bug68879.phpt 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
  1. --TEST--
  2. Bug #68879: Match IP address fields in subjectAltName checks
  3. --EXTENSIONS--
  4. openssl
  5. --SKIPIF--
  6. <?php
  7. if (!function_exists("proc_open")) die("skip no proc_open");
  8. ?>
  9. --FILE--
  10. <?php
  11. $certFile = __DIR__ . DIRECTORY_SEPARATOR . 'bug68879.pem.tmp';
  12. $san = 'DNS:test.com, DNS:www.test.com, DNS:subdomain.test.com, IP:0:0:0:0:0:FFFF:A02:1, IP:10.2.0.1';
  13. $serverCode = <<<'CODE'
  14. $serverUri = "ssl://127.0.0.1:64321";
  15. $serverFlags = STREAM_SERVER_BIND | STREAM_SERVER_LISTEN;
  16. $serverCtx = stream_context_create(['ssl' => [
  17. 'local_cert' => '%s',
  18. ]]);
  19. $server = stream_socket_server($serverUri, $errno, $errstr, $serverFlags, $serverCtx);
  20. phpt_notify();
  21. stream_socket_accept($server, 30);
  22. CODE;
  23. $serverCode = sprintf($serverCode, $certFile);
  24. $clientCode = <<<'CODE'
  25. $serverUri = "ssl://127.0.0.1:64321";
  26. $clientFlags = STREAM_CLIENT_CONNECT;
  27. $clientCtx = stream_context_create(['ssl' => [
  28. 'verify_peer' => false,
  29. 'verify_peer_name' => true,
  30. 'peer_name' => '10.2.0.1',
  31. ]]);
  32. phpt_wait();
  33. var_dump(stream_socket_client($serverUri, $errno, $errstr, 30, $clientFlags, $clientCtx));
  34. CODE;
  35. include 'CertificateGenerator.inc';
  36. $certificateGenerator = new CertificateGenerator();
  37. $certificateGenerator->saveNewCertAsFileWithKey('test.com', $certFile, null, $san);
  38. include 'ServerClientTestCase.inc';
  39. ServerClientTestCase::getInstance()->run($clientCode, $serverCode);
  40. ?>
  41. --CLEAN--
  42. <?php
  43. @unlink(__DIR__ . DIRECTORY_SEPARATOR . 'bug68879.pem.tmp');
  44. ?>
  45. --EXPECTF--
  46. resource(%d) of type (stream)