19 declare(strict_types=1);
52 $serialized_payload = $this->serializer->serializePayload($payload->
get());
53 $serialized_validity = $this->serializer->serializeValidity($payload->
until());
54 $signable_payload = $serialized_payload . self::SEPARATOR . $serialized_validity;
57 $signature = $this->signer->sign($signable_payload, $salt);
59 $signed_payload = $signable_payload . self::SEPARATOR . $signature;
61 $compressed_payload = $this->compression->compress($signed_payload);
63 $prepare_for_transport = $this->transport->prepareForTransport($compressed_payload);
65 return $prepare_for_transport;
72 $decompressed_payload = $this->compression->decompress(
73 $this->transport->readFromTransport($data)
79 $split_data = explode(self::SEPARATOR, $decompressed_payload);
80 $serialized_payload = $split_data[0] ??
'';
81 $validity = $split_data[1] ??
'';
82 $signature = $split_data[2] ??
'';
84 $payload_with_validity = $serialized_payload . self::SEPARATOR . $validity;
86 if ($this->signer->verify($payload_with_validity, $signature, (
int) $validity, $salt) ===
false) {
90 return new StructuredPayload($this->serializer->unserializePayload($serialized_payload));
sign(Payload $payload, Salt $salt)
if(count($parts) !=3) $payload
__construct(private KeyRotatingSigner $signer, private Serializer $serializer, private Compression $compression, private Transport $transport)
The salt is combined with the secret key to derive a unique key for distinguishing different contexts...
verify(string $data, Salt $salt)