@@ -70,7 +70,6 @@ |
||
70 | 70 | /** |
71 | 71 | * Convert this BaseID to XML. |
72 | 72 | * |
73 | - * @param \DOMElement $element The element we are converting to XML. |
|
74 | 73 | * @return \DOMElement The XML element after adding the data corresponding to this BaseID. |
75 | 74 | */ |
76 | 75 | public function toXML(\DOMElement $parent = null) |
@@ -77,7 +77,6 @@ |
||
77 | 77 | /** |
78 | 78 | * Convert this NameIDType to XML. |
79 | 79 | * |
80 | - * @param \DOMElement $element The element we are converting to XML. |
|
81 | 80 | * |
82 | 81 | * @return \DOMElement The XML element after adding the data corresponding to this NameIDType. |
83 | 82 | */ |
@@ -54,8 +54,8 @@ |
||
54 | 54 | return; |
55 | 55 | } |
56 | 56 | |
57 | - $this->IPHint = Utils::extractStrings($xml, Common::NS, 'IPHint'); |
|
58 | - $this->DomainHint = Utils::extractStrings($xml, Common::NS, 'DomainHint'); |
|
57 | + $this->IPHint = Utils::extractStrings($xml, Common::NS, 'IPHint'); |
|
58 | + $this->DomainHint = Utils::extractStrings($xml, Common::NS, 'DomainHint'); |
|
59 | 59 | $this->GeolocationHint = Utils::extractStrings($xml, Common::NS, 'GeolocationHint'); |
60 | 60 | |
61 | 61 | foreach (Utils::xpQuery($xml, "./*[namespace-uri()!='".Common::NS."']") as $node) { |
@@ -39,7 +39,7 @@ discard block |
||
39 | 39 | } |
40 | 40 | |
41 | 41 | $generatedId = pack('H*', ((string) SimpleSAML_Utilities::stringToHex(SimpleSAML_Utilities::generateRandomBytes(20)))); |
42 | - $artifact = base64_encode("\x00\x04\x00\x00" . sha1($message->getIssuer(), true) . $generatedId) ; |
|
42 | + $artifact = base64_encode("\x00\x04\x00\x00".sha1($message->getIssuer(), true).$generatedId); |
|
43 | 43 | $artifactData = $message->toUnsignedXML(); |
44 | 44 | $artifactDataString = $artifactData->ownerDocument->saveXML($artifactData); |
45 | 45 | |
@@ -81,7 +81,7 @@ discard block |
||
81 | 81 | { |
82 | 82 | if (array_key_exists('SAMLart', $_REQUEST)) { |
83 | 83 | $artifact = base64_decode($_REQUEST['SAMLart']); |
84 | - $endpointIndex = bin2hex(substr($artifact, 2, 2)); |
|
84 | + $endpointIndex = bin2hex(substr($artifact, 2, 2)); |
|
85 | 85 | $sourceId = bin2hex(substr($artifact, 4, 20)); |
86 | 86 | } else { |
87 | 87 | throw new \Exception('Missing SAMLart parameter.'); |
@@ -92,12 +92,12 @@ discard block |
||
92 | 92 | $idpMetadata = $metadataHandler->getMetaDataConfigForSha1($sourceId, 'saml20-idp-remote'); |
93 | 93 | |
94 | 94 | if ($idpMetadata === null) { |
95 | - throw new \Exception('No metadata found for remote provider with SHA1 ID: ' . var_export($sourceId, true)); |
|
95 | + throw new \Exception('No metadata found for remote provider with SHA1 ID: '.var_export($sourceId, true)); |
|
96 | 96 | } |
97 | 97 | |
98 | 98 | $endpoint = null; |
99 | 99 | foreach ($idpMetadata->getEndpoints('ArtifactResolutionService') as $ep) { |
100 | - if ($ep['index'] === hexdec($endpointIndex)) { |
|
100 | + if ($ep['index'] === hexdec($endpointIndex)) { |
|
101 | 101 | $endpoint = $ep; |
102 | 102 | break; |
103 | 103 | } |
@@ -107,7 +107,7 @@ discard block |
||
107 | 107 | throw new \Exception('No ArtifactResolutionService with the correct index.'); |
108 | 108 | } |
109 | 109 | |
110 | - Utils::getContainer()->getLogger()->debug("ArtifactResolutionService endpoint being used is := " . $endpoint['Location']); |
|
110 | + Utils::getContainer()->getLogger()->debug("ArtifactResolutionService endpoint being used is := ".$endpoint['Location']); |
|
111 | 111 | |
112 | 112 | //Construct the ArtifactResolve Request |
113 | 113 | $ar = new ArtifactResolve(); |
@@ -72,7 +72,7 @@ |
||
72 | 72 | if (strpos($keyword, "+") !== false) { |
73 | 73 | throw new \Exception('Keywords may not contain a "+" character.'); |
74 | 74 | } |
75 | - $value .= str_replace(' ', '+', $keyword) . ' '; |
|
75 | + $value .= str_replace(' ', '+', $keyword).' '; |
|
76 | 76 | } |
77 | 77 | $value = rtrim($value); |
78 | 78 | $e->appendChild($doc->createTextNode($value)); |
@@ -74,7 +74,7 @@ |
||
74 | 74 | |
75 | 75 | throw new MissingConfigurationException(sprintf( |
76 | 76 | 'No certificates or fingerprints have been configured%s', |
77 | - $configuration->has('entityid') ? ' for "' . $configuration->get('entityid') . '"' : '' |
|
77 | + $configuration->has('entityid') ? ' for "'.$configuration->get('entityid').'"' : '' |
|
78 | 78 | )); |
79 | 79 | } |
80 | 80 | } |
@@ -70,7 +70,7 @@ |
||
70 | 70 | SignedElement $signedElement, |
71 | 71 | CertificateProvider $configuration |
72 | 72 | ) { |
73 | - $this->certificates = array_map(function ($certificate) { |
|
73 | + $this->certificates = array_map(function($certificate) { |
|
74 | 74 | return X509::createFromCertificateData($certificate); |
75 | 75 | }, $this->certificates); |
76 | 76 |
@@ -176,8 +176,8 @@ |
||
176 | 176 | foreach ($this->certificates as $cert) { |
177 | 177 | |
178 | 178 | /* Construct a PEM formatted certificate */ |
179 | - $pemCert = "-----BEGIN CERTIFICATE-----\n" . |
|
180 | - chunk_split($cert, 64) . |
|
179 | + $pemCert = "-----BEGIN CERTIFICATE-----\n". |
|
180 | + chunk_split($cert, 64). |
|
181 | 181 | "-----END CERTIFICATE-----\n"; |
182 | 182 | |
183 | 183 | /* Extract the public key from the certificate for validation. */ |
@@ -3,7 +3,6 @@ |
||
3 | 3 | namespace SAML2; |
4 | 4 | |
5 | 5 | use DOMDocument; |
6 | - |
|
7 | 6 | use SAML2\XML\ecp\Response as ECPResponse; |
8 | 7 | |
9 | 8 | /** |