@@ -179,8 +179,8 @@ |
||
179 | 179 | if (1 === mb_strlen($saltDelimiter) && false !== mb_strpos($saltedHash, $saltDelimiter)) { |
180 | 180 | [$hashMethod, $saltStr, $correctHash] = explode($saltDelimiter, $saltedHash); |
181 | 181 | |
182 | - if (is_numeric($hashMethod) && ((int)$hashMethod === $hashMethod)) { |
|
183 | - $hashMethod = (int)$hashMethod; |
|
182 | + if (is_numeric($hashMethod) && ((int) $hashMethod === $hashMethod)) { |
|
183 | + $hashMethod = (int) $hashMethod; |
|
184 | 184 | } |
185 | 185 | $hashMethodName = $hashMethodCodeToName[$hashMethod] ?? $hashMethod; |
186 | 186 |
@@ -307,7 +307,7 @@ |
||
307 | 307 | $data = $form->getData(); |
308 | 308 | $code = bin2hex(random_bytes(8)); |
309 | 309 | $hashedCode = $encoderFactory->getEncoder(AuthenticationMappingEntity::class)->encodePassword($code, null); |
310 | - $currentUserId = (int)$currentUserApi->get('uid'); |
|
310 | + $currentUserId = (int) $currentUserApi->get('uid'); |
|
311 | 311 | $userVerificationRepository->setVerificationCode($currentUserId, ZAuthConstant::VERIFYCHGTYPE_EMAIL, $hashedCode, $data['email']); |
312 | 312 | $templateArgs = [ |
313 | 313 | 'uname' => $currentUserApi->get('uname'), |
@@ -114,7 +114,8 @@ |
||
114 | 114 | |
115 | 115 | // new way |
116 | 116 | if ($mapping && $passwordEncoder->isPasswordValid($mapping->getPass(), $data['pass'], null)) { |
117 | - if ($passwordEncoder->needsRehash($mapping->getPass())) { // check to update hash to newer algo |
|
117 | + if ($passwordEncoder->needsRehash($mapping->getPass())) { |
|
118 | +// check to update hash to newer algo |
|
118 | 119 | $mapping->setPass($passwordEncoder->encodePassword($data['pass'], null)); |
119 | 120 | $this->mappingRepository->persistAndFlush($mapping); |
120 | 121 | } |