Completed
Push — master ( b0ff97...7f4bca )
by Jonathan
06:58
created
src/Webtrees/Functions/Functions.php 1 patch
Braces   +18 added lines, -11 removed lines patch added patch discarded remove patch
@@ -108,16 +108,18 @@  discard block
 block discarded – undo
108 108
 		$len_chars = count($chars);
109 109
 		$token = '';
110 110
 		
111
-		for ($i = 0; $i < $length; $i++)
112
-			$token .= $chars[ mt_rand(0, $len_chars - 1) ];
111
+		for ($i = 0; $i < $length; $i++) {
112
+					$token .= $chars[ mt_rand(0, $len_chars - 1) ];
113
+		}
113 114
 		
114 115
 		# Number of 32 char chunks
115 116
 		$chunks = ceil( strlen($token) / 32 );
116 117
 		$md5token = '';
117 118
 		
118 119
 		# Run each chunk through md5
119
-		for ( $i=1; $i<=$chunks; $i++ )
120
-			$md5token .= md5( substr($token, $i * 32 - 32, 32) );
120
+		for ( $i=1; $i<=$chunks; $i++ ) {
121
+					$md5token .= md5( substr($token, $i * 32 - 32, 32) );
122
+		}
121 123
 		
122 124
 			# Trim the token
123 125
 		return substr($md5token, 0, $length);		
@@ -130,8 +132,9 @@  discard block
 block discarded – undo
130 132
 	 */
131 133
 	protected static function getBase64EncryptionKey() {	    
132 134
 	    $key = 'STANDARDKEYIFNOSERVER';
133
-	    if(!empty(Filter::server('SERVER_NAME')) && !empty(Filter::server('SERVER_SOFTWARE')))
134
-	        $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE'));
135
+	    if(!empty(Filter::server('SERVER_NAME')) && !empty(Filter::server('SERVER_SOFTWARE'))) {
136
+	    	        $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE'));
137
+	    }
135 138
 	    
136 139
 	    return $key;
137 140
 	}
@@ -168,11 +171,13 @@  discard block
 block discarded – undo
168 171
 		$encrypted = str_replace('_', '/', $encrypted);
169 172
 		$encrypted = str_replace('*', '=', $encrypted);
170 173
 		$encrypted = base64_decode($encrypted);
171
-		if($encrypted === false)
172
-			throw new \InvalidArgumentException('The encrypted value is not in correct base64 format.');
174
+		if($encrypted === false) {
175
+					throw new \InvalidArgumentException('The encrypted value is not in correct base64 format.');
176
+		}
173 177
 		
174
-		if (mb_strlen($encrypted, '8bit') < (SODIUM_CRYPTO_SECRETBOX_NONCEBYTES + SODIUM_CRYPTO_SECRETBOX_MACBYTES))
175
-		    throw new \InvalidArgumentException('The encrypted value does not contain enough characters for the key.');
178
+		if (mb_strlen($encrypted, '8bit') < (SODIUM_CRYPTO_SECRETBOX_NONCEBYTES + SODIUM_CRYPTO_SECRETBOX_MACBYTES)) {
179
+				    throw new \InvalidArgumentException('The encrypted value does not contain enough characters for the key.');
180
+		}
176 181
 
177 182
 	    $nonce = mb_substr($encrypted, 0, SODIUM_CRYPTO_SECRETBOX_NONCEBYTES, '8bit');
178 183
 	    $ciphertext = mb_substr($encrypted, SODIUM_CRYPTO_SECRETBOX_NONCEBYTES, null, '8bit');
@@ -222,7 +227,9 @@  discard block
 block discarded – undo
222 227
 	 * @return boolean True if path valid
223 228
 	 */
224 229
 	public static function isValidPath($filename, $acceptfolder = FALSE) {		
225
-		if(strpbrk($filename, $acceptfolder ? '?%*:|"<>' : '\\/?%*:|"<>') === FALSE) return true;
230
+		if(strpbrk($filename, $acceptfolder ? '?%*:|"<>' : '\\/?%*:|"<>') === FALSE) {
231
+			return true;
232
+		}
226 233
 		return false;
227 234
 	}
228 235
 	
Please login to merge, or discard this patch.