@@ -172,13 +172,13 @@ discard block |
||
| 172 | 172 | || is_null($row[$this->passwordhashcolumn])) |
| 173 | 173 | { |
| 174 | 174 | \SimpleSAML\Logger::error('sqlauth:'.$this->authId. |
| 175 | - ': column ' . $this->passwordhashcolumn . ' must be in every result tuple.'); |
|
| 175 | + ': column ' . $this->passwordhashcolumn . ' must be in every result tuple.'); |
|
| 176 | 176 | throw new \SimpleSAML\Error\Error('WRONGUSERPASS'); |
| 177 | 177 | } |
| 178 | 178 | if( $pwhash ) { |
| 179 | 179 | if( $pwhash != $row[$this->passwordhashcolumn] ) { |
| 180 | 180 | \SimpleSAML\Logger::error('sqlauth:'.$this->authId. |
| 181 | - ': column ' . $this->passwordhashcolumn . ' must be THE SAME in every result tuple.'); |
|
| 181 | + ': column ' . $this->passwordhashcolumn . ' must be THE SAME in every result tuple.'); |
|
| 182 | 182 | throw new \SimpleSAML\Error\Error('WRONGUSERPASS'); |
| 183 | 183 | } |
| 184 | 184 | } |
@@ -191,7 +191,7 @@ discard block |
||
| 191 | 191 | if( is_null($pwhash)) { |
| 192 | 192 | if( $pwhash != $row[$this->passwordhashcolumn] ) { |
| 193 | 193 | \SimpleSAML\Logger::error('sqlauth:'.$this->authId. |
| 194 | - ': column ' . $this->passwordhashcolumn . ' does not contain a password hash.'); |
|
| 194 | + ': column ' . $this->passwordhashcolumn . ' does not contain a password hash.'); |
|
| 195 | 195 | throw new \SimpleSAML\Error\Error('WRONGUSERPASS'); |
| 196 | 196 | } |
| 197 | 197 | } |
@@ -59,10 +59,10 @@ discard block |
||
| 59 | 59 | // Call the parent constructor first, as required by the interface |
| 60 | 60 | parent::__construct($info, $config); |
| 61 | 61 | |
| 62 | - if( array_key_exists('passwordhashcolumn', $config )) { |
|
| 62 | + if (array_key_exists('passwordhashcolumn', $config)) { |
|
| 63 | 63 | $this->passwordhashcolumn = $config['passwordhashcolumn']; |
| 64 | 64 | } |
| 65 | - if( !$this->passwordhashcolumn ) { |
|
| 65 | + if (!$this->passwordhashcolumn) { |
|
| 66 | 66 | $this->passwordhashcolumn = 'passwordhash'; |
| 67 | 67 | } |
| 68 | 68 | } |
@@ -75,7 +75,7 @@ discard block |
||
| 75 | 75 | * @param array $forbiddenAttributes An array of attributes to never return |
| 76 | 76 | * @return array Associative array with the users attributes. |
| 77 | 77 | */ |
| 78 | - protected function extractAttributes( $data, $forbiddenAttributes = array() ) |
|
| 78 | + protected function extractAttributes($data, $forbiddenAttributes = array()) |
|
| 79 | 79 | { |
| 80 | 80 | $attributes = []; |
| 81 | 81 | foreach ($data as $row) { |
@@ -172,13 +172,13 @@ discard block |
||
| 172 | 172 | || is_null($row[$this->passwordhashcolumn])) |
| 173 | 173 | { |
| 174 | 174 | \SimpleSAML\Logger::error('sqlauth:'.$this->authId. |
| 175 | - ': column ' . $this->passwordhashcolumn . ' must be in every result tuple.'); |
|
| 175 | + ': column '.$this->passwordhashcolumn.' must be in every result tuple.'); |
|
| 176 | 176 | throw new \SimpleSAML\Error\Error('WRONGUSERPASS'); |
| 177 | 177 | } |
| 178 | - if( $pwhash ) { |
|
| 179 | - if( $pwhash != $row[$this->passwordhashcolumn] ) { |
|
| 178 | + if ($pwhash) { |
|
| 179 | + if ($pwhash != $row[$this->passwordhashcolumn]) { |
|
| 180 | 180 | \SimpleSAML\Logger::error('sqlauth:'.$this->authId. |
| 181 | - ': column ' . $this->passwordhashcolumn . ' must be THE SAME in every result tuple.'); |
|
| 181 | + ': column '.$this->passwordhashcolumn.' must be THE SAME in every result tuple.'); |
|
| 182 | 182 | throw new \SimpleSAML\Error\Error('WRONGUSERPASS'); |
| 183 | 183 | } |
| 184 | 184 | } |
@@ -188,10 +188,10 @@ discard block |
||
| 188 | 188 | * This should never happen as the count(data) test above would have already thrown. |
| 189 | 189 | * But checking twice doesn't hurt. |
| 190 | 190 | */ |
| 191 | - if( is_null($pwhash)) { |
|
| 192 | - if( $pwhash != $row[$this->passwordhashcolumn] ) { |
|
| 191 | + if (is_null($pwhash)) { |
|
| 192 | + if ($pwhash != $row[$this->passwordhashcolumn]) { |
|
| 193 | 193 | \SimpleSAML\Logger::error('sqlauth:'.$this->authId. |
| 194 | - ': column ' . $this->passwordhashcolumn . ' does not contain a password hash.'); |
|
| 194 | + ': column '.$this->passwordhashcolumn.' does not contain a password hash.'); |
|
| 195 | 195 | throw new \SimpleSAML\Error\Error('WRONGUSERPASS'); |
| 196 | 196 | } |
| 197 | 197 | } |
@@ -200,13 +200,13 @@ discard block |
||
| 200 | 200 | * VERIFICATION! |
| 201 | 201 | * Now to check if the password the user supplied is actually valid |
| 202 | 202 | */ |
| 203 | - if( !password_verify( $password, $pwhash )) { |
|
| 204 | - \SimpleSAML\Logger::error('sqlauth:'.$this->authId. ': password is incorrect.'); |
|
| 203 | + if (!password_verify($password, $pwhash)) { |
|
| 204 | + \SimpleSAML\Logger::error('sqlauth:'.$this->authId.': password is incorrect.'); |
|
| 205 | 205 | throw new \SimpleSAML\Error\Error('WRONGUSERPASS'); |
| 206 | 206 | } |
| 207 | 207 | |
| 208 | 208 | |
| 209 | - $attributes = $this->extractAttributes( $data, array($this->passwordhashcolumn) ); |
|
| 209 | + $attributes = $this->extractAttributes($data, array($this->passwordhashcolumn)); |
|
| 210 | 210 | |
| 211 | 211 | \SimpleSAML\Logger::info('sqlauth:'.$this->authId.': Attributes: '. |
| 212 | 212 | implode(',', array_keys($attributes))); |