@@ -11,8 +11,8 @@ |
||
| 11 | 11 | class None extends BaseFormat |
| 12 | 12 | { |
| 13 | 13 | /** |
| 14 | - * {@inheritdoc} |
|
| 15 | - */ |
|
| 14 | + * {@inheritdoc} |
|
| 15 | + */ |
|
| 16 | 16 | public function validateAttestation(string $clientData): bool |
| 17 | 17 | { |
| 18 | 18 | return true; |
@@ -79,8 +79,8 @@ discard block |
||
| 79 | 79 | } |
| 80 | 80 | |
| 81 | 81 | /** |
| 82 | - * {@inheritdoc} |
|
| 83 | - */ |
|
| 82 | + * {@inheritdoc} |
|
| 83 | + */ |
|
| 84 | 84 | public function getCertificatePem(): string |
| 85 | 85 | { |
| 86 | 86 | $pem = '-----BEGIN CERTIFICATE-----' . "\n"; |
@@ -91,8 +91,8 @@ discard block |
||
| 91 | 91 | } |
| 92 | 92 | |
| 93 | 93 | /** |
| 94 | - * {@inheritdoc} |
|
| 95 | - */ |
|
| 94 | + * {@inheritdoc} |
|
| 95 | + */ |
|
| 96 | 96 | public function validateAttestation(string $clientData): bool |
| 97 | 97 | { |
| 98 | 98 | $publicKey = openssl_pkey_get_public($this->getCertificatePem()); |
@@ -129,8 +129,8 @@ discard block |
||
| 129 | 129 | } |
| 130 | 130 | |
| 131 | 131 | /** |
| 132 | - * {@inheritdoc} |
|
| 133 | - */ |
|
| 132 | + * {@inheritdoc} |
|
| 133 | + */ |
|
| 134 | 134 | public function validateRootCertificate(array $rootCertificates): bool |
| 135 | 135 | { |
| 136 | 136 | $chain = $this->createX5cChainFile(); |
@@ -88,8 +88,8 @@ discard block |
||
| 88 | 88 | } |
| 89 | 89 | |
| 90 | 90 | /** |
| 91 | - * {@inheritdoc} |
|
| 92 | - */ |
|
| 91 | + * {@inheritdoc} |
|
| 92 | + */ |
|
| 93 | 93 | public function getCertificatePem(): ?string |
| 94 | 94 | { |
| 95 | 95 | if (empty($this->x5c)) { |
@@ -100,8 +100,8 @@ discard block |
||
| 100 | 100 | } |
| 101 | 101 | |
| 102 | 102 | /** |
| 103 | - * {@inheritdoc} |
|
| 104 | - */ |
|
| 103 | + * {@inheritdoc} |
|
| 104 | + */ |
|
| 105 | 105 | public function validateAttestation(string $clientData): bool |
| 106 | 106 | { |
| 107 | 107 | if (! empty($this->x5c)) { |
@@ -112,8 +112,8 @@ discard block |
||
| 112 | 112 | } |
| 113 | 113 | |
| 114 | 114 | /** |
| 115 | - * {@inheritdoc} |
|
| 116 | - */ |
|
| 115 | + * {@inheritdoc} |
|
| 116 | + */ |
|
| 117 | 117 | public function validateRootCertificate(array $rootCertificates): bool |
| 118 | 118 | { |
| 119 | 119 | if (empty($this->x5c)) { |
@@ -132,8 +132,8 @@ discard block |
||
| 132 | 132 | } |
| 133 | 133 | |
| 134 | 134 | /** |
| 135 | - * {@inheritdoc} |
|
| 136 | - */ |
|
| 135 | + * {@inheritdoc} |
|
| 136 | + */ |
|
| 137 | 137 | public function getCertificatePem(): ?string |
| 138 | 138 | { |
| 139 | 139 | if (empty($this->x5c)) { |
@@ -144,16 +144,16 @@ discard block |
||
| 144 | 144 | } |
| 145 | 145 | |
| 146 | 146 | /** |
| 147 | - * {@inheritdoc} |
|
| 148 | - */ |
|
| 147 | + * {@inheritdoc} |
|
| 148 | + */ |
|
| 149 | 149 | public function validateAttestation(string $clientData): bool |
| 150 | 150 | { |
| 151 | 151 | return $this->validateOverX5C($clientData); |
| 152 | 152 | } |
| 153 | 153 | |
| 154 | 154 | /** |
| 155 | - * {@inheritdoc} |
|
| 156 | - */ |
|
| 155 | + * {@inheritdoc} |
|
| 156 | + */ |
|
| 157 | 157 | public function validateRootCertificate(array $rootCertificates): bool |
| 158 | 158 | { |
| 159 | 159 | if (empty($this->x5c)) { |
@@ -206,7 +206,7 @@ discard block |
||
| 206 | 206 | $dataToVerify = $this->authenticatorData->getBinary(); |
| 207 | 207 | $dataToVerify .= $clientData; |
| 208 | 208 | |
| 209 | - // Verify that magic is set to TPM_GENERATED_VALUE. |
|
| 209 | + // Verify that magic is set to TPM_GENERATED_VALUE. |
|
| 210 | 210 | if ($this->certInfo->getBytes(0, 4) !== self::TPM_GENERATED_VALUE) { |
| 211 | 211 | throw new WebauthnException('TPM magic value not the same TPM_GENERATED_VALUE'); |
| 212 | 212 | } |
@@ -178,15 +178,15 @@ discard block |
||
| 178 | 178 | ); |
| 179 | 179 | |
| 180 | 180 | $publicKey = (new PublicKey()) |
| 181 | - ->setUserInfo($userInfo) |
|
| 182 | - ->setRelyingParty($relyingParty) |
|
| 183 | - ->setAuthenticatorSelection($authenticatorSelection) |
|
| 184 | - ->setExcludeCredentials($excludeCredentials) |
|
| 185 | - ->setChallenge($this->createChallenge()) |
|
| 186 | - ->setTimeout($this->config->get('timeout')) |
|
| 187 | - ->setExtensions() |
|
| 188 | - ->addPublicKeys() |
|
| 189 | - ->setAttestation($attestation); |
|
| 181 | + ->setUserInfo($userInfo) |
|
| 182 | + ->setRelyingParty($relyingParty) |
|
| 183 | + ->setAuthenticatorSelection($authenticatorSelection) |
|
| 184 | + ->setExcludeCredentials($excludeCredentials) |
|
| 185 | + ->setChallenge($this->createChallenge()) |
|
| 186 | + ->setTimeout($this->config->get('timeout')) |
|
| 187 | + ->setExtensions() |
|
| 188 | + ->addPublicKeys() |
|
| 189 | + ->setAttestation($attestation); |
|
| 190 | 190 | |
| 191 | 191 | return $publicKey; |
| 192 | 192 | } |
@@ -215,11 +215,11 @@ discard block |
||
| 215 | 215 | } |
| 216 | 216 | |
| 217 | 217 | $publicKey = (new PublicKey()) |
| 218 | - ->setRelyingPartyId($this->relyingParty->getId()) |
|
| 219 | - ->setAllowCredentials($allowedCredentials) |
|
| 220 | - ->setChallenge($this->createChallenge()) |
|
| 221 | - ->setTimeout($this->config->get('timeout')) |
|
| 222 | - ->setUserVerificationType($userVerificationType); |
|
| 218 | + ->setRelyingPartyId($this->relyingParty->getId()) |
|
| 219 | + ->setAllowCredentials($allowedCredentials) |
|
| 220 | + ->setChallenge($this->createChallenge()) |
|
| 221 | + ->setTimeout($this->config->get('timeout')) |
|
| 222 | + ->setUserVerificationType($userVerificationType); |
|
| 223 | 223 | |
| 224 | 224 | return $publicKey; |
| 225 | 225 | } |
@@ -364,9 +364,9 @@ discard block |
||
| 364 | 364 | } |
| 365 | 365 | |
| 366 | 366 | /** |
| 367 | - * Return the binary string |
|
| 368 | - * @return string |
|
| 369 | - */ |
|
| 367 | + * Return the binary string |
|
| 368 | + * @return string |
|
| 369 | + */ |
|
| 370 | 370 | public function getBinaryString(): string |
| 371 | 371 | { |
| 372 | 372 | return $this->data; |
@@ -393,9 +393,9 @@ discard block |
||
| 393 | 393 | } |
| 394 | 394 | |
| 395 | 395 | /** |
| 396 | - * {@inheritdoc} |
|
| 397 | - * @return mixed |
|
| 398 | - */ |
|
| 396 | + * {@inheritdoc} |
|
| 397 | + * @return mixed |
|
| 398 | + */ |
|
| 399 | 399 | public function jsonSerialize(): mixed |
| 400 | 400 | { |
| 401 | 401 | if ($this->useBase64UrlEncoding) { |
@@ -409,18 +409,18 @@ discard block |
||
| 409 | 409 | } |
| 410 | 410 | |
| 411 | 411 | /** |
| 412 | - * {@inheritdoc} |
|
| 413 | - * @return string|null |
|
| 414 | - */ |
|
| 412 | + * {@inheritdoc} |
|
| 413 | + * @return string|null |
|
| 414 | + */ |
|
| 415 | 415 | public function serialize(): ?string |
| 416 | 416 | { |
| 417 | 417 | return serialize($this->data); |
| 418 | 418 | } |
| 419 | 419 | |
| 420 | 420 | /** |
| 421 | - * {@inheritdoc} |
|
| 422 | - * $param string $data |
|
| 423 | - */ |
|
| 421 | + * {@inheritdoc} |
|
| 422 | + * $param string $data |
|
| 423 | + */ |
|
| 424 | 424 | public function unserialize(string $data): void |
| 425 | 425 | { |
| 426 | 426 | $value = unserialize($data); |
@@ -188,9 +188,9 @@ |
||
| 188 | 188 | } |
| 189 | 189 | |
| 190 | 190 | /** |
| 191 | - * {@inheritdoc} |
|
| 192 | - * @return mixed |
|
| 193 | - */ |
|
| 191 | + * {@inheritdoc} |
|
| 192 | + * @return mixed |
|
| 193 | + */ |
|
| 194 | 194 | public function jsonSerialize(): mixed |
| 195 | 195 | { |
| 196 | 196 | return get_object_vars($this); |
@@ -270,9 +270,9 @@ |
||
| 270 | 270 | |
| 271 | 271 | |
| 272 | 272 | /** |
| 273 | - * {@inheritdoc} |
|
| 274 | - * @return mixed |
|
| 275 | - */ |
|
| 273 | + * {@inheritdoc} |
|
| 274 | + * @return mixed |
|
| 275 | + */ |
|
| 276 | 276 | public function jsonSerialize(): mixed |
| 277 | 277 | { |
| 278 | 278 | return get_object_vars($this); |
@@ -188,9 +188,9 @@ |
||
| 188 | 188 | } |
| 189 | 189 | |
| 190 | 190 | /** |
| 191 | - * {@inheritdoc} |
|
| 192 | - * @return mixed |
|
| 193 | - */ |
|
| 191 | + * {@inheritdoc} |
|
| 192 | + * @return mixed |
|
| 193 | + */ |
|
| 194 | 194 | public function jsonSerialize(): mixed |
| 195 | 195 | { |
| 196 | 196 | return get_object_vars($this); |