123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172 |
- <?php
- class PaCryptTest extends \PHPUnit\Framework\TestCase {
- public function testMd5Crypt() {
- $hash = _pacrypt_md5crypt('test', '');
- $this->assertNotEmpty($hash);
- $this->assertNotEquals('test', $hash);
- $this->assertEquals($hash, _pacrypt_md5crypt('test', $hash));
- }
- public function testCrypt() {
- // E_NOTICE if we pass in '' for the salt
- $hash = _pacrypt_crypt('test', 'sa');
- $this->assertNotEmpty($hash);
- $this->assertNotEquals('test', $hash);
- $this->assertEquals($hash, _pacrypt_crypt('test', $hash));
- }
- public function testMySQLEncrypt() {
- if (!db_mysql()) {
- $this->markTestSkipped('Not using MySQL');
- }
- $hash = _pacrypt_mysql_encrypt('test1');
- $hash2 = _pacrypt_mysql_encrypt('test2');
- $this->assertNotEquals($hash, $hash2);
- $this->assertNotEmpty($hash);
- $this->assertNotEquals('test', $hash);
- $this->assertNotEquals('test', $hash2);
- $this->assertTrue( hash_equals($hash, _pacrypt_mysql_encrypt('test1', $hash) ), "hashes should equal....");
- }
- public function testAuthlib() {
- global $CONF;
- // too many options!
- foreach (
- [
- 'md5raw' => '098f6bcd4621d373cade4e832627b4f6',
- 'md5' => 'CY9rzUYh03PK3k6DJie09g==',
- // crypt requires salt ...
- 'SHA' => 'qUqP5cyxm6YcTAhz05Hph5gvu9M='
- ] as $flavour => $hash
- ) {
- $CONF['authlib_default_flavour'] = $flavour;
- $stored = "{" . $flavour . "}$hash";
- $hash = _pacrypt_authlib('test', $stored);
- $this->assertEquals($hash, $stored, "Hash: $hash vs Stored: $stored");
- //var_dump("Hash: $hash from $flavour");
- }
- }
- public function testPacryptDovecot() {
- global $CONF;
- if (!file_exists('/usr/bin/doveadm')) {
- $this->markTestSkipped("No /usr/bin/doveadm");
- }
- $CONF['encrypt'] = 'dovecot:SHA1';
- $expected_hash = '{SHA1}qUqP5cyxm6YcTAhz05Hph5gvu9M=';
- $this->assertEquals($expected_hash, _pacrypt_dovecot('test', ''));
- $this->assertEquals($expected_hash, _pacrypt_dovecot('test', $expected_hash));
- // This should also work.
- $sha512 = '{SHA512}ClAmHr0aOQ/tK/Mm8mc8FFWCpjQtUjIElz0CGTN/gWFqgGmwElh89WNfaSXxtWw2AjDBmyc1AO4BPgMGAb8kJQ=='; // foobar
- $this->assertEquals($sha512, _pacrypt_dovecot('foobar', $sha512));
- $sha512 = '{SHA512}ClAmHr0aOQ/tK/Mm8mc8FFWCpjQtUjIElz0CGTN/gWFqgGmwElh89WNfaSXxtWw2AjDBmyc1AO4BPgMGAb8kJQ=='; // foobar
- $this->assertNotEquals($sha512, _pacrypt_dovecot('foobarbaz', $sha512));
- }
- public function testPhpCrypt() {
- $config = Config::getInstance();
- Config::write('encrypt', 'php_crypt:MD5');
- $CONF = Config::getInstance()->getAll();
- $expected = '$1$z2DG4z9d$jBu3Cl3BPQZrkNqnflnSO.';
- $enc = _pacrypt_php_crypt('foo', $expected);
- $this->assertEquals($enc, $expected);
- $fail = _pacrypt_php_crypt('bar', $expected);
- }
- public function testPhpCryptHandlesPrefixAndOrRounds() {
- // try with 1000 rounds
- Config::write('encrypt', 'php_crypt:SHA256:1000');
- $password = 'hello';
- $randomHash = '$5$VhqhhsXJtPFeBX9e$kz3/CMIEu80bKdtDAcISIrDfdwtc.ilR68Vb3hNhu/7';
- $randomHashWithPrefix = '{SHA256-CRYPT}' . $randomHash;
- $new = _pacrypt_php_crypt($password, '');
- $this->assertNotEquals($randomHash, $new); // salts should be different.
- $enc = _pacrypt_php_crypt($password, $randomHash);
- $this->assertEquals($enc, $randomHash);
- $this->assertEquals($randomHash, _pacrypt_php_crypt("hello", $randomHash));
- $this->assertEquals($randomHash, _pacrypt_crypt("hello", $randomHash));
- Config::write('encrypt', 'php_crypt:SHA256::{SHA256-CRYPT}');
- $enc = _pacrypt_php_crypt("hello", $randomHash);
- $this->assertEquals($randomHash, $enc); // we passed in something lacking the prefix, so we shouldn't have added it in.
- $this->assertTrue(hash_equals($randomHash, $enc));
- // should cope with this :
- $enc = _pacrypt_php_crypt($password, '');
- $this->assertEquals($enc, _pacrypt_php_crypt($password, $enc));
- $this->assertRegExp('/^\{SHA256-CRYPT\}/', $enc);
- $this->assertGreaterThan(20, strlen($enc));
- }
- public function testPhpCryptRandomString() {
- $str1 = _php_crypt_random_string('abcdefg123456789', 2);
- $str2 = _php_crypt_random_string('abcdefg123456789', 2);
- $str3 = _php_crypt_random_string('abcdefg123456789', 2);
- $this->assertNotEmpty($str1);
- $this->assertNotEmpty($str2);
- $this->assertNotEmpty($str3);
- // it should be difficult for us to get three salts of the same value back...
- // not impossible though.
- $this->assertFalse(strcmp($str1, $str2) == 0 && strcmp($str1, $str3) == 0);
- }
- public function testSha512B64() {
- $str1 = _pacrypt_sha512_b64('test', '');
- $str2 = _pacrypt_sha512_b64('test', '');
- $this->assertNotEmpty($str1);
- $this->assertNotEmpty($str2);
- $this->assertNotEquals($str1, $str2); // should have different salts
- $actualHash = '{SHA512-CRYPT.B64}JDYkM2NWcFM1WFNlUHl5MzdwSiRZWW80d0FmeWg5MXpxcS4uY3dtYUR1Y1RodTJGTDY1NHpXNUNvRU0wT3hXVFFzZkxIZ1JJSTZmT281OVpDUWJOTTF2L0JXajloME0vVjJNbENNMUdwLg==';
- $check = _pacrypt_sha512_b64('test', $actualHash);
- $this->assertTrue(hash_equals($check, $actualHash));
- $str3 = _pacrypt_sha512_b64('foo', '');
- $this->assertNotEmpty($str3);
- $this->assertFalse(hash_equals('test', $str3));
- $this->assertTrue(hash_equals(_pacrypt_sha512_b64('foo', $str3), $str3));
- }
- }
|