Completed
Pull Request — develop (#1687)
by
unknown
16:12
created
vendor/paragonie/sodium_compat/src/Compat.php 1 patch
Spacing   +1080 added lines, -1080 removed lines patch added patch discarded remove patch
@@ -21,7 +21,7 @@  discard block
 block discarded – undo
21 21
  * CAUTION * CAUTION * CAUTION * CAUTION * CAUTION * CAUTION * CAUTION * CAUTION *
22 22
  */
23 23
 
24
-if (class_exists('ParagonIE_Sodium_Compat', false)) {
24
+if ( class_exists( 'ParagonIE_Sodium_Compat', false ) ) {
25 25
     return;
26 26
 }
27 27
 
@@ -155,23 +155,23 @@  discard block
 block discarded – undo
155 155
      * @return void
156 156
      * @throws SodiumException
157 157
      */
158
-    public static function add(&$val, $addv)
158
+    public static function add( &$val, $addv )
159 159
     {
160
-        $val_len = ParagonIE_Sodium_Core_Util::strlen($val);
161
-        $addv_len = ParagonIE_Sodium_Core_Util::strlen($addv);
162
-        if ($val_len !== $addv_len) {
163
-            throw new SodiumException('values must have the same length');
160
+        $val_len = ParagonIE_Sodium_Core_Util::strlen( $val );
161
+        $addv_len = ParagonIE_Sodium_Core_Util::strlen( $addv );
162
+        if ( $val_len !== $addv_len ) {
163
+            throw new SodiumException( 'values must have the same length' );
164 164
         }
165
-        $A = ParagonIE_Sodium_Core_Util::stringToIntArray($val);
166
-        $B = ParagonIE_Sodium_Core_Util::stringToIntArray($addv);
165
+        $A = ParagonIE_Sodium_Core_Util::stringToIntArray( $val );
166
+        $B = ParagonIE_Sodium_Core_Util::stringToIntArray( $addv );
167 167
 
168 168
         $c = 0;
169
-        for ($i = 0; $i < $val_len; $i++) {
170
-            $c += ($A[$i] + $B[$i]);
171
-            $A[$i] = ($c & 0xff);
169
+        for ( $i = 0; $i < $val_len; $i++ ) {
170
+            $c += ( $A[ $i ] + $B[ $i ] );
171
+            $A[ $i ] = ( $c & 0xff );
172 172
             $c >>= 8;
173 173
         }
174
-        $val = ParagonIE_Sodium_Core_Util::intArrayToString($A);
174
+        $val = ParagonIE_Sodium_Core_Util::intArrayToString( $A );
175 175
     }
176 176
 
177 177
     /**
@@ -181,40 +181,40 @@  discard block
 block discarded – undo
181 181
      * @return string
182 182
      * @throws SodiumException
183 183
      */
184
-    public static function base642bin($encoded, $variant, $ignore = '')
184
+    public static function base642bin( $encoded, $variant, $ignore = '' )
185 185
     {
186 186
         /* Type checks: */
187
-        ParagonIE_Sodium_Core_Util::declareScalarType($encoded, 'string', 1);
187
+        ParagonIE_Sodium_Core_Util::declareScalarType( $encoded, 'string', 1 );
188 188
 
189 189
         /** @var string $encoded */
190
-        $encoded = (string) $encoded;
191
-        if (ParagonIE_Sodium_Core_Util::strlen($encoded) === 0) {
190
+        $encoded = (string)$encoded;
191
+        if ( ParagonIE_Sodium_Core_Util::strlen( $encoded ) === 0 ) {
192 192
             return '';
193 193
         }
194 194
 
195 195
         // Just strip before decoding
196
-        if (!empty($ignore)) {
197
-            $encoded = str_replace($ignore, '', $encoded);
196
+        if ( ! empty( $ignore ) ) {
197
+            $encoded = str_replace( $ignore, '', $encoded );
198 198
         }
199 199
 
200 200
         try {
201
-            switch ($variant) {
201
+            switch ( $variant ) {
202 202
                 case self::BASE64_VARIANT_ORIGINAL:
203
-                    return ParagonIE_Sodium_Core_Base64_Original::decode($encoded, true);
203
+                    return ParagonIE_Sodium_Core_Base64_Original::decode( $encoded, true );
204 204
                 case self::BASE64_VARIANT_ORIGINAL_NO_PADDING:
205
-                    return ParagonIE_Sodium_Core_Base64_Original::decode($encoded, false);
205
+                    return ParagonIE_Sodium_Core_Base64_Original::decode( $encoded, false );
206 206
                 case self::BASE64_VARIANT_URLSAFE:
207
-                    return ParagonIE_Sodium_Core_Base64_UrlSafe::decode($encoded, true);
207
+                    return ParagonIE_Sodium_Core_Base64_UrlSafe::decode( $encoded, true );
208 208
                 case self::BASE64_VARIANT_URLSAFE_NO_PADDING:
209
-                    return ParagonIE_Sodium_Core_Base64_UrlSafe::decode($encoded, false);
209
+                    return ParagonIE_Sodium_Core_Base64_UrlSafe::decode( $encoded, false );
210 210
                 default:
211
-                    throw new SodiumException('invalid base64 variant identifier');
211
+                    throw new SodiumException( 'invalid base64 variant identifier' );
212 212
             }
213
-        } catch (Exception $ex) {
214
-            if ($ex instanceof SodiumException) {
213
+        } catch ( Exception $ex ) {
214
+            if ( $ex instanceof SodiumException ) {
215 215
                 throw $ex;
216 216
             }
217
-            throw new SodiumException('invalid base64 string');
217
+            throw new SodiumException( 'invalid base64 string' );
218 218
         }
219 219
     }
220 220
 
@@ -224,27 +224,27 @@  discard block
 block discarded – undo
224 224
      * @return string
225 225
      * @throws SodiumException
226 226
      */
227
-    public static function bin2base64($decoded, $variant)
227
+    public static function bin2base64( $decoded, $variant )
228 228
     {
229 229
         /* Type checks: */
230
-        ParagonIE_Sodium_Core_Util::declareScalarType($decoded, 'string', 1);
230
+        ParagonIE_Sodium_Core_Util::declareScalarType( $decoded, 'string', 1 );
231 231
         /** @var string $decoded */
232
-        $decoded = (string) $decoded;
233
-        if (ParagonIE_Sodium_Core_Util::strlen($decoded) === 0) {
232
+        $decoded = (string)$decoded;
233
+        if ( ParagonIE_Sodium_Core_Util::strlen( $decoded ) === 0 ) {
234 234
             return '';
235 235
         }
236 236
 
237
-        switch ($variant) {
237
+        switch ( $variant ) {
238 238
             case self::BASE64_VARIANT_ORIGINAL:
239
-                return ParagonIE_Sodium_Core_Base64_Original::encode($decoded);
239
+                return ParagonIE_Sodium_Core_Base64_Original::encode( $decoded );
240 240
             case self::BASE64_VARIANT_ORIGINAL_NO_PADDING:
241
-                return ParagonIE_Sodium_Core_Base64_Original::encodeUnpadded($decoded);
241
+                return ParagonIE_Sodium_Core_Base64_Original::encodeUnpadded( $decoded );
242 242
             case self::BASE64_VARIANT_URLSAFE:
243
-                return ParagonIE_Sodium_Core_Base64_UrlSafe::encode($decoded);
243
+                return ParagonIE_Sodium_Core_Base64_UrlSafe::encode( $decoded );
244 244
             case self::BASE64_VARIANT_URLSAFE_NO_PADDING:
245
-                return ParagonIE_Sodium_Core_Base64_UrlSafe::encodeUnpadded($decoded);
245
+                return ParagonIE_Sodium_Core_Base64_UrlSafe::encodeUnpadded( $decoded );
246 246
             default:
247
-                throw new SodiumException('invalid base64 variant identifier');
247
+                throw new SodiumException( 'invalid base64 variant identifier' );
248 248
         }
249 249
     }
250 250
 
@@ -257,18 +257,18 @@  discard block
 block discarded – undo
257 257
      * @throws TypeError
258 258
      * @psalm-suppress MixedArgument
259 259
      */
260
-    public static function bin2hex($string)
260
+    public static function bin2hex( $string )
261 261
     {
262 262
         /* Type checks: */
263
-        ParagonIE_Sodium_Core_Util::declareScalarType($string, 'string', 1);
263
+        ParagonIE_Sodium_Core_Util::declareScalarType( $string, 'string', 1 );
264 264
 
265
-        if (self::useNewSodiumAPI()) {
266
-            return (string) sodium_bin2hex($string);
265
+        if ( self::useNewSodiumAPI() ) {
266
+            return (string)sodium_bin2hex( $string );
267 267
         }
268
-        if (self::use_fallback('bin2hex')) {
269
-            return (string) call_user_func('\\Sodium\\bin2hex', $string);
268
+        if ( self::use_fallback( 'bin2hex' ) ) {
269
+            return (string)call_user_func( '\\Sodium\\bin2hex', $string );
270 270
         }
271
-        return ParagonIE_Sodium_Core_Util::bin2hex($string);
271
+        return ParagonIE_Sodium_Core_Util::bin2hex( $string );
272 272
     }
273 273
 
274 274
     /**
@@ -284,19 +284,19 @@  discard block
 block discarded – undo
284 284
      * @throws TypeError
285 285
      * @psalm-suppress MixedArgument
286 286
      */
287
-    public static function compare($left, $right)
287
+    public static function compare( $left, $right )
288 288
     {
289 289
         /* Type checks: */
290
-        ParagonIE_Sodium_Core_Util::declareScalarType($left, 'string', 1);
291
-        ParagonIE_Sodium_Core_Util::declareScalarType($right, 'string', 2);
290
+        ParagonIE_Sodium_Core_Util::declareScalarType( $left, 'string', 1 );
291
+        ParagonIE_Sodium_Core_Util::declareScalarType( $right, 'string', 2 );
292 292
 
293
-        if (self::useNewSodiumAPI()) {
294
-            return (int) sodium_compare($left, $right);
293
+        if ( self::useNewSodiumAPI() ) {
294
+            return (int)sodium_compare( $left, $right );
295 295
         }
296
-        if (self::use_fallback('compare')) {
297
-            return (int) call_user_func('\\Sodium\\compare', $left, $right);
296
+        if ( self::use_fallback( 'compare' ) ) {
297
+            return (int)call_user_func( '\\Sodium\\compare', $left, $right );
298 298
         }
299
-        return ParagonIE_Sodium_Core_Util::compare($left, $right);
299
+        return ParagonIE_Sodium_Core_Util::compare( $left, $right );
300 300
     }
301 301
 
302 302
     /**
@@ -309,21 +309,21 @@  discard block
 block discarded – undo
309 309
      */
310 310
     public static function crypto_aead_aes256gcm_is_available()
311 311
     {
312
-        if (self::useNewSodiumAPI()) {
312
+        if ( self::useNewSodiumAPI() ) {
313 313
             return sodium_crypto_aead_aes256gcm_is_available();
314 314
         }
315
-        if (self::use_fallback('crypto_aead_aes256gcm_is_available')) {
316
-            return call_user_func('\\Sodium\\crypto_aead_aes256gcm_is_available');
315
+        if ( self::use_fallback( 'crypto_aead_aes256gcm_is_available' ) ) {
316
+            return call_user_func( '\\Sodium\\crypto_aead_aes256gcm_is_available' );
317 317
         }
318
-        if (PHP_VERSION_ID < 70100) {
318
+        if ( PHP_VERSION_ID < 70100 ) {
319 319
             // OpenSSL doesn't support AEAD before 7.1.0
320 320
             return false;
321 321
         }
322
-        if (!is_callable('openssl_encrypt') || !is_callable('openssl_decrypt')) {
322
+        if ( ! is_callable( 'openssl_encrypt' ) || ! is_callable( 'openssl_decrypt' ) ) {
323 323
             // OpenSSL isn't installed
324 324
             return false;
325 325
         }
326
-        return (bool) in_array('aes-256-gcm', openssl_get_cipher_methods());
326
+        return (bool)in_array( 'aes-256-gcm', openssl_get_cipher_methods() );
327 327
     }
328 328
 
329 329
     /**
@@ -353,32 +353,32 @@  discard block
 block discarded – undo
353 353
         $nonce = '',
354 354
         $key = ''
355 355
     ) {
356
-        if (!self::crypto_aead_aes256gcm_is_available()) {
357
-            throw new SodiumException('AES-256-GCM is not available');
356
+        if ( ! self::crypto_aead_aes256gcm_is_available() ) {
357
+            throw new SodiumException( 'AES-256-GCM is not available' );
358 358
         }
359
-        ParagonIE_Sodium_Core_Util::declareScalarType($ciphertext, 'string', 1);
360
-        ParagonIE_Sodium_Core_Util::declareScalarType($assocData, 'string', 2);
361
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 3);
362
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
359
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ciphertext, 'string', 1 );
360
+        ParagonIE_Sodium_Core_Util::declareScalarType( $assocData, 'string', 2 );
361
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 3 );
362
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
363 363
 
364 364
         /* Input validation: */
365
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_AEAD_AES256GCM_NPUBBYTES) {
366
-            throw new SodiumException('Nonce must be CRYPTO_AEAD_AES256GCM_NPUBBYTES long');
365
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_AEAD_AES256GCM_NPUBBYTES ) {
366
+            throw new SodiumException( 'Nonce must be CRYPTO_AEAD_AES256GCM_NPUBBYTES long' );
367 367
         }
368
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AEAD_AES256GCM_KEYBYTES) {
369
-            throw new SodiumException('Key must be CRYPTO_AEAD_AES256GCM_KEYBYTES long');
368
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AEAD_AES256GCM_KEYBYTES ) {
369
+            throw new SodiumException( 'Key must be CRYPTO_AEAD_AES256GCM_KEYBYTES long' );
370 370
         }
371
-        if (ParagonIE_Sodium_Core_Util::strlen($ciphertext) < self::CRYPTO_AEAD_AES256GCM_ABYTES) {
372
-            throw new SodiumException('Message must be at least CRYPTO_AEAD_AES256GCM_ABYTES long');
371
+        if ( ParagonIE_Sodium_Core_Util::strlen( $ciphertext ) < self::CRYPTO_AEAD_AES256GCM_ABYTES ) {
372
+            throw new SodiumException( 'Message must be at least CRYPTO_AEAD_AES256GCM_ABYTES long' );
373 373
         }
374
-        if (!is_callable('openssl_decrypt')) {
375
-            throw new SodiumException('The OpenSSL extension is not installed, or openssl_decrypt() is not available');
374
+        if ( ! is_callable( 'openssl_decrypt' ) ) {
375
+            throw new SodiumException( 'The OpenSSL extension is not installed, or openssl_decrypt() is not available' );
376 376
         }
377 377
 
378 378
         /** @var string $ctext */
379
-        $ctext = ParagonIE_Sodium_Core_Util::substr($ciphertext, 0, -self::CRYPTO_AEAD_AES256GCM_ABYTES);
379
+        $ctext = ParagonIE_Sodium_Core_Util::substr( $ciphertext, 0, -self::CRYPTO_AEAD_AES256GCM_ABYTES );
380 380
         /** @var string $authTag */
381
-        $authTag = ParagonIE_Sodium_Core_Util::substr($ciphertext, -self::CRYPTO_AEAD_AES256GCM_ABYTES, 16);
381
+        $authTag = ParagonIE_Sodium_Core_Util::substr( $ciphertext, -self::CRYPTO_AEAD_AES256GCM_ABYTES, 16 );
382 382
         return openssl_decrypt(
383 383
             $ctext,
384 384
             'aes-256-gcm',
@@ -413,24 +413,24 @@  discard block
 block discarded – undo
413 413
         $nonce = '',
414 414
         $key = ''
415 415
     ) {
416
-        if (!self::crypto_aead_aes256gcm_is_available()) {
417
-            throw new SodiumException('AES-256-GCM is not available');
416
+        if ( ! self::crypto_aead_aes256gcm_is_available() ) {
417
+            throw new SodiumException( 'AES-256-GCM is not available' );
418 418
         }
419
-        ParagonIE_Sodium_Core_Util::declareScalarType($plaintext, 'string', 1);
420
-        ParagonIE_Sodium_Core_Util::declareScalarType($assocData, 'string', 2);
421
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 3);
422
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
419
+        ParagonIE_Sodium_Core_Util::declareScalarType( $plaintext, 'string', 1 );
420
+        ParagonIE_Sodium_Core_Util::declareScalarType( $assocData, 'string', 2 );
421
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 3 );
422
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
423 423
 
424 424
         /* Input validation: */
425
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_AEAD_AES256GCM_NPUBBYTES) {
426
-            throw new SodiumException('Nonce must be CRYPTO_AEAD_AES256GCM_NPUBBYTES long');
425
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_AEAD_AES256GCM_NPUBBYTES ) {
426
+            throw new SodiumException( 'Nonce must be CRYPTO_AEAD_AES256GCM_NPUBBYTES long' );
427 427
         }
428
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AEAD_AES256GCM_KEYBYTES) {
429
-            throw new SodiumException('Key must be CRYPTO_AEAD_AES256GCM_KEYBYTES long');
428
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AEAD_AES256GCM_KEYBYTES ) {
429
+            throw new SodiumException( 'Key must be CRYPTO_AEAD_AES256GCM_KEYBYTES long' );
430 430
         }
431 431
 
432
-        if (!is_callable('openssl_encrypt')) {
433
-            throw new SodiumException('The OpenSSL extension is not installed, or openssl_encrypt() is not available');
432
+        if ( ! is_callable( 'openssl_encrypt' ) ) {
433
+            throw new SodiumException( 'The OpenSSL extension is not installed, or openssl_encrypt() is not available' );
434 434
         }
435 435
 
436 436
         $authTag = '';
@@ -456,7 +456,7 @@  discard block
 block discarded – undo
456 456
      */
457 457
     public static function crypto_aead_aes256gcm_keygen()
458 458
     {
459
-        return random_bytes(self::CRYPTO_AEAD_AES256GCM_KEYBYTES);
459
+        return random_bytes( self::CRYPTO_AEAD_AES256GCM_KEYBYTES );
460 460
     }
461 461
 
462 462
     /**
@@ -487,23 +487,23 @@  discard block
 block discarded – undo
487 487
         $key = ''
488 488
     ) {
489 489
         /* Type checks: */
490
-        ParagonIE_Sodium_Core_Util::declareScalarType($ciphertext, 'string', 1);
491
-        ParagonIE_Sodium_Core_Util::declareScalarType($assocData, 'string', 2);
492
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 3);
493
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
490
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ciphertext, 'string', 1 );
491
+        ParagonIE_Sodium_Core_Util::declareScalarType( $assocData, 'string', 2 );
492
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 3 );
493
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
494 494
 
495 495
         /* Input validation: */
496
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES) {
497
-            throw new SodiumException('Nonce must be CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES long');
496
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES ) {
497
+            throw new SodiumException( 'Nonce must be CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES long' );
498 498
         }
499
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES) {
500
-            throw new SodiumException('Key must be CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES long');
499
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES ) {
500
+            throw new SodiumException( 'Key must be CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES long' );
501 501
         }
502
-        if (ParagonIE_Sodium_Core_Util::strlen($ciphertext) < self::CRYPTO_AEAD_CHACHA20POLY1305_ABYTES) {
503
-            throw new SodiumException('Message must be at least CRYPTO_AEAD_CHACHA20POLY1305_ABYTES long');
502
+        if ( ParagonIE_Sodium_Core_Util::strlen( $ciphertext ) < self::CRYPTO_AEAD_CHACHA20POLY1305_ABYTES ) {
503
+            throw new SodiumException( 'Message must be at least CRYPTO_AEAD_CHACHA20POLY1305_ABYTES long' );
504 504
         }
505 505
 
506
-        if (self::useNewSodiumAPI()) {
506
+        if ( self::useNewSodiumAPI() ) {
507 507
             /**
508 508
              * @psalm-suppress InvalidReturnStatement
509 509
              * @psalm-suppress FalsableReturnStatement
@@ -515,7 +515,7 @@  discard block
 block discarded – undo
515 515
                 $key
516 516
             );
517 517
         }
518
-        if (self::use_fallback('crypto_aead_chacha20poly1305_decrypt')) {
518
+        if ( self::use_fallback( 'crypto_aead_chacha20poly1305_decrypt' ) ) {
519 519
             return call_user_func(
520 520
                 '\\Sodium\\crypto_aead_chacha20poly1305_decrypt',
521 521
                 $ciphertext,
@@ -524,7 +524,7 @@  discard block
 block discarded – undo
524 524
                 $key
525 525
             );
526 526
         }
527
-        if (PHP_INT_SIZE === 4) {
527
+        if ( PHP_INT_SIZE === 4 ) {
528 528
             return ParagonIE_Sodium_Crypto32::aead_chacha20poly1305_decrypt(
529 529
                 $ciphertext,
530 530
                 $assocData,
@@ -567,29 +567,29 @@  discard block
 block discarded – undo
567 567
         $key = ''
568 568
     ) {
569 569
         /* Type checks: */
570
-        ParagonIE_Sodium_Core_Util::declareScalarType($plaintext, 'string', 1);
571
-        ParagonIE_Sodium_Core_Util::declareScalarType($assocData, 'string', 2);
572
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 3);
573
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
570
+        ParagonIE_Sodium_Core_Util::declareScalarType( $plaintext, 'string', 1 );
571
+        ParagonIE_Sodium_Core_Util::declareScalarType( $assocData, 'string', 2 );
572
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 3 );
573
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
574 574
 
575 575
         /* Input validation: */
576
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES) {
577
-            throw new SodiumException('Nonce must be CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES long');
576
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES ) {
577
+            throw new SodiumException( 'Nonce must be CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES long' );
578 578
         }
579
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES) {
580
-            throw new SodiumException('Key must be CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES long');
579
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES ) {
580
+            throw new SodiumException( 'Key must be CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES long' );
581 581
         }
582 582
 
583
-        if (self::useNewSodiumAPI()) {
584
-            return (string) sodium_crypto_aead_chacha20poly1305_encrypt(
583
+        if ( self::useNewSodiumAPI() ) {
584
+            return (string)sodium_crypto_aead_chacha20poly1305_encrypt(
585 585
                 $plaintext,
586 586
                 $assocData,
587 587
                 $nonce,
588 588
                 $key
589 589
             );
590 590
         }
591
-        if (self::use_fallback('crypto_aead_chacha20poly1305_encrypt')) {
592
-            return (string) call_user_func(
591
+        if ( self::use_fallback( 'crypto_aead_chacha20poly1305_encrypt' ) ) {
592
+            return (string)call_user_func(
593 593
                 '\\Sodium\\crypto_aead_chacha20poly1305_encrypt',
594 594
                 $plaintext,
595 595
                 $assocData,
@@ -597,7 +597,7 @@  discard block
 block discarded – undo
597 597
                 $key
598 598
             );
599 599
         }
600
-        if (PHP_INT_SIZE === 4) {
600
+        if ( PHP_INT_SIZE === 4 ) {
601 601
             return ParagonIE_Sodium_Crypto32::aead_chacha20poly1305_encrypt(
602 602
                 $plaintext,
603 603
                 $assocData,
@@ -641,23 +641,23 @@  discard block
 block discarded – undo
641 641
         $key = ''
642 642
     ) {
643 643
         /* Type checks: */
644
-        ParagonIE_Sodium_Core_Util::declareScalarType($ciphertext, 'string', 1);
645
-        ParagonIE_Sodium_Core_Util::declareScalarType($assocData, 'string', 2);
646
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 3);
647
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
644
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ciphertext, 'string', 1 );
645
+        ParagonIE_Sodium_Core_Util::declareScalarType( $assocData, 'string', 2 );
646
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 3 );
647
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
648 648
 
649 649
         /* Input validation: */
650
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES) {
651
-            throw new SodiumException('Nonce must be CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES long');
650
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES ) {
651
+            throw new SodiumException( 'Nonce must be CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES long' );
652 652
         }
653
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES) {
654
-            throw new SodiumException('Key must be CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES long');
653
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES ) {
654
+            throw new SodiumException( 'Key must be CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES long' );
655 655
         }
656
-        if (ParagonIE_Sodium_Core_Util::strlen($ciphertext) < self::CRYPTO_AEAD_CHACHA20POLY1305_ABYTES) {
657
-            throw new SodiumException('Message must be at least CRYPTO_AEAD_CHACHA20POLY1305_ABYTES long');
656
+        if ( ParagonIE_Sodium_Core_Util::strlen( $ciphertext ) < self::CRYPTO_AEAD_CHACHA20POLY1305_ABYTES ) {
657
+            throw new SodiumException( 'Message must be at least CRYPTO_AEAD_CHACHA20POLY1305_ABYTES long' );
658 658
         }
659 659
 
660
-        if (self::useNewSodiumAPI()) {
660
+        if ( self::useNewSodiumAPI() ) {
661 661
             /**
662 662
              * @psalm-suppress InvalidReturnStatement
663 663
              * @psalm-suppress FalsableReturnStatement
@@ -669,7 +669,7 @@  discard block
 block discarded – undo
669 669
                 $key
670 670
             );
671 671
         }
672
-        if (self::use_fallback('crypto_aead_chacha20poly1305_ietf_decrypt')) {
672
+        if ( self::use_fallback( 'crypto_aead_chacha20poly1305_ietf_decrypt' ) ) {
673 673
             return call_user_func(
674 674
                 '\\Sodium\\crypto_aead_chacha20poly1305_ietf_decrypt',
675 675
                 $ciphertext,
@@ -678,7 +678,7 @@  discard block
 block discarded – undo
678 678
                 $key
679 679
             );
680 680
         }
681
-        if (PHP_INT_SIZE === 4) {
681
+        if ( PHP_INT_SIZE === 4 ) {
682 682
             return ParagonIE_Sodium_Crypto32::aead_chacha20poly1305_ietf_decrypt(
683 683
                 $ciphertext,
684 684
                 $assocData,
@@ -704,7 +704,7 @@  discard block
 block discarded – undo
704 704
      */
705 705
     public static function crypto_aead_chacha20poly1305_keygen()
706 706
     {
707
-        return random_bytes(self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES);
707
+        return random_bytes( self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES );
708 708
     }
709 709
 
710 710
     /**
@@ -734,31 +734,31 @@  discard block
 block discarded – undo
734 734
         $key = ''
735 735
     ) {
736 736
         /* Type checks: */
737
-        ParagonIE_Sodium_Core_Util::declareScalarType($plaintext, 'string', 1);
738
-        if (!is_null($assocData)) {
739
-            ParagonIE_Sodium_Core_Util::declareScalarType($assocData, 'string', 2);
737
+        ParagonIE_Sodium_Core_Util::declareScalarType( $plaintext, 'string', 1 );
738
+        if ( ! is_null( $assocData ) ) {
739
+            ParagonIE_Sodium_Core_Util::declareScalarType( $assocData, 'string', 2 );
740 740
         }
741
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 3);
742
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
741
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 3 );
742
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
743 743
 
744 744
         /* Input validation: */
745
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES) {
746
-            throw new SodiumException('Nonce must be CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES long');
745
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES ) {
746
+            throw new SodiumException( 'Nonce must be CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES long' );
747 747
         }
748
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES) {
749
-            throw new SodiumException('Key must be CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES long');
748
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES ) {
749
+            throw new SodiumException( 'Key must be CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES long' );
750 750
         }
751 751
 
752
-        if (self::useNewSodiumAPI()) {
753
-            return (string) sodium_crypto_aead_chacha20poly1305_ietf_encrypt(
752
+        if ( self::useNewSodiumAPI() ) {
753
+            return (string)sodium_crypto_aead_chacha20poly1305_ietf_encrypt(
754 754
                 $plaintext,
755 755
                 $assocData,
756 756
                 $nonce,
757 757
                 $key
758 758
             );
759 759
         }
760
-        if (self::use_fallback('crypto_aead_chacha20poly1305_ietf_encrypt')) {
761
-            return (string) call_user_func(
760
+        if ( self::use_fallback( 'crypto_aead_chacha20poly1305_ietf_encrypt' ) ) {
761
+            return (string)call_user_func(
762 762
                 '\\Sodium\\crypto_aead_chacha20poly1305_ietf_encrypt',
763 763
                 $plaintext,
764 764
                 $assocData,
@@ -766,7 +766,7 @@  discard block
 block discarded – undo
766 766
                 $key
767 767
             );
768 768
         }
769
-        if (PHP_INT_SIZE === 4) {
769
+        if ( PHP_INT_SIZE === 4 ) {
770 770
             return ParagonIE_Sodium_Crypto32::aead_chacha20poly1305_ietf_encrypt(
771 771
                 $plaintext,
772 772
                 $assocData,
@@ -792,7 +792,7 @@  discard block
 block discarded – undo
792 792
      */
793 793
     public static function crypto_aead_chacha20poly1305_ietf_keygen()
794 794
     {
795
-        return random_bytes(self::CRYPTO_AEAD_CHACHA20POLY1305_IETF_KEYBYTES);
795
+        return random_bytes( self::CRYPTO_AEAD_CHACHA20POLY1305_IETF_KEYBYTES );
796 796
     }
797 797
 
798 798
     /**
@@ -823,27 +823,27 @@  discard block
 block discarded – undo
823 823
         $dontFallback = false
824 824
     ) {
825 825
         /* Type checks: */
826
-        ParagonIE_Sodium_Core_Util::declareScalarType($ciphertext, 'string', 1);
827
-        if (!is_null($assocData)) {
828
-            ParagonIE_Sodium_Core_Util::declareScalarType($assocData, 'string', 2);
826
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ciphertext, 'string', 1 );
827
+        if ( ! is_null( $assocData ) ) {
828
+            ParagonIE_Sodium_Core_Util::declareScalarType( $assocData, 'string', 2 );
829 829
         } else {
830 830
             $assocData = '';
831 831
         }
832
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 3);
833
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
832
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 3 );
833
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
834 834
 
835 835
         /* Input validation: */
836
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES) {
837
-            throw new SodiumException('Nonce must be CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES long');
836
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES ) {
837
+            throw new SodiumException( 'Nonce must be CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES long' );
838 838
         }
839
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES) {
840
-            throw new SodiumException('Key must be CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES long');
839
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES ) {
840
+            throw new SodiumException( 'Key must be CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES long' );
841 841
         }
842
-        if (ParagonIE_Sodium_Core_Util::strlen($ciphertext) < self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_ABYTES) {
843
-            throw new SodiumException('Message must be at least CRYPTO_AEAD_XCHACHA20POLY1305_IETF_ABYTES long');
842
+        if ( ParagonIE_Sodium_Core_Util::strlen( $ciphertext ) < self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_ABYTES ) {
843
+            throw new SodiumException( 'Message must be at least CRYPTO_AEAD_XCHACHA20POLY1305_IETF_ABYTES long' );
844 844
         }
845
-        if (self::useNewSodiumAPI() && !$dontFallback) {
846
-            if (is_callable('sodium_crypto_aead_xchacha20poly1305_ietf_decrypt')) {
845
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
846
+            if ( is_callable( 'sodium_crypto_aead_xchacha20poly1305_ietf_decrypt' ) ) {
847 847
                 return sodium_crypto_aead_xchacha20poly1305_ietf_decrypt(
848 848
                     $ciphertext,
849 849
                     $assocData,
@@ -853,7 +853,7 @@  discard block
 block discarded – undo
853 853
             }
854 854
         }
855 855
 
856
-        if (PHP_INT_SIZE === 4) {
856
+        if ( PHP_INT_SIZE === 4 ) {
857 857
             return ParagonIE_Sodium_Crypto32::aead_xchacha20poly1305_ietf_decrypt(
858 858
                 $ciphertext,
859 859
                 $assocData,
@@ -898,24 +898,24 @@  discard block
 block discarded – undo
898 898
         $dontFallback = false
899 899
     ) {
900 900
         /* Type checks: */
901
-        ParagonIE_Sodium_Core_Util::declareScalarType($plaintext, 'string', 1);
902
-        if (!is_null($assocData)) {
903
-            ParagonIE_Sodium_Core_Util::declareScalarType($assocData, 'string', 2);
901
+        ParagonIE_Sodium_Core_Util::declareScalarType( $plaintext, 'string', 1 );
902
+        if ( ! is_null( $assocData ) ) {
903
+            ParagonIE_Sodium_Core_Util::declareScalarType( $assocData, 'string', 2 );
904 904
         } else {
905 905
             $assocData = '';
906 906
         }
907
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 3);
908
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
907
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 3 );
908
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
909 909
 
910 910
         /* Input validation: */
911
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES) {
912
-            throw new SodiumException('Nonce must be CRYPTO_AEAD_XCHACHA20POLY1305_NPUBBYTES long');
911
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES ) {
912
+            throw new SodiumException( 'Nonce must be CRYPTO_AEAD_XCHACHA20POLY1305_NPUBBYTES long' );
913 913
         }
914
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES) {
915
-            throw new SodiumException('Key must be CRYPTO_AEAD_XCHACHA20POLY1305_KEYBYTES long');
914
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES ) {
915
+            throw new SodiumException( 'Key must be CRYPTO_AEAD_XCHACHA20POLY1305_KEYBYTES long' );
916 916
         }
917
-        if (self::useNewSodiumAPI() && !$dontFallback) {
918
-            if (is_callable('sodium_crypto_aead_xchacha20poly1305_ietf_encrypt')) {
917
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
918
+            if ( is_callable( 'sodium_crypto_aead_xchacha20poly1305_ietf_encrypt' ) ) {
919 919
                 return sodium_crypto_aead_xchacha20poly1305_ietf_encrypt(
920 920
                     $plaintext,
921 921
                     $assocData,
@@ -925,7 +925,7 @@  discard block
 block discarded – undo
925 925
             }
926 926
         }
927 927
 
928
-        if (PHP_INT_SIZE === 4) {
928
+        if ( PHP_INT_SIZE === 4 ) {
929 929
             return ParagonIE_Sodium_Crypto32::aead_xchacha20poly1305_ietf_encrypt(
930 930
                 $plaintext,
931 931
                 $assocData,
@@ -951,7 +951,7 @@  discard block
 block discarded – undo
951 951
      */
952 952
     public static function crypto_aead_xchacha20poly1305_ietf_keygen()
953 953
     {
954
-        return random_bytes(self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES);
954
+        return random_bytes( self::CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES );
955 955
     }
956 956
 
957 957
     /**
@@ -971,27 +971,27 @@  discard block
 block discarded – undo
971 971
      * @throws TypeError
972 972
      * @psalm-suppress MixedArgument
973 973
      */
974
-    public static function crypto_auth($message, $key)
974
+    public static function crypto_auth( $message, $key )
975 975
     {
976 976
         /* Type checks: */
977
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 1);
978
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 2);
977
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 1 );
978
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 2 );
979 979
 
980 980
         /* Input validation: */
981
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AUTH_KEYBYTES) {
982
-            throw new SodiumException('Argument 2 must be CRYPTO_AUTH_KEYBYTES long.');
981
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AUTH_KEYBYTES ) {
982
+            throw new SodiumException( 'Argument 2 must be CRYPTO_AUTH_KEYBYTES long.' );
983 983
         }
984 984
 
985
-        if (self::useNewSodiumAPI()) {
986
-            return (string) sodium_crypto_auth($message, $key);
985
+        if ( self::useNewSodiumAPI() ) {
986
+            return (string)sodium_crypto_auth( $message, $key );
987 987
         }
988
-        if (self::use_fallback('crypto_auth')) {
989
-            return (string) call_user_func('\\Sodium\\crypto_auth', $message, $key);
988
+        if ( self::use_fallback( 'crypto_auth' ) ) {
989
+            return (string)call_user_func( '\\Sodium\\crypto_auth', $message, $key );
990 990
         }
991
-        if (PHP_INT_SIZE === 4) {
992
-            return ParagonIE_Sodium_Crypto32::auth($message, $key);
991
+        if ( PHP_INT_SIZE === 4 ) {
992
+            return ParagonIE_Sodium_Crypto32::auth( $message, $key );
993 993
         }
994
-        return ParagonIE_Sodium_Crypto::auth($message, $key);
994
+        return ParagonIE_Sodium_Crypto::auth( $message, $key );
995 995
     }
996 996
 
997 997
     /**
@@ -1001,7 +1001,7 @@  discard block
 block discarded – undo
1001 1001
      */
1002 1002
     public static function crypto_auth_keygen()
1003 1003
     {
1004
-        return random_bytes(self::CRYPTO_AUTH_KEYBYTES);
1004
+        return random_bytes( self::CRYPTO_AUTH_KEYBYTES );
1005 1005
     }
1006 1006
 
1007 1007
     /**
@@ -1016,31 +1016,31 @@  discard block
 block discarded – undo
1016 1016
      * @throws TypeError
1017 1017
      * @psalm-suppress MixedArgument
1018 1018
      */
1019
-    public static function crypto_auth_verify($mac, $message, $key)
1019
+    public static function crypto_auth_verify( $mac, $message, $key )
1020 1020
     {
1021 1021
         /* Type checks: */
1022
-        ParagonIE_Sodium_Core_Util::declareScalarType($mac, 'string', 1);
1023
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 2);
1024
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
1022
+        ParagonIE_Sodium_Core_Util::declareScalarType( $mac, 'string', 1 );
1023
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 2 );
1024
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
1025 1025
 
1026 1026
         /* Input validation: */
1027
-        if (ParagonIE_Sodium_Core_Util::strlen($mac) !== self::CRYPTO_AUTH_BYTES) {
1028
-            throw new SodiumException('Argument 1 must be CRYPTO_AUTH_BYTES long.');
1027
+        if ( ParagonIE_Sodium_Core_Util::strlen( $mac ) !== self::CRYPTO_AUTH_BYTES ) {
1028
+            throw new SodiumException( 'Argument 1 must be CRYPTO_AUTH_BYTES long.' );
1029 1029
         }
1030
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_AUTH_KEYBYTES) {
1031
-            throw new SodiumException('Argument 3 must be CRYPTO_AUTH_KEYBYTES long.');
1030
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_AUTH_KEYBYTES ) {
1031
+            throw new SodiumException( 'Argument 3 must be CRYPTO_AUTH_KEYBYTES long.' );
1032 1032
         }
1033 1033
 
1034
-        if (self::useNewSodiumAPI()) {
1035
-            return (bool) sodium_crypto_auth_verify($mac, $message, $key);
1034
+        if ( self::useNewSodiumAPI() ) {
1035
+            return (bool)sodium_crypto_auth_verify( $mac, $message, $key );
1036 1036
         }
1037
-        if (self::use_fallback('crypto_auth_verify')) {
1038
-            return (bool) call_user_func('\\Sodium\\crypto_auth_verify', $mac, $message, $key);
1037
+        if ( self::use_fallback( 'crypto_auth_verify' ) ) {
1038
+            return (bool)call_user_func( '\\Sodium\\crypto_auth_verify', $mac, $message, $key );
1039 1039
         }
1040
-        if (PHP_INT_SIZE === 4) {
1041
-            return ParagonIE_Sodium_Crypto32::auth_verify($mac, $message, $key);
1040
+        if ( PHP_INT_SIZE === 4 ) {
1041
+            return ParagonIE_Sodium_Crypto32::auth_verify( $mac, $message, $key );
1042 1042
         }
1043
-        return ParagonIE_Sodium_Crypto::auth_verify($mac, $message, $key);
1043
+        return ParagonIE_Sodium_Crypto::auth_verify( $mac, $message, $key );
1044 1044
     }
1045 1045
 
1046 1046
     /**
@@ -1060,31 +1060,31 @@  discard block
 block discarded – undo
1060 1060
      * @throws TypeError
1061 1061
      * @psalm-suppress MixedArgument
1062 1062
      */
1063
-    public static function crypto_box($plaintext, $nonce, $keypair)
1063
+    public static function crypto_box( $plaintext, $nonce, $keypair )
1064 1064
     {
1065 1065
         /* Type checks: */
1066
-        ParagonIE_Sodium_Core_Util::declareScalarType($plaintext, 'string', 1);
1067
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
1068
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 3);
1066
+        ParagonIE_Sodium_Core_Util::declareScalarType( $plaintext, 'string', 1 );
1067
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
1068
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 3 );
1069 1069
 
1070 1070
         /* Input validation: */
1071
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_BOX_NONCEBYTES) {
1072
-            throw new SodiumException('Argument 2 must be CRYPTO_BOX_NONCEBYTES long.');
1071
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_BOX_NONCEBYTES ) {
1072
+            throw new SodiumException( 'Argument 2 must be CRYPTO_BOX_NONCEBYTES long.' );
1073 1073
         }
1074
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_BOX_KEYPAIRBYTES) {
1075
-            throw new SodiumException('Argument 3 must be CRYPTO_BOX_KEYPAIRBYTES long.');
1074
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_BOX_KEYPAIRBYTES ) {
1075
+            throw new SodiumException( 'Argument 3 must be CRYPTO_BOX_KEYPAIRBYTES long.' );
1076 1076
         }
1077 1077
 
1078
-        if (self::useNewSodiumAPI()) {
1079
-            return (string) sodium_crypto_box($plaintext, $nonce, $keypair);
1078
+        if ( self::useNewSodiumAPI() ) {
1079
+            return (string)sodium_crypto_box( $plaintext, $nonce, $keypair );
1080 1080
         }
1081
-        if (self::use_fallback('crypto_box')) {
1082
-            return (string) call_user_func('\\Sodium\\crypto_box', $plaintext, $nonce, $keypair);
1081
+        if ( self::use_fallback( 'crypto_box' ) ) {
1082
+            return (string)call_user_func( '\\Sodium\\crypto_box', $plaintext, $nonce, $keypair );
1083 1083
         }
1084
-        if (PHP_INT_SIZE === 4) {
1085
-            return ParagonIE_Sodium_Crypto32::box($plaintext, $nonce, $keypair);
1084
+        if ( PHP_INT_SIZE === 4 ) {
1085
+            return ParagonIE_Sodium_Crypto32::box( $plaintext, $nonce, $keypair );
1086 1086
         }
1087
-        return ParagonIE_Sodium_Crypto::box($plaintext, $nonce, $keypair);
1087
+        return ParagonIE_Sodium_Crypto::box( $plaintext, $nonce, $keypair );
1088 1088
     }
1089 1089
 
1090 1090
     /**
@@ -1104,27 +1104,27 @@  discard block
 block discarded – undo
1104 1104
      * @throws TypeError
1105 1105
      * @psalm-suppress MixedArgument
1106 1106
      */
1107
-    public static function crypto_box_seal($plaintext, $publicKey)
1107
+    public static function crypto_box_seal( $plaintext, $publicKey )
1108 1108
     {
1109 1109
         /* Type checks: */
1110
-        ParagonIE_Sodium_Core_Util::declareScalarType($plaintext, 'string', 1);
1111
-        ParagonIE_Sodium_Core_Util::declareScalarType($publicKey, 'string', 2);
1110
+        ParagonIE_Sodium_Core_Util::declareScalarType( $plaintext, 'string', 1 );
1111
+        ParagonIE_Sodium_Core_Util::declareScalarType( $publicKey, 'string', 2 );
1112 1112
 
1113 1113
         /* Input validation: */
1114
-        if (ParagonIE_Sodium_Core_Util::strlen($publicKey) !== self::CRYPTO_BOX_PUBLICKEYBYTES) {
1115
-            throw new SodiumException('Argument 2 must be CRYPTO_BOX_PUBLICKEYBYTES long.');
1114
+        if ( ParagonIE_Sodium_Core_Util::strlen( $publicKey ) !== self::CRYPTO_BOX_PUBLICKEYBYTES ) {
1115
+            throw new SodiumException( 'Argument 2 must be CRYPTO_BOX_PUBLICKEYBYTES long.' );
1116 1116
         }
1117 1117
 
1118
-        if (self::useNewSodiumAPI()) {
1119
-            return (string) sodium_crypto_box_seal($plaintext, $publicKey);
1118
+        if ( self::useNewSodiumAPI() ) {
1119
+            return (string)sodium_crypto_box_seal( $plaintext, $publicKey );
1120 1120
         }
1121
-        if (self::use_fallback('crypto_box_seal')) {
1122
-            return (string) call_user_func('\\Sodium\\crypto_box_seal', $plaintext, $publicKey);
1121
+        if ( self::use_fallback( 'crypto_box_seal' ) ) {
1122
+            return (string)call_user_func( '\\Sodium\\crypto_box_seal', $plaintext, $publicKey );
1123 1123
         }
1124
-        if (PHP_INT_SIZE === 4) {
1125
-            return ParagonIE_Sodium_Crypto32::box_seal($plaintext, $publicKey);
1124
+        if ( PHP_INT_SIZE === 4 ) {
1125
+            return ParagonIE_Sodium_Crypto32::box_seal( $plaintext, $publicKey );
1126 1126
         }
1127
-        return ParagonIE_Sodium_Crypto::box_seal($plaintext, $publicKey);
1127
+        return ParagonIE_Sodium_Crypto::box_seal( $plaintext, $publicKey );
1128 1128
     }
1129 1129
 
1130 1130
     /**
@@ -1142,31 +1142,31 @@  discard block
 block discarded – undo
1142 1142
      * @psalm-suppress MixedInferredReturnType
1143 1143
      * @psalm-suppress MixedReturnStatement
1144 1144
      */
1145
-    public static function crypto_box_seal_open($ciphertext, $keypair)
1145
+    public static function crypto_box_seal_open( $ciphertext, $keypair )
1146 1146
     {
1147 1147
         /* Type checks: */
1148
-        ParagonIE_Sodium_Core_Util::declareScalarType($ciphertext, 'string', 1);
1149
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 2);
1148
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ciphertext, 'string', 1 );
1149
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 2 );
1150 1150
 
1151 1151
         /* Input validation: */
1152
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_BOX_KEYPAIRBYTES) {
1153
-            throw new SodiumException('Argument 2 must be CRYPTO_BOX_KEYPAIRBYTES long.');
1152
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_BOX_KEYPAIRBYTES ) {
1153
+            throw new SodiumException( 'Argument 2 must be CRYPTO_BOX_KEYPAIRBYTES long.' );
1154 1154
         }
1155 1155
 
1156
-        if (self::useNewSodiumAPI()) {
1156
+        if ( self::useNewSodiumAPI() ) {
1157 1157
             /**
1158 1158
              * @psalm-suppress InvalidReturnStatement
1159 1159
              * @psalm-suppress FalsableReturnStatement
1160 1160
              */
1161
-            return sodium_crypto_box_seal_open($ciphertext, $keypair);
1161
+            return sodium_crypto_box_seal_open( $ciphertext, $keypair );
1162 1162
         }
1163
-        if (self::use_fallback('crypto_box_seal_open')) {
1164
-            return call_user_func('\\Sodium\\crypto_box_seal_open', $ciphertext, $keypair);
1163
+        if ( self::use_fallback( 'crypto_box_seal_open' ) ) {
1164
+            return call_user_func( '\\Sodium\\crypto_box_seal_open', $ciphertext, $keypair );
1165 1165
         }
1166
-        if (PHP_INT_SIZE === 4) {
1167
-            return ParagonIE_Sodium_Crypto32::box_seal_open($ciphertext, $keypair);
1166
+        if ( PHP_INT_SIZE === 4 ) {
1167
+            return ParagonIE_Sodium_Crypto32::box_seal_open( $ciphertext, $keypair );
1168 1168
         }
1169
-        return ParagonIE_Sodium_Crypto::box_seal_open($ciphertext, $keypair);
1169
+        return ParagonIE_Sodium_Crypto::box_seal_open( $ciphertext, $keypair );
1170 1170
     }
1171 1171
 
1172 1172
     /**
@@ -1182,13 +1182,13 @@  discard block
 block discarded – undo
1182 1182
      */
1183 1183
     public static function crypto_box_keypair()
1184 1184
     {
1185
-        if (self::useNewSodiumAPI()) {
1186
-            return (string) sodium_crypto_box_keypair();
1185
+        if ( self::useNewSodiumAPI() ) {
1186
+            return (string)sodium_crypto_box_keypair();
1187 1187
         }
1188
-        if (self::use_fallback('crypto_box_keypair')) {
1189
-            return (string) call_user_func('\\Sodium\\crypto_box_keypair');
1188
+        if ( self::use_fallback( 'crypto_box_keypair' ) ) {
1189
+            return (string)call_user_func( '\\Sodium\\crypto_box_keypair' );
1190 1190
         }
1191
-        if (PHP_INT_SIZE === 4) {
1191
+        if ( PHP_INT_SIZE === 4 ) {
1192 1192
             return ParagonIE_Sodium_Crypto32::box_keypair();
1193 1193
         }
1194 1194
         return ParagonIE_Sodium_Crypto::box_keypair();
@@ -1205,30 +1205,30 @@  discard block
 block discarded – undo
1205 1205
      * @throws TypeError
1206 1206
      * @psalm-suppress MixedArgument
1207 1207
      */
1208
-    public static function crypto_box_keypair_from_secretkey_and_publickey($secretKey, $publicKey)
1208
+    public static function crypto_box_keypair_from_secretkey_and_publickey( $secretKey, $publicKey )
1209 1209
     {
1210 1210
         /* Type checks: */
1211
-        ParagonIE_Sodium_Core_Util::declareScalarType($secretKey, 'string', 1);
1212
-        ParagonIE_Sodium_Core_Util::declareScalarType($publicKey, 'string', 2);
1211
+        ParagonIE_Sodium_Core_Util::declareScalarType( $secretKey, 'string', 1 );
1212
+        ParagonIE_Sodium_Core_Util::declareScalarType( $publicKey, 'string', 2 );
1213 1213
 
1214 1214
         /* Input validation: */
1215
-        if (ParagonIE_Sodium_Core_Util::strlen($secretKey) !== self::CRYPTO_BOX_SECRETKEYBYTES) {
1216
-            throw new SodiumException('Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.');
1215
+        if ( ParagonIE_Sodium_Core_Util::strlen( $secretKey ) !== self::CRYPTO_BOX_SECRETKEYBYTES ) {
1216
+            throw new SodiumException( 'Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.' );
1217 1217
         }
1218
-        if (ParagonIE_Sodium_Core_Util::strlen($publicKey) !== self::CRYPTO_BOX_PUBLICKEYBYTES) {
1219
-            throw new SodiumException('Argument 2 must be CRYPTO_BOX_PUBLICKEYBYTES long.');
1218
+        if ( ParagonIE_Sodium_Core_Util::strlen( $publicKey ) !== self::CRYPTO_BOX_PUBLICKEYBYTES ) {
1219
+            throw new SodiumException( 'Argument 2 must be CRYPTO_BOX_PUBLICKEYBYTES long.' );
1220 1220
         }
1221 1221
 
1222
-        if (self::useNewSodiumAPI()) {
1223
-            return (string) sodium_crypto_box_keypair_from_secretkey_and_publickey($secretKey, $publicKey);
1222
+        if ( self::useNewSodiumAPI() ) {
1223
+            return (string)sodium_crypto_box_keypair_from_secretkey_and_publickey( $secretKey, $publicKey );
1224 1224
         }
1225
-        if (self::use_fallback('crypto_box_keypair_from_secretkey_and_publickey')) {
1226
-            return (string) call_user_func('\\Sodium\\crypto_box_keypair_from_secretkey_and_publickey', $secretKey, $publicKey);
1225
+        if ( self::use_fallback( 'crypto_box_keypair_from_secretkey_and_publickey' ) ) {
1226
+            return (string)call_user_func( '\\Sodium\\crypto_box_keypair_from_secretkey_and_publickey', $secretKey, $publicKey );
1227 1227
         }
1228
-        if (PHP_INT_SIZE === 4) {
1229
-            return ParagonIE_Sodium_Crypto32::box_keypair_from_secretkey_and_publickey($secretKey, $publicKey);
1228
+        if ( PHP_INT_SIZE === 4 ) {
1229
+            return ParagonIE_Sodium_Crypto32::box_keypair_from_secretkey_and_publickey( $secretKey, $publicKey );
1230 1230
         }
1231
-        return ParagonIE_Sodium_Crypto::box_keypair_from_secretkey_and_publickey($secretKey, $publicKey);
1231
+        return ParagonIE_Sodium_Crypto::box_keypair_from_secretkey_and_publickey( $secretKey, $publicKey );
1232 1232
     }
1233 1233
 
1234 1234
     /**
@@ -1244,38 +1244,38 @@  discard block
 block discarded – undo
1244 1244
      * @psalm-suppress MixedInferredReturnType
1245 1245
      * @psalm-suppress MixedReturnStatement
1246 1246
      */
1247
-    public static function crypto_box_open($ciphertext, $nonce, $keypair)
1247
+    public static function crypto_box_open( $ciphertext, $nonce, $keypair )
1248 1248
     {
1249 1249
         /* Type checks: */
1250
-        ParagonIE_Sodium_Core_Util::declareScalarType($ciphertext, 'string', 1);
1251
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
1252
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 3);
1250
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ciphertext, 'string', 1 );
1251
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
1252
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 3 );
1253 1253
 
1254 1254
         /* Input validation: */
1255
-        if (ParagonIE_Sodium_Core_Util::strlen($ciphertext) < self::CRYPTO_BOX_MACBYTES) {
1256
-            throw new SodiumException('Argument 1 must be at least CRYPTO_BOX_MACBYTES long.');
1255
+        if ( ParagonIE_Sodium_Core_Util::strlen( $ciphertext ) < self::CRYPTO_BOX_MACBYTES ) {
1256
+            throw new SodiumException( 'Argument 1 must be at least CRYPTO_BOX_MACBYTES long.' );
1257 1257
         }
1258
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_BOX_NONCEBYTES) {
1259
-            throw new SodiumException('Argument 2 must be CRYPTO_BOX_NONCEBYTES long.');
1258
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_BOX_NONCEBYTES ) {
1259
+            throw new SodiumException( 'Argument 2 must be CRYPTO_BOX_NONCEBYTES long.' );
1260 1260
         }
1261
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_BOX_KEYPAIRBYTES) {
1262
-            throw new SodiumException('Argument 3 must be CRYPTO_BOX_KEYPAIRBYTES long.');
1261
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_BOX_KEYPAIRBYTES ) {
1262
+            throw new SodiumException( 'Argument 3 must be CRYPTO_BOX_KEYPAIRBYTES long.' );
1263 1263
         }
1264 1264
 
1265
-        if (self::useNewSodiumAPI()) {
1265
+        if ( self::useNewSodiumAPI() ) {
1266 1266
             /**
1267 1267
              * @psalm-suppress InvalidReturnStatement
1268 1268
              * @psalm-suppress FalsableReturnStatement
1269 1269
              */
1270
-            return sodium_crypto_box_open($ciphertext, $nonce, $keypair);
1270
+            return sodium_crypto_box_open( $ciphertext, $nonce, $keypair );
1271 1271
         }
1272
-        if (self::use_fallback('crypto_box_open')) {
1273
-            return call_user_func('\\Sodium\\crypto_box_open', $ciphertext, $nonce, $keypair);
1272
+        if ( self::use_fallback( 'crypto_box_open' ) ) {
1273
+            return call_user_func( '\\Sodium\\crypto_box_open', $ciphertext, $nonce, $keypair );
1274 1274
         }
1275
-        if (PHP_INT_SIZE === 4) {
1276
-            return ParagonIE_Sodium_Crypto32::box_open($ciphertext, $nonce, $keypair);
1275
+        if ( PHP_INT_SIZE === 4 ) {
1276
+            return ParagonIE_Sodium_Crypto32::box_open( $ciphertext, $nonce, $keypair );
1277 1277
         }
1278
-        return ParagonIE_Sodium_Crypto::box_open($ciphertext, $nonce, $keypair);
1278
+        return ParagonIE_Sodium_Crypto::box_open( $ciphertext, $nonce, $keypair );
1279 1279
     }
1280 1280
 
1281 1281
     /**
@@ -1287,26 +1287,26 @@  discard block
 block discarded – undo
1287 1287
      * @throws TypeError
1288 1288
      * @psalm-suppress MixedArgument
1289 1289
      */
1290
-    public static function crypto_box_publickey($keypair)
1290
+    public static function crypto_box_publickey( $keypair )
1291 1291
     {
1292 1292
         /* Type checks: */
1293
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 1);
1293
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 1 );
1294 1294
 
1295 1295
         /* Input validation: */
1296
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_BOX_KEYPAIRBYTES) {
1297
-            throw new SodiumException('Argument 1 must be CRYPTO_BOX_KEYPAIRBYTES long.');
1296
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_BOX_KEYPAIRBYTES ) {
1297
+            throw new SodiumException( 'Argument 1 must be CRYPTO_BOX_KEYPAIRBYTES long.' );
1298 1298
         }
1299 1299
 
1300
-        if (self::useNewSodiumAPI()) {
1301
-            return (string) sodium_crypto_box_publickey($keypair);
1300
+        if ( self::useNewSodiumAPI() ) {
1301
+            return (string)sodium_crypto_box_publickey( $keypair );
1302 1302
         }
1303
-        if (self::use_fallback('crypto_box_publickey')) {
1304
-            return (string) call_user_func('\\Sodium\\crypto_box_publickey', $keypair);
1303
+        if ( self::use_fallback( 'crypto_box_publickey' ) ) {
1304
+            return (string)call_user_func( '\\Sodium\\crypto_box_publickey', $keypair );
1305 1305
         }
1306
-        if (PHP_INT_SIZE === 4) {
1307
-            return ParagonIE_Sodium_Crypto32::box_publickey($keypair);
1306
+        if ( PHP_INT_SIZE === 4 ) {
1307
+            return ParagonIE_Sodium_Crypto32::box_publickey( $keypair );
1308 1308
         }
1309
-        return ParagonIE_Sodium_Crypto::box_publickey($keypair);
1309
+        return ParagonIE_Sodium_Crypto::box_publickey( $keypair );
1310 1310
     }
1311 1311
 
1312 1312
     /**
@@ -1318,26 +1318,26 @@  discard block
 block discarded – undo
1318 1318
      * @throws TypeError
1319 1319
      * @psalm-suppress MixedArgument
1320 1320
      */
1321
-    public static function crypto_box_publickey_from_secretkey($secretKey)
1321
+    public static function crypto_box_publickey_from_secretkey( $secretKey )
1322 1322
     {
1323 1323
         /* Type checks: */
1324
-        ParagonIE_Sodium_Core_Util::declareScalarType($secretKey, 'string', 1);
1324
+        ParagonIE_Sodium_Core_Util::declareScalarType( $secretKey, 'string', 1 );
1325 1325
 
1326 1326
         /* Input validation: */
1327
-        if (ParagonIE_Sodium_Core_Util::strlen($secretKey) !== self::CRYPTO_BOX_SECRETKEYBYTES) {
1328
-            throw new SodiumException('Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.');
1327
+        if ( ParagonIE_Sodium_Core_Util::strlen( $secretKey ) !== self::CRYPTO_BOX_SECRETKEYBYTES ) {
1328
+            throw new SodiumException( 'Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.' );
1329 1329
         }
1330 1330
 
1331
-        if (self::useNewSodiumAPI()) {
1332
-            return (string) sodium_crypto_box_publickey_from_secretkey($secretKey);
1331
+        if ( self::useNewSodiumAPI() ) {
1332
+            return (string)sodium_crypto_box_publickey_from_secretkey( $secretKey );
1333 1333
         }
1334
-        if (self::use_fallback('crypto_box_publickey_from_secretkey')) {
1335
-            return (string) call_user_func('\\Sodium\\crypto_box_publickey_from_secretkey', $secretKey);
1334
+        if ( self::use_fallback( 'crypto_box_publickey_from_secretkey' ) ) {
1335
+            return (string)call_user_func( '\\Sodium\\crypto_box_publickey_from_secretkey', $secretKey );
1336 1336
         }
1337
-        if (PHP_INT_SIZE === 4) {
1338
-            return ParagonIE_Sodium_Crypto32::box_publickey_from_secretkey($secretKey);
1337
+        if ( PHP_INT_SIZE === 4 ) {
1338
+            return ParagonIE_Sodium_Crypto32::box_publickey_from_secretkey( $secretKey );
1339 1339
         }
1340
-        return ParagonIE_Sodium_Crypto::box_publickey_from_secretkey($secretKey);
1340
+        return ParagonIE_Sodium_Crypto::box_publickey_from_secretkey( $secretKey );
1341 1341
     }
1342 1342
 
1343 1343
     /**
@@ -1349,26 +1349,26 @@  discard block
 block discarded – undo
1349 1349
      * @throws TypeError
1350 1350
      * @psalm-suppress MixedArgument
1351 1351
      */
1352
-    public static function crypto_box_secretkey($keypair)
1352
+    public static function crypto_box_secretkey( $keypair )
1353 1353
     {
1354 1354
         /* Type checks: */
1355
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 1);
1355
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 1 );
1356 1356
 
1357 1357
         /* Input validation: */
1358
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_BOX_KEYPAIRBYTES) {
1359
-            throw new SodiumException('Argument 1 must be CRYPTO_BOX_KEYPAIRBYTES long.');
1358
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_BOX_KEYPAIRBYTES ) {
1359
+            throw new SodiumException( 'Argument 1 must be CRYPTO_BOX_KEYPAIRBYTES long.' );
1360 1360
         }
1361 1361
 
1362
-        if (self::useNewSodiumAPI()) {
1363
-            return (string) sodium_crypto_box_secretkey($keypair);
1362
+        if ( self::useNewSodiumAPI() ) {
1363
+            return (string)sodium_crypto_box_secretkey( $keypair );
1364 1364
         }
1365
-        if (self::use_fallback('crypto_box_secretkey')) {
1366
-            return (string) call_user_func('\\Sodium\\crypto_box_secretkey', $keypair);
1365
+        if ( self::use_fallback( 'crypto_box_secretkey' ) ) {
1366
+            return (string)call_user_func( '\\Sodium\\crypto_box_secretkey', $keypair );
1367 1367
         }
1368
-        if (PHP_INT_SIZE === 4) {
1369
-            return ParagonIE_Sodium_Crypto32::box_secretkey($keypair);
1368
+        if ( PHP_INT_SIZE === 4 ) {
1369
+            return ParagonIE_Sodium_Crypto32::box_secretkey( $keypair );
1370 1370
         }
1371
-        return ParagonIE_Sodium_Crypto::box_secretkey($keypair);
1371
+        return ParagonIE_Sodium_Crypto::box_secretkey( $keypair );
1372 1372
     }
1373 1373
 
1374 1374
     /**
@@ -1381,21 +1381,21 @@  discard block
 block discarded – undo
1381 1381
      * @psalm-suppress MixedArgument
1382 1382
      * @psalm-suppress UndefinedFunction
1383 1383
      */
1384
-    public static function crypto_box_seed_keypair($seed)
1384
+    public static function crypto_box_seed_keypair( $seed )
1385 1385
     {
1386 1386
         /* Type checks: */
1387
-        ParagonIE_Sodium_Core_Util::declareScalarType($seed, 'string', 1);
1387
+        ParagonIE_Sodium_Core_Util::declareScalarType( $seed, 'string', 1 );
1388 1388
 
1389
-        if (self::useNewSodiumAPI()) {
1390
-            return (string) sodium_crypto_box_seed_keypair($seed);
1389
+        if ( self::useNewSodiumAPI() ) {
1390
+            return (string)sodium_crypto_box_seed_keypair( $seed );
1391 1391
         }
1392
-        if (self::use_fallback('crypto_box_seed_keypair')) {
1393
-            return (string) call_user_func('\\Sodium\\crypto_box_seed_keypair', $seed);
1392
+        if ( self::use_fallback( 'crypto_box_seed_keypair' ) ) {
1393
+            return (string)call_user_func( '\\Sodium\\crypto_box_seed_keypair', $seed );
1394 1394
         }
1395
-        if (PHP_INT_SIZE === 4) {
1396
-            return ParagonIE_Sodium_Crypto32::box_seed_keypair($seed);
1395
+        if ( PHP_INT_SIZE === 4 ) {
1396
+            return ParagonIE_Sodium_Crypto32::box_seed_keypair( $seed );
1397 1397
         }
1398
-        return ParagonIE_Sodium_Crypto::box_seed_keypair($seed);
1398
+        return ParagonIE_Sodium_Crypto::box_seed_keypair( $seed );
1399 1399
     }
1400 1400
 
1401 1401
     /**
@@ -1411,36 +1411,36 @@  discard block
 block discarded – undo
1411 1411
      * @throws TypeError
1412 1412
      * @psalm-suppress MixedArgument
1413 1413
      */
1414
-    public static function crypto_generichash($message, $key = '', $length = self::CRYPTO_GENERICHASH_BYTES)
1414
+    public static function crypto_generichash( $message, $key = '', $length = self::CRYPTO_GENERICHASH_BYTES )
1415 1415
     {
1416 1416
         /* Type checks: */
1417
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 1);
1418
-        if (is_null($key)) {
1417
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 1 );
1418
+        if ( is_null( $key ) ) {
1419 1419
             $key = '';
1420 1420
         }
1421
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 2);
1422
-        ParagonIE_Sodium_Core_Util::declareScalarType($length, 'int', 3);
1421
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 2 );
1422
+        ParagonIE_Sodium_Core_Util::declareScalarType( $length, 'int', 3 );
1423 1423
 
1424 1424
         /* Input validation: */
1425
-        if (!empty($key)) {
1426
-            if (ParagonIE_Sodium_Core_Util::strlen($key) < self::CRYPTO_GENERICHASH_KEYBYTES_MIN) {
1427
-                throw new SodiumException('Unsupported key size. Must be at least CRYPTO_GENERICHASH_KEYBYTES_MIN bytes long.');
1425
+        if ( ! empty( $key ) ) {
1426
+            if ( ParagonIE_Sodium_Core_Util::strlen( $key ) < self::CRYPTO_GENERICHASH_KEYBYTES_MIN ) {
1427
+                throw new SodiumException( 'Unsupported key size. Must be at least CRYPTO_GENERICHASH_KEYBYTES_MIN bytes long.' );
1428 1428
             }
1429
-            if (ParagonIE_Sodium_Core_Util::strlen($key) > self::CRYPTO_GENERICHASH_KEYBYTES_MAX) {
1430
-                throw new SodiumException('Unsupported key size. Must be at most CRYPTO_GENERICHASH_KEYBYTES_MAX bytes long.');
1429
+            if ( ParagonIE_Sodium_Core_Util::strlen( $key ) > self::CRYPTO_GENERICHASH_KEYBYTES_MAX ) {
1430
+                throw new SodiumException( 'Unsupported key size. Must be at most CRYPTO_GENERICHASH_KEYBYTES_MAX bytes long.' );
1431 1431
             }
1432 1432
         }
1433 1433
 
1434
-        if (self::useNewSodiumAPI()) {
1435
-            return (string) sodium_crypto_generichash($message, $key, $length);
1434
+        if ( self::useNewSodiumAPI() ) {
1435
+            return (string)sodium_crypto_generichash( $message, $key, $length );
1436 1436
         }
1437
-        if (self::use_fallback('crypto_generichash')) {
1438
-            return (string) call_user_func('\\Sodium\\crypto_generichash', $message, $key, $length);
1437
+        if ( self::use_fallback( 'crypto_generichash' ) ) {
1438
+            return (string)call_user_func( '\\Sodium\\crypto_generichash', $message, $key, $length );
1439 1439
         }
1440
-        if (PHP_INT_SIZE === 4) {
1441
-            return ParagonIE_Sodium_Crypto32::generichash($message, $key, $length);
1440
+        if ( PHP_INT_SIZE === 4 ) {
1441
+            return ParagonIE_Sodium_Crypto32::generichash( $message, $key, $length );
1442 1442
         }
1443
-        return ParagonIE_Sodium_Crypto::generichash($message, $key, $length);
1443
+        return ParagonIE_Sodium_Crypto::generichash( $message, $key, $length );
1444 1444
     }
1445 1445
 
1446 1446
     /**
@@ -1455,36 +1455,36 @@  discard block
 block discarded – undo
1455 1455
      * @psalm-suppress ReferenceConstraintViolation
1456 1456
      * @psalm-suppress ConflictingReferenceConstraint
1457 1457
      */
1458
-    public static function crypto_generichash_final(&$ctx, $length = self::CRYPTO_GENERICHASH_BYTES)
1458
+    public static function crypto_generichash_final( &$ctx, $length = self::CRYPTO_GENERICHASH_BYTES )
1459 1459
     {
1460 1460
         /* Type checks: */
1461
-        ParagonIE_Sodium_Core_Util::declareScalarType($ctx, 'string', 1);
1462
-        ParagonIE_Sodium_Core_Util::declareScalarType($length, 'int', 2);
1461
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ctx, 'string', 1 );
1462
+        ParagonIE_Sodium_Core_Util::declareScalarType( $length, 'int', 2 );
1463 1463
 
1464
-        if (self::useNewSodiumAPI()) {
1465
-            return sodium_crypto_generichash_final($ctx, $length);
1464
+        if ( self::useNewSodiumAPI() ) {
1465
+            return sodium_crypto_generichash_final( $ctx, $length );
1466 1466
         }
1467
-        if (self::use_fallback('crypto_generichash_final')) {
1467
+        if ( self::use_fallback( 'crypto_generichash_final' ) ) {
1468 1468
             $func = '\\Sodium\\crypto_generichash_final';
1469
-            return (string) $func($ctx, $length);
1469
+            return (string)$func( $ctx, $length );
1470 1470
         }
1471
-        if ($length < 1) {
1471
+        if ( $length < 1 ) {
1472 1472
             try {
1473
-                self::memzero($ctx);
1474
-            } catch (SodiumException $ex) {
1475
-                unset($ctx);
1473
+                self::memzero( $ctx );
1474
+            } catch ( SodiumException $ex ) {
1475
+                unset( $ctx );
1476 1476
             }
1477 1477
             return '';
1478 1478
         }
1479
-        if (PHP_INT_SIZE === 4) {
1480
-            $result = ParagonIE_Sodium_Crypto32::generichash_final($ctx, $length);
1479
+        if ( PHP_INT_SIZE === 4 ) {
1480
+            $result = ParagonIE_Sodium_Crypto32::generichash_final( $ctx, $length );
1481 1481
         } else {
1482
-            $result = ParagonIE_Sodium_Crypto::generichash_final($ctx, $length);
1482
+            $result = ParagonIE_Sodium_Crypto::generichash_final( $ctx, $length );
1483 1483
         }
1484 1484
         try {
1485
-            self::memzero($ctx);
1486
-        } catch (SodiumException $ex) {
1487
-            unset($ctx);
1485
+            self::memzero( $ctx );
1486
+        } catch ( SodiumException $ex ) {
1487
+            unset( $ctx );
1488 1488
         }
1489 1489
         return $result;
1490 1490
     }
@@ -1500,35 +1500,35 @@  discard block
 block discarded – undo
1500 1500
      * @throws TypeError
1501 1501
      * @psalm-suppress MixedArgument
1502 1502
      */
1503
-    public static function crypto_generichash_init($key = '', $length = self::CRYPTO_GENERICHASH_BYTES)
1503
+    public static function crypto_generichash_init( $key = '', $length = self::CRYPTO_GENERICHASH_BYTES )
1504 1504
     {
1505 1505
         /* Type checks: */
1506
-        if (is_null($key)) {
1506
+        if ( is_null( $key ) ) {
1507 1507
             $key = '';
1508 1508
         }
1509
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 1);
1510
-        ParagonIE_Sodium_Core_Util::declareScalarType($length, 'int', 2);
1509
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 1 );
1510
+        ParagonIE_Sodium_Core_Util::declareScalarType( $length, 'int', 2 );
1511 1511
 
1512 1512
         /* Input validation: */
1513
-        if (!empty($key)) {
1514
-            if (ParagonIE_Sodium_Core_Util::strlen($key) < self::CRYPTO_GENERICHASH_KEYBYTES_MIN) {
1515
-                throw new SodiumException('Unsupported key size. Must be at least CRYPTO_GENERICHASH_KEYBYTES_MIN bytes long.');
1513
+        if ( ! empty( $key ) ) {
1514
+            if ( ParagonIE_Sodium_Core_Util::strlen( $key ) < self::CRYPTO_GENERICHASH_KEYBYTES_MIN ) {
1515
+                throw new SodiumException( 'Unsupported key size. Must be at least CRYPTO_GENERICHASH_KEYBYTES_MIN bytes long.' );
1516 1516
             }
1517
-            if (ParagonIE_Sodium_Core_Util::strlen($key) > self::CRYPTO_GENERICHASH_KEYBYTES_MAX) {
1518
-                throw new SodiumException('Unsupported key size. Must be at most CRYPTO_GENERICHASH_KEYBYTES_MAX bytes long.');
1517
+            if ( ParagonIE_Sodium_Core_Util::strlen( $key ) > self::CRYPTO_GENERICHASH_KEYBYTES_MAX ) {
1518
+                throw new SodiumException( 'Unsupported key size. Must be at most CRYPTO_GENERICHASH_KEYBYTES_MAX bytes long.' );
1519 1519
             }
1520 1520
         }
1521 1521
 
1522
-        if (self::useNewSodiumAPI()) {
1523
-            return sodium_crypto_generichash_init($key, $length);
1522
+        if ( self::useNewSodiumAPI() ) {
1523
+            return sodium_crypto_generichash_init( $key, $length );
1524 1524
         }
1525
-        if (self::use_fallback('crypto_generichash_init')) {
1526
-            return (string) call_user_func('\\Sodium\\crypto_generichash_init', $key, $length);
1525
+        if ( self::use_fallback( 'crypto_generichash_init' ) ) {
1526
+            return (string)call_user_func( '\\Sodium\\crypto_generichash_init', $key, $length );
1527 1527
         }
1528
-        if (PHP_INT_SIZE === 4) {
1529
-            return ParagonIE_Sodium_Crypto32::generichash_init($key, $length);
1528
+        if ( PHP_INT_SIZE === 4 ) {
1529
+            return ParagonIE_Sodium_Crypto32::generichash_init( $key, $length );
1530 1530
         }
1531
-        return ParagonIE_Sodium_Crypto::generichash_init($key, $length);
1531
+        return ParagonIE_Sodium_Crypto::generichash_init( $key, $length );
1532 1532
     }
1533 1533
 
1534 1534
     /**
@@ -1551,31 +1551,31 @@  discard block
 block discarded – undo
1551 1551
         $personal = ''
1552 1552
     ) {
1553 1553
         /* Type checks: */
1554
-        if (is_null($key)) {
1554
+        if ( is_null( $key ) ) {
1555 1555
             $key = '';
1556 1556
         }
1557
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 1);
1558
-        ParagonIE_Sodium_Core_Util::declareScalarType($length, 'int', 2);
1559
-        ParagonIE_Sodium_Core_Util::declareScalarType($salt, 'string', 3);
1560
-        ParagonIE_Sodium_Core_Util::declareScalarType($personal, 'string', 4);
1561
-        $salt = str_pad($salt, 16, "\0", STR_PAD_RIGHT);
1562
-        $personal = str_pad($personal, 16, "\0", STR_PAD_RIGHT);
1557
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 1 );
1558
+        ParagonIE_Sodium_Core_Util::declareScalarType( $length, 'int', 2 );
1559
+        ParagonIE_Sodium_Core_Util::declareScalarType( $salt, 'string', 3 );
1560
+        ParagonIE_Sodium_Core_Util::declareScalarType( $personal, 'string', 4 );
1561
+        $salt = str_pad( $salt, 16, "\0", STR_PAD_RIGHT );
1562
+        $personal = str_pad( $personal, 16, "\0", STR_PAD_RIGHT );
1563 1563
 
1564 1564
         /* Input validation: */
1565
-        if (!empty($key)) {
1565
+        if ( ! empty( $key ) ) {
1566 1566
             /*
1567 1567
             if (ParagonIE_Sodium_Core_Util::strlen($key) < self::CRYPTO_GENERICHASH_KEYBYTES_MIN) {
1568 1568
                 throw new SodiumException('Unsupported key size. Must be at least CRYPTO_GENERICHASH_KEYBYTES_MIN bytes long.');
1569 1569
             }
1570 1570
             */
1571
-            if (ParagonIE_Sodium_Core_Util::strlen($key) > self::CRYPTO_GENERICHASH_KEYBYTES_MAX) {
1572
-                throw new SodiumException('Unsupported key size. Must be at most CRYPTO_GENERICHASH_KEYBYTES_MAX bytes long.');
1571
+            if ( ParagonIE_Sodium_Core_Util::strlen( $key ) > self::CRYPTO_GENERICHASH_KEYBYTES_MAX ) {
1572
+                throw new SodiumException( 'Unsupported key size. Must be at most CRYPTO_GENERICHASH_KEYBYTES_MAX bytes long.' );
1573 1573
             }
1574 1574
         }
1575
-        if (PHP_INT_SIZE === 4) {
1576
-            return ParagonIE_Sodium_Crypto32::generichash_init_salt_personal($key, $length, $salt, $personal);
1575
+        if ( PHP_INT_SIZE === 4 ) {
1576
+            return ParagonIE_Sodium_Crypto32::generichash_init_salt_personal( $key, $length, $salt, $personal );
1577 1577
         }
1578
-        return ParagonIE_Sodium_Crypto::generichash_init_salt_personal($key, $length, $salt, $personal);
1578
+        return ParagonIE_Sodium_Crypto::generichash_init_salt_personal( $key, $length, $salt, $personal );
1579 1579
     }
1580 1580
 
1581 1581
     /**
@@ -1591,25 +1591,25 @@  discard block
 block discarded – undo
1591 1591
      * @psalm-suppress MixedArgument
1592 1592
      * @psalm-suppress ReferenceConstraintViolation
1593 1593
      */
1594
-    public static function crypto_generichash_update(&$ctx, $message)
1594
+    public static function crypto_generichash_update( &$ctx, $message )
1595 1595
     {
1596 1596
         /* Type checks: */
1597
-        ParagonIE_Sodium_Core_Util::declareScalarType($ctx, 'string', 1);
1598
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 2);
1597
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ctx, 'string', 1 );
1598
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 2 );
1599 1599
 
1600
-        if (self::useNewSodiumAPI()) {
1601
-            sodium_crypto_generichash_update($ctx, $message);
1600
+        if ( self::useNewSodiumAPI() ) {
1601
+            sodium_crypto_generichash_update( $ctx, $message );
1602 1602
             return;
1603 1603
         }
1604
-        if (self::use_fallback('crypto_generichash_update')) {
1604
+        if ( self::use_fallback( 'crypto_generichash_update' ) ) {
1605 1605
             $func = '\\Sodium\\crypto_generichash_update';
1606
-            $func($ctx, $message);
1606
+            $func( $ctx, $message );
1607 1607
             return;
1608 1608
         }
1609
-        if (PHP_INT_SIZE === 4) {
1610
-            $ctx = ParagonIE_Sodium_Crypto32::generichash_update($ctx, $message);
1609
+        if ( PHP_INT_SIZE === 4 ) {
1610
+            $ctx = ParagonIE_Sodium_Crypto32::generichash_update( $ctx, $message );
1611 1611
         } else {
1612
-            $ctx = ParagonIE_Sodium_Crypto::generichash_update($ctx, $message);
1612
+            $ctx = ParagonIE_Sodium_Crypto::generichash_update( $ctx, $message );
1613 1613
         }
1614 1614
     }
1615 1615
 
@@ -1620,7 +1620,7 @@  discard block
 block discarded – undo
1620 1620
      */
1621 1621
     public static function crypto_generichash_keygen()
1622 1622
     {
1623
-        return random_bytes(self::CRYPTO_GENERICHASH_KEYBYTES);
1623
+        return random_bytes( self::CRYPTO_GENERICHASH_KEYBYTES );
1624 1624
     }
1625 1625
 
1626 1626
     /**
@@ -1637,39 +1637,39 @@  discard block
 block discarded – undo
1637 1637
         $context,
1638 1638
         $key
1639 1639
     ) {
1640
-        ParagonIE_Sodium_Core_Util::declareScalarType($subkey_len, 'int', 1);
1641
-        ParagonIE_Sodium_Core_Util::declareScalarType($subkey_id, 'int', 2);
1642
-        ParagonIE_Sodium_Core_Util::declareScalarType($context, 'string', 3);
1643
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 4);
1644
-        $subkey_id = (int) $subkey_id;
1645
-        $subkey_len = (int) $subkey_len;
1646
-        $context = (string) $context;
1647
-        $key = (string) $key;
1640
+        ParagonIE_Sodium_Core_Util::declareScalarType( $subkey_len, 'int', 1 );
1641
+        ParagonIE_Sodium_Core_Util::declareScalarType( $subkey_id, 'int', 2 );
1642
+        ParagonIE_Sodium_Core_Util::declareScalarType( $context, 'string', 3 );
1643
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 4 );
1644
+        $subkey_id = (int)$subkey_id;
1645
+        $subkey_len = (int)$subkey_len;
1646
+        $context = (string)$context;
1647
+        $key = (string)$key;
1648 1648
 
1649
-        if ($subkey_len < self::CRYPTO_KDF_BYTES_MIN) {
1650
-            throw new SodiumException('subkey cannot be smaller than SODIUM_CRYPTO_KDF_BYTES_MIN');
1649
+        if ( $subkey_len < self::CRYPTO_KDF_BYTES_MIN ) {
1650
+            throw new SodiumException( 'subkey cannot be smaller than SODIUM_CRYPTO_KDF_BYTES_MIN' );
1651 1651
         }
1652
-        if ($subkey_len > self::CRYPTO_KDF_BYTES_MAX) {
1653
-            throw new SodiumException('subkey cannot be larger than SODIUM_CRYPTO_KDF_BYTES_MAX');
1652
+        if ( $subkey_len > self::CRYPTO_KDF_BYTES_MAX ) {
1653
+            throw new SodiumException( 'subkey cannot be larger than SODIUM_CRYPTO_KDF_BYTES_MAX' );
1654 1654
         }
1655
-        if ($subkey_id < 0) {
1656
-            throw new SodiumException('subkey_id cannot be negative');
1655
+        if ( $subkey_id < 0 ) {
1656
+            throw new SodiumException( 'subkey_id cannot be negative' );
1657 1657
         }
1658
-        if (ParagonIE_Sodium_Core_Util::strlen($context) !== self::CRYPTO_KDF_CONTEXTBYTES) {
1659
-            throw new SodiumException('context should be SODIUM_CRYPTO_KDF_CONTEXTBYTES bytes');
1658
+        if ( ParagonIE_Sodium_Core_Util::strlen( $context ) !== self::CRYPTO_KDF_CONTEXTBYTES ) {
1659
+            throw new SodiumException( 'context should be SODIUM_CRYPTO_KDF_CONTEXTBYTES bytes' );
1660 1660
         }
1661
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_KDF_KEYBYTES) {
1662
-            throw new SodiumException('key should be SODIUM_CRYPTO_KDF_KEYBYTES bytes');
1661
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_KDF_KEYBYTES ) {
1662
+            throw new SodiumException( 'key should be SODIUM_CRYPTO_KDF_KEYBYTES bytes' );
1663 1663
         }
1664 1664
 
1665
-        $salt = ParagonIE_Sodium_Core_Util::store64_le($subkey_id);
1665
+        $salt = ParagonIE_Sodium_Core_Util::store64_le( $subkey_id );
1666 1666
         $state = self::crypto_generichash_init_salt_personal(
1667 1667
             $key,
1668 1668
             $subkey_len,
1669 1669
             $salt,
1670 1670
             $context
1671 1671
         );
1672
-        return self::crypto_generichash_final($state, $subkey_len);
1672
+        return self::crypto_generichash_final( $state, $subkey_len );
1673 1673
     }
1674 1674
 
1675 1675
     /**
@@ -1679,7 +1679,7 @@  discard block
 block discarded – undo
1679 1679
      */
1680 1680
     public static function crypto_kdf_keygen()
1681 1681
     {
1682
-        return random_bytes(self::CRYPTO_KDF_KEYBYTES);
1682
+        return random_bytes( self::CRYPTO_KDF_KEYBYTES );
1683 1683
     }
1684 1684
 
1685 1685
     /**
@@ -1712,31 +1712,31 @@  discard block
 block discarded – undo
1712 1712
      * @throws TypeError
1713 1713
      * @psalm-suppress MixedArgument
1714 1714
      */
1715
-    public static function crypto_kx($my_secret, $their_public, $client_public, $server_public, $dontFallback = false)
1715
+    public static function crypto_kx( $my_secret, $their_public, $client_public, $server_public, $dontFallback = false )
1716 1716
     {
1717 1717
         /* Type checks: */
1718
-        ParagonIE_Sodium_Core_Util::declareScalarType($my_secret, 'string', 1);
1719
-        ParagonIE_Sodium_Core_Util::declareScalarType($their_public, 'string', 2);
1720
-        ParagonIE_Sodium_Core_Util::declareScalarType($client_public, 'string', 3);
1721
-        ParagonIE_Sodium_Core_Util::declareScalarType($server_public, 'string', 4);
1718
+        ParagonIE_Sodium_Core_Util::declareScalarType( $my_secret, 'string', 1 );
1719
+        ParagonIE_Sodium_Core_Util::declareScalarType( $their_public, 'string', 2 );
1720
+        ParagonIE_Sodium_Core_Util::declareScalarType( $client_public, 'string', 3 );
1721
+        ParagonIE_Sodium_Core_Util::declareScalarType( $server_public, 'string', 4 );
1722 1722
 
1723 1723
         /* Input validation: */
1724
-        if (ParagonIE_Sodium_Core_Util::strlen($my_secret) !== self::CRYPTO_BOX_SECRETKEYBYTES) {
1725
-            throw new SodiumException('Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.');
1724
+        if ( ParagonIE_Sodium_Core_Util::strlen( $my_secret ) !== self::CRYPTO_BOX_SECRETKEYBYTES ) {
1725
+            throw new SodiumException( 'Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.' );
1726 1726
         }
1727
-        if (ParagonIE_Sodium_Core_Util::strlen($their_public) !== self::CRYPTO_BOX_PUBLICKEYBYTES) {
1728
-            throw new SodiumException('Argument 2 must be CRYPTO_BOX_PUBLICKEYBYTES long.');
1727
+        if ( ParagonIE_Sodium_Core_Util::strlen( $their_public ) !== self::CRYPTO_BOX_PUBLICKEYBYTES ) {
1728
+            throw new SodiumException( 'Argument 2 must be CRYPTO_BOX_PUBLICKEYBYTES long.' );
1729 1729
         }
1730
-        if (ParagonIE_Sodium_Core_Util::strlen($client_public) !== self::CRYPTO_BOX_PUBLICKEYBYTES) {
1731
-            throw new SodiumException('Argument 3 must be CRYPTO_BOX_PUBLICKEYBYTES long.');
1730
+        if ( ParagonIE_Sodium_Core_Util::strlen( $client_public ) !== self::CRYPTO_BOX_PUBLICKEYBYTES ) {
1731
+            throw new SodiumException( 'Argument 3 must be CRYPTO_BOX_PUBLICKEYBYTES long.' );
1732 1732
         }
1733
-        if (ParagonIE_Sodium_Core_Util::strlen($server_public) !== self::CRYPTO_BOX_PUBLICKEYBYTES) {
1734
-            throw new SodiumException('Argument 4 must be CRYPTO_BOX_PUBLICKEYBYTES long.');
1733
+        if ( ParagonIE_Sodium_Core_Util::strlen( $server_public ) !== self::CRYPTO_BOX_PUBLICKEYBYTES ) {
1734
+            throw new SodiumException( 'Argument 4 must be CRYPTO_BOX_PUBLICKEYBYTES long.' );
1735 1735
         }
1736 1736
 
1737
-        if (self::useNewSodiumAPI() && !$dontFallback) {
1738
-            if (is_callable('sodium_crypto_kx')) {
1739
-                return (string) sodium_crypto_kx(
1737
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
1738
+            if ( is_callable( 'sodium_crypto_kx' ) ) {
1739
+                return (string)sodium_crypto_kx(
1740 1740
                     $my_secret,
1741 1741
                     $their_public,
1742 1742
                     $client_public,
@@ -1744,8 +1744,8 @@  discard block
 block discarded – undo
1744 1744
                 );
1745 1745
             }
1746 1746
         }
1747
-        if (self::use_fallback('crypto_kx')) {
1748
-            return (string) call_user_func(
1747
+        if ( self::use_fallback( 'crypto_kx' ) ) {
1748
+            return (string)call_user_func(
1749 1749
                 '\\Sodium\\crypto_kx',
1750 1750
                 $my_secret,
1751 1751
                 $their_public,
@@ -1753,7 +1753,7 @@  discard block
 block discarded – undo
1753 1753
                 $server_public
1754 1754
             );
1755 1755
         }
1756
-        if (PHP_INT_SIZE === 4) {
1756
+        if ( PHP_INT_SIZE === 4 ) {
1757 1757
             return ParagonIE_Sodium_Crypto32::keyExchange(
1758 1758
                 $my_secret,
1759 1759
                 $their_public,
@@ -1774,18 +1774,18 @@  discard block
 block discarded – undo
1774 1774
      * @return string
1775 1775
      * @throws SodiumException
1776 1776
      */
1777
-    public static function crypto_kx_seed_keypair($seed)
1777
+    public static function crypto_kx_seed_keypair( $seed )
1778 1778
     {
1779
-        ParagonIE_Sodium_Core_Util::declareScalarType($seed, 'string', 1);
1779
+        ParagonIE_Sodium_Core_Util::declareScalarType( $seed, 'string', 1 );
1780 1780
 
1781
-        $seed = (string) $seed;
1781
+        $seed = (string)$seed;
1782 1782
 
1783
-        if (ParagonIE_Sodium_Core_Util::strlen($seed) !== self::CRYPTO_KX_SEEDBYTES) {
1784
-            throw new SodiumException('seed must be SODIUM_CRYPTO_KX_SEEDBYTES bytes');
1783
+        if ( ParagonIE_Sodium_Core_Util::strlen( $seed ) !== self::CRYPTO_KX_SEEDBYTES ) {
1784
+            throw new SodiumException( 'seed must be SODIUM_CRYPTO_KX_SEEDBYTES bytes' );
1785 1785
         }
1786 1786
 
1787
-        $sk = self::crypto_generichash($seed, '', self::CRYPTO_KX_SECRETKEYBYTES);
1788
-        $pk = self::crypto_scalarmult_base($sk);
1787
+        $sk = self::crypto_generichash( $seed, '', self::CRYPTO_KX_SECRETKEYBYTES );
1788
+        $pk = self::crypto_scalarmult_base( $sk );
1789 1789
         return $sk . $pk;
1790 1790
     }
1791 1791
 
@@ -1795,8 +1795,8 @@  discard block
 block discarded – undo
1795 1795
      */
1796 1796
     public static function crypto_kx_keypair()
1797 1797
     {
1798
-        $sk = self::randombytes_buf(self::CRYPTO_KX_SECRETKEYBYTES);
1799
-        $pk = self::crypto_scalarmult_base($sk);
1798
+        $sk = self::randombytes_buf( self::CRYPTO_KX_SECRETKEYBYTES );
1799
+        $pk = self::crypto_scalarmult_base( $sk );
1800 1800
         return $sk . $pk;
1801 1801
     }
1802 1802
 
@@ -1806,28 +1806,28 @@  discard block
 block discarded – undo
1806 1806
      * @return array{0: string, 1: string}
1807 1807
      * @throws SodiumException
1808 1808
      */
1809
-    public static function crypto_kx_client_session_keys($keypair, $serverPublicKey)
1809
+    public static function crypto_kx_client_session_keys( $keypair, $serverPublicKey )
1810 1810
     {
1811
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 1);
1812
-        ParagonIE_Sodium_Core_Util::declareScalarType($serverPublicKey, 'string', 2);
1811
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 1 );
1812
+        ParagonIE_Sodium_Core_Util::declareScalarType( $serverPublicKey, 'string', 2 );
1813 1813
 
1814
-        $keypair = (string) $keypair;
1815
-        $serverPublicKey = (string) $serverPublicKey;
1814
+        $keypair = (string)$keypair;
1815
+        $serverPublicKey = (string)$serverPublicKey;
1816 1816
 
1817
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_KX_KEYPAIRBYTES) {
1818
-            throw new SodiumException('keypair should be SODIUM_CRYPTO_KX_KEYPAIRBYTES bytes');
1817
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_KX_KEYPAIRBYTES ) {
1818
+            throw new SodiumException( 'keypair should be SODIUM_CRYPTO_KX_KEYPAIRBYTES bytes' );
1819 1819
         }
1820
-        if (ParagonIE_Sodium_Core_Util::strlen($serverPublicKey) !== self::CRYPTO_KX_PUBLICKEYBYTES) {
1821
-            throw new SodiumException('public keys must be SODIUM_CRYPTO_KX_PUBLICKEYBYTES bytes');
1820
+        if ( ParagonIE_Sodium_Core_Util::strlen( $serverPublicKey ) !== self::CRYPTO_KX_PUBLICKEYBYTES ) {
1821
+            throw new SodiumException( 'public keys must be SODIUM_CRYPTO_KX_PUBLICKEYBYTES bytes' );
1822 1822
         }
1823 1823
 
1824
-        $sk = self::crypto_kx_secretkey($keypair);
1825
-        $pk = self::crypto_kx_publickey($keypair);
1826
-        $h = self::crypto_generichash_init(null, self::CRYPTO_KX_SESSIONKEYBYTES * 2);
1827
-        self::crypto_generichash_update($h, self::crypto_scalarmult($sk, $serverPublicKey));
1828
-        self::crypto_generichash_update($h, $pk);
1829
-        self::crypto_generichash_update($h, $serverPublicKey);
1830
-        $sessionKeys = self::crypto_generichash_final($h, self::CRYPTO_KX_SESSIONKEYBYTES * 2);
1824
+        $sk = self::crypto_kx_secretkey( $keypair );
1825
+        $pk = self::crypto_kx_publickey( $keypair );
1826
+        $h = self::crypto_generichash_init( null, self::CRYPTO_KX_SESSIONKEYBYTES * 2 );
1827
+        self::crypto_generichash_update( $h, self::crypto_scalarmult( $sk, $serverPublicKey ) );
1828
+        self::crypto_generichash_update( $h, $pk );
1829
+        self::crypto_generichash_update( $h, $serverPublicKey );
1830
+        $sessionKeys = self::crypto_generichash_final( $h, self::CRYPTO_KX_SESSIONKEYBYTES * 2 );
1831 1831
         return array(
1832 1832
             ParagonIE_Sodium_Core_Util::substr(
1833 1833
                 $sessionKeys,
@@ -1848,28 +1848,28 @@  discard block
 block discarded – undo
1848 1848
      * @return array{0: string, 1: string}
1849 1849
      * @throws SodiumException
1850 1850
      */
1851
-    public static function crypto_kx_server_session_keys($keypair, $clientPublicKey)
1851
+    public static function crypto_kx_server_session_keys( $keypair, $clientPublicKey )
1852 1852
     {
1853
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 1);
1854
-        ParagonIE_Sodium_Core_Util::declareScalarType($clientPublicKey, 'string', 2);
1853
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 1 );
1854
+        ParagonIE_Sodium_Core_Util::declareScalarType( $clientPublicKey, 'string', 2 );
1855 1855
 
1856
-        $keypair = (string) $keypair;
1857
-        $clientPublicKey = (string) $clientPublicKey;
1856
+        $keypair = (string)$keypair;
1857
+        $clientPublicKey = (string)$clientPublicKey;
1858 1858
 
1859
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_KX_KEYPAIRBYTES) {
1860
-            throw new SodiumException('keypair should be SODIUM_CRYPTO_KX_KEYPAIRBYTES bytes');
1859
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_KX_KEYPAIRBYTES ) {
1860
+            throw new SodiumException( 'keypair should be SODIUM_CRYPTO_KX_KEYPAIRBYTES bytes' );
1861 1861
         }
1862
-        if (ParagonIE_Sodium_Core_Util::strlen($clientPublicKey) !== self::CRYPTO_KX_PUBLICKEYBYTES) {
1863
-            throw new SodiumException('public keys must be SODIUM_CRYPTO_KX_PUBLICKEYBYTES bytes');
1862
+        if ( ParagonIE_Sodium_Core_Util::strlen( $clientPublicKey ) !== self::CRYPTO_KX_PUBLICKEYBYTES ) {
1863
+            throw new SodiumException( 'public keys must be SODIUM_CRYPTO_KX_PUBLICKEYBYTES bytes' );
1864 1864
         }
1865 1865
 
1866
-        $sk = self::crypto_kx_secretkey($keypair);
1867
-        $pk = self::crypto_kx_publickey($keypair);
1868
-        $h = self::crypto_generichash_init(null, self::CRYPTO_KX_SESSIONKEYBYTES * 2);
1869
-        self::crypto_generichash_update($h, self::crypto_scalarmult($sk, $clientPublicKey));
1870
-        self::crypto_generichash_update($h, $clientPublicKey);
1871
-        self::crypto_generichash_update($h, $pk);
1872
-        $sessionKeys = self::crypto_generichash_final($h, self::CRYPTO_KX_SESSIONKEYBYTES * 2);
1866
+        $sk = self::crypto_kx_secretkey( $keypair );
1867
+        $pk = self::crypto_kx_publickey( $keypair );
1868
+        $h = self::crypto_generichash_init( null, self::CRYPTO_KX_SESSIONKEYBYTES * 2 );
1869
+        self::crypto_generichash_update( $h, self::crypto_scalarmult( $sk, $clientPublicKey ) );
1870
+        self::crypto_generichash_update( $h, $clientPublicKey );
1871
+        self::crypto_generichash_update( $h, $pk );
1872
+        $sessionKeys = self::crypto_generichash_final( $h, self::CRYPTO_KX_SESSIONKEYBYTES * 2 );
1873 1873
         return array(
1874 1874
             ParagonIE_Sodium_Core_Util::substr(
1875 1875
                 $sessionKeys,
@@ -1889,7 +1889,7 @@  discard block
 block discarded – undo
1889 1889
      * @return string
1890 1890
      * @throws SodiumException
1891 1891
      */
1892
-    public static function crypto_kx_secretkey($kp)
1892
+    public static function crypto_kx_secretkey( $kp )
1893 1893
     {
1894 1894
         return ParagonIE_Sodium_Core_Util::substr(
1895 1895
             $kp,
@@ -1903,7 +1903,7 @@  discard block
 block discarded – undo
1903 1903
      * @return string
1904 1904
      * @throws SodiumException
1905 1905
      */
1906
-    public static function crypto_kx_publickey($kp)
1906
+    public static function crypto_kx_publickey( $kp )
1907 1907
     {
1908 1908
         return ParagonIE_Sodium_Core_Util::substr(
1909 1909
             $kp,
@@ -1924,23 +1924,23 @@  discard block
 block discarded – undo
1924 1924
      * @throws TypeError
1925 1925
      * @psalm-suppress MixedArgument
1926 1926
      */
1927
-    public static function crypto_pwhash($outlen, $passwd, $salt, $opslimit, $memlimit, $alg = null)
1927
+    public static function crypto_pwhash( $outlen, $passwd, $salt, $opslimit, $memlimit, $alg = null )
1928 1928
     {
1929
-        ParagonIE_Sodium_Core_Util::declareScalarType($outlen, 'int', 1);
1930
-        ParagonIE_Sodium_Core_Util::declareScalarType($passwd, 'string', 2);
1931
-        ParagonIE_Sodium_Core_Util::declareScalarType($salt,  'string', 3);
1932
-        ParagonIE_Sodium_Core_Util::declareScalarType($opslimit, 'int', 4);
1933
-        ParagonIE_Sodium_Core_Util::declareScalarType($memlimit, 'int', 5);
1929
+        ParagonIE_Sodium_Core_Util::declareScalarType( $outlen, 'int', 1 );
1930
+        ParagonIE_Sodium_Core_Util::declareScalarType( $passwd, 'string', 2 );
1931
+        ParagonIE_Sodium_Core_Util::declareScalarType( $salt, 'string', 3 );
1932
+        ParagonIE_Sodium_Core_Util::declareScalarType( $opslimit, 'int', 4 );
1933
+        ParagonIE_Sodium_Core_Util::declareScalarType( $memlimit, 'int', 5 );
1934 1934
 
1935
-        if (self::useNewSodiumAPI()) {
1936
-            if (!is_null($alg)) {
1937
-                ParagonIE_Sodium_Core_Util::declareScalarType($alg, 'int', 6);
1938
-                return sodium_crypto_pwhash($outlen, $passwd, $salt, $opslimit, $memlimit, $alg);
1935
+        if ( self::useNewSodiumAPI() ) {
1936
+            if ( ! is_null( $alg ) ) {
1937
+                ParagonIE_Sodium_Core_Util::declareScalarType( $alg, 'int', 6 );
1938
+                return sodium_crypto_pwhash( $outlen, $passwd, $salt, $opslimit, $memlimit, $alg );
1939 1939
             }
1940
-            return sodium_crypto_pwhash($outlen, $passwd, $salt, $opslimit, $memlimit);
1940
+            return sodium_crypto_pwhash( $outlen, $passwd, $salt, $opslimit, $memlimit );
1941 1941
         }
1942
-        if (self::use_fallback('crypto_pwhash')) {
1943
-            return (string) call_user_func('\\Sodium\\crypto_pwhash', $outlen, $passwd, $salt, $opslimit, $memlimit);
1942
+        if ( self::use_fallback( 'crypto_pwhash' ) ) {
1943
+            return (string)call_user_func( '\\Sodium\\crypto_pwhash', $outlen, $passwd, $salt, $opslimit, $memlimit );
1944 1944
         }
1945 1945
         // This is the best we can do.
1946 1946
         throw new SodiumException(
@@ -1958,10 +1958,10 @@  discard block
 block discarded – undo
1958 1958
      */
1959 1959
     public static function crypto_pwhash_is_available()
1960 1960
     {
1961
-        if (self::useNewSodiumAPI()) {
1961
+        if ( self::useNewSodiumAPI() ) {
1962 1962
             return true;
1963 1963
         }
1964
-        if (self::use_fallback('crypto_pwhash')) {
1964
+        if ( self::use_fallback( 'crypto_pwhash' ) ) {
1965 1965
             return true;
1966 1966
         }
1967 1967
         return false;
@@ -1976,17 +1976,17 @@  discard block
 block discarded – undo
1976 1976
      * @throws TypeError
1977 1977
      * @psalm-suppress MixedArgument
1978 1978
      */
1979
-    public static function crypto_pwhash_str($passwd, $opslimit, $memlimit)
1979
+    public static function crypto_pwhash_str( $passwd, $opslimit, $memlimit )
1980 1980
     {
1981
-        ParagonIE_Sodium_Core_Util::declareScalarType($passwd, 'string', 1);
1982
-        ParagonIE_Sodium_Core_Util::declareScalarType($opslimit, 'int', 2);
1983
-        ParagonIE_Sodium_Core_Util::declareScalarType($memlimit, 'int', 3);
1981
+        ParagonIE_Sodium_Core_Util::declareScalarType( $passwd, 'string', 1 );
1982
+        ParagonIE_Sodium_Core_Util::declareScalarType( $opslimit, 'int', 2 );
1983
+        ParagonIE_Sodium_Core_Util::declareScalarType( $memlimit, 'int', 3 );
1984 1984
 
1985
-        if (self::useNewSodiumAPI()) {
1986
-            return sodium_crypto_pwhash_str($passwd, $opslimit, $memlimit);
1985
+        if ( self::useNewSodiumAPI() ) {
1986
+            return sodium_crypto_pwhash_str( $passwd, $opslimit, $memlimit );
1987 1987
         }
1988
-        if (self::use_fallback('crypto_pwhash_str')) {
1989
-            return (string) call_user_func('\\Sodium\\crypto_pwhash_str', $passwd, $opslimit, $memlimit);
1988
+        if ( self::use_fallback( 'crypto_pwhash_str' ) ) {
1989
+            return (string)call_user_func( '\\Sodium\\crypto_pwhash_str', $passwd, $opslimit, $memlimit );
1990 1990
         }
1991 1991
         // This is the best we can do.
1992 1992
         throw new SodiumException(
@@ -2003,25 +2003,25 @@  discard block
 block discarded – undo
2003 2003
      * @return bool
2004 2004
      * @throws SodiumException
2005 2005
      */
2006
-    public static function crypto_pwhash_str_needs_rehash($hash, $opslimit, $memlimit)
2006
+    public static function crypto_pwhash_str_needs_rehash( $hash, $opslimit, $memlimit )
2007 2007
     {
2008
-        ParagonIE_Sodium_Core_Util::declareScalarType($hash, 'string', 1);
2009
-        ParagonIE_Sodium_Core_Util::declareScalarType($opslimit, 'int', 2);
2010
-        ParagonIE_Sodium_Core_Util::declareScalarType($memlimit, 'int', 3);
2008
+        ParagonIE_Sodium_Core_Util::declareScalarType( $hash, 'string', 1 );
2009
+        ParagonIE_Sodium_Core_Util::declareScalarType( $opslimit, 'int', 2 );
2010
+        ParagonIE_Sodium_Core_Util::declareScalarType( $memlimit, 'int', 3 );
2011 2011
 
2012 2012
         // Just grab the first 4 pieces.
2013
-        $pieces = explode('$', (string) $hash);
2014
-        $prefix = implode('$', array_slice($pieces, 0, 4));
2013
+        $pieces = explode( '$', (string)$hash );
2014
+        $prefix = implode( '$', array_slice( $pieces, 0, 4 ) );
2015 2015
 
2016 2016
         // Rebuild the expected header.
2017 2017
         /** @var int $ops */
2018
-        $ops = (int) $opslimit;
2018
+        $ops = (int)$opslimit;
2019 2019
         /** @var int $mem */
2020
-        $mem = (int) $memlimit >> 10;
2020
+        $mem = (int)$memlimit >> 10;
2021 2021
         $encoded = self::CRYPTO_PWHASH_STRPREFIX . 'v=19$m=' . $mem . ',t=' . $ops . ',p=1';
2022 2022
 
2023 2023
         // Do they match? If so, we don't need to rehash, so return false.
2024
-        return !ParagonIE_Sodium_Core_Util::hashEquals($encoded, $prefix);
2024
+        return ! ParagonIE_Sodium_Core_Util::hashEquals( $encoded, $prefix );
2025 2025
     }
2026 2026
 
2027 2027
     /**
@@ -2032,16 +2032,16 @@  discard block
 block discarded – undo
2032 2032
      * @throws TypeError
2033 2033
      * @psalm-suppress MixedArgument
2034 2034
      */
2035
-    public static function crypto_pwhash_str_verify($passwd, $hash)
2035
+    public static function crypto_pwhash_str_verify( $passwd, $hash )
2036 2036
     {
2037
-        ParagonIE_Sodium_Core_Util::declareScalarType($passwd, 'string', 1);
2038
-        ParagonIE_Sodium_Core_Util::declareScalarType($hash, 'string', 2);
2037
+        ParagonIE_Sodium_Core_Util::declareScalarType( $passwd, 'string', 1 );
2038
+        ParagonIE_Sodium_Core_Util::declareScalarType( $hash, 'string', 2 );
2039 2039
 
2040
-        if (self::useNewSodiumAPI()) {
2041
-            return (bool) sodium_crypto_pwhash_str_verify($passwd, $hash);
2040
+        if ( self::useNewSodiumAPI() ) {
2041
+            return (bool)sodium_crypto_pwhash_str_verify( $passwd, $hash );
2042 2042
         }
2043
-        if (self::use_fallback('crypto_pwhash_str_verify')) {
2044
-            return (bool) call_user_func('\\Sodium\\crypto_pwhash_str_verify', $passwd, $hash);
2043
+        if ( self::use_fallback( 'crypto_pwhash_str_verify' ) ) {
2044
+            return (bool)call_user_func( '\\Sodium\\crypto_pwhash_str_verify', $passwd, $hash );
2045 2045
         }
2046 2046
         // This is the best we can do.
2047 2047
         throw new SodiumException(
@@ -2059,31 +2059,31 @@  discard block
 block discarded – undo
2059 2059
      * @throws SodiumException
2060 2060
      * @throws TypeError
2061 2061
      */
2062
-    public static function crypto_pwhash_scryptsalsa208sha256($outlen, $passwd, $salt, $opslimit, $memlimit)
2063
-    {
2064
-        ParagonIE_Sodium_Core_Util::declareScalarType($outlen, 'int', 1);
2065
-        ParagonIE_Sodium_Core_Util::declareScalarType($passwd, 'string', 2);
2066
-        ParagonIE_Sodium_Core_Util::declareScalarType($salt,  'string', 3);
2067
-        ParagonIE_Sodium_Core_Util::declareScalarType($opslimit, 'int', 4);
2068
-        ParagonIE_Sodium_Core_Util::declareScalarType($memlimit, 'int', 5);
2069
-
2070
-        if (self::useNewSodiumAPI()) {
2071
-            return (string) sodium_crypto_pwhash_scryptsalsa208sha256(
2072
-                (int) $outlen,
2073
-                (string) $passwd,
2074
-                (string) $salt,
2075
-                (int) $opslimit,
2076
-                (int) $memlimit
2062
+    public static function crypto_pwhash_scryptsalsa208sha256( $outlen, $passwd, $salt, $opslimit, $memlimit )
2063
+    {
2064
+        ParagonIE_Sodium_Core_Util::declareScalarType( $outlen, 'int', 1 );
2065
+        ParagonIE_Sodium_Core_Util::declareScalarType( $passwd, 'string', 2 );
2066
+        ParagonIE_Sodium_Core_Util::declareScalarType( $salt, 'string', 3 );
2067
+        ParagonIE_Sodium_Core_Util::declareScalarType( $opslimit, 'int', 4 );
2068
+        ParagonIE_Sodium_Core_Util::declareScalarType( $memlimit, 'int', 5 );
2069
+
2070
+        if ( self::useNewSodiumAPI() ) {
2071
+            return (string)sodium_crypto_pwhash_scryptsalsa208sha256(
2072
+                (int)$outlen,
2073
+                (string)$passwd,
2074
+                (string)$salt,
2075
+                (int)$opslimit,
2076
+                (int)$memlimit
2077 2077
             );
2078 2078
         }
2079
-        if (self::use_fallback('crypto_pwhash_scryptsalsa208sha256')) {
2080
-            return (string) call_user_func(
2079
+        if ( self::use_fallback( 'crypto_pwhash_scryptsalsa208sha256' ) ) {
2080
+            return (string)call_user_func(
2081 2081
                 '\\Sodium\\crypto_pwhash_scryptsalsa208sha256',
2082
-                (int) $outlen,
2083
-                (string) $passwd,
2084
-                (string) $salt,
2085
-                (int) $opslimit,
2086
-                (int) $memlimit
2082
+                (int)$outlen,
2083
+                (string)$passwd,
2084
+                (string)$salt,
2085
+                (int)$opslimit,
2086
+                (int)$memlimit
2087 2087
             );
2088 2088
         }
2089 2089
         // This is the best we can do.
@@ -2102,10 +2102,10 @@  discard block
 block discarded – undo
2102 2102
      */
2103 2103
     public static function crypto_pwhash_scryptsalsa208sha256_is_available()
2104 2104
     {
2105
-        if (self::useNewSodiumAPI()) {
2105
+        if ( self::useNewSodiumAPI() ) {
2106 2106
             return true;
2107 2107
         }
2108
-        if (self::use_fallback('crypto_pwhash_scryptsalsa208sha256')) {
2108
+        if ( self::use_fallback( 'crypto_pwhash_scryptsalsa208sha256' ) ) {
2109 2109
             return true;
2110 2110
         }
2111 2111
         return false;
@@ -2119,25 +2119,25 @@  discard block
 block discarded – undo
2119 2119
      * @throws SodiumException
2120 2120
      * @throws TypeError
2121 2121
      */
2122
-    public static function crypto_pwhash_scryptsalsa208sha256_str($passwd, $opslimit, $memlimit)
2122
+    public static function crypto_pwhash_scryptsalsa208sha256_str( $passwd, $opslimit, $memlimit )
2123 2123
     {
2124
-        ParagonIE_Sodium_Core_Util::declareScalarType($passwd, 'string', 1);
2125
-        ParagonIE_Sodium_Core_Util::declareScalarType($opslimit, 'int', 2);
2126
-        ParagonIE_Sodium_Core_Util::declareScalarType($memlimit, 'int', 3);
2124
+        ParagonIE_Sodium_Core_Util::declareScalarType( $passwd, 'string', 1 );
2125
+        ParagonIE_Sodium_Core_Util::declareScalarType( $opslimit, 'int', 2 );
2126
+        ParagonIE_Sodium_Core_Util::declareScalarType( $memlimit, 'int', 3 );
2127 2127
 
2128
-        if (self::useNewSodiumAPI()) {
2129
-            return (string) sodium_crypto_pwhash_scryptsalsa208sha256_str(
2130
-                (string) $passwd,
2131
-                (int) $opslimit,
2132
-                (int) $memlimit
2128
+        if ( self::useNewSodiumAPI() ) {
2129
+            return (string)sodium_crypto_pwhash_scryptsalsa208sha256_str(
2130
+                (string)$passwd,
2131
+                (int)$opslimit,
2132
+                (int)$memlimit
2133 2133
             );
2134 2134
         }
2135
-        if (self::use_fallback('crypto_pwhash_scryptsalsa208sha256_str')) {
2136
-            return (string) call_user_func(
2135
+        if ( self::use_fallback( 'crypto_pwhash_scryptsalsa208sha256_str' ) ) {
2136
+            return (string)call_user_func(
2137 2137
                 '\\Sodium\\crypto_pwhash_scryptsalsa208sha256_str',
2138
-                (string) $passwd,
2139
-                (int) $opslimit,
2140
-                (int) $memlimit
2138
+                (string)$passwd,
2139
+                (int)$opslimit,
2140
+                (int)$memlimit
2141 2141
             );
2142 2142
         }
2143 2143
         // This is the best we can do.
@@ -2153,22 +2153,22 @@  discard block
 block discarded – undo
2153 2153
      * @throws SodiumException
2154 2154
      * @throws TypeError
2155 2155
      */
2156
-    public static function crypto_pwhash_scryptsalsa208sha256_str_verify($passwd, $hash)
2156
+    public static function crypto_pwhash_scryptsalsa208sha256_str_verify( $passwd, $hash )
2157 2157
     {
2158
-        ParagonIE_Sodium_Core_Util::declareScalarType($passwd, 'string', 1);
2159
-        ParagonIE_Sodium_Core_Util::declareScalarType($hash, 'string', 2);
2158
+        ParagonIE_Sodium_Core_Util::declareScalarType( $passwd, 'string', 1 );
2159
+        ParagonIE_Sodium_Core_Util::declareScalarType( $hash, 'string', 2 );
2160 2160
 
2161
-        if (self::useNewSodiumAPI()) {
2162
-            return (bool) sodium_crypto_pwhash_scryptsalsa208sha256_str_verify(
2163
-                (string) $passwd,
2164
-                (string) $hash
2161
+        if ( self::useNewSodiumAPI() ) {
2162
+            return (bool)sodium_crypto_pwhash_scryptsalsa208sha256_str_verify(
2163
+                (string)$passwd,
2164
+                (string)$hash
2165 2165
             );
2166 2166
         }
2167
-        if (self::use_fallback('crypto_pwhash_scryptsalsa208sha256_str_verify')) {
2168
-            return (bool) call_user_func(
2167
+        if ( self::use_fallback( 'crypto_pwhash_scryptsalsa208sha256_str_verify' ) ) {
2168
+            return (bool)call_user_func(
2169 2169
                 '\\Sodium\\crypto_pwhash_scryptsalsa208sha256_str_verify',
2170
-                (string) $passwd,
2171
-                (string) $hash
2170
+                (string)$passwd,
2171
+                (string)$hash
2172 2172
             );
2173 2173
         }
2174 2174
         // This is the best we can do.
@@ -2190,38 +2190,38 @@  discard block
 block discarded – undo
2190 2190
      * @throws TypeError
2191 2191
      * @psalm-suppress MixedArgument
2192 2192
      */
2193
-    public static function crypto_scalarmult($secretKey, $publicKey)
2193
+    public static function crypto_scalarmult( $secretKey, $publicKey )
2194 2194
     {
2195 2195
         /* Type checks: */
2196
-        ParagonIE_Sodium_Core_Util::declareScalarType($secretKey, 'string', 1);
2197
-        ParagonIE_Sodium_Core_Util::declareScalarType($publicKey, 'string', 2);
2196
+        ParagonIE_Sodium_Core_Util::declareScalarType( $secretKey, 'string', 1 );
2197
+        ParagonIE_Sodium_Core_Util::declareScalarType( $publicKey, 'string', 2 );
2198 2198
 
2199 2199
         /* Input validation: */
2200
-        if (ParagonIE_Sodium_Core_Util::strlen($secretKey) !== self::CRYPTO_BOX_SECRETKEYBYTES) {
2201
-            throw new SodiumException('Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.');
2200
+        if ( ParagonIE_Sodium_Core_Util::strlen( $secretKey ) !== self::CRYPTO_BOX_SECRETKEYBYTES ) {
2201
+            throw new SodiumException( 'Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.' );
2202 2202
         }
2203
-        if (ParagonIE_Sodium_Core_Util::strlen($publicKey) !== self::CRYPTO_BOX_PUBLICKEYBYTES) {
2204
-            throw new SodiumException('Argument 2 must be CRYPTO_BOX_PUBLICKEYBYTES long.');
2203
+        if ( ParagonIE_Sodium_Core_Util::strlen( $publicKey ) !== self::CRYPTO_BOX_PUBLICKEYBYTES ) {
2204
+            throw new SodiumException( 'Argument 2 must be CRYPTO_BOX_PUBLICKEYBYTES long.' );
2205 2205
         }
2206 2206
 
2207
-        if (self::useNewSodiumAPI()) {
2208
-            return sodium_crypto_scalarmult($secretKey, $publicKey);
2207
+        if ( self::useNewSodiumAPI() ) {
2208
+            return sodium_crypto_scalarmult( $secretKey, $publicKey );
2209 2209
         }
2210
-        if (self::use_fallback('crypto_scalarmult')) {
2211
-            return (string) call_user_func('\\Sodium\\crypto_scalarmult', $secretKey, $publicKey);
2210
+        if ( self::use_fallback( 'crypto_scalarmult' ) ) {
2211
+            return (string)call_user_func( '\\Sodium\\crypto_scalarmult', $secretKey, $publicKey );
2212 2212
         }
2213 2213
 
2214 2214
         /* Output validation: Forbid all-zero keys */
2215
-        if (ParagonIE_Sodium_Core_Util::hashEquals($secretKey, str_repeat("\0", self::CRYPTO_BOX_SECRETKEYBYTES))) {
2216
-            throw new SodiumException('Zero secret key is not allowed');
2215
+        if ( ParagonIE_Sodium_Core_Util::hashEquals( $secretKey, str_repeat( "\0", self::CRYPTO_BOX_SECRETKEYBYTES ) ) ) {
2216
+            throw new SodiumException( 'Zero secret key is not allowed' );
2217 2217
         }
2218
-        if (ParagonIE_Sodium_Core_Util::hashEquals($publicKey, str_repeat("\0", self::CRYPTO_BOX_PUBLICKEYBYTES))) {
2219
-            throw new SodiumException('Zero public key is not allowed');
2218
+        if ( ParagonIE_Sodium_Core_Util::hashEquals( $publicKey, str_repeat( "\0", self::CRYPTO_BOX_PUBLICKEYBYTES ) ) ) {
2219
+            throw new SodiumException( 'Zero public key is not allowed' );
2220 2220
         }
2221
-        if (PHP_INT_SIZE === 4) {
2222
-            return ParagonIE_Sodium_Crypto32::scalarmult($secretKey, $publicKey);
2221
+        if ( PHP_INT_SIZE === 4 ) {
2222
+            return ParagonIE_Sodium_Crypto32::scalarmult( $secretKey, $publicKey );
2223 2223
         }
2224
-        return ParagonIE_Sodium_Crypto::scalarmult($secretKey, $publicKey);
2224
+        return ParagonIE_Sodium_Crypto::scalarmult( $secretKey, $publicKey );
2225 2225
     }
2226 2226
 
2227 2227
     /**
@@ -2234,29 +2234,29 @@  discard block
 block discarded – undo
2234 2234
      * @psalm-suppress TooFewArguments
2235 2235
      * @psalm-suppress MixedArgument
2236 2236
      */
2237
-    public static function crypto_scalarmult_base($secretKey)
2237
+    public static function crypto_scalarmult_base( $secretKey )
2238 2238
     {
2239 2239
         /* Type checks: */
2240
-        ParagonIE_Sodium_Core_Util::declareScalarType($secretKey, 'string', 1);
2240
+        ParagonIE_Sodium_Core_Util::declareScalarType( $secretKey, 'string', 1 );
2241 2241
 
2242 2242
         /* Input validation: */
2243
-        if (ParagonIE_Sodium_Core_Util::strlen($secretKey) !== self::CRYPTO_BOX_SECRETKEYBYTES) {
2244
-            throw new SodiumException('Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.');
2243
+        if ( ParagonIE_Sodium_Core_Util::strlen( $secretKey ) !== self::CRYPTO_BOX_SECRETKEYBYTES ) {
2244
+            throw new SodiumException( 'Argument 1 must be CRYPTO_BOX_SECRETKEYBYTES long.' );
2245 2245
         }
2246 2246
 
2247
-        if (self::useNewSodiumAPI()) {
2248
-            return sodium_crypto_scalarmult_base($secretKey);
2247
+        if ( self::useNewSodiumAPI() ) {
2248
+            return sodium_crypto_scalarmult_base( $secretKey );
2249 2249
         }
2250
-        if (self::use_fallback('crypto_scalarmult_base')) {
2251
-            return (string) call_user_func('\\Sodium\\crypto_scalarmult_base', $secretKey);
2250
+        if ( self::use_fallback( 'crypto_scalarmult_base' ) ) {
2251
+            return (string)call_user_func( '\\Sodium\\crypto_scalarmult_base', $secretKey );
2252 2252
         }
2253
-        if (ParagonIE_Sodium_Core_Util::hashEquals($secretKey, str_repeat("\0", self::CRYPTO_BOX_SECRETKEYBYTES))) {
2254
-            throw new SodiumException('Zero secret key is not allowed');
2253
+        if ( ParagonIE_Sodium_Core_Util::hashEquals( $secretKey, str_repeat( "\0", self::CRYPTO_BOX_SECRETKEYBYTES ) ) ) {
2254
+            throw new SodiumException( 'Zero secret key is not allowed' );
2255 2255
         }
2256
-        if (PHP_INT_SIZE === 4) {
2257
-            return ParagonIE_Sodium_Crypto32::scalarmult_base($secretKey);
2256
+        if ( PHP_INT_SIZE === 4 ) {
2257
+            return ParagonIE_Sodium_Crypto32::scalarmult_base( $secretKey );
2258 2258
         }
2259
-        return ParagonIE_Sodium_Crypto::scalarmult_base($secretKey);
2259
+        return ParagonIE_Sodium_Crypto::scalarmult_base( $secretKey );
2260 2260
     }
2261 2261
 
2262 2262
     /**
@@ -2272,31 +2272,31 @@  discard block
 block discarded – undo
2272 2272
      * @throws TypeError
2273 2273
      * @psalm-suppress MixedArgument
2274 2274
      */
2275
-    public static function crypto_secretbox($plaintext, $nonce, $key)
2275
+    public static function crypto_secretbox( $plaintext, $nonce, $key )
2276 2276
     {
2277 2277
         /* Type checks: */
2278
-        ParagonIE_Sodium_Core_Util::declareScalarType($plaintext, 'string', 1);
2279
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
2280
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
2278
+        ParagonIE_Sodium_Core_Util::declareScalarType( $plaintext, 'string', 1 );
2279
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
2280
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
2281 2281
 
2282 2282
         /* Input validation: */
2283
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_SECRETBOX_NONCEBYTES) {
2284
-            throw new SodiumException('Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.');
2283
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_SECRETBOX_NONCEBYTES ) {
2284
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.' );
2285 2285
         }
2286
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_SECRETBOX_KEYBYTES) {
2287
-            throw new SodiumException('Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.');
2286
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_SECRETBOX_KEYBYTES ) {
2287
+            throw new SodiumException( 'Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.' );
2288 2288
         }
2289 2289
 
2290
-        if (self::useNewSodiumAPI()) {
2291
-            return sodium_crypto_secretbox($plaintext, $nonce, $key);
2290
+        if ( self::useNewSodiumAPI() ) {
2291
+            return sodium_crypto_secretbox( $plaintext, $nonce, $key );
2292 2292
         }
2293
-        if (self::use_fallback('crypto_secretbox')) {
2294
-            return (string) call_user_func('\\Sodium\\crypto_secretbox', $plaintext, $nonce, $key);
2293
+        if ( self::use_fallback( 'crypto_secretbox' ) ) {
2294
+            return (string)call_user_func( '\\Sodium\\crypto_secretbox', $plaintext, $nonce, $key );
2295 2295
         }
2296
-        if (PHP_INT_SIZE === 4) {
2297
-            return ParagonIE_Sodium_Crypto32::secretbox($plaintext, $nonce, $key);
2296
+        if ( PHP_INT_SIZE === 4 ) {
2297
+            return ParagonIE_Sodium_Crypto32::secretbox( $plaintext, $nonce, $key );
2298 2298
         }
2299
-        return ParagonIE_Sodium_Crypto::secretbox($plaintext, $nonce, $key);
2299
+        return ParagonIE_Sodium_Crypto::secretbox( $plaintext, $nonce, $key );
2300 2300
     }
2301 2301
 
2302 2302
     /**
@@ -2312,35 +2312,35 @@  discard block
 block discarded – undo
2312 2312
      * @psalm-suppress MixedInferredReturnType
2313 2313
      * @psalm-suppress MixedReturnStatement
2314 2314
      */
2315
-    public static function crypto_secretbox_open($ciphertext, $nonce, $key)
2315
+    public static function crypto_secretbox_open( $ciphertext, $nonce, $key )
2316 2316
     {
2317 2317
         /* Type checks: */
2318
-        ParagonIE_Sodium_Core_Util::declareScalarType($ciphertext, 'string', 1);
2319
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
2320
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
2318
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ciphertext, 'string', 1 );
2319
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
2320
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
2321 2321
 
2322 2322
         /* Input validation: */
2323
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_SECRETBOX_NONCEBYTES) {
2324
-            throw new SodiumException('Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.');
2323
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_SECRETBOX_NONCEBYTES ) {
2324
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.' );
2325 2325
         }
2326
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_SECRETBOX_KEYBYTES) {
2327
-            throw new SodiumException('Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.');
2326
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_SECRETBOX_KEYBYTES ) {
2327
+            throw new SodiumException( 'Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.' );
2328 2328
         }
2329 2329
 
2330
-        if (self::useNewSodiumAPI()) {
2330
+        if ( self::useNewSodiumAPI() ) {
2331 2331
             /**
2332 2332
              * @psalm-suppress InvalidReturnStatement
2333 2333
              * @psalm-suppress FalsableReturnStatement
2334 2334
              */
2335
-            return sodium_crypto_secretbox_open($ciphertext, $nonce, $key);
2335
+            return sodium_crypto_secretbox_open( $ciphertext, $nonce, $key );
2336 2336
         }
2337
-        if (self::use_fallback('crypto_secretbox_open')) {
2338
-            return call_user_func('\\Sodium\\crypto_secretbox_open', $ciphertext, $nonce, $key);
2337
+        if ( self::use_fallback( 'crypto_secretbox_open' ) ) {
2338
+            return call_user_func( '\\Sodium\\crypto_secretbox_open', $ciphertext, $nonce, $key );
2339 2339
         }
2340
-        if (PHP_INT_SIZE === 4) {
2341
-            return ParagonIE_Sodium_Crypto32::secretbox_open($ciphertext, $nonce, $key);
2340
+        if ( PHP_INT_SIZE === 4 ) {
2341
+            return ParagonIE_Sodium_Crypto32::secretbox_open( $ciphertext, $nonce, $key );
2342 2342
         }
2343
-        return ParagonIE_Sodium_Crypto::secretbox_open($ciphertext, $nonce, $key);
2343
+        return ParagonIE_Sodium_Crypto::secretbox_open( $ciphertext, $nonce, $key );
2344 2344
     }
2345 2345
 
2346 2346
     /**
@@ -2352,7 +2352,7 @@  discard block
 block discarded – undo
2352 2352
      */
2353 2353
     public static function crypto_secretbox_keygen()
2354 2354
     {
2355
-        return random_bytes(self::CRYPTO_SECRETBOX_KEYBYTES);
2355
+        return random_bytes( self::CRYPTO_SECRETBOX_KEYBYTES );
2356 2356
     }
2357 2357
 
2358 2358
     /**
@@ -2368,24 +2368,24 @@  discard block
 block discarded – undo
2368 2368
      * @throws TypeError
2369 2369
      * @psalm-suppress MixedArgument
2370 2370
      */
2371
-    public static function crypto_secretbox_xchacha20poly1305($plaintext, $nonce, $key)
2371
+    public static function crypto_secretbox_xchacha20poly1305( $plaintext, $nonce, $key )
2372 2372
     {
2373 2373
         /* Type checks: */
2374
-        ParagonIE_Sodium_Core_Util::declareScalarType($plaintext, 'string', 1);
2375
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
2376
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
2374
+        ParagonIE_Sodium_Core_Util::declareScalarType( $plaintext, 'string', 1 );
2375
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
2376
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
2377 2377
 
2378 2378
         /* Input validation: */
2379
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_SECRETBOX_NONCEBYTES) {
2380
-            throw new SodiumException('Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.');
2379
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_SECRETBOX_NONCEBYTES ) {
2380
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.' );
2381 2381
         }
2382
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_SECRETBOX_KEYBYTES) {
2383
-            throw new SodiumException('Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.');
2382
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_SECRETBOX_KEYBYTES ) {
2383
+            throw new SodiumException( 'Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.' );
2384 2384
         }
2385
-        if (PHP_INT_SIZE === 4) {
2386
-            return ParagonIE_Sodium_Crypto32::secretbox_xchacha20poly1305($plaintext, $nonce, $key);
2385
+        if ( PHP_INT_SIZE === 4 ) {
2386
+            return ParagonIE_Sodium_Crypto32::secretbox_xchacha20poly1305( $plaintext, $nonce, $key );
2387 2387
         }
2388
-        return ParagonIE_Sodium_Crypto::secretbox_xchacha20poly1305($plaintext, $nonce, $key);
2388
+        return ParagonIE_Sodium_Crypto::secretbox_xchacha20poly1305( $plaintext, $nonce, $key );
2389 2389
     }
2390 2390
     /**
2391 2391
      * Decrypts a message previously encrypted with crypto_secretbox_xchacha20poly1305().
@@ -2398,25 +2398,25 @@  discard block
 block discarded – undo
2398 2398
      * @throws TypeError
2399 2399
      * @psalm-suppress MixedArgument
2400 2400
      */
2401
-    public static function crypto_secretbox_xchacha20poly1305_open($ciphertext, $nonce, $key)
2401
+    public static function crypto_secretbox_xchacha20poly1305_open( $ciphertext, $nonce, $key )
2402 2402
     {
2403 2403
         /* Type checks: */
2404
-        ParagonIE_Sodium_Core_Util::declareScalarType($ciphertext, 'string', 1);
2405
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
2406
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
2404
+        ParagonIE_Sodium_Core_Util::declareScalarType( $ciphertext, 'string', 1 );
2405
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
2406
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
2407 2407
 
2408 2408
         /* Input validation: */
2409
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_SECRETBOX_NONCEBYTES) {
2410
-            throw new SodiumException('Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.');
2409
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_SECRETBOX_NONCEBYTES ) {
2410
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.' );
2411 2411
         }
2412
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_SECRETBOX_KEYBYTES) {
2413
-            throw new SodiumException('Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.');
2412
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_SECRETBOX_KEYBYTES ) {
2413
+            throw new SodiumException( 'Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.' );
2414 2414
         }
2415 2415
 
2416
-        if (PHP_INT_SIZE === 4) {
2417
-            return ParagonIE_Sodium_Crypto32::secretbox_xchacha20poly1305_open($ciphertext, $nonce, $key);
2416
+        if ( PHP_INT_SIZE === 4 ) {
2417
+            return ParagonIE_Sodium_Crypto32::secretbox_xchacha20poly1305_open( $ciphertext, $nonce, $key );
2418 2418
         }
2419
-        return ParagonIE_Sodium_Crypto::secretbox_xchacha20poly1305_open($ciphertext, $nonce, $key);
2419
+        return ParagonIE_Sodium_Crypto::secretbox_xchacha20poly1305_open( $ciphertext, $nonce, $key );
2420 2420
     }
2421 2421
 
2422 2422
     /**
@@ -2425,12 +2425,12 @@  discard block
 block discarded – undo
2425 2425
      * @throws Exception
2426 2426
      * @throws SodiumException
2427 2427
      */
2428
-    public static function crypto_secretstream_xchacha20poly1305_init_push($key)
2428
+    public static function crypto_secretstream_xchacha20poly1305_init_push( $key )
2429 2429
     {
2430
-        if (PHP_INT_SIZE === 4) {
2431
-            return ParagonIE_Sodium_Crypto32::secretstream_xchacha20poly1305_init_push($key);
2430
+        if ( PHP_INT_SIZE === 4 ) {
2431
+            return ParagonIE_Sodium_Crypto32::secretstream_xchacha20poly1305_init_push( $key );
2432 2432
         }
2433
-        return ParagonIE_Sodium_Crypto::secretstream_xchacha20poly1305_init_push($key);
2433
+        return ParagonIE_Sodium_Crypto::secretstream_xchacha20poly1305_init_push( $key );
2434 2434
     }
2435 2435
 
2436 2436
     /**
@@ -2439,17 +2439,17 @@  discard block
 block discarded – undo
2439 2439
      * @return string Returns a state.
2440 2440
      * @throws Exception
2441 2441
      */
2442
-    public static function crypto_secretstream_xchacha20poly1305_init_pull($header, $key)
2442
+    public static function crypto_secretstream_xchacha20poly1305_init_pull( $header, $key )
2443 2443
     {
2444
-        if (ParagonIE_Sodium_Core_Util::strlen($header) < self::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_HEADERBYTES) {
2444
+        if ( ParagonIE_Sodium_Core_Util::strlen( $header ) < self::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_HEADERBYTES ) {
2445 2445
             throw new SodiumException(
2446 2446
                 'header size should be SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_HEADERBYTES bytes'
2447 2447
             );
2448 2448
         }
2449
-        if (PHP_INT_SIZE === 4) {
2450
-            return ParagonIE_Sodium_Crypto32::secretstream_xchacha20poly1305_init_pull($key, $header);
2449
+        if ( PHP_INT_SIZE === 4 ) {
2450
+            return ParagonIE_Sodium_Crypto32::secretstream_xchacha20poly1305_init_pull( $key, $header );
2451 2451
         }
2452
-        return ParagonIE_Sodium_Crypto::secretstream_xchacha20poly1305_init_pull($key, $header);
2452
+        return ParagonIE_Sodium_Crypto::secretstream_xchacha20poly1305_init_pull( $key, $header );
2453 2453
     }
2454 2454
 
2455 2455
     /**
@@ -2460,9 +2460,9 @@  discard block
 block discarded – undo
2460 2460
      * @return string
2461 2461
      * @throws SodiumException
2462 2462
      */
2463
-    public static function crypto_secretstream_xchacha20poly1305_push(&$state, $msg, $aad = '', $tag = 0)
2463
+    public static function crypto_secretstream_xchacha20poly1305_push( &$state, $msg, $aad = '', $tag = 0 )
2464 2464
     {
2465
-        if (PHP_INT_SIZE === 4) {
2465
+        if ( PHP_INT_SIZE === 4 ) {
2466 2466
             return ParagonIE_Sodium_Crypto32::secretstream_xchacha20poly1305_push(
2467 2467
                 $state,
2468 2468
                 $msg,
@@ -2485,9 +2485,9 @@  discard block
 block discarded – undo
2485 2485
      * @return bool|array{0: string, 1: int}
2486 2486
      * @throws SodiumException
2487 2487
      */
2488
-    public static function crypto_secretstream_xchacha20poly1305_pull(&$state, $msg, $aad = '')
2488
+    public static function crypto_secretstream_xchacha20poly1305_pull( &$state, $msg, $aad = '' )
2489 2489
     {
2490
-        if (PHP_INT_SIZE === 4) {
2490
+        if ( PHP_INT_SIZE === 4 ) {
2491 2491
             return ParagonIE_Sodium_Crypto32::secretstream_xchacha20poly1305_pull(
2492 2492
                 $state,
2493 2493
                 $msg,
@@ -2507,7 +2507,7 @@  discard block
 block discarded – undo
2507 2507
      */
2508 2508
     public static function crypto_secretstream_xchacha20poly1305_keygen()
2509 2509
     {
2510
-        return random_bytes(self::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_KEYBYTES);
2510
+        return random_bytes( self::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_KEYBYTES );
2511 2511
     }
2512 2512
 
2513 2513
     /**
@@ -2515,12 +2515,12 @@  discard block
 block discarded – undo
2515 2515
      * @return void
2516 2516
      * @throws SodiumException
2517 2517
      */
2518
-    public static function crypto_secretstream_xchacha20poly1305_rekey(&$state)
2518
+    public static function crypto_secretstream_xchacha20poly1305_rekey( &$state )
2519 2519
     {
2520
-        if (PHP_INT_SIZE === 4) {
2521
-            ParagonIE_Sodium_Crypto32::secretstream_xchacha20poly1305_rekey($state);
2520
+        if ( PHP_INT_SIZE === 4 ) {
2521
+            ParagonIE_Sodium_Crypto32::secretstream_xchacha20poly1305_rekey( $state );
2522 2522
         } else {
2523
-            ParagonIE_Sodium_Crypto::secretstream_xchacha20poly1305_rekey($state);
2523
+            ParagonIE_Sodium_Crypto::secretstream_xchacha20poly1305_rekey( $state );
2524 2524
         }
2525 2525
     }
2526 2526
 
@@ -2536,27 +2536,27 @@  discard block
 block discarded – undo
2536 2536
      * @psalm-suppress MixedInferredReturnType
2537 2537
      * @psalm-suppress MixedReturnStatement
2538 2538
      */
2539
-    public static function crypto_shorthash($message, $key)
2539
+    public static function crypto_shorthash( $message, $key )
2540 2540
     {
2541 2541
         /* Type checks: */
2542
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 1);
2543
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 2);
2542
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 1 );
2543
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 2 );
2544 2544
 
2545 2545
         /* Input validation: */
2546
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_SHORTHASH_KEYBYTES) {
2547
-            throw new SodiumException('Argument 2 must be CRYPTO_SHORTHASH_KEYBYTES long.');
2546
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_SHORTHASH_KEYBYTES ) {
2547
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SHORTHASH_KEYBYTES long.' );
2548 2548
         }
2549 2549
 
2550
-        if (self::useNewSodiumAPI()) {
2551
-            return sodium_crypto_shorthash($message, $key);
2550
+        if ( self::useNewSodiumAPI() ) {
2551
+            return sodium_crypto_shorthash( $message, $key );
2552 2552
         }
2553
-        if (self::use_fallback('crypto_shorthash')) {
2554
-            return (string) call_user_func('\\Sodium\\crypto_shorthash', $message, $key);
2553
+        if ( self::use_fallback( 'crypto_shorthash' ) ) {
2554
+            return (string)call_user_func( '\\Sodium\\crypto_shorthash', $message, $key );
2555 2555
         }
2556
-        if (PHP_INT_SIZE === 4) {
2557
-            return ParagonIE_Sodium_Core32_SipHash::sipHash24($message, $key);
2556
+        if ( PHP_INT_SIZE === 4 ) {
2557
+            return ParagonIE_Sodium_Core32_SipHash::sipHash24( $message, $key );
2558 2558
         }
2559
-        return ParagonIE_Sodium_Core_SipHash::sipHash24($message, $key);
2559
+        return ParagonIE_Sodium_Core_SipHash::sipHash24( $message, $key );
2560 2560
     }
2561 2561
 
2562 2562
     /**
@@ -2568,7 +2568,7 @@  discard block
 block discarded – undo
2568 2568
      */
2569 2569
     public static function crypto_shorthash_keygen()
2570 2570
     {
2571
-        return random_bytes(self::CRYPTO_SHORTHASH_KEYBYTES);
2571
+        return random_bytes( self::CRYPTO_SHORTHASH_KEYBYTES );
2572 2572
     }
2573 2573
 
2574 2574
     /**
@@ -2586,27 +2586,27 @@  discard block
 block discarded – undo
2586 2586
      * @psalm-suppress MixedInferredReturnType
2587 2587
      * @psalm-suppress MixedReturnStatement
2588 2588
      */
2589
-    public static function crypto_sign($message, $secretKey)
2589
+    public static function crypto_sign( $message, $secretKey )
2590 2590
     {
2591 2591
         /* Type checks: */
2592
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 1);
2593
-        ParagonIE_Sodium_Core_Util::declareScalarType($secretKey, 'string', 2);
2592
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 1 );
2593
+        ParagonIE_Sodium_Core_Util::declareScalarType( $secretKey, 'string', 2 );
2594 2594
 
2595 2595
         /* Input validation: */
2596
-        if (ParagonIE_Sodium_Core_Util::strlen($secretKey) !== self::CRYPTO_SIGN_SECRETKEYBYTES) {
2597
-            throw new SodiumException('Argument 2 must be CRYPTO_SIGN_SECRETKEYBYTES long.');
2596
+        if ( ParagonIE_Sodium_Core_Util::strlen( $secretKey ) !== self::CRYPTO_SIGN_SECRETKEYBYTES ) {
2597
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SIGN_SECRETKEYBYTES long.' );
2598 2598
         }
2599 2599
 
2600
-        if (self::useNewSodiumAPI()) {
2601
-            return sodium_crypto_sign($message, $secretKey);
2600
+        if ( self::useNewSodiumAPI() ) {
2601
+            return sodium_crypto_sign( $message, $secretKey );
2602 2602
         }
2603
-        if (self::use_fallback('crypto_sign')) {
2604
-            return (string) call_user_func('\\Sodium\\crypto_sign', $message, $secretKey);
2603
+        if ( self::use_fallback( 'crypto_sign' ) ) {
2604
+            return (string)call_user_func( '\\Sodium\\crypto_sign', $message, $secretKey );
2605 2605
         }
2606
-        if (PHP_INT_SIZE === 4) {
2607
-            return ParagonIE_Sodium_Crypto32::sign($message, $secretKey);
2606
+        if ( PHP_INT_SIZE === 4 ) {
2607
+            return ParagonIE_Sodium_Crypto32::sign( $message, $secretKey );
2608 2608
         }
2609
-        return ParagonIE_Sodium_Crypto::sign($message, $secretKey);
2609
+        return ParagonIE_Sodium_Crypto::sign( $message, $secretKey );
2610 2610
     }
2611 2611
 
2612 2612
     /**
@@ -2622,34 +2622,34 @@  discard block
 block discarded – undo
2622 2622
      * @psalm-suppress MixedInferredReturnType
2623 2623
      * @psalm-suppress MixedReturnStatement
2624 2624
      */
2625
-    public static function crypto_sign_open($signedMessage, $publicKey)
2625
+    public static function crypto_sign_open( $signedMessage, $publicKey )
2626 2626
     {
2627 2627
         /* Type checks: */
2628
-        ParagonIE_Sodium_Core_Util::declareScalarType($signedMessage, 'string', 1);
2629
-        ParagonIE_Sodium_Core_Util::declareScalarType($publicKey, 'string', 2);
2628
+        ParagonIE_Sodium_Core_Util::declareScalarType( $signedMessage, 'string', 1 );
2629
+        ParagonIE_Sodium_Core_Util::declareScalarType( $publicKey, 'string', 2 );
2630 2630
 
2631 2631
         /* Input validation: */
2632
-        if (ParagonIE_Sodium_Core_Util::strlen($signedMessage) < self::CRYPTO_SIGN_BYTES) {
2633
-            throw new SodiumException('Argument 1 must be at least CRYPTO_SIGN_BYTES long.');
2632
+        if ( ParagonIE_Sodium_Core_Util::strlen( $signedMessage ) < self::CRYPTO_SIGN_BYTES ) {
2633
+            throw new SodiumException( 'Argument 1 must be at least CRYPTO_SIGN_BYTES long.' );
2634 2634
         }
2635
-        if (ParagonIE_Sodium_Core_Util::strlen($publicKey) !== self::CRYPTO_SIGN_PUBLICKEYBYTES) {
2636
-            throw new SodiumException('Argument 2 must be CRYPTO_SIGN_PUBLICKEYBYTES long.');
2635
+        if ( ParagonIE_Sodium_Core_Util::strlen( $publicKey ) !== self::CRYPTO_SIGN_PUBLICKEYBYTES ) {
2636
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SIGN_PUBLICKEYBYTES long.' );
2637 2637
         }
2638 2638
 
2639
-        if (self::useNewSodiumAPI()) {
2639
+        if ( self::useNewSodiumAPI() ) {
2640 2640
             /**
2641 2641
              * @psalm-suppress InvalidReturnStatement
2642 2642
              * @psalm-suppress FalsableReturnStatement
2643 2643
              */
2644
-            return sodium_crypto_sign_open($signedMessage, $publicKey);
2644
+            return sodium_crypto_sign_open( $signedMessage, $publicKey );
2645 2645
         }
2646
-        if (self::use_fallback('crypto_sign_open')) {
2647
-            return call_user_func('\\Sodium\\crypto_sign_open', $signedMessage, $publicKey);
2646
+        if ( self::use_fallback( 'crypto_sign_open' ) ) {
2647
+            return call_user_func( '\\Sodium\\crypto_sign_open', $signedMessage, $publicKey );
2648 2648
         }
2649
-        if (PHP_INT_SIZE === 4) {
2650
-            return ParagonIE_Sodium_Crypto32::sign_open($signedMessage, $publicKey);
2649
+        if ( PHP_INT_SIZE === 4 ) {
2650
+            return ParagonIE_Sodium_Crypto32::sign_open( $signedMessage, $publicKey );
2651 2651
         }
2652
-        return ParagonIE_Sodium_Crypto::sign_open($signedMessage, $publicKey);
2652
+        return ParagonIE_Sodium_Crypto::sign_open( $signedMessage, $publicKey );
2653 2653
     }
2654 2654
 
2655 2655
     /**
@@ -2661,13 +2661,13 @@  discard block
 block discarded – undo
2661 2661
      */
2662 2662
     public static function crypto_sign_keypair()
2663 2663
     {
2664
-        if (self::useNewSodiumAPI()) {
2664
+        if ( self::useNewSodiumAPI() ) {
2665 2665
             return sodium_crypto_sign_keypair();
2666 2666
         }
2667
-        if (self::use_fallback('crypto_sign_keypair')) {
2668
-            return (string) call_user_func('\\Sodium\\crypto_sign_keypair');
2667
+        if ( self::use_fallback( 'crypto_sign_keypair' ) ) {
2668
+            return (string)call_user_func( '\\Sodium\\crypto_sign_keypair' );
2669 2669
         }
2670
-        if (PHP_INT_SIZE === 4) {
2670
+        if ( PHP_INT_SIZE === 4 ) {
2671 2671
             return ParagonIE_Sodium_Core32_Ed25519::keypair();
2672 2672
         }
2673 2673
         return ParagonIE_Sodium_Core_Ed25519::keypair();
@@ -2679,22 +2679,22 @@  discard block
 block discarded – undo
2679 2679
      * @return string
2680 2680
      * @throws SodiumException
2681 2681
      */
2682
-    public static function crypto_sign_keypair_from_secretkey_and_publickey($sk, $pk)
2682
+    public static function crypto_sign_keypair_from_secretkey_and_publickey( $sk, $pk )
2683 2683
     {
2684
-        ParagonIE_Sodium_Core_Util::declareScalarType($sk, 'string', 1);
2685
-        ParagonIE_Sodium_Core_Util::declareScalarType($pk, 'string', 1);
2686
-        $sk = (string) $sk;
2687
-        $pk = (string) $pk;
2684
+        ParagonIE_Sodium_Core_Util::declareScalarType( $sk, 'string', 1 );
2685
+        ParagonIE_Sodium_Core_Util::declareScalarType( $pk, 'string', 1 );
2686
+        $sk = (string)$sk;
2687
+        $pk = (string)$pk;
2688 2688
 
2689
-        if (ParagonIE_Sodium_Core_Util::strlen($sk) !== self::CRYPTO_SIGN_SECRETKEYBYTES) {
2690
-            throw new SodiumException('secretkey should be SODIUM_CRYPTO_SIGN_SECRETKEYBYTES bytes');
2689
+        if ( ParagonIE_Sodium_Core_Util::strlen( $sk ) !== self::CRYPTO_SIGN_SECRETKEYBYTES ) {
2690
+            throw new SodiumException( 'secretkey should be SODIUM_CRYPTO_SIGN_SECRETKEYBYTES bytes' );
2691 2691
         }
2692
-        if (ParagonIE_Sodium_Core_Util::strlen($pk) !== self::CRYPTO_SIGN_PUBLICKEYBYTES) {
2693
-            throw new SodiumException('publickey should be SODIUM_CRYPTO_SIGN_PUBLICKEYBYTES bytes');
2692
+        if ( ParagonIE_Sodium_Core_Util::strlen( $pk ) !== self::CRYPTO_SIGN_PUBLICKEYBYTES ) {
2693
+            throw new SodiumException( 'publickey should be SODIUM_CRYPTO_SIGN_PUBLICKEYBYTES bytes' );
2694 2694
         }
2695 2695
 
2696
-        if (self::useNewSodiumAPI()) {
2697
-            return sodium_crypto_sign_keypair_from_secretkey_and_publickey($sk, $pk);
2696
+        if ( self::useNewSodiumAPI() ) {
2697
+            return sodium_crypto_sign_keypair_from_secretkey_and_publickey( $sk, $pk );
2698 2698
         }
2699 2699
         return $sk . $pk;
2700 2700
     }
@@ -2708,22 +2708,22 @@  discard block
 block discarded – undo
2708 2708
      * @throws TypeError
2709 2709
      * @psalm-suppress MixedArgument
2710 2710
      */
2711
-    public static function crypto_sign_seed_keypair($seed)
2711
+    public static function crypto_sign_seed_keypair( $seed )
2712 2712
     {
2713
-        ParagonIE_Sodium_Core_Util::declareScalarType($seed, 'string', 1);
2713
+        ParagonIE_Sodium_Core_Util::declareScalarType( $seed, 'string', 1 );
2714 2714
 
2715
-        if (self::useNewSodiumAPI()) {
2716
-            return sodium_crypto_sign_seed_keypair($seed);
2715
+        if ( self::useNewSodiumAPI() ) {
2716
+            return sodium_crypto_sign_seed_keypair( $seed );
2717 2717
         }
2718
-        if (self::use_fallback('crypto_sign_keypair')) {
2719
-            return (string) call_user_func('\\Sodium\\crypto_sign_seed_keypair', $seed);
2718
+        if ( self::use_fallback( 'crypto_sign_keypair' ) ) {
2719
+            return (string)call_user_func( '\\Sodium\\crypto_sign_seed_keypair', $seed );
2720 2720
         }
2721 2721
         $publicKey = '';
2722 2722
         $secretKey = '';
2723
-        if (PHP_INT_SIZE === 4) {
2724
-            ParagonIE_Sodium_Core32_Ed25519::seed_keypair($publicKey, $secretKey, $seed);
2723
+        if ( PHP_INT_SIZE === 4 ) {
2724
+            ParagonIE_Sodium_Core32_Ed25519::seed_keypair( $publicKey, $secretKey, $seed );
2725 2725
         } else {
2726
-            ParagonIE_Sodium_Core_Ed25519::seed_keypair($publicKey, $secretKey, $seed);
2726
+            ParagonIE_Sodium_Core_Ed25519::seed_keypair( $publicKey, $secretKey, $seed );
2727 2727
         }
2728 2728
         return $secretKey . $publicKey;
2729 2729
     }
@@ -2737,26 +2737,26 @@  discard block
 block discarded – undo
2737 2737
      * @throws TypeError
2738 2738
      * @psalm-suppress MixedArgument
2739 2739
      */
2740
-    public static function crypto_sign_publickey($keypair)
2740
+    public static function crypto_sign_publickey( $keypair )
2741 2741
     {
2742 2742
         /* Type checks: */
2743
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 1);
2743
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 1 );
2744 2744
 
2745 2745
         /* Input validation: */
2746
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_SIGN_KEYPAIRBYTES) {
2747
-            throw new SodiumException('Argument 1 must be CRYPTO_SIGN_KEYPAIRBYTES long.');
2746
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_SIGN_KEYPAIRBYTES ) {
2747
+            throw new SodiumException( 'Argument 1 must be CRYPTO_SIGN_KEYPAIRBYTES long.' );
2748 2748
         }
2749 2749
 
2750
-        if (self::useNewSodiumAPI()) {
2751
-            return sodium_crypto_sign_publickey($keypair);
2750
+        if ( self::useNewSodiumAPI() ) {
2751
+            return sodium_crypto_sign_publickey( $keypair );
2752 2752
         }
2753
-        if (self::use_fallback('crypto_sign_publickey')) {
2754
-            return (string) call_user_func('\\Sodium\\crypto_sign_publickey', $keypair);
2753
+        if ( self::use_fallback( 'crypto_sign_publickey' ) ) {
2754
+            return (string)call_user_func( '\\Sodium\\crypto_sign_publickey', $keypair );
2755 2755
         }
2756
-        if (PHP_INT_SIZE === 4) {
2757
-            return ParagonIE_Sodium_Core32_Ed25519::publickey($keypair);
2756
+        if ( PHP_INT_SIZE === 4 ) {
2757
+            return ParagonIE_Sodium_Core32_Ed25519::publickey( $keypair );
2758 2758
         }
2759
-        return ParagonIE_Sodium_Core_Ed25519::publickey($keypair);
2759
+        return ParagonIE_Sodium_Core_Ed25519::publickey( $keypair );
2760 2760
     }
2761 2761
 
2762 2762
     /**
@@ -2768,26 +2768,26 @@  discard block
 block discarded – undo
2768 2768
      * @throws TypeError
2769 2769
      * @psalm-suppress MixedArgument
2770 2770
      */
2771
-    public static function crypto_sign_publickey_from_secretkey($secretKey)
2771
+    public static function crypto_sign_publickey_from_secretkey( $secretKey )
2772 2772
     {
2773 2773
         /* Type checks: */
2774
-        ParagonIE_Sodium_Core_Util::declareScalarType($secretKey, 'string', 1);
2774
+        ParagonIE_Sodium_Core_Util::declareScalarType( $secretKey, 'string', 1 );
2775 2775
 
2776 2776
         /* Input validation: */
2777
-        if (ParagonIE_Sodium_Core_Util::strlen($secretKey) !== self::CRYPTO_SIGN_SECRETKEYBYTES) {
2778
-            throw new SodiumException('Argument 1 must be CRYPTO_SIGN_SECRETKEYBYTES long.');
2777
+        if ( ParagonIE_Sodium_Core_Util::strlen( $secretKey ) !== self::CRYPTO_SIGN_SECRETKEYBYTES ) {
2778
+            throw new SodiumException( 'Argument 1 must be CRYPTO_SIGN_SECRETKEYBYTES long.' );
2779 2779
         }
2780 2780
 
2781
-        if (self::useNewSodiumAPI()) {
2782
-            return sodium_crypto_sign_publickey_from_secretkey($secretKey);
2781
+        if ( self::useNewSodiumAPI() ) {
2782
+            return sodium_crypto_sign_publickey_from_secretkey( $secretKey );
2783 2783
         }
2784
-        if (self::use_fallback('crypto_sign_publickey_from_secretkey')) {
2785
-            return (string) call_user_func('\\Sodium\\crypto_sign_publickey_from_secretkey', $secretKey);
2784
+        if ( self::use_fallback( 'crypto_sign_publickey_from_secretkey' ) ) {
2785
+            return (string)call_user_func( '\\Sodium\\crypto_sign_publickey_from_secretkey', $secretKey );
2786 2786
         }
2787
-        if (PHP_INT_SIZE === 4) {
2788
-            return ParagonIE_Sodium_Core32_Ed25519::publickey_from_secretkey($secretKey);
2787
+        if ( PHP_INT_SIZE === 4 ) {
2788
+            return ParagonIE_Sodium_Core32_Ed25519::publickey_from_secretkey( $secretKey );
2789 2789
         }
2790
-        return ParagonIE_Sodium_Core_Ed25519::publickey_from_secretkey($secretKey);
2790
+        return ParagonIE_Sodium_Core_Ed25519::publickey_from_secretkey( $secretKey );
2791 2791
     }
2792 2792
 
2793 2793
     /**
@@ -2799,26 +2799,26 @@  discard block
 block discarded – undo
2799 2799
      * @throws TypeError
2800 2800
      * @psalm-suppress MixedArgument
2801 2801
      */
2802
-    public static function crypto_sign_secretkey($keypair)
2802
+    public static function crypto_sign_secretkey( $keypair )
2803 2803
     {
2804 2804
         /* Type checks: */
2805
-        ParagonIE_Sodium_Core_Util::declareScalarType($keypair, 'string', 1);
2805
+        ParagonIE_Sodium_Core_Util::declareScalarType( $keypair, 'string', 1 );
2806 2806
 
2807 2807
         /* Input validation: */
2808
-        if (ParagonIE_Sodium_Core_Util::strlen($keypair) !== self::CRYPTO_SIGN_KEYPAIRBYTES) {
2809
-            throw new SodiumException('Argument 1 must be CRYPTO_SIGN_KEYPAIRBYTES long.');
2808
+        if ( ParagonIE_Sodium_Core_Util::strlen( $keypair ) !== self::CRYPTO_SIGN_KEYPAIRBYTES ) {
2809
+            throw new SodiumException( 'Argument 1 must be CRYPTO_SIGN_KEYPAIRBYTES long.' );
2810 2810
         }
2811 2811
 
2812
-        if (self::useNewSodiumAPI()) {
2813
-            return sodium_crypto_sign_secretkey($keypair);
2812
+        if ( self::useNewSodiumAPI() ) {
2813
+            return sodium_crypto_sign_secretkey( $keypair );
2814 2814
         }
2815
-        if (self::use_fallback('crypto_sign_secretkey')) {
2816
-            return (string) call_user_func('\\Sodium\\crypto_sign_secretkey', $keypair);
2815
+        if ( self::use_fallback( 'crypto_sign_secretkey' ) ) {
2816
+            return (string)call_user_func( '\\Sodium\\crypto_sign_secretkey', $keypair );
2817 2817
         }
2818
-        if (PHP_INT_SIZE === 4) {
2819
-            return ParagonIE_Sodium_Core32_Ed25519::secretkey($keypair);
2818
+        if ( PHP_INT_SIZE === 4 ) {
2819
+            return ParagonIE_Sodium_Core32_Ed25519::secretkey( $keypair );
2820 2820
         }
2821
-        return ParagonIE_Sodium_Core_Ed25519::secretkey($keypair);
2821
+        return ParagonIE_Sodium_Core_Ed25519::secretkey( $keypair );
2822 2822
     }
2823 2823
 
2824 2824
     /**
@@ -2833,27 +2833,27 @@  discard block
 block discarded – undo
2833 2833
      * @throws TypeError
2834 2834
      * @psalm-suppress MixedArgument
2835 2835
      */
2836
-    public static function crypto_sign_detached($message, $secretKey)
2836
+    public static function crypto_sign_detached( $message, $secretKey )
2837 2837
     {
2838 2838
         /* Type checks: */
2839
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 1);
2840
-        ParagonIE_Sodium_Core_Util::declareScalarType($secretKey, 'string', 2);
2839
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 1 );
2840
+        ParagonIE_Sodium_Core_Util::declareScalarType( $secretKey, 'string', 2 );
2841 2841
 
2842 2842
         /* Input validation: */
2843
-        if (ParagonIE_Sodium_Core_Util::strlen($secretKey) !== self::CRYPTO_SIGN_SECRETKEYBYTES) {
2844
-            throw new SodiumException('Argument 2 must be CRYPTO_SIGN_SECRETKEYBYTES long.');
2843
+        if ( ParagonIE_Sodium_Core_Util::strlen( $secretKey ) !== self::CRYPTO_SIGN_SECRETKEYBYTES ) {
2844
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SIGN_SECRETKEYBYTES long.' );
2845 2845
         }
2846 2846
 
2847
-        if (self::useNewSodiumAPI()) {
2848
-            return sodium_crypto_sign_detached($message, $secretKey);
2847
+        if ( self::useNewSodiumAPI() ) {
2848
+            return sodium_crypto_sign_detached( $message, $secretKey );
2849 2849
         }
2850
-        if (self::use_fallback('crypto_sign_detached')) {
2851
-            return (string) call_user_func('\\Sodium\\crypto_sign_detached', $message, $secretKey);
2850
+        if ( self::use_fallback( 'crypto_sign_detached' ) ) {
2851
+            return (string)call_user_func( '\\Sodium\\crypto_sign_detached', $message, $secretKey );
2852 2852
         }
2853
-        if (PHP_INT_SIZE === 4) {
2854
-            return ParagonIE_Sodium_Crypto32::sign_detached($message, $secretKey);
2853
+        if ( PHP_INT_SIZE === 4 ) {
2854
+            return ParagonIE_Sodium_Crypto32::sign_detached( $message, $secretKey );
2855 2855
         }
2856
-        return ParagonIE_Sodium_Crypto::sign_detached($message, $secretKey);
2856
+        return ParagonIE_Sodium_Crypto::sign_detached( $message, $secretKey );
2857 2857
     }
2858 2858
 
2859 2859
     /**
@@ -2868,36 +2868,36 @@  discard block
 block discarded – undo
2868 2868
      * @throws TypeError
2869 2869
      * @psalm-suppress MixedArgument
2870 2870
      */
2871
-    public static function crypto_sign_verify_detached($signature, $message, $publicKey)
2871
+    public static function crypto_sign_verify_detached( $signature, $message, $publicKey )
2872 2872
     {
2873 2873
         /* Type checks: */
2874
-        ParagonIE_Sodium_Core_Util::declareScalarType($signature, 'string', 1);
2875
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 2);
2876
-        ParagonIE_Sodium_Core_Util::declareScalarType($publicKey, 'string', 3);
2874
+        ParagonIE_Sodium_Core_Util::declareScalarType( $signature, 'string', 1 );
2875
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 2 );
2876
+        ParagonIE_Sodium_Core_Util::declareScalarType( $publicKey, 'string', 3 );
2877 2877
 
2878 2878
         /* Input validation: */
2879
-        if (ParagonIE_Sodium_Core_Util::strlen($signature) !== self::CRYPTO_SIGN_BYTES) {
2880
-            throw new SodiumException('Argument 1 must be CRYPTO_SIGN_BYTES long.');
2879
+        if ( ParagonIE_Sodium_Core_Util::strlen( $signature ) !== self::CRYPTO_SIGN_BYTES ) {
2880
+            throw new SodiumException( 'Argument 1 must be CRYPTO_SIGN_BYTES long.' );
2881 2881
         }
2882
-        if (ParagonIE_Sodium_Core_Util::strlen($publicKey) !== self::CRYPTO_SIGN_PUBLICKEYBYTES) {
2883
-            throw new SodiumException('Argument 3 must be CRYPTO_SIGN_PUBLICKEYBYTES long.');
2882
+        if ( ParagonIE_Sodium_Core_Util::strlen( $publicKey ) !== self::CRYPTO_SIGN_PUBLICKEYBYTES ) {
2883
+            throw new SodiumException( 'Argument 3 must be CRYPTO_SIGN_PUBLICKEYBYTES long.' );
2884 2884
         }
2885 2885
 
2886
-        if (self::useNewSodiumAPI()) {
2887
-            return sodium_crypto_sign_verify_detached($signature, $message, $publicKey);
2886
+        if ( self::useNewSodiumAPI() ) {
2887
+            return sodium_crypto_sign_verify_detached( $signature, $message, $publicKey );
2888 2888
         }
2889
-        if (self::use_fallback('crypto_sign_verify_detached')) {
2890
-            return (bool) call_user_func(
2889
+        if ( self::use_fallback( 'crypto_sign_verify_detached' ) ) {
2890
+            return (bool)call_user_func(
2891 2891
                 '\\Sodium\\crypto_sign_verify_detached',
2892 2892
                 $signature,
2893 2893
                 $message,
2894 2894
                 $publicKey
2895 2895
             );
2896 2896
         }
2897
-        if (PHP_INT_SIZE === 4) {
2898
-            return ParagonIE_Sodium_Crypto32::sign_verify_detached($signature, $message, $publicKey);
2897
+        if ( PHP_INT_SIZE === 4 ) {
2898
+            return ParagonIE_Sodium_Crypto32::sign_verify_detached( $signature, $message, $publicKey );
2899 2899
         }
2900
-        return ParagonIE_Sodium_Crypto::sign_verify_detached($signature, $message, $publicKey);
2900
+        return ParagonIE_Sodium_Crypto::sign_verify_detached( $signature, $message, $publicKey );
2901 2901
     }
2902 2902
 
2903 2903
     /**
@@ -2909,27 +2909,27 @@  discard block
 block discarded – undo
2909 2909
      * @throws TypeError
2910 2910
      * @psalm-suppress MixedArgument
2911 2911
      */
2912
-    public static function crypto_sign_ed25519_pk_to_curve25519($pk)
2912
+    public static function crypto_sign_ed25519_pk_to_curve25519( $pk )
2913 2913
     {
2914 2914
         /* Type checks: */
2915
-        ParagonIE_Sodium_Core_Util::declareScalarType($pk, 'string', 1);
2915
+        ParagonIE_Sodium_Core_Util::declareScalarType( $pk, 'string', 1 );
2916 2916
 
2917 2917
         /* Input validation: */
2918
-        if (ParagonIE_Sodium_Core_Util::strlen($pk) < self::CRYPTO_SIGN_PUBLICKEYBYTES) {
2919
-            throw new SodiumException('Argument 1 must be at least CRYPTO_SIGN_PUBLICKEYBYTES long.');
2918
+        if ( ParagonIE_Sodium_Core_Util::strlen( $pk ) < self::CRYPTO_SIGN_PUBLICKEYBYTES ) {
2919
+            throw new SodiumException( 'Argument 1 must be at least CRYPTO_SIGN_PUBLICKEYBYTES long.' );
2920 2920
         }
2921
-        if (self::useNewSodiumAPI()) {
2922
-            if (is_callable('crypto_sign_ed25519_pk_to_curve25519')) {
2923
-                return (string) sodium_crypto_sign_ed25519_pk_to_curve25519($pk);
2921
+        if ( self::useNewSodiumAPI() ) {
2922
+            if ( is_callable( 'crypto_sign_ed25519_pk_to_curve25519' ) ) {
2923
+                return (string)sodium_crypto_sign_ed25519_pk_to_curve25519( $pk );
2924 2924
             }
2925 2925
         }
2926
-        if (self::use_fallback('crypto_sign_ed25519_pk_to_curve25519')) {
2927
-            return (string) call_user_func('\\Sodium\\crypto_sign_ed25519_pk_to_curve25519', $pk);
2926
+        if ( self::use_fallback( 'crypto_sign_ed25519_pk_to_curve25519' ) ) {
2927
+            return (string)call_user_func( '\\Sodium\\crypto_sign_ed25519_pk_to_curve25519', $pk );
2928 2928
         }
2929
-        if (PHP_INT_SIZE === 4) {
2930
-            return ParagonIE_Sodium_Core32_Ed25519::pk_to_curve25519($pk);
2929
+        if ( PHP_INT_SIZE === 4 ) {
2930
+            return ParagonIE_Sodium_Core32_Ed25519::pk_to_curve25519( $pk );
2931 2931
         }
2932
-        return ParagonIE_Sodium_Core_Ed25519::pk_to_curve25519($pk);
2932
+        return ParagonIE_Sodium_Core_Ed25519::pk_to_curve25519( $pk );
2933 2933
     }
2934 2934
 
2935 2935
     /**
@@ -2941,32 +2941,32 @@  discard block
 block discarded – undo
2941 2941
      * @throws TypeError
2942 2942
      * @psalm-suppress MixedArgument
2943 2943
      */
2944
-    public static function crypto_sign_ed25519_sk_to_curve25519($sk)
2944
+    public static function crypto_sign_ed25519_sk_to_curve25519( $sk )
2945 2945
     {
2946 2946
         /* Type checks: */
2947
-        ParagonIE_Sodium_Core_Util::declareScalarType($sk, 'string', 1);
2947
+        ParagonIE_Sodium_Core_Util::declareScalarType( $sk, 'string', 1 );
2948 2948
 
2949 2949
         /* Input validation: */
2950
-        if (ParagonIE_Sodium_Core_Util::strlen($sk) < self::CRYPTO_SIGN_SEEDBYTES) {
2951
-            throw new SodiumException('Argument 1 must be at least CRYPTO_SIGN_SEEDBYTES long.');
2950
+        if ( ParagonIE_Sodium_Core_Util::strlen( $sk ) < self::CRYPTO_SIGN_SEEDBYTES ) {
2951
+            throw new SodiumException( 'Argument 1 must be at least CRYPTO_SIGN_SEEDBYTES long.' );
2952 2952
         }
2953
-        if (self::useNewSodiumAPI()) {
2954
-            if (is_callable('crypto_sign_ed25519_sk_to_curve25519')) {
2955
-                return sodium_crypto_sign_ed25519_sk_to_curve25519($sk);
2953
+        if ( self::useNewSodiumAPI() ) {
2954
+            if ( is_callable( 'crypto_sign_ed25519_sk_to_curve25519' ) ) {
2955
+                return sodium_crypto_sign_ed25519_sk_to_curve25519( $sk );
2956 2956
             }
2957 2957
         }
2958
-        if (self::use_fallback('crypto_sign_ed25519_sk_to_curve25519')) {
2959
-            return (string) call_user_func('\\Sodium\\crypto_sign_ed25519_sk_to_curve25519', $sk);
2958
+        if ( self::use_fallback( 'crypto_sign_ed25519_sk_to_curve25519' ) ) {
2959
+            return (string)call_user_func( '\\Sodium\\crypto_sign_ed25519_sk_to_curve25519', $sk );
2960 2960
         }
2961 2961
 
2962
-        $h = hash('sha512', ParagonIE_Sodium_Core_Util::substr($sk, 0, 32), true);
2963
-        $h[0] = ParagonIE_Sodium_Core_Util::intToChr(
2964
-            ParagonIE_Sodium_Core_Util::chrToInt($h[0]) & 248
2962
+        $h = hash( 'sha512', ParagonIE_Sodium_Core_Util::substr( $sk, 0, 32 ), true );
2963
+        $h[ 0 ] = ParagonIE_Sodium_Core_Util::intToChr(
2964
+            ParagonIE_Sodium_Core_Util::chrToInt( $h[ 0 ] ) & 248
2965 2965
         );
2966
-        $h[31] = ParagonIE_Sodium_Core_Util::intToChr(
2967
-            (ParagonIE_Sodium_Core_Util::chrToInt($h[31]) & 127) | 64
2966
+        $h[ 31 ] = ParagonIE_Sodium_Core_Util::intToChr(
2967
+            ( ParagonIE_Sodium_Core_Util::chrToInt( $h[ 31 ] ) & 127 ) | 64
2968 2968
         );
2969
-        return ParagonIE_Sodium_Core_Util::substr($h, 0, 32);
2969
+        return ParagonIE_Sodium_Core_Util::substr( $h, 0, 32 );
2970 2970
     }
2971 2971
 
2972 2972
     /**
@@ -2983,31 +2983,31 @@  discard block
 block discarded – undo
2983 2983
      * @throws TypeError
2984 2984
      * @psalm-suppress MixedArgument
2985 2985
      */
2986
-    public static function crypto_stream($len, $nonce, $key)
2986
+    public static function crypto_stream( $len, $nonce, $key )
2987 2987
     {
2988 2988
         /* Type checks: */
2989
-        ParagonIE_Sodium_Core_Util::declareScalarType($len, 'int', 1);
2990
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
2991
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
2989
+        ParagonIE_Sodium_Core_Util::declareScalarType( $len, 'int', 1 );
2990
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
2991
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
2992 2992
 
2993 2993
         /* Input validation: */
2994
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_STREAM_NONCEBYTES) {
2995
-            throw new SodiumException('Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.');
2994
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_STREAM_NONCEBYTES ) {
2995
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.' );
2996 2996
         }
2997
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_STREAM_KEYBYTES) {
2998
-            throw new SodiumException('Argument 3 must be CRYPTO_STREAM_KEYBYTES long.');
2997
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_STREAM_KEYBYTES ) {
2998
+            throw new SodiumException( 'Argument 3 must be CRYPTO_STREAM_KEYBYTES long.' );
2999 2999
         }
3000 3000
 
3001
-        if (self::useNewSodiumAPI()) {
3002
-            return sodium_crypto_stream($len, $nonce, $key);
3001
+        if ( self::useNewSodiumAPI() ) {
3002
+            return sodium_crypto_stream( $len, $nonce, $key );
3003 3003
         }
3004
-        if (self::use_fallback('crypto_stream')) {
3005
-            return (string) call_user_func('\\Sodium\\crypto_stream', $len, $nonce, $key);
3004
+        if ( self::use_fallback( 'crypto_stream' ) ) {
3005
+            return (string)call_user_func( '\\Sodium\\crypto_stream', $len, $nonce, $key );
3006 3006
         }
3007
-        if (PHP_INT_SIZE === 4) {
3008
-            return ParagonIE_Sodium_Core32_XSalsa20::xsalsa20($len, $nonce, $key);
3007
+        if ( PHP_INT_SIZE === 4 ) {
3008
+            return ParagonIE_Sodium_Core32_XSalsa20::xsalsa20( $len, $nonce, $key );
3009 3009
         }
3010
-        return ParagonIE_Sodium_Core_XSalsa20::xsalsa20($len, $nonce, $key);
3010
+        return ParagonIE_Sodium_Core_XSalsa20::xsalsa20( $len, $nonce, $key );
3011 3011
     }
3012 3012
 
3013 3013
     /**
@@ -3030,31 +3030,31 @@  discard block
 block discarded – undo
3030 3030
      * @throws TypeError
3031 3031
      * @psalm-suppress MixedArgument
3032 3032
      */
3033
-    public static function crypto_stream_xor($message, $nonce, $key)
3033
+    public static function crypto_stream_xor( $message, $nonce, $key )
3034 3034
     {
3035 3035
         /* Type checks: */
3036
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 1);
3037
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
3038
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
3036
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 1 );
3037
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
3038
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
3039 3039
 
3040 3040
         /* Input validation: */
3041
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_STREAM_NONCEBYTES) {
3042
-            throw new SodiumException('Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.');
3041
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_STREAM_NONCEBYTES ) {
3042
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SECRETBOX_NONCEBYTES long.' );
3043 3043
         }
3044
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_STREAM_KEYBYTES) {
3045
-            throw new SodiumException('Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.');
3044
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_STREAM_KEYBYTES ) {
3045
+            throw new SodiumException( 'Argument 3 must be CRYPTO_SECRETBOX_KEYBYTES long.' );
3046 3046
         }
3047 3047
 
3048
-        if (self::useNewSodiumAPI()) {
3049
-            return sodium_crypto_stream_xor($message, $nonce, $key);
3048
+        if ( self::useNewSodiumAPI() ) {
3049
+            return sodium_crypto_stream_xor( $message, $nonce, $key );
3050 3050
         }
3051
-        if (self::use_fallback('crypto_stream_xor')) {
3052
-            return (string) call_user_func('\\Sodium\\crypto_stream_xor', $message, $nonce, $key);
3051
+        if ( self::use_fallback( 'crypto_stream_xor' ) ) {
3052
+            return (string)call_user_func( '\\Sodium\\crypto_stream_xor', $message, $nonce, $key );
3053 3053
         }
3054
-        if (PHP_INT_SIZE === 4) {
3055
-            return ParagonIE_Sodium_Core32_XSalsa20::xsalsa20_xor($message, $nonce, $key);
3054
+        if ( PHP_INT_SIZE === 4 ) {
3055
+            return ParagonIE_Sodium_Core32_XSalsa20::xsalsa20_xor( $message, $nonce, $key );
3056 3056
         }
3057
-        return ParagonIE_Sodium_Core_XSalsa20::xsalsa20_xor($message, $nonce, $key);
3057
+        return ParagonIE_Sodium_Core_XSalsa20::xsalsa20_xor( $message, $nonce, $key );
3058 3058
     }
3059 3059
 
3060 3060
     /**
@@ -3066,7 +3066,7 @@  discard block
 block discarded – undo
3066 3066
      */
3067 3067
     public static function crypto_stream_keygen()
3068 3068
     {
3069
-        return random_bytes(self::CRYPTO_STREAM_KEYBYTES);
3069
+        return random_bytes( self::CRYPTO_STREAM_KEYBYTES );
3070 3070
     }
3071 3071
 
3072 3072
 
@@ -3085,28 +3085,28 @@  discard block
 block discarded – undo
3085 3085
      * @throws TypeError
3086 3086
      * @psalm-suppress MixedArgument
3087 3087
      */
3088
-    public static function crypto_stream_xchacha20($len, $nonce, $key, $dontFallback = false)
3088
+    public static function crypto_stream_xchacha20( $len, $nonce, $key, $dontFallback = false )
3089 3089
     {
3090 3090
         /* Type checks: */
3091
-        ParagonIE_Sodium_Core_Util::declareScalarType($len, 'int', 1);
3092
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
3093
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
3091
+        ParagonIE_Sodium_Core_Util::declareScalarType( $len, 'int', 1 );
3092
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
3093
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
3094 3094
 
3095 3095
         /* Input validation: */
3096
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_STREAM_XCHACHA20_NONCEBYTES) {
3097
-            throw new SodiumException('Argument 2 must be CRYPTO_SECRETBOX_XCHACHA20_NONCEBYTES long.');
3096
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_STREAM_XCHACHA20_NONCEBYTES ) {
3097
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SECRETBOX_XCHACHA20_NONCEBYTES long.' );
3098 3098
         }
3099
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_STREAM_XCHACHA20_KEYBYTES) {
3100
-            throw new SodiumException('Argument 3 must be CRYPTO_STREAM_XCHACHA20_KEYBYTES long.');
3099
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_STREAM_XCHACHA20_KEYBYTES ) {
3100
+            throw new SodiumException( 'Argument 3 must be CRYPTO_STREAM_XCHACHA20_KEYBYTES long.' );
3101 3101
         }
3102 3102
 
3103
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3104
-            return sodium_crypto_stream_xchacha20($len, $nonce, $key);
3103
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3104
+            return sodium_crypto_stream_xchacha20( $len, $nonce, $key );
3105 3105
         }
3106
-        if (PHP_INT_SIZE === 4) {
3107
-            return ParagonIE_Sodium_Core32_XChaCha20::stream($len, $nonce, $key);
3106
+        if ( PHP_INT_SIZE === 4 ) {
3107
+            return ParagonIE_Sodium_Core32_XChaCha20::stream( $len, $nonce, $key );
3108 3108
         }
3109
-        return ParagonIE_Sodium_Core_XChaCha20::stream($len, $nonce, $key);
3109
+        return ParagonIE_Sodium_Core_XChaCha20::stream( $len, $nonce, $key );
3110 3110
     }
3111 3111
 
3112 3112
     /**
@@ -3130,28 +3130,28 @@  discard block
 block discarded – undo
3130 3130
      * @throws TypeError
3131 3131
      * @psalm-suppress MixedArgument
3132 3132
      */
3133
-    public static function crypto_stream_xchacha20_xor($message, $nonce, $key, $dontFallback = false)
3133
+    public static function crypto_stream_xchacha20_xor( $message, $nonce, $key, $dontFallback = false )
3134 3134
     {
3135 3135
         /* Type checks: */
3136
-        ParagonIE_Sodium_Core_Util::declareScalarType($message, 'string', 1);
3137
-        ParagonIE_Sodium_Core_Util::declareScalarType($nonce, 'string', 2);
3138
-        ParagonIE_Sodium_Core_Util::declareScalarType($key, 'string', 3);
3136
+        ParagonIE_Sodium_Core_Util::declareScalarType( $message, 'string', 1 );
3137
+        ParagonIE_Sodium_Core_Util::declareScalarType( $nonce, 'string', 2 );
3138
+        ParagonIE_Sodium_Core_Util::declareScalarType( $key, 'string', 3 );
3139 3139
 
3140 3140
         /* Input validation: */
3141
-        if (ParagonIE_Sodium_Core_Util::strlen($nonce) !== self::CRYPTO_STREAM_XCHACHA20_NONCEBYTES) {
3142
-            throw new SodiumException('Argument 2 must be CRYPTO_SECRETBOX_XCHACHA20_NONCEBYTES long.');
3141
+        if ( ParagonIE_Sodium_Core_Util::strlen( $nonce ) !== self::CRYPTO_STREAM_XCHACHA20_NONCEBYTES ) {
3142
+            throw new SodiumException( 'Argument 2 must be CRYPTO_SECRETBOX_XCHACHA20_NONCEBYTES long.' );
3143 3143
         }
3144
-        if (ParagonIE_Sodium_Core_Util::strlen($key) !== self::CRYPTO_STREAM_XCHACHA20_KEYBYTES) {
3145
-            throw new SodiumException('Argument 3 must be CRYPTO_SECRETBOX_XCHACHA20_KEYBYTES long.');
3144
+        if ( ParagonIE_Sodium_Core_Util::strlen( $key ) !== self::CRYPTO_STREAM_XCHACHA20_KEYBYTES ) {
3145
+            throw new SodiumException( 'Argument 3 must be CRYPTO_SECRETBOX_XCHACHA20_KEYBYTES long.' );
3146 3146
         }
3147 3147
 
3148
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3149
-            return sodium_crypto_stream_xchacha20_xor($message, $nonce, $key);
3148
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3149
+            return sodium_crypto_stream_xchacha20_xor( $message, $nonce, $key );
3150 3150
         }
3151
-        if (PHP_INT_SIZE === 4) {
3152
-            return ParagonIE_Sodium_Core32_XChaCha20::streamXorIc($message, $nonce, $key);
3151
+        if ( PHP_INT_SIZE === 4 ) {
3152
+            return ParagonIE_Sodium_Core32_XChaCha20::streamXorIc( $message, $nonce, $key );
3153 3153
         }
3154
-        return ParagonIE_Sodium_Core_XChaCha20::streamXorIc($message, $nonce, $key);
3154
+        return ParagonIE_Sodium_Core_XChaCha20::streamXorIc( $message, $nonce, $key );
3155 3155
     }
3156 3156
 
3157 3157
     /**
@@ -3163,7 +3163,7 @@  discard block
 block discarded – undo
3163 3163
      */
3164 3164
     public static function crypto_stream_xchacha20_keygen()
3165 3165
     {
3166
-        return random_bytes(self::CRYPTO_STREAM_XCHACHA20_KEYBYTES);
3166
+        return random_bytes( self::CRYPTO_STREAM_XCHACHA20_KEYBYTES );
3167 3167
     }
3168 3168
 
3169 3169
     /**
@@ -3176,20 +3176,20 @@  discard block
 block discarded – undo
3176 3176
      * @psalm-suppress TooFewArguments
3177 3177
      * @psalm-suppress MixedArgument
3178 3178
      */
3179
-    public static function hex2bin($string)
3179
+    public static function hex2bin( $string )
3180 3180
     {
3181 3181
         /* Type checks: */
3182
-        ParagonIE_Sodium_Core_Util::declareScalarType($string, 'string', 1);
3182
+        ParagonIE_Sodium_Core_Util::declareScalarType( $string, 'string', 1 );
3183 3183
 
3184
-        if (self::useNewSodiumAPI()) {
3185
-            if (is_callable('sodium_hex2bin')) {
3186
-                return (string) sodium_hex2bin($string);
3184
+        if ( self::useNewSodiumAPI() ) {
3185
+            if ( is_callable( 'sodium_hex2bin' ) ) {
3186
+                return (string)sodium_hex2bin( $string );
3187 3187
             }
3188 3188
         }
3189
-        if (self::use_fallback('hex2bin')) {
3190
-            return (string) call_user_func('\\Sodium\\hex2bin', $string);
3189
+        if ( self::use_fallback( 'hex2bin' ) ) {
3190
+            return (string)call_user_func( '\\Sodium\\hex2bin', $string );
3191 3191
         }
3192
-        return ParagonIE_Sodium_Core_Util::hex2bin($string);
3192
+        return ParagonIE_Sodium_Core_Util::hex2bin( $string );
3193 3193
     }
3194 3194
 
3195 3195
     /**
@@ -3202,29 +3202,29 @@  discard block
 block discarded – undo
3202 3202
      * @throws TypeError
3203 3203
      * @psalm-suppress MixedArgument
3204 3204
      */
3205
-    public static function increment(&$var)
3205
+    public static function increment( &$var )
3206 3206
     {
3207 3207
         /* Type checks: */
3208
-        ParagonIE_Sodium_Core_Util::declareScalarType($var, 'string', 1);
3208
+        ParagonIE_Sodium_Core_Util::declareScalarType( $var, 'string', 1 );
3209 3209
 
3210
-        if (self::useNewSodiumAPI()) {
3211
-            sodium_increment($var);
3210
+        if ( self::useNewSodiumAPI() ) {
3211
+            sodium_increment( $var );
3212 3212
             return;
3213 3213
         }
3214
-        if (self::use_fallback('increment')) {
3214
+        if ( self::use_fallback( 'increment' ) ) {
3215 3215
             $func = '\\Sodium\\increment';
3216
-            $func($var);
3216
+            $func( $var );
3217 3217
             return;
3218 3218
         }
3219 3219
 
3220
-        $len = ParagonIE_Sodium_Core_Util::strlen($var);
3220
+        $len = ParagonIE_Sodium_Core_Util::strlen( $var );
3221 3221
         $c = 1;
3222 3222
         $copy = '';
3223
-        for ($i = 0; $i < $len; ++$i) {
3223
+        for ( $i = 0; $i < $len; ++$i ) {
3224 3224
             $c += ParagonIE_Sodium_Core_Util::chrToInt(
3225
-                ParagonIE_Sodium_Core_Util::substr($var, $i, 1)
3225
+                ParagonIE_Sodium_Core_Util::substr( $var, $i, 1 )
3226 3226
             );
3227
-            $copy .= ParagonIE_Sodium_Core_Util::intToChr($c);
3227
+            $copy .= ParagonIE_Sodium_Core_Util::intToChr( $c );
3228 3228
             $c >>= 8;
3229 3229
         }
3230 3230
         $var = $copy;
@@ -3236,13 +3236,13 @@  discard block
 block discarded – undo
3236 3236
      *
3237 3237
      * @throws SodiumException
3238 3238
      */
3239
-    public static function is_zero($str)
3239
+    public static function is_zero( $str )
3240 3240
     {
3241 3241
         $d = 0;
3242
-        for ($i = 0; $i < 32; ++$i) {
3243
-            $d |= ParagonIE_Sodium_Core_Util::chrToInt($str[$i]);
3242
+        for ( $i = 0; $i < 32; ++$i ) {
3243
+            $d |= ParagonIE_Sodium_Core_Util::chrToInt( $str[ $i ] );
3244 3244
         }
3245
-        return ((($d - 1) >> 31) & 1) === 1;
3245
+        return ( ( ( $d - 1 ) >> 31 ) & 1 ) === 1;
3246 3246
     }
3247 3247
 
3248 3248
     /**
@@ -3253,12 +3253,12 @@  discard block
 block discarded – undo
3253 3253
      */
3254 3254
     public static function library_version_major()
3255 3255
     {
3256
-        if (self::useNewSodiumAPI() && defined('SODIUM_LIBRARY_MAJOR_VERSION')) {
3256
+        if ( self::useNewSodiumAPI() && defined( 'SODIUM_LIBRARY_MAJOR_VERSION' ) ) {
3257 3257
             return SODIUM_LIBRARY_MAJOR_VERSION;
3258 3258
         }
3259
-        if (self::use_fallback('library_version_major')) {
3259
+        if ( self::use_fallback( 'library_version_major' ) ) {
3260 3260
             /** @psalm-suppress UndefinedFunction */
3261
-            return (int) call_user_func('\\Sodium\\library_version_major');
3261
+            return (int)call_user_func( '\\Sodium\\library_version_major' );
3262 3262
         }
3263 3263
         return self::LIBRARY_VERSION_MAJOR;
3264 3264
     }
@@ -3271,12 +3271,12 @@  discard block
 block discarded – undo
3271 3271
      */
3272 3272
     public static function library_version_minor()
3273 3273
     {
3274
-        if (self::useNewSodiumAPI() && defined('SODIUM_LIBRARY_MINOR_VERSION')) {
3274
+        if ( self::useNewSodiumAPI() && defined( 'SODIUM_LIBRARY_MINOR_VERSION' ) ) {
3275 3275
             return SODIUM_LIBRARY_MINOR_VERSION;
3276 3276
         }
3277
-        if (self::use_fallback('library_version_minor')) {
3277
+        if ( self::use_fallback( 'library_version_minor' ) ) {
3278 3278
             /** @psalm-suppress UndefinedFunction */
3279
-            return (int) call_user_func('\\Sodium\\library_version_minor');
3279
+            return (int)call_user_func( '\\Sodium\\library_version_minor' );
3280 3280
         }
3281 3281
         return self::LIBRARY_VERSION_MINOR;
3282 3282
     }
@@ -3291,21 +3291,21 @@  discard block
 block discarded – undo
3291 3291
      * @throws TypeError
3292 3292
      * @psalm-suppress MixedArgument
3293 3293
      */
3294
-    public static function memcmp($left, $right)
3294
+    public static function memcmp( $left, $right )
3295 3295
     {
3296 3296
         /* Type checks: */
3297
-        ParagonIE_Sodium_Core_Util::declareScalarType($left, 'string', 1);
3298
-        ParagonIE_Sodium_Core_Util::declareScalarType($right, 'string', 2);
3297
+        ParagonIE_Sodium_Core_Util::declareScalarType( $left, 'string', 1 );
3298
+        ParagonIE_Sodium_Core_Util::declareScalarType( $right, 'string', 2 );
3299 3299
 
3300
-        if (self::useNewSodiumAPI()) {
3301
-            return sodium_memcmp($left, $right);
3300
+        if ( self::useNewSodiumAPI() ) {
3301
+            return sodium_memcmp( $left, $right );
3302 3302
         }
3303
-        if (self::use_fallback('memcmp')) {
3304
-            return (int) call_user_func('\\Sodium\\memcmp', $left, $right);
3303
+        if ( self::use_fallback( 'memcmp' ) ) {
3304
+            return (int)call_user_func( '\\Sodium\\memcmp', $left, $right );
3305 3305
         }
3306 3306
         /** @var string $left */
3307 3307
         /** @var string $right */
3308
-        return ParagonIE_Sodium_Core_Util::memcmp($left, $right);
3308
+        return ParagonIE_Sodium_Core_Util::memcmp( $left, $right );
3309 3309
     }
3310 3310
 
3311 3311
     /**
@@ -3320,20 +3320,20 @@  discard block
 block discarded – undo
3320 3320
      * @throws TypeError
3321 3321
      * @psalm-suppress TooFewArguments
3322 3322
      */
3323
-    public static function memzero(&$var)
3323
+    public static function memzero( &$var )
3324 3324
     {
3325 3325
         /* Type checks: */
3326
-        ParagonIE_Sodium_Core_Util::declareScalarType($var, 'string', 1);
3326
+        ParagonIE_Sodium_Core_Util::declareScalarType( $var, 'string', 1 );
3327 3327
 
3328
-        if (self::useNewSodiumAPI()) {
3328
+        if ( self::useNewSodiumAPI() ) {
3329 3329
             /** @psalm-suppress MixedArgument */
3330
-            sodium_memzero($var);
3330
+            sodium_memzero( $var );
3331 3331
             return;
3332 3332
         }
3333
-        if (self::use_fallback('memzero')) {
3333
+        if ( self::use_fallback( 'memzero' ) ) {
3334 3334
             $func = '\\Sodium\\memzero';
3335
-            $func($var);
3336
-            if ($var === null) {
3335
+            $func( $var );
3336
+            if ( $var === null ) {
3337 3337
                 return;
3338 3338
             }
3339 3339
         }
@@ -3351,57 +3351,57 @@  discard block
 block discarded – undo
3351 3351
      * @return string
3352 3352
      * @throws SodiumException
3353 3353
      */
3354
-    public static function pad($unpadded, $blockSize, $dontFallback = false)
3354
+    public static function pad( $unpadded, $blockSize, $dontFallback = false )
3355 3355
     {
3356 3356
         /* Type checks: */
3357
-        ParagonIE_Sodium_Core_Util::declareScalarType($unpadded, 'string', 1);
3358
-        ParagonIE_Sodium_Core_Util::declareScalarType($blockSize, 'int', 2);
3357
+        ParagonIE_Sodium_Core_Util::declareScalarType( $unpadded, 'string', 1 );
3358
+        ParagonIE_Sodium_Core_Util::declareScalarType( $blockSize, 'int', 2 );
3359 3359
 
3360
-        $unpadded = (string) $unpadded;
3361
-        $blockSize = (int) $blockSize;
3360
+        $unpadded = (string)$unpadded;
3361
+        $blockSize = (int)$blockSize;
3362 3362
 
3363
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3364
-            return (string) sodium_pad($unpadded, $blockSize);
3363
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3364
+            return (string)sodium_pad( $unpadded, $blockSize );
3365 3365
         }
3366 3366
 
3367
-        if ($blockSize <= 0) {
3367
+        if ( $blockSize <= 0 ) {
3368 3368
             throw new SodiumException(
3369 3369
                 'block size cannot be less than 1'
3370 3370
             );
3371 3371
         }
3372
-        $unpadded_len = ParagonIE_Sodium_Core_Util::strlen($unpadded);
3373
-        $xpadlen = ($blockSize - 1);
3374
-        if (($blockSize & ($blockSize - 1)) === 0) {
3375
-            $xpadlen -= $unpadded_len & ($blockSize - 1);
3372
+        $unpadded_len = ParagonIE_Sodium_Core_Util::strlen( $unpadded );
3373
+        $xpadlen = ( $blockSize - 1 );
3374
+        if ( ( $blockSize & ( $blockSize - 1 ) ) === 0 ) {
3375
+            $xpadlen -= $unpadded_len & ( $blockSize - 1 );
3376 3376
         } else {
3377 3377
             $xpadlen -= $unpadded_len % $blockSize;
3378 3378
         }
3379 3379
 
3380 3380
         $xpadded_len = $unpadded_len + $xpadlen;
3381
-        $padded = str_repeat("\0", $xpadded_len - 1);
3382
-        if ($unpadded_len > 0) {
3381
+        $padded = str_repeat( "\0", $xpadded_len - 1 );
3382
+        if ( $unpadded_len > 0 ) {
3383 3383
             $st = 1;
3384 3384
             $i = 0;
3385 3385
             $k = $unpadded_len;
3386
-            for ($j = 0; $j <= $xpadded_len; ++$j) {
3387
-                $i = (int) $i;
3388
-                $k = (int) $k;
3389
-                $st = (int) $st;
3390
-                if ($j >= $unpadded_len) {
3391
-                    $padded[$j] = "\0";
3386
+            for ( $j = 0; $j <= $xpadded_len; ++$j ) {
3387
+                $i = (int)$i;
3388
+                $k = (int)$k;
3389
+                $st = (int)$st;
3390
+                if ( $j >= $unpadded_len ) {
3391
+                    $padded[ $j ] = "\0";
3392 3392
                 } else {
3393
-                    $padded[$j] = $unpadded[$j];
3393
+                    $padded[ $j ] = $unpadded[ $j ];
3394 3394
                 }
3395 3395
                 /** @var int $k */
3396 3396
                 $k -= $st;
3397
-                $st = (int) (~(
3397
+                $st = (int)( ~(
3398 3398
                             (
3399 3399
                                 (
3400
-                                    ($k >> 48)
3400
+                                    ( $k >> 48 )
3401 3401
                                         |
3402
-                                    ($k >> 32)
3402
+                                    ( $k >> 32 )
3403 3403
                                         |
3404
-                                    ($k >> 16)
3404
+                                    ( $k >> 16 )
3405 3405
                                         |
3406 3406
                                     $k
3407 3407
                                 ) - 1
@@ -3414,15 +3414,15 @@  discard block
 block discarded – undo
3414 3414
 
3415 3415
         $mask = 0;
3416 3416
         $tail = $xpadded_len;
3417
-        for ($i = 0; $i < $blockSize; ++$i) {
3417
+        for ( $i = 0; $i < $blockSize; ++$i ) {
3418 3418
             # barrier_mask = (unsigned char)
3419 3419
             #     (((i ^ xpadlen) - 1U) >> ((sizeof(size_t) - 1U) * CHAR_BIT));
3420
-            $barrier_mask = (($i ^ $xpadlen) -1) >> ((PHP_INT_SIZE << 3) - 1);
3420
+            $barrier_mask = ( ( $i ^ $xpadlen ) - 1 ) >> ( ( PHP_INT_SIZE << 3 ) - 1 );
3421 3421
             # tail[-i] = (tail[-i] & mask) | (0x80 & barrier_mask);
3422
-            $padded[$tail - $i] = ParagonIE_Sodium_Core_Util::intToChr(
3423
-                (ParagonIE_Sodium_Core_Util::chrToInt($padded[$tail - $i]) & $mask)
3422
+            $padded[ $tail - $i ] = ParagonIE_Sodium_Core_Util::intToChr(
3423
+                ( ParagonIE_Sodium_Core_Util::chrToInt( $padded[ $tail - $i ] ) & $mask )
3424 3424
                     |
3425
-                (0x80 & $barrier_mask)
3425
+                ( 0x80 & $barrier_mask )
3426 3426
             );
3427 3427
             # mask |= barrier_mask;
3428 3428
             $mask |= $barrier_mask;
@@ -3437,24 +3437,24 @@  discard block
 block discarded – undo
3437 3437
      * @return string
3438 3438
      * @throws SodiumException
3439 3439
      */
3440
-    public static function unpad($padded, $blockSize, $dontFallback = false)
3440
+    public static function unpad( $padded, $blockSize, $dontFallback = false )
3441 3441
     {
3442 3442
         /* Type checks: */
3443
-        ParagonIE_Sodium_Core_Util::declareScalarType($padded, 'string', 1);
3444
-        ParagonIE_Sodium_Core_Util::declareScalarType($blockSize, 'int', 2);
3443
+        ParagonIE_Sodium_Core_Util::declareScalarType( $padded, 'string', 1 );
3444
+        ParagonIE_Sodium_Core_Util::declareScalarType( $blockSize, 'int', 2 );
3445 3445
 
3446
-        $padded = (string) $padded;
3447
-        $blockSize = (int) $blockSize;
3446
+        $padded = (string)$padded;
3447
+        $blockSize = (int)$blockSize;
3448 3448
 
3449
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3450
-            return (string) sodium_unpad($padded, $blockSize);
3449
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3450
+            return (string)sodium_unpad( $padded, $blockSize );
3451 3451
         }
3452
-        if ($blockSize <= 0) {
3453
-            throw new SodiumException('block size cannot be less than 1');
3452
+        if ( $blockSize <= 0 ) {
3453
+            throw new SodiumException( 'block size cannot be less than 1' );
3454 3454
         }
3455
-        $padded_len = ParagonIE_Sodium_Core_Util::strlen($padded);
3456
-        if ($padded_len < $blockSize) {
3457
-            throw new SodiumException('invalid padding');
3455
+        $padded_len = ParagonIE_Sodium_Core_Util::strlen( $padded );
3456
+        if ( $padded_len < $blockSize ) {
3457
+            throw new SodiumException( 'invalid padding' );
3458 3458
         }
3459 3459
 
3460 3460
         # tail = &padded[padded_len - 1U];
@@ -3465,15 +3465,15 @@  discard block
 block discarded – undo
3465 3465
         $pad_len = 0;
3466 3466
 
3467 3467
         $found = 0;
3468
-        for ($i = 0; $i < $blockSize; ++$i) {
3468
+        for ( $i = 0; $i < $blockSize; ++$i ) {
3469 3469
             # c = tail[-i];
3470
-            $c = ParagonIE_Sodium_Core_Util::chrToInt($padded[$tail - $i]);
3470
+            $c = ParagonIE_Sodium_Core_Util::chrToInt( $padded[ $tail - $i ] );
3471 3471
 
3472 3472
             # is_barrier =
3473 3473
             #     (( (acc - 1U) & (pad_len - 1U) & ((c ^ 0x80) - 1U) ) >> 8) & 1U;
3474 3474
             $is_barrier = (
3475 3475
                 (
3476
-                    ($acc - 1) & ($pad_len - 1) & (($c ^ 80) - 1)
3476
+                    ( $acc - 1 ) & ( $pad_len - 1 ) & ( ( $c ^ 80 ) - 1 )
3477 3477
                 ) >> 7
3478 3478
             ) & 1;
3479 3479
             $is_barrier &= ~$found;
@@ -3483,17 +3483,17 @@  discard block
 block discarded – undo
3483 3483
             $acc |= $c;
3484 3484
 
3485 3485
             # pad_len |= i & (1U + ~is_barrier);
3486
-            $pad_len |= $i & (1 + ~$is_barrier);
3486
+            $pad_len |= $i & ( 1 + ~$is_barrier );
3487 3487
 
3488 3488
             # valid |= (unsigned char) is_barrier;
3489
-            $valid |= ($is_barrier & 0xff);
3489
+            $valid |= ( $is_barrier & 0xff );
3490 3490
         }
3491 3491
         # unpadded_len = padded_len - 1U - pad_len;
3492 3492
         $unpadded_len = $padded_len - 1 - $pad_len;
3493
-        if ($valid !== 1) {
3494
-            throw new SodiumException('invalid padding');
3493
+        if ( $valid !== 1 ) {
3494
+            throw new SodiumException( 'invalid padding' );
3495 3495
         }
3496
-        return ParagonIE_Sodium_Core_Util::substr($padded, 0, $unpadded_len);
3496
+        return ParagonIE_Sodium_Core_Util::substr( $padded, 0, $unpadded_len );
3497 3497
     }
3498 3498
 
3499 3499
     /**
@@ -3503,10 +3503,10 @@  discard block
 block discarded – undo
3503 3503
      */
3504 3504
     public static function polyfill_is_fast()
3505 3505
     {
3506
-        if (extension_loaded('sodium')) {
3506
+        if ( extension_loaded( 'sodium' ) ) {
3507 3507
             return true;
3508 3508
         }
3509
-        if (extension_loaded('libsodium')) {
3509
+        if ( extension_loaded( 'libsodium' ) ) {
3510 3510
             return true;
3511 3511
         }
3512 3512
         return PHP_INT_SIZE === 8;
@@ -3521,22 +3521,22 @@  discard block
 block discarded – undo
3521 3521
      * @throws Exception
3522 3522
      * @throws TypeError
3523 3523
      */
3524
-    public static function randombytes_buf($numBytes)
3524
+    public static function randombytes_buf( $numBytes )
3525 3525
     {
3526 3526
         /* Type checks: */
3527
-        if (!is_int($numBytes)) {
3528
-            if (is_numeric($numBytes)) {
3529
-                $numBytes = (int) $numBytes;
3527
+        if ( ! is_int( $numBytes ) ) {
3528
+            if ( is_numeric( $numBytes ) ) {
3529
+                $numBytes = (int)$numBytes;
3530 3530
             } else {
3531 3531
                 throw new TypeError(
3532
-                    'Argument 1 must be an integer, ' . gettype($numBytes) . ' given.'
3532
+                    'Argument 1 must be an integer, ' . gettype( $numBytes ) . ' given.'
3533 3533
                 );
3534 3534
             }
3535 3535
         }
3536
-        if (self::use_fallback('randombytes_buf')) {
3537
-            return (string) call_user_func('\\Sodium\\randombytes_buf', $numBytes);
3536
+        if ( self::use_fallback( 'randombytes_buf' ) ) {
3537
+            return (string)call_user_func( '\\Sodium\\randombytes_buf', $numBytes );
3538 3538
         }
3539
-        return random_bytes($numBytes);
3539
+        return random_bytes( $numBytes );
3540 3540
     }
3541 3541
 
3542 3542
     /**
@@ -3548,22 +3548,22 @@  discard block
 block discarded – undo
3548 3548
      * @throws Error
3549 3549
      * @throws TypeError
3550 3550
      */
3551
-    public static function randombytes_uniform($range)
3551
+    public static function randombytes_uniform( $range )
3552 3552
     {
3553 3553
         /* Type checks: */
3554
-        if (!is_int($range)) {
3555
-            if (is_numeric($range)) {
3556
-                $range = (int) $range;
3554
+        if ( ! is_int( $range ) ) {
3555
+            if ( is_numeric( $range ) ) {
3556
+                $range = (int)$range;
3557 3557
             } else {
3558 3558
                 throw new TypeError(
3559
-                    'Argument 1 must be an integer, ' . gettype($range) . ' given.'
3559
+                    'Argument 1 must be an integer, ' . gettype( $range ) . ' given.'
3560 3560
                 );
3561 3561
             }
3562 3562
         }
3563
-        if (self::use_fallback('randombytes_uniform')) {
3564
-            return (int) call_user_func('\\Sodium\\randombytes_uniform', $range);
3563
+        if ( self::use_fallback( 'randombytes_uniform' ) ) {
3564
+            return (int)call_user_func( '\\Sodium\\randombytes_uniform', $range );
3565 3565
         }
3566
-        return random_int(0, $range - 1);
3566
+        return random_int( 0, $range - 1 );
3567 3567
     }
3568 3568
 
3569 3569
     /**
@@ -3576,10 +3576,10 @@  discard block
 block discarded – undo
3576 3576
      */
3577 3577
     public static function randombytes_random16()
3578 3578
     {
3579
-        if (self::use_fallback('randombytes_random16')) {
3580
-            return (int) call_user_func('\\Sodium\\randombytes_random16');
3579
+        if ( self::use_fallback( 'randombytes_random16' ) ) {
3580
+            return (int)call_user_func( '\\Sodium\\randombytes_random16' );
3581 3581
         }
3582
-        return random_int(0, 65535);
3582
+        return random_int( 0, 65535 );
3583 3583
     }
3584 3584
 
3585 3585
     /**
@@ -3588,17 +3588,17 @@  discard block
 block discarded – undo
3588 3588
      * @return bool
3589 3589
      * @throws SodiumException
3590 3590
      */
3591
-    public static function ristretto255_is_valid_point($p, $dontFallback = false)
3591
+    public static function ristretto255_is_valid_point( $p, $dontFallback = false )
3592 3592
     {
3593
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3594
-            return sodium_crypto_core_ristretto255_is_valid_point($p);
3593
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3594
+            return sodium_crypto_core_ristretto255_is_valid_point( $p );
3595 3595
         }
3596 3596
         try {
3597
-            $r = ParagonIE_Sodium_Core_Ristretto255::ristretto255_frombytes($p);
3598
-            return $r['res'] === 0 &&
3599
-                ParagonIE_Sodium_Core_Ristretto255::ristretto255_point_is_canonical($p) === 1;
3600
-        } catch (SodiumException $ex) {
3601
-            if ($ex->getMessage() === 'S is not canonical') {
3597
+            $r = ParagonIE_Sodium_Core_Ristretto255::ristretto255_frombytes( $p );
3598
+            return $r[ 'res' ] === 0 &&
3599
+                ParagonIE_Sodium_Core_Ristretto255::ristretto255_point_is_canonical( $p ) === 1;
3600
+        } catch ( SodiumException $ex ) {
3601
+            if ( $ex->getMessage() === 'S is not canonical' ) {
3602 3602
                 return false;
3603 3603
             }
3604 3604
             throw $ex;
@@ -3612,12 +3612,12 @@  discard block
 block discarded – undo
3612 3612
      * @return string
3613 3613
      * @throws SodiumException
3614 3614
      */
3615
-    public static function ristretto255_add($p, $q, $dontFallback = false)
3615
+    public static function ristretto255_add( $p, $q, $dontFallback = false )
3616 3616
     {
3617
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3618
-            return sodium_crypto_core_ristretto255_add($p, $q);
3617
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3618
+            return sodium_crypto_core_ristretto255_add( $p, $q );
3619 3619
         }
3620
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_add($p, $q);
3620
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_add( $p, $q );
3621 3621
     }
3622 3622
 
3623 3623
     /**
@@ -3627,12 +3627,12 @@  discard block
 block discarded – undo
3627 3627
      * @return string
3628 3628
      * @throws SodiumException
3629 3629
      */
3630
-    public static function ristretto255_sub($p, $q, $dontFallback = false)
3630
+    public static function ristretto255_sub( $p, $q, $dontFallback = false )
3631 3631
     {
3632
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3633
-            return sodium_crypto_core_ristretto255_sub($p, $q);
3632
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3633
+            return sodium_crypto_core_ristretto255_sub( $p, $q );
3634 3634
         }
3635
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_sub($p, $q);
3635
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_sub( $p, $q );
3636 3636
     }
3637 3637
 
3638 3638
     /**
@@ -3642,12 +3642,12 @@  discard block
 block discarded – undo
3642 3642
      *
3643 3643
      * @throws SodiumException
3644 3644
      */
3645
-    public static function ristretto255_from_hash($r, $dontFallback = false)
3645
+    public static function ristretto255_from_hash( $r, $dontFallback = false )
3646 3646
     {
3647
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3648
-            return sodium_crypto_core_ristretto255_from_hash($r);
3647
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3648
+            return sodium_crypto_core_ristretto255_from_hash( $r );
3649 3649
         }
3650
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_from_hash($r);
3650
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_from_hash( $r );
3651 3651
     }
3652 3652
 
3653 3653
     /**
@@ -3656,9 +3656,9 @@  discard block
 block discarded – undo
3656 3656
      *
3657 3657
      * @throws SodiumException
3658 3658
      */
3659
-    public static function ristretto255_random($dontFallback = false)
3659
+    public static function ristretto255_random( $dontFallback = false )
3660 3660
     {
3661
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3661
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3662 3662
             return sodium_crypto_core_ristretto255_random();
3663 3663
         }
3664 3664
         return ParagonIE_Sodium_Core_Ristretto255::ristretto255_random();
@@ -3670,9 +3670,9 @@  discard block
 block discarded – undo
3670 3670
      *
3671 3671
      * @throws SodiumException
3672 3672
      */
3673
-    public static function ristretto255_scalar_random($dontFallback = false)
3673
+    public static function ristretto255_scalar_random( $dontFallback = false )
3674 3674
     {
3675
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3675
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3676 3676
             return sodium_crypto_core_ristretto255_scalar_random();
3677 3677
         }
3678 3678
         return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_random();
@@ -3684,12 +3684,12 @@  discard block
 block discarded – undo
3684 3684
      * @return string
3685 3685
      * @throws SodiumException
3686 3686
      */
3687
-    public static function ristretto255_scalar_invert($s, $dontFallback = false)
3687
+    public static function ristretto255_scalar_invert( $s, $dontFallback = false )
3688 3688
     {
3689
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3690
-            return sodium_crypto_core_ristretto255_scalar_invert($s);
3689
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3690
+            return sodium_crypto_core_ristretto255_scalar_invert( $s );
3691 3691
         }
3692
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_invert($s);
3692
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_invert( $s );
3693 3693
     }
3694 3694
     /**
3695 3695
      * @param string $s
@@ -3697,12 +3697,12 @@  discard block
 block discarded – undo
3697 3697
      * @return string
3698 3698
      * @throws SodiumException
3699 3699
      */
3700
-    public static function ristretto255_scalar_negate($s, $dontFallback = false)
3700
+    public static function ristretto255_scalar_negate( $s, $dontFallback = false )
3701 3701
     {
3702
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3703
-            return sodium_crypto_core_ristretto255_scalar_negate($s);
3702
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3703
+            return sodium_crypto_core_ristretto255_scalar_negate( $s );
3704 3704
         }
3705
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_negate($s);
3705
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_negate( $s );
3706 3706
     }
3707 3707
 
3708 3708
     /**
@@ -3711,12 +3711,12 @@  discard block
 block discarded – undo
3711 3711
      * @return string
3712 3712
      * @throws SodiumException
3713 3713
      */
3714
-    public static function ristretto255_scalar_complement($s, $dontFallback = false)
3714
+    public static function ristretto255_scalar_complement( $s, $dontFallback = false )
3715 3715
     {
3716
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3717
-            return sodium_crypto_core_ristretto255_scalar_complement($s);
3716
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3717
+            return sodium_crypto_core_ristretto255_scalar_complement( $s );
3718 3718
         }
3719
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_complement($s);
3719
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_complement( $s );
3720 3720
     }
3721 3721
 
3722 3722
     /**
@@ -3726,12 +3726,12 @@  discard block
 block discarded – undo
3726 3726
      * @return string
3727 3727
      * @throws SodiumException
3728 3728
      */
3729
-    public static function ristretto255_scalar_add($x, $y, $dontFallback = false)
3729
+    public static function ristretto255_scalar_add( $x, $y, $dontFallback = false )
3730 3730
     {
3731
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3732
-            return sodium_crypto_core_ristretto255_scalar_add($x, $y);
3731
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3732
+            return sodium_crypto_core_ristretto255_scalar_add( $x, $y );
3733 3733
         }
3734
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_add($x, $y);
3734
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_add( $x, $y );
3735 3735
     }
3736 3736
 
3737 3737
     /**
@@ -3741,12 +3741,12 @@  discard block
 block discarded – undo
3741 3741
      * @return string
3742 3742
      * @throws SodiumException
3743 3743
      */
3744
-    public static function ristretto255_scalar_sub($x, $y, $dontFallback = false)
3744
+    public static function ristretto255_scalar_sub( $x, $y, $dontFallback = false )
3745 3745
     {
3746
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3747
-            return sodium_crypto_core_ristretto255_scalar_sub($x, $y);
3746
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3747
+            return sodium_crypto_core_ristretto255_scalar_sub( $x, $y );
3748 3748
         }
3749
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_sub($x, $y);
3749
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_sub( $x, $y );
3750 3750
     }
3751 3751
 
3752 3752
     /**
@@ -3756,12 +3756,12 @@  discard block
 block discarded – undo
3756 3756
      * @return string
3757 3757
      * @throws SodiumException
3758 3758
      */
3759
-    public static function ristretto255_scalar_mul($x, $y, $dontFallback = false)
3759
+    public static function ristretto255_scalar_mul( $x, $y, $dontFallback = false )
3760 3760
     {
3761
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3762
-            return sodium_crypto_core_ristretto255_scalar_mul($x, $y);
3761
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3762
+            return sodium_crypto_core_ristretto255_scalar_mul( $x, $y );
3763 3763
         }
3764
-        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_mul($x, $y);
3764
+        return ParagonIE_Sodium_Core_Ristretto255::ristretto255_scalar_mul( $x, $y );
3765 3765
     }
3766 3766
 
3767 3767
     /**
@@ -3771,12 +3771,12 @@  discard block
 block discarded – undo
3771 3771
      * @return string
3772 3772
      * @throws SodiumException
3773 3773
      */
3774
-    public static function scalarmult_ristretto255($n, $p, $dontFallback = false)
3774
+    public static function scalarmult_ristretto255( $n, $p, $dontFallback = false )
3775 3775
     {
3776
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3777
-            return sodium_crypto_scalarmult_ristretto255($n, $p);
3776
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3777
+            return sodium_crypto_scalarmult_ristretto255( $n, $p );
3778 3778
         }
3779
-        return ParagonIE_Sodium_Core_Ristretto255::scalarmult_ristretto255($n, $p);
3779
+        return ParagonIE_Sodium_Core_Ristretto255::scalarmult_ristretto255( $n, $p );
3780 3780
     }
3781 3781
 
3782 3782
     /**
@@ -3786,12 +3786,12 @@  discard block
 block discarded – undo
3786 3786
      * @return string
3787 3787
      * @throws SodiumException
3788 3788
      */
3789
-    public static function scalarmult_ristretto255_base($n, $dontFallback = false)
3789
+    public static function scalarmult_ristretto255_base( $n, $dontFallback = false )
3790 3790
     {
3791
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3792
-            return sodium_crypto_scalarmult_ristretto255_base($n);
3791
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3792
+            return sodium_crypto_scalarmult_ristretto255_base( $n );
3793 3793
         }
3794
-        return ParagonIE_Sodium_Core_Ristretto255::scalarmult_ristretto255_base($n);
3794
+        return ParagonIE_Sodium_Core_Ristretto255::scalarmult_ristretto255_base( $n );
3795 3795
     }
3796 3796
 
3797 3797
     /**
@@ -3800,12 +3800,12 @@  discard block
 block discarded – undo
3800 3800
      * @return string
3801 3801
      * @throws SodiumException
3802 3802
      */
3803
-    public static function ristretto255_scalar_reduce($s, $dontFallback = false)
3803
+    public static function ristretto255_scalar_reduce( $s, $dontFallback = false )
3804 3804
     {
3805
-        if (self::useNewSodiumAPI() && !$dontFallback) {
3806
-            return sodium_crypto_core_ristretto255_scalar_reduce($s);
3805
+        if ( self::useNewSodiumAPI() && ! $dontFallback ) {
3806
+            return sodium_crypto_core_ristretto255_scalar_reduce( $s );
3807 3807
         }
3808
-        return ParagonIE_Sodium_Core_Ristretto255::sc_reduce($s);
3808
+        return ParagonIE_Sodium_Core_Ristretto255::sc_reduce( $s );
3809 3809
     }
3810 3810
 
3811 3811
     /**
@@ -3821,26 +3821,26 @@  discard block
 block discarded – undo
3821 3821
      * @return bool           TRUE if we're fast enough, FALSE is not
3822 3822
      * @throws SodiumException
3823 3823
      */
3824
-    public static function runtime_speed_test($iterations, $maxTimeout)
3824
+    public static function runtime_speed_test( $iterations, $maxTimeout )
3825 3825
     {
3826
-        if (self::polyfill_is_fast()) {
3826
+        if ( self::polyfill_is_fast() ) {
3827 3827
             return true;
3828 3828
         }
3829 3829
         /** @var float $end */
3830 3830
         $end = 0.0;
3831 3831
         /** @var float $start */
3832
-        $start = microtime(true);
3832
+        $start = microtime( true );
3833 3833
         /** @var ParagonIE_Sodium_Core32_Int64 $a */
3834
-        $a = ParagonIE_Sodium_Core32_Int64::fromInt(random_int(3, 1 << 16));
3835
-        for ($i = 0; $i < $iterations; ++$i) {
3834
+        $a = ParagonIE_Sodium_Core32_Int64::fromInt( random_int( 3, 1 << 16 ) );
3835
+        for ( $i = 0; $i < $iterations; ++$i ) {
3836 3836
             /** @var ParagonIE_Sodium_Core32_Int64 $b */
3837
-            $b = ParagonIE_Sodium_Core32_Int64::fromInt(random_int(3, 1 << 16));
3838
-            $a->mulInt64($b);
3837
+            $b = ParagonIE_Sodium_Core32_Int64::fromInt( random_int( 3, 1 << 16 ) );
3838
+            $a->mulInt64( $b );
3839 3839
         }
3840 3840
         /** @var float $end */
3841
-        $end = microtime(true);
3841
+        $end = microtime( true );
3842 3842
         /** @var int $diff */
3843
-        $diff = (int) ceil(($end - $start) * 1000);
3843
+        $diff = (int)ceil( ( $end - $start ) * 1000 );
3844 3844
         return $diff < $maxTimeout;
3845 3845
     }
3846 3846
 
@@ -3855,23 +3855,23 @@  discard block
 block discarded – undo
3855 3855
      * @return void
3856 3856
      * @throws SodiumException
3857 3857
      */
3858
-    public static function sub(&$val, $addv)
3858
+    public static function sub( &$val, $addv )
3859 3859
     {
3860
-        $val_len = ParagonIE_Sodium_Core_Util::strlen($val);
3861
-        $addv_len = ParagonIE_Sodium_Core_Util::strlen($addv);
3862
-        if ($val_len !== $addv_len) {
3863
-            throw new SodiumException('values must have the same length');
3860
+        $val_len = ParagonIE_Sodium_Core_Util::strlen( $val );
3861
+        $addv_len = ParagonIE_Sodium_Core_Util::strlen( $addv );
3862
+        if ( $val_len !== $addv_len ) {
3863
+            throw new SodiumException( 'values must have the same length' );
3864 3864
         }
3865
-        $A = ParagonIE_Sodium_Core_Util::stringToIntArray($val);
3866
-        $B = ParagonIE_Sodium_Core_Util::stringToIntArray($addv);
3865
+        $A = ParagonIE_Sodium_Core_Util::stringToIntArray( $val );
3866
+        $B = ParagonIE_Sodium_Core_Util::stringToIntArray( $addv );
3867 3867
 
3868 3868
         $c = 0;
3869
-        for ($i = 0; $i < $val_len; $i++) {
3870
-            $c = ($A[$i] - $B[$i] - $c);
3871
-            $A[$i] = ($c & 0xff);
3872
-            $c = ($c >> 8) & 1;
3869
+        for ( $i = 0; $i < $val_len; $i++ ) {
3870
+            $c = ( $A[ $i ] - $B[ $i ] - $c );
3871
+            $A[ $i ] = ( $c & 0xff );
3872
+            $c = ( $c >> 8 ) & 1;
3873 3873
         }
3874
-        $val = ParagonIE_Sodium_Core_Util::intArrayToString($A);
3874
+        $val = ParagonIE_Sodium_Core_Util::intArrayToString( $A );
3875 3875
     }
3876 3876
 
3877 3877
     /**
@@ -3884,13 +3884,13 @@  discard block
 block discarded – undo
3884 3884
      */
3885 3885
     public static function version_string()
3886 3886
     {
3887
-        if (self::useNewSodiumAPI()) {
3888
-            return (string) sodium_version_string();
3887
+        if ( self::useNewSodiumAPI() ) {
3888
+            return (string)sodium_version_string();
3889 3889
         }
3890
-        if (self::use_fallback('version_string')) {
3891
-            return (string) call_user_func('\\Sodium\\version_string');
3890
+        if ( self::use_fallback( 'version_string' ) ) {
3891
+            return (string)call_user_func( '\\Sodium\\version_string' );
3892 3892
         }
3893
-        return (string) self::VERSION_STRING;
3893
+        return (string)self::VERSION_STRING;
3894 3894
     }
3895 3895
 
3896 3896
     /**
@@ -3905,22 +3905,22 @@  discard block
 block discarded – undo
3905 3905
      *
3906 3906
      * @return bool
3907 3907
      */
3908
-    protected static function use_fallback($sodium_func_name = '')
3908
+    protected static function use_fallback( $sodium_func_name = '' )
3909 3909
     {
3910 3910
         static $res = null;
3911
-        if ($res === null) {
3912
-            $res = extension_loaded('libsodium') && PHP_VERSION_ID >= 50300;
3911
+        if ( $res === null ) {
3912
+            $res = extension_loaded( 'libsodium' ) && PHP_VERSION_ID >= 50300;
3913 3913
         }
3914
-        if ($res === false) {
3914
+        if ( $res === false ) {
3915 3915
             // No libsodium installed
3916 3916
             return false;
3917 3917
         }
3918
-        if (self::$disableFallbackForUnitTests) {
3918
+        if ( self::$disableFallbackForUnitTests ) {
3919 3919
             // Don't fallback. Use the PHP implementation.
3920 3920
             return false;
3921 3921
         }
3922
-        if (!empty($sodium_func_name)) {
3923
-            return is_callable('\\Sodium\\' . $sodium_func_name);
3922
+        if ( ! empty( $sodium_func_name ) ) {
3923
+            return is_callable( '\\Sodium\\' . $sodium_func_name );
3924 3924
         }
3925 3925
         return true;
3926 3926
     }
@@ -3935,13 +3935,13 @@  discard block
 block discarded – undo
3935 3935
     protected static function useNewSodiumAPI()
3936 3936
     {
3937 3937
         static $res = null;
3938
-        if ($res === null) {
3939
-            $res = PHP_VERSION_ID >= 70000 && extension_loaded('sodium');
3938
+        if ( $res === null ) {
3939
+            $res = PHP_VERSION_ID >= 70000 && extension_loaded( 'sodium' );
3940 3940
         }
3941
-        if (self::$disableFallbackForUnitTests) {
3941
+        if ( self::$disableFallbackForUnitTests ) {
3942 3942
             // Don't fallback. Use the PHP implementation.
3943 3943
             return false;
3944 3944
         }
3945
-        return (bool) $res;
3945
+        return (bool)$res;
3946 3946
     }
3947 3947
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Crypto32.php 1 patch
Spacing   +290 added lines, -290 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Crypto32', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Crypto32', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -75,13 +75,13 @@  discard block
 block discarded – undo
75 75
         $key = ''
76 76
     ) {
77 77
         /** @var int $len - Length of message (ciphertext + MAC) */
78
-        $len = ParagonIE_Sodium_Core32_Util::strlen($message);
78
+        $len = ParagonIE_Sodium_Core32_Util::strlen( $message );
79 79
 
80 80
         /** @var int  $clen - Length of ciphertext */
81 81
         $clen = $len - self::aead_chacha20poly1305_ABYTES;
82 82
 
83 83
         /** @var int $adlen - Length of associated data */
84
-        $adlen = ParagonIE_Sodium_Core32_Util::strlen($ad);
84
+        $adlen = ParagonIE_Sodium_Core32_Util::strlen( $ad );
85 85
 
86 86
         /** @var string $mac - Message authentication code */
87 87
         $mac = ParagonIE_Sodium_Core32_Util::substr(
@@ -91,7 +91,7 @@  discard block
 block discarded – undo
91 91
         );
92 92
 
93 93
         /** @var string $ciphertext - The encrypted message (sans MAC) */
94
-        $ciphertext = ParagonIE_Sodium_Core32_Util::substr($message, 0, $clen);
94
+        $ciphertext = ParagonIE_Sodium_Core32_Util::substr( $message, 0, $clen );
95 95
 
96 96
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
97 97
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::stream(
@@ -101,21 +101,21 @@  discard block
 block discarded – undo
101 101
         );
102 102
 
103 103
         /* Recalculate the Poly1305 authentication tag (MAC): */
104
-        $state = new ParagonIE_Sodium_Core32_Poly1305_State($block0);
104
+        $state = new ParagonIE_Sodium_Core32_Poly1305_State( $block0 );
105 105
         try {
106
-            ParagonIE_Sodium_Compat::memzero($block0);
107
-        } catch (SodiumException $ex) {
106
+            ParagonIE_Sodium_Compat::memzero( $block0 );
107
+        } catch ( SodiumException $ex ) {
108 108
             $block0 = null;
109 109
         }
110
-        $state->update($ad);
111
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($adlen));
112
-        $state->update($ciphertext);
113
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($clen));
110
+        $state->update( $ad );
111
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $adlen ) );
112
+        $state->update( $ciphertext );
113
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $clen ) );
114 114
         $computed_mac = $state->finish();
115 115
 
116 116
         /* Compare the given MAC with the recalculated MAC: */
117
-        if (!ParagonIE_Sodium_Core32_Util::verify_16($computed_mac, $mac)) {
118
-            throw new SodiumException('Invalid MAC');
117
+        if ( ! ParagonIE_Sodium_Core32_Util::verify_16( $computed_mac, $mac ) ) {
118
+            throw new SodiumException( 'Invalid MAC' );
119 119
         }
120 120
 
121 121
         // Here, we know that the MAC is valid, so we decrypt and return the plaintext
@@ -123,7 +123,7 @@  discard block
 block discarded – undo
123 123
             $ciphertext,
124 124
             $nonce,
125 125
             $key,
126
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
126
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
127 127
         );
128 128
     }
129 129
 
@@ -147,10 +147,10 @@  discard block
 block discarded – undo
147 147
         $key = ''
148 148
     ) {
149 149
         /** @var int $len - Length of the plaintext message */
150
-        $len = ParagonIE_Sodium_Core32_Util::strlen($message);
150
+        $len = ParagonIE_Sodium_Core32_Util::strlen( $message );
151 151
 
152 152
         /** @var int $adlen - Length of the associated data */
153
-        $adlen = ParagonIE_Sodium_Core32_Util::strlen($ad);
153
+        $adlen = ParagonIE_Sodium_Core32_Util::strlen( $ad );
154 154
 
155 155
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
156 156
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::stream(
@@ -158,10 +158,10 @@  discard block
 block discarded – undo
158 158
             $nonce,
159 159
             $key
160 160
         );
161
-        $state = new ParagonIE_Sodium_Core32_Poly1305_State($block0);
161
+        $state = new ParagonIE_Sodium_Core32_Poly1305_State( $block0 );
162 162
         try {
163
-            ParagonIE_Sodium_Compat::memzero($block0);
164
-        } catch (SodiumException $ex) {
163
+            ParagonIE_Sodium_Compat::memzero( $block0 );
164
+        } catch ( SodiumException $ex ) {
165 165
             $block0 = null;
166 166
         }
167 167
 
@@ -170,13 +170,13 @@  discard block
 block discarded – undo
170 170
             $message,
171 171
             $nonce,
172 172
             $key,
173
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
173
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
174 174
         );
175 175
 
176
-        $state->update($ad);
177
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($adlen));
178
-        $state->update($ciphertext);
179
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($len));
176
+        $state->update( $ad );
177
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $adlen ) );
178
+        $state->update( $ciphertext );
179
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $len ) );
180 180
         return $ciphertext . $state->finish();
181 181
     }
182 182
 
@@ -200,10 +200,10 @@  discard block
 block discarded – undo
200 200
         $key = ''
201 201
     ) {
202 202
         /** @var int $adlen - Length of associated data */
203
-        $adlen = ParagonIE_Sodium_Core32_Util::strlen($ad);
203
+        $adlen = ParagonIE_Sodium_Core32_Util::strlen( $ad );
204 204
 
205 205
         /** @var int $len - Length of message (ciphertext + MAC) */
206
-        $len = ParagonIE_Sodium_Core32_Util::strlen($message);
206
+        $len = ParagonIE_Sodium_Core32_Util::strlen( $message );
207 207
 
208 208
         /** @var int  $clen - Length of ciphertext */
209 209
         $clen = $len - self::aead_chacha20poly1305_IETF_ABYTES;
@@ -230,23 +230,23 @@  discard block
 block discarded – undo
230 230
         );
231 231
 
232 232
         /* Recalculate the Poly1305 authentication tag (MAC): */
233
-        $state = new ParagonIE_Sodium_Core32_Poly1305_State($block0);
233
+        $state = new ParagonIE_Sodium_Core32_Poly1305_State( $block0 );
234 234
         try {
235
-            ParagonIE_Sodium_Compat::memzero($block0);
236
-        } catch (SodiumException $ex) {
235
+            ParagonIE_Sodium_Compat::memzero( $block0 );
236
+        } catch ( SodiumException $ex ) {
237 237
             $block0 = null;
238 238
         }
239
-        $state->update($ad);
240
-        $state->update(str_repeat("\x00", ((0x10 - $adlen) & 0xf)));
241
-        $state->update($ciphertext);
242
-        $state->update(str_repeat("\x00", (0x10 - $clen) & 0xf));
243
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($adlen));
244
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($clen));
239
+        $state->update( $ad );
240
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $adlen ) & 0xf ) ) );
241
+        $state->update( $ciphertext );
242
+        $state->update( str_repeat( "\x00", ( 0x10 - $clen ) & 0xf ) );
243
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $adlen ) );
244
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $clen ) );
245 245
         $computed_mac = $state->finish();
246 246
 
247 247
         /* Compare the given MAC with the recalculated MAC: */
248
-        if (!ParagonIE_Sodium_Core32_Util::verify_16($computed_mac, $mac)) {
249
-            throw new SodiumException('Invalid MAC');
248
+        if ( ! ParagonIE_Sodium_Core32_Util::verify_16( $computed_mac, $mac ) ) {
249
+            throw new SodiumException( 'Invalid MAC' );
250 250
         }
251 251
 
252 252
         // Here, we know that the MAC is valid, so we decrypt and return the plaintext
@@ -254,7 +254,7 @@  discard block
 block discarded – undo
254 254
             $ciphertext,
255 255
             $nonce,
256 256
             $key,
257
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
257
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
258 258
         );
259 259
     }
260 260
 
@@ -278,10 +278,10 @@  discard block
 block discarded – undo
278 278
         $key = ''
279 279
     ) {
280 280
         /** @var int $len - Length of the plaintext message */
281
-        $len = ParagonIE_Sodium_Core32_Util::strlen($message);
281
+        $len = ParagonIE_Sodium_Core32_Util::strlen( $message );
282 282
 
283 283
         /** @var int $adlen - Length of the associated data */
284
-        $adlen = ParagonIE_Sodium_Core32_Util::strlen($ad);
284
+        $adlen = ParagonIE_Sodium_Core32_Util::strlen( $ad );
285 285
 
286 286
         /** @var string The first block of the chacha20 keystream, used as a poly1305 key */
287 287
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::ietfStream(
@@ -289,10 +289,10 @@  discard block
 block discarded – undo
289 289
             $nonce,
290 290
             $key
291 291
         );
292
-        $state = new ParagonIE_Sodium_Core32_Poly1305_State($block0);
292
+        $state = new ParagonIE_Sodium_Core32_Poly1305_State( $block0 );
293 293
         try {
294
-            ParagonIE_Sodium_Compat::memzero($block0);
295
-        } catch (SodiumException $ex) {
294
+            ParagonIE_Sodium_Compat::memzero( $block0 );
295
+        } catch ( SodiumException $ex ) {
296 296
             $block0 = null;
297 297
         }
298 298
 
@@ -301,15 +301,15 @@  discard block
 block discarded – undo
301 301
             $message,
302 302
             $nonce,
303 303
             $key,
304
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
304
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
305 305
         );
306 306
 
307
-        $state->update($ad);
308
-        $state->update(str_repeat("\x00", ((0x10 - $adlen) & 0xf)));
309
-        $state->update($ciphertext);
310
-        $state->update(str_repeat("\x00", ((0x10 - $len) & 0xf)));
311
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($adlen));
312
-        $state->update(ParagonIE_Sodium_Core32_Util::store64_le($len));
307
+        $state->update( $ad );
308
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $adlen ) & 0xf ) ) );
309
+        $state->update( $ciphertext );
310
+        $state->update( str_repeat( "\x00", ( ( 0x10 - $len ) & 0xf ) ) );
311
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $adlen ) );
312
+        $state->update( ParagonIE_Sodium_Core32_Util::store64_le( $len ) );
313 313
         return $ciphertext . $state->finish();
314 314
     }
315 315
 
@@ -333,13 +333,13 @@  discard block
 block discarded – undo
333 333
         $key = ''
334 334
     ) {
335 335
         $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20(
336
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 0, 16),
336
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 0, 16 ),
337 337
             $key
338 338
         );
339 339
         $nonceLast = "\x00\x00\x00\x00" .
340
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8);
340
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 );
341 341
 
342
-        return self::aead_chacha20poly1305_ietf_decrypt($message, $ad, $nonceLast, $subkey);
342
+        return self::aead_chacha20poly1305_ietf_decrypt( $message, $ad, $nonceLast, $subkey );
343 343
     }
344 344
 
345 345
     /**
@@ -362,13 +362,13 @@  discard block
 block discarded – undo
362 362
         $key = ''
363 363
     ) {
364 364
         $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20(
365
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 0, 16),
365
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 0, 16 ),
366 366
             $key
367 367
         );
368 368
         $nonceLast = "\x00\x00\x00\x00" .
369
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8);
369
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 );
370 370
 
371
-        return self::aead_chacha20poly1305_ietf_encrypt($message, $ad, $nonceLast, $subkey);
371
+        return self::aead_chacha20poly1305_ietf_encrypt( $message, $ad, $nonceLast, $subkey );
372 372
     }
373 373
 
374 374
     /**
@@ -381,10 +381,10 @@  discard block
 block discarded – undo
381 381
      * @return string
382 382
      * @throws TypeError
383 383
      */
384
-    public static function auth($message, $key)
384
+    public static function auth( $message, $key )
385 385
     {
386 386
         return ParagonIE_Sodium_Core32_Util::substr(
387
-            hash_hmac('sha512', $message, $key, true),
387
+            hash_hmac( 'sha512', $message, $key, true ),
388 388
             0,
389 389
             32
390 390
         );
@@ -402,11 +402,11 @@  discard block
 block discarded – undo
402 402
      * @throws SodiumException
403 403
      * @throws TypeError
404 404
      */
405
-    public static function auth_verify($mac, $message, $key)
405
+    public static function auth_verify( $mac, $message, $key )
406 406
     {
407 407
         return ParagonIE_Sodium_Core32_Util::hashEquals(
408 408
             $mac,
409
-            self::auth($message, $key)
409
+            self::auth( $message, $key )
410 410
         );
411 411
     }
412 412
 
@@ -422,14 +422,14 @@  discard block
 block discarded – undo
422 422
      * @throws SodiumException
423 423
      * @throws TypeError
424 424
      */
425
-    public static function box($plaintext, $nonce, $keypair)
425
+    public static function box( $plaintext, $nonce, $keypair )
426 426
     {
427 427
         return self::secretbox(
428 428
             $plaintext,
429 429
             $nonce,
430 430
             self::box_beforenm(
431
-                self::box_secretkey($keypair),
432
-                self::box_publickey($keypair)
431
+                self::box_secretkey( $keypair ),
432
+                self::box_publickey( $keypair )
433 433
             )
434 434
         );
435 435
     }
@@ -445,16 +445,16 @@  discard block
 block discarded – undo
445 445
      * @throws SodiumException
446 446
      * @throws TypeError
447 447
      */
448
-    public static function box_seal($message, $publicKey)
448
+    public static function box_seal( $message, $publicKey )
449 449
     {
450 450
         /** @var string $ephemeralKeypair */
451 451
         $ephemeralKeypair = self::box_keypair();
452 452
 
453 453
         /** @var string $ephemeralSK */
454
-        $ephemeralSK = self::box_secretkey($ephemeralKeypair);
454
+        $ephemeralSK = self::box_secretkey( $ephemeralKeypair );
455 455
 
456 456
         /** @var string $ephemeralPK */
457
-        $ephemeralPK = self::box_publickey($ephemeralKeypair);
457
+        $ephemeralPK = self::box_publickey( $ephemeralKeypair );
458 458
 
459 459
         /** @var string $nonce */
460 460
         $nonce = self::generichash(
@@ -464,15 +464,15 @@  discard block
 block discarded – undo
464 464
         );
465 465
 
466 466
         /** @var string $keypair - The combined keypair used in crypto_box() */
467
-        $keypair = self::box_keypair_from_secretkey_and_publickey($ephemeralSK, $publicKey);
467
+        $keypair = self::box_keypair_from_secretkey_and_publickey( $ephemeralSK, $publicKey );
468 468
 
469 469
         /** @var string $ciphertext Ciphertext + MAC from crypto_box */
470
-        $ciphertext = self::box($message, $nonce, $keypair);
470
+        $ciphertext = self::box( $message, $nonce, $keypair );
471 471
         try {
472
-            ParagonIE_Sodium_Compat::memzero($ephemeralKeypair);
473
-            ParagonIE_Sodium_Compat::memzero($ephemeralSK);
474
-            ParagonIE_Sodium_Compat::memzero($nonce);
475
-        } catch (SodiumException $ex) {
472
+            ParagonIE_Sodium_Compat::memzero( $ephemeralKeypair );
473
+            ParagonIE_Sodium_Compat::memzero( $ephemeralSK );
474
+            ParagonIE_Sodium_Compat::memzero( $nonce );
475
+        } catch ( SodiumException $ex ) {
476 476
             $ephemeralKeypair = null;
477 477
             $ephemeralSK = null;
478 478
             $nonce = null;
@@ -491,19 +491,19 @@  discard block
 block discarded – undo
491 491
      * @throws SodiumException
492 492
      * @throws TypeError
493 493
      */
494
-    public static function box_seal_open($message, $keypair)
494
+    public static function box_seal_open( $message, $keypair )
495 495
     {
496 496
         /** @var string $ephemeralPK */
497
-        $ephemeralPK = ParagonIE_Sodium_Core32_Util::substr($message, 0, 32);
497
+        $ephemeralPK = ParagonIE_Sodium_Core32_Util::substr( $message, 0, 32 );
498 498
 
499 499
         /** @var string $ciphertext (ciphertext + MAC) */
500
-        $ciphertext = ParagonIE_Sodium_Core32_Util::substr($message, 32);
500
+        $ciphertext = ParagonIE_Sodium_Core32_Util::substr( $message, 32 );
501 501
 
502 502
         /** @var string $secretKey */
503
-        $secretKey = self::box_secretkey($keypair);
503
+        $secretKey = self::box_secretkey( $keypair );
504 504
 
505 505
         /** @var string $publicKey */
506
-        $publicKey = self::box_publickey($keypair);
506
+        $publicKey = self::box_publickey( $keypair );
507 507
 
508 508
         /** @var string $nonce */
509 509
         $nonce = self::generichash(
@@ -513,15 +513,15 @@  discard block
 block discarded – undo
513 513
         );
514 514
 
515 515
         /** @var string $keypair */
516
-        $keypair = self::box_keypair_from_secretkey_and_publickey($secretKey, $ephemeralPK);
516
+        $keypair = self::box_keypair_from_secretkey_and_publickey( $secretKey, $ephemeralPK );
517 517
 
518 518
         /** @var string $m */
519
-        $m = self::box_open($ciphertext, $nonce, $keypair);
519
+        $m = self::box_open( $ciphertext, $nonce, $keypair );
520 520
         try {
521
-            ParagonIE_Sodium_Compat::memzero($secretKey);
522
-            ParagonIE_Sodium_Compat::memzero($ephemeralPK);
523
-            ParagonIE_Sodium_Compat::memzero($nonce);
524
-        } catch (SodiumException $ex) {
521
+            ParagonIE_Sodium_Compat::memzero( $secretKey );
522
+            ParagonIE_Sodium_Compat::memzero( $ephemeralPK );
523
+            ParagonIE_Sodium_Compat::memzero( $nonce );
524
+        } catch ( SodiumException $ex ) {
525 525
             $secretKey = null;
526 526
             $ephemeralPK = null;
527 527
             $nonce = null;
@@ -540,11 +540,11 @@  discard block
 block discarded – undo
540 540
      * @throws SodiumException
541 541
      * @throws TypeError
542 542
      */
543
-    public static function box_beforenm($sk, $pk)
543
+    public static function box_beforenm( $sk, $pk )
544 544
     {
545 545
         return ParagonIE_Sodium_Core32_HSalsa20::hsalsa20(
546
-            str_repeat("\x00", 16),
547
-            self::scalarmult($sk, $pk)
546
+            str_repeat( "\x00", 16 ),
547
+            self::scalarmult( $sk, $pk )
548 548
         );
549 549
     }
550 550
 
@@ -558,8 +558,8 @@  discard block
 block discarded – undo
558 558
      */
559 559
     public static function box_keypair()
560 560
     {
561
-        $sKey = random_bytes(32);
562
-        $pKey = self::scalarmult_base($sKey);
561
+        $sKey = random_bytes( 32 );
562
+        $pKey = self::scalarmult_base( $sKey );
563 563
         return $sKey . $pKey;
564 564
     }
565 565
 
@@ -569,14 +569,14 @@  discard block
 block discarded – undo
569 569
      * @throws SodiumException
570 570
      * @throws TypeError
571 571
      */
572
-    public static function box_seed_keypair($seed)
572
+    public static function box_seed_keypair( $seed )
573 573
     {
574 574
         $sKey = ParagonIE_Sodium_Core32_Util::substr(
575
-            hash('sha512', $seed, true),
575
+            hash( 'sha512', $seed, true ),
576 576
             0,
577 577
             32
578 578
         );
579
-        $pKey = self::scalarmult_base($sKey);
579
+        $pKey = self::scalarmult_base( $sKey );
580 580
         return $sKey . $pKey;
581 581
     }
582 582
 
@@ -588,10 +588,10 @@  discard block
 block discarded – undo
588 588
      * @return string
589 589
      * @throws TypeError
590 590
      */
591
-    public static function box_keypair_from_secretkey_and_publickey($sKey, $pKey)
591
+    public static function box_keypair_from_secretkey_and_publickey( $sKey, $pKey )
592 592
     {
593
-        return ParagonIE_Sodium_Core32_Util::substr($sKey, 0, 32) .
594
-            ParagonIE_Sodium_Core32_Util::substr($pKey, 0, 32);
593
+        return ParagonIE_Sodium_Core32_Util::substr( $sKey, 0, 32 ) .
594
+            ParagonIE_Sodium_Core32_Util::substr( $pKey, 0, 32 );
595 595
     }
596 596
 
597 597
     /**
@@ -602,14 +602,14 @@  discard block
 block discarded – undo
602 602
      * @throws RangeException
603 603
      * @throws TypeError
604 604
      */
605
-    public static function box_secretkey($keypair)
605
+    public static function box_secretkey( $keypair )
606 606
     {
607
-        if (ParagonIE_Sodium_Core32_Util::strlen($keypair) !== 64) {
607
+        if ( ParagonIE_Sodium_Core32_Util::strlen( $keypair ) !== 64 ) {
608 608
             throw new RangeException(
609 609
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES bytes long.'
610 610
             );
611 611
         }
612
-        return ParagonIE_Sodium_Core32_Util::substr($keypair, 0, 32);
612
+        return ParagonIE_Sodium_Core32_Util::substr( $keypair, 0, 32 );
613 613
     }
614 614
 
615 615
     /**
@@ -620,14 +620,14 @@  discard block
 block discarded – undo
620 620
      * @throws RangeException
621 621
      * @throws TypeError
622 622
      */
623
-    public static function box_publickey($keypair)
623
+    public static function box_publickey( $keypair )
624 624
     {
625
-        if (ParagonIE_Sodium_Core32_Util::strlen($keypair) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES) {
625
+        if ( ParagonIE_Sodium_Core32_Util::strlen( $keypair ) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES ) {
626 626
             throw new RangeException(
627 627
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_KEYPAIRBYTES bytes long.'
628 628
             );
629 629
         }
630
-        return ParagonIE_Sodium_Core32_Util::substr($keypair, 32, 32);
630
+        return ParagonIE_Sodium_Core32_Util::substr( $keypair, 32, 32 );
631 631
     }
632 632
 
633 633
     /**
@@ -639,14 +639,14 @@  discard block
 block discarded – undo
639 639
      * @throws SodiumException
640 640
      * @throws TypeError
641 641
      */
642
-    public static function box_publickey_from_secretkey($sKey)
642
+    public static function box_publickey_from_secretkey( $sKey )
643 643
     {
644
-        if (ParagonIE_Sodium_Core32_Util::strlen($sKey) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES) {
644
+        if ( ParagonIE_Sodium_Core32_Util::strlen( $sKey ) !== ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES ) {
645 645
             throw new RangeException(
646 646
                 'Must be ParagonIE_Sodium_Compat::CRYPTO_BOX_SECRETKEYBYTES bytes long.'
647 647
             );
648 648
         }
649
-        return self::scalarmult_base($sKey);
649
+        return self::scalarmult_base( $sKey );
650 650
     }
651 651
 
652 652
     /**
@@ -661,14 +661,14 @@  discard block
 block discarded – undo
661 661
      * @throws SodiumException
662 662
      * @throws TypeError
663 663
      */
664
-    public static function box_open($ciphertext, $nonce, $keypair)
664
+    public static function box_open( $ciphertext, $nonce, $keypair )
665 665
     {
666 666
         return self::secretbox_open(
667 667
             $ciphertext,
668 668
             $nonce,
669 669
             self::box_beforenm(
670
-                self::box_secretkey($keypair),
671
-                self::box_publickey($keypair)
670
+                self::box_secretkey( $keypair ),
671
+                self::box_publickey( $keypair )
672 672
             )
673 673
         );
674 674
     }
@@ -686,34 +686,34 @@  discard block
 block discarded – undo
686 686
      * @throws SodiumException
687 687
      * @throws TypeError
688 688
      */
689
-    public static function generichash($message, $key = '', $outlen = 32)
689
+    public static function generichash( $message, $key = '', $outlen = 32 )
690 690
     {
691 691
         // This ensures that ParagonIE_Sodium_Core32_BLAKE2b::$iv is initialized
692 692
         ParagonIE_Sodium_Core32_BLAKE2b::pseudoConstructor();
693 693
 
694 694
         $k = null;
695
-        if (!empty($key)) {
695
+        if ( ! empty( $key ) ) {
696 696
             /** @var SplFixedArray $k */
697
-            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($key);
698
-            if ($k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES) {
699
-                throw new RangeException('Invalid key size');
697
+            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $key );
698
+            if ( $k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES ) {
699
+                throw new RangeException( 'Invalid key size' );
700 700
             }
701 701
         }
702 702
 
703 703
         /** @var SplFixedArray $in */
704
-        $in = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($message);
704
+        $in = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $message );
705 705
 
706 706
         /** @var SplFixedArray $ctx */
707
-        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init($k, $outlen);
708
-        ParagonIE_Sodium_Core32_BLAKE2b::update($ctx, $in, $in->count());
707
+        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init( $k, $outlen );
708
+        ParagonIE_Sodium_Core32_BLAKE2b::update( $ctx, $in, $in->count() );
709 709
 
710 710
         /** @var SplFixedArray $out */
711
-        $out = new SplFixedArray($outlen);
712
-        $out = ParagonIE_Sodium_Core32_BLAKE2b::finish($ctx, $out);
711
+        $out = new SplFixedArray( $outlen );
712
+        $out = ParagonIE_Sodium_Core32_BLAKE2b::finish( $ctx, $out );
713 713
 
714 714
         /** @var array<int, int> */
715 715
         $outArray = $out->toArray();
716
-        return ParagonIE_Sodium_Core32_Util::intArrayToString($outArray);
716
+        return ParagonIE_Sodium_Core32_Util::intArrayToString( $outArray );
717 717
     }
718 718
 
719 719
     /**
@@ -727,22 +727,22 @@  discard block
 block discarded – undo
727 727
      * @throws SodiumException
728 728
      * @throws TypeError
729 729
      */
730
-    public static function generichash_final($ctx, $outlen = 32)
730
+    public static function generichash_final( $ctx, $outlen = 32 )
731 731
     {
732
-        if (!is_string($ctx)) {
733
-            throw new TypeError('Context must be a string');
732
+        if ( ! is_string( $ctx ) ) {
733
+            throw new TypeError( 'Context must be a string' );
734 734
         }
735
-        $out = new SplFixedArray($outlen);
735
+        $out = new SplFixedArray( $outlen );
736 736
 
737 737
         /** @var SplFixedArray $context */
738
-        $context = ParagonIE_Sodium_Core32_BLAKE2b::stringToContext($ctx);
738
+        $context = ParagonIE_Sodium_Core32_BLAKE2b::stringToContext( $ctx );
739 739
 
740 740
         /** @var SplFixedArray $out */
741
-        $out = ParagonIE_Sodium_Core32_BLAKE2b::finish($context, $out);
741
+        $out = ParagonIE_Sodium_Core32_BLAKE2b::finish( $context, $out );
742 742
 
743 743
         /** @var array<int, int> */
744 744
         $outArray = $out->toArray();
745
-        return ParagonIE_Sodium_Core32_Util::intArrayToString($outArray);
745
+        return ParagonIE_Sodium_Core32_Util::intArrayToString( $outArray );
746 746
     }
747 747
 
748 748
     /**
@@ -757,23 +757,23 @@  discard block
 block discarded – undo
757 757
      * @throws SodiumException
758 758
      * @throws TypeError
759 759
      */
760
-    public static function generichash_init($key = '', $outputLength = 32)
760
+    public static function generichash_init( $key = '', $outputLength = 32 )
761 761
     {
762 762
         // This ensures that ParagonIE_Sodium_Core32_BLAKE2b::$iv is initialized
763 763
         ParagonIE_Sodium_Core32_BLAKE2b::pseudoConstructor();
764 764
 
765 765
         $k = null;
766
-        if (!empty($key)) {
767
-            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($key);
768
-            if ($k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES) {
769
-                throw new RangeException('Invalid key size');
766
+        if ( ! empty( $key ) ) {
767
+            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $key );
768
+            if ( $k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES ) {
769
+                throw new RangeException( 'Invalid key size' );
770 770
             }
771 771
         }
772 772
 
773 773
         /** @var SplFixedArray $ctx */
774
-        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init($k, $outputLength);
774
+        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init( $k, $outputLength );
775 775
 
776
-        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString($ctx);
776
+        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString( $ctx );
777 777
     }
778 778
 
779 779
     /**
@@ -800,27 +800,27 @@  discard block
 block discarded – undo
800 800
         ParagonIE_Sodium_Core32_BLAKE2b::pseudoConstructor();
801 801
 
802 802
         $k = null;
803
-        if (!empty($key)) {
804
-            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($key);
805
-            if ($k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES) {
806
-                throw new RangeException('Invalid key size');
803
+        if ( ! empty( $key ) ) {
804
+            $k = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $key );
805
+            if ( $k->count() > ParagonIE_Sodium_Core32_BLAKE2b::KEYBYTES ) {
806
+                throw new RangeException( 'Invalid key size' );
807 807
             }
808 808
         }
809
-        if (!empty($salt)) {
810
-            $s = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($salt);
809
+        if ( ! empty( $salt ) ) {
810
+            $s = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $salt );
811 811
         } else {
812 812
             $s = null;
813 813
         }
814
-        if (!empty($salt)) {
815
-            $p = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($personal);
814
+        if ( ! empty( $salt ) ) {
815
+            $p = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $personal );
816 816
         } else {
817 817
             $p = null;
818 818
         }
819 819
 
820 820
         /** @var SplFixedArray $ctx */
821
-        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init($k, $outputLength, $s, $p);
821
+        $ctx = ParagonIE_Sodium_Core32_BLAKE2b::init( $k, $outputLength, $s, $p );
822 822
 
823
-        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString($ctx);
823
+        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString( $ctx );
824 824
     }
825 825
 
826 826
     /**
@@ -834,20 +834,20 @@  discard block
 block discarded – undo
834 834
      * @throws SodiumException
835 835
      * @throws TypeError
836 836
      */
837
-    public static function generichash_update($ctx, $message)
837
+    public static function generichash_update( $ctx, $message )
838 838
     {
839 839
         // This ensures that ParagonIE_Sodium_Core32_BLAKE2b::$iv is initialized
840 840
         ParagonIE_Sodium_Core32_BLAKE2b::pseudoConstructor();
841 841
 
842 842
         /** @var SplFixedArray $context */
843
-        $context = ParagonIE_Sodium_Core32_BLAKE2b::stringToContext($ctx);
843
+        $context = ParagonIE_Sodium_Core32_BLAKE2b::stringToContext( $ctx );
844 844
 
845 845
         /** @var SplFixedArray $in */
846
-        $in = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray($message);
846
+        $in = ParagonIE_Sodium_Core32_BLAKE2b::stringToSplFixedArray( $message );
847 847
 
848
-        ParagonIE_Sodium_Core32_BLAKE2b::update($context, $in, $in->count());
848
+        ParagonIE_Sodium_Core32_BLAKE2b::update( $context, $in, $in->count() );
849 849
 
850
-        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString($context);
850
+        return ParagonIE_Sodium_Core32_BLAKE2b::contextToString( $context );
851 851
     }
852 852
 
853 853
     /**
@@ -863,10 +863,10 @@  discard block
 block discarded – undo
863 863
      * @throws SodiumException
864 864
      * @throws TypeError
865 865
      */
866
-    public static function keyExchange($my_sk, $their_pk, $client_pk, $server_pk)
866
+    public static function keyExchange( $my_sk, $their_pk, $client_pk, $server_pk )
867 867
     {
868 868
         return self::generichash(
869
-            self::scalarmult($my_sk, $their_pk) .
869
+            self::scalarmult( $my_sk, $their_pk ) .
870 870
             $client_pk .
871 871
             $server_pk
872 872
         );
@@ -884,10 +884,10 @@  discard block
 block discarded – undo
884 884
      * @throws SodiumException
885 885
      * @throws TypeError
886 886
      */
887
-    public static function scalarmult($sKey, $pKey)
887
+    public static function scalarmult( $sKey, $pKey )
888 888
     {
889
-        $q = ParagonIE_Sodium_Core32_X25519::crypto_scalarmult_curve25519_ref10($sKey, $pKey);
890
-        self::scalarmult_throw_if_zero($q);
889
+        $q = ParagonIE_Sodium_Core32_X25519::crypto_scalarmult_curve25519_ref10( $sKey, $pKey );
890
+        self::scalarmult_throw_if_zero( $q );
891 891
         return $q;
892 892
     }
893 893
 
@@ -901,10 +901,10 @@  discard block
 block discarded – undo
901 901
      * @throws SodiumException
902 902
      * @throws TypeError
903 903
      */
904
-    public static function scalarmult_base($secret)
904
+    public static function scalarmult_base( $secret )
905 905
     {
906
-        $q = ParagonIE_Sodium_Core32_X25519::crypto_scalarmult_curve25519_ref10_base($secret);
907
-        self::scalarmult_throw_if_zero($q);
906
+        $q = ParagonIE_Sodium_Core32_X25519::crypto_scalarmult_curve25519_ref10_base( $secret );
907
+        self::scalarmult_throw_if_zero( $q );
908 908
         return $q;
909 909
     }
910 910
 
@@ -916,16 +916,16 @@  discard block
 block discarded – undo
916 916
      * @throws SodiumException
917 917
      * @throws TypeError
918 918
      */
919
-    protected static function scalarmult_throw_if_zero($q)
919
+    protected static function scalarmult_throw_if_zero( $q )
920 920
     {
921 921
         $d = 0;
922
-        for ($i = 0; $i < self::box_curve25519xsalsa20poly1305_SECRETKEYBYTES; ++$i) {
923
-            $d |= ParagonIE_Sodium_Core32_Util::chrToInt($q[$i]);
922
+        for ( $i = 0; $i < self::box_curve25519xsalsa20poly1305_SECRETKEYBYTES; ++$i ) {
923
+            $d |= ParagonIE_Sodium_Core32_Util::chrToInt( $q[ $i ] );
924 924
         }
925 925
 
926 926
         /* branch-free variant of === 0 */
927
-        if (-(1 & (($d - 1) >> 8))) {
928
-            throw new SodiumException('Zero public key is not allowed');
927
+        if (-( 1 & ( ( $d - 1 ) >> 8 ) )) {
928
+            throw new SodiumException( 'Zero public key is not allowed' );
929 929
         }
930 930
     }
931 931
 
@@ -941,26 +941,26 @@  discard block
 block discarded – undo
941 941
      * @throws SodiumException
942 942
      * @throws TypeError
943 943
      */
944
-    public static function secretbox($plaintext, $nonce, $key)
944
+    public static function secretbox( $plaintext, $nonce, $key )
945 945
     {
946 946
         /** @var string $subkey */
947
-        $subkey = ParagonIE_Sodium_Core32_HSalsa20::hsalsa20($nonce, $key);
947
+        $subkey = ParagonIE_Sodium_Core32_HSalsa20::hsalsa20( $nonce, $key );
948 948
 
949 949
         /** @var string $block0 */
950
-        $block0 = str_repeat("\x00", 32);
950
+        $block0 = str_repeat( "\x00", 32 );
951 951
 
952 952
         /** @var int $mlen - Length of the plaintext message */
953
-        $mlen = ParagonIE_Sodium_Core32_Util::strlen($plaintext);
953
+        $mlen = ParagonIE_Sodium_Core32_Util::strlen( $plaintext );
954 954
         $mlen0 = $mlen;
955
-        if ($mlen0 > 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES) {
955
+        if ( $mlen0 > 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES ) {
956 956
             $mlen0 = 64 - self::secretbox_xsalsa20poly1305_ZEROBYTES;
957 957
         }
958
-        $block0 .= ParagonIE_Sodium_Core32_Util::substr($plaintext, 0, $mlen0);
958
+        $block0 .= ParagonIE_Sodium_Core32_Util::substr( $plaintext, 0, $mlen0 );
959 959
 
960 960
         /** @var string $block0 */
961 961
         $block0 = ParagonIE_Sodium_Core32_Salsa20::salsa20_xor(
962 962
             $block0,
963
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
963
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
964 964
             $subkey
965 965
         );
966 966
 
@@ -969,13 +969,13 @@  discard block
 block discarded – undo
969 969
             $block0,
970 970
             self::secretbox_xsalsa20poly1305_ZEROBYTES
971 971
         );
972
-        if ($mlen > $mlen0) {
972
+        if ( $mlen > $mlen0 ) {
973 973
             $c .= ParagonIE_Sodium_Core32_Salsa20::salsa20_xor_ic(
974 974
                 ParagonIE_Sodium_Core32_Util::substr(
975 975
                     $plaintext,
976 976
                     self::secretbox_xsalsa20poly1305_ZEROBYTES
977 977
                 ),
978
-                ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
978
+                ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
979 979
                 1,
980 980
                 $subkey
981 981
             );
@@ -988,18 +988,18 @@  discard block
 block discarded – undo
988 988
             )
989 989
         );
990 990
         try {
991
-            ParagonIE_Sodium_Compat::memzero($block0);
992
-            ParagonIE_Sodium_Compat::memzero($subkey);
993
-        } catch (SodiumException $ex) {
991
+            ParagonIE_Sodium_Compat::memzero( $block0 );
992
+            ParagonIE_Sodium_Compat::memzero( $subkey );
993
+        } catch ( SodiumException $ex ) {
994 994
             $block0 = null;
995 995
             $subkey = null;
996 996
         }
997 997
 
998
-        $state->update($c);
998
+        $state->update( $c );
999 999
 
1000 1000
         /** @var string $c - MAC || ciphertext */
1001 1001
         $c = $state->finish() . $c;
1002
-        unset($state);
1002
+        unset( $state );
1003 1003
 
1004 1004
         return $c;
1005 1005
     }
@@ -1016,7 +1016,7 @@  discard block
 block discarded – undo
1016 1016
      * @throws SodiumException
1017 1017
      * @throws TypeError
1018 1018
      */
1019
-    public static function secretbox_open($ciphertext, $nonce, $key)
1019
+    public static function secretbox_open( $ciphertext, $nonce, $key )
1020 1020
     {
1021 1021
         /** @var string $mac */
1022 1022
         $mac = ParagonIE_Sodium_Core32_Util::substr(
@@ -1032,46 +1032,46 @@  discard block
 block discarded – undo
1032 1032
         );
1033 1033
 
1034 1034
         /** @var int $clen */
1035
-        $clen = ParagonIE_Sodium_Core32_Util::strlen($c);
1035
+        $clen = ParagonIE_Sodium_Core32_Util::strlen( $c );
1036 1036
 
1037 1037
         /** @var string $subkey */
1038
-        $subkey = ParagonIE_Sodium_Core32_HSalsa20::hsalsa20($nonce, $key);
1038
+        $subkey = ParagonIE_Sodium_Core32_HSalsa20::hsalsa20( $nonce, $key );
1039 1039
 
1040 1040
         /** @var string $block0 */
1041 1041
         $block0 = ParagonIE_Sodium_Core32_Salsa20::salsa20(
1042 1042
             64,
1043
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
1043
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
1044 1044
             $subkey
1045 1045
         );
1046 1046
         $verified = ParagonIE_Sodium_Core32_Poly1305::onetimeauth_verify(
1047 1047
             $mac,
1048 1048
             $c,
1049
-            ParagonIE_Sodium_Core32_Util::substr($block0, 0, 32)
1049
+            ParagonIE_Sodium_Core32_Util::substr( $block0, 0, 32 )
1050 1050
         );
1051
-        if (!$verified) {
1051
+        if ( ! $verified ) {
1052 1052
             try {
1053
-                ParagonIE_Sodium_Compat::memzero($subkey);
1054
-            } catch (SodiumException $ex) {
1053
+                ParagonIE_Sodium_Compat::memzero( $subkey );
1054
+            } catch ( SodiumException $ex ) {
1055 1055
                 $subkey = null;
1056 1056
             }
1057
-            throw new SodiumException('Invalid MAC');
1057
+            throw new SodiumException( 'Invalid MAC' );
1058 1058
         }
1059 1059
 
1060 1060
         /** @var string $m - Decrypted message */
1061 1061
         $m = ParagonIE_Sodium_Core32_Util::xorStrings(
1062
-            ParagonIE_Sodium_Core32_Util::substr($block0, self::secretbox_xsalsa20poly1305_ZEROBYTES),
1063
-            ParagonIE_Sodium_Core32_Util::substr($c, 0, self::secretbox_xsalsa20poly1305_ZEROBYTES)
1062
+            ParagonIE_Sodium_Core32_Util::substr( $block0, self::secretbox_xsalsa20poly1305_ZEROBYTES ),
1063
+            ParagonIE_Sodium_Core32_Util::substr( $c, 0, self::secretbox_xsalsa20poly1305_ZEROBYTES )
1064 1064
         );
1065
-        if ($clen > self::secretbox_xsalsa20poly1305_ZEROBYTES) {
1065
+        if ( $clen > self::secretbox_xsalsa20poly1305_ZEROBYTES ) {
1066 1066
             // We had more than 1 block, so let's continue to decrypt the rest.
1067 1067
             $m .= ParagonIE_Sodium_Core32_Salsa20::salsa20_xor_ic(
1068 1068
                 ParagonIE_Sodium_Core32_Util::substr(
1069 1069
                     $c,
1070 1070
                     self::secretbox_xsalsa20poly1305_ZEROBYTES
1071 1071
                 ),
1072
-                ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
1072
+                ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
1073 1073
                 1,
1074
-                (string) $subkey
1074
+                (string)$subkey
1075 1075
             );
1076 1076
         }
1077 1077
         return $m;
@@ -1089,25 +1089,25 @@  discard block
 block discarded – undo
1089 1089
      * @throws SodiumException
1090 1090
      * @throws TypeError
1091 1091
      */
1092
-    public static function secretbox_xchacha20poly1305($plaintext, $nonce, $key)
1092
+    public static function secretbox_xchacha20poly1305( $plaintext, $nonce, $key )
1093 1093
     {
1094 1094
         /** @var string $subkey */
1095 1095
         $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20(
1096
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 0, 16),
1096
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 0, 16 ),
1097 1097
             $key
1098 1098
         );
1099
-        $nonceLast = ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8);
1099
+        $nonceLast = ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 );
1100 1100
 
1101 1101
         /** @var string $block0 */
1102
-        $block0 = str_repeat("\x00", 32);
1102
+        $block0 = str_repeat( "\x00", 32 );
1103 1103
 
1104 1104
         /** @var int $mlen - Length of the plaintext message */
1105
-        $mlen = ParagonIE_Sodium_Core32_Util::strlen($plaintext);
1105
+        $mlen = ParagonIE_Sodium_Core32_Util::strlen( $plaintext );
1106 1106
         $mlen0 = $mlen;
1107
-        if ($mlen0 > 64 - self::secretbox_xchacha20poly1305_ZEROBYTES) {
1107
+        if ( $mlen0 > 64 - self::secretbox_xchacha20poly1305_ZEROBYTES ) {
1108 1108
             $mlen0 = 64 - self::secretbox_xchacha20poly1305_ZEROBYTES;
1109 1109
         }
1110
-        $block0 .= ParagonIE_Sodium_Core32_Util::substr($plaintext, 0, $mlen0);
1110
+        $block0 .= ParagonIE_Sodium_Core32_Util::substr( $plaintext, 0, $mlen0 );
1111 1111
 
1112 1112
         /** @var string $block0 */
1113 1113
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::streamXorIc(
@@ -1121,7 +1121,7 @@  discard block
 block discarded – undo
1121 1121
             $block0,
1122 1122
             self::secretbox_xchacha20poly1305_ZEROBYTES
1123 1123
         );
1124
-        if ($mlen > $mlen0) {
1124
+        if ( $mlen > $mlen0 ) {
1125 1125
             $c .= ParagonIE_Sodium_Core32_ChaCha20::streamXorIc(
1126 1126
                 ParagonIE_Sodium_Core32_Util::substr(
1127 1127
                     $plaintext,
@@ -1129,7 +1129,7 @@  discard block
 block discarded – undo
1129 1129
                 ),
1130 1130
                 $nonceLast,
1131 1131
                 $subkey,
1132
-                ParagonIE_Sodium_Core32_Util::store64_le(1)
1132
+                ParagonIE_Sodium_Core32_Util::store64_le( 1 )
1133 1133
             );
1134 1134
         }
1135 1135
         $state = new ParagonIE_Sodium_Core32_Poly1305_State(
@@ -1140,18 +1140,18 @@  discard block
 block discarded – undo
1140 1140
             )
1141 1141
         );
1142 1142
         try {
1143
-            ParagonIE_Sodium_Compat::memzero($block0);
1144
-            ParagonIE_Sodium_Compat::memzero($subkey);
1145
-        } catch (SodiumException $ex) {
1143
+            ParagonIE_Sodium_Compat::memzero( $block0 );
1144
+            ParagonIE_Sodium_Compat::memzero( $subkey );
1145
+        } catch ( SodiumException $ex ) {
1146 1146
             $block0 = null;
1147 1147
             $subkey = null;
1148 1148
         }
1149 1149
 
1150
-        $state->update($c);
1150
+        $state->update( $c );
1151 1151
 
1152 1152
         /** @var string $c - MAC || ciphertext */
1153 1153
         $c = $state->finish() . $c;
1154
-        unset($state);
1154
+        unset( $state );
1155 1155
 
1156 1156
         return $c;
1157 1157
     }
@@ -1168,7 +1168,7 @@  discard block
 block discarded – undo
1168 1168
      * @throws SodiumException
1169 1169
      * @throws TypeError
1170 1170
      */
1171
-    public static function secretbox_xchacha20poly1305_open($ciphertext, $nonce, $key)
1171
+    public static function secretbox_xchacha20poly1305_open( $ciphertext, $nonce, $key )
1172 1172
     {
1173 1173
         /** @var string $mac */
1174 1174
         $mac = ParagonIE_Sodium_Core32_Util::substr(
@@ -1184,48 +1184,48 @@  discard block
 block discarded – undo
1184 1184
         );
1185 1185
 
1186 1186
         /** @var int $clen */
1187
-        $clen = ParagonIE_Sodium_Core32_Util::strlen($c);
1187
+        $clen = ParagonIE_Sodium_Core32_Util::strlen( $c );
1188 1188
 
1189 1189
         /** @var string $subkey */
1190
-        $subkey = ParagonIE_Sodium_Core32_HChaCha20::hchacha20($nonce, $key);
1190
+        $subkey = ParagonIE_Sodium_Core32_HChaCha20::hchacha20( $nonce, $key );
1191 1191
 
1192 1192
         /** @var string $block0 */
1193 1193
         $block0 = ParagonIE_Sodium_Core32_ChaCha20::stream(
1194 1194
             64,
1195
-            ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
1195
+            ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
1196 1196
             $subkey
1197 1197
         );
1198 1198
         $verified = ParagonIE_Sodium_Core32_Poly1305::onetimeauth_verify(
1199 1199
             $mac,
1200 1200
             $c,
1201
-            ParagonIE_Sodium_Core32_Util::substr($block0, 0, 32)
1201
+            ParagonIE_Sodium_Core32_Util::substr( $block0, 0, 32 )
1202 1202
         );
1203 1203
 
1204
-        if (!$verified) {
1204
+        if ( ! $verified ) {
1205 1205
             try {
1206
-                ParagonIE_Sodium_Compat::memzero($subkey);
1207
-            } catch (SodiumException $ex) {
1206
+                ParagonIE_Sodium_Compat::memzero( $subkey );
1207
+            } catch ( SodiumException $ex ) {
1208 1208
                 $subkey = null;
1209 1209
             }
1210
-            throw new SodiumException('Invalid MAC');
1210
+            throw new SodiumException( 'Invalid MAC' );
1211 1211
         }
1212 1212
 
1213 1213
         /** @var string $m - Decrypted message */
1214 1214
         $m = ParagonIE_Sodium_Core32_Util::xorStrings(
1215
-            ParagonIE_Sodium_Core32_Util::substr($block0, self::secretbox_xchacha20poly1305_ZEROBYTES),
1216
-            ParagonIE_Sodium_Core32_Util::substr($c, 0, self::secretbox_xchacha20poly1305_ZEROBYTES)
1215
+            ParagonIE_Sodium_Core32_Util::substr( $block0, self::secretbox_xchacha20poly1305_ZEROBYTES ),
1216
+            ParagonIE_Sodium_Core32_Util::substr( $c, 0, self::secretbox_xchacha20poly1305_ZEROBYTES )
1217 1217
         );
1218 1218
 
1219
-        if ($clen > self::secretbox_xchacha20poly1305_ZEROBYTES) {
1219
+        if ( $clen > self::secretbox_xchacha20poly1305_ZEROBYTES ) {
1220 1220
             // We had more than 1 block, so let's continue to decrypt the rest.
1221 1221
             $m .= ParagonIE_Sodium_Core32_ChaCha20::streamXorIc(
1222 1222
                 ParagonIE_Sodium_Core32_Util::substr(
1223 1223
                     $c,
1224 1224
                     self::secretbox_xchacha20poly1305_ZEROBYTES
1225 1225
                 ),
1226
-                ParagonIE_Sodium_Core32_Util::substr($nonce, 16, 8),
1227
-                (string) $subkey,
1228
-                ParagonIE_Sodium_Core32_Util::store64_le(1)
1226
+                ParagonIE_Sodium_Core32_Util::substr( $nonce, 16, 8 ),
1227
+                (string)$subkey,
1228
+                ParagonIE_Sodium_Core32_Util::store64_le( 1 )
1229 1229
             );
1230 1230
         }
1231 1231
         return $m;
@@ -1237,16 +1237,16 @@  discard block
 block discarded – undo
1237 1237
      * @throws Exception
1238 1238
      * @throws SodiumException
1239 1239
      */
1240
-    public static function secretstream_xchacha20poly1305_init_push($key)
1240
+    public static function secretstream_xchacha20poly1305_init_push( $key )
1241 1241
     {
1242 1242
         # randombytes_buf(out, crypto_secretstream_xchacha20poly1305_HEADERBYTES);
1243
-        $out = random_bytes(24);
1243
+        $out = random_bytes( 24 );
1244 1244
 
1245 1245
         # crypto_core_hchacha20(state->k, out, k, NULL);
1246
-        $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20($out, $key);
1246
+        $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20( $out, $key );
1247 1247
         $state = new ParagonIE_Sodium_Core32_SecretStream_State(
1248 1248
             $subkey,
1249
-            ParagonIE_Sodium_Core32_Util::substr($out, 16, 8) . str_repeat("\0", 4)
1249
+            ParagonIE_Sodium_Core32_Util::substr( $out, 16, 8 ) . str_repeat( "\0", 4 )
1250 1250
         );
1251 1251
 
1252 1252
         # _crypto_secretstream_xchacha20poly1305_counter_reset(state);
@@ -1267,16 +1267,16 @@  discard block
 block discarded – undo
1267 1267
      * @return string Returns a state.
1268 1268
      * @throws Exception
1269 1269
      */
1270
-    public static function secretstream_xchacha20poly1305_init_pull($key, $header)
1270
+    public static function secretstream_xchacha20poly1305_init_pull( $key, $header )
1271 1271
     {
1272 1272
         # crypto_core_hchacha20(state->k, in, k, NULL);
1273 1273
         $subkey = ParagonIE_Sodium_Core32_HChaCha20::hChaCha20(
1274
-            ParagonIE_Sodium_Core32_Util::substr($header, 0, 16),
1274
+            ParagonIE_Sodium_Core32_Util::substr( $header, 0, 16 ),
1275 1275
             $key
1276 1276
         );
1277 1277
         $state = new ParagonIE_Sodium_Core32_SecretStream_State(
1278 1278
             $subkey,
1279
-            ParagonIE_Sodium_Core32_Util::substr($header, 16)
1279
+            ParagonIE_Sodium_Core32_Util::substr( $header, 16 )
1280 1280
         );
1281 1281
         $state->counterReset();
1282 1282
         # memcpy(STATE_INONCE(state), in + crypto_core_hchacha20_INPUTBYTES,
@@ -1294,19 +1294,19 @@  discard block
 block discarded – undo
1294 1294
      * @return string
1295 1295
      * @throws SodiumException
1296 1296
      */
1297
-    public static function secretstream_xchacha20poly1305_push(&$state, $msg, $aad = '', $tag = 0)
1297
+    public static function secretstream_xchacha20poly1305_push( &$state, $msg, $aad = '', $tag = 0 )
1298 1298
     {
1299
-        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString($state);
1299
+        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString( $state );
1300 1300
         # crypto_onetimeauth_poly1305_state poly1305_state;
1301 1301
         # unsigned char                     block[64U];
1302 1302
         # unsigned char                     slen[8U];
1303 1303
         # unsigned char                    *c;
1304 1304
         # unsigned char                    *mac;
1305 1305
 
1306
-        $msglen = ParagonIE_Sodium_Core32_Util::strlen($msg);
1307
-        $aadlen = ParagonIE_Sodium_Core32_Util::strlen($aad);
1306
+        $msglen = ParagonIE_Sodium_Core32_Util::strlen( $msg );
1307
+        $aadlen = ParagonIE_Sodium_Core32_Util::strlen( $aad );
1308 1308
 
1309
-        if ((($msglen + 63) >> 6) > 0xfffffffe) {
1309
+        if ( ( ( $msglen + 63 ) >> 6 ) > 0xfffffffe ) {
1310 1310
             throw new SodiumException(
1311 1311
                 'message cannot be larger than SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_MESSAGEBYTES_MAX bytes'
1312 1312
             );
@@ -1323,62 +1323,62 @@  discard block
 block discarded – undo
1323 1323
         # crypto_onetimeauth_poly1305_init(&poly1305_state, block);
1324 1324
         # sodium_memzero(block, sizeof block);
1325 1325
         $auth = new ParagonIE_Sodium_Core32_Poly1305_State(
1326
-            ParagonIE_Sodium_Core32_ChaCha20::ietfStream(32, $st->getCombinedNonce(), $st->getKey())
1326
+            ParagonIE_Sodium_Core32_ChaCha20::ietfStream( 32, $st->getCombinedNonce(), $st->getKey() )
1327 1327
         );
1328 1328
 
1329 1329
         # crypto_onetimeauth_poly1305_update(&poly1305_state, ad, adlen);
1330
-        $auth->update($aad);
1330
+        $auth->update( $aad );
1331 1331
 
1332 1332
         # crypto_onetimeauth_poly1305_update(&poly1305_state, _pad0,
1333 1333
         #     (0x10 - adlen) & 0xf);
1334
-        $auth->update(str_repeat("\0", ((0x10 - $aadlen) & 0xf)));
1334
+        $auth->update( str_repeat( "\0", ( ( 0x10 - $aadlen ) & 0xf ) ) );
1335 1335
 
1336 1336
         # memset(block, 0, sizeof block);
1337 1337
         # block[0] = tag;
1338 1338
         # crypto_stream_chacha20_ietf_xor_ic(block, block, sizeof block,
1339 1339
         #                                    state->nonce, 1U, state->k);
1340 1340
         $block = ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1341
-            ParagonIE_Sodium_Core32_Util::intToChr($tag) . str_repeat("\0", 63),
1341
+            ParagonIE_Sodium_Core32_Util::intToChr( $tag ) . str_repeat( "\0", 63 ),
1342 1342
             $st->getCombinedNonce(),
1343 1343
             $st->getKey(),
1344
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
1344
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
1345 1345
         );
1346 1346
 
1347 1347
         # crypto_onetimeauth_poly1305_update(&poly1305_state, block, sizeof block);
1348
-        $auth->update($block);
1348
+        $auth->update( $block );
1349 1349
 
1350 1350
         # out[0] = block[0];
1351
-        $out = $block[0];
1351
+        $out = $block[ 0 ];
1352 1352
         # c = out + (sizeof tag);
1353 1353
         # crypto_stream_chacha20_ietf_xor_ic(c, m, mlen, state->nonce, 2U, state->k);
1354 1354
         $cipher = ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1355 1355
             $msg,
1356 1356
             $st->getCombinedNonce(),
1357 1357
             $st->getKey(),
1358
-            ParagonIE_Sodium_Core32_Util::store64_le(2)
1358
+            ParagonIE_Sodium_Core32_Util::store64_le( 2 )
1359 1359
         );
1360 1360
 
1361 1361
         # crypto_onetimeauth_poly1305_update(&poly1305_state, c, mlen);
1362
-        $auth->update($cipher);
1362
+        $auth->update( $cipher );
1363 1363
 
1364 1364
         $out .= $cipher;
1365
-        unset($cipher);
1365
+        unset( $cipher );
1366 1366
 
1367 1367
         # crypto_onetimeauth_poly1305_update
1368 1368
         # (&poly1305_state, _pad0, (0x10 - (sizeof block) + mlen) & 0xf);
1369
-        $auth->update(str_repeat("\0", ((0x10 - 64 + $msglen) & 0xf)));
1369
+        $auth->update( str_repeat( "\0", ( ( 0x10 - 64 + $msglen ) & 0xf ) ) );
1370 1370
 
1371 1371
         # STORE64_LE(slen, (uint64_t) adlen);
1372
-        $slen = ParagonIE_Sodium_Core32_Util::store64_le($aadlen);
1372
+        $slen = ParagonIE_Sodium_Core32_Util::store64_le( $aadlen );
1373 1373
 
1374 1374
         # crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1375
-        $auth->update($slen);
1375
+        $auth->update( $slen );
1376 1376
 
1377 1377
         # STORE64_LE(slen, (sizeof block) + mlen);
1378
-        $slen = ParagonIE_Sodium_Core32_Util::store64_le(64 + $msglen);
1378
+        $slen = ParagonIE_Sodium_Core32_Util::store64_le( 64 + $msglen );
1379 1379
 
1380 1380
         # crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1381
-        $auth->update($slen);
1381
+        $auth->update( $slen );
1382 1382
 
1383 1383
         # mac = c + mlen;
1384 1384
         # crypto_onetimeauth_poly1305_final(&poly1305_state, mac);
@@ -1386,12 +1386,12 @@  discard block
 block discarded – undo
1386 1386
         $out .= $mac;
1387 1387
 
1388 1388
         # sodium_memzero(&poly1305_state, sizeof poly1305_state);
1389
-        unset($auth);
1389
+        unset( $auth );
1390 1390
 
1391 1391
 
1392 1392
         # XOR_BUF(STATE_INONCE(state), mac,
1393 1393
         #     crypto_secretstream_xchacha20poly1305_INONCEBYTES);
1394
-        $st->xorNonce($mac);
1394
+        $st->xorNonce( $mac );
1395 1395
 
1396 1396
         # sodium_increment(STATE_COUNTER(state),
1397 1397
         #     crypto_secretstream_xchacha20poly1305_COUNTERBYTES);
@@ -1400,15 +1400,15 @@  discard block
 block discarded – undo
1400 1400
         $state = $st->toString();
1401 1401
 
1402 1402
         /** @var bool $rekey */
1403
-        $rekey = ($tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY) !== 0;
1403
+        $rekey = ( $tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY ) !== 0;
1404 1404
         # if ((tag & crypto_secretstream_xchacha20poly1305_TAG_REKEY) != 0 ||
1405 1405
         #     sodium_is_zero(STATE_COUNTER(state),
1406 1406
         #         crypto_secretstream_xchacha20poly1305_COUNTERBYTES)) {
1407 1407
         #     crypto_secretstream_xchacha20poly1305_rekey(state);
1408 1408
         # }
1409
-        if ($rekey || $st->needsRekey()) {
1409
+        if ( $rekey || $st->needsRekey() ) {
1410 1410
             // DO REKEY
1411
-            self::secretstream_xchacha20poly1305_rekey($state);
1411
+            self::secretstream_xchacha20poly1305_rekey( $state );
1412 1412
         }
1413 1413
         # if (outlen_p != NULL) {
1414 1414
         #     *outlen_p = crypto_secretstream_xchacha20poly1305_ABYTES + mlen;
@@ -1423,19 +1423,19 @@  discard block
 block discarded – undo
1423 1423
      * @return bool|array{0: string, 1: int}
1424 1424
      * @throws SodiumException
1425 1425
      */
1426
-    public static function secretstream_xchacha20poly1305_pull(&$state, $cipher, $aad = '')
1426
+    public static function secretstream_xchacha20poly1305_pull( &$state, $cipher, $aad = '' )
1427 1427
     {
1428
-        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString($state);
1428
+        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString( $state );
1429 1429
 
1430
-        $cipherlen = ParagonIE_Sodium_Core32_Util::strlen($cipher);
1430
+        $cipherlen = ParagonIE_Sodium_Core32_Util::strlen( $cipher );
1431 1431
         #     mlen = inlen - crypto_secretstream_xchacha20poly1305_ABYTES;
1432 1432
         $msglen = $cipherlen - ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_ABYTES;
1433
-        $aadlen = ParagonIE_Sodium_Core32_Util::strlen($aad);
1433
+        $aadlen = ParagonIE_Sodium_Core32_Util::strlen( $aad );
1434 1434
 
1435 1435
         #     if (mlen > crypto_secretstream_xchacha20poly1305_MESSAGEBYTES_MAX) {
1436 1436
         #         sodium_misuse();
1437 1437
         #     }
1438
-        if ((($msglen + 63) >> 6) > 0xfffffffe) {
1438
+        if ( ( ( $msglen + 63 ) >> 6 ) > 0xfffffffe ) {
1439 1439
             throw new SodiumException(
1440 1440
                 'message cannot be larger than SODIUM_CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_MESSAGEBYTES_MAX bytes'
1441 1441
             );
@@ -1445,15 +1445,15 @@  discard block
 block discarded – undo
1445 1445
         #     crypto_onetimeauth_poly1305_init(&poly1305_state, block);
1446 1446
         #     sodium_memzero(block, sizeof block);
1447 1447
         $auth = new ParagonIE_Sodium_Core32_Poly1305_State(
1448
-            ParagonIE_Sodium_Core32_ChaCha20::ietfStream(32, $st->getCombinedNonce(), $st->getKey())
1448
+            ParagonIE_Sodium_Core32_ChaCha20::ietfStream( 32, $st->getCombinedNonce(), $st->getKey() )
1449 1449
         );
1450 1450
 
1451 1451
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, ad, adlen);
1452
-        $auth->update($aad);
1452
+        $auth->update( $aad );
1453 1453
 
1454 1454
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, _pad0,
1455 1455
         #         (0x10 - adlen) & 0xf);
1456
-        $auth->update(str_repeat("\0", ((0x10 - $aadlen) & 0xf)));
1456
+        $auth->update( str_repeat( "\0", ( ( 0x10 - $aadlen ) & 0xf ) ) );
1457 1457
 
1458 1458
 
1459 1459
         #     memset(block, 0, sizeof block);
@@ -1461,36 +1461,36 @@  discard block
 block discarded – undo
1461 1461
         #     crypto_stream_chacha20_ietf_xor_ic(block, block, sizeof block,
1462 1462
         #                                        state->nonce, 1U, state->k);
1463 1463
         $block = ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1464
-            $cipher[0] . str_repeat("\0", 63),
1464
+            $cipher[ 0 ] . str_repeat( "\0", 63 ),
1465 1465
             $st->getCombinedNonce(),
1466 1466
             $st->getKey(),
1467
-            ParagonIE_Sodium_Core32_Util::store64_le(1)
1467
+            ParagonIE_Sodium_Core32_Util::store64_le( 1 )
1468 1468
         );
1469 1469
         #     tag = block[0];
1470 1470
         #     block[0] = in[0];
1471 1471
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, block, sizeof block);
1472
-        $tag = ParagonIE_Sodium_Core32_Util::chrToInt($block[0]);
1473
-        $block[0] = $cipher[0];
1474
-        $auth->update($block);
1472
+        $tag = ParagonIE_Sodium_Core32_Util::chrToInt( $block[ 0 ] );
1473
+        $block[ 0 ] = $cipher[ 0 ];
1474
+        $auth->update( $block );
1475 1475
 
1476 1476
 
1477 1477
         #     c = in + (sizeof tag);
1478 1478
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, c, mlen);
1479
-        $auth->update(ParagonIE_Sodium_Core32_Util::substr($cipher, 1, $msglen));
1479
+        $auth->update( ParagonIE_Sodium_Core32_Util::substr( $cipher, 1, $msglen ) );
1480 1480
 
1481 1481
         #     crypto_onetimeauth_poly1305_update
1482 1482
         #     (&poly1305_state, _pad0, (0x10 - (sizeof block) + mlen) & 0xf);
1483
-        $auth->update(str_repeat("\0", ((0x10 - 64 + $msglen) & 0xf)));
1483
+        $auth->update( str_repeat( "\0", ( ( 0x10 - 64 + $msglen ) & 0xf ) ) );
1484 1484
 
1485 1485
         #     STORE64_LE(slen, (uint64_t) adlen);
1486 1486
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1487
-        $slen = ParagonIE_Sodium_Core32_Util::store64_le($aadlen);
1488
-        $auth->update($slen);
1487
+        $slen = ParagonIE_Sodium_Core32_Util::store64_le( $aadlen );
1488
+        $auth->update( $slen );
1489 1489
 
1490 1490
         #     STORE64_LE(slen, (sizeof block) + mlen);
1491 1491
         #     crypto_onetimeauth_poly1305_update(&poly1305_state, slen, sizeof slen);
1492
-        $slen = ParagonIE_Sodium_Core32_Util::store64_le(64 + $msglen);
1493
-        $auth->update($slen);
1492
+        $slen = ParagonIE_Sodium_Core32_Util::store64_le( 64 + $msglen );
1493
+        $auth->update( $slen );
1494 1494
 
1495 1495
         #     crypto_onetimeauth_poly1305_final(&poly1305_state, mac);
1496 1496
         #     sodium_memzero(&poly1305_state, sizeof poly1305_state);
@@ -1502,22 +1502,22 @@  discard block
 block discarded – undo
1502 1502
         #         return -1;
1503 1503
         #     }
1504 1504
 
1505
-        $stored = ParagonIE_Sodium_Core32_Util::substr($cipher, $msglen + 1, 16);
1506
-        if (!ParagonIE_Sodium_Core32_Util::hashEquals($mac, $stored)) {
1505
+        $stored = ParagonIE_Sodium_Core32_Util::substr( $cipher, $msglen + 1, 16 );
1506
+        if ( ! ParagonIE_Sodium_Core32_Util::hashEquals( $mac, $stored ) ) {
1507 1507
             return false;
1508 1508
         }
1509 1509
 
1510 1510
         #     crypto_stream_chacha20_ietf_xor_ic(m, c, mlen, state->nonce, 2U, state->k);
1511 1511
         $out = ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1512
-            ParagonIE_Sodium_Core32_Util::substr($cipher, 1, $msglen),
1512
+            ParagonIE_Sodium_Core32_Util::substr( $cipher, 1, $msglen ),
1513 1513
             $st->getCombinedNonce(),
1514 1514
             $st->getKey(),
1515
-            ParagonIE_Sodium_Core32_Util::store64_le(2)
1515
+            ParagonIE_Sodium_Core32_Util::store64_le( 2 )
1516 1516
         );
1517 1517
 
1518 1518
         #     XOR_BUF(STATE_INONCE(state), mac,
1519 1519
         #         crypto_secretstream_xchacha20poly1305_INONCEBYTES);
1520
-        $st->xorNonce($mac);
1520
+        $st->xorNonce( $mac );
1521 1521
 
1522 1522
         #     sodium_increment(STATE_COUNTER(state),
1523 1523
         #         crypto_secretstream_xchacha20poly1305_COUNTERBYTES);
@@ -1533,12 +1533,12 @@  discard block
 block discarded – undo
1533 1533
         $state = $st->toString();
1534 1534
 
1535 1535
         /** @var bool $rekey */
1536
-        $rekey = ($tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY) !== 0;
1537
-        if ($rekey || $st->needsRekey()) {
1536
+        $rekey = ( $tag & ParagonIE_Sodium_Compat::CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY ) !== 0;
1537
+        if ( $rekey || $st->needsRekey() ) {
1538 1538
             // DO REKEY
1539
-            self::secretstream_xchacha20poly1305_rekey($state);
1539
+            self::secretstream_xchacha20poly1305_rekey( $state );
1540 1540
         }
1541
-        return array($out, $tag);
1541
+        return array( $out, $tag );
1542 1542
     }
1543 1543
 
1544 1544
     /**
@@ -1546,9 +1546,9 @@  discard block
 block discarded – undo
1546 1546
      * @return void
1547 1547
      * @throws SodiumException
1548 1548
      */
1549
-    public static function secretstream_xchacha20poly1305_rekey(&$state)
1549
+    public static function secretstream_xchacha20poly1305_rekey( &$state )
1550 1550
     {
1551
-        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString($state);
1551
+        $st = ParagonIE_Sodium_Core32_SecretStream_State::fromString( $state );
1552 1552
         # unsigned char new_key_and_inonce[crypto_stream_chacha20_ietf_KEYBYTES +
1553 1553
         # crypto_secretstream_xchacha20poly1305_INONCEBYTES];
1554 1554
         # size_t        i;
@@ -1561,18 +1561,18 @@  discard block
 block discarded – undo
1561 1561
         #     new_key_and_inonce[crypto_stream_chacha20_ietf_KEYBYTES + i] =
1562 1562
         #         STATE_INONCE(state)[i];
1563 1563
         # }
1564
-        $new_key_and_inonce .= ParagonIE_Sodium_Core32_Util::substR($st->getNonce(), 0, 8);
1564
+        $new_key_and_inonce .= ParagonIE_Sodium_Core32_Util::substR( $st->getNonce(), 0, 8 );
1565 1565
 
1566 1566
         # crypto_stream_chacha20_ietf_xor(new_key_and_inonce, new_key_and_inonce,
1567 1567
         #                                 sizeof new_key_and_inonce,
1568 1568
         #                                 state->nonce, state->k);
1569 1569
 
1570
-        $st->rekey(ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1570
+        $st->rekey( ParagonIE_Sodium_Core32_ChaCha20::ietfStreamXorIc(
1571 1571
             $new_key_and_inonce,
1572 1572
             $st->getCombinedNonce(),
1573 1573
             $st->getKey(),
1574
-            ParagonIE_Sodium_Core32_Util::store64_le(0)
1575
-        ));
1574
+            ParagonIE_Sodium_Core32_Util::store64_le( 0 )
1575
+        ) );
1576 1576
 
1577 1577
         # for (i = 0U; i < crypto_stream_chacha20_ietf_KEYBYTES; i++) {
1578 1578
         #     state->k[i] = new_key_and_inonce[i];
@@ -1598,9 +1598,9 @@  discard block
 block discarded – undo
1598 1598
      * @throws SodiumException
1599 1599
      * @throws TypeError
1600 1600
      */
1601
-    public static function sign_detached($message, $sk)
1601
+    public static function sign_detached( $message, $sk )
1602 1602
     {
1603
-        return ParagonIE_Sodium_Core32_Ed25519::sign_detached($message, $sk);
1603
+        return ParagonIE_Sodium_Core32_Ed25519::sign_detached( $message, $sk );
1604 1604
     }
1605 1605
 
1606 1606
     /**
@@ -1614,9 +1614,9 @@  discard block
 block discarded – undo
1614 1614
      * @throws SodiumException
1615 1615
      * @throws TypeError
1616 1616
      */
1617
-    public static function sign($message, $sk)
1617
+    public static function sign( $message, $sk )
1618 1618
     {
1619
-        return ParagonIE_Sodium_Core32_Ed25519::sign($message, $sk);
1619
+        return ParagonIE_Sodium_Core32_Ed25519::sign( $message, $sk );
1620 1620
     }
1621 1621
 
1622 1622
     /**
@@ -1630,9 +1630,9 @@  discard block
 block discarded – undo
1630 1630
      * @throws SodiumException
1631 1631
      * @throws TypeError
1632 1632
      */
1633
-    public static function sign_open($signedMessage, $pk)
1633
+    public static function sign_open( $signedMessage, $pk )
1634 1634
     {
1635
-        return ParagonIE_Sodium_Core32_Ed25519::sign_open($signedMessage, $pk);
1635
+        return ParagonIE_Sodium_Core32_Ed25519::sign_open( $signedMessage, $pk );
1636 1636
     }
1637 1637
 
1638 1638
     /**
@@ -1647,8 +1647,8 @@  discard block
 block discarded – undo
1647 1647
      * @throws SodiumException
1648 1648
      * @throws TypeError
1649 1649
      */
1650
-    public static function sign_verify_detached($signature, $message, $pk)
1650
+    public static function sign_verify_detached( $signature, $message, $pk )
1651 1651
     {
1652
-        return ParagonIE_Sodium_Core32_Ed25519::verify_detached($signature, $message, $pk);
1652
+        return ParagonIE_Sodium_Core32_Ed25519::verify_detached( $signature, $message, $pk );
1653 1653
     }
1654 1654
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/BLAKE2b.php 1 patch
Spacing   +257 added lines, -257 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_BLAKE2b', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_BLAKE2b', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -20,18 +20,18 @@  discard block
 block discarded – undo
20 20
      * @var array<int, array<int, int>>
21 21
      */
22 22
     protected static $sigma = array(
23
-        array(  0,  1,  2,  3,  4,  5,  6,  7,  8,  9, 10, 11, 12, 13, 14, 15),
24
-        array( 14, 10,  4,  8,  9, 15, 13,  6,  1, 12,  0,  2, 11,  7,  5,  3),
25
-        array( 11,  8, 12,  0,  5,  2, 15, 13, 10, 14,  3,  6,  7,  1,  9,  4),
26
-        array(  7,  9,  3,  1, 13, 12, 11, 14,  2,  6,  5, 10,  4,  0, 15,  8),
27
-        array(  9,  0,  5,  7,  2,  4, 10, 15, 14,  1, 11, 12,  6,  8,  3, 13),
28
-        array(  2, 12,  6, 10,  0, 11,  8,  3,  4, 13,  7,  5, 15, 14,  1,  9),
29
-        array( 12,  5,  1, 15, 14, 13,  4, 10,  0,  7,  6,  3,  9,  2,  8, 11),
30
-        array( 13, 11,  7, 14, 12,  1,  3,  9,  5,  0, 15,  4,  8,  6,  2, 10),
31
-        array(  6, 15, 14,  9, 11,  3,  0,  8, 12,  2, 13,  7,  1,  4, 10,  5),
32
-        array( 10,  2,  8,  4,  7,  6,  1,  5, 15, 11,  9, 14,  3, 12, 13 , 0),
33
-        array(  0,  1,  2,  3,  4,  5,  6,  7,  8,  9, 10, 11, 12, 13, 14, 15),
34
-        array( 14, 10,  4,  8,  9, 15, 13,  6,  1, 12,  0,  2, 11,  7,  5,  3)
23
+        array( 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 ),
24
+        array( 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 ),
25
+        array( 11, 8, 12, 0, 5, 2, 15, 13, 10, 14, 3, 6, 7, 1, 9, 4 ),
26
+        array( 7, 9, 3, 1, 13, 12, 11, 14, 2, 6, 5, 10, 4, 0, 15, 8 ),
27
+        array( 9, 0, 5, 7, 2, 4, 10, 15, 14, 1, 11, 12, 6, 8, 3, 13 ),
28
+        array( 2, 12, 6, 10, 0, 11, 8, 3, 4, 13, 7, 5, 15, 14, 1, 9 ),
29
+        array( 12, 5, 1, 15, 14, 13, 4, 10, 0, 7, 6, 3, 9, 2, 8, 11 ),
30
+        array( 13, 11, 7, 14, 12, 1, 3, 9, 5, 0, 15, 4, 8, 6, 2, 10 ),
31
+        array( 6, 15, 14, 9, 11, 3, 0, 8, 12, 2, 13, 7, 1, 4, 10, 5 ),
32
+        array( 10, 2, 8, 4, 7, 6, 1, 5, 15, 11, 9, 14, 3, 12, 13, 0 ),
33
+        array( 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 ),
34
+        array( 14, 10, 4, 8, 9, 15, 13, 6, 1, 12, 0, 2, 11, 7, 5, 3 )
35 35
     );
36 36
 
37 37
     const BLOCKBYTES = 128;
@@ -48,11 +48,11 @@  discard block
 block discarded – undo
48 48
      * @return SplFixedArray
49 49
      * @psalm-suppress MixedAssignment
50 50
      */
51
-    public static function new64($high, $low)
51
+    public static function new64( $high, $low )
52 52
     {
53
-        $i64 = new SplFixedArray(2);
54
-        $i64[0] = $high & 0xffffffff;
55
-        $i64[1] = $low & 0xffffffff;
53
+        $i64 = new SplFixedArray( 2 );
54
+        $i64[ 0 ] = $high & 0xffffffff;
55
+        $i64[ 1 ] = $low & 0xffffffff;
56 56
         return $i64;
57 57
     }
58 58
 
@@ -65,10 +65,10 @@  discard block
 block discarded – undo
65 65
      * @param int $num
66 66
      * @return SplFixedArray
67 67
      */
68
-    protected static function to64($num)
68
+    protected static function to64( $num )
69 69
     {
70
-        list($hi, $lo) = self::numericTo64BitInteger($num);
71
-        return self::new64($hi, $lo);
70
+        list( $hi, $lo ) = self::numericTo64BitInteger( $num );
71
+        return self::new64( $hi, $lo );
72 72
     }
73 73
 
74 74
     /**
@@ -84,14 +84,14 @@  discard block
 block discarded – undo
84 84
      * @psalm-suppress MixedAssignment
85 85
      * @psalm-suppress MixedOperand
86 86
      */
87
-    protected static function add64($x, $y)
87
+    protected static function add64( $x, $y )
88 88
     {
89
-        $l = ($x[1] + $y[1]) & 0xffffffff;
89
+        $l = ( $x[ 1 ] + $y[ 1 ] ) & 0xffffffff;
90 90
         return self::new64(
91
-            (int) ($x[0] + $y[0] + (
92
-                ($l < $x[1]) ? 1 : 0
93
-            )),
94
-            (int) $l
91
+            (int)( $x[ 0 ] + $y[ 0 ] + (
92
+                ( $l < $x[ 1 ] ) ? 1 : 0
93
+            ) ),
94
+            (int)$l
95 95
         );
96 96
     }
97 97
 
@@ -103,9 +103,9 @@  discard block
 block discarded – undo
103 103
      * @param SplFixedArray $z
104 104
      * @return SplFixedArray
105 105
      */
106
-    protected static function add364($x, $y, $z)
106
+    protected static function add364( $x, $y, $z )
107 107
     {
108
-        return self::add64($x, self::add64($y, $z));
108
+        return self::add64( $x, self::add64( $y, $z ) );
109 109
     }
110 110
 
111 111
     /**
@@ -117,23 +117,23 @@  discard block
 block discarded – undo
117 117
      * @throws SodiumException
118 118
      * @throws TypeError
119 119
      */
120
-    protected static function xor64(SplFixedArray $x, SplFixedArray $y)
120
+    protected static function xor64( SplFixedArray $x, SplFixedArray $y )
121 121
     {
122
-        if (!is_numeric($x[0])) {
123
-            throw new SodiumException('x[0] is not an integer');
122
+        if ( ! is_numeric( $x[ 0 ] ) ) {
123
+            throw new SodiumException( 'x[0] is not an integer' );
124 124
         }
125
-        if (!is_numeric($x[1])) {
126
-            throw new SodiumException('x[1] is not an integer');
125
+        if ( ! is_numeric( $x[ 1 ] ) ) {
126
+            throw new SodiumException( 'x[1] is not an integer' );
127 127
         }
128
-        if (!is_numeric($y[0])) {
129
-            throw new SodiumException('y[0] is not an integer');
128
+        if ( ! is_numeric( $y[ 0 ] ) ) {
129
+            throw new SodiumException( 'y[0] is not an integer' );
130 130
         }
131
-        if (!is_numeric($y[1])) {
132
-            throw new SodiumException('y[1] is not an integer');
131
+        if ( ! is_numeric( $y[ 1 ] ) ) {
132
+            throw new SodiumException( 'y[1] is not an integer' );
133 133
         }
134 134
         return self::new64(
135
-            (int) (($x[0] ^ $y[0]) & 0xffffffff),
136
-            (int) (($x[1] ^ $y[1]) & 0xffffffff)
135
+            (int)( ( $x[ 0 ] ^ $y[ 0 ] ) & 0xffffffff ),
136
+            (int)( ( $x[ 1 ] ^ $y[ 1 ] ) & 0xffffffff )
137 137
         );
138 138
     }
139 139
 
@@ -145,55 +145,55 @@  discard block
 block discarded – undo
145 145
      * @return SplFixedArray
146 146
      * @psalm-suppress MixedAssignment
147 147
      */
148
-    public static function rotr64($x, $c)
148
+    public static function rotr64( $x, $c )
149 149
     {
150
-        if ($c >= 64) {
150
+        if ( $c >= 64 ) {
151 151
             $c %= 64;
152 152
         }
153
-        if ($c >= 32) {
153
+        if ( $c >= 32 ) {
154 154
             /** @var int $tmp */
155
-            $tmp = $x[0];
156
-            $x[0] = $x[1];
157
-            $x[1] = $tmp;
155
+            $tmp = $x[ 0 ];
156
+            $x[ 0 ] = $x[ 1 ];
157
+            $x[ 1 ] = $tmp;
158 158
             $c -= 32;
159 159
         }
160
-        if ($c === 0) {
160
+        if ( $c === 0 ) {
161 161
             return $x;
162 162
         }
163 163
 
164 164
         $l0 = 0;
165 165
         $c = 64 - $c;
166 166
 
167
-        if ($c < 32) {
167
+        if ( $c < 32 ) {
168 168
             /** @var int $h0 */
169
-            $h0 = ((int) ($x[0]) << $c) | (
169
+            $h0 = ( (int)( $x[ 0 ] ) << $c ) | (
170 170
                 (
171
-                    (int) ($x[1]) & ((1 << $c) - 1)
171
+                    (int)( $x[ 1 ] ) & ( ( 1 << $c ) - 1 )
172 172
                         <<
173
-                    (32 - $c)
174
-                ) >> (32 - $c)
173
+                    ( 32 - $c )
174
+                ) >> ( 32 - $c )
175 175
             );
176 176
             /** @var int $l0 */
177
-            $l0 = (int) ($x[1]) << $c;
177
+            $l0 = (int)( $x[ 1 ] ) << $c;
178 178
         } else {
179 179
             /** @var int $h0 */
180
-            $h0 = (int) ($x[1]) << ($c - 32);
180
+            $h0 = (int)( $x[ 1 ] ) << ( $c - 32 );
181 181
         }
182 182
 
183 183
         $h1 = 0;
184 184
         $c1 = 64 - $c;
185 185
 
186
-        if ($c1 < 32) {
186
+        if ( $c1 < 32 ) {
187 187
             /** @var int $h1 */
188
-            $h1 = (int) ($x[0]) >> $c1;
188
+            $h1 = (int)( $x[ 0 ] ) >> $c1;
189 189
             /** @var int $l1 */
190
-            $l1 = ((int) ($x[1]) >> $c1) | ((int) ($x[0]) & ((1 << $c1) - 1)) << (32 - $c1);
190
+            $l1 = ( (int)( $x[ 1 ] ) >> $c1 ) | ( (int)( $x[ 0 ] ) & ( ( 1 << $c1 ) - 1 ) ) << ( 32 - $c1 );
191 191
         } else {
192 192
             /** @var int $l1 */
193
-            $l1 = (int) ($x[0]) >> ($c1 - 32);
193
+            $l1 = (int)( $x[ 0 ] ) >> ( $c1 - 32 );
194 194
         }
195 195
 
196
-        return self::new64($h0 | $h1, $l0 | $l1);
196
+        return self::new64( $h0 | $h1, $l0 | $l1 );
197 197
     }
198 198
 
199 199
     /**
@@ -203,9 +203,9 @@  discard block
 block discarded – undo
203 203
      * @return int
204 204
      * @psalm-suppress MixedOperand
205 205
      */
206
-    protected static function flatten64($x)
206
+    protected static function flatten64( $x )
207 207
     {
208
-        return (int) ($x[0] * 4294967296 + $x[1]);
208
+        return (int)( $x[ 0 ] * 4294967296 + $x[ 1 ] );
209 209
     }
210 210
 
211 211
     /**
@@ -217,19 +217,19 @@  discard block
 block discarded – undo
217 217
      * @psalm-suppress MixedArgument
218 218
      * @psalm-suppress MixedArrayOffset
219 219
      */
220
-    protected static function load64(SplFixedArray $x, $i)
220
+    protected static function load64( SplFixedArray $x, $i )
221 221
     {
222 222
         /** @var int $l */
223
-        $l = (int) ($x[$i])
224
-             | ((int) ($x[$i+1]) << 8)
225
-             | ((int) ($x[$i+2]) << 16)
226
-             | ((int) ($x[$i+3]) << 24);
223
+        $l = (int)( $x[ $i ] )
224
+             | ( (int)( $x[ $i + 1 ] ) << 8 )
225
+             | ( (int)( $x[ $i + 2 ] ) << 16 )
226
+             | ( (int)( $x[ $i + 3 ] ) << 24 );
227 227
         /** @var int $h */
228
-        $h = (int) ($x[$i+4])
229
-             | ((int) ($x[$i+5]) << 8)
230
-             | ((int) ($x[$i+6]) << 16)
231
-             | ((int) ($x[$i+7]) << 24);
232
-        return self::new64($h, $l);
228
+        $h = (int)( $x[ $i + 4 ] )
229
+             | ( (int)( $x[ $i + 5 ] ) << 8 )
230
+             | ( (int)( $x[ $i + 6 ] ) << 16 )
231
+             | ( (int)( $x[ $i + 7 ] ) << 24 );
232
+        return self::new64( $h, $l );
233 233
     }
234 234
 
235 235
     /**
@@ -241,23 +241,23 @@  discard block
 block discarded – undo
241 241
      * @return void
242 242
      * @psalm-suppress MixedAssignment
243 243
      */
244
-    protected static function store64(SplFixedArray $x, $i, SplFixedArray $u)
244
+    protected static function store64( SplFixedArray $x, $i, SplFixedArray $u )
245 245
     {
246 246
         $maxLength = $x->getSize() - 1;
247
-        for ($j = 0; $j < 8; ++$j) {
247
+        for ( $j = 0; $j < 8; ++$j ) {
248 248
             /*
249 249
                [0, 1, 2, 3, 4, 5, 6, 7]
250 250
                     ... becomes ...
251 251
                [0, 0, 0, 0, 1, 1, 1, 1]
252 252
             */
253 253
             /** @var int $uIdx */
254
-            $uIdx = ((7 - $j) & 4) >> 2;
255
-            $x[$i]   = ((int) ($u[$uIdx]) & 0xff);
254
+            $uIdx = ( ( 7 - $j ) & 4 ) >> 2;
255
+            $x[ $i ] = ( (int)( $u[ $uIdx ] ) & 0xff );
256 256
             if (++$i > $maxLength) {
257 257
                 return;
258 258
             }
259 259
             /** @psalm-suppress MixedOperand */
260
-            $u[$uIdx] >>= 8;
260
+            $u[ $uIdx ] >>= 8;
261 261
         }
262 262
     }
263 263
 
@@ -271,18 +271,18 @@  discard block
 block discarded – undo
271 271
     public static function pseudoConstructor()
272 272
     {
273 273
         static $called = false;
274
-        if ($called) {
274
+        if ( $called ) {
275 275
             return;
276 276
         }
277
-        self::$iv = new SplFixedArray(8);
278
-        self::$iv[0] = self::new64(0x6a09e667, 0xf3bcc908);
279
-        self::$iv[1] = self::new64(0xbb67ae85, 0x84caa73b);
280
-        self::$iv[2] = self::new64(0x3c6ef372, 0xfe94f82b);
281
-        self::$iv[3] = self::new64(0xa54ff53a, 0x5f1d36f1);
282
-        self::$iv[4] = self::new64(0x510e527f, 0xade682d1);
283
-        self::$iv[5] = self::new64(0x9b05688c, 0x2b3e6c1f);
284
-        self::$iv[6] = self::new64(0x1f83d9ab, 0xfb41bd6b);
285
-        self::$iv[7] = self::new64(0x5be0cd19, 0x137e2179);
277
+        self::$iv = new SplFixedArray( 8 );
278
+        self::$iv[ 0 ] = self::new64( 0x6a09e667, 0xf3bcc908 );
279
+        self::$iv[ 1 ] = self::new64( 0xbb67ae85, 0x84caa73b );
280
+        self::$iv[ 2 ] = self::new64( 0x3c6ef372, 0xfe94f82b );
281
+        self::$iv[ 3 ] = self::new64( 0xa54ff53a, 0x5f1d36f1 );
282
+        self::$iv[ 4 ] = self::new64( 0x510e527f, 0xade682d1 );
283
+        self::$iv[ 5 ] = self::new64( 0x9b05688c, 0x2b3e6c1f );
284
+        self::$iv[ 6 ] = self::new64( 0x1f83d9ab, 0xfb41bd6b );
285
+        self::$iv[ 7 ] = self::new64( 0x5be0cd19, 0x137e2179 );
286 286
 
287 287
         $called = true;
288 288
     }
@@ -299,26 +299,26 @@  discard block
 block discarded – undo
299 299
      */
300 300
     protected static function context()
301 301
     {
302
-        $ctx    = new SplFixedArray(6);
303
-        $ctx[0] = new SplFixedArray(8);   // h
304
-        $ctx[1] = new SplFixedArray(2);   // t
305
-        $ctx[2] = new SplFixedArray(2);   // f
306
-        $ctx[3] = new SplFixedArray(256); // buf
307
-        $ctx[4] = 0;                      // buflen
308
-        $ctx[5] = 0;                      // last_node (uint8_t)
302
+        $ctx    = new SplFixedArray( 6 );
303
+        $ctx[ 0 ] = new SplFixedArray( 8 ); // h
304
+        $ctx[ 1 ] = new SplFixedArray( 2 ); // t
305
+        $ctx[ 2 ] = new SplFixedArray( 2 ); // f
306
+        $ctx[ 3 ] = new SplFixedArray( 256 ); // buf
307
+        $ctx[ 4 ] = 0; // buflen
308
+        $ctx[ 5 ] = 0; // last_node (uint8_t)
309 309
 
310
-        for ($i = 8; $i--;) {
311
-            $ctx[0][$i] = self::$iv[$i];
310
+        for ( $i = 8; $i--; ) {
311
+            $ctx[ 0 ][ $i ] = self::$iv[ $i ];
312 312
         }
313
-        for ($i = 256; $i--;) {
314
-            $ctx[3][$i] = 0;
313
+        for ( $i = 256; $i--; ) {
314
+            $ctx[ 3 ][ $i ] = 0;
315 315
         }
316 316
 
317
-        $zero = self::new64(0, 0);
318
-        $ctx[1][0] = $zero;
319
-        $ctx[1][1] = $zero;
320
-        $ctx[2][0] = $zero;
321
-        $ctx[2][1] = $zero;
317
+        $zero = self::new64( 0, 0 );
318
+        $ctx[ 1 ][ 0 ] = $zero;
319
+        $ctx[ 1 ][ 1 ] = $zero;
320
+        $ctx[ 2 ][ 0 ] = $zero;
321
+        $ctx[ 2 ][ 1 ] = $zero;
322 322
 
323 323
         return $ctx;
324 324
     }
@@ -337,43 +337,43 @@  discard block
 block discarded – undo
337 337
      * @psalm-suppress MixedArrayAssignment
338 338
      * @psalm-suppress MixedArrayOffset
339 339
      */
340
-    protected static function compress(SplFixedArray $ctx, SplFixedArray $buf)
340
+    protected static function compress( SplFixedArray $ctx, SplFixedArray $buf )
341 341
     {
342
-        $m = new SplFixedArray(16);
343
-        $v = new SplFixedArray(16);
342
+        $m = new SplFixedArray( 16 );
343
+        $v = new SplFixedArray( 16 );
344 344
 
345
-        for ($i = 16; $i--;) {
346
-            $m[$i] = self::load64($buf, $i << 3);
345
+        for ( $i = 16; $i--; ) {
346
+            $m[ $i ] = self::load64( $buf, $i << 3 );
347 347
         }
348 348
 
349
-        for ($i = 8; $i--;) {
350
-            $v[$i] = $ctx[0][$i];
349
+        for ( $i = 8; $i--; ) {
350
+            $v[ $i ] = $ctx[ 0 ][ $i ];
351 351
         }
352 352
 
353
-        $v[ 8] = self::$iv[0];
354
-        $v[ 9] = self::$iv[1];
355
-        $v[10] = self::$iv[2];
356
-        $v[11] = self::$iv[3];
353
+        $v[ 8 ] = self::$iv[ 0 ];
354
+        $v[ 9 ] = self::$iv[ 1 ];
355
+        $v[ 10 ] = self::$iv[ 2 ];
356
+        $v[ 11 ] = self::$iv[ 3 ];
357 357
 
358
-        $v[12] = self::xor64($ctx[1][0], self::$iv[4]);
359
-        $v[13] = self::xor64($ctx[1][1], self::$iv[5]);
360
-        $v[14] = self::xor64($ctx[2][0], self::$iv[6]);
361
-        $v[15] = self::xor64($ctx[2][1], self::$iv[7]);
358
+        $v[ 12 ] = self::xor64( $ctx[ 1 ][ 0 ], self::$iv[ 4 ] );
359
+        $v[ 13 ] = self::xor64( $ctx[ 1 ][ 1 ], self::$iv[ 5 ] );
360
+        $v[ 14 ] = self::xor64( $ctx[ 2 ][ 0 ], self::$iv[ 6 ] );
361
+        $v[ 15 ] = self::xor64( $ctx[ 2 ][ 1 ], self::$iv[ 7 ] );
362 362
 
363
-        for ($r = 0; $r < 12; ++$r) {
364
-            $v = self::G($r, 0, 0, 4, 8, 12, $v, $m);
365
-            $v = self::G($r, 1, 1, 5, 9, 13, $v, $m);
366
-            $v = self::G($r, 2, 2, 6, 10, 14, $v, $m);
367
-            $v = self::G($r, 3, 3, 7, 11, 15, $v, $m);
368
-            $v = self::G($r, 4, 0, 5, 10, 15, $v, $m);
369
-            $v = self::G($r, 5, 1, 6, 11, 12, $v, $m);
370
-            $v = self::G($r, 6, 2, 7, 8, 13, $v, $m);
371
-            $v = self::G($r, 7, 3, 4, 9, 14, $v, $m);
363
+        for ( $r = 0; $r < 12; ++$r ) {
364
+            $v = self::G( $r, 0, 0, 4, 8, 12, $v, $m );
365
+            $v = self::G( $r, 1, 1, 5, 9, 13, $v, $m );
366
+            $v = self::G( $r, 2, 2, 6, 10, 14, $v, $m );
367
+            $v = self::G( $r, 3, 3, 7, 11, 15, $v, $m );
368
+            $v = self::G( $r, 4, 0, 5, 10, 15, $v, $m );
369
+            $v = self::G( $r, 5, 1, 6, 11, 12, $v, $m );
370
+            $v = self::G( $r, 6, 2, 7, 8, 13, $v, $m );
371
+            $v = self::G( $r, 7, 3, 4, 9, 14, $v, $m );
372 372
         }
373 373
 
374
-        for ($i = 8; $i--;) {
375
-            $ctx[0][$i] = self::xor64(
376
-                $ctx[0][$i], self::xor64($v[$i], $v[$i+8])
374
+        for ( $i = 8; $i--; ) {
375
+            $ctx[ 0 ][ $i ] = self::xor64(
376
+                $ctx[ 0 ][ $i ], self::xor64( $v[ $i ], $v[ $i + 8 ] )
377 377
             );
378 378
         }
379 379
     }
@@ -395,16 +395,16 @@  discard block
 block discarded – undo
395 395
      * @psalm-suppress MixedArgument
396 396
      * @psalm-suppress MixedArrayOffset
397 397
      */
398
-    public static function G($r, $i, $a, $b, $c, $d, SplFixedArray $v, SplFixedArray $m)
398
+    public static function G( $r, $i, $a, $b, $c, $d, SplFixedArray $v, SplFixedArray $m )
399 399
     {
400
-        $v[$a] = self::add364($v[$a], $v[$b], $m[self::$sigma[$r][$i << 1]]);
401
-        $v[$d] = self::rotr64(self::xor64($v[$d], $v[$a]), 32);
402
-        $v[$c] = self::add64($v[$c], $v[$d]);
403
-        $v[$b] = self::rotr64(self::xor64($v[$b], $v[$c]), 24);
404
-        $v[$a] = self::add364($v[$a], $v[$b], $m[self::$sigma[$r][($i << 1) + 1]]);
405
-        $v[$d] = self::rotr64(self::xor64($v[$d], $v[$a]), 16);
406
-        $v[$c] = self::add64($v[$c], $v[$d]);
407
-        $v[$b] = self::rotr64(self::xor64($v[$b], $v[$c]), 63);
400
+        $v[ $a ] = self::add364( $v[ $a ], $v[ $b ], $m[ self::$sigma[ $r ][ $i << 1 ] ] );
401
+        $v[ $d ] = self::rotr64( self::xor64( $v[ $d ], $v[ $a ] ), 32 );
402
+        $v[ $c ] = self::add64( $v[ $c ], $v[ $d ] );
403
+        $v[ $b ] = self::rotr64( self::xor64( $v[ $b ], $v[ $c ] ), 24 );
404
+        $v[ $a ] = self::add364( $v[ $a ], $v[ $b ], $m[ self::$sigma[ $r ][ ( $i << 1 ) + 1 ] ] );
405
+        $v[ $d ] = self::rotr64( self::xor64( $v[ $d ], $v[ $a ] ), 16 );
406
+        $v[ $c ] = self::add64( $v[ $c ], $v[ $d ] );
407
+        $v[ $b ] = self::rotr64( self::xor64( $v[ $b ], $v[ $c ] ), 63 );
408 408
         return $v;
409 409
     }
410 410
 
@@ -419,20 +419,20 @@  discard block
 block discarded – undo
419 419
      * @psalm-suppress MixedArrayAccess
420 420
      * @psalm-suppress MixedArrayAssignment
421 421
      */
422
-    public static function increment_counter($ctx, $inc)
422
+    public static function increment_counter( $ctx, $inc )
423 423
     {
424
-        if ($inc < 0) {
425
-            throw new SodiumException('Increasing by a negative number makes no sense.');
424
+        if ( $inc < 0 ) {
425
+            throw new SodiumException( 'Increasing by a negative number makes no sense.' );
426 426
         }
427
-        $t = self::to64($inc);
427
+        $t = self::to64( $inc );
428 428
         # S->t is $ctx[1] in our implementation
429 429
 
430 430
         # S->t[0] = ( uint64_t )( t >> 0 );
431
-        $ctx[1][0] = self::add64($ctx[1][0], $t);
431
+        $ctx[ 1 ][ 0 ] = self::add64( $ctx[ 1 ][ 0 ], $t );
432 432
 
433 433
         # S->t[1] += ( S->t[0] < inc );
434
-        if (self::flatten64($ctx[1][0]) < $inc) {
435
-            $ctx[1][1] = self::add64($ctx[1][1], self::to64(1));
434
+        if ( self::flatten64( $ctx[ 1 ][ 0 ] ) < $inc ) {
435
+            $ctx[ 1 ][ 1 ] = self::add64( $ctx[ 1 ][ 1 ], self::to64( 1 ) );
436 436
         }
437 437
     }
438 438
 
@@ -452,37 +452,37 @@  discard block
 block discarded – undo
452 452
      * @psalm-suppress MixedArrayOffset
453 453
      * @psalm-suppress MixedOperand
454 454
      */
455
-    public static function update(SplFixedArray $ctx, SplFixedArray $p, $plen)
455
+    public static function update( SplFixedArray $ctx, SplFixedArray $p, $plen )
456 456
     {
457 457
         self::pseudoConstructor();
458 458
 
459 459
         $offset = 0;
460
-        while ($plen > 0) {
461
-            $left = $ctx[4];
460
+        while ( $plen > 0 ) {
461
+            $left = $ctx[ 4 ];
462 462
             $fill = 256 - $left;
463 463
 
464
-            if ($plen > $fill) {
464
+            if ( $plen > $fill ) {
465 465
                 # memcpy( S->buf + left, in, fill ); /* Fill buffer */
466
-                for ($i = $fill; $i--;) {
467
-                    $ctx[3][$i + $left] = $p[$i + $offset];
466
+                for ( $i = $fill; $i--; ) {
467
+                    $ctx[ 3 ][ $i + $left ] = $p[ $i + $offset ];
468 468
                 }
469 469
 
470 470
                 # S->buflen += fill;
471
-                $ctx[4] += $fill;
471
+                $ctx[ 4 ] += $fill;
472 472
 
473 473
                 # blake2b_increment_counter( S, BLAKE2B_BLOCKBYTES );
474
-                self::increment_counter($ctx, 128);
474
+                self::increment_counter( $ctx, 128 );
475 475
 
476 476
                 # blake2b_compress( S, S->buf ); /* Compress */
477
-                self::compress($ctx, $ctx[3]);
477
+                self::compress( $ctx, $ctx[ 3 ] );
478 478
 
479 479
                 # memcpy( S->buf, S->buf + BLAKE2B_BLOCKBYTES, BLAKE2B_BLOCKBYTES ); /* Shift buffer left */
480
-                for ($i = 128; $i--;) {
481
-                    $ctx[3][$i] = $ctx[3][$i + 128];
480
+                for ( $i = 128; $i--; ) {
481
+                    $ctx[ 3 ][ $i ] = $ctx[ 3 ][ $i + 128 ];
482 482
                 }
483 483
 
484 484
                 # S->buflen -= BLAKE2B_BLOCKBYTES;
485
-                $ctx[4] -= 128;
485
+                $ctx[ 4 ] -= 128;
486 486
 
487 487
                 # in += fill;
488 488
                 $offset += $fill;
@@ -490,10 +490,10 @@  discard block
 block discarded – undo
490 490
                 # inlen -= fill;
491 491
                 $plen -= $fill;
492 492
             } else {
493
-                for ($i = $plen; $i--;) {
494
-                    $ctx[3][$i + $left] = $p[$i + $offset];
493
+                for ( $i = $plen; $i--; ) {
494
+                    $ctx[ 3 ][ $i + $left ] = $p[ $i + $offset ];
495 495
                 }
496
-                $ctx[4] += $plen;
496
+                $ctx[ 4 ] += $plen;
497 497
                 $offset += $plen;
498 498
                 $plen -= $plen;
499 499
             }
@@ -515,33 +515,33 @@  discard block
 block discarded – undo
515 515
      * @psalm-suppress MixedArrayOffset
516 516
      * @psalm-suppress MixedOperand
517 517
      */
518
-    public static function finish(SplFixedArray $ctx, SplFixedArray $out)
518
+    public static function finish( SplFixedArray $ctx, SplFixedArray $out )
519 519
     {
520 520
         self::pseudoConstructor();
521
-        if ($ctx[4] > 128) {
522
-            self::increment_counter($ctx, 128);
523
-            self::compress($ctx, $ctx[3]);
524
-            $ctx[4] -= 128;
525
-            if ($ctx[4] > 128) {
526
-                throw new SodiumException('Failed to assert that buflen <= 128 bytes');
521
+        if ( $ctx[ 4 ] > 128 ) {
522
+            self::increment_counter( $ctx, 128 );
523
+            self::compress( $ctx, $ctx[ 3 ] );
524
+            $ctx[ 4 ] -= 128;
525
+            if ( $ctx[ 4 ] > 128 ) {
526
+                throw new SodiumException( 'Failed to assert that buflen <= 128 bytes' );
527 527
             }
528
-            for ($i = $ctx[4]; $i--;) {
529
-                $ctx[3][$i] = $ctx[3][$i + 128];
528
+            for ( $i = $ctx[ 4 ]; $i--; ) {
529
+                $ctx[ 3 ][ $i ] = $ctx[ 3 ][ $i + 128 ];
530 530
             }
531 531
         }
532 532
 
533
-        self::increment_counter($ctx, $ctx[4]);
534
-        $ctx[2][0] = self::new64(0xffffffff, 0xffffffff);
533
+        self::increment_counter( $ctx, $ctx[ 4 ] );
534
+        $ctx[ 2 ][ 0 ] = self::new64( 0xffffffff, 0xffffffff );
535 535
 
536
-        for ($i = 256 - $ctx[4]; $i--;) {
537
-            $ctx[3][$i+$ctx[4]] = 0;
536
+        for ( $i = 256 - $ctx[ 4 ]; $i--; ) {
537
+            $ctx[ 3 ][ $i + $ctx[ 4 ] ] = 0;
538 538
         }
539 539
 
540
-        self::compress($ctx, $ctx[3]);
540
+        self::compress( $ctx, $ctx[ 3 ] );
541 541
 
542
-        $i = (int) (($out->getSize() - 1) / 8);
543
-        for (; $i >= 0; --$i) {
544
-            self::store64($out, $i << 3, $ctx[0][$i]);
542
+        $i = (int)( ( $out->getSize() - 1 ) / 8 );
543
+        for ( ; $i >= 0; --$i ) {
544
+            self::store64( $out, $i << 3, $ctx[ 0 ][ $i ] );
545 545
         }
546 546
         return $out;
547 547
     }
@@ -571,67 +571,67 @@  discard block
 block discarded – undo
571 571
         self::pseudoConstructor();
572 572
         $klen = 0;
573 573
 
574
-        if ($key !== null) {
575
-            if (count($key) > 64) {
576
-                throw new SodiumException('Invalid key size');
574
+        if ( $key !== null ) {
575
+            if ( count( $key ) > 64 ) {
576
+                throw new SodiumException( 'Invalid key size' );
577 577
             }
578
-            $klen = count($key);
578
+            $klen = count( $key );
579 579
         }
580 580
 
581
-        if ($outlen > 64) {
582
-            throw new SodiumException('Invalid output size');
581
+        if ( $outlen > 64 ) {
582
+            throw new SodiumException( 'Invalid output size' );
583 583
         }
584 584
 
585 585
         $ctx = self::context();
586 586
 
587
-        $p = new SplFixedArray(64);
587
+        $p = new SplFixedArray( 64 );
588 588
         // Zero our param buffer...
589
-        for ($i = 64; --$i;) {
590
-            $p[$i] = 0;
589
+        for ( $i = 64; --$i; ) {
590
+            $p[ $i ] = 0;
591 591
         }
592 592
 
593
-        $p[0] = $outlen; // digest_length
594
-        $p[1] = $klen;   // key_length
595
-        $p[2] = 1;       // fanout
596
-        $p[3] = 1;       // depth
593
+        $p[ 0 ] = $outlen; // digest_length
594
+        $p[ 1 ] = $klen; // key_length
595
+        $p[ 2 ] = 1; // fanout
596
+        $p[ 3 ] = 1; // depth
597 597
 
598
-        if ($salt instanceof SplFixedArray) {
598
+        if ( $salt instanceof SplFixedArray ) {
599 599
             // salt: [32] through [47]
600
-            for ($i = 0; $i < 16; ++$i) {
601
-                $p[32 + $i] = (int) $salt[$i];
600
+            for ( $i = 0; $i < 16; ++$i ) {
601
+                $p[ 32 + $i ] = (int)$salt[ $i ];
602 602
             }
603 603
         }
604
-        if ($personal instanceof SplFixedArray) {
604
+        if ( $personal instanceof SplFixedArray ) {
605 605
             // personal: [48] through [63]
606
-            for ($i = 0; $i < 16; ++$i) {
607
-                $p[48 + $i] = (int) $personal[$i];
606
+            for ( $i = 0; $i < 16; ++$i ) {
607
+                $p[ 48 + $i ] = (int)$personal[ $i ];
608 608
             }
609 609
         }
610 610
 
611
-        $ctx[0][0] = self::xor64(
612
-            $ctx[0][0],
613
-            self::load64($p, 0)
611
+        $ctx[ 0 ][ 0 ] = self::xor64(
612
+            $ctx[ 0 ][ 0 ],
613
+            self::load64( $p, 0 )
614 614
         );
615
-        if ($salt instanceof SplFixedArray || $personal instanceof SplFixedArray) {
615
+        if ( $salt instanceof SplFixedArray || $personal instanceof SplFixedArray ) {
616 616
             // We need to do what blake2b_init_param() does:
617
-            for ($i = 1; $i < 8; ++$i) {
618
-                $ctx[0][$i] = self::xor64(
619
-                    $ctx[0][$i],
620
-                    self::load64($p, $i << 3)
617
+            for ( $i = 1; $i < 8; ++$i ) {
618
+                $ctx[ 0 ][ $i ] = self::xor64(
619
+                    $ctx[ 0 ][ $i ],
620
+                    self::load64( $p, $i << 3 )
621 621
                 );
622 622
             }
623 623
         }
624 624
 
625
-        if ($klen > 0 && $key instanceof SplFixedArray) {
626
-            $block = new SplFixedArray(128);
627
-            for ($i = 128; $i--;) {
628
-                $block[$i] = 0;
625
+        if ( $klen > 0 && $key instanceof SplFixedArray ) {
626
+            $block = new SplFixedArray( 128 );
627
+            for ( $i = 128; $i--; ) {
628
+                $block[ $i ] = 0;
629 629
             }
630
-            for ($i = $klen; $i--;) {
631
-                $block[$i] = $key[$i];
630
+            for ( $i = $klen; $i--; ) {
631
+                $block[ $i ] = $key[ $i ];
632 632
             }
633
-            self::update($ctx, $block, 128);
634
-            $ctx[4] = 128;
633
+            self::update( $ctx, $block, 128 );
634
+            $ctx[ 4 ] = 128;
635 635
         }
636 636
 
637 637
         return $ctx;
@@ -646,10 +646,10 @@  discard block
 block discarded – undo
646 646
      * @return SplFixedArray
647 647
      * @psalm-suppress MixedArgumentTypeCoercion
648 648
      */
649
-    public static function stringToSplFixedArray($str = '')
649
+    public static function stringToSplFixedArray( $str = '' )
650 650
     {
651
-        $values = unpack('C*', $str);
652
-        return SplFixedArray::fromArray(array_values($values));
651
+        $values = unpack( 'C*', $str );
652
+        return SplFixedArray::fromArray( array_values( $values ) );
653 653
     }
654 654
 
655 655
     /**
@@ -661,15 +661,15 @@  discard block
 block discarded – undo
661 661
      * @return string
662 662
      * @throws TypeError
663 663
      */
664
-    public static function SplFixedArrayToString(SplFixedArray $a)
664
+    public static function SplFixedArrayToString( SplFixedArray $a )
665 665
     {
666 666
         /**
667 667
          * @var array<int, int|string> $arr
668 668
          */
669 669
         $arr = $a->toArray();
670 670
         $c = $a->count();
671
-        array_unshift($arr, str_repeat('C', $c));
672
-        return (string) (call_user_func_array('pack', $arr));
671
+        array_unshift( $arr, str_repeat( 'C', $c ) );
672
+        return (string)( call_user_func_array( 'pack', $arr ) );
673 673
     }
674 674
 
675 675
     /**
@@ -685,47 +685,47 @@  discard block
 block discarded – undo
685 685
      * @psalm-suppress MixedArrayOffset
686 686
      * @psalm-suppress MixedMethodCall
687 687
      */
688
-    public static function contextToString(SplFixedArray $ctx)
688
+    public static function contextToString( SplFixedArray $ctx )
689 689
     {
690 690
         $str = '';
691 691
         /** @var array<int, array<int, int>> $ctxA */
692
-        $ctxA = $ctx[0]->toArray();
692
+        $ctxA = $ctx[ 0 ]->toArray();
693 693
 
694 694
         # uint64_t h[8];
695
-        for ($i = 0; $i < 8; ++$i) {
696
-            $str .= self::store32_le($ctxA[$i][1]);
697
-            $str .= self::store32_le($ctxA[$i][0]);
695
+        for ( $i = 0; $i < 8; ++$i ) {
696
+            $str .= self::store32_le( $ctxA[ $i ][ 1 ] );
697
+            $str .= self::store32_le( $ctxA[ $i ][ 0 ] );
698 698
         }
699 699
 
700 700
         # uint64_t t[2];
701 701
         # uint64_t f[2];
702
-        for ($i = 1; $i < 3; ++$i) {
703
-            $ctxA = $ctx[$i]->toArray();
704
-            $str .= self::store32_le($ctxA[0][1]);
705
-            $str .= self::store32_le($ctxA[0][0]);
706
-            $str .= self::store32_le($ctxA[1][1]);
707
-            $str .= self::store32_le($ctxA[1][0]);
702
+        for ( $i = 1; $i < 3; ++$i ) {
703
+            $ctxA = $ctx[ $i ]->toArray();
704
+            $str .= self::store32_le( $ctxA[ 0 ][ 1 ] );
705
+            $str .= self::store32_le( $ctxA[ 0 ][ 0 ] );
706
+            $str .= self::store32_le( $ctxA[ 1 ][ 1 ] );
707
+            $str .= self::store32_le( $ctxA[ 1 ][ 0 ] );
708 708
         }
709 709
 
710 710
         # uint8_t buf[2 * 128];
711
-        $str .= self::SplFixedArrayToString($ctx[3]);
711
+        $str .= self::SplFixedArrayToString( $ctx[ 3 ] );
712 712
 
713 713
         /** @var int $ctx4 */
714
-        $ctx4 = (int) $ctx[4];
714
+        $ctx4 = (int)$ctx[ 4 ];
715 715
 
716 716
         # size_t buflen;
717
-        $str .= implode('', array(
718
-            self::intToChr($ctx4 & 0xff),
719
-            self::intToChr(($ctx4 >> 8) & 0xff),
720
-            self::intToChr(($ctx4 >> 16) & 0xff),
721
-            self::intToChr(($ctx4 >> 24) & 0xff),
722
-            self::intToChr(($ctx4 >> 32) & 0xff),
723
-            self::intToChr(($ctx4 >> 40) & 0xff),
724
-            self::intToChr(($ctx4 >> 48) & 0xff),
725
-            self::intToChr(($ctx4 >> 56) & 0xff)
726
-        ));
717
+        $str .= implode( '', array(
718
+            self::intToChr( $ctx4 & 0xff ),
719
+            self::intToChr( ( $ctx4 >> 8 ) & 0xff ),
720
+            self::intToChr( ( $ctx4 >> 16 ) & 0xff ),
721
+            self::intToChr( ( $ctx4 >> 24 ) & 0xff ),
722
+            self::intToChr( ( $ctx4 >> 32 ) & 0xff ),
723
+            self::intToChr( ( $ctx4 >> 40 ) & 0xff ),
724
+            self::intToChr( ( $ctx4 >> 48 ) & 0xff ),
725
+            self::intToChr( ( $ctx4 >> 56 ) & 0xff )
726
+        ) );
727 727
         # uint8_t last_node;
728
-        return $str . self::intToChr($ctx[5]) . str_repeat("\x00", 23);
728
+        return $str . self::intToChr( $ctx[ 5 ] ) . str_repeat( "\x00", 23 );
729 729
     }
730 730
 
731 731
     /**
@@ -740,19 +740,19 @@  discard block
 block discarded – undo
740 740
      * @throws TypeError
741 741
      * @psalm-suppress MixedArrayAssignment
742 742
      */
743
-    public static function stringToContext($string)
743
+    public static function stringToContext( $string )
744 744
     {
745 745
         $ctx = self::context();
746 746
 
747 747
         # uint64_t h[8];
748
-        for ($i = 0; $i < 8; ++$i) {
749
-            $ctx[0][$i] = SplFixedArray::fromArray(
748
+        for ( $i = 0; $i < 8; ++$i ) {
749
+            $ctx[ 0 ][ $i ] = SplFixedArray::fromArray(
750 750
                 array(
751 751
                     self::load_4(
752
-                        self::substr($string, (($i << 3) + 4), 4)
752
+                        self::substr( $string, ( ( $i << 3 ) + 4 ), 4 )
753 753
                     ),
754 754
                     self::load_4(
755
-                        self::substr($string, (($i << 3) + 0), 4)
755
+                        self::substr( $string, ( ( $i << 3 ) + 0 ), 4 )
756 756
                     )
757 757
                 )
758 758
             );
@@ -760,30 +760,30 @@  discard block
 block discarded – undo
760 760
 
761 761
         # uint64_t t[2];
762 762
         # uint64_t f[2];
763
-        for ($i = 1; $i < 3; ++$i) {
764
-            $ctx[$i][1] = SplFixedArray::fromArray(
763
+        for ( $i = 1; $i < 3; ++$i ) {
764
+            $ctx[ $i ][ 1 ] = SplFixedArray::fromArray(
765 765
                 array(
766
-                    self::load_4(self::substr($string, 76 + (($i - 1) << 4), 4)),
767
-                    self::load_4(self::substr($string, 72 + (($i - 1) << 4), 4))
766
+                    self::load_4( self::substr( $string, 76 + ( ( $i - 1 ) << 4 ), 4 ) ),
767
+                    self::load_4( self::substr( $string, 72 + ( ( $i - 1 ) << 4 ), 4 ) )
768 768
                 )
769 769
             );
770
-            $ctx[$i][0] = SplFixedArray::fromArray(
770
+            $ctx[ $i ][ 0 ] = SplFixedArray::fromArray(
771 771
                 array(
772
-                    self::load_4(self::substr($string, 68 + (($i - 1) << 4), 4)),
773
-                    self::load_4(self::substr($string, 64 + (($i - 1) << 4), 4))
772
+                    self::load_4( self::substr( $string, 68 + ( ( $i - 1 ) << 4 ), 4 ) ),
773
+                    self::load_4( self::substr( $string, 64 + ( ( $i - 1 ) << 4 ), 4 ) )
774 774
                 )
775 775
             );
776 776
         }
777 777
 
778 778
         # uint8_t buf[2 * 128];
779
-        $ctx[3] = self::stringToSplFixedArray(self::substr($string, 96, 256));
779
+        $ctx[ 3 ] = self::stringToSplFixedArray( self::substr( $string, 96, 256 ) );
780 780
 
781 781
         # uint8_t buf[2 * 128];
782 782
         $int = 0;
783
-        for ($i = 0; $i < 8; ++$i) {
784
-            $int |= self::chrToInt($string[352 + $i]) << ($i << 3);
783
+        for ( $i = 0; $i < 8; ++$i ) {
784
+            $int |= self::chrToInt( $string[ 352 + $i ] ) << ( $i << 3 );
785 785
         }
786
-        $ctx[4] = $int;
786
+        $ctx[ 4 ] = $int;
787 787
 
788 788
         return $ctx;
789 789
     }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/Ed25519.php 1 patch
Spacing   +117 added lines, -117 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_Ed25519', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_Ed25519', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -23,10 +23,10 @@  discard block
 block discarded – undo
23 23
      */
24 24
     public static function keypair()
25 25
     {
26
-        $seed = random_bytes(self::SEED_BYTES);
26
+        $seed = random_bytes( self::SEED_BYTES );
27 27
         $pk = '';
28 28
         $sk = '';
29
-        self::seed_keypair($pk, $sk, $seed);
29
+        self::seed_keypair( $pk, $sk, $seed );
30 30
         return $sk . $pk;
31 31
     }
32 32
 
@@ -40,14 +40,14 @@  discard block
 block discarded – undo
40 40
      * @throws SodiumException
41 41
      * @throws TypeError
42 42
      */
43
-    public static function seed_keypair(&$pk, &$sk, $seed)
43
+    public static function seed_keypair( &$pk, &$sk, $seed )
44 44
     {
45
-        if (self::strlen($seed) !== self::SEED_BYTES) {
46
-            throw new RangeException('crypto_sign keypair seed must be 32 bytes long');
45
+        if ( self::strlen( $seed ) !== self::SEED_BYTES ) {
46
+            throw new RangeException( 'crypto_sign keypair seed must be 32 bytes long' );
47 47
         }
48 48
 
49 49
         /** @var string $pk */
50
-        $pk = self::publickey_from_secretkey($seed);
50
+        $pk = self::publickey_from_secretkey( $seed );
51 51
         $sk = $seed . $pk;
52 52
         return $sk;
53 53
     }
@@ -59,12 +59,12 @@  discard block
 block discarded – undo
59 59
      * @return string
60 60
      * @throws TypeError
61 61
      */
62
-    public static function secretkey($keypair)
62
+    public static function secretkey( $keypair )
63 63
     {
64
-        if (self::strlen($keypair) !== self::KEYPAIR_BYTES) {
65
-            throw new RangeException('crypto_sign keypair must be 96 bytes long');
64
+        if ( self::strlen( $keypair ) !== self::KEYPAIR_BYTES ) {
65
+            throw new RangeException( 'crypto_sign keypair must be 96 bytes long' );
66 66
         }
67
-        return self::substr($keypair, 0, 64);
67
+        return self::substr( $keypair, 0, 64 );
68 68
     }
69 69
 
70 70
     /**
@@ -74,12 +74,12 @@  discard block
 block discarded – undo
74 74
      * @return string
75 75
      * @throws TypeError
76 76
      */
77
-    public static function publickey($keypair)
77
+    public static function publickey( $keypair )
78 78
     {
79
-        if (self::strlen($keypair) !== self::KEYPAIR_BYTES) {
80
-            throw new RangeException('crypto_sign keypair must be 96 bytes long');
79
+        if ( self::strlen( $keypair ) !== self::KEYPAIR_BYTES ) {
80
+            throw new RangeException( 'crypto_sign keypair must be 96 bytes long' );
81 81
         }
82
-        return self::substr($keypair, 64, 32);
82
+        return self::substr( $keypair, 64, 32 );
83 83
     }
84 84
 
85 85
     /**
@@ -90,17 +90,17 @@  discard block
 block discarded – undo
90 90
      * @throws SodiumException
91 91
      * @throws TypeError
92 92
      */
93
-    public static function publickey_from_secretkey($sk)
93
+    public static function publickey_from_secretkey( $sk )
94 94
     {
95 95
         /** @var string $sk */
96
-        $sk = hash('sha512', self::substr($sk, 0, 32), true);
97
-        $sk[0] = self::intToChr(
98
-            self::chrToInt($sk[0]) & 248
96
+        $sk = hash( 'sha512', self::substr( $sk, 0, 32 ), true );
97
+        $sk[ 0 ] = self::intToChr(
98
+            self::chrToInt( $sk[ 0 ] ) & 248
99 99
         );
100
-        $sk[31] = self::intToChr(
101
-            (self::chrToInt($sk[31]) & 63) | 64
100
+        $sk[ 31 ] = self::intToChr(
101
+            ( self::chrToInt( $sk[ 31 ] ) & 63 ) | 64
102 102
         );
103
-        return self::sk_to_pk($sk);
103
+        return self::sk_to_pk( $sk );
104 104
     }
105 105
 
106 106
     /**
@@ -109,15 +109,15 @@  discard block
 block discarded – undo
109 109
      * @throws SodiumException
110 110
      * @throws TypeError
111 111
      */
112
-    public static function pk_to_curve25519($pk)
112
+    public static function pk_to_curve25519( $pk )
113 113
     {
114
-        if (self::small_order($pk)) {
115
-            throw new SodiumException('Public key is on a small order');
114
+        if ( self::small_order( $pk ) ) {
115
+            throw new SodiumException( 'Public key is on a small order' );
116 116
         }
117
-        $A = self::ge_frombytes_negate_vartime(self::substr($pk, 0, 32));
118
-        $p1 = self::ge_mul_l($A);
119
-        if (!self::fe_isnonzero($p1->X)) {
120
-            throw new SodiumException('Unexpected zero result');
117
+        $A = self::ge_frombytes_negate_vartime( self::substr( $pk, 0, 32 ) );
118
+        $p1 = self::ge_mul_l( $A );
119
+        if ( ! self::fe_isnonzero( $p1->X ) ) {
120
+            throw new SodiumException( 'Unexpected zero result' );
121 121
         }
122 122
 
123 123
         # fe_1(one_minus_y);
@@ -134,12 +134,12 @@  discard block
 block discarded – undo
134 134
         # fe_add(x, x, A.Y);
135 135
         # fe_mul(x, x, one_minus_y);
136 136
         $x = self::fe_mul(
137
-            self::fe_add(self::fe_1(), $A->Y),
137
+            self::fe_add( self::fe_1(), $A->Y ),
138 138
             $one_minux_y
139 139
         );
140 140
 
141 141
         # fe_tobytes(curve25519_pk, x);
142
-        return self::fe_tobytes($x);
142
+        return self::fe_tobytes( $x );
143 143
     }
144 144
 
145 145
     /**
@@ -150,11 +150,11 @@  discard block
 block discarded – undo
150 150
      * @throws SodiumException
151 151
      * @throws TypeError
152 152
      */
153
-    public static function sk_to_pk($sk)
153
+    public static function sk_to_pk( $sk )
154 154
     {
155 155
         return self::ge_p3_tobytes(
156 156
             self::ge_scalarmult_base(
157
-                self::substr($sk, 0, 32)
157
+                self::substr( $sk, 0, 32 )
158 158
             )
159 159
         );
160 160
     }
@@ -168,10 +168,10 @@  discard block
 block discarded – undo
168 168
      * @throws SodiumException
169 169
      * @throws TypeError
170 170
      */
171
-    public static function sign($message, $sk)
171
+    public static function sign( $message, $sk )
172 172
     {
173 173
         /** @var string $signature */
174
-        $signature = self::sign_detached($message, $sk);
174
+        $signature = self::sign_detached( $message, $sk );
175 175
         return $signature . $message;
176 176
     }
177 177
 
@@ -184,18 +184,18 @@  discard block
 block discarded – undo
184 184
      * @throws SodiumException
185 185
      * @throws TypeError
186 186
      */
187
-    public static function sign_open($message, $pk)
187
+    public static function sign_open( $message, $pk )
188 188
     {
189 189
         /** @var string $signature */
190
-        $signature = self::substr($message, 0, 64);
190
+        $signature = self::substr( $message, 0, 64 );
191 191
 
192 192
         /** @var string $message */
193
-        $message = self::substr($message, 64);
193
+        $message = self::substr( $message, 64 );
194 194
 
195
-        if (self::verify_detached($signature, $message, $pk)) {
195
+        if ( self::verify_detached( $signature, $message, $pk ) ) {
196 196
             return $message;
197 197
         }
198
-        throw new SodiumException('Invalid signature');
198
+        throw new SodiumException( 'Invalid signature' );
199 199
     }
200 200
 
201 201
     /**
@@ -207,56 +207,56 @@  discard block
 block discarded – undo
207 207
      * @throws SodiumException
208 208
      * @throws TypeError
209 209
      */
210
-    public static function sign_detached($message, $sk)
210
+    public static function sign_detached( $message, $sk )
211 211
     {
212 212
         # crypto_hash_sha512(az, sk, 32);
213
-        $az =  hash('sha512', self::substr($sk, 0, 32), true);
213
+        $az = hash( 'sha512', self::substr( $sk, 0, 32 ), true );
214 214
 
215 215
         # az[0] &= 248;
216 216
         # az[31] &= 63;
217 217
         # az[31] |= 64;
218
-        $az[0] = self::intToChr(self::chrToInt($az[0]) & 248);
219
-        $az[31] = self::intToChr((self::chrToInt($az[31]) & 63) | 64);
218
+        $az[ 0 ] = self::intToChr( self::chrToInt( $az[ 0 ] ) & 248 );
219
+        $az[ 31 ] = self::intToChr( ( self::chrToInt( $az[ 31 ] ) & 63 ) | 64 );
220 220
 
221 221
         # crypto_hash_sha512_init(&hs);
222 222
         # crypto_hash_sha512_update(&hs, az + 32, 32);
223 223
         # crypto_hash_sha512_update(&hs, m, mlen);
224 224
         # crypto_hash_sha512_final(&hs, nonce);
225
-        $hs = hash_init('sha512');
226
-        hash_update($hs, self::substr($az, 32, 32));
227
-        hash_update($hs, $message);
228
-        $nonceHash = hash_final($hs, true);
225
+        $hs = hash_init( 'sha512' );
226
+        hash_update( $hs, self::substr( $az, 32, 32 ) );
227
+        hash_update( $hs, $message );
228
+        $nonceHash = hash_final( $hs, true );
229 229
 
230 230
         # memmove(sig + 32, sk + 32, 32);
231
-        $pk = self::substr($sk, 32, 32);
231
+        $pk = self::substr( $sk, 32, 32 );
232 232
 
233 233
         # sc_reduce(nonce);
234 234
         # ge_scalarmult_base(&R, nonce);
235 235
         # ge_p3_tobytes(sig, &R);
236
-        $nonce = self::sc_reduce($nonceHash) . self::substr($nonceHash, 32);
236
+        $nonce = self::sc_reduce( $nonceHash ) . self::substr( $nonceHash, 32 );
237 237
         $sig = self::ge_p3_tobytes(
238
-            self::ge_scalarmult_base($nonce)
238
+            self::ge_scalarmult_base( $nonce )
239 239
         );
240 240
 
241 241
         # crypto_hash_sha512_init(&hs);
242 242
         # crypto_hash_sha512_update(&hs, sig, 64);
243 243
         # crypto_hash_sha512_update(&hs, m, mlen);
244 244
         # crypto_hash_sha512_final(&hs, hram);
245
-        $hs = hash_init('sha512');
246
-        hash_update($hs, self::substr($sig, 0, 32));
247
-        hash_update($hs, self::substr($pk, 0, 32));
248
-        hash_update($hs, $message);
249
-        $hramHash = hash_final($hs, true);
245
+        $hs = hash_init( 'sha512' );
246
+        hash_update( $hs, self::substr( $sig, 0, 32 ) );
247
+        hash_update( $hs, self::substr( $pk, 0, 32 ) );
248
+        hash_update( $hs, $message );
249
+        $hramHash = hash_final( $hs, true );
250 250
 
251 251
         # sc_reduce(hram);
252 252
         # sc_muladd(sig + 32, hram, az, nonce);
253
-        $hram = self::sc_reduce($hramHash);
254
-        $sigAfter = self::sc_muladd($hram, $az, $nonce);
255
-        $sig = self::substr($sig, 0, 32) . self::substr($sigAfter, 0, 32);
253
+        $hram = self::sc_reduce( $hramHash );
254
+        $sigAfter = self::sc_muladd( $hram, $az, $nonce );
255
+        $sig = self::substr( $sig, 0, 32 ) . self::substr( $sigAfter, 0, 32 );
256 256
 
257 257
         try {
258
-            ParagonIE_Sodium_Compat::memzero($az);
259
-        } catch (SodiumException $ex) {
258
+            ParagonIE_Sodium_Compat::memzero( $az );
259
+        } catch ( SodiumException $ex ) {
260 260
             $az = null;
261 261
         }
262 262
         return $sig;
@@ -272,26 +272,26 @@  discard block
 block discarded – undo
272 272
      * @throws SodiumException
273 273
      * @throws TypeError
274 274
      */
275
-    public static function verify_detached($sig, $message, $pk)
275
+    public static function verify_detached( $sig, $message, $pk )
276 276
     {
277
-        if (self::strlen($sig) < 64) {
278
-            throw new SodiumException('Signature is too short');
277
+        if ( self::strlen( $sig ) < 64 ) {
278
+            throw new SodiumException( 'Signature is too short' );
279 279
         }
280
-        if ((self::chrToInt($sig[63]) & 240) && self::check_S_lt_L(self::substr($sig, 32, 32))) {
281
-            throw new SodiumException('S < L - Invalid signature');
280
+        if ( ( self::chrToInt( $sig[ 63 ] ) & 240 ) && self::check_S_lt_L( self::substr( $sig, 32, 32 ) ) ) {
281
+            throw new SodiumException( 'S < L - Invalid signature' );
282 282
         }
283
-        if (self::small_order($sig)) {
284
-            throw new SodiumException('Signature is on too small of an order');
283
+        if ( self::small_order( $sig ) ) {
284
+            throw new SodiumException( 'Signature is on too small of an order' );
285 285
         }
286
-        if ((self::chrToInt($sig[63]) & 224) !== 0) {
287
-            throw new SodiumException('Invalid signature');
286
+        if ( ( self::chrToInt( $sig[ 63 ] ) & 224 ) !== 0 ) {
287
+            throw new SodiumException( 'Invalid signature' );
288 288
         }
289 289
         $d = 0;
290
-        for ($i = 0; $i < 32; ++$i) {
291
-            $d |= self::chrToInt($pk[$i]);
290
+        for ( $i = 0; $i < 32; ++$i ) {
291
+            $d |= self::chrToInt( $pk[ $i ] );
292 292
         }
293
-        if ($d === 0) {
294
-            throw new SodiumException('All zero public key');
293
+        if ( $d === 0 ) {
294
+            throw new SodiumException( 'All zero public key' );
295 295
         }
296 296
 
297 297
         /** @var bool The original value of ParagonIE_Sodium_Compat::$fastMult */
@@ -301,34 +301,34 @@  discard block
 block discarded – undo
301 301
         ParagonIE_Sodium_Compat::$fastMult = true;
302 302
 
303 303
         /** @var ParagonIE_Sodium_Core_Curve25519_Ge_P3 $A */
304
-        $A = self::ge_frombytes_negate_vartime($pk);
304
+        $A = self::ge_frombytes_negate_vartime( $pk );
305 305
 
306 306
         /** @var string $hDigest */
307 307
         $hDigest = hash(
308 308
             'sha512',
309
-            self::substr($sig, 0, 32) .
310
-                self::substr($pk, 0, 32) .
309
+            self::substr( $sig, 0, 32 ) .
310
+                self::substr( $pk, 0, 32 ) .
311 311
                 $message,
312 312
             true
313 313
         );
314 314
 
315 315
         /** @var string $h */
316
-        $h = self::sc_reduce($hDigest) . self::substr($hDigest, 32);
316
+        $h = self::sc_reduce( $hDigest ) . self::substr( $hDigest, 32 );
317 317
 
318 318
         /** @var ParagonIE_Sodium_Core_Curve25519_Ge_P2 $R */
319 319
         $R = self::ge_double_scalarmult_vartime(
320 320
             $h,
321 321
             $A,
322
-            self::substr($sig, 32)
322
+            self::substr( $sig, 32 )
323 323
         );
324 324
 
325 325
         /** @var string $rcheck */
326
-        $rcheck = self::ge_tobytes($R);
326
+        $rcheck = self::ge_tobytes( $R );
327 327
 
328 328
         // Reset ParagonIE_Sodium_Compat::$fastMult to what it was before.
329 329
         ParagonIE_Sodium_Compat::$fastMult = $orig;
330 330
 
331
-        return self::verify_32($rcheck, self::substr($sig, 0, 32));
331
+        return self::verify_32( $rcheck, self::substr( $sig, 0, 32 ) );
332 332
     }
333 333
 
334 334
     /**
@@ -339,10 +339,10 @@  discard block
 block discarded – undo
339 339
      * @throws SodiumException
340 340
      * @throws TypeError
341 341
      */
342
-    public static function check_S_lt_L($S)
342
+    public static function check_S_lt_L( $S )
343 343
     {
344
-        if (self::strlen($S) < 32) {
345
-            throw new SodiumException('Signature must be 32 bytes');
344
+        if ( self::strlen( $S ) < 32 ) {
345
+            throw new SodiumException( 'Signature must be 32 bytes' );
346 346
         }
347 347
         $L = array(
348 348
             0xed, 0xd3, 0xf5, 0x5c, 0x1a, 0x63, 0x12, 0x58,
@@ -357,14 +357,14 @@  discard block
 block discarded – undo
357 357
         /** @var array<int, int> $L */
358 358
         do {
359 359
             --$i;
360
-            $x = self::chrToInt($S[$i]);
360
+            $x = self::chrToInt( $S[ $i ] );
361 361
             $c |= (
362
-                (($x - $L[$i]) >> 8) & $n
362
+                ( ( $x - $L[ $i ] ) >> 8 ) & $n
363 363
             );
364 364
             $n &= (
365
-                (($x ^ $L[$i]) - 1) >> 8
365
+                ( ( $x ^ $L[ $i ] ) - 1 ) >> 8
366 366
             );
367
-        } while ($i !== 0);
367
+        } while ( $i !== 0 );
368 368
 
369 369
         return $c === 0;
370 370
     }
@@ -375,7 +375,7 @@  discard block
 block discarded – undo
375 375
      * @throws SodiumException
376 376
      * @throws TypeError
377 377
      */
378
-    public static function small_order($R)
378
+    public static function small_order( $R )
379 379
     {
380 380
         /** @var array<int, array<int, int>> $blocklist */
381 381
         $blocklist = array(
@@ -465,14 +465,14 @@  discard block
 block discarded – undo
465 465
             )
466 466
         );
467 467
         /** @var int $countBlocklist */
468
-        $countBlocklist = count($blocklist);
468
+        $countBlocklist = count( $blocklist );
469 469
 
470
-        for ($i = 0; $i < $countBlocklist; ++$i) {
470
+        for ( $i = 0; $i < $countBlocklist; ++$i ) {
471 471
             $c = 0;
472
-            for ($j = 0; $j < 32; ++$j) {
473
-                $c |= self::chrToInt($R[$j]) ^ (int) $blocklist[$i][$j];
472
+            for ( $j = 0; $j < 32; ++$j ) {
473
+                $c |= self::chrToInt( $R[ $j ] ) ^ (int)$blocklist[ $i ][ $j ];
474 474
             }
475
-            if ($c === 0) {
475
+            if ( $c === 0 ) {
476 476
                 return true;
477 477
             }
478 478
         }
@@ -484,13 +484,13 @@  discard block
 block discarded – undo
484 484
      * @return string
485 485
      * @throws SodiumException
486 486
      */
487
-    public static function scalar_complement($s)
487
+    public static function scalar_complement( $s )
488 488
     {
489
-        $t_ = self::L . str_repeat("\x00", 32);
490
-        sodium_increment($t_);
491
-        $s_ = $s . str_repeat("\x00", 32);
492
-        ParagonIE_Sodium_Compat::sub($t_, $s_);
493
-        return self::sc_reduce($t_);
489
+        $t_ = self::L . str_repeat( "\x00", 32 );
490
+        sodium_increment( $t_ );
491
+        $s_ = $s . str_repeat( "\x00", 32 );
492
+        ParagonIE_Sodium_Compat::sub( $t_, $s_ );
493
+        return self::sc_reduce( $t_ );
494 494
     }
495 495
 
496 496
     /**
@@ -500,12 +500,12 @@  discard block
 block discarded – undo
500 500
     public static function scalar_random()
501 501
     {
502 502
         do {
503
-            $r = ParagonIE_Sodium_Compat::randombytes_buf(self::SCALAR_BYTES);
504
-            $r[self::SCALAR_BYTES - 1] = self::intToChr(
505
-                self::chrToInt($r[self::SCALAR_BYTES - 1]) & 0x1f
503
+            $r = ParagonIE_Sodium_Compat::randombytes_buf( self::SCALAR_BYTES );
504
+            $r[ self::SCALAR_BYTES - 1 ] = self::intToChr(
505
+                self::chrToInt( $r[ self::SCALAR_BYTES - 1 ] ) & 0x1f
506 506
             );
507 507
         } while (
508
-            !self::check_S_lt_L($r) || ParagonIE_Sodium_Compat::is_zero($r)
508
+            ! self::check_S_lt_L( $r ) || ParagonIE_Sodium_Compat::is_zero( $r )
509 509
         );
510 510
         return $r;
511 511
     }
@@ -515,12 +515,12 @@  discard block
 block discarded – undo
515 515
      * @return string
516 516
      * @throws SodiumException
517 517
      */
518
-    public static function scalar_negate($s)
518
+    public static function scalar_negate( $s )
519 519
     {
520
-        $t_ = self::L . str_repeat("\x00", 32) ;
521
-        $s_ = $s . str_repeat("\x00", 32) ;
522
-        ParagonIE_Sodium_Compat::sub($t_, $s_);
523
-        return self::sc_reduce($t_);
520
+        $t_ = self::L . str_repeat( "\x00", 32 );
521
+        $s_ = $s . str_repeat( "\x00", 32 );
522
+        ParagonIE_Sodium_Compat::sub( $t_, $s_ );
523
+        return self::sc_reduce( $t_ );
524 524
     }
525 525
 
526 526
     /**
@@ -529,12 +529,12 @@  discard block
 block discarded – undo
529 529
      * @return string
530 530
      * @throws SodiumException
531 531
      */
532
-    public static function scalar_add($a, $b)
532
+    public static function scalar_add( $a, $b )
533 533
     {
534
-        $a_ = $a . str_repeat("\x00", 32);
535
-        $b_ = $b . str_repeat("\x00", 32);
536
-        ParagonIE_Sodium_Compat::add($a_, $b_);
537
-        return self::sc_reduce($a_);
534
+        $a_ = $a . str_repeat( "\x00", 32 );
535
+        $b_ = $b . str_repeat( "\x00", 32 );
536
+        ParagonIE_Sodium_Compat::add( $a_, $b_ );
537
+        return self::sc_reduce( $a_ );
538 538
     }
539 539
 
540 540
     /**
@@ -543,9 +543,9 @@  discard block
 block discarded – undo
543 543
      * @return string
544 544
      * @throws SodiumException
545 545
      */
546
-    public static function scalar_sub($x, $y)
546
+    public static function scalar_sub( $x, $y )
547 547
     {
548
-        $yn = self::scalar_negate($y);
549
-        return self::scalar_add($x, $yn);
548
+        $yn = self::scalar_negate( $y );
549
+        return self::scalar_add( $x, $yn );
550 550
     }
551 551
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/Util.php 1 patch
Spacing   +257 added lines, -257 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_Util', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_Util', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -14,22 +14,22 @@  discard block
 block discarded – undo
14 14
      * @param int $size (16, 32, 64)
15 15
      * @return int
16 16
      */
17
-    public static function abs($integer, $size = 0)
17
+    public static function abs( $integer, $size = 0 )
18 18
     {
19 19
         /** @var int $realSize */
20
-        $realSize = (PHP_INT_SIZE << 3) - 1;
21
-        if ($size) {
20
+        $realSize = ( PHP_INT_SIZE << 3 ) - 1;
21
+        if ( $size ) {
22 22
             --$size;
23 23
         } else {
24 24
             /** @var int $size */
25 25
             $size = $realSize;
26 26
         }
27 27
 
28
-        $negative = -(($integer >> $size) & 1);
29
-        return (int) (
30
-            ($integer ^ $negative)
28
+        $negative = -( ( $integer >> $size ) & 1 );
29
+        return (int)(
30
+            ( $integer ^ $negative )
31 31
                 +
32
-            (($negative >> $realSize) & 1)
32
+            ( ( $negative >> $realSize ) & 1 )
33 33
         );
34 34
     }
35 35
 
@@ -43,26 +43,26 @@  discard block
 block discarded – undo
43 43
      * @return string
44 44
      * @throws TypeError
45 45
      */
46
-    public static function bin2hex($binaryString)
46
+    public static function bin2hex( $binaryString )
47 47
     {
48 48
         /* Type checks: */
49
-        if (!is_string($binaryString)) {
50
-            throw new TypeError('Argument 1 must be a string, ' . gettype($binaryString) . ' given.');
49
+        if ( ! is_string( $binaryString ) ) {
50
+            throw new TypeError( 'Argument 1 must be a string, ' . gettype( $binaryString ) . ' given.' );
51 51
         }
52 52
 
53 53
         $hex = '';
54
-        $len = self::strlen($binaryString);
55
-        for ($i = 0; $i < $len; ++$i) {
54
+        $len = self::strlen( $binaryString );
55
+        for ( $i = 0; $i < $len; ++$i ) {
56 56
             /** @var array<int, int> $chunk */
57
-            $chunk = unpack('C', $binaryString[$i]);
57
+            $chunk = unpack( 'C', $binaryString[ $i ] );
58 58
             /** @var int $c */
59
-            $c = $chunk[1] & 0xf;
59
+            $c = $chunk[ 1 ] & 0xf;
60 60
             /** @var int $b */
61
-            $b = $chunk[1] >> 4;
61
+            $b = $chunk[ 1 ] >> 4;
62 62
             $hex .= pack(
63 63
                 'CC',
64
-                (87 + $b + ((($b - 10) >> 8) & ~38)),
65
-                (87 + $c + ((($c - 10) >> 8) & ~38))
64
+                ( 87 + $b + ( ( ( $b - 10 ) >> 8 ) & ~38 ) ),
65
+                ( 87 + $c + ( ( ( $c - 10 ) >> 8 ) & ~38 ) )
66 66
             );
67 67
         }
68 68
         return $hex;
@@ -78,25 +78,25 @@  discard block
 block discarded – undo
78 78
      * @return string
79 79
      * @throws TypeError
80 80
      */
81
-    public static function bin2hexUpper($bin_string)
81
+    public static function bin2hexUpper( $bin_string )
82 82
     {
83 83
         $hex = '';
84
-        $len = self::strlen($bin_string);
85
-        for ($i = 0; $i < $len; ++$i) {
84
+        $len = self::strlen( $bin_string );
85
+        for ( $i = 0; $i < $len; ++$i ) {
86 86
             /** @var array<int, int> $chunk */
87
-            $chunk = unpack('C', $bin_string[$i]);
87
+            $chunk = unpack( 'C', $bin_string[ $i ] );
88 88
             /**
89 89
              * Lower 16 bits
90 90
              *
91 91
              * @var int $c
92 92
              */
93
-            $c = $chunk[1] & 0xf;
93
+            $c = $chunk[ 1 ] & 0xf;
94 94
 
95 95
             /**
96 96
              * Upper 16 bits
97 97
              * @var int $b
98 98
              */
99
-            $b = $chunk[1] >> 4;
99
+            $b = $chunk[ 1 ] >> 4;
100 100
 
101 101
             /**
102 102
              * Use pack() and binary operators to turn the two integers
@@ -106,8 +106,8 @@  discard block
 block discarded – undo
106 106
              */
107 107
             $hex .= pack(
108 108
                 'CC',
109
-                (55 + $b + ((($b - 10) >> 8) & ~6)),
110
-                (55 + $c + ((($c - 10) >> 8) & ~6))
109
+                ( 55 + $b + ( ( ( $b - 10 ) >> 8 ) & ~6 ) ),
110
+                ( 55 + $c + ( ( ( $c - 10 ) >> 8 ) & ~6 ) )
111 111
             );
112 112
         }
113 113
         return $hex;
@@ -123,18 +123,18 @@  discard block
 block discarded – undo
123 123
      * @throws SodiumException
124 124
      * @throws TypeError
125 125
      */
126
-    public static function chrToInt($chr)
126
+    public static function chrToInt( $chr )
127 127
     {
128 128
         /* Type checks: */
129
-        if (!is_string($chr)) {
130
-            throw new TypeError('Argument 1 must be a string, ' . gettype($chr) . ' given.');
129
+        if ( ! is_string( $chr ) ) {
130
+            throw new TypeError( 'Argument 1 must be a string, ' . gettype( $chr ) . ' given.' );
131 131
         }
132
-        if (self::strlen($chr) !== 1) {
133
-            throw new SodiumException('chrToInt() expects a string that is exactly 1 character long');
132
+        if ( self::strlen( $chr ) !== 1 ) {
133
+            throw new SodiumException( 'chrToInt() expects a string that is exactly 1 character long' );
134 134
         }
135 135
         /** @var array<int, int> $chunk */
136
-        $chunk = unpack('C', $chr);
137
-        return (int) ($chunk[1]);
136
+        $chunk = unpack( 'C', $chr );
137
+        return (int)( $chunk[ 1 ] );
138 138
     }
139 139
 
140 140
     /**
@@ -149,25 +149,25 @@  discard block
 block discarded – undo
149 149
      * @throws SodiumException
150 150
      * @throws TypeError
151 151
      */
152
-    public static function compare($left, $right, $len = null)
152
+    public static function compare( $left, $right, $len = null )
153 153
     {
154
-        $leftLen = self::strlen($left);
155
-        $rightLen = self::strlen($right);
156
-        if ($len === null) {
157
-            $len = max($leftLen, $rightLen);
158
-            $left = str_pad($left, $len, "\x00", STR_PAD_RIGHT);
159
-            $right = str_pad($right, $len, "\x00", STR_PAD_RIGHT);
154
+        $leftLen = self::strlen( $left );
155
+        $rightLen = self::strlen( $right );
156
+        if ( $len === null ) {
157
+            $len = max( $leftLen, $rightLen );
158
+            $left = str_pad( $left, $len, "\x00", STR_PAD_RIGHT );
159
+            $right = str_pad( $right, $len, "\x00", STR_PAD_RIGHT );
160 160
         }
161 161
 
162 162
         $gt = 0;
163 163
         $eq = 1;
164 164
         $i = $len;
165
-        while ($i !== 0) {
165
+        while ( $i !== 0 ) {
166 166
             --$i;
167
-            $gt |= ((self::chrToInt($right[$i]) - self::chrToInt($left[$i])) >> 8) & $eq;
168
-            $eq &= ((self::chrToInt($right[$i]) ^ self::chrToInt($left[$i])) - 1) >> 8;
167
+            $gt |= ( ( self::chrToInt( $right[ $i ] ) - self::chrToInt( $left[ $i ] ) ) >> 8 ) & $eq;
168
+            $eq &= ( ( self::chrToInt( $right[ $i ] ) ^ self::chrToInt( $left[ $i ] ) ) - 1 ) >> 8;
169 169
         }
170
-        return ($gt + $gt + $eq) - 1;
170
+        return ( $gt + $gt + $eq ) - 1;
171 171
     }
172 172
 
173 173
     /**
@@ -180,71 +180,71 @@  discard block
 block discarded – undo
180 180
      * @throws SodiumException
181 181
      * @return void
182 182
      */
183
-    public static function declareScalarType(&$mixedVar = null, $type = 'void', $argumentIndex = 0)
183
+    public static function declareScalarType( &$mixedVar = null, $type = 'void', $argumentIndex = 0 )
184 184
     {
185
-        if (func_num_args() === 0) {
185
+        if ( func_num_args() === 0 ) {
186 186
             /* Tautology, by default */
187 187
             return;
188 188
         }
189
-        if (func_num_args() === 1) {
190
-            throw new TypeError('Declared void, but passed a variable');
189
+        if ( func_num_args() === 1 ) {
190
+            throw new TypeError( 'Declared void, but passed a variable' );
191 191
         }
192
-        $realType = strtolower(gettype($mixedVar));
193
-        $type = strtolower($type);
194
-        switch ($type) {
192
+        $realType = strtolower( gettype( $mixedVar ) );
193
+        $type = strtolower( $type );
194
+        switch ( $type ) {
195 195
             case 'null':
196
-                if ($mixedVar !== null) {
197
-                    throw new TypeError('Argument ' . $argumentIndex . ' must be null, ' . $realType . ' given.');
196
+                if ( $mixedVar !== null ) {
197
+                    throw new TypeError( 'Argument ' . $argumentIndex . ' must be null, ' . $realType . ' given.' );
198 198
                 }
199 199
                 break;
200 200
             case 'integer':
201 201
             case 'int':
202
-                $allow = array('int', 'integer');
203
-                if (!in_array($type, $allow)) {
204
-                    throw new TypeError('Argument ' . $argumentIndex . ' must be an integer, ' . $realType . ' given.');
202
+                $allow = array( 'int', 'integer' );
203
+                if ( ! in_array( $type, $allow ) ) {
204
+                    throw new TypeError( 'Argument ' . $argumentIndex . ' must be an integer, ' . $realType . ' given.' );
205 205
                 }
206
-                $mixedVar = (int) $mixedVar;
206
+                $mixedVar = (int)$mixedVar;
207 207
                 break;
208 208
             case 'boolean':
209 209
             case 'bool':
210
-                $allow = array('bool', 'boolean');
211
-                if (!in_array($type, $allow)) {
212
-                    throw new TypeError('Argument ' . $argumentIndex . ' must be a boolean, ' . $realType . ' given.');
210
+                $allow = array( 'bool', 'boolean' );
211
+                if ( ! in_array( $type, $allow ) ) {
212
+                    throw new TypeError( 'Argument ' . $argumentIndex . ' must be a boolean, ' . $realType . ' given.' );
213 213
                 }
214
-                $mixedVar = (bool) $mixedVar;
214
+                $mixedVar = (bool)$mixedVar;
215 215
                 break;
216 216
             case 'string':
217
-                if (!is_string($mixedVar)) {
218
-                    throw new TypeError('Argument ' . $argumentIndex . ' must be a string, ' . $realType . ' given.');
217
+                if ( ! is_string( $mixedVar ) ) {
218
+                    throw new TypeError( 'Argument ' . $argumentIndex . ' must be a string, ' . $realType . ' given.' );
219 219
                 }
220
-                $mixedVar = (string) $mixedVar;
220
+                $mixedVar = (string)$mixedVar;
221 221
                 break;
222 222
             case 'decimal':
223 223
             case 'double':
224 224
             case 'float':
225
-                $allow = array('decimal', 'double', 'float');
226
-                if (!in_array($type, $allow)) {
227
-                    throw new TypeError('Argument ' . $argumentIndex . ' must be a float, ' . $realType . ' given.');
225
+                $allow = array( 'decimal', 'double', 'float' );
226
+                if ( ! in_array( $type, $allow ) ) {
227
+                    throw new TypeError( 'Argument ' . $argumentIndex . ' must be a float, ' . $realType . ' given.' );
228 228
                 }
229
-                $mixedVar = (float) $mixedVar;
229
+                $mixedVar = (float)$mixedVar;
230 230
                 break;
231 231
             case 'object':
232
-                if (!is_object($mixedVar)) {
233
-                    throw new TypeError('Argument ' . $argumentIndex . ' must be an object, ' . $realType . ' given.');
232
+                if ( ! is_object( $mixedVar ) ) {
233
+                    throw new TypeError( 'Argument ' . $argumentIndex . ' must be an object, ' . $realType . ' given.' );
234 234
                 }
235 235
                 break;
236 236
             case 'array':
237
-                if (!is_array($mixedVar)) {
238
-                    if (is_object($mixedVar)) {
239
-                        if ($mixedVar instanceof ArrayAccess) {
237
+                if ( ! is_array( $mixedVar ) ) {
238
+                    if ( is_object( $mixedVar ) ) {
239
+                        if ( $mixedVar instanceof ArrayAccess ) {
240 240
                             return;
241 241
                         }
242 242
                     }
243
-                    throw new TypeError('Argument ' . $argumentIndex . ' must be an array, ' . $realType . ' given.');
243
+                    throw new TypeError( 'Argument ' . $argumentIndex . ' must be an array, ' . $realType . ' given.' );
244 244
                 }
245 245
                 break;
246 246
             default:
247
-                throw new SodiumException('Unknown type (' . $realType .') does not match expect type (' . $type . ')');
247
+                throw new SodiumException( 'Unknown type (' . $realType . ') does not match expect type (' . $type . ')' );
248 248
         }
249 249
     }
250 250
 
@@ -257,30 +257,30 @@  discard block
 block discarded – undo
257 257
      * @throws SodiumException
258 258
      * @throws TypeError
259 259
      */
260
-    public static function hashEquals($left, $right)
260
+    public static function hashEquals( $left, $right )
261 261
     {
262 262
         /* Type checks: */
263
-        if (!is_string($left)) {
264
-            throw new TypeError('Argument 1 must be a string, ' . gettype($left) . ' given.');
263
+        if ( ! is_string( $left ) ) {
264
+            throw new TypeError( 'Argument 1 must be a string, ' . gettype( $left ) . ' given.' );
265 265
         }
266
-        if (!is_string($right)) {
267
-            throw new TypeError('Argument 2 must be a string, ' . gettype($right) . ' given.');
266
+        if ( ! is_string( $right ) ) {
267
+            throw new TypeError( 'Argument 2 must be a string, ' . gettype( $right ) . ' given.' );
268 268
         }
269 269
 
270
-        if (is_callable('hash_equals')) {
271
-            return hash_equals($left, $right);
270
+        if ( is_callable( 'hash_equals' ) ) {
271
+            return hash_equals( $left, $right );
272 272
         }
273 273
         $d = 0;
274 274
         /** @var int $len */
275
-        $len = self::strlen($left);
276
-        if ($len !== self::strlen($right)) {
275
+        $len = self::strlen( $left );
276
+        if ( $len !== self::strlen( $right ) ) {
277 277
             return false;
278 278
         }
279
-        for ($i = 0; $i < $len; ++$i) {
280
-            $d |= self::chrToInt($left[$i]) ^ self::chrToInt($right[$i]);
279
+        for ( $i = 0; $i < $len; ++$i ) {
280
+            $d |= self::chrToInt( $left[ $i ] ) ^ self::chrToInt( $right[ $i ] );
281 281
         }
282 282
 
283
-        if ($d !== 0) {
283
+        if ( $d !== 0 ) {
284 284
             return false;
285 285
         }
286 286
         return $left === $right;
@@ -295,10 +295,10 @@  discard block
 block discarded – undo
295 295
      * @throws SodiumException
296 296
      * @psalm-suppress PossiblyInvalidArgument
297 297
      */
298
-    protected static function hash_update(&$hs, $data)
298
+    protected static function hash_update( &$hs, $data )
299 299
     {
300
-        if (!hash_update($hs, $data)) {
301
-            throw new SodiumException('hash_update() failed');
300
+        if ( ! hash_update( $hs, $data ) ) {
301
+            throw new SodiumException( 'hash_update() failed' );
302 302
         }
303 303
     }
304 304
 
@@ -314,11 +314,11 @@  discard block
 block discarded – undo
314 314
      * @throws RangeException
315 315
      * @throws TypeError
316 316
      */
317
-    public static function hex2bin($hexString, $strictPadding = false)
317
+    public static function hex2bin( $hexString, $strictPadding = false )
318 318
     {
319 319
         /* Type checks: */
320
-        if (!is_string($hexString)) {
321
-            throw new TypeError('Argument 1 must be a string, ' . gettype($hexString) . ' given.');
320
+        if ( ! is_string( $hexString ) ) {
321
+            throw new TypeError( 'Argument 1 must be a string, ' . gettype( $hexString ) . ' given.' );
322 322
         }
323 323
 
324 324
         /** @var int $hex_pos */
@@ -328,11 +328,11 @@  discard block
 block discarded – undo
328 328
         /** @var int $c_acc */
329 329
         $c_acc = 0;
330 330
         /** @var int $hex_len */
331
-        $hex_len = self::strlen($hexString);
331
+        $hex_len = self::strlen( $hexString );
332 332
         /** @var int $state */
333 333
         $state = 0;
334
-        if (($hex_len & 1) !== 0) {
335
-            if ($strictPadding) {
334
+        if ( ( $hex_len & 1 ) !== 0 ) {
335
+            if ( $strictPadding ) {
336 336
                 throw new RangeException(
337 337
                     'Expected an even number of hexadecimal characters'
338 338
                 );
@@ -342,30 +342,30 @@  discard block
 block discarded – undo
342 342
             }
343 343
         }
344 344
 
345
-        $chunk = unpack('C*', $hexString);
346
-        while ($hex_pos < $hex_len) {
345
+        $chunk = unpack( 'C*', $hexString );
346
+        while ( $hex_pos < $hex_len ) {
347 347
             ++$hex_pos;
348 348
             /** @var int $c */
349
-            $c = $chunk[$hex_pos];
349
+            $c = $chunk[ $hex_pos ];
350 350
             /** @var int $c_num */
351 351
             $c_num = $c ^ 48;
352 352
             /** @var int $c_num0 */
353
-            $c_num0 = ($c_num - 10) >> 8;
353
+            $c_num0 = ( $c_num - 10 ) >> 8;
354 354
             /** @var int $c_alpha */
355
-            $c_alpha = ($c & ~32) - 55;
355
+            $c_alpha = ( $c & ~32 ) - 55;
356 356
             /** @var int $c_alpha0 */
357
-            $c_alpha0 = (($c_alpha - 10) ^ ($c_alpha - 16)) >> 8;
358
-            if (($c_num0 | $c_alpha0) === 0) {
357
+            $c_alpha0 = ( ( $c_alpha - 10 ) ^ ( $c_alpha - 16 ) ) >> 8;
358
+            if ( ( $c_num0 | $c_alpha0 ) === 0 ) {
359 359
                 throw new RangeException(
360 360
                     'hex2bin() only expects hexadecimal characters'
361 361
                 );
362 362
             }
363 363
             /** @var int $c_val */
364
-            $c_val = ($c_num0 & $c_num) | ($c_alpha & $c_alpha0);
365
-            if ($state === 0) {
364
+            $c_val = ( $c_num0 & $c_num ) | ( $c_alpha & $c_alpha0 );
365
+            if ( $state === 0 ) {
366 366
                 $c_acc = $c_val * 16;
367 367
             } else {
368
-                $bin .= pack('C', $c_acc | $c_val);
368
+                $bin .= pack( 'C', $c_acc | $c_val );
369 369
             }
370 370
             $state ^= 1;
371 371
         }
@@ -380,15 +380,15 @@  discard block
 block discarded – undo
380 380
      * @param array<int, int> $ints
381 381
      * @return string
382 382
      */
383
-    public static function intArrayToString(array $ints)
383
+    public static function intArrayToString( array $ints )
384 384
     {
385 385
         /** @var array<int, int> $args */
386 386
         $args = $ints;
387
-        foreach ($args as $i => $v) {
388
-            $args[$i] = (int) ($v & 0xff);
387
+        foreach ( $args as $i => $v ) {
388
+            $args[ $i ] = (int)( $v & 0xff );
389 389
         }
390
-        array_unshift($args, str_repeat('C', count($ints)));
391
-        return (string) (call_user_func_array('pack', $args));
390
+        array_unshift( $args, str_repeat( 'C', count( $ints ) ) );
391
+        return (string)( call_user_func_array( 'pack', $args ) );
392 392
     }
393 393
 
394 394
     /**
@@ -400,9 +400,9 @@  discard block
 block discarded – undo
400 400
      * @return string
401 401
      * @throws TypeError
402 402
      */
403
-    public static function intToChr($int)
403
+    public static function intToChr( $int )
404 404
     {
405
-        return pack('C', $int);
405
+        return pack( 'C', $int );
406 406
     }
407 407
 
408 408
     /**
@@ -415,22 +415,22 @@  discard block
 block discarded – undo
415 415
      * @throws RangeException
416 416
      * @throws TypeError
417 417
      */
418
-    public static function load_3($string)
418
+    public static function load_3( $string )
419 419
     {
420 420
         /* Type checks: */
421
-        if (!is_string($string)) {
422
-            throw new TypeError('Argument 1 must be a string, ' . gettype($string) . ' given.');
421
+        if ( ! is_string( $string ) ) {
422
+            throw new TypeError( 'Argument 1 must be a string, ' . gettype( $string ) . ' given.' );
423 423
         }
424 424
 
425 425
         /* Input validation: */
426
-        if (self::strlen($string) < 3) {
426
+        if ( self::strlen( $string ) < 3 ) {
427 427
             throw new RangeException(
428
-                'String must be 3 bytes or more; ' . self::strlen($string) . ' given.'
428
+                'String must be 3 bytes or more; ' . self::strlen( $string ) . ' given.'
429 429
             );
430 430
         }
431 431
         /** @var array<int, int> $unpacked */
432
-        $unpacked = unpack('V', $string . "\0");
433
-        return (int) ($unpacked[1] & 0xffffff);
432
+        $unpacked = unpack( 'V', $string . "\0" );
433
+        return (int)( $unpacked[ 1 ] & 0xffffff );
434 434
     }
435 435
 
436 436
     /**
@@ -443,22 +443,22 @@  discard block
 block discarded – undo
443 443
      * @throws RangeException
444 444
      * @throws TypeError
445 445
      */
446
-    public static function load_4($string)
446
+    public static function load_4( $string )
447 447
     {
448 448
         /* Type checks: */
449
-        if (!is_string($string)) {
450
-            throw new TypeError('Argument 1 must be a string, ' . gettype($string) . ' given.');
449
+        if ( ! is_string( $string ) ) {
450
+            throw new TypeError( 'Argument 1 must be a string, ' . gettype( $string ) . ' given.' );
451 451
         }
452 452
 
453 453
         /* Input validation: */
454
-        if (self::strlen($string) < 4) {
454
+        if ( self::strlen( $string ) < 4 ) {
455 455
             throw new RangeException(
456
-                'String must be 4 bytes or more; ' . self::strlen($string) . ' given.'
456
+                'String must be 4 bytes or more; ' . self::strlen( $string ) . ' given.'
457 457
             );
458 458
         }
459 459
         /** @var array<int, int> $unpacked */
460
-        $unpacked = unpack('V', $string);
461
-        return (int) ($unpacked[1] & 0xffffffff);
460
+        $unpacked = unpack( 'V', $string );
461
+        return (int)( $unpacked[ 1 ] & 0xffffffff );
462 462
     }
463 463
 
464 464
     /**
@@ -472,35 +472,35 @@  discard block
 block discarded – undo
472 472
      * @throws SodiumException
473 473
      * @throws TypeError
474 474
      */
475
-    public static function load64_le($string)
475
+    public static function load64_le( $string )
476 476
     {
477 477
         /* Type checks: */
478
-        if (!is_string($string)) {
479
-            throw new TypeError('Argument 1 must be a string, ' . gettype($string) . ' given.');
478
+        if ( ! is_string( $string ) ) {
479
+            throw new TypeError( 'Argument 1 must be a string, ' . gettype( $string ) . ' given.' );
480 480
         }
481 481
 
482 482
         /* Input validation: */
483
-        if (self::strlen($string) < 4) {
483
+        if ( self::strlen( $string ) < 4 ) {
484 484
             throw new RangeException(
485
-                'String must be 4 bytes or more; ' . self::strlen($string) . ' given.'
485
+                'String must be 4 bytes or more; ' . self::strlen( $string ) . ' given.'
486 486
             );
487 487
         }
488
-        if (PHP_VERSION_ID >= 50603 && PHP_INT_SIZE === 8) {
488
+        if ( PHP_VERSION_ID >= 50603 && PHP_INT_SIZE === 8 ) {
489 489
             /** @var array<int, int> $unpacked */
490
-            $unpacked = unpack('P', $string);
491
-            return (int) $unpacked[1];
490
+            $unpacked = unpack( 'P', $string );
491
+            return (int)$unpacked[ 1 ];
492 492
         }
493 493
 
494 494
         /** @var int $result */
495
-        $result  = (self::chrToInt($string[0]) & 0xff);
496
-        $result |= (self::chrToInt($string[1]) & 0xff) <<  8;
497
-        $result |= (self::chrToInt($string[2]) & 0xff) << 16;
498
-        $result |= (self::chrToInt($string[3]) & 0xff) << 24;
499
-        $result |= (self::chrToInt($string[4]) & 0xff) << 32;
500
-        $result |= (self::chrToInt($string[5]) & 0xff) << 40;
501
-        $result |= (self::chrToInt($string[6]) & 0xff) << 48;
502
-        $result |= (self::chrToInt($string[7]) & 0xff) << 56;
503
-        return (int) $result;
495
+        $result  = ( self::chrToInt( $string[ 0 ] ) & 0xff );
496
+        $result |= ( self::chrToInt( $string[ 1 ] ) & 0xff ) << 8;
497
+        $result |= ( self::chrToInt( $string[ 2 ] ) & 0xff ) << 16;
498
+        $result |= ( self::chrToInt( $string[ 3 ] ) & 0xff ) << 24;
499
+        $result |= ( self::chrToInt( $string[ 4 ] ) & 0xff ) << 32;
500
+        $result |= ( self::chrToInt( $string[ 5 ] ) & 0xff ) << 40;
501
+        $result |= ( self::chrToInt( $string[ 6 ] ) & 0xff ) << 48;
502
+        $result |= ( self::chrToInt( $string[ 7 ] ) & 0xff ) << 56;
503
+        return (int)$result;
504 504
     }
505 505
 
506 506
     /**
@@ -512,9 +512,9 @@  discard block
 block discarded – undo
512 512
      * @throws SodiumException
513 513
      * @throws TypeError
514 514
      */
515
-    public static function memcmp($left, $right)
515
+    public static function memcmp( $left, $right )
516 516
     {
517
-        if (self::hashEquals($left, $right)) {
517
+        if ( self::hashEquals( $left, $right ) ) {
518 518
             return 0;
519 519
         }
520 520
         return -1;
@@ -537,19 +537,19 @@  discard block
 block discarded – undo
537 537
      *                  constant operands)
538 538
      * @return int
539 539
      */
540
-    public static function mul($a, $b, $size = 0)
540
+    public static function mul( $a, $b, $size = 0 )
541 541
     {
542
-        if (ParagonIE_Sodium_Compat::$fastMult) {
543
-            return (int) ($a * $b);
542
+        if ( ParagonIE_Sodium_Compat::$fastMult ) {
543
+            return (int)( $a * $b );
544 544
         }
545 545
 
546 546
         static $defaultSize = null;
547 547
         /** @var int $defaultSize */
548
-        if (!$defaultSize) {
548
+        if ( ! $defaultSize ) {
549 549
             /** @var int $defaultSize */
550
-            $defaultSize = (PHP_INT_SIZE << 3) - 1;
550
+            $defaultSize = ( PHP_INT_SIZE << 3 ) - 1;
551 551
         }
552
-        if ($size < 1) {
552
+        if ( $size < 1 ) {
553 553
             /** @var int $size */
554 554
             $size = $defaultSize;
555 555
         }
@@ -565,7 +565,7 @@  discard block
 block discarded – undo
565 565
          *
566 566
          * @var int
567 567
          */
568
-        $mask = -(($b >> ((int) $defaultSize)) & 1);
568
+        $mask = -( ( $b >> ( (int)$defaultSize ) ) & 1 );
569 569
 
570 570
         /**
571 571
          * Ensure $b is a positive integer, without creating
@@ -573,7 +573,7 @@  discard block
 block discarded – undo
573 573
          *
574 574
          * @var int $b
575 575
          */
576
-        $b = ($b & ~$mask) | ($mask & -$b);
576
+        $b = ( $b & ~$mask ) | ( $mask & -$b );
577 577
 
578 578
         /**
579 579
          * Unless $size is provided:
@@ -581,12 +581,12 @@  discard block
 block discarded – undo
581 581
          * This loop always runs 32 times when PHP_INT_SIZE is 4.
582 582
          * This loop always runs 64 times when PHP_INT_SIZE is 8.
583 583
          */
584
-        for ($i = $size; $i >= 0; --$i) {
585
-            $c += (int) ($a & -($b & 1));
584
+        for ( $i = $size; $i >= 0; --$i ) {
585
+            $c += (int)( $a & -( $b & 1 ) );
586 586
             $a <<= 1;
587 587
             $b >>= 1;
588 588
         }
589
-        $c = (int) @($c & -1);
589
+        $c = (int)@( $c & -1 );
590 590
 
591 591
         /**
592 592
          * If $b was negative, we then apply the same value to $c here.
@@ -597,7 +597,7 @@  discard block
 block discarded – undo
597 597
          *
598 598
          * The end result is what we'd expect from integer multiplication.
599 599
          */
600
-        return (int) (($c & ~$mask) | ($mask & -$c));
600
+        return (int)( ( $c & ~$mask ) | ( $mask & -$c ) );
601 601
     }
602 602
 
603 603
     /**
@@ -609,22 +609,22 @@  discard block
 block discarded – undo
609 609
      * @param int|float $num
610 610
      * @return array<int, int>
611 611
      */
612
-    public static function numericTo64BitInteger($num)
612
+    public static function numericTo64BitInteger( $num )
613 613
     {
614 614
         $high = 0;
615 615
         /** @var int $low */
616 616
         $low = $num & 0xffffffff;
617 617
 
618
-        if ((+(abs($num))) >= 1) {
619
-            if ($num > 0) {
618
+        if ( (+( abs( $num ) )) >= 1 ) {
619
+            if ( $num > 0 ) {
620 620
                 /** @var int $high */
621
-                $high = min((+(floor($num/4294967296))), 4294967295);
621
+                $high = min( (+( floor( $num / 4294967296 ) )), 4294967295 );
622 622
             } else {
623 623
                 /** @var int $high */
624
-                $high = ~~((+(ceil(($num - (+((~~($num)))))/4294967296))));
624
+                $high = ~~( (+( ceil( ( $num - (+( ( ~~( $num ) ) )) ) / 4294967296 ) )) );
625 625
             }
626 626
         }
627
-        return array((int) $high, (int) $low);
627
+        return array( (int)$high, (int)$low );
628 628
     }
629 629
 
630 630
     /**
@@ -636,19 +636,19 @@  discard block
 block discarded – undo
636 636
      * @return string
637 637
      * @throws TypeError
638 638
      */
639
-    public static function store_3($int)
639
+    public static function store_3( $int )
640 640
     {
641 641
         /* Type checks: */
642
-        if (!is_int($int)) {
643
-            if (is_numeric($int)) {
644
-                $int = (int) $int;
642
+        if ( ! is_int( $int ) ) {
643
+            if ( is_numeric( $int ) ) {
644
+                $int = (int)$int;
645 645
             } else {
646
-                throw new TypeError('Argument 1 must be an integer, ' . gettype($int) . ' given.');
646
+                throw new TypeError( 'Argument 1 must be an integer, ' . gettype( $int ) . ' given.' );
647 647
             }
648 648
         }
649 649
         /** @var string $packed */
650
-        $packed = pack('N', $int);
651
-        return self::substr($packed, 1, 3);
650
+        $packed = pack( 'N', $int );
651
+        return self::substr( $packed, 1, 3 );
652 652
     }
653 653
 
654 654
     /**
@@ -660,19 +660,19 @@  discard block
 block discarded – undo
660 660
      * @return string
661 661
      * @throws TypeError
662 662
      */
663
-    public static function store32_le($int)
663
+    public static function store32_le( $int )
664 664
     {
665 665
         /* Type checks: */
666
-        if (!is_int($int)) {
667
-            if (is_numeric($int)) {
668
-                $int = (int) $int;
666
+        if ( ! is_int( $int ) ) {
667
+            if ( is_numeric( $int ) ) {
668
+                $int = (int)$int;
669 669
             } else {
670
-                throw new TypeError('Argument 1 must be an integer, ' . gettype($int) . ' given.');
670
+                throw new TypeError( 'Argument 1 must be an integer, ' . gettype( $int ) . ' given.' );
671 671
             }
672 672
         }
673 673
 
674 674
         /** @var string $packed */
675
-        $packed = pack('V', $int);
675
+        $packed = pack( 'V', $int );
676 676
         return $packed;
677 677
     }
678 678
 
@@ -685,19 +685,19 @@  discard block
 block discarded – undo
685 685
      * @return string
686 686
      * @throws TypeError
687 687
      */
688
-    public static function store_4($int)
688
+    public static function store_4( $int )
689 689
     {
690 690
         /* Type checks: */
691
-        if (!is_int($int)) {
692
-            if (is_numeric($int)) {
693
-                $int = (int) $int;
691
+        if ( ! is_int( $int ) ) {
692
+            if ( is_numeric( $int ) ) {
693
+                $int = (int)$int;
694 694
             } else {
695
-                throw new TypeError('Argument 1 must be an integer, ' . gettype($int) . ' given.');
695
+                throw new TypeError( 'Argument 1 must be an integer, ' . gettype( $int ) . ' given.' );
696 696
             }
697 697
         }
698 698
 
699 699
         /** @var string $packed */
700
-        $packed = pack('N', $int);
700
+        $packed = pack( 'N', $int );
701 701
         return $packed;
702 702
     }
703 703
 
@@ -710,46 +710,46 @@  discard block
 block discarded – undo
710 710
      * @return string
711 711
      * @throws TypeError
712 712
      */
713
-    public static function store64_le($int)
713
+    public static function store64_le( $int )
714 714
     {
715 715
         /* Type checks: */
716
-        if (!is_int($int)) {
717
-            if (is_numeric($int)) {
718
-                $int = (int) $int;
716
+        if ( ! is_int( $int ) ) {
717
+            if ( is_numeric( $int ) ) {
718
+                $int = (int)$int;
719 719
             } else {
720
-                throw new TypeError('Argument 1 must be an integer, ' . gettype($int) . ' given.');
720
+                throw new TypeError( 'Argument 1 must be an integer, ' . gettype( $int ) . ' given.' );
721 721
             }
722 722
         }
723 723
 
724
-        if (PHP_INT_SIZE === 8) {
725
-            if (PHP_VERSION_ID >= 50603) {
724
+        if ( PHP_INT_SIZE === 8 ) {
725
+            if ( PHP_VERSION_ID >= 50603 ) {
726 726
                 /** @var string $packed */
727
-                $packed = pack('P', $int);
727
+                $packed = pack( 'P', $int );
728 728
                 return $packed;
729 729
             }
730
-            return self::intToChr($int & 0xff) .
731
-                self::intToChr(($int >>  8) & 0xff) .
732
-                self::intToChr(($int >> 16) & 0xff) .
733
-                self::intToChr(($int >> 24) & 0xff) .
734
-                self::intToChr(($int >> 32) & 0xff) .
735
-                self::intToChr(($int >> 40) & 0xff) .
736
-                self::intToChr(($int >> 48) & 0xff) .
737
-                self::intToChr(($int >> 56) & 0xff);
738
-        }
739
-        if ($int > PHP_INT_MAX) {
740
-            list($hiB, $int) = self::numericTo64BitInteger($int);
730
+            return self::intToChr( $int & 0xff ) .
731
+                self::intToChr( ( $int >> 8 ) & 0xff ) .
732
+                self::intToChr( ( $int >> 16 ) & 0xff ) .
733
+                self::intToChr( ( $int >> 24 ) & 0xff ) .
734
+                self::intToChr( ( $int >> 32 ) & 0xff ) .
735
+                self::intToChr( ( $int >> 40 ) & 0xff ) .
736
+                self::intToChr( ( $int >> 48 ) & 0xff ) .
737
+                self::intToChr( ( $int >> 56 ) & 0xff );
738
+        }
739
+        if ( $int > PHP_INT_MAX ) {
740
+            list( $hiB, $int ) = self::numericTo64BitInteger( $int );
741 741
         } else {
742 742
             $hiB = 0;
743 743
         }
744 744
         return
745
-            self::intToChr(($int      ) & 0xff) .
746
-            self::intToChr(($int >>  8) & 0xff) .
747
-            self::intToChr(($int >> 16) & 0xff) .
748
-            self::intToChr(($int >> 24) & 0xff) .
749
-            self::intToChr($hiB & 0xff) .
750
-            self::intToChr(($hiB >>  8) & 0xff) .
751
-            self::intToChr(($hiB >> 16) & 0xff) .
752
-            self::intToChr(($hiB >> 24) & 0xff);
745
+            self::intToChr( ( $int ) & 0xff ) .
746
+            self::intToChr( ( $int >> 8 ) & 0xff ) .
747
+            self::intToChr( ( $int >> 16 ) & 0xff ) .
748
+            self::intToChr( ( $int >> 24 ) & 0xff ) .
749
+            self::intToChr( $hiB & 0xff ) .
750
+            self::intToChr( ( $hiB >> 8 ) & 0xff ) .
751
+            self::intToChr( ( $hiB >> 16 ) & 0xff ) .
752
+            self::intToChr( ( $hiB >> 24 ) & 0xff );
753 753
     }
754 754
 
755 755
     /**
@@ -763,17 +763,17 @@  discard block
 block discarded – undo
763 763
      * @return int
764 764
      * @throws TypeError
765 765
      */
766
-    public static function strlen($str)
766
+    public static function strlen( $str )
767 767
     {
768 768
         /* Type checks: */
769
-        if (!is_string($str)) {
770
-            throw new TypeError('String expected');
769
+        if ( ! is_string( $str ) ) {
770
+            throw new TypeError( 'String expected' );
771 771
         }
772 772
 
773
-        return (int) (
773
+        return (int)(
774 774
         self::isMbStringOverride()
775
-            ? mb_strlen($str, '8bit')
776
-            : strlen($str)
775
+            ? mb_strlen( $str, '8bit' )
776
+            : strlen( $str )
777 777
         );
778 778
     }
779 779
 
@@ -786,16 +786,16 @@  discard block
 block discarded – undo
786 786
      * @return array<int, int>
787 787
      * @throws TypeError
788 788
      */
789
-    public static function stringToIntArray($string)
789
+    public static function stringToIntArray( $string )
790 790
     {
791
-        if (!is_string($string)) {
792
-            throw new TypeError('String expected');
791
+        if ( ! is_string( $string ) ) {
792
+            throw new TypeError( 'String expected' );
793 793
         }
794 794
         /**
795 795
          * @var array<int, int>
796 796
          */
797 797
         $values = array_values(
798
-            unpack('C*', $string)
798
+            unpack( 'C*', $string )
799 799
         );
800 800
         return $values;
801 801
     }
@@ -813,28 +813,28 @@  discard block
 block discarded – undo
813 813
      * @return string
814 814
      * @throws TypeError
815 815
      */
816
-    public static function substr($str, $start = 0, $length = null)
816
+    public static function substr( $str, $start = 0, $length = null )
817 817
     {
818 818
         /* Type checks: */
819
-        if (!is_string($str)) {
820
-            throw new TypeError('String expected');
819
+        if ( ! is_string( $str ) ) {
820
+            throw new TypeError( 'String expected' );
821 821
         }
822 822
 
823
-        if ($length === 0) {
823
+        if ( $length === 0 ) {
824 824
             return '';
825 825
         }
826 826
 
827
-        if (self::isMbStringOverride()) {
828
-            if (PHP_VERSION_ID < 50400 && $length === null) {
829
-                $length = self::strlen($str);
827
+        if ( self::isMbStringOverride() ) {
828
+            if ( PHP_VERSION_ID < 50400 && $length === null ) {
829
+                $length = self::strlen( $str );
830 830
             }
831
-            $sub = (string) mb_substr($str, $start, $length, '8bit');
832
-        } elseif ($length === null) {
833
-            $sub = (string) substr($str, $start);
831
+            $sub = (string)mb_substr( $str, $start, $length, '8bit' );
832
+        } elseif ( $length === null ) {
833
+            $sub = (string)substr( $str, $start );
834 834
         } else {
835
-            $sub = (string) substr($str, $start, $length);
835
+            $sub = (string)substr( $str, $start, $length );
836 836
         }
837
-        if ($sub !== '') {
837
+        if ( $sub !== '' ) {
838 838
             return $sub;
839 839
         }
840 840
         return '';
@@ -851,18 +851,18 @@  discard block
 block discarded – undo
851 851
      * @throws SodiumException
852 852
      * @throws TypeError
853 853
      */
854
-    public static function verify_16($a, $b)
854
+    public static function verify_16( $a, $b )
855 855
     {
856 856
         /* Type checks: */
857
-        if (!is_string($a)) {
858
-            throw new TypeError('String expected');
857
+        if ( ! is_string( $a ) ) {
858
+            throw new TypeError( 'String expected' );
859 859
         }
860
-        if (!is_string($b)) {
861
-            throw new TypeError('String expected');
860
+        if ( ! is_string( $b ) ) {
861
+            throw new TypeError( 'String expected' );
862 862
         }
863 863
         return self::hashEquals(
864
-            self::substr($a, 0, 16),
865
-            self::substr($b, 0, 16)
864
+            self::substr( $a, 0, 16 ),
865
+            self::substr( $b, 0, 16 )
866 866
         );
867 867
     }
868 868
 
@@ -877,18 +877,18 @@  discard block
 block discarded – undo
877 877
      * @throws SodiumException
878 878
      * @throws TypeError
879 879
      */
880
-    public static function verify_32($a, $b)
880
+    public static function verify_32( $a, $b )
881 881
     {
882 882
         /* Type checks: */
883
-        if (!is_string($a)) {
884
-            throw new TypeError('String expected');
883
+        if ( ! is_string( $a ) ) {
884
+            throw new TypeError( 'String expected' );
885 885
         }
886
-        if (!is_string($b)) {
887
-            throw new TypeError('String expected');
886
+        if ( ! is_string( $b ) ) {
887
+            throw new TypeError( 'String expected' );
888 888
         }
889 889
         return self::hashEquals(
890
-            self::substr($a, 0, 32),
891
-            self::substr($b, 0, 32)
890
+            self::substr( $a, 0, 32 ),
891
+            self::substr( $b, 0, 32 )
892 892
         );
893 893
     }
894 894
 
@@ -902,17 +902,17 @@  discard block
 block discarded – undo
902 902
      * @return string
903 903
      * @throws TypeError
904 904
      */
905
-    public static function xorStrings($a, $b)
905
+    public static function xorStrings( $a, $b )
906 906
     {
907 907
         /* Type checks: */
908
-        if (!is_string($a)) {
909
-            throw new TypeError('Argument 1 must be a string');
908
+        if ( ! is_string( $a ) ) {
909
+            throw new TypeError( 'Argument 1 must be a string' );
910 910
         }
911
-        if (!is_string($b)) {
912
-            throw new TypeError('Argument 2 must be a string');
911
+        if ( ! is_string( $b ) ) {
912
+            throw new TypeError( 'Argument 2 must be a string' );
913 913
         }
914 914
 
915
-        return (string) ($a ^ $b);
915
+        return (string)( $a ^ $b );
916 916
     }
917 917
 
918 918
     /**
@@ -929,15 +929,15 @@  discard block
 block discarded – undo
929 929
     {
930 930
         static $mbstring = null;
931 931
 
932
-        if ($mbstring === null) {
933
-            if (!defined('MB_OVERLOAD_STRING')) {
932
+        if ( $mbstring === null ) {
933
+            if ( ! defined( 'MB_OVERLOAD_STRING' ) ) {
934 934
                 $mbstring = false;
935 935
                 return $mbstring;
936 936
             }
937
-            $mbstring = extension_loaded('mbstring')
938
-                && defined('MB_OVERLOAD_STRING')
937
+            $mbstring = extension_loaded( 'mbstring' )
938
+                && defined( 'MB_OVERLOAD_STRING' )
939 939
                 &&
940
-            ((int) (ini_get('mbstring.func_overload')) & 2);
940
+            ( (int)( ini_get( 'mbstring.func_overload' ) ) & 2 );
941 941
             // MB_OVERLOAD_STRING === 2
942 942
         }
943 943
         /** @var bool $mbstring */
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/SipHash.php 1 patch
Spacing   +86 added lines, -86 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_SipHash', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_SipHash', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -18,65 +18,65 @@  discard block
 block discarded – undo
18 18
      * @return int[]
19 19
      *
20 20
      */
21
-    public static function sipRound(array $v)
21
+    public static function sipRound( array $v )
22 22
     {
23 23
         # v0 += v1;
24
-        list($v[0], $v[1]) = self::add(
25
-            array($v[0], $v[1]),
26
-            array($v[2], $v[3])
24
+        list( $v[ 0 ], $v[ 1 ] ) = self::add(
25
+            array( $v[ 0 ], $v[ 1 ] ),
26
+            array( $v[ 2 ], $v[ 3 ] )
27 27
         );
28 28
 
29 29
         #  v1=ROTL(v1,13);
30
-        list($v[2], $v[3]) = self::rotl_64((int) $v[2], (int) $v[3], 13);
30
+        list( $v[ 2 ], $v[ 3 ] ) = self::rotl_64( (int)$v[ 2 ], (int)$v[ 3 ], 13 );
31 31
 
32 32
         #  v1 ^= v0;
33
-        $v[2] = (int) $v[2] ^ (int) $v[0];
34
-        $v[3] = (int) $v[3] ^ (int) $v[1];
33
+        $v[ 2 ] = (int)$v[ 2 ] ^ (int)$v[ 0 ];
34
+        $v[ 3 ] = (int)$v[ 3 ] ^ (int)$v[ 1 ];
35 35
 
36 36
         #  v0=ROTL(v0,32);
37
-        list($v[0], $v[1]) = self::rotl_64((int) $v[0], (int) $v[1], 32);
37
+        list( $v[ 0 ], $v[ 1 ] ) = self::rotl_64( (int)$v[ 0 ], (int)$v[ 1 ], 32 );
38 38
 
39 39
         # v2 += v3;
40
-        list($v[4], $v[5]) = self::add(
41
-            array((int) $v[4], (int) $v[5]),
42
-            array((int) $v[6], (int) $v[7])
40
+        list( $v[ 4 ], $v[ 5 ] ) = self::add(
41
+            array( (int)$v[ 4 ], (int)$v[ 5 ] ),
42
+            array( (int)$v[ 6 ], (int)$v[ 7 ] )
43 43
         );
44 44
 
45 45
         # v3=ROTL(v3,16);
46
-        list($v[6], $v[7]) = self::rotl_64((int) $v[6], (int) $v[7], 16);
46
+        list( $v[ 6 ], $v[ 7 ] ) = self::rotl_64( (int)$v[ 6 ], (int)$v[ 7 ], 16 );
47 47
 
48 48
         #  v3 ^= v2;
49
-        $v[6] = (int) $v[6] ^ (int) $v[4];
50
-        $v[7] = (int) $v[7] ^ (int) $v[5];
49
+        $v[ 6 ] = (int)$v[ 6 ] ^ (int)$v[ 4 ];
50
+        $v[ 7 ] = (int)$v[ 7 ] ^ (int)$v[ 5 ];
51 51
 
52 52
         # v0 += v3;
53
-        list($v[0], $v[1]) = self::add(
54
-            array((int) $v[0], (int) $v[1]),
55
-            array((int) $v[6], (int) $v[7])
53
+        list( $v[ 0 ], $v[ 1 ] ) = self::add(
54
+            array( (int)$v[ 0 ], (int)$v[ 1 ] ),
55
+            array( (int)$v[ 6 ], (int)$v[ 7 ] )
56 56
         );
57 57
 
58 58
         # v3=ROTL(v3,21);
59
-        list($v[6], $v[7]) = self::rotl_64((int) $v[6], (int) $v[7], 21);
59
+        list( $v[ 6 ], $v[ 7 ] ) = self::rotl_64( (int)$v[ 6 ], (int)$v[ 7 ], 21 );
60 60
 
61 61
         # v3 ^= v0;
62
-        $v[6] = (int) $v[6] ^ (int) $v[0];
63
-        $v[7] = (int) $v[7] ^ (int) $v[1];
62
+        $v[ 6 ] = (int)$v[ 6 ] ^ (int)$v[ 0 ];
63
+        $v[ 7 ] = (int)$v[ 7 ] ^ (int)$v[ 1 ];
64 64
 
65 65
         # v2 += v1;
66
-        list($v[4], $v[5]) = self::add(
67
-            array((int) $v[4], (int) $v[5]),
68
-            array((int) $v[2], (int) $v[3])
66
+        list( $v[ 4 ], $v[ 5 ] ) = self::add(
67
+            array( (int)$v[ 4 ], (int)$v[ 5 ] ),
68
+            array( (int)$v[ 2 ], (int)$v[ 3 ] )
69 69
         );
70 70
 
71 71
         # v1=ROTL(v1,17);
72
-        list($v[2], $v[3]) = self::rotl_64((int) $v[2], (int) $v[3], 17);
72
+        list( $v[ 2 ], $v[ 3 ] ) = self::rotl_64( (int)$v[ 2 ], (int)$v[ 3 ], 17 );
73 73
 
74 74
         #  v1 ^= v2;;
75
-        $v[2] = (int) $v[2] ^ (int) $v[4];
76
-        $v[3] = (int) $v[3] ^ (int) $v[5];
75
+        $v[ 2 ] = (int)$v[ 2 ] ^ (int)$v[ 4 ];
76
+        $v[ 3 ] = (int)$v[ 3 ] ^ (int)$v[ 5 ];
77 77
 
78 78
         # v2=ROTL(v2,32)
79
-        list($v[4], $v[5]) = self::rotl_64((int) $v[4], (int) $v[5], 32);
79
+        list( $v[ 4 ], $v[ 5 ] ) = self::rotl_64( (int)$v[ 4 ], (int)$v[ 5 ], 32 );
80 80
 
81 81
         return $v;
82 82
     }
@@ -90,14 +90,14 @@  discard block
 block discarded – undo
90 90
      * @param int[] $b
91 91
      * @return array<int, mixed>
92 92
      */
93
-    public static function add(array $a, array $b)
93
+    public static function add( array $a, array $b )
94 94
     {
95 95
         /** @var int $x1 */
96
-        $x1 = $a[1] + $b[1];
96
+        $x1 = $a[ 1 ] + $b[ 1 ];
97 97
         /** @var int $c */
98 98
         $c = $x1 >> 32; // Carry if ($a + $b) > 0xffffffff
99 99
         /** @var int $x0 */
100
-        $x0 = $a[0] + $b[0] + $c;
100
+        $x0 = $a[ 0 ] + $b[ 0 ] + $c;
101 101
         return array(
102 102
             $x0 & 0xffffffff,
103 103
             $x1 & 0xffffffff
@@ -112,33 +112,33 @@  discard block
 block discarded – undo
112 112
      * @param int $c
113 113
      * @return array<int, mixed>
114 114
      */
115
-    public static function rotl_64($int0, $int1, $c)
115
+    public static function rotl_64( $int0, $int1, $c )
116 116
     {
117 117
         $int0 &= 0xffffffff;
118 118
         $int1 &= 0xffffffff;
119 119
         $c &= 63;
120
-        if ($c === 32) {
121
-            return array($int1, $int0);
120
+        if ( $c === 32 ) {
121
+            return array( $int1, $int0 );
122 122
         }
123
-        if ($c > 31) {
123
+        if ( $c > 31 ) {
124 124
             $tmp = $int1;
125 125
             $int1 = $int0;
126 126
             $int0 = $tmp;
127 127
             $c &= 31;
128 128
         }
129
-        if ($c === 0) {
130
-            return array($int0, $int1);
129
+        if ( $c === 0 ) {
130
+            return array( $int0, $int1 );
131 131
         }
132 132
         return array(
133 133
             0xffffffff & (
134
-                ($int0 << $c)
134
+                ( $int0 << $c )
135 135
                     |
136
-                ($int1 >> (32 - $c))
136
+                ( $int1 >> ( 32 - $c ) )
137 137
             ),
138 138
             0xffffffff & (
139
-                ($int1 << $c)
139
+                ( $int1 << $c )
140 140
                     |
141
-                ($int0 >> (32 - $c))
141
+                ( $int0 >> ( 32 - $c ) )
142 142
             ),
143 143
         );
144 144
     }
@@ -160,9 +160,9 @@  discard block
 block discarded – undo
160 160
      * @throws SodiumException
161 161
      * @throws TypeError
162 162
      */
163
-    public static function sipHash24($in, $key)
163
+    public static function sipHash24( $in, $key )
164 164
     {
165
-        $inlen = self::strlen($in);
165
+        $inlen = self::strlen( $in );
166 166
 
167 167
         # /* "somepseudorandomlygeneratedbytes" */
168 168
         # u64 v0 = 0x736f6d6570736575ULL;
@@ -187,10 +187,10 @@  discard block
 block discarded – undo
187 187
         # u64 k0 = LOAD64_LE( k );
188 188
         # u64 k1 = LOAD64_LE( k + 8 );
189 189
         $k = array(
190
-            self::load_4(self::substr($key, 4, 4)),
191
-            self::load_4(self::substr($key, 0, 4)),
192
-            self::load_4(self::substr($key, 12, 4)),
193
-            self::load_4(self::substr($key, 8, 4))
190
+            self::load_4( self::substr( $key, 4, 4 ) ),
191
+            self::load_4( self::substr( $key, 0, 4 ) ),
192
+            self::load_4( self::substr( $key, 12, 4 ) ),
193
+            self::load_4( self::substr( $key, 8, 4 ) )
194 194
         );
195 195
         // k0 => $k[0], $k[1]
196 196
         // k1 => $k[2], $k[3]
@@ -203,41 +203,41 @@  discard block
 block discarded – undo
203 203
         // See docblock for why the 0th index gets the higher bits.
204 204
 
205 205
         # v3 ^= k1;
206
-        $v[6] ^= $k[2];
207
-        $v[7] ^= $k[3];
206
+        $v[ 6 ] ^= $k[ 2 ];
207
+        $v[ 7 ] ^= $k[ 3 ];
208 208
         # v2 ^= k0;
209
-        $v[4] ^= $k[0];
210
-        $v[5] ^= $k[1];
209
+        $v[ 4 ] ^= $k[ 0 ];
210
+        $v[ 5 ] ^= $k[ 1 ];
211 211
         # v1 ^= k1;
212
-        $v[2] ^= $k[2];
213
-        $v[3] ^= $k[3];
212
+        $v[ 2 ] ^= $k[ 2 ];
213
+        $v[ 3 ] ^= $k[ 3 ];
214 214
         # v0 ^= k0;
215
-        $v[0] ^= $k[0];
216
-        $v[1] ^= $k[1];
215
+        $v[ 0 ] ^= $k[ 0 ];
216
+        $v[ 1 ] ^= $k[ 1 ];
217 217
 
218 218
         $left = $inlen;
219 219
         # for ( ; in != end; in += 8 )
220
-        while ($left >= 8) {
220
+        while ( $left >= 8 ) {
221 221
             # m = LOAD64_LE( in );
222 222
             $m = array(
223
-                self::load_4(self::substr($in, 4, 4)),
224
-                self::load_4(self::substr($in, 0, 4))
223
+                self::load_4( self::substr( $in, 4, 4 ) ),
224
+                self::load_4( self::substr( $in, 0, 4 ) )
225 225
             );
226 226
 
227 227
             # v3 ^= m;
228
-            $v[6] ^= $m[0];
229
-            $v[7] ^= $m[1];
228
+            $v[ 6 ] ^= $m[ 0 ];
229
+            $v[ 7 ] ^= $m[ 1 ];
230 230
 
231 231
             # SIPROUND;
232 232
             # SIPROUND;
233
-            $v = self::sipRound($v);
234
-            $v = self::sipRound($v);
233
+            $v = self::sipRound( $v );
234
+            $v = self::sipRound( $v );
235 235
 
236 236
             # v0 ^= m;
237
-            $v[0] ^= $m[0];
238
-            $v[1] ^= $m[1];
237
+            $v[ 0 ] ^= $m[ 0 ];
238
+            $v[ 1 ] ^= $m[ 1 ];
239 239
 
240
-            $in = self::substr($in, 8);
240
+            $in = self::substr( $in, 8 );
241 241
             $left -= 8;
242 242
         }
243 243
 
@@ -252,55 +252,55 @@  discard block
 block discarded – undo
252 252
         #     case 1: b |= ( ( u64 )in[ 0] ); break;
253 253
         #     case 0: break;
254 254
         # }
255
-        switch ($left) {
255
+        switch ( $left ) {
256 256
             case 7:
257
-                $b[0] |= self::chrToInt($in[6]) << 16;
257
+                $b[ 0 ] |= self::chrToInt( $in[ 6 ] ) << 16;
258 258
             case 6:
259
-                $b[0] |= self::chrToInt($in[5]) << 8;
259
+                $b[ 0 ] |= self::chrToInt( $in[ 5 ] ) << 8;
260 260
             case 5:
261
-                $b[0] |= self::chrToInt($in[4]);
261
+                $b[ 0 ] |= self::chrToInt( $in[ 4 ] );
262 262
             case 4:
263
-                $b[1] |= self::chrToInt($in[3]) << 24;
263
+                $b[ 1 ] |= self::chrToInt( $in[ 3 ] ) << 24;
264 264
             case 3:
265
-                $b[1] |= self::chrToInt($in[2]) << 16;
265
+                $b[ 1 ] |= self::chrToInt( $in[ 2 ] ) << 16;
266 266
             case 2:
267
-                $b[1] |= self::chrToInt($in[1]) << 8;
267
+                $b[ 1 ] |= self::chrToInt( $in[ 1 ] ) << 8;
268 268
             case 1:
269
-                $b[1] |= self::chrToInt($in[0]);
269
+                $b[ 1 ] |= self::chrToInt( $in[ 0 ] );
270 270
             case 0:
271 271
                 break;
272 272
         }
273 273
         // See docblock for why the 0th index gets the higher bits.
274 274
 
275 275
         # v3 ^= b;
276
-        $v[6] ^= $b[0];
277
-        $v[7] ^= $b[1];
276
+        $v[ 6 ] ^= $b[ 0 ];
277
+        $v[ 7 ] ^= $b[ 1 ];
278 278
 
279 279
         # SIPROUND;
280 280
         # SIPROUND;
281
-        $v = self::sipRound($v);
282
-        $v = self::sipRound($v);
281
+        $v = self::sipRound( $v );
282
+        $v = self::sipRound( $v );
283 283
 
284 284
         # v0 ^= b;
285
-        $v[0] ^= $b[0];
286
-        $v[1] ^= $b[1];
285
+        $v[ 0 ] ^= $b[ 0 ];
286
+        $v[ 1 ] ^= $b[ 1 ];
287 287
 
288 288
         // Flip the lower 8 bits of v2 which is ($v[4], $v[5]) in our implementation
289 289
         # v2 ^= 0xff;
290
-        $v[5] ^= 0xff;
290
+        $v[ 5 ] ^= 0xff;
291 291
 
292 292
         # SIPROUND;
293 293
         # SIPROUND;
294 294
         # SIPROUND;
295 295
         # SIPROUND;
296
-        $v = self::sipRound($v);
297
-        $v = self::sipRound($v);
298
-        $v = self::sipRound($v);
299
-        $v = self::sipRound($v);
296
+        $v = self::sipRound( $v );
297
+        $v = self::sipRound( $v );
298
+        $v = self::sipRound( $v );
299
+        $v = self::sipRound( $v );
300 300
 
301 301
         # b = v0 ^ v1 ^ v2 ^ v3;
302 302
         # STORE64_LE( out, b );
303
-        return  self::store32_le($v[1] ^ $v[3] ^ $v[5] ^ $v[7]) .
304
-            self::store32_le($v[0] ^ $v[2] ^ $v[4] ^ $v[6]);
303
+        return  self::store32_le( $v[ 1 ] ^ $v[ 3 ] ^ $v[ 5 ] ^ $v[ 7 ] ) .
304
+            self::store32_le( $v[ 0 ] ^ $v[ 2 ] ^ $v[ 4 ] ^ $v[ 6 ] );
305 305
     }
306 306
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/XChaCha20.php 1 patch
Spacing   +23 added lines, -23 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_XChaCha20', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_XChaCha20', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -19,20 +19,20 @@  discard block
 block discarded – undo
19 19
      * @throws SodiumException
20 20
      * @throws TypeError
21 21
      */
22
-    public static function stream($len = 64, $nonce = '', $key = '')
22
+    public static function stream( $len = 64, $nonce = '', $key = '' )
23 23
     {
24
-        if (self::strlen($nonce) !== 24) {
25
-            throw new SodiumException('Nonce must be 24 bytes long');
24
+        if ( self::strlen( $nonce ) !== 24 ) {
25
+            throw new SodiumException( 'Nonce must be 24 bytes long' );
26 26
         }
27 27
         return self::encryptBytes(
28 28
             new ParagonIE_Sodium_Core_ChaCha20_Ctx(
29 29
                 self::hChaCha20(
30
-                    self::substr($nonce, 0, 16),
30
+                    self::substr( $nonce, 0, 16 ),
31 31
                     $key
32 32
                 ),
33
-                self::substr($nonce, 16, 8)
33
+                self::substr( $nonce, 16, 8 )
34 34
             ),
35
-            str_repeat("\x00", $len)
35
+            str_repeat( "\x00", $len )
36 36
         );
37 37
     }
38 38
 
@@ -46,20 +46,20 @@  discard block
 block discarded – undo
46 46
      * @throws SodiumException
47 47
      * @throws TypeError
48 48
      */
49
-    public static function ietfStream($len = 64, $nonce = '', $key = '')
49
+    public static function ietfStream( $len = 64, $nonce = '', $key = '' )
50 50
     {
51
-        if (self::strlen($nonce) !== 24) {
52
-            throw new SodiumException('Nonce must be 24 bytes long');
51
+        if ( self::strlen( $nonce ) !== 24 ) {
52
+            throw new SodiumException( 'Nonce must be 24 bytes long' );
53 53
         }
54 54
         return self::encryptBytes(
55 55
             new ParagonIE_Sodium_Core_ChaCha20_IetfCtx(
56 56
                 self::hChaCha20(
57
-                    self::substr($nonce, 0, 16),
57
+                    self::substr( $nonce, 0, 16 ),
58 58
                     $key
59 59
                 ),
60
-                "\x00\x00\x00\x00" . self::substr($nonce, 16, 8)
60
+                "\x00\x00\x00\x00" . self::substr( $nonce, 16, 8 )
61 61
             ),
62
-            str_repeat("\x00", $len)
62
+            str_repeat( "\x00", $len )
63 63
         );
64 64
     }
65 65
 
@@ -74,15 +74,15 @@  discard block
 block discarded – undo
74 74
      * @throws SodiumException
75 75
      * @throws TypeError
76 76
      */
77
-    public static function streamXorIc($message, $nonce = '', $key = '', $ic = '')
77
+    public static function streamXorIc( $message, $nonce = '', $key = '', $ic = '' )
78 78
     {
79
-        if (self::strlen($nonce) !== 24) {
80
-            throw new SodiumException('Nonce must be 24 bytes long');
79
+        if ( self::strlen( $nonce ) !== 24 ) {
80
+            throw new SodiumException( 'Nonce must be 24 bytes long' );
81 81
         }
82 82
         return self::encryptBytes(
83 83
             new ParagonIE_Sodium_Core_ChaCha20_Ctx(
84
-                self::hChaCha20(self::substr($nonce, 0, 16), $key),
85
-                self::substr($nonce, 16, 8),
84
+                self::hChaCha20( self::substr( $nonce, 0, 16 ), $key ),
85
+                self::substr( $nonce, 16, 8 ),
86 86
                 $ic
87 87
             ),
88 88
             $message
@@ -100,15 +100,15 @@  discard block
 block discarded – undo
100 100
      * @throws SodiumException
101 101
      * @throws TypeError
102 102
      */
103
-    public static function ietfStreamXorIc($message, $nonce = '', $key = '', $ic = '')
103
+    public static function ietfStreamXorIc( $message, $nonce = '', $key = '', $ic = '' )
104 104
     {
105
-        if (self::strlen($nonce) !== 24) {
106
-            throw new SodiumException('Nonce must be 24 bytes long');
105
+        if ( self::strlen( $nonce ) !== 24 ) {
106
+            throw new SodiumException( 'Nonce must be 24 bytes long' );
107 107
         }
108 108
         return self::encryptBytes(
109 109
             new ParagonIE_Sodium_Core_ChaCha20_IetfCtx(
110
-                self::hChaCha20(self::substr($nonce, 0, 16), $key),
111
-                "\x00\x00\x00\x00" . self::substr($nonce, 16, 8),
110
+                self::hChaCha20( self::substr( $nonce, 0, 16 ), $key ),
111
+                "\x00\x00\x00\x00" . self::substr( $nonce, 16, 8 ),
112 112
                 $ic
113 113
             ),
114 114
             $message
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/X25519.php 1 patch
Spacing   +145 added lines, -145 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_X25519', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_X25519', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -25,57 +25,57 @@  discard block
 block discarded – undo
25 25
         ParagonIE_Sodium_Core_Curve25519_Fe $g,
26 26
         $b = 0
27 27
     ) {
28
-        $f0 = (int) $f[0];
29
-        $f1 = (int) $f[1];
30
-        $f2 = (int) $f[2];
31
-        $f3 = (int) $f[3];
32
-        $f4 = (int) $f[4];
33
-        $f5 = (int) $f[5];
34
-        $f6 = (int) $f[6];
35
-        $f7 = (int) $f[7];
36
-        $f8 = (int) $f[8];
37
-        $f9 = (int) $f[9];
38
-        $g0 = (int) $g[0];
39
-        $g1 = (int) $g[1];
40
-        $g2 = (int) $g[2];
41
-        $g3 = (int) $g[3];
42
-        $g4 = (int) $g[4];
43
-        $g5 = (int) $g[5];
44
-        $g6 = (int) $g[6];
45
-        $g7 = (int) $g[7];
46
-        $g8 = (int) $g[8];
47
-        $g9 = (int) $g[9];
28
+        $f0 = (int)$f[ 0 ];
29
+        $f1 = (int)$f[ 1 ];
30
+        $f2 = (int)$f[ 2 ];
31
+        $f3 = (int)$f[ 3 ];
32
+        $f4 = (int)$f[ 4 ];
33
+        $f5 = (int)$f[ 5 ];
34
+        $f6 = (int)$f[ 6 ];
35
+        $f7 = (int)$f[ 7 ];
36
+        $f8 = (int)$f[ 8 ];
37
+        $f9 = (int)$f[ 9 ];
38
+        $g0 = (int)$g[ 0 ];
39
+        $g1 = (int)$g[ 1 ];
40
+        $g2 = (int)$g[ 2 ];
41
+        $g3 = (int)$g[ 3 ];
42
+        $g4 = (int)$g[ 4 ];
43
+        $g5 = (int)$g[ 5 ];
44
+        $g6 = (int)$g[ 6 ];
45
+        $g7 = (int)$g[ 7 ];
46
+        $g8 = (int)$g[ 8 ];
47
+        $g9 = (int)$g[ 9 ];
48 48
         $b = -$b;
49
-        $x0 = ($f0 ^ $g0) & $b;
50
-        $x1 = ($f1 ^ $g1) & $b;
51
-        $x2 = ($f2 ^ $g2) & $b;
52
-        $x3 = ($f3 ^ $g3) & $b;
53
-        $x4 = ($f4 ^ $g4) & $b;
54
-        $x5 = ($f5 ^ $g5) & $b;
55
-        $x6 = ($f6 ^ $g6) & $b;
56
-        $x7 = ($f7 ^ $g7) & $b;
57
-        $x8 = ($f8 ^ $g8) & $b;
58
-        $x9 = ($f9 ^ $g9) & $b;
59
-        $f[0] = $f0 ^ $x0;
60
-        $f[1] = $f1 ^ $x1;
61
-        $f[2] = $f2 ^ $x2;
62
-        $f[3] = $f3 ^ $x3;
63
-        $f[4] = $f4 ^ $x4;
64
-        $f[5] = $f5 ^ $x5;
65
-        $f[6] = $f6 ^ $x6;
66
-        $f[7] = $f7 ^ $x7;
67
-        $f[8] = $f8 ^ $x8;
68
-        $f[9] = $f9 ^ $x9;
69
-        $g[0] = $g0 ^ $x0;
70
-        $g[1] = $g1 ^ $x1;
71
-        $g[2] = $g2 ^ $x2;
72
-        $g[3] = $g3 ^ $x3;
73
-        $g[4] = $g4 ^ $x4;
74
-        $g[5] = $g5 ^ $x5;
75
-        $g[6] = $g6 ^ $x6;
76
-        $g[7] = $g7 ^ $x7;
77
-        $g[8] = $g8 ^ $x8;
78
-        $g[9] = $g9 ^ $x9;
49
+        $x0 = ( $f0 ^ $g0 ) & $b;
50
+        $x1 = ( $f1 ^ $g1 ) & $b;
51
+        $x2 = ( $f2 ^ $g2 ) & $b;
52
+        $x3 = ( $f3 ^ $g3 ) & $b;
53
+        $x4 = ( $f4 ^ $g4 ) & $b;
54
+        $x5 = ( $f5 ^ $g5 ) & $b;
55
+        $x6 = ( $f6 ^ $g6 ) & $b;
56
+        $x7 = ( $f7 ^ $g7 ) & $b;
57
+        $x8 = ( $f8 ^ $g8 ) & $b;
58
+        $x9 = ( $f9 ^ $g9 ) & $b;
59
+        $f[ 0 ] = $f0 ^ $x0;
60
+        $f[ 1 ] = $f1 ^ $x1;
61
+        $f[ 2 ] = $f2 ^ $x2;
62
+        $f[ 3 ] = $f3 ^ $x3;
63
+        $f[ 4 ] = $f4 ^ $x4;
64
+        $f[ 5 ] = $f5 ^ $x5;
65
+        $f[ 6 ] = $f6 ^ $x6;
66
+        $f[ 7 ] = $f7 ^ $x7;
67
+        $f[ 8 ] = $f8 ^ $x8;
68
+        $f[ 9 ] = $f9 ^ $x9;
69
+        $g[ 0 ] = $g0 ^ $x0;
70
+        $g[ 1 ] = $g1 ^ $x1;
71
+        $g[ 2 ] = $g2 ^ $x2;
72
+        $g[ 3 ] = $g3 ^ $x3;
73
+        $g[ 4 ] = $g4 ^ $x4;
74
+        $g[ 5 ] = $g5 ^ $x5;
75
+        $g[ 6 ] = $g6 ^ $x6;
76
+        $g[ 7 ] = $g7 ^ $x7;
77
+        $g[ 8 ] = $g8 ^ $x8;
78
+        $g[ 9 ] = $g9 ^ $x9;
79 79
     }
80 80
 
81 81
     /**
@@ -84,67 +84,67 @@  discard block
 block discarded – undo
84 84
      * @param ParagonIE_Sodium_Core_Curve25519_Fe $f
85 85
      * @return ParagonIE_Sodium_Core_Curve25519_Fe
86 86
      */
87
-    public static function fe_mul121666(ParagonIE_Sodium_Core_Curve25519_Fe $f)
87
+    public static function fe_mul121666( ParagonIE_Sodium_Core_Curve25519_Fe $f )
88 88
     {
89 89
         $h = array(
90
-            self::mul((int) $f[0], 121666, 17),
91
-            self::mul((int) $f[1], 121666, 17),
92
-            self::mul((int) $f[2], 121666, 17),
93
-            self::mul((int) $f[3], 121666, 17),
94
-            self::mul((int) $f[4], 121666, 17),
95
-            self::mul((int) $f[5], 121666, 17),
96
-            self::mul((int) $f[6], 121666, 17),
97
-            self::mul((int) $f[7], 121666, 17),
98
-            self::mul((int) $f[8], 121666, 17),
99
-            self::mul((int) $f[9], 121666, 17)
90
+            self::mul( (int)$f[ 0 ], 121666, 17 ),
91
+            self::mul( (int)$f[ 1 ], 121666, 17 ),
92
+            self::mul( (int)$f[ 2 ], 121666, 17 ),
93
+            self::mul( (int)$f[ 3 ], 121666, 17 ),
94
+            self::mul( (int)$f[ 4 ], 121666, 17 ),
95
+            self::mul( (int)$f[ 5 ], 121666, 17 ),
96
+            self::mul( (int)$f[ 6 ], 121666, 17 ),
97
+            self::mul( (int)$f[ 7 ], 121666, 17 ),
98
+            self::mul( (int)$f[ 8 ], 121666, 17 ),
99
+            self::mul( (int)$f[ 9 ], 121666, 17 )
100 100
         );
101 101
 
102 102
         /** @var int $carry9 */
103
-        $carry9 = ($h[9] + (1 << 24)) >> 25;
104
-        $h[0] += self::mul($carry9, 19, 5);
105
-        $h[9] -= $carry9 << 25;
103
+        $carry9 = ( $h[ 9 ] + ( 1 << 24 ) ) >> 25;
104
+        $h[ 0 ] += self::mul( $carry9, 19, 5 );
105
+        $h[ 9 ] -= $carry9 << 25;
106 106
         /** @var int $carry1 */
107
-        $carry1 = ($h[1] + (1 << 24)) >> 25;
108
-        $h[2] += $carry1;
109
-        $h[1] -= $carry1 << 25;
107
+        $carry1 = ( $h[ 1 ] + ( 1 << 24 ) ) >> 25;
108
+        $h[ 2 ] += $carry1;
109
+        $h[ 1 ] -= $carry1 << 25;
110 110
         /** @var int $carry3 */
111
-        $carry3 = ($h[3] + (1 << 24)) >> 25;
112
-        $h[4] += $carry3;
113
-        $h[3] -= $carry3 << 25;
111
+        $carry3 = ( $h[ 3 ] + ( 1 << 24 ) ) >> 25;
112
+        $h[ 4 ] += $carry3;
113
+        $h[ 3 ] -= $carry3 << 25;
114 114
         /** @var int $carry5 */
115
-        $carry5 = ($h[5] + (1 << 24)) >> 25;
116
-        $h[6] += $carry5;
117
-        $h[5] -= $carry5 << 25;
115
+        $carry5 = ( $h[ 5 ] + ( 1 << 24 ) ) >> 25;
116
+        $h[ 6 ] += $carry5;
117
+        $h[ 5 ] -= $carry5 << 25;
118 118
         /** @var int $carry7 */
119
-        $carry7 = ($h[7] + (1 << 24)) >> 25;
120
-        $h[8] += $carry7;
121
-        $h[7] -= $carry7 << 25;
119
+        $carry7 = ( $h[ 7 ] + ( 1 << 24 ) ) >> 25;
120
+        $h[ 8 ] += $carry7;
121
+        $h[ 7 ] -= $carry7 << 25;
122 122
 
123 123
         /** @var int $carry0 */
124
-        $carry0 = ($h[0] + (1 << 25)) >> 26;
125
-        $h[1] += $carry0;
126
-        $h[0] -= $carry0 << 26;
124
+        $carry0 = ( $h[ 0 ] + ( 1 << 25 ) ) >> 26;
125
+        $h[ 1 ] += $carry0;
126
+        $h[ 0 ] -= $carry0 << 26;
127 127
         /** @var int $carry2 */
128
-        $carry2 = ($h[2] + (1 << 25)) >> 26;
129
-        $h[3] += $carry2;
130
-        $h[2] -= $carry2 << 26;
128
+        $carry2 = ( $h[ 2 ] + ( 1 << 25 ) ) >> 26;
129
+        $h[ 3 ] += $carry2;
130
+        $h[ 2 ] -= $carry2 << 26;
131 131
         /** @var int $carry4 */
132
-        $carry4 = ($h[4] + (1 << 25)) >> 26;
133
-        $h[5] += $carry4;
134
-        $h[4] -= $carry4 << 26;
132
+        $carry4 = ( $h[ 4 ] + ( 1 << 25 ) ) >> 26;
133
+        $h[ 5 ] += $carry4;
134
+        $h[ 4 ] -= $carry4 << 26;
135 135
         /** @var int $carry6 */
136
-        $carry6 = ($h[6] + (1 << 25)) >> 26;
137
-        $h[7] += $carry6;
138
-        $h[6] -= $carry6 << 26;
136
+        $carry6 = ( $h[ 6 ] + ( 1 << 25 ) ) >> 26;
137
+        $h[ 7 ] += $carry6;
138
+        $h[ 6 ] -= $carry6 << 26;
139 139
         /** @var int $carry8 */
140
-        $carry8 = ($h[8] + (1 << 25)) >> 26;
141
-        $h[9] += $carry8;
142
-        $h[8] -= $carry8 << 26;
140
+        $carry8 = ( $h[ 8 ] + ( 1 << 25 ) ) >> 26;
141
+        $h[ 9 ] += $carry8;
142
+        $h[ 8 ] -= $carry8 << 26;
143 143
 
144
-        foreach ($h as $i => $value) {
145
-            $h[$i] = (int) $value;
144
+        foreach ( $h as $i => $value ) {
145
+            $h[ $i ] = (int)$value;
146 146
         }
147
-        return ParagonIE_Sodium_Core_Curve25519_Fe::fromArray($h);
147
+        return ParagonIE_Sodium_Core_Curve25519_Fe::fromArray( $h );
148 148
     }
149 149
 
150 150
     /**
@@ -158,27 +158,27 @@  discard block
 block discarded – undo
158 158
      * @throws SodiumException
159 159
      * @throws TypeError
160 160
      */
161
-    public static function crypto_scalarmult_curve25519_ref10($n, $p)
161
+    public static function crypto_scalarmult_curve25519_ref10( $n, $p )
162 162
     {
163 163
         # for (i = 0;i < 32;++i) e[i] = n[i];
164 164
         $e = '' . $n;
165 165
         # e[0] &= 248;
166
-        $e[0] = self::intToChr(
167
-            self::chrToInt($e[0]) & 248
166
+        $e[ 0 ] = self::intToChr(
167
+            self::chrToInt( $e[ 0 ] ) & 248
168 168
         );
169 169
         # e[31] &= 127;
170 170
         # e[31] |= 64;
171
-        $e[31] = self::intToChr(
172
-            (self::chrToInt($e[31]) & 127) | 64
171
+        $e[ 31 ] = self::intToChr(
172
+            ( self::chrToInt( $e[ 31 ] ) & 127 ) | 64
173 173
         );
174 174
         # fe_frombytes(x1,p);
175
-        $x1 = self::fe_frombytes($p);
175
+        $x1 = self::fe_frombytes( $p );
176 176
         # fe_1(x2);
177 177
         $x2 = self::fe_1();
178 178
         # fe_0(z2);
179 179
         $z2 = self::fe_0();
180 180
         # fe_copy(x3,x1);
181
-        $x3 = self::fe_copy($x1);
181
+        $x3 = self::fe_copy( $x1 );
182 182
         # fe_1(z3);
183 183
         $z3 = self::fe_1();
184 184
 
@@ -187,89 +187,89 @@  discard block
 block discarded – undo
187 187
         $swap = 0;
188 188
 
189 189
         # for (pos = 254;pos >= 0;--pos) {
190
-        for ($pos = 254; $pos >= 0; --$pos) {
190
+        for ( $pos = 254; $pos >= 0; --$pos ) {
191 191
             # b = e[pos / 8] >> (pos & 7);
192 192
             /** @var int $b */
193 193
             $b = self::chrToInt(
194
-                    $e[(int) floor($pos / 8)]
195
-                ) >> ($pos & 7);
194
+                    $e[ (int)floor( $pos / 8 ) ]
195
+                ) >> ( $pos & 7 );
196 196
             # b &= 1;
197 197
             $b &= 1;
198 198
             # swap ^= b;
199 199
             $swap ^= $b;
200 200
             # fe_cswap(x2,x3,swap);
201
-            self::fe_cswap($x2, $x3, $swap);
201
+            self::fe_cswap( $x2, $x3, $swap );
202 202
             # fe_cswap(z2,z3,swap);
203
-            self::fe_cswap($z2, $z3, $swap);
203
+            self::fe_cswap( $z2, $z3, $swap );
204 204
             # swap = b;
205 205
             $swap = $b;
206 206
             # fe_sub(tmp0,x3,z3);
207
-            $tmp0 = self::fe_sub($x3, $z3);
207
+            $tmp0 = self::fe_sub( $x3, $z3 );
208 208
             # fe_sub(tmp1,x2,z2);
209
-            $tmp1 = self::fe_sub($x2, $z2);
209
+            $tmp1 = self::fe_sub( $x2, $z2 );
210 210
 
211 211
             # fe_add(x2,x2,z2);
212
-            $x2 = self::fe_add($x2, $z2);
212
+            $x2 = self::fe_add( $x2, $z2 );
213 213
 
214 214
             # fe_add(z2,x3,z3);
215
-            $z2 = self::fe_add($x3, $z3);
215
+            $z2 = self::fe_add( $x3, $z3 );
216 216
 
217 217
             # fe_mul(z3,tmp0,x2);
218
-            $z3 = self::fe_mul($tmp0, $x2);
218
+            $z3 = self::fe_mul( $tmp0, $x2 );
219 219
 
220 220
             # fe_mul(z2,z2,tmp1);
221
-            $z2 = self::fe_mul($z2, $tmp1);
221
+            $z2 = self::fe_mul( $z2, $tmp1 );
222 222
 
223 223
             # fe_sq(tmp0,tmp1);
224
-            $tmp0 = self::fe_sq($tmp1);
224
+            $tmp0 = self::fe_sq( $tmp1 );
225 225
 
226 226
             # fe_sq(tmp1,x2);
227
-            $tmp1 = self::fe_sq($x2);
227
+            $tmp1 = self::fe_sq( $x2 );
228 228
 
229 229
             # fe_add(x3,z3,z2);
230
-            $x3 = self::fe_add($z3, $z2);
230
+            $x3 = self::fe_add( $z3, $z2 );
231 231
 
232 232
             # fe_sub(z2,z3,z2);
233
-            $z2 = self::fe_sub($z3, $z2);
233
+            $z2 = self::fe_sub( $z3, $z2 );
234 234
 
235 235
             # fe_mul(x2,tmp1,tmp0);
236
-            $x2 = self::fe_mul($tmp1, $tmp0);
236
+            $x2 = self::fe_mul( $tmp1, $tmp0 );
237 237
 
238 238
             # fe_sub(tmp1,tmp1,tmp0);
239
-            $tmp1 = self::fe_sub($tmp1, $tmp0);
239
+            $tmp1 = self::fe_sub( $tmp1, $tmp0 );
240 240
 
241 241
             # fe_sq(z2,z2);
242
-            $z2 = self::fe_sq($z2);
242
+            $z2 = self::fe_sq( $z2 );
243 243
 
244 244
             # fe_mul121666(z3,tmp1);
245
-            $z3 = self::fe_mul121666($tmp1);
245
+            $z3 = self::fe_mul121666( $tmp1 );
246 246
 
247 247
             # fe_sq(x3,x3);
248
-            $x3 = self::fe_sq($x3);
248
+            $x3 = self::fe_sq( $x3 );
249 249
 
250 250
             # fe_add(tmp0,tmp0,z3);
251
-            $tmp0 = self::fe_add($tmp0, $z3);
251
+            $tmp0 = self::fe_add( $tmp0, $z3 );
252 252
 
253 253
             # fe_mul(z3,x1,z2);
254
-            $z3 = self::fe_mul($x1, $z2);
254
+            $z3 = self::fe_mul( $x1, $z2 );
255 255
 
256 256
             # fe_mul(z2,tmp1,tmp0);
257
-            $z2 = self::fe_mul($tmp1, $tmp0);
257
+            $z2 = self::fe_mul( $tmp1, $tmp0 );
258 258
         }
259 259
 
260 260
         # fe_cswap(x2,x3,swap);
261
-        self::fe_cswap($x2, $x3, $swap);
261
+        self::fe_cswap( $x2, $x3, $swap );
262 262
 
263 263
         # fe_cswap(z2,z3,swap);
264
-        self::fe_cswap($z2, $z3, $swap);
264
+        self::fe_cswap( $z2, $z3, $swap );
265 265
 
266 266
         # fe_invert(z2,z2);
267
-        $z2 = self::fe_invert($z2);
267
+        $z2 = self::fe_invert( $z2 );
268 268
 
269 269
         # fe_mul(x2,x2,z2);
270
-        $x2 = self::fe_mul($x2, $z2);
270
+        $x2 = self::fe_mul( $x2, $z2 );
271 271
         # fe_tobytes(q,x2);
272
-        return self::fe_tobytes($x2);
272
+        return self::fe_tobytes( $x2 );
273 273
     }
274 274
 
275 275
     /**
@@ -283,10 +283,10 @@  discard block
 block discarded – undo
283 283
         ParagonIE_Sodium_Core_Curve25519_Fe $edwardsY,
284 284
         ParagonIE_Sodium_Core_Curve25519_Fe $edwardsZ
285 285
     ) {
286
-        $tempX = self::fe_add($edwardsZ, $edwardsY);
287
-        $tempZ = self::fe_sub($edwardsZ, $edwardsY);
288
-        $tempZ = self::fe_invert($tempZ);
289
-        return self::fe_mul($tempX, $tempZ);
286
+        $tempX = self::fe_add( $edwardsZ, $edwardsY );
287
+        $tempZ = self::fe_sub( $edwardsZ, $edwardsY );
288
+        $tempZ = self::fe_invert( $tempZ );
289
+        return self::fe_mul( $tempX, $tempZ );
290 290
     }
291 291
 
292 292
     /**
@@ -297,31 +297,31 @@  discard block
 block discarded – undo
297 297
      * @throws SodiumException
298 298
      * @throws TypeError
299 299
      */
300
-    public static function crypto_scalarmult_curve25519_ref10_base($n)
300
+    public static function crypto_scalarmult_curve25519_ref10_base( $n )
301 301
     {
302 302
         # for (i = 0;i < 32;++i) e[i] = n[i];
303 303
         $e = '' . $n;
304 304
 
305 305
         # e[0] &= 248;
306
-        $e[0] = self::intToChr(
307
-            self::chrToInt($e[0]) & 248
306
+        $e[ 0 ] = self::intToChr(
307
+            self::chrToInt( $e[ 0 ] ) & 248
308 308
         );
309 309
 
310 310
         # e[31] &= 127;
311 311
         # e[31] |= 64;
312
-        $e[31] = self::intToChr(
313
-            (self::chrToInt($e[31]) & 127) | 64
312
+        $e[ 31 ] = self::intToChr(
313
+            ( self::chrToInt( $e[ 31 ] ) & 127 ) | 64
314 314
         );
315 315
 
316
-        $A = self::ge_scalarmult_base($e);
316
+        $A = self::ge_scalarmult_base( $e );
317 317
         if (
318
-            !($A->Y instanceof ParagonIE_Sodium_Core_Curve25519_Fe)
318
+            ! ( $A->Y instanceof ParagonIE_Sodium_Core_Curve25519_Fe )
319 319
                 ||
320
-            !($A->Z instanceof ParagonIE_Sodium_Core_Curve25519_Fe)
320
+            ! ( $A->Z instanceof ParagonIE_Sodium_Core_Curve25519_Fe )
321 321
         ) {
322
-            throw new TypeError('Null points encountered');
322
+            throw new TypeError( 'Null points encountered' );
323 323
         }
324
-        $pk = self::edwards_to_montgomery($A->Y, $A->Z);
325
-        return self::fe_tobytes($pk);
324
+        $pk = self::edwards_to_montgomery( $A->Y, $A->Z );
325
+        return self::fe_tobytes( $pk );
326 326
     }
327 327
 }
Please login to merge, or discard this patch.
vendor/paragonie/sodium_compat/src/Core/Poly1305.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-if (class_exists('ParagonIE_Sodium_Core_Poly1305', false)) {
3
+if ( class_exists( 'ParagonIE_Sodium_Core_Poly1305', false ) ) {
4 4
     return;
5 5
 }
6 6
 
@@ -20,18 +20,18 @@  discard block
 block discarded – undo
20 20
      * @throws SodiumException
21 21
      * @throws TypeError
22 22
      */
23
-    public static function onetimeauth($m, $key)
23
+    public static function onetimeauth( $m, $key )
24 24
     {
25
-        if (self::strlen($key) < 32) {
25
+        if ( self::strlen( $key ) < 32 ) {
26 26
             throw new InvalidArgumentException(
27 27
                 'Key must be 32 bytes long.'
28 28
             );
29 29
         }
30 30
         $state = new ParagonIE_Sodium_Core_Poly1305_State(
31
-            self::substr($key, 0, 32)
31
+            self::substr( $key, 0, 32 )
32 32
         );
33 33
         return $state
34
-            ->update($m)
34
+            ->update( $m )
35 35
             ->finish();
36 36
     }
37 37
 
@@ -45,19 +45,19 @@  discard block
 block discarded – undo
45 45
      * @throws SodiumException
46 46
      * @throws TypeError
47 47
      */
48
-    public static function onetimeauth_verify($mac, $m, $key)
48
+    public static function onetimeauth_verify( $mac, $m, $key )
49 49
     {
50
-        if (self::strlen($key) < 32) {
50
+        if ( self::strlen( $key ) < 32 ) {
51 51
             throw new InvalidArgumentException(
52 52
                 'Key must be 32 bytes long.'
53 53
             );
54 54
         }
55 55
         $state = new ParagonIE_Sodium_Core_Poly1305_State(
56
-            self::substr($key, 0, 32)
56
+            self::substr( $key, 0, 32 )
57 57
         );
58 58
         $calc = $state
59
-            ->update($m)
59
+            ->update( $m )
60 60
             ->finish();
61
-        return self::verify_16($calc, $mac);
61
+        return self::verify_16( $calc, $mac );
62 62
     }
63 63
 }
Please login to merge, or discard this patch.