Completed
Push — develop ( aa8b62...1c5ea5 )
by Zack
34:47 queued 14:46
created
vendor/paragonie/sodium_compat/autoload-php7.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -2,28 +2,28 @@
 block discarded – undo
2 2
 /*
3 3
  This file should only ever be loaded on PHP 7+
4 4
  */
5
-if (PHP_VERSION_ID < 70000) {
5
+if ( PHP_VERSION_ID < 70000 ) {
6 6
     return;
7 7
 }
8 8
 
9
-spl_autoload_register(function ($class) {
9
+spl_autoload_register( function( $class ) {
10 10
     $namespace = 'ParagonIE_Sodium_';
11 11
     // Does the class use the namespace prefix?
12
-    $len = strlen($namespace);
13
-    if (strncmp($namespace, $class, $len) !== 0) {
12
+    $len = strlen( $namespace );
13
+    if ( strncmp( $namespace, $class, $len ) !== 0 ) {
14 14
         // no, move to the next registered autoloader
15 15
         return false;
16 16
     }
17 17
 
18 18
     // Get the relative class name
19
-    $relative_class = substr($class, $len);
19
+    $relative_class = substr( $class, $len );
20 20
 
21 21
     // Replace the namespace prefix with the base directory, replace namespace
22 22
     // separators with directory separators in the relative class name, append
23 23
     // with .php
24
-    $file = dirname(__FILE__) . '/src/' . str_replace('_', '/', $relative_class) . '.php';
24
+    $file = dirname( __FILE__ ) . '/src/' . str_replace( '_', '/', $relative_class ) . '.php';
25 25
     // if the file exists, require it
26
-    if (file_exists($file)) {
26
+    if ( file_exists( $file ) ) {
27 27
         require_once $file;
28 28
         return true;
29 29
     }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Crypto.php 1 patch
Spacing   +290 added lines, -290 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Crypto', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Crypto', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -75,13 +75,13 @@  discard block
 block discarded – undo
75 75
         $key = ''
76 76
     ) {
77 77
         /** @var int $len - Length of message (ciphertext + MAC) */
78
-        $len = ParagonIE_Sodium_Core_Util::strlen($message);
78
+        $len = ParagonIE_Sodium_Core_Util::strlen( $message );
79 79
 
80 80
         /** @var int  $clen - Length of ciphertext */
81 81
         $clen = $len - self::aead_chacha20poly1305_ABYTES;
82 82
 
83 83
         /** @var int $adlen - Length of associated data */
84
-        $adlen = ParagonIE_Sodium_Core_Util::strlen($ad);
84
+        $adlen = ParagonIE_Sodium_Core_Util::strlen( $ad );
85 85
 
86 86
         /** @var string $mac - Message authentication code */
87 87
         $mac = ParagonIE_Sodium_Core_Util::substr(
@@ -91,7 +91,7 @@  discard block
 block discarded – undo
91 91
         );
92 92
 
93 93
         /** @var string $ciphertext - The encrypted message (sans MAC) */
94
-        $ciphertext = ParagonIE_Sodium_Core_Util::substr($message, 0, $clen);
94
+        $ciphertext = ParagonIE_Sodium_Core_Util::substr( $message, 0, $clen );
95 95
 
96 96
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
97 97
         $block0 = ParagonIE_Sodium_Core_ChaCha20::stream(
@@ -101,21 +101,21 @@  discard block
 block discarded – undo
101 101
         );
102 102
 
103 103
         /* Recalculate the Poly1305 authentication tag (MAC): */
104
-        $state = new ParagonIE_Sodium_Core_Poly1305_State($block0);
104
+        $state = new ParagonIE_Sodium_Core_Poly1305_State( $block0 );
105 105
         try {
106
-            ParagonIE_Sodium_Compat::memzero($block0);
107
-        } catch (SodiumException $ex) {
106
+            ParagonIE_Sodium_Compat::memzero( $block0 );
107
+        } catch ( SodiumException $ex ) {
108 108
             $block0 = null;
109 109
         }
110
-        $state->update($ad);
111
-        $state->update(ParagonIE_Sodium_Core_Util::store64_le($adlen));
112
-        $state->update($ciphertext);
113
-        $state->update(ParagonIE_Sodium_Core_Util::store64_le($clen));
110
+        $state->update( $ad );
111
+        $state->update( ParagonIE_Sodium_Core_Util::store64_le( $adlen ) );
112
+        $state->update( $ciphertext );
113
+        $state->update( ParagonIE_Sodium_Core_Util::store64_le( $clen ) );
114 114
         $computed_mac = $state->finish();
115 115
 
116 116
         /* Compare the given MAC with the recalculated MAC: */
117
-        if (!ParagonIE_Sodium_Core_Util::verify_16($computed_mac, $mac)) {
118
-            throw new SodiumException('Invalid MAC');
117
+        if ( ! ParagonIE_Sodium_Core_Util::verify_16( $computed_mac, $mac ) ) {
118
+            throw new SodiumException( 'Invalid MAC' );
119 119
         }
120 120
 
121 121
         // Here, we know that the MAC is valid, so we decrypt and return the plaintext
@@ -123,7 +123,7 @@  discard block
 block discarded – undo
123 123
             $ciphertext,
124 124
             $nonce,
125 125
             $key,
126
-            ParagonIE_Sodium_Core_Util::store64_le(1)
126
+            ParagonIE_Sodium_Core_Util::store64_le( 1 )
127 127
         );
128 128
     }
129 129
 
@@ -147,10 +147,10 @@  discard block
 block discarded – undo
147 147
         $key = ''
148 148
     ) {
149 149
         /** @var int $len - Length of the plaintext message */
150
-        $len = ParagonIE_Sodium_Core_Util::strlen($message);
150
+        $len = ParagonIE_Sodium_Core_Util::strlen( $message );
151 151
 
152 152
         /** @var int $adlen - Length of the associated data */
153
-        $adlen = ParagonIE_Sodium_Core_Util::strlen($ad);
153
+        $adlen = ParagonIE_Sodium_Core_Util::strlen( $ad );
154 154
 
155 155
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
156 156
         $block0 = ParagonIE_Sodium_Core_ChaCha20::stream(
@@ -158,10 +158,10 @@  discard block
 block discarded – undo
158 158
             $nonce,
159 159
             $key
160 160
         );
161
-        $state = new ParagonIE_Sodium_Core_Poly1305_State($block0);
161
+        $state = new ParagonIE_Sodium_Core_Poly1305_State( $block0 );
162 162
         try {
163
-            ParagonIE_Sodium_Compat::memzero($block0);
164
-        } catch (SodiumException $ex) {
163
+            ParagonIE_Sodium_Compat::memzero( $block0 );
164
+        } catch ( SodiumException $ex ) {
165 165
             $block0 = null;
166 166
         }
167 167
 
@@ -170,13 +170,13 @@  discard block
 block discarded – undo
170 170
             $message,
171 171
             $nonce,
172 172
             $key,
173
-            ParagonIE_Sodium_Core_Util::store64_le(1)
173
+            ParagonIE_Sodium_Core_Util::store64_le( 1 )
174 174
         );
175 175
 
176
-        $state->update($ad);
177
-        $state->update(ParagonIE_Sodium_Core_Util::store64_le($adlen));
178
-        $state->update($ciphertext);
179
-        $state->update(ParagonIE_Sodium_Core_Util::store64_le($len));
176
+        $state->update( $ad );
177
+        $state->update( ParagonIE_Sodium_Core_Util::store64_le( $adlen ) );
178
+        $state->update( $ciphertext );
179
+        $state->update( ParagonIE_Sodium_Core_Util::store64_le( $len ) );
180 180
         return $ciphertext . $state->finish();
181 181
     }
182 182
 
@@ -200,10 +200,10 @@  discard block
 block discarded – undo
200 200
         $key = ''
201 201
     ) {
202 202
         /** @var int $adlen - Length of associated data */
203
-        $adlen = ParagonIE_Sodium_Core_Util::strlen($ad);
203
+        $adlen = ParagonIE_Sodium_Core_Util::strlen( $ad );
204 204
 
205 205
         /** @var int $len - Length of message (ciphertext + MAC) */
206
-        $len = ParagonIE_Sodium_Core_Util::strlen($message);
206
+        $len = ParagonIE_Sodium_Core_Util::strlen( $message );
207 207
 
208 208
         /** @var int  $clen - Length of ciphertext */
209 209
         $clen = $len - self::aead_chacha20poly1305_IETF_ABYTES;
@@ -230,23 +230,23 @@  discard block
 block discarded – undo
230 230
         );
231 231
 
232 232
         /* Recalculate the Poly1305 authentication tag (MAC): */
233
-        $state = new ParagonIE_Sodium_Core_Poly1305_State($block0);
233
+        $state = new ParagonIE_Sodium_Core_Poly1305_State( $block0 );
234 234
         try {
235
-            ParagonIE_Sodium_Compat::memzero($block0);
236
-        } catch (SodiumException $ex) {
235
+            ParagonIE_Sodium_Compat::memzero( $block0 );
236
+        } catch ( SodiumException $ex ) {
237 237
             $block0 = null;
238 238
         }
239
-        $state->update($ad);
240
-        $state->update(str_repeat("\x00", ((0x10 - $adlen) & 0xf)));
241
-        $state->update($ciphertext);
242
-        $state->update(str_repeat("\x00", (0x10 - $clen) & 0xf));
243
-        $state->update(ParagonIE_Sodium_Core_Util::store64_le($adlen));
244
-        $state->update(ParagonIE_Sodium_Core_Util::store64_le($clen));
239
+        $state->update( $ad );
240
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $adlen ) & 0xf ) ) );
241
+        $state->update( $ciphertext );
242
+        $state->update( str_repeat( "\x00", ( 0x10 - $clen ) & 0xf ) );
243
+        $state->update( ParagonIE_Sodium_Core_Util::store64_le( $adlen ) );
244
+        $state->update( ParagonIE_Sodium_Core_Util::store64_le( $clen ) );
245 245
         $computed_mac = $state->finish();
246 246
 
247 247
         /* Compare the given MAC with the recalculated MAC: */
248
-        if (!ParagonIE_Sodium_Core_Util::verify_16($computed_mac, $mac)) {
249
-            throw new SodiumException('Invalid MAC');
248
+        if ( ! ParagonIE_Sodium_Core_Util::verify_16( $computed_mac, $mac ) ) {
249
+            throw new SodiumException( 'Invalid MAC' );
250 250
         }
251 251
 
252 252
         // Here, we know that the MAC is valid, so we decrypt and return the plaintext
@@ -254,7 +254,7 @@  discard block
 block discarded – undo
254 254
             $ciphertext,
255 255
             $nonce,
256 256
             $key,
257
-            ParagonIE_Sodium_Core_Util::store64_le(1)
257
+            ParagonIE_Sodium_Core_Util::store64_le( 1 )
258 258
         );
259 259
     }
260 260
 
@@ -278,10 +278,10 @@  discard block
 block discarded – undo
278 278
         $key = ''
279 279
     ) {
280 280
         /** @var int $len - Length of the plaintext message */
281
-        $len = ParagonIE_Sodium_Core_Util::strlen($message);
281
+        $len = ParagonIE_Sodium_Core_Util::strlen( $message );
282 282
 
283 283
         /** @var int $adlen - Length of the associated data */
284
-        $adlen = ParagonIE_Sodium_Core_Util::strlen($ad);
284
+        $adlen = ParagonIE_Sodium_Core_Util::strlen( $ad );
285 285
 
286 286
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
287 287
         $block0 = ParagonIE_Sodium_Core_ChaCha20::ietfStream(
@@ -289,10 +289,10 @@  discard block
 block discarded – undo
289 289
             $nonce,
290 290
             $key
291 291
         );
292
-        $state = new ParagonIE_Sodium_Core_Poly1305_State($block0);
292
+        $state = new ParagonIE_Sodium_Core_Poly1305_State( $block0 );
293 293
         try {
294
-            ParagonIE_Sodium_Compat::memzero($block0);
295
-        } catch (SodiumException $ex) {
294
+            ParagonIE_Sodium_Compat::memzero( $block0 );
295
+        } catch ( SodiumException $ex ) {
296 296
             $block0 = null;
297 297
         }
298 298
 
@@ -301,15 +301,15 @@  discard block
 block discarded – undo
301 301
             $message,
302 302
             $nonce,
303 303
             $key,
304
-            ParagonIE_Sodium_Core_Util::store64_le(1)
304
+            ParagonIE_Sodium_Core_Util::store64_le( 1 )
305 305
         );
306 306
 
307
-        $state->update($ad);
308
-        $state->update(str_repeat("\x00", ((0x10 - $adlen) & 0xf)));
309
-        $state->update($ciphertext);
310
-        $state->update(str_repeat("\x00", ((0x10 - $len) & 0xf)));
311
-        $state->update(ParagonIE_Sodium_Core_Util::store64_le($adlen));
312
-        $state->update(ParagonIE_Sodium_Core_Util::store64_le($len));
307
+        $state->update( $ad );
308
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $adlen ) & 0xf ) ) );
309
+        $state->update( $ciphertext );
310
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $len ) & 0xf ) ) );
311
+        $state->update( ParagonIE_Sodium_Core_Util::store64_le( $adlen ) );
312
+        $state->update( ParagonIE_Sodium_Core_Util::store64_le( $len ) );
313 313
         return $ciphertext . $state->finish();
314 314
     }
315 315
 
@@ -333,13 +333,13 @@  discard block
 block discarded – undo
333 333
         $key = ''
334 334
     ) {
335 335
         $subkey = ParagonIE_Sodium_Core_HChaCha20::hChaCha20(
336
-            ParagonIE_Sodium_Core_Util::substr($nonce, 0, 16),
336
+            ParagonIE_Sodium_Core_Util::substr( $nonce, 0, 16 ),
337 337
             $key
338 338
         );
339 339
         $nonceLast = "\x00\x00\x00\x00" .
340
-            ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8);
340
+            ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 );
341 341
 
342
-        return self::aead_chacha20poly1305_ietf_decrypt($message, $ad, $nonceLast, $subkey);
342
+        return self::aead_chacha20poly1305_ietf_decrypt( $message, $ad, $nonceLast, $subkey );
343 343
     }
344 344
 
345 345
     /**
@@ -362,13 +362,13 @@  discard block
 block discarded – undo
362 362
         $key = ''
363 363
     ) {
364 364
         $subkey = ParagonIE_Sodium_Core_HChaCha20::hChaCha20(
365
-            ParagonIE_Sodium_Core_Util::substr($nonce, 0, 16),
365
+            ParagonIE_Sodium_Core_Util::substr( $nonce, 0, 16 ),
366 366
             $key
367 367
         );
368 368
         $nonceLast = "\x00\x00\x00\x00" .
369
-            ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8);
369
+            ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 );
370 370
 
371
-        return self::aead_chacha20poly1305_ietf_encrypt($message, $ad, $nonceLast, $subkey);
371
+        return self::aead_chacha20poly1305_ietf_encrypt( $message, $ad, $nonceLast, $subkey );
372 372
     }
373 373
 
374 374
     /**
@@ -381,10 +381,10 @@  discard block
 block discarded – undo
381 381
      * @return string
382 382
      * @throws TypeError
383 383
      */
384
-    public static function auth($message, $key)
384
+    public static function auth( $message, $key )
385 385
     {
386 386
         return ParagonIE_Sodium_Core_Util::substr(
387
-            hash_hmac('sha512', $message, $key, true),
387
+            hash_hmac( 'sha512', $message, $key, true ),
388 388
             0,
389 389
             32
390 390
         );
@@ -402,11 +402,11 @@  discard block
 block discarded – undo
402 402
      * @throws SodiumException
403 403
      * @throws TypeError
404 404
      */
405
-    public static function auth_verify($mac, $message, $key)
405
+    public static function auth_verify( $mac, $message, $key )
406 406
     {
407 407
         return ParagonIE_Sodium_Core_Util::hashEquals(
408 408
             $mac,
409
-            self::auth($message, $key)
409
+            self::auth( $message, $key )
410 410
         );
411 411
     }
412 412
 
@@ -422,14 +422,14 @@  discard block
 block discarded – undo
422 422
      * @throws SodiumException
423 423
      * @throws TypeError
424 424
      */
425
-    public static function box($plaintext, $nonce, $keypair)
425
+    public static function box( $plaintext, $nonce, $keypair )
426 426
     {
427 427
         $c = self::secretbox(
428 428
             $plaintext,
429 429
             $nonce,
430 430
             self::box_beforenm(
431
-                self::box_secretkey($keypair),
432
-                self::box_publickey($keypair)
431
+                self::box_secretkey( $keypair ),
432
+                self::box_publickey( $keypair )
433 433
             )
434 434
         );
435 435
         return $c;
@@ -446,16 +446,16 @@  discard block
 block discarded – undo
446 446
      * @throws SodiumException
447 447
      * @throws TypeError
448 448
      */
449
-    public static function box_seal($message, $publicKey)
449
+    public static function box_seal( $message, $publicKey )
450 450
     {
451 451
         /** @var string $ephemeralKeypair */
452 452
         $ephemeralKeypair = self::box_keypair();
453 453
 
454 454
         /** @var string $ephemeralSK */
455
-        $ephemeralSK = self::box_secretkey($ephemeralKeypair);
455
+        $ephemeralSK = self::box_secretkey( $ephemeralKeypair );
456 456
 
457 457
         /** @var string $ephemeralPK */
458
-        $ephemeralPK = self::box_publickey($ephemeralKeypair);
458
+        $ephemeralPK = self::box_publickey( $ephemeralKeypair );
459 459
 
460 460
         /** @var string $nonce */
461 461
         $nonce = self::generichash(
@@ -465,15 +465,15 @@  discard block
 block discarded – undo
465 465
         );
466 466
 
467 467
         /** @var string $keypair - The combined keypair used in crypto_box() */
468
-        $keypair = self::box_keypair_from_secretkey_and_publickey($ephemeralSK, $publicKey);
468
+        $keypair = self::box_keypair_from_secretkey_and_publickey( $ephemeralSK, $publicKey );
469 469
 
470 470
         /** @var string $ciphertext Ciphertext + MAC from crypto_box */
471
-        $ciphertext = self::box($message, $nonce, $keypair);
471
+        $ciphertext = self::box( $message, $nonce, $keypair );
472 472
         try {
473
-            ParagonIE_Sodium_Compat::memzero($ephemeralKeypair);
474
-            ParagonIE_Sodium_Compat::memzero($ephemeralSK);
475
-            ParagonIE_Sodium_Compat::memzero($nonce);
476
-        } catch (SodiumException $ex) {
473
+            ParagonIE_Sodium_Compat::memzero( $ephemeralKeypair );
474
+            ParagonIE_Sodium_Compat::memzero( $ephemeralSK );
475
+            ParagonIE_Sodium_Compat::memzero( $nonce );
476
+        } catch ( SodiumException $ex ) {
477 477
             $ephemeralKeypair = null;
478 478
             $ephemeralSK = null;
479 479
             $nonce = null;
@@ -492,19 +492,19 @@  discard block
 block discarded – undo
492 492
      * @throws SodiumException
493 493
      * @throws TypeError
494 494
      */
495
-    public static function box_seal_open($message, $keypair)
495
+    public static function box_seal_open( $message, $keypair )
496 496
     {
497 497
         /** @var string $ephemeralPK */
498
-        $ephemeralPK = ParagonIE_Sodium_Core_Util::substr($message, 0, 32);
498
+        $ephemeralPK = ParagonIE_Sodium_Core_Util::substr( $message, 0, 32 );
499 499
 
500 500
         /** @var string $ciphertext (ciphertext + MAC) */
501
-        $ciphertext = ParagonIE_Sodium_Core_Util::substr($message, 32);
501
+        $ciphertext = ParagonIE_Sodium_Core_Util::substr( $message, 32 );
502 502
 
503 503
         /** @var string $secretKey */
504
-        $secretKey = self::box_secretkey($keypair);
504
+        $secretKey = self::box_secretkey( $keypair );
505 505
 
506 506
         /** @var string $publicKey */
507
-        $publicKey = self::box_publickey($keypair);
507
+        $publicKey = self::box_publickey( $keypair );
508 508
 
509 509
         /** @var string $nonce */
510 510
         $nonce = self::generichash(
@@ -514,15 +514,15 @@  discard block
 block discarded – undo
514 514
         );
515 515
 
516 516
         /** @var string $keypair */
517
-        $keypair = self::box_keypair_from_secretkey_and_publickey($secretKey, $ephemeralPK);
517
+        $keypair = self::box_keypair_from_secretkey_and_publickey( $secretKey, $ephemeralPK );
518 518
 
519 519
         /** @var string $m */
520
-        $m = self::box_open($ciphertext, $nonce, $keypair);
520
+        $m = self::box_open( $ciphertext, $nonce, $keypair );
521 521
         try {
522
-            ParagonIE_Sodium_Compat::memzero($secretKey);
523
-            ParagonIE_Sodium_Compat::memzero($ephemeralPK);
524
-            ParagonIE_Sodium_Compat::memzero($nonce);
525
-        } catch (SodiumException $ex) {
522
+            ParagonIE_Sodium_Compat::memzero( $secretKey );
523
+            ParagonIE_Sodium_Compat::memzero( $ephemeralPK );
524
+            ParagonIE_Sodium_Compat::memzero( $nonce );
525
+        } catch ( SodiumException $ex ) {
526 526
             $secretKey = null;
527 527
             $ephemeralPK = null;
528 528
             $nonce = null;
@@ -541,11 +541,11 @@  discard block
 block discarded – undo
541 541
      * @throws SodiumException
542 542
      * @throws TypeError
543 543
      */
544
-    public static function box_beforenm($sk, $pk)
544
+    public static function box_beforenm( $sk, $pk )
545 545
     {
546 546
         return ParagonIE_Sodium_Core_HSalsa20::hsalsa20(
547
-            str_repeat("\x00", 16),
548
-            self::scalarmult($sk, $pk)
547
+            str_repeat( "\x00", 16 ),
548
+            self::scalarmult( $sk, $pk )
549 549
         );
550 550
     }
551 551
 
@@ -559,8 +559,8 @@  discard block
 block discarded – undo
559 559
      */
560 560
     public static function box_keypair()
561 561
     {
562
-        $sKey = random_bytes(32);
563
-        $pKey = self::scalarmult_base($sKey);
562
+        $sKey = random_bytes( 32 );
563
+        $pKey = self::scalarmult_base( $sKey );
564 564
         return $sKey . $pKey;
565 565
     }
566 566
 
@@ -570,14 +570,14 @@  discard block
 block discarded – undo
570 570
      * @throws SodiumException
571 571
      * @throws TypeError
572 572
      */
573
-    public static function box_seed_keypair($seed)
573
+    public static function box_seed_keypair( $seed )
574 574
     {
575 575
         $sKey = ParagonIE_Sodium_Core_Util::substr(
576
-            hash('sha512', $seed, true),
576
+            hash( 'sha512', $seed, true ),
577 577
             0,
578 578
             32
579 579
         );
580
-        $pKey = self::scalarmult_base($sKey);
580
+        $pKey = self::scalarmult_base( $sKey );
581 581
         return $sKey . $pKey;
582 582
     }
583 583
 
@@ -589,10 +589,10 @@  discard block
 block discarded – undo
589 589
      * @return string
590 590
      * @throws TypeError
591 591
      */
592
-    public static function box_keypair_from_secretkey_and_publickey($sKey, $pKey)
592
+    public static function box_keypair_from_secretkey_and_publickey( $sKey, $pKey )
593 593
     {
594
-        return ParagonIE_Sodium_Core_Util::substr($sKey, 0, 32) .
595
-            ParagonIE_Sodium_Core_Util::substr($pKey, 0, 32);
594
+        return ParagonIE_Sodium_Core_Util::substr( $sKey, 0, 32 ) .
595
+            ParagonIE_Sodium_Core_Util::substr( $pKey, 0, 32 );
596 596
     }
597 597
 
598 598
     /**
@@ -603,14 +603,14 @@  discard block
 block discarded – undo
603 603
      * @throws RangeException
604 604
      * @throws TypeError
605 605
      */
606
-    public static function box_secretkey($keypair)
606
+    public static function box_secretkey( $keypair )
607 607
     {
608
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== 64) {
608
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== 64 ) {
609 609
             throw new RangeException(
610 610
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES bytes long.'
611 611
             );
612 612
         }
613
-        return ParagonIE_Sodium_Core_Util::substr($keypair, 0, 32);
613
+        return ParagonIE_Sodium_Core_Util::substr( $keypair, 0, 32 );
614 614
     }
615 615
 
616 616
     /**
@@ -621,14 +621,14 @@  discard block
 block discarded – undo
621 621
      * @throws RangeException
622 622
      * @throws TypeError
623 623
      */
624
-    public static function box_publickey($keypair)
624
+    public static function box_publickey( $keypair )
625 625
     {
626
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES) {
626
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES ) {
627 627
             throw new RangeException(
628 628
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES bytes long.'
629 629
             );
630 630
         }
631
-        return ParagonIE_Sodium_Core_Util::substr($keypair, 32, 32);
631
+        return ParagonIE_Sodium_Core_Util::substr( $keypair, 32, 32 );
632 632
     }
633 633
 
634 634
     /**
@@ -640,14 +640,14 @@  discard block
 block discarded – undo
640 640
      * @throws SodiumException
641 641
      * @throws TypeError
642 642
      */
643
-    public static function box_publickey_from_secretkey($sKey)
643
+    public static function box_publickey_from_secretkey( $sKey )
644 644
     {
645
-        if (ParagonIE_Sodium_Core_Util::strlen($sKey) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES) {
645
+        if ( ParagonIE_Sodium_Core_Util::strlen( $sKey ) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES ) {
646 646
             throw new RangeException(
647 647
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES bytes long.'
648 648
             );
649 649
         }
650
-        return self::scalarmult_base($sKey);
650
+        return self::scalarmult_base( $sKey );
651 651
     }
652 652
 
653 653
     /**
@@ -662,14 +662,14 @@  discard block
 block discarded – undo
662 662
      * @throws SodiumException
663 663
      * @throws TypeError
664 664
      */
665
-    public static function box_open($ciphertext, $nonce, $keypair)
665
+    public static function box_open( $ciphertext, $nonce, $keypair )
666 666
     {
667 667
         return self::secretbox_open(
668 668
             $ciphertext,
669 669
             $nonce,
670 670
             self::box_beforenm(
671
-                self::box_secretkey($keypair),
672
-                self::box_publickey($keypair)
671
+                self::box_secretkey( $keypair ),
672
+                self::box_publickey( $keypair )
673 673
             )
674 674
         );
675 675
     }
@@ -687,34 +687,34 @@  discard block
 block discarded – undo
687 687
      * @throws SodiumException
688 688
      * @throws TypeError
689 689
      */
690
-    public static function generichash($message, $key = '', $outlen = 32)
690
+    public static function generichash( $message, $key = '', $outlen = 32 )
691 691
     {
692 692
         // This ensures that ParagonIE_Sodium_Core_BLAKE2b::$iv is initialized
693 693
         ParagonIE_Sodium_Core_BLAKE2b::pseudoConstructor();
694 694
 
695 695
         $k = null;
696
-        if (!empty($key)) {
696
+        if ( ! empty( $key ) ) {
697 697
             /** @var SplFixedArray $k */
698
-            $k = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray($key);
699
-            if ($k->count() > ParagonIE_Sodium_Core_BLAKE2b::KEYBYTES) {
700
-                throw new RangeException('Invalid key size');
698
+            $k = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray( $key );
699
+            if ( $k->count() > ParagonIE_Sodium_Core_BLAKE2b::KEYBYTES ) {
700
+                throw new RangeException( 'Invalid key size' );
701 701
             }
702 702
         }
703 703
 
704 704
         /** @var SplFixedArray $in */
705
-        $in = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray($message);
705
+        $in = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray( $message );
706 706
 
707 707
         /** @var SplFixedArray $ctx */
708
-        $ctx = ParagonIE_Sodium_Core_BLAKE2b::init($k, $outlen);
709
-        ParagonIE_Sodium_Core_BLAKE2b::update($ctx, $in, $in->count());
708
+        $ctx = ParagonIE_Sodium_Core_BLAKE2b::init( $k, $outlen );
709
+        ParagonIE_Sodium_Core_BLAKE2b::update( $ctx, $in, $in->count() );
710 710
 
711 711
         /** @var SplFixedArray $out */
712
-        $out = new SplFixedArray($outlen);
713
-        $out = ParagonIE_Sodium_Core_BLAKE2b::finish($ctx, $out);
712
+        $out = new SplFixedArray( $outlen );
713
+        $out = ParagonIE_Sodium_Core_BLAKE2b::finish( $ctx, $out );
714 714
 
715 715
         /** @var array<int, int> */
716 716
         $outArray = $out->toArray();
717
-        return ParagonIE_Sodium_Core_Util::intArrayToString($outArray);
717
+        return ParagonIE_Sodium_Core_Util::intArrayToString( $outArray );
718 718
     }
719 719
 
720 720
     /**
@@ -728,22 +728,22 @@  discard block
 block discarded – undo
728 728
      * @throws SodiumException
729 729
      * @throws TypeError
730 730
      */
731
-    public static function generichash_final($ctx, $outlen = 32)
731
+    public static function generichash_final( $ctx, $outlen = 32 )
732 732
     {
733
-        if (!is_string($ctx)) {
734
-            throw new TypeError('Context must be a string');
733
+        if ( ! is_string( $ctx ) ) {
734
+            throw new TypeError( 'Context must be a string' );
735 735
         }
736
-        $out = new SplFixedArray($outlen);
736
+        $out = new SplFixedArray( $outlen );
737 737
 
738 738
         /** @var SplFixedArray $context */
739
-        $context = ParagonIE_Sodium_Core_BLAKE2b::stringToContext($ctx);
739
+        $context = ParagonIE_Sodium_Core_BLAKE2b::stringToContext( $ctx );
740 740
 
741 741
         /** @var SplFixedArray $out */
742
-        $out = ParagonIE_Sodium_Core_BLAKE2b::finish($context, $out);
742
+        $out = ParagonIE_Sodium_Core_BLAKE2b::finish( $context, $out );
743 743
 
744 744
         /** @var array<int, int> */
745 745
         $outArray = $out->toArray();
746
-        return ParagonIE_Sodium_Core_Util::intArrayToString($outArray);
746
+        return ParagonIE_Sodium_Core_Util::intArrayToString( $outArray );
747 747
     }
748 748
 
749 749
     /**
@@ -758,23 +758,23 @@  discard block
 block discarded – undo
758 758
      * @throws SodiumException
759 759
      * @throws TypeError
760 760
      */
761
-    public static function generichash_init($key = '', $outputLength = 32)
761
+    public static function generichash_init( $key = '', $outputLength = 32 )
762 762
     {
763 763
         // This ensures that ParagonIE_Sodium_Core_BLAKE2b::$iv is initialized
764 764
         ParagonIE_Sodium_Core_BLAKE2b::pseudoConstructor();
765 765
 
766 766
         $k = null;
767
-        if (!empty($key)) {
768
-            $k = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray($key);
769
-            if ($k->count() > ParagonIE_Sodium_Core_BLAKE2b::KEYBYTES) {
770
-                throw new RangeException('Invalid key size');
767
+        if ( ! empty( $key ) ) {
768
+            $k = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray( $key );
769
+            if ( $k->count() > ParagonIE_Sodium_Core_BLAKE2b::KEYBYTES ) {
770
+                throw new RangeException( 'Invalid key size' );
771 771
             }
772 772
         }
773 773
 
774 774
         /** @var SplFixedArray $ctx */
775
-        $ctx = ParagonIE_Sodium_Core_BLAKE2b::init($k, $outputLength);
775
+        $ctx = ParagonIE_Sodium_Core_BLAKE2b::init( $k, $outputLength );
776 776
 
777
-        return ParagonIE_Sodium_Core_BLAKE2b::contextToString($ctx);
777
+        return ParagonIE_Sodium_Core_BLAKE2b::contextToString( $ctx );
778 778
     }
779 779
 
780 780
     /**
@@ -801,27 +801,27 @@  discard block
 block discarded – undo
801 801
         ParagonIE_Sodium_Core_BLAKE2b::pseudoConstructor();
802 802
 
803 803
         $k = null;
804
-        if (!empty($key)) {
805
-            $k = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray($key);
806
-            if ($k->count() > ParagonIE_Sodium_Core_BLAKE2b::KEYBYTES) {
807
-                throw new RangeException('Invalid key size');
804
+        if ( ! empty( $key ) ) {
805
+            $k = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray( $key );
806
+            if ( $k->count() > ParagonIE_Sodium_Core_BLAKE2b::KEYBYTES ) {
807
+                throw new RangeException( 'Invalid key size' );
808 808
             }
809 809
         }
810
-        if (!empty($salt)) {
811
-            $s = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray($salt);
810
+        if ( ! empty( $salt ) ) {
811
+            $s = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray( $salt );
812 812
         } else {
813 813
             $s = null;
814 814
         }
815
-        if (!empty($salt)) {
816
-            $p = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray($personal);
815
+        if ( ! empty( $salt ) ) {
816
+            $p = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray( $personal );
817 817
         } else {
818 818
             $p = null;
819 819
         }
820 820
 
821 821
         /** @var SplFixedArray $ctx */
822
-        $ctx = ParagonIE_Sodium_Core_BLAKE2b::init($k, $outputLength, $s, $p);
822
+        $ctx = ParagonIE_Sodium_Core_BLAKE2b::init( $k, $outputLength, $s, $p );
823 823
 
824
-        return ParagonIE_Sodium_Core_BLAKE2b::contextToString($ctx);
824
+        return ParagonIE_Sodium_Core_BLAKE2b::contextToString( $ctx );
825 825
     }
826 826
 
827 827
     /**
@@ -835,20 +835,20 @@  discard block
 block discarded – undo
835 835
      * @throws SodiumException
836 836
      * @throws TypeError
837 837
      */
838
-    public static function generichash_update($ctx, $message)
838
+    public static function generichash_update( $ctx, $message )
839 839
     {
840 840
         // This ensures that ParagonIE_Sodium_Core_BLAKE2b::$iv is initialized
841 841
         ParagonIE_Sodium_Core_BLAKE2b::pseudoConstructor();
842 842
 
843 843
         /** @var SplFixedArray $context */
844
-        $context = ParagonIE_Sodium_Core_BLAKE2b::stringToContext($ctx);
844
+        $context = ParagonIE_Sodium_Core_BLAKE2b::stringToContext( $ctx );
845 845
 
846 846
         /** @var SplFixedArray $in */
847
-        $in = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray($message);
847
+        $in = ParagonIE_Sodium_Core_BLAKE2b::stringToSplFixedArray( $message );
848 848
 
849
-        ParagonIE_Sodium_Core_BLAKE2b::update($context, $in, $in->count());
849
+        ParagonIE_Sodium_Core_BLAKE2b::update( $context, $in, $in->count() );
850 850
 
851
-        return ParagonIE_Sodium_Core_BLAKE2b::contextToString($context);
851
+        return ParagonIE_Sodium_Core_BLAKE2b::contextToString( $context );
852 852
     }
853 853
 
854 854
     /**
@@ -864,10 +864,10 @@  discard block
 block discarded – undo
864 864
      * @throws SodiumException
865 865
      * @throws TypeError
866 866
      */
867
-    public static function keyExchange($my_sk, $their_pk, $client_pk, $server_pk)
867
+    public static function keyExchange( $my_sk, $their_pk, $client_pk, $server_pk )
868 868
     {
869 869
         return ParagonIE_Sodium_Compat::crypto_generichash(
870
-            ParagonIE_Sodium_Compat::crypto_scalarmult($my_sk, $their_pk) .
870
+            ParagonIE_Sodium_Compat::crypto_scalarmult( $my_sk, $their_pk ) .
871 871
             $client_pk .
872 872
             $server_pk
873 873
         );
@@ -885,10 +885,10 @@  discard block
 block discarded – undo
885 885
      * @throws SodiumException
886 886
      * @throws TypeError
887 887
      */
888
-    public static function scalarmult($sKey, $pKey)
888
+    public static function scalarmult( $sKey, $pKey )
889 889
     {
890
-        $q = ParagonIE_Sodium_Core_X25519::crypto_scalarmult_curve25519_ref10($sKey, $pKey);
891
-        self::scalarmult_throw_if_zero($q);
890
+        $q = ParagonIE_Sodium_Core_X25519::crypto_scalarmult_curve25519_ref10( $sKey, $pKey );
891
+        self::scalarmult_throw_if_zero( $q );
892 892
         return $q;
893 893
     }
894 894
 
@@ -902,10 +902,10 @@  discard block
 block discarded – undo
902 902
      * @throws SodiumException
903 903
      * @throws TypeError
904 904
      */
905
-    public static function scalarmult_base($secret)
905
+    public static function scalarmult_base( $secret )
906 906
     {
907
-        $q = ParagonIE_Sodium_Core_X25519::crypto_scalarmult_curve25519_ref10_base($secret);
908
-        self::scalarmult_throw_if_zero($q);
907
+        $q = ParagonIE_Sodium_Core_X25519::crypto_scalarmult_curve25519_ref10_base( $secret );
908
+        self::scalarmult_throw_if_zero( $q );
909 909
         return $q;
910 910
     }
911 911
 
@@ -917,16 +917,16 @@  discard block
 block discarded – undo
917 917
      * @throws SodiumException
918 918
      * @throws TypeError
919 919
      */
920
-    protected static function scalarmult_throw_if_zero($q)
920
+    protected static function scalarmult_throw_if_zero( $q )
921 921
     {
922 922
         $d = 0;
923
-        for ($i = 0; $i < self::box_curve25519xsalsa20poly1305_SECRETKEYBYTES; ++$i) {
924
-            $d |= ParagonIE_Sodium_Core_Util::chrToInt($q[$i]);
923
+        for ( $i = 0; $i < self::box_curve25519xsalsa20poly1305_SECRETKEYBYTES; ++$i ) {
924
+            $d |= ParagonIE_Sodium_Core_Util::chrToInt( $q[ $i ] );
925 925
         }
926 926
 
927 927
         /* branch-free variant of === 0 */
928
-        if (-(1 & (($d - 1) >> 8))) {
929
-            throw new SodiumException('Zero public key is not allowed');
928
+        if (-( 1 & ( ( $d - 1 ) >> 8 ) )) {
929
+            throw new SodiumException( 'Zero public key is not allowed' );
930 930
         }
931 931
     }
932 932
 
@@ -942,26 +942,26 @@  discard block
 block discarded – undo
942 942
      * @throws SodiumException
943 943
      * @throws TypeError
944 944
      */
945
-    public static function secretbox($plaintext, $nonce, $key)
945
+    public static function secretbox( $plaintext, $nonce, $key )
946 946
     {
947 947
         /** @var string $subkey */
948
-        $subkey = ParagonIE_Sodium_Core_HSalsa20::hsalsa20($nonce, $key);
948
+        $subkey = ParagonIE_Sodium_Core_HSalsa20::hsalsa20( $nonce, $key );
949 949
 
950 950
         /** @var string $block0 */
951
-        $block0 = str_repeat("\x00", 32);
951
+        $block0 = str_repeat( "\x00", 32 );
952 952
 
953 953
         /** @var int $mlen - Length of the plaintext message */
954
-        $mlen = ParagonIE_Sodium_Core_Util::strlen($plaintext);
954
+        $mlen = ParagonIE_Sodium_Core_Util::strlen( $plaintext );
955 955
         $mlen0 = $mlen;
956
-        if ($mlen0 > 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES) {
956
+        if ( $mlen0 > 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES ) {
957 957
             $mlen0 = 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES;
958 958
         }
959
-        $block0 .= ParagonIE_Sodium_Core_Util::substr($plaintext, 0, $mlen0);
959
+        $block0 .= ParagonIE_Sodium_Core_Util::substr( $plaintext, 0, $mlen0 );
960 960
 
961 961
         /** @var string $block0 */
962 962
         $block0 = ParagonIE_Sodium_Core_Salsa20::salsa20_xor(
963 963
             $block0,
964
-            ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8),
964
+            ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 ),
965 965
             $subkey
966 966
         );
967 967
 
@@ -970,13 +970,13 @@  discard block
 block discarded – undo
970 970
             $block0,
971 971
             self::secretbox_xsalsa20poly1305_ZEROBYTES
972 972
         );
973
-        if ($mlen > $mlen0) {
973
+        if ( $mlen > $mlen0 ) {
974 974
             $c .= ParagonIE_Sodium_Core_Salsa20::salsa20_xor_ic(
975 975
                 ParagonIE_Sodium_Core_Util::substr(
976 976
                     $plaintext,
977 977
                     self::secretbox_xsalsa20poly1305_ZEROBYTES
978 978
                 ),
979
-                ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8),
979
+                ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 ),
980 980
                 1,
981 981
                 $subkey
982 982
             );
@@ -989,18 +989,18 @@  discard block
 block discarded – undo
989 989
             )
990 990
         );
991 991
         try {
992
-            ParagonIE_Sodium_Compat::memzero($block0);
993
-            ParagonIE_Sodium_Compat::memzero($subkey);
994
-        } catch (SodiumException $ex) {
992
+            ParagonIE_Sodium_Compat::memzero( $block0 );
993
+            ParagonIE_Sodium_Compat::memzero( $subkey );
994
+        } catch ( SodiumException $ex ) {
995 995
             $block0 = null;
996 996
             $subkey = null;
997 997
         }
998 998
 
999
-        $state->update($c);
999
+        $state->update( $c );
1000 1000
 
1001 1001
         /** @var string $c - MAC || ciphertext */
1002 1002
         $c = $state->finish() . $c;
1003
-        unset($state);
1003
+        unset( $state );
1004 1004
 
1005 1005
         return $c;
1006 1006
     }
@@ -1017,7 +1017,7 @@  discard block
 block discarded – undo
1017 1017
      * @throws SodiumException
1018 1018
      * @throws TypeError
1019 1019
      */
1020
-    public static function secretbox_open($ciphertext, $nonce, $key)
1020
+    public static function secretbox_open( $ciphertext, $nonce, $key )
1021 1021
     {
1022 1022
         /** @var string $mac */
1023 1023
         $mac = ParagonIE_Sodium_Core_Util::substr(
@@ -1033,46 +1033,46 @@  discard block
 block discarded – undo
1033 1033
         );
1034 1034
 
1035 1035
         /** @var int $clen */
1036
-        $clen = ParagonIE_Sodium_Core_Util::strlen($c);
1036
+        $clen = ParagonIE_Sodium_Core_Util::strlen( $c );
1037 1037
 
1038 1038
         /** @var string $subkey */
1039
-        $subkey = ParagonIE_Sodium_Core_HSalsa20::hsalsa20($nonce, $key);
1039
+        $subkey = ParagonIE_Sodium_Core_HSalsa20::hsalsa20( $nonce, $key );
1040 1040
 
1041 1041
         /** @var string $block0 */
1042 1042
         $block0 = ParagonIE_Sodium_Core_Salsa20::salsa20(
1043 1043
             64,
1044
-            ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8),
1044
+            ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 ),
1045 1045
             $subkey
1046 1046
         );
1047 1047
         $verified = ParagonIE_Sodium_Core_Poly1305::onetimeauth_verify(
1048 1048
             $mac,
1049 1049
             $c,
1050
-            ParagonIE_Sodium_Core_Util::substr($block0, 0, 32)
1050
+            ParagonIE_Sodium_Core_Util::substr( $block0, 0, 32 )
1051 1051
         );
1052
-        if (!$verified) {
1052
+        if ( ! $verified ) {
1053 1053
             try {
1054
-                ParagonIE_Sodium_Compat::memzero($subkey);
1055
-            } catch (SodiumException $ex) {
1054
+                ParagonIE_Sodium_Compat::memzero( $subkey );
1055
+            } catch ( SodiumException $ex ) {
1056 1056
                 $subkey = null;
1057 1057
             }
1058
-            throw new SodiumException('Invalid MAC');
1058
+            throw new SodiumException( 'Invalid MAC' );
1059 1059
         }
1060 1060
 
1061 1061
         /** @var string $m - Decrypted message */
1062 1062
         $m = ParagonIE_Sodium_Core_Util::xorStrings(
1063
-            ParagonIE_Sodium_Core_Util::substr($block0, self::secretbox_xsalsa20poly1305_ZEROBYTES),
1064
-            ParagonIE_Sodium_Core_Util::substr($c, 0, self::secretbox_xsalsa20poly1305_ZEROBYTES)
1063
+            ParagonIE_Sodium_Core_Util::substr( $block0, self::secretbox_xsalsa20poly1305_ZEROBYTES ),
1064
+            ParagonIE_Sodium_Core_Util::substr( $c, 0, self::secretbox_xsalsa20poly1305_ZEROBYTES )
1065 1065
         );
1066
-        if ($clen > self::secretbox_xsalsa20poly1305_ZEROBYTES) {
1066
+        if ( $clen > self::secretbox_xsalsa20poly1305_ZEROBYTES ) {
1067 1067
             // We had more than 1 block, so let's continue to decrypt the rest.
1068 1068
             $m .= ParagonIE_Sodium_Core_Salsa20::salsa20_xor_ic(
1069 1069
                 ParagonIE_Sodium_Core_Util::substr(
1070 1070
                     $c,
1071 1071
                     self::secretbox_xsalsa20poly1305_ZEROBYTES
1072 1072
                 ),
1073
-                ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8),
1073
+                ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 ),
1074 1074
                 1,
1075
-                (string) $subkey
1075
+                (string)$subkey
1076 1076
             );
1077 1077
         }
1078 1078
         return $m;
@@ -1090,25 +1090,25 @@  discard block
 block discarded – undo
1090 1090
      * @throws SodiumException
1091 1091
      * @throws TypeError
1092 1092
      */
1093
-    public static function secretbox_xchacha20poly1305($plaintext, $nonce, $key)
1093
+    public static function secretbox_xchacha20poly1305( $plaintext, $nonce, $key )
1094 1094
     {
1095 1095
         /** @var string $subkey */
1096 1096
         $subkey = ParagonIE_Sodium_Core_HChaCha20::hChaCha20(
1097
-            ParagonIE_Sodium_Core_Util::substr($nonce, 0, 16),
1097
+            ParagonIE_Sodium_Core_Util::substr( $nonce, 0, 16 ),
1098 1098
             $key
1099 1099
         );
1100
-        $nonceLast = ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8);
1100
+        $nonceLast = ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 );
1101 1101
 
1102 1102
         /** @var string $block0 */
1103
-        $block0 = str_repeat("\x00", 32);
1103
+        $block0 = str_repeat( "\x00", 32 );
1104 1104
 
1105 1105
         /** @var int $mlen - Length of the plaintext message */
1106
-        $mlen = ParagonIE_Sodium_Core_Util::strlen($plaintext);
1106
+        $mlen = ParagonIE_Sodium_Core_Util::strlen( $plaintext );
1107 1107
         $mlen0 = $mlen;
1108
-        if ($mlen0 > 64 - self::secretbox_xchacha20poly1305_ZEROBYTES) {
1108
+        if ( $mlen0 > 64 - self::secretbox_xchacha20poly1305_ZEROBYTES ) {
1109 1109
             $mlen0 = 64 - self::secretbox_xchacha20poly1305_ZEROBYTES;
1110 1110
         }
1111
-        $block0 .= ParagonIE_Sodium_Core_Util::substr($plaintext, 0, $mlen0);
1111
+        $block0 .= ParagonIE_Sodium_Core_Util::substr( $plaintext, 0, $mlen0 );
1112 1112
 
1113 1113
         /** @var string $block0 */
1114 1114
         $block0 = ParagonIE_Sodium_Core_ChaCha20::streamXorIc(
@@ -1122,7 +1122,7 @@  discard block
 block discarded – undo
1122 1122
             $block0,
1123 1123
             self::secretbox_xchacha20poly1305_ZEROBYTES
1124 1124
         );
1125
-        if ($mlen > $mlen0) {
1125
+        if ( $mlen > $mlen0 ) {
1126 1126
             $c .= ParagonIE_Sodium_Core_ChaCha20::streamXorIc(
1127 1127
                 ParagonIE_Sodium_Core_Util::substr(
1128 1128
                     $plaintext,
@@ -1130,7 +1130,7 @@  discard block
 block discarded – undo
1130 1130
                 ),
1131 1131
                 $nonceLast,
1132 1132
                 $subkey,
1133
-                ParagonIE_Sodium_Core_Util::store64_le(1)
1133
+                ParagonIE_Sodium_Core_Util::store64_le( 1 )
1134 1134
             );
1135 1135
         }
1136 1136
         $state = new ParagonIE_Sodium_Core_Poly1305_State(
@@ -1141,18 +1141,18 @@  discard block
 block discarded – undo
1141 1141
             )
1142 1142
         );
1143 1143
         try {
1144
-            ParagonIE_Sodium_Compat::memzero($block0);
1145
-            ParagonIE_Sodium_Compat::memzero($subkey);
1146
-        } catch (SodiumException $ex) {
1144
+            ParagonIE_Sodium_Compat::memzero( $block0 );
1145
+            ParagonIE_Sodium_Compat::memzero( $subkey );
1146
+        } catch ( SodiumException $ex ) {
1147 1147
             $block0 = null;
1148 1148
             $subkey = null;
1149 1149
         }
1150 1150
 
1151
-        $state->update($c);
1151
+        $state->update( $c );
1152 1152
 
1153 1153
         /** @var string $c - MAC || ciphertext */
1154 1154
         $c = $state->finish() . $c;
1155
-        unset($state);
1155
+        unset( $state );
1156 1156
 
1157 1157
         return $c;
1158 1158
     }
@@ -1169,7 +1169,7 @@  discard block
 block discarded – undo
1169 1169
      * @throws SodiumException
1170 1170
      * @throws TypeError
1171 1171
      */
1172
-    public static function secretbox_xchacha20poly1305_open($ciphertext, $nonce, $key)
1172
+    public static function secretbox_xchacha20poly1305_open( $ciphertext, $nonce, $key )
1173 1173
     {
1174 1174
         /** @var string $mac */
1175 1175
         $mac = ParagonIE_Sodium_Core_Util::substr(
@@ -1185,48 +1185,48 @@  discard block
 block discarded – undo
1185 1185
         );
1186 1186
 
1187 1187
         /** @var int $clen */
1188
-        $clen = ParagonIE_Sodium_Core_Util::strlen($c);
1188
+        $clen = ParagonIE_Sodium_Core_Util::strlen( $c );
1189 1189
 
1190 1190
         /** @var string $subkey */
1191
-        $subkey = ParagonIE_Sodium_Core_HChaCha20::hchacha20($nonce, $key);
1191
+        $subkey = ParagonIE_Sodium_Core_HChaCha20::hchacha20( $nonce, $key );
1192 1192
 
1193 1193
         /** @var string $block0 */
1194 1194
         $block0 = ParagonIE_Sodium_Core_ChaCha20::stream(
1195 1195
             64,
1196
-            ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8),
1196
+            ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 ),
1197 1197
             $subkey
1198 1198
         );
1199 1199
         $verified = ParagonIE_Sodium_Core_Poly1305::onetimeauth_verify(
1200 1200
             $mac,
1201 1201
             $c,
1202
-            ParagonIE_Sodium_Core_Util::substr($block0, 0, 32)
1202
+            ParagonIE_Sodium_Core_Util::substr( $block0, 0, 32 )
1203 1203
         );
1204 1204
 
1205
-        if (!$verified) {
1205
+        if ( ! $verified ) {
1206 1206
             try {
1207
-                ParagonIE_Sodium_Compat::memzero($subkey);
1208
-            } catch (SodiumException $ex) {
1207
+                ParagonIE_Sodium_Compat::memzero( $subkey );
1208
+            } catch ( SodiumException $ex ) {
1209 1209
                 $subkey = null;
1210 1210
             }
1211
-            throw new SodiumException('Invalid MAC');
1211
+            throw new SodiumException( 'Invalid MAC' );
1212 1212
         }
1213 1213
 
1214 1214
         /** @var string $m - Decrypted message */
1215 1215
         $m = ParagonIE_Sodium_Core_Util::xorStrings(
1216
-            ParagonIE_Sodium_Core_Util::substr($block0, self::secretbox_xchacha20poly1305_ZEROBYTES),
1217
-            ParagonIE_Sodium_Core_Util::substr($c, 0, self::secretbox_xchacha20poly1305_ZEROBYTES)
1216
+            ParagonIE_Sodium_Core_Util::substr( $block0, self::secretbox_xchacha20poly1305_ZEROBYTES ),
1217
+            ParagonIE_Sodium_Core_Util::substr( $c, 0, self::secretbox_xchacha20poly1305_ZEROBYTES )
1218 1218
         );
1219 1219
 
1220
-        if ($clen > self::secretbox_xchacha20poly1305_ZEROBYTES) {
1220
+        if ( $clen > self::secretbox_xchacha20poly1305_ZEROBYTES ) {
1221 1221
             // We had more than 1 block, so let's continue to decrypt the rest.
1222 1222
             $m .= ParagonIE_Sodium_Core_ChaCha20::streamXorIc(
1223 1223
                 ParagonIE_Sodium_Core_Util::substr(
1224 1224
                     $c,
1225 1225
                     self::secretbox_xchacha20poly1305_ZEROBYTES
1226 1226
                 ),
1227
-                ParagonIE_Sodium_Core_Util::substr($nonce, 16, 8),
1228
-                (string) $subkey,
1229
-                ParagonIE_Sodium_Core_Util::store64_le(1)
1227
+                ParagonIE_Sodium_Core_Util::substr( $nonce, 16, 8 ),
1228
+                (string)$subkey,
1229
+                ParagonIE_Sodium_Core_Util::store64_le( 1 )
1230 1230
             );
1231 1231
         }
1232 1232
         return $m;
@@ -1238,16 +1238,16 @@  discard block
 block discarded – undo
1238 1238
      * @throws Exception
1239 1239
      * @throws SodiumException
1240 1240
      */
1241
-    public static function secretstream_xchacha20poly1305_init_push($key)
1241
+    public static function secretstream_xchacha20poly1305_init_push( $key )
1242 1242
     {
1243 1243
         # randombytes_buf(out, crypto_secretstream_xchacha20poly1305_HEADERBYTES);
1244
-        $out = random_bytes(24);
1244
+        $out = random_bytes( 24 );
1245 1245
 
1246 1246
         # crypto_core_hchacha20(state->k, out, k, NULL);
1247
-        $subkey = ParagonIE_Sodium_Core_HChaCha20::hChaCha20($out, $key);
1247
+        $subkey = ParagonIE_Sodium_Core_HChaCha20::hChaCha20( $out, $key );
1248 1248
         $state = new ParagonIE_Sodium_Core_SecretStream_State(
1249 1249
             $subkey,
1250
-            ParagonIE_Sodium_Core_Util::substr($out, 16, 8) . str_repeat("\0", 4)
1250
+            ParagonIE_Sodium_Core_Util::substr( $out, 16, 8 ) . str_repeat( "\0", 4 )
1251 1251
         );
1252 1252
 
1253 1253
         # _crypto_secretstream_xchacha20poly1305_counter_reset(state);
@@ -1268,16 +1268,16 @@  discard block
 block discarded – undo
1268 1268
      * @return string Returns a state.
1269 1269
      * @throws Exception
1270 1270
      */
1271
-    public static function secretstream_xchacha20poly1305_init_pull($key, $header)
1271
+    public static function secretstream_xchacha20poly1305_init_pull( $key, $header )
1272 1272
     {
1273 1273
         # crypto_core_hchacha20(state->k, in, k, NULL);
1274 1274
         $subkey = ParagonIE_Sodium_Core_HChaCha20::hChaCha20(
1275
-            ParagonIE_Sodium_Core_Util::substr($header, 0, 16),
1275
+            ParagonIE_Sodium_Core_Util::substr( $header, 0, 16 ),
1276 1276
             $key
1277 1277
         );
1278 1278
         $state = new ParagonIE_Sodium_Core_SecretStream_State(
1279 1279
             $subkey,
1280
-            ParagonIE_Sodium_Core_Util::substr($header, 16)
1280
+            ParagonIE_Sodium_Core_Util::substr( $header, 16 )
1281 1281
         );
1282 1282
         $state->counterReset();
1283 1283
         # memcpy(STATE_INONCE(state), in + crypto_core_hchacha20_INPUTBYTES,
@@ -1295,19 +1295,19 @@  discard block
 block discarded – undo
1295 1295
      * @return string
1296 1296
      * @throws SodiumException
1297 1297
      */
1298
-    public static function secretstream_xchacha20poly1305_push(&$state, $msg, $aad = '', $tag = 0)
1298
+    public static function secretstream_xchacha20poly1305_push( &$state, $msg, $aad = '', $tag = 0 )
1299 1299
     {
1300
-        $st = ParagonIE_Sodium_Core_SecretStream_State::fromString($state);
1300
+        $st = ParagonIE_Sodium_Core_SecretStream_State::fromString( $state );
1301 1301
         # crypto_onetimeauth_poly1305_state poly1305_state;
1302 1302
         # unsigned char                     block[64U];
1303 1303
         # unsigned char                     slen[8U];
1304 1304
         # unsigned char                    *c;
1305 1305
         # unsigned char                    *mac;
1306 1306
 
1307
-        $msglen = ParagonIE_Sodium_Core_Util::strlen($msg);
1308
-        $aadlen = ParagonIE_Sodium_Core_Util::strlen($aad);
1307
+        $msglen = ParagonIE_Sodium_Core_Util::strlen( $msg );
1308
+        $aadlen = ParagonIE_Sodium_Core_Util::strlen( $aad );
1309 1309
 
1310
-        if ((($msglen + 63) >> 6) > 0xfffffffe) {
1310
+        if ( ( ( $msglen + 63 ) >> 6 ) > 0xfffffffe ) {
1311 1311
             throw new SodiumException(
1312 1312
                 'message cannot be larger than SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_MESSAGEBYTES_MAX bytes'
1313 1313
             );
@@ -1324,62 +1324,62 @@  discard block
 block discarded – undo
1324 1324
         # crypto_onetimeauth_poly1305_init(&poly1305_state, block);
1325 1325
         # sodium_memzero(block, sizeof block);
1326 1326
         $auth = new ParagonIE_Sodium_Core_Poly1305_State(
1327
-            ParagonIE_Sodium_Core_ChaCha20::ietfStream(32, $st->getCombinedNonce(), $st->getKey())
1327
+            ParagonIE_Sodium_Core_ChaCha20::ietfStream( 32, $st->getCombinedNonce(), $st->getKey() )
1328 1328
         );
1329 1329
 
1330 1330
         # crypto_onetimeauth_poly1305_update(&poly1305_state, ad, adlen);
1331
-        $auth->update($aad);
1331
+        $auth->update( $aad );
1332 1332
 
1333 1333
         # crypto_onetimeauth_poly1305_update(&poly1305_state, _pad0,
1334 1334
         #     (0x10 - adlen) & 0xf);
1335
-        $auth->update(str_repeat("\0", ((0x10 - $aadlen) & 0xf)));
1335
+        $auth->update( str_repeat( "\0", ( ( 0x10 - $aadlen ) & 0xf ) ) );
1336 1336
 
1337 1337
         # memset(block, 0, sizeof block);
1338 1338
         # block[0] = tag;
1339 1339
         # crypto_stream_chacha20_ietf_xor_ic(block, block, sizeof block,
1340 1340
         #                                    state->nonce, 1U, state->k);
1341 1341
         $block = ParagonIE_Sodium_Core_ChaCha20::ietfStreamXorIc(
1342
-            ParagonIE_Sodium_Core_Util::intToChr($tag) . str_repeat("\0", 63),
1342
+            ParagonIE_Sodium_Core_Util::intToChr( $tag ) . str_repeat( "\0", 63 ),
1343 1343
             $st->getCombinedNonce(),
1344 1344
             $st->getKey(),
1345
-            ParagonIE_Sodium_Core_Util::store64_le(1)
1345
+            ParagonIE_Sodium_Core_Util::store64_le( 1 )
1346 1346
         );
1347 1347
 
1348 1348
         # crypto_onetimeauth_poly1305_update(&poly1305_state, block, sizeof block);
1349
-        $auth->update($block);
1349
+        $auth->update( $block );
1350 1350
 
1351 1351
         # out[0] = block[0];
1352
-        $out = $block[0];
1352
+        $out = $block[ 0 ];
1353 1353
         # c = out + (sizeof tag);
1354 1354
         # crypto_stream_chacha20_ietf_xor_ic(c, m, mlen, state->nonce, 2U, state->k);
1355 1355
         $cipher = ParagonIE_Sodium_Core_ChaCha20::ietfStreamXorIc(
1356 1356
             $msg,
1357 1357
             $st->getCombinedNonce(),
1358 1358
             $st->getKey(),
1359
-            ParagonIE_Sodium_Core_Util::store64_le(2)
1359
+            ParagonIE_Sodium_Core_Util::store64_le( 2 )
1360 1360
         );
1361 1361
 
1362 1362
         # crypto_onetimeauth_poly1305_update(&poly1305_state, c, mlen);
1363
-        $auth->update($cipher);
1363
+        $auth->update( $cipher );
1364 1364
 
1365 1365
         $out .= $cipher;
1366
-        unset($cipher);
1366
+        unset( $cipher );
1367 1367
 
1368 1368
         # crypto_onetimeauth_poly1305_update
1369 1369
         # (&poly1305_state, _pad0, (0x10 - (sizeof block) + mlen) & 0xf);
1370
-        $auth->update(str_repeat("\0", ((0x10 - 64 + $msglen) & 0xf)));
1370
+        $auth->update( str_repeat( "\0", ( ( 0x10 - 64 + $msglen ) & 0xf ) ) );
1371 1371
 
1372 1372
         # STORE64_LE(slen, (uint64_t) adlen);
1373
-        $slen = ParagonIE_Sodium_Core_Util::store64_le($aadlen);
1373
+        $slen = ParagonIE_Sodium_Core_Util::store64_le( $aadlen );
1374 1374
 
1375 1375
         # crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1376
-        $auth->update($slen);
1376
+        $auth->update( $slen );
1377 1377
 
1378 1378
         # STORE64_LE(slen, (sizeof block) + mlen);
1379
-        $slen = ParagonIE_Sodium_Core_Util::store64_le(64 + $msglen);
1379
+        $slen = ParagonIE_Sodium_Core_Util::store64_le( 64 + $msglen );
1380 1380
 
1381 1381
         # crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1382
-        $auth->update($slen);
1382
+        $auth->update( $slen );
1383 1383
 
1384 1384
         # mac = c + mlen;
1385 1385
         # crypto_onetimeauth_poly1305_final(&poly1305_state, mac);
@@ -1387,12 +1387,12 @@  discard block
 block discarded – undo
1387 1387
         $out .= $mac;
1388 1388
 
1389 1389
         # sodium_memzero(&poly1305_state, sizeof poly1305_state);
1390
-        unset($auth);
1390
+        unset( $auth );
1391 1391
 
1392 1392
 
1393 1393
         # XOR_BUF(STATE_INONCE(state), mac,
1394 1394
         #     crypto_secretstream_xchacha20poly1305_INONCEBYTES);
1395
-        $st->xorNonce($mac);
1395
+        $st->xorNonce( $mac );
1396 1396
 
1397 1397
         # sodium_increment(STATE_COUNTER(state),
1398 1398
         #     crypto_secretstream_xchacha20poly1305_COUNTERBYTES);
@@ -1401,15 +1401,15 @@  discard block
 block discarded – undo
1401 1401
         $state = $st->toString();
1402 1402
 
1403 1403
         /** @var bool $rekey */
1404
-        $rekey = ($tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY) !== 0;
1404
+        $rekey = ( $tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY ) !== 0;
1405 1405
         # if ((tag & crypto_secretstream_xchacha20poly1305_TAG_REKEY) != 0 ||
1406 1406
         #     sodium_is_zero(STATE_COUNTER(state),
1407 1407
         #         crypto_secretstream_xchacha20poly1305_COUNTERBYTES)) {
1408 1408
         #     crypto_secretstream_xchacha20poly1305_rekey(state);
1409 1409
         # }
1410
-        if ($rekey || $st->needsRekey()) {
1410
+        if ( $rekey || $st->needsRekey() ) {
1411 1411
             // DO REKEY
1412
-            self::secretstream_xchacha20poly1305_rekey($state);
1412
+            self::secretstream_xchacha20poly1305_rekey( $state );
1413 1413
         }
1414 1414
         # if (outlen_p != NULL) {
1415 1415
         #     *outlen_p = crypto_secretstream_xchacha20poly1305_ABYTES + mlen;
@@ -1424,19 +1424,19 @@  discard block
 block discarded – undo
1424 1424
      * @return bool|array{0: string, 1: int}
1425 1425
      * @throws SodiumException
1426 1426
      */
1427
-    public static function secretstream_xchacha20poly1305_pull(&$state, $cipher, $aad = '')
1427
+    public static function secretstream_xchacha20poly1305_pull( &$state, $cipher, $aad = '' )
1428 1428
     {
1429
-        $st = ParagonIE_Sodium_Core_SecretStream_State::fromString($state);
1429
+        $st = ParagonIE_Sodium_Core_SecretStream_State::fromString( $state );
1430 1430
 
1431
-        $cipherlen = ParagonIE_Sodium_Core_Util::strlen($cipher);
1431
+        $cipherlen = ParagonIE_Sodium_Core_Util::strlen( $cipher );
1432 1432
         #     mlen = inlen - crypto_secretstream_xchacha20poly1305_ABYTES;
1433 1433
         $msglen = $cipherlen - ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_ABYTES;
1434
-        $aadlen = ParagonIE_Sodium_Core_Util::strlen($aad);
1434
+        $aadlen = ParagonIE_Sodium_Core_Util::strlen( $aad );
1435 1435
 
1436 1436
         #     if (mlen > crypto_secretstream_xchacha20poly1305_MESSAGEBYTES_MAX) {
1437 1437
         #         sodium_misuse();
1438 1438
         #     }
1439
-        if ((($msglen + 63) >> 6) > 0xfffffffe) {
1439
+        if ( ( ( $msglen + 63 ) >> 6 ) > 0xfffffffe ) {
1440 1440
             throw new SodiumException(
1441 1441
                 'message cannot be larger than SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_MESSAGEBYTES_MAX bytes'
1442 1442
             );
@@ -1446,15 +1446,15 @@  discard block
 block discarded – undo
1446 1446
         #     crypto_onetimeauth_poly1305_init(&poly1305_state, block);
1447 1447
         #     sodium_memzero(block, sizeof block);
1448 1448
         $auth = new ParagonIE_Sodium_Core_Poly1305_State(
1449
-            ParagonIE_Sodium_Core_ChaCha20::ietfStream(32, $st->getCombinedNonce(), $st->getKey())
1449
+            ParagonIE_Sodium_Core_ChaCha20::ietfStream( 32, $st->getCombinedNonce(), $st->getKey() )
1450 1450
         );
1451 1451
 
1452 1452
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, ad, adlen);
1453
-        $auth->update($aad);
1453
+        $auth->update( $aad );
1454 1454
 
1455 1455
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, _pad0,
1456 1456
         #         (0x10 - adlen) & 0xf);
1457
-        $auth->update(str_repeat("\0", ((0x10 - $aadlen) & 0xf)));
1457
+        $auth->update( str_repeat( "\0", ( ( 0x10 - $aadlen ) & 0xf ) ) );
1458 1458
 
1459 1459
 
1460 1460
         #     memset(block, 0, sizeof block);
@@ -1462,36 +1462,36 @@  discard block
 block discarded – undo
1462 1462
         #     crypto_stream_chacha20_ietf_xor_ic(block, block, sizeof block,
1463 1463
         #                                        state->nonce, 1U, state->k);
1464 1464
         $block = ParagonIE_Sodium_Core_ChaCha20::ietfStreamXorIc(
1465
-            $cipher[0] . str_repeat("\0", 63),
1465
+            $cipher[ 0 ] . str_repeat( "\0", 63 ),
1466 1466
             $st->getCombinedNonce(),
1467 1467
             $st->getKey(),
1468
-            ParagonIE_Sodium_Core_Util::store64_le(1)
1468
+            ParagonIE_Sodium_Core_Util::store64_le( 1 )
1469 1469
         );
1470 1470
         #     tag = block[0];
1471 1471
         #     block[0] = in[0];
1472 1472
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, block, sizeof block);
1473
-        $tag = ParagonIE_Sodium_Core_Util::chrToInt($block[0]);
1474
-        $block[0] = $cipher[0];
1475
-        $auth->update($block);
1473
+        $tag = ParagonIE_Sodium_Core_Util::chrToInt( $block[ 0 ] );
1474
+        $block[ 0 ] = $cipher[ 0 ];
1475
+        $auth->update( $block );
1476 1476
 
1477 1477
 
1478 1478
         #     c = in + (sizeof tag);
1479 1479
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, c, mlen);
1480
-        $auth->update(ParagonIE_Sodium_Core_Util::substr($cipher, 1, $msglen));
1480
+        $auth->update( ParagonIE_Sodium_Core_Util::substr( $cipher, 1, $msglen ) );
1481 1481
 
1482 1482
         #     crypto_onetimeauth_poly1305_update
1483 1483
         #     (&poly1305_state, _pad0, (0x10 - (sizeof block) + mlen) & 0xf);
1484
-        $auth->update(str_repeat("\0", ((0x10 - 64 + $msglen) & 0xf)));
1484
+        $auth->update( str_repeat( "\0", ( ( 0x10 - 64 + $msglen ) & 0xf ) ) );
1485 1485
 
1486 1486
         #     STORE64_LE(slen, (uint64_t) adlen);
1487 1487
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1488
-        $slen = ParagonIE_Sodium_Core_Util::store64_le($aadlen);
1489
-        $auth->update($slen);
1488
+        $slen = ParagonIE_Sodium_Core_Util::store64_le( $aadlen );
1489
+        $auth->update( $slen );
1490 1490
 
1491 1491
         #     STORE64_LE(slen, (sizeof block) + mlen);
1492 1492
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1493
-        $slen = ParagonIE_Sodium_Core_Util::store64_le(64 + $msglen);
1494
-        $auth->update($slen);
1493
+        $slen = ParagonIE_Sodium_Core_Util::store64_le( 64 + $msglen );
1494
+        $auth->update( $slen );
1495 1495
 
1496 1496
         #     crypto_onetimeauth_poly1305_final(&poly1305_state, mac);
1497 1497
         #     sodium_memzero(&poly1305_state, sizeof poly1305_state);
@@ -1503,22 +1503,22 @@  discard block
 block discarded – undo
1503 1503
         #         return -1;
1504 1504
         #     }
1505 1505
 
1506
-        $stored = ParagonIE_Sodium_Core_Util::substr($cipher, $msglen + 1, 16);
1507
-        if (!ParagonIE_Sodium_Core_Util::hashEquals($mac, $stored)) {
1506
+        $stored = ParagonIE_Sodium_Core_Util::substr( $cipher, $msglen + 1, 16 );
1507
+        if ( ! ParagonIE_Sodium_Core_Util::hashEquals( $mac, $stored ) ) {
1508 1508
             return false;
1509 1509
         }
1510 1510
 
1511 1511
         #     crypto_stream_chacha20_ietf_xor_ic(m, c, mlen, state->nonce, 2U, state->k);
1512 1512
         $out = ParagonIE_Sodium_Core_ChaCha20::ietfStreamXorIc(
1513
-            ParagonIE_Sodium_Core_Util::substr($cipher, 1, $msglen),
1513
+            ParagonIE_Sodium_Core_Util::substr( $cipher, 1, $msglen ),
1514 1514
             $st->getCombinedNonce(),
1515 1515
             $st->getKey(),
1516
-            ParagonIE_Sodium_Core_Util::store64_le(2)
1516
+            ParagonIE_Sodium_Core_Util::store64_le( 2 )
1517 1517
         );
1518 1518
 
1519 1519
         #     XOR_BUF(STATE_INONCE(state), mac,
1520 1520
         #         crypto_secretstream_xchacha20poly1305_INONCEBYTES);
1521
-        $st->xorNonce($mac);
1521
+        $st->xorNonce( $mac );
1522 1522
 
1523 1523
         #     sodium_increment(STATE_COUNTER(state),
1524 1524
         #         crypto_secretstream_xchacha20poly1305_COUNTERBYTES);
@@ -1534,12 +1534,12 @@  discard block
 block discarded – undo
1534 1534
         $state = $st->toString();
1535 1535
 
1536 1536
         /** @var bool $rekey */
1537
-        $rekey = ($tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY) !== 0;
1538
-        if ($rekey || $st->needsRekey()) {
1537
+        $rekey = ( $tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY ) !== 0;
1538
+        if ( $rekey || $st->needsRekey() ) {
1539 1539
             // DO REKEY
1540
-            self::secretstream_xchacha20poly1305_rekey($state);
1540
+            self::secretstream_xchacha20poly1305_rekey( $state );
1541 1541
         }
1542
-        return array($out, $tag);
1542
+        return array( $out, $tag );
1543 1543
     }
1544 1544
 
1545 1545
     /**
@@ -1547,9 +1547,9 @@  discard block
 block discarded – undo
1547 1547
      * @return void
1548 1548
      * @throws SodiumException
1549 1549
      */
1550
-    public static function secretstream_xchacha20poly1305_rekey(&$state)
1550
+    public static function secretstream_xchacha20poly1305_rekey( &$state )
1551 1551
     {
1552
-        $st = ParagonIE_Sodium_Core_SecretStream_State::fromString($state);
1552
+        $st = ParagonIE_Sodium_Core_SecretStream_State::fromString( $state );
1553 1553
         # unsigned char new_key_and_inonce[crypto_stream_chacha20_ietf_KEYBYTES +
1554 1554
         # crypto_secretstream_xchacha20poly1305_INONCEBYTES];
1555 1555
         # size_t        i;
@@ -1562,18 +1562,18 @@  discard block
 block discarded – undo
1562 1562
         #     new_key_and_inonce[crypto_stream_chacha20_ietf_KEYBYTES + i] =
1563 1563
         #         STATE_INONCE(state)[i];
1564 1564
         # }
1565
-        $new_key_and_inonce .= ParagonIE_Sodium_Core_Util::substR($st->getNonce(), 0, 8);
1565
+        $new_key_and_inonce .= ParagonIE_Sodium_Core_Util::substR( $st->getNonce(), 0, 8 );
1566 1566
 
1567 1567
         # crypto_stream_chacha20_ietf_xor(new_key_and_inonce, new_key_and_inonce,
1568 1568
         #                                 sizeof new_key_and_inonce,
1569 1569
         #                                 state->nonce, state->k);
1570 1570
 
1571
-        $st->rekey(ParagonIE_Sodium_Core_ChaCha20::ietfStreamXorIc(
1571
+        $st->rekey( ParagonIE_Sodium_Core_ChaCha20::ietfStreamXorIc(
1572 1572
             $new_key_and_inonce,
1573 1573
             $st->getCombinedNonce(),
1574 1574
             $st->getKey(),
1575
-            ParagonIE_Sodium_Core_Util::store64_le(0)
1576
-        ));
1575
+            ParagonIE_Sodium_Core_Util::store64_le( 0 )
1576
+        ) );
1577 1577
 
1578 1578
         # for (i = 0U; i < crypto_stream_chacha20_ietf_KEYBYTES; i++) {
1579 1579
         #     state->k[i] = new_key_and_inonce[i];
@@ -1599,9 +1599,9 @@  discard block
 block discarded – undo
1599 1599
      * @throws SodiumException
1600 1600
      * @throws TypeError
1601 1601
      */
1602
-    public static function sign_detached($message, $sk)
1602
+    public static function sign_detached( $message, $sk )
1603 1603
     {
1604
-        return ParagonIE_Sodium_Core_Ed25519::sign_detached($message, $sk);
1604
+        return ParagonIE_Sodium_Core_Ed25519::sign_detached( $message, $sk );
1605 1605
     }
1606 1606
 
1607 1607
     /**
@@ -1615,9 +1615,9 @@  discard block
 block discarded – undo
1615 1615
      * @throws SodiumException
1616 1616
      * @throws TypeError
1617 1617
      */
1618
-    public static function sign($message, $sk)
1618
+    public static function sign( $message, $sk )
1619 1619
     {
1620
-        return ParagonIE_Sodium_Core_Ed25519::sign($message, $sk);
1620
+        return ParagonIE_Sodium_Core_Ed25519::sign( $message, $sk );
1621 1621
     }
1622 1622
 
1623 1623
     /**
@@ -1631,9 +1631,9 @@  discard block
 block discarded – undo
1631 1631
      * @throws SodiumException
1632 1632
      * @throws TypeError
1633 1633
      */
1634
-    public static function sign_open($signedMessage, $pk)
1634
+    public static function sign_open( $signedMessage, $pk )
1635 1635
     {
1636
-        return ParagonIE_Sodium_Core_Ed25519::sign_open($signedMessage, $pk);
1636
+        return ParagonIE_Sodium_Core_Ed25519::sign_open( $signedMessage, $pk );
1637 1637
     }
1638 1638
 
1639 1639
     /**
@@ -1648,8 +1648,8 @@  discard block
 block discarded – undo
1648 1648
      * @throws SodiumException
1649 1649
      * @throws TypeError
1650 1650
      */
1651
-    public static function sign_verify_detached($signature, $message, $pk)
1651
+    public static function sign_verify_detached( $signature, $message, $pk )
1652 1652
     {
1653
-        return ParagonIE_Sodium_Core_Ed25519::verify_detached($signature, $message, $pk);
1653
+        return ParagonIE_Sodium_Core_Ed25519::verify_detached( $signature, $message, $pk );
1654 1654
     }
1655 1655
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/PHP52/SplFixedArray.php 1 patch
Spacing   +28 added lines, -28 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('SplFixedArray')) {
3
+if ( class_exists( 'SplFixedArray' ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -23,7 +23,7 @@  discard block
 block discarded – undo
23 23
      * SplFixedArray constructor.
24 24
      * @param int $size
25 25
      */
26
-    public function __construct($size = 0)
26
+    public function __construct( $size = 0 )
27 27
     {
28 28
         $this->size = $size;
29 29
         $this->internalArray = array();
@@ -34,7 +34,7 @@  discard block
 block discarded – undo
34 34
      */
35 35
     public function count()
36 36
     {
37
-        return count($this->internalArray);
37
+        return count( $this->internalArray );
38 38
     }
39 39
 
40 40
     /**
@@ -42,8 +42,8 @@  discard block
 block discarded – undo
42 42
      */
43 43
     public function toArray()
44 44
     {
45
-        ksort($this->internalArray);
46
-        return (array) $this->internalArray;
45
+        ksort( $this->internalArray );
46
+        return (array)$this->internalArray;
47 47
     }
48 48
 
49 49
     /**
@@ -52,17 +52,17 @@  discard block
 block discarded – undo
52 52
      * @return SplFixedArray
53 53
      * @psalm-suppress MixedAssignment
54 54
      */
55
-    public static function fromArray(array $array, $save_indexes = true)
55
+    public static function fromArray( array $array, $save_indexes = true )
56 56
     {
57
-        $self = new SplFixedArray(count($array));
58
-        if($save_indexes) {
59
-            foreach($array as $key => $value) {
60
-                $self[(int) $key] = $value;
57
+        $self = new SplFixedArray( count( $array ) );
58
+        if ( $save_indexes ) {
59
+            foreach ( $array as $key => $value ) {
60
+                $self[ (int)$key ] = $value;
61 61
             }
62 62
         } else {
63 63
             $i = 0;
64
-            foreach (array_values($array) as $value) {
65
-                $self[$i] = $value;
64
+            foreach ( array_values( $array ) as $value ) {
65
+                $self[ $i ] = $value;
66 66
                 $i++;
67 67
             }
68 68
         }
@@ -81,7 +81,7 @@  discard block
 block discarded – undo
81 81
      * @param int $size
82 82
      * @return bool
83 83
      */
84
-    public function setSize($size)
84
+    public function setSize( $size )
85 85
     {
86 86
         $this->size = $size;
87 87
         return true;
@@ -91,19 +91,19 @@  discard block
 block discarded – undo
91 91
      * @param string|int $index
92 92
      * @return bool
93 93
      */
94
-    public function offsetExists($index)
94
+    public function offsetExists( $index )
95 95
     {
96
-        return array_key_exists((int) $index, $this->internalArray);
96
+        return array_key_exists( (int)$index, $this->internalArray );
97 97
     }
98 98
 
99 99
     /**
100 100
      * @param string|int $index
101 101
      * @return mixed
102 102
      */
103
-    public function offsetGet($index)
103
+    public function offsetGet( $index )
104 104
     {
105 105
         /** @psalm-suppress MixedReturnStatement */
106
-        return $this->internalArray[(int) $index];
106
+        return $this->internalArray[ (int)$index ];
107 107
     }
108 108
 
109 109
     /**
@@ -111,17 +111,17 @@  discard block
 block discarded – undo
111 111
      * @param mixed $newval
112 112
      * @psalm-suppress MixedAssignment
113 113
      */
114
-    public function offsetSet($index, $newval)
114
+    public function offsetSet( $index, $newval )
115 115
     {
116
-        $this->internalArray[(int) $index] = $newval;
116
+        $this->internalArray[ (int)$index ] = $newval;
117 117
     }
118 118
 
119 119
     /**
120 120
      * @param string|int $index
121 121
      */
122
-    public function offsetUnset($index)
122
+    public function offsetUnset( $index )
123 123
     {
124
-        unset($this->internalArray[(int) $index]);
124
+        unset( $this->internalArray[ (int)$index ] );
125 125
     }
126 126
 
127 127
     /**
@@ -132,7 +132,7 @@  discard block
 block discarded – undo
132 132
      */
133 133
     public function rewind()
134 134
     {
135
-        reset($this->internalArray);
135
+        reset( $this->internalArray );
136 136
     }
137 137
 
138 138
     /**
@@ -144,7 +144,7 @@  discard block
 block discarded – undo
144 144
     public function current()
145 145
     {
146 146
         /** @psalm-suppress MixedReturnStatement */
147
-        return current($this->internalArray);
147
+        return current( $this->internalArray );
148 148
     }
149 149
 
150 150
     /**
@@ -153,7 +153,7 @@  discard block
 block discarded – undo
153 153
      */
154 154
     public function key()
155 155
     {
156
-        return key($this->internalArray);
156
+        return key( $this->internalArray );
157 157
     }
158 158
 
159 159
     /**
@@ -161,7 +161,7 @@  discard block
 block discarded – undo
161 161
      */
162 162
     public function next()
163 163
     {
164
-        next($this->internalArray);
164
+        next( $this->internalArray );
165 165
     }
166 166
 
167 167
     /**
@@ -171,11 +171,11 @@  discard block
 block discarded – undo
171 171
      */
172 172
     public function valid()
173 173
     {
174
-        if (empty($this->internalArray)) {
174
+        if ( empty( $this->internalArray ) ) {
175 175
             return false;
176 176
         }
177
-        $result = next($this->internalArray) !== false;
178
-        prev($this->internalArray);
177
+        $result = next( $this->internalArray ) !== false;
178
+        prev( $this->internalArray );
179 179
         return $result;
180 180
     }
181 181
 
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Crypto32.php 1 patch
Spacing   +290 added lines, -290 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Crypto32', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Crypto32', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -75,13 +75,13 @@  discard block
 block discarded – undo
75 75
         $key = ''
76 76
     ) {
77 77
         /** @var int $len - Length of message (ciphertext + MAC) */
78
-        $len = ParagonIE_Sodium_Core32_Util::strlen($message);
78
+        $len = ParagonIE_Sodium_Core32_Util::strlen( $message );
79 79
 
80 80
         /** @var int  $clen - Length of ciphertext */
81 81
         $clen = $len - self::aead_chacha20poly1305_ABYTES;
82 82
 
83 83
         /** @var int $adlen - Length of associated data */
84
-        $adlen = ParagonIE_Sodium_Core32_Util::strlen($ad);
84
+        $adlen = ParagonIE_Sodium_Core32_Util::strlen( $ad );
85 85
 
86 86
         /** @var string $mac - Message authentication code */
87 87
         $mac = ParagonIE_Sodium_Core32_Util::substr(
@@ -91,7 +91,7 @@  discard block
 block discarded – undo
91 91
         );
92 92
 
93 93
         /** @var string $ciphertext - The encrypted message (sans MAC) */
94
-        $ciphertext = ParagonIE_Sodium_Core32_Util::substr($message, 0, $clen);
94
+        $ciphertext = ParagonIE_Sodium_Core32_Util::substr( $message, 0, $clen );
95 95
 
96 96
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
97 97
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::stream(
@@ -101,21 +101,21 @@  discard block
 block discarded – undo
101 101
         );
102 102
 
103 103
         /* Recalculate the Poly1305 authentication tag (MAC): */
104
-        $state = new ParagonIE_Sodium_Core32_Poly1305_State($block0);
104
+        $state = new ParagonIE_Sodium_Core32_Poly1305_State( $block0 );
105 105
         try {
106
-            ParagonIE_Sodium_Compat::memzero($block0);
107
-        } catch (SodiumException $ex) {
106
+            ParagonIE_Sodium_Compat::memzero( $block0 );
107
+        } catch ( SodiumException $ex ) {
108 108
             $block0 = null;
109 109
         }
110
-        $state->update($ad);
111
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($adlen));
112
-        $state->update($ciphertext);
113
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($clen));
110
+        $state->update( $ad );
111
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $adlen ) );
112
+        $state->update( $ciphertext );
113
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $clen ) );
114 114
         $computed_mac = $state->finish();
115 115
 
116 116
         /* Compare the given MAC with the recalculated MAC: */
117
-        if (!ParagonIE_Sodium_Core32_Util::verify_16($computed_mac, $mac)) {
118
-            throw new SodiumException('Invalid MAC');
117
+        if ( ! ParagonIE_Sodium_Core32_Util::verify_16( $computed_mac, $mac ) ) {
118
+            throw new SodiumException( 'Invalid MAC' );
119 119
         }
120 120
 
121 121
         // Here, we know that the MAC is valid, so we decrypt and return the plaintext
@@ -123,7 +123,7 @@  discard block
 block discarded – undo
123 123
             $ciphertext,
124 124
             $nonce,
125 125
             $key,
126
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
126
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
127 127
         );
128 128
     }
129 129
 
@@ -147,10 +147,10 @@  discard block
 block discarded – undo
147 147
         $key = ''
148 148
     ) {
149 149
         /** @var int $len - Length of the plaintext message */
150
-        $len = ParagonIE_Sodium_Core32_Util::strlen($message);
150
+        $len = ParagonIE_Sodium_Core32_Util::strlen( $message );
151 151
 
152 152
         /** @var int $adlen - Length of the associated data */
153
-        $adlen = ParagonIE_Sodium_Core32_Util::strlen($ad);
153
+        $adlen = ParagonIE_Sodium_Core32_Util::strlen( $ad );
154 154
 
155 155
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
156 156
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::stream(
@@ -158,10 +158,10 @@  discard block
 block discarded – undo
158 158
             $nonce,
159 159
             $key
160 160
         );
161
-        $state = new ParagonIE_Sodium_Core32_Poly1305_State($block0);
161
+        $state = new ParagonIE_Sodium_Core32_Poly1305_State( $block0 );
162 162
         try {
163
-            ParagonIE_Sodium_Compat::memzero($block0);
164
-        } catch (SodiumException $ex) {
163
+            ParagonIE_Sodium_Compat::memzero( $block0 );
164
+        } catch ( SodiumException $ex ) {
165 165
             $block0 = null;
166 166
         }
167 167
 
@@ -170,13 +170,13 @@  discard block
 block discarded – undo
170 170
             $message,
171 171
             $nonce,
172 172
             $key,
173
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
173
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
174 174
         );
175 175
 
176
-        $state->update($ad);
177
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($adlen));
178
-        $state->update($ciphertext);
179
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($len));
176
+        $state->update( $ad );
177
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $adlen ) );
178
+        $state->update( $ciphertext );
179
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $len ) );
180 180
         return $ciphertext . $state->finish();
181 181
     }
182 182
 
@@ -200,10 +200,10 @@  discard block
 block discarded – undo
200 200
         $key = ''
201 201
     ) {
202 202
         /** @var int $adlen - Length of associated data */
203
-        $adlen = ParagonIE_Sodium_Core32_Util::strlen($ad);
203
+        $adlen = ParagonIE_Sodium_Core32_Util::strlen( $ad );
204 204
 
205 205
         /** @var int $len - Length of message (ciphertext + MAC) */
206
-        $len = ParagonIE_Sodium_Core32_Util::strlen($message);
206
+        $len = ParagonIE_Sodium_Core32_Util::strlen( $message );
207 207
 
208 208
         /** @var int  $clen - Length of ciphertext */
209 209
         $clen = $len - self::aead_chacha20poly1305_IETF_ABYTES;
@@ -230,23 +230,23 @@  discard block
 block discarded – undo
230 230
         );
231 231
 
232 232
         /* Recalculate the Poly1305 authentication tag (MAC): */
233
-        $state = new ParagonIE_Sodium_Core32_Poly1305_State($block0);
233
+        $state = new ParagonIE_Sodium_Core32_Poly1305_State( $block0 );
234 234
         try {
235
-            ParagonIE_Sodium_Compat::memzero($block0);
236
-        } catch (SodiumException $ex) {
235
+            ParagonIE_Sodium_Compat::memzero( $block0 );
236
+        } catch ( SodiumException $ex ) {
237 237
             $block0 = null;
238 238
         }
239
-        $state->update($ad);
240
-        $state->update(str_repeat("\x00", ((0x10 - $adlen) & 0xf)));
241
-        $state->update($ciphertext);
242
-        $state->update(str_repeat("\x00", (0x10 - $clen) & 0xf));
243
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($adlen));
244
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($clen));
239
+        $state->update( $ad );
240
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $adlen ) & 0xf ) ) );
241
+        $state->update( $ciphertext );
242
+        $state->update( str_repeat( "\x00", ( 0x10 - $clen ) & 0xf ) );
243
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $adlen ) );
244
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $clen ) );
245 245
         $computed_mac = $state->finish();
246 246
 
247 247
         /* Compare the given MAC with the recalculated MAC: */
248
-        if (!ParagonIE_Sodium_Core32_Util::verify_16($computed_mac, $mac)) {
249
-            throw new SodiumException('Invalid MAC');
248
+        if ( ! ParagonIE_Sodium_Core32_Util::verify_16( $computed_mac, $mac ) ) {
249
+            throw new SodiumException( 'Invalid MAC' );
250 250
         }
251 251
 
252 252
         // Here, we know that the MAC is valid, so we decrypt and return the plaintext
@@ -254,7 +254,7 @@  discard block
 block discarded – undo
254 254
             $ciphertext,
255 255
             $nonce,
256 256
             $key,
257
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
257
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
258 258
         );
259 259
     }
260 260
 
@@ -278,10 +278,10 @@  discard block
 block discarded – undo
278 278
         $key = ''
279 279
     ) {
280 280
         /** @var int $len - Length of the plaintext message */
281
-        $len = ParagonIE_Sodium_Core32_Util::strlen($message);
281
+        $len = ParagonIE_Sodium_Core32_Util::strlen( $message );
282 282
 
283 283
         /** @var int $adlen - Length of the associated data */
284
-        $adlen = ParagonIE_Sodium_Core32_Util::strlen($ad);
284
+        $adlen = ParagonIE_Sodium_Core32_Util::strlen( $ad );
285 285
 
286 286
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
287 287
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::ietfStream(
@@ -289,10 +289,10 @@  discard block
 block discarded – undo
289 289
             $nonce,
290 290
             $key
291 291
         );
292
-        $state = new ParagonIE_Sodium_Core32_Poly1305_State($block0);
292
+        $state = new ParagonIE_Sodium_Core32_Poly1305_State( $block0 );
293 293
         try {
294
-            ParagonIE_Sodium_Compat::memzero($block0);
295
-        } catch (SodiumException $ex) {
294
+            ParagonIE_Sodium_Compat::memzero( $block0 );
295
+        } catch ( SodiumException $ex ) {
296 296
             $block0 = null;
297 297
         }
298 298
 
@@ -301,15 +301,15 @@  discard block
 block discarded – undo
301 301
             $message,
302 302
             $nonce,
303 303
             $key,
304
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
304
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
305 305
         );
306 306
 
307
-        $state->update($ad);
308
-        $state->update(str_repeat("\x00", ((0x10 - $adlen) & 0xf)));
309
-        $state->update($ciphertext);
310
-        $state->update(str_repeat("\x00", ((0x10 - $len) & 0xf)));
311
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($adlen));
312
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($len));
307
+        $state->update( $ad );
308
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $adlen ) & 0xf ) ) );
309
+        $state->update( $ciphertext );
310
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $len ) & 0xf ) ) );
311
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $adlen ) );
312
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $len ) );
313 313
         return $ciphertext . $state->finish();
314 314
     }
315 315
 
@@ -333,13 +333,13 @@  discard block
 block discarded – undo
333 333
         $key = ''
334 334
     ) {
335 335
         $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20(
336
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 0, 16),
336
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 0, 16 ),
337 337
             $key
338 338
         );
339 339
         $nonceLast = "\x00\x00\x00\x00" .
340
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8);
340
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 );
341 341
 
342
-        return self::aead_chacha20poly1305_ietf_decrypt($message, $ad, $nonceLast, $subkey);
342
+        return self::aead_chacha20poly1305_ietf_decrypt( $message, $ad, $nonceLast, $subkey );
343 343
     }
344 344
 
345 345
     /**
@@ -362,13 +362,13 @@  discard block
 block discarded – undo
362 362
         $key = ''
363 363
     ) {
364 364
         $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20(
365
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 0, 16),
365
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 0, 16 ),
366 366
             $key
367 367
         );
368 368
         $nonceLast = "\x00\x00\x00\x00" .
369
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8);
369
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 );
370 370
 
371
-        return self::aead_chacha20poly1305_ietf_encrypt($message, $ad, $nonceLast, $subkey);
371
+        return self::aead_chacha20poly1305_ietf_encrypt( $message, $ad, $nonceLast, $subkey );
372 372
     }
373 373
 
374 374
     /**
@@ -381,10 +381,10 @@  discard block
 block discarded – undo
381 381
      * @return string
382 382
      * @throws TypeError
383 383
      */
384
-    public static function auth($message, $key)
384
+    public static function auth( $message, $key )
385 385
     {
386 386
         return ParagonIE_Sodium_Core32_Util::substr(
387
-            hash_hmac('sha512', $message, $key, true),
387
+            hash_hmac( 'sha512', $message, $key, true ),
388 388
             0,
389 389
             32
390 390
         );
@@ -402,11 +402,11 @@  discard block
 block discarded – undo
402 402
      * @throws SodiumException
403 403
      * @throws TypeError
404 404
      */
405
-    public static function auth_verify($mac, $message, $key)
405
+    public static function auth_verify( $mac, $message, $key )
406 406
     {
407 407
         return ParagonIE_Sodium_Core32_Util::hashEquals(
408 408
             $mac,
409
-            self::auth($message, $key)
409
+            self::auth( $message, $key )
410 410
         );
411 411
     }
412 412
 
@@ -422,14 +422,14 @@  discard block
 block discarded – undo
422 422
      * @throws SodiumException
423 423
      * @throws TypeError
424 424
      */
425
-    public static function box($plaintext, $nonce, $keypair)
425
+    public static function box( $plaintext, $nonce, $keypair )
426 426
     {
427 427
         return self::secretbox(
428 428
             $plaintext,
429 429
             $nonce,
430 430
             self::box_beforenm(
431
-                self::box_secretkey($keypair),
432
-                self::box_publickey($keypair)
431
+                self::box_secretkey( $keypair ),
432
+                self::box_publickey( $keypair )
433 433
             )
434 434
         );
435 435
     }
@@ -445,16 +445,16 @@  discard block
 block discarded – undo
445 445
      * @throws SodiumException
446 446
      * @throws TypeError
447 447
      */
448
-    public static function box_seal($message, $publicKey)
448
+    public static function box_seal( $message, $publicKey )
449 449
     {
450 450
         /** @var string $ephemeralKeypair */
451 451
         $ephemeralKeypair = self::box_keypair();
452 452
 
453 453
         /** @var string $ephemeralSK */
454
-        $ephemeralSK = self::box_secretkey($ephemeralKeypair);
454
+        $ephemeralSK = self::box_secretkey( $ephemeralKeypair );
455 455
 
456 456
         /** @var string $ephemeralPK */
457
-        $ephemeralPK = self::box_publickey($ephemeralKeypair);
457
+        $ephemeralPK = self::box_publickey( $ephemeralKeypair );
458 458
 
459 459
         /** @var string $nonce */
460 460
         $nonce = self::generichash(
@@ -464,15 +464,15 @@  discard block
 block discarded – undo
464 464
         );
465 465
 
466 466
         /** @var string $keypair - The combined keypair used in crypto_box() */
467
-        $keypair = self::box_keypair_from_secretkey_and_publickey($ephemeralSK, $publicKey);
467
+        $keypair = self::box_keypair_from_secretkey_and_publickey( $ephemeralSK, $publicKey );
468 468
 
469 469
         /** @var string $ciphertext Ciphertext + MAC from crypto_box */
470
-        $ciphertext = self::box($message, $nonce, $keypair);
470
+        $ciphertext = self::box( $message, $nonce, $keypair );
471 471
         try {
472
-            ParagonIE_Sodium_Compat::memzero($ephemeralKeypair);
473
-            ParagonIE_Sodium_Compat::memzero($ephemeralSK);
474
-            ParagonIE_Sodium_Compat::memzero($nonce);
475
-        } catch (SodiumException $ex) {
472
+            ParagonIE_Sodium_Compat::memzero( $ephemeralKeypair );
473
+            ParagonIE_Sodium_Compat::memzero( $ephemeralSK );
474
+            ParagonIE_Sodium_Compat::memzero( $nonce );
475
+        } catch ( SodiumException $ex ) {
476 476
             $ephemeralKeypair = null;
477 477
             $ephemeralSK = null;
478 478
             $nonce = null;
@@ -491,19 +491,19 @@  discard block
 block discarded – undo
491 491
      * @throws SodiumException
492 492
      * @throws TypeError
493 493
      */
494
-    public static function box_seal_open($message, $keypair)
494
+    public static function box_seal_open( $message, $keypair )
495 495
     {
496 496
         /** @var string $ephemeralPK */
497
-        $ephemeralPK = ParagonIE_Sodium_Core32_Util::substr($message, 0, 32);
497
+        $ephemeralPK = ParagonIE_Sodium_Core32_Util::substr( $message, 0, 32 );
498 498
 
499 499
         /** @var string $ciphertext (ciphertext + MAC) */
500
-        $ciphertext = ParagonIE_Sodium_Core32_Util::substr($message, 32);
500
+        $ciphertext = ParagonIE_Sodium_Core32_Util::substr( $message, 32 );
501 501
 
502 502
         /** @var string $secretKey */
503
-        $secretKey = self::box_secretkey($keypair);
503
+        $secretKey = self::box_secretkey( $keypair );
504 504
 
505 505
         /** @var string $publicKey */
506
-        $publicKey = self::box_publickey($keypair);
506
+        $publicKey = self::box_publickey( $keypair );
507 507
 
508 508
         /** @var string $nonce */
509 509
         $nonce = self::generichash(
@@ -513,15 +513,15 @@  discard block
 block discarded – undo
513 513
         );
514 514
 
515 515
         /** @var string $keypair */
516
-        $keypair = self::box_keypair_from_secretkey_and_publickey($secretKey, $ephemeralPK);
516
+        $keypair = self::box_keypair_from_secretkey_and_publickey( $secretKey, $ephemeralPK );
517 517
 
518 518
         /** @var string $m */
519
-        $m = self::box_open($ciphertext, $nonce, $keypair);
519
+        $m = self::box_open( $ciphertext, $nonce, $keypair );
520 520
         try {
521
-            ParagonIE_Sodium_Compat::memzero($secretKey);
522
-            ParagonIE_Sodium_Compat::memzero($ephemeralPK);
523
-            ParagonIE_Sodium_Compat::memzero($nonce);
524
-        } catch (SodiumException $ex) {
521
+            ParagonIE_Sodium_Compat::memzero( $secretKey );
522
+            ParagonIE_Sodium_Compat::memzero( $ephemeralPK );
523
+            ParagonIE_Sodium_Compat::memzero( $nonce );
524
+        } catch ( SodiumException $ex ) {
525 525
             $secretKey = null;
526 526
             $ephemeralPK = null;
527 527
             $nonce = null;
@@ -540,11 +540,11 @@  discard block
 block discarded – undo
540 540
      * @throws SodiumException
541 541
      * @throws TypeError
542 542
      */
543
-    public static function box_beforenm($sk, $pk)
543
+    public static function box_beforenm( $sk, $pk )
544 544
     {
545 545
         return ParagonIE_Sodium_Core32_HSalsa20::hsalsa20(
546
-            str_repeat("\x00", 16),
547
-            self::scalarmult($sk, $pk)
546
+            str_repeat( "\x00", 16 ),
547
+            self::scalarmult( $sk, $pk )
548 548
         );
549 549
     }
550 550
 
@@ -558,8 +558,8 @@  discard block
 block discarded – undo
558 558
      */
559 559
     public static function box_keypair()
560 560
     {
561
-        $sKey = random_bytes(32);
562
-        $pKey = self::scalarmult_base($sKey);
561
+        $sKey = random_bytes( 32 );
562
+        $pKey = self::scalarmult_base( $sKey );
563 563
         return $sKey . $pKey;
564 564
     }
565 565
 
@@ -569,14 +569,14 @@  discard block
 block discarded – undo
569 569
      * @throws SodiumException
570 570
      * @throws TypeError
571 571
      */
572
-    public static function box_seed_keypair($seed)
572
+    public static function box_seed_keypair( $seed )
573 573
     {
574 574
         $sKey = ParagonIE_Sodium_Core32_Util::substr(
575
-            hash('sha512', $seed, true),
575
+            hash( 'sha512', $seed, true ),
576 576
             0,
577 577
             32
578 578
         );
579
-        $pKey = self::scalarmult_base($sKey);
579
+        $pKey = self::scalarmult_base( $sKey );
580 580
         return $sKey . $pKey;
581 581
     }
582 582
 
@@ -588,10 +588,10 @@  discard block
 block discarded – undo
588 588
      * @return string
589 589
      * @throws TypeError
590 590
      */
591
-    public static function box_keypair_from_secretkey_and_publickey($sKey, $pKey)
591
+    public static function box_keypair_from_secretkey_and_publickey( $sKey, $pKey )
592 592
     {
593
-        return ParagonIE_Sodium_Core32_Util::substr($sKey, 0, 32) .
594
-            ParagonIE_Sodium_Core32_Util::substr($pKey, 0, 32);
593
+        return ParagonIE_Sodium_Core32_Util::substr( $sKey, 0, 32 ) .
594
+            ParagonIE_Sodium_Core32_Util::substr( $pKey, 0, 32 );
595 595
     }
596 596
 
597 597
     /**
@@ -602,14 +602,14 @@  discard block
 block discarded – undo
602 602
      * @throws RangeException
603 603
      * @throws TypeError
604 604
      */
605
-    public static function box_secretkey($keypair)
605
+    public static function box_secretkey( $keypair )
606 606
     {
607
-        if (ParagonIE_Sodium_Core32_Util::strlen($keypair) !== 64) {
607
+        if ( ParagonIE_Sodium_Core32_Util::strlen( $keypair ) !== 64 ) {
608 608
             throw new RangeException(
609 609
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES bytes long.'
610 610
             );
611 611
         }
612
-        return ParagonIE_Sodium_Core32_Util::substr($keypair, 0, 32);
612
+        return ParagonIE_Sodium_Core32_Util::substr( $keypair, 0, 32 );
613 613
     }
614 614
 
615 615
     /**
@@ -620,14 +620,14 @@  discard block
 block discarded – undo
620 620
      * @throws RangeException
621 621
      * @throws TypeError
622 622
      */
623
-    public static function box_publickey($keypair)
623
+    public static function box_publickey( $keypair )
624 624
     {
625
-        if (ParagonIE_Sodium_Core32_Util::strlen($keypair) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES) {
625
+        if ( ParagonIE_Sodium_Core32_Util::strlen( $keypair ) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES ) {
626 626
             throw new RangeException(
627 627
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES bytes long.'
628 628
             );
629 629
         }
630
-        return ParagonIE_Sodium_Core32_Util::substr($keypair, 32, 32);
630
+        return ParagonIE_Sodium_Core32_Util::substr( $keypair, 32, 32 );
631 631
     }
632 632
 
633 633
     /**
@@ -639,14 +639,14 @@  discard block
 block discarded – undo
639 639
      * @throws SodiumException
640 640
      * @throws TypeError
641 641
      */
642
-    public static function box_publickey_from_secretkey($sKey)
642
+    public static function box_publickey_from_secretkey( $sKey )
643 643
     {
644
-        if (ParagonIE_Sodium_Core32_Util::strlen($sKey) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES) {
644
+        if ( ParagonIE_Sodium_Core32_Util::strlen( $sKey ) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES ) {
645 645
             throw new RangeException(
646 646
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES bytes long.'
647 647
             );
648 648
         }
649
-        return self::scalarmult_base($sKey);
649
+        return self::scalarmult_base( $sKey );
650 650
     }
651 651
 
652 652
     /**
@@ -661,14 +661,14 @@  discard block
 block discarded – undo
661 661
      * @throws SodiumException
662 662
      * @throws TypeError
663 663
      */
664
-    public static function box_open($ciphertext, $nonce, $keypair)
664
+    public static function box_open( $ciphertext, $nonce, $keypair )
665 665
     {
666 666
         return self::secretbox_open(
667 667
             $ciphertext,
668 668
             $nonce,
669 669
             self::box_beforenm(
670
-                self::box_secretkey($keypair),
671
-                self::box_publickey($keypair)
670
+                self::box_secretkey( $keypair ),
671
+                self::box_publickey( $keypair )
672 672
             )
673 673
         );
674 674
     }
@@ -686,34 +686,34 @@  discard block
 block discarded – undo
686 686
      * @throws SodiumException
687 687
      * @throws TypeError
688 688
      */
689
-    public static function generichash($message, $key = '', $outlen = 32)
689
+    public static function generichash( $message, $key = '', $outlen = 32 )
690 690
     {
691 691
         // This ensures that ParagonIE_Sodium_Core32_BLAKE2b::$iv is initialized
692 692
         ParagonIE_Sodium_Core32_BLAKE2b::pseudoConstructor();
693 693
 
694 694
         $k = null;
695
-        if (!empty($key)) {
695
+        if ( ! empty( $key ) ) {
696 696
             /** @var SplFixedArray $k */
697
-            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($key);
698
-            if ($k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES) {
699
-                throw new RangeException('Invalid key size');
697
+            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $key );
698
+            if ( $k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES ) {
699
+                throw new RangeException( 'Invalid key size' );
700 700
             }
701 701
         }
702 702
 
703 703
         /** @var SplFixedArray $in */
704
-        $in = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($message);
704
+        $in = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $message );
705 705
 
706 706
         /** @var SplFixedArray $ctx */
707
-        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init($k, $outlen);
708
-        ParagonIE_Sodium_Core32_BLAKE2b::update($ctx, $in, $in->count());
707
+        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init( $k, $outlen );
708
+        ParagonIE_Sodium_Core32_BLAKE2b::update( $ctx, $in, $in->count() );
709 709
 
710 710
         /** @var SplFixedArray $out */
711
-        $out = new SplFixedArray($outlen);
712
-        $out = ParagonIE_Sodium_Core32_BLAKE2b::finish($ctx, $out);
711
+        $out = new SplFixedArray( $outlen );
712
+        $out = ParagonIE_Sodium_Core32_BLAKE2b::finish( $ctx, $out );
713 713
 
714 714
         /** @var array<int, int> */
715 715
         $outArray = $out->toArray();
716
-        return ParagonIE_Sodium_Core32_Util::intArrayToString($outArray);
716
+        return ParagonIE_Sodium_Core32_Util::intArrayToString( $outArray );
717 717
     }
718 718
 
719 719
     /**
@@ -727,22 +727,22 @@  discard block
 block discarded – undo
727 727
      * @throws SodiumException
728 728
      * @throws TypeError
729 729
      */
730
-    public static function generichash_final($ctx, $outlen = 32)
730
+    public static function generichash_final( $ctx, $outlen = 32 )
731 731
     {
732
-        if (!is_string($ctx)) {
733
-            throw new TypeError('Context must be a string');
732
+        if ( ! is_string( $ctx ) ) {
733
+            throw new TypeError( 'Context must be a string' );
734 734
         }
735
-        $out = new SplFixedArray($outlen);
735
+        $out = new SplFixedArray( $outlen );
736 736
 
737 737
         /** @var SplFixedArray $context */
738
-        $context = ParagonIE_Sodium_Core32_BLAKE2b::stringToContext($ctx);
738
+        $context = ParagonIE_Sodium_Core32_BLAKE2b::stringToContext( $ctx );
739 739
 
740 740
         /** @var SplFixedArray $out */
741
-        $out = ParagonIE_Sodium_Core32_BLAKE2b::finish($context, $out);
741
+        $out = ParagonIE_Sodium_Core32_BLAKE2b::finish( $context, $out );
742 742
 
743 743
         /** @var array<int, int> */
744 744
         $outArray = $out->toArray();
745
-        return ParagonIE_Sodium_Core32_Util::intArrayToString($outArray);
745
+        return ParagonIE_Sodium_Core32_Util::intArrayToString( $outArray );
746 746
     }
747 747
 
748 748
     /**
@@ -757,23 +757,23 @@  discard block
 block discarded – undo
757 757
      * @throws SodiumException
758 758
      * @throws TypeError
759 759
      */
760
-    public static function generichash_init($key = '', $outputLength = 32)
760
+    public static function generichash_init( $key = '', $outputLength = 32 )
761 761
     {
762 762
         // This ensures that ParagonIE_Sodium_Core32_BLAKE2b::$iv is initialized
763 763
         ParagonIE_Sodium_Core32_BLAKE2b::pseudoConstructor();
764 764
 
765 765
         $k = null;
766
-        if (!empty($key)) {
767
-            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($key);
768
-            if ($k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES) {
769
-                throw new RangeException('Invalid key size');
766
+        if ( ! empty( $key ) ) {
767
+            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $key );
768
+            if ( $k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES ) {
769
+                throw new RangeException( 'Invalid key size' );
770 770
             }
771 771
         }
772 772
 
773 773
         /** @var SplFixedArray $ctx */
774
-        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init($k, $outputLength);
774
+        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init( $k, $outputLength );
775 775
 
776
-        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString($ctx);
776
+        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString( $ctx );
777 777
     }
778 778
 
779 779
     /**
@@ -800,27 +800,27 @@  discard block
 block discarded – undo
800 800
         ParagonIE_Sodium_Core32_BLAKE2b::pseudoConstructor();
801 801
 
802 802
         $k = null;
803
-        if (!empty($key)) {
804
-            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($key);
805
-            if ($k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES) {
806
-                throw new RangeException('Invalid key size');
803
+        if ( ! empty( $key ) ) {
804
+            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $key );
805
+            if ( $k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES ) {
806
+                throw new RangeException( 'Invalid key size' );
807 807
             }
808 808
         }
809
-        if (!empty($salt)) {
810
-            $s = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($salt);
809
+        if ( ! empty( $salt ) ) {
810
+            $s = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $salt );
811 811
         } else {
812 812
             $s = null;
813 813
         }
814
-        if (!empty($salt)) {
815
-            $p = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($personal);
814
+        if ( ! empty( $salt ) ) {
815
+            $p = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $personal );
816 816
         } else {
817 817
             $p = null;
818 818
         }
819 819
 
820 820
         /** @var SplFixedArray $ctx */
821
-        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init($k, $outputLength, $s, $p);
821
+        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init( $k, $outputLength, $s, $p );
822 822
 
823
-        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString($ctx);
823
+        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString( $ctx );
824 824
     }
825 825
 
826 826
     /**
@@ -834,20 +834,20 @@  discard block
 block discarded – undo
834 834
      * @throws SodiumException
835 835
      * @throws TypeError
836 836
      */
837
-    public static function generichash_update($ctx, $message)
837
+    public static function generichash_update( $ctx, $message )
838 838
     {
839 839
         // This ensures that ParagonIE_Sodium_Core32_BLAKE2b::$iv is initialized
840 840
         ParagonIE_Sodium_Core32_BLAKE2b::pseudoConstructor();
841 841
 
842 842
         /** @var SplFixedArray $context */
843
-        $context = ParagonIE_Sodium_Core32_BLAKE2b::stringToContext($ctx);
843
+        $context = ParagonIE_Sodium_Core32_BLAKE2b::stringToContext( $ctx );
844 844
 
845 845
         /** @var SplFixedArray $in */
846
-        $in = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($message);
846
+        $in = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $message );
847 847
 
848
-        ParagonIE_Sodium_Core32_BLAKE2b::update($context, $in, $in->count());
848
+        ParagonIE_Sodium_Core32_BLAKE2b::update( $context, $in, $in->count() );
849 849
 
850
-        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString($context);
850
+        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString( $context );
851 851
     }
852 852
 
853 853
     /**
@@ -863,10 +863,10 @@  discard block
 block discarded – undo
863 863
      * @throws SodiumException
864 864
      * @throws TypeError
865 865
      */
866
-    public static function keyExchange($my_sk, $their_pk, $client_pk, $server_pk)
866
+    public static function keyExchange( $my_sk, $their_pk, $client_pk, $server_pk )
867 867
     {
868 868
         return self::generichash(
869
-            self::scalarmult($my_sk, $their_pk) .
869
+            self::scalarmult( $my_sk, $their_pk ) .
870 870
             $client_pk .
871 871
             $server_pk
872 872
         );
@@ -884,10 +884,10 @@  discard block
 block discarded – undo
884 884
      * @throws SodiumException
885 885
      * @throws TypeError
886 886
      */
887
-    public static function scalarmult($sKey, $pKey)
887
+    public static function scalarmult( $sKey, $pKey )
888 888
     {
889
-        $q = ParagonIE_Sodium_Core32_X25519::crypto_scalarmult_curve25519_ref10($sKey, $pKey);
890
-        self::scalarmult_throw_if_zero($q);
889
+        $q = ParagonIE_Sodium_Core32_X25519::crypto_scalarmult_curve25519_ref10( $sKey, $pKey );
890
+        self::scalarmult_throw_if_zero( $q );
891 891
         return $q;
892 892
     }
893 893
 
@@ -901,10 +901,10 @@  discard block
 block discarded – undo
901 901
      * @throws SodiumException
902 902
      * @throws TypeError
903 903
      */
904
-    public static function scalarmult_base($secret)
904
+    public static function scalarmult_base( $secret )
905 905
     {
906
-        $q = ParagonIE_Sodium_Core32_X25519::crypto_scalarmult_curve25519_ref10_base($secret);
907
-        self::scalarmult_throw_if_zero($q);
906
+        $q = ParagonIE_Sodium_Core32_X25519::crypto_scalarmult_curve25519_ref10_base( $secret );
907
+        self::scalarmult_throw_if_zero( $q );
908 908
         return $q;
909 909
     }
910 910
 
@@ -916,16 +916,16 @@  discard block
 block discarded – undo
916 916
      * @throws SodiumException
917 917
      * @throws TypeError
918 918
      */
919
-    protected static function scalarmult_throw_if_zero($q)
919
+    protected static function scalarmult_throw_if_zero( $q )
920 920
     {
921 921
         $d = 0;
922
-        for ($i = 0; $i < self::box_curve25519xsalsa20poly1305_SECRETKEYBYTES; ++$i) {
923
-            $d |= ParagonIE_Sodium_Core32_Util::chrToInt($q[$i]);
922
+        for ( $i = 0; $i < self::box_curve25519xsalsa20poly1305_SECRETKEYBYTES; ++$i ) {
923
+            $d |= ParagonIE_Sodium_Core32_Util::chrToInt( $q[ $i ] );
924 924
         }
925 925
 
926 926
         /* branch-free variant of === 0 */
927
-        if (-(1 & (($d - 1) >> 8))) {
928
-            throw new SodiumException('Zero public key is not allowed');
927
+        if (-( 1 & ( ( $d - 1 ) >> 8 ) )) {
928
+            throw new SodiumException( 'Zero public key is not allowed' );
929 929
         }
930 930
     }
931 931
 
@@ -941,26 +941,26 @@  discard block
 block discarded – undo
941 941
      * @throws SodiumException
942 942
      * @throws TypeError
943 943
      */
944
-    public static function secretbox($plaintext, $nonce, $key)
944
+    public static function secretbox( $plaintext, $nonce, $key )
945 945
     {
946 946
         /** @var string $subkey */
947
-        $subkey = ParagonIE_Sodium_Core32_HSalsa20::hsalsa20($nonce, $key);
947
+        $subkey = ParagonIE_Sodium_Core32_HSalsa20::hsalsa20( $nonce, $key );
948 948
 
949 949
         /** @var string $block0 */
950
-        $block0 = str_repeat("\x00", 32);
950
+        $block0 = str_repeat( "\x00", 32 );
951 951
 
952 952
         /** @var int $mlen - Length of the plaintext message */
953
-        $mlen = ParagonIE_Sodium_Core32_Util::strlen($plaintext);
953
+        $mlen = ParagonIE_Sodium_Core32_Util::strlen( $plaintext );
954 954
         $mlen0 = $mlen;
955
-        if ($mlen0 > 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES) {
955
+        if ( $mlen0 > 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES ) {
956 956
             $mlen0 = 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES;
957 957
         }
958
-        $block0 .= ParagonIE_Sodium_Core32_Util::substr($plaintext, 0, $mlen0);
958
+        $block0 .= ParagonIE_Sodium_Core32_Util::substr( $plaintext, 0, $mlen0 );
959 959
 
960 960
         /** @var string $block0 */
961 961
         $block0 = ParagonIE_Sodium_Core32_Salsa20::salsa20_xor(
962 962
             $block0,
963
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
963
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
964 964
             $subkey
965 965
         );
966 966
 
@@ -969,13 +969,13 @@  discard block
 block discarded – undo
969 969
             $block0,
970 970
             self::secretbox_xsalsa20poly1305_ZEROBYTES
971 971
         );
972
-        if ($mlen > $mlen0) {
972
+        if ( $mlen > $mlen0 ) {
973 973
             $c .= ParagonIE_Sodium_Core32_Salsa20::salsa20_xor_ic(
974 974
                 ParagonIE_Sodium_Core32_Util::substr(
975 975
                     $plaintext,
976 976
                     self::secretbox_xsalsa20poly1305_ZEROBYTES
977 977
                 ),
978
-                ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
978
+                ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
979 979
                 1,
980 980
                 $subkey
981 981
             );
@@ -988,18 +988,18 @@  discard block
 block discarded – undo
988 988
             )
989 989
         );
990 990
         try {
991
-            ParagonIE_Sodium_Compat::memzero($block0);
992
-            ParagonIE_Sodium_Compat::memzero($subkey);
993
-        } catch (SodiumException $ex) {
991
+            ParagonIE_Sodium_Compat::memzero( $block0 );
992
+            ParagonIE_Sodium_Compat::memzero( $subkey );
993
+        } catch ( SodiumException $ex ) {
994 994
             $block0 = null;
995 995
             $subkey = null;
996 996
         }
997 997
 
998
-        $state->update($c);
998
+        $state->update( $c );
999 999
 
1000 1000
         /** @var string $c - MAC || ciphertext */
1001 1001
         $c = $state->finish() . $c;
1002
-        unset($state);
1002
+        unset( $state );
1003 1003
 
1004 1004
         return $c;
1005 1005
     }
@@ -1016,7 +1016,7 @@  discard block
 block discarded – undo
1016 1016
      * @throws SodiumException
1017 1017
      * @throws TypeError
1018 1018
      */
1019
-    public static function secretbox_open($ciphertext, $nonce, $key)
1019
+    public static function secretbox_open( $ciphertext, $nonce, $key )
1020 1020
     {
1021 1021
         /** @var string $mac */
1022 1022
         $mac = ParagonIE_Sodium_Core32_Util::substr(
@@ -1032,46 +1032,46 @@  discard block
 block discarded – undo
1032 1032
         );
1033 1033
 
1034 1034
         /** @var int $clen */
1035
-        $clen = ParagonIE_Sodium_Core32_Util::strlen($c);
1035
+        $clen = ParagonIE_Sodium_Core32_Util::strlen( $c );
1036 1036
 
1037 1037
         /** @var string $subkey */
1038
-        $subkey = ParagonIE_Sodium_Core32_HSalsa20::hsalsa20($nonce, $key);
1038
+        $subkey = ParagonIE_Sodium_Core32_HSalsa20::hsalsa20( $nonce, $key );
1039 1039
 
1040 1040
         /** @var string $block0 */
1041 1041
         $block0 = ParagonIE_Sodium_Core32_Salsa20::salsa20(
1042 1042
             64,
1043
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
1043
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
1044 1044
             $subkey
1045 1045
         );
1046 1046
         $verified = ParagonIE_Sodium_Core32_Poly1305::onetimeauth_verify(
1047 1047
             $mac,
1048 1048
             $c,
1049
-            ParagonIE_Sodium_Core32_Util::substr($block0, 0, 32)
1049
+            ParagonIE_Sodium_Core32_Util::substr( $block0, 0, 32 )
1050 1050
         );
1051
-        if (!$verified) {
1051
+        if ( ! $verified ) {
1052 1052
             try {
1053
-                ParagonIE_Sodium_Compat::memzero($subkey);
1054
-            } catch (SodiumException $ex) {
1053
+                ParagonIE_Sodium_Compat::memzero( $subkey );
1054
+            } catch ( SodiumException $ex ) {
1055 1055
                 $subkey = null;
1056 1056
             }
1057
-            throw new SodiumException('Invalid MAC');
1057
+            throw new SodiumException( 'Invalid MAC' );
1058 1058
         }
1059 1059
 
1060 1060
         /** @var string $m - Decrypted message */
1061 1061
         $m = ParagonIE_Sodium_Core32_Util::xorStrings(
1062
-            ParagonIE_Sodium_Core32_Util::substr($block0, self::secretbox_xsalsa20poly1305_ZEROBYTES),
1063
-            ParagonIE_Sodium_Core32_Util::substr($c, 0, self::secretbox_xsalsa20poly1305_ZEROBYTES)
1062
+            ParagonIE_Sodium_Core32_Util::substr( $block0, self::secretbox_xsalsa20poly1305_ZEROBYTES ),
1063
+            ParagonIE_Sodium_Core32_Util::substr( $c, 0, self::secretbox_xsalsa20poly1305_ZEROBYTES )
1064 1064
         );
1065
-        if ($clen > self::secretbox_xsalsa20poly1305_ZEROBYTES) {
1065
+        if ( $clen > self::secretbox_xsalsa20poly1305_ZEROBYTES ) {
1066 1066
             // We had more than 1 block, so let's continue to decrypt the rest.
1067 1067
             $m .= ParagonIE_Sodium_Core32_Salsa20::salsa20_xor_ic(
1068 1068
                 ParagonIE_Sodium_Core32_Util::substr(
1069 1069
                     $c,
1070 1070
                     self::secretbox_xsalsa20poly1305_ZEROBYTES
1071 1071
                 ),
1072
-                ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
1072
+                ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
1073 1073
                 1,
1074
-                (string) $subkey
1074
+                (string)$subkey
1075 1075
             );
1076 1076
         }
1077 1077
         return $m;
@@ -1089,25 +1089,25 @@  discard block
 block discarded – undo
1089 1089
      * @throws SodiumException
1090 1090
      * @throws TypeError
1091 1091
      */
1092
-    public static function secretbox_xchacha20poly1305($plaintext, $nonce, $key)
1092
+    public static function secretbox_xchacha20poly1305( $plaintext, $nonce, $key )
1093 1093
     {
1094 1094
         /** @var string $subkey */
1095 1095
         $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20(
1096
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 0, 16),
1096
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 0, 16 ),
1097 1097
             $key
1098 1098
         );
1099
-        $nonceLast = ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8);
1099
+        $nonceLast = ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 );
1100 1100
 
1101 1101
         /** @var string $block0 */
1102
-        $block0 = str_repeat("\x00", 32);
1102
+        $block0 = str_repeat( "\x00", 32 );
1103 1103
 
1104 1104
         /** @var int $mlen - Length of the plaintext message */
1105
-        $mlen = ParagonIE_Sodium_Core32_Util::strlen($plaintext);
1105
+        $mlen = ParagonIE_Sodium_Core32_Util::strlen( $plaintext );
1106 1106
         $mlen0 = $mlen;
1107
-        if ($mlen0 > 64 - self::secretbox_xchacha20poly1305_ZEROBYTES) {
1107
+        if ( $mlen0 > 64 - self::secretbox_xchacha20poly1305_ZEROBYTES ) {
1108 1108
             $mlen0 = 64 - self::secretbox_xchacha20poly1305_ZEROBYTES;
1109 1109
         }
1110
-        $block0 .= ParagonIE_Sodium_Core32_Util::substr($plaintext, 0, $mlen0);
1110
+        $block0 .= ParagonIE_Sodium_Core32_Util::substr( $plaintext, 0, $mlen0 );
1111 1111
 
1112 1112
         /** @var string $block0 */
1113 1113
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::streamXorIc(
@@ -1121,7 +1121,7 @@  discard block
 block discarded – undo
1121 1121
             $block0,
1122 1122
             self::secretbox_xchacha20poly1305_ZEROBYTES
1123 1123
         );
1124
-        if ($mlen > $mlen0) {
1124
+        if ( $mlen > $mlen0 ) {
1125 1125
             $c .= ParagonIE_Sodium_Core32_ChaCha20::streamXorIc(
1126 1126
                 ParagonIE_Sodium_Core32_Util::substr(
1127 1127
                     $plaintext,
@@ -1129,7 +1129,7 @@  discard block
 block discarded – undo
1129 1129
                 ),
1130 1130
                 $nonceLast,
1131 1131
                 $subkey,
1132
-                ParagonIE_Sodium_Core32_Util::store64_le(1)
1132
+                ParagonIE_Sodium_Core32_Util::store64_le( 1 )
1133 1133
             );
1134 1134
         }
1135 1135
         $state = new ParagonIE_Sodium_Core32_Poly1305_State(
@@ -1140,18 +1140,18 @@  discard block
 block discarded – undo
1140 1140
             )
1141 1141
         );
1142 1142
         try {
1143
-            ParagonIE_Sodium_Compat::memzero($block0);
1144
-            ParagonIE_Sodium_Compat::memzero($subkey);
1145
-        } catch (SodiumException $ex) {
1143
+            ParagonIE_Sodium_Compat::memzero( $block0 );
1144
+            ParagonIE_Sodium_Compat::memzero( $subkey );
1145
+        } catch ( SodiumException $ex ) {
1146 1146
             $block0 = null;
1147 1147
             $subkey = null;
1148 1148
         }
1149 1149
 
1150
-        $state->update($c);
1150
+        $state->update( $c );
1151 1151
 
1152 1152
         /** @var string $c - MAC || ciphertext */
1153 1153
         $c = $state->finish() . $c;
1154
-        unset($state);
1154
+        unset( $state );
1155 1155
 
1156 1156
         return $c;
1157 1157
     }
@@ -1168,7 +1168,7 @@  discard block
 block discarded – undo
1168 1168
      * @throws SodiumException
1169 1169
      * @throws TypeError
1170 1170
      */
1171
-    public static function secretbox_xchacha20poly1305_open($ciphertext, $nonce, $key)
1171
+    public static function secretbox_xchacha20poly1305_open( $ciphertext, $nonce, $key )
1172 1172
     {
1173 1173
         /** @var string $mac */
1174 1174
         $mac = ParagonIE_Sodium_Core32_Util::substr(
@@ -1184,48 +1184,48 @@  discard block
 block discarded – undo
1184 1184
         );
1185 1185
 
1186 1186
         /** @var int $clen */
1187
-        $clen = ParagonIE_Sodium_Core32_Util::strlen($c);
1187
+        $clen = ParagonIE_Sodium_Core32_Util::strlen( $c );
1188 1188
 
1189 1189
         /** @var string $subkey */
1190
-        $subkey = ParagonIE_Sodium_Core32_HChaCha20::hchacha20($nonce, $key);
1190
+        $subkey = ParagonIE_Sodium_Core32_HChaCha20::hchacha20( $nonce, $key );
1191 1191
 
1192 1192
         /** @var string $block0 */
1193 1193
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::stream(
1194 1194
             64,
1195
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
1195
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
1196 1196
             $subkey
1197 1197
         );
1198 1198
         $verified = ParagonIE_Sodium_Core32_Poly1305::onetimeauth_verify(
1199 1199
             $mac,
1200 1200
             $c,
1201
-            ParagonIE_Sodium_Core32_Util::substr($block0, 0, 32)
1201
+            ParagonIE_Sodium_Core32_Util::substr( $block0, 0, 32 )
1202 1202
         );
1203 1203
 
1204
-        if (!$verified) {
1204
+        if ( ! $verified ) {
1205 1205
             try {
1206
-                ParagonIE_Sodium_Compat::memzero($subkey);
1207
-            } catch (SodiumException $ex) {
1206
+                ParagonIE_Sodium_Compat::memzero( $subkey );
1207
+            } catch ( SodiumException $ex ) {
1208 1208
                 $subkey = null;
1209 1209
             }
1210
-            throw new SodiumException('Invalid MAC');
1210
+            throw new SodiumException( 'Invalid MAC' );
1211 1211
         }
1212 1212
 
1213 1213
         /** @var string $m - Decrypted message */
1214 1214
         $m = ParagonIE_Sodium_Core32_Util::xorStrings(
1215
-            ParagonIE_Sodium_Core32_Util::substr($block0, self::secretbox_xchacha20poly1305_ZEROBYTES),
1216
-            ParagonIE_Sodium_Core32_Util::substr($c, 0, self::secretbox_xchacha20poly1305_ZEROBYTES)
1215
+            ParagonIE_Sodium_Core32_Util::substr( $block0, self::secretbox_xchacha20poly1305_ZEROBYTES ),
1216
+            ParagonIE_Sodium_Core32_Util::substr( $c, 0, self::secretbox_xchacha20poly1305_ZEROBYTES )
1217 1217
         );
1218 1218
 
1219
-        if ($clen > self::secretbox_xchacha20poly1305_ZEROBYTES) {
1219
+        if ( $clen > self::secretbox_xchacha20poly1305_ZEROBYTES ) {
1220 1220
             // We had more than 1 block, so let's continue to decrypt the rest.
1221 1221
             $m .= ParagonIE_Sodium_Core32_ChaCha20::streamXorIc(
1222 1222
                 ParagonIE_Sodium_Core32_Util::substr(
1223 1223
                     $c,
1224 1224
                     self::secretbox_xchacha20poly1305_ZEROBYTES
1225 1225
                 ),
1226
-                ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
1227
-                (string) $subkey,
1228
-                ParagonIE_Sodium_Core32_Util::store64_le(1)
1226
+                ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
1227
+                (string)$subkey,
1228
+                ParagonIE_Sodium_Core32_Util::store64_le( 1 )
1229 1229
             );
1230 1230
         }
1231 1231
         return $m;
@@ -1237,16 +1237,16 @@  discard block
 block discarded – undo
1237 1237
      * @throws Exception
1238 1238
      * @throws SodiumException
1239 1239
      */
1240
-    public static function secretstream_xchacha20poly1305_init_push($key)
1240
+    public static function secretstream_xchacha20poly1305_init_push( $key )
1241 1241
     {
1242 1242
         # randombytes_buf(out, crypto_secretstream_xchacha20poly1305_HEADERBYTES);
1243
-        $out = random_bytes(24);
1243
+        $out = random_bytes( 24 );
1244 1244
 
1245 1245
         # crypto_core_hchacha20(state->k, out, k, NULL);
1246
-        $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20($out, $key);
1246
+        $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20( $out, $key );
1247 1247
         $state = new ParagonIE_Sodium_Core32_SecretStream_State(
1248 1248
             $subkey,
1249
-            ParagonIE_Sodium_Core32_Util::substr($out, 16, 8) . str_repeat("\0", 4)
1249
+            ParagonIE_Sodium_Core32_Util::substr( $out, 16, 8 ) . str_repeat( "\0", 4 )
1250 1250
         );
1251 1251
 
1252 1252
         # _crypto_secretstream_xchacha20poly1305_counter_reset(state);
@@ -1267,16 +1267,16 @@  discard block
 block discarded – undo
1267 1267
      * @return string Returns a state.
1268 1268
      * @throws Exception
1269 1269
      */
1270
-    public static function secretstream_xchacha20poly1305_init_pull($key, $header)
1270
+    public static function secretstream_xchacha20poly1305_init_pull( $key, $header )
1271 1271
     {
1272 1272
         # crypto_core_hchacha20(state->k, in, k, NULL);
1273 1273
         $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20(
1274
-            ParagonIE_Sodium_Core32_Util::substr($header, 0, 16),
1274
+            ParagonIE_Sodium_Core32_Util::substr( $header, 0, 16 ),
1275 1275
             $key
1276 1276
         );
1277 1277
         $state = new ParagonIE_Sodium_Core32_SecretStream_State(
1278 1278
             $subkey,
1279
-            ParagonIE_Sodium_Core32_Util::substr($header, 16)
1279
+            ParagonIE_Sodium_Core32_Util::substr( $header, 16 )
1280 1280
         );
1281 1281
         $state->counterReset();
1282 1282
         # memcpy(STATE_INONCE(state), in + crypto_core_hchacha20_INPUTBYTES,
@@ -1294,19 +1294,19 @@  discard block
 block discarded – undo
1294 1294
      * @return string
1295 1295
      * @throws SodiumException
1296 1296
      */
1297
-    public static function secretstream_xchacha20poly1305_push(&$state, $msg, $aad = '', $tag = 0)
1297
+    public static function secretstream_xchacha20poly1305_push( &$state, $msg, $aad = '', $tag = 0 )
1298 1298
     {
1299
-        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString($state);
1299
+        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString( $state );
1300 1300
         # crypto_onetimeauth_poly1305_state poly1305_state;
1301 1301
         # unsigned char                     block[64U];
1302 1302
         # unsigned char                     slen[8U];
1303 1303
         # unsigned char                    *c;
1304 1304
         # unsigned char                    *mac;
1305 1305
 
1306
-        $msglen = ParagonIE_Sodium_Core32_Util::strlen($msg);
1307
-        $aadlen = ParagonIE_Sodium_Core32_Util::strlen($aad);
1306
+        $msglen = ParagonIE_Sodium_Core32_Util::strlen( $msg );
1307
+        $aadlen = ParagonIE_Sodium_Core32_Util::strlen( $aad );
1308 1308
 
1309
-        if ((($msglen + 63) >> 6) > 0xfffffffe) {
1309
+        if ( ( ( $msglen + 63 ) >> 6 ) > 0xfffffffe ) {
1310 1310
             throw new SodiumException(
1311 1311
                 'message cannot be larger than SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_MESSAGEBYTES_MAX bytes'
1312 1312
             );
@@ -1323,62 +1323,62 @@  discard block
 block discarded – undo
1323 1323
         # crypto_onetimeauth_poly1305_init(&poly1305_state, block);
1324 1324
         # sodium_memzero(block, sizeof block);
1325 1325
         $auth = new ParagonIE_Sodium_Core32_Poly1305_State(
1326
-            ParagonIE_Sodium_Core32_ChaCha20::ietfStream(32, $st->getCombinedNonce(), $st->getKey())
1326
+            ParagonIE_Sodium_Core32_ChaCha20::ietfStream( 32, $st->getCombinedNonce(), $st->getKey() )
1327 1327
         );
1328 1328
 
1329 1329
         # crypto_onetimeauth_poly1305_update(&poly1305_state, ad, adlen);
1330
-        $auth->update($aad);
1330
+        $auth->update( $aad );
1331 1331
 
1332 1332
         # crypto_onetimeauth_poly1305_update(&poly1305_state, _pad0,
1333 1333
         #     (0x10 - adlen) & 0xf);
1334
-        $auth->update(str_repeat("\0", ((0x10 - $aadlen) & 0xf)));
1334
+        $auth->update( str_repeat( "\0", ( ( 0x10 - $aadlen ) & 0xf ) ) );
1335 1335
 
1336 1336
         # memset(block, 0, sizeof block);
1337 1337
         # block[0] = tag;
1338 1338
         # crypto_stream_chacha20_ietf_xor_ic(block, block, sizeof block,
1339 1339
         #                                    state->nonce, 1U, state->k);
1340 1340
         $block = ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1341
-            ParagonIE_Sodium_Core32_Util::intToChr($tag) . str_repeat("\0", 63),
1341
+            ParagonIE_Sodium_Core32_Util::intToChr( $tag ) . str_repeat( "\0", 63 ),
1342 1342
             $st->getCombinedNonce(),
1343 1343
             $st->getKey(),
1344
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
1344
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
1345 1345
         );
1346 1346
 
1347 1347
         # crypto_onetimeauth_poly1305_update(&poly1305_state, block, sizeof block);
1348
-        $auth->update($block);
1348
+        $auth->update( $block );
1349 1349
 
1350 1350
         # out[0] = block[0];
1351
-        $out = $block[0];
1351
+        $out = $block[ 0 ];
1352 1352
         # c = out + (sizeof tag);
1353 1353
         # crypto_stream_chacha20_ietf_xor_ic(c, m, mlen, state->nonce, 2U, state->k);
1354 1354
         $cipher = ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1355 1355
             $msg,
1356 1356
             $st->getCombinedNonce(),
1357 1357
             $st->getKey(),
1358
-            ParagonIE_Sodium_Core32_Util::store64_le(2)
1358
+            ParagonIE_Sodium_Core32_Util::store64_le( 2 )
1359 1359
         );
1360 1360
 
1361 1361
         # crypto_onetimeauth_poly1305_update(&poly1305_state, c, mlen);
1362
-        $auth->update($cipher);
1362
+        $auth->update( $cipher );
1363 1363
 
1364 1364
         $out .= $cipher;
1365
-        unset($cipher);
1365
+        unset( $cipher );
1366 1366
 
1367 1367
         # crypto_onetimeauth_poly1305_update
1368 1368
         # (&poly1305_state, _pad0, (0x10 - (sizeof block) + mlen) & 0xf);
1369
-        $auth->update(str_repeat("\0", ((0x10 - 64 + $msglen) & 0xf)));
1369
+        $auth->update( str_repeat( "\0", ( ( 0x10 - 64 + $msglen ) & 0xf ) ) );
1370 1370
 
1371 1371
         # STORE64_LE(slen, (uint64_t) adlen);
1372
-        $slen = ParagonIE_Sodium_Core32_Util::store64_le($aadlen);
1372
+        $slen = ParagonIE_Sodium_Core32_Util::store64_le( $aadlen );
1373 1373
 
1374 1374
         # crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1375
-        $auth->update($slen);
1375
+        $auth->update( $slen );
1376 1376
 
1377 1377
         # STORE64_LE(slen, (sizeof block) + mlen);
1378
-        $slen = ParagonIE_Sodium_Core32_Util::store64_le(64 + $msglen);
1378
+        $slen = ParagonIE_Sodium_Core32_Util::store64_le( 64 + $msglen );
1379 1379
 
1380 1380
         # crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1381
-        $auth->update($slen);
1381
+        $auth->update( $slen );
1382 1382
 
1383 1383
         # mac = c + mlen;
1384 1384
         # crypto_onetimeauth_poly1305_final(&poly1305_state, mac);
@@ -1386,12 +1386,12 @@  discard block
 block discarded – undo
1386 1386
         $out .= $mac;
1387 1387
 
1388 1388
         # sodium_memzero(&poly1305_state, sizeof poly1305_state);
1389
-        unset($auth);
1389
+        unset( $auth );
1390 1390
 
1391 1391
 
1392 1392
         # XOR_BUF(STATE_INONCE(state), mac,
1393 1393
         #     crypto_secretstream_xchacha20poly1305_INONCEBYTES);
1394
-        $st->xorNonce($mac);
1394
+        $st->xorNonce( $mac );
1395 1395
 
1396 1396
         # sodium_increment(STATE_COUNTER(state),
1397 1397
         #     crypto_secretstream_xchacha20poly1305_COUNTERBYTES);
@@ -1400,15 +1400,15 @@  discard block
 block discarded – undo
1400 1400
         $state = $st->toString();
1401 1401
 
1402 1402
         /** @var bool $rekey */
1403
-        $rekey = ($tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY) !== 0;
1403
+        $rekey = ( $tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY ) !== 0;
1404 1404
         # if ((tag & crypto_secretstream_xchacha20poly1305_TAG_REKEY) != 0 ||
1405 1405
         #     sodium_is_zero(STATE_COUNTER(state),
1406 1406
         #         crypto_secretstream_xchacha20poly1305_COUNTERBYTES)) {
1407 1407
         #     crypto_secretstream_xchacha20poly1305_rekey(state);
1408 1408
         # }
1409
-        if ($rekey || $st->needsRekey()) {
1409
+        if ( $rekey || $st->needsRekey() ) {
1410 1410
             // DO REKEY
1411
-            self::secretstream_xchacha20poly1305_rekey($state);
1411
+            self::secretstream_xchacha20poly1305_rekey( $state );
1412 1412
         }
1413 1413
         # if (outlen_p != NULL) {
1414 1414
         #     *outlen_p = crypto_secretstream_xchacha20poly1305_ABYTES + mlen;
@@ -1423,19 +1423,19 @@  discard block
 block discarded – undo
1423 1423
      * @return bool|array{0: string, 1: int}
1424 1424
      * @throws SodiumException
1425 1425
      */
1426
-    public static function secretstream_xchacha20poly1305_pull(&$state, $cipher, $aad = '')
1426
+    public static function secretstream_xchacha20poly1305_pull( &$state, $cipher, $aad = '' )
1427 1427
     {
1428
-        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString($state);
1428
+        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString( $state );
1429 1429
 
1430
-        $cipherlen = ParagonIE_Sodium_Core32_Util::strlen($cipher);
1430
+        $cipherlen = ParagonIE_Sodium_Core32_Util::strlen( $cipher );
1431 1431
         #     mlen = inlen - crypto_secretstream_xchacha20poly1305_ABYTES;
1432 1432
         $msglen = $cipherlen - ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_ABYTES;
1433
-        $aadlen = ParagonIE_Sodium_Core32_Util::strlen($aad);
1433
+        $aadlen = ParagonIE_Sodium_Core32_Util::strlen( $aad );
1434 1434
 
1435 1435
         #     if (mlen > crypto_secretstream_xchacha20poly1305_MESSAGEBYTES_MAX) {
1436 1436
         #         sodium_misuse();
1437 1437
         #     }
1438
-        if ((($msglen + 63) >> 6) > 0xfffffffe) {
1438
+        if ( ( ( $msglen + 63 ) >> 6 ) > 0xfffffffe ) {
1439 1439
             throw new SodiumException(
1440 1440
                 'message cannot be larger than SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_MESSAGEBYTES_MAX bytes'
1441 1441
             );
@@ -1445,15 +1445,15 @@  discard block
 block discarded – undo
1445 1445
         #     crypto_onetimeauth_poly1305_init(&poly1305_state, block);
1446 1446
         #     sodium_memzero(block, sizeof block);
1447 1447
         $auth = new ParagonIE_Sodium_Core32_Poly1305_State(
1448
-            ParagonIE_Sodium_Core32_ChaCha20::ietfStream(32, $st->getCombinedNonce(), $st->getKey())
1448
+            ParagonIE_Sodium_Core32_ChaCha20::ietfStream( 32, $st->getCombinedNonce(), $st->getKey() )
1449 1449
         );
1450 1450
 
1451 1451
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, ad, adlen);
1452
-        $auth->update($aad);
1452
+        $auth->update( $aad );
1453 1453
 
1454 1454
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, _pad0,
1455 1455
         #         (0x10 - adlen) & 0xf);
1456
-        $auth->update(str_repeat("\0", ((0x10 - $aadlen) & 0xf)));
1456
+        $auth->update( str_repeat( "\0", ( ( 0x10 - $aadlen ) & 0xf ) ) );
1457 1457
 
1458 1458
 
1459 1459
         #     memset(block, 0, sizeof block);
@@ -1461,36 +1461,36 @@  discard block
 block discarded – undo
1461 1461
         #     crypto_stream_chacha20_ietf_xor_ic(block, block, sizeof block,
1462 1462
         #                                        state->nonce, 1U, state->k);
1463 1463
         $block = ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1464
-            $cipher[0] . str_repeat("\0", 63),
1464
+            $cipher[ 0 ] . str_repeat( "\0", 63 ),
1465 1465
             $st->getCombinedNonce(),
1466 1466
             $st->getKey(),
1467
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
1467
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
1468 1468
         );
1469 1469
         #     tag = block[0];
1470 1470
         #     block[0] = in[0];
1471 1471
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, block, sizeof block);
1472
-        $tag = ParagonIE_Sodium_Core32_Util::chrToInt($block[0]);
1473
-        $block[0] = $cipher[0];
1474
-        $auth->update($block);
1472
+        $tag = ParagonIE_Sodium_Core32_Util::chrToInt( $block[ 0 ] );
1473
+        $block[ 0 ] = $cipher[ 0 ];
1474
+        $auth->update( $block );
1475 1475
 
1476 1476
 
1477 1477
         #     c = in + (sizeof tag);
1478 1478
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, c, mlen);
1479
-        $auth->update(ParagonIE_Sodium_Core32_Util::substr($cipher, 1, $msglen));
1479
+        $auth->update( ParagonIE_Sodium_Core32_Util::substr( $cipher, 1, $msglen ) );
1480 1480
 
1481 1481
         #     crypto_onetimeauth_poly1305_update
1482 1482
         #     (&poly1305_state, _pad0, (0x10 - (sizeof block) + mlen) & 0xf);
1483
-        $auth->update(str_repeat("\0", ((0x10 - 64 + $msglen) & 0xf)));
1483
+        $auth->update( str_repeat( "\0", ( ( 0x10 - 64 + $msglen ) & 0xf ) ) );
1484 1484
 
1485 1485
         #     STORE64_LE(slen, (uint64_t) adlen);
1486 1486
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1487
-        $slen = ParagonIE_Sodium_Core32_Util::store64_le($aadlen);
1488
-        $auth->update($slen);
1487
+        $slen = ParagonIE_Sodium_Core32_Util::store64_le( $aadlen );
1488
+        $auth->update( $slen );
1489 1489
 
1490 1490
         #     STORE64_LE(slen, (sizeof block) + mlen);
1491 1491
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1492
-        $slen = ParagonIE_Sodium_Core32_Util::store64_le(64 + $msglen);
1493
-        $auth->update($slen);
1492
+        $slen = ParagonIE_Sodium_Core32_Util::store64_le( 64 + $msglen );
1493
+        $auth->update( $slen );
1494 1494
 
1495 1495
         #     crypto_onetimeauth_poly1305_final(&poly1305_state, mac);
1496 1496
         #     sodium_memzero(&poly1305_state, sizeof poly1305_state);
@@ -1502,22 +1502,22 @@  discard block
 block discarded – undo
1502 1502
         #         return -1;
1503 1503
         #     }
1504 1504
 
1505
-        $stored = ParagonIE_Sodium_Core32_Util::substr($cipher, $msglen + 1, 16);
1506
-        if (!ParagonIE_Sodium_Core32_Util::hashEquals($mac, $stored)) {
1505
+        $stored = ParagonIE_Sodium_Core32_Util::substr( $cipher, $msglen + 1, 16 );
1506
+        if ( ! ParagonIE_Sodium_Core32_Util::hashEquals( $mac, $stored ) ) {
1507 1507
             return false;
1508 1508
         }
1509 1509
 
1510 1510
         #     crypto_stream_chacha20_ietf_xor_ic(m, c, mlen, state->nonce, 2U, state->k);
1511 1511
         $out = ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1512
-            ParagonIE_Sodium_Core32_Util::substr($cipher, 1, $msglen),
1512
+            ParagonIE_Sodium_Core32_Util::substr( $cipher, 1, $msglen ),
1513 1513
             $st->getCombinedNonce(),
1514 1514
             $st->getKey(),
1515
-            ParagonIE_Sodium_Core32_Util::store64_le(2)
1515
+            ParagonIE_Sodium_Core32_Util::store64_le( 2 )
1516 1516
         );
1517 1517
 
1518 1518
         #     XOR_BUF(STATE_INONCE(state), mac,
1519 1519
         #         crypto_secretstream_xchacha20poly1305_INONCEBYTES);
1520
-        $st->xorNonce($mac);
1520
+        $st->xorNonce( $mac );
1521 1521
 
1522 1522
         #     sodium_increment(STATE_COUNTER(state),
1523 1523
         #         crypto_secretstream_xchacha20poly1305_COUNTERBYTES);
@@ -1533,12 +1533,12 @@  discard block
 block discarded – undo
1533 1533
         $state = $st->toString();
1534 1534
 
1535 1535
         /** @var bool $rekey */
1536
-        $rekey = ($tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY) !== 0;
1537
-        if ($rekey || $st->needsRekey()) {
1536
+        $rekey = ( $tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY ) !== 0;
1537
+        if ( $rekey || $st->needsRekey() ) {
1538 1538
             // DO REKEY
1539
-            self::secretstream_xchacha20poly1305_rekey($state);
1539
+            self::secretstream_xchacha20poly1305_rekey( $state );
1540 1540
         }
1541
-        return array($out, $tag);
1541
+        return array( $out, $tag );
1542 1542
     }
1543 1543
 
1544 1544
     /**
@@ -1546,9 +1546,9 @@  discard block
 block discarded – undo
1546 1546
      * @return void
1547 1547
      * @throws SodiumException
1548 1548
      */
1549
-    public static function secretstream_xchacha20poly1305_rekey(&$state)
1549
+    public static function secretstream_xchacha20poly1305_rekey( &$state )
1550 1550
     {
1551
-        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString($state);
1551
+        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString( $state );
1552 1552
         # unsigned char new_key_and_inonce[crypto_stream_chacha20_ietf_KEYBYTES +
1553 1553
         # crypto_secretstream_xchacha20poly1305_INONCEBYTES];
1554 1554
         # size_t        i;
@@ -1561,18 +1561,18 @@  discard block
 block discarded – undo
1561 1561
         #     new_key_and_inonce[crypto_stream_chacha20_ietf_KEYBYTES + i] =
1562 1562
         #         STATE_INONCE(state)[i];
1563 1563
         # }
1564
-        $new_key_and_inonce .= ParagonIE_Sodium_Core32_Util::substR($st->getNonce(), 0, 8);
1564
+        $new_key_and_inonce .= ParagonIE_Sodium_Core32_Util::substR( $st->getNonce(), 0, 8 );
1565 1565
 
1566 1566
         # crypto_stream_chacha20_ietf_xor(new_key_and_inonce, new_key_and_inonce,
1567 1567
         #                                 sizeof new_key_and_inonce,
1568 1568
         #                                 state->nonce, state->k);
1569 1569
 
1570
-        $st->rekey(ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1570
+        $st->rekey( ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1571 1571
             $new_key_and_inonce,
1572 1572
             $st->getCombinedNonce(),
1573 1573
             $st->getKey(),
1574
-            ParagonIE_Sodium_Core32_Util::store64_le(0)
1575
-        ));
1574
+            ParagonIE_Sodium_Core32_Util::store64_le( 0 )
1575
+        ) );
1576 1576
 
1577 1577
         # for (i = 0U; i < crypto_stream_chacha20_ietf_KEYBYTES; i++) {
1578 1578
         #     state->k[i] = new_key_and_inonce[i];
@@ -1598,9 +1598,9 @@  discard block
 block discarded – undo
1598 1598
      * @throws SodiumException
1599 1599
      * @throws TypeError
1600 1600
      */
1601
-    public static function sign_detached($message, $sk)
1601
+    public static function sign_detached( $message, $sk )
1602 1602
     {
1603
-        return ParagonIE_Sodium_Core32_Ed25519::sign_detached($message, $sk);
1603
+        return ParagonIE_Sodium_Core32_Ed25519::sign_detached( $message, $sk );
1604 1604
     }
1605 1605
 
1606 1606
     /**
@@ -1614,9 +1614,9 @@  discard block
 block discarded – undo
1614 1614
      * @throws SodiumException
1615 1615
      * @throws TypeError
1616 1616
      */
1617
-    public static function sign($message, $sk)
1617
+    public static function sign( $message, $sk )
1618 1618
     {
1619
-        return ParagonIE_Sodium_Core32_Ed25519::sign($message, $sk);
1619
+        return ParagonIE_Sodium_Core32_Ed25519::sign( $message, $sk );
1620 1620
     }
1621 1621
 
1622 1622
     /**
@@ -1630,9 +1630,9 @@  discard block
 block discarded – undo
1630 1630
      * @throws SodiumException
1631 1631
      * @throws TypeError
1632 1632
      */
1633
-    public static function sign_open($signedMessage, $pk)
1633
+    public static function sign_open( $signedMessage, $pk )
1634 1634
     {
1635
-        return ParagonIE_Sodium_Core32_Ed25519::sign_open($signedMessage, $pk);
1635
+        return ParagonIE_Sodium_Core32_Ed25519::sign_open( $signedMessage, $pk );
1636 1636
     }
1637 1637
 
1638 1638
     /**
@@ -1647,8 +1647,8 @@  discard block
 block discarded – undo
1647 1647
      * @throws SodiumException
1648 1648
      * @throws TypeError
1649 1649
      */
1650
-    public static function sign_verify_detached($signature, $message, $pk)
1650
+    public static function sign_verify_detached( $signature, $message, $pk )
1651 1651
     {
1652
-        return ParagonIE_Sodium_Core32_Ed25519::verify_detached($signature, $message, $pk);
1652
+        return ParagonIE_Sodium_Core32_Ed25519::verify_detached( $signature, $message, $pk );
1653 1653
     }
1654 1654
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/SipHash.php 1 patch
Spacing   +86 added lines, -86 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_SipHash', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_SipHash', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -18,65 +18,65 @@  discard block
 block discarded – undo
18 18
      * @return int[]
19 19
      *
20 20
      */
21
-    public static function sipRound(array $v)
21
+    public static function sipRound( array $v )
22 22
     {
23 23
         # v0 += v1;
24
-        list($v[0], $v[1]) = self::add(
25
-            array($v[0], $v[1]),
26
-            array($v[2], $v[3])
24
+        list( $v[ 0 ], $v[ 1 ] ) = self::add(
25
+            array( $v[ 0 ], $v[ 1 ] ),
26
+            array( $v[ 2 ], $v[ 3 ] )
27 27
         );
28 28
 
29 29
         #  v1=ROTL(v1,13);
30
-        list($v[2], $v[3]) = self::rotl_64((int) $v[2], (int) $v[3], 13);
30
+        list( $v[ 2 ], $v[ 3 ] ) = self::rotl_64( (int)$v[ 2 ], (int)$v[ 3 ], 13 );
31 31
 
32 32
         #  v1 ^= v0;
33
-        $v[2] = (int) $v[2] ^ (int) $v[0];
34
-        $v[3] = (int) $v[3] ^ (int) $v[1];
33
+        $v[ 2 ] = (int)$v[ 2 ] ^ (int)$v[ 0 ];
34
+        $v[ 3 ] = (int)$v[ 3 ] ^ (int)$v[ 1 ];
35 35
 
36 36
         #  v0=ROTL(v0,32);
37
-        list($v[0], $v[1]) = self::rotl_64((int) $v[0], (int) $v[1], 32);
37
+        list( $v[ 0 ], $v[ 1 ] ) = self::rotl_64( (int)$v[ 0 ], (int)$v[ 1 ], 32 );
38 38
 
39 39
         # v2 += v3;
40
-        list($v[4], $v[5]) = self::add(
41
-            array((int) $v[4], (int) $v[5]),
42
-            array((int) $v[6], (int) $v[7])
40
+        list( $v[ 4 ], $v[ 5 ] ) = self::add(
41
+            array( (int)$v[ 4 ], (int)$v[ 5 ] ),
42
+            array( (int)$v[ 6 ], (int)$v[ 7 ] )
43 43
         );
44 44
 
45 45
         # v3=ROTL(v3,16);
46
-        list($v[6], $v[7]) = self::rotl_64((int) $v[6], (int) $v[7], 16);
46
+        list( $v[ 6 ], $v[ 7 ] ) = self::rotl_64( (int)$v[ 6 ], (int)$v[ 7 ], 16 );
47 47
 
48 48
         #  v3 ^= v2;
49
-        $v[6] = (int) $v[6] ^ (int) $v[4];
50
-        $v[7] = (int) $v[7] ^ (int) $v[5];
49
+        $v[ 6 ] = (int)$v[ 6 ] ^ (int)$v[ 4 ];
50
+        $v[ 7 ] = (int)$v[ 7 ] ^ (int)$v[ 5 ];
51 51
 
52 52
         # v0 += v3;
53
-        list($v[0], $v[1]) = self::add(
54
-            array((int) $v[0], (int) $v[1]),
55
-            array((int) $v[6], (int) $v[7])
53
+        list( $v[ 0 ], $v[ 1 ] ) = self::add(
54
+            array( (int)$v[ 0 ], (int)$v[ 1 ] ),
55
+            array( (int)$v[ 6 ], (int)$v[ 7 ] )
56 56
         );
57 57
 
58 58
         # v3=ROTL(v3,21);
59
-        list($v[6], $v[7]) = self::rotl_64((int) $v[6], (int) $v[7], 21);
59
+        list( $v[ 6 ], $v[ 7 ] ) = self::rotl_64( (int)$v[ 6 ], (int)$v[ 7 ], 21 );
60 60
 
61 61
         # v3 ^= v0;
62
-        $v[6] = (int) $v[6] ^ (int) $v[0];
63
-        $v[7] = (int) $v[7] ^ (int) $v[1];
62
+        $v[ 6 ] = (int)$v[ 6 ] ^ (int)$v[ 0 ];
63
+        $v[ 7 ] = (int)$v[ 7 ] ^ (int)$v[ 1 ];
64 64
 
65 65
         # v2 += v1;
66
-        list($v[4], $v[5]) = self::add(
67
-            array((int) $v[4], (int) $v[5]),
68
-            array((int) $v[2], (int) $v[3])
66
+        list( $v[ 4 ], $v[ 5 ] ) = self::add(
67
+            array( (int)$v[ 4 ], (int)$v[ 5 ] ),
68
+            array( (int)$v[ 2 ], (int)$v[ 3 ] )
69 69
         );
70 70
 
71 71
         # v1=ROTL(v1,17);
72
-        list($v[2], $v[3]) = self::rotl_64((int) $v[2], (int) $v[3], 17);
72
+        list( $v[ 2 ], $v[ 3 ] ) = self::rotl_64( (int)$v[ 2 ], (int)$v[ 3 ], 17 );
73 73
 
74 74
         #  v1 ^= v2;;
75
-        $v[2] = (int) $v[2] ^ (int) $v[4];
76
-        $v[3] = (int) $v[3] ^ (int) $v[5];
75
+        $v[ 2 ] = (int)$v[ 2 ] ^ (int)$v[ 4 ];
76
+        $v[ 3 ] = (int)$v[ 3 ] ^ (int)$v[ 5 ];
77 77
 
78 78
         # v2=ROTL(v2,32)
79
-        list($v[4], $v[5]) = self::rotl_64((int) $v[4], (int) $v[5], 32);
79
+        list( $v[ 4 ], $v[ 5 ] ) = self::rotl_64( (int)$v[ 4 ], (int)$v[ 5 ], 32 );
80 80
 
81 81
         return $v;
82 82
     }
@@ -90,14 +90,14 @@  discard block
 block discarded – undo
90 90
      * @param int[] $b
91 91
      * @return array<int, mixed>
92 92
      */
93
-    public static function add(array $a, array $b)
93
+    public static function add( array $a, array $b )
94 94
     {
95 95
         /** @var int $x1 */
96
-        $x1 = $a[1] + $b[1];
96
+        $x1 = $a[ 1 ] + $b[ 1 ];
97 97
         /** @var int $c */
98 98
         $c = $x1 >> 32; // Carry if ($a + $b) > 0xffffffff
99 99
         /** @var int $x0 */
100
-        $x0 = $a[0] + $b[0] + $c;
100
+        $x0 = $a[ 0 ] + $b[ 0 ] + $c;
101 101
         return array(
102 102
             $x0 & 0xffffffff,
103 103
             $x1 & 0xffffffff
@@ -112,33 +112,33 @@  discard block
 block discarded – undo
112 112
      * @param int $c
113 113
      * @return array<int, mixed>
114 114
      */
115
-    public static function rotl_64($int0, $int1, $c)
115
+    public static function rotl_64( $int0, $int1, $c )
116 116
     {
117 117
         $int0 &= 0xffffffff;
118 118
         $int1 &= 0xffffffff;
119 119
         $c &= 63;
120
-        if ($c === 32) {
121
-            return array($int1, $int0);
120
+        if ( $c === 32 ) {
121
+            return array( $int1, $int0 );
122 122
         }
123
-        if ($c > 31) {
123
+        if ( $c > 31 ) {
124 124
             $tmp = $int1;
125 125
             $int1 = $int0;
126 126
             $int0 = $tmp;
127 127
             $c &= 31;
128 128
         }
129
-        if ($c === 0) {
130
-            return array($int0, $int1);
129
+        if ( $c === 0 ) {
130
+            return array( $int0, $int1 );
131 131
         }
132 132
         return array(
133 133
             0xffffffff & (
134
-                ($int0 << $c)
134
+                ( $int0 << $c )
135 135
                     |
136
-                ($int1 >> (32 - $c))
136
+                ( $int1 >> ( 32 - $c ) )
137 137
             ),
138 138
             0xffffffff & (
139
-                ($int1 << $c)
139
+                ( $int1 << $c )
140 140
                     |
141
-                ($int0 >> (32 - $c))
141
+                ( $int0 >> ( 32 - $c ) )
142 142
             ),
143 143
         );
144 144
     }
@@ -160,9 +160,9 @@  discard block
 block discarded – undo
160 160
      * @throws SodiumException
161 161
      * @throws TypeError
162 162
      */
163
-    public static function sipHash24($in, $key)
163
+    public static function sipHash24( $in, $key )
164 164
     {
165
-        $inlen = self::strlen($in);
165
+        $inlen = self::strlen( $in );
166 166
 
167 167
         # /* "somepseudorandomlygeneratedbytes" */
168 168
         # u64 v0 = 0x736f6d6570736575ULL;
@@ -187,10 +187,10 @@  discard block
 block discarded – undo
187 187
         # u64 k0 = LOAD64_LE( k );
188 188
         # u64 k1 = LOAD64_LE( k + 8 );
189 189
         $k = array(
190
-            self::load_4(self::substr($key, 4, 4)),
191
-            self::load_4(self::substr($key, 0, 4)),
192
-            self::load_4(self::substr($key, 12, 4)),
193
-            self::load_4(self::substr($key, 8, 4))
190
+            self::load_4( self::substr( $key, 4, 4 ) ),
191
+            self::load_4( self::substr( $key, 0, 4 ) ),
192
+            self::load_4( self::substr( $key, 12, 4 ) ),
193
+            self::load_4( self::substr( $key, 8, 4 ) )
194 194
         );
195 195
         // k0 => $k[0], $k[1]
196 196
         // k1 => $k[2], $k[3]
@@ -203,41 +203,41 @@  discard block
 block discarded – undo
203 203
         // See docblock for why the 0th index gets the higher bits.
204 204
 
205 205
         # v3 ^= k1;
206
-        $v[6] ^= $k[2];
207
-        $v[7] ^= $k[3];
206
+        $v[ 6 ] ^= $k[ 2 ];
207
+        $v[ 7 ] ^= $k[ 3 ];
208 208
         # v2 ^= k0;
209
-        $v[4] ^= $k[0];
210
-        $v[5] ^= $k[1];
209
+        $v[ 4 ] ^= $k[ 0 ];
210
+        $v[ 5 ] ^= $k[ 1 ];
211 211
         # v1 ^= k1;
212
-        $v[2] ^= $k[2];
213
-        $v[3] ^= $k[3];
212
+        $v[ 2 ] ^= $k[ 2 ];
213
+        $v[ 3 ] ^= $k[ 3 ];
214 214
         # v0 ^= k0;
215
-        $v[0] ^= $k[0];
216
-        $v[1] ^= $k[1];
215
+        $v[ 0 ] ^= $k[ 0 ];
216
+        $v[ 1 ] ^= $k[ 1 ];
217 217
 
218 218
         $left = $inlen;
219 219
         # for ( ; in != end; in += 8 )
220
-        while ($left >= 8) {
220
+        while ( $left >= 8 ) {
221 221
             # m = LOAD64_LE( in );
222 222
             $m = array(
223
-                self::load_4(self::substr($in, 4, 4)),
224
-                self::load_4(self::substr($in, 0, 4))
223
+                self::load_4( self::substr( $in, 4, 4 ) ),
224
+                self::load_4( self::substr( $in, 0, 4 ) )
225 225
             );
226 226
 
227 227
             # v3 ^= m;
228
-            $v[6] ^= $m[0];
229
-            $v[7] ^= $m[1];
228
+            $v[ 6 ] ^= $m[ 0 ];
229
+            $v[ 7 ] ^= $m[ 1 ];
230 230
 
231 231
             # SIPROUND;
232 232
             # SIPROUND;
233
-            $v = self::sipRound($v);
234
-            $v = self::sipRound($v);
233
+            $v = self::sipRound( $v );
234
+            $v = self::sipRound( $v );
235 235
 
236 236
             # v0 ^= m;
237
-            $v[0] ^= $m[0];
238
-            $v[1] ^= $m[1];
237
+            $v[ 0 ] ^= $m[ 0 ];
238
+            $v[ 1 ] ^= $m[ 1 ];
239 239
 
240
-            $in = self::substr($in, 8);
240
+            $in = self::substr( $in, 8 );
241 241
             $left -= 8;
242 242
         }
243 243
 
@@ -252,55 +252,55 @@  discard block
 block discarded – undo
252 252
         #     case 1: b |= ( ( u64 )in[ 0] ); break;
253 253
         #     case 0: break;
254 254
         # }
255
-        switch ($left) {
255
+        switch ( $left ) {
256 256
             case 7:
257
-                $b[0] |= self::chrToInt($in[6]) << 16;
257
+                $b[ 0 ] |= self::chrToInt( $in[ 6 ] ) << 16;
258 258
             case 6:
259
-                $b[0] |= self::chrToInt($in[5]) << 8;
259
+                $b[ 0 ] |= self::chrToInt( $in[ 5 ] ) << 8;
260 260
             case 5:
261
-                $b[0] |= self::chrToInt($in[4]);
261
+                $b[ 0 ] |= self::chrToInt( $in[ 4 ] );
262 262
             case 4:
263
-                $b[1] |= self::chrToInt($in[3]) << 24;
263
+                $b[ 1 ] |= self::chrToInt( $in[ 3 ] ) << 24;
264 264
             case 3:
265
-                $b[1] |= self::chrToInt($in[2]) << 16;
265
+                $b[ 1 ] |= self::chrToInt( $in[ 2 ] ) << 16;
266 266
             case 2:
267
-                $b[1] |= self::chrToInt($in[1]) << 8;
267
+                $b[ 1 ] |= self::chrToInt( $in[ 1 ] ) << 8;
268 268
             case 1:
269
-                $b[1] |= self::chrToInt($in[0]);
269
+                $b[ 1 ] |= self::chrToInt( $in[ 0 ] );
270 270
             case 0:
271 271
                 break;
272 272
         }
273 273
         // See docblock for why the 0th index gets the higher bits.
274 274
 
275 275
         # v3 ^= b;
276
-        $v[6] ^= $b[0];
277
-        $v[7] ^= $b[1];
276
+        $v[ 6 ] ^= $b[ 0 ];
277
+        $v[ 7 ] ^= $b[ 1 ];
278 278
 
279 279
         # SIPROUND;
280 280
         # SIPROUND;
281
-        $v = self::sipRound($v);
282
-        $v = self::sipRound($v);
281
+        $v = self::sipRound( $v );
282
+        $v = self::sipRound( $v );
283 283
 
284 284
         # v0 ^= b;
285
-        $v[0] ^= $b[0];
286
-        $v[1] ^= $b[1];
285
+        $v[ 0 ] ^= $b[ 0 ];
286
+        $v[ 1 ] ^= $b[ 1 ];
287 287
 
288 288
         // Flip the lower 8 bits of v2 which is ($v[4], $v[5]) in our implementation
289 289
         # v2 ^= 0xff;
290
-        $v[5] ^= 0xff;
290
+        $v[ 5 ] ^= 0xff;
291 291
 
292 292
         # SIPROUND;
293 293
         # SIPROUND;
294 294
         # SIPROUND;
295 295
         # SIPROUND;
296
-        $v = self::sipRound($v);
297
-        $v = self::sipRound($v);
298
-        $v = self::sipRound($v);
299
-        $v = self::sipRound($v);
296
+        $v = self::sipRound( $v );
297
+        $v = self::sipRound( $v );
298
+        $v = self::sipRound( $v );
299
+        $v = self::sipRound( $v );
300 300
 
301 301
         # b = v0 ^ v1 ^ v2 ^ v3;
302 302
         # STORE64_LE( out, b );
303
-        return  self::store32_le($v[1] ^ $v[3] ^ $v[5] ^ $v[7]) .
304
-            self::store32_le($v[0] ^ $v[2] ^ $v[4] ^ $v[6]);
303
+        return  self::store32_le( $v[ 1 ] ^ $v[ 3 ] ^ $v[ 5 ] ^ $v[ 7 ] ) .
304
+            self::store32_le( $v[ 0 ] ^ $v[ 2 ] ^ $v[ 4 ] ^ $v[ 6 ] );
305 305
     }
306 306
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/XChaCha20.php 1 patch
Spacing   +23 added lines, -23 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_XChaCha20', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_XChaCha20', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -19,20 +19,20 @@  discard block
 block discarded – undo
19 19
      * @throws SodiumException
20 20
      * @throws TypeError
21 21
      */
22
-    public static function stream($len = 64, $nonce = '', $key = '')
22
+    public static function stream( $len = 64, $nonce = '', $key = '' )
23 23
     {
24
-        if (self::strlen($nonce) !== 24) {
25
-            throw new SodiumException('Nonce must be 24 bytes long');
24
+        if ( self::strlen( $nonce ) !== 24 ) {
25
+            throw new SodiumException( 'Nonce must be 24 bytes long' );
26 26
         }
27 27
         return self::encryptBytes(
28 28
             new ParagonIE_Sodium_Core_ChaCha20_Ctx(
29 29
                 self::hChaCha20(
30
-                    self::substr($nonce, 0, 16),
30
+                    self::substr( $nonce, 0, 16 ),
31 31
                     $key
32 32
                 ),
33
-                self::substr($nonce, 16, 8)
33
+                self::substr( $nonce, 16, 8 )
34 34
             ),
35
-            str_repeat("\x00", $len)
35
+            str_repeat( "\x00", $len )
36 36
         );
37 37
     }
38 38
 
@@ -46,20 +46,20 @@  discard block
 block discarded – undo
46 46
      * @throws SodiumException
47 47
      * @throws TypeError
48 48
      */
49
-    public static function ietfStream($len = 64, $nonce = '', $key = '')
49
+    public static function ietfStream( $len = 64, $nonce = '', $key = '' )
50 50
     {
51
-        if (self::strlen($nonce) !== 24) {
52
-            throw new SodiumException('Nonce must be 24 bytes long');
51
+        if ( self::strlen( $nonce ) !== 24 ) {
52
+            throw new SodiumException( 'Nonce must be 24 bytes long' );
53 53
         }
54 54
         return self::encryptBytes(
55 55
             new ParagonIE_Sodium_Core_ChaCha20_IetfCtx(
56 56
                 self::hChaCha20(
57
-                    self::substr($nonce, 0, 16),
57
+                    self::substr( $nonce, 0, 16 ),
58 58
                     $key
59 59
                 ),
60
-                "\x00\x00\x00\x00" . self::substr($nonce, 16, 8)
60
+                "\x00\x00\x00\x00" . self::substr( $nonce, 16, 8 )
61 61
             ),
62
-            str_repeat("\x00", $len)
62
+            str_repeat( "\x00", $len )
63 63
         );
64 64
     }
65 65
 
@@ -74,15 +74,15 @@  discard block
 block discarded – undo
74 74
      * @throws SodiumException
75 75
      * @throws TypeError
76 76
      */
77
-    public static function streamXorIc($message, $nonce = '', $key = '', $ic = '')
77
+    public static function streamXorIc( $message, $nonce = '', $key = '', $ic = '' )
78 78
     {
79
-        if (self::strlen($nonce) !== 24) {
80
-            throw new SodiumException('Nonce must be 24 bytes long');
79
+        if ( self::strlen( $nonce ) !== 24 ) {
80
+            throw new SodiumException( 'Nonce must be 24 bytes long' );
81 81
         }
82 82
         return self::encryptBytes(
83 83
             new ParagonIE_Sodium_Core_ChaCha20_Ctx(
84
-                self::hChaCha20(self::substr($nonce, 0, 16), $key),
85
-                self::substr($nonce, 16, 8),
84
+                self::hChaCha20( self::substr( $nonce, 0, 16 ), $key ),
85
+                self::substr( $nonce, 16, 8 ),
86 86
                 $ic
87 87
             ),
88 88
             $message
@@ -100,15 +100,15 @@  discard block
 block discarded – undo
100 100
      * @throws SodiumException
101 101
      * @throws TypeError
102 102
      */
103
-    public static function ietfStreamXorIc($message, $nonce = '', $key = '', $ic = '')
103
+    public static function ietfStreamXorIc( $message, $nonce = '', $key = '', $ic = '' )
104 104
     {
105
-        if (self::strlen($nonce) !== 24) {
106
-            throw new SodiumException('Nonce must be 24 bytes long');
105
+        if ( self::strlen( $nonce ) !== 24 ) {
106
+            throw new SodiumException( 'Nonce must be 24 bytes long' );
107 107
         }
108 108
         return self::encryptBytes(
109 109
             new ParagonIE_Sodium_Core_ChaCha20_IetfCtx(
110
-                self::hChaCha20(self::substr($nonce, 0, 16), $key),
111
-                "\x00\x00\x00\x00" . self::substr($nonce, 16, 8),
110
+                self::hChaCha20( self::substr( $nonce, 0, 16 ), $key ),
111
+                "\x00\x00\x00\x00" . self::substr( $nonce, 16, 8 ),
112 112
                 $ic
113 113
             ),
114 114
             $message
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/X25519.php 1 patch
Spacing   +145 added lines, -145 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_X25519', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_X25519', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -25,57 +25,57 @@  discard block
 block discarded – undo
25 25
         ParagonIE_Sodium_Core_Curve25519_Fe $g,
26 26
         $b = 0
27 27
     ) {
28
-        $f0 = (int) $f[0];
29
-        $f1 = (int) $f[1];
30
-        $f2 = (int) $f[2];
31
-        $f3 = (int) $f[3];
32
-        $f4 = (int) $f[4];
33
-        $f5 = (int) $f[5];
34
-        $f6 = (int) $f[6];
35
-        $f7 = (int) $f[7];
36
-        $f8 = (int) $f[8];
37
-        $f9 = (int) $f[9];
38
-        $g0 = (int) $g[0];
39
-        $g1 = (int) $g[1];
40
-        $g2 = (int) $g[2];
41
-        $g3 = (int) $g[3];
42
-        $g4 = (int) $g[4];
43
-        $g5 = (int) $g[5];
44
-        $g6 = (int) $g[6];
45
-        $g7 = (int) $g[7];
46
-        $g8 = (int) $g[8];
47
-        $g9 = (int) $g[9];
28
+        $f0 = (int)$f[ 0 ];
29
+        $f1 = (int)$f[ 1 ];
30
+        $f2 = (int)$f[ 2 ];
31
+        $f3 = (int)$f[ 3 ];
32
+        $f4 = (int)$f[ 4 ];
33
+        $f5 = (int)$f[ 5 ];
34
+        $f6 = (int)$f[ 6 ];
35
+        $f7 = (int)$f[ 7 ];
36
+        $f8 = (int)$f[ 8 ];
37
+        $f9 = (int)$f[ 9 ];
38
+        $g0 = (int)$g[ 0 ];
39
+        $g1 = (int)$g[ 1 ];
40
+        $g2 = (int)$g[ 2 ];
41
+        $g3 = (int)$g[ 3 ];
42
+        $g4 = (int)$g[ 4 ];
43
+        $g5 = (int)$g[ 5 ];
44
+        $g6 = (int)$g[ 6 ];
45
+        $g7 = (int)$g[ 7 ];
46
+        $g8 = (int)$g[ 8 ];
47
+        $g9 = (int)$g[ 9 ];
48 48
         $b = -$b;
49
-        $x0 = ($f0 ^ $g0) & $b;
50
-        $x1 = ($f1 ^ $g1) & $b;
51
-        $x2 = ($f2 ^ $g2) & $b;
52
-        $x3 = ($f3 ^ $g3) & $b;
53
-        $x4 = ($f4 ^ $g4) & $b;
54
-        $x5 = ($f5 ^ $g5) & $b;
55
-        $x6 = ($f6 ^ $g6) & $b;
56
-        $x7 = ($f7 ^ $g7) & $b;
57
-        $x8 = ($f8 ^ $g8) & $b;
58
-        $x9 = ($f9 ^ $g9) & $b;
59
-        $f[0] = $f0 ^ $x0;
60
-        $f[1] = $f1 ^ $x1;
61
-        $f[2] = $f2 ^ $x2;
62
-        $f[3] = $f3 ^ $x3;
63
-        $f[4] = $f4 ^ $x4;
64
-        $f[5] = $f5 ^ $x5;
65
-        $f[6] = $f6 ^ $x6;
66
-        $f[7] = $f7 ^ $x7;
67
-        $f[8] = $f8 ^ $x8;
68
-        $f[9] = $f9 ^ $x9;
69
-        $g[0] = $g0 ^ $x0;
70
-        $g[1] = $g1 ^ $x1;
71
-        $g[2] = $g2 ^ $x2;
72
-        $g[3] = $g3 ^ $x3;
73
-        $g[4] = $g4 ^ $x4;
74
-        $g[5] = $g5 ^ $x5;
75
-        $g[6] = $g6 ^ $x6;
76
-        $g[7] = $g7 ^ $x7;
77
-        $g[8] = $g8 ^ $x8;
78
-        $g[9] = $g9 ^ $x9;
49
+        $x0 = ( $f0 ^ $g0 ) & $b;
50
+        $x1 = ( $f1 ^ $g1 ) & $b;
51
+        $x2 = ( $f2 ^ $g2 ) & $b;
52
+        $x3 = ( $f3 ^ $g3 ) & $b;
53
+        $x4 = ( $f4 ^ $g4 ) & $b;
54
+        $x5 = ( $f5 ^ $g5 ) & $b;
55
+        $x6 = ( $f6 ^ $g6 ) & $b;
56
+        $x7 = ( $f7 ^ $g7 ) & $b;
57
+        $x8 = ( $f8 ^ $g8 ) & $b;
58
+        $x9 = ( $f9 ^ $g9 ) & $b;
59
+        $f[ 0 ] = $f0 ^ $x0;
60
+        $f[ 1 ] = $f1 ^ $x1;
61
+        $f[ 2 ] = $f2 ^ $x2;
62
+        $f[ 3 ] = $f3 ^ $x3;
63
+        $f[ 4 ] = $f4 ^ $x4;
64
+        $f[ 5 ] = $f5 ^ $x5;
65
+        $f[ 6 ] = $f6 ^ $x6;
66
+        $f[ 7 ] = $f7 ^ $x7;
67
+        $f[ 8 ] = $f8 ^ $x8;
68
+        $f[ 9 ] = $f9 ^ $x9;
69
+        $g[ 0 ] = $g0 ^ $x0;
70
+        $g[ 1 ] = $g1 ^ $x1;
71
+        $g[ 2 ] = $g2 ^ $x2;
72
+        $g[ 3 ] = $g3 ^ $x3;
73
+        $g[ 4 ] = $g4 ^ $x4;
74
+        $g[ 5 ] = $g5 ^ $x5;
75
+        $g[ 6 ] = $g6 ^ $x6;
76
+        $g[ 7 ] = $g7 ^ $x7;
77
+        $g[ 8 ] = $g8 ^ $x8;
78
+        $g[ 9 ] = $g9 ^ $x9;
79 79
     }
80 80
 
81 81
     /**
@@ -84,67 +84,67 @@  discard block
 block discarded – undo
84 84
      * @param ParagonIE_Sodium_Core_Curve25519_Fe $f
85 85
      * @return ParagonIE_Sodium_Core_Curve25519_Fe
86 86
      */
87
-    public static function fe_mul121666(ParagonIE_Sodium_Core_Curve25519_Fe $f)
87
+    public static function fe_mul121666( ParagonIE_Sodium_Core_Curve25519_Fe $f )
88 88
     {
89 89
         $h = array(
90
-            self::mul((int) $f[0], 121666, 17),
91
-            self::mul((int) $f[1], 121666, 17),
92
-            self::mul((int) $f[2], 121666, 17),
93
-            self::mul((int) $f[3], 121666, 17),
94
-            self::mul((int) $f[4], 121666, 17),
95
-            self::mul((int) $f[5], 121666, 17),
96
-            self::mul((int) $f[6], 121666, 17),
97
-            self::mul((int) $f[7], 121666, 17),
98
-            self::mul((int) $f[8], 121666, 17),
99
-            self::mul((int) $f[9], 121666, 17)
90
+            self::mul( (int)$f[ 0 ], 121666, 17 ),
91
+            self::mul( (int)$f[ 1 ], 121666, 17 ),
92
+            self::mul( (int)$f[ 2 ], 121666, 17 ),
93
+            self::mul( (int)$f[ 3 ], 121666, 17 ),
94
+            self::mul( (int)$f[ 4 ], 121666, 17 ),
95
+            self::mul( (int)$f[ 5 ], 121666, 17 ),
96
+            self::mul( (int)$f[ 6 ], 121666, 17 ),
97
+            self::mul( (int)$f[ 7 ], 121666, 17 ),
98
+            self::mul( (int)$f[ 8 ], 121666, 17 ),
99
+            self::mul( (int)$f[ 9 ], 121666, 17 )
100 100
         );
101 101
 
102 102
         /** @var int $carry9 */
103
-        $carry9 = ($h[9] + (1 << 24)) >> 25;
104
-        $h[0] += self::mul($carry9, 19, 5);
105
-        $h[9] -= $carry9 << 25;
103
+        $carry9 = ( $h[ 9 ] + ( 1 << 24 ) ) >> 25;
104
+        $h[ 0 ] += self::mul( $carry9, 19, 5 );
105
+        $h[ 9 ] -= $carry9 << 25;
106 106
         /** @var int $carry1 */
107
-        $carry1 = ($h[1] + (1 << 24)) >> 25;
108
-        $h[2] += $carry1;
109
-        $h[1] -= $carry1 << 25;
107
+        $carry1 = ( $h[ 1 ] + ( 1 << 24 ) ) >> 25;
108
+        $h[ 2 ] += $carry1;
109
+        $h[ 1 ] -= $carry1 << 25;
110 110
         /** @var int $carry3 */
111
-        $carry3 = ($h[3] + (1 << 24)) >> 25;
112
-        $h[4] += $carry3;
113
-        $h[3] -= $carry3 << 25;
111
+        $carry3 = ( $h[ 3 ] + ( 1 << 24 ) ) >> 25;
112
+        $h[ 4 ] += $carry3;
113
+        $h[ 3 ] -= $carry3 << 25;
114 114
         /** @var int $carry5 */
115
-        $carry5 = ($h[5] + (1 << 24)) >> 25;
116
-        $h[6] += $carry5;
117
-        $h[5] -= $carry5 << 25;
115
+        $carry5 = ( $h[ 5 ] + ( 1 << 24 ) ) >> 25;
116
+        $h[ 6 ] += $carry5;
117
+        $h[ 5 ] -= $carry5 << 25;
118 118
         /** @var int $carry7 */
119
-        $carry7 = ($h[7] + (1 << 24)) >> 25;
120
-        $h[8] += $carry7;
121
-        $h[7] -= $carry7 << 25;
119
+        $carry7 = ( $h[ 7 ] + ( 1 << 24 ) ) >> 25;
120
+        $h[ 8 ] += $carry7;
121
+        $h[ 7 ] -= $carry7 << 25;
122 122
 
123 123
         /** @var int $carry0 */
124
-        $carry0 = ($h[0] + (1 << 25)) >> 26;
125
-        $h[1] += $carry0;
126
-        $h[0] -= $carry0 << 26;
124
+        $carry0 = ( $h[ 0 ] + ( 1 << 25 ) ) >> 26;
125
+        $h[ 1 ] += $carry0;
126
+        $h[ 0 ] -= $carry0 << 26;
127 127
         /** @var int $carry2 */
128
-        $carry2 = ($h[2] + (1 << 25)) >> 26;
129
-        $h[3] += $carry2;
130
-        $h[2] -= $carry2 << 26;
128
+        $carry2 = ( $h[ 2 ] + ( 1 << 25 ) ) >> 26;
129
+        $h[ 3 ] += $carry2;
130
+        $h[ 2 ] -= $carry2 << 26;
131 131
         /** @var int $carry4 */
132
-        $carry4 = ($h[4] + (1 << 25)) >> 26;
133
-        $h[5] += $carry4;
134
-        $h[4] -= $carry4 << 26;
132
+        $carry4 = ( $h[ 4 ] + ( 1 << 25 ) ) >> 26;
133
+        $h[ 5 ] += $carry4;
134
+        $h[ 4 ] -= $carry4 << 26;
135 135
         /** @var int $carry6 */
136
-        $carry6 = ($h[6] + (1 << 25)) >> 26;
137
-        $h[7] += $carry6;
138
-        $h[6] -= $carry6 << 26;
136
+        $carry6 = ( $h[ 6 ] + ( 1 << 25 ) ) >> 26;
137
+        $h[ 7 ] += $carry6;
138
+        $h[ 6 ] -= $carry6 << 26;
139 139
         /** @var int $carry8 */
140
-        $carry8 = ($h[8] + (1 << 25)) >> 26;
141
-        $h[9] += $carry8;
142
-        $h[8] -= $carry8 << 26;
140
+        $carry8 = ( $h[ 8 ] + ( 1 << 25 ) ) >> 26;
141
+        $h[ 9 ] += $carry8;
142
+        $h[ 8 ] -= $carry8 << 26;
143 143
 
144
-        foreach ($h as $i => $value) {
145
-            $h[$i] = (int) $value;
144
+        foreach ( $h as $i => $value ) {
145
+            $h[ $i ] = (int)$value;
146 146
         }
147
-        return ParagonIE_Sodium_Core_Curve25519_Fe::fromArray($h);
147
+        return ParagonIE_Sodium_Core_Curve25519_Fe::fromArray( $h );
148 148
     }
149 149
 
150 150
     /**
@@ -158,27 +158,27 @@  discard block
 block discarded – undo
158 158
      * @throws SodiumException
159 159
      * @throws TypeError
160 160
      */
161
-    public static function crypto_scalarmult_curve25519_ref10($n, $p)
161
+    public static function crypto_scalarmult_curve25519_ref10( $n, $p )
162 162
     {
163 163
         # for (i = 0;i < 32;++i) e[i] = n[i];
164 164
         $e = '' . $n;
165 165
         # e[0] &= 248;
166
-        $e[0] = self::intToChr(
167
-            self::chrToInt($e[0]) & 248
166
+        $e[ 0 ] = self::intToChr(
167
+            self::chrToInt( $e[ 0 ] ) & 248
168 168
         );
169 169
         # e[31] &= 127;
170 170
         # e[31] |= 64;
171
-        $e[31] = self::intToChr(
172
-            (self::chrToInt($e[31]) & 127) | 64
171
+        $e[ 31 ] = self::intToChr(
172
+            ( self::chrToInt( $e[ 31 ] ) & 127 ) | 64
173 173
         );
174 174
         # fe_frombytes(x1,p);
175
-        $x1 = self::fe_frombytes($p);
175
+        $x1 = self::fe_frombytes( $p );
176 176
         # fe_1(x2);
177 177
         $x2 = self::fe_1();
178 178
         # fe_0(z2);
179 179
         $z2 = self::fe_0();
180 180
         # fe_copy(x3,x1);
181
-        $x3 = self::fe_copy($x1);
181
+        $x3 = self::fe_copy( $x1 );
182 182
         # fe_1(z3);
183 183
         $z3 = self::fe_1();
184 184
 
@@ -187,89 +187,89 @@  discard block
 block discarded – undo
187 187
         $swap = 0;
188 188
 
189 189
         # for (pos = 254;pos >= 0;--pos) {
190
-        for ($pos = 254; $pos >= 0; --$pos) {
190
+        for ( $pos = 254; $pos >= 0; --$pos ) {
191 191
             # b = e[pos / 8] >> (pos & 7);
192 192
             /** @var int $b */
193 193
             $b = self::chrToInt(
194
-                    $e[(int) floor($pos / 8)]
195
-                ) >> ($pos & 7);
194
+                    $e[ (int)floor( $pos / 8 ) ]
195
+                ) >> ( $pos & 7 );
196 196
             # b &= 1;
197 197
             $b &= 1;
198 198
             # swap ^= b;
199 199
             $swap ^= $b;
200 200
             # fe_cswap(x2,x3,swap);
201
-            self::fe_cswap($x2, $x3, $swap);
201
+            self::fe_cswap( $x2, $x3, $swap );
202 202
             # fe_cswap(z2,z3,swap);
203
-            self::fe_cswap($z2, $z3, $swap);
203
+            self::fe_cswap( $z2, $z3, $swap );
204 204
             # swap = b;
205 205
             $swap = $b;
206 206
             # fe_sub(tmp0,x3,z3);
207
-            $tmp0 = self::fe_sub($x3, $z3);
207
+            $tmp0 = self::fe_sub( $x3, $z3 );
208 208
             # fe_sub(tmp1,x2,z2);
209
-            $tmp1 = self::fe_sub($x2, $z2);
209
+            $tmp1 = self::fe_sub( $x2, $z2 );
210 210
 
211 211
             # fe_add(x2,x2,z2);
212
-            $x2 = self::fe_add($x2, $z2);
212
+            $x2 = self::fe_add( $x2, $z2 );
213 213
 
214 214
             # fe_add(z2,x3,z3);
215
-            $z2 = self::fe_add($x3, $z3);
215
+            $z2 = self::fe_add( $x3, $z3 );
216 216
 
217 217
             # fe_mul(z3,tmp0,x2);
218
-            $z3 = self::fe_mul($tmp0, $x2);
218
+            $z3 = self::fe_mul( $tmp0, $x2 );
219 219
 
220 220
             # fe_mul(z2,z2,tmp1);
221
-            $z2 = self::fe_mul($z2, $tmp1);
221
+            $z2 = self::fe_mul( $z2, $tmp1 );
222 222
 
223 223
             # fe_sq(tmp0,tmp1);
224
-            $tmp0 = self::fe_sq($tmp1);
224
+            $tmp0 = self::fe_sq( $tmp1 );
225 225
 
226 226
             # fe_sq(tmp1,x2);
227
-            $tmp1 = self::fe_sq($x2);
227
+            $tmp1 = self::fe_sq( $x2 );
228 228
 
229 229
             # fe_add(x3,z3,z2);
230
-            $x3 = self::fe_add($z3, $z2);
230
+            $x3 = self::fe_add( $z3, $z2 );
231 231
 
232 232
             # fe_sub(z2,z3,z2);
233
-            $z2 = self::fe_sub($z3, $z2);
233
+            $z2 = self::fe_sub( $z3, $z2 );
234 234
 
235 235
             # fe_mul(x2,tmp1,tmp0);
236
-            $x2 = self::fe_mul($tmp1, $tmp0);
236
+            $x2 = self::fe_mul( $tmp1, $tmp0 );
237 237
 
238 238
             # fe_sub(tmp1,tmp1,tmp0);
239
-            $tmp1 = self::fe_sub($tmp1, $tmp0);
239
+            $tmp1 = self::fe_sub( $tmp1, $tmp0 );
240 240
 
241 241
             # fe_sq(z2,z2);
242
-            $z2 = self::fe_sq($z2);
242
+            $z2 = self::fe_sq( $z2 );
243 243
 
244 244
             # fe_mul121666(z3,tmp1);
245
-            $z3 = self::fe_mul121666($tmp1);
245
+            $z3 = self::fe_mul121666( $tmp1 );
246 246
 
247 247
             # fe_sq(x3,x3);
248
-            $x3 = self::fe_sq($x3);
248
+            $x3 = self::fe_sq( $x3 );
249 249
 
250 250
             # fe_add(tmp0,tmp0,z3);
251
-            $tmp0 = self::fe_add($tmp0, $z3);
251
+            $tmp0 = self::fe_add( $tmp0, $z3 );
252 252
 
253 253
             # fe_mul(z3,x1,z2);
254
-            $z3 = self::fe_mul($x1, $z2);
254
+            $z3 = self::fe_mul( $x1, $z2 );
255 255
 
256 256
             # fe_mul(z2,tmp1,tmp0);
257
-            $z2 = self::fe_mul($tmp1, $tmp0);
257
+            $z2 = self::fe_mul( $tmp1, $tmp0 );
258 258
         }
259 259
 
260 260
         # fe_cswap(x2,x3,swap);
261
-        self::fe_cswap($x2, $x3, $swap);
261
+        self::fe_cswap( $x2, $x3, $swap );
262 262
 
263 263
         # fe_cswap(z2,z3,swap);
264
-        self::fe_cswap($z2, $z3, $swap);
264
+        self::fe_cswap( $z2, $z3, $swap );
265 265
 
266 266
         # fe_invert(z2,z2);
267
-        $z2 = self::fe_invert($z2);
267
+        $z2 = self::fe_invert( $z2 );
268 268
 
269 269
         # fe_mul(x2,x2,z2);
270
-        $x2 = self::fe_mul($x2, $z2);
270
+        $x2 = self::fe_mul( $x2, $z2 );
271 271
         # fe_tobytes(q,x2);
272
-        return self::fe_tobytes($x2);
272
+        return self::fe_tobytes( $x2 );
273 273
     }
274 274
 
275 275
     /**
@@ -283,10 +283,10 @@  discard block
 block discarded – undo
283 283
         ParagonIE_Sodium_Core_Curve25519_Fe $edwardsY,
284 284
         ParagonIE_Sodium_Core_Curve25519_Fe $edwardsZ
285 285
     ) {
286
-        $tempX = self::fe_add($edwardsZ, $edwardsY);
287
-        $tempZ = self::fe_sub($edwardsZ, $edwardsY);
288
-        $tempZ = self::fe_invert($tempZ);
289
-        return self::fe_mul($tempX, $tempZ);
286
+        $tempX = self::fe_add( $edwardsZ, $edwardsY );
287
+        $tempZ = self::fe_sub( $edwardsZ, $edwardsY );
288
+        $tempZ = self::fe_invert( $tempZ );
289
+        return self::fe_mul( $tempX, $tempZ );
290 290
     }
291 291
 
292 292
     /**
@@ -297,31 +297,31 @@  discard block
 block discarded – undo
297 297
      * @throws SodiumException
298 298
      * @throws TypeError
299 299
      */
300
-    public static function crypto_scalarmult_curve25519_ref10_base($n)
300
+    public static function crypto_scalarmult_curve25519_ref10_base( $n )
301 301
     {
302 302
         # for (i = 0;i < 32;++i) e[i] = n[i];
303 303
         $e = '' . $n;
304 304
 
305 305
         # e[0] &= 248;
306
-        $e[0] = self::intToChr(
307
-            self::chrToInt($e[0]) & 248
306
+        $e[ 0 ] = self::intToChr(
307
+            self::chrToInt( $e[ 0 ] ) & 248
308 308
         );
309 309
 
310 310
         # e[31] &= 127;
311 311
         # e[31] |= 64;
312
-        $e[31] = self::intToChr(
313
-            (self::chrToInt($e[31]) & 127) | 64
312
+        $e[ 31 ] = self::intToChr(
313
+            ( self::chrToInt( $e[ 31 ] ) & 127 ) | 64
314 314
         );
315 315
 
316
-        $A = self::ge_scalarmult_base($e);
316
+        $A = self::ge_scalarmult_base( $e );
317 317
         if (
318
-            !($A->Y instanceof ParagonIE_Sodium_Core_Curve25519_Fe)
318
+            ! ( $A->Y instanceof ParagonIE_Sodium_Core_Curve25519_Fe )
319 319
                 ||
320
-            !($A->Z instanceof ParagonIE_Sodium_Core_Curve25519_Fe)
320
+            ! ( $A->Z instanceof ParagonIE_Sodium_Core_Curve25519_Fe )
321 321
         ) {
322
-            throw new TypeError('Null points encountered');
322
+            throw new TypeError( 'Null points encountered' );
323 323
         }
324
-        $pk = self::edwards_to_montgomery($A->Y, $A->Z);
325
-        return self::fe_tobytes($pk);
324
+        $pk = self::edwards_to_montgomery( $A->Y, $A->Z );
325
+        return self::fe_tobytes( $pk );
326 326
     }
327 327
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/Poly1305.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_Poly1305', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_Poly1305', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -20,18 +20,18 @@  discard block
 block discarded – undo
20 20
      * @throws SodiumException
21 21
      * @throws TypeError
22 22
      */
23
-    public static function onetimeauth($m, $key)
23
+    public static function onetimeauth( $m, $key )
24 24
     {
25
-        if (self::strlen($key) < 32) {
25
+        if ( self::strlen( $key ) < 32 ) {
26 26
             throw new InvalidArgumentException(
27 27
                 'Key must be 32 bytes long.'
28 28
             );
29 29
         }
30 30
         $state = new ParagonIE_Sodium_Core_Poly1305_State(
31
-            self::substr($key, 0, 32)
31
+            self::substr( $key, 0, 32 )
32 32
         );
33 33
         return $state
34
-            ->update($m)
34
+            ->update( $m )
35 35
             ->finish();
36 36
     }
37 37
 
@@ -45,19 +45,19 @@  discard block
 block discarded – undo
45 45
      * @throws SodiumException
46 46
      * @throws TypeError
47 47
      */
48
-    public static function onetimeauth_verify($mac, $m, $key)
48
+    public static function onetimeauth_verify( $mac, $m, $key )
49 49
     {
50
-        if (self::strlen($key) < 32) {
50
+        if ( self::strlen( $key ) < 32 ) {
51 51
             throw new InvalidArgumentException(
52 52
                 'Key must be 32 bytes long.'
53 53
             );
54 54
         }
55 55
         $state = new ParagonIE_Sodium_Core_Poly1305_State(
56
-            self::substr($key, 0, 32)
56
+            self::substr( $key, 0, 32 )
57 57
         );
58 58
         $calc = $state
59
-            ->update($m)
59
+            ->update( $m )
60 60
             ->finish();
61
-        return self::verify_16($calc, $mac);
61
+        return self::verify_16( $calc, $mac );
62 62
     }
63 63
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/XSalsa20.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_XSalsa20', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_XSalsa20', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -21,12 +21,12 @@  discard block
 block discarded – undo
21 21
      * @throws SodiumException
22 22
      * @throws TypeError
23 23
      */
24
-    public static function xsalsa20($len, $nonce, $key)
24
+    public static function xsalsa20( $len, $nonce, $key )
25 25
     {
26 26
         $ret = self::salsa20(
27 27
             $len,
28
-            self::substr($nonce, 16, 8),
29
-            self::hsalsa20($nonce, $key)
28
+            self::substr( $nonce, 16, 8 ),
29
+            self::hsalsa20( $nonce, $key )
30 30
         );
31 31
         return $ret;
32 32
     }
@@ -43,12 +43,12 @@  discard block
 block discarded – undo
43 43
      * @throws SodiumException
44 44
      * @throws TypeError
45 45
      */
46
-    public static function xsalsa20_xor($message, $nonce, $key)
46
+    public static function xsalsa20_xor( $message, $nonce, $key )
47 47
     {
48 48
         return self::xorStrings(
49 49
             $message,
50 50
             self::xsalsa20(
51
-                self::strlen($message),
51
+                self::strlen( $message ),
52 52
                 $nonce,
53 53
                 $key
54 54
             )
Please login to merge, or discard this patch.