/php-src/ext/openssl/tests/ |
H A D | openssl_x509_checkpurpose_basic.phpt | 11 $certificateGenerator->saveCaCert(__DIR__ . "/san-cert.pem"); 13 $cert = "file://" . __DIR__ . "/cert.crt"; 15 $sert = "file://" . __DIR__ . "/san-cert.pem"; 16 $cpca = __DIR__ . "/san-cert.pem"; 18 $rcrt = openssl_x509_read($cert); 21 var_dump(openssl_x509_checkpurpose($cert, X509_PURPOSE_SSL_CLIENT)); 22 var_dump(openssl_x509_checkpurpose($cert, X509_PURPOSE_SSL_SERVER)); 24 var_dump(openssl_x509_checkpurpose($cert, X509_PURPOSE_SMIME_SIGN)); 26 var_dump(openssl_x509_checkpurpose($cert, X509_PURPOSE_CRL_SIGN)); 27 var_dump(openssl_x509_checkpurpose($cert, X509_PURPOSE_ANY)); [all …]
|
H A D | openssl_x509_verify.phpt | 7 $fp = fopen(__DIR__ . "/cert.crt","r"); 15 $cert = "file://" . __DIR__ . "/cert.crt"; 19 var_dump(openssl_x509_verify($cert, $key)); 21 var_dump(openssl_x509_verify($cert, "")); 24 var_dump(openssl_x509_verify($cert, $wrongKey));
|
H A D | openssl_x509_check_private_key_basic.phpt | 7 $fp = fopen(__DIR__ . "/cert.crt","r"); 15 $cert = "file://" . __DIR__ . "/cert.crt"; 18 var_dump(openssl_x509_check_private_key($cert, $key)); 20 var_dump(openssl_x509_check_private_key($cert, ""));
|
H A D | openssl_x509_fingerprint_basic.phpt | 8 $cert = "file://" . __DIR__ . "/cert.crt"; 11 var_dump(openssl_x509_fingerprint($cert)); 14 var_dump(openssl_x509_fingerprint($cert, 'md5')); 17 var_dump(bin2hex(openssl_x509_fingerprint($cert, 'md5', true))); 20 $r = openssl_x509_read($cert); 26 var_dump(openssl_x509_fingerprint($cert, 'xx45'));
|
H A D | openssl_x509_read_basic.phpt | 7 $fp = fopen(__DIR__ . "/cert.crt","r"); 11 $b = "file://" . __DIR__ . "/cert.crt"; 12 $c = "invalid cert"; 17 var_dump(openssl_x509_read($a)); // read cert as a string 18 var_dump(openssl_x509_read($b)); // read cert as a filename string 19 var_dump(openssl_x509_read($c)); // read an invalid cert, fails 20 var_dump(openssl_x509_read($d)); // read cert from a resource
|
H A D | openssl_pkcs12_export_basic.phpt | 8 $cert = file_get_contents($cert_file); 13 $cert_res = openssl_x509_read($cert); 20 var_dump(openssl_pkcs12_export($cert, $output, $priv, $pass)); // read certs as a string 26 var_dump(openssl_pkcs12_export($cert, $output, $priv, $pass, array('extracerts' => $cert))); // ext… 28 var_dump(count($opts)); // should be 3 certificates, priv, pub, extra optional cert 38 //var_dump(openssl_pkcs12_export($cert, $output, $priv, $pass, array("foo")));
|
H A D | openssl_x509_export_to_file_basic.phpt | 8 $cert_file = __DIR__ . "/cert.crt"; 12 $c = "invalid cert"; 16 var_dump(openssl_x509_export_to_file($a, $outfilename)); // read cert as a binary string 17 var_dump(openssl_x509_export_to_file($b, $outfilename)); // read cert from a filename string 18 var_dump(openssl_x509_export_to_file($c, $outfilename)); // read an invalid cert, fails 19 var_dump(openssl_x509_export_to_file($d, $outfilename)); // read cert from a resource
|
H A D | openssl_x509_export_basic.phpt | 7 $cert_file = __DIR__ . "/cert.crt"; 11 $c = "invalid cert"; 15 var_dump(openssl_x509_export($a, $output)); // read cert as a binary string 16 var_dump(openssl_x509_export($b, $output2)); // read cert from a filename string 17 var_dump(openssl_x509_export($c, $output3)); // read an invalid cert, fails 18 var_dump(openssl_x509_export($d, $output4)); // read cert from a resource
|
H A D | openssl_pkcs12_export_to_file_error.phpt | 10 $cert = file_get_contents($cert_file); 18 var_dump(openssl_pkcs12_export_to_file($cert, $pkcsfile, null, $pass)); 19 var_dump(openssl_pkcs12_export_to_file($cert, $pkcsfile, $wrong_priv, $pass)); 20 var_dump(openssl_pkcs12_export_to_file($cert, '.', $priv, $pass)); 33 Warning: openssl_pkcs12_export_to_file(): Private key does not correspond to cert in %s on line %d
|
H A D | sni_server_key_cert.phpt | 2 sni_server with separate pk and cert 50 $cert = stream_context_get_options($ctx)['ssl']['peer_certificate']; 51 var_dump(openssl_x509_parse($cert)['subject']['CN']); 56 $cert = stream_context_get_options($ctx)['ssl']['peer_certificate']; 57 var_dump(openssl_x509_parse($cert)['subject']['CN']); 62 $cert = stream_context_get_options($ctx)['ssl']['peer_certificate']; 63 var_dump(openssl_x509_parse($cert)['subject']['CN']);
|
H A D | sni_server.phpt | 41 $cert = stream_context_get_options($ctx)['ssl']['peer_certificate']; 42 var_dump(openssl_x509_parse($cert)['subject']['CN']); 47 $cert = stream_context_get_options($ctx)['ssl']['peer_certificate']; 48 var_dump(openssl_x509_parse($cert)['subject']['CN']); 53 $cert = stream_context_get_options($ctx)['ssl']['peer_certificate']; 54 var_dump(openssl_x509_parse($cert)['subject']['CN']);
|
H A D | bug74022_2.phpt | 13 $cert = file_get_contents(__DIR__ . "/public.crt"); 15 $extracert = file_get_contents(__DIR__ . "/cert.crt"); 17 openssl_pkcs12_export($cert, $p12, $priv, $pass, array('extracerts' => [$extracert, $extracert]));
|
H A D | bug39217.phpt | 9 foreach($certs as $cert) { 10 $res = openssl_x509_parse(file_get_contents($dir . '/' . $cert));
|
H A D | openssl_pkcs12_export_to_file_basic.phpt | 10 $cert = file_get_contents($cert_file); 15 $cert_res = openssl_x509_read($cert); 22 var_dump(openssl_pkcs12_export_to_file($cert, $pkcsfile, $priv, $pass)); 28 …enssl_pkcs12_export_to_file($cert_res, $pkcsfile, $priv_res, $pass, array('extracerts' => $cert)));
|
H A D | bug61930.phpt | 7 $cert = file_get_contents(__DIR__.'/public.crt'); 18 $key = openssl_get_publickey($cert);
|
H A D | bug64802.phpt | 11 $cert = file_get_contents(__DIR__.'/bug64802.pem'); 12 $r = openssl_x509_parse($cert,$use_short_names=false);
|
H A D | openssl_pkcs12_read_basic.phpt | 8 $cert = file_get_contents(__DIR__ . "/public.crt"); 10 $extracert = file_get_contents(__DIR__ . "/cert.crt"); 12 openssl_pkcs12_export($cert, $p12, $priv, $pass, array('extracerts' => $extracert)); 24 ["cert"]=>
|
H A D | bug52093.phpt | 21 $cert = openssl_csr_sign($csr, null, $privkey, 365, $options, PHP_INT_MAX); 22 var_dump(openssl_x509_parse($cert)['serialNumber']);
|
H A D | cve2013_4073.phpt | 7 $cert = file_get_contents(__DIR__ . '/cve2013_4073.pem'); 8 $info = openssl_x509_parse($cert);
|
H A D | bug47828.phpt | 33 $cert = str_replace("\\n", "\n", $csr); 34 $arr = openssl_x509_parse($cert);
|
H A D | openssl_csr_sign_basic.phpt | 11 $cert = "file://" . __DIR__ . "/cert.crt"; 39 var_dump(openssl_csr_sign($csr, $cert, $priv, 365, $config_arg)); 40 var_dump(openssl_csr_sign($csr, openssl_x509_read($cert), $priv, 365, $config_arg));
|
H A D | openssl_pkcs7_read_basic.phpt | 7 $infile = file_get_contents(__DIR__ . "/cert.p7b"); 8 $certfile = file_get_contents(__DIR__ . "/cert.crt");
|
H A D | openssl_cms_read_basic.phpt | 7 $infile = file_get_contents(__DIR__ . "/cert.p7b"); 8 $certfile = file_get_contents(__DIR__ . "/cert.crt");
|
/php-src/ext/curl/tests/ |
H A D | curl_setopt_ssl.phpt | 37 // load server cert 45 // load client cert 190 client cert subject in response 197 client cert subject not in response 205 client cert subject not in response 213 client cert subject in response 215 case 5: issuer cert from file 222 client cert subject in response 224 case 6: issuer cert from string 231 client cert subject in response [all …]
|
/php-src/ext/openssl/ |
H A D | openssl.c | 1540 X509 *cert; in PHP_FUNCTION() local 1846 X509 *cert; in PHP_FUNCTION() local 1925 X509 *cert; in PHP_FUNCTION() local 1961 X509 *cert; in PHP_FUNCTION() local 2565 cert = X509_dup(cert); in STACK_OF() 2585 cert = X509_dup(cert); in STACK_OF() 3406 if (cert_str && cert && cert != new_cert) { in PHP_FUNCTION() 5798 cert = X509_dup(cert); in PHP_FUNCTION() 5819 cert = X509_dup(cert); in PHP_FUNCTION() 6404 cert = X509_dup(cert); in PHP_FUNCTION() [all …]
|