2016-06-16 04:31:42 +08:00
|
|
|
--TEST--
|
|
|
|
openssl_*() with OPENSSL_KEYTYPE_EC
|
|
|
|
--SKIPIF--
|
2018-03-27 06:23:58 +08:00
|
|
|
<?php if (!extension_loaded("openssl") || !defined("OPENSSL_KEYTYPE_EC")) print "skip"; ?>
|
2016-06-16 04:31:42 +08:00
|
|
|
--FILE--
|
|
|
|
<?php
|
|
|
|
$args = array(
|
2018-06-21 23:38:19 +08:00
|
|
|
"curve_name" => "secp384r1",
|
|
|
|
"private_key_type" => OPENSSL_KEYTYPE_EC,
|
2016-06-16 04:31:42 +08:00
|
|
|
);
|
|
|
|
echo "Testing openssl_pkey_new\n";
|
|
|
|
$key1 = openssl_pkey_new($args);
|
|
|
|
var_dump($key1);
|
|
|
|
|
|
|
|
$argsFailed = array(
|
2018-06-21 23:38:19 +08:00
|
|
|
"curve_name" => "invalid_cuve_name",
|
|
|
|
"private_key_type" => OPENSSL_KEYTYPE_EC,
|
2016-06-16 04:31:42 +08:00
|
|
|
);
|
|
|
|
|
|
|
|
$keyFailed = openssl_pkey_new($argsFailed);
|
|
|
|
var_dump($keyFailed);
|
|
|
|
|
|
|
|
$d1 = openssl_pkey_get_details($key1);
|
|
|
|
var_dump($d1["bits"]);
|
|
|
|
var_dump(strlen($d1["key"]));
|
|
|
|
var_dump($d1["ec"]["curve_name"]);
|
|
|
|
var_dump($d1["type"] == OPENSSL_KEYTYPE_EC);
|
|
|
|
|
|
|
|
$key2 = openssl_pkey_new($d1);
|
|
|
|
var_dump($key2);
|
|
|
|
|
|
|
|
$d2 = openssl_pkey_get_details($key2);
|
|
|
|
// Compare array
|
|
|
|
var_dump($d1 === $d2);
|
|
|
|
|
|
|
|
$dn = array(
|
2018-06-21 23:38:19 +08:00
|
|
|
"countryName" => "BR",
|
|
|
|
"stateOrProvinceName" => "Rio Grande do Sul",
|
|
|
|
"localityName" => "Porto Alegre",
|
|
|
|
"commonName" => "Henrique do N. Angelo",
|
|
|
|
"emailAddress" => "hnangelo@php.net"
|
2016-06-16 04:31:42 +08:00
|
|
|
);
|
|
|
|
|
|
|
|
// openssl_csr_new creates a new public key pair if the key argument is null
|
|
|
|
echo "Testing openssl_csr_new with key generation\n";
|
|
|
|
$keyGenerate = null;
|
|
|
|
var_dump($keyGenerate);
|
|
|
|
$csr = openssl_csr_new($dn, $keyGenerate, $args);
|
|
|
|
|
|
|
|
var_dump($keyGenerate);
|
|
|
|
|
|
|
|
$args["digest_alg"] = "sha1";
|
|
|
|
echo "Testing openssl_csr_new with existing ecc key\n";
|
|
|
|
$csr = openssl_csr_new($dn, $key1, $args);
|
|
|
|
var_dump($csr);
|
|
|
|
|
|
|
|
$pubkey1 = openssl_pkey_get_details(openssl_csr_get_public_key($csr));
|
|
|
|
var_dump(isset($pubkey1["ec"]["priv_key"]));
|
|
|
|
unset($d1["ec"]["priv_key"]);
|
|
|
|
var_dump(array_diff($d1["ec"], $pubkey1["ec"]));
|
|
|
|
|
|
|
|
$x509 = openssl_csr_sign($csr, null, $key1, 365, $args);
|
|
|
|
var_dump($x509);
|
|
|
|
|
|
|
|
echo "Testing openssl_x509_check_private_key\n";
|
|
|
|
var_dump(openssl_x509_check_private_key($x509, $key1));
|
|
|
|
|
|
|
|
$key3 = openssl_pkey_new($args);
|
|
|
|
var_dump(openssl_x509_check_private_key($x509, $key3));
|
|
|
|
|
|
|
|
echo "Testing openssl_get_curve_names\n";
|
|
|
|
$curve_names = openssl_get_curve_names();
|
|
|
|
|
|
|
|
var_dump(is_array($curve_names));
|
|
|
|
|
|
|
|
foreach ($curve_names as $curve_name) {
|
2018-06-21 23:38:19 +08:00
|
|
|
if ("secp384r1" === $curve_name) {
|
|
|
|
echo "Found secp384r1 in curve names\n";
|
|
|
|
}
|
2016-06-16 04:31:42 +08:00
|
|
|
}
|
|
|
|
?>
|
|
|
|
--EXPECTF--
|
|
|
|
Testing openssl_pkey_new
|
|
|
|
resource(%d) of type (OpenSSL key)
|
|
|
|
|
|
|
|
Warning: openssl_pkey_new(): Unknown elliptic curve (short) name invalid_cuve_name in %s on line %d
|
|
|
|
bool(false)
|
|
|
|
int(384)
|
|
|
|
int(215)
|
|
|
|
string(9) "secp384r1"
|
|
|
|
bool(true)
|
|
|
|
resource(%d) of type (OpenSSL key)
|
|
|
|
bool(true)
|
|
|
|
Testing openssl_csr_new with key generation
|
|
|
|
NULL
|
|
|
|
resource(%d) of type (OpenSSL key)
|
|
|
|
Testing openssl_csr_new with existing ecc key
|
|
|
|
resource(%d) of type (OpenSSL X.509 CSR)
|
|
|
|
bool(false)
|
|
|
|
array(1) {
|
|
|
|
["d"]=>
|
2016-12-30 05:05:38 +08:00
|
|
|
string(%d) "%a"
|
2016-06-16 04:31:42 +08:00
|
|
|
}
|
|
|
|
resource(%d) of type (OpenSSL X.509)
|
|
|
|
Testing openssl_x509_check_private_key
|
|
|
|
bool(true)
|
|
|
|
bool(false)
|
|
|
|
Testing openssl_get_curve_names
|
|
|
|
bool(true)
|
|
|
|
Found secp384r1 in curve names
|