Passed
Push — master ( 48302a...07000a )
by Francis
01:07
created
libraries/JWT.php 2 patches
Spacing   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -41,7 +41,7 @@  discard block
 block discarded – undo
41 41
    */
42 42
   private $set_iat = true;
43 43
 
44
-  function __construct($params=null) {
44
+  function __construct($params = null) {
45 45
     if ($params != null) $this->init($params);
46 46
     get_instance()->load->splint("francis94c/ci-jwt", "%base64");
47 47
   }
@@ -96,9 +96,9 @@  discard block
 block discarded – undo
96 96
    * @param  [type] $secret [description]
97 97
    * @return [type]         [description]
98 98
    */
99
-  public function sign(string $secret=null):?string {
99
+  public function sign(string $secret = null): ?string {
100 100
     // Checks.
101
-    if  (count($this->payload) == 0) return null;
101
+    if (count($this->payload) == 0) return null;
102 102
     // $key is $secret.
103 103
     $key = $secret ?? $this->secret;
104 104
     $this->header["alg"] = $this->header["alg"] ?? self::HS256;
@@ -115,9 +115,9 @@  discard block
 block discarded – undo
115 115
    * [token description]
116 116
    * @return string [description]
117 117
    */
118
-  public function token():?string {
118
+  public function token(): ?string {
119 119
     // Checks.
120
-    if  (count($this->payload) == 0) return null;
120
+    if (count($this->payload) == 0) return null;
121 121
     // Begin.
122 122
     $this->header["alg"] = self::NONE;
123 123
     if ($this->set_iat) $this->payload["iat"] = $this->payload["iat"] ?? time();
@@ -129,14 +129,14 @@  discard block
 block discarded – undo
129 129
    * @param  string $secret [description]
130 130
    * @return bool           [description]
131 131
    */
132
-  public function verify(string $jwt, string $secret=null):bool {
132
+  public function verify(string $jwt, string $secret = null):bool {
133 133
     if (substr_count($jwt, ".") != 2) return false; // Invalid JWT.
134 134
     $key = $secret ?? $this->secret;
135 135
     $parts = explode(".", $jwt);
136
-    $header = json_decode(base64url_decode($parts[0]) ,true);
136
+    $header = json_decode(base64url_decode($parts[0]), true);
137 137
     if ($header == null) return false;
138 138
     $alg = $header["alg"] ?? self::HS256;
139
-    $payload = json_decode(base64url_decode($parts[1]) ,true);
139
+    $payload = json_decode(base64url_decode($parts[1]), true);
140 140
     if ($payload == null) return false;
141 141
     if ($parts[2] == "") {
142 142
       return $this->allow_unsigned;
Please login to merge, or discard this patch.
Braces   +34 added lines, -11 removed lines patch added patch discarded remove patch
@@ -42,7 +42,9 @@  discard block
 block discarded – undo
42 42
   private $set_iat = true;
43 43
 
44 44
   function __construct($params=null) {
45
-    if ($params != null) $this->init($params);
45
+    if ($params != null) {
46
+     $this->init($params);
47
+    }
46 48
     get_instance()->load->splint("francis94c/ci-jwt", "%base64");
47 49
   }
48 50
   /**
@@ -98,17 +100,25 @@  discard block
 block discarded – undo
98 100
    */
99 101
   public function sign(string $secret=null):?string {
100 102
     // Checks.
101
-    if  (count($this->payload) == 0) return null;
103
+    if  (count($this->payload) == 0) {
104
+     return null;
105
+    }
102 106
     // $key is $secret.
103 107
     $key = $secret ?? $this->secret;
104 108
     $this->header["alg"] = $this->header["alg"] ?? self::HS256;
105 109
     $this->header["typ"] = $this->header["typ"] ?? self::JWT;
106 110
     $jwt = base64url_encode(json_encode($this->header));
107
-    if ($jwt === false) return null;
108
-    if ($jwt != "") $jwt .= ".";
111
+    if ($jwt === false) {
112
+     return null;
113
+    }
114
+    if ($jwt != "") {
115
+     $jwt .= ".";
116
+    }
109 117
     $payload = base64url_encode(json_encode($this->payload));
110 118
     $jwt .= $payload;
111
-    if ($key != "") return $this->sign_token($jwt, $key, $this->header["alg"]);
119
+    if ($key != "") {
120
+     return $this->sign_token($jwt, $key, $this->header["alg"]);
121
+    }
112 122
     return $jwt . ".";
113 123
   }
114 124
   /**
@@ -117,10 +127,14 @@  discard block
 block discarded – undo
117 127
    */
118 128
   public function token():?string {
119 129
     // Checks.
120
-    if  (count($this->payload) == 0) return null;
130
+    if  (count($this->payload) == 0) {
131
+     return null;
132
+    }
121 133
     // Begin.
122 134
     $this->header["alg"] = self::NONE;
123
-    if ($this->set_iat) $this->payload["iat"] = $this->payload["iat"] ?? time();
135
+    if ($this->set_iat) {
136
+     $this->payload["iat"] = $this->payload["iat"] ?? time();
137
+    }
124 138
     return base64url_encode(json_encode($this->header)) . "." . base64url_encode(json_encode($this->payload)) . ".";
125 139
   }
126 140
   /**
@@ -130,14 +144,21 @@  discard block
 block discarded – undo
130 144
    * @return bool           [description]
131 145
    */
132 146
   public function verify(string $jwt, string $secret=null):bool {
133
-    if (substr_count($jwt, ".") != 2) return false; // Invalid JWT.
147
+    if (substr_count($jwt, ".") != 2) {
148
+     return false;
149
+    }
150
+    // Invalid JWT.
134 151
     $key = $secret ?? $this->secret;
135 152
     $parts = explode(".", $jwt);
136 153
     $header = json_decode(base64url_decode($parts[0]) ,true);
137
-    if ($header == null) return false;
154
+    if ($header == null) {
155
+     return false;
156
+    }
138 157
     $alg = $header["alg"] ?? self::HS256;
139 158
     $payload = json_decode(base64url_decode($parts[1]) ,true);
140
-    if ($payload == null) return false;
159
+    if ($payload == null) {
160
+     return false;
161
+    }
141 162
     if ($parts[2] == "") {
142 163
       return $this->allow_unsigned;
143 164
     }
@@ -162,7 +183,9 @@  discard block
 block discarded – undo
162 183
    * @return string        Complete JWT.
163 184
    */
164 185
   private function sign_token(string $token, string $key, string $alg):string {
165
-    if ($alg == self::NONE) return $token . ".";
186
+    if ($alg == self::NONE) {
187
+     return $token . ".";
188
+    }
166 189
     $token = rtrim($token, ".");
167 190
     $signature = hash_hmac(self::ALGOS[$alg], $token, $key);
168 191
     return $token . "." . $signature;
Please login to merge, or discard this patch.