@@ -38,7 +38,7 @@ |
||
| 38 | 38 | { |
| 39 | 39 | $message = null; |
| 40 | 40 | while (($errorLine = $this->openSslErrorString()) !== false) { |
| 41 | - $message .= ($message === null ? $errorLine : PHP_EOL . $errorLine); |
|
| 41 | + $message .= ($message === null ? $errorLine : PHP_EOL.$errorLine); |
|
| 42 | 42 | } |
| 43 | 43 | |
| 44 | 44 | return $message; |
@@ -37,7 +37,7 @@ |
||
| 37 | 37 | { |
| 38 | 38 | $crypt = null; |
| 39 | 39 | |
| 40 | - $instanceFactory = function (PsrContainerInterface $container) use (&$crypt) { |
|
| 40 | + $instanceFactory = function(PsrContainerInterface $container) use (&$crypt) { |
|
| 41 | 41 | if ($crypt === null) { |
| 42 | 42 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 43 | 43 | $crypt = new SymmetricCrypt($settings[C::KEY_METHOD], $settings[C::KEY_PASSWORD]); |
@@ -34,7 +34,7 @@ |
||
| 34 | 34 | */ |
| 35 | 35 | public static function configureContainer(LimoncelloContainerInterface $container): void |
| 36 | 36 | { |
| 37 | - $container[HasherInterface::class] = function (PsrContainerInterface $container): HasherInterface { |
|
| 37 | + $container[HasherInterface::class] = function(PsrContainerInterface $container): HasherInterface { |
|
| 38 | 38 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 39 | 39 | $hasher = new Hasher($settings[C::KEY_ALGORITHM], $settings[C::KEY_COST]); |
| 40 | 40 | |
@@ -37,7 +37,7 @@ discard block |
||
| 37 | 37 | */ |
| 38 | 38 | public static function configureContainer(LimoncelloContainerInterface $container): void |
| 39 | 39 | { |
| 40 | - $container[EncryptInterface::class] = function (PsrContainerInterface $container): EncryptInterface { |
|
| 40 | + $container[EncryptInterface::class] = function(PsrContainerInterface $container): EncryptInterface { |
|
| 41 | 41 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 42 | 42 | $keyOrPath = $settings[C::KEY_PRIVATE_PATH_OR_KEY_VALUE] ?? null; |
| 43 | 43 | if (empty($keyOrPath) === true) { |
@@ -49,7 +49,7 @@ discard block |
||
| 49 | 49 | return $crypt; |
| 50 | 50 | }; |
| 51 | 51 | |
| 52 | - $container[DecryptInterface::class] = function (PsrContainerInterface $container): DecryptInterface { |
|
| 52 | + $container[DecryptInterface::class] = function(PsrContainerInterface $container): DecryptInterface { |
|
| 53 | 53 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 54 | 54 | $keyOrPath = $settings[C::KEY_PUBLIC_PATH_OR_KEY_VALUE] ?? null; |
| 55 | 55 | if (empty($keyOrPath) === true) { |
@@ -37,7 +37,7 @@ discard block |
||
| 37 | 37 | */ |
| 38 | 38 | public static function configureContainer(LimoncelloContainerInterface $container): void |
| 39 | 39 | { |
| 40 | - $container[EncryptInterface::class] = function (PsrContainerInterface $container): EncryptInterface { |
|
| 40 | + $container[EncryptInterface::class] = function(PsrContainerInterface $container): EncryptInterface { |
|
| 41 | 41 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 42 | 42 | $keyOrPath = $settings[C::KEY_PUBLIC_PATH_OR_KEY_VALUE] ?? null; |
| 43 | 43 | if (empty($keyOrPath) === true) { |
@@ -49,7 +49,7 @@ discard block |
||
| 49 | 49 | return $crypt; |
| 50 | 50 | }; |
| 51 | 51 | |
| 52 | - $container[DecryptInterface::class] = function (PsrContainerInterface $container): DecryptInterface { |
|
| 52 | + $container[DecryptInterface::class] = function(PsrContainerInterface $container): DecryptInterface { |
|
| 53 | 53 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 54 | 54 | $keyOrPath = $settings[C::KEY_PRIVATE_PATH_OR_KEY_VALUE] ?? null; |
| 55 | 55 | if (empty($keyOrPath) === true) { |
@@ -157,7 +157,7 @@ discard block |
||
| 157 | 157 | // Though https://tools.ietf.org/html/rfc5084 do not directly says it should |
| 158 | 158 | // be passed along with the encrypted message adding it is one of the possible |
| 159 | 159 | // solutions. |
| 160 | - $encrypted = $tag . $encrypted; |
|
| 160 | + $encrypted = $tag.$encrypted; |
|
| 161 | 161 | } else { |
| 162 | 162 | $encrypted = $this->openSslEncrypt( |
| 163 | 163 | $data, |
@@ -178,7 +178,7 @@ discard block |
||
| 178 | 178 | // The IV need not be secret, so the IV, or information sufficient to determine the IV, may be |
| 179 | 179 | // transmitted with the ciphertext. |
| 180 | 180 | // ... |
| 181 | - $result = $isAddIvToOutput === false ? $encrypted : $vector . $encrypted; |
|
| 181 | + $result = $isAddIvToOutput === false ? $encrypted : $vector.$encrypted; |
|
| 182 | 182 | |
| 183 | 183 | return $result; |
| 184 | 184 | } |