summaryrefslogtreecommitdiff
path: root/ext/openssl/tests
diff options
context:
space:
mode:
Diffstat (limited to 'ext/openssl/tests')
-rw-r--r--ext/openssl/tests/001.phpt6
-rw-r--r--ext/openssl/tests/bug25614.phpt8
-rw-r--r--ext/openssl/tests/bug28382.phpt2
-rw-r--r--ext/openssl/tests/bug36732.phpt4
-rw-r--r--ext/openssl/tests/bug37820.phpt4
-rw-r--r--ext/openssl/tests/bug38255.phpt6
-rw-r--r--ext/openssl/tests/bug38261.phpt4
-rw-r--r--ext/openssl/tests/bug39217.phpt4
-rw-r--r--ext/openssl/tests/bug41033.phpt2
-rw-r--r--ext/openssl/tests/bug41353.phpt4
-rw-r--r--ext/openssl/tests/bug46127.phpt2
-rw-r--r--ext/openssl/tests/bug48182.phpt2
-rw-r--r--ext/openssl/tests/bug54992.phpt2
-rw-r--r--ext/openssl/tests/bug61124.phpt2
-rw-r--r--ext/openssl/tests/bug65729.phpt2
-rw-r--r--ext/openssl/tests/bug66501.phpt2
-rw-r--r--ext/openssl/tests/bug68912.phpt6
-rw-r--r--ext/openssl/tests/bug68920.phpt2
-rw-r--r--ext/openssl/tests/bug71475.phpt2
-rw-r--r--ext/openssl/tests/bug72333.phpt4
-rw-r--r--ext/openssl/tests/bug73072.phpt4
-rw-r--r--ext/openssl/tests/bug74903.phpt4
-rw-r--r--ext/openssl/tests/openssl_csr_get_subject_basic.phpt4
-rw-r--r--ext/openssl/tests/openssl_csr_new_basic.phpt2
-rw-r--r--ext/openssl/tests/openssl_decrypt_error.phpt2
-rw-r--r--ext/openssl/tests/openssl_peer_fingerprint_basic.phpt2
-rw-r--r--ext/openssl/tests/openssl_pkcs7_decrypt_error.phpt14
-rw-r--r--ext/openssl/tests/openssl_pkey_derive-ecdh.phpt2
-rw-r--r--ext/openssl/tests/openssl_seal_basic.phpt2
-rw-r--r--ext/openssl/tests/openssl_sign_basic.phpt2
-rw-r--r--ext/openssl/tests/openssl_x509_checkpurpose_basic.phpt2
-rw-r--r--ext/openssl/tests/openssl_x509_read_basic.phpt2
-rw-r--r--ext/openssl/tests/peer_verification.phpt2
-rw-r--r--ext/openssl/tests/san_peer_matching.phpt2
-rw-r--r--ext/openssl/tests/tlsv1.0_wrapper.phpt2
-rw-r--r--ext/openssl/tests/tlsv1.1_wrapper.phpt6
-rw-r--r--ext/openssl/tests/tlsv1.2_wrapper.phpt6
37 files changed, 65 insertions, 65 deletions
diff --git a/ext/openssl/tests/001.phpt b/ext/openssl/tests/001.phpt
index 7f5af24ae6..77b0f32183 100644
--- a/ext/openssl/tests/001.phpt
+++ b/ext/openssl/tests/001.phpt
@@ -1,9 +1,9 @@
--TEST--
OpenSSL private key functions
--SKIPIF--
-<?php
-if (!extension_loaded("openssl")) die("skip");
-if (!@openssl_pkey_new()) die("skip cannot create private key");
+<?php
+if (!extension_loaded("openssl")) die("skip");
+if (!@openssl_pkey_new()) die("skip cannot create private key");
?>
--FILE--
<?php
diff --git a/ext/openssl/tests/bug25614.phpt b/ext/openssl/tests/bug25614.phpt
index a43130708b..6adc0f39c1 100644
--- a/ext/openssl/tests/bug25614.phpt
+++ b/ext/openssl/tests/bug25614.phpt
@@ -1,12 +1,12 @@
--TEST--
openssl: get public key from generated private key
--SKIPIF--
-<?php
-if (!extension_loaded("openssl")) die("skip");
-if (!@openssl_pkey_new()) die("skip cannot create private key");
+<?php
+if (!extension_loaded("openssl")) die("skip");
+if (!@openssl_pkey_new()) die("skip cannot create private key");
?>
--FILE--
-<?php
+<?php
$priv = openssl_pkey_new();
$pub = openssl_pkey_get_public($priv);
?>
diff --git a/ext/openssl/tests/bug28382.phpt b/ext/openssl/tests/bug28382.phpt
index c3888e962b..1ff839bf4c 100644
--- a/ext/openssl/tests/bug28382.phpt
+++ b/ext/openssl/tests/bug28382.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #28382 (openssl_x509_parse extensions support)
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
diff --git a/ext/openssl/tests/bug36732.phpt b/ext/openssl/tests/bug36732.phpt
index 72ca6904a9..2de0346bae 100644
--- a/ext/openssl/tests/bug36732.phpt
+++ b/ext/openssl/tests/bug36732.phpt
@@ -1,11 +1,11 @@
--TEST--
Bug #36732 (add support for req_extensions in openss_csr_new and sign)
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
-<?php
+<?php
$configargs = array(
"req_extensions" => "v3_req",
"x509_extensions" => "usr_cert",
diff --git a/ext/openssl/tests/bug37820.phpt b/ext/openssl/tests/bug37820.phpt
index d85a935ff3..2f1998a1bb 100644
--- a/ext/openssl/tests/bug37820.phpt
+++ b/ext/openssl/tests/bug37820.phpt
@@ -1,11 +1,11 @@
--TEST--
openssl_sign/verify: accept different algos
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
-<?php
+<?php
$dir = dirname(__FILE__);
$file_pub = $dir . '/bug37820cert.pem';
$file_key = $dir . '/bug37820key.pem';
diff --git a/ext/openssl/tests/bug38255.phpt b/ext/openssl/tests/bug38255.phpt
index 9eca6594a9..3969d993bf 100644
--- a/ext/openssl/tests/bug38255.phpt
+++ b/ext/openssl/tests/bug38255.phpt
@@ -1,12 +1,12 @@
--TEST--
openssl key from zval leaks
--SKIPIF--
-<?php
-if (!extension_loaded("openssl")) die("skip");
+<?php
+if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
<?php
-$pub_key_id = false;
+$pub_key_id = false;
$signature = '';
$ok = openssl_verify("foo", $signature, $pub_key_id, OPENSSL_ALGO_MD5);
diff --git a/ext/openssl/tests/bug38261.phpt b/ext/openssl/tests/bug38261.phpt
index 6691947320..dec675cebc 100644
--- a/ext/openssl/tests/bug38261.phpt
+++ b/ext/openssl/tests/bug38261.phpt
@@ -1,8 +1,8 @@
--TEST--
openssl key from zval leaks
--SKIPIF--
-<?php
-if (!extension_loaded("openssl")) die("skip");
+<?php
+if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
<?php
diff --git a/ext/openssl/tests/bug39217.phpt b/ext/openssl/tests/bug39217.phpt
index 47f234d769..b9c5e50a73 100644
--- a/ext/openssl/tests/bug39217.phpt
+++ b/ext/openssl/tests/bug39217.phpt
@@ -1,11 +1,11 @@
--TEST--
Bug #39217 (Large serial number return -1)
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
-<?php
+<?php
$dir = dirname(__FILE__);
$certs = array('bug39217cert2.txt', 'bug39217cert1.txt');
foreach($certs as $cert) {
diff --git a/ext/openssl/tests/bug41033.phpt b/ext/openssl/tests/bug41033.phpt
index f52a4c7d27..6f8ebc64c3 100644
--- a/ext/openssl/tests/bug41033.phpt
+++ b/ext/openssl/tests/bug41033.phpt
@@ -1,7 +1,7 @@
--TEST--
#41033, enable signing with DSA keys
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip, openssl required");
?>
--FILE--
diff --git a/ext/openssl/tests/bug41353.phpt b/ext/openssl/tests/bug41353.phpt
index 2f5ca2007e..36a7be6e22 100644
--- a/ext/openssl/tests/bug41353.phpt
+++ b/ext/openssl/tests/bug41353.phpt
@@ -1,8 +1,8 @@
--TEST--
Bug #41353 (openssl_pkcs12_read() does not verify the type of the first arg)
--SKIPIF--
-<?php
-if (!extension_loaded("openssl")) die("skip");
+<?php
+if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
<?php
diff --git a/ext/openssl/tests/bug46127.phpt b/ext/openssl/tests/bug46127.phpt
index f11d8baf0b..d0172371f6 100644
--- a/ext/openssl/tests/bug46127.phpt
+++ b/ext/openssl/tests/bug46127.phpt
@@ -1,7 +1,7 @@
--TEST--
#46127, openssl_sign/verify: accept different algos
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/bug48182.phpt b/ext/openssl/tests/bug48182.phpt
index dcadaaa6b9..0357720003 100644
--- a/ext/openssl/tests/bug48182.phpt
+++ b/ext/openssl/tests/bug48182.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #48182: ssl handshake fails during asynchronous socket connection
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/bug54992.phpt b/ext/openssl/tests/bug54992.phpt
index 01369dca00..c07bbf8cba 100644
--- a/ext/openssl/tests/bug54992.phpt
+++ b/ext/openssl/tests/bug54992.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #54992: Stream not closed and error not returned when SSL CN_match fails
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/bug61124.phpt b/ext/openssl/tests/bug61124.phpt
index 4b6194bdb4..9c7d0ac483 100644
--- a/ext/openssl/tests/bug61124.phpt
+++ b/ext/openssl/tests/bug61124.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #61124: Segmentation fault with openssl_decrypt
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip");
--FILE--
<?php
diff --git a/ext/openssl/tests/bug65729.phpt b/ext/openssl/tests/bug65729.phpt
index 5e91197b70..cffba43dfe 100644
--- a/ext/openssl/tests/bug65729.phpt
+++ b/ext/openssl/tests/bug65729.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #65729: CN_match gives false positive when wildcard is used
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/bug66501.phpt b/ext/openssl/tests/bug66501.phpt
index 34dac6d44a..e023ee1480 100644
--- a/ext/openssl/tests/bug66501.phpt
+++ b/ext/openssl/tests/bug66501.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #66501: EC private key support in openssl_sign
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip");
if (!defined('OPENSSL_KEYTYPE_EC')) die("skip no EC available");
?>
diff --git a/ext/openssl/tests/bug68912.phpt b/ext/openssl/tests/bug68912.phpt
index dae57e9fdc..724a96017a 100644
--- a/ext/openssl/tests/bug68912.phpt
+++ b/ext/openssl/tests/bug68912.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #68912 (Segmentation fault at openssl_spki_new)
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip");
if (!@openssl_pkey_new()) die("skip cannot create private key");
?>
@@ -9,8 +9,8 @@ if (!@openssl_pkey_new()) die("skip cannot create private key");
<?php
$var1=fopen(__FILE__, 'r');
-$var2=2;
-$var3=3;
+$var2=2;
+$var3=3;
openssl_spki_new($var1, $var2, $var3);
?>
diff --git a/ext/openssl/tests/bug68920.phpt b/ext/openssl/tests/bug68920.phpt
index 4c6271819b..34e07a4532 100644
--- a/ext/openssl/tests/bug68920.phpt
+++ b/ext/openssl/tests/bug68920.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #68920: peer_fingerprint input checks should be strict
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/bug71475.phpt b/ext/openssl/tests/bug71475.phpt
index e959371c4c..659544297b 100644
--- a/ext/openssl/tests/bug71475.phpt
+++ b/ext/openssl/tests/bug71475.phpt
@@ -1,7 +1,7 @@
--TEST--
Bug #71475: openssl_seal() uninitialized memory usage
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
?>
--FILE--
diff --git a/ext/openssl/tests/bug72333.phpt b/ext/openssl/tests/bug72333.phpt
index 1350df8501..e478e3b925 100644
--- a/ext/openssl/tests/bug72333.phpt
+++ b/ext/openssl/tests/bug72333.phpt
@@ -34,11 +34,11 @@ CODE;
$clientCode = <<<'CODE'
$context = stream_context_create(['ssl' => ['verify_peer' => false, 'peer_name' => 'bug54992.local']]);
-
+
phpt_wait();
$fp = stream_socket_client("ssl://127.0.0.1:10011", $errornum, $errorstr, 3000, STREAM_CLIENT_CONNECT, $context);
stream_set_blocking($fp, false);
-
+
function blocking_fwrite($fp, $buf) {
$write = [$fp];
$total = 0;
diff --git a/ext/openssl/tests/bug73072.phpt b/ext/openssl/tests/bug73072.phpt
index 8f001829f2..06c1c2550c 100644
--- a/ext/openssl/tests/bug73072.phpt
+++ b/ext/openssl/tests/bug73072.phpt
@@ -16,9 +16,9 @@ $serverCode = <<<'CODE'
"domain2.com" => __DIR__ . "/not_existing.pem",
]
]]);
-
+
$server = stream_socket_server('tls://127.0.0.1:64322', $errno, $errstr, $flags, $ctx);
-
+
phpt_notify();
@stream_socket_accept($server, 3);
// if there is a segfault, this won't be called
diff --git a/ext/openssl/tests/bug74903.phpt b/ext/openssl/tests/bug74903.phpt
index 40b14f0acf..7a20b8693d 100644
--- a/ext/openssl/tests/bug74903.phpt
+++ b/ext/openssl/tests/bug74903.phpt
@@ -1,8 +1,8 @@
--TEST--
Bug #74903 openssl_pkcs7_encrypt() uses different EOL than before
--SKIPIF--
-<?php
-if (!extension_loaded("openssl")) die("skip");
+<?php
+if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
<?php
diff --git a/ext/openssl/tests/openssl_csr_get_subject_basic.phpt b/ext/openssl/tests/openssl_csr_get_subject_basic.phpt
index 7046085618..eba4a7ac8d 100644
--- a/ext/openssl/tests/openssl_csr_get_subject_basic.phpt
+++ b/ext/openssl/tests/openssl_csr_get_subject_basic.phpt
@@ -1,7 +1,7 @@
--TEST--
openssl_csr_get_subject() tests
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip");
?>
--FILE--
@@ -39,7 +39,7 @@ $csr_file = file_get_contents(dirname(__FILE__) . '/cert.csr');
var_dump(openssl_csr_get_subject($csr_file));
var_dump(openssl_csr_get_subject($csr, false));
?>
---EXPECT--
+--EXPECT--
array(6) {
["C"]=>
string(2) "NL"
diff --git a/ext/openssl/tests/openssl_csr_new_basic.phpt b/ext/openssl/tests/openssl_csr_new_basic.phpt
index 24db4a4afc..816c6f9d90 100644
--- a/ext/openssl/tests/openssl_csr_new_basic.phpt
+++ b/ext/openssl/tests/openssl_csr_new_basic.phpt
@@ -25,7 +25,7 @@ var_dump(openssl_csr_new(["countryName" => "DE"], $x, $conf + ["x509_extensions"
echo "Done\n";
?>
---EXPECTF--
+--EXPECTF--
Warning: openssl_csr_new() expects parameter 1 to be array, int given in %s on line %d
NULL
diff --git a/ext/openssl/tests/openssl_decrypt_error.phpt b/ext/openssl/tests/openssl_decrypt_error.phpt
index b34397a651..eab67f403c 100644
--- a/ext/openssl/tests/openssl_decrypt_error.phpt
+++ b/ext/openssl/tests/openssl_decrypt_error.phpt
@@ -12,7 +12,7 @@ $iv = str_repeat("\0", openssl_cipher_iv_length($method));
$encrypted = openssl_encrypt($data, $method, $password);
var_dump($encrypted); /* Not passing $iv should be the same as all-NULL iv, but with a warning */
-var_dump(openssl_encrypt($data, $method, $password, 0, $iv));
+var_dump(openssl_encrypt($data, $method, $password, 0, $iv));
var_dump(openssl_decrypt($encrypted, $method, $wrong));
var_dump(openssl_decrypt($encrypted, $wrong, $password));
var_dump(openssl_decrypt($wrong, $method, $password));
diff --git a/ext/openssl/tests/openssl_peer_fingerprint_basic.phpt b/ext/openssl/tests/openssl_peer_fingerprint_basic.phpt
index 430de54dfd..0a745e8c3d 100644
--- a/ext/openssl/tests/openssl_peer_fingerprint_basic.phpt
+++ b/ext/openssl/tests/openssl_peer_fingerprint_basic.phpt
@@ -1,7 +1,7 @@
--TEST--
Testing peer fingerprint on connection
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/openssl_pkcs7_decrypt_error.phpt b/ext/openssl/tests/openssl_pkcs7_decrypt_error.phpt
index 3e76efe22d..f892c6854f 100644
--- a/ext/openssl/tests/openssl_pkcs7_decrypt_error.phpt
+++ b/ext/openssl/tests/openssl_pkcs7_decrypt_error.phpt
@@ -7,13 +7,13 @@ openssl_pkcs7_decrypt() and invalid parameters
function myErrorHandler($errno, $errstr, $errfile, $errline) {
var_dump($errstr);
-}
-set_error_handler("myErrorHandler");
+}
+set_error_handler("myErrorHandler");
-$a = 1;
-$b = 1;
-$c = new stdclass;
-$d = new stdclass;
+$a = 1;
+$b = 1;
+$c = new stdclass;
+$d = new stdclass;
var_dump(openssl_pkcs7_decrypt($a, $b, $c, $d));
var_dump($c);
@@ -25,7 +25,7 @@ var_dump(openssl_pkcs7_decrypt($a, $b, 0, 0));
echo "Done\n";
?>
---EXPECT--
+--EXPECT--
string(57) "Object of class stdClass could not be converted to string"
string(66) "openssl_pkcs7_decrypt(): unable to coerce parameter 3 to x509 cert"
bool(false)
diff --git a/ext/openssl/tests/openssl_pkey_derive-ecdh.phpt b/ext/openssl/tests/openssl_pkey_derive-ecdh.phpt
index d26e479ee8..387992423e 100644
--- a/ext/openssl/tests/openssl_pkey_derive-ecdh.phpt
+++ b/ext/openssl/tests/openssl_pkey_derive-ecdh.phpt
@@ -14,7 +14,7 @@ x3Nz35sz8u0CE6befv+Fxo5ORq373v9eDzp62Z8g
-----END EC PRIVATE KEY-----
");
-$pub = openssl_pkey_get_public("-----BEGIN PUBLIC KEY-----
+$pub = openssl_pkey_get_public("-----BEGIN PUBLIC KEY-----
MIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQBGs5c8VCdd3VcOAUhuCzEB6uMUDob
lG5vtncWqvHfcnsR4uHEuufl24rbraVFyVeGr/BV0AfUnnhKGnaEtSDG9h4BMw5A
vHiBzBCZUlA1TUMSmNpedutkZul4h6gYNrzFtfjmbqSnC0732YgUIrr4yueOSL2E
diff --git a/ext/openssl/tests/openssl_seal_basic.phpt b/ext/openssl/tests/openssl_seal_basic.phpt
index 4f1958a365..1899ebac3b 100644
--- a/ext/openssl/tests/openssl_seal_basic.phpt
+++ b/ext/openssl/tests/openssl_seal_basic.phpt
@@ -29,7 +29,7 @@ var_dump(openssl_seal($data, $sealed, $ekeys, array($wrong)));
echo "Done\n";
?>
---EXPECTF--
+--EXPECTF--
Warning: openssl_seal(): not a public key (1th member of pubkeys) in %s on line %d
bool(false)
diff --git a/ext/openssl/tests/openssl_sign_basic.phpt b/ext/openssl/tests/openssl_sign_basic.phpt
index 3d41ee1d34..0200e5ba6e 100644
--- a/ext/openssl/tests/openssl_sign_basic.phpt
+++ b/ext/openssl/tests/openssl_sign_basic.phpt
@@ -12,7 +12,7 @@ var_dump(openssl_sign($data, $sign, $privkey)); // no output
var_dump(openssl_sign($data, $sign, $wrong));
var_dump(openssl_sign(array(), $sign, $privkey));
?>
---EXPECTF--
+--EXPECTF--
bool(true)
Warning: openssl_sign(): supplied key param cannot be coerced into a private key in %s on line %d
diff --git a/ext/openssl/tests/openssl_x509_checkpurpose_basic.phpt b/ext/openssl/tests/openssl_x509_checkpurpose_basic.phpt
index 677f4d8905..9634663556 100644
--- a/ext/openssl/tests/openssl_x509_checkpurpose_basic.phpt
+++ b/ext/openssl/tests/openssl_x509_checkpurpose_basic.phpt
@@ -3,7 +3,7 @@ int openssl_x509_checkpurpose ( mixed $x509cert , int $purpose [, array $cainfo
--CREDITS--
marcosptf - <marcosptf@yahoo.com.br>
--SKIPIF--
-<?php if (!extension_loaded("openssl")) print "skip";
+<?php if (!extension_loaded("openssl")) print "skip";
if (OPENSSL_VERSION_NUMBER < 0x10000000) die("skip Output requires OpenSSL 1.0");
?>
--FILE--
diff --git a/ext/openssl/tests/openssl_x509_read_basic.phpt b/ext/openssl/tests/openssl_x509_read_basic.phpt
index 5f530534ff..72a62f7079 100644
--- a/ext/openssl/tests/openssl_x509_read_basic.phpt
+++ b/ext/openssl/tests/openssl_x509_read_basic.phpt
@@ -6,7 +6,7 @@ openssl_x509_read() tests
<?php
$fp = fopen(dirname(__FILE__) . "/cert.crt","r");
$a = fread($fp,8192);
-fclose($fp);
+fclose($fp);
$b = "file://" . dirname(__FILE__) . "/cert.crt";
$c = "invalid cert";
diff --git a/ext/openssl/tests/peer_verification.phpt b/ext/openssl/tests/peer_verification.phpt
index 3abc191667..db2a773465 100644
--- a/ext/openssl/tests/peer_verification.phpt
+++ b/ext/openssl/tests/peer_verification.phpt
@@ -1,7 +1,7 @@
--TEST--
Peer verification enabled for client streams
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/san_peer_matching.phpt b/ext/openssl/tests/san_peer_matching.phpt
index f048c4e0f1..87410dd16d 100644
--- a/ext/openssl/tests/san_peer_matching.phpt
+++ b/ext/openssl/tests/san_peer_matching.phpt
@@ -1,7 +1,7 @@
--TEST--
Peer verification matches SAN names
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/tlsv1.0_wrapper.phpt b/ext/openssl/tests/tlsv1.0_wrapper.phpt
index 952a288305..6be29848bc 100644
--- a/ext/openssl/tests/tlsv1.0_wrapper.phpt
+++ b/ext/openssl/tests/tlsv1.0_wrapper.phpt
@@ -1,7 +1,7 @@
--TEST--
tlsv1.0 stream wrapper
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
diff --git a/ext/openssl/tests/tlsv1.1_wrapper.phpt b/ext/openssl/tests/tlsv1.1_wrapper.phpt
index eedf54fea7..25c2ee27f0 100644
--- a/ext/openssl/tests/tlsv1.1_wrapper.phpt
+++ b/ext/openssl/tests/tlsv1.1_wrapper.phpt
@@ -1,7 +1,7 @@
--TEST--
tlsv1.1 stream wrapper
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
@@ -32,10 +32,10 @@ $clientCode = <<<'CODE'
$client = stream_socket_client("tlsv1.1://127.0.0.1:64321", $errno, $errstr, 3, $flags, $ctx);
var_dump($client);
-
+
$client = @stream_socket_client("sslv3://127.0.0.1:64321", $errno, $errstr, 3, $flags, $ctx);
var_dump($client);
-
+
$client = @stream_socket_client("tlsv1.2://127.0.0.1:64321", $errno, $errstr, 3, $flags, $ctx);
var_dump($client);
CODE;
diff --git a/ext/openssl/tests/tlsv1.2_wrapper.phpt b/ext/openssl/tests/tlsv1.2_wrapper.phpt
index 3d7b3ba26c..30e9e00ac7 100644
--- a/ext/openssl/tests/tlsv1.2_wrapper.phpt
+++ b/ext/openssl/tests/tlsv1.2_wrapper.phpt
@@ -1,7 +1,7 @@
--TEST--
tlsv1.2 stream wrapper
--SKIPIF--
-<?php
+<?php
if (!extension_loaded("openssl")) die("skip openssl not loaded");
if (!function_exists("proc_open")) die("skip no proc_open");
?>
@@ -32,10 +32,10 @@ $clientCode = <<<'CODE'
$client = stream_socket_client("tlsv1.2://127.0.0.1:64321", $errno, $errstr, 3, $flags, $ctx);
var_dump($client);
-
+
$client = @stream_socket_client("sslv3://127.0.0.1:64321", $errno, $errstr, 3, $flags, $ctx);
var_dump($client);
-
+
$client = @stream_socket_client("tlsv1.1://127.0.0.1:64321", $errno, $errstr, 3, $flags, $ctx);
var_dump($client);
CODE;