blob: 3d091e8d897032158f29bc11ff6738af86efaacf [file] [log] [blame]
Andrey Andreev912831f2014-02-04 17:21:37 +02001<?php
2
3class Encryption_test extends CI_TestCase {
4
5 public function set_up()
6 {
Andrey Andreev50ccc382014-02-04 23:30:06 +02007 $this->ci_set_config('encryption_key', "\xd0\xc9\x08\xc4\xde\x52\x12\x6e\xf8\xcc\xdb\x03\xea\xa0\x3a\x5c");
Andrey Andreev912831f2014-02-04 17:21:37 +02008 $this->encryption = new CI_Encryption();
9 $this->ci_instance_var('encryption', $this->encryption);
10 }
11
12 // --------------------------------------------------------------------
13
Andrey Andreev50ccc382014-02-04 23:30:06 +020014 public function test_portability()
15 {
16 if ( ! $this->encryption->drivers['mcrypt'] OR ! $this->encryption->drivers['openssl'])
17 {
18 $this->markTestAsSkipped('Both MCrypt and OpenSSL support are required for portability tests.');
19 return;
20 }
21
22 $message = 'This is a message encrypted via MCrypt and decrypted via OpenSSL, or vice-versa.';
23
24 // As it turns out, only ciphers that happened to be a US standard have a
25 // somewhat consistent implementation between MCrypt and OpenSSL, so
26 // we can only test AES, DES and TripleDES.
27 //
28 // Format is: <MCrypt cipher name>, <OpenSSL cipher name>, <key size>
29 $portable = array(
30 array('rijndael-128', 'aes-128', 16),
31 array('rijndael-128', 'aes-192', 24),
32 array('rijndael-128', 'aes-256', 32),
33 array('des', 'des', 7),
34 array('tripledes', 'des-ede3', 7),
35 array('tripledes', 'des-ede3', 14),
36 array('tripledes', 'des-ede3', 21)
37 );
38 $driver_index = array('mcrypt', 'openssl');
39
40 foreach ($portable as &$test)
41 {
42 // Add some randomness to the selected driver
43 $driver = mt_rand(0,1);
44 $params = array(
45 'cipher' => $test[$driver],
46 'mode' => 'cbc',
47 'key' => openssl_random_pseudo_bytes($test[2])
48 );
49
50 $this->encryption->initialize(array('driver' => $driver_index[$driver]));
51 $ciphertext = $this->encryption->encrypt($message, $params);
52
53 $driver = (int) ! $driver;
54 $params['cipher'] = $test[$driver];
55
56 $this->encryption->initialize(array('driver' => $driver_index[$driver]));
57 $this->assertEquals($message, $this->encryption->decrypt($ciphertext, $params));
58 }
59 }
60
61 // --------------------------------------------------------------------
62
Andrey Andreev912831f2014-02-04 17:21:37 +020063 public function test_hkdf()
64 {
65 // Test vectors are described in RFC5869, Appendix A(1-3).
66 // Vectors 4-7 cover SHA-1, which we don't support.
67 //
68 // URL: https://tools.ietf.org/rfc/rfc5869.txt
69 //
70 // Our implementation doesn't split into hkdf_extract(), hkdf_expand()
71 // and therefore we can't test for the PRK value (it is included below
72 // just for consistency, hence why it's also commented out).
73 //
74 // As long as OKM is correct, then we're all fine though.
75 $vectors = array(
76 // Appendix A.1: Basic test case with SHA-256
77 array(
78 'digest' => 'sha256',
79 'ikm' => "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b",
80 'salt' => "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c",
81 'length' => 42,
82 'info' => "\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9",
83// 'prk' => "\x07\x77\x09\x36\x2c\x2e\x32\xdf\x0d\xdc\x3f\x0d\xc4\x7b\xba\x63\x90\xb6\xc7\x3b\xb5\x0f\x9c\x31\x22\xec\x84\x4a\xd7\xc2\xb3\xe5",
84 'okm' => "\x3c\xb2\x5f\x25\xfa\xac\xd5\x7a\x90\x43\x4f\x64\xd0\x36\x2f\x2a\x2d\x2d\x0a\x90\xcf\x1a\x5a\x4c\x5d\xb0\x2d\x56\xec\xc4\xc5\xbf\x34\x00\x72\x08\xd5\xb8\x87\x18\x58\x65"
85 ),
86 // Appendix A.2: Test with SHA-256 and longer inputs/outputs
87 array(
88 'digest' => 'sha256',
89 'ikm' => "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20\x21\x22\x23\x24\x25\x26\x27\x28\x29\x2a\x2b\x2c\x2d\x2e\x2f\x30\x31\x32\x33\x34\x35\x36\x37\x38\x39\x3a\x3b\x3c\x3d\x3e\x3f\x40\x41\x42\x43\x44\x45\x46\x47\x48\x49\x4a\x4b\x4c\x4d\x4e\x4f",
90 'salt' => "\x60\x61\x62\x63\x64\x65\x66\x67\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70\x71\x72\x73\x74\x75\x76\x77\x78\x79\x7a\x7b\x7c\x7d\x7e\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7\xa8\xa9\xaa\xab\xac\xad\xae\xaf",
91 'length' => 82,
92 'info' => "\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7\xb8\xb9\xba\xbb\xbc\xbd\xbe\xbf\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7\xc8\xc9\xca\xcb\xcc\xcd\xce\xcf\xd0\xd1\xd2\xd3\xd4\xd5\xd6\xd7\xd8\xd9\xda\xdb\xdc\xdd\xde\xdf\xe0\xe1\xe2\xe3\xe4\xe5\xe6\xe7\xe8\xe9\xea\xeb\xec\xed\xee\xef\xf0\xf1\xf2\xf3\xf4\xf5\xf6\xf7\xf8\xf9\xfa\xfb\xfc\xfd\xfe\xff",
93// 'prk' => "\x06\xa6\xb8\x8c\x58\x53\x36\x1a\x06\x10\x4c\x9c\xeb\x35\xb4\x5c\xef\x76\x00\x14\x90\x46\x71\x01\x4a\x19\x3f\x40\xc1\x5f\xc2\x44",
94 'okm' => "\xb1\x1e\x39\x8d\xc8\x03\x27\xa1\xc8\xe7\xf7\x8c\x59\x6a\x49\x34\x4f\x01\x2e\xda\x2d\x4e\xfa\xd8\xa0\x50\xcc\x4c\x19\xaf\xa9\x7c\x59\x04\x5a\x99\xca\xc7\x82\x72\x71\xcb\x41\xc6\x5e\x59\x0e\x09\xda\x32\x75\x60\x0c\x2f\x09\xb8\x36\x77\x93\xa9\xac\xa3\xdb\x71\xcc\x30\xc5\x81\x79\xec\x3e\x87\xc1\x4c\x01\xd5\xc1\xf3\x43\x4f\x1d\x87",
95 ),
96 // Appendix A.3: Test with SHA-256 and zero-length salt/info
97 array(
98 'digest' => 'sha256',
99 'ikm' => "\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b\x0b",
100 'salt' => "",
101 'length' => 42,
102 'info' => "",
103// 'prk' => "\x19\xef\x24\xa3\x2c\x71\x7b\x16\x7f\x33\xa9\x1d\x6f\x64\x8b\xdf\x96\x59\x67\x76\xaf\xdb\x63\x77\xac\x43\x4c\x1c\x29\x3c\xcb\x04",
104 'okm' => "\x8d\xa4\xe7\x75\xa5\x63\xc1\x8f\x71\x5f\x80\x2a\x06\x3c\x5a\x31\xb8\xa1\x1f\x5c\x5e\xe1\x87\x9e\xc3\x45\x4e\x5f\x3c\x73\x8d\x2d\x9d\x20\x13\x95\xfa\xa4\xb6\x1a\x96\xc8",
105 )
106 );
107
108 foreach ($vectors as $test)
109 {
110 $this->assertEquals(
111 $test['okm'],
112 $this->encryption->hkdf(
113 $test['ikm'],
114 $test['digest'],
115 $test['salt'],
116 $test['length'],
117 $test['info']
118 )
119 );
120 }
121
122 // Test default length, it must match the digest size
123 $this->assertEquals(64, strlen($this->encryption->hkdf('foobar', 'sha512')));
124
125 // Test maximum length (RFC5869 says that it must be up to 255 times the digest size)
126 $this->assertEquals(12240, strlen($this->encryption->hkdf('foobar', 'sha384', NULL, 48 * 255)));
127 $this->assertFalse($this->encryption->hkdf('foobar', 'sha224', NULL, 28 * 255 + 1));
128 }
129
130}