@@ -167,7 +167,7 @@ discard block |
||
167 | 167 | base64_decode($request->request->get('client_data_raw')), |
168 | 168 | $oneToken[0], |
169 | 169 | $oneToken[1], |
170 | - (int)$oneToken[4], // algo |
|
170 | + (int) $oneToken[4], // algo |
|
171 | 171 | base64_decode($request->request->get('signature')), |
172 | 172 | $debugEnabled, |
173 | 173 | ); |
@@ -225,7 +225,7 @@ discard block |
||
225 | 225 | |
226 | 226 | if ($debugEnabled) { |
227 | 227 | $response = new RunnableResponse( |
228 | - function (WebAuthnAuthenticationEvent $authObject, array $state) { |
|
228 | + function(WebAuthnAuthenticationEvent $authObject, array $state) { |
|
229 | 229 | echo $authObject->getDebugBuffer(); |
230 | 230 | echo $authObject->getValidateBuffer(); |
231 | 231 | echo "Debug mode, not continuing to " . ($state['FIDO2WantsRegister'] ? "credential registration page." : "destination."); |
@@ -249,7 +249,7 @@ discard block |
||
249 | 249 | * In passwordless, we're on our own. The one thing we know is the |
250 | 250 | * username. |
251 | 251 | */ |
252 | - $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [ $state['FIDO2Username'] ]; |
|
252 | + $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [$state['FIDO2Username']]; |
|
253 | 253 | // in case this authentication happened in the Supercharged context |
254 | 254 | // it may be that there is an authprocfilter for WebAuthN, too. |
255 | 255 | |
@@ -267,7 +267,7 @@ discard block |
||
267 | 267 | } |
268 | 268 | // set an internal "authenticated passwordless" hint somewhere else |
269 | 269 | // in $state, which the authproc can react upon |
270 | - $state['Attributes']['internal:FIDO2PasswordlessAuthentication'] = [ $state['FIDO2Username'] ]; |
|
270 | + $state['Attributes']['internal:FIDO2PasswordlessAuthentication'] = [$state['FIDO2Username']]; |
|
271 | 271 | |
272 | 272 | $this->authState::saveState($state, 'webauthn:request'); |
273 | 273 |