GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Push — master ( 584877...f7ba31 )
by Joni
05:42
created
lib/X509/CertificationPath/PathValidation/PathValidator.php 1 patch
Indentation   +554 added lines, -554 removed lines patch added patch discarded remove patch
@@ -17,585 +17,585 @@
 block discarded – undo
17 17
  */
18 18
 class PathValidator
19 19
 {
20
-    /**
21
-     * Crypto engine.
22
-     *
23
-     * @var Crypto $_crypto
24
-     */
25
-    protected $_crypto;
20
+	/**
21
+	 * Crypto engine.
22
+	 *
23
+	 * @var Crypto $_crypto
24
+	 */
25
+	protected $_crypto;
26 26
     
27
-    /**
28
-     * Path validation configuration.
29
-     *
30
-     * @var PathValidationConfig $_config
31
-     */
32
-    protected $_config;
27
+	/**
28
+	 * Path validation configuration.
29
+	 *
30
+	 * @var PathValidationConfig $_config
31
+	 */
32
+	protected $_config;
33 33
     
34
-    /**
35
-     * Certification path.
36
-     *
37
-     * @var Certificate[] $_certificates
38
-     */
39
-    protected $_certificates;
34
+	/**
35
+	 * Certification path.
36
+	 *
37
+	 * @var Certificate[] $_certificates
38
+	 */
39
+	protected $_certificates;
40 40
     
41
-    /**
42
-     * Certification path trust anchor.
43
-     *
44
-     * @var Certificate $_trustAnchor
45
-     */
46
-    protected $_trustAnchor;
41
+	/**
42
+	 * Certification path trust anchor.
43
+	 *
44
+	 * @var Certificate $_trustAnchor
45
+	 */
46
+	protected $_trustAnchor;
47 47
     
48
-    /**
49
-     * Constructor.
50
-     *
51
-     * @param Crypto $crypto Crypto engine
52
-     * @param PathValidationConfig $config Validation config
53
-     * @param Certificate ...$certificates Certificates from the trust anchor to
54
-     *        the end-entity certificate
55
-     */
56
-    public function __construct(Crypto $crypto, PathValidationConfig $config,
57
-        Certificate ...$certificates)
58
-    {
59
-        if (!count($certificates)) {
60
-            throw new \LogicException("No certificates.");
61
-        }
62
-        $this->_crypto = $crypto;
63
-        $this->_config = $config;
64
-        $this->_certificates = $certificates;
65
-        // if trust anchor is explicitly given in configuration
66
-        if ($config->hasTrustAnchor()) {
67
-            $this->_trustAnchor = $config->trustAnchor();
68
-        } else {
69
-            $this->_trustAnchor = $certificates[0];
70
-        }
71
-    }
48
+	/**
49
+	 * Constructor.
50
+	 *
51
+	 * @param Crypto $crypto Crypto engine
52
+	 * @param PathValidationConfig $config Validation config
53
+	 * @param Certificate ...$certificates Certificates from the trust anchor to
54
+	 *        the end-entity certificate
55
+	 */
56
+	public function __construct(Crypto $crypto, PathValidationConfig $config,
57
+		Certificate ...$certificates)
58
+	{
59
+		if (!count($certificates)) {
60
+			throw new \LogicException("No certificates.");
61
+		}
62
+		$this->_crypto = $crypto;
63
+		$this->_config = $config;
64
+		$this->_certificates = $certificates;
65
+		// if trust anchor is explicitly given in configuration
66
+		if ($config->hasTrustAnchor()) {
67
+			$this->_trustAnchor = $config->trustAnchor();
68
+		} else {
69
+			$this->_trustAnchor = $certificates[0];
70
+		}
71
+	}
72 72
     
73
-    /**
74
-     * Validate certification path.
75
-     *
76
-     * @throws PathValidationException
77
-     * @return PathValidationResult
78
-     */
79
-    public function validate(): PathValidationResult
80
-    {
81
-        $n = count($this->_certificates);
82
-        $state = ValidatorState::initialize($this->_config, $this->_trustAnchor,
83
-            $n);
84
-        for ($i = 0; $i < $n; ++$i) {
85
-            $state = $state->withIndex($i + 1);
86
-            $cert = $this->_certificates[$i];
87
-            // process certificate (section 6.1.3.)
88
-            $state = $this->_processCertificate($state, $cert);
89
-            if (!$state->isFinal()) {
90
-                // prepare next certificate (section 6.1.4.)
91
-                $state = $this->_prepareNext($state, $cert);
92
-            }
93
-        }
94
-        if (!isset($cert)) {
95
-            throw new \LogicException("No certificates.");
96
-        }
97
-        // wrap-up (section 6.1.5.)
98
-        $state = $this->_wrapUp($state, $cert);
99
-        // return outputs
100
-        return $state->getResult($this->_certificates);
101
-    }
73
+	/**
74
+	 * Validate certification path.
75
+	 *
76
+	 * @throws PathValidationException
77
+	 * @return PathValidationResult
78
+	 */
79
+	public function validate(): PathValidationResult
80
+	{
81
+		$n = count($this->_certificates);
82
+		$state = ValidatorState::initialize($this->_config, $this->_trustAnchor,
83
+			$n);
84
+		for ($i = 0; $i < $n; ++$i) {
85
+			$state = $state->withIndex($i + 1);
86
+			$cert = $this->_certificates[$i];
87
+			// process certificate (section 6.1.3.)
88
+			$state = $this->_processCertificate($state, $cert);
89
+			if (!$state->isFinal()) {
90
+				// prepare next certificate (section 6.1.4.)
91
+				$state = $this->_prepareNext($state, $cert);
92
+			}
93
+		}
94
+		if (!isset($cert)) {
95
+			throw new \LogicException("No certificates.");
96
+		}
97
+		// wrap-up (section 6.1.5.)
98
+		$state = $this->_wrapUp($state, $cert);
99
+		// return outputs
100
+		return $state->getResult($this->_certificates);
101
+	}
102 102
     
103
-    /**
104
-     * Apply basic certificate processing according to RFC 5280 section 6.1.3.
105
-     *
106
-     * @link https://tools.ietf.org/html/rfc5280#section-6.1.3
107
-     * @param ValidatorState $state
108
-     * @param Certificate $cert
109
-     * @throws PathValidationException
110
-     * @return ValidatorState
111
-     */
112
-    private function _processCertificate(ValidatorState $state, Certificate $cert): ValidatorState
113
-    {
114
-        // (a.1) verify signature
115
-        $this->_verifySignature($state, $cert);
116
-        // (a.2) check validity period
117
-        $this->_checkValidity($cert);
118
-        // (a.3) check that certificate is not revoked
119
-        $this->_checkRevocation($cert);
120
-        // (a.4) check issuer
121
-        $this->_checkIssuer($state, $cert);
122
-        // (b)(c) if certificate is self-issued and it is not
123
-        // the final certificate in the path, skip this step
124
-        if (!($cert->isSelfIssued() && !$state->isFinal())) {
125
-            // (b) check permitted subtrees
126
-            $this->_checkPermittedSubtrees($state, $cert);
127
-            // (c) check excluded subtrees
128
-            $this->_checkExcludedSubtrees($state, $cert);
129
-        }
130
-        $extensions = $cert->tbsCertificate()->extensions();
131
-        if ($extensions->hasCertificatePolicies()) {
132
-            // (d) process policy information
133
-            if ($state->hasValidPolicyTree()) {
134
-                $state = $state->validPolicyTree()->processPolicies($state,
135
-                    $cert);
136
-            }
137
-        } else {
138
-            // (e) certificate policies extension not present,
139
-            // set the valid_policy_tree to NULL
140
-            $state = $state->withoutValidPolicyTree();
141
-        }
142
-        // (f) check that explicit_policy > 0 or valid_policy_tree is set
143
-        if (!($state->explicitPolicy() > 0 || $state->hasValidPolicyTree())) {
144
-            throw new PathValidationException("No valid policies.");
145
-        }
146
-        return $state;
147
-    }
103
+	/**
104
+	 * Apply basic certificate processing according to RFC 5280 section 6.1.3.
105
+	 *
106
+	 * @link https://tools.ietf.org/html/rfc5280#section-6.1.3
107
+	 * @param ValidatorState $state
108
+	 * @param Certificate $cert
109
+	 * @throws PathValidationException
110
+	 * @return ValidatorState
111
+	 */
112
+	private function _processCertificate(ValidatorState $state, Certificate $cert): ValidatorState
113
+	{
114
+		// (a.1) verify signature
115
+		$this->_verifySignature($state, $cert);
116
+		// (a.2) check validity period
117
+		$this->_checkValidity($cert);
118
+		// (a.3) check that certificate is not revoked
119
+		$this->_checkRevocation($cert);
120
+		// (a.4) check issuer
121
+		$this->_checkIssuer($state, $cert);
122
+		// (b)(c) if certificate is self-issued and it is not
123
+		// the final certificate in the path, skip this step
124
+		if (!($cert->isSelfIssued() && !$state->isFinal())) {
125
+			// (b) check permitted subtrees
126
+			$this->_checkPermittedSubtrees($state, $cert);
127
+			// (c) check excluded subtrees
128
+			$this->_checkExcludedSubtrees($state, $cert);
129
+		}
130
+		$extensions = $cert->tbsCertificate()->extensions();
131
+		if ($extensions->hasCertificatePolicies()) {
132
+			// (d) process policy information
133
+			if ($state->hasValidPolicyTree()) {
134
+				$state = $state->validPolicyTree()->processPolicies($state,
135
+					$cert);
136
+			}
137
+		} else {
138
+			// (e) certificate policies extension not present,
139
+			// set the valid_policy_tree to NULL
140
+			$state = $state->withoutValidPolicyTree();
141
+		}
142
+		// (f) check that explicit_policy > 0 or valid_policy_tree is set
143
+		if (!($state->explicitPolicy() > 0 || $state->hasValidPolicyTree())) {
144
+			throw new PathValidationException("No valid policies.");
145
+		}
146
+		return $state;
147
+	}
148 148
     
149
-    /**
150
-     * Apply preparation for the certificate i+1 according to rfc5280 section
151
-     * 6.1.4.
152
-     *
153
-     * @link https://tools.ietf.org/html/rfc5280#section-6.1.4
154
-     * @param ValidatorState $state
155
-     * @param Certificate $cert
156
-     * @return ValidatorState
157
-     */
158
-    private function _prepareNext(ValidatorState $state, Certificate $cert): ValidatorState
159
-    {
160
-        // (a)(b) if policy mappings extension is present
161
-        $state = $this->_preparePolicyMappings($state, $cert);
162
-        // (c) assign working_issuer_name
163
-        $state = $state->withWorkingIssuerName(
164
-            $cert->tbsCertificate()
165
-                ->subject());
166
-        // (d)(e)(f)
167
-        $state = $this->_setPublicKeyState($state, $cert);
168
-        // (g) if name constraints extension is present
169
-        $state = $this->_prepareNameConstraints($state, $cert);
170
-        // (h) if certificate is not self-issued
171
-        if (!$cert->isSelfIssued()) {
172
-            $state = $this->_prepareNonSelfIssued($state);
173
-        }
174
-        // (i) if policy constraints extension is present
175
-        $state = $this->_preparePolicyConstraints($state, $cert);
176
-        // (j) if inhibit any policy extension is present
177
-        $state = $this->_prepareInhibitAnyPolicy($state, $cert);
178
-        // (k) check basic constraints
179
-        $this->_processBasicContraints($cert);
180
-        // (l) verify max_path_length
181
-        $state = $this->_verifyMaxPathLength($state, $cert);
182
-        // (m) check pathLenContraint
183
-        $state = $this->_processPathLengthContraint($state, $cert);
184
-        // (n) check key usage
185
-        $this->_checkKeyUsage($cert);
186
-        // (o) process relevant extensions
187
-        $state = $this->_processExtensions($state, $cert);
188
-        return $state;
189
-    }
149
+	/**
150
+	 * Apply preparation for the certificate i+1 according to rfc5280 section
151
+	 * 6.1.4.
152
+	 *
153
+	 * @link https://tools.ietf.org/html/rfc5280#section-6.1.4
154
+	 * @param ValidatorState $state
155
+	 * @param Certificate $cert
156
+	 * @return ValidatorState
157
+	 */
158
+	private function _prepareNext(ValidatorState $state, Certificate $cert): ValidatorState
159
+	{
160
+		// (a)(b) if policy mappings extension is present
161
+		$state = $this->_preparePolicyMappings($state, $cert);
162
+		// (c) assign working_issuer_name
163
+		$state = $state->withWorkingIssuerName(
164
+			$cert->tbsCertificate()
165
+				->subject());
166
+		// (d)(e)(f)
167
+		$state = $this->_setPublicKeyState($state, $cert);
168
+		// (g) if name constraints extension is present
169
+		$state = $this->_prepareNameConstraints($state, $cert);
170
+		// (h) if certificate is not self-issued
171
+		if (!$cert->isSelfIssued()) {
172
+			$state = $this->_prepareNonSelfIssued($state);
173
+		}
174
+		// (i) if policy constraints extension is present
175
+		$state = $this->_preparePolicyConstraints($state, $cert);
176
+		// (j) if inhibit any policy extension is present
177
+		$state = $this->_prepareInhibitAnyPolicy($state, $cert);
178
+		// (k) check basic constraints
179
+		$this->_processBasicContraints($cert);
180
+		// (l) verify max_path_length
181
+		$state = $this->_verifyMaxPathLength($state, $cert);
182
+		// (m) check pathLenContraint
183
+		$state = $this->_processPathLengthContraint($state, $cert);
184
+		// (n) check key usage
185
+		$this->_checkKeyUsage($cert);
186
+		// (o) process relevant extensions
187
+		$state = $this->_processExtensions($state, $cert);
188
+		return $state;
189
+	}
190 190
     
191
-    /**
192
-     * Apply wrap-up procedure according to RFC 5280 section 6.1.5.
193
-     *
194
-     * @link https://tools.ietf.org/html/rfc5280#section-6.1.5
195
-     * @param ValidatorState $state
196
-     * @param Certificate $cert
197
-     * @throws PathValidationException
198
-     * @return ValidatorState
199
-     */
200
-    private function _wrapUp(ValidatorState $state, Certificate $cert): ValidatorState
201
-    {
202
-        $tbs_cert = $cert->tbsCertificate();
203
-        $extensions = $tbs_cert->extensions();
204
-        // (a)
205
-        if ($state->explicitPolicy() > 0) {
206
-            $state = $state->withExplicitPolicy($state->explicitPolicy() - 1);
207
-        }
208
-        // (b)
209
-        if ($extensions->hasPolicyConstraints()) {
210
-            $ext = $extensions->policyConstraints();
211
-            if ($ext->hasRequireExplicitPolicy() &&
212
-                 $ext->requireExplicitPolicy() == 0) {
213
-                $state = $state->withExplicitPolicy(0);
214
-            }
215
-        }
216
-        // (c)(d)(e)
217
-        $state = $this->_setPublicKeyState($state, $cert);
218
-        // (f) process relevant extensions
219
-        $state = $this->_processExtensions($state, $cert);
220
-        // (g) intersection of valid_policy_tree and the initial-policy-set
221
-        $state = $this->_calculatePolicyIntersection($state);
222
-        // check that explicit_policy > 0 or valid_policy_tree is set
223
-        if (!($state->explicitPolicy() > 0 || $state->hasValidPolicyTree())) {
224
-            throw new PathValidationException("No valid policies.");
225
-        }
226
-        // path validation succeeded
227
-        return $state;
228
-    }
191
+	/**
192
+	 * Apply wrap-up procedure according to RFC 5280 section 6.1.5.
193
+	 *
194
+	 * @link https://tools.ietf.org/html/rfc5280#section-6.1.5
195
+	 * @param ValidatorState $state
196
+	 * @param Certificate $cert
197
+	 * @throws PathValidationException
198
+	 * @return ValidatorState
199
+	 */
200
+	private function _wrapUp(ValidatorState $state, Certificate $cert): ValidatorState
201
+	{
202
+		$tbs_cert = $cert->tbsCertificate();
203
+		$extensions = $tbs_cert->extensions();
204
+		// (a)
205
+		if ($state->explicitPolicy() > 0) {
206
+			$state = $state->withExplicitPolicy($state->explicitPolicy() - 1);
207
+		}
208
+		// (b)
209
+		if ($extensions->hasPolicyConstraints()) {
210
+			$ext = $extensions->policyConstraints();
211
+			if ($ext->hasRequireExplicitPolicy() &&
212
+				 $ext->requireExplicitPolicy() == 0) {
213
+				$state = $state->withExplicitPolicy(0);
214
+			}
215
+		}
216
+		// (c)(d)(e)
217
+		$state = $this->_setPublicKeyState($state, $cert);
218
+		// (f) process relevant extensions
219
+		$state = $this->_processExtensions($state, $cert);
220
+		// (g) intersection of valid_policy_tree and the initial-policy-set
221
+		$state = $this->_calculatePolicyIntersection($state);
222
+		// check that explicit_policy > 0 or valid_policy_tree is set
223
+		if (!($state->explicitPolicy() > 0 || $state->hasValidPolicyTree())) {
224
+			throw new PathValidationException("No valid policies.");
225
+		}
226
+		// path validation succeeded
227
+		return $state;
228
+	}
229 229
     
230
-    /**
231
-     * Update working_public_key, working_public_key_parameters and
232
-     * working_public_key_algorithm state variables from certificate.
233
-     *
234
-     * @param ValidatorState $state
235
-     * @param Certificate $cert
236
-     * @return ValidatorState
237
-     */
238
-    private function _setPublicKeyState(ValidatorState $state, Certificate $cert): ValidatorState
239
-    {
240
-        $pk_info = $cert->tbsCertificate()->subjectPublicKeyInfo();
241
-        // assign working_public_key
242
-        $state = $state->withWorkingPublicKey($pk_info);
243
-        // assign working_public_key_parameters
244
-        $params = ValidatorState::getAlgorithmParameters(
245
-            $pk_info->algorithmIdentifier());
246
-        if (null !== $params) {
247
-            $state = $state->withWorkingPublicKeyParameters($params);
248
-        } else {
249
-            // if algorithms differ, set parameters to null
250
-            if ($pk_info->algorithmIdentifier()->oid() !==
251
-                 $state->workingPublicKeyAlgorithm()->oid()) {
252
-                $state = $state->withWorkingPublicKeyParameters(null);
253
-            }
254
-        }
255
-        // assign working_public_key_algorithm
256
-        $state = $state->withWorkingPublicKeyAlgorithm(
257
-            $pk_info->algorithmIdentifier());
258
-        return $state;
259
-    }
230
+	/**
231
+	 * Update working_public_key, working_public_key_parameters and
232
+	 * working_public_key_algorithm state variables from certificate.
233
+	 *
234
+	 * @param ValidatorState $state
235
+	 * @param Certificate $cert
236
+	 * @return ValidatorState
237
+	 */
238
+	private function _setPublicKeyState(ValidatorState $state, Certificate $cert): ValidatorState
239
+	{
240
+		$pk_info = $cert->tbsCertificate()->subjectPublicKeyInfo();
241
+		// assign working_public_key
242
+		$state = $state->withWorkingPublicKey($pk_info);
243
+		// assign working_public_key_parameters
244
+		$params = ValidatorState::getAlgorithmParameters(
245
+			$pk_info->algorithmIdentifier());
246
+		if (null !== $params) {
247
+			$state = $state->withWorkingPublicKeyParameters($params);
248
+		} else {
249
+			// if algorithms differ, set parameters to null
250
+			if ($pk_info->algorithmIdentifier()->oid() !==
251
+				 $state->workingPublicKeyAlgorithm()->oid()) {
252
+				$state = $state->withWorkingPublicKeyParameters(null);
253
+			}
254
+		}
255
+		// assign working_public_key_algorithm
256
+		$state = $state->withWorkingPublicKeyAlgorithm(
257
+			$pk_info->algorithmIdentifier());
258
+		return $state;
259
+	}
260 260
     
261
-    /**
262
-     * Verify certificate signature.
263
-     *
264
-     * @param ValidatorState $state
265
-     * @param Certificate $cert
266
-     * @throws PathValidationException
267
-     */
268
-    private function _verifySignature(ValidatorState $state, Certificate $cert)
269
-    {
270
-        try {
271
-            $valid = $cert->verify($state->workingPublicKey(), $this->_crypto);
272
-        } catch (\RuntimeException $e) {
273
-            throw new PathValidationException(
274
-                "Failed to verify signature: " . $e->getMessage(), 0, $e);
275
-        }
276
-        if (!$valid) {
277
-            throw new PathValidationException(
278
-                "Certificate signature doesn't match.");
279
-        }
280
-    }
261
+	/**
262
+	 * Verify certificate signature.
263
+	 *
264
+	 * @param ValidatorState $state
265
+	 * @param Certificate $cert
266
+	 * @throws PathValidationException
267
+	 */
268
+	private function _verifySignature(ValidatorState $state, Certificate $cert)
269
+	{
270
+		try {
271
+			$valid = $cert->verify($state->workingPublicKey(), $this->_crypto);
272
+		} catch (\RuntimeException $e) {
273
+			throw new PathValidationException(
274
+				"Failed to verify signature: " . $e->getMessage(), 0, $e);
275
+		}
276
+		if (!$valid) {
277
+			throw new PathValidationException(
278
+				"Certificate signature doesn't match.");
279
+		}
280
+	}
281 281
     
282
-    /**
283
-     * Check certificate validity.
284
-     *
285
-     * @param Certificate $cert
286
-     * @throws PathValidationException
287
-     */
288
-    private function _checkValidity(Certificate $cert)
289
-    {
290
-        $refdt = $this->_config->dateTime();
291
-        $validity = $cert->tbsCertificate()->validity();
292
-        if ($validity->notBefore()
293
-            ->dateTime()
294
-            ->diff($refdt)->invert) {
295
-            throw new PathValidationException(
296
-                "Certificate validity period has not started.");
297
-        }
298
-        if ($refdt->diff($validity->notAfter()
299
-            ->dateTime())->invert) {
300
-            throw new PathValidationException("Certificate has expired.");
301
-        }
302
-    }
282
+	/**
283
+	 * Check certificate validity.
284
+	 *
285
+	 * @param Certificate $cert
286
+	 * @throws PathValidationException
287
+	 */
288
+	private function _checkValidity(Certificate $cert)
289
+	{
290
+		$refdt = $this->_config->dateTime();
291
+		$validity = $cert->tbsCertificate()->validity();
292
+		if ($validity->notBefore()
293
+			->dateTime()
294
+			->diff($refdt)->invert) {
295
+			throw new PathValidationException(
296
+				"Certificate validity period has not started.");
297
+		}
298
+		if ($refdt->diff($validity->notAfter()
299
+			->dateTime())->invert) {
300
+			throw new PathValidationException("Certificate has expired.");
301
+		}
302
+	}
303 303
     
304
-    /**
305
-     * Check certificate revocation.
306
-     *
307
-     * @param Certificate $cert
308
-     */
309
-    private function _checkRevocation(Certificate $cert)
310
-    {
311
-        // @todo Implement CRL handling
312
-    }
304
+	/**
305
+	 * Check certificate revocation.
306
+	 *
307
+	 * @param Certificate $cert
308
+	 */
309
+	private function _checkRevocation(Certificate $cert)
310
+	{
311
+		// @todo Implement CRL handling
312
+	}
313 313
     
314
-    /**
315
-     * Check certificate issuer.
316
-     *
317
-     * @param ValidatorState $state
318
-     * @param Certificate $cert
319
-     * @throws PathValidationException
320
-     */
321
-    private function _checkIssuer(ValidatorState $state, Certificate $cert)
322
-    {
323
-        if (!$cert->tbsCertificate()
324
-            ->issuer()
325
-            ->equals($state->workingIssuerName())) {
326
-            throw new PathValidationException("Certification issuer mismatch.");
327
-        }
328
-    }
314
+	/**
315
+	 * Check certificate issuer.
316
+	 *
317
+	 * @param ValidatorState $state
318
+	 * @param Certificate $cert
319
+	 * @throws PathValidationException
320
+	 */
321
+	private function _checkIssuer(ValidatorState $state, Certificate $cert)
322
+	{
323
+		if (!$cert->tbsCertificate()
324
+			->issuer()
325
+			->equals($state->workingIssuerName())) {
326
+			throw new PathValidationException("Certification issuer mismatch.");
327
+		}
328
+	}
329 329
     
330
-    /**
331
-     *
332
-     * @param ValidatorState $state
333
-     * @param Certificate $cert
334
-     */
335
-    private function _checkPermittedSubtrees(ValidatorState $state,
336
-        Certificate $cert)
337
-    {
338
-        // @todo Implement
339
-        $state->permittedSubtrees();
340
-    }
330
+	/**
331
+	 *
332
+	 * @param ValidatorState $state
333
+	 * @param Certificate $cert
334
+	 */
335
+	private function _checkPermittedSubtrees(ValidatorState $state,
336
+		Certificate $cert)
337
+	{
338
+		// @todo Implement
339
+		$state->permittedSubtrees();
340
+	}
341 341
     
342
-    /**
343
-     *
344
-     * @param ValidatorState $state
345
-     * @param Certificate $cert
346
-     */
347
-    private function _checkExcludedSubtrees(ValidatorState $state,
348
-        Certificate $cert)
349
-    {
350
-        // @todo Implement
351
-        $state->excludedSubtrees();
352
-    }
342
+	/**
343
+	 *
344
+	 * @param ValidatorState $state
345
+	 * @param Certificate $cert
346
+	 */
347
+	private function _checkExcludedSubtrees(ValidatorState $state,
348
+		Certificate $cert)
349
+	{
350
+		// @todo Implement
351
+		$state->excludedSubtrees();
352
+	}
353 353
     
354
-    /**
355
-     * Apply policy mappings handling for the preparation step.
356
-     *
357
-     * @param ValidatorState $state
358
-     * @param Certificate $cert
359
-     * @throws PathValidationException
360
-     * @return ValidatorState
361
-     */
362
-    private function _preparePolicyMappings(ValidatorState $state,
363
-        Certificate $cert): ValidatorState
364
-    {
365
-        $extensions = $cert->tbsCertificate()->extensions();
366
-        if ($extensions->hasPolicyMappings()) {
367
-            // (a) verify that anyPolicy mapping is not used
368
-            if ($extensions->policyMappings()->hasAnyPolicyMapping()) {
369
-                throw new PathValidationException("anyPolicy mapping found.");
370
-            }
371
-            // (b) process policy mappings
372
-            if ($state->hasValidPolicyTree()) {
373
-                $state = $state->validPolicyTree()->processMappings($state,
374
-                    $cert);
375
-            }
376
-        }
377
-        return $state;
378
-    }
354
+	/**
355
+	 * Apply policy mappings handling for the preparation step.
356
+	 *
357
+	 * @param ValidatorState $state
358
+	 * @param Certificate $cert
359
+	 * @throws PathValidationException
360
+	 * @return ValidatorState
361
+	 */
362
+	private function _preparePolicyMappings(ValidatorState $state,
363
+		Certificate $cert): ValidatorState
364
+	{
365
+		$extensions = $cert->tbsCertificate()->extensions();
366
+		if ($extensions->hasPolicyMappings()) {
367
+			// (a) verify that anyPolicy mapping is not used
368
+			if ($extensions->policyMappings()->hasAnyPolicyMapping()) {
369
+				throw new PathValidationException("anyPolicy mapping found.");
370
+			}
371
+			// (b) process policy mappings
372
+			if ($state->hasValidPolicyTree()) {
373
+				$state = $state->validPolicyTree()->processMappings($state,
374
+					$cert);
375
+			}
376
+		}
377
+		return $state;
378
+	}
379 379
     
380
-    /**
381
-     * Apply name constraints handling for the preparation step.
382
-     *
383
-     * @param ValidatorState $state
384
-     * @param Certificate $cert
385
-     * @return ValidatorState
386
-     */
387
-    private function _prepareNameConstraints(ValidatorState $state,
388
-        Certificate $cert): ValidatorState
389
-    {
390
-        $extensions = $cert->tbsCertificate()->extensions();
391
-        if ($extensions->hasNameConstraints()) {
392
-            $state = $this->_processNameConstraints($state, $cert);
393
-        }
394
-        return $state;
395
-    }
380
+	/**
381
+	 * Apply name constraints handling for the preparation step.
382
+	 *
383
+	 * @param ValidatorState $state
384
+	 * @param Certificate $cert
385
+	 * @return ValidatorState
386
+	 */
387
+	private function _prepareNameConstraints(ValidatorState $state,
388
+		Certificate $cert): ValidatorState
389
+	{
390
+		$extensions = $cert->tbsCertificate()->extensions();
391
+		if ($extensions->hasNameConstraints()) {
392
+			$state = $this->_processNameConstraints($state, $cert);
393
+		}
394
+		return $state;
395
+	}
396 396
     
397
-    /**
398
-     * Apply preparation for a non-self-signed certificate.
399
-     *
400
-     * @param ValidatorState $state
401
-     * @return ValidatorState
402
-     */
403
-    private function _prepareNonSelfIssued(ValidatorState $state): ValidatorState
404
-    {
405
-        // (h.1)
406
-        if ($state->explicitPolicy() > 0) {
407
-            $state = $state->withExplicitPolicy($state->explicitPolicy() - 1);
408
-        }
409
-        // (h.2)
410
-        if ($state->policyMapping() > 0) {
411
-            $state = $state->withPolicyMapping($state->policyMapping() - 1);
412
-        }
413
-        // (h.3)
414
-        if ($state->inhibitAnyPolicy() > 0) {
415
-            $state = $state->withInhibitAnyPolicy(
416
-                $state->inhibitAnyPolicy() - 1);
417
-        }
418
-        return $state;
419
-    }
397
+	/**
398
+	 * Apply preparation for a non-self-signed certificate.
399
+	 *
400
+	 * @param ValidatorState $state
401
+	 * @return ValidatorState
402
+	 */
403
+	private function _prepareNonSelfIssued(ValidatorState $state): ValidatorState
404
+	{
405
+		// (h.1)
406
+		if ($state->explicitPolicy() > 0) {
407
+			$state = $state->withExplicitPolicy($state->explicitPolicy() - 1);
408
+		}
409
+		// (h.2)
410
+		if ($state->policyMapping() > 0) {
411
+			$state = $state->withPolicyMapping($state->policyMapping() - 1);
412
+		}
413
+		// (h.3)
414
+		if ($state->inhibitAnyPolicy() > 0) {
415
+			$state = $state->withInhibitAnyPolicy(
416
+				$state->inhibitAnyPolicy() - 1);
417
+		}
418
+		return $state;
419
+	}
420 420
     
421
-    /**
422
-     * Apply policy constraints handling for the preparation step.
423
-     *
424
-     * @param ValidatorState $state
425
-     * @param Certificate $cert
426
-     * @return ValidatorState
427
-     */
428
-    private function _preparePolicyConstraints(ValidatorState $state,
429
-        Certificate $cert): ValidatorState
430
-    {
431
-        $extensions = $cert->tbsCertificate()->extensions();
432
-        if (!$extensions->hasPolicyConstraints()) {
433
-            return $state;
434
-        }
435
-        $ext = $extensions->policyConstraints();
436
-        // (i.1)
437
-        if ($ext->hasRequireExplicitPolicy() &&
438
-             $ext->requireExplicitPolicy() < $state->explicitPolicy()) {
439
-            $state = $state->withExplicitPolicy($ext->requireExplicitPolicy());
440
-        }
441
-        // (i.2)
442
-        if ($ext->hasInhibitPolicyMapping() &&
443
-             $ext->inhibitPolicyMapping() < $state->policyMapping()) {
444
-            $state = $state->withPolicyMapping($ext->inhibitPolicyMapping());
445
-        }
446
-        return $state;
447
-    }
421
+	/**
422
+	 * Apply policy constraints handling for the preparation step.
423
+	 *
424
+	 * @param ValidatorState $state
425
+	 * @param Certificate $cert
426
+	 * @return ValidatorState
427
+	 */
428
+	private function _preparePolicyConstraints(ValidatorState $state,
429
+		Certificate $cert): ValidatorState
430
+	{
431
+		$extensions = $cert->tbsCertificate()->extensions();
432
+		if (!$extensions->hasPolicyConstraints()) {
433
+			return $state;
434
+		}
435
+		$ext = $extensions->policyConstraints();
436
+		// (i.1)
437
+		if ($ext->hasRequireExplicitPolicy() &&
438
+			 $ext->requireExplicitPolicy() < $state->explicitPolicy()) {
439
+			$state = $state->withExplicitPolicy($ext->requireExplicitPolicy());
440
+		}
441
+		// (i.2)
442
+		if ($ext->hasInhibitPolicyMapping() &&
443
+			 $ext->inhibitPolicyMapping() < $state->policyMapping()) {
444
+			$state = $state->withPolicyMapping($ext->inhibitPolicyMapping());
445
+		}
446
+		return $state;
447
+	}
448 448
     
449
-    /**
450
-     * Apply inhibit any-policy handling for the preparation step.
451
-     *
452
-     * @param ValidatorState $state
453
-     * @param Certificate $cert
454
-     * @return ValidatorState
455
-     */
456
-    private function _prepareInhibitAnyPolicy(ValidatorState $state,
457
-        Certificate $cert): ValidatorState
458
-    {
459
-        $extensions = $cert->tbsCertificate()->extensions();
460
-        if ($extensions->hasInhibitAnyPolicy()) {
461
-            $ext = $extensions->inhibitAnyPolicy();
462
-            if ($ext->skipCerts() < $state->inhibitAnyPolicy()) {
463
-                $state = $state->withInhibitAnyPolicy($ext->skipCerts());
464
-            }
465
-        }
466
-        return $state;
467
-    }
449
+	/**
450
+	 * Apply inhibit any-policy handling for the preparation step.
451
+	 *
452
+	 * @param ValidatorState $state
453
+	 * @param Certificate $cert
454
+	 * @return ValidatorState
455
+	 */
456
+	private function _prepareInhibitAnyPolicy(ValidatorState $state,
457
+		Certificate $cert): ValidatorState
458
+	{
459
+		$extensions = $cert->tbsCertificate()->extensions();
460
+		if ($extensions->hasInhibitAnyPolicy()) {
461
+			$ext = $extensions->inhibitAnyPolicy();
462
+			if ($ext->skipCerts() < $state->inhibitAnyPolicy()) {
463
+				$state = $state->withInhibitAnyPolicy($ext->skipCerts());
464
+			}
465
+		}
466
+		return $state;
467
+	}
468 468
     
469
-    /**
470
-     * Verify maximum certification path length for the preparation step.
471
-     *
472
-     * @param ValidatorState $state
473
-     * @param Certificate $cert
474
-     * @throws PathValidationException
475
-     * @return ValidatorState
476
-     */
477
-    private function _verifyMaxPathLength(ValidatorState $state,
478
-        Certificate $cert): ValidatorState
479
-    {
480
-        if (!$cert->isSelfIssued()) {
481
-            if ($state->maxPathLength() <= 0) {
482
-                throw new PathValidationException(
483
-                    "Certification path length exceeded.");
484
-            }
485
-            $state = $state->withMaxPathLength($state->maxPathLength() - 1);
486
-        }
487
-        return $state;
488
-    }
469
+	/**
470
+	 * Verify maximum certification path length for the preparation step.
471
+	 *
472
+	 * @param ValidatorState $state
473
+	 * @param Certificate $cert
474
+	 * @throws PathValidationException
475
+	 * @return ValidatorState
476
+	 */
477
+	private function _verifyMaxPathLength(ValidatorState $state,
478
+		Certificate $cert): ValidatorState
479
+	{
480
+		if (!$cert->isSelfIssued()) {
481
+			if ($state->maxPathLength() <= 0) {
482
+				throw new PathValidationException(
483
+					"Certification path length exceeded.");
484
+			}
485
+			$state = $state->withMaxPathLength($state->maxPathLength() - 1);
486
+		}
487
+		return $state;
488
+	}
489 489
     
490
-    /**
491
-     * Check key usage extension for the preparation step.
492
-     *
493
-     * @param Certificate $cert
494
-     * @throws PathValidationException
495
-     */
496
-    private function _checkKeyUsage(Certificate $cert)
497
-    {
498
-        $extensions = $cert->tbsCertificate()->extensions();
499
-        if ($extensions->hasKeyUsage()) {
500
-            $ext = $extensions->keyUsage();
501
-            if (!$ext->isKeyCertSign()) {
502
-                throw new PathValidationException("keyCertSign usage not set.");
503
-            }
504
-        }
505
-    }
490
+	/**
491
+	 * Check key usage extension for the preparation step.
492
+	 *
493
+	 * @param Certificate $cert
494
+	 * @throws PathValidationException
495
+	 */
496
+	private function _checkKeyUsage(Certificate $cert)
497
+	{
498
+		$extensions = $cert->tbsCertificate()->extensions();
499
+		if ($extensions->hasKeyUsage()) {
500
+			$ext = $extensions->keyUsage();
501
+			if (!$ext->isKeyCertSign()) {
502
+				throw new PathValidationException("keyCertSign usage not set.");
503
+			}
504
+		}
505
+	}
506 506
     
507
-    /**
508
-     *
509
-     * @param ValidatorState $state
510
-     * @param Certificate $cert
511
-     * @return ValidatorState
512
-     */
513
-    private function _processNameConstraints(ValidatorState $state,
514
-        Certificate $cert): ValidatorState
515
-    {
516
-        // @todo Implement
517
-        return $state;
518
-    }
507
+	/**
508
+	 *
509
+	 * @param ValidatorState $state
510
+	 * @param Certificate $cert
511
+	 * @return ValidatorState
512
+	 */
513
+	private function _processNameConstraints(ValidatorState $state,
514
+		Certificate $cert): ValidatorState
515
+	{
516
+		// @todo Implement
517
+		return $state;
518
+	}
519 519
     
520
-    /**
521
-     * Process basic constraints extension.
522
-     *
523
-     * @param Certificate $cert
524
-     * @throws PathValidationException
525
-     */
526
-    private function _processBasicContraints(Certificate $cert)
527
-    {
528
-        if ($cert->tbsCertificate()->version() == TBSCertificate::VERSION_3) {
529
-            $extensions = $cert->tbsCertificate()->extensions();
530
-            if (!$extensions->hasBasicConstraints()) {
531
-                throw new PathValidationException(
532
-                    "v3 certificate must have basicConstraints extension.");
533
-            }
534
-            // verify that cA is set to TRUE
535
-            if (!$extensions->basicConstraints()->isCA()) {
536
-                throw new PathValidationException(
537
-                    "Certificate is not a CA certificate.");
538
-            }
539
-        }
540
-    }
520
+	/**
521
+	 * Process basic constraints extension.
522
+	 *
523
+	 * @param Certificate $cert
524
+	 * @throws PathValidationException
525
+	 */
526
+	private function _processBasicContraints(Certificate $cert)
527
+	{
528
+		if ($cert->tbsCertificate()->version() == TBSCertificate::VERSION_3) {
529
+			$extensions = $cert->tbsCertificate()->extensions();
530
+			if (!$extensions->hasBasicConstraints()) {
531
+				throw new PathValidationException(
532
+					"v3 certificate must have basicConstraints extension.");
533
+			}
534
+			// verify that cA is set to TRUE
535
+			if (!$extensions->basicConstraints()->isCA()) {
536
+				throw new PathValidationException(
537
+					"Certificate is not a CA certificate.");
538
+			}
539
+		}
540
+	}
541 541
     
542
-    /**
543
-     * Process pathLenConstraint.
544
-     *
545
-     * @param ValidatorState $state
546
-     * @param Certificate $cert
547
-     * @return ValidatorState
548
-     */
549
-    private function _processPathLengthContraint(ValidatorState $state,
550
-        Certificate $cert): ValidatorState
551
-    {
552
-        $extensions = $cert->tbsCertificate()->extensions();
553
-        if ($extensions->hasBasicConstraints()) {
554
-            $ext = $extensions->basicConstraints();
555
-            if ($ext->hasPathLen()) {
556
-                if ($ext->pathLen() < $state->maxPathLength()) {
557
-                    $state = $state->withMaxPathLength($ext->pathLen());
558
-                }
559
-            }
560
-        }
561
-        return $state;
562
-    }
542
+	/**
543
+	 * Process pathLenConstraint.
544
+	 *
545
+	 * @param ValidatorState $state
546
+	 * @param Certificate $cert
547
+	 * @return ValidatorState
548
+	 */
549
+	private function _processPathLengthContraint(ValidatorState $state,
550
+		Certificate $cert): ValidatorState
551
+	{
552
+		$extensions = $cert->tbsCertificate()->extensions();
553
+		if ($extensions->hasBasicConstraints()) {
554
+			$ext = $extensions->basicConstraints();
555
+			if ($ext->hasPathLen()) {
556
+				if ($ext->pathLen() < $state->maxPathLength()) {
557
+					$state = $state->withMaxPathLength($ext->pathLen());
558
+				}
559
+			}
560
+		}
561
+		return $state;
562
+	}
563 563
     
564
-    /**
565
-     *
566
-     * @param ValidatorState $state
567
-     * @param Certificate $cert
568
-     * @return ValidatorState
569
-     */
570
-    private function _processExtensions(ValidatorState $state, Certificate $cert): ValidatorState
571
-    {
572
-        // @todo Implement
573
-        return $state;
574
-    }
564
+	/**
565
+	 *
566
+	 * @param ValidatorState $state
567
+	 * @param Certificate $cert
568
+	 * @return ValidatorState
569
+	 */
570
+	private function _processExtensions(ValidatorState $state, Certificate $cert): ValidatorState
571
+	{
572
+		// @todo Implement
573
+		return $state;
574
+	}
575 575
     
576
-    /**
577
-     *
578
-     * @param ValidatorState $state
579
-     * @return ValidatorState
580
-     */
581
-    private function _calculatePolicyIntersection(ValidatorState $state): ValidatorState
582
-    {
583
-        // (i) If the valid_policy_tree is NULL, the intersection is NULL
584
-        if (!$state->hasValidPolicyTree()) {
585
-            return $state;
586
-        }
587
-        // (ii) If the valid_policy_tree is not NULL and
588
-        // the user-initial-policy-set is any-policy, the intersection
589
-        // is the entire valid_policy_tree
590
-        $initial_policies = $this->_config->policySet();
591
-        if (in_array(PolicyInformation::OID_ANY_POLICY, $initial_policies)) {
592
-            return $state;
593
-        }
594
-        // (iii) If the valid_policy_tree is not NULL and the
595
-        // user-initial-policy-set is not any-policy, calculate
596
-        // the intersection of the valid_policy_tree and the
597
-        // user-initial-policy-set as follows
598
-        return $state->validPolicyTree()->calculateIntersection($state,
599
-            $initial_policies);
600
-    }
576
+	/**
577
+	 *
578
+	 * @param ValidatorState $state
579
+	 * @return ValidatorState
580
+	 */
581
+	private function _calculatePolicyIntersection(ValidatorState $state): ValidatorState
582
+	{
583
+		// (i) If the valid_policy_tree is NULL, the intersection is NULL
584
+		if (!$state->hasValidPolicyTree()) {
585
+			return $state;
586
+		}
587
+		// (ii) If the valid_policy_tree is not NULL and
588
+		// the user-initial-policy-set is any-policy, the intersection
589
+		// is the entire valid_policy_tree
590
+		$initial_policies = $this->_config->policySet();
591
+		if (in_array(PolicyInformation::OID_ANY_POLICY, $initial_policies)) {
592
+			return $state;
593
+		}
594
+		// (iii) If the valid_policy_tree is not NULL and the
595
+		// user-initial-policy-set is not any-policy, calculate
596
+		// the intersection of the valid_policy_tree and the
597
+		// user-initial-policy-set as follows
598
+		return $state->validPolicyTree()->calculateIntersection($state,
599
+			$initial_policies);
600
+	}
601 601
 }
Please login to merge, or discard this patch.
lib/X509/AttributeCertificate/ObjectDigestInfo.php 1 patch
Indentation   +81 added lines, -81 removed lines patch added patch discarded remove patch
@@ -20,92 +20,92 @@
 block discarded – undo
20 20
  */
21 21
 class ObjectDigestInfo
22 22
 {
23
-    const TYPE_PUBLIC_KEY = 0;
24
-    const TYPE_PUBLIC_KEY_CERT = 1;
25
-    const TYPE_OTHER_OBJECT_TYPES = 2;
23
+	const TYPE_PUBLIC_KEY = 0;
24
+	const TYPE_PUBLIC_KEY_CERT = 1;
25
+	const TYPE_OTHER_OBJECT_TYPES = 2;
26 26
     
27
-    /**
28
-     * Object type.
29
-     *
30
-     * @var int $_digestedObjectType
31
-     */
32
-    protected $_digestedObjectType;
27
+	/**
28
+	 * Object type.
29
+	 *
30
+	 * @var int $_digestedObjectType
31
+	 */
32
+	protected $_digestedObjectType;
33 33
     
34
-    /**
35
-     * OID of other object type.
36
-     *
37
-     * @var string|null $_otherObjectTypeID
38
-     */
39
-    protected $_otherObjectTypeID;
34
+	/**
35
+	 * OID of other object type.
36
+	 *
37
+	 * @var string|null $_otherObjectTypeID
38
+	 */
39
+	protected $_otherObjectTypeID;
40 40
     
41
-    /**
42
-     * Digest algorithm.
43
-     *
44
-     * @var AlgorithmIdentifierType $_digestAlgorithm
45
-     */
46
-    protected $_digestAlgorithm;
41
+	/**
42
+	 * Digest algorithm.
43
+	 *
44
+	 * @var AlgorithmIdentifierType $_digestAlgorithm
45
+	 */
46
+	protected $_digestAlgorithm;
47 47
     
48
-    /**
49
-     * Object digest.
50
-     *
51
-     * @var BitString $_objectDigest
52
-     */
53
-    protected $_objectDigest;
48
+	/**
49
+	 * Object digest.
50
+	 *
51
+	 * @var BitString $_objectDigest
52
+	 */
53
+	protected $_objectDigest;
54 54
     
55
-    /**
56
-     * Constructor.
57
-     *
58
-     * @param int $type
59
-     * @param AlgorithmIdentifierType $algo
60
-     * @param BitString $digest
61
-     */
62
-    public function __construct(int $type, AlgorithmIdentifierType $algo,
63
-        BitString $digest)
64
-    {
65
-        $this->_digestedObjectType = $type;
66
-        $this->_otherObjectTypeID = null;
67
-        $this->_digestAlgorithm = $algo;
68
-        $this->_objectDigest = $digest;
69
-    }
55
+	/**
56
+	 * Constructor.
57
+	 *
58
+	 * @param int $type
59
+	 * @param AlgorithmIdentifierType $algo
60
+	 * @param BitString $digest
61
+	 */
62
+	public function __construct(int $type, AlgorithmIdentifierType $algo,
63
+		BitString $digest)
64
+	{
65
+		$this->_digestedObjectType = $type;
66
+		$this->_otherObjectTypeID = null;
67
+		$this->_digestAlgorithm = $algo;
68
+		$this->_objectDigest = $digest;
69
+	}
70 70
     
71
-    /**
72
-     * Initialize from ASN.1.
73
-     *
74
-     * @param Sequence $seq
75
-     * @return self
76
-     */
77
-    public static function fromASN1(Sequence $seq): self
78
-    {
79
-        $type = $seq->at(0)
80
-            ->asEnumerated()
81
-            ->intNumber();
82
-        $oid = null;
83
-        $idx = 1;
84
-        if ($seq->has($idx, Element::TYPE_OBJECT_IDENTIFIER)) {
85
-            $oid = $seq->at($idx++)
86
-                ->asObjectIdentifier()
87
-                ->oid();
88
-        }
89
-        $algo = AlgorithmIdentifier::fromASN1($seq->at($idx++)->asSequence());
90
-        $digest = $seq->at($idx)->asBitString();
91
-        $obj = new self($type, $algo, $digest);
92
-        $obj->_otherObjectTypeID = $oid;
93
-        return $obj;
94
-    }
71
+	/**
72
+	 * Initialize from ASN.1.
73
+	 *
74
+	 * @param Sequence $seq
75
+	 * @return self
76
+	 */
77
+	public static function fromASN1(Sequence $seq): self
78
+	{
79
+		$type = $seq->at(0)
80
+			->asEnumerated()
81
+			->intNumber();
82
+		$oid = null;
83
+		$idx = 1;
84
+		if ($seq->has($idx, Element::TYPE_OBJECT_IDENTIFIER)) {
85
+			$oid = $seq->at($idx++)
86
+				->asObjectIdentifier()
87
+				->oid();
88
+		}
89
+		$algo = AlgorithmIdentifier::fromASN1($seq->at($idx++)->asSequence());
90
+		$digest = $seq->at($idx)->asBitString();
91
+		$obj = new self($type, $algo, $digest);
92
+		$obj->_otherObjectTypeID = $oid;
93
+		return $obj;
94
+	}
95 95
     
96
-    /**
97
-     * Generate ASN.1 structure.
98
-     *
99
-     * @return Sequence
100
-     */
101
-    public function toASN1(): Sequence
102
-    {
103
-        $elements = array(new Enumerated($this->_digestedObjectType));
104
-        if (isset($this->_otherObjectTypeID)) {
105
-            $elements[] = new ObjectIdentifier($this->_otherObjectTypeID);
106
-        }
107
-        $elements[] = $this->_digestAlgorithm->toASN1();
108
-        $elements[] = $this->_objectDigest;
109
-        return new Sequence(...$elements);
110
-    }
96
+	/**
97
+	 * Generate ASN.1 structure.
98
+	 *
99
+	 * @return Sequence
100
+	 */
101
+	public function toASN1(): Sequence
102
+	{
103
+		$elements = array(new Enumerated($this->_digestedObjectType));
104
+		if (isset($this->_otherObjectTypeID)) {
105
+			$elements[] = new ObjectIdentifier($this->_otherObjectTypeID);
106
+		}
107
+		$elements[] = $this->_digestAlgorithm->toASN1();
108
+		$elements[] = $this->_objectDigest;
109
+		return new Sequence(...$elements);
110
+	}
111 111
 }
Please login to merge, or discard this patch.
lib/X509/AttributeCertificate/AttributeCertificateInfo.php 1 patch
Indentation   +431 added lines, -431 removed lines patch added patch discarded remove patch
@@ -22,435 +22,435 @@
 block discarded – undo
22 22
  */
23 23
 class AttributeCertificateInfo
24 24
 {
25
-    const VERSION_2 = 1;
26
-    
27
-    /**
28
-     * AC version.
29
-     *
30
-     * @var int $_version
31
-     */
32
-    protected $_version;
33
-    
34
-    /**
35
-     * AC holder.
36
-     *
37
-     * @var Holder $_holder
38
-     */
39
-    protected $_holder;
40
-    
41
-    /**
42
-     * AC issuer.
43
-     *
44
-     * @var AttCertIssuer $_issuer
45
-     */
46
-    protected $_issuer;
47
-    
48
-    /**
49
-     * Signature algorithm identifier.
50
-     *
51
-     * @var SignatureAlgorithmIdentifier $_signature
52
-     */
53
-    protected $_signature;
54
-    
55
-    /**
56
-     * AC serial number.
57
-     *
58
-     * @var string $_serialNumber
59
-     */
60
-    protected $_serialNumber;
61
-    
62
-    /**
63
-     * Validity period.
64
-     *
65
-     * @var AttCertValidityPeriod $_attrCertValidityPeriod
66
-     */
67
-    protected $_attrCertValidityPeriod;
68
-    
69
-    /**
70
-     * Attributes.
71
-     *
72
-     * @var Attributes $_attributes
73
-     */
74
-    protected $_attributes;
75
-    
76
-    /**
77
-     * Issuer unique identifier.
78
-     *
79
-     * @var UniqueIdentifier|null $_issuerUniqueID
80
-     */
81
-    protected $_issuerUniqueID;
82
-    
83
-    /**
84
-     * Extensions.
85
-     *
86
-     * @var Extensions $_extensions
87
-     */
88
-    protected $_extensions;
89
-    
90
-    /**
91
-     * Constructor.
92
-     *
93
-     * @param Holder $holder AC holder
94
-     * @param AttCertIssuer $issuer AC issuer
95
-     * @param AttCertValidityPeriod $validity Validity
96
-     * @param Attributes $attribs Attributes
97
-     */
98
-    public function __construct(Holder $holder, AttCertIssuer $issuer,
99
-        AttCertValidityPeriod $validity, Attributes $attribs)
100
-    {
101
-        $this->_version = self::VERSION_2;
102
-        $this->_holder = $holder;
103
-        $this->_issuer = $issuer;
104
-        $this->_attrCertValidityPeriod = $validity;
105
-        $this->_attributes = $attribs;
106
-        $this->_extensions = new Extensions();
107
-    }
108
-    
109
-    /**
110
-     * Initialize from ASN.1.
111
-     *
112
-     * @param Sequence $seq
113
-     * @throws \UnexpectedValueException
114
-     * @return self
115
-     */
116
-    public static function fromASN1(Sequence $seq): self
117
-    {
118
-        $version = $seq->at(0)
119
-            ->asInteger()
120
-            ->intNumber();
121
-        if ($version != self::VERSION_2) {
122
-            throw new \UnexpectedValueException("Version must be 2.");
123
-        }
124
-        $holder = Holder::fromASN1($seq->at(1)->asSequence());
125
-        $issuer = AttCertIssuer::fromASN1($seq->at(2));
126
-        $signature = AlgorithmIdentifier::fromASN1($seq->at(3)->asSequence());
127
-        if (!$signature instanceof SignatureAlgorithmIdentifier) {
128
-            throw new \UnexpectedValueException(
129
-                "Unsupported signature algorithm " . $signature->oid() . ".");
130
-        }
131
-        $serial = $seq->at(4)
132
-            ->asInteger()
133
-            ->number();
134
-        $validity = AttCertValidityPeriod::fromASN1($seq->at(5)->asSequence());
135
-        $attribs = Attributes::fromASN1($seq->at(6)->asSequence());
136
-        $obj = new self($holder, $issuer, $validity, $attribs);
137
-        $obj->_signature = $signature;
138
-        $obj->_serialNumber = $serial;
139
-        $idx = 7;
140
-        if ($seq->has($idx, Element::TYPE_BIT_STRING)) {
141
-            $obj->_issuerUniqueID = UniqueIdentifier::fromASN1(
142
-                $seq->at($idx++)->asBitString());
143
-        }
144
-        if ($seq->has($idx, Element::TYPE_SEQUENCE)) {
145
-            $obj->_extensions = Extensions::fromASN1(
146
-                $seq->at($idx++)->asSequence());
147
-        }
148
-        return $obj;
149
-    }
150
-    
151
-    /**
152
-     * Get self with holder.
153
-     *
154
-     * @param Holder $holder
155
-     * @return self
156
-     */
157
-    public function withHolder(Holder $holder): self
158
-    {
159
-        $obj = clone $this;
160
-        $obj->_holder = $holder;
161
-        return $obj;
162
-    }
163
-    
164
-    /**
165
-     * Get self with issuer.
166
-     *
167
-     * @param AttCertIssuer $issuer
168
-     * @return self
169
-     */
170
-    public function withIssuer(AttCertIssuer $issuer): self
171
-    {
172
-        $obj = clone $this;
173
-        $obj->_issuer = $issuer;
174
-        return $obj;
175
-    }
176
-    
177
-    /**
178
-     * Get self with signature algorithm identifier.
179
-     *
180
-     * @param SignatureAlgorithmIdentifier $algo
181
-     * @return self
182
-     */
183
-    public function withSignature(SignatureAlgorithmIdentifier $algo): self
184
-    {
185
-        $obj = clone $this;
186
-        $obj->_signature = $algo;
187
-        return $obj;
188
-    }
189
-    
190
-    /**
191
-     * Get self with serial number.
192
-     *
193
-     * @param int|string $serial
194
-     * @return self
195
-     */
196
-    public function withSerialNumber($serial): self
197
-    {
198
-        $obj = clone $this;
199
-        $obj->_serialNumber = strval($serial);
200
-        return $obj;
201
-    }
202
-    
203
-    /**
204
-     * Get self with random positive serial number.
205
-     *
206
-     * @param int $size Number of random bytes
207
-     * @return self
208
-     */
209
-    public function withRandomSerialNumber(int $size = 16): self
210
-    {
211
-        // ensure that first byte is always non-zero and having first bit unset
212
-        $num = gmp_init(mt_rand(1, 0x7f), 10);
213
-        for ($i = 1; $i < $size; ++$i) {
214
-            $num <<= 8;
215
-            $num += mt_rand(0, 0xff);
216
-        }
217
-        return $this->withSerialNumber(gmp_strval($num, 10));
218
-    }
219
-    
220
-    /**
221
-     * Get self with validity period.
222
-     *
223
-     * @param AttCertValidityPeriod $validity
224
-     * @return self
225
-     */
226
-    public function withValidity(AttCertValidityPeriod $validity): self
227
-    {
228
-        $obj = clone $this;
229
-        $obj->_attrCertValidityPeriod = $validity;
230
-        return $obj;
231
-    }
232
-    
233
-    /**
234
-     * Get self with attributes.
235
-     *
236
-     * @param Attributes $attribs
237
-     * @return self
238
-     */
239
-    public function withAttributes(Attributes $attribs): self
240
-    {
241
-        $obj = clone $this;
242
-        $obj->_attributes = $attribs;
243
-        return $obj;
244
-    }
245
-    
246
-    /**
247
-     * Get self with issuer unique identifier.
248
-     *
249
-     * @param UniqueIdentifier $uid
250
-     * @return self
251
-     */
252
-    public function withIssuerUniqueID(UniqueIdentifier $uid): self
253
-    {
254
-        $obj = clone $this;
255
-        $obj->_issuerUniqueID = $uid;
256
-        return $obj;
257
-    }
258
-    
259
-    /**
260
-     * Get self with extensions.
261
-     *
262
-     * @param Extensions $extensions
263
-     * @return self
264
-     */
265
-    public function withExtensions(Extensions $extensions): self
266
-    {
267
-        $obj = clone $this;
268
-        $obj->_extensions = $extensions;
269
-        return $obj;
270
-    }
271
-    
272
-    /**
273
-     * Get self with extensions added.
274
-     *
275
-     * @param Extension ...$exts One or more Extension objects
276
-     * @return self
277
-     */
278
-    public function withAdditionalExtensions(Extension ...$exts): self
279
-    {
280
-        $obj = clone $this;
281
-        $obj->_extensions = $obj->_extensions->withExtensions(...$exts);
282
-        return $obj;
283
-    }
284
-    
285
-    /**
286
-     * Get version.
287
-     *
288
-     * @return int
289
-     */
290
-    public function version(): int
291
-    {
292
-        return $this->_version;
293
-    }
294
-    
295
-    /**
296
-     * Get AC holder.
297
-     *
298
-     * @return Holder
299
-     */
300
-    public function holder(): Holder
301
-    {
302
-        return $this->_holder;
303
-    }
304
-    
305
-    /**
306
-     * Get AC issuer.
307
-     *
308
-     * @return AttCertIssuer
309
-     */
310
-    public function issuer(): AttCertIssuer
311
-    {
312
-        return $this->_issuer;
313
-    }
314
-    
315
-    /**
316
-     * Check whether signature is set.
317
-     *
318
-     * @return bool
319
-     */
320
-    public function hasSignature(): bool
321
-    {
322
-        return isset($this->_signature);
323
-    }
324
-    
325
-    /**
326
-     * Get signature algorithm identifier.
327
-     *
328
-     * @return SignatureAlgorithmIdentifier
329
-     */
330
-    public function signature(): SignatureAlgorithmIdentifier
331
-    {
332
-        if (!$this->hasSignature()) {
333
-            throw new \LogicException("signature not set.");
334
-        }
335
-        return $this->_signature;
336
-    }
337
-    
338
-    /**
339
-     * Check whether serial number is present.
340
-     *
341
-     * @return bool
342
-     */
343
-    public function hasSerialNumber(): bool
344
-    {
345
-        return isset($this->_serialNumber);
346
-    }
347
-    
348
-    /**
349
-     * Get AC serial number.
350
-     *
351
-     * @return string
352
-     */
353
-    public function serialNumber(): string
354
-    {
355
-        if (!$this->hasSerialNumber()) {
356
-            throw new \LogicException("serialNumber not set.");
357
-        }
358
-        return $this->_serialNumber;
359
-    }
360
-    
361
-    /**
362
-     * Get validity period.
363
-     *
364
-     * @return AttCertValidityPeriod
365
-     */
366
-    public function validityPeriod(): AttCertValidityPeriod
367
-    {
368
-        return $this->_attrCertValidityPeriod;
369
-    }
370
-    
371
-    /**
372
-     * Get attributes.
373
-     *
374
-     * @return Attributes
375
-     */
376
-    public function attributes(): Attributes
377
-    {
378
-        return $this->_attributes;
379
-    }
380
-    
381
-    /**
382
-     * Check whether issuer unique identifier is present.
383
-     *
384
-     * @return bool
385
-     */
386
-    public function hasIssuerUniqueID(): bool
387
-    {
388
-        return isset($this->_issuerUniqueID);
389
-    }
390
-    
391
-    /**
392
-     * Get issuer unique identifier.
393
-     *
394
-     * @return UniqueIdentifier
395
-     */
396
-    public function issuerUniqueID(): UniqueIdentifier
397
-    {
398
-        if (!$this->hasIssuerUniqueID()) {
399
-            throw new \LogicException("issuerUniqueID not set.");
400
-        }
401
-        return $this->_issuerUniqueID;
402
-    }
403
-    
404
-    /**
405
-     * Get extensions.
406
-     *
407
-     * @return Extensions
408
-     */
409
-    public function extensions(): Extensions
410
-    {
411
-        return $this->_extensions;
412
-    }
413
-    
414
-    /**
415
-     * Get ASN.1 structure.
416
-     *
417
-     * @return Sequence
418
-     */
419
-    public function toASN1(): Sequence
420
-    {
421
-        $elements = array(new Integer($this->_version), $this->_holder->toASN1(),
422
-            $this->_issuer->toASN1(), $this->signature()->toASN1(),
423
-            new Integer($this->serialNumber()),
424
-            $this->_attrCertValidityPeriod->toASN1(),
425
-            $this->_attributes->toASN1());
426
-        if (isset($this->_issuerUniqueID)) {
427
-            $elements[] = $this->_issuerUniqueID->toASN1();
428
-        }
429
-        if (count($this->_extensions)) {
430
-            $elements[] = $this->_extensions->toASN1();
431
-        }
432
-        return new Sequence(...$elements);
433
-    }
434
-    
435
-    /**
436
-     * Create signed attribute certificate.
437
-     *
438
-     * @param SignatureAlgorithmIdentifier $algo Signature algorithm
439
-     * @param PrivateKeyInfo $privkey_info Private key
440
-     * @param Crypto|null $crypto Crypto engine, use default if not set
441
-     * @return AttributeCertificate
442
-     */
443
-    public function sign(SignatureAlgorithmIdentifier $algo,
444
-        PrivateKeyInfo $privkey_info, Crypto $crypto = null): AttributeCertificate
445
-    {
446
-        $crypto = $crypto ?: Crypto::getDefault();
447
-        $aci = clone $this;
448
-        if (!isset($aci->_serialNumber)) {
449
-            $aci->_serialNumber = "0";
450
-        }
451
-        $aci->_signature = $algo;
452
-        $data = $aci->toASN1()->toDER();
453
-        $signature = $crypto->sign($data, $privkey_info, $algo);
454
-        return new AttributeCertificate($aci, $algo, $signature);
455
-    }
25
+	const VERSION_2 = 1;
26
+    
27
+	/**
28
+	 * AC version.
29
+	 *
30
+	 * @var int $_version
31
+	 */
32
+	protected $_version;
33
+    
34
+	/**
35
+	 * AC holder.
36
+	 *
37
+	 * @var Holder $_holder
38
+	 */
39
+	protected $_holder;
40
+    
41
+	/**
42
+	 * AC issuer.
43
+	 *
44
+	 * @var AttCertIssuer $_issuer
45
+	 */
46
+	protected $_issuer;
47
+    
48
+	/**
49
+	 * Signature algorithm identifier.
50
+	 *
51
+	 * @var SignatureAlgorithmIdentifier $_signature
52
+	 */
53
+	protected $_signature;
54
+    
55
+	/**
56
+	 * AC serial number.
57
+	 *
58
+	 * @var string $_serialNumber
59
+	 */
60
+	protected $_serialNumber;
61
+    
62
+	/**
63
+	 * Validity period.
64
+	 *
65
+	 * @var AttCertValidityPeriod $_attrCertValidityPeriod
66
+	 */
67
+	protected $_attrCertValidityPeriod;
68
+    
69
+	/**
70
+	 * Attributes.
71
+	 *
72
+	 * @var Attributes $_attributes
73
+	 */
74
+	protected $_attributes;
75
+    
76
+	/**
77
+	 * Issuer unique identifier.
78
+	 *
79
+	 * @var UniqueIdentifier|null $_issuerUniqueID
80
+	 */
81
+	protected $_issuerUniqueID;
82
+    
83
+	/**
84
+	 * Extensions.
85
+	 *
86
+	 * @var Extensions $_extensions
87
+	 */
88
+	protected $_extensions;
89
+    
90
+	/**
91
+	 * Constructor.
92
+	 *
93
+	 * @param Holder $holder AC holder
94
+	 * @param AttCertIssuer $issuer AC issuer
95
+	 * @param AttCertValidityPeriod $validity Validity
96
+	 * @param Attributes $attribs Attributes
97
+	 */
98
+	public function __construct(Holder $holder, AttCertIssuer $issuer,
99
+		AttCertValidityPeriod $validity, Attributes $attribs)
100
+	{
101
+		$this->_version = self::VERSION_2;
102
+		$this->_holder = $holder;
103
+		$this->_issuer = $issuer;
104
+		$this->_attrCertValidityPeriod = $validity;
105
+		$this->_attributes = $attribs;
106
+		$this->_extensions = new Extensions();
107
+	}
108
+    
109
+	/**
110
+	 * Initialize from ASN.1.
111
+	 *
112
+	 * @param Sequence $seq
113
+	 * @throws \UnexpectedValueException
114
+	 * @return self
115
+	 */
116
+	public static function fromASN1(Sequence $seq): self
117
+	{
118
+		$version = $seq->at(0)
119
+			->asInteger()
120
+			->intNumber();
121
+		if ($version != self::VERSION_2) {
122
+			throw new \UnexpectedValueException("Version must be 2.");
123
+		}
124
+		$holder = Holder::fromASN1($seq->at(1)->asSequence());
125
+		$issuer = AttCertIssuer::fromASN1($seq->at(2));
126
+		$signature = AlgorithmIdentifier::fromASN1($seq->at(3)->asSequence());
127
+		if (!$signature instanceof SignatureAlgorithmIdentifier) {
128
+			throw new \UnexpectedValueException(
129
+				"Unsupported signature algorithm " . $signature->oid() . ".");
130
+		}
131
+		$serial = $seq->at(4)
132
+			->asInteger()
133
+			->number();
134
+		$validity = AttCertValidityPeriod::fromASN1($seq->at(5)->asSequence());
135
+		$attribs = Attributes::fromASN1($seq->at(6)->asSequence());
136
+		$obj = new self($holder, $issuer, $validity, $attribs);
137
+		$obj->_signature = $signature;
138
+		$obj->_serialNumber = $serial;
139
+		$idx = 7;
140
+		if ($seq->has($idx, Element::TYPE_BIT_STRING)) {
141
+			$obj->_issuerUniqueID = UniqueIdentifier::fromASN1(
142
+				$seq->at($idx++)->asBitString());
143
+		}
144
+		if ($seq->has($idx, Element::TYPE_SEQUENCE)) {
145
+			$obj->_extensions = Extensions::fromASN1(
146
+				$seq->at($idx++)->asSequence());
147
+		}
148
+		return $obj;
149
+	}
150
+    
151
+	/**
152
+	 * Get self with holder.
153
+	 *
154
+	 * @param Holder $holder
155
+	 * @return self
156
+	 */
157
+	public function withHolder(Holder $holder): self
158
+	{
159
+		$obj = clone $this;
160
+		$obj->_holder = $holder;
161
+		return $obj;
162
+	}
163
+    
164
+	/**
165
+	 * Get self with issuer.
166
+	 *
167
+	 * @param AttCertIssuer $issuer
168
+	 * @return self
169
+	 */
170
+	public function withIssuer(AttCertIssuer $issuer): self
171
+	{
172
+		$obj = clone $this;
173
+		$obj->_issuer = $issuer;
174
+		return $obj;
175
+	}
176
+    
177
+	/**
178
+	 * Get self with signature algorithm identifier.
179
+	 *
180
+	 * @param SignatureAlgorithmIdentifier $algo
181
+	 * @return self
182
+	 */
183
+	public function withSignature(SignatureAlgorithmIdentifier $algo): self
184
+	{
185
+		$obj = clone $this;
186
+		$obj->_signature = $algo;
187
+		return $obj;
188
+	}
189
+    
190
+	/**
191
+	 * Get self with serial number.
192
+	 *
193
+	 * @param int|string $serial
194
+	 * @return self
195
+	 */
196
+	public function withSerialNumber($serial): self
197
+	{
198
+		$obj = clone $this;
199
+		$obj->_serialNumber = strval($serial);
200
+		return $obj;
201
+	}
202
+    
203
+	/**
204
+	 * Get self with random positive serial number.
205
+	 *
206
+	 * @param int $size Number of random bytes
207
+	 * @return self
208
+	 */
209
+	public function withRandomSerialNumber(int $size = 16): self
210
+	{
211
+		// ensure that first byte is always non-zero and having first bit unset
212
+		$num = gmp_init(mt_rand(1, 0x7f), 10);
213
+		for ($i = 1; $i < $size; ++$i) {
214
+			$num <<= 8;
215
+			$num += mt_rand(0, 0xff);
216
+		}
217
+		return $this->withSerialNumber(gmp_strval($num, 10));
218
+	}
219
+    
220
+	/**
221
+	 * Get self with validity period.
222
+	 *
223
+	 * @param AttCertValidityPeriod $validity
224
+	 * @return self
225
+	 */
226
+	public function withValidity(AttCertValidityPeriod $validity): self
227
+	{
228
+		$obj = clone $this;
229
+		$obj->_attrCertValidityPeriod = $validity;
230
+		return $obj;
231
+	}
232
+    
233
+	/**
234
+	 * Get self with attributes.
235
+	 *
236
+	 * @param Attributes $attribs
237
+	 * @return self
238
+	 */
239
+	public function withAttributes(Attributes $attribs): self
240
+	{
241
+		$obj = clone $this;
242
+		$obj->_attributes = $attribs;
243
+		return $obj;
244
+	}
245
+    
246
+	/**
247
+	 * Get self with issuer unique identifier.
248
+	 *
249
+	 * @param UniqueIdentifier $uid
250
+	 * @return self
251
+	 */
252
+	public function withIssuerUniqueID(UniqueIdentifier $uid): self
253
+	{
254
+		$obj = clone $this;
255
+		$obj->_issuerUniqueID = $uid;
256
+		return $obj;
257
+	}
258
+    
259
+	/**
260
+	 * Get self with extensions.
261
+	 *
262
+	 * @param Extensions $extensions
263
+	 * @return self
264
+	 */
265
+	public function withExtensions(Extensions $extensions): self
266
+	{
267
+		$obj = clone $this;
268
+		$obj->_extensions = $extensions;
269
+		return $obj;
270
+	}
271
+    
272
+	/**
273
+	 * Get self with extensions added.
274
+	 *
275
+	 * @param Extension ...$exts One or more Extension objects
276
+	 * @return self
277
+	 */
278
+	public function withAdditionalExtensions(Extension ...$exts): self
279
+	{
280
+		$obj = clone $this;
281
+		$obj->_extensions = $obj->_extensions->withExtensions(...$exts);
282
+		return $obj;
283
+	}
284
+    
285
+	/**
286
+	 * Get version.
287
+	 *
288
+	 * @return int
289
+	 */
290
+	public function version(): int
291
+	{
292
+		return $this->_version;
293
+	}
294
+    
295
+	/**
296
+	 * Get AC holder.
297
+	 *
298
+	 * @return Holder
299
+	 */
300
+	public function holder(): Holder
301
+	{
302
+		return $this->_holder;
303
+	}
304
+    
305
+	/**
306
+	 * Get AC issuer.
307
+	 *
308
+	 * @return AttCertIssuer
309
+	 */
310
+	public function issuer(): AttCertIssuer
311
+	{
312
+		return $this->_issuer;
313
+	}
314
+    
315
+	/**
316
+	 * Check whether signature is set.
317
+	 *
318
+	 * @return bool
319
+	 */
320
+	public function hasSignature(): bool
321
+	{
322
+		return isset($this->_signature);
323
+	}
324
+    
325
+	/**
326
+	 * Get signature algorithm identifier.
327
+	 *
328
+	 * @return SignatureAlgorithmIdentifier
329
+	 */
330
+	public function signature(): SignatureAlgorithmIdentifier
331
+	{
332
+		if (!$this->hasSignature()) {
333
+			throw new \LogicException("signature not set.");
334
+		}
335
+		return $this->_signature;
336
+	}
337
+    
338
+	/**
339
+	 * Check whether serial number is present.
340
+	 *
341
+	 * @return bool
342
+	 */
343
+	public function hasSerialNumber(): bool
344
+	{
345
+		return isset($this->_serialNumber);
346
+	}
347
+    
348
+	/**
349
+	 * Get AC serial number.
350
+	 *
351
+	 * @return string
352
+	 */
353
+	public function serialNumber(): string
354
+	{
355
+		if (!$this->hasSerialNumber()) {
356
+			throw new \LogicException("serialNumber not set.");
357
+		}
358
+		return $this->_serialNumber;
359
+	}
360
+    
361
+	/**
362
+	 * Get validity period.
363
+	 *
364
+	 * @return AttCertValidityPeriod
365
+	 */
366
+	public function validityPeriod(): AttCertValidityPeriod
367
+	{
368
+		return $this->_attrCertValidityPeriod;
369
+	}
370
+    
371
+	/**
372
+	 * Get attributes.
373
+	 *
374
+	 * @return Attributes
375
+	 */
376
+	public function attributes(): Attributes
377
+	{
378
+		return $this->_attributes;
379
+	}
380
+    
381
+	/**
382
+	 * Check whether issuer unique identifier is present.
383
+	 *
384
+	 * @return bool
385
+	 */
386
+	public function hasIssuerUniqueID(): bool
387
+	{
388
+		return isset($this->_issuerUniqueID);
389
+	}
390
+    
391
+	/**
392
+	 * Get issuer unique identifier.
393
+	 *
394
+	 * @return UniqueIdentifier
395
+	 */
396
+	public function issuerUniqueID(): UniqueIdentifier
397
+	{
398
+		if (!$this->hasIssuerUniqueID()) {
399
+			throw new \LogicException("issuerUniqueID not set.");
400
+		}
401
+		return $this->_issuerUniqueID;
402
+	}
403
+    
404
+	/**
405
+	 * Get extensions.
406
+	 *
407
+	 * @return Extensions
408
+	 */
409
+	public function extensions(): Extensions
410
+	{
411
+		return $this->_extensions;
412
+	}
413
+    
414
+	/**
415
+	 * Get ASN.1 structure.
416
+	 *
417
+	 * @return Sequence
418
+	 */
419
+	public function toASN1(): Sequence
420
+	{
421
+		$elements = array(new Integer($this->_version), $this->_holder->toASN1(),
422
+			$this->_issuer->toASN1(), $this->signature()->toASN1(),
423
+			new Integer($this->serialNumber()),
424
+			$this->_attrCertValidityPeriod->toASN1(),
425
+			$this->_attributes->toASN1());
426
+		if (isset($this->_issuerUniqueID)) {
427
+			$elements[] = $this->_issuerUniqueID->toASN1();
428
+		}
429
+		if (count($this->_extensions)) {
430
+			$elements[] = $this->_extensions->toASN1();
431
+		}
432
+		return new Sequence(...$elements);
433
+	}
434
+    
435
+	/**
436
+	 * Create signed attribute certificate.
437
+	 *
438
+	 * @param SignatureAlgorithmIdentifier $algo Signature algorithm
439
+	 * @param PrivateKeyInfo $privkey_info Private key
440
+	 * @param Crypto|null $crypto Crypto engine, use default if not set
441
+	 * @return AttributeCertificate
442
+	 */
443
+	public function sign(SignatureAlgorithmIdentifier $algo,
444
+		PrivateKeyInfo $privkey_info, Crypto $crypto = null): AttributeCertificate
445
+	{
446
+		$crypto = $crypto ?: Crypto::getDefault();
447
+		$aci = clone $this;
448
+		if (!isset($aci->_serialNumber)) {
449
+			$aci->_serialNumber = "0";
450
+		}
451
+		$aci->_signature = $algo;
452
+		$data = $aci->toASN1()->toDER();
453
+		$signature = $crypto->sign($data, $privkey_info, $algo);
454
+		return new AttributeCertificate($aci, $algo, $signature);
455
+	}
456 456
 }
Please login to merge, or discard this patch.
lib/X509/AttributeCertificate/V2Form.php 1 patch
Indentation   +131 added lines, -131 removed lines patch added patch discarded remove patch
@@ -19,144 +19,144 @@
 block discarded – undo
19 19
  */
20 20
 class V2Form extends AttCertIssuer
21 21
 {
22
-    /**
23
-     * Issuer name.
24
-     *
25
-     * @var GeneralNames $_issuerName
26
-     */
27
-    protected $_issuerName;
22
+	/**
23
+	 * Issuer name.
24
+	 *
25
+	 * @var GeneralNames $_issuerName
26
+	 */
27
+	protected $_issuerName;
28 28
     
29
-    /**
30
-     * Issuer PKC's issuer and serial.
31
-     *
32
-     * @var IssuerSerial $_baseCertificateID
33
-     */
34
-    protected $_baseCertificateID;
29
+	/**
30
+	 * Issuer PKC's issuer and serial.
31
+	 *
32
+	 * @var IssuerSerial $_baseCertificateID
33
+	 */
34
+	protected $_baseCertificateID;
35 35
     
36
-    /**
37
-     * Linked object.
38
-     *
39
-     * @var ObjectDigestInfo $_objectDigestInfo
40
-     */
41
-    protected $_objectDigestInfo;
36
+	/**
37
+	 * Linked object.
38
+	 *
39
+	 * @var ObjectDigestInfo $_objectDigestInfo
40
+	 */
41
+	protected $_objectDigestInfo;
42 42
     
43
-    /**
44
-     * Constructor.
45
-     *
46
-     * @param GeneralNames|null $names
47
-     */
48
-    public function __construct(GeneralNames $names = null)
49
-    {
50
-        $this->_issuerName = $names;
51
-        $this->_baseCertificateID = null;
52
-        $this->_objectDigestInfo = null;
53
-    }
43
+	/**
44
+	 * Constructor.
45
+	 *
46
+	 * @param GeneralNames|null $names
47
+	 */
48
+	public function __construct(GeneralNames $names = null)
49
+	{
50
+		$this->_issuerName = $names;
51
+		$this->_baseCertificateID = null;
52
+		$this->_objectDigestInfo = null;
53
+	}
54 54
     
55
-    /**
56
-     * Initialize from ASN.1.
57
-     *
58
-     * @param Sequence $seq
59
-     * @return self
60
-     */
61
-    public static function fromV2ASN1(Sequence $seq): self
62
-    {
63
-        $issuer = null;
64
-        $cert_id = null;
65
-        $digest_info = null;
66
-        if ($seq->has(0, Element::TYPE_SEQUENCE)) {
67
-            $issuer = GeneralNames::fromASN1($seq->at(0)->asSequence());
68
-        }
69
-        if ($seq->hasTagged(0)) {
70
-            $cert_id = IssuerSerial::fromASN1(
71
-                $seq->getTagged(0)
72
-                    ->asImplicit(Element::TYPE_SEQUENCE)
73
-                    ->asSequence());
74
-        }
75
-        if ($seq->hasTagged(1)) {
76
-            $digest_info = ObjectDigestInfo::fromASN1(
77
-                $seq->getTagged(1)
78
-                    ->asImplicit(Element::TYPE_SEQUENCE)
79
-                    ->asSequence());
80
-        }
81
-        $obj = new self($issuer);
82
-        $obj->_baseCertificateID = $cert_id;
83
-        $obj->_objectDigestInfo = $digest_info;
84
-        return $obj;
85
-    }
55
+	/**
56
+	 * Initialize from ASN.1.
57
+	 *
58
+	 * @param Sequence $seq
59
+	 * @return self
60
+	 */
61
+	public static function fromV2ASN1(Sequence $seq): self
62
+	{
63
+		$issuer = null;
64
+		$cert_id = null;
65
+		$digest_info = null;
66
+		if ($seq->has(0, Element::TYPE_SEQUENCE)) {
67
+			$issuer = GeneralNames::fromASN1($seq->at(0)->asSequence());
68
+		}
69
+		if ($seq->hasTagged(0)) {
70
+			$cert_id = IssuerSerial::fromASN1(
71
+				$seq->getTagged(0)
72
+					->asImplicit(Element::TYPE_SEQUENCE)
73
+					->asSequence());
74
+		}
75
+		if ($seq->hasTagged(1)) {
76
+			$digest_info = ObjectDigestInfo::fromASN1(
77
+				$seq->getTagged(1)
78
+					->asImplicit(Element::TYPE_SEQUENCE)
79
+					->asSequence());
80
+		}
81
+		$obj = new self($issuer);
82
+		$obj->_baseCertificateID = $cert_id;
83
+		$obj->_objectDigestInfo = $digest_info;
84
+		return $obj;
85
+	}
86 86
     
87
-    /**
88
-     * Check whether issuer name is set.
89
-     *
90
-     * @return bool
91
-     */
92
-    public function hasIssuerName(): bool
93
-    {
94
-        return isset($this->_issuerName);
95
-    }
87
+	/**
88
+	 * Check whether issuer name is set.
89
+	 *
90
+	 * @return bool
91
+	 */
92
+	public function hasIssuerName(): bool
93
+	{
94
+		return isset($this->_issuerName);
95
+	}
96 96
     
97
-    /**
98
-     * Get issuer name.
99
-     *
100
-     * @throws \LogicException
101
-     * @return GeneralNames
102
-     */
103
-    public function issuerName(): GeneralNames
104
-    {
105
-        if (!$this->hasIssuerName()) {
106
-            throw new \LogicException("issuerName not set.");
107
-        }
108
-        return $this->_issuerName;
109
-    }
97
+	/**
98
+	 * Get issuer name.
99
+	 *
100
+	 * @throws \LogicException
101
+	 * @return GeneralNames
102
+	 */
103
+	public function issuerName(): GeneralNames
104
+	{
105
+		if (!$this->hasIssuerName()) {
106
+			throw new \LogicException("issuerName not set.");
107
+		}
108
+		return $this->_issuerName;
109
+	}
110 110
     
111
-    /**
112
-     * Get DN of the issuer.
113
-     *
114
-     * This is a convenience method conforming to RFC 5755, which states
115
-     * that Issuer must contain only one non-empty distinguished name.
116
-     *
117
-     * @return \X501\ASN1\Name
118
-     */
119
-    public function name(): Name
120
-    {
121
-        return $this->issuerName()->firstDN();
122
-    }
111
+	/**
112
+	 * Get DN of the issuer.
113
+	 *
114
+	 * This is a convenience method conforming to RFC 5755, which states
115
+	 * that Issuer must contain only one non-empty distinguished name.
116
+	 *
117
+	 * @return \X501\ASN1\Name
118
+	 */
119
+	public function name(): Name
120
+	{
121
+		return $this->issuerName()->firstDN();
122
+	}
123 123
     
124
-    /**
125
-     *
126
-     * @see \X509\AttributeCertificate\AttCertIssuer::ASN1()
127
-     * @return ImplicitlyTaggedType Tagged Sequence
128
-     */
129
-    public function toASN1(): TaggedType
130
-    {
131
-        $elements = array();
132
-        if (isset($this->_issuerName)) {
133
-            $elements[] = $this->_issuerName->toASN1();
134
-        }
135
-        if (isset($this->_baseCertificateID)) {
136
-            $elements[] = new ImplicitlyTaggedType(0,
137
-                $this->_baseCertificateID->toASN1());
138
-        }
139
-        if (isset($this->_objectDigestInfo)) {
140
-            $elements[] = new ImplicitlyTaggedType(1,
141
-                $this->_objectDigestInfo->toASN1());
142
-        }
143
-        return new ImplicitlyTaggedType(0, new Sequence(...$elements));
144
-    }
124
+	/**
125
+	 *
126
+	 * @see \X509\AttributeCertificate\AttCertIssuer::ASN1()
127
+	 * @return ImplicitlyTaggedType Tagged Sequence
128
+	 */
129
+	public function toASN1(): TaggedType
130
+	{
131
+		$elements = array();
132
+		if (isset($this->_issuerName)) {
133
+			$elements[] = $this->_issuerName->toASN1();
134
+		}
135
+		if (isset($this->_baseCertificateID)) {
136
+			$elements[] = new ImplicitlyTaggedType(0,
137
+				$this->_baseCertificateID->toASN1());
138
+		}
139
+		if (isset($this->_objectDigestInfo)) {
140
+			$elements[] = new ImplicitlyTaggedType(1,
141
+				$this->_objectDigestInfo->toASN1());
142
+		}
143
+		return new ImplicitlyTaggedType(0, new Sequence(...$elements));
144
+	}
145 145
     
146
-    /**
147
-     *
148
-     * {@inheritdoc}
149
-     * @see \X509\AttributeCertificate\AttCertIssuer::identifiesPKC()
150
-     * @return bool
151
-     */
152
-    public function identifiesPKC(Certificate $cert): bool
153
-    {
154
-        $name = $this->_issuerName->firstDN();
155
-        if (!$cert->tbsCertificate()
156
-            ->subject()
157
-            ->equals($name)) {
158
-            return false;
159
-        }
160
-        return true;
161
-    }
146
+	/**
147
+	 *
148
+	 * {@inheritdoc}
149
+	 * @see \X509\AttributeCertificate\AttCertIssuer::identifiesPKC()
150
+	 * @return bool
151
+	 */
152
+	public function identifiesPKC(Certificate $cert): bool
153
+	{
154
+		$name = $this->_issuerName->firstDN();
155
+		if (!$cert->tbsCertificate()
156
+			->subject()
157
+			->equals($name)) {
158
+			return false;
159
+		}
160
+		return true;
161
+	}
162 162
 }
Please login to merge, or discard this patch.
lib/X509/AttributeCertificate/Attribute/RoleAttributeValue.php 1 patch
Indentation   +139 added lines, -139 removed lines patch added patch discarded remove patch
@@ -23,155 +23,155 @@
 block discarded – undo
23 23
  */
24 24
 class RoleAttributeValue extends AttributeValue
25 25
 {
26
-    /**
27
-     * Issuing authority.
28
-     *
29
-     * @var GeneralNames $_roleAuthority
30
-     */
31
-    protected $_roleAuthority;
26
+	/**
27
+	 * Issuing authority.
28
+	 *
29
+	 * @var GeneralNames $_roleAuthority
30
+	 */
31
+	protected $_roleAuthority;
32 32
     
33
-    /**
34
-     * Role name.
35
-     *
36
-     * @var GeneralName $_roleName
37
-     */
38
-    protected $_roleName;
33
+	/**
34
+	 * Role name.
35
+	 *
36
+	 * @var GeneralName $_roleName
37
+	 */
38
+	protected $_roleName;
39 39
     
40
-    /**
41
-     * Constructor.
42
-     *
43
-     * @param GeneralName $name Role name
44
-     * @param GeneralNames|null $authority Issuing authority
45
-     */
46
-    public function __construct(GeneralName $name, GeneralNames $authority = null)
47
-    {
48
-        $this->_roleAuthority = $authority;
49
-        $this->_roleName = $name;
50
-        $this->_oid = AttributeType::OID_ROLE;
51
-    }
40
+	/**
41
+	 * Constructor.
42
+	 *
43
+	 * @param GeneralName $name Role name
44
+	 * @param GeneralNames|null $authority Issuing authority
45
+	 */
46
+	public function __construct(GeneralName $name, GeneralNames $authority = null)
47
+	{
48
+		$this->_roleAuthority = $authority;
49
+		$this->_roleName = $name;
50
+		$this->_oid = AttributeType::OID_ROLE;
51
+	}
52 52
     
53
-    /**
54
-     * Initialize from a role string.
55
-     *
56
-     * @param string $role_name Role name in URI format
57
-     * @param GeneralNames|null $authority Issuing authority
58
-     * @return self
59
-     */
60
-    public static function fromString(string $role_name,
61
-        GeneralNames $authority = null): self
62
-    {
63
-        return new self(new UniformResourceIdentifier($role_name), $authority);
64
-    }
53
+	/**
54
+	 * Initialize from a role string.
55
+	 *
56
+	 * @param string $role_name Role name in URI format
57
+	 * @param GeneralNames|null $authority Issuing authority
58
+	 * @return self
59
+	 */
60
+	public static function fromString(string $role_name,
61
+		GeneralNames $authority = null): self
62
+	{
63
+		return new self(new UniformResourceIdentifier($role_name), $authority);
64
+	}
65 65
     
66
-    /**
67
-     *
68
-     * @param UnspecifiedType $el
69
-     * @return self
70
-     */
71
-    public static function fromASN1(UnspecifiedType $el): self
72
-    {
73
-        $seq = $el->asSequence();
74
-        $authority = null;
75
-        if ($seq->hasTagged(0)) {
76
-            $authority = GeneralNames::fromASN1(
77
-                $seq->getTagged(0)
78
-                    ->asImplicit(Element::TYPE_SEQUENCE)
79
-                    ->asSequence());
80
-        }
81
-        $name = GeneralName::fromASN1(
82
-            $seq->getTagged(1)
83
-                ->asExplicit()
84
-                ->asTagged());
85
-        return new self($name, $authority);
86
-    }
66
+	/**
67
+	 *
68
+	 * @param UnspecifiedType $el
69
+	 * @return self
70
+	 */
71
+	public static function fromASN1(UnspecifiedType $el): self
72
+	{
73
+		$seq = $el->asSequence();
74
+		$authority = null;
75
+		if ($seq->hasTagged(0)) {
76
+			$authority = GeneralNames::fromASN1(
77
+				$seq->getTagged(0)
78
+					->asImplicit(Element::TYPE_SEQUENCE)
79
+					->asSequence());
80
+		}
81
+		$name = GeneralName::fromASN1(
82
+			$seq->getTagged(1)
83
+				->asExplicit()
84
+				->asTagged());
85
+		return new self($name, $authority);
86
+	}
87 87
     
88
-    /**
89
-     * Check whether issuing authority is present.
90
-     *
91
-     * @return bool
92
-     */
93
-    public function hasRoleAuthority(): bool
94
-    {
95
-        return isset($this->_roleAuthority);
96
-    }
88
+	/**
89
+	 * Check whether issuing authority is present.
90
+	 *
91
+	 * @return bool
92
+	 */
93
+	public function hasRoleAuthority(): bool
94
+	{
95
+		return isset($this->_roleAuthority);
96
+	}
97 97
     
98
-    /**
99
-     * Get issuing authority.
100
-     *
101
-     * @throws \LogicException
102
-     * @return GeneralNames
103
-     */
104
-    public function roleAuthority(): GeneralNames
105
-    {
106
-        if (!$this->hasRoleAuthority()) {
107
-            throw new \LogicException("roleAuthority not set.");
108
-        }
109
-        return $this->_roleAuthority;
110
-    }
98
+	/**
99
+	 * Get issuing authority.
100
+	 *
101
+	 * @throws \LogicException
102
+	 * @return GeneralNames
103
+	 */
104
+	public function roleAuthority(): GeneralNames
105
+	{
106
+		if (!$this->hasRoleAuthority()) {
107
+			throw new \LogicException("roleAuthority not set.");
108
+		}
109
+		return $this->_roleAuthority;
110
+	}
111 111
     
112
-    /**
113
-     * Get role name.
114
-     *
115
-     * @return GeneralName
116
-     */
117
-    public function roleName(): GeneralName
118
-    {
119
-        return $this->_roleName;
120
-    }
112
+	/**
113
+	 * Get role name.
114
+	 *
115
+	 * @return GeneralName
116
+	 */
117
+	public function roleName(): GeneralName
118
+	{
119
+		return $this->_roleName;
120
+	}
121 121
     
122
-    /**
123
-     *
124
-     * @see \X501\ASN1\AttributeValue\AttributeValue::toASN1()
125
-     * @return Sequence
126
-     */
127
-    public function toASN1(): Sequence
128
-    {
129
-        $elements = array();
130
-        if (isset($this->_roleAuthority)) {
131
-            $elements[] = new ImplicitlyTaggedType(0,
132
-                $this->_roleAuthority->toASN1());
133
-        }
134
-        $elements[] = new ExplicitlyTaggedType(1, $this->_roleName->toASN1());
135
-        return new Sequence(...$elements);
136
-    }
122
+	/**
123
+	 *
124
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::toASN1()
125
+	 * @return Sequence
126
+	 */
127
+	public function toASN1(): Sequence
128
+	{
129
+		$elements = array();
130
+		if (isset($this->_roleAuthority)) {
131
+			$elements[] = new ImplicitlyTaggedType(0,
132
+				$this->_roleAuthority->toASN1());
133
+		}
134
+		$elements[] = new ExplicitlyTaggedType(1, $this->_roleName->toASN1());
135
+		return new Sequence(...$elements);
136
+	}
137 137
     
138
-    /**
139
-     *
140
-     * @see \X501\ASN1\AttributeValue\AttributeValue::stringValue()
141
-     * @return string
142
-     */
143
-    public function stringValue(): string
144
-    {
145
-        return "#" . bin2hex($this->toASN1()->toDER());
146
-    }
138
+	/**
139
+	 *
140
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::stringValue()
141
+	 * @return string
142
+	 */
143
+	public function stringValue(): string
144
+	{
145
+		return "#" . bin2hex($this->toASN1()->toDER());
146
+	}
147 147
     
148
-    /**
149
-     *
150
-     * @see \X501\ASN1\AttributeValue\AttributeValue::equalityMatchingRule()
151
-     * @return BinaryMatch
152
-     */
153
-    public function equalityMatchingRule(): BinaryMatch
154
-    {
155
-        return new BinaryMatch();
156
-    }
148
+	/**
149
+	 *
150
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::equalityMatchingRule()
151
+	 * @return BinaryMatch
152
+	 */
153
+	public function equalityMatchingRule(): BinaryMatch
154
+	{
155
+		return new BinaryMatch();
156
+	}
157 157
     
158
-    /**
159
-     *
160
-     * @see \X501\ASN1\AttributeValue\AttributeValue::rfc2253String()
161
-     * @return string
162
-     */
163
-    public function rfc2253String(): string
164
-    {
165
-        return $this->stringValue();
166
-    }
158
+	/**
159
+	 *
160
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::rfc2253String()
161
+	 * @return string
162
+	 */
163
+	public function rfc2253String(): string
164
+	{
165
+		return $this->stringValue();
166
+	}
167 167
     
168
-    /**
169
-     *
170
-     * @see \X501\ASN1\AttributeValue\AttributeValue::_transcodedString()
171
-     * @return string
172
-     */
173
-    protected function _transcodedString(): string
174
-    {
175
-        return $this->stringValue();
176
-    }
168
+	/**
169
+	 *
170
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::_transcodedString()
171
+	 * @return string
172
+	 */
173
+	protected function _transcodedString(): string
174
+	{
175
+		return $this->stringValue();
176
+	}
177 177
 }
Please login to merge, or discard this patch.
lib/X509/AttributeCertificate/Attribute/SvceAuthInfo.php 1 patch
Indentation   +139 added lines, -139 removed lines patch added patch discarded remove patch
@@ -20,156 +20,156 @@
 block discarded – undo
20 20
  */
21 21
 abstract class SvceAuthInfo extends AttributeValue
22 22
 {
23
-    /**
24
-     * Service.
25
-     *
26
-     * @var GeneralName $_service
27
-     */
28
-    protected $_service;
23
+	/**
24
+	 * Service.
25
+	 *
26
+	 * @var GeneralName $_service
27
+	 */
28
+	protected $_service;
29 29
     
30
-    /**
31
-     * Ident.
32
-     *
33
-     * @var GeneralName $_ident
34
-     */
35
-    protected $_ident;
30
+	/**
31
+	 * Ident.
32
+	 *
33
+	 * @var GeneralName $_ident
34
+	 */
35
+	protected $_ident;
36 36
     
37
-    /**
38
-     * Auth info.
39
-     *
40
-     * @var string|null $_authInfo
41
-     */
42
-    protected $_authInfo;
37
+	/**
38
+	 * Auth info.
39
+	 *
40
+	 * @var string|null $_authInfo
41
+	 */
42
+	protected $_authInfo;
43 43
     
44
-    /**
45
-     * Constructor.
46
-     *
47
-     * @param GeneralName $service
48
-     * @param GeneralName $ident
49
-     * @param string|null $auth_info
50
-     */
51
-    public function __construct(GeneralName $service, GeneralName $ident,
52
-        $auth_info = null)
53
-    {
54
-        $this->_service = $service;
55
-        $this->_ident = $ident;
56
-        $this->_authInfo = $auth_info;
57
-    }
44
+	/**
45
+	 * Constructor.
46
+	 *
47
+	 * @param GeneralName $service
48
+	 * @param GeneralName $ident
49
+	 * @param string|null $auth_info
50
+	 */
51
+	public function __construct(GeneralName $service, GeneralName $ident,
52
+		$auth_info = null)
53
+	{
54
+		$this->_service = $service;
55
+		$this->_ident = $ident;
56
+		$this->_authInfo = $auth_info;
57
+	}
58 58
     
59
-    /**
60
-     *
61
-     * @param UnspecifiedType $el
62
-     * @return self
63
-     */
64
-    public static function fromASN1(UnspecifiedType $el): self
65
-    {
66
-        $seq = $el->asSequence();
67
-        $service = GeneralName::fromASN1($seq->at(0)->asTagged());
68
-        $ident = GeneralName::fromASN1($seq->at(1)->asTagged());
69
-        $auth_info = null;
70
-        if ($seq->has(2, Element::TYPE_OCTET_STRING)) {
71
-            $auth_info = $seq->at(2)
72
-                ->asString()
73
-                ->string();
74
-        }
75
-        return new static($service, $ident, $auth_info);
76
-    }
59
+	/**
60
+	 *
61
+	 * @param UnspecifiedType $el
62
+	 * @return self
63
+	 */
64
+	public static function fromASN1(UnspecifiedType $el): self
65
+	{
66
+		$seq = $el->asSequence();
67
+		$service = GeneralName::fromASN1($seq->at(0)->asTagged());
68
+		$ident = GeneralName::fromASN1($seq->at(1)->asTagged());
69
+		$auth_info = null;
70
+		if ($seq->has(2, Element::TYPE_OCTET_STRING)) {
71
+			$auth_info = $seq->at(2)
72
+				->asString()
73
+				->string();
74
+		}
75
+		return new static($service, $ident, $auth_info);
76
+	}
77 77
     
78
-    /**
79
-     * Get service name.
80
-     *
81
-     * @return GeneralName
82
-     */
83
-    public function service(): GeneralName
84
-    {
85
-        return $this->_service;
86
-    }
78
+	/**
79
+	 * Get service name.
80
+	 *
81
+	 * @return GeneralName
82
+	 */
83
+	public function service(): GeneralName
84
+	{
85
+		return $this->_service;
86
+	}
87 87
     
88
-    /**
89
-     * Get ident.
90
-     *
91
-     * @return GeneralName
92
-     */
93
-    public function ident(): GeneralName
94
-    {
95
-        return $this->_ident;
96
-    }
88
+	/**
89
+	 * Get ident.
90
+	 *
91
+	 * @return GeneralName
92
+	 */
93
+	public function ident(): GeneralName
94
+	{
95
+		return $this->_ident;
96
+	}
97 97
     
98
-    /**
99
-     * Check whether authentication info is present.
100
-     *
101
-     * @return bool
102
-     */
103
-    public function hasAuthInfo(): bool
104
-    {
105
-        return isset($this->_authInfo);
106
-    }
98
+	/**
99
+	 * Check whether authentication info is present.
100
+	 *
101
+	 * @return bool
102
+	 */
103
+	public function hasAuthInfo(): bool
104
+	{
105
+		return isset($this->_authInfo);
106
+	}
107 107
     
108
-    /**
109
-     * Get authentication info.
110
-     *
111
-     * @throws \LogicException
112
-     * @return string
113
-     */
114
-    public function authInfo(): string
115
-    {
116
-        if (!$this->hasAuthInfo()) {
117
-            throw new \LogicException("authInfo not set.");
118
-        }
119
-        return $this->_authInfo;
120
-    }
108
+	/**
109
+	 * Get authentication info.
110
+	 *
111
+	 * @throws \LogicException
112
+	 * @return string
113
+	 */
114
+	public function authInfo(): string
115
+	{
116
+		if (!$this->hasAuthInfo()) {
117
+			throw new \LogicException("authInfo not set.");
118
+		}
119
+		return $this->_authInfo;
120
+	}
121 121
     
122
-    /**
123
-     *
124
-     * @see \X501\ASN1\AttributeValue\AttributeValue::toASN1()
125
-     * @return Sequence
126
-     */
127
-    public function toASN1(): Sequence
128
-    {
129
-        $elements = array($this->_service->toASN1(), $this->_ident->toASN1());
130
-        if (isset($this->_authInfo)) {
131
-            $elements[] = new OctetString($this->_authInfo);
132
-        }
133
-        return new Sequence(...$elements);
134
-    }
122
+	/**
123
+	 *
124
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::toASN1()
125
+	 * @return Sequence
126
+	 */
127
+	public function toASN1(): Sequence
128
+	{
129
+		$elements = array($this->_service->toASN1(), $this->_ident->toASN1());
130
+		if (isset($this->_authInfo)) {
131
+			$elements[] = new OctetString($this->_authInfo);
132
+		}
133
+		return new Sequence(...$elements);
134
+	}
135 135
     
136
-    /**
137
-     *
138
-     * @see \X501\ASN1\AttributeValue\AttributeValue::stringValue()
139
-     * @return string
140
-     */
141
-    public function stringValue(): string
142
-    {
143
-        return "#" . bin2hex($this->toASN1()->toDER());
144
-    }
136
+	/**
137
+	 *
138
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::stringValue()
139
+	 * @return string
140
+	 */
141
+	public function stringValue(): string
142
+	{
143
+		return "#" . bin2hex($this->toASN1()->toDER());
144
+	}
145 145
     
146
-    /**
147
-     *
148
-     * @see \X501\ASN1\AttributeValue\AttributeValue::equalityMatchingRule()
149
-     * @return BinaryMatch
150
-     */
151
-    public function equalityMatchingRule(): BinaryMatch
152
-    {
153
-        return new BinaryMatch();
154
-    }
146
+	/**
147
+	 *
148
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::equalityMatchingRule()
149
+	 * @return BinaryMatch
150
+	 */
151
+	public function equalityMatchingRule(): BinaryMatch
152
+	{
153
+		return new BinaryMatch();
154
+	}
155 155
     
156
-    /**
157
-     *
158
-     * @see \X501\ASN1\AttributeValue\AttributeValue::rfc2253String()
159
-     * @return string
160
-     */
161
-    public function rfc2253String(): string
162
-    {
163
-        return $this->stringValue();
164
-    }
156
+	/**
157
+	 *
158
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::rfc2253String()
159
+	 * @return string
160
+	 */
161
+	public function rfc2253String(): string
162
+	{
163
+		return $this->stringValue();
164
+	}
165 165
     
166
-    /**
167
-     *
168
-     * @see \X501\ASN1\AttributeValue\AttributeValue::_transcodedString()
169
-     * @return string
170
-     */
171
-    protected function _transcodedString(): string
172
-    {
173
-        return $this->stringValue();
174
-    }
166
+	/**
167
+	 *
168
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::_transcodedString()
169
+	 * @return string
170
+	 */
171
+	protected function _transcodedString(): string
172
+	{
173
+		return $this->stringValue();
174
+	}
175 175
 }
Please login to merge, or discard this patch.
lib/X509/AttributeCertificate/Attribute/IetfAttrSyntax.php 1 patch
Indentation   +183 added lines, -183 removed lines patch added patch discarded remove patch
@@ -19,203 +19,203 @@
 block discarded – undo
19 19
  * @link https://tools.ietf.org/html/rfc5755#section-4.4
20 20
  */
21 21
 abstract class IetfAttrSyntax extends AttributeValue implements 
22
-    \Countable,
23
-    \IteratorAggregate
22
+	\Countable,
23
+	\IteratorAggregate
24 24
 {
25
-    /**
26
-     * Policy authority.
27
-     *
28
-     * @var GeneralNames|null $_policyAuthority
29
-     */
30
-    protected $_policyAuthority;
25
+	/**
26
+	 * Policy authority.
27
+	 *
28
+	 * @var GeneralNames|null $_policyAuthority
29
+	 */
30
+	protected $_policyAuthority;
31 31
     
32
-    /**
33
-     * Values.
34
-     *
35
-     * @var IetfAttrValue[] $_values
36
-     */
37
-    protected $_values;
32
+	/**
33
+	 * Values.
34
+	 *
35
+	 * @var IetfAttrValue[] $_values
36
+	 */
37
+	protected $_values;
38 38
     
39
-    /**
40
-     * Constructor.
41
-     *
42
-     * @param IetfAttrValue[] $values
43
-     */
44
-    public function __construct(IetfAttrValue ...$values)
45
-    {
46
-        $this->_policyAuthority = null;
47
-        $this->_values = $values;
48
-    }
39
+	/**
40
+	 * Constructor.
41
+	 *
42
+	 * @param IetfAttrValue[] $values
43
+	 */
44
+	public function __construct(IetfAttrValue ...$values)
45
+	{
46
+		$this->_policyAuthority = null;
47
+		$this->_values = $values;
48
+	}
49 49
     
50
-    /**
51
-     *
52
-     * @param UnspecifiedType $el
53
-     * @return self
54
-     */
55
-    public static function fromASN1(UnspecifiedType $el): self
56
-    {
57
-        $seq = $el->asSequence();
58
-        $authority = null;
59
-        $idx = 0;
60
-        if ($seq->hasTagged(0)) {
61
-            $authority = GeneralNames::fromASN1(
62
-                $seq->getTagged(0)
63
-                    ->asImplicit(Element::TYPE_SEQUENCE)
64
-                    ->asSequence());
65
-            ++$idx;
66
-        }
67
-        $values = array_map(
68
-            function (UnspecifiedType $el) {
69
-                return IetfAttrValue::fromASN1($el);
70
-            },
71
-            $seq->at($idx)
72
-                ->asSequence()
73
-                ->elements());
74
-        $obj = new static(...$values);
75
-        $obj->_policyAuthority = $authority;
76
-        return $obj;
77
-    }
50
+	/**
51
+	 *
52
+	 * @param UnspecifiedType $el
53
+	 * @return self
54
+	 */
55
+	public static function fromASN1(UnspecifiedType $el): self
56
+	{
57
+		$seq = $el->asSequence();
58
+		$authority = null;
59
+		$idx = 0;
60
+		if ($seq->hasTagged(0)) {
61
+			$authority = GeneralNames::fromASN1(
62
+				$seq->getTagged(0)
63
+					->asImplicit(Element::TYPE_SEQUENCE)
64
+					->asSequence());
65
+			++$idx;
66
+		}
67
+		$values = array_map(
68
+			function (UnspecifiedType $el) {
69
+				return IetfAttrValue::fromASN1($el);
70
+			},
71
+			$seq->at($idx)
72
+				->asSequence()
73
+				->elements());
74
+		$obj = new static(...$values);
75
+		$obj->_policyAuthority = $authority;
76
+		return $obj;
77
+	}
78 78
     
79
-    /**
80
-     * Get self with policy authority.
81
-     *
82
-     * @param GeneralNames $names
83
-     * @return self
84
-     */
85
-    public function withPolicyAuthority(GeneralNames $names): self
86
-    {
87
-        $obj = clone $this;
88
-        $obj->_policyAuthority = $names;
89
-        return $obj;
90
-    }
79
+	/**
80
+	 * Get self with policy authority.
81
+	 *
82
+	 * @param GeneralNames $names
83
+	 * @return self
84
+	 */
85
+	public function withPolicyAuthority(GeneralNames $names): self
86
+	{
87
+		$obj = clone $this;
88
+		$obj->_policyAuthority = $names;
89
+		return $obj;
90
+	}
91 91
     
92
-    /**
93
-     * Check whether policy authority is present.
94
-     *
95
-     * @return bool
96
-     */
97
-    public function hasPolicyAuthority(): bool
98
-    {
99
-        return isset($this->_policyAuthority);
100
-    }
92
+	/**
93
+	 * Check whether policy authority is present.
94
+	 *
95
+	 * @return bool
96
+	 */
97
+	public function hasPolicyAuthority(): bool
98
+	{
99
+		return isset($this->_policyAuthority);
100
+	}
101 101
     
102
-    /**
103
-     * Get policy authority.
104
-     *
105
-     * @throws \LogicException
106
-     * @return GeneralNames
107
-     */
108
-    public function policyAuthority(): GeneralNames
109
-    {
110
-        if (!$this->hasPolicyAuthority()) {
111
-            throw new \LogicException("policyAuthority not set.");
112
-        }
113
-        return $this->_policyAuthority;
114
-    }
102
+	/**
103
+	 * Get policy authority.
104
+	 *
105
+	 * @throws \LogicException
106
+	 * @return GeneralNames
107
+	 */
108
+	public function policyAuthority(): GeneralNames
109
+	{
110
+		if (!$this->hasPolicyAuthority()) {
111
+			throw new \LogicException("policyAuthority not set.");
112
+		}
113
+		return $this->_policyAuthority;
114
+	}
115 115
     
116
-    /**
117
-     * Get values.
118
-     *
119
-     * @return IetfAttrValue[]
120
-     */
121
-    public function values(): array
122
-    {
123
-        return $this->_values;
124
-    }
116
+	/**
117
+	 * Get values.
118
+	 *
119
+	 * @return IetfAttrValue[]
120
+	 */
121
+	public function values(): array
122
+	{
123
+		return $this->_values;
124
+	}
125 125
     
126
-    /**
127
-     * Get first value.
128
-     *
129
-     * @throws \LogicException
130
-     * @return IetfAttrValue
131
-     */
132
-    public function first(): IetfAttrValue
133
-    {
134
-        if (!count($this->_values)) {
135
-            throw new \LogicException("No values.");
136
-        }
137
-        return $this->_values[0];
138
-    }
126
+	/**
127
+	 * Get first value.
128
+	 *
129
+	 * @throws \LogicException
130
+	 * @return IetfAttrValue
131
+	 */
132
+	public function first(): IetfAttrValue
133
+	{
134
+		if (!count($this->_values)) {
135
+			throw new \LogicException("No values.");
136
+		}
137
+		return $this->_values[0];
138
+	}
139 139
     
140
-    /**
141
-     *
142
-     * @see \X501\ASN1\AttributeValue\AttributeValue::toASN1()
143
-     * @return Sequence
144
-     */
145
-    public function toASN1(): Sequence
146
-    {
147
-        $elements = array();
148
-        if (isset($this->_policyAuthority)) {
149
-            $elements[] = new ImplicitlyTaggedType(0,
150
-                $this->_policyAuthority->toASN1());
151
-        }
152
-        $values = array_map(
153
-            function (IetfAttrValue $val) {
154
-                return $val->toASN1();
155
-            }, $this->_values);
156
-        $elements[] = new Sequence(...$values);
157
-        return new Sequence(...$elements);
158
-    }
140
+	/**
141
+	 *
142
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::toASN1()
143
+	 * @return Sequence
144
+	 */
145
+	public function toASN1(): Sequence
146
+	{
147
+		$elements = array();
148
+		if (isset($this->_policyAuthority)) {
149
+			$elements[] = new ImplicitlyTaggedType(0,
150
+				$this->_policyAuthority->toASN1());
151
+		}
152
+		$values = array_map(
153
+			function (IetfAttrValue $val) {
154
+				return $val->toASN1();
155
+			}, $this->_values);
156
+		$elements[] = new Sequence(...$values);
157
+		return new Sequence(...$elements);
158
+	}
159 159
     
160
-    /**
161
-     *
162
-     * @see \X501\ASN1\AttributeValue\AttributeValue::stringValue()
163
-     * @return string
164
-     */
165
-    public function stringValue(): string
166
-    {
167
-        return "#" . bin2hex($this->toASN1()->toDER());
168
-    }
160
+	/**
161
+	 *
162
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::stringValue()
163
+	 * @return string
164
+	 */
165
+	public function stringValue(): string
166
+	{
167
+		return "#" . bin2hex($this->toASN1()->toDER());
168
+	}
169 169
     
170
-    /**
171
-     *
172
-     * @see \X501\ASN1\AttributeValue\AttributeValue::equalityMatchingRule()
173
-     * @return BinaryMatch
174
-     */
175
-    public function equalityMatchingRule(): BinaryMatch
176
-    {
177
-        return new BinaryMatch();
178
-    }
170
+	/**
171
+	 *
172
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::equalityMatchingRule()
173
+	 * @return BinaryMatch
174
+	 */
175
+	public function equalityMatchingRule(): BinaryMatch
176
+	{
177
+		return new BinaryMatch();
178
+	}
179 179
     
180
-    /**
181
-     *
182
-     * @see \X501\ASN1\AttributeValue\AttributeValue::rfc2253String()
183
-     * @return string
184
-     */
185
-    public function rfc2253String(): string
186
-    {
187
-        return $this->stringValue();
188
-    }
180
+	/**
181
+	 *
182
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::rfc2253String()
183
+	 * @return string
184
+	 */
185
+	public function rfc2253String(): string
186
+	{
187
+		return $this->stringValue();
188
+	}
189 189
     
190
-    /**
191
-     *
192
-     * @see \X501\ASN1\AttributeValue\AttributeValue::_transcodedString()
193
-     * @return string
194
-     */
195
-    protected function _transcodedString(): string
196
-    {
197
-        return $this->stringValue();
198
-    }
190
+	/**
191
+	 *
192
+	 * @see \X501\ASN1\AttributeValue\AttributeValue::_transcodedString()
193
+	 * @return string
194
+	 */
195
+	protected function _transcodedString(): string
196
+	{
197
+		return $this->stringValue();
198
+	}
199 199
     
200
-    /**
201
-     * Get number of values.
202
-     *
203
-     * @see \Countable::count()
204
-     * @return int
205
-     */
206
-    public function count(): int
207
-    {
208
-        return count($this->_values);
209
-    }
200
+	/**
201
+	 * Get number of values.
202
+	 *
203
+	 * @see \Countable::count()
204
+	 * @return int
205
+	 */
206
+	public function count(): int
207
+	{
208
+		return count($this->_values);
209
+	}
210 210
     
211
-    /**
212
-     * Get iterator for values.
213
-     *
214
-     * @see \IteratorAggregate::getIterator()
215
-     * @return \ArrayIterator
216
-     */
217
-    public function getIterator(): \ArrayIterator
218
-    {
219
-        return new \ArrayIterator($this->_values);
220
-    }
211
+	/**
212
+	 * Get iterator for values.
213
+	 *
214
+	 * @see \IteratorAggregate::getIterator()
215
+	 * @return \ArrayIterator
216
+	 */
217
+	public function getIterator(): \ArrayIterator
218
+	{
219
+		return new \ArrayIterator($this->_values);
220
+	}
221 221
 }
Please login to merge, or discard this patch.
lib/X509/AttributeCertificate/Attribute/IetfAttrValue.php 1 patch
Indentation   +144 added lines, -144 removed lines patch added patch discarded remove patch
@@ -17,161 +17,161 @@
 block discarded – undo
17 17
  */
18 18
 class IetfAttrValue
19 19
 {
20
-    /**
21
-     * Element type tag.
22
-     *
23
-     * @var int $_type
24
-     */
25
-    protected $_type;
20
+	/**
21
+	 * Element type tag.
22
+	 *
23
+	 * @var int $_type
24
+	 */
25
+	protected $_type;
26 26
     
27
-    /**
28
-     * Value.
29
-     *
30
-     * @var string $_value
31
-     */
32
-    protected $_value;
27
+	/**
28
+	 * Value.
29
+	 *
30
+	 * @var string $_value
31
+	 */
32
+	protected $_value;
33 33
     
34
-    /**
35
-     * Constructor.
36
-     *
37
-     * @param string $value
38
-     * @param int $type
39
-     */
40
-    public function __construct(string $value, int $type)
41
-    {
42
-        $this->_type = $type;
43
-        $this->_value = $value;
44
-    }
34
+	/**
35
+	 * Constructor.
36
+	 *
37
+	 * @param string $value
38
+	 * @param int $type
39
+	 */
40
+	public function __construct(string $value, int $type)
41
+	{
42
+		$this->_type = $type;
43
+		$this->_value = $value;
44
+	}
45 45
     
46
-    /**
47
-     * Initialize from ASN.1.
48
-     *
49
-     * @param UnspecifiedType $el
50
-     * @throws \UnexpectedValueException
51
-     * @return self
52
-     */
53
-    public static function fromASN1(UnspecifiedType $el): self
54
-    {
55
-        switch ($el->tag()) {
56
-            case Element::TYPE_OCTET_STRING:
57
-            case Element::TYPE_UTF8_STRING:
58
-                return new self($el->asString()->string(), $el->tag());
59
-            case Element::TYPE_OBJECT_IDENTIFIER:
60
-                return new self($el->asObjectIdentifier()->oid(), $el->tag());
61
-        }
62
-        throw new \UnexpectedValueException(
63
-            "Type " . Element::tagToName($el->tag()) . " not supported.");
64
-    }
46
+	/**
47
+	 * Initialize from ASN.1.
48
+	 *
49
+	 * @param UnspecifiedType $el
50
+	 * @throws \UnexpectedValueException
51
+	 * @return self
52
+	 */
53
+	public static function fromASN1(UnspecifiedType $el): self
54
+	{
55
+		switch ($el->tag()) {
56
+			case Element::TYPE_OCTET_STRING:
57
+			case Element::TYPE_UTF8_STRING:
58
+				return new self($el->asString()->string(), $el->tag());
59
+			case Element::TYPE_OBJECT_IDENTIFIER:
60
+				return new self($el->asObjectIdentifier()->oid(), $el->tag());
61
+		}
62
+		throw new \UnexpectedValueException(
63
+			"Type " . Element::tagToName($el->tag()) . " not supported.");
64
+	}
65 65
     
66
-    /**
67
-     * Initialize from octet string.
68
-     *
69
-     * @param string $octets
70
-     * @return self
71
-     */
72
-    public static function fromOctets(string $octets): self
73
-    {
74
-        return new self($octets, Element::TYPE_OCTET_STRING);
75
-    }
66
+	/**
67
+	 * Initialize from octet string.
68
+	 *
69
+	 * @param string $octets
70
+	 * @return self
71
+	 */
72
+	public static function fromOctets(string $octets): self
73
+	{
74
+		return new self($octets, Element::TYPE_OCTET_STRING);
75
+	}
76 76
     
77
-    /**
78
-     * Initialize from UTF-8 string.
79
-     *
80
-     * @param string $str
81
-     * @return self
82
-     */
83
-    public static function fromString(string $str): self
84
-    {
85
-        return new self($str, Element::TYPE_UTF8_STRING);
86
-    }
77
+	/**
78
+	 * Initialize from UTF-8 string.
79
+	 *
80
+	 * @param string $str
81
+	 * @return self
82
+	 */
83
+	public static function fromString(string $str): self
84
+	{
85
+		return new self($str, Element::TYPE_UTF8_STRING);
86
+	}
87 87
     
88
-    /**
89
-     * Initialize from OID.
90
-     *
91
-     * @param string $oid
92
-     * @return self
93
-     */
94
-    public static function fromOID(string $oid): self
95
-    {
96
-        return new self($oid, Element::TYPE_OBJECT_IDENTIFIER);
97
-    }
88
+	/**
89
+	 * Initialize from OID.
90
+	 *
91
+	 * @param string $oid
92
+	 * @return self
93
+	 */
94
+	public static function fromOID(string $oid): self
95
+	{
96
+		return new self($oid, Element::TYPE_OBJECT_IDENTIFIER);
97
+	}
98 98
     
99
-    /**
100
-     * Get type tag.
101
-     *
102
-     * @return int
103
-     */
104
-    public function type(): int
105
-    {
106
-        return $this->_type;
107
-    }
99
+	/**
100
+	 * Get type tag.
101
+	 *
102
+	 * @return int
103
+	 */
104
+	public function type(): int
105
+	{
106
+		return $this->_type;
107
+	}
108 108
     
109
-    /**
110
-     * Whether value type is octets.
111
-     *
112
-     * @return bool
113
-     */
114
-    public function isOctets(): bool
115
-    {
116
-        return $this->_type === Element::TYPE_OCTET_STRING;
117
-    }
109
+	/**
110
+	 * Whether value type is octets.
111
+	 *
112
+	 * @return bool
113
+	 */
114
+	public function isOctets(): bool
115
+	{
116
+		return $this->_type === Element::TYPE_OCTET_STRING;
117
+	}
118 118
     
119
-    /**
120
-     * Whether value type is OID.
121
-     *
122
-     * @return bool
123
-     */
124
-    public function isOID(): bool
125
-    {
126
-        return $this->_type === Element::TYPE_OBJECT_IDENTIFIER;
127
-    }
119
+	/**
120
+	 * Whether value type is OID.
121
+	 *
122
+	 * @return bool
123
+	 */
124
+	public function isOID(): bool
125
+	{
126
+		return $this->_type === Element::TYPE_OBJECT_IDENTIFIER;
127
+	}
128 128
     
129
-    /**
130
-     * Whether value type is string.
131
-     *
132
-     * @return bool
133
-     */
134
-    public function isString(): bool
135
-    {
136
-        return $this->_type === Element::TYPE_UTF8_STRING;
137
-    }
129
+	/**
130
+	 * Whether value type is string.
131
+	 *
132
+	 * @return bool
133
+	 */
134
+	public function isString(): bool
135
+	{
136
+		return $this->_type === Element::TYPE_UTF8_STRING;
137
+	}
138 138
     
139
-    /**
140
-     * Get value.
141
-     *
142
-     * @return string
143
-     */
144
-    public function value(): string
145
-    {
146
-        return $this->_value;
147
-    }
139
+	/**
140
+	 * Get value.
141
+	 *
142
+	 * @return string
143
+	 */
144
+	public function value(): string
145
+	{
146
+		return $this->_value;
147
+	}
148 148
     
149
-    /**
150
-     * Generate ASN.1 structure.
151
-     *
152
-     * @throws \LogicException
153
-     * @return Element
154
-     */
155
-    public function toASN1(): Element
156
-    {
157
-        switch ($this->_type) {
158
-            case Element::TYPE_OCTET_STRING:
159
-                return new OctetString($this->_value);
160
-            case Element::TYPE_UTF8_STRING:
161
-                return new UTF8String($this->_value);
162
-            case Element::TYPE_OBJECT_IDENTIFIER:
163
-                return new ObjectIdentifier($this->_value);
164
-        }
165
-        throw new \LogicException(
166
-            "Type " . Element::tagToName($this->_type) . " not supported.");
167
-    }
149
+	/**
150
+	 * Generate ASN.1 structure.
151
+	 *
152
+	 * @throws \LogicException
153
+	 * @return Element
154
+	 */
155
+	public function toASN1(): Element
156
+	{
157
+		switch ($this->_type) {
158
+			case Element::TYPE_OCTET_STRING:
159
+				return new OctetString($this->_value);
160
+			case Element::TYPE_UTF8_STRING:
161
+				return new UTF8String($this->_value);
162
+			case Element::TYPE_OBJECT_IDENTIFIER:
163
+				return new ObjectIdentifier($this->_value);
164
+		}
165
+		throw new \LogicException(
166
+			"Type " . Element::tagToName($this->_type) . " not supported.");
167
+	}
168 168
     
169
-    /**
170
-     *
171
-     * @return string
172
-     */
173
-    public function __toString()
174
-    {
175
-        return $this->_value;
176
-    }
169
+	/**
170
+	 *
171
+	 * @return string
172
+	 */
173
+	public function __toString()
174
+	{
175
+		return $this->_value;
176
+	}
177 177
 }
Please login to merge, or discard this patch.
lib/X509/AttributeCertificate/Holder.php 1 patch
Indentation   +259 added lines, -259 removed lines patch added patch discarded remove patch
@@ -19,281 +19,281 @@
 block discarded – undo
19 19
  */
20 20
 class Holder
21 21
 {
22
-    /**
23
-     * Holder PKC's issuer and serial.
24
-     *
25
-     * @var IssuerSerial|null $_baseCertificateID
26
-     */
27
-    protected $_baseCertificateID;
22
+	/**
23
+	 * Holder PKC's issuer and serial.
24
+	 *
25
+	 * @var IssuerSerial|null $_baseCertificateID
26
+	 */
27
+	protected $_baseCertificateID;
28 28
     
29
-    /**
30
-     * Holder PKC's subject.
31
-     *
32
-     * @var GeneralNames|null $_entityName
33
-     */
34
-    protected $_entityName;
29
+	/**
30
+	 * Holder PKC's subject.
31
+	 *
32
+	 * @var GeneralNames|null $_entityName
33
+	 */
34
+	protected $_entityName;
35 35
     
36
-    /**
37
-     * Linked object.
38
-     *
39
-     * @var ObjectDigestInfo|null $_objectDigestInfo
40
-     */
41
-    protected $_objectDigestInfo;
36
+	/**
37
+	 * Linked object.
38
+	 *
39
+	 * @var ObjectDigestInfo|null $_objectDigestInfo
40
+	 */
41
+	protected $_objectDigestInfo;
42 42
     
43
-    /**
44
-     * Constructor.
45
-     *
46
-     * @param IssuerSerial|null $issuer_serial
47
-     * @param GeneralNames|null $entity_name
48
-     */
49
-    public function __construct(IssuerSerial $issuer_serial = null,
50
-        GeneralNames $entity_name = null)
51
-    {
52
-        $this->_baseCertificateID = $issuer_serial;
53
-        $this->_entityName = $entity_name;
54
-    }
43
+	/**
44
+	 * Constructor.
45
+	 *
46
+	 * @param IssuerSerial|null $issuer_serial
47
+	 * @param GeneralNames|null $entity_name
48
+	 */
49
+	public function __construct(IssuerSerial $issuer_serial = null,
50
+		GeneralNames $entity_name = null)
51
+	{
52
+		$this->_baseCertificateID = $issuer_serial;
53
+		$this->_entityName = $entity_name;
54
+	}
55 55
     
56
-    /**
57
-     * Initialize from a holder's public key certificate.
58
-     *
59
-     * @param Certificate $cert
60
-     * @return self
61
-     */
62
-    public static function fromPKC(Certificate $cert): self
63
-    {
64
-        return new self(IssuerSerial::fromPKC($cert));
65
-    }
56
+	/**
57
+	 * Initialize from a holder's public key certificate.
58
+	 *
59
+	 * @param Certificate $cert
60
+	 * @return self
61
+	 */
62
+	public static function fromPKC(Certificate $cert): self
63
+	{
64
+		return new self(IssuerSerial::fromPKC($cert));
65
+	}
66 66
     
67
-    /**
68
-     * Initialize from ASN.1.
69
-     *
70
-     * @param Sequence $seq
71
-     */
72
-    public static function fromASN1(Sequence $seq): self
73
-    {
74
-        $cert_id = null;
75
-        $entity_name = null;
76
-        $digest_info = null;
77
-        if ($seq->hasTagged(0)) {
78
-            $cert_id = IssuerSerial::fromASN1(
79
-                $seq->getTagged(0)
80
-                    ->asImplicit(Element::TYPE_SEQUENCE)
81
-                    ->asSequence());
82
-        }
83
-        if ($seq->hasTagged(1)) {
84
-            $entity_name = GeneralNames::fromASN1(
85
-                $seq->getTagged(1)
86
-                    ->asImplicit(Element::TYPE_SEQUENCE)
87
-                    ->asSequence());
88
-        }
89
-        if ($seq->hasTagged(2)) {
90
-            $digest_info = ObjectDigestInfo::fromASN1(
91
-                $seq->getTagged(2)
92
-                    ->asImplicit(Element::TYPE_SEQUENCE)
93
-                    ->asSequence());
94
-        }
95
-        $obj = new self($cert_id, $entity_name);
96
-        $obj->_objectDigestInfo = $digest_info;
97
-        return $obj;
98
-    }
67
+	/**
68
+	 * Initialize from ASN.1.
69
+	 *
70
+	 * @param Sequence $seq
71
+	 */
72
+	public static function fromASN1(Sequence $seq): self
73
+	{
74
+		$cert_id = null;
75
+		$entity_name = null;
76
+		$digest_info = null;
77
+		if ($seq->hasTagged(0)) {
78
+			$cert_id = IssuerSerial::fromASN1(
79
+				$seq->getTagged(0)
80
+					->asImplicit(Element::TYPE_SEQUENCE)
81
+					->asSequence());
82
+		}
83
+		if ($seq->hasTagged(1)) {
84
+			$entity_name = GeneralNames::fromASN1(
85
+				$seq->getTagged(1)
86
+					->asImplicit(Element::TYPE_SEQUENCE)
87
+					->asSequence());
88
+		}
89
+		if ($seq->hasTagged(2)) {
90
+			$digest_info = ObjectDigestInfo::fromASN1(
91
+				$seq->getTagged(2)
92
+					->asImplicit(Element::TYPE_SEQUENCE)
93
+					->asSequence());
94
+		}
95
+		$obj = new self($cert_id, $entity_name);
96
+		$obj->_objectDigestInfo = $digest_info;
97
+		return $obj;
98
+	}
99 99
     
100
-    /**
101
-     * Get self with base certificate ID.
102
-     *
103
-     * @param IssuerSerial $issuer
104
-     * @return self
105
-     */
106
-    public function withBaseCertificateID(IssuerSerial $issuer): self
107
-    {
108
-        $obj = clone $this;
109
-        $obj->_baseCertificateID = $issuer;
110
-        return $obj;
111
-    }
100
+	/**
101
+	 * Get self with base certificate ID.
102
+	 *
103
+	 * @param IssuerSerial $issuer
104
+	 * @return self
105
+	 */
106
+	public function withBaseCertificateID(IssuerSerial $issuer): self
107
+	{
108
+		$obj = clone $this;
109
+		$obj->_baseCertificateID = $issuer;
110
+		return $obj;
111
+	}
112 112
     
113
-    /**
114
-     * Get self with entity name.
115
-     *
116
-     * @param GeneralNames $names
117
-     * @return self
118
-     */
119
-    public function withEntityName(GeneralNames $names): self
120
-    {
121
-        $obj = clone $this;
122
-        $obj->_entityName = $names;
123
-        return $obj;
124
-    }
113
+	/**
114
+	 * Get self with entity name.
115
+	 *
116
+	 * @param GeneralNames $names
117
+	 * @return self
118
+	 */
119
+	public function withEntityName(GeneralNames $names): self
120
+	{
121
+		$obj = clone $this;
122
+		$obj->_entityName = $names;
123
+		return $obj;
124
+	}
125 125
     
126
-    /**
127
-     * Get self with object digest info.
128
-     *
129
-     * @param ObjectDigestInfo $odi
130
-     * @return self
131
-     */
132
-    public function withObjectDigestInfo(ObjectDigestInfo $odi): self
133
-    {
134
-        $obj = clone $this;
135
-        $obj->_objectDigestInfo = $odi;
136
-        return $obj;
137
-    }
126
+	/**
127
+	 * Get self with object digest info.
128
+	 *
129
+	 * @param ObjectDigestInfo $odi
130
+	 * @return self
131
+	 */
132
+	public function withObjectDigestInfo(ObjectDigestInfo $odi): self
133
+	{
134
+		$obj = clone $this;
135
+		$obj->_objectDigestInfo = $odi;
136
+		return $obj;
137
+	}
138 138
     
139
-    /**
140
-     * Check whether base certificate ID is present.
141
-     *
142
-     * @return bool
143
-     */
144
-    public function hasBaseCertificateID(): bool
145
-    {
146
-        return isset($this->_baseCertificateID);
147
-    }
139
+	/**
140
+	 * Check whether base certificate ID is present.
141
+	 *
142
+	 * @return bool
143
+	 */
144
+	public function hasBaseCertificateID(): bool
145
+	{
146
+		return isset($this->_baseCertificateID);
147
+	}
148 148
     
149
-    /**
150
-     * Get base certificate ID.
151
-     *
152
-     * @throws \LogicException
153
-     * @return IssuerSerial
154
-     */
155
-    public function baseCertificateID(): IssuerSerial
156
-    {
157
-        if (!$this->hasBaseCertificateID()) {
158
-            throw new \LogicException("baseCertificateID not set.");
159
-        }
160
-        return $this->_baseCertificateID;
161
-    }
149
+	/**
150
+	 * Get base certificate ID.
151
+	 *
152
+	 * @throws \LogicException
153
+	 * @return IssuerSerial
154
+	 */
155
+	public function baseCertificateID(): IssuerSerial
156
+	{
157
+		if (!$this->hasBaseCertificateID()) {
158
+			throw new \LogicException("baseCertificateID not set.");
159
+		}
160
+		return $this->_baseCertificateID;
161
+	}
162 162
     
163
-    /**
164
-     * Check whether entity name is present.
165
-     *
166
-     * @return bool
167
-     */
168
-    public function hasEntityName(): bool
169
-    {
170
-        return isset($this->_entityName);
171
-    }
163
+	/**
164
+	 * Check whether entity name is present.
165
+	 *
166
+	 * @return bool
167
+	 */
168
+	public function hasEntityName(): bool
169
+	{
170
+		return isset($this->_entityName);
171
+	}
172 172
     
173
-    /**
174
-     * Get entity name.
175
-     *
176
-     * @throws \LogicException
177
-     * @return GeneralNames
178
-     */
179
-    public function entityName(): GeneralNames
180
-    {
181
-        if (!$this->hasEntityName()) {
182
-            throw new \LogicException("entityName not set.");
183
-        }
184
-        return $this->_entityName;
185
-    }
173
+	/**
174
+	 * Get entity name.
175
+	 *
176
+	 * @throws \LogicException
177
+	 * @return GeneralNames
178
+	 */
179
+	public function entityName(): GeneralNames
180
+	{
181
+		if (!$this->hasEntityName()) {
182
+			throw new \LogicException("entityName not set.");
183
+		}
184
+		return $this->_entityName;
185
+	}
186 186
     
187
-    /**
188
-     * Check whether object digest info is present.
189
-     *
190
-     * @return bool
191
-     */
192
-    public function hasObjectDigestInfo(): bool
193
-    {
194
-        return isset($this->_objectDigestInfo);
195
-    }
187
+	/**
188
+	 * Check whether object digest info is present.
189
+	 *
190
+	 * @return bool
191
+	 */
192
+	public function hasObjectDigestInfo(): bool
193
+	{
194
+		return isset($this->_objectDigestInfo);
195
+	}
196 196
     
197
-    /**
198
-     * Get object digest info.
199
-     *
200
-     * @throws \LogicException
201
-     * @return ObjectDigestInfo
202
-     */
203
-    public function objectDigestInfo(): ObjectDigestInfo
204
-    {
205
-        if (!$this->hasObjectDigestInfo()) {
206
-            throw new \LogicException("objectDigestInfo not set.");
207
-        }
208
-        return $this->_objectDigestInfo;
209
-    }
197
+	/**
198
+	 * Get object digest info.
199
+	 *
200
+	 * @throws \LogicException
201
+	 * @return ObjectDigestInfo
202
+	 */
203
+	public function objectDigestInfo(): ObjectDigestInfo
204
+	{
205
+		if (!$this->hasObjectDigestInfo()) {
206
+			throw new \LogicException("objectDigestInfo not set.");
207
+		}
208
+		return $this->_objectDigestInfo;
209
+	}
210 210
     
211
-    /**
212
-     * Generate ASN.1 structure.
213
-     *
214
-     * @return Sequence
215
-     */
216
-    public function toASN1(): Sequence
217
-    {
218
-        $elements = [];
219
-        if (isset($this->_baseCertificateID)) {
220
-            $elements[] = new ImplicitlyTaggedType(0,
221
-                $this->_baseCertificateID->toASN1());
222
-        }
223
-        if (isset($this->_entityName)) {
224
-            $elements[] = new ImplicitlyTaggedType(1,
225
-                $this->_entityName->toASN1());
226
-        }
227
-        if (isset($this->_objectDigestInfo)) {
228
-            $elements[] = new ImplicitlyTaggedType(2,
229
-                $this->_objectDigestInfo->toASN1());
230
-        }
231
-        return new Sequence(...$elements);
232
-    }
211
+	/**
212
+	 * Generate ASN.1 structure.
213
+	 *
214
+	 * @return Sequence
215
+	 */
216
+	public function toASN1(): Sequence
217
+	{
218
+		$elements = [];
219
+		if (isset($this->_baseCertificateID)) {
220
+			$elements[] = new ImplicitlyTaggedType(0,
221
+				$this->_baseCertificateID->toASN1());
222
+		}
223
+		if (isset($this->_entityName)) {
224
+			$elements[] = new ImplicitlyTaggedType(1,
225
+				$this->_entityName->toASN1());
226
+		}
227
+		if (isset($this->_objectDigestInfo)) {
228
+			$elements[] = new ImplicitlyTaggedType(2,
229
+				$this->_objectDigestInfo->toASN1());
230
+		}
231
+		return new Sequence(...$elements);
232
+	}
233 233
     
234
-    /**
235
-     * Check whether Holder identifies given certificate.
236
-     *
237
-     * @param Certificate $cert
238
-     * @return boolean
239
-     */
240
-    public function identifiesPKC(Certificate $cert): bool
241
-    {
242
-        // if neither baseCertificateID nor entityName are present
243
-        if (!$this->_baseCertificateID && !$this->_entityName) {
244
-            return false;
245
-        }
246
-        // if baseCertificateID is present, but doesn't match
247
-        if ($this->_baseCertificateID &&
248
-             !$this->_baseCertificateID->identifiesPKC($cert)) {
249
-            return false;
250
-        }
251
-        // if entityName is present, but doesn't match
252
-        if ($this->_entityName && !$this->_checkEntityName($cert)) {
253
-            return false;
254
-        }
255
-        return true;
256
-    }
234
+	/**
235
+	 * Check whether Holder identifies given certificate.
236
+	 *
237
+	 * @param Certificate $cert
238
+	 * @return boolean
239
+	 */
240
+	public function identifiesPKC(Certificate $cert): bool
241
+	{
242
+		// if neither baseCertificateID nor entityName are present
243
+		if (!$this->_baseCertificateID && !$this->_entityName) {
244
+			return false;
245
+		}
246
+		// if baseCertificateID is present, but doesn't match
247
+		if ($this->_baseCertificateID &&
248
+			 !$this->_baseCertificateID->identifiesPKC($cert)) {
249
+			return false;
250
+		}
251
+		// if entityName is present, but doesn't match
252
+		if ($this->_entityName && !$this->_checkEntityName($cert)) {
253
+			return false;
254
+		}
255
+		return true;
256
+	}
257 257
     
258
-    /**
259
-     * Check whether entityName matches the given certificate.
260
-     *
261
-     * @param Certificate $cert
262
-     * @return boolean
263
-     */
264
-    private function _checkEntityName(Certificate $cert): bool
265
-    {
266
-        $name = $this->_entityName->firstDN();
267
-        if ($cert->tbsCertificate()
268
-            ->subject()
269
-            ->equals($name)) {
270
-            return true;
271
-        }
272
-        $exts = $cert->tbsCertificate()->extensions();
273
-        if ($exts->hasSubjectAlternativeName()) {
274
-            $ext = $exts->subjectAlternativeName();
275
-            if ($this->_checkEntityAlternativeNames($ext->names())) {
276
-                return true;
277
-            }
278
-        }
279
-        return false;
280
-    }
258
+	/**
259
+	 * Check whether entityName matches the given certificate.
260
+	 *
261
+	 * @param Certificate $cert
262
+	 * @return boolean
263
+	 */
264
+	private function _checkEntityName(Certificate $cert): bool
265
+	{
266
+		$name = $this->_entityName->firstDN();
267
+		if ($cert->tbsCertificate()
268
+			->subject()
269
+			->equals($name)) {
270
+			return true;
271
+		}
272
+		$exts = $cert->tbsCertificate()->extensions();
273
+		if ($exts->hasSubjectAlternativeName()) {
274
+			$ext = $exts->subjectAlternativeName();
275
+			if ($this->_checkEntityAlternativeNames($ext->names())) {
276
+				return true;
277
+			}
278
+		}
279
+		return false;
280
+	}
281 281
     
282
-    /**
283
-     * Check whether any of the subject alternative names match entityName.
284
-     *
285
-     * @param GeneralNames $san
286
-     * @return boolean
287
-     */
288
-    private function _checkEntityAlternativeNames(GeneralNames $san): bool
289
-    {
290
-        // only directory names supported for now
291
-        $name = $this->_entityName->firstDN();
292
-        foreach ($san->allOf(GeneralName::TAG_DIRECTORY_NAME) as $dn) {
293
-            if ($dn instanceof DirectoryName && $dn->dn()->equals($name)) {
294
-                return true;
295
-            }
296
-        }
297
-        return false;
298
-    }
282
+	/**
283
+	 * Check whether any of the subject alternative names match entityName.
284
+	 *
285
+	 * @param GeneralNames $san
286
+	 * @return boolean
287
+	 */
288
+	private function _checkEntityAlternativeNames(GeneralNames $san): bool
289
+	{
290
+		// only directory names supported for now
291
+		$name = $this->_entityName->firstDN();
292
+		foreach ($san->allOf(GeneralName::TAG_DIRECTORY_NAME) as $dn) {
293
+			if ($dn instanceof DirectoryName && $dn->dn()->equals($name)) {
294
+				return true;
295
+			}
296
+		}
297
+		return false;
298
+	}
299 299
 }
Please login to merge, or discard this patch.