@@ -92,7 +92,7 @@ |
||
92 | 92 | private function isHMACSignatureValid($accessToken, $ikm, $salt, $request, $hmac = null) |
93 | 93 | { |
94 | 94 | static $selfHMAC = null; |
95 | - static $hkdf = null; |
|
95 | + static $hkdf = null; |
|
96 | 96 | |
97 | 97 | // Null check the HMAC string |
98 | 98 | if (empty($hmac) || $hmac === null) { |
@@ -247,8 +247,8 @@ discard block |
||
247 | 247 | $totp = new TOTP( |
248 | 248 | $this->username, |
249 | 249 | $encodedSecret, |
250 | - 30, // 30 second window |
|
251 | - 'sha256', // SHA256 for the hashing algorithm |
|
250 | + 30, // 30 second window |
|
251 | + 'sha256', // SHA256 for the hashing algorithm |
|
252 | 252 | 6 // 6 digits |
253 | 253 | ); |
254 | 254 | |
@@ -302,8 +302,8 @@ discard block |
||
302 | 302 | $totp = new TOTP( |
303 | 303 | $this->username, |
304 | 304 | $this->otp_secret, |
305 | - 30, // 30 second window |
|
306 | - 'sha256', // SHA256 for the hashing algorithm |
|
305 | + 30, // 30 second window |
|
306 | + 'sha256', // SHA256 for the hashing algorithm |
|
307 | 307 | 6 // 6 digits |
308 | 308 | ); |
309 | 309 |
@@ -29,7 +29,7 @@ discard block |
||
29 | 29 | |
30 | 30 | // Pull the exception |
31 | 31 | $exception = Yii::$app->errorHandler->exception; |
32 | - if ($exception && is_subclass_of($exception, 'yii\web\HttpException') || get_class($exception) === 'yii\web\HttpException' ) { |
|
32 | + if ($exception && is_subclass_of($exception, 'yii\web\HttpException') || get_class($exception) === 'yii\web\HttpException') { |
|
33 | 33 | $copy = $response->data; |
34 | 34 | $response->data = null; |
35 | 35 | |
@@ -64,7 +64,7 @@ discard block |
||
64 | 64 | $response->data['status'] = $status; |
65 | 65 | |
66 | 66 | if ($response->data['data'] === [] || $response->data['data'] === null) { |
67 | - $response->data['data'] = null; |
|
67 | + $response->data['data'] = null; |
|
68 | 68 | } |
69 | 69 | } |
70 | 70 |
@@ -62,7 +62,7 @@ |
||
62 | 62 | $token->user_id = $userId; |
63 | 63 | $token->access_token = \str_replace('=', '', Base32::encode(\random_bytes(32))); |
64 | 64 | $token->refresh_token = \str_replace('=', '', Base32::encode(\random_bytes(32))); |
65 | - $token->ikm = \base64_encode(\random_bytes(32)); |
|
65 | + $token->ikm = \base64_encode(\random_bytes(32)); |
|
66 | 66 | $token->expires_at = \strtotime(static::TOKEN_EXPIRATION_TIME); |
67 | 67 | |
68 | 68 | // Prevent encrypted sessions from being downgraded |