@@ -59,7 +59,7 @@ |
||
59 | 59 | $response->data['status'] = $status; |
60 | 60 | |
61 | 61 | if ($response->data['data'] === [] || $response->data['data'] === null) { |
62 | - $response->data['data'] = null; |
|
62 | + $response->data['data'] = null; |
|
63 | 63 | } |
64 | 64 | } |
65 | 65 |
@@ -237,8 +237,8 @@ discard block |
||
237 | 237 | $totp = new TOTP( |
238 | 238 | $this->email, |
239 | 239 | $encodedSecret, |
240 | - 30, // 30 second window |
|
241 | - 'sha256', // SHA256 for the hashing algorithm |
|
240 | + 30, // 30 second window |
|
241 | + 'sha256', // SHA256 for the hashing algorithm |
|
242 | 242 | 6 // 6 digits |
243 | 243 | ); |
244 | 244 | |
@@ -292,8 +292,8 @@ discard block |
||
292 | 292 | $totp = new TOTP( |
293 | 293 | $this->email, |
294 | 294 | $this->otp_secret, |
295 | - 30, // 30 second window |
|
296 | - 'sha256', // SHA256 for the hashing algorithm |
|
295 | + 30, // 30 second window |
|
296 | + 'sha256', // SHA256 for the hashing algorithm |
|
297 | 297 | 6 // 6 digits |
298 | 298 | ); |
299 | 299 |
@@ -92,7 +92,7 @@ |
||
92 | 92 | private function isHMACSignatureValid($accessToken, $ikm, $salt, $request, $hmac = null) |
93 | 93 | { |
94 | 94 | static $selfHMAC = null; |
95 | - static $hkdf = null; |
|
95 | + static $hkdf = null; |
|
96 | 96 | |
97 | 97 | // Null check the HMAC string |
98 | 98 | if (empty($hmac) || $hmac === null) { |