EncryptTest.php 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709
  1. <?php
  2. /**
  3. * Tests the encrypt class
  4. *
  5. * @group kohana
  6. * @group kohana.core
  7. * @group kohana.core.encrypt
  8. *
  9. * @package Kohana
  10. * @category Tests
  11. * @author Kohana Team
  12. * @author Samuel Demirdjian <sam@enov.ws>
  13. * @copyright (c) Kohana Team
  14. * @license https://koseven.ga/LICENSE.md
  15. */
  16. class Kohana_EncryptTest extends Unittest_TestCase
  17. {
  18. /**
  19. * Prepare test, skip if extension not avaliable.
  20. */
  21. public function setUp()
  22. {
  23. parent::setUp();
  24. if ( ! extension_loaded('mcrypt')) {
  25. $this->markTestSkipped(
  26. 'The Mcrypt extension is not available.'
  27. );
  28. }
  29. }
  30. /**
  31. * Provider for test_encode
  32. * AES Multiblock Message Test (MMT) Sample Vectors - Known Answer Test (KAT)
  33. * @link http://csrc.nist.gov/groups/STM/cavp/index.html NIST - Cryptographic Algorithm Validation Program
  34. * @link http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesmmt.zip file used CBCMMT128.rsp
  35. *
  36. * @return array of $mode, $cipher, $key, $iv, $txt_plain, $txt_encoded
  37. */
  38. public function provider_encode()
  39. {
  40. return [
  41. [
  42. // mode
  43. MCRYPT_MODE_CBC,
  44. // cypher
  45. MCRYPT_RIJNDAEL_128,
  46. // key
  47. pack("H*", "1f8e4973953f3fb0bd6b16662e9a3c17"),
  48. // IV
  49. pack("H*", "2fe2b333ceda8f98f4a99b40d2cd34a8"),
  50. // txt_plain
  51. pack("H*", "45cf12964fc824ab76616ae2f4bf0822"),
  52. // txt_encoded
  53. pack("H*", "0f61c4d44c5147c03c195ad7e2cc12b2"),
  54. ],
  55. [
  56. // mode
  57. MCRYPT_MODE_CBC,
  58. // cypher
  59. MCRYPT_RIJNDAEL_128,
  60. // key
  61. pack("H*", "1f8e4973953f3fb0bd6b16662e9a3c17"),
  62. // IV
  63. pack("H*", "2fe2b333ceda8f98f4a99b40d2cd34a8"),
  64. // txt_plain
  65. pack("H*", "45cf12964fc824ab76616ae2f4bf0822"),
  66. // txt_encoded
  67. pack("H*", "0f61c4d44c5147c03c195ad7e2cc12b2"),
  68. ],
  69. [
  70. // mode
  71. MCRYPT_MODE_CBC,
  72. // cypher
  73. MCRYPT_RIJNDAEL_128,
  74. // key
  75. pack("H*", "0700d603a1c514e46b6191ba430a3a0c"),
  76. // IV
  77. pack("H*", "aad1583cd91365e3bb2f0c3430d065bb"),
  78. // txt_plain
  79. pack("H*", "068b25c7bfb1f8bdd4cfc908f69dffc5ddc726a197f0e5f720f730393279be91"),
  80. // txt_encoded
  81. pack("H*", "c4dc61d9725967a3020104a9738f23868527ce839aab1752fd8bdb95a82c4d00"),
  82. ],
  83. [
  84. // mode
  85. MCRYPT_MODE_CBC,
  86. // cypher
  87. MCRYPT_RIJNDAEL_128,
  88. // key
  89. pack("H*", "3348aa51e9a45c2dbe33ccc47f96e8de"),
  90. // IV
  91. pack("H*", "19153c673160df2b1d38c28060e59b96"),
  92. // txt_plain
  93. pack("H*", "9b7cee827a26575afdbb7c7a329f887238052e3601a7917456ba61251c214763d5e1847a6ad5d54127a399ab07ee3599"),
  94. // txt_encoded
  95. pack("H*", "d5aed6c9622ec451a15db12819952b6752501cf05cdbf8cda34a457726ded97818e1f127a28d72db5652749f0c6afee5"),
  96. ],
  97. [
  98. // mode
  99. MCRYPT_MODE_CBC,
  100. // cypher
  101. MCRYPT_RIJNDAEL_128,
  102. // key
  103. pack("H*", "b7f3c9576e12dd0db63e8f8fac2b9a39"),
  104. // IV
  105. pack("H*", "c80f095d8bb1a060699f7c19974a1aa0"),
  106. // txt_plain
  107. pack("H*", "9ac19954ce1319b354d3220460f71c1e373f1cd336240881160cfde46ebfed2e791e8d5a1a136ebd1dc469dec00c4187722b841cdabcb22c1be8a14657da200e"),
  108. // txt_encoded
  109. pack("H*", "19b9609772c63f338608bf6eb52ca10be65097f89c1e0905c42401fd47791ae2c5440b2d473116ca78bd9ff2fb6015cfd316524eae7dcb95ae738ebeae84a467"),
  110. ],
  111. [
  112. // mode
  113. MCRYPT_MODE_CBC,
  114. // cypher
  115. MCRYPT_RIJNDAEL_128,
  116. // key
  117. pack("H*", "b6f9afbfe5a1562bba1368fc72ac9d9c"),
  118. // IV
  119. pack("H*", "3f9d5ebe250ee7ce384b0d00ee849322"),
  120. // txt_plain
  121. pack("H*", "db397ec22718dbffb9c9d13de0efcd4611bf792be4fce0dc5f25d4f577ed8cdbd4eb9208d593dda3d4653954ab64f05676caa3ce9bfa795b08b67ceebc923fdc89a8c431188e9e482d8553982cf304d1"),
  122. // txt_encoded
  123. pack("H*", "10ea27b19e16b93af169c4a88e06e35c99d8b420980b058e34b4b8f132b13766f72728202b089f428fecdb41c79f8aa0d0ef68f5786481cca29e2126f69bc14160f1ae2187878ba5c49cf3961e1b7ee9"),
  124. ],
  125. [
  126. // mode
  127. MCRYPT_MODE_CBC,
  128. // cypher
  129. MCRYPT_RIJNDAEL_128,
  130. // key
  131. pack("H*", "bbe7b7ba07124ff1ae7c3416fe8b465e"),
  132. // IV
  133. pack("H*", "7f65b5ee3630bed6b84202d97fb97a1e"),
  134. // txt_plain
  135. pack("H*", "2aad0c2c4306568bad7447460fd3dac054346d26feddbc9abd9110914011b4794be2a9a00a519a51a5b5124014f4ed2735480db21b434e99a911bb0b60fe0253763725b628d5739a5117b7ee3aefafc5b4c1bf446467e7bf5f78f31ff7caf187"),
  136. // txt_encoded
  137. pack("H*", "3b8611bfc4973c5cd8e982b073b33184cd26110159172e44988eb5ff5661a1e16fad67258fcbfee55469267a12dc374893b4e3533d36f5634c3095583596f135aa8cd1138dc898bc5651ee35a92ebf89ab6aeb5366653bc60a70e0074fc11efe"),
  138. ],
  139. [
  140. // mode
  141. MCRYPT_MODE_CBC,
  142. // cypher
  143. MCRYPT_RIJNDAEL_128,
  144. // key
  145. pack("H*", "89a553730433f7e6d67d16d373bd5360"),
  146. // IV
  147. pack("H*", "f724558db3433a523f4e51a5bea70497"),
  148. // txt_plain
  149. pack("H*", "807bc4ea684eedcfdcca30180680b0f1ae2814f35f36d053c5aea6595a386c1442770f4d7297d8b91825ee7237241da8925dd594ccf676aecd46ca2068e8d37a3a0ec8a7d5185a201e663b5ff36ae197110188a23503763b8218826d23ced74b31e9f6e2d7fbfa6cb43420c7807a8625"),
  150. // txt_encoded
  151. pack("H*", "406af1429a478c3d07e555c5287a60500d37fc39b68e5bbb9bafd6ddb223828561d6171a308d5b1a4551e8a5e7d572918d25c968d3871848d2f16635caa9847f38590b1df58ab5efb985f2c66cfaf86f61b3f9c0afad6c963c49cee9b8bc81a2ddb06c967f325515a4849eec37ce721a"),
  152. ],
  153. [
  154. // mode
  155. MCRYPT_MODE_CBC,
  156. // cypher
  157. MCRYPT_RIJNDAEL_128,
  158. // key
  159. pack("H*", "c491ca31f91708458e29a925ec558d78"),
  160. // IV
  161. pack("H*", "9ef934946e5cd0ae97bd58532cb49381"),
  162. // txt_plain
  163. pack("H*", "cb6a787e0dec56f9a165957f81af336ca6b40785d9e94093c6190e5152649f882e874d79ac5e167bd2a74ce5ae088d2ee854f6539e0a94796b1e1bd4c9fcdbc79acbef4d01eeb89776d18af71ae2a4fc47dd66df6c4dbe1d1850e466549a47b636bcc7c2b3a62495b56bb67b6d455f1eebd9bfefecbca6c7f335cfce9b45cb9d"),
  164. // txt_encoded
  165. pack("H*", "7b2931f5855f717145e00f152a9f4794359b1ffcb3e55f594e33098b51c23a6c74a06c1d94fded7fd2ae42c7db7acaef5844cb33aeddc6852585ed0020a6699d2cb53809cefd169148ce42292afab063443978306c582c18b9ce0da3d084ce4d3c482cfd8fcf1a85084e89fb88b40a084d5e972466d07666126fb761f84078f2"),
  166. ],
  167. [
  168. // mode
  169. MCRYPT_MODE_CBC,
  170. // cypher
  171. MCRYPT_RIJNDAEL_128,
  172. // key
  173. pack("H*", "f6e87d71b0104d6eb06a68dc6a71f498"),
  174. // IV
  175. pack("H*", "1c245f26195b76ebebc2edcac412a2f8"),
  176. // txt_plain
  177. pack("H*", "f82bef3c73a6f7f80db285726d691db6bf55eec25a859d3ba0e0445f26b9bb3b16a3161ed1866e4dd8f2e5f8ecb4e46d74a7a78c20cdfc7bcc9e479ba7a0caba9438238ad0c01651d5d98de37f03ddce6e6b4bd4ab03cf9e8ed818aedfa1cf963b932067b97d776dce1087196e7e913f7448e38244509f0caf36bd8217e15336d35c149fd4e41707893fdb84014f8729"),
  178. // txt_encoded
  179. pack("H*", "b09512f3eff9ed0d85890983a73dadbb7c3678d52581be64a8a8fc586f490f2521297a478a0598040ebd0f5509fafb0969f9d9e600eaef33b1b93eed99687b167f89a5065aac439ce46f3b8d22d30865e64e45ef8cd30b6984353a844a11c8cd60dba0e8866b3ee30d24b3fa8a643b328353e06010fa8273c8fd54ef0a2b6930e5520aae5cd5902f9b86a33592ca4365"),
  180. ],
  181. [
  182. // mode
  183. MCRYPT_MODE_CBC,
  184. // cypher
  185. MCRYPT_RIJNDAEL_128,
  186. // key
  187. pack("H*", "2c14413751c31e2730570ba3361c786b"),
  188. // IV
  189. pack("H*", "1dbbeb2f19abb448af849796244a19d7"),
  190. // txt_plain
  191. pack("H*", "40d930f9a05334d9816fe204999c3f82a03f6a0457a8c475c94553d1d116693adc618049f0a769a2eed6a6cb14c0143ec5cccdbc8dec4ce560cfd206225709326d4de7948e54d603d01b12d7fed752fb23f1aa4494fbb00130e9ded4e77e37c079042d828040c325b1a5efd15fc842e44014ca4374bf38f3c3fc3ee327733b0c8aee1abcd055772f18dc04603f7b2c1ea69ff662361f2be0a171bbdcea1e5d3f"),
  192. // txt_encoded
  193. pack("H*", "6be8a12800455a320538853e0cba31bd2d80ea0c85164a4c5c261ae485417d93effe2ebc0d0a0b51d6ea18633d210cf63c0c4ddbc27607f2e81ed9113191ef86d56f3b99be6c415a4150299fb846ce7160b40b63baf1179d19275a2e83698376d28b92548c68e06e6d994e2c1501ed297014e702cdefee2f656447706009614d801de1caaf73f8b7fa56cf1ba94b631933bbe577624380850f117435a0355b2b"),
  194. ],
  195. ];
  196. }
  197. /**
  198. * @param string $mode
  199. * @param string $cipher
  200. * @param string $key Encryption key
  201. * @param string $iv Initialization vector
  202. * @param string $txt_plain Plain text to be encrypted
  203. * @param string $txt_encoded Known ecrypted text
  204. *
  205. * @dataProvider provider_encode
  206. * @covers Encrypt::encode
  207. */
  208. public function test_encode($mode, $cipher, $key, $iv, $txt_plain, $txt_encoded)
  209. {
  210. // initialize
  211. $e = new Kohana_EncryptTest_IvStubbed($key, $iv, $mode, $cipher);
  212. // prepare data
  213. $expected = base64_encode($iv . $txt_encoded);
  214. $actual = $e->encode($txt_plain);
  215. // assert
  216. $this->assertSame($expected, $actual);
  217. }
  218. /**
  219. * Provider for test_decode
  220. * AES Multiblock Message Test (MMT) Sample Vectors - Known Answer Test (KAT)
  221. * @link http://csrc.nist.gov/groups/STM/cavp/index.html NIST - Cryptographic Algorithm Validation Program
  222. * @link http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesmmt.zip file used CBCMMT128.rsp
  223. *
  224. * @return array of $mode, $cipher, $key, $iv, $txt_encoded, $txt_plain
  225. */
  226. public function provider_decode()
  227. {
  228. return [
  229. [
  230. // mode
  231. MCRYPT_MODE_CBC,
  232. // cypher
  233. MCRYPT_RIJNDAEL_128,
  234. // key
  235. pack("H*", "6a7082cf8cda13eff48c8158dda206ae"),
  236. // IV
  237. pack("H*", "bd4172934078c2011cb1f31cffaf486e"),
  238. // txt_encoded
  239. pack("H*", "f8eb31b31e374e960030cd1cadb0ef0c"),
  240. // txt_plain
  241. pack("H*", "940bc76d61e2c49dddd5df7f37fcf105"),
  242. ],
  243. [
  244. // mode
  245. MCRYPT_MODE_CBC,
  246. // cypher
  247. MCRYPT_RIJNDAEL_128,
  248. // key
  249. pack("H*", "625eefa18a4756454e218d8bfed56e36"),
  250. // IV
  251. pack("H*", "73d9d0e27c2ec568fbc11f6a0998d7c8"),
  252. // txt_encoded
  253. pack("H*", "5d6fed86f0c4fe59a078d6361a142812514b295dc62ff5d608a42ea37614e6a1"),
  254. // txt_plain
  255. pack("H*", "360dc1896ce601dfb2a949250067aad96737847a4580ede2654a329b842fe81e"),
  256. ],
  257. [
  258. // mode
  259. MCRYPT_MODE_CBC,
  260. // cypher
  261. MCRYPT_RIJNDAEL_128,
  262. // key
  263. pack("H*", "fd6e0b954ae2e3b723d6c9fcae6ab09b"),
  264. // IV
  265. pack("H*", "f08b65c9f4dd950039941da2e8058c4e"),
  266. // txt_encoded
  267. pack("H*", "e29e3114c8000eb484395b256b1b3267894f290d3999819ff35da03e6463c186c4d7ebb964941f1986a2d69572fcaba8"),
  268. // txt_plain
  269. pack("H*", "a206385945b21f812a9475f47fddbb7fbdda958a8d14c0dbcdaec36e8b28f1f6ececa1ceae4ce17721d162c1d42a66c1"),
  270. ],
  271. [
  272. // mode
  273. MCRYPT_MODE_CBC,
  274. // cypher
  275. MCRYPT_RIJNDAEL_128,
  276. // key
  277. pack("H*", "7b1ab9144b0239315cd5eec6c75663bd"),
  278. // IV
  279. pack("H*", "0b1e74f45c17ff304d99c059ce5cde09"),
  280. // txt_encoded
  281. pack("H*", "d3f89b71e033070f9d7516a6cb4ea5ef51d6fb63d4f0fea089d0a60e47bbb3c2e10e9ba3b282c7cb79aefe3068ce228377c21a58fe5a0f8883d0dbd3d096beca"),
  282. // txt_plain
  283. pack("H*", "b968aeb199ad6b3c8e01f26c2edad444538c78bfa36ed68ca76123b8cdce615a01f6112bb80bfc3f17490578fb1f909a52e162637b062db04efee291a1f1af60"),
  284. ],
  285. [
  286. // mode
  287. MCRYPT_MODE_CBC,
  288. // cypher
  289. MCRYPT_RIJNDAEL_128,
  290. // key
  291. pack("H*", "36466b6bd25ea3857ea42f0cac1919b1"),
  292. // IV
  293. pack("H*", "7186fb6bdfa98a16189544b228f3bcd3"),
  294. // txt_encoded
  295. pack("H*", "9ed957bd9bc52bba76f68cfbcde52157a8ca4f71ac050a3d92bdebbfd7c78316b4c9f0ba509fad0235fdafe90056ad115dfdbf08338b2acb1c807a88182dd2a882d1810d4302d598454e34ef2b23687d"),
  296. // txt_plain
  297. pack("H*", "999983467c47bb1d66d7327ab5c58f61ddb09b93bd2460cb78cbc12b5fa1ea0c5f759ccc5e478697687012ff4673f6e61eecaeda0ccad2d674d3098c7d17f887b62b56f56b03b4d055bf3a4460e83efa"),
  298. ],
  299. [
  300. // mode
  301. MCRYPT_MODE_CBC,
  302. // cypher
  303. MCRYPT_RIJNDAEL_128,
  304. // key
  305. pack("H*", "89373ee6e28397640d5082eed4123239"),
  306. // IV
  307. pack("H*", "1a74d7c859672c804b82472f7e6d3c6b"),
  308. // txt_encoded
  309. pack("H*", "1bcba44ddff503db7c8c2ec4c4eea0e827957740cce125c1e11769842fa97e25f1b89269e6d77923a512a358312f4ba1cd33f2d111280cd83e1ef9e7cf7036d55048d5c273652afa611cc81b4e9dac7b5078b7c4716062e1032ead1e3329588a"),
  310. // txt_plain
  311. pack("H*", "45efd00daa4cdc8273ef785cae9e944a7664a2391e1e2c449f475acec0124bbc22944331678617408a1702917971f4654310ffb9229bec6173715ae512d37f93aaa6abf009f7e30d65669d1db0366b5bce4c7b00f871014f5753744a1878dc57"),
  312. ],
  313. [
  314. // mode
  315. MCRYPT_MODE_CBC,
  316. // cypher
  317. MCRYPT_RIJNDAEL_128,
  318. // key
  319. pack("H*", "bab0cceddc0abd63e3f82e9fbff7b8aa"),
  320. // IV
  321. pack("H*", "68b9140f300490c5c942f66e777eb806"),
  322. // txt_encoded
  323. pack("H*", "c65b94b1f291fa9f0600f22c3c0432c895ad5d177bcccc9ea44e8ec339c9adf43855b326179d6d81aa36ef59462fd86127e9d81b0f286f93306bf74d4c79e47c1b3d4b74edd3a16290e3c63b742e41f20d66ceee794316bb63d3bd002712a1b136ba6185bd5c1dab81b07db90d2af5e5"),
  324. // txt_plain
  325. pack("H*", "c5585ff215bbb73ba5393440852fb199436de0d15e55c631f877670aa3eda9f672eb1f876f09544e63558436b8928000db2f02a5ad90f95b05ac4cf49e198e617e7678480fdf0efacc6aae691271e6cdd3541ebf719a1ccaedb24e2f80f92455dd5910cb5086b0960a3942ec182dcbd7"),
  326. ],
  327. [
  328. // mode
  329. MCRYPT_MODE_CBC,
  330. // cypher
  331. MCRYPT_RIJNDAEL_128,
  332. // key
  333. pack("H*", "9c702898efa44557b29ed283f5bc0293"),
  334. // IV
  335. pack("H*", "cec6e1b82e8b2a591a9fa5ff1cf5cc51"),
  336. // txt_encoded
  337. pack("H*", "ba9f646755dacc22911f51d7de2f7e7cb0bc0b75257ea44fe883edb055c7c28ede04c3a0adcb10128ad4517d0093fa16bb0bcd2635e7a0ba92c7609bc8d8568002a7a983473724d256513aa7d51b477aabec1975ab5faf2872a6407e922180eff02f1ef86a4591c8bd3d143da6f0ef0e4806f94ace0d5b0151c99640fccbc843"),
  338. // txt_plain
  339. pack("H*", "1d1f8d81bdc3e2c7cb057f408e6450000c5aaed3260ff1e87fbb6f324df6887ffd8f78d7e2a04c9ed9deda9d64482d2b002f4a2b78d8b4f691875c8295d4a64b22257ceaf713ed2f4b92530d7ad7151d629acda882b4829577a43990b0948c1149c22fe4273656d1b08833930e8b06709a94579a78fc220f7057bbc1fa9f6563"),
  340. ],
  341. [
  342. // mode
  343. MCRYPT_MODE_CBC,
  344. // cypher
  345. MCRYPT_RIJNDAEL_128,
  346. // key
  347. pack("H*", "5674636dbdb38f705f0b08c372ef4785"),
  348. // IV
  349. pack("H*", "3f20ce0509b57420d53b6be4d0b7f0a9"),
  350. // txt_encoded
  351. pack("H*", "198351f453103face6655666fe90bdbd9630e3733b2d66c013a634e91f2bf015bd2d975d71b26322e44defa32d4e9dce50363557046ece08ba38f258dae5fd3e5049c647476c81e73482e40c171d89f9fea29452caf995733589b0061464fbd5dabe27dc5ea463a3deeb7dcb43664ae6a65c498c143883ab8e83b51e5410b181647602443dc3cfffe86f0205398fa83c"),
  352. // txt_plain
  353. pack("H*", "6d40fd2f908f48ce19241b6b278b1b1676dffd4a97ce9f8a1574c33bc59237deb536bee376fd6c381e6987700e39283aa111cf1a59f26fae6fb6700bf012646a2ab80239bf5e1632329043aa87d7911978b36523a2bc0bed9a9737ccf7a00baa2f3822b4e9e742e168e7069290705fed2eb63aa044b78f97dd33a8d6b24741ec1fd8c8db79d93b884e762dba0f406961"),
  354. ],
  355. [
  356. // mode
  357. MCRYPT_MODE_CBC,
  358. // cypher
  359. MCRYPT_RIJNDAEL_128,
  360. // key
  361. pack("H*", "97a1025529b9925e25bbe78770ca2f99"),
  362. // IV
  363. pack("H*", "d4b4eab92aa9637e87d366384ed6915c"),
  364. // txt_encoded
  365. pack("H*", "22cdc3306fcd4d31ccd32720cbb61bad28d855670657c48c7b88c31f4fa1f93c01b57da90be63ead67d6a325525e6ed45083e6fb70a53529d1fa0f55653b942af59d78a2660361d63a7290155ac5c43312a25b235dacbbc863faf00940c99624076dfa44068e7c554c9038176953e571751dfc0954d41d113771b06466b1c8d13e0d4cb675ed58d1a619e1540970983781dc11d2dd8525ab5745958d615defda"),
  366. // txt_plain
  367. pack("H*", "e8b89150d8438bf5b17449d6ed26bd72127e10e4aa57cad85283e8359e089208e84921649f5b60ea21f7867cbc9620560c4c6238db021216db453c9943f1f1a60546173daef2557c3cdd855031b353d4bf176f28439e48785c37d38f270aa4a6faad2baabcb0c0b2d1dd5322937498ce803ba1148440a52e227ddba4872fe4d81d2d76a939d24755adb8a7b8452ceed2d179e1a5848f316f5c016300a390bfa7"),
  368. ],
  369. ];
  370. }
  371. /**
  372. * @param string $mode
  373. * @param string $cipher
  374. * @param string $key Encryption key
  375. * @param string $iv Initialization vector
  376. * @param string $txt_encoded ecrypted text
  377. * @param string $txt_plain Known plain text that is decripted
  378. *
  379. * @dataProvider provider_decode
  380. * @covers Encrypt::decode
  381. */
  382. public function test_decode($mode, $cipher, $key, $iv, $txt_encoded, $txt_plain)
  383. {
  384. // initialize
  385. $e = new Encrypt($key, $mode, $cipher);
  386. // prepare data
  387. $expected = $txt_plain;
  388. $actual = $e->decode(base64_encode($iv . $txt_encoded));
  389. // assert
  390. $this->assertSame($expected, $actual);
  391. }
  392. /**
  393. * Provider for test_encode_decode, test_consecutive_encode_different_results
  394. *
  395. * @return array of $key, $mode, $cipher, $txt_plain
  396. */
  397. public function provider_encode_decode()
  398. {
  399. return [
  400. [
  401. // key
  402. "Some super secret key",
  403. // mode
  404. MCRYPT_MODE_NOFB,
  405. // cypher
  406. MCRYPT_RIJNDAEL_128,
  407. // txt_plain
  408. "The quick brown fox jumps over the lazy dog",
  409. ],
  410. [
  411. // key
  412. "De finibus bonorum et malorum",
  413. // mode
  414. MCRYPT_MODE_NOFB,
  415. // cypher
  416. MCRYPT_RIJNDAEL_128,
  417. // txt_plain
  418. "Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.",
  419. ],
  420. ];
  421. }
  422. /**
  423. * @param type $key Encryption Key
  424. * @param type $mode Encryption Mode
  425. * @param type $cipher Encryption Cipher
  426. * @param type $txt_plain Plain text to encode and then decode back
  427. *
  428. * @dataProvider provider_encode_decode
  429. * @covers Encrypt::encode
  430. * @covers Encrypt::decode
  431. */
  432. public function test_encode_decode($key, $mode, $cipher, $txt_plain)
  433. {
  434. // initialize, encode
  435. $e = new Encrypt($key, $mode, $cipher);
  436. $txt_encoded = $e->encode($txt_plain);
  437. // prepare data
  438. $expected = $txt_plain;
  439. $actual = $e->decode($txt_encoded);
  440. // assert
  441. $this->assertSame($expected, $actual);
  442. }
  443. /**
  444. * Provider for test_decode_invalid_data
  445. *
  446. * @return array of $key, $mode, $cipher, $txt_invalid_encoded
  447. */
  448. public function provider_decode_invalid_data()
  449. {
  450. return [
  451. [
  452. // key
  453. "Some super secret key",
  454. // mode
  455. MCRYPT_MODE_NOFB,
  456. // cypher
  457. MCRYPT_RIJNDAEL_128,
  458. // txt_invalid_encoded
  459. ".:This data is not a valid base 64 string:.",
  460. ],
  461. [
  462. // key
  463. "Some super secret key",
  464. // mode
  465. MCRYPT_MODE_NOFB,
  466. // cypher
  467. MCRYPT_RIJNDAEL_128,
  468. // txt_invalid_encoded
  469. base64_encode("too short"),
  470. ],
  471. ];
  472. }
  473. /**
  474. * Tests for decode when the string is not valid base64,
  475. * or is too short to contain a valid IV
  476. *
  477. * @param type $key
  478. * @param type $mode
  479. * @param type $cipher
  480. * @param type $txt_encoded
  481. *
  482. * @dataProvider provider_decode_invalid_data
  483. */
  484. public function test_decode_invalid_data($key, $mode, $cipher, $txt_invalid_encoded)
  485. {
  486. // initialize
  487. $e = new Encrypt($key, $mode, $cipher);
  488. // assert
  489. $this->AssertFalse($e->decode($txt_invalid_encoded));
  490. }
  491. /**
  492. * @param type $key Encryption Key
  493. * @param type $mode Encryption Mode
  494. * @param type $cipher Encryption Cipher
  495. * @param type $txt_plain Plain text to encode and then decode back
  496. *
  497. * @dataProvider provider_encode_decode
  498. * @covers Encrypt::encode
  499. */
  500. public function test_consecutive_encode_produce_different_results($key, $mode, $cipher, $txt_plain)
  501. {
  502. // initialize, encode twice
  503. $e = new Encrypt($key, $mode, $cipher);
  504. $txt_encoded_first = $e->encode($txt_plain);
  505. $txt_encoded_second = $e->encode($txt_plain);
  506. // assert
  507. $this->assertNotEquals($txt_encoded_first, $txt_encoded_second);
  508. }
  509. /**
  510. * @expectedException Kohana_Exception
  511. * @expectedExceptionMessage No encryption key is defined in the encryption configuration group
  512. */
  513. public function test_instance_throw_exception_when_no_key_provided()
  514. {
  515. Encrypt::instance();
  516. }
  517. /**
  518. * Provider for test_instance_returns_singleton
  519. *
  520. * @return array of $instance_name, $missing_config
  521. */
  522. public function provider_instance_returns_singleton()
  523. {
  524. return [
  525. [
  526. 'default',
  527. [
  528. 'key' => 'trwQwVXX96TIJoKxyBHB9AJkwAOHixuV1ENZmIWyanI0j1zNgSVvqywy044Agaj',
  529. ]
  530. ],
  531. [
  532. 'blowfish',
  533. [
  534. 'key' => '7bZJJkmNrelj5NaKoY6h6rMSRSmeUlJuTeOd5HHka5XknyMX4uGSfeVolTz4IYy',
  535. 'cipher' => MCRYPT_BLOWFISH,
  536. 'mode' => MCRYPT_MODE_ECB,
  537. ]
  538. ],
  539. [
  540. 'tripledes',
  541. [
  542. 'key' => 'a9hcSLRvA3LkFc7EJgxXIKQuz1ec91J7P6WNq1IaxMZp4CTj5m31gZLARLxI1jD',
  543. 'cipher' => MCRYPT_3DES,
  544. 'mode' => MCRYPT_MODE_CBC,
  545. ]
  546. ],
  547. ];
  548. }
  549. /**
  550. * Test to multiple calls to the instance() method returns same instance
  551. * also test if the instances are appropriately configured.
  552. *
  553. * @param string $instance_name instance name
  554. * @param array $config_array array of config variables missing from config
  555. *
  556. * @dataProvider provider_instance_returns_singleton
  557. */
  558. public function test_instance_returns_singleton($instance_name, array $config_array)
  559. {
  560. // load config
  561. $config = Kohana::$config->load('encrypt');
  562. // if instance name is NULL the config group should be the default
  563. $config_group = $instance_name ? : Encrypt::$default;
  564. // if config group does not exists, create
  565. if (!array_key_exists($config_group, $config))
  566. {
  567. $config[$config_group] = [];
  568. }
  569. // fill in the missing config variables
  570. $config[$config_group] = $config[$config_group] + $config_array;
  571. // call instance twice
  572. $e = Encrypt::instance($instance_name);
  573. $e2 = Encrypt::instance($instance_name);
  574. // assert instances
  575. $this->assertInstanceOf('Encrypt', $e);
  576. $this->assertInstanceOf('Encrypt', $e2);
  577. $this->assertSame($e, $e2);
  578. // test if instances are well configured
  579. // prepare expected variables
  580. $expected_cipher = $config[$config_group]['cipher'];
  581. $expected_mode = $config[$config_group]['mode'];
  582. $expected_key_size = mcrypt_get_key_size($expected_cipher, $expected_mode);
  583. $expected_key = substr($config[$config_group]['key'], 0, $expected_key_size);
  584. // assert
  585. $this->assertSameProtectedProperty($expected_key, $e->_engine, '_key');
  586. $this->assertSameProtectedProperty($expected_cipher, $e->_engine, '_cipher');
  587. $this->assertSameProtectedProperty($expected_mode, $e->_engine, '_mode');
  588. }
  589. /**
  590. * Helper method to test for private/protected properties of the egine
  591. *
  592. * @param mixed $expect Expected value
  593. * @param mixed $object object that holds the private/protected property
  594. * @param string $name the name of the private/protected property
  595. */
  596. protected function assertSameProtectedProperty($expect, $object, $name)
  597. {
  598. $refl = new ReflectionClass($object);
  599. $property = $refl->getProperty($name);
  600. $property->setAccessible(TRUE);
  601. $this->assertSame($expect, $property->getValue($object));
  602. }
  603. }
  604. /**
  605. * Class Kohana_EncryptTest_IvStubbed wraps the Encrypt class to mock out
  606. * the actual mcrypt_create_iv calls for unit testing.
  607. */
  608. class Kohana_EncryptTest_IvStubbed extends Encrypt
  609. {
  610. /**
  611. * override constructor to force class use known IVs
  612. *
  613. * @param string $key encryption key
  614. * @param string $iv feed a known IV
  615. * @param string $mode mcrypt mode
  616. * @param string $cipher mcrypt cipher
  617. */
  618. public function __construct($key, $iv, $mode, $cipher)
  619. {
  620. parent::__construct($key, $mode, $cipher);
  621. $this->_iv = $iv;
  622. }
  623. /**
  624. * Fake a random initialization vector by returning a known one
  625. *
  626. * @return string a known IV
  627. */
  628. protected function _create_iv()
  629. {
  630. return isset($this->_iv) ? $this->_iv : FALSE;
  631. }
  632. }
  633. /**
  634. * Class Kohana_EncryptTest_KeyNormalized wraps the Encrypt class to mock out
  635. * the actual mcrypt_create_iv calls for unit testing, as well as to always
  636. * normalize keys
  637. */
  638. class Kohana_EncryptTest_KeyNormalized extends Kohana_EncryptTest_IvStubbed
  639. {
  640. /**
  641. * override constructor to force key normalization
  642. *
  643. * @param string $key encryption key
  644. * @param string $mode mcrypt mode
  645. * @param string $cipher mcrypt cipher
  646. */
  647. public function __construct($key, $iv, $mode, $cipher)
  648. {
  649. parent::__construct($key, $iv, $mode, $cipher);
  650. // Encrypt config is moved to the engine.
  651. // Since these properties and function are protected use reflection
  652. // to update the key value in the engine class.
  653. $refl = new ReflectionClass($this->_engine);
  654. $method = $refl->getMethod('_normalize_key');
  655. $method->setAccessible(TRUE);
  656. $key_property = $refl->getProperty('_key');
  657. $key_property->setAccessible(TRUE);
  658. $_key = $key_property->getValue($this->_engine);
  659. $cipher_property = $refl->getProperty('_cipher');
  660. $cipher_property->setAccessible(TRUE);
  661. $_cipher = $cipher_property->getValue($this->_engine);
  662. $mode_property = $refl->getProperty('_mode');
  663. $mode_property->setAccessible(TRUE);
  664. $_mode = $mode_property->getValue($this->_engine);
  665. $key_property->setValue($this->_engine, $method->invoke($this->_engine, $_key, $_cipher, $_mode));
  666. }
  667. }