assertNotEmpty($hash); $this->assertNotEquals('test', $hash); $this->assertEquals($hash, _pacrypt_md5crypt('test', $hash)); } public function testCrypt() { // E_NOTICE if we pass in '' for the salt $hash = _pacrypt_crypt('test', 'sa'); $this->assertNotEmpty($hash); $this->assertNotEquals('test', $hash); $this->assertEquals($hash, _pacrypt_crypt('test', $hash)); } public function testMySQLEncrypt() { if (!db_mysql()) { $this->markTestSkipped('Not using MySQL'); } $hash = _pacrypt_mysql_encrypt('test1'); $hash2 = _pacrypt_mysql_encrypt('test2'); $this->assertNotEquals($hash, $hash2); $this->assertNotEmpty($hash); $this->assertNotEquals('test', $hash); $this->assertNotEquals('test', $hash2); $this->assertTrue( hash_equals($hash, _pacrypt_mysql_encrypt('test1', $hash) ), "hashes should equal...."); } public function testAuthlib() { global $CONF; // too many options! foreach ( [ 'md5raw' => '098f6bcd4621d373cade4e832627b4f6', 'md5' => 'CY9rzUYh03PK3k6DJie09g==', // crypt requires salt ... 'SHA' => 'qUqP5cyxm6YcTAhz05Hph5gvu9M=' ] as $flavour => $hash ) { $CONF['authlib_default_flavour'] = $flavour; $stored = "{" . $flavour . "}$hash"; $hash = _pacrypt_authlib('test', $stored); $this->assertEquals($hash, $stored, "Hash: $hash vs Stored: $stored"); //var_dump("Hash: $hash from $flavour"); } } public function testPacryptDovecot() { global $CONF; if (!file_exists('/usr/bin/doveadm')) { $this->markTestSkipped("No /usr/bin/doveadm"); } $CONF['encrypt'] = 'dovecot:SHA1'; $expected_hash = '{SHA1}qUqP5cyxm6YcTAhz05Hph5gvu9M='; $this->assertEquals($expected_hash, _pacrypt_dovecot('test', '')); $this->assertEquals($expected_hash, _pacrypt_dovecot('test', $expected_hash)); // This should also work. $sha512 = '{SHA512}ClAmHr0aOQ/tK/Mm8mc8FFWCpjQtUjIElz0CGTN/gWFqgGmwElh89WNfaSXxtWw2AjDBmyc1AO4BPgMGAb8kJQ=='; // foobar $this->assertEquals($sha512, _pacrypt_dovecot('foobar', $sha512)); $sha512 = '{SHA512}ClAmHr0aOQ/tK/Mm8mc8FFWCpjQtUjIElz0CGTN/gWFqgGmwElh89WNfaSXxtWw2AjDBmyc1AO4BPgMGAb8kJQ=='; // foobar $this->assertNotEquals($sha512, _pacrypt_dovecot('foobarbaz', $sha512)); } public function testPhpCrypt() { $config = Config::getInstance(); Config::write('encrypt', 'php_crypt:MD5'); $CONF = Config::getInstance()->getAll(); $expected = '$1$z2DG4z9d$jBu3Cl3BPQZrkNqnflnSO.'; $enc = _pacrypt_php_crypt('foo', $expected); $this->assertEquals($enc, $expected); $fail = _pacrypt_php_crypt('bar', $expected); } public function testPhpCryptHandlesPrefixAndOrRounds() { // try with 1000 rounds Config::write('encrypt', 'php_crypt:SHA256:1000'); $password = 'hello'; $randomHash = '$5$VhqhhsXJtPFeBX9e$kz3/CMIEu80bKdtDAcISIrDfdwtc.ilR68Vb3hNhu/7'; $randomHashWithPrefix = '{SHA256-CRYPT}' . $randomHash; $new = _pacrypt_php_crypt($password, ''); $this->assertNotEquals($randomHash, $new); // salts should be different. $enc = _pacrypt_php_crypt($password, $randomHash); $this->assertEquals($enc, $randomHash); $this->assertEquals($randomHash, _pacrypt_php_crypt("hello", $randomHash)); $this->assertEquals($randomHash, _pacrypt_crypt("hello", $randomHash)); Config::write('encrypt', 'php_crypt:SHA256::{SHA256-CRYPT}'); $enc = _pacrypt_php_crypt("hello", $randomHash); $this->assertEquals($randomHash, $enc); // we passed in something lacking the prefix, so we shouldn't have added it in. $this->assertTrue(hash_equals($randomHash, $enc)); // should cope with this : $enc = _pacrypt_php_crypt($password, ''); $this->assertEquals($enc, _pacrypt_php_crypt($password, $enc)); $this->assertRegExp('/^\{SHA256-CRYPT\}/', $enc); $this->assertGreaterThan(20, strlen($enc)); } public function testPhpCryptRandomString() { $str1 = _php_crypt_random_string('abcdefg123456789', 2); $str2 = _php_crypt_random_string('abcdefg123456789', 2); $str3 = _php_crypt_random_string('abcdefg123456789', 2); $this->assertNotEmpty($str1); $this->assertNotEmpty($str2); $this->assertNotEmpty($str3); // it should be difficult for us to get three salts of the same value back... // not impossible though. $this->assertFalse(strcmp($str1, $str2) == 0 && strcmp($str1, $str3) == 0); } public function testSha512B64() { $str1 = _pacrypt_sha512_b64('test', ''); $str2 = _pacrypt_sha512_b64('test', ''); $this->assertNotEmpty($str1); $this->assertNotEmpty($str2); $this->assertNotEquals($str1, $str2); // should have different salts $actualHash = '{SHA512-CRYPT.B64}JDYkM2NWcFM1WFNlUHl5MzdwSiRZWW80d0FmeWg5MXpxcS4uY3dtYUR1Y1RodTJGTDY1NHpXNUNvRU0wT3hXVFFzZkxIZ1JJSTZmT281OVpDUWJOTTF2L0JXajloME0vVjJNbENNMUdwLg=='; $check = _pacrypt_sha512_b64('test', $actualHash); $this->assertTrue(hash_equals($check, $actualHash)); $str3 = _pacrypt_sha512_b64('foo', ''); $this->assertNotEmpty($str3); $this->assertFalse(hash_equals('test', $str3)); $this->assertTrue(hash_equals(_pacrypt_sha512_b64('foo', $str3), $str3)); } }