@@ -196,7 +196,7 @@ |
||
| 196 | 196 | $id = $this->authState::saveState($state, 'webauthn:request'); |
| 197 | 197 | if ($debugEnabled === true) { |
| 198 | 198 | $response = new RunnableResponse( |
| 199 | - function (WebAuthnRegistrationEvent $regObject, string $id) { |
|
| 199 | + function(WebAuthnRegistrationEvent $regObject, string $id) { |
|
| 200 | 200 | echo $regObject->getDebugBuffer(); |
| 201 | 201 | echo $regObject->getValidateBuffer(); |
| 202 | 202 | echo "<form id='regform' method='POST' action='" . |
@@ -131,7 +131,7 @@ |
||
| 131 | 131 | // this is the confirmed username, we store it just like the Passwordless |
| 132 | 132 | // one would have been |
| 133 | 133 | |
| 134 | - $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [ $request->request->get("username") ]; |
|
| 134 | + $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [$request->request->get("username")]; |
|
| 135 | 135 | |
| 136 | 136 | // we deliberately do not store any additional attributes - these have |
| 137 | 137 | // to be retrieved from the same authproc that would retrieve them |
@@ -215,7 +215,7 @@ |
||
| 215 | 215 | $frontendData = []; |
| 216 | 216 | $frontendData['challengeEncoded'] = $challengeEncoded; |
| 217 | 217 | $frontendData['state'] = []; |
| 218 | - foreach (['FIDO2Scope','FIDO2Username','FIDO2Displayname','requestTokenModel'] as $stateItem) { |
|
| 218 | + foreach (['FIDO2Scope', 'FIDO2Username', 'FIDO2Displayname', 'requestTokenModel'] as $stateItem) { |
|
| 219 | 219 | $frontendData['state'][$stateItem] = $state[$stateItem]; |
| 220 | 220 | } |
| 221 | 221 | |
@@ -496,7 +496,7 @@ discard block |
||
| 496 | 496 | } |
| 497 | 497 | |
| 498 | 498 | // Keymaster 3 - KeyMint ??? |
| 499 | - private const ORIGINS_3 = [ // https://source.android.com/docs/security/features/keystore/tags#origin |
|
| 499 | + private const ORIGINS_3 = [// https://source.android.com/docs/security/features/keystore/tags#origin |
|
| 500 | 500 | 0 => "GENERATED", |
| 501 | 501 | 1 => "DERIVED", |
| 502 | 502 | 2 => "IMPORTED", |
@@ -711,7 +711,7 @@ discard block |
||
| 711 | 711 | * STEP 13 of the validation procedure in § 7.1 of the spec: is the algorithm the expected one? |
| 712 | 712 | */ |
| 713 | 713 | if (in_array($arrayPK['3'], self::PK_ALGORITHM)) { // we requested -7 or -257, so want to see it here |
| 714 | - $this->algo = (int)$arrayPK['3']; |
|
| 714 | + $this->algo = (int) $arrayPK['3']; |
|
| 715 | 715 | $this->pass("Public Key Algorithm is expected (" . implode(' or ', WebAuthnRegistrationEvent::PK_ALGORITHM) . ")."); |
| 716 | 716 | } else { |
| 717 | 717 | $this->fail("Public Key Algorithm mismatch!"); |
@@ -167,7 +167,7 @@ discard block |
||
| 167 | 167 | base64_decode($request->request->get('client_data_raw')), |
| 168 | 168 | $oneToken[0], |
| 169 | 169 | $oneToken[1], |
| 170 | - (int)$oneToken[4], // algo |
|
| 170 | + (int) $oneToken[4], // algo |
|
| 171 | 171 | base64_decode($request->request->get('signature')), |
| 172 | 172 | $debugEnabled, |
| 173 | 173 | ); |
@@ -225,7 +225,7 @@ discard block |
||
| 225 | 225 | |
| 226 | 226 | if ($debugEnabled) { |
| 227 | 227 | $response = new RunnableResponse( |
| 228 | - function (WebAuthnAuthenticationEvent $authObject, array $state) { |
|
| 228 | + function(WebAuthnAuthenticationEvent $authObject, array $state) { |
|
| 229 | 229 | echo $authObject->getDebugBuffer(); |
| 230 | 230 | echo $authObject->getValidateBuffer(); |
| 231 | 231 | echo "Debug mode, not continuing to " . ($state['FIDO2WantsRegister'] ? "credential registration page." : "destination."); |
@@ -249,7 +249,7 @@ discard block |
||
| 249 | 249 | * In passwordless, we're on our own. The one thing we know is the |
| 250 | 250 | * username. |
| 251 | 251 | */ |
| 252 | - $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [ $state['FIDO2Username'] ]; |
|
| 252 | + $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [$state['FIDO2Username']]; |
|
| 253 | 253 | // in case this authentication happened in the Supercharged context |
| 254 | 254 | // it may be that there is an authprocfilter for WebAuthN, too. |
| 255 | 255 | |
@@ -267,7 +267,7 @@ discard block |
||
| 267 | 267 | } |
| 268 | 268 | // set an internal "authenticated passwordless" hint somewhere else |
| 269 | 269 | // in $state, which the authproc can react upon |
| 270 | - $state['Attributes']['internal:FIDO2PasswordlessAuthentication'] = [ $state['FIDO2Username'] ]; |
|
| 270 | + $state['Attributes']['internal:FIDO2PasswordlessAuthentication'] = [$state['FIDO2Username']]; |
|
| 271 | 271 | |
| 272 | 272 | $this->authState::saveState($state, 'webauthn:request'); |
| 273 | 273 | |
@@ -152,7 +152,7 @@ |
||
| 152 | 152 | * |
| 153 | 153 | * @throws \Exception if the configuration is invalid. |
| 154 | 154 | */ |
| 155 | - public static function parseStoreConfig(string|array $config): Store |
|
| 155 | + public static function parseStoreConfig(string | array $config): Store |
|
| 156 | 156 | { |
| 157 | 157 | if (is_string($config)) { |
| 158 | 158 | $arrayUtils = new Utils\Arrays(); |
@@ -109,7 +109,7 @@ discard block |
||
| 109 | 109 | } |
| 110 | 110 | } |
| 111 | 111 | |
| 112 | - public static function loadModuleConfig(array $moduleConfig, StateData &$stateData): void |
|
| 112 | + public static function loadModuleConfig(array $moduleConfig, StateData & $stateData): void |
|
| 113 | 113 | { |
| 114 | 114 | $stateData->store = Store::parseStoreConfig($moduleConfig['store']); |
| 115 | 115 | |
@@ -209,7 +209,7 @@ discard block |
||
| 209 | 209 | $frontendData = []; |
| 210 | 210 | $frontendData['challengeEncoded'] = $challengeEncoded; |
| 211 | 211 | $frontendData['state'] = []; |
| 212 | - foreach (['FIDO2Scope','FIDO2Username','FIDO2Displayname','requestTokenModel'] as $stateItem) { |
|
| 212 | + foreach (['FIDO2Scope', 'FIDO2Username', 'FIDO2Displayname', 'requestTokenModel'] as $stateItem) { |
|
| 213 | 213 | $frontendData['state'][$stateItem] = $state[$stateItem]; |
| 214 | 214 | } |
| 215 | 215 | |