@@ -124,7 +124,9 @@ |
||
124 | 124 | |
125 | 125 | $cid = Filter::get('cid'); |
126 | 126 | $certificate = null; |
127 | - if(!empty($cid)) $certificate = Certificate::getInstance($cid, $WT_TREE, null, $this->provider); |
|
127 | + if(!empty($cid)) { |
|
128 | + $certificate = Certificate::getInstance($cid, $WT_TREE, null, $this->provider); |
|
129 | + } |
|
128 | 130 | |
129 | 131 | $imageBuilder = new ImageBuilder($certificate); |
130 | 132 |
@@ -45,7 +45,9 @@ |
||
45 | 45 | * @return int Level of sources |
46 | 46 | * */ |
47 | 47 | function isMarriageSourced(){ |
48 | - if($this->is_marriage_sourced !== null) return $this->is_marriage_sourced; |
|
48 | + if($this->is_marriage_sourced !== null) { |
|
49 | + return $this->is_marriage_sourced; |
|
50 | + } |
|
49 | 51 | $this->is_marriage_sourced = $this->isFactSourced(WT_EVENTS_MARR.'|MARC'); |
50 | 52 | return $this->is_marriage_sourced; |
51 | 53 | } |
@@ -65,8 +65,7 @@ discard block |
||
65 | 65 | $ct2 = preg_match_all($pattern, $titlefact->getValue(), $match2); |
66 | 66 | if($ct2>0){ |
67 | 67 | $this->titles[$match2[1][0]][]= trim($match2[2][0]); |
68 | - } |
|
69 | - else{ |
|
68 | + } else{ |
|
70 | 69 | $this->titles[$titlefact->getValue()][]=''; |
71 | 70 | } |
72 | 71 | } |
@@ -98,8 +97,7 @@ discard block |
||
98 | 97 | if($bplace = $this->gedcomrecord->getBirthPlace()){ |
99 | 98 | if($perc){ |
100 | 99 | return array ($bplace, 1); |
101 | - } |
|
102 | - else{ |
|
100 | + } else{ |
|
103 | 101 | return $bplace; |
104 | 102 | } |
105 | 103 | } |
@@ -168,7 +166,9 @@ discard block |
||
168 | 166 | * @return int Level of sources |
169 | 167 | * */ |
170 | 168 | public function isBirthSourced(){ |
171 | - if($this->is_birth_sourced !== null) return $this->is_birth_sourced; |
|
169 | + if($this->is_birth_sourced !== null) { |
|
170 | + return $this->is_birth_sourced; |
|
171 | + } |
|
172 | 172 | $this->is_birth_sourced = $this->isFactSourced(WT_EVENTS_BIRT); |
173 | 173 | return $this->is_birth_sourced; |
174 | 174 | } |
@@ -179,7 +179,9 @@ discard block |
||
179 | 179 | * @return int Level of sources |
180 | 180 | * */ |
181 | 181 | public function isDeathSourced(){ |
182 | - if($this->is_death_sourced !== null) return $this->is_death_sourced; |
|
182 | + if($this->is_death_sourced !== null) { |
|
183 | + return $this->is_death_sourced; |
|
184 | + } |
|
183 | 185 | $this->is_death_sourced = $this->isFactSourced(WT_EVENTS_DEAT); |
184 | 186 | return $this->is_death_sourced; |
185 | 187 | } |
@@ -114,16 +114,18 @@ discard block |
||
114 | 114 | $len_chars = count($chars); |
115 | 115 | $token = ''; |
116 | 116 | |
117 | - for ($i = 0; $i < $length; $i++) |
|
118 | - $token .= $chars[ mt_rand(0, $len_chars - 1) ]; |
|
117 | + for ($i = 0; $i < $length; $i++) { |
|
118 | + $token .= $chars[ mt_rand(0, $len_chars - 1) ]; |
|
119 | + } |
|
119 | 120 | |
120 | 121 | # Number of 32 char chunks |
121 | 122 | $chunks = ceil( strlen($token) / 32 ); |
122 | 123 | $md5token = ''; |
123 | 124 | |
124 | 125 | # Run each chunk through md5 |
125 | - for ( $i=1; $i<=$chunks; $i++ ) |
|
126 | - $md5token .= md5( substr($token, $i * 32 - 32, 32) ); |
|
126 | + for ( $i=1; $i<=$chunks; $i++ ) { |
|
127 | + $md5token .= md5( substr($token, $i * 32 - 32, 32) ); |
|
128 | + } |
|
127 | 129 | |
128 | 130 | # Trim the token |
129 | 131 | return substr($md5token, 0, $length); |
@@ -146,12 +148,14 @@ discard block |
||
146 | 148 | * @return string Encrypted and encoded text |
147 | 149 | */ |
148 | 150 | public static function encryptToSafeBase64($data){ |
149 | - if(!self::isEncryptionCompatible()) |
|
150 | - throw new \Exception('MCrypt PHP extension is required to use encryption.'); |
|
151 | + if(!self::isEncryptionCompatible()) { |
|
152 | + throw new \Exception('MCrypt PHP extension is required to use encryption.'); |
|
153 | + } |
|
151 | 154 | |
152 | 155 | $key = 'STANDARDKEYIFNOSERVER'; |
153 | - if(Filter::server('SERVER_NAME') && Filter::server('SERVER_SOFTWARE')) |
|
154 | - $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE')); |
|
156 | + if(Filter::server('SERVER_NAME') && Filter::server('SERVER_SOFTWARE')) { |
|
157 | + $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE')); |
|
158 | + } |
|
155 | 159 | $iv = mcrypt_create_iv(self::ENCRYPTION_IV_SIZE, MCRYPT_RAND); |
156 | 160 | $id = mcrypt_encrypt(MCRYPT_RIJNDAEL_128, $key, $data, MCRYPT_MODE_CBC,$iv); |
157 | 161 | $encrypted = base64_encode($iv.$id); |
@@ -169,20 +173,24 @@ discard block |
||
169 | 173 | * @return string Decrypted text |
170 | 174 | */ |
171 | 175 | public static function decryptFromSafeBase64($encrypted){ |
172 | - if(!self::isEncryptionCompatible()) |
|
173 | - throw new \Exception('MCrypt PHP extension is required to use encryption.'); |
|
176 | + if(!self::isEncryptionCompatible()) { |
|
177 | + throw new \Exception('MCrypt PHP extension is required to use encryption.'); |
|
178 | + } |
|
174 | 179 | |
175 | 180 | $key = 'STANDARDKEYIFNOSERVER'; |
176 | - if(Filter::server('SERVER_NAME') && Filter::server('SERVER_SOFTWARE')) |
|
177 | - $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE')); |
|
181 | + if(Filter::server('SERVER_NAME') && Filter::server('SERVER_SOFTWARE')) { |
|
182 | + $key = md5(Filter::server('SERVER_NAME').Filter::server('SERVER_SOFTWARE')); |
|
183 | + } |
|
178 | 184 | $encrypted = str_replace('-', '+', $encrypted); |
179 | 185 | $encrypted = str_replace('_', '/', $encrypted); |
180 | 186 | $encrypted = str_replace('*', '=', $encrypted); |
181 | 187 | $encrypted = base64_decode($encrypted); |
182 | - if(!$encrypted) |
|
183 | - throw new \InvalidArgumentException('The encrypted value is not in correct base64 format.'); |
|
184 | - if(strlen($encrypted) < self::ENCRYPTION_IV_SIZE) |
|
185 | - throw new \InvalidArgumentException('The encrypted value does not contain enough characters for the key.'); |
|
188 | + if(!$encrypted) { |
|
189 | + throw new \InvalidArgumentException('The encrypted value is not in correct base64 format.'); |
|
190 | + } |
|
191 | + if(strlen($encrypted) < self::ENCRYPTION_IV_SIZE) { |
|
192 | + throw new \InvalidArgumentException('The encrypted value does not contain enough characters for the key.'); |
|
193 | + } |
|
186 | 194 | $iv_dec = substr($encrypted, 0, self::ENCRYPTION_IV_SIZE); |
187 | 195 | $encrypted = substr($encrypted, self::ENCRYPTION_IV_SIZE); |
188 | 196 | $decrypted = mcrypt_decrypt(MCRYPT_RIJNDAEL_128, $key, $encrypted, MCRYPT_MODE_CBC, $iv_dec); |
@@ -223,7 +231,9 @@ discard block |
||
223 | 231 | * @return boolean True if path valid |
224 | 232 | */ |
225 | 233 | public static function isValidPath($filename, $acceptfolder = FALSE) { |
226 | - if(strpbrk($filename, $acceptfolder ? '?%*:|"<>' : '\\/?%*:|"<>') === FALSE) return true; |
|
234 | + if(strpbrk($filename, $acceptfolder ? '?%*:|"<>' : '\\/?%*:|"<>') === FALSE) { |
|
235 | + return true; |
|
236 | + } |
|
227 | 237 | return false; |
228 | 238 | } |
229 | 239 |