@@ -62,11 +62,11 @@ |
||
62 | 62 | */ |
63 | 63 | private $encryptionKey; |
64 | 64 | |
65 | - /** |
|
66 | - * The earliest time this assertion is valid, as an UNIX timestamp. |
|
67 | - * |
|
68 | - * @var int |
|
69 | - */ |
|
65 | + /** |
|
66 | + * The earliest time this assertion is valid, as an UNIX timestamp. |
|
67 | + * |
|
68 | + * @var int |
|
69 | + */ |
|
70 | 70 | private $notBefore; |
71 | 71 | |
72 | 72 | /** |
@@ -36,7 +36,7 @@ |
||
36 | 36 | return; |
37 | 37 | } |
38 | 38 | |
39 | - for ($n = $xml->firstChild;; $n = $n->nextSibling) { |
|
39 | + for ($n = $xml->firstChild; ; $n = $n->nextSibling) { |
|
40 | 40 | if (!($n instanceof \DOMElement)) { |
41 | 41 | continue; |
42 | 42 | } |
@@ -76,7 +76,7 @@ |
||
76 | 76 | $required = false; |
77 | 77 | } |
78 | 78 | $privateKeys = $this->get('privateKeys'); |
79 | - $key = array_filter($privateKeys, function (PrivateKey $key) use ($name) { |
|
79 | + $key = array_filter($privateKeys, function(PrivateKey $key) use ($name) { |
|
80 | 80 | return $key->getName() === $name; |
81 | 81 | }); |
82 | 82 |
@@ -50,7 +50,7 @@ |
||
50 | 50 | $required = false; |
51 | 51 | } |
52 | 52 | $privateKeys = $this->get('privateKeys'); |
53 | - $key = array_filter($privateKeys, function (PrivateKey $key) use ($name) { |
|
53 | + $key = array_filter($privateKeys, function(PrivateKey $key) use ($name) { |
|
54 | 54 | return $key->getName() === $name; |
55 | 55 | }); |
56 | 56 |
@@ -63,7 +63,7 @@ |
||
63 | 63 | CertificateProvider $configuration |
64 | 64 | ) : bool { |
65 | 65 | $logger = $this->logger; |
66 | - $pemCandidates = $this->configuredKeys->filter(function (Key $key) use ($logger) { |
|
66 | + $pemCandidates = $this->configuredKeys->filter(function(Key $key) use ($logger) { |
|
67 | 67 | if (!$key instanceof X509) { |
68 | 68 | $logger->debug(sprintf('Skipping unknown key type: "%s"', $key['type'])); |
69 | 69 | return false; |
@@ -132,7 +132,7 @@ |
||
132 | 132 | if (!$document->firstChild instanceof \DOMElement) { |
133 | 133 | throw new \Exception('Malformed SAML message received.'); |
134 | 134 | } |
135 | - $message = Message::fromXML($document->firstChild); |
|
135 | + $message = Message::fromXML($document->firstChild); |
|
136 | 136 | |
137 | 137 | if (array_key_exists('RelayState', $data)) { |
138 | 138 | $message->setRelayState($data['RelayState']); |
@@ -30,15 +30,15 @@ |
||
30 | 30 | protected $certificates; |
31 | 31 | |
32 | 32 | |
33 | - /** |
|
34 | - * Validate this element against a public key. |
|
35 | - * |
|
36 | - * If no signature is present, false is returned. If a signature is present, |
|
37 | - * but cannot be verified, an exception will be thrown. |
|
38 | - * |
|
39 | - * @param XMLSecurityKey $key The key we should check against. |
|
40 | - * @return bool True if successful, false if we don't have a signature that can be verified. |
|
41 | - */ |
|
33 | + /** |
|
34 | + * Validate this element against a public key. |
|
35 | + * |
|
36 | + * If no signature is present, false is returned. If a signature is present, |
|
37 | + * but cannot be verified, an exception will be thrown. |
|
38 | + * |
|
39 | + * @param XMLSecurityKey $key The key we should check against. |
|
40 | + * @return bool True if successful, false if we don't have a signature that can be verified. |
|
41 | + */ |
|
42 | 42 | abstract public function validate(XMLSecurityKey $key) : bool; |
43 | 43 | |
44 | 44 |