@@ -172,7 +172,7 @@ |
||
| 172 | 172 | $startBlock = \floor(($this->position - $this->header->metadataSize) / $this->header->extentSize); |
| 173 | 173 | |
| 174 | 174 | $return = ''; |
| 175 | - for ($i=0; $i<$readBlocks && !$this->stream_eof(); $i++) { |
|
| 175 | + for ($i = 0; $i < $readBlocks && !$this->stream_eof(); $i++) { |
|
| 176 | 176 | $block = $startBlock + $i; |
| 177 | 177 | $iv = \hash("md5", $this->header->rootIv . \str_pad("$block", 16, "\0", \STR_PAD_RIGHT), true); |
| 178 | 178 | |
@@ -121,9 +121,7 @@ |
||
| 121 | 121 | // Use stream from context or open file |
| 122 | 122 | if (\array_key_exists(self::CONTEXT_STREAM, $myContext)) { |
| 123 | 123 | $this->encrypted = $myContext[self::CONTEXT_STREAM]; |
| 124 | - } |
|
| 125 | - |
|
| 126 | - else { |
|
| 124 | + } else { |
|
| 127 | 125 | $prefix = self::STREAM_NAME . '://'; |
| 128 | 126 | |
| 129 | 127 | if (\substr($path, 0, \strlen($prefix)) !== $prefix) { |
@@ -65,7 +65,7 @@ discard block |
||
| 65 | 65 | { |
| 66 | 66 | $key = \hash(self::KEY_DERIVATION_ALGO, \substr($salt, 0, ECRYPTFS_SALT_SIZE) . $passPhrase, true); |
| 67 | 67 | |
| 68 | - for ($i=1; $i<self::DEFAULT_NUM_HASH_ITERATIONS; $i++) { |
|
| 68 | + for ($i = 1; $i < self::DEFAULT_NUM_HASH_ITERATIONS; $i++) { |
|
| 69 | 69 | $key = \hash(self::KEY_DERIVATION_ALGO, $key, true); |
| 70 | 70 | } |
| 71 | 71 | |
@@ -120,7 +120,7 @@ discard block |
||
| 120 | 120 | * @return int |
| 121 | 121 | * @throws ParseException |
| 122 | 122 | */ |
| 123 | - final public static function parseTagPacketLength(string $data, int &$pos = 0) : int |
|
| 123 | + final public static function parseTagPacketLength(string $data, int & $pos = 0) : int |
|
| 124 | 124 | { |
| 125 | 125 | $packetSize = \ord($data[$pos]); |
| 126 | 126 | if ($packetSize > 224) { |
@@ -150,7 +150,7 @@ discard block |
||
| 150 | 150 | throw new \InvalidArgumentException("Length must be an unsigned integer."); |
| 151 | 151 | } |
| 152 | 152 | |
| 153 | - if ($length > (32*256 + 255)) { |
|
| 153 | + if ($length > (32 * 256 + 255)) { |
|
| 154 | 154 | throw new \InvalidArgumentException("Length too large."); |
| 155 | 155 | } |
| 156 | 156 | |
@@ -173,7 +173,7 @@ discard block |
||
| 173 | 173 | */ |
| 174 | 174 | public static function isEncryptedFilename(string $filename) : bool |
| 175 | 175 | { |
| 176 | - return (\substr(\basename($filename), 0, \strlen(self::FNEK_ENCRYPTED_FILENAME_PREFIX )) === self::FNEK_ENCRYPTED_FILENAME_PREFIX); |
|
| 176 | + return (\substr(\basename($filename), 0, \strlen(self::FNEK_ENCRYPTED_FILENAME_PREFIX)) === self::FNEK_ENCRYPTED_FILENAME_PREFIX); |
|
| 177 | 177 | } |
| 178 | 178 | |
| 179 | 179 | |
@@ -192,7 +192,7 @@ discard block |
||
| 192 | 192 | public static function encryptFilename(CryptoEngineInterface $cryptoEngine, string $filename, string $fnek, int $cipherCode = Tag70Packet::DEFAULT_CIPHER, int $cipherKeySize = null) : string |
| 193 | 193 | { |
| 194 | 194 | $tag = Tag70Packet::generate($cryptoEngine, $filename, $fnek, $cipherCode, $cipherKeySize); |
| 195 | - return self::FNEK_ENCRYPTED_FILENAME_PREFIX . BaseConverter::encode($tag->dump()); |
|
| 195 | + return self::FNEK_ENCRYPTED_FILENAME_PREFIX . BaseConverter::encode($tag->dump()); |
|
| 196 | 196 | } |
| 197 | 197 | |
| 198 | 198 | |
@@ -206,7 +206,7 @@ discard block |
||
| 206 | 206 | } |
| 207 | 207 | |
| 208 | 208 | $dirname = \dirname($filename); |
| 209 | - $decoded = BaseConverter::decode(\substr(\basename($filename), \strlen(self::FNEK_ENCRYPTED_FILENAME_PREFIX ))); |
|
| 209 | + $decoded = BaseConverter::decode(\substr(\basename($filename), \strlen(self::FNEK_ENCRYPTED_FILENAME_PREFIX))); |
|
| 210 | 210 | $tag = Tag70Packet::parse($decoded); |
| 211 | 211 | $tag->decrypt($cryptoEngine, $key); |
| 212 | 212 | |