@@ -41,30 +41,26 @@ discard block |
||
| 41 | 41 | static public function build(IJWKSpecification $spec) |
| 42 | 42 | { |
| 43 | 43 | |
| 44 | - if(is_null($spec)) throw new \InvalidArgumentException('missing spec param'); |
|
| 44 | + if (is_null($spec)) throw new \InvalidArgumentException('missing spec param'); |
|
| 45 | 45 | |
| 46 | 46 | $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get($spec->getAlg()); |
| 47 | 47 | |
| 48 | - if(is_null($algorithm)) |
|
| 48 | + if (is_null($algorithm)) |
|
| 49 | 49 | { |
| 50 | 50 | $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get($spec->getAlg()); |
| 51 | 51 | } |
| 52 | 52 | |
| 53 | - if(is_null($algorithm)) |
|
| 54 | - throw new InvalidJWKAlgorithm |
|
| 55 | - ( |
|
| 56 | - sprintf |
|
| 57 | - ( |
|
| 53 | + if (is_null($algorithm)) |
|
| 54 | + throw new InvalidJWKAlgorithm( |
|
| 55 | + sprintf( |
|
| 58 | 56 | 'alg %s not supported!', |
| 59 | 57 | $spec->getAlg() |
| 60 | 58 | ) |
| 61 | 59 | ); |
| 62 | 60 | |
| 63 | - if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA) |
|
| 64 | - throw new InvalidJWKAlgorithm |
|
| 65 | - ( |
|
| 66 | - sprintf |
|
| 67 | - ( |
|
| 61 | + if ($algorithm->getKeyType() !== JSONWebKeyTypes::RSA) |
|
| 62 | + throw new InvalidJWKAlgorithm( |
|
| 63 | + sprintf( |
|
| 68 | 64 | 'key type %s not supported!', |
| 69 | 65 | $algorithm->getKeyType() |
| 70 | 66 | ) |
@@ -79,11 +75,10 @@ discard block |
||
| 79 | 75 | $jwk->setKeyUse($spec->getUse()); |
| 80 | 76 | return $jwk; |
| 81 | 77 | } |
| 82 | - if($spec instanceof RSAJWKParamsPublicKeySpecification) |
|
| 78 | + if ($spec instanceof RSAJWKParamsPublicKeySpecification) |
|
| 83 | 79 | { |
| 84 | 80 | |
| 85 | - $public_key = RSAFacade::getInstance()->buildPublicKey |
|
| 86 | - ( |
|
| 81 | + $public_key = RSAFacade::getInstance()->buildPublicKey( |
|
| 87 | 82 | $spec->getModulus()->toBigInt(), |
| 88 | 83 | $spec->getExponent()->toBigInt() |
| 89 | 84 | ); |
@@ -96,7 +91,7 @@ discard block |
||
| 96 | 91 | |
| 97 | 92 | return $jwk; |
| 98 | 93 | } |
| 99 | - if($spec instanceof RSAJWKPEMPublicKeySpecification) |
|
| 94 | + if ($spec instanceof RSAJWKPEMPublicKeySpecification) |
|
| 100 | 95 | { |
| 101 | 96 | $public_key = RSAFacade::getInstance()->buildPublicKeyFromPEM($spec->getPEM()); |
| 102 | 97 | $jwk = RSAJWK::fromPublicKey($public_key); |
@@ -41,7 +41,9 @@ discard block |
||
| 41 | 41 | static public function build(IJWKSpecification $spec) |
| 42 | 42 | { |
| 43 | 43 | |
| 44 | - if(is_null($spec)) throw new \InvalidArgumentException('missing spec param'); |
|
| 44 | + if(is_null($spec)) { |
|
| 45 | + throw new \InvalidArgumentException('missing spec param'); |
|
| 46 | + } |
|
| 45 | 47 | |
| 46 | 48 | $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get($spec->getAlg()); |
| 47 | 49 | |
@@ -50,8 +52,8 @@ discard block |
||
| 50 | 52 | $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get($spec->getAlg()); |
| 51 | 53 | } |
| 52 | 54 | |
| 53 | - if(is_null($algorithm)) |
|
| 54 | - throw new InvalidJWKAlgorithm |
|
| 55 | + if(is_null($algorithm)) { |
|
| 56 | + throw new InvalidJWKAlgorithm |
|
| 55 | 57 | ( |
| 56 | 58 | sprintf |
| 57 | 59 | ( |
@@ -59,9 +61,10 @@ discard block |
||
| 59 | 61 | $spec->getAlg() |
| 60 | 62 | ) |
| 61 | 63 | ); |
| 64 | + } |
|
| 62 | 65 | |
| 63 | - if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA) |
|
| 64 | - throw new InvalidJWKAlgorithm |
|
| 66 | + if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA) { |
|
| 67 | + throw new InvalidJWKAlgorithm |
|
| 65 | 68 | ( |
| 66 | 69 | sprintf |
| 67 | 70 | ( |
@@ -69,6 +72,7 @@ discard block |
||
| 69 | 72 | $algorithm->getKeyType() |
| 70 | 73 | ) |
| 71 | 74 | ); |
| 75 | + } |
|
| 72 | 76 | |
| 73 | 77 | if ($spec instanceof RSAJWKPEMPrivateKeySpecification) |
| 74 | 78 | { |
@@ -92,42 +92,42 @@ |
||
| 92 | 92 | /** |
| 93 | 93 | * @return Base64urlUInt |
| 94 | 94 | */ |
| 95 | - public function getModulus(){ |
|
| 95 | + public function getModulus() { |
|
| 96 | 96 | return new Base64urlUInt($this->n_b64); |
| 97 | 97 | } |
| 98 | 98 | |
| 99 | 99 | /** |
| 100 | 100 | * @return Base64urlUInt |
| 101 | 101 | */ |
| 102 | - public function getExponent(){ |
|
| 102 | + public function getExponent() { |
|
| 103 | 103 | return new Base64urlUInt($this->e_b64); |
| 104 | 104 | } |
| 105 | 105 | |
| 106 | 106 | /** |
| 107 | 107 | * @return array |
| 108 | 108 | */ |
| 109 | - public function getX509CertificateChain(){ |
|
| 109 | + public function getX509CertificateChain() { |
|
| 110 | 110 | return $this->x5c; |
| 111 | 111 | } |
| 112 | 112 | |
| 113 | 113 | /** |
| 114 | 114 | * @return null|string |
| 115 | 115 | */ |
| 116 | - public function getX509Url(){ |
|
| 116 | + public function getX509Url() { |
|
| 117 | 117 | return $this->x5u; |
| 118 | 118 | } |
| 119 | 119 | |
| 120 | 120 | /** |
| 121 | 121 | * @return null|string |
| 122 | 122 | */ |
| 123 | - public function getX509CertificateSHA_1_Thumbprint(){ |
|
| 123 | + public function getX509CertificateSHA_1_Thumbprint() { |
|
| 124 | 124 | return $this->x5t; |
| 125 | 125 | } |
| 126 | 126 | |
| 127 | 127 | /** |
| 128 | 128 | * @return null|string |
| 129 | 129 | */ |
| 130 | - public function getX509CertificateSHA_256_Thumbprint(){ |
|
| 130 | + public function getX509CertificateSHA_256_Thumbprint() { |
|
| 131 | 131 | return $this->x5t_S256; |
| 132 | 132 | } |
| 133 | 133 | } |
| 134 | 134 | \ No newline at end of file |
@@ -34,8 +34,7 @@ |
||
| 34 | 34 | * @param string $alg |
| 35 | 35 | * @param string $use |
| 36 | 36 | */ |
| 37 | - public function __construct |
|
| 38 | - ( |
|
| 37 | + public function __construct( |
|
| 39 | 38 | $key_pem, |
| 40 | 39 | $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256, |
| 41 | 40 | $use = JSONWebKeyPublicKeyUseValues::Signature |
@@ -32,14 +32,13 @@ |
||
| 32 | 32 | * @param string $kid |
| 33 | 33 | * @throws InvalidJWKAlgorithm |
| 34 | 34 | */ |
| 35 | - public function __construct |
|
| 36 | - ( |
|
| 35 | + public function __construct( |
|
| 37 | 36 | $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256, |
| 38 | 37 | $use = JSONWebKeyPublicKeyUseValues::Signature, |
| 39 | 38 | $kid = null |
| 40 | 39 | ) |
| 41 | 40 | { |
| 42 | - if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values)) |
|
| 41 | + if (!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values)) |
|
| 43 | 42 | throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg)); |
| 44 | 43 | |
| 45 | 44 | parent::__construct($alg, $use, $kid); |
@@ -39,8 +39,9 @@ |
||
| 39 | 39 | $kid = null |
| 40 | 40 | ) |
| 41 | 41 | { |
| 42 | - if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values)) |
|
| 43 | - throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg)); |
|
| 42 | + if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values)) { |
|
| 43 | + throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg)); |
|
| 44 | + } |
|
| 44 | 45 | |
| 45 | 46 | parent::__construct($alg, $use, $kid); |
| 46 | 47 | } |
@@ -38,14 +38,13 @@ |
||
| 38 | 38 | * @param string $use |
| 39 | 39 | * @throws InvalidJWKAlgorithm |
| 40 | 40 | */ |
| 41 | - public function __construct |
|
| 42 | - ( |
|
| 41 | + public function __construct( |
|
| 43 | 42 | $shared_secret = self::GenerateSecret, |
| 44 | 43 | $alg = JSONWebSignatureAndEncryptionAlgorithms::HS256, |
| 45 | 44 | $use = JSONWebKeyPublicKeyUseValues::Signature |
| 46 | 45 | ) |
| 47 | 46 | { |
| 48 | - if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values)) |
|
| 47 | + if (!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values)) |
|
| 49 | 48 | throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg)); |
| 50 | 49 | |
| 51 | 50 | parent::__construct($alg, $use); |
@@ -45,8 +45,9 @@ |
||
| 45 | 45 | $use = JSONWebKeyPublicKeyUseValues::Signature |
| 46 | 46 | ) |
| 47 | 47 | { |
| 48 | - if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values)) |
|
| 49 | - throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg)); |
|
| 48 | + if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values)) { |
|
| 49 | + throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg)); |
|
| 50 | + } |
|
| 50 | 51 | |
| 51 | 52 | parent::__construct($alg, $use); |
| 52 | 53 | |
@@ -112,10 +112,10 @@ discard block |
||
| 112 | 112 | */ |
| 113 | 113 | static public function fromKeys(KeyPair $keys) |
| 114 | 114 | { |
| 115 | - if(!($keys->getPrivate() instanceof RSAPrivateKey)) |
|
| 115 | + if (!($keys->getPrivate() instanceof RSAPrivateKey)) |
|
| 116 | 116 | throw new \RuntimeException('Private key of invalid type!'); |
| 117 | 117 | |
| 118 | - if(!($keys->getPublic() instanceof RSAPublicKey)) |
|
| 118 | + if (!($keys->getPublic() instanceof RSAPublicKey)) |
|
| 119 | 119 | throw new \RuntimeException('Public key of invalid type!'); |
| 120 | 120 | |
| 121 | 121 | $jwk = new RSAJWK(); |
@@ -165,7 +165,7 @@ discard block |
||
| 165 | 165 | */ |
| 166 | 166 | public function getKey($key_op = JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC) |
| 167 | 167 | { |
| 168 | - switch($key_op){ |
|
| 168 | + switch ($key_op) { |
|
| 169 | 169 | case JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC: |
| 170 | 170 | case JSONWebKeyKeyOperationsValues::DecryptContentAndValidateDecryption: { |
| 171 | 171 | return $this->getPrivateKey(); |
@@ -177,7 +177,7 @@ discard block |
||
| 177 | 177 | } |
| 178 | 178 | break; |
| 179 | 179 | default:{ |
| 180 | - throw new InvalidJWKUseException(sprintf('key_op %s', $key_op)); |
|
| 180 | + throw new InvalidJWKUseException(sprintf('key_op %s', $key_op)); |
|
| 181 | 181 | } |
| 182 | 182 | break; |
| 183 | 183 | } |
@@ -190,7 +190,7 @@ discard block |
||
| 190 | 190 | public function toArray() |
| 191 | 191 | { |
| 192 | 192 | $res = parent::toArray(); |
| 193 | - if($this->visibility === JSONWebKeyVisibility::PublicOnly){ |
|
| 193 | + if ($this->visibility === JSONWebKeyVisibility::PublicOnly) { |
|
| 194 | 194 | //remove private attributes |
| 195 | 195 | unset($res[RSAKeysParameters::PrivateExponent]); |
| 196 | 196 | unset($res[RSAKeysParameters::FirstPrimeFactor]); |
@@ -53,11 +53,14 @@ discard block |
||
| 53 | 53 | |
| 54 | 54 | parent::__construct($headers); |
| 55 | 55 | |
| 56 | - if (count($headers) === 0) return; |
|
| 56 | + if (count($headers) === 0) { |
|
| 57 | + return; |
|
| 58 | + } |
|
| 57 | 59 | |
| 58 | 60 | foreach (RSAKeysParameters::$public_key_params as $p) { |
| 59 | - if (!array_key_exists($p, $headers)) |
|
| 60 | - throw new RSAJWKMissingPublicKeyParamException(); |
|
| 61 | + if (!array_key_exists($p, $headers)) { |
|
| 62 | + throw new RSAJWKMissingPublicKeyParamException(); |
|
| 63 | + } |
|
| 61 | 64 | $this->set[$p] = new Base64urlUInt($headers[$p]); |
| 62 | 65 | } |
| 63 | 66 | |
@@ -74,8 +77,9 @@ discard block |
||
| 74 | 77 | //its has one private param, must have all ... |
| 75 | 78 | if (in_array(RSAKeysParameters::FirstPrimeFactor, $headers)) { |
| 76 | 79 | foreach (RSAKeysParameters::$producers_private_key_params as $p) { |
| 77 | - if (!array_key_exists($p, $headers)) |
|
| 78 | - throw new RSAJWKMissingPrivateKeyParamException(); |
|
| 80 | + if (!array_key_exists($p, $headers)) { |
|
| 81 | + throw new RSAJWKMissingPrivateKeyParamException(); |
|
| 82 | + } |
|
| 79 | 83 | $this->set[$p] = new Base64urlUInt($headers[$p]); |
| 80 | 84 | } |
| 81 | 85 | $this->private_key = RSAFacade::getInstance()->buildPrivateKey( |
@@ -112,11 +116,13 @@ discard block |
||
| 112 | 116 | */ |
| 113 | 117 | static public function fromKeys(KeyPair $keys) |
| 114 | 118 | { |
| 115 | - if(!($keys->getPrivate() instanceof RSAPrivateKey)) |
|
| 116 | - throw new \RuntimeException('Private key of invalid type!'); |
|
| 119 | + if(!($keys->getPrivate() instanceof RSAPrivateKey)) { |
|
| 120 | + throw new \RuntimeException('Private key of invalid type!'); |
|
| 121 | + } |
|
| 117 | 122 | |
| 118 | - if(!($keys->getPublic() instanceof RSAPublicKey)) |
|
| 119 | - throw new \RuntimeException('Public key of invalid type!'); |
|
| 123 | + if(!($keys->getPublic() instanceof RSAPublicKey)) { |
|
| 124 | + throw new \RuntimeException('Public key of invalid type!'); |
|
| 125 | + } |
|
| 120 | 126 | |
| 121 | 127 | $jwk = new RSAJWK(); |
| 122 | 128 | $jwk->public_key = $keys->getPublic(); |
@@ -134,7 +140,9 @@ discard block |
||
| 134 | 140 | */ |
| 135 | 141 | static public function fromPublicKey(PublicKey $public_key) |
| 136 | 142 | { |
| 137 | - if (!($public_key instanceof RSAPublicKey)) throw new InvalidJWKType(); |
|
| 143 | + if (!($public_key instanceof RSAPublicKey)) { |
|
| 144 | + throw new InvalidJWKType(); |
|
| 145 | + } |
|
| 138 | 146 | $jwk = new RSAJWK(); |
| 139 | 147 | $jwk->public_key = $public_key; |
| 140 | 148 | $jwk->set[RSAKeysParameters::Exponent] = Base64urlUInt::fromBigInt($public_key->getPublicExponent()); |
@@ -149,7 +157,9 @@ discard block |
||
| 149 | 157 | */ |
| 150 | 158 | static public function fromPrivateKey(PrivateKey $private_key) |
| 151 | 159 | { |
| 152 | - if (!($private_key instanceof RSAPrivateKey)) throw new InvalidJWKType(); |
|
| 160 | + if (!($private_key instanceof RSAPrivateKey)) { |
|
| 161 | + throw new InvalidJWKType(); |
|
| 162 | + } |
|
| 153 | 163 | $jwk = new RSAJWK(); |
| 154 | 164 | $jwk->private_key = $private_key; |
| 155 | 165 | $jwk->set[RSAKeysParameters::Exponent] = Base64urlUInt::fromBigInt($private_key->getPublicExponent()); |
@@ -95,8 +95,8 @@ |
||
| 95 | 95 | } |
| 96 | 96 | |
| 97 | 97 | /** |
| 98 | - * @return int |
|
| 99 | - */ |
|
| 98 | + * @return int |
|
| 99 | + */ |
|
| 100 | 100 | public function getVisibility() |
| 101 | 101 | { |
| 102 | 102 | return $this->visibility; |
@@ -63,7 +63,9 @@ discard block |
||
| 63 | 63 | { |
| 64 | 64 | parent::__construct($headers); |
| 65 | 65 | |
| 66 | - if(count($headers) === 0 ) return; |
|
| 66 | + if(count($headers) === 0 ) { |
|
| 67 | + return; |
|
| 68 | + } |
|
| 67 | 69 | |
| 68 | 70 | // certificates |
| 69 | 71 | if(in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])){ |
@@ -109,8 +111,9 @@ discard block |
||
| 109 | 111 | */ |
| 110 | 112 | public function setVisibility($visibility) |
| 111 | 113 | { |
| 112 | - if(!in_array($visibility, JSONWebKeyVisibility::$valid_values)) |
|
| 113 | - throw new InvalidJWKVisibilityException; |
|
| 114 | + if(!in_array($visibility, JSONWebKeyVisibility::$valid_values)) { |
|
| 115 | + throw new InvalidJWKVisibilityException; |
|
| 116 | + } |
|
| 114 | 117 | $this->visibility = $visibility; |
| 115 | 118 | return $this; |
| 116 | 119 | } |
@@ -59,32 +59,32 @@ discard block |
||
| 59 | 59 | { |
| 60 | 60 | parent::__construct($headers); |
| 61 | 61 | |
| 62 | - if(count($headers) === 0 ) return; |
|
| 62 | + if (count($headers) === 0) return; |
|
| 63 | 63 | |
| 64 | 64 | // certificates |
| 65 | - if(in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])){ |
|
| 65 | + if (in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])) { |
|
| 66 | 66 | |
| 67 | 67 | // json array |
| 68 | - foreach($headers[PublicJSONWebKeyParameters::X_509CertificateChain] as $x509_pem){ |
|
| 69 | - $this->x509_certificates_chain[] = X509CertificateFactory::buildFromPEM($x509_pem); |
|
| 68 | + foreach ($headers[PublicJSONWebKeyParameters::X_509CertificateChain] as $x509_pem) { |
|
| 69 | + $this->x509_certificates_chain[] = X509CertificateFactory::buildFromPEM($x509_pem); |
|
| 70 | 70 | } |
| 71 | 71 | |
| 72 | - if($this->checkX509CertMismatch()){ |
|
| 72 | + if ($this->checkX509CertMismatch()) { |
|
| 73 | 73 | throw new X509CertMismatchException; |
| 74 | 74 | } |
| 75 | 75 | |
| 76 | 76 | $this->set[PublicJSONWebKeyParameters::X_509CertificateChain] = new JsonArray($headers[PublicJSONWebKeyParameters::X_509CertificateChain]); |
| 77 | 77 | } |
| 78 | 78 | |
| 79 | - if(in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint, $headers)){ |
|
| 80 | - $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]) ; |
|
| 79 | + if (in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint, $headers)) { |
|
| 80 | + $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]); |
|
| 81 | 81 | } |
| 82 | 82 | |
| 83 | - if(in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint, $headers)){ |
|
| 83 | + if (in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint, $headers)) { |
|
| 84 | 84 | $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]); |
| 85 | 85 | } |
| 86 | 86 | |
| 87 | - if(in_array(PublicJSONWebKeyParameters::X_509Url, $headers)){ |
|
| 87 | + if (in_array(PublicJSONWebKeyParameters::X_509Url, $headers)) { |
|
| 88 | 88 | $this->set[PublicJSONWebKeyParameters::X_509Url] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509Url]); |
| 89 | 89 | } |
| 90 | 90 | } |
@@ -104,7 +104,7 @@ discard block |
||
| 104 | 104 | */ |
| 105 | 105 | public function setVisibility($visibility) |
| 106 | 106 | { |
| 107 | - if(!in_array($visibility, JSONWebKeyVisibility::$valid_values)) |
|
| 107 | + if (!in_array($visibility, JSONWebKeyVisibility::$valid_values)) |
|
| 108 | 108 | throw new InvalidJWKVisibilityException; |
| 109 | 109 | $this->visibility = $visibility; |
| 110 | 110 | return $this; |
@@ -129,7 +129,7 @@ discard block |
||
| 129 | 129 | /** |
| 130 | 130 | * @return null | X509Certificate |
| 131 | 131 | */ |
| 132 | - public function getX509LeafCertificate(){ |
|
| 132 | + public function getX509LeafCertificate() { |
|
| 133 | 133 | return count($this->x509_certificates_chain) > 0 ? $this->x509_certificates_chain[0] : null; |
| 134 | 134 | } |
| 135 | 135 | |
@@ -148,10 +148,10 @@ discard block |
||
| 148 | 148 | */ |
| 149 | 149 | public function getX509CertificateSha1Thumbprint($fallback_on_x5c = false) |
| 150 | 150 | { |
| 151 | - $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint])? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]->getString(); |
|
| 152 | - if(empty($res) && $fallback_on_x5c){ |
|
| 151 | + $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]) ? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]->getString(); |
|
| 152 | + if (empty($res) && $fallback_on_x5c) { |
|
| 153 | 153 | $x509 = $this->getX509LeafCertificate(); |
| 154 | - if(!is_null($x509)){ |
|
| 154 | + if (!is_null($x509)) { |
|
| 155 | 155 | return $x509->getSHA_1_Thumbprint(); |
| 156 | 156 | } |
| 157 | 157 | } |
@@ -164,10 +164,10 @@ discard block |
||
| 164 | 164 | */ |
| 165 | 165 | public function getX509CertificateSha256Thumbprint($fallback_on_x5c = false) |
| 166 | 166 | { |
| 167 | - $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint])? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]->getString(); |
|
| 168 | - if(empty($res) && $fallback_on_x5c){ |
|
| 167 | + $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]) ? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]->getString(); |
|
| 168 | + if (empty($res) && $fallback_on_x5c) { |
|
| 169 | 169 | $x509 = $this->getX509LeafCertificate(); |
| 170 | - if(!is_null($x509)){ |
|
| 170 | + if (!is_null($x509)) { |
|
| 171 | 171 | return $x509->getSHA_256_Thumbprint(); |
| 172 | 172 | } |
| 173 | 173 | } |
@@ -179,13 +179,13 @@ discard block |
||
| 179 | 179 | */ |
| 180 | 180 | public function getX509Url() |
| 181 | 181 | { |
| 182 | - return is_null($this[PublicJSONWebKeyParameters::X_509Url])? null : $this[PublicJSONWebKeyParameters::X_509Url]->getString(); |
|
| 182 | + return is_null($this[PublicJSONWebKeyParameters::X_509Url]) ? null : $this[PublicJSONWebKeyParameters::X_509Url]->getString(); |
|
| 183 | 183 | } |
| 184 | 184 | |
| 185 | 185 | /** |
| 186 | 186 | * @return bool |
| 187 | 187 | */ |
| 188 | - protected function checkX509CertMismatch(){ |
|
| 188 | + protected function checkX509CertMismatch() { |
|
| 189 | 189 | $x509 = $this->getX509LeafCertificate(); |
| 190 | 190 | return !is_null($x509) && $x509->getPublicKey() !== $this->public_key->getStrippedEncoded(); |
| 191 | 191 | } |
@@ -195,13 +195,13 @@ discard block |
||
| 195 | 195 | * @return $this |
| 196 | 196 | * @throws X509CertMismatchException |
| 197 | 197 | */ |
| 198 | - public function setX509CertificateChain(array $x5c){ |
|
| 198 | + public function setX509CertificateChain(array $x5c) { |
|
| 199 | 199 | // json array |
| 200 | - foreach($x5c as $x509_pem){ |
|
| 200 | + foreach ($x5c as $x509_pem) { |
|
| 201 | 201 | array_push($this->x509_certificates_chain, X509CertificateFactory::buildFromPEM($x509_pem)); |
| 202 | 202 | } |
| 203 | 203 | |
| 204 | - if($this->checkX509CertMismatch()){ |
|
| 204 | + if ($this->checkX509CertMismatch()) { |
|
| 205 | 205 | throw new X509CertMismatchException; |
| 206 | 206 | } |
| 207 | 207 | |
@@ -23,11 +23,11 @@ discard block |
||
| 23 | 23 | /** |
| 24 | 24 | * |
| 25 | 25 | */ |
| 26 | - const PublicOnly = 1; |
|
| 26 | + const PublicOnly = 1; |
|
| 27 | 27 | /** |
| 28 | 28 | * |
| 29 | 29 | */ |
| 30 | - const IncludePrivate = 2; |
|
| 30 | + const IncludePrivate = 2; |
|
| 31 | 31 | /** |
| 32 | 32 | * |
| 33 | 33 | */ |
@@ -36,5 +36,5 @@ discard block |
||
| 36 | 36 | /** |
| 37 | 37 | * @var array |
| 38 | 38 | */ |
| 39 | - static public $valid_values = array ( self::IncludePrivate, self::IncludeSymmetric, self::PublicOnly); |
|
| 39 | + static public $valid_values = array(self::IncludePrivate, self::IncludeSymmetric, self::PublicOnly); |
|
| 40 | 40 | } |
| 41 | 41 | \ No newline at end of file |
@@ -29,11 +29,11 @@ |
||
| 29 | 29 | /** |
| 30 | 30 | * |
| 31 | 31 | */ |
| 32 | - const Signature = 'sig'; |
|
| 32 | + const Signature = 'sig'; |
|
| 33 | 33 | /** |
| 34 | 34 | * |
| 35 | 35 | */ |
| 36 | 36 | const Encryption = 'enc'; |
| 37 | 37 | |
| 38 | - public static $valid_uses = array ( self::Signature, self::Encryption); |
|
| 38 | + public static $valid_uses = array(self::Signature, self::Encryption); |
|
| 39 | 39 | } |
| 40 | 40 | \ No newline at end of file |