@@ -64,7 +64,7 @@ discard block |
||
64 | 64 | private $position; |
65 | 65 | |
66 | 66 | |
67 | - public function stream_open(string $path, string $mode, int $options, string &$opened_path = null) : bool |
|
67 | + public function stream_open(string $path, string $mode, int $options, string & $opened_path = null) : bool |
|
68 | 68 | { |
69 | 69 | $prefix = self::STREAM_NAME . '://'; |
70 | 70 | |
@@ -135,7 +135,7 @@ discard block |
||
135 | 135 | $startBlock = \floor(($this->position - $this->header->metadataSize) / $this->header->extentSize); |
136 | 136 | |
137 | 137 | $return = ''; |
138 | - for ($i=0; $i<$readBlocks && !$this->stream_eof(); $i++) { |
|
138 | + for ($i = 0; $i < $readBlocks && !$this->stream_eof(); $i++) { |
|
139 | 139 | $block = $startBlock + $i; |
140 | 140 | $iv = \hash("md5", $this->header->rootIv . \str_pad("$block", 16, "\0", \STR_PAD_RIGHT), true); |
141 | 141 |
@@ -33,7 +33,7 @@ discard block |
||
33 | 33 | |
34 | 34 | $cipher = self::CIPHER_MAPPING[$cipherCode]; |
35 | 35 | |
36 | - if (false === ($encrypted = \openssl_encrypt($data, $cipher, $key, \OPENSSL_RAW_DATA|\OPENSSL_NO_PADDING, $iv))) { |
|
36 | + if (false === ($encrypted = \openssl_encrypt($data, $cipher, $key, \OPENSSL_RAW_DATA | \OPENSSL_NO_PADDING, $iv))) { |
|
37 | 37 | throw new \RuntimeException("Encryption failed with error: " . \openssl_error_string()); |
38 | 38 | } |
39 | 39 | |
@@ -56,7 +56,7 @@ discard block |
||
56 | 56 | |
57 | 57 | $cipher = self::CIPHER_MAPPING[$cipherCode]; |
58 | 58 | |
59 | - if (false === ($decrypted = \openssl_decrypt($data, $cipher, $key, \OPENSSL_RAW_DATA|\OPENSSL_NO_PADDING, $iv))) { |
|
59 | + if (false === ($decrypted = \openssl_decrypt($data, $cipher, $key, \OPENSSL_RAW_DATA | \OPENSSL_NO_PADDING, $iv))) { |
|
60 | 60 | throw new \RuntimeException("Decryption failed with error: " . \openssl_error_string()); |
61 | 61 | } |
62 | 62 |
@@ -52,7 +52,7 @@ discard block |
||
52 | 52 | $dstByteOffset = 0; |
53 | 53 | $dst = []; |
54 | 54 | |
55 | - for ($srcByteOffset=0; $srcByteOffset<$srcSize; $srcByteOffset++) { |
|
55 | + for ($srcByteOffset = 0; $srcByteOffset < $srcSize; $srcByteOffset++) { |
|
56 | 56 | $byte = self::FILENAME_REVERSE_MAPPING[\ord($encoded[$srcByteOffset])]; |
57 | 57 | |
58 | 58 | switch ($currentBitOffset) { |
@@ -100,11 +100,11 @@ discard block |
||
100 | 100 | } |
101 | 101 | |
102 | 102 | $encoded = ''; |
103 | - for ($i=0; $i<$inputLength; $i+=3) { |
|
103 | + for ($i = 0; $i < $inputLength; $i += 3) { |
|
104 | 104 | $code1 = (\ord($decoded[$i]) >> 2) & 0x3F; |
105 | - $code2 = ((\ord($decoded[$i]) << 4) & 0x30) | ((\ord($decoded[$i+1]) >> 4) & 0x0F); |
|
106 | - $code3 = ((\ord($decoded[$i+1]) << 2) & 0x3C) | ((\ord($decoded[$i+2]) >> 6) & 0x03); |
|
107 | - $code4 = \ord($decoded[$i+2]) & 0x3F; |
|
105 | + $code2 = ((\ord($decoded[$i]) << 4) & 0x30) | ((\ord($decoded[$i + 1]) >> 4) & 0x0F); |
|
106 | + $code3 = ((\ord($decoded[$i + 1]) << 2) & 0x3C) | ((\ord($decoded[$i + 2]) >> 6) & 0x03); |
|
107 | + $code4 = \ord($decoded[$i + 2]) & 0x3F; |
|
108 | 108 | |
109 | 109 | $encoded .= self::PORTABLE_FILENAME_CHARS[$code1]; |
110 | 110 | $encoded .= self::PORTABLE_FILENAME_CHARS[$code2]; |
@@ -65,7 +65,7 @@ discard block |
||
65 | 65 | { |
66 | 66 | $key = \hash(self::KEY_DERIVATION_ALGO, \substr($salt, 0, ECRYPTFS_SALT_SIZE) . $passPhrase, true); |
67 | 67 | |
68 | - for ($i=1; $i<self::DEFAULT_NUM_HASH_ITERATIONS; $i++) { |
|
68 | + for ($i = 1; $i < self::DEFAULT_NUM_HASH_ITERATIONS; $i++) { |
|
69 | 69 | $key = \hash(self::KEY_DERIVATION_ALGO, $key, true); |
70 | 70 | } |
71 | 71 | |
@@ -119,7 +119,7 @@ discard block |
||
119 | 119 | * @param int $pos |
120 | 120 | * @return int |
121 | 121 | */ |
122 | - final public static function parseTagPacketLength(string $data, int &$pos = 0) : int |
|
122 | + final public static function parseTagPacketLength(string $data, int & $pos = 0) : int |
|
123 | 123 | { |
124 | 124 | $packetSize = \ord($data[$pos]); |
125 | 125 | if ($packetSize > 224) { |
@@ -149,7 +149,7 @@ discard block |
||
149 | 149 | throw new \InvalidArgumentException("Length must be an unsigned integer."); |
150 | 150 | } |
151 | 151 | |
152 | - if ($length > (32*256 + 255)) { |
|
152 | + if ($length > (32 * 256 + 255)) { |
|
153 | 153 | throw new \InvalidArgumentException("Length too large."); |
154 | 154 | } |
155 | 155 | |
@@ -172,7 +172,7 @@ discard block |
||
172 | 172 | */ |
173 | 173 | public static function isEncryptedFilename(string $filename) : bool |
174 | 174 | { |
175 | - return (\substr(\basename($filename), 0, \strlen(self::FNEK_ENCRYPTED_FILENAME_PREFIX )) === self::FNEK_ENCRYPTED_FILENAME_PREFIX); |
|
175 | + return (\substr(\basename($filename), 0, \strlen(self::FNEK_ENCRYPTED_FILENAME_PREFIX)) === self::FNEK_ENCRYPTED_FILENAME_PREFIX); |
|
176 | 176 | } |
177 | 177 | |
178 | 178 | |
@@ -191,7 +191,7 @@ discard block |
||
191 | 191 | public static function encryptFilename(CryptoEngineInterface $cryptoEngine, string $filename, string $fnek, int $cipherCode = Tag70Packet::DEFAULT_CIPHER, int $cipherKeySize = null) : string |
192 | 192 | { |
193 | 193 | $tag = Tag70Packet::generate($cryptoEngine, $filename, $fnek, $cipherCode, $cipherKeySize); |
194 | - return self::FNEK_ENCRYPTED_FILENAME_PREFIX . BaseConverter::encode($tag->dump()); |
|
194 | + return self::FNEK_ENCRYPTED_FILENAME_PREFIX . BaseConverter::encode($tag->dump()); |
|
195 | 195 | } |
196 | 196 | |
197 | 197 | |
@@ -205,7 +205,7 @@ discard block |
||
205 | 205 | } |
206 | 206 | |
207 | 207 | $dirname = \dirname($filename); |
208 | - $decoded = BaseConverter::decode(\substr(\basename($filename), \strlen(self::FNEK_ENCRYPTED_FILENAME_PREFIX ))); |
|
208 | + $decoded = BaseConverter::decode(\substr(\basename($filename), \strlen(self::FNEK_ENCRYPTED_FILENAME_PREFIX))); |
|
209 | 209 | $tag = Tag70Packet::parse($decoded); |
210 | 210 | $tag->decrypt($cryptoEngine, $key); |
211 | 211 |
@@ -111,7 +111,7 @@ discard block |
||
111 | 111 | public function generate() : string |
112 | 112 | { |
113 | 113 | return |
114 | - \chr(Tag3Packet::PACKET_TYPE) |
|
114 | + \chr(Tag3Packet::PACKET_TYPE) |
|
115 | 115 | . Util::generateTagPacketLength(\strlen($this->encryptedKey) + ECRYPTFS_SALT_SIZE + 5) |
116 | 116 | . \chr(Tag3Packet::PACKET_VERSION) |
117 | 117 | . \chr($this->cipherCode) |
@@ -175,7 +175,7 @@ discard block |
||
175 | 175 | $cur += ECRYPTFS_SALT_SIZE; |
176 | 176 | |
177 | 177 | /* This conversion was taken straight from RFC2440 */ |
178 | - $hashIterations = (16 + (\ord($data[$cur]) & 15)) << ((\ord($data[$cur]) >> 4) + 6); |
|
178 | + $hashIterations = (16 + (\ord($data[$cur]) & 15)) << ((\ord($data[$cur]) >> 4) + 6); |
|
179 | 179 | $cur++; |
180 | 180 | |
181 | 181 | $encryptedKey = \substr($data, $cur, $encryptedKeySize); |
@@ -132,7 +132,7 @@ |
||
132 | 132 | * |
133 | 133 | * @link https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/tree/fs/ecryptfs/keystore.c?h=v4.11.3#n1360 |
134 | 134 | */ |
135 | - public static function parse(string $data, int &$pos = 0) : self |
|
135 | + public static function parse(string $data, int & $pos = 0) : self |
|
136 | 136 | { |
137 | 137 | $cur = $pos; |
138 | 138 |
@@ -123,7 +123,7 @@ |
||
123 | 123 | $header->encryptedFileKey = $tag3->encryptedKey; |
124 | 124 | |
125 | 125 | if (!\in_array(\strlen($header->encryptedFileKey), CryptoEngineInterface::CIPHER_KEY_SIZES[$header->cipherCode])) { |
126 | - throw new \RuntimeException(\sprintf("Invalid key size (%u bit) for cipher 0x%x detected, file header may be corrupt!", \strlen($header->encryptedFileKey)*8, $header->cipherCode)); |
|
126 | + throw new \RuntimeException(\sprintf("Invalid key size (%u bit) for cipher 0x%x detected, file header may be corrupt!", \strlen($header->encryptedFileKey) * 8, $header->cipherCode)); |
|
127 | 127 | } |
128 | 128 | |
129 | 129 | return $header; |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | . \chr(self::FORMAT_SPECIFIER) |
62 | 62 | . \chr(\strlen(self::PACKET_FILENAME)) |
63 | 63 | . self::PACKET_FILENAME |
64 | - . \chr(0).\chr(0).\chr(0).\chr(0) |
|
64 | + . \chr(0) . \chr(0) . \chr(0) . \chr(0) |
|
65 | 65 | . $this->contents |
66 | 66 | ; |
67 | 67 | } |
@@ -71,12 +71,12 @@ discard block |
||
71 | 71 | * Try to parse a Tag11 packet from the supplied data string. |
72 | 72 | * If the parsing was successfully, $pos will be incremented to point after the parsed data. |
73 | 73 | */ |
74 | - public static function parse(string $data, int &$pos = 0) : self |
|
74 | + public static function parse(string $data, int & $pos = 0) : self |
|
75 | 75 | { |
76 | 76 | $cur = $pos; |
77 | 77 | $remaining = \strlen($data) - $cur; |
78 | 78 | |
79 | - if ($remaining < self::MIN_PACKET_LENGTH+2) { |
|
79 | + if ($remaining < self::MIN_PACKET_LENGTH + 2) { |
|
80 | 80 | throw new ParseException('Not enough data available to read for minimum packet length.'); |
81 | 81 | } |
82 | 82 | |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | } |
111 | 111 | $cur += $filenameLength; |
112 | 112 | |
113 | - if (\substr($data, $cur, 4) !== \chr(0).\chr(0).\chr(0).\chr(0)) { |
|
113 | + if (\substr($data, $cur, 4) !== \chr(0) . \chr(0) . \chr(0) . \chr(0)) { |
|
114 | 114 | throw new ParseException('Expected file date to be zero.'); |
115 | 115 | } |
116 | 116 | $cur += 4; |
@@ -182,7 +182,7 @@ discard block |
||
182 | 182 | } |
183 | 183 | |
184 | 184 | if (!$correctKeySize) { |
185 | - throw new \RuntimeException(\sprintf("Unable to decrypt filename, filename encryption key (FNEK) invalid or invalid key length for cipher 0x%x, tested key sizes: (%s)", $this->cipherCode, \implode(', ', \array_map(function($bytes) { return $bytes*8; }, $possibleCipherKeySizes)))); |
|
185 | + throw new \RuntimeException(\sprintf("Unable to decrypt filename, filename encryption key (FNEK) invalid or invalid key length for cipher 0x%x, tested key sizes: (%s)", $this->cipherCode, \implode(', ', \array_map(function($bytes) { return $bytes * 8; }, $possibleCipherKeySizes)))); |
|
186 | 186 | } |
187 | 187 | |
188 | 188 | list($this->padding, $this->decryptedFilename) = \explode("\0", $decrypted, 2); |
@@ -264,7 +264,7 @@ discard block |
||
264 | 264 | $prefix = ''; |
265 | 265 | $hash = $fnek; |
266 | 266 | |
267 | - for ($i=0; $i<\ceil($requiredBytes / self::DIGEST_SIZE); $i++) { |
|
267 | + for ($i = 0; $i < \ceil($requiredBytes / self::DIGEST_SIZE); $i++) { |
|
268 | 268 | $hash = \hash(self::DIGEST, $hash, true); |
269 | 269 | $prefix .= $hash; |
270 | 270 | } |
@@ -291,7 +291,7 @@ discard block |
||
291 | 291 | * |
292 | 292 | * @link https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/tree/fs/ecryptfs/keystore.c?h=v4.11.3#n892 |
293 | 293 | */ |
294 | - public static function parse(string $data, int &$pos = 0) : self |
|
294 | + public static function parse(string $data, int & $pos = 0) : self |
|
295 | 295 | { |
296 | 296 | $cur = $pos; |
297 | 297 | $tag = new self(); |
@@ -205,13 +205,9 @@ |
||
205 | 205 | { |
206 | 206 | if ($cipherKeySize === null) { |
207 | 207 | $cipherKeySize = Util::findCipherKeySize($cipherCode, \strlen($fnek)); |
208 | - } |
|
209 | - |
|
210 | - elseif (\strlen($fnek) < $cipherKeySize) { |
|
208 | + } elseif (\strlen($fnek) < $cipherKeySize) { |
|
211 | 209 | throw new \InvalidArgumentException(\şprintf("Supplied key has only %u bytes but %u bytes required for encryption.", \strlen($$fnek), $cipherKeySize)); |
212 | - } |
|
213 | - |
|
214 | - elseif (!\in_array($cipherKeySize, CryptoEngineInterface::CIPHER_KEY_SIZES[$cipherCode])) { |
|
210 | + } elseif (!\in_array($cipherKeySize, CryptoEngineInterface::CIPHER_KEY_SIZES[$cipherCode])) { |
|
215 | 211 | throw new \InvalidArgumentException(\şprintf("Requested key size %u bytes is unsupported for cipher 0x%x.", $cipherKeySize, $cipherCode)); |
216 | 212 | } |
217 | 213 |
@@ -141,11 +141,11 @@ discard block |
||
141 | 141 | { |
142 | 142 | $key = \hash(ECRYPTFS_KEY_DERIVATION_ALGO, \substr($salt, 0, ECRYPTFS_SALT_SIZE) . $passphrase, true); |
143 | 143 | |
144 | - for ($i=1; $i<ECRYPTFS_DEFAULT_NUM_HASH_ITERATIONS; $i++) { |
|
144 | + for ($i = 1; $i < ECRYPTFS_DEFAULT_NUM_HASH_ITERATIONS; $i++) { |
|
145 | 145 | $key = \hash(ECRYPTFS_KEY_DERIVATION_ALGO, $key, true); |
146 | 146 | } |
147 | 147 | |
148 | - $signature = \substr(\hash(ECRYPTFS_KEY_DERIVATION_ALGO, $key, false), 0, ECRYPTFS_SIG_SIZE*2); |
|
148 | + $signature = \substr(\hash(ECRYPTFS_KEY_DERIVATION_ALGO, $key, false), 0, ECRYPTFS_SIG_SIZE * 2); |
|
149 | 149 | $this->keys[$signature] = \bin2hex($key); |
150 | 150 | |
151 | 151 | return $signature; |
@@ -271,7 +271,7 @@ discard block |
||
271 | 271 | $algo = "AES-256-ECB"; |
272 | 272 | } |
273 | 273 | |
274 | - if (false === ($decrypted = \openssl_decrypt($data, $algo, $key, \OPENSSL_RAW_DATA|\OPENSSL_NO_PADDING, $iv))) { |
|
274 | + if (false === ($decrypted = \openssl_decrypt($data, $algo, $key, \OPENSSL_RAW_DATA | \OPENSSL_NO_PADDING, $iv))) { |
|
275 | 275 | throw new \DomainException("Decryption failed with error: " . \openssl_error_string()); |
276 | 276 | } |
277 | 277 |