@@ -179,8 +179,8 @@ |
||
| 179 | 179 | if (1 === mb_strlen($saltDelimiter) && false !== mb_strpos($saltedHash, $saltDelimiter)) { |
| 180 | 180 | [$hashMethod, $saltStr, $correctHash] = explode($saltDelimiter, $saltedHash); |
| 181 | 181 | |
| 182 | - if (is_numeric($hashMethod) && ((int)$hashMethod === $hashMethod)) { |
|
| 183 | - $hashMethod = (int)$hashMethod; |
|
| 182 | + if (is_numeric($hashMethod) && ((int) $hashMethod === $hashMethod)) { |
|
| 183 | + $hashMethod = (int) $hashMethod; |
|
| 184 | 184 | } |
| 185 | 185 | $hashMethodName = $hashMethodCodeToName[$hashMethod] ?? $hashMethod; |
| 186 | 186 | |
@@ -307,7 +307,7 @@ |
||
| 307 | 307 | $data = $form->getData(); |
| 308 | 308 | $code = bin2hex(random_bytes(8)); |
| 309 | 309 | $hashedCode = $encoderFactory->getEncoder(AuthenticationMappingEntity::class)->encodePassword($code, null); |
| 310 | - $currentUserId = (int)$currentUserApi->get('uid'); |
|
| 310 | + $currentUserId = (int) $currentUserApi->get('uid'); |
|
| 311 | 311 | $userVerificationRepository->setVerificationCode($currentUserId, ZAuthConstant::VERIFYCHGTYPE_EMAIL, $hashedCode, $data['email']); |
| 312 | 312 | $templateArgs = [ |
| 313 | 313 | 'uname' => $currentUserApi->get('uname'), |
@@ -114,7 +114,8 @@ |
||
| 114 | 114 | |
| 115 | 115 | // new way |
| 116 | 116 | if ($mapping && $passwordEncoder->isPasswordValid($mapping->getPass(), $data['pass'], null)) { |
| 117 | - if ($passwordEncoder->needsRehash($mapping->getPass())) { // check to update hash to newer algo |
|
| 117 | + if ($passwordEncoder->needsRehash($mapping->getPass())) { |
|
| 118 | +// check to update hash to newer algo |
|
| 118 | 119 | $mapping->setPass($passwordEncoder->encodePassword($data['pass'], null)); |
| 119 | 120 | $this->mappingRepository->persistAndFlush($mapping); |
| 120 | 121 | } |