
- $code.= $class::BASE === 26 ?
- 'intval($sum / 0x4000000);' :
- '$sum >> 31;';
- $code.= '$' . $result . '[$i] = ';
- if ($class::BASE === 26) {
- $code.= '(int) (';
- }
- $code.= '$sum - ' . $class::BASE_FULL . ' * $subtemp';
- if ($class::BASE === 26) {
- $code.= ')';
- }
- $code.= ';
- $' . $result . '[$j] = $subtemp;
- }
- if ($j == $size) {
- $sum = $' . $known . '[$i] - $' . $unknown . '[$i] - $carry;
- $carry = $sum < 0;
- $' . $result . '[$i] = $carry ? $sum + ' . $class::BASE_FULL . ' : $sum;
- ++$i;
- }
-
- if ($carry) {
- for (; !$' . $result . '[$i]; ++$i) {
- $' . $result . '[$i] = ' . $class::MAX_DIGIT . ';
- }
- --$' . $result . '[$i];
- }';
-
- $code.= self::generateInlineTrim($result);
-
- return $code;
- }
-
- /**
- * Inline Subtraction 1
- *
- * For when $unknown is more digits than $known. This is the easier use case to optimize for.
- *
- * @param string $unknown
- * @param array $known
- * @param string $result
- * @param string $class
- * @return string
- */
- private static function generateInlineSubtract1($unknown, array $known, $result, $class)
- {
- $code = '$' . $result . ' = $' . $unknown . ';';
- for ($i = 0, $j = 1; $j < count($known); $i+=2, $j+=2) {
- $code.= '$sum = $' . $unknown . '[' . $j . '] * ' . $class::BASE_FULL . ' + $' . $unknown . '[' . $i . '] - ';
- $code.= self::float2string($known[$j] * $class::BASE_FULL + $known[$i]);
- if ($i != 0) {
- $code.= ' - $carry';
- }
-
- $code.= ';
- if ($carry = $sum < 0) {
- $sum+= ' . self::float2string($class::MAX_DIGIT2) . ';
- }
- $subtemp = ';
- $code.= $class::BASE === 26 ?
- 'intval($sum / 0x4000000);' :
- '$sum >> 31;';
- $code.= '
- $' . $result . '[' . $i . '] = ';
- if ($class::BASE === 26) {
- $code.= ' (int) (';
- }
- $code.= '$sum - ' . $class::BASE_FULL . ' * $subtemp';
- if ($class::BASE === 26) {
- $code.= ')';
- }
- $code.= ';
- $' . $result . '[' . $j . '] = $subtemp;';
- }
-
- $code.= '$i = ' . $i . ';';
-
- if ($j == count($known)) {
- $code.= '
- $sum = $' . $unknown . '[' . $i . '] - ' . $known[$i] . ' - $carry;
- $carry = $sum < 0;
- $' . $result . '[' . $i . '] = $carry ? $sum + ' . $class::BASE_FULL . ' : $sum;
- ++$i;';
- }
-
- $code.= '
- if ($carry) {
- for (; !$' . $result . '[$i]; ++$i) {
- $' . $result . '[$i] = ' . $class::MAX_DIGIT . ';
- }
- --$' . $result . '[$i];
- }';
- $code.= self::generateInlineTrim($result);
-
- return $code;
- }
-
- /**
- * Inline Comparison
- *
- * If $unknown >= $known then loop
- *
- * @param array $known
- * @param string $unknown
- * @param string $subcode
- * @return string
- */
- private static function generateInlineCompare(array $known, $unknown, $subcode)
- {
- $uniqid = uniqid();
- $code = 'loop_' . $uniqid . ':
- $clength = count($' . $unknown . ');
- switch (true) {
- case $clength < ' . count($known) . ':
- goto end_' . $uniqid . ';
- case $clength > ' . count($known) . ':';
- for ($i = count($known) - 1; $i >= 0; $i--) {
- $code.= '
- case $' . $unknown . '[' . $i . '] > ' . $known[$i] . ':
- goto subcode_' . $uniqid . ';
- case $' . $unknown . '[' . $i . '] < ' . $known[$i] . ':
- goto end_' . $uniqid . ';';
- }
- $code.= '
- default:
- // do subcode
- }
-
- subcode_' . $uniqid . ':' . $subcode . '
- goto loop_' . $uniqid . ';
-
- end_' . $uniqid . ':';
-
- return $code;
- }
-
- /**
- * Convert a float to a string
- *
- * If you do echo floatval(pow(2, 52)) you'll get 4.6116860184274E+18. It /can/ be displayed without a loss of
- * precision but displayed in this way there will be precision loss, hence the need for this method.
- *
- * @param int|float $num
- * @return string
- */
- private static function float2string($num)
- {
- if (!is_float($num)) {
- return $num;
- }
-
- if ($num < 0) {
- return '-' . self::float2string(abs($num));
- }
-
- $temp = '';
- while ($num) {
- $temp = fmod($num, 10) . $temp;
- $num = floor($num / 10);
- }
-
- return $temp;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Montgomery.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Montgomery.php
deleted file mode 100644
index 79db314d6..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/Montgomery.php
+++ /dev/null
@@ -1,130 +0,0 @@
-<?php
-
-/**
- * PHP Montgomery Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP\Reductions;
-
-use phpseclib3\Math\BigInteger\Engines\PHP\Montgomery as Progenitor;
-
-/**
- * PHP Montgomery Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Montgomery extends Progenitor
-{
- /**
- * Prepare a number for use in Montgomery Modular Reductions
- *
- * @param array $x
- * @param array $n
- * @param string $class
- * @return array
- */
- protected static function prepareReduce(array $x, array $n, $class)
- {
- $lhs = new $class();
- $lhs->value = array_merge(self::array_repeat(0, count($n)), $x);
- $rhs = new $class();
- $rhs->value = $n;
-
- list(, $temp) = $lhs->divide($rhs);
- return $temp->value;
- }
-
- /**
- * Montgomery Multiply
- *
- * Interleaves the montgomery reduction and long multiplication algorithms together as described in
- * {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=13 HAC 14.36}
- *
- * @param array $x
- * @param array $n
- * @param string $class
- * @return array
- */
- protected static function reduce(array $x, array $n, $class)
- {
- static $cache = [
- self::VARIABLE => [],
- self::DATA => []
- ];
-
- if (($key = array_search($n, $cache[self::VARIABLE])) === false) {
- $key = count($cache[self::VARIABLE]);
- $cache[self::VARIABLE][] = $x;
- $cache[self::DATA][] = self::modInverse67108864($n, $class);
- }
-
- $k = count($n);
-
- $result = [self::VALUE => $x];
-
- for ($i = 0; $i < $k; ++$i) {
- $temp = $result[self::VALUE][$i] * $cache[self::DATA][$key];
- $temp = $temp - $class::BASE_FULL * ($class::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31));
- $temp = $class::regularMultiply([$temp], $n);
- $temp = array_merge(self::array_repeat(0, $i), $temp);
- $result = $class::addHelper($result[self::VALUE], false, $temp, false);
- }
-
- $result[self::VALUE] = array_slice($result[self::VALUE], $k);
-
- if (self::compareHelper($result, false, $n, false) >= 0) {
- $result = $class::subtractHelper($result[self::VALUE], false, $n, false);
- }
-
- return $result[self::VALUE];
- }
-
- /**
- * Modular Inverse of a number mod 2**26 (eg. 67108864)
- *
- * Based off of the bnpInvDigit function implemented and justified in the following URL:
- *
- * {@link http://www-cs-students.stanford.edu/~tjw/jsbn/jsbn.js}
- *
- * The following URL provides more info:
- *
- * {@link http://groups.google.com/group/sci.crypt/msg/7a137205c1be7d85}
- *
- * As for why we do all the bitmasking... strange things can happen when converting from floats to ints. For
- * instance, on some computers, var_dump((int) -4294967297) yields int(-1) and on others, it yields
- * int(-2147483648). To avoid problems stemming from this, we use bitmasks to guarantee that ints aren't
- * auto-converted to floats. The outermost bitmask is present because without it, there's no guarantee that
- * the "residue" returned would be the so-called "common residue". We use fmod, in the last step, because the
- * maximum possible $x is 26 bits and the maximum $result is 16 bits. Thus, we have to be able to handle up to
- * 40 bits, which only 64-bit floating points will support.
- *
- * Thanks to Pedro Gimeno Fortea for input!
- *
- * @param array $x
- * @param string $class
- * @return int
- */
- protected static function modInverse67108864(array $x, $class) // 2**26 == 67,108,864
- {
- $x = -$x[0];
- $result = $x & 0x3; // x**-1 mod 2**2
- $result = ($result * (2 - $x * $result)) & 0xF; // x**-1 mod 2**4
- $result = ($result * (2 - ($x & 0xFF) * $result)) & 0xFF; // x**-1 mod 2**8
- $result = ($result * ((2 - ($x & 0xFFFF) * $result) & 0xFFFF)) & 0xFFFF; // x**-1 mod 2**16
- $result = $class::BASE == 26 ?
- fmod($result * (2 - fmod($x * $result, $class::BASE_FULL)), $class::BASE_FULL) : // x**-1 mod 2**26
- ($result * (2 - ($x * $result) % $class::BASE_FULL)) % $class::BASE_FULL;
- return $result & $class::MAX_DIGIT;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/MontgomeryMult.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/MontgomeryMult.php
deleted file mode 100644
index 31e8af211..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/MontgomeryMult.php
+++ /dev/null
@@ -1,81 +0,0 @@
-<?php
-
-/**
- * PHP Montgomery Modular Exponentiation Engine with interleaved multiplication
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP\Reductions;
-
-use phpseclib3\Math\BigInteger\Engines\PHP\Base;
-
-/**
- * PHP Montgomery Modular Exponentiation Engine with interleaved multiplication
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class MontgomeryMult extends Montgomery
-{
- /**
- * Montgomery Multiply
- *
- * Interleaves the montgomery reduction and long multiplication algorithms together as described in
- * {@link http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf#page=13 HAC 14.36}
- *
- * @see self::_prepMontgomery()
- * @see self::_montgomery()
- * @access private
- * @param array $x
- * @param array $y
- * @param array $m
- * @param string $class
- * @return array
- */
- public static function multiplyReduce(array $x, array $y, array $m, $class)
- {
- // the following code, although not callable, can be run independently of the above code
- // although the above code performed better in my benchmarks the following could might
- // perform better under different circumstances. in lieu of deleting it it's just been
- // made uncallable
-
- static $cache = [
- self::VARIABLE => [],
- self::DATA => []
- ];
-
- if (($key = array_search($m, $cache[self::VARIABLE])) === false) {
- $key = count($cache[self::VARIABLE]);
- $cache[self::VARIABLE][] = $m;
- $cache[self::DATA][] = self::modInverse67108864($m, $class);
- }
-
- $n = max(count($x), count($y), count($m));
- $x = array_pad($x, $n, 0);
- $y = array_pad($y, $n, 0);
- $m = array_pad($m, $n, 0);
- $a = [self::VALUE => self::array_repeat(0, $n + 1)];
- for ($i = 0; $i < $n; ++$i) {
- $temp = $a[self::VALUE][0] + $x[$i] * $y[0];
- $temp = $temp - $class::BASE_FULL * ($class::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31));
- $temp = $temp * $cache[self::DATA][$key];
- $temp = $temp - $class::BASE_FULL * ($class::BASE === 26 ? intval($temp / 0x4000000) : ($temp >> 31));
- $temp = $class::addHelper($class::regularMultiply([$x[$i]], $y), false, $class::regularMultiply([$temp], $m), false);
- $a = $class::addHelper($a[self::VALUE], false, $temp[self::VALUE], false);
- $a[self::VALUE] = array_slice($a[self::VALUE], 1);
- }
- if (self::compareHelper($a[self::VALUE], false, $m, false) >= 0) {
- $a = $class::subtractHelper($a[self::VALUE], false, $m, false);
- }
- return $a[self::VALUE];
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/PowerOfTwo.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/PowerOfTwo.php
deleted file mode 100644
index 73f133d06..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP/Reductions/PowerOfTwo.php
+++ /dev/null
@@ -1,63 +0,0 @@
-<?php
-
-/**
- * PHP Power of Two Modular Exponentiation Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines\PHP\Reductions;
-
-use phpseclib3\Math\BigInteger\Engines\PHP\Base;
-
-/**
- * PHP Power Of Two Modular Exponentiation Engine
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class PowerOfTwo extends Base
-{
- /**
- * Prepare a number for use in Montgomery Modular Reductions
- *
- * @param array $x
- * @param array $n
- * @param string $class
- * @return array
- */
- protected static function prepareReduce(array $x, array $n, $class)
- {
- return self::reduce($x, $n, $class);
- }
-
- /**
- * Power Of Two Reduction
- *
- * @param array $x
- * @param array $n
- * @param string $class
- * @return array
- */
- protected static function reduce(array $x, array $n, $class)
- {
- $lhs = new $class();
- $lhs->value = $x;
- $rhs = new $class();
- $rhs->value = $n;
-
- $temp = new $class();
- $temp->value = [1];
-
- $result = $lhs->bitwise_and($rhs->subtract($temp));
- return $result->value;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP32.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP32.php
deleted file mode 100644
index a1b4a7a50..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP32.php
+++ /dev/null
@@ -1,418 +0,0 @@
-<?php
-
-/**
- * Pure-PHP 32-bit BigInteger Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines;
-
-use ParagonIE\ConstantTime\Hex;
-
-/**
- * Pure-PHP 32-bit Engine.
- *
- * Uses 64-bit floats if int size is 4 bits
- *
- * @package PHP32
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PHP32 extends PHP
-{
- // Constants used by PHP.php
- const BASE = 26;
- const BASE_FULL = 0x4000000;
- const MAX_DIGIT = 0x3FFFFFF;
- const MSB = 0x2000000;
-
- /**
- * MAX10 in greatest MAX10LEN satisfying
- * MAX10 = 10**MAX10LEN <= 2**BASE.
- */
- const MAX10 = 10000000;
-
- /**
- * MAX10LEN in greatest MAX10LEN satisfying
- * MAX10 = 10**MAX10LEN <= 2**BASE.
- */
- const MAX10LEN = 7;
- const MAX_DIGIT2 = 4503599627370496;
- /**#@-*/
-
- /**
- * Modular Exponentiation Engine
- *
- * @var string
- */
- protected static $modexpEngine;
-
- /**
- * Engine Validity Flag
- *
- * @var bool
- */
- protected static $isValidEngine;
-
- /**
- * Primes > 2 and < 1000
- *
- * @var array
- */
- protected static $primes;
-
- /**
- * BigInteger(0)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\PHP32
- */
- protected static $zero;
-
- /**
- * BigInteger(1)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\PHP32
- */
- protected static $one;
-
- /**
- * BigInteger(2)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\PHP32
- */
- protected static $two;
-
- /**
- * Initialize a PHP32 BigInteger Engine instance
- *
- * @param int $base
- * @see parent::initialize()
- */
- protected function initialize($base)
- {
- if ($base != 256 && $base != -256) {
- return parent::initialize($base);
- }
-
- $val = $this->value;
- $this->value = [];
- $vals = &$this->value;
- $i = strlen($val);
- if (!$i) {
- return;
- }
-
- while (true) {
- $i-= 4;
- if ($i < 0) {
- if ($i == -4) {
- break;
- }
- $val = substr($val, 0, 4 + $i);
- $val = str_pad($val, 4, "\0", STR_PAD_LEFT);
- if ($val == "\0\0\0\0") {
- break;
- }
- $i = 0;
- }
- list(, $digit) = unpack('N', substr($val, $i, 4));
- $step = count($vals) & 3;
- if ($step) {
- $digit>>= 2 * $step;
- }
- if ($step != 3) {
- $digit&= static::MAX_DIGIT;
- $i++;
- }
- $vals[] = $digit;
- }
- while (end($vals) === 0) {
- array_pop($vals);
- }
- reset($vals);
- }
-
- /**
- * Test for engine validity
- *
- * @see parent::__construct()
- * @return bool
- */
- public static function isValidEngine()
- {
- return PHP_INT_SIZE >= 4;
- }
-
- /**
- * Adds two BigIntegers.
- *
- * @param PHP32 $y
- * @return PHP32
- */
- public function add(PHP32 $y)
- {
- $temp = self::addHelper($this->value, $this->is_negative, $y->value, $y->is_negative);
-
- return $this->convertToObj($temp);
- }
-
- /**
- * Subtracts two BigIntegers.
- *
- * @param PHP32 $y
- * @return PHP32
- */
- public function subtract(PHP32 $y)
- {
- $temp = self::subtractHelper($this->value, $this->is_negative, $y->value, $y->is_negative);
-
- return $this->convertToObj($temp);
- }
-
- /**
- * Multiplies two BigIntegers.
- *
- * @param PHP32 $y
- * @return PHP32
- */
- public function multiply(PHP32 $y)
- {
- $temp = self::multiplyHelper($this->value, $this->is_negative, $y->value, $y->is_negative);
-
- return $this->convertToObj($temp);
- }
-
- /**
- * Divides two BigIntegers.
- *
- * Returns an array whose first element contains the quotient and whose second element contains the
- * "common residue". If the remainder would be positive, the "common residue" and the remainder are the
- * same. If the remainder would be negative, the "common residue" is equal to the sum of the remainder
- * and the divisor (basically, the "common residue" is the first positive modulo).
- *
- * @param PHP32 $y
- * @return PHP32
- */
- public function divide(PHP32 $y)
- {
- return $this->divideHelper($y);
- }
-
- /**
- * Calculates modular inverses.
- *
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- * @param PHP32 $n
- * @return false|PHP32
- */
- public function modInverse(PHP32 $n)
- {
- return $this->modInverseHelper($n);
- }
-
- /**
- * Calculates modular inverses.
- *
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- * @param PHP32 $n
- * @return PHP32[]
- */
- public function extendedGCD(PHP32 $n)
- {
- return $this->extendedGCDHelper($n);
- }
-
- /**
- * Calculates the greatest common divisor
- *
- * Say you have 693 and 609. The GCD is 21.
- *
- * @param PHP32 $n
- * @return PHP32
- */
- public function gcd(PHP32 $n)
- {
- return $this->extendedGCD($n)['gcd'];
- }
-
- /**
- * Logical And
- *
- * @param PHP32 $x
- * @return PHP32
- */
- public function bitwise_and(PHP32 $x)
- {
- return $this->bitwiseAndHelper($x);
- }
-
- /**
- * Logical Or
- *
- * @param PHP32 $x
- * @return PHP32
- */
- public function bitwise_or(PHP32 $x)
- {
- return $this->bitwiseOrHelper($x);
- }
-
- /**
- * Logical Exclusive Or
- *
- * @param PHP32 $x
- * @return PHP32
- */
- public function bitwise_xor(PHP32 $x)
- {
- return $this->bitwiseXorHelper($x);
- }
-
- /**
- * Compares two numbers.
- *
- * Although one might think !$x->compare($y) means $x != $y, it, in fact, means the opposite. The reason for this is
- * demonstrated thusly:
- *
- * $x > $y: $x->compare($y) > 0
- * $x < $y: $x->compare($y) < 0
- * $x == $y: $x->compare($y) == 0
- *
- * Note how the same comparison operator is used. If you want to test for equality, use $x->equals($y).
- *
- * {@internal Could return $this->subtract($x), but that's not as fast as what we do do.}
- *
- * @param PHP32 $y
- * @return int in case < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal.
- * @access public
- * @see self::equals()
- */
- public function compare(PHP32 $y)
- {
- return $this->compareHelper($this->value, $this->is_negative, $y->value, $y->is_negative);
- }
-
- /**
- * Tests the equality of two numbers.
- *
- * If you need to see if one number is greater than or less than another number, use BigInteger::compare()
- *
- * @param PHP32 $x
- * @return bool
- */
- public function equals(PHP32 $x)
- {
- return $this->value === $x->value && $this->is_negative == $x->is_negative;
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param PHP32 $e
- * @param PHP32 $n
- * @return PHP32
- */
- public function modPow(PHP32 $e, PHP32 $n)
- {
- return $this->powModOuter($e, $n);
- }
-
- /**
- * Performs modular exponentiation.
- *
- * Alias for modPow().
- *
- * @param PHP32 $e
- * @param PHP32 $n
- * @return PHP32
- */
- public function powMod(PHP32 $e, PHP32 $n)
- {
- return $this->powModOuter($e, $n);
- }
-
- /**
- * Generate a random prime number between a range
- *
- * If there's not a prime within the given range, false will be returned.
- *
- * @param PHP32 $min
- * @param PHP32 $max
- * @return false|PHP32
- */
- public static function randomRangePrime(PHP32 $min, PHP32 $max)
- {
- return self::randomRangePrimeOuter($min, $max);
- }
-
- /**
- * Generate a random number between a range
- *
- * Returns a random number between $min and $max where $min and $max
- * can be defined using one of the two methods:
- *
- * BigInteger::randomRange($min, $max)
- * BigInteger::randomRange($max, $min)
- *
- * @param PHP32 $min
- * @param PHP32 $max
- * @return PHP32
- */
- public static function randomRange(PHP32 $min, PHP32 $max)
- {
- return self::randomRangeHelper($min, $max);
- }
-
- /**
- * Performs exponentiation.
- *
- * @param PHP32 $n
- * @return PHP32
- */
- public function pow(PHP32 $n)
- {
- return $this->powHelper($n);
- }
-
- /**
- * Return the minimum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param PHP32 ...$nums
- * @return PHP32
- */
- public static function min(PHP32 ...$nums)
- {
- return self::minHelper($nums);
- }
-
- /**
- * Return the maximum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param PHP32 ...$nums
- * @return PHP32
- */
- public static function max(PHP32 ...$nums)
- {
- return self::maxHelper($nums);
- }
-
- /**
- * Tests BigInteger to see if it is between two integers, inclusive
- *
- * @param PHP32 $min
- * @param PHP32 $max
- * @return bool
- */
- public function between(PHP32 $min, PHP32 $max)
- {
- return $this->compare($min) >= 0 && $this->compare($max) <= 0;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP64.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP64.php
deleted file mode 100644
index 42d1982d9..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/PHP64.php
+++ /dev/null
@@ -1,422 +0,0 @@
-<?php
-
-/**
- * Pure-PHP 64-bit BigInteger Engine
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math\BigInteger\Engines;
-
-use ParagonIE\ConstantTime\Hex;
-
-/**
- * Pure-PHP 64-bit Engine.
- *
- * Uses 64-bit integers if int size is 8 bits
- *
- * @package PHP
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PHP64 extends PHP
-{
- // Constants used by PHP.php
- const BASE = 31;
- const BASE_FULL = 0x80000000;
- const MAX_DIGIT = 0x7FFFFFFF;
- const MSB = 0x40000000;
-
- /**
- * MAX10 in greatest MAX10LEN satisfying
- * MAX10 = 10**MAX10LEN <= 2**BASE.
- */
- const MAX10 = 1000000000;
-
- /**
- * MAX10LEN in greatest MAX10LEN satisfying
- * MAX10 = 10**MAX10LEN <= 2**BASE.
- */
- const MAX10LEN = 9;
- const MAX_DIGIT2 = 4611686018427387904;
- /**#@-*/
-
- /**
- * Modular Exponentiation Engine
- *
- * @var string
- */
- protected static $modexpEngine;
-
- /**
- * Engine Validity Flag
- *
- * @var bool
- */
- protected static $isValidEngine;
-
- /**
- * Primes > 2 and < 1000
- *
- * @var array
- */
- protected static $primes;
-
- /**
- * BigInteger(0)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\PHP64
- */
- protected static $zero;
-
- /**
- * BigInteger(1)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\PHP64
- */
- protected static $one;
-
- /**
- * BigInteger(2)
- *
- * @var \phpseclib3\Math\BigInteger\Engines\PHP64
- */
- protected static $two;
-
- /**
- * Initialize a PHP64 BigInteger Engine instance
- *
- * @param int $base
- * @see parent::initialize()
- */
- protected function initialize($base)
- {
- if ($base != 256 && $base != -256) {
- return parent::initialize($base);
- }
-
- $val = $this->value;
- $this->value = [];
- $vals = &$this->value;
- $i = strlen($val);
- if (!$i) {
- return;
- }
-
- while (true) {
- $i-= 4;
- if ($i < 0) {
- if ($i == -4) {
- break;
- }
- $val = substr($val, 0, 4 + $i);
- $val = str_pad($val, 4, "\0", STR_PAD_LEFT);
- if ($val == "\0\0\0\0") {
- break;
- }
- $i = 0;
- }
- list(, $digit) = unpack('N', substr($val, $i, 4));
- $step = count($vals) & 7;
- if (!$step) {
- $digit&= static::MAX_DIGIT;
- $i++;
- } else {
- $shift = 8 - $step;
- $digit>>= $shift;
- $shift = 32 - $shift;
- $digit&= (1 << $shift) - 1;
- $temp = $i > 0 ? ord($val[$i - 1]) : 0;
- $digit|= ($temp << $shift) & 0x7F000000;
- }
- $vals[] = $digit;
- }
- while (end($vals) === 0) {
- array_pop($vals);
- }
- reset($vals);
- }
-
- /**
- * Test for engine validity
- *
- * @see parent::__construct()
- * @return bool
- */
- public static function isValidEngine()
- {
- return PHP_INT_SIZE >= 8;
- }
-
- /**
- * Adds two BigIntegers.
- *
- * @param PHP64 $y
- * @return PHP64
- */
- public function add(PHP64 $y)
- {
- $temp = self::addHelper($this->value, $this->is_negative, $y->value, $y->is_negative);
-
- return $this->convertToObj($temp);
- }
-
- /**
- * Subtracts two BigIntegers.
- *
- * @param PHP64 $y
- * @return PHP64
- */
- public function subtract(PHP64 $y)
- {
- $temp = self::subtractHelper($this->value, $this->is_negative, $y->value, $y->is_negative);
-
- return $this->convertToObj($temp);
- }
-
- /**
- * Multiplies two BigIntegers.
- *
- * @param PHP64 $y
- * @return PHP64
- */
- public function multiply(PHP64 $y)
- {
- $temp = self::multiplyHelper($this->value, $this->is_negative, $y->value, $y->is_negative);
-
- return $this->convertToObj($temp);
- }
-
- /**
- * Divides two BigIntegers.
- *
- * Returns an array whose first element contains the quotient and whose second element contains the
- * "common residue". If the remainder would be positive, the "common residue" and the remainder are the
- * same. If the remainder would be negative, the "common residue" is equal to the sum of the remainder
- * and the divisor (basically, the "common residue" is the first positive modulo).
- *
- * @param PHP64 $y
- * @return PHP64
- */
- public function divide(PHP64 $y)
- {
- return $this->divideHelper($y);
- }
-
- /**
- * Calculates modular inverses.
- *
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- * @param PHP64 $n
- * @return false|PHP64
- */
- public function modInverse(PHP64 $n)
- {
- return $this->modInverseHelper($n);
- }
-
- /**
- * Calculates modular inverses.
- *
- * Say you have (30 mod 17 * x mod 17) mod 17 == 1. x can be found using modular inverses.
- * @param PHP64 $n
- * @return PHP64[]
- */
- public function extendedGCD(PHP64 $n)
- {
- return $this->extendedGCDHelper($n);
- }
-
- /**
- * Calculates the greatest common divisor
- *
- * Say you have 693 and 609. The GCD is 21.
- *
- * @param PHP64 $n
- * @return PHP64
- */
- public function gcd(PHP64 $n)
- {
- return $this->extendedGCD($n)['gcd'];
- }
-
- /**
- * Logical And
- *
- * @param PHP64 $x
- * @return PHP64
- */
- public function bitwise_and(PHP64 $x)
- {
- return $this->bitwiseAndHelper($x);
- }
-
- /**
- * Logical Or
- *
- * @param PHP64 $x
- * @return PHP64
- */
- public function bitwise_or(PHP64 $x)
- {
- return $this->bitwiseOrHelper($x);
- }
-
- /**
- * Logical Exclusive Or
- *
- * @param PHP64 $x
- * @return PHP64
- */
- public function bitwise_xor(PHP64 $x)
- {
- return $this->bitwiseXorHelper($x);
- }
-
- /**
- * Compares two numbers.
- *
- * Although one might think !$x->compare($y) means $x != $y, it, in fact, means the opposite. The reason for this is
- * demonstrated thusly:
- *
- * $x > $y: $x->compare($y) > 0
- * $x < $y: $x->compare($y) < 0
- * $x == $y: $x->compare($y) == 0
- *
- * Note how the same comparison operator is used. If you want to test for equality, use $x->equals($y).
- *
- * {@internal Could return $this->subtract($x), but that's not as fast as what we do do.}
- *
- * @param PHP64 $y
- * @return int in case < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal.
- * @access public
- * @see self::equals()
- */
- public function compare(PHP64 $y)
- {
- return parent::compareHelper($this->value, $this->is_negative, $y->value, $y->is_negative);
- }
-
- /**
- * Tests the equality of two numbers.
- *
- * If you need to see if one number is greater than or less than another number, use BigInteger::compare()
- *
- * @param PHP64 $x
- * @return bool
- */
- public function equals(PHP64 $x)
- {
- return $this->value === $x->value && $this->is_negative == $x->is_negative;
- }
-
- /**
- * Performs modular exponentiation.
- *
- * @param PHP64 $e
- * @param PHP64 $n
- * @return PHP64
- */
- public function modPow(PHP64 $e, PHP64 $n)
- {
- return $this->powModOuter($e, $n);
- }
-
- /**
- * Performs modular exponentiation.
- *
- * Alias for modPow().
- *
- * @param PHP64 $e
- * @param PHP64 $n
- * @return PHP64
- */
- public function powMod(PHP64 $e, PHP64 $n)
- {
- return $this->powModOuter($e, $n);
- }
-
- /**
- * Generate a random prime number between a range
- *
- * If there's not a prime within the given range, false will be returned.
- *
- * @param PHP64 $min
- * @param PHP64 $max
- * @return false|PHP64
- */
- public static function randomRangePrime(PHP64 $min, PHP64 $max)
- {
- return self::randomRangePrimeOuter($min, $max);
- }
-
- /**
- * Generate a random number between a range
- *
- * Returns a random number between $min and $max where $min and $max
- * can be defined using one of the two methods:
- *
- * BigInteger::randomRange($min, $max)
- * BigInteger::randomRange($max, $min)
- *
- * @param PHP64 $min
- * @param PHP64 $max
- * @return PHP64
- */
- public static function randomRange(PHP64 $min, PHP64 $max)
- {
- return self::randomRangeHelper($min, $max);
- }
-
- /**
- * Performs exponentiation.
- *
- * @param PHP64 $n
- * @return PHP64
- */
- public function pow(PHP64 $n)
- {
- return $this->powHelper($n);
- }
-
- /**
- * Return the minimum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param PHP64 ...$nums
- * @return PHP64
- */
- public static function min(PHP64 ...$nums)
- {
- return self::minHelper($nums);
- }
-
- /**
- * Return the maximum BigInteger between an arbitrary number of BigIntegers.
- *
- * @param PHP64 ...$nums
- * @return PHP64
- */
- public static function max(PHP64 ...$nums)
- {
- return self::maxHelper($nums);
- }
-
- /**
- * Tests BigInteger to see if it is between two integers, inclusive
- *
- * @param PHP64 $min
- * @param PHP64 $max
- * @return bool
- */
- public function between(PHP64 $min, PHP64 $max)
- {
- return $this->compare($min) >= 0 && $this->compare($max) <= 0;
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BinaryField.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BinaryField.php
deleted file mode 100644
index 7457b720f..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BinaryField.php
+++ /dev/null
@@ -1,196 +0,0 @@
-<?php
-
-/**
- * Binary Finite Fields
- *
- * Utilizes the factory design pattern
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- */
-
-namespace phpseclib3\Math;
-
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Math\Common\FiniteField;
-use phpseclib3\Math\BinaryField\Integer;
-use phpseclib3\Common\Functions\Strings;
-
-/**
- * Binary Finite Fields
- *
- * @package Math
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class BinaryField extends FiniteField
-{
- /**
- * Instance Counter
- *
- * @var int
- */
- private static $instanceCounter = 0;
-
- /**
- * Keeps track of current instance
- *
- * @var int
- */
- protected $instanceID;
-
- /**
- * Default constructor
- */
- public function __construct(...$indices)
- {
- $m = array_shift($indices);
- $val = str_repeat('0', $m) . '1';
- foreach ($indices as $index) {
- $val[$index] = '1';
- }
- $modulo = static::base2ToBase256(strrev($val));
-
- $mStart = 2 * $m - 2;
- $t = ceil($m / 8);
- $finalMask = chr((1 << ($m % 8)) - 1);
- if ($finalMask == "\0") {
- $finalMask = "\xFF";
- }
- $bitLen = $mStart + 1;
- $pad = ceil($bitLen / 8);
- $h = $bitLen & 7;
- $h = $h ? 8 - $h : 0;
-
- $r = rtrim(substr($val, 0, -1), '0');
- $u = [static::base2ToBase256(strrev($r))];
- for ($i = 1; $i < 8; $i++) {
- $u[] = static::base2ToBase256(strrev(str_repeat('0', $i) . $r));
- }
-
- // implements algorithm 2.40 (in section 2.3.5) in "Guide to Elliptic Curve Cryptography"
- // with W = 8
- $reduce = function($c) use ($u, $mStart, $m, $t, $finalMask, $pad, $h) {
- $c = str_pad($c, $pad, "\0", STR_PAD_LEFT);
- for ($i = $mStart; $i >= $m;) {
- $g = $h >> 3;
- $mask = $h & 7;
- $mask = $mask ? 1 << (7 - $mask) : 0x80;
- for (; $mask > 0; $mask >>= 1, $i--, $h++) {
- if (ord($c[$g]) & $mask) {
- $temp = $i - $m;
- $j = $temp >> 3;
- $k = $temp & 7;
- $t1 = $j ? substr($c, 0, -$j) : $c;
- $length = strlen($t1);
- if ($length) {
- $t2 = str_pad($u[$k], $length, "\0", STR_PAD_LEFT);
- $temp = $t1 ^ $t2;
- $c = $j ? substr_replace($c, $temp, 0, $length) : $temp;
- }
- }
- }
- }
- $c = substr($c, -$t);
- if (strlen($c) == $t) {
- $c[0] = $c[0] & $finalMask;
- }
- return ltrim($c, "\0");
- };
-
- $this->instanceID = self::$instanceCounter++;
- Integer::setModulo($this->instanceID, $modulo);
- Integer::setRecurringModuloFunction($this->instanceID, $reduce);
-
- $this->randomMax = new BigInteger($modulo, 2);
- }
-
- /**
- * Returns an instance of a dynamically generated PrimeFieldInteger class
- *
- * @param string $num
- * @return object
- */
- public function newInteger($num)
- {
- return new Integer($this->instanceID, $num instanceof BigInteger ? $num->toBytes() : $num);
- }
-
- /**
- * Returns an integer on the finite field between one and the prime modulo
- *
- * @return object
- */
- public function randomInteger()
- {
- static $one;
- if (!isset($one)) {
- $one = new BigInteger(1);
- }
-
- return new Integer($this->instanceID, BigInteger::randomRange($one, $this->randomMax)->toBytes());
- }
-
- /**
- * Returns the length of the modulo in bytes
- *
- * @return integer
- */
- public function getLengthInBytes()
- {
- return strlen(Integer::getModulo($this->instanceID));
- }
-
- /**
- * Returns the length of the modulo in bits
- *
- * @return integer
- */
- public function getLength()
- {
- return strlen(Integer::getModulo($this->instanceID)) << 3;
- }
-
- /**
- * Converts a base-2 string to a base-256 string
- *
- * @param string $x
- * @param integer $size
- * @return string
- */
- public static function base2ToBase256($x, $size = null)
- {
- $str = Strings::bits2bin($x);
-
- $pad = strlen($x) >> 3;
- if (strlen($x) & 3) {
- $pad++;
- }
- $str = str_pad($str, $pad, "\0", STR_PAD_LEFT);
- if (isset($size)) {
- $str = str_pad($str, $size, "\0", STR_PAD_LEFT);
- }
-
- return $str;
- }
-
- /**
- * Converts a base-256 string to a base-2 string
- *
- * @param string $x
- * @return string
- */
- public static function base256ToBase2($x)
- {
- if (function_exists('gmp_import')) {
- return gmp_strval(gmp_import($x), 2);
- }
-
- return Strings::bin2bits($x);
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/BinaryField/Integer.php b/vendor/phpseclib/phpseclib/phpseclib/Math/BinaryField/Integer.php
deleted file mode 100644
index fc7a11ad2..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/BinaryField/Integer.php
+++ /dev/null
@@ -1,520 +0,0 @@
-<?php
-
-/**
- * Binary Finite Fields
- *
- * In a binary finite field numbers are actually polynomial equations. If you
- * represent the number as a sequence of bits you get a sequence of 1's or 0's.
- * These 1's or 0's represent the coefficients of the x**n, where n is the
- * location of the given bit. When you add numbers over a binary finite field
- * the result should have a coefficient of 1 or 0 as well. Hence addition
- * and subtraction become the same operation as XOR.
- * eg. 1 + 1 + 1 == 3 % 2 == 1 or 0 - 1 == -1 % 2 == 1
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- */
-
-namespace phpseclib3\Math\BinaryField;
-
-use phpseclib3\Math\Common\FiniteField\Integer as Base;
-use phpseclib3\Math\BigInteger;
-use phpseclib3\Math\BinaryField;
-use ParagonIE\ConstantTime\Hex;
-
-/**
- * Binary Finite Fields
- *
- * @package Math
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Integer extends Base
-{
- /**
- * Holds the BinaryField's value
- *
- * @var string
- */
- protected $value;
-
- /**
- * Keeps track of current instance
- *
- * @var int
- */
- protected $instanceID;
-
- /**
- * Holds the PrimeField's modulo
- *
- * @var string[]
- */
- protected static $modulo;
-
- /**
- * Holds a pre-generated function to perform modulo reductions
- *
- * @var callable[]
- */
- protected static $reduce;
-
- /**
- * Default constructor
- */
- public function __construct($instanceID, $num = '')
- {
- $this->instanceID = $instanceID;
- if (!strlen($num)) {
- $this->value = '';
- } else {
- $reduce = static::$reduce[$instanceID];
- $this->value = $reduce($num);
- }
- }
-
- /**
- * Set the modulo for a given instance
- */
- public static function setModulo($instanceID, $modulo)
- {
- static::$modulo[$instanceID] = $modulo;
- }
-
- /**
- * Set the modulo for a given instance
- */
- public static function setRecurringModuloFunction($instanceID, callable $function)
- {
- static::$reduce[$instanceID] = $function;
- }
-
- /**
- * Tests a parameter to see if it's of the right instance
- *
- * Throws an exception if the incorrect class is being utilized
- */
- private static function checkInstance(self $x, self $y)
- {
- if ($x->instanceID != $y->instanceID) {
- throw new \UnexpectedValueException('The instances of the two BinaryField\Integer objects do not match');
- }
- }
-
- /**
- * Tests the equality of two numbers.
- *
- * @return bool
- */
- public function equals(self $x)
- {
- static::checkInstance($this, $x);
-
- return $this->value == $x->value;
- }
-
- /**
- * Compares two numbers.
- *
- * @return int
- */
- public function compare(self $x)
- {
- static::checkInstance($this, $x);
-
- $a = $this->value;
- $b = $x->value;
-
- $length = max(strlen($a), strlen($b));
-
- $a = str_pad($a, $length, "\0", STR_PAD_LEFT);
- $b = str_pad($b, $length, "\0", STR_PAD_LEFT);
-
- return strcmp($a, $b);
- }
-
- /**
- * Returns the degree of the polynomial
- *
- * @param string $x
- * @return int
- */
- private static function deg($x)
- {
- $x = ltrim($x, "\0");
- $xbit = decbin(ord($x[0]));
- $xlen = $xbit == '0' ? 0 : strlen($xbit);
- $len = strlen($x);
- if (!$len) {
- return -1;
- }
- return 8 * strlen($x) - 9 + $xlen;
- }
-
- /**
- * Perform polynomial division
- *
- * @return string[]
- * @link https://en.wikipedia.org/wiki/Polynomial_greatest_common_divisor#Euclidean_division
- */
- private static function polynomialDivide($x, $y)
- {
- // in wikipedia's description of the algorithm, lc() is the leading coefficient. over a binary field that's
- // always going to be 1.
-
- $q = chr(0);
- $d = static::deg($y);
- $r = $x;
- while (($degr = static::deg($r)) >= $d) {
- $s = '1' . str_repeat('0', $degr - $d);
- $s = BinaryField::base2ToBase256($s);
- $length = max(strlen($s), strlen($q));
- $q = !isset($q) ? $s :
- str_pad($q, $length, "\0", STR_PAD_LEFT) ^
- str_pad($s, $length, "\0", STR_PAD_LEFT);
- $s = static::polynomialMultiply($s, $y);
- $length = max(strlen($r), strlen($s));
- $r = str_pad($r, $length, "\0", STR_PAD_LEFT) ^
- str_pad($s, $length, "\0", STR_PAD_LEFT);
- }
-
- return [ltrim($q, "\0"), ltrim($r, "\0")];
- }
-
- /**
- * Perform polynomial multiplation in the traditional way
- *
- * @return string
- * @link https://en.wikipedia.org/wiki/Finite_field_arithmetic#Multiplication
- */
- private static function regularPolynomialMultiply($x, $y)
- {
- $precomputed = [ltrim($x, "\0")];
- $x = strrev(BinaryField::base256ToBase2($x));
- $y = strrev(BinaryField::base256ToBase2($y));
- if (strlen($x) == strlen($y)) {
- $length = strlen($x);
- } else {
- $length = max(strlen($x), strlen($y));
- $x = str_pad($x, $length, '0');
- $y = str_pad($y, $length, '0');
- }
- $result = str_repeat('0', 2 * $length - 1);
- $result = BinaryField::base2ToBase256($result);
- $size = strlen($result);
- $x = strrev($x);
-
- // precompute left shift 1 through 7
- for ($i = 1; $i < 8; $i++) {
- $precomputed[$i] = BinaryField::base2ToBase256($x . str_repeat('0', $i));
- }
- for ($i = 0; $i < strlen($y); $i++) {
- if ($y[$i] == '1') {
- $temp = $precomputed[$i & 7] . str_repeat("\0", $i >> 3);
- $result^= str_pad($temp, $size, "\0", STR_PAD_LEFT);
- }
- }
-
- return $result;
- }
-
- /**
- * Perform polynomial multiplation
- *
- * Uses karatsuba multiplication to reduce x-bit multiplications to a series of 32-bit multiplications
- *
- * @return string
- * @link https://en.wikipedia.org/wiki/Karatsuba_algorithm
- */
- private static function polynomialMultiply($x, $y)
- {
- if (strlen($x) == strlen($y)) {
- $length = strlen($x);
- } else {
- $length = max(strlen($x), strlen($y));
- $x = str_pad($x, $length, "\0", STR_PAD_LEFT);
- $y = str_pad($y, $length, "\0", STR_PAD_LEFT);
- }
-
- switch (true) {
- case PHP_INT_SIZE == 8 && $length <= 4:
- return $length != 4 ?
- self::subMultiply(str_pad($x, 4, "\0", STR_PAD_LEFT), str_pad($y, 4, "\0", STR_PAD_LEFT)) :
- self::subMultiply($x, $y);
- case PHP_INT_SIZE == 4 || $length > 32:
- return self::regularPolynomialMultiply($x, $y);
- }
-
- $m = $length >> 1;
-
- $x1 = substr($x, 0, -$m);
- $x0 = substr($x, -$m);
- $y1 = substr($y, 0, -$m);
- $y0 = substr($y, -$m);
-
- $z2 = self::polynomialMultiply($x1, $y1);
- $z0 = self::polynomialMultiply($x0, $y0);
- $z1 = self::polynomialMultiply(
- self::subAdd2($x1, $x0),
- self::subAdd2($y1, $y0)
- );
-
- $z1 = self::subAdd3($z1, $z2, $z0);
-
- $xy = self::subAdd3(
- $z2 . str_repeat("\0", 2 * $m),
- $z1 . str_repeat("\0", $m),
- $z0
- );
-
- return ltrim($xy, "\0");
- }
-
- /**
- * Perform polynomial multiplication on 2x 32-bit numbers, returning
- * a 64-bit number
- *
- * @param string $x
- * @param string $y
- * @return string
- * @link https://www.bearssl.org/constanttime.html#ghash-for-gcm
- */
- private static function subMultiply($x, $y)
- {
- $x = unpack('N', $x)[1];
- $y = unpack('N', $y)[1];
-
- $x0 = $x & 0x11111111;
- $x1 = $x & 0x22222222;
- $x2 = $x & 0x44444444;
- $x3 = $x & 0x88888888;
-
- $y0 = $y & 0x11111111;
- $y1 = $y & 0x22222222;
- $y2 = $y & 0x44444444;
- $y3 = $y & 0x88888888;
-
- $z0 = ($x0 * $y0) ^ ($x1 * $y3) ^ ($x2 * $y2) ^ ($x3 * $y1);
- $z1 = ($x0 * $y1) ^ ($x1 * $y0) ^ ($x2 * $y3) ^ ($x3 * $y2);
- $z2 = ($x0 * $y2) ^ ($x1 * $y1) ^ ($x2 * $y0) ^ ($x3 * $y3);
- $z3 = ($x0 * $y3) ^ ($x1 * $y2) ^ ($x2 * $y1) ^ ($x3 * $y0);
-
- $z0&= 0x1111111111111111;
- $z1&= 0x2222222222222222;
- $z2&= 0x4444444444444444;
- $z3&= -8608480567731124088; // 0x8888888888888888 gets interpreted as a float
-
- $z = $z0 | $z1 | $z2 | $z3;
-
- return pack('J', $z);
- }
-
- /**
- * Adds two numbers
- *
- * @param string $x
- * @param string $y
- * @return string
- */
- private static function subAdd2($x, $y)
- {
- $length = max(strlen($x), strlen($y));
- $x = str_pad($x, $length, "\0", STR_PAD_LEFT);
- $y = str_pad($y, $length, "\0", STR_PAD_LEFT);
- return $x ^ $y;
- }
-
- /**
- * Adds three numbers
- *
- * @param string $x
- * @param string $y
- * @return string
- */
- private static function subAdd3($x, $y, $z)
- {
- $length = max(strlen($x), strlen($y), strlen($z));
- $x = str_pad($x, $length, "\0", STR_PAD_LEFT);
- $y = str_pad($y, $length, "\0", STR_PAD_LEFT);
- $z = str_pad($z, $length, "\0", STR_PAD_LEFT);
- return $x ^ $y ^ $z;
- }
-
- /**
- * Adds two BinaryFieldIntegers.
- *
- * @return static
- */
- public function add(self $y)
- {
- static::checkInstance($this, $y);
-
- $length = strlen(static::$modulo[$this->instanceID]);
-
- $x = str_pad($this->value, $length, "\0", STR_PAD_LEFT);
- $y = str_pad($y->value, $length, "\0", STR_PAD_LEFT);
-
- return new static($this->instanceID, $x ^ $y);
- }
-
- /**
- * Subtracts two BinaryFieldIntegers.
- *
- * @return static
- */
- public function subtract(self $x)
- {
- return $this->add($x);
- }
-
- /**
- * Multiplies two BinaryFieldIntegers.
- *
- * @return static
- */
- public function multiply(self $y)
- {
- static::checkInstance($this, $y);
-
- return new static($this->instanceID, static::polynomialMultiply($this->value, $y->value));
- }
-
- /**
- * Returns the modular inverse of a BinaryFieldInteger
- *
- * @return static
- */
- public function modInverse()
- {
- $remainder0 = static::$modulo[$this->instanceID];
- $remainder1 = $this->value;
-
- if ($remainder1 == '') {
- return new static($this->instanceID);
- }
-
- $aux0 = "\0";
- $aux1 = "\1";
- while ($remainder1 != "\1") {
- list($q, $r) = static::polynomialDivide($remainder0, $remainder1);
- $remainder0 = $remainder1;
- $remainder1 = $r;
- // the auxiliary in row n is given by the sum of the auxiliary in
- // row n-2 and the product of the quotient and the auxiliary in row
- // n-1
- $temp = static::polynomialMultiply($aux1, $q);
- $aux = str_pad($aux0, strlen($temp), "\0", STR_PAD_LEFT) ^
- str_pad($temp, strlen($aux0), "\0", STR_PAD_LEFT);
- $aux0 = $aux1;
- $aux1 = $aux;
- }
-
- $temp = new static($this->instanceID);
- $temp->value = ltrim($aux1, "\0");
- return $temp;
- }
-
- /**
- * Divides two PrimeFieldIntegers.
- *
- * @return static
- */
- public function divide(self $x)
- {
- static::checkInstance($this, $x);
-
- $x = $x->modInverse();
- return $this->multiply($x);
- }
-
- /**
- * Negate
- *
- * A negative number can be written as 0-12. With modulos, 0 is the same thing as the modulo
- * so 0-12 is the same thing as modulo-12
- *
- * @return object
- */
- public function negate()
- {
- $x = str_pad($this->value, strlen(static::$modulo[$this->instanceID]), "\0", STR_PAD_LEFT);
-
- return new static($this->instanceID, $x ^ static::$modulo[$this->instanceID]);
- }
-
- /**
- * Returns the modulo
- *
- * @return integer
- */
- public static function getModulo($instanceID)
- {
- return static::$modulo[$instanceID];
- }
-
- /**
- * Converts an Integer to a byte string (eg. base-256).
- *
- * @return string
- */
- public function toBytes()
- {
- return str_pad($this->value, strlen(static::$modulo[$this->instanceID]), "\0", STR_PAD_LEFT);
- }
-
- /**
- * Converts an Integer to a hex string (eg. base-16).
- *
- * @return string
- */
- public function toHex()
- {
- return Hex::encode($this->toBytes());
- }
-
- /**
- * Converts an Integer to a bit string (eg. base-2).
- *
- * @return string
- */
- public function toBits()
- {
- //return str_pad(BinaryField::base256ToBase2($this->value), strlen(static::$modulo[$this->instanceID]), '0', STR_PAD_LEFT);
- return BinaryField::base256ToBase2($this->value);
- }
-
- /**
- * Converts an Integer to a BigInteger
- *
- * @return string
- */
- public function toBigInteger()
- {
- return new BigInteger($this->value, 256);
- }
-
- /**
- * __toString() magic method
- *
- * @access public
- */
- public function __toString()
- {
- return (string) $this->toBigInteger();
- }
-
- /**
- * __debugInfo() magic method
- *
- * @access public
- */
- public function __debugInfo()
- {
- return ['value' => $this->toHex()];
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField.php b/vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField.php
deleted file mode 100644
index c2294a04c..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * Finite Fields Base Class
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- */
-
-namespace phpseclib3\Math\Common;
-
-/**
- * Finite Fields
- *
- * @package Math
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class FiniteField
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField/Integer.php b/vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField/Integer.php
deleted file mode 100644
index d163f5523..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField/Integer.php
+++ /dev/null
@@ -1,26 +0,0 @@
-<?php
-
-/**
- * Finite Field Integer Base Class
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- */
-
-namespace phpseclib3\Math\Common\FiniteField;
-
-/**
- * Finite Field Integer
- *
- * @package Math
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-abstract class Integer
-{
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/PrimeField.php b/vendor/phpseclib/phpseclib/phpseclib/Math/PrimeField.php
deleted file mode 100644
index 6b85c7247..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/PrimeField.php
+++ /dev/null
@@ -1,114 +0,0 @@
-<?php
-
-/**
- * Prime Finite Fields
- *
- * Utilizes the factory design pattern
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://pear.php.net/package/Math_BigInteger
- */
-
-namespace phpseclib3\Math;
-
-use phpseclib3\Math\Common\FiniteField;
-use phpseclib3\Math\PrimeField\Integer;
-
-/**
- * Prime Finite Fields
- *
- * @package Math
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class PrimeField extends FiniteField
-{
- /**
- * Instance Counter
- *
- * @var int
- */
- private static $instanceCounter = 0;
-
- /**
- * Keeps track of current instance
- *
- * @var int
- */
- protected $instanceID;
-
- /**
- * Default constructor
- */
- public function __construct(BigInteger $modulo)
- {
- //if (!$modulo->isPrime()) {
- // throw new \UnexpectedValueException('PrimeField requires a prime number be passed to the constructor');
- //}
-
- $this->modulo = $modulo;
-
- $this->instanceID = self::$instanceCounter++;
- Integer::setModulo($this->instanceID, $modulo);
- Integer::setRecurringModuloFunction($this->instanceID, $modulo->createRecurringModuloFunction());
- }
-
- /**
- * Use a custom defined modular reduction function
- */
- public function setReduction(callable $func)
- {
- $this->reduce = $func->bindTo($this, $this);
- }
-
- /**
- * Returns an instance of a dynamically generated PrimeFieldInteger class
- *
- * @return object
- */
- public function newInteger(BigInteger $num)
- {
- return new Integer($this->instanceID, $num);
- }
-
- /**
- * Returns an integer on the finite field between one and the prime modulo
- *
- * @return object
- */
- public function randomInteger()
- {
- static $one;
- if (!isset($one)) {
- $one = new BigInteger(1);
- }
-
- return new Integer($this->instanceID, BigInteger::randomRange($one, Integer::getModulo($this->instanceID)));
- }
-
- /**
- * Returns the length of the modulo in bytes
- *
- * @return integer
- */
- public function getLengthInBytes()
- {
- return Integer::getModulo($this->instanceID)->getLengthInBytes();
- }
-
- /**
- * Returns the length of the modulo in bits
- *
- * @return integer
- */
- public function getLength()
- {
- return Integer::getModulo($this->instanceID)->getLength();
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Math/PrimeField/Integer.php b/vendor/phpseclib/phpseclib/phpseclib/Math/PrimeField/Integer.php
deleted file mode 100644
index c274ff641..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/Math/PrimeField/Integer.php
+++ /dev/null
@@ -1,399 +0,0 @@
-<?php
-
-/**
- * Prime Finite Fields
- *
- * PHP version 5 and 7
- *
- * @category Math
- * @package BigInteger
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2017 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- */
-
-namespace phpseclib3\Math\PrimeField;
-
-use phpseclib3\Math\Common\FiniteField\Integer as Base;
-use phpseclib3\Math\BigInteger;
-use ParagonIE\ConstantTime\Hex;
-
-/**
- * Prime Finite Fields
- *
- * @package Math
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-class Integer extends Base
-{
- /**
- * Holds the PrimeField's value
- *
- * @var \phpseclib3\Math\BigInteger
- */
- protected $value;
-
- /**
- * Keeps track of current instance
- *
- * @var int
- */
- protected $instanceID;
-
- /**
- * Holds the PrimeField's modulo
- *
- * @var \phpseclib3\Math\BigInteger
- */
- protected static $modulo;
-
- /**
- * Holds a pre-generated function to perform modulo reductions
- *
- * @var Callable
- */
- protected static $reduce;
-
- /**
- * Zero
- *
- * @var \phpseclib3\Math\BigInteger
- */
- protected static $zero;
-
- /**
- * Default constructor
- */
- public function __construct($instanceID, BigInteger $num = null)
- {
- $this->instanceID = $instanceID;
- if (!isset($num)) {
- $this->value = clone static::$zero;
- } else {
- $reduce = static::$reduce[$instanceID];
- $this->value = $reduce($num);
- }
- }
-
- /**
- * Set the modulo for a given instance
- */
- public static function setModulo($instanceID, BigInteger $modulo)
- {
- static::$modulo[$instanceID] = $modulo;
- }
-
- /**
- * Set the modulo for a given instance
- */
- public static function setRecurringModuloFunction($instanceID, callable $function)
- {
- static::$reduce[$instanceID] = $function;
- if (!isset(static::$zero)) {
- static::$zero = new BigInteger();
- }
- }
-
- /**
- * Returns the modulo
- *
- * @return integer
- */
- public static function getModulo($instanceID)
- {
- return static::$modulo[$instanceID];
- }
-
- /**
- * Tests a parameter to see if it's of the right instance
- *
- * Throws an exception if the incorrect class is being utilized
- */
- public static function checkInstance(self $x, self $y)
- {
- if ($x->instanceID != $y->instanceID) {
- throw new \UnexpectedValueException('The instances of the two PrimeField\Integer objects do not match');
- }
- }
-
- /**
- * Tests the equality of two numbers.
- *
- * @return bool
- */
- public function equals(self $x)
- {
- static::checkInstance($this, $x);
-
- return $this->value->equals($x->value);
- }
-
- /**
- * Compares two numbers.
- *
- * @return int
- */
- public function compare(self $x)
- {
- static::checkInstance($this, $x);
-
- return $this->value->compare($x->value);
- }
-
- /**
- * Adds two PrimeFieldIntegers.
- *
- * @return static
- */
- public function add(self $x)
- {
- static::checkInstance($this, $x);
-
- $temp = new static($this->instanceID);
- $temp->value = $this->value->add($x->value);
- if ($temp->value->compare(static::$modulo[$this->instanceID]) >= 0) {
- $temp->value = $temp->value->subtract(static::$modulo[$this->instanceID]);
- }
-
- return $temp;
- }
-
- /**
- * Subtracts two PrimeFieldIntegers.
- *
- * @return static
- */
- public function subtract(self $x)
- {
- static::checkInstance($this, $x);
-
- $temp = new static($this->instanceID);
- $temp->value = $this->value->subtract($x->value);
- if ($temp->value->isNegative()) {
- $temp->value = $temp->value->add(static::$modulo[$this->instanceID]);
- }
-
- return $temp;
- }
-
- /**
- * Multiplies two PrimeFieldIntegers.
- *
- * @return static
- */
- public function multiply(self $x)
- {
- static::checkInstance($this, $x);
-
- return new static($this->instanceID, $this->value->multiply($x->value));
- }
-
- /**
- * Divides two PrimeFieldIntegers.
- *
- * @return static
- */
- public function divide(self $x)
- {
- static::checkInstance($this, $x);
-
- $denominator = $x->value->modInverse(static::$modulo[$this->instanceID]);
- return new static($this->instanceID, $this->value->multiply($denominator));
- }
-
- /**
- * Performs power operation on a PrimeFieldInteger.
- *
- * @return static
- */
- public function pow(BigInteger $x)
- {
- $temp = new static($this->instanceID);
- $temp->value = $this->value->powMod($x, static::$modulo[$this->instanceID]);
-
- return $temp;
- }
-
- /**
- * Calculates the square root
- *
- * @link https://en.wikipedia.org/wiki/Tonelli%E2%80%93Shanks_algorithm
- * @return static|false
- */
- public function squareRoot()
- {
- static $one, $two;
- if (!isset($one)) {
- $one = new BigInteger(1);
- $two = new BigInteger(2);
- }
- $reduce = static::$reduce[$this->instanceID];
- $p_1 = static::$modulo[$this->instanceID]->subtract($one);
- $q = clone $p_1;
- $s = BigInteger::scan1divide($q);
- list($pow) = $p_1->divide($two);
- for ($z = $one; !$z->equals(static::$modulo[$this->instanceID]); $z = $z->add($one)) {
- $temp = $z->powMod($pow, static::$modulo[$this->instanceID]);
- if ($temp->equals($p_1)) {
- break;
- }
- }
-
- $m = new BigInteger($s);
- $c = $z->powMod($q, static::$modulo[$this->instanceID]);
- $t = $this->value->powMod($q, static::$modulo[$this->instanceID]);
- list($temp) = $q->add($one)->divide($two);
- $r = $this->value->powMod($temp, static::$modulo[$this->instanceID]);
-
- while (!$t->equals($one)) {
- $i = clone $one;
-
- while (!$t->powMod($two->pow($i), static::$modulo[$this->instanceID])->equals($one)) {
- $i = $i->add($one);
- }
-
- if ($i->compare($m) >= 0) {
- return false;
- }
- $b = $c->powMod($two->pow($m->subtract($i)->subtract($one)), static::$modulo[$this->instanceID]);
- $m = $i;
- $c = $reduce($b->multiply($b));
- $t = $reduce($t->multiply($c));
- $r = $reduce($r->multiply($b));
- }
-
- return new static($this->instanceID, $r);
- }
-
- /**
- * Is Odd?
- *
- * @return boolean
- */
- public function isOdd()
- {
- return $this->value->isOdd();
- }
-
- /**
- * Negate
- *
- * A negative number can be written as 0-12. With modulos, 0 is the same thing as the modulo
- * so 0-12 is the same thing as modulo-12
- *
- * @return object
- */
- public function negate()
- {
- return new static($this->instanceID, static::$modulo[$this->instanceID]->subtract($this->value));
- }
-
- /**
- * Converts an Integer to a byte string (eg. base-256).
- *
- * @return string
- */
- public function toBytes()
- {
- $length = static::$modulo[$this->instanceID]->getLengthInBytes();
- return str_pad($this->value->toBytes(), $length, "\0", STR_PAD_LEFT);
- }
-
- /**
- * Converts an Integer to a hex string (eg. base-16).
- *
- * @return string
- */
- public function toHex()
- {
- return Hex::encode($this->toBytes());
- }
-
- /**
- * Converts an Integer to a bit string (eg. base-2).
- *
- * @return string
- */
- public function toBits()
- {
- // return $this->value->toBits();
- static $length;
- if (!isset($length)) {
- $length = static::$modulo[$this->instanceID]->getLength();
- }
-
- return str_pad($this->value->toBits(), $length, '0', STR_PAD_LEFT);
- }
-
- /**
- * Returns the w-ary non-adjacent form (wNAF)
- *
- * @param int $w optional
- * @return int[]
- */
- public function getNAF($w = 1)
- {
- $w++;
-
- $mask = new BigInteger((1 << $w) - 1);
- $sub = new BigInteger(1 << $w);
- //$sub = new BigInteger(1 << ($w - 1));
- $d = $this->toBigInteger();
- $d_i = [];
-
- $i = 0;
- while ($d->compare(static::$zero) > 0) {
- if ($d->isOdd()) {
- // start mods
- $d_i[$i] = $d->testBit($w - 1) ?
- $d->bitwise_and($mask)->subtract($sub) :
- //$sub->subtract($d->bitwise_and($mask)) :
- $d->bitwise_and($mask);
- // end mods
- $d = $d->subtract($d_i[$i]);
- $d_i[$i] = (int) $d_i[$i]->toString();
- } else {
- $d_i[$i] = 0;
- }
- $shift = !$d->equals(static::$zero) && $d->bitwise_and($mask)->equals(static::$zero) ? $w : 1; // $w or $w + 1?
- $d = $d->bitwise_rightShift($shift);
- while (--$shift > 0) {
- $d_i[++$i] = 0;
- }
- $i++;
- }
-
- return $d_i;
- }
-
- /**
- * Converts an Integer to a BigInteger
- *
- * @return string
- */
- public function toBigInteger()
- {
- return clone $this->value;
- }
-
- /**
- * __toString() magic method
- *
- * @access public
- */
- public function __toString()
- {
- return (string) $this->value;
- }
-
- /**
- * __debugInfo() magic method
- *
- * @access public
- */
- public function __debugInfo()
- {
- return ['value' => $this->toHex()];
- }
-} \ No newline at end of file
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Net/SFTP.php b/vendor/phpseclib/phpseclib/phpseclib/Net/SFTP.php
index c04fe7e68..8ae43fa04 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Net/SFTP.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Net/SFTP.php
@@ -16,7 +16,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $sftp = new \phpseclib3\Net\SFTP('www.domain.tld');
+ * $sftp = new \phpseclib\Net\SFTP('www.domain.tld');
* if (!$sftp->login('username', 'password')) {
* exit('Login Failed');
* }
@@ -35,11 +35,7 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Net;
-
-use ParagonIE\ConstantTime\Hex;
-use phpseclib3\Exception\FileNotFoundException;
-use phpseclib3\Common\Functions\Strings;
+namespace phpseclib\Net;
/**
* Pure-PHP implementations of SFTP.
@@ -53,51 +49,41 @@ class SFTP extends SSH2
/**
* SFTP channel constant
*
- * \phpseclib3\Net\SSH2::exec() uses 0 and \phpseclib3\Net\SSH2::read() / \phpseclib3\Net\SSH2::write() use 1.
+ * \phpseclib\Net\SSH2::exec() uses 0 and \phpseclib\Net\SSH2::read() / \phpseclib\Net\SSH2::write() use 1.
*
- * @see \phpseclib3\Net\SSH2::send_channel_packet()
- * @see \phpseclib3\Net\SSH2::get_channel_packet()
+ * @see \phpseclib\Net\SSH2::_send_channel_packet()
+ * @see \phpseclib\Net\SSH2::_get_channel_packet()
* @access private
*/
const CHANNEL = 0x100;
+ /**#@+
+ * @access public
+ * @see \phpseclib\Net\SFTP::put()
+ */
/**
* Reads data from a local file.
- *
- * @access public
- * @see \phpseclib3\Net\SFTP::put()
*/
const SOURCE_LOCAL_FILE = 1;
/**
* Reads data from a string.
- *
- * @access public
- * @see \phpseclib3\Net\SFTP::put()
*/
// this value isn't really used anymore but i'm keeping it reserved for historical reasons
const SOURCE_STRING = 2;
/**
* Reads data from callback:
* function callback($length) returns string to proceed, null for EOF
- *
- * @access public
- * @see \phpseclib3\Net\SFTP::put()
*/
const SOURCE_CALLBACK = 16;
/**
* Resumes an upload
- *
- * @access public
- * @see \phpseclib3\Net\SFTP::put()
*/
const RESUME = 4;
/**
* Append a local file to an already existing remote file
- *
- * @access public
- * @see \phpseclib3\Net\SFTP::put()
*/
const RESUME_START = 8;
+ /**#@-*/
/**
* Packet Types
@@ -106,7 +92,7 @@ class SFTP extends SSH2
* @var array
* @access private
*/
- private $packet_types = [];
+ var $packet_types = array();
/**
* Status Codes
@@ -115,7 +101,7 @@ class SFTP extends SSH2
* @var array
* @access private
*/
- private $status_codes = [];
+ var $status_codes = array();
/**
* The Request ID
@@ -127,7 +113,7 @@ class SFTP extends SSH2
* @see self::_send_sftp_packet()
* @access private
*/
- private $use_request_id = false;
+ var $use_request_id = false;
/**
* The Packet Type
@@ -139,7 +125,7 @@ class SFTP extends SSH2
* @see self::_get_sftp_packet()
* @access private
*/
- private $packet_type = -1;
+ var $packet_type = -1;
/**
* Packet Buffer
@@ -148,7 +134,7 @@ class SFTP extends SSH2
* @see self::_get_sftp_packet()
* @access private
*/
- private $packet_buffer = '';
+ var $packet_buffer = '';
/**
* Extensions supported by the server
@@ -157,7 +143,7 @@ class SFTP extends SSH2
* @see self::_initChannel()
* @access private
*/
- private $extensions = [];
+ var $extensions = array();
/**
* Server SFTP version
@@ -166,7 +152,7 @@ class SFTP extends SSH2
* @see self::_initChannel()
* @access private
*/
- private $version;
+ var $version;
/**
* Current working directory
@@ -176,7 +162,7 @@ class SFTP extends SSH2
* @see self::chdir()
* @access private
*/
- private $pwd = false;
+ var $pwd = false;
/**
* Packet Type Log
@@ -185,7 +171,7 @@ class SFTP extends SSH2
* @var array
* @access private
*/
- private $packet_type_log = [];
+ var $packet_type_log = array();
/**
* Packet Log
@@ -194,7 +180,7 @@ class SFTP extends SSH2
* @var array
* @access private
*/
- private $packet_log = [];
+ var $packet_log = array();
/**
* Error information
@@ -204,7 +190,7 @@ class SFTP extends SSH2
* @var array
* @access private
*/
- private $sftp_errors = [];
+ var $sftp_errors = array();
/**
* Stat Cache
@@ -218,7 +204,7 @@ class SFTP extends SSH2
* @var array
* @access private
*/
- private $stat_cache = [];
+ var $stat_cache = array();
/**
* Max SFTP Packet Size
@@ -228,7 +214,7 @@ class SFTP extends SSH2
* @var array
* @access private
*/
- private $max_sftp_packet;
+ var $max_sftp_packet;
/**
* Stat Cache Flag
@@ -238,7 +224,7 @@ class SFTP extends SSH2
* @var bool
* @access private
*/
- private $use_stat_cache = true;
+ var $use_stat_cache = true;
/**
* Sort Options
@@ -248,7 +234,7 @@ class SFTP extends SSH2
* @var array
* @access private
*/
- protected $sortOptions = [];
+ var $sortOptions = array();
/**
* Canonicalization Flag
@@ -262,7 +248,7 @@ class SFTP extends SSH2
* @var bool
* @access private
*/
- private $canonicalize_paths = true;
+ var $canonicalize_paths = true;
/**
* Request Buffers
@@ -291,16 +277,16 @@ class SFTP extends SSH2
* @param string $host
* @param int $port
* @param int $timeout
- * @return \phpseclib3\Net\SFTP
+ * @return \phpseclib\Net\SFTP
* @access public
*/
- public function __construct($host, $port = 22, $timeout = 10)
+ function __construct($host, $port = 22, $timeout = 10)
{
parent::__construct($host, $port, $timeout);
$this->max_sftp_packet = 1 << 15;
- $this->packet_types = [
+ $this->packet_types = array(
1 => 'NET_SFTP_INIT',
2 => 'NET_SFTP_VERSION',
/* the format of SSH_FXP_OPEN changed between SFTPv4 and SFTPv5+:
@@ -336,8 +322,8 @@ class SFTP extends SSH2
105=> 'NET_SFTP_ATTRS',
200=> 'NET_SFTP_EXTENDED'
- ];
- $this->status_codes = [
+ );
+ $this->status_codes = array(
0 => 'NET_SFTP_STATUS_OK',
1 => 'NET_SFTP_STATUS_EOF',
2 => 'NET_SFTP_STATUS_NO_SUCH_FILE',
@@ -370,10 +356,10 @@ class SFTP extends SSH2
29 => 'NET_SFTP_STATUS_OWNER_INVALID',
30 => 'NET_SFTP_STATUS_GROUP_INVALID',
31 => 'NET_SFTP_STATUS_NO_MATCHING_BYTE_RANGE_LOCK'
- ];
+ );
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-7.1
- // the order, in this case, matters quite a lot - see \phpseclib3\Net\SFTP::_parseAttributes() to understand why
- $this->attributes = [
+ // the order, in this case, matters quite a lot - see \phpseclib\Net\SFTP::_parseAttributes() to understand why
+ $this->attributes = array(
0x00000001 => 'NET_SFTP_ATTR_SIZE',
0x00000002 => 'NET_SFTP_ATTR_UIDGID', // defined in SFTPv3, removed in SFTPv4+
0x00000004 => 'NET_SFTP_ATTR_PERMISSIONS',
@@ -383,34 +369,34 @@ class SFTP extends SSH2
// two's compliment, consists of all 1 bits) by 31. on 64-bit systems this'll yield 0xFFFFFFFF80000000.
// that's not a problem, however, and 'anded' and a 32-bit number, as all the leading 1 bits are ignored.
(-1 << 31) & 0xFFFFFFFF => 'NET_SFTP_ATTR_EXTENDED'
- ];
+ );
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-04#section-6.3
// the flag definitions change somewhat in SFTPv5+. if SFTPv5+ support is added to this library, maybe name
// the array for that $this->open5_flags and similarly alter the constant names.
- $this->open_flags = [
+ $this->open_flags = array(
0x00000001 => 'NET_SFTP_OPEN_READ',
0x00000002 => 'NET_SFTP_OPEN_WRITE',
0x00000004 => 'NET_SFTP_OPEN_APPEND',
0x00000008 => 'NET_SFTP_OPEN_CREATE',
0x00000010 => 'NET_SFTP_OPEN_TRUNCATE',
0x00000020 => 'NET_SFTP_OPEN_EXCL'
- ];
+ );
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-04#section-5.2
- // see \phpseclib3\Net\SFTP::_parseLongname() for an explanation
- $this->file_types = [
+ // see \phpseclib\Net\SFTP::_parseLongname() for an explanation
+ $this->file_types = array(
1 => 'NET_SFTP_TYPE_REGULAR',
2 => 'NET_SFTP_TYPE_DIRECTORY',
3 => 'NET_SFTP_TYPE_SYMLINK',
4 => 'NET_SFTP_TYPE_SPECIAL',
5 => 'NET_SFTP_TYPE_UNKNOWN',
- // the following types were first defined for use in SFTPv5+
+ // the followin types were first defined for use in SFTPv5+
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-05#section-5.2
6 => 'NET_SFTP_TYPE_SOCKET',
7 => 'NET_SFTP_TYPE_CHAR_DEVICE',
8 => 'NET_SFTP_TYPE_BLOCK_DEVICE',
9 => 'NET_SFTP_TYPE_FIFO'
- ];
- $this->define_array(
+ );
+ $this->_define_array(
$this->packet_types,
$this->status_codes,
$this->attributes,
@@ -430,50 +416,55 @@ class SFTP extends SSH2
* Login
*
* @param string $username
- * @param string[] ...$args
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return bool
* @access public
*/
- public function login($username, ...$args)
+ function login($username)
{
- if (!parent::login(...func_get_args())) {
+ if (!call_user_func_array('parent::login', func_get_args())) {
return false;
}
$this->window_size_server_to_client[self::CHANNEL] = $this->window_size;
- $packet = Strings::packSSH2(
- 'CsN3',
+ $packet = pack(
+ 'CNa*N3',
NET_SSH2_MSG_CHANNEL_OPEN,
+ strlen('session'),
'session',
self::CHANNEL,
$this->window_size,
0x4000
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL] = NET_SSH2_MSG_CHANNEL_OPEN;
- $response = $this->get_channel_packet(self::CHANNEL, true);
+ $response = $this->_get_channel_packet(self::CHANNEL, true);
if ($response === false) {
return false;
}
- $packet = Strings::packSSH2(
- 'CNsbs',
+ $packet = pack(
+ 'CNNa*CNa*',
NET_SSH2_MSG_CHANNEL_REQUEST,
$this->server_channels[self::CHANNEL],
+ strlen('subsystem'),
'subsystem',
- true,
+ 1,
+ strlen('sftp'),
'sftp'
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL] = NET_SSH2_MSG_CHANNEL_REQUEST;
- $response = $this->get_channel_packet(self::CHANNEL, true);
+ $response = $this->_get_channel_packet(self::CHANNEL, true);
if ($response === false) {
// from PuTTY's psftp.exe
$command = "test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server\n" .
@@ -481,19 +472,23 @@ class SFTP extends SSH2
"exec sftp-server";
// we don't do $this->exec($command, false) because exec() operates on a different channel and plus the SSH_MSG_CHANNEL_OPEN that exec() does
// is redundant
- $packet = Strings::packSSH2(
- 'CNsCs',
+ $packet = pack(
+ 'CNNa*CNa*',
NET_SSH2_MSG_CHANNEL_REQUEST,
$this->server_channels[self::CHANNEL],
+ strlen('exec'),
'exec',
1,
+ strlen($command),
$command
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL] = NET_SSH2_MSG_CHANNEL_REQUEST;
- $response = $this->get_channel_packet(self::CHANNEL, true);
+ $response = $this->_get_channel_packet(self::CHANNEL, true);
if ($response === false) {
return false;
}
@@ -501,19 +496,32 @@ class SFTP extends SSH2
$this->channel_status[self::CHANNEL] = NET_SSH2_MSG_CHANNEL_DATA;
- if (!$this->send_sftp_packet(NET_SFTP_INIT, "\0\0\0\3")) {
+ if (!$this->_send_sftp_packet(NET_SFTP_INIT, "\0\0\0\3")) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_VERSION) {
- throw new \UnexpectedValueException('Expected NET_SFTP_VERSION. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_VERSION');
+ return false;
}
- list($this->version) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nversion', $this->_string_shift($response, 4)));
+ $this->version = $version;
while (!empty($response)) {
- list($key, $value) = Strings::unpackSSH2('ss', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $key = $this->_string_shift($response, $length);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $value = $this->_string_shift($response, $length);
$this->extensions[$key] = $value;
}
@@ -553,7 +561,7 @@ class SFTP extends SSH2
So what do you do if you have a client whose initial SSH_FXP_INIT packet says it implements v3 and
a server whose initial SSH_FXP_VERSION reply says it implements v4 and only v4? If it only implements
v4, the "versions" extension is likely not going to have been sent so version re-negotiation as discussed
- in draft-ietf-secsh-filexfer-13 would be quite impossible. As such, what \phpseclib3\Net\SFTP would do is close the
+ in draft-ietf-secsh-filexfer-13 would be quite impossible. As such, what \phpseclib\Net\SFTP would do is close the
channel and reopen it with a new and updated SSH_FXP_INIT packet.
*/
switch ($this->version) {
@@ -564,9 +572,9 @@ class SFTP extends SSH2
return false;
}
- $this->pwd = $this->realpath('.');
+ $this->pwd = $this->_realpath('.');
- $this->update_stat_cache($this->pwd, []);
+ $this->_update_stat_cache($this->pwd, array());
return true;
}
@@ -586,7 +594,7 @@ class SFTP extends SSH2
*
* @access public
*/
- public function enableStatCache()
+ function enableStatCache()
{
$this->use_stat_cache = true;
}
@@ -596,9 +604,9 @@ class SFTP extends SSH2
*
* @access public
*/
- public function clearStatCache()
+ function clearStatCache()
{
- $this->stat_cache = [];
+ $this->stat_cache = array();
}
/**
@@ -606,7 +614,7 @@ class SFTP extends SSH2
*
* @access public
*/
- public function enablePathCanonicalization()
+ function enablePathCanonicalization()
{
$this->canonicalize_paths = true;
}
@@ -616,7 +624,7 @@ class SFTP extends SSH2
*
* @access public
*/
- public function disablePathCanonicalization()
+ function disablePathCanonicalization()
{
$this->canonicalize_paths = false;
}
@@ -627,7 +635,7 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function pwd()
+ function pwd()
{
return $this->pwd;
}
@@ -637,25 +645,43 @@ class SFTP extends SSH2
*
* @param string $response
* @param int $status
- * @access private
+ * @access public
*/
- private function logError($response, $status = -1)
+ function _logError($response, $status = -1)
{
if ($status == -1) {
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
}
- list($error) = $this->status_codes[$status];
+ $error = $this->status_codes[$status];
- if ($this->version > 2) {
- list($message) = Strings::unpackSSH2('s', $response);
- $this->sftp_errors[] = "$error: $message";
+ if ($this->version > 2 || strlen($response) < 4) {
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $this->sftp_errors[] = $error . ': ' . $this->_string_shift($response, $length);
} else {
$this->sftp_errors[] = $error;
}
}
/**
+ * Returns canonicalized absolute pathname
+ *
+ * realpath() expands all symbolic links and resolves references to '/./', '/../' and extra '/' characters in the input
+ * path and returns the canonicalized absolute pathname.
+ *
+ * @param string $path
+ * @return mixed
+ * @access public
+ */
+ function realpath($path)
+ {
+ return $this->_realpath($path);
+ }
+
+ /**
* Canonicalize the Server-Side Path Name
*
* SFTP doesn't provide a mechanism by which the current working directory can be changed, so we'll emulate it. Returns
@@ -666,11 +692,10 @@ class SFTP extends SSH2
* @see self::chdir()
* @see self::disablePathCanonicalization()
* @param string $path
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return mixed
- * @access public
+ * @access private
*/
- public function realpath($path)
+ function _realpath($path)
{
if (!$this->canonicalize_paths) {
return $path;
@@ -678,24 +703,28 @@ class SFTP extends SSH2
if ($this->pwd === false) {
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.9
- if (!$this->send_sftp_packet(NET_SFTP_REALPATH, Strings::packSSH2('s', $path))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_REALPATH, pack('Na*', strlen($path), $path))) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_NAME:
// although SSH_FXP_NAME is implemented differently in SFTPv3 than it is in SFTPv4+, the following
// should work on all SFTP versions since the only part of the SSH_FXP_NAME packet the following looks
// at is the first part and that part is defined the same in SFTP versions 3 through 6.
- list(, $filename) = Strings::unpackSSH2('Ns', $response);
- return $filename;
+ $this->_string_shift($response, 4); // skip over the count - it should be 1, anyway
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ return $this->_string_shift($response, $length);
case NET_SFTP_STATUS:
- $this->logError($response);
+ $this->_logError($response);
return false;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_NAME or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_NAME or SSH_FXP_STATUS');
+ return false;
}
}
@@ -704,7 +733,7 @@ class SFTP extends SSH2
}
$path = explode('/', $path);
- $new = [];
+ $new = array();
foreach ($path as $dir) {
if (!strlen($dir)) {
continue;
@@ -726,11 +755,10 @@ class SFTP extends SSH2
* Changes the current directory
*
* @param string $dir
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return bool
* @access public
*/
- public function chdir($dir)
+ function chdir($dir)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
@@ -744,10 +772,10 @@ class SFTP extends SSH2
$dir.= '/';
}
- $dir = $this->realpath($dir);
+ $dir = $this->_realpath($dir);
// confirm that $dir is, in fact, a valid directory
- if ($this->use_stat_cache && is_array($this->query_stat_cache($dir))) {
+ if ($this->use_stat_cache && is_array($this->_query_stat_cache($dir))) {
$this->pwd = $dir;
return true;
}
@@ -757,29 +785,29 @@ class SFTP extends SSH2
// the file's uid / gid match the currently logged in user's uid / gid but how there's no easy
// way to get those with SFTP
- if (!$this->send_sftp_packet(NET_SFTP_OPENDIR, Strings::packSSH2('s', $dir))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_OPENDIR, pack('Na*', strlen($dir), $dir))) {
return false;
}
- // see \phpseclib3\Net\SFTP::nlist() for a more thorough explanation of the following
- $response = $this->get_sftp_packet();
+ // see \phpseclib\Net\SFTP::nlist() for a more thorough explanation of the following
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_HANDLE:
$handle = substr($response, 4);
break;
case NET_SFTP_STATUS:
- $this->logError($response);
+ $this->_logError($response);
return false;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_HANDLE or NET_SFTP_STATUS' .
- 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_HANDLE or SSH_FXP_STATUS');
+ return false;
}
- if (!$this->close_handle($handle)) {
+ if (!$this->_close_handle($handle)) {
return false;
}
- $this->update_stat_cache($dir, []);
+ $this->_update_stat_cache($dir, array());
$this->pwd = $dir;
return true;
@@ -793,9 +821,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function nlist($dir = '.', $recursive = false)
+ function nlist($dir = '.', $recursive = false)
{
- return $this->nlist_helper($dir, $recursive, '');
+ return $this->_nlist_helper($dir, $recursive, '');
}
/**
@@ -807,23 +835,25 @@ class SFTP extends SSH2
* @return mixed
* @access private
*/
- private function nlist_helper($dir, $recursive, $relativeDir)
+ function _nlist_helper($dir, $recursive, $relativeDir)
{
- $files = $this->readlist($dir, false);
+ $files = $this->_list($dir, false);
if (!$recursive || $files === false) {
return $files;
}
- $result = [];
+ $result = array();
foreach ($files as $value) {
if ($value == '.' || $value == '..') {
- $result[] = $relativeDir . $value;
+ if ($relativeDir == '') {
+ $result[] = $value;
+ }
continue;
}
- if (is_array($this->query_stat_cache($this->realpath($dir . '/' . $value)))) {
- $temp = $this->nlist_helper($dir . '/' . $value, true, $relativeDir . $value . '/');
- $temp = is_array($temp) ? $temp : [];
+ if (is_array($this->_query_stat_cache($this->_realpath($dir . '/' . $value)))) {
+ $temp = $this->_nlist_helper($dir . '/' . $value, true, $relativeDir . $value . '/');
+ $temp = is_array($temp) ? $temp : array();
$result = array_merge($result, $temp);
} else {
$result[] = $relativeDir . $value;
@@ -841,9 +871,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function rawlist($dir = '.', $recursive = false)
+ function rawlist($dir = '.', $recursive = false)
{
- $files = $this->readlist($dir, true);
+ $files = $this->_list($dir, true);
if (!$recursive || $files === false) {
return $files;
}
@@ -858,7 +888,7 @@ class SFTP extends SSH2
$is_directory = false;
if ($key != '.' && $key != '..') {
if ($this->use_stat_cache) {
- $is_directory = is_array($this->query_stat_cache($this->realpath($dir . '/' . $key)));
+ $is_directory = is_array($this->_query_stat_cache($this->_realpath($dir . '/' . $key)));
} else {
$stat = $this->lstat($dir . '/' . $key);
$is_directory = $stat && $stat['type'] === NET_SFTP_TYPE_DIRECTORY;
@@ -883,26 +913,25 @@ class SFTP extends SSH2
* @param string $dir
* @param bool $raw
* @return mixed
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @access private
*/
- private function readlist($dir, $raw = true)
+ function _list($dir, $raw = true)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $dir = $this->realpath($dir . '/');
+ $dir = $this->_realpath($dir . '/');
if ($dir === false) {
return false;
}
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.1.2
- if (!$this->send_sftp_packet(NET_SFTP_OPENDIR, Strings::packSSH2('s', $dir))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_OPENDIR, pack('Na*', strlen($dir), $dir))) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_HANDLE:
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-9.2
@@ -912,72 +941,87 @@ class SFTP extends SSH2
break;
case NET_SFTP_STATUS:
// presumably SSH_FX_NO_SUCH_FILE or SSH_FX_PERMISSION_DENIED
- $this->logError($response);
+ $this->_logError($response);
return false;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_HANDLE or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_HANDLE or SSH_FXP_STATUS');
+ return false;
}
- $this->update_stat_cache($dir, []);
+ $this->_update_stat_cache($dir, array());
- $contents = [];
+ $contents = array();
while (true) {
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.2.2
// why multiple SSH_FXP_READDIR packets would be sent when the response to a single one can span arbitrarily many
// SSH_MSG_CHANNEL_DATA messages is not known to me.
- if (!$this->send_sftp_packet(NET_SFTP_READDIR, Strings::packSSH2('s', $handle))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_READDIR, pack('Na*', strlen($handle), $handle))) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_NAME:
- list($count) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Ncount', $this->_string_shift($response, 4)));
for ($i = 0; $i < $count; $i++) {
- list($shortname, $longname) = Strings::unpackSSH2('ss', $response);
- $attributes = $this->parseAttributes($response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $shortname = $this->_string_shift($response, $length);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $longname = $this->_string_shift($response, $length);
+ $attributes = $this->_parseAttributes($response);
if (!isset($attributes['type'])) {
- $fileType = $this->parseLongname($longname);
+ $fileType = $this->_parseLongname($longname);
if ($fileType) {
$attributes['type'] = $fileType;
}
}
- $contents[$shortname] = $attributes + ['filename' => $shortname];
+ $contents[$shortname] = $attributes + array('filename' => $shortname);
if (isset($attributes['type']) && $attributes['type'] == NET_SFTP_TYPE_DIRECTORY && ($shortname != '.' && $shortname != '..')) {
- $this->update_stat_cache($dir . '/' . $shortname, []);
+ $this->_update_stat_cache($dir . '/' . $shortname, array());
} else {
if ($shortname == '..') {
- $temp = $this->realpath($dir . '/..') . '/.';
+ $temp = $this->_realpath($dir . '/..') . '/.';
} else {
$temp = $dir . '/' . $shortname;
}
- $this->update_stat_cache($temp, (object) ['lstat' => $attributes]);
+ $this->_update_stat_cache($temp, (object) array('lstat' => $attributes));
}
// SFTPv6 has an optional boolean end-of-list field, but we'll ignore that, since the
// final SSH_FXP_STATUS packet should tell us that, already.
}
break;
case NET_SFTP_STATUS:
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_EOF) {
- $this->logError($response, $status);
+ $this->_logError($response, $status);
return false;
}
break 2;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_NAME or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_NAME or SSH_FXP_STATUS');
+ return false;
}
}
- if (!$this->close_handle($handle)) {
+ if (!$this->_close_handle($handle)) {
return false;
}
if (count($this->sortOptions)) {
- uasort($contents, [&$this, 'comparator']);
+ uasort($contents, array(&$this, '_comparator'));
}
return $raw ? $contents : array_keys($contents);
@@ -993,7 +1037,7 @@ class SFTP extends SSH2
* @return int
* @access private
*/
- private function comparator($a, $b)
+ function _comparator($a, $b)
{
switch (true) {
case $a['filename'] === '.' || $b['filename'] === '.':
@@ -1034,6 +1078,7 @@ class SFTP extends SSH2
return $order === SORT_DESC ? -$result : $result;
}
break;
+ case 'permissions':
case 'mode':
$a[$sort]&= 07777;
$b[$sort]&= 07777;
@@ -1064,12 +1109,12 @@ class SFTP extends SSH2
* $sftp->setListOrder();
* Don't do any sort of sorting
*
- * @param string[] ...$args
* @access public
*/
- public function setListOrder(...$args)
+ function setListOrder()
{
- $this->sortOptions = [];
+ $this->sortOptions = array();
+ $args = func_get_args();
if (empty($args)) {
return;
}
@@ -1078,18 +1123,40 @@ class SFTP extends SSH2
$this->sortOptions[$args[$i]] = $args[$i + 1];
}
if (!count($this->sortOptions)) {
- $this->sortOptions = ['bogus' => true];
+ $this->sortOptions = array('bogus' => true);
}
}
/**
+ * Returns the file size, in bytes, or false, on failure
+ *
+ * Files larger than 4GB will show up as being exactly 4GB.
+ *
+ * @param string $filename
+ * @return mixed
+ * @access public
+ */
+ function size($filename)
+ {
+ if (!($this->bitmap & SSH2::MASK_LOGIN)) {
+ return false;
+ }
+
+ $result = $this->stat($filename);
+ if ($result === false) {
+ return false;
+ }
+ return isset($result['size']) ? $result['size'] : -1;
+ }
+
+ /**
* Save files / directories to cache
*
* @param string $path
* @param mixed $value
* @access private
*/
- private function update_stat_cache($path, $value)
+ function _update_stat_cache($path, $value)
{
if ($this->use_stat_cache === false) {
return;
@@ -1105,10 +1172,10 @@ class SFTP extends SSH2
// 1. a file was deleted and changed to a directory behind phpseclib's back
// 2. it's a symlink. when lstat is done it's unclear what it's a symlink to
if (is_object($temp)) {
- $temp = [];
+ $temp = array();
}
if (!isset($temp[$dir])) {
- $temp[$dir] = [];
+ $temp[$dir] = array();
}
if ($i === $max) {
if (is_object($temp[$dir]) && is_object($value)) {
@@ -1133,7 +1200,7 @@ class SFTP extends SSH2
* @return bool
* @access private
*/
- private function remove_from_stat_cache($path)
+ function _remove_from_stat_cache($path)
{
$dirs = explode('/', preg_replace('#^/|/(?=/)|/$#', '', $path));
@@ -1163,7 +1230,7 @@ class SFTP extends SSH2
* @return mixed
* @access private
*/
- private function query_stat_cache($path)
+ function _query_stat_cache($path)
{
$dirs = explode('/', preg_replace('#^/|/(?=/)|/$#', '', $path));
@@ -1189,19 +1256,19 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function stat($filename)
+ function stat($filename)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $filename = $this->realpath($filename);
+ $filename = $this->_realpath($filename);
if ($filename === false) {
return false;
}
if ($this->use_stat_cache) {
- $result = $this->query_stat_cache($filename);
+ $result = $this->_query_stat_cache($filename);
if (is_array($result) && isset($result['.']) && isset($result['.']->stat)) {
return $result['.']->stat;
}
@@ -1210,16 +1277,16 @@ class SFTP extends SSH2
}
}
- $stat = $this->stat_helper($filename, NET_SFTP_STAT);
+ $stat = $this->_stat($filename, NET_SFTP_STAT);
if ($stat === false) {
- $this->remove_from_stat_cache($filename);
+ $this->_remove_from_stat_cache($filename);
return false;
}
if (isset($stat['type'])) {
if ($stat['type'] == NET_SFTP_TYPE_DIRECTORY) {
$filename.= '/.';
}
- $this->update_stat_cache($filename, (object) ['stat' => $stat]);
+ $this->_update_stat_cache($filename, (object) array('stat' => $stat));
return $stat;
}
@@ -1232,7 +1299,7 @@ class SFTP extends SSH2
if ($stat['type'] == NET_SFTP_TYPE_DIRECTORY) {
$filename.= '/.';
}
- $this->update_stat_cache($filename, (object) ['stat' => $stat]);
+ $this->_update_stat_cache($filename, (object) array('stat' => $stat));
return $stat;
}
@@ -1246,19 +1313,19 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function lstat($filename)
+ function lstat($filename)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $filename = $this->realpath($filename);
+ $filename = $this->_realpath($filename);
if ($filename === false) {
return false;
}
if ($this->use_stat_cache) {
- $result = $this->query_stat_cache($filename);
+ $result = $this->_query_stat_cache($filename);
if (is_array($result) && isset($result['.']) && isset($result['.']->lstat)) {
return $result['.']->lstat;
}
@@ -1267,24 +1334,24 @@ class SFTP extends SSH2
}
}
- $lstat = $this->stat_helper($filename, NET_SFTP_LSTAT);
+ $lstat = $this->_stat($filename, NET_SFTP_LSTAT);
if ($lstat === false) {
- $this->remove_from_stat_cache($filename);
+ $this->_remove_from_stat_cache($filename);
return false;
}
if (isset($lstat['type'])) {
if ($lstat['type'] == NET_SFTP_TYPE_DIRECTORY) {
$filename.= '/.';
}
- $this->update_stat_cache($filename, (object) ['lstat' => $lstat]);
+ $this->_update_stat_cache($filename, (object) array('lstat' => $lstat));
return $lstat;
}
- $stat = $this->stat_helper($filename, NET_SFTP_STAT);
+ $stat = $this->_stat($filename, NET_SFTP_STAT);
if ($lstat != $stat) {
- $lstat = array_merge($lstat, ['type' => NET_SFTP_TYPE_SYMLINK]);
- $this->update_stat_cache($filename, (object) ['lstat' => $lstat]);
+ $lstat = array_merge($lstat, array('type' => NET_SFTP_TYPE_SYMLINK));
+ $this->_update_stat_cache($filename, (object) array('lstat' => $lstat));
return $stat;
}
@@ -1297,7 +1364,7 @@ class SFTP extends SSH2
if ($lstat['type'] == NET_SFTP_TYPE_DIRECTORY) {
$filename.= '/.';
}
- $this->update_stat_cache($filename, (object) ['lstat' => $lstat]);
+ $this->_update_stat_cache($filename, (object) array('lstat' => $lstat));
return $lstat;
}
@@ -1305,34 +1372,33 @@ class SFTP extends SSH2
/**
* Returns general information about a file or symbolic link
*
- * Determines information without calling \phpseclib3\Net\SFTP::realpath().
+ * Determines information without calling \phpseclib\Net\SFTP::realpath().
* The second parameter can be either NET_SFTP_STAT or NET_SFTP_LSTAT.
*
* @param string $filename
* @param int $type
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return mixed
* @access private
*/
- private function stat_helper($filename, $type)
+ function _stat($filename, $type)
{
// SFTPv4+ adds an additional 32-bit integer field - flags - to the following:
- $packet = Strings::packSSH2('s', $filename);
- if (!$this->send_sftp_packet($type, $packet)) {
+ $packet = pack('Na*', strlen($filename), $filename);
+ if (!$this->_send_sftp_packet($type, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_ATTRS:
- return $this->parseAttributes($response);
+ return $this->_parseAttributes($response);
case NET_SFTP_STATUS:
- $this->logError($response);
+ $this->_logError($response);
return false;
}
- throw new \UnexpectedValueException('Expected NET_SFTP_ATTRS or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_ATTRS or SSH_FXP_STATUS');
+ return false;
}
/**
@@ -1343,11 +1409,11 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function truncate($filename, $new_size)
+ function truncate($filename, $new_size)
{
$attr = pack('N3', NET_SFTP_ATTR_SIZE, $new_size / 4294967296, $new_size); // 4294967296 == 0x100000000 == 1<<32
- return $this->setstat($filename, $attr, false);
+ return $this->_setstat($filename, $attr, false);
}
/**
@@ -1358,17 +1424,16 @@ class SFTP extends SSH2
* @param string $filename
* @param int $time
* @param int $atime
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return bool
* @access public
*/
- public function touch($filename, $time = null, $atime = null)
+ function touch($filename, $time = null, $atime = null)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $filename = $this->realpath($filename);
+ $filename = $this->_realpath($filename);
if ($filename === false) {
return false;
}
@@ -1382,24 +1447,24 @@ class SFTP extends SSH2
$flags = NET_SFTP_OPEN_WRITE | NET_SFTP_OPEN_CREATE | NET_SFTP_OPEN_EXCL;
$attr = pack('N3', NET_SFTP_ATTR_ACCESSTIME, $time, $atime);
- $packet = Strings::packSSH2('sN', $filename, $flags) . $attr;
- if (!$this->send_sftp_packet(NET_SFTP_OPEN, $packet)) {
+ $packet = pack('Na*Na*', strlen($filename), $filename, $flags, $attr);
+ if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_HANDLE:
- return $this->close_handle(substr($response, 4));
+ return $this->_close_handle(substr($response, 4));
case NET_SFTP_STATUS:
- $this->logError($response);
+ $this->_logError($response);
break;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_HANDLE or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_HANDLE or SSH_FXP_STATUS');
+ return false;
}
- return $this->setstat($filename, $attr, false);
+ return $this->_setstat($filename, $attr, false);
}
/**
@@ -1413,13 +1478,13 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function chown($filename, $uid, $recursive = false)
+ function chown($filename, $uid, $recursive = false)
{
// quoting from <http://www.kernel.org/doc/man-pages/online/pages/man2/chown.2.html>,
// "if the owner or group is specified as -1, then that ID is not changed"
$attr = pack('N3', NET_SFTP_ATTR_UIDGID, $uid, -1);
- return $this->setstat($filename, $attr, $recursive);
+ return $this->_setstat($filename, $attr, $recursive);
}
/**
@@ -1433,11 +1498,11 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function chgrp($filename, $gid, $recursive = false)
+ function chgrp($filename, $gid, $recursive = false)
{
$attr = pack('N3', NET_SFTP_ATTR_UIDGID, -1, $gid);
- return $this->setstat($filename, $attr, $recursive);
+ return $this->_setstat($filename, $attr, $recursive);
}
/**
@@ -1449,11 +1514,10 @@ class SFTP extends SSH2
* @param int $mode
* @param string $filename
* @param bool $recursive
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return mixed
* @access public
*/
- public function chmod($mode, $filename, $recursive = false)
+ function chmod($mode, $filename, $recursive = false)
{
if (is_string($mode) && is_int($filename)) {
$temp = $mode;
@@ -1462,7 +1526,7 @@ class SFTP extends SSH2
}
$attr = pack('N2', NET_SFTP_ATTR_PERMISSIONS, $mode & 07777);
- if (!$this->setstat($filename, $attr, $recursive)) {
+ if (!$this->_setstat($filename, $attr, $recursive)) {
return false;
}
if ($recursive) {
@@ -1474,22 +1538,22 @@ class SFTP extends SSH2
// tell us if the file actually exists.
// incidentally, SFTPv4+ adds an additional 32-bit integer field - flags - to the following:
$packet = pack('Na*', strlen($filename), $filename);
- if (!$this->send_sftp_packet(NET_SFTP_STAT, $packet)) {
+ if (!$this->_send_sftp_packet(NET_SFTP_STAT, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_ATTRS:
- $attrs = $this->parseAttributes($response);
- return $attrs['mode'];
+ $attrs = $this->_parseAttributes($response);
+ return $attrs['permissions'];
case NET_SFTP_STATUS:
- $this->logError($response);
+ $this->_logError($response);
return false;
}
- throw new \UnexpectedValueException('Expected NET_SFTP_ATTRS or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_ATTRS or SSH_FXP_STATUS');
+ return false;
}
/**
@@ -1498,33 +1562,32 @@ class SFTP extends SSH2
* @param string $filename
* @param string $attr
* @param bool $recursive
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return bool
* @access private
*/
- private function setstat($filename, $attr, $recursive)
+ function _setstat($filename, $attr, $recursive)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $filename = $this->realpath($filename);
+ $filename = $this->_realpath($filename);
if ($filename === false) {
return false;
}
- $this->remove_from_stat_cache($filename);
+ $this->_remove_from_stat_cache($filename);
if ($recursive) {
$i = 0;
- $result = $this->setstat_recursive($filename, $attr, $i);
- $this->read_put_responses($i);
+ $result = $this->_setstat_recursive($filename, $attr, $i);
+ $this->_read_put_responses($i);
return $result;
}
// SFTPv4+ has an additional byte field - type - that would need to be sent, as well. setting it to
// SSH_FILEXFER_TYPE_UNKNOWN might work. if not, we'd have to do an SSH_FXP_STAT before doing an SSH_FXP_SETSTAT.
- if (!$this->send_sftp_packet(NET_SFTP_SETSTAT, Strings::packSSH2('s', $filename) . $attr)) {
+ if (!$this->_send_sftp_packet(NET_SFTP_SETSTAT, pack('Na*a*', strlen($filename), $filename, $attr))) {
return false;
}
@@ -1535,15 +1598,18 @@ class SFTP extends SSH2
-- http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.6
*/
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_STATUS) {
- throw new \UnexpectedValueException('Expected NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_STATUS');
+ return false;
}
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_OK) {
- $this->logError($response, $status);
+ $this->_logError($response, $status);
return false;
}
@@ -1561,16 +1627,16 @@ class SFTP extends SSH2
* @return bool
* @access private
*/
- private function setstat_recursive($path, $attr, &$i)
+ function _setstat_recursive($path, $attr, &$i)
{
- if (!$this->read_put_responses($i)) {
+ if (!$this->_read_put_responses($i)) {
return false;
}
$i = 0;
- $entries = $this->readlist($path, true);
+ $entries = $this->_list($path, true);
if ($entries === false) {
- return $this->setstat($path, $attr, false);
+ return $this->_setstat($path, $attr, false);
}
// normally $entries would have at least . and .. but it might not if the directories
@@ -1587,18 +1653,18 @@ class SFTP extends SSH2
$temp = $path . '/' . $filename;
if ($props['type'] == NET_SFTP_TYPE_DIRECTORY) {
- if (!$this->setstat_recursive($temp, $attr, $i)) {
+ if (!$this->_setstat_recursive($temp, $attr, $i)) {
return false;
}
} else {
- if (!$this->send_sftp_packet(NET_SFTP_SETSTAT, Strings::packSSH2('s', $temp) . $attr)) {
+ if (!$this->_send_sftp_packet(NET_SFTP_SETSTAT, pack('Na*a*', strlen($temp), $temp, $attr))) {
return false;
}
$i++;
if ($i >= NET_SFTP_QUEUE_SIZE) {
- if (!$this->read_put_responses($i)) {
+ if (!$this->_read_put_responses($i)) {
return false;
}
$i = 0;
@@ -1606,14 +1672,14 @@ class SFTP extends SSH2
}
}
- if (!$this->send_sftp_packet(NET_SFTP_SETSTAT, Strings::packSSH2('s', $path) . $attr)) {
+ if (!$this->_send_sftp_packet(NET_SFTP_SETSTAT, pack('Na*a*', strlen($path), $path, $attr))) {
return false;
}
$i++;
if ($i >= NET_SFTP_QUEUE_SIZE) {
- if (!$this->read_put_responses($i)) {
+ if (!$this->_read_put_responses($i)) {
return false;
}
$i = 0;
@@ -1626,43 +1692,47 @@ class SFTP extends SSH2
* Return the target of a symbolic link
*
* @param string $link
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return mixed
* @access public
*/
- public function readlink($link)
+ function readlink($link)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $link = $this->realpath($link);
+ $link = $this->_realpath($link);
- if (!$this->send_sftp_packet(NET_SFTP_READLINK, Strings::packSSH2('s', $link))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_READLINK, pack('Na*', strlen($link), $link))) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_NAME:
break;
case NET_SFTP_STATUS:
- $this->logError($response);
+ $this->_logError($response);
return false;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_NAME or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_NAME or SSH_FXP_STATUS');
+ return false;
}
- list($count) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Ncount', $this->_string_shift($response, 4)));
// the file isn't a symlink
if (!$count) {
return false;
}
- list($filename) = Strings::unpackSSH2('s', $response);
-
- return $filename;
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ return $this->_string_shift($response, $length);
}
/**
@@ -1672,33 +1742,35 @@ class SFTP extends SSH2
*
* @param string $target
* @param string $link
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return bool
* @access public
*/
- public function symlink($target, $link)
+ function symlink($target, $link)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- //$target = $this->realpath($target);
- $link = $this->realpath($link);
+ //$target = $this->_realpath($target);
+ $link = $this->_realpath($link);
- $packet = Strings::packSSH2('ss', $target, $link);
- if (!$this->send_sftp_packet(NET_SFTP_SYMLINK, $packet)) {
+ $packet = pack('Na*Na*', strlen($target), $target, strlen($link), $link);
+ if (!$this->_send_sftp_packet(NET_SFTP_SYMLINK, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_STATUS) {
- throw new \UnexpectedValueException('Expected NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_STATUS');
+ return false;
}
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_OK) {
- $this->logError($response, $status);
+ $this->_logError($response, $status);
return false;
}
@@ -1714,13 +1786,13 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function mkdir($dir, $mode = -1, $recursive = false)
+ function mkdir($dir, $mode = -1, $recursive = false)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $dir = $this->realpath($dir);
+ $dir = $this->_realpath($dir);
if ($recursive) {
$dirs = explode('/', preg_replace('#/(?=/)|/$#', '', $dir));
@@ -1731,12 +1803,12 @@ class SFTP extends SSH2
for ($i = 0; $i < count($dirs); $i++) {
$temp = array_slice($dirs, 0, $i + 1);
$temp = implode('/', $temp);
- $result = $this->mkdir_helper($temp, $mode);
+ $result = $this->_mkdir_helper($temp, $mode);
}
return $result;
}
- return $this->mkdir_helper($dir, $mode);
+ return $this->_mkdir_helper($dir, $mode);
}
/**
@@ -1747,22 +1819,25 @@ class SFTP extends SSH2
* @return bool
* @access private
*/
- private function mkdir_helper($dir, $mode)
+ function _mkdir_helper($dir, $mode)
{
// send SSH_FXP_MKDIR without any attributes (that's what the \0\0\0\0 is doing)
- if (!$this->send_sftp_packet(NET_SFTP_MKDIR, Strings::packSSH2('s', $dir) . "\0\0\0\0")) {
+ if (!$this->_send_sftp_packet(NET_SFTP_MKDIR, pack('Na*a*', strlen($dir), $dir, "\0\0\0\0"))) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_STATUS) {
- throw new \UnexpectedValueException('Expected NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_STATUS');
+ return false;
}
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_OK) {
- $this->logError($response, $status);
+ $this->_logError($response, $status);
return false;
}
@@ -1777,43 +1852,45 @@ class SFTP extends SSH2
* Removes a directory.
*
* @param string $dir
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return bool
* @access public
*/
- public function rmdir($dir)
+ function rmdir($dir)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $dir = $this->realpath($dir);
+ $dir = $this->_realpath($dir);
if ($dir === false) {
return false;
}
- if (!$this->send_sftp_packet(NET_SFTP_RMDIR, Strings::packSSH2('s', $dir))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_RMDIR, pack('Na*', strlen($dir), $dir))) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_STATUS) {
- throw new \UnexpectedValueException('Expected NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_STATUS');
+ return false;
}
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_OK) {
// presumably SSH_FX_NO_SUCH_FILE or SSH_FX_PERMISSION_DENIED?
- $this->logError($response, $status);
+ $this->_logError($response, $status);
return false;
}
- $this->remove_from_stat_cache($dir);
+ $this->_remove_from_stat_cache($dir);
// the following will do a soft delete, which would be useful if you deleted a file
// and then tried to do a stat on the deleted file. the above, in contrast, does
// a hard delete
- //$this->update_stat_cache($dir, false);
+ //$this->_update_stat_cache($dir, false);
return true;
}
@@ -1821,8 +1898,8 @@ class SFTP extends SSH2
/**
* Uploads a file to the SFTP server.
*
- * By default, \phpseclib3\Net\SFTP::put() does not read from the local filesystem. $data is dumped directly into $remote_file.
- * So, for example, if you set $data to 'filename.ext' and then do \phpseclib3\Net\SFTP::get(), you will get a file, twelve bytes
+ * By default, \phpseclib\Net\SFTP::put() does not read from the local filesystem. $data is dumped directly into $remote_file.
+ * So, for example, if you set $data to 'filename.ext' and then do \phpseclib\Net\SFTP::get(), you will get a file, twelve bytes
* long, containing 'filename.ext' as its contents.
*
* Setting $mode to self::SOURCE_LOCAL_FILE will change the above behavior. With self::SOURCE_LOCAL_FILE, $remote_file will
@@ -1853,31 +1930,29 @@ class SFTP extends SSH2
*
* Setting $local_start to > 0 or $mode | self::RESUME_START doesn't do anything unless $mode | self::SOURCE_LOCAL_FILE.
*
- * {@internal ASCII mode for SFTPv4/5/6 can be supported by adding a new function - \phpseclib3\Net\SFTP::setMode().}
- *
* @param string $remote_file
* @param string|resource $data
* @param int $mode
* @param int $start
* @param int $local_start
* @param callable|null $progressCallback
- * @throws \UnexpectedValueException on receipt of unexpected packets
- * @throws \BadFunctionCallException if you're uploading via a callback and the callback function is invalid
- * @throws \phpseclib3\Exception\FileNotFoundException if you're uploading via a file and the file doesn't exist
* @return bool
* @access public
+ * @internal ASCII mode for SFTPv4/5/6 can be supported by adding a new function - \phpseclib\Net\SFTP::setMode().
*/
- public function put($remote_file, $data, $mode = self::SOURCE_STRING, $start = -1, $local_start = -1, $progressCallback = null)
+ function put($remote_file, $data, $mode = self::SOURCE_STRING, $start = -1, $local_start = -1, $progressCallback = null)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $remote_file = $this->realpath($remote_file);
+ $remote_file = $this->_realpath($remote_file);
if ($remote_file === false) {
return false;
}
+ $this->_remove_from_stat_cache($remote_file);
+
$flags = NET_SFTP_OPEN_WRITE | NET_SFTP_OPEN_CREATE;
// according to the SFTP specs, NET_SFTP_OPEN_APPEND should "force all writes to append data at the end of the file."
// in practice, it doesn't seem to do that.
@@ -1887,31 +1962,29 @@ class SFTP extends SSH2
$offset = $start;
} elseif ($mode & self::RESUME) {
// if NET_SFTP_OPEN_APPEND worked as it should _size() wouldn't need to be called
- $size = $this->stat($remote_file)['size'];
+ $size = $this->size($remote_file);
$offset = $size !== false ? $size : 0;
} else {
$offset = 0;
$flags|= NET_SFTP_OPEN_TRUNCATE;
}
- $this->remove_from_stat_cache($remote_file);
-
- $packet = Strings::packSSH2('sNN', $remote_file, $flags, 0);
- if (!$this->send_sftp_packet(NET_SFTP_OPEN, $packet)) {
+ $packet = pack('Na*N2', strlen($remote_file), $remote_file, $flags, 0);
+ if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_HANDLE:
$handle = substr($response, 4);
break;
case NET_SFTP_STATUS:
- $this->logError($response);
+ $this->_logError($response);
return false;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_HANDLE or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_HANDLE or SSH_FXP_STATUS');
+ return false;
}
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.2.3
@@ -1919,7 +1992,7 @@ class SFTP extends SSH2
switch (true) {
case $mode & self::SOURCE_CALLBACK:
if (!is_callable($data)) {
- throw new \BadFunctionCallException("\$data should be is_callable() if you specify SOURCE_CALLBACK flag");
+ user_error("\$data should be is_callable() if you specify SOURCE_CALLBACK flag");
}
$dataCallback = $data;
// do nothing
@@ -1937,7 +2010,8 @@ class SFTP extends SSH2
break;
case $mode & self::SOURCE_LOCAL_FILE:
if (!is_file($data)) {
- throw new FileNotFoundException("$data is not a valid file");
+ user_error("$data is not a valid file");
+ return false;
}
$fp = @fopen($data, 'rb');
if (!$fp) {
@@ -1968,7 +2042,7 @@ class SFTP extends SSH2
$i = $j = 0;
while ($dataCallback || ($size === 0 || $sent < $size)) {
if ($dataCallback) {
- $temp = $dataCallback($sftp_packet_size);
+ $temp = call_user_func($dataCallback, $sftp_packet_size);
if (is_null($temp)) {
break;
}
@@ -1981,7 +2055,7 @@ class SFTP extends SSH2
$subtemp = $offset + $sent;
$packet = pack('Na*N3a*', strlen($handle), $handle, $subtemp / 4294967296, $subtemp, strlen($temp), $temp);
- if (!$this->send_sftp_packet(NET_SFTP_WRITE, $packet, $j)) {
+ if (!$this->_send_sftp_packet(NET_SFTP_WRITE, $packet, $j)) {
if ($mode & self::SOURCE_LOCAL_FILE) {
fclose($fp);
}
@@ -1989,13 +2063,14 @@ class SFTP extends SSH2
}
$sent+= strlen($temp);
if (is_callable($progressCallback)) {
- $progressCallback($sent);
+ call_user_func($progressCallback, $sent);
}
$i++;
$j++;
+
if ($i == NET_SFTP_UPLOAD_QUEUE_SIZE) {
- if (!$this->read_put_responses($i)) {
+ if (!$this->_read_put_responses($i)) {
$i = 0;
break;
}
@@ -2003,11 +2078,11 @@ class SFTP extends SSH2
}
}
- if (!$this->read_put_responses($i)) {
+ if (!$this->_read_put_responses($i)) {
if ($mode & self::SOURCE_LOCAL_FILE) {
fclose($fp);
}
- $this->close_handle($handle);
+ $this->_close_handle($handle);
return false;
}
@@ -2022,7 +2097,7 @@ class SFTP extends SSH2
}
}
- return $this->close_handle($handle);
+ return $this->_close_handle($handle);
}
/**
@@ -2033,21 +2108,23 @@ class SFTP extends SSH2
*
* @param int $i
* @return bool
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @access private
*/
- private function read_put_responses($i)
+ function _read_put_responses($i)
{
while ($i--) {
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_STATUS) {
- throw new \UnexpectedValueException('Expected NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_STATUS');
+ return false;
}
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_OK) {
- $this->logError($response, $status);
+ $this->_logError($response, $status);
break;
}
}
@@ -2060,26 +2137,28 @@ class SFTP extends SSH2
*
* @param string $handle
* @return bool
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @access private
*/
- private function close_handle($handle)
+ function _close_handle($handle)
{
- if (!$this->send_sftp_packet(NET_SFTP_CLOSE, pack('Na*', strlen($handle), $handle))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_CLOSE, pack('Na*', strlen($handle), $handle))) {
return false;
}
// "The client MUST release all resources associated with the handle regardless of the status."
// -- http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.1.3
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_STATUS) {
- throw new \UnexpectedValueException('Expected NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_STATUS');
+ return false;
}
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_OK) {
- $this->logError($response, $status);
+ $this->_logError($response, $status);
return false;
}
@@ -2096,41 +2175,40 @@ class SFTP extends SSH2
* $offset and $length can be used to download files in chunks.
*
* @param string $remote_file
- * @param string|bool|resource $local_file
+ * @param string $local_file
* @param int $offset
* @param int $length
* @param callable|null $progressCallback
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @return mixed
* @access public
*/
- public function get($remote_file, $local_file = false, $offset = 0, $length = -1, $progressCallback = null)
+ function get($remote_file, $local_file = false, $offset = 0, $length = -1, $progressCallback = null)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $remote_file = $this->realpath($remote_file);
+ $remote_file = $this->_realpath($remote_file);
if ($remote_file === false) {
return false;
}
$packet = pack('Na*N2', strlen($remote_file), $remote_file, NET_SFTP_OPEN_READ, 0);
- if (!$this->send_sftp_packet(NET_SFTP_OPEN, $packet)) {
+ if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_HANDLE:
$handle = substr($response, 4);
break;
case NET_SFTP_STATUS: // presumably SSH_FX_NO_SUCH_FILE or SSH_FX_PERMISSION_DENIED
- $this->logError($response);
+ $this->_logError($response);
return false;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_HANDLE or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_HANDLE or SSH_FXP_STATUS');
+ return false;
}
if (is_resource($local_file)) {
@@ -2161,8 +2239,8 @@ class SFTP extends SSH2
$packet_size = $length > 0 ? min($this->max_sftp_packet, $length - $read) : $this->max_sftp_packet;
- $packet = Strings::packSSH2('sN3', $handle, $tempoffset / 4294967296, $tempoffset, $packet_size);
- if (!$this->send_sftp_packet(NET_SFTP_READ, $packet, $i)) {
+ $packet = pack('Na*N3', strlen($handle), $handle, $tempoffset / 4294967296, $tempoffset, $packet_size);
+ if (!$this->_send_sftp_packet(NET_SFTP_READ, $packet, $i)) {
if ($fclose_check) {
fclose($fp);
}
@@ -2184,10 +2262,10 @@ class SFTP extends SSH2
$i--;
if ($clear_responses) {
- $this->get_sftp_packet($packets_sent - $i);
+ $this->_get_sftp_packet($packets_sent - $i);
continue;
} else {
- $response = $this->get_sftp_packet($packets_sent - $i);
+ $response = $this->_get_sftp_packet($packets_sent - $i);
}
switch ($this->packet_type) {
@@ -2208,15 +2286,14 @@ class SFTP extends SSH2
break;
case NET_SFTP_STATUS:
// could, in theory, return false if !strlen($content) but we'll hold off for the time being
- $this->logError($response);
+ $this->_logError($response);
$clear_responses = true; // don't break out of the loop yet, so we can read the remaining responses
break;
default:
if ($fclose_check) {
fclose($fp);
}
- throw new \UnexpectedValueException('Expected NET_SFTP_DATA or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FX_DATA or SSH_FXP_STATUS');
}
$response = null;
}
@@ -2243,7 +2320,7 @@ class SFTP extends SSH2
}
}
- if (!$this->close_handle($handle)) {
+ if (!$this->_close_handle($handle)) {
return false;
}
@@ -2257,10 +2334,9 @@ class SFTP extends SSH2
* @param string $path
* @param bool $recursive
* @return bool
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @access public
*/
- public function delete($path, $recursive = true)
+ function delete($path, $recursive = true)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
@@ -2275,37 +2351,39 @@ class SFTP extends SSH2
return false;
}
- $path = $this->realpath($path);
+ $path = $this->_realpath($path);
if ($path === false) {
return false;
}
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.3
- if (!$this->send_sftp_packet(NET_SFTP_REMOVE, pack('Na*', strlen($path), $path))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_REMOVE, pack('Na*', strlen($path), $path))) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_STATUS) {
- throw new \UnexpectedValueException('Expected NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_STATUS');
+ return false;
}
// if $status isn't SSH_FX_OK it's probably SSH_FX_NO_SUCH_FILE or SSH_FX_PERMISSION_DENIED
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_OK) {
- $this->logError($response, $status);
+ $this->_logError($response, $status);
if (!$recursive) {
return false;
}
-
$i = 0;
- $result = $this->delete_recursive($path, $i);
- $this->read_put_responses($i);
+ $result = $this->_delete_recursive($path, $i);
+ $this->_read_put_responses($i);
return $result;
}
- $this->remove_from_stat_cache($path);
+ $this->_remove_from_stat_cache($path);
return true;
}
@@ -2320,13 +2398,13 @@ class SFTP extends SSH2
* @return bool
* @access private
*/
- private function delete_recursive($path, &$i)
+ function _delete_recursive($path, &$i)
{
- if (!$this->read_put_responses($i)) {
+ if (!$this->_read_put_responses($i)) {
return false;
}
$i = 0;
- $entries = $this->readlist($path, true);
+ $entries = $this->_list($path, true);
// normally $entries would have at least . and .. but it might not if the directories
// permissions didn't allow reading
@@ -2342,19 +2420,19 @@ class SFTP extends SSH2
$temp = $path . '/' . $filename;
if ($props['type'] == NET_SFTP_TYPE_DIRECTORY) {
- if (!$this->delete_recursive($temp, $i)) {
+ if (!$this->_delete_recursive($temp, $i)) {
return false;
}
} else {
- if (!$this->send_sftp_packet(NET_SFTP_REMOVE, Strings::packSSH2('s', $temp))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_REMOVE, pack('Na*', strlen($temp), $temp))) {
return false;
}
- $this->remove_from_stat_cache($temp);
+ $this->_remove_from_stat_cache($temp);
$i++;
if ($i >= NET_SFTP_QUEUE_SIZE) {
- if (!$this->read_put_responses($i)) {
+ if (!$this->_read_put_responses($i)) {
return false;
}
$i = 0;
@@ -2362,15 +2440,15 @@ class SFTP extends SSH2
}
}
- if (!$this->send_sftp_packet(NET_SFTP_RMDIR, Strings::packSSH2('s', $path))) {
+ if (!$this->_send_sftp_packet(NET_SFTP_RMDIR, pack('Na*', strlen($path), $path))) {
return false;
}
- $this->remove_from_stat_cache($path);
+ $this->_remove_from_stat_cache($path);
$i++;
if ($i >= NET_SFTP_QUEUE_SIZE) {
- if (!$this->read_put_responses($i)) {
+ if (!$this->_read_put_responses($i)) {
return false;
}
$i = 0;
@@ -2386,12 +2464,12 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function file_exists($path)
+ function file_exists($path)
{
if ($this->use_stat_cache) {
- $path = $this->realpath($path);
+ $path = $this->_realpath($path);
- $result = $this->query_stat_cache($path);
+ $result = $this->_query_stat_cache($path);
if (isset($result)) {
// return true if $result is an array or if it's an stdClass object
@@ -2409,9 +2487,9 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function is_dir($path)
+ function is_dir($path)
{
- $result = $this->get_stat_cache_prop($path, 'type');
+ $result = $this->_get_stat_cache_prop($path, 'type');
if ($result === false) {
return false;
}
@@ -2425,9 +2503,9 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function is_file($path)
+ function is_file($path)
{
- $result = $this->get_stat_cache_prop($path, 'type');
+ $result = $this->_get_stat_cache_prop($path, 'type');
if ($result === false) {
return false;
}
@@ -2441,9 +2519,9 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function is_link($path)
+ function is_link($path)
{
- $result = $this->get_lstat_cache_prop($path, 'type');
+ $result = $this->_get_lstat_cache_prop($path, 'type');
if ($result === false) {
return false;
}
@@ -2457,22 +2535,24 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function is_readable($path)
+ function is_readable($path)
{
- $packet = Strings::packSSH2('sNN', $this->realpath($path), NET_SFTP_OPEN_READ, 0);
- if (!$this->send_sftp_packet(NET_SFTP_OPEN, $packet)) {
+ $path = $this->_realpath($path);
+
+ $packet = pack('Na*N2', strlen($path), $path, NET_SFTP_OPEN_READ, 0);
+ if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_HANDLE:
return true;
case NET_SFTP_STATUS: // presumably SSH_FX_NO_SUCH_FILE or SSH_FX_PERMISSION_DENIED
return false;
default:
- throw new \UnexpectedValueException('Expected NET_SFTP_HANDLE or NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_HANDLE or SSH_FXP_STATUS');
+ return false;
}
}
@@ -2483,22 +2563,24 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function is_writable($path)
+ function is_writable($path)
{
- $packet = Strings::packSSH2('sNN', $this->realpath($path), NET_SFTP_OPEN_WRITE, 0);
- if (!$this->send_sftp_packet(NET_SFTP_OPEN, $packet)) {
+ $path = $this->_realpath($path);
+
+ $packet = pack('Na*N2', strlen($path), $path, NET_SFTP_OPEN_WRITE, 0);
+ if (!$this->_send_sftp_packet(NET_SFTP_OPEN, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
switch ($this->packet_type) {
case NET_SFTP_HANDLE:
return true;
case NET_SFTP_STATUS: // presumably SSH_FX_NO_SUCH_FILE or SSH_FX_PERMISSION_DENIED
return false;
default:
- throw new \UnexpectedValueException('Expected SSH_FXP_HANDLE or SSH_FXP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_HANDLE or SSH_FXP_STATUS');
+ return false;
}
}
@@ -2511,7 +2593,7 @@ class SFTP extends SSH2
* @return bool
* @access public
*/
- public function is_writeable($path)
+ function is_writeable($path)
{
return $this->is_writable($path);
}
@@ -2523,9 +2605,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function fileatime($path)
+ function fileatime($path)
{
- return $this->get_stat_cache_prop($path, 'atime');
+ return $this->_get_stat_cache_prop($path, 'atime');
}
/**
@@ -2535,9 +2617,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function filemtime($path)
+ function filemtime($path)
{
- return $this->get_stat_cache_prop($path, 'mtime');
+ return $this->_get_stat_cache_prop($path, 'mtime');
}
/**
@@ -2547,9 +2629,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function fileperms($path)
+ function fileperms($path)
{
- return $this->get_stat_cache_prop($path, 'mode');
+ return $this->_get_stat_cache_prop($path, 'permissions');
}
/**
@@ -2559,9 +2641,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function fileowner($path)
+ function fileowner($path)
{
- return $this->get_stat_cache_prop($path, 'uid');
+ return $this->_get_stat_cache_prop($path, 'uid');
}
/**
@@ -2571,9 +2653,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function filegroup($path)
+ function filegroup($path)
{
- return $this->get_stat_cache_prop($path, 'gid');
+ return $this->_get_stat_cache_prop($path, 'gid');
}
/**
@@ -2583,9 +2665,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function filesize($path)
+ function filesize($path)
{
- return $this->get_stat_cache_prop($path, 'size');
+ return $this->_get_stat_cache_prop($path, 'size');
}
/**
@@ -2595,9 +2677,9 @@ class SFTP extends SSH2
* @return mixed
* @access public
*/
- public function filetype($path)
+ function filetype($path)
{
- $type = $this->get_stat_cache_prop($path, 'type');
+ $type = $this->_get_stat_cache_prop($path, 'type');
if ($type === false) {
return false;
}
@@ -2630,9 +2712,9 @@ class SFTP extends SSH2
* @return mixed
* @access private
*/
- private function get_stat_cache_prop($path, $prop)
+ function _get_stat_cache_prop($path, $prop)
{
- return $this->get_xstat_cache_prop($path, $prop, 'stat');
+ return $this->_get_xstat_cache_prop($path, $prop, 'stat');
}
/**
@@ -2645,9 +2727,9 @@ class SFTP extends SSH2
* @return mixed
* @access private
*/
- private function get_lstat_cache_prop($path, $prop)
+ function _get_lstat_cache_prop($path, $prop)
{
- return $this->get_xstat_cache_prop($path, $prop, 'lstat');
+ return $this->_get_xstat_cache_prop($path, $prop, 'lstat');
}
/**
@@ -2657,16 +2739,16 @@ class SFTP extends SSH2
*
* @param string $path
* @param string $prop
- * @param string $type
+ * @param mixed $type
* @return mixed
* @access private
*/
- private function get_xstat_cache_prop($path, $prop, $type)
+ function _get_xstat_cache_prop($path, $prop, $type)
{
if ($this->use_stat_cache) {
- $path = $this->realpath($path);
+ $path = $this->_realpath($path);
- $result = $this->query_stat_cache($path);
+ $result = $this->_query_stat_cache($path);
if (is_object($result) && isset($result->$type)) {
return $result->{$type}[$prop];
@@ -2688,45 +2770,47 @@ class SFTP extends SSH2
* @param string $oldname
* @param string $newname
* @return bool
- * @throws \UnexpectedValueException on receipt of unexpected packets
* @access public
*/
- public function rename($oldname, $newname)
+ function rename($oldname, $newname)
{
if (!($this->bitmap & SSH2::MASK_LOGIN)) {
return false;
}
- $oldname = $this->realpath($oldname);
- $newname = $this->realpath($newname);
+ $oldname = $this->_realpath($oldname);
+ $newname = $this->_realpath($newname);
if ($oldname === false || $newname === false) {
return false;
}
// http://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-8.3
- $packet = Strings::packSSH2('ss', $oldname, $newname);
- if (!$this->send_sftp_packet(NET_SFTP_RENAME, $packet)) {
+ $packet = pack('Na*Na*', strlen($oldname), $oldname, strlen($newname), $newname);
+ if (!$this->_send_sftp_packet(NET_SFTP_RENAME, $packet)) {
return false;
}
- $response = $this->get_sftp_packet();
+ $response = $this->_get_sftp_packet();
if ($this->packet_type != NET_SFTP_STATUS) {
- throw new \UnexpectedValueException('Expected NET_SFTP_STATUS. '
- . 'Got packet type: ' . $this->packet_type);
+ user_error('Expected SSH_FXP_STATUS');
+ return false;
}
// if $status isn't SSH_FX_OK it's probably SSH_FX_NO_SUCH_FILE or SSH_FX_PERMISSION_DENIED
- list($status) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nstatus', $this->_string_shift($response, 4)));
if ($status != NET_SFTP_STATUS_OK) {
- $this->logError($response, $status);
+ $this->_logError($response, $status);
return false;
}
// don't move the stat cache entry over since this operation could very well change the
// atime and mtime attributes
- //$this->update_stat_cache($newname, $this->query_stat_cache($oldname));
- $this->remove_from_stat_cache($oldname);
- $this->remove_from_stat_cache($newname);
+ //$this->_update_stat_cache($newname, $this->_query_stat_cache($oldname));
+ $this->_remove_from_stat_cache($oldname);
+ $this->_remove_from_stat_cache($newname);
return true;
}
@@ -2740,11 +2824,14 @@ class SFTP extends SSH2
* @return array
* @access private
*/
- protected function parseAttributes(&$response)
+ function _parseAttributes(&$response)
{
- $attr = [];
- list($flags) = Strings::unpackSSH2('N', $response);
-
+ $attr = array();
+ if (strlen($response) < 4) {
+ user_error('Malformed file attributes');
+ return array();
+ }
+ extract(unpack('Nflags', $this->_string_shift($response, 4)));
// SFTPv4+ have a type field (a byte) that follows the above flag field
foreach ($this->attributes as $key => $value) {
switch ($flags & $key) {
@@ -2755,28 +2842,55 @@ class SFTP extends SSH2
// IEEE 754 binary64 "double precision" on such platforms and
// as such can represent integers of at least 2^50 without loss
// of precision. Interpreted in filesize, 2^50 bytes = 1024 TiB.
- list($upper, $size) = Strings::unpackSSH2('NN', $response);
- $attr['size'] = $upper ? 4294967296 * $upper : 0;
- $attr['size']+= $size < 0 ? ($size & 0x7FFFFFFF) + 0x80000000 : $size;
+ $attr['size'] = hexdec(bin2hex($this->_string_shift($response, 8)));
break;
case NET_SFTP_ATTR_UIDGID: // 0x00000002 (SFTPv3 only)
- list($attr['uid'], $attr['gid']) = Strings::unpackSSH2('NN', $response);
+ if (strlen($response) < 8) {
+ user_error('Malformed file attributes');
+ return $attr;
+ }
+ $attr+= unpack('Nuid/Ngid', $this->_string_shift($response, 8));
break;
case NET_SFTP_ATTR_PERMISSIONS: // 0x00000004
- list($attr['mode']) = Strings::unpackSSH2('N', $response);
- $fileType = $this->parseMode($attr['mode']);
+ if (strlen($response) < 4) {
+ user_error('Malformed file attributes');
+ return $attr;
+ }
+ $attr+= unpack('Npermissions', $this->_string_shift($response, 4));
+ // mode == permissions; permissions was the original array key and is retained for bc purposes.
+ // mode was added because that's the more industry standard terminology
+ $attr+= array('mode' => $attr['permissions']);
+ $fileType = $this->_parseMode($attr['permissions']);
if ($fileType !== false) {
- $attr+= ['type' => $fileType];
+ $attr+= array('type' => $fileType);
}
break;
case NET_SFTP_ATTR_ACCESSTIME: // 0x00000008
- list($attr['atime'], $attr['mtime']) = Strings::unpackSSH2('NN', $response);
+ if (strlen($response) < 8) {
+ user_error('Malformed file attributes');
+ return $attr;
+ }
+ $attr+= unpack('Natime/Nmtime', $this->_string_shift($response, 8));
break;
case NET_SFTP_ATTR_EXTENDED: // 0x80000000
- list($count) = Strings::unpackSSH2('N', $response);
+ if (strlen($response) < 4) {
+ user_error('Malformed file attributes');
+ return $attr;
+ }
+ extract(unpack('Ncount', $this->_string_shift($response, 4)));
for ($i = 0; $i < $count; $i++) {
- list($key, $value) = Strings::unpackSSH2('ss', $response);
- $attr[$key] = $value;
+ if (strlen($response) < 4) {
+ user_error('Malformed file attributes');
+ return $attr;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $key = $this->_string_shift($response, $length);
+ if (strlen($response) < 4) {
+ user_error('Malformed file attributes');
+ return $attr;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $attr[$key] = $this->_string_shift($response, $length);
}
}
}
@@ -2792,7 +2906,7 @@ class SFTP extends SSH2
* @return int
* @access private
*/
- private function parseMode($mode)
+ function _parseMode($mode)
{
// values come from http://lxr.free-electrons.com/source/include/uapi/linux/stat.h#L12
// see, also, http://linux.die.net/man/2/stat
@@ -2839,7 +2953,7 @@ class SFTP extends SSH2
* @return mixed
* @access private
*/
- private function parseLongname($longname)
+ function _parseLongname($longname)
{
// http://en.wikipedia.org/wiki/Unix_file_types
// http://en.wikipedia.org/wiki/Filesystem_permissions#Notation_of_traditional_Unix_permissions
@@ -2868,11 +2982,11 @@ class SFTP extends SSH2
* @param string $data
* @param int $request_id
* @see self::_get_sftp_packet()
- * @see self::send_channel_packet()
+ * @see self::_send_channel_packet()
* @return bool
* @access private
*/
- private function send_sftp_packet($type, $data, $request_id = 1)
+ function _send_sftp_packet($type, $data, $request_id = 1)
{
// in SSH2.php the timeout is cumulative per function call. eg. exec() will
// timeout after 10s. but for SFTP.php it's cumulative per packet
@@ -2882,25 +2996,17 @@ class SFTP extends SSH2
pack('NCNa*', strlen($data) + 5, $type, $request_id, $data) :
pack('NCa*', strlen($data) + 1, $type, $data);
- $start = microtime(true);
- $result = $this->send_channel_packet(self::CHANNEL, $packet);
- $stop = microtime(true);
+ $start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
+ $result = $this->_send_channel_packet(self::CHANNEL, $packet);
+ $stop = strtok(microtime(), ' ') + strtok('');
if (defined('NET_SFTP_LOGGING')) {
$packet_type = '-> ' . $this->packet_types[$type] .
' (' . round($stop - $start, 4) . 's)';
if (NET_SFTP_LOGGING == self::LOG_REALTIME) {
- switch (PHP_SAPI) {
- case 'cli':
- $start = $stop = "\r\n";
- break;
- default:
- $start = '<pre>';
- $stop = '</pre>';
- }
- echo $start . $this->format_log([$data], [$packet_type]) . $stop;
- @flush();
- @ob_flush();
+ echo "<pre>\r\n" . $this->_format_log(array($data), array($packet_type)) . "\r\n</pre>\r\n";
+ flush();
+ ob_flush();
} else {
$this->packet_type_log[] = $packet_type;
if (NET_SFTP_LOGGING == self::LOG_COMPLEX) {
@@ -2918,12 +3024,12 @@ class SFTP extends SSH2
* @param int $reason
* @access private
*/
- protected function reset_connection($reason)
+ function _reset_connection($reason)
{
- parent::reset_connection($reason);
+ parent::_reset_connection($reason);
$this->use_request_id = false;
$this->pwd = false;
- $this->requestBuffer = [];
+ $this->requestBuffer = array();
}
/**
@@ -2939,7 +3045,7 @@ class SFTP extends SSH2
* @return string
* @access private
*/
- private function get_sftp_packet($request_id = null)
+ function _get_sftp_packet($request_id = null)
{
if (isset($request_id) && isset($this->requestBuffer[$request_id])) {
$this->packet_type = $this->requestBuffer[$request_id]['packet_type'];
@@ -2952,11 +3058,11 @@ class SFTP extends SSH2
// timeout after 10s. but for SFTP.php it's cumulative per packet
$this->curTimeout = $this->timeout;
- $start = microtime(true);
+ $start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
// SFTP packet length
while (strlen($this->packet_buffer) < 4) {
- $temp = $this->get_channel_packet(self::CHANNEL, true);
+ $temp = $this->_get_channel_packet(self::CHANNEL, true);
if (is_bool($temp)) {
$this->packet_type = false;
$this->packet_buffer = '';
@@ -2967,21 +3073,20 @@ class SFTP extends SSH2
if (strlen($this->packet_buffer) < 4) {
return false;
}
- extract(unpack('Nlength', Strings::shift($this->packet_buffer, 4)));
- /** @var integer $length */
-
+ extract(unpack('Nlength', $this->_string_shift($this->packet_buffer, 4)));
$tempLength = $length;
$tempLength-= strlen($this->packet_buffer);
// 256 * 1024 is what SFTP_MAX_MSG_LENGTH is set to in OpenSSH's sftp-common.h
if ($tempLength > 256 * 1024) {
- throw new \RuntimeException('Invalid Size');
+ user_error('Invalid SFTP packet size');
+ return false;
}
// SFTP packet type and data payload
while ($tempLength > 0) {
- $temp = $this->get_channel_packet(self::CHANNEL, true);
+ $temp = $this->_get_channel_packet(self::CHANNEL, true);
if (is_bool($temp)) {
$this->packet_type = false;
$this->packet_buffer = '';
@@ -2991,34 +3096,26 @@ class SFTP extends SSH2
$tempLength-= strlen($temp);
}
- $stop = microtime(true);
+ $stop = strtok(microtime(), ' ') + strtok('');
- $this->packet_type = ord(Strings::shift($this->packet_buffer));
+ $this->packet_type = ord($this->_string_shift($this->packet_buffer));
if ($this->use_request_id) {
- extract(unpack('Npacket_id', Strings::shift($this->packet_buffer, 4))); // remove the request id
+ extract(unpack('Npacket_id', $this->_string_shift($this->packet_buffer, 4))); // remove the request id
$length-= 5; // account for the request id and the packet type
} else {
$length-= 1; // account for the packet type
}
- $packet = Strings::shift($this->packet_buffer, $length);
+ $packet = $this->_string_shift($this->packet_buffer, $length);
if (defined('NET_SFTP_LOGGING')) {
$packet_type = '<- ' . $this->packet_types[$this->packet_type] .
' (' . round($stop - $start, 4) . 's)';
if (NET_SFTP_LOGGING == self::LOG_REALTIME) {
- switch (PHP_SAPI) {
- case 'cli':
- $start = $stop = "\r\n";
- break;
- default:
- $start = '<pre>';
- $stop = '</pre>';
- }
- echo $start . $this->format_log([$packet], [$packet_type]) . $stop;
- @flush();
- @ob_flush();
+ echo "<pre>\r\n" . $this->_format_log(array($packet), array($packet_type)) . "\r\n</pre>\r\n";
+ flush();
+ ob_flush();
} else {
$this->packet_type_log[] = $packet_type;
if (NET_SFTP_LOGGING == self::LOG_COMPLEX) {
@@ -3032,7 +3129,7 @@ class SFTP extends SSH2
'packet_type' => $this->packet_type,
'packet' => $packet
);
- return $this->get_sftp_packet($request_id);
+ return $this->_get_sftp_packet($request_id);
}
return $packet;
@@ -3041,12 +3138,12 @@ class SFTP extends SSH2
/**
* Returns a log of the packets that have been sent and received.
*
- * Returns a string if NET_SFTP_LOGGING == self::LOG_COMPLEX, an array if NET_SFTP_LOGGING == self::LOG_SIMPLE and false if !defined('NET_SFTP_LOGGING')
+ * Returns a string if NET_SFTP_LOGGING == NET_SFTP_LOG_COMPLEX, an array if NET_SFTP_LOGGING == NET_SFTP_LOG_SIMPLE and false if !defined('NET_SFTP_LOGGING')
*
* @access public
- * @return array|string
+ * @return string or Array
*/
- public function getSFTPLog()
+ function getSFTPLog()
{
if (!defined('NET_SFTP_LOGGING')) {
return false;
@@ -3054,7 +3151,7 @@ class SFTP extends SSH2
switch (NET_SFTP_LOGGING) {
case self::LOG_COMPLEX:
- return $this->format_log($this->packet_log, $this->packet_type_log);
+ return $this->_format_log($this->packet_log, $this->packet_type_log);
break;
//case self::LOG_SIMPLE:
default:
@@ -3068,7 +3165,7 @@ class SFTP extends SSH2
* @return array
* @access public
*/
- public function getSFTPErrors()
+ function getSFTPErrors()
{
return $this->sftp_errors;
}
@@ -3079,7 +3176,7 @@ class SFTP extends SSH2
* @return string
* @access public
*/
- public function getLastSFTPError()
+ function getLastSFTPError()
{
return count($this->sftp_errors) ? $this->sftp_errors[count($this->sftp_errors) - 1] : '';
}
@@ -3090,9 +3187,9 @@ class SFTP extends SSH2
* @return array
* @access public
*/
- public function getSupportedVersions()
+ function getSupportedVersions()
{
- $temp = ['version' => $this->version];
+ $temp = array('version' => $this->version);
if (isset($this->extensions['versions'])) {
$temp['extensions'] = $this->extensions['versions'];
}
@@ -3104,12 +3201,12 @@ class SFTP extends SSH2
*
* @param int $reason
* @return bool
- * @access protected
+ * @access private
*/
- protected function disconnect_helper($reason)
+ function _disconnect($reason)
{
$this->pwd = false;
- parent::disconnect_helper($reason);
+ parent::_disconnect($reason);
}
/**
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php b/vendor/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php
index 89a0e59b2..1a44b10a0 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Net/SFTP/Stream.php
@@ -15,11 +15,10 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Net\SFTP;
+namespace phpseclib\Net\SFTP;
-use phpseclib3\Crypt\Common\PrivateKey;
-use phpseclib3\Net\SFTP;
-use phpseclib3\Net\SSH2;
+use phpseclib\Crypt\RSA;
+use phpseclib\Net\SFTP;
/**
* SFTP Stream Wrapper
@@ -28,7 +27,7 @@ use phpseclib3\Net\SSH2;
* @author Jim Wigginton <terrafrost@php.net>
* @access public
*/
-class Stream extends SFTP
+class Stream
{
/**
* SFTP instances
@@ -45,7 +44,7 @@ class Stream extends SFTP
* @var object
* @access private
*/
- private $sftp;
+ var $sftp;
/**
* Path
@@ -53,7 +52,7 @@ class Stream extends SFTP
* @var string
* @access private
*/
- private $path;
+ var $path;
/**
* Mode
@@ -61,7 +60,7 @@ class Stream extends SFTP
* @var string
* @access private
*/
- private $mode;
+ var $mode;
/**
* Position
@@ -69,7 +68,7 @@ class Stream extends SFTP
* @var int
* @access private
*/
- private $pos;
+ var $pos;
/**
* Size
@@ -77,7 +76,7 @@ class Stream extends SFTP
* @var int
* @access private
*/
- private $size;
+ var $size;
/**
* Directory entries
@@ -85,7 +84,7 @@ class Stream extends SFTP
* @var array
* @access private
*/
- private $entries;
+ var $entries;
/**
* EOF flag
@@ -93,17 +92,17 @@ class Stream extends SFTP
* @var bool
* @access private
*/
- private $eof;
+ var $eof;
/**
* Context resource
*
- * Technically this needs to be publicly accessible so PHP can set it directly
+ * Technically this needs to be publically accessible so PHP can set it directly
*
* @var resource
* @access public
*/
- public $context;
+ var $context;
/**
* Notification callback function
@@ -111,7 +110,7 @@ class Stream extends SFTP
* @var callable
* @access public
*/
- private $notification;
+ var $notification;
/**
* Registers this class as a URL wrapper.
@@ -120,7 +119,7 @@ class Stream extends SFTP
* @return bool True on success, false otherwise.
* @access public
*/
- public static function register($protocol = 'sftp')
+ static function register($protocol = 'sftp')
{
if (in_array($protocol, stream_get_wrappers(), true)) {
return false;
@@ -133,7 +132,7 @@ class Stream extends SFTP
*
* @access public
*/
- public function __construct()
+ function __construct()
{
if (defined('NET_SFTP_STREAM_LOGGING')) {
echo "__construct()\r\n";
@@ -152,10 +151,10 @@ class Stream extends SFTP
* @return string
* @access private
*/
- protected function parse_path($path)
+ function _parse_path($path)
{
$orig = $path;
- extract(parse_url($path) + ['port' => 22]);
+ extract(parse_url($path) + array('port' => 22));
if (isset($query)) {
$path.= '?' . $query;
} elseif (preg_match('/(\?|\?#)$/', $orig)) {
@@ -178,12 +177,13 @@ class Stream extends SFTP
}
}
- if (preg_match('/^{[a-z0-9]+}$/i', $host)) {
- $host = SSH2::getConnectionByResourceId($host);
- if ($host === false) {
+ if ($host[0] == '$') {
+ $host = substr($host, 1);
+ global ${$host};
+ if (($$host instanceof SFTP) === false) {
return false;
}
- $this->sftp = $host;
+ $this->sftp = $$host;
} else {
if (isset($this->context)) {
$context = stream_context_get_options($this->context);
@@ -204,7 +204,7 @@ class Stream extends SFTP
if (isset($context[$scheme]['password'])) {
$pass = $context[$scheme]['password'];
}
- if (isset($context[$scheme]['privkey']) && $context[$scheme]['privkey'] instanceof PrivateKey) {
+ if (isset($context[$scheme]['privkey']) && $context[$scheme]['privkey'] instanceof RSA) {
$pass = $context[$scheme]['privkey'];
}
@@ -212,7 +212,7 @@ class Stream extends SFTP
return false;
}
- // casting $pass to a string is necessary in the event that it's a \phpseclib3\Crypt\RSA object
+ // casting $pass to a string is necessary in the event that it's a \phpseclib\Crypt\RSA object
if (isset(self::$instances[$host][$port][$user][(string) $pass])) {
$this->sftp = self::$instances[$host][$port][$user][(string) $pass];
} else {
@@ -257,16 +257,16 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _stream_open($path, $mode, $options, &$opened_path)
+ function _stream_open($path, $mode, $options, &$opened_path)
{
- $path = $this->parse_path($path);
+ $path = $this->_parse_path($path);
if ($path === false) {
return false;
}
$this->path = $path;
- $this->size = $this->sftp->filesize($path);
+ $this->size = $this->sftp->size($path);
$this->mode = preg_replace('#[bt]$#', '', $mode);
$this->eof = false;
@@ -299,7 +299,7 @@ class Stream extends SFTP
* @return mixed
* @access public
*/
- private function _stream_read($count)
+ function _stream_read($count)
{
switch ($this->mode) {
case 'w':
@@ -341,7 +341,7 @@ class Stream extends SFTP
* @return mixed
* @access public
*/
- private function _stream_write($data)
+ function _stream_write($data)
{
switch ($this->mode) {
case 'r':
@@ -375,7 +375,7 @@ class Stream extends SFTP
* @return int
* @access public
*/
- private function _stream_tell()
+ function _stream_tell()
{
return $this->pos;
}
@@ -393,7 +393,7 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _stream_eof()
+ function _stream_eof()
{
return $this->eof;
}
@@ -406,7 +406,7 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _stream_seek($offset, $whence)
+ function _stream_seek($offset, $whence)
{
switch ($whence) {
case SEEK_SET:
@@ -435,9 +435,9 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _stream_metadata($path, $option, $var)
+ function _stream_metadata($path, $option, $var)
{
- $path = $this->parse_path($path);
+ $path = $this->_parse_path($path);
if ($path === false) {
return false;
}
@@ -467,7 +467,7 @@ class Stream extends SFTP
* @return resource
* @access public
*/
- private function _stream_cast($cast_as)
+ function _stream_cast($cast_as)
{
return $this->sftp->fsock;
}
@@ -479,7 +479,7 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _stream_lock($operation)
+ function _stream_lock($operation)
{
return false;
}
@@ -488,7 +488,7 @@ class Stream extends SFTP
* Renames a file or directory
*
* Attempts to rename oldname to newname, moving it between directories if necessary.
- * If newname exists, it will be overwritten. This is a departure from what \phpseclib3\Net\SFTP
+ * If newname exists, it will be overwritten. This is a departure from what \phpseclib\Net\SFTP
* does.
*
* @param string $path_from
@@ -496,7 +496,7 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _rename($path_from, $path_to)
+ function _rename($path_from, $path_to)
{
$path1 = parse_url($path_from);
$path2 = parse_url($path_to);
@@ -505,7 +505,7 @@ class Stream extends SFTP
return false;
}
- $path_from = $this->parse_path($path_from);
+ $path_from = $this->_parse_path($path_from);
$path_to = parse_url($path_to);
if ($path_from === false) {
return false;
@@ -548,9 +548,9 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _dir_opendir($path, $options)
+ function _dir_opendir($path, $options)
{
- $path = $this->parse_path($path);
+ $path = $this->_parse_path($path);
if ($path === false) {
return false;
}
@@ -565,7 +565,7 @@ class Stream extends SFTP
* @return mixed
* @access public
*/
- private function _dir_readdir()
+ function _dir_readdir()
{
if (isset($this->entries[$this->pos])) {
return $this->entries[$this->pos++];
@@ -579,7 +579,7 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _dir_rewinddir()
+ function _dir_rewinddir()
{
$this->pos = 0;
return true;
@@ -591,7 +591,7 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _dir_closedir()
+ function _dir_closedir()
{
return true;
}
@@ -607,9 +607,9 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _mkdir($path, $mode, $options)
+ function _mkdir($path, $mode, $options)
{
- $path = $this->parse_path($path);
+ $path = $this->_parse_path($path);
if ($path === false) {
return false;
}
@@ -630,9 +630,9 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _rmdir($path, $options)
+ function _rmdir($path, $options)
{
- $path = $this->parse_path($path);
+ $path = $this->_parse_path($path);
if ($path === false) {
return false;
}
@@ -643,12 +643,12 @@ class Stream extends SFTP
/**
* Flushes the output
*
- * See <http://php.net/fflush>. Always returns true because \phpseclib3\Net\SFTP doesn't cache stuff before writing
+ * See <http://php.net/fflush>. Always returns true because \phpseclib\Net\SFTP doesn't cache stuff before writing
*
* @return bool
* @access public
*/
- private function _stream_flush()
+ function _stream_flush()
{
return true;
}
@@ -659,7 +659,7 @@ class Stream extends SFTP
* @return mixed
* @access public
*/
- private function _stream_stat()
+ function _stream_stat()
{
$results = $this->sftp->stat($this->path);
if ($results === false) {
@@ -675,9 +675,9 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _unlink($path)
+ function _unlink($path)
{
- $path = $this->parse_path($path);
+ $path = $this->_parse_path($path);
if ($path === false) {
return false;
}
@@ -688,7 +688,7 @@ class Stream extends SFTP
/**
* Retrieve information about a file
*
- * Ignores the STREAM_URL_STAT_QUIET flag because the entirety of \phpseclib3\Net\SFTP\Stream is quiet by default
+ * Ignores the STREAM_URL_STAT_QUIET flag because the entirety of \phpseclib\Net\SFTP\Stream is quiet by default
* might be worthwhile to reconstruct bits 12-16 (ie. the file type) if mode doesn't have them but we'll
* cross that bridge when and if it's reached
*
@@ -697,9 +697,9 @@ class Stream extends SFTP
* @return mixed
* @access public
*/
- private function _url_stat($path, $flags)
+ function _url_stat($path, $flags)
{
- $path = $this->parse_path($path);
+ $path = $this->_parse_path($path);
if ($path === false) {
return false;
}
@@ -719,7 +719,7 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _stream_truncate($new_size)
+ function _stream_truncate($new_size)
{
if (!$this->sftp->truncate($this->path, $new_size)) {
return false;
@@ -735,7 +735,7 @@ class Stream extends SFTP
* Change stream options
*
* STREAM_OPTION_WRITE_BUFFER isn't supported for the same reason stream_flush isn't.
- * The other two aren't supported because of limitations in \phpseclib3\Net\SFTP.
+ * The other two aren't supported because of limitations in \phpseclib\Net\SFTP.
*
* @param int $option
* @param int $arg1
@@ -743,7 +743,7 @@ class Stream extends SFTP
* @return bool
* @access public
*/
- private function _stream_set_option($option, $arg1, $arg2)
+ function _stream_set_option($option, $arg1, $arg2)
{
return false;
}
@@ -753,7 +753,7 @@ class Stream extends SFTP
*
* @access public
*/
- private function _stream_close()
+ function _stream_close()
{
}
@@ -772,7 +772,7 @@ class Stream extends SFTP
* @return mixed
* @access public
*/
- public function __call($name, $arguments)
+ function __call($name, $arguments)
{
if (defined('NET_SFTP_STREAM_LOGGING')) {
echo $name . '(';
@@ -789,6 +789,6 @@ class Stream extends SFTP
if (!method_exists($this, $name)) {
return false;
}
- return $this->$name(...$arguments);
+ return call_user_func_array(array($this, $name), $arguments);
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/Net/SSH2.php b/vendor/phpseclib/phpseclib/phpseclib/Net/SSH2.php
index 8ad3dcc36..e2571190b 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/Net/SSH2.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/Net/SSH2.php
@@ -10,7 +10,7 @@
* <?php
* include 'vendor/autoload.php';
*
- * $ssh = new \phpseclib3\Net\SSH2('www.domain.tld');
+ * $ssh = new \phpseclib\Net\SSH2('www.domain.tld');
* if (!$ssh->login('username', 'password')) {
* exit('Login Failed');
* }
@@ -24,9 +24,11 @@
* <?php
* include 'vendor/autoload.php';
*
- * $key = \phpseclib3\Crypt\PublicKeyLoader::load('...', '(optional) password');
+ * $key = new \phpseclib\Crypt\RSA();
+ * //$key->setPassword('whatever');
+ * $key->loadKey(file_get_contents('privatekey'));
*
- * $ssh = new \phpseclib3\Net\SSH2('www.domain.tld');
+ * $ssh = new \phpseclib\Net\SSH2('www.domain.tld');
* if (!$ssh->login('username', $key)) {
* exit('Login Failed');
* }
@@ -45,31 +47,19 @@
* @link http://phpseclib.sourceforge.net
*/
-namespace phpseclib3\Net;
-
-use phpseclib3\Crypt\Blowfish;
-use phpseclib3\Crypt\Hash;
-use phpseclib3\Crypt\Random;
-use phpseclib3\Crypt\RC4;
-use phpseclib3\Crypt\Rijndael;
-use phpseclib3\Crypt\Common\PrivateKey;
-use phpseclib3\Crypt\RSA;
-use phpseclib3\Crypt\DSA;
-use phpseclib3\Crypt\EC;
-use phpseclib3\Crypt\DH;
-use phpseclib3\Crypt\TripleDES;
-use phpseclib3\Crypt\Twofish;
-use phpseclib3\Crypt\ChaCha20;
-use phpseclib3\Math\BigInteger; // Used to do Diffie-Hellman key exchange and DSA/RSA signature verification.
-use phpseclib3\System\SSH\Agent;
-use phpseclib3\System\SSH\Agent\Identity as AgentIdentity;
-use phpseclib3\Exception\NoSupportedAlgorithmsException;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-use phpseclib3\Exception\UnsupportedCurveException;
-use phpseclib3\Exception\ConnectionClosedException;
-use phpseclib3\Exception\UnableToConnectException;
-use phpseclib3\Exception\InsufficientSetupException;
-use phpseclib3\Common\Functions\Strings;
+namespace phpseclib\Net;
+
+use phpseclib\Crypt\Base;
+use phpseclib\Crypt\Blowfish;
+use phpseclib\Crypt\Hash;
+use phpseclib\Crypt\Random;
+use phpseclib\Crypt\RC4;
+use phpseclib\Crypt\Rijndael;
+use phpseclib\Crypt\RSA;
+use phpseclib\Crypt\TripleDES;
+use phpseclib\Crypt\Twofish;
+use phpseclib\Math\BigInteger; // Used to do Diffie-Hellman key exchange and DSA/RSA signature verification.
+use phpseclib\System\SSH\Agent;
/**
* Pure-PHP implementation of SSHv2.
@@ -80,84 +70,79 @@ use phpseclib3\Common\Functions\Strings;
*/
class SSH2
{
- // Execution Bitmap Masks
+ /**#@+
+ * Execution Bitmap Masks
+ *
+ * @see \phpseclib\Net\SSH2::bitmap
+ * @access private
+ */
const MASK_CONSTRUCTOR = 0x00000001;
const MASK_CONNECTED = 0x00000002;
const MASK_LOGIN_REQ = 0x00000004;
const MASK_LOGIN = 0x00000008;
const MASK_SHELL = 0x00000010;
const MASK_WINDOW_ADJUST = 0x00000020;
+ /**#@-*/
- /*
+ /**#@+
* Channel constants
*
* RFC4254 refers not to client and server channels but rather to sender and recipient channels. we don't refer
* to them in that way because RFC4254 toggles the meaning. the client sends a SSH_MSG_CHANNEL_OPEN message with
* a sender channel and the server sends a SSH_MSG_CHANNEL_OPEN_CONFIRMATION in response, with a sender and a
- * recipient channel. at first glance, you might conclude that SSH_MSG_CHANNEL_OPEN_CONFIRMATION's sender channel
- * would be the same thing as SSH_MSG_CHANNEL_OPEN's sender channel, but it's not, per this snippet:
+ * recepient channel. at first glance, you might conclude that SSH_MSG_CHANNEL_OPEN_CONFIRMATION's sender channel
+ * would be the same thing as SSH_MSG_CHANNEL_OPEN's sender channel, but it's not, per this snipet:
* The 'recipient channel' is the channel number given in the original
* open request, and 'sender channel' is the channel number allocated by
* the other side.
*
- * @see \phpseclib3\Net\SSH2::send_channel_packet()
- * @see \phpseclib3\Net\SSH2::get_channel_packet()
+ * @see \phpseclib\Net\SSH2::_send_channel_packet()
+ * @see \phpseclib\Net\SSH2::_get_channel_packet()
* @access private
- */
+ */
const CHANNEL_EXEC = 1; // PuTTy uses 0x100
const CHANNEL_SHELL = 2;
const CHANNEL_SUBSYSTEM = 3;
const CHANNEL_AGENT_FORWARD = 4;
const CHANNEL_KEEP_ALIVE = 5;
+ /**#@-*/
+ /**#@+
+ * @access public
+ * @see \phpseclib\Net\SSH2::getLog()
+ */
/**
* Returns the message numbers
- *
- * @access public
- * @see \phpseclib3\Net\SSH2::getLog()
*/
const LOG_SIMPLE = 1;
/**
* Returns the message content
- *
- * @access public
- * @see \phpseclib3\Net\SSH2::getLog()
*/
const LOG_COMPLEX = 2;
/**
* Outputs the content real-time
- *
- * @access public
- * @see \phpseclib3\Net\SSH2::getLog()
*/
const LOG_REALTIME = 3;
/**
* Dumps the content real-time to a file
- *
- * @access public
- * @see \phpseclib3\Net\SSH2::getLog()
*/
const LOG_REALTIME_FILE = 4;
/**
* Make sure that the log never gets larger than this
- *
- * @access public
- * @see \phpseclib3\Net\SSH2::getLog()
*/
const LOG_MAX_SIZE = 1048576; // 1024 * 1024
+ /**#@-*/
+ /**#@+
+ * @access public
+ * @see \phpseclib\Net\SSH2::read()
+ */
/**
* Returns when a string matching $expect exactly is found
- *
- * @access public
- * @see \phpseclib3\Net\SSH2::read()
*/
const READ_SIMPLE = 1;
/**
* Returns when a string matching the regular expression $expect is found
- *
- * @access public
- * @see \phpseclib3\Net\SSH2::read()
*/
const READ_REGEX = 2;
/**
@@ -165,11 +150,9 @@ class SSH2
*
* Some data packets may only contain a single character so it may be necessary
* to call read() multiple times when using this option
- *
- * @access public
- * @see \phpseclib3\Net\SSH2::read()
*/
const READ_NEXT = 3;
+ /**#@-*/
/**
* The SSH identifier
@@ -177,7 +160,7 @@ class SSH2
* @var string
* @access private
*/
- private $identifier;
+ var $identifier;
/**
* The Socket Object
@@ -185,7 +168,7 @@ class SSH2
* @var object
* @access private
*/
- protected $fsock;
+ var $fsock;
/**
* Execution Bitmap
@@ -196,17 +179,17 @@ class SSH2
* @var int
* @access private
*/
- protected $bitmap = 0;
+ var $bitmap = 0;
/**
* Error information
*
* @see self::getErrors()
* @see self::getLastError()
- * @var array
+ * @var string
* @access private
*/
- private $errors = [];
+ var $errors = array();
/**
* Server Identifier
@@ -215,7 +198,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $server_identifier = false;
+ var $server_identifier = false;
/**
* Key Exchange Algorithms
@@ -224,7 +207,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $kex_algorithms = false;
+ var $kex_algorithms = false;
/**
* Key Exchange Algorithm
@@ -233,7 +216,7 @@ class SSH2
* @var string|false
* @access private
*/
- private $kex_algorithm = false;
+ var $kex_algorithm = false;
/**
* Minimum Diffie-Hellman Group Bit Size in RFC 4419 Key Exchange Methods
@@ -242,7 +225,7 @@ class SSH2
* @var int
* @access private
*/
- private $kex_dh_group_size_min = 1536;
+ var $kex_dh_group_size_min = 1536;
/**
* Preferred Diffie-Hellman Group Bit Size in RFC 4419 Key Exchange Methods
@@ -251,7 +234,7 @@ class SSH2
* @var int
* @access private
*/
- private $kex_dh_group_size_preferred = 2048;
+ var $kex_dh_group_size_preferred = 2048;
/**
* Maximum Diffie-Hellman Group Bit Size in RFC 4419 Key Exchange Methods
@@ -260,7 +243,7 @@ class SSH2
* @var int
* @access private
*/
- private $kex_dh_group_size_max = 4096;
+ var $kex_dh_group_size_max = 4096;
/**
* Server Host Key Algorithms
@@ -269,7 +252,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $server_host_key_algorithms = false;
+ var $server_host_key_algorithms = false;
/**
* Encryption Algorithms: Client to Server
@@ -278,7 +261,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $encryption_algorithms_client_to_server = false;
+ var $encryption_algorithms_client_to_server = false;
/**
* Encryption Algorithms: Server to Client
@@ -287,7 +270,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $encryption_algorithms_server_to_client = false;
+ var $encryption_algorithms_server_to_client = false;
/**
* MAC Algorithms: Client to Server
@@ -296,7 +279,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $mac_algorithms_client_to_server = false;
+ var $mac_algorithms_client_to_server = false;
/**
* MAC Algorithms: Server to Client
@@ -305,7 +288,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $mac_algorithms_server_to_client = false;
+ var $mac_algorithms_server_to_client = false;
/**
* Compression Algorithms: Client to Server
@@ -314,7 +297,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $compression_algorithms_client_to_server = false;
+ var $compression_algorithms_client_to_server = false;
/**
* Compression Algorithms: Server to Client
@@ -323,7 +306,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $compression_algorithms_server_to_client = false;
+ var $compression_algorithms_server_to_client = false;
/**
* Languages: Server to Client
@@ -332,7 +315,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $languages_server_to_client = false;
+ var $languages_server_to_client = false;
/**
* Languages: Client to Server
@@ -341,7 +324,7 @@ class SSH2
* @var array|false
* @access private
*/
- private $languages_client_to_server = false;
+ var $languages_client_to_server = false;
/**
* Preferred Algorithms
@@ -350,7 +333,7 @@ class SSH2
* @var array
* @access private
*/
- private $preferred = [];
+ var $preferred = array();
/**
* Block Size for Server to Client Encryption
@@ -367,7 +350,7 @@ class SSH2
* @var int
* @access private
*/
- private $encrypt_block_size = 8;
+ var $encrypt_block_size = 8;
/**
* Block Size for Client to Server Encryption
@@ -377,7 +360,7 @@ class SSH2
* @var int
* @access private
*/
- private $decrypt_block_size = 8;
+ var $decrypt_block_size = 8;
/**
* Server to Client Encryption Object
@@ -386,16 +369,7 @@ class SSH2
* @var object
* @access private
*/
- private $decrypt = false;
-
- /**
- * Server to Client Length Encryption Object
- *
- * @see self::_get_binary_packet()
- * @var object
- * @access private
- */
- private $lengthDecrypt = false;
+ var $decrypt = false;
/**
* Client to Server Encryption Object
@@ -404,16 +378,7 @@ class SSH2
* @var object
* @access private
*/
- private $encrypt = false;
-
- /**
- * Client to Server Length Encryption Object
- *
- * @see self::_send_binary_packet()
- * @var object
- * @access private
- */
- private $lengthEncrypt = false;
+ var $encrypt = false;
/**
* Client to Server HMAC Object
@@ -422,7 +387,7 @@ class SSH2
* @var object
* @access private
*/
- private $hmac_create = false;
+ var $hmac_create = false;
/**
* Server to Client HMAC Object
@@ -431,7 +396,7 @@ class SSH2
* @var object
* @access private
*/
- private $hmac_check = false;
+ var $hmac_check = false;
/**
* Size of server to client HMAC
@@ -444,7 +409,7 @@ class SSH2
* @var int
* @access private
*/
- private $hmac_size = false;
+ var $hmac_size = false;
/**
* Server Public Host Key
@@ -453,7 +418,7 @@ class SSH2
* @var string
* @access private
*/
- private $server_public_host_key;
+ var $server_public_host_key;
/**
* Session identifier
@@ -468,7 +433,7 @@ class SSH2
* @var string
* @access private
*/
- private $session_id = false;
+ var $session_id = false;
/**
* Exchange hash
@@ -479,7 +444,7 @@ class SSH2
* @var string
* @access private
*/
- private $exchange_hash = false;
+ var $exchange_hash = false;
/**
* Message Numbers
@@ -488,7 +453,7 @@ class SSH2
* @var array
* @access private
*/
- private $message_numbers = [];
+ var $message_numbers = array();
/**
* Disconnection Message 'reason codes' defined in RFC4253
@@ -497,7 +462,7 @@ class SSH2
* @var array
* @access private
*/
- private $disconnect_reasons = [];
+ var $disconnect_reasons = array();
/**
* SSH_MSG_CHANNEL_OPEN_FAILURE 'reason codes', defined in RFC4254
@@ -506,7 +471,7 @@ class SSH2
* @var array
* @access private
*/
- private $channel_open_failure_reasons = [];
+ var $channel_open_failure_reasons = array();
/**
* Terminal Modes
@@ -516,7 +481,7 @@ class SSH2
* @var array
* @access private
*/
- private $terminal_modes = [];
+ var $terminal_modes = array();
/**
* SSH_MSG_CHANNEL_EXTENDED_DATA's data_type_codes
@@ -526,7 +491,7 @@ class SSH2
* @var array
* @access private
*/
- private $channel_extended_data_type_codes = [];
+ var $channel_extended_data_type_codes = array();
/**
* Send Sequence Number
@@ -537,7 +502,7 @@ class SSH2
* @var int
* @access private
*/
- private $send_seq_no = 0;
+ var $send_seq_no = 0;
/**
* Get Sequence Number
@@ -548,19 +513,19 @@ class SSH2
* @var int
* @access private
*/
- private $get_seq_no = 0;
+ var $get_seq_no = 0;
/**
* Server Channels
*
* Maps client channels to server channels
*
- * @see self::get_channel_packet()
+ * @see self::_get_channel_packet()
* @see self::exec()
* @var array
* @access private
*/
- protected $server_channels = [];
+ var $server_channels = array();
/**
* Channel Buffers
@@ -568,34 +533,34 @@ class SSH2
* If a client requests a packet from one channel but receives two packets from another those packets should
* be placed in a buffer
*
- * @see self::get_channel_packet()
+ * @see self::_get_channel_packet()
* @see self::exec()
* @var array
* @access private
*/
- private $channel_buffers = [];
+ var $channel_buffers = array();
/**
* Channel Status
*
* Contains the type of the last sent message
*
- * @see self::get_channel_packet()
+ * @see self::_get_channel_packet()
* @var array
* @access private
*/
- protected $channel_status = [];
+ var $channel_status = array();
/**
* Packet Size
*
* Maximum packet size indexed by channel
*
- * @see self::send_channel_packet()
+ * @see self::_send_channel_packet()
* @var array
* @access private
*/
- private $packet_size_client_to_server = [];
+ var $packet_size_client_to_server = array();
/**
* Message Number Log
@@ -604,7 +569,7 @@ class SSH2
* @var array
* @access private
*/
- private $message_number_log = [];
+ var $message_number_log = array();
/**
* Message Log
@@ -613,7 +578,7 @@ class SSH2
* @var array
* @access private
*/
- private $message_log = [];
+ var $message_log = array();
/**
* The Window Size
@@ -621,11 +586,11 @@ class SSH2
* Bytes the other party can send before it must wait for the window to be adjusted (0x7FFFFFFF = 2GB)
*
* @var int
- * @see self::send_channel_packet()
+ * @see self::_send_channel_packet()
* @see self::exec()
* @access private
*/
- protected $window_size = 0x7FFFFFFF;
+ var $window_size = 0x7FFFFFFF;
/**
* What we resize the window to
@@ -646,22 +611,22 @@ class SSH2
*
* Window size indexed by channel
*
- * @see self::send_channel_packet()
+ * @see self::_send_channel_packet()
* @var array
* @access private
*/
- protected $window_size_server_to_client = [];
+ var $window_size_server_to_client = array();
/**
* Window size, client to server
*
* Window size indexed by channel
*
- * @see self::get_channel_packet()
+ * @see self::_get_channel_packet()
* @var array
* @access private
*/
- private $window_size_client_to_server = [];
+ var $window_size_client_to_server = array();
/**
* Server signature
@@ -672,7 +637,7 @@ class SSH2
* @var string
* @access private
*/
- private $signature = '';
+ var $signature = '';
/**
* Server signature format
@@ -683,7 +648,7 @@ class SSH2
* @var string
* @access private
*/
- private $signature_format = '';
+ var $signature_format = '';
/**
* Interactive Buffer
@@ -692,7 +657,7 @@ class SSH2
* @var array
* @access private
*/
- private $interactiveBuffer = '';
+ var $interactiveBuffer = '';
/**
* Current log size
@@ -704,7 +669,7 @@ class SSH2
* @var int
* @access private
*/
- private $log_size;
+ var $log_size;
/**
* Timeout
@@ -712,15 +677,15 @@ class SSH2
* @see self::setTimeout()
* @access private
*/
- protected $timeout;
+ var $timeout;
/**
* Current Timeout
*
- * @see self::get_channel_packet()
+ * @see self::_get_channel_packet()
* @access private
*/
- protected $curTimeout;
+ var $curTimeout;
/**
* Keep Alive Interval
@@ -737,7 +702,7 @@ class SSH2
* @var resource
* @access private
*/
- private $realtime_log_file;
+ var $realtime_log_file;
/**
* Real-time log file size
@@ -746,7 +711,7 @@ class SSH2
* @var int
* @access private
*/
- private $realtime_log_size;
+ var $realtime_log_size;
/**
* Has the signature been validated?
@@ -755,7 +720,7 @@ class SSH2
* @var bool
* @access private
*/
- private $signature_validated = false;
+ var $signature_validated = false;
/**
* Real-time log file wrap boolean
@@ -763,7 +728,7 @@ class SSH2
* @see self::_append_log()
* @access private
*/
- private $realtime_log_wrap;
+ var $realtime_log_wrap;
/**
* Flag to suppress stderr from output
@@ -771,7 +736,7 @@ class SSH2
* @see self::enableQuietMode()
* @access private
*/
- private $quiet_mode = false;
+ var $quiet_mode = false;
/**
* Time of first network activity
@@ -779,7 +744,7 @@ class SSH2
* @var int
* @access private
*/
- private $last_packet;
+ var $last_packet;
/**
* Exit status returned from ssh if any
@@ -787,7 +752,7 @@ class SSH2
* @var int
* @access private
*/
- private $exit_status;
+ var $exit_status;
/**
* Flag to request a PTY when using exec()
@@ -796,7 +761,7 @@ class SSH2
* @see self::enablePTY()
* @access private
*/
- private $request_pty = false;
+ var $request_pty = false;
/**
* Flag set while exec() is running when using enablePTY()
@@ -804,7 +769,7 @@ class SSH2
* @var bool
* @access private
*/
- private $in_request_pty_exec = false;
+ var $in_request_pty_exec = false;
/**
* Flag set after startSubsystem() is called
@@ -812,7 +777,7 @@ class SSH2
* @var bool
* @access private
*/
- private $in_subsystem;
+ var $in_subsystem;
/**
* Contents of stdError
@@ -820,7 +785,7 @@ class SSH2
* @var string
* @access private
*/
- private $stdErrorLog;
+ var $stdErrorLog;
/**
* The Last Interactive Response
@@ -829,7 +794,7 @@ class SSH2
* @var string
* @access private
*/
- private $last_interactive_response = '';
+ var $last_interactive_response = '';
/**
* Keyboard Interactive Request / Responses
@@ -838,7 +803,7 @@ class SSH2
* @var array
* @access private
*/
- private $keyboard_requests_responses = [];
+ var $keyboard_requests_responses = array();
/**
* Banner Message
@@ -851,7 +816,7 @@ class SSH2
* @var string
* @access private
*/
- private $banner_message = '';
+ var $banner_message = '';
/**
* Did read() timeout or return normally?
@@ -860,7 +825,7 @@ class SSH2
* @var bool
* @access private
*/
- private $is_timeout = false;
+ var $is_timeout = false;
/**
* Log Boundary
@@ -869,7 +834,7 @@ class SSH2
* @var string
* @access private
*/
- private $log_boundary = ':';
+ var $log_boundary = ':';
/**
* Log Long Width
@@ -878,7 +843,7 @@ class SSH2
* @var int
* @access private
*/
- private $log_long_width = 65;
+ var $log_long_width = 65;
/**
* Log Short Width
@@ -887,7 +852,7 @@ class SSH2
* @var int
* @access private
*/
- private $log_short_width = 16;
+ var $log_short_width = 16;
/**
* Hostname
@@ -897,7 +862,7 @@ class SSH2
* @var string
* @access private
*/
- private $host;
+ var $host;
/**
* Port Number
@@ -907,7 +872,7 @@ class SSH2
* @var int
* @access private
*/
- private $port;
+ var $port;
/**
* Number of columns for terminal window size
@@ -918,7 +883,7 @@ class SSH2
* @var int
* @access private
*/
- private $windowColumns = 80;
+ var $windowColumns = 80;
/**
* Number of columns for terminal window size
@@ -929,7 +894,7 @@ class SSH2
* @var int
* @access private
*/
- private $windowRows = 24;
+ var $windowRows = 24;
/**
* Crypto Engine
@@ -939,23 +904,15 @@ class SSH2
* @var int
* @access private
*/
- private static $crypto_engine = false;
+ var $crypto_engine = false;
/**
* A System_SSH_Agent for use in the SSH2 Agent Forwarding scenario
*
- * @var \phpseclib3\System\Ssh\Agent
+ * @var System_SSH_Agent
* @access private
*/
- private $agent;
-
- /**
- * Connection storage to replicates ssh2 extension functionality:
- * {@link http://php.net/manual/en/wrappers.ssh2.php#refsect1-wrappers.ssh2-examples}
- *
- * @var SSH2[]
- */
- private static $connections;
+ var $agent;
/**
* Send the identification string first?
@@ -963,7 +920,7 @@ class SSH2
* @var bool
* @access private
*/
- private $send_id_string_first = true;
+ var $send_id_string_first = true;
/**
* Send the key exchange initiation packet first?
@@ -971,7 +928,7 @@ class SSH2
* @var bool
* @access private
*/
- private $send_kex_first = true;
+ var $send_kex_first = true;
/**
* Some versions of OpenSSH incorrectly calculate the key size
@@ -979,7 +936,7 @@ class SSH2
* @var bool
* @access private
*/
- private $bad_key_size_fix = false;
+ var $bad_key_size_fix = false;
/**
* Should we try to re-connect to re-establish keys?
@@ -987,7 +944,7 @@ class SSH2
* @var bool
* @access private
*/
- private $retry_connect = false;
+ var $retry_connect = false;
/**
* Binary Packet Buffer
@@ -995,7 +952,7 @@ class SSH2
* @var string|false
* @access private
*/
- private $binary_packet_buffer = false;
+ var $binary_packet_buffer = false;
/**
* Preferred Signature Format
@@ -1003,7 +960,7 @@ class SSH2
* @var string|false
* @access private
*/
- protected $preferred_signature_format = false;
+ var $preferred_signature_format = false;
/**
* Authentication Credentials
@@ -1011,7 +968,7 @@ class SSH2
* @var array
* @access private
*/
- protected $auth = [];
+ var $auth = array();
/**
* Default Constructor.
@@ -1022,12 +979,12 @@ class SSH2
* @param int $port
* @param int $timeout
* @see self::login()
- * @return SSH2|void
+ * @return \phpseclib\Net\SSH2
* @access public
*/
- public function __construct($host, $port = 22, $timeout = 10)
+ function __construct($host, $port = 22, $timeout = 10)
{
- $this->message_numbers = [
+ $this->message_numbers = array(
1 => 'NET_SSH2_MSG_DISCONNECT',
2 => 'NET_SSH2_MSG_IGNORE',
3 => 'NET_SSH2_MSG_UNIMPLEMENTED',
@@ -1057,8 +1014,8 @@ class SSH2
98 => 'NET_SSH2_MSG_CHANNEL_REQUEST',
99 => 'NET_SSH2_MSG_CHANNEL_SUCCESS',
100 => 'NET_SSH2_MSG_CHANNEL_FAILURE'
- ];
- $this->disconnect_reasons = [
+ );
+ $this->disconnect_reasons = array(
1 => 'NET_SSH2_DISCONNECT_HOST_NOT_ALLOWED_TO_CONNECT',
2 => 'NET_SSH2_DISCONNECT_PROTOCOL_ERROR',
3 => 'NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED',
@@ -1074,40 +1031,38 @@ class SSH2
13 => 'NET_SSH2_DISCONNECT_AUTH_CANCELLED_BY_USER',
14 => 'NET_SSH2_DISCONNECT_NO_MORE_AUTH_METHODS_AVAILABLE',
15 => 'NET_SSH2_DISCONNECT_ILLEGAL_USER_NAME'
- ];
- $this->channel_open_failure_reasons = [
+ );
+ $this->channel_open_failure_reasons = array(
1 => 'NET_SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED'
- ];
- $this->terminal_modes = [
+ );
+ $this->terminal_modes = array(
0 => 'NET_SSH2_TTY_OP_END'
- ];
- $this->channel_extended_data_type_codes = [
+ );
+ $this->channel_extended_data_type_codes = array(
1 => 'NET_SSH2_EXTENDED_DATA_STDERR'
- ];
+ );
- $this->define_array(
+ $this->_define_array(
$this->message_numbers,
$this->disconnect_reasons,
$this->channel_open_failure_reasons,
$this->terminal_modes,
$this->channel_extended_data_type_codes,
- [60 => 'NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ'],
- [60 => 'NET_SSH2_MSG_USERAUTH_PK_OK'],
- [60 => 'NET_SSH2_MSG_USERAUTH_INFO_REQUEST',
- 61 => 'NET_SSH2_MSG_USERAUTH_INFO_RESPONSE'],
+ array(60 => 'NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ'),
+ array(60 => 'NET_SSH2_MSG_USERAUTH_PK_OK'),
+ array(60 => 'NET_SSH2_MSG_USERAUTH_INFO_REQUEST',
+ 61 => 'NET_SSH2_MSG_USERAUTH_INFO_RESPONSE'),
// RFC 4419 - diffie-hellman-group-exchange-sha{1,256}
- [30 => 'NET_SSH2_MSG_KEXDH_GEX_REQUEST_OLD',
+ array(30 => 'NET_SSH2_MSG_KEXDH_GEX_REQUEST_OLD',
31 => 'NET_SSH2_MSG_KEXDH_GEX_GROUP',
32 => 'NET_SSH2_MSG_KEXDH_GEX_INIT',
33 => 'NET_SSH2_MSG_KEXDH_GEX_REPLY',
- 34 => 'NET_SSH2_MSG_KEXDH_GEX_REQUEST'],
+ 34 => 'NET_SSH2_MSG_KEXDH_GEX_REQUEST'),
// RFC 5656 - Elliptic Curves (for curve25519-sha256@libssh.org)
- [30 => 'NET_SSH2_MSG_KEX_ECDH_INIT',
- 31 => 'NET_SSH2_MSG_KEX_ECDH_REPLY']
+ array(30 => 'NET_SSH2_MSG_KEX_ECDH_INIT',
+ 31 => 'NET_SSH2_MSG_KEX_ECDH_REPLY')
);
- self::$connections[$this->getResourceId()] = $this;
-
if (is_resource($host)) {
$this->fsock = $host;
return;
@@ -1124,14 +1079,14 @@ class SSH2
* Set Crypto Engine Mode
*
* Possible $engine values:
- * OpenSSL, mcrypt, Eval, PHP
+ * CRYPT_MODE_INTERNAL, CRYPT_MODE_MCRYPT
*
* @param int $engine
* @access public
*/
- public static function setCryptoEngine($engine)
+ function setCryptoEngine($engine)
{
- self::$crypto_engine = $engine;
+ $this->crypto_engine = $engine;
}
/**
@@ -1143,7 +1098,7 @@ class SSH2
*
* @access public
*/
- public function sendIdentificationStringFirst()
+ function sendIdentificationStringFirst()
{
$this->send_id_string_first = true;
}
@@ -1157,7 +1112,7 @@ class SSH2
*
* @access public
*/
- public function sendIdentificationStringLast()
+ function sendIdentificationStringLast()
{
$this->send_id_string_first = false;
}
@@ -1171,7 +1126,7 @@ class SSH2
*
* @access public
*/
- public function sendKEXINITFirst()
+ function sendKEXINITFirst()
{
$this->send_kex_first = true;
}
@@ -1185,7 +1140,7 @@ class SSH2
*
* @access public
*/
- public function sendKEXINITLast()
+ function sendKEXINITLast()
{
$this->send_kex_first = false;
}
@@ -1194,11 +1149,9 @@ class SSH2
* Connect to an SSHv2 server
*
* @return bool
- * @throws \UnexpectedValueException on receipt of unexpected packets
- * @throws \RuntimeException on other errors
* @access private
*/
- private function connect()
+ function _connect()
{
if ($this->bitmap & self::MASK_CONSTRUCTOR) {
return false;
@@ -1218,7 +1171,8 @@ class SSH2
$this->fsock = @fsockopen($this->host, $this->port, $errno, $errstr, $this->curTimeout == 0 ? 100000 : $this->curTimeout);
if (!$this->fsock) {
$host = $this->host . ':' . $this->port;
- throw new UnableToConnectException(rtrim("Cannot connect to $host. Error $errno. $errstr"));
+ user_error(rtrim("Cannot connect to $host. Error $errno. $errstr"));
+ return false;
}
$elapsed = microtime(true) - $start;
@@ -1231,7 +1185,7 @@ class SSH2
}
}
- $this->identifier = $this->generate_identifier();
+ $this->identifier = $this->_generate_identifier();
if ($this->send_id_string_first) {
fputs($this->fsock, $this->identifier . "\r\n");
@@ -1253,12 +1207,14 @@ class SSH2
$this->is_timeout = true;
return false;
}
- $read = [$this->fsock];
+ $read = array($this->fsock);
$write = $except = null;
$start = microtime(true);
$sec = floor($this->curTimeout);
$usec = 1000000 * ($this->curTimeout - $sec);
- if (@stream_select($read, $write, $except, $sec, $usec) === false) {
+ // on windows this returns a "Warning: Invalid CRT parameters detected" error
+ // the !count() is done as a workaround for <https://bugs.php.net/42682>
+ if (!@stream_select($read, $write, $except, $sec, $usec) && !count($read)) {
$this->is_timeout = true;
return false;
}
@@ -1294,14 +1250,15 @@ class SSH2
if (feof($this->fsock)) {
$this->bitmap = 0;
- throw new ConnectionClosedException('Connection closed by server');
+ user_error('Connection closed by server');
+ return false;
}
$extra = $matches[1];
if (defined('NET_SSH2_LOGGING')) {
- $this->append_log('<-', $matches[0]);
- $this->append_log('->', $this->identifier . "\r\n");
+ $this->_append_log('<-', $matches[0]);
+ $this->_append_log('->', $this->identifier . "\r\n");
}
$this->server_identifier = trim($temp, "\r\n");
@@ -1310,8 +1267,8 @@ class SSH2
}
if (version_compare($matches[3], '1.99', '<')) {
- $this->bitmap = 0;
- throw new UnableToConnectException("Cannot connect to SSH $matches[3] servers");
+ user_error("Cannot connect to SSH $matches[3] servers");
+ return false;
}
if (!$this->send_id_string_first) {
@@ -1319,23 +1276,24 @@ class SSH2
}
if (!$this->send_kex_first) {
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
$this->bitmap = 0;
- throw new ConnectionClosedException('Connection closed by server');
+ user_error('Connection closed by server');
+ return false;
}
if (!strlen($response) || ord($response[0]) != NET_SSH2_MSG_KEXINIT) {
- $this->bitmap = 0;
- throw new \UnexpectedValueException('Expected SSH_MSG_KEXINIT');
+ user_error('Expected SSH_MSG_KEXINIT');
+ return false;
}
- if (!$this->key_exchange($response)) {
+ if (!$this->_key_exchange($response)) {
return false;
}
}
- if ($this->send_kex_first && !$this->key_exchange()) {
+ if ($this->send_kex_first && !$this->_key_exchange()) {
return false;
}
@@ -1352,12 +1310,12 @@ class SSH2
* @access protected
* @return string
*/
- private function generate_identifier()
+ function _generate_identifier()
{
- $identifier = 'SSH-2.0-phpseclib_3.0';
+ $identifier = 'SSH-2.0-phpseclib_2.0';
- $ext = [];
- if (extension_loaded('sodium')) {
+ $ext = array();
+ if (function_exists('sodium_crypto_box_publickey_from_secretkey')) {
$ext[] = 'libsodium';
}
@@ -1383,41 +1341,37 @@ class SSH2
/**
* Key Exchange
*
- * @return bool
- * @param string|bool $kexinit_payload_server optional
- * @throws \UnexpectedValueException on receipt of unexpected packets
- * @throws \RuntimeException on other errors
- * @throws \phpseclib3\Exception\NoSupportedAlgorithmsException when none of the algorithms phpseclib has loaded are compatible
+ * @param string $kexinit_payload_server optional
* @access private
*/
- private function key_exchange($kexinit_payload_server = false)
+ function _key_exchange($kexinit_payload_server = false)
{
$preferred = $this->preferred;
$kex_algorithms = isset($preferred['kex']) ?
$preferred['kex'] :
- SSH2::getSupportedKEXAlgorithms();
+ $this->getSupportedKEXAlgorithms();
$server_host_key_algorithms = isset($preferred['hostkey']) ?
$preferred['hostkey'] :
- SSH2::getSupportedHostKeyAlgorithms();
+ $this->getSupportedHostKeyAlgorithms();
$s2c_encryption_algorithms = isset($preferred['server_to_client']['crypt']) ?
$preferred['server_to_client']['crypt'] :
- SSH2::getSupportedEncryptionAlgorithms();
+ $this->getSupportedEncryptionAlgorithms();
$c2s_encryption_algorithms = isset($preferred['client_to_server']['crypt']) ?
$preferred['client_to_server']['crypt'] :
- SSH2::getSupportedEncryptionAlgorithms();
+ $this->getSupportedEncryptionAlgorithms();
$s2c_mac_algorithms = isset($preferred['server_to_client']['mac']) ?
$preferred['server_to_client']['mac'] :
- SSH2::getSupportedMACAlgorithms();
+ $this->getSupportedMACAlgorithms();
$c2s_mac_algorithms = isset($preferred['client_to_server']['mac']) ?
$preferred['client_to_server']['mac'] :
- SSH2::getSupportedMACAlgorithms();
+ $this->getSupportedMACAlgorithms();
$s2c_compression_algorithms = isset($preferred['server_to_client']['comp']) ?
$preferred['server_to_client']['comp'] :
- SSH2::getSupportedCompressionAlgorithms();
+ $this->getSupportedCompressionAlgorithms();
$c2s_compression_algorithms = isset($preferred['client_to_server']['comp']) ?
$preferred['client_to_server']['comp'] :
- SSH2::getSupportedCompressionAlgorithms();
+ $this->getSupportedCompressionAlgorithms();
// some SSH servers have buggy implementations of some of the above algorithms
switch (true) {
@@ -1426,166 +1380,209 @@ class SSH2
if (!isset($preferred['server_to_client']['mac'])) {
$s2c_mac_algorithms = array_values(array_diff(
$s2c_mac_algorithms,
- ['hmac-sha1-96', 'hmac-md5-96']
+ array('hmac-sha1-96', 'hmac-md5-96')
));
}
if (!isset($preferred['client_to_server']['mac'])) {
$c2s_mac_algorithms = array_values(array_diff(
$c2s_mac_algorithms,
- ['hmac-sha1-96', 'hmac-md5-96']
+ array('hmac-sha1-96', 'hmac-md5-96')
));
}
}
+ $str_kex_algorithms = implode(',', $kex_algorithms);
+ $str_server_host_key_algorithms = implode(',', $server_host_key_algorithms);
+ $encryption_algorithms_server_to_client = implode(',', $s2c_encryption_algorithms);
+ $encryption_algorithms_client_to_server = implode(',', $c2s_encryption_algorithms);
+ $mac_algorithms_server_to_client = implode(',', $s2c_mac_algorithms);
+ $mac_algorithms_client_to_server = implode(',', $c2s_mac_algorithms);
+ $compression_algorithms_server_to_client = implode(',', $s2c_compression_algorithms);
+ $compression_algorithms_client_to_server = implode(',', $c2s_compression_algorithms);
+
$client_cookie = Random::string(16);
- $kexinit_payload_client = pack('Ca*', NET_SSH2_MSG_KEXINIT, $client_cookie);
- $kexinit_payload_client.= Strings::packSSH2(
- 'L10bN',
- $kex_algorithms,
- $server_host_key_algorithms,
- $c2s_encryption_algorithms,
- $s2c_encryption_algorithms,
- $c2s_mac_algorithms,
- $s2c_mac_algorithms,
- $c2s_compression_algorithms,
- $s2c_compression_algorithms,
- [], // language, client to server
- [], // language, server to client
- false, // first_kex_packet_follows
- 0 // reserved for future extension
+ $kexinit_payload_client = pack(
+ 'Ca*Na*Na*Na*Na*Na*Na*Na*Na*Na*Na*CN',
+ NET_SSH2_MSG_KEXINIT,
+ $client_cookie,
+ strlen($str_kex_algorithms),
+ $str_kex_algorithms,
+ strlen($str_server_host_key_algorithms),
+ $str_server_host_key_algorithms,
+ strlen($encryption_algorithms_client_to_server),
+ $encryption_algorithms_client_to_server,
+ strlen($encryption_algorithms_server_to_client),
+ $encryption_algorithms_server_to_client,
+ strlen($mac_algorithms_client_to_server),
+ $mac_algorithms_client_to_server,
+ strlen($mac_algorithms_server_to_client),
+ $mac_algorithms_server_to_client,
+ strlen($compression_algorithms_client_to_server),
+ $compression_algorithms_client_to_server,
+ strlen($compression_algorithms_server_to_client),
+ $compression_algorithms_server_to_client,
+ 0,
+ '',
+ 0,
+ '',
+ 0,
+ 0
);
if ($this->send_kex_first) {
- $this->send_binary_packet($kexinit_payload_client);
+ if (!$this->_send_binary_packet($kexinit_payload_client)) {
+ return false;
+ }
- $kexinit_payload_server = $this->get_binary_packet();
+ $kexinit_payload_server = $this->_get_binary_packet();
if ($kexinit_payload_server === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
if (!strlen($kexinit_payload_server) || ord($kexinit_payload_server[0]) != NET_SSH2_MSG_KEXINIT) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_PROTOCOL_ERROR);
- throw new \UnexpectedValueException('Expected SSH_MSG_KEXINIT');
+ user_error('Expected SSH_MSG_KEXINIT');
+ return false;
}
}
$response = $kexinit_payload_server;
- Strings::shift($response, 1); // skip past the message number (it should be SSH_MSG_KEXINIT)
- $server_cookie = Strings::shift($response, 16);
-
- list(
- $this->kex_algorithms,
- $this->server_host_key_algorithms,
- $this->encryption_algorithms_client_to_server,
- $this->encryption_algorithms_server_to_client,
- $this->mac_algorithms_client_to_server,
- $this->mac_algorithms_server_to_client,
- $this->compression_algorithms_client_to_server,
- $this->compression_algorithms_server_to_client,
- $this->languages_client_to_server,
- $this->languages_server_to_client,
- $first_kex_packet_follows
- ) = Strings::unpackSSH2('L10C', $response);
+ $this->_string_shift($response, 1); // skip past the message number (it should be SSH_MSG_KEXINIT)
+ $server_cookie = $this->_string_shift($response, 16);
- if (!$this->send_kex_first) {
- $this->send_binary_packet($kexinit_payload_client);
+ if (strlen($response) < 4) {
+ return false;
}
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->kex_algorithms = explode(',', $this->_string_shift($response, $temp['length']));
- // we need to decide upon the symmetric encryption algorithms before we do the diffie-hellman key exchange
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->server_host_key_algorithms = explode(',', $this->_string_shift($response, $temp['length']));
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->encryption_algorithms_client_to_server = explode(',', $this->_string_shift($response, $temp['length']));
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->encryption_algorithms_server_to_client = explode(',', $this->_string_shift($response, $temp['length']));
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->mac_algorithms_client_to_server = explode(',', $this->_string_shift($response, $temp['length']));
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->mac_algorithms_server_to_client = explode(',', $this->_string_shift($response, $temp['length']));
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->compression_algorithms_client_to_server = explode(',', $this->_string_shift($response, $temp['length']));
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->compression_algorithms_server_to_client = explode(',', $this->_string_shift($response, $temp['length']));
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->languages_client_to_server = explode(',', $this->_string_shift($response, $temp['length']));
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->languages_server_to_client = explode(',', $this->_string_shift($response, $temp['length']));
+
+ if (!strlen($response)) {
+ return false;
+ }
+ extract(unpack('Cfirst_kex_packet_follows', $this->_string_shift($response, 1)));
+ $first_kex_packet_follows = $first_kex_packet_follows != 0;
+
+ if (!$this->send_kex_first && !$this->_send_binary_packet($kexinit_payload_client)) {
+ return false;
+ }
+
+ // we need to decide upon the symmetric encryption algorithms before we do the diffie-hellman key exchange
// we don't initialize any crypto-objects, yet - we do that, later. for now, we need the lengths to make the
// diffie-hellman key exchange as fast as possible
- $decrypt = self::array_intersect_first($s2c_encryption_algorithms, $this->encryption_algorithms_server_to_client);
- $decryptKeyLength = $this->encryption_algorithm_to_key_size($decrypt);
+ $decrypt = $this->_array_intersect_first($s2c_encryption_algorithms, $this->encryption_algorithms_server_to_client);
+ $decryptKeyLength = $this->_encryption_algorithm_to_key_size($decrypt);
if ($decryptKeyLength === null) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new NoSupportedAlgorithmsException('No compatible server to client encryption algorithms found');
+ user_error('No compatible server to client encryption algorithms found');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
- $encrypt = self::array_intersect_first($c2s_encryption_algorithms, $this->encryption_algorithms_client_to_server);
- $encryptKeyLength = $this->encryption_algorithm_to_key_size($encrypt);
+ $encrypt = $this->_array_intersect_first($c2s_encryption_algorithms, $this->encryption_algorithms_client_to_server);
+ $encryptKeyLength = $this->_encryption_algorithm_to_key_size($encrypt);
if ($encryptKeyLength === null) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new NoSupportedAlgorithmsException('No compatible client to server encryption algorithms found');
+ user_error('No compatible client to server encryption algorithms found');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
// through diffie-hellman key exchange a symmetric key is obtained
- $this->kex_algorithm = self::array_intersect_first($kex_algorithms, $this->kex_algorithms);
- if ($this->kex_algorithm === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new NoSupportedAlgorithmsException('No compatible key exchange algorithms found');
+ $this->kex_algorithm = $kex_algorithm = $this->_array_intersect_first($kex_algorithms, $this->kex_algorithms);
+ if ($kex_algorithm === false) {
+ user_error('No compatible key exchange algorithms found');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
- $server_host_key_algorithm = self::array_intersect_first($server_host_key_algorithms, $this->server_host_key_algorithms);
+ $server_host_key_algorithm = $this->_array_intersect_first($server_host_key_algorithms, $this->server_host_key_algorithms);
if ($server_host_key_algorithm === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new NoSupportedAlgorithmsException('No compatible server host key algorithms found');
+ user_error('No compatible server host key algorithms found');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
- $mac_algorithm_out = self::array_intersect_first($c2s_mac_algorithms, $this->mac_algorithms_client_to_server);
- if ($mac_algorithm_out === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new NoSupportedAlgorithmsException('No compatible client to server message authentication algorithms found');
- }
-
- $mac_algorithm_in = self::array_intersect_first($s2c_mac_algorithms, $this->mac_algorithms_server_to_client);
+ $mac_algorithm_in = $this->_array_intersect_first($s2c_mac_algorithms, $this->mac_algorithms_server_to_client);
if ($mac_algorithm_in === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new NoSupportedAlgorithmsException('No compatible server to client message authentication algorithms found');
+ user_error('No compatible server to client message authentication algorithms found');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
- $compression_algorithm_in = self::array_intersect_first($s2c_compression_algorithms, $this->compression_algorithms_server_to_client);
- if ($compression_algorithm_in === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new NoSupportedAlgorithmsException('No compatible server to client compression algorithms found');
+ $compression_algorithm_out = $this->_array_intersect_first($c2s_compression_algorithms, $this->compression_algorithms_client_to_server);
+ if ($compression_algorithm_out === false) {
+ user_error('No compatible client to server compression algorithms found');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
- $this->decompress = $compression_algorithm_in == 'zlib';
+ //$this->decompress = $compression_algorithm_out == 'zlib';
- $compression_algorithm_out = self::array_intersect_first($c2s_compression_algorithms, $this->compression_algorithms_client_to_server);
- if ($compression_algorithm_out === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new NoSupportedAlgorithmsException('No compatible client to server compression algorithms found');
- }
- $this->compress = $compression_algorithm_out == 'zlib';
-
- switch ($this->kex_algorithm) {
- case 'diffie-hellman-group15-sha512':
- case 'diffie-hellman-group16-sha512':
- case 'diffie-hellman-group17-sha512':
- case 'diffie-hellman-group18-sha512':
- case 'ecdh-sha2-nistp521':
- $kexHash = new Hash('sha512');
- break;
- case 'ecdh-sha2-nistp384':
- $kexHash = new Hash('sha384');
- break;
- case 'diffie-hellman-group-exchange-sha256':
- case 'diffie-hellman-group14-sha256':
- case 'ecdh-sha2-nistp256':
- case 'curve25519-sha256@libssh.org':
- case 'curve25519-sha256':
- $kexHash = new Hash('sha256');
- break;
- default:
- $kexHash = new Hash('sha1');
+ $compression_algorithm_in = $this->_array_intersect_first($s2c_compression_algorithms, $this->compression_algorithms_client_to_server);
+ if ($compression_algorithm_in === false) {
+ user_error('No compatible server to client compression algorithms found');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
+ //$this->compress = $compression_algorithm_in == 'zlib';
// Only relevant in diffie-hellman-group-exchange-sha{1,256}, otherwise empty.
-
$exchange_hash_rfc4419 = '';
- if (strpos($this->kex_algorithm, 'curve25519-sha256') === 0 || strpos($this->kex_algorithm, 'ecdh-sha2-nistp') === 0) {
- $curve = strpos($this->kex_algorithm, 'curve25519-sha256') === 0 ?
- 'Curve25519' :
- substr($this->kex_algorithm, 10);
- $ourPrivate = EC::createKey($curve);
- $ourPublicBytes = $ourPrivate->getPublicKey()->getEncodedCoordinates();
+ if ($kex_algorithm === 'curve25519-sha256@libssh.org') {
+ $x = Random::string(32);
+ $eBytes = sodium_crypto_box_publickey_from_secretkey($x);
$clientKexInitMessage = 'NET_SSH2_MSG_KEX_ECDH_INIT';
$serverKexReplyMessage = 'NET_SSH2_MSG_KEX_ECDH_REPLY';
+ $kexHash = new Hash('sha256');
} else {
- if (strpos($this->kex_algorithm, 'diffie-hellman-group-exchange') === 0) {
+ if (strpos($kex_algorithm, 'diffie-hellman-group-exchange') === 0) {
$dh_group_sizes_packed = pack(
'NNN',
$this->kex_dh_group_size_min,
@@ -1597,112 +1594,210 @@ class SSH2
NET_SSH2_MSG_KEXDH_GEX_REQUEST,
$dh_group_sizes_packed
);
- $this->send_binary_packet($packet);
- $this->updateLogHistory('UNKNOWN (34)', 'NET_SSH2_MSG_KEXDH_GEX_REQUEST');
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
+ $this->_updateLogHistory('UNKNOWN (34)', 'NET_SSH2_MSG_KEXDH_GEX_REQUEST');
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
-
- list($type, $primeBytes, $gBytes) = Strings::unpackSSH2('Css', $response);
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
if ($type != NET_SSH2_MSG_KEXDH_GEX_GROUP) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_PROTOCOL_ERROR);
- throw new \UnexpectedValueException('Expected SSH_MSG_KEX_DH_GEX_GROUP');
+ user_error('Expected SSH_MSG_KEX_DH_GEX_GROUP');
+ return false;
+ }
+ $this->_updateLogHistory('NET_SSH2_MSG_KEXDH_REPLY', 'NET_SSH2_MSG_KEXDH_GEX_GROUP');
+
+ if (strlen($response) < 4) {
+ return false;
}
- $this->updateLogHistory('NET_SSH2_MSG_KEXDH_REPLY', 'NET_SSH2_MSG_KEXDH_GEX_GROUP');
+ extract(unpack('NprimeLength', $this->_string_shift($response, 4)));
+ $primeBytes = $this->_string_shift($response, $primeLength);
$prime = new BigInteger($primeBytes, -256);
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('NgLength', $this->_string_shift($response, 4)));
+ $gBytes = $this->_string_shift($response, $gLength);
$g = new BigInteger($gBytes, -256);
- $exchange_hash_rfc4419 = $dh_group_sizes_packed . Strings::packSSH2(
- 'ss',
+ $exchange_hash_rfc4419 = pack(
+ 'a*Na*Na*',
+ $dh_group_sizes_packed,
+ $primeLength,
$primeBytes,
+ $gLength,
$gBytes
);
- $params = DH::createParameters($prime, $g);
$clientKexInitMessage = 'NET_SSH2_MSG_KEXDH_GEX_INIT';
$serverKexReplyMessage = 'NET_SSH2_MSG_KEXDH_GEX_REPLY';
} else {
- $params = DH::createParameters($this->kex_algorithm);
+ switch ($kex_algorithm) {
+ // see http://tools.ietf.org/html/rfc2409#section-6.2 and
+ // http://tools.ietf.org/html/rfc2412, appendex E
+ case 'diffie-hellman-group1-sha1':
+ $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
+ '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
+ '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' .
+ 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF';
+ break;
+ // see http://tools.ietf.org/html/rfc3526#section-3
+ case 'diffie-hellman-group14-sha1':
+ $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' .
+ '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' .
+ '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' .
+ 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05' .
+ '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB' .
+ '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' .
+ 'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718' .
+ '3995497CEA956AE515D2261898FA051015728E5A8AACAA68FFFFFFFFFFFFFFFF';
+ break;
+ }
+ // For both diffie-hellman-group1-sha1 and diffie-hellman-group14-sha1
+ // the generator field element is 2 (decimal) and the hash function is sha1.
+ $g = new BigInteger(2);
+ $prime = new BigInteger($prime, 16);
$clientKexInitMessage = 'NET_SSH2_MSG_KEXDH_INIT';
$serverKexReplyMessage = 'NET_SSH2_MSG_KEXDH_REPLY';
}
- $keyLength = min($kexHash->getLengthInBytes(), max($encryptKeyLength, $decryptKeyLength));
+ switch ($kex_algorithm) {
+ case 'diffie-hellman-group-exchange-sha256':
+ $kexHash = new Hash('sha256');
+ break;
+ default:
+ $kexHash = new Hash('sha1');
+ }
- $ourPrivate = DH::createKey($params, 16 * $keyLength); // 2 * 8 * $keyLength
- $ourPublic = $ourPrivate->getPublicKey()->toBigInteger();
- $ourPublicBytes = $ourPublic->toBytes(true);
- }
+ /* To increase the speed of the key exchange, both client and server may
+ reduce the size of their private exponents. It should be at least
+ twice as long as the key material that is generated from the shared
+ secret. For more details, see the paper by van Oorschot and Wiener
+ [VAN-OORSCHOT].
- $data = pack('CNa*', constant($clientKexInitMessage), strlen($ourPublicBytes), $ourPublicBytes);
+ -- http://tools.ietf.org/html/rfc4419#section-6.2 */
+ $one = new BigInteger(1);
+ $keyLength = min($kexHash->getLength(), max($encryptKeyLength, $decryptKeyLength));
+ $max = $one->bitwise_leftShift(16 * $keyLength); // 2 * 8 * $keyLength
+ $max = $max->subtract($one);
- $this->send_binary_packet($data);
+ $x = $one->random($one, $max);
+ $e = $g->modPow($x, $prime);
+ $eBytes = $e->toBytes(true);
+ }
+ $data = pack('CNa*', constant($clientKexInitMessage), strlen($eBytes), $eBytes);
+
+ if (!$this->_send_binary_packet($data)) {
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
+ }
switch ($clientKexInitMessage) {
case 'NET_SSH2_MSG_KEX_ECDH_INIT':
- $this->updateLogHistory('NET_SSH2_MSG_KEXDH_INIT', 'NET_SSH2_MSG_KEX_ECDH_INIT');
+ $this->_updateLogHistory('NET_SSH2_MSG_KEXDH_INIT', 'NET_SSH2_MSG_KEX_ECDH_INIT');
break;
case 'NET_SSH2_MSG_KEXDH_GEX_INIT':
- $this->updateLogHistory('UNKNOWN (32)', 'NET_SSH2_MSG_KEXDH_GEX_INIT');
+ $this->_updateLogHistory('UNKNOWN (32)', 'NET_SSH2_MSG_KEXDH_GEX_INIT');
}
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
if (!strlen($response)) {
return false;
}
-
- list(
- $type,
- $server_public_host_key,
- $theirPublicBytes,
- $this->signature
- ) = Strings::unpackSSH2('Csss', $response);
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
if ($type != constant($serverKexReplyMessage)) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_PROTOCOL_ERROR);
- throw new \UnexpectedValueException("Expected $serverKexReplyMessage");
+ user_error("Expected $serverKexReplyMessage");
+ return false;
}
switch ($serverKexReplyMessage) {
case 'NET_SSH2_MSG_KEX_ECDH_REPLY':
- $this->updateLogHistory('NET_SSH2_MSG_KEXDH_REPLY', 'NET_SSH2_MSG_KEX_ECDH_REPLY');
+ $this->_updateLogHistory('NET_SSH2_MSG_KEXDH_REPLY', 'NET_SSH2_MSG_KEX_ECDH_REPLY');
break;
case 'NET_SSH2_MSG_KEXDH_GEX_REPLY':
- $this->updateLogHistory('UNKNOWN (33)', 'NET_SSH2_MSG_KEXDH_GEX_REPLY');
+ $this->_updateLogHistory('UNKNOWN (33)', 'NET_SSH2_MSG_KEXDH_GEX_REPLY');
+ }
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->server_public_host_key = $server_public_host_key = $this->_string_shift($response, $temp['length']);
+
+ if (strlen($server_public_host_key) < 4) {
+ return false;
}
+ $temp = unpack('Nlength', $this->_string_shift($server_public_host_key, 4));
+ $public_key_format = $this->_string_shift($server_public_host_key, $temp['length']);
- $this->server_public_host_key = $server_public_host_key;
- list($public_key_format) = Strings::unpackSSH2('s', $server_public_host_key);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $fBytes = $this->_string_shift($response, $temp['length']);
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($response, 4));
+ $this->signature = $this->_string_shift($response, $temp['length']);
if (strlen($this->signature) < 4) {
return false;
}
- $temp = unpack('Nlength', substr($this->signature, 0, 4));
- $this->signature_format = substr($this->signature, 4, $temp['length']);
- $keyBytes = DH::computeSecret($ourPrivate, $theirPublicBytes);
- if (($keyBytes & "\xFF\x80") === "\x00\x00") {
- $keyBytes = substr($keyBytes, 1);
- } elseif (($keyBytes[0] & "\x80") === "\x80") {
- $keyBytes = "\0$keyBytes";
+ $temp = unpack('Nlength', $this->_string_shift($this->signature, 4));
+ $this->signature_format = $this->_string_shift($this->signature, $temp['length']);
+
+ if ($kex_algorithm === 'curve25519-sha256@libssh.org') {
+ if (strlen($fBytes) !== 32) {
+ user_error('Received curve25519 public key of invalid length.');
+ return false;
+ }
+ $key = new BigInteger(sodium_crypto_scalarmult($x, $fBytes), 256);
+ // sodium_compat doesn't emulate sodium_memzero
+ // also, with v1 of libsodium API the extension identifies itself as
+ // libsodium whereas v2 of the libsodium API (what PHP 7.2+ includes)
+ // identifies itself as sodium. sodium_compat uses the v1 API to
+ // emulate the v2 API if it's the v1 API that's available
+ if (extension_loaded('sodium') || extension_loaded('libsodium')) {
+ sodium_memzero($x);
+ }
+ } else {
+ $f = new BigInteger($fBytes, -256);
+ $key = $f->modPow($x, $prime);
}
+ $keyBytes = $key->toBytes(true);
- $this->exchange_hash = Strings::packSSH2('s5',
+ $this->exchange_hash = pack(
+ 'Na*Na*Na*Na*Na*a*Na*Na*Na*',
+ strlen($this->identifier),
$this->identifier,
+ strlen($this->server_identifier),
$this->server_identifier,
+ strlen($kexinit_payload_client),
$kexinit_payload_client,
+ strlen($kexinit_payload_server),
$kexinit_payload_server,
- $this->server_public_host_key
- );
- $this->exchange_hash.= $exchange_hash_rfc4419;
- $this->exchange_hash.= Strings::packSSH2('s3',
- $ourPublicBytes,
- $theirPublicBytes,
+ strlen($this->server_public_host_key),
+ $this->server_public_host_key,
+ $exchange_hash_rfc4419,
+ strlen($eBytes),
+ $eBytes,
+ strlen($fBytes),
+ $fBytes,
+ strlen($keyBytes),
$keyBytes
);
@@ -1713,128 +1808,112 @@ class SSH2
}
switch ($server_host_key_algorithm) {
- case 'rsa-sha2-256':
- case 'rsa-sha2-512':
- //case 'ssh-rsa':
- $expected_key_format = 'ssh-rsa';
+ case 'ssh-dss':
+ $expected_key_format = 'ssh-dss';
break;
+ //case 'rsa-sha2-256':
+ //case 'rsa-sha2-512':
+ //case 'ssh-rsa':
default:
- $expected_key_format = $server_host_key_algorithm;
+ $expected_key_format = 'ssh-rsa';
}
+
if ($public_key_format != $expected_key_format || $this->signature_format != $server_host_key_algorithm) {
switch (true) {
case $this->signature_format == $server_host_key_algorithm:
case $server_host_key_algorithm != 'rsa-sha2-256' && $server_host_key_algorithm != 'rsa-sha2-512':
case $this->signature_format != 'ssh-rsa':
- $this->disconnect_helper(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE);
- throw new \RuntimeException('Server Host Key Algorithm Mismatch');
+ user_error('Server Host Key Algorithm Mismatch');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
}
- $packet = pack('C', NET_SSH2_MSG_NEWKEYS);
- $this->send_binary_packet($packet);
+ $packet = pack(
+ 'C',
+ NET_SSH2_MSG_NEWKEYS
+ );
+
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
- list($type) = Strings::unpackSSH2('C', $response);
+ if (!strlen($response)) {
+ return false;
+ }
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
+
if ($type != NET_SSH2_MSG_NEWKEYS) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_PROTOCOL_ERROR);
- throw new \UnexpectedValueException('Expected SSH_MSG_NEWKEYS');
+ user_error('Expected SSH_MSG_NEWKEYS');
+ return false;
}
$keyBytes = pack('Na*', strlen($keyBytes), $keyBytes);
- $this->encrypt = self::encryption_algorithm_to_crypt_instance($encrypt);
+ $this->encrypt = $this->_encryption_algorithm_to_crypt_instance($encrypt);
if ($this->encrypt) {
- if (self::$crypto_engine) {
- $this->encrypt->setPreferredEngine(self::$crypto_engine);
+ if ($this->crypto_engine) {
+ $this->encrypt->setPreferredEngine($this->crypto_engine);
}
- if ($this->encrypt->getBlockLengthInBytes()) {
- $this->encrypt_block_size = $this->encrypt->getBlockLengthInBytes();
+ if ($this->encrypt->block_size) {
+ $this->encrypt_block_size = $this->encrypt->block_size;
}
+ $this->encrypt->enableContinuousBuffer();
$this->encrypt->disablePadding();
- if ($this->encrypt->usesIV()) {
- $iv = $kexHash->hash($keyBytes . $this->exchange_hash . 'A' . $this->session_id);
- while ($this->encrypt_block_size > strlen($iv)) {
- $iv.= $kexHash->hash($keyBytes . $this->exchange_hash . $iv);
- }
- $this->encrypt->setIV(substr($iv, 0, $this->encrypt_block_size));
+ if ($this->encrypt->getBlockLength()) {
+ $this->encrypt_block_size = $this->encrypt->getBlockLength() >> 3;
}
- switch ($encrypt) {
- case 'aes128-gcm@openssh.com':
- case 'aes256-gcm@openssh.com':
- $nonce = $kexHash->hash($keyBytes . $this->exchange_hash . 'A' . $this->session_id);
- $this->encrypt->fixed = substr($nonce, 0, 4);
- $this->encrypt->invocation_counter = substr($nonce, 4, 8);
- case 'chacha20-poly1305@openssh.com':
- break;
- default:
- $this->encrypt->enableContinuousBuffer();
+ $iv = $kexHash->hash($keyBytes . $this->exchange_hash . 'A' . $this->session_id);
+ while ($this->encrypt_block_size > strlen($iv)) {
+ $iv.= $kexHash->hash($keyBytes . $this->exchange_hash . $iv);
}
+ $this->encrypt->setIV(substr($iv, 0, $this->encrypt_block_size));
$key = $kexHash->hash($keyBytes . $this->exchange_hash . 'C' . $this->session_id);
while ($encryptKeyLength > strlen($key)) {
$key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
}
- switch ($encrypt) {
- case 'chacha20-poly1305@openssh.com':
- $encryptKeyLength = 32;
- $this->lengthEncrypt = self::encryption_algorithm_to_crypt_instance($encrypt);
- $this->lengthEncrypt->setKey(substr($key, 32, 32));
- }
$this->encrypt->setKey(substr($key, 0, $encryptKeyLength));
- $this->encrypt->name = $encrypt;
+
+ $this->encrypt->name = $decrypt;
}
- $this->decrypt = self::encryption_algorithm_to_crypt_instance($decrypt);
+ $this->decrypt = $this->_encryption_algorithm_to_crypt_instance($decrypt);
if ($this->decrypt) {
- if (self::$crypto_engine) {
- $this->decrypt->setPreferredEngine(self::$crypto_engine);
+ if ($this->crypto_engine) {
+ $this->decrypt->setPreferredEngine($this->crypto_engine);
}
- if ($this->decrypt->getBlockLengthInBytes()) {
- $this->decrypt_block_size = $this->decrypt->getBlockLengthInBytes();
+ if ($this->decrypt->block_size) {
+ $this->decrypt_block_size = $this->decrypt->block_size;
}
+ $this->decrypt->enableContinuousBuffer();
$this->decrypt->disablePadding();
- if ($this->decrypt->usesIV()) {
- $iv = $kexHash->hash($keyBytes . $this->exchange_hash . 'B' . $this->session_id);
- while ($this->decrypt_block_size > strlen($iv)) {
- $iv.= $kexHash->hash($keyBytes . $this->exchange_hash . $iv);
- }
- $this->decrypt->setIV(substr($iv, 0, $this->decrypt_block_size));
+ if ($this->decrypt->getBlockLength()) {
+ $this->decrypt_block_size = $this->decrypt->getBlockLength() >> 3;
}
- switch ($decrypt) {
- case 'aes128-gcm@openssh.com':
- case 'aes256-gcm@openssh.com':
- // see https://tools.ietf.org/html/rfc5647#section-7.1
- $nonce = $kexHash->hash($keyBytes . $this->exchange_hash . 'B' . $this->session_id);
- $this->decrypt->fixed = substr($nonce, 0, 4);
- $this->decrypt->invocation_counter = substr($nonce, 4, 8);
- case 'chacha20-poly1305@openssh.com':
- break;
- default:
- $this->decrypt->enableContinuousBuffer();
+ $iv = $kexHash->hash($keyBytes . $this->exchange_hash . 'B' . $this->session_id);
+ while ($this->decrypt_block_size > strlen($iv)) {
+ $iv.= $kexHash->hash($keyBytes . $this->exchange_hash . $iv);
}
+ $this->decrypt->setIV(substr($iv, 0, $this->decrypt_block_size));
$key = $kexHash->hash($keyBytes . $this->exchange_hash . 'D' . $this->session_id);
while ($decryptKeyLength > strlen($key)) {
$key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
}
- switch ($decrypt) {
- case 'chacha20-poly1305@openssh.com':
- $decryptKeyLength = 32;
- $this->lengthDecrypt = self::encryption_algorithm_to_crypt_instance($decrypt);
- $this->lengthDecrypt->setKey(substr($key, 32, 32));
- }
$this->decrypt->setKey(substr($key, 0, $decryptKeyLength));
+
$this->decrypt->name = $decrypt;
}
@@ -1852,45 +1931,77 @@ class SSH2
$this->decrypt->decrypt(str_repeat("\0", 1536));
}
- if (!$this->encrypt->usesNonce()) {
- list($this->hmac_create, $createKeyLength) = self::mac_algorithm_to_hash_instance($mac_algorithm_out);
- } else {
- $this->hmac_create = new \stdClass;
- $this->hmac_create->name = $mac_algorithm_out;
- //$mac_algorithm_out = 'none';
- $createKeyLength = 0;
+ $mac_algorithm_out = $this->_array_intersect_first($c2s_mac_algorithms, $this->mac_algorithms_client_to_server);
+ if ($mac_algorithm_out === false) {
+ user_error('No compatible client to server message authentication algorithms found');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
}
- if ($this->hmac_create instanceof Hash) {
- $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'E' . $this->session_id);
- while ($createKeyLength > strlen($key)) {
- $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
- }
- $this->hmac_create->setKey(substr($key, 0, $createKeyLength));
- $this->hmac_create->name = $mac_algorithm_out;
- $this->hmac_create->etm = preg_match('#-etm@openssh\.com$#', $mac_algorithm_out);
+ $createKeyLength = 0; // ie. $mac_algorithm == 'none'
+ switch ($mac_algorithm_out) {
+ case 'hmac-sha2-256':
+ $this->hmac_create = new Hash('sha256');
+ $createKeyLength = 32;
+ break;
+ case 'hmac-sha1':
+ $this->hmac_create = new Hash('sha1');
+ $createKeyLength = 20;
+ break;
+ case 'hmac-sha1-96':
+ $this->hmac_create = new Hash('sha1-96');
+ $createKeyLength = 20;
+ break;
+ case 'hmac-md5':
+ $this->hmac_create = new Hash('md5');
+ $createKeyLength = 16;
+ break;
+ case 'hmac-md5-96':
+ $this->hmac_create = new Hash('md5-96');
+ $createKeyLength = 16;
}
+ $this->hmac_create->name = $mac_algorithm_out;
- if (!$this->decrypt->usesNonce()) {
- list($this->hmac_check, $checkKeyLength) = self::mac_algorithm_to_hash_instance($mac_algorithm_in);
- $this->hmac_size = $this->hmac_check->getLengthInBytes();
- } else {
- $this->hmac_check = new \stdClass;
- $this->hmac_check->name = $mac_algorithm_in;
- //$mac_algorithm_in = 'none';
- $checkKeyLength = 0;
- $this->hmac_size = 0;
+ $checkKeyLength = 0;
+ $this->hmac_size = 0;
+ switch ($mac_algorithm_in) {
+ case 'hmac-sha2-256':
+ $this->hmac_check = new Hash('sha256');
+ $checkKeyLength = 32;
+ $this->hmac_size = 32;
+ break;
+ case 'hmac-sha1':
+ $this->hmac_check = new Hash('sha1');
+ $checkKeyLength = 20;
+ $this->hmac_size = 20;
+ break;
+ case 'hmac-sha1-96':
+ $this->hmac_check = new Hash('sha1-96');
+ $checkKeyLength = 20;
+ $this->hmac_size = 12;
+ break;
+ case 'hmac-md5':
+ $this->hmac_check = new Hash('md5');
+ $checkKeyLength = 16;
+ $this->hmac_size = 16;
+ break;
+ case 'hmac-md5-96':
+ $this->hmac_check = new Hash('md5-96');
+ $checkKeyLength = 16;
+ $this->hmac_size = 12;
}
+ $this->hmac_check->name = $mac_algorithm_in;
- if ($this->hmac_check instanceof Hash) {
- $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'F' . $this->session_id);
- while ($checkKeyLength > strlen($key)) {
- $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
- }
- $this->hmac_check->setKey(substr($key, 0, $checkKeyLength));
- $this->hmac_check->name = $mac_algorithm_in;
- $this->hmac_check->etm = preg_match('#-etm@openssh\.com$#', $mac_algorithm_in);
+ $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'E' . $this->session_id);
+ while ($createKeyLength > strlen($key)) {
+ $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
+ }
+ $this->hmac_create->setKey(substr($key, 0, $createKeyLength));
+
+ $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'F' . $this->session_id);
+ while ($checkKeyLength > strlen($key)) {
+ $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
}
+ $this->hmac_check->setKey(substr($key, 0, $checkKeyLength));
return true;
}
@@ -1902,16 +2013,15 @@ class SSH2
* @return int|null Number of bytes as an integer or null for unknown
* @access private
*/
- private function encryption_algorithm_to_key_size($algorithm)
+ function _encryption_algorithm_to_key_size($algorithm)
{
- if ($this->bad_key_size_fix && self::bad_algorithm_candidate($algorithm)) {
+ if ($this->bad_key_size_fix && $this->_bad_algorithm_candidate($algorithm)) {
return 16;
}
switch ($algorithm) {
case 'none':
return 0;
- case 'aes128-gcm@openssh.com':
case 'aes128-cbc':
case 'aes128-ctr':
case 'arcfour':
@@ -1928,7 +2038,6 @@ class SSH2
case 'twofish192-cbc':
case 'twofish192-ctr':
return 24;
- case 'aes256-gcm@openssh.com':
case 'aes256-cbc':
case 'aes256-ctr':
case 'arcfour256':
@@ -1936,97 +2045,55 @@ class SSH2
case 'twofish256-cbc':
case 'twofish256-ctr':
return 32;
- case 'chacha20-poly1305@openssh.com':
- return 64;
}
return null;
}
/**
* Maps an encryption algorithm name to an instance of a subclass of
- * \phpseclib3\Crypt\Common\SymmetricKey.
+ * \phpseclib\Crypt\Base.
*
* @param string $algorithm Name of the encryption algorithm
- * @return mixed Instance of \phpseclib3\Crypt\Common\SymmetricKey or null for unknown
+ * @return mixed Instance of \phpseclib\Crypt\Base or null for unknown
* @access private
*/
- private static function encryption_algorithm_to_crypt_instance($algorithm)
+ function _encryption_algorithm_to_crypt_instance($algorithm)
{
switch ($algorithm) {
case '3des-cbc':
- return new TripleDES('cbc');
+ return new TripleDES();
case '3des-ctr':
- return new TripleDES('ctr');
+ return new TripleDES(Base::MODE_CTR);
case 'aes256-cbc':
case 'aes192-cbc':
case 'aes128-cbc':
- return new Rijndael('cbc');
+ return new Rijndael();
case 'aes256-ctr':
case 'aes192-ctr':
case 'aes128-ctr':
- return new Rijndael('ctr');
+ return new Rijndael(Base::MODE_CTR);
case 'blowfish-cbc':
- return new Blowfish('cbc');
+ return new Blowfish();
case 'blowfish-ctr':
- return new Blowfish('ctr');
+ return new Blowfish(Base::MODE_CTR);
case 'twofish128-cbc':
case 'twofish192-cbc':
case 'twofish256-cbc':
case 'twofish-cbc':
- return new Twofish('cbc');
+ return new Twofish();
case 'twofish128-ctr':
case 'twofish192-ctr':
case 'twofish256-ctr':
- return new Twofish('ctr');
+ return new Twofish(Base::MODE_CTR);
case 'arcfour':
case 'arcfour128':
case 'arcfour256':
return new RC4();
- case 'aes128-gcm@openssh.com':
- case 'aes256-gcm@openssh.com':
- return new Rijndael('gcm');
- case 'chacha20-poly1305@openssh.com':
- return new ChaCha20();
}
return null;
}
/**
- * Maps an encryption algorithm name to an instance of a subclass of
- * \phpseclib3\Crypt\Hash.
- *
- * @param string $algorithm Name of the encryption algorithm
- * @return mixed Instance of \phpseclib3\Crypt\Hash or null for unknown
- * @access private
- */
- private static function mac_algorithm_to_hash_instance($algorithm)
- {
- switch ($algorithm) {
- case 'umac-64@openssh.com':
- case 'umac-64-etm@openssh.com':
- return [new Hash('umac-64'), 16];
- case 'umac-128@openssh.com':
- case 'umac-128-etm@openssh.com':
- return [new Hash('umac-128'), 16];
- case 'hmac-sha2-512':
- case 'hmac-sha2-512-etm@openssh.com':
- return [new Hash('sha512'), 64];
- case 'hmac-sha2-256':
- case 'hmac-sha2-256-etm@openssh.com':
- return [new Hash('sha256'), 32];
- case 'hmac-sha1':
- case 'hmac-sha1-etm@openssh.com':
- return [new Hash('sha1'), 20];
- case 'hmac-sha1-96':
- return [new Hash('sha1-96'), 20];
- case 'hmac-md5':
- return [new Hash('md5'), 16];
- case 'hmac-md5-96':
- return [new Hash('md5-96'), 16];
- }
- }
-
- /*
* Tests whether or not proposed algorithm has a potential for issues
*
* @link https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/ssh2-aesctr-openssh.html
@@ -2035,7 +2102,7 @@ class SSH2
* @return bool
* @access private
*/
- private static function bad_algorithm_candidate($algorithm)
+ function _bad_algorithm_candidate($algorithm)
{
switch ($algorithm) {
case 'arcfour256':
@@ -2050,54 +2117,54 @@ class SSH2
/**
* Login
*
- * The $password parameter can be a plaintext password, a \phpseclib3\Crypt\RSA object or an array
+ * The $password parameter can be a plaintext password, a \phpseclib\Crypt\RSA object or an array
*
* @param string $username
- * @param string[] ...$args
* @return bool
* @see self::_login()
* @access public
*/
- public function login($username, ...$args)
+ function login($username)
{
- $this->auth[] = func_get_args();
+ $args = func_get_args();
+ $this->auth[] = $args;
// try logging with 'none' as an authentication method first since that's what
// PuTTY does
if (substr($this->server_identifier, 0, 13) != 'SSH-2.0-CoreFTP') {
- if ($this->sublogin($username)) {
+ if ($this->_login($username)) {
return true;
}
- if (!count($args)) {
+ if (count($args) == 1) {
return false;
}
}
- return $this->sublogin($username, ...$args);
+ return call_user_func_array(array(&$this, '_login'), $args);
}
/**
* Login Helper
*
* @param string $username
- * @param string[] ...$args
* @return bool
* @see self::_login_helper()
* @access private
*/
- protected function sublogin($username, ...$args)
+ function _login($username)
{
if (!($this->bitmap & self::MASK_CONSTRUCTOR)) {
- if (!$this->connect()) {
+ if (!$this->_connect()) {
return false;
}
}
+ $args = array_slice(func_get_args(), 1);
if (empty($args)) {
- return $this->login_helper($username);
+ return $this->_login_helper($username);
}
foreach ($args as $arg) {
- if ($this->login_helper($username, $arg)) {
+ if ($this->_login_helper($username, $arg)) {
return true;
}
}
@@ -2107,61 +2174,69 @@ class SSH2
/**
* Login Helper
*
- * {@internal It might be worthwhile, at some point, to protect against {@link http://tools.ietf.org/html/rfc4251#section-9.3.9 traffic analysis}
- * by sending dummy SSH_MSG_IGNORE messages.}
- *
* @param string $username
* @param string $password
* @return bool
- * @throws \UnexpectedValueException on receipt of unexpected packets
- * @throws \RuntimeException on other errors
* @access private
+ * @internal It might be worthwhile, at some point, to protect against {@link http://tools.ietf.org/html/rfc4251#section-9.3.9 traffic analysis}
+ * by sending dummy SSH_MSG_IGNORE messages.
*/
- private function login_helper($username, $password = null)
+ function _login_helper($username, $password = null)
{
if (!($this->bitmap & self::MASK_CONNECTED)) {
return false;
}
if (!($this->bitmap & self::MASK_LOGIN_REQ)) {
- $packet = Strings::packSSH2('Cs', NET_SSH2_MSG_SERVICE_REQUEST, 'ssh-userauth');
- $this->send_binary_packet($packet);
+ $packet = pack(
+ 'CNa*',
+ NET_SSH2_MSG_SERVICE_REQUEST,
+ strlen('ssh-userauth'),
+ 'ssh-userauth'
+ );
+
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
if ($this->retry_connect) {
$this->retry_connect = false;
- if (!$this->connect()) {
+ if (!$this->_connect()) {
return false;
}
- return $this->login_helper($username, $password);
+ return $this->_login_helper($username, $password);
}
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
- list($type, $service) = Strings::unpackSSH2('Cs', $response);
- if ($type != NET_SSH2_MSG_SERVICE_ACCEPT || $service != 'ssh-userauth') {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_PROTOCOL_ERROR);
- throw new \UnexpectedValueException('Expected SSH_MSG_SERVICE_ACCEPT');
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
+
+ if ($type != NET_SSH2_MSG_SERVICE_ACCEPT) {
+ user_error('Expected SSH_MSG_SERVICE_ACCEPT');
+ return false;
}
$this->bitmap |= self::MASK_LOGIN_REQ;
}
if (strlen($this->last_interactive_response)) {
- return !is_string($password) && !is_array($password) ? false : $this->keyboard_interactive_process($password);
- }
-
- if ($password instanceof PrivateKey) {
- return $this->privatekey_login($username, $password);
+ return !is_string($password) && !is_array($password) ? false : $this->_keyboard_interactive_process($password);
}
- if ($password instanceof Agent) {
- return $this->ssh_agent_login($username, $password);
+ if ($password instanceof RSA) {
+ return $this->_privatekey_login($username, $password);
+ } elseif ($password instanceof Agent) {
+ return $this->_ssh_agent_login($username, $password);
}
if (is_array($password)) {
- if ($this->keyboard_interactive_login($username, $password)) {
+ if ($this->_keyboard_interactive_login($username, $password)) {
$this->bitmap |= self::MASK_LOGIN;
return true;
}
@@ -2169,23 +2244,33 @@ class SSH2
}
if (!isset($password)) {
- $packet = Strings::packSSH2(
- 'Cs3',
- NET_SSH2_MSG_USERAUTH_REQUEST,
- $username,
- 'ssh-connection',
- 'none'
+ $packet = pack(
+ 'CNa*Na*Na*',
+ NET_SSH2_MSG_USERAUTH_REQUEST,
+ strlen($username),
+ $username,
+ strlen('ssh-connection'),
+ 'ssh-connection',
+ strlen('none'),
+ 'none'
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
+ }
+
+ if (!strlen($response)) {
+ return false;
}
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
- list($type) = Strings::unpackSSH2('C', $response);
switch ($type) {
case NET_SSH2_MSG_USERAUTH_SUCCESS:
$this->bitmap |= self::MASK_LOGIN;
@@ -2196,17 +2281,17 @@ class SSH2
}
}
- if (!is_string($password)) {
- throw new \UnexpectedValueException('$password needs to either be an instance of \phpseclib3\Crypt\Common\PrivateKey, \System\SSH\Agent, an array or a string');
- }
-
- $packet = Strings::packSSH2(
- 'Cs3bs',
+ $packet = pack(
+ 'CNa*Na*Na*CNa*',
NET_SSH2_MSG_USERAUTH_REQUEST,
+ strlen($username),
$username,
+ strlen('ssh-connection'),
'ssh-connection',
+ strlen('password'),
'password',
- false,
+ 0,
+ strlen($password),
$password
);
@@ -2214,40 +2299,62 @@ class SSH2
if (!defined('NET_SSH2_LOGGING')) {
$logged = null;
} else {
- $logged = Strings::packSSH2(
- 'Cs3bs',
+ $logged = pack(
+ 'CNa*Na*Na*CNa*',
NET_SSH2_MSG_USERAUTH_REQUEST,
- $username,
+ strlen('username'),
+ 'username',
+ strlen('ssh-connection'),
'ssh-connection',
+ strlen('password'),
'password',
- false,
+ 0,
+ strlen('password'),
'password'
);
}
- $this->send_binary_packet($packet, $logged);
+ if (!$this->_send_binary_packet($packet, $logged)) {
+ return false;
+ }
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
- list($type) = Strings::unpackSSH2('C', $response);
+ if (!strlen($response)) {
+ return false;
+ }
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
+
switch ($type) {
case NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ: // in theory, the password can be changed
- $this->updateLogHistory('UNKNOWN (60)', 'NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ');
-
- list($message) = Strings::unpackSSH2('s', $response);
- $this->errors[] = 'SSH_MSG_USERAUTH_PASSWD_CHANGEREQ: ' . $message;
-
- return $this->disconnect_helper(NET_SSH2_DISCONNECT_AUTH_CANCELLED_BY_USER);
+ $this->_updateLogHistory('UNKNOWN (60)', 'NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ');
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $this->errors[] = 'SSH_MSG_USERAUTH_PASSWD_CHANGEREQ: ' . $this->_string_shift($response, $length);
+ return $this->_disconnect(NET_SSH2_DISCONNECT_AUTH_CANCELLED_BY_USER);
case NET_SSH2_MSG_USERAUTH_FAILURE:
// can we use keyboard-interactive authentication? if not then either the login is bad or the server employees
// multi-factor authentication
- list($auth_methods, $partial_success) = Strings::unpackSSH2('Lb', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $auth_methods = explode(',', $this->_string_shift($response, $length));
+ if (!strlen($response)) {
+ return false;
+ }
+ extract(unpack('Cpartial_success', $this->_string_shift($response, 1)));
+ $partial_success = $partial_success != 0;
+
if (!$partial_success && in_array('keyboard-interactive', $auth_methods)) {
- if ($this->keyboard_interactive_login($username, $password)) {
+ if ($this->_keyboard_interactive_login($username, $password)) {
$this->bitmap |= self::MASK_LOGIN;
return true;
}
@@ -2272,51 +2379,77 @@ class SSH2
* @return bool
* @access private
*/
- private function keyboard_interactive_login($username, $password)
+ function _keyboard_interactive_login($username, $password)
{
- $packet = Strings::packSSH2(
- 'Cs5',
+ $packet = pack(
+ 'CNa*Na*Na*Na*Na*',
NET_SSH2_MSG_USERAUTH_REQUEST,
+ strlen($username),
$username,
+ strlen('ssh-connection'),
'ssh-connection',
+ strlen('keyboard-interactive'),
'keyboard-interactive',
- '', // language tag
- '' // submethods
+ 0,
+ '',
+ 0,
+ ''
);
- $this->send_binary_packet($packet);
- return $this->keyboard_interactive_process($password);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
+
+ return $this->_keyboard_interactive_process($password);
}
/**
* Handle the keyboard-interactive requests / responses.
*
- * @param mixed[] ...$responses
* @return bool
- * @throws \RuntimeException on connection error
* @access private
*/
- private function keyboard_interactive_process(...$responses)
+ function _keyboard_interactive_process()
{
+ $responses = func_get_args();
+
if (strlen($this->last_interactive_response)) {
$response = $this->last_interactive_response;
} else {
- $orig = $response = $this->get_binary_packet();
+ $orig = $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
}
- list($type) = Strings::unpackSSH2('C', $response);
+ if (!strlen($response)) {
+ return false;
+ }
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
+
switch ($type) {
case NET_SSH2_MSG_USERAUTH_INFO_REQUEST:
- list(
- , // name; may be empty
- , // instruction; may be empty
- , // language tag; may be empty
- $num_prompts
- ) = Strings::unpackSSH2('s3N', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $this->_string_shift($response, $length); // name; may be empty
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $this->_string_shift($response, $length); // instruction; may be empty
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $this->_string_shift($response, $length); // language tag; may be empty
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nnum_prompts', $this->_string_shift($response, 4)));
for ($i = 0; $i < count($responses); $i++) {
if (is_array($responses[$i])) {
@@ -2330,10 +2463,13 @@ class SSH2
if (isset($this->keyboard_requests_responses)) {
for ($i = 0; $i < $num_prompts; $i++) {
- list(
- $prompt, // prompt - ie. "Password: "; must not be empty
- // echo
- ) = Strings::unpackSSH2('sC', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ // prompt - ie. "Password: "; must not be empty
+ $prompt = $this->_string_shift($response, $length);
+ //$echo = $this->_string_shift($response) != chr(0);
foreach ($this->keyboard_requests_responses as $key => $value) {
if (substr($prompt, 0, strlen($key)) == $key) {
$responses[] = $value;
@@ -2347,7 +2483,7 @@ class SSH2
if (strlen($this->last_interactive_response)) {
$this->last_interactive_response = '';
} else {
- $this->updateLogHistory('UNKNOWN (60)', 'NET_SSH2_MSG_USERAUTH_INFO_REQUEST');
+ $this->_updateLogHistory('UNKNOWN (60)', 'NET_SSH2_MSG_USERAUTH_INFO_REQUEST');
}
if (!count($responses) && $num_prompts) {
@@ -2362,13 +2498,15 @@ class SSH2
// see http://tools.ietf.org/html/rfc4256#section-3.4
$packet = $logged = pack('CN', NET_SSH2_MSG_USERAUTH_INFO_RESPONSE, count($responses));
for ($i = 0; $i < count($responses); $i++) {
- $packet.= Strings::packSSH2('s', $responses[$i]);
- $logged.= Strings::packSSH2('s', 'dummy-answer');
+ $packet.= pack('Na*', strlen($responses[$i]), $responses[$i]);
+ $logged.= pack('Na*', strlen('dummy-answer'), 'dummy-answer');
}
- $this->send_binary_packet($packet, $logged);
+ if (!$this->_send_binary_packet($packet, $logged)) {
+ return false;
+ }
- $this->updateLogHistory('UNKNOWN (61)', 'NET_SSH2_MSG_USERAUTH_INFO_RESPONSE');
+ $this->_updateLogHistory('UNKNOWN (61)', 'NET_SSH2_MSG_USERAUTH_INFO_RESPONSE');
/*
After receiving the response, the server MUST send either an
@@ -2377,7 +2515,7 @@ class SSH2
*/
// maybe phpseclib should force close the connection after x request / responses? unless something like that is done
// there could be an infinite loop of request / responses.
- return $this->keyboard_interactive_process();
+ return $this->_keyboard_interactive_process();
case NET_SSH2_MSG_USERAUTH_SUCCESS:
return true;
case NET_SSH2_MSG_USERAUTH_FAILURE:
@@ -2391,16 +2529,16 @@ class SSH2
* Login with an ssh-agent provided key
*
* @param string $username
- * @param \phpseclib3\System\SSH\Agent $agent
+ * @param \phpseclib\System\SSH\Agent $agent
* @return bool
* @access private
*/
- private function ssh_agent_login($username, Agent $agent)
+ function _ssh_agent_login($username, $agent)
{
$this->agent = $agent;
$keys = $agent->requestIdentities();
foreach ($keys as $key) {
- if ($this->privatekey_login($username, $key)) {
+ if ($this->_privatekey_login($username, $key)) {
return true;
}
}
@@ -2411,130 +2549,116 @@ class SSH2
/**
* Login with an RSA private key
*
- * {@internal It might be worthwhile, at some point, to protect against {@link http://tools.ietf.org/html/rfc4251#section-9.3.9 traffic analysis}
- * by sending dummy SSH_MSG_IGNORE messages.}
- *
* @param string $username
- * @param \phpseclib3\Crypt\Common\PrivateKey $privatekey
+ * @param \phpseclib\Crypt\RSA $privatekey
* @return bool
- * @throws \RuntimeException on connection error
* @access private
+ * @internal It might be worthwhile, at some point, to protect against {@link http://tools.ietf.org/html/rfc4251#section-9.3.9 traffic analysis}
+ * by sending dummy SSH_MSG_IGNORE messages.
*/
- private function privatekey_login($username, PrivateKey $privatekey)
+ function _privatekey_login($username, $privatekey)
{
- $publickey = $privatekey->getPublicKey();
-
- if ($publickey instanceof RSA) {
- $privatekey = $privatekey->withPadding(RSA::SIGNATURE_PKCS1);
- $algos = ['rsa-sha2-256', 'rsa-sha2-512', 'ssh-rsa'];
- if (isset($this->preferred['hostkey'])) {
- $algos = array_intersect($this->preferred['hostkey'] , $algos);
- }
- $algo = self::array_intersect_first($algos, $this->server_host_key_algorithms);
- switch ($algo) {
- case 'rsa-sha2-512':
- $hash = 'sha512';
- $signatureType = 'rsa-sha2-512';
- break;
- case 'rsa-sha2-256':
- $hash = 'sha256';
- $signatureType = 'rsa-sha2-256';
- break;
- //case 'ssh-rsa':
- default:
- $hash = 'sha1';
- $signatureType = 'ssh-rsa';
- }
- } else if ($publickey instanceof EC) {
- $privatekey = $privatekey->withSignatureFormat('SSH2');
- $curveName = $privatekey->getCurve();
- switch ($curveName) {
- case 'Ed25519':
- $hash = 'sha512';
- $signatureType = 'ssh-ed25519';
- break;
- case 'secp256r1': // nistp256
- $hash = 'sha256';
- $signatureType = 'ecdsa-sha2-nistp256';
- break;
- case 'secp384r1': // nistp384
- $hash = 'sha384';
- $signatureType = 'ecdsa-sha2-nistp384';
- break;
- case 'secp521r1': // nistp521
- $hash = 'sha512';
- $signatureType = 'ecdsa-sha2-nistp521';
- break;
- default:
- if (is_array($curveName)) {
- throw new UnsupportedCurveException('Specified Curves are not supported by SSH2');
- }
- throw new UnsupportedCurveException('Named Curve of ' . $curveName . ' is not supported by phpseclib3\'s SSH2 implementation');
- }
- } else if ($publickey instanceof DSA) {
- $privatekey = $privatekey->withSignatureFormat('SSH2');
- $hash = 'sha1';
- $signatureType = 'ssh-dss';
- } else {
- throw new UnsupportedAlgorithmException('Please use either an RSA key, an EC one or a DSA key');
+ // see http://tools.ietf.org/html/rfc4253#page-15
+ $publickey = $privatekey->getPublicKey(RSA::PUBLIC_FORMAT_RAW);
+ if ($publickey === false) {
+ return false;
}
- $publickeyStr = $publickey->toString('OpenSSH', ['binary' => true]);
+ $publickey = array(
+ 'e' => $publickey['e']->toBytes(true),
+ 'n' => $publickey['n']->toBytes(true)
+ );
+ $publickey = pack(
+ 'Na*Na*Na*',
+ strlen('ssh-rsa'),
+ 'ssh-rsa',
+ strlen($publickey['e']),
+ $publickey['e'],
+ strlen($publickey['n']),
+ $publickey['n']
+ );
+
+ switch ($this->signature_format) {
+ case 'rsa-sha2-512':
+ $hash = 'sha512';
+ $signatureType = 'rsa-sha2-512';
+ break;
+ case 'rsa-sha2-256':
+ $hash = 'sha256';
+ $signatureType = 'rsa-sha2-256';
+ break;
+ //case 'ssh-rsa':
+ default:
+ $hash = 'sha1';
+ $signatureType = 'ssh-rsa';
+ }
- $part1 = Strings::packSSH2(
- 'Csss',
+ $part1 = pack(
+ 'CNa*Na*Na*',
NET_SSH2_MSG_USERAUTH_REQUEST,
+ strlen($username),
$username,
+ strlen('ssh-connection'),
'ssh-connection',
+ strlen('publickey'),
'publickey'
);
- $part2 = Strings::packSSH2('ss', $signatureType, $publickeyStr);
+ $part2 = pack('Na*Na*', strlen($signatureType), $signatureType, strlen($publickey), $publickey);
$packet = $part1 . chr(0) . $part2;
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
- list($type) = Strings::unpackSSH2('C', $response);
+ if (!strlen($response)) {
+ return false;
+ }
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
+
switch ($type) {
case NET_SSH2_MSG_USERAUTH_FAILURE:
- list($message) = Strings::unpackSSH2('s', $response);
- $this->errors[] = 'SSH_MSG_USERAUTH_FAILURE: ' . $message;
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $this->errors[] = 'SSH_MSG_USERAUTH_FAILURE: ' . $this->_string_shift($response, $length);
return false;
case NET_SSH2_MSG_USERAUTH_PK_OK:
// we'll just take it on faith that the public key blob and the public key algorithm name are as
// they should be
- $this->updateLogHistory('UNKNOWN (60)', 'NET_SSH2_MSG_USERAUTH_PK_OK');
- break;
- case NET_SSH2_MSG_USERAUTH_SUCCESS:
- $this->bitmap |= self::MASK_LOGIN;
- return true;
- default:
- $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
- throw new ConnectionClosedException('Unexpected response to publickey authentication pt 1');
+ $this->_updateLogHistory('UNKNOWN (60)', 'NET_SSH2_MSG_USERAUTH_PK_OK');
}
$packet = $part1 . chr(1) . $part2;
- $privatekey = $privatekey->withHash($hash);
- $signature = $privatekey->sign(Strings::packSSH2('s', $this->session_id) . $packet);
- if ($publickey instanceof RSA) {
- $signature = Strings::packSSH2('ss', $signatureType, $signature);
- }
- $packet.= Strings::packSSH2('s', $signature);
+ $privatekey->setSignatureMode(RSA::SIGNATURE_PKCS1);
+ $privatekey->setHash($hash);
+ $signature = $privatekey->sign(pack('Na*a*', strlen($this->session_id), $this->session_id, $packet));
+ $signature = pack('Na*Na*', strlen($signatureType), $signatureType, strlen($signature), $signature);
+ $packet.= pack('Na*', strlen($signature), $signature);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
+ }
+
+ if (!strlen($response)) {
+ return false;
}
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
- list($type) = Strings::unpackSSH2('C', $response);
switch ($type) {
case NET_SSH2_MSG_USERAUTH_FAILURE:
// either the login is bad or the server employs multi-factor authentication
@@ -2544,8 +2668,7 @@ class SSH2
return true;
}
- $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
- throw new ConnectionClosedException('Unexpected response to publickey authentication pt 2');
+ return false;
}
/**
@@ -2557,7 +2680,7 @@ class SSH2
* @param mixed $timeout
* @access public
*/
- public function setTimeout($timeout)
+ function setTimeout($timeout)
{
$this->timeout = $this->curTimeout = $timeout;
}
@@ -2567,7 +2690,7 @@ class SSH2
*
* Sends an SSH2_MSG_IGNORE message every x seconds, if x is a positive non-zero number.
*
- * @param int $interval
+ * @param mixed $timeout
* @access public
*/
function setKeepAlive($interval)
@@ -2580,7 +2703,7 @@ class SSH2
*
* @access public
*/
- public function getStdError()
+ function getStdError()
{
return $this->stdErrorLog;
}
@@ -2588,16 +2711,15 @@ class SSH2
/**
* Execute Command
*
- * If $callback is set to false then \phpseclib3\Net\SSH2::get_channel_packet(self::CHANNEL_EXEC) will need to be called manually.
+ * If $callback is set to false then \phpseclib\Net\SSH2::_get_channel_packet(self::CHANNEL_EXEC) will need to be called manually.
* In all likelihood, this is not a feature you want to be taking advantage of.
*
* @param string $command
* @param Callback $callback
* @return string
- * @throws \RuntimeException on connection error
* @access public
*/
- public function exec($command, $callback = null)
+ function exec($command, $callback = null)
{
$this->curTimeout = $this->timeout;
$this->is_timeout = false;
@@ -2608,7 +2730,8 @@ class SSH2
}
if ($this->in_request_pty_exec) {
- throw new \RuntimeException('If you want to run multiple exec()\'s you will need to disable (and re-enable if appropriate) a PTY for each one.');
+ user_error('If you want to run multiple exec()\'s you will need to disable (and re-enable if appropriate) a PTY for each one.');
+ return false;
}
// RFC4254 defines the (client) window size as "bytes the other party can send before it must wait for the window to
@@ -2620,61 +2743,75 @@ class SSH2
// uses 0x4000, that's what will be used here, as well.
$packet_size = 0x4000;
- $packet = Strings::packSSH2(
- 'CsN3',
+ $packet = pack(
+ 'CNa*N3',
NET_SSH2_MSG_CHANNEL_OPEN,
+ strlen('session'),
'session',
self::CHANNEL_EXEC,
$this->window_size_server_to_client[self::CHANNEL_EXEC],
$packet_size
);
- $this->send_binary_packet($packet);
+
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL_EXEC] = NET_SSH2_MSG_CHANNEL_OPEN;
- $response = $this->get_channel_packet(self::CHANNEL_EXEC);
+ $response = $this->_get_channel_packet(self::CHANNEL_EXEC);
if ($response === false) {
return false;
}
if ($this->request_pty === true) {
$terminal_modes = pack('C', NET_SSH2_TTY_OP_END);
- $packet = Strings::packSSH2(
- 'CNsCsN4s',
+ $packet = pack(
+ 'CNNa*CNa*N5a*',
NET_SSH2_MSG_CHANNEL_REQUEST,
$this->server_channels[self::CHANNEL_EXEC],
+ strlen('pty-req'),
'pty-req',
1,
+ strlen('vt100'),
'vt100',
$this->windowColumns,
$this->windowRows,
0,
0,
+ strlen($terminal_modes),
$terminal_modes
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
+ }
+
+ if (!strlen($response)) {
+ return false;
}
+ list(, $type) = unpack('C', $this->_string_shift($response, 1));
- list($type) = Strings::unpackSSH2('C', $response);
switch ($type) {
case NET_SSH2_MSG_CHANNEL_SUCCESS:
break;
case NET_SSH2_MSG_CHANNEL_FAILURE:
default:
- $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
- throw new \RuntimeException('Unable to request pseudo-terminal');
+ user_error('Unable to request pseudo-terminal');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
}
$this->in_request_pty_exec = true;
}
// sending a pty-req SSH_MSG_CHANNEL_REQUEST message is unnecessary and, in fact, in most cases, slows things
- // down. the one place where it might be desirable is if you're doing something like \phpseclib3\Net\SSH2::exec('ping localhost &').
+ // down. the one place where it might be desirable is if you're doing something like \phpseclib\Net\SSH2::exec('ping localhost &').
// with a pty-req SSH_MSG_CHANNEL_REQUEST, exec() will return immediately and the ping process will then
// then immediately terminate. without such a request exec() will loop indefinitely. the ping process won't end but
// neither will your script.
@@ -2682,19 +2819,23 @@ class SSH2
// although, in theory, the size of SSH_MSG_CHANNEL_REQUEST could exceed the maximum packet size established by
// SSH_MSG_CHANNEL_OPEN_CONFIRMATION, RFC4254#section-5.1 states that the "maximum packet size" refers to the
// "maximum size of an individual data packet". ie. SSH_MSG_CHANNEL_DATA. RFC4254#section-5.2 corroborates.
- $packet = Strings::packSSH2(
- 'CNsCs',
+ $packet = pack(
+ 'CNNa*CNa*',
NET_SSH2_MSG_CHANNEL_REQUEST,
$this->server_channels[self::CHANNEL_EXEC],
+ strlen('exec'),
'exec',
1,
+ strlen($command),
$command
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL_EXEC] = NET_SSH2_MSG_CHANNEL_REQUEST;
- $response = $this->get_channel_packet(self::CHANNEL_EXEC);
+ $response = $this->_get_channel_packet(self::CHANNEL_EXEC);
if ($response === false) {
return false;
}
@@ -2707,7 +2848,7 @@ class SSH2
$output = '';
while (true) {
- $temp = $this->get_channel_packet(self::CHANNEL_EXEC);
+ $temp = $this->_get_channel_packet(self::CHANNEL_EXEC);
switch (true) {
case $temp === true:
return is_callable($callback) ? true : $output;
@@ -2715,8 +2856,8 @@ class SSH2
return false;
default:
if (is_callable($callback)) {
- if ($callback($temp) === true) {
- $this->close_channel(self::CHANNEL_EXEC);
+ if (call_user_func($callback, $temp) === true) {
+ $this->_close_channel(self::CHANNEL_EXEC);
return true;
}
} else {
@@ -2732,11 +2873,9 @@ class SSH2
* @see self::read()
* @see self::write()
* @return bool
- * @throws \UnexpectedValueException on receipt of unexpected packets
- * @throws \RuntimeException on other errors
* @access private
*/
- private function initShell()
+ function _initShell()
{
if ($this->in_request_pty_exec === true) {
return true;
@@ -2745,48 +2884,60 @@ class SSH2
$this->window_size_server_to_client[self::CHANNEL_SHELL] = $this->window_size;
$packet_size = 0x4000;
- $packet = Strings::packSSH2(
- 'CsN3',
+ $packet = pack(
+ 'CNa*N3',
NET_SSH2_MSG_CHANNEL_OPEN,
+ strlen('session'),
'session',
self::CHANNEL_SHELL,
$this->window_size_server_to_client[self::CHANNEL_SHELL],
$packet_size
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL_SHELL] = NET_SSH2_MSG_CHANNEL_OPEN;
- $response = $this->get_channel_packet(self::CHANNEL_SHELL);
+ $response = $this->_get_channel_packet(self::CHANNEL_SHELL);
if ($response === false) {
return false;
}
$terminal_modes = pack('C', NET_SSH2_TTY_OP_END);
- $packet = Strings::packSSH2(
- 'CNsCsN4s',
+ $packet = pack(
+ 'CNNa*CNa*N5a*',
NET_SSH2_MSG_CHANNEL_REQUEST,
$this->server_channels[self::CHANNEL_SHELL],
+ strlen('pty-req'),
'pty-req',
1,
+ strlen('vt100'),
'vt100',
$this->windowColumns,
$this->windowRows,
0,
0,
+ strlen($terminal_modes),
$terminal_modes
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
- $response = $this->get_binary_packet();
+ $response = $this->_get_binary_packet();
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
- list($type) = Strings::unpackSSH2('C', $response);
+ if (!strlen($response)) {
+ return false;
+ }
+ list(, $type) = unpack('C', $this->_string_shift($response, 1));
switch ($type) {
case NET_SSH2_MSG_CHANNEL_SUCCESS:
@@ -2794,22 +2945,25 @@ class SSH2
case NET_SSH2_MSG_CHANNEL_FAILURE:
break;
default:
- $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
- throw new \UnexpectedValueException('Unable to request pseudo-terminal');
+ user_error('Unable to request pseudo-terminal');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
}
- $packet = Strings::packSSH2(
- 'CNsb',
+ $packet = pack(
+ 'CNNa*C',
NET_SSH2_MSG_CHANNEL_REQUEST,
$this->server_channels[self::CHANNEL_SHELL],
+ strlen('shell'),
'shell',
- true // want reply
+ 1
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL_SHELL] = NET_SSH2_MSG_CHANNEL_REQUEST;
- $response = $this->get_channel_packet(self::CHANNEL_SHELL);
+ $response = $this->_get_channel_packet(self::CHANNEL_SHELL);
if ($response === false) {
return false;
}
@@ -2829,7 +2983,7 @@ class SSH2
* @return int
* @access public
*/
- private function get_interactive_channel()
+ function _get_interactive_channel()
{
switch (true) {
case $this->in_subsystem:
@@ -2847,7 +3001,7 @@ class SSH2
* @return int
* @access public
*/
- private function get_open_channel()
+ function _get_open_channel()
{
$channel = self::CHANNEL_EXEC;
do {
@@ -2860,41 +3014,6 @@ class SSH2
}
/**
- * Request agent forwarding of remote server
- *
- * @return bool
- * @access public
- */
- public function requestAgentForwarding()
- {
- $request_channel = $this->get_open_channel();
- if ($request_channel === false) {
- return false;
- }
-
- $packet = Strings::packSSH2(
- 'CNsC',
- NET_SSH2_MSG_CHANNEL_REQUEST,
- $this->server_channels[$request_channel],
- 'auth-agent-req@openssh.com',
- 1
- );
-
- $this->channel_status[$request_channel] = NET_SSH2_MSG_CHANNEL_REQUEST;
-
- $this->send_binary_packet($packet);
-
- $response = $this->get_channel_packet($request_channel);
- if ($response === false) {
- return false;
- }
-
- $this->channel_status[$request_channel] = NET_SSH2_MSG_CHANNEL_OPEN;
-
- return true;
- }
-
- /**
* Returns the output of an interactive shell
*
* Returns when there's a match for $expect, which can take the form of a string literal or,
@@ -2903,27 +3022,28 @@ class SSH2
* @see self::write()
* @param string $expect
* @param int $mode
- * @return string|bool|null
- * @throws \RuntimeException on connection error
+ * @return string|bool
* @access public
*/
- public function read($expect = '', $mode = self::READ_SIMPLE)
+ function read($expect = '', $mode = self::READ_SIMPLE)
{
$this->curTimeout = $this->timeout;
$this->is_timeout = false;
if (!$this->isAuthenticated()) {
- throw new InsufficientSetupException('Operation disallowed prior to login()');
+ user_error('Operation disallowed prior to login()');
+ return false;
}
- if (!($this->bitmap & self::MASK_SHELL) && !$this->initShell()) {
- throw new \RuntimeException('Unable to initiate an interactive shell session');
+ if (!($this->bitmap & self::MASK_SHELL) && !$this->_initShell()) {
+ user_error('Unable to initiate an interactive shell session');
+ return false;
}
- $channel = $this->get_interactive_channel();
+ $channel = $this->_get_interactive_channel();
if ($mode == self::READ_NEXT) {
- return $this->get_channel_packet($channel);
+ return $this->_get_channel_packet($channel);
}
$match = $expect;
@@ -2934,12 +3054,12 @@ class SSH2
}
$pos = strlen($match) ? strpos($this->interactiveBuffer, $match) : false;
if ($pos !== false) {
- return Strings::shift($this->interactiveBuffer, $pos + strlen($match));
+ return $this->_string_shift($this->interactiveBuffer, $pos + strlen($match));
}
- $response = $this->get_channel_packet($channel);
+ $response = $this->_get_channel_packet($channel);
if (is_bool($response)) {
$this->in_request_pty_exec = false;
- return $response ? Strings::shift($this->interactiveBuffer, strlen($this->interactiveBuffer)) : false;
+ return $response ? $this->_string_shift($this->interactiveBuffer, strlen($this->interactiveBuffer)) : false;
}
$this->interactiveBuffer.= $response;
@@ -2952,20 +3072,21 @@ class SSH2
* @see self::read()
* @param string $cmd
* @return bool
- * @throws \RuntimeException on connection error
* @access public
*/
- public function write($cmd)
+ function write($cmd)
{
if (!$this->isAuthenticated()) {
- throw new InsufficientSetupException('Operation disallowed prior to login()');
+ user_error('Operation disallowed prior to login()');
+ return false;
}
- if (!($this->bitmap & self::MASK_SHELL) && !$this->initShell()) {
- throw new \RuntimeException('Unable to initiate an interactive shell session');
+ if (!($this->bitmap & self::MASK_SHELL) && !$this->_initShell()) {
+ user_error('Unable to initiate an interactive shell session');
+ return false;
}
- return $this->send_channel_packet($this->get_interactive_channel(), $cmd);
+ return $this->_send_channel_packet($this->_get_interactive_channel(), $cmd);
}
/**
@@ -2982,41 +3103,49 @@ class SSH2
* @return bool
* @access public
*/
- public function startSubsystem($subsystem)
+ function startSubsystem($subsystem)
{
$this->window_size_server_to_client[self::CHANNEL_SUBSYSTEM] = $this->window_size;
- $packet = Strings::packSSH2(
- 'CsN3',
+ $packet = pack(
+ 'CNa*N3',
NET_SSH2_MSG_CHANNEL_OPEN,
+ strlen('session'),
'session',
self::CHANNEL_SUBSYSTEM,
$this->window_size,
0x4000
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL_SUBSYSTEM] = NET_SSH2_MSG_CHANNEL_OPEN;
- $response = $this->get_channel_packet(self::CHANNEL_SUBSYSTEM);
+ $response = $this->_get_channel_packet(self::CHANNEL_SUBSYSTEM);
if ($response === false) {
return false;
}
- $packet = Strings::packSSH2(
- 'CNsCs',
+ $packet = pack(
+ 'CNNa*CNa*',
NET_SSH2_MSG_CHANNEL_REQUEST,
$this->server_channels[self::CHANNEL_SUBSYSTEM],
+ strlen('subsystem'),
'subsystem',
1,
+ strlen($subsystem),
$subsystem
);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->channel_status[self::CHANNEL_SUBSYSTEM] = NET_SSH2_MSG_CHANNEL_REQUEST;
- $response = $this->get_channel_packet(self::CHANNEL_SUBSYSTEM);
+ $response = $this->_get_channel_packet(self::CHANNEL_SUBSYSTEM);
+
if ($response === false) {
return false;
}
@@ -3036,10 +3165,10 @@ class SSH2
* @return bool
* @access public
*/
- public function stopSubsystem()
+ function stopSubsystem()
{
$this->in_subsystem = false;
- $this->close_channel(self::CHANNEL_SUBSYSTEM);
+ $this->_close_channel(self::CHANNEL_SUBSYSTEM);
return true;
}
@@ -3050,9 +3179,9 @@ class SSH2
*
* @access public
*/
- public function reset()
+ function reset()
{
- $this->close_channel($this->get_interactive_channel());
+ $this->_close_channel($this->_get_interactive_channel());
}
/**
@@ -3062,7 +3191,7 @@ class SSH2
*
* @access public
*/
- public function isTimeout()
+ function isTimeout()
{
return $this->is_timeout;
}
@@ -3072,13 +3201,12 @@ class SSH2
*
* @access public
*/
- public function disconnect()
+ function disconnect()
{
- $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
+ $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
if (isset($this->realtime_log_file) && is_resource($this->realtime_log_file)) {
fclose($this->realtime_log_file);
}
- unset(self::$connections[$this->getResourceId()]);
}
/**
@@ -3089,7 +3217,7 @@ class SSH2
*
* @access public
*/
- public function __destruct()
+ function __destruct()
{
$this->disconnect();
}
@@ -3100,7 +3228,7 @@ class SSH2
* @return bool
* @access public
*/
- public function isConnected()
+ function isConnected()
{
return (bool) ($this->bitmap & self::MASK_CONNECTED);
}
@@ -3111,7 +3239,7 @@ class SSH2
* @return bool
* @access public
*/
- public function isAuthenticated()
+ function isAuthenticated()
{
return (bool) ($this->bitmap & self::MASK_LOGIN);
}
@@ -3122,55 +3250,59 @@ class SSH2
* Inspired by http://php.net/manual/en/mysqli.ping.php
*
* @return bool
+ * @access public
*/
- public function ping()
+ function ping()
{
if (!$this->isAuthenticated()) {
if (!empty($this->auth)) {
- return $this->reconnect();
+ return $this->_reconnect();
}
return false;
}
$this->window_size_server_to_client[self::CHANNEL_KEEP_ALIVE] = $this->window_size;
$packet_size = 0x4000;
- $packet = Strings::packSSH2(
- 'CsN3',
+ $packet = pack(
+ 'CNa*N3',
NET_SSH2_MSG_CHANNEL_OPEN,
+ strlen('session'),
'session',
self::CHANNEL_KEEP_ALIVE,
$this->window_size_server_to_client[self::CHANNEL_KEEP_ALIVE],
$packet_size
);
- try {
- $this->send_binary_packet($packet);
+ if (!@$this->_send_binary_packet($packet)) {
+ return $this->_reconnect();
+ }
- $this->channel_status[self::CHANNEL_KEEP_ALIVE] = NET_SSH2_MSG_CHANNEL_OPEN;
+ $this->channel_status[self::CHANNEL_KEEP_ALIVE] = NET_SSH2_MSG_CHANNEL_OPEN;
- $response = $this->get_channel_packet(self::CHANNEL_KEEP_ALIVE);
- } catch (\RuntimeException $e) {
- return $this->reconnect();
+ $response = @$this->_get_channel_packet(self::CHANNEL_KEEP_ALIVE);
+ if ($response !== false) {
+ $this->_close_channel(self::CHANNEL_KEEP_ALIVE);
+ return true;
}
- $this->close_channel(NET_SSH2_CHANNEL_KEEP_ALIVE);
- return true;
+ return $this->_reconnect();
}
/**
* In situ reconnect method
*
* @return boolean
+ * @access private
*/
- private function reconnect()
+ function _reconnect()
{
- $this->reset_connection(NET_SSH2_DISCONNECT_CONNECTION_LOST);
+ $this->_reset_connection(NET_SSH2_DISCONNECT_CONNECTION_LOST);
$this->retry_connect = true;
- if (!$this->connect()) {
+ if (!$this->_connect()) {
return false;
}
foreach ($this->auth as $auth) {
- $result = $this->login(...$auth);
+ $result = call_user_func_array(array(&$this, 'login'), $auth);
}
return $result;
}
@@ -3181,9 +3313,9 @@ class SSH2
* @param int $reason
* @access private
*/
- protected function reset_connection($reason)
+ function _reset_connection($reason)
{
- $this->disconnect_helper($reason);
+ $this->_disconnect($reason);
$this->decrypt = $this->encrypt = false;
$this->decrypt_block_size = $this->encrypt_block_size = 8;
$this->hmac_check = $this->hmac_create = false;
@@ -3199,23 +3331,22 @@ class SSH2
* See '6. Binary Packet Protocol' of rfc4253 for more info.
*
* @see self::_send_binary_packet()
- * @param bool $skip_channel_filter
* @return string
* @access private
*/
- private function get_binary_packet($skip_channel_filter = false)
+ function _get_binary_packet($skip_channel_filter = false)
{
if ($skip_channel_filter) {
- $read = [$this->fsock];
+ $read = array($this->fsock);
$write = $except = null;
if ($this->curTimeout <= 0) {
if ($this->keepAlive <= 0) {
@stream_select($read, $write, $except, null);
} else {
- if (!@stream_select($read, $write, $except, $this->keepAlive)) {
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_IGNORE, 0));
- return $this->get_binary_packet(true);
+ if (!@stream_select($read, $write, $except, $this->keepAlive) && !count($read)) {
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_IGNORE, 0));
+ return $this->_get_binary_packet(true);
}
}
} else {
@@ -3224,17 +3355,17 @@ class SSH2
return true;
}
- $read = [$this->fsock];
+ $read = array($this->fsock);
$write = $except = null;
$start = microtime(true);
if ($this->keepAlive > 0 && $this->keepAlive < $this->curTimeout) {
- if (!@stream_select($read, $write, $except, $this->keepAlive)) {
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_IGNORE, 0));
+ if (!@stream_select($read, $write, $except, $this->keepAlive) && !count($read)) {
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_IGNORE, 0));
$elapsed = microtime(true) - $start;
$this->curTimeout-= $elapsed;
- return $this->get_binary_packet(true);
+ return $this->_get_binary_packet(true);
}
$elapsed = microtime(true) - $start;
$this->curTimeout-= $elapsed;
@@ -3243,8 +3374,8 @@ class SSH2
$sec = floor($this->curTimeout);
$usec = 1000000 * ($this->curTimeout - $sec);
- // this can return a "stream_select(): unable to select [4]: Interrupted system call" error
- if (!@stream_select($read, $write, $except, $sec, $usec)) {
+ // on windows this returns a "Warning: Invalid CRT parameters detected" error
+ if (!@stream_select($read, $write, $except, $sec, $usec) && !count($read)) {
$this->is_timeout = true;
return true;
}
@@ -3255,7 +3386,8 @@ class SSH2
if (!is_resource($this->fsock) || feof($this->fsock)) {
$this->bitmap = 0;
- throw new ConnectionClosedException('Connection closed prematurely');
+ user_error('Connection closed prematurely');
+ return false;
}
$start = microtime(true);
@@ -3265,121 +3397,63 @@ class SSH2
return '';
}
- if ($this->decrypt) {
- switch ($this->decrypt->name) {
- case 'aes128-gcm@openssh.com':
- case 'aes256-gcm@openssh.com':
- $this->decrypt->setNonce(
- $this->decrypt->fixed .
- $this->decrypt->invocation_counter
- );
- Strings::increment_str($this->decrypt->invocation_counter);
- $this->decrypt->setAAD($temp = Strings::shift($raw, 4));
- extract(unpack('Npacket_length', $temp));
- /**
- * @var integer $packet_length
- */
-
- $raw.= $this->read_remaining_bytes($packet_length - $this->decrypt_block_size + 4);
- $stop = microtime(true);
- $tag = stream_get_contents($this->fsock, $this->decrypt_block_size);
- $this->decrypt->setTag($tag);
- $raw = $this->decrypt->decrypt($raw);
- $raw = $temp . $raw;
- $remaining_length = 0;
- break;
- case 'chacha20-poly1305@openssh.com':
- $nonce = pack('N2', 0, $this->get_seq_no);
-
- $this->lengthDecrypt->setNonce($nonce);
- $temp = $this->lengthDecrypt->decrypt($aad = Strings::shift($raw, 4));
- extract(unpack('Npacket_length', $temp));
- /**
- * @var integer $packet_length
- */
-
- $raw.= $this->read_remaining_bytes($packet_length - $this->decrypt_block_size + 4);
- $stop = microtime(true);
- $tag = stream_get_contents($this->fsock, 16);
-
- $this->decrypt->setNonce($nonce);
- $this->decrypt->setCounter(0);
- // this is the same approach that's implemented in Salsa20::createPoly1305Key()
- // but we don't want to use the same AEAD construction that RFC8439 describes
- // for ChaCha20-Poly1305 so we won't rely on it (see Salsa20::poly1305())
- $this->decrypt->setPoly1305Key(
- $this->decrypt->encrypt(str_repeat("\0", 32))
- );
- $this->decrypt->setAAD($aad);
- $this->decrypt->setCounter(1);
- $this->decrypt->setTag($tag);
- $raw = $this->decrypt->decrypt($raw);
- $raw = $temp . $raw;
- $remaining_length = 0;
- break;
- default:
- if (!$this->hmac_check instanceof Hash || !$this->hmac_check->etm) {
- $raw = $this->decrypt->decrypt($raw);
- break;
- }
- extract(unpack('Npacket_length', $temp = Strings::shift($raw, 4)));
- /**
- * @var integer $packet_length
- */
- $raw.= $this->read_remaining_bytes($packet_length - $this->decrypt_block_size + 4);
- $stop = microtime(true);
- $encrypted = $temp . $raw;
- $raw = $temp . $this->decrypt->decrypt($raw);
- $remaining_length = 0;
- }
+ if ($this->decrypt !== false) {
+ $raw = $this->decrypt->decrypt($raw);
+ }
+ if ($raw === false) {
+ user_error('Unable to decrypt content');
+ return false;
}
if (strlen($raw) < 5) {
return false;
}
- extract(unpack('Npacket_length/Cpadding_length', Strings::shift($raw, 5)));
- /**
- * @var integer $packet_length
- * @var integer $padding_length
- */
+ extract(unpack('Npacket_length/Cpadding_length', $this->_string_shift($raw, 5)));
- if (!isset($remaining_length)) {
- $remaining_length = $packet_length + 4 - $this->decrypt_block_size;
- }
+ $remaining_length = $packet_length + 4 - $this->decrypt_block_size;
- $buffer = $this->read_remaining_bytes($remaining_length);
+ // quoting <http://tools.ietf.org/html/rfc4253#section-6.1>,
+ // "implementations SHOULD check that the packet length is reasonable"
+ // PuTTY uses 0x9000 as the actual max packet size and so to shall we
+ if ($remaining_length < -$this->decrypt_block_size || $remaining_length > 0x9000 || $remaining_length % $this->decrypt_block_size != 0) {
+ if (!$this->bad_key_size_fix && $this->_bad_algorithm_candidate($this->decrypt->name) && !($this->bitmap & SSH2::MASK_LOGIN)) {
+ $this->bad_key_size_fix = true;
+ $this->_reset_connection(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
+ return false;
+ }
+ user_error('Invalid size');
+ return false;
+ }
- if (!isset($stop)) {
- $stop = microtime(true);
+ $buffer = '';
+ while ($remaining_length > 0) {
+ $temp = stream_get_contents($this->fsock, $remaining_length);
+ if ($temp === false || feof($this->fsock)) {
+ $this->bitmap = 0;
+ user_error('Error reading from socket');
+ return false;
+ }
+ $buffer.= $temp;
+ $remaining_length-= strlen($temp);
}
+
+ $stop = microtime(true);
if (strlen($buffer)) {
- $raw.= $this->decrypt ? $this->decrypt->decrypt($buffer) : $buffer;
+ $raw.= $this->decrypt !== false ? $this->decrypt->decrypt($buffer) : $buffer;
}
- $payload = Strings::shift($raw, $packet_length - $padding_length - 1);
- $padding = Strings::shift($raw, $padding_length); // should leave $raw empty
+ $payload = $this->_string_shift($raw, $packet_length - $padding_length - 1);
+ $padding = $this->_string_shift($raw, $padding_length); // should leave $raw empty
- if ($this->hmac_check instanceof Hash) {
+ if ($this->hmac_check !== false) {
$hmac = stream_get_contents($this->fsock, $this->hmac_size);
if ($hmac === false || strlen($hmac) != $this->hmac_size) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_MAC_ERROR);
- throw new \RuntimeException('Error reading socket');
- }
-
- $reconstructed = !$this->hmac_check->etm ?
- pack('NCa*', $packet_length, $padding_length, $payload . $padding) :
- $encrypted;
- if (($this->hmac_check->getHash() & "\xFF\xFF\xFF\xFF") == 'umac') {
- $this->hmac_check->setNonce("\0\0\0\0" . pack('N', $this->get_seq_no));
- if ($hmac != $this->hmac_check->hash($reconstructed)) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_MAC_ERROR);
- throw new \RuntimeException('Invalid UMAC');
- }
- } else {
- if ($hmac != $this->hmac_check->hash(pack('Na*', $this->get_seq_no, $reconstructed))) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_MAC_ERROR);
- throw new \RuntimeException('Invalid HMAC');
- }
+ $this->bitmap = 0;
+ user_error('Error reading socket');
+ return false;
+ } elseif ($hmac != $this->hmac_check->hash(pack('NNCa*', $this->get_seq_no, $packet_length, $padding_length, $payload . $padding))) {
+ user_error('Invalid HMAC');
+ return false;
}
}
@@ -3394,68 +3468,11 @@ class SSH2
$message_number = isset($this->message_numbers[ord($payload[0])]) ? $this->message_numbers[ord($payload[0])] : 'UNKNOWN (' . ord($payload[0]) . ')';
$message_number = '<- ' . $message_number .
' (since last: ' . round($current - $this->last_packet, 4) . ', network: ' . round($stop - $start, 4) . 's)';
- $this->append_log($message_number, $payload);
+ $this->_append_log($message_number, $payload);
$this->last_packet = $current;
}
- return $this->filter($payload, $skip_channel_filter);
- }
-
- /**
- * Read Remaining Bytes
- *
- * @see self::get_binary_packet()
- * @param int $remaining_length
- * @return string
- * @access private
- */
- private function read_remaining_bytes($remaining_length)
- {
- if (!$remaining_length) {
- return '';
- }
-
- $adjustLength = false;
- if ($this->decrypt) {
- switch (true) {
- case $this->decrypt->name == 'aes128-gcm@openssh.com':
- case $this->decrypt->name == 'aes256-gcm@openssh.com':
- case $this->decrypt->name == 'chacha20-poly1305@openssh.com':
- case $this->hmac_check instanceof Hash && $this->hmac_check->etm:
- $remaining_length+= $this->decrypt_block_size - 4;
- $adjustLength = true;
- }
- }
-
- // quoting <http://tools.ietf.org/html/rfc4253#section-6.1>,
- // "implementations SHOULD check that the packet length is reasonable"
- // PuTTY uses 0x9000 as the actual max packet size and so to shall we
- // don't do this when GCM mode is used since GCM mode doesn't encrypt the length
- if ($remaining_length < -$this->decrypt_block_size || $remaining_length > 0x9000 || $remaining_length % $this->decrypt_block_size != 0) {
- if (!$this->bad_key_size_fix && self::bad_algorithm_candidate($this->decrypt ? $this->decrypt->name : '') && !($this->bitmap & SSH2::MASK_LOGIN)) {
- $this->bad_key_size_fix = true;
- $this->reset_connection(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
- return false;
- }
- throw new \RuntimeException('Invalid size');
- }
-
- if ($adjustLength) {
- $remaining_length-= $this->decrypt_block_size - 4;
- }
-
- $buffer = '';
- while ($remaining_length > 0) {
- $temp = stream_get_contents($this->fsock, $remaining_length);
- if ($temp === false || feof($this->fsock)) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new \RuntimeException('Error reading from socket');
- }
- $buffer.= $temp;
- $remaining_length-= strlen($temp);
- }
-
- return $buffer;
+ return $this->_filter($payload, $skip_channel_filter);
}
/**
@@ -3464,46 +3481,55 @@ class SSH2
* Because some binary packets need to be ignored...
*
* @see self::_get_binary_packet()
- * @param string $payload
- * @param bool $skip_channel_filter
* @return string
* @access private
*/
- private function filter($payload, $skip_channel_filter)
+ function _filter($payload, $skip_channel_filter)
{
switch (ord($payload[0])) {
case NET_SSH2_MSG_DISCONNECT:
- Strings::shift($payload, 1);
- list($reason_code, $message) = Strings::unpackSSH2('Ns', $payload);
- $this->errors[] = 'SSH_MSG_DISCONNECT: ' . $this->disconnect_reasons[$reason_code] . "\r\n$message";
+ $this->_string_shift($payload, 1);
+ if (strlen($payload) < 8) {
+ return false;
+ }
+ extract(unpack('Nreason_code/Nlength', $this->_string_shift($payload, 8)));
+ $this->errors[] = 'SSH_MSG_DISCONNECT: ' . $this->disconnect_reasons[$reason_code] . "\r\n" . $this->_string_shift($payload, $length);
$this->bitmap = 0;
return false;
case NET_SSH2_MSG_IGNORE:
- $payload = $this->get_binary_packet($skip_channel_filter);
+ $payload = $this->_get_binary_packet($skip_channel_filter);
break;
case NET_SSH2_MSG_DEBUG:
- Strings::shift($payload, 2); // second byte is "always_display"
- list($message) = Strings::unpackSSH2('s', $payload);
- $this->errors[] = "SSH_MSG_DEBUG: $message";
- $payload = $this->get_binary_packet($skip_channel_filter);
+ $this->_string_shift($payload, 2);
+ if (strlen($payload) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($payload, 4)));
+ $this->errors[] = 'SSH_MSG_DEBUG: ' . $this->_string_shift($payload, $length);
+ $payload = $this->_get_binary_packet($skip_channel_filter);
break;
case NET_SSH2_MSG_UNIMPLEMENTED:
return false;
case NET_SSH2_MSG_KEXINIT:
if ($this->session_id !== false) {
- if (!$this->key_exchange($payload)) {
+ $this->send_kex_first = false;
+ if (!$this->_key_exchange($payload)) {
$this->bitmap = 0;
return false;
}
- $payload = $this->get_binary_packet($skip_channel_filter);
+ $payload = $this->_get_binary_packet($skip_channel_filter);
}
}
// see http://tools.ietf.org/html/rfc4252#section-5.4; only called when the encryption has been activated and when we haven't already logged in
if (($this->bitmap & self::MASK_CONNECTED) && !$this->isAuthenticated() && ord($payload[0]) == NET_SSH2_MSG_USERAUTH_BANNER) {
- Strings::shift($payload, 1);
- list($this->banner_message) = Strings::unpackSSH2('s', $payload);
- $payload = $this->get_binary_packet();
+ $this->_string_shift($payload, 1);
+ if (strlen($payload) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($payload, 4)));
+ $this->banner_message = $this->_string_shift($payload, $length);
+ $payload = $this->_get_binary_packet();
}
// only called when we've already logged in
@@ -3514,9 +3540,9 @@ class SSH2
extract(unpack('cpacket_type/Nchannel/Nlength', $payload));
if (substr($payload, 9, $length) == 'keepalive@openssh.com' && isset($this->server_channels[$channel])) {
if (ord(substr($payload, 9 + $length))) { // want reply
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_SUCCESS, $this->server_channels[$channel]));
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_SUCCESS, $this->server_channels[$channel]));
}
- $payload = $this->get_binary_packet($skip_channel_filter);
+ $payload = $this->_get_binary_packet($skip_channel_filter);
}
}
break;
@@ -3526,36 +3552,45 @@ class SSH2
case NET_SSH2_MSG_CHANNEL_EOF:
if (!$skip_channel_filter && !empty($this->server_channels)) {
$this->binary_packet_buffer = $payload;
- $this->get_channel_packet(true);
- $payload = $this->get_binary_packet();
+ $this->_get_channel_packet(true);
+ $payload = $this->_get_binary_packet();
}
break;
case NET_SSH2_MSG_GLOBAL_REQUEST: // see http://tools.ietf.org/html/rfc4254#section-4
- Strings::shift($payload, 1);
- list($request_name) = Strings::unpackSSH2('s', $payload);
- $this->errors[] = "SSH_MSG_GLOBAL_REQUEST: $request_name";
-
- try {
- $this->send_binary_packet(pack('C', NET_SSH2_MSG_REQUEST_FAILURE));
- } catch (\RuntimeException $e) {
- return $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
+ if (strlen($payload) < 4) {
+ return false;
}
+ extract(unpack('Nlength', $this->_string_shift($payload, 4)));
+ $this->errors[] = 'SSH_MSG_GLOBAL_REQUEST: ' . $this->_string_shift($payload, $length);
- $payload = $this->get_binary_packet($skip_channel_filter);
+ if (!$this->_send_binary_packet(pack('C', NET_SSH2_MSG_REQUEST_FAILURE))) {
+ return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
+ }
+
+ $payload = $this->_get_binary_packet($skip_channel_filter);
break;
case NET_SSH2_MSG_CHANNEL_OPEN: // see http://tools.ietf.org/html/rfc4254#section-5.1
- Strings::shift($payload, 1);
- list($data, $server_channel) = Strings::unpackSSH2('sN', $payload);
+ $this->_string_shift($payload, 1);
+ if (strlen($payload) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($payload, 4)));
+ $data = $this->_string_shift($payload, $length);
+ if (strlen($payload) < 4) {
+ return false;
+ }
+ extract(unpack('Nserver_channel', $this->_string_shift($payload, 4)));
switch ($data) {
case 'auth-agent':
case 'auth-agent@openssh.com':
if (isset($this->agent)) {
$new_channel = self::CHANNEL_AGENT_FORWARD;
- list(
- $remote_window_size,
- $remote_maximum_packet_size
- ) = Strings::unpackSSH2('NN', $payload);
+ if (strlen($payload) < 8) {
+ return false;
+ }
+ extract(unpack('Nremote_window_size', $this->_string_shift($payload, 4)));
+ extract(unpack('Nremote_maximum_packet_size', $this->_string_shift($payload, 4)));
$this->packet_size_client_to_server[$new_channel] = $remote_window_size;
$this->window_size_server_to_client[$new_channel] = $remote_maximum_packet_size;
@@ -3574,35 +3609,39 @@ class SSH2
$this->server_channels[$new_channel] = $server_channel;
$this->channel_status[$new_channel] = NET_SSH2_MSG_CHANNEL_OPEN_CONFIRMATION;
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
}
break;
default:
- $packet = Strings::packSSH2(
- 'CN2ss',
- NET_SSH2_MSG_CHANNEL_OPEN_FAILURE,
+ $packet = pack(
+ 'CN3a*Na*',
+ NET_SSH2_MSG_REQUEST_FAILURE,
$server_channel,
NET_SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED,
- '', // description
- '' // language tag
+ 0,
+ '',
+ 0,
+ ''
);
- try {
- $this->send_binary_packet($packet);
- } catch (\RuntimeException $e) {
- return $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
+ if (!$this->_send_binary_packet($packet)) {
+ return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
}
}
-
- $payload = $this->get_binary_packet($skip_channel_filter);
+ $payload = $this->_get_binary_packet($skip_channel_filter);
break;
case NET_SSH2_MSG_CHANNEL_WINDOW_ADJUST:
- Strings::shift($payload, 1);
- list($channel, $window_size) = Strings::unpackSSH2('NN', $payload);
-
+ $this->_string_shift($payload, 1);
+ if (strlen($payload) < 8) {
+ return false;
+ }
+ extract(unpack('Nchannel', $this->_string_shift($payload, 4)));
+ extract(unpack('Nwindow_size', $this->_string_shift($payload, 4)));
$this->window_size_client_to_server[$channel]+= $window_size;
- $payload = ($this->bitmap & self::MASK_WINDOW_ADJUST) ? true : $this->get_binary_packet($skip_channel_filter);
+ $payload = ($this->bitmap & self::MASK_WINDOW_ADJUST) ? true : $this->_get_binary_packet($skip_channel_filter);
}
}
@@ -3616,7 +3655,7 @@ class SSH2
*
* @access public
*/
- public function enableQuietMode()
+ function enableQuietMode()
{
$this->quiet_mode = true;
}
@@ -3628,7 +3667,7 @@ class SSH2
*
* @access public
*/
- public function disableQuietMode()
+ function disableQuietMode()
{
$this->quiet_mode = false;
}
@@ -3641,7 +3680,7 @@ class SSH2
* @access public
* @return bool
*/
- public function isQuietModeEnabled()
+ function isQuietModeEnabled()
{
return $this->quiet_mode;
}
@@ -3651,7 +3690,7 @@ class SSH2
*
* @access public
*/
- public function enablePTY()
+ function enablePTY()
{
$this->request_pty = true;
}
@@ -3661,10 +3700,10 @@ class SSH2
*
* @access public
*/
- public function disablePTY()
+ function disablePTY()
{
if ($this->in_request_pty_exec) {
- $this->close_channel(self::CHANNEL_EXEC);
+ $this->_close_channel(self::CHANNEL_EXEC);
$this->in_request_pty_exec = false;
}
$this->request_pty = false;
@@ -3678,7 +3717,7 @@ class SSH2
* @access public
* @return bool
*/
- public function isPTYEnabled()
+ function isPTYEnabled()
{
return $this->request_pty;
}
@@ -3690,11 +3729,10 @@ class SSH2
*
* @param int $client_channel
* @param bool $skip_extended
- * @return mixed
- * @throws \RuntimeException on connection error
+ * @return mixed|bool
* @access private
*/
- protected function get_channel_packet($client_channel, $skip_extended = false)
+ function _get_channel_packet($client_channel, $skip_extended = false)
{
if (!empty($this->channel_buffers[$client_channel])) {
return array_shift($this->channel_buffers[$client_channel]);
@@ -3705,23 +3743,36 @@ class SSH2
$response = $this->binary_packet_buffer;
$this->binary_packet_buffer = false;
} else {
- $response = $this->get_binary_packet(true);
+ $response = $this->_get_binary_packet(true);
if ($response === true && $this->is_timeout) {
if ($client_channel == self::CHANNEL_EXEC && !$this->request_pty) {
- $this->close_channel($client_channel);
+ $this->_close_channel($client_channel);
}
return true;
}
if ($response === false) {
- $this->disconnect_helper(NET_SSH2_DISCONNECT_CONNECTION_LOST);
- throw new ConnectionClosedException('Connection closed by server');
+ $this->bitmap = 0;
+ user_error('Connection closed by server');
+ return false;
}
}
if ($client_channel == -1 && $response === true) {
return true;
}
- list($type, $channel) = Strings::unpackSSH2('CN', $response);
+ if (!strlen($response)) {
+ return false;
+ }
+ extract(unpack('Ctype', $this->_string_shift($response, 1)));
+
+ if (strlen($response) < 4) {
+ return false;
+ }
+ if ($type == NET_SSH2_MSG_CHANNEL_OPEN) {
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ } else {
+ extract(unpack('Nchannel', $this->_string_shift($response, 4)));
+ }
// will not be setup yet on incoming channel open request
if (isset($channel) && isset($this->channel_status[$channel]) && isset($this->window_size_server_to_client[$channel])) {
@@ -3732,7 +3783,9 @@ class SSH2
// PuTTY does something more analogous to the following:
//if ($this->window_size_server_to_client[$channel] < 0x3FFFFFFF) {
$packet = pack('CNN', NET_SSH2_MSG_CHANNEL_WINDOW_ADJUST, $this->server_channels[$channel], $this->window_resize);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
$this->window_size_server_to_client[$channel]+= $this->window_resize;
}
@@ -3740,11 +3793,15 @@ class SSH2
case NET_SSH2_MSG_CHANNEL_EXTENDED_DATA:
/*
if ($client_channel == self::CHANNEL_EXEC) {
- $this->send_channel_packet($client_channel, chr(0));
+ $this->_send_channel_packet($client_channel, chr(0));
}
*/
// currently, there's only one possible value for $data_type_code: NET_SSH2_EXTENDED_DATA_STDERR
- list($data_type_code, $data) = Strings::unpackSSH2('Ns', $response);
+ if (strlen($response) < 8) {
+ return false;
+ }
+ extract(unpack('Ndata_type_code/Nlength', $this->_string_shift($response, 8)));
+ $data = $this->_string_shift($response, $length);
$this->stdErrorLog.= $data;
if ($skip_extended || $this->quiet_mode) {
continue 2;
@@ -3753,7 +3810,7 @@ class SSH2
return $data;
}
if (!isset($this->channel_buffers[$channel])) {
- $this->channel_buffers[$channel] = [];
+ $this->channel_buffers[$channel] = array();
}
$this->channel_buffers[$channel][] = $data;
@@ -3762,29 +3819,40 @@ class SSH2
if ($this->channel_status[$channel] == NET_SSH2_MSG_CHANNEL_CLOSE) {
continue 2;
}
- list($value) = Strings::unpackSSH2('s', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $value = $this->_string_shift($response, $length);
switch ($value) {
case 'exit-signal':
- list(
- , // FALSE
- $signal_name,
- , // core dumped
- $error_message
- ) = Strings::unpackSSH2('bsbs', $response);
-
- $this->errors[] = "SSH_MSG_CHANNEL_REQUEST (exit-signal): $signal_name";
- if (strlen($error_message)) {
- $this->errors[count($this->errors) - 1].= "\r\n$error_message";
+ $this->_string_shift($response, 1);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $this->errors[] = 'SSH_MSG_CHANNEL_REQUEST (exit-signal): ' . $this->_string_shift($response, $length);
+ $this->_string_shift($response, 1);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ if ($length) {
+ $this->errors[count($this->errors)].= "\r\n" . $this->_string_shift($response, $length);
}
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_EOF, $this->server_channels[$client_channel]));
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$channel]));
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_EOF, $this->server_channels[$client_channel]));
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$channel]));
$this->channel_status[$channel] = NET_SSH2_MSG_CHANNEL_EOF;
continue 3;
case 'exit-status':
- list(, $this->exit_status) = Strings::unpackSSH2('CN', $response);
+ if (strlen($response) < 5) {
+ return false;
+ }
+ extract(unpack('Cfalse/Nexit_status', $this->_string_shift($response, 5)));
+ $this->exit_status = $exit_status;
// "The client MAY ignore these messages."
// -- http://tools.ietf.org/html/rfc4254#section-6.10
@@ -3801,24 +3869,32 @@ class SSH2
case NET_SSH2_MSG_CHANNEL_OPEN:
switch ($type) {
case NET_SSH2_MSG_CHANNEL_OPEN_CONFIRMATION:
- list(
- $this->server_channels[$channel],
- $window_size,
- $this->packet_size_client_to_server[$channel]
- ) = Strings::unpackSSH2('NNN', $response);
-
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nserver_channel', $this->_string_shift($response, 4)));
+ $this->server_channels[$channel] = $server_channel;
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nwindow_size', $this->_string_shift($response, 4)));
if ($window_size < 0) {
$window_size&= 0x7FFFFFFF;
$window_size+= 0x80000000;
}
$this->window_size_client_to_server[$channel] = $window_size;
- $result = $client_channel == $channel ? true : $this->get_channel_packet($client_channel, $skip_extended);
- $this->on_channel_open();
+ if (strlen($response) < 4) {
+ return false;
+ }
+ $temp = unpack('Npacket_size_client_to_server', $this->_string_shift($response, 4));
+ $this->packet_size_client_to_server[$channel] = $temp['packet_size_client_to_server'];
+ $result = $client_channel == $channel ? true : $this->_get_channel_packet($client_channel, $skip_extended);
+ $this->_on_channel_open();
return $result;
//case NET_SSH2_MSG_CHANNEL_OPEN_FAILURE:
default:
- $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
- throw new \RuntimeException('Unable to open channel');
+ user_error('Unable to open channel');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
}
break;
case NET_SSH2_MSG_CHANNEL_REQUEST:
@@ -3828,11 +3904,11 @@ class SSH2
case NET_SSH2_MSG_CHANNEL_FAILURE:
return false;
default:
- $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
- throw new \RuntimeException('Unable to fulfill channel request');
+ user_error('Unable to fulfill channel request');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
}
case NET_SSH2_MSG_CHANNEL_CLOSE:
- return $type == NET_SSH2_MSG_CHANNEL_CLOSE ? true : $this->get_channel_packet($client_channel, $skip_extended);
+ return $type == NET_SSH2_MSG_CHANNEL_CLOSE ? true : $this->_get_channel_packet($client_channel, $skip_extended);
}
}
@@ -3846,15 +3922,19 @@ class SSH2
// this actually seems to make things twice as fast. more to the point, the message right after
// SSH_MSG_CHANNEL_DATA (usually SSH_MSG_IGNORE) won't block for as long as it would have otherwise.
// in OpenSSH it slows things down but only by a couple thousandths of a second.
- $this->send_channel_packet($channel, chr(0));
+ $this->_send_channel_packet($channel, chr(0));
}
*/
- list($data) = Strings::unpackSSH2('s', $response);
+ if (strlen($response) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($response, 4)));
+ $data = $this->_string_shift($response, $length);
if ($channel == self::CHANNEL_AGENT_FORWARD) {
- $agent_response = $this->agent->forwardData($data);
+ $agent_response = $this->agent->_forward_data($data);
if (!is_bool($agent_response)) {
- $this->send_channel_packet($channel, $agent_response);
+ $this->_send_channel_packet($channel, $agent_response);
}
break;
}
@@ -3863,7 +3943,7 @@ class SSH2
return $data;
}
if (!isset($this->channel_buffers[$channel])) {
- $this->channel_buffers[$channel] = [];
+ $this->channel_buffers[$channel] = array();
}
$this->channel_buffers[$channel][] = $data;
break;
@@ -3874,7 +3954,7 @@ class SSH2
$this->bitmap&= ~self::MASK_SHELL;
}
if ($this->channel_status[$channel] != NET_SSH2_MSG_CHANNEL_EOF) {
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$channel]));
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$channel]));
}
$this->channel_status[$channel] = NET_SSH2_MSG_CHANNEL_CLOSE;
@@ -3884,8 +3964,8 @@ class SSH2
case NET_SSH2_MSG_CHANNEL_EOF:
break;
default:
- $this->disconnect_helper(NET_SSH2_DISCONNECT_BY_APPLICATION);
- throw new \RuntimeException('Error reading channel data');
+ user_error('Error reading channel data');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
}
}
}
@@ -3901,11 +3981,12 @@ class SSH2
* @return bool
* @access private
*/
- protected function send_binary_packet($data, $logged = null)
+ function _send_binary_packet($data, $logged = null)
{
if (!is_resource($this->fsock) || feof($this->fsock)) {
$this->bitmap = 0;
- throw new ConnectionClosedException('Connection closed prematurely');
+ user_error('Connection closed prematurely');
+ return false;
}
//if ($this->compress) {
@@ -3916,88 +3997,26 @@ class SSH2
// 4 (packet length) + 1 (padding length) + 4 (minimal padding amount) == 9
$packet_length = strlen($data) + 9;
- if ($this->encrypt && $this->encrypt->usesNonce()) {
- $packet_length-= 4;
- }
// round up to the nearest $this->encrypt_block_size
$packet_length+= (($this->encrypt_block_size - 1) * $packet_length) % $this->encrypt_block_size;
// subtracting strlen($data) is obvious - subtracting 5 is necessary because of packet_length and padding_length
$padding_length = $packet_length - strlen($data) - 5;
- switch (true) {
- case $this->encrypt && $this->encrypt->usesNonce():
- case $this->hmac_create instanceof Hash && $this->hmac_create->etm:
- $padding_length+= 4;
- $packet_length+= 4;
- }
-
$padding = Random::string($padding_length);
// we subtract 4 from packet_length because the packet_length field isn't supposed to include itself
$packet = pack('NCa*', $packet_length - 4, $padding_length, $data . $padding);
- $hmac = '';
- if ($this->hmac_create instanceof Hash && !$this->hmac_create->etm) {
- if (($this->hmac_create->getHash() & "\xFF\xFF\xFF\xFF") == 'umac') {
- $this->hmac_create->setNonce("\0\0\0\0" . pack('N', $this->send_seq_no));
- $hmac = $this->hmac_create->hash($packet);
- } else {
- $hmac = $this->hmac_create->hash(pack('Na*', $this->send_seq_no, $packet));
- }
- }
-
- if ($this->encrypt) {
- switch ($this->encrypt->name) {
- case 'aes128-gcm@openssh.com':
- case 'aes256-gcm@openssh.com':
- $this->encrypt->setNonce(
- $this->encrypt->fixed .
- $this->encrypt->invocation_counter
- );
- Strings::increment_str($this->encrypt->invocation_counter);
- $this->encrypt->setAAD($temp = ($packet & "\xFF\xFF\xFF\xFF"));
- $packet = $temp . $this->encrypt->encrypt(substr($packet, 4));
- break;
- case 'chacha20-poly1305@openssh.com':
- $nonce = pack('N2', 0, $this->send_seq_no);
-
- $this->encrypt->setNonce($nonce);
- $this->lengthEncrypt->setNonce($nonce);
-
- $length = $this->lengthEncrypt->encrypt($packet & "\xFF\xFF\xFF\xFF");
-
- $this->encrypt->setCounter(0);
- // this is the same approach that's implemented in Salsa20::createPoly1305Key()
- // but we don't want to use the same AEAD construction that RFC8439 describes
- // for ChaCha20-Poly1305 so we won't rely on it (see Salsa20::poly1305())
- $this->encrypt->setPoly1305Key(
- $this->encrypt->encrypt(str_repeat("\0", 32))
- );
- $this->encrypt->setAAD($length);
- $this->encrypt->setCounter(1);
- $packet = $length . $this->encrypt->encrypt(substr($packet, 4));
- break;
- default:
- $packet = $this->hmac_create instanceof Hash && $this->hmac_create->etm ?
- ($packet & "\xFF\xFF\xFF\xFF") . $this->encrypt->encrypt(substr($packet, 4)) :
- $this->encrypt->encrypt($packet);
- }
- }
+ $hmac = $this->hmac_create !== false ? $this->hmac_create->hash(pack('Na*', $this->send_seq_no, $packet)) : '';
+ $this->send_seq_no++;
- if ($this->hmac_create instanceof Hash && $this->hmac_create->etm) {
- if (($this->hmac_create->getHash() & "\xFF\xFF\xFF\xFF") == 'umac') {
- $this->hmac_create->setNonce("\0\0\0\0" . pack('N', $this->send_seq_no));
- $hmac = $this->hmac_create->hash($packet);
- } else {
- $hmac = $this->hmac_create->hash(pack('Na*', $this->send_seq_no, $packet));
- }
+ if ($this->encrypt !== false) {
+ $packet = $this->encrypt->encrypt($packet);
}
- $this->send_seq_no++;
-
- $packet.= $this->encrypt && $this->encrypt->usesNonce() ? $this->encrypt->getTag() : $hmac;
+ $packet.= $hmac;
$start = microtime(true);
- $sent = @fputs($this->fsock, $packet);
+ $result = strlen($packet) == @fputs($this->fsock, $packet);
$stop = microtime(true);
if (defined('NET_SSH2_LOGGING')) {
@@ -4005,14 +4024,11 @@ class SSH2
$message_number = isset($this->message_numbers[ord($data[0])]) ? $this->message_numbers[ord($data[0])] : 'UNKNOWN (' . ord($data[0]) . ')';
$message_number = '-> ' . $message_number .
' (since last: ' . round($current - $this->last_packet, 4) . ', network: ' . round($stop - $start, 4) . 's)';
- $this->append_log($message_number, isset($logged) ? $logged : $data);
+ $this->_append_log($message_number, isset($logged) ? $logged : $data);
$this->last_packet = $current;
}
- if (strlen($packet) != $sent) {
- $this->bitmap = 0;
- throw new \RuntimeException("Only $sent of " . strlen($packet) . " bytes were sent");
- }
+ return $result;
}
/**
@@ -4024,11 +4040,11 @@ class SSH2
* @param string $message
* @access private
*/
- private function append_log($message_number, $message)
+ function _append_log($message_number, $message)
{
// remove the byte identifying the message type from all but the first two messages (ie. the identification strings)
if (strlen($message_number) > 2) {
- Strings::shift($message);
+ $this->_string_shift($message);
}
switch (NET_SSH2_LOGGING) {
@@ -4058,25 +4074,25 @@ class SSH2
$start = '<pre>';
$stop = '</pre>';
}
- echo $start . $this->format_log([$message], [$message_number]) . $stop;
+ echo $start . $this->_format_log(array($message), array($message_number)) . $stop;
@flush();
@ob_flush();
break;
- // basically the same thing as self::LOG_REALTIME with the caveat that NET_SSH2_LOG_REALTIME_FILENAME
+ // basically the same thing as self::LOG_REALTIME with the caveat that self::LOG_REALTIME_FILE
// needs to be defined and that the resultant log file will be capped out at self::LOG_MAX_SIZE.
// the earliest part of the log file is denoted by the first <<< START >>> and is not going to necessarily
// at the beginning of the file
case self::LOG_REALTIME_FILE:
if (!isset($this->realtime_log_file)) {
// PHP doesn't seem to like using constants in fopen()
- $filename = NET_SSH2_LOG_REALTIME_FILENAME;
+ $filename = self::LOG_REALTIME_FILENAME;
$fp = fopen($filename, 'w');
$this->realtime_log_file = $fp;
}
if (!is_resource($this->realtime_log_file)) {
break;
}
- $entry = $this->format_log([$message], [$message_number]);
+ $entry = $this->_format_log(array($message), array($message_number));
if ($this->realtime_log_wrap) {
$temp = "<<< START >>>\r\n";
$entry.= $temp;
@@ -4102,13 +4118,13 @@ class SSH2
* @return bool
* @access private
*/
- protected function send_channel_packet($client_channel, $data)
+ function _send_channel_packet($client_channel, $data)
{
while (strlen($data)) {
if (!$this->window_size_client_to_server[$client_channel]) {
$this->bitmap^= self::MASK_WINDOW_ADJUST;
// using an invalid channel will let the buffers be built up for the valid channels
- $this->get_channel_packet(-1);
+ $this->_get_channel_packet(-1);
$this->bitmap^= self::MASK_WINDOW_ADJUST;
}
@@ -4121,15 +4137,18 @@ class SSH2
$this->window_size_client_to_server[$client_channel]
);
- $temp = Strings::shift($data, $max_size);
- $packet = Strings::packSSH2(
- 'CNs',
+ $temp = $this->_string_shift($data, $max_size);
+ $packet = pack(
+ 'CN2a*',
NET_SSH2_MSG_CHANNEL_DATA,
$this->server_channels[$client_channel],
+ strlen($temp),
$temp
);
$this->window_size_client_to_server[$client_channel]-= strlen($temp);
- $this->send_binary_packet($packet);
+ if (!$this->_send_binary_packet($packet)) {
+ return false;
+ }
}
return true;
@@ -4138,7 +4157,7 @@ class SSH2
/**
* Closes and flushes a channel
*
- * \phpseclib3\Net\SSH2 doesn't properly close most channels. For exec() channels are normally closed by the server
+ * \phpseclib\Net\SSH2 doesn't properly close most channels. For exec() channels are normally closed by the server
* and for SFTP channels are presumably closed when the client disconnects. This functions is intended
* for SCP more than anything.
*
@@ -4147,21 +4166,21 @@ class SSH2
* @return bool
* @access private
*/
- private function close_channel($client_channel, $want_reply = false)
+ function _close_channel($client_channel, $want_reply = false)
{
// see http://tools.ietf.org/html/rfc4254#section-5.3
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_EOF, $this->server_channels[$client_channel]));
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_EOF, $this->server_channels[$client_channel]));
if (!$want_reply) {
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$client_channel]));
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$client_channel]));
}
$this->channel_status[$client_channel] = NET_SSH2_MSG_CHANNEL_CLOSE;
$this->curTimeout = 5;
- while (!is_bool($this->get_channel_packet($client_channel))) {
+ while (!is_bool($this->_get_channel_packet($client_channel))) {
}
if ($this->is_timeout) {
@@ -4169,7 +4188,7 @@ class SSH2
}
if ($want_reply) {
- $this->send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$client_channel]));
+ $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$client_channel]));
}
if ($this->bitmap & self::MASK_SHELL) {
@@ -4182,16 +4201,13 @@ class SSH2
*
* @param int $reason
* @return bool
- * @access protected
+ * @access private
*/
- protected function disconnect_helper($reason)
+ function _disconnect($reason)
{
if ($this->bitmap & self::MASK_CONNECTED) {
- $data = Strings::packSSH2('CNss', NET_SSH2_MSG_DISCONNECT, $reason, '', '');
- try {
- $this->send_binary_packet($data);
- } catch (\Exception $e) {
- }
+ $data = pack('CNNa*Na*', NET_SSH2_MSG_DISCONNECT, $reason, 0, '', 0, '');
+ $this->_send_binary_packet($data);
}
$this->bitmap = 0;
@@ -4203,17 +4219,34 @@ class SSH2
}
/**
+ * String Shift
+ *
+ * Inspired by array_shift
+ *
+ * @param string $string
+ * @param int $index
+ * @return string
+ * @access private
+ */
+ function _string_shift(&$string, $index = 1)
+ {
+ $substr = substr($string, 0, $index);
+ $string = substr($string, $index);
+ return $substr;
+ }
+
+ /**
* Define Array
*
* Takes any number of arrays whose indices are integers and whose values are strings and defines a bunch of
* named constants from it, using the value as the name of the constant and the index as the value of the constant.
* If any of the constants that would be defined already exists, none of the constants will be defined.
*
- * @param mixed[] ...$args
- * @access protected
+ * @access private
*/
- protected function define_array(...$args)
+ function _define_array()
{
+ $args = func_get_args();
foreach ($args as $arg) {
foreach ($arg as $key => $value) {
if (!defined($value)) {
@@ -4233,7 +4266,7 @@ class SSH2
* @access public
* @return array|false|string
*/
- public function getLog()
+ function getLog()
{
if (!defined('NET_SSH2_LOGGING')) {
return false;
@@ -4243,7 +4276,7 @@ class SSH2
case self::LOG_SIMPLE:
return $this->message_number_log;
case self::LOG_COMPLEX:
- $log = $this->format_log($this->message_log, $this->message_number_log);
+ $log = $this->_format_log($this->message_log, $this->message_number_log);
return PHP_SAPI == 'cli' ? $log : '<pre>' . $log . '</pre>';
default:
return false;
@@ -4258,7 +4291,7 @@ class SSH2
* @access private
* @return string
*/
- protected function format_log($message_log, $message_number_log)
+ function _format_log($message_log, $message_number_log)
{
$output = '';
for ($i = 0; $i < count($message_log); $i++) {
@@ -4269,10 +4302,8 @@ class SSH2
if (strlen($current_log)) {
$output.= str_pad(dechex($j), 7, '0', STR_PAD_LEFT) . '0 ';
}
- $fragment = Strings::shift($current_log, $this->log_short_width);
- $hex = substr(preg_replace_callback('#.#s', function ($matches) {
- return $this->log_boundary . str_pad(dechex(ord($matches[0])), 2, '0', STR_PAD_LEFT);
- }, $fragment), strlen($this->log_boundary));
+ $fragment = $this->_string_shift($current_log, $this->log_short_width);
+ $hex = substr(preg_replace_callback('#.#s', array($this, '_format_log_helper'), $fragment), strlen($this->log_boundary));
// replace non ASCII printable characters with dots
// http://en.wikipedia.org/wiki/ASCII#ASCII_printable_characters
// also replace < with a . since < messes up the output on web browsers
@@ -4287,7 +4318,21 @@ class SSH2
}
/**
- * Helper function for agent->on_channel_open()
+ * Helper function for _format_log
+ *
+ * For use with preg_replace_callback()
+ *
+ * @param array $matches
+ * @access private
+ * @return string
+ */
+ function _format_log_helper($matches)
+ {
+ return $this->log_boundary . str_pad(dechex(ord($matches[0])), 2, '0', STR_PAD_LEFT);
+ }
+
+ /**
+ * Helper function for agent->_on_channel_open()
*
* Used when channels are created to inform agent
* of said channel opening. Must be called after
@@ -4295,10 +4340,10 @@ class SSH2
*
* @access private
*/
- private function on_channel_open()
+ function _on_channel_open()
{
if (isset($this->agent)) {
- $this->agent->registerChannelOpen($this);
+ $this->agent->_on_channel_open($this);
}
}
@@ -4311,7 +4356,7 @@ class SSH2
* @return mixed False if intersection is empty, else intersected value.
* @access private
*/
- private static function array_intersect_first($array1, $array2)
+ function _array_intersect_first($array1, $array2)
{
foreach ($array1 as $value) {
if (in_array($value, $array2)) {
@@ -4327,7 +4372,7 @@ class SSH2
* @return string[]
* @access public
*/
- public function getErrors()
+ function getErrors()
{
return $this->errors;
}
@@ -4338,7 +4383,7 @@ class SSH2
* @return string
* @access public
*/
- public function getLastError()
+ function getLastError()
{
$count = count($this->errors);
@@ -4353,39 +4398,169 @@ class SSH2
* @return string
* @access public
*/
- public function getServerIdentification()
+ function getServerIdentification()
{
- $this->connect();
+ $this->_connect();
return $this->server_identifier;
}
/**
+ * Return a list of the key exchange algorithms the server supports.
+ *
+ * @return array
+ * @access public
+ */
+ function getKexAlgorithms()
+ {
+ $this->_connect();
+
+ return $this->kex_algorithms;
+ }
+
+ /**
+ * Return a list of the host key (public key) algorithms the server supports.
+ *
+ * @return array
+ * @access public
+ */
+ function getServerHostKeyAlgorithms()
+ {
+ $this->_connect();
+
+ return $this->server_host_key_algorithms;
+ }
+
+ /**
+ * Return a list of the (symmetric key) encryption algorithms the server supports, when receiving stuff from the client.
+ *
+ * @return array
+ * @access public
+ */
+ function getEncryptionAlgorithmsClient2Server()
+ {
+ $this->_connect();
+
+ return $this->encryption_algorithms_client_to_server;
+ }
+
+ /**
+ * Return a list of the (symmetric key) encryption algorithms the server supports, when sending stuff to the client.
+ *
+ * @return array
+ * @access public
+ */
+ function getEncryptionAlgorithmsServer2Client()
+ {
+ $this->_connect();
+
+ return $this->encryption_algorithms_server_to_client;
+ }
+
+ /**
+ * Return a list of the MAC algorithms the server supports, when receiving stuff from the client.
+ *
+ * @return array
+ * @access public
+ */
+ function getMACAlgorithmsClient2Server()
+ {
+ $this->_connect();
+
+ return $this->mac_algorithms_client_to_server;
+ }
+
+ /**
+ * Return a list of the MAC algorithms the server supports, when sending stuff to the client.
+ *
+ * @return array
+ * @access public
+ */
+ function getMACAlgorithmsServer2Client()
+ {
+ $this->_connect();
+
+ return $this->mac_algorithms_server_to_client;
+ }
+
+ /**
+ * Return a list of the compression algorithms the server supports, when receiving stuff from the client.
+ *
+ * @return array
+ * @access public
+ */
+ function getCompressionAlgorithmsClient2Server()
+ {
+ $this->_connect();
+
+ return $this->compression_algorithms_client_to_server;
+ }
+
+ /**
+ * Return a list of the compression algorithms the server supports, when sending stuff to the client.
+ *
+ * @return array
+ * @access public
+ */
+ function getCompressionAlgorithmsServer2Client()
+ {
+ $this->_connect();
+
+ return $this->compression_algorithms_server_to_client;
+ }
+
+ /**
+ * Return a list of the languages the server supports, when sending stuff to the client.
+ *
+ * @return array
+ * @access public
+ */
+ function getLanguagesServer2Client()
+ {
+ $this->_connect();
+
+ return $this->languages_server_to_client;
+ }
+
+ /**
+ * Return a list of the languages the server supports, when receiving stuff from the client.
+ *
+ * @return array
+ * @access public
+ */
+ function getLanguagesClient2Server()
+ {
+ $this->_connect();
+
+ return $this->languages_client_to_server;
+ }
+
+ /**
* Returns a list of algorithms the server supports
*
* @return array
* @access public
*/
- public function getServerAlgorithms()
+ function getServerAlgorithms()
{
- $this->connect();
+ $this->_connect();
- return [
+ return array(
'kex' => $this->kex_algorithms,
'hostkey' => $this->server_host_key_algorithms,
- 'client_to_server' => [
+ 'client_to_server' => array(
'crypt' => $this->encryption_algorithms_client_to_server,
'mac' => $this->mac_algorithms_client_to_server,
'comp' => $this->compression_algorithms_client_to_server,
'lang' => $this->languages_client_to_server
- ],
- 'server_to_client' => [
+ ),
+ 'server_to_client' => array(
'crypt' => $this->encryption_algorithms_server_to_client,
'mac' => $this->mac_algorithms_server_to_client,
'comp' => $this->compression_algorithms_server_to_client,
'lang' => $this->languages_server_to_client
- ]
- ];
+ )
+ );
}
/**
@@ -4394,33 +4569,29 @@ class SSH2
* @return array
* @access public
*/
- public static function getSupportedKEXAlgorithms()
+ function getSupportedKEXAlgorithms()
{
- $kex_algorithms = [
+ $kex_algorithms = array(
// Elliptic Curve Diffie-Hellman Key Agreement (ECDH) using
// Curve25519. See doc/curve25519-sha256@libssh.org.txt in the
// libssh repository for more information.
- 'curve25519-sha256',
'curve25519-sha256@libssh.org',
- 'ecdh-sha2-nistp256', // RFC 5656
- 'ecdh-sha2-nistp384', // RFC 5656
- 'ecdh-sha2-nistp521', // RFC 5656
-
'diffie-hellman-group-exchange-sha256',// RFC 4419
'diffie-hellman-group-exchange-sha1', // RFC 4419
// Diffie-Hellman Key Agreement (DH) using integer modulo prime
// groups.
- 'diffie-hellman-group14-sha256',
'diffie-hellman-group14-sha1', // REQUIRED
- 'diffie-hellman-group15-sha512',
- 'diffie-hellman-group16-sha512',
- 'diffie-hellman-group17-sha512',
- 'diffie-hellman-group18-sha512',
-
'diffie-hellman-group1-sha1', // REQUIRED
- ];
+ );
+
+ if (!function_exists('sodium_crypto_box_publickey_from_secretkey')) {
+ $kex_algorithms = array_diff(
+ $kex_algorithms,
+ array('curve25519-sha256@libssh.org')
+ );
+ }
return $kex_algorithms;
}
@@ -4431,18 +4602,14 @@ class SSH2
* @return array
* @access public
*/
- public static function getSupportedHostKeyAlgorithms()
+ function getSupportedHostKeyAlgorithms()
{
- return [
- 'ssh-ed25519', // https://tools.ietf.org/html/draft-ietf-curdle-ssh-ed25519-02
- 'ecdsa-sha2-nistp256', // RFC 5656
- 'ecdsa-sha2-nistp384', // RFC 5656
- 'ecdsa-sha2-nistp521', // RFC 5656
+ return array(
'rsa-sha2-256', // RFC 8332
'rsa-sha2-512', // RFC 8332
'ssh-rsa', // RECOMMENDED sign Raw RSA Key
'ssh-dss' // REQUIRED sign Raw DSS Key
- ];
+ );
}
/**
@@ -4451,13 +4618,9 @@ class SSH2
* @return array
* @access public
*/
- public static function getSupportedEncryptionAlgorithms()
+ function getSupportedEncryptionAlgorithms()
{
- $algos = [
- // from <https://tools.ietf.org/html/rfc5647>:
- 'aes128-gcm@openssh.com',
- 'aes256-gcm@openssh.com',
-
+ $algos = array(
// from <http://tools.ietf.org/html/rfc4345#section-4>:
'arcfour256',
'arcfour128',
@@ -4469,16 +4632,6 @@ class SSH2
'aes192-ctr', // RECOMMENDED AES with 192-bit key
'aes256-ctr', // RECOMMENDED AES with 256-bit key
- // from <https://git.io/fhxOl>:
- // one of the big benefits of chacha20-poly1305 is speed. the problem is...
- // libsodium doesn't generate the poly1305 keys in the way ssh does and openssl's PHP bindings don't even
- // seem to support poly1305 currently. so even if libsodium or openssl are being used for the chacha20
- // part, pure-PHP has to be used for the poly1305 part and that's gonna cause a big slow down.
- // speed-wise it winds up being faster to use AES (when openssl or mcrypt are available) and some HMAC
- // (which is always gonna be super fast to compute thanks to the hash extension, which
- // "is bundled and compiled into PHP by default")
- 'chacha20-poly1305@openssh.com',
-
'twofish128-ctr', // OPTIONAL Twofish in SDCTR mode, with 128-bit key
'twofish192-ctr', // OPTIONAL Twofish with 192-bit key
'twofish256-ctr', // OPTIONAL Twofish with 256-bit key
@@ -4502,46 +4655,34 @@ class SSH2
'3des-cbc', // REQUIRED three-key 3DES in CBC mode
//'none' // OPTIONAL no encryption; NOT RECOMMENDED
- ];
+ );
- if (self::$crypto_engine) {
- $engines = [self::$crypto_engine];
+ if ($this->crypto_engine) {
+ $engines = array($this->crypto_engine);
} else {
- $engines = [
- 'libsodium',
- 'OpenSSL (GCM)',
- 'OpenSSL',
- 'mcrypt',
- 'Eval',
- 'PHP'
- ];
+ $engines = array(
+ Base::ENGINE_OPENSSL,
+ Base::ENGINE_MCRYPT,
+ Base::ENGINE_INTERNAL
+ );
}
- $ciphers = [];
-
+ $ciphers = array();
foreach ($engines as $engine) {
foreach ($algos as $algo) {
- $obj = self::encryption_algorithm_to_crypt_instance($algo);
- if ($obj instanceof Rijndael ) {
+ $obj = $this->_encryption_algorithm_to_crypt_instance($algo);
+ if ($obj instanceof Rijndael) {
$obj->setKeyLength(preg_replace('#[^\d]#', '', $algo));
}
switch ($algo) {
- case 'chacha20-poly1305@openssh.com':
case 'arcfour128':
case 'arcfour256':
- if ($engine != 'Eval') {
+ if ($engine != Base::ENGINE_INTERNAL) {
continue 2;
}
- break;
- case 'aes128-gcm@openssh.com':
- case 'aes256-gcm@openssh.com':
- if ($engine == 'OpenSSL') {
- continue 2;
- }
- $obj->setNonce('dummydummydu');
}
if ($obj->isValidEngine($engine)) {
- $algos = array_diff($algos, [$algo]);
+ $algos = array_diff($algos, array($algo));
$ciphers[] = $algo;
}
}
@@ -4556,29 +4697,18 @@ class SSH2
* @return array
* @access public
*/
- public static function getSupportedMACAlgorithms()
+ function getSupportedMACAlgorithms()
{
- return [
- 'hmac-sha2-256-etm@openssh.com',
- 'hmac-sha2-512-etm@openssh.com',
- 'umac-64-etm@openssh.com',
- 'umac-128-etm@openssh.com',
- 'hmac-sha1-etm@openssh.com',
-
+ return array(
// from <http://www.ietf.org/rfc/rfc6668.txt>:
'hmac-sha2-256',// RECOMMENDED HMAC-SHA256 (digest length = key length = 32)
- 'hmac-sha2-512',// OPTIONAL HMAC-SHA512 (digest length = key length = 64)
-
- // from <https://tools.ietf.org/html/draft-miller-secsh-umac-01>:
- 'umac-64@openssh.com',
- 'umac-128@openssh.com',
'hmac-sha1-96', // RECOMMENDED first 96 bits of HMAC-SHA1 (digest length = 12, key length = 20)
'hmac-sha1', // REQUIRED HMAC-SHA1 (digest length = key length = 20)
'hmac-md5-96', // OPTIONAL first 96 bits of HMAC-MD5 (digest length = 12, key length = 16)
'hmac-md5', // OPTIONAL HMAC-MD5 (digest length = key length = 16)
//'none' // OPTIONAL no MAC; NOT RECOMMENDED
- ];
+ );
}
/**
@@ -4587,12 +4717,12 @@ class SSH2
* @return array
* @access public
*/
- public static function getSupportedCompressionAlgorithms()
+ function getSupportedCompressionAlgorithms()
{
- return [
+ return array(
'none' // REQUIRED no compression
//'zlib' // OPTIONAL ZLIB (LZ77) compression
- ];
+ );
}
/**
@@ -4603,24 +4733,24 @@ class SSH2
* @return array
* @access public
*/
- public function getAlgorithmsNegotiated()
+ function getAlgorithmsNegotiated()
{
- $this->connect();
+ $this->_connect();
- return [
+ return array(
'kex' => $this->kex_algorithm,
'hostkey' => $this->signature_format,
- 'client_to_server' => [
+ 'client_to_server' => array(
'crypt' => $this->encrypt->name,
'mac' => $this->hmac_create->name,
'comp' => 'none',
- ],
- 'server_to_client' => [
+ ),
+ 'server_to_client' => array(
'crypt' => $this->decrypt->name,
'mac' => $this->hmac_check->name,
'comp' => 'none',
- ]
- ];
+ )
+ );
}
/**
@@ -4630,50 +4760,50 @@ class SSH2
* @param array $methods
* @access public
*/
- public function setPreferredAlgorithms(array $methods)
+ function setPreferredAlgorithms($methods)
{
$preferred = $methods;
if (isset($preferred['kex'])) {
$preferred['kex'] = array_intersect(
$preferred['kex'],
- static::getSupportedKEXAlgorithms()
+ $this->getSupportedKEXAlgorithms()
);
}
if (isset($preferred['hostkey'])) {
$preferred['hostkey'] = array_intersect(
$preferred['hostkey'],
- static::getSupportedHostKeyAlgorithms()
+ $this->getSupportedHostKeyAlgorithms()
);
}
- $keys = ['client_to_server', 'server_to_client'];
+ $keys = array('client_to_server', 'server_to_client');
foreach ($keys as $key) {
if (isset($preferred[$key])) {
$a = &$preferred[$key];
if (isset($a['crypt'])) {
$a['crypt'] = array_intersect(
$a['crypt'],
- static::getSupportedEncryptionAlgorithms()
+ $this->getSupportedEncryptionAlgorithms()
);
}
if (isset($a['comp'])) {
$a['comp'] = array_intersect(
$a['comp'],
- static::getSupportedCompressionAlgorithms()
+ $this->getSupportedCompressionAlgorithms()
);
}
if (isset($a['mac'])) {
$a['mac'] = array_intersect(
$a['mac'],
- static::getSupportedMACAlgorithms()
+ $this->getSupportedMACAlgorithms()
);
}
}
}
- $keys = [
+ $keys = array(
'kex',
'hostkey',
'client_to_server/crypt',
@@ -4682,7 +4812,7 @@ class SSH2
'server_to_client/crypt',
'server_to_client/comp',
'server_to_client/mac',
- ];
+ );
foreach ($keys as $key) {
$p = $preferred;
$m = $methods;
@@ -4701,7 +4831,8 @@ class SSH2
$msg = count($diff) == 1 ?
' is not a supported algorithm' :
' are not supported algorithms';
- throw new UnsupportedAlgorithmException(implode(', ', $diff) . $msg);
+ user_error(implode(', ', $diff) . $msg);
+ return false;
}
}
@@ -4717,7 +4848,7 @@ class SSH2
* @return string
* @access public
*/
- public function getBannerMessage()
+ function getBannerMessage()
{
return $this->banner_message;
}
@@ -4729,68 +4860,169 @@ class SSH2
* is recommended. Returns false if the server signature is not signed correctly with the public host key.
*
* @return mixed
- * @throws \RuntimeException on badly formatted keys
- * @throws \phpseclib3\Exception\NoSupportedAlgorithmsException when the key isn't in a supported format
* @access public
*/
- public function getServerPublicHostKey()
+ function getServerPublicHostKey()
{
if (!($this->bitmap & self::MASK_CONSTRUCTOR)) {
- if (!$this->connect()) {
+ if (!$this->_connect()) {
return false;
}
}
$signature = $this->signature;
- $server_public_host_key = base64_encode($this->server_public_host_key);
+ $server_public_host_key = $this->server_public_host_key;
+
+ if (strlen($server_public_host_key) < 4) {
+ return false;
+ }
+ extract(unpack('Nlength', $this->_string_shift($server_public_host_key, 4)));
+ $this->_string_shift($server_public_host_key, $length);
if ($this->signature_validated) {
return $this->bitmap ?
- $this->signature_format . ' ' . $server_public_host_key :
+ $this->signature_format . ' ' . base64_encode($this->server_public_host_key) :
false;
}
$this->signature_validated = true;
switch ($this->signature_format) {
- case 'ssh-ed25519':
- case 'ecdsa-sha2-nistp256':
- case 'ecdsa-sha2-nistp384':
- case 'ecdsa-sha2-nistp521':
- $key = EC::loadFormat('OpenSSH', $server_public_host_key)
- ->withSignatureFormat('SSH2');
+ case 'ssh-dss':
+ $zero = new BigInteger();
+
+ if (strlen($server_public_host_key) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($server_public_host_key, 4));
+ $p = new BigInteger($this->_string_shift($server_public_host_key, $temp['length']), -256);
+
+ if (strlen($server_public_host_key) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($server_public_host_key, 4));
+ $q = new BigInteger($this->_string_shift($server_public_host_key, $temp['length']), -256);
+
+ if (strlen($server_public_host_key) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($server_public_host_key, 4));
+ $g = new BigInteger($this->_string_shift($server_public_host_key, $temp['length']), -256);
+
+ if (strlen($server_public_host_key) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($server_public_host_key, 4));
+ $y = new BigInteger($this->_string_shift($server_public_host_key, $temp['length']), -256);
+
+ /* The value for 'dss_signature_blob' is encoded as a string containing
+ r, followed by s (which are 160-bit integers, without lengths or
+ padding, unsigned, and in network byte order). */
+ $temp = unpack('Nlength', $this->_string_shift($signature, 4));
+ if ($temp['length'] != 40) {
+ user_error('Invalid signature');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
+ }
+
+ $r = new BigInteger($this->_string_shift($signature, 20), 256);
+ $s = new BigInteger($this->_string_shift($signature, 20), 256);
+
+ switch (true) {
+ case $r->equals($zero):
+ case $r->compare($q) >= 0:
+ case $s->equals($zero):
+ case $s->compare($q) >= 0:
+ user_error('Invalid signature');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
+ }
+
+ $w = $s->modInverse($q);
+
+ $u1 = $w->multiply(new BigInteger(sha1($this->exchange_hash), 16));
+ list(, $u1) = $u1->divide($q);
+
+ $u2 = $w->multiply($r);
+ list(, $u2) = $u2->divide($q);
+
+ $g = $g->modPow($u1, $p);
+ $y = $y->modPow($u2, $p);
+
+ $v = $g->multiply($y);
+ list(, $v) = $v->divide($p);
+ list(, $v) = $v->divide($q);
+
+ if (!$v->equals($r)) {
+ user_error('Bad server signature');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE);
+ }
+
+ break;
+ case 'ssh-rsa':
+ case 'rsa-sha2-256':
+ case 'rsa-sha2-512':
+ if (strlen($server_public_host_key) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($server_public_host_key, 4));
+ $e = new BigInteger($this->_string_shift($server_public_host_key, $temp['length']), -256);
+
+ if (strlen($server_public_host_key) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($server_public_host_key, 4));
+ $rawN = $this->_string_shift($server_public_host_key, $temp['length']);
+ $n = new BigInteger($rawN, -256);
+ $nLength = strlen(ltrim($rawN, "\0"));
+
+ /*
+ if (strlen($signature) < 4) {
+ return false;
+ }
+ $temp = unpack('Nlength', $this->_string_shift($signature, 4));
+ $signature = $this->_string_shift($signature, $temp['length']);
+
+ $rsa = new RSA();
switch ($this->signature_format) {
- case 'ssh-ed25519':
+ case 'rsa-sha2-512':
$hash = 'sha512';
break;
- case 'ecdsa-sha2-nistp256':
+ case 'rsa-sha2-256':
$hash = 'sha256';
break;
- case 'ecdsa-sha2-nistp384':
- $hash = 'sha384';
- break;
- case 'ecdsa-sha2-nistp521':
- $hash = 'sha512';
+ //case 'ssh-rsa':
+ default:
+ $hash = 'sha1';
}
- $key = $key->withHash($hash);
- break;
- case 'ssh-dss':
- $key = DSA::loadFormat('OpenSSH', $server_public_host_key)
- ->withSignatureFormat('SSH2')
- ->withHash('sha1');
- break;
- case 'ssh-rsa':
- case 'rsa-sha2-256':
- case 'rsa-sha2-512':
- if (strlen($signature) < 15) {
+ $rsa->setHash($hash);
+ $rsa->setSignatureMode(RSA::SIGNATURE_PKCS1);
+ $rsa->loadKey(array('e' => $e, 'n' => $n), RSA::PUBLIC_FORMAT_RAW);
+
+ if (!$rsa->verify($this->exchange_hash, $signature)) {
+ user_error('Bad server signature');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE);
+ }
+ */
+
+ if (strlen($signature) < 4) {
return false;
}
- Strings::shift($signature, 11);
- $temp = unpack('Nlength', Strings::shift($signature, 4));
- $signature = Strings::shift($signature, $temp['length']);
+ $temp = unpack('Nlength', $this->_string_shift($signature, 4));
+ $s = new BigInteger($this->_string_shift($signature, $temp['length']), 256);
+
+ // validate an RSA signature per "8.2 RSASSA-PKCS1-v1_5", "5.2.2 RSAVP1", and "9.1 EMSA-PSS" in the
+ // following URL:
+ // ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf
+
+ // also, see SSHRSA.c (rsa2_verifysig) in PuTTy's source.
+
+ if ($s->compare(new BigInteger()) < 0 || $s->compare($n->subtract(new BigInteger(1))) > 0) {
+ user_error('Invalid signature');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_KEY_EXCHANGE_FAILED);
+ }
+
+ $s = $s->modPow($e, $n);
+ $s = $s->toBytes();
- $key = RSA::loadFormat('OpenSSH', $server_public_host_key)
- ->withPadding(RSA::SIGNATURE_PKCS1);
switch ($this->signature_format) {
case 'rsa-sha2-512':
$hash = 'sha512';
@@ -4802,18 +5034,32 @@ class SSH2
default:
$hash = 'sha1';
}
- $key = $key->withHash($hash);
+ $hashObj = new Hash($hash);
+ switch ($this->signature_format) {
+ case 'rsa-sha2-512':
+ $h = pack('N5a*', 0x00305130, 0x0D060960, 0x86480165, 0x03040203, 0x05000440, $hashObj->hash($this->exchange_hash));
+ break;
+ case 'rsa-sha2-256':
+ $h = pack('N5a*', 0x00303130, 0x0D060960, 0x86480165, 0x03040201, 0x05000420, $hashObj->hash($this->exchange_hash));
+ break;
+ //case 'ssh-rsa':
+ default:
+ $hash = 'sha1';
+ $h = pack('N4a*', 0x00302130, 0x0906052B, 0x0E03021A, 0x05000414, $hashObj->hash($this->exchange_hash));
+ }
+ $h = chr(0x01) . str_repeat(chr(0xFF), $nLength - 2 - strlen($h)) . $h;
+
+ if ($s != $h) {
+ user_error('Bad server signature');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE);
+ }
break;
default:
- $this->disconnect_helper(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE);
- throw new NoSupportedAlgorithmsException('Unsupported signature format');
+ user_error('Unsupported signature format');
+ return $this->_disconnect(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE);
}
- if (!$key->verify($this->exchange_hash, $signature)) {
- return $this->disconnect_helper(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE);
- };
-
- return $this->signature_format . ' ' . $server_public_host_key;
+ return $this->signature_format . ' ' . base64_encode($this->server_public_host_key);
}
/**
@@ -4822,7 +5068,7 @@ class SSH2
* @return false|int
* @access public
*/
- public function getExitStatus()
+ function getExitStatus()
{
if (is_null($this->exit_status)) {
return false;
@@ -4836,7 +5082,7 @@ class SSH2
* @return int
* @access public
*/
- public function getWindowColumns()
+ function getWindowColumns()
{
return $this->windowColumns;
}
@@ -4847,7 +5093,7 @@ class SSH2
* @return int
* @access public
*/
- public function getWindowRows()
+ function getWindowRows()
{
return $this->windowRows;
}
@@ -4858,7 +5104,7 @@ class SSH2
* @param int $value
* @access public
*/
- public function setWindowColumns($value)
+ function setWindowColumns($value)
{
$this->windowColumns = $value;
}
@@ -4869,7 +5115,7 @@ class SSH2
* @param int $value
* @access public
*/
- public function setWindowRows($value)
+ function setWindowRows($value)
{
$this->windowRows = $value;
}
@@ -4881,68 +5127,20 @@ class SSH2
* @param int $rows
* @access public
*/
- public function setWindowSize($columns = 80, $rows = 24)
+ function setWindowSize($columns = 80, $rows = 24)
{
$this->windowColumns = $columns;
$this->windowRows = $rows;
}
/**
- * To String Magic Method
- *
- * @return string
- * @access public
- */
- public function __toString()
- {
- return $this->getResourceId();
- }
-
- /**
- * Get Resource ID
- *
- * We use {} because that symbols should not be in URL according to
- * {@link http://tools.ietf.org/html/rfc3986#section-2 RFC}.
- * It will safe us from any conflicts, because otherwise regexp will
- * match all alphanumeric domains.
- *
- * @return string
- */
- public function getResourceId()
- {
- return '{' . spl_object_hash($this) . '}';
- }
-
- /**
- * Return existing connection
- *
- * @param string $id
- *
- * @return bool|SSH2 will return false if no such connection
- */
- public static function getConnectionByResourceId($id)
- {
- return isset(self::$connections[$id]) ? self::$connections[$id] : false;
- }
-
- /**
- * Return all excising connections
- *
- * @return SSH2[]
- */
- public static function getConnections()
- {
- return self::$connections;
- }
-
- /*
* Update packet types in log history
*
* @param string $old
* @param string $new
* @access private
*/
- private function updateLogHistory($old, $new)
+ function _updateLogHistory($old, $new)
{
if (defined('NET_SSH2_LOGGING') && NET_SSH2_LOGGING == self::LOG_COMPLEX) {
$this->message_number_log[count($this->message_number_log) - 1] = str_replace(
diff --git a/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php b/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php
index d2b955ae5..2b25250bd 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent.php
@@ -3,8 +3,6 @@
/**
* Pure-PHP ssh-agent client.
*
- * {@internal See http://api.libssh.org/rfc/PROTOCOL.agent}
- *
* PHP version 5
*
* Here are some examples of how to use this library:
@@ -12,9 +10,9 @@
* <?php
* include 'vendor/autoload.php';
*
- * $agent = new \phpseclib3\System\SSH\Agent();
+ * $agent = new \phpseclib\System\SSH\Agent();
*
- * $ssh = new \phpseclib3\Net\SSH2('www.domain.tld');
+ * $ssh = new \phpseclib\Net\SSH2('www.domain.tld');
* if (!$ssh->login('username', $agent)) {
* exit('Login Failed');
* }
@@ -30,20 +28,18 @@
* @copyright 2014 Jim Wigginton
* @license http://www.opensource.org/licenses/mit-license.html MIT License
* @link http://phpseclib.sourceforge.net
+ * @internal See http://api.libssh.org/rfc/PROTOCOL.agent
*/
-namespace phpseclib3\System\SSH;
+namespace phpseclib\System\SSH;
-use phpseclib3\Crypt\RSA;
-use phpseclib3\Exception\BadConfigurationException;
-use phpseclib3\System\SSH\Agent\Identity;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\PublicKeyLoader;
+use phpseclib\Crypt\RSA;
+use phpseclib\System\SSH\Agent\Identity;
/**
* Pure-PHP ssh-agent client identity factory
*
- * requestIdentities() method pumps out \phpseclib3\System\SSH\Agent\Identity objects
+ * requestIdentities() method pumps out \phpseclib\System\SSH\Agent\Identity objects
*
* @package SSH\Agent
* @author Jim Wigginton <terrafrost@php.net>
@@ -51,10 +47,11 @@ use phpseclib3\Crypt\PublicKeyLoader;
*/
class Agent
{
- use Common\Traits\ReadBytes;
-
- // Message numbers
-
+ /**#@+
+ * Message numbers
+ *
+ * @access private
+ */
// to request SSH1 keys you have to use SSH_AGENTC_REQUEST_RSA_IDENTITIES (1)
const SSH_AGENTC_REQUEST_IDENTITIES = 11;
// this is the SSH2 response; the SSH1 response is SSH_AGENT_RSA_IDENTITIES_ANSWER (2).
@@ -63,15 +60,20 @@ class Agent
const SSH_AGENTC_SIGN_REQUEST = 13;
// the SSH1 response is SSH_AGENT_RSA_RESPONSE (4)
const SSH_AGENT_SIGN_RESPONSE = 14;
+ /**#@-*/
- // Agent forwarding status
-
+ /**@+
+ * Agent forwarding status
+ *
+ * @access private
+ */
// no forwarding requested and not active
const FORWARD_NONE = 0;
// request agent forwarding when opportune
const FORWARD_REQUEST = 1;
// forwarding has been request and is active
const FORWARD_ACTIVE = 2;
+ /**#@-*/
/**
* Unused
@@ -84,53 +86,38 @@ class Agent
* @var resource
* @access private
*/
- private $fsock;
+ var $fsock;
/**
* Agent forwarding status
*
- * @var int
* @access private
*/
- private $forward_status = self::FORWARD_NONE;
+ var $forward_status = self::FORWARD_NONE;
/**
* Buffer for accumulating forwarded authentication
* agent data arriving on SSH data channel destined
* for agent unix socket
*
- * @var string
* @access private
*/
- private $socket_buffer = '';
+ var $socket_buffer = '';
/**
* Tracking the number of bytes we are expecting
* to arrive for the agent socket on the SSH data
* channel
- *
- * @var int
- * @access private
- */
- private $expected_bytes = 0;
-
- /**
- * The current request channel
- *
- * @var int
- * @access private
*/
- private $request_channel;
+ var $expected_bytes = 0;
/**
* Default Constructor
*
- * @return \phpseclib3\System\SSH\Agent
- * @throws \phpseclib3\Exception\BadConfigurationException if SSH_AUTH_SOCK cannot be found
- * @throws \RuntimeException on connection errors
+ * @return \phpseclib\System\SSH\Agent
* @access public
*/
- public function __construct($address = null)
+ function __construct($address = null)
{
if (!$address) {
switch (true) {
@@ -141,13 +128,14 @@ class Agent
$address = $_ENV['SSH_AUTH_SOCK'];
break;
default:
- throw new BadConfigurationException('SSH_AUTH_SOCK not found');
+ user_error('SSH_AUTH_SOCK not found');
+ return false;
}
}
$this->fsock = fsockopen('unix://' . $address, 0, $errno, $errstr);
if (!$this->fsock) {
- throw new \RuntimeException("Unable to connect to ssh-agent (Error $errno: $errstr)");
+ user_error("Unable to connect to ssh-agent (Error $errno: $errstr)");
}
}
@@ -155,50 +143,85 @@ class Agent
* Request Identities
*
* See "2.5.2 Requesting a list of protocol 2 keys"
- * Returns an array containing zero or more \phpseclib3\System\SSH\Agent\Identity objects
+ * Returns an array containing zero or more \phpseclib\System\SSH\Agent\Identity objects
*
* @return array
- * @throws \RuntimeException on receipt of unexpected packets
* @access public
*/
- public function requestIdentities()
+ function requestIdentities()
{
if (!$this->fsock) {
- return [];
+ return array();
}
$packet = pack('NC', 1, self::SSH_AGENTC_REQUEST_IDENTITIES);
if (strlen($packet) != fputs($this->fsock, $packet)) {
- throw new \RuntimeException('Connection closed while requesting identities');
+ user_error('Connection closed while requesting identities');
+ return array();
}
- $length = current(unpack('N', $this->readBytes(4)));
- $packet = $this->readBytes($length);
-
- list($type, $keyCount) = Strings::unpackSSH2('CN', $packet);
+ $temp = fread($this->fsock, 4);
+ if (strlen($temp) != 4) {
+ user_error('Connection closed while requesting identities');
+ return array();
+ }
+ $length = current(unpack('N', $temp));
+ $type = ord(fread($this->fsock, 1));
if ($type != self::SSH_AGENT_IDENTITIES_ANSWER) {
- throw new \RuntimeException('Unable to request identities');
+ user_error('Unable to request identities');
+ return array();
}
- $identities = [];
+ $identities = array();
+ $temp = fread($this->fsock, 4);
+ if (strlen($temp) != 4) {
+ user_error('Connection closed while requesting identities');
+ return array();
+ }
+ $keyCount = current(unpack('N', $temp));
for ($i = 0; $i < $keyCount; $i++) {
- list($key_blob, $comment) = Strings::unpackSSH2('ss', $packet);
- $temp = $key_blob;
- list($key_type) = Strings::unpackSSH2('s', $temp);
+ $temp = fread($this->fsock, 4);
+ if (strlen($temp) != 4) {
+ user_error('Connection closed while requesting identities');
+ return array();
+ }
+ $length = current(unpack('N', $temp));
+ $key_blob = fread($this->fsock, $length);
+ if (strlen($key_blob) != $length) {
+ user_error('Connection closed while requesting identities');
+ return array();
+ }
+ $key_str = 'ssh-rsa ' . base64_encode($key_blob);
+ $temp = fread($this->fsock, 4);
+ if (strlen($temp) != 4) {
+ user_error('Connection closed while requesting identities');
+ return array();
+ }
+ $length = current(unpack('N', $temp));
+ if ($length) {
+ $temp = fread($this->fsock, $length);
+ if (strlen($temp) != $length) {
+ user_error('Connection closed while requesting identities');
+ return array();
+ }
+ $key_str.= ' ' . $temp;
+ }
+ $length = current(unpack('N', substr($key_blob, 0, 4)));
+ $key_type = substr($key_blob, 4, $length);
switch ($key_type) {
case 'ssh-rsa':
+ $key = new RSA();
+ $key->loadKey($key_str);
+ break;
case 'ssh-dss':
- case 'ssh-ed25519':
- case 'ecdsa-sha2-nistp256':
- case 'ecdsa-sha2-nistp384':
- case 'ecdsa-sha2-nistp521':
- $key = PublicKeyLoader::load($key_type . ' ' . base64_encode($key_blob));
+ // not currently supported
+ break;
}
// resources are passed by reference by default
if (isset($key)) {
- $identity = (new Identity($this->fsock))
- ->withPublicKey($key)
- ->withPublicKeyBlob($key_blob);
+ $identity = new Identity($this->fsock);
+ $identity->setPublicKey($key);
+ $identity->setPublicKeyBlob($key_blob);
$identities[] = $identity;
unset($key);
}
@@ -211,11 +234,11 @@ class Agent
* Signal that agent forwarding should
* be requested when a channel is opened
*
- * @param \phpseclib3\Net\SSH2 $ssh
+ * @param Net_SSH2 $ssh
* @return bool
* @access public
*/
- public function startSSHForwarding($ssh)
+ function startSSHForwarding($ssh)
{
if ($this->forward_status == self::FORWARD_NONE) {
$this->forward_status = self::FORWARD_REQUEST;
@@ -225,16 +248,38 @@ class Agent
/**
* Request agent forwarding of remote server
*
- * @param \phpseclib3\Net\SSH2 $ssh
+ * @param Net_SSH2 $ssh
* @return bool
* @access private
*/
- private function request_forwarding($ssh)
+ function _request_forwarding($ssh)
{
- if (!$ssh->requestAgentForwarding()) {
+ $request_channel = $ssh->_get_open_channel();
+ if ($request_channel === false) {
+ return false;
+ }
+
+ $packet = pack(
+ 'CNNa*C',
+ NET_SSH2_MSG_CHANNEL_REQUEST,
+ $ssh->server_channels[$request_channel],
+ strlen('auth-agent-req@openssh.com'),
+ 'auth-agent-req@openssh.com',
+ 1
+ );
+
+ $ssh->channel_status[$request_channel] = NET_SSH2_MSG_CHANNEL_REQUEST;
+
+ if (!$ssh->_send_binary_packet($packet)) {
return false;
}
+ $response = $ssh->_get_channel_packet($request_channel);
+ if ($response === false) {
+ return false;
+ }
+
+ $ssh->channel_status[$request_channel] = NET_SSH2_MSG_CHANNEL_OPEN;
$this->forward_status = self::FORWARD_ACTIVE;
return true;
@@ -247,13 +292,13 @@ class Agent
* open to give the SSH Agent an opportunity
* to take further action. i.e. request agent forwarding
*
- * @param \phpseclib3\Net\SSH2 $ssh
+ * @param Net_SSH2 $ssh
* @access private
*/
- public function registerChannelOpen($ssh)
+ function _on_channel_open($ssh)
{
if ($this->forward_status == self::FORWARD_REQUEST) {
- $this->request_forwarding($ssh);
+ $this->_request_forwarding($ssh);
}
}
@@ -261,11 +306,10 @@ class Agent
* Forward data to SSH Agent and return data reply
*
* @param string $data
- * @return string Data from SSH Agent
- * @throws \RuntimeException on connection errors
- * @access public
+ * @return data from SSH Agent
+ * @access private
*/
- public function forwardData($data)
+ function _forward_data($data)
{
if ($this->expected_bytes > 0) {
$this->socket_buffer.= $data;
@@ -281,15 +325,25 @@ class Agent
}
if (strlen($this->socket_buffer) != fwrite($this->fsock, $this->socket_buffer)) {
- throw new \RuntimeException('Connection closed attempting to forward data to SSH agent');
+ user_error('Connection closed attempting to forward data to SSH agent');
+ return false;
}
$this->socket_buffer = '';
$this->expected_bytes = 0;
- $agent_reply_bytes = current(unpack('N', $this->readBytes(4)));
+ $temp = fread($this->fsock, 4);
+ if (strlen($temp) != 4) {
+ user_error('Connection closed while reading data response');
+ return false;
+ }
+ $agent_reply_bytes = current(unpack('N', $temp));
- $agent_reply_data = $this->readBytes($agent_reply_bytes);
+ $agent_reply_data = fread($this->fsock, $agent_reply_bytes);
+ if (strlen($agent_reply_data) != $agent_reply_bytes) {
+ user_error('Connection closed while reading data response');
+ return false;
+ }
$agent_reply_data = current(unpack('a*', $agent_reply_data));
return pack('Na*', $agent_reply_bytes, $agent_reply_data);
diff --git a/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php b/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php
index 20b0a958f..68b6bfdfa 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent/Identity.php
@@ -1,10 +1,7 @@
<?php
-
/**
* Pure-PHP ssh-agent client.
*
- * {@internal See http://api.libssh.org/rfc/PROTOCOL.agent}
- *
* PHP version 5
*
* @category System
@@ -13,23 +10,18 @@
* @copyright 2009 Jim Wigginton
* @license http://www.opensource.org/licenses/mit-license.html MIT License
* @link http://phpseclib.sourceforge.net
+ * @internal See http://api.libssh.org/rfc/PROTOCOL.agent
*/
-namespace phpseclib3\System\SSH\Agent;
+namespace phpseclib\System\SSH\Agent;
-use phpseclib3\Crypt\RSA;
-use phpseclib3\Crypt\DSA;
-use phpseclib3\Crypt\EC;
-use phpseclib3\Exception\UnsupportedAlgorithmException;
-use phpseclib3\System\SSH\Agent;
-use phpseclib3\Common\Functions\Strings;
-use phpseclib3\Crypt\Common\PrivateKey;
+use phpseclib\System\SSH\Agent;
/**
* Pure-PHP ssh-agent client identity object
*
- * Instantiation should only be performed by \phpseclib3\System\SSH\Agent class.
- * This could be thought of as implementing an interface that phpseclib3\Crypt\RSA
+ * Instantiation should only be performed by \phpseclib\System\SSH\Agent class.
+ * This could be thought of as implementing an interface that phpseclib\Crypt\RSA
* implements. ie. maybe a Net_SSH_Auth_PublicKey interface or something.
* The methods in this interface would be getPublicKey and sign since those are the
* methods phpseclib looks for to perform public key authentication.
@@ -38,23 +30,27 @@ use phpseclib3\Crypt\Common\PrivateKey;
* @author Jim Wigginton <terrafrost@php.net>
* @access internal
*/
-class Identity implements PrivateKey
+class Identity
{
- use \phpseclib3\System\SSH\Common\Traits\ReadBytes;
-
- // Signature Flags
- // See https://tools.ietf.org/html/draft-miller-ssh-agent-00#section-5.3
+ /**@+
+ * Signature Flags
+ *
+ * See https://tools.ietf.org/html/draft-miller-ssh-agent-00#section-5.3
+ *
+ * @access private
+ */
const SSH_AGENT_RSA2_256 = 2;
const SSH_AGENT_RSA2_512 = 4;
+ /**#@-*/
/**
* Key Object
*
- * @var \phpseclib3\Crypt\RSA
+ * @var \phpseclib\Crypt\RSA
* @access private
* @see self::getPublicKey()
*/
- private $key;
+ var $key;
/**
* Key Blob
@@ -63,7 +59,7 @@ class Identity implements PrivateKey
* @access private
* @see self::sign()
*/
- private $key_blob;
+ var $key_blob;
/**
* Socket Resource
@@ -72,7 +68,7 @@ class Identity implements PrivateKey
* @access private
* @see self::sign()
*/
- private $fsock;
+ var $fsock;
/**
* Signature flags
@@ -82,29 +78,16 @@ class Identity implements PrivateKey
* @see self::sign()
* @see self::setHash()
*/
- private $flags = 0;
-
- /**
- * Curve Aliases
- *
- * @var array
- * @access private
- */
- private static $curveAliases = [
- 'secp256r1' => 'nistp256',
- 'secp384r1' => 'nistp384',
- 'secp521r1' => 'nistp521',
- 'Ed25519' => 'Ed25519'
- ];
+ var $flags = 0;
/**
* Default Constructor.
*
* @param resource $fsock
- * @return \phpseclib3\System\SSH\Agent\Identity
+ * @return \phpseclib\System\SSH\Agent\Identity
* @access private
*/
- public function __construct($fsock)
+ function __construct($fsock)
{
$this->fsock = $fsock;
}
@@ -112,38 +95,29 @@ class Identity implements PrivateKey
/**
* Set Public Key
*
- * Called by \phpseclib3\System\SSH\Agent::requestIdentities()
+ * Called by \phpseclib\System\SSH\Agent::requestIdentities()
*
- * @param \phpseclib3\Crypt\Common\PublicKey $key
+ * @param \phpseclib\Crypt\RSA $key
* @access private
*/
- public function withPublicKey($key)
+ function setPublicKey($key)
{
- if ($key instanceof EC) {
- if (is_array($key->getCurve()) || !isset(self::$curveAliases[$key->getCurve()])) {
- throw new UnsupportedAlgorithmException('The only supported curves are nistp256, nistp384, nistp512 and Ed25519');
- }
- }
-
- $new = clone $this;
- $new->key = $key;
- return $new;
+ $this->key = $key;
+ $this->key->setPublicKey();
}
/**
* Set Public Key
*
- * Called by \phpseclib3\System\SSH\Agent::requestIdentities(). The key blob could be extracted from $this->key
+ * Called by \phpseclib\System\SSH\Agent::requestIdentities(). The key blob could be extracted from $this->key
* but this saves a small amount of computation.
*
* @param string $key_blob
* @access private
*/
- public function withPublicKeyBlob($key_blob)
+ function setPublicKeyBlob($key_blob)
{
- $new = clone $this;
- $new->key_blob = $key_blob;
- return $new;
+ $this->key_blob = $key_blob;
}
/**
@@ -151,121 +125,51 @@ class Identity implements PrivateKey
*
* Wrapper for $this->key->getPublicKey()
*
- * @param string $type optional
+ * @param int $format optional
* @return mixed
* @access public
*/
- public function getPublicKey($type = 'PKCS8')
- {
- return $this->key;
- }
-
- /**
- * Sets the hash
- *
- * @param string $hash
- * @access public
- */
- public function withHash($hash)
- {
- $new = clone $this;
-
- $hash = strtolower($hash);
-
- if ($this->key instanceof RSA) {
- $new->flags = 0;
- switch ($hash) {
- case 'sha1':
- break;
- case 'sha256':
- $new->flags = self::SSH_AGENT_RSA2_256;
- break;
- case 'sha512':
- $new->flags = self::SSH_AGENT_RSA2_512;
- break;
- default:
- throw new UnsupportedAlgorithmException('The only supported hashes for RSA are sha1, sha256 and sha512');
- }
- }
- if ($this->key instanceof EC) {
- switch ($this->key->getCurve()) {
- case 'secp256r1':
- $expectedHash = 'sha256';
- break;
- case 'secp384r1':
- $expectedHash = 'sha384';
- break;
- //case 'secp521r1':
- //case 'Ed25519':
- default:
- $expectedHash = 'sha512';
- }
- if ($hash != $expectedHash) {
- throw new UnsupportedAlgorithmException('The only supported hash for ' . self::$curveAliases[$key->getCurve()] . ' is ' . $expectedHash);
- }
- }
- if ($this->key instanceof DSA) {
- if ($hash != 'sha1') {
- throw new UnsupportedAlgorithmException('The only supported hash for DSA is sha1');
- }
- }
- return $new;
- }
-
- /**
- * Sets the padding
- *
- * Only PKCS1 padding is supported
- *
- * @param string $padding
- * @access public
- */
- public function withPadding($padding)
+ function getPublicKey($format = null)
{
- if (!$this->key instanceof RSA) {
- throw new UnsupportedAlgorithmException('Only RSA keys support padding');
- }
- if ($padding != RSA::SIGNATURE_PKCS1 && $padding != RSA::SIGNATURE_RELAXED_PKCS1) {
- throw new UnsupportedAlgorithmException('ssh-agent can only create PKCS1 signatures');
- }
- return $this;
+ return !isset($format) ? $this->key->getPublicKey() : $this->key->getPublicKey($format);
}
/**
- * Determines the signature padding mode
+ * Set Signature Mode
*
- * Valid values are: ASN1, SSH2, Raw
+ * Doesn't do anything as ssh-agent doesn't let you pick and choose the signature mode. ie.
+ * ssh-agent's only supported mode is \phpseclib\Crypt\RSA::SIGNATURE_PKCS1
*
+ * @param int $mode
* @access public
- * @param string $format
*/
- public function withSignatureFormat($format)
+ function setSignatureMode($mode)
{
- if ($this->key instanceof RSA) {
- throw new UnsupportedAlgorithmException('Only DSA and EC keys support signature format setting');
- }
- if ($format != 'SSH2') {
- throw new UnsupportedAlgorithmException('Only SSH2-formatted signatures are currently supported');
- }
-
- return $this;
}
/**
- * Returns the curve
+ * Set Hash
*
- * Returns a string if it's a named curve, an array if not
+ * ssh-agent doesn't support using hashes for RSA other than SHA1
*
+ * @param string $hash
* @access public
- * @return string|array
*/
- public function getCurve()
+ function setHash($hash)
{
- if (!$this->key instanceof EC) {
- throw new UnsupportedAlgorithmException('Only EC keys have curves');
+ $this->flags = 0;
+ switch ($hash) {
+ case 'sha1':
+ break;
+ case 'sha256':
+ $this->flags = self::SSH_AGENT_RSA2_256;
+ break;
+ case 'sha512':
+ $this->flags = self::SSH_AGENT_RSA2_512;
+ break;
+ default:
+ user_error('The only supported hashes for RSA are sha1, sha256 and sha512');
}
-
- return $this->key->getCurve();
}
/**
@@ -275,62 +179,63 @@ class Identity implements PrivateKey
*
* @param string $message
* @return string
- * @throws \RuntimeException on connection errors
- * @throws \phpseclib3\Exception\UnsupportedAlgorithmException if the algorithm is unsupported
* @access public
*/
- public function sign($message)
+ function sign($message)
{
// the last parameter (currently 0) is for flags and ssh-agent only defines one flag (for ssh-dss): SSH_AGENT_OLD_SIGNATURE
- $packet = Strings::packSSH2(
- 'CssN',
- Agent::SSH_AGENTC_SIGN_REQUEST,
- $this->key_blob,
- $message,
- $this->flags
- );
- $packet = Strings::packSSH2('s', $packet);
+ $packet = pack('CNa*Na*N', Agent::SSH_AGENTC_SIGN_REQUEST, strlen($this->key_blob), $this->key_blob, strlen($message), $message, $this->flags);
+ $packet = pack('Na*', strlen($packet), $packet);
if (strlen($packet) != fputs($this->fsock, $packet)) {
- throw new \RuntimeException('Connection closed during signing');
+ user_error('Connection closed during signing');
+ return false;
}
- $length = current(unpack('N', $this->readBytes(4)));
- $packet = $this->readBytes($length);
-
- list($type, $signature_blob) = Strings::unpackSSH2('Cs', $packet);
+ $temp = fread($this->fsock, 4);
+ if (strlen($temp) != 4) {
+ user_error('Connection closed during signing');
+ return false;
+ }
+ $length = current(unpack('N', $temp));
+ $type = ord(fread($this->fsock, 1));
if ($type != Agent::SSH_AGENT_SIGN_RESPONSE) {
- throw new \RuntimeException('Unable to retrieve signature');
+ user_error('Unable to retrieve signature');
+ return false;
}
- if (!$this->key instanceof RSA) {
- return $signature_blob;
+ $signature_blob = fread($this->fsock, $length - 1);
+ if (strlen($signature_blob) != $length - 1) {
+ user_error('Connection closed during signing');
+ return false;
}
-
- list($type, $signature_blob) = Strings::unpackSSH2('ss', $signature_blob);
+ $length = current(unpack('N', $this->_string_shift($signature_blob, 4)));
+ if ($length != strlen($signature_blob)) {
+ user_error('Malformed signature blob');
+ }
+ $length = current(unpack('N', $this->_string_shift($signature_blob, 4)));
+ if ($length > strlen($signature_blob) + 4) {
+ user_error('Malformed signature blob');
+ }
+ $type = $this->_string_shift($signature_blob, $length);
+ $this->_string_shift($signature_blob, 4);
return $signature_blob;
}
/**
- * Returns the private key
+ * String Shift
*
- * @param string $type
- * @param array $options optional
- * @return string
- */
- public function toString($type, array $options = [])
- {
- throw new \RuntimeException('ssh-agent does not provide a mechanism to get the private key');
- }
-
- /**
- * Sets the password
+ * Inspired by array_shift
*
- * @access public
- * @param string|boolean $password
+ * @param string $string
+ * @param int $index
+ * @return string
+ * @access private
*/
- public function withPassword($password = false)
+ function _string_shift(&$string, $index = 1)
{
- throw new \RuntimeException('ssh-agent does not provide a mechanism to get the private key');
+ $substr = substr($string, 0, $index);
+ $string = substr($string, $index);
+ return $substr;
}
}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Common/Traits/ReadBytes.php b/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Common/Traits/ReadBytes.php
deleted file mode 100644
index 297808e42..000000000
--- a/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Common/Traits/ReadBytes.php
+++ /dev/null
@@ -1,42 +0,0 @@
-<?php
-
-/**
- * ReadBytes trait
- *
- * PHP version 5
- *
- * @category System
- * @package SSH
- * @author Jim Wigginton <terrafrost@php.net>
- * @copyright 2015 Jim Wigginton
- * @license http://www.opensource.org/licenses/mit-license.html MIT License
- * @link http://phpseclib.sourceforge.net
- */
-
-namespace phpseclib3\System\SSH\Common\Traits;
-
-/**
- * ReadBytes trait
- *
- * @package SSH
- * @author Jim Wigginton <terrafrost@php.net>
- * @access public
- */
-trait ReadBytes
-{
- /**
- * Read data
- *
- * @param int $length
- * @throws \RuntimeException on connection errors
- * @access public
- */
- public function readBytes($length)
- {
- $temp = fread($this->fsock, $length);
- if (strlen($temp) != $length) {
- throw new \RuntimeException("Expected $length bytes; got " . strlen($temp));
- }
- return $temp;
- }
-}
diff --git a/vendor/phpseclib/phpseclib/phpseclib/bootstrap.php b/vendor/phpseclib/phpseclib/phpseclib/bootstrap.php
index bd4ba0b5a..0da0999fd 100644
--- a/vendor/phpseclib/phpseclib/phpseclib/bootstrap.php
+++ b/vendor/phpseclib/phpseclib/phpseclib/bootstrap.php
@@ -1,18 +1,14 @@
<?php
-
/**
* Bootstrapping File for phpseclib
*
- * composer isn't a requirement for phpseclib 2.0 but this file isn't really required
- * either. it's a bonus for those using composer but if you're not phpseclib will
- * still work
- *
* @license http://www.opensource.org/licenses/mit-license.html MIT License
*/
+
if (extension_loaded('mbstring')) {
// 2 - MB_OVERLOAD_STRING
if (ini_get('mbstring.func_overload') & 2) {
- throw new UnexpectedValueException(
+ throw new \UnexpectedValueException(
'Overloading of string functions using mbstring.func_overload ' .
'is not supported by phpseclib.'
);