<?php
use \ParagonIE\Halite\File;
use \ParagonIE\Halite\KeyFactory;
use \ParagonIE\Halite\Symmetric\EncryptionKey;
use \ParagonIE\Halite\Alerts as CryptoException;
/**
* @backupGlobals disabled
* @backupStaticAttributes disabled
*/
class FileLazyTest extends PHPUnit_Framework_TestCase
{
public function testEncrypt()
{
\touch(__DIR__.'/tmp/paragon_avatar.encrypted.png');
\chmod(__DIR__.'/tmp/paragon_avatar.encrypted.png', 0777);
\touch(__DIR__.'/tmp/paragon_avatar.decrypted.png');
\chmod(__DIR__.'/tmp/paragon_avatar.decrypted.png', 0777);
$key = new EncryptionKey(\str_repeat('B', 32));
File::encrypt(
__DIR__.'/tmp/paragon_avatar.png',
__DIR__.'/tmp/paragon_avatar.encrypted.png',
$key
);
File::decrypt(
__DIR__.'/tmp/paragon_avatar.encrypted.png',
__DIR__.'/tmp/paragon_avatar.decrypted.png',
$key
);
$this->assertEquals(
\hash_file('sha256', __DIR__.'/tmp/paragon_avatar.png'),
\hash_file('sha256', __DIR__.'/tmp/paragon_avatar.decrypted.png')
);
}
public function testEncryptFail()
{
\touch(__DIR__.'/tmp/paragon_avatar.encrypt_fail.png');
\chmod(__DIR__.'/tmp/paragon_avatar.encrypt_fail.png', 0777);
\touch(__DIR__.'/tmp/paragon_avatar.decrypt_fail.png');
\chmod(__DIR__.'/tmp/paragon_avatar.decrypt_fail.png', 0777);
$key = new EncryptionKey(\str_repeat('B', 32));
File::encrypt(
__DIR__.'/tmp/paragon_avatar.png',
__DIR__.'/tmp/paragon_avatar.encrypt_fail.png',
$key
);
$fp = \fopen(__DIR__.'/tmp/paragon_avatar.encrypt_fail.png', 'ab');
\fwrite($fp, \Sodium\randombytes_buf(1));
fclose($fp);
try {
File::decrypt(
__DIR__.'/tmp/paragon_avatar.encrypt_fail.png',
__DIR__.'/tmp/paragon_avatar.decrypt_fail.png',
$key
);
$this->fail('Possible authentication bypass in File::decrypt()!');
} catch (CryptoException\InvalidMessage $e) {
$this->assertTrue($e instanceof CryptoException\InvalidMessage);
}
}
public function testSeal()
{
\touch(__DIR__.'/tmp/paragon_avatar.sealed.png');
\chmod(__DIR__.'/tmp/paragon_avatar.sealed.png', 0777);
\touch(__DIR__.'/tmp/paragon_avatar.opened.png');
\chmod(__DIR__.'/tmp/paragon_avatar.opened.png', 0777);
$keypair = KeyFactory::generateEncryptionKeyPair();
$secretkey = $keypair->getSecretKey();
$publickey = $keypair->getPublicKey();
File::seal(
__DIR__.'/tmp/paragon_avatar.png',
__DIR__.'/tmp/paragon_avatar.sealed.png',
$publickey
);
File::unseal(
__DIR__.'/tmp/paragon_avatar.sealed.png',
__DIR__.'/tmp/paragon_avatar.opened.png',
$secretkey
);
$this->assertEquals(
\hash_file('sha256', __DIR__.'/tmp/paragon_avatar.png'),
\hash_file('sha256', __DIR__.'/tmp/paragon_avatar.opened.png')
);
}
public function testSealFail()
{
\touch(__DIR__.'/tmp/paragon_avatar.seal_fail.png');
\chmod(__DIR__.'/tmp/paragon_avatar.seal_fail.png', 0777);
\touch(__DIR__.'/tmp/paragon_avatar.open_fail.png');
\chmod(__DIR__.'/tmp/paragon_avatar.open_fail.png', 0777);
$keypair = KeyFactory::generateEncryptionKeyPair();
$secretkey = $keypair->getSecretKey();
$publickey = $keypair->getPublicKey();
File::seal(
__DIR__.'/tmp/paragon_avatar.png',
__DIR__.'/tmp/paragon_avatar.seal_fail.png',
$publickey
);
$fp = \fopen(__DIR__.'/tmp/paragon_avatar.seal_fail.png', 'ab');
\fwrite($fp, \Sodium\randombytes_buf(1));
fclose($fp);
try {
File::unseal(
__DIR__.'/tmp/paragon_avatar.seal_fail.png',
__DIR__.'/tmp/paragon_avatar.opened.png',
$secretkey
);
$this->fail('Possible authentication bypass in File::unseal()!');
} catch (CryptoException\InvalidMessage $e) {
$this->assertTrue($e instanceof CryptoException\InvalidMessage);
}
}
public function testSign()
{
$keypair = KeyFactory::generateSignatureKeyPair();
$secretkey = $keypair->getSecretKey();
$publickey = $keypair->getPublicKey();
$signature = File::sign(
__DIR__.'/tmp/paragon_avatar.png',
$secretkey
);
$this->assertTrue(!empty($signature));
$this->assertTrue(
File::verify(
__DIR__.'/tmp/paragon_avatar.png',
$publickey,
$signature
)
);
}
public function testChecksum()
{
$csum = File::checksum(__DIR__.'/tmp/paragon_avatar.png');
$this->assertEquals(
$csum,
"09f9f74a0e742d057ca08394db4c2e444be88c0c94fe9a914c3d3758c7eccafb".
"8dd286e3d6bc37f353e76c0c5aa2036d978ca28ffaccfa59f5dc1f076c5517a0"
);
$data = \Sodium\randombytes_buf(32);
\file_put_contents(__DIR__.'/tmp/garbage.dat', $data);
$hash = \Sodium\crypto_generichash($data, null, 64);
$file = File::checksum(__DIR__.'/tmp/garbage.dat', null, true);
$this->assertEquals(
$hash,
$file
);
}
}
|