@@ -130,7 +130,7 @@ |
||
130 | 130 | $frontendData = []; |
131 | 131 | $frontendData['challengeEncoded'] = $challengeEncoded; |
132 | 132 | $frontendData['state'] = []; |
133 | - foreach (['Source', 'FIDO2Scope','FIDO2Username','FIDO2Displayname','requestTokenModel'] as $stateItem) { |
|
133 | + foreach (['Source', 'FIDO2Scope', 'FIDO2Username', 'FIDO2Displayname', 'requestTokenModel'] as $stateItem) { |
|
134 | 134 | $frontendData['state'][$stateItem] = $state[$stateItem]; |
135 | 135 | } |
136 | 136 |
@@ -202,7 +202,7 @@ |
||
202 | 202 | 'private' => false, |
203 | 203 | ]); |
204 | 204 | $response->setExpires(new DateTime('Thu, 19 Nov 1981 08:52:00 GMT')); |
205 | - */ |
|
205 | + */ |
|
206 | 206 | |
207 | 207 | return $response; |
208 | 208 | } |
@@ -202,7 +202,7 @@ |
||
202 | 202 | 'private' => false, |
203 | 203 | ]); |
204 | 204 | $response->setExpires(new DateTime('Thu, 19 Nov 1981 08:52:00 GMT')); |
205 | - */ |
|
205 | + */ |
|
206 | 206 | |
207 | 207 | return $response; |
208 | 208 | } |
@@ -174,7 +174,7 @@ |
||
174 | 174 | |
175 | 175 | if ($debugEnabled) { |
176 | 176 | $response = new RunnableResponse( |
177 | - function ($authObject, $state) { |
|
177 | + function($authObject, $state) { |
|
178 | 178 | echo $authObject->getDebugBuffer(); |
179 | 179 | echo $authObject->getValidateBuffer(); |
180 | 180 | echo "Debug mode, not continuing to " . ($state['FIDO2WantsRegister'] ? |
@@ -202,7 +202,7 @@ |
||
202 | 202 | 'private' => false, |
203 | 203 | ]); |
204 | 204 | $response->setExpires(new DateTime('Thu, 19 Nov 1981 08:52:00 GMT')); |
205 | - */ |
|
205 | + */ |
|
206 | 206 | |
207 | 207 | return $response; |
208 | 208 | } |
@@ -196,7 +196,7 @@ |
||
196 | 196 | $id = $this->authState::saveState($state, 'webauthn:request'); |
197 | 197 | if ($debugEnabled === true) { |
198 | 198 | $response = new RunnableResponse( |
199 | - function ($regObject, $id) { |
|
199 | + function($regObject, $id) { |
|
200 | 200 | echo $regObject->getDebugBuffer(); |
201 | 201 | echo $regObject->getValidateBuffer(); |
202 | 202 | echo "<form id='regform' method='POST' action='" . |
@@ -414,7 +414,7 @@ |
||
414 | 414 | $keyObject = new Ec2Key($this->cborDecode(hex2bin($this->credential))); |
415 | 415 | $keyResource = openssl_pkey_get_public($keyObject->asPEM()); |
416 | 416 | if ($keyResource === false) { |
417 | - $this->fail("Unable to construct ECDSA public key resource from PEM."); |
|
417 | + $this->fail("Unable to construct ECDSA public key resource from PEM."); |
|
418 | 418 | }; |
419 | 419 | break; |
420 | 420 | case PK_ALGORITHM_RSA: |
@@ -21,7 +21,7 @@ discard block |
||
21 | 21 | */ |
22 | 22 | public const PK_ALGORITHM_ECDSA = "-7"; |
23 | 23 | public const PK_ALGORITHM_RSA = "-257"; |
24 | - public const PK_ALGORITHM = [ PK_ALGORITHM_ECDSA, PK_ALGORITHM_RSA ]; |
|
24 | + public const PK_ALGORITHM = [PK_ALGORITHM_ECDSA, PK_ALGORITHM_RSA]; |
|
25 | 25 | public const AAGUID_ASSURANCE_LEVEL_NONE = 0; |
26 | 26 | public const AAGUID_ASSURANCE_LEVEL_SELF = 1; |
27 | 27 | public const AAGUID_ASSURANCE_LEVEL_BASIC = 2; |
@@ -273,7 +273,7 @@ discard block |
||
273 | 273 | $keyDetails = openssl_pkey_get_details($keyResource); |
274 | 274 | if ( |
275 | 275 | $credentialDetails['bits'] != $keyDetails['bits'] || |
276 | - $credentialDetails['key'] != $keyDetails['key'] || |
|
276 | + $credentialDetails['key'] != $keyDetails['key'] || |
|
277 | 277 | $credentialDetails['type'] != $keyDetails['type'] |
278 | 278 | ) { |
279 | 279 | $this->fail( |