GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Pull Request — master (#6)
by sebastian
03:05
created
src/jwk/impl/OctetSequenceJWKFactory.php 2 patches
Spacing   +15 added lines, -23 removed lines patch added patch discarded remove patch
@@ -41,28 +41,24 @@  discard block
 block discarded – undo
41 41
     static public function build(IJWKSpecification $spec)
42 42
     {
43 43
 
44
-        if(is_null($spec)) throw new \InvalidArgumentException('missing spec param');
44
+        if (is_null($spec)) throw new \InvalidArgumentException('missing spec param');
45 45
 
46
-        $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get
47
-        (
46
+        $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get(
48 47
             $spec->getAlg()
49 48
         );
50 49
 
51
-        if(is_null($algorithm))
52
-            $algorithm = ContentEncryptionAlgorithms_Registry::getInstance()->get
53
-            (
50
+        if (is_null($algorithm))
51
+            $algorithm = ContentEncryptionAlgorithms_Registry::getInstance()->get(
54 52
                 $spec->getAlg()
55 53
             );
56 54
 
57
-        if(is_null($algorithm))
58
-            $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get
59
-            (
55
+        if (is_null($algorithm))
56
+            $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get(
60 57
                 $spec->getAlg()
61 58
             );
62 59
 
63
-        if(is_null($algorithm))
64
-            throw new InvalidJWKAlgorithm
65
-            (
60
+        if (is_null($algorithm))
61
+            throw new InvalidJWKAlgorithm(
66 62
                 sprintf(
67 63
                     'alg %s not supported!',
68 64
                     $spec->getAlg()
@@ -70,31 +66,27 @@  discard block
 block discarded – undo
70 66
             );
71 67
 
72 68
 
73
-        if($algorithm->getKeyType() !== JSONWebKeyTypes::OctetSequence)
74
-            throw new InvalidJWKAlgorithm
75
-            (
76
-                sprintf
77
-                (
69
+        if ($algorithm->getKeyType() !== JSONWebKeyTypes::OctetSequence)
70
+            throw new InvalidJWKAlgorithm(
71
+                sprintf(
78 72
                     'key type %s not supported!',
79 73
                     $algorithm->getKeyType()
80 74
                 )
81 75
             );
82 76
 
83
-        if(!($spec instanceof OctetSequenceJWKSpecification)) throw new JWKInvalidSpecException;
77
+        if (!($spec instanceof OctetSequenceJWKSpecification)) throw new JWKInvalidSpecException;
84 78
 
85 79
         $shared_secret = $spec->getSharedSecret();
86 80
         $secret_len    = strlen($shared_secret);
87 81
 
88
-        if($secret_len === 0 )
82
+        if ($secret_len === 0)
89 83
         {
90 84
             $generator = Utils_Registry::getInstance()->get(Utils_Registry::RandomNumberGeneratorService);
91 85
             $shared_secret = $generator->invoke($algorithm->getMinKeyLen() / 8);
92 86
         }
93 87
 
94
-        return OctetSequenceJWK::fromSecret
95
-        (
96
-            new SymmetricSharedKey
97
-            (
88
+        return OctetSequenceJWK::fromSecret(
89
+            new SymmetricSharedKey(
98 90
                 $shared_secret
99 91
             ),
100 92
             $spec->getAlg(),
Please login to merge, or discard this patch.
Braces   +18 added lines, -10 removed lines patch added patch discarded remove patch
@@ -41,37 +41,42 @@  discard block
 block discarded – undo
41 41
     static public function build(IJWKSpecification $spec)
42 42
     {
43 43
 
44
-        if(is_null($spec)) throw new \InvalidArgumentException('missing spec param');
44
+        if(is_null($spec)) {
45
+         throw new \InvalidArgumentException('missing spec param');
46
+        }
45 47
 
46 48
         $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get
47 49
         (
48 50
             $spec->getAlg()
49 51
         );
50 52
 
51
-        if(is_null($algorithm))
52
-            $algorithm = ContentEncryptionAlgorithms_Registry::getInstance()->get
53
+        if(is_null($algorithm)) {
54
+                    $algorithm = ContentEncryptionAlgorithms_Registry::getInstance()->get
53 55
             (
54 56
                 $spec->getAlg()
55 57
             );
58
+        }
56 59
 
57
-        if(is_null($algorithm))
58
-            $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get
60
+        if(is_null($algorithm)) {
61
+                    $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get
59 62
             (
60 63
                 $spec->getAlg()
61 64
             );
65
+        }
62 66
 
63
-        if(is_null($algorithm))
64
-            throw new InvalidJWKAlgorithm
67
+        if(is_null($algorithm)) {
68
+                    throw new InvalidJWKAlgorithm
65 69
             (
66 70
                 sprintf(
67 71
                     'alg %s not supported!',
68 72
                     $spec->getAlg()
69 73
                 )
70 74
             );
75
+        }
71 76
 
72 77
 
73
-        if($algorithm->getKeyType() !== JSONWebKeyTypes::OctetSequence)
74
-            throw new InvalidJWKAlgorithm
78
+        if($algorithm->getKeyType() !== JSONWebKeyTypes::OctetSequence) {
79
+                    throw new InvalidJWKAlgorithm
75 80
             (
76 81
                 sprintf
77 82
                 (
@@ -79,8 +84,11 @@  discard block
 block discarded – undo
79 84
                     $algorithm->getKeyType()
80 85
                 )
81 86
             );
87
+        }
82 88
 
83
-        if(!($spec instanceof OctetSequenceJWKSpecification)) throw new JWKInvalidSpecException;
89
+        if(!($spec instanceof OctetSequenceJWKSpecification)) {
90
+         throw new JWKInvalidSpecException;
91
+        }
84 92
 
85 93
         $shared_secret = $spec->getSharedSecret();
86 94
         $secret_len    = strlen($shared_secret);
Please login to merge, or discard this patch.
src/jwk/impl/JWKSet.php 2 patches
Spacing   +16 added lines, -16 removed lines patch added patch discarded remove patch
@@ -42,11 +42,11 @@  discard block
 block discarded – undo
42 42
      * @param JWK[] $keys
43 43
      * @throws JWKInvalidIdentifierException
44 44
      */
45
-    public function __construct(array $keys = array()){
45
+    public function __construct(array $keys = array()) {
46 46
 
47 47
         $this->set[JWKSetParameters::Keys] = new JsonArray(array());
48 48
 
49
-        foreach($keys as $k){
49
+        foreach ($keys as $k) {
50 50
             $this->addKey($k);
51 51
         }
52 52
     }
@@ -56,7 +56,7 @@  discard block
 block discarded – undo
56 56
      */
57 57
     public function getKeys()
58 58
     {
59
-        if(isset($this->set[JWKSetParameters::Keys]))
59
+        if (isset($this->set[JWKSetParameters::Keys]))
60 60
             return $this->set[JWKSetParameters::Keys]->getValue();
61 61
         return array();
62 62
     }
@@ -70,18 +70,18 @@  discard block
 block discarded – undo
70 70
     {
71 71
         $id = $key->getId();
72 72
 
73
-        if(empty($id))
73
+        if (empty($id))
74 74
             throw new JWKInvalidIdentifierException('key id is empty!');
75 75
 
76
-        if(array_key_exists($id->getValue(), $this->keys_ids))
76
+        if (array_key_exists($id->getValue(), $this->keys_ids))
77 77
             throw new JWKInvalidIdentifierException(sprintf('id %s already exists!'), $key->getId()->getValue());
78 78
 
79
-        if(!isset($this->set[JWKSetParameters::Keys]))
79
+        if (!isset($this->set[JWKSetParameters::Keys]))
80 80
             $this->set[JWKSetParameters::Keys] = new JsonArray(array());
81 81
 
82 82
         $keys = $this->set[JWKSetParameters::Keys];
83 83
         $keys->append($key);
84
-        $this->set[JWKSetParameters::Keys] = $keys ;
84
+        $this->set[JWKSetParameters::Keys] = $keys;
85 85
         $this->keys_ids[$id->getValue()] = $key;
86 86
     }
87 87
 
@@ -91,7 +91,7 @@  discard block
 block discarded – undo
91 91
      */
92 92
     public function getKeyById($kid)
93 93
     {
94
-        if(!array_key_exists($kid, $this->keys_ids)) return null;
94
+        if (!array_key_exists($kid, $this->keys_ids)) return null;
95 95
         return $this->keys_ids[$kid];
96 96
     }
97 97
 
@@ -101,27 +101,27 @@  discard block
 block discarded – undo
101 101
      * @throws InvalidJWKAlgorithm
102 102
      * @throws JWKInvalidIdentifierException
103 103
      */
104
-    static public function fromJson($json){
105
-        $json = str_replace( array("\n","\r","\t"), '', trim($json));
104
+    static public function fromJson($json) {
105
+        $json = str_replace(array("\n", "\r", "\t"), '', trim($json));
106 106
         $res  = json_decode($json, true);
107
-        if(!isset($res[JWKSetParameters::Keys])) throw new JWKInvalidIdentifierException;
107
+        if (!isset($res[JWKSetParameters::Keys])) throw new JWKInvalidIdentifierException;
108 108
         $keys = $res[JWKSetParameters::Keys];
109 109
         $jwk_set = new JWKSet;
110
-        foreach($keys as $key){
110
+        foreach ($keys as $key) {
111 111
             $kty = @$key[JSONWebKeyParameters::KeyType];
112 112
             $kid = @$key[JSONWebKeyParameters::KeyId];
113 113
             $use = @$key[JSONWebKeyParameters::PublicKeyUse];
114 114
             $alg = @$key[JSONWebKeyParameters::Algorithm];
115
-            if(empty($alg)) $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256;
115
+            if (empty($alg)) $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256;
116 116
 
117
-            if(empty($kty) || empty($kid) || empty($use)) continue;
117
+            if (empty($kty) || empty($kid) || empty($use)) continue;
118 118
 
119
-            if(!in_array($kty, JSONWebKeyTypes::$supported_keys)) continue;
119
+            if (!in_array($kty, JSONWebKeyTypes::$supported_keys)) continue;
120 120
 
121 121
             $n        = @$key[RSAKeysParameters::Modulus];
122 122
             $e        = @$key[RSAKeysParameters::Exponent];
123 123
             $x5c      = @$key[PublicJSONWebKeyParameters::X_509CertificateChain];
124
-            if(is_null($x5c)) $x5c = array();
124
+            if (is_null($x5c)) $x5c = array();
125 125
             $x5u      = @$key[PublicJSONWebKeyParameters::X_509Url];
126 126
             $x5t      = @$key[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint];
127 127
             $x5t_S256 = @$key[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint];
Please login to merge, or discard this patch.
Braces   +30 added lines, -14 removed lines patch added patch discarded remove patch
@@ -56,8 +56,9 @@  discard block
 block discarded – undo
56 56
      */
57 57
     public function getKeys()
58 58
     {
59
-        if(isset($this->set[JWKSetParameters::Keys]))
60
-            return $this->set[JWKSetParameters::Keys]->getValue();
59
+        if(isset($this->set[JWKSetParameters::Keys])) {
60
+                    return $this->set[JWKSetParameters::Keys]->getValue();
61
+        }
61 62
         return array();
62 63
     }
63 64
 
@@ -70,14 +71,17 @@  discard block
 block discarded – undo
70 71
     {
71 72
         $id = $key->getId();
72 73
 
73
-        if(empty($id))
74
-            throw new JWKInvalidIdentifierException('key id is empty!');
74
+        if(empty($id)) {
75
+                    throw new JWKInvalidIdentifierException('key id is empty!');
76
+        }
75 77
 
76
-        if(array_key_exists($id->getValue(), $this->keys_ids))
77
-            throw new JWKInvalidIdentifierException(sprintf('id %s already exists!'), $key->getId()->getValue());
78
+        if(array_key_exists($id->getValue(), $this->keys_ids)) {
79
+                    throw new JWKInvalidIdentifierException(sprintf('id %s already exists!'), $key->getId()->getValue());
80
+        }
78 81
 
79
-        if(!isset($this->set[JWKSetParameters::Keys]))
80
-            $this->set[JWKSetParameters::Keys] = new JsonArray(array());
82
+        if(!isset($this->set[JWKSetParameters::Keys])) {
83
+                    $this->set[JWKSetParameters::Keys] = new JsonArray(array());
84
+        }
81 85
 
82 86
         $keys = $this->set[JWKSetParameters::Keys];
83 87
         $keys->append($key);
@@ -91,7 +95,9 @@  discard block
 block discarded – undo
91 95
      */
92 96
     public function getKeyById($kid)
93 97
     {
94
-        if(!array_key_exists($kid, $this->keys_ids)) return null;
98
+        if(!array_key_exists($kid, $this->keys_ids)) {
99
+         return null;
100
+        }
95 101
         return $this->keys_ids[$kid];
96 102
     }
97 103
 
@@ -104,7 +110,9 @@  discard block
 block discarded – undo
104 110
     static public function fromJson($json){
105 111
         $json = str_replace( array("\n","\r","\t"), '', trim($json));
106 112
         $res  = json_decode($json, true);
107
-        if(!isset($res[JWKSetParameters::Keys])) throw new JWKInvalidIdentifierException;
113
+        if(!isset($res[JWKSetParameters::Keys])) {
114
+         throw new JWKInvalidIdentifierException;
115
+        }
108 116
         $keys = $res[JWKSetParameters::Keys];
109 117
         $jwk_set = new JWKSet;
110 118
         foreach($keys as $key){
@@ -112,16 +120,24 @@  discard block
 block discarded – undo
112 120
             $kid = @$key[JSONWebKeyParameters::KeyId];
113 121
             $use = @$key[JSONWebKeyParameters::PublicKeyUse];
114 122
             $alg = @$key[JSONWebKeyParameters::Algorithm];
115
-            if(empty($alg)) $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256;
123
+            if(empty($alg)) {
124
+             $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256;
125
+            }
116 126
 
117
-            if(empty($kty) || empty($kid) || empty($use)) continue;
127
+            if(empty($kty) || empty($kid) || empty($use)) {
128
+             continue;
129
+            }
118 130
 
119
-            if(!in_array($kty, JSONWebKeyTypes::$supported_keys)) continue;
131
+            if(!in_array($kty, JSONWebKeyTypes::$supported_keys)) {
132
+             continue;
133
+            }
120 134
 
121 135
             $n        = @$key[RSAKeysParameters::Modulus];
122 136
             $e        = @$key[RSAKeysParameters::Exponent];
123 137
             $x5c      = @$key[PublicJSONWebKeyParameters::X_509CertificateChain];
124
-            if(is_null($x5c)) $x5c = array();
138
+            if(is_null($x5c)) {
139
+             $x5c = array();
140
+            }
125 141
             $x5u      = @$key[PublicJSONWebKeyParameters::X_509Url];
126 142
             $x5t      = @$key[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint];
127 143
             $x5t_S256 = @$key[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint];
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWKFactory.php 2 patches
Spacing   +11 added lines, -16 removed lines patch added patch discarded remove patch
@@ -41,30 +41,26 @@  discard block
 block discarded – undo
41 41
     static public function build(IJWKSpecification $spec)
42 42
     {
43 43
 
44
-        if(is_null($spec)) throw new \InvalidArgumentException('missing spec param');
44
+        if (is_null($spec)) throw new \InvalidArgumentException('missing spec param');
45 45
 
46 46
         $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get($spec->getAlg());
47 47
 
48
-        if(is_null($algorithm))
48
+        if (is_null($algorithm))
49 49
         {
50 50
             $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get($spec->getAlg());
51 51
         }
52 52
 
53
-        if(is_null($algorithm))
54
-            throw new InvalidJWKAlgorithm
55
-            (
56
-                sprintf
57
-                (
53
+        if (is_null($algorithm))
54
+            throw new InvalidJWKAlgorithm(
55
+                sprintf(
58 56
                     'alg %s not supported!',
59 57
                     $spec->getAlg()
60 58
                 )
61 59
             );
62 60
 
63
-        if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA)
64
-            throw new InvalidJWKAlgorithm
65
-            (
66
-                sprintf
67
-                (
61
+        if ($algorithm->getKeyType() !== JSONWebKeyTypes::RSA)
62
+            throw new InvalidJWKAlgorithm(
63
+                sprintf(
68 64
                     'key type %s not supported!',
69 65
                     $algorithm->getKeyType()
70 66
                 )
@@ -79,11 +75,10 @@  discard block
 block discarded – undo
79 75
             $jwk->setKeyUse($spec->getUse());
80 76
             return $jwk;
81 77
         }
82
-        if($spec instanceof RSAJWKParamsPublicKeySpecification)
78
+        if ($spec instanceof RSAJWKParamsPublicKeySpecification)
83 79
         {
84 80
 
85
-            $public_key = RSAFacade::getInstance()->buildPublicKey
86
-            (
81
+            $public_key = RSAFacade::getInstance()->buildPublicKey(
87 82
                 $spec->getModulus()->toBigInt(),
88 83
                 $spec->getExponent()->toBigInt()
89 84
             );
@@ -96,7 +91,7 @@  discard block
 block discarded – undo
96 91
 
97 92
             return $jwk;
98 93
         }
99
-        if($spec instanceof RSAJWKPEMPublicKeySpecification)
94
+        if ($spec instanceof RSAJWKPEMPublicKeySpecification)
100 95
         {
101 96
             $public_key = RSAFacade::getInstance()->buildPublicKeyFromPEM($spec->getPEM());
102 97
             $jwk = RSAJWK::fromPublicKey($public_key);
Please login to merge, or discard this patch.
Braces   +9 added lines, -5 removed lines patch added patch discarded remove patch
@@ -41,7 +41,9 @@  discard block
 block discarded – undo
41 41
     static public function build(IJWKSpecification $spec)
42 42
     {
43 43
 
44
-        if(is_null($spec)) throw new \InvalidArgumentException('missing spec param');
44
+        if(is_null($spec)) {
45
+         throw new \InvalidArgumentException('missing spec param');
46
+        }
45 47
 
46 48
         $algorithm = DigitalSignatures_MACs_Registry::getInstance()->get($spec->getAlg());
47 49
 
@@ -50,8 +52,8 @@  discard block
 block discarded – undo
50 52
             $algorithm = KeyManagementAlgorithms_Registry::getInstance()->get($spec->getAlg());
51 53
         }
52 54
 
53
-        if(is_null($algorithm))
54
-            throw new InvalidJWKAlgorithm
55
+        if(is_null($algorithm)) {
56
+                    throw new InvalidJWKAlgorithm
55 57
             (
56 58
                 sprintf
57 59
                 (
@@ -59,9 +61,10 @@  discard block
 block discarded – undo
59 61
                     $spec->getAlg()
60 62
                 )
61 63
             );
64
+        }
62 65
 
63
-        if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA)
64
-            throw new InvalidJWKAlgorithm
66
+        if($algorithm->getKeyType() !== JSONWebKeyTypes::RSA) {
67
+                    throw new InvalidJWKAlgorithm
65 68
             (
66 69
                 sprintf
67 70
                 (
@@ -69,6 +72,7 @@  discard block
 block discarded – undo
69 72
                     $algorithm->getKeyType()
70 73
                 )
71 74
             );
75
+        }
72 76
 
73 77
         if ($spec instanceof RSAJWKPEMPrivateKeySpecification)
74 78
         {
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWKParamsPublicKeySpecification.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -92,42 +92,42 @@
 block discarded – undo
92 92
     /**
93 93
      * @return Base64urlUInt
94 94
      */
95
-    public function getModulus(){
95
+    public function getModulus() {
96 96
         return new Base64urlUInt($this->n_b64);
97 97
     }
98 98
 
99 99
     /**
100 100
      * @return Base64urlUInt
101 101
      */
102
-    public function getExponent(){
102
+    public function getExponent() {
103 103
         return new Base64urlUInt($this->e_b64);
104 104
     }
105 105
 
106 106
     /**
107 107
      * @return array
108 108
      */
109
-    public function getX509CertificateChain(){
109
+    public function getX509CertificateChain() {
110 110
         return $this->x5c;
111 111
     }
112 112
 
113 113
     /**
114 114
      * @return null|string
115 115
      */
116
-    public function getX509Url(){
116
+    public function getX509Url() {
117 117
         return $this->x5u;
118 118
     }
119 119
 
120 120
     /**
121 121
      * @return null|string
122 122
      */
123
-    public function getX509CertificateSHA_1_Thumbprint(){
123
+    public function getX509CertificateSHA_1_Thumbprint() {
124 124
         return $this->x5t;
125 125
     }
126 126
 
127 127
     /**
128 128
      * @return null|string
129 129
      */
130
-    public function getX509CertificateSHA_256_Thumbprint(){
130
+    public function getX509CertificateSHA_256_Thumbprint() {
131 131
         return $this->x5t_S256;
132 132
     }
133 133
 }
134 134
\ No newline at end of file
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWKPEMKeySpecification.php 1 patch
Spacing   +1 added lines, -2 removed lines patch added patch discarded remove patch
@@ -34,8 +34,7 @@
 block discarded – undo
34 34
      * @param string $alg
35 35
      * @param string $use
36 36
      */
37
-    public function __construct
38
-    (
37
+    public function __construct(
39 38
         $key_pem,
40 39
         $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256,
41 40
         $use = JSONWebKeyPublicKeyUseValues::Signature
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWKSpecification.php 2 patches
Spacing   +2 added lines, -3 removed lines patch added patch discarded remove patch
@@ -32,14 +32,13 @@
 block discarded – undo
32 32
      * @param string $kid
33 33
      * @throws InvalidJWKAlgorithm
34 34
      */
35
-    public function __construct
36
-    (
35
+    public function __construct(
37 36
         $alg = JSONWebSignatureAndEncryptionAlgorithms::RS256,
38 37
         $use = JSONWebKeyPublicKeyUseValues::Signature,
39 38
         $kid = null
40 39
     )
41 40
     {
42
-        if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values))
41
+        if (!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values))
43 42
             throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
44 43
 
45 44
         parent::__construct($alg, $use, $kid);
Please login to merge, or discard this patch.
Braces   +3 added lines, -2 removed lines patch added patch discarded remove patch
@@ -39,8 +39,9 @@
 block discarded – undo
39 39
         $kid = null
40 40
     )
41 41
     {
42
-        if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values))
43
-            throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
42
+        if(!empty($alg) && !in_array($alg, RSAKeysParameters::$valid_algorithms_values)) {
43
+                    throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
44
+        }
44 45
 
45 46
         parent::__construct($alg, $use, $kid);
46 47
     }
Please login to merge, or discard this patch.
src/jwk/impl/OctetSequenceJWKSpecification.php 2 patches
Spacing   +2 added lines, -3 removed lines patch added patch discarded remove patch
@@ -38,14 +38,13 @@
 block discarded – undo
38 38
      * @param string $use
39 39
      * @throws InvalidJWKAlgorithm
40 40
      */
41
-    public function __construct
42
-    (
41
+    public function __construct(
43 42
         $shared_secret = self::GenerateSecret,
44 43
         $alg = JSONWebSignatureAndEncryptionAlgorithms::HS256,
45 44
         $use = JSONWebKeyPublicKeyUseValues::Signature
46 45
     )
47 46
     {
48
-        if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values))
47
+        if (!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values))
49 48
             throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
50 49
 
51 50
         parent::__construct($alg, $use);
Please login to merge, or discard this patch.
Braces   +3 added lines, -2 removed lines patch added patch discarded remove patch
@@ -45,8 +45,9 @@
 block discarded – undo
45 45
         $use = JSONWebKeyPublicKeyUseValues::Signature
46 46
     )
47 47
     {
48
-        if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values))
49
-            throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
48
+        if(!in_array($alg, OctetSequenceKeysParameters::$valid_algorithms_values)) {
49
+                    throw new InvalidJWKAlgorithm(sprintf('alg %s', $alg));
50
+        }
50 51
 
51 52
         parent::__construct($alg, $use);
52 53
 
Please login to merge, or discard this patch.
src/jwk/impl/RSAJWK.php 2 patches
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -112,10 +112,10 @@  discard block
 block discarded – undo
112 112
      */
113 113
     static public function fromKeys(KeyPair $keys)
114 114
     {
115
-        if(!($keys->getPrivate() instanceof RSAPrivateKey))
115
+        if (!($keys->getPrivate() instanceof RSAPrivateKey))
116 116
             throw new \RuntimeException('Private key of invalid type!');
117 117
 
118
-        if(!($keys->getPublic() instanceof RSAPublicKey))
118
+        if (!($keys->getPublic() instanceof RSAPublicKey))
119 119
             throw new \RuntimeException('Public key of invalid type!');
120 120
 
121 121
         $jwk                                          = new RSAJWK();
@@ -165,7 +165,7 @@  discard block
 block discarded – undo
165 165
      */
166 166
     public function getKey($key_op = JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC)
167 167
     {
168
-        switch($key_op){
168
+        switch ($key_op) {
169 169
             case JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC:
170 170
             case JSONWebKeyKeyOperationsValues::DecryptContentAndValidateDecryption: {
171 171
                 return $this->getPrivateKey();
@@ -177,7 +177,7 @@  discard block
 block discarded – undo
177 177
             }
178 178
             break;
179 179
             default:{
180
-                throw new InvalidJWKUseException(sprintf('key_op %s',  $key_op));
180
+                throw new InvalidJWKUseException(sprintf('key_op %s', $key_op));
181 181
             }
182 182
             break;
183 183
         }
@@ -190,7 +190,7 @@  discard block
 block discarded – undo
190 190
     public function toArray()
191 191
     {
192 192
         $res = parent::toArray();
193
-        if($this->visibility === JSONWebKeyVisibility::PublicOnly){
193
+        if ($this->visibility === JSONWebKeyVisibility::PublicOnly) {
194 194
             //remove private attributes
195 195
             unset($res[RSAKeysParameters::PrivateExponent]);
196 196
             unset($res[RSAKeysParameters::FirstPrimeFactor]);
Please login to merge, or discard this patch.
Braces   +21 added lines, -11 removed lines patch added patch discarded remove patch
@@ -53,11 +53,14 @@  discard block
 block discarded – undo
53 53
 
54 54
         parent::__construct($headers);
55 55
 
56
-        if (count($headers) === 0) return;
56
+        if (count($headers) === 0) {
57
+         return;
58
+        }
57 59
 
58 60
         foreach (RSAKeysParameters::$public_key_params as $p) {
59
-            if (!array_key_exists($p, $headers))
60
-                throw new RSAJWKMissingPublicKeyParamException();
61
+            if (!array_key_exists($p, $headers)) {
62
+                            throw new RSAJWKMissingPublicKeyParamException();
63
+            }
61 64
             $this->set[$p] = new Base64urlUInt($headers[$p]);
62 65
         }
63 66
 
@@ -74,8 +77,9 @@  discard block
 block discarded – undo
74 77
             //its has one private param, must have all ...
75 78
             if (in_array(RSAKeysParameters::FirstPrimeFactor, $headers)) {
76 79
                 foreach (RSAKeysParameters::$producers_private_key_params as $p) {
77
-                    if (!array_key_exists($p, $headers))
78
-                        throw new RSAJWKMissingPrivateKeyParamException();
80
+                    if (!array_key_exists($p, $headers)) {
81
+                                            throw new RSAJWKMissingPrivateKeyParamException();
82
+                    }
79 83
                     $this->set[$p] = new Base64urlUInt($headers[$p]);
80 84
                 }
81 85
                 $this->private_key = RSAFacade::getInstance()->buildPrivateKey(
@@ -112,11 +116,13 @@  discard block
 block discarded – undo
112 116
      */
113 117
     static public function fromKeys(KeyPair $keys)
114 118
     {
115
-        if(!($keys->getPrivate() instanceof RSAPrivateKey))
116
-            throw new \RuntimeException('Private key of invalid type!');
119
+        if(!($keys->getPrivate() instanceof RSAPrivateKey)) {
120
+                    throw new \RuntimeException('Private key of invalid type!');
121
+        }
117 122
 
118
-        if(!($keys->getPublic() instanceof RSAPublicKey))
119
-            throw new \RuntimeException('Public key of invalid type!');
123
+        if(!($keys->getPublic() instanceof RSAPublicKey)) {
124
+                    throw new \RuntimeException('Public key of invalid type!');
125
+        }
120 126
 
121 127
         $jwk                                          = new RSAJWK();
122 128
         $jwk->public_key                              = $keys->getPublic();
@@ -134,7 +140,9 @@  discard block
 block discarded – undo
134 140
      */
135 141
     static public function fromPublicKey(PublicKey $public_key)
136 142
     {
137
-        if (!($public_key instanceof RSAPublicKey)) throw new InvalidJWKType();
143
+        if (!($public_key instanceof RSAPublicKey)) {
144
+         throw new InvalidJWKType();
145
+        }
138 146
         $jwk = new RSAJWK();
139 147
         $jwk->public_key = $public_key;
140 148
         $jwk->set[RSAKeysParameters::Exponent] = Base64urlUInt::fromBigInt($public_key->getPublicExponent());
@@ -149,7 +157,9 @@  discard block
 block discarded – undo
149 157
      */
150 158
     static public function fromPrivateKey(PrivateKey $private_key)
151 159
     {
152
-        if (!($private_key instanceof RSAPrivateKey)) throw new InvalidJWKType();
160
+        if (!($private_key instanceof RSAPrivateKey)) {
161
+         throw new InvalidJWKType();
162
+        }
153 163
         $jwk = new RSAJWK();
154 164
         $jwk->private_key = $private_key;
155 165
         $jwk->set[RSAKeysParameters::Exponent] = Base64urlUInt::fromBigInt($private_key->getPublicExponent());
Please login to merge, or discard this patch.
src/jwk/impl/AsymmetricJWK.php 3 patches
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -95,8 +95,8 @@
 block discarded – undo
95 95
     }
96 96
 
97 97
        /**
98
-     * @return int
99
-     */
98
+        * @return int
99
+        */
100 100
     public function getVisibility()
101 101
     {
102 102
         return $this->visibility;
Please login to merge, or discard this patch.
Spacing   +21 added lines, -21 removed lines patch added patch discarded remove patch
@@ -63,33 +63,33 @@  discard block
 block discarded – undo
63 63
     {
64 64
         parent::__construct($headers);
65 65
 
66
-        if(count($headers) === 0 ) return;
66
+        if (count($headers) === 0) return;
67 67
 
68 68
         // certificates
69
-        if(in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])){
69
+        if (in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])) {
70 70
 
71 71
             // json array
72
-            foreach($headers[PublicJSONWebKeyParameters::X_509CertificateChain] as $x509_pem){
72
+            foreach ($headers[PublicJSONWebKeyParameters::X_509CertificateChain] as $x509_pem) {
73 73
                 array_push($this->x509_certificates_chain, X509CertificateFactory::buildFromPEM($x509_pem));
74 74
 
75 75
             }
76 76
 
77
-            if($this->checkX509CertMismatch()){
77
+            if ($this->checkX509CertMismatch()) {
78 78
                 throw new X509CertMismatchException;
79 79
             }
80 80
 
81 81
             $this->set[PublicJSONWebKeyParameters::X_509CertificateChain] = new JsonArray($headers[PublicJSONWebKeyParameters::X_509CertificateChain]);
82 82
         }
83 83
 
84
-        if(in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint, $headers)){
85
-            $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]) ;
84
+        if (in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint, $headers)) {
85
+            $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]);
86 86
         }
87 87
 
88
-        if(in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint, $headers)){
88
+        if (in_array(PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint, $headers)) {
89 89
             $this->set[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]);
90 90
         }
91 91
 
92
-        if(in_array(PublicJSONWebKeyParameters::X_509Url, $headers)){
92
+        if (in_array(PublicJSONWebKeyParameters::X_509Url, $headers)) {
93 93
             $this->set[PublicJSONWebKeyParameters::X_509Url] = new StringOrURI($headers[PublicJSONWebKeyParameters::X_509Url]);
94 94
         }
95 95
     }
@@ -109,7 +109,7 @@  discard block
 block discarded – undo
109 109
      */
110 110
     public function setVisibility($visibility)
111 111
     {
112
-        if(!in_array($visibility, JSONWebKeyVisibility::$valid_values))
112
+        if (!in_array($visibility, JSONWebKeyVisibility::$valid_values))
113 113
             throw new InvalidJWKVisibilityException;
114 114
         $this->visibility = $visibility;
115 115
         return $this;
@@ -134,7 +134,7 @@  discard block
 block discarded – undo
134 134
     /**
135 135
      * @return null | X509Certificate
136 136
      */
137
-    public function getX509LeafCertificate(){
137
+    public function getX509LeafCertificate() {
138 138
         return count($this->x509_certificates_chain) > 0 ? $this->x509_certificates_chain[0] : null;
139 139
     }
140 140
 
@@ -153,10 +153,10 @@  discard block
 block discarded – undo
153 153
      */
154 154
     public function getX509CertificateSha1Thumbprint($fallback_on_x5c = false)
155 155
     {
156
-        $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint])? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]->getString();
157
-        if(empty($res) && $fallback_on_x5c){
156
+        $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]) ? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_1_Thumbprint]->getString();
157
+        if (empty($res) && $fallback_on_x5c) {
158 158
             $x509 = $this->getX509LeafCertificate();
159
-            if(!is_null($x509)){
159
+            if (!is_null($x509)) {
160 160
                 return $x509->getSHA_1_Thumbprint();
161 161
             }
162 162
         }
@@ -169,10 +169,10 @@  discard block
 block discarded – undo
169 169
      */
170 170
     public function getX509CertificateSha256Thumbprint($fallback_on_x5c = false)
171 171
     {
172
-        $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint])? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]->getString();
173
-        if(empty($res) && $fallback_on_x5c){
172
+        $res = is_null($this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]) ? null : $this[PublicJSONWebKeyParameters::X_509CertificateSHA_256_Thumbprint]->getString();
173
+        if (empty($res) && $fallback_on_x5c) {
174 174
             $x509 = $this->getX509LeafCertificate();
175
-            if(!is_null($x509)){
175
+            if (!is_null($x509)) {
176 176
                 return $x509->getSHA_256_Thumbprint();
177 177
             }
178 178
         }
@@ -184,13 +184,13 @@  discard block
 block discarded – undo
184 184
      */
185 185
     public function getX509Url()
186 186
     {
187
-        return is_null($this[PublicJSONWebKeyParameters::X_509Url])? null : $this[PublicJSONWebKeyParameters::X_509Url]->getString();
187
+        return is_null($this[PublicJSONWebKeyParameters::X_509Url]) ? null : $this[PublicJSONWebKeyParameters::X_509Url]->getString();
188 188
     }
189 189
 
190 190
     /**
191 191
      * @return bool
192 192
      */
193
-    protected function checkX509CertMismatch(){
193
+    protected function checkX509CertMismatch() {
194 194
         $x509 = $this->getX509LeafCertificate();
195 195
         return !is_null($x509) && $x509->getPublicKey() !== $this->public_key->getEncoded();
196 196
     }
@@ -200,13 +200,13 @@  discard block
 block discarded – undo
200 200
      * @return $this
201 201
      * @throws X509CertMismatchException
202 202
      */
203
-    public function setX509CertificateChain(array $x5c){
203
+    public function setX509CertificateChain(array $x5c) {
204 204
         // json array
205
-        foreach($x5c as $x509_pem){
205
+        foreach ($x5c as $x509_pem) {
206 206
             array_push($this->x509_certificates_chain, X509CertificateFactory::buildFromPEM($x509_pem));
207 207
         }
208 208
 
209
-        if($this->checkX509CertMismatch()){
209
+        if ($this->checkX509CertMismatch()) {
210 210
             throw new X509CertMismatchException;
211 211
         }
212 212
 
Please login to merge, or discard this patch.
Braces   +6 added lines, -3 removed lines patch added patch discarded remove patch
@@ -63,7 +63,9 @@  discard block
 block discarded – undo
63 63
     {
64 64
         parent::__construct($headers);
65 65
 
66
-        if(count($headers) === 0 ) return;
66
+        if(count($headers) === 0 ) {
67
+         return;
68
+        }
67 69
 
68 70
         // certificates
69 71
         if(in_array(PublicJSONWebKeyParameters::X_509CertificateChain, $headers) && is_array($headers[PublicJSONWebKeyParameters::X_509CertificateChain])){
@@ -109,8 +111,9 @@  discard block
 block discarded – undo
109 111
      */
110 112
     public function setVisibility($visibility)
111 113
     {
112
-        if(!in_array($visibility, JSONWebKeyVisibility::$valid_values))
113
-            throw new InvalidJWKVisibilityException;
114
+        if(!in_array($visibility, JSONWebKeyVisibility::$valid_values)) {
115
+                    throw new InvalidJWKVisibilityException;
116
+        }
114 117
         $this->visibility = $visibility;
115 118
         return $this;
116 119
     }
Please login to merge, or discard this patch.