}
openssl_x509_export($crt, $str, false);
if (strpos($str, 'X509v3 extensions:')) {
- echo "Ok\n";
+ echo "Ok\n";
}
?>
---EXPECTF--
+--EXPECT--
Ok
Ok
$dir = dirname(__FILE__);
$certs = array('bug39217cert2.txt', 'bug39217cert1.txt');
foreach($certs as $cert) {
- $res = openssl_x509_parse(file_get_contents($dir . '/' . $cert));
- print_r($res['serialNumber']);
- echo "\n";
+ $res = openssl_x509_parse(file_get_contents($dir . '/' . $cert));
+ print_r($res['serialNumber']);
+ echo "\n";
}
?>
---EXPECTF--
+--EXPECT--
163040343498260435477161879008842183802
15
include 'ServerClientTestCase.inc';
ServerClientTestCase::getInstance()->run($clientCode, $serverCode);
---EXPECTF--
+ ?>
+--EXPECT--
Running bug48182
Sending bug48182
Sending data over to SSL server in async mode with contents like Hello World
include 'ServerClientTestCase.inc';
ServerClientTestCase::getInstance()->run($clientCode, $serverCode);
---EXPECTF--
+ ?>
+--EXPECT--
string(12) "Hello World!"
$key = openssl_pkey_get_private($pkey);
$res = openssl_sign($data ='alpha', $sign, $key, 'SHA1');
var_dump($res);
---EXPECTF--
+ ?>
+--EXPECT--
bool(true)
var_dump($r['signatureTypeSN']);
var_dump($r['signatureTypeLN']);
var_dump($r['signatureTypeNID']);
---EXPECTF--
+ ?>
+--EXPECT--
string(8) "RSA-SHA1"
string(21) "sha1WithRSAEncryption"
int(65)
$cert = file_get_contents(__DIR__ . '/cve2013_4073.pem');
$info = openssl_x509_parse($cert);
var_export($info['extensions']);
---EXPECTF--
+
+ ?>
+--EXPECT--
array (
'basicConstraints' => 'CA:FALSE',
'subjectKeyIdentifier' => '88:5A:55:C0:52:FF:61:CD:52:A3:35:0F:EA:5A:9C:24:38:22:F7:5C',
include 'ServerClientTestCase.inc';
ServerClientTestCase::getInstance()->run($clientCode, $serverCode);
---EXPECTF--
+ ?>
+--EXPECT--
string(5) "TLSv1"
string(7) "TLSv1.1"
string(7) "TLSv1.2"
include 'ServerClientTestCase.inc';
ServerClientTestCase::getInstance()->run($clientCode, $serverCode);
---EXPECTF--
+ ?>
+--EXPECT--
Hello World!