1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
declare(strict_types=1); |
4
|
|
|
|
5
|
|
|
namespace Facile\OpenIDClient\ConformanceTest\RpTest\IdToken; |
6
|
|
|
|
7
|
|
|
use PHPUnit\Framework\Assert; |
8
|
|
|
use PHPUnit\Framework\AssertionFailedError; |
9
|
|
|
use Facile\OpenIDClient\ConformanceTest\RpTest\AbstractRpTest; |
10
|
|
|
use Facile\OpenIDClient\ConformanceTest\TestInfo; |
11
|
|
|
use Facile\OpenIDClient\Session\AuthSession; |
12
|
|
|
use Facile\OpenIDClient\Service\AuthorizationService; |
13
|
|
|
use function Facile\OpenIDClient\base64url_encode; |
14
|
|
|
|
15
|
|
|
/** |
16
|
|
|
* Retrieve Authorization Code and ID Token from the Authorization Endpoint, using Hybrid Flow. |
17
|
|
|
* Verify the c_hash value in the returned ID token. 'id_token_signed_response_alg' must NOT be 'none' |
18
|
|
|
* |
19
|
|
|
* Identify the incorrect 'c_hash' value and reject the ID Token after doing Authorization Code Validation. |
20
|
|
|
*/ |
21
|
|
|
class RpIdTokenBadCHashTest extends AbstractRpTest |
22
|
|
|
{ |
23
|
|
|
|
24
|
|
|
public function getTestId(): string |
25
|
|
|
{ |
26
|
|
|
return 'rp-id_token-bad-c_hash'; |
27
|
|
|
} |
28
|
|
|
|
29
|
|
|
public function execute(TestInfo $testInfo): void |
30
|
|
|
{ |
31
|
|
|
$client = $this->registerClient($testInfo); |
32
|
|
|
|
33
|
|
|
// Get authorization redirect uri |
34
|
|
|
$authorizationService = new AuthorizationService(); |
|
|
|
|
35
|
|
|
|
36
|
|
|
$authSession = AuthSession::fromArray([ |
37
|
|
|
'nonce' => base64url_encode(\random_bytes(32)), |
38
|
|
|
]); |
39
|
|
|
|
40
|
|
|
$uri = $authorizationService->getAuthorizationUri($client, [ |
41
|
|
|
'response_type' => $testInfo->getResponseType(), |
42
|
|
|
'nonce' => $authSession->getNonce(), |
43
|
|
|
]); |
44
|
|
|
|
45
|
|
|
// Simulate a redirect and create the server request |
46
|
|
|
$serverRequest = $this->simulateAuthRedirect($uri); |
47
|
|
|
|
48
|
|
|
$params = $authorizationService->getCallbackParams($serverRequest, $client); |
49
|
|
|
|
50
|
|
|
try { |
51
|
|
|
$authorizationService->callback($client, $params, null, $authSession); |
52
|
|
|
throw new AssertionFailedError('No assertion'); |
53
|
|
|
} catch (\Throwable $e) { |
54
|
|
|
Assert::assertSame('Invalid token provided', $e->getMessage()); |
55
|
|
|
Assert::assertRegExp('/c_hash mismatch/', $e->getPrevious()->getMessage()); |
|
|
|
|
56
|
|
|
} |
57
|
|
|
} |
58
|
|
|
} |
59
|
|
|
|
This check compares calls to functions or methods with their respective definitions. If the call has less arguments than are defined, it raises an issue.
If a function is defined several times with a different number of parameters, the check may pick up the wrong definition and report false positives. One codebase where this has been known to happen is Wordpress. Please note the @ignore annotation hint above.