@@ -74,7 +74,7 @@ discard block |
||
74 | 74 | 'exp' => \time() + 300, |
75 | 75 | ])); |
76 | 76 | |
77 | - if (! $payload) { |
|
77 | + if (!$payload) { |
|
78 | 78 | throw new RuntimeException('Unable to encode payload'); |
79 | 79 | } |
80 | 80 | |
@@ -103,7 +103,7 @@ discard block |
||
103 | 103 | } else { |
104 | 104 | $jwk = $client->getJWKS()->selectKey('sig', null, ['alg' => $alg]); |
105 | 105 | |
106 | - if (! $jwk) { |
|
106 | + if (!$jwk) { |
|
107 | 107 | throw new RuntimeException('No key to sign with alg ' . $alg); |
108 | 108 | } |
109 | 109 | } |
@@ -128,7 +128,7 @@ discard block |
||
128 | 128 | /** @var null|string $alg */ |
129 | 129 | $alg = $metadata->get('request_object_encryption_alg'); |
130 | 130 | |
131 | - if (! $alg) { |
|
131 | + if (!$alg) { |
|
132 | 132 | return $payload; |
133 | 133 | } |
134 | 134 | |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | if (\preg_match('/^(RSA|ECDH)/', $alg)) { |
139 | 139 | $jwk = $issuer->getJwks()->selectKey('enc', null, ['alg' => $alg, 'enc' => $enc]); |
140 | 140 | |
141 | - if (! $jwk) { |
|
141 | + if (!$jwk) { |
|
142 | 142 | throw new RuntimeException('No key to sign with alg ' . $alg); |
143 | 143 | } |
144 | 144 | } else { |