@@ -74,7 +74,7 @@ discard block |
||
| 74 | 74 | 'exp' => \time() + 300, |
| 75 | 75 | ])); |
| 76 | 76 | |
| 77 | - if (! $payload) { |
|
| 77 | + if (!$payload) { |
|
| 78 | 78 | throw new RuntimeException('Unable to encode payload'); |
| 79 | 79 | } |
| 80 | 80 | |
@@ -103,7 +103,7 @@ discard block |
||
| 103 | 103 | } else { |
| 104 | 104 | $jwk = $client->getJWKS()->selectKey('sig', null, ['alg' => $alg]); |
| 105 | 105 | |
| 106 | - if (! $jwk) { |
|
| 106 | + if (!$jwk) { |
|
| 107 | 107 | throw new RuntimeException('No key to sign with alg ' . $alg); |
| 108 | 108 | } |
| 109 | 109 | } |
@@ -128,7 +128,7 @@ discard block |
||
| 128 | 128 | /** @var null|string $alg */ |
| 129 | 129 | $alg = $metadata->get('request_object_encryption_alg'); |
| 130 | 130 | |
| 131 | - if (! $alg) { |
|
| 131 | + if (!$alg) { |
|
| 132 | 132 | return $payload; |
| 133 | 133 | } |
| 134 | 134 | |
@@ -138,7 +138,7 @@ discard block |
||
| 138 | 138 | if (\preg_match('/^(RSA|ECDH)/', $alg)) { |
| 139 | 139 | $jwk = $issuer->getJwks()->selectKey('enc', null, ['alg' => $alg, 'enc' => $enc]); |
| 140 | 140 | |
| 141 | - if (! $jwk) { |
|
| 141 | + if (!$jwk) { |
|
| 142 | 142 | throw new RuntimeException('No key to sign with alg ' . $alg); |
| 143 | 143 | } |
| 144 | 144 | } else { |