1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
|
--TEST--
Test interoperability of password_hash('argon2i')
--EXTENSIONS--
sodium
--SKIPIF--
<?php
if (!function_exists('sodium_crypto_pwhash_str_verify')) {
echo "skip - No crypto_pwhash_str_verify";
}
if (!in_array('argon2i', password_algos(), true /* strict */)) {
echo "skip - No argon2i support in password_hash()";
}
?>
--FILE--
<?php
echo 'Argon2 provider: ';
var_dump(PASSWORD_ARGON2_PROVIDER);
foreach([1, 2] as $mem) {
foreach([1, 2] as $time) {
$opts = [
'memory_cost' => PASSWORD_ARGON2_DEFAULT_MEMORY_COST * $mem,
'time_cost' => PASSWORD_ARGON2_DEFAULT_TIME_COST * $time,
'threads' => PASSWORD_ARGON2_DEFAULT_THREADS,
];
$password = random_bytes(32);
echo "Using password: ";
var_dump(base64_encode($password));
$hash = password_hash($password, 'argon2i', $opts);
echo "Hash: "; var_dump($hash);
var_dump(sodium_crypto_pwhash_str_verify($hash, $password));
// And verify that incorrect passwords fail.
$password[0] = chr(ord($password[0]) ^ 1);
var_dump(sodium_crypto_pwhash_str_verify($hash, $password));
}
}
?>
--EXPECTF--
Argon2 provider: string(%d) "%s"
Using password: string(44) "%s"
Hash: string(96) "$argon2i$v=19$m=65536,t=4,p=1$%s$%s"
bool(true)
bool(false)
Using password: string(44) "%s"
Hash: string(96) "$argon2i$v=19$m=65536,t=8,p=1$%s$%s"
bool(true)
bool(false)
Using password: string(44) "%s"
Hash: string(97) "$argon2i$v=19$m=131072,t=4,p=1$%s$%s"
bool(true)
bool(false)
Using password: string(44) "%s"
Hash: string(97) "$argon2i$v=19$m=131072,t=8,p=1$%s$%s"
bool(true)
bool(false)
|