@@ -131,7 +131,7 @@ |
||
131 | 131 | // this is the confirmed username, we store it just like the Passwordless |
132 | 132 | // one would have been |
133 | 133 | |
134 | - $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [ $request->request->get("username") ]; |
|
134 | + $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [$request->request->get("username")]; |
|
135 | 135 | |
136 | 136 | // we deliberately do not store any additional attributes - these have |
137 | 137 | // to be retrieved from the same authproc that would retrieve them |
@@ -215,7 +215,7 @@ |
||
215 | 215 | $frontendData = []; |
216 | 216 | $frontendData['challengeEncoded'] = $challengeEncoded; |
217 | 217 | $frontendData['state'] = []; |
218 | - foreach (['FIDO2Scope','FIDO2Username','FIDO2Displayname','requestTokenModel'] as $stateItem) { |
|
218 | + foreach (['FIDO2Scope', 'FIDO2Username', 'FIDO2Displayname', 'requestTokenModel'] as $stateItem) { |
|
219 | 219 | $frontendData['state'][$stateItem] = $state[$stateItem]; |
220 | 220 | } |
221 | 221 |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | base64_decode($request->request->get('client_data_raw')), |
166 | 166 | $oneToken[0], |
167 | 167 | $oneToken[1], |
168 | - (int)$oneToken[4], // algo |
|
168 | + (int) $oneToken[4], // algo |
|
169 | 169 | base64_decode($request->request->get('signature')), |
170 | 170 | $debugEnabled |
171 | 171 | ); |
@@ -223,7 +223,7 @@ discard block |
||
223 | 223 | |
224 | 224 | if ($debugEnabled) { |
225 | 225 | $response = new RunnableResponse( |
226 | - function (WebAuthnAuthenticationEvent $authObject, array $state) { |
|
226 | + function(WebAuthnAuthenticationEvent $authObject, array $state) { |
|
227 | 227 | echo $authObject->getDebugBuffer(); |
228 | 228 | echo $authObject->getValidateBuffer(); |
229 | 229 | echo "Debug mode, not continuing to " . ($state['FIDO2WantsRegister'] ? "credential registration page." : "destination."); |
@@ -247,7 +247,7 @@ discard block |
||
247 | 247 | * In passwordless, we're on our own. The one thing we know is the |
248 | 248 | * username. |
249 | 249 | */ |
250 | - $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [ $state['FIDO2Username'] ]; |
|
250 | + $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [$state['FIDO2Username']]; |
|
251 | 251 | // in case this authentication happened in the Supercharged context |
252 | 252 | // it may be that there is an authprocfilter for WebAuthN, too. |
253 | 253 | |
@@ -260,19 +260,19 @@ discard block |
||
260 | 260 | |
261 | 261 | foreach ($state['IdPMetadata']['authproc'] as $index => $content) { |
262 | 262 | if ($content['class'] == "webauthn:WebAuthn") { |
263 | - unset( $state['IdPMetadata']['authproc'][$index] ); |
|
263 | + unset($state['IdPMetadata']['authproc'][$index]); |
|
264 | 264 | } |
265 | 265 | } |
266 | 266 | // set an internal "authenticated passwordless" hint somewhere else |
267 | 267 | // in $state, which the authproc can react upon |
268 | - $state['Attributes']['internal:FIDO2PasswordlessAuthentication'] = [ $state['FIDO2Username'] ]; |
|
268 | + $state['Attributes']['internal:FIDO2PasswordlessAuthentication'] = [$state['FIDO2Username']]; |
|
269 | 269 | |
270 | 270 | $this->authState::saveState($state, 'webauthn:request'); |
271 | 271 | |
272 | 272 | // set a cookie to remember that the user has successfully used |
273 | 273 | // Passwordless - on the Supercharged AuthSource, this can be used |
274 | 274 | // to auto-trigger the FIDO2 authentication step next time |
275 | - setcookie("SuccessfullyUsedPasswordlessBefore", "YES", time()+60*60*24*90, '/', "", true, true ); |
|
275 | + setcookie("SuccessfullyUsedPasswordlessBefore", "YES", time() + 60 * 60 * 24 * 90, '/', "", true, true); |
|
276 | 276 | |
277 | 277 | // now properly return our final state to the framework |
278 | 278 | Source::completeAuth($state); |