@@ -38,7 +38,7 @@ |
||
| 38 | 38 | { |
| 39 | 39 | $message = null; |
| 40 | 40 | while (($errorLine = $this->openSslErrorString()) !== false) { |
| 41 | - $message .= ($message === null ? $errorLine : PHP_EOL . $errorLine); |
|
| 41 | + $message .= ($message === null ? $errorLine : PHP_EOL.$errorLine); |
|
| 42 | 42 | } |
| 43 | 43 | |
| 44 | 44 | return $message; |
@@ -37,7 +37,7 @@ |
||
| 37 | 37 | { |
| 38 | 38 | $crypt = null; |
| 39 | 39 | |
| 40 | - $instanceFactory = function (PsrContainerInterface $container) use (&$crypt) { |
|
| 40 | + $instanceFactory = function(PsrContainerInterface $container) use (&$crypt) { |
|
| 41 | 41 | if ($crypt === null) { |
| 42 | 42 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 43 | 43 | $crypt = new SymmetricCrypt($settings[C::KEY_METHOD], $settings[C::KEY_PASSWORD]); |
@@ -34,7 +34,7 @@ |
||
| 34 | 34 | */ |
| 35 | 35 | public static function configureContainer(LimoncelloContainerInterface $container): void |
| 36 | 36 | { |
| 37 | - $container[HasherInterface::class] = function (PsrContainerInterface $container): HasherInterface { |
|
| 37 | + $container[HasherInterface::class] = function(PsrContainerInterface $container): HasherInterface { |
|
| 38 | 38 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 39 | 39 | $hasher = new Hasher($settings[C::KEY_ALGORITHM], $settings[C::KEY_COST]); |
| 40 | 40 | |
@@ -37,7 +37,7 @@ discard block |
||
| 37 | 37 | */ |
| 38 | 38 | public static function configureContainer(LimoncelloContainerInterface $container): void |
| 39 | 39 | { |
| 40 | - $container[EncryptInterface::class] = function (PsrContainerInterface $container): EncryptInterface { |
|
| 40 | + $container[EncryptInterface::class] = function(PsrContainerInterface $container): EncryptInterface { |
|
| 41 | 41 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 42 | 42 | $keyOrPath = $settings[C::KEY_PRIVATE_PATH_OR_KEY_VALUE] ?? null; |
| 43 | 43 | if (empty($keyOrPath) === true) { |
@@ -49,7 +49,7 @@ discard block |
||
| 49 | 49 | return $crypt; |
| 50 | 50 | }; |
| 51 | 51 | |
| 52 | - $container[DecryptInterface::class] = function (PsrContainerInterface $container): DecryptInterface { |
|
| 52 | + $container[DecryptInterface::class] = function(PsrContainerInterface $container): DecryptInterface { |
|
| 53 | 53 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 54 | 54 | $keyOrPath = $settings[C::KEY_PUBLIC_PATH_OR_KEY_VALUE] ?? null; |
| 55 | 55 | if (empty($keyOrPath) === true) { |
@@ -37,7 +37,7 @@ discard block |
||
| 37 | 37 | */ |
| 38 | 38 | public static function configureContainer(LimoncelloContainerInterface $container): void |
| 39 | 39 | { |
| 40 | - $container[EncryptInterface::class] = function (PsrContainerInterface $container): EncryptInterface { |
|
| 40 | + $container[EncryptInterface::class] = function(PsrContainerInterface $container): EncryptInterface { |
|
| 41 | 41 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 42 | 42 | $keyOrPath = $settings[C::KEY_PUBLIC_PATH_OR_KEY_VALUE] ?? null; |
| 43 | 43 | if (empty($keyOrPath) === true) { |
@@ -49,7 +49,7 @@ discard block |
||
| 49 | 49 | return $crypt; |
| 50 | 50 | }; |
| 51 | 51 | |
| 52 | - $container[DecryptInterface::class] = function (PsrContainerInterface $container): DecryptInterface { |
|
| 52 | + $container[DecryptInterface::class] = function(PsrContainerInterface $container): DecryptInterface { |
|
| 53 | 53 | $settings = $container->get(SettingsProviderInterface::class)->get(C::class); |
| 54 | 54 | $keyOrPath = $settings[C::KEY_PRIVATE_PATH_OR_KEY_VALUE] ?? null; |
| 55 | 55 | if (empty($keyOrPath) === true) { |
@@ -157,7 +157,7 @@ discard block |
||
| 157 | 157 | // Though https://tools.ietf.org/html/rfc5084 do not directly says it should |
| 158 | 158 | // be passed along with the encrypted message adding it is one of the possible |
| 159 | 159 | // solutions. |
| 160 | - $encrypted = $tag . $encrypted; |
|
| 160 | + $encrypted = $tag.$encrypted; |
|
| 161 | 161 | } else { |
| 162 | 162 | $encrypted = $this->openSslEncrypt( |
| 163 | 163 | $data, |
@@ -178,7 +178,7 @@ discard block |
||
| 178 | 178 | // The IV need not be secret, so the IV, or information sufficient to determine the IV, may be |
| 179 | 179 | // transmitted with the ciphertext. |
| 180 | 180 | // ... |
| 181 | - $result = $isAddIvToOutput === false ? $encrypted : $vector . $encrypted; |
|
| 181 | + $result = $isAddIvToOutput === false ? $encrypted : $vector.$encrypted; |
|
| 182 | 182 | |
| 183 | 183 | return $result; |
| 184 | 184 | } |
@@ -519,7 +519,7 @@ discard block |
||
| 519 | 519 | int $options, |
| 520 | 520 | string $initializationVector, |
| 521 | 521 | string $aad, |
| 522 | - string &$tag = null, |
|
| 522 | + string & $tag = null, |
|
| 523 | 523 | int $tagLength = 16 |
| 524 | 524 | ): string { |
| 525 | 525 | $encrypted = $this->openSslEncryptAuthenticatedImpl( |
@@ -668,7 +668,7 @@ discard block |
||
| 668 | 668 | int $options, |
| 669 | 669 | string $initializationVector, |
| 670 | 670 | string $aad, |
| 671 | - string &$tag = null, |
|
| 671 | + string & $tag = null, |
|
| 672 | 672 | int $tagLength = 16 |
| 673 | 673 | ) { |
| 674 | 674 | assert(PHP_VERSION_ID >= 70100); |