Completed
Push — master ( e355ed...1c7137 )
by Michiel
01:02 queued 11s
created
library/tiqr/Tiqr/DeviceStorage.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -42,7 +42,7 @@  discard block
 block discarded – undo
42 42
      *                       config options per type.
43 43
      * @throws Exception An exception if an unknown storage is requested.
44 44
      */
45
-    public static function getStorage($type="dummy", $options=array())
45
+    public static function getStorage($type = "dummy", $options = array())
46 46
     {
47 47
         switch ($type) {
48 48
             case "dummy":
@@ -57,7 +57,7 @@  discard block
 block discarded – undo
57 57
             default:
58 58
                 $instance = NULL;
59 59
         }
60
-        if ($instance!=NULL) {
60
+        if ($instance != NULL) {
61 61
             $instance->init();
62 62
             return $instance;
63 63
         }
Please login to merge, or discard this patch.
library/tiqr/Tiqr/AutoLoader.php 2 patches
Indentation   +96 added lines, -96 removed lines patch added patch discarded remove patch
@@ -1,100 +1,100 @@
 block discarded – undo
1 1
 <?php
2 2
 class Tiqr_AutoLoader {
3 3
 
4
-	protected static $instance;
5
-
6
-	protected $tiqrPath;
7
-	protected $qrcodePath;
8
-	protected $zendPath;
9
-
10
-	protected function __construct($options) {
11
-		if ($options !== NULL) {
12
-			$this->setOptions($options);
13
-		}
14
-		spl_autoload_register(array(__CLASS__, 'autoload'));
15
-	}
16
-
17
-	public static function getInstance($options = NULL) {
18
-		if (null === self::$instance) {
19
-			self::$instance = new self($options);
20
-		}
21
-
22
-		return self::$instance;
23
-	}
24
-
25
-	public static function autoload($className) {
26
-		if($className === NULL) {
27
-			return;
28
-		}
29
-
30
-		$self = self::getInstance();
31
-
32
-		$substr5 = substr($className, 0, 5);
33
-
34
-		if ($substr5 === 'Tiqr_' || $substr5 === 'OATH_') {
35
-			$file = $self->tiqrPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php';
36
-		} elseif ($className === 'QRcode') {
37
-			$file = $self->qrcodePath . DIRECTORY_SEPARATOR . 'phpqrcode.php';
38
-		} elseif ($substr5 === 'Zend_') {
39
-			$file = $self->zendPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php';
40
-		} else {
41
-			return;
42
-		}
43
-
44
-		if (file_exists($file)) {
45
-			require_once($file);
46
-		}
47
-	}
48
-
49
-	public function setOptions($options) {
50
-		if (isset($options["tiqr.path"])) {
51
-			$tiqr_dir = $options["tiqr.path"];
52
-			$tiqr_path = realpath($tiqr_dir);
53
-		} else {
54
-			$tiqr_dir = dirname(__FILE__);
55
-			$tiqr_path = $tiqr_dir;
56
-		}
57
-		if (is_dir($tiqr_path)) {
58
-			$this->tiqrPath = $tiqr_path;
59
-		} else {
60
-			throw new Exception('Directory not found: ' . var_export($tiqr_dir, TRUE));
61
-		}
62
-
63
-		if (isset($options["phpqrcode.path"])) {
64
-			$qrcode_dir = $options["phpqrcode.path"];
65
-			$qrcode_path = realpath($qrcode_dir);
66
-		} else {
67
-			$qrcode_dir = dirname(dirname(dirname(__FILE__))) . '/phpqrcode';
68
-			$qrcode_path = $qrcode_dir;
69
-		}
70
-
71
-		if (is_dir($qrcode_path)) {
72
-			$this->qrcodePath = $qrcode_path;
73
-		} else {
74
-			throw new Exception('Directory not found: ' . var_export($qrcode_dir, TRUE));
75
-		}
76
-
77
-		if (isset($options["zend.path"])) {
78
-			$zend_dir = $options["zend.path"];
79
-			$zend_path = realpath($zend_dir);
80
-		} else {
81
-			$zend_dir = dirname(dirname(dirname(__FILE__))) . "/zend";
82
-			$zend_path = $zend_dir;
83
-		}
84
-		if (is_dir($zend_path)) {
85
-			$this->zendPath = $zend_path;
86
-		} else {
87
-			throw new Exception('Directory not found: ' . var_export($zend_dir, TRUE));
88
-		}
89
-	}
90
-
91
-
92
-	public function setIncludePath() {
93
-		set_include_path(implode(PATH_SEPARATOR, array(
94
-			$this->tiqrPath,
95
-			$this->zendPath,
96
-			$this->qrcodePath,
97
-			get_include_path(),
98
-		)));
99
-	}
4
+    protected static $instance;
5
+
6
+    protected $tiqrPath;
7
+    protected $qrcodePath;
8
+    protected $zendPath;
9
+
10
+    protected function __construct($options) {
11
+        if ($options !== NULL) {
12
+            $this->setOptions($options);
13
+        }
14
+        spl_autoload_register(array(__CLASS__, 'autoload'));
15
+    }
16
+
17
+    public static function getInstance($options = NULL) {
18
+        if (null === self::$instance) {
19
+            self::$instance = new self($options);
20
+        }
21
+
22
+        return self::$instance;
23
+    }
24
+
25
+    public static function autoload($className) {
26
+        if($className === NULL) {
27
+            return;
28
+        }
29
+
30
+        $self = self::getInstance();
31
+
32
+        $substr5 = substr($className, 0, 5);
33
+
34
+        if ($substr5 === 'Tiqr_' || $substr5 === 'OATH_') {
35
+            $file = $self->tiqrPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php';
36
+        } elseif ($className === 'QRcode') {
37
+            $file = $self->qrcodePath . DIRECTORY_SEPARATOR . 'phpqrcode.php';
38
+        } elseif ($substr5 === 'Zend_') {
39
+            $file = $self->zendPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php';
40
+        } else {
41
+            return;
42
+        }
43
+
44
+        if (file_exists($file)) {
45
+            require_once($file);
46
+        }
47
+    }
48
+
49
+    public function setOptions($options) {
50
+        if (isset($options["tiqr.path"])) {
51
+            $tiqr_dir = $options["tiqr.path"];
52
+            $tiqr_path = realpath($tiqr_dir);
53
+        } else {
54
+            $tiqr_dir = dirname(__FILE__);
55
+            $tiqr_path = $tiqr_dir;
56
+        }
57
+        if (is_dir($tiqr_path)) {
58
+            $this->tiqrPath = $tiqr_path;
59
+        } else {
60
+            throw new Exception('Directory not found: ' . var_export($tiqr_dir, TRUE));
61
+        }
62
+
63
+        if (isset($options["phpqrcode.path"])) {
64
+            $qrcode_dir = $options["phpqrcode.path"];
65
+            $qrcode_path = realpath($qrcode_dir);
66
+        } else {
67
+            $qrcode_dir = dirname(dirname(dirname(__FILE__))) . '/phpqrcode';
68
+            $qrcode_path = $qrcode_dir;
69
+        }
70
+
71
+        if (is_dir($qrcode_path)) {
72
+            $this->qrcodePath = $qrcode_path;
73
+        } else {
74
+            throw new Exception('Directory not found: ' . var_export($qrcode_dir, TRUE));
75
+        }
76
+
77
+        if (isset($options["zend.path"])) {
78
+            $zend_dir = $options["zend.path"];
79
+            $zend_path = realpath($zend_dir);
80
+        } else {
81
+            $zend_dir = dirname(dirname(dirname(__FILE__))) . "/zend";
82
+            $zend_path = $zend_dir;
83
+        }
84
+        if (is_dir($zend_path)) {
85
+            $this->zendPath = $zend_path;
86
+        } else {
87
+            throw new Exception('Directory not found: ' . var_export($zend_dir, TRUE));
88
+        }
89
+    }
90
+
91
+
92
+    public function setIncludePath() {
93
+        set_include_path(implode(PATH_SEPARATOR, array(
94
+            $this->tiqrPath,
95
+            $this->zendPath,
96
+            $this->qrcodePath,
97
+            get_include_path(),
98
+        )));
99
+    }
100 100
 }
Please login to merge, or discard this patch.
Spacing   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -23,7 +23,7 @@  discard block
 block discarded – undo
23 23
 	}
24 24
 
25 25
 	public static function autoload($className) {
26
-		if($className === NULL) {
26
+		if ($className === NULL) {
27 27
 			return;
28 28
 		}
29 29
 
@@ -32,11 +32,11 @@  discard block
 block discarded – undo
32 32
 		$substr5 = substr($className, 0, 5);
33 33
 
34 34
 		if ($substr5 === 'Tiqr_' || $substr5 === 'OATH_') {
35
-			$file = $self->tiqrPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php';
35
+			$file = $self->tiqrPath.DIRECTORY_SEPARATOR.str_replace('_', DIRECTORY_SEPARATOR, $className).'.php';
36 36
 		} elseif ($className === 'QRcode') {
37
-			$file = $self->qrcodePath . DIRECTORY_SEPARATOR . 'phpqrcode.php';
37
+			$file = $self->qrcodePath.DIRECTORY_SEPARATOR.'phpqrcode.php';
38 38
 		} elseif ($substr5 === 'Zend_') {
39
-			$file = $self->zendPath . DIRECTORY_SEPARATOR . str_replace('_', DIRECTORY_SEPARATOR, $className) . '.php';
39
+			$file = $self->zendPath.DIRECTORY_SEPARATOR.str_replace('_', DIRECTORY_SEPARATOR, $className).'.php';
40 40
 		} else {
41 41
 			return;
42 42
 		}
@@ -57,34 +57,34 @@  discard block
 block discarded – undo
57 57
 		if (is_dir($tiqr_path)) {
58 58
 			$this->tiqrPath = $tiqr_path;
59 59
 		} else {
60
-			throw new Exception('Directory not found: ' . var_export($tiqr_dir, TRUE));
60
+			throw new Exception('Directory not found: '.var_export($tiqr_dir, TRUE));
61 61
 		}
62 62
 
63 63
 		if (isset($options["phpqrcode.path"])) {
64 64
 			$qrcode_dir = $options["phpqrcode.path"];
65 65
 			$qrcode_path = realpath($qrcode_dir);
66 66
 		} else {
67
-			$qrcode_dir = dirname(dirname(dirname(__FILE__))) . '/phpqrcode';
67
+			$qrcode_dir = dirname(dirname(dirname(__FILE__))).'/phpqrcode';
68 68
 			$qrcode_path = $qrcode_dir;
69 69
 		}
70 70
 
71 71
 		if (is_dir($qrcode_path)) {
72 72
 			$this->qrcodePath = $qrcode_path;
73 73
 		} else {
74
-			throw new Exception('Directory not found: ' . var_export($qrcode_dir, TRUE));
74
+			throw new Exception('Directory not found: '.var_export($qrcode_dir, TRUE));
75 75
 		}
76 76
 
77 77
 		if (isset($options["zend.path"])) {
78 78
 			$zend_dir = $options["zend.path"];
79 79
 			$zend_path = realpath($zend_dir);
80 80
 		} else {
81
-			$zend_dir = dirname(dirname(dirname(__FILE__))) . "/zend";
81
+			$zend_dir = dirname(dirname(dirname(__FILE__)))."/zend";
82 82
 			$zend_path = $zend_dir;
83 83
 		}
84 84
 		if (is_dir($zend_path)) {
85 85
 			$this->zendPath = $zend_path;
86 86
 		} else {
87
-			throw new Exception('Directory not found: ' . var_export($zend_dir, TRUE));
87
+			throw new Exception('Directory not found: '.var_export($zend_dir, TRUE));
88 88
 		}
89 89
 	}
90 90
 
Please login to merge, or discard this patch.
library/tiqr/Tiqr/UserSecretStorage.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -36,7 +36,7 @@  discard block
 block discarded – undo
36 36
      *
37 37
      * @return Tiqr_UserSecretStorage_Interface
38 38
      */
39
-    public static function getSecretStorage($type="file", $options=array())
39
+    public static function getSecretStorage($type = "file", $options = array())
40 40
     {
41 41
         switch ($type) {
42 42
             case "file":
@@ -59,7 +59,7 @@  discard block
 block discarded – undo
59 59
                 if (!isset($type)) {
60 60
                     throw new Exception('Class name not set');
61 61
                 } elseif (!class_exists($type)) {
62
-                    throw new Exception('Class not found: ' . var_export($type, TRUE));
62
+                    throw new Exception('Class not found: '.var_export($type, TRUE));
63 63
                 }
64 64
                 $instance = new $type($options);
65 65
         }
Please login to merge, or discard this patch.
library/tiqr/Tiqr/OATH/OCRAWrapper_v1.php 3 patches
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -90,9 +90,9 @@
 block discarded – undo
90 90
      */
91 91
     public function verifyResponse($response, $secret, $challenge, $sessionKey)
92 92
     {
93
-         $expected = $this->calculateResponse($secret, $challenge, $sessionKey);
93
+            $expected = $this->calculateResponse($secret, $challenge, $sessionKey);
94 94
 
95
-         return ($expected == $response);
95
+            return ($expected == $response);
96 96
     }
97 97
 
98 98
     /**
Please login to merge, or discard this patch.
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -107,19 +107,19 @@  discard block
 block discarded – undo
107 107
     {
108 108
         // find the :QN10, -QN10, QH10 etc. bit
109 109
         $pos = stripos($ocraSuite, ":q");
110
-        if ($pos===false) $pos = stripos($ocraSuite, "-q");
111
-        if ($pos===false) {
110
+        if ($pos === false) $pos = stripos($ocraSuite, "-q");
111
+        if ($pos === false) {
112 112
             // No challenge config specified. Since we only support challenge based OCRA, we fallback to default 10 digit hexadecimal.
113 113
             return array("format"=>"H", "length"=>10);
114 114
         }
115
-        $format = substr($ocraSuite, $pos+2, 1);
115
+        $format = substr($ocraSuite, $pos + 2, 1);
116 116
         if (!in_array($format, array("N", "A", "H"))) {
117 117
             $format = "H";
118 118
         }
119 119
         
120
-        $length = (int)substr($ocraSuite, $pos+3, 2);
120
+        $length = (int) substr($ocraSuite, $pos + 3, 2);
121 121
                 
122
-        if ($length<=0) {
122
+        if ($length <= 0) {
123 123
             $length = 10;
124 124
         }
125 125
         
@@ -190,7 +190,7 @@  discard block
 block discarded – undo
190 190
      */
191 191
     protected function _calculateResponse($ocraSuite, $secret, $challenge, $sessionKey)
192 192
     {       
193
-        if (strpos(strtolower($ocraSuite), "qn")!==false) {
193
+        if (strpos(strtolower($ocraSuite), "qn") !== false) {
194 194
             
195 195
             // challenge is decimal, but generateOcra always wants it in hex.
196 196
             $challenge = dechex($challenge);
Please login to merge, or discard this patch.
Braces   +3 added lines, -1 removed lines patch added patch discarded remove patch
@@ -107,7 +107,9 @@
 block discarded – undo
107 107
     {
108 108
         // find the :QN10, -QN10, QH10 etc. bit
109 109
         $pos = stripos($ocraSuite, ":q");
110
-        if ($pos===false) $pos = stripos($ocraSuite, "-q");
110
+        if ($pos===false) {
111
+            $pos = stripos($ocraSuite, "-q");
112
+        }
111 113
         if ($pos===false) {
112 114
             // No challenge config specified. Since we only support challenge based OCRA, we fallback to default 10 digit hexadecimal.
113 115
             return array("format"=>"H", "length"=>10);
Please login to merge, or discard this patch.
library/tiqr/Tiqr/OATH/HOTP.php 2 patches
Indentation   +32 added lines, -32 removed lines patch added patch discarded remove patch
@@ -48,24 +48,24 @@  discard block
 block discarded – undo
48 48
      */
49 49
     protected function _getHash ($secret, $counter)
50 50
     {
51
-         // Counter
52
-         //the counter value can be more than one byte long, so we need to go multiple times
53
-         $cur_counter = array(0,0,0,0,0,0,0,0);
54
-         for($i=7;$i>=0;$i--)
55
-         {
56
-             $cur_counter[$i] = pack ('C*', $counter);
57
-             $counter = $counter >> 8;
58
-         }
59
-         $bin_counter = implode($cur_counter);
60
-         // Pad to 8 chars
61
-         if (strlen ($bin_counter) < 8)
62
-         {
63
-             $bin_counter = str_repeat (chr(0), 8 - strlen ($bin_counter)) . $bin_counter;
64
-         }
51
+            // Counter
52
+            //the counter value can be more than one byte long, so we need to go multiple times
53
+            $cur_counter = array(0,0,0,0,0,0,0,0);
54
+            for($i=7;$i>=0;$i--)
55
+            {
56
+                $cur_counter[$i] = pack ('C*', $counter);
57
+                $counter = $counter >> 8;
58
+            }
59
+            $bin_counter = implode($cur_counter);
60
+            // Pad to 8 chars
61
+            if (strlen ($bin_counter) < 8)
62
+            {
63
+                $bin_counter = str_repeat (chr(0), 8 - strlen ($bin_counter)) . $bin_counter;
64
+            }
65 65
      
66
-         // HMAC
67
-         $hash = hash_hmac ('sha1', $bin_counter, $secret);
68
-         return $hash;
66
+            // HMAC
67
+            $hash = hash_hmac ('sha1', $bin_counter, $secret);
68
+            return $hash;
69 69
     }
70 70
  
71 71
     /**
@@ -76,22 +76,22 @@  discard block
 block discarded – undo
76 76
      */
77 77
     protected function _truncate($hash, $length = 6)
78 78
     {
79
-         // Convert to dec
80
-         foreach(str_split($hash,2) as $hex)
81
-         {
82
-             $hmac_result[]=hexdec($hex);
83
-         }
79
+            // Convert to dec
80
+            foreach(str_split($hash,2) as $hex)
81
+            {
82
+                $hmac_result[]=hexdec($hex);
83
+            }
84 84
      
85
-         // Find offset
86
-         $offset = $hmac_result[19] & 0xf;  
85
+            // Find offset
86
+            $offset = $hmac_result[19] & 0xf;  
87 87
      
88
-         // Algorithm from RFC
89
-         return
90
-         (
91
-             (($hmac_result[$offset+0] & 0x7f) << 24 ) |
92
-             (($hmac_result[$offset+1] & 0xff) << 16 ) |
93
-             (($hmac_result[$offset+2] & 0xff) << 8 ) |
94
-             ($hmac_result[$offset+3] & 0xff)
95
-         ) % pow(10,$length);
88
+            // Algorithm from RFC
89
+            return
90
+            (
91
+                (($hmac_result[$offset+0] & 0x7f) << 24 ) |
92
+                (($hmac_result[$offset+1] & 0xff) << 16 ) |
93
+                (($hmac_result[$offset+2] & 0xff) << 8 ) |
94
+                ($hmac_result[$offset+3] & 0xff)
95
+            ) % pow(10,$length);
96 96
     }
97 97
 }
Please login to merge, or discard this patch.
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -46,25 +46,25 @@  discard block
 block discarded – undo
46 46
      * @param String $counter
47 47
      * @return String hash
48 48
      */
49
-    protected function _getHash ($secret, $counter)
49
+    protected function _getHash($secret, $counter)
50 50
     {
51 51
          // Counter
52 52
          //the counter value can be more than one byte long, so we need to go multiple times
53
-         $cur_counter = array(0,0,0,0,0,0,0,0);
54
-         for($i=7;$i>=0;$i--)
53
+         $cur_counter = array(0, 0, 0, 0, 0, 0, 0, 0);
54
+         for ($i = 7; $i >= 0; $i--)
55 55
          {
56
-             $cur_counter[$i] = pack ('C*', $counter);
56
+             $cur_counter[$i] = pack('C*', $counter);
57 57
              $counter = $counter >> 8;
58 58
          }
59 59
          $bin_counter = implode($cur_counter);
60 60
          // Pad to 8 chars
61
-         if (strlen ($bin_counter) < 8)
61
+         if (strlen($bin_counter) < 8)
62 62
          {
63
-             $bin_counter = str_repeat (chr(0), 8 - strlen ($bin_counter)) . $bin_counter;
63
+             $bin_counter = str_repeat(chr(0), 8 - strlen($bin_counter)).$bin_counter;
64 64
          }
65 65
      
66 66
          // HMAC
67
-         $hash = hash_hmac ('sha1', $bin_counter, $secret);
67
+         $hash = hash_hmac('sha1', $bin_counter, $secret);
68 68
          return $hash;
69 69
     }
70 70
  
@@ -77,9 +77,9 @@  discard block
 block discarded – undo
77 77
     protected function _truncate($hash, $length = 6)
78 78
     {
79 79
          // Convert to dec
80
-         foreach(str_split($hash,2) as $hex)
80
+         foreach (str_split($hash, 2) as $hex)
81 81
          {
82
-             $hmac_result[]=hexdec($hex);
82
+             $hmac_result[] = hexdec($hex);
83 83
          }
84 84
      
85 85
          // Find offset
@@ -88,10 +88,10 @@  discard block
 block discarded – undo
88 88
          // Algorithm from RFC
89 89
          return
90 90
          (
91
-             (($hmac_result[$offset+0] & 0x7f) << 24 ) |
92
-             (($hmac_result[$offset+1] & 0xff) << 16 ) |
93
-             (($hmac_result[$offset+2] & 0xff) << 8 ) |
94
-             ($hmac_result[$offset+3] & 0xff)
95
-         ) % pow(10,$length);
91
+             (($hmac_result[$offset + 0] & 0x7f) << 24) |
92
+             (($hmac_result[$offset + 1] & 0xff) << 16) |
93
+             (($hmac_result[$offset + 2] & 0xff) << 8) |
94
+             ($hmac_result[$offset + 3] & 0xff)
95
+         ) % pow(10, $length);
96 96
     }
97 97
 }
Please login to merge, or discard this patch.
library/tiqr/Tiqr/OATH/OCRA_v1.php 3 patches
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -46,8 +46,8 @@  discard block
 block discarded – undo
46 46
             $keyBytes,
47 47
             $text)
48 48
     {
49
-         $hash = hash_hmac ($crypto, $text, $keyBytes);
50
-         return $hash;
49
+            $hash = hash_hmac ($crypto, $text, $keyBytes);
50
+            return $hash;
51 51
     }
52 52
 
53 53
     /**
@@ -83,12 +83,12 @@  discard block
 block discarded – undo
83 83
      * {@link truncationDigits} digits
84 84
      */
85 85
     static function generateOCRA($ocraSuite,
86
-                                 $key,
87
-                                 $counter,
88
-                                 $question,
89
-                                 $password,
90
-                                 $sessionInformation,
91
-                                 $timeStamp)
86
+                                    $key,
87
+                                    $counter,
88
+                                    $question,
89
+                                    $password,
90
+                                    $sessionInformation,
91
+                                    $timeStamp)
92 92
     {
93 93
         $codeDigits = 0;
94 94
         $crypto = "";
Please login to merge, or discard this patch.
Spacing   +49 added lines, -49 removed lines patch added patch discarded remove patch
@@ -46,7 +46,7 @@  discard block
 block discarded – undo
46 46
             $keyBytes,
47 47
             $text)
48 48
     {
49
-         $hash = hash_hmac ($crypto, $text, $keyBytes);
49
+         $hash = hash_hmac($crypto, $text, $keyBytes);
50 50
          return $hash;
51 51
     }
52 52
 
@@ -57,7 +57,7 @@  discard block
 block discarded – undo
57 57
      *
58 58
      * @return String a string with raw bytes
59 59
      */
60
-    private static function _hexStr2Bytes($hex){
60
+    private static function _hexStr2Bytes($hex) {
61 61
         return pack("H*", $hex);
62 62
     }
63 63
 
@@ -101,63 +101,63 @@  discard block
 block discarded – undo
101 101
         $sessionInformationLength = 0;
102 102
         $timeStampLength = 0;
103 103
 
104
-        if(stripos($ocraSuite, "sha1")!==false)
104
+        if (stripos($ocraSuite, "sha1") !== false)
105 105
             $crypto = "sha1";
106
-        if(stripos($ocraSuite, "sha256")!==false)
106
+        if (stripos($ocraSuite, "sha256") !== false)
107 107
             $crypto = "sha256";
108
-        if(stripos($ocraSuite, "sha512")!==false)
108
+        if (stripos($ocraSuite, "sha512") !== false)
109 109
             $crypto = "sha512";
110 110
 
111 111
         // How many digits should we return
112
-        $oS = substr($ocraSuite, strpos($ocraSuite, ":")+1, strpos($ocraSuite, ":", strpos($ocraSuite, ":")+1) -strpos($ocraSuite, ":")-1);
113
-        $codeDigits = substr($oS, strrpos($oS, "-")+1);
112
+        $oS = substr($ocraSuite, strpos($ocraSuite, ":") + 1, strpos($ocraSuite, ":", strpos($ocraSuite, ":") + 1) - strpos($ocraSuite, ":") - 1);
113
+        $codeDigits = substr($oS, strrpos($oS, "-") + 1);
114 114
         
115 115
         // The size of the byte array message to be encrypted
116 116
         // Counter
117
-        if(stripos($ocraSuite, ":c") !==false) {
117
+        if (stripos($ocraSuite, ":c") !== false) {
118 118
             // Fix the length of the HEX string
119
-            while(strlen($counter) < 16)
120
-                $counter = "0" . $counter;
121
-            $counterLength=8;
119
+            while (strlen($counter) < 16)
120
+                $counter = "0".$counter;
121
+            $counterLength = 8;
122 122
         }
123 123
         // Question
124
-        if(stripos($ocraSuite, ":q")!==false ||
125
-                stripos($ocraSuite, "-q")!==false) {
126
-            while(strlen($question) < 256)
127
-                $question = $question . "0";
128
-            $questionLength=128;
124
+        if (stripos($ocraSuite, ":q") !== false ||
125
+                stripos($ocraSuite, "-q") !== false) {
126
+            while (strlen($question) < 256)
127
+                $question = $question."0";
128
+            $questionLength = 128;
129 129
         }
130 130
 
131 131
         // Password
132
-        if(stripos($ocraSuite, ":p")!==false ||
133
-                stripos($ocraSuite, "-p") !==false) {
134
-            while(strlen($password) < 40)
135
-                $password = "0" . $password;
136
-            $passwordLength=20;
132
+        if (stripos($ocraSuite, ":p") !== false ||
133
+                stripos($ocraSuite, "-p") !== false) {
134
+            while (strlen($password) < 40)
135
+                $password = "0".$password;
136
+            $passwordLength = 20;
137 137
         }
138 138
 
139 139
         // sessionInformation
140
-        if(stripos($ocraSuite, ":s") !==false ||
141
-                stripos($ocraSuite, "-s", strpos($ocraSuite, ":", strpos($ocraSuite, ":")+1)) !== false) {
142
-            while(strlen($sessionInformation) < 128)
143
-                $sessionInformation = "0" . $sessionInformation;
140
+        if (stripos($ocraSuite, ":s") !== false ||
141
+                stripos($ocraSuite, "-s", strpos($ocraSuite, ":", strpos($ocraSuite, ":") + 1)) !== false) {
142
+            while (strlen($sessionInformation) < 128)
143
+                $sessionInformation = "0".$sessionInformation;
144 144
 
145
-            $sessionInformationLength=64;
145
+            $sessionInformationLength = 64;
146 146
         }
147 147
              
148 148
         // TimeStamp
149
-        if(stripos($ocraSuite, ":t") !==false ||
149
+        if (stripos($ocraSuite, ":t") !== false ||
150 150
                 stripos($ocraSuite, "-t") !== false) {
151
-            while(strlen($timeStamp) < 16)
152
-                $timeStamp = "0" . $timeStamp;
153
-            $timeStampLength=8;
151
+            while (strlen($timeStamp) < 16)
152
+                $timeStamp = "0".$timeStamp;
153
+            $timeStampLength = 8;
154 154
         }
155 155
 
156 156
         // Put the bytes of "ocraSuite" parameters into the message
157 157
         
158
-        $msg = array_fill(0,$ocraSuiteLength+$counterLength+$questionLength+$passwordLength+$sessionInformationLength+$timeStampLength+1, 0);
158
+        $msg = array_fill(0, $ocraSuiteLength + $counterLength + $questionLength + $passwordLength + $sessionInformationLength + $timeStampLength + 1, 0);
159 159
                 
160
-        for($i=0;$i<strlen($ocraSuite);$i++) {
160
+        for ($i = 0; $i < strlen($ocraSuite); $i++) {
161 161
             $msg[$i] = $ocraSuite[$i];
162 162
         }
163 163
         
@@ -166,9 +166,9 @@  discard block
 block discarded – undo
166 166
 
167 167
         // Put the bytes of "Counter" to the message
168 168
         // Input is HEX encoded
169
-        if($counterLength > 0 ) {
169
+        if ($counterLength > 0) {
170 170
             $bArray = self::_hexStr2Bytes($counter);
171
-            for ($i=0;$i<strlen($bArray);$i++) {
171
+            for ($i = 0; $i < strlen($bArray); $i++) {
172 172
                 $msg [$i + $ocraSuiteLength + 1] = $bArray[$i];
173 173
             }
174 174
         }
@@ -176,36 +176,36 @@  discard block
 block discarded – undo
176 176
 
177 177
         // Put the bytes of "question" to the message
178 178
         // Input is text encoded
179
-        if($questionLength > 0 ) {
179
+        if ($questionLength > 0) {
180 180
             $bArray = self::_hexStr2Bytes($question);
181
-            for ($i=0;$i<strlen($bArray);$i++) {
181
+            for ($i = 0; $i < strlen($bArray); $i++) {
182 182
                 $msg [$i + $ocraSuiteLength + 1 + $counterLength] = $bArray[$i];
183 183
             }
184 184
         }
185 185
 
186 186
         // Put the bytes of "password" to the message
187 187
         // Input is HEX encoded
188
-        if($passwordLength > 0){
188
+        if ($passwordLength > 0) {
189 189
             $bArray = self::_hexStr2Bytes($password);
190
-            for ($i=0;$i<strlen($bArray);$i++) {
190
+            for ($i = 0; $i < strlen($bArray); $i++) {
191 191
                 $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength] = $bArray[$i];
192 192
             }
193 193
         }
194 194
 
195 195
         // Put the bytes of "sessionInformation" to the message
196 196
         // Input is text encoded
197
-        if($sessionInformationLength > 0 ){
197
+        if ($sessionInformationLength > 0) {
198 198
             $bArray = self::_hexStr2Bytes($sessionInformation);
199
-            for ($i=0;$i<strlen($bArray);$i++) {
199
+            for ($i = 0; $i < strlen($bArray); $i++) {
200 200
                 $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength + $passwordLength] = $bArray[$i];
201 201
             }
202 202
         }
203 203
 
204 204
         // Put the bytes of "time" to the message
205 205
         // Input is text value of minutes
206
-        if($timeStampLength > 0){
206
+        if ($timeStampLength > 0) {
207 207
             $bArray = self::_hexStr2Bytes($timestamp);
208
-            for ($i=0;$i<strlen($bArray);$i++) {
208
+            for ($i = 0; $i < strlen($bArray); $i++) {
209 209
                 $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength + $passwordLength + $sessionInformationLength] = $bArray[$i];
210 210
             }
211 211
         }
@@ -227,9 +227,9 @@  discard block
 block discarded – undo
227 227
     function _oath_truncate($hash, $length = 6)
228 228
     {
229 229
         // Convert to dec
230
-        foreach(str_split($hash,2) as $hex)
230
+        foreach (str_split($hash, 2) as $hex)
231 231
         {
232
-            $hmac_result[]=hexdec($hex);
232
+            $hmac_result[] = hexdec($hex);
233 233
         }
234 234
     
235 235
         // Find offset
@@ -238,11 +238,11 @@  discard block
 block discarded – undo
238 238
         // Algorithm from RFC
239 239
         return
240 240
         (
241
-            (($hmac_result[$offset+0] & 0x7f) << 24 ) |
242
-            (($hmac_result[$offset+1] & 0xff) << 16 ) |
243
-            (($hmac_result[$offset+2] & 0xff) << 8 ) |
244
-            ($hmac_result[$offset+3] & 0xff)
245
-        ) % pow(10,$length);
241
+            (($hmac_result[$offset + 0] & 0x7f) << 24) |
242
+            (($hmac_result[$offset + 1] & 0xff) << 16) |
243
+            (($hmac_result[$offset + 2] & 0xff) << 8) |
244
+            ($hmac_result[$offset + 3] & 0xff)
245
+        ) % pow(10, $length);
246 246
     }
247 247
     
248 248
 }
Please login to merge, or discard this patch.
Braces   +24 added lines, -16 removed lines patch added patch discarded remove patch
@@ -101,12 +101,15 @@  discard block
 block discarded – undo
101 101
         $sessionInformationLength = 0;
102 102
         $timeStampLength = 0;
103 103
 
104
-        if(stripos($ocraSuite, "sha1")!==false)
105
-            $crypto = "sha1";
106
-        if(stripos($ocraSuite, "sha256")!==false)
107
-            $crypto = "sha256";
108
-        if(stripos($ocraSuite, "sha512")!==false)
109
-            $crypto = "sha512";
104
+        if(stripos($ocraSuite, "sha1")!==false) {
105
+                    $crypto = "sha1";
106
+        }
107
+        if(stripos($ocraSuite, "sha256")!==false) {
108
+                    $crypto = "sha256";
109
+        }
110
+        if(stripos($ocraSuite, "sha512")!==false) {
111
+                    $crypto = "sha512";
112
+        }
110 113
 
111 114
         // How many digits should we return
112 115
         $oS = substr($ocraSuite, strpos($ocraSuite, ":")+1, strpos($ocraSuite, ":", strpos($ocraSuite, ":")+1) -strpos($ocraSuite, ":")-1);
@@ -116,31 +119,35 @@  discard block
 block discarded – undo
116 119
         // Counter
117 120
         if(stripos($ocraSuite, ":c") !==false) {
118 121
             // Fix the length of the HEX string
119
-            while(strlen($counter) < 16)
120
-                $counter = "0" . $counter;
122
+            while(strlen($counter) < 16) {
123
+                            $counter = "0" . $counter;
124
+            }
121 125
             $counterLength=8;
122 126
         }
123 127
         // Question
124 128
         if(stripos($ocraSuite, ":q")!==false ||
125 129
                 stripos($ocraSuite, "-q")!==false) {
126
-            while(strlen($question) < 256)
127
-                $question = $question . "0";
130
+            while(strlen($question) < 256) {
131
+                            $question = $question . "0";
132
+            }
128 133
             $questionLength=128;
129 134
         }
130 135
 
131 136
         // Password
132 137
         if(stripos($ocraSuite, ":p")!==false ||
133 138
                 stripos($ocraSuite, "-p") !==false) {
134
-            while(strlen($password) < 40)
135
-                $password = "0" . $password;
139
+            while(strlen($password) < 40) {
140
+                            $password = "0" . $password;
141
+            }
136 142
             $passwordLength=20;
137 143
         }
138 144
 
139 145
         // sessionInformation
140 146
         if(stripos($ocraSuite, ":s") !==false ||
141 147
                 stripos($ocraSuite, "-s", strpos($ocraSuite, ":", strpos($ocraSuite, ":")+1)) !== false) {
142
-            while(strlen($sessionInformation) < 128)
143
-                $sessionInformation = "0" . $sessionInformation;
148
+            while(strlen($sessionInformation) < 128) {
149
+                            $sessionInformation = "0" . $sessionInformation;
150
+            }
144 151
 
145 152
             $sessionInformationLength=64;
146 153
         }
@@ -148,8 +155,9 @@  discard block
 block discarded – undo
148 155
         // TimeStamp
149 156
         if(stripos($ocraSuite, ":t") !==false ||
150 157
                 stripos($ocraSuite, "-t") !== false) {
151
-            while(strlen($timeStamp) < 16)
152
-                $timeStamp = "0" . $timeStamp;
158
+            while(strlen($timeStamp) < 16) {
159
+                            $timeStamp = "0" . $timeStamp;
160
+            }
153 161
             $timeStampLength=8;
154 162
         }
155 163
 
Please login to merge, or discard this patch.
library/tiqr/Tiqr/OATH/OCRA.php 3 patches
Spacing   +69 added lines, -69 removed lines patch added patch discarded remove patch
@@ -37,7 +37,7 @@  discard block
 block discarded – undo
37 37
             $keyBytes,
38 38
             $text)
39 39
     {
40
-         $hash = hash_hmac ($crypto, $text, $keyBytes);
40
+         $hash = hash_hmac($crypto, $text, $keyBytes);
41 41
          return $hash;
42 42
     }
43 43
 
@@ -48,7 +48,7 @@  discard block
 block discarded – undo
48 48
      *
49 49
      * @return String a string with raw bytes
50 50
      */
51
-    private static function _hexStr2Bytes($hex){
51
+    private static function _hexStr2Bytes($hex) {
52 52
         return pack("H*", $hex);
53 53
     }
54 54
 
@@ -97,95 +97,95 @@  discard block
 block discarded – undo
97 97
         $cryptoFunction = $components[1];
98 98
         $dataInput = strtolower($components[2]); // lower here so we can do case insensitive comparisons
99 99
         
100
-        if(stripos($cryptoFunction, "sha1")!==false)
100
+        if (stripos($cryptoFunction, "sha1") !== false)
101 101
             $crypto = "sha1";
102
-        if(stripos($cryptoFunction, "sha256")!==false)
102
+        if (stripos($cryptoFunction, "sha256") !== false)
103 103
             $crypto = "sha256";
104
-        if(stripos($cryptoFunction, "sha512")!==false)
104
+        if (stripos($cryptoFunction, "sha512") !== false)
105 105
             $crypto = "sha512";
106 106
         
107
-        $codeDigits = substr($cryptoFunction, strrpos($cryptoFunction, "-")+1);
107
+        $codeDigits = substr($cryptoFunction, strrpos($cryptoFunction, "-") + 1);
108 108
                 
109 109
         // The size of the byte array message to be encrypted
110 110
         // Counter
111
-        if($dataInput[0] == "c" ) {
111
+        if ($dataInput[0] == "c") {
112 112
             // Fix the length of the HEX string
113
-            while(strlen($counter) < 16)
114
-                $counter = "0" . $counter;
115
-            $counterLength=8;
113
+            while (strlen($counter) < 16)
114
+                $counter = "0".$counter;
115
+            $counterLength = 8;
116 116
         }
117 117
         // Question
118
-        if($dataInput[0] == "q" ||
119
-                stripos($dataInput, "-q")!==false) {
120
-            while(strlen($question) < 256)
121
-                $question = $question . "0";
122
-            $questionLength=128;
118
+        if ($dataInput[0] == "q" ||
119
+                stripos($dataInput, "-q") !== false) {
120
+            while (strlen($question) < 256)
121
+                $question = $question."0";
122
+            $questionLength = 128;
123 123
         }
124 124
 
125 125
         // Password
126
-        if(stripos($dataInput, "psha1")!==false) {
127
-            while(strlen($password) < 40)
128
-                $password = "0" . $password;
129
-            $passwordLength=20;
126
+        if (stripos($dataInput, "psha1") !== false) {
127
+            while (strlen($password) < 40)
128
+                $password = "0".$password;
129
+            $passwordLength = 20;
130 130
         }
131 131
     
132
-        if(stripos($dataInput, "psha256")!==false) {
133
-            while(strlen($password) < 64)
134
-                $password = "0" . $password;
135
-            $passwordLength=32;
132
+        if (stripos($dataInput, "psha256") !== false) {
133
+            while (strlen($password) < 64)
134
+                $password = "0".$password;
135
+            $passwordLength = 32;
136 136
         }
137 137
         
138
-        if(stripos($dataInput, "psha512")!==false) {
139
-            while(strlen($password) < 128)
140
-                $password = "0" . $password;
141
-            $passwordLength=64;
138
+        if (stripos($dataInput, "psha512") !== false) {
139
+            while (strlen($password) < 128)
140
+                $password = "0".$password;
141
+            $passwordLength = 64;
142 142
         }
143 143
         
144 144
         // sessionInformation
145
-        if(stripos($dataInput, "s064") !==false) {
146
-            while(strlen($sessionInformation) < 128)
147
-                $sessionInformation = "0" . $sessionInformation;
145
+        if (stripos($dataInput, "s064") !== false) {
146
+            while (strlen($sessionInformation) < 128)
147
+                $sessionInformation = "0".$sessionInformation;
148 148
 
149
-            $sessionInformationLength=64;
150
-        } else if(stripos($dataInput, "s128") !==false) {
151
-            while(strlen($sessionInformation) < 256)
152
-                $sessionInformation = "0" . $sessionInformation;
149
+            $sessionInformationLength = 64;
150
+        } else if (stripos($dataInput, "s128") !== false) {
151
+            while (strlen($sessionInformation) < 256)
152
+                $sessionInformation = "0".$sessionInformation;
153 153
         
154
-            $sessionInformationLength=128;
155
-        } else if(stripos($dataInput, "s256") !==false) {
156
-            while(strlen($sessionInformation) < 512)
157
-                $sessionInformation = "0" . $sessionInformation;
154
+            $sessionInformationLength = 128;
155
+        } else if (stripos($dataInput, "s256") !== false) {
156
+            while (strlen($sessionInformation) < 512)
157
+                $sessionInformation = "0".$sessionInformation;
158 158
         
159
-            $sessionInformationLength=256;
160
-        } else if(stripos($dataInput, "s512") !==false) {
161
-            while(strlen($sessionInformation) < 128)
162
-                $sessionInformation = "0" . $sessionInformation;
159
+            $sessionInformationLength = 256;
160
+        } else if (stripos($dataInput, "s512") !== false) {
161
+            while (strlen($sessionInformation) < 128)
162
+                $sessionInformation = "0".$sessionInformation;
163 163
         
164
-            $sessionInformationLength=64;
165
-        } else if (stripos($dataInput, "s") !== false ) {
164
+            $sessionInformationLength = 64;
165
+        } else if (stripos($dataInput, "s") !== false) {
166 166
             // deviation from spec. Officially 's' without a length indicator is not in the reference implementation.
167 167
             // RFC is ambigious. However we have supported this in Tiqr since day 1, so we continue to support it.
168
-            while(strlen($sessionInformation) < 128)
169
-                $sessionInformation = "0" . $sessionInformation;
168
+            while (strlen($sessionInformation) < 128)
169
+                $sessionInformation = "0".$sessionInformation;
170 170
             
171
-            $sessionInformationLength=64;
171
+            $sessionInformationLength = 64;
172 172
         }
173 173
         
174 174
         
175 175
              
176 176
         // TimeStamp
177
-        if($dataInput[0] == "t" ||
177
+        if ($dataInput[0] == "t" ||
178 178
                 stripos($dataInput, "-t") !== false) {
179
-            while(strlen($timeStamp) < 16)
180
-                $timeStamp = "0" . $timeStamp;
181
-            $timeStampLength=8;
179
+            while (strlen($timeStamp) < 16)
180
+                $timeStamp = "0".$timeStamp;
181
+            $timeStampLength = 8;
182 182
         }
183 183
 
184 184
         // Put the bytes of "ocraSuite" parameters into the message
185 185
         
186
-        $msg = array_fill(0,$ocraSuiteLength+$counterLength+$questionLength+$passwordLength+$sessionInformationLength+$timeStampLength+1, 0);
186
+        $msg = array_fill(0, $ocraSuiteLength + $counterLength + $questionLength + $passwordLength + $sessionInformationLength + $timeStampLength + 1, 0);
187 187
                 
188
-        for($i=0;$i<strlen($ocraSuite);$i++) {
188
+        for ($i = 0; $i < strlen($ocraSuite); $i++) {
189 189
             $msg[$i] = $ocraSuite[$i];
190 190
         }
191 191
         
@@ -194,9 +194,9 @@  discard block
 block discarded – undo
194 194
 
195 195
         // Put the bytes of "Counter" to the message
196 196
         // Input is HEX encoded
197
-        if($counterLength > 0 ) {
197
+        if ($counterLength > 0) {
198 198
             $bArray = self::_hexStr2Bytes($counter);
199
-            for ($i=0;$i<strlen($bArray);$i++) {
199
+            for ($i = 0; $i < strlen($bArray); $i++) {
200 200
                 $msg [$i + $ocraSuiteLength + 1] = $bArray[$i];
201 201
             }
202 202
         }
@@ -204,36 +204,36 @@  discard block
 block discarded – undo
204 204
 
205 205
         // Put the bytes of "question" to the message
206 206
         // Input is text encoded
207
-        if($questionLength > 0 ) {
207
+        if ($questionLength > 0) {
208 208
             $bArray = self::_hexStr2Bytes($question);
209
-            for ($i=0;$i<strlen($bArray);$i++) {
209
+            for ($i = 0; $i < strlen($bArray); $i++) {
210 210
                 $msg [$i + $ocraSuiteLength + 1 + $counterLength] = $bArray[$i];
211 211
             }
212 212
         }
213 213
 
214 214
         // Put the bytes of "password" to the message
215 215
         // Input is HEX encoded
216
-        if($passwordLength > 0){
216
+        if ($passwordLength > 0) {
217 217
             $bArray = self::_hexStr2Bytes($password);
218
-            for ($i=0;$i<strlen($bArray);$i++) {
218
+            for ($i = 0; $i < strlen($bArray); $i++) {
219 219
                 $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength] = $bArray[$i];
220 220
             }
221 221
         }
222 222
 
223 223
         // Put the bytes of "sessionInformation" to the message
224 224
         // Input is text encoded
225
-        if($sessionInformationLength > 0 ){
225
+        if ($sessionInformationLength > 0) {
226 226
             $bArray = self::_hexStr2Bytes($sessionInformation);
227
-            for ($i=0;$i<strlen($bArray);$i++) {
227
+            for ($i = 0; $i < strlen($bArray); $i++) {
228 228
                 $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength + $passwordLength] = $bArray[$i];
229 229
             }
230 230
         }
231 231
 
232 232
         // Put the bytes of "time" to the message
233 233
         // Input is text value of minutes
234
-        if($timeStampLength > 0){
234
+        if ($timeStampLength > 0) {
235 235
             $bArray = self::_hexStr2Bytes($timeStamp);
236
-            for ($i=0;$i<strlen($bArray);$i++) {
236
+            for ($i = 0; $i < strlen($bArray); $i++) {
237 237
                 $msg [$i + $ocraSuiteLength + 1 + $counterLength + $questionLength + $passwordLength + $sessionInformationLength] = $bArray[$i];
238 238
             }
239 239
         }
@@ -255,19 +255,19 @@  discard block
 block discarded – undo
255 255
     static function _oath_truncate($hash, $length = 6)
256 256
     {
257 257
         // Convert to dec
258
-        foreach(str_split($hash,2) as $hex)
258
+        foreach (str_split($hash, 2) as $hex)
259 259
         {
260
-            $hmac_result[]=hexdec($hex);
260
+            $hmac_result[] = hexdec($hex);
261 261
         }
262 262
     
263 263
         // Find offset
264 264
         $offset = $hmac_result[count($hmac_result) - 1] & 0xf;
265 265
     
266 266
         $v = strval(
267
-            (($hmac_result[$offset+0] & 0x7f) << 24 ) |
268
-            (($hmac_result[$offset+1] & 0xff) << 16 ) |
269
-            (($hmac_result[$offset+2] & 0xff) << 8 ) |
270
-            ($hmac_result[$offset+3] & 0xff)
267
+            (($hmac_result[$offset + 0] & 0x7f) << 24) |
268
+            (($hmac_result[$offset + 1] & 0xff) << 16) |
269
+            (($hmac_result[$offset + 2] & 0xff) << 8) |
270
+            ($hmac_result[$offset + 3] & 0xff)
271 271
         );	
272 272
         
273 273
         $v = substr($v, strlen($v) - $length);
Please login to merge, or discard this patch.
Braces   +42 added lines, -28 removed lines patch added patch discarded remove patch
@@ -97,12 +97,15 @@  discard block
 block discarded – undo
97 97
         $cryptoFunction = $components[1];
98 98
         $dataInput = strtolower($components[2]); // lower here so we can do case insensitive comparisons
99 99
         
100
-        if(stripos($cryptoFunction, "sha1")!==false)
101
-            $crypto = "sha1";
102
-        if(stripos($cryptoFunction, "sha256")!==false)
103
-            $crypto = "sha256";
104
-        if(stripos($cryptoFunction, "sha512")!==false)
105
-            $crypto = "sha512";
100
+        if(stripos($cryptoFunction, "sha1")!==false) {
101
+                    $crypto = "sha1";
102
+        }
103
+        if(stripos($cryptoFunction, "sha256")!==false) {
104
+                    $crypto = "sha256";
105
+        }
106
+        if(stripos($cryptoFunction, "sha512")!==false) {
107
+                    $crypto = "sha512";
108
+        }
106 109
         
107 110
         $codeDigits = substr($cryptoFunction, strrpos($cryptoFunction, "-")+1);
108 111
                 
@@ -110,63 +113,73 @@  discard block
 block discarded – undo
110 113
         // Counter
111 114
         if($dataInput[0] == "c" ) {
112 115
             // Fix the length of the HEX string
113
-            while(strlen($counter) < 16)
114
-                $counter = "0" . $counter;
116
+            while(strlen($counter) < 16) {
117
+                            $counter = "0" . $counter;
118
+            }
115 119
             $counterLength=8;
116 120
         }
117 121
         // Question
118 122
         if($dataInput[0] == "q" ||
119 123
                 stripos($dataInput, "-q")!==false) {
120
-            while(strlen($question) < 256)
121
-                $question = $question . "0";
124
+            while(strlen($question) < 256) {
125
+                            $question = $question . "0";
126
+            }
122 127
             $questionLength=128;
123 128
         }
124 129
 
125 130
         // Password
126 131
         if(stripos($dataInput, "psha1")!==false) {
127
-            while(strlen($password) < 40)
128
-                $password = "0" . $password;
132
+            while(strlen($password) < 40) {
133
+                            $password = "0" . $password;
134
+            }
129 135
             $passwordLength=20;
130 136
         }
131 137
     
132 138
         if(stripos($dataInput, "psha256")!==false) {
133
-            while(strlen($password) < 64)
134
-                $password = "0" . $password;
139
+            while(strlen($password) < 64) {
140
+                            $password = "0" . $password;
141
+            }
135 142
             $passwordLength=32;
136 143
         }
137 144
         
138 145
         if(stripos($dataInput, "psha512")!==false) {
139
-            while(strlen($password) < 128)
140
-                $password = "0" . $password;
146
+            while(strlen($password) < 128) {
147
+                            $password = "0" . $password;
148
+            }
141 149
             $passwordLength=64;
142 150
         }
143 151
         
144 152
         // sessionInformation
145 153
         if(stripos($dataInput, "s064") !==false) {
146
-            while(strlen($sessionInformation) < 128)
147
-                $sessionInformation = "0" . $sessionInformation;
154
+            while(strlen($sessionInformation) < 128) {
155
+                            $sessionInformation = "0" . $sessionInformation;
156
+            }
148 157
 
149 158
             $sessionInformationLength=64;
150 159
         } else if(stripos($dataInput, "s128") !==false) {
151
-            while(strlen($sessionInformation) < 256)
152
-                $sessionInformation = "0" . $sessionInformation;
160
+            while(strlen($sessionInformation) < 256) {
161
+                            $sessionInformation = "0" . $sessionInformation;
162
+            }
153 163
         
154 164
             $sessionInformationLength=128;
155 165
         } else if(stripos($dataInput, "s256") !==false) {
156
-            while(strlen($sessionInformation) < 512)
157
-                $sessionInformation = "0" . $sessionInformation;
166
+            while(strlen($sessionInformation) < 512) {
167
+                            $sessionInformation = "0" . $sessionInformation;
168
+            }
158 169
         
159 170
             $sessionInformationLength=256;
160 171
         } else if(stripos($dataInput, "s512") !==false) {
161
-            while(strlen($sessionInformation) < 128)
162
-                $sessionInformation = "0" . $sessionInformation;
172
+            while(strlen($sessionInformation) < 128) {
173
+                            $sessionInformation = "0" . $sessionInformation;
174
+            }
163 175
         
164 176
             $sessionInformationLength=64;
165 177
         } else if (stripos($dataInput, "s") !== false ) {
166 178
             // deviation from spec. Officially 's' without a length indicator is not in the reference implementation.
167 179
             // RFC is ambigious. However we have supported this in Tiqr since day 1, so we continue to support it.
168
-            while(strlen($sessionInformation) < 128)
169
-                $sessionInformation = "0" . $sessionInformation;
180
+            while(strlen($sessionInformation) < 128) {
181
+                            $sessionInformation = "0" . $sessionInformation;
182
+            }
170 183
             
171 184
             $sessionInformationLength=64;
172 185
         }
@@ -176,8 +189,9 @@  discard block
 block discarded – undo
176 189
         // TimeStamp
177 190
         if($dataInput[0] == "t" ||
178 191
                 stripos($dataInput, "-t") !== false) {
179
-            while(strlen($timeStamp) < 16)
180
-                $timeStamp = "0" . $timeStamp;
192
+            while(strlen($timeStamp) < 16) {
193
+                            $timeStamp = "0" . $timeStamp;
194
+            }
181 195
             $timeStampLength=8;
182 196
         }
183 197
 
Please login to merge, or discard this patch.
Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -46,8 +46,8 @@  discard block
 block discarded – undo
46 46
             $keyBytes,
47 47
             $text)
48 48
     {
49
-         $hash = hash_hmac ($crypto, $text, $keyBytes);
50
-         return $hash;
49
+            $hash = hash_hmac ($crypto, $text, $keyBytes);
50
+            return $hash;
51 51
     }
52 52
 
53 53
     /**
@@ -83,12 +83,12 @@  discard block
 block discarded – undo
83 83
      * {@link truncationDigits} digits
84 84
      */
85 85
     static function generateOCRA($ocraSuite,
86
-                                 $key,
87
-                                 $counter,
88
-                                 $question,
89
-                                 $password,
90
-                                 $sessionInformation,
91
-                                 $timeStamp)
86
+                                    $key,
87
+                                    $counter,
88
+                                    $question,
89
+                                    $password,
90
+                                    $sessionInformation,
91
+                                    $timeStamp)
92 92
     {
93 93
         $codeDigits = 0;
94 94
         $crypto = "";
Please login to merge, or discard this patch.
library/tiqr/Tiqr/Service.php 3 patches
Braces   +3 added lines, -1 removed lines patch added patch discarded remove patch
@@ -453,7 +453,9 @@
 block discarded – undo
453 453
             $sessionId = session_id(); 
454 454
         }
455 455
         $status = $this->_stateStorage->getValue("enrollstatus".$sessionId);
456
-        if (is_null($status)) return self::ENROLLMENT_STATUS_IDLE;
456
+        if (is_null($status)) {
457
+            return self::ENROLLMENT_STATUS_IDLE;
458
+        }
457 459
         return $status;
458 460
     }
459 461
         
Please login to merge, or discard this patch.
Indentation   +39 added lines, -39 removed lines patch added patch discarded remove patch
@@ -538,17 +538,17 @@  discard block
 block discarded – undo
538 538
         }
539 539
 
540 540
         $metadata = array("service"=>
541
-                               array("displayName"       => $this->_name,
542
-                                     "identifier"        => $this->_identifier,
543
-                                     "logoUrl"           => $this->_logoUrl,
544
-                                     "infoUrl"           => $this->_infoUrl,
545
-                                     "authenticationUrl" => $authenticationUrl,
546
-                                     "ocraSuite"         => $this->_ocraSuite,
547
-                                     "enrollmentUrl"     => $enrollmentUrl
548
-                               ),
549
-                          "identity"=>
550
-                               array("identifier" =>$data["userId"],
551
-                                     "displayName"=>$data["displayName"]));
541
+                                array("displayName"       => $this->_name,
542
+                                        "identifier"        => $this->_identifier,
543
+                                        "logoUrl"           => $this->_logoUrl,
544
+                                        "infoUrl"           => $this->_infoUrl,
545
+                                        "authenticationUrl" => $authenticationUrl,
546
+                                        "ocraSuite"         => $this->_ocraSuite,
547
+                                        "enrollmentUrl"     => $enrollmentUrl
548
+                                ),
549
+                            "identity"=>
550
+                                array("identifier" =>$data["userId"],
551
+                                        "displayName"=>$data["displayName"]));
552 552
 
553 553
         $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT . $enrollmentKey);
554 554
 
@@ -571,18 +571,18 @@  discard block
 block discarded – undo
571 571
      */
572 572
     public function getEnrollmentSecret($enrollmentKey)
573 573
     {
574
-         $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT . $enrollmentKey);
575
-         $secret = $this->_uniqueSessionKey(self::PREFIX_ENROLLMENT_SECRET);
576
-         $enrollmentData = [
577
-             "userId" => $data["userId"],
578
-             "sessionId" => $data["sessionId"]
579
-         ];
580
-         $this->_stateStorage->setValue(
581
-             self::PREFIX_ENROLLMENT_SECRET . $secret,
582
-             $enrollmentData,
583
-             self::ENROLLMENT_EXPIRE
584
-         );
585
-         return $secret;
574
+            $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT . $enrollmentKey);
575
+            $secret = $this->_uniqueSessionKey(self::PREFIX_ENROLLMENT_SECRET);
576
+            $enrollmentData = [
577
+                "userId" => $data["userId"],
578
+                "sessionId" => $data["sessionId"]
579
+            ];
580
+            $this->_stateStorage->setValue(
581
+                self::PREFIX_ENROLLMENT_SECRET . $secret,
582
+                $enrollmentData,
583
+                self::ENROLLMENT_EXPIRE
584
+            );
585
+            return $secret;
586 586
     } 
587 587
 
588 588
     /**
@@ -597,13 +597,13 @@  discard block
 block discarded – undo
597 597
      */
598 598
     public function validateEnrollmentSecret($enrollmentSecret)
599 599
     {
600
-         $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret);
601
-         if (is_array($data)) { 
602
-             // Secret is valid, application may accept the user secret. 
603
-             $this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_PROCESSED);
604
-             return $data["userId"];
605
-         }
606
-         return false;
600
+            $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret);
601
+            if (is_array($data)) { 
602
+                // Secret is valid, application may accept the user secret. 
603
+                $this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_PROCESSED);
604
+                return $data["userId"];
605
+            }
606
+            return false;
607 607
     }
608 608
     
609 609
     /**
@@ -620,13 +620,13 @@  discard block
 block discarded – undo
620 620
      */
621 621
     public function finalizeEnrollment($enrollmentSecret) 
622 622
     {
623
-         $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret);
624
-         if (is_array($data)) {
625
-             // Enrollment is finalized, destroy our session data.
626
-             $this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_FINALIZED);
627
-             $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret);
628
-         }
629
-         return true;
623
+            $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret);
624
+            if (is_array($data)) {
625
+                // Enrollment is finalized, destroy our session data.
626
+                $this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_FINALIZED);
627
+                $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT_SECRET.$enrollmentSecret);
628
+            }
629
+            return true;
630 630
     }
631 631
 
632 632
     /**
@@ -662,7 +662,7 @@  discard block
 block discarded – undo
662 662
 
663 663
         $challengeUserId = NULL;
664 664
         if (isset($state["userId"])) {
665
-          $challengeUserId = $state["userId"];
665
+            $challengeUserId = $state["userId"];
666 666
         }
667 667
         // Check if we're dealing with a second factor
668 668
         if ($challengeUserId!=NULL && ($userId != $challengeUserId)) {
@@ -801,6 +801,6 @@  discard block
 block discarded – undo
801 801
      */
802 802
     protected function _setEnrollmentStatus($sessionId, $status)
803 803
     {
804
-       $this->_stateStorage->setValue("enrollstatus".$sessionId, $status, self::ENROLLMENT_EXPIRE);
804
+        $this->_stateStorage->setValue("enrollstatus".$sessionId, $status, self::ENROLLMENT_EXPIRE);
805 805
     }
806 806
 }
Please login to merge, or discard this patch.
Spacing   +34 added lines, -34 removed lines patch added patch discarded remove patch
@@ -68,12 +68,12 @@  discard block
 block discarded – undo
68 68
     /**
69 69
      * Enrollment status codes
70 70
      */
71
-    const ENROLLMENT_STATUS_IDLE = 1;        // Nothing happens
71
+    const ENROLLMENT_STATUS_IDLE = 1; // Nothing happens
72 72
     const ENROLLMENT_STATUS_INITIALIZED = 2; // An enrollment session has begun
73
-    const ENROLLMENT_STATUS_RETRIEVED = 3;   // The device has retrieved the metadata
74
-    const ENROLLMENT_STATUS_PROCESSED = 4;   // The device has snet back a secret
75
-    const ENROLLMENT_STATUS_FINALIZED = 5;   // The application has stored the secret
76
-    const ENROLLMENT_STATUS_VALIDATED = 6;   // A first succesful authentication was performed
73
+    const ENROLLMENT_STATUS_RETRIEVED = 3; // The device has retrieved the metadata
74
+    const ENROLLMENT_STATUS_PROCESSED = 4; // The device has snet back a secret
75
+    const ENROLLMENT_STATUS_FINALIZED = 5; // The application has stored the secret
76
+    const ENROLLMENT_STATUS_VALIDATED = 6; // A first succesful authentication was performed
77 77
 
78 78
     const PREFIX_ENROLLMENT_SECRET = 'enrollsecret';
79 79
     const PREFIX_ENROLLMENT = 'enroll';
@@ -156,7 +156,7 @@  discard block
 block discarded – undo
156 156
      * @param array $options
157 157
      * @param int $version The protocol version to use (defaults to the latest)
158 158
      */
159
-    public function __construct($options=array(), $version = 2)
159
+    public function __construct($options = array(), $version = 2)
160 160
     {
161 161
         $this->_options = $options;
162 162
         
@@ -294,7 +294,7 @@  discard block
 block discarded – undo
294 294
 
295 295
             $message = new $class($this->_options);
296 296
             $message->setId(time());
297
-            $message->setText("Please authenticate for " . $this->_name);
297
+            $message->setText("Please authenticate for ".$this->_name);
298 298
             $message->setAddress($notificationAddress);
299 299
             $message->setCustomProperty('challenge', $this->_getChallengeUrl($sessionKey));
300 300
             $message->send();
@@ -362,13 +362,13 @@  discard block
 block discarded – undo
362 362
      * @param String $spIdentifier If SP and IDP are 2 different things, pass the url/identifier of the SP the user is logging into.
363 363
      *                             For setups where IDP==SP, just leave this blank.
364 364
      */
365
-    public function startAuthenticationSession($userId="", $sessionId="", $spIdentifier="")
365
+    public function startAuthenticationSession($userId = "", $sessionId = "", $spIdentifier = "")
366 366
     {
367
-        if ($sessionId=="") {
367
+        if ($sessionId == "") {
368 368
             $sessionId = session_id();
369 369
         }
370 370
 
371
-        if ($spIdentifier=="") {
371
+        if ($spIdentifier == "") {
372 372
             $spIdentifier = $this->_identifier;
373 373
         }
374 374
 
@@ -378,11 +378,11 @@  discard block
 block discarded – undo
378 378
         
379 379
         $data = array("sessionId"=>$sessionId, "challenge"=>$challenge, "spIdentifier" => $spIdentifier);
380 380
         
381
-        if ($userId!="") {
381
+        if ($userId != "") {
382 382
             $data["userId"] = $userId;
383 383
         }
384 384
         
385
-        $this->_stateStorage->setValue(self::PREFIX_CHALLENGE . $sessionKey, $data, self::CHALLENGE_EXPIRE);
385
+        $this->_stateStorage->setValue(self::PREFIX_CHALLENGE.$sessionKey, $data, self::CHALLENGE_EXPIRE);
386 386
        
387 387
         return $sessionKey;
388 388
     }
@@ -402,9 +402,9 @@  discard block
 block discarded – undo
402 402
      *                           to php session)
403 403
      * @return String The enrollment key
404 404
      */
405
-    public function startEnrollmentSession($userId, $displayName, $sessionId="")
405
+    public function startEnrollmentSession($userId, $displayName, $sessionId = "")
406 406
     {
407
-        if ($sessionId=="") {
407
+        if ($sessionId == "") {
408 408
             $sessionId = session_id();
409 409
         }
410 410
         $enrollmentKey = $this->_uniqueSessionKey(self::PREFIX_ENROLLMENT);
@@ -413,7 +413,7 @@  discard block
 block discarded – undo
413 413
             "displayName" => $displayName,
414 414
             "sessionId" => $sessionId
415 415
         ];
416
-        $this->_stateStorage->setValue(self::PREFIX_ENROLLMENT . $enrollmentKey, $data, self::ENROLLMENT_EXPIRE);
416
+        $this->_stateStorage->setValue(self::PREFIX_ENROLLMENT.$enrollmentKey, $data, self::ENROLLMENT_EXPIRE);
417 417
         $this->_setEnrollmentStatus($sessionId, self::ENROLLMENT_STATUS_INITIALIZED);
418 418
 
419 419
         return $enrollmentKey;
@@ -424,9 +424,9 @@  discard block
 block discarded – undo
424 424
      * @param $sessionId The application's session identifier (defaults
425 425
      *                   to php session)
426 426
      */
427
-    public function resetEnrollmentSession($sessionId="")
427
+    public function resetEnrollmentSession($sessionId = "")
428 428
     {
429
-        if ($sessionId=="") {
429
+        if ($sessionId == "") {
430 430
             $sessionId = session_id();
431 431
         }
432 432
 
@@ -471,9 +471,9 @@  discard block
 block discarded – undo
471 471
      *               A first successful authentication was performed 
472 472
      *               (todo: currently not used)
473 473
      */
474
-    public function getEnrollmentStatus($sessionId="")
474
+    public function getEnrollmentStatus($sessionId = "")
475 475
     { 
476
-        if ($sessionId=="") {
476
+        if ($sessionId == "") {
477 477
             $sessionId = session_id(); 
478 478
         }
479 479
         $status = $this->_stateStorage->getValue("enrollstatus".$sessionId);
@@ -532,7 +532,7 @@  discard block
 block discarded – undo
532 532
      */
533 533
     public function getEnrollmentMetadata($enrollmentKey, $authenticationUrl, $enrollmentUrl)
534 534
     {
535
-        $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT . $enrollmentKey);
535
+        $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT.$enrollmentKey);
536 536
         if (!is_array($data)) {
537 537
             return false;
538 538
         }
@@ -550,7 +550,7 @@  discard block
 block discarded – undo
550 550
                                array("identifier" =>$data["userId"],
551 551
                                      "displayName"=>$data["displayName"]));
552 552
 
553
-        $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT . $enrollmentKey);
553
+        $this->_stateStorage->unsetValue(self::PREFIX_ENROLLMENT.$enrollmentKey);
554 554
 
555 555
         $this->_setEnrollmentStatus($data["sessionId"], self::ENROLLMENT_STATUS_RETRIEVED);
556 556
         return $metadata;
@@ -571,14 +571,14 @@  discard block
 block discarded – undo
571 571
      */
572 572
     public function getEnrollmentSecret($enrollmentKey)
573 573
     {
574
-         $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT . $enrollmentKey);
574
+         $data = $this->_stateStorage->getValue(self::PREFIX_ENROLLMENT.$enrollmentKey);
575 575
          $secret = $this->_uniqueSessionKey(self::PREFIX_ENROLLMENT_SECRET);
576 576
          $enrollmentData = [
577 577
              "userId" => $data["userId"],
578 578
              "sessionId" => $data["sessionId"]
579 579
          ];
580 580
          $this->_stateStorage->setValue(
581
-             self::PREFIX_ENROLLMENT_SECRET . $secret,
581
+             self::PREFIX_ENROLLMENT_SECRET.$secret,
582 582
              $enrollmentData,
583 583
              self::ENROLLMENT_EXPIRE
584 584
          );
@@ -652,7 +652,7 @@  discard block
 block discarded – undo
652 652
      */
653 653
     public function authenticate($userId, $userSecret, $sessionKey, $response)
654 654
     {
655
-        $state = $this->_stateStorage->getValue(self::PREFIX_CHALLENGE . $sessionKey);
655
+        $state = $this->_stateStorage->getValue(self::PREFIX_CHALLENGE.$sessionKey);
656 656
         if (is_null($state)) {
657 657
             return self::AUTH_RESULT_INVALID_CHALLENGE;
658 658
         }
@@ -665,7 +665,7 @@  discard block
 block discarded – undo
665 665
           $challengeUserId = $state["userId"];
666 666
         }
667 667
         // Check if we're dealing with a second factor
668
-        if ($challengeUserId!=NULL && ($userId != $challengeUserId)) {
668
+        if ($challengeUserId != NULL && ($userId != $challengeUserId)) {
669 669
             return self::AUTH_RESULT_INVALID_USERID; // only allowed to authenticate against the user that's authenticated in the first factor
670 670
         }
671 671
 
@@ -680,7 +680,7 @@  discard block
 block discarded – undo
680 680
             $this->_stateStorage->setValue("authenticated_".$sessionId, $userId, self::LOGIN_EXPIRE);
681 681
             
682 682
             // Clean up the challenge.
683
-            $this->_stateStorage->unsetValue(self::PREFIX_CHALLENGE . $sessionKey);
683
+            $this->_stateStorage->unsetValue(self::PREFIX_CHALLENGE.$sessionKey);
684 684
             
685 685
             return self::AUTH_RESULT_AUTHENTICATED;
686 686
         }
@@ -692,9 +692,9 @@  discard block
 block discarded – undo
692 692
      * @param String $sessionId The application's session identifier (defaults
693 693
      *                          to the php session).
694 694
      */
695
-    public function logout($sessionId="")
695
+    public function logout($sessionId = "")
696 696
     {
697
-        if ($sessionId=="") {
697
+        if ($sessionId == "") {
698 698
             $sessionId = session_id(); 
699 699
         }
700 700
         
@@ -729,9 +729,9 @@  discard block
 block discarded – undo
729 729
      * @return mixed An array with user data if a user was logged in or NULL if
730 730
      *               no user is logged in.
731 731
      */
732
-    public function getAuthenticatedUser($sessionId="")
732
+    public function getAuthenticatedUser($sessionId = "")
733 733
     {
734
-        if ($sessionId=="") {
734
+        if ($sessionId == "") {
735 735
             $sessionId = session_id(); 
736 736
         }
737 737
         
@@ -749,12 +749,12 @@  discard block
 block discarded – undo
749 749
      */
750 750
     protected function _getChallengeUrl($sessionKey)
751 751
     {                
752
-        $state = $this->_stateStorage->getValue(self::PREFIX_CHALLENGE . $sessionKey);
752
+        $state = $this->_stateStorage->getValue(self::PREFIX_CHALLENGE.$sessionKey);
753 753
         if (is_null($state)) {
754 754
             return false;
755 755
         }
756 756
         
757
-        $userId   = NULL;
757
+        $userId = NULL;
758 758
         $challenge = $state["challenge"];
759 759
         if (isset($state["userId"])) {
760 760
             $userId = $state["userId"];
@@ -762,7 +762,7 @@  discard block
 block discarded – undo
762 762
         $spIdentifier = $state["spIdentifier"];
763 763
         
764 764
         // Last bit is the spIdentifier
765
-        return $this->_protocolAuth."://".(!is_null($userId)?urlencode($userId).'@':'').$this->getIdentifier()."/".$sessionKey."/".$challenge."/".urlencode($spIdentifier)."/".$this->_protocolVersion;
765
+        return $this->_protocolAuth."://".(!is_null($userId) ?urlencode($userId).'@' : '').$this->getIdentifier()."/".$sessionKey."/".$challenge."/".urlencode($spIdentifier)."/".$this->_protocolVersion;
766 766
     }
767 767
 
768 768
     /**
@@ -786,7 +786,7 @@  discard block
 block discarded – undo
786 786
     protected function _uniqueSessionKey($prefix)
787 787
     {      
788 788
         $value = 1;
789
-        while ($value!=NULL) {
789
+        while ($value != NULL) {
790 790
             $sessionKey = $this->_ocraWrapper->generateSessionKey();
791 791
             $value = $this->_stateStorage->getValue($prefix.$sessionKey);
792 792
         }
Please login to merge, or discard this patch.
library/tiqr/Tiqr/Message/Exception/MismatchSenderId.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -35,7 +35,7 @@
 block discarded – undo
35 35
      * @param boolean   $temporary  temporary failure?
36 36
      * @param Exception $parent     parent exception
37 37
      */
38
-    public function __construct($message, $temporary=false, Exception $parent=null)
38
+    public function __construct($message, $temporary = false, Exception $parent = null)
39 39
     {
40 40
         parent::__construct($message, $parent);
41 41
         $this->_temporary = $temporary;
Please login to merge, or discard this patch.