Completed
Push — developer ( 17749e...f48bb9 )
by Błażej
246:54 queued 202:57
created
include/Webservices/Utils.php 1 patch
Doc Comments   +23 added lines patch added patch discarded remove patch
@@ -162,6 +162,9 @@  discard block
 block discarded – undo
162 162
 	return $param;
163 163
 }
164 164
 
165
+/**
166
+ * @param boolean $moduleName
167
+ */
165 168
 function vtws_getEntityNameFields($moduleName)
166 169
 {
167 170
 
@@ -285,6 +288,10 @@  discard block
 block discarded – undo
285 288
 	return vtws_addModuleTypeWebserviceEntity($moduleName, $moduleHandler['file'], $moduleHandler['class'], $isModule);
286 289
 }
287 290
 
291
+/**
292
+ * @param string $filePath
293
+ * @param string $className
294
+ */
288 295
 function vtws_addModuleTypeWebserviceEntity($moduleName, $filePath, $className)
289 296
 {
290 297
 	$adb = PearDatabase::getInstance();
@@ -313,6 +320,10 @@  discard block
 block discarded – undo
313 320
 	}
314 321
 }
315 322
 
323
+/**
324
+ * @param string $filePath
325
+ * @param string $className
326
+ */
316 327
 function vtws_addActorTypeWebserviceEntityWithName($moduleName, $filePath, $className, $actorNameDetails)
317 328
 {
318 329
 	$adb = PearDatabase::getInstance();
@@ -322,6 +333,10 @@  discard block
 block discarded – undo
322 333
 	vtws_addActorTypeName($entityId, $actorNameDetails['fieldNames'], $actorNameDetails['indexField'], $actorNameDetails['tableName']);
323 334
 }
324 335
 
336
+/**
337
+ * @param string $filePath
338
+ * @param string $className
339
+ */
325 340
 function vtws_addActorTypeWebserviceEntityWithoutName($moduleName, $filePath, $className, $actorNameDetails)
326 341
 {
327 342
 	$adb = PearDatabase::getInstance();
@@ -352,6 +367,9 @@  discard block
 block discarded – undo
352 367
 	return $meta->getName($id);
353 368
 }
354 369
 
370
+/**
371
+ * @param string $name
372
+ */
355 373
 function vtws_preserveGlobal($name, $value)
356 374
 {
357 375
 	return VTWS_PreserveGlobal::preserveGlobal($name, $value);
@@ -953,6 +971,11 @@  discard block
 block discarded – undo
953 971
 	return null;
954 972
 }
955 973
 
974
+/**
975
+ * @param string $label
976
+ *
977
+ * @return integer|null
978
+ */
956 979
 function vtws_getWebserviceTranslatedString($label)
957 980
 {
958 981
 	$currentLanguage = vtws_getWebserviceCurrentLanguage();
Please login to merge, or discard this patch.
include/Webservices/VTQL_Lexer.php 1 patch
Doc Comments   +9 added lines patch added patch discarded remove patch
@@ -5,6 +5,9 @@  discard block
 block discarded – undo
5 5
 $in_started = false;
6 6
 $count = false;
7 7
 
8
+/**
9
+ * @param integer $count
10
+ */
8 11
 function incrementN($lexer, $count)
9 12
 {
10 13
 	$i = 0;
@@ -160,6 +163,9 @@  discard block
 block discarded – undo
160 163
 	}
161 164
 }
162 165
 
166
+/**
167
+ * @param VTQL_Lexer $lexer
168
+ */
163 169
 function handleend($lexer, $val)
164 170
 {
165 171
 	return VTQL_Parser::SEMICOLON;
@@ -179,6 +185,9 @@  discard block
 block discarded – undo
179 185
 	public $mandatory;
180 186
 	public $current_state;
181 187
 
188
+	/**
189
+	 * @param string $data
190
+	 */
182 191
 	public function __construct($data)
183 192
 	{
184 193
 		$this->index = 0;
Please login to merge, or discard this patch.
include/Webservices/VTQL_Parser.php 2 patches
Doc Comments   +3 added lines patch added patch discarded remove patch
@@ -159,6 +159,9 @@
 block discarded – undo
159 159
 	private $syntax_error;
160 160
 	private $user;
161 161
 
162
+	/**
163
+	 * @param VTQL_Lexer $lex
164
+	 */
162 165
 	public function __construct($user, $lex, $out)
163 166
 	{
164 167
 		if (!is_array($out)) {
Please login to merge, or discard this patch.
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -89,7 +89,7 @@  discard block
 block discarded – undo
89 89
 {
90 90
 
91 91
 	public $stateno; /* The state-number */
92
-	public $major;   /* The major token value.  This is the code
92
+	public $major; /* The major token value.  This is the code
93 93
 	 * * number for the token at this stack level */
94 94
 	public $minor; /* The user-supplied minor token value.  This
95 95
 	 * * is the value of the token  */
@@ -663,17 +663,17 @@  discard block
 block discarded – undo
663 663
 	/**
664 664
 	 * @var int
665 665
 	 */
666
-	public $yyidx;  /* Index of top element in stack */
666
+	public $yyidx; /* Index of top element in stack */
667 667
 
668 668
 	/**
669 669
 	 * @var int
670 670
 	 */
671
-	public $yyerrcnt;  /* Shifts left before out of the error */
671
+	public $yyerrcnt; /* Shifts left before out of the error */
672 672
 
673 673
 	/**
674 674
 	 * @var array
675 675
 	 */
676
-	public $yystack = [];  /* The parser's stack */
676
+	public $yystack = []; /* The parser's stack */
677 677
 
678 678
 	/**
679 679
 	 * For tracing shifts, the names of all terminals and nonterminals
@@ -782,7 +782,7 @@  discard block
 block discarded – undo
782 782
 			 * * which appear on the RHS of the rule, but which are not used
783 783
 			 * * inside the C code.
784 784
 			 */
785
-			default: break;   /* If no destructor action specified: do nothing */
785
+			default: break; /* If no destructor action specified: do nothing */
786 786
 		}
787 787
 	}
788 788
 
@@ -1608,7 +1608,7 @@  discard block
 block discarded – undo
1608 1608
 	{
1609 1609
 //        $yyact;            /* The parser action. */
1610 1610
 //        $yyendofinput;     /* True if we are at the end of input */
1611
-		$yyerrorhit = 0;   /* True if yymajor has invoked an error */
1611
+		$yyerrorhit = 0; /* True if yymajor has invoked an error */
1612 1612
 
1613 1613
 		/* (re)initialize the parser, if necessary */
1614 1614
 		if ($this->yyidx === null || $this->yyidx < 0) {
Please login to merge, or discard this patch.
include/Webservices/WebserviceField.php 3 patches
Doc Comments   +9 added lines patch added patch discarded remove patch
@@ -84,6 +84,9 @@  discard block
 block discarded – undo
84 84
 		}
85 85
 	}
86 86
 
87
+	/**
88
+	 * @param integer $rowNumber
89
+	 */
87 90
 	public static function fromQueryResult($adb, $result, $rowNumber)
88 91
 	{
89 92
 		return new WebserviceField($adb, $adb->query_result_rowdata($result, $rowNumber));
@@ -147,6 +150,9 @@  discard block
 block discarded – undo
147 150
 		return $this->default;
148 151
 	}
149 152
 
153
+	/**
154
+	 * @return string
155
+	 */
150 156
 	public function getColumnName()
151 157
 	{
152 158
 		return $this->columnName;
@@ -203,6 +209,9 @@  discard block
 block discarded – undo
203 209
 		return false;
204 210
 	}
205 211
 
212
+	/**
213
+	 * @param boolean $nullable
214
+	 */
206 215
 	private function setNullable($nullable)
207 216
 	{
208 217
 		$this->nullable = $nullable;
Please login to merge, or discard this patch.
Braces   +13 added lines, -9 removed lines patch added patch discarded remove patch
@@ -198,8 +198,9 @@  discard block
 block discarded – undo
198 198
 
199 199
 	public function isReadOnly()
200 200
 	{
201
-		if ($this->readOnly == 1)
202
-			return true;
201
+		if ($this->readOnly == 1) {
202
+					return true;
203
+		}
203 204
 		return false;
204 205
 	}
205 206
 
@@ -307,8 +308,9 @@  discard block
 block discarded – undo
307 308
 				$numRows = $this->pearDB->num_rows($result);
308 309
 				for ($i = 0; $i < $numRows; ++$i) {
309 310
 					$referenceType = $this->pearDB->query_result($result, $i, "type");
310
-					if (in_array($referenceType, $accessibleTypes))
311
-						array_push($referenceTypes, $referenceType);
311
+					if (in_array($referenceType, $accessibleTypes)) {
312
+											array_push($referenceTypes, $referenceType);
313
+					}
312 314
 				}
313 315
 			} else {
314 316
 				$fieldModel = Vtiger_Field_Model::getInstanceFromFieldId($this->getFieldId());
@@ -425,21 +427,23 @@  discard block
 block discarded – undo
425 427
 				$picklistValue = $this->pearDB->query_result($result, $i, $fieldName);
426 428
 				$picklistValue = decode_html($picklistValue);
427 429
 				$moduleName = getTabModuleName($this->getTabId());
428
-				if ($moduleName == 'Events')
429
-					$moduleName = 'Calendar';
430
+				if ($moduleName == 'Events') {
431
+									$moduleName = 'Calendar';
432
+				}
430 433
 				$elem["label"] = \includes\Language::translate($picklistValue, $moduleName);
431 434
 				$elem["value"] = $picklistValue;
432 435
 				array_push($options, $elem);
433 436
 			}
434
-		}else {
437
+		} else {
435 438
 			$user = VTWS_PreserveGlobal::getGlobal('current_user');
436 439
 			$details = \includes\fields\Picklist::getRoleBasedPicklistValues($fieldName, $user->roleid);
437 440
 			for ($i = 0; $i < sizeof($details); ++$i) {
438 441
 				$elem = [];
439 442
 				$picklistValue = decode_html($details[$i]);
440 443
 				$moduleName = getTabModuleName($this->getTabId());
441
-				if ($moduleName == 'Events')
442
-					$moduleName = 'Calendar';
444
+				if ($moduleName == 'Events') {
445
+									$moduleName = 'Calendar';
446
+				}
443 447
 				$elem["label"] = \includes\Language::translate($picklistValue, $moduleName);
444 448
 				$elem["value"] = $picklistValue;
445 449
 				array_push($options, $elem);
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -41,7 +41,7 @@
 block discarded – undo
41 41
 								module_name=?, summary=?, test=?, execution_condition=?, defaultworkflow=?, filtersavedinnew=?,
42 42
 								schtypeid=?, schtime=?, schdayofmonth=?, schdayofweek=?, schannualdates=?, nexttrigger_time=? where workflow_id=?", array($wf->moduleName, $wf->description, $wf->test, $wf->executionCondition, $wf->defaultworkflow, $wf->filtersavedinnew,
43 43
 				$wf->schtypeid, $wf->schtime, $wf->schdayofmonth, $wf->schdayofweek, $wf->schannualdates, $wf->nexttrigger_time, $wf->id));
44
-		}else {
44
+		} else {
45 45
 			$workflowId = $adb->getUniqueID("com_vtiger_workflows");
46 46
 			$workflow->id = $workflowId;
47 47
 			$wf = $workflow;
Please login to merge, or discard this patch.
install/views/Index.php 2 patches
Doc Comments   +5 added lines patch added patch discarded remove patch
@@ -19,6 +19,11 @@
 block discarded – undo
19 19
 		return false;
20 20
 	}
21 21
 
22
+	/**
23
+	 * @param Vtiger_Request $request
24
+	 *
25
+	 * @return Vtiger_Request
26
+	 */
22 27
 	public function setLanguage($request)
23 28
 	{
24 29
 		if (!$request->get('lang')) {
Please login to merge, or discard this patch.
Braces   +3 added lines, -2 removed lines patch added patch discarded remove patch
@@ -87,8 +87,9 @@
 block discarded – undo
87 87
 	public function process(Vtiger_Request $request)
88 88
 	{
89 89
 		$default_charset = AppConfig::main('default_charset');
90
-		if (empty($default_charset))
91
-			$default_charset = 'UTF-8';
90
+		if (empty($default_charset)) {
91
+					$default_charset = 'UTF-8';
92
+		}
92 93
 		$mode = $request->getMode();
93 94
 		if (!empty($mode) && $this->isMethodExposed($mode)) {
94 95
 			return $this->$mode($request);
Please login to merge, or discard this patch.
libraries/csrf-magic/csrf-magic.php 4 patches
Doc Comments   +4 added lines, -1 removed lines patch added patch discarded remove patch
@@ -211,7 +211,7 @@  discard block
 block discarded – undo
211 211
 /**
212 212
  * Checks if this is a post request, and if it is, checks if the nonce is valid.
213 213
  * @param bool $fatal Whether or not to fatally error out if there is a problem.
214
- * @return True if check passes or is not necessary, false if failure.
214
+ * @return boolean|null if check passes or is not necessary, false if failure.
215 215
  */
216 216
 function csrf_check($fatal = true) {
217 217
     if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true;
@@ -281,6 +281,9 @@  discard block
 block discarded – undo
281 281
     }
282 282
     return $ret;
283 283
 }
284
+/**
285
+ * @param integer $level
286
+ */
284 287
 function csrf_flattenpost2($level, $key, $data) {
285 288
     if(!is_array($data)) return array($key => $data);
286 289
     $ret = array();
Please login to merge, or discard this patch.
Spacing   +19 added lines, -19 removed lines patch added patch discarded remove patch
@@ -166,35 +166,35 @@  discard block
 block discarded – undo
166 166
 			if (!$is_html) return $buffer;
167 167
         }
168 168
     }
169
-    $count=1;
169
+    $count = 1;
170 170
     $tokens = csrf_get_tokens();
171 171
     $name = $GLOBALS['csrf']['input-name'];
172 172
     $endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : '';
173 173
     $input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>";
174 174
     $buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer);
175 175
     if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) {
176
-        $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count);
176
+        $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer, $count);
177 177
     }
178 178
     if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) {
179 179
 		global $dbconfig;
180 180
         if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') {
181 181
 		$buffer = preg_replace(
182 182
             '/<\/head>/',
183
-             '<script type="text/javascript">'.
184
-                'var csrfMagicToken = "'.$tokens.'";'.
185
-                'var csrfMagicName = "'.$name.'";</script>'.
186
-            '<script src="../'.$js.'" type="text/javascript"></script></head>',
187
-            $buffer,$count
183
+             '<script type="text/javascript">' .
184
+                'var csrfMagicToken = "' . $tokens . '";' .
185
+                'var csrfMagicName = "' . $name . '";</script>' .
186
+            '<script src="../' . $js . '" type="text/javascript"></script></head>',
187
+            $buffer, $count
188 188
 		);
189 189
 			
190 190
 		} else {
191 191
 		$buffer = preg_replace(
192 192
             '/<\/head>/',
193
-            '<script type="text/javascript">'.
194
-                'var csrfMagicToken = "'.$tokens.'";'.
195
-                'var csrfMagicName = "'.$name.'";</script>'.
196
-            '<script src="'.$js.'" type="text/javascript"></script></head>',
197
-            $buffer,$count
193
+            '<script type="text/javascript">' .
194
+                'var csrfMagicToken = "' . $tokens . '";' .
195
+                'var csrfMagicName = "' . $name . '";</script>' .
196
+            '<script src="' . $js . '" type="text/javascript"></script></head>',
197
+            $buffer, $count
198 198
 		);
199 199
 		}
200 200
 		
@@ -276,17 +276,17 @@  discard block
 block discarded – undo
276 276
 
277 277
 function csrf_flattenpost($data) {
278 278
     $ret = array();
279
-    foreach($data as $n => $v) {
279
+    foreach ($data as $n => $v) {
280 280
         $ret = array_merge($ret, csrf_flattenpost2(1, $n, $v));
281 281
     }
282 282
     return $ret;
283 283
 }
284 284
 function csrf_flattenpost2($level, $key, $data) {
285
-    if(!is_array($data)) return array($key => $data);
285
+    if (!is_array($data)) return array($key => $data);
286 286
     $ret = array();
287
-    foreach($data as $n => $v) {
288
-        $nk = $level >= 1 ? $key."[$n]" : "[$n]";
289
-        $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v));
287
+    foreach ($data as $n => $v) {
288
+        $nk = $level >= 1 ? $key . "[$n]" : "[$n]";
289
+        $ret = array_merge($ret, csrf_flattenpost2($level + 1, $nk, $v));
290 290
     }
291 291
     return $ret;
292 292
 }
@@ -300,7 +300,7 @@  discard block
 block discarded – undo
300 300
     $data = '';
301 301
     foreach (csrf_flattenpost($_POST) as $key => $value) {
302 302
         if ($key == $GLOBALS['csrf']['input-name']) continue;
303
-        $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />';
303
+        $data .= '<input type="hidden" name="' . htmlspecialchars($key) . '" value="' . htmlspecialchars($value) . '" />';
304 304
     }
305 305
     echo "<html><head><title>CSRF check failed</title></head>
306 306
         <body>
@@ -408,7 +408,7 @@  discard block
 block discarded – undo
408 408
     if (is_writable($dir)) {
409 409
         $secret = csrf_generate_secret();
410 410
         $fh = fopen($file, 'w');
411
-        fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL);
411
+        fwrite($fh, '<?php $secret = "' . $secret . '";' . PHP_EOL);
412 412
         fclose($fh);
413 413
         return $secret;
414 414
     }
Please login to merge, or discard this patch.
Braces   +90 added lines, -31 removed lines patch added patch discarded remove patch
@@ -157,13 +157,16 @@  discard block
 block discarded – undo
157 157
 			// Determine based on content type.
158 158
 			$headers = headers_list();
159 159
 			foreach ($headers as $header) {
160
-				if ($is_html) break;
161
-				else if (stripos('Content-type', $header) !== false && stripos('/html', $header) === false) {
160
+				if ($is_html) {
161
+					break;
162
+				} else if (stripos('Content-type', $header) !== false && stripos('/html', $header) === false) {
162 163
 					$is_html = false;
163 164
 				}
164 165
 			}
165 166
         
166
-			if (!$is_html) return $buffer;
167
+			if (!$is_html) {
168
+				return $buffer;
169
+			}
167 170
         }
168 171
     }
169 172
     $count=1;
@@ -214,22 +217,30 @@  discard block
 block discarded – undo
214 217
  * @return True if check passes or is not necessary, false if failure.
215 218
  */
216 219
 function csrf_check($fatal = true) {
217
-    if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true;
220
+    if ($_SERVER['REQUEST_METHOD'] !== 'POST') {
221
+    	return true;
222
+    }
218 223
     csrf_start();
219 224
     $name = $GLOBALS['csrf']['input-name'];
220 225
     $ok = false;
221 226
     $tokens = '';
222 227
     do {
223
-        if (!isset($_POST[$name])) break;
228
+        if (!isset($_POST[$name])) {
229
+        	break;
230
+        }
224 231
         // we don't regenerate a token and check it because some token creation
225 232
         // schemes are volatile.
226 233
         $tokens = $_POST[$name];
227
-        if (!csrf_check_tokens($tokens)) break;
234
+        if (!csrf_check_tokens($tokens)) {
235
+        	break;
236
+        }
228 237
         $ok = true;
229 238
     } while (false);
230 239
     if ($fatal && !$ok) {
231 240
         $callback = $GLOBALS['csrf']['callback'];
232
-        if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden';
241
+        if (trim($tokens, 'A..Za..z0..9:;,') !== '') {
242
+        	$tokens = 'hidden';
243
+        }
233 244
         $callback($tokens);
234 245
         exit;
235 246
     }
@@ -256,15 +267,21 @@  discard block
 block discarded – undo
256 267
     csrf_start();
257 268
 
258 269
     // These are "strong" algorithms that don't require per se a secret
259
-    if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip;
270
+    if (session_id()) {
271
+    	return 'sid:' . csrf_hash(session_id()) . $ip;
272
+    }
260 273
     if ($GLOBALS['csrf']['cookie']) {
261 274
         $val = csrf_generate_secret();
262 275
         setcookie($GLOBALS['csrf']['cookie'], $val);
263 276
         return 'cookie:' . csrf_hash($val) . $ip;
264 277
     }
265
-    if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip;
278
+    if ($GLOBALS['csrf']['key']) {
279
+    	return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip;
280
+    }
266 281
     // These further algorithms require a server-side secret
267
-    if (!$secret) return 'invalid';
282
+    if (!$secret) {
283
+    	return 'invalid';
284
+    }
268 285
     if ($GLOBALS['csrf']['user'] !== false) {
269 286
         return 'user:' . csrf_hash($GLOBALS['csrf']['user']);
270 287
     }
@@ -282,7 +299,9 @@  discard block
 block discarded – undo
282 299
     return $ret;
283 300
 }
284 301
 function csrf_flattenpost2($level, $key, $data) {
285
-    if(!is_array($data)) return array($key => $data);
302
+    if(!is_array($data)) {
303
+    	return array($key => $data);
304
+    }
286 305
     $ret = array();
287 306
     foreach($data as $n => $v) {
288 307
         $nk = $level >= 1 ? $key."[$n]" : "[$n]";
@@ -299,7 +318,9 @@  discard block
 block discarded – undo
299 318
     header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden');
300 319
     $data = '';
301 320
     foreach (csrf_flattenpost($_POST) as $key => $value) {
302
-        if ($key == $GLOBALS['csrf']['input-name']) continue;
321
+        if ($key == $GLOBALS['csrf']['input-name']) {
322
+        	continue;
323
+        }
303 324
         $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />';
304 325
     }
305 326
     echo "<html><head><title>CSRF check failed</title></head>
@@ -325,9 +346,13 @@  discard block
 block discarded – undo
325 346
  * instead of csrf_check_token()
326 347
  */
327 348
 function csrf_check_tokens($tokens) {
328
-    if (is_string($tokens)) $tokens = explode(';', $tokens);
349
+    if (is_string($tokens)) {
350
+    	$tokens = explode(';', $tokens);
351
+    }
329 352
     foreach ($tokens as $token) {
330
-        if (csrf_check_token($token)) return true;
353
+        if (csrf_check_token($token)) {
354
+        	return true;
355
+        }
331 356
     }
332 357
     return false;
333 358
 }
@@ -336,38 +361,62 @@  discard block
 block discarded – undo
336 361
  * Checks if a token is valid.
337 362
  */
338 363
 function csrf_check_token($token) {
339
-    if (strpos($token, ':') === false) return false;
364
+    if (strpos($token, ':') === false) {
365
+    	return false;
366
+    }
340 367
     list($type, $value) = explode(':', $token, 2);
341
-    if (strpos($value, ',') === false) return false;
368
+    if (strpos($value, ',') === false) {
369
+    	return false;
370
+    }
342 371
     list($x, $time) = explode(',', $token, 2);
343 372
     if ($GLOBALS['csrf']['expires']) {
344
-        if (time() > $time + $GLOBALS['csrf']['expires']) return false;
373
+        if (time() > $time + $GLOBALS['csrf']['expires']) {
374
+        	return false;
375
+        }
345 376
     }
346 377
     switch ($type) {
347 378
         case 'sid':
348 379
             return $value === csrf_hash(session_id(), $time);
349 380
         case 'cookie':
350 381
             $n = $GLOBALS['csrf']['cookie'];
351
-            if (!$n) return false;
352
-            if (!isset($_COOKIE[$n])) return false;
382
+            if (!$n) {
383
+            	return false;
384
+            }
385
+            if (!isset($_COOKIE[$n])) {
386
+            	return false;
387
+            }
353 388
             return $value === csrf_hash($_COOKIE[$n], $time);
354 389
         case 'key':
355
-            if (!$GLOBALS['csrf']['key']) return false;
390
+            if (!$GLOBALS['csrf']['key']) {
391
+            	return false;
392
+            }
356 393
             return $value === csrf_hash($GLOBALS['csrf']['key'], $time);
357 394
         // We could disable these 'weaker' checks if 'key' was set, but
358 395
         // that doesn't make me feel good then about the cookie-based
359 396
         // implementation.
360 397
         case 'user':
361
-            if (!csrf_get_secret()) return false;
362
-            if ($GLOBALS['csrf']['user'] === false) return false;
398
+            if (!csrf_get_secret()) {
399
+            	return false;
400
+            }
401
+            if ($GLOBALS['csrf']['user'] === false) {
402
+            	return false;
403
+            }
363 404
             return $value === csrf_hash($GLOBALS['csrf']['user'], $time);
364 405
         case 'ip':
365
-            if (!csrf_get_secret()) return false;
406
+            if (!csrf_get_secret()) {
407
+            	return false;
408
+            }
366 409
             // do not allow IP-based checks if the username is set, or if
367 410
             // the browser sent cookies
368
-            if ($GLOBALS['csrf']['user'] !== false) return false;
369
-            if (!empty($_COOKIE)) return false;
370
-            if (!$GLOBALS['csrf']['allow-ip']) return false;
411
+            if ($GLOBALS['csrf']['user'] !== false) {
412
+            	return false;
413
+            }
414
+            if (!empty($_COOKIE)) {
415
+            	return false;
416
+            }
417
+            if (!$GLOBALS['csrf']['allow-ip']) {
418
+            	return false;
419
+            }
371 420
             return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time);
372 421
     }
373 422
     return false;
@@ -397,7 +446,9 @@  discard block
 block discarded – undo
397 446
  * Retrieves the secret, and generates one if necessary.
398 447
  */
399 448
 function csrf_get_secret() {
400
-    if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret'];
449
+    if ($GLOBALS['csrf']['secret']) {
450
+    	return $GLOBALS['csrf']['secret'];
451
+    }
401 452
     $dir = dirname(__FILE__);
402 453
     $file = $dir . '/../../config/csrf_secret.php';
403 454
     $secret = '';
@@ -432,13 +483,21 @@  discard block
 block discarded – undo
432 483
  * from the current time.
433 484
  */
434 485
 function csrf_hash($value, $time = null) {
435
-    if (!$time) $time = time();
486
+    if (!$time) {
487
+    	$time = time();
488
+    }
436 489
     return sha1(csrf_get_secret() . $value . $time) . ',' . $time;
437 490
 }
438 491
 
439 492
 // Load user configuration
440
-if (function_exists('csrf_startup')) csrf_startup();
493
+if (function_exists('csrf_startup')) {
494
+	csrf_startup();
495
+}
441 496
 // Initialize our handler
442
-if ($GLOBALS['csrf']['rewrite'])     ob_start('csrf_ob_handler');
497
+if ($GLOBALS['csrf']['rewrite']) {
498
+	ob_start('csrf_ob_handler');
499
+}
443 500
 // Perform check
444
-if (!$GLOBALS['csrf']['defer'])      csrf_check();
501
+if (!$GLOBALS['csrf']['defer']) {
502
+	csrf_check();
503
+}
Please login to merge, or discard this patch.
Indentation   +185 added lines, -185 removed lines patch added patch discarded remove patch
@@ -138,17 +138,17 @@  discard block
 block discarded – undo
138 138
  * inject our JavaScript library.
139 139
  */
140 140
 function csrf_ob_handler($buffer, $flags) {
141
-    // Even though the user told us to rewrite, we should do a quick heuristic
142
-    // to check if the page is *actually* HTML. We don't begin rewriting until
143
-    // we hit the first <html tag.
144
-    static $is_html = false;
145
-    static $is_partial = false;
141
+	// Even though the user told us to rewrite, we should do a quick heuristic
142
+	// to check if the page is *actually* HTML. We don't begin rewriting until
143
+	// we hit the first <html tag.
144
+	static $is_html = false;
145
+	static $is_partial = false;
146 146
     
147
-    if (!$is_html) {
148
-        // not HTML until proven otherwise
149
-        if (stripos($buffer, '<html') !== false) {
150
-            $is_html = true;
151
-        } else {
147
+	if (!$is_html) {
148
+		// not HTML until proven otherwise
149
+		if (stripos($buffer, '<html') !== false) {
150
+			$is_html = true;
151
+		} else {
152 152
 
153 153
 			// Customized to take the partial HTML with form
154 154
 			$is_html = true;
@@ -164,48 +164,48 @@  discard block
 block discarded – undo
164 164
 			}
165 165
         
166 166
 			if (!$is_html) return $buffer;
167
-        }
168
-    }
169
-    $count=1;
170
-    $tokens = csrf_get_tokens();
171
-    $name = $GLOBALS['csrf']['input-name'];
172
-    $endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : '';
173
-    $input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>";
174
-    $buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer);
175
-    if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) {
176
-        $buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count);
177
-    }
178
-    if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) {
167
+		}
168
+	}
169
+	$count=1;
170
+	$tokens = csrf_get_tokens();
171
+	$name = $GLOBALS['csrf']['input-name'];
172
+	$endslash = $GLOBALS['csrf']['xhtml'] ? ' /' : '';
173
+	$input = "<input type='hidden' name='$name' value=\"$tokens\"$endslash>";
174
+	$buffer = preg_replace('#(<form[^>]*method\s*=\s*["\']post["\'][^>]*>)#i', '$1' . $input, $buffer);
175
+	if ($GLOBALS['csrf']['frame-breaker'] && !$is_partial) {
176
+		$buffer = preg_replace('/<\/head>/', '<script type="text/javascript">if (top != self) {top.location.href = self.location.href;}</script></head>', $buffer,$count);
177
+	}
178
+	if (($js = $GLOBALS['csrf']['rewrite-js']) && !$is_partial) {
179 179
 		global $dbconfig;
180
-        if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') {
180
+		if (empty($dbconfig) || empty($dbconfig['db_name']) || $dbconfig['db_name'] == '_DBC_TYPE_') {
181 181
 		$buffer = preg_replace(
182
-            '/<\/head>/',
183
-             '<script type="text/javascript">'.
184
-                'var csrfMagicToken = "'.$tokens.'";'.
185
-                'var csrfMagicName = "'.$name.'";</script>'.
186
-            '<script src="../'.$js.'" type="text/javascript"></script></head>',
187
-            $buffer,$count
182
+			'/<\/head>/',
183
+			 '<script type="text/javascript">'.
184
+				'var csrfMagicToken = "'.$tokens.'";'.
185
+				'var csrfMagicName = "'.$name.'";</script>'.
186
+			'<script src="../'.$js.'" type="text/javascript"></script></head>',
187
+			$buffer,$count
188 188
 		);
189 189
 			
190 190
 		} else {
191 191
 		$buffer = preg_replace(
192
-            '/<\/head>/',
193
-            '<script type="text/javascript">'.
194
-                'var csrfMagicToken = "'.$tokens.'";'.
195
-                'var csrfMagicName = "'.$name.'";</script>'.
196
-            '<script src="'.$js.'" type="text/javascript"></script></head>',
197
-            $buffer,$count
192
+			'/<\/head>/',
193
+			'<script type="text/javascript">'.
194
+				'var csrfMagicToken = "'.$tokens.'";'.
195
+				'var csrfMagicName = "'.$name.'";</script>'.
196
+			'<script src="'.$js.'" type="text/javascript"></script></head>',
197
+			$buffer,$count
198 198
 		);
199 199
 		}
200 200
 		
201
-        $script = '<script type="text/javascript">CsrfMagic.end();</script>';
201
+		$script = '<script type="text/javascript">CsrfMagic.end();</script>';
202 202
         
203
-        $buffer = preg_replace('/<\/body>/', $script . '</body>', $buffer, $count);
204
-        if (!$count) {
205
-            $buffer .= $script;
206
-        }
207
-    }
208
-    return $buffer;
203
+		$buffer = preg_replace('/<\/body>/', $script . '</body>', $buffer, $count);
204
+		if (!$count) {
205
+			$buffer .= $script;
206
+		}
207
+	}
208
+	return $buffer;
209 209
 }
210 210
 
211 211
 /**
@@ -214,26 +214,26 @@  discard block
 block discarded – undo
214 214
  * @return True if check passes or is not necessary, false if failure.
215 215
  */
216 216
 function csrf_check($fatal = true) {
217
-    if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true;
218
-    csrf_start();
219
-    $name = $GLOBALS['csrf']['input-name'];
220
-    $ok = false;
221
-    $tokens = '';
222
-    do {
223
-        if (!isset($_POST[$name])) break;
224
-        // we don't regenerate a token and check it because some token creation
225
-        // schemes are volatile.
226
-        $tokens = $_POST[$name];
227
-        if (!csrf_check_tokens($tokens)) break;
228
-        $ok = true;
229
-    } while (false);
230
-    if ($fatal && !$ok) {
231
-        $callback = $GLOBALS['csrf']['callback'];
232
-        if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden';
233
-        $callback($tokens);
234
-        exit;
235
-    }
236
-    return $ok;
217
+	if ($_SERVER['REQUEST_METHOD'] !== 'POST') return true;
218
+	csrf_start();
219
+	$name = $GLOBALS['csrf']['input-name'];
220
+	$ok = false;
221
+	$tokens = '';
222
+	do {
223
+		if (!isset($_POST[$name])) break;
224
+		// we don't regenerate a token and check it because some token creation
225
+		// schemes are volatile.
226
+		$tokens = $_POST[$name];
227
+		if (!csrf_check_tokens($tokens)) break;
228
+		$ok = true;
229
+	} while (false);
230
+	if ($fatal && !$ok) {
231
+		$callback = $GLOBALS['csrf']['callback'];
232
+		if (trim($tokens, 'A..Za..z0..9:;,') !== '') $tokens = 'hidden';
233
+		$callback($tokens);
234
+		exit;
235
+	}
236
+	return $ok;
237 237
 }
238 238
 
239 239
 /**
@@ -241,67 +241,67 @@  discard block
 block discarded – undo
241 241
  * by semicolons.
242 242
  */
243 243
 function csrf_get_tokens() {
244
-    $has_cookies = !empty($_COOKIE);
245
-
246
-    // $ip implements a composite key, which is sent if the user hasn't sent
247
-    // any cookies. It may or may not be used, depending on whether or not
248
-    // the cookies "stick"
249
-    $secret = csrf_get_secret();
250
-    if (!$has_cookies && $secret) {
251
-        $ip = ';ip:' . csrf_hash($_SERVER['IP_ADDRESS']);
252
-    } else {
253
-        $ip = '';
254
-    }
255
-    csrf_start();
256
-
257
-    // These are "strong" algorithms that don't require per se a secret
258
-    if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip;
259
-    if ($GLOBALS['csrf']['cookie']) {
260
-        $val = csrf_generate_secret();
261
-        setcookie($GLOBALS['csrf']['cookie'], $val);
262
-        return 'cookie:' . csrf_hash($val) . $ip;
263
-    }
264
-    if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip;
265
-    // These further algorithms require a server-side secret
266
-    if (!$secret) return 'invalid';
267
-    if ($GLOBALS['csrf']['user'] !== false) {
268
-        return 'user:' . csrf_hash($GLOBALS['csrf']['user']);
269
-    }
270
-    if ($GLOBALS['csrf']['allow-ip']) {
271
-        return ltrim($ip, ';');
272
-    }
273
-    return 'invalid';
244
+	$has_cookies = !empty($_COOKIE);
245
+
246
+	// $ip implements a composite key, which is sent if the user hasn't sent
247
+	// any cookies. It may or may not be used, depending on whether or not
248
+	// the cookies "stick"
249
+	$secret = csrf_get_secret();
250
+	if (!$has_cookies && $secret) {
251
+		$ip = ';ip:' . csrf_hash($_SERVER['IP_ADDRESS']);
252
+	} else {
253
+		$ip = '';
254
+	}
255
+	csrf_start();
256
+
257
+	// These are "strong" algorithms that don't require per se a secret
258
+	if (session_id()) return 'sid:' . csrf_hash(session_id()) . $ip;
259
+	if ($GLOBALS['csrf']['cookie']) {
260
+		$val = csrf_generate_secret();
261
+		setcookie($GLOBALS['csrf']['cookie'], $val);
262
+		return 'cookie:' . csrf_hash($val) . $ip;
263
+	}
264
+	if ($GLOBALS['csrf']['key']) return 'key:' . csrf_hash($GLOBALS['csrf']['key']) . $ip;
265
+	// These further algorithms require a server-side secret
266
+	if (!$secret) return 'invalid';
267
+	if ($GLOBALS['csrf']['user'] !== false) {
268
+		return 'user:' . csrf_hash($GLOBALS['csrf']['user']);
269
+	}
270
+	if ($GLOBALS['csrf']['allow-ip']) {
271
+		return ltrim($ip, ';');
272
+	}
273
+	return 'invalid';
274 274
 }
275 275
 
276 276
 function csrf_flattenpost($data) {
277
-    $ret = array();
278
-    foreach($data as $n => $v) {
279
-        $ret = array_merge($ret, csrf_flattenpost2(1, $n, $v));
280
-    }
281
-    return $ret;
277
+	$ret = array();
278
+	foreach($data as $n => $v) {
279
+		$ret = array_merge($ret, csrf_flattenpost2(1, $n, $v));
280
+	}
281
+	return $ret;
282 282
 }
283 283
 function csrf_flattenpost2($level, $key, $data) {
284
-    if(!is_array($data)) return array($key => $data);
285
-    $ret = array();
286
-    foreach($data as $n => $v) {
287
-        $nk = $level >= 1 ? $key."[$n]" : "[$n]";
288
-        $ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v));
289
-    }
290
-    return $ret;
284
+	if(!is_array($data)) return array($key => $data);
285
+	$ret = array();
286
+	foreach($data as $n => $v) {
287
+		$nk = $level >= 1 ? $key."[$n]" : "[$n]";
288
+		$ret = array_merge($ret, csrf_flattenpost2($level+1, $nk, $v));
289
+	}
290
+	return $ret;
291 291
 }
292 292
 
293 293
 /**
294 294
  * @param $tokens is safe for HTML consumption
295 295
  */
296 296
 function csrf_callback($tokens) {
297
-    // (yes, $tokens is safe to echo without escaping)
298
-    header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden');
299
-    $data = '';
300
-    foreach (csrf_flattenpost($_POST) as $key => $value) {
301
-        if ($key == $GLOBALS['csrf']['input-name']) continue;
302
-        $data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />';
303
-    }
304
-    echo "<html><head><title>CSRF check failed</title></head>
297
+	// (yes, $tokens is safe to echo without escaping)
298
+	header($_SERVER['SERVER_PROTOCOL'] . ' 403 Forbidden');
299
+	$data = '';
300
+	foreach (csrf_flattenpost($_POST) as $key => $value) {
301
+		if ($key == $GLOBALS['csrf']['input-name']) continue;
302
+		$data .= '<input type="hidden" name="'.htmlspecialchars($key).'" value="'.htmlspecialchars($value).'" />';
303
+	}
304
+	echo "<html><head><title>CSRF check failed</title></head>
305 305
         <body>
306 306
         <p>CSRF check failed. Your form session may have expired, or you may not have
307 307
         cookies enabled.</p>
@@ -316,7 +316,7 @@  discard block
 block discarded – undo
316 316
  * It is configurable by setting $GLOBALS['csrf']['callback'] in this file
317 317
  */
318 318
 function vtResponseForIllegalAccess() {
319
-    echo 'Invalid request - Response For Illegal Access';
319
+	echo 'Invalid request - Response For Illegal Access';
320 320
 }
321 321
 
322 322
 /**
@@ -324,106 +324,106 @@  discard block
 block discarded – undo
324 324
  * instead of csrf_check_token()
325 325
  */
326 326
 function csrf_check_tokens($tokens) {
327
-    if (is_string($tokens)) $tokens = explode(';', $tokens);
328
-    foreach ($tokens as $token) {
329
-        if (csrf_check_token($token)) return true;
330
-    }
331
-    return false;
327
+	if (is_string($tokens)) $tokens = explode(';', $tokens);
328
+	foreach ($tokens as $token) {
329
+		if (csrf_check_token($token)) return true;
330
+	}
331
+	return false;
332 332
 }
333 333
 
334 334
 /**
335 335
  * Checks if a token is valid.
336 336
  */
337 337
 function csrf_check_token($token) {
338
-    if (strpos($token, ':') === false) return false;
339
-    list($type, $value) = explode(':', $token, 2);
340
-    if (strpos($value, ',') === false) return false;
341
-    list($x, $time) = explode(',', $token, 2);
342
-    if ($GLOBALS['csrf']['expires']) {
343
-        if (time() > $time + $GLOBALS['csrf']['expires']) return false;
344
-    }
345
-    switch ($type) {
346
-        case 'sid':
347
-            return $value === csrf_hash(session_id(), $time);
348
-        case 'cookie':
349
-            $n = $GLOBALS['csrf']['cookie'];
350
-            if (!$n) return false;
351
-            if (!isset($_COOKIE[$n])) return false;
352
-            return $value === csrf_hash($_COOKIE[$n], $time);
353
-        case 'key':
354
-            if (!$GLOBALS['csrf']['key']) return false;
355
-            return $value === csrf_hash($GLOBALS['csrf']['key'], $time);
356
-        // We could disable these 'weaker' checks if 'key' was set, but
357
-        // that doesn't make me feel good then about the cookie-based
358
-        // implementation.
359
-        case 'user':
360
-            if (!csrf_get_secret()) return false;
361
-            if ($GLOBALS['csrf']['user'] === false) return false;
362
-            return $value === csrf_hash($GLOBALS['csrf']['user'], $time);
363
-        case 'ip':
364
-            if (!csrf_get_secret()) return false;
365
-            // do not allow IP-based checks if the username is set, or if
366
-            // the browser sent cookies
367
-            if ($GLOBALS['csrf']['user'] !== false) return false;
368
-            if (!empty($_COOKIE)) return false;
369
-            if (!$GLOBALS['csrf']['allow-ip']) return false;
370
-            return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time);
371
-    }
372
-    return false;
338
+	if (strpos($token, ':') === false) return false;
339
+	list($type, $value) = explode(':', $token, 2);
340
+	if (strpos($value, ',') === false) return false;
341
+	list($x, $time) = explode(',', $token, 2);
342
+	if ($GLOBALS['csrf']['expires']) {
343
+		if (time() > $time + $GLOBALS['csrf']['expires']) return false;
344
+	}
345
+	switch ($type) {
346
+		case 'sid':
347
+			return $value === csrf_hash(session_id(), $time);
348
+		case 'cookie':
349
+			$n = $GLOBALS['csrf']['cookie'];
350
+			if (!$n) return false;
351
+			if (!isset($_COOKIE[$n])) return false;
352
+			return $value === csrf_hash($_COOKIE[$n], $time);
353
+		case 'key':
354
+			if (!$GLOBALS['csrf']['key']) return false;
355
+			return $value === csrf_hash($GLOBALS['csrf']['key'], $time);
356
+		// We could disable these 'weaker' checks if 'key' was set, but
357
+		// that doesn't make me feel good then about the cookie-based
358
+		// implementation.
359
+		case 'user':
360
+			if (!csrf_get_secret()) return false;
361
+			if ($GLOBALS['csrf']['user'] === false) return false;
362
+			return $value === csrf_hash($GLOBALS['csrf']['user'], $time);
363
+		case 'ip':
364
+			if (!csrf_get_secret()) return false;
365
+			// do not allow IP-based checks if the username is set, or if
366
+			// the browser sent cookies
367
+			if ($GLOBALS['csrf']['user'] !== false) return false;
368
+			if (!empty($_COOKIE)) return false;
369
+			if (!$GLOBALS['csrf']['allow-ip']) return false;
370
+			return $value === csrf_hash($_SERVER['IP_ADDRESS'], $time);
371
+	}
372
+	return false;
373 373
 }
374 374
 
375 375
 /**
376 376
  * Sets a configuration value.
377 377
  */
378 378
 function csrf_conf($key, $val) {
379
-    if (!isset($GLOBALS['csrf'][$key])) {
380
-        trigger_error('No such configuration ' . $key, E_USER_WARNING);
381
-        return;
382
-    }
383
-    $GLOBALS['csrf'][$key] = $val;
379
+	if (!isset($GLOBALS['csrf'][$key])) {
380
+		trigger_error('No such configuration ' . $key, E_USER_WARNING);
381
+		return;
382
+	}
383
+	$GLOBALS['csrf'][$key] = $val;
384 384
 }
385 385
 
386 386
 /**
387 387
  * Starts a session if we're allowed to.
388 388
  */
389 389
 function csrf_start() {
390
-    if ($GLOBALS['csrf']['auto-session'] && !session_id()) {
391
-        session_start();
392
-    }
390
+	if ($GLOBALS['csrf']['auto-session'] && !session_id()) {
391
+		session_start();
392
+	}
393 393
 }
394 394
 
395 395
 /**
396 396
  * Retrieves the secret, and generates one if necessary.
397 397
  */
398 398
 function csrf_get_secret() {
399
-    if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret'];
400
-    $dir = dirname(__FILE__);
401
-    $file = $dir . '/../../config/csrf_secret.php';
402
-    $secret = '';
403
-    if (file_exists($file)) {
404
-        include $file;
405
-        return $secret;
406
-    }
407
-    if (is_writable($dir)) {
408
-        $secret = csrf_generate_secret();
409
-        $fh = fopen($file, 'w');
410
-        fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL);
411
-        fclose($fh);
412
-        return $secret;
413
-    }
414
-    return '';
399
+	if ($GLOBALS['csrf']['secret']) return $GLOBALS['csrf']['secret'];
400
+	$dir = dirname(__FILE__);
401
+	$file = $dir . '/../../config/csrf_secret.php';
402
+	$secret = '';
403
+	if (file_exists($file)) {
404
+		include $file;
405
+		return $secret;
406
+	}
407
+	if (is_writable($dir)) {
408
+		$secret = csrf_generate_secret();
409
+		$fh = fopen($file, 'w');
410
+		fwrite($fh, '<?php $secret = "'.$secret.'";' . PHP_EOL);
411
+		fclose($fh);
412
+		return $secret;
413
+	}
414
+	return '';
415 415
 }
416 416
 
417 417
 /**
418 418
  * Generates a random string as the hash of time, microtime, and mt_rand.
419 419
  */
420 420
 function csrf_generate_secret($len = 32) {
421
-    $r = '';
422
-    for ($i = 0; $i < 32; $i++) {
423
-        $r .= chr(mt_rand(0, 255));
424
-    }
425
-    $r .= time() . microtime();
426
-    return sha1($r);
421
+	$r = '';
422
+	for ($i = 0; $i < 32; $i++) {
423
+		$r .= chr(mt_rand(0, 255));
424
+	}
425
+	$r .= time() . microtime();
426
+	return sha1($r);
427 427
 }
428 428
 
429 429
 /**
@@ -431,8 +431,8 @@  discard block
 block discarded – undo
431 431
  * from the current time.
432 432
  */
433 433
 function csrf_hash($value, $time = null) {
434
-    if (!$time) $time = time();
435
-    return sha1(csrf_get_secret() . $value . $time) . ',' . $time;
434
+	if (!$time) $time = time();
435
+	return sha1(csrf_get_secret() . $value . $time) . ',' . $time;
436 436
 }
437 437
 
438 438
 // Load user configuration
Please login to merge, or discard this patch.
libraries/freetag/freetag.class.php 4 patches
Doc Comments   +6 added lines, -1 removed lines patch added patch discarded remove patch
@@ -405,6 +405,7 @@  discard block
 block discarded – undo
405 405
 	 * @param int The unique ID of the person who tagged the object with this tag.
406 406
 	 * @param int The unique ID of the object in question.
407 407
 	 * @param string A raw string from a web form containing tags.
408
+	 * @param string $tag
408 409
 	 *
409 410
 	 * @return boolean Returns true if successful, false otherwise. Does not operate as a transaction.
410 411
 	 */ 
@@ -662,7 +663,7 @@  discard block
 block discarded – undo
662 663
 	 * @param string The raw string form of the tag to delete. See above for vtiger_notes.
663 664
 	 * @param int Whether to skip the update portion for objects that haven't been tagged. (Default: 1)
664 665
 	 *
665
-	 * @return string Returns the tag in normalized form.
666
+	 * @return boolean Returns the tag in normalized form.
666 667
 	 */
667 668
 	public function tag_object($tagger_id, $object_id, $tag_string, $module, $skip_updates = 1) {
668 669
 		if($tag_string == '') {
@@ -1127,6 +1128,10 @@  discard block
 block discarded – undo
1127 1128
 	 * @param string The text to output
1128 1129
 	 * @return boolean Always returns true
1129 1130
 	 */
1131
+
1132
+	/**
1133
+	 * @param string $text
1134
+	 */
1130 1135
 	public function debug_text($text) {
1131 1136
 		if ($this->_debug) {
1132 1137
 			echo "$text<br>\n";
Please login to merge, or discard this patch.
Indentation   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -175,7 +175,7 @@  discard block
 block discarded – undo
175 175
 			WHERE $where
176 176
 			ORDER BY object_id ASC
177 177
 			LIMIT $offset, $limit";
178
-        echo $sql;
178
+		echo $sql;
179 179
 		$rs = $adb->pquery($sql, $params);
180 180
 		$retarr = array();
181 181
 		while ($row = $adb->fetch_array($rs)) {
@@ -220,7 +220,7 @@  discard block
 block discarded – undo
220 220
 			WHERE $where
221 221
 			ORDER BY object_id ASC
222 222
 			";
223
-        	//echo $sql;
223
+			//echo $sql;
224 224
 		$rs = $adb->pquery($sql, $params);
225 225
 		$retarr = array();
226 226
 		while ($row = $adb->fetch_array($rs)) {
@@ -970,7 +970,7 @@  discard block
 block discarded – undo
970 970
 			$tagger_sql
971 971
 			GROUP BY tag
972 972
 			ORDER BY quantity DESC LIMIT 0, $max";
973
-        //echo $sql;
973
+		//echo $sql;
974 974
 		$rs = $adb->pquery($sql, $params);
975 975
 		$retarr = array();
976 976
 		while ($row = $adb->fetch_array($rs)) {
Please login to merge, or discard this patch.
Spacing   +52 added lines, -52 removed lines patch added patch discarded remove patch
@@ -65,7 +65,7 @@  discard block
 block discarded – undo
65 65
 	 * @access private
66 66
 	 * @param string Whether to prevent multiple vtiger_users from tagging the same object. By default, set to block (ala Upcoming.org)
67 67
 	 */
68
-	var $_block_multiuser_tag_on_object =0;
68
+	var $_block_multiuser_tag_on_object = 0;
69 69
 	/**
70 70
 	 * @access private
71 71
 	 * @param bool Whether to use persistent ADODB connections. False by default.
@@ -155,7 +155,7 @@  discard block
 block discarded – undo
155 155
 	 * @return An array of Object ID numbers that reference your original objects.
156 156
 	 */ 
157 157
 	public function get_objects_with_tag($tag, $offset = 0, $limit = 100, $tagger_id = NULL) {
158
-		if(!isset($tag)) {
158
+		if (!isset($tag)) {
159 159
 			return false;
160 160
 		}		
161 161
 		$adb = PearDatabase::getInstance();
@@ -163,7 +163,7 @@  discard block
 block discarded – undo
163 163
 		$where = "tag = ? ";
164 164
 		$params = array($tag);
165 165
 
166
-		if(isset($tagger_id) && ($tagger_id > 0)) {
166
+		if (isset($tagger_id) && ($tagger_id > 0)) {
167 167
 			$where .= "AND tagger_id = ? ";
168 168
 			array_push($params, $tagger_id);
169 169
 		} 
@@ -201,7 +201,7 @@  discard block
 block discarded – undo
201 201
 	 * @return An array of Object ID numbers that reference your original objects.
202 202
 	 */ 
203 203
 	public function get_objects_with_tag_all($tag, $tagger_id = NULL) {
204
-		if(!isset($tag)) {
204
+		if (!isset($tag)) {
205 205
 			return false;
206 206
 		}		
207 207
 		$adb = PearDatabase::getInstance();
@@ -209,7 +209,7 @@  discard block
 block discarded – undo
209 209
 		$where = "tag = ? ";
210 210
 		$params = array($tag);
211 211
 
212
-		if(isset($tagger_id) && ($tagger_id > 0)) {
212
+		if (isset($tagger_id) && ($tagger_id > 0)) {
213 213
 			$where .= "AND tagger_id = ? ";
214 214
 			array_push($params, $tagger_id);
215 215
 		} 
@@ -253,7 +253,7 @@  discard block
 block discarded – undo
253 253
 			return $retarr;
254 254
 		}
255 255
 		$params = array($tagArray);
256
-		if(isset($tagger_id) && ($tagger_id > 0)) {
256
+		if (isset($tagger_id) && ($tagger_id > 0)) {
257 257
 			$tagger_sql = "AND tagger_id = ?";
258 258
 			array_push($params, $tagger_id);
259 259
 		} else {
@@ -274,7 +274,7 @@  discard block
 block discarded – undo
274 274
 		$sql = "SELECT ${prefix}freetagged_objects.object_id, tag, COUNT(DISTINCT tag) AS uniques
275 275
 			FROM ${prefix}freetagged_objects 
276 276
 			INNER JOIN ${prefix}freetags ON (${prefix}freetagged_objects.tag_id = ${prefix}freetags.id)
277
-			WHERE ${prefix}freetags.tag IN (". generateQuestionMarks($tagArray) .")
277
+			WHERE ${prefix}freetags.tag IN (" . generateQuestionMarks($tagArray) . ")
278 278
 			$tagger_sql
279 279
 			GROUP BY ${prefix}freetagged_objects.object_id
280 280
 			HAVING uniques = $numTags
@@ -304,7 +304,7 @@  discard block
 block discarded – undo
304 304
 	 * @return An array of Object ID numbers that reference your original objects.
305 305
 	 */ 
306 306
 	public function get_objects_with_tag_id($tag_id, $offset = 0, $limit = 100, $tagger_id = NULL) {
307
-		if(!isset($tag_id)) {
307
+		if (!isset($tag_id)) {
308 308
 			return false;
309 309
 		}		
310 310
 		$adb = PearDatabase::getInstance();
@@ -312,7 +312,7 @@  discard block
 block discarded – undo
312 312
 		$where = "id = ? ";
313 313
 		$params = array($tag_id);
314 314
 		
315
-		if(isset($tagger_id) && ($tagger_id > 0)) {
315
+		if (isset($tagger_id) && ($tagger_id > 0)) {
316 316
 			$where .= "AND tagger_id = ?";
317 317
 			array_push($params, $tagger_id);
318 318
 		} 
@@ -353,19 +353,19 @@  discard block
 block discarded – undo
353 353
 	 *	 - 'tagger_id' => The unique ID of the person who tagged the object with this tag.
354 354
 	 */ 
355 355
 	public function get_tags_on_object($object_id, $offset = 0, $limit = 10, $tagger_id = NULL) {
356
-		if(!isset($object_id)) {
356
+		if (!isset($object_id)) {
357 357
 			return false;
358 358
 		}	
359 359
 		
360 360
 		$where = "object_id = ? ";
361 361
 		$params = array($object_id);
362 362
 			
363
-		if(isset($tagger_id) && ($tagger_id > 0)) {
363
+		if (isset($tagger_id) && ($tagger_id > 0)) {
364 364
 			$where .= "AND tagger_id = ? ";
365 365
 			array_push($params, $tagger_id);
366 366
 		} 
367 367
 
368
-		if($limit <= 0) {
368
+		if ($limit <= 0) {
369 369
 			$limit_sql = "";
370 370
 		} else {
371 371
 			$limit_sql = "LIMIT $offset, $limit";
@@ -410,7 +410,7 @@  discard block
 block discarded – undo
410 410
 	 */ 
411 411
 
412 412
 	public function safe_tag($tagger_id, $object_id, $tag, $module) {
413
-		if(!isset($tagger_id)||!isset($object_id)||!isset($tag)) {
413
+		if (!isset($tagger_id) || !isset($object_id) || !isset($tag)) {
414 414
 			die("safe_tag argument missing");
415 415
 			return false;
416 416
 		}
@@ -437,7 +437,7 @@  discard block
 block discarded – undo
437 437
 			
438 438
 		array_push($params, $object_id, $normalized_tag);
439 439
 		$rs = $adb->pquery($sql, $params);
440
-		if($rs->fields['count'] > 0) {
440
+		if ($rs->fields['count'] > 0) {
441 441
 			return true;
442 442
 		}
443 443
 		// Then see if a raw tag in this form exists.
@@ -446,7 +446,7 @@  discard block
 block discarded – undo
446 446
 			WHERE raw_tag = ? ";
447 447
 		$rs = $adb->pquery($sql, array($tag));
448 448
 		$row = $adb->fetch_array($rs);
449
-		if($row) {
449
+		if ($row) {
450 450
 			$tag_id = $row['id'];
451 451
 		} else {
452 452
 			// Add new tag! 
@@ -456,7 +456,7 @@  discard block
 block discarded – undo
456 456
 			$rs = $adb->pquery($sql, $params);
457 457
 			
458 458
 		}
459
-		if(!($tag_id > 0)) {
459
+		if (!($tag_id > 0)) {
460 460
 			return false;
461 461
 		}
462 462
 		$sql = "INSERT INTO ${prefix}freetagged_objects
@@ -513,14 +513,14 @@  discard block
 block discarded – undo
513 513
 	 * @return string Returns the tag in normalized form.
514 514
 	 */ 
515 515
 	public function delete_object_tag($tagger_id, $object_id, $tag) {
516
-		if(!isset($tagger_id)||!isset($object_id)||!isset($tag)) {
516
+		if (!isset($tagger_id) || !isset($object_id) || !isset($tag)) {
517 517
 			die("delete_object_tag argument missing");
518 518
 			return false;
519 519
 		}
520 520
 		$adb = PearDatabase::getInstance();
521 521
 		$tag_id = $this->get_raw_tag_id($tag);
522 522
 		$prefix = $this->_table_prefix;
523
-		if($tag_id > 0) {
523
+		if ($tag_id > 0) {
524 524
 
525 525
 			$sql = "DELETE FROM ${prefix}freetagged_objects
526 526
 				WHERE tagger_id = ? && object_id = ? && tag_id = ? LIMIT 1";
@@ -547,7 +547,7 @@  discard block
 block discarded – undo
547 547
 	public function delete_all_object_tags($object_id) {
548 548
 		$adb = PearDatabase::getInstance();
549 549
 		$prefix = $this->_table_prefix;
550
-		if($object_id > 0) {
550
+		if ($object_id > 0) {
551 551
 			$sql = "DELETE FROM ${prefix}freetagged_objects
552 552
 				WHERE object_id = ? ";	
553 553
 				$rs = $adb->pquery($sql, array($object_id));	
@@ -574,13 +574,13 @@  discard block
 block discarded – undo
574 574
 	 */ 
575 575
 
576 576
 	public function delete_all_object_tags_for_user($tagger_id, $object_id) {
577
-		if(!isset($tagger_id)||!isset($object_id)) {
577
+		if (!isset($tagger_id) || !isset($object_id)) {
578 578
 			die("delete_all_object_tags_for_user argument missing");
579 579
 			return false;
580 580
 		}
581 581
 		$adb = PearDatabase::getInstance();
582 582
 		$prefix = $this->_table_prefix;
583
-		if($object_id > 0) {
583
+		if ($object_id > 0) {
584 584
 
585 585
 			$sql = "DELETE FROM ${prefix}freetagged_objects
586 586
 				WHERE tagger_id = ? && object_id = ?";	
@@ -604,7 +604,7 @@  discard block
 block discarded – undo
604 604
 	 * @return string Returns the tag in normalized form.
605 605
 	 */ 
606 606
 	public function get_tag_id($tag) {
607
-		if(!isset($tag)) {
607
+		if (!isset($tag)) {
608 608
 			die("get_tag_id argument missing");
609 609
 			return false;
610 610
 		}
@@ -632,7 +632,7 @@  discard block
 block discarded – undo
632 632
 	 */ 
633 633
 
634 634
 	public function get_raw_tag_id($tag) {
635
-		if(!isset($tag)) {
635
+		if (!isset($tag)) {
636 636
 			die("get_tag_id argument missing");
637 637
 			return false;
638 638
 		}
@@ -665,7 +665,7 @@  discard block
 block discarded – undo
665 665
 	 * @return string Returns the tag in normalized form.
666 666
 	 */
667 667
 	public function tag_object($tagger_id, $object_id, $tag_string, $module, $skip_updates = 1) {
668
-		if($tag_string == '') {
668
+		if ($tag_string == '') {
669 669
 			// If an empty string was passed, just return true, don't die.
670 670
 			// die("Empty tag string passed");
671 671
 			return true;
@@ -706,10 +706,10 @@  discard block
 block discarded – undo
706 706
 	 * @return boolean True if successful, false otherwise.
707 707
 	 */
708 708
 	public function _tag_object_array($tagger_id, $object_id, $tagArray, $module) {
709
-		foreach($tagArray as $tag) {
709
+		foreach ($tagArray as $tag) {
710 710
 			$tag = trim($tag);
711
-			if(($tag != '') && (strlen($tag) <= $this->_MAX_TAG_LENGTH)) {
712
-				if(get_magic_quotes_gpc()) {
711
+			if (($tag != '') && (strlen($tag) <= $this->_MAX_TAG_LENGTH)) {
712
+				if (get_magic_quotes_gpc()) {
713 713
 					$tag = addslashes($tag);
714 714
 				}
715 715
 				$this->safe_tag($tagger_id, $object_id, $tag, $module);
@@ -735,12 +735,12 @@  discard block
 block discarded – undo
735 735
 			return $newwords;
736 736
 		}
737 737
 		# Perform tag parsing
738
-		if(get_magic_quotes_gpc()) {
738
+		if (get_magic_quotes_gpc()) {
739 739
 			$query = stripslashes(trim($tag_string));
740 740
 		} else {
741 741
 			$query = trim($tag_string);
742 742
 		}
743
-		$words = preg_split('/(")/', $query,-1,PREG_SPLIT_NO_EMPTY|PREG_SPLIT_DELIM_CAPTURE);
743
+		$words = preg_split('/(")/', $query, -1, PREG_SPLIT_NO_EMPTY | PREG_SPLIT_DELIM_CAPTURE);
744 744
 		$delim = 0;
745 745
 		foreach ($words as $key => $word)
746 746
 		{
@@ -786,7 +786,7 @@  discard block
 block discarded – undo
786 786
 	public function get_most_popular_tags($tagger_id = NULL, $offset = 0, $limit = 25) {
787 787
 		$adb = PearDatabase::getInstance();
788 788
 		$params = array();
789
-		if(isset($tagger_id) && ($tagger_id > 0)) {
789
+		if (isset($tagger_id) && ($tagger_id > 0)) {
790 790
 			$tagger_sql = "AND tagger_id = ?";
791 791
 			array_push($params, $tagger_id);
792 792
 		} else {
@@ -830,7 +830,7 @@  discard block
 block discarded – undo
830 830
 	public function count_tags($tagger_id = NULL) {
831 831
 		$adb = PearDatabase::getInstance();
832 832
 		$params = array();
833
-		if(isset($tagger_id) && ($tagger_id > 0)) {
833
+		if (isset($tagger_id) && ($tagger_id > 0)) {
834 834
 			$tagger_sql = "AND tagger_id = ?";
835 835
 			array_push($params, $tagger_id);
836 836
 		} else {
@@ -874,11 +874,11 @@  discard block
 block discarded – undo
874 874
 	 * @return string Returns an HTML snippet that can be used directly as a tag cloud.
875 875
 	 */
876 876
 
877
-	public function get_tag_cloud_html($module="",$tagger_id = NULL,$obj_id= NULL,$num_tags = 100, $min_font_size = 10, $max_font_size = 20, $font_units = 'px', $span_class = '', $tag_page_url = '/tag/') {
877
+	public function get_tag_cloud_html($module = "", $tagger_id = NULL, $obj_id = NULL, $num_tags = 100, $min_font_size = 10, $max_font_size = 20, $font_units = 'px', $span_class = '', $tag_page_url = '/tag/') {
878 878
 		global $theme;
879
-		$theme_path="themes/".$theme."/";
880
-		$image_path=$theme_path."images/";	
881
-		$tag_list = $this->get_tag_cloud_tags($num_tags, $tagger_id,$module,$obj_id);
879
+		$theme_path = "themes/" . $theme . "/";
880
+		$image_path = $theme_path . "images/";	
881
+		$tag_list = $this->get_tag_cloud_tags($num_tags, $tagger_id, $module, $obj_id);
882 882
 		if (count($tag_list[0])) {
883 883
 			// Get the maximum qty of tagged objects in the set
884 884
 			$max_qty = max(array_values($tag_list[0]));
@@ -894,7 +894,7 @@  discard block
 block discarded – undo
894 894
 		if (0 == $spread) { // Divide by zero
895 895
 			$spread = 1;
896 896
 		}
897
-		$step = ($max_font_size - $min_font_size)/($spread);
897
+		$step = ($max_font_size - $min_font_size) / ($spread);
898 898
 
899 899
 		// Since the original tag_list is alphabetically ordered,
900 900
 		// we can now create the tag cloud by just putting a span
@@ -902,18 +902,18 @@  discard block
 block discarded – undo
902 902
 		// by $step.
903 903
 		$cloud_html = '';
904 904
 		$cloud_spans = array();
905
-		if($module =='')
905
+		if ($module == '')
906 906
 			$module = 'All';
907
-		if($module != 'All') {
907
+		if ($module != 'All') {
908 908
 			foreach ($tag_list[0] as $tag => $qty) {
909 909
 				$size = $min_font_size + ($qty - $min_qty) * $step;
910
-				$cloud_span[] = '<span id="tag_'.$tag_list[1][$tag].'" class="' . $span_class . '" onMouseOver=$("tagspan_'.$tag_list[1][$tag].'").style.display="inline"; onMouseOut=$("tagspan_'.$tag_list[1][$tag].'").style.display="none";><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module='.$module.'&search_tag=tag_search&query_string='. urlencode($tag) . '" style="font-size: '. $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a><span class="'. $span_class .'" id="tagspan_'.$tag_list[1][$tag].'" style="display:none;cursor:pointer;" onClick="DeleteTag('.$tag_list[1][$tag].','.$obj_id.');"><img src="' . vtiger_imageurl('del_tag.gif', $theme) . '"></span></span>';
910
+				$cloud_span[] = '<span id="tag_' . $tag_list[1][$tag] . '" class="' . $span_class . '" onMouseOver=$("tagspan_' . $tag_list[1][$tag] . '").style.display="inline"; onMouseOut=$("tagspan_' . $tag_list[1][$tag] . '").style.display="none";><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module=' . $module . '&search_tag=tag_search&query_string=' . urlencode($tag) . '" style="font-size: ' . $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a><span class="' . $span_class . '" id="tagspan_' . $tag_list[1][$tag] . '" style="display:none;cursor:pointer;" onClick="DeleteTag(' . $tag_list[1][$tag] . ',' . $obj_id . ');"><img src="' . vtiger_imageurl('del_tag.gif', $theme) . '"></span></span>';
911 911
 
912 912
 			}
913 913
 		} else {
914
-			foreach($tag_list[0] as $tag => $qty) {
914
+			foreach ($tag_list[0] as $tag => $qty) {
915 915
 				$size = $min_font_size + ($qty - $min_qty) * $step;
916
-				$cloud_span[] = '<span class="' . $span_class . '"><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module='.$module.'&search_tag=tag_search&query_string='. urlencode($tag) . '" style="font-size: '. $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a></span>';
916
+				$cloud_span[] = '<span class="' . $span_class . '"><a class="tagit" href="index.php?module=Home&action=UnifiedSearch&search_module=' . $module . '&search_tag=tag_search&query_string=' . urlencode($tag) . '" style="font-size: ' . $size . $font_units . '">' . htmlspecialchars(stripslashes($tag)) . '</a></span>';
917 917
 			}
918 918
 		}
919 919
 		$cloud_html = join("\n ", $cloud_span);
@@ -938,24 +938,24 @@  discard block
 block discarded – undo
938 938
 	 * values are numeric quantity of objects tagged with that tag.
939 939
 	 */
940 940
 
941
-	public function get_tag_cloud_tags($max = 100, $tagger_id = NULL,$module = "",$obj_id = NULL) {
941
+	public function get_tag_cloud_tags($max = 100, $tagger_id = NULL, $module = "", $obj_id = NULL) {
942 942
 		$adb = PearDatabase::getInstance();
943 943
 		$params = array();
944
-		if(isset($tagger_id) && ($tagger_id > 0)) {
944
+		if (isset($tagger_id) && ($tagger_id > 0)) {
945 945
 			$tagger_sql = " && tagger_id = ?";
946 946
 			array_push($params, $tagger_id);
947 947
 		} else {
948 948
 			$tagger_sql = "";
949 949
 		}
950 950
 
951
-		if($module != "") {
951
+		if ($module != "") {
952 952
 			$tagger_sql .= " && module = ?";
953 953
 			array_push($params, $module);
954 954
 		} else {
955 955
 			$tagger_sql .= "";
956 956
 		}
957 957
 
958
-		if(isset($obj_id) && $obj_id > 0) {
958
+		if (isset($obj_id) && $obj_id > 0) {
959 959
   			$tagger_sql .= " && object_id = ?";
960 960
 			array_push($params, $obj_id);
961 961
 		} else {
@@ -978,10 +978,10 @@  discard block
 block discarded – undo
978 978
 			$retarr[$row['tag']] = $row['quantity'];
979 979
 			$retarr1[$row['tag']] = $row['tag_id'];
980 980
 		}
981
-		if($retarr) ksort($retarr);
982
-		if($retarr1) ksort($retarr1);
983
-		$return_value[]=$retarr;
984
-		$return_value[]=$retarr1;
981
+		if ($retarr) ksort($retarr);
982
+		if ($retarr1) ksort($retarr1);
983
+		$return_value[] = $retarr;
984
+		$return_value[] = $retarr1;
985 985
 		return $return_value;
986 986
 
987 987
 	}
@@ -1014,7 +1014,7 @@  discard block
 block discarded – undo
1014 1014
 
1015 1015
 	public function similar_tags($tag, $max = 100) {
1016 1016
 		$retarr = array();
1017
-		if(!isset($tag)) {
1017
+		if (!isset($tag)) {
1018 1018
 			return $retarr;
1019 1019
 		}
1020 1020
 		$adb = PearDatabase::getInstance();
@@ -1103,7 +1103,7 @@  discard block
 block discarded – undo
1103 1103
 		$sql = "SELECT matches.object_id, COUNT( matches.object_id ) AS num_common_tags
1104 1104
 			FROM ${prefix}freetagged_objects as matches
1105 1105
 			INNER JOIN ${prefix}freetags as tags ON ( tags.id = matches.tag_id )
1106
-			WHERE tags.tag IN (". generateQuestionMarks($tagArray) .")
1106
+			WHERE tags.tag IN (" . generateQuestionMarks($tagArray) . ")
1107 1107
 			GROUP BY matches.object_id
1108 1108
 			HAVING num_common_tags >= ?
1109 1109
 			ORDER BY num_common_tags DESC
@@ -1111,7 +1111,7 @@  discard block
 block discarded – undo
1111 1111
 
1112 1112
 		$rs = $adb->pquery($sql, array($tagArray, $threshold, $max_objects));
1113 1113
 		while ($row = $adb->fetch_array($rs)) {
1114
-			$retarr[] = array (
1114
+			$retarr[] = array(
1115 1115
 				'object_id' => $row['object_id'],
1116 1116
 				'strength' => ($row['num_common_tags'] / $numTags)
1117 1117
 				);
Please login to merge, or discard this patch.
Braces   +12 added lines, -5 removed lines patch added patch discarded remove patch
@@ -427,7 +427,9 @@  discard block
 block discarded – undo
427 427
 		if ($this->_block_multiuser_tag_on_object == 0) {
428 428
 			$tagger_sql = " && tagger_id = ? ";
429 429
 			array_push($params, $tagger_id);
430
-		} else $tagger_sql = "";
430
+		} else {
431
+			$tagger_sql = "";
432
+		}
431 433
 		$sql = "SELECT COUNT(*) as count 
432 434
 			FROM ${prefix}freetagged_objects INNER JOIN ${prefix}freetags ON (tag_id = id)
433 435
 			WHERE 1=1 
@@ -902,8 +904,9 @@  discard block
 block discarded – undo
902 904
 		// by $step.
903 905
 		$cloud_html = '';
904 906
 		$cloud_spans = array();
905
-		if($module =='')
906
-			$module = 'All';
907
+		if($module =='') {
908
+					$module = 'All';
909
+		}
907 910
 		if($module != 'All') {
908 911
 			foreach ($tag_list[0] as $tag => $qty) {
909 912
 				$size = $min_font_size + ($qty - $min_qty) * $step;
@@ -978,8 +981,12 @@  discard block
 block discarded – undo
978 981
 			$retarr[$row['tag']] = $row['quantity'];
979 982
 			$retarr1[$row['tag']] = $row['tag_id'];
980 983
 		}
981
-		if($retarr) ksort($retarr);
982
-		if($retarr1) ksort($retarr1);
984
+		if($retarr) {
985
+			ksort($retarr);
986
+		}
987
+		if($retarr1) {
988
+			ksort($retarr1);
989
+		}
983 990
 		$return_value[]=$retarr;
984 991
 		$return_value[]=$retarr1;
985 992
 		return $return_value;
Please login to merge, or discard this patch.
libraries/nusoap/class.nusoap_base.php 3 patches
Doc Comments   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -306,7 +306,7 @@  discard block
 block discarded – undo
306 306
 	/**
307 307
 	* gets the current debug data for this instance
308 308
 	*
309
-	* @return   debug data
309
+	* @return   string data
310 310
 	* @access   public
311 311
 	*/
312 312
 	public function &getDebug() {
@@ -319,7 +319,7 @@  discard block
 block discarded – undo
319 319
 	* gets the current debug data for this instance as an XML comment
320 320
 	* this may change the contents of the debug data
321 321
 	*
322
-	* @return   debug data as an XML comment
322
+	* @return   string data as an XML comment
323 323
 	* @access   public
324 324
 	*/
325 325
 	public function &getDebugAsXMLComment() {
@@ -352,7 +352,7 @@  discard block
 block discarded – undo
352 352
 	/**
353 353
 	* returns error string if present
354 354
 	*
355
-	* @return   mixed error string or false
355
+	* @return   string|false error string or false
356 356
 	* @access   public
357 357
 	*/
358 358
 	public function getError(){
@@ -365,7 +365,7 @@  discard block
 block discarded – undo
365 365
 	/**
366 366
 	* sets error string
367 367
 	*
368
-	* @return   boolean $string error string
368
+	* @return   boolean|null $string error string
369 369
 	* @access   private
370 370
 	*/
371 371
 	public function setError($str){
@@ -800,7 +800,7 @@  discard block
 block discarded – undo
800 800
     * returns false, if not prefixed
801 801
     *
802 802
     * @param string $str The prefixed string
803
-    * @return mixed The prefix or false if there is no prefix
803
+    * @return string|false The prefix or false if there is no prefix
804 804
     * @access public
805 805
     */
806 806
 	public function getPrefix($str){
@@ -830,7 +830,7 @@  discard block
 block discarded – undo
830 830
     * or false if no prefixes registered for the given namespace
831 831
     *
832 832
     * @param string $ns The namespace
833
-    * @return mixed The prefix, false if the namespace has no prefixes
833
+    * @return string The prefix, false if the namespace has no prefixes
834 834
     * @access public
835 835
     */
836 836
 	public function getPrefixFromNamespace($ns) {
@@ -896,7 +896,7 @@  discard block
 block discarded – undo
896 896
 *
897 897
 * @param    int $timestamp Unix time stamp
898 898
 * @param	boolean $utc Whether the time stamp is UTC or local
899
-* @return	mixed ISO 8601 date string or false
899
+* @return	string|false ISO 8601 date string or false
900 900
 * @access   public
901 901
 */
902 902
 function timestamp_to_iso8601($timestamp,$utc=true){
Please login to merge, or discard this patch.
Indentation   +244 added lines, -244 removed lines patch added patch discarded remove patch
@@ -104,21 +104,21 @@  discard block
 block discarded – undo
104 104
 	 * @access private
105 105
 	 */
106 106
 	var $revision = '$Revision: 1.57 $';
107
-    /**
108
-     * Current error string (manipulated by getError/setError)
107
+	/**
108
+	 * Current error string (manipulated by getError/setError)
109 109
 	 *
110 110
 	 * @var string
111 111
 	 * @access private
112 112
 	 */
113 113
 	var $error_str = '';
114
-    /**
115
-     * Current debug string (manipulated by debug/appendDebug/clearDebug/getDebug/getDebugAsXMLComment)
114
+	/**
115
+	 * Current debug string (manipulated by debug/appendDebug/clearDebug/getDebug/getDebugAsXMLComment)
116 116
 	 *
117 117
 	 * @var string
118 118
 	 * @access private
119 119
 	 */
120
-    var $debug_str = '';
121
-    /**
120
+	var $debug_str = '';
121
+	/**
122 122
 	 * toggles automatic encoding of special characters as entities
123 123
 	 * (should always be true, I think)
124 124
 	 *
@@ -134,31 +134,31 @@  discard block
 block discarded – undo
134 134
 	 */
135 135
 	var $debugLevel;
136 136
 
137
-    /**
138
-	* set schema version
139
-	*
140
-	* @var      string
141
-	* @access   public
142
-	*/
137
+	/**
138
+	 * set schema version
139
+	 *
140
+	 * @var      string
141
+	 * @access   public
142
+	 */
143 143
 	var $XMLSchemaVersion = 'http://www.w3.org/2001/XMLSchema';
144 144
 	
145
-    /**
146
-	* charset encoding for outgoing messages
147
-	*
148
-	* @var      string
149
-	* @access   public
150
-	*/
151
-    var $soap_defencoding = 'UTF-8';
145
+	/**
146
+	 * charset encoding for outgoing messages
147
+	 *
148
+	 * @var      string
149
+	 * @access   public
150
+	 */
151
+	var $soap_defencoding = 'UTF-8';
152 152
 	//var $soap_defencoding = 'UTF-8';
153 153
 
154 154
 	/**
155
-	* namespaces in an array of prefix => uri
156
-	*
157
-	* this is "seeded" by a set of constants, but it may be altered by code
158
-	*
159
-	* @var      array
160
-	* @access   public
161
-	*/
155
+	 * namespaces in an array of prefix => uri
156
+	 *
157
+	 * this is "seeded" by a set of constants, but it may be altered by code
158
+	 *
159
+	 * @var      array
160
+	 * @access   public
161
+	 */
162 162
 	var $namespaces = array(
163 163
 		'SOAP-ENV' => 'http://schemas.xmlsoap.org/soap/envelope/',
164 164
 		'xsd' => 'http://www.w3.org/2001/XMLSchema',
@@ -167,20 +167,20 @@  discard block
 block discarded – undo
167 167
 		);
168 168
 
169 169
 	/**
170
-	* namespaces used in the current context, e.g. during serialization
171
-	*
172
-	* @var      array
173
-	* @access   private
174
-	*/
170
+	 * namespaces used in the current context, e.g. during serialization
171
+	 *
172
+	 * @var      array
173
+	 * @access   private
174
+	 */
175 175
 	var $usedNamespaces = array();
176 176
 
177 177
 	/**
178
-	* XML Schema types in an array of uri => (array of xml type => php type)
179
-	* is this legacy yet?
180
-	* no, this is used by the nusoap_xmlschema class to verify type => namespace mappings.
181
-	* @var      array
182
-	* @access   public
183
-	*/
178
+	 * XML Schema types in an array of uri => (array of xml type => php type)
179
+	 * is this legacy yet?
180
+	 * no, this is used by the nusoap_xmlschema class to verify type => namespace mappings.
181
+	 * @var      array
182
+	 * @access   public
183
+	 */
184 184
 	var $typemap = array(
185 185
 	'http://www.w3.org/2001/XMLSchema' => array(
186 186
 		'string'=>'string','boolean'=>'boolean','float'=>'double','double'=>'double','decimal'=>'double',
@@ -203,75 +203,75 @@  discard block
 block discarded – undo
203 203
 		'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'),
204 204
 	'http://soapinterop.org/xsd' => array('SOAPStruct'=>'struct'),
205 205
 	'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string','array'=>'array','Array'=>'array'),
206
-    'http://xml.apache.org/xml-soap' => array('Map')
206
+	'http://xml.apache.org/xml-soap' => array('Map')
207 207
 	);
208 208
 
209 209
 	/**
210
-	* XML entities to convert
211
-	*
212
-	* @var      array
213
-	* @access   public
214
-	* @deprecated
215
-	* @see	expandEntities
216
-	*/
210
+	 * XML entities to convert
211
+	 *
212
+	 * @var      array
213
+	 * @access   public
214
+	 * @deprecated
215
+	 * @see	expandEntities
216
+	 */
217 217
 	var $xmlEntities = array('quot' => '"','amp' => '&',
218 218
 		'lt' => '<','gt' => '>','apos' => "'");
219 219
 
220 220
 	/**
221
-	* constructor
222
-	*
223
-	* @access	public
224
-	*/
221
+	 * constructor
222
+	 *
223
+	 * @access	public
224
+	 */
225 225
 	public function nusoap_base() {
226 226
 		$this->debugLevel = $GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel'];
227 227
 	}
228 228
 
229 229
 	/**
230
-	* gets the global debug level, which applies to future instances
231
-	*
232
-	* @return	integer	Debug level 0-9, where 0 turns off
233
-	* @access	public
234
-	*/
230
+	 * gets the global debug level, which applies to future instances
231
+	 *
232
+	 * @return	integer	Debug level 0-9, where 0 turns off
233
+	 * @access	public
234
+	 */
235 235
 	public function getGlobalDebugLevel() {
236 236
 		return $GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel'];
237 237
 	}
238 238
 
239 239
 	/**
240
-	* sets the global debug level, which applies to future instances
241
-	*
242
-	* @param	int	$level	Debug level 0-9, where 0 turns off
243
-	* @access	public
244
-	*/
240
+	 * sets the global debug level, which applies to future instances
241
+	 *
242
+	 * @param	int	$level	Debug level 0-9, where 0 turns off
243
+	 * @access	public
244
+	 */
245 245
 	public function setGlobalDebugLevel($level) {
246 246
 		$GLOBALS['_transient']['static']['nusoap_base']['globalDebugLevel'] = $level;
247 247
 	}
248 248
 
249 249
 	/**
250
-	* gets the debug level for this instance
251
-	*
252
-	* @return	int	Debug level 0-9, where 0 turns off
253
-	* @access	public
254
-	*/
250
+	 * gets the debug level for this instance
251
+	 *
252
+	 * @return	int	Debug level 0-9, where 0 turns off
253
+	 * @access	public
254
+	 */
255 255
 	public function getDebugLevel() {
256 256
 		return $this->debugLevel;
257 257
 	}
258 258
 
259 259
 	/**
260
-	* sets the debug level for this instance
261
-	*
262
-	* @param	int	$level	Debug level 0-9, where 0 turns off
263
-	* @access	public
264
-	*/
260
+	 * sets the debug level for this instance
261
+	 *
262
+	 * @param	int	$level	Debug level 0-9, where 0 turns off
263
+	 * @access	public
264
+	 */
265 265
 	public function setDebugLevel($level) {
266 266
 		$this->debugLevel = $level;
267 267
 	}
268 268
 
269 269
 	/**
270
-	* adds debug data to the instance debug string with formatting
271
-	*
272
-	* @param    string $string debug data
273
-	* @access   private
274
-	*/
270
+	 * adds debug data to the instance debug string with formatting
271
+	 *
272
+	 * @param    string $string debug data
273
+	 * @access   private
274
+	 */
275 275
 	public function debug($string){
276 276
 		if ($this->debugLevel > 0) {
277 277
 			$this->appendDebug($this->getmicrotime().' '.get_class($this).": $string\n");
@@ -279,11 +279,11 @@  discard block
 block discarded – undo
279 279
 	}
280 280
 
281 281
 	/**
282
-	* adds debug data to the instance debug string without formatting
283
-	*
284
-	* @param    string $string debug data
285
-	* @access   public
286
-	*/
282
+	 * adds debug data to the instance debug string without formatting
283
+	 *
284
+	 * @param    string $string debug data
285
+	 * @access   public
286
+	 */
287 287
 	public function appendDebug($string){
288 288
 		if ($this->debugLevel > 0) {
289 289
 			// it would be nice to use a memory stream here to use
@@ -293,10 +293,10 @@  discard block
 block discarded – undo
293 293
 	}
294 294
 
295 295
 	/**
296
-	* clears the current debug data for this instance
297
-	*
298
-	* @access   public
299
-	*/
296
+	 * clears the current debug data for this instance
297
+	 *
298
+	 * @access   public
299
+	 */
300 300
 	public function clearDebug() {
301 301
 		// it would be nice to use a memory stream here to use
302 302
 		// memory more efficiently
@@ -304,11 +304,11 @@  discard block
 block discarded – undo
304 304
 	}
305 305
 
306 306
 	/**
307
-	* gets the current debug data for this instance
308
-	*
309
-	* @return   debug data
310
-	* @access   public
311
-	*/
307
+	 * gets the current debug data for this instance
308
+	 *
309
+	 * @return   debug data
310
+	 * @access   public
311
+	 */
312 312
 	public function &getDebug() {
313 313
 		// it would be nice to use a memory stream here to use
314 314
 		// memory more efficiently
@@ -316,12 +316,12 @@  discard block
 block discarded – undo
316 316
 	}
317 317
 
318 318
 	/**
319
-	* gets the current debug data for this instance as an XML comment
320
-	* this may change the contents of the debug data
321
-	*
322
-	* @return   debug data as an XML comment
323
-	* @access   public
324
-	*/
319
+	 * gets the current debug data for this instance as an XML comment
320
+	 * this may change the contents of the debug data
321
+	 *
322
+	 * @return   debug data as an XML comment
323
+	 * @access   public
324
+	 */
325 325
 	public function &getDebugAsXMLComment() {
326 326
 		// it would be nice to use a memory stream here to use
327 327
 		// memory more efficiently
@@ -329,32 +329,32 @@  discard block
 block discarded – undo
329 329
 			$this->debug_str = str_replace('--', '- -', $this->debug_str);
330 330
 		}
331 331
 		$ret = "<!--\n" . $this->debug_str . "\n-->";
332
-    	return $ret;
332
+		return $ret;
333 333
 	}
334 334
 
335 335
 	/**
336
-	* expands entities, e.g. changes '<' to '&lt;'.
337
-	*
338
-	* @param	string	$val	The string in which to expand entities.
339
-	* @access	private
340
-	*/
336
+	 * expands entities, e.g. changes '<' to '&lt;'.
337
+	 *
338
+	 * @param	string	$val	The string in which to expand entities.
339
+	 * @access	private
340
+	 */
341 341
 	public function expandEntities($val) {
342 342
 		if ($this->charencoding) {
343
-	    	$val = str_replace('&', '&amp;', $val);
344
-	    	$val = str_replace("'", '&apos;', $val);
345
-	    	$val = str_replace('"', '&quot;', $val);
346
-	    	$val = str_replace('<', '&lt;', $val);
347
-	    	$val = str_replace('>', '&gt;', $val);
348
-	    }
349
-	    return $val;
343
+			$val = str_replace('&', '&amp;', $val);
344
+			$val = str_replace("'", '&apos;', $val);
345
+			$val = str_replace('"', '&quot;', $val);
346
+			$val = str_replace('<', '&lt;', $val);
347
+			$val = str_replace('>', '&gt;', $val);
348
+		}
349
+		return $val;
350 350
 	}
351 351
 
352 352
 	/**
353
-	* returns error string if present
354
-	*
355
-	* @return   mixed error string or false
356
-	* @access   public
357
-	*/
353
+	 * returns error string if present
354
+	 *
355
+	 * @return   mixed error string or false
356
+	 * @access   public
357
+	 */
358 358
 	public function getError(){
359 359
 		if($this->error_str != ''){
360 360
 			return $this->error_str;
@@ -363,24 +363,24 @@  discard block
 block discarded – undo
363 363
 	}
364 364
 
365 365
 	/**
366
-	* sets error string
367
-	*
368
-	* @return   boolean $string error string
369
-	* @access   private
370
-	*/
366
+	 * sets error string
367
+	 *
368
+	 * @return   boolean $string error string
369
+	 * @access   private
370
+	 */
371 371
 	public function setError($str){
372 372
 		$this->error_str = $str;
373 373
 	}
374 374
 
375 375
 	/**
376
-	* detect if array is a simple array or a struct (associative array)
377
-	*
378
-	* @param	mixed	$val	The PHP array
379
-	* @return	string	(arraySimple|arrayStruct)
380
-	* @access	private
381
-	*/
376
+	 * detect if array is a simple array or a struct (associative array)
377
+	 *
378
+	 * @param	mixed	$val	The PHP array
379
+	 * @return	string	(arraySimple|arrayStruct)
380
+	 * @access	private
381
+	 */
382 382
 	public function isArraySimpleOrStruct($val) {
383
-        $keyList = array_keys($val);
383
+		$keyList = array_keys($val);
384 384
 		foreach ($keyList as $keyListValue) {
385 385
 			if (!is_int($keyListValue)) {
386 386
 				return 'arrayStruct';
@@ -390,33 +390,33 @@  discard block
 block discarded – undo
390 390
 	}
391 391
 
392 392
 	/**
393
-	* serializes PHP values in accordance w/ section 5. Type information is
394
-	* not serialized if $use == 'literal'.
395
-	*
396
-	* @param	mixed	$val	The value to serialize
397
-	* @param	string	$name	The name (local part) of the XML element
398
-	* @param	string	$type	The XML schema type (local part) for the element
399
-	* @param	string	$name_ns	The namespace for the name of the XML element
400
-	* @param	string	$type_ns	The namespace for the type of the element
401
-	* @param	array	$attributes	The attributes to serialize as name=>value pairs
402
-	* @param	string	$use	The WSDL "use" (encoded|literal)
403
-	* @param	boolean	$soapval	Whether this is called from soapval.
404
-	* @return	string	The serialized element, possibly with child elements
405
-    * @access	public
406
-	*/
393
+	 * serializes PHP values in accordance w/ section 5. Type information is
394
+	 * not serialized if $use == 'literal'.
395
+	 *
396
+	 * @param	mixed	$val	The value to serialize
397
+	 * @param	string	$name	The name (local part) of the XML element
398
+	 * @param	string	$type	The XML schema type (local part) for the element
399
+	 * @param	string	$name_ns	The namespace for the name of the XML element
400
+	 * @param	string	$type_ns	The namespace for the type of the element
401
+	 * @param	array	$attributes	The attributes to serialize as name=>value pairs
402
+	 * @param	string	$use	The WSDL "use" (encoded|literal)
403
+	 * @param	boolean	$soapval	Whether this is called from soapval.
404
+	 * @return	string	The serialized element, possibly with child elements
405
+	 * @access	public
406
+	 */
407 407
 	public function serialize_val($val,$name=false,$type=false,$name_ns=false,$type_ns=false,$attributes=false,$use='encoded',$soapval=false) {
408 408
 		$this->debug("in serialize_val: name=$name, type=$type, name_ns=$name_ns, type_ns=$type_ns, use=$use, soapval=$soapval");
409 409
 		$this->appendDebug('value=' . $this->varDump($val));
410 410
 		$this->appendDebug('attributes=' . $this->varDump($attributes));
411 411
 		
412
-    	if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) {
413
-    		$this->debug("serialize_val: serialize soapval");
414
-        	$xml = $val->serialize($use);
412
+		if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) {
413
+			$this->debug("serialize_val: serialize soapval");
414
+			$xml = $val->serialize($use);
415 415
 			$this->appendDebug($val->getDebug());
416 416
 			$val->clearDebug();
417 417
 			$this->debug("serialize_val of soapval returning $xml");
418 418
 			return $xml;
419
-        }
419
+		}
420 420
 		// force valid name if necessary
421 421
 		if (is_numeric($name)) {
422 422
 			$name = '__numeric_' . $name;
@@ -425,7 +425,7 @@  discard block
 block discarded – undo
425 425
 		}
426 426
 		// if name has ns, add ns prefix to name
427 427
 		$xmlns = '';
428
-        if($name_ns){
428
+		if($name_ns){
429 429
 			$prefix = 'nu'.rand(1000,9999);
430 430
 			$name = $prefix.':'.$name;
431 431
 			$xmlns .= " xmlns:$prefix=\"$name_ns\"";
@@ -433,7 +433,7 @@  discard block
 block discarded – undo
433 433
 		// if type is prefixed, create type prefix
434 434
 		if($type_ns != '' && $type_ns == $this->namespaces['xsd']){
435 435
 			// need to fix this. shouldn't default to xsd if no ns specified
436
-		    // w/o checking against typemap
436
+			// w/o checking against typemap
437 437
 			$type_prefix = 'xsd';
438 438
 		} elseif($type_ns){
439 439
 			$type_prefix = 'ns'.rand(1000,9999);
@@ -448,12 +448,12 @@  discard block
 block discarded – undo
448 448
 		}
449 449
 		// serialize null value
450 450
 		if (is_null($val)) {
451
-    		$this->debug("serialize_val: serialize null");
451
+			$this->debug("serialize_val: serialize null");
452 452
 			if ($use == 'literal') {
453 453
 				$xml = "<$name$xmlns$atts/>";
454 454
 				$this->debug("serialize_val returning $xml");
455
-	        	return $xml;
456
-        	} else {
455
+				return $xml;
456
+			} else {
457 457
 				if (isset($type) && isset($type_prefix)) {
458 458
 					$type_str = " xsi:type=\"$type_prefix:$type\"";
459 459
 				} else {
@@ -461,41 +461,41 @@  discard block
 block discarded – undo
461 461
 				}
462 462
 				$xml = "<$name$xmlns$type_str$atts xsi:nil=\"true\"/>";
463 463
 				$this->debug("serialize_val returning $xml");
464
-	        	return $xml;
465
-        	}
464
+				return $xml;
465
+			}
466 466
 		}
467
-        // serialize if an xsd built-in primitive type
468
-        if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){
469
-    		$this->debug("serialize_val: serialize xsd built-in primitive type");
470
-        	if (is_bool($val)) {
471
-        		if ($type == 'boolean') {
472
-	        		$val = $val ? 'true' : 'false';
473
-	        	} elseif (! $val) {
474
-	        		$val = 0;
475
-	        	}
467
+		// serialize if an xsd built-in primitive type
468
+		if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){
469
+			$this->debug("serialize_val: serialize xsd built-in primitive type");
470
+			if (is_bool($val)) {
471
+				if ($type == 'boolean') {
472
+					$val = $val ? 'true' : 'false';
473
+				} elseif (! $val) {
474
+					$val = 0;
475
+				}
476 476
 			} else if (is_string($val)) {
477 477
 				$val = $this->expandEntities($val);
478 478
 			}
479 479
 			if ($use == 'literal') {
480 480
 				$xml = "<$name$xmlns$atts>$val</$name>";
481 481
 				$this->debug("serialize_val returning $xml");
482
-	        	return $xml;
483
-        	} else {
482
+				return $xml;
483
+			} else {
484 484
 				$xml = "<$name$xmlns xsi:type=\"xsd:$type\"$atts>$val</$name>";
485 485
 				$this->debug("serialize_val returning $xml");
486
-	        	return $xml;
487
-        	}
488
-        }
486
+				return $xml;
487
+			}
488
+		}
489 489
 		// detect type and serialize
490 490
 		$xml = '';
491 491
 		switch(true) {
492 492
 			case (is_bool($val) || $type == 'boolean'):
493 493
 		   		$this->debug("serialize_val: serialize boolean");
494
-        		if ($type == 'boolean') {
495
-	        		$val = $val ? 'true' : 'false';
496
-	        	} elseif (! $val) {
497
-	        		$val = 0;
498
-	        	}
494
+				if ($type == 'boolean') {
495
+					$val = $val ? 'true' : 'false';
496
+				} elseif (! $val) {
497
+					$val = 0;
498
+				}
499 499
 				if ($use == 'literal') {
500 500
 					$xml .= "<$name$xmlns$atts>$val</$name>";
501 501
 				} else {
@@ -529,12 +529,12 @@  discard block
 block discarded – undo
529 529
 				break;
530 530
 			case is_object($val):
531 531
 		   		$this->debug("serialize_val: serialize object");
532
-		    	if (get_class($val) == 'soapval') {
533
-		    		$this->debug("serialize_val: serialize soapval object");
534
-		        	$pXml = $val->serialize($use);
532
+				if (get_class($val) == 'soapval') {
533
+					$this->debug("serialize_val: serialize soapval object");
534
+					$pXml = $val->serialize($use);
535 535
 					$this->appendDebug($val->getDebug());
536 536
 					$val->clearDebug();
537
-		        } else {
537
+				} else {
538 538
 					if (! $name) {
539 539
 						$name = get_class($val);
540 540
 						$this->debug("In serialize_val, used class name $name as element name");
@@ -560,19 +560,19 @@  discard block
 block discarded – undo
560 560
 			case (is_array($val) || $type):
561 561
 				// detect if struct or array
562 562
 				$valueType = $this->isArraySimpleOrStruct($val);
563
-                if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){
563
+				if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){
564 564
 			   		$this->debug("serialize_val: serialize array");
565 565
 					$i = 0;
566 566
 					if(is_array($val) && count($val)> 0){
567 567
 						foreach($val as $v){
568
-	                    	if(is_object($v) && get_class($v) ==  'soapval'){
568
+							if(is_object($v) && get_class($v) ==  'soapval'){
569 569
 								$tt_ns = $v->type_ns;
570 570
 								$tt = $v->type;
571 571
 							} elseif (is_array($v)) {
572 572
 								$tt = $this->isArraySimpleOrStruct($v);
573 573
 							} else {
574 574
 								$tt = gettype($v);
575
-	                        }
575
+							}
576 576
 							$array_types[$tt] = 1;
577 577
 							$xml .= $this->serialize_val($v,'item',false,false,false,false,$use);
578 578
 							++$i;
@@ -655,19 +655,19 @@  discard block
 block discarded – undo
655 655
 		return $xml;
656 656
 	}
657 657
 
658
-    /**
659
-    * serializes a message
660
-    *
661
-    * @param string $body the XML of the SOAP body
662
-    * @param mixed $headers optional string of XML with SOAP header content, or array of soapval objects for SOAP headers, or associative array
663
-    * @param array $namespaces optional the namespaces used in generating the body and headers
664
-    * @param string $style optional (rpc|document)
665
-    * @param string $use optional (encoded|literal)
666
-    * @param string $encodingStyle optional (usually 'http://schemas.xmlsoap.org/soap/encoding/' for encoded)
667
-    * @return string the message
668
-    * @access public
669
-    */
670
-    public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){
658
+	/**
659
+	 * serializes a message
660
+	 *
661
+	 * @param string $body the XML of the SOAP body
662
+	 * @param mixed $headers optional string of XML with SOAP header content, or array of soapval objects for SOAP headers, or associative array
663
+	 * @param array $namespaces optional the namespaces used in generating the body and headers
664
+	 * @param string $style optional (rpc|document)
665
+	 * @param string $use optional (encoded|literal)
666
+	 * @param string $encodingStyle optional (usually 'http://schemas.xmlsoap.org/soap/encoding/' for encoded)
667
+	 * @return string the message
668
+	 * @access public
669
+	 */
670
+	public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){
671 671
 
672 672
 	$this->debug("In serializeEnvelope length=" . strlen($body) . " body (max 1000 characters)=" . substr($body, 0, 1000) . " style=$style use=$use encodingStyle=$encodingStyle");
673 673
 	$this->debug("headers:");
@@ -676,7 +676,7 @@  discard block
 block discarded – undo
676 676
 	$this->appendDebug($this->varDump($namespaces));
677 677
 
678 678
 	// serialize namespaces
679
-    $ns_string = '';
679
+	$ns_string = '';
680 680
 	foreach(array_merge($this->namespaces,$namespaces) as $k => $v){
681 681
 		$ns_string .= " xmlns:$k=\"$v\"";
682 682
 	}
@@ -709,7 +709,7 @@  discard block
 block discarded – undo
709 709
 		$body.
710 710
 	"</SOAP-ENV:Body>".
711 711
 	"</SOAP-ENV:Envelope>";
712
-    }
712
+	}
713 713
 
714 714
 	/**
715 715
 	 * formats a string to be inserted into an HTML stream
@@ -719,18 +719,18 @@  discard block
 block discarded – undo
719 719
 	 * @access public
720 720
 	 * @deprecated
721 721
 	 */
722
-    public function formatDump($str){
722
+	public function formatDump($str){
723 723
 		$str = htmlspecialchars($str);
724 724
 		return nl2br($str);
725
-    }
725
+	}
726 726
 
727 727
 	/**
728
-	* contracts (changes namespace to prefix) a qualified name
729
-	*
730
-	* @param    string $qname qname
731
-	* @return	string contracted qname
732
-	* @access   private
733
-	*/
728
+	 * contracts (changes namespace to prefix) a qualified name
729
+	 *
730
+	 * @param    string $qname qname
731
+	 * @return	string contracted qname
732
+	 * @access   private
733
+	 */
734 734
 	public function contractQname($qname){
735 735
 		// get element namespace
736 736
 		if (strrpos($qname, ':')) {
@@ -749,12 +749,12 @@  discard block
 block discarded – undo
749 749
 	}
750 750
 
751 751
 	/**
752
-	* expands (changes prefix to namespace) a qualified name
753
-	*
754
-	* @param    string $qname qname
755
-	* @return	string expanded qname
756
-	* @access   private
757
-	*/
752
+	 * expands (changes prefix to namespace) a qualified name
753
+	 *
754
+	 * @param    string $qname qname
755
+	 * @return	string expanded qname
756
+	 * @access   private
757
+	 */
758 758
 	public function expandQname($qname){
759 759
 		// get element prefix
760 760
 		if(strpos($qname,':') && !preg_match('/^http:\/\//',$qname)){
@@ -772,14 +772,14 @@  discard block
 block discarded – undo
772 772
 		}
773 773
 	}
774 774
 
775
-    /**
776
-    * returns the local part of a prefixed string
777
-    * returns the original string, if not prefixed
778
-    *
779
-    * @param string $str The prefixed string
780
-    * @return string The local part
781
-    * @access public
782
-    */
775
+	/**
776
+	 * returns the local part of a prefixed string
777
+	 * returns the original string, if not prefixed
778
+	 *
779
+	 * @param string $str The prefixed string
780
+	 * @return string The local part
781
+	 * @access public
782
+	 */
783 783
 	public function getLocalPart($str){
784 784
 		if($sstr = strrchr($str,':')){
785 785
 			// get unqualified name
@@ -790,13 +790,13 @@  discard block
 block discarded – undo
790 790
 	}
791 791
 
792 792
 	/**
793
-    * returns the prefix part of a prefixed string
794
-    * returns false, if not prefixed
795
-    *
796
-    * @param string $str The prefixed string
797
-    * @return mixed The prefix or false if there is no prefix
798
-    * @access public
799
-    */
793
+	 * returns the prefix part of a prefixed string
794
+	 * returns false, if not prefixed
795
+	 *
796
+	 * @param string $str The prefixed string
797
+	 * @return mixed The prefix or false if there is no prefix
798
+	 * @access public
799
+	 */
800 800
 	public function getPrefix($str){
801 801
 		if($pos = strrpos($str,':')){
802 802
 			// get prefix
@@ -806,12 +806,12 @@  discard block
 block discarded – undo
806 806
 	}
807 807
 
808 808
 	/**
809
-    * pass it a prefix, it returns a namespace
810
-    *
811
-    * @param string $prefix The prefix
812
-    * @return mixed The namespace, false if no namespace has the specified prefix
813
-    * @access public
814
-    */
809
+	 * pass it a prefix, it returns a namespace
810
+	 *
811
+	 * @param string $prefix The prefix
812
+	 * @return mixed The namespace, false if no namespace has the specified prefix
813
+	 * @access public
814
+	 */
815 815
 	public function getNamespaceFromPrefix($prefix){
816 816
 		if (isset($this->namespaces[$prefix])) {
817 817
 			return $this->namespaces[$prefix];
@@ -820,17 +820,17 @@  discard block
 block discarded – undo
820 820
 	}
821 821
 
822 822
 	/**
823
-    * returns the prefix for a given namespace (or prefix)
824
-    * or false if no prefixes registered for the given namespace
825
-    *
826
-    * @param string $ns The namespace
827
-    * @return mixed The prefix, false if the namespace has no prefixes
828
-    * @access public
829
-    */
823
+	 * returns the prefix for a given namespace (or prefix)
824
+	 * or false if no prefixes registered for the given namespace
825
+	 *
826
+	 * @param string $ns The namespace
827
+	 * @return mixed The prefix, false if the namespace has no prefixes
828
+	 * @access public
829
+	 */
830 830
 	public function getPrefixFromNamespace($ns) {
831 831
 		foreach ($this->namespaces as $p => $n) {
832 832
 			if ($ns == $n || $ns == $p) {
833
-			    $this->usedNamespaces[$p] = $n;
833
+				$this->usedNamespaces[$p] = $n;
834 834
 				return $p;
835 835
 			}
836 836
 		}
@@ -838,11 +838,11 @@  discard block
 block discarded – undo
838 838
 	}
839 839
 
840 840
 	/**
841
-    * returns the time in ODBC canonical form with microseconds
842
-    *
843
-    * @return string The time in ODBC canonical form with microseconds
844
-    * @access public
845
-    */
841
+	 * returns the time in ODBC canonical form with microseconds
842
+	 *
843
+	 * @return string The time in ODBC canonical form with microseconds
844
+	 * @access public
845
+	 */
846 846
 	public function getmicrotime() {
847 847
 		if (function_exists('gettimeofday')) {
848 848
 			$tod = gettimeofday();
@@ -862,7 +862,7 @@  discard block
 block discarded – undo
862 862
 	 * @return string The output of var_dump
863 863
 	 * @access public
864 864
 	 */
865
-    public function varDump($data) {
865
+	public function varDump($data) {
866 866
 		// <--------   YetiForce Sp. z o.o.   -------->
867 867
 		// original code:  	ob_start(); var_dump($data); $ret_val = ob_get_contents(); ob_end_clean();
868 868
 		$ret_val = var_export($data, true); 
@@ -871,11 +871,11 @@  discard block
 block discarded – undo
871 871
 	}
872 872
 
873 873
 	/**
874
-	* represents the object as a string
875
-	*
876
-	* @return	string
877
-	* @access   public
878
-	*/
874
+	 * represents the object as a string
875
+	 *
876
+	 * @return	string
877
+	 * @access   public
878
+	 */
879 879
 	public function __toString() {
880 880
 		return $this->varDump($this);
881 881
 	}
Please login to merge, or discard this patch.
Spacing   +120 added lines, -120 removed lines patch added patch discarded remove patch
@@ -183,26 +183,26 @@  discard block
 block discarded – undo
183 183
 	*/
184 184
 	var $typemap = array(
185 185
 	'http://www.w3.org/2001/XMLSchema' => array(
186
-		'string'=>'string','boolean'=>'boolean','float'=>'double','double'=>'double','decimal'=>'double',
187
-		'duration'=>'','dateTime'=>'string','time'=>'string','date'=>'string','gYearMonth'=>'',
188
-		'gYear'=>'','gMonthDay'=>'','gDay'=>'','gMonth'=>'','hexBinary'=>'string','base64Binary'=>'string',
186
+		'string'=>'string', 'boolean'=>'boolean', 'float'=>'double', 'double'=>'double', 'decimal'=>'double',
187
+		'duration'=>'', 'dateTime'=>'string', 'time'=>'string', 'date'=>'string', 'gYearMonth'=>'',
188
+		'gYear'=>'', 'gMonthDay'=>'', 'gDay'=>'', 'gMonth'=>'', 'hexBinary'=>'string', 'base64Binary'=>'string',
189 189
 		// abstract "any" types
190
-		'anyType'=>'string','anySimpleType'=>'string',
190
+		'anyType'=>'string', 'anySimpleType'=>'string',
191 191
 		// derived datatypes
192
-		'normalizedString'=>'string','token'=>'string','language'=>'','NMTOKEN'=>'','NMTOKENS'=>'','Name'=>'','NCName'=>'','ID'=>'',
193
-		'IDREF'=>'','IDREFS'=>'','ENTITY'=>'','ENTITIES'=>'','integer'=>'integer','nonPositiveInteger'=>'integer',
194
-		'negativeInteger'=>'integer','long'=>'integer','int'=>'integer','short'=>'integer','byte'=>'integer','nonNegativeInteger'=>'integer',
195
-		'unsignedLong'=>'','unsignedInt'=>'','unsignedShort'=>'','unsignedByte'=>'','positiveInteger'=>''),
192
+		'normalizedString'=>'string', 'token'=>'string', 'language'=>'', 'NMTOKEN'=>'', 'NMTOKENS'=>'', 'Name'=>'', 'NCName'=>'', 'ID'=>'',
193
+		'IDREF'=>'', 'IDREFS'=>'', 'ENTITY'=>'', 'ENTITIES'=>'', 'integer'=>'integer', 'nonPositiveInteger'=>'integer',
194
+		'negativeInteger'=>'integer', 'long'=>'integer', 'int'=>'integer', 'short'=>'integer', 'byte'=>'integer', 'nonNegativeInteger'=>'integer',
195
+		'unsignedLong'=>'', 'unsignedInt'=>'', 'unsignedShort'=>'', 'unsignedByte'=>'', 'positiveInteger'=>''),
196 196
 	'http://www.w3.org/2000/10/XMLSchema' => array(
197
-		'i4'=>'','int'=>'integer','boolean'=>'boolean','string'=>'string','double'=>'double',
198
-		'float'=>'double','dateTime'=>'string',
199
-		'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'),
197
+		'i4'=>'', 'int'=>'integer', 'boolean'=>'boolean', 'string'=>'string', 'double'=>'double',
198
+		'float'=>'double', 'dateTime'=>'string',
199
+		'timeInstant'=>'string', 'base64Binary'=>'string', 'base64'=>'string', 'ur-type'=>'array'),
200 200
 	'http://www.w3.org/1999/XMLSchema' => array(
201
-		'i4'=>'','int'=>'integer','boolean'=>'boolean','string'=>'string','double'=>'double',
202
-		'float'=>'double','dateTime'=>'string',
203
-		'timeInstant'=>'string','base64Binary'=>'string','base64'=>'string','ur-type'=>'array'),
201
+		'i4'=>'', 'int'=>'integer', 'boolean'=>'boolean', 'string'=>'string', 'double'=>'double',
202
+		'float'=>'double', 'dateTime'=>'string',
203
+		'timeInstant'=>'string', 'base64Binary'=>'string', 'base64'=>'string', 'ur-type'=>'array'),
204 204
 	'http://soapinterop.org/xsd' => array('SOAPStruct'=>'struct'),
205
-	'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string','array'=>'array','Array'=>'array'),
205
+	'http://schemas.xmlsoap.org/soap/encoding/' => array('base64'=>'string', 'array'=>'array', 'Array'=>'array'),
206 206
     'http://xml.apache.org/xml-soap' => array('Map')
207 207
 	);
208 208
 
@@ -214,8 +214,8 @@  discard block
 block discarded – undo
214 214
 	* @deprecated
215 215
 	* @see	expandEntities
216 216
 	*/
217
-	var $xmlEntities = array('quot' => '"','amp' => '&',
218
-		'lt' => '<','gt' => '>','apos' => "'");
217
+	var $xmlEntities = array('quot' => '"', 'amp' => '&',
218
+		'lt' => '<', 'gt' => '>', 'apos' => "'");
219 219
 
220 220
 	/**
221 221
 	* constructor
@@ -272,9 +272,9 @@  discard block
 block discarded – undo
272 272
 	* @param    string $string debug data
273 273
 	* @access   private
274 274
 	*/
275
-	public function debug($string){
275
+	public function debug($string) {
276 276
 		if ($this->debugLevel > 0) {
277
-			$this->appendDebug($this->getmicrotime().' '.get_class($this).": $string\n");
277
+			$this->appendDebug($this->getmicrotime() . ' ' . get_class($this) . ": $string\n");
278 278
 		}
279 279
 	}
280 280
 
@@ -284,7 +284,7 @@  discard block
 block discarded – undo
284 284
 	* @param    string $string debug data
285 285
 	* @access   public
286 286
 	*/
287
-	public function appendDebug($string){
287
+	public function appendDebug($string) {
288 288
 		if ($this->debugLevel > 0) {
289 289
 			// it would be nice to use a memory stream here to use
290 290
 			// memory more efficiently
@@ -355,8 +355,8 @@  discard block
 block discarded – undo
355 355
 	* @return   mixed error string or false
356 356
 	* @access   public
357 357
 	*/
358
-	public function getError(){
359
-		if($this->error_str != ''){
358
+	public function getError() {
359
+		if ($this->error_str != '') {
360 360
 			return $this->error_str;
361 361
 		}
362 362
 		return false;
@@ -368,7 +368,7 @@  discard block
 block discarded – undo
368 368
 	* @return   boolean $string error string
369 369
 	* @access   private
370 370
 	*/
371
-	public function setError($str){
371
+	public function setError($str) {
372 372
 		$this->error_str = $str;
373 373
 	}
374 374
 
@@ -404,12 +404,12 @@  discard block
 block discarded – undo
404 404
 	* @return	string	The serialized element, possibly with child elements
405 405
     * @access	public
406 406
 	*/
407
-	public function serialize_val($val,$name=false,$type=false,$name_ns=false,$type_ns=false,$attributes=false,$use='encoded',$soapval=false) {
407
+	public function serialize_val($val, $name = false, $type = false, $name_ns = false, $type_ns = false, $attributes = false, $use = 'encoded', $soapval = false) {
408 408
 		$this->debug("in serialize_val: name=$name, type=$type, name_ns=$name_ns, type_ns=$type_ns, use=$use, soapval=$soapval");
409 409
 		$this->appendDebug('value=' . $this->varDump($val));
410 410
 		$this->appendDebug('attributes=' . $this->varDump($attributes));
411 411
 		
412
-    	if (is_object($val) && get_class($val) == 'soapval' && (! $soapval)) {
412
+    	if (is_object($val) && get_class($val) == 'soapval' && (!$soapval)) {
413 413
     		$this->debug("serialize_val: serialize soapval");
414 414
         	$xml = $val->serialize($use);
415 415
 			$this->appendDebug($val->getDebug());
@@ -420,30 +420,30 @@  discard block
 block discarded – undo
420 420
 		// force valid name if necessary
421 421
 		if (is_numeric($name)) {
422 422
 			$name = '__numeric_' . $name;
423
-		} elseif (! $name) {
423
+		} elseif (!$name) {
424 424
 			$name = 'noname';
425 425
 		}
426 426
 		// if name has ns, add ns prefix to name
427 427
 		$xmlns = '';
428
-        if($name_ns){
429
-			$prefix = 'nu'.rand(1000,9999);
430
-			$name = $prefix.':'.$name;
428
+        if ($name_ns) {
429
+			$prefix = 'nu' . rand(1000, 9999);
430
+			$name = $prefix . ':' . $name;
431 431
 			$xmlns .= " xmlns:$prefix=\"$name_ns\"";
432 432
 		}
433 433
 		// if type is prefixed, create type prefix
434
-		if($type_ns != '' && $type_ns == $this->namespaces['xsd']){
434
+		if ($type_ns != '' && $type_ns == $this->namespaces['xsd']) {
435 435
 			// need to fix this. shouldn't default to xsd if no ns specified
436 436
 		    // w/o checking against typemap
437 437
 			$type_prefix = 'xsd';
438
-		} elseif($type_ns){
439
-			$type_prefix = 'ns'.rand(1000,9999);
438
+		} elseif ($type_ns) {
439
+			$type_prefix = 'ns' . rand(1000, 9999);
440 440
 			$xmlns .= " xmlns:$type_prefix=\"$type_ns\"";
441 441
 		}
442 442
 		// serialize attributes if present
443 443
 		$atts = '';
444
-		if($attributes){
445
-			foreach($attributes as $k => $v){
446
-				$atts .= " $k=\"".$this->expandEntities($v).'"';
444
+		if ($attributes) {
445
+			foreach ($attributes as $k => $v) {
446
+				$atts .= " $k=\"" . $this->expandEntities($v) . '"';
447 447
 			}
448 448
 		}
449 449
 		// serialize null value
@@ -465,12 +465,12 @@  discard block
 block discarded – undo
465 465
         	}
466 466
 		}
467 467
         // serialize if an xsd built-in primitive type
468
-        if($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])){
468
+        if ($type != '' && isset($this->typemap[$this->XMLSchemaVersion][$type])) {
469 469
     		$this->debug("serialize_val: serialize xsd built-in primitive type");
470 470
         	if (is_bool($val)) {
471 471
         		if ($type == 'boolean') {
472 472
 	        		$val = $val ? 'true' : 'false';
473
-	        	} elseif (! $val) {
473
+	        	} elseif (!$val) {
474 474
 	        		$val = 0;
475 475
 	        	}
476 476
 			} else if (is_string($val)) {
@@ -488,12 +488,12 @@  discard block
 block discarded – undo
488 488
         }
489 489
 		// detect type and serialize
490 490
 		$xml = '';
491
-		switch(true) {
491
+		switch (true) {
492 492
 			case (is_bool($val) || $type == 'boolean'):
493 493
 		   		$this->debug("serialize_val: serialize boolean");
494 494
         		if ($type == 'boolean') {
495 495
 	        		$val = $val ? 'true' : 'false';
496
-	        	} elseif (! $val) {
496
+	        	} elseif (!$val) {
497 497
 	        		$val = 0;
498 498
 	        	}
499 499
 				if ($use == 'literal') {
@@ -510,7 +510,7 @@  discard block
 block discarded – undo
510 510
 					$xml .= "<$name$xmlns xsi:type=\"xsd:int\"$atts>$val</$name>";
511 511
 				}
512 512
 				break;
513
-			case (is_float($val)|| is_double($val) || $type == 'float'):
513
+			case (is_float($val) || is_double($val) || $type == 'float'):
514 514
 		   		$this->debug("serialize_val: serialize float");
515 515
 				if ($use == 'literal') {
516 516
 					$xml .= "<$name$xmlns$atts>$val</$name>";
@@ -535,17 +535,17 @@  discard block
 block discarded – undo
535 535
 					$this->appendDebug($val->getDebug());
536 536
 					$val->clearDebug();
537 537
 		        } else {
538
-					if (! $name) {
538
+					if (!$name) {
539 539
 						$name = get_class($val);
540 540
 						$this->debug("In serialize_val, used class name $name as element name");
541 541
 					} else {
542 542
 						$this->debug("In serialize_val, do not override name $name for element name for class " . get_class($val));
543 543
 					}
544
-					foreach(get_object_vars($val) as $k => $v){
545
-						$pXml = isset($pXml) ? $pXml.$this->serialize_val($v,$k,false,false,false,false,$use) : $this->serialize_val($v,$k,false,false,false,false,$use);
544
+					foreach (get_object_vars($val) as $k => $v) {
545
+						$pXml = isset($pXml) ? $pXml . $this->serialize_val($v, $k, false, false, false, false, $use) : $this->serialize_val($v, $k, false, false, false, false, $use);
546 546
 					}
547 547
 				}
548
-				if(isset($type) && isset($type_prefix)){
548
+				if (isset($type) && isset($type_prefix)) {
549 549
 					$type_str = " xsi:type=\"$type_prefix:$type\"";
550 550
 				} else {
551 551
 					$type_str = '';
@@ -560,12 +560,12 @@  discard block
 block discarded – undo
560 560
 			case (is_array($val) || $type):
561 561
 				// detect if struct or array
562 562
 				$valueType = $this->isArraySimpleOrStruct($val);
563
-                if($valueType=='arraySimple' || preg_match('/^ArrayOf/',$type)){
563
+                if ($valueType == 'arraySimple' || preg_match('/^ArrayOf/', $type)) {
564 564
 			   		$this->debug("serialize_val: serialize array");
565 565
 					$i = 0;
566
-					if(is_array($val) && count($val)> 0){
567
-						foreach($val as $v){
568
-	                    	if(is_object($v) && get_class($v) ==  'soapval'){
566
+					if (is_array($val) && count($val) > 0) {
567
+						foreach ($val as $v) {
568
+	                    	if (is_object($v) && get_class($v) == 'soapval') {
569 569
 								$tt_ns = $v->type_ns;
570 570
 								$tt = $v->type;
571 571
 							} elseif (is_array($v)) {
@@ -574,23 +574,23 @@  discard block
 block discarded – undo
574 574
 								$tt = gettype($v);
575 575
 	                        }
576 576
 							$array_types[$tt] = 1;
577
-							$xml .= $this->serialize_val($v,'item',false,false,false,false,$use);
577
+							$xml .= $this->serialize_val($v, 'item', false, false, false, false, $use);
578 578
 							++$i;
579 579
 						}
580
-						if(count($array_types) > 1){
580
+						if (count($array_types) > 1) {
581 581
 							$array_typename = 'xsd:anyType';
582
-						} elseif(isset($tt) && isset($this->typemap[$this->XMLSchemaVersion][$tt])) {
582
+						} elseif (isset($tt) && isset($this->typemap[$this->XMLSchemaVersion][$tt])) {
583 583
 							if ($tt == 'integer') {
584 584
 								$tt = 'int';
585 585
 							}
586
-							$array_typename = 'xsd:'.$tt;
587
-						} elseif(isset($tt) && $tt == 'arraySimple'){
586
+							$array_typename = 'xsd:' . $tt;
587
+						} elseif (isset($tt) && $tt == 'arraySimple') {
588 588
 							$array_typename = 'SOAP-ENC:Array';
589
-						} elseif(isset($tt) && $tt == 'arrayStruct'){
589
+						} elseif (isset($tt) && $tt == 'arrayStruct') {
590 590
 							$array_typename = 'unnamed_struct_use_soapval';
591 591
 						} else {
592 592
 							// if type is prefixed, create type prefix
593
-							if ($tt_ns != '' && $tt_ns == $this->namespaces['xsd']){
593
+							if ($tt_ns != '' && $tt_ns == $this->namespaces['xsd']) {
594 594
 								 $array_typename = 'xsd:' . $tt;
595 595
 							} elseif ($tt_ns) {
596 596
 								$tt_prefix = 'ns' . rand(1000, 9999);
@@ -606,7 +606,7 @@  discard block
 block discarded – undo
606 606
 						} else if (isset($type) && isset($type_prefix)) {
607 607
 							$type_str = " xsi:type=\"$type_prefix:$type\"";
608 608
 						} else {
609
-							$type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"".$array_typename."[$array_type]\"";
609
+							$type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"" . $array_typename . "[$array_type]\"";
610 610
 						}
611 611
 					// empty array
612 612
 					} else {
@@ -618,11 +618,11 @@  discard block
 block discarded – undo
618 618
 							$type_str = " xsi:type=\"SOAP-ENC:Array\" SOAP-ENC:arrayType=\"xsd:anyType[0]\"";
619 619
 						}
620 620
 					}
621
-					$xml = "<$name$xmlns$type_str$atts>".$xml."</$name>";
621
+					$xml = "<$name$xmlns$type_str$atts>" . $xml . "</$name>";
622 622
 				} else {
623 623
 					// got a struct
624 624
 			   		$this->debug("serialize_val: serialize struct");
625
-					if(isset($type) && isset($type_prefix)){
625
+					if (isset($type) && isset($type_prefix)) {
626 626
 						$type_str = " xsi:type=\"$type_prefix:$type\"";
627 627
 					} else {
628 628
 						$type_str = '';
@@ -632,15 +632,15 @@  discard block
 block discarded – undo
632 632
 					} else {
633 633
 						$xml .= "<$name$xmlns$type_str$atts>";
634 634
 					}
635
-					foreach($val as $k => $v){
635
+					foreach ($val as $k => $v) {
636 636
 						// Apache Map
637 637
 						if ($type == 'Map' && $type_ns == 'http://xml.apache.org/xml-soap') {
638 638
 							$xml .= '<item>';
639
-							$xml .= $this->serialize_val($k,'key',false,false,false,false,$use);
640
-							$xml .= $this->serialize_val($v,'value',false,false,false,false,$use);
639
+							$xml .= $this->serialize_val($k, 'key', false, false, false, false, $use);
640
+							$xml .= $this->serialize_val($v, 'value', false, false, false, false, $use);
641 641
 							$xml .= '</item>';
642 642
 						} else {
643
-							$xml .= $this->serialize_val($v,$k,false,false,false,false,$use);
643
+							$xml .= $this->serialize_val($v, $k, false, false, false, false, $use);
644 644
 						}
645 645
 					}
646 646
 					$xml .= "</$name>";
@@ -648,7 +648,7 @@  discard block
 block discarded – undo
648 648
 				break;
649 649
 			default:
650 650
 		   		$this->debug("serialize_val: serialize unknown");
651
-				$xml .= 'not detected, got '.gettype($val).' for '.$val;
651
+				$xml .= 'not detected, got ' . gettype($val) . ' for ' . $val;
652 652
 				break;
653 653
 		}
654 654
 		$this->debug("serialize_val returning $xml");
@@ -667,7 +667,7 @@  discard block
 block discarded – undo
667 667
     * @return string the message
668 668
     * @access public
669 669
     */
670
-    public function serializeEnvelope($body,$headers=false,$namespaces=array(),$style='rpc',$use='encoded',$encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'){
670
+    public function serializeEnvelope($body, $headers = false, $namespaces = array(), $style = 'rpc', $use = 'encoded', $encodingStyle = 'http://schemas.xmlsoap.org/soap/encoding/') {
671 671
 
672 672
 	$this->debug("In serializeEnvelope length=" . strlen($body) . " body (max 1000 characters)=" . substr($body, 0, 1000) . " style=$style use=$use encodingStyle=$encodingStyle");
673 673
 	$this->debug("headers:");
@@ -677,15 +677,15 @@  discard block
 block discarded – undo
677 677
 
678 678
 	// serialize namespaces
679 679
     $ns_string = '';
680
-	foreach(array_merge($this->namespaces,$namespaces) as $k => $v){
680
+	foreach (array_merge($this->namespaces, $namespaces) as $k => $v) {
681 681
 		$ns_string .= " xmlns:$k=\"$v\"";
682 682
 	}
683
-	if($encodingStyle) {
683
+	if ($encodingStyle) {
684 684
 		$ns_string = " SOAP-ENV:encodingStyle=\"$encodingStyle\"$ns_string";
685 685
 	}
686 686
 
687 687
 	// serialize headers
688
-	if($headers){
688
+	if ($headers) {
689 689
 		if (is_array($headers)) {
690 690
 			$xml = '';
691 691
 			foreach ($headers as $k => $v) {
@@ -698,16 +698,16 @@  discard block
 block discarded – undo
698 698
 			$headers = $xml;
699 699
 			$this->debug("In serializeEnvelope, serialized array of headers to $headers");
700 700
 		}
701
-		$headers = "<SOAP-ENV:Header>".$headers."</SOAP-ENV:Header>";
701
+		$headers = "<SOAP-ENV:Header>" . $headers . "</SOAP-ENV:Header>";
702 702
 	}
703 703
 	// serialize envelope
704 704
 	return
705
-	'<?xml version="1.0" encoding="'.$this->soap_defencoding .'"?'.">".
706
-	'<SOAP-ENV:Envelope'.$ns_string.">".
707
-	$headers.
708
-	"<SOAP-ENV:Body>".
709
-		$body.
710
-	"</SOAP-ENV:Body>".
705
+	'<?xml version="1.0" encoding="' . $this->soap_defencoding . '"?' . ">" .
706
+	'<SOAP-ENV:Envelope' . $ns_string . ">" .
707
+	$headers .
708
+	"<SOAP-ENV:Body>" .
709
+		$body .
710
+	"</SOAP-ENV:Body>" .
711 711
 	"</SOAP-ENV:Envelope>";
712 712
     }
713 713
 
@@ -719,7 +719,7 @@  discard block
 block discarded – undo
719 719
 	 * @access public
720 720
 	 * @deprecated
721 721
 	 */
722
-    public function formatDump($str){
722
+    public function formatDump($str) {
723 723
 		$str = htmlspecialchars($str);
724 724
 		return nl2br($str);
725 725
     }
@@ -731,7 +731,7 @@  discard block
 block discarded – undo
731 731
 	* @return	string contracted qname
732 732
 	* @access   private
733 733
 	*/
734
-	public function contractQname($qname){
734
+	public function contractQname($qname) {
735 735
 		// get element namespace
736 736
 		if (strrpos($qname, ':')) {
737 737
 			// get unqualified name
@@ -755,15 +755,15 @@  discard block
 block discarded – undo
755 755
 	* @return	string expanded qname
756 756
 	* @access   private
757 757
 	*/
758
-	public function expandQname($qname){
758
+	public function expandQname($qname) {
759 759
 		// get element prefix
760
-		if(strpos($qname,':') && !preg_match('/^http:\/\//',$qname)){
760
+		if (strpos($qname, ':') && !preg_match('/^http:\/\//', $qname)) {
761 761
 			// get unqualified name
762
-			$name = substr(strstr($qname,':'),1);
762
+			$name = substr(strstr($qname, ':'), 1);
763 763
 			// get ns prefix
764
-			$prefix = substr($qname,0,strpos($qname,':'));
765
-			if(isset($this->namespaces[$prefix])){
766
-				return $this->namespaces[$prefix].':'.$name;
764
+			$prefix = substr($qname, 0, strpos($qname, ':'));
765
+			if (isset($this->namespaces[$prefix])) {
766
+				return $this->namespaces[$prefix] . ':' . $name;
767 767
 			} else {
768 768
 				return $qname;
769 769
 			}
@@ -780,10 +780,10 @@  discard block
 block discarded – undo
780 780
     * @return string The local part
781 781
     * @access public
782 782
     */
783
-	public function getLocalPart($str){
784
-		if($sstr = strrchr($str,':')){
783
+	public function getLocalPart($str) {
784
+		if ($sstr = strrchr($str, ':')) {
785 785
 			// get unqualified name
786
-			return substr( $sstr, 1 );
786
+			return substr($sstr, 1);
787 787
 		} else {
788 788
 			return $str;
789 789
 		}
@@ -797,10 +797,10 @@  discard block
 block discarded – undo
797 797
     * @return mixed The prefix or false if there is no prefix
798 798
     * @access public
799 799
     */
800
-	public function getPrefix($str){
801
-		if($pos = strrpos($str,':')){
800
+	public function getPrefix($str) {
801
+		if ($pos = strrpos($str, ':')) {
802 802
 			// get prefix
803
-			return substr($str,0,$pos);
803
+			return substr($str, 0, $pos);
804 804
 		}
805 805
 		return false;
806 806
 	}
@@ -812,7 +812,7 @@  discard block
 block discarded – undo
812 812
     * @return mixed The namespace, false if no namespace has the specified prefix
813 813
     * @access public
814 814
     */
815
-	public function getNamespaceFromPrefix($prefix){
815
+	public function getNamespaceFromPrefix($prefix) {
816 816
 		if (isset($this->namespaces[$prefix])) {
817 817
 			return $this->namespaces[$prefix];
818 818
 		}
@@ -893,8 +893,8 @@  discard block
 block discarded – undo
893 893
 * @return	mixed ISO 8601 date string or false
894 894
 * @access   public
895 895
 */
896
-function timestamp_to_iso8601($timestamp,$utc=true){
897
-	$datestr = date('Y-m-d\TH:i:sO',$timestamp);
896
+function timestamp_to_iso8601($timestamp, $utc = true) {
897
+	$datestr = date('Y-m-d\TH:i:sO', $timestamp);
898 898
 	$pos = strrpos($datestr, "+");
899 899
 	if ($pos === false) {
900 900
 		$pos = strrpos($datestr, "-");
@@ -904,20 +904,20 @@  discard block
 block discarded – undo
904 904
 			$datestr = substr($datestr, 0, $pos + 3) . ':' . substr($datestr, -2);
905 905
 		}
906 906
 	}
907
-	if($utc){
908
-		$pattern = '/'.
909
-		'([0-9]{4})-'.	// centuries & years CCYY-
910
-		'([0-9]{2})-'.	// months MM-
911
-		'([0-9]{2})'.	// days DD
912
-		'T'.			// separator T
913
-		'([0-9]{2}):'.	// hours hh:
914
-		'([0-9]{2}):'.	// minutes mm:
915
-		'([0-9]{2})(\.[0-9]*)?'. // seconds ss.ss...
916
-		'(Z|[+\-][0-9]{2}:?[0-9]{2})?'. // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's
907
+	if ($utc) {
908
+		$pattern = '/' .
909
+		'([0-9]{4})-' . // centuries & years CCYY-
910
+		'([0-9]{2})-' . // months MM-
911
+		'([0-9]{2})' . // days DD
912
+		'T' . // separator T
913
+		'([0-9]{2}):' . // hours hh:
914
+		'([0-9]{2}):' . // minutes mm:
915
+		'([0-9]{2})(\.[0-9]*)?' . // seconds ss.ss...
916
+		'(Z|[+\-][0-9]{2}:?[0-9]{2})?' . // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's
917 917
 		'/';
918 918
 
919
-		if(preg_match($pattern,$datestr,$regs)){
920
-			return sprintf('%04d-%02d-%02dT%02d:%02d:%02dZ',$regs[1],$regs[2],$regs[3],$regs[4],$regs[5],$regs[6]);
919
+		if (preg_match($pattern, $datestr, $regs)) {
920
+			return sprintf('%04d-%02d-%02dT%02d:%02d:%02dZ', $regs[1], $regs[2], $regs[3], $regs[4], $regs[5], $regs[6]);
921 921
 		}
922 922
 		return false;
923 923
 	} else {
@@ -932,27 +932,27 @@  discard block
 block discarded – undo
932 932
 * @return	mixed Unix timestamp (int) or false
933 933
 * @access   public
934 934
 */
935
-function iso8601_to_timestamp($datestr){
936
-	$pattern = '/'.
937
-	'([0-9]{4})-'.	// centuries & years CCYY-
938
-	'([0-9]{2})-'.	// months MM-
939
-	'([0-9]{2})'.	// days DD
940
-	'T'.			// separator T
941
-	'([0-9]{2}):'.	// hours hh:
942
-	'([0-9]{2}):'.	// minutes mm:
943
-	'([0-9]{2})(\.[0-9]+)?'. // seconds ss.ss...
944
-	'(Z|[+\-][0-9]{2}:?[0-9]{2})?'. // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's
935
+function iso8601_to_timestamp($datestr) {
936
+	$pattern = '/' .
937
+	'([0-9]{4})-' . // centuries & years CCYY-
938
+	'([0-9]{2})-' . // months MM-
939
+	'([0-9]{2})' . // days DD
940
+	'T' . // separator T
941
+	'([0-9]{2}):' . // hours hh:
942
+	'([0-9]{2}):' . // minutes mm:
943
+	'([0-9]{2})(\.[0-9]+)?' . // seconds ss.ss...
944
+	'(Z|[+\-][0-9]{2}:?[0-9]{2})?' . // Z to indicate UTC, -/+HH:MM:SS.SS... for local tz's
945 945
 	'/';
946
-	if(preg_match($pattern,$datestr,$regs)){
946
+	if (preg_match($pattern, $datestr, $regs)) {
947 947
 		// not utc
948
-		if($regs[8] != 'Z'){
949
-			$op = substr($regs[8],0,1);
950
-			$h = substr($regs[8],1,2);
951
-			$m = substr($regs[8],strlen($regs[8])-2,2);
952
-			if($op == '-'){
948
+		if ($regs[8] != 'Z') {
949
+			$op = substr($regs[8], 0, 1);
950
+			$h = substr($regs[8], 1, 2);
951
+			$m = substr($regs[8], strlen($regs[8]) - 2, 2);
952
+			if ($op == '-') {
953 953
 				$regs[4] = $regs[4] + $h;
954 954
 				$regs[5] = $regs[5] + $m;
955
-			} elseif($op == '+'){
955
+			} elseif ($op == '+') {
956 956
 				$regs[4] = $regs[4] - $h;
957 957
 				$regs[5] = $regs[5] - $m;
958 958
 			}
Please login to merge, or discard this patch.
libraries/nusoap/class.soap_fault.php 3 patches
Doc Comments   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -43,7 +43,7 @@
 block discarded – undo
43 43
     * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server)
44 44
     * @param string $faultactor only used when msg routed between multiple actors
45 45
     * @param string $faultstring human readable error message
46
-    * @param mixed $faultdetail detail, typically a string or array of string
46
+    * @param string $faultdetail detail, typically a string or array of string
47 47
 	*/
48 48
 	public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){
49 49
 		parent::nusoap_base();
Please login to merge, or discard this patch.
Indentation   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -38,13 +38,13 @@  discard block
 block discarded – undo
38 38
 	var $faultdetail;
39 39
 
40 40
 	/**
41
-	* constructor
42
-    *
43
-    * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server)
44
-    * @param string $faultactor only used when msg routed between multiple actors
45
-    * @param string $faultstring human readable error message
46
-    * @param mixed $faultdetail detail, typically a string or array of string
47
-	*/
41
+	 * constructor
42
+	 *
43
+	 * @param string $faultcode (SOAP-ENV:Client | SOAP-ENV:Server)
44
+	 * @param string $faultactor only used when msg routed between multiple actors
45
+	 * @param string $faultstring human readable error message
46
+	 * @param mixed $faultdetail detail, typically a string or array of string
47
+	 */
48 48
 	public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){
49 49
 		parent::nusoap_base();
50 50
 		$this->faultcode = $faultcode;
@@ -54,11 +54,11 @@  discard block
 block discarded – undo
54 54
 	}
55 55
 
56 56
 	/**
57
-	* serialize a fault
58
-	*
59
-	* @return	string	The serialization of the fault instance.
60
-	* @access   public
61
-	*/
57
+	 * serialize a fault
58
+	 *
59
+	 * @return	string	The serialization of the fault instance.
60
+	 * @access   public
61
+	 */
62 62
 	public function serialize(){
63 63
 		$ns_string = '';
64 64
 		foreach($this->namespaces as $k => $v){
Please login to merge, or discard this patch.
Spacing   +13 added lines, -13 removed lines patch added patch discarded remove patch
@@ -45,7 +45,7 @@  discard block
 block discarded – undo
45 45
     * @param string $faultstring human readable error message
46 46
     * @param mixed $faultdetail detail, typically a string or array of string
47 47
 	*/
48
-	public function nusoap_fault($faultcode,$faultactor='',$faultstring='',$faultdetail=''){
48
+	public function nusoap_fault($faultcode, $faultactor = '', $faultstring = '', $faultdetail = '') {
49 49
 		parent::nusoap_base();
50 50
 		$this->faultcode = $faultcode;
51 51
 		$this->faultactor = $faultactor;
@@ -59,22 +59,22 @@  discard block
 block discarded – undo
59 59
 	* @return	string	The serialization of the fault instance.
60 60
 	* @access   public
61 61
 	*/
62
-	public function serialize(){
62
+	public function serialize() {
63 63
 		$ns_string = '';
64
-		foreach($this->namespaces as $k => $v){
64
+		foreach ($this->namespaces as $k => $v) {
65 65
 			$ns_string .= "\n  xmlns:$k=\"$v\"";
66 66
 		}
67 67
 		$return_msg =
68
-			'<?xml version="1.0" encoding="'.$this->soap_defencoding.'"?>'.
69
-			'<SOAP-ENV:Envelope SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"'.$ns_string.">\n".
70
-				'<SOAP-ENV:Body>'.
71
-				'<SOAP-ENV:Fault>'.
72
-					$this->serialize_val($this->faultcode, 'faultcode').
73
-					$this->serialize_val($this->faultactor, 'faultactor').
74
-					$this->serialize_val($this->faultstring, 'faultstring').
75
-					$this->serialize_val($this->faultdetail, 'detail').
76
-				'</SOAP-ENV:Fault>'.
77
-				'</SOAP-ENV:Body>'.
68
+			'<?xml version="1.0" encoding="' . $this->soap_defencoding . '"?>' .
69
+			'<SOAP-ENV:Envelope SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"' . $ns_string . ">\n" .
70
+				'<SOAP-ENV:Body>' .
71
+				'<SOAP-ENV:Fault>' .
72
+					$this->serialize_val($this->faultcode, 'faultcode') .
73
+					$this->serialize_val($this->faultactor, 'faultactor') .
74
+					$this->serialize_val($this->faultstring, 'faultstring') .
75
+					$this->serialize_val($this->faultdetail, 'detail') .
76
+				'</SOAP-ENV:Fault>' .
77
+				'</SOAP-ENV:Body>' .
78 78
 			'</SOAP-ENV:Envelope>';
79 79
 		return $return_msg;
80 80
 	}
Please login to merge, or discard this patch.