| @@ -122,12 +122,15 @@ discard block | ||
| 122 | 122 | $cryptoFunction = $components[1]; | 
| 123 | 123 | $dataInput = strtolower($components[2]); // lower here so we can do case insensitive comparisons | 
| 124 | 124 | |
| 125 | - if(stripos($cryptoFunction, "sha1")!==false) | |
| 126 | - $crypto = "sha1"; | |
| 127 | - if(stripos($cryptoFunction, "sha256")!==false) | |
| 128 | - $crypto = "sha256"; | |
| 129 | - if(stripos($cryptoFunction, "sha512")!==false) | |
| 130 | - $crypto = "sha512"; | |
| 125 | +        if(stripos($cryptoFunction, "sha1")!==false) { | |
| 126 | + $crypto = "sha1"; | |
| 127 | + } | |
| 128 | +        if(stripos($cryptoFunction, "sha256")!==false) { | |
| 129 | + $crypto = "sha256"; | |
| 130 | + } | |
| 131 | +        if(stripos($cryptoFunction, "sha512")!==false) { | |
| 132 | + $crypto = "sha512"; | |
| 133 | + } | |
| 131 | 134 | |
| 132 | 135 | $codeDigits = substr($cryptoFunction, strrpos($cryptoFunction, "-")+1); | 
| 133 | 136 | |
| @@ -135,56 +138,65 @@ discard block | ||
| 135 | 138 | // Counter | 
| 136 | 139 |          if($dataInput[0] == "c" ) { | 
| 137 | 140 | // Fix the length of the HEX string | 
| 138 | - while(strlen($counter) < 16) | |
| 139 | - $counter = "0" . $counter; | |
| 141 | +            while(strlen($counter) < 16) { | |
| 142 | + $counter = "0" . $counter; | |
| 143 | + } | |
| 140 | 144 | $counterLength=8; | 
| 141 | 145 | } | 
| 142 | 146 | // Question | 
| 143 | 147 | if($dataInput[0] == "q" || | 
| 144 | 148 |                  stripos($dataInput, "-q")!==false) { | 
| 145 | - while(strlen($question) < 256) | |
| 146 | - $question = $question . "0"; | |
| 149 | +            while(strlen($question) < 256) { | |
| 150 | + $question = $question . "0"; | |
| 151 | + } | |
| 147 | 152 | $questionLength=128; | 
| 148 | 153 | } | 
| 149 | 154 | |
| 150 | 155 | // Password | 
| 151 | 156 |          if(stripos($dataInput, "psha1")!==false) { | 
| 152 | - while(strlen($password) < 40) | |
| 153 | - $password = "0" . $password; | |
| 157 | +            while(strlen($password) < 40) { | |
| 158 | + $password = "0" . $password; | |
| 159 | + } | |
| 154 | 160 | $passwordLength=20; | 
| 155 | 161 | } | 
| 156 | 162 | |
| 157 | 163 |          if(stripos($dataInput, "psha256")!==false) { | 
| 158 | - while(strlen($password) < 64) | |
| 159 | - $password = "0" . $password; | |
| 164 | +            while(strlen($password) < 64) { | |
| 165 | + $password = "0" . $password; | |
| 166 | + } | |
| 160 | 167 | $passwordLength=32; | 
| 161 | 168 | } | 
| 162 | 169 | |
| 163 | 170 |          if(stripos($dataInput, "psha512")!==false) { | 
| 164 | - while(strlen($password) < 128) | |
| 165 | - $password = "0" . $password; | |
| 171 | +            while(strlen($password) < 128) { | |
| 172 | + $password = "0" . $password; | |
| 173 | + } | |
| 166 | 174 | $passwordLength=64; | 
| 167 | 175 | } | 
| 168 | 176 | |
| 169 | 177 | // sessionInformation | 
| 170 | 178 |          if(stripos($dataInput, "s064") !==false) { | 
| 171 | - while(strlen($sessionInformation) < 128) | |
| 172 | - $sessionInformation = "0" . $sessionInformation; | |
| 179 | +            while(strlen($sessionInformation) < 128) { | |
| 180 | + $sessionInformation = "0" . $sessionInformation; | |
| 181 | + } | |
| 173 | 182 | |
| 174 | 183 | $sessionInformationLength=64; | 
| 175 | 184 |          } else if(stripos($dataInput, "s128") !==false) { | 
| 176 | - while(strlen($sessionInformation) < 256) | |
| 177 | - $sessionInformation = "0" . $sessionInformation; | |
| 185 | +            while(strlen($sessionInformation) < 256) { | |
| 186 | + $sessionInformation = "0" . $sessionInformation; | |
| 187 | + } | |
| 178 | 188 | |
| 179 | 189 | $sessionInformationLength=128; | 
| 180 | 190 |          } else if(stripos($dataInput, "s256") !==false) { | 
| 181 | - while(strlen($sessionInformation) < 512) | |
| 182 | - $sessionInformation = "0" . $sessionInformation; | |
| 191 | +            while(strlen($sessionInformation) < 512) { | |
| 192 | + $sessionInformation = "0" . $sessionInformation; | |
| 193 | + } | |
| 183 | 194 | |
| 184 | 195 | $sessionInformationLength=256; | 
| 185 | 196 |          } else if(stripos($dataInput, "s512") !==false) { | 
| 186 | - while(strlen($sessionInformation) < 128) | |
| 187 | - $sessionInformation = "0" . $sessionInformation; | |
| 197 | +            while(strlen($sessionInformation) < 128) { | |
| 198 | + $sessionInformation = "0" . $sessionInformation; | |
| 199 | + } | |
| 188 | 200 | |
| 189 | 201 | $sessionInformationLength=64; | 
| 190 | 202 |          } else if (stripos($dataInput, "-s") !== false ) { | 
| @@ -196,8 +208,9 @@ discard block | ||
| 196 | 208 | // to prevent matching the "s" in the password input e.g. "psha1". | 
| 197 | 209 | // [C] | QFxx | [PH | Snnn | TG] : Challenge-Response computation | 
| 198 | 210 | // [C] | QFxx | [PH | TG] : Plain Signature computation | 
| 199 | - while(strlen($sessionInformation) < 128) | |
| 200 | - $sessionInformation = "0" . $sessionInformation; | |
| 211 | +            while(strlen($sessionInformation) < 128) { | |
| 212 | + $sessionInformation = "0" . $sessionInformation; | |
| 213 | + } | |
| 201 | 214 | |
| 202 | 215 | $sessionInformationLength=64; | 
| 203 | 216 | } | 
| @@ -207,8 +220,9 @@ discard block | ||
| 207 | 220 | // TimeStamp | 
| 208 | 221 | if($dataInput[0] == "t" || | 
| 209 | 222 |                  stripos($dataInput, "-t") !== false) { | 
| 210 | - while(strlen($timeStamp) < 16) | |
| 211 | - $timeStamp = "0" . $timeStamp; | |
| 223 | +            while(strlen($timeStamp) < 16) { | |
| 224 | + $timeStamp = "0" . $timeStamp; | |
| 225 | + } | |
| 212 | 226 | $timeStampLength=8; | 
| 213 | 227 | } | 
| 214 | 228 | |
| @@ -86,8 +86,7 @@ discard block | ||
| 86 | 86 |              $sth = $this->handle->prepare('SELECT userid FROM ' . $this->tableName . ' WHERE userid = ?'); | 
| 87 | 87 | $sth->execute(array($userId)); | 
| 88 | 88 | return (false !== $sth->fetchColumn()); | 
| 89 | - } | |
| 90 | -        catch (Exception $e) { | |
| 89 | +        } catch (Exception $e) { | |
| 91 | 90 |              $this->logger->error('PDO error checking user exists', array('exception'=>$e, 'userId'=>$userId)); | 
| 92 | 91 | throw ReadWriteException::fromOriginalException($e); | 
| 93 | 92 | } | 
| @@ -111,8 +110,7 @@ discard block | ||
| 111 | 110 |                  $this->logger->error(sprintf('No result getting secret for user "%s"', $userId)); | 
| 112 | 111 |                  throw new RuntimeException('User not found'); | 
| 113 | 112 | } | 
| 114 | - } | |
| 115 | -        catch (Exception $e) { | |
| 113 | +        } catch (Exception $e) { | |
| 116 | 114 |              $this->logger->error('PDO error getting user', array('exception' => $e, 'userId' => $userId)); | 
| 117 | 115 | throw ReadWriteException::fromOriginalException($e); | 
| 118 | 116 | } | 
| @@ -146,8 +144,7 @@ discard block | ||
| 146 | 144 |                  $sth = $this->handle->prepare('INSERT INTO ' . $this->tableName . ' (secret,userid) VALUES (?,?)'); | 
| 147 | 145 | } | 
| 148 | 146 | $sth->execute(array($secret, $userId)); | 
| 149 | - } | |
| 150 | -        catch (Exception $e) { | |
| 147 | +        } catch (Exception $e) { | |
| 151 | 148 | $this->logger->error( | 
| 152 | 149 |                  sprintf('Unable to persist user secret for user "%s" in user secret storage (PDO)', $userId), | 
| 153 | 150 |                  array('exception'=>$e) | 
| @@ -74,7 +74,9 @@ | ||
| 74 | 74 | */ | 
| 75 | 75 | public function getPath(): string | 
| 76 | 76 |      { | 
| 77 | - if (substr($this->path, -1)!="/") return $this->path."/"; | |
| 77 | +        if (substr($this->path, -1)!="/") { | |
| 78 | + return $this->path."/"; | |
| 79 | + } | |
| 78 | 80 | return $this->path; | 
| 79 | 81 | } | 
| 80 | 82 | } | 
| @@ -36,8 +36,7 @@ | ||
| 36 | 36 | // response as the client calculated. | 
| 37 | 37 |          try { | 
| 38 | 38 | $expected = OCRA::generateOCRA($this->_ocraSuite, $userSecret, "", $challenge, "", $sessionInformation, ""); | 
| 39 | - } | |
| 40 | -        catch (Exception $e) { | |
| 39 | +        } catch (Exception $e) { | |
| 41 | 40 |              $this->logger->warning(sprintf('Error calculating OCRA response for user "%s"', $userId), array('exception'=>$e)); | 
| 42 | 41 | return false; | 
| 43 | 42 | } | 
| @@ -110,8 +110,7 @@ discard block | ||
| 110 | 110 |                  throw new RuntimeException('Unexpected return type'); | 
| 111 | 111 | } | 
| 112 | 112 | return $res; | 
| 113 | - } | |
| 114 | -        catch (Exception $e) { | |
| 113 | +        } catch (Exception $e) { | |
| 115 | 114 |              $this->logger->error('PDO error getting user', array('exception' => $e, 'userId' => $userId, 'columnName'=>$columnName)); | 
| 116 | 115 | throw ReadWriteException::fromOriginalException($e); | 
| 117 | 116 | } | 
| @@ -149,8 +148,7 @@ discard block | ||
| 149 | 148 |                  throw new RuntimeException('Unexpected return type'); | 
| 150 | 149 | } | 
| 151 | 150 | return (int)$res; | 
| 152 | - } | |
| 153 | -        catch (Exception $e) { | |
| 151 | +        } catch (Exception $e) { | |
| 154 | 152 |              $this->logger->error('PDO error getting user', array('exception' => $e, 'userId' => $userId, 'columnName'=>$columnName)); | 
| 155 | 153 | throw ReadWriteException::fromOriginalException($e); | 
| 156 | 154 | } | 
| @@ -177,8 +175,7 @@ discard block | ||
| 177 | 175 |                      throw new RuntimeException('User not found'); | 
| 178 | 176 | } | 
| 179 | 177 | } | 
| 180 | - } | |
| 181 | -        catch (Exception $e) { | |
| 178 | +        } catch (Exception $e) { | |
| 182 | 179 |              $this->logger->error('PDO error updating user', array('exception' => $e, 'userId' => $userId, 'columnName'=>$columnName)); | 
| 183 | 180 | throw ReadWriteException::fromOriginalException($e); | 
| 184 | 181 | } | 
| @@ -205,8 +202,7 @@ discard block | ||
| 205 | 202 |                      throw new RuntimeException('User not found'); | 
| 206 | 203 | } | 
| 207 | 204 | } | 
| 208 | - } | |
| 209 | -        catch (Exception $e) { | |
| 205 | +        } catch (Exception $e) { | |
| 210 | 206 |              $this->logger->error('PDO error updating user', array('exception' => $e, 'userId' => $userId, 'columnName'=>$columnName)); | 
| 211 | 207 | throw ReadWriteException::fromOriginalException($e); | 
| 212 | 208 | } | 
| @@ -223,8 +219,7 @@ discard block | ||
| 223 | 219 |          try { | 
| 224 | 220 |              $sth = $this->handle->prepare("INSERT INTO ".$this->tablename." (displayname,userid) VALUES (?,?)"); | 
| 225 | 221 | $sth->execute(array($displayName, $userId)); | 
| 226 | - } | |
| 227 | -        catch (Exception $e) { | |
| 222 | +        } catch (Exception $e) { | |
| 228 | 223 |              $this->logger->error(sprintf('Error creating user "%s"', $userId), array('exception'=>$e)); | 
| 229 | 224 |              throw new ReadWriteException('The user could not be saved in the user storage (PDO)'); | 
| 230 | 225 | } | 
| @@ -239,8 +234,7 @@ discard block | ||
| 239 | 234 |              $sth = $this->handle->prepare("SELECT userid FROM ".$this->tablename." WHERE userid = ?"); | 
| 240 | 235 | $sth->execute(array($userId)); | 
| 241 | 236 | return (false !== $sth->fetchColumn()); | 
| 242 | - } | |
| 243 | -        catch (Exception $e) { | |
| 237 | +        } catch (Exception $e) { | |
| 244 | 238 |              $this->logger->error('PDO error checking user exists', array('exception'=>$e, 'userId'=>$userId)); | 
| 245 | 239 | throw ReadWriteException::fromOriginalException($e); | 
| 246 | 240 | } | 
| @@ -28,8 +28,7 @@ | ||
| 28 | 28 | // Use HTTP/1.1 instead of HTTP/2 | 
| 29 | 29 | $curl_options[CURLOPT_HTTP_VERSION] = CURL_HTTP_VERSION_1_1; | 
| 30 | 30 |              $this->logger->notice(sprintf('Using HTTP/1.1 CURL Proxy URL: "%s" and port "%s"',  $curl_options[CURLOPT_URL], $curl_options[CURLOPT_URL])); | 
| 31 | - } | |
| 32 | -        else { | |
| 31 | +        } else { | |
| 33 | 32 | $version_info = curl_version(); | 
| 34 | 33 |              if ($version_info['features'] & CURL_VERSION_HTTP2 == 0) { | 
| 35 | 34 |                  throw new RuntimeException('APNS2 requires HTTP/2 support in curl'); | 
| @@ -80,8 +80,7 @@ discard block | ||
| 80 | 80 |              $sth = $this->handle->prepare('SELECT `key` FROM ' . $this->tablename . ' WHERE `key` = ?'); | 
| 81 | 81 | $sth->execute(array($key)); | 
| 82 | 82 | return $sth->fetchColumn() !== false; | 
| 83 | - } | |
| 84 | -        catch (Exception $e) { | |
| 83 | +        } catch (Exception $e) { | |
| 85 | 84 | $this->logger->error( | 
| 86 | 85 |                  sprintf('Error checking for key "%s" in PDO StateStorage', $key), | 
| 87 | 86 |                  array('exception' => $e) | 
| @@ -103,8 +102,7 @@ discard block | ||
| 103 | 102 | $this->logger->notice( | 
| 104 | 103 |                  sprintf("Deleted %d expired keys", $deletedRows) | 
| 105 | 104 | ); | 
| 106 | - } | |
| 107 | -        catch (Exception $e) { | |
| 105 | +        } catch (Exception $e) { | |
| 108 | 106 | $this->logger->error( | 
| 109 | 107 |                  sprintf("Deleting expired keys failed: %s", $e->getMessage()), | 
| 110 | 108 |                  array('exception', $e) | 
| @@ -134,8 +132,7 @@ discard block | ||
| 134 | 132 | } | 
| 135 | 133 |          try { | 
| 136 | 134 | $sth->execute(array(serialize($value), $expire, $key)); | 
| 137 | - } | |
| 138 | -        catch (Exception $e) { | |
| 135 | +        } catch (Exception $e) { | |
| 139 | 136 | $this->logger->error( | 
| 140 | 137 |                  sprintf('Unable to store key "%s" in PDO StateStorage', $key), | 
| 141 | 138 |                  array('exception' => $e) | 
| @@ -155,8 +152,7 @@ discard block | ||
| 155 | 152 |          try { | 
| 156 | 153 |              $sth = $this->handle->prepare("DELETE FROM " . $this->tablename . " WHERE `key` = ?"); | 
| 157 | 154 | $sth->execute(array($key)); | 
| 158 | - } | |
| 159 | -        catch (Exception $e) { | |
| 155 | +        } catch (Exception $e) { | |
| 160 | 156 | $this->logger->error( | 
| 161 | 157 |                  sprintf('Error deleting key "%s" from PDO StateStorage', $key), | 
| 162 | 158 |                  array('exception' => $e) | 
| @@ -185,8 +181,7 @@ discard block | ||
| 185 | 181 |          try { | 
| 186 | 182 |              $sth = $this->handle->prepare('SELECT `value` FROM ' . $this->tablename . ' WHERE `key` = ? AND (`expire` >= ? OR `expire` = 0)'); | 
| 187 | 183 | $sth->execute(array($key, time())); | 
| 188 | - } | |
| 189 | -        catch (Exception $e) { | |
| 184 | +        } catch (Exception $e) { | |
| 190 | 185 | $this->logger->error( | 
| 191 | 186 |                  sprintf('Error getting value for key "%s" from PDO StateStorage', $key), | 
| 192 | 187 |                  array('exception' => $e) | 
| @@ -41,8 +41,9 @@ | ||
| 41 | 41 | */ | 
| 42 | 42 | public static function getOcraService(string $type="tiqr", array $options=array(), LoggerInterface $logger=null) | 
| 43 | 43 |      { | 
| 44 | - if (!$logger) | |
| 45 | - $logger=new \Psr\Log\NullLogger(); | |
| 44 | +        if (!$logger) { | |
| 45 | + $logger=new \Psr\Log\NullLogger(); | |
| 46 | + } | |
| 46 | 47 | |
| 47 | 48 |          switch ($type) { | 
| 48 | 49 | case "tiqr": | 
| @@ -287,8 +287,7 @@ discard block | ||
| 287 | 287 |          if (isset($options['ocraservice']) && $options['ocraservice']['type'] != 'tiqr') { | 
| 288 | 288 | $options['ocraservice']['ocra.suite'] = $this->_ocraSuite; | 
| 289 | 289 | $this->_ocraService = Tiqr_OcraService::getOcraService($options['ocraservice']['type'], $options['ocraservice'], $logger); | 
| 290 | - } | |
| 291 | -        else { // Create default ocraservice | |
| 290 | +        } else { // Create default ocraservice | |
| 292 | 291 |              $this->_ocraService = Tiqr_OcraService::getOcraService('tiqr', array('ocra.suite' => $this->_ocraSuite), $logger); | 
| 293 | 292 | } | 
| 294 | 293 | } | 
| @@ -347,8 +346,9 @@ discard block | ||
| 347 | 346 | case 'APNS': | 
| 348 | 347 | case 'APNS_DIRECT': | 
| 349 | 348 | $apns_version = $this->_options['apns.version'] ?? 2; | 
| 350 | - if ($apns_version !=2) | |
| 351 | -                        throw new InvalidArgumentException("Unsupported APNS version '$apns_version'"); | |
| 349 | +                    if ($apns_version !=2) { | |
| 350 | +                                            throw new InvalidArgumentException("Unsupported APNS version '$apns_version'"); | |
| 351 | + } | |
| 352 | 352 | $message = new Tiqr_Message_APNS2($this->_options, $this->logger); | 
| 353 | 353 | break; | 
| 354 | 354 | |
| @@ -514,7 +514,9 @@ discard block | ||
| 514 | 514 | $sessionId = session_id(); | 
| 515 | 515 | } | 
| 516 | 516 | $status = $this->_getStateValue(self::PREFIX_ENROLLMENT_STATUS, $sessionId); | 
| 517 | - if (is_null($status)) return self::ENROLLMENT_STATUS_IDLE; | |
| 517 | +        if (is_null($status)) { | |
| 518 | + return self::ENROLLMENT_STATUS_IDLE; | |
| 519 | + } | |
| 518 | 520 | return $status; | 
| 519 | 521 | } | 
| 520 | 522 | |
| @@ -871,8 +873,7 @@ discard block | ||
| 871 | 873 | |
| 872 | 874 |          try { | 
| 873 | 875 |              return $this->_getStateValue("authenticated_", $sessionId); | 
| 874 | - } | |
| 875 | -        catch (Exception $e) { | |
| 876 | +        } catch (Exception $e) { | |
| 876 | 877 |              $this->logger->error('getAuthenticatedUser failed', array('exception'=>$e)); | 
| 877 | 878 | return NULL; | 
| 878 | 879 | } |