Completed
Push — 1.10.x ( f89535...7ba96a )
by Angel Fernando Quiroz
126:15 queued 89:30
created
main/inc/lib/phpseclib/Net/SSH2.php 1 patch
Spacing   +96 added lines, -97 removed lines patch added patch discarded remove patch
@@ -74,9 +74,9 @@  discard block
 block discarded – undo
74 74
  * @access private
75 75
  */
76 76
 define('NET_SSH2_MASK_CONSTRUCTOR', 0x00000001);
77
-define('NET_SSH2_MASK_LOGIN_REQ',   0x00000002);
78
-define('NET_SSH2_MASK_LOGIN',       0x00000004);
79
-define('NET_SSH2_MASK_SHELL',       0x00000008);
77
+define('NET_SSH2_MASK_LOGIN_REQ', 0x00000002);
78
+define('NET_SSH2_MASK_LOGIN', 0x00000004);
79
+define('NET_SSH2_MASK_SHELL', 0x00000008);
80 80
 /**#@-*/
81 81
 
82 82
 /**#@+
@@ -96,7 +96,7 @@  discard block
 block discarded – undo
96 96
  * @access private
97 97
  */
98 98
 define('NET_SSH2_CHANNEL_EXEC', 0); // PuTTy uses 0x100
99
-define('NET_SSH2_CHANNEL_SHELL',1);
99
+define('NET_SSH2_CHANNEL_SHELL', 1);
100 100
 /**#@-*/
101 101
 
102 102
 /**#@+
@@ -106,7 +106,7 @@  discard block
 block discarded – undo
106 106
 /**
107 107
  * Returns the message numbers
108 108
  */
109
-define('NET_SSH2_LOG_SIMPLE',  1);
109
+define('NET_SSH2_LOG_SIMPLE', 1);
110 110
 /**
111 111
  * Returns the message content
112 112
  */
@@ -128,7 +128,7 @@  discard block
 block discarded – undo
128 128
 /**
129 129
  * Returns when a string matching $expect exactly is found
130 130
  */
131
-define('NET_SSH2_READ_SIMPLE',  1);
131
+define('NET_SSH2_READ_SIMPLE', 1);
132 132
 /**
133 133
  * Returns when a string matching the regular expression $expect is found
134 134
  */
@@ -833,7 +833,7 @@  discard block
 block discarded – undo
833 833
         }
834 834
         $elapsed = strtok(microtime(), ' ') + strtok('') - $start;
835 835
 
836
-        $timeout-= $elapsed;
836
+        $timeout -= $elapsed;
837 837
 
838 838
         if ($timeout <= 0) {
839 839
             user_error(rtrim("Cannot connect to $host. Timeout error"));
@@ -864,10 +864,10 @@  discard block
 block discarded – undo
864 864
         $extra = '';
865 865
         while (!feof($this->fsock) && !preg_match('#^SSH-(\d\.\d+)#', $temp, $matches)) {
866 866
             if (substr($temp, -2) == "\r\n") {
867
-                $extra.= $temp;
867
+                $extra .= $temp;
868 868
                 $temp = '';
869 869
             }
870
-            $temp.= fgets($this->fsock, 255);
870
+            $temp .= fgets($this->fsock, 255);
871 871
         }
872 872
 
873 873
         if (feof($this->fsock)) {
@@ -886,12 +886,12 @@  discard block
 block discarded – undo
886 886
         }
887 887
 
888 888
         if (!empty($ext)) {
889
-            $this->identifier.= ' (' . implode(', ', $ext) . ')';
889
+            $this->identifier .= ' ('.implode(', ', $ext).')';
890 890
         }
891 891
 
892 892
         if (defined('NET_SSH2_LOGGING')) {
893
-            $this->_append_log('<-', $extra . $temp);
894
-            $this->_append_log('->', $this->identifier . "\r\n");
893
+            $this->_append_log('<-', $extra.$temp);
894
+            $this->_append_log('->', $this->identifier."\r\n");
895 895
         }
896 896
 
897 897
         $this->server_identifier = trim($temp, "\r\n");
@@ -904,7 +904,7 @@  discard block
 block discarded – undo
904 904
             return;
905 905
         }
906 906
 
907
-        fputs($this->fsock, $this->identifier . "\r\n");
907
+        fputs($this->fsock, $this->identifier."\r\n");
908 908
 
909 909
         $response = $this->_get_binary_packet();
910 910
         if ($response === false) {
@@ -947,41 +947,41 @@  discard block
 block discarded – undo
947 947
             'arcfour256',
948 948
             'arcfour128',
949 949
 
950
-            'arcfour',        // OPTIONAL          the ARCFOUR stream cipher with a 128-bit key
950
+            'arcfour', // OPTIONAL          the ARCFOUR stream cipher with a 128-bit key
951 951
 
952 952
             // CTR modes from <http://tools.ietf.org/html/rfc4344#section-4>:
953
-            'aes128-ctr',     // RECOMMENDED       AES (Rijndael) in SDCTR mode, with 128-bit key
954
-            'aes192-ctr',     // RECOMMENDED       AES with 192-bit key
955
-            'aes256-ctr',     // RECOMMENDED       AES with 256-bit key
953
+            'aes128-ctr', // RECOMMENDED       AES (Rijndael) in SDCTR mode, with 128-bit key
954
+            'aes192-ctr', // RECOMMENDED       AES with 192-bit key
955
+            'aes256-ctr', // RECOMMENDED       AES with 256-bit key
956 956
 
957
-            'blowfish-ctr',   // OPTIONAL          Blowfish in SDCTR mode
957
+            'blowfish-ctr', // OPTIONAL          Blowfish in SDCTR mode
958 958
 
959 959
             'twofish128-ctr', // OPTIONAL          Twofish in SDCTR mode, with 128-bit key
960 960
             'twofish192-ctr', // OPTIONAL          Twofish with 192-bit key
961 961
             'twofish256-ctr', // OPTIONAL          Twofish with 256-bit key
962 962
 
963
-            'aes128-cbc',     // RECOMMENDED       AES with a 128-bit key
964
-            'aes192-cbc',     // OPTIONAL          AES with a 192-bit key
965
-            'aes256-cbc',     // OPTIONAL          AES in CBC mode, with a 256-bit key
963
+            'aes128-cbc', // RECOMMENDED       AES with a 128-bit key
964
+            'aes192-cbc', // OPTIONAL          AES with a 192-bit key
965
+            'aes256-cbc', // OPTIONAL          AES in CBC mode, with a 256-bit key
966 966
 
967
-            'blowfish-cbc',   // OPTIONAL          Blowfish in CBC mode
967
+            'blowfish-cbc', // OPTIONAL          Blowfish in CBC mode
968 968
 
969 969
             'twofish128-cbc', // OPTIONAL          Twofish with a 128-bit key
970 970
             'twofish192-cbc', // OPTIONAL          Twofish with a 192-bit key
971 971
             'twofish256-cbc',
972
-            'twofish-cbc',    // OPTIONAL          alias for "twofish256-cbc"
972
+            'twofish-cbc', // OPTIONAL          alias for "twofish256-cbc"
973 973
                               //                   (this is being retained for historical reasons)
974
-            '3des-ctr',       // RECOMMENDED       Three-key 3DES in SDCTR mode
974
+            '3des-ctr', // RECOMMENDED       Three-key 3DES in SDCTR mode
975 975
 
976
-            '3des-cbc',       // REQUIRED          three-key 3DES in CBC mode
976
+            '3des-cbc', // REQUIRED          three-key 3DES in CBC mode
977 977
             'none'            // OPTIONAL          no encryption; NOT RECOMMENDED
978 978
         );
979 979
 
980 980
         static $mac_algorithms = array(
981 981
             'hmac-sha1-96', // RECOMMENDED     first 96 bits of HMAC-SHA1 (digest length = 12, key length = 20)
982
-            'hmac-sha1',    // REQUIRED        HMAC-SHA1 (digest length = key length = 20)
983
-            'hmac-md5-96',  // OPTIONAL        first 96 bits of HMAC-MD5 (digest length = 12, key length = 16)
984
-            'hmac-md5',     // OPTIONAL        HMAC-MD5 (digest length = key length = 16)
982
+            'hmac-sha1', // REQUIRED        HMAC-SHA1 (digest length = key length = 20)
983
+            'hmac-md5-96', // OPTIONAL        first 96 bits of HMAC-MD5 (digest length = 12, key length = 16)
984
+            'hmac-md5', // OPTIONAL        HMAC-MD5 (digest length = key length = 16)
985 985
             'none'          // OPTIONAL        no MAC; NOT RECOMMENDED
986 986
         );
987 987
 
@@ -1170,20 +1170,20 @@  discard block
 block discarded – undo
1170 1170
             // see http://tools.ietf.org/html/rfc2409#section-6.2 and 
1171 1171
             // http://tools.ietf.org/html/rfc2412, appendex E
1172 1172
             case 'diffie-hellman-group1-sha1':
1173
-                $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' . 
1174
-                         '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' . 
1175
-                         '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' . 
1173
+                $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74'. 
1174
+                         '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437'. 
1175
+                         '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED'. 
1176 1176
                          'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF';
1177 1177
                 break;
1178 1178
             // see http://tools.ietf.org/html/rfc3526#section-3
1179 1179
             case 'diffie-hellman-group14-sha1':
1180
-                $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74' . 
1181
-                         '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437' . 
1182
-                         '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED' . 
1183
-                         'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05' . 
1184
-                         '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB' . 
1185
-                         '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B' . 
1186
-                         'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718' . 
1180
+                $prime = 'FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74'. 
1181
+                         '020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F1437'. 
1182
+                         '4FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED'. 
1183
+                         'EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF05'. 
1184
+                         '98DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB'. 
1185
+                         '9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B'. 
1186
+                         'E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF695581718'. 
1187 1187
                          '3995497CEA956AE515D2261898FA051015728E5A8AACAA68FFFFFFFFFFFFFFFF';
1188 1188
                 break;
1189 1189
         }
@@ -1454,15 +1454,15 @@  discard block
 block discarded – undo
1454 1454
             $this->encrypt->enableContinuousBuffer();
1455 1455
             $this->encrypt->disablePadding();
1456 1456
 
1457
-            $iv = $kexHash->hash($keyBytes . $this->exchange_hash . 'A' . $this->session_id);
1457
+            $iv = $kexHash->hash($keyBytes.$this->exchange_hash.'A'.$this->session_id);
1458 1458
             while ($this->encrypt_block_size > strlen($iv)) {
1459
-                $iv.= $kexHash->hash($keyBytes . $this->exchange_hash . $iv);
1459
+                $iv .= $kexHash->hash($keyBytes.$this->exchange_hash.$iv);
1460 1460
             }
1461 1461
             $this->encrypt->setIV(substr($iv, 0, $this->encrypt_block_size));
1462 1462
 
1463
-            $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'C' . $this->session_id);
1463
+            $key = $kexHash->hash($keyBytes.$this->exchange_hash.'C'.$this->session_id);
1464 1464
             while ($encryptKeyLength > strlen($key)) {
1465
-                $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
1465
+                $key .= $kexHash->hash($keyBytes.$this->exchange_hash.$key);
1466 1466
             }
1467 1467
             $this->encrypt->setKey(substr($key, 0, $encryptKeyLength));
1468 1468
         }
@@ -1471,15 +1471,15 @@  discard block
 block discarded – undo
1471 1471
             $this->decrypt->enableContinuousBuffer();
1472 1472
             $this->decrypt->disablePadding();
1473 1473
 
1474
-            $iv = $kexHash->hash($keyBytes . $this->exchange_hash . 'B' . $this->session_id);
1474
+            $iv = $kexHash->hash($keyBytes.$this->exchange_hash.'B'.$this->session_id);
1475 1475
             while ($this->decrypt_block_size > strlen($iv)) {
1476
-                $iv.= $kexHash->hash($keyBytes . $this->exchange_hash . $iv);
1476
+                $iv .= $kexHash->hash($keyBytes.$this->exchange_hash.$iv);
1477 1477
             }
1478 1478
             $this->decrypt->setIV(substr($iv, 0, $this->decrypt_block_size));
1479 1479
 
1480
-            $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'D' . $this->session_id);
1480
+            $key = $kexHash->hash($keyBytes.$this->exchange_hash.'D'.$this->session_id);
1481 1481
             while ($decryptKeyLength > strlen($key)) {
1482
-                $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
1482
+                $key .= $kexHash->hash($keyBytes.$this->exchange_hash.$key);
1483 1483
             }
1484 1484
             $this->decrypt->setKey(substr($key, 0, $decryptKeyLength));
1485 1485
         }
@@ -1553,15 +1553,15 @@  discard block
 block discarded – undo
1553 1553
                 $this->hmac_size = 12;
1554 1554
         }
1555 1555
 
1556
-        $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'E' . $this->session_id);
1556
+        $key = $kexHash->hash($keyBytes.$this->exchange_hash.'E'.$this->session_id);
1557 1557
         while ($createKeyLength > strlen($key)) {
1558
-            $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
1558
+            $key .= $kexHash->hash($keyBytes.$this->exchange_hash.$key);
1559 1559
         }
1560 1560
         $this->hmac_create->setKey(substr($key, 0, $createKeyLength));
1561 1561
 
1562
-        $key = $kexHash->hash($keyBytes . $this->exchange_hash . 'F' . $this->session_id);
1562
+        $key = $kexHash->hash($keyBytes.$this->exchange_hash.'F'.$this->session_id);
1563 1563
         while ($checkKeyLength > strlen($key)) {
1564
-            $key.= $kexHash->hash($keyBytes . $this->exchange_hash . $key);
1564
+            $key .= $kexHash->hash($keyBytes.$this->exchange_hash.$key);
1565 1565
         }
1566 1566
         $this->hmac_check->setKey(substr($key, 0, $checkKeyLength));
1567 1567
 
@@ -1726,7 +1726,7 @@  discard block
 block discarded – undo
1726 1726
                     $this->message_number_log[count($this->message_number_log) - 1] = 'NET_SSH2_MSG_USERAUTH_PASSWD_CHANGEREQ';
1727 1727
                 }
1728 1728
                 extract(unpack('Nlength', $this->_string_shift($response, 4)));
1729
-                $this->errors[] = 'SSH_MSG_USERAUTH_PASSWD_CHANGEREQ: ' . utf8_decode($this->_string_shift($response, $length));
1729
+                $this->errors[] = 'SSH_MSG_USERAUTH_PASSWD_CHANGEREQ: '.utf8_decode($this->_string_shift($response, $length));
1730 1730
                 return $this->_disconnect(NET_SSH2_DISCONNECT_AUTH_CANCELLED_BY_USER);
1731 1731
             case NET_SSH2_MSG_USERAUTH_FAILURE:
1732 1732
                 // can we use keyboard-interactive authentication?  if not then either the login is bad or the server employees
@@ -1858,8 +1858,8 @@  discard block
 block discarded – undo
1858 1858
                 // see http://tools.ietf.org/html/rfc4256#section-3.4
1859 1859
                 $packet = $logged = pack('CN', NET_SSH2_MSG_USERAUTH_INFO_RESPONSE, count($responses));
1860 1860
                 for ($i = 0; $i < count($responses); $i++) {
1861
-                    $packet.= pack('Na*', strlen($responses[$i]), $responses[$i]);
1862
-                    $logged.= pack('Na*', strlen('dummy-answer'), 'dummy-answer');
1861
+                    $packet .= pack('Na*', strlen($responses[$i]), $responses[$i]);
1862
+                    $logged .= pack('Na*', strlen('dummy-answer'), 'dummy-answer');
1863 1863
                 }
1864 1864
 
1865 1865
                 if (!$this->_send_binary_packet($packet)) {
@@ -1924,7 +1924,7 @@  discard block
 block discarded – undo
1924 1924
         );
1925 1925
         $part2 = pack('Na*Na*', strlen('ssh-rsa'), 'ssh-rsa', strlen($publickey), $publickey);
1926 1926
 
1927
-        $packet = $part1 . chr(0) . $part2;
1927
+        $packet = $part1.chr(0).$part2;
1928 1928
         if (!$this->_send_binary_packet($packet)) {
1929 1929
             return false;
1930 1930
         }
@@ -1940,7 +1940,7 @@  discard block
 block discarded – undo
1940 1940
         switch ($type) {
1941 1941
             case NET_SSH2_MSG_USERAUTH_FAILURE:
1942 1942
                 extract(unpack('Nlength', $this->_string_shift($response, 4)));
1943
-                $this->errors[] = 'SSH_MSG_USERAUTH_FAILURE: ' . $this->_string_shift($response, $length);
1943
+                $this->errors[] = 'SSH_MSG_USERAUTH_FAILURE: '.$this->_string_shift($response, $length);
1944 1944
                 return false;
1945 1945
             case NET_SSH2_MSG_USERAUTH_PK_OK:
1946 1946
                 // we'll just take it on faith that the public key blob and the public key algorithm name are as
@@ -1954,11 +1954,11 @@  discard block
 block discarded – undo
1954 1954
                 }
1955 1955
         }
1956 1956
 
1957
-        $packet = $part1 . chr(1) . $part2;
1957
+        $packet = $part1.chr(1).$part2;
1958 1958
         $privatekey->setSignatureMode(CRYPT_RSA_SIGNATURE_PKCS1);
1959 1959
         $signature = $privatekey->sign(pack('Na*a*', strlen($this->session_id), $this->session_id, $packet));
1960 1960
         $signature = pack('Na*Na*', strlen('ssh-rsa'), 'ssh-rsa', strlen($signature), $signature);
1961
-        $packet.= pack('Na*', strlen($signature), $signature);
1961
+        $packet .= pack('Na*', strlen($signature), $signature);
1962 1962
 
1963 1963
         if (!$this->_send_binary_packet($packet)) {
1964 1964
             return false;
@@ -2120,7 +2120,7 @@  discard block
 block discarded – undo
2120 2120
                     if (is_callable($callback)) {
2121 2121
                         $callback($temp);
2122 2122
                     } else {
2123
-                        $output.= $temp;
2123
+                        $output .= $temp;
2124 2124
                     }
2125 2125
             }
2126 2126
         }
@@ -2248,7 +2248,7 @@  discard block
 block discarded – undo
2248 2248
                 return $response ? $this->_string_shift($this->interactiveBuffer, strlen($this->interactiveBuffer)) : false;
2249 2249
             }
2250 2250
 
2251
-            $this->interactiveBuffer.= $response;
2251
+            $this->interactiveBuffer .= $response;
2252 2252
         }
2253 2253
     }
2254 2254
 
@@ -2384,12 +2384,12 @@  discard block
 block discarded – undo
2384 2384
         $buffer = '';
2385 2385
         while ($remaining_length > 0) {
2386 2386
             $temp = fread($this->fsock, $remaining_length);
2387
-            $buffer.= $temp;
2388
-            $remaining_length-= strlen($temp);
2387
+            $buffer .= $temp;
2388
+            $remaining_length -= strlen($temp);
2389 2389
         }
2390 2390
         $stop = strtok(microtime(), ' ') + strtok('');
2391 2391
         if (strlen($buffer)) {
2392
-            $raw.= $this->decrypt !== false ? $this->decrypt->decrypt($buffer) : $buffer;
2392
+            $raw .= $this->decrypt !== false ? $this->decrypt->decrypt($buffer) : $buffer;
2393 2393
         }
2394 2394
 
2395 2395
         $payload = $this->_string_shift($raw, $packet_length - $padding_length - 1);
@@ -2397,7 +2397,7 @@  discard block
 block discarded – undo
2397 2397
 
2398 2398
         if ($this->hmac_check !== false) {
2399 2399
             $hmac = fread($this->fsock, $this->hmac_size);
2400
-            if ($hmac != $this->hmac_check->hash(pack('NNCa*', $this->get_seq_no, $packet_length, $padding_length, $payload . $padding))) {
2400
+            if ($hmac != $this->hmac_check->hash(pack('NNCa*', $this->get_seq_no, $packet_length, $padding_length, $payload.$padding))) {
2401 2401
                 user_error('Invalid HMAC');
2402 2402
                 return false;
2403 2403
             }
@@ -2411,9 +2411,9 @@  discard block
 block discarded – undo
2411 2411
 
2412 2412
         if (defined('NET_SSH2_LOGGING')) {
2413 2413
             $current = strtok(microtime(), ' ') + strtok('');
2414
-            $message_number = isset($this->message_numbers[ord($payload[0])]) ? $this->message_numbers[ord($payload[0])] : 'UNKNOWN (' . ord($payload[0]) . ')';
2415
-            $message_number = '<- ' . $message_number .
2416
-                              ' (since last: ' . round($current - $this->last_packet, 4) . ', network: ' . round($stop - $start, 4) . 's)';
2414
+            $message_number = isset($this->message_numbers[ord($payload[0])]) ? $this->message_numbers[ord($payload[0])] : 'UNKNOWN ('.ord($payload[0]).')';
2415
+            $message_number = '<- '.$message_number.
2416
+                              ' (since last: '.round($current - $this->last_packet, 4).', network: '.round($stop - $start, 4).'s)';
2417 2417
             $this->_append_log($message_number, $payload);
2418 2418
             $this->last_packet = $current;
2419 2419
         }
@@ -2436,7 +2436,7 @@  discard block
 block discarded – undo
2436 2436
             case NET_SSH2_MSG_DISCONNECT:
2437 2437
                 $this->_string_shift($payload, 1);
2438 2438
                 extract(unpack('Nreason_code/Nlength', $this->_string_shift($payload, 8)));
2439
-                $this->errors[] = 'SSH_MSG_DISCONNECT: ' . $this->disconnect_reasons[$reason_code] . "\r\n" . utf8_decode($this->_string_shift($payload, $length));
2439
+                $this->errors[] = 'SSH_MSG_DISCONNECT: '.$this->disconnect_reasons[$reason_code]."\r\n".utf8_decode($this->_string_shift($payload, $length));
2440 2440
                 $this->bitmask = 0;
2441 2441
                 return false;
2442 2442
             case NET_SSH2_MSG_IGNORE:
@@ -2445,7 +2445,7 @@  discard block
 block discarded – undo
2445 2445
             case NET_SSH2_MSG_DEBUG:
2446 2446
                 $this->_string_shift($payload, 2);
2447 2447
                 extract(unpack('Nlength', $this->_string_shift($payload, 4)));
2448
-                $this->errors[] = 'SSH_MSG_DEBUG: ' . utf8_decode($this->_string_shift($payload, $length));
2448
+                $this->errors[] = 'SSH_MSG_DEBUG: '.utf8_decode($this->_string_shift($payload, $length));
2449 2449
                 $payload = $this->_get_binary_packet();
2450 2450
                 break;
2451 2451
             case NET_SSH2_MSG_UNIMPLEMENTED:
@@ -2474,7 +2474,7 @@  discard block
 block discarded – undo
2474 2474
                 case NET_SSH2_MSG_GLOBAL_REQUEST: // see http://tools.ietf.org/html/rfc4254#section-4
2475 2475
                     $this->_string_shift($payload, 1);
2476 2476
                     extract(unpack('Nlength', $this->_string_shift($payload)));
2477
-                    $this->errors[] = 'SSH_MSG_GLOBAL_REQUEST: ' . utf8_decode($this->_string_shift($payload, $length));
2477
+                    $this->errors[] = 'SSH_MSG_GLOBAL_REQUEST: '.utf8_decode($this->_string_shift($payload, $length));
2478 2478
 
2479 2479
                     if (!$this->_send_binary_packet(pack('C', NET_SSH2_MSG_REQUEST_FAILURE))) {
2480 2480
                         return $this->_disconnect(NET_SSH2_DISCONNECT_BY_APPLICATION);
@@ -2485,7 +2485,7 @@  discard block
 block discarded – undo
2485 2485
                 case NET_SSH2_MSG_CHANNEL_OPEN: // see http://tools.ietf.org/html/rfc4254#section-5.1
2486 2486
                     $this->_string_shift($payload, 1);
2487 2487
                     extract(unpack('N', $this->_string_shift($payload, 4)));
2488
-                    $this->errors[] = 'SSH_MSG_CHANNEL_OPEN: ' . utf8_decode($this->_string_shift($payload, $length));
2488
+                    $this->errors[] = 'SSH_MSG_CHANNEL_OPEN: '.utf8_decode($this->_string_shift($payload, $length));
2489 2489
 
2490 2490
                     $this->_string_shift($payload, 4); // skip over client channel
2491 2491
                     extract(unpack('Nserver_channel', $this->_string_shift($payload, 4)));
@@ -2585,7 +2585,7 @@  discard block
 block discarded – undo
2585 2585
                     return true;
2586 2586
                 }
2587 2587
                 $elapsed = strtok(microtime(), ' ') + strtok('') - $start;
2588
-                $this->curTimeout-= $elapsed;
2588
+                $this->curTimeout -= $elapsed;
2589 2589
             }
2590 2590
 
2591 2591
             $response = $this->_get_binary_packet();
@@ -2598,13 +2598,13 @@  discard block
 block discarded – undo
2598 2598
             }
2599 2599
 
2600 2600
             // resize the window, if appropriate
2601
-            $this->window_size_server_to_client[$client_channel]-= strlen($response);
2601
+            $this->window_size_server_to_client[$client_channel] -= strlen($response);
2602 2602
             if ($this->window_size_server_to_client[$client_channel] < 0) {
2603 2603
                 $packet = pack('CNN', NET_SSH2_MSG_CHANNEL_WINDOW_ADJUST, $this->server_channels[$client_channel], $this->window_size);
2604 2604
                 if (!$this->_send_binary_packet($packet)) {
2605 2605
                     return false;
2606 2606
                 }
2607
-                $this->window_size_server_to_client[$client_channel]+= $this->window_size;
2607
+                $this->window_size_server_to_client[$client_channel] += $this->window_size;
2608 2608
             }
2609 2609
 
2610 2610
             extract(unpack('Ctype/Nchannel', $this->_string_shift($response, 5)));
@@ -2688,11 +2688,11 @@  discard block
 block discarded – undo
2688 2688
                         case 'exit-signal':
2689 2689
                             $this->_string_shift($response, 1);
2690 2690
                             extract(unpack('Nlength', $this->_string_shift($response, 4)));
2691
-                            $this->errors[] = 'SSH_MSG_CHANNEL_REQUEST (exit-signal): ' . $this->_string_shift($response, $length);
2691
+                            $this->errors[] = 'SSH_MSG_CHANNEL_REQUEST (exit-signal): '.$this->_string_shift($response, $length);
2692 2692
                             $this->_string_shift($response, 1);
2693 2693
                             extract(unpack('Nlength', $this->_string_shift($response, 4)));
2694 2694
                             if ($length) {
2695
-                                $this->errors[count($this->errors)].= "\r\n" . $this->_string_shift($response, $length);
2695
+                                $this->errors[count($this->errors)] .= "\r\n".$this->_string_shift($response, $length);
2696 2696
                             }
2697 2697
                         case 'exit-status':
2698 2698
                             extract(unpack('Cfalse/Nexit_status', $this->_string_shift($response, 5)));
@@ -2713,7 +2713,7 @@  discard block
 block discarded – undo
2713 2713
                     $this->curTimeout = 0;
2714 2714
 
2715 2715
                     if ($this->bitmap & NET_SSH2_MASK_SHELL) {
2716
-                        $this->bitmap&= ~NET_SSH2_MASK_SHELL;
2716
+                        $this->bitmap &= ~NET_SSH2_MASK_SHELL;
2717 2717
                     }
2718 2718
                     if ($this->channel_status[$channel] != NET_SSH2_MSG_CHANNEL_EOF) {
2719 2719
                         $this->_send_binary_packet(pack('CN', NET_SSH2_MSG_CHANNEL_CLOSE, $this->server_channels[$channel]));
@@ -2757,13 +2757,13 @@  discard block
 block discarded – undo
2757 2757
         // 4 (packet length) + 1 (padding length) + 4 (minimal padding amount) == 9
2758 2758
         $packet_length = strlen($data) + 9;
2759 2759
         // round up to the nearest $this->encrypt_block_size
2760
-        $packet_length+= (($this->encrypt_block_size - 1) * $packet_length) % $this->encrypt_block_size;
2760
+        $packet_length += (($this->encrypt_block_size - 1) * $packet_length) % $this->encrypt_block_size;
2761 2761
         // subtracting strlen($data) is obvious - subtracting 5 is necessary because of packet_length and padding_length
2762 2762
         $padding_length = $packet_length - strlen($data) - 5;
2763 2763
         $padding = crypt_random_string($padding_length);
2764 2764
 
2765 2765
         // we subtract 4 from packet_length because the packet_length field isn't supposed to include itself
2766
-        $packet = pack('NCa*', $packet_length - 4, $padding_length, $data . $padding);
2766
+        $packet = pack('NCa*', $packet_length - 4, $padding_length, $data.$padding);
2767 2767
 
2768 2768
         $hmac = $this->hmac_create !== false ? $this->hmac_create->hash(pack('Na*', $this->send_seq_no, $packet)) : '';
2769 2769
         $this->send_seq_no++;
@@ -2772,7 +2772,7 @@  discard block
 block discarded – undo
2772 2772
             $packet = $this->encrypt->encrypt($packet);
2773 2773
         }
2774 2774
 
2775
-        $packet.= $hmac;
2775
+        $packet .= $hmac;
2776 2776
 
2777 2777
         $start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
2778 2778
         $result = strlen($packet) == fputs($this->fsock, $packet);
@@ -2780,9 +2780,9 @@  discard block
 block discarded – undo
2780 2780
 
2781 2781
         if (defined('NET_SSH2_LOGGING')) {
2782 2782
             $current = strtok(microtime(), ' ') + strtok('');
2783
-            $message_number = isset($this->message_numbers[ord($data[0])]) ? $this->message_numbers[ord($data[0])] : 'UNKNOWN (' . ord($data[0]) . ')';
2784
-            $message_number = '-> ' . $message_number .
2785
-                              ' (since last: ' . round($current - $this->last_packet, 4) . ', network: ' . round($stop - $start, 4) . 's)';
2783
+            $message_number = isset($this->message_numbers[ord($data[0])]) ? $this->message_numbers[ord($data[0])] : 'UNKNOWN ('.ord($data[0]).')';
2784
+            $message_number = '-> '.$message_number.
2785
+                              ' (since last: '.round($current - $this->last_packet, 4).', network: '.round($stop - $start, 4).'s)';
2786 2786
             $this->_append_log($message_number, $data);
2787 2787
             $this->last_packet = $current;
2788 2788
         }
@@ -2809,10 +2809,10 @@  discard block
 block discarded – undo
2809 2809
                 case NET_SSH2_LOG_COMPLEX:
2810 2810
                     $this->message_number_log[] = $message_number;
2811 2811
                     $this->_string_shift($message);
2812
-                    $this->log_size+= strlen($message);
2812
+                    $this->log_size += strlen($message);
2813 2813
                     $this->message_log[] = $message;
2814 2814
                     while ($this->log_size > NET_SSH2_LOG_MAX_SIZE) {
2815
-                        $this->log_size-= strlen(array_shift($this->message_log));
2815
+                        $this->log_size -= strlen(array_shift($this->message_log));
2816 2816
                         array_shift($this->message_number_log);
2817 2817
                     }
2818 2818
                     break;
@@ -2820,7 +2820,7 @@  discard block
 block discarded – undo
2820 2820
                 // passwords won't be filtered out and select other packets may not be correctly
2821 2821
                 // identified
2822 2822
                 case NET_SSH2_LOG_REALTIME:
2823
-                    echo "<pre>\r\n" . $this->_format_log(array($message), array($message_number)) . "\r\n</pre>\r\n";
2823
+                    echo "<pre>\r\n".$this->_format_log(array($message), array($message_number))."\r\n</pre>\r\n";
2824 2824
                     @flush();
2825 2825
                     @ob_flush();
2826 2826
                     break;
@@ -2841,10 +2841,10 @@  discard block
 block discarded – undo
2841 2841
                     $entry = $this->_format_log(array($message), array($message_number));
2842 2842
                     if ($this->realtime_log_wrap) {
2843 2843
                         $temp = "<<< START >>>\r\n";
2844
-                        $entry.= $temp;
2844
+                        $entry .= $temp;
2845 2845
                         fseek($this->realtime_log_file, ftell($this->realtime_log_file) - strlen($temp));
2846 2846
                     }
2847
-                    $this->realtime_log_size+= strlen($entry);
2847
+                    $this->realtime_log_size += strlen($entry);
2848 2848
                     if ($this->realtime_log_size > NET_SSH2_LOG_MAX_SIZE) {
2849 2849
                         fseek($this->realtime_log_file, 0);
2850 2850
                         $this->realtime_log_size = strlen($entry);
@@ -2912,7 +2912,7 @@  discard block
 block discarded – undo
2912 2912
         while (!is_bool($this->_get_channel_packet($client_channel)));
2913 2913
 
2914 2914
         if ($this->bitmap & NET_SSH2_MASK_SHELL) {
2915
-            $this->bitmap&= ~NET_SSH2_MASK_SHELL;
2915
+            $this->bitmap &= ~NET_SSH2_MASK_SHELL;
2916 2916
         }
2917 2917
     }
2918 2918
 
@@ -3015,18 +3015,18 @@  discard block
 block discarded – undo
3015 3015
 
3016 3016
         $output = '';
3017 3017
         for ($i = 0; $i < count($message_log); $i++) {
3018
-            $output.= $message_number_log[$i] . "\r\n";
3018
+            $output .= $message_number_log[$i]."\r\n";
3019 3019
             $current_log = $message_log[$i];
3020 3020
             $j = 0;
3021 3021
             do {
3022 3022
                 if (strlen($current_log)) {
3023
-                    $output.= str_pad(dechex($j), 7, '0', STR_PAD_LEFT) . '0  ';
3023
+                    $output .= str_pad(dechex($j), 7, '0', STR_PAD_LEFT).'0  ';
3024 3024
                 }
3025 3025
                 $fragment = $this->_string_shift($current_log, $short_width);
3026 3026
                 $hex = substr(
3027 3027
                            preg_replace(
3028 3028
                                '#(.)#es',
3029
-                               '"' . $boundary . '" . str_pad(dechex(ord(substr("\\1", -1))), 2, "0", STR_PAD_LEFT)',
3029
+                               '"'.$boundary.'" . str_pad(dechex(ord(substr("\\1", -1))), 2, "0", STR_PAD_LEFT)',
3030 3030
                                $fragment),
3031 3031
                            strlen($boundary)
3032 3032
                        );
@@ -3034,10 +3034,10 @@  discard block
 block discarded – undo
3034 3034
                 // http://en.wikipedia.org/wiki/ASCII#ASCII_printable_characters
3035 3035
                 // also replace < with a . since < messes up the output on web browsers
3036 3036
                 $raw = preg_replace('#[^\x20-\x7E]|<#', '.', $fragment);
3037
-                $output.= str_pad($hex, $long_width - $short_width, ' ') . $raw . "\r\n";
3037
+                $output .= str_pad($hex, $long_width - $short_width, ' ').$raw."\r\n";
3038 3038
                 $j++;
3039 3039
             } while (strlen($current_log));
3040
-            $output.= "\r\n";
3040
+            $output .= "\r\n";
3041 3041
         }
3042 3042
 
3043 3043
         return $output;
@@ -3219,8 +3219,7 @@  discard block
 block discarded – undo
3219 3219
 
3220 3220
         if ($this->signature_validated) {
3221 3221
             return $this->bitmap ?
3222
-                $this->signature_format . ' ' . base64_encode($this->server_public_host_key) :
3223
-                false;
3222
+                $this->signature_format.' '.base64_encode($this->server_public_host_key) : false;
3224 3223
         }
3225 3224
 
3226 3225
         $this->signature_validated = true;
@@ -3320,7 +3319,7 @@  discard block
 block discarded – undo
3320 3319
                 $s = $s->toBytes();
3321 3320
 
3322 3321
                 $h = pack('N4H*', 0x00302130, 0x0906052B, 0x0E03021A, 0x05000414, sha1($this->exchange_hash));
3323
-                $h = chr(0x01) . str_repeat(chr(0xFF), $nLength - 3 - strlen($h)) . $h;
3322
+                $h = chr(0x01).str_repeat(chr(0xFF), $nLength - 3 - strlen($h)).$h;
3324 3323
 
3325 3324
                 if ($s != $h) {
3326 3325
                     user_error('Bad server signature');
@@ -3332,7 +3331,7 @@  discard block
 block discarded – undo
3332 3331
                 return $this->_disconnect(NET_SSH2_DISCONNECT_HOST_KEY_NOT_VERIFIABLE);
3333 3332
         }
3334 3333
 
3335
-        return $this->signature_format . ' ' . base64_encode($this->server_public_host_key);
3334
+        return $this->signature_format.' '.base64_encode($this->server_public_host_key);
3336 3335
     }
3337 3336
 
3338 3337
     /**
Please login to merge, or discard this patch.
main/inc/lib/phpseclib/Net/SFTP/Stream.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -309,7 +309,7 @@  discard block
 block discarded – undo
309 309
             $this->eof = true;
310 310
             return false;
311 311
         }
312
-        $this->pos+= strlen($result);
312
+        $this->pos += strlen($result);
313 313
 
314 314
         return $result;
315 315
     }
@@ -341,7 +341,7 @@  discard block
 block discarded – undo
341 341
         if ($result === false) {
342 342
             return false;
343 343
         }
344
-        $this->pos+= strlen($data);
344
+        $this->pos += strlen($data);
345 345
         if ($this->pos > $this->size) {
346 346
             $this->size = $this->pos;
347 347
         }
@@ -395,10 +395,10 @@  discard block
 block discarded – undo
395 395
                 }
396 396
                 break;
397 397
             case SEEK_CUR:
398
-                $offset+= $this->pos;
398
+                $offset += $this->pos;
399 399
                 break;
400 400
             case SEEK_END:
401
-                $offset+= $this->size;
401
+                $offset += $this->size;
402 402
         }
403 403
 
404 404
         $this->pos = $offset;
@@ -743,7 +743,7 @@  discard block
 block discarded – undo
743 743
     function __call($name, $arguments)
744 744
     {
745 745
         if (defined('NET_SFTP_STREAM_LOGGING')) {
746
-            echo $name . '(';
746
+            echo $name.'(';
747 747
             $last = count($arguments) - 1;
748 748
             foreach ($arguments as $i => $argument) {
749 749
                 var_export($argument);
@@ -753,7 +753,7 @@  discard block
 block discarded – undo
753 753
             }
754 754
             echo ")\r\n";
755 755
         }
756
-        $name = '_' . $name;
756
+        $name = '_'.$name;
757 757
         if (!method_exists($this, $name)) {
758 758
             return false;
759 759
         }
Please login to merge, or discard this patch.
main/inc/lib/phpseclib/Net/SFTP.php 1 patch
Spacing   +39 added lines, -42 removed lines patch added patch discarded remove patch
@@ -68,7 +68,7 @@  discard block
 block discarded – undo
68 68
 /**
69 69
  * Returns the message numbers
70 70
  */
71
-define('NET_SFTP_LOG_SIMPLE',  NET_SSH2_LOG_SIMPLE);
71
+define('NET_SFTP_LOG_SIMPLE', NET_SSH2_LOG_SIMPLE);
72 72
 /**
73 73
  * Returns the message content
74 74
  */
@@ -102,11 +102,11 @@  discard block
 block discarded – undo
102 102
  * Reads data from a string.
103 103
  */
104 104
 // this value isn't really used anymore but i'm keeping it reserved for historical reasons
105
-define('NET_SFTP_STRING',  2);
105
+define('NET_SFTP_STRING', 2);
106 106
 /**
107 107
  * Resumes an upload
108 108
  */
109
-define('NET_SFTP_RESUME',  4);
109
+define('NET_SFTP_RESUME', 4);
110 110
 /**#@-*/
111 111
 
112 112
 /**
@@ -412,8 +412,8 @@  discard block
 block discarded – undo
412 412
         $response = $this->_get_channel_packet(NET_SFTP_CHANNEL);
413 413
         if ($response === false) {
414 414
             // from PuTTY's psftp.exe
415
-            $command = "test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server\n" .
416
-                       "test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server\n" .
415
+            $command = "test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server\n".
416
+                       "test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server\n".
417 417
                        "exec sftp-server";
418 418
             // we don't do $this->exec($command, false) because exec() operates on a different channel and plus the SSH_MSG_CHANNEL_OPEN that exec() does
419 419
             // is redundant
@@ -535,7 +535,7 @@  discard block
 block discarded – undo
535 535
 
536 536
         if ($this->version > 2) {
537 537
             extract(unpack('Nlength', $this->_string_shift($response, 4)));
538
-            $this->sftp_errors[] = $error . ': ' . $this->_string_shift($response, $length);
538
+            $this->sftp_errors[] = $error.': '.$this->_string_shift($response, $length);
539 539
         } else {
540 540
             $this->sftp_errors[] = $error;
541 541
         }
@@ -579,7 +579,7 @@  discard block
 block discarded – undo
579 579
         }
580 580
 
581 581
         if ($path[0] != '/') {
582
-            $path = $this->pwd . '/' . $path;
582
+            $path = $this->pwd.'/'.$path;
583 583
         }
584 584
 
585 585
         $path = explode('/', $path);
@@ -598,7 +598,7 @@  discard block
 block discarded – undo
598 598
             }
599 599
         }
600 600
 
601
-        return '/' . implode('/', $new);
601
+        return '/'.implode('/', $new);
602 602
     }
603 603
 
604 604
     /**
@@ -615,7 +615,7 @@  discard block
 block discarded – undo
615 615
         }
616 616
 
617 617
         if ($dir[strlen($dir) - 1] != '/') {
618
-            $dir.= '/';
618
+            $dir .= '/';
619 619
         }
620 620
 
621 621
         $dir = $this->_realpath($dir);
@@ -713,7 +713,7 @@  discard block
 block discarded – undo
713 713
             return false;
714 714
         }
715 715
 
716
-        $dir = $this->_realpath($dir . '/');
716
+        $dir = $this->_realpath($dir.'/');
717 717
         if ($dir === false) {
718 718
             return false;
719 719
         }
@@ -774,7 +774,7 @@  discard block
 block discarded – undo
774 774
                         }
775 775
 
776 776
                         if (isset($attributes['type']) && $attributes['type'] == NET_SFTP_TYPE_DIRECTORY && ($shortname != '.' && $shortname != '..')) {
777
-                            $this->_save_dir($dir . '/' . $shortname);
777
+                            $this->_save_dir($dir.'/'.$shortname);
778 778
                         }
779 779
                         // SFTPv6 has an optional boolean end-of-list field, but we'll ignore that, since the
780 780
                         // final SSH_FXP_STATUS packet should tell us that, already.
@@ -933,8 +933,7 @@  discard block
 block discarded – undo
933 933
 
934 934
         $pwd = $this->pwd;
935 935
         $stat['type'] = $this->chdir($filename) ?
936
-            NET_SFTP_TYPE_DIRECTORY :
937
-            NET_SFTP_TYPE_REGULAR;
936
+            NET_SFTP_TYPE_DIRECTORY : NET_SFTP_TYPE_REGULAR;
938 937
         $this->pwd = $pwd;
939 938
 
940 939
         return $stat;
@@ -976,8 +975,7 @@  discard block
 block discarded – undo
976 975
 
977 976
         $pwd = $this->pwd;
978 977
         $lstat['type'] = $this->chdir($filename) ?
979
-            NET_SFTP_TYPE_DIRECTORY :
980
-            NET_SFTP_TYPE_REGULAR;
978
+            NET_SFTP_TYPE_DIRECTORY : NET_SFTP_TYPE_REGULAR;
981 979
         $this->pwd = $pwd;
982 980
 
983 981
         return $lstat;
@@ -1298,7 +1296,7 @@  discard block
 block discarded – undo
1298 1296
                 return false;
1299 1297
             }
1300 1298
 
1301
-            $temp = $path . '/' . $filename;
1299
+            $temp = $path.'/'.$filename;
1302 1300
             if ($props['type'] == NET_SFTP_TYPE_DIRECTORY) {
1303 1301
                 if (!$this->_setstat_recursive($temp, $attr, $i)) {
1304 1302
                     return false;
@@ -1357,7 +1355,7 @@  discard block
 block discarded – undo
1357 1355
             $dirs = explode('/', preg_replace('#/(?=/)|/$#', '', $dir));
1358 1356
             if (empty($dirs[0])) {
1359 1357
                 array_shift($dirs);
1360
-                $dirs[0] = '/' . $dirs[0];
1358
+                $dirs[0] = '/'.$dirs[0];
1361 1359
             }
1362 1360
             for ($i = 0; $i < count($dirs); $i++) {
1363 1361
                 $temp = array_slice($dirs, 0, $i + 1);
@@ -1492,7 +1490,7 @@  discard block
 block discarded – undo
1492 1490
                 $offset = $size !== false ? $size : 0;
1493 1491
             }
1494 1492
         } else {
1495
-            $flags|= NET_SFTP_OPEN_TRUNCATE;
1493
+            $flags |= NET_SFTP_OPEN_TRUNCATE;
1496 1494
         }
1497 1495
         // --------------
1498 1496
 
@@ -1544,7 +1542,7 @@  discard block
 block discarded – undo
1544 1542
                 fclose($fp);
1545 1543
                 return false;
1546 1544
             }
1547
-            $sent+= strlen($temp);
1545
+            $sent += strlen($temp);
1548 1546
 
1549 1547
             $i++;
1550 1548
 
@@ -1681,9 +1679,9 @@  discard block
 block discarded – undo
1681 1679
             switch ($this->packet_type) {
1682 1680
                 case NET_SFTP_DATA:
1683 1681
                     $temp = substr($response, 4);
1684
-                    $offset+= strlen($temp);
1682
+                    $offset += strlen($temp);
1685 1683
                     if ($local_file === false) {
1686
-                        $content.= $temp;
1684
+                        $content .= $temp;
1687 1685
                     } else {
1688 1686
                         fputs($fp, $temp);
1689 1687
                     }
@@ -1820,7 +1818,7 @@  discard block
 block discarded – undo
1820 1818
                 return false;
1821 1819
             }
1822 1820
 
1823
-            $temp = $path . '/' . $filename;
1821
+            $temp = $path.'/'.$filename;
1824 1822
             if ($props['type'] == NET_SFTP_TYPE_DIRECTORY) {
1825 1823
                 if (!$this->_delete_recursive($temp, $i)) {
1826 1824
                     return false;
@@ -1924,23 +1922,23 @@  discard block
 block discarded – undo
1924 1922
                     // 4GB as being 4GB.
1925 1923
                     extract(unpack('Nupper/Nsize', $this->_string_shift($response, 8)));
1926 1924
                     $attr['size'] = $upper ? 0x100000000 * $upper : 0;
1927
-                    $attr['size']+= $size < 0 ? ($size & 0x7FFFFFFF) + 0x80000000 : $size;
1925
+                    $attr['size'] += $size < 0 ? ($size & 0x7FFFFFFF) + 0x80000000 : $size;
1928 1926
                     break;
1929 1927
                 case NET_SFTP_ATTR_UIDGID: // 0x00000002 (SFTPv3 only)
1930
-                    $attr+= unpack('Nuid/Ngid', $this->_string_shift($response, 8));
1928
+                    $attr += unpack('Nuid/Ngid', $this->_string_shift($response, 8));
1931 1929
                     break;
1932 1930
                 case NET_SFTP_ATTR_PERMISSIONS: // 0x00000004
1933
-                    $attr+= unpack('Npermissions', $this->_string_shift($response, 4));
1931
+                    $attr += unpack('Npermissions', $this->_string_shift($response, 4));
1934 1932
                     // mode == permissions; permissions was the original array key and is retained for bc purposes.
1935 1933
                     // mode was added because that's the more industry standard terminology
1936
-                    $attr+= array('mode' => $attr['permissions']);
1934
+                    $attr += array('mode' => $attr['permissions']);
1937 1935
                     $fileType = $this->_parseMode($attr['permissions']);
1938 1936
                     if ($fileType !== false) {
1939
-                        $attr+= array('type' => $fileType);
1937
+                        $attr += array('type' => $fileType);
1940 1938
                     }
1941 1939
                     break;
1942 1940
                 case NET_SFTP_ATTR_ACCESSTIME: // 0x00000008
1943
-                    $attr+= unpack('Natime/Nmtime', $this->_string_shift($response, 8));
1941
+                    $attr += unpack('Natime/Nmtime', $this->_string_shift($response, 8));
1944 1942
                     break;
1945 1943
                 case NET_SFTP_ATTR_EXTENDED: // 0x80000000
1946 1944
                     extract(unpack('Ncount', $this->_string_shift($response, 4)));
@@ -2046,18 +2044,17 @@  discard block
 block discarded – undo
2046 2044
     function _send_sftp_packet($type, $data)
2047 2045
     {
2048 2046
         $packet = $this->request_id !== false ?
2049
-            pack('NCNa*', strlen($data) + 5, $type, $this->request_id, $data) :
2050
-            pack('NCa*',  strlen($data) + 1, $type, $data);
2047
+            pack('NCNa*', strlen($data) + 5, $type, $this->request_id, $data) : pack('NCa*', strlen($data) + 1, $type, $data);
2051 2048
 
2052 2049
         $start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
2053 2050
         $result = $this->_send_channel_packet(NET_SFTP_CHANNEL, $packet);
2054 2051
         $stop = strtok(microtime(), ' ') + strtok('');
2055 2052
 
2056 2053
         if (defined('NET_SFTP_LOGGING')) {
2057
-            $packet_type = '-> ' . $this->packet_types[$type] . 
2058
-                           ' (' . round($stop - $start, 4) . 's)';
2054
+            $packet_type = '-> '.$this->packet_types[$type]. 
2055
+                           ' ('.round($stop - $start, 4).'s)';
2059 2056
             if (NET_SFTP_LOGGING == NET_SFTP_LOG_REALTIME) {
2060
-                echo "<pre>\r\n" . $this->_format_log(array($data), array($packet_type)) . "\r\n</pre>\r\n";
2057
+                echo "<pre>\r\n".$this->_format_log(array($data), array($packet_type))."\r\n</pre>\r\n";
2061 2058
                 flush();
2062 2059
                 ob_flush();
2063 2060
             } else {
@@ -2098,11 +2095,11 @@  discard block
 block discarded – undo
2098 2095
                 $this->packet_buffer = '';
2099 2096
                 return false;
2100 2097
             }
2101
-            $this->packet_buffer.= $temp;
2098
+            $this->packet_buffer .= $temp;
2102 2099
         }
2103 2100
         extract(unpack('Nlength', $this->_string_shift($this->packet_buffer, 4)));
2104 2101
         $tempLength = $length;
2105
-        $tempLength-= strlen($this->packet_buffer);
2102
+        $tempLength -= strlen($this->packet_buffer);
2106 2103
 
2107 2104
         // SFTP packet type and data payload
2108 2105
         while ($tempLength > 0) {
@@ -2112,8 +2109,8 @@  discard block
 block discarded – undo
2112 2109
                 $this->packet_buffer = '';
2113 2110
                 return false;
2114 2111
             }
2115
-            $this->packet_buffer.= $temp;
2116
-            $tempLength-= strlen($temp);
2112
+            $this->packet_buffer .= $temp;
2113
+            $tempLength -= strlen($temp);
2117 2114
         }
2118 2115
 
2119 2116
         $stop = strtok(microtime(), ' ') + strtok('');
@@ -2122,18 +2119,18 @@  discard block
 block discarded – undo
2122 2119
 
2123 2120
         if ($this->request_id !== false) {
2124 2121
             $this->_string_shift($this->packet_buffer, 4); // remove the request id
2125
-            $length-= 5; // account for the request id and the packet type
2122
+            $length -= 5; // account for the request id and the packet type
2126 2123
         } else {
2127
-            $length-= 1; // account for the packet type
2124
+            $length -= 1; // account for the packet type
2128 2125
         }
2129 2126
 
2130 2127
         $packet = $this->_string_shift($this->packet_buffer, $length);
2131 2128
 
2132 2129
         if (defined('NET_SFTP_LOGGING')) {
2133
-            $packet_type = '<- ' . $this->packet_types[$this->packet_type] . 
2134
-                           ' (' . round($stop - $start, 4) . 's)';
2130
+            $packet_type = '<- '.$this->packet_types[$this->packet_type]. 
2131
+                           ' ('.round($stop - $start, 4).'s)';
2135 2132
             if (NET_SFTP_LOGGING == NET_SFTP_LOG_REALTIME) {
2136
-                echo "<pre>\r\n" . $this->_format_log(array($packet), array($packet_type)) . "\r\n</pre>\r\n";
2133
+                echo "<pre>\r\n".$this->_format_log(array($packet), array($packet_type))."\r\n</pre>\r\n";
2137 2134
                 flush();
2138 2135
                 ob_flush();
2139 2136
             } else {
Please login to merge, or discard this patch.
main/inc/lib/phpseclib/Net/SSH1.php 1 patch
Spacing   +41 added lines, -41 removed lines patch added patch discarded remove patch
@@ -76,23 +76,23 @@  discard block
 block discarded – undo
76 76
  *
77 77
  * Not supported.
78 78
  */
79
-define('NET_SSH1_CIPHER_NONE',       0);
79
+define('NET_SSH1_CIPHER_NONE', 0);
80 80
 /**
81 81
  * IDEA in CFB mode
82 82
  *
83 83
  * Not supported.
84 84
  */
85
-define('NET_SSH1_CIPHER_IDEA',       1);
85
+define('NET_SSH1_CIPHER_IDEA', 1);
86 86
 /**
87 87
  * DES in CBC mode
88 88
  */
89
-define('NET_SSH1_CIPHER_DES',        2);
89
+define('NET_SSH1_CIPHER_DES', 2);
90 90
 /**
91 91
  * Triple-DES in CBC mode
92 92
  *
93 93
  * All implementations are required to support this
94 94
  */
95
-define('NET_SSH1_CIPHER_3DES',       3);
95
+define('NET_SSH1_CIPHER_3DES', 3);
96 96
 /**
97 97
  * TRI's Simple Stream encryption CBC
98 98
  *
@@ -115,14 +115,14 @@  discard block
 block discarded – undo
115 115
  *     This library currently only supports encryption when the same key is being used for both directions.  This is
116 116
  *     because there's only one $crypto object.  Two could be added ($encrypt and $decrypt, perhaps).
117 117
  */
118
-define('NET_SSH1_CIPHER_RC4',        5);
118
+define('NET_SSH1_CIPHER_RC4', 5);
119 119
 /**
120 120
  * Blowfish
121 121
  *
122 122
  * Not supported nor is it defined in the official SSH1 specs.  OpenSSH, however, defines it (see cipher.h) and
123 123
  * uses it (see cipher.c)
124 124
  */
125
-define('NET_SSH1_CIPHER_BLOWFISH',   6);
125
+define('NET_SSH1_CIPHER_BLOWFISH', 6);
126 126
 /**#@-*/
127 127
 
128 128
 /**#@+
@@ -134,17 +134,17 @@  discard block
 block discarded – undo
134 134
 /**
135 135
  * .rhosts or /etc/hosts.equiv
136 136
  */
137
-define('NET_SSH1_AUTH_RHOSTS',     1);
137
+define('NET_SSH1_AUTH_RHOSTS', 1);
138 138
 /**
139 139
  * pure RSA authentication
140 140
  */
141
-define('NET_SSH1_AUTH_RSA',        2);
141
+define('NET_SSH1_AUTH_RSA', 2);
142 142
 /**
143 143
  * password authentication
144 144
  *
145 145
  * This is the only method that is supported by this library.
146 146
  */
147
-define('NET_SSH1_AUTH_PASSWORD',   3);
147
+define('NET_SSH1_AUTH_PASSWORD', 3);
148 148
 /**
149 149
  * .rhosts with RSA host authentication
150 150
  */
@@ -157,7 +157,7 @@  discard block
 block discarded – undo
157 157
  * @link http://3sp.com/content/developer/maverick-net/docs/Maverick.SSH.PseudoTerminalModesMembers.html
158 158
  * @access private
159 159
  */
160
-define('NET_SSH1_TTY_OP_END',  0);
160
+define('NET_SSH1_TTY_OP_END', 0);
161 161
 /**#@-*/
162 162
 
163 163
 /**
@@ -183,8 +183,8 @@  discard block
 block discarded – undo
183 183
  * @access private
184 184
  */
185 185
 define('NET_SSH1_MASK_CONSTRUCTOR', 0x00000001);
186
-define('NET_SSH1_MASK_LOGIN',       0x00000002);
187
-define('NET_SSH1_MASK_SHELL',       0x00000004);
186
+define('NET_SSH1_MASK_LOGIN', 0x00000002);
187
+define('NET_SSH1_MASK_SHELL', 0x00000004);
188 188
 /**#@-*/
189 189
 
190 190
 /**#@+
@@ -194,7 +194,7 @@  discard block
 block discarded – undo
194 194
 /**
195 195
  * Returns the message numbers
196 196
  */
197
-define('NET_SSH1_LOG_SIMPLE',  1);
197
+define('NET_SSH1_LOG_SIMPLE', 1);
198 198
 /**
199 199
  * Returns the message content
200 200
  */
@@ -216,7 +216,7 @@  discard block
 block discarded – undo
216 216
 /**
217 217
  * Returns when a string matching $expect exactly is found
218 218
  */
219
-define('NET_SSH1_READ_SIMPLE',  1);
219
+define('NET_SSH1_READ_SIMPLE', 1);
220 220
 /**
221 221
  * Returns when a string matching the regular expression $expect is found
222 222
  */
@@ -492,7 +492,7 @@  discard block
 block discarded – undo
492 492
 
493 493
         if (defined('NET_SSH1_LOGGING')) {
494 494
             $this->_append_log('<-', $this->server_identification);
495
-            $this->_append_log('->', $this->identifier . "\r\n");
495
+            $this->_append_log('->', $this->identifier."\r\n");
496 496
         }
497 497
 
498 498
         if (!preg_match('#SSH-([0-9\.]+)-(.+)#', $init_line, $parts)) {
@@ -552,7 +552,7 @@  discard block
 block discarded – undo
552 552
             }
553 553
         }
554 554
 
555
-        $session_id = pack('H*', md5($host_key_public_modulus->toBytes() . $server_key_public_modulus->toBytes() . $anti_spoofing_cookie));
555
+        $session_id = pack('H*', md5($host_key_public_modulus->toBytes().$server_key_public_modulus->toBytes().$anti_spoofing_cookie));
556 556
 
557 557
         $session_key = crypt_random_string(32);
558 558
         $double_encrypted_session_key = $session_key ^ str_pad($session_id, 32, chr(0));
@@ -608,7 +608,7 @@  discard block
 block discarded – undo
608 608
                 $this->crypto = new Crypt_DES();
609 609
                 $this->crypto->disablePadding();
610 610
                 $this->crypto->enableContinuousBuffer();
611
-                $this->crypto->setKey(substr($session_key, 0,  8));
611
+                $this->crypto->setKey(substr($session_key, 0, 8));
612 612
                 break;
613 613
             case NET_SSH1_CIPHER_3DES:
614 614
                 if (!class_exists('Crypt_TripleDES')) {
@@ -758,7 +758,7 @@  discard block
 block discarded – undo
758 758
 
759 759
         if ($response !== false) {
760 760
             do {
761
-                $output.= substr($response[NET_SSH1_RESPONSE_DATA], 4);
761
+                $output .= substr($response[NET_SSH1_RESPONSE_DATA], 4);
762 762
                 $response = $this->_get_binary_packet();
763 763
             } while (is_array($response) && $response[NET_SSH1_RESPONSE_TYPE] != NET_SSH1_SMSG_EXITSTATUS);
764 764
         }
@@ -872,7 +872,7 @@  discard block
 block discarded – undo
872 872
             if ($response === true) {
873 873
                 return $this->_string_shift($this->interactiveBuffer, strlen($this->interactiveBuffer));
874 874
             }
875
-            $this->interactiveBuffer.= substr($response[NET_SSH1_RESPONSE_DATA], 4);
875
+            $this->interactiveBuffer .= substr($response[NET_SSH1_RESPONSE_DATA], 4);
876 876
         }
877 877
     }
878 878
 
@@ -1028,7 +1028,7 @@  discard block
 block discarded – undo
1028 1028
                 return true;
1029 1029
             }
1030 1030
             $elapsed = strtok(microtime(), ' ') + strtok('') - $start;
1031
-            $this->curTimeout-= $elapsed;
1031
+            $this->curTimeout -= $elapsed;
1032 1032
         }
1033 1033
 
1034 1034
         $start = strtok(microtime(), ' ') + strtok(''); // http://php.net/microtime#61838
@@ -1039,8 +1039,8 @@  discard block
 block discarded – undo
1039 1039
 
1040 1040
         while ($length > 0) {
1041 1041
             $temp = fread($this->fsock, $length);
1042
-            $raw.= $temp;
1043
-            $length-= strlen($temp);
1042
+            $raw .= $temp;
1043
+            $length -= strlen($temp);
1044 1044
         }
1045 1045
         $stop = strtok(microtime(), ' ') + strtok('');
1046 1046
 
@@ -1063,8 +1063,8 @@  discard block
 block discarded – undo
1063 1063
 
1064 1064
         if (defined('NET_SSH1_LOGGING')) {
1065 1065
             $temp = isset($this->protocol_flags[$type]) ? $this->protocol_flags[$type] : 'UNKNOWN';
1066
-            $temp = '<- ' . $temp .
1067
-                    ' (' . round($stop - $start, 4) . 's)';
1066
+            $temp = '<- '.$temp.
1067
+                    ' ('.round($stop - $start, 4).'s)';
1068 1068
             $this->_append_log($temp, $data);
1069 1069
         }
1070 1070
 
@@ -1096,8 +1096,8 @@  discard block
 block discarded – undo
1096 1096
         $padding = crypt_random_string(8 - ($length & 7));
1097 1097
 
1098 1098
         $orig = $data;
1099
-        $data = $padding . $data;
1100
-        $data.= pack('N', $this->_crc($data));
1099
+        $data = $padding.$data;
1100
+        $data .= pack('N', $this->_crc($data));
1101 1101
 
1102 1102
         if ($this->crypto !== false) {
1103 1103
             $data = $this->crypto->encrypt($data);
@@ -1111,8 +1111,8 @@  discard block
 block discarded – undo
1111 1111
 
1112 1112
         if (defined('NET_SSH1_LOGGING')) {
1113 1113
             $temp = isset($this->protocol_flags[ord($orig[0])]) ? $this->protocol_flags[ord($orig[0])] : 'UNKNOWN';
1114
-            $temp = '-> ' . $temp .
1115
-                    ' (' . round($stop - $start, 4) . 's)';
1114
+            $temp = '-> '.$temp.
1115
+                    ' ('.round($stop - $start, 4).'s)';
1116 1116
             $this->_append_log($temp, $orig);
1117 1117
         }
1118 1118
 
@@ -1206,7 +1206,7 @@  discard block
 block discarded – undo
1206 1206
         $crc = 0x00000000;
1207 1207
         $length = strlen($data);
1208 1208
 
1209
-        for ($i=0;$i<$length;$i++) {
1209
+        for ($i = 0; $i < $length; $i++) {
1210 1210
             // We AND $crc >> 8 with 0x00FFFFFF because we want the eight newly added bits to all
1211 1211
             // be zero.  PHP, unfortunately, doesn't always do this.  0x80000000 >> 8, as an example,
1212 1212
             // yields 0xFF800000 - not 0x00800000.  The following link elaborates:
@@ -1281,9 +1281,9 @@  discard block
 block discarded – undo
1281 1281
         while (strlen($random) != $length) {
1282 1282
             $block = crypt_random_string($length - strlen($random));
1283 1283
             $block = str_replace("\x00", '', $block);
1284
-            $random.= $block;
1284
+            $random .= $block;
1285 1285
         }
1286
-        $temp = chr(0) . chr(2) . $random . chr(0) . $m;
1286
+        $temp = chr(0).chr(2).$random.chr(0).$m;
1287 1287
 
1288 1288
         $m = new Math_BigInteger($temp, 256);
1289 1289
         $m = $m->modPow($key[0], $key[1]);
@@ -1355,18 +1355,18 @@  discard block
 block discarded – undo
1355 1355
 
1356 1356
         $output = '';
1357 1357
         for ($i = 0; $i < count($message_log); $i++) {
1358
-            $output.= $message_number_log[$i] . "\r\n";
1358
+            $output .= $message_number_log[$i]."\r\n";
1359 1359
             $current_log = $message_log[$i];
1360 1360
             $j = 0;
1361 1361
             do {
1362 1362
                 if (strlen($current_log)) {
1363
-                    $output.= str_pad(dechex($j), 7, '0', STR_PAD_LEFT) . '0  ';
1363
+                    $output .= str_pad(dechex($j), 7, '0', STR_PAD_LEFT).'0  ';
1364 1364
                 }
1365 1365
                 $fragment = $this->_string_shift($current_log, $short_width);
1366 1366
                 $hex = substr(
1367 1367
                            preg_replace(
1368 1368
                                '#(.)#es',
1369
-                               '"' . $boundary . '" . str_pad(dechex(ord(substr("\\1", -1))), 2, "0", STR_PAD_LEFT)',
1369
+                               '"'.$boundary.'" . str_pad(dechex(ord(substr("\\1", -1))), 2, "0", STR_PAD_LEFT)',
1370 1370
                                $fragment),
1371 1371
                            strlen($boundary)
1372 1372
                        );
@@ -1374,10 +1374,10 @@  discard block
 block discarded – undo
1374 1374
                 // http://en.wikipedia.org/wiki/ASCII#ASCII_printable_characters
1375 1375
                 // also replace < with a . since < messes up the output on web browsers
1376 1376
                 $raw = preg_replace('#[^\x20-\x7E]|<#', '.', $fragment);
1377
-                $output.= str_pad($hex, $long_width - $short_width, ' ') . $raw . "\r\n";
1377
+                $output .= str_pad($hex, $long_width - $short_width, ' ').$raw."\r\n";
1378 1378
                 $j++;
1379 1379
             } while (strlen($current_log));
1380
-            $output.= "\r\n";
1380
+            $output .= "\r\n";
1381 1381
         }
1382 1382
 
1383 1383
         return $output;
@@ -1505,10 +1505,10 @@  discard block
 block discarded – undo
1505 1505
                 case NET_SSH1_LOG_COMPLEX:
1506 1506
                     $this->protocol_flags_log[] = $protocol_flags;
1507 1507
                     $this->_string_shift($message);
1508
-                    $this->log_size+= strlen($message);
1508
+                    $this->log_size += strlen($message);
1509 1509
                     $this->message_log[] = $message;
1510 1510
                     while ($this->log_size > NET_SSH2_LOG_MAX_SIZE) {
1511
-                        $this->log_size-= strlen(array_shift($this->message_log));
1511
+                        $this->log_size -= strlen(array_shift($this->message_log));
1512 1512
                         array_shift($this->protocol_flags_log);
1513 1513
                     }
1514 1514
                     break;
@@ -1516,7 +1516,7 @@  discard block
 block discarded – undo
1516 1516
                 // passwords won't be filtered out and select other packets may not be correctly
1517 1517
                 // identified
1518 1518
                 case NET_SSH1_LOG_REALTIME:
1519
-                    echo "<pre>\r\n" . $this->_format_log(array($message), array($protocol_flags)) . "\r\n</pre>\r\n";
1519
+                    echo "<pre>\r\n".$this->_format_log(array($message), array($protocol_flags))."\r\n</pre>\r\n";
1520 1520
                     @flush();
1521 1521
                     @ob_flush();
1522 1522
                     break;
@@ -1537,10 +1537,10 @@  discard block
 block discarded – undo
1537 1537
                     $entry = $this->_format_log(array($message), array($protocol_flags));
1538 1538
                     if ($this->realtime_log_wrap) {
1539 1539
                         $temp = "<<< START >>>\r\n";
1540
-                        $entry.= $temp;
1540
+                        $entry .= $temp;
1541 1541
                         fseek($this->realtime_log_file, ftell($this->realtime_log_file) - strlen($temp));
1542 1542
                     }
1543
-                    $this->realtime_log_size+= strlen($entry);
1543
+                    $this->realtime_log_size += strlen($entry);
1544 1544
                     if ($this->realtime_log_size > NET_SSH1_LOG_MAX_SIZE) {
1545 1545
                         fseek($this->realtime_log_file, 0);
1546 1546
                         $this->realtime_log_size = strlen($entry);
Please login to merge, or discard this patch.
main/inc/lib/phpseclib/Net/SCP.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -61,7 +61,7 @@  discard block
 block discarded – undo
61 61
 /**
62 62
  * Reads data from a string.
63 63
  */
64
-define('NET_SCP_STRING',  2);
64
+define('NET_SCP_STRING', 2);
65 65
 /**#@-*/
66 66
 
67 67
 /**#@+
@@ -76,7 +76,7 @@  discard block
 block discarded – undo
76 76
 /**
77 77
  * SSH2 is being used.
78 78
  */
79
-define('NET_SCP_SSH2',  2);
79
+define('NET_SCP_SSH2', 2);
80 80
 /**#@-*/
81 81
 
82 82
 /**
@@ -170,7 +170,7 @@  discard block
 block discarded – undo
170 170
             return false;
171 171
         }
172 172
 
173
-        $this->ssh->exec('scp -t ' . $remote_file, false); // -t = to
173
+        $this->ssh->exec('scp -t '.$remote_file, false); // -t = to
174 174
 
175 175
         $temp = $this->_receive();
176 176
         if ($temp !== chr(0)) {
@@ -182,7 +182,7 @@  discard block
 block discarded – undo
182 182
         }
183 183
 
184 184
         $remote_file = basename($remote_file);
185
-        $this->_send('C0644 ' . strlen($data) . ' ' . $remote_file . "\n");
185
+        $this->_send('C0644 '.strlen($data).' '.$remote_file."\n");
186 186
 
187 187
         $temp = $this->_receive();
188 188
         if ($temp !== chr(0)) {
@@ -227,7 +227,7 @@  discard block
 block discarded – undo
227 227
             return false;
228 228
         }
229 229
 
230
-        $this->ssh->exec('scp -f ' . $remote_file, false); // -f = from
230
+        $this->ssh->exec('scp -f '.$remote_file, false); // -f = from
231 231
 
232 232
         $this->_send("\0");
233 233
 
@@ -250,10 +250,10 @@  discard block
 block discarded – undo
250 250
         while ($size < $info['size']) {
251 251
             $data = $this->_receive();
252 252
             // SCP usually seems to split stuff out into 16k chunks
253
-            $size+= strlen($data);
253
+            $size += strlen($data);
254 254
 
255 255
             if ($local_file === false) {
256
-                $content.= $data;
256
+                $content .= $data;
257 257
             } else {
258 258
                 fputs($fp, $data);
259 259
             }
Please login to merge, or discard this patch.
main/inc/lib/lp_item.lib.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -34,9 +34,9 @@
 block discarded – undo
34 34
     public $search_did = 0;
35 35
     public $audio = "";
36 36
 
37
-    public function __construct($in_c_id=0, $in_id=0)
37
+    public function __construct($in_c_id = 0, $in_id = 0)
38 38
     {
39
-        if ($in_c_id > 0 && $in_id >0) {
39
+        if ($in_c_id > 0 && $in_id > 0) {
40 40
             $item_view_table = Database::get_course_table(TABLE_LP_ITEM);
41 41
             $sql = "SELECT * FROM $item_view_table
42 42
                     WHERE
Please login to merge, or discard this patch.
main/inc/lib/course_request.lib.php 1 patch
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -65,8 +65,8 @@  discard block
 block discarded – undo
65 65
         $exemplary_content
66 66
     ) {
67 67
         $wanted_code = trim($wanted_code);
68
-        $user_id = (int)$user_id;
69
-        $exemplary_content = (bool)$exemplary_content ? 1 : 0;
68
+        $user_id = (int) $user_id;
69
+        $exemplary_content = (bool) $exemplary_content ? 1 : 0;
70 70
 
71 71
         if ($wanted_code == '') {
72 72
             return false;
@@ -254,10 +254,10 @@  discard block
 block discarded – undo
254 254
         $user_id,
255 255
         $exemplary_content
256 256
     ) {
257
-        $id = (int)$id;
257
+        $id = (int) $id;
258 258
         $wanted_code = trim($wanted_code);
259
-        $user_id = (int)$user_id;
260
-        $exemplary_content = (bool)$exemplary_content ? 1 : 0;
259
+        $user_id = (int) $user_id;
260
+        $exemplary_content = (bool) $exemplary_content ? 1 : 0;
261 261
 
262 262
         if ($wanted_code == '') {
263 263
             return false;
@@ -360,7 +360,7 @@  discard block
 block discarded – undo
360 360
      */
361 361
     public static function delete_course_request($id)
362 362
     {
363
-        $id = (int)$id;
363
+        $id = (int) $id;
364 364
         $sql = "DELETE FROM ".Database :: get_main_table(TABLE_MAIN_COURSE_REQUEST)."
365 365
                 WHERE id = ".$id;
366 366
         $result = Database::query($sql);
@@ -377,7 +377,7 @@  discard block
 block discarded – undo
377 377
         if (is_null($status)) {
378 378
             $sql = "SELECT COUNT(id) AS number FROM ".$course_table;
379 379
         } else {
380
-            $status = (int)$status;
380
+            $status = (int) $status;
381 381
             $sql = "SELECT COUNT(id) AS number FROM ".$course_table."
382 382
                     WHERE status = ".$status;
383 383
         }
@@ -395,7 +395,7 @@  discard block
 block discarded – undo
395 395
      */
396 396
     public static function get_course_request_info($id)
397 397
     {
398
-        $id = (int)$id;
398
+        $id = (int) $id;
399 399
         $sql = "SELECT *
400 400
                 FROM ".Database :: get_main_table(TABLE_MAIN_COURSE_REQUEST)."
401 401
                 WHERE id = ".$id;
@@ -413,7 +413,7 @@  discard block
 block discarded – undo
413 413
      */
414 414
     public static function get_course_request_code($id)
415 415
     {
416
-        $id = (int)$id;
416
+        $id = (int) $id;
417 417
         $sql = "SELECT code
418 418
                 FROM ".Database :: get_main_table(TABLE_MAIN_COURSE_REQUEST)."
419 419
                 WHERE id = ".$id;
@@ -434,7 +434,7 @@  discard block
 block discarded – undo
434 434
      */
435 435
     public static function accept_course_request($id)
436 436
     {
437
-        $id = (int)$id;
437
+        $id = (int) $id;
438 438
 
439 439
         // Retrieve request's data
440 440
         $course_request_info = self::get_course_request_info($id);
@@ -447,7 +447,7 @@  discard block
 block discarded – undo
447 447
             return false;
448 448
         }*/
449 449
 
450
-        $user_id = (int)$course_request_info['user_id'];
450
+        $user_id = (int) $course_request_info['user_id'];
451 451
         if ($user_id <= 0) {
452 452
             return false;
453 453
         }
@@ -531,7 +531,7 @@  discard block
 block discarded – undo
531 531
      */
532 532
     public static function reject_course_request($id)
533 533
     {
534
-        $id = (int)$id;
534
+        $id = (int) $id;
535 535
         // Retrieve request's data
536 536
         $course_request_info = self::get_course_request_info($id);
537 537
         if (!is_array($course_request_info)) {
@@ -609,7 +609,7 @@  discard block
 block discarded – undo
609 609
      */
610 610
     public static function ask_for_additional_info($id)
611 611
     {
612
-        $id = (int)$id;
612
+        $id = (int) $id;
613 613
 
614 614
         // Retrieve request's data
615 615
         $course_request_info = self::get_course_request_info($id);
@@ -700,7 +700,7 @@  discard block
 block discarded – undo
700 700
      */
701 701
     public static function additional_info_asked($id)
702 702
     {
703
-        $id = (int)$id;
703
+        $id = (int) $id;
704 704
         $sql = "SELECT id FROM ".Database :: get_main_table(TABLE_MAIN_COURSE_REQUEST)."
705 705
                 WHERE (id = ".$id." AND info > 0)";
706 706
         $result = Database::num_rows(Database::query($sql));
Please login to merge, or discard this patch.
main/inc/lib/system/web/request.class.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -15,7 +15,7 @@
 block discarded – undo
15 15
         return isset($_REQUEST[$key]) ? $_REQUEST[$key] : $default;
16 16
     }
17 17
 
18
-    public static function has($key){
18
+    public static function has($key) {
19 19
         return isset($_REQUEST[$key]);
20 20
     }
21 21
 
Please login to merge, or discard this patch.
main/inc/lib/access_url_edit_sessions_to_url_functions.lib.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -44,17 +44,17 @@
 block discarded – undo
44 44
                     ORDER BY name, id
45 45
                     LIMIT 11';
46 46
             $rs = Database::query($sql);
47
-            $i=0;
47
+            $i = 0;
48 48
             while ($session = Database :: fetch_array($rs)) {
49 49
                 $i++;
50
-                if ($i<=10) {
50
+                if ($i <= 10) {
51 51
                      $return .= '<a href="#" onclick="add_user_to_url(\''.addslashes($session['id']).'\',\''.addslashes($session['name']).' ('.addslashes($session['id']).')'.'\')">'.$session['name'].' </a><br />';
52 52
                 } else {
53 53
                     $return .= '...<br />';
54 54
                 }
55 55
             }
56 56
         }
57
-        $xajax_response -> addAssign('ajax_list_courses','innerHTML',api_utf8_encode($return));
57
+        $xajax_response -> addAssign('ajax_list_courses', 'innerHTML', api_utf8_encode($return));
58 58
         return $xajax_response;
59 59
     }
60 60
 }
Please login to merge, or discard this patch.