@@ -74,7 +74,7 @@ discard block |
||
| 74 | 74 | //get length of OID data |
| 75 | 75 | $len = self::getLength($data); |
| 76 | 76 | //get only a string with bytes belongs to OID |
| 77 | - $oidData = substr($data, 2 + $bytes, $len-($bytes)); |
|
| 77 | + $oidData = substr($data, 2 + $bytes, $len - ($bytes)); |
|
| 78 | 78 | //parse OID data many possibel formats and structures |
| 79 | 79 | $head = strlen($oidData) - strlen($xcv) - 2; |
| 80 | 80 | $ret = substr($oidData, -$head); |
@@ -118,7 +118,7 @@ discard block |
||
| 118 | 118 | if ($num == 0) { |
| 119 | 119 | $bun = 40 * $partes[$num]; |
| 120 | 120 | } elseif ($num == 1) { |
| 121 | - $bun += $partes[$num]; |
|
| 121 | + $bun += $partes[$num]; |
|
| 122 | 122 | $abBinary[] = $bun; |
| 123 | 123 | } else { |
| 124 | 124 | $abBinary = self::xBase128($abBinary, (integer) $partes[$num], true); |
@@ -142,7 +142,7 @@ discard block |
||
| 142 | 142 | { |
| 143 | 143 | $abc = $abIn; |
| 144 | 144 | if ($qIn > 127) { |
| 145 | - $abc = self::xBase128($abc, floor($qIn/128), false); |
|
| 145 | + $abc = self::xBase128($abc, floor($qIn / 128), false); |
|
| 146 | 146 | } |
| 147 | 147 | $qIn2 = $qIn % 128; |
| 148 | 148 | if ($flag) { |
@@ -32,7 +32,7 @@ discard block |
||
| 32 | 32 | |
| 33 | 33 | class Signer |
| 34 | 34 | { |
| 35 | - const CANONICAL = [true,false,null,null]; |
|
| 35 | + const CANONICAL = [true, false, null, null]; |
|
| 36 | 36 | |
| 37 | 37 | /** |
| 38 | 38 | * Make Signature tag |
@@ -56,7 +56,7 @@ discard block |
||
| 56 | 56 | if (empty($content)) { |
| 57 | 57 | throw SignerException::isNotXml(); |
| 58 | 58 | } |
| 59 | - if (! Validator::isXML($content)) { |
|
| 59 | + if (!Validator::isXML($content)) { |
|
| 60 | 60 | throw SignerException::isNotXml(); |
| 61 | 61 | } |
| 62 | 62 | $dom = new DOMDocument('1.0', 'UTF-8'); |
@@ -67,7 +67,7 @@ discard block |
||
| 67 | 67 | if (empty($node)) { |
| 68 | 68 | throw SignerException::tagNotFound($tagname); |
| 69 | 69 | } |
| 70 | - if (! self::existsSignature($content)) { |
|
| 70 | + if (!self::existsSignature($content)) { |
|
| 71 | 71 | $dom = self::createSignature( |
| 72 | 72 | $certificate, |
| 73 | 73 | $dom, |
@@ -109,7 +109,7 @@ discard block |
||
| 109 | 109 | $nsSignatureMethod = 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256'; |
| 110 | 110 | $nsDigestMethod = 'http://www.w3.org/2001/04/xmlenc#sha256'; |
| 111 | 111 | } |
| 112 | - $nsTransformMethod1 ='http://www.w3.org/2000/09/xmldsig#enveloped-signature'; |
|
| 112 | + $nsTransformMethod1 = 'http://www.w3.org/2000/09/xmldsig#enveloped-signature'; |
|
| 113 | 113 | $nsTransformMethod2 = 'http://www.w3.org/TR/2001/REC-xml-c14n-20010315'; |
| 114 | 114 | $idSigned = trim($node->getAttribute($mark)); |
| 115 | 115 | $signatureNode = $dom->createElementNS($nsDSIG, 'Signature'); |
@@ -164,7 +164,7 @@ discard block |
||
| 164 | 164 | */ |
| 165 | 165 | public static function removeSignature($content) |
| 166 | 166 | { |
| 167 | - if (! self::existsSignature($content)) { |
|
| 167 | + if (!self::existsSignature($content)) { |
|
| 168 | 168 | return $content; |
| 169 | 169 | } |
| 170 | 170 | $dom = new \DOMDocument('1.0', 'utf-8'); |
@@ -210,7 +210,7 @@ discard block |
||
| 210 | 210 | */ |
| 211 | 211 | public static function existsSignature($content) |
| 212 | 212 | { |
| 213 | - if (! Validator::isXML($content)) { |
|
| 213 | + if (!Validator::isXML($content)) { |
|
| 214 | 214 | throw SignerException::isNotXml(); |
| 215 | 215 | } |
| 216 | 216 | $dom = new \DOMDocument('1.0', 'utf-8'); |
@@ -258,7 +258,7 @@ discard block |
||
| 258 | 258 | $decodedSignature = base64_decode( |
| 259 | 259 | str_replace(array("\r", "\n"), '', $signatureValue) |
| 260 | 260 | ); |
| 261 | - if (! $publicKey->verify($signInfoNode, $decodedSignature, $algorithm)) { |
|
| 261 | + if (!$publicKey->verify($signInfoNode, $decodedSignature, $algorithm)) { |
|
| 262 | 262 | throw SignerException::signatureComparisonFailed(); |
| 263 | 263 | } |
| 264 | 264 | return true; |