@@ -36,7 +36,7 @@ |
||
| 36 | 36 | ); |
| 37 | 37 | |
| 38 | 38 | foreach ($files as $f) { |
| 39 | - require_once __DIR__ . "/src/$f.php"; |
|
| 39 | + require_once __DIR__."/src/$f.php"; |
|
| 40 | 40 | } |
| 41 | 41 | } |
| 42 | 42 | // @codeCoverageIgnoreEnd |
@@ -41,7 +41,7 @@ |
||
| 41 | 41 | $pad = self::paddingString(Str::strlen($input), $blocksize); |
| 42 | 42 | |
| 43 | 43 | // Return input + padding |
| 44 | - return $input . $pad; |
|
| 44 | + return $input.$pad; |
|
| 45 | 45 | } |
| 46 | 46 | |
| 47 | 47 | /** |
@@ -1,6 +1,6 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -require __DIR__ . '/vendor/autoload.php'; |
|
| 3 | +require __DIR__.'/vendor/autoload.php'; |
|
| 4 | 4 | |
| 5 | 5 | // backward compatibility |
| 6 | 6 | if (!class_exists('\PHPUnit\Framework\TestCase')) { |
@@ -53,7 +53,7 @@ |
||
| 53 | 53 | $length = Str::strlen($input); |
| 54 | 54 | |
| 55 | 55 | foreach ($chunks as $i => &$chunk) { |
| 56 | - $chunk = $chunk ^ \hash_hmac($algo, $password . $length, $i, true); |
|
| 56 | + $chunk = $chunk ^ \hash_hmac($algo, $password.$length, $i, true); |
|
| 57 | 57 | } |
| 58 | 58 | |
| 59 | 59 | return \implode($chunks); |
@@ -106,9 +106,9 @@ |
||
| 106 | 106 | } |
| 107 | 107 | |
| 108 | 108 | // Create the cypher text prefix (iv + checksum) |
| 109 | - $prefix = $ivr . self::checksum($msg, $ivr, $key, self::mode()); |
|
| 109 | + $prefix = $ivr.self::checksum($msg, $ivr, $key, self::mode()); |
|
| 110 | 110 | |
| 111 | 111 | // Return prefix + cyphertext |
| 112 | - return $prefix . $msg; |
|
| 112 | + return $prefix.$msg; |
|
| 113 | 113 | } |
| 114 | 114 | } |
@@ -69,7 +69,7 @@ discard block |
||
| 69 | 69 | $sum = Hash::hmac($cyphertext, $key, self::ALGO); |
| 70 | 70 | |
| 71 | 71 | // Add the other elements together before performing the final hash |
| 72 | - $sum = $sum . $iv . $mode . self::RIJNDA; |
|
| 72 | + $sum = $sum.$iv.$mode.self::RIJNDA; |
|
| 73 | 73 | |
| 74 | 74 | // ... then hash other elements with previous hmac and return |
| 75 | 75 | return Hash::hmac($sum, $key, self::ALGO); |
@@ -88,7 +88,7 @@ discard block |
||
| 88 | 88 | protected static function key(string $password, string $iv, int $cost, string $mode): string |
| 89 | 89 | { |
| 90 | 90 | // Perform key derivation |
| 91 | - return Hash::ihmac($iv . self::RIJNDA . $mode, $password, $cost, self::ALGO); |
|
| 91 | + return Hash::ihmac($iv.self::RIJNDA.$mode, $password, $cost, self::ALGO); |
|
| 92 | 92 | } |
| 93 | 93 | |
| 94 | 94 | /** |
@@ -60,7 +60,7 @@ discard block |
||
| 60 | 60 | $hash = self::ihmac($input, $key, $cost, self::ALGO); |
| 61 | 61 | |
| 62 | 62 | // Return the salt + cost blob + hmac |
| 63 | - return $salt . self::costHash($cost, $salt, $password) . $hash; |
|
| 63 | + return $salt.self::costHash($cost, $salt, $password).$hash; |
|
| 64 | 64 | } |
| 65 | 65 | |
| 66 | 66 | /** |
@@ -83,7 +83,7 @@ discard block |
||
| 83 | 83 | // Convert cost to base 256 then encrypt with OTP stream cipher |
| 84 | 84 | $cost = Otp::crypt(self::dec2bin($cost), $password); |
| 85 | 85 | |
| 86 | - return $hash . $cost; |
|
| 86 | + return $hash.$cost; |
|
| 87 | 87 | } |
| 88 | 88 | |
| 89 | 89 | /** |
@@ -104,7 +104,7 @@ discard block |
||
| 104 | 104 | // Perform iterative hmac calls |
| 105 | 105 | // Make sure $iter value of 0 is handled |
| 106 | 106 | for ($i = 0; $i <= $iter; $i++) { |
| 107 | - $data = self::hmac($data . $i . $iter, $key, $algo); |
|
| 107 | + $data = self::hmac($data.$i.$iter, $key, $algo); |
|
| 108 | 108 | } |
| 109 | 109 | |
| 110 | 110 | return $data; |