Completed
Push — master ( 7194ef...e1b380 )
by Michael
01:30
created
src/Pkcs7.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -41,7 +41,7 @@
 block discarded – undo
41 41
         $pad = self::paddingString(Str::strlen($input), $blocksize);
42 42
 
43 43
         // Return input + padding
44
-        return $input . $pad;
44
+        return $input.$pad;
45 45
     }
46 46
 
47 47
     /**
Please login to merge, or discard this patch.
src/Hash.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -67,7 +67,7 @@  discard block
 block discarded – undo
67 67
         $chsh = self::costHash($cost, $pass);
68 68
 
69 69
         // Return the salt + cost + hmac as a single string
70
-        return $salt . $chsh . $cost . $hash;
70
+        return $salt.$chsh.$cost.$hash;
71 71
     }
72 72
 
73 73
     /**
@@ -84,7 +84,7 @@  discard block
 block discarded – undo
84 84
         $packed = pack('N', $cost);
85 85
 
86 86
         // Encrypt the string with the Otp stream cipher
87
-        return Otp::crypt($packed, ($pass . $salt), self::ALGO);
87
+        return Otp::crypt($packed, ($pass.$salt), self::ALGO);
88 88
     }
89 89
 
90 90
     /**
@@ -98,7 +98,7 @@  discard block
 block discarded – undo
98 98
     private static function costDecrypt(string $pack, string $salt, string $pass): int
99 99
     {
100 100
         // Decrypt the cost value stored in the 32bit int
101
-        $pack = Otp::crypt($pack, ($pass . $salt), self::ALGO);
101
+        $pack = Otp::crypt($pack, ($pass.$salt), self::ALGO);
102 102
 
103 103
         // Unpack the value back to an integer and return to caller
104 104
         return unpack('N', $pack)[1];
Please login to merge, or discard this patch.
src/Str.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -48,8 +48,8 @@
 block discarded – undo
48 48
         // We hash the 2 inputs at this point because hash_equals is still 
49 49
         // vulnerable to timing attacks when the inputs have different sizes.
50 50
         // Inputs are also cast to string like in symfony stringutils.
51
-        $known = \hash_hmac('sha256', (string)$known, $nonce, true);
52
-        $given = \hash_hmac('sha256', (string)$given, $nonce, true);
51
+        $known = \hash_hmac('sha256', (string) $known, $nonce, true);
52
+        $given = \hash_hmac('sha256', (string) $given, $nonce, true);
53 53
 
54 54
         return \hash_equals($known, $given);
55 55
     }
Please login to merge, or discard this patch.
src/Rot128.php 1 patch
Braces   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -14,8 +14,8 @@
 block discarded – undo
14 14
 
15 15
 namespace Dcrypt;
16 16
 
17
-class Rot128
18
-{
17
+class Rot128
18
+{
19 19
     /**
20 20
      * Rot-128 encode a binary string with strtr.
21 21
      *
Please login to merge, or discard this patch.
src/OpensslStatic.php 1 patch
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -43,7 +43,7 @@  discard block
 block discarded – undo
43 43
         $msg = Str::substr($data, $isz + $hsz + $tsz + 4);
44 44
 
45 45
         // Calculate verification checksum
46
-        $chk = \hash_hmac($algo, ($msg . $itr . $ivr), $pass, true);
46
+        $chk = \hash_hmac($algo, ($msg.$itr.$ivr), $pass, true);
47 47
 
48 48
         // Verify HMAC before decrypting
49 49
         if (!Str::equal($chk, $sum)) {
@@ -54,7 +54,7 @@  discard block
 block discarded – undo
54 54
         $cost = \unpack('N', $itr ^ \hash_hmac($algo, $ivr, $pass, true))[1];
55 55
 
56 56
         // Derive key from password using pbkdf2
57
-        $key = \hash_pbkdf2($algo, ($pass . $cipher), $ivr, $cost, 0, true);
57
+        $key = \hash_pbkdf2($algo, ($pass.$cipher), $ivr, $cost, 0, true);
58 58
 
59 59
         // Decrypt message and return
60 60
         return parent::openssl_decrypt($msg, $cipher, $key, $ivr, $tag);
@@ -67,7 +67,7 @@  discard block
 block discarded – undo
67 67
 
68 68
         // Derive key from password with hash_pbkdf2 function.
69 69
         // Append CIPHER to password beforehand so that cross-method decryptions will fail at checksum step
70
-        $key = \hash_pbkdf2($algo, ($pass . $cipher), $ivr, $cost, 0, true);
70
+        $key = \hash_pbkdf2($algo, ($pass.$cipher), $ivr, $cost, 0, true);
71 71
 
72 72
         // Create a placeholder for the authentication tag to be passed by reference
73 73
         $tag = '';
@@ -79,9 +79,9 @@  discard block
 block discarded – undo
79 79
         $itr = \pack('N', $cost) ^ \hash_hmac($algo, $ivr, $pass, true);
80 80
 
81 81
         // Generate the ciphertext checksum to prevent bit tampering
82
-        $chk = \hash_hmac($algo, ($msg . $itr . $ivr), $pass, true);
82
+        $chk = \hash_hmac($algo, ($msg.$itr.$ivr), $pass, true);
83 83
 
84 84
         // Return iv + checksum + iterations + cyphertext + tag
85
-        return $ivr . $chk . $tag . $itr . $msg;
85
+        return $ivr.$chk.$tag.$itr.$msg;
86 86
     }
87 87
 }
Please login to merge, or discard this patch.
src/Otp.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -42,7 +42,7 @@
 block discarded – undo
42 42
         $length = Str::strlen($input);
43 43
 
44 44
         foreach ($chunks as $i => &$chunk) {
45
-            $chunk = $chunk ^ \hash_hmac($algo, $password . $length, (string)$i, true);
45
+            $chunk = $chunk ^ \hash_hmac($algo, $password.$length, (string) $i, true);
46 46
         }
47 47
 
48 48
         return \implode($chunks);
Please login to merge, or discard this patch.
examples/support.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@
 block discarded – undo
1 1
 <?php
2 2
 
3
-require __DIR__ . '/../vendor/autoload.php';
3
+require __DIR__.'/../vendor/autoload.php';
4 4
 
5 5
 foreach (hash_algos() as $algo) {
6 6
     foreach (openssl_get_cipher_methods() as $meth) {
Please login to merge, or discard this patch.