@@ -102,6 +102,6 @@ |
||
102 | 102 | $chk = \hash_hmac($algo, $msg, $key->authenticationKey(), true); |
103 | 103 | |
104 | 104 | // Return iv + checksum + tag + cyphertext |
105 | - return $ivr . $chk . $tag . $msg; |
|
105 | + return $ivr.$chk.$tag.$msg; |
|
106 | 106 | } |
107 | 107 | } |
@@ -23,8 +23,8 @@ |
||
23 | 23 | * @license http://opensource.org/licenses/MIT The MIT License (MIT) |
24 | 24 | * @link https://github.com/mmeyer2k/dcrypt |
25 | 25 | */ |
26 | -class Aes256Ecb extends Aes256Gcm |
|
27 | -{ |
|
26 | +class Aes256Ecb extends Aes256Gcm |
|
27 | +{ |
|
28 | 28 | /** |
29 | 29 | * AES-256 cipher identifier that will be passed to openssl |
30 | 30 | * |
@@ -7,8 +7,8 @@ |
||
7 | 7 | * |
8 | 8 | * This is useful for medium security situations where minimal space consumption is important. |
9 | 9 | */ |
10 | -class TinyFish extends \Dcrypt\OpensslBridge |
|
11 | -{ |
|
10 | +class TinyFish extends \Dcrypt\OpensslBridge |
|
11 | +{ |
|
12 | 12 | /** |
13 | 13 | * Specify using blowfish ofb cipher method |
14 | 14 | * |
@@ -2,7 +2,7 @@ |
||
2 | 2 | |
3 | 3 | namespace Dcrypt\Exceptions; |
4 | 4 | |
5 | -class InvalidKeyException extends \Exception |
|
6 | -{ |
|
5 | +class InvalidKeyException extends \Exception |
|
6 | +{ |
|
7 | 7 | |
8 | 8 | } |
9 | 9 | \ No newline at end of file |
@@ -2,7 +2,7 @@ |
||
2 | 2 | |
3 | 3 | namespace Dcrypt\Exceptions; |
4 | 4 | |
5 | -class InvalidChecksumException extends \Exception |
|
6 | -{ |
|
5 | +class InvalidChecksumException extends \Exception |
|
6 | +{ |
|
7 | 7 | |
8 | 8 | } |
9 | 9 | \ No newline at end of file |
@@ -12,7 +12,7 @@ discard block |
||
12 | 12 | |
13 | 13 | foreach (\Dcrypt\OpensslSupported::ciphers() as $cipher) { |
14 | 14 | $cipher = strtolower($cipher); |
15 | - if (isset($out[$cipher])) { |
|
15 | + if (isset($out[$cipher])) { |
|
16 | 16 | continue; |
17 | 17 | } |
18 | 18 | |
@@ -29,7 +29,7 @@ discard block |
||
29 | 29 | |
30 | 30 | foreach (\Dcrypt\OpensslSupported::algos() as $algo) { |
31 | 31 | $cipher = strtolower($algo); |
32 | - if (isset($out[$algo])) { |
|
32 | + if (isset($out[$algo])) { |
|
33 | 33 | continue; |
34 | 34 | } |
35 | 35 | $out[$algo] = base64_encode(OpensslStatic::encrypt('hello', 'world', 'aes-256-gcm', $algo, 1000)); |
@@ -6,7 +6,7 @@ discard block |
||
6 | 6 | |
7 | 7 | use \Dcrypt\OpensslStatic; |
8 | 8 | |
9 | -require __DIR__ . '/../vendor/autoload.php'; |
|
9 | +require __DIR__.'/../vendor/autoload.php'; |
|
10 | 10 | |
11 | 11 | $out = []; |
12 | 12 | |
@@ -18,12 +18,12 @@ discard block |
||
18 | 18 | |
19 | 19 | try { |
20 | 20 | $out[$cipher] = base64_encode(OpensslStatic::encrypt('hello', 'world', $cipher, 'sha256', 1000)); |
21 | - } catch (\Exception|\Error $e) { |
|
21 | + } catch (\Exception | \Error $e) { |
|
22 | 22 | |
23 | 23 | } |
24 | 24 | } |
25 | 25 | |
26 | -file_put_contents(__DIR__ . '/../tests/vectors/openssl-static-ciphers.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
26 | +file_put_contents(__DIR__.'/../tests/vectors/openssl-static-ciphers.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
27 | 27 | |
28 | 28 | $out = []; |
29 | 29 | |
@@ -35,7 +35,7 @@ discard block |
||
35 | 35 | $out[$algo] = base64_encode(OpensslStatic::encrypt('hello', 'world', 'aes-256-gcm', $algo, 1000)); |
36 | 36 | } |
37 | 37 | |
38 | -file_put_contents(__DIR__ . '/../tests/vectors/openssl-static-algos.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
38 | +file_put_contents(__DIR__.'/../tests/vectors/openssl-static-algos.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
39 | 39 | |
40 | 40 | $out = []; |
41 | 41 | |
@@ -45,4 +45,4 @@ discard block |
||
45 | 45 | $out[$mult] = \base64_encode(\Dcrypt\Otp::crypt(str_repeat('A', $mult), 'password', 1000)); |
46 | 46 | } |
47 | 47 | |
48 | -file_put_contents(__DIR__ . '/../tests/vectors/otp.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
49 | 48 | \ No newline at end of file |
49 | +file_put_contents(__DIR__.'/../tests/vectors/otp.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
50 | 50 | \ No newline at end of file |
@@ -109,7 +109,7 @@ |
||
109 | 109 | */ |
110 | 110 | public function deriveKey(string $info): string |
111 | 111 | { |
112 | - $info = $info . '|' . $this->cipher; |
|
112 | + $info = $info.'|'.$this->cipher; |
|
113 | 113 | |
114 | 114 | $key = \hash_hkdf($this->algo, $this->key, 0, $info, $this->ivr); |
115 | 115 |
@@ -26,8 +26,8 @@ discard block |
||
26 | 26 | * @license http://opensource.org/licenses/MIT The MIT License (MIT) |
27 | 27 | * @link https://github.com/mmeyer2k/dcrypt |
28 | 28 | */ |
29 | -final class OpensslKeyGenerator |
|
30 | -{ |
|
29 | +final class OpensslKeyGenerator |
|
30 | +{ |
|
31 | 31 | /** |
32 | 32 | * @var string |
33 | 33 | */ |
@@ -57,23 +57,23 @@ discard block |
||
57 | 57 | * @param string $ivr |
58 | 58 | * @param int $cost |
59 | 59 | */ |
60 | - public function __construct(string $algo, string $passkey, string $cipher, string $ivr, int $cost) |
|
61 | - { |
|
60 | + public function __construct(string $algo, string $passkey, string $cipher, string $ivr, int $cost) |
|
61 | + { |
|
62 | 62 | // When cost is 0 then we are in key mode |
63 | - if ($cost === 0) { |
|
63 | + if ($cost === 0) { |
|
64 | 64 | // Attempt to decode the passkey |
65 | 65 | $passkey = \base64_decode($passkey); |
66 | 66 | |
67 | 67 | // Make sure key was properly decoded and meets minimum required length |
68 | - if (Str::strlen($passkey) < 256) { |
|
68 | + if (Str::strlen($passkey) < 256) { |
|
69 | 69 | throw new InvalidKeyException("Key must be at least 2048 bits long and base64 encoded."); |
70 | 70 | } |
71 | 71 | |
72 | 72 | // Store the key as what was supplied |
73 | 73 | $this->key = $passkey; |
74 | - } else { |
|
74 | + } else { |
|
75 | 75 | // Make sure that the user is not attempting to use a key in password word mode |
76 | - if (Str::strlen($passkey) >= 256) { |
|
76 | + if (Str::strlen($passkey) >= 256) { |
|
77 | 77 | throw new InvalidPasswordException("Passwords must be less than 2048 bits (256 bytes) long."); |
78 | 78 | } |
79 | 79 | |
@@ -124,7 +124,7 @@ discard block |
||
124 | 124 | |
125 | 125 | $key = \hash_hkdf($this->algo, $this->key, 0, $info, $this->ivr); |
126 | 126 | |
127 | - if ($key === false) { |
|
127 | + if ($key === false) { |
|
128 | 128 | throw new Exceptions\InvalidAlgoException("Hash algo $this->algo is not supported by hash_hkdf."); |
129 | 129 | } |
130 | 130 | |
@@ -140,11 +140,11 @@ discard block |
||
140 | 140 | */ |
141 | 141 | public static function newKey(int $size = 2048): string |
142 | 142 | { |
143 | - if ($size < 2048) { |
|
143 | + if ($size < 2048) { |
|
144 | 144 | throw new InvalidKeyException('Key must be at least 2048 bits long.'); |
145 | 145 | } |
146 | 146 | |
147 | - if ($size % 8 !== 0) { |
|
147 | + if ($size % 8 !== 0) { |
|
148 | 148 | throw new InvalidKeyException('Key must be divisible by 8.'); |
149 | 149 | } |
150 | 150 |
@@ -41,10 +41,10 @@ |
||
41 | 41 | |
42 | 42 | $length = Str::strlen($input); |
43 | 43 | |
44 | - $key = new OpensslKeyGenerator($algo, $passkey, '', (string)$length, $cost); |
|
44 | + $key = new OpensslKeyGenerator($algo, $passkey, '', (string) $length, $cost); |
|
45 | 45 | |
46 | 46 | foreach ($chunks as $i => &$chunk) { |
47 | - $info = $length . $i . $cost; |
|
47 | + $info = $length.$i.$cost; |
|
48 | 48 | $chunk = $chunk ^ $key->deriveKey($info); |
49 | 49 | } |
50 | 50 |
@@ -2,8 +2,8 @@ |
||
2 | 2 | |
3 | 3 | namespace Dcrypt\Examples; |
4 | 4 | |
5 | -class Aes256Base64 extends \Dcrypt\OpensslBridge |
|
6 | -{ |
|
5 | +class Aes256Base64 extends \Dcrypt\OpensslBridge |
|
6 | +{ |
|
7 | 7 | const CIPHER = 'aes-256-gcm'; |
8 | 8 | |
9 | 9 | const ALGO = 'sha256'; |