@@ -92,7 +92,7 @@ |
||
92 | 92 | private function isHMACSignatureValid($accessToken, $ikm, $salt, $request, $hmac = null) |
93 | 93 | { |
94 | 94 | static $selfHMAC = null; |
95 | - static $hkdf = null; |
|
95 | + static $hkdf = null; |
|
96 | 96 | |
97 | 97 | // Null check the HMAC string |
98 | 98 | if (empty($hmac) || $hmac === null) { |
@@ -59,7 +59,7 @@ |
||
59 | 59 | $response->data['status'] = $status; |
60 | 60 | |
61 | 61 | if ($response->data['data'] === [] || $response->data['data'] === null) { |
62 | - $response->data['data'] = null; |
|
62 | + $response->data['data'] = null; |
|
63 | 63 | } |
64 | 64 | } |
65 | 65 |
@@ -72,7 +72,7 @@ |
||
72 | 72 | $token->user_id = $userId; |
73 | 73 | $token->access_token = \str_replace('=', '', Base32::encode(\random_bytes(32))); |
74 | 74 | $token->refresh_token = \str_replace('=', '', Base32::encode(\random_bytes(32))); |
75 | - $token->ikm = \base64_encode(\random_bytes(32)); |
|
75 | + $token->ikm = \base64_encode(\random_bytes(32)); |
|
76 | 76 | $token->secret_sign_kp = \base64_encode(sodium_crypto_sign_secretkey($signKp)); |
77 | 77 | $token->expires_at = \strtotime(static::TOKEN_EXPIRATION_TIME); |
78 | 78 |
@@ -273,8 +273,8 @@ discard block |
||
273 | 273 | $encodedSecret = Base32::encode($secret); |
274 | 274 | $totp = TOTP::create( |
275 | 275 | $encodedSecret, |
276 | - 30, // 30 second window |
|
277 | - 'sha256', // SHA256 for the hashing algorithm |
|
276 | + 30, // 30 second window |
|
277 | + 'sha256', // SHA256 for the hashing algorithm |
|
278 | 278 | 6 // 6 digits |
279 | 279 | ); |
280 | 280 | $totp->setLabel($this->username); |
@@ -328,8 +328,8 @@ discard block |
||
328 | 328 | { |
329 | 329 | $totp = TOTP::create( |
330 | 330 | $this->otp_secret, |
331 | - 30, // 30 second window |
|
332 | - 'sha256', // SHA256 for the hashing algorithm |
|
331 | + 30, // 30 second window |
|
332 | + 'sha256', // SHA256 for the hashing algorithm |
|
333 | 333 | 6 // 6 digits |
334 | 334 | ); |
335 | 335 |