@@ -30,14 +30,14 @@ public function testDecodeFromPython()
30
30
31
31
public function testUrlSafeCharacters ()
32
32
{
33
- $ encoded = JWT ::encode ('f? ' , 'a ' );
33
+ $ encoded = JWT ::encode ('f? ' , 'a ' , ' HS256 ' );
34
34
$ this ->assertEquals ('f? ' , JWT ::decode ($ encoded , new Key ('a ' , 'HS256 ' )));
35
35
}
36
36
37
37
public function testMalformedUtf8StringsFail ()
38
38
{
39
39
$ this ->setExpectedException ('DomainException ' );
40
- JWT ::encode (pack ('c ' , 128 ), 'a ' );
40
+ JWT ::encode (pack ('c ' , 128 ), 'a ' , ' HS256 ' );
41
41
}
42
42
43
43
public function testMalformedJsonThrowsException ()
@@ -52,7 +52,7 @@ public function testExpiredToken()
52
52
$ payload = array (
53
53
"message " => "abc " ,
54
54
"exp " => time () - 20 ); // time in the past
55
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
55
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
56
56
JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
57
57
}
58
58
@@ -62,7 +62,7 @@ public function testBeforeValidTokenWithNbf()
62
62
$ payload = array (
63
63
"message " => "abc " ,
64
64
"nbf " => time () + 20 ); // time in the future
65
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
65
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
66
66
JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
67
67
}
68
68
@@ -72,7 +72,7 @@ public function testBeforeValidTokenWithIat()
72
72
$ payload = array (
73
73
"message " => "abc " ,
74
74
"iat " => time () + 20 ); // time in the future
75
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
75
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
76
76
JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
77
77
}
78
78
@@ -81,7 +81,7 @@ public function testValidToken()
81
81
$ payload = array (
82
82
"message " => "abc " ,
83
83
"exp " => time () + JWT ::$ leeway + 20 ); // time in the future
84
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
84
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
85
85
$ decoded = JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
86
86
$ this ->assertEquals ($ decoded ->message , 'abc ' );
87
87
}
@@ -92,7 +92,7 @@ public function testValidTokenWithLeeway()
92
92
$ payload = array (
93
93
"message " => "abc " ,
94
94
"exp " => time () - 20 ); // time in the past
95
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
95
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
96
96
$ decoded = JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
97
97
$ this ->assertEquals ($ decoded ->message , 'abc ' );
98
98
JWT ::$ leeway = 0 ;
@@ -105,7 +105,7 @@ public function testExpiredTokenWithLeeway()
105
105
"message " => "abc " ,
106
106
"exp " => time () - 70 ); // time far in the past
107
107
$ this ->setExpectedException ('Firebase\JWT\ExpiredException ' );
108
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
108
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
109
109
$ decoded = JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
110
110
$ this ->assertEquals ($ decoded ->message , 'abc ' );
111
111
JWT ::$ leeway = 0 ;
@@ -118,7 +118,7 @@ public function testValidTokenWithNbf()
118
118
"iat " => time (),
119
119
"exp " => time () + 20 , // time in the future
120
120
"nbf " => time () - 20 );
121
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
121
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
122
122
$ decoded = JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
123
123
$ this ->assertEquals ($ decoded ->message , 'abc ' );
124
124
}
@@ -129,7 +129,7 @@ public function testValidTokenWithNbfLeeway()
129
129
$ payload = array (
130
130
"message " => "abc " ,
131
131
"nbf " => time () + 20 ); // not before in near (leeway) future
132
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
132
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
133
133
$ decoded = JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
134
134
$ this ->assertEquals ($ decoded ->message , 'abc ' );
135
135
JWT ::$ leeway = 0 ;
@@ -141,7 +141,7 @@ public function testInvalidTokenWithNbfLeeway()
141
141
$ payload = array (
142
142
"message " => "abc " ,
143
143
"nbf " => time () + 65 ); // not before too far in future
144
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
144
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
145
145
$ this ->setExpectedException ('Firebase\JWT\BeforeValidException ' );
146
146
JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
147
147
JWT ::$ leeway = 0 ;
@@ -153,7 +153,7 @@ public function testValidTokenWithIatLeeway()
153
153
$ payload = array (
154
154
"message " => "abc " ,
155
155
"iat " => time () + 20 ); // issued in near (leeway) future
156
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
156
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
157
157
$ decoded = JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
158
158
$ this ->assertEquals ($ decoded ->message , 'abc ' );
159
159
JWT ::$ leeway = 0 ;
@@ -165,7 +165,7 @@ public function testInvalidTokenWithIatLeeway()
165
165
$ payload = array (
166
166
"message " => "abc " ,
167
167
"iat " => time () + 65 ); // issued too far in future
168
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
168
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
169
169
$ this ->setExpectedException ('Firebase\JWT\BeforeValidException ' );
170
170
JWT ::decode ($ encoded , new Key ('my_key ' , 'HS256 ' ));
171
171
JWT ::$ leeway = 0 ;
@@ -176,7 +176,7 @@ public function testInvalidToken()
176
176
$ payload = array (
177
177
"message " => "abc " ,
178
178
"exp " => time () + 20 ); // time in the future
179
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
179
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
180
180
$ this ->setExpectedException ('Firebase\JWT\SignatureInvalidException ' );
181
181
JWT ::decode ($ encoded , new Key ('my_key2 ' , 'HS256 ' ));
182
182
}
@@ -186,7 +186,7 @@ public function testNullKeyFails()
186
186
$ payload = array (
187
187
"message " => "abc " ,
188
188
"exp " => time () + JWT ::$ leeway + 20 ); // time in the future
189
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
189
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
190
190
$ this ->setExpectedException ('InvalidArgumentException ' );
191
191
JWT ::decode ($ encoded , new Key (null , 'HS256 ' ));
192
192
}
@@ -196,7 +196,7 @@ public function testEmptyKeyFails()
196
196
$ payload = array (
197
197
"message " => "abc " ,
198
198
"exp " => time () + JWT ::$ leeway + 20 ); // time in the future
199
- $ encoded = JWT ::encode ($ payload , 'my_key ' );
199
+ $ encoded = JWT ::encode ($ payload , 'my_key ' , ' HS256 ' );
200
200
$ this ->setExpectedException ('InvalidArgumentException ' );
201
201
JWT ::decode ($ encoded , new Key ('' , 'HS256 ' ));
202
202
}
@@ -225,21 +225,21 @@ public function testArrayAccessKIDChooser()
225
225
226
226
public function testNoneAlgorithm ()
227
227
{
228
- $ msg = JWT ::encode ('abc ' , 'my_key ' );
228
+ $ msg = JWT ::encode ('abc ' , 'my_key ' , ' HS256 ' );
229
229
$ this ->setExpectedException ('UnexpectedValueException ' );
230
230
JWT ::decode ($ msg , new Key ('my_key ' , 'none ' ));
231
231
}
232
232
233
233
public function testIncorrectAlgorithm ()
234
234
{
235
- $ msg = JWT ::encode ('abc ' , 'my_key ' );
235
+ $ msg = JWT ::encode ('abc ' , 'my_key ' , ' HS256 ' );
236
236
$ this ->setExpectedException ('UnexpectedValueException ' );
237
237
JWT ::decode ($ msg , new Key ('my_key ' , 'RS256 ' ));
238
238
}
239
239
240
240
public function testEmptyAlgorithm ()
241
241
{
242
- $ msg = JWT ::encode ('abc ' , 'my_key ' );
242
+ $ msg = JWT ::encode ('abc ' , 'my_key ' , ' HS256 ' );
243
243
$ this ->setExpectedException ('UnexpectedValueException ' );
244
244
JWT ::decode ($ msg , new Key ('my_key ' , '' ));
245
245
}
@@ -265,7 +265,7 @@ public function testInvalidSignatureEncoding()
265
265
266
266
public function testHSEncodeDecode ()
267
267
{
268
- $ msg = JWT ::encode ('abc ' , 'my_key ' );
268
+ $ msg = JWT ::encode ('abc ' , 'my_key ' , ' HS256 ' );
269
269
$ this ->assertEquals (JWT ::decode ($ msg , new Key ('my_key ' , 'HS256 ' )), 'abc ' );
270
270
}
271
271
0 commit comments