@@ -54,7 +54,7 @@ |
||
| 54 | 54 | if ($prefix === $this->encryption->get_type()) { |
| 55 | 55 | // Decrypt the secret if it is prefixed with the current encryption type |
| 56 | 56 | // Remove the encryption type prefix before decrypting |
| 57 | - return $this->encryption->decrypt( substr($encryptedSecret, $pos+1) ); |
|
| 57 | + return $this->encryption->decrypt( substr($encryptedSecret, $pos+1) ); |
|
| 58 | 58 | } |
| 59 | 59 | |
| 60 | 60 | // Check the decryption array for the encryption type to see if there is an encryption |
@@ -160,7 +160,7 @@ |
||
| 160 | 160 | } |
| 161 | 161 | |
| 162 | 162 | /** |
| 163 | - * Decrypts the given data. |
|
| 163 | + * Decrypts the given data. |
|
| 164 | 164 | * |
| 165 | 165 | * @param string $data Data to decrypt. |
| 166 | 166 | * @return string decrypted data |
@@ -57,7 +57,7 @@ |
||
| 57 | 57 | } |
| 58 | 58 | |
| 59 | 59 | /** |
| 60 | - * Decrypts the given data. |
|
| 60 | + * Decrypts the given data. |
|
| 61 | 61 | * |
| 62 | 62 | * @param String $data Data to decrypt. |
| 63 | 63 | * |
@@ -97,7 +97,7 @@ |
||
| 97 | 97 | * ), |
| 98 | 98 | * ) |
| 99 | 99 | * ); |
| 100 | - * |
|
| 100 | + * |
|
| 101 | 101 | * |
| 102 | 102 | * @return Tiqr_UserSecretStorage_Interface |
| 103 | 103 | * @throws RuntimeException If an unknown type is requested. |
@@ -113,9 +113,9 @@ |
||
| 113 | 113 | |
| 114 | 114 | // Wait and retry once in case of a 502 Bad Gateway error |
| 115 | 115 | if ($statusCode === 502 && !($retry)) { |
| 116 | - sleep(2); |
|
| 117 | - $this->_sendFirebase($deviceToken, $alert, $challenge, $projectId, $credentialsFile, true); |
|
| 118 | - return; |
|
| 116 | + sleep(2); |
|
| 117 | + $this->_sendFirebase($deviceToken, $alert, $challenge, $projectId, $credentialsFile, true); |
|
| 118 | + return; |
|
| 119 | 119 | } |
| 120 | 120 | |
| 121 | 121 | if ($statusCode !== 200) { |