@@ -196,7 +196,7 @@ |
||
196 | 196 | $id = $this->authState::saveState($state, 'webauthn:request'); |
197 | 197 | if ($debugEnabled === true) { |
198 | 198 | $response = new RunnableResponse( |
199 | - function (WebAuthnRegistrationEvent $regObject, string $id) { |
|
199 | + function(WebAuthnRegistrationEvent $regObject, string $id) { |
|
200 | 200 | echo $regObject->getDebugBuffer(); |
201 | 201 | echo $regObject->getValidateBuffer(); |
202 | 202 | echo "<form id='regform' method='POST' action='" . |
@@ -215,7 +215,7 @@ |
||
215 | 215 | $frontendData = []; |
216 | 216 | $frontendData['challengeEncoded'] = $challengeEncoded; |
217 | 217 | $frontendData['state'] = []; |
218 | - foreach (['FIDO2Scope','FIDO2Username','FIDO2Displayname','requestTokenModel'] as $stateItem) { |
|
218 | + foreach (['FIDO2Scope', 'FIDO2Username', 'FIDO2Displayname', 'requestTokenModel'] as $stateItem) { |
|
219 | 219 | $frontendData['state'][$stateItem] = $state[$stateItem]; |
220 | 220 | } |
221 | 221 |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | base64_decode($request->request->get('client_data_raw')), |
166 | 166 | $oneToken[0], |
167 | 167 | $oneToken[1], |
168 | - (int)$oneToken[4], // algo |
|
168 | + (int) $oneToken[4], // algo |
|
169 | 169 | base64_decode($request->request->get('signature')), |
170 | 170 | $debugEnabled |
171 | 171 | ); |
@@ -223,7 +223,7 @@ discard block |
||
223 | 223 | |
224 | 224 | if ($debugEnabled) { |
225 | 225 | $response = new RunnableResponse( |
226 | - function (WebAuthnAuthenticationEvent $authObject, array $state) { |
|
226 | + function(WebAuthnAuthenticationEvent $authObject, array $state) { |
|
227 | 227 | echo $authObject->getDebugBuffer(); |
228 | 228 | echo $authObject->getValidateBuffer(); |
229 | 229 | echo "Debug mode, not continuing to " . ($state['FIDO2WantsRegister'] ? "credential registration page." : "destination."); |
@@ -247,7 +247,7 @@ discard block |
||
247 | 247 | * In passwordless, we're on our own. The one thing we know is the |
248 | 248 | * username. |
249 | 249 | */ |
250 | - $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [ $state['FIDO2Username'] ]; |
|
250 | + $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [$state['FIDO2Username']]; |
|
251 | 251 | // now properly return our final state to the framework |
252 | 252 | Source::completeAuth($state); |
253 | 253 | } |
@@ -624,7 +624,7 @@ |
||
624 | 624 | * STEP 13 of the validation procedure in § 7.1 of the spec: is the algorithm the expected one? |
625 | 625 | */ |
626 | 626 | if (in_array($arrayPK['3'], self::PK_ALGORITHM)) { // we requested -7 or -257, so want to see it here |
627 | - $this->algo = (int)$arrayPK['3']; |
|
627 | + $this->algo = (int) $arrayPK['3']; |
|
628 | 628 | $this->pass("Public Key Algorithm is expected (" . implode(' or ', WebAuthnRegistrationEvent::PK_ALGORITHM) . ")."); |
629 | 629 | } else { |
630 | 630 | $this->fail("Public Key Algorithm mismatch!"); |