@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | */ |
172 | 172 | function Crypt_RC4() |
173 | 173 | { |
174 | - if ( !defined('CRYPT_RC4_MODE') ) { |
|
174 | + if (!defined('CRYPT_RC4_MODE')) { |
|
175 | 175 | switch (true) { |
176 | 176 | case extension_loaded('mcrypt') && (defined('MCRYPT_ARCFOUR') || defined('MCRYPT_RC4')) && in_array('arcfour', mcrypt_list_algorithms()): |
177 | 177 | define('CRYPT_RC4_MODE', CRYPT_RC4_MODE_MCRYPT); |
@@ -181,7 +181,7 @@ discard block |
||
181 | 181 | } |
182 | 182 | } |
183 | 183 | |
184 | - switch ( CRYPT_RC4_MODE ) { |
|
184 | + switch (CRYPT_RC4_MODE) { |
|
185 | 185 | case CRYPT_RC4_MODE_MCRYPT: |
186 | 186 | switch (true) { |
187 | 187 | case defined('MCRYPT_ARCFOUR'): |
@@ -209,7 +209,7 @@ discard block |
||
209 | 209 | { |
210 | 210 | $this->key = $key; |
211 | 211 | |
212 | - if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) { |
|
212 | + if (CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT) { |
|
213 | 213 | mcrypt_generic_init($this->encryptStream, $this->key, ''); |
214 | 214 | mcrypt_generic_init($this->decryptStream, $this->key, ''); |
215 | 215 | return; |
@@ -249,7 +249,7 @@ discard block |
||
249 | 249 | |
250 | 250 | switch ($method) { |
251 | 251 | default: // 'pbkdf2' |
252 | - list(, , $hash, $salt, $count) = func_get_args(); |
|
252 | + list(,, $hash, $salt, $count) = func_get_args(); |
|
253 | 253 | if (!isset($hash)) { |
254 | 254 | $hash = 'sha1'; |
255 | 255 | } |
@@ -276,12 +276,12 @@ discard block |
||
276 | 276 | $hmac = new Crypt_Hash(); |
277 | 277 | $hmac->setHash($hash); |
278 | 278 | $hmac->setKey($password); |
279 | - $f = $u = $hmac->hash($salt . pack('N', $i++)); |
|
279 | + $f = $u = $hmac->hash($salt.pack('N', $i++)); |
|
280 | 280 | for ($j = 2; $j <= $count; $j++) { |
281 | 281 | $u = $hmac->hash($u); |
282 | - $f^= $u; |
|
282 | + $f ^= $u; |
|
283 | 283 | } |
284 | - $key.= $f; |
|
284 | + $key .= $f; |
|
285 | 285 | } |
286 | 286 | } |
287 | 287 | |
@@ -349,7 +349,7 @@ discard block |
||
349 | 349 | */ |
350 | 350 | function _crypt($text, $mode) |
351 | 351 | { |
352 | - if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) { |
|
352 | + if (CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT) { |
|
353 | 353 | $keyStream = $mode == CRYPT_RC4_ENCRYPT ? 'encryptStream' : 'decryptStream'; |
354 | 354 | |
355 | 355 | if (!$this->continuousBuffer) { |
@@ -381,7 +381,7 @@ discard block |
||
381 | 381 | $keyStream[$i] = $keyStream[$j]; |
382 | 382 | $keyStream[$j] = $temp; |
383 | 383 | $temp = $keyStream[($keyStream[$i] + $keyStream[$j]) & 255]; |
384 | - $newText.= chr(ord($text[$k]) ^ $temp); |
|
384 | + $newText .= chr(ord($text[$k]) ^ $temp); |
|
385 | 385 | } |
386 | 386 | |
387 | 387 | if ($this->continuousBuffer) { |
@@ -438,7 +438,7 @@ discard block |
||
438 | 438 | */ |
439 | 439 | function enableContinuousBuffer() |
440 | 440 | { |
441 | - if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT ) { |
|
441 | + if (CRYPT_RC4_MODE == CRYPT_RC4_MODE_MCRYPT) { |
|
442 | 442 | mcrypt_generic_init($this->encryptStream, $this->key, ''); |
443 | 443 | mcrypt_generic_init($this->decryptStream, $this->key, ''); |
444 | 444 | } |
@@ -456,7 +456,7 @@ discard block |
||
456 | 456 | */ |
457 | 457 | function disableContinuousBuffer() |
458 | 458 | { |
459 | - if ( CRYPT_RC4_MODE == CRYPT_RC4_MODE_INTERNAL ) { |
|
459 | + if (CRYPT_RC4_MODE == CRYPT_RC4_MODE_INTERNAL) { |
|
460 | 460 | $this->encryptIndex = $this->decryptIndex = array(0, 0); |
461 | 461 | $this->encryptStream = $this->decryptStream = false; |
462 | 462 | } |
@@ -103,7 +103,7 @@ discard block |
||
103 | 103 | */ |
104 | 104 | function Crypt_TripleDES($mode = CRYPT_DES_MODE_CBC) |
105 | 105 | { |
106 | - if ( !defined('CRYPT_DES_MODE') ) { |
|
106 | + if (!defined('CRYPT_DES_MODE')) { |
|
107 | 107 | switch (true) { |
108 | 108 | case extension_loaded('mcrypt') && in_array('tripledes', mcrypt_list_algorithms()): |
109 | 109 | define('CRYPT_DES_MODE', CRYPT_DES_MODE_MCRYPT); |
@@ -113,7 +113,7 @@ discard block |
||
113 | 113 | } |
114 | 114 | } |
115 | 115 | |
116 | - if ( $mode == CRYPT_DES_MODE_3CBC ) { |
|
116 | + if ($mode == CRYPT_DES_MODE_3CBC) { |
|
117 | 117 | $this->mode = CRYPT_DES_MODE_3CBC; |
118 | 118 | $this->des = array( |
119 | 119 | new Crypt_DES(CRYPT_DES_MODE_CBC), |
@@ -130,7 +130,7 @@ discard block |
||
130 | 130 | return; |
131 | 131 | } |
132 | 132 | |
133 | - switch ( CRYPT_DES_MODE ) { |
|
133 | + switch (CRYPT_DES_MODE) { |
|
134 | 134 | case CRYPT_DES_MODE_MCRYPT: |
135 | 135 | switch ($mode) { |
136 | 136 | case CRYPT_DES_MODE_ECB: |
@@ -218,8 +218,8 @@ discard block |
||
218 | 218 | switch (true) { |
219 | 219 | case CRYPT_DES_MODE == CRYPT_DES_MODE_INTERNAL: |
220 | 220 | case $this->mode == CRYPT_DES_MODE_3CBC: |
221 | - $this->des[0]->setKey(substr($key, 0, 8)); |
|
222 | - $this->des[1]->setKey(substr($key, 8, 8)); |
|
221 | + $this->des[0]->setKey(substr($key, 0, 8)); |
|
222 | + $this->des[1]->setKey(substr($key, 8, 8)); |
|
223 | 223 | $this->des[2]->setKey(substr($key, 16, 8)); |
224 | 224 | |
225 | 225 | // Merge the three DES-1-dim-key-arrays for 3DES-inline-en/decrypting |
@@ -258,7 +258,7 @@ discard block |
||
258 | 258 | |
259 | 259 | switch ($method) { |
260 | 260 | default: // 'pbkdf2' |
261 | - list(, , $hash, $salt, $count) = func_get_args(); |
|
261 | + list(,, $hash, $salt, $count) = func_get_args(); |
|
262 | 262 | if (!isset($hash)) { |
263 | 263 | $hash = 'sha1'; |
264 | 264 | } |
@@ -281,12 +281,12 @@ discard block |
||
281 | 281 | $hmac = new Crypt_Hash(); |
282 | 282 | $hmac->setHash($hash); |
283 | 283 | $hmac->setKey($password); |
284 | - $f = $u = $hmac->hash($salt . pack('N', $i++)); |
|
284 | + $f = $u = $hmac->hash($salt.pack('N', $i++)); |
|
285 | 285 | for ($j = 2; $j <= $count; $j++) { |
286 | 286 | $u = $hmac->hash($u); |
287 | - $f^= $u; |
|
287 | + $f ^= $u; |
|
288 | 288 | } |
289 | - $key.= $f; |
|
289 | + $key .= $f; |
|
290 | 290 | } |
291 | 291 | } |
292 | 292 | |
@@ -332,7 +332,7 @@ discard block |
||
332 | 332 | return $ciphertext; |
333 | 333 | } |
334 | 334 | |
335 | - if ( CRYPT_DES_MODE == CRYPT_DES_MODE_MCRYPT ) { |
|
335 | + if (CRYPT_DES_MODE == CRYPT_DES_MODE_MCRYPT) { |
|
336 | 336 | if ($this->enchanged) { |
337 | 337 | mcrypt_generic_init($this->enmcrypt, $this->key, $this->encryptIV); |
338 | 338 | if ($this->mode == 'ncfb') { |
@@ -354,11 +354,11 @@ discard block |
||
354 | 354 | $max = 8 - $pos; |
355 | 355 | if ($len >= $max) { |
356 | 356 | $i = $max; |
357 | - $len-= $max; |
|
357 | + $len -= $max; |
|
358 | 358 | $pos = 0; |
359 | 359 | } else { |
360 | 360 | $i = $len; |
361 | - $pos+= $len; |
|
361 | + $pos += $len; |
|
362 | 362 | $len = 0; |
363 | 363 | } |
364 | 364 | $ciphertext = substr($iv, $orig_pos) ^ $plaintext; |
@@ -371,16 +371,16 @@ discard block |
||
371 | 371 | mcrypt_generic_init($this->enmcrypt, $this->key, $iv); |
372 | 372 | $this->enbuffer['enmcrypt_init'] = false; |
373 | 373 | } |
374 | - $ciphertext.= mcrypt_generic($this->enmcrypt, substr($plaintext, $i, $len - $len % 8)); |
|
374 | + $ciphertext .= mcrypt_generic($this->enmcrypt, substr($plaintext, $i, $len - $len % 8)); |
|
375 | 375 | $iv = substr($ciphertext, -8); |
376 | 376 | $i = strlen($ciphertext); |
377 | - $len%= 8; |
|
377 | + $len %= 8; |
|
378 | 378 | } else { |
379 | 379 | while ($len >= 8) { |
380 | 380 | $iv = mcrypt_generic($this->ecb, $iv) ^ substr($plaintext, $i, 8); |
381 | - $ciphertext.= $iv; |
|
382 | - $len-= 8; |
|
383 | - $i+= 8; |
|
381 | + $ciphertext .= $iv; |
|
382 | + $len -= 8; |
|
383 | + $i += 8; |
|
384 | 384 | } |
385 | 385 | } |
386 | 386 | } |
@@ -388,7 +388,7 @@ discard block |
||
388 | 388 | $iv = mcrypt_generic($this->ecb, $iv); |
389 | 389 | $block = $iv ^ substr($plaintext, $i); |
390 | 390 | $iv = substr_replace($iv, $block, 0, $len); |
391 | - $ciphertext.= $block; |
|
391 | + $ciphertext .= $block; |
|
392 | 392 | $pos = $len; |
393 | 393 | } |
394 | 394 | return $ciphertext; |
@@ -419,7 +419,7 @@ discard block |
||
419 | 419 | $ciphertext = ''; |
420 | 420 | switch ($this->mode) { |
421 | 421 | case CRYPT_DES_MODE_ECB: |
422 | - for ($i = 0; $i < strlen($plaintext); $i+=8) { |
|
422 | + for ($i = 0; $i < strlen($plaintext); $i += 8) { |
|
423 | 423 | $block = substr($plaintext, $i, 8); |
424 | 424 | // all of these _processBlock calls could, in theory, be put in a function - say Crypt_TripleDES::_ede_encrypt() or something. |
425 | 425 | // only problem with that: it would slow encryption and decryption down. $this->des would have to be called every time that |
@@ -430,18 +430,18 @@ discard block |
||
430 | 430 | $block = $des[0]->_processBlock($block, CRYPT_DES_ENCRYPT); |
431 | 431 | $block = $des[1]->_processBlock($block, CRYPT_DES_DECRYPT); |
432 | 432 | $block = $des[2]->_processBlock($block, CRYPT_DES_ENCRYPT); |
433 | - $ciphertext.= $block; |
|
433 | + $ciphertext .= $block; |
|
434 | 434 | } |
435 | 435 | break; |
436 | 436 | case CRYPT_DES_MODE_CBC: |
437 | 437 | $xor = $this->encryptIV; |
438 | - for ($i = 0; $i < strlen($plaintext); $i+=8) { |
|
438 | + for ($i = 0; $i < strlen($plaintext); $i += 8) { |
|
439 | 439 | $block = substr($plaintext, $i, 8) ^ $xor; |
440 | 440 | $block = $des[0]->_processBlock($block, CRYPT_DES_ENCRYPT); |
441 | 441 | $block = $des[1]->_processBlock($block, CRYPT_DES_DECRYPT); |
442 | 442 | $block = $des[2]->_processBlock($block, CRYPT_DES_ENCRYPT); |
443 | 443 | $xor = $block; |
444 | - $ciphertext.= $block; |
|
444 | + $ciphertext .= $block; |
|
445 | 445 | } |
446 | 446 | if ($this->continuousBuffer) { |
447 | 447 | $this->encryptIV = $xor; |
@@ -450,41 +450,41 @@ discard block |
||
450 | 450 | case CRYPT_DES_MODE_CTR: |
451 | 451 | $xor = $this->encryptIV; |
452 | 452 | if (strlen($buffer['encrypted'])) { |
453 | - for ($i = 0; $i < strlen($plaintext); $i+=8) { |
|
453 | + for ($i = 0; $i < strlen($plaintext); $i += 8) { |
|
454 | 454 | $block = substr($plaintext, $i, 8); |
455 | 455 | if (strlen($block) > strlen($buffer['encrypted'])) { |
456 | 456 | $key = $this->_generate_xor($xor); |
457 | 457 | $key = $des[0]->_processBlock($key, CRYPT_DES_ENCRYPT); |
458 | 458 | $key = $des[1]->_processBlock($key, CRYPT_DES_DECRYPT); |
459 | 459 | $key = $des[2]->_processBlock($key, CRYPT_DES_ENCRYPT); |
460 | - $buffer['encrypted'].= $key; |
|
460 | + $buffer['encrypted'] .= $key; |
|
461 | 461 | } |
462 | 462 | $key = $this->_string_shift($buffer['encrypted']); |
463 | - $ciphertext.= $block ^ $key; |
|
463 | + $ciphertext .= $block ^ $key; |
|
464 | 464 | } |
465 | 465 | } else { |
466 | - for ($i = 0; $i < strlen($plaintext); $i+=8) { |
|
466 | + for ($i = 0; $i < strlen($plaintext); $i += 8) { |
|
467 | 467 | $block = substr($plaintext, $i, 8); |
468 | 468 | $key = $this->_generate_xor($xor); |
469 | 469 | $key = $des[0]->_processBlock($key, CRYPT_DES_ENCRYPT); |
470 | 470 | $key = $des[1]->_processBlock($key, CRYPT_DES_DECRYPT); |
471 | 471 | $key = $des[2]->_processBlock($key, CRYPT_DES_ENCRYPT); |
472 | - $ciphertext.= $block ^ $key; |
|
472 | + $ciphertext .= $block ^ $key; |
|
473 | 473 | } |
474 | 474 | } |
475 | 475 | if ($this->continuousBuffer) { |
476 | 476 | $this->encryptIV = $xor; |
477 | 477 | if ($start = strlen($plaintext) & 7) { |
478 | - $buffer['encrypted'] = substr($key, $start) . $buffer['encrypted']; |
|
478 | + $buffer['encrypted'] = substr($key, $start).$buffer['encrypted']; |
|
479 | 479 | } |
480 | 480 | } |
481 | 481 | break; |
482 | 482 | case CRYPT_DES_MODE_CFB: |
483 | 483 | if (strlen($buffer['xor'])) { |
484 | 484 | $ciphertext = $plaintext ^ $buffer['xor']; |
485 | - $iv = $buffer['encrypted'] . $ciphertext; |
|
485 | + $iv = $buffer['encrypted'].$ciphertext; |
|
486 | 486 | $start = strlen($ciphertext); |
487 | - $buffer['encrypted'].= $ciphertext; |
|
487 | + $buffer['encrypted'] .= $ciphertext; |
|
488 | 488 | $buffer['xor'] = substr($buffer['xor'], strlen($ciphertext)); |
489 | 489 | } else { |
490 | 490 | $ciphertext = ''; |
@@ -492,11 +492,11 @@ discard block |
||
492 | 492 | $start = 0; |
493 | 493 | } |
494 | 494 | |
495 | - for ($i = $start; $i < strlen($plaintext); $i+=8) { |
|
495 | + for ($i = $start; $i < strlen($plaintext); $i += 8) { |
|
496 | 496 | $block = substr($plaintext, $i, 8); |
497 | 497 | $iv = $des[0]->_processBlock($iv, CRYPT_DES_ENCRYPT); |
498 | 498 | $iv = $des[1]->_processBlock($iv, CRYPT_DES_DECRYPT); |
499 | - $xor= $des[2]->_processBlock($iv, CRYPT_DES_ENCRYPT); |
|
499 | + $xor = $des[2]->_processBlock($iv, CRYPT_DES_ENCRYPT); |
|
500 | 500 | |
501 | 501 | $iv = $block ^ $xor; |
502 | 502 | if ($continuousBuffer && strlen($iv) != 8) { |
@@ -505,7 +505,7 @@ discard block |
||
505 | 505 | 'xor' => substr($xor, strlen($iv)) |
506 | 506 | ); |
507 | 507 | } |
508 | - $ciphertext.= $iv; |
|
508 | + $ciphertext .= $iv; |
|
509 | 509 | } |
510 | 510 | |
511 | 511 | if ($this->continuousBuffer) { |
@@ -515,30 +515,30 @@ discard block |
||
515 | 515 | case CRYPT_DES_MODE_OFB: |
516 | 516 | $xor = $this->encryptIV; |
517 | 517 | if (strlen($buffer['xor'])) { |
518 | - for ($i = 0; $i < strlen($plaintext); $i+=8) { |
|
518 | + for ($i = 0; $i < strlen($plaintext); $i += 8) { |
|
519 | 519 | $block = substr($plaintext, $i, 8); |
520 | 520 | if (strlen($block) > strlen($buffer['xor'])) { |
521 | 521 | $xor = $des[0]->_processBlock($xor, CRYPT_DES_ENCRYPT); |
522 | 522 | $xor = $des[1]->_processBlock($xor, CRYPT_DES_DECRYPT); |
523 | 523 | $xor = $des[2]->_processBlock($xor, CRYPT_DES_ENCRYPT); |
524 | - $buffer['xor'].= $xor; |
|
524 | + $buffer['xor'] .= $xor; |
|
525 | 525 | } |
526 | 526 | $key = $this->_string_shift($buffer['xor']); |
527 | - $ciphertext.= $block ^ $key; |
|
527 | + $ciphertext .= $block ^ $key; |
|
528 | 528 | } |
529 | 529 | } else { |
530 | - for ($i = 0; $i < strlen($plaintext); $i+=8) { |
|
530 | + for ($i = 0; $i < strlen($plaintext); $i += 8) { |
|
531 | 531 | $xor = $des[0]->_processBlock($xor, CRYPT_DES_ENCRYPT); |
532 | 532 | $xor = $des[1]->_processBlock($xor, CRYPT_DES_DECRYPT); |
533 | 533 | $xor = $des[2]->_processBlock($xor, CRYPT_DES_ENCRYPT); |
534 | - $ciphertext.= substr($plaintext, $i, 8) ^ $xor; |
|
534 | + $ciphertext .= substr($plaintext, $i, 8) ^ $xor; |
|
535 | 535 | } |
536 | 536 | $key = $xor; |
537 | 537 | } |
538 | 538 | if ($this->continuousBuffer) { |
539 | 539 | $this->encryptIV = $xor; |
540 | 540 | if ($start = strlen($plaintext) & 7) { |
541 | - $buffer['xor'] = substr($key, $start) . $buffer['xor']; |
|
541 | + $buffer['xor'] = substr($key, $start).$buffer['xor']; |
|
542 | 542 | } |
543 | 543 | } |
544 | 544 | } |
@@ -566,7 +566,7 @@ discard block |
||
566 | 566 | $ciphertext = str_pad($ciphertext, (strlen($ciphertext) + 7) & 0xFFFFFFF8, chr(0)); |
567 | 567 | } |
568 | 568 | |
569 | - if ( CRYPT_DES_MODE == CRYPT_DES_MODE_MCRYPT ) { |
|
569 | + if (CRYPT_DES_MODE == CRYPT_DES_MODE_MCRYPT) { |
|
570 | 570 | if ($this->dechanged) { |
571 | 571 | mcrypt_generic_init($this->demcrypt, $this->key, $this->decryptIV); |
572 | 572 | if ($this->mode == 'ncfb') { |
@@ -588,11 +588,11 @@ discard block |
||
588 | 588 | $max = 8 - $pos; |
589 | 589 | if ($len >= $max) { |
590 | 590 | $i = $max; |
591 | - $len-= $max; |
|
591 | + $len -= $max; |
|
592 | 592 | $pos = 0; |
593 | 593 | } else { |
594 | 594 | $i = $len; |
595 | - $pos+= $len; |
|
595 | + $pos += $len; |
|
596 | 596 | $len = 0; |
597 | 597 | } |
598 | 598 | $plaintext = substr($iv, $orig_pos) ^ $ciphertext; |
@@ -600,14 +600,14 @@ discard block |
||
600 | 600 | } |
601 | 601 | if ($len >= 8) { |
602 | 602 | $cb = substr($ciphertext, $i, $len - $len % 8); |
603 | - $plaintext.= mcrypt_generic($this->ecb, $iv . $cb) ^ $cb; |
|
603 | + $plaintext .= mcrypt_generic($this->ecb, $iv.$cb) ^ $cb; |
|
604 | 604 | $iv = substr($cb, -8); |
605 | - $len%= 8; |
|
605 | + $len %= 8; |
|
606 | 606 | } |
607 | 607 | if ($len) { |
608 | 608 | $iv = mcrypt_generic($this->ecb, $iv); |
609 | 609 | $cb = substr($ciphertext, -$len); |
610 | - $plaintext.= $iv ^ $cb; |
|
610 | + $plaintext .= $iv ^ $cb; |
|
611 | 611 | $iv = substr_replace($iv, $cb, 0, $len); |
612 | 612 | $pos = $len; |
613 | 613 | } |
@@ -639,22 +639,22 @@ discard block |
||
639 | 639 | $plaintext = ''; |
640 | 640 | switch ($this->mode) { |
641 | 641 | case CRYPT_DES_MODE_ECB: |
642 | - for ($i = 0; $i < strlen($ciphertext); $i+=8) { |
|
642 | + for ($i = 0; $i < strlen($ciphertext); $i += 8) { |
|
643 | 643 | $block = substr($ciphertext, $i, 8); |
644 | 644 | $block = $des[2]->_processBlock($block, CRYPT_DES_DECRYPT); |
645 | 645 | $block = $des[1]->_processBlock($block, CRYPT_DES_ENCRYPT); |
646 | 646 | $block = $des[0]->_processBlock($block, CRYPT_DES_DECRYPT); |
647 | - $plaintext.= $block; |
|
647 | + $plaintext .= $block; |
|
648 | 648 | } |
649 | 649 | break; |
650 | 650 | case CRYPT_DES_MODE_CBC: |
651 | 651 | $xor = $this->decryptIV; |
652 | - for ($i = 0; $i < strlen($ciphertext); $i+=8) { |
|
652 | + for ($i = 0; $i < strlen($ciphertext); $i += 8) { |
|
653 | 653 | $orig = $block = substr($ciphertext, $i, 8); |
654 | 654 | $block = $des[2]->_processBlock($block, CRYPT_DES_DECRYPT); |
655 | 655 | $block = $des[1]->_processBlock($block, CRYPT_DES_ENCRYPT); |
656 | 656 | $block = $des[0]->_processBlock($block, CRYPT_DES_DECRYPT); |
657 | - $plaintext.= $block ^ $xor; |
|
657 | + $plaintext .= $block ^ $xor; |
|
658 | 658 | $xor = $orig; |
659 | 659 | } |
660 | 660 | if ($this->continuousBuffer) { |
@@ -664,39 +664,39 @@ discard block |
||
664 | 664 | case CRYPT_DES_MODE_CTR: |
665 | 665 | $xor = $this->decryptIV; |
666 | 666 | if (strlen($buffer['ciphertext'])) { |
667 | - for ($i = 0; $i < strlen($ciphertext); $i+=8) { |
|
667 | + for ($i = 0; $i < strlen($ciphertext); $i += 8) { |
|
668 | 668 | $block = substr($ciphertext, $i, 8); |
669 | 669 | if (strlen($block) > strlen($buffer['ciphertext'])) { |
670 | 670 | $key = $this->_generate_xor($xor); |
671 | 671 | $key = $des[0]->_processBlock($key, CRYPT_DES_ENCRYPT); |
672 | 672 | $key = $des[1]->_processBlock($key, CRYPT_DES_DECRYPT); |
673 | 673 | $key = $des[2]->_processBlock($key, CRYPT_DES_ENCRYPT); |
674 | - $buffer['ciphertext'].= $key; |
|
674 | + $buffer['ciphertext'] .= $key; |
|
675 | 675 | } |
676 | 676 | $key = $this->_string_shift($buffer['ciphertext']); |
677 | - $plaintext.= $block ^ $key; |
|
677 | + $plaintext .= $block ^ $key; |
|
678 | 678 | } |
679 | 679 | } else { |
680 | - for ($i = 0; $i < strlen($ciphertext); $i+=8) { |
|
680 | + for ($i = 0; $i < strlen($ciphertext); $i += 8) { |
|
681 | 681 | $block = substr($ciphertext, $i, 8); |
682 | 682 | $key = $this->_generate_xor($xor); |
683 | 683 | $key = $des[0]->_processBlock($key, CRYPT_DES_ENCRYPT); |
684 | 684 | $key = $des[1]->_processBlock($key, CRYPT_DES_DECRYPT); |
685 | 685 | $key = $des[2]->_processBlock($key, CRYPT_DES_ENCRYPT); |
686 | - $plaintext.= $block ^ $key; |
|
686 | + $plaintext .= $block ^ $key; |
|
687 | 687 | } |
688 | 688 | } |
689 | 689 | if ($this->continuousBuffer) { |
690 | 690 | $this->decryptIV = $xor; |
691 | 691 | if ($start = strlen($plaintext) & 7) { |
692 | - $buffer['ciphertext'] = substr($key, $start) . $buffer['ciphertext']; |
|
692 | + $buffer['ciphertext'] = substr($key, $start).$buffer['ciphertext']; |
|
693 | 693 | } |
694 | 694 | } |
695 | 695 | break; |
696 | 696 | case CRYPT_DES_MODE_CFB: |
697 | 697 | if (strlen($buffer['ciphertext'])) { |
698 | 698 | $plaintext = $ciphertext ^ substr($this->decryptIV, strlen($buffer['ciphertext'])); |
699 | - $buffer['ciphertext'].= substr($ciphertext, 0, strlen($plaintext)); |
|
699 | + $buffer['ciphertext'] .= substr($ciphertext, 0, strlen($plaintext)); |
|
700 | 700 | if (strlen($buffer['ciphertext']) != 8) { |
701 | 701 | $block = $this->decryptIV; |
702 | 702 | } else { |
@@ -715,11 +715,11 @@ discard block |
||
715 | 715 | $start = 0; |
716 | 716 | } |
717 | 717 | |
718 | - for ($i = $start; $i < strlen($ciphertext); $i+=8) { |
|
718 | + for ($i = $start; $i < strlen($ciphertext); $i += 8) { |
|
719 | 719 | $block = substr($ciphertext, $i, 8); |
720 | - $plaintext.= $block ^ $xor; |
|
720 | + $plaintext .= $block ^ $xor; |
|
721 | 721 | if ($continuousBuffer && strlen($block) != 8) { |
722 | - $buffer['ciphertext'].= $block; |
|
722 | + $buffer['ciphertext'] .= $block; |
|
723 | 723 | $block = $xor; |
724 | 724 | } else if (strlen($block) == 8) { |
725 | 725 | $xor = $des[0]->_processBlock($block, CRYPT_DES_ENCRYPT); |
@@ -734,30 +734,30 @@ discard block |
||
734 | 734 | case CRYPT_DES_MODE_OFB: |
735 | 735 | $xor = $this->decryptIV; |
736 | 736 | if (strlen($buffer['xor'])) { |
737 | - for ($i = 0; $i < strlen($ciphertext); $i+=8) { |
|
737 | + for ($i = 0; $i < strlen($ciphertext); $i += 8) { |
|
738 | 738 | $block = substr($ciphertext, $i, 8); |
739 | 739 | if (strlen($block) > strlen($buffer['xor'])) { |
740 | 740 | $xor = $des[0]->_processBlock($xor, CRYPT_DES_ENCRYPT); |
741 | 741 | $xor = $des[1]->_processBlock($xor, CRYPT_DES_DECRYPT); |
742 | 742 | $xor = $des[2]->_processBlock($xor, CRYPT_DES_ENCRYPT); |
743 | - $buffer['xor'].= $xor; |
|
743 | + $buffer['xor'] .= $xor; |
|
744 | 744 | } |
745 | 745 | $key = $this->_string_shift($buffer['xor']); |
746 | - $plaintext.= $block ^ $key; |
|
746 | + $plaintext .= $block ^ $key; |
|
747 | 747 | } |
748 | 748 | } else { |
749 | - for ($i = 0; $i < strlen($ciphertext); $i+=8) { |
|
749 | + for ($i = 0; $i < strlen($ciphertext); $i += 8) { |
|
750 | 750 | $xor = $des[0]->_processBlock($xor, CRYPT_DES_ENCRYPT); |
751 | 751 | $xor = $des[1]->_processBlock($xor, CRYPT_DES_DECRYPT); |
752 | 752 | $xor = $des[2]->_processBlock($xor, CRYPT_DES_ENCRYPT); |
753 | - $plaintext.= substr($ciphertext, $i, 8) ^ $xor; |
|
753 | + $plaintext .= substr($ciphertext, $i, 8) ^ $xor; |
|
754 | 754 | } |
755 | 755 | $key = $xor; |
756 | 756 | } |
757 | 757 | if ($this->continuousBuffer) { |
758 | 758 | $this->decryptIV = $xor; |
759 | 759 | if ($start = strlen($ciphertext) & 7) { |
760 | - $buffer['xor'] = substr($key, $start) . $buffer['xor']; |
|
760 | + $buffer['xor'] = substr($key, $start).$buffer['xor']; |
|
761 | 761 | } |
762 | 762 | } |
763 | 763 | } |
@@ -550,13 +550,13 @@ discard block |
||
550 | 550 | ); |
551 | 551 | |
552 | 552 | for ($i = 0; $i < 256; $i++) { |
553 | - $t2[] = (($t3[$i] << 8) & 0xFFFFFF00) | (($t3[$i] >> 24) & 0x000000FF); |
|
553 | + $t2[] = (($t3[$i] << 8) & 0xFFFFFF00) | (($t3[$i] >> 24) & 0x000000FF); |
|
554 | 554 | $t1[] = (($t3[$i] << 16) & 0xFFFF0000) | (($t3[$i] >> 16) & 0x0000FFFF); |
555 | - $t0[] = (($t3[$i] << 24) & 0xFF000000) | (($t3[$i] >> 8) & 0x00FFFFFF); |
|
555 | + $t0[] = (($t3[$i] << 24) & 0xFF000000) | (($t3[$i] >> 8) & 0x00FFFFFF); |
|
556 | 556 | |
557 | - $dt2[] = (($dt3[$i] << 8) & 0xFFFFFF00) | (($dt3[$i] >> 24) & 0x000000FF); |
|
557 | + $dt2[] = (($dt3[$i] << 8) & 0xFFFFFF00) | (($dt3[$i] >> 24) & 0x000000FF); |
|
558 | 558 | $dt1[] = (($dt3[$i] << 16) & 0xFFFF0000) | (($dt3[$i] >> 16) & 0x0000FFFF); |
559 | - $dt0[] = (($dt3[$i] << 24) & 0xFF000000) | (($dt3[$i] >> 8) & 0x00FFFFFF); |
|
559 | + $dt0[] = (($dt3[$i] << 24) & 0xFF000000) | (($dt3[$i] >> 8) & 0x00FFFFFF); |
|
560 | 560 | } |
561 | 561 | |
562 | 562 | // sbox for the S-Box substitution |
@@ -679,7 +679,7 @@ discard block |
||
679 | 679 | |
680 | 680 | switch ($method) { |
681 | 681 | default: // 'pbkdf2' |
682 | - list(, , $hash, $salt, $count) = func_get_args(); |
|
682 | + list(,, $hash, $salt, $count) = func_get_args(); |
|
683 | 683 | if (!isset($hash)) { |
684 | 684 | $hash = 'sha1'; |
685 | 685 | } |
@@ -703,12 +703,12 @@ discard block |
||
703 | 703 | $hmac = new Crypt_Hash(); |
704 | 704 | $hmac->setHash($hash); |
705 | 705 | $hmac->setKey($password); |
706 | - $f = $u = $hmac->hash($salt . pack('N', $i++)); |
|
706 | + $f = $u = $hmac->hash($salt.pack('N', $i++)); |
|
707 | 707 | for ($j = 2; $j <= $count; $j++) { |
708 | 708 | $u = $hmac->hash($u); |
709 | - $f^= $u; |
|
709 | + $f ^= $u; |
|
710 | 710 | } |
711 | - $key.= $f; |
|
711 | + $key .= $f; |
|
712 | 712 | } |
713 | 713 | } |
714 | 714 | |
@@ -755,8 +755,8 @@ discard block |
||
755 | 755 | $block_size = $this->block_size; |
756 | 756 | $num_blocks = floor(($length + ($block_size - 1)) / $block_size); |
757 | 757 | for ($i = 0; $i < $num_blocks; $i++) { |
758 | - $xor.= $iv; |
|
759 | - for ($j = 4; $j <= $block_size; $j+=4) { |
|
758 | + $xor .= $iv; |
|
759 | + for ($j = 4; $j <= $block_size; $j += 4) { |
|
760 | 760 | $temp = substr($iv, -$j, 4); |
761 | 761 | switch ($temp) { |
762 | 762 | case "\xFF\xFF\xFF\xFF": |
@@ -812,17 +812,17 @@ discard block |
||
812 | 812 | $ciphertext = ''; |
813 | 813 | switch ($this->mode) { |
814 | 814 | case CRYPT_RIJNDAEL_MODE_ECB: |
815 | - for ($i = 0; $i < strlen($plaintext); $i+=$block_size) { |
|
816 | - $ciphertext.= $this->_encryptBlock(substr($plaintext, $i, $block_size)); |
|
815 | + for ($i = 0; $i < strlen($plaintext); $i += $block_size) { |
|
816 | + $ciphertext .= $this->_encryptBlock(substr($plaintext, $i, $block_size)); |
|
817 | 817 | } |
818 | 818 | break; |
819 | 819 | case CRYPT_RIJNDAEL_MODE_CBC: |
820 | 820 | $xor = $this->encryptIV; |
821 | - for ($i = 0; $i < strlen($plaintext); $i+=$block_size) { |
|
821 | + for ($i = 0; $i < strlen($plaintext); $i += $block_size) { |
|
822 | 822 | $block = substr($plaintext, $i, $block_size); |
823 | 823 | $block = $this->_encryptBlock($block ^ $xor); |
824 | 824 | $xor = $block; |
825 | - $ciphertext.= $block; |
|
825 | + $ciphertext .= $block; |
|
826 | 826 | } |
827 | 827 | if ($this->continuousBuffer) { |
828 | 828 | $this->encryptIV = $xor; |
@@ -831,25 +831,25 @@ discard block |
||
831 | 831 | case CRYPT_RIJNDAEL_MODE_CTR: |
832 | 832 | $xor = $this->encryptIV; |
833 | 833 | if (strlen($buffer['encrypted'])) { |
834 | - for ($i = 0; $i < strlen($plaintext); $i+=$block_size) { |
|
834 | + for ($i = 0; $i < strlen($plaintext); $i += $block_size) { |
|
835 | 835 | $block = substr($plaintext, $i, $block_size); |
836 | 836 | if (strlen($block) > strlen($buffer['encrypted'])) { |
837 | - $buffer['encrypted'].= $this->_encryptBlock($this->_generate_xor($block_size, $xor)); |
|
837 | + $buffer['encrypted'] .= $this->_encryptBlock($this->_generate_xor($block_size, $xor)); |
|
838 | 838 | } |
839 | 839 | $key = $this->_string_shift($buffer['encrypted'], $block_size); |
840 | - $ciphertext.= $block ^ $key; |
|
840 | + $ciphertext .= $block ^ $key; |
|
841 | 841 | } |
842 | 842 | } else { |
843 | - for ($i = 0; $i < strlen($plaintext); $i+=$block_size) { |
|
843 | + for ($i = 0; $i < strlen($plaintext); $i += $block_size) { |
|
844 | 844 | $block = substr($plaintext, $i, $block_size); |
845 | 845 | $key = $this->_encryptBlock($this->_generate_xor($block_size, $xor)); |
846 | - $ciphertext.= $block ^ $key; |
|
846 | + $ciphertext .= $block ^ $key; |
|
847 | 847 | } |
848 | 848 | } |
849 | 849 | if ($this->continuousBuffer) { |
850 | 850 | $this->encryptIV = $xor; |
851 | 851 | if ($start = strlen($plaintext) % $block_size) { |
852 | - $buffer['encrypted'] = substr($key, $start) . $buffer['encrypted']; |
|
852 | + $buffer['encrypted'] = substr($key, $start).$buffer['encrypted']; |
|
853 | 853 | } |
854 | 854 | } |
855 | 855 | break; |
@@ -870,11 +870,11 @@ discard block |
||
870 | 870 | $max = $block_size - $pos; |
871 | 871 | if ($len >= $max) { |
872 | 872 | $i = $max; |
873 | - $len-= $max; |
|
873 | + $len -= $max; |
|
874 | 874 | $pos = 0; |
875 | 875 | } else { |
876 | 876 | $i = $len; |
877 | - $pos+= $len; |
|
877 | + $pos += $len; |
|
878 | 878 | $len = 0; |
879 | 879 | } |
880 | 880 | // ie. $i = min($max, $len), $len-= $i, $pos+= $i, $pos%= $blocksize |
@@ -883,41 +883,41 @@ discard block |
||
883 | 883 | } |
884 | 884 | while ($len >= $block_size) { |
885 | 885 | $iv = $this->_encryptBlock($iv) ^ substr($plaintext, $i, $block_size); |
886 | - $ciphertext.= $iv; |
|
887 | - $len-= $block_size; |
|
888 | - $i+= $block_size; |
|
886 | + $ciphertext .= $iv; |
|
887 | + $len -= $block_size; |
|
888 | + $i += $block_size; |
|
889 | 889 | } |
890 | 890 | if ($len) { |
891 | 891 | $iv = $this->_encryptBlock($iv); |
892 | 892 | $block = $iv ^ substr($plaintext, $i); |
893 | 893 | $iv = substr_replace($iv, $block, 0, $len); |
894 | - $ciphertext.= $block; |
|
894 | + $ciphertext .= $block; |
|
895 | 895 | $pos = $len; |
896 | 896 | } |
897 | 897 | break; |
898 | 898 | case CRYPT_RIJNDAEL_MODE_OFB: |
899 | 899 | $xor = $this->encryptIV; |
900 | 900 | if (strlen($buffer['xor'])) { |
901 | - for ($i = 0; $i < strlen($plaintext); $i+=$block_size) { |
|
901 | + for ($i = 0; $i < strlen($plaintext); $i += $block_size) { |
|
902 | 902 | $block = substr($plaintext, $i, $block_size); |
903 | 903 | if (strlen($block) > strlen($buffer['xor'])) { |
904 | 904 | $xor = $this->_encryptBlock($xor); |
905 | - $buffer['xor'].= $xor; |
|
905 | + $buffer['xor'] .= $xor; |
|
906 | 906 | } |
907 | 907 | $key = $this->_string_shift($buffer['xor'], $block_size); |
908 | - $ciphertext.= $block ^ $key; |
|
908 | + $ciphertext .= $block ^ $key; |
|
909 | 909 | } |
910 | 910 | } else { |
911 | - for ($i = 0; $i < strlen($plaintext); $i+=$block_size) { |
|
911 | + for ($i = 0; $i < strlen($plaintext); $i += $block_size) { |
|
912 | 912 | $xor = $this->_encryptBlock($xor); |
913 | - $ciphertext.= substr($plaintext, $i, $block_size) ^ $xor; |
|
913 | + $ciphertext .= substr($plaintext, $i, $block_size) ^ $xor; |
|
914 | 914 | } |
915 | 915 | $key = $xor; |
916 | 916 | } |
917 | 917 | if ($this->continuousBuffer) { |
918 | 918 | $this->encryptIV = $xor; |
919 | 919 | if ($start = strlen($plaintext) % $block_size) { |
920 | - $buffer['xor'] = substr($key, $start) . $buffer['xor']; |
|
920 | + $buffer['xor'] = substr($key, $start).$buffer['xor']; |
|
921 | 921 | } |
922 | 922 | } |
923 | 923 | } |
@@ -955,15 +955,15 @@ discard block |
||
955 | 955 | $plaintext = ''; |
956 | 956 | switch ($this->mode) { |
957 | 957 | case CRYPT_RIJNDAEL_MODE_ECB: |
958 | - for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) { |
|
959 | - $plaintext.= $this->_decryptBlock(substr($ciphertext, $i, $block_size)); |
|
958 | + for ($i = 0; $i < strlen($ciphertext); $i += $block_size) { |
|
959 | + $plaintext .= $this->_decryptBlock(substr($ciphertext, $i, $block_size)); |
|
960 | 960 | } |
961 | 961 | break; |
962 | 962 | case CRYPT_RIJNDAEL_MODE_CBC: |
963 | 963 | $xor = $this->decryptIV; |
964 | - for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) { |
|
964 | + for ($i = 0; $i < strlen($ciphertext); $i += $block_size) { |
|
965 | 965 | $block = substr($ciphertext, $i, $block_size); |
966 | - $plaintext.= $this->_decryptBlock($block) ^ $xor; |
|
966 | + $plaintext .= $this->_decryptBlock($block) ^ $xor; |
|
967 | 967 | $xor = $block; |
968 | 968 | } |
969 | 969 | if ($this->continuousBuffer) { |
@@ -973,25 +973,25 @@ discard block |
||
973 | 973 | case CRYPT_RIJNDAEL_MODE_CTR: |
974 | 974 | $xor = $this->decryptIV; |
975 | 975 | if (strlen($buffer['ciphertext'])) { |
976 | - for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) { |
|
976 | + for ($i = 0; $i < strlen($ciphertext); $i += $block_size) { |
|
977 | 977 | $block = substr($ciphertext, $i, $block_size); |
978 | 978 | if (strlen($block) > strlen($buffer['ciphertext'])) { |
979 | - $buffer['ciphertext'].= $this->_encryptBlock($this->_generate_xor($block_size, $xor)); |
|
979 | + $buffer['ciphertext'] .= $this->_encryptBlock($this->_generate_xor($block_size, $xor)); |
|
980 | 980 | } |
981 | 981 | $key = $this->_string_shift($buffer['ciphertext'], $block_size); |
982 | - $plaintext.= $block ^ $key; |
|
982 | + $plaintext .= $block ^ $key; |
|
983 | 983 | } |
984 | 984 | } else { |
985 | - for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) { |
|
985 | + for ($i = 0; $i < strlen($ciphertext); $i += $block_size) { |
|
986 | 986 | $block = substr($ciphertext, $i, $block_size); |
987 | 987 | $key = $this->_encryptBlock($this->_generate_xor($block_size, $xor)); |
988 | - $plaintext.= $block ^ $key; |
|
988 | + $plaintext .= $block ^ $key; |
|
989 | 989 | } |
990 | 990 | } |
991 | 991 | if ($this->continuousBuffer) { |
992 | 992 | $this->decryptIV = $xor; |
993 | 993 | if ($start = strlen($ciphertext) % $block_size) { |
994 | - $buffer['ciphertext'] = substr($key, $start) . $buffer['ciphertext']; |
|
994 | + $buffer['ciphertext'] = substr($key, $start).$buffer['ciphertext']; |
|
995 | 995 | } |
996 | 996 | } |
997 | 997 | break; |
@@ -1010,11 +1010,11 @@ discard block |
||
1010 | 1010 | $max = $block_size - $pos; |
1011 | 1011 | if ($len >= $max) { |
1012 | 1012 | $i = $max; |
1013 | - $len-= $max; |
|
1013 | + $len -= $max; |
|
1014 | 1014 | $pos = 0; |
1015 | 1015 | } else { |
1016 | 1016 | $i = $len; |
1017 | - $pos+= $len; |
|
1017 | + $pos += $len; |
|
1018 | 1018 | $len = 0; |
1019 | 1019 | } |
1020 | 1020 | // ie. $i = min($max, $len), $len-= $i, $pos+= $i, $pos%= $blocksize |
@@ -1024,14 +1024,14 @@ discard block |
||
1024 | 1024 | while ($len >= $block_size) { |
1025 | 1025 | $iv = $this->_encryptBlock($iv); |
1026 | 1026 | $cb = substr($ciphertext, $i, $block_size); |
1027 | - $plaintext.= $iv ^ $cb; |
|
1027 | + $plaintext .= $iv ^ $cb; |
|
1028 | 1028 | $iv = $cb; |
1029 | - $len-= $block_size; |
|
1030 | - $i+= $block_size; |
|
1029 | + $len -= $block_size; |
|
1030 | + $i += $block_size; |
|
1031 | 1031 | } |
1032 | 1032 | if ($len) { |
1033 | 1033 | $iv = $this->_encryptBlock($iv); |
1034 | - $plaintext.= $iv ^ substr($ciphertext, $i); |
|
1034 | + $plaintext .= $iv ^ substr($ciphertext, $i); |
|
1035 | 1035 | $iv = substr_replace($iv, substr($ciphertext, $i), 0, $len); |
1036 | 1036 | $pos = $len; |
1037 | 1037 | } |
@@ -1039,26 +1039,26 @@ discard block |
||
1039 | 1039 | case CRYPT_RIJNDAEL_MODE_OFB: |
1040 | 1040 | $xor = $this->decryptIV; |
1041 | 1041 | if (strlen($buffer['xor'])) { |
1042 | - for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) { |
|
1042 | + for ($i = 0; $i < strlen($ciphertext); $i += $block_size) { |
|
1043 | 1043 | $block = substr($ciphertext, $i, $block_size); |
1044 | 1044 | if (strlen($block) > strlen($buffer['xor'])) { |
1045 | 1045 | $xor = $this->_encryptBlock($xor); |
1046 | - $buffer['xor'].= $xor; |
|
1046 | + $buffer['xor'] .= $xor; |
|
1047 | 1047 | } |
1048 | 1048 | $key = $this->_string_shift($buffer['xor'], $block_size); |
1049 | - $plaintext.= $block ^ $key; |
|
1049 | + $plaintext .= $block ^ $key; |
|
1050 | 1050 | } |
1051 | 1051 | } else { |
1052 | - for ($i = 0; $i < strlen($ciphertext); $i+=$block_size) { |
|
1052 | + for ($i = 0; $i < strlen($ciphertext); $i += $block_size) { |
|
1053 | 1053 | $xor = $this->_encryptBlock($xor); |
1054 | - $plaintext.= substr($ciphertext, $i, $block_size) ^ $xor; |
|
1054 | + $plaintext .= substr($ciphertext, $i, $block_size) ^ $xor; |
|
1055 | 1055 | } |
1056 | 1056 | $key = $xor; |
1057 | 1057 | } |
1058 | 1058 | if ($this->continuousBuffer) { |
1059 | 1059 | $this->decryptIV = $xor; |
1060 | 1060 | if ($start = strlen($ciphertext) % $block_size) { |
1061 | - $buffer['xor'] = substr($key, $start) . $buffer['xor']; |
|
1061 | + $buffer['xor'] = substr($key, $start).$buffer['xor']; |
|
1062 | 1062 | } |
1063 | 1063 | } |
1064 | 1064 | } |
@@ -1111,8 +1111,8 @@ discard block |
||
1111 | 1111 | while ($i < $Nb) { |
1112 | 1112 | $temp[$i] = $t0[$state[$i] >> 24 & 0x000000FF] ^ |
1113 | 1113 | $t1[$state[$j] >> 16 & 0x000000FF] ^ |
1114 | - $t2[$state[$k] >> 8 & 0x000000FF] ^ |
|
1115 | - $t3[$state[$l] & 0x000000FF] ^ |
|
1114 | + $t2[$state[$k] >> 8 & 0x000000FF] ^ |
|
1115 | + $t3[$state[$l] & 0x000000FF] ^ |
|
1116 | 1116 | $w[$round][$i]; |
1117 | 1117 | ++$i; |
1118 | 1118 | $j = ($j + 1) % $Nb; |
@@ -1203,8 +1203,8 @@ discard block |
||
1203 | 1203 | while ($i < $Nb) { |
1204 | 1204 | $temp[$i] = $dt0[$state[$i] >> 24 & 0x000000FF] ^ |
1205 | 1205 | $dt1[$state[$j] >> 16 & 0x000000FF] ^ |
1206 | - $dt2[$state[$k] >> 8 & 0x000000FF] ^ |
|
1207 | - $dt3[$state[$l] & 0x000000FF] ^ |
|
1206 | + $dt2[$state[$k] >> 8 & 0x000000FF] ^ |
|
1207 | + $dt3[$state[$l] & 0x000000FF] ^ |
|
1208 | 1208 | $dw[$round][$i]; |
1209 | 1209 | ++$i; |
1210 | 1210 | $j = ($j + 1) % $Nb; |
@@ -1348,8 +1348,8 @@ discard block |
||
1348 | 1348 | $dw = $this->_subWord($this->w[$row][$j]); |
1349 | 1349 | $temp[$j] = $this->dt0[$dw >> 24 & 0x000000FF] ^ |
1350 | 1350 | $this->dt1[$dw >> 16 & 0x000000FF] ^ |
1351 | - $this->dt2[$dw >> 8 & 0x000000FF] ^ |
|
1352 | - $this->dt3[$dw & 0x000000FF]; |
|
1351 | + $this->dt2[$dw >> 8 & 0x000000FF] ^ |
|
1352 | + $this->dt3[$dw & 0x000000FF]; |
|
1353 | 1353 | $j++; |
1354 | 1354 | } |
1355 | 1355 | $this->dw[$row] = $temp; |
@@ -1392,8 +1392,8 @@ discard block |
||
1392 | 1392 | { |
1393 | 1393 | $sbox = $this->sbox; |
1394 | 1394 | |
1395 | - return $sbox[$word & 0x000000FF] | |
|
1396 | - ($sbox[$word >> 8 & 0x000000FF] << 8) | |
|
1395 | + return $sbox[$word & 0x000000FF] | |
|
1396 | + ($sbox[$word >> 8 & 0x000000FF] << 8) | |
|
1397 | 1397 | ($sbox[$word >> 16 & 0x000000FF] << 16) | |
1398 | 1398 | ($sbox[$word >> 24 & 0x000000FF] << 24); |
1399 | 1399 | } |
@@ -1407,8 +1407,8 @@ discard block |
||
1407 | 1407 | { |
1408 | 1408 | $isbox = $this->isbox; |
1409 | 1409 | |
1410 | - return $isbox[$word & 0x000000FF] | |
|
1411 | - ($isbox[$word >> 8 & 0x000000FF] << 8) | |
|
1410 | + return $isbox[$word & 0x000000FF] | |
|
1411 | + ($isbox[$word >> 8 & 0x000000FF] << 8) | |
|
1412 | 1412 | ($isbox[$word >> 16 & 0x000000FF] << 16) | |
1413 | 1413 | ($isbox[$word >> 24 & 0x000000FF] << 24); |
1414 | 1414 | } |
@@ -1588,7 +1588,7 @@ discard block |
||
1588 | 1588 | // So here we are'nt under the same heavy timing-stress as we are in _de/encryptBlock() or de/encrypt(). |
1589 | 1589 | // However...the here generated function- $code, stored as php callback in $this->inline_crypt, must work as fast as even possible. |
1590 | 1590 | |
1591 | - $lambda_functions =& Crypt_Rijndael::get_lambda_functions(); |
|
1591 | + $lambda_functions = & Crypt_Rijndael::get_lambda_functions(); |
|
1592 | 1592 | $block_size = $this->block_size; |
1593 | 1593 | $mode = $this->mode; |
1594 | 1594 | |
@@ -1609,7 +1609,7 @@ discard block |
||
1609 | 1609 | $init_decryptBlock = 'extract($self->dw, EXTR_PREFIX_ALL, "dw");'; |
1610 | 1610 | } |
1611 | 1611 | |
1612 | - $code_hash = md5("$mode, $block_size, " . implode(',', $w)); |
|
1612 | + $code_hash = md5("$mode, $block_size, ".implode(',', $w)); |
|
1613 | 1613 | |
1614 | 1614 | if (!isset($lambda_functions[$code_hash])) { |
1615 | 1615 | $Nr = $this->Nr; |
@@ -1617,7 +1617,7 @@ discard block |
||
1617 | 1617 | $c = $this->c; |
1618 | 1618 | |
1619 | 1619 | // Generating encrypt code: |
1620 | - $init_encryptBlock.= ' |
|
1620 | + $init_encryptBlock .= ' |
|
1621 | 1621 | $t0 = $self->t0; |
1622 | 1622 | $t1 = $self->t1; |
1623 | 1623 | $t2 = $self->t2; |
@@ -1638,9 +1638,9 @@ discard block |
||
1638 | 1638 | for ($round = 1; $round < $Nr; ++$round) { |
1639 | 1639 | list($s, $e) = array($e, $s); |
1640 | 1640 | for ($i = 0; $i < $Nb; ++$i) { |
1641 | - $_encryptBlock.= |
|
1641 | + $_encryptBlock .= |
|
1642 | 1642 | '$'.$e.$i.' = |
1643 | - $t0[($'.$s.$i .' >> 24) & 0xff] ^ |
|
1643 | + $t0[($'.$s.$i.' >> 24) & 0xff] ^ |
|
1644 | 1644 | $t1[($'.$s.(($i + $c[1]) % $Nb).' >> 16) & 0xff] ^ |
1645 | 1645 | $t2[($'.$s.(($i + $c[2]) % $Nb).' >> 8) & 0xff] ^ |
1646 | 1646 | $t3[ $'.$s.(($i + $c[3]) % $Nb).' & 0xff] ^ |
@@ -1650,7 +1650,7 @@ discard block |
||
1650 | 1650 | |
1651 | 1651 | // Finalround: subWord + shiftRows + addRoundKey |
1652 | 1652 | for ($i = 0; $i < $Nb; ++$i) { |
1653 | - $_encryptBlock.= |
|
1653 | + $_encryptBlock .= |
|
1654 | 1654 | '$'.$e.$i.' = |
1655 | 1655 | $sbox[ $'.$e.$i.' & 0xff] | |
1656 | 1656 | ($sbox[($'.$e.$i.' >> 8) & 0xff] << 8) | |
@@ -1659,8 +1659,8 @@ discard block |
||
1659 | 1659 | } |
1660 | 1660 | $_encryptBlock .= '$in = pack("N*"'."\n"; |
1661 | 1661 | for ($i = 0; $i < $Nb; ++$i) { |
1662 | - $_encryptBlock.= ', |
|
1663 | - ($'.$e.$i .' & 0xFF000000) ^ |
|
1662 | + $_encryptBlock .= ', |
|
1663 | + ($'.$e.$i.' & 0xFF000000) ^ |
|
1664 | 1664 | ($'.$e.(($i + $c[1]) % $Nb).' & 0x00FF0000) ^ |
1665 | 1665 | ($'.$e.(($i + $c[2]) % $Nb).' & 0x0000FF00) ^ |
1666 | 1666 | ($'.$e.(($i + $c[3]) % $Nb).' & 0x000000FF) ^ |
@@ -1669,7 +1669,7 @@ discard block |
||
1669 | 1669 | $_encryptBlock .= ');'; |
1670 | 1670 | |
1671 | 1671 | // Generating decrypt code: |
1672 | - $init_decryptBlock.= ' |
|
1672 | + $init_decryptBlock .= ' |
|
1673 | 1673 | $dt0 = $self->dt0; |
1674 | 1674 | $dt1 = $self->dt1; |
1675 | 1675 | $dt2 = $self->dt2; |
@@ -1690,9 +1690,9 @@ discard block |
||
1690 | 1690 | for ($round = 1; $round < $Nr; ++$round) { |
1691 | 1691 | list($s, $e) = array($e, $s); |
1692 | 1692 | for ($i = 0; $i < $Nb; ++$i) { |
1693 | - $_decryptBlock.= |
|
1693 | + $_decryptBlock .= |
|
1694 | 1694 | '$'.$e.$i.' = |
1695 | - $dt0[($'.$s.$i .' >> 24) & 0xff] ^ |
|
1695 | + $dt0[($'.$s.$i.' >> 24) & 0xff] ^ |
|
1696 | 1696 | $dt1[($'.$s.(($Nb + $i - $c[1]) % $Nb).' >> 16) & 0xff] ^ |
1697 | 1697 | $dt2[($'.$s.(($Nb + $i - $c[2]) % $Nb).' >> 8) & 0xff] ^ |
1698 | 1698 | $dt3[ $'.$s.(($Nb + $i - $c[3]) % $Nb).' & 0xff] ^ |
@@ -1702,7 +1702,7 @@ discard block |
||
1702 | 1702 | |
1703 | 1703 | // Finalround: subWord + shiftRows + addRoundKey |
1704 | 1704 | for ($i = 0; $i < $Nb; ++$i) { |
1705 | - $_decryptBlock.= |
|
1705 | + $_decryptBlock .= |
|
1706 | 1706 | '$'.$e.$i.' = |
1707 | 1707 | $isbox[ $'.$e.$i.' & 0xff] | |
1708 | 1708 | ($isbox[($'.$e.$i.' >> 8) & 0xff] << 8) | |
@@ -1711,8 +1711,8 @@ discard block |
||
1711 | 1711 | } |
1712 | 1712 | $_decryptBlock .= '$in = pack("N*"'."\n"; |
1713 | 1713 | for ($i = 0; $i < $Nb; ++$i) { |
1714 | - $_decryptBlock.= ', |
|
1715 | - ($'.$e.$i. ' & 0xFF000000) ^ |
|
1714 | + $_decryptBlock .= ', |
|
1715 | + ($'.$e.$i.' & 0xFF000000) ^ |
|
1716 | 1716 | ($'.$e.(($Nb + $i - $c[1]) % $Nb).' & 0x00FF0000) ^ |
1717 | 1717 | ($'.$e.(($Nb + $i - $c[2]) % $Nb).' & 0x0000FF00) ^ |
1718 | 1718 | ($'.$e.(($Nb + $i - $c[3]) % $Nb).' & 0x000000FF) ^ |
@@ -1723,7 +1723,7 @@ discard block |
||
1723 | 1723 | // Generating mode of operation code: |
1724 | 1724 | switch ($mode) { |
1725 | 1725 | case CRYPT_RIJNDAEL_MODE_ECB: |
1726 | - $encrypt = $init_encryptBlock . ' |
|
1726 | + $encrypt = $init_encryptBlock.' |
|
1727 | 1727 | $ciphertext = ""; |
1728 | 1728 | $text = $self->_pad($text); |
1729 | 1729 | $plaintext_len = strlen($text); |
@@ -1737,7 +1737,7 @@ discard block |
||
1737 | 1737 | return $ciphertext; |
1738 | 1738 | '; |
1739 | 1739 | |
1740 | - $decrypt = $init_decryptBlock . ' |
|
1740 | + $decrypt = $init_decryptBlock.' |
|
1741 | 1741 | $plaintext = ""; |
1742 | 1742 | $text = str_pad($text, strlen($text) + ('.$block_size.' - strlen($text) % '.$block_size.') % '.$block_size.', chr(0)); |
1743 | 1743 | $ciphertext_len = strlen($text); |
@@ -1752,7 +1752,7 @@ discard block |
||
1752 | 1752 | '; |
1753 | 1753 | break; |
1754 | 1754 | case CRYPT_RIJNDAEL_MODE_CBC: |
1755 | - $encrypt = $init_encryptBlock . ' |
|
1755 | + $encrypt = $init_encryptBlock.' |
|
1756 | 1756 | $ciphertext = ""; |
1757 | 1757 | $text = $self->_pad($text); |
1758 | 1758 | $plaintext_len = strlen($text); |
@@ -1772,7 +1772,7 @@ discard block |
||
1772 | 1772 | return $ciphertext; |
1773 | 1773 | '; |
1774 | 1774 | |
1775 | - $decrypt = $init_decryptBlock . ' |
|
1775 | + $decrypt = $init_decryptBlock.' |
|
1776 | 1776 | $plaintext = ""; |
1777 | 1777 | $text = str_pad($text, strlen($text) + ('.$block_size.' - strlen($text) % '.$block_size.') % '.$block_size.', chr(0)); |
1778 | 1778 | $ciphertext_len = strlen($text); |
@@ -1794,7 +1794,7 @@ discard block |
||
1794 | 1794 | '; |
1795 | 1795 | break; |
1796 | 1796 | case CRYPT_RIJNDAEL_MODE_CTR: |
1797 | - $encrypt = $init_encryptBlock . ' |
|
1797 | + $encrypt = $init_encryptBlock.' |
|
1798 | 1798 | $ciphertext = ""; |
1799 | 1799 | $plaintext_len = strlen($text); |
1800 | 1800 | $xor = $self->encryptIV; |
@@ -1830,7 +1830,7 @@ discard block |
||
1830 | 1830 | return $ciphertext; |
1831 | 1831 | '; |
1832 | 1832 | |
1833 | - $decrypt = $init_encryptBlock . ' |
|
1833 | + $decrypt = $init_encryptBlock.' |
|
1834 | 1834 | $plaintext = ""; |
1835 | 1835 | $ciphertext_len = strlen($text); |
1836 | 1836 | $xor = $self->decryptIV; |
@@ -1867,7 +1867,7 @@ discard block |
||
1867 | 1867 | '; |
1868 | 1868 | break; |
1869 | 1869 | case CRYPT_RIJNDAEL_MODE_CFB: |
1870 | - $encrypt = $init_encryptBlock . ' |
|
1870 | + $encrypt = $init_encryptBlock.' |
|
1871 | 1871 | $ciphertext = ""; |
1872 | 1872 | $buffer = &$self->enbuffer; |
1873 | 1873 | |
@@ -1915,7 +1915,7 @@ discard block |
||
1915 | 1915 | return $ciphertext; |
1916 | 1916 | '; |
1917 | 1917 | |
1918 | - $decrypt = $init_encryptBlock . ' |
|
1918 | + $decrypt = $init_encryptBlock.' |
|
1919 | 1919 | $plaintext = ""; |
1920 | 1920 | $buffer = &$self->debuffer; |
1921 | 1921 | |
@@ -1966,7 +1966,7 @@ discard block |
||
1966 | 1966 | '; |
1967 | 1967 | break; |
1968 | 1968 | case CRYPT_RIJNDAEL_MODE_OFB: |
1969 | - $encrypt = $init_encryptBlock . ' |
|
1969 | + $encrypt = $init_encryptBlock.' |
|
1970 | 1970 | $ciphertext = ""; |
1971 | 1971 | $plaintext_len = strlen($text); |
1972 | 1972 | $xor = $self->encryptIV; |
@@ -2002,7 +2002,7 @@ discard block |
||
2002 | 2002 | return $ciphertext; |
2003 | 2003 | '; |
2004 | 2004 | |
2005 | - $decrypt = $init_encryptBlock . ' |
|
2005 | + $decrypt = $init_encryptBlock.' |
|
2006 | 2006 | $plaintext = ""; |
2007 | 2007 | $ciphertext_len = strlen($text); |
2008 | 2008 | $xor = $self->decryptIV; |
@@ -276,7 +276,7 @@ discard block |
||
276 | 276 | * @var Array |
277 | 277 | * @access private |
278 | 278 | */ |
279 | - var $q0 = array ( |
|
279 | + var $q0 = array( |
|
280 | 280 | 0xA9, 0x67, 0xB3, 0xE8, 0x04, 0xFD, 0xA3, 0x76, |
281 | 281 | 0x9A, 0x92, 0x80, 0x78, 0xE4, 0xDD, 0xD1, 0x38, |
282 | 282 | 0x0D, 0xC6, 0x35, 0x98, 0x18, 0xF7, 0xEC, 0x6C, |
@@ -317,7 +317,7 @@ discard block |
||
317 | 317 | * @var Array |
318 | 318 | * @access private |
319 | 319 | */ |
320 | - var $q1 = array ( |
|
320 | + var $q1 = array( |
|
321 | 321 | 0x75, 0xF3, 0xC6, 0xF4, 0xDB, 0x7B, 0xFB, 0xC8, |
322 | 322 | 0x4A, 0xD3, 0xE6, 0x6B, 0x45, 0x7D, 0xE8, 0x4B, |
323 | 323 | 0xD6, 0x32, 0xD8, 0xFD, 0x37, 0x71, 0xF1, 0xE1, |
@@ -358,7 +358,7 @@ discard block |
||
358 | 358 | * @var Array |
359 | 359 | * @access private |
360 | 360 | */ |
361 | - var $m0 = array ( |
|
361 | + var $m0 = array( |
|
362 | 362 | 0xBCBC3275, 0xECEC21F3, 0x202043C6, 0xB3B3C9F4, 0xDADA03DB, 0x02028B7B, 0xE2E22BFB, 0x9E9EFAC8, |
363 | 363 | 0xC9C9EC4A, 0xD4D409D3, 0x18186BE6, 0x1E1E9F6B, 0x98980E45, 0xB2B2387D, 0xA6A6D2E8, 0x2626B74B, |
364 | 364 | 0x3C3C57D6, 0x93938A32, 0x8282EED8, 0x525298FD, 0x7B7BD437, 0xBBBB3771, 0x5B5B97F1, 0x474783E1, |
@@ -399,7 +399,7 @@ discard block |
||
399 | 399 | * @var Array |
400 | 400 | * @access private |
401 | 401 | */ |
402 | - var $m1 = array ( |
|
402 | + var $m1 = array( |
|
403 | 403 | 0xA9D93939, 0x67901717, 0xB3719C9C, 0xE8D2A6A6, 0x04050707, 0xFD985252, 0xA3658080, 0x76DFE4E4, |
404 | 404 | 0x9A084545, 0x92024B4B, 0x80A0E0E0, 0x78665A5A, 0xE4DDAFAF, 0xDDB06A6A, 0xD1BF6363, 0x38362A2A, |
405 | 405 | 0x0D54E6E6, 0xC6432020, 0x3562CCCC, 0x98BEF2F2, 0x181E1212, 0xF724EBEB, 0xECD7A1A1, 0x6C774141, |
@@ -440,7 +440,7 @@ discard block |
||
440 | 440 | * @var Array |
441 | 441 | * @access private |
442 | 442 | */ |
443 | - var $m2 = array ( |
|
443 | + var $m2 = array( |
|
444 | 444 | 0xBC75BC32, 0xECF3EC21, 0x20C62043, 0xB3F4B3C9, 0xDADBDA03, 0x027B028B, 0xE2FBE22B, 0x9EC89EFA, |
445 | 445 | 0xC94AC9EC, 0xD4D3D409, 0x18E6186B, 0x1E6B1E9F, 0x9845980E, 0xB27DB238, 0xA6E8A6D2, 0x264B26B7, |
446 | 446 | 0x3CD63C57, 0x9332938A, 0x82D882EE, 0x52FD5298, 0x7B377BD4, 0xBB71BB37, 0x5BF15B97, 0x47E14783, |
@@ -481,7 +481,7 @@ discard block |
||
481 | 481 | * @var Array |
482 | 482 | * @access private |
483 | 483 | */ |
484 | - var $m3 = array ( |
|
484 | + var $m3 = array( |
|
485 | 485 | 0xD939A9D9, 0x90176790, 0x719CB371, 0xD2A6E8D2, 0x05070405, 0x9852FD98, 0x6580A365, 0xDFE476DF, |
486 | 486 | 0x08459A08, 0x024B9202, 0xA0E080A0, 0x665A7866, 0xDDAFE4DD, 0xB06ADDB0, 0xBF63D1BF, 0x362A3836, |
487 | 487 | 0x54E60D54, 0x4320C643, 0x62CC3562, 0xBEF298BE, 0x1E12181E, 0x24EBF724, 0xD7A1ECD7, 0x77416C77, |
@@ -567,7 +567,7 @@ discard block |
||
567 | 567 | */ |
568 | 568 | function Crypt_Twofish($mode = CRYPT_TWOFISH_MODE_CBC) |
569 | 569 | { |
570 | - if ( !defined('CRYPT_TWOFISH_MODE') ) { |
|
570 | + if (!defined('CRYPT_TWOFISH_MODE')) { |
|
571 | 571 | switch (true) { |
572 | 572 | case extension_loaded('mcrypt') && in_array('twofish', mcrypt_list_algorithms()): |
573 | 573 | define('CRYPT_TWOFISH_MODE', CRYPT_TWOFISH_MODE_MCRYPT); |
@@ -577,7 +577,7 @@ discard block |
||
577 | 577 | } |
578 | 578 | } |
579 | 579 | |
580 | - switch ( CRYPT_TWOFISH_MODE ) { |
|
580 | + switch (CRYPT_TWOFISH_MODE) { |
|
581 | 581 | case CRYPT_TWOFISH_MODE_MCRYPT: |
582 | 582 | switch ($mode) { |
583 | 583 | case CRYPT_TWOFISH_MODE_ECB: |
@@ -640,13 +640,13 @@ discard block |
||
640 | 640 | $keylength = strlen($key); |
641 | 641 | switch (true) { |
642 | 642 | case $keylength <= 16: |
643 | - $key.= str_repeat("\0", 16 - $keylength); |
|
643 | + $key .= str_repeat("\0", 16 - $keylength); |
|
644 | 644 | break; |
645 | 645 | case $keylength <= 24: |
646 | - $key.= str_repeat("\0", 24 - $keylength); |
|
646 | + $key .= str_repeat("\0", 24 - $keylength); |
|
647 | 647 | break; |
648 | 648 | case $keylength <= 32: |
649 | - $key.= str_repeat("\0", 32 - $keylength); |
|
649 | + $key .= str_repeat("\0", 32 - $keylength); |
|
650 | 650 | break; |
651 | 651 | default: |
652 | 652 | $key = substr($key, 0, 32); |
@@ -676,8 +676,8 @@ discard block |
||
676 | 676 | case 16: |
677 | 677 | list ($s7, $s6, $s5, $s4) = $this->mds_rem($le_longs[1], $le_longs[2]); |
678 | 678 | list ($s3, $s2, $s1, $s0) = $this->mds_rem($le_longs[3], $le_longs[4]); |
679 | - for ($i = 0, $j = 1; $i < 40; $i+= 2,$j+= 2) { |
|
680 | - $A = $m0[$q0[$q0[$i] ^ $key[ 9]] ^ $key[1]] ^ |
|
679 | + for ($i = 0, $j = 1; $i < 40; $i += 2, $j += 2) { |
|
680 | + $A = $m0[$q0[$q0[$i] ^ $key[9]] ^ $key[1]] ^ |
|
681 | 681 | $m1[$q0[$q1[$i] ^ $key[10]] ^ $key[2]] ^ |
682 | 682 | $m2[$q1[$q0[$i] ^ $key[11]] ^ $key[3]] ^ |
683 | 683 | $m3[$q1[$q1[$i] ^ $key[12]] ^ $key[4]]; |
@@ -686,8 +686,8 @@ discard block |
||
686 | 686 | $m2[$q1[$q0[$j] ^ $key[15]] ^ $key[7]] ^ |
687 | 687 | $m3[$q1[$q1[$j] ^ $key[16]] ^ $key[8]]; |
688 | 688 | $B = ($B << 8) | ($B >> 24 & 0xff); |
689 | - $K[] = $A+= $B; |
|
690 | - $K[] = (($A+= $B) << 9 | $A >> 23 & 0x1ff); |
|
689 | + $K[] = $A += $B; |
|
690 | + $K[] = (($A += $B) << 9 | $A >> 23 & 0x1ff); |
|
691 | 691 | } |
692 | 692 | for ($i = 0; $i < 256; ++$i) { |
693 | 693 | $S0[$i] = $m0[$q0[$q0[$i] ^ $s4] ^ $s0]; |
@@ -700,8 +700,8 @@ discard block |
||
700 | 700 | list ($sb, $sa, $s9, $s8) = $this->mds_rem($le_longs[1], $le_longs[2]); |
701 | 701 | list ($s7, $s6, $s5, $s4) = $this->mds_rem($le_longs[3], $le_longs[4]); |
702 | 702 | list ($s3, $s2, $s1, $s0) = $this->mds_rem($le_longs[5], $le_longs[6]); |
703 | - for ($i = 0, $j = 1; $i < 40; $i+= 2, $j+= 2) { |
|
704 | - $A = $m0[$q0[$q0[$q1[$i] ^ $key[17]] ^ $key[ 9]] ^ $key[1]] ^ |
|
703 | + for ($i = 0, $j = 1; $i < 40; $i += 2, $j += 2) { |
|
704 | + $A = $m0[$q0[$q0[$q1[$i] ^ $key[17]] ^ $key[9]] ^ $key[1]] ^ |
|
705 | 705 | $m1[$q0[$q1[$q1[$i] ^ $key[18]] ^ $key[10]] ^ $key[2]] ^ |
706 | 706 | $m2[$q1[$q0[$q0[$i] ^ $key[19]] ^ $key[11]] ^ $key[3]] ^ |
707 | 707 | $m3[$q1[$q1[$q0[$i] ^ $key[20]] ^ $key[12]] ^ $key[4]]; |
@@ -710,8 +710,8 @@ discard block |
||
710 | 710 | $m2[$q1[$q0[$q0[$j] ^ $key[23]] ^ $key[15]] ^ $key[7]] ^ |
711 | 711 | $m3[$q1[$q1[$q0[$j] ^ $key[24]] ^ $key[16]] ^ $key[8]]; |
712 | 712 | $B = ($B << 8) | ($B >> 24 & 0xff); |
713 | - $K[] = $A+= $B; |
|
714 | - $K[] = (($A+= $B) << 9 | $A >> 23 & 0x1ff); |
|
713 | + $K[] = $A += $B; |
|
714 | + $K[] = (($A += $B) << 9 | $A >> 23 & 0x1ff); |
|
715 | 715 | } |
716 | 716 | for ($i = 0; $i < 256; ++$i) { |
717 | 717 | $S0[$i] = $m0[$q0[$q0[$q1[$i] ^ $s8] ^ $s4] ^ $s0]; |
@@ -725,8 +725,8 @@ discard block |
||
725 | 725 | list ($sb, $sa, $s9, $s8) = $this->mds_rem($le_longs[3], $le_longs[4]); |
726 | 726 | list ($s7, $s6, $s5, $s4) = $this->mds_rem($le_longs[5], $le_longs[6]); |
727 | 727 | list ($s3, $s2, $s1, $s0) = $this->mds_rem($le_longs[7], $le_longs[8]); |
728 | - for ($i = 0, $j = 1; $i < 40; $i+= 2, $j+= 2) { |
|
729 | - $A = $m0[$q0[$q0[$q1[$q1[$i] ^ $key[25]] ^ $key[17]] ^ $key[ 9]] ^ $key[1]] ^ |
|
728 | + for ($i = 0, $j = 1; $i < 40; $i += 2, $j += 2) { |
|
729 | + $A = $m0[$q0[$q0[$q1[$q1[$i] ^ $key[25]] ^ $key[17]] ^ $key[9]] ^ $key[1]] ^ |
|
730 | 730 | $m1[$q0[$q1[$q1[$q0[$i] ^ $key[26]] ^ $key[18]] ^ $key[10]] ^ $key[2]] ^ |
731 | 731 | $m2[$q1[$q0[$q0[$q0[$i] ^ $key[27]] ^ $key[19]] ^ $key[11]] ^ $key[3]] ^ |
732 | 732 | $m3[$q1[$q1[$q0[$q1[$i] ^ $key[28]] ^ $key[20]] ^ $key[12]] ^ $key[4]]; |
@@ -735,8 +735,8 @@ discard block |
||
735 | 735 | $m2[$q1[$q0[$q0[$q0[$j] ^ $key[31]] ^ $key[23]] ^ $key[15]] ^ $key[7]] ^ |
736 | 736 | $m3[$q1[$q1[$q0[$q1[$j] ^ $key[32]] ^ $key[24]] ^ $key[16]] ^ $key[8]]; |
737 | 737 | $B = ($B << 8) | ($B >> 24 & 0xff); |
738 | - $K[] = $A+= $B; |
|
739 | - $K[] = (($A+= $B) << 9 | $A >> 23 & 0x1ff); |
|
738 | + $K[] = $A += $B; |
|
739 | + $K[] = (($A += $B) << 9 | $A >> 23 & 0x1ff); |
|
740 | 740 | } |
741 | 741 | for ($i = 0; $i < 256; ++$i) { |
742 | 742 | $S0[$i] = $m0[$q0[$q0[$q1[$q1[$i] ^ $sc] ^ $s8] ^ $s4] ^ $s0]; |
@@ -770,7 +770,7 @@ discard block |
||
770 | 770 | |
771 | 771 | switch ($method) { |
772 | 772 | default: // 'pbkdf2' |
773 | - list(, , $hash, $salt, $count) = func_get_args(); |
|
773 | + list(,, $hash, $salt, $count) = func_get_args(); |
|
774 | 774 | if (!isset($hash)) { |
775 | 775 | $hash = 'sha1'; |
776 | 776 | } |
@@ -793,12 +793,12 @@ discard block |
||
793 | 793 | $hmac = new Crypt_Hash(); |
794 | 794 | $hmac->setHash($hash); |
795 | 795 | $hmac->setKey($password); |
796 | - $f = $u = $hmac->hash($salt . pack('N', $i++)); |
|
796 | + $f = $u = $hmac->hash($salt.pack('N', $i++)); |
|
797 | 797 | for ($j = 2; $j <= $count; ++$j) { |
798 | 798 | $u = $hmac->hash($u); |
799 | - $f^= $u; |
|
799 | + $f ^= $u; |
|
800 | 800 | } |
801 | - $key.= $f; |
|
801 | + $key .= $f; |
|
802 | 802 | } |
803 | 803 | } |
804 | 804 | |
@@ -840,7 +840,7 @@ discard block |
||
840 | 840 | */ |
841 | 841 | function encrypt($plaintext) |
842 | 842 | { |
843 | - if ( CRYPT_TWOFISH_MODE == CRYPT_TWOFISH_MODE_MCRYPT ) { |
|
843 | + if (CRYPT_TWOFISH_MODE == CRYPT_TWOFISH_MODE_MCRYPT) { |
|
844 | 844 | if ($this->paddable) { |
845 | 845 | $plaintext = $this->_pad($plaintext); |
846 | 846 | } |
@@ -866,11 +866,11 @@ discard block |
||
866 | 866 | $max = 16 - $pos; |
867 | 867 | if ($len >= $max) { |
868 | 868 | $i = $max; |
869 | - $len-= $max; |
|
869 | + $len -= $max; |
|
870 | 870 | $pos = 0; |
871 | 871 | } else { |
872 | 872 | $i = $len; |
873 | - $pos+= $len; |
|
873 | + $pos += $len; |
|
874 | 874 | $len = 0; |
875 | 875 | } |
876 | 876 | $ciphertext = substr($iv, $orig_pos) ^ $plaintext; |
@@ -883,15 +883,15 @@ discard block |
||
883 | 883 | mcrypt_generic_init($this->enmcrypt, $this->key, $iv); |
884 | 884 | $this->enbuffer['enmcrypt_init'] = false; |
885 | 885 | } |
886 | - $ciphertext.= mcrypt_generic($this->enmcrypt, substr($plaintext, $i, $len - $len % 16)); |
|
886 | + $ciphertext .= mcrypt_generic($this->enmcrypt, substr($plaintext, $i, $len - $len % 16)); |
|
887 | 887 | $iv = substr($ciphertext, -16); |
888 | - $len%= 16; |
|
888 | + $len %= 16; |
|
889 | 889 | } else { |
890 | 890 | while ($len >= 16) { |
891 | 891 | $iv = mcrypt_generic($this->ecb, $iv) ^ substr($plaintext, $i, 16); |
892 | - $ciphertext.= $iv; |
|
893 | - $len-= 16; |
|
894 | - $i+= 16; |
|
892 | + $ciphertext .= $iv; |
|
893 | + $len -= 16; |
|
894 | + $i += 16; |
|
895 | 895 | } |
896 | 896 | } |
897 | 897 | } |
@@ -899,7 +899,7 @@ discard block |
||
899 | 899 | $iv = mcrypt_generic($this->ecb, $iv); |
900 | 900 | $block = $iv ^ substr($plaintext, -$len); |
901 | 901 | $iv = substr_replace($iv, $block, 0, $len); |
902 | - $ciphertext.= $block; |
|
902 | + $ciphertext .= $block; |
|
903 | 903 | $pos = $len; |
904 | 904 | } |
905 | 905 | return $ciphertext; |
@@ -931,7 +931,7 @@ discard block |
||
931 | 931 | */ |
932 | 932 | function decrypt($ciphertext) |
933 | 933 | { |
934 | - if ( CRYPT_TWOFISH_MODE == CRYPT_TWOFISH_MODE_MCRYPT ) { |
|
934 | + if (CRYPT_TWOFISH_MODE == CRYPT_TWOFISH_MODE_MCRYPT) { |
|
935 | 935 | if ($this->paddable) { |
936 | 936 | // we pad with chr(0) since that's what mcrypt_generic does. to quote from http://php.net/function.mcrypt-generic : |
937 | 937 | // "The data is padded with "\0" to make sure the length of the data is n * blocksize." |
@@ -959,11 +959,11 @@ discard block |
||
959 | 959 | $max = 16 - $pos; |
960 | 960 | if ($len >= $max) { |
961 | 961 | $i = $max; |
962 | - $len-= $max; |
|
962 | + $len -= $max; |
|
963 | 963 | $pos = 0; |
964 | 964 | } else { |
965 | 965 | $i = $len; |
966 | - $pos+= $len; |
|
966 | + $pos += $len; |
|
967 | 967 | $len = 0; |
968 | 968 | } |
969 | 969 | $plaintext = substr($iv, $orig_pos) ^ $ciphertext; |
@@ -971,13 +971,13 @@ discard block |
||
971 | 971 | } |
972 | 972 | if ($len >= 16) { |
973 | 973 | $cb = substr($ciphertext, $i, $len - $len % 16); |
974 | - $plaintext.= mcrypt_generic($this->ecb, $iv . $cb) ^ $cb; |
|
974 | + $plaintext .= mcrypt_generic($this->ecb, $iv.$cb) ^ $cb; |
|
975 | 975 | $iv = substr($cb, -16); |
976 | - $len%= 16; |
|
976 | + $len %= 16; |
|
977 | 977 | } |
978 | 978 | if ($len) { |
979 | 979 | $iv = mcrypt_generic($this->ecb, $iv); |
980 | - $plaintext.= $iv ^ substr($ciphertext, -$len); |
|
980 | + $plaintext .= $iv ^ substr($ciphertext, -$len); |
|
981 | 981 | $iv = substr_replace($iv, substr($ciphertext, -$len), 0, $len); |
982 | 982 | $pos = $len; |
983 | 983 | } |
@@ -1145,7 +1145,7 @@ discard block |
||
1145 | 1145 | function _generate_xor(&$iv) |
1146 | 1146 | { |
1147 | 1147 | $xor = $iv; |
1148 | - for ($j = 4; $j <= 16; $j+=4) { |
|
1148 | + for ($j = 4; $j <= 16; $j += 4) { |
|
1149 | 1149 | $temp = substr($iv, -$j, 4); |
1150 | 1150 | switch ($temp) { |
1151 | 1151 | case "\xFF\xFF\xFF\xFF": |
@@ -1181,32 +1181,32 @@ discard block |
||
1181 | 1181 | |
1182 | 1182 | // Shift the others up. |
1183 | 1183 | $B = ($B << 8) | (0xff & ($A >> 24)); |
1184 | - $A<<= 8; |
|
1184 | + $A <<= 8; |
|
1185 | 1185 | |
1186 | 1186 | $u = $t << 1; |
1187 | 1187 | |
1188 | 1188 | // Subtract the modular polynomial on overflow. |
1189 | 1189 | if ($t & 0x80) { |
1190 | - $u^= 0x14d; |
|
1190 | + $u ^= 0x14d; |
|
1191 | 1191 | } |
1192 | 1192 | |
1193 | 1193 | // Remove t * (a * x^2 + 1). |
1194 | 1194 | $B ^= $t ^ ($u << 16); |
1195 | 1195 | |
1196 | 1196 | // Form u = a*t + t/a = t*(a + 1/a). |
1197 | - $u^= 0x7fffffff & ($t >> 1); |
|
1197 | + $u ^= 0x7fffffff & ($t >> 1); |
|
1198 | 1198 | |
1199 | 1199 | // Add the modular polynomial on underflow. |
1200 | - if ($t & 0x01) $u^= 0xa6 ; |
|
1200 | + if ($t & 0x01) $u ^= 0xa6; |
|
1201 | 1201 | |
1202 | 1202 | // Remove t * (a + 1/a) * (x^3 + x). |
1203 | - $B^= ($u << 24) | ($u << 8); |
|
1203 | + $B ^= ($u << 24) | ($u << 8); |
|
1204 | 1204 | } |
1205 | 1205 | |
1206 | 1206 | return array( |
1207 | 1207 | 0xff & $B >> 24, |
1208 | 1208 | 0xff & $B >> 16, |
1209 | - 0xff & $B >> 8, |
|
1209 | + 0xff & $B >> 8, |
|
1210 | 1210 | 0xff & $B); |
1211 | 1211 | } |
1212 | 1212 | |
@@ -1217,7 +1217,7 @@ discard block |
||
1217 | 1217 | */ |
1218 | 1218 | function inline_crypt_setup() |
1219 | 1219 | { |
1220 | - $lambda_functions =& Crypt_Twofish::get_lambda_functions(); |
|
1220 | + $lambda_functions = & Crypt_Twofish::get_lambda_functions(); |
|
1221 | 1221 | $block_size = 16; |
1222 | 1222 | $mode = $this->mode; |
1223 | 1223 | $code_hash = "$mode"; |
@@ -1240,7 +1240,7 @@ discard block |
||
1240 | 1240 | $R3 = $K_3 ^ $in[4]; |
1241 | 1241 | '; |
1242 | 1242 | for ($ki = 7, $i = 0; $i < 8; ++$i) { |
1243 | - $_encryptBlock.= ' |
|
1243 | + $_encryptBlock .= ' |
|
1244 | 1244 | $t0 = $S0[ $R0 & 0xff] ^ |
1245 | 1245 | $S1[($R0 >> 8) & 0xff] ^ |
1246 | 1246 | $S2[($R0 >> 16) & 0xff] ^ |
@@ -1266,7 +1266,7 @@ discard block |
||
1266 | 1266 | $R1 = ((($R1 >> 31) & 1) | ($R1 << 1)) ^ ($t0 + ($t1 << 1) + $K_'.(++$ki).'); |
1267 | 1267 | '; |
1268 | 1268 | } |
1269 | - $_encryptBlock.= ' |
|
1269 | + $_encryptBlock .= ' |
|
1270 | 1270 | $in = pack("V4", $K_4 ^ $R2, |
1271 | 1271 | $K_5 ^ $R3, |
1272 | 1272 | $K_6 ^ $R0, |
@@ -1282,7 +1282,7 @@ discard block |
||
1282 | 1282 | $R3 = $K_7 ^ $in[4]; |
1283 | 1283 | '; |
1284 | 1284 | for ($ki = 40, $i = 0; $i < 8; ++$i) { |
1285 | - $_decryptBlock.= ' |
|
1285 | + $_decryptBlock .= ' |
|
1286 | 1286 | $t0 = $S0[$R0 & 0xff] ^ |
1287 | 1287 | $S1[$R0 >> 8 & 0xff] ^ |
1288 | 1288 | $S2[$R0 >> 16 & 0xff] ^ |
@@ -1308,7 +1308,7 @@ discard block |
||
1308 | 1308 | $R0 = ($R0 >> 31 & 0x1 | $R0 << 1) ^ ($t0 + $t1 + $K_'.(--$ki).'); |
1309 | 1309 | '; |
1310 | 1310 | } |
1311 | - $_decryptBlock.= ' |
|
1311 | + $_decryptBlock .= ' |
|
1312 | 1312 | $in = pack("V4", $K_0 ^ $R2, |
1313 | 1313 | $K_1 ^ $R3, |
1314 | 1314 | $K_2 ^ $R0, |
@@ -1635,12 +1635,12 @@ discard block |
||
1635 | 1635 | break; |
1636 | 1636 | } |
1637 | 1637 | $fnc_head = '$action, &$self, $text'; |
1638 | - $fnc_body = $init_cryptBlock . 'if ($action == "encrypt") { ' . $encrypt . ' } else { ' . $decrypt . ' }'; |
|
1638 | + $fnc_body = $init_cryptBlock.'if ($action == "encrypt") { '.$encrypt.' } else { '.$decrypt.' }'; |
|
1639 | 1639 | |
1640 | 1640 | if (function_exists('create_function') && is_callable('create_function')) { |
1641 | 1641 | $lambda_functions[$code_hash] = create_function($fnc_head, $fnc_body); |
1642 | 1642 | } else { |
1643 | - eval('function ' . ($lambda_functions[$code_hash] = 'f' . md5(microtime())) . '(' . $fnc_head . ') { ' . $fnc_body . ' }'); |
|
1643 | + eval('function '.($lambda_functions[$code_hash] = 'f'.md5(microtime())).'('.$fnc_head.') { '.$fnc_body.' }'); |
|
1644 | 1644 | } |
1645 | 1645 | } |
1646 | 1646 | $this->inline_crypt = $lambda_functions[$code_hash]; |
@@ -655,7 +655,7 @@ discard block |
||
655 | 655 | 'children' => $BuiltInDomainDefinedAttribute |
656 | 656 | ); |
657 | 657 | |
658 | - $BuiltInStandardAttributes = array( |
|
658 | + $BuiltInStandardAttributes = array( |
|
659 | 659 | 'type' => FILE_ASN1_TYPE_SEQUENCE, |
660 | 660 | 'children' => array( |
661 | 661 | 'country-name' => array('optional' => true) + $CountryName, |
@@ -1493,7 +1493,7 @@ discard block |
||
1493 | 1493 | switch ($algorithm) { |
1494 | 1494 | case 'rsaEncryption': |
1495 | 1495 | $cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey'] = |
1496 | - base64_encode("\0" . base64_decode(preg_replace('#-.+-|[\r\n]#', '', $cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']))); |
|
1496 | + base64_encode("\0".base64_decode(preg_replace('#-.+-|[\r\n]#', '', $cert['tbsCertificate']['subjectPublicKeyInfo']['subjectPublicKey']))); |
|
1497 | 1497 | } |
1498 | 1498 | } |
1499 | 1499 | |
@@ -1531,7 +1531,7 @@ discard block |
||
1531 | 1531 | return $cert; |
1532 | 1532 | // case FILE_X509_FORMAT_PEM: |
1533 | 1533 | default: |
1534 | - return "-----BEGIN CERTIFICATE-----\r\n" . chunk_split(base64_encode($cert), 64) . '-----END CERTIFICATE-----'; |
|
1534 | + return "-----BEGIN CERTIFICATE-----\r\n".chunk_split(base64_encode($cert), 64).'-----END CERTIFICATE-----'; |
|
1535 | 1535 | } |
1536 | 1536 | } |
1537 | 1537 | |
@@ -1625,7 +1625,7 @@ discard block |
||
1625 | 1625 | case 'id-ce-authorityKeyIdentifier': // use 00 as the serial number instead of an empty string |
1626 | 1626 | if (isset($value['authorityCertSerialNumber'])) { |
1627 | 1627 | if ($value['authorityCertSerialNumber']->toBytes() == '') { |
1628 | - $temp = chr((FILE_ASN1_CLASS_CONTEXT_SPECIFIC << 6) | 2) . "\1\0"; |
|
1628 | + $temp = chr((FILE_ASN1_CLASS_CONTEXT_SPECIFIC << 6) | 2)."\1\0"; |
|
1629 | 1629 | $value['authorityCertSerialNumber'] = new File_ASN1_Element($temp); |
1630 | 1630 | } |
1631 | 1631 | } |
@@ -1636,7 +1636,7 @@ discard block |
||
1636 | 1636 | $map = $this->_getMapping($id); |
1637 | 1637 | if (is_bool($map)) { |
1638 | 1638 | if (!$map) { |
1639 | - user_error($id . ' is not a currently supported extension'); |
|
1639 | + user_error($id.' is not a currently supported extension'); |
|
1640 | 1640 | unset($extensions[$i]); |
1641 | 1641 | } |
1642 | 1642 | } else { |
@@ -1709,7 +1709,7 @@ discard block |
||
1709 | 1709 | $id = $attributes[$i]['type']; |
1710 | 1710 | $map = $this->_getMapping($id); |
1711 | 1711 | if ($map === false) { |
1712 | - user_error($id . ' is not a currently supported attribute', E_USER_NOTICE); |
|
1712 | + user_error($id.' is not a currently supported attribute', E_USER_NOTICE); |
|
1713 | 1713 | unset($attributes[$i]); |
1714 | 1714 | } |
1715 | 1715 | elseif (is_array($attributes[$i]['value'])) { |
@@ -1925,7 +1925,7 @@ discard block |
||
1925 | 1925 | field in the Subject field of the certificate MUST be used. Although |
1926 | 1926 | the use of the Common Name is existing practice, it is deprecated and |
1927 | 1927 | Certification Authorities are encouraged to use the dNSName instead. */ |
1928 | - if (preg_match('#^' . $value . '$#', $components['host'])) { |
|
1928 | + if (preg_match('#^'.$value.'$#', $components['host'])) { |
|
1929 | 1929 | return true; |
1930 | 1930 | } |
1931 | 1931 | break; |
@@ -1935,7 +1935,7 @@ discard block |
||
1935 | 1935 | In some cases, the URI is specified as an IP address rather than a |
1936 | 1936 | hostname. In this case, the iPAddress subjectAltName must be present |
1937 | 1937 | in the certificate and must exactly match the IP in the URI. */ |
1938 | - if (preg_match('#(?:\d{1-3}\.){4}#', $components['host'] . '.') && preg_match('#^' . $value . '$#', $components['host'])) { |
|
1938 | + if (preg_match('#(?:\d{1-3}\.){4}#', $components['host'].'.') && preg_match('#^'.$value.'$#', $components['host'])) { |
|
1939 | 1939 | return true; |
1940 | 1940 | } |
1941 | 1941 | } |
@@ -1945,7 +1945,7 @@ discard block |
||
1945 | 1945 | |
1946 | 1946 | if ($value = $this->getDNProp('id-at-commonName')) { |
1947 | 1947 | $value = str_replace(array('.', '*'), array('\.', '[^.]*'), $value[0]); |
1948 | - return preg_match('#^' . $value . '$#', $components['host']); |
|
1948 | + return preg_match('#^'.$value.'$#', $components['host']); |
|
1949 | 1949 | } |
1950 | 1950 | |
1951 | 1951 | return false; |
@@ -2163,11 +2163,11 @@ discard block |
||
2163 | 2163 | switch ($algorithm) { |
2164 | 2164 | case 'rsaEncryption': |
2165 | 2165 | return |
2166 | - "-----BEGIN PUBLIC KEY-----\r\n" . |
|
2166 | + "-----BEGIN PUBLIC KEY-----\r\n". |
|
2167 | 2167 | // subjectPublicKey is stored as a bit string in X.509 certs. the first byte of a bit string represents how many bits |
2168 | 2168 | // in the last byte should be ignored. the following only supports non-zero stuff but as none of the X.509 certs Firefox |
2169 | 2169 | // uses as a cert authority actually use a non-zero bit I think it's safe to assume that none do. |
2170 | - chunk_split(base64_encode(substr(base64_decode($key), 1)), 64) . |
|
2170 | + chunk_split(base64_encode(substr(base64_decode($key), 1)), 64). |
|
2171 | 2171 | '-----END PUBLIC KEY-----'; |
2172 | 2172 | default: |
2173 | 2173 | return $key; |
@@ -2407,7 +2407,7 @@ discard block |
||
2407 | 2407 | |
2408 | 2408 | // handles everything else |
2409 | 2409 | $results = preg_split('#((?:^|, *|/)(?:C=|O=|OU=|CN=|L=|ST=|SN=|postalCode=|streetAddress=|emailAddress=|serialNumber=|organizationalUnitName=|title=|description=|role=|x500UniqueIdentifier=))#', $dn, -1, PREG_SPLIT_DELIM_CAPTURE); |
2410 | - for ($i = 1; $i < count($results); $i+=2) { |
|
2410 | + for ($i = 1; $i < count($results); $i += 2) { |
|
2411 | 2411 | $prop = trim($results[$i], ', =/'); |
2412 | 2412 | $value = $results[$i + 1]; |
2413 | 2413 | if (!$this->setDNProp($prop, $value, $type)) { |
@@ -2535,11 +2535,11 @@ discard block |
||
2535 | 2535 | break; |
2536 | 2536 | default: |
2537 | 2537 | $delim = '/'; |
2538 | - $desc = preg_replace('#.+-([^-]+)$#', '$1', $prop) . '='; |
|
2538 | + $desc = preg_replace('#.+-([^-]+)$#', '$1', $prop).'='; |
|
2539 | 2539 | } |
2540 | 2540 | |
2541 | 2541 | if (!$start) { |
2542 | - $output.= $delim; |
|
2542 | + $output .= $delim; |
|
2543 | 2543 | } |
2544 | 2544 | if (is_array($value)) { |
2545 | 2545 | foreach ($value as $type => $v) { |
@@ -2556,7 +2556,7 @@ discard block |
||
2556 | 2556 | $value = array_pop($value); // Always strip data type. |
2557 | 2557 | } |
2558 | 2558 | } |
2559 | - $output.= $desc . $value; |
|
2559 | + $output .= $desc.$value; |
|
2560 | 2560 | $start = false; |
2561 | 2561 | } |
2562 | 2562 | |
@@ -2868,7 +2868,7 @@ discard block |
||
2868 | 2868 | switch ($algorithm) { |
2869 | 2869 | case 'rsaEncryption': |
2870 | 2870 | $csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey'] = |
2871 | - base64_encode("\0" . base64_decode(preg_replace('#-.+-|[\r\n]#', '', $csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey']))); |
|
2871 | + base64_encode("\0".base64_decode(preg_replace('#-.+-|[\r\n]#', '', $csr['certificationRequestInfo']['subjectPKInfo']['subjectPublicKey']))); |
|
2872 | 2872 | } |
2873 | 2873 | } |
2874 | 2874 | |
@@ -2890,7 +2890,7 @@ discard block |
||
2890 | 2890 | return $csr; |
2891 | 2891 | // case FILE_X509_FORMAT_PEM: |
2892 | 2892 | default: |
2893 | - return "-----BEGIN CERTIFICATE REQUEST-----\r\n" . chunk_split(base64_encode($csr), 64) . '-----END CERTIFICATE REQUEST-----'; |
|
2893 | + return "-----BEGIN CERTIFICATE REQUEST-----\r\n".chunk_split(base64_encode($csr), 64).'-----END CERTIFICATE REQUEST-----'; |
|
2894 | 2894 | } |
2895 | 2895 | } |
2896 | 2896 | |
@@ -3013,7 +3013,7 @@ discard block |
||
3013 | 3013 | $this->signatureSubject = substr($orig, $decoded[0]['content'][0]['start'], $decoded[0]['content'][0]['length']); |
3014 | 3014 | |
3015 | 3015 | $this->_mapInExtensions($crl, 'tbsCertList/crlExtensions', $asn1); |
3016 | - $rclist = &$this->_subArray($crl,'tbsCertList/revokedCertificates'); |
|
3016 | + $rclist = &$this->_subArray($crl, 'tbsCertList/revokedCertificates'); |
|
3017 | 3017 | if (is_array($rclist)) { |
3018 | 3018 | foreach ($rclist as $i => $extension) { |
3019 | 3019 | $this->_mapInExtensions($rclist, "$i/crlEntryExtensions", $asn1); |
@@ -3063,7 +3063,7 @@ discard block |
||
3063 | 3063 | $asn1->loadFilters($filters); |
3064 | 3064 | |
3065 | 3065 | $this->_mapOutExtensions($crl, 'tbsCertList/crlExtensions', $asn1); |
3066 | - $rclist = &$this->_subArray($crl,'tbsCertList/revokedCertificates'); |
|
3066 | + $rclist = &$this->_subArray($crl, 'tbsCertList/revokedCertificates'); |
|
3067 | 3067 | if (is_array($rclist)) { |
3068 | 3068 | foreach ($rclist as $i => $extension) { |
3069 | 3069 | $this->_mapOutExtensions($rclist, "$i/crlEntryExtensions", $asn1); |
@@ -3077,7 +3077,7 @@ discard block |
||
3077 | 3077 | return $crl; |
3078 | 3078 | // case FILE_X509_FORMAT_PEM: |
3079 | 3079 | default: |
3080 | - return "-----BEGIN X509 CRL-----\r\n" . chunk_split(base64_encode($crl), 64) . '-----END X509 CRL-----'; |
|
3080 | + return "-----BEGIN X509 CRL-----\r\n".chunk_split(base64_encode($crl), 64).'-----END X509 CRL-----'; |
|
3081 | 3081 | } |
3082 | 3082 | } |
3083 | 3083 | |
@@ -3105,7 +3105,7 @@ discard block |
||
3105 | 3105 | } |
3106 | 3106 | |
3107 | 3107 | $currentCert = isset($this->currentCert) ? $this->currentCert : NULL; |
3108 | - $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject: NULL; |
|
3108 | + $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject : NULL; |
|
3109 | 3109 | |
3110 | 3110 | if (isset($subject->currentCert) && is_array($subject->currentCert) && isset($subject->currentCert['tbsCertificate'])) { |
3111 | 3111 | $this->currentCert = $subject->currentCert; |
@@ -3258,7 +3258,7 @@ discard block |
||
3258 | 3258 | $this->publicKey = $origPublicKey; |
3259 | 3259 | |
3260 | 3260 | $currentCert = isset($this->currentCert) ? $this->currentCert : NULL; |
3261 | - $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject: NULL; |
|
3261 | + $signatureSubject = isset($this->signatureSubject) ? $this->signatureSubject : NULL; |
|
3262 | 3262 | |
3263 | 3263 | if (isset($this->currentCert) && is_array($this->currentCert) && isset($this->currentCert['certificationRequestInfo'])) { |
3264 | 3264 | $this->currentCert['signatureAlgorithm']['algorithm'] = |
@@ -3447,7 +3447,7 @@ discard block |
||
3447 | 3447 | $key->setHash(preg_replace('#WithRSAEncryption$#', '', $signatureAlgorithm)); |
3448 | 3448 | $key->setSignatureMode(CRYPT_RSA_SIGNATURE_PKCS1); |
3449 | 3449 | |
3450 | - $this->currentCert['signature'] = base64_encode("\0" . $key->sign($this->signatureSubject)); |
|
3450 | + $this->currentCert['signature'] = base64_encode("\0".$key->sign($this->signatureSubject)); |
|
3451 | 3451 | return $this->currentCert; |
3452 | 3452 | } |
3453 | 3453 | default: |
@@ -3484,7 +3484,7 @@ discard block |
||
3484 | 3484 | if (strtolower($date) == 'lifetime') { |
3485 | 3485 | $temp = '99991231235959Z'; |
3486 | 3486 | $asn1 = new File_ASN1(); |
3487 | - $temp = chr(FILE_ASN1_TYPE_GENERALIZED_TIME) . $asn1->_encodeLength(strlen($temp)) . $temp; |
|
3487 | + $temp = chr(FILE_ASN1_TYPE_GENERALIZED_TIME).$asn1->_encodeLength(strlen($temp)).$temp; |
|
3488 | 3488 | $this->endDate = new File_ASN1_Element($temp); |
3489 | 3489 | } else { |
3490 | 3490 | $this->endDate = @date('D, d M y H:i:s O', @strtotime($date)); |
@@ -3938,7 +3938,7 @@ discard block |
||
3938 | 3938 | $attributes[$last]['value'][] = $value; |
3939 | 3939 | break; |
3940 | 3940 | default: |
3941 | - $attributes[] = array('type' => $id, 'value' => $disposition == FILE_X509_ATTR_ALL ? $value: array($value)); |
|
3941 | + $attributes[] = array('type' => $id, 'value' => $disposition == FILE_X509_ATTR_ALL ? $value : array($value)); |
|
3942 | 3942 | break; |
3943 | 3943 | } |
3944 | 3944 | |
@@ -4013,12 +4013,12 @@ discard block |
||
4013 | 4013 | } |
4014 | 4014 | $key = new Crypt_RSA(); |
4015 | 4015 | if (!$key->loadKey($raw)) { |
4016 | - return false; // Not an unencrypted RSA key. |
|
4016 | + return false; // Not an unencrypted RSA key. |
|
4017 | 4017 | } |
4018 | 4018 | if ($key->getPrivateKey() !== false) { // If private. |
4019 | 4019 | return $this->computeKeyIdentifier($key, $method); |
4020 | 4020 | } |
4021 | - $key = $raw; // Is a public key. |
|
4021 | + $key = $raw; // Is a public key. |
|
4022 | 4022 | break; |
4023 | 4023 | case strtolower(get_class($key)) == 'file_x509': |
4024 | 4024 | if (isset($key->publicKey)) { |
@@ -4268,7 +4268,7 @@ discard block |
||
4268 | 4268 | |
4269 | 4269 | if (is_array($rclist = $this->_subArray($crl, 'tbsCertList/revokedCertificates'))) { |
4270 | 4270 | if (($i = $this->_revokedCertificate($rclist, $serial)) !== false) { |
4271 | - return $this->_getExtension($id, $crl, "tbsCertList/revokedCertificates/$i/crlEntryExtensions"); |
|
4271 | + return $this->_getExtension($id, $crl, "tbsCertList/revokedCertificates/$i/crlEntryExtensions"); |
|
4272 | 4272 | } |
4273 | 4273 | } |
4274 | 4274 |
@@ -281,7 +281,7 @@ discard block |
||
281 | 281 | { |
282 | 282 | for ($i = 0; $i < strlen($source); $i++) { |
283 | 283 | if (strlen($this->ansi)) { |
284 | - $this->ansi.= $source[$i]; |
|
284 | + $this->ansi .= $source[$i]; |
|
285 | 285 | $chr = ord($source[$i]); |
286 | 286 | // http://en.wikipedia.org/wiki/ANSI_escape_code#Sequence_elements |
287 | 287 | // single character CSI's not currently supported |
@@ -350,10 +350,10 @@ discard block |
||
350 | 350 | case 0: // Turn off character attributes |
351 | 351 | $this->attrs[$this->y][$this->x] = ''; |
352 | 352 | |
353 | - if ($this->bold) $this->attrs[$this->y][$this->x].= '</b>'; |
|
354 | - if ($this->underline) $this->attrs[$this->y][$this->x].= '</underline>'; |
|
355 | - if ($this->blink) $this->attrs[$this->y][$this->x].= '</blink>'; |
|
356 | - if ($this->color) $this->attrs[$this->y][$this->x].= '</span>'; |
|
353 | + if ($this->bold) $this->attrs[$this->y][$this->x] .= '</b>'; |
|
354 | + if ($this->underline) $this->attrs[$this->y][$this->x] .= '</underline>'; |
|
355 | + if ($this->blink) $this->attrs[$this->y][$this->x] .= '</blink>'; |
|
356 | + if ($this->color) $this->attrs[$this->y][$this->x] .= '</span>'; |
|
357 | 357 | |
358 | 358 | if ($this->reverse) { |
359 | 359 | $temp = $this->background; |
@@ -386,9 +386,9 @@ discard block |
||
386 | 386 | $temp = $this->background; |
387 | 387 | $this->background = $this->foreground; |
388 | 388 | $this->foreground = $temp; |
389 | - $this->attrs[$this->y][$this->x] = '<span style="color: ' . $this->foreground . '; background: ' . $this->background . '">'; |
|
389 | + $this->attrs[$this->y][$this->x] = '<span style="color: '.$this->foreground.'; background: '.$this->background.'">'; |
|
390 | 390 | if ($this->color) { |
391 | - $this->attrs[$this->y][$this->x] = '</span>' . $this->attrs[$this->y][$this->x]; |
|
391 | + $this->attrs[$this->y][$this->x] = '</span>'.$this->attrs[$this->y][$this->x]; |
|
392 | 392 | } |
393 | 393 | $this->color = true; |
394 | 394 | break; |
@@ -417,15 +417,15 @@ discard block |
||
417 | 417 | case 47: $back = 'white'; break; |
418 | 418 | |
419 | 419 | default: |
420 | - user_error('Unsupported attribute: ' . $mod); |
|
420 | + user_error('Unsupported attribute: '.$mod); |
|
421 | 421 | $this->ansi = ''; |
422 | 422 | break 2; |
423 | 423 | } |
424 | 424 | |
425 | 425 | unset($temp); |
426 | - $this->attrs[$this->y][$this->x] = '<span style="color: ' . $this->foreground . '; background: ' . $this->background . '">'; |
|
426 | + $this->attrs[$this->y][$this->x] = '<span style="color: '.$this->foreground.'; background: '.$this->background.'">'; |
|
427 | 427 | if ($this->color) { |
428 | - $this->attrs[$this->y][$this->x] = '</span>' . $this->attrs[$this->y][$this->x]; |
|
428 | + $this->attrs[$this->y][$this->x] = '</span>'.$this->attrs[$this->y][$this->x]; |
|
429 | 429 | } |
430 | 430 | $this->color = true; |
431 | 431 | } |
@@ -449,7 +449,7 @@ discard block |
||
449 | 449 | case "\x0F": // shift |
450 | 450 | break; |
451 | 451 | case "\x1B": // start ANSI escape code |
452 | - $this->ansi.= "\x1B"; |
|
452 | + $this->ansi .= "\x1B"; |
|
453 | 453 | break; |
454 | 454 | default: |
455 | 455 | $this->screen[$this->y] = substr_replace( |
@@ -511,13 +511,13 @@ discard block |
||
511 | 511 | for ($i = 0; $i <= $this->max_y; $i++) { |
512 | 512 | for ($j = 0; $j <= $this->max_x + 1; $j++) { |
513 | 513 | if (isset($this->attrs[$i][$j])) { |
514 | - $output.= $this->attrs[$i][$j]; |
|
514 | + $output .= $this->attrs[$i][$j]; |
|
515 | 515 | } |
516 | 516 | if (isset($this->screen[$i][$j])) { |
517 | - $output.= htmlspecialchars($this->screen[$i][$j]); |
|
517 | + $output .= htmlspecialchars($this->screen[$i][$j]); |
|
518 | 518 | } |
519 | 519 | } |
520 | - $output.= "\r\n"; |
|
520 | + $output .= "\r\n"; |
|
521 | 521 | } |
522 | 522 | return rtrim($output); |
523 | 523 | } |
@@ -530,7 +530,7 @@ discard block |
||
530 | 530 | */ |
531 | 531 | function getScreen() |
532 | 532 | { |
533 | - return '<pre style="color: white; background: black" width="' . ($this->max_x + 1) . '">' . $this->_getScreen() . '</pre>'; |
|
533 | + return '<pre style="color: white; background: black" width="'.($this->max_x + 1).'">'.$this->_getScreen().'</pre>'; |
|
534 | 534 | } |
535 | 535 | |
536 | 536 | /** |
@@ -545,16 +545,16 @@ discard block |
||
545 | 545 | for ($i = 0; $i < count($this->history); $i++) { |
546 | 546 | for ($j = 0; $j <= $this->max_x + 1; $j++) { |
547 | 547 | if (isset($this->history_attrs[$i][$j])) { |
548 | - $scrollback.= $this->history_attrs[$i][$j]; |
|
548 | + $scrollback .= $this->history_attrs[$i][$j]; |
|
549 | 549 | } |
550 | 550 | if (isset($this->history[$i][$j])) { |
551 | - $scrollback.= htmlspecialchars($this->history[$i][$j]); |
|
551 | + $scrollback .= htmlspecialchars($this->history[$i][$j]); |
|
552 | 552 | } |
553 | 553 | } |
554 | - $scrollback.= "\r\n"; |
|
554 | + $scrollback .= "\r\n"; |
|
555 | 555 | } |
556 | - $scrollback.= $this->_getScreen(); |
|
556 | + $scrollback .= $this->_getScreen(); |
|
557 | 557 | |
558 | - return '<pre style="color: white; background: black" width="' . ($this->max_x + 1) . '">' . $scrollback . '</pre>'; |
|
558 | + return '<pre style="color: white; background: black" width="'.($this->max_x + 1).'">'.$scrollback.'</pre>'; |
|
559 | 559 | } |
560 | 560 | } |
561 | 561 | \ No newline at end of file |
@@ -46,10 +46,10 @@ discard block |
||
46 | 46 | * @access private |
47 | 47 | * @link http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf#page=12 |
48 | 48 | */ |
49 | -define('FILE_ASN1_CLASS_UNIVERSAL', 0); |
|
50 | -define('FILE_ASN1_CLASS_APPLICATION', 1); |
|
49 | +define('FILE_ASN1_CLASS_UNIVERSAL', 0); |
|
50 | +define('FILE_ASN1_CLASS_APPLICATION', 1); |
|
51 | 51 | define('FILE_ASN1_CLASS_CONTEXT_SPECIFIC', 2); |
52 | -define('FILE_ASN1_CLASS_PRIVATE', 3); |
|
52 | +define('FILE_ASN1_CLASS_PRIVATE', 3); |
|
53 | 53 | /**#@-*/ |
54 | 54 | |
55 | 55 | /**#@+ |
@@ -58,21 +58,21 @@ discard block |
||
58 | 58 | * @access private |
59 | 59 | * @link http://www.obj-sys.com/asn1tutorial/node124.html |
60 | 60 | */ |
61 | -define('FILE_ASN1_TYPE_BOOLEAN', 1); |
|
62 | -define('FILE_ASN1_TYPE_INTEGER', 2); |
|
63 | -define('FILE_ASN1_TYPE_BIT_STRING', 3); |
|
64 | -define('FILE_ASN1_TYPE_OCTET_STRING', 4); |
|
65 | -define('FILE_ASN1_TYPE_NULL', 5); |
|
66 | -define('FILE_ASN1_TYPE_OBJECT_IDENTIFIER',6); |
|
61 | +define('FILE_ASN1_TYPE_BOOLEAN', 1); |
|
62 | +define('FILE_ASN1_TYPE_INTEGER', 2); |
|
63 | +define('FILE_ASN1_TYPE_BIT_STRING', 3); |
|
64 | +define('FILE_ASN1_TYPE_OCTET_STRING', 4); |
|
65 | +define('FILE_ASN1_TYPE_NULL', 5); |
|
66 | +define('FILE_ASN1_TYPE_OBJECT_IDENTIFIER', 6); |
|
67 | 67 | //define('FILE_ASN1_TYPE_OBJECT_DESCRIPTOR',7); |
68 | 68 | //define('FILE_ASN1_TYPE_INSTANCE_OF', 8); // EXTERNAL |
69 | -define('FILE_ASN1_TYPE_REAL', 9); |
|
70 | -define('FILE_ASN1_TYPE_ENUMERATED', 10); |
|
69 | +define('FILE_ASN1_TYPE_REAL', 9); |
|
70 | +define('FILE_ASN1_TYPE_ENUMERATED', 10); |
|
71 | 71 | //define('FILE_ASN1_TYPE_EMBEDDED', 11); |
72 | -define('FILE_ASN1_TYPE_UTF8_STRING', 12); |
|
72 | +define('FILE_ASN1_TYPE_UTF8_STRING', 12); |
|
73 | 73 | //define('FILE_ASN1_TYPE_RELATIVE_OID', 13); |
74 | -define('FILE_ASN1_TYPE_SEQUENCE', 16); // SEQUENCE OF |
|
75 | -define('FILE_ASN1_TYPE_SET', 17); // SET OF |
|
74 | +define('FILE_ASN1_TYPE_SEQUENCE', 16); // SEQUENCE OF |
|
75 | +define('FILE_ASN1_TYPE_SET', 17); // SET OF |
|
76 | 76 | /**#@-*/ |
77 | 77 | /**#@+ |
78 | 78 | * More Tag Classes |
@@ -80,19 +80,19 @@ discard block |
||
80 | 80 | * @access private |
81 | 81 | * @link http://www.obj-sys.com/asn1tutorial/node10.html |
82 | 82 | */ |
83 | -define('FILE_ASN1_TYPE_NUMERIC_STRING', 18); |
|
84 | -define('FILE_ASN1_TYPE_PRINTABLE_STRING',19); |
|
85 | -define('FILE_ASN1_TYPE_TELETEX_STRING', 20); // T61String |
|
83 | +define('FILE_ASN1_TYPE_NUMERIC_STRING', 18); |
|
84 | +define('FILE_ASN1_TYPE_PRINTABLE_STRING', 19); |
|
85 | +define('FILE_ASN1_TYPE_TELETEX_STRING', 20); // T61String |
|
86 | 86 | define('FILE_ASN1_TYPE_VIDEOTEX_STRING', 21); |
87 | -define('FILE_ASN1_TYPE_IA5_STRING', 22); |
|
88 | -define('FILE_ASN1_TYPE_UTC_TIME', 23); |
|
89 | -define('FILE_ASN1_TYPE_GENERALIZED_TIME',24); |
|
90 | -define('FILE_ASN1_TYPE_GRAPHIC_STRING', 25); |
|
91 | -define('FILE_ASN1_TYPE_VISIBLE_STRING', 26); // ISO646String |
|
92 | -define('FILE_ASN1_TYPE_GENERAL_STRING', 27); |
|
93 | -define('FILE_ASN1_TYPE_UNIVERSAL_STRING',28); |
|
87 | +define('FILE_ASN1_TYPE_IA5_STRING', 22); |
|
88 | +define('FILE_ASN1_TYPE_UTC_TIME', 23); |
|
89 | +define('FILE_ASN1_TYPE_GENERALIZED_TIME', 24); |
|
90 | +define('FILE_ASN1_TYPE_GRAPHIC_STRING', 25); |
|
91 | +define('FILE_ASN1_TYPE_VISIBLE_STRING', 26); // ISO646String |
|
92 | +define('FILE_ASN1_TYPE_GENERAL_STRING', 27); |
|
93 | +define('FILE_ASN1_TYPE_UNIVERSAL_STRING', 28); |
|
94 | 94 | //define('FILE_ASN1_TYPE_CHARACTER_STRING',29); |
95 | -define('FILE_ASN1_TYPE_BMP_STRING', 30); |
|
95 | +define('FILE_ASN1_TYPE_BMP_STRING', 30); |
|
96 | 96 | /**#@-*/ |
97 | 97 | |
98 | 98 | /**#@+ |
@@ -102,8 +102,8 @@ discard block |
||
102 | 102 | * |
103 | 103 | * @access private |
104 | 104 | */ |
105 | -define('FILE_ASN1_TYPE_CHOICE', -1); |
|
106 | -define('FILE_ASN1_TYPE_ANY', -2); |
|
105 | +define('FILE_ASN1_TYPE_CHOICE', -1); |
|
106 | +define('FILE_ASN1_TYPE_ANY', -2); |
|
107 | 107 | /**#@-*/ |
108 | 108 | |
109 | 109 | /** |
@@ -292,7 +292,7 @@ discard block |
||
292 | 292 | { |
293 | 293 | $decoded = array(); |
294 | 294 | |
295 | - while ( strlen($encoded) ) { |
|
295 | + while (strlen($encoded)) { |
|
296 | 296 | $current = array('start' => $start); |
297 | 297 | |
298 | 298 | $type = ord($this->_string_shift($encoded)); |
@@ -309,30 +309,30 @@ discard block |
||
309 | 309 | $tag <<= 7; |
310 | 310 | $tag |= ord($this->_string_shift($encoded)) & 0x7F; |
311 | 311 | $start++; |
312 | - } while ( $loop ); |
|
312 | + } while ($loop); |
|
313 | 313 | } |
314 | 314 | |
315 | 315 | // Length, as discussed in paragraph 8.1.3 of X.690-0207.pdf#page=13 |
316 | 316 | $length = ord($this->_string_shift($encoded)); |
317 | 317 | $start++; |
318 | - if ( $length == 0x80 ) { // indefinite length |
|
318 | + if ($length == 0x80) { // indefinite length |
|
319 | 319 | // "[A sender shall] use the indefinite form (see 8.1.3.6) if the encoding is constructed and is not all |
320 | 320 | // immediately available." -- paragraph 8.1.3.2.c |
321 | 321 | //if ( !$constructed ) { |
322 | 322 | // return false; |
323 | 323 | //} |
324 | 324 | $length = strlen($encoded); |
325 | - } elseif ( $length & 0x80 ) { // definite length, long form |
|
325 | + } elseif ($length & 0x80) { // definite length, long form |
|
326 | 326 | // technically, the long form of the length can be represented by up to 126 octets (bytes), but we'll only |
327 | 327 | // support it up to four. |
328 | - $length&= 0x7F; |
|
328 | + $length &= 0x7F; |
|
329 | 329 | $temp = $this->_string_shift($encoded, $length); |
330 | 330 | // tags of indefinite length don't really have a header length; this length includes the tag |
331 | - $current+= array('headerlength' => $length + 2); |
|
332 | - $start+= $length; |
|
331 | + $current += array('headerlength' => $length + 2); |
|
332 | + $start += $length; |
|
333 | 333 | extract(unpack('Nlength', substr(str_pad($temp, 4, chr(0), STR_PAD_LEFT), -4))); |
334 | 334 | } else { |
335 | - $current+= array('headerlength' => 2); |
|
335 | + $current += array('headerlength' => 2); |
|
336 | 336 | } |
337 | 337 | |
338 | 338 | // End-of-content, see paragraphs 8.1.1.3, 8.1.3.2, 8.1.3.6, 8.1.5, and (for an example) 8.6.4.2 |
@@ -361,11 +361,11 @@ discard block |
||
361 | 361 | 'content' => $constructed ? $this->_decode_ber($content, $start) : $content, |
362 | 362 | 'length' => $length + $start - $current['start'] |
363 | 363 | ) + $current; |
364 | - $start+= $length; |
|
364 | + $start += $length; |
|
365 | 365 | continue 2; |
366 | 366 | } |
367 | 367 | |
368 | - $current+= array('type' => $tag); |
|
368 | + $current += array('type' => $tag); |
|
369 | 369 | |
370 | 370 | // decode UNIVERSAL tags |
371 | 371 | switch ($tag) { |
@@ -390,20 +390,20 @@ discard block |
||
390 | 390 | $current['content'] = $content; |
391 | 391 | } else { |
392 | 392 | $temp = $this->_decode_ber($content, $start); |
393 | - $length-= strlen($content); |
|
393 | + $length -= strlen($content); |
|
394 | 394 | $last = count($temp) - 1; |
395 | 395 | for ($i = 0; $i < $last; $i++) { |
396 | 396 | // all subtags should be bit strings |
397 | 397 | //if ($temp[$i]['type'] != FILE_ASN1_TYPE_BIT_STRING) { |
398 | 398 | // return false; |
399 | 399 | //} |
400 | - $current['content'].= substr($temp[$i]['content'], 1); |
|
400 | + $current['content'] .= substr($temp[$i]['content'], 1); |
|
401 | 401 | } |
402 | 402 | // all subtags should be bit strings |
403 | 403 | //if ($temp[$last]['type'] != FILE_ASN1_TYPE_BIT_STRING) { |
404 | 404 | // return false; |
405 | 405 | //} |
406 | - $current['content'] = $temp[$last]['content'][0] . $current['content'] . substr($temp[$i]['content'], 1); |
|
406 | + $current['content'] = $temp[$last]['content'][0].$current['content'].substr($temp[$i]['content'], 1); |
|
407 | 407 | } |
408 | 408 | break; |
409 | 409 | case FILE_ASN1_TYPE_OCTET_STRING: |
@@ -411,13 +411,13 @@ discard block |
||
411 | 411 | $current['content'] = $content; |
412 | 412 | } else { |
413 | 413 | $temp = $this->_decode_ber($content, $start); |
414 | - $length-= strlen($content); |
|
414 | + $length -= strlen($content); |
|
415 | 415 | for ($i = 0, $size = count($temp); $i < $size; $i++) { |
416 | 416 | // all subtags should be octet strings |
417 | 417 | //if ($temp[$i]['type'] != FILE_ASN1_TYPE_OCTET_STRING) { |
418 | 418 | // return false; |
419 | 419 | //} |
420 | - $current['content'].= $temp[$i]['content']; |
|
420 | + $current['content'] .= $temp[$i]['content']; |
|
421 | 421 | } |
422 | 422 | // $length = |
423 | 423 | } |
@@ -442,7 +442,7 @@ discard block |
||
442 | 442 | $valuen <<= 7; |
443 | 443 | $valuen |= $temp & 0x7F; |
444 | 444 | if (~$temp & 0x80) { |
445 | - $current['content'].= ".$valuen"; |
|
445 | + $current['content'] .= ".$valuen"; |
|
446 | 446 | $valuen = 0; |
447 | 447 | } |
448 | 448 | } |
@@ -488,7 +488,7 @@ discard block |
||
488 | 488 | |
489 | 489 | } |
490 | 490 | |
491 | - $start+= $length; |
|
491 | + $start += $length; |
|
492 | 492 | $decoded[] = $current + array('length' => $start - $current['start']); |
493 | 493 | } |
494 | 494 | |
@@ -620,7 +620,7 @@ discard block |
||
620 | 620 | } |
621 | 621 | |
622 | 622 | // Fail mapping if all input items have not been consumed. |
623 | - return $i < $n? NULL: $map; |
|
623 | + return $i < $n ? NULL : $map; |
|
624 | 624 | |
625 | 625 | // the main diff between sets and sequences is the encapsulation of the foreach in another for loop |
626 | 626 | case FILE_ASN1_TYPE_SET: |
@@ -761,8 +761,7 @@ discard block |
||
761 | 761 | if (isset($mapping['mapping'])) { |
762 | 762 | $temp = (int) $temp->toString(); |
763 | 763 | return isset($mapping['mapping'][$temp]) ? |
764 | - $mapping['mapping'][$temp] : |
|
765 | - false; |
|
764 | + $mapping['mapping'][$temp] : false; |
|
766 | 765 | } |
767 | 766 | return $temp; |
768 | 767 | } |
@@ -815,7 +814,7 @@ discard block |
||
815 | 814 | switch ($tag) { |
816 | 815 | case FILE_ASN1_TYPE_SET: // Children order is not important, thus process in sequence. |
817 | 816 | case FILE_ASN1_TYPE_SEQUENCE: |
818 | - $tag|= 0x20; // set the constructed bit |
|
817 | + $tag |= 0x20; // set the constructed bit |
|
819 | 818 | $value = ''; |
820 | 819 | |
821 | 820 | // ignore the min and max |
@@ -827,7 +826,7 @@ discard block |
||
827 | 826 | if ($temp === false) { |
828 | 827 | return false; |
829 | 828 | } |
830 | - $value.= $temp; |
|
829 | + $value .= $temp; |
|
831 | 830 | } |
832 | 831 | break; |
833 | 832 | } |
@@ -864,13 +863,13 @@ discard block |
||
864 | 863 | */ |
865 | 864 | if (isset($child['explicit']) || $child['type'] == FILE_ASN1_TYPE_CHOICE) { |
866 | 865 | $subtag = chr((FILE_ASN1_CLASS_CONTEXT_SPECIFIC << 6) | 0x20 | $child['constant']); |
867 | - $temp = $subtag . $this->_encodeLength(strlen($temp)) . $temp; |
|
866 | + $temp = $subtag.$this->_encodeLength(strlen($temp)).$temp; |
|
868 | 867 | } else { |
869 | 868 | $subtag = chr((FILE_ASN1_CLASS_CONTEXT_SPECIFIC << 6) | (ord($temp[0]) & 0x20) | $child['constant']); |
870 | - $temp = $subtag . substr($temp, 1); |
|
869 | + $temp = $subtag.substr($temp, 1); |
|
871 | 870 | } |
872 | 871 | } |
873 | - $value.= $temp; |
|
872 | + $value .= $temp; |
|
874 | 873 | } |
875 | 874 | break; |
876 | 875 | case FILE_ASN1_TYPE_CHOICE: |
@@ -898,10 +897,10 @@ discard block |
||
898 | 897 | if (isset($child['constant'])) { |
899 | 898 | if (isset($child['explicit']) || $child['type'] == FILE_ASN1_TYPE_CHOICE) { |
900 | 899 | $subtag = chr((FILE_ASN1_CLASS_CONTEXT_SPECIFIC << 6) | 0x20 | $child['constant']); |
901 | - $temp = $subtag . $this->_encodeLength(strlen($temp)) . $temp; |
|
900 | + $temp = $subtag.$this->_encodeLength(strlen($temp)).$temp; |
|
902 | 901 | } else { |
903 | 902 | $subtag = chr((FILE_ASN1_CLASS_CONTEXT_SPECIFIC << 6) | (ord($temp[0]) & 0x20) | $child['constant']); |
904 | - $temp = $subtag . substr($temp, 1); |
|
903 | + $temp = $subtag.substr($temp, 1); |
|
905 | 904 | } |
906 | 905 | } |
907 | 906 | } |
@@ -934,8 +933,8 @@ discard block |
||
934 | 933 | case FILE_ASN1_TYPE_UTC_TIME: |
935 | 934 | case FILE_ASN1_TYPE_GENERALIZED_TIME: |
936 | 935 | $format = $mapping['type'] == FILE_ASN1_TYPE_UTC_TIME ? 'y' : 'Y'; |
937 | - $format.= 'mdHis'; |
|
938 | - $value = @gmdate($format, strtotime($source)) . 'Z'; |
|
936 | + $format .= 'mdHis'; |
|
937 | + $value = @gmdate($format, strtotime($source)).'Z'; |
|
939 | 938 | break; |
940 | 939 | case FILE_ASN1_TYPE_BIT_STRING: |
941 | 940 | if (isset($mapping['mapping'])) { |
@@ -960,7 +959,7 @@ discard block |
||
960 | 959 | $bits = implode('', array_pad($bits, $size + $offset + 1, 0)); |
961 | 960 | $bytes = explode(' ', rtrim(chunk_split($bits, 8, ' '))); |
962 | 961 | foreach ($bytes as $byte) { |
963 | - $value.= chr(bindec($byte)); |
|
962 | + $value .= chr(bindec($byte)); |
|
964 | 963 | } |
965 | 964 | |
966 | 965 | break; |
@@ -987,12 +986,12 @@ discard block |
||
987 | 986 | $temp = "\0"; |
988 | 987 | } else { |
989 | 988 | while ($parts[$i]) { |
990 | - $temp = chr(0x80 | ($parts[$i] & 0x7F)) . $temp; |
|
989 | + $temp = chr(0x80 | ($parts[$i] & 0x7F)).$temp; |
|
991 | 990 | $parts[$i] >>= 7; |
992 | 991 | } |
993 | 992 | $temp[strlen($temp) - 1] = $temp[strlen($temp) - 1] & chr(0x7F); |
994 | 993 | } |
995 | - $value.= $temp; |
|
994 | + $value .= $temp; |
|
996 | 995 | } |
997 | 996 | break; |
998 | 997 | case FILE_ASN1_TYPE_ANY: |
@@ -1028,7 +1027,7 @@ discard block |
||
1028 | 1027 | $filters = $filters[$part]; |
1029 | 1028 | } |
1030 | 1029 | if ($filters === false) { |
1031 | - user_error('No filters defined for ' . implode('/', $loc)); |
|
1030 | + user_error('No filters defined for '.implode('/', $loc)); |
|
1032 | 1031 | return false; |
1033 | 1032 | } |
1034 | 1033 | return $this->_encode_der($source, $filters + $mapping); |
@@ -1052,7 +1051,7 @@ discard block |
||
1052 | 1051 | $value = $source ? "\xFF" : "\x00"; |
1053 | 1052 | break; |
1054 | 1053 | default: |
1055 | - user_error('Mapping provides no type definition for ' . implode('/', $this->location)); |
|
1054 | + user_error('Mapping provides no type definition for '.implode('/', $this->location)); |
|
1056 | 1055 | return false; |
1057 | 1056 | } |
1058 | 1057 | |
@@ -1064,7 +1063,7 @@ discard block |
||
1064 | 1063 | $tag = ($mapping['class'] << 6) | ($tag & 0x20) | $mapping['cast']; |
1065 | 1064 | } |
1066 | 1065 | |
1067 | - return chr($tag) . $this->_encodeLength(strlen($value)) . $value; |
|
1066 | + return chr($tag).$this->_encodeLength(strlen($value)).$value; |
|
1068 | 1067 | } |
1069 | 1068 | |
1070 | 1069 | /** |
@@ -1108,8 +1107,7 @@ discard block |
||
1108 | 1107 | http://www.obj-sys.com/asn1tutorial/node14.html */ |
1109 | 1108 | |
1110 | 1109 | $pattern = $tag == FILE_ASN1_TYPE_UTC_TIME ? |
1111 | - '#(..)(..)(..)(..)(..)(..)(.*)#' : |
|
1112 | - '#(....)(..)(..)(..)(..)(..).*([Z+-].*)$#'; |
|
1110 | + '#(..)(..)(..)(..)(..)(..)(.*)#' : '#(....)(..)(..)(..)(..)(..).*([Z+-].*)$#'; |
|
1113 | 1111 | |
1114 | 1112 | preg_match($pattern, $content, $matches); |
1115 | 1113 |
@@ -258,7 +258,7 @@ discard block |
||
258 | 258 | */ |
259 | 259 | function Math_BigInteger($x = 0, $base = 10) |
260 | 260 | { |
261 | - if ( !defined('MATH_BIGINTEGER_MODE') ) { |
|
261 | + if (!defined('MATH_BIGINTEGER_MODE')) { |
|
262 | 262 | switch (true) { |
263 | 263 | case extension_loaded('gmp'): |
264 | 264 | define('MATH_BIGINTEGER_MODE', MATH_BIGINTEGER_MODE_GMP); |
@@ -282,25 +282,25 @@ discard block |
||
282 | 282 | if (!defined('MATH_BIGINTEGER_BASE') && MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_INTERNAL) { |
283 | 283 | switch (PHP_INT_SIZE) { |
284 | 284 | case 8: // use 64-bit integers if int size is 8 bytes |
285 | - define('MATH_BIGINTEGER_BASE', 31); |
|
286 | - define('MATH_BIGINTEGER_BASE_FULL', 0x80000000); |
|
287 | - define('MATH_BIGINTEGER_MAX_DIGIT', 0x7FFFFFFF); |
|
288 | - define('MATH_BIGINTEGER_MSB', 0x40000000); |
|
285 | + define('MATH_BIGINTEGER_BASE', 31); |
|
286 | + define('MATH_BIGINTEGER_BASE_FULL', 0x80000000); |
|
287 | + define('MATH_BIGINTEGER_MAX_DIGIT', 0x7FFFFFFF); |
|
288 | + define('MATH_BIGINTEGER_MSB', 0x40000000); |
|
289 | 289 | // 10**9 is the closest we can get to 2**31 without passing it |
290 | - define('MATH_BIGINTEGER_MAX10', 1000000000); |
|
291 | - define('MATH_BIGINTEGER_MAX10_LEN', 9); |
|
290 | + define('MATH_BIGINTEGER_MAX10', 1000000000); |
|
291 | + define('MATH_BIGINTEGER_MAX10_LEN', 9); |
|
292 | 292 | // the largest digit that may be used in addition / subtraction |
293 | 293 | define('MATH_BIGINTEGER_MAX_DIGIT2', pow(2, 62)); |
294 | 294 | break; |
295 | 295 | //case 4: // use 64-bit floats if int size is 4 bytes |
296 | 296 | default: |
297 | - define('MATH_BIGINTEGER_BASE', 26); |
|
298 | - define('MATH_BIGINTEGER_BASE_FULL', 0x4000000); |
|
299 | - define('MATH_BIGINTEGER_MAX_DIGIT', 0x3FFFFFF); |
|
300 | - define('MATH_BIGINTEGER_MSB', 0x2000000); |
|
297 | + define('MATH_BIGINTEGER_BASE', 26); |
|
298 | + define('MATH_BIGINTEGER_BASE_FULL', 0x4000000); |
|
299 | + define('MATH_BIGINTEGER_MAX_DIGIT', 0x3FFFFFF); |
|
300 | + define('MATH_BIGINTEGER_MSB', 0x2000000); |
|
301 | 301 | // 10**7 is the closest to 2**26 without passing it |
302 | - define('MATH_BIGINTEGER_MAX10', 10000000); |
|
303 | - define('MATH_BIGINTEGER_MAX10_LEN', 7); |
|
302 | + define('MATH_BIGINTEGER_MAX10', 10000000); |
|
303 | + define('MATH_BIGINTEGER_MAX10_LEN', 7); |
|
304 | 304 | // the largest digit that may be used in addition / subtraction |
305 | 305 | // we do pow(2, 52) instead of using 4503599627370496 directly because some |
306 | 306 | // PHP installations will truncate 4503599627370496. |
@@ -308,7 +308,7 @@ discard block |
||
308 | 308 | } |
309 | 309 | } |
310 | 310 | |
311 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
311 | + switch (MATH_BIGINTEGER_MODE) { |
|
312 | 312 | case MATH_BIGINTEGER_MODE_GMP: |
313 | 313 | if (is_resource($x) && get_resource_type($x) == 'GMP integer') { |
314 | 314 | $this->value = $x; |
@@ -336,10 +336,10 @@ discard block |
||
336 | 336 | $this->is_negative = true; |
337 | 337 | } |
338 | 338 | case 256: |
339 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
339 | + switch (MATH_BIGINTEGER_MODE) { |
|
340 | 340 | case MATH_BIGINTEGER_MODE_GMP: |
341 | 341 | $sign = $this->is_negative ? '-' : ''; |
342 | - $this->value = gmp_init($sign . '0x' . bin2hex($x)); |
|
342 | + $this->value = gmp_init($sign.'0x'.bin2hex($x)); |
|
343 | 343 | break; |
344 | 344 | case MATH_BIGINTEGER_MODE_BCMATH: |
345 | 345 | // round $len to the nearest 4 (thanks, DavidMJ!) |
@@ -347,13 +347,13 @@ discard block |
||
347 | 347 | |
348 | 348 | $x = str_pad($x, $len, chr(0), STR_PAD_LEFT); |
349 | 349 | |
350 | - for ($i = 0; $i < $len; $i+= 4) { |
|
350 | + for ($i = 0; $i < $len; $i += 4) { |
|
351 | 351 | $this->value = bcmul($this->value, '4294967296', 0); // 4294967296 == 2**32 |
352 | 352 | $this->value = bcadd($this->value, 0x1000000 * ord($x[$i]) + ((ord($x[$i + 1]) << 16) | (ord($x[$i + 2]) << 8) | ord($x[$i + 3])), 0); |
353 | 353 | } |
354 | 354 | |
355 | 355 | if ($this->is_negative) { |
356 | - $this->value = '-' . $this->value; |
|
356 | + $this->value = '-'.$this->value; |
|
357 | 357 | } |
358 | 358 | |
359 | 359 | break; |
@@ -387,20 +387,20 @@ discard block |
||
387 | 387 | $x = bin2hex(~pack('H*', $x)); |
388 | 388 | } |
389 | 389 | |
390 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
390 | + switch (MATH_BIGINTEGER_MODE) { |
|
391 | 391 | case MATH_BIGINTEGER_MODE_GMP: |
392 | - $temp = $this->is_negative ? '-0x' . $x : '0x' . $x; |
|
392 | + $temp = $this->is_negative ? '-0x'.$x : '0x'.$x; |
|
393 | 393 | $this->value = gmp_init($temp); |
394 | 394 | $this->is_negative = false; |
395 | 395 | break; |
396 | 396 | case MATH_BIGINTEGER_MODE_BCMATH: |
397 | - $x = ( strlen($x) & 1 ) ? '0' . $x : $x; |
|
397 | + $x = (strlen($x) & 1) ? '0'.$x : $x; |
|
398 | 398 | $temp = new Math_BigInteger(pack('H*', $x), 256); |
399 | - $this->value = $this->is_negative ? '-' . $temp->value : $temp->value; |
|
399 | + $this->value = $this->is_negative ? '-'.$temp->value : $temp->value; |
|
400 | 400 | $this->is_negative = false; |
401 | 401 | break; |
402 | 402 | default: |
403 | - $x = ( strlen($x) & 1 ) ? '0' . $x : $x; |
|
403 | + $x = (strlen($x) & 1) ? '0'.$x : $x; |
|
404 | 404 | $temp = new Math_BigInteger(pack('H*', $x), 256); |
405 | 405 | $this->value = $temp->value; |
406 | 406 | } |
@@ -417,7 +417,7 @@ discard block |
||
417 | 417 | // [^-0-9].*: find any non-numeric characters and then any characters that follow that |
418 | 418 | $x = preg_replace('#(?<!^)(?:-).*|(?<=^|-)0*|[^-0-9].*#', '', $x); |
419 | 419 | |
420 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
420 | + switch (MATH_BIGINTEGER_MODE) { |
|
421 | 421 | case MATH_BIGINTEGER_MODE_GMP: |
422 | 422 | $this->value = gmp_init($x); |
423 | 423 | break; |
@@ -461,12 +461,12 @@ discard block |
||
461 | 461 | $str = '0x'; |
462 | 462 | while (strlen($x)) { |
463 | 463 | $part = substr($x, 0, 4); |
464 | - $str.= dechex(bindec($part)); |
|
464 | + $str .= dechex(bindec($part)); |
|
465 | 465 | $x = substr($x, 4); |
466 | 466 | } |
467 | 467 | |
468 | 468 | if ($this->is_negative) { |
469 | - $str = '-' . $str; |
|
469 | + $str = '-'.$str; |
|
470 | 470 | } |
471 | 471 | |
472 | 472 | $temp = new Math_BigInteger($str, 8 * $base); // ie. either -16 or +16 |
@@ -517,25 +517,24 @@ discard block |
||
517 | 517 | } |
518 | 518 | |
519 | 519 | if (ord($bytes[0]) & 0x80) { |
520 | - $bytes = chr(0) . $bytes; |
|
520 | + $bytes = chr(0).$bytes; |
|
521 | 521 | } |
522 | 522 | |
523 | 523 | return $comparison < 0 ? ~$bytes : $bytes; |
524 | 524 | } |
525 | 525 | |
526 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
526 | + switch (MATH_BIGINTEGER_MODE) { |
|
527 | 527 | case MATH_BIGINTEGER_MODE_GMP: |
528 | 528 | if (gmp_cmp($this->value, gmp_init(0)) == 0) { |
529 | 529 | return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : ''; |
530 | 530 | } |
531 | 531 | |
532 | 532 | $temp = gmp_strval(gmp_abs($this->value), 16); |
533 | - $temp = ( strlen($temp) & 1 ) ? '0' . $temp : $temp; |
|
533 | + $temp = (strlen($temp) & 1) ? '0'.$temp : $temp; |
|
534 | 534 | $temp = pack('H*', $temp); |
535 | 535 | |
536 | 536 | return $this->precision > 0 ? |
537 | - substr(str_pad($temp, $this->precision >> 3, chr(0), STR_PAD_LEFT), -($this->precision >> 3)) : |
|
538 | - ltrim($temp, chr(0)); |
|
537 | + substr(str_pad($temp, $this->precision >> 3, chr(0), STR_PAD_LEFT), -($this->precision >> 3)) : ltrim($temp, chr(0)); |
|
539 | 538 | case MATH_BIGINTEGER_MODE_BCMATH: |
540 | 539 | if ($this->value === '0') { |
541 | 540 | return $this->precision > 0 ? str_repeat(chr(0), ($this->precision + 1) >> 3) : ''; |
@@ -550,13 +549,12 @@ discard block |
||
550 | 549 | |
551 | 550 | while (bccomp($current, '0', 0) > 0) { |
552 | 551 | $temp = bcmod($current, '16777216'); |
553 | - $value = chr($temp >> 16) . chr($temp >> 8) . chr($temp) . $value; |
|
552 | + $value = chr($temp >> 16).chr($temp >> 8).chr($temp).$value; |
|
554 | 553 | $current = bcdiv($current, '16777216', 0); |
555 | 554 | } |
556 | 555 | |
557 | 556 | return $this->precision > 0 ? |
558 | - substr(str_pad($value, $this->precision >> 3, chr(0), STR_PAD_LEFT), -($this->precision >> 3)) : |
|
559 | - ltrim($value, chr(0)); |
|
557 | + substr(str_pad($value, $this->precision >> 3, chr(0), STR_PAD_LEFT), -($this->precision >> 3)) : ltrim($value, chr(0)); |
|
560 | 558 | } |
561 | 559 | |
562 | 560 | if (!count($this->value)) { |
@@ -572,8 +570,7 @@ discard block |
||
572 | 570 | } |
573 | 571 | |
574 | 572 | return $this->precision > 0 ? |
575 | - str_pad(substr($result, -(($this->precision + 7) >> 3)), ($this->precision + 7) >> 3, chr(0), STR_PAD_LEFT) : |
|
576 | - $result; |
|
573 | + str_pad(substr($result, -(($this->precision + 7) >> 3)), ($this->precision + 7) >> 3, chr(0), STR_PAD_LEFT) : $result; |
|
577 | 574 | } |
578 | 575 | |
579 | 576 | /** |
@@ -629,16 +626,16 @@ discard block |
||
629 | 626 | { |
630 | 627 | $hex = $this->toHex($twos_compliment); |
631 | 628 | $bits = ''; |
632 | - for ($i = strlen($hex) - 8, $start = strlen($hex) & 7; $i >= $start; $i-=8) { |
|
633 | - $bits = str_pad(decbin(hexdec(substr($hex, $i, 8))), 32, '0', STR_PAD_LEFT) . $bits; |
|
629 | + for ($i = strlen($hex) - 8, $start = strlen($hex) & 7; $i >= $start; $i -= 8) { |
|
630 | + $bits = str_pad(decbin(hexdec(substr($hex, $i, 8))), 32, '0', STR_PAD_LEFT).$bits; |
|
634 | 631 | } |
635 | 632 | if ($start) { // hexdec('') == 0 |
636 | - $bits = str_pad(decbin(hexdec(substr($hex, 0, $start))), 8, '0', STR_PAD_LEFT) . $bits; |
|
633 | + $bits = str_pad(decbin(hexdec(substr($hex, 0, $start))), 8, '0', STR_PAD_LEFT).$bits; |
|
637 | 634 | } |
638 | 635 | $result = $this->precision > 0 ? substr($bits, -$this->precision) : ltrim($bits, '0'); |
639 | 636 | |
640 | 637 | if ($twos_compliment && $this->compare(new Math_BigInteger()) > 0 && $this->precision <= 0) { |
641 | - return '0' . $result; |
|
638 | + return '0'.$result; |
|
642 | 639 | } |
643 | 640 | |
644 | 641 | return $result; |
@@ -664,7 +661,7 @@ discard block |
||
664 | 661 | */ |
665 | 662 | function toString() |
666 | 663 | { |
667 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
664 | + switch (MATH_BIGINTEGER_MODE) { |
|
668 | 665 | case MATH_BIGINTEGER_MODE_GMP: |
669 | 666 | return gmp_strval($this->value); |
670 | 667 | case MATH_BIGINTEGER_MODE_BCMATH: |
@@ -687,7 +684,7 @@ discard block |
||
687 | 684 | $result = ''; |
688 | 685 | while (count($temp->value)) { |
689 | 686 | list($temp, $mod) = $temp->divide($divisor); |
690 | - $result = str_pad(isset($mod->value[0]) ? $mod->value[0] : '', MATH_BIGINTEGER_MAX10_LEN, '0', STR_PAD_LEFT) . $result; |
|
687 | + $result = str_pad(isset($mod->value[0]) ? $mod->value[0] : '', MATH_BIGINTEGER_MAX10_LEN, '0', STR_PAD_LEFT).$result; |
|
691 | 688 | } |
692 | 689 | $result = ltrim($result, '0'); |
693 | 690 | if (empty($result)) { |
@@ -695,7 +692,7 @@ discard block |
||
695 | 692 | } |
696 | 693 | |
697 | 694 | if ($this->is_negative) { |
698 | - $result = '-' . $result; |
|
695 | + $result = '-'.$result; |
|
699 | 696 | } |
700 | 697 | |
701 | 698 | return $result; |
@@ -821,7 +818,7 @@ discard block |
||
821 | 818 | */ |
822 | 819 | function add($y) |
823 | 820 | { |
824 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
821 | + switch (MATH_BIGINTEGER_MODE) { |
|
825 | 822 | case MATH_BIGINTEGER_MODE_GMP: |
826 | 823 | $temp = new Math_BigInteger(); |
827 | 824 | $temp->value = gmp_add($this->value, $y->value); |
@@ -871,8 +868,8 @@ discard block |
||
871 | 868 | } |
872 | 869 | |
873 | 870 | // subtract, if appropriate |
874 | - if ( $x_negative != $y_negative ) { |
|
875 | - if ( $x_value == $y_value ) { |
|
871 | + if ($x_negative != $y_negative) { |
|
872 | + if ($x_value == $y_value) { |
|
876 | 873 | return array( |
877 | 874 | MATH_BIGINTEGER_VALUE => array(), |
878 | 875 | MATH_BIGINTEGER_SIGN => false |
@@ -897,7 +894,7 @@ discard block |
||
897 | 894 | $value[] = 0; // just in case the carry adds an extra digit |
898 | 895 | |
899 | 896 | $carry = 0; |
900 | - for ($i = 0, $j = 1; $j < $size; $i+=2, $j+=2) { |
|
897 | + for ($i = 0, $j = 1; $j < $size; $i += 2, $j += 2) { |
|
901 | 898 | $sum = $x_value[$j] * MATH_BIGINTEGER_BASE_FULL + $x_value[$i] + $y_value[$j] * MATH_BIGINTEGER_BASE_FULL + $y_value[$i] + $carry; |
902 | 899 | $carry = $sum >= MATH_BIGINTEGER_MAX_DIGIT2; // eg. floor($sum / 2**52); only possible values (in any base) are 0 and 1 |
903 | 900 | $sum = $carry ? $sum - MATH_BIGINTEGER_MAX_DIGIT2 : $sum; |
@@ -952,7 +949,7 @@ discard block |
||
952 | 949 | */ |
953 | 950 | function subtract($y) |
954 | 951 | { |
955 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
952 | + switch (MATH_BIGINTEGER_MODE) { |
|
956 | 953 | case MATH_BIGINTEGER_MODE_GMP: |
957 | 954 | $temp = new Math_BigInteger(); |
958 | 955 | $temp->value = gmp_sub($this->value, $y->value); |
@@ -1002,7 +999,7 @@ discard block |
||
1002 | 999 | } |
1003 | 1000 | |
1004 | 1001 | // add, if appropriate (ie. -$x - +$y or +$x - -$y) |
1005 | - if ( $x_negative != $y_negative ) { |
|
1002 | + if ($x_negative != $y_negative) { |
|
1006 | 1003 | $temp = $this->_add($x_value, false, $y_value, false); |
1007 | 1004 | $temp[MATH_BIGINTEGER_SIGN] = $x_negative; |
1008 | 1005 | |
@@ -1011,7 +1008,7 @@ discard block |
||
1011 | 1008 | |
1012 | 1009 | $diff = $this->_compare($x_value, $x_negative, $y_value, $y_negative); |
1013 | 1010 | |
1014 | - if ( !$diff ) { |
|
1011 | + if (!$diff) { |
|
1015 | 1012 | return array( |
1016 | 1013 | MATH_BIGINTEGER_VALUE => array(), |
1017 | 1014 | MATH_BIGINTEGER_SIGN => false |
@@ -1019,7 +1016,7 @@ discard block |
||
1019 | 1016 | } |
1020 | 1017 | |
1021 | 1018 | // switch $x and $y around, if appropriate. |
1022 | - if ( (!$x_negative && $diff < 0) || ($x_negative && $diff > 0) ) { |
|
1019 | + if ((!$x_negative && $diff < 0) || ($x_negative && $diff > 0)) { |
|
1023 | 1020 | $temp = $x_value; |
1024 | 1021 | $x_value = $y_value; |
1025 | 1022 | $y_value = $temp; |
@@ -1033,7 +1030,7 @@ discard block |
||
1033 | 1030 | // at this point, $x_value should be at least as big as - if not bigger than - $y_value |
1034 | 1031 | |
1035 | 1032 | $carry = 0; |
1036 | - for ($i = 0, $j = 1; $j < $y_size; $i+=2, $j+=2) { |
|
1033 | + for ($i = 0, $j = 1; $j < $y_size; $i += 2, $j += 2) { |
|
1037 | 1034 | $sum = $x_value[$j] * MATH_BIGINTEGER_BASE_FULL + $x_value[$i] - $y_value[$j] * MATH_BIGINTEGER_BASE_FULL - $y_value[$i] - $carry; |
1038 | 1035 | $carry = $sum < 0; // eg. floor($sum / 2**52); only possible values (in any base) are 0 and 1 |
1039 | 1036 | $sum = $carry ? $sum + MATH_BIGINTEGER_MAX_DIGIT2 : $sum; |
@@ -1087,7 +1084,7 @@ discard block |
||
1087 | 1084 | */ |
1088 | 1085 | function multiply($x) |
1089 | 1086 | { |
1090 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
1087 | + switch (MATH_BIGINTEGER_MODE) { |
|
1091 | 1088 | case MATH_BIGINTEGER_MODE_GMP: |
1092 | 1089 | $temp = new Math_BigInteger(); |
1093 | 1090 | $temp->value = gmp_mul($this->value, $x->value); |
@@ -1131,7 +1128,7 @@ discard block |
||
1131 | 1128 | $x_length = count($x_value); |
1132 | 1129 | $y_length = count($y_value); |
1133 | 1130 | |
1134 | - if ( !$x_length || !$y_length ) { // a 0 is being multiplied |
|
1131 | + if (!$x_length || !$y_length) { // a 0 is being multiplied |
|
1135 | 1132 | return array( |
1136 | 1133 | MATH_BIGINTEGER_VALUE => array(), |
1137 | 1134 | MATH_BIGINTEGER_SIGN => false |
@@ -1140,8 +1137,7 @@ discard block |
||
1140 | 1137 | |
1141 | 1138 | return array( |
1142 | 1139 | MATH_BIGINTEGER_VALUE => min($x_length, $y_length) < 2 * MATH_BIGINTEGER_KARATSUBA_CUTOFF ? |
1143 | - $this->_trim($this->_regularMultiply($x_value, $y_value)) : |
|
1144 | - $this->_trim($this->_karatsuba($x_value, $y_value)), |
|
1140 | + $this->_trim($this->_regularMultiply($x_value, $y_value)) : $this->_trim($this->_karatsuba($x_value, $y_value)), |
|
1145 | 1141 | MATH_BIGINTEGER_SIGN => $x_negative != $y_negative |
1146 | 1142 | ); |
1147 | 1143 | } |
@@ -1161,11 +1157,11 @@ discard block |
||
1161 | 1157 | $x_length = count($x_value); |
1162 | 1158 | $y_length = count($y_value); |
1163 | 1159 | |
1164 | - if ( !$x_length || !$y_length ) { // a 0 is being multiplied |
|
1160 | + if (!$x_length || !$y_length) { // a 0 is being multiplied |
|
1165 | 1161 | return array(); |
1166 | 1162 | } |
1167 | 1163 | |
1168 | - if ( $x_length < $y_length ) { |
|
1164 | + if ($x_length < $y_length) { |
|
1169 | 1165 | $temp = $x_value; |
1170 | 1166 | $x_value = $y_value; |
1171 | 1167 | $y_value = $temp; |
@@ -1261,8 +1257,7 @@ discard block |
||
1261 | 1257 | function _square($x = false) |
1262 | 1258 | { |
1263 | 1259 | return count($x) < 2 * MATH_BIGINTEGER_KARATSUBA_CUTOFF ? |
1264 | - $this->_trim($this->_baseSquare($x)) : |
|
1265 | - $this->_trim($this->_karatsubaSquare($x)); |
|
1260 | + $this->_trim($this->_baseSquare($x)) : $this->_trim($this->_karatsubaSquare($x)); |
|
1266 | 1261 | } |
1267 | 1262 | |
1268 | 1263 | /** |
@@ -1278,7 +1273,7 @@ discard block |
||
1278 | 1273 | */ |
1279 | 1274 | function _baseSquare($value) |
1280 | 1275 | { |
1281 | - if ( empty($value) ) { |
|
1276 | + if (empty($value)) { |
|
1282 | 1277 | return array(); |
1283 | 1278 | } |
1284 | 1279 | $square_value = $this->_array_repeat(0, 2 * count($value)); |
@@ -1374,7 +1369,7 @@ discard block |
||
1374 | 1369 | */ |
1375 | 1370 | function divide($y) |
1376 | 1371 | { |
1377 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
1372 | + switch (MATH_BIGINTEGER_MODE) { |
|
1378 | 1373 | case MATH_BIGINTEGER_MODE_GMP: |
1379 | 1374 | $quotient = new Math_BigInteger(); |
1380 | 1375 | $remainder = new Math_BigInteger(); |
@@ -1411,7 +1406,7 @@ discard block |
||
1411 | 1406 | } |
1412 | 1407 | |
1413 | 1408 | static $zero; |
1414 | - if ( !isset($zero) ) { |
|
1409 | + if (!isset($zero)) { |
|
1415 | 1410 | $zero = new Math_BigInteger(); |
1416 | 1411 | } |
1417 | 1412 | |
@@ -1425,16 +1420,16 @@ discard block |
||
1425 | 1420 | |
1426 | 1421 | $diff = $x->compare($y); |
1427 | 1422 | |
1428 | - if ( !$diff ) { |
|
1423 | + if (!$diff) { |
|
1429 | 1424 | $temp = new Math_BigInteger(); |
1430 | 1425 | $temp->value = array(1); |
1431 | 1426 | $temp->is_negative = $x_sign != $y_sign; |
1432 | 1427 | return array($this->_normalize($temp), $this->_normalize(new Math_BigInteger())); |
1433 | 1428 | } |
1434 | 1429 | |
1435 | - if ( $diff < 0 ) { |
|
1430 | + if ($diff < 0) { |
|
1436 | 1431 | // if $x is negative, "add" $y. |
1437 | - if ( $x_sign ) { |
|
1432 | + if ($x_sign) { |
|
1438 | 1433 | $x = $y->subtract($x); |
1439 | 1434 | } |
1440 | 1435 | return array($this->_normalize(new Math_BigInteger()), $this->_normalize($x)); |
@@ -1459,16 +1454,16 @@ discard block |
||
1459 | 1454 | static $temp, $lhs, $rhs; |
1460 | 1455 | if (!isset($temp)) { |
1461 | 1456 | $temp = new Math_BigInteger(); |
1462 | - $lhs = new Math_BigInteger(); |
|
1463 | - $rhs = new Math_BigInteger(); |
|
1457 | + $lhs = new Math_BigInteger(); |
|
1458 | + $rhs = new Math_BigInteger(); |
|
1464 | 1459 | } |
1465 | 1460 | $temp_value = &$temp->value; |
1466 | - $rhs_value = &$rhs->value; |
|
1461 | + $rhs_value = &$rhs->value; |
|
1467 | 1462 | |
1468 | 1463 | // $temp = $y << ($x_max - $y_max-1) in base 2**26 |
1469 | 1464 | $temp_value = array_merge($this->_array_repeat(0, $x_max - $y_max), $y_value); |
1470 | 1465 | |
1471 | - while ( $x->compare($temp) >= 0 ) { |
|
1466 | + while ($x->compare($temp) >= 0) { |
|
1472 | 1467 | // calculate the "common residue" |
1473 | 1468 | ++$quotient_value[$x_max - $y_max]; |
1474 | 1469 | $x = $x->subtract($temp); |
@@ -1484,7 +1479,7 @@ discard block |
||
1484 | 1479 | ); |
1485 | 1480 | $y_window = array( |
1486 | 1481 | $y_value[$y_max], |
1487 | - ( $y_max > 0 ) ? $y_value[$y_max - 1] : 0 |
|
1482 | + ($y_max > 0) ? $y_value[$y_max - 1] : 0 |
|
1488 | 1483 | ); |
1489 | 1484 | |
1490 | 1485 | $q_index = $i - $y_max - 1; |
@@ -1505,7 +1500,7 @@ discard block |
||
1505 | 1500 | |
1506 | 1501 | $rhs_value = array($x_window[2], $x_window[1], $x_window[0]); |
1507 | 1502 | |
1508 | - while ( $lhs->compare($rhs) > 0 ) { |
|
1503 | + while ($lhs->compare($rhs) > 0) { |
|
1509 | 1504 | --$quotient_value[$q_index]; |
1510 | 1505 | |
1511 | 1506 | $lhs->value = array($quotient_value[$q_index]); |
@@ -1536,7 +1531,7 @@ discard block |
||
1536 | 1531 | $quotient->is_negative = $x_sign != $y_sign; |
1537 | 1532 | |
1538 | 1533 | // calculate the "common residue", if appropriate |
1539 | - if ( $x_sign ) { |
|
1534 | + if ($x_sign) { |
|
1540 | 1535 | $y->_rshift($shift); |
1541 | 1536 | $x = $y->subtract($x); |
1542 | 1537 | } |
@@ -1625,7 +1620,7 @@ discard block |
||
1625 | 1620 | return $this->_normalize($temp->modPow($e, $n)); |
1626 | 1621 | } |
1627 | 1622 | |
1628 | - if ( MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_GMP ) { |
|
1623 | + if (MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_GMP) { |
|
1629 | 1624 | $temp = new Math_BigInteger(); |
1630 | 1625 | $temp->value = gmp_powm($this->value, $e->value, $n->value); |
1631 | 1626 | |
@@ -1654,15 +1649,15 @@ discard block |
||
1654 | 1649 | ); |
1655 | 1650 | |
1656 | 1651 | $rsaOID = pack('H*', '300d06092a864886f70d0101010500'); // hex version of MA0GCSqGSIb3DQEBAQUA |
1657 | - $RSAPublicKey = chr(0) . $RSAPublicKey; |
|
1658 | - $RSAPublicKey = chr(3) . $this->_encodeASN1Length(strlen($RSAPublicKey)) . $RSAPublicKey; |
|
1652 | + $RSAPublicKey = chr(0).$RSAPublicKey; |
|
1653 | + $RSAPublicKey = chr(3).$this->_encodeASN1Length(strlen($RSAPublicKey)).$RSAPublicKey; |
|
1659 | 1654 | |
1660 | 1655 | $encapsulated = pack('Ca*a*', |
1661 | - 48, $this->_encodeASN1Length(strlen($rsaOID . $RSAPublicKey)), $rsaOID . $RSAPublicKey |
|
1656 | + 48, $this->_encodeASN1Length(strlen($rsaOID.$RSAPublicKey)), $rsaOID.$RSAPublicKey |
|
1662 | 1657 | ); |
1663 | 1658 | |
1664 | - $RSAPublicKey = "-----BEGIN PUBLIC KEY-----\r\n" . |
|
1665 | - chunk_split(base64_encode($encapsulated)) . |
|
1659 | + $RSAPublicKey = "-----BEGIN PUBLIC KEY-----\r\n". |
|
1660 | + chunk_split(base64_encode($encapsulated)). |
|
1666 | 1661 | '-----END PUBLIC KEY-----'; |
1667 | 1662 | |
1668 | 1663 | $plaintext = str_pad($this->toBytes(), strlen($n->toBytes(true)) - 1, "\0", STR_PAD_LEFT); |
@@ -1672,25 +1667,25 @@ discard block |
||
1672 | 1667 | } |
1673 | 1668 | } |
1674 | 1669 | |
1675 | - if ( MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_BCMATH ) { |
|
1670 | + if (MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_BCMATH) { |
|
1676 | 1671 | $temp = new Math_BigInteger(); |
1677 | 1672 | $temp->value = bcpowmod($this->value, $e->value, $n->value, 0); |
1678 | 1673 | |
1679 | 1674 | return $this->_normalize($temp); |
1680 | 1675 | } |
1681 | 1676 | |
1682 | - if ( empty($e->value) ) { |
|
1677 | + if (empty($e->value)) { |
|
1683 | 1678 | $temp = new Math_BigInteger(); |
1684 | 1679 | $temp->value = array(1); |
1685 | 1680 | return $this->_normalize($temp); |
1686 | 1681 | } |
1687 | 1682 | |
1688 | - if ( $e->value == array(1) ) { |
|
1683 | + if ($e->value == array(1)) { |
|
1689 | 1684 | list(, $temp) = $this->divide($n); |
1690 | 1685 | return $this->_normalize($temp); |
1691 | 1686 | } |
1692 | 1687 | |
1693 | - if ( $e->value == array(2) ) { |
|
1688 | + if ($e->value == array(2)) { |
|
1694 | 1689 | $temp = new Math_BigInteger(); |
1695 | 1690 | $temp->value = $this->_square($this->value); |
1696 | 1691 | list(, $temp) = $temp->divide($n); |
@@ -1700,17 +1695,17 @@ discard block |
||
1700 | 1695 | return $this->_normalize($this->_slidingWindow($e, $n, MATH_BIGINTEGER_BARRETT)); |
1701 | 1696 | |
1702 | 1697 | // is the modulo odd? |
1703 | - if ( $n->value[0] & 1 ) { |
|
1698 | + if ($n->value[0] & 1) { |
|
1704 | 1699 | return $this->_normalize($this->_slidingWindow($e, $n, MATH_BIGINTEGER_MONTGOMERY)); |
1705 | 1700 | } |
1706 | 1701 | // if it's not, it's even |
1707 | 1702 | |
1708 | 1703 | // find the lowest set bit (eg. the max pow of 2 that divides $n) |
1709 | 1704 | for ($i = 0; $i < count($n->value); ++$i) { |
1710 | - if ( $n->value[$i] ) { |
|
1705 | + if ($n->value[$i]) { |
|
1711 | 1706 | $temp = decbin($n->value[$i]); |
1712 | 1707 | $j = strlen($temp) - strrpos($temp, '1') - 1; |
1713 | - $j+= 26 * $i; |
|
1708 | + $j += 26 * $i; |
|
1714 | 1709 | break; |
1715 | 1710 | } |
1716 | 1711 | } |
@@ -1722,7 +1717,7 @@ discard block |
||
1722 | 1717 | $mod2->value = array(1); |
1723 | 1718 | $mod2->_lshift($j); |
1724 | 1719 | |
1725 | - $part1 = ( $mod1->value != array(1) ) ? $this->_slidingWindow($e, $mod1, MATH_BIGINTEGER_MONTGOMERY) : new Math_BigInteger(); |
|
1720 | + $part1 = ($mod1->value != array(1)) ? $this->_slidingWindow($e, $mod1, MATH_BIGINTEGER_MONTGOMERY) : new Math_BigInteger(); |
|
1726 | 1721 | $part2 = $this->_slidingWindow($e, $mod2, MATH_BIGINTEGER_POWEROF2); |
1727 | 1722 | |
1728 | 1723 | $y1 = $mod2->modInverse($mod1); |
@@ -1778,7 +1773,7 @@ discard block |
||
1778 | 1773 | $e_length = count($e_value) - 1; |
1779 | 1774 | $e_bits = decbin($e_value[$e_length]); |
1780 | 1775 | for ($i = $e_length - 1; $i >= 0; --$i) { |
1781 | - $e_bits.= str_pad(decbin($e_value[$i]), MATH_BIGINTEGER_BASE, '0', STR_PAD_LEFT); |
|
1776 | + $e_bits .= str_pad(decbin($e_value[$i]), MATH_BIGINTEGER_BASE, '0', STR_PAD_LEFT); |
|
1782 | 1777 | } |
1783 | 1778 | |
1784 | 1779 | $e_length = strlen($e_bits); |
@@ -1805,13 +1800,13 @@ discard block |
||
1805 | 1800 | $result = array(1); |
1806 | 1801 | $result = $this->_prepareReduce($result, $n_value, $mode); |
1807 | 1802 | |
1808 | - for ($i = 0; $i < $e_length; ) { |
|
1809 | - if ( !$e_bits[$i] ) { |
|
1803 | + for ($i = 0; $i < $e_length;) { |
|
1804 | + if (!$e_bits[$i]) { |
|
1810 | 1805 | $result = $this->_squareReduce($result, $n_value, $mode); |
1811 | 1806 | ++$i; |
1812 | 1807 | } else { |
1813 | 1808 | for ($j = $window_size - 1; $j > 0; --$j) { |
1814 | - if ( !empty($e_bits[$i + $j]) ) { |
|
1809 | + if (!empty($e_bits[$i + $j])) { |
|
1815 | 1810 | break; |
1816 | 1811 | } |
1817 | 1812 | } |
@@ -1822,7 +1817,7 @@ discard block |
||
1822 | 1817 | |
1823 | 1818 | $result = $this->_multiplyReduce($result, $powers[bindec(substr($e_bits, $i, $j + 1))], $n_value, $mode); |
1824 | 1819 | |
1825 | - $i+=$j + 1; |
|
1820 | + $i += $j + 1; |
|
1826 | 1821 | } |
1827 | 1822 | } |
1828 | 1823 | |
@@ -1995,7 +1990,7 @@ discard block |
||
1995 | 1990 | |
1996 | 1991 | // n = 2 * m.length |
1997 | 1992 | |
1998 | - if ( ($key = array_search($m, $cache[MATH_BIGINTEGER_VARIABLE])) === false ) { |
|
1993 | + if (($key = array_search($m, $cache[MATH_BIGINTEGER_VARIABLE])) === false) { |
|
1999 | 1994 | $key = count($cache[MATH_BIGINTEGER_VARIABLE]); |
2000 | 1995 | $cache[MATH_BIGINTEGER_VARIABLE][] = $m; |
2001 | 1996 | |
@@ -2020,7 +2015,7 @@ discard block |
||
2020 | 2015 | |
2021 | 2016 | $cutoff = $m_length + ($m_length >> 1); |
2022 | 2017 | $lsd = array_slice($n, 0, $cutoff); // m.length + (m.length >> 1) |
2023 | - $msd = array_slice($n, $cutoff); // m.length >> 1 |
|
2018 | + $msd = array_slice($n, $cutoff); // m.length >> 1 |
|
2024 | 2019 | $lsd = $this->_trim($lsd); |
2025 | 2020 | $temp = $this->_multiply($msd, false, $m1, false); |
2026 | 2021 | $n = $this->_add($lsd, false, $temp[MATH_BIGINTEGER_VALUE], false); // m.length + (m.length >> 1) + 1 |
@@ -2084,7 +2079,7 @@ discard block |
||
2084 | 2079 | return $temp->value; |
2085 | 2080 | } |
2086 | 2081 | |
2087 | - if ( ($key = array_search($n, $cache[MATH_BIGINTEGER_VARIABLE])) === false ) { |
|
2082 | + if (($key = array_search($n, $cache[MATH_BIGINTEGER_VARIABLE])) === false) { |
|
2088 | 2083 | $key = count($cache[MATH_BIGINTEGER_VARIABLE]); |
2089 | 2084 | $cache[MATH_BIGINTEGER_VARIABLE][] = $n; |
2090 | 2085 | $lhs = new Math_BigInteger(); |
@@ -2093,7 +2088,7 @@ discard block |
||
2093 | 2088 | $lhs_value[] = 1; |
2094 | 2089 | $rhs = new Math_BigInteger(); |
2095 | 2090 | $rhs->value = $n; |
2096 | - list($temp, ) = $lhs->divide($rhs); // m.length |
|
2091 | + list($temp,) = $lhs->divide($rhs); // m.length |
|
2097 | 2092 | $cache[MATH_BIGINTEGER_DATA][] = $temp->value; |
2098 | 2093 | } |
2099 | 2094 | |
@@ -2145,14 +2140,14 @@ discard block |
||
2145 | 2140 | $x_length = count($x_value); |
2146 | 2141 | $y_length = count($y_value); |
2147 | 2142 | |
2148 | - if ( !$x_length || !$y_length ) { // a 0 is being multiplied |
|
2143 | + if (!$x_length || !$y_length) { // a 0 is being multiplied |
|
2149 | 2144 | return array( |
2150 | 2145 | MATH_BIGINTEGER_VALUE => array(), |
2151 | 2146 | MATH_BIGINTEGER_SIGN => false |
2152 | 2147 | ); |
2153 | 2148 | } |
2154 | 2149 | |
2155 | - if ( $x_length < $y_length ) { |
|
2150 | + if ($x_length < $y_length) { |
|
2156 | 2151 | $temp = $x_value; |
2157 | 2152 | $x_value = $y_value; |
2158 | 2153 | $y_value = $temp; |
@@ -2226,7 +2221,7 @@ discard block |
||
2226 | 2221 | MATH_BIGINTEGER_DATA => array() |
2227 | 2222 | ); |
2228 | 2223 | |
2229 | - if ( ($key = array_search($n, $cache[MATH_BIGINTEGER_VARIABLE])) === false ) { |
|
2224 | + if (($key = array_search($n, $cache[MATH_BIGINTEGER_VARIABLE])) === false) { |
|
2230 | 2225 | $key = count($cache[MATH_BIGINTEGER_VARIABLE]); |
2231 | 2226 | $cache[MATH_BIGINTEGER_VARIABLE][] = $x; |
2232 | 2227 | $cache[MATH_BIGINTEGER_DATA][] = $this->_modInverse67108864($n); |
@@ -2277,7 +2272,7 @@ discard block |
||
2277 | 2272 | MATH_BIGINTEGER_DATA => array() |
2278 | 2273 | ); |
2279 | 2274 | |
2280 | - if ( ($key = array_search($m, $cache[MATH_BIGINTEGER_VARIABLE])) === false ) { |
|
2275 | + if (($key = array_search($m, $cache[MATH_BIGINTEGER_VARIABLE])) === false) { |
|
2281 | 2276 | $key = count($cache[MATH_BIGINTEGER_VARIABLE]); |
2282 | 2277 | $cache[MATH_BIGINTEGER_VARIABLE][] = $m; |
2283 | 2278 | $cache[MATH_BIGINTEGER_DATA][] = $this->_modInverse67108864($m); |
@@ -2355,7 +2350,7 @@ discard block |
||
2355 | 2350 | $x = -$x[0]; |
2356 | 2351 | $result = $x & 0x3; // x**-1 mod 2**2 |
2357 | 2352 | $result = ($result * (2 - $x * $result)) & 0xF; // x**-1 mod 2**4 |
2358 | - $result = ($result * (2 - ($x & 0xFF) * $result)) & 0xFF; // x**-1 mod 2**8 |
|
2353 | + $result = ($result * (2 - ($x & 0xFF) * $result)) & 0xFF; // x**-1 mod 2**8 |
|
2359 | 2354 | $result = ($result * ((2 - ($x & 0xFFFF) * $result) & 0xFFFF)) & 0xFFFF; // x**-1 mod 2**16 |
2360 | 2355 | $result = fmod($result * (2 - fmod($x * $result, MATH_BIGINTEGER_BASE_FULL)), MATH_BIGINTEGER_BASE_FULL); // x**-1 mod 2**26 |
2361 | 2356 | return $result & MATH_BIGINTEGER_MAX_DIGIT; |
@@ -2392,12 +2387,12 @@ discard block |
||
2392 | 2387 | */ |
2393 | 2388 | function modInverse($n) |
2394 | 2389 | { |
2395 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2390 | + switch (MATH_BIGINTEGER_MODE) { |
|
2396 | 2391 | case MATH_BIGINTEGER_MODE_GMP: |
2397 | 2392 | $temp = new Math_BigInteger(); |
2398 | 2393 | $temp->value = gmp_invert($this->value, $n->value); |
2399 | 2394 | |
2400 | - return ( $temp->value === false ) ? false : $this->_normalize($temp); |
|
2395 | + return ($temp->value === false) ? false : $this->_normalize($temp); |
|
2401 | 2396 | } |
2402 | 2397 | |
2403 | 2398 | static $zero, $one; |
@@ -2458,7 +2453,7 @@ discard block |
||
2458 | 2453 | */ |
2459 | 2454 | function extendedGCD($n) |
2460 | 2455 | { |
2461 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2456 | + switch (MATH_BIGINTEGER_MODE) { |
|
2462 | 2457 | case MATH_BIGINTEGER_MODE_GMP: |
2463 | 2458 | extract(gmp_gcdext($this->value, $n->value)); |
2464 | 2459 | |
@@ -2508,7 +2503,7 @@ discard block |
||
2508 | 2503 | $g = new Math_BigInteger(); |
2509 | 2504 | $g->value = array(1); |
2510 | 2505 | |
2511 | - while ( !(($x->value[0] & 1)|| ($y->value[0] & 1)) ) { |
|
2506 | + while (!(($x->value[0] & 1) || ($y->value[0] & 1))) { |
|
2512 | 2507 | $x->_rshift(1); |
2513 | 2508 | $y->_rshift(1); |
2514 | 2509 | $g->_lshift(1); |
@@ -2525,10 +2520,10 @@ discard block |
||
2525 | 2520 | $a->value = $d->value = $g->value = array(1); |
2526 | 2521 | $b->value = $c->value = array(); |
2527 | 2522 | |
2528 | - while ( !empty($u->value) ) { |
|
2529 | - while ( !($u->value[0] & 1) ) { |
|
2523 | + while (!empty($u->value)) { |
|
2524 | + while (!($u->value[0] & 1)) { |
|
2530 | 2525 | $u->_rshift(1); |
2531 | - if ( (!empty($a->value) && ($a->value[0] & 1)) || (!empty($b->value) && ($b->value[0] & 1)) ) { |
|
2526 | + if ((!empty($a->value) && ($a->value[0] & 1)) || (!empty($b->value) && ($b->value[0] & 1))) { |
|
2532 | 2527 | $a = $a->add($y); |
2533 | 2528 | $b = $b->subtract($x); |
2534 | 2529 | } |
@@ -2536,9 +2531,9 @@ discard block |
||
2536 | 2531 | $b->_rshift(1); |
2537 | 2532 | } |
2538 | 2533 | |
2539 | - while ( !($v->value[0] & 1) ) { |
|
2534 | + while (!($v->value[0] & 1)) { |
|
2540 | 2535 | $v->_rshift(1); |
2541 | - if ( (!empty($d->value) && ($d->value[0] & 1)) || (!empty($c->value) && ($c->value[0] & 1)) ) { |
|
2536 | + if ((!empty($d->value) && ($d->value[0] & 1)) || (!empty($c->value) && ($c->value[0] & 1))) { |
|
2542 | 2537 | $c = $c->add($y); |
2543 | 2538 | $d = $d->subtract($x); |
2544 | 2539 | } |
@@ -2603,7 +2598,7 @@ discard block |
||
2603 | 2598 | { |
2604 | 2599 | $temp = new Math_BigInteger(); |
2605 | 2600 | |
2606 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2601 | + switch (MATH_BIGINTEGER_MODE) { |
|
2607 | 2602 | case MATH_BIGINTEGER_MODE_GMP: |
2608 | 2603 | $temp->value = gmp_abs($this->value); |
2609 | 2604 | break; |
@@ -2637,7 +2632,7 @@ discard block |
||
2637 | 2632 | */ |
2638 | 2633 | function compare($y) |
2639 | 2634 | { |
2640 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2635 | + switch (MATH_BIGINTEGER_MODE) { |
|
2641 | 2636 | case MATH_BIGINTEGER_MODE_GMP: |
2642 | 2637 | return gmp_cmp($this->value, $y->value); |
2643 | 2638 | case MATH_BIGINTEGER_MODE_BCMATH: |
@@ -2660,14 +2655,14 @@ discard block |
||
2660 | 2655 | */ |
2661 | 2656 | function _compare($x_value, $x_negative, $y_value, $y_negative) |
2662 | 2657 | { |
2663 | - if ( $x_negative != $y_negative ) { |
|
2664 | - return ( !$x_negative && $y_negative ) ? 1 : -1; |
|
2658 | + if ($x_negative != $y_negative) { |
|
2659 | + return (!$x_negative && $y_negative) ? 1 : -1; |
|
2665 | 2660 | } |
2666 | 2661 | |
2667 | 2662 | $result = $x_negative ? -1 : 1; |
2668 | 2663 | |
2669 | - if ( count($x_value) != count($y_value) ) { |
|
2670 | - return ( count($x_value) > count($y_value) ) ? $result : -$result; |
|
2664 | + if (count($x_value) != count($y_value)) { |
|
2665 | + return (count($x_value) > count($y_value)) ? $result : -$result; |
|
2671 | 2666 | } |
2672 | 2667 | $size = max(count($x_value), count($y_value)); |
2673 | 2668 | |
@@ -2676,7 +2671,7 @@ discard block |
||
2676 | 2671 | |
2677 | 2672 | for ($i = count($x_value) - 1; $i >= 0; --$i) { |
2678 | 2673 | if ($x_value[$i] != $y_value[$i]) { |
2679 | - return ( $x_value[$i] > $y_value[$i] ) ? $result : -$result; |
|
2674 | + return ($x_value[$i] > $y_value[$i]) ? $result : -$result; |
|
2680 | 2675 | } |
2681 | 2676 | } |
2682 | 2677 | |
@@ -2695,7 +2690,7 @@ discard block |
||
2695 | 2690 | */ |
2696 | 2691 | function equals($x) |
2697 | 2692 | { |
2698 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2693 | + switch (MATH_BIGINTEGER_MODE) { |
|
2699 | 2694 | case MATH_BIGINTEGER_MODE_GMP: |
2700 | 2695 | return gmp_cmp($this->value, $x->value) == 0; |
2701 | 2696 | default: |
@@ -2715,8 +2710,8 @@ discard block |
||
2715 | 2710 | function setPrecision($bits) |
2716 | 2711 | { |
2717 | 2712 | $this->precision = $bits; |
2718 | - if ( MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_BCMATH ) { |
|
2719 | - $this->bitmask = new Math_BigInteger(chr((1 << ($bits & 0x7)) - 1) . str_repeat(chr(0xFF), $bits >> 3), 256); |
|
2713 | + if (MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_BCMATH) { |
|
2714 | + $this->bitmask = new Math_BigInteger(chr((1 << ($bits & 0x7)) - 1).str_repeat(chr(0xFF), $bits >> 3), 256); |
|
2720 | 2715 | } else { |
2721 | 2716 | $this->bitmask = new Math_BigInteger(bcpow('2', $bits, 0)); |
2722 | 2717 | } |
@@ -2735,7 +2730,7 @@ discard block |
||
2735 | 2730 | */ |
2736 | 2731 | function bitwise_and($x) |
2737 | 2732 | { |
2738 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2733 | + switch (MATH_BIGINTEGER_MODE) { |
|
2739 | 2734 | case MATH_BIGINTEGER_MODE_GMP: |
2740 | 2735 | $temp = new Math_BigInteger(); |
2741 | 2736 | $temp->value = gmp_and($this->value, $x->value); |
@@ -2760,7 +2755,7 @@ discard block |
||
2760 | 2755 | $result->value = array_slice($result->value, 0, $length); |
2761 | 2756 | |
2762 | 2757 | for ($i = 0; $i < $length; ++$i) { |
2763 | - $result->value[$i]&= $x->value[$i]; |
|
2758 | + $result->value[$i] &= $x->value[$i]; |
|
2764 | 2759 | } |
2765 | 2760 | |
2766 | 2761 | return $this->_normalize($result); |
@@ -2776,7 +2771,7 @@ discard block |
||
2776 | 2771 | */ |
2777 | 2772 | function bitwise_or($x) |
2778 | 2773 | { |
2779 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2774 | + switch (MATH_BIGINTEGER_MODE) { |
|
2780 | 2775 | case MATH_BIGINTEGER_MODE_GMP: |
2781 | 2776 | $temp = new Math_BigInteger(); |
2782 | 2777 | $temp->value = gmp_or($this->value, $x->value); |
@@ -2800,7 +2795,7 @@ discard block |
||
2800 | 2795 | $x->value = array_pad($x->value, $length, 0); |
2801 | 2796 | |
2802 | 2797 | for ($i = 0; $i < $length; ++$i) { |
2803 | - $result->value[$i]|= $x->value[$i]; |
|
2798 | + $result->value[$i] |= $x->value[$i]; |
|
2804 | 2799 | } |
2805 | 2800 | |
2806 | 2801 | return $this->_normalize($result); |
@@ -2816,7 +2811,7 @@ discard block |
||
2816 | 2811 | */ |
2817 | 2812 | function bitwise_xor($x) |
2818 | 2813 | { |
2819 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2814 | + switch (MATH_BIGINTEGER_MODE) { |
|
2820 | 2815 | case MATH_BIGINTEGER_MODE_GMP: |
2821 | 2816 | $temp = new Math_BigInteger(); |
2822 | 2817 | $temp->value = gmp_xor($this->value, $x->value); |
@@ -2840,7 +2835,7 @@ discard block |
||
2840 | 2835 | $x->value = array_pad($x->value, $length, 0); |
2841 | 2836 | |
2842 | 2837 | for ($i = 0; $i < $length; ++$i) { |
2843 | - $result->value[$i]^= $x->value[$i]; |
|
2838 | + $result->value[$i] ^= $x->value[$i]; |
|
2844 | 2839 | } |
2845 | 2840 | |
2846 | 2841 | return $this->_normalize($result); |
@@ -2874,7 +2869,7 @@ discard block |
||
2874 | 2869 | } |
2875 | 2870 | |
2876 | 2871 | // generate as many leading 1's as we need to. |
2877 | - $leading_ones = chr((1 << ($new_bits & 0x7)) - 1) . str_repeat(chr(0xFF), $new_bits >> 3); |
|
2872 | + $leading_ones = chr((1 << ($new_bits & 0x7)) - 1).str_repeat(chr(0xFF), $new_bits >> 3); |
|
2878 | 2873 | $this->_base256_lshift($leading_ones, $current_bits); |
2879 | 2874 | |
2880 | 2875 | $temp = str_pad($temp, ceil($this->bits / 8), chr(0), STR_PAD_LEFT); |
@@ -2896,7 +2891,7 @@ discard block |
||
2896 | 2891 | { |
2897 | 2892 | $temp = new Math_BigInteger(); |
2898 | 2893 | |
2899 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2894 | + switch (MATH_BIGINTEGER_MODE) { |
|
2900 | 2895 | case MATH_BIGINTEGER_MODE_GMP: |
2901 | 2896 | static $two; |
2902 | 2897 | |
@@ -2934,7 +2929,7 @@ discard block |
||
2934 | 2929 | { |
2935 | 2930 | $temp = new Math_BigInteger(); |
2936 | 2931 | |
2937 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
2932 | + switch (MATH_BIGINTEGER_MODE) { |
|
2938 | 2933 | case MATH_BIGINTEGER_MODE_GMP: |
2939 | 2934 | static $two; |
2940 | 2935 | |
@@ -2973,7 +2968,7 @@ discard block |
||
2973 | 2968 | |
2974 | 2969 | if ($this->precision > 0) { |
2975 | 2970 | $precision = $this->precision; |
2976 | - if ( MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_BCMATH ) { |
|
2971 | + if (MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_BCMATH) { |
|
2977 | 2972 | $mask = $this->bitmask->subtract(new Math_BigInteger(1)); |
2978 | 2973 | $mask = $mask->toBytes(); |
2979 | 2974 | } else { |
@@ -2983,13 +2978,13 @@ discard block |
||
2983 | 2978 | $temp = ord($bits[0]); |
2984 | 2979 | for ($i = 0; $temp >> $i; ++$i); |
2985 | 2980 | $precision = 8 * strlen($bits) - 8 + $i; |
2986 | - $mask = chr((1 << ($precision & 0x7)) - 1) . str_repeat(chr(0xFF), $precision >> 3); |
|
2981 | + $mask = chr((1 << ($precision & 0x7)) - 1).str_repeat(chr(0xFF), $precision >> 3); |
|
2987 | 2982 | } |
2988 | 2983 | |
2989 | 2984 | if ($shift < 0) { |
2990 | - $shift+= $precision; |
|
2985 | + $shift += $precision; |
|
2991 | 2986 | } |
2992 | - $shift%= $precision; |
|
2987 | + $shift %= $precision; |
|
2993 | 2988 | |
2994 | 2989 | if (!$shift) { |
2995 | 2990 | return $this->copy(); |
@@ -3068,13 +3063,13 @@ discard block |
||
3068 | 3063 | $random = ''; |
3069 | 3064 | |
3070 | 3065 | if ($size & 1) { |
3071 | - $random.= chr(mt_rand(0, 255)); |
|
3066 | + $random .= chr(mt_rand(0, 255)); |
|
3072 | 3067 | } |
3073 | 3068 | |
3074 | 3069 | $blocks = $size >> 1; |
3075 | 3070 | for ($i = 0; $i < $blocks; ++$i) { |
3076 | 3071 | // mt_rand(-2147483648, 0x7FFFFFFF) always produces -2147483648 on some systems |
3077 | - $random.= pack('n', mt_rand(0, 0xFFFF)); |
|
3072 | + $random .= pack('n', mt_rand(0, 0xFFFF)); |
|
3078 | 3073 | } |
3079 | 3074 | } |
3080 | 3075 | |
@@ -3089,14 +3084,14 @@ discard block |
||
3089 | 3084 | while (true) { |
3090 | 3085 | $msb = ord(crypt_random_string(1)); |
3091 | 3086 | if ($msb <= $cutoff) { |
3092 | - $msb%= $leading; |
|
3087 | + $msb %= $leading; |
|
3093 | 3088 | break; |
3094 | 3089 | } |
3095 | 3090 | } |
3096 | 3091 | $msb = chr($msb); |
3097 | 3092 | } |
3098 | 3093 | |
3099 | - $random = new Math_BigInteger($msb . $random, 256); |
|
3094 | + $random = new Math_BigInteger($msb.$random, 256); |
|
3100 | 3095 | |
3101 | 3096 | return $this->_normalize($random->add($min)); |
3102 | 3097 | } |
@@ -3146,7 +3141,7 @@ discard block |
||
3146 | 3141 | $x = $this->random($min, $max); |
3147 | 3142 | |
3148 | 3143 | // gmp_nextprime() requires PHP 5 >= 5.2.0 per <http://php.net/gmp-nextprime>. |
3149 | - if ( MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_GMP && function_exists('gmp_nextprime') ) { |
|
3144 | + if (MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_GMP && function_exists('gmp_nextprime')) { |
|
3150 | 3145 | $p->value = gmp_nextprime($x->value); |
3151 | 3146 | |
3152 | 3147 | if ($p->compare($max) <= 0) { |
@@ -3211,7 +3206,7 @@ discard block |
||
3211 | 3206 | */ |
3212 | 3207 | function _make_odd() |
3213 | 3208 | { |
3214 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
3209 | + switch (MATH_BIGINTEGER_MODE) { |
|
3215 | 3210 | case MATH_BIGINTEGER_MODE_GMP: |
3216 | 3211 | gmp_setbit($this->value, 0); |
3217 | 3212 | break; |
@@ -3245,23 +3240,23 @@ discard block |
||
3245 | 3240 | |
3246 | 3241 | if (!$t) { |
3247 | 3242 | // see HAC 4.49 "Note (controlling the error probability)" |
3248 | - if ($length >= 163) { $t = 2; } // floor(1300 / 8) |
|
3249 | - else if ($length >= 106) { $t = 3; } // floor( 850 / 8) |
|
3250 | - else if ($length >= 81 ) { $t = 4; } // floor( 650 / 8) |
|
3251 | - else if ($length >= 68 ) { $t = 5; } // floor( 550 / 8) |
|
3252 | - else if ($length >= 56 ) { $t = 6; } // floor( 450 / 8) |
|
3253 | - else if ($length >= 50 ) { $t = 7; } // floor( 400 / 8) |
|
3254 | - else if ($length >= 43 ) { $t = 8; } // floor( 350 / 8) |
|
3255 | - else if ($length >= 37 ) { $t = 9; } // floor( 300 / 8) |
|
3256 | - else if ($length >= 31 ) { $t = 12; } // floor( 250 / 8) |
|
3257 | - else if ($length >= 25 ) { $t = 15; } // floor( 200 / 8) |
|
3258 | - else if ($length >= 18 ) { $t = 18; } // floor( 150 / 8) |
|
3259 | - else { $t = 27; } |
|
3243 | + if ($length >= 163) { $t = 2; } // floor(1300 / 8) |
|
3244 | + else if ($length >= 106) { $t = 3; } // floor( 850 / 8) |
|
3245 | + else if ($length >= 81) { $t = 4; } // floor( 650 / 8) |
|
3246 | + else if ($length >= 68) { $t = 5; } // floor( 550 / 8) |
|
3247 | + else if ($length >= 56) { $t = 6; } // floor( 450 / 8) |
|
3248 | + else if ($length >= 50) { $t = 7; } // floor( 400 / 8) |
|
3249 | + else if ($length >= 43) { $t = 8; } // floor( 350 / 8) |
|
3250 | + else if ($length >= 37) { $t = 9; } // floor( 300 / 8) |
|
3251 | + else if ($length >= 31) { $t = 12; } // floor( 250 / 8) |
|
3252 | + else if ($length >= 25) { $t = 15; } // floor( 200 / 8) |
|
3253 | + else if ($length >= 18) { $t = 18; } // floor( 150 / 8) |
|
3254 | + else { $t = 27; } |
|
3260 | 3255 | } |
3261 | 3256 | |
3262 | 3257 | // ie. gmp_testbit($this, 0) |
3263 | 3258 | // ie. isEven() or !isOdd() |
3264 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
3259 | + switch (MATH_BIGINTEGER_MODE) { |
|
3265 | 3260 | case MATH_BIGINTEGER_MODE_GMP: |
3266 | 3261 | return gmp_prob_prime($this->value, $t) != 0; |
3267 | 3262 | case MATH_BIGINTEGER_MODE_BCMATH: |
@@ -3285,20 +3280,20 @@ discard block |
||
3285 | 3280 | |
3286 | 3281 | if (!isset($primes)) { |
3287 | 3282 | $primes = array( |
3288 | - 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, |
|
3289 | - 61, 67, 71, 73, 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137, |
|
3290 | - 139, 149, 151, 157, 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227, |
|
3291 | - 229, 233, 239, 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313, |
|
3292 | - 317, 331, 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419, |
|
3293 | - 421, 431, 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509, |
|
3294 | - 521, 523, 541, 547, 557, 563, 569, 571, 577, 587, 593, 599, 601, 607, 613, 617, |
|
3295 | - 619, 631, 641, 643, 647, 653, 659, 661, 673, 677, 683, 691, 701, 709, 719, 727, |
|
3296 | - 733, 739, 743, 751, 757, 761, 769, 773, 787, 797, 809, 811, 821, 823, 827, 829, |
|
3297 | - 839, 853, 857, 859, 863, 877, 881, 883, 887, 907, 911, 919, 929, 937, 941, 947, |
|
3298 | - 953, 967, 971, 977, 983, 991, 997 |
|
3283 | + 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, |
|
3284 | + 61, 67, 71, 73, 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137, |
|
3285 | + 139, 149, 151, 157, 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227, |
|
3286 | + 229, 233, 239, 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313, |
|
3287 | + 317, 331, 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419, |
|
3288 | + 421, 431, 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509, |
|
3289 | + 521, 523, 541, 547, 557, 563, 569, 571, 577, 587, 593, 599, 601, 607, 613, 617, |
|
3290 | + 619, 631, 641, 643, 647, 653, 659, 661, 673, 677, 683, 691, 701, 709, 719, 727, |
|
3291 | + 733, 739, 743, 751, 757, 761, 769, 773, 787, 797, 809, 811, 821, 823, 827, 829, |
|
3292 | + 839, 853, 857, 859, 863, 877, 881, 883, 887, 907, 911, 919, 929, 937, 941, 947, |
|
3293 | + 953, 967, 971, 977, 983, 991, 997 |
|
3299 | 3294 | ); |
3300 | 3295 | |
3301 | - if ( MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_INTERNAL ) { |
|
3296 | + if (MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_INTERNAL) { |
|
3302 | 3297 | for ($i = 0; $i < count($primes); ++$i) { |
3303 | 3298 | $primes[$i] = new Math_BigInteger($primes[$i]); |
3304 | 3299 | } |
@@ -3314,7 +3309,7 @@ discard block |
||
3314 | 3309 | } |
3315 | 3310 | |
3316 | 3311 | // see HAC 4.4.1 "Random search for probable primes" |
3317 | - if ( MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_INTERNAL ) { |
|
3312 | + if (MATH_BIGINTEGER_MODE != MATH_BIGINTEGER_MODE_INTERNAL) { |
|
3318 | 3313 | foreach ($primes as $prime) { |
3319 | 3314 | list(, $r) = $this->divide($prime); |
3320 | 3315 | if ($r->equals($zero)) { |
@@ -3338,7 +3333,7 @@ discard block |
||
3338 | 3333 | $r = $n_1->copy(); |
3339 | 3334 | $r_value = $r->value; |
3340 | 3335 | // ie. $s = gmp_scan1($n, 0) and $r = gmp_div_q($n, gmp_pow(gmp_init('2'), $s)); |
3341 | - if ( MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_BCMATH ) { |
|
3336 | + if (MATH_BIGINTEGER_MODE == MATH_BIGINTEGER_MODE_BCMATH) { |
|
3342 | 3337 | $s = 0; |
3343 | 3338 | // if $n was 1, $r would be 0 and this would be an infinite loop, hence our $this->equals($one) check earlier |
3344 | 3339 | while ($r->value[strlen($r->value) - 1] % 2 == 0) { |
@@ -3387,7 +3382,7 @@ discard block |
||
3387 | 3382 | */ |
3388 | 3383 | function _lshift($shift) |
3389 | 3384 | { |
3390 | - if ( $shift == 0 ) { |
|
3385 | + if ($shift == 0) { |
|
3391 | 3386 | return; |
3392 | 3387 | } |
3393 | 3388 | |
@@ -3403,7 +3398,7 @@ discard block |
||
3403 | 3398 | $this->value[$i] = (int) ($temp - $carry * MATH_BIGINTEGER_BASE_FULL); |
3404 | 3399 | } |
3405 | 3400 | |
3406 | - if ( $carry ) { |
|
3401 | + if ($carry) { |
|
3407 | 3402 | $this->value[] = $carry; |
3408 | 3403 | } |
3409 | 3404 | |
@@ -3431,7 +3426,7 @@ discard block |
||
3431 | 3426 | $carry_shift = MATH_BIGINTEGER_BASE - $shift; |
3432 | 3427 | $carry_mask = (1 << $shift) - 1; |
3433 | 3428 | |
3434 | - if ( $num_digits ) { |
|
3429 | + if ($num_digits) { |
|
3435 | 3430 | $this->value = array_slice($this->value, $num_digits); |
3436 | 3431 | } |
3437 | 3432 | |
@@ -3461,7 +3456,7 @@ discard block |
||
3461 | 3456 | $result->precision = $this->precision; |
3462 | 3457 | $result->bitmask = $this->bitmask; |
3463 | 3458 | |
3464 | - switch ( MATH_BIGINTEGER_MODE ) { |
|
3459 | + switch (MATH_BIGINTEGER_MODE) { |
|
3465 | 3460 | case MATH_BIGINTEGER_MODE_GMP: |
3466 | 3461 | if (!empty($result->bitmask->value)) { |
3467 | 3462 | $result->value = gmp_and($result->value, $result->bitmask->value); |
@@ -3478,7 +3473,7 @@ discard block |
||
3478 | 3473 | |
3479 | 3474 | $value = &$result->value; |
3480 | 3475 | |
3481 | - if ( !count($value) ) { |
|
3476 | + if (!count($value)) { |
|
3482 | 3477 | return $result; |
3483 | 3478 | } |
3484 | 3479 | |
@@ -3508,7 +3503,7 @@ discard block |
||
3508 | 3503 | function _trim($value) |
3509 | 3504 | { |
3510 | 3505 | for ($i = count($value) - 1; $i >= 0; --$i) { |
3511 | - if ( $value[$i] ) { |
|
3506 | + if ($value[$i]) { |
|
3512 | 3507 | break; |
3513 | 3508 | } |
3514 | 3509 | unset($value[$i]); |
@@ -3556,7 +3551,7 @@ discard block |
||
3556 | 3551 | $carry = $temp >> 8; |
3557 | 3552 | } |
3558 | 3553 | $carry = ($carry != 0) ? chr($carry) : ''; |
3559 | - $x = $carry . $x . str_repeat(chr(0), $num_bytes); |
|
3554 | + $x = $carry.$x.str_repeat(chr(0), $num_bytes); |
|
3560 | 3555 | } |
3561 | 3556 | |
3562 | 3557 | /** |
@@ -3595,7 +3590,7 @@ discard block |
||
3595 | 3590 | } |
3596 | 3591 | $x = ltrim($x, chr(0)); |
3597 | 3592 | |
3598 | - $remainder = chr($carry >> $carry_shift) . $remainder; |
|
3593 | + $remainder = chr($carry >> $carry_shift).$remainder; |
|
3599 | 3594 | |
3600 | 3595 | return ltrim($remainder, chr(0)); |
3601 | 3596 | } |
@@ -74,9 +74,9 @@ discard block |
||
74 | 74 | * @access private |
75 | 75 | */ |
76 | 76 | define('NET_SSH2_MASK_CONSTRUCTOR', 0x00000001); |
77 | -define('NET_SSH2_MASK_LOGIN_REQ', 0x00000002); |
|
78 | -define('NET_SSH2_MASK_LOGIN', 0x00000004); |
|
79 | -define('NET_SSH2_MASK_SHELL', 0x00000008); |
|
77 | +define('NET_SSH2_MASK_LOGIN_REQ', 0x00000002); |
|
78 | +define('NET_SSH2_MASK_LOGIN', 0x00000004); |
|
79 | +define('NET_SSH2_MASK_SHELL', 0x00000008); |
|
80 | 80 | /**#@-*/ |
81 | 81 | |
82 | 82 | /**#@+ |
@@ -96,7 +96,7 @@ discard block |
||
96 | 96 | * @access private |
97 | 97 | */ |
98 | 98 | define('NET_SSH2_CHANNEL_EXEC', 0); // PuTTy uses 0x100 |
99 | -define('NET_SSH2_CHANNEL_SHELL',1); |
|
99 | +define('NET_SSH2_CHANNEL_SHELL', 1); |
|
100 | 100 | /**#@-*/ |
101 | 101 | |
102 | 102 | /**#@+ |
@@ -106,7 +106,7 @@ discard block |
||
106 | 106 | /** |
107 | 107 | * Returns the message numbers |
108 | 108 | */ |
109 | -define('NET_SSH2_LOG_SIMPLE', 1); |
|
109 | +define('NET_SSH2_LOG_SIMPLE', 1); |
|
110 | 110 | /** |
111 | 111 | * Returns the message content |
112 | 112 | */ |
@@ -128,7 +128,7 @@ discard block |
||
128 | 128 | /** |
129 | 129 | * Returns when a string matching $expect exactly is found |
130 | 130 | */ |
131 | -define('NET_SSH2_READ_SIMPLE', 1); |
|
131 | +define('NET_SSH2_READ_SIMPLE', 1); |
|
132 | 132 | /** |
133 | 133 | * Returns when a string matching the regular expression $expect is found |
134 | 134 | */ |
@@ -833,7 +833,7 @@ discard block |
||
833 | 833 | } |
834 | 834 | $elapsed = strtok(microtime(), ' ') + strtok('') - $start; |
835 | 835 | |
836 | - $timeout-= $elapsed; |
|
836 | + $timeout -= $elapsed; |
|
837 | 837 | |
838 | 838 | if ($timeout <= 0) { |
839 | 839 | user_error(rtrim("Cannot connect to $host. Timeout error")); |
@@ -864,10 +864,10 @@ discard block |
||
864 | 864 | $extra = ''; |
865 | 865 | while (!feof($this->fsock) && !preg_match('#^SSH-(\d\.\d+)#', $temp, $matches)) { |
866 | 866 | if (substr($temp, -2) == "\r\n") { |
867 | - $extra.= $temp; |
|
867 | + $extra .= $temp; |
|
868 | 868 | $temp = ''; |
869 | 869 | } |
870 | - $temp.= fgets($this->fsock, 255); |
|
870 | + $temp .= fgets($this->fsock, 255); |
|
871 | 871 | } |
872 | 872 | |
873 | 873 | if (feof($this->fsock)) { |
@@ -886,12 +886,12 @@ discard block |
||
886 | 886 | } |
887 | 887 | |
888 | 888 | if (!empty($ext)) { |
889 | - $this->identifier.= ' (' . implode(', ', $ext) . ')'; |
|
889 | + $this->identifier .= ' ('.implode(', ', $ext).')'; |
|
890 | 890 | } |
891 | 891 | |
892 | 892 | if (defined('NET_SSH2_LOGGING')) { |
893 | - $this->_append_log('<-', $extra . $temp); |
|
894 | - $this->_append_log('->', $this->identifier . "\r\n"); |
|
893 | + $this->_append_log('<-', $extra.$temp); |
|
894 | + $this->_append_log('->', $this->identifier."\r\n"); |
|
895 | 895 | } |
896 | 896 | |
897 | 897 | $this->server_identifier = trim($temp, "\r\n"); |
@@ -904,7 +904,7 @@ discard block |
||
904 | 904 | return; |
905 | 905 | } |
906 | 906 | |
907 | - fputs($this->fsock, $this->identifier . "\r\n"); |
|
907 | + fputs($this->fsock, $this->identifier."\r\n"); |
|
908 | 908 | |
909 | 909 | $response = $this->_get_binary_packet(); |
910 | 910 | if ($response === false) { |
@@ -947,41 +947,41 @@ discard block |
||
947 | 947 | 'arcfour256', |
948 | 948 | 'arcfour128', |
949 | 949 | |
950 | - 'arcfour', // OPTIONAL the ARCFOUR stream cipher with a 128-bit key |
|
950 | + 'arcfour', // OPTIONAL the ARCFOUR stream cipher with a 128-bit key |
|
951 | 951 | |
952 | 952 | // CTR modes from <http://tools.ietf.org/html/rfc4344#section-4>: |
953 | - 'aes128-ctr', // RECOMMENDED AES (Rijndael) in SDCTR mode, with 128-bit key |
|
954 | - 'aes192-ctr', // RECOMMENDED AES with 192-bit key |
|
955 | - 'aes256-ctr', // RECOMMENDED AES with 256-bit key |
|
953 | + 'aes128-ctr', // RECOMMENDED AES (Rijndael) in SDCTR mode, with 128-bit key |
|
954 | + 'aes192-ctr', // RECOMMENDED AES with 192-bit key |
|
955 | + 'aes256-ctr', // RECOMMENDED AES with 256-bit key |
|
956 | 956 | |
957 | - 'blowfish-ctr', // OPTIONAL Blowfish in SDCTR mode |
|
957 | + 'blowfish-ctr', // OPTIONAL Blowfish in SDCTR mode |
|
958 | 958 | |
959 | 959 | 'twofish128-ctr', // OPTIONAL Twofish in SDCTR mode, with 128-bit key |
960 | 960 | 'twofish192-ctr', // OPTIONAL Twofish with 192-bit key |
961 | 961 | 'twofish256-ctr', // OPTIONAL Twofish with 256-bit key |
962 | 962 | |
963 | - 'aes128-cbc', // RECOMMENDED AES with a 128-bit key |
|
964 | - 'aes192-cbc', // OPTIONAL AES with a 192-bit key |
|
965 | - 'aes256-cbc', // OPTIONAL AES in CBC mode, with a 256-bit key |
|
963 | + 'aes128-cbc', // RECOMMENDED AES with a 128-bit key |
|
964 | + 'aes192-cbc', // OPTIONAL AES with a 192-bit key |
|
965 | + 'aes256-cbc', // OPTIONAL AES in CBC mode, with a 256-bit key |
|
966 | 966 | |
967 | - 'blowfish-cbc', // OPTIONAL Blowfish in CBC mode |
|
967 | + 'blowfish-cbc', // OPTIONAL Blowfish in CBC mode |
|
968 | 968 | |
969 | 969 | 'twofish128-cbc', // OPTIONAL Twofish with a 128-bit key |
970 | 970 | 'twofish192-cbc', // OPTIONAL Twofish with a 192-bit key |
971 | 971 | 'twofish256-cbc', |
972 | - 'twofish-cbc', // OPTIONAL alias for "twofish256-cbc" |
|
972 | + 'twofish-cbc', // OPTIONAL alias for "twofish256-cbc" |
|
973 | 973 | // (this is being retained for historical reasons) |
974 | - '3des-ctr', // RECOMMENDED Three-key 3DES in SDCTR mode |
|
974 | + '3des-ctr', // RECOMMENDED Three-key 3DES in SDCTR mode |
|
975 | 975 | |
976 | - '3des-cbc', // REQUIRED three-key 3DES in CBC mode |
|
976 | + '3des-cbc', // REQUIRED three-key 3DES in CBC mode |
|
977 | 977 | 'none' // OPTIONAL no encryption; NOT RECOMMENDED |
978 | 978 | ); |
979 | 979 | |
980 | 980 | static $mac_algorithms = array( |
981 | 981 | 'hmac-sha1-96', // RECOMMENDED first 96 bits of HMAC-SHA1 (digest length = 12, key length = 20) |
982 | - 'hmac-sha1', // REQUIRED HMAC-SHA1 (digest length = key length = 20) |
|
983 | - 'hmac-md5-96', // OPTIONAL first 96 bits of HMAC-MD5 (digest length = 12, key length = 16) |
|
984 | - 'hmac-md5', // OPTIONAL HMAC-MD5 (digest length = key length = 16) |
|
982 | + 'hmac-sha1', // REQUIRED HMAC-SHA1 (digest length = key length = 20) |
|
983 | + 'hmac-md5-96', // OPTIONAL first 96 bits of HMAC-MD5 (digest length = 12, key length = 16) |
|
984 | + 'hmac-md5', // OPTIONAL HMAC-MD5 (digest length = key length = 16) |
|
985 | 985 | 'none' // OPTIONAL no MAC; NOT RECOMMENDED |
986 | 986 | ); |
987 | 987 | |
@@ -1170,20 +1170,20 @@ discard block |
||
1170 | 1170 | // see http://tools.ietf.org/html/rfc2409#section-6.2 and |
1171 | 1171 | // http://tools.ietf.org/html/rfc2412, appendex E |
1172 | 1172 | case 'diffie-hellman-group1-sha1': |
1173 | - $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' . |
|
1174 | - '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' . |
|
1175 | - '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' . |
|
1173 | + $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74'. |
|
1174 | + '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437'. |
|
1175 | + '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED'. |
|
1176 | 1176 | 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF'; |
1177 | 1177 | break; |
1178 | 1178 | // see http://tools.ietf.org/html/rfc3526#section-3 |
1179 | 1179 | case 'diffie-hellman-group14-sha1': |
1180 | - $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' . |
|
1181 | - '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' . |
|
1182 | - '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' . |
|
1183 | - 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05' . |
|
1184 | - '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB' . |
|
1185 | - '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' . |
|
1186 | - 'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718' . |
|
1180 | + $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74'. |
|
1181 | + '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437'. |
|
1182 | + '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED'. |
|
1183 | + 'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05'. |
|
1184 | + '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB'. |
|
1185 | + '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B'. |
|
1186 | + 'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718'. |
|
1187 | 1187 | '3995497CEA956AE515D2261898FA051015728E5A8AACAA68FFFFFFFFFFFFFFFF'; |
1188 | 1188 | break; |
1189 | 1189 | } |
@@ -1454,15 +1454,15 @@ discard block |
||
1454 | 1454 | $this->encrypt->enableContinuousBuffer(); |
1455 | 1455 | $this->encrypt->disablePadding(); |
1456 | 1456 | |
1457 | - $iv = $kexHash->hash($keyBytes . $this->exchange_hash . 'A' . $this->session_id); |
|
1457 | + $iv = $kexHash->hash($keyBytes.$this->exchange_hash.'A'.$this->session_id); |
|
1458 | 1458 | while ($this->encrypt_block_size > strlen($iv)) { |
1459 | - $iv.= $kexHash->hash($keyBytes . $this->exchange_hash . $iv); |
|
1459 | + $iv .= $kexHash->hash($keyBytes.$this->exchange_hash.$iv); |
|
1460 | 1460 | } |
1461 | 1461 | $this->encrypt->setIV(substr($iv, 0, $this->encrypt_block_size)); |
1462 | 1462 | |
1463 | - $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'C' . $this->session_id); |
|
1463 | + $key = $kexHash->hash($keyBytes.$this->exchange_hash.'C'.$this->session_id); |
|
1464 | 1464 | while ($encryptKeyLength > strlen($key)) { |
1465 | - $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key); |
|
1465 | + $key .= $kexHash->hash($keyBytes.$this->exchange_hash.$key); |
|
1466 | 1466 | } |
1467 | 1467 | $this->encrypt->setKey(substr($key, 0, $encryptKeyLength)); |
1468 | 1468 | } |
@@ -1471,15 +1471,15 @@ discard block |
||
1471 | 1471 | $this->decrypt->enableContinuousBuffer(); |
1472 | 1472 | $this->decrypt->disablePadding(); |
1473 | 1473 | |
1474 | - $iv = $kexHash->hash($keyBytes . $this->exchange_hash . 'B' . $this->session_id); |
|
1474 | + $iv = $kexHash->hash($keyBytes.$this->exchange_hash.'B'.$this->session_id); |
|
1475 | 1475 | while ($this->decrypt_block_size > strlen($iv)) { |
1476 | - $iv.= $kexHash->hash($keyBytes . $this->exchange_hash . $iv); |
|
1476 | + $iv .= $kexHash->hash($keyBytes.$this->exchange_hash.$iv); |
|
1477 | 1477 | } |
1478 | 1478 | $this->decrypt->setIV(substr($iv, 0, $this->decrypt_block_size)); |
1479 | 1479 | |
1480 | - $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'D' . $this->session_id); |
|
1480 | + $key = $kexHash->hash($keyBytes.$this->exchange_hash.'D'.$this->session_id); |
|
1481 | 1481 | while ($decryptKeyLength > strlen($key)) { |
1482 | - $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key); |
|
1482 | + $key .= $kexHash->hash($keyBytes.$this->exchange_hash.$key); |
|
1483 | 1483 | } |
1484 | 1484 | $this->decrypt->setKey(substr($key, 0, $decryptKeyLength)); |
1485 | 1485 | } |
@@ -1553,15 +1553,15 @@ discard block |
||
1553 | 1553 | $this->hmac_size = 12; |
1554 | 1554 | } |
1555 | 1555 | |
1556 | - $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'E' . $this->session_id); |
|
1556 | + $key = $kexHash->hash($keyBytes.$this->exchange_hash.'E'.$this->session_id); |
|
1557 | 1557 | while ($createKeyLength > strlen($key)) { |
1558 | - $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key); |
|
1558 | + $key .= $kexHash->hash($keyBytes.$this->exchange_hash.$key); |
|
1559 | 1559 | } |
1560 | 1560 | $this->hmac_create->setKey(substr($key, 0, $createKeyLength)); |
1561 | 1561 | |
1562 | - $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'F' . $this->session_id); |
|
1562 | + $key = $kexHash->hash($keyBytes.$this->exchange_hash.'F'.$this->session_id); |
|
1563 | 1563 | while ($checkKeyLength > strlen($key)) { |
1564 | - $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key); |
|
1564 | + $key .= $kexHash->hash($keyBytes.$this->exchange_hash.$key); |
|
1565 | 1565 | } |
1566 | 1566 | $this->hmac_check->setKey(substr($key, 0, $checkKeyLength)); |
1567 | 1567 | |
@@ -1726,7 +1726,7 @@ discard block |
||
1726 | 1726 | $this->message_number_log[count($this->message_number_log) - 1] = 'NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ'; |
1727 | 1727 | } |
1728 | 1728 | extract(unpack('Nlength', $this->_string_shift($response, 4))); |
1729 | - $this->errors[] = 'SSH_MSG_USERAUTH_PASSWD_CHANGEREQ: ' . utf8_decode($this->_string_shift($response, $length)); |
|
1729 | + $this->errors[] = 'SSH_MSG_USERAUTH_PASSWD_CHANGEREQ: '.utf8_decode($this->_string_shift($response, $length)); |
|
1730 | 1730 | return $this->_disconnect(NET_SSH2_DISCONNECT_AUTH_CANCELLED_BY_USER); |
1731 | 1731 | case NET_SSH2_MSG_USERAUTH_FAILURE: |
1732 | 1732 | // can we use keyboard-interactive authentication? if not then either the login is bad or the server employees |
@@ -1858,8 +1858,8 @@ discard block |
||
1858 | 1858 | // see http://tools.ietf.org/html/rfc4256#section-3.4 |
1859 | 1859 | $packet = $logged = pack('CN', NET_SSH2_MSG_USERAUTH_INFO_RESPONSE, count($responses)); |
1860 | 1860 | for ($i = 0; $i < count($responses); $i++) { |
1861 | - $packet.= pack('Na*', strlen($responses[$i]), $responses[$i]); |
|
1862 | - $logged.= pack('Na*', strlen('dummy-answer'), 'dummy-answer'); |
|
1861 | + $packet .= pack('Na*', strlen($responses[$i]), $responses[$i]); |
|
1862 | + $logged .= pack('Na*', strlen('dummy-answer'), 'dummy-answer'); |
|
1863 | 1863 | } |
1864 | 1864 | |
1865 | 1865 | if (!$this->_send_binary_packet($packet)) { |
@@ -1924,7 +1924,7 @@ discard block |
||
1924 | 1924 | ); |
1925 | 1925 | $part2 = pack('Na*Na*', strlen('ssh-rsa'), 'ssh-rsa', strlen($publickey), $publickey); |
1926 | 1926 | |
1927 | - $packet = $part1 . chr(0) . $part2; |
|
1927 | + $packet = $part1.chr(0).$part2; |
|
1928 | 1928 | if (!$this->_send_binary_packet($packet)) { |
1929 | 1929 | return false; |
1930 | 1930 | } |
@@ -1940,7 +1940,7 @@ discard block |
||
1940 | 1940 | switch ($type) { |
1941 | 1941 | case NET_SSH2_MSG_USERAUTH_FAILURE: |
1942 | 1942 | extract(unpack('Nlength', $this->_string_shift($response, 4))); |
1943 | - $this->errors[] = 'SSH_MSG_USERAUTH_FAILURE: ' . $this->_string_shift($response, $length); |
|
1943 | + $this->errors[] = 'SSH_MSG_USERAUTH_FAILURE: '.$this->_string_shift($response, $length); |
|
1944 | 1944 | return false; |
1945 | 1945 | case NET_SSH2_MSG_USERAUTH_PK_OK: |
1946 | 1946 | // we'll just take it on faith that the public key blob and the public key algorithm name are as |
@@ -1954,11 +1954,11 @@ discard block |
||
1954 | 1954 | } |
1955 | 1955 | } |
1956 | 1956 | |
1957 | - $packet = $part1 . chr(1) . $part2; |
|
1957 | + $packet = $part1.chr(1).$part2; |
|
1958 | 1958 | $privatekey->setSignatureMode(CRYPT_RSA_SIGNATURE_PKCS1); |
1959 | 1959 | $signature = $privatekey->sign(pack('Na*a*', strlen($this->session_id), $this->session_id, $packet)); |
1960 | 1960 | $signature = pack('Na*Na*', strlen('ssh-rsa'), 'ssh-rsa', strlen($signature), $signature); |
1961 | - $packet.= pack('Na*', strlen($signature), $signature); |
|
1961 | + $packet .= pack('Na*', strlen($signature), $signature); |
|
1962 | 1962 | |
1963 | 1963 | if (!$this->_send_binary_packet($packet)) { |
1964 | 1964 | return false; |
@@ -2120,7 +2120,7 @@ discard block |
||
2120 | 2120 | if (is_callable($callback)) { |
2121 | 2121 | $callback($temp); |
2122 | 2122 | } else { |
2123 | - $output.= $temp; |
|
2123 | + $output .= $temp; |
|
2124 | 2124 | } |
2125 | 2125 | } |
2126 | 2126 | } |
@@ -2248,7 +2248,7 @@ discard block |
||
2248 | 2248 | return $response ? $this->_string_shift($this->interactiveBuffer, strlen($this->interactiveBuffer)) : false; |
2249 | 2249 | } |
2250 | 2250 | |
2251 | - $this->interactiveBuffer.= $response; |
|
2251 | + $this->interactiveBuffer .= $response; |
|
2252 | 2252 | } |
2253 | 2253 | } |
2254 | 2254 | |
@@ -2384,12 +2384,12 @@ discard block |
||
2384 | 2384 | $buffer = ''; |
2385 | 2385 | while ($remaining_length > 0) { |
2386 | 2386 | $temp = fread($this->fsock, $remaining_length); |
2387 | - $buffer.= $temp; |
|
2388 | - $remaining_length-= strlen($temp); |
|
2387 | + $buffer .= $temp; |
|
2388 | + $remaining_length -= strlen($temp); |
|
2389 | 2389 | } |
2390 | 2390 | $stop = strtok(microtime(), ' ') + strtok(''); |
2391 | 2391 | if (strlen($buffer)) { |
2392 | - $raw.= $this->decrypt !== false ? $this->decrypt->decrypt($buffer) : $buffer; |
|
2392 | + $raw .= $this->decrypt !== false ? $this->decrypt->decrypt($buffer) : $buffer; |
|
2393 | 2393 | } |
2394 | 2394 | |
2395 | 2395 | $payload = $this->_string_shift($raw, $packet_length - $padding_length - 1); |
@@ -2397,7 +2397,7 @@ discard block |
||
2397 | 2397 | |
2398 | 2398 | if ($this->hmac_check !== false) { |
2399 | 2399 | $hmac = fread($this->fsock, $this->hmac_size); |
2400 | - if ($hmac != $this->hmac_check->hash(pack('NNCa*', $this->get_seq_no, $packet_length, $padding_length, $payload . $padding))) { |
|
2400 | + if ($hmac != $this->hmac_check->hash(pack('NNCa*', $this->get_seq_no, $packet_length, $padding_length, $payload.$padding))) { |
|
2401 | 2401 | user_error('Invalid HMAC'); |
2402 | 2402 | return false; |
2403 | 2403 | } |
@@ -2411,9 +2411,9 @@ discard block |
||
2411 | 2411 | |
2412 | 2412 | if (defined('NET_SSH2_LOGGING')) { |
2413 | 2413 | $current = strtok(microtime(), ' ') + strtok(''); |
2414 | - $message_number = isset($this->message_numbers[ord($payload[0])]) ? $this->message_numbers[ord($payload[0])] : 'UNKNOWN (' . ord($payload[0]) . ')'; |
|
2415 | - $message_number = '<- ' . $message_number . |
|
2416 | - ' (since last: ' . round($current - $this->last_packet, 4) . ', network: ' . round($stop - $start, 4) . 's)'; |
|
2414 | + $message_number = isset($this->message_numbers[ord($payload[0])]) ? $this->message_numbers[ord($payload[0])] : 'UNKNOWN ('.ord($payload[0]).')'; |
|
2415 | + $message_number = '<- '.$message_number. |
|
2416 | + ' (since last: '.round($current - $this->last_packet, 4).', network: '.round($stop - $start, 4).'s)'; |
|
2417 | 2417 | $this->_append_log($message_number, $payload); |
2418 | 2418 | $this->last_packet = $current; |
2419 | 2419 | } |
@@ -2436,7 +2436,7 @@ discard block |
||
2436 | 2436 | case NET_SSH2_MSG_DISCONNECT: |
2437 | 2437 | $this->_string_shift($payload, 1); |
2438 | 2438 | extract(unpack('Nreason_code/Nlength', $this->_string_shift($payload, 8))); |
2439 | - $this->errors[] = 'SSH_MSG_DISCONNECT: ' . $this->disconnect_reasons[$reason_code] . "\r\n" . utf8_decode($this->_string_shift($payload, $length)); |
|
2439 | + $this->errors[] = 'SSH_MSG_DISCONNECT: '.$this->disconnect_reasons[$reason_code]."\r\n".utf8_decode($this->_string_shift($payload, $length)); |
|
2440 | 2440 | $this->bitmask = 0; |
2441 | 2441 | return false; |
2442 | 2442 | case NET_SSH2_MSG_IGNORE: |
@@ -2445,7 +2445,7 @@ discard block |
||
2445 | 2445 | case NET_SSH2_MSG_DEBUG: |
2446 | 2446 | $this->_string_shift($payload, 2); |
2447 | 2447 | extract(unpack('Nlength', $this->_string_shift($payload, 4))); |
2448 | - $this->errors[] = 'SSH_MSG_DEBUG: ' . utf8_decode($this->_string_shift($payload, $length)); |
|
2448 | + $this->errors[] = 'SSH_MSG_DEBUG: '.utf8_decode($this->_string_shift($payload, $length)); |
|
2449 | 2449 | $payload = $this->_get_binary_packet(); |
2450 | 2450 | break; |
2451 | 2451 | case NET_SSH2_MSG_UNIMPLEMENTED: |
@@ -2474,7 +2474,7 @@ discard block |
||
2474 | 2474 | case NET_SSH2_MSG_GLOBAL_REQUEST: // see http://tools.ietf.org/html/rfc4254#section-4 |
2475 | 2475 | $this->_string_shift($payload, 1); |
2476 | 2476 | extract(unpack('Nlength', $this->_string_shift($payload))); |
2477 | - $this->errors[] = 'SSH_MSG_GLOBAL_REQUEST: ' . utf8_decode($this->_string_shift($payload, $length)); |
|
2477 | + $this->errors[] = 'SSH_MSG_GLOBAL_REQUEST: '.utf8_decode($this->_string_shift($payload, $length)); |
|
2478 | 2478 | |
2479 | 2479 | if (!$this->_send_binary_packet(pack('C', NET_SSH2_MSG_REQUEST_FAILURE))) { |
2480 | 2480 | return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION); |
@@ -2485,7 +2485,7 @@ discard block |
||
2485 | 2485 | case NET_SSH2_MSG_CHANNEL_OPEN: // see http://tools.ietf.org/html/rfc4254#section-5.1 |
2486 | 2486 | $this->_string_shift($payload, 1); |
2487 | 2487 | extract(unpack('N', $this->_string_shift($payload, 4))); |
2488 | - $this->errors[] = 'SSH_MSG_CHANNEL_OPEN: ' . utf8_decode($this->_string_shift($payload, $length)); |
|
2488 | + $this->errors[] = 'SSH_MSG_CHANNEL_OPEN: '.utf8_decode($this->_string_shift($payload, $length)); |
|
2489 | 2489 | |
2490 | 2490 | $this->_string_shift($payload, 4); // skip over client channel |
2491 | 2491 | extract(unpack('Nserver_channel', $this->_string_shift($payload, 4))); |
@@ -2585,7 +2585,7 @@ discard block |
||
2585 | 2585 | return true; |
2586 | 2586 | } |
2587 | 2587 | $elapsed = strtok(microtime(), ' ') + strtok('') - $start; |
2588 | - $this->curTimeout-= $elapsed; |
|
2588 | + $this->curTimeout -= $elapsed; |
|
2589 | 2589 | } |
2590 | 2590 | |
2591 | 2591 | $response = $this->_get_binary_packet(); |
@@ -2598,13 +2598,13 @@ discard block |
||
2598 | 2598 | } |
2599 | 2599 | |
2600 | 2600 | // resize the window, if appropriate |
2601 | - $this->window_size_server_to_client[$client_channel]-= strlen($response); |
|
2601 | + $this->window_size_server_to_client[$client_channel] -= strlen($response); |
|
2602 | 2602 | if ($this->window_size_server_to_client[$client_channel] < 0) { |
2603 | 2603 | $packet = pack('CNN', NET_SSH2_MSG_CHANNEL_WINDOW_ADJUST, $this->server_channels[$client_channel], $this->window_size); |
2604 | 2604 | if (!$this->_send_binary_packet($packet)) { |
2605 | 2605 | return false; |
2606 | 2606 | } |
2607 | - $this->window_size_server_to_client[$client_channel]+= $this->window_size; |
|
2607 | + $this->window_size_server_to_client[$client_channel] += $this->window_size; |
|
2608 | 2608 | } |
2609 | 2609 | |
2610 | 2610 | extract(unpack('Ctype/Nchannel', $this->_string_shift($response, 5))); |
@@ -2688,11 +2688,11 @@ discard block |
||
2688 | 2688 | case 'exit-signal': |
2689 | 2689 | $this->_string_shift($response, 1); |
2690 | 2690 | extract(unpack('Nlength', $this->_string_shift($response, 4))); |
2691 | - $this->errors[] = 'SSH_MSG_CHANNEL_REQUEST (exit-signal): ' . $this->_string_shift($response, $length); |
|
2691 | + $this->errors[] = 'SSH_MSG_CHANNEL_REQUEST (exit-signal): '.$this->_string_shift($response, $length); |
|
2692 | 2692 | $this->_string_shift($response, 1); |
2693 | 2693 | extract(unpack('Nlength', $this->_string_shift($response, 4))); |
2694 | 2694 | if ($length) { |
2695 | - $this->errors[count($this->errors)].= "\r\n" . $this->_string_shift($response, $length); |
|
2695 | + $this->errors[count($this->errors)] .= "\r\n".$this->_string_shift($response, $length); |
|
2696 | 2696 | } |
2697 | 2697 | case 'exit-status': |
2698 | 2698 | extract(unpack('Cfalse/Nexit_status', $this->_string_shift($response, 5))); |
@@ -2713,7 +2713,7 @@ discard block |
||
2713 | 2713 | $this->curTimeout = 0; |
2714 | 2714 | |
2715 | 2715 | if ($this->bitmap & NET_SSH2_MASK_SHELL) { |
2716 | - $this->bitmap&= ~NET_SSH2_MASK_SHELL; |
|
2716 | + $this->bitmap &= ~NET_SSH2_MASK_SHELL; |
|
2717 | 2717 | } |
2718 | 2718 | if ($this->channel_status[$channel] != NET_SSH2_MSG_CHANNEL_EOF) { |
2719 | 2719 | $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$channel])); |
@@ -2757,13 +2757,13 @@ discard block |
||
2757 | 2757 | // 4 (packet length) + 1 (padding length) + 4 (minimal padding amount) == 9 |
2758 | 2758 | $packet_length = strlen($data) + 9; |
2759 | 2759 | // round up to the nearest $this->encrypt_block_size |
2760 | - $packet_length+= (($this->encrypt_block_size - 1) * $packet_length) % $this->encrypt_block_size; |
|
2760 | + $packet_length += (($this->encrypt_block_size - 1) * $packet_length) % $this->encrypt_block_size; |
|
2761 | 2761 | // subtracting strlen($data) is obvious - subtracting 5 is necessary because of packet_length and padding_length |
2762 | 2762 | $padding_length = $packet_length - strlen($data) - 5; |
2763 | 2763 | $padding = crypt_random_string($padding_length); |
2764 | 2764 | |
2765 | 2765 | // we subtract 4 from packet_length because the packet_length field isn't supposed to include itself |
2766 | - $packet = pack('NCa*', $packet_length - 4, $padding_length, $data . $padding); |
|
2766 | + $packet = pack('NCa*', $packet_length - 4, $padding_length, $data.$padding); |
|
2767 | 2767 | |
2768 | 2768 | $hmac = $this->hmac_create !== false ? $this->hmac_create->hash(pack('Na*', $this->send_seq_no, $packet)) : ''; |
2769 | 2769 | $this->send_seq_no++; |
@@ -2772,7 +2772,7 @@ discard block |
||
2772 | 2772 | $packet = $this->encrypt->encrypt($packet); |
2773 | 2773 | } |
2774 | 2774 | |
2775 | - $packet.= $hmac; |
|
2775 | + $packet .= $hmac; |
|
2776 | 2776 | |
2777 | 2777 | $start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838 |
2778 | 2778 | $result = strlen($packet) == fputs($this->fsock, $packet); |
@@ -2780,9 +2780,9 @@ discard block |
||
2780 | 2780 | |
2781 | 2781 | if (defined('NET_SSH2_LOGGING')) { |
2782 | 2782 | $current = strtok(microtime(), ' ') + strtok(''); |
2783 | - $message_number = isset($this->message_numbers[ord($data[0])]) ? $this->message_numbers[ord($data[0])] : 'UNKNOWN (' . ord($data[0]) . ')'; |
|
2784 | - $message_number = '-> ' . $message_number . |
|
2785 | - ' (since last: ' . round($current - $this->last_packet, 4) . ', network: ' . round($stop - $start, 4) . 's)'; |
|
2783 | + $message_number = isset($this->message_numbers[ord($data[0])]) ? $this->message_numbers[ord($data[0])] : 'UNKNOWN ('.ord($data[0]).')'; |
|
2784 | + $message_number = '-> '.$message_number. |
|
2785 | + ' (since last: '.round($current - $this->last_packet, 4).', network: '.round($stop - $start, 4).'s)'; |
|
2786 | 2786 | $this->_append_log($message_number, $data); |
2787 | 2787 | $this->last_packet = $current; |
2788 | 2788 | } |
@@ -2809,10 +2809,10 @@ discard block |
||
2809 | 2809 | case NET_SSH2_LOG_COMPLEX: |
2810 | 2810 | $this->message_number_log[] = $message_number; |
2811 | 2811 | $this->_string_shift($message); |
2812 | - $this->log_size+= strlen($message); |
|
2812 | + $this->log_size += strlen($message); |
|
2813 | 2813 | $this->message_log[] = $message; |
2814 | 2814 | while ($this->log_size > NET_SSH2_LOG_MAX_SIZE) { |
2815 | - $this->log_size-= strlen(array_shift($this->message_log)); |
|
2815 | + $this->log_size -= strlen(array_shift($this->message_log)); |
|
2816 | 2816 | array_shift($this->message_number_log); |
2817 | 2817 | } |
2818 | 2818 | break; |
@@ -2820,7 +2820,7 @@ discard block |
||
2820 | 2820 | // passwords won't be filtered out and select other packets may not be correctly |
2821 | 2821 | // identified |
2822 | 2822 | case NET_SSH2_LOG_REALTIME: |
2823 | - echo "<pre>\r\n" . $this->_format_log(array($message), array($message_number)) . "\r\n</pre>\r\n"; |
|
2823 | + echo "<pre>\r\n".$this->_format_log(array($message), array($message_number))."\r\n</pre>\r\n"; |
|
2824 | 2824 | @flush(); |
2825 | 2825 | @ob_flush(); |
2826 | 2826 | break; |
@@ -2841,10 +2841,10 @@ discard block |
||
2841 | 2841 | $entry = $this->_format_log(array($message), array($message_number)); |
2842 | 2842 | if ($this->realtime_log_wrap) { |
2843 | 2843 | $temp = "<<< START >>>\r\n"; |
2844 | - $entry.= $temp; |
|
2844 | + $entry .= $temp; |
|
2845 | 2845 | fseek($this->realtime_log_file, ftell($this->realtime_log_file) - strlen($temp)); |
2846 | 2846 | } |
2847 | - $this->realtime_log_size+= strlen($entry); |
|
2847 | + $this->realtime_log_size += strlen($entry); |
|
2848 | 2848 | if ($this->realtime_log_size > NET_SSH2_LOG_MAX_SIZE) { |
2849 | 2849 | fseek($this->realtime_log_file, 0); |
2850 | 2850 | $this->realtime_log_size = strlen($entry); |
@@ -2912,7 +2912,7 @@ discard block |
||
2912 | 2912 | while (!is_bool($this->_get_channel_packet($client_channel))); |
2913 | 2913 | |
2914 | 2914 | if ($this->bitmap & NET_SSH2_MASK_SHELL) { |
2915 | - $this->bitmap&= ~NET_SSH2_MASK_SHELL; |
|
2915 | + $this->bitmap &= ~NET_SSH2_MASK_SHELL; |
|
2916 | 2916 | } |
2917 | 2917 | } |
2918 | 2918 | |
@@ -3015,18 +3015,18 @@ discard block |
||
3015 | 3015 | |
3016 | 3016 | $output = ''; |
3017 | 3017 | for ($i = 0; $i < count($message_log); $i++) { |
3018 | - $output.= $message_number_log[$i] . "\r\n"; |
|
3018 | + $output .= $message_number_log[$i]."\r\n"; |
|
3019 | 3019 | $current_log = $message_log[$i]; |
3020 | 3020 | $j = 0; |
3021 | 3021 | do { |
3022 | 3022 | if (strlen($current_log)) { |
3023 | - $output.= str_pad(dechex($j), 7, '0', STR_PAD_LEFT) . '0 '; |
|
3023 | + $output .= str_pad(dechex($j), 7, '0', STR_PAD_LEFT).'0 '; |
|
3024 | 3024 | } |
3025 | 3025 | $fragment = $this->_string_shift($current_log, $short_width); |
3026 | 3026 | $hex = substr( |
3027 | 3027 | preg_replace( |
3028 | 3028 | '#(.)#es', |
3029 | - '"' . $boundary . '" . str_pad(dechex(ord(substr("\\1", -1))), 2, "0", STR_PAD_LEFT)', |
|
3029 | + '"'.$boundary.'" . str_pad(dechex(ord(substr("\\1", -1))), 2, "0", STR_PAD_LEFT)', |
|
3030 | 3030 | $fragment), |
3031 | 3031 | strlen($boundary) |
3032 | 3032 | ); |
@@ -3034,10 +3034,10 @@ discard block |
||
3034 | 3034 | // http://en.wikipedia.org/wiki/ASCII#ASCII_printable_characters |
3035 | 3035 | // also replace < with a . since < messes up the output on web browsers |
3036 | 3036 | $raw = preg_replace('#[^\x20-\x7E]|<#', '.', $fragment); |
3037 | - $output.= str_pad($hex, $long_width - $short_width, ' ') . $raw . "\r\n"; |
|
3037 | + $output .= str_pad($hex, $long_width - $short_width, ' ').$raw."\r\n"; |
|
3038 | 3038 | $j++; |
3039 | 3039 | } while (strlen($current_log)); |
3040 | - $output.= "\r\n"; |
|
3040 | + $output .= "\r\n"; |
|
3041 | 3041 | } |
3042 | 3042 | |
3043 | 3043 | return $output; |
@@ -3219,8 +3219,7 @@ discard block |
||
3219 | 3219 | |
3220 | 3220 | if ($this->signature_validated) { |
3221 | 3221 | return $this->bitmap ? |
3222 | - $this->signature_format . ' ' . base64_encode($this->server_public_host_key) : |
|
3223 | - false; |
|
3222 | + $this->signature_format.' '.base64_encode($this->server_public_host_key) : false; |
|
3224 | 3223 | } |
3225 | 3224 | |
3226 | 3225 | $this->signature_validated = true; |
@@ -3320,7 +3319,7 @@ discard block |
||
3320 | 3319 | $s = $s->toBytes(); |
3321 | 3320 | |
3322 | 3321 | $h = pack('N4H*', 0x00302130, 0x0906052B, 0x0E03021A, 0x05000414, sha1($this->exchange_hash)); |
3323 | - $h = chr(0x01) . str_repeat(chr(0xFF), $nLength - 3 - strlen($h)) . $h; |
|
3322 | + $h = chr(0x01).str_repeat(chr(0xFF), $nLength - 3 - strlen($h)).$h; |
|
3324 | 3323 | |
3325 | 3324 | if ($s != $h) { |
3326 | 3325 | user_error('Bad server signature'); |
@@ -3332,7 +3331,7 @@ discard block |
||
3332 | 3331 | return $this->_disconnect(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE); |
3333 | 3332 | } |
3334 | 3333 | |
3335 | - return $this->signature_format . ' ' . base64_encode($this->server_public_host_key); |
|
3334 | + return $this->signature_format.' '.base64_encode($this->server_public_host_key); |
|
3336 | 3335 | } |
3337 | 3336 | |
3338 | 3337 | /** |