Passed
Pull Request — release-2.1 (#5337)
by Michael
04:28
created
Sources/random_compat/random_bytes_dev_urandom.php 1 patch
Braces   +33 added lines, -16 removed lines patch added patch discarded remove patch
@@ -26,11 +26,13 @@  discard block
 block discarded – undo
26 26
  * SOFTWARE.
27 27
  */
28 28
 
29
-if (!defined('RANDOM_COMPAT_READ_BUFFER')) {
29
+if (!defined('RANDOM_COMPAT_READ_BUFFER'))
30
+{
30 31
     define('RANDOM_COMPAT_READ_BUFFER', 8);
31 32
 }
32 33
 
33
-if (!is_callable('random_bytes')) {
34
+if (!is_callable('random_bytes'))
35
+{
34 36
     /**
35 37
      * Unless open_basedir is enabled, use /dev/urandom for
36 38
      * random numbers in accordance with best practices
@@ -52,23 +54,27 @@  discard block
 block discarded – undo
52 54
         /**
53 55
          * This block should only be run once
54 56
          */
55
-        if (empty($fp)) {
57
+        if (empty($fp))
58
+        {
56 59
             /**
57 60
              * We use /dev/urandom if it is a char device.
58 61
              * We never fall back to /dev/random
59 62
              */
60 63
             /** @var resource|bool $fp */
61 64
             $fp = fopen('/dev/urandom', 'rb');
62
-            if (is_resource($fp)) {
65
+            if (is_resource($fp))
66
+            {
63 67
                 /** @var array<string, int> $st */
64 68
                 $st = fstat($fp);
65
-                if (($st['mode'] & 0170000) !== 020000) {
69
+                if (($st['mode'] & 0170000) !== 020000)
70
+                {
66 71
                     fclose($fp);
67 72
                     $fp = false;
68 73
                 }
69 74
             }
70 75
 
71
-            if (is_resource($fp)) {
76
+            if (is_resource($fp))
77
+            {
72 78
                 /**
73 79
                  * stream_set_read_buffer() does not exist in HHVM
74 80
                  *
@@ -77,25 +83,31 @@  discard block
 block discarded – undo
77 83
                  *
78 84
                  * stream_set_read_buffer returns 0 on success
79 85
                  */
80
-                if (is_callable('stream_set_read_buffer')) {
86
+                if (is_callable('stream_set_read_buffer'))
87
+                {
81 88
                     stream_set_read_buffer($fp, RANDOM_COMPAT_READ_BUFFER);
82 89
                 }
83
-                if (is_callable('stream_set_chunk_size')) {
90
+                if (is_callable('stream_set_chunk_size'))
91
+                {
84 92
                     stream_set_chunk_size($fp, RANDOM_COMPAT_READ_BUFFER);
85 93
                 }
86 94
             }
87 95
         }
88 96
 
89
-        try {
97
+        try
98
+        {
90 99
             /** @var int $bytes */
91 100
             $bytes = RandomCompat_intval($bytes);
92
-        } catch (TypeError $ex) {
101
+        }
102
+        catch (TypeError $ex)
103
+        {
93 104
             throw new TypeError(
94 105
                 'random_bytes(): $bytes must be an integer'
95 106
             );
96 107
         }
97 108
 
98
-        if ($bytes < 1) {
109
+        if ($bytes < 1)
110
+        {
99 111
             throw new Error(
100 112
                 'Length must be greater than 0'
101 113
             );
@@ -108,7 +120,8 @@  discard block
 block discarded – undo
108 120
          * if (empty($fp)) line is logic that should only be run once per
109 121
          * page load.
110 122
          */
111
-        if (is_resource($fp)) {
123
+        if (is_resource($fp))
124
+        {
112 125
             /**
113 126
              * @var int
114 127
              */
@@ -127,8 +140,10 @@  discard block
 block discarded – undo
127 140
                  * @var string|bool
128 141
                  */
129 142
                 $read = fread($fp, $remaining);
130
-                if (!is_string($read)) {
131
-                    if ($read === false) {
143
+                if (!is_string($read))
144
+                {
145
+                    if ($read === false)
146
+                    {
132 147
                         /**
133 148
                          * We cannot safely read from the file. Exit the
134 149
                          * do-while loop and trigger the exception condition
@@ -152,8 +167,10 @@  discard block
 block discarded – undo
152 167
             /**
153 168
              * Is our result valid?
154 169
              */
155
-            if (is_string($buf)) {
156
-                if (RandomCompat_strlen($buf) === $bytes) {
170
+            if (is_string($buf))
171
+            {
172
+                if (RandomCompat_strlen($buf) === $bytes)
173
+                {
157 174
                     /**
158 175
                      * Return our random entropy buffer here:
159 176
                      */
Please login to merge, or discard this patch.
Sources/random_compat/byte_safe_strings.php 1 patch
Braces   +35 added lines, -16 removed lines patch added patch discarded remove patch
@@ -26,7 +26,8 @@  discard block
 block discarded – undo
26 26
  * SOFTWARE.
27 27
  */
28 28
 
29
-if (!is_callable('RandomCompat_strlen')) {
29
+if (!is_callable('RandomCompat_strlen'))
30
+{
30 31
     if (
31 32
         defined('MB_OVERLOAD_STRING')
32 33
             &&
@@ -46,7 +47,8 @@  discard block
 block discarded – undo
46 47
          */
47 48
         function RandomCompat_strlen($binary_string)
48 49
         {
49
-            if (!is_string($binary_string)) {
50
+            if (!is_string($binary_string))
51
+            {
50 52
                 throw new TypeError(
51 53
                     'RandomCompat_strlen() expects a string'
52 54
                 );
@@ -55,7 +57,9 @@  discard block
 block discarded – undo
55 57
             return (int) mb_strlen($binary_string, '8bit');
56 58
         }
57 59
 
58
-    } else {
60
+    }
61
+    else
62
+    {
59 63
         /**
60 64
          * strlen() implementation that isn't brittle to mbstring.func_overload
61 65
          *
@@ -69,7 +73,8 @@  discard block
 block discarded – undo
69 73
          */
70 74
         function RandomCompat_strlen($binary_string)
71 75
         {
72
-            if (!is_string($binary_string)) {
76
+            if (!is_string($binary_string))
77
+            {
73 78
                 throw new TypeError(
74 79
                     'RandomCompat_strlen() expects a string'
75 80
                 );
@@ -79,7 +84,8 @@  discard block
 block discarded – undo
79 84
     }
80 85
 }
81 86
 
82
-if (!is_callable('RandomCompat_substr')) {
87
+if (!is_callable('RandomCompat_substr'))
88
+{
83 89
 
84 90
     if (
85 91
         defined('MB_OVERLOAD_STRING')
@@ -102,36 +108,43 @@  discard block
 block discarded – undo
102 108
          */
103 109
         function RandomCompat_substr($binary_string, $start, $length = null)
104 110
         {
105
-            if (!is_string($binary_string)) {
111
+            if (!is_string($binary_string))
112
+            {
106 113
                 throw new TypeError(
107 114
                     'RandomCompat_substr(): First argument should be a string'
108 115
                 );
109 116
             }
110 117
 
111
-            if (!is_int($start)) {
118
+            if (!is_int($start))
119
+            {
112 120
                 throw new TypeError(
113 121
                     'RandomCompat_substr(): Second argument should be an integer'
114 122
                 );
115 123
             }
116 124
 
117
-            if ($length === null) {
125
+            if ($length === null)
126
+            {
118 127
                 /**
119 128
                  * mb_substr($str, 0, NULL, '8bit') returns an empty string on
120 129
                  * PHP 5.3, so we have to find the length ourselves.
121 130
                  */
122 131
                 /** @var int $length */
123 132
                 $length = RandomCompat_strlen($binary_string) - $start;
124
-            } elseif (!is_int($length)) {
133
+            }
134
+            elseif (!is_int($length))
135
+            {
125 136
                 throw new TypeError(
126 137
                     'RandomCompat_substr(): Third argument should be an integer, or omitted'
127 138
                 );
128 139
             }
129 140
 
130 141
             // Consistency with PHP's behavior
131
-            if ($start === RandomCompat_strlen($binary_string) && $length === 0) {
142
+            if ($start === RandomCompat_strlen($binary_string) && $length === 0)
143
+            {
132 144
                 return '';
133 145
             }
134
-            if ($start > RandomCompat_strlen($binary_string)) {
146
+            if ($start > RandomCompat_strlen($binary_string))
147
+            {
135 148
                 return '';
136 149
             }
137 150
 
@@ -143,7 +156,9 @@  discard block
 block discarded – undo
143 156
             );
144 157
         }
145 158
 
146
-    } else {
159
+    }
160
+    else
161
+    {
147 162
 
148 163
         /**
149 164
          * substr() implementation that isn't brittle to mbstring.func_overload
@@ -160,20 +175,24 @@  discard block
 block discarded – undo
160 175
          */
161 176
         function RandomCompat_substr($binary_string, $start, $length = null)
162 177
         {
163
-            if (!is_string($binary_string)) {
178
+            if (!is_string($binary_string))
179
+            {
164 180
                 throw new TypeError(
165 181
                     'RandomCompat_substr(): First argument should be a string'
166 182
                 );
167 183
             }
168 184
 
169
-            if (!is_int($start)) {
185
+            if (!is_int($start))
186
+            {
170 187
                 throw new TypeError(
171 188
                     'RandomCompat_substr(): Second argument should be an integer'
172 189
                 );
173 190
             }
174 191
 
175
-            if ($length !== null) {
176
-                if (!is_int($length)) {
192
+            if ($length !== null)
193
+            {
194
+                if (!is_int($length))
195
+                {
177 196
                     throw new TypeError(
178 197
                         'RandomCompat_substr(): Third argument should be an integer, or omitted'
179 198
                     );
Please login to merge, or discard this patch.
Sources/random_compat/random_int.php 1 patch
Braces   +29 added lines, -13 removed lines patch added patch discarded remove patch
@@ -1,6 +1,7 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (!is_callable('random_int')) {
3
+if (!is_callable('random_int'))
4
+{
4 5
     /**
5 6
      * Random_* Compatibility Library
6 7
      * for using the new PHP 7 random_* API in PHP 5 projects
@@ -50,19 +51,25 @@  discard block
 block discarded – undo
50 51
          * through.
51 52
          */
52 53
 
53
-        try {
54
+        try
55
+        {
54 56
             /** @var int $min */
55 57
             $min = RandomCompat_intval($min);
56
-        } catch (TypeError $ex) {
58
+        }
59
+        catch (TypeError $ex)
60
+        {
57 61
             throw new TypeError(
58 62
                 'random_int(): $min must be an integer'
59 63
             );
60 64
         }
61 65
 
62
-        try {
66
+        try
67
+        {
63 68
             /** @var int $max */
64 69
             $max = RandomCompat_intval($max);
65
-        } catch (TypeError $ex) {
70
+        }
71
+        catch (TypeError $ex)
72
+        {
66 73
             throw new TypeError(
67 74
                 'random_int(): $max must be an integer'
68 75
             );
@@ -73,13 +80,15 @@  discard block
 block discarded – undo
73 80
          * let's validate the logic then we can move forward with generating random
74 81
          * integers along a given range.
75 82
          */
76
-        if ($min > $max) {
83
+        if ($min > $max)
84
+        {
77 85
             throw new Error(
78 86
                 'Minimum value must be less than or equal to the maximum value'
79 87
             );
80 88
         }
81 89
 
82
-        if ($max === $min) {
90
+        if ($max === $min)
91
+        {
83 92
             return (int) $min;
84 93
         }
85 94
 
@@ -110,7 +119,8 @@  discard block
 block discarded – undo
110 119
         /**
111 120
          * Test for integer overflow:
112 121
          */
113
-        if (!is_int($range)) {
122
+        if (!is_int($range))
123
+        {
114 124
 
115 125
             /**
116 126
              * Still safely calculate wider ranges.
@@ -127,14 +137,18 @@  discard block
 block discarded – undo
127 137
             /** @var int $mask */
128 138
             $mask = ~0;
129 139
 
130
-        } else {
140
+        }
141
+        else
142
+        {
131 143
 
132 144
             /**
133 145
              * $bits is effectively ceil(log($range, 2)) without dealing with
134 146
              * type juggling
135 147
              */
136
-            while ($range > 0) {
137
-                if ($bits % 8 === 0) {
148
+            while ($range > 0)
149
+            {
150
+                if ($bits % 8 === 0)
151
+                {
138 152
                     ++$bytes;
139 153
                 }
140 154
                 ++$bits;
@@ -157,7 +171,8 @@  discard block
 block discarded – undo
157 171
              * The rejection probability is at most 0.5, so this corresponds
158 172
              * to a failure probability of 2^-128 for a working RNG
159 173
              */
160
-            if ($attempts > 128) {
174
+            if ($attempts > 128)
175
+            {
161 176
                 throw new Exception(
162 177
                     'random_int: RNG is broken - too many rejections'
163 178
                 );
@@ -179,7 +194,8 @@  discard block
 block discarded – undo
179 194
              *   204631455
180 195
              */
181 196
             $val &= 0;
182
-            for ($i = 0; $i < $bytes; ++$i) {
197
+            for ($i = 0; $i < $bytes; ++$i)
198
+            {
183 199
                 $val |= ord($randomByteString[$i]) << ($i * 8);
184 200
             }
185 201
             /** @var int $val */
Please login to merge, or discard this patch.
Sources/random_compat/random_bytes_com_dotnet.php 1 patch
Braces   +13 added lines, -6 removed lines patch added patch discarded remove patch
@@ -26,7 +26,8 @@  discard block
 block discarded – undo
26 26
  * SOFTWARE.
27 27
  */
28 28
 
29
-if (!is_callable('random_bytes')) {
29
+if (!is_callable('random_bytes'))
30
+{
30 31
     /**
31 32
      * Windows with PHP < 5.3.0 will not have the function
32 33
      * openssl_random_pseudo_bytes() available, so let's use
@@ -40,16 +41,20 @@  discard block
 block discarded – undo
40 41
      */
41 42
     function random_bytes($bytes)
42 43
     {
43
-        try {
44
+        try
45
+        {
44 46
             /** @var int $bytes */
45 47
             $bytes = RandomCompat_intval($bytes);
46
-        } catch (TypeError $ex) {
48
+        }
49
+        catch (TypeError $ex)
50
+        {
47 51
             throw new TypeError(
48 52
                 'random_bytes(): $bytes must be an integer'
49 53
             );
50 54
         }
51 55
 
52
-        if ($bytes < 1) {
56
+        if ($bytes < 1)
57
+        {
53 58
             throw new Error(
54 59
                 'Length must be greater than 0'
55 60
             );
@@ -57,7 +62,8 @@  discard block
 block discarded – undo
57 62
 
58 63
         /** @var string $buf */
59 64
         $buf = '';
60
-        if (!class_exists('COM')) {
65
+        if (!class_exists('COM'))
66
+        {
61 67
             throw new Error(
62 68
                 'COM does not exist'
63 69
             );
@@ -72,7 +78,8 @@  discard block
 block discarded – undo
72 78
          */
73 79
         do {
74 80
             $buf .= base64_decode((string) $util->GetRandom($bytes, 0));
75
-            if (RandomCompat_strlen($buf) >= $bytes) {
81
+            if (RandomCompat_strlen($buf) >= $bytes)
82
+            {
76 83
                 /**
77 84
                  * Return our random entropy buffer here:
78 85
                  */
Please login to merge, or discard this patch.
Sources/random_compat/error_polyfill.php 1 patch
Braces   +9 added lines, -4 removed lines patch added patch discarded remove patch
@@ -26,7 +26,8 @@  discard block
 block discarded – undo
26 26
  * SOFTWARE.
27 27
  */
28 28
 
29
-if (!class_exists('Error', false)) {
29
+if (!class_exists('Error', false))
30
+{
30 31
     // We can't really avoid making this extend Exception in PHP 5.
31 32
     class Error extends Exception
32 33
     {
@@ -34,13 +35,17 @@  discard block
 block discarded – undo
34 35
     }
35 36
 }
36 37
 
37
-if (!class_exists('TypeError', false)) {
38
-    if (is_subclass_of('Error', 'Exception')) {
38
+if (!class_exists('TypeError', false))
39
+{
40
+    if (is_subclass_of('Error', 'Exception'))
41
+    {
39 42
         class TypeError extends Error
40 43
         {
41 44
             
42 45
         }
43
-    } else {
46
+    }
47
+    else
48
+    {
44 49
         class TypeError extends Exception
45 50
         {
46 51
             
Please login to merge, or discard this patch.
Sources/random_compat/random.php 1 patch
Braces   +35 added lines, -16 removed lines patch added patch discarded remove patch
@@ -29,7 +29,8 @@  discard block
 block discarded – undo
29 29
  * SOFTWARE.
30 30
  */
31 31
 
32
-if (!defined('PHP_VERSION_ID')) {
32
+if (!defined('PHP_VERSION_ID'))
33
+{
33 34
     // This constant was introduced in PHP 5.2.7
34 35
     $RandomCompatversion = array_map('intval', explode('.', PHP_VERSION));
35 36
     define(
@@ -44,11 +45,13 @@  discard block
 block discarded – undo
44 45
 /**
45 46
  * PHP 7.0.0 and newer have these functions natively.
46 47
  */
47
-if (PHP_VERSION_ID >= 70000) {
48
+if (PHP_VERSION_ID >= 70000)
49
+{
48 50
     return;
49 51
 }
50 52
 
51
-if (!defined('RANDOM_COMPAT_READ_BUFFER')) {
53
+if (!defined('RANDOM_COMPAT_READ_BUFFER'))
54
+{
52 55
     define('RANDOM_COMPAT_READ_BUFFER', 8);
53 56
 }
54 57
 
@@ -58,7 +61,8 @@  discard block
 block discarded – undo
58 61
 require_once $RandomCompatDIR . DIRECTORY_SEPARATOR . 'cast_to_int.php';
59 62
 require_once $RandomCompatDIR . DIRECTORY_SEPARATOR . 'error_polyfill.php';
60 63
 
61
-if (!is_callable('random_bytes')) {
64
+if (!is_callable('random_bytes'))
65
+{
62 66
     /**
63 67
      * PHP 5.2.0 - 5.6.x way to implement random_bytes()
64 68
      *
@@ -73,11 +77,15 @@  discard block
 block discarded – undo
73 77
      *
74 78
      * See RATIONALE.md for our reasoning behind this particular order
75 79
      */
76
-    if (extension_loaded('libsodium')) {
80
+    if (extension_loaded('libsodium'))
81
+    {
77 82
         // See random_bytes_libsodium.php
78
-        if (PHP_VERSION_ID >= 50300 && is_callable('\\Sodium\\randombytes_buf')) {
83
+        if (PHP_VERSION_ID >= 50300 && is_callable('\\Sodium\\randombytes_buf'))
84
+        {
79 85
             require_once $RandomCompatDIR . DIRECTORY_SEPARATOR . 'random_bytes_libsodium.php';
80
-        } elseif (method_exists('Sodium', 'randombytes_buf')) {
86
+        }
87
+        elseif (method_exists('Sodium', 'randombytes_buf'))
88
+        {
81 89
             require_once $RandomCompatDIR . DIRECTORY_SEPARATOR . 'random_bytes_libsodium_legacy.php';
82 90
         }
83 91
     }
@@ -85,13 +93,15 @@  discard block
 block discarded – undo
85 93
     /**
86 94
      * Reading directly from /dev/urandom:
87 95
      */
88
-    if (DIRECTORY_SEPARATOR === '/') {
96
+    if (DIRECTORY_SEPARATOR === '/')
97
+    {
89 98
         // DIRECTORY_SEPARATOR === '/' on Unix-like OSes -- this is a fast
90 99
         // way to exclude Windows.
91 100
         $RandomCompatUrandom = true;
92 101
         $RandomCompat_basedir = ini_get('open_basedir');
93 102
 
94
-        if (!empty($RandomCompat_basedir)) {
103
+        if (!empty($RandomCompat_basedir))
104
+        {
95 105
             $RandomCompat_open_basedir = explode(
96 106
                 PATH_SEPARATOR,
97 107
                 strtolower($RandomCompat_basedir)
@@ -121,7 +131,9 @@  discard block
 block discarded – undo
121 131
         }
122 132
         // Unset variables after use
123 133
         $RandomCompat_basedir = null;
124
-    } else {
134
+    }
135
+    else
136
+    {
125 137
         $RandomCompatUrandom = false;
126 138
     }
127 139
 
@@ -179,14 +191,19 @@  discard block
 block discarded – undo
179 191
             strtolower(ini_get('disable_classes'))
180 192
         );
181 193
 
182
-        if (!in_array('com', $RandomCompat_disabled_classes)) {
183
-            try {
194
+        if (!in_array('com', $RandomCompat_disabled_classes))
195
+        {
196
+            try
197
+            {
184 198
                 $RandomCompatCOMtest = new COM('CAPICOM.Utilities.1');
185
-                if (method_exists($RandomCompatCOMtest, 'GetRandom')) {
199
+                if (method_exists($RandomCompatCOMtest, 'GetRandom'))
200
+                {
186 201
                     // See random_bytes_com_dotnet.php
187 202
                     require_once $RandomCompatDIR . DIRECTORY_SEPARATOR . 'random_bytes_com_dotnet.php';
188 203
                 }
189
-            } catch (com_exception $e) {
204
+            }
205
+            catch (com_exception $e)
206
+            {
190 207
                 // Don't try to use it.
191 208
             }
192 209
         }
@@ -197,7 +214,8 @@  discard block
 block discarded – undo
197 214
     /**
198 215
      * throw new Exception
199 216
      */
200
-    if (!is_callable('random_bytes')) {
217
+    if (!is_callable('random_bytes'))
218
+    {
201 219
         /**
202 220
          * We don't have any more options, so let's throw an exception right now
203 221
          * and hope the developer won't let it fail silently.
@@ -218,7 +236,8 @@  discard block
 block discarded – undo
218 236
     }
219 237
 }
220 238
 
221
-if (!is_callable('random_int')) {
239
+if (!is_callable('random_int'))
240
+{
222 241
     require_once $RandomCompatDIR . DIRECTORY_SEPARATOR . 'random_int.php';
223 242
 }
224 243
 
Please login to merge, or discard this patch.
Sources/random_compat/cast_to_int.php 1 patch
Braces   +12 added lines, -5 removed lines patch added patch discarded remove patch
@@ -26,7 +26,8 @@  discard block
 block discarded – undo
26 26
  * SOFTWARE.
27 27
  */
28 28
 
29
-if (!is_callable('RandomCompat_intval')) {
29
+if (!is_callable('RandomCompat_intval'))
30
+{
30 31
     
31 32
     /**
32 33
      * Cast to an integer if we can, safely.
@@ -47,9 +48,12 @@  discard block
 block discarded – undo
47 48
      */
48 49
     function RandomCompat_intval($number, $fail_open = false)
49 50
     {
50
-        if (is_int($number) || is_float($number)) {
51
+        if (is_int($number) || is_float($number))
52
+        {
51 53
             $number += 0;
52
-        } elseif (is_numeric($number)) {
54
+        }
55
+        elseif (is_numeric($number))
56
+        {
53 57
             /** @psalm-suppress InvalidOperand */
54 58
             $number += 0;
55 59
         }
@@ -65,9 +69,12 @@  discard block
 block discarded – undo
65 69
             $number = (int) $number;
66 70
         }
67 71
 
68
-        if (is_int($number)) {
72
+        if (is_int($number))
73
+        {
69 74
             return (int) $number;
70
-        } elseif (!$fail_open) {
75
+        }
76
+        elseif (!$fail_open)
77
+        {
71 78
             throw new TypeError(
72 79
                 'Expected an integer.'
73 80
             );
Please login to merge, or discard this patch.
Sources/random_compat/random_bytes_libsodium_legacy.php 1 patch
Braces   +20 added lines, -9 removed lines patch added patch discarded remove patch
@@ -26,7 +26,8 @@  discard block
 block discarded – undo
26 26
  * SOFTWARE.
27 27
  */
28 28
 
29
-if (!is_callable('random_bytes')) {
29
+if (!is_callable('random_bytes'))
30
+{
30 31
     /**
31 32
      * If the libsodium PHP extension is loaded, we'll use it above any other
32 33
      * solution.
@@ -42,16 +43,20 @@  discard block
 block discarded – undo
42 43
      */
43 44
     function random_bytes($bytes)
44 45
     {
45
-        try {
46
+        try
47
+        {
46 48
             /** @var int $bytes */
47 49
             $bytes = RandomCompat_intval($bytes);
48
-        } catch (TypeError $ex) {
50
+        }
51
+        catch (TypeError $ex)
52
+        {
49 53
             throw new TypeError(
50 54
                 'random_bytes(): $bytes must be an integer'
51 55
             );
52 56
         }
53 57
 
54
-        if ($bytes < 1) {
58
+        if ($bytes < 1)
59
+        {
55 60
             throw new Error(
56 61
                 'Length must be greater than 0'
57 62
             );
@@ -66,19 +71,25 @@  discard block
 block discarded – undo
66 71
          * \Sodium\randombytes_buf() doesn't allow more than 2147483647 bytes to be
67 72
          * generated in one invocation.
68 73
          */
69
-        if ($bytes > 2147483647) {
70
-            for ($i = 0; $i < $bytes; $i += 1073741824) {
74
+        if ($bytes > 2147483647)
75
+        {
76
+            for ($i = 0; $i < $bytes; $i += 1073741824)
77
+            {
71 78
                 $n = ($bytes - $i) > 1073741824
72 79
                     ? 1073741824
73 80
                     : $bytes - $i;
74 81
                 $buf .= Sodium::randombytes_buf((int) $n);
75 82
             }
76
-        } else {
83
+        }
84
+        else
85
+        {
77 86
             $buf .= Sodium::randombytes_buf((int) $bytes);
78 87
         }
79 88
 
80
-        if (is_string($buf)) {
81
-            if (RandomCompat_strlen($buf) === $bytes) {
89
+        if (is_string($buf))
90
+        {
91
+            if (RandomCompat_strlen($buf) === $bytes)
92
+            {
82 93
                 return $buf;
83 94
             }
84 95
         }
Please login to merge, or discard this patch.
Sources/random_compat/random_bytes_libsodium.php 1 patch
Braces   +20 added lines, -9 removed lines patch added patch discarded remove patch
@@ -26,7 +26,8 @@  discard block
 block discarded – undo
26 26
  * SOFTWARE.
27 27
  */
28 28
 
29
-if (!is_callable('random_bytes')) {
29
+if (!is_callable('random_bytes'))
30
+{
30 31
     /**
31 32
      * If the libsodium PHP extension is loaded, we'll use it above any other
32 33
      * solution.
@@ -42,16 +43,20 @@  discard block
 block discarded – undo
42 43
      */
43 44
     function random_bytes($bytes)
44 45
     {
45
-        try {
46
+        try
47
+        {
46 48
             /** @var int $bytes */
47 49
             $bytes = RandomCompat_intval($bytes);
48
-        } catch (TypeError $ex) {
50
+        }
51
+        catch (TypeError $ex)
52
+        {
49 53
             throw new TypeError(
50 54
                 'random_bytes(): $bytes must be an integer'
51 55
             );
52 56
         }
53 57
 
54
-        if ($bytes < 1) {
58
+        if ($bytes < 1)
59
+        {
55 60
             throw new Error(
56 61
                 'Length must be greater than 0'
57 62
             );
@@ -62,21 +67,27 @@  discard block
 block discarded – undo
62 67
          * generated in one invocation.
63 68
          */
64 69
         /** @var string|bool $buf */
65
-        if ($bytes > 2147483647) {
70
+        if ($bytes > 2147483647)
71
+        {
66 72
             $buf = '';
67
-            for ($i = 0; $i < $bytes; $i += 1073741824) {
73
+            for ($i = 0; $i < $bytes; $i += 1073741824)
74
+            {
68 75
                 $n = ($bytes - $i) > 1073741824
69 76
                     ? 1073741824
70 77
                     : $bytes - $i;
71 78
                 $buf .= \Sodium\randombytes_buf($n);
72 79
             }
73
-        } else {
80
+        }
81
+        else
82
+        {
74 83
             /** @var string|bool $buf */
75 84
             $buf = \Sodium\randombytes_buf($bytes);
76 85
         }
77 86
 
78
-        if (is_string($buf)) {
79
-            if (RandomCompat_strlen($buf) === $bytes) {
87
+        if (is_string($buf))
88
+        {
89
+            if (RandomCompat_strlen($buf) === $bytes)
90
+            {
80 91
                 return $buf;
81 92
             }
82 93
         }
Please login to merge, or discard this patch.