OauthTest.php 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542
  1. <?php
  2. /**
  3. * CakePHP(tm) : Rapid Development Framework (https://cakephp.org)
  4. * Copyright (c) Cake Software Foundation, Inc. (https://cakefoundation.org)
  5. *
  6. * Licensed under The MIT License
  7. * Redistributions of files must retain the above copyright notice.
  8. *
  9. * @copyright Copyright (c) Cake Software Foundation, Inc. (https://cakefoundation.org)
  10. * @link https://cakephp.org CakePHP(tm) Project
  11. * @since 3.0.0
  12. * @license https://opensource.org/licenses/mit-license.php MIT License
  13. */
  14. namespace Cake\Test\TestCase\Http\Client\Auth;
  15. use Cake\Http\Client\Auth\Oauth;
  16. use Cake\Http\Client\Request;
  17. use Cake\TestSuite\TestCase;
  18. /**
  19. * Oauth test.
  20. */
  21. class OauthTest extends TestCase
  22. {
  23. private $privateKeyString = '-----BEGIN RSA PRIVATE KEY-----
  24. MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALRiMLAh9iimur8V
  25. A7qVvdqxevEuUkW4K+2KdMXmnQbG9Aa7k7eBjK1S+0LYmVjPKlJGNXHDGuy5Fw/d
  26. 7rjVJ0BLB+ubPK8iA/Tw3hLQgXMRRGRXXCn8ikfuQfjUS1uZSatdLB81mydBETlJ
  27. hI6GH4twrbDJCR2Bwy/XWXgqgGRzAgMBAAECgYBYWVtleUzavkbrPjy0T5FMou8H
  28. X9u2AC2ry8vD/l7cqedtwMPp9k7TubgNFo+NGvKsl2ynyprOZR1xjQ7WgrgVB+mm
  29. uScOM/5HVceFuGRDhYTCObE+y1kxRloNYXnx3ei1zbeYLPCHdhxRYW7T0qcynNmw
  30. rn05/KO2RLjgQNalsQJBANeA3Q4Nugqy4QBUCEC09SqylT2K9FrrItqL2QKc9v0Z
  31. zO2uwllCbg0dwpVuYPYXYvikNHHg+aCWF+VXsb9rpPsCQQDWR9TT4ORdzoj+Nccn
  32. qkMsDmzt0EfNaAOwHOmVJ2RVBspPcxt5iN4HI7HNeG6U5YsFBb+/GZbgfBT3kpNG
  33. WPTpAkBI+gFhjfJvRw38n3g/+UeAkwMI2TJQS4n8+hid0uus3/zOjDySH3XHCUno
  34. cn1xOJAyZODBo47E+67R4jV1/gzbAkEAklJaspRPXP877NssM5nAZMU0/O/NGCZ+
  35. 3jPgDUno6WbJn5cqm8MqWhW1xGkImgRk+fkDBquiq4gPiT898jusgQJAd5Zrr6Q8
  36. AO/0isr/3aa6O6NLQxISLKcPDk2NOccAfS/xOtfOz4sJYM3+Bs4Io9+dZGSDCA54
  37. Lw03eHTNQghS0A==
  38. -----END RSA PRIVATE KEY-----';
  39. private $privateKeyStringEnc = '-----BEGIN RSA PRIVATE KEY-----
  40. Proc-Type: 4,ENCRYPTED
  41. DEK-Info: DES-CBC,E65DB7AE7A05EF23
  42. QCXAQ/Uj1+7uQp0MyDUPlKvW/28PhbT4GxflBYmU6SxKZ2CVFPk0M8RgB6gkJyVv
  43. mwjo1Ch2Tlt7/VrNfLWGIh1XPhsC3gatv8Wv+g0keWWifaHlhXulgMGREJ7QeJg0
  44. 5THvdFuIs2qQnOzPCAwONjM6yMxPb2qxvwq0UKAL5V/CYVFWS6PYdR25f9ogXxBz
  45. c3QjvvnhQ7ipNjpjVp/XKYMYnZPCYkNYvRX+BcsWlqYtclO3m+xPG+mPAFs9hnBI
  46. wHI4yC2fl52giRc7XnSl7NNjun6RpHT/Cn7JDH6ql86pgMO0dw6PDzPf0KY9DCrR
  47. ldQyzQ8WjN3FU55+En+8zmSnxUu7EbdqZwhVEF+UwfJ7IqJUnHll0aDTUA/qq0dk
  48. DqtMKIXvRnDVZJqKxHyRvARf8Zp8USsq3cVdlA9PhtcKrs4CbTDL0lJ3eWj1bDS1
  49. kIHXYo19lBqcS1oX+6TqvEs69oW/aG8UZIONN0Xh5TbxuJMedXD1dexV9oOA9lGR
  50. cS6Ye0wC7fCdnA6jfAmHFJ5t2qk7FOzcFZwap7m+EWn11z+72GVqz3BDSe5qH2m2
  51. XOHl59rVtJsZFtjyQEV34IFYyb2qBHHqUUdKwIwT1JOZIq+IdTJxaieIb1mnlmDw
  52. DDf4Kwr0C9tti1R1IsPaAmjF7eH0PGbDGAB3fJSCXbHf7EXTz1AUdknd2MHXQ7wO
  53. UBABkD2ETB+EotdHTly5FQt0jwbHfF2najBmezxtEjIygCnDb02Rtuei4HTansBu
  54. shqoyFXJvizZzje7HaTQv/eJTuA6rUOzu/sAv/eBx2YAPkA8oa3qUw==
  55. -----END RSA PRIVATE KEY-----';
  56. /**
  57. * @return void
  58. */
  59. public function testExceptionUnknownSigningMethod()
  60. {
  61. $this->expectException(\Cake\Core\Exception\Exception::class);
  62. $auth = new Oauth();
  63. $creds = [
  64. 'consumerSecret' => 'it is secret',
  65. 'consumerKey' => 'a key',
  66. 'token' => 'a token value',
  67. 'tokenSecret' => 'also secret',
  68. 'method' => 'silly goose',
  69. ];
  70. $request = new Request();
  71. $auth->authentication($request, $creds);
  72. }
  73. /**
  74. * Test plain-text signing.
  75. *
  76. * @return void
  77. */
  78. public function testPlainTextSigning()
  79. {
  80. $auth = new Oauth();
  81. $creds = [
  82. 'consumerSecret' => 'it is secret',
  83. 'consumerKey' => 'a key',
  84. 'token' => 'a token value',
  85. 'tokenSecret' => 'also secret',
  86. 'method' => 'plaintext',
  87. ];
  88. $request = new Request();
  89. $request = $auth->authentication($request, $creds);
  90. $result = $request->getHeaderLine('Authorization');
  91. $this->assertContains('OAuth', $result);
  92. $this->assertContains('oauth_version="1.0"', $result);
  93. $this->assertContains('oauth_token="a%20token%20value"', $result);
  94. $this->assertContains('oauth_consumer_key="a%20key"', $result);
  95. $this->assertContains('oauth_signature_method="PLAINTEXT"', $result);
  96. $this->assertContains('oauth_signature="it%20is%20secret%26also%20secret"', $result);
  97. $this->assertContains('oauth_timestamp=', $result);
  98. $this->assertContains('oauth_nonce=', $result);
  99. }
  100. /**
  101. * Test that baseString() normalizes the URL.
  102. *
  103. * @return void
  104. */
  105. public function testBaseStringNormalizeUrl()
  106. {
  107. $request = new Request('HTTP://exAmple.com:80/parts/foo');
  108. $auth = new Oauth();
  109. $creds = [];
  110. $result = $auth->baseString($request, $creds);
  111. $this->assertContains('GET&', $result, 'method was missing.');
  112. $this->assertContains('http%3A%2F%2Fexample.com%2Fparts%2Ffoo', $result);
  113. }
  114. /**
  115. * Test that the query string is stripped from the normalized host.
  116. *
  117. * @return void
  118. */
  119. public function testBaseStringWithQueryString()
  120. {
  121. $request = new Request('http://example.com/search?q=pogo&cat=2');
  122. $auth = new Oauth();
  123. $values = [
  124. 'oauth_version' => '1.0',
  125. 'oauth_nonce' => uniqid(),
  126. 'oauth_timestamp' => time(),
  127. 'oauth_signature_method' => 'HMAC-SHA1',
  128. 'oauth_token' => 'token',
  129. 'oauth_consumer_key' => 'consumer-key',
  130. ];
  131. $result = $auth->baseString($request, $values);
  132. $this->assertContains('GET&', $result, 'method was missing.');
  133. $this->assertContains(
  134. 'http%3A%2F%2Fexample.com%2Fsearch&',
  135. $result
  136. );
  137. $this->assertContains(
  138. 'cat%3D2%26oauth_consumer_key%3Dconsumer-key' .
  139. '%26oauth_nonce%3D' . $values['oauth_nonce'] .
  140. '%26oauth_signature_method%3DHMAC-SHA1' .
  141. '%26oauth_timestamp%3D' . $values['oauth_timestamp'] .
  142. '%26oauth_token%3Dtoken' .
  143. '%26oauth_version%3D1.0' .
  144. '%26q%3Dpogo',
  145. $result
  146. );
  147. }
  148. /**
  149. * Ensure that post data is sorted and encoded.
  150. *
  151. * Keys with array values have to be serialized using
  152. * a more standard HTTP approach. PHP flavoured HTTP
  153. * is not part of the Oauth spec.
  154. *
  155. * See Normalize Request Parameters (section 9.1.1)
  156. *
  157. * @return void
  158. */
  159. public function testBaseStringWithPostDataNestedArrays()
  160. {
  161. $request = new Request(
  162. 'http://example.com/search?q=pogo',
  163. Request::METHOD_POST,
  164. [],
  165. [
  166. 'search' => [
  167. 'filters' => [
  168. 'field' => 'date',
  169. 'value' => 'one two',
  170. ],
  171. ],
  172. ]
  173. );
  174. $auth = new Oauth();
  175. $values = [
  176. 'oauth_version' => '1.0',
  177. 'oauth_nonce' => uniqid(),
  178. 'oauth_timestamp' => time(),
  179. 'oauth_signature_method' => 'HMAC-SHA1',
  180. 'oauth_token' => 'token',
  181. 'oauth_consumer_key' => 'consumer-key',
  182. ];
  183. $result = $auth->baseString($request, $values);
  184. $this->assertContains('POST&', $result, 'method was missing.');
  185. $this->assertContains(
  186. 'http%3A%2F%2Fexample.com%2Fsearch&',
  187. $result
  188. );
  189. $this->assertContains(
  190. '&oauth_consumer_key%3Dconsumer-key' .
  191. '%26oauth_nonce%3D' . $values['oauth_nonce'] .
  192. '%26oauth_signature_method%3DHMAC-SHA1' .
  193. '%26oauth_timestamp%3D' . $values['oauth_timestamp'] .
  194. '%26oauth_token%3Dtoken' .
  195. '%26oauth_version%3D1.0' .
  196. '%26q%3Dpogo' .
  197. '%26search%5Bfilters%5D%5Bfield%5D%3Ddate' .
  198. '%26search%5Bfilters%5D%5Bvalue%5D%3Done%20two',
  199. $result
  200. );
  201. }
  202. /**
  203. * Ensure that post data is sorted and encoded.
  204. *
  205. * Keys with array values have to be serialized using
  206. * a more standard HTTP approach. PHP flavoured HTTP
  207. * is not part of the Oauth spec.
  208. *
  209. * See Normalize Request Parameters (section 9.1.1)
  210. * http://wiki.oauth.net/w/page/12238556/TestCases
  211. *
  212. * @return void
  213. */
  214. public function testBaseStringWithPostData()
  215. {
  216. $request = new Request(
  217. 'http://example.com/search?q=pogo',
  218. Request::METHOD_POST,
  219. [],
  220. [
  221. 'address' => 'post',
  222. 'zed' => 'last',
  223. 'tags' => ['oauth', 'cake'],
  224. ]
  225. );
  226. $auth = new Oauth();
  227. $values = [
  228. 'oauth_version' => '1.0',
  229. 'oauth_nonce' => uniqid(),
  230. 'oauth_timestamp' => time(),
  231. 'oauth_signature_method' => 'HMAC-SHA1',
  232. 'oauth_token' => 'token',
  233. 'oauth_consumer_key' => 'consumer-key',
  234. ];
  235. $result = $auth->baseString($request, $values);
  236. $this->assertContains('POST&', $result, 'method was missing.');
  237. $this->assertContains(
  238. 'http%3A%2F%2Fexample.com%2Fsearch&',
  239. $result
  240. );
  241. $this->assertContains(
  242. '&address%3Dpost' .
  243. '%26oauth_consumer_key%3Dconsumer-key' .
  244. '%26oauth_nonce%3D' . $values['oauth_nonce'] .
  245. '%26oauth_signature_method%3DHMAC-SHA1' .
  246. '%26oauth_timestamp%3D' . $values['oauth_timestamp'] .
  247. '%26oauth_token%3Dtoken' .
  248. '%26oauth_version%3D1.0' .
  249. '%26q%3Dpogo' .
  250. '%26tags%3Dcake' .
  251. '%26tags%3Doauth' .
  252. '%26zed%3Dlast',
  253. $result
  254. );
  255. }
  256. /**
  257. * Test HMAC-SHA1 signing
  258. *
  259. * Hash result + parameters taken from
  260. * http://wiki.oauth.net/w/page/12238556/TestCases
  261. *
  262. * @return void
  263. */
  264. public function testHmacSigning()
  265. {
  266. $request = new Request(
  267. 'http://photos.example.net/photos',
  268. 'GET',
  269. [],
  270. ['file' => 'vacation.jpg', 'size' => 'original']
  271. );
  272. $options = [
  273. 'consumerKey' => 'dpf43f3p2l4k3l03',
  274. 'consumerSecret' => 'kd94hf93k423kf44',
  275. 'tokenSecret' => 'pfkkdhi9sl3r4s00',
  276. 'token' => 'nnch734d00sl2jdk',
  277. 'nonce' => 'kllo9940pd9333jh',
  278. 'timestamp' => '1191242096',
  279. ];
  280. $auth = new Oauth();
  281. $request = $auth->authentication($request, $options);
  282. $result = $request->getHeaderLine('Authorization');
  283. $expected = 'tR3+Ty81lMeYAr/Fid0kMTYa/WM=';
  284. $this->assertContains(
  285. 'oauth_signature="' . $expected . '"',
  286. urldecode($result)
  287. );
  288. }
  289. /**
  290. * Test RSA-SHA1 signing with a private key string
  291. *
  292. * Hash result + parameters taken from
  293. * http://wiki.oauth.net/w/page/12238556/TestCases
  294. *
  295. * @return void
  296. */
  297. public function testRsaSigningString()
  298. {
  299. $request = new Request(
  300. 'http://photos.example.net/photos',
  301. 'GET',
  302. [],
  303. ['file' => 'vacaction.jpg', 'size' => 'original']
  304. );
  305. $privateKey = $this->privateKeyString;
  306. $options = [
  307. 'method' => 'RSA-SHA1',
  308. 'consumerKey' => 'dpf43f3p2l4k3l03',
  309. 'nonce' => '13917289812797014437',
  310. 'timestamp' => '1196666512',
  311. 'privateKey' => $privateKey,
  312. ];
  313. $auth = new Oauth();
  314. $request = $auth->authentication($request, $options);
  315. $result = $request->getHeaderLine('Authorization');
  316. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  317. $this->assertContains(
  318. 'oauth_signature="' . $expected . '"',
  319. urldecode($result)
  320. );
  321. }
  322. /**
  323. * Test RSA-SHA1 signing with a private key file
  324. *
  325. * Hash result + parameters taken from
  326. * http://wiki.oauth.net/w/page/12238556/TestCases
  327. *
  328. * @return void
  329. */
  330. public function testRsaSigningFile()
  331. {
  332. $request = new Request(
  333. 'http://photos.example.net/photos',
  334. 'GET',
  335. [],
  336. ['file' => 'vacaction.jpg', 'size' => 'original']
  337. );
  338. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key.pem', 'r');
  339. $options = [
  340. 'method' => 'RSA-SHA1',
  341. 'consumerKey' => 'dpf43f3p2l4k3l03',
  342. 'nonce' => '13917289812797014437',
  343. 'timestamp' => '1196666512',
  344. 'privateKey' => $privateKey,
  345. ];
  346. $auth = new Oauth();
  347. $request = $auth->authentication($request, $options);
  348. $result = $request->getHeaderLine('Authorization');
  349. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  350. $this->assertContains(
  351. 'oauth_signature="' . $expected . '"',
  352. urldecode($result)
  353. );
  354. }
  355. /**
  356. * Test RSA-SHA1 signing with a private key file passphrase string
  357. *
  358. * Hash result + parameters taken from
  359. * http://wiki.oauth.net/w/page/12238556/TestCases
  360. *
  361. * @return void
  362. */
  363. public function testRsaSigningWithPassphraseString()
  364. {
  365. $request = new Request(
  366. 'http://photos.example.net/photos',
  367. 'GET',
  368. [],
  369. ['file' => 'vacaction.jpg', 'size' => 'original']
  370. );
  371. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key_with_passphrase.pem', 'r');
  372. $passphrase = 'fancy-cakephp-passphrase';
  373. $options = [
  374. 'method' => 'RSA-SHA1',
  375. 'consumerKey' => 'dpf43f3p2l4k3l03',
  376. 'nonce' => '13917289812797014437',
  377. 'timestamp' => '1196666512',
  378. 'privateKey' => $privateKey,
  379. 'privateKeyPassphrase' => $passphrase,
  380. ];
  381. $auth = new Oauth();
  382. $request = $auth->authentication($request, $options);
  383. $result = $request->getHeaderLine('Authorization');
  384. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  385. $this->assertContains(
  386. 'oauth_signature="' . $expected . '"',
  387. urldecode($result)
  388. );
  389. }
  390. /**
  391. * Test RSA-SHA1 signing with a private key string and passphrase string
  392. *
  393. * Hash result + parameters taken from
  394. * http://wiki.oauth.net/w/page/12238556/TestCases
  395. *
  396. * @return void
  397. */
  398. public function testRsaSigningStringWithPassphraseString()
  399. {
  400. $request = new Request(
  401. 'http://photos.example.net/photos',
  402. 'GET',
  403. [],
  404. ['file' => 'vacaction.jpg', 'size' => 'original']
  405. );
  406. $privateKey = $this->privateKeyStringEnc;
  407. $passphrase = 'fancy-cakephp-passphrase';
  408. $options = [
  409. 'method' => 'RSA-SHA1',
  410. 'consumerKey' => 'dpf43f3p2l4k3l03',
  411. 'nonce' => '13917289812797014437',
  412. 'timestamp' => '1196666512',
  413. 'privateKey' => $privateKey,
  414. 'privateKeyPassphrase' => $passphrase,
  415. ];
  416. $auth = new Oauth();
  417. $request = $auth->authentication($request, $options);
  418. $result = $request->getHeaderLine('Authorization');
  419. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  420. $this->assertContains(
  421. 'oauth_signature="' . $expected . '"',
  422. urldecode($result)
  423. );
  424. }
  425. /**
  426. * Test RSA-SHA1 signing with passphrase file
  427. *
  428. * Hash result + parameters taken from
  429. * http://wiki.oauth.net/w/page/12238556/TestCases
  430. *
  431. * @return void
  432. */
  433. public function testRsaSigningWithPassphraseFile()
  434. {
  435. $this->skipIf(PHP_EOL != "\n", 'Just the line ending "\n" is supported. You can run the test again e.g. on a linux system.');
  436. $request = new Request(
  437. 'http://photos.example.net/photos',
  438. 'GET',
  439. [],
  440. ['file' => 'vacaction.jpg', 'size' => 'original']
  441. );
  442. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key_with_passphrase.pem', 'r');
  443. $passphrase = fopen(TEST_APP . DS . 'config' . DS . 'key_passphrase_lf', 'r');
  444. $options = [
  445. 'method' => 'RSA-SHA1',
  446. 'consumerKey' => 'dpf43f3p2l4k3l03',
  447. 'nonce' => '13917289812797014437',
  448. 'timestamp' => '1196666512',
  449. 'privateKey' => $privateKey,
  450. 'privateKeyPassphrase' => $passphrase,
  451. ];
  452. $auth = new Oauth();
  453. $request = $auth->authentication($request, $options);
  454. $result = $request->getHeaderLine('Authorization');
  455. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  456. $this->assertContains(
  457. 'oauth_signature="' . $expected . '"',
  458. urldecode($result)
  459. );
  460. $expected = 0;
  461. $this->assertEquals($expected, ftell($passphrase));
  462. }
  463. /**
  464. * Test RSA-SHA1 signing with a private key string and passphrase file
  465. *
  466. * Hash result + parameters taken from
  467. * http://wiki.oauth.net/w/page/12238556/TestCases
  468. *
  469. * @return void
  470. */
  471. public function testRsaSigningStringWithPassphraseFile()
  472. {
  473. $this->skipIf(PHP_EOL != "\n", 'Just the line ending "\n" is supported. You can run the test again e.g. on a linux system.');
  474. $request = new Request(
  475. 'http://photos.example.net/photos',
  476. 'GET',
  477. [],
  478. ['file' => 'vacaction.jpg', 'size' => 'original']
  479. );
  480. $privateKey = $this->privateKeyStringEnc;
  481. $passphrase = fopen(TEST_APP . DS . 'config' . DS . 'key_passphrase_lf', 'r');
  482. $options = [
  483. 'method' => 'RSA-SHA1',
  484. 'consumerKey' => 'dpf43f3p2l4k3l03',
  485. 'nonce' => '13917289812797014437',
  486. 'timestamp' => '1196666512',
  487. 'privateKey' => $privateKey,
  488. 'privateKeyPassphrase' => $passphrase,
  489. ];
  490. $auth = new Oauth();
  491. $request = $auth->authentication($request, $options);
  492. $result = $request->getHeaderLine('Authorization');
  493. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  494. $this->assertContains(
  495. 'oauth_signature="' . $expected . '"',
  496. urldecode($result)
  497. );
  498. $expected = 0;
  499. $this->assertEquals($expected, ftell($passphrase));
  500. }
  501. }