stream_security_level.phpt 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475
  1. --TEST--
  2. security_level setting to prohibit cert
  3. --EXTENSIONS--
  4. openssl
  5. --SKIPIF--
  6. <?php
  7. if (OPENSSL_VERSION_NUMBER < 0x10100000) die("skip OpenSSL >= v1.1.0 required");
  8. if (!function_exists("proc_open")) die("skip no proc_open");
  9. ?>
  10. --FILE--
  11. <?php
  12. // https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_get_security_level.html
  13. $securityLevel = 2;
  14. // Security level 2 refuses certs signed by keys with length of less than 2048 bits
  15. $keyLength = 1024;
  16. $certFile = __DIR__ . DIRECTORY_SEPARATOR . 'stream_security_level.pem.tmp';
  17. $cacertFile = __DIR__ . DIRECTORY_SEPARATOR . 'stream_security_level-ca.pem.tmp';
  18. $serverCode = <<<'CODE'
  19. $serverUri = "ssl://127.0.0.1:64322";
  20. $serverFlags = STREAM_SERVER_BIND | STREAM_SERVER_LISTEN;
  21. $serverCtx = stream_context_create(['ssl' => [
  22. 'local_cert' => '%s',
  23. // Make sure the server side starts up successfully if the default security level is
  24. // higher. We want to test the error at the client side.
  25. 'security_level' => 0,
  26. ]]);
  27. $server = stream_socket_server($serverUri, $errno, $errstr, $serverFlags, $serverCtx);
  28. phpt_notify();
  29. @stream_socket_accept($server, 1);
  30. CODE;
  31. $serverCode = sprintf($serverCode, $certFile);
  32. $clientCode = <<<'CODE'
  33. $serverUri = "ssl://127.0.0.1:64322";
  34. $clientFlags = STREAM_CLIENT_CONNECT;
  35. $clientCtx = stream_context_create(['ssl' => [
  36. 'security_level' => %d,
  37. 'verify_peer' => true,
  38. 'cafile' => '%s',
  39. 'verify_peer_name' => false
  40. ]]);
  41. phpt_wait();
  42. $client = stream_socket_client($serverUri, $errno, $errstr, 1, $clientFlags, $clientCtx);
  43. var_dump($client);
  44. CODE;
  45. $clientCode = sprintf($clientCode, $securityLevel, $cacertFile);
  46. include 'CertificateGenerator.inc';
  47. $certificateGenerator = new CertificateGenerator();
  48. $certificateGenerator->saveCaCert($cacertFile);
  49. $certificateGenerator->saveNewCertAsFileWithKey('stream_security_level', $certFile, $keyLength);
  50. include 'ServerClientTestCase.inc';
  51. ServerClientTestCase::getInstance()->run($clientCode, $serverCode);
  52. ?>
  53. --CLEAN--
  54. <?php
  55. @unlink(__DIR__ . DIRECTORY_SEPARATOR . 'stream_security_level.pem.tmp');
  56. @unlink(__DIR__ . DIRECTORY_SEPARATOR . 'stream_security_level-ca.pem.tmp');
  57. ?>
  58. --EXPECTF--
  59. Warning: stream_socket_client(): SSL operation failed with code 1. OpenSSL Error messages:
  60. error:%s:SSL routines:%S:certificate verify failed in %s : eval()'d code on line %d
  61. Warning: stream_socket_client(): Failed to enable crypto in %s : eval()'d code on line %d
  62. Warning: stream_socket_client(): Unable to connect to ssl://127.0.0.1:64322 (Unknown error) in %s : eval()'d code on line %d
  63. bool(false)