|
1
|
|
|
<?php |
|
2
|
|
|
|
|
3
|
|
|
/* |
|
4
|
|
|
* The MIT License (MIT) |
|
5
|
|
|
* |
|
6
|
|
|
* Copyright (c) 2014-2016 Spomky-Labs |
|
7
|
|
|
* |
|
8
|
|
|
* This software may be modified and distributed under the terms |
|
9
|
|
|
* of the MIT license. See the LICENSE file for details. |
|
10
|
|
|
*/ |
|
11
|
|
|
|
|
12
|
|
|
namespace Jose\Test\RFC7520; |
|
13
|
|
|
|
|
14
|
|
|
use Base64Url\Base64Url; |
|
15
|
|
|
use Jose\Factory\DecrypterFactory; |
|
16
|
|
|
use Jose\Factory\EncrypterFactory; |
|
17
|
|
|
use Jose\Factory\JWEFactory; |
|
18
|
|
|
use Jose\Loader; |
|
19
|
|
|
use Jose\Object\JWK; |
|
20
|
|
|
|
|
21
|
|
|
/** |
|
22
|
|
|
* @see https://tools.ietf.org/html/rfc7520#section-5.1 |
|
23
|
|
|
* |
|
24
|
|
|
* @group RFC7520 |
|
25
|
|
|
*/ |
|
26
|
|
|
class RSA1_5AndA128CBC_HS256EncryptionTest extends \PHPUnit_Framework_TestCase |
|
27
|
|
|
{ |
|
28
|
|
|
/** |
|
29
|
|
|
* Please note that we cannot the encryption and get the same result as the example (IV, TAG and other data are always different). |
|
30
|
|
|
* The output given in the RFC is used and only decrypted. |
|
31
|
|
|
*/ |
|
32
|
|
|
public function testRSA1_5AndA128CBC_HS256Encryption() |
|
33
|
|
|
{ |
|
34
|
|
|
$expected_payload = "You can trust us to stick with you through thick and thin\xe2\x80\x93to the bitter end. And you can trust us to keep any secret of yours\xe2\x80\x93closer than you keep it yourself. But you cannot trust us to let you face trouble alone, and go off without a word. We are your friends, Frodo."; |
|
35
|
|
|
|
|
36
|
|
|
$private_key = new JWK([ |
|
37
|
|
|
'kty' => 'RSA', |
|
38
|
|
|
'kid' => '[email protected]', |
|
39
|
|
|
'use' => 'enc', |
|
40
|
|
|
'n' => 'maxhbsmBtdQ3CNrKvprUE6n9lYcregDMLYNeTAWcLj8NnPU9XIYegTHVHQjxKDSHP2l-F5jS7sppG1wgdAqZyhnWvXhYNvcM7RfgKxqNx_xAHx6f3yy7s-M9PSNCwPC2lh6UAkR4I00EhV9lrypM9Pi4lBUop9t5fS9W5UNwaAllhrd-osQGPjIeI1deHTwx-ZTHu3C60Pu_LJIl6hKn9wbwaUmA4cR5Bd2pgbaY7ASgsjCUbtYJaNIHSoHXprUdJZKUMAzV0WOKPfA6OPI4oypBadjvMZ4ZAj3BnXaSYsEZhaueTXvZB4eZOAjIyh2e_VOIKVMsnDrJYAVotGlvMQ', |
|
41
|
|
|
'e' => 'AQAB', |
|
42
|
|
|
'd' => 'Kn9tgoHfiTVi8uPu5b9TnwyHwG5dK6RE0uFdlpCGnJN7ZEi963R7wybQ1PLAHmpIbNTztfrheoAniRV1NCIqXaW_qS461xiDTp4ntEPnqcKsyO5jMAji7-CL8vhpYYowNFvIesgMoVaPRYMYT9TW63hNM0aWs7USZ_hLg6Oe1mY0vHTI3FucjSM86Nff4oIENt43r2fspgEPGRrdE6fpLc9Oaq-qeP1GFULimrRdndm-P8q8kvN3KHlNAtEgrQAgTTgz80S-3VD0FgWfgnb1PNmiuPUxO8OpI9KDIfu_acc6fg14nsNaJqXe6RESvhGPH2afjHqSy_Fd2vpzj85bQQ', |
|
43
|
|
|
'p' => '2DwQmZ43FoTnQ8IkUj3BmKRf5Eh2mizZA5xEJ2MinUE3sdTYKSLtaEoekX9vbBZuWxHdVhM6UnKCJ_2iNk8Z0ayLYHL0_G21aXf9-unynEpUsH7HHTklLpYAzOOx1ZgVljoxAdWNn3hiEFrjZLZGS7lOH-a3QQlDDQoJOJ2VFmU', |
|
44
|
|
|
'q' => 'te8LY4-W7IyaqH1ExujjMqkTAlTeRbv0VLQnfLY2xINnrWdwiQ93_VF099aP1ESeLja2nw-6iKIe-qT7mtCPozKfVtUYfz5HrJ_XY2kfexJINb9lhZHMv5p1skZpeIS-GPHCC6gRlKo1q-idn_qxyusfWv7WAxlSVfQfk8d6Et0', |
|
45
|
|
|
'dp' => 'UfYKcL_or492vVc0PzwLSplbg4L3-Z5wL48mwiswbpzOyIgd2xHTHQmjJpFAIZ8q-zf9RmgJXkDrFs9rkdxPtAsL1WYdeCT5c125Fkdg317JVRDo1inX7x2Kdh8ERCreW8_4zXItuTl_KiXZNU5lvMQjWbIw2eTx1lpsflo0rYU', |
|
46
|
|
|
'dq' => 'iEgcO-QfpepdH8FWd7mUFyrXdnOkXJBCogChY6YKuIHGc_p8Le9MbpFKESzEaLlN1Ehf3B6oGBl5Iz_ayUlZj2IoQZ82znoUrpa9fVYNot87ACfzIG7q9Mv7RiPAderZi03tkVXAdaBau_9vs5rS-7HMtxkVrxSUvJY14TkXlHE', |
|
47
|
|
|
'qi' => 'kC-lzZOqoFaZCr5l0tOVtREKoVqaAYhQiqIRGL-MzS4sCmRkxm5vZlXYx6RtE1n_AagjqajlkjieGlxTTThHD8Iga6foGBMaAr5uR1hGQpSc7Gl7CF1DZkBJMTQN6EshYzZfxW08mIO8M6Rzuh0beL6fG9mkDcIyPrBXx2bQ_mM', |
|
48
|
|
|
]); |
|
49
|
|
|
|
|
50
|
|
|
$protected_headers = [ |
|
51
|
|
|
'alg' => 'RSA1_5', |
|
52
|
|
|
'kid' => '[email protected]', |
|
53
|
|
|
'enc' => 'A128CBC-HS256', |
|
54
|
|
|
]; |
|
55
|
|
|
|
|
56
|
|
|
$expected_compact_json = 'eyJhbGciOiJSU0ExXzUiLCJraWQiOiJmcm9kby5iYWdnaW5zQGhvYmJpdG9uLmV4YW1wbGUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.laLxI0j-nLH-_BgLOXMozKxmy9gffy2gTdvqzfTihJBuuzxg0V7yk1WClnQePFvG2K-pvSlWc9BRIazDrn50RcRai__3TDON395H3c62tIouJJ4XaRvYHFjZTZ2GXfz8YAImcc91Tfk0WXC2F5Xbb71ClQ1DDH151tlpH77f2ff7xiSxh9oSewYrcGTSLUeeCt36r1Kt3OSj7EyBQXoZlN7IxbyhMAfgIe7Mv1rOTOI5I8NQqeXXW8VlzNmoxaGMny3YnGir5Wf6Qt2nBq4qDaPdnaAuuGUGEecelIO1wx1BpyIfgvfjOhMBs9M8XL223Fg47xlGsMXdfuY-4jaqVw.bbd5sTkYwhAIqfHsx8DayA.0fys_TY_na7f8dwSfXLiYdHaA2DxUjD67ieF7fcVbIR62JhJvGZ4_FNVSiGc_raa0HnLQ6s1P2sv3Xzl1p1l_o5wR_RsSzrS8Z-wnI3Jvo0mkpEEnlDmZvDu_k8OWzJv7eZVEqiWKdyVzFhPpiyQU28GLOpRc2VbVbK4dQKPdNTjPPEmRqcaGeTWZVyeSUvf5k59yJZxRuSvWFf6KrNtmRdZ8R4mDOjHSrM_s8uwIFcqt4r5GX8TKaI0zT5CbL5Qlw3sRc7u_hg0yKVOiRytEAEs3vZkcfLkP6nbXdC_PkMdNS-ohP78T2O6_7uInMGhFeX4ctHG7VelHGiT93JfWDEQi5_V9UN1rhXNrYu-0fVMkZAKX3VWi7lzA6BP430m.kvKuFBXHe5mQr4lqgobAUg'; |
|
57
|
|
|
$expected_flattened_json = '{"protected":"eyJhbGciOiJSU0ExXzUiLCJraWQiOiJmcm9kby5iYWdnaW5zQGhvYmJpdG9uLmV4YW1wbGUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0","encrypted_key":"laLxI0j-nLH-_BgLOXMozKxmy9gffy2gTdvqzfTihJBuuzxg0V7yk1WClnQePFvG2K-pvSlWc9BRIazDrn50RcRai__3TDON395H3c62tIouJJ4XaRvYHFjZTZ2GXfz8YAImcc91Tfk0WXC2F5Xbb71ClQ1DDH151tlpH77f2ff7xiSxh9oSewYrcGTSLUeeCt36r1Kt3OSj7EyBQXoZlN7IxbyhMAfgIe7Mv1rOTOI5I8NQqeXXW8VlzNmoxaGMny3YnGir5Wf6Qt2nBq4qDaPdnaAuuGUGEecelIO1wx1BpyIfgvfjOhMBs9M8XL223Fg47xlGsMXdfuY-4jaqVw","iv":"bbd5sTkYwhAIqfHsx8DayA","ciphertext":"0fys_TY_na7f8dwSfXLiYdHaA2DxUjD67ieF7fcVbIR62JhJvGZ4_FNVSiGc_raa0HnLQ6s1P2sv3Xzl1p1l_o5wR_RsSzrS8Z-wnI3Jvo0mkpEEnlDmZvDu_k8OWzJv7eZVEqiWKdyVzFhPpiyQU28GLOpRc2VbVbK4dQKPdNTjPPEmRqcaGeTWZVyeSUvf5k59yJZxRuSvWFf6KrNtmRdZ8R4mDOjHSrM_s8uwIFcqt4r5GX8TKaI0zT5CbL5Qlw3sRc7u_hg0yKVOiRytEAEs3vZkcfLkP6nbXdC_PkMdNS-ohP78T2O6_7uInMGhFeX4ctHG7VelHGiT93JfWDEQi5_V9UN1rhXNrYu-0fVMkZAKX3VWi7lzA6BP430m","tag":"kvKuFBXHe5mQr4lqgobAUg"}'; |
|
58
|
|
|
$expected_json = '{"recipients":[{"encrypted_key":"laLxI0j-nLH-_BgLOXMozKxmy9gffy2gTdvqzfTihJBuuzxg0V7yk1WClnQePFvG2K-pvSlWc9BRIazDrn50RcRai__3TDON395H3c62tIouJJ4XaRvYHFjZTZ2GXfz8YAImcc91Tfk0WXC2F5Xbb71ClQ1DDH151tlpH77f2ff7xiSxh9oSewYrcGTSLUeeCt36r1Kt3OSj7EyBQXoZlN7IxbyhMAfgIe7Mv1rOTOI5I8NQqeXXW8VlzNmoxaGMny3YnGir5Wf6Qt2nBq4qDaPdnaAuuGUGEecelIO1wx1BpyIfgvfjOhMBs9M8XL223Fg47xlGsMXdfuY-4jaqVw"}],"protected":"eyJhbGciOiJSU0ExXzUiLCJraWQiOiJmcm9kby5iYWdnaW5zQGhvYmJpdG9uLmV4YW1wbGUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0","iv":"bbd5sTkYwhAIqfHsx8DayA","ciphertext":"0fys_TY_na7f8dwSfXLiYdHaA2DxUjD67ieF7fcVbIR62JhJvGZ4_FNVSiGc_raa0HnLQ6s1P2sv3Xzl1p1l_o5wR_RsSzrS8Z-wnI3Jvo0mkpEEnlDmZvDu_k8OWzJv7eZVEqiWKdyVzFhPpiyQU28GLOpRc2VbVbK4dQKPdNTjPPEmRqcaGeTWZVyeSUvf5k59yJZxRuSvWFf6KrNtmRdZ8R4mDOjHSrM_s8uwIFcqt4r5GX8TKaI0zT5CbL5Qlw3sRc7u_hg0yKVOiRytEAEs3vZkcfLkP6nbXdC_PkMdNS-ohP78T2O6_7uInMGhFeX4ctHG7VelHGiT93JfWDEQi5_V9UN1rhXNrYu-0fVMkZAKX3VWi7lzA6BP430m","tag":"kvKuFBXHe5mQr4lqgobAUg"}'; |
|
59
|
|
|
$expected_iv = 'bbd5sTkYwhAIqfHsx8DayA'; |
|
60
|
|
|
$expected_encrypted_key = 'laLxI0j-nLH-_BgLOXMozKxmy9gffy2gTdvqzfTihJBuuzxg0V7yk1WClnQePFvG2K-pvSlWc9BRIazDrn50RcRai__3TDON395H3c62tIouJJ4XaRvYHFjZTZ2GXfz8YAImcc91Tfk0WXC2F5Xbb71ClQ1DDH151tlpH77f2ff7xiSxh9oSewYrcGTSLUeeCt36r1Kt3OSj7EyBQXoZlN7IxbyhMAfgIe7Mv1rOTOI5I8NQqeXXW8VlzNmoxaGMny3YnGir5Wf6Qt2nBq4qDaPdnaAuuGUGEecelIO1wx1BpyIfgvfjOhMBs9M8XL223Fg47xlGsMXdfuY-4jaqVw'; |
|
61
|
|
|
$expected_ciphertext = '0fys_TY_na7f8dwSfXLiYdHaA2DxUjD67ieF7fcVbIR62JhJvGZ4_FNVSiGc_raa0HnLQ6s1P2sv3Xzl1p1l_o5wR_RsSzrS8Z-wnI3Jvo0mkpEEnlDmZvDu_k8OWzJv7eZVEqiWKdyVzFhPpiyQU28GLOpRc2VbVbK4dQKPdNTjPPEmRqcaGeTWZVyeSUvf5k59yJZxRuSvWFf6KrNtmRdZ8R4mDOjHSrM_s8uwIFcqt4r5GX8TKaI0zT5CbL5Qlw3sRc7u_hg0yKVOiRytEAEs3vZkcfLkP6nbXdC_PkMdNS-ohP78T2O6_7uInMGhFeX4ctHG7VelHGiT93JfWDEQi5_V9UN1rhXNrYu-0fVMkZAKX3VWi7lzA6BP430m'; |
|
62
|
|
|
$expected_tag = 'kvKuFBXHe5mQr4lqgobAUg'; |
|
63
|
|
|
|
|
64
|
|
|
$decrypter = DecrypterFactory::createDecrypter(['A128CBC-HS256', 'RSA1_5']); |
|
65
|
|
|
|
|
66
|
|
|
$loaded_compact_json = Loader::load($expected_compact_json); |
|
67
|
|
|
$decrypter->decryptUsingKey($loaded_compact_json, $private_key); |
|
68
|
|
|
|
|
69
|
|
|
$loaded_flattened_json = Loader::load($expected_flattened_json); |
|
70
|
|
|
$decrypter->decryptUsingKey($loaded_flattened_json, $private_key); |
|
71
|
|
|
|
|
72
|
|
|
$loaded_json = Loader::load($expected_json); |
|
73
|
|
|
$decrypter->decryptUsingKey($loaded_json, $private_key); |
|
74
|
|
|
|
|
75
|
|
|
$this->assertEquals($expected_ciphertext, Base64Url::encode($loaded_compact_json->getCiphertext())); |
|
76
|
|
|
$this->assertEquals($protected_headers, $loaded_compact_json->getSharedProtectedHeaders()); |
|
77
|
|
|
$this->assertEquals($expected_iv, Base64Url::encode($loaded_compact_json->getIV())); |
|
78
|
|
|
$this->assertEquals($expected_encrypted_key, Base64Url::encode($loaded_compact_json->getRecipient(0)->getEncryptedKey())); |
|
79
|
|
|
$this->assertEquals($expected_tag, Base64Url::encode($loaded_compact_json->getTag())); |
|
80
|
|
|
|
|
81
|
|
|
$this->assertEquals($expected_ciphertext, Base64Url::encode($loaded_flattened_json->getCiphertext())); |
|
82
|
|
|
$this->assertEquals($protected_headers, $loaded_flattened_json->getSharedProtectedHeaders()); |
|
83
|
|
|
$this->assertEquals($expected_iv, Base64Url::encode($loaded_flattened_json->getIV())); |
|
84
|
|
|
$this->assertEquals($expected_encrypted_key, Base64Url::encode($loaded_flattened_json->getRecipient(0)->getEncryptedKey())); |
|
85
|
|
|
$this->assertEquals($expected_tag, Base64Url::encode($loaded_flattened_json->getTag())); |
|
86
|
|
|
|
|
87
|
|
|
$this->assertEquals($expected_ciphertext, Base64Url::encode($loaded_json->getCiphertext())); |
|
88
|
|
|
$this->assertEquals($protected_headers, $loaded_json->getSharedProtectedHeaders()); |
|
89
|
|
|
$this->assertEquals($expected_iv, Base64Url::encode($loaded_json->getIV())); |
|
90
|
|
|
$this->assertEquals($expected_encrypted_key, Base64Url::encode($loaded_json->getRecipient(0)->getEncryptedKey())); |
|
91
|
|
|
$this->assertEquals($expected_tag, Base64Url::encode($loaded_json->getTag())); |
|
92
|
|
|
|
|
93
|
|
|
$this->assertEquals($expected_payload, $loaded_compact_json->getPayload()); |
|
94
|
|
|
$this->assertEquals($expected_payload, $loaded_flattened_json->getPayload()); |
|
95
|
|
|
$this->assertEquals($expected_payload, $loaded_json->getPayload()); |
|
96
|
|
|
} |
|
97
|
|
|
|
|
98
|
|
|
/** |
|
99
|
|
|
* Same input as before, but we perform the encryption first. |
|
100
|
|
|
*/ |
|
101
|
|
|
public function testRSA1_5AndA128CBC_HS256EncryptionBis() |
|
102
|
|
|
{ |
|
103
|
|
|
$expected_payload = "You can trust us to stick with you through thick and thin\xe2\x80\x93to the bitter end. And you can trust us to keep any secret of yours\xe2\x80\x93closer than you keep it yourself. But you cannot trust us to let you face trouble alone, and go off without a word. We are your friends, Frodo."; |
|
104
|
|
|
|
|
105
|
|
|
$private_key = new JWK([ |
|
106
|
|
|
'kty' => 'RSA', |
|
107
|
|
|
'kid' => '[email protected]', |
|
108
|
|
|
'use' => 'enc', |
|
109
|
|
|
'n' => 'maxhbsmBtdQ3CNrKvprUE6n9lYcregDMLYNeTAWcLj8NnPU9XIYegTHVHQjxKDSHP2l-F5jS7sppG1wgdAqZyhnWvXhYNvcM7RfgKxqNx_xAHx6f3yy7s-M9PSNCwPC2lh6UAkR4I00EhV9lrypM9Pi4lBUop9t5fS9W5UNwaAllhrd-osQGPjIeI1deHTwx-ZTHu3C60Pu_LJIl6hKn9wbwaUmA4cR5Bd2pgbaY7ASgsjCUbtYJaNIHSoHXprUdJZKUMAzV0WOKPfA6OPI4oypBadjvMZ4ZAj3BnXaSYsEZhaueTXvZB4eZOAjIyh2e_VOIKVMsnDrJYAVotGlvMQ', |
|
110
|
|
|
'e' => 'AQAB', |
|
111
|
|
|
'd' => 'Kn9tgoHfiTVi8uPu5b9TnwyHwG5dK6RE0uFdlpCGnJN7ZEi963R7wybQ1PLAHmpIbNTztfrheoAniRV1NCIqXaW_qS461xiDTp4ntEPnqcKsyO5jMAji7-CL8vhpYYowNFvIesgMoVaPRYMYT9TW63hNM0aWs7USZ_hLg6Oe1mY0vHTI3FucjSM86Nff4oIENt43r2fspgEPGRrdE6fpLc9Oaq-qeP1GFULimrRdndm-P8q8kvN3KHlNAtEgrQAgTTgz80S-3VD0FgWfgnb1PNmiuPUxO8OpI9KDIfu_acc6fg14nsNaJqXe6RESvhGPH2afjHqSy_Fd2vpzj85bQQ', |
|
112
|
|
|
'p' => '2DwQmZ43FoTnQ8IkUj3BmKRf5Eh2mizZA5xEJ2MinUE3sdTYKSLtaEoekX9vbBZuWxHdVhM6UnKCJ_2iNk8Z0ayLYHL0_G21aXf9-unynEpUsH7HHTklLpYAzOOx1ZgVljoxAdWNn3hiEFrjZLZGS7lOH-a3QQlDDQoJOJ2VFmU', |
|
113
|
|
|
'q' => 'te8LY4-W7IyaqH1ExujjMqkTAlTeRbv0VLQnfLY2xINnrWdwiQ93_VF099aP1ESeLja2nw-6iKIe-qT7mtCPozKfVtUYfz5HrJ_XY2kfexJINb9lhZHMv5p1skZpeIS-GPHCC6gRlKo1q-idn_qxyusfWv7WAxlSVfQfk8d6Et0', |
|
114
|
|
|
'dp' => 'UfYKcL_or492vVc0PzwLSplbg4L3-Z5wL48mwiswbpzOyIgd2xHTHQmjJpFAIZ8q-zf9RmgJXkDrFs9rkdxPtAsL1WYdeCT5c125Fkdg317JVRDo1inX7x2Kdh8ERCreW8_4zXItuTl_KiXZNU5lvMQjWbIw2eTx1lpsflo0rYU', |
|
115
|
|
|
'dq' => 'iEgcO-QfpepdH8FWd7mUFyrXdnOkXJBCogChY6YKuIHGc_p8Le9MbpFKESzEaLlN1Ehf3B6oGBl5Iz_ayUlZj2IoQZ82znoUrpa9fVYNot87ACfzIG7q9Mv7RiPAderZi03tkVXAdaBau_9vs5rS-7HMtxkVrxSUvJY14TkXlHE', |
|
116
|
|
|
'qi' => 'kC-lzZOqoFaZCr5l0tOVtREKoVqaAYhQiqIRGL-MzS4sCmRkxm5vZlXYx6RtE1n_AagjqajlkjieGlxTTThHD8Iga6foGBMaAr5uR1hGQpSc7Gl7CF1DZkBJMTQN6EshYzZfxW08mIO8M6Rzuh0beL6fG9mkDcIyPrBXx2bQ_mM', |
|
117
|
|
|
]); |
|
118
|
|
|
|
|
119
|
|
|
$protected_headers = [ |
|
120
|
|
|
'alg' => 'RSA1_5', |
|
121
|
|
|
'kid' => '[email protected]', |
|
122
|
|
|
'enc' => 'A128CBC-HS256', |
|
123
|
|
|
]; |
|
124
|
|
|
|
|
125
|
|
|
$jwe = JWEFactory::createJWE($expected_payload, $protected_headers); |
|
126
|
|
|
$encrypter = EncrypterFactory::createEncrypter(['A128CBC-HS256', 'RSA1_5']); |
|
127
|
|
|
|
|
128
|
|
|
$jwe = $jwe->addRecipient( |
|
129
|
|
|
$private_key |
|
130
|
|
|
); |
|
131
|
|
|
|
|
132
|
|
|
$encrypter->encrypt($jwe); |
|
133
|
|
|
|
|
134
|
|
|
$decrypter = DecrypterFactory::createDecrypter(['A128CBC-HS256', 'RSA1_5']); |
|
135
|
|
|
|
|
136
|
|
|
$loaded_compact_json = Loader::load($jwe->toCompactJSON(0)); |
|
137
|
|
|
$decrypter->decryptUsingKey($loaded_compact_json, $private_key); |
|
138
|
|
|
|
|
139
|
|
|
$loaded_flattened_json = Loader::load($jwe->toFlattenedJSON(0)); |
|
140
|
|
|
$decrypter->decryptUsingKey($loaded_flattened_json, $private_key); |
|
141
|
|
|
|
|
142
|
|
|
$loaded_json = Loader::load($jwe->toJSON()); |
|
143
|
|
|
$decrypter->decryptUsingKey($loaded_json, $private_key); |
|
144
|
|
|
|
|
145
|
|
|
$this->assertEquals($protected_headers, $loaded_compact_json->getSharedProtectedHeaders()); |
|
146
|
|
|
|
|
147
|
|
|
$this->assertEquals($protected_headers, $loaded_flattened_json->getSharedProtectedHeaders()); |
|
148
|
|
|
|
|
149
|
|
|
$this->assertEquals($protected_headers, $loaded_json->getSharedProtectedHeaders()); |
|
150
|
|
|
|
|
151
|
|
|
$this->assertEquals($expected_payload, $loaded_compact_json->getPayload()); |
|
152
|
|
|
$this->assertEquals($expected_payload, $loaded_flattened_json->getPayload()); |
|
153
|
|
|
$this->assertEquals($expected_payload, $loaded_json->getPayload()); |
|
154
|
|
|
} |
|
155
|
|
|
} |
|
156
|
|
|
|