diff --git a/interface/web/login/index.php b/interface/web/login/index.php
index 5d0d5db9b8f0fe0411e2e19a7f5eb849ff74af6f..d72038d2f33f8bbe2aeb2685eea7266c74321815 100644
--- a/interface/web/login/index.php
+++ b/interface/web/login/index.php
@@ -175,7 +175,7 @@ function process_login_request(app $app, &$error, $conf, $module)
 		if ($app->db->errorMessage != '') $error .= '<br />'.$app->db->errorMessage != '';
 
 		$app->plugin->raiseEvent('login_failed', $username);
-		$app->auth_log('Failed login for user \''. $username .'\ from '. $_SERVER['REMOTE_ADDR'] .' at '. date('Y-m-d H:i:s');
+		$app->auth_log('Failed login for user \''. $username .'\ from '. $_SERVER['REMOTE_ADDR'] .' at '. date('Y-m-d H:i:s'));
 	}
 }
 
diff --git a/interface/web/login/otp.php b/interface/web/login/otp.php
index d85eb7123ed7aa97f23bb4247c5b2238a2609abc..5d3e497a96b03f465653168bcfdd27ec50635895 100644
--- a/interface/web/login/otp.php
+++ b/interface/web/login/otp.php
@@ -94,7 +94,7 @@ if(isset($_POST['code']) && strlen($_POST['code']) == $otp_recovery_code_length
 
 //* Begin 2fa via Email
 if($_SESSION['otp']['type'] == 'email') {
-	
+
 	//* Email 2fa handler settings
 	$max_code_resend = 3;
 	$max_time = 600; // time in seconds until the code gets invalidated
@@ -103,7 +103,7 @@ if($_SESSION['otp']['type'] == 'email') {
 	if(isset($_POST['code']) && strlen($_POST['code']) == $code_length && isset($_SESSION['otp']['code'])) {
 
 		if(strlen($_SESSION['otp']['code']) != $code_length) die(); // wrong code lenght, this should never happen
-		
+
 		$user = $app->db->queryOneRecord('SELECT otp_attempts FROM sys_user WHERE userid = ?',$_SESSION['s_pending']['user']['userid']);
 
 		//* Check if we reached limits