Lines Matching refs:a

111      * to them in that way because RFC4254 toggles the meaning. the client sends a SSH_MSG_CHANNEL_OPEN message with
112 * a sender channel and the server sends a SSH_MSG_CHANNEL_OPEN_CONFIRMATION in response, with a sender and a
145 * Dumps the content real-time to a file
160 * Returns when a string matching $expect exactly is found
166 * Returns when a string matching the regular expression $expect is found
172 * Returns whenever a data packet is received.
174 * Some data packets may only contain a single character so it may be necessary
199 * if a requisite function has been successfully executed. If not, an error should be thrown.
274 * some servers (eg. Azure) will support rsa-sha2-512 as a server host key algorithm but
275 * not a private key algorithm
358 * 'padding_length', 'payload', and 'random padding' MUST be a multiple
529 * used as the session identifier, which is a unique identifier for
630 * If a client requests a packet from one channel but receives two packets from another those packets should
631 * be placed in a buffer
841 * Flag to request a PTY when using exec()
874 * Quoting from the RFC, "in some jurisdictions, sending a warning message before
1118 * $host can either be a string, representing the host, or a stream resource.
1119 * If $host is a stream resource then $port doesn't do anything, altho $timeout
1212 * Typehint is required due to a bug in Psalm: https://github.com/vimeo/psalm/issues/7508
1250 * theory it shouldn't matter but it is a fact of life that some SSH servers are simply buggy
1263 * theory it shouldn't matter but it is a fact of life that some SSH servers are simply buggy
1276 * it shouldn't matter but it is a fact of life that some SSH servers are simply buggy
1289 * it shouldn't matter but it is a fact of life that some SSH servers are simply buggy
1300 * Quoting https://stackoverflow.com/a/14262151/569976,
1343 // with stream_select a timeout of 0 means that no timeout takes place;
1344 // with fsockopen a timeout of 0 means that you instantly timeout
1345 // to resolve this incompatibility a timeout of 100,000 will be used for fsockopen if timeout is 0
1370 string. Each line SHOULD be terminated by a Carriage Return and Line
1670 // through diffie-hellman key exchange a symmetric key is obtained
2001 [SCHNEIER], using a 128-bit key. The first 1536 bytes of keystream
2106 * Maps an encryption algorithm name to an instance of a subclass of
2154 * Maps an encryption algorithm name to an instance of a subclass of
2188 * Tests whether or not proposed algorithm has a potential for issues
2210 * The $password parameter can be a plaintext password, a \phpseclib3\Crypt\RSA|EC|DSA object, a \phpseclib3\System\SSH\Agent object or an array
2257 throw new \UnexpectedValueException('A PublicKey object was passed to the login method instead of a PrivateKey object');
2264 throw new \UnexpectedValueException('$password needs to either be an instance of \phpseclib3\Crypt\Common\PrivateKey, \System\SSH\Agent, an array or a string');
2498 * See {@link http://tools.ietf.org/html/rfc4256 RFC4256} for details. This is not a full-featured keyboard-interactive authenticator.
2703 throw new UnsupportedAlgorithmException('Please use either an RSA key, an EC one or a DSA key');
2787 * $ssh->exec('ping 127.0.0.1'); on a Linux host will never return and will run indefinitely. setTimeout() makes it so it'll timeout.
2800 * Sends an SSH2_MSG_IGNORE message every x seconds, if x is a positive non-zero number.
2822 * In all likelihood, this is not a feature you want to be taking advantage of.
2840 // throw new \RuntimeException('If you want to run multiple exec()\'s you will need to disable (and re-enable if appropriate) a PTY for each one.');
2870 // sending a pty-req SSH_MSG_CHANNEL_REQUEST message is unnecessary and, in fact, in most cases, slows things
2872 // with a pty-req SSH_MSG_CHANNEL_REQUEST, exec() will return immediately and the ping process will then
2873 // then immediately terminate. without such a request exec() will loop indefinitely. the ping process won't end but
2934 * Opens a channel
3130 * Returns when there's a match for $expect, which can take the form of a string literal or,
3131 * if $mode == self::READ_REGEX, a regular expression.
3133 * If not specifying a channel, an open interactive channel will be selected, or, if there are
3135 * interactive channels, a legacy behavior will apply in which channel selection prioritizes
3193 * Inputs a command into an interactive shell.
3195 * If not specifying a channel, an open interactive channel will be selected, or, if there are
3197 * interactive channels, a legacy behavior will apply in which channel selection prioritizes
3231 * Start a subsystem.
3233 * Right now only one subsystem at a time is supported. To support multiple subsystem's stopSubsystem() could accept
3234 * a string that contained the name of the subsystem, but at that point, only one subsystem of each type could be opened.
3235 * To support multiple subsystem's of the same name maybe it'd be best if startSubsystem() generated a new channel id and
3236 * returns that and then that that was passed into stopSubsystem() but that'll be saved for a future date and implemented
3237 * if there's sufficient demand for such a feature.
3271 * Stops a subsystem.
3285 * Closes a channel
3289 * If not specifying a channel, an open interactive channel will be selected. If there are
3290 * multiple open interactive channels, a legacy behavior will apply in which channel selection
3348 * 0 (default): phpseclib takes a passive approach to see if the connection is still active by calling feof()
3351 * packet that doesn't require a response
3423 * Returns a channel identifier, presently of the last interactive channel opened, regardless of current status.
3435 * Pings a server connection, or tries to reconnect if the connection has gone down
3477 * Resets a connection for re-use
3508 throw new \InvalidArgumentException('fsock is not a resource.');
3544 // this can return a "stream_select(): unable to select [4]: Interrupted system call" error
3602 throw new \LogicException('$this->decrypt is not a ' . ChaCha20::class);
4034 * Returns the data as a string. bool(true) is returned if:
4224 // in OpenSSH it slows things down but only by a couple thousandths of a second.
4354 throw new \LogicException('$this->encrypt is not a ' . ChaCha20::class);
4568 * Closes and flushes a channel
4649 * Takes any number of arrays whose indices are integers and whose values are strings and defines a bunch of
4670 * Returns a log of the packets that have been sent and received.
4672 * Returns a string if NET_SSH2_LOGGING == self::LOG_COMPLEX, an array if NET_SSH2_LOGGING == self::LOG_SIMPLE and false if !defined('NET_SSH2_LOGGING')
4694 * Formats a log for printing
4717 // also replace < with a . since < messes up the output on web browsers
4802 * Returns a list of algorithms the server supports
4829 * Returns a list of KEX algorithms that phpseclib supports
4865 * Returns a list of host key algorithms that phpseclib supports
4884 * Returns a list of symmetric key algorithms that phpseclib supports
4899 //'arcfour', // OPTIONAL the ARCFOUR stream cipher with a 128-bit key
4910 // part, pure-PHP has to be used for the poly1305 part and that's gonna cause a big slow down.
4920 'aes128-cbc', // RECOMMENDED AES with a 128-bit key
4921 'aes192-cbc', // OPTIONAL AES with a 192-bit key
4922 'aes256-cbc', // OPTIONAL AES in CBC mode, with a 256-bit key
4924 'twofish128-cbc', // OPTIONAL Twofish with a 128-bit key
4925 'twofish192-cbc', // OPTIONAL Twofish with a 192-bit key
4988 * Returns a list of MAC algorithms that phpseclib supports
5018 * Returns a list of compression algorithms that phpseclib supports
5110 $a = &$preferred[$key];
5111 if (isset($a['crypt'])) {
5112 $a['crypt'] = array_intersect(
5113 $a['crypt'],
5117 if (isset($a['comp'])) {
5118 $a['comp'] = array_intersect(
5119 $a['comp'],
5123 if (isset($a['mac'])) {
5124 $a['mac'] = array_intersect(
5125 $a['mac'],
5158 ' is not a supported algorithm' :
5170 * Quoting from the RFC, "in some jurisdictions, sending a warning message before
5183 * Caching this the first time you connect to a server and checking the result on subsequent connections
5188 * @throws \phpseclib3\Exception\NoSupportedAlgorithmsException when the key isn't in a supported format