@@ -36,7 +36,7 @@ |
||
36 | 36 | ); |
37 | 37 | |
38 | 38 | foreach ($files as $f) { |
39 | - require_once __DIR__ . "/src/$f.php"; |
|
39 | + require_once __DIR__."/src/$f.php"; |
|
40 | 40 | } |
41 | 41 | } |
42 | 42 | // @codeCoverageIgnoreEnd |
@@ -41,7 +41,7 @@ |
||
41 | 41 | $pad = self::paddingString(Str::strlen($input), $blocksize); |
42 | 42 | |
43 | 43 | // Return input + padding |
44 | - return $input . $pad; |
|
44 | + return $input.$pad; |
|
45 | 45 | } |
46 | 46 | |
47 | 47 | /** |
@@ -1,6 +1,6 @@ |
||
1 | 1 | <?php |
2 | 2 | |
3 | -require __DIR__ . '/vendor/autoload.php'; |
|
3 | +require __DIR__.'/vendor/autoload.php'; |
|
4 | 4 | |
5 | 5 | // backward compatibility |
6 | 6 | if (!class_exists('\PHPUnit\Framework\TestCase')) { |
@@ -53,7 +53,7 @@ |
||
53 | 53 | $length = Str::strlen($input); |
54 | 54 | |
55 | 55 | foreach ($chunks as $i => &$chunk) { |
56 | - $chunk = $chunk ^ \hash_hmac($algo, $password . $length, $i, true); |
|
56 | + $chunk = $chunk ^ \hash_hmac($algo, $password.$length, $i, true); |
|
57 | 57 | } |
58 | 58 | |
59 | 59 | return \implode($chunks); |
@@ -60,7 +60,7 @@ discard block |
||
60 | 60 | $hash = self::ihmac($input, $key, $cost, self::ALGO); |
61 | 61 | |
62 | 62 | // Return the salt + cost blob + hmac |
63 | - return $salt . self::costHash($cost, $salt, $password) . $hash; |
|
63 | + return $salt.self::costHash($cost, $salt, $password).$hash; |
|
64 | 64 | } |
65 | 65 | |
66 | 66 | /** |
@@ -83,7 +83,7 @@ discard block |
||
83 | 83 | // Convert cost to base 256 then encrypt with OTP stream cipher |
84 | 84 | $cost = Otp::crypt(self::dec2bin($cost), $password); |
85 | 85 | |
86 | - return $hash . $cost; |
|
86 | + return $hash.$cost; |
|
87 | 87 | } |
88 | 88 | |
89 | 89 | /** |
@@ -104,7 +104,7 @@ discard block |
||
104 | 104 | // Perform iterative hmac calls |
105 | 105 | // Make sure $iter value of 0 is handled |
106 | 106 | for ($i = 0; $i <= $iter; $i++) { |
107 | - $data = self::hmac($data . $i . $iter, $key, $algo); |
|
107 | + $data = self::hmac($data.$i.$iter, $key, $algo); |
|
108 | 108 | } |
109 | 109 | |
110 | 110 | return $data; |
@@ -70,9 +70,9 @@ |
||
70 | 70 | */ |
71 | 71 | private static function cost(int $cost): int |
72 | 72 | { |
73 | - if ($cost < 0 || $cost > \pow(2, 32)) { |
|
74 | - throw new \InvalidArgumentException("Hashing cost parameter must between 0 and 2^32"); |
|
75 | - } |
|
73 | + if ($cost < 0 || $cost > \pow(2, 32)) { |
|
74 | + throw new \InvalidArgumentException("Hashing cost parameter must between 0 and 2^32"); |
|
75 | + } |
|
76 | 76 | |
77 | 77 | return $cost; |
78 | 78 | } |
@@ -35,11 +35,11 @@ discard block |
||
35 | 35 | */ |
36 | 36 | public static function decrypt(string $data, string $pass): string |
37 | 37 | { |
38 | - // Calculate the hash checksum size in bytes for the specified algo |
|
39 | - $hsz = Str::hashSize(static::CHKSUM); |
|
38 | + // Calculate the hash checksum size in bytes for the specified algo |
|
39 | + $hsz = Str::hashSize(static::CHKSUM); |
|
40 | 40 | |
41 | - // Ask openssl for the IV size needed for specified cipher |
|
42 | - $isz = self::ivsize(); |
|
41 | + // Ask openssl for the IV size needed for specified cipher |
|
42 | + $isz = self::ivsize(); |
|
43 | 43 | |
44 | 44 | // Find the IV at the beginning of the cypher text |
45 | 45 | $ivr = Str::substr($data, 0, $isz); |
@@ -47,8 +47,8 @@ discard block |
||
47 | 47 | // Gather the checksum portion of the ciphertext |
48 | 48 | $sum = Str::substr($data, $isz, $hsz); |
49 | 49 | |
50 | - // Gather the iterations portion of the cipher text as packed/encrytped unsigned long |
|
51 | - $itr = Str::substr($data, $isz + $hsz, 4); |
|
50 | + // Gather the iterations portion of the cipher text as packed/encrytped unsigned long |
|
51 | + $itr = Str::substr($data, $isz + $hsz, 4); |
|
52 | 52 | |
53 | 53 | // Gather message portion of ciphertext after iv and checksum |
54 | 54 | $msg = Str::substr($data, $isz + $hsz + 4); |
@@ -85,11 +85,11 @@ discard block |
||
85 | 85 | // Encrypt the plaintext |
86 | 86 | $msg = OpensslWrapper::encrypt($data, static::CIPHER, $key, $ivr); |
87 | 87 | |
88 | - // Convert cost integer into 4 byte string and XOR it with the derived key |
|
89 | - $itr = pack('L*', $cost) ^ $key; |
|
88 | + // Convert cost integer into 4 byte string and XOR it with the derived key |
|
89 | + $itr = pack('L*', $cost) ^ $key; |
|
90 | 90 | |
91 | - // Generate the ciphertext checksum |
|
92 | - $chk = \hash_hmac(static::CHKSUM, $msg, $key, true); |
|
91 | + // Generate the ciphertext checksum |
|
92 | + $chk = \hash_hmac(static::CHKSUM, $msg, $key, true); |
|
93 | 93 | |
94 | 94 | // Return iv + checksum + iterations + cyphertext |
95 | 95 | return $ivr . $chk . $itr . $msg; |
@@ -92,7 +92,7 @@ discard block |
||
92 | 92 | $chk = \hash_hmac(static::CHKSUM, $msg, $key, true); |
93 | 93 | |
94 | 94 | // Return iv + checksum + iterations + cyphertext |
95 | - return $ivr . $chk . $itr . $msg; |
|
95 | + return $ivr.$chk.$itr.$msg; |
|
96 | 96 | } |
97 | 97 | |
98 | 98 | /** |
@@ -106,7 +106,7 @@ discard block |
||
106 | 106 | private static function key(string $pass, string $iv, int $cost): string |
107 | 107 | { |
108 | 108 | // Create the authentication string to be hashed |
109 | - $data = $iv . self::RIJNDA . static::CIPHER; |
|
109 | + $data = $iv.self::RIJNDA.static::CIPHER; |
|
110 | 110 | |
111 | 111 | return Hash::ihmac($data, $pass, $cost, static::CHKSUM); |
112 | 112 | } |
@@ -74,10 +74,10 @@ |
||
74 | 74 | { |
75 | 75 | $ret = \openssl_cipher_iv_length(static::CIPHER); |
76 | 76 | |
77 | - if ($ret === false) { |
|
78 | - throw new \Exception("Failed to determine correct IV size."); |
|
79 | - } |
|
77 | + if ($ret === false) { |
|
78 | + throw new \Exception("Failed to determine correct IV size."); |
|
79 | + } |
|
80 | 80 | |
81 | - return $ret; |
|
81 | + return $ret; |
|
82 | 82 | } |
83 | 83 | } |