Commit:    a2098ca9eb0176a18cfdbf3b5b597f461d21ad8a
Author:    ULF WENDEL <u...@php.net>         Sat, 29 Sep 2012 09:47:23 +0200
Parents:   7a7b2a06420138d0e0f18a898cb36d007196a922
Branches:  master

Link:       
http://git.php.net/?p=php-src.git;a=commitdiff;h=a2098ca9eb0176a18cfdbf3b5b597f461d21ad8a

Log:
SHA256 authentication tests

Changed paths:
  A  ext/mysqli/tests/mysqli_pam_sha256.phpt
  A  ext/mysqli/tests/mysqli_pam_sha256_public_key_ini.phpt
  A  ext/mysqli/tests/mysqli_pam_sha256_public_key_option.phpt
  A  ext/mysqli/tests/mysqli_pam_sha256_public_key_option_invalid.phpt

diff --git a/ext/mysqli/tests/mysqli_pam_sha256.phpt 
b/ext/mysqli/tests/mysqli_pam_sha256.phpt
new file mode 100644
index 0000000..3016e20
--- /dev/null
+++ b/ext/mysqli/tests/mysqli_pam_sha256.phpt
@@ -0,0 +1,113 @@
+--TEST--
+PAM: SHA-256
+--SKIPIF--
+<?php
+require_once('skipif.inc');
+require_once('skipifemb.inc');
+require_once('skipifconnectfailure.inc');
+
+ob_start();
+phpinfo(INFO_MODULES);
+$tmp = ob_get_contents();
+ob_end_clean();
+if (!stristr($tmp, "auth_plugin_sha256_password"))
+       die("skip SHA256 auth plugin not built-in to mysqlnd");
+
+require_once('connect.inc');
+if (!$link = my_mysqli_connect($host, $user, $passwd, $db, $port, $socket))
+               die(printf("skip: [%d] %s\n", mysqli_connect_errno(), 
mysqli_connect_error()));
+
+if (mysqli_get_server_version($link) < 50606)
+       die("skip: SHA-256 requires MySQL 5.6.6+");
+
+if (!($res = $link->query("SHOW PLUGINS"))) {
+       die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
+}
+
+$found = false;
+while ($row = $res->fetch_assoc()) {
+       if (($row['Name'] == 'sha256_password') && ($row['Status'] == 
'ACTIVE')) {
+               $found = true;
+               break;
+       }
+}
+if (!$found)
+       die("skip SHA-256 server plugin unavailable");
+
+if (!($res = $link->query("SHOW STATUS LIKE 'Rsa_public_key'"))) {
+       die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
+}
+
+if (!($row = $res->fetch_assoc())) {
+       die(sprintf("skip Failed to check RSA pub key, [%d] %s\n", 
$link->errno, $link->error));
+}
+
+if (strlen($row['Value']) < 100) {
+       die(sprintf("skip Server misconfiguration? RSA pub key is suspicious, 
[%d] %s\n", $link->errno, $link->error));
+}
+
+if (!$link->query("SET @@session.old_passwords=2")) {
+       die(sprintf("skip Cannot set @@session.old_passwords=2 [%d] %s", 
$link->errno, $link->error));
+}
+
+$link->query('DROP USER shatest');
+$link->query("DROP USER shatest@localhost");
+
+
+if (!$link->query('CREATE USER shatest@"%" IDENTIFIED WITH sha256_password') ||
+       !$link->query('CREATE USER shatest@"localhost" IDENTIFIED WITH 
sha256_password')) {
+       die(sprintf("skip CREATE USER failed [%d] %s", $link->errno, 
$link->error));
+}
+
+if (!$link->query('SET PASSWORD FOR shatest@"%" = PASSWORD("shatest")') ||
+       !$link->query('SET PASSWORD FOR shatest@"localhost" = 
PASSWORD("shatest")')) {
+       die(sprintf("skip SET PASSWORD failed [%d] %s", $link->errno, 
$link->error));
+}
+
+if (!$link->query("DROP TABLE IF EXISTS test") ||
+       !$link->query("CREATE TABLE test (id INT)") ||
+       !$link->query("INSERT INTO test(id) VALUES (1), (2), (3)"))
+       die(sprintf("SKIP [%d] %s\n", $link->errno, $link->error));
+
+
+if (!$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO shatest@'%%'", 
$db)) ||
+       !$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO 
shatest@'localhost'", $db))) {
+       die(sprintf("skip Cannot grant SELECT to user [%d] %s", 
mysqli_errno($link), mysqli_error($link)));
+}
+
+$link->close();
+?>
+--FILE--
+<?php
+       require_once("connect.inc");
+
+       if (!$link = my_mysqli_connect($host, 'shatest', 'shatest', $db, $port, 
$socket)) {
+               printf("[001] Cannot connect to the server using host=%s, 
user=%s, passwd=***, dbname=%s, port=%s, socket=%s\n",
+                       $host, "shatest", $db, $port, $socket);
+       } else {
+
+         if (!$res = $link->query("SELECT id FROM test WHERE id = 1"))
+                 printf("[002] [%d] %s\n", $link->errno, $link->error);
+
+         if (!$row = mysqli_fetch_assoc($res)) {
+                 printf("[003] [%d] %s\n", $link->errno, $link->error);
+         }
+
+         if ($row['id'] != 1) {
+                 printf("[004] Expecting 1 got %s/'%s'", gettype($row['id']), 
$row['id']);
+         }
+
+         $res->close();
+         $link->close();
+       }
+
+       print "done!";
+?>
+--CLEAN--
+<?php
+       require_once("clean_table.inc");
+       $link->query('DROP USER shatest');
+       $link->query('DROP USER shatest@localhost');
+?>
+--EXPECTF--
+done!
\ No newline at end of file
diff --git a/ext/mysqli/tests/mysqli_pam_sha256_public_key_ini.phpt 
b/ext/mysqli/tests/mysqli_pam_sha256_public_key_ini.phpt
new file mode 100644
index 0000000..27bbed1
--- /dev/null
+++ b/ext/mysqli/tests/mysqli_pam_sha256_public_key_ini.phpt
@@ -0,0 +1,129 @@
+--TEST--
+PAM: SHA-256, mysqlnd.sha256_server_public_key
+--SKIPIF--
+<?php
+require_once('skipif.inc');
+require_once('skipifemb.inc');
+require_once('skipifconnectfailure.inc');
+
+ob_start();
+phpinfo(INFO_MODULES);
+$tmp = ob_get_contents();
+ob_end_clean();
+if (!stristr($tmp, "auth_plugin_sha256_password"))
+       die("skip SHA256 auth plugin not built-in to mysqlnd");
+
+require_once('connect.inc');
+if (!$link = my_mysqli_connect($host, $user, $passwd, $db, $port, $socket))
+               die(printf("skip: [%d] %s\n", mysqli_connect_errno(), 
mysqli_connect_error()));
+
+if (mysqli_get_server_version($link) < 50606)
+       die("skip: SHA-256 requires MySQL 5.6.6+");
+
+if (!($res = $link->query("SHOW PLUGINS"))) {
+       die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
+}
+
+$found = false;
+while ($row = $res->fetch_assoc()) {
+       if (($row['Name'] == 'sha256_password') && ($row['Status'] == 
'ACTIVE')) {
+               $found = true;
+               break;
+       }
+}
+if (!$found)
+       die("skip SHA-256 server plugin unavailable");
+
+if (!($res = $link->query("SHOW STATUS LIKE 'Rsa_public_key'"))) {
+       die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
+}
+
+if (!($row = $res->fetch_assoc())) {
+       die(sprintf("skip Failed to check RSA pub key, [%d] %s\n", 
$link->errno, $link->error));
+}
+
+$key = $row['Value'];
+if (strlen($key) < 100) {
+       die(sprintf("skip Server misconfiguration? RSA pub key is suspicious, 
[%d] %s\n", $link->errno, $link->error));
+}
+
+/* date changes may give false positive */
+$file = "test_sha256_ini";
+if ((file_exists($file) && !unlink($file)) || !($fp = @fopen($file, "w"))) {
+       die(sprintf("skip Cannot create RSA pub key file '%s'", $file));
+}
+$key = str_replace("A", "a", $key);
+$key = str_replace("M", "m", $key);
+if (strlen($key) != fwrite($fp, $key)) {
+       die(sprintf("skip Failed to create pub key file"));
+}
+
+
+if (!$link->query("SET @@session.old_passwords=2")) {
+       die(sprintf("skip Cannot set @@session.old_passwords=2 [%d] %s", 
$link->errno, $link->error));
+}
+
+$link->query('DROP USER shatest');
+$link->query("DROP USER shatest@localhost");
+
+
+if (!$link->query('CREATE USER shatest@"%" IDENTIFIED WITH sha256_password') ||
+       !$link->query('CREATE USER shatest@"localhost" IDENTIFIED WITH 
sha256_password')) {
+       die(sprintf("skip CREATE USER failed [%d] %s", $link->errno, 
$link->error));
+}
+
+if (!$link->query('SET PASSWORD FOR shatest@"%" = PASSWORD("shatest")') ||
+       !$link->query('SET PASSWORD FOR shatest@"localhost" = 
PASSWORD("shatest")')) {
+       die(sprintf("skip SET PASSWORD failed [%d] %s", $link->errno, 
$link->error));
+}
+
+if (!$link->query("DROP TABLE IF EXISTS test") ||
+       !$link->query("CREATE TABLE test (id INT)") ||
+       !$link->query("INSERT INTO test(id) VALUES (1), (2), (3)"))
+       die(sprintf("SKIP [%d] %s\n", $link->errno, $link->error));
+
+
+if (!$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO shatest@'%%'", 
$db)) ||
+       !$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO 
shatest@'localhost'", $db))) {
+       die(sprintf("skip Cannot grant SELECT to user [%d] %s", 
mysqli_errno($link), mysqli_error($link)));
+}
+
+$link->close();
+?>
+--INI--
+mysqlnd.sha256_server_public_key="test_sha256_ini"
+--FILE--
+<?php
+       require_once("connect.inc");
+
+
+       $link = new mysqli($host, 'shatest', 'shatest', $db, $port, $socket);
+       if ($link->connect_errno) {
+               printf("[001] [%d] %s\n", $link->connect_errno, 
$link->connect_error);
+       } else {
+               if (!$res = $link->query("SELECT id FROM test WHERE id = 1"))
+                       printf("[002] [%d] %s\n", $link->errno, $link->error);
+
+               if (!$row = mysqli_fetch_assoc($res)) {
+                       printf("[003] [%d] %s\n", $link->errno, $link->error);
+               }
+
+               if ($row['id'] != 1) {
+                       printf("[004] Expecting 1 got %s/'%s'", 
gettype($row['id']), $row['id']);
+               }
+       }
+       print "done!";
+?>
+--CLEAN--
+<?php
+       require_once("clean_table.inc");
+       $link->query('DROP USER shatest');
+       $link->query('DROP USER shatest@localhost');
+       $file = "test_sha256_ini";
+       @unlink($file);
+?>
+--EXPECTF--
+
+Warning: mysqli::mysqli(): (HY000/1045): %s in %s on line %d
+[001] [1045] %s
+done!
\ No newline at end of file
diff --git a/ext/mysqli/tests/mysqli_pam_sha256_public_key_option.phpt 
b/ext/mysqli/tests/mysqli_pam_sha256_public_key_option.phpt
new file mode 100644
index 0000000..afed773
--- /dev/null
+++ b/ext/mysqli/tests/mysqli_pam_sha256_public_key_option.phpt
@@ -0,0 +1,132 @@
+--TEST--
+PAM: SHA-256, option: MYSQLI_SERVER_PUBLIC_KEY
+--SKIPIF--
+<?php
+require_once('skipif.inc');
+require_once('skipifemb.inc');
+require_once('skipifconnectfailure.inc');
+
+ob_start();
+phpinfo(INFO_MODULES);
+$tmp = ob_get_contents();
+ob_end_clean();
+if (!stristr($tmp, "auth_plugin_sha256_password"))
+       die("skip SHA256 auth plugin not built-in to mysqlnd");
+
+require_once('connect.inc');
+if (!$link = my_mysqli_connect($host, $user, $passwd, $db, $port, $socket))
+               die(printf("skip: [%d] %s\n", mysqli_connect_errno(), 
mysqli_connect_error()));
+
+if (mysqli_get_server_version($link) < 50606)
+       die("skip: SHA-256 requires MySQL 5.6.6+");
+
+if (!($res = $link->query("SHOW PLUGINS"))) {
+       die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
+}
+
+$found = false;
+while ($row = $res->fetch_assoc()) {
+       if (($row['Name'] == 'sha256_password') && ($row['Status'] == 
'ACTIVE')) {
+               $found = true;
+               break;
+       }
+}
+if (!$found)
+       die("skip SHA-256 server plugin unavailable");
+
+if (!($res = $link->query("SHOW STATUS LIKE 'Rsa_public_key'"))) {
+       die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
+}
+
+if (!($row = $res->fetch_assoc())) {
+       die(sprintf("skip Failed to check RSA pub key, [%d] %s\n", 
$link->errno, $link->error));
+}
+
+if (strlen($row['Value']) < 100) {
+       die(sprintf("skip Server misconfiguration? RSA pub key is suspicious, 
[%d] %s\n", $link->errno, $link->error));
+}
+
+/* date changes may give false positive */
+$file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, 
"test_sha256_" , @date("Ymd"));
+if ((file_exists($file) && !unlink($file)) || !($fp = @fopen($file, "w"))) {
+       die(sprintf("skip Cannot create RSA pub key file '%s'", $file));
+}
+if (strlen($row['Value']) != fwrite($fp, $row['Value'])) {
+       die(sprintf("skip Failed to create pub key file"));
+}
+
+
+if (!$link->query("SET @@session.old_passwords=2")) {
+       die(sprintf("skip Cannot set @@session.old_passwords=2 [%d] %s", 
$link->errno, $link->error));
+}
+
+$link->query('DROP USER shatest');
+$link->query("DROP USER shatest@localhost");
+
+
+if (!$link->query('CREATE USER shatest@"%" IDENTIFIED WITH sha256_password') ||
+       !$link->query('CREATE USER shatest@"localhost" IDENTIFIED WITH 
sha256_password')) {
+       die(sprintf("skip CREATE USER failed [%d] %s", $link->errno, 
$link->error));
+}
+
+if (!$link->query('SET PASSWORD FOR shatest@"%" = PASSWORD("shatest")') ||
+       !$link->query('SET PASSWORD FOR shatest@"localhost" = 
PASSWORD("shatest")')) {
+       die(sprintf("skip SET PASSWORD failed [%d] %s", $link->errno, 
$link->error));
+}
+
+if (!$link->query("DROP TABLE IF EXISTS test") ||
+       !$link->query("CREATE TABLE test (id INT)") ||
+       !$link->query("INSERT INTO test(id) VALUES (1), (2), (3)"))
+       die(sprintf("SKIP [%d] %s\n", $link->errno, $link->error));
+
+
+if (!$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO shatest@'%%'", 
$db)) ||
+       !$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO 
shatest@'localhost'", $db))) {
+       die(sprintf("skip Cannot grant SELECT to user [%d] %s", 
mysqli_errno($link), mysqli_error($link)));
+}
+
+$link->close();
+?>
+--FILE--
+<?php
+       require_once("connect.inc");
+
+       $file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, 
"test_sha256_" , @date("Ymd"));
+       if (file_exists($file) && is_readable($file)) {
+
+               $link = mysqli_init();
+               if (!($link->options(MYSQLI_SERVER_PUBLIC_KEY, $file))) {
+                       printf("[001] mysqli_options failed, [%d] %s\n", 
$link->errno, $link->error);
+               }
+
+               if (!$link->real_connect($host, 'shatest', 'shatest', $db, 
$port, $socket)) {
+                       printf("[002] [%d] %s\n", $link->connect_errno, 
$link->connect_error);
+               }
+
+               if (!$res = $link->query("SELECT id FROM test WHERE id = 1"))
+                       printf("[003] [%d] %s\n", $link->errno, $link->error);
+
+               if (!$row = mysqli_fetch_assoc($res)) {
+                       printf("[004] [%d] %s\n", $link->errno, $link->error);
+               }
+
+               if ($row['id'] != 1) {
+                       printf("[005] Expecting 1 got %s/'%s'", 
gettype($row['id']), $row['id']);
+               }
+
+               $res->close();
+               $link->close();
+       }
+
+       print "done!";
+?>
+--CLEAN--
+<?php
+       require_once("clean_table.inc");
+       $link->query('DROP USER shatest');
+       $link->query('DROP USER shatest@localhost');
+       $file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, 
"test_sha256_" , @date("Ymd"));
+       @unlink($file);
+?>
+--EXPECTF--
+done!
\ No newline at end of file
diff --git a/ext/mysqli/tests/mysqli_pam_sha256_public_key_option_invalid.phpt 
b/ext/mysqli/tests/mysqli_pam_sha256_public_key_option_invalid.phpt
new file mode 100644
index 0000000..960f08a
--- /dev/null
+++ b/ext/mysqli/tests/mysqli_pam_sha256_public_key_option_invalid.phpt
@@ -0,0 +1,186 @@
+--TEST--
+PAM: SHA-256, option: MYSQLI_SERVER_PUBLIC_KEY (invalid)
+--SKIPIF--
+<?php
+require_once('skipif.inc');
+require_once('skipifemb.inc');
+require_once('skipifconnectfailure.inc');
+
+ob_start();
+phpinfo(INFO_MODULES);
+$tmp = ob_get_contents();
+ob_end_clean();
+if (!stristr($tmp, "auth_plugin_sha256_password"))
+       die("skip SHA256 auth plugin not built-in to mysqlnd");
+
+require_once('connect.inc');
+if (!$link = my_mysqli_connect($host, $user, $passwd, $db, $port, $socket))
+               die(printf("skip: [%d] %s\n", mysqli_connect_errno(), 
mysqli_connect_error()));
+
+if (mysqli_get_server_version($link) < 50606)
+       die("skip: SHA-256 requires MySQL 5.6.6+");
+
+if (!($res = $link->query("SHOW PLUGINS"))) {
+       die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
+}
+
+$found = false;
+while ($row = $res->fetch_assoc()) {
+       if (($row['Name'] == 'sha256_password') && ($row['Status'] == 
'ACTIVE')) {
+               $found = true;
+               break;
+       }
+}
+if (!$found)
+       die("skip SHA-256 server plugin unavailable");
+
+if (!($res = $link->query("SHOW STATUS LIKE 'Rsa_public_key'"))) {
+       die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
+}
+
+if (!($row = $res->fetch_assoc())) {
+       die(sprintf("skip Failed to check RSA pub key, [%d] %s\n", 
$link->errno, $link->error));
+}
+
+if (strlen($row['Value']) < 100) {
+       die(sprintf("skip Server misconfiguration? RSA pub key is suspicious, 
[%d] %s\n", $link->errno, $link->error));
+}
+
+/* date changes may give false positive */
+$file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, 
"test_sha256_" , @date("Ymd"));
+if ((file_exists($file) && !unlink($file)) || !($fp = @fopen($file, "w"))) {
+       die(sprintf("skip Cannot create RSA pub key file '%s'", $file));
+}
+if (strlen($row['Value']) != fwrite($fp, $row['Value'])) {
+       die(sprintf("skip Failed to create pub key file"));
+}
+
+
+if (!$link->query("SET @@session.old_passwords=2")) {
+       die(sprintf("skip Cannot set @@session.old_passwords=2 [%d] %s", 
$link->errno, $link->error));
+}
+
+$link->query('DROP USER shatest');
+$link->query("DROP USER shatest@localhost");
+
+
+if (!$link->query('CREATE USER shatest@"%" IDENTIFIED WITH sha256_password') ||
+       !$link->query('CREATE USER shatest@"localhost" IDENTIFIED WITH 
sha256_password')) {
+       die(sprintf("skip CREATE USER failed [%d] %s", $link->errno, 
$link->error));
+}
+
+if (!$link->query('SET PASSWORD FOR shatest@"%" = PASSWORD("shatest")') ||
+       !$link->query('SET PASSWORD FOR shatest@"localhost" = 
PASSWORD("shatest")')) {
+       die(sprintf("skip SET PASSWORD failed [%d] %s", $link->errno, 
$link->error));
+}
+
+if (!$link->query("DROP TABLE IF EXISTS test") ||
+       !$link->query("CREATE TABLE test (id INT)") ||
+       !$link->query("INSERT INTO test(id) VALUES (1), (2), (3)"))
+       die(sprintf("SKIP [%d] %s\n", $link->errno, $link->error));
+
+
+if (!$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO shatest@'%%'", 
$db)) ||
+       !$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO 
shatest@'localhost'", $db))) {
+       die(sprintf("skip Cannot grant SELECT to user [%d] %s", 
mysqli_errno($link), mysqli_error($link)));
+}
+
+$link->close();
+?>
+--FILE--
+<?php
+       require_once("connect.inc");
+
+       function sha_connect($offset, $host, $db, $port, $socket, $file) {
+
+               $link = mysqli_init();
+               if (!($link->options(MYSQLI_SERVER_PUBLIC_KEY, $file))) {
+                       printf("[%03d + 001] mysqli_options failed, [%d] %s\n", 
$offset, $link->errno, $link->error);
+                       return false;
+               }
+
+               if (!$link->real_connect($host, 'shatest', 'shatest', $db, 
$port, $socket)) {
+                       printf("[%03d + 002] [%d] %s\n", $offset, 
$link->connect_errno, $link->connect_error);
+                       return false;
+               }
+
+               if (!$res = $link->query("SELECT id FROM test WHERE id = 1"))
+                       printf("[%03d + 003] [%d] %s\n", $offset, $link->errno, 
$link->error);
+                       return false;
+
+               if (!$row = mysqli_fetch_assoc($res)) {
+                       printf("[%03d + 004] [%d] %s\n", $offset, $link->errno, 
$link->error);
+                       return false;
+               }
+
+               if ($row['id'] != 1) {
+                       printf("[%03d + 005] Expecting 1 got %s/'%s'", $offset, 
gettype($row['id']), $row['id']);
+                       return false;
+               }
+
+               $res->close();
+               $link->close();
+               return true;
+       }
+
+       $file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, 
"test_sha256_" , @date("Ymd"));
+       if (file_exists($file) && is_readable($file)) {
+
+               /* valid key */
+               sha_connect(100, $host, $db, $port, $socket, $file);
+
+               /* invalid key */
+               $file_wrong = sprintf("%s%s%s_%s", sys_get_temp_dir(), 
DIRECTORY_SEPARATOR, "test_sha256_wrong" , @date("Ymd"));
+
+               $key = file_get_contents($file);
+               $key = str_replace("A", "a", $key);
+               $key = str_replace("M", "m", $key);
+               @unlink($file_wrong);
+               if (!($fp = fopen($file_wrong, "w"))) {
+                       printf("[002] Can't write public key file.");
+               } else {
+                       fwrite($fp, $key);
+                       fclose($fp);
+                       sha_connect(200, $host, $db, $port, $socket, 
$file_wrong);
+               }
+
+               /* empty file */
+               @unlink($file_wrong);
+               if (!($fp = fopen($file_wrong, "w"))) {
+                       printf("[003] Can't write public key file.");
+               } else {
+                       fwrite($fp, "");
+                       fclose($fp);
+                       sha_connect(300, $host, $db, $port, $socket, 
$file_wrong);
+               }
+
+               /* file does not exist */
+               @unlink($file_wrong);
+               sha_connect(400, $host, $db, $port, $socket, $file_wrong);
+
+       } else {
+               printf("[001] Cannot read public key file.");
+       }
+
+       print "done!";
+?>
+--CLEAN--
+<?php
+       require_once("clean_table.inc");
+       $link->query('DROP USER shatest');
+       $link->query('DROP USER shatest@localhost');
+       $file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, 
"test_sha256_" , @date("Ymd"));
+       @unlink($file);
+       $file_wrong = sprintf("%s%s%s_%s", sys_get_temp_dir(), 
DIRECTORY_SEPARATOR, "test_sha256_wrong" , @date("Ymd"));
+       @unlink($file_wrong);
+?>
+--EXPECTF--
+Warning: mysqli::real_connect(): (HY000/1045): %s in %s on line %d
+[200 + 002] [1045] %s
+
+Warning: mysqli::real_connect(): (HY000/1045): %s in %s on line %d
+[300 + 002] [1045] %s
+
+Warning: mysqli::real_connect(%sest_sha256_wrong_%d): failed to open stream: 
No such file or directory in %s on line %d
+[400 + 002] [1045] %s
+done!
\ No newline at end of file
-- 
PHP CVS Mailing List (http://www.php.net/)
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to