|
|
|
|
@@ -1,317 +0,0 @@
|
|
|
|
|
<?php
|
|
|
|
|
|
|
|
|
|
declare(strict_types=1);
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* The MIT License (MIT)
|
|
|
|
|
*
|
|
|
|
|
* Copyright (c) 2014-2020 Spomky-Labs
|
|
|
|
|
*
|
|
|
|
|
* This software may be modified and distributed under the terms
|
|
|
|
|
* of the MIT license. See the LICENSE file for details.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
namespace Jose\Component\Signature\Algorithm\Tests;
|
|
|
|
|
|
|
|
|
|
use Jose\Component\Core\AlgorithmManager;
|
|
|
|
|
use Jose\Component\Core\JWK;
|
|
|
|
|
use Jose\Component\Signature\Algorithm\HS256;
|
|
|
|
|
use Jose\Component\Signature\JWSBuilder;
|
|
|
|
|
use Jose\Component\Signature\JWSVerifier;
|
|
|
|
|
use Jose\Component\Signature\Serializer;
|
|
|
|
|
use PHPUnit\Framework\TestCase;
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.4
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.5
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.6
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.7
|
|
|
|
|
*
|
|
|
|
|
* @group HMAC
|
|
|
|
|
* @group RFC7520
|
|
|
|
|
*
|
|
|
|
|
* @internal
|
|
|
|
|
*/
|
|
|
|
|
class HMACFromRFC7520Test extends TestCase
|
|
|
|
|
{
|
|
|
|
|
/**
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.4
|
|
|
|
|
*
|
|
|
|
|
* @test
|
|
|
|
|
*/
|
|
|
|
|
public function hS256(): void
|
|
|
|
|
{
|
|
|
|
|
/*
|
|
|
|
|
* Payload
|
|
|
|
|
* Symmetric Key
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-3.5
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.4.1
|
|
|
|
|
*/
|
|
|
|
|
$payload = "It\xe2\x80\x99s a dangerous business, Frodo, going out your door. You step onto the road, and if you don't keep your feet, there\xe2\x80\x99s no knowing where you might be swept off to.";
|
|
|
|
|
$key = new JWK([
|
|
|
|
|
'kty' => 'oct',
|
|
|
|
|
'kid' => '018c0ae5-4d9b-471b-bfd6-eef314bc7037',
|
|
|
|
|
'use' => 'sig',
|
|
|
|
|
'alg' => 'HS256',
|
|
|
|
|
'k' => 'hJtXIZ2uSN5kbQfbtTNWbpdmhkV8FJG-Onbc6mxCcYg',
|
|
|
|
|
]);
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Header
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.4.2
|
|
|
|
|
*/
|
|
|
|
|
$header = [
|
|
|
|
|
'alg' => 'HS256',
|
|
|
|
|
'kid' => '018c0ae5-4d9b-471b-bfd6-eef314bc7037',
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
$jwsBuilder = new JWSBuilder(
|
|
|
|
|
new AlgorithmManager([new HS256()])
|
|
|
|
|
);
|
|
|
|
|
$jwsVerifier = new JWSVerifier(
|
|
|
|
|
new AlgorithmManager([new HS256()])
|
|
|
|
|
);
|
|
|
|
|
$compactSerializer = new Serializer\CompactSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jsonFlattenedSerializer = new Serializer\JSONFlattenedSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jsonGeneralSerializer = new Serializer\JSONGeneralSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jws = $jwsBuilder
|
|
|
|
|
->create()->withPayload($payload)
|
|
|
|
|
->addSignature($key, $header)
|
|
|
|
|
->build()
|
|
|
|
|
;
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Header
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.4.3
|
|
|
|
|
*/
|
|
|
|
|
$expected_compact_json = 'eyJhbGciOiJIUzI1NiIsImtpZCI6IjAxOGMwYWU1LTRkOWItNDcxYi1iZmQ2LWVlZjMxNGJjNzAzNyJ9.SXTigJlzIGEgZGFuZ2Vyb3VzIGJ1c2luZXNzLCBGcm9kbywgZ29pbmcgb3V0IHlvdXIgZG9vci4gWW91IHN0ZXAgb250byB0aGUgcm9hZCwgYW5kIGlmIHlvdSBkb24ndCBrZWVwIHlvdXIgZmVldCwgdGhlcmXigJlzIG5vIGtub3dpbmcgd2hlcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4.s0h6KThzkfBBBkLspW1h84VsJZFTsPPqMDA7g1Md7p0';
|
|
|
|
|
$expected_flattened_json = '{"payload":"SXTigJlzIGEgZGFuZ2Vyb3VzIGJ1c2luZXNzLCBGcm9kbywgZ29pbmcgb3V0IHlvdXIgZG9vci4gWW91IHN0ZXAgb250byB0aGUgcm9hZCwgYW5kIGlmIHlvdSBkb24ndCBrZWVwIHlvdXIgZmVldCwgdGhlcmXigJlzIG5vIGtub3dpbmcgd2hlcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4","protected":"eyJhbGciOiJIUzI1NiIsImtpZCI6IjAxOGMwYWU1LTRkOWItNDcxYi1iZmQ2LWVlZjMxNGJjNzAzNyJ9","signature":"s0h6KThzkfBBBkLspW1h84VsJZFTsPPqMDA7g1Md7p0"}';
|
|
|
|
|
$expected_json = '{"payload":"SXTigJlzIGEgZGFuZ2Vyb3VzIGJ1c2luZXNzLCBGcm9kbywgZ29pbmcgb3V0IHlvdXIgZG9vci4gWW91IHN0ZXAgb250byB0aGUgcm9hZCwgYW5kIGlmIHlvdSBkb24ndCBrZWVwIHlvdXIgZmVldCwgdGhlcmXigJlzIG5vIGtub3dpbmcgd2hlcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4","signatures":[{"protected":"eyJhbGciOiJIUzI1NiIsImtpZCI6IjAxOGMwYWU1LTRkOWItNDcxYi1iZmQ2LWVlZjMxNGJjNzAzNyJ9","signature":"s0h6KThzkfBBBkLspW1h84VsJZFTsPPqMDA7g1Md7p0"}]}';
|
|
|
|
|
|
|
|
|
|
static::assertEquals($expected_compact_json, $compactSerializer->serialize($jws, 0));
|
|
|
|
|
|
|
|
|
|
// We decode the json to compare the 2 arrays otherwise the test may fail as the order may be different
|
|
|
|
|
static::assertEquals(json_decode($expected_flattened_json, true), json_decode($jsonFlattenedSerializer->serialize($jws, 0), true));
|
|
|
|
|
static::assertEquals(json_decode($expected_json, true), json_decode($jsonGeneralSerializer->serialize($jws, 0), true));
|
|
|
|
|
|
|
|
|
|
$loaded_compact_json = $compactSerializer->unserialize($expected_compact_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_compact_json, $key, 0));
|
|
|
|
|
|
|
|
|
|
$loaded_flattened_json = $jsonFlattenedSerializer->unserialize($expected_flattened_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_flattened_json, $key, 0));
|
|
|
|
|
|
|
|
|
|
$loaded_json = $jsonGeneralSerializer->unserialize($expected_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_json, $key, 0));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.5
|
|
|
|
|
*
|
|
|
|
|
* @test
|
|
|
|
|
*/
|
|
|
|
|
public function hS256WithDetachedPayload(): void
|
|
|
|
|
{
|
|
|
|
|
/*
|
|
|
|
|
* Payload
|
|
|
|
|
* Symmetric Key
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-3.5
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.5.1
|
|
|
|
|
*/
|
|
|
|
|
$payload = "It\xe2\x80\x99s a dangerous business, Frodo, going out your door. You step onto the road, and if you don't keep your feet, there\xe2\x80\x99s no knowing where you might be swept off to.";
|
|
|
|
|
$key = new JWK([
|
|
|
|
|
'kty' => 'oct',
|
|
|
|
|
'kid' => '018c0ae5-4d9b-471b-bfd6-eef314bc7037',
|
|
|
|
|
'use' => 'sig',
|
|
|
|
|
'alg' => 'HS256',
|
|
|
|
|
'k' => 'hJtXIZ2uSN5kbQfbtTNWbpdmhkV8FJG-Onbc6mxCcYg',
|
|
|
|
|
]);
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Header
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.5.2
|
|
|
|
|
*/
|
|
|
|
|
$header = [
|
|
|
|
|
'alg' => 'HS256',
|
|
|
|
|
'kid' => '018c0ae5-4d9b-471b-bfd6-eef314bc7037',
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
$jwsBuilder = new JWSBuilder(
|
|
|
|
|
new AlgorithmManager([new HS256()])
|
|
|
|
|
);
|
|
|
|
|
$jwsVerifier = new JWSVerifier(
|
|
|
|
|
new AlgorithmManager([new HS256()])
|
|
|
|
|
);
|
|
|
|
|
$compactSerializer = new Serializer\CompactSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jsonFlattenedSerializer = new Serializer\JSONFlattenedSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jsonGeneralSerializer = new Serializer\JSONGeneralSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jws = $jwsBuilder
|
|
|
|
|
->create()->withPayload($payload, true)
|
|
|
|
|
->addSignature($key, $header)
|
|
|
|
|
->build()
|
|
|
|
|
;
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Header
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.5.3
|
|
|
|
|
*/
|
|
|
|
|
$expected_compact_json = 'eyJhbGciOiJIUzI1NiIsImtpZCI6IjAxOGMwYWU1LTRkOWItNDcxYi1iZmQ2LWVlZjMxNGJjNzAzNyJ9..s0h6KThzkfBBBkLspW1h84VsJZFTsPPqMDA7g1Md7p0';
|
|
|
|
|
$expected_flattened_json = '{"protected":"eyJhbGciOiJIUzI1NiIsImtpZCI6IjAxOGMwYWU1LTRkOWItNDcxYi1iZmQ2LWVlZjMxNGJjNzAzNyJ9","signature":"s0h6KThzkfBBBkLspW1h84VsJZFTsPPqMDA7g1Md7p0"}';
|
|
|
|
|
$expected_json = '{"signatures":[{"protected":"eyJhbGciOiJIUzI1NiIsImtpZCI6IjAxOGMwYWU1LTRkOWItNDcxYi1iZmQ2LWVlZjMxNGJjNzAzNyJ9","signature":"s0h6KThzkfBBBkLspW1h84VsJZFTsPPqMDA7g1Md7p0"}]}';
|
|
|
|
|
|
|
|
|
|
static::assertEquals($expected_compact_json, $compactSerializer->serialize($jws, 0));
|
|
|
|
|
|
|
|
|
|
// We decode the json to compare the 2 arrays otherwise the test may fail as the order may be different
|
|
|
|
|
static::assertEquals(json_decode($expected_flattened_json, true), json_decode($jsonFlattenedSerializer->serialize($jws, 0), true));
|
|
|
|
|
|
|
|
|
|
static::assertEquals(json_decode($expected_json, true), json_decode($jsonGeneralSerializer->serialize($jws, 0), true));
|
|
|
|
|
|
|
|
|
|
$loaded_compact_json = $compactSerializer->unserialize($expected_compact_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_compact_json, $key, 0, $payload));
|
|
|
|
|
|
|
|
|
|
$loaded_flattened_json = $jsonFlattenedSerializer->unserialize($expected_flattened_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_flattened_json, $key, 0, $payload));
|
|
|
|
|
|
|
|
|
|
$loaded_json = $jsonGeneralSerializer->unserialize($expected_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_json, $key, 0, $payload));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.6
|
|
|
|
|
*
|
|
|
|
|
* @test
|
|
|
|
|
*/
|
|
|
|
|
public function hS256WithUnprotectedHeader(): void
|
|
|
|
|
{
|
|
|
|
|
/*
|
|
|
|
|
* Payload
|
|
|
|
|
* Symmetric Key
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-3.5
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.6.1
|
|
|
|
|
*/
|
|
|
|
|
$payload = "It\xe2\x80\x99s a dangerous business, Frodo, going out your door. You step onto the road, and if you don't keep your feet, there\xe2\x80\x99s no knowing where you might be swept off to.";
|
|
|
|
|
$key = new JWK([
|
|
|
|
|
'kty' => 'oct',
|
|
|
|
|
'kid' => '018c0ae5-4d9b-471b-bfd6-eef314bc7037',
|
|
|
|
|
'use' => 'sig',
|
|
|
|
|
'alg' => 'HS256',
|
|
|
|
|
'k' => 'hJtXIZ2uSN5kbQfbtTNWbpdmhkV8FJG-Onbc6mxCcYg',
|
|
|
|
|
]);
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Header
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.6.2
|
|
|
|
|
*/
|
|
|
|
|
$protectedHeader = [
|
|
|
|
|
'alg' => 'HS256',
|
|
|
|
|
];
|
|
|
|
|
$unprotectedHeader = [
|
|
|
|
|
'kid' => '018c0ae5-4d9b-471b-bfd6-eef314bc7037',
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
$jwsBuilder = new JWSBuilder(
|
|
|
|
|
new AlgorithmManager([new HS256()])
|
|
|
|
|
);
|
|
|
|
|
$jwsVerifier = new JWSVerifier(
|
|
|
|
|
new AlgorithmManager([new HS256()])
|
|
|
|
|
);
|
|
|
|
|
$compactSerializer = new Serializer\CompactSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jsonFlattenedSerializer = new Serializer\JSONFlattenedSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jsonGeneralSerializer = new Serializer\JSONGeneralSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jws = $jwsBuilder
|
|
|
|
|
->create()->withPayload($payload)
|
|
|
|
|
->addSignature($key, $protectedHeader, $unprotectedHeader)
|
|
|
|
|
->build()
|
|
|
|
|
;
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Header
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.6.3
|
|
|
|
|
*/
|
|
|
|
|
$expected_flattened_json = '{"payload": "SXTigJlzIGEgZGFuZ2Vyb3VzIGJ1c2luZXNzLCBGcm9kbywgZ29pbmcgb3V0IHlvdXIgZG9vci4gWW91IHN0ZXAgb250byB0aGUgcm9hZCwgYW5kIGlmIHlvdSBkb24ndCBrZWVwIHlvdXIgZmVldCwgdGhlcmXigJlzIG5vIGtub3dpbmcgd2hlcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4","protected": "eyJhbGciOiJIUzI1NiJ9","header": {"kid": "018c0ae5-4d9b-471b-bfd6-eef314bc7037"},"signature": "bWUSVaxorn7bEF1djytBd0kHv70Ly5pvbomzMWSOr20"}';
|
|
|
|
|
$expected_json = '{"payload":"SXTigJlzIGEgZGFuZ2Vyb3VzIGJ1c2luZXNzLCBGcm9kbywgZ29pbmcgb3V0IHlvdXIgZG9vci4gWW91IHN0ZXAgb250byB0aGUgcm9hZCwgYW5kIGlmIHlvdSBkb24ndCBrZWVwIHlvdXIgZmVldCwgdGhlcmXigJlzIG5vIGtub3dpbmcgd2hlcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4","signatures":[{"protected":"eyJhbGciOiJIUzI1NiJ9","header":{"kid":"018c0ae5-4d9b-471b-bfd6-eef314bc7037"},"signature":"bWUSVaxorn7bEF1djytBd0kHv70Ly5pvbomzMWSOr20"}]}';
|
|
|
|
|
|
|
|
|
|
// We decode the json to compare the 2 arrays otherwise the test may fail as the order may be different
|
|
|
|
|
static::assertEquals(json_decode($expected_flattened_json, true), json_decode($jsonFlattenedSerializer->serialize($jws, 0), true));
|
|
|
|
|
static::assertEquals(json_decode($expected_json, true), json_decode($jsonGeneralSerializer->serialize($jws, 0), true));
|
|
|
|
|
|
|
|
|
|
$loaded_flattened_json = $jsonFlattenedSerializer->unserialize($expected_flattened_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_flattened_json, $key, 0));
|
|
|
|
|
|
|
|
|
|
$loaded_json = $jsonGeneralSerializer->unserialize($expected_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_json, $key, 0));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.7
|
|
|
|
|
*
|
|
|
|
|
* @test
|
|
|
|
|
*/
|
|
|
|
|
public function hS256WithoutProtectedHeader(): void
|
|
|
|
|
{
|
|
|
|
|
/*
|
|
|
|
|
* Payload
|
|
|
|
|
* Symmetric Key
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-3.5
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.7.1
|
|
|
|
|
*/
|
|
|
|
|
$payload = "It\xe2\x80\x99s a dangerous business, Frodo, going out your door. You step onto the road, and if you don't keep your feet, there\xe2\x80\x99s no knowing where you might be swept off to.";
|
|
|
|
|
$key = new JWK([
|
|
|
|
|
'kty' => 'oct',
|
|
|
|
|
'kid' => '018c0ae5-4d9b-471b-bfd6-eef314bc7037',
|
|
|
|
|
'use' => 'sig',
|
|
|
|
|
'alg' => 'HS256',
|
|
|
|
|
'k' => 'hJtXIZ2uSN5kbQfbtTNWbpdmhkV8FJG-Onbc6mxCcYg',
|
|
|
|
|
]);
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Header
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.7.2
|
|
|
|
|
*/
|
|
|
|
|
$unprotectedHeader = [
|
|
|
|
|
'alg' => 'HS256',
|
|
|
|
|
'kid' => '018c0ae5-4d9b-471b-bfd6-eef314bc7037',
|
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
$jwsBuilder = new JWSBuilder(
|
|
|
|
|
new AlgorithmManager([new HS256()])
|
|
|
|
|
);
|
|
|
|
|
$jwsVerifier = new JWSVerifier(
|
|
|
|
|
new AlgorithmManager([new HS256()])
|
|
|
|
|
);
|
|
|
|
|
$jsonFlattenedSerializer = new Serializer\JSONFlattenedSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jsonGeneralSerializer = new Serializer\JSONGeneralSerializer(
|
|
|
|
|
);
|
|
|
|
|
$jws = $jwsBuilder
|
|
|
|
|
->create()->withPayload($payload)
|
|
|
|
|
->addSignature($key, [], $unprotectedHeader)
|
|
|
|
|
->build()
|
|
|
|
|
;
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Header
|
|
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-4.7.3
|
|
|
|
|
*/
|
|
|
|
|
$expected_flattened_json = '{"payload":"SXTigJlzIGEgZGFuZ2Vyb3VzIGJ1c2luZXNzLCBGcm9kbywgZ29pbmcgb3V0IHlvdXIgZG9vci4gWW91IHN0ZXAgb250byB0aGUgcm9hZCwgYW5kIGlmIHlvdSBkb24ndCBrZWVwIHlvdXIgZmVldCwgdGhlcmXigJlzIG5vIGtub3dpbmcgd2hlcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4","header":{"alg":"HS256","kid":"018c0ae5-4d9b-471b-bfd6-eef314bc7037"},"signature":"xuLifqLGiblpv9zBpuZczWhNj1gARaLV3UxvxhJxZuk"}';
|
|
|
|
|
$expected_json = '{"payload":"SXTigJlzIGEgZGFuZ2Vyb3VzIGJ1c2luZXNzLCBGcm9kbywgZ29pbmcgb3V0IHlvdXIgZG9vci4gWW91IHN0ZXAgb250byB0aGUgcm9hZCwgYW5kIGlmIHlvdSBkb24ndCBrZWVwIHlvdXIgZmVldCwgdGhlcmXigJlzIG5vIGtub3dpbmcgd2hlcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4","signatures":[{"header":{"alg":"HS256","kid":"018c0ae5-4d9b-471b-bfd6-eef314bc7037"},"signature":"xuLifqLGiblpv9zBpuZczWhNj1gARaLV3UxvxhJxZuk"}]}';
|
|
|
|
|
|
|
|
|
|
// We decode the json to compare the 2 arrays otherwise the test may fail as the order may be different
|
|
|
|
|
static::assertEquals(json_decode($expected_flattened_json, true), json_decode($jsonFlattenedSerializer->serialize($jws, 0), true));
|
|
|
|
|
static::assertEquals(json_decode($expected_json, true), json_decode($jsonGeneralSerializer->serialize($jws, 0), true));
|
|
|
|
|
|
|
|
|
|
$loaded_flattened_json = $jsonFlattenedSerializer->unserialize($expected_flattened_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_flattened_json, $key, 0));
|
|
|
|
|
|
|
|
|
|
$loaded_json = $jsonGeneralSerializer->unserialize($expected_json);
|
|
|
|
|
static::assertTrue($jwsVerifier->verifyWithKey($loaded_json, $key, 0));
|
|
|
|
|
}
|
|
|
|
|
}
|