GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Push — master ( 665ea8...1b4181 )
by sebastian
15s
created
src/jwk/impl/RSAJWKFactory.php 2 patches
Spacing   +11 added lines, -16 removed lines patch added patch discarded remove patch
@@ -41,30 +41,26 @@  discard block
 block discarded – undo
41 41
     static public function build(IJWKSpecification $spec)
42 42
     {
43 43
 
44
-        if(is_null($spec)) throw new \InvalidArgumentException('missing spec param');
44
+        if (is_null($spec)) throw new \InvalidArgumentException('missing spec param');
45 45
 
46 46
         $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get($spec->getAlg());
47 47
 
48
-        if(is_null($algorithm))
48
+        if (is_null($algorithm))
49 49
         {
50 50
             $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get($spec->getAlg());
51 51
         }
52 52
 
53
-        if(is_null($algorithm))
54
-            throw new InvalidJWKAlgorithm
55
-            (
56
-                sprintf
57
-                (
53
+        if (is_null($algorithm))
54
+            throw new InvalidJWKAlgorithm(
55
+                sprintf(
58 56
                     'alg %s not supported!',
59 57
                     $spec->getAlg()
60 58
                 )
61 59
             );
62 60
 
63
-        if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA)
64
-            throw new InvalidJWKAlgorithm
65
-            (
66
-                sprintf
67
-                (
61
+        if ($algorithm->getKeyType() !== JSONWebKeyTypes::RSA)
62
+            throw new InvalidJWKAlgorithm(
63
+                sprintf(
68 64
                     'key type %s not supported!',
69 65
                     $algorithm->getKeyType()
70 66
                 )
@@ -79,11 +75,10 @@  discard block
 block discarded – undo
79 75
             $jwk->setKeyUse($spec->getUse());
80 76
             return $jwk;
81 77
         }
82
-        if($spec instanceof RSAJWKParamsPublicKeySpecification)
78
+        if ($spec instanceof RSAJWKParamsPublicKeySpecification)
83 79
         {
84 80
 
85
-            $public_key = RSAFacade::getInstance()->buildPublicKey
86
-            (
81
+            $public_key = RSAFacade::getInstance()->buildPublicKey(
87 82
                 $spec->getModulus()->toBigInt(),
88 83
                 $spec->getExponent()->toBigInt()
89 84
             );
@@ -96,7 +91,7 @@  discard block
 block discarded – undo
96 91
 
97 92
             return $jwk;
98 93
         }
99
-        if($spec instanceof RSAJWKPEMPublicKeySpecification)
94
+        if ($spec instanceof RSAJWKPEMPublicKeySpecification)
100 95
         {
101 96
             $public_key = RSAFacade::getInstance()->buildPublicKeyFromPEM($spec->getPEM());
102 97
             $jwk = RSAJWK::fromPublicKey($public_key);
Please login to merge, or discard this patch.
Braces   +9 added lines, -5 removed lines patch added patch discarded remove patch
@@ -41,7 +41,9 @@  discard block
 block discarded – undo
41 41
     static public function build(IJWKSpecification $spec)
42 42
     {
43 43
 
44
-        if(is_null($spec)) throw new \InvalidArgumentException('missing spec param');
44
+        if(is_null($spec)) {
45
+         throw new \InvalidArgumentException('missing spec param');
46
+        }
45 47
 
46 48
         $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get($spec->getAlg());
47 49
 
@@ -50,8 +52,8 @@  discard block
 block discarded – undo
50 52
             $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get($spec->getAlg());
51 53
         }
52 54
 
53
-        if(is_null($algorithm))
54
-            throw new InvalidJWKAlgorithm
55
+        if(is_null($algorithm)) {
56
+                    throw new InvalidJWKAlgorithm
55 57
             (
56 58
                 sprintf
57 59
                 (
@@ -59,9 +61,10 @@  discard block
 block discarded – undo
59 61
                     $spec->getAlg()
60 62
                 )
61 63
             );
64
+        }
62 65
 
63
-        if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA)
64
-            throw new InvalidJWKAlgorithm
66
+        if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA) {
67
+                    throw new InvalidJWKAlgorithm
65 68
             (
66 69
                 sprintf
67 70
                 (
@@ -69,6 +72,7 @@  discard block
 block discarded – undo
69 72
                     $algorithm->getKeyType()
70 73
                 )
71 74
             );
75
+        }
72 76
 
73 77
         if ($spec instanceof RSAJWKPEMPrivateKeySpecification)
74 78
         {
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWKParamsPublicKeySpecification.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -92,42 +92,42 @@
 block discarded – undo
92 92
     /**
93 93
      * @return Base64urlUInt
94 94
      */
95
-    public function getModulus(){
95
+    public function getModulus() {
96 96
         return new Base64urlUInt($this->n_b64);
97 97
     }
98 98
 
99 99
     /**
100 100
      * @return Base64urlUInt
101 101
      */
102
-    public function getExponent(){
102
+    public function getExponent() {
103 103
         return new Base64urlUInt($this->e_b64);
104 104
     }
105 105
 
106 106
     /**
107 107
      * @return array
108 108
      */
109
-    public function getX509CertificateChain(){
109
+    public function getX509CertificateChain() {
110 110
         return $this->x5c;
111 111
     }
112 112
 
113 113
     /**
114 114
      * @return null|string
115 115
      */
116
-    public function getX509Url(){
116
+    public function getX509Url() {
117 117
         return $this->x5u;
118 118
     }
119 119
 
120 120
     /**
121 121
      * @return null|string
122 122
      */
123
-    public function getX509CertificateSHA_1_Thumbprint(){
123
+    public function getX509CertificateSHA_1_Thumbprint() {
124 124
         return $this->x5t;
125 125
     }
126 126
 
127 127
     /**
128 128
      * @return null|string
129 129
      */
130
-    public function getX509CertificateSHA_256_Thumbprint(){
130
+    public function getX509CertificateSHA_256_Thumbprint() {
131 131
         return $this->x5t_S256;
132 132
     }
133 133
 }
134 134
\ No newline at end of file
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWKPEMKeySpecification.php 1 patch
Spacing   +1 added lines, -2 removed lines patch added patch discarded remove patch
@@ -34,8 +34,7 @@
 block discarded – undo
34 34
      * @param string $alg
35 35
      * @param string $use
36 36
      */
37
-    public function __construct
38
-    (
37
+    public function __construct(
39 38
         $key_pem,
40 39
         $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256,
41 40
         $use = JSONWebKeyPublicKeyUseValues::Signature
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWKSpecification.php 2 patches
Spacing   +2 added lines, -3 removed lines patch added patch discarded remove patch
@@ -32,14 +32,13 @@
 block discarded – undo
32 32
      * @param string $kid
33 33
      * @throws InvalidJWKAlgorithm
34 34
      */
35
-    public function __construct
36
-    (
35
+    public function __construct(
37 36
         $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256,
38 37
         $use = JSONWebKeyPublicKeyUseValues::Signature,
39 38
         $kid = null
40 39
     )
41 40
     {
42
-        if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values))
41
+        if (!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values))
43 42
             throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
44 43
 
45 44
         parent::__construct($alg, $use, $kid);
Please login to merge, or discard this patch.
Braces   +3 added lines, -2 removed lines patch added patch discarded remove patch
@@ -39,8 +39,9 @@
 block discarded – undo
39 39
         $kid = null
40 40
     )
41 41
     {
42
-        if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values))
43
-            throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
42
+        if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values)) {
43
+                    throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
44
+        }
44 45
 
45 46
         parent::__construct($alg, $use, $kid);
46 47
     }
Please login to merge, or discard this patch.
src/jwk/impl/OctetSequenceJWKSpecification.php 2 patches
Spacing   +2 added lines, -3 removed lines patch added patch discarded remove patch
@@ -38,14 +38,13 @@
 block discarded – undo
38 38
      * @param string $use
39 39
      * @throws InvalidJWKAlgorithm
40 40
      */
41
-    public function __construct
42
-    (
41
+    public function __construct(
43 42
         $shared_secret = self::GenerateSecret,
44 43
         $alg = JSONWebSignatureAndEncryptionAlgorithms::HS256,
45 44
         $use = JSONWebKeyPublicKeyUseValues::Signature
46 45
     )
47 46
     {
48
-        if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values))
47
+        if (!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values))
49 48
             throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
50 49
 
51 50
         parent::__construct($alg, $use);
Please login to merge, or discard this patch.
Braces   +3 added lines, -2 removed lines patch added patch discarded remove patch
@@ -45,8 +45,9 @@
 block discarded – undo
45 45
         $use = JSONWebKeyPublicKeyUseValues::Signature
46 46
     )
47 47
     {
48
-        if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values))
49
-            throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
48
+        if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values)) {
49
+                    throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
50
+        }
50 51
 
51 52
         parent::__construct($alg, $use);
52 53
 
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWK.php 2 patches
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -112,10 +112,10 @@  discard block
 block discarded – undo
112 112
      */
113 113
     static public function fromKeys(KeyPair $keys)
114 114
     {
115
-        if(!($keys->getPrivate() instanceof RSAPrivateKey))
115
+        if (!($keys->getPrivate() instanceof RSAPrivateKey))
116 116
             throw new \RuntimeException('Private key of invalid type!');
117 117
 
118
-        if(!($keys->getPublic() instanceof RSAPublicKey))
118
+        if (!($keys->getPublic() instanceof RSAPublicKey))
119 119
             throw new \RuntimeException('Public key of invalid type!');
120 120
 
121 121
         $jwk                                          = new RSAJWK();
@@ -165,7 +165,7 @@  discard block
 block discarded – undo
165 165
      */
166 166
     public function getKey($key_op = JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC)
167 167
     {
168
-        switch($key_op){
168
+        switch ($key_op) {
169 169
             case JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC:
170 170
             case JSONWebKeyKeyOperationsValues::DecryptContentAndValidateDecryption: {
171 171
                 return $this->getPrivateKey();
@@ -177,7 +177,7 @@  discard block
 block discarded – undo
177 177
             }
178 178
             break;
179 179
             default:{
180
-                throw new InvalidJWKUseException(sprintf('key_op %s',  $key_op));
180
+                throw new InvalidJWKUseException(sprintf('key_op %s', $key_op));
181 181
             }
182 182
             break;
183 183
         }
@@ -190,7 +190,7 @@  discard block
 block discarded – undo
190 190
     public function toArray()
191 191
     {
192 192
         $res = parent::toArray();
193
-        if($this->visibility === JSONWebKeyVisibility::PublicOnly){
193
+        if ($this->visibility === JSONWebKeyVisibility::PublicOnly) {
194 194
             //remove private attributes
195 195
             unset($res[RSAKeysParameters::PrivateExponent]);
196 196
             unset($res[RSAKeysParameters::FirstPrimeFactor]);
Please login to merge, or discard this patch.
Braces   +21 added lines, -11 removed lines patch added patch discarded remove patch
@@ -53,11 +53,14 @@  discard block
 block discarded – undo
53 53
 
54 54
         parent::__construct($headers);
55 55
 
56
-        if (count($headers) === 0) return;
56
+        if (count($headers) === 0) {
57
+         return;
58
+        }
57 59
 
58 60
         foreach (RSAKeysParameters::$public_key_params as $p) {
59
-            if (!array_key_exists($p, $headers))
60
-                throw new RSAJWKMissingPublicKeyParamException();
61
+            if (!array_key_exists($p, $headers)) {
62
+                            throw new RSAJWKMissingPublicKeyParamException();
63
+            }
61 64
             $this->set[$p] = new Base64urlUInt($headers[$p]);
62 65
         }
63 66
 
@@ -74,8 +77,9 @@  discard block
 block discarded – undo
74 77
             //its has one private param, must have all ...
75 78
             if (in_array(RSAKeysParameters::FirstPrimeFactor, $headers)) {
76 79
                 foreach (RSAKeysParameters::$producers_private_key_params as $p) {
77
-                    if (!array_key_exists($p, $headers))
78
-                        throw new RSAJWKMissingPrivateKeyParamException();
80
+                    if (!array_key_exists($p, $headers)) {
81
+                                            throw new RSAJWKMissingPrivateKeyParamException();
82
+                    }
79 83
                     $this->set[$p] = new Base64urlUInt($headers[$p]);
80 84
                 }
81 85
                 $this->private_key = RSAFacade::getInstance()->buildPrivateKey(
@@ -112,11 +116,13 @@  discard block
 block discarded – undo
112 116
      */
113 117
     static public function fromKeys(KeyPair $keys)
114 118
     {
115
-        if(!($keys->getPrivate() instanceof RSAPrivateKey))
116
-            throw new \RuntimeException('Private key of invalid type!');
119
+        if(!($keys->getPrivate() instanceof RSAPrivateKey)) {
120
+                    throw new \RuntimeException('Private key of invalid type!');
121
+        }
117 122
 
118
-        if(!($keys->getPublic() instanceof RSAPublicKey))
119
-            throw new \RuntimeException('Public key of invalid type!');
123
+        if(!($keys->getPublic() instanceof RSAPublicKey)) {
124
+                    throw new \RuntimeException('Public key of invalid type!');
125
+        }
120 126
 
121 127
         $jwk                                          = new RSAJWK();
122 128
         $jwk->public_key                              = $keys->getPublic();
@@ -134,7 +140,9 @@  discard block
 block discarded – undo
134 140
      */
135 141
     static public function fromPublicKey(PublicKey $public_key)
136 142
     {
137
-        if (!($public_key instanceof RSAPublicKey)) throw new InvalidJWKType();
143
+        if (!($public_key instanceof RSAPublicKey)) {
144
+         throw new InvalidJWKType();
145
+        }
138 146
         $jwk = new RSAJWK();
139 147
         $jwk->public_key = $public_key;
140 148
         $jwk->set[RSAKeysParameters::Exponent] = Base64urlUInt::fromBigInt($public_key->getPublicExponent());
@@ -149,7 +157,9 @@  discard block
 block discarded – undo
149 157
      */
150 158
     static public function fromPrivateKey(PrivateKey $private_key)
151 159
     {
152
-        if (!($private_key instanceof RSAPrivateKey)) throw new InvalidJWKType();
160
+        if (!($private_key instanceof RSAPrivateKey)) {
161
+         throw new InvalidJWKType();
162
+        }
153 163
         $jwk = new RSAJWK();
154 164
         $jwk->private_key = $private_key;
155 165
         $jwk->set[RSAKeysParameters::Exponent] = Base64urlUInt::fromBigInt($private_key->getPublicExponent());
Please login to merge, or discard this patch.
src/jwk/impl/AsymmetricJWK.php 3 patches
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -95,8 +95,8 @@
 block discarded – undo
95 95
     }
96 96
 
97 97
        /**
98
-     * @return int
99
-     */
98
+        * @return int
99
+        */
100 100
     public function getVisibility()
101 101
     {
102 102
         return $this->visibility;
Please login to merge, or discard this patch.
Braces   +6 added lines, -3 removed lines patch added patch discarded remove patch
@@ -63,7 +63,9 @@  discard block
 block discarded – undo
63 63
     {
64 64
         parent::__construct($headers);
65 65
 
66
-        if(count($headers) === 0 ) return;
66
+        if(count($headers) === 0 ) {
67
+         return;
68
+        }
67 69
 
68 70
         // certificates
69 71
         if(in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])){
@@ -109,8 +111,9 @@  discard block
 block discarded – undo
109 111
      */
110 112
     public function setVisibility($visibility)
111 113
     {
112
-        if(!in_array($visibility, JSONWebKeyVisibility::$valid_values))
113
-            throw new InvalidJWKVisibilityException;
114
+        if(!in_array($visibility, JSONWebKeyVisibility::$valid_values)) {
115
+                    throw new InvalidJWKVisibilityException;
116
+        }
114 117
         $this->visibility = $visibility;
115 118
         return $this;
116 119
     }
Please login to merge, or discard this patch.
Spacing   +22 added lines, -22 removed lines patch added patch discarded remove patch
@@ -59,32 +59,32 @@  discard block
 block discarded – undo
59 59
     {
60 60
         parent::__construct($headers);
61 61
 
62
-        if(count($headers) === 0 ) return;
62
+        if (count($headers) === 0) return;
63 63
 
64 64
         // certificates
65
-        if(in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])){
65
+        if (in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])) {
66 66
 
67 67
             // json array
68
-            foreach($headers[PublicJSONWebKeyParameters::X_509CertificateChain] as $x509_pem){
69
-                $this->x509_certificates_chain[] =  X509CertificateFactory::buildFromPEM($x509_pem);
68
+            foreach ($headers[PublicJSONWebKeyParameters::X_509CertificateChain] as $x509_pem) {
69
+                $this->x509_certificates_chain[] = X509CertificateFactory::buildFromPEM($x509_pem);
70 70
             }
71 71
 
72
-            if($this->checkX509CertMismatch()){
72
+            if ($this->checkX509CertMismatch()) {
73 73
                 throw new X509CertMismatchException;
74 74
             }
75 75
 
76 76
             $this->set[PublicJSONWebKeyParameters::X_509CertificateChain] = new JsonArray($headers[PublicJSONWebKeyParameters::X_509CertificateChain]);
77 77
         }
78 78
 
79
-        if(in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint, $headers)){
80
-            $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]) ;
79
+        if (in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint, $headers)) {
80
+            $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]);
81 81
         }
82 82
 
83
-        if(in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint, $headers)){
83
+        if (in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint, $headers)) {
84 84
             $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]);
85 85
         }
86 86
 
87
-        if(in_array(PublicJSONWebKeyParameters::X_509Url, $headers)){
87
+        if (in_array(PublicJSONWebKeyParameters::X_509Url, $headers)) {
88 88
             $this->set[PublicJSONWebKeyParameters::X_509Url] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509Url]);
89 89
         }
90 90
     }
@@ -104,7 +104,7 @@  discard block
 block discarded – undo
104 104
      */
105 105
     public function setVisibility($visibility)
106 106
     {
107
-        if(!in_array($visibility, JSONWebKeyVisibility::$valid_values))
107
+        if (!in_array($visibility, JSONWebKeyVisibility::$valid_values))
108 108
             throw new InvalidJWKVisibilityException;
109 109
         $this->visibility = $visibility;
110 110
         return $this;
@@ -129,7 +129,7 @@  discard block
 block discarded – undo
129 129
     /**
130 130
      * @return null | X509Certificate
131 131
      */
132
-    public function getX509LeafCertificate(){
132
+    public function getX509LeafCertificate() {
133 133
         return count($this->x509_certificates_chain) > 0 ? $this->x509_certificates_chain[0] : null;
134 134
     }
135 135
 
@@ -148,10 +148,10 @@  discard block
 block discarded – undo
148 148
      */
149 149
     public function getX509CertificateSha1Thumbprint($fallback_on_x5c = false)
150 150
     {
151
-        $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint])? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]->getString();
152
-        if(empty($res) && $fallback_on_x5c){
151
+        $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]) ? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]->getString();
152
+        if (empty($res) && $fallback_on_x5c) {
153 153
             $x509 = $this->getX509LeafCertificate();
154
-            if(!is_null($x509)){
154
+            if (!is_null($x509)) {
155 155
                 return $x509->getSHA_1_Thumbprint();
156 156
             }
157 157
         }
@@ -164,10 +164,10 @@  discard block
 block discarded – undo
164 164
      */
165 165
     public function getX509CertificateSha256Thumbprint($fallback_on_x5c = false)
166 166
     {
167
-        $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint])? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]->getString();
168
-        if(empty($res) && $fallback_on_x5c){
167
+        $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]) ? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]->getString();
168
+        if (empty($res) && $fallback_on_x5c) {
169 169
             $x509 = $this->getX509LeafCertificate();
170
-            if(!is_null($x509)){
170
+            if (!is_null($x509)) {
171 171
                 return $x509->getSHA_256_Thumbprint();
172 172
             }
173 173
         }
@@ -179,13 +179,13 @@  discard block
 block discarded – undo
179 179
      */
180 180
     public function getX509Url()
181 181
     {
182
-        return is_null($this[PublicJSONWebKeyParameters::X_509Url])? null : $this[PublicJSONWebKeyParameters::X_509Url]->getString();
182
+        return is_null($this[PublicJSONWebKeyParameters::X_509Url]) ? null : $this[PublicJSONWebKeyParameters::X_509Url]->getString();
183 183
     }
184 184
 
185 185
     /**
186 186
      * @return bool
187 187
      */
188
-    protected function checkX509CertMismatch(){
188
+    protected function checkX509CertMismatch() {
189 189
         $x509 = $this->getX509LeafCertificate();
190 190
         return !is_null($x509) && $x509->getPublicKey() !== $this->public_key->getStrippedEncoded();
191 191
     }
@@ -195,13 +195,13 @@  discard block
 block discarded – undo
195 195
      * @return $this
196 196
      * @throws X509CertMismatchException
197 197
      */
198
-    public function setX509CertificateChain(array $x5c){
198
+    public function setX509CertificateChain(array $x5c) {
199 199
         // json array
200
-        foreach($x5c as $x509_pem){
200
+        foreach ($x5c as $x509_pem) {
201 201
             array_push($this->x509_certificates_chain, X509CertificateFactory::buildFromPEM($x509_pem));
202 202
         }
203 203
 
204
-        if($this->checkX509CertMismatch()){
204
+        if ($this->checkX509CertMismatch()) {
205 205
             throw new X509CertMismatchException;
206 206
         }
207 207
 
Please login to merge, or discard this patch.
src/jwk/JSONWebKeyVisibility.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -23,11 +23,11 @@  discard block
 block discarded – undo
23 23
     /**
24 24
      *
25 25
      */
26
-    const PublicOnly       = 1;
26
+    const PublicOnly = 1;
27 27
     /**
28 28
      *
29 29
      */
30
-    const IncludePrivate   = 2;
30
+    const IncludePrivate = 2;
31 31
     /**
32 32
      *
33 33
      */
@@ -36,5 +36,5 @@  discard block
 block discarded – undo
36 36
     /**
37 37
      * @var array
38 38
      */
39
-    static public $valid_values = array ( self::IncludePrivate, self::IncludeSymmetric, self::PublicOnly);
39
+    static public $valid_values = array(self::IncludePrivate, self::IncludeSymmetric, self::PublicOnly);
40 40
 }
41 41
\ No newline at end of file
Please login to merge, or discard this patch.
src/jwk/JSONWebKeyPublicKeyUseValues.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -29,11 +29,11 @@
 block discarded – undo
29 29
     /**
30 30
      *
31 31
      */
32
-    const Signature  = 'sig';
32
+    const Signature = 'sig';
33 33
     /**
34 34
      *
35 35
      */
36 36
     const Encryption = 'enc';
37 37
 
38
-    public static $valid_uses = array ( self::Signature, self::Encryption);
38
+    public static $valid_uses = array(self::Signature, self::Encryption);
39 39
 }
40 40
\ No newline at end of file
Please login to merge, or discard this patch.