@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | /** |
48 | 48 | * @see Tiqr_StateStorage_StateStorageInterface::setValue() |
49 | 49 | */ |
50 | - public function setValue(string $key, $value, int $expire=0): void |
|
50 | + public function setValue(string $key, $value, int $expire = 0): void |
|
51 | 51 | { |
52 | 52 | if (empty($key)) { |
53 | 53 | throw new InvalidArgumentException('Empty key not allowed'); |
@@ -109,8 +109,8 @@ discard block |
||
109 | 109 | |
110 | 110 | private function getPath(): string |
111 | 111 | { |
112 | - if (substr($this->path, -1)!=="/") { |
|
113 | - return $this->path . "/"; |
|
112 | + if (substr($this->path, -1) !== "/") { |
|
113 | + return $this->path."/"; |
|
114 | 114 | } |
115 | 115 | return $this->path; |
116 | 116 | } |
@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | * The default configuration |
52 | 52 | */ |
53 | 53 | const DEFAULT_HOST = '127.0.0.1'; |
54 | - const DEFAULT_PORT = 11211; |
|
54 | + const DEFAULT_PORT = 11211; |
|
55 | 55 | |
56 | 56 | /** |
57 | 57 | * Get the prefix to use for all keys in memcache. |
@@ -103,7 +103,7 @@ discard block |
||
103 | 103 | /** |
104 | 104 | * @see Tiqr_StateStorage_StateStorageInterface::setValue() |
105 | 105 | */ |
106 | - public function setValue(string $key, $value, int $expire=0): void |
|
106 | + public function setValue(string $key, $value, int $expire = 0): void |
|
107 | 107 | { |
108 | 108 | if (empty($key)) { |
109 | 109 | throw new InvalidArgumentException('Empty key not allowed'); |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | if ($result === false) { |
158 | 158 | // Memcache interface does not provide error information, either the key does not exists or |
159 | 159 | // there was an error communicating with the memcache |
160 | - $this->logger->info( sprintf('Unable to get key "%s" from memcache StateStorage', $key) ); |
|
160 | + $this->logger->info(sprintf('Unable to get key "%s" from memcache StateStorage', $key)); |
|
161 | 161 | return null; |
162 | 162 | } |
163 | 163 | return $result; |
@@ -77,7 +77,7 @@ discard block |
||
77 | 77 | throw new InvalidArgumentException('Empty key not allowed'); |
78 | 78 | } |
79 | 79 | try { |
80 | - $sth = $this->handle->prepare('SELECT `key` FROM ' . $this->tablename . ' WHERE `key` = ?'); |
|
80 | + $sth = $this->handle->prepare('SELECT `key` FROM '.$this->tablename.' WHERE `key` = ?'); |
|
81 | 81 | $sth->execute(array($key)); |
82 | 82 | return $sth->fetchColumn() !== false; |
83 | 83 | } |
@@ -97,9 +97,9 @@ discard block |
||
97 | 97 | */ |
98 | 98 | private function cleanExpired(): void { |
99 | 99 | try { |
100 | - $sth = $this->handle->prepare("DELETE FROM " . $this->tablename . " WHERE `expire` < ? AND NOT `expire` = 0"); |
|
100 | + $sth = $this->handle->prepare("DELETE FROM ".$this->tablename." WHERE `expire` < ? AND NOT `expire` = 0"); |
|
101 | 101 | $sth->execute(array(time())); |
102 | - $deletedRows=$sth->rowCount(); |
|
102 | + $deletedRows = $sth->rowCount(); |
|
103 | 103 | $this->logger->notice( |
104 | 104 | sprintf("Deleted %i expired keys", $deletedRows) |
105 | 105 | ); |
@@ -115,12 +115,12 @@ discard block |
||
115 | 115 | /** |
116 | 116 | * @see Tiqr_StateStorage_StateStorageInterface::setValue() |
117 | 117 | */ |
118 | - public function setValue(string $key, $value, int $expire=0): void |
|
118 | + public function setValue(string $key, $value, int $expire = 0): void |
|
119 | 119 | { |
120 | 120 | if (empty($key)) { |
121 | 121 | throw new InvalidArgumentException('Empty key not allowed'); |
122 | 122 | } |
123 | - if (((float) rand() /(float) getrandmax()) < $this->cleanupProbability) { |
|
123 | + if (((float) rand() / (float) getrandmax()) < $this->cleanupProbability) { |
|
124 | 124 | $this->cleanExpired(); |
125 | 125 | } |
126 | 126 | if ($this->keyExists($key)) { |
@@ -130,7 +130,7 @@ discard block |
||
130 | 130 | } |
131 | 131 | // $expire == 0 means never expire |
132 | 132 | if ($expire != 0) { |
133 | - $expire+=time(); // Store unix timestamp after which the expires |
|
133 | + $expire += time(); // Store unix timestamp after which the expires |
|
134 | 134 | } |
135 | 135 | try { |
136 | 136 | $sth->execute(array(serialize($value), $expire, $key)); |
@@ -153,7 +153,7 @@ discard block |
||
153 | 153 | throw new InvalidArgumentException('Empty key not allowed'); |
154 | 154 | } |
155 | 155 | try { |
156 | - $sth = $this->handle->prepare("DELETE FROM " . $this->tablename . " WHERE `key` = ?"); |
|
156 | + $sth = $this->handle->prepare("DELETE FROM ".$this->tablename." WHERE `key` = ?"); |
|
157 | 157 | $sth->execute(array($key)); |
158 | 158 | } |
159 | 159 | catch (Exception $e) { |
@@ -183,7 +183,7 @@ discard block |
||
183 | 183 | } |
184 | 184 | |
185 | 185 | try { |
186 | - $sth = $this->handle->prepare('SELECT `value` FROM ' . $this->tablename . ' WHERE `key` = ? AND (`expire` >= ? OR `expire` = 0)'); |
|
186 | + $sth = $this->handle->prepare('SELECT `value` FROM '.$this->tablename.' WHERE `key` = ? AND (`expire` >= ? OR `expire` = 0)'); |
|
187 | 187 | $sth->execute(array($key, time())); |
188 | 188 | } |
189 | 189 | catch (Exception $e) { |
@@ -197,9 +197,9 @@ discard block |
||
197 | 197 | if (false === $result) { |
198 | 198 | // Occurs normally |
199 | 199 | $this->logger->info(sprintf('getValue: Key "%s" not found in PDO StateStorage', $key)); |
200 | - return NULL; // Key not found |
|
200 | + return NULL; // Key not found |
|
201 | 201 | } |
202 | - $result=unserialize($result, array('allowed_classes' => false)); |
|
202 | + $result = unserialize($result, array('allowed_classes' => false)); |
|
203 | 203 | if (false === $result) { |
204 | 204 | throw new RuntimeException(sprintf('getValue: unserialize error for key "%s" in PDO StateStorage', $key)); |
205 | 205 | } |
@@ -39,7 +39,7 @@ |
||
39 | 39 | * @return Tiqr_OcraService_Interface |
40 | 40 | * @throws Exception An exception if an unknown orca service type is requested. |
41 | 41 | */ |
42 | - public static function getOcraService(string $type="tiqr", array $options=array(), LoggerInterface $logger) |
|
42 | + public static function getOcraService(string $type = "tiqr", array $options = array(), LoggerInterface $logger) |
|
43 | 43 | { |
44 | 44 | switch ($type) { |
45 | 45 | case "tiqr": |
@@ -41,7 +41,7 @@ |
||
41 | 41 | * |
42 | 42 | * @throws Exception An exception if an unknown user storage is requested. |
43 | 43 | */ |
44 | - public static function getStorage(string $type="file", array $options=array(), LoggerInterface $logger): Tiqr_UserStorage_Interface |
|
44 | + public static function getStorage(string $type = "file", array $options = array(), LoggerInterface $logger): Tiqr_UserStorage_Interface |
|
45 | 45 | { |
46 | 46 | switch ($type) { |
47 | 47 | case "file": |
@@ -81,7 +81,7 @@ |
||
81 | 81 | 'verifyResponse for user "%s" failed', |
82 | 82 | $userId |
83 | 83 | ), |
84 | - array( 'exception' => $e) |
|
84 | + array('exception' => $e) |
|
85 | 85 | ); |
86 | 86 | return false; |
87 | 87 | } |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | |
20 | 20 | use Psr\Log\LoggerInterface; |
21 | 21 | |
22 | -require_once(__DIR__ . '/../OATH/OCRAParser.php'); |
|
22 | +require_once(__DIR__.'/../OATH/OCRAParser.php'); |
|
23 | 23 | |
24 | 24 | abstract class Tiqr_OcraService_Abstract implements Tiqr_OcraService_Interface |
25 | 25 | { |
@@ -37,7 +37,7 @@ discard block |
||
37 | 37 | $this->logger = $logger; |
38 | 38 | |
39 | 39 | // Set the OCRA suite |
40 | - $this->_ocraSuite = $config['ocra.suite'] ?? 'OCRA-1:HOTP-SHA1-6:QH10-S'; // Use tiqr server default suite |
|
40 | + $this->_ocraSuite = $config['ocra.suite'] ?? 'OCRA-1:HOTP-SHA1-6:QH10-S'; // Use tiqr server default suite |
|
41 | 41 | $this->_ocraParser = new OATH_OCRAParser($this->_ocraSuite); |
42 | 42 | } |
43 | 43 |
@@ -117,7 +117,7 @@ discard block |
||
117 | 117 | // INVALID_USERID: The client authenticated a different user than the server expected. This error is returned when |
118 | 118 | // the application stated an authentication session specifying the userId and later during the authentication |
119 | 119 | // provides a different userId |
120 | - const AUTH_RESULT_INVALID_USERID = 5; |
|
120 | + const AUTH_RESULT_INVALID_USERID = 5; |
|
121 | 121 | |
122 | 122 | /** |
123 | 123 | * The default OCRA Suite (RFC 6287) to use for authentication in Tiqr |
@@ -223,7 +223,7 @@ discard block |
||
223 | 223 | * @param int $version The tiqr protocol version to use (defaults to the latest) |
224 | 224 | * @throws Exception |
225 | 225 | */ |
226 | - public function __construct(LoggerInterface $logger, array $options=array(), int $version = 2) |
|
226 | + public function __construct(LoggerInterface $logger, array $options = array(), int $version = 2) |
|
227 | 227 | { |
228 | 228 | $this->_options = $options; // Used to later get settings for Tiqr_Message_* |
229 | 229 | $this->logger = $logger; |
@@ -337,7 +337,7 @@ discard block |
||
337 | 337 | |
338 | 338 | $this->logger->info(sprintf('Creating and sending a %s push notification', $notificationType)); |
339 | 339 | $message->setId(time()); |
340 | - $message->setText("Please authenticate for " . $this->_name); |
|
340 | + $message->setText("Please authenticate for ".$this->_name); |
|
341 | 341 | $message->setAddress($notificationAddress); |
342 | 342 | $message->setCustomProperty('challenge', $this->_getChallengeUrl($sessionKey)); |
343 | 343 | $message->send(); |
@@ -383,13 +383,13 @@ discard block |
||
383 | 383 | * @return string The authentication sessionKey |
384 | 384 | * @throws Exception when starting the authentication session failed |
385 | 385 | */ |
386 | - public function startAuthenticationSession(string $userId="", string $sessionId="", string $spIdentifier=""): string |
|
386 | + public function startAuthenticationSession(string $userId = "", string $sessionId = "", string $spIdentifier = ""): string |
|
387 | 387 | { |
388 | - if ($sessionId=="") { |
|
388 | + if ($sessionId == "") { |
|
389 | 389 | $sessionId = session_id(); |
390 | 390 | } |
391 | 391 | |
392 | - if ($spIdentifier=="") { |
|
392 | + if ($spIdentifier == "") { |
|
393 | 393 | $spIdentifier = $this->_identifier; |
394 | 394 | } |
395 | 395 | |
@@ -398,11 +398,11 @@ discard block |
||
398 | 398 | |
399 | 399 | $data = array("sessionId"=>$sessionId, "challenge"=>$challenge, "spIdentifier" => $spIdentifier); |
400 | 400 | |
401 | - if ($userId!="") { |
|
401 | + if ($userId != "") { |
|
402 | 402 | $data["userId"] = $userId; |
403 | 403 | } |
404 | 404 | |
405 | - $this->_stateStorage->setValue(self::PREFIX_CHALLENGE . $sessionKey, $data, self::CHALLENGE_EXPIRE); |
|
405 | + $this->_stateStorage->setValue(self::PREFIX_CHALLENGE.$sessionKey, $data, self::CHALLENGE_EXPIRE); |
|
406 | 406 | |
407 | 407 | return $sessionKey; |
408 | 408 | } |
@@ -422,9 +422,9 @@ discard block |
||
422 | 422 | * @return String The enrollment key |
423 | 423 | * @throws Exception when start the enrollement session failed |
424 | 424 | */ |
425 | - public function startEnrollmentSession(string $userId, string $displayName, string $sessionId=""): string |
|
425 | + public function startEnrollmentSession(string $userId, string $displayName, string $sessionId = ""): string |
|
426 | 426 | { |
427 | - if ($sessionId=="") { |
|
427 | + if ($sessionId == "") { |
|
428 | 428 | $sessionId = session_id(); |
429 | 429 | } |
430 | 430 | $enrollmentKey = $this->_uniqueSessionKey(); |
@@ -433,7 +433,7 @@ discard block |
||
433 | 433 | "displayName" => $displayName, |
434 | 434 | "sessionId" => $sessionId |
435 | 435 | ]; |
436 | - $this->_stateStorage->setValue(self::PREFIX_ENROLLMENT . $enrollmentKey, $data, self::ENROLLMENT_EXPIRE); |
|
436 | + $this->_stateStorage->setValue(self::PREFIX_ENROLLMENT.$enrollmentKey, $data, self::ENROLLMENT_EXPIRE); |
|
437 | 437 | $this->_setEnrollmentStatus($sessionId, self::ENROLLMENT_STATUS_INITIALIZED); |
438 | 438 | |
439 | 439 | return $enrollmentKey; |
@@ -444,9 +444,9 @@ discard block |
||
444 | 444 | * @param string $sessionId The application's session identifier (defaults to php session) |
445 | 445 | * @throws Exception when resetting the session failed |
446 | 446 | */ |
447 | - public function resetEnrollmentSession(string $sessionId=""): void |
|
447 | + public function resetEnrollmentSession(string $sessionId = ""): void |
|
448 | 448 | { |
449 | - if ($sessionId=="") { |
|
449 | + if ($sessionId == "") { |
|
450 | 450 | $sessionId = session_id(); |
451 | 451 | } |
452 | 452 | |
@@ -481,9 +481,9 @@ discard block |
||
481 | 481 | * |
482 | 482 | * @throws Exception when an error communicating with the state storage backend was detected |
483 | 483 | */ |
484 | - public function getEnrollmentStatus(string $sessionId=""): int |
|
484 | + public function getEnrollmentStatus(string $sessionId = ""): int |
|
485 | 485 | { |
486 | - if ($sessionId=="") { |
|
486 | + if ($sessionId == "") { |
|
487 | 487 | $sessionId = session_id(); |
488 | 488 | } |
489 | 489 | $status = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_STATUS.$sessionId); |
@@ -540,7 +540,7 @@ discard block |
||
540 | 540 | */ |
541 | 541 | public function getEnrollmentMetadata(string $enrollmentKey, string $authenticationUrl, string $enrollmentUrl): array |
542 | 542 | { |
543 | - $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT . $enrollmentKey); |
|
543 | + $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT.$enrollmentKey); |
|
544 | 544 | if (!is_array($data)) { |
545 | 545 | $this->logger->error('Unable to find enrollment metadata in state storage'); |
546 | 546 | throw new Exception('Unable to find enrollment metadata in state storage'); |
@@ -559,7 +559,7 @@ discard block |
||
559 | 559 | array("identifier" =>$data["userId"], |
560 | 560 | "displayName"=>$data["displayName"])); |
561 | 561 | |
562 | - $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT . $enrollmentKey); |
|
562 | + $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT.$enrollmentKey); |
|
563 | 563 | |
564 | 564 | $this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_RETRIEVED); |
565 | 565 | return $metadata; |
@@ -587,7 +587,7 @@ discard block |
||
587 | 587 | */ |
588 | 588 | public function getEnrollmentSecret(string $enrollmentKey): string |
589 | 589 | { |
590 | - $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT . $enrollmentKey); |
|
590 | + $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT.$enrollmentKey); |
|
591 | 591 | if (!is_array($data)) { |
592 | 592 | $this->logger->error('getEnrollmentSecret: enrollment key not found'); |
593 | 593 | throw new RuntimeException('enrollment key not found'); |
@@ -603,7 +603,7 @@ discard block |
||
603 | 603 | ]; |
604 | 604 | $enrollmentSecret = $this->_uniqueSessionKey(); |
605 | 605 | $this->_stateStorage->setValue( |
606 | - self::PREFIX_ENROLLMENT_SECRET . $enrollmentSecret, |
|
606 | + self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret, |
|
607 | 607 | $enrollmentData, |
608 | 608 | self::ENROLLMENT_EXPIRE |
609 | 609 | ); |
@@ -631,11 +631,11 @@ discard block |
||
631 | 631 | public function validateEnrollmentSecret(string $enrollmentSecret): string |
632 | 632 | { |
633 | 633 | try { |
634 | - $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_SECRET . $enrollmentSecret); |
|
634 | + $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret); |
|
635 | 635 | if (NULL === $data) { |
636 | 636 | throw new RuntimeException('Enrollment secret not found'); |
637 | 637 | } |
638 | - if ( !is_array($data) || !is_string($data["userId"] ?? NULL)) { |
|
638 | + if (!is_array($data) || !is_string($data["userId"] ?? NULL)) { |
|
639 | 639 | throw new RuntimeException('Invalid enrollment data'); |
640 | 640 | } |
641 | 641 | |
@@ -665,17 +665,17 @@ discard block |
||
665 | 665 | public function finalizeEnrollment(string $enrollmentSecret): bool |
666 | 666 | { |
667 | 667 | try { |
668 | - $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_SECRET . $enrollmentSecret); |
|
668 | + $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret); |
|
669 | 669 | if (NULL === $data) { |
670 | 670 | throw new RuntimeException('Enrollment secret not found'); |
671 | 671 | } |
672 | 672 | if (is_array($data)) { |
673 | 673 | // Enrollment is finalized, destroy our session data. |
674 | - $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT_SECRET . $enrollmentSecret); |
|
674 | + $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret); |
|
675 | 675 | $this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_FINALIZED); |
676 | 676 | } else { |
677 | 677 | $this->logger->error( |
678 | - 'Enrollment status is not finalized, enrollmentsecret was not found in state storage. ' . |
|
678 | + 'Enrollment status is not finalized, enrollmentsecret was not found in state storage. '. |
|
679 | 679 | 'Warning! the method will still return "true" as a result.' |
680 | 680 | ); |
681 | 681 | } |
@@ -723,7 +723,7 @@ discard block |
||
723 | 723 | public function authenticate(string $userId, string $userSecret, string $sessionKey, string $response): int |
724 | 724 | { |
725 | 725 | try { |
726 | - $state = $this->_stateStorage->getValue(self::PREFIX_CHALLENGE . $sessionKey); |
|
726 | + $state = $this->_stateStorage->getValue(self::PREFIX_CHALLENGE.$sessionKey); |
|
727 | 727 | if (is_null($state)) { |
728 | 728 | $this->logger->notice('The auth challenge could not be found in the state storage'); |
729 | 729 | return self::AUTH_RESULT_INVALID_CHALLENGE; |
@@ -733,9 +733,9 @@ discard block |
||
733 | 733 | throw $e; |
734 | 734 | } |
735 | 735 | |
736 | - $sessionId = $state["sessionId"] ?? NULL; // Application's sessionId |
|
737 | - $challenge = $state["challenge"] ?? NULL; // The challenge we sent to the Tiqr client |
|
738 | - if (!is_string($sessionId) || (!is_string($challenge)) ) { |
|
736 | + $sessionId = $state["sessionId"] ?? NULL; // Application's sessionId |
|
737 | + $challenge = $state["challenge"] ?? NULL; // The challenge we sent to the Tiqr client |
|
738 | + if (!is_string($sessionId) || (!is_string($challenge))) { |
|
739 | 739 | throw new RuntimeException('Invalid state for state storage'); |
740 | 740 | } |
741 | 741 | |
@@ -744,7 +744,7 @@ discard block |
||
744 | 744 | $challengeUserId = $state["userId"] ?? NULL; |
745 | 745 | |
746 | 746 | // If the application requested a specific userId, verify that that is that userId that we're now authenticating |
747 | - if ($challengeUserId!==NULL && ($userId !== $challengeUserId)) { |
|
747 | + if ($challengeUserId !== NULL && ($userId !== $challengeUserId)) { |
|
748 | 748 | $this->logger->error( |
749 | 749 | sprintf('Authentication failed: the requested userId "%s" does not match userId "%s" that is being authenticated', |
750 | 750 | $challengeUserId, $userId) |
@@ -761,7 +761,7 @@ discard block |
||
761 | 761 | |
762 | 762 | if ($equal) { |
763 | 763 | // Set application session as authenticated |
764 | - $this->_stateStorage->setValue(self::PREFIX_AUTHENTICATED . $sessionId, $userId, self::LOGIN_EXPIRE); |
|
764 | + $this->_stateStorage->setValue(self::PREFIX_AUTHENTICATED.$sessionId, $userId, self::LOGIN_EXPIRE); |
|
765 | 765 | $this->logger->notice(sprintf('Authenticated user "%s" in session "%s"', $userId, $sessionId)); |
766 | 766 | |
767 | 767 | // Cleanup challenge |
@@ -770,7 +770,7 @@ discard block |
||
770 | 770 | // Cleaning up only after successful authentication enables the user to retry authentication after e.g. an |
771 | 771 | // invalid response |
772 | 772 | try { |
773 | - $this->_stateStorage->unsetValue(self::PREFIX_CHALLENGE . $sessionKey); // May throw |
|
773 | + $this->_stateStorage->unsetValue(self::PREFIX_CHALLENGE.$sessionKey); // May throw |
|
774 | 774 | } catch (Exception $e) { |
775 | 775 | // Only log error |
776 | 776 | $this->logger->warning('Could not delete authentication session key', array('error' => $e)); |
@@ -792,9 +792,9 @@ discard block |
||
792 | 792 | * |
793 | 793 | * @throws Exception when there was an error communicating with the storage backed |
794 | 794 | */ |
795 | - public function logout(string $sessionId=""): void |
|
795 | + public function logout(string $sessionId = ""): void |
|
796 | 796 | { |
797 | - if ($sessionId=="") { |
|
797 | + if ($sessionId == "") { |
|
798 | 798 | $sessionId = session_id(); |
799 | 799 | } |
800 | 800 | |
@@ -834,9 +834,9 @@ discard block |
||
834 | 834 | * |
835 | 835 | * Does not throw |
836 | 836 | */ |
837 | - public function getAuthenticatedUser(string $sessionId=""): ?string |
|
837 | + public function getAuthenticatedUser(string $sessionId = ""): ?string |
|
838 | 838 | { |
839 | - if ($sessionId=="") { |
|
839 | + if ($sessionId == "") { |
|
840 | 840 | $this->logger->debug('Using the PHP session id, as no session id was provided'); |
841 | 841 | $sessionId = session_id(); |
842 | 842 | } |
@@ -864,7 +864,7 @@ discard block |
||
864 | 864 | // We probably just generated the challenge and stored it in the StateStorage |
865 | 865 | // We can save a roundtrip to the storage backend here by reusing this information |
866 | 866 | |
867 | - $state = $this->_stateStorage->getValue(self::PREFIX_CHALLENGE . $sessionKey); |
|
867 | + $state = $this->_stateStorage->getValue(self::PREFIX_CHALLENGE.$sessionKey); |
|
868 | 868 | if (is_null($state)) { |
869 | 869 | $this->logger->error( |
870 | 870 | sprintf( |
@@ -880,7 +880,7 @@ discard block |
||
880 | 880 | $spIdentifier = $state["spIdentifier"] ?? ''; |
881 | 881 | |
882 | 882 | // Last bit is the spIdentifier |
883 | - return $this->_protocolAuth."://".(!is_null($userId)?urlencode($userId).'@':'').$this->getIdentifier()."/".$sessionKey."/".$challenge."/".urlencode($spIdentifier)."/".$this->_protocolVersion; |
|
883 | + return $this->_protocolAuth."://".(!is_null($userId) ?urlencode($userId).'@' : '').$this->getIdentifier()."/".$sessionKey."/".$challenge."/".urlencode($spIdentifier)."/".$this->_protocolVersion; |
|
884 | 884 | } |
885 | 885 | |
886 | 886 | /** |
@@ -902,7 +902,7 @@ discard block |
||
902 | 902 | protected function _uniqueSessionKey(): string |
903 | 903 | { |
904 | 904 | |
905 | - return bin2hex( Tiqr_Random::randomBytes(self::SESSION_KEY_LENGTH_BYTES) ); |
|
905 | + return bin2hex(Tiqr_Random::randomBytes(self::SESSION_KEY_LENGTH_BYTES)); |
|
906 | 906 | } |
907 | 907 | |
908 | 908 | /** |
@@ -42,7 +42,7 @@ |
||
42 | 42 | public static function randomBytes(int $length): string |
43 | 43 | { |
44 | 44 | // Get $length cryptographically secure pseudo-random bytes |
45 | - $rnd=\random_bytes($length); |
|
45 | + $rnd = \random_bytes($length); |
|
46 | 46 | |
47 | 47 | if (strlen($rnd) !== $length) { |
48 | 48 | throw new Exception("random_bytes did not return the requested number of bytes"); |