@@ -103,6 +103,6 @@ |
||
103 | 103 | $chk = \hash_hmac($algo, $msg, $key->authenticationKey($cipher), true); |
104 | 104 | |
105 | 105 | // Return iv + checksum + tag + ciphertext |
106 | - return $ivr . $chk . $tag . $msg; |
|
106 | + return $ivr.$chk.$tag.$msg; |
|
107 | 107 | } |
108 | 108 | } |
@@ -8,7 +8,7 @@ discard block |
||
8 | 8 | * Displays supported ciphers and algos |
9 | 9 | */ |
10 | 10 | |
11 | -require __DIR__ . '/../vendor/autoload.php'; |
|
11 | +require __DIR__.'/../vendor/autoload.php'; |
|
12 | 12 | |
13 | 13 | $key = \Dcrypt\OpensslKey::create(); |
14 | 14 | |
@@ -27,7 +27,7 @@ discard block |
||
27 | 27 | $d = \Dcrypt\OpensslStatic::decrypt($e, $key, $meth, 'sha256'); |
28 | 28 | |
29 | 29 | echo " [pass] "; |
30 | - } catch (\Exception|\Error $e) { |
|
30 | + } catch (\Exception | \Error $e) { |
|
31 | 31 | $m = $e->getMessage(); |
32 | 32 | echo " [fail] [!!!]"; |
33 | 33 | } finally { |
@@ -50,7 +50,7 @@ discard block |
||
50 | 50 | $d = \Dcrypt\OpensslStatic::decrypt($e, $key, 'aes-256-gcm', $algo); |
51 | 51 | |
52 | 52 | echo " [pass] "; |
53 | - } catch (\Exception|\Error $e) { |
|
53 | + } catch (\Exception | \Error $e) { |
|
54 | 54 | $m = $e->getMessage(); |
55 | 55 | echo " [fail] [!!!]"; |
56 | 56 | } finally { |
@@ -44,7 +44,7 @@ |
||
44 | 44 | |
45 | 45 | foreach ($chunks as $i => &$chunk) { |
46 | 46 | // Create the info key based on counter |
47 | - $info = $length . $i; |
|
47 | + $info = $length.$i; |
|
48 | 48 | |
49 | 49 | // Xor the derived key with the data chunk |
50 | 50 | $chunk = $chunk ^ $key->deriveKey($info); |
@@ -2,8 +2,8 @@ |
||
2 | 2 | |
3 | 3 | namespace Dcrypt\Examples; |
4 | 4 | |
5 | -class Aes256Base64 extends \Dcrypt\Aes256Gcm |
|
6 | -{ |
|
5 | +class Aes256Base64 extends \Dcrypt\Aes256Gcm |
|
6 | +{ |
|
7 | 7 | public static function decrypt(string $data, string $key): string |
8 | 8 | { |
9 | 9 | return parent::decrypt(\base64_decode($data), $key); |
@@ -7,8 +7,8 @@ |
||
7 | 7 | * |
8 | 8 | * This is useful for medium security situations where minimal space consumption is important. |
9 | 9 | */ |
10 | -class TinyFish extends \Dcrypt\OpensslBridge |
|
11 | -{ |
|
10 | +class TinyFish extends \Dcrypt\OpensslBridge |
|
11 | +{ |
|
12 | 12 | /** |
13 | 13 | * Specify using blowfish ofb cipher method |
14 | 14 | * |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | */ |
83 | 83 | public function authenticationKey(string $info): string |
84 | 84 | { |
85 | - return $this->deriveKey(__FUNCTION__ . '|' . $info); |
|
85 | + return $this->deriveKey(__FUNCTION__.'|'.$info); |
|
86 | 86 | } |
87 | 87 | |
88 | 88 | /** |
@@ -94,7 +94,7 @@ discard block |
||
94 | 94 | */ |
95 | 95 | public function encryptionKey(string $info): string |
96 | 96 | { |
97 | - return $this->deriveKey(__FUNCTION__ . '|' . $info); |
|
97 | + return $this->deriveKey(__FUNCTION__.'|'.$info); |
|
98 | 98 | } |
99 | 99 | |
100 | 100 | /** |
@@ -6,9 +6,9 @@ discard block |
||
6 | 6 | |
7 | 7 | use \Dcrypt\OpensslStatic; |
8 | 8 | |
9 | -require __DIR__ . '/../vendor/autoload.php'; |
|
9 | +require __DIR__.'/../vendor/autoload.php'; |
|
10 | 10 | |
11 | -$vectors = __DIR__ . '/../tests/.vectors.json'; |
|
11 | +$vectors = __DIR__.'/../tests/.vectors.json'; |
|
12 | 12 | |
13 | 13 | if (file_exists($vectors)) { |
14 | 14 | $key = json_decode(file_get_contents($vectors))->key; |
@@ -31,7 +31,7 @@ discard block |
||
31 | 31 | |
32 | 32 | try { |
33 | 33 | $out['ciphers'][$cipher] = base64_encode(OpensslStatic::encrypt('a secret', $key, $cipher, 'sha3-256')); |
34 | - } catch (\Exception|\Error $e) { |
|
34 | + } catch (\Exception | \Error $e) { |
|
35 | 35 | |
36 | 36 | } |
37 | 37 | } |
@@ -44,7 +44,7 @@ discard block |
||
44 | 44 | $out['algos'][$algo] = base64_encode(OpensslStatic::encrypt('a secret', $key, 'aes-256-gcm', $algo)); |
45 | 45 | } |
46 | 46 | |
47 | -foreach(['Gcm', 'Ctr', 'Ofb', 'Cbc', 'Ecb', 'Ccm', 'Cfb'] as $mode){ |
|
47 | +foreach (['Gcm', 'Ctr', 'Ofb', 'Cbc', 'Ecb', 'Ccm', 'Cfb'] as $mode) { |
|
48 | 48 | $c = "\\Dcrypt\\Aes256$mode"; |
49 | 49 | $out['aes256'][$c] = base64_encode($c::encrypt('a secret', $key)); |
50 | 50 | } |
@@ -55,6 +55,6 @@ discard block |
||
55 | 55 | $out['otp'][$mult] = \base64_encode(\Dcrypt\OneTimePad::crypt(str_repeat('A', $mult), $key)); |
56 | 56 | } |
57 | 57 | |
58 | -file_put_contents(__DIR__ . '/../tests/.vectors.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
58 | +file_put_contents(__DIR__.'/../tests/.vectors.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
59 | 59 | |
60 | 60 | var_dump($out); |
61 | 61 | \ No newline at end of file |
@@ -10,9 +10,9 @@ discard block |
||
10 | 10 | |
11 | 11 | $vectors = __DIR__ . '/../tests/.vectors.json'; |
12 | 12 | |
13 | -if (file_exists($vectors)) { |
|
13 | +if (file_exists($vectors)) { |
|
14 | 14 | $key = json_decode(file_get_contents($vectors))->key; |
15 | -} else { |
|
15 | +} else { |
|
16 | 16 | $key = \Dcrypt\OpensslKey::create(); |
17 | 17 | } |
18 | 18 | |
@@ -25,7 +25,7 @@ discard block |
||
25 | 25 | ]; |
26 | 26 | |
27 | 27 | foreach (\Dcrypt\OpensslSupported::ciphers() as $cipher) { |
28 | - if (strtolower($cipher) !== $cipher) { |
|
28 | + if (strtolower($cipher) !== $cipher) { |
|
29 | 29 | continue; |
30 | 30 | } |
31 | 31 | |
@@ -37,7 +37,7 @@ discard block |
||
37 | 37 | } |
38 | 38 | |
39 | 39 | foreach (\Dcrypt\OpensslSupported::algos() as $algo) { |
40 | - if (strtolower($algo) !== $algo) { |
|
40 | + if (strtolower($algo) !== $algo) { |
|
41 | 41 | continue; |
42 | 42 | } |
43 | 43 |