php-src/ext/mcrypt/tests/mcrypt_ecb_variation4.phpt
Nikita Popov a861a3a93d Abort on invalid key size
Previously an incorrectly sized key was either silently padded
with NUL bytes or truncated. Especially the silent nature of this
behavior makes it extremely easy to use weak encryption. A common
mistake - which has also been extensively made in our tests - is
to use a password instead of a key.

Incorrectly sized keys will now be rejected.
2014-03-05 15:32:32 +01:00

208 lines
4.7 KiB
PHP

--TEST--
Test mcrypt_ecb() function : usage variation
--SKIPIF--
<?php
if (!extension_loaded("mcrypt")) {
print "skip - mcrypt extension not loaded";
}
?>
--FILE--
<?php
error_reporting(E_ALL & ~E_DEPRECATED);
/* Prototype : string mcrypt_ecb(string cipher, string key, string data, int mode, string iv)
* Description: ECB crypt/decrypt data using key key with cipher cipher starting with iv
* Source code: ext/mcrypt/mcrypt.c
* Alias to functions:
*/
echo "*** Testing mcrypt_ecb() : usage variation ***\n";
// Define error handler
function test_error_handler($err_no, $err_msg, $filename, $linenum, $vars) {
if ($err_no & error_reporting()) {
// report non-silenced errors
echo "Error: $err_no - $err_msg, $filename($linenum)\n";
}
}
set_error_handler('test_error_handler');
// Initialise function arguments not being substituted (if any)
$cipher = MCRYPT_TRIPLEDES;
$key = b"string_val\0\0\0\0\0\0\0\0\0\0\0\0\0\0";
$data = b'string_val';
$iv = b'01234567';
//get an unset variable
$unset_var = 10;
unset ($unset_var);
// define some classes
class classWithToString
{
public function __toString() {
return "Class A object";
}
}
class classWithoutToString
{
}
// heredoc string
$heredoc = <<<EOT
hello world
EOT;
// get a resource variable
$fp = fopen(__FILE__, "r");
// add arrays
$index_array = array (1, 2, 3);
$assoc_array = array ('one' => 1, 'two' => 2);
//array of values to iterate over
$inputs = array(
// float data
'float 10.5' => 10.5,
'float -10.5' => -10.5,
'float 12.3456789000e10' => 12.3456789000e10,
'float -12.3456789000e10' => -12.3456789000e10,
'float .5' => .5,
// array data
'empty array' => array(),
'int indexed array' => $index_array,
'associative array' => $assoc_array,
'nested arrays' => array('foo', $index_array, $assoc_array),
// null data
'uppercase NULL' => NULL,
'lowercase null' => null,
// boolean data
'lowercase true' => true,
'lowercase false' =>false,
'uppercase TRUE' =>TRUE,
'uppercase FALSE' =>FALSE,
// empty data
'empty string DQ' => "",
'empty string SQ' => '',
// string data
'string DQ' => "string",
'string SQ' => 'string',
'mixed case string' => "sTrInG",
'heredoc' => $heredoc,
// object data
'instance of classWithToString' => new classWithToString(),
'instance of classWithoutToString' => new classWithoutToString(),
// undefined data
'undefined var' => @$undefined_var,
// unset data
'unset var' => @$unset_var,
// resource variable
'resource' => $fp
);
// loop through each element of the array for mode
foreach($inputs as $valueType =>$value) {
echo "\n--$valueType--\n";
var_dump(bin2hex(mcrypt_ecb($cipher, $key, $data, $value, $iv)));
};
fclose($fp);
?>
===DONE===
--EXPECTF--
*** Testing mcrypt_ecb() : usage variation ***
--float 10.5--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--float -10.5--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--float 12.3456789000e10--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--float -12.3456789000e10--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--float .5--
string(32) "6438db90653c4d300909aa02fd6163c2"
--empty array--
string(32) "6438db90653c4d300909aa02fd6163c2"
--int indexed array--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--associative array--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--nested arrays--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--uppercase NULL--
string(32) "6438db90653c4d300909aa02fd6163c2"
--lowercase null--
string(32) "6438db90653c4d300909aa02fd6163c2"
--lowercase true--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--lowercase false--
string(32) "6438db90653c4d300909aa02fd6163c2"
--uppercase TRUE--
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--uppercase FALSE--
string(32) "6438db90653c4d300909aa02fd6163c2"
--empty string DQ--
string(32) "6438db90653c4d300909aa02fd6163c2"
--empty string SQ--
string(32) "6438db90653c4d300909aa02fd6163c2"
--string DQ--
string(32) "6438db90653c4d300909aa02fd6163c2"
--string SQ--
string(32) "6438db90653c4d300909aa02fd6163c2"
--mixed case string--
string(32) "6438db90653c4d300909aa02fd6163c2"
--heredoc--
string(32) "6438db90653c4d300909aa02fd6163c2"
--instance of classWithToString--
Error: 8 - Object of class classWithToString could not be converted to int, %s(%d)
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--instance of classWithoutToString--
Error: 8 - Object of class classWithoutToString could not be converted to int, %s(%d)
string(32) "a80c6cef6b42c8759143586a57bb7dc6"
--undefined var--
string(32) "6438db90653c4d300909aa02fd6163c2"
--unset var--
string(32) "6438db90653c4d300909aa02fd6163c2"
--resource--
string(%d) %s
===DONE===