diff --git a/phpcs.xml b/phpcs.xml
index 5eabf531b..1abfbc6ac 100644
--- a/phpcs.xml
+++ b/phpcs.xml
@@ -36,6 +36,7 @@
**/HTTPRedirectTest.php
**/SOAPTest.php
tests/SAML2/Assertion/Validation/AssertionValidatorTest.php
+ tests/SAML2/Entity/ServiceProviderTest.php
tests/SAML2/XML/saml/AssertionTest.php
tests/SAML2/XML/saml/AttributeValueTest.php
tests/SAML2/XML/saml/AuthnContextTest.php
diff --git a/src/Binding.php b/src/Binding.php
index e4ca793d7..f863646ca 100644
--- a/src/Binding.php
+++ b/src/Binding.php
@@ -25,6 +25,20 @@
*/
abstract class Binding
{
+ /**
+ * The schema to be used for schema validation
+ *
+ * @var string
+ */
+ protected static string $schemaFile = 'resources/schemas/saml-schema-protocol-2.0.xsd';
+
+ /**
+ * Whether or not to perform schema validation
+ *
+ * @var bool
+ */
+ protected bool $schemaValidation = true;
+
/**
* The RelayState associated with the message.
*
@@ -157,7 +171,20 @@ public function getDestination(): ?string
/**
- * Set the RelayState associated with he message.
+ * Override the destination of a message.
+ *
+ * Set to null to use the destination set in the message.
+ *
+ * @param string|null $destination The destination the message should be delivered to.
+ */
+ public function setDestination(?string $destination = null): void
+ {
+ $this->destination = $destination;
+ }
+
+
+ /**
+ * Set the RelayState associated with the message.
*
* @param string|null $relayState The RelayState.
*/
@@ -179,15 +206,24 @@ public function getRelayState(): ?string
/**
- * Override the destination of a message.
+ * Set the schema validation for the message.
*
- * Set to null to use the destination set in the message.
+ * @param bool $schemaValidation
+ */
+ public function setSchemaValidation(bool $schemaValidation): void
+ {
+ $this->schemaValidation = $schemaValidation;
+ }
+
+
+ /**
+ * Get the schema validation setting.
*
- * @param string|null $destination The destination the message should be delivered to.
+ * @return bool
*/
- public function setDestination(?string $destination = null): void
+ public function getSchemaValidation(): bool
{
- $this->destination = $destination;
+ return $this->schemaValidation;
}
diff --git a/src/Binding/HTTPPost.php b/src/Binding/HTTPPost.php
index acfcda229..0228f9c91 100644
--- a/src/Binding/HTTPPost.php
+++ b/src/Binding/HTTPPost.php
@@ -91,9 +91,11 @@ public function receive(ServerRequestInterface $request): AbstractMessage
}
$msgStr = base64_decode($msgStr, true);
- $msgStr = DOMDocumentFactory::fromString($msgStr)->saveXML();
- $document = DOMDocumentFactory::fromString($msgStr);
+ $document = DOMDocumentFactory::fromString(
+ xml: $msgStr,
+ schemaFile: $this->getSchemaValidation() ? self::$schemaFile : null,
+ );
Utils::getContainer()->debugMessage($document->documentElement, 'in');
$msg = MessageFactory::fromXML($document->documentElement);
diff --git a/src/Binding/HTTPRedirect.php b/src/Binding/HTTPRedirect.php
index f0357c01b..4dba36dfb 100644
--- a/src/Binding/HTTPRedirect.php
+++ b/src/Binding/HTTPRedirect.php
@@ -148,7 +148,10 @@ public function receive(ServerRequestInterface $request): AbstractMessage
throw new Exception('Error while inflating SAML message.');
}
- $document = DOMDocumentFactory::fromString($message);
+ $document = DOMDocumentFactory::fromString(
+ xml: $message,
+ schemaFile: $this->getSchemaValidation() ? self::$schemaFile : null,
+ );
Utils::getContainer()->debugMessage($document->documentElement, 'in');
$message = MessageFactory::fromXML($document->documentElement);
diff --git a/src/Binding/SOAP.php b/src/Binding/SOAP.php
index 9b0b35ec1..04c35e5af 100644
--- a/src/Binding/SOAP.php
+++ b/src/Binding/SOAP.php
@@ -101,8 +101,12 @@ public function receive(/** @scrutinizer ignore-unused */ServerRequestInterface
$xpCache = XPath::getXPath($document->documentElement);
/** @var \DOMElement[] $results */
$results = XPath::xpQuery($xml, '/SOAP-ENV:Envelope/SOAP-ENV:Body/*[1]', $xpCache);
+ $document = DOMDocumentFactory::fromString(
+ xml: $results[0]->ownerDocument->saveXML($results[0]),
+ schemaFile: $this->getSchemaValidation() ? self::$schemaFile : null,
+ );
- return MessageFactory::fromXML($results[0]);
+ return MessageFactory::fromXML($document->documentElement);
}
diff --git a/src/Exception/ConstraintValidationFailedException.php b/src/Exception/ConstraintValidationFailedException.php
new file mode 100644
index 000000000..3ad396f44
--- /dev/null
+++ b/src/Exception/ConstraintValidationFailedException.php
@@ -0,0 +1,12 @@
+signatureAlgorithmFactory = new SignatureAlgorithmFactory();
+ $this->encryptionAlgorithmFactory = new EncryptionAlgorithmFactory();
+ $this->keyTransportAlgorithmFactory = new KeyTransportAlgorithmFactory();
+ }
+
+
+ /**
+ */
+ public function setStateProvider(StateProviderInterface $stateProvider): void
+ {
+ $this->stateProvider = $stateProvider;
+ }
+
+
+ /**
+ */
+ public function setStorageProvider(StorageProviderInterface $storageProvider): void
+ {
+ $this->storageProvider = $storageProvider;
+ }
+
+
+ /**
+ * Receive a verified, and optionally validated Response.
+ *
+ * Upon receiving the response from the binding, the signature will be validated first.
+ * Once the signature checks out, the assertions are decrypted, their signatures verified
+ * and then any encrypted NameID's and/or attributes are decrypted.
+ *
+ * @param \Psr\Http\Message\ServerRequestInterface $request
+ * @return \SimpleSAML\SAML2\XML\samlp\Response The validated response.
+ *
+ * @throws \SimpleSAML\SAML2\Exception\Protocol\UnsupportedBindingException
+ */
+ public function receiveResponse(ServerRequestInterface $request): Response
+ {
+ $binding = Binding::getCurrentBinding($request);
+
+ if ($binding instanceof HTTPArtifact) {
+ if ($this->storageProvider === null) {
+ throw new RuntimeException(
+ "A StorageProvider is required to use the HTTP-Artifact binding.",
+ );
+ }
+
+ $artifact = $binding->receiveArtifact($request);
+ $this->idpMetadata = $this->metadataProvider->getIdPMetadataForSha1($artifact->getSourceId());
+
+ if ($this->idpMetadata === null) {
+ throw new MetadataNotFoundException(sprintf(
+ 'No metadata found for remote entity with SHA1 ID: %s',
+ $artifact->getSourceId(),
+ ));
+ }
+
+ $binding->setIdpMetadata($this->idpMetadata);
+ $binding->setSPMetadata($this->spMetadata);
+ }
+
+ $binding->setSchemaValidation($this->performSchemaValidation);
+ $rawResponse = $binding->receive($request);
+ Assert::isInstanceOf($rawResponse, Response::class, ResourceNotRecognizedException::class); // Wrong type of msg
+
+ // Will return a raw Response prior to any form of verification
+ if ($this->bypassResponseVerification === true) {
+ return $rawResponse;
+ }
+
+ // Fetch the metadata for the remote entity
+ if (!($binding instanceof HTTPArtifact)) {
+ $this->idpMetadata = $this->metadataProvider->getIdPMetadata($rawResponse->getIssuer()->getContent());
+
+ if ($this->idpMetadata === null) {
+ throw new MetadataNotFoundException(sprintf(
+ 'No metadata found for remote entity with entityID: %s',
+ $rawResponse->getIssuer()->getContent(),
+ ));
+ }
+ }
+
+ // Verify the signature (if any)
+ $this->responseWasSigned = $rawResponse->isSigned();
+ $verifiedResponse = $this->responseWasSigned ? $this->verifyElementSignature($rawResponse) : $rawResponse;
+
+ $state = null;
+ $stateId = $verifiedResponse->getInResponseTo();
+
+ if (!empty($stateId)) {
+ if ($this->stateProvider === null) {
+ throw new RuntimeException(
+ "A StateProvider is required to correlate responses to their initial request.",
+ );
+ }
+
+ // this should be a response to a request we sent earlier
+ try {
+ $state = $this->stateProvider::loadState($stateId, 'saml:sp:sso');
+ } catch (RuntimeException $e) {
+ // something went wrong,
+ Utils::getContainer()->getLogger()->warning(sprintf(
+ 'Could not load state specified by InResponseTo: %s; processing response as unsolicited.',
+ $e->getMessage(),
+ ));
+ }
+ }
+
+ $issuer = $verifiedResponse->getIssuer()->getContent();
+ if ($state === null) {
+ if ($this->enableUnsolicited === false) {
+ throw new RequestDeniedException('Unsolicited responses are denied by configuration.');
+ }
+ } else {
+ // check that the issuer is the one we are expecting
+ Assert::keyExists($state, 'ExpectedIssuer');
+
+ if ($state['ExpectedIssuer'] !== $issuer) {
+ throw new ResourceNotRecognizedException("Issuer doesn't match the one the AuthnRequest was sent to.");
+ }
+ }
+
+ $this->idpMetadata = $this->metadataProvider->getIdPMetadata($issuer);
+ if ($this->idpMetadata === null) {
+ throw new MetadataNotFoundException(sprintf(
+ 'No metadata found for remote identity provider with entityID: %s',
+ $issuer,
+ ));
+ }
+
+ $responseValidator = ResponseValidator::createResponseValidator(
+ $this->idpMetadata,
+ $this->spMetadata,
+ $binding,
+ );
+ $responseValidator->validate($verifiedResponse);
+
+ if ($this->encryptedAssertions === true) {
+ Assert::allIsInstanceOf($verifiedResponse->getAssertions(), EncryptedAssertion::class);
+ }
+
+ // Decrypt and verify assertions, then rebuild the response.
+ $verifiedAssertions = $this->decryptAndVerifyAssertions($verifiedResponse->getAssertions());
+ $decryptedResponse = new Response(
+ $verifiedResponse->getStatus(),
+ $verifiedResponse->getIssueInstant(),
+ $verifiedResponse->getIssuer(),
+ $verifiedResponse->getID(),
+ $verifiedResponse->getVersion(),
+ $verifiedResponse->getInResponseTo(),
+ $verifiedResponse->getDestination(),
+ $verifiedResponse->getConsent(),
+ $verifiedResponse->getExtensions(),
+ $verifiedAssertions,
+ );
+
+
+ // Will return a verified and fully decrypted Response prior to any form of validation
+ if ($this->bypassConstraintValidation === true) {
+ return $decryptedResponse;
+ }
+
+ // TODO: Validate assertions
+ return $decryptedResponse;
+ }
+
+
+ /**
+ * Process the assertions and decrypt any encrypted elements inside.
+ *
+ * @param \SimpleSAML\SAML2\XML\saml\Assertion[] $unverifiedAssertions
+ * @return \SimpleSAML\SAML2\XML\saml\Assertion[]
+ *
+ * @throws \SimpleSAML\SAML2\Exception\RuntimeException if none of the keys could be used to decrypt the element
+ */
+ protected function decryptAndVerifyAssertions(array $unverifiedAssertions): array
+ {
+ $wantAssertionsSigned = $this->spMetadata->getWantAssertionsSigned();
+
+ /**
+ * See paragraph 6.2 of the SAML 2.0 core specifications for the applicable processing rules
+ *
+ * Long story short - Decrypt the assertion first, then validate it's signature
+ * Once the signature is verified, decrypt any BaseID, NameID or Attribute that's encrypted
+ */
+ $verifiedAssertions = [];
+ foreach ($unverifiedAssertions as $i => $assertion) {
+ // Decrypt the assertions
+ $decryptedAssertion = ($assertion instanceof EncryptedAssertion)
+ ? $this->decryptElement($assertion)
+ : $assertion;
+
+ // Verify that the request is signed, if we require this by configuration
+ if ($wantAssertionsSigned === true) {
+ Assert::true($decryptedAssertion->isSigned(), RuntimeException::class);
+ }
+
+ // Verify the signature on the assertions (if any)
+ $verifiedAssertion = $this->verifyElementSignature($decryptedAssertion);
+
+ // Decrypt the NameID and replace it inside the assertion's Subject
+ $nameID = $verifiedAssertion->getSubject()?->getIdentifier();
+
+ if ($nameID instanceof EncryptedID) {
+ $decryptedNameID = $this->decryptElement($nameID);
+ // Anything we can't decrypt, we leave up for the application to deal with
+ try {
+ $subject = new Subject($decryptedNameID, $verifiedAssertion->getSubjectConfirmation());
+ } catch (RuntimeException) {
+ $subject = $verifiedAssertion->getSubject();
+ }
+ } else {
+ $subject = $verifiedAssertion->getSubject();
+ }
+
+ // Decrypt any occurrences of EncryptedAttribute and replace them inside the assertion's AttributeStatement
+ $statements = $verifiedAssertion->getStatements();
+ foreach ($verifiedAssertion->getStatements() as $j => $statement) {
+ if ($statement instanceof AttributeStatement) {
+ $attributes = $statement->getAttributes();
+ if ($statement->hasEncryptedAttributes()) {
+ foreach ($statement->getEncryptedAttributes() as $encryptedAttribute) {
+ // Anything we can't decrypt, we leave up for the application to deal with
+ try {
+ $attributes[] = $this->decryptElement($encryptedAttribute);
+ } catch (RuntimeException) {
+ $attributes[] = $encryptedAttribute;
+ }
+ }
+ }
+
+ $statements[$j] = new AttributeStatement($attributes);
+ }
+ }
+
+ // Rebuild the Assertion
+ $verifiedAssertions[] = new Assertion(
+ $verifiedAssertion->getIssuer(),
+ $verifiedAssertion->getIssueInstant(),
+ $verifiedAssertion->getID(),
+ $subject,
+ $verifiedAssertion->getConditions(),
+ $statements,
+ );
+ }
+
+ return $verifiedAssertions;
+ }
+
+
+ /**
+ * Decrypt the given element using the decryption keys provided to us.
+ *
+ * @param \SimpleSAML\XMLSecurity\XML\EncryptedElementInterface $element
+ * @return \SimpleSAML\XMLSecurity\EncryptableElementInterface
+ *
+ * @throws \SimpleSAML\SAML2\Exception\RuntimeException if none of the keys could be used to decrypt the element
+ */
+ protected function decryptElement(EncryptedElementInterface $element): EncryptableElementInterface
+ {
+ $factory = $this->encryptionAlgorithmFactory;
+
+ // If the IDP has a pre-shared key, try decrypting with that
+ $preSharedKey = $this->idpMetadata->getPreSharedKey();
+ if ($preSharedKey !== null) {
+ $encryptionAlgorithm = $element?->getEncryptedKey()?->getEncryptionMethod()
+ ?? $this->idpMetadata->getPreSharedKeyAlgorithm();
+
+ $decryptor = $factory->getAlgorithm($encryptionAlgorithm, $preSharedKey);
+ try {
+ return $element->decrypt($decryptor);
+ } catch (Exception $e) {
+ // Continue to try decrypting with asymmetric keys.
+ }
+ }
+
+ $encryptionAlgorithm = $element->getEncryptedKey()->getEncryptionMethod()->getAlgorithm();
+ foreach ($this->spMetadata->getDecryptionKeys() as $decryptionKey) {
+ $factory = $this->keyTransportAlgorithmFactory;
+ $decryptor = $factory->getAlgorithm($encryptionAlgorithm, $decryptionKey);
+ try {
+ return $element->decrypt($decryptor);
+ } catch (Exception $e) {
+ continue;
+ }
+ }
+
+ throw new RuntimeException(sprintf(
+ 'Unable to decrypt %s with any of the available keys.',
+ $element::class,
+ ));
+ }
+
+
+ /**
+ * Verify the signature of an element using the available validation keys.
+ *
+ * @param \SimpleSAML\XMLSecurity\XML\SignedElementInterface $element
+ * @return \SimpleSAML\XMLSecurity\XML\SignableElementInterface The validated element.
+ *
+ * @throws \SimpleSAML\XMLSecurity\Exception\SignatureVerificationFailedException
+ */
+ protected function verifyElementSignature(SignedElementInterface $element): SignableElementInterface
+ {
+ $signatureAlgorithm = $element->getSignature()->getSignedInfo()->getSignatureMethod()->getAlgorithm();
+
+ foreach ($this->idpMetadata->getValidatingKeys() as $validatingKey) {
+ $verifier = $this->signatureAlgorithmFactory->getAlgorithm($signatureAlgorithm, $validatingKey);
+
+ try {
+ return $element->verify($verifier);
+ } catch (SignatureVerificationFailedException $e) {
+ continue;
+ }
+ }
+
+ throw new SignatureVerificationFailedException();
+ }
+}
diff --git a/src/SAML2/Metadata/AbstractProvider.php b/src/SAML2/Metadata/AbstractProvider.php
new file mode 100644
index 000000000..7bbf61ccc
--- /dev/null
+++ b/src/SAML2/Metadata/AbstractProvider.php
@@ -0,0 +1,137 @@
+signatureAlgorithm;
+ }
+
+
+ /**
+ * Get the private key to use for signing messages.
+ *
+ * @return \SimpleSAML\XMLSecurity\Key\PrivateKey|null
+ */
+ public function getSigningKey(): ?PrivateKey
+ {
+ return $this->signingKey;
+ }
+
+
+ /**
+ * Get the validating keys to verify a message signature with.
+ *
+ * @return array<\SimpleSAML\XMLSecurity\Key\PublicKey>
+ */
+ public function getValidatingKeys(): array
+ {
+ return $this->validatingKeys;
+ }
+
+
+ /**
+ * Get the public key to use for encrypting messages.
+ *
+ * @return \SimpleSAML\XMLSecurity\Key\PublicKey|null
+ */
+ public function getEncryptionKey(): ?PublicKey
+ {
+ return $this->encryptionKey;
+ }
+
+
+ /**
+ * Get the symmetric key to use for encrypting/decrypting messages.
+ *
+ * @return \SimpleSAML\XMLSecurity\Key\SymmetricKey|null
+ */
+ public function getPreSharedKey(): ?SymmetricKey
+ {
+ return $this->preSharedKey;
+ }
+
+
+ /**
+ * Get the symmetric encrypting/decrypting algorithm to use.
+ *
+ * @return string|null
+ */
+ public function getPreSharedKeyAlgorithm(): ?string
+ {
+ return $this->preSharedKeyAlgorithm;
+ }
+
+
+ /**
+ * Get the decryption keys to decrypt the assertion with.
+ *
+ * @return array<\SimpleSAML\XMLSecurity\Key\PrivateKey>
+ */
+ public function getDecryptionKeys(): array
+ {
+ return $this->decryptionKeys;
+ }
+
+
+ /**
+ * Retrieve the configured entity ID for this entity
+ */
+ public function getEntityId(): string
+ {
+ return $this->entityId;
+ }
+
+
+ /**
+ * Retrieve the configured IDPList for this entity.
+ *
+ * @return string[]
+ */
+ public function getIDPList(): array
+ {
+ return $this->IDPList;
+ }
+}
diff --git a/src/SAML2/Metadata/IdentityProvider.php b/src/SAML2/Metadata/IdentityProvider.php
new file mode 100644
index 000000000..80fd28663
--- /dev/null
+++ b/src/SAML2/Metadata/IdentityProvider.php
@@ -0,0 +1,42 @@
+
+ */
+ public function getAssertionConsumerService(): array
+ {
+ return $this->assertionConsumerService;
+ }
+
+
+ /**
+ * Retrieve the configured value for whether assertions must be signed.
+ *
+ * @return bool
+ */
+ public function getWantAssertionsSigned(): bool
+ {
+ return $this->wantAssertionsSigned;
+ }
+}
diff --git a/src/SAML2/MetadataProviderInterface.php b/src/SAML2/MetadataProviderInterface.php
new file mode 100644
index 000000000..f75b3eeb1
--- /dev/null
+++ b/src/SAML2/MetadataProviderInterface.php
@@ -0,0 +1,34 @@
+spMetadata->getAssertionConsumerService() as $assertionConsumerService) {
+ if ($assertionConsumerService->getLocation() === $response->getDestination()) {
+ if (Binding::getBinding($assertionConsumerService->getBinding()) instanceof $this->binding) {
+ return;
+ }
+ }
+ }
+ throw new ResourceNotRecognizedException();
+ }
+}
diff --git a/src/SAML2/Process/IdentityProviderAwareInterface.php b/src/SAML2/Process/IdentityProviderAwareInterface.php
new file mode 100644
index 000000000..d45021828
--- /dev/null
+++ b/src/SAML2/Process/IdentityProviderAwareInterface.php
@@ -0,0 +1,15 @@
+idpMetadata = $idpMetadata;
+ }
+}
diff --git a/src/SAML2/Process/ServiceProviderAwareInterface.php b/src/SAML2/Process/ServiceProviderAwareInterface.php
new file mode 100644
index 000000000..7c04a265c
--- /dev/null
+++ b/src/SAML2/Process/ServiceProviderAwareInterface.php
@@ -0,0 +1,15 @@
+spMetadata = $spMetadata;
+ }
+}
diff --git a/src/SAML2/Process/Validator/ResponseValidator.php b/src/SAML2/Process/Validator/ResponseValidator.php
new file mode 100644
index 000000000..4e84af67f
--- /dev/null
+++ b/src/SAML2/Process/Validator/ResponseValidator.php
@@ -0,0 +1,42 @@
+addConstraintValidator(new DestinationMatches($spMetadata, $binding));
+// $validator->addConstraintValidator(new IsSuccesful());
+
+ return $validator;
+ }
+}
diff --git a/src/SAML2/Process/Validator/ValidatorInterface.php b/src/SAML2/Process/Validator/ValidatorInterface.php
new file mode 100644
index 000000000..6e9bccada
--- /dev/null
+++ b/src/SAML2/Process/Validator/ValidatorInterface.php
@@ -0,0 +1,26 @@
+ */
+ protected array $validators;
+
+
+ /**
+ * Add a validation to the chain.
+ *
+ * @param \SimpleSAML\SAML2\Process\ConstraintValidation\ConstraintValidatorInterface $validation
+ */
+ public function addConstraintValidator(ConstraintValidatorInterface $validator)
+ {
+ if ($validator instanceof IdentityProviderAwareInterface) {
+ $validator->setIdentityProvider($this->idpMetadata);
+ }
+
+ if ($validator instanceof ServiceProviderAwareInterface) {
+ $validator->setServiceProvider($this->spMetadata);
+ }
+
+ $this->validators[] = $validator;
+ }
+
+
+ /**
+ * Runs all the validations in the validation chain.
+ *
+ * If this function returns, all validations have been succesful.
+ *
+ * @throws \SimpleSAML\SAML2\Exception\ConstraintViolationFailedException when one of the conditions fail.
+ */
+ public function validate(SerializableElementInterface $element): void
+ {
+ foreach ($this->validators as $validator) {
+ $validator->validate($element);
+ }
+ }
+}
diff --git a/src/SAML2/StateProviderInterface.php b/src/SAML2/StateProviderInterface.php
new file mode 100644
index 000000000..45b11f98b
--- /dev/null
+++ b/src/SAML2/StateProviderInterface.php
@@ -0,0 +1,24 @@
+documentElement);
+ /** @var \DOMElement[] $results */
+ $results = XPath::xpQuery($xml, '/SOAP-ENV:Envelope/SOAP-ENV:Body/*[1]', $xpCache);
+
+ // This is already too late to perform schema validation.
+ // TODO: refactor the SOAPClient and artifact binding. The SOAPClient should be a generic tool from xml-soap
+ $document = DOMDocumentFactory::fromString(
+ xml: $results[0]->ownerDocument->saveXML(),
+ schemaFile: $this->getSchemaValidation() ? self::$schemaFile : null,
+ );
+
// Extract the message from the response
/** @var \SimpleSAML\XML\SerializableElementInterface[] $messages */
$messages = $env->getBody()->getElements();
diff --git a/tests/SAML2/Entity/ServiceProviderTest.php b/tests/SAML2/Entity/ServiceProviderTest.php
new file mode 100644
index 000000000..c6ea6bc3c
--- /dev/null
+++ b/tests/SAML2/Entity/ServiceProviderTest.php
@@ -0,0 +1,278 @@
+ C::BINDING_HTTP_POST,
+ 'Location' => 'https://example.org/metadata',
+ 'Index' => 0,
+ ]),
+ ],
+ decryptionKeys: [
+ PEMCertificatesMock::getPrivateKey(PEMCertificatesMock::SELFSIGNED_PRIVATE_KEY),
+ ],
+ wantAssertionsSigned: true,
+ );
+
+ self::$idpMetadata = new Metadata\IdentityProvider(
+ entityId: 'https://simplesamlphp.org/idp/metadata',
+ validatingKeys: [
+ PEMCertificatesMock::getPublicKey(PEMCertificatesMock::PUBLIC_KEY),
+ PEMCertificatesMock::getPublicKey(PEMCertificatesMock::OTHER_PUBLIC_KEY),
+ PEMCertificatesMock::getPublicKey(PEMCertificatesMock::SELFSIGNED_PUBLIC_KEY),
+ ],
+ );
+
+ /** A valid solicited signed response with a signed assertion */
+ $q = [
+ 'SAMLResponse' => 'PHNhbWxwOlJlc3BvbnNlIHhtbG5zOnNhbWxwPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6cHJvdG9jb2wiIENvbnNlbnQ9Imh0dHBzOi8vc2ltcGxlc2FtbHBocC5vcmcvc3AvbWV0YWRhdGEiIERlc3RpbmF0aW9uPSJodHRwczovL2V4YW1wbGUub3JnL21ldGFkYXRhIiBJRD0iYWJjMTIzIiBJblJlc3BvbnNlVG89IlBIUFVuaXQiIElzc3VlSW5zdGFudD0iMjAyNC0wNy0yNVQyMjo0NDoyMVoiIFZlcnNpb249IjIuMCI+PHNhbWw6SXNzdWVyIHhtbG5zOnNhbWw9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphc3NlcnRpb24iPmh0dHBzOi8vc2ltcGxlc2FtbHBocC5vcmcvaWRwL21ldGFkYXRhPC9zYW1sOklzc3Vlcj48ZHM6U2lnbmF0dXJlIHhtbG5zOmRzPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwLzA5L3htbGRzaWcjIj48ZHM6U2lnbmVkSW5mbz48ZHM6Q2Fub25pY2FsaXphdGlvbk1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMTAveG1sLWV4Yy1jMTRuIyIvPjxkczpTaWduYXR1cmVNZXRob2QgQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxLzA0L3htbGRzaWctbW9yZSNyc2Etc2hhNTEyIi8+PGRzOlJlZmVyZW5jZSBVUkk9IiNhYmMxMjMiPjxkczpUcmFuc2Zvcm1zPjxkczpUcmFuc2Zvcm0gQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwLzA5L3htbGRzaWcjZW52ZWxvcGVkLXNpZ25hdHVyZSIvPjxkczpUcmFuc2Zvcm0gQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxLzEwL3htbC1leGMtYzE0biMiLz48L2RzOlRyYW5zZm9ybXM+PGRzOkRpZ2VzdE1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMDQveG1sZW5jI3NoYTUxMiIvPjxkczpEaWdlc3RWYWx1ZT4rV2YzTXpjNFZ1dlFJUEpnbEdIeUhnR0l0clc0S3cwTFdJWXo4SitYcGZtTG5taEdwQkRUYTllTjhrYWN3Qm1wdkhXNkFsOHc5SDJNcjhrZjNPbThKZz09PC9kczpEaWdlc3RWYWx1ZT48L2RzOlJlZmVyZW5jZT48L2RzOlNpZ25lZEluZm8+PGRzOlNpZ25hdHVyZVZhbHVlPmRTY2FLUHVZUnhRbEdLSHVqWnJtZUZkb1M3Y2F1aXNvMGZ3Q2gvN0s0VDFjcHdaTUNad0R5SU1qMGlzVlJycmVZM2FqSXpRTnNSVy9uWVRFd0FFWkloM3NOWGdJcW5vWmg3dng4SUN4TEo1cGVNL215citGMGlMbTk5YWs3U0FmN2FYV25McmpxWjBVOTVUMjlrd0plcXE3MzM2eHlycm9mKzZPbzhvdkN2cz08L2RzOlNpZ25hdHVyZVZhbHVlPjwvZHM6U2lnbmF0dXJlPjxzYW1scDpTdGF0dXM+PHNhbWxwOlN0YXR1c0NvZGUgVmFsdWU9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDpzdGF0dXM6U3VjY2VzcyIvPjwvc2FtbHA6U3RhdHVzPjxzYW1sOkFzc2VydGlvbiB4bWxuczpzYW1sPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXNzZXJ0aW9uIiBJRD0iXzkzYWY2NTUyMTk0NjRmYjQwM2IzNDQzNmNmYjBjNWNiMWQ5YTU1MDIiIElzc3VlSW5zdGFudD0iMTk3MC0wMS0wMVQwMTozMzozMVoiIFZlcnNpb249IjIuMCI+PHNhbWw6SXNzdWVyPnVybjp4LXNpbXBsZXNhbWxwaHA6aXNzdWVyPC9zYW1sOklzc3Vlcj48ZHM6U2lnbmF0dXJlIHhtbG5zOmRzPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwLzA5L3htbGRzaWcjIj48ZHM6U2lnbmVkSW5mbz48ZHM6Q2Fub25pY2FsaXphdGlvbk1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMTAveG1sLWV4Yy1jMTRuIyIvPjxkczpTaWduYXR1cmVNZXRob2QgQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxLzA0L3htbGRzaWctbW9yZSNyc2Etc2hhMjU2Ii8+PGRzOlJlZmVyZW5jZSBVUkk9IiNfOTNhZjY1NTIxOTQ2NGZiNDAzYjM0NDM2Y2ZiMGM1Y2IxZDlhNTUwMiI+PGRzOlRyYW5zZm9ybXM+PGRzOlRyYW5zZm9ybSBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvMDkveG1sZHNpZyNlbnZlbG9wZWQtc2lnbmF0dXJlIi8+PGRzOlRyYW5zZm9ybSBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMTAveG1sLWV4Yy1jMTRuIyIvPjwvZHM6VHJhbnNmb3Jtcz48ZHM6RGlnZXN0TWV0aG9kIEFsZ29yaXRobT0iaHR0cDovL3d3dy53My5vcmcvMjAwMS8wNC94bWxlbmMjc2hhMjU2Ii8+PGRzOkRpZ2VzdFZhbHVlPkoxWnNyOTRVU2FXaEhDVmNnamdnM3dHZFBHWTViVkNOeW16cEx4Yk1XekE9PC9kczpEaWdlc3RWYWx1ZT48L2RzOlJlZmVyZW5jZT48L2RzOlNpZ25lZEluZm8+PGRzOlNpZ25hdHVyZVZhbHVlPlJIcmxHQVdSN3RROEM4T3l6cVp4WmRlU2NiRjN1QnZJdU13RG5GdXdYcjA4OCthNnBJdlRqUTNtM0syUytwM2NGNWRxS2ZiRUd5UDBmbGRpZFNtdVVLU1B2V1hTVm14bFlONldOKzBtbEVYV08rNUduN0drTXFseHlrQTAvWDlZL3AvcmYydGhEQTJPN2dnQmRrRDlsMlFUbzNYYU1CZXZtUmgwcHl4d0lNZz08L2RzOlNpZ25hdHVyZVZhbHVlPjwvZHM6U2lnbmF0dXJlPjxzYW1sOlN1YmplY3Q+PHNhbWw6TmFtZUlEIEZvcm1hdD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOm5hbWVpZC1mb3JtYXQ6dHJhbnNpZW50IiBTUE5hbWVRdWFsaWZpZXI9Imh0dHBzOi8vc3AuZXhhbXBsZS5vcmcvYXV0aGVudGljYXRpb24vc3AvbWV0YWRhdGEiPlNvbWVOYW1lSURWYWx1ZTwvc2FtbDpOYW1lSUQ+PHNhbWw6U3ViamVjdENvbmZpcm1hdGlvbiBNZXRob2Q9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDpjbTpiZWFyZXIiPjxzYW1sOk5hbWVJRCBGb3JtYXQ9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDpuYW1laWQtZm9ybWF0OnRyYW5zaWVudCIgU1BOYW1lUXVhbGlmaWVyPSJodHRwczovL3NwLmV4YW1wbGUub3JnL2F1dGhlbnRpY2F0aW9uL3NwL21ldGFkYXRhIj5Tb21lT3RoZXJOYW1lSURWYWx1ZTwvc2FtbDpOYW1lSUQ+PHNhbWw6U3ViamVjdENvbmZpcm1hdGlvbkRhdGEgSW5SZXNwb25zZVRvPSJfMTM2MDNhNjU2NWE2OTI5N2U5ODA5MTc1YjA1MmQxMTU5NjUxMjFjOCIgTm90T25PckFmdGVyPSIyMDExLTA4LTMxVDA4OjUxOjA1WiIgUmVjaXBpZW50PSJodHRwczovL3NwLmV4YW1wbGUub3JnL2F1dGhlbnRpY2F0aW9uL3NwL2NvbnN1bWUtYXNzZXJ0aW9uIi8+PC9zYW1sOlN1YmplY3RDb25maXJtYXRpb24+PC9zYW1sOlN1YmplY3Q+PHNhbWw6Q29uZGl0aW9ucyBOb3RCZWZvcmU9IjIwMTEtMDgtMzFUMDg6NTE6MDVaIiBOb3RPbk9yQWZ0ZXI9IjIwMTEtMDgtMzFUMTA6NTE6MDVaIj48c2FtbDpBdWRpZW5jZVJlc3RyaWN0aW9uPjxzYW1sOkF1ZGllbmNlPmh0dHBzOi8vc2ltcGxlc2FtbHBocC5vcmcvc3AvbWV0YWRhdGE8L3NhbWw6QXVkaWVuY2U+PC9zYW1sOkF1ZGllbmNlUmVzdHJpY3Rpb24+PC9zYW1sOkNvbmRpdGlvbnM+PHNhbWw6QXV0aG5TdGF0ZW1lbnQgQXV0aG5JbnN0YW50PSIyMDExLTA4LTMxVDA4OjUxOjA1WiIgU2Vzc2lvbkluZGV4PSJfOTNhZjY1NTIxOTQ2NGZiNDAzYjM0NDM2Y2ZiMGM1Y2IxZDlhNTUwMiI+PHNhbWw6U3ViamVjdExvY2FsaXR5IEFkZHJlc3M9IjEyNy4wLjAuMSIvPjxzYW1sOkF1dGhuQ29udGV4dD48c2FtbDpBdXRobkNvbnRleHRDbGFzc1JlZj51cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YWM6Y2xhc3NlczpQYXNzd29yZFByb3RlY3RlZFRyYW5zcG9ydDwvc2FtbDpBdXRobkNvbnRleHRDbGFzc1JlZj48L3NhbWw6QXV0aG5Db250ZXh0Pjwvc2FtbDpBdXRoblN0YXRlbWVudD48c2FtbDpBdHRyaWJ1dGVTdGF0ZW1lbnQ+PHNhbWw6QXR0cmlidXRlIE5hbWU9InVybjp0ZXN0OlNlcnZpY2VJRCI+PHNhbWw6QXR0cmlidXRlVmFsdWUgeG1sbnM6eHNpPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYS1pbnN0YW5jZSIgeHNpOnR5cGU9InhzOmludGVnZXIiPjE8L3NhbWw6QXR0cmlidXRlVmFsdWU+PC9zYW1sOkF0dHJpYnV0ZT48c2FtbDpBdHRyaWJ1dGUgTmFtZT0idXJuOnRlc3Q6RW50aXR5Q29uY2VybmVkSUQiPjxzYW1sOkF0dHJpYnV0ZVZhbHVlIHhtbG5zOnhzaT0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEtaW5zdGFuY2UiIHhzaTp0eXBlPSJ4czppbnRlZ2VyIj4xPC9zYW1sOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDpBdHRyaWJ1dGU+PHNhbWw6QXR0cmlidXRlIE5hbWU9InVybjp0ZXN0OkVudGl0eUNvbmNlcm5lZFN1YklEIj48c2FtbDpBdHRyaWJ1dGVWYWx1ZSB4bWxuczp4c2k9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6dHlwZT0ieHM6aW50ZWdlciI+MTwvc2FtbDpBdHRyaWJ1dGVWYWx1ZT48L3NhbWw6QXR0cmlidXRlPjwvc2FtbDpBdHRyaWJ1dGVTdGF0ZW1lbnQ+PC9zYW1sOkFzc2VydGlvbj48L3NhbWxwOlJlc3BvbnNlPg==',
+ ];
+ $request = new ServerRequest('POST', 'http://tnyholm.se');
+ self::$validResponse = $request->withParsedBody($q);
+
+ /** A valid unsolicited signed response with a signed assertion */
+ $q = [
+ 'SAMLResponse' => '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',
+ ];
+ $request = new ServerRequest('POST', 'http://tnyholm.se');
+ self::$validUnsolicitedResponse = $request->withParsedBody($q);
+
+ /** A valid solicited signed response with an asymmetric encrypted signed assertion */
+ $q = [
+ 'SAMLResponse' => '<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" Consent="https://simplesamlphp.org/sp/metadata" Destination="https://example.org/metadata" ID="abc123" InResponseTo="PHPUnit" IssueInstant="2024-07-30T09:35:25Z" Version="2.0"><saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">https://simplesamlphp.org/idp/metadata</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha512"/><ds:Reference URI="#abc123"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha512"/><ds:DigestValue>89hPXuTCC8DMclBLK646HtzHld9KrrJtM9PGhiFcvoooxeldCUovmdApEU9g+8KIhrim73aO3cgOeU1HrhFGUA==</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>bTA6cNC8vTqhIGD2Gk9wdQlAC3yMgTGJeeTwpOtHGTZmE89nqDYJKL3mGWDacdMWCYmd2V1TQqjYhpJHJBk4Wy5x3MA5TupC3fDh4VafTuDIzD9e7iKNsITVEIUomy6ExZl+WGDgqBxjYDI+DR/XkPxHLWjJHfW46FfzZUGKXIE=</ds:SignatureValue></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:EncryptedAssertion xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2009xmlenc11#aes256-gcm"/><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>Efv+tUa3HukBK2Js1VBqdcG81aa6LMaV/Ndq1k2RsO1gx4DKxS5weay0y093uMnXJYV3PdJfAZs8tWlpSWvE+dvgmsmJ9JbwS/WeXA9BU1GC0H9k+1i+kDwTOLIMquD2t1BIpF1wxhRxIWIvtQB//uYWbpLwvuqJPjEgI4tZByo=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></ds:KeyInfo><xenc:CipherData><xenc:CipherValue>/PQvT7fSJDnAB2WoDbYOA+9B0FyRzUnB7uI1XVraxEjVHBVQ44O7wj9b0kceFvey2c+6W4NVinYh3F3Pmy0HctUtU9zEYlHm6mqFA6oWmQVBzDo5UpQpjuYYyNpN09d8GSpKa3113nSxS4+z83RV8L0q6zj6My0Lu92ZFadriiBmBRlAySEgq99gUIP1K/EwPn27sA7+mOyVdYSSTvCf2fd5K5tj42HquxvyVx13yKeCAc5HPqHCkBjMmyaDQ4g65t9NPedKVC4Yt6fhT+jsbMQrRPwVEzjbVFb2CpN+i6l4Hn88UgioWVhLrgIxiAnDV1k5kdeOPTTA2x//sfOMHNDhj6bv1nB+4VT8kEJnneMWQu9whWjvlP+ehTQU6O+IiV0XE3en/SIfUQ65+17KA04Z4U+kroY4CseMnDlrJ1UEPMtBkS8rbTm7zq1GE5cnKDLPwftKvnZMWUTrz6svngH4os5rpnvBgYKTexbUtum3BFWaHM3kevBS0WQxE/VCxPaASS/MmwPEfUyZF2BNGtxwl5EjLTdHf9R8HbA5RF3vZejXKcQkWe+R7SzPrPiXOb27BFSVkSFKNO9rD1FRRrGTPHqB6XhwTlLH14zkP5G7k4l6YJTe7rcHPb1eprx+04+njTf1UQ1L+Duara0tOxQ2B5gL95m/rLppDi+Rjzr4V17NJpOFk33eJbVM5pcaAs9Iy5+o9zN1IB2QlZlidWLwWuZhfQK/fgPosNm1jRcsqq5Zw+z6L0LqqyGtH80HktjFzHTXpyMNeWZ9OHqXidRwu0bHRVN524cuIs6iWZvRAeX6kYnRFcRSj0HHe8wCJY6KfLgy84O6cTOt+qF6Dj3qVagr5lLa1C8fOq45Nzn6o0IafKz8CXkGPbfkfmNVzfQALoEs0DBCyVuiMgMVRdypGk77FxMgYGiwhzmNuFLsKRsU3U5l1H6Srz6KLowglLx40md1DLyfFE/LbiwKK6IA0USIm4812XtT2Kv2ByDgQrMOUYzH/nuC/kCSkwMi8CCGy6ssvVTk4TeDRbdWvBrA+gua3H7CVKaiunmnsQc5eOaXFsjnq+H+7ID15Eqk4KkOH9Yj0eJpW/ebr2YARWQ6w7oZRdSicg8XW+vcUWkKryFZcGRURRjZ4/sjV5DJLeFlxfoUPX7vKwTKD5PXz1dXyt3dsnAaHqmzCAlhACV+YArYt4a8Io3cBCSjcw/GzbyjO3+bYHo9YKBGa1Kr3a9DN0Nenz9HCDhff59+pw2Xy8HqXGA2vgyThsy0qiKm9iFkjKbmEQaF/t6aGkWn8HDPRTNrrdHIP2TSzoijJTKGq9rnhlHfZMxsfKZkS4sUBN8g4OmGn7S1V6IrSk/Cv5RLxDoY6P0jJWeKkaPSmTRGCvGWFo+MouU8jHggDxVW4Uw9a3JvI0c4bwRyf4R1SGOWVSGxa8rUO2SwcOZSdkRrKWHt1RKG+oElr1LIBn/Vje7CcPYomw9jeX2fVOgxYJJfA0aC6MXYTATmK/8oRyqQueIbRqb30l0LaKr5dJPRHQM6dYsPU9tJccwE8km5QWkTgAu6/gCDpn5wg3g8Ml0WmzKK1umQewj5q7WOacp4BWcty7zQ7L/DEy7w/jJARq6Mh8u1S7oc5C/ba66tkXobIvJ98k848Dcx4vgGNwFJnXI/XTmiGLbv2CZxJEVJBUK7jTHuZanHT2hbGbG5/IKTHzgy2Qb31mZO74NFwWI3cR5J+Gcj3gsB2ZKFVC0LJ0bR1lNOpjL3wwIrpK4cbpVGHx6fIC43lN3NPLMKB2QZBRopfQ82x0RUc7AvvAkAUoGwz0c2eYuotMVbiJvF682FD1sivcs2kwZ0hiS4hL0KT39PRgN84oUe+JdEkohRIOIOcrq7iw04isrZnhWeMjlQTZ3dN2WiHqIEJwalc6jtnUeQ5rbFl4evE2w8iC1QkArNs9SqxfJ3Q6OYgSEYc7LVQsaKmWxdgXvaxfT30433lCkgVqmbgmDGAkeYCSVqt+jHAV+hDIlMHoIeza7Dct+VSat26VvQIEyOUaOUEXGfYCjnVedTKz/NKp7o9ssredILBmuowEp+7XUEbRPuvHh3an80JvNlfEYaPPvAAYYzhmWWpIibIrXyIxHyuWl2zbG3b9RHjUztEaaSmgj3puHNVEgv2gAb/mVpcKtU3j8x0OWEBqRus0aaT9Y83xou6ScUqJMTavEEZO4nOfCWSXm+tR3kulkpPi2k2fuBBOpU6fRAfIc3eZBFNh2oPqxLXy1C/5rUhDLePpQxY1+v8Ozt1RjPaXZlQo1ug4MDu4iu5d44123e4eTHXgUL8bKfN02KWt6+8CLJZByU2K7IQWKUHC8sl6aV9S07QeqMBDtiaV75ASKdw/BI0tjscdRCP69cuKNAI3S16qnNJkmDJv2uIqnZKf/dstHvtz4gh/mBNFHm/GW/hZKrd7yrzJoJcvS/zrLBqhDG9n5hLALCypx/HUNcaBAtz6iDpHFMNi0eESFj50vYAzhrmdv1E+KPccdfQEiiF8G0uDg76fO0SMV+iIC8QYqI+yoiWEfbCS2IkYYEKB1JbMyJIO6udzshjgZiOGcM9b5diwrIOPSYL4CiNiAuu3XCjZT0MVGf/QcN2LoZe7C5fOK+XqPKiRksSmKQ0GPoOv3rCbjCbF+pifnRX3okWkM8M6zp0HoizEir3oHGSX8x5qCAoWYtLTIRkbS6L5s7nTdNcSulxEOn/O3Yh5qpdmDlQdoIy2gV7Z6kvukoCZus9LEjr37cOZ8KfTg0K/eWwzvPG2mV9QHB7p77B4FTd4tQOMWobbZI97KTM3EDZtgwdkFkLQW98CNBlACkMYGTULGnDEN79E3NQpEkSvIhN8t/yeYkSSE8GGNIrBitViOWYLkYhPeClgTd8fhDV9nn9uaIaoLe50GTd3OSWBpIh6PEMfGxLojOBOj73pJn/lt+31Kgc4LoKdA5uQzfw08dE7PJOjgWpLa638lQ5Uya5uMaPO19Rwx6PdNECjw3jz/gZaVSCZc8yrzMM/8cXoeSNA+bjyLJcT7zyVcJ2JKstgQYiUIzj6V/3U4o6XWRFqXHZcYYHKbtxnMmjORsY880Z7pObxiI/s+viHuZabDv5IHpY5h8+ro5zWfi+f6NP+R3Pb+J4gIJ5DT0ONdfneMUnf12/r1z87IxdQqp3d8vbS+VZfWYdGJzw4IwKnEBL060NyPAi1eFuy8k8TYfd6JNbakYcfSdIZwsOoWO4KGxtFBsA0676TDcbpq19domuCZeKfCmownckqWEoQ683QI4VaQZtT8zKIeY0mhlvaVF1PiWzkYOMRl8MZStZxezqnGZAJ2vweenJ1AzpdRTRz1nMpkE/dnFO35Hj3ypHPjqGfyluWW+VQqAAG2v7QpUyJer3a8SyIpZwurl2dPqyQeXIZHa0AdGws5KNA/ndEzHMOM9kXCnD5sh3YwQsZFWCJbBpQV76tqZh3+hingWBOaSRrImFOphVk72uRtzlbE+LYzPWmI1mplF55jGVOO6rBm02yThg/WaZOrn+2IHRLIBi+LsPkP5VoHGLqIEjYzTXMC7VdsnuhhM7Ldlosne4S4q30p7H1/eUKZUUglIVOguPhQxHeeWWgPsQWgM4AJ8tO3wMsHmKC1NIqqSRnvKzYyoegYQ44JqnPPLx7hBvm29dh1ECHEAuvsNwtKnkTs4Qu+QkBHN2kfiXPt1o3PzTzKZd42OTIFmhZAtKpIcXFi2/yOjxE7xwo1r9TG0zLO8R3y0tIuMJBQ9Z3/ZeuH0VIcvvJbJsPgjPZPRjkHErwUmcbmzyZTuHsiqTzvCKkIsUT2Z9utBvYah/lPJpe3NrrgrgMSCMgKAZ6DRVccdxRASqU5ygsNiVi8ksNnfJMoQ2BPgKN8F7xjG3CoXyGoV46u1ELRYj7oOALM4/7beX+wXXEEA030MRTv5wYH7doVigaoHFh8sJg2U2BGTwg0m8+5o1tN3tlg=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>',
+ ];
+ $request = new ServerRequest('POST', 'http://tnyholm.se');
+ self::$validSolicitedResponseAsymmetricEncryptedSignedResponse = $request->withParsedBody($q);
+ }
+
+
+ /**
+ * test that an unsolicited samlp:Response is refused by default
+ */
+ public function testUnsolicitedResponseIsRefusedByDefault(): void
+ {
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([self::$idpMetadata]),
+ spMetadata: self::$spMetadata,
+ );
+
+ $this->expectException(RequestDeniedException::class);
+ $this->expectExceptionMessage("Unsolicited responses are denied by configuration.");
+ $serviceProvider->receiveResponse(self::$validUnsolicitedResponse);
+ }
+
+
+ /**
+ * test that an unsolicited samlp:Response is allowed by config
+ */
+ public function testUnsolicitedResponseIsAllowedByConfig(): void
+ {
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([self::$idpMetadata]),
+ spMetadata: self::$spMetadata,
+ enableUnsolicited: true,
+ );
+
+ $response = $serviceProvider->receiveResponse(self::$validUnsolicitedResponse);
+ $this->assertInstanceOf(Response::class, $response);
+ }
+
+
+ /**
+ * test that samlp:Response can be received when verification is bypassed.
+ */
+ public function testResponseParsingBypassVerification(): void
+ {
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([self::$idpMetadata]),
+ spMetadata: self::$spMetadata,
+ bypassResponseVerification: true,
+ );
+ $response = $serviceProvider->receiveResponse(self::$validResponse);
+ $this->assertInstanceOf(Response::class, $response);
+ }
+
+
+ /**
+ * test that samlp:Response can be received when verification is enabled, but validation is bypassed.
+ */
+ #[Depends('testResponseParsingBypassVerification')]
+ public function testResponseParsingBypassValidation(): void
+ {
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([self::$idpMetadata]),
+ spMetadata: self::$spMetadata,
+ bypassResponseVerification: false,
+ bypassConstraintValidation: true,
+ );
+
+ $state = [
+ 'ExpectedIssuer' => 'https://simplesamlphp.org/idp/metadata',
+ ];
+
+ $stateProvider = new MockStateProvider();
+ $stateProvider::saveState($state, 'saml:sp:sso');
+ $serviceProvider->setStateProvider($stateProvider);
+
+ $response = $serviceProvider->receiveResponse(self::$validResponse);
+ $this->assertInstanceOf(Response::class, $response);
+ }
+
+
+ /**
+ * test that samlp:Response can be received when both verification and validation are enabled.
+ */
+ #[Depends('testResponseParsingBypassValidation')]
+ public function testResponseParsingFull(): void
+ {
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([self::$idpMetadata]),
+ spMetadata: self::$spMetadata,
+ bypassResponseVerification: false,
+ bypassConstraintValidation: false,
+ );
+
+ $state = [
+ 'ExpectedIssuer' => 'https://simplesamlphp.org/idp/metadata',
+ ];
+
+ $stateProvider = new MockStateProvider();
+ $stateProvider::saveState($state, 'saml:sp:sso');
+ $serviceProvider->setStateProvider($stateProvider);
+
+ $response = $serviceProvider->receiveResponse(self::$validResponse);
+ $this->assertInstanceOf(Response::class, $response);
+ }
+
+
+ /**
+ * test that samlp:Response with symmetric encrypted signed assertion
+ * can be received when both verification and validation are enabled.
+ */
+// #[Depends('testResponseParsingBypassValidation')]
+ public function testResponseParsingFullAsymmetricEncryptedSignedAssertion(): void
+ {
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([self::$idpMetadata]),
+ spMetadata: self::$spMetadata,
+ );
+
+ $state = [
+ 'ExpectedIssuer' => 'https://simplesamlphp.org/idp/metadata',
+ ];
+
+ $stateProvider = new MockStateProvider();
+ $stateProvider::saveState($state, 'saml:sp:sso');
+ $serviceProvider->setStateProvider($stateProvider);
+
+ $response = $serviceProvider->receiveResponse(self::$validSolicitedResponseAsymmetricEncryptedSignedResponse);
+ $this->assertInstanceOf(Response::class, $response);
+ }
+
+
+ /**
+ * test that a message from an unexpected issuer is refused
+ */
+ #[Depends('testResponseParsingBypassVerification')]
+ public function testUnknownIssuerThrowsException(): void
+ {
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([self::$idpMetadata]),
+ spMetadata: self::$spMetadata,
+ );
+
+ $state = [
+ 'ExpectedIssuer' => 'urn:x-simplesamlphp:sp',
+ ];
+
+ $stateProvider = new MockStateProvider();
+ $stateProvider::saveState($state, 'saml:sp:sso');
+ $serviceProvider->setStateProvider($stateProvider);
+
+ $this->expectException(ResourceNotRecognizedException::class);
+ $this->expectExceptionMessage("Issuer doesn't match the one the AuthnRequest was sent to.");
+
+ $serviceProvider->receiveResponse(self::$validResponse);
+ }
+
+
+ /**
+ * test that a message from an entity is refused
+ */
+ public function testUnknownEntityThrowsException(): void
+ {
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([]),
+ spMetadata: self::$spMetadata,
+ );
+
+ $this->expectException(MetadataNotFoundException::class);
+ $this->expectExceptionMessage(
+ "No metadata found for remote entity with entityID: https://simplesamlphp.org/idp/metadata",
+ );
+
+ $serviceProvider->receiveResponse(self::$validResponse);
+ }
+
+
+ /**
+ * test that verifying a Response with the wrong key throws a SignatureVerificationFailedException.
+ */
+ public function testWrongKeyThrowsException(): void
+ {
+ $idpMetadata = new Metadata\IdentityProvider(
+ entityId: 'https://simplesamlphp.org/idp/metadata',
+ validatingKeys: [
+ PEMCertificatesMock::getPublicKey(PEMCertificatesMock::SELFSIGNED_PUBLIC_KEY),
+ ],
+ );
+
+ $serviceProvider = new Entity\ServiceProvider(
+ metadataProvider: new MockMetadataProvider([$idpMetadata]),
+ spMetadata: self::$spMetadata,
+ );
+
+ $this->expectException(SignatureVerificationFailedException::class);
+ $this->expectExceptionMessage('Signature verification failed.');
+
+ $serviceProvider->receiveResponse(self::$validResponse);
+ }
+}
diff --git a/tests/SAML2/MockMetadataProvider.php b/tests/SAML2/MockMetadataProvider.php
new file mode 100644
index 000000000..68faa5740
--- /dev/null
+++ b/tests/SAML2/MockMetadataProvider.php
@@ -0,0 +1,86 @@
+entities = $entities;
+ }
+
+
+ /**
+ * Find IdP-metadata based on a SHA-1 hash of the entityID. Return `null` if not found.
+ */
+ public function getIdPMetadataForSha1(string $hash): ?IdentityProvider
+ {
+ foreach ($this->entities as $entity) {
+ if (($entity instanceof IdentityProvider) && ($hash === sha1($entity->getEntityId()))) {
+ return $entity;
+ }
+ }
+
+ return null;
+ }
+
+
+ /**
+ * Find SP-metadata based on a SHA-1 hash of the entityID. Return `null` if not found.
+ */
+ public function getSPMetadataForSha1(string $hash): ?ServiceProvider
+ {
+ foreach ($this->entities as $entity) {
+ if (($entity instanceof ServiceProvider) && ($hash === sha1($entity->getEntityId()))) {
+ return $entity;
+ }
+ }
+
+ return null;
+ }
+
+
+ /**
+ * Find IdP-metadata based on an entityID. Return `null` if not found.
+ */
+ public function getIdPMetadata(string $entityId): ?IdentityProvider
+ {
+ foreach ($this->entities as $entity) {
+ if (($entity instanceof IdentityProvider) && ($entityId === $entity->getEntityId())) {
+ return $entity;
+ }
+ }
+
+ return null;
+ }
+
+
+ /**
+ * Find SP-metadata based on an entityID. Return `null` if not found.
+ */
+ public function getSPMetadata(string $entityId): ?ServiceProvider
+ {
+ foreach ($this->entities as $entity) {
+ if (($entity instanceof ServiceProvider) && ($entityId === $entity->getEntityId())) {
+ return $entity;
+ }
+ }
+
+ return null;
+ }
+}
diff --git a/tests/SAML2/MockStateProvider.php b/tests/SAML2/MockStateProvider.php
new file mode 100644
index 000000000..2bba0b6d2
--- /dev/null
+++ b/tests/SAML2/MockStateProvider.php
@@ -0,0 +1,52 @@
+setBlacklistedAlgorithms(null);
+ContainerSingleton::setContainer($container);
+
+$assertionSigner = (new SignatureAlgorithmFactory())->getAlgorithm(
+ C::SIG_RSA_SHA256,
+ PEMCertificatesMock::getPrivateKey(PEMCertificatesMock::OTHER_PRIVATE_KEY),
+);
+
+$document = DOMDocumentFactory::fromFile(dirname(__FILE__, 2) . '/resources/xml/saml_Assertion.xml');
+$unsignedAssertion = Assertion::fromXML($document->documentElement);
+$unsignedAssertion->sign($assertionSigner);
+
+$signedAssertion = $unsignedAssertion->toXML();
+$signedAssertion = Assertion::fromXML($signedAssertion);
+
+$encryptor = (new KeyTransportAlgorithmFactory())->getAlgorithm(
+ C::KEY_TRANSPORT_OAEP_MGF1P,
+ PEMCertificatesMock::getPublicKey(PEMCertificatesMock::SELFSIGNED_PUBLIC_KEY),
+);
+$encryptedAssertion = new EncryptedAssertion($signedAssertion->encrypt($encryptor));
+$unsignedResponse = new Response(
+ status: new Status(new StatusCode(C::STATUS_SUCCESS)),
+ issuer: new Issuer('https://simplesamlphp.org/idp/metadata'),
+ issueInstant: new DateTimeImmutable('now', new DateTimeZone('Z')),
+ id: 'abc123',
+ inResponseTo: 'PHPUnit',
+ destination: C::ENTITY_OTHER,
+ consent: C::ENTITY_SP,
+ assertions: [$encryptedAssertion],
+);
+
+$responseSigner = (new SignatureAlgorithmFactory())->getAlgorithm(
+ C::SIG_RSA_SHA512,
+ PEMCertificatesMock::getPrivateKey(PEMCertificatesMock::PRIVATE_KEY),
+);
+
+$unsignedResponse->sign($responseSigner);
+$signedResponse = $unsignedResponse->toXML();
+
+$xmlRepresentation = $signedResponse->ownerDocument->saveXML($signedResponse);
+echo $xmlRepresentation . PHP_EOL;
+echo base64_encode($xmlRepresentation) . PHP_EOL;
diff --git a/tests/resources/xml/saml_Assertion.min.xml b/tests/resources/xml/saml_Assertion.min.xml
new file mode 100644
index 000000000..46ca831c9
--- /dev/null
+++ b/tests/resources/xml/saml_Assertion.min.xml
@@ -0,0 +1 @@
+urn:x-simplesamlphp:issuerSomeNameIDValueSomeOtherNameIDValuehttps://simplesamlphp.org/sp/metadataurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport111