php-8.0.30-src/ext/sodium/tests/php_password_hash_argon2id....

55 lines
1.5 KiB
PHP

--TEST--
Test interoperability of password_hash('argon2id')
--SKIPIF--
<?php
if (!function_exists('sodium_crypto_pwhash_str_verify')) {
echo "skip - No crypto_pwhash_str_verify";
}
if (!in_array('argon2id', password_algos(), true /* strict */)) {
echo "skip - No argon2id support in password_hash()";
}
--FILE--
<?php
echo 'Argon2 provider: ';
var_dump(PASSWORD_ARGON2_PROVIDER);
foreach([1, 2] as $mem) {
foreach([1, 2] as $time) {
$opts = [
'memory_cost' => PASSWORD_ARGON2_DEFAULT_MEMORY_COST * $mem,
'time_cost' => PASSWORD_ARGON2_DEFAULT_TIME_COST * $time,
'threads' => PASSWORD_ARGON2_DEFAULT_THREADS,
];
$password = random_bytes(32);
echo "Using password: ";
var_dump(base64_encode($password));
$hash = password_hash($password, 'argon2id', $opts);
echo "Hash: "; var_dump($hash);
var_dump(sodium_crypto_pwhash_str_verify($hash, $password));
// And verify that incorrect passwords fail.
$password[0] = chr(ord($password[0]) ^ 1);
var_dump(sodium_crypto_pwhash_str_verify($hash, $password));
}
}
?>
--EXPECTF--
Argon2 provider: string(%d) "%s"
Using password: string(44) "%s"
Hash: string(97) "$argon2id$v=19$m=65536,t=4,p=1$%s$%s"
bool(true)
bool(false)
Using password: string(44) "%s"
Hash: string(97) "$argon2id$v=19$m=65536,t=8,p=1$%s$%s"
bool(true)
bool(false)
Using password: string(44) "%s"
Hash: string(98) "$argon2id$v=19$m=131072,t=4,p=1$%s$%s"
bool(true)
bool(false)
Using password: string(44) "%s"
Hash: string(98) "$argon2id$v=19$m=131072,t=8,p=1$%s$%s"
bool(true)
bool(false)