12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788 |
- --TEST--
- openssl_spki_verify() tests for valid signature
- --INI--
- error_reporting=0
- --SKIPIF--
- <?php
- if (!extension_loaded("openssl")) die("skip");
- ?>
- --FILE--
- <?php
- /* array of private key sizes to test */
- $key_sizes = array(1024, 2048, 4096);
- $pkeys = array();
- foreach ($key_sizes as $key_size) {
- $key_file = "file://" . dirname(__FILE__) . "/private_rsa_" . $key_size . ".key";
- $pkeys[] = openssl_pkey_get_private($key_file);
- }
- /* array of available hashings to test */
- $algo = array(
- OPENSSL_ALGO_SHA1,
- OPENSSL_ALGO_SHA224,
- OPENSSL_ALGO_SHA256,
- OPENSSL_ALGO_SHA384,
- OPENSSL_ALGO_SHA512,
- OPENSSL_ALGO_RMD160
- );
- /* loop over key sizes for test */
- foreach ($pkeys as $pkey) {
- /* loop to create and verify results */
- foreach ($algo as $value) {
- $spkac = openssl_spki_new($pkey, _uuid(), $value);
- var_dump(openssl_spki_verify(preg_replace('/SPKAC=/', '', $spkac)));
- var_dump(openssl_spki_verify($spkac . 'Make it fail'));
- }
- }
- /* generate a random challenge */
- function _uuid() {
- return sprintf('%04x%04x-%04x-%04x-%04x-%04x%04x%04x', mt_rand(0, 0xffff),
- mt_rand(0, 0xffff), mt_rand(0, 0xffff), mt_rand(0, 0x0fff) | 0x4000,
- mt_rand(0, 0x3fff) | 0x8000, mt_rand(0, 0xffff),
- mt_rand(0, 0xffff), mt_rand(0, 0xffff));
- }
- ?>
- --EXPECT--
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
- bool(true)
- bool(false)
|