@@ -50,6 +50,7 @@ |
||
| 50 | 50 | * @param PathValidationConfig $config Validation config |
| 51 | 51 | * @param Certificate ...$certificates Certificates from the trust anchor to |
| 52 | 52 | * the end-entity certificate |
| 53 | + * @param Certificate[] $certificates |
|
| 53 | 54 | */ |
| 54 | 55 | public function __construct(Crypto $crypto, PathValidationConfig $config, |
| 55 | 56 | Certificate ...$certificates) |
@@ -81,7 +81,7 @@ discard block |
||
| 81 | 81 | * Calculate policy intersection as specified in Wrap-Up Procedure 6.1.5.g. |
| 82 | 82 | * |
| 83 | 83 | * @param ValidatorState $state |
| 84 | - * @param array $policies |
|
| 84 | + * @param string[] $policies |
|
| 85 | 85 | * @return ValidatorState |
| 86 | 86 | */ |
| 87 | 87 | public function calculateIntersection(ValidatorState $state, array $policies) |
@@ -266,7 +266,7 @@ discard block |
||
| 266 | 266 | * @param Certificate $cert |
| 267 | 267 | * @param ValidatorState $state |
| 268 | 268 | * @param string $idp OID of the issuer domain policy |
| 269 | - * @param array $sdps Array of subject domain policy OIDs |
|
| 269 | + * @param string[] $sdps Array of subject domain policy OIDs |
|
| 270 | 270 | */ |
| 271 | 271 | protected function _applyAnyPolicyMapping(Certificate $cert, |
| 272 | 272 | ValidatorState $state, $idp, array $sdps) |
@@ -404,6 +404,7 @@ discard block |
||
| 404 | 404 | * Gather all children of given nodes to a flattened array. |
| 405 | 405 | * |
| 406 | 406 | * @param PolicyNode ...$nodes |
| 407 | + * @param PolicyNode[] $nodes |
|
| 407 | 408 | * @return PolicyNode[] |
| 408 | 409 | */ |
| 409 | 410 | private static function _gatherChildren(PolicyNode ...$nodes) |
@@ -92,7 +92,7 @@ discard block |
||
| 92 | 92 | // is not in the user-initial-policy-set and is not anyPolicy, |
| 93 | 93 | // delete this node and all its children. |
| 94 | 94 | $valid_policy_node_set = array_filter($valid_policy_node_set, |
| 95 | - function (PolicyNode $node) use ($policies) { |
|
| 95 | + function(PolicyNode $node) use ($policies) { |
|
| 96 | 96 | if ($node->isAnyPolicy()) { |
| 97 | 97 | return true; |
| 98 | 98 | } |
@@ -104,7 +104,7 @@ discard block |
||
| 104 | 104 | }); |
| 105 | 105 | // array of valid policy OIDs |
| 106 | 106 | $valid_policy_set = array_map( |
| 107 | - function (PolicyNode $node) { |
|
| 107 | + function(PolicyNode $node) { |
|
| 108 | 108 | return $node->validPolicy(); |
| 109 | 109 | }, $valid_policy_node_set); |
| 110 | 110 | // 3. If the valid_policy_tree includes a node of depth n with |
@@ -384,7 +384,7 @@ discard block |
||
| 384 | 384 | } |
| 385 | 385 | // for each node in a tree |
| 386 | 386 | $this->_root->walkNodes( |
| 387 | - function (PolicyNode $node) use (&$set) { |
|
| 387 | + function(PolicyNode $node) use (&$set) { |
|
| 388 | 388 | $parents = $node->parents(); |
| 389 | 389 | // node has parents |
| 390 | 390 | if (count($parents)) { |
@@ -46,7 +46,7 @@ discard block |
||
| 46 | 46 | "GeneralNames must have at least one GeneralName."); |
| 47 | 47 | } |
| 48 | 48 | $names = array_map( |
| 49 | - function (UnspecifiedType $el) { |
|
| 49 | + function(UnspecifiedType $el) { |
|
| 50 | 50 | return GeneralName::fromASN1($el->asTagged()); |
| 51 | 51 | }, $seq->elements()); |
| 52 | 52 | return new self(...$names); |
@@ -104,7 +104,7 @@ discard block |
||
| 104 | 104 | public function allOf($tag) |
| 105 | 105 | { |
| 106 | 106 | $names = array_filter($this->_names, |
| 107 | - function (GeneralName $name) use ($tag) { |
|
| 107 | + function(GeneralName $name) use ($tag) { |
|
| 108 | 108 | return $name->tag() == $tag; |
| 109 | 109 | }); |
| 110 | 110 | return array_values($names); |
@@ -168,7 +168,7 @@ discard block |
||
| 168 | 168 | "GeneralNames must have at least one GeneralName."); |
| 169 | 169 | } |
| 170 | 170 | $elements = array_map( |
| 171 | - function (GeneralName $name) { |
|
| 171 | + function(GeneralName $name) { |
|
| 172 | 172 | return $name->toASN1(); |
| 173 | 173 | }, $this->_names); |
| 174 | 174 | return new Sequence(...$elements); |
@@ -38,7 +38,7 @@ |
||
| 38 | 38 | protected static function _wordsToIPv6String(array $words) |
| 39 | 39 | { |
| 40 | 40 | $groups = array_map( |
| 41 | - function ($word) { |
|
| 41 | + function($word) { |
|
| 42 | 42 | return sprintf("%04x", $word); |
| 43 | 43 | }, $words); |
| 44 | 44 | return implode(":", $groups); |
@@ -37,7 +37,7 @@ discard block |
||
| 37 | 37 | public static function fromPEMs(PEM ...$pems) |
| 38 | 38 | { |
| 39 | 39 | $certs = array_map( |
| 40 | - function (PEM $pem) { |
|
| 40 | + function(PEM $pem) { |
|
| 41 | 41 | return Certificate::fromPEM($pem); |
| 42 | 42 | }, $pems); |
| 43 | 43 | return new self(...$certs); |
@@ -113,7 +113,7 @@ discard block |
||
| 113 | 113 | { |
| 114 | 114 | return implode("\n", |
| 115 | 115 | array_map( |
| 116 | - function (Certificate $cert) { |
|
| 116 | + function(Certificate $cert) { |
|
| 117 | 117 | return $cert->toPEM()->string(); |
| 118 | 118 | }, $this->_certs)); |
| 119 | 119 | } |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | public static function fromASN1(Sequence $seq) |
| 46 | 46 | { |
| 47 | 47 | $extensions = array_map( |
| 48 | - function (UnspecifiedType $el) { |
|
| 48 | + function(UnspecifiedType $el) { |
|
| 49 | 49 | return Extension::fromASN1($el->asSequence()); |
| 50 | 50 | }, $seq->elements()); |
| 51 | 51 | return new self(...$extensions); |
@@ -60,7 +60,7 @@ discard block |
||
| 60 | 60 | { |
| 61 | 61 | $elements = array_values( |
| 62 | 62 | array_map( |
| 63 | - function ($ext) { |
|
| 63 | + function($ext) { |
|
| 64 | 64 | return $ext->toASN1(); |
| 65 | 65 | }, $this->_extensions)); |
| 66 | 66 | return new Sequence(...$elements); |
@@ -51,7 +51,7 @@ |
||
| 51 | 51 | public static function fromPEMs(PEM ...$pems) |
| 52 | 52 | { |
| 53 | 53 | $certs = array_map( |
| 54 | - function ($pem) { |
|
| 54 | + function($pem) { |
|
| 55 | 55 | return Certificate::fromPEM($pem); |
| 56 | 56 | }, $pems); |
| 57 | 57 | return new self(...$certs); |
@@ -39,7 +39,7 @@ discard block |
||
| 39 | 39 | public static function fromASN1(Sequence $seq) |
| 40 | 40 | { |
| 41 | 41 | $subtrees = array_map( |
| 42 | - function (UnspecifiedType $el) { |
|
| 42 | + function(UnspecifiedType $el) { |
|
| 43 | 43 | return GeneralSubtree::fromASN1($el->asSequence()); |
| 44 | 44 | }, $seq->elements()); |
| 45 | 45 | if (!count($subtrees)) { |
@@ -70,7 +70,7 @@ discard block |
||
| 70 | 70 | throw new \LogicException("No subtrees."); |
| 71 | 71 | } |
| 72 | 72 | $elements = array_map( |
| 73 | - function (GeneralSubtree $gs) { |
|
| 73 | + function(GeneralSubtree $gs) { |
|
| 74 | 74 | return $gs->toASN1(); |
| 75 | 75 | }, $this->_subtrees); |
| 76 | 76 | return new Sequence(...$elements); |
@@ -38,7 +38,7 @@ discard block |
||
| 38 | 38 | protected static function _fromDER($data, $critical) |
| 39 | 39 | { |
| 40 | 40 | $attribs = array_map( |
| 41 | - function (UnspecifiedType $el) { |
|
| 41 | + function(UnspecifiedType $el) { |
|
| 42 | 42 | return Attribute::fromASN1($el->asSequence()); |
| 43 | 43 | }, Sequence::fromDER($data)->elements()); |
| 44 | 44 | if (!count($attribs)) { |
@@ -59,7 +59,7 @@ discard block |
||
| 59 | 59 | throw new \LogicException("No attributes"); |
| 60 | 60 | } |
| 61 | 61 | $elements = array_map( |
| 62 | - function (Attribute $attr) { |
|
| 62 | + function(Attribute $attr) { |
|
| 63 | 63 | return $attr->toASN1(); |
| 64 | 64 | }, array_values($this->_attributes)); |
| 65 | 65 | return new Sequence(...$elements); |