@@ -69,7 +69,7 @@ |
||
69 | 69 | if ($subjectNameIdFromResponse !== $secondFactor->secondFactorIdentifier) { |
70 | 70 | throw new ReceivedInvalidSubjectNameIdException( |
71 | 71 | sprintf( |
72 | - 'The nameID received from the GSSP (%s) did not match the selected second factor (%s). This '. |
|
72 | + 'The nameID received from the GSSP (%s) did not match the selected second factor (%s). This ' . |
|
73 | 73 | 'might be an indication someone is tampering with a GSSP. The authentication was started by %s', |
74 | 74 | $subjectNameIdFromResponse, |
75 | 75 | $secondFactor->secondFactorIdentifier, |
@@ -149,7 +149,7 @@ |
||
149 | 149 | } else { |
150 | 150 | // Render the regular SAML response, we do not return it yet, the SSO on 2FA handler will use it to store |
151 | 151 | // the SSO on 2FA cookie. |
152 | - $httpResponse = $responseRendering->renderResponse($responseContext, $response, $request); |
|
152 | + $httpResponse = $responseRendering->renderResponse($responseContext, $response, $request); |
|
153 | 153 | } |
154 | 154 | |
155 | 155 | if ($response->isSuccess()) { |