@@ -51,7 +51,7 @@ |
||
| 51 | 51 | */ |
| 52 | 52 | private static function loadOids() |
| 53 | 53 | { |
| 54 | - $json = file_get_contents(__DIR__ .'/oids.json'); |
|
| 54 | + $json = file_get_contents(__DIR__ . '/oids.json'); |
|
| 55 | 55 | self::$oidsTable = (array) json_decode($json, true); |
| 56 | 56 | } |
| 57 | 57 | } |
@@ -30,7 +30,7 @@ |
||
| 30 | 30 | */ |
| 31 | 31 | public function __doRequest($request, $location, $action, $version, $oneWay = 0) |
| 32 | 32 | { |
| 33 | - $search = [":ns1","ns1:","\n","\r"]; |
|
| 33 | + $search = [":ns1", "ns1:", "\n", "\r"]; |
|
| 34 | 34 | return parent::__doRequest( |
| 35 | 35 | str_replace($search, '', $request), |
| 36 | 36 | $location, |
@@ -22,7 +22,7 @@ |
||
| 22 | 22 | { |
| 23 | 23 | public static function info($code) |
| 24 | 24 | { |
| 25 | - $codes = (array) json_decode(file_get_contents(__DIR__.'/httpcodes.json'), true); |
|
| 25 | + $codes = (array) json_decode(file_get_contents(__DIR__ . '/httpcodes.json'), true); |
|
| 26 | 26 | if (array_key_exists($code, $codes)) { |
| 27 | 27 | return $codes[$code]; |
| 28 | 28 | } |
@@ -77,7 +77,7 @@ discard block |
||
| 77 | 77 | //get length of OID data |
| 78 | 78 | $len = self::getLength((string) $data); |
| 79 | 79 | //get only a string with bytes belongs to OID |
| 80 | - $oidData = substr($data, 2 + $bytes, $len-($bytes)); |
|
| 80 | + $oidData = substr($data, 2 + $bytes, $len - ($bytes)); |
|
| 81 | 81 | //parse OID data many possibel formats and structures |
| 82 | 82 | $head = strlen($oidData) - strlen($xcv) - 2; |
| 83 | 83 | $ret = substr($oidData, -$head); |
@@ -121,7 +121,7 @@ discard block |
||
| 121 | 121 | if ($num == 0) { |
| 122 | 122 | $bun = 40 * $partes[$num]; |
| 123 | 123 | } elseif ($num == 1) { |
| 124 | - $bun += $partes[$num]; |
|
| 124 | + $bun += $partes[$num]; |
|
| 125 | 125 | $abBinary[] = $bun; |
| 126 | 126 | } else { |
| 127 | 127 | $abBinary = self::xBase128((array) $abBinary, (integer) $partes[$num], true); |
@@ -145,7 +145,7 @@ discard block |
||
| 145 | 145 | { |
| 146 | 146 | $abc = $abIn; |
| 147 | 147 | if ($qIn > 127) { |
| 148 | - $abc = self::xBase128($abc, floor($qIn/128), false); |
|
| 148 | + $abc = self::xBase128($abc, floor($qIn / 128), false); |
|
| 149 | 149 | } |
| 150 | 150 | $qIn2 = $qIn % 128; |
| 151 | 151 | if ($flag) { |
@@ -87,7 +87,7 @@ |
||
| 87 | 87 | */ |
| 88 | 88 | public function __toString() |
| 89 | 89 | { |
| 90 | - $messages = array_map(function (\Exception $exception) { |
|
| 90 | + $messages = array_map(function(\Exception $exception) { |
|
| 91 | 91 | return $exception->getMessage(); |
| 92 | 92 | }, $this->exceptions); |
| 93 | 93 | return implode(PHP_EOL, $messages); |
@@ -387,9 +387,9 @@ discard block |
||
| 387 | 387 | ); |
| 388 | 388 | } |
| 389 | 389 | $this->certsdir = $this->certificate->getCnpj() . '/certs/'; |
| 390 | - $this->prifile = $this->certsdir. Strings::randomString(10).'.pem'; |
|
| 391 | - $this->pubfile = $this->certsdir . Strings::randomString(10).'.pem'; |
|
| 392 | - $this->certfile = $this->certsdir . Strings::randomString(10).'.pem'; |
|
| 390 | + $this->prifile = $this->certsdir . Strings::randomString(10) . '.pem'; |
|
| 391 | + $this->pubfile = $this->certsdir . Strings::randomString(10) . '.pem'; |
|
| 392 | + $this->certfile = $this->certsdir . Strings::randomString(10) . '.pem'; |
|
| 393 | 393 | $ret = true; |
| 394 | 394 | $private = $this->certificate->privateKey; |
| 395 | 395 | if ($this->encriptPrivateKey) { |
@@ -414,7 +414,7 @@ discard block |
||
| 414 | 414 | ); |
| 415 | 415 | $ret &= $this->filesystem->put( |
| 416 | 416 | $this->certfile, |
| 417 | - $private."{$this->certificate}" |
|
| 417 | + $private . "{$this->certificate}" |
|
| 418 | 418 | ); |
| 419 | 419 | if (!$ret) { |
| 420 | 420 | throw new RuntimeException( |
@@ -440,7 +440,7 @@ discard block |
||
| 440 | 440 | //utilize a API. Outra solução para remover arquivos "perdidos" pode ser |
| 441 | 441 | //encontrada oportunamente. |
| 442 | 442 | $dt = new \DateTime(); |
| 443 | - $tint = new \DateInterval("PT".$this->waitingTime."M"); |
|
| 443 | + $tint = new \DateInterval("PT" . $this->waitingTime . "M"); |
|
| 444 | 444 | $tint->invert = true; |
| 445 | 445 | $tsLimit = $dt->add($tint)->getTimestamp(); |
| 446 | 446 | foreach ($contents as $item) { |
@@ -98,7 +98,7 @@ discard block |
||
| 98 | 98 | curl_setopt($oCurl, CURLOPT_KEYPASSWD, $this->temppass); |
| 99 | 99 | } |
| 100 | 100 | curl_setopt($oCurl, CURLOPT_RETURNTRANSFER, 1); |
| 101 | - if (! empty($envelope)) { |
|
| 101 | + if (!empty($envelope)) { |
|
| 102 | 102 | curl_setopt($oCurl, CURLOPT_POST, 1); |
| 103 | 103 | curl_setopt($oCurl, CURLOPT_POSTFIELDS, $envelope); |
| 104 | 104 | curl_setopt($oCurl, CURLOPT_HTTPHEADER, $parameters); |
@@ -140,9 +140,9 @@ discard block |
||
| 140 | 140 | if ($this->proxyIP != '') { |
| 141 | 141 | curl_setopt($oCurl, CURLOPT_HTTPPROXYTUNNEL, 1); |
| 142 | 142 | curl_setopt($oCurl, CURLOPT_PROXYTYPE, CURLPROXY_HTTP); |
| 143 | - curl_setopt($oCurl, CURLOPT_PROXY, $this->proxyIP.':'.$this->proxyPort); |
|
| 143 | + curl_setopt($oCurl, CURLOPT_PROXY, $this->proxyIP . ':' . $this->proxyPort); |
|
| 144 | 144 | if ($this->proxyUser != '') { |
| 145 | - curl_setopt($oCurl, CURLOPT_PROXYUSERPWD, $this->proxyUser.':'.$this->proxyPass); |
|
| 145 | + curl_setopt($oCurl, CURLOPT_PROXYUSERPWD, $this->proxyUser . ':' . $this->proxyPass); |
|
| 146 | 146 | curl_setopt($oCurl, CURLOPT_PROXYAUTH, CURLAUTH_BASIC); |
| 147 | 147 | } |
| 148 | 148 | } |
@@ -33,7 +33,7 @@ discard block |
||
| 33 | 33 | |
| 34 | 34 | class Signer |
| 35 | 35 | { |
| 36 | - private static $canonical = [true,false,null,null]; |
|
| 36 | + private static $canonical = [true, false, null, null]; |
|
| 37 | 37 | |
| 38 | 38 | /** |
| 39 | 39 | * Make Signature tag |
@@ -53,7 +53,7 @@ discard block |
||
| 53 | 53 | $tagname, |
| 54 | 54 | $mark = 'Id', |
| 55 | 55 | $algorithm = OPENSSL_ALGO_SHA1, |
| 56 | - $canonical = [true,false,null,null], |
|
| 56 | + $canonical = [true, false, null, null], |
|
| 57 | 57 | $rootname = '' |
| 58 | 58 | ) { |
| 59 | 59 | if (!empty($canonical)) { |
@@ -62,7 +62,7 @@ discard block |
||
| 62 | 62 | if (empty($content)) { |
| 63 | 63 | throw SignerException::isNotXml(); |
| 64 | 64 | } |
| 65 | - if (! Validator::isXML($content)) { |
|
| 65 | + if (!Validator::isXML($content)) { |
|
| 66 | 66 | throw SignerException::isNotXml(); |
| 67 | 67 | } |
| 68 | 68 | $dom = new DOMDocument('1.0', 'UTF-8'); |
@@ -77,7 +77,7 @@ discard block |
||
| 77 | 77 | if (empty($node) || empty($root)) { |
| 78 | 78 | throw SignerException::tagNotFound($tagname); |
| 79 | 79 | } |
| 80 | - if (! self::existsSignature($content)) { |
|
| 80 | + if (!self::existsSignature($content)) { |
|
| 81 | 81 | $dom = self::createSignature( |
| 82 | 82 | $certificate, |
| 83 | 83 | $dom, |
@@ -110,7 +110,7 @@ discard block |
||
| 110 | 110 | DOMNode $node, |
| 111 | 111 | $mark, |
| 112 | 112 | $algorithm = OPENSSL_ALGO_SHA1, |
| 113 | - $canonical = [true,false,null,null] |
|
| 113 | + $canonical = [true, false, null, null] |
|
| 114 | 114 | ) { |
| 115 | 115 | $nsDSIG = 'http://www.w3.org/2000/09/xmldsig#'; |
| 116 | 116 | $nsCannonMethod = 'http://www.w3.org/TR/2001/REC-xml-c14n-20010315'; |
@@ -122,7 +122,7 @@ discard block |
||
| 122 | 122 | $nsSignatureMethod = 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256'; |
| 123 | 123 | $nsDigestMethod = 'http://www.w3.org/2001/04/xmlenc#sha256'; |
| 124 | 124 | } |
| 125 | - $nsTransformMethod1 ='http://www.w3.org/2000/09/xmldsig#enveloped-signature'; |
|
| 125 | + $nsTransformMethod1 = 'http://www.w3.org/2000/09/xmldsig#enveloped-signature'; |
|
| 126 | 126 | $nsTransformMethod2 = 'http://www.w3.org/TR/2001/REC-xml-c14n-20010315'; |
| 127 | 127 | $idSigned = trim($node->getAttribute($mark)); |
| 128 | 128 | $digestValue = self::makeDigest($node, $digestAlgorithm, $canonical); |
@@ -177,7 +177,7 @@ discard block |
||
| 177 | 177 | */ |
| 178 | 178 | public static function removeSignature($content) |
| 179 | 179 | { |
| 180 | - if (! self::existsSignature($content)) { |
|
| 180 | + if (!self::existsSignature($content)) { |
|
| 181 | 181 | return $content; |
| 182 | 182 | } |
| 183 | 183 | $dom = new \DOMDocument('1.0', 'utf-8'); |
@@ -205,7 +205,7 @@ discard block |
||
| 205 | 205 | public static function isSigned( |
| 206 | 206 | $content, |
| 207 | 207 | $tagname = '', |
| 208 | - $canonical = [true,false,null,null] |
|
| 208 | + $canonical = [true, false, null, null] |
|
| 209 | 209 | ) { |
| 210 | 210 | if (self::existsSignature($content)) { |
| 211 | 211 | if (self::digestCheck($content, $tagname, $canonical)) { |
@@ -224,7 +224,7 @@ discard block |
||
| 224 | 224 | */ |
| 225 | 225 | public static function existsSignature($content) |
| 226 | 226 | { |
| 227 | - if (! Validator::isXML($content)) { |
|
| 227 | + if (!Validator::isXML($content)) { |
|
| 228 | 228 | throw SignerException::isNotXml(); |
| 229 | 229 | } |
| 230 | 230 | $dom = new \DOMDocument('1.0', 'utf-8'); |
@@ -246,7 +246,7 @@ discard block |
||
| 246 | 246 | */ |
| 247 | 247 | private static function signatureCheck( |
| 248 | 248 | $xml, |
| 249 | - $canonical = [true,false,null,null] |
|
| 249 | + $canonical = [true, false, null, null] |
|
| 250 | 250 | ) { |
| 251 | 251 | $dom = new \DOMDocument('1.0', 'utf-8'); |
| 252 | 252 | $dom->formatOutput = false; |
@@ -272,7 +272,7 @@ discard block |
||
| 272 | 272 | $decodedSignature = base64_decode( |
| 273 | 273 | str_replace(array("\r", "\n"), '', $signatureValue) |
| 274 | 274 | ); |
| 275 | - if (! $publicKey->verify($signInfoNode, $decodedSignature, $algorithm)) { |
|
| 275 | + if (!$publicKey->verify($signInfoNode, $decodedSignature, $algorithm)) { |
|
| 276 | 276 | throw SignerException::signatureComparisonFailed(); |
| 277 | 277 | } |
| 278 | 278 | return true; |
@@ -288,7 +288,7 @@ discard block |
||
| 288 | 288 | private static function digestCheck( |
| 289 | 289 | $xml, |
| 290 | 290 | $tagname = '', |
| 291 | - $canonical = [true,false,null,null] |
|
| 291 | + $canonical = [true, false, null, null] |
|
| 292 | 292 | ) { |
| 293 | 293 | $dom = new \DOMDocument('1.0', 'utf-8'); |
| 294 | 294 | $dom->formatOutput = false; |
@@ -344,7 +344,7 @@ discard block |
||
| 344 | 344 | private static function makeDigest( |
| 345 | 345 | DOMNode $node, |
| 346 | 346 | $algorithm, |
| 347 | - $canonical = [true,false,null,null] |
|
| 347 | + $canonical = [true, false, null, null] |
|
| 348 | 348 | ) { |
| 349 | 349 | //calcular o hash dos dados |
| 350 | 350 | $c14n = self::canonize($node, $canonical); |
@@ -360,7 +360,7 @@ discard block |
||
| 360 | 360 | */ |
| 361 | 361 | private static function canonize( |
| 362 | 362 | DOMNode $node, |
| 363 | - $canonical = [true,false,null,null] |
|
| 363 | + $canonical = [true, false, null, null] |
|
| 364 | 364 | ) { |
| 365 | 365 | return $node->C14N( |
| 366 | 366 | $canonical[0], |
@@ -17,9 +17,9 @@ |
||
| 17 | 17 | { |
| 18 | 18 | $msg = ''; |
| 19 | 19 | foreach ($errors as $error) { |
| 20 | - $msg .= $error."\n"; |
|
| 20 | + $msg .= $error . "\n"; |
|
| 21 | 21 | } |
| 22 | - return new static('This XML is not valid. '.$msg); |
|
| 22 | + return new static('This XML is not valid. ' . $msg); |
|
| 23 | 23 | } |
| 24 | 24 | |
| 25 | 25 | public static function isNotXml() |