2014-11-04 18:05:31 +03:00
|
|
|
<?php
|
2021-04-19 16:50:30 +03:00
|
|
|
|
|
|
|
declare(strict_types=1);
|
|
|
|
|
2014-11-04 18:05:31 +03:00
|
|
|
/**
|
|
|
|
* Copyright (c) 2014 Lukas Reschke <lukas@owncloud.com>
|
|
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
|
|
* later.
|
|
|
|
* See the COPYING-README file.
|
|
|
|
*/
|
|
|
|
|
2016-05-19 10:02:58 +03:00
|
|
|
namespace Test\Security;
|
|
|
|
|
2014-11-04 18:05:31 +03:00
|
|
|
use OC\Security\Hasher;
|
2017-10-24 16:26:53 +03:00
|
|
|
use OCP\IConfig;
|
2014-11-04 18:05:31 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Class HasherTest
|
|
|
|
*/
|
2015-06-03 13:03:02 +03:00
|
|
|
class HasherTest extends \Test\TestCase {
|
2014-11-04 18:05:31 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @return array
|
|
|
|
*/
|
2020-04-10 15:19:56 +03:00
|
|
|
public function versionHashProvider() {
|
2018-04-04 16:40:28 +03:00
|
|
|
return [
|
|
|
|
['asf32äà$$a.|3', null],
|
|
|
|
['asf32äà$$a.|3|5', null],
|
|
|
|
['1|2|3|4', ['version' => 1, 'hash' => '2|3|4']],
|
|
|
|
['1|我看|这本书。 我看這本書', ['version' => 1, 'hash' => '我看|这本书。 我看這本書']],
|
|
|
|
['2|newhash', ['version' => 2, 'hash' => 'newhash']],
|
|
|
|
];
|
2014-11-04 18:05:31 +03:00
|
|
|
}
|
|
|
|
|
2020-04-10 15:19:56 +03:00
|
|
|
public function hashProviders70_71(): array {
|
2018-04-04 16:40:28 +03:00
|
|
|
return [
|
2014-11-04 18:05:31 +03:00
|
|
|
// Valid SHA1 strings
|
2018-04-04 16:40:28 +03:00
|
|
|
['password', '5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8', true],
|
|
|
|
['owncloud.com', '27a4643e43046c3569e33b68c1a4b15d31306d29', true],
|
2014-11-04 18:05:31 +03:00
|
|
|
|
|
|
|
// Invalid SHA1 strings
|
2018-04-04 16:40:28 +03:00
|
|
|
['InvalidString', '5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8', false],
|
|
|
|
['AnotherInvalidOne', '27a4643e43046c3569e33b68c1a4b15d31306d29', false],
|
2014-11-04 18:05:31 +03:00
|
|
|
|
|
|
|
// Valid legacy password string with password salt "6Wow67q1wZQZpUUeI6G2LsWUu4XKx"
|
2018-04-04 16:40:28 +03:00
|
|
|
['password', '$2a$08$emCpDEl.V.QwPWt5gPrqrOhdpH6ailBmkj2Hd2vD5U8qIy20HBe7.', true],
|
|
|
|
['password', '$2a$08$yjaLO4ev70SaOsWZ9gRS3eRSEpHVsmSWTdTms1949mylxJ279hzo2', true],
|
|
|
|
['password', '$2a$08$.jNRG/oB4r7gHJhAyb.mDupNUAqTnBIW/tWBqFobaYflKXiFeG0A6', true],
|
|
|
|
['owncloud.com', '$2a$08$YbEsyASX/hXVNMv8hXQo7ezreN17T8Jl6PjecGZvpX.Ayz2aUyaZ2', true],
|
|
|
|
['owncloud.com', '$2a$11$cHdDA2IkUP28oNGBwlL7jO/U3dpr8/0LIjTZmE8dMPA7OCUQsSTqS', true],
|
|
|
|
['owncloud.com', '$2a$08$GH.UoIfJ1e.qeZ85KPqzQe6NR8XWRgJXWIUeE1o/j1xndvyTA1x96', true],
|
2014-11-04 18:05:31 +03:00
|
|
|
|
|
|
|
// Invalid legacy passwords
|
2018-04-04 16:40:28 +03:00
|
|
|
['password', '$2a$08$oKAQY5IhnZocP.61MwP7xu7TNeOb7Ostvk3j6UpacvaNMs.xRj7O2', false],
|
2014-11-04 18:05:31 +03:00
|
|
|
|
|
|
|
// Valid passwords "6Wow67q1wZQZpUUeI6G2LsWUu4XKx"
|
2018-04-04 16:40:28 +03:00
|
|
|
['password', '1|$2a$05$ezAE0dkwk57jlfo6z5Pql.gcIK3ReXT15W7ITNxVS0ksfhO/4E4Kq', true],
|
|
|
|
['password', '1|$2a$05$4OQmloFW4yTVez2MEWGIleDO9Z5G9tWBXxn1vddogmKBQq/Mq93pe', true],
|
|
|
|
['password', '1|$2a$11$yj0hlp6qR32G9exGEXktB.yW2rgt2maRBbPgi3EyxcDwKrD14x/WO', true],
|
|
|
|
['owncloud.com', '1|$2a$10$Yiss2WVOqGakxuuqySv5UeOKpF8d8KmNjuAPcBMiRJGizJXjA2bKm', true],
|
|
|
|
['owncloud.com', '1|$2a$10$v9mh8/.mF/Ut9jZ7pRnpkuac3bdFCnc4W/gSumheQUi02Sr.xMjPi', true],
|
|
|
|
['owncloud.com', '1|$2a$05$ST5E.rplNRfDCzRpzq69leRzsTGtY7k88h9Vy2eWj0Ug/iA9w5kGK', true],
|
2014-11-04 18:05:31 +03:00
|
|
|
|
|
|
|
// Invalid passwords
|
2018-04-04 16:40:28 +03:00
|
|
|
['password', '0|$2a$08$oKAQY5IhnZocP.61MwP7xu7TNeOb7Ostvk3j6UpacvaNMs.xRj7O2', false],
|
|
|
|
['password', '1|$2a$08$oKAQY5IhnZocP.61MwP7xu7TNeOb7Ostvk3j6UpacvaNMs.xRj7O2', false],
|
|
|
|
['password', '2|$2a$08$oKAQY5IhnZocP.61MwP7xu7TNeOb7Ostvk3j6UpacvaNMs.xRj7O2', false],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
2020-02-05 22:34:51 +03:00
|
|
|
public function hashProviders72(): array {
|
2018-04-04 16:40:28 +03:00
|
|
|
return [
|
|
|
|
// Valid ARGON2 hashes
|
|
|
|
['password', '2|$argon2i$v=19$m=1024,t=2,p=2$T3JGcEkxVFNOVktNSjZUcg$4/hyLtSejxNgAuzSFFV/HLM3qRQKBwEtKw61qPN4zWA', true],
|
|
|
|
['password', '2|$argon2i$v=19$m=1024,t=2,p=2$Zk52V24yNjMzTkhyYjJKOQ$vmqHkCaOD6SiiiFKD1GeKLg/D1ynWpyZbx4XA2yed34', true],
|
|
|
|
['password', '2|$argon2i$v=19$m=1024,t=2,p=2$R1pRcUZKamVlNndBc3l5ag$ToRhR8SiZc7fGMpOYfSc5haS5t9+Y00rljPJV7+qLkM', true],
|
|
|
|
['nextcloud.com', '2|$argon2i$v=19$m=1024,t=2,p=2$NC9xM0FFaDlzM01QM3kudg$fSfndwtO2mKMZlKdsT8XAtPY51cSS6pLSGS3xMqeJhg', true],
|
|
|
|
['nextcloud.com', '2|$argon2i$v=19$m=1024,t=2,p=2$UjkvUjEuL042WWl1cmdHOA$FZivLkBdZnloQsW6qq/jqWK95JSYUHW9rwQC4Ff9GN0', true],
|
|
|
|
['nextcloud.com', '2|$argon2i$v=19$m=1024,t=2,p=2$ZnpNdUlzMEpUTW40OVpiMQ$c+yHT9dtSYsjtVGsa7UKOsxxgQAMiUc781d9WsFACqs', true],
|
|
|
|
|
|
|
|
//Invalid ARGON2 hashes
|
|
|
|
['password', '2|$argon2i$v=19$m=1024,t=2,p=2$UjFDUDg3cjBvM3FkbXVOWQ$7Y5xqFxSERnYn+2+7WChUpWZWMa5BEIhSHWnDgJ71Jk', false],
|
|
|
|
['password', '2|$argon2i$v=19$m=1024,t=2,p=2$ZUxSUi5aQklXdkcyMG1uVA$sYjoSvXg/CS/aS6Xnas/o9a/OPVcGKldzzmuiCD1Fxo', false],
|
|
|
|
['password', '2|$argon2i$v=19$m=1024,t=2,p=2$ZHQ5V0xMOFNmUC52by44Sg$DzQFk3bJTX0J4PVGwW6rMvtnBJRalBkbtpDIXR+d4A0', false],
|
|
|
|
];
|
2014-11-04 18:05:31 +03:00
|
|
|
}
|
|
|
|
|
2020-02-05 22:34:51 +03:00
|
|
|
public function hashProviders73(): array {
|
|
|
|
return [
|
|
|
|
// Valid ARGON2ID hashes
|
|
|
|
['password', '2|$argon2id$v=19$m=65536,t=4,p=1$TEtIMnhUczliQzI0Y01WeA$BpMUDrApy25iagIogUAnlc0rNTPJmGs8lOEeVHujJ9Q', true],
|
|
|
|
['password', '2|$argon2id$v=19$m=65536,t=4,p=1$RzdUdDNvbHhZalVQa2VIcQ$Wo8CGasVCBcSe69ldPdoVKTWEDQkET2cgQJSUiKcIzs', true],
|
|
|
|
['password', '2|$argon2id$v=19$m=65536,t=4,p=1$djlDMTVkL3VnMlNZNWZPeg$PCMpdAjB+OtwGpM75IGWmYHh1h2I7l5P8YabYtKubWg', true],
|
|
|
|
['nextcloud.com', '2|$argon2id$v=19$m=65536,t=4,p=1$VGhGL05rcUI3d3k3WVhibQ$CSy0ShUnamZQhu8oeZfUTTd/S3z966zuQ/uz1Y80Rss', true],
|
|
|
|
['nextcloud.com', '2|$argon2id$v=19$m=65536,t=4,p=1$ZVlZTVlCaTZhRlZHOGFpYQ$xd1TtMz1Mi0SuZrP+VWB3v/hwoC7HfSVsUYmzOo2DUU', true],
|
|
|
|
['nextcloud.com', '2|$argon2id$v=19$m=65536,t=4,p=1$OG1wZUtzZ0tnLjF2MUZVMA$CBluq8W8ISmZ9QumeWsVhaVREP0Zcq8rwk2NrA9d4YE', true],
|
|
|
|
|
|
|
|
//Invalid ARGON2ID hashes
|
|
|
|
['password', '2|$argon2id$v=19$m=65536,t=4,p=1$V3ovTHlvc0Eyb24xenVRNQ$iY/A0Yf24c2DToedj2rj9+KeoJBGsJYQOlJMoa0SFXk', false],
|
|
|
|
['password', '2|$argon2id$v=19$m=65536,t=4,p=1$NlYuMlQ0ODIudTRkZDhYUw$/Z71ckOIuydujedUGK73iXC9vbLzlH/iXkG9+gGgn+c', false],
|
|
|
|
['password', '2|$argon2id$v=19$m=65536,t=4,p=1$b09kNFZTZWFjS05aTkl6ZA$llE4TnIYYrC0H7wkTL1JsIwAAgoMJERlqtFcHHQcXTs', false],
|
|
|
|
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2014-11-04 18:05:31 +03:00
|
|
|
/** @var Hasher */
|
|
|
|
protected $hasher;
|
2015-06-03 13:03:02 +03:00
|
|
|
|
2017-10-24 16:26:53 +03:00
|
|
|
/** @var IConfig */
|
2014-11-04 18:05:31 +03:00
|
|
|
protected $config;
|
|
|
|
|
2019-11-21 18:40:38 +03:00
|
|
|
protected function setUp(): void {
|
2015-06-03 13:03:02 +03:00
|
|
|
parent::setUp();
|
|
|
|
|
2018-04-04 16:40:28 +03:00
|
|
|
$this->config = $this->createMock(IConfig::class);
|
2014-11-04 18:05:31 +03:00
|
|
|
|
2020-04-28 22:04:34 +03:00
|
|
|
$this->config->method('getSystemValueInt')
|
|
|
|
->willReturnCallback(function ($name, $default) {
|
|
|
|
return $default;
|
|
|
|
});
|
|
|
|
|
2014-11-04 18:05:31 +03:00
|
|
|
$this->hasher = new Hasher($this->config);
|
|
|
|
}
|
|
|
|
|
2018-04-04 16:40:28 +03:00
|
|
|
public function testHash() {
|
2014-11-04 18:05:31 +03:00
|
|
|
$hash = $this->hasher->hash('String To Hash');
|
|
|
|
$this->assertNotNull($hash);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @dataProvider versionHashProvider
|
|
|
|
*/
|
2018-04-04 16:40:28 +03:00
|
|
|
public function testSplitHash($hash, $expected) {
|
|
|
|
$relativePath = self::invokePrivate($this->hasher, 'splitHash', [$hash]);
|
2014-11-04 18:05:31 +03:00
|
|
|
$this->assertSame($expected, $relativePath);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2018-04-04 16:40:28 +03:00
|
|
|
* @dataProvider hashProviders70_71
|
2014-11-04 18:05:31 +03:00
|
|
|
*/
|
2018-04-04 16:40:28 +03:00
|
|
|
public function testVerify($password, $hash, $expected) {
|
2014-11-04 18:05:31 +03:00
|
|
|
$this->config
|
|
|
|
->expects($this->any())
|
|
|
|
->method('getSystemValue')
|
2020-01-29 23:39:58 +03:00
|
|
|
->willReturnCallback(function ($key, $default) {
|
2020-04-10 15:19:56 +03:00
|
|
|
if ($key === 'passwordsalt') {
|
2020-01-29 23:39:58 +03:00
|
|
|
return '6Wow67q1wZQZpUUeI6G2LsWUu4XKx';
|
|
|
|
}
|
|
|
|
return $default;
|
|
|
|
});
|
2014-11-04 18:05:31 +03:00
|
|
|
|
|
|
|
$result = $this->hasher->verify($password, $hash);
|
|
|
|
$this->assertSame($expected, $result);
|
|
|
|
}
|
|
|
|
|
2018-04-04 16:40:28 +03:00
|
|
|
/**
|
|
|
|
* @dataProvider hashProviders72
|
|
|
|
*/
|
|
|
|
public function testVerifyArgon2i($password, $hash, $expected) {
|
|
|
|
if (!\defined('PASSWORD_ARGON2I')) {
|
|
|
|
$this->markTestSkipped('Need ARGON2 support to test ARGON2 hashes');
|
|
|
|
}
|
|
|
|
|
|
|
|
$result = $this->hasher->verify($password, $hash);
|
|
|
|
$this->assertSame($expected, $result);
|
|
|
|
}
|
|
|
|
|
2020-02-05 22:34:51 +03:00
|
|
|
/**
|
|
|
|
* @dataProvider hashProviders73
|
|
|
|
*/
|
|
|
|
public function testVerifyArgon2id(string $password, string $hash, bool $expected) {
|
|
|
|
if (!\defined('PASSWORD_ARGON2ID')) {
|
|
|
|
$this->markTestSkipped('Need ARGON2ID support to test ARGON2ID hashes');
|
|
|
|
}
|
|
|
|
|
|
|
|
$result = $this->hasher->verify($password, $hash);
|
|
|
|
$this->assertSame($expected, $result);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testUpgradeHashBlowFishToArgon2() {
|
2018-04-04 16:40:28 +03:00
|
|
|
if (!\defined('PASSWORD_ARGON2I')) {
|
|
|
|
$this->markTestSkipped('Need ARGON2 support to test ARGON2 hashes');
|
|
|
|
}
|
|
|
|
|
|
|
|
$message = 'mysecret';
|
|
|
|
|
|
|
|
$blowfish = 1 . '|' . password_hash($message, PASSWORD_BCRYPT, []);
|
2020-10-05 16:12:57 +03:00
|
|
|
$argon2 = 2 . '|' . password_hash($message, PASSWORD_ARGON2I, []);
|
2020-02-05 22:34:51 +03:00
|
|
|
|
|
|
|
$newAlg = PASSWORD_ARGON2I;
|
|
|
|
if (\defined('PASSWORD_ARGON2ID')) {
|
|
|
|
$newAlg = PASSWORD_ARGON2ID;
|
2020-10-05 16:12:57 +03:00
|
|
|
$argon2 = 2 . '|' . password_hash($message, PASSWORD_ARGON2ID, []);
|
2020-02-05 22:34:51 +03:00
|
|
|
}
|
|
|
|
|
2018-04-04 16:40:28 +03:00
|
|
|
|
|
|
|
$this->assertTrue($this->hasher->verify($message, $blowfish,$newHash));
|
2020-02-05 22:34:51 +03:00
|
|
|
$this->assertTrue($this->hasher->verify($message, $argon2));
|
2018-04-04 16:40:28 +03:00
|
|
|
|
|
|
|
$relativePath = self::invokePrivate($this->hasher, 'splitHash', [$newHash]);
|
|
|
|
|
2020-02-05 22:34:51 +03:00
|
|
|
$this->assertFalse(password_needs_rehash($relativePath['hash'], $newAlg, []));
|
2018-04-04 16:40:28 +03:00
|
|
|
}
|
2020-01-29 23:39:58 +03:00
|
|
|
|
|
|
|
public function testUsePasswordDefaultArgon2iVerify() {
|
|
|
|
if (!\defined('PASSWORD_ARGON2I')) {
|
|
|
|
$this->markTestSkipped('Need ARGON2 support to test ARGON2 hashes');
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->config->method('getSystemValue')
|
|
|
|
->with('hashing_default_password')
|
|
|
|
->willReturn(true);
|
|
|
|
|
|
|
|
$message = 'mysecret';
|
|
|
|
|
2020-10-05 16:12:57 +03:00
|
|
|
$argon2i = 2 . '|' . password_hash($message, PASSWORD_ARGON2I, []);
|
2020-01-29 23:39:58 +03:00
|
|
|
|
|
|
|
$newHash = null;
|
|
|
|
$this->assertTrue($this->hasher->verify($message, $argon2i, $newHash));
|
|
|
|
$this->assertNotNull($newHash);
|
2020-02-05 22:34:51 +03:00
|
|
|
|
|
|
|
$relativePath = self::invokePrivate($this->hasher, 'splitHash', [$newHash]);
|
|
|
|
$this->assertEquals(1, $relativePath['version']);
|
|
|
|
$this->assertEquals(PASSWORD_BCRYPT, password_get_info($relativePath['hash'])['algo']);
|
|
|
|
$this->assertFalse(password_needs_rehash($relativePath['hash'], PASSWORD_BCRYPT));
|
|
|
|
$this->assertTrue(password_verify($message, $relativePath['hash']));
|
2020-01-29 23:39:58 +03:00
|
|
|
}
|
|
|
|
|
2020-02-05 22:34:51 +03:00
|
|
|
public function testDoNotUsePasswordDefaultArgon2idVerify() {
|
|
|
|
if (!\defined('PASSWORD_ARGON2ID')) {
|
|
|
|
$this->markTestSkipped('Need ARGON2ID support to test ARGON2ID hashes');
|
2020-01-29 23:39:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
$this->config->method('getSystemValue')
|
|
|
|
->with('hashing_default_password')
|
|
|
|
->willReturn(false);
|
|
|
|
|
|
|
|
$message = 'mysecret';
|
|
|
|
|
2020-10-05 16:12:57 +03:00
|
|
|
$argon2id = 3 . '|' . password_hash($message, PASSWORD_ARGON2ID, []);
|
2020-01-29 23:39:58 +03:00
|
|
|
|
|
|
|
$newHash = null;
|
2020-02-05 22:34:51 +03:00
|
|
|
$this->assertTrue($this->hasher->verify($message, $argon2id, $newHash));
|
2020-01-29 23:39:58 +03:00
|
|
|
$this->assertNull($newHash);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testHashUsePasswordDefault() {
|
|
|
|
if (!\defined('PASSWORD_ARGON2I')) {
|
|
|
|
$this->markTestSkipped('Need ARGON2 support to test ARGON2 hashes');
|
|
|
|
}
|
|
|
|
|
|
|
|
$this->config->method('getSystemValue')
|
|
|
|
->with('hashing_default_password')
|
|
|
|
->willReturn(true);
|
|
|
|
|
|
|
|
$message = 'mysecret';
|
|
|
|
|
|
|
|
$hash = $this->hasher->hash($message);
|
|
|
|
$relativePath = self::invokePrivate($this->hasher, 'splitHash', [$hash]);
|
|
|
|
|
|
|
|
$this->assertSame(1, $relativePath['version']);
|
|
|
|
|
|
|
|
$info = password_get_info($relativePath['hash']);
|
|
|
|
$this->assertEquals(PASSWORD_BCRYPT, $info['algo']);
|
|
|
|
}
|
2014-11-04 18:05:31 +03:00
|
|
|
}
|