@@ -62,11 +62,11 @@ |
||
| 62 | 62 | */ |
| 63 | 63 | private $encryptionKey; |
| 64 | 64 | |
| 65 | - /** |
|
| 66 | - * The earliest time this assertion is valid, as an UNIX timestamp. |
|
| 67 | - * |
|
| 68 | - * @var int |
|
| 69 | - */ |
|
| 65 | + /** |
|
| 66 | + * The earliest time this assertion is valid, as an UNIX timestamp. |
|
| 67 | + * |
|
| 68 | + * @var int |
|
| 69 | + */ |
|
| 70 | 70 | private $notBefore; |
| 71 | 71 | |
| 72 | 72 | /** |
@@ -36,7 +36,7 @@ |
||
| 36 | 36 | return; |
| 37 | 37 | } |
| 38 | 38 | |
| 39 | - for ($n = $xml->firstChild;; $n = $n->nextSibling) { |
|
| 39 | + for ($n = $xml->firstChild; ; $n = $n->nextSibling) { |
|
| 40 | 40 | if (!($n instanceof \DOMElement)) { |
| 41 | 41 | continue; |
| 42 | 42 | } |
@@ -76,7 +76,7 @@ |
||
| 76 | 76 | $required = false; |
| 77 | 77 | } |
| 78 | 78 | $privateKeys = $this->get('privateKeys'); |
| 79 | - $key = array_filter($privateKeys, function (PrivateKey $key) use ($name) { |
|
| 79 | + $key = array_filter($privateKeys, function(PrivateKey $key) use ($name) { |
|
| 80 | 80 | return $key->getName() === $name; |
| 81 | 81 | }); |
| 82 | 82 | |
@@ -50,7 +50,7 @@ |
||
| 50 | 50 | $required = false; |
| 51 | 51 | } |
| 52 | 52 | $privateKeys = $this->get('privateKeys'); |
| 53 | - $key = array_filter($privateKeys, function (PrivateKey $key) use ($name) { |
|
| 53 | + $key = array_filter($privateKeys, function(PrivateKey $key) use ($name) { |
|
| 54 | 54 | return $key->getName() === $name; |
| 55 | 55 | }); |
| 56 | 56 | |
@@ -63,7 +63,7 @@ |
||
| 63 | 63 | CertificateProvider $configuration |
| 64 | 64 | ) : bool { |
| 65 | 65 | $logger = $this->logger; |
| 66 | - $pemCandidates = $this->configuredKeys->filter(function (Key $key) use ($logger) { |
|
| 66 | + $pemCandidates = $this->configuredKeys->filter(function(Key $key) use ($logger) { |
|
| 67 | 67 | if (!$key instanceof X509) { |
| 68 | 68 | $logger->debug(sprintf('Skipping unknown key type: "%s"', $key['type'])); |
| 69 | 69 | return false; |
@@ -132,7 +132,7 @@ |
||
| 132 | 132 | if (!$document->firstChild instanceof \DOMElement) { |
| 133 | 133 | throw new \Exception('Malformed SAML message received.'); |
| 134 | 134 | } |
| 135 | - $message = Message::fromXML($document->firstChild); |
|
| 135 | + $message = Message::fromXML($document->firstChild); |
|
| 136 | 136 | |
| 137 | 137 | if (array_key_exists('RelayState', $data)) { |
| 138 | 138 | $message->setRelayState($data['RelayState']); |
@@ -30,15 +30,15 @@ |
||
| 30 | 30 | protected $certificates; |
| 31 | 31 | |
| 32 | 32 | |
| 33 | - /** |
|
| 34 | - * Validate this element against a public key. |
|
| 35 | - * |
|
| 36 | - * If no signature is present, false is returned. If a signature is present, |
|
| 37 | - * but cannot be verified, an exception will be thrown. |
|
| 38 | - * |
|
| 39 | - * @param XMLSecurityKey $key The key we should check against. |
|
| 40 | - * @return bool True if successful, false if we don't have a signature that can be verified. |
|
| 41 | - */ |
|
| 33 | + /** |
|
| 34 | + * Validate this element against a public key. |
|
| 35 | + * |
|
| 36 | + * If no signature is present, false is returned. If a signature is present, |
|
| 37 | + * but cannot be verified, an exception will be thrown. |
|
| 38 | + * |
|
| 39 | + * @param XMLSecurityKey $key The key we should check against. |
|
| 40 | + * @return bool True if successful, false if we don't have a signature that can be verified. |
|
| 41 | + */ |
|
| 42 | 42 | abstract public function validate(XMLSecurityKey $key) : bool; |
| 43 | 43 | |
| 44 | 44 | |