1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148
|
<?php
/**
* Tests for the HMAC-SHA1 utility functions used by the OpenID
* library.
*
* PHP versions 4 and 5
*
* LICENSE: See the COPYING file included in this distribution.
*
* @package OpenID
* @author JanRain, Inc. <openid@janrain.com>
* @copyright 2005 Janrain, Inc.
* @license http://www.gnu.org/copyleft/lesser.html LGPL
*/
require_once 'PHPUnit.php';
require_once 'Auth/OpenID/HMACSHA1.php';
require_once 'Tests/Auth/OpenID/TestUtil.php';
class Tests_Auth_OpenID_HMACSHA1_TestCase extends PHPUnit_TestCase {
function Tests_Auth_OpenID_HMACSHA1_TestCase(
$name, $key, $data, $expected)
{
$this->setName($name);
$this->key = $key;
$this->data = $data;
$this->expected = $expected;
}
function runTest()
{
$actual = Auth_OpenID_HMACSHA1($this->key, $this->data);
$this->assertEquals($this->expected, $actual);
}
}
class Tests_Auth_OpenID_HMACSHA1 extends PHPUnit_TestSuite {
function _strConvert($s)
{
$repeat_pat = '/^0x([a-f0-9]{2}) repeated (\d+) times$/';
if (preg_match($repeat_pat, $s, $match)) {
$c = chr(hexdec($match[1]));
$n = $match[2];
$data = '';
for ($i = 0; $i < $n; $i++) {
$data .= $c;
}
} elseif (substr($s, 0, 2) == "0x") {
$data = pack('H*', substr($s, 2, strlen($s) - 1));
} elseif (preg_match('/^"(.*)"$/', $s, $match)) {
$data = $match[1];
} else {
trigger_error("Bad data format: $s", E_USER_ERROR);
}
return $data;
}
function _readTestCases()
{
$lines = Tests_Auth_OpenID_readlines('hmac.txt');
$cases = array();
$case = array();
foreach ($lines as $line) {
if ($line{0} == "#") {
continue;
}
// Blank line separates test cases
if ($line == "\n") {
$cases[] = $case;
$case = array();
} else {
$match = array();
$pat = '/^([a-z0-9_-]+) =\s+(.*?)\n$/';
if (!preg_match($pat, $line, $match)) {
trigger_error("Bad test input: $line", E_USER_ERROR);
}
$c = count($match);
if ($c != 3) {
trigger_error(
"Wrong number of elements in parsed case: $c",
E_USER_ERROR);
return false;
}
$key = $match[1];
$value = $match[2];
$case[$key] = $value;
}
}
if (count($case)) {
$cases[] = $case;
}
$final = array();
// Normalize strings and check data integrity
foreach ($cases as $case) {
$clean = array();
$clean["key"] =
Tests_Auth_OpenID_HMACSHA1::_strConvert($case["key"]);
if (Auth_OpenID::bytes($clean["key"]) != $case["key_len"]) {
trigger_error("Bad key length", E_USER_ERROR);
}
$clean["data"] =
Tests_Auth_OpenID_HMACSHA1::_strConvert($case["data"]);
if (Auth_OpenID::bytes($clean["data"]) != $case["data_len"]) {
trigger_error("Bad data length", E_USER_ERROR);
}
$clean["digest"] =
Tests_Auth_OpenID_HMACSHA1::_strConvert($case["digest"]);
if (Auth_OpenID::bytes($clean["digest"]) != 20) {
$l = Auth_OpenID::bytes($clean["digest"]);
trigger_error("Bad digest length: $l", E_USER_ERROR);
}
$clean['test_case'] = $case['test_case'];
$final[] = $clean;
}
return $final;
}
function Tests_Auth_OpenID_HMACSHA1($name)
{
$this->setName($name);
$cases = $this->_readTestCases();
foreach ($cases as $case) {
$test = new Tests_Auth_OpenID_HMACSHA1_TestCase(
$case['test_case'],
$case['key'],
$case['data'],
$case['digest']
);
$digest = $case['digest'];
$this->addTest($test);
}
}
}
?>
|