/trunk/plugins/viathinksoft/logger/000_database/OIDplusLoggerPluginDatabase.class.php |
---|
34,7 → 34,7 |
$addr = isset($_SERVER['REMOTE_ADDR']) ? $_SERVER['REMOTE_ADDR'] : ''; |
OIDplus::dbIsolated()->query("insert into ###log (addr, unix_ts, event) values (?, ?, ?)", array($addr, time(), $event)); |
$log_id = OIDplus::dbIsolated()->insert_id(); |
if ($log_id === false) { |
if ($log_id == 0) { |
$res = OIDplus::dbIsolated()->query("select max(id) as last_id from ###log"); |
if (!$res->any()) throw new OIDplusException(_L('Could not log event')); |
$row = $res->fetch_array(); |
/trunk/vendor/composer/installed.json |
---|
774,12 → 774,12 |
"source": { |
"type": "git", |
"url": "https://github.com/phpseclib/phpseclib.git", |
"reference": "6298d1cd55c3ffa44533bd41906caec246b60440" |
"reference": "abbc1ab7c794b6cbb7ddb2d94dfe85c02634f020" |
}, |
"dist": { |
"type": "zip", |
"url": "https://api.github.com/repos/phpseclib/phpseclib/zipball/6298d1cd55c3ffa44533bd41906caec246b60440", |
"reference": "6298d1cd55c3ffa44533bd41906caec246b60440", |
"url": "https://api.github.com/repos/phpseclib/phpseclib/zipball/abbc1ab7c794b6cbb7ddb2d94dfe85c02634f020", |
"reference": "abbc1ab7c794b6cbb7ddb2d94dfe85c02634f020", |
"shasum": "" |
}, |
"require": { |
797,7 → 797,7 |
"ext-mcrypt": "Install the Mcrypt extension in order to speed up a few other cryptographic operations.", |
"ext-openssl": "Install the OpenSSL extension in order to speed up a wide variety of cryptographic operations." |
}, |
"time": "2023-03-02T09:25:08+00:00", |
"time": "2023-03-15T02:43:29+00:00", |
"type": "library", |
"installation-source": "dist", |
"autoload": { |
/trunk/vendor/composer/installed.php |
---|
178,7 → 178,7 |
'phpseclib/phpseclib' => array( |
'pretty_version' => '3.0.x-dev', |
'version' => '3.0.9999999.9999999-dev', |
'reference' => '6298d1cd55c3ffa44533bd41906caec246b60440', |
'reference' => 'abbc1ab7c794b6cbb7ddb2d94dfe85c02634f020', |
'type' => 'library', |
'install_path' => __DIR__ . '/../phpseclib/phpseclib', |
'aliases' => array(), |
/trunk/vendor/licenses |
---|
26,7 → 26,7 |
matthiasmullie/path-converter 1.1.3 MIT |
paragonie/constant_time_encoding v2.6.3 MIT |
paragonie/random_compat v9.99.100 MIT |
phpseclib/phpseclib 3.0.x-dev 6298d1c MIT |
phpseclib/phpseclib 3.0.x-dev abbc1ab MIT |
script47/bs5-utils master master MIT |
spamspan/spamspan master GPL-2.0-only |
symfony/polyfill-mbstring v1.19.0 MIT |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Crypt/Blowfish.php |
---|
764,42 → 764,6 |
} |
/** |
* Fast helper function for block encryption (32-bit) |
* |
* @access private |
* @param int $x0 |
* @param int $x1 |
* @param int[] $sbox0 |
* @param int[] $sbox1 |
* @param int[] $sbox2 |
* @param int[] $sbox3 |
* @param int[] $p |
* @return int[] |
*/ |
function _encryptBlockHelperFast32($x0, $x1, $sbox0, $sbox1, $sbox2, $sbox3, $p) |
{ |
$x0 ^= $p[0]; |
$x1 ^= ((($sbox0[(($x0 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x0 & 0xFF0000) >> 16]) ^ $sbox2[($x0 & 0xFF00) >> 8]) + $sbox3[$x0 & 0xFF]) ^ $p[1]; |
$x0 ^= ((($sbox0[(($x1 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x1 & 0xFF0000) >> 16]) ^ $sbox2[($x1 & 0xFF00) >> 8]) + $sbox3[$x1 & 0xFF]) ^ $p[2]; |
$x1 ^= ((($sbox0[(($x0 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x0 & 0xFF0000) >> 16]) ^ $sbox2[($x0 & 0xFF00) >> 8]) + $sbox3[$x0 & 0xFF]) ^ $p[3]; |
$x0 ^= ((($sbox0[(($x1 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x1 & 0xFF0000) >> 16]) ^ $sbox2[($x1 & 0xFF00) >> 8]) + $sbox3[$x1 & 0xFF]) ^ $p[4]; |
$x1 ^= ((($sbox0[(($x0 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x0 & 0xFF0000) >> 16]) ^ $sbox2[($x0 & 0xFF00) >> 8]) + $sbox3[$x0 & 0xFF]) ^ $p[5]; |
$x0 ^= ((($sbox0[(($x1 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x1 & 0xFF0000) >> 16]) ^ $sbox2[($x1 & 0xFF00) >> 8]) + $sbox3[$x1 & 0xFF]) ^ $p[6]; |
$x1 ^= ((($sbox0[(($x0 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x0 & 0xFF0000) >> 16]) ^ $sbox2[($x0 & 0xFF00) >> 8]) + $sbox3[$x0 & 0xFF]) ^ $p[7]; |
$x0 ^= ((($sbox0[(($x1 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x1 & 0xFF0000) >> 16]) ^ $sbox2[($x1 & 0xFF00) >> 8]) + $sbox3[$x1 & 0xFF]) ^ $p[8]; |
$x1 ^= ((($sbox0[(($x0 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x0 & 0xFF0000) >> 16]) ^ $sbox2[($x0 & 0xFF00) >> 8]) + $sbox3[$x0 & 0xFF]) ^ $p[9]; |
$x0 ^= ((($sbox0[(($x1 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x1 & 0xFF0000) >> 16]) ^ $sbox2[($x1 & 0xFF00) >> 8]) + $sbox3[$x1 & 0xFF]) ^ $p[10]; |
$x1 ^= ((($sbox0[(($x0 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x0 & 0xFF0000) >> 16]) ^ $sbox2[($x0 & 0xFF00) >> 8]) + $sbox3[$x0 & 0xFF]) ^ $p[11]; |
$x0 ^= ((($sbox0[(($x1 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x1 & 0xFF0000) >> 16]) ^ $sbox2[($x1 & 0xFF00) >> 8]) + $sbox3[$x1 & 0xFF]) ^ $p[12]; |
$x1 ^= ((($sbox0[(($x0 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x0 & 0xFF0000) >> 16]) ^ $sbox2[($x0 & 0xFF00) >> 8]) + $sbox3[$x0 & 0xFF]) ^ $p[13]; |
$x0 ^= ((($sbox0[(($x1 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x1 & 0xFF0000) >> 16]) ^ $sbox2[($x1 & 0xFF00) >> 8]) + $sbox3[$x1 & 0xFF]) ^ $p[14]; |
$x1 ^= ((($sbox0[(($x0 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x0 & 0xFF0000) >> 16]) ^ $sbox2[($x0 & 0xFF00) >> 8]) + $sbox3[$x0 & 0xFF]) ^ $p[15]; |
$x0 ^= ((($sbox0[(($x1 & 0xFF000000) >> 24) & 0xFF] + $sbox1[($x1 & 0xFF0000) >> 16]) ^ $sbox2[($x1 & 0xFF00) >> 8]) + $sbox3[$x1 & 0xFF]) ^ $p[16]; |
return array($x1 & 0xFFFFFFFF ^ $p[17], $x0 & 0xFFFFFFFF); |
} |
/** |
* Slow helper function for block encryption |
* |
* @access private |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Crypt/Common/Formats/Keys/PKCS8.php |
---|
315,6 → 315,13 |
*/ |
protected static function load($key, $password = '') |
{ |
if (!Strings::is_stringable($key)) { |
throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key)); |
} |
$isPublic = strpos($key, 'PUBLIC') !== false; |
$isPrivate = strpos($key, 'PRIVATE') !== false; |
$decoded = self::preParse($key); |
$meta = []; |
445,6 → 452,10 |
$private = ASN1::asn1map($decoded[0], Maps\OneAsymmetricKey::MAP); |
if (is_array($private)) { |
if ($isPublic) { |
throw new \UnexpectedValueException('Human readable string claims public key but DER encoded string claims private key'); |
} |
if (isset($private['privateKeyAlgorithm']['parameters']) && !$private['privateKeyAlgorithm']['parameters'] instanceof ASN1\Element && isset($decoded[0]['content'][1]['content'][1])) { |
$temp = $decoded[0]['content'][1]['content'][1]; |
$private['privateKeyAlgorithm']['parameters'] = new ASN1\Element(substr($key, $temp['start'], $temp['length'])); |
474,6 → 485,10 |
$public = ASN1::asn1map($decoded[0], Maps\PublicKeyInfo::MAP); |
if (is_array($public)) { |
if ($isPrivate) { |
throw new \UnexpectedValueException('Human readable string claims private key but DER encoded string claims public key'); |
} |
if ($public['publicKey'][0] != "\0") { |
throw new \UnexpectedValueException('The first byte of the public key should be null - not ' . bin2hex($public['publicKey'][0])); |
} |
650,10 → 665,6 |
{ |
self::initialize_static_variables(); |
if (!Strings::is_stringable($key)) { |
throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key)); |
} |
if (self::$format != self::MODE_DER) { |
$decoded = ASN1::extractBER($key); |
if ($decoded !== false) { |
679,6 → 690,10 |
*/ |
public static function extractEncryptionAlgorithm($key) |
{ |
if (!Strings::is_stringable($key)) { |
throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key)); |
} |
$decoded = self::preParse($key); |
$r = ASN1::asn1map($decoded[0], ASN1\Maps\EncryptedPrivateKeyInfo::MAP); |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Crypt/DH/Formats/Keys/PKCS8.php |
---|
19,7 → 19,6 |
namespace phpseclib3\Crypt\DH\Formats\Keys; |
use phpseclib3\Common\Functions\Strings; |
use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor; |
use phpseclib3\File\ASN1; |
use phpseclib3\File\ASN1\Maps; |
62,23 → 61,10 |
*/ |
public static function load($key, $password = '') |
{ |
if (!Strings::is_stringable($key)) { |
throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key)); |
} |
$isPublic = strpos($key, 'PUBLIC') !== false; |
$key = parent::load($key, $password); |
$type = isset($key['privateKey']) ? 'privateKey' : 'publicKey'; |
switch (true) { |
case !$isPublic && $type == 'publicKey': |
throw new \UnexpectedValueException('Human readable string claims non-public key but DER encoded string claims public key'); |
case $isPublic && $type == 'privateKey': |
throw new \UnexpectedValueException('Human readable string claims public key but DER encoded string claims private key'); |
} |
$decoded = ASN1::decodeBER($key[$type . 'Algorithm']['parameters']->element); |
if (empty($decoded)) { |
throw new \RuntimeException('Unable to decode BER of parameters'); |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Crypt/DSA/Formats/Keys/PKCS8.php |
---|
23,7 → 23,6 |
namespace phpseclib3\Crypt\DSA\Formats\Keys; |
use phpseclib3\Common\Functions\Strings; |
use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor; |
use phpseclib3\File\ASN1; |
use phpseclib3\File\ASN1\Maps; |
66,23 → 65,10 |
*/ |
public static function load($key, $password = '') |
{ |
if (!Strings::is_stringable($key)) { |
throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key)); |
} |
$isPublic = strpos($key, 'PUBLIC') !== false; |
$key = parent::load($key, $password); |
$type = isset($key['privateKey']) ? 'privateKey' : 'publicKey'; |
switch (true) { |
case !$isPublic && $type == 'publicKey': |
throw new \UnexpectedValueException('Human readable string claims non-public key but DER encoded string claims public key'); |
case $isPublic && $type == 'privateKey': |
throw new \UnexpectedValueException('Human readable string claims public key but DER encoded string claims private key'); |
} |
$decoded = ASN1::decodeBER($key[$type . 'Algorithm']['parameters']->element); |
if (!$decoded) { |
throw new \RuntimeException('Unable to decode BER of parameters'); |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Formats/Keys/PKCS8.php |
---|
23,7 → 23,6 |
namespace phpseclib3\Crypt\EC\Formats\Keys; |
use phpseclib3\Common\Functions\Strings; |
use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor; |
use phpseclib3\Crypt\EC\BaseCurves\Base as BaseCurve; |
use phpseclib3\Crypt\EC\BaseCurves\Montgomery as MontgomeryCurve; |
74,23 → 73,10 |
// one that's called |
self::initialize_static_variables(); |
if (!Strings::is_stringable($key)) { |
throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key)); |
} |
$isPublic = strpos($key, 'PUBLIC') !== false; |
$key = parent::load($key, $password); |
$type = isset($key['privateKey']) ? 'privateKey' : 'publicKey'; |
switch (true) { |
case !$isPublic && $type == 'publicKey': |
throw new \UnexpectedValueException('Human readable string claims non-public key but DER encoded string claims public key'); |
case $isPublic && $type == 'privateKey': |
throw new \UnexpectedValueException('Human readable string claims public key but DER encoded string claims private key'); |
} |
switch ($key[$type . 'Algorithm']['algorithm']) { |
case 'id-Ed25519': |
case 'id-Ed448': |
109,7 → 95,7 |
$components = []; |
$components['curve'] = self::loadCurveByParam($params); |
if ($isPublic) { |
if ($type == 'publicKey') { |
$components['QA'] = self::extractPoint("\0" . $key['publicKey'], $components['curve']); |
return $components; |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Crypt/RSA/Formats/Keys/PKCS8.php |
---|
25,7 → 25,6 |
namespace phpseclib3\Crypt\RSA\Formats\Keys; |
use phpseclib3\Common\Functions\Strings; |
use phpseclib3\Crypt\Common\Formats\Keys\PKCS8 as Progenitor; |
use phpseclib3\File\ASN1; |
use phpseclib3\Math\BigInteger; |
67,29 → 66,13 |
*/ |
public static function load($key, $password = '') |
{ |
if (!Strings::is_stringable($key)) { |
throw new \UnexpectedValueException('Key should be a string - not a ' . gettype($key)); |
} |
if (strpos($key, 'PUBLIC') !== false) { |
$components = ['isPublicKey' => true]; |
} elseif (strpos($key, 'PRIVATE') !== false) { |
$components = ['isPublicKey' => false]; |
} else { |
$components = []; |
} |
$key = parent::load($key, $password); |
if (isset($key['privateKey'])) { |
if (!isset($components['isPublicKey'])) { |
$components['isPublicKey'] = false; |
} |
$type = 'private'; |
} else { |
if (!isset($components['isPublicKey'])) { |
$components['isPublicKey'] = true; |
} |
$type = 'public'; |
} |
/trunk/vendor/phpseclib/phpseclib/phpseclib/File/ASN1.php |
---|
205,7 → 205,7 |
return null; |
} |
return [self::decode_ber($encoded)]; |
return [$decoded]; |
} |
/** |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger/Engines/Engine.php |
---|
370,6 → 370,8 |
* JSON Serialize |
* |
* Will be called, automatically, when json_encode() is called on a BigInteger object. |
* |
* @return array{hex: string, precision?: int] |
*/ |
#[\ReturnTypeWillChange] |
public function jsonSerialize() |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Math/BigInteger.php |
---|
437,6 → 437,8 |
* JSON Serialize |
* |
* Will be called, automatically, when json_encode() is called on a BigInteger object. |
* |
* @return array{hex: string, precision?: int] |
*/ |
#[\ReturnTypeWillChange] |
public function jsonSerialize() |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Math/Common/FiniteField/Integer.php |
---|
26,6 → 26,8 |
* |
* PHP Serialize isn't supported because unserializing would require the factory be |
* serialized as well and that just sounds like too much |
* |
* @return array{hex: string} |
*/ |
#[\ReturnTypeWillChange] |
public function jsonSerialize() |
/trunk/vendor/phpseclib/phpseclib/phpseclib/Net/SSH2.php |
---|
2665,6 → 2665,16 |
} |
/** |
* Return the currently configured timeout |
* |
* @return int |
*/ |
public function getTimeout() |
{ |
return $this->timeout; |
} |
/** |
* Set Timeout |
* |
* $ssh->exec('ping 127.0.0.1'); on a Linux host will never return and will run indefinitely. setTimeout() makes it so it'll timeout. |