|
1
|
|
|
<?php |
|
2
|
|
|
|
|
3
|
|
|
/* |
|
4
|
|
|
* The MIT License (MIT) |
|
5
|
|
|
* |
|
6
|
|
|
* Copyright (c) 2014-2016 Spomky-Labs |
|
7
|
|
|
* |
|
8
|
|
|
* This software may be modified and distributed under the terms |
|
9
|
|
|
* of the MIT license. See the LICENSE file for details. |
|
10
|
|
|
*/ |
|
11
|
|
|
|
|
12
|
|
|
namespace Jose\Test\RFC7520; |
|
13
|
|
|
|
|
14
|
|
|
use Base64Url\Base64Url; |
|
15
|
|
|
use Jose\Factory\DecrypterFactory; |
|
16
|
|
|
use Jose\Factory\EncrypterFactory; |
|
17
|
|
|
use Jose\Factory\JWEFactory; |
|
18
|
|
|
use Jose\Loader; |
|
19
|
|
|
use Jose\Object\JWK; |
|
20
|
|
|
|
|
21
|
|
|
/** |
|
22
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-5.13 |
|
23
|
|
|
* |
|
24
|
|
|
* @group RFC7520 |
|
25
|
|
|
*/ |
|
26
|
|
|
class MultipleRecipientEncryptionTest extends \PHPUnit_Framework_TestCase |
|
27
|
|
|
{ |
|
28
|
|
|
/** |
|
29
|
|
|
* Please note that we cannot the encryption and get the same result as the example (IV, TAG and other data are always different). |
|
30
|
|
|
* The output given in the RFC is used and only decrypted. |
|
31
|
|
|
*/ |
|
32
|
|
|
public function testMultipleRecipientEncryption() |
|
33
|
|
|
{ |
|
34
|
|
|
$expected_payload = "You can trust us to stick with you through thick and thin\xe2\x80\x93to the bitter end. And you can trust us to keep any secret of yours\xe2\x80\x93closer than you keep it yourself. But you cannot trust us to let you face trouble alone, and go off without a word. We are your friends, Frodo."; |
|
35
|
|
|
|
|
36
|
|
|
$recipient_1_private_key = new JWK([ |
|
37
|
|
|
'kty' => 'RSA', |
|
38
|
|
|
'kid' => '[email protected]', |
|
39
|
|
|
'use' => 'enc', |
|
40
|
|
|
'n' => 'maxhbsmBtdQ3CNrKvprUE6n9lYcregDMLYNeTAWcLj8NnPU9XIYegTHVHQjxKDSHP2l-F5jS7sppG1wgdAqZyhnWvXhYNvcM7RfgKxqNx_xAHx6f3yy7s-M9PSNCwPC2lh6UAkR4I00EhV9lrypM9Pi4lBUop9t5fS9W5UNwaAllhrd-osQGPjIeI1deHTwx-ZTHu3C60Pu_LJIl6hKn9wbwaUmA4cR5Bd2pgbaY7ASgsjCUbtYJaNIHSoHXprUdJZKUMAzV0WOKPfA6OPI4oypBadjvMZ4ZAj3BnXaSYsEZhaueTXvZB4eZOAjIyh2e_VOIKVMsnDrJYAVotGlvMQ', |
|
41
|
|
|
'e' => 'AQAB', |
|
42
|
|
|
'd' => 'Kn9tgoHfiTVi8uPu5b9TnwyHwG5dK6RE0uFdlpCGnJN7ZEi963R7wybQ1PLAHmpIbNTztfrheoAniRV1NCIqXaW_qS461xiDTp4ntEPnqcKsyO5jMAji7-CL8vhpYYowNFvIesgMoVaPRYMYT9TW63hNM0aWs7USZ_hLg6Oe1mY0vHTI3FucjSM86Nff4oIENt43r2fspgEPGRrdE6fpLc9Oaq-qeP1GFULimrRdndm-P8q8kvN3KHlNAtEgrQAgTTgz80S-3VD0FgWfgnb1PNmiuPUxO8OpI9KDIfu_acc6fg14nsNaJqXe6RESvhGPH2afjHqSy_Fd2vpzj85bQQ', |
|
43
|
|
|
'p' => '2DwQmZ43FoTnQ8IkUj3BmKRf5Eh2mizZA5xEJ2MinUE3sdTYKSLtaEoekX9vbBZuWxHdVhM6UnKCJ_2iNk8Z0ayLYHL0_G21aXf9-unynEpUsH7HHTklLpYAzOOx1ZgVljoxAdWNn3hiEFrjZLZGS7lOH-a3QQlDDQoJOJ2VFmU', |
|
44
|
|
|
'q' => 'te8LY4-W7IyaqH1ExujjMqkTAlTeRbv0VLQnfLY2xINnrWdwiQ93_VF099aP1ESeLja2nw-6iKIe-qT7mtCPozKfVtUYfz5HrJ_XY2kfexJINb9lhZHMv5p1skZpeIS-GPHCC6gRlKo1q-idn_qxyusfWv7WAxlSVfQfk8d6Et0', |
|
45
|
|
|
'dp' => 'UfYKcL_or492vVc0PzwLSplbg4L3-Z5wL48mwiswbpzOyIgd2xHTHQmjJpFAIZ8q-zf9RmgJXkDrFs9rkdxPtAsL1WYdeCT5c125Fkdg317JVRDo1inX7x2Kdh8ERCreW8_4zXItuTl_KiXZNU5lvMQjWbIw2eTx1lpsflo0rYU', |
|
46
|
|
|
'dq' => 'iEgcO-QfpepdH8FWd7mUFyrXdnOkXJBCogChY6YKuIHGc_p8Le9MbpFKESzEaLlN1Ehf3B6oGBl5Iz_ayUlZj2IoQZ82znoUrpa9fVYNot87ACfzIG7q9Mv7RiPAderZi03tkVXAdaBau_9vs5rS-7HMtxkVrxSUvJY14TkXlHE', |
|
47
|
|
|
'qi' => 'kC-lzZOqoFaZCr5l0tOVtREKoVqaAYhQiqIRGL-MzS4sCmRkxm5vZlXYx6RtE1n_AagjqajlkjieGlxTTThHD8Iga6foGBMaAr5uR1hGQpSc7Gl7CF1DZkBJMTQN6EshYzZfxW08mIO8M6Rzuh0beL6fG9mkDcIyPrBXx2bQ_mM', |
|
48
|
|
|
]); |
|
49
|
|
|
|
|
50
|
|
|
$recipient_2_private_key = new JWK([ |
|
51
|
|
|
'kty' => 'EC', |
|
52
|
|
|
'kid' => '[email protected]', |
|
53
|
|
|
'use' => 'enc', |
|
54
|
|
|
'crv' => 'P-384', |
|
55
|
|
|
'x' => 'YU4rRUzdmVqmRtWOs2OpDE_T5fsNIodcG8G5FWPrTPMyxpzsSOGaQLpe2FpxBmu2', |
|
56
|
|
|
'y' => 'A8-yxCHxkfBz3hKZfI1jUYMjUhsEveZ9THuwFjH2sCNdtksRJU7D5-SkgaFL1ETP', |
|
57
|
|
|
'd' => 'iTx2pk7wW-GqJkHcEkFQb2EFyYcO7RugmaW3mRrQVAOUiPommT0IdnYK2xDlZh-j', |
|
58
|
|
|
]); |
|
59
|
|
|
|
|
60
|
|
|
$recipient_3_private_key = new JWK([ |
|
61
|
|
|
'kty' => 'oct', |
|
62
|
|
|
'kid' => '18ec08e1-bfa9-4d95-b205-2b4dd1d4321d', |
|
63
|
|
|
'use' => 'enc', |
|
64
|
|
|
'alg' => 'A256GCMKW', |
|
65
|
|
|
'k' => 'qC57l_uxcm7Nm3K-ct4GFjx8tM1U8CZ0NLBvdQstiS8', |
|
66
|
|
|
]); |
|
67
|
|
|
|
|
68
|
|
|
$protected_headers = [ |
|
69
|
|
|
'enc' => 'A128CBC-HS256', |
|
70
|
|
|
]; |
|
71
|
|
|
|
|
72
|
|
|
$headers = [ |
|
73
|
|
|
'cty' => 'text/plain', |
|
74
|
|
|
]; |
|
75
|
|
|
|
|
76
|
|
|
$recipient_1_headers = [ |
|
77
|
|
|
'alg' => 'RSA1_5', |
|
78
|
|
|
'kid' => '[email protected]', |
|
79
|
|
|
]; |
|
80
|
|
|
|
|
81
|
|
|
$recipient_2_headers = [ |
|
82
|
|
|
'alg' => 'ECDH-ES+A256KW', |
|
83
|
|
|
'kid' => '[email protected]', |
|
84
|
|
|
'epk' => [ |
|
85
|
|
|
'kty' => 'EC', |
|
86
|
|
|
'crv' => 'P-384', |
|
87
|
|
|
'x' => 'Uzdvk3pi5wKCRc1izp5_r0OjeqT-I68i8g2b8mva8diRhsE2xAn2DtMRb25Ma2CX', |
|
88
|
|
|
'y' => 'VDrRyFJh-Kwd1EjAgmj5Eo-CTHAZ53MC7PjjpLioy3ylEjI1pOMbw91fzZ84pbfm', |
|
89
|
|
|
], ]; |
|
90
|
|
|
|
|
91
|
|
|
$recipient_3_headers = [ |
|
92
|
|
|
'alg' => 'A256GCMKW', |
|
93
|
|
|
'kid' => '18ec08e1-bfa9-4d95-b205-2b4dd1d4321d', |
|
94
|
|
|
'tag' => '59Nqh1LlYtVIhfD3pgRGvw', |
|
95
|
|
|
'iv' => 'AvpeoPZ9Ncn9mkBn', |
|
96
|
|
|
]; |
|
97
|
|
|
|
|
98
|
|
|
$expected_json = '{"recipients":[{"encrypted_key":"dYOD28kab0Vvf4ODgxVAJXgHcSZICSOp8M51zjwj4w6Y5G4XJQsNNIBiqyvUUAOcpL7S7-cFe7Pio7gV_Q06WmCSa-vhW6me4bWrBf7cHwEQJdXihidAYWVajJIaKMXMvFRMV6iDlRr076DFthg2_AV0_tSiV6xSEIFqt1xnYPpmP91tc5WJDOGb-wqjw0-b-S1laS11QVbuP78dQ7Fa0zAVzzjHX-xvyM2wxj_otxr9clN1LnZMbeYSrRicJK5xodvWgkpIdkMHo4LvdhRRvzoKzlic89jFWPlnBq_V4n5trGuExtp_-dbHcGlihqc_wGgho9fLMK8JOArYLcMDNQ","header":{"alg":"RSA1_5","kid":"[email protected]"}},{"encrypted_key":"ExInT0io9BqBMYF6-maw5tZlgoZXThD1zWKsHixJuw_elY4gSSId_w","header":{"alg":"ECDH-ES+A256KW","kid":"[email protected]","epk":{"kty":"EC","crv":"P-384","x":"Uzdvk3pi5wKCRc1izp5_r0OjeqT-I68i8g2b8mva8diRhsE2xAn2DtMRb25Ma2CX","y":"VDrRyFJh-Kwd1EjAgmj5Eo-CTHAZ53MC7PjjpLioy3ylEjI1pOMbw91fzZ84pbfm"}}},{"encrypted_key":"a7CclAejo_7JSuPB8zeagxXRam8dwCfmkt9-WyTpS1E","header":{"alg":"A256GCMKW","kid":"18ec08e1-bfa9-4d95-b205-2b4dd1d4321d","tag":"59Nqh1LlYtVIhfD3pgRGvw","iv":"AvpeoPZ9Ncn9mkBn"}}],"unprotected":{"cty":"text/plain"},"protected":"eyJlbmMiOiJBMTI4Q0JDLUhTMjU2In0","iv":"VgEIHY20EnzUtZFl2RpB1g","ciphertext":"ajm2Q-OpPXCr7-MHXicknb1lsxLdXxK_yLds0KuhJzfWK04SjdxQeSw2L9mu3a_k1C55kCQ_3xlkcVKC5yr__Is48VOoK0k63_QRM9tBURMFqLByJ8vOYQX0oJW4VUHJLmGhF-tVQWB7Kz8mr8zeE7txF0MSaP6ga7-siYxStR7_G07Thd1jh-zGT0wxM5g-VRORtq0K6AXpLlwEqRp7pkt2zRM0ZAXqSpe1O6FJ7FHLDyEFnD-zDIZukLpCbzhzMDLLw2-8I14FQrgi-iEuzHgIJFIJn2wh9Tj0cg_kOZy9BqMRZbmYXMY9YQjorZ_P_JYG3ARAIF3OjDNqpdYe-K_5Q5crGJSDNyij_ygEiItR5jssQVH2ofDQdLChtazE","tag":"BESYyFN7T09KY7i8zKs5_g"}'; |
|
99
|
|
|
$expected_iv = 'VgEIHY20EnzUtZFl2RpB1g'; |
|
100
|
|
|
$expected_recipient_1_encrypted_key = 'dYOD28kab0Vvf4ODgxVAJXgHcSZICSOp8M51zjwj4w6Y5G4XJQsNNIBiqyvUUAOcpL7S7-cFe7Pio7gV_Q06WmCSa-vhW6me4bWrBf7cHwEQJdXihidAYWVajJIaKMXMvFRMV6iDlRr076DFthg2_AV0_tSiV6xSEIFqt1xnYPpmP91tc5WJDOGb-wqjw0-b-S1laS11QVbuP78dQ7Fa0zAVzzjHX-xvyM2wxj_otxr9clN1LnZMbeYSrRicJK5xodvWgkpIdkMHo4LvdhRRvzoKzlic89jFWPlnBq_V4n5trGuExtp_-dbHcGlihqc_wGgho9fLMK8JOArYLcMDNQ'; |
|
101
|
|
|
$expected_recipient_2_encrypted_key = 'ExInT0io9BqBMYF6-maw5tZlgoZXThD1zWKsHixJuw_elY4gSSId_w'; |
|
102
|
|
|
$expected_recipient_3_encrypted_key = 'a7CclAejo_7JSuPB8zeagxXRam8dwCfmkt9-WyTpS1E'; |
|
103
|
|
|
$expected_ciphertext = 'ajm2Q-OpPXCr7-MHXicknb1lsxLdXxK_yLds0KuhJzfWK04SjdxQeSw2L9mu3a_k1C55kCQ_3xlkcVKC5yr__Is48VOoK0k63_QRM9tBURMFqLByJ8vOYQX0oJW4VUHJLmGhF-tVQWB7Kz8mr8zeE7txF0MSaP6ga7-siYxStR7_G07Thd1jh-zGT0wxM5g-VRORtq0K6AXpLlwEqRp7pkt2zRM0ZAXqSpe1O6FJ7FHLDyEFnD-zDIZukLpCbzhzMDLLw2-8I14FQrgi-iEuzHgIJFIJn2wh9Tj0cg_kOZy9BqMRZbmYXMY9YQjorZ_P_JYG3ARAIF3OjDNqpdYe-K_5Q5crGJSDNyij_ygEiItR5jssQVH2ofDQdLChtazE'; |
|
104
|
|
|
$expected_tag = 'BESYyFN7T09KY7i8zKs5_g'; |
|
105
|
|
|
|
|
106
|
|
|
$decrypter = DecrypterFactory::createDecrypter(['RSA1_5', 'ECDH-ES+A256KW', 'A256GCMKW', 'A128CBC-HS256']); |
|
107
|
|
|
|
|
108
|
|
|
$loaded_json = Loader::load($expected_json); |
|
109
|
|
|
$decrypter->decryptUsingKey($loaded_json, $recipient_1_private_key); |
|
|
|
|
|
|
110
|
|
|
|
|
111
|
|
|
$loaded_json = Loader::load($expected_json); |
|
112
|
|
|
$decrypter->decryptUsingKey($loaded_json, $recipient_2_private_key); |
|
|
|
|
|
|
113
|
|
|
|
|
114
|
|
|
$loaded_json = Loader::load($expected_json); |
|
115
|
|
|
$decrypter->decryptUsingKey($loaded_json, $recipient_3_private_key); |
|
|
|
|
|
|
116
|
|
|
|
|
117
|
|
|
$this->assertEquals($expected_ciphertext, Base64Url::encode($loaded_json->getCiphertext())); |
|
118
|
|
|
$this->assertEquals($protected_headers, $loaded_json->getSharedProtectedHeaders()); |
|
119
|
|
|
$this->assertEquals($expected_iv, Base64Url::encode($loaded_json->getIV())); |
|
120
|
|
|
$this->assertEquals($expected_recipient_1_encrypted_key, Base64Url::encode($loaded_json->getRecipient(0)->getEncryptedKey())); |
|
121
|
|
|
$this->assertEquals($expected_recipient_2_encrypted_key, Base64Url::encode($loaded_json->getRecipient(1)->getEncryptedKey())); |
|
122
|
|
|
$this->assertEquals($expected_recipient_3_encrypted_key, Base64Url::encode($loaded_json->getRecipient(2)->getEncryptedKey())); |
|
123
|
|
|
$this->assertEquals($recipient_1_headers, $loaded_json->getRecipient(0)->getHeaders()); |
|
124
|
|
|
$this->assertEquals($recipient_2_headers, $loaded_json->getRecipient(1)->getHeaders()); |
|
125
|
|
|
$this->assertEquals($recipient_3_headers, $loaded_json->getRecipient(2)->getHeaders()); |
|
126
|
|
|
$this->assertEquals($headers, $loaded_json->getSharedHeaders()); |
|
127
|
|
|
$this->assertEquals($expected_tag, Base64Url::encode($loaded_json->getTag())); |
|
128
|
|
|
|
|
129
|
|
|
$this->assertEquals($expected_payload, $loaded_json->getPayload()); |
|
130
|
|
|
} |
|
131
|
|
|
|
|
132
|
|
|
/** |
|
133
|
|
|
* Same input as before, but we perform the encryption first. |
|
134
|
|
|
*/ |
|
135
|
|
|
public function testMultipleRecipientEncryptionBis() |
|
136
|
|
|
{ |
|
137
|
|
|
$expected_payload = "You can trust us to stick with you through thick and thin\xe2\x80\x93to the bitter end. And you can trust us to keep any secret of yours\xe2\x80\x93closer than you keep it yourself. But you cannot trust us to let you face trouble alone, and go off without a word. We are your friends, Frodo."; |
|
138
|
|
|
|
|
139
|
|
|
$recipient_1_private_key = new JWK([ |
|
140
|
|
|
'kty' => 'RSA', |
|
141
|
|
|
'kid' => '[email protected]', |
|
142
|
|
|
'use' => 'enc', |
|
143
|
|
|
'n' => 'maxhbsmBtdQ3CNrKvprUE6n9lYcregDMLYNeTAWcLj8NnPU9XIYegTHVHQjxKDSHP2l-F5jS7sppG1wgdAqZyhnWvXhYNvcM7RfgKxqNx_xAHx6f3yy7s-M9PSNCwPC2lh6UAkR4I00EhV9lrypM9Pi4lBUop9t5fS9W5UNwaAllhrd-osQGPjIeI1deHTwx-ZTHu3C60Pu_LJIl6hKn9wbwaUmA4cR5Bd2pgbaY7ASgsjCUbtYJaNIHSoHXprUdJZKUMAzV0WOKPfA6OPI4oypBadjvMZ4ZAj3BnXaSYsEZhaueTXvZB4eZOAjIyh2e_VOIKVMsnDrJYAVotGlvMQ', |
|
144
|
|
|
'e' => 'AQAB', |
|
145
|
|
|
'd' => 'Kn9tgoHfiTVi8uPu5b9TnwyHwG5dK6RE0uFdlpCGnJN7ZEi963R7wybQ1PLAHmpIbNTztfrheoAniRV1NCIqXaW_qS461xiDTp4ntEPnqcKsyO5jMAji7-CL8vhpYYowNFvIesgMoVaPRYMYT9TW63hNM0aWs7USZ_hLg6Oe1mY0vHTI3FucjSM86Nff4oIENt43r2fspgEPGRrdE6fpLc9Oaq-qeP1GFULimrRdndm-P8q8kvN3KHlNAtEgrQAgTTgz80S-3VD0FgWfgnb1PNmiuPUxO8OpI9KDIfu_acc6fg14nsNaJqXe6RESvhGPH2afjHqSy_Fd2vpzj85bQQ', |
|
146
|
|
|
'p' => '2DwQmZ43FoTnQ8IkUj3BmKRf5Eh2mizZA5xEJ2MinUE3sdTYKSLtaEoekX9vbBZuWxHdVhM6UnKCJ_2iNk8Z0ayLYHL0_G21aXf9-unynEpUsH7HHTklLpYAzOOx1ZgVljoxAdWNn3hiEFrjZLZGS7lOH-a3QQlDDQoJOJ2VFmU', |
|
147
|
|
|
'q' => 'te8LY4-W7IyaqH1ExujjMqkTAlTeRbv0VLQnfLY2xINnrWdwiQ93_VF099aP1ESeLja2nw-6iKIe-qT7mtCPozKfVtUYfz5HrJ_XY2kfexJINb9lhZHMv5p1skZpeIS-GPHCC6gRlKo1q-idn_qxyusfWv7WAxlSVfQfk8d6Et0', |
|
148
|
|
|
'dp' => 'UfYKcL_or492vVc0PzwLSplbg4L3-Z5wL48mwiswbpzOyIgd2xHTHQmjJpFAIZ8q-zf9RmgJXkDrFs9rkdxPtAsL1WYdeCT5c125Fkdg317JVRDo1inX7x2Kdh8ERCreW8_4zXItuTl_KiXZNU5lvMQjWbIw2eTx1lpsflo0rYU', |
|
149
|
|
|
'dq' => 'iEgcO-QfpepdH8FWd7mUFyrXdnOkXJBCogChY6YKuIHGc_p8Le9MbpFKESzEaLlN1Ehf3B6oGBl5Iz_ayUlZj2IoQZ82znoUrpa9fVYNot87ACfzIG7q9Mv7RiPAderZi03tkVXAdaBau_9vs5rS-7HMtxkVrxSUvJY14TkXlHE', |
|
150
|
|
|
'qi' => 'kC-lzZOqoFaZCr5l0tOVtREKoVqaAYhQiqIRGL-MzS4sCmRkxm5vZlXYx6RtE1n_AagjqajlkjieGlxTTThHD8Iga6foGBMaAr5uR1hGQpSc7Gl7CF1DZkBJMTQN6EshYzZfxW08mIO8M6Rzuh0beL6fG9mkDcIyPrBXx2bQ_mM', |
|
151
|
|
|
]); |
|
152
|
|
|
|
|
153
|
|
|
$recipient_2_public_key = new JWK([ |
|
154
|
|
|
'kty' => 'EC', |
|
155
|
|
|
'kid' => '[email protected]', |
|
156
|
|
|
'use' => 'enc', |
|
157
|
|
|
'crv' => 'P-384', |
|
158
|
|
|
'x' => 'YU4rRUzdmVqmRtWOs2OpDE_T5fsNIodcG8G5FWPrTPMyxpzsSOGaQLpe2FpxBmu2', |
|
159
|
|
|
'y' => 'A8-yxCHxkfBz3hKZfI1jUYMjUhsEveZ9THuwFjH2sCNdtksRJU7D5-SkgaFL1ETP', |
|
160
|
|
|
]); |
|
161
|
|
|
|
|
162
|
|
|
$recipient_2_private_key = new JWK([ |
|
163
|
|
|
'kty' => 'EC', |
|
164
|
|
|
'kid' => '[email protected]', |
|
165
|
|
|
'use' => 'enc', |
|
166
|
|
|
'crv' => 'P-384', |
|
167
|
|
|
'x' => 'YU4rRUzdmVqmRtWOs2OpDE_T5fsNIodcG8G5FWPrTPMyxpzsSOGaQLpe2FpxBmu2', |
|
168
|
|
|
'y' => 'A8-yxCHxkfBz3hKZfI1jUYMjUhsEveZ9THuwFjH2sCNdtksRJU7D5-SkgaFL1ETP', |
|
169
|
|
|
'd' => 'iTx2pk7wW-GqJkHcEkFQb2EFyYcO7RugmaW3mRrQVAOUiPommT0IdnYK2xDlZh-j', |
|
170
|
|
|
]); |
|
171
|
|
|
|
|
172
|
|
|
$recipient_3_private_key = new JWK([ |
|
173
|
|
|
'kty' => 'oct', |
|
174
|
|
|
'kid' => '18ec08e1-bfa9-4d95-b205-2b4dd1d4321d', |
|
175
|
|
|
'use' => 'enc', |
|
176
|
|
|
'alg' => 'A256GCMKW', |
|
177
|
|
|
'k' => 'qC57l_uxcm7Nm3K-ct4GFjx8tM1U8CZ0NLBvdQstiS8', |
|
178
|
|
|
]); |
|
179
|
|
|
|
|
180
|
|
|
$protected_headers = [ |
|
181
|
|
|
'enc' => 'A128CBC-HS256', |
|
182
|
|
|
]; |
|
183
|
|
|
|
|
184
|
|
|
$headers = [ |
|
185
|
|
|
'cty' => 'text/plain', |
|
186
|
|
|
]; |
|
187
|
|
|
|
|
188
|
|
|
$recipient_1_headers = [ |
|
189
|
|
|
'alg' => 'RSA1_5', |
|
190
|
|
|
'kid' => '[email protected]', |
|
191
|
|
|
]; |
|
192
|
|
|
|
|
193
|
|
|
$recipient_2_headers = [ |
|
194
|
|
|
'alg' => 'ECDH-ES+A256KW', |
|
195
|
|
|
'kid' => '[email protected]', |
|
196
|
|
|
]; |
|
197
|
|
|
|
|
198
|
|
|
$recipient_3_headers = [ |
|
199
|
|
|
'alg' => 'A256GCMKW', |
|
200
|
|
|
'kid' => '18ec08e1-bfa9-4d95-b205-2b4dd1d4321d', |
|
201
|
|
|
]; |
|
202
|
|
|
|
|
203
|
|
|
$jwe = JWEFactory::createJWE($expected_payload, $protected_headers, $headers); |
|
204
|
|
|
$encrypter = EncrypterFactory::createEncrypter(['RSA1_5', 'ECDH-ES+A256KW', 'A256GCMKW', 'A128CBC-HS256']); |
|
205
|
|
|
|
|
206
|
|
|
$jwe = $jwe->addRecipient( |
|
207
|
|
|
$recipient_1_private_key, |
|
208
|
|
|
$recipient_1_headers |
|
209
|
|
|
); |
|
210
|
|
|
$jwe = $jwe->addRecipient( |
|
211
|
|
|
$recipient_2_public_key, |
|
212
|
|
|
$recipient_2_headers |
|
213
|
|
|
); |
|
214
|
|
|
$jwe = $jwe->addRecipient( |
|
215
|
|
|
$recipient_3_private_key, |
|
216
|
|
|
$recipient_3_headers |
|
217
|
|
|
); |
|
218
|
|
|
|
|
219
|
|
|
$encrypter->encrypt($jwe); |
|
220
|
|
|
|
|
221
|
|
|
$decrypter = DecrypterFactory::createDecrypter(['RSA1_5', 'ECDH-ES+A256KW', 'A256GCMKW', 'A128CBC-HS256']); |
|
222
|
|
|
|
|
223
|
|
|
$loaded_json = Loader::load($jwe->toJSON()); |
|
224
|
|
|
$decrypter->decryptUsingKey($loaded_json, $recipient_1_private_key); |
|
|
|
|
|
|
225
|
|
|
|
|
226
|
|
|
$loaded_json = Loader::load($jwe->toJSON()); |
|
227
|
|
|
$decrypter->decryptUsingKey($loaded_json, $recipient_2_private_key); |
|
|
|
|
|
|
228
|
|
|
|
|
229
|
|
|
$loaded_json = Loader::load($jwe->toJSON()); |
|
230
|
|
|
$decrypter->decryptUsingKey($loaded_json, $recipient_3_private_key); |
|
|
|
|
|
|
231
|
|
|
|
|
232
|
|
|
$this->assertEquals($protected_headers, $loaded_json->getSharedProtectedHeaders()); |
|
233
|
|
|
$this->assertEquals($recipient_1_headers, $loaded_json->getRecipient(0)->getHeaders()); |
|
234
|
|
|
$this->assertTrue(array_key_exists('epk', $loaded_json->getRecipient(1)->getHeaders())); |
|
235
|
|
|
$this->assertTrue(array_key_exists('iv', $loaded_json->getRecipient(2)->getHeaders())); |
|
236
|
|
|
$this->assertTrue(array_key_exists('tag', $loaded_json->getRecipient(2)->getHeaders())); |
|
237
|
|
|
$this->assertEquals($headers, $loaded_json->getSharedHeaders()); |
|
238
|
|
|
|
|
239
|
|
|
$this->assertEquals($expected_payload, $loaded_json->getPayload()); |
|
240
|
|
|
} |
|
241
|
|
|
} |
|
242
|
|
|
|
If a method or function can return multiple different values and unless you are sure that you only can receive a single value in this context, we recommend to add an additional type check:
If this a common case that PHP Analyzer should handle natively, please let us know by opening an issue.