GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Push — master ( ff3a63...584877 )
by Joni
04:52
created
lib/X509/CertificationPath/PathValidation/PathValidator.php 2 patches
Doc Comments   +1 added lines patch added patch discarded remove patch
@@ -50,6 +50,7 @@
 block discarded – undo
50 50
      * @param PathValidationConfig $config Validation config
51 51
      * @param Certificate ...$certificates Certificates from the trust anchor to
52 52
      *            the end-entity certificate
53
+     * @param Certificate[] $certificates
53 54
      */
54 55
     public function __construct(Crypto $crypto, PathValidationConfig $config,
55 56
         Certificate ...$certificates)
Please login to merge, or discard this patch.
Indentation   +553 added lines, -553 removed lines patch added patch discarded remove patch
@@ -15,584 +15,584 @@
 block discarded – undo
15 15
  */
16 16
 class PathValidator
17 17
 {
18
-    /**
19
-     * Crypto engine.
20
-     *
21
-     * @var Crypto $_crypto
22
-     */
23
-    protected $_crypto;
18
+	/**
19
+	 * Crypto engine.
20
+	 *
21
+	 * @var Crypto $_crypto
22
+	 */
23
+	protected $_crypto;
24 24
     
25
-    /**
26
-     * Path validation configuration.
27
-     *
28
-     * @var PathValidationConfig $_config
29
-     */
30
-    protected $_config;
25
+	/**
26
+	 * Path validation configuration.
27
+	 *
28
+	 * @var PathValidationConfig $_config
29
+	 */
30
+	protected $_config;
31 31
     
32
-    /**
33
-     * Certification path.
34
-     *
35
-     * @var Certificate[] $_certificates
36
-     */
37
-    protected $_certificates;
32
+	/**
33
+	 * Certification path.
34
+	 *
35
+	 * @var Certificate[] $_certificates
36
+	 */
37
+	protected $_certificates;
38 38
     
39
-    /**
40
-     * Certification path trust anchor.
41
-     *
42
-     * @var Certificate $_trustAnchor
43
-     */
44
-    protected $_trustAnchor;
39
+	/**
40
+	 * Certification path trust anchor.
41
+	 *
42
+	 * @var Certificate $_trustAnchor
43
+	 */
44
+	protected $_trustAnchor;
45 45
     
46
-    /**
47
-     * Constructor.
48
-     *
49
-     * @param Crypto $crypto Crypto engine
50
-     * @param PathValidationConfig $config Validation config
51
-     * @param Certificate ...$certificates Certificates from the trust anchor to
52
-     *            the end-entity certificate
53
-     */
54
-    public function __construct(Crypto $crypto, PathValidationConfig $config,
55
-        Certificate ...$certificates)
56
-    {
57
-        if (!count($certificates)) {
58
-            throw new \LogicException("No certificates.");
59
-        }
60
-        $this->_crypto = $crypto;
61
-        $this->_config = $config;
62
-        $this->_certificates = $certificates;
63
-        // if trust anchor is explicitly given in configuration
64
-        if ($config->hasTrustAnchor()) {
65
-            $this->_trustAnchor = $config->trustAnchor();
66
-        } else {
67
-            $this->_trustAnchor = $certificates[0];
68
-        }
69
-    }
46
+	/**
47
+	 * Constructor.
48
+	 *
49
+	 * @param Crypto $crypto Crypto engine
50
+	 * @param PathValidationConfig $config Validation config
51
+	 * @param Certificate ...$certificates Certificates from the trust anchor to
52
+	 *            the end-entity certificate
53
+	 */
54
+	public function __construct(Crypto $crypto, PathValidationConfig $config,
55
+		Certificate ...$certificates)
56
+	{
57
+		if (!count($certificates)) {
58
+			throw new \LogicException("No certificates.");
59
+		}
60
+		$this->_crypto = $crypto;
61
+		$this->_config = $config;
62
+		$this->_certificates = $certificates;
63
+		// if trust anchor is explicitly given in configuration
64
+		if ($config->hasTrustAnchor()) {
65
+			$this->_trustAnchor = $config->trustAnchor();
66
+		} else {
67
+			$this->_trustAnchor = $certificates[0];
68
+		}
69
+	}
70 70
     
71
-    /**
72
-     * Validate certification path.
73
-     *
74
-     * @throws PathValidationException
75
-     * @return PathValidationResult
76
-     */
77
-    public function validate()
78
-    {
79
-        $n = count($this->_certificates);
80
-        $state = ValidatorState::initialize($this->_config, $this->_trustAnchor,
81
-            $n);
82
-        for ($i = 0; $i < $n; ++$i) {
83
-            $state = $state->withIndex($i + 1);
84
-            $cert = $this->_certificates[$i];
85
-            // process certificate (section 6.1.3.)
86
-            $state = $this->_processCertificate($state, $cert);
87
-            if (!$state->isFinal()) {
88
-                // prepare next certificate (section 6.1.4.)
89
-                $state = $this->_prepareNext($state, $cert);
90
-            }
91
-        }
92
-        if (!isset($cert)) {
93
-            throw new \LogicException("No certificates.");
94
-        }
95
-        // wrap-up (section 6.1.5.)
96
-        $state = $this->_wrapUp($state, $cert);
97
-        // return outputs
98
-        return $state->getResult($this->_certificates);
99
-    }
71
+	/**
72
+	 * Validate certification path.
73
+	 *
74
+	 * @throws PathValidationException
75
+	 * @return PathValidationResult
76
+	 */
77
+	public function validate()
78
+	{
79
+		$n = count($this->_certificates);
80
+		$state = ValidatorState::initialize($this->_config, $this->_trustAnchor,
81
+			$n);
82
+		for ($i = 0; $i < $n; ++$i) {
83
+			$state = $state->withIndex($i + 1);
84
+			$cert = $this->_certificates[$i];
85
+			// process certificate (section 6.1.3.)
86
+			$state = $this->_processCertificate($state, $cert);
87
+			if (!$state->isFinal()) {
88
+				// prepare next certificate (section 6.1.4.)
89
+				$state = $this->_prepareNext($state, $cert);
90
+			}
91
+		}
92
+		if (!isset($cert)) {
93
+			throw new \LogicException("No certificates.");
94
+		}
95
+		// wrap-up (section 6.1.5.)
96
+		$state = $this->_wrapUp($state, $cert);
97
+		// return outputs
98
+		return $state->getResult($this->_certificates);
99
+	}
100 100
     
101
-    /**
102
-     * Apply basic certificate processing according to RFC 5280 section 6.1.3.
103
-     *
104
-     * @link https://tools.ietf.org/html/rfc5280#section-6.1.3
105
-     * @param ValidatorState $state
106
-     * @param Certificate $cert
107
-     * @throws PathValidationException
108
-     * @return ValidatorState
109
-     */
110
-    private function _processCertificate(ValidatorState $state, Certificate $cert)
111
-    {
112
-        // (a.1) verify signature
113
-        $this->_verifySignature($state, $cert);
114
-        // (a.2) check validity period
115
-        $this->_checkValidity($cert);
116
-        // (a.3) check that certificate is not revoked
117
-        $this->_checkRevocation($cert);
118
-        // (a.4) check issuer
119
-        $this->_checkIssuer($state, $cert);
120
-        // (b)(c) if certificate is self-issued and it is not
121
-        // the final certificate in the path, skip this step
122
-        if (!($cert->isSelfIssued() && !$state->isFinal())) {
123
-            // (b) check permitted subtrees
124
-            $this->_checkPermittedSubtrees($state, $cert);
125
-            // (c) check excluded subtrees
126
-            $this->_checkExcludedSubtrees($state, $cert);
127
-        }
128
-        $extensions = $cert->tbsCertificate()->extensions();
129
-        if ($extensions->hasCertificatePolicies()) {
130
-            // (d) process policy information
131
-            if ($state->hasValidPolicyTree()) {
132
-                $state = $state->validPolicyTree()->processPolicies($state,
133
-                    $cert);
134
-            }
135
-        } else {
136
-            // (e) certificate policies extension not present,
137
-            // set the valid_policy_tree to NULL
138
-            $state = $state->withoutValidPolicyTree();
139
-        }
140
-        // (f) check that explicit_policy > 0 or valid_policy_tree is set
141
-        if (!($state->explicitPolicy() > 0 || $state->hasValidPolicyTree())) {
142
-            throw new PathValidationException("No valid policies.");
143
-        }
144
-        return $state;
145
-    }
101
+	/**
102
+	 * Apply basic certificate processing according to RFC 5280 section 6.1.3.
103
+	 *
104
+	 * @link https://tools.ietf.org/html/rfc5280#section-6.1.3
105
+	 * @param ValidatorState $state
106
+	 * @param Certificate $cert
107
+	 * @throws PathValidationException
108
+	 * @return ValidatorState
109
+	 */
110
+	private function _processCertificate(ValidatorState $state, Certificate $cert)
111
+	{
112
+		// (a.1) verify signature
113
+		$this->_verifySignature($state, $cert);
114
+		// (a.2) check validity period
115
+		$this->_checkValidity($cert);
116
+		// (a.3) check that certificate is not revoked
117
+		$this->_checkRevocation($cert);
118
+		// (a.4) check issuer
119
+		$this->_checkIssuer($state, $cert);
120
+		// (b)(c) if certificate is self-issued and it is not
121
+		// the final certificate in the path, skip this step
122
+		if (!($cert->isSelfIssued() && !$state->isFinal())) {
123
+			// (b) check permitted subtrees
124
+			$this->_checkPermittedSubtrees($state, $cert);
125
+			// (c) check excluded subtrees
126
+			$this->_checkExcludedSubtrees($state, $cert);
127
+		}
128
+		$extensions = $cert->tbsCertificate()->extensions();
129
+		if ($extensions->hasCertificatePolicies()) {
130
+			// (d) process policy information
131
+			if ($state->hasValidPolicyTree()) {
132
+				$state = $state->validPolicyTree()->processPolicies($state,
133
+					$cert);
134
+			}
135
+		} else {
136
+			// (e) certificate policies extension not present,
137
+			// set the valid_policy_tree to NULL
138
+			$state = $state->withoutValidPolicyTree();
139
+		}
140
+		// (f) check that explicit_policy > 0 or valid_policy_tree is set
141
+		if (!($state->explicitPolicy() > 0 || $state->hasValidPolicyTree())) {
142
+			throw new PathValidationException("No valid policies.");
143
+		}
144
+		return $state;
145
+	}
146 146
     
147
-    /**
148
-     * Apply preparation for the certificate i+1 according to rfc5280 section
149
-     * 6.1.4.
150
-     *
151
-     * @link https://tools.ietf.org/html/rfc5280#section-6.1.4
152
-     * @param ValidatorState $state
153
-     * @param Certificate $cert
154
-     * @return ValidatorState
155
-     */
156
-    private function _prepareNext(ValidatorState $state, Certificate $cert)
157
-    {
158
-        // (a)(b) if policy mappings extension is present
159
-        $state = $this->_preparePolicyMappings($state, $cert);
160
-        // (c) assign working_issuer_name
161
-        $state = $state->withWorkingIssuerName(
162
-            $cert->tbsCertificate()
163
-                ->subject());
164
-        // (d)(e)(f)
165
-        $state = $this->_setPublicKeyState($state, $cert);
166
-        // (g) if name constraints extension is present
167
-        $state = $this->_prepareNameConstraints($state, $cert);
168
-        // (h) if certificate is not self-issued
169
-        if (!$cert->isSelfIssued()) {
170
-            $state = $this->_prepareNonSelfIssued($state);
171
-        }
172
-        // (i) if policy constraints extension is present
173
-        $state = $this->_preparePolicyConstraints($state, $cert);
174
-        // (j) if inhibit any policy extension is present
175
-        $state = $this->_prepareInhibitAnyPolicy($state, $cert);
176
-        // (k) check basic constraints
177
-        $this->_processBasicContraints($cert);
178
-        // (l) verify max_path_length
179
-        $state = $this->_verifyMaxPathLength($state, $cert);
180
-        // (m) check pathLenContraint
181
-        $state = $this->_processPathLengthContraint($state, $cert);
182
-        // (n) check key usage
183
-        $this->_checkKeyUsage($cert);
184
-        // (o) process relevant extensions
185
-        $state = $this->_processExtensions($state, $cert);
186
-        return $state;
187
-    }
147
+	/**
148
+	 * Apply preparation for the certificate i+1 according to rfc5280 section
149
+	 * 6.1.4.
150
+	 *
151
+	 * @link https://tools.ietf.org/html/rfc5280#section-6.1.4
152
+	 * @param ValidatorState $state
153
+	 * @param Certificate $cert
154
+	 * @return ValidatorState
155
+	 */
156
+	private function _prepareNext(ValidatorState $state, Certificate $cert)
157
+	{
158
+		// (a)(b) if policy mappings extension is present
159
+		$state = $this->_preparePolicyMappings($state, $cert);
160
+		// (c) assign working_issuer_name
161
+		$state = $state->withWorkingIssuerName(
162
+			$cert->tbsCertificate()
163
+				->subject());
164
+		// (d)(e)(f)
165
+		$state = $this->_setPublicKeyState($state, $cert);
166
+		// (g) if name constraints extension is present
167
+		$state = $this->_prepareNameConstraints($state, $cert);
168
+		// (h) if certificate is not self-issued
169
+		if (!$cert->isSelfIssued()) {
170
+			$state = $this->_prepareNonSelfIssued($state);
171
+		}
172
+		// (i) if policy constraints extension is present
173
+		$state = $this->_preparePolicyConstraints($state, $cert);
174
+		// (j) if inhibit any policy extension is present
175
+		$state = $this->_prepareInhibitAnyPolicy($state, $cert);
176
+		// (k) check basic constraints
177
+		$this->_processBasicContraints($cert);
178
+		// (l) verify max_path_length
179
+		$state = $this->_verifyMaxPathLength($state, $cert);
180
+		// (m) check pathLenContraint
181
+		$state = $this->_processPathLengthContraint($state, $cert);
182
+		// (n) check key usage
183
+		$this->_checkKeyUsage($cert);
184
+		// (o) process relevant extensions
185
+		$state = $this->_processExtensions($state, $cert);
186
+		return $state;
187
+	}
188 188
     
189
-    /**
190
-     * Apply wrap-up procedure according to RFC 5280 section 6.1.5.
191
-     *
192
-     * @link https://tools.ietf.org/html/rfc5280#section-6.1.5
193
-     * @param ValidatorState $state
194
-     * @param Certificate $cert
195
-     * @throws PathValidationException
196
-     */
197
-    private function _wrapUp(ValidatorState $state, Certificate $cert)
198
-    {
199
-        $tbs_cert = $cert->tbsCertificate();
200
-        $extensions = $tbs_cert->extensions();
201
-        // (a)
202
-        if ($state->explicitPolicy() > 0) {
203
-            $state = $state->withExplicitPolicy($state->explicitPolicy() - 1);
204
-        }
205
-        // (b)
206
-        if ($extensions->hasPolicyConstraints()) {
207
-            $ext = $extensions->policyConstraints();
208
-            if ($ext->hasRequireExplicitPolicy() &&
209
-                 $ext->requireExplicitPolicy() == 0) {
210
-                $state = $state->withExplicitPolicy(0);
211
-            }
212
-        }
213
-        // (c)(d)(e)
214
-        $state = $this->_setPublicKeyState($state, $cert);
215
-        // (f) process relevant extensions
216
-        $state = $this->_processExtensions($state, $cert);
217
-        // (g) intersection of valid_policy_tree and the initial-policy-set
218
-        $state = $this->_calculatePolicyIntersection($state);
219
-        // check that explicit_policy > 0 or valid_policy_tree is set
220
-        if (!($state->explicitPolicy() > 0 || $state->hasValidPolicyTree())) {
221
-            throw new PathValidationException("No valid policies.");
222
-        }
223
-        // path validation succeeded
224
-        return $state;
225
-    }
189
+	/**
190
+	 * Apply wrap-up procedure according to RFC 5280 section 6.1.5.
191
+	 *
192
+	 * @link https://tools.ietf.org/html/rfc5280#section-6.1.5
193
+	 * @param ValidatorState $state
194
+	 * @param Certificate $cert
195
+	 * @throws PathValidationException
196
+	 */
197
+	private function _wrapUp(ValidatorState $state, Certificate $cert)
198
+	{
199
+		$tbs_cert = $cert->tbsCertificate();
200
+		$extensions = $tbs_cert->extensions();
201
+		// (a)
202
+		if ($state->explicitPolicy() > 0) {
203
+			$state = $state->withExplicitPolicy($state->explicitPolicy() - 1);
204
+		}
205
+		// (b)
206
+		if ($extensions->hasPolicyConstraints()) {
207
+			$ext = $extensions->policyConstraints();
208
+			if ($ext->hasRequireExplicitPolicy() &&
209
+				 $ext->requireExplicitPolicy() == 0) {
210
+				$state = $state->withExplicitPolicy(0);
211
+			}
212
+		}
213
+		// (c)(d)(e)
214
+		$state = $this->_setPublicKeyState($state, $cert);
215
+		// (f) process relevant extensions
216
+		$state = $this->_processExtensions($state, $cert);
217
+		// (g) intersection of valid_policy_tree and the initial-policy-set
218
+		$state = $this->_calculatePolicyIntersection($state);
219
+		// check that explicit_policy > 0 or valid_policy_tree is set
220
+		if (!($state->explicitPolicy() > 0 || $state->hasValidPolicyTree())) {
221
+			throw new PathValidationException("No valid policies.");
222
+		}
223
+		// path validation succeeded
224
+		return $state;
225
+	}
226 226
     
227
-    /**
228
-     * Update working_public_key, working_public_key_parameters and
229
-     * working_public_key_algorithm state variables from certificate.
230
-     *
231
-     * @param ValidatorState $state
232
-     * @param Certificate $cert
233
-     * @return ValidatorState
234
-     */
235
-    private function _setPublicKeyState(ValidatorState $state, Certificate $cert)
236
-    {
237
-        $pk_info = $cert->tbsCertificate()->subjectPublicKeyInfo();
238
-        // assign working_public_key
239
-        $state = $state->withWorkingPublicKey($pk_info);
240
-        // assign working_public_key_parameters
241
-        $params = ValidatorState::getAlgorithmParameters(
242
-            $pk_info->algorithmIdentifier());
243
-        if (null !== $params) {
244
-            $state = $state->withWorkingPublicKeyParameters($params);
245
-        } else {
246
-            // if algorithms differ, set parameters to null
247
-            if ($pk_info->algorithmIdentifier()->oid() !==
248
-                 $state->workingPublicKeyAlgorithm()->oid()) {
249
-                $state = $state->withWorkingPublicKeyParameters(null);
250
-            }
251
-        }
252
-        // assign working_public_key_algorithm
253
-        $state = $state->withWorkingPublicKeyAlgorithm(
254
-            $pk_info->algorithmIdentifier());
255
-        return $state;
256
-    }
227
+	/**
228
+	 * Update working_public_key, working_public_key_parameters and
229
+	 * working_public_key_algorithm state variables from certificate.
230
+	 *
231
+	 * @param ValidatorState $state
232
+	 * @param Certificate $cert
233
+	 * @return ValidatorState
234
+	 */
235
+	private function _setPublicKeyState(ValidatorState $state, Certificate $cert)
236
+	{
237
+		$pk_info = $cert->tbsCertificate()->subjectPublicKeyInfo();
238
+		// assign working_public_key
239
+		$state = $state->withWorkingPublicKey($pk_info);
240
+		// assign working_public_key_parameters
241
+		$params = ValidatorState::getAlgorithmParameters(
242
+			$pk_info->algorithmIdentifier());
243
+		if (null !== $params) {
244
+			$state = $state->withWorkingPublicKeyParameters($params);
245
+		} else {
246
+			// if algorithms differ, set parameters to null
247
+			if ($pk_info->algorithmIdentifier()->oid() !==
248
+				 $state->workingPublicKeyAlgorithm()->oid()) {
249
+				$state = $state->withWorkingPublicKeyParameters(null);
250
+			}
251
+		}
252
+		// assign working_public_key_algorithm
253
+		$state = $state->withWorkingPublicKeyAlgorithm(
254
+			$pk_info->algorithmIdentifier());
255
+		return $state;
256
+	}
257 257
     
258
-    /**
259
-     * Verify certificate signature.
260
-     *
261
-     * @param ValidatorState $state
262
-     * @param Certificate $cert
263
-     * @throws PathValidationException
264
-     */
265
-    private function _verifySignature(ValidatorState $state, Certificate $cert)
266
-    {
267
-        try {
268
-            $valid = $cert->verify($state->workingPublicKey(), $this->_crypto);
269
-        } catch (\RuntimeException $e) {
270
-            throw new PathValidationException(
271
-                "Failed to verify signature: " . $e->getMessage(), null, $e);
272
-        }
273
-        if (!$valid) {
274
-            throw new PathValidationException(
275
-                "Certificate signature doesn't match.");
276
-        }
277
-    }
258
+	/**
259
+	 * Verify certificate signature.
260
+	 *
261
+	 * @param ValidatorState $state
262
+	 * @param Certificate $cert
263
+	 * @throws PathValidationException
264
+	 */
265
+	private function _verifySignature(ValidatorState $state, Certificate $cert)
266
+	{
267
+		try {
268
+			$valid = $cert->verify($state->workingPublicKey(), $this->_crypto);
269
+		} catch (\RuntimeException $e) {
270
+			throw new PathValidationException(
271
+				"Failed to verify signature: " . $e->getMessage(), null, $e);
272
+		}
273
+		if (!$valid) {
274
+			throw new PathValidationException(
275
+				"Certificate signature doesn't match.");
276
+		}
277
+	}
278 278
     
279
-    /**
280
-     * Check certificate validity.
281
-     *
282
-     * @param Certificate $cert
283
-     * @throws PathValidationException
284
-     */
285
-    private function _checkValidity(Certificate $cert)
286
-    {
287
-        $refdt = $this->_config->dateTime();
288
-        $validity = $cert->tbsCertificate()->validity();
289
-        if ($validity->notBefore()
290
-            ->dateTime()
291
-            ->diff($refdt)->invert) {
292
-            throw new PathValidationException(
293
-                "Certificate validity period has not started.");
294
-        }
295
-        if ($refdt->diff($validity->notAfter()
296
-            ->dateTime())->invert) {
297
-            throw new PathValidationException("Certificate has expired.");
298
-        }
299
-    }
279
+	/**
280
+	 * Check certificate validity.
281
+	 *
282
+	 * @param Certificate $cert
283
+	 * @throws PathValidationException
284
+	 */
285
+	private function _checkValidity(Certificate $cert)
286
+	{
287
+		$refdt = $this->_config->dateTime();
288
+		$validity = $cert->tbsCertificate()->validity();
289
+		if ($validity->notBefore()
290
+			->dateTime()
291
+			->diff($refdt)->invert) {
292
+			throw new PathValidationException(
293
+				"Certificate validity period has not started.");
294
+		}
295
+		if ($refdt->diff($validity->notAfter()
296
+			->dateTime())->invert) {
297
+			throw new PathValidationException("Certificate has expired.");
298
+		}
299
+	}
300 300
     
301
-    /**
302
-     * Check certificate revocation.
303
-     *
304
-     * @param Certificate $cert
305
-     */
306
-    private function _checkRevocation(Certificate $cert)
307
-    {
308
-        // @todo Implement CRL handling
309
-    }
301
+	/**
302
+	 * Check certificate revocation.
303
+	 *
304
+	 * @param Certificate $cert
305
+	 */
306
+	private function _checkRevocation(Certificate $cert)
307
+	{
308
+		// @todo Implement CRL handling
309
+	}
310 310
     
311
-    /**
312
-     * Check certificate issuer.
313
-     *
314
-     * @param ValidatorState $state
315
-     * @param Certificate $cert
316
-     * @throws PathValidationException
317
-     */
318
-    private function _checkIssuer(ValidatorState $state, Certificate $cert)
319
-    {
320
-        if (!$cert->tbsCertificate()
321
-            ->issuer()
322
-            ->equals($state->workingIssuerName())) {
323
-            throw new PathValidationException("Certification issuer mismatch.");
324
-        }
325
-    }
311
+	/**
312
+	 * Check certificate issuer.
313
+	 *
314
+	 * @param ValidatorState $state
315
+	 * @param Certificate $cert
316
+	 * @throws PathValidationException
317
+	 */
318
+	private function _checkIssuer(ValidatorState $state, Certificate $cert)
319
+	{
320
+		if (!$cert->tbsCertificate()
321
+			->issuer()
322
+			->equals($state->workingIssuerName())) {
323
+			throw new PathValidationException("Certification issuer mismatch.");
324
+		}
325
+	}
326 326
     
327
-    /**
328
-     *
329
-     * @param ValidatorState $state
330
-     * @param Certificate $cert
331
-     */
332
-    private function _checkPermittedSubtrees(ValidatorState $state,
333
-        Certificate $cert)
334
-    {
335
-        // @todo Implement
336
-        $state->permittedSubtrees();
337
-    }
327
+	/**
328
+	 *
329
+	 * @param ValidatorState $state
330
+	 * @param Certificate $cert
331
+	 */
332
+	private function _checkPermittedSubtrees(ValidatorState $state,
333
+		Certificate $cert)
334
+	{
335
+		// @todo Implement
336
+		$state->permittedSubtrees();
337
+	}
338 338
     
339
-    /**
340
-     *
341
-     * @param ValidatorState $state
342
-     * @param Certificate $cert
343
-     */
344
-    private function _checkExcludedSubtrees(ValidatorState $state,
345
-        Certificate $cert)
346
-    {
347
-        // @todo Implement
348
-        $state->excludedSubtrees();
349
-    }
339
+	/**
340
+	 *
341
+	 * @param ValidatorState $state
342
+	 * @param Certificate $cert
343
+	 */
344
+	private function _checkExcludedSubtrees(ValidatorState $state,
345
+		Certificate $cert)
346
+	{
347
+		// @todo Implement
348
+		$state->excludedSubtrees();
349
+	}
350 350
     
351
-    /**
352
-     * Apply policy mappings handling for the preparation step.
353
-     *
354
-     * @param ValidatorState $state
355
-     * @param Certificate $cert
356
-     * @throws PathValidationException
357
-     * @return ValidatorState
358
-     */
359
-    private function _preparePolicyMappings(ValidatorState $state,
360
-        Certificate $cert)
361
-    {
362
-        $extensions = $cert->tbsCertificate()->extensions();
363
-        if ($extensions->hasPolicyMappings()) {
364
-            // (a) verify that anyPolicy mapping is not used
365
-            if ($extensions->policyMappings()->hasAnyPolicyMapping()) {
366
-                throw new PathValidationException("anyPolicy mapping found.");
367
-            }
368
-            // (b) process policy mappings
369
-            if ($state->hasValidPolicyTree()) {
370
-                $state = $state->validPolicyTree()->processMappings($state,
371
-                    $cert);
372
-            }
373
-        }
374
-        return $state;
375
-    }
351
+	/**
352
+	 * Apply policy mappings handling for the preparation step.
353
+	 *
354
+	 * @param ValidatorState $state
355
+	 * @param Certificate $cert
356
+	 * @throws PathValidationException
357
+	 * @return ValidatorState
358
+	 */
359
+	private function _preparePolicyMappings(ValidatorState $state,
360
+		Certificate $cert)
361
+	{
362
+		$extensions = $cert->tbsCertificate()->extensions();
363
+		if ($extensions->hasPolicyMappings()) {
364
+			// (a) verify that anyPolicy mapping is not used
365
+			if ($extensions->policyMappings()->hasAnyPolicyMapping()) {
366
+				throw new PathValidationException("anyPolicy mapping found.");
367
+			}
368
+			// (b) process policy mappings
369
+			if ($state->hasValidPolicyTree()) {
370
+				$state = $state->validPolicyTree()->processMappings($state,
371
+					$cert);
372
+			}
373
+		}
374
+		return $state;
375
+	}
376 376
     
377
-    /**
378
-     * Apply name constraints handling for the preparation step.
379
-     *
380
-     * @param ValidatorState $state
381
-     * @param Certificate $cert
382
-     * @return ValidatorState
383
-     */
384
-    private function _prepareNameConstraints(ValidatorState $state,
385
-        Certificate $cert)
386
-    {
387
-        $extensions = $cert->tbsCertificate()->extensions();
388
-        if ($extensions->hasNameConstraints()) {
389
-            $state = $this->_processNameConstraints($state, $cert);
390
-        }
391
-        return $state;
392
-    }
377
+	/**
378
+	 * Apply name constraints handling for the preparation step.
379
+	 *
380
+	 * @param ValidatorState $state
381
+	 * @param Certificate $cert
382
+	 * @return ValidatorState
383
+	 */
384
+	private function _prepareNameConstraints(ValidatorState $state,
385
+		Certificate $cert)
386
+	{
387
+		$extensions = $cert->tbsCertificate()->extensions();
388
+		if ($extensions->hasNameConstraints()) {
389
+			$state = $this->_processNameConstraints($state, $cert);
390
+		}
391
+		return $state;
392
+	}
393 393
     
394
-    /**
395
-     * Apply preparation for a non-self-signed certificate.
396
-     *
397
-     * @param ValidatorState $state
398
-     * @return ValidatorState
399
-     */
400
-    private function _prepareNonSelfIssued(ValidatorState $state)
401
-    {
402
-        // (h.1)
403
-        if ($state->explicitPolicy() > 0) {
404
-            $state = $state->withExplicitPolicy($state->explicitPolicy() - 1);
405
-        }
406
-        // (h.2)
407
-        if ($state->policyMapping() > 0) {
408
-            $state = $state->withPolicyMapping($state->policyMapping() - 1);
409
-        }
410
-        // (h.3)
411
-        if ($state->inhibitAnyPolicy() > 0) {
412
-            $state = $state->withInhibitAnyPolicy(
413
-                $state->inhibitAnyPolicy() - 1);
414
-        }
415
-        return $state;
416
-    }
394
+	/**
395
+	 * Apply preparation for a non-self-signed certificate.
396
+	 *
397
+	 * @param ValidatorState $state
398
+	 * @return ValidatorState
399
+	 */
400
+	private function _prepareNonSelfIssued(ValidatorState $state)
401
+	{
402
+		// (h.1)
403
+		if ($state->explicitPolicy() > 0) {
404
+			$state = $state->withExplicitPolicy($state->explicitPolicy() - 1);
405
+		}
406
+		// (h.2)
407
+		if ($state->policyMapping() > 0) {
408
+			$state = $state->withPolicyMapping($state->policyMapping() - 1);
409
+		}
410
+		// (h.3)
411
+		if ($state->inhibitAnyPolicy() > 0) {
412
+			$state = $state->withInhibitAnyPolicy(
413
+				$state->inhibitAnyPolicy() - 1);
414
+		}
415
+		return $state;
416
+	}
417 417
     
418
-    /**
419
-     * Apply policy constraints handling for the preparation step.
420
-     *
421
-     * @param ValidatorState $state
422
-     * @param Certificate $cert
423
-     * @return ValidatorState
424
-     */
425
-    private function _preparePolicyConstraints(ValidatorState $state,
426
-        Certificate $cert)
427
-    {
428
-        $extensions = $cert->tbsCertificate()->extensions();
429
-        if (!$extensions->hasPolicyConstraints()) {
430
-            return $state;
431
-        }
432
-        $ext = $extensions->policyConstraints();
433
-        // (i.1)
434
-        if ($ext->hasRequireExplicitPolicy() &&
435
-             $ext->requireExplicitPolicy() < $state->explicitPolicy()) {
436
-            $state = $state->withExplicitPolicy($ext->requireExplicitPolicy());
437
-        }
438
-        // (i.2)
439
-        if ($ext->hasInhibitPolicyMapping() &&
440
-             $ext->inhibitPolicyMapping() < $state->policyMapping()) {
441
-            $state = $state->withPolicyMapping($ext->inhibitPolicyMapping());
442
-        }
443
-        return $state;
444
-    }
418
+	/**
419
+	 * Apply policy constraints handling for the preparation step.
420
+	 *
421
+	 * @param ValidatorState $state
422
+	 * @param Certificate $cert
423
+	 * @return ValidatorState
424
+	 */
425
+	private function _preparePolicyConstraints(ValidatorState $state,
426
+		Certificate $cert)
427
+	{
428
+		$extensions = $cert->tbsCertificate()->extensions();
429
+		if (!$extensions->hasPolicyConstraints()) {
430
+			return $state;
431
+		}
432
+		$ext = $extensions->policyConstraints();
433
+		// (i.1)
434
+		if ($ext->hasRequireExplicitPolicy() &&
435
+			 $ext->requireExplicitPolicy() < $state->explicitPolicy()) {
436
+			$state = $state->withExplicitPolicy($ext->requireExplicitPolicy());
437
+		}
438
+		// (i.2)
439
+		if ($ext->hasInhibitPolicyMapping() &&
440
+			 $ext->inhibitPolicyMapping() < $state->policyMapping()) {
441
+			$state = $state->withPolicyMapping($ext->inhibitPolicyMapping());
442
+		}
443
+		return $state;
444
+	}
445 445
     
446
-    /**
447
-     * Apply inhibit any-policy handling for the preparation step.
448
-     *
449
-     * @param ValidatorState $state
450
-     * @param Certificate $cert
451
-     * @return ValidatorState
452
-     */
453
-    private function _prepareInhibitAnyPolicy(ValidatorState $state,
454
-        Certificate $cert)
455
-    {
456
-        $extensions = $cert->tbsCertificate()->extensions();
457
-        if ($extensions->hasInhibitAnyPolicy()) {
458
-            $ext = $extensions->inhibitAnyPolicy();
459
-            if ($ext->skipCerts() < $state->inhibitAnyPolicy()) {
460
-                $state = $state->withInhibitAnyPolicy($ext->skipCerts());
461
-            }
462
-        }
463
-        return $state;
464
-    }
446
+	/**
447
+	 * Apply inhibit any-policy handling for the preparation step.
448
+	 *
449
+	 * @param ValidatorState $state
450
+	 * @param Certificate $cert
451
+	 * @return ValidatorState
452
+	 */
453
+	private function _prepareInhibitAnyPolicy(ValidatorState $state,
454
+		Certificate $cert)
455
+	{
456
+		$extensions = $cert->tbsCertificate()->extensions();
457
+		if ($extensions->hasInhibitAnyPolicy()) {
458
+			$ext = $extensions->inhibitAnyPolicy();
459
+			if ($ext->skipCerts() < $state->inhibitAnyPolicy()) {
460
+				$state = $state->withInhibitAnyPolicy($ext->skipCerts());
461
+			}
462
+		}
463
+		return $state;
464
+	}
465 465
     
466
-    /**
467
-     * Verify maximum certification path length for the preparation step.
468
-     *
469
-     * @param ValidatorState $state
470
-     * @param Certificate $cert
471
-     * @throws PathValidationException
472
-     * @return ValidatorState
473
-     */
474
-    private function _verifyMaxPathLength(ValidatorState $state,
475
-        Certificate $cert)
476
-    {
477
-        if (!$cert->isSelfIssued()) {
478
-            if ($state->maxPathLength() <= 0) {
479
-                throw new PathValidationException(
480
-                    "Certification path length exceeded.");
481
-            }
482
-            $state = $state->withMaxPathLength($state->maxPathLength() - 1);
483
-        }
484
-        return $state;
485
-    }
466
+	/**
467
+	 * Verify maximum certification path length for the preparation step.
468
+	 *
469
+	 * @param ValidatorState $state
470
+	 * @param Certificate $cert
471
+	 * @throws PathValidationException
472
+	 * @return ValidatorState
473
+	 */
474
+	private function _verifyMaxPathLength(ValidatorState $state,
475
+		Certificate $cert)
476
+	{
477
+		if (!$cert->isSelfIssued()) {
478
+			if ($state->maxPathLength() <= 0) {
479
+				throw new PathValidationException(
480
+					"Certification path length exceeded.");
481
+			}
482
+			$state = $state->withMaxPathLength($state->maxPathLength() - 1);
483
+		}
484
+		return $state;
485
+	}
486 486
     
487
-    /**
488
-     * Check key usage extension for the preparation step.
489
-     *
490
-     * @param Certificate $cert
491
-     * @throws PathValidationException
492
-     */
493
-    private function _checkKeyUsage(Certificate $cert)
494
-    {
495
-        $extensions = $cert->tbsCertificate()->extensions();
496
-        if ($extensions->hasKeyUsage()) {
497
-            $ext = $extensions->keyUsage();
498
-            if (!$ext->isKeyCertSign()) {
499
-                throw new PathValidationException("keyCertSign usage not set.");
500
-            }
501
-        }
502
-    }
487
+	/**
488
+	 * Check key usage extension for the preparation step.
489
+	 *
490
+	 * @param Certificate $cert
491
+	 * @throws PathValidationException
492
+	 */
493
+	private function _checkKeyUsage(Certificate $cert)
494
+	{
495
+		$extensions = $cert->tbsCertificate()->extensions();
496
+		if ($extensions->hasKeyUsage()) {
497
+			$ext = $extensions->keyUsage();
498
+			if (!$ext->isKeyCertSign()) {
499
+				throw new PathValidationException("keyCertSign usage not set.");
500
+			}
501
+		}
502
+	}
503 503
     
504
-    /**
505
-     *
506
-     * @param ValidatorState $state
507
-     * @param Certificate $cert
508
-     * @return ValidatorState
509
-     */
510
-    private function _processNameConstraints(ValidatorState $state,
511
-        Certificate $cert)
512
-    {
513
-        // @todo Implement
514
-        return $state;
515
-    }
504
+	/**
505
+	 *
506
+	 * @param ValidatorState $state
507
+	 * @param Certificate $cert
508
+	 * @return ValidatorState
509
+	 */
510
+	private function _processNameConstraints(ValidatorState $state,
511
+		Certificate $cert)
512
+	{
513
+		// @todo Implement
514
+		return $state;
515
+	}
516 516
     
517
-    /**
518
-     * Process basic constraints extension.
519
-     *
520
-     * @param Certificate $cert
521
-     * @throws PathValidationException
522
-     */
523
-    private function _processBasicContraints(Certificate $cert)
524
-    {
525
-        if ($cert->tbsCertificate()->version() == TBSCertificate::VERSION_3) {
526
-            $extensions = $cert->tbsCertificate()->extensions();
527
-            if (!$extensions->hasBasicConstraints()) {
528
-                throw new PathValidationException(
529
-                    "v3 certificate must have basicConstraints extension.");
530
-            }
531
-            // verify that cA is set to TRUE
532
-            if (!$extensions->basicConstraints()->isCA()) {
533
-                throw new PathValidationException(
534
-                    "Certificate is not a CA certificate.");
535
-            }
536
-        }
537
-    }
517
+	/**
518
+	 * Process basic constraints extension.
519
+	 *
520
+	 * @param Certificate $cert
521
+	 * @throws PathValidationException
522
+	 */
523
+	private function _processBasicContraints(Certificate $cert)
524
+	{
525
+		if ($cert->tbsCertificate()->version() == TBSCertificate::VERSION_3) {
526
+			$extensions = $cert->tbsCertificate()->extensions();
527
+			if (!$extensions->hasBasicConstraints()) {
528
+				throw new PathValidationException(
529
+					"v3 certificate must have basicConstraints extension.");
530
+			}
531
+			// verify that cA is set to TRUE
532
+			if (!$extensions->basicConstraints()->isCA()) {
533
+				throw new PathValidationException(
534
+					"Certificate is not a CA certificate.");
535
+			}
536
+		}
537
+	}
538 538
     
539
-    /**
540
-     * Process pathLenConstraint.
541
-     *
542
-     * @param ValidatorState $state
543
-     * @param Certificate $cert
544
-     * @return ValidatorState
545
-     */
546
-    private function _processPathLengthContraint(ValidatorState $state,
547
-        Certificate $cert)
548
-    {
549
-        $extensions = $cert->tbsCertificate()->extensions();
550
-        if ($extensions->hasBasicConstraints()) {
551
-            $ext = $extensions->basicConstraints();
552
-            if ($ext->hasPathLen()) {
553
-                if ($ext->pathLen() < $state->maxPathLength()) {
554
-                    $state = $state->withMaxPathLength($ext->pathLen());
555
-                }
556
-            }
557
-        }
558
-        return $state;
559
-    }
539
+	/**
540
+	 * Process pathLenConstraint.
541
+	 *
542
+	 * @param ValidatorState $state
543
+	 * @param Certificate $cert
544
+	 * @return ValidatorState
545
+	 */
546
+	private function _processPathLengthContraint(ValidatorState $state,
547
+		Certificate $cert)
548
+	{
549
+		$extensions = $cert->tbsCertificate()->extensions();
550
+		if ($extensions->hasBasicConstraints()) {
551
+			$ext = $extensions->basicConstraints();
552
+			if ($ext->hasPathLen()) {
553
+				if ($ext->pathLen() < $state->maxPathLength()) {
554
+					$state = $state->withMaxPathLength($ext->pathLen());
555
+				}
556
+			}
557
+		}
558
+		return $state;
559
+	}
560 560
     
561
-    /**
562
-     *
563
-     * @param ValidatorState $state
564
-     * @param Certificate $cert
565
-     * @return ValidatorState
566
-     */
567
-    private function _processExtensions(ValidatorState $state, Certificate $cert)
568
-    {
569
-        // @todo Implement
570
-        return $state;
571
-    }
561
+	/**
562
+	 *
563
+	 * @param ValidatorState $state
564
+	 * @param Certificate $cert
565
+	 * @return ValidatorState
566
+	 */
567
+	private function _processExtensions(ValidatorState $state, Certificate $cert)
568
+	{
569
+		// @todo Implement
570
+		return $state;
571
+	}
572 572
     
573
-    /**
574
-     *
575
-     * @param ValidatorState $state
576
-     * @return ValidatorState
577
-     */
578
-    private function _calculatePolicyIntersection(ValidatorState $state)
579
-    {
580
-        // (i) If the valid_policy_tree is NULL, the intersection is NULL
581
-        if (!$state->hasValidPolicyTree()) {
582
-            return $state;
583
-        }
584
-        // (ii) If the valid_policy_tree is not NULL and
585
-        // the user-initial-policy-set is any-policy, the intersection
586
-        // is the entire valid_policy_tree
587
-        $initial_policies = $this->_config->policySet();
588
-        if (in_array(PolicyInformation::OID_ANY_POLICY, $initial_policies)) {
589
-            return $state;
590
-        }
591
-        // (iii) If the valid_policy_tree is not NULL and the
592
-        // user-initial-policy-set is not any-policy, calculate
593
-        // the intersection of the valid_policy_tree and the
594
-        // user-initial-policy-set as follows
595
-        return $state->validPolicyTree()->calculateIntersection($state,
596
-            $initial_policies);
597
-    }
573
+	/**
574
+	 *
575
+	 * @param ValidatorState $state
576
+	 * @return ValidatorState
577
+	 */
578
+	private function _calculatePolicyIntersection(ValidatorState $state)
579
+	{
580
+		// (i) If the valid_policy_tree is NULL, the intersection is NULL
581
+		if (!$state->hasValidPolicyTree()) {
582
+			return $state;
583
+		}
584
+		// (ii) If the valid_policy_tree is not NULL and
585
+		// the user-initial-policy-set is any-policy, the intersection
586
+		// is the entire valid_policy_tree
587
+		$initial_policies = $this->_config->policySet();
588
+		if (in_array(PolicyInformation::OID_ANY_POLICY, $initial_policies)) {
589
+			return $state;
590
+		}
591
+		// (iii) If the valid_policy_tree is not NULL and the
592
+		// user-initial-policy-set is not any-policy, calculate
593
+		// the intersection of the valid_policy_tree and the
594
+		// user-initial-policy-set as follows
595
+		return $state->validPolicyTree()->calculateIntersection($state,
596
+			$initial_policies);
597
+	}
598 598
 }
Please login to merge, or discard this patch.
lib/X509/GeneralName/IPv4Address.php 2 patches
Indentation   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -4,42 +4,42 @@
 block discarded – undo
4 4
 
5 5
 class IPv4Address extends IPAddress
6 6
 {
7
-    /**
8
-     * Initialize from octets.
9
-     *
10
-     * @param string $octets
11
-     * @throws \InvalidArgumentException
12
-     * @return self
13
-     */
14
-    public static function fromOctets($octets)
15
-    {
16
-        $mask = null;
17
-        $bytes = unpack("C*", $octets);
18
-        switch (count($bytes)) {
19
-            case 4:
20
-                $ip = implode(".", $bytes);
21
-                break;
22
-            case 8:
23
-                $ip = implode(".", array_slice($bytes, 0, 4));
24
-                $mask = implode(".", array_slice($bytes, 4, 4));
25
-                break;
26
-            default:
27
-                throw new \UnexpectedValueException("Invalid IPv4 octet length.");
28
-        }
29
-        return new self($ip, $mask);
30
-    }
7
+	/**
8
+	 * Initialize from octets.
9
+	 *
10
+	 * @param string $octets
11
+	 * @throws \InvalidArgumentException
12
+	 * @return self
13
+	 */
14
+	public static function fromOctets($octets)
15
+	{
16
+		$mask = null;
17
+		$bytes = unpack("C*", $octets);
18
+		switch (count($bytes)) {
19
+			case 4:
20
+				$ip = implode(".", $bytes);
21
+				break;
22
+			case 8:
23
+				$ip = implode(".", array_slice($bytes, 0, 4));
24
+				$mask = implode(".", array_slice($bytes, 4, 4));
25
+				break;
26
+			default:
27
+				throw new \UnexpectedValueException("Invalid IPv4 octet length.");
28
+		}
29
+		return new self($ip, $mask);
30
+	}
31 31
     
32
-    /**
33
-     *
34
-     * {@inheritdoc}
35
-     */
36
-    protected function _octets()
37
-    {
38
-        $bytes = array_map("intval", explode(".", $this->_ip));
39
-        if (isset($this->_mask)) {
40
-            $bytes = array_merge($bytes,
41
-                array_map("intval", explode(".", $this->_mask)));
42
-        }
43
-        return pack("C*", ...$bytes);
44
-    }
32
+	/**
33
+	 *
34
+	 * {@inheritdoc}
35
+	 */
36
+	protected function _octets()
37
+	{
38
+		$bytes = array_map("intval", explode(".", $this->_ip));
39
+		if (isset($this->_mask)) {
40
+			$bytes = array_merge($bytes,
41
+				array_map("intval", explode(".", $this->_mask)));
42
+		}
43
+		return pack("C*", ...$bytes);
44
+	}
45 45
 }
Please login to merge, or discard this patch.
Switch Indentation   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -16,15 +16,15 @@
 block discarded – undo
16 16
         $mask = null;
17 17
         $bytes = unpack("C*", $octets);
18 18
         switch (count($bytes)) {
19
-            case 4:
20
-                $ip = implode(".", $bytes);
21
-                break;
22
-            case 8:
23
-                $ip = implode(".", array_slice($bytes, 0, 4));
24
-                $mask = implode(".", array_slice($bytes, 4, 4));
25
-                break;
26
-            default:
27
-                throw new \UnexpectedValueException("Invalid IPv4 octet length.");
19
+        case 4:
20
+            $ip = implode(".", $bytes);
21
+            break;
22
+        case 8:
23
+            $ip = implode(".", array_slice($bytes, 0, 4));
24
+            $mask = implode(".", array_slice($bytes, 4, 4));
25
+            break;
26
+        default:
27
+            throw new \UnexpectedValueException("Invalid IPv4 octet length.");
28 28
         }
29 29
         return new self($ip, $mask);
30 30
     }
Please login to merge, or discard this patch.
lib/X509/GeneralName/IPAddress.php 2 patches
Indentation   +85 added lines, -85 removed lines patch added patch discarded remove patch
@@ -16,97 +16,97 @@
 block discarded – undo
16 16
  */
17 17
 abstract class IPAddress extends GeneralName
18 18
 {
19
-    /**
20
-     * IP address.
21
-     *
22
-     * @var string $_ip
23
-     */
24
-    protected $_ip;
19
+	/**
20
+	 * IP address.
21
+	 *
22
+	 * @var string $_ip
23
+	 */
24
+	protected $_ip;
25 25
     
26
-    /**
27
-     * Subnet mask.
28
-     *
29
-     * @var string|null $_mask
30
-     */
31
-    protected $_mask;
26
+	/**
27
+	 * Subnet mask.
28
+	 *
29
+	 * @var string|null $_mask
30
+	 */
31
+	protected $_mask;
32 32
     
33
-    /**
34
-     * Get octet representation of the IP address.
35
-     *
36
-     * @return string
37
-     */
38
-    abstract protected function _octets();
33
+	/**
34
+	 * Get octet representation of the IP address.
35
+	 *
36
+	 * @return string
37
+	 */
38
+	abstract protected function _octets();
39 39
     
40
-    /**
41
-     * Constructor.
42
-     *
43
-     * @param string $ip
44
-     * @param string|null $mask
45
-     */
46
-    public function __construct($ip, $mask = null)
47
-    {
48
-        $this->_tag = self::TAG_IP_ADDRESS;
49
-        $this->_ip = $ip;
50
-        $this->_mask = $mask;
51
-    }
40
+	/**
41
+	 * Constructor.
42
+	 *
43
+	 * @param string $ip
44
+	 * @param string|null $mask
45
+	 */
46
+	public function __construct($ip, $mask = null)
47
+	{
48
+		$this->_tag = self::TAG_IP_ADDRESS;
49
+		$this->_ip = $ip;
50
+		$this->_mask = $mask;
51
+	}
52 52
     
53
-    /**
54
-     *
55
-     * @param UnspecifiedType $el
56
-     * @return self
57
-     */
58
-    public static function fromChosenASN1(UnspecifiedType $el)
59
-    {
60
-        $octets = $el->asOctetString()->string();
61
-        switch (strlen($octets)) {
62
-            case 4:
63
-            case 8:
64
-                return IPv4Address::fromOctets($octets);
65
-            case 16:
66
-            case 32:
67
-                return IPv6Address::fromOctets($octets);
68
-            default:
69
-                throw new \UnexpectedValueException(
70
-                    "Invalid octet length for IP address.");
71
-        }
72
-    }
53
+	/**
54
+	 *
55
+	 * @param UnspecifiedType $el
56
+	 * @return self
57
+	 */
58
+	public static function fromChosenASN1(UnspecifiedType $el)
59
+	{
60
+		$octets = $el->asOctetString()->string();
61
+		switch (strlen($octets)) {
62
+			case 4:
63
+			case 8:
64
+				return IPv4Address::fromOctets($octets);
65
+			case 16:
66
+			case 32:
67
+				return IPv6Address::fromOctets($octets);
68
+			default:
69
+				throw new \UnexpectedValueException(
70
+					"Invalid octet length for IP address.");
71
+		}
72
+	}
73 73
     
74
-    /**
75
-     *
76
-     * {@inheritdoc}
77
-     */
78
-    public function string()
79
-    {
80
-        return $this->_ip . (isset($this->_mask) ? "/" . $this->_mask : "");
81
-    }
74
+	/**
75
+	 *
76
+	 * {@inheritdoc}
77
+	 */
78
+	public function string()
79
+	{
80
+		return $this->_ip . (isset($this->_mask) ? "/" . $this->_mask : "");
81
+	}
82 82
     
83
-    /**
84
-     * Get IP address as a string.
85
-     *
86
-     * @return string
87
-     */
88
-    public function address()
89
-    {
90
-        return $this->_ip;
91
-    }
83
+	/**
84
+	 * Get IP address as a string.
85
+	 *
86
+	 * @return string
87
+	 */
88
+	public function address()
89
+	{
90
+		return $this->_ip;
91
+	}
92 92
     
93
-    /**
94
-     * Get subnet mask as a string.
95
-     *
96
-     * @return string
97
-     */
98
-    public function mask()
99
-    {
100
-        return $this->_mask;
101
-    }
93
+	/**
94
+	 * Get subnet mask as a string.
95
+	 *
96
+	 * @return string
97
+	 */
98
+	public function mask()
99
+	{
100
+		return $this->_mask;
101
+	}
102 102
     
103
-    /**
104
-     *
105
-     * {@inheritdoc}
106
-     */
107
-    protected function _choiceASN1()
108
-    {
109
-        return new ImplicitlyTaggedType($this->_tag,
110
-            new OctetString($this->_octets()));
111
-    }
103
+	/**
104
+	 *
105
+	 * {@inheritdoc}
106
+	 */
107
+	protected function _choiceASN1()
108
+	{
109
+		return new ImplicitlyTaggedType($this->_tag,
110
+			new OctetString($this->_octets()));
111
+	}
112 112
 }
Please login to merge, or discard this patch.
Switch Indentation   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -59,15 +59,15 @@
 block discarded – undo
59 59
     {
60 60
         $octets = $el->asOctetString()->string();
61 61
         switch (strlen($octets)) {
62
-            case 4:
63
-            case 8:
64
-                return IPv4Address::fromOctets($octets);
65
-            case 16:
66
-            case 32:
67
-                return IPv6Address::fromOctets($octets);
68
-            default:
69
-                throw new \UnexpectedValueException(
70
-                    "Invalid octet length for IP address.");
62
+        case 4:
63
+        case 8:
64
+            return IPv4Address::fromOctets($octets);
65
+        case 16:
66
+        case 32:
67
+            return IPv6Address::fromOctets($octets);
68
+        default:
69
+            throw new \UnexpectedValueException(
70
+                "Invalid octet length for IP address.");
71 71
         }
72 72
     }
73 73
     
Please login to merge, or discard this patch.
lib/X509/GeneralName/UniformResourceIdentifier.php 1 patch
Indentation   +50 added lines, -50 removed lines patch added patch discarded remove patch
@@ -14,59 +14,59 @@
 block discarded – undo
14 14
  */
15 15
 class UniformResourceIdentifier extends GeneralName
16 16
 {
17
-    /**
18
-     * URI.
19
-     *
20
-     * @var string $_uri
21
-     */
22
-    protected $_uri;
17
+	/**
18
+	 * URI.
19
+	 *
20
+	 * @var string $_uri
21
+	 */
22
+	protected $_uri;
23 23
     
24
-    /**
25
-     * Constructor.
26
-     *
27
-     * @param string $uri
28
-     */
29
-    public function __construct($uri)
30
-    {
31
-        $this->_tag = self::TAG_URI;
32
-        $this->_uri = $uri;
33
-    }
24
+	/**
25
+	 * Constructor.
26
+	 *
27
+	 * @param string $uri
28
+	 */
29
+	public function __construct($uri)
30
+	{
31
+		$this->_tag = self::TAG_URI;
32
+		$this->_uri = $uri;
33
+	}
34 34
     
35
-    /**
36
-     *
37
-     * @param UnspecifiedType $el
38
-     * @return self
39
-     */
40
-    public static function fromChosenASN1(UnspecifiedType $el)
41
-    {
42
-        return new self($el->asIA5String()->string());
43
-    }
35
+	/**
36
+	 *
37
+	 * @param UnspecifiedType $el
38
+	 * @return self
39
+	 */
40
+	public static function fromChosenASN1(UnspecifiedType $el)
41
+	{
42
+		return new self($el->asIA5String()->string());
43
+	}
44 44
     
45
-    /**
46
-     *
47
-     * {@inheritdoc}
48
-     */
49
-    public function string()
50
-    {
51
-        return $this->_uri;
52
-    }
45
+	/**
46
+	 *
47
+	 * {@inheritdoc}
48
+	 */
49
+	public function string()
50
+	{
51
+		return $this->_uri;
52
+	}
53 53
     
54
-    /**
55
-     * Get URI.
56
-     *
57
-     * @return string
58
-     */
59
-    public function uri()
60
-    {
61
-        return $this->_uri;
62
-    }
54
+	/**
55
+	 * Get URI.
56
+	 *
57
+	 * @return string
58
+	 */
59
+	public function uri()
60
+	{
61
+		return $this->_uri;
62
+	}
63 63
     
64
-    /**
65
-     *
66
-     * {@inheritdoc}
67
-     */
68
-    protected function _choiceASN1()
69
-    {
70
-        return new ImplicitlyTaggedType($this->_tag, new IA5String($this->_uri));
71
-    }
64
+	/**
65
+	 *
66
+	 * {@inheritdoc}
67
+	 */
68
+	protected function _choiceASN1()
69
+	{
70
+		return new ImplicitlyTaggedType($this->_tag, new IA5String($this->_uri));
71
+	}
72 72
 }
Please login to merge, or discard this patch.
lib/X509/GeneralName/DNSName.php 1 patch
Indentation   +50 added lines, -50 removed lines patch added patch discarded remove patch
@@ -13,59 +13,59 @@
 block discarded – undo
13 13
  */
14 14
 class DNSName extends GeneralName
15 15
 {
16
-    /**
17
-     * DNS name.
18
-     *
19
-     * @var string
20
-     */
21
-    protected $_name;
16
+	/**
17
+	 * DNS name.
18
+	 *
19
+	 * @var string
20
+	 */
21
+	protected $_name;
22 22
     
23
-    /**
24
-     * Constructor.
25
-     *
26
-     * @param string $name Domain name
27
-     */
28
-    public function __construct($name)
29
-    {
30
-        $this->_tag = self::TAG_DNS_NAME;
31
-        $this->_name = $name;
32
-    }
23
+	/**
24
+	 * Constructor.
25
+	 *
26
+	 * @param string $name Domain name
27
+	 */
28
+	public function __construct($name)
29
+	{
30
+		$this->_tag = self::TAG_DNS_NAME;
31
+		$this->_name = $name;
32
+	}
33 33
     
34
-    /**
35
-     *
36
-     * @param UnspecifiedType $el
37
-     * @return self
38
-     */
39
-    public static function fromChosenASN1(UnspecifiedType $el)
40
-    {
41
-        return new self($el->asIA5String()->string());
42
-    }
34
+	/**
35
+	 *
36
+	 * @param UnspecifiedType $el
37
+	 * @return self
38
+	 */
39
+	public static function fromChosenASN1(UnspecifiedType $el)
40
+	{
41
+		return new self($el->asIA5String()->string());
42
+	}
43 43
     
44
-    /**
45
-     *
46
-     * {@inheritdoc}
47
-     */
48
-    public function string()
49
-    {
50
-        return $this->_name;
51
-    }
44
+	/**
45
+	 *
46
+	 * {@inheritdoc}
47
+	 */
48
+	public function string()
49
+	{
50
+		return $this->_name;
51
+	}
52 52
     
53
-    /**
54
-     * Get DNS name.
55
-     *
56
-     * @return string
57
-     */
58
-    public function name()
59
-    {
60
-        return $this->_name;
61
-    }
53
+	/**
54
+	 * Get DNS name.
55
+	 *
56
+	 * @return string
57
+	 */
58
+	public function name()
59
+	{
60
+		return $this->_name;
61
+	}
62 62
     
63
-    /**
64
-     *
65
-     * {@inheritdoc}
66
-     */
67
-    protected function _choiceASN1()
68
-    {
69
-        return new ImplicitlyTaggedType($this->_tag, new IA5String($this->_name));
70
-    }
63
+	/**
64
+	 *
65
+	 * {@inheritdoc}
66
+	 */
67
+	protected function _choiceASN1()
68
+	{
69
+		return new ImplicitlyTaggedType($this->_tag, new IA5String($this->_name));
70
+	}
71 71
 }
Please login to merge, or discard this patch.
lib/X509/GeneralName/EDIPartyName.php 1 patch
Indentation   +39 added lines, -39 removed lines patch added patch discarded remove patch
@@ -15,47 +15,47 @@
 block discarded – undo
15 15
  */
16 16
 class EDIPartyName extends GeneralName
17 17
 {
18
-    /**
19
-     *
20
-     * @var \ASN1\Element
21
-     */
22
-    protected $_element;
18
+	/**
19
+	 *
20
+	 * @var \ASN1\Element
21
+	 */
22
+	protected $_element;
23 23
     
24
-    /**
25
-     * Constructor.
26
-     */
27
-    protected function __construct()
28
-    {
29
-        $this->_tag = self::TAG_EDI_PARTY_NAME;
30
-    }
24
+	/**
25
+	 * Constructor.
26
+	 */
27
+	protected function __construct()
28
+	{
29
+		$this->_tag = self::TAG_EDI_PARTY_NAME;
30
+	}
31 31
     
32
-    /**
33
-     *
34
-     * @param UnspecifiedType $el
35
-     * @return self
36
-     */
37
-    public static function fromChosenASN1(UnspecifiedType $el)
38
-    {
39
-        $obj = new self();
40
-        $obj->_element = $el->asSequence();
41
-        return $obj;
42
-    }
32
+	/**
33
+	 *
34
+	 * @param UnspecifiedType $el
35
+	 * @return self
36
+	 */
37
+	public static function fromChosenASN1(UnspecifiedType $el)
38
+	{
39
+		$obj = new self();
40
+		$obj->_element = $el->asSequence();
41
+		return $obj;
42
+	}
43 43
     
44
-    /**
45
-     *
46
-     * {@inheritdoc}
47
-     */
48
-    public function string()
49
-    {
50
-        return bin2hex($this->_element->toDER());
51
-    }
44
+	/**
45
+	 *
46
+	 * {@inheritdoc}
47
+	 */
48
+	public function string()
49
+	{
50
+		return bin2hex($this->_element->toDER());
51
+	}
52 52
     
53
-    /**
54
-     *
55
-     * {@inheritdoc}
56
-     */
57
-    protected function _choiceASN1()
58
-    {
59
-        return new ImplicitlyTaggedType($this->_tag, $this->_element);
60
-    }
53
+	/**
54
+	 *
55
+	 * {@inheritdoc}
56
+	 */
57
+	protected function _choiceASN1()
58
+	{
59
+		return new ImplicitlyTaggedType($this->_tag, $this->_element);
60
+	}
61 61
 }
Please login to merge, or discard this patch.
lib/X509/GeneralName/GeneralNames.php 2 patches
Indentation   +167 added lines, -167 removed lines patch added patch discarded remove patch
@@ -15,183 +15,183 @@
 block discarded – undo
15 15
  */
16 16
 class GeneralNames implements \Countable, \IteratorAggregate
17 17
 {
18
-    /**
19
-     * GeneralName objects.
20
-     *
21
-     * @var GeneralName[] $_names
22
-     */
23
-    protected $_names;
18
+	/**
19
+	 * GeneralName objects.
20
+	 *
21
+	 * @var GeneralName[] $_names
22
+	 */
23
+	protected $_names;
24 24
     
25
-    /**
26
-     * Constructor.
27
-     *
28
-     * @param GeneralName ...$names One or more GeneralName objects
29
-     */
30
-    public function __construct(GeneralName ...$names)
31
-    {
32
-        $this->_names = $names;
33
-    }
25
+	/**
26
+	 * Constructor.
27
+	 *
28
+	 * @param GeneralName ...$names One or more GeneralName objects
29
+	 */
30
+	public function __construct(GeneralName ...$names)
31
+	{
32
+		$this->_names = $names;
33
+	}
34 34
     
35
-    /**
36
-     * Initialize from ASN.1.
37
-     *
38
-     * @param Sequence $seq
39
-     * @throws \UnexpectedValueException
40
-     * @return self
41
-     */
42
-    public static function fromASN1(Sequence $seq)
43
-    {
44
-        if (!count($seq)) {
45
-            throw new \UnexpectedValueException(
46
-                "GeneralNames must have at least one GeneralName.");
47
-        }
48
-        $names = array_map(
49
-            function (UnspecifiedType $el) {
50
-                return GeneralName::fromASN1($el->asTagged());
51
-            }, $seq->elements());
52
-        return new self(...$names);
53
-    }
35
+	/**
36
+	 * Initialize from ASN.1.
37
+	 *
38
+	 * @param Sequence $seq
39
+	 * @throws \UnexpectedValueException
40
+	 * @return self
41
+	 */
42
+	public static function fromASN1(Sequence $seq)
43
+	{
44
+		if (!count($seq)) {
45
+			throw new \UnexpectedValueException(
46
+				"GeneralNames must have at least one GeneralName.");
47
+		}
48
+		$names = array_map(
49
+			function (UnspecifiedType $el) {
50
+				return GeneralName::fromASN1($el->asTagged());
51
+			}, $seq->elements());
52
+		return new self(...$names);
53
+	}
54 54
     
55
-    /**
56
-     * Find first GeneralName by given tag.
57
-     *
58
-     * @param int $tag
59
-     * @return GeneralName|null
60
-     */
61
-    protected function _findFirst($tag)
62
-    {
63
-        foreach ($this->_names as $name) {
64
-            if ($name->tag() == $tag) {
65
-                return $name;
66
-            }
67
-        }
68
-        return null;
69
-    }
55
+	/**
56
+	 * Find first GeneralName by given tag.
57
+	 *
58
+	 * @param int $tag
59
+	 * @return GeneralName|null
60
+	 */
61
+	protected function _findFirst($tag)
62
+	{
63
+		foreach ($this->_names as $name) {
64
+			if ($name->tag() == $tag) {
65
+				return $name;
66
+			}
67
+		}
68
+		return null;
69
+	}
70 70
     
71
-    /**
72
-     * Check whether GeneralNames contains a GeneralName of given type.
73
-     *
74
-     * @param int $tag One of <code>GeneralName::TAG_*</code> enumerations
75
-     * @return bool
76
-     */
77
-    public function has($tag)
78
-    {
79
-        return null !== $this->_findFirst($tag);
80
-    }
71
+	/**
72
+	 * Check whether GeneralNames contains a GeneralName of given type.
73
+	 *
74
+	 * @param int $tag One of <code>GeneralName::TAG_*</code> enumerations
75
+	 * @return bool
76
+	 */
77
+	public function has($tag)
78
+	{
79
+		return null !== $this->_findFirst($tag);
80
+	}
81 81
     
82
-    /**
83
-     * Get first GeneralName of given type.
84
-     *
85
-     * @param int $tag One of <code>GeneralName::TAG_*</code> enumerations
86
-     * @throws \OutOfBoundsException
87
-     * @return GeneralName
88
-     */
89
-    public function firstOf($tag)
90
-    {
91
-        $name = $this->_findFirst($tag);
92
-        if (!$name) {
93
-            throw new \UnexpectedValueException("No GeneralName by tag $tag.");
94
-        }
95
-        return $name;
96
-    }
82
+	/**
83
+	 * Get first GeneralName of given type.
84
+	 *
85
+	 * @param int $tag One of <code>GeneralName::TAG_*</code> enumerations
86
+	 * @throws \OutOfBoundsException
87
+	 * @return GeneralName
88
+	 */
89
+	public function firstOf($tag)
90
+	{
91
+		$name = $this->_findFirst($tag);
92
+		if (!$name) {
93
+			throw new \UnexpectedValueException("No GeneralName by tag $tag.");
94
+		}
95
+		return $name;
96
+	}
97 97
     
98
-    /**
99
-     * Get all GeneralName objects of given type.
100
-     *
101
-     * @param int $tag One of <code>GeneralName::TAG_*</code> enumerations
102
-     * @return GeneralName[]
103
-     */
104
-    public function allOf($tag)
105
-    {
106
-        $names = array_filter($this->_names,
107
-            function (GeneralName $name) use ($tag) {
108
-                return $name->tag() == $tag;
109
-            });
110
-        return array_values($names);
111
-    }
98
+	/**
99
+	 * Get all GeneralName objects of given type.
100
+	 *
101
+	 * @param int $tag One of <code>GeneralName::TAG_*</code> enumerations
102
+	 * @return GeneralName[]
103
+	 */
104
+	public function allOf($tag)
105
+	{
106
+		$names = array_filter($this->_names,
107
+			function (GeneralName $name) use ($tag) {
108
+				return $name->tag() == $tag;
109
+			});
110
+		return array_values($names);
111
+	}
112 112
     
113
-    /**
114
-     * Get value of the first 'dNSName' type.
115
-     *
116
-     * @return string
117
-     */
118
-    public function firstDNS()
119
-    {
120
-        $gn = $this->firstOf(GeneralName::TAG_DNS_NAME);
121
-        if (!$gn instanceof DNSName) {
122
-            throw new \RuntimeException(
123
-                DNSName::class . " expected, got " . get_class($gn));
124
-        }
125
-        return $gn->name();
126
-    }
113
+	/**
114
+	 * Get value of the first 'dNSName' type.
115
+	 *
116
+	 * @return string
117
+	 */
118
+	public function firstDNS()
119
+	{
120
+		$gn = $this->firstOf(GeneralName::TAG_DNS_NAME);
121
+		if (!$gn instanceof DNSName) {
122
+			throw new \RuntimeException(
123
+				DNSName::class . " expected, got " . get_class($gn));
124
+		}
125
+		return $gn->name();
126
+	}
127 127
     
128
-    /**
129
-     * Get value of the first 'directoryName' type.
130
-     *
131
-     * @return \X501\ASN1\Name
132
-     */
133
-    public function firstDN()
134
-    {
135
-        $gn = $this->firstOf(GeneralName::TAG_DIRECTORY_NAME);
136
-        if (!$gn instanceof DirectoryName) {
137
-            throw new \RuntimeException(
138
-                DirectoryName::class . " expected, got " . get_class($gn));
139
-        }
140
-        return $gn->dn();
141
-    }
128
+	/**
129
+	 * Get value of the first 'directoryName' type.
130
+	 *
131
+	 * @return \X501\ASN1\Name
132
+	 */
133
+	public function firstDN()
134
+	{
135
+		$gn = $this->firstOf(GeneralName::TAG_DIRECTORY_NAME);
136
+		if (!$gn instanceof DirectoryName) {
137
+			throw new \RuntimeException(
138
+				DirectoryName::class . " expected, got " . get_class($gn));
139
+		}
140
+		return $gn->dn();
141
+	}
142 142
     
143
-    /**
144
-     * Get value of the first 'uniformResourceIdentifier' type.
145
-     *
146
-     * @return string
147
-     */
148
-    public function firstURI()
149
-    {
150
-        $gn = $this->firstOf(GeneralName::TAG_URI);
151
-        if (!$gn instanceof UniformResourceIdentifier) {
152
-            throw new \RuntimeException(
153
-                UniformResourceIdentifier::class . " expected, got " .
154
-                     get_class($gn));
155
-        }
156
-        return $gn->uri();
157
-    }
143
+	/**
144
+	 * Get value of the first 'uniformResourceIdentifier' type.
145
+	 *
146
+	 * @return string
147
+	 */
148
+	public function firstURI()
149
+	{
150
+		$gn = $this->firstOf(GeneralName::TAG_URI);
151
+		if (!$gn instanceof UniformResourceIdentifier) {
152
+			throw new \RuntimeException(
153
+				UniformResourceIdentifier::class . " expected, got " .
154
+					 get_class($gn));
155
+		}
156
+		return $gn->uri();
157
+	}
158 158
     
159
-    /**
160
-     * Generate ASN.1 structure.
161
-     *
162
-     * @return Sequence
163
-     */
164
-    public function toASN1()
165
-    {
166
-        if (!count($this->_names)) {
167
-            throw new \LogicException(
168
-                "GeneralNames must have at least one GeneralName.");
169
-        }
170
-        $elements = array_map(
171
-            function (GeneralName $name) {
172
-                return $name->toASN1();
173
-            }, $this->_names);
174
-        return new Sequence(...$elements);
175
-    }
159
+	/**
160
+	 * Generate ASN.1 structure.
161
+	 *
162
+	 * @return Sequence
163
+	 */
164
+	public function toASN1()
165
+	{
166
+		if (!count($this->_names)) {
167
+			throw new \LogicException(
168
+				"GeneralNames must have at least one GeneralName.");
169
+		}
170
+		$elements = array_map(
171
+			function (GeneralName $name) {
172
+				return $name->toASN1();
173
+			}, $this->_names);
174
+		return new Sequence(...$elements);
175
+	}
176 176
     
177
-    /**
178
-     *
179
-     * @see \Countable::count()
180
-     * @return int
181
-     */
182
-    public function count()
183
-    {
184
-        return count($this->_names);
185
-    }
177
+	/**
178
+	 *
179
+	 * @see \Countable::count()
180
+	 * @return int
181
+	 */
182
+	public function count()
183
+	{
184
+		return count($this->_names);
185
+	}
186 186
     
187
-    /**
188
-     * Get iterator for GeneralName objects.
189
-     *
190
-     * @see \IteratorAggregate::getIterator()
191
-     * @return \ArrayIterator
192
-     */
193
-    public function getIterator()
194
-    {
195
-        return new \ArrayIterator($this->_names);
196
-    }
187
+	/**
188
+	 * Get iterator for GeneralName objects.
189
+	 *
190
+	 * @see \IteratorAggregate::getIterator()
191
+	 * @return \ArrayIterator
192
+	 */
193
+	public function getIterator()
194
+	{
195
+		return new \ArrayIterator($this->_names);
196
+	}
197 197
 }
Please login to merge, or discard this patch.
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -46,7 +46,7 @@  discard block
 block discarded – undo
46 46
                 "GeneralNames must have at least one GeneralName.");
47 47
         }
48 48
         $names = array_map(
49
-            function (UnspecifiedType $el) {
49
+            function(UnspecifiedType $el) {
50 50
                 return GeneralName::fromASN1($el->asTagged());
51 51
             }, $seq->elements());
52 52
         return new self(...$names);
@@ -104,7 +104,7 @@  discard block
 block discarded – undo
104 104
     public function allOf($tag)
105 105
     {
106 106
         $names = array_filter($this->_names,
107
-            function (GeneralName $name) use ($tag) {
107
+            function(GeneralName $name) use ($tag) {
108 108
                 return $name->tag() == $tag;
109 109
             });
110 110
         return array_values($names);
@@ -168,7 +168,7 @@  discard block
 block discarded – undo
168 168
                 "GeneralNames must have at least one GeneralName.");
169 169
         }
170 170
         $elements = array_map(
171
-            function (GeneralName $name) {
171
+            function(GeneralName $name) {
172 172
                 return $name->toASN1();
173 173
             }, $this->_names);
174 174
         return new Sequence(...$elements);
Please login to merge, or discard this patch.
lib/X509/GeneralName/RFC822Name.php 1 patch
Indentation   +50 added lines, -50 removed lines patch added patch discarded remove patch
@@ -13,59 +13,59 @@
 block discarded – undo
13 13
  */
14 14
 class RFC822Name extends GeneralName
15 15
 {
16
-    /**
17
-     * Email.
18
-     *
19
-     * @var string $_email
20
-     */
21
-    protected $_email;
16
+	/**
17
+	 * Email.
18
+	 *
19
+	 * @var string $_email
20
+	 */
21
+	protected $_email;
22 22
     
23
-    /**
24
-     * Constructor.
25
-     *
26
-     * @param string $email
27
-     */
28
-    public function __construct($email)
29
-    {
30
-        $this->_tag = self::TAG_RFC822_NAME;
31
-        $this->_email = $email;
32
-    }
23
+	/**
24
+	 * Constructor.
25
+	 *
26
+	 * @param string $email
27
+	 */
28
+	public function __construct($email)
29
+	{
30
+		$this->_tag = self::TAG_RFC822_NAME;
31
+		$this->_email = $email;
32
+	}
33 33
     
34
-    /**
35
-     *
36
-     * @param UnspecifiedType $el
37
-     * @return self
38
-     */
39
-    public static function fromChosenASN1(UnspecifiedType $el)
40
-    {
41
-        return new self($el->asIA5String()->string());
42
-    }
34
+	/**
35
+	 *
36
+	 * @param UnspecifiedType $el
37
+	 * @return self
38
+	 */
39
+	public static function fromChosenASN1(UnspecifiedType $el)
40
+	{
41
+		return new self($el->asIA5String()->string());
42
+	}
43 43
     
44
-    /**
45
-     *
46
-     * {@inheritdoc}
47
-     */
48
-    public function string()
49
-    {
50
-        return $this->_email;
51
-    }
44
+	/**
45
+	 *
46
+	 * {@inheritdoc}
47
+	 */
48
+	public function string()
49
+	{
50
+		return $this->_email;
51
+	}
52 52
     
53
-    /**
54
-     * Get email.
55
-     *
56
-     * @return string
57
-     */
58
-    public function email()
59
-    {
60
-        return $this->_email;
61
-    }
53
+	/**
54
+	 * Get email.
55
+	 *
56
+	 * @return string
57
+	 */
58
+	public function email()
59
+	{
60
+		return $this->_email;
61
+	}
62 62
     
63
-    /**
64
-     *
65
-     * {@inheritdoc}
66
-     */
67
-    protected function _choiceASN1()
68
-    {
69
-        return new ImplicitlyTaggedType($this->_tag, new IA5String($this->_email));
70
-    }
63
+	/**
64
+	 *
65
+	 * {@inheritdoc}
66
+	 */
67
+	protected function _choiceASN1()
68
+	{
69
+		return new ImplicitlyTaggedType($this->_tag, new IA5String($this->_email));
70
+	}
71 71
 }
Please login to merge, or discard this patch.
lib/X509/GeneralName/OtherName.php 1 patch
Indentation   +72 added lines, -72 removed lines patch added patch discarded remove patch
@@ -16,82 +16,82 @@
 block discarded – undo
16 16
  */
17 17
 class OtherName extends GeneralName
18 18
 {
19
-    /**
20
-     * Type OID.
21
-     *
22
-     * @var string $_type
23
-     */
24
-    protected $_type;
19
+	/**
20
+	 * Type OID.
21
+	 *
22
+	 * @var string $_type
23
+	 */
24
+	protected $_type;
25 25
     
26
-    /**
27
-     * Value.
28
-     *
29
-     * @var Element $_element
30
-     */
31
-    protected $_element;
26
+	/**
27
+	 * Value.
28
+	 *
29
+	 * @var Element $_element
30
+	 */
31
+	protected $_element;
32 32
     
33
-    /**
34
-     * Constructor.
35
-     *
36
-     * @param string $type_id OID
37
-     * @param Element $el
38
-     */
39
-    public function __construct($type_id, Element $el)
40
-    {
41
-        $this->_tag = self::TAG_OTHER_NAME;
42
-        $this->_type = $type_id;
43
-        $this->_element = $el;
44
-    }
33
+	/**
34
+	 * Constructor.
35
+	 *
36
+	 * @param string $type_id OID
37
+	 * @param Element $el
38
+	 */
39
+	public function __construct($type_id, Element $el)
40
+	{
41
+		$this->_tag = self::TAG_OTHER_NAME;
42
+		$this->_type = $type_id;
43
+		$this->_element = $el;
44
+	}
45 45
     
46
-    /**
47
-     *
48
-     * @param UnspecifiedType $el
49
-     * @return self
50
-     */
51
-    public static function fromChosenASN1(UnspecifiedType $el)
52
-    {
53
-        $seq = $el->asSequence();
54
-        $type_id = $seq->at(0)
55
-            ->asObjectIdentifier()
56
-            ->oid();
57
-        $value = $seq->getTagged(0)
58
-            ->asExplicit()
59
-            ->asElement();
60
-        return new self($type_id, $value);
61
-    }
62
-    public function string()
63
-    {
64
-        return $this->_type . "/#" . bin2hex($this->_element->toDER());
65
-    }
46
+	/**
47
+	 *
48
+	 * @param UnspecifiedType $el
49
+	 * @return self
50
+	 */
51
+	public static function fromChosenASN1(UnspecifiedType $el)
52
+	{
53
+		$seq = $el->asSequence();
54
+		$type_id = $seq->at(0)
55
+			->asObjectIdentifier()
56
+			->oid();
57
+		$value = $seq->getTagged(0)
58
+			->asExplicit()
59
+			->asElement();
60
+		return new self($type_id, $value);
61
+	}
62
+	public function string()
63
+	{
64
+		return $this->_type . "/#" . bin2hex($this->_element->toDER());
65
+	}
66 66
     
67
-    /**
68
-     * Get type OID.
69
-     *
70
-     * @return string
71
-     */
72
-    public function type()
73
-    {
74
-        return $this->_type;
75
-    }
67
+	/**
68
+	 * Get type OID.
69
+	 *
70
+	 * @return string
71
+	 */
72
+	public function type()
73
+	{
74
+		return $this->_type;
75
+	}
76 76
     
77
-    /**
78
-     * Get value element.
79
-     *
80
-     * @return Element
81
-     */
82
-    public function value()
83
-    {
84
-        return $this->_element;
85
-    }
77
+	/**
78
+	 * Get value element.
79
+	 *
80
+	 * @return Element
81
+	 */
82
+	public function value()
83
+	{
84
+		return $this->_element;
85
+	}
86 86
     
87
-    /**
88
-     *
89
-     * {@inheritdoc}
90
-     */
91
-    protected function _choiceASN1()
92
-    {
93
-        return new ImplicitlyTaggedType($this->_tag,
94
-            new Sequence(new ObjectIdentifier($this->_type),
95
-                new ExplicitlyTaggedType(0, $this->_element)));
96
-    }
87
+	/**
88
+	 *
89
+	 * {@inheritdoc}
90
+	 */
91
+	protected function _choiceASN1()
92
+	{
93
+		return new ImplicitlyTaggedType($this->_tag,
94
+			new Sequence(new ObjectIdentifier($this->_type),
95
+				new ExplicitlyTaggedType(0, $this->_element)));
96
+	}
97 97
 }
Please login to merge, or discard this patch.