Passed
Push — develop ( aef2d8...023235 )
by nguereza
02:12
created
src/Attestation/AuthenticatorData.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -284,7 +284,7 @@
 block discarded – undo
284 284
 
285 285
         $extensionData = CborDecoder::decode($data);
286 286
 
287
-        if (! is_array($extensionData)) {
287
+        if (!is_array($extensionData)) {
288 288
             throw new WebauthnException('Invalid extension data');
289 289
         }
290 290
 
Please login to merge, or discard this patch.
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -270,9 +270,9 @@
 block discarded – undo
270 270
 
271 271
 
272 272
     /**
273
-    * {@inheritdoc}
274
-    * @return mixed
275
-    */
273
+     * {@inheritdoc}
274
+     * @return mixed
275
+     */
276 276
     public function jsonSerialize(): mixed
277 277
     {
278 278
         return get_object_vars($this);
Please login to merge, or discard this patch.
src/Attestation/Format/None.php 1 patch
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -11,8 +11,8 @@
 block discarded – undo
11 11
 class None extends BaseFormat
12 12
 {
13 13
     /**
14
-    * {@inheritdoc}
15
-    */
14
+     * {@inheritdoc}
15
+     */
16 16
     public function validateAttestation(string $clientData): bool
17 17
     {
18 18
         return true;
Please login to merge, or discard this patch.
src/Attestation/Format/FidoU2F.php 2 patches
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -79,8 +79,8 @@  discard block
 block discarded – undo
79 79
     }
80 80
 
81 81
     /**
82
-    * {@inheritdoc}
83
-    */
82
+     * {@inheritdoc}
83
+     */
84 84
     public function getCertificatePem(): string
85 85
     {
86 86
         $pem = '-----BEGIN CERTIFICATE-----' . "\n";
@@ -91,8 +91,8 @@  discard block
 block discarded – undo
91 91
     }
92 92
 
93 93
     /**
94
-    * {@inheritdoc}
95
-    */
94
+     * {@inheritdoc}
95
+     */
96 96
     public function validateAttestation(string $clientData): bool
97 97
     {
98 98
         $publicKey = openssl_pkey_get_public($this->getCertificatePem());
@@ -129,8 +129,8 @@  discard block
 block discarded – undo
129 129
     }
130 130
 
131 131
     /**
132
-    * {@inheritdoc}
133
-    */
132
+     * {@inheritdoc}
133
+     */
134 134
     public function validateRootCertificate(array $rootCertificates): bool
135 135
     {
136 136
         $chain = $this->createX5cChainFile();
Please login to merge, or discard this patch.
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -85,21 +85,21 @@
 block discarded – undo
85 85
         }
86 86
 
87 87
         if (
88
-            ! array_key_exists('sig', $attestationStatement) ||
89
-            ! $attestationStatement['sig'] instanceof ByteBuffer
88
+            !array_key_exists('sig', $attestationStatement) ||
89
+            !$attestationStatement['sig'] instanceof ByteBuffer
90 90
         ) {
91 91
             throw new WebauthnException('No signature found');
92 92
         }
93 93
 
94 94
         if (
95
-            ! array_key_exists('x5c', $attestationStatement) ||
96
-            ! is_array($attestationStatement['x5c']) ||
95
+            !array_key_exists('x5c', $attestationStatement) ||
96
+            !is_array($attestationStatement['x5c']) ||
97 97
             count($attestationStatement['x5c']) !== 1
98 98
         ) {
99 99
             throw new WebauthnException('Invalid X5C certificate');
100 100
         }
101 101
 
102
-        if (! $attestationStatement['x5c'][0] instanceof ByteBuffer) {
102
+        if (!$attestationStatement['x5c'][0] instanceof ByteBuffer) {
103 103
             throw new WebauthnException('Invalid X5C certificate must be Byte Buffer)');
104 104
         }
105 105
 
Please login to merge, or discard this patch.
src/Attestation/Format/Packed.php 2 patches
Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -88,8 +88,8 @@  discard block
 block discarded – undo
88 88
     }
89 89
 
90 90
     /**
91
-    * {@inheritdoc}
92
-    */
91
+     * {@inheritdoc}
92
+     */
93 93
     public function getCertificatePem(): ?string
94 94
     {
95 95
         if (empty($this->x5c)) {
@@ -100,8 +100,8 @@  discard block
 block discarded – undo
100 100
     }
101 101
 
102 102
     /**
103
-    * {@inheritdoc}
104
-    */
103
+     * {@inheritdoc}
104
+     */
105 105
     public function validateAttestation(string $clientData): bool
106 106
     {
107 107
         if (! empty($this->x5c)) {
@@ -112,8 +112,8 @@  discard block
 block discarded – undo
112 112
     }
113 113
 
114 114
     /**
115
-    * {@inheritdoc}
116
-    */
115
+     * {@inheritdoc}
116
+     */
117 117
     public function validateRootCertificate(array $rootCertificates): bool
118 118
     {
119 119
         if (empty($this->x5c)) {
Please login to merge, or discard this patch.
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -75,15 +75,15 @@  discard block
 block discarded – undo
75 75
         // check u2f data
76 76
         $attestationStatement = $this->attestationData['attStmt'];
77 77
         if (
78
-            ! array_key_exists('alg', $attestationStatement) ||
78
+            !array_key_exists('alg', $attestationStatement) ||
79 79
             $this->getCoseAlgorithm($attestationStatement['alg']) === null
80 80
         ) {
81 81
             throw new WebauthnException('Unsupported algorithm or not provided');
82 82
         }
83 83
 
84 84
         if (
85
-            ! array_key_exists('sig', $attestationStatement) ||
86
-            ! $attestationStatement['sig'] instanceof ByteBuffer
85
+            !array_key_exists('sig', $attestationStatement) ||
86
+            !$attestationStatement['sig'] instanceof ByteBuffer
87 87
         ) {
88 88
             throw new WebauthnException('No signature found');
89 89
         }
@@ -98,7 +98,7 @@  discard block
 block discarded – undo
98 98
         ) {
99 99
             // The attestation certificate attestnCert MUST be the first element in the array
100 100
             $attestCert = array_shift($attestationStatement['x5c']);
101
-            if (! $attestCert instanceof ByteBuffer) {
101
+            if (!$attestCert instanceof ByteBuffer) {
102 102
                 throw new WebauthnException('Invalid X5C certificate');
103 103
             }
104 104
 
@@ -130,7 +130,7 @@  discard block
 block discarded – undo
130 130
     */
131 131
     public function validateAttestation(string $clientData): bool
132 132
     {
133
-        if (! empty($this->x5c)) {
133
+        if (!empty($this->x5c)) {
134 134
             return $this->validateOverX5C($clientData);
135 135
         }
136 136
 
Please login to merge, or discard this patch.
src/Attestation/Format/BaseFormat.php 2 patches
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -188,7 +188,7 @@  discard block
 block discarded – undo
188 188
                 'hash' => 'SHA1',
189 189
                 'openssl' => OPENSSL_ALGO_SHA1,
190 190
                 'cose' => [
191
-                    -65535,  // RS1
191
+                    -65535, // RS1
192 192
                 ],
193 193
             ],
194 194
             [
@@ -196,9 +196,9 @@  discard block
 block discarded – undo
196 196
                 'openssl' => OPENSSL_ALGO_SHA256,
197 197
                 'cose' => [
198 198
                     -257, // RS256
199
-                    -37,  // PS256
200
-                    -7,   // ES256
201
-                    5,     // HMAC256
199
+                    -37, // PS256
200
+                    -7, // ES256
201
+                    5, // HMAC256
202 202
                 ],
203 203
             ],
204 204
             [
@@ -206,9 +206,9 @@  discard block
 block discarded – undo
206 206
                 'openssl' => OPENSSL_ALGO_SHA384,
207 207
                 'cose' => [
208 208
                     -258, // RS384
209
-                    -38,  // PS384
210
-                    -35,  // ES384
211
-                    6,     // HMAC384
209
+                    -38, // PS384
210
+                    -35, // ES384
211
+                    6, // HMAC384
212 212
                 ],
213 213
             ],
214 214
             [
@@ -216,9 +216,9 @@  discard block
 block discarded – undo
216 216
                 'openssl' => OPENSSL_ALGO_SHA512,
217 217
                 'cose' => [
218 218
                     -259, // RS512
219
-                    -39,  // PS512
220
-                    -36,  // ES512
221
-                    7,     // HMAC512
219
+                    -39, // PS512
220
+                    -36, // ES512
221
+                    7, // HMAC512
222 222
                 ],
223 223
             ],
224 224
         ];
Please login to merge, or discard this patch.
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -188,9 +188,9 @@
 block discarded – undo
188 188
     }
189 189
 
190 190
     /**
191
-    * {@inheritdoc}
192
-    * @return mixed
193
-    */
191
+     * {@inheritdoc}
192
+     * @return mixed
193
+     */
194 194
     public function jsonSerialize(): mixed
195 195
     {
196 196
         return get_object_vars($this);
Please login to merge, or discard this patch.
src/Attestation/Format/Tpm.php 2 patches
Indentation   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -132,8 +132,8 @@  discard block
 block discarded – undo
132 132
     }
133 133
 
134 134
     /**
135
-    * {@inheritdoc}
136
-    */
135
+     * {@inheritdoc}
136
+     */
137 137
     public function getCertificatePem(): ?string
138 138
     {
139 139
         if (empty($this->x5c)) {
@@ -144,16 +144,16 @@  discard block
 block discarded – undo
144 144
     }
145 145
 
146 146
     /**
147
-    * {@inheritdoc}
148
-    */
147
+     * {@inheritdoc}
148
+     */
149 149
     public function validateAttestation(string $clientData): bool
150 150
     {
151 151
         return $this->validateOverX5C($clientData);
152 152
     }
153 153
 
154 154
     /**
155
-    * {@inheritdoc}
156
-    */
155
+     * {@inheritdoc}
156
+     */
157 157
     public function validateRootCertificate(array $rootCertificates): bool
158 158
     {
159 159
         if (empty($this->x5c)) {
@@ -206,7 +206,7 @@  discard block
 block discarded – undo
206 206
         $dataToVerify = $this->authenticatorData->getBinary();
207 207
         $dataToVerify .= $clientData;
208 208
 
209
-         // Verify that magic is set to TPM_GENERATED_VALUE.
209
+            // Verify that magic is set to TPM_GENERATED_VALUE.
210 210
         if ($this->certInfo->getBytes(0, 4) !== self::TPM_GENERATED_VALUE) {
211 211
             throw new WebauthnException('TPM magic value not the same TPM_GENERATED_VALUE');
212 212
         }
Please login to merge, or discard this patch.
Spacing   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -62,7 +62,7 @@  discard block
 block discarded – undo
62 62
         $attestationStatement = $this->attestationData['attStmt'];
63 63
 
64 64
         if (
65
-            ! array_key_exists('ver', $attestationStatement) ||
65
+            !array_key_exists('ver', $attestationStatement) ||
66 66
             $attestationStatement['ver'] !== '2.0'
67 67
         ) {
68 68
             throw new WebauthnException(sprintf(
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
         }
73 73
 
74 74
         if (
75
-            ! array_key_exists('alg', $attestationStatement) ||
75
+            !array_key_exists('alg', $attestationStatement) ||
76 76
             $this->getCoseAlgorithm($attestationStatement['alg']) === null
77 77
         ) {
78 78
             throw new WebauthnException(sprintf(
@@ -82,22 +82,22 @@  discard block
 block discarded – undo
82 82
         }
83 83
 
84 84
         if (
85
-            ! array_key_exists('sig', $attestationStatement) ||
86
-            ! $attestationStatement['sig'] instanceof ByteBuffer
85
+            !array_key_exists('sig', $attestationStatement) ||
86
+            !$attestationStatement['sig'] instanceof ByteBuffer
87 87
         ) {
88 88
             throw new WebauthnException('No signature found');
89 89
         }
90 90
 
91 91
         if (
92
-            ! array_key_exists('certInfo', $attestationStatement) ||
93
-            ! $attestationStatement['certInfo'] instanceof ByteBuffer
92
+            !array_key_exists('certInfo', $attestationStatement) ||
93
+            !$attestationStatement['certInfo'] instanceof ByteBuffer
94 94
         ) {
95 95
             throw new WebauthnException('No certificate information found');
96 96
         }
97 97
 
98 98
         if (
99
-            ! array_key_exists('pubArea', $attestationStatement) ||
100
-            ! $attestationStatement['pubArea'] instanceof ByteBuffer
99
+            !array_key_exists('pubArea', $attestationStatement) ||
100
+            !$attestationStatement['pubArea'] instanceof ByteBuffer
101 101
         ) {
102 102
             throw new WebauthnException('No public area information found');
103 103
         }
@@ -114,7 +114,7 @@  discard block
 block discarded – undo
114 114
         ) {
115 115
             // The attestation certificate attestnCert MUST be the first element in the array
116 116
             $attestCert = array_shift($attestationStatement['x5c']);
117
-            if (! $attestCert instanceof ByteBuffer) {
117
+            if (!$attestCert instanceof ByteBuffer) {
118 118
                 throw new WebauthnException('Invalid X5C certificate');
119 119
             }
120 120
 
Please login to merge, or discard this patch.
src/Entity/Flag.php 2 patches
Spacing   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -90,14 +90,14 @@
 block discarded – undo
90 90
      */
91 91
     public function __construct(int $binaryFlag)
92 92
     {
93
-        $this->bit0 = !! ($binaryFlag & 1);
94
-        $this->bit1 = !! ($binaryFlag & 2);
95
-        $this->bit2 = !! ($binaryFlag & 4);
96
-        $this->bit3 = !! ($binaryFlag & 8);
97
-        $this->bit4 = !! ($binaryFlag & 16);
98
-        $this->bit5 = !! ($binaryFlag & 32);
99
-        $this->bit6 = !! ($binaryFlag & 64);
100
-        $this->bit7 = !! ($binaryFlag & 128);
93
+        $this->bit0 = !!($binaryFlag & 1);
94
+        $this->bit1 = !!($binaryFlag & 2);
95
+        $this->bit2 = !!($binaryFlag & 4);
96
+        $this->bit3 = !!($binaryFlag & 8);
97
+        $this->bit4 = !!($binaryFlag & 16);
98
+        $this->bit5 = !!($binaryFlag & 32);
99
+        $this->bit6 = !!($binaryFlag & 64);
100
+        $this->bit7 = !!($binaryFlag & 128);
101 101
 
102 102
         $this->userPresent = $this->bit0;
103 103
         $this->userVerified = $this->bit2;
Please login to merge, or discard this patch.
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -188,9 +188,9 @@
 block discarded – undo
188 188
     }
189 189
 
190 190
     /**
191
-    * {@inheritdoc}
192
-    * @return mixed
193
-    */
191
+     * {@inheritdoc}
192
+     * @return mixed
193
+     */
194 194
     public function jsonSerialize(): mixed
195 195
     {
196 196
         return get_object_vars($this);
Please login to merge, or discard this patch.
src/Helper/ByteBuffer.php 2 patches
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -40,7 +40,7 @@
 block discarded – undo
40 40
      */
41 41
     public function __construct(string $binaryData)
42 42
     {
43
-        $this->data = (string)$binaryData;
43
+        $this->data = (string) $binaryData;
44 44
         $this->length = strlen($binaryData);
45 45
     }
46 46
 
Please login to merge, or discard this patch.
Indentation   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -364,9 +364,9 @@  discard block
 block discarded – undo
364 364
     }
365 365
 
366 366
         /**
367
-     * Return the binary string
368
-     * @return string
369
-     */
367
+         * Return the binary string
368
+         * @return string
369
+         */
370 370
     public function getBinaryString(): string
371 371
     {
372 372
         return $this->data;
@@ -393,9 +393,9 @@  discard block
 block discarded – undo
393 393
     }
394 394
 
395 395
     /**
396
-    * {@inheritdoc}
397
-    * @return mixed
398
-    */
396
+     * {@inheritdoc}
397
+     * @return mixed
398
+     */
399 399
     public function jsonSerialize(): mixed
400 400
     {
401 401
         if ($this->useBase64UrlEncoding) {
@@ -409,18 +409,18 @@  discard block
 block discarded – undo
409 409
     }
410 410
 
411 411
     /**
412
-    * {@inheritdoc}
413
-    * @return string|null
414
-    */
412
+     * {@inheritdoc}
413
+     * @return string|null
414
+     */
415 415
     public function serialize(): ?string
416 416
     {
417 417
         return serialize($this->data);
418 418
     }
419 419
 
420 420
     /**
421
-    * {@inheritdoc}
422
-    * $param string $data
423
-    */
421
+     * {@inheritdoc}
422
+     * $param string $data
423
+     */
424 424
     public function unserialize(string $data): void
425 425
     {
426 426
         $value = unserialize($data);
Please login to merge, or discard this patch.
src/Webauthn.php 2 patches
Indentation   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -178,15 +178,15 @@  discard block
 block discarded – undo
178 178
         );
179 179
 
180 180
         $publicKey = (new PublicKey())
181
-                      ->setUserInfo($userInfo)
182
-                      ->setRelyingParty($relyingParty)
183
-                      ->setAuthenticatorSelection($authenticatorSelection)
184
-                      ->setExcludeCredentials($excludeCredentials)
185
-                      ->setChallenge($this->createChallenge())
186
-                      ->setTimeout($this->config->get('timeout'))
187
-                      ->setExtensions()
188
-                      ->addPublicKeys()
189
-                      ->setAttestation($attestation);
181
+                        ->setUserInfo($userInfo)
182
+                        ->setRelyingParty($relyingParty)
183
+                        ->setAuthenticatorSelection($authenticatorSelection)
184
+                        ->setExcludeCredentials($excludeCredentials)
185
+                        ->setChallenge($this->createChallenge())
186
+                        ->setTimeout($this->config->get('timeout'))
187
+                        ->setExtensions()
188
+                        ->addPublicKeys()
189
+                        ->setAttestation($attestation);
190 190
 
191 191
         return $publicKey;
192 192
     }
@@ -215,11 +215,11 @@  discard block
 block discarded – undo
215 215
         }
216 216
 
217 217
         $publicKey = (new PublicKey())
218
-                      ->setRelyingPartyId($this->relyingParty->getId())
219
-                      ->setAllowCredentials($allowedCredentials)
220
-                      ->setChallenge($this->createChallenge())
221
-                      ->setTimeout($this->config->get('timeout'))
222
-                      ->setUserVerificationType($userVerificationType);
218
+                        ->setRelyingPartyId($this->relyingParty->getId())
219
+                        ->setAllowCredentials($allowedCredentials)
220
+                        ->setChallenge($this->createChallenge())
221
+                        ->setTimeout($this->config->get('timeout'))
222
+                        ->setUserVerificationType($userVerificationType);
223 223
 
224 224
         return $publicKey;
225 225
     }
Please login to merge, or discard this patch.
Spacing   +15 added lines, -15 removed lines patch added patch discarded remove patch
@@ -100,11 +100,11 @@  discard block
 block discarded – undo
100 100
      */
101 101
     public function __construct(WebauthnConfiguration $config, array $allowedFormats = [])
102 102
     {
103
-        if (! function_exists('openssl_open')) {
103
+        if (!function_exists('openssl_open')) {
104 104
             throw new WebauthnException('OpenSSL module not installed in this platform');
105 105
         }
106 106
 
107
-        if (! in_array('SHA256', array_map('strtoupper', openssl_get_md_methods()))) {
107
+        if (!in_array('SHA256', array_map('strtoupper', openssl_get_md_methods()))) {
108 108
             throw new WebauthnException('SHA256 is not supported by this OpenSSL installation');
109 109
         }
110 110
 
@@ -123,7 +123,7 @@  discard block
 block discarded – undo
123 123
      * @param string|array<string> $path
124 124
      * @return $this
125 125
      */
126
-    public function addRootCertificate(string|array $path): self
126
+    public function addRootCertificate(string | array $path): self
127 127
     {
128 128
         if (is_array($path)) {
129 129
             foreach ($path as $p) {
@@ -256,14 +256,14 @@  discard block
 block discarded – undo
256 256
     public function processRegistration(
257 257
         string $clientDataJson,
258 258
         string $attestationObject,
259
-        ByteBuffer|string $challenge,
259
+        ByteBuffer | string $challenge,
260 260
         bool $requireUserVerification = false,
261 261
         bool $requireUserPresent = true,
262 262
         bool $failIfRootCertificateMismatch = true
263 263
     ): array {
264 264
         $clientDataHash = hash('sha256', $clientDataJson, true);
265 265
         if (is_string($challenge)) {
266
-            $challenge =  new ByteBuffer($challenge);
266
+            $challenge = new ByteBuffer($challenge);
267 267
         }
268 268
 
269 269
         // security: https://www.w3.org/TR/webauthn/#registering-a-new-credential
@@ -276,21 +276,21 @@  discard block
 block discarded – undo
276 276
         }
277 277
 
278 278
         // 3. Verify that the value of C.type is webauthn.create.
279
-        if (! isset($clientData->type) || $clientData->type !== 'webauthn.create') {
279
+        if (!isset($clientData->type) || $clientData->type !== 'webauthn.create') {
280 280
             throw new WebauthnException('Invalid client type provided');
281 281
         }
282 282
 
283 283
         // 4. Verify that the value of C.challenge matches the challenge that was
284 284
         // sent to the authenticator in the create() call.
285 285
         if (
286
-            ! isset($clientData->challenge) ||
286
+            !isset($clientData->challenge) ||
287 287
             ByteBuffer::fromBase64Url($clientData->challenge)->getBinaryString() !== $challenge->getBinaryString()
288 288
         ) {
289 289
             throw new WebauthnException('Invalid challenge provided');
290 290
         }
291 291
 
292 292
         // 5. Verify that the value of C.origin matches the Relying Party's origin.
293
-        if (! isset($clientData->origin) || $this->checkOrigin($clientData->origin) === false) {
293
+        if (!isset($clientData->origin) || $this->checkOrigin($clientData->origin) === false) {
294 294
             throw new WebauthnException('Invalid origin provided');
295 295
         }
296 296
 
@@ -373,13 +373,13 @@  discard block
 block discarded – undo
373 373
         string $authenticatorData,
374 374
         string $signature,
375 375
         string $credentialPublicKey,
376
-        ByteBuffer|string $challenge,
376
+        ByteBuffer | string $challenge,
377 377
         ?int $previousSignatureCount = null,
378 378
         bool $requireUserVerification = false,
379 379
         bool $requireUserPresent = true
380 380
     ): bool {
381 381
         if (is_string($challenge)) {
382
-            $challenge =  new ByteBuffer($challenge);
382
+            $challenge = new ByteBuffer($challenge);
383 383
         }
384 384
         $clientDataHash = hash('sha256', $clientDataJson, true);
385 385
         $authenticator = $this->createAuthenticatorData($authenticatorData);
@@ -407,21 +407,21 @@  discard block
 block discarded – undo
407 407
         //    -> TO BE LOOKED UP BY IMPLEMENTATION
408 408
 
409 409
         // 7. Verify that the value of C.type is the string webauthn.get.
410
-        if (! isset($clientData->type) || $clientData->type !== 'webauthn.get') {
410
+        if (!isset($clientData->type) || $clientData->type !== 'webauthn.get') {
411 411
             throw new WebauthnException('Invalid client type provided');
412 412
         }
413 413
 
414 414
         // 8. Verify that the value of C.challenge matches the challenge that was sent to the
415 415
         //    authenticator in the PublicKeyCredentialRequestOptions passed to the get() call.
416 416
         if (
417
-            ! isset($clientData->challenge) ||
417
+            !isset($clientData->challenge) ||
418 418
             ByteBuffer::fromBase64Url($clientData->challenge)->getBinaryString() !== $challenge->getBinaryString()
419 419
         ) {
420 420
             throw new WebauthnException('Invalid challenge provided');
421 421
         }
422 422
 
423 423
         // 9. Verify that the value of C.origin matches the Relying Party's origin.
424
-        if (! isset($clientData->origin) || $this->checkOrigin($clientData->origin) === false) {
424
+        if (!isset($clientData->origin) || $this->checkOrigin($clientData->origin) === false) {
425 425
             throw new WebauthnException('Invalid origin provided');
426 426
         }
427 427
 
@@ -539,7 +539,7 @@  discard block
 block discarded – undo
539 539
         // The origin's scheme must be https and not be ignored/whitelisted
540 540
         $url = new Uri($origin);
541 541
         if (
542
-            ! in_array($this->relyingParty->getId(), $this->config->get('ignore_origins')) &&
542
+            !in_array($this->relyingParty->getId(), $this->config->get('ignore_origins')) &&
543 543
             $url->getScheme() !== 'https'
544 544
         ) {
545 545
             return false;
@@ -576,7 +576,7 @@  discard block
 block discarded – undo
576 576
             return $supportedFormats;
577 577
         }
578 578
 
579
-        $desiredFormats = array_filter($formats, function ($entry) use ($supportedFormats) {
579
+        $desiredFormats = array_filter($formats, function($entry) use ($supportedFormats) {
580 580
             return in_array($entry, $supportedFormats);
581 581
         });
582 582
 
Please login to merge, or discard this patch.