bug76705.phpt 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. --TEST--
  2. Bug #76705: unusable ssl => peer_fingerprint in stream_context_create()
  3. --EXTENSIONS--
  4. openssl
  5. --SKIPIF--
  6. <?php
  7. if (!function_exists("proc_open")) die("skip no proc_open");
  8. ?>
  9. --FILE--
  10. <?php
  11. $serverCode = <<<'CODE'
  12. $serverUri = "ssl://127.0.0.1:64323";
  13. $serverFlags = STREAM_SERVER_BIND | STREAM_SERVER_LISTEN;
  14. $serverCtx = stream_context_create(['ssl' => [
  15. 'local_cert' => __DIR__ . '/bug76705.pem'
  16. ]]);
  17. $server = stream_socket_server($serverUri, $errno, $errstr, $serverFlags, $serverCtx);
  18. phpt_notify();
  19. @stream_socket_accept($server, 1);
  20. CODE;
  21. $clientCode = <<<'CODE'
  22. $serverUri = "ssl://127.0.0.1:64323";
  23. $clientFlags = STREAM_CLIENT_CONNECT;
  24. $clientCtx = stream_context_create(['ssl' => [
  25. 'verify_peer' => true,
  26. 'peer_name' => 'openssl.php.net',
  27. 'allow_self_signed' => true,
  28. 'peer_fingerprint' => [
  29. 'sha256' => '4A524F3617E41BCCA1370ED9E89C9A7A83C28F0F342C490296D362869BDF1DA8',
  30. ]
  31. ]]);
  32. phpt_wait();
  33. var_dump(stream_socket_client($serverUri, $errno, $errstr, 2, $clientFlags, $clientCtx));
  34. CODE;
  35. include 'ServerClientTestCase.inc';
  36. ServerClientTestCase::getInstance()->run($clientCode, $serverCode);
  37. ?>
  38. --EXPECTF--
  39. resource(%d) of type (stream)