@@ -102,6 +102,6 @@ |
||
| 102 | 102 | $chk = \hash_hmac($algo, $msg, $key->authenticationKey(), true); |
| 103 | 103 | |
| 104 | 104 | // Return iv + checksum + tag + cyphertext |
| 105 | - return $ivr . $chk . $tag . $msg; |
|
| 105 | + return $ivr.$chk.$tag.$msg; |
|
| 106 | 106 | } |
| 107 | 107 | } |
@@ -23,8 +23,8 @@ |
||
| 23 | 23 | * @license http://opensource.org/licenses/MIT The MIT License (MIT) |
| 24 | 24 | * @link https://github.com/mmeyer2k/dcrypt |
| 25 | 25 | */ |
| 26 | -class Aes256Ecb extends Aes256Gcm |
|
| 27 | -{
|
|
| 26 | +class Aes256Ecb extends Aes256Gcm |
|
| 27 | +{ |
|
| 28 | 28 | /** |
| 29 | 29 | * AES-256 cipher identifier that will be passed to openssl |
| 30 | 30 | * |
@@ -7,8 +7,8 @@ |
||
| 7 | 7 | * |
| 8 | 8 | * This is useful for medium security situations where minimal space consumption is important. |
| 9 | 9 | */ |
| 10 | -class TinyFish extends \Dcrypt\OpensslBridge |
|
| 11 | -{
|
|
| 10 | +class TinyFish extends \Dcrypt\OpensslBridge |
|
| 11 | +{ |
|
| 12 | 12 | /** |
| 13 | 13 | * Specify using blowfish ofb cipher method |
| 14 | 14 | * |
@@ -2,7 +2,7 @@ |
||
| 2 | 2 | |
| 3 | 3 | namespace Dcrypt\Exceptions; |
| 4 | 4 | |
| 5 | -class InvalidKeyException extends \Exception |
|
| 6 | -{
|
|
| 5 | +class InvalidKeyException extends \Exception |
|
| 6 | +{ |
|
| 7 | 7 | |
| 8 | 8 | } |
| 9 | 9 | \ No newline at end of file |
@@ -2,7 +2,7 @@ |
||
| 2 | 2 | |
| 3 | 3 | namespace Dcrypt\Exceptions; |
| 4 | 4 | |
| 5 | -class InvalidChecksumException extends \Exception |
|
| 6 | -{
|
|
| 5 | +class InvalidChecksumException extends \Exception |
|
| 6 | +{ |
|
| 7 | 7 | |
| 8 | 8 | } |
| 9 | 9 | \ No newline at end of file |
@@ -12,7 +12,7 @@ discard block |
||
| 12 | 12 | |
| 13 | 13 | foreach (\Dcrypt\OpensslSupported::ciphers() as $cipher) {
|
| 14 | 14 | $cipher = strtolower($cipher); |
| 15 | - if (isset($out[$cipher])) {
|
|
| 15 | + if (isset($out[$cipher])) { |
|
| 16 | 16 | continue; |
| 17 | 17 | } |
| 18 | 18 | |
@@ -29,7 +29,7 @@ discard block |
||
| 29 | 29 | |
| 30 | 30 | foreach (\Dcrypt\OpensslSupported::algos() as $algo) {
|
| 31 | 31 | $cipher = strtolower($algo); |
| 32 | - if (isset($out[$algo])) {
|
|
| 32 | + if (isset($out[$algo])) { |
|
| 33 | 33 | continue; |
| 34 | 34 | } |
| 35 | 35 | $out[$algo] = base64_encode(OpensslStatic::encrypt('hello', 'world', 'aes-256-gcm', $algo, 1000));
|
@@ -6,7 +6,7 @@ discard block |
||
| 6 | 6 | |
| 7 | 7 | use \Dcrypt\OpensslStatic; |
| 8 | 8 | |
| 9 | -require __DIR__ . '/../vendor/autoload.php'; |
|
| 9 | +require __DIR__.'/../vendor/autoload.php'; |
|
| 10 | 10 | |
| 11 | 11 | $out = []; |
| 12 | 12 | |
@@ -18,12 +18,12 @@ discard block |
||
| 18 | 18 | |
| 19 | 19 | try {
|
| 20 | 20 | $out[$cipher] = base64_encode(OpensslStatic::encrypt('hello', 'world', $cipher, 'sha256', 1000));
|
| 21 | - } catch (\Exception|\Error $e) {
|
|
| 21 | + } catch (\Exception | \Error $e) {
|
|
| 22 | 22 | |
| 23 | 23 | } |
| 24 | 24 | } |
| 25 | 25 | |
| 26 | -file_put_contents(__DIR__ . '/../tests/vectors/openssl-static-ciphers.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
| 26 | +file_put_contents(__DIR__.'/../tests/vectors/openssl-static-ciphers.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
| 27 | 27 | |
| 28 | 28 | $out = []; |
| 29 | 29 | |
@@ -35,7 +35,7 @@ discard block |
||
| 35 | 35 | $out[$algo] = base64_encode(OpensslStatic::encrypt('hello', 'world', 'aes-256-gcm', $algo, 1000));
|
| 36 | 36 | } |
| 37 | 37 | |
| 38 | -file_put_contents(__DIR__ . '/../tests/vectors/openssl-static-algos.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
| 38 | +file_put_contents(__DIR__.'/../tests/vectors/openssl-static-algos.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
| 39 | 39 | |
| 40 | 40 | $out = []; |
| 41 | 41 | |
@@ -45,4 +45,4 @@ discard block |
||
| 45 | 45 | $out[$mult] = \base64_encode(\Dcrypt\Otp::crypt(str_repeat('A', $mult), 'password', 1000));
|
| 46 | 46 | } |
| 47 | 47 | |
| 48 | -file_put_contents(__DIR__ . '/../tests/vectors/otp.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
| 49 | 48 | \ No newline at end of file |
| 49 | +file_put_contents(__DIR__.'/../tests/vectors/otp.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
| 50 | 50 | \ No newline at end of file |
@@ -109,7 +109,7 @@ |
||
| 109 | 109 | */ |
| 110 | 110 | public function deriveKey(string $info): string |
| 111 | 111 | {
|
| 112 | - $info = $info . '|' . $this->cipher; |
|
| 112 | + $info = $info.'|'.$this->cipher; |
|
| 113 | 113 | |
| 114 | 114 | $key = \hash_hkdf($this->algo, $this->key, 0, $info, $this->ivr); |
| 115 | 115 | |
@@ -26,8 +26,8 @@ discard block |
||
| 26 | 26 | * @license http://opensource.org/licenses/MIT The MIT License (MIT) |
| 27 | 27 | * @link https://github.com/mmeyer2k/dcrypt |
| 28 | 28 | */ |
| 29 | -final class OpensslKeyGenerator |
|
| 30 | -{
|
|
| 29 | +final class OpensslKeyGenerator |
|
| 30 | +{ |
|
| 31 | 31 | /** |
| 32 | 32 | * @var string |
| 33 | 33 | */ |
@@ -57,23 +57,23 @@ discard block |
||
| 57 | 57 | * @param string $ivr |
| 58 | 58 | * @param int $cost |
| 59 | 59 | */ |
| 60 | - public function __construct(string $algo, string $passkey, string $cipher, string $ivr, int $cost) |
|
| 61 | - {
|
|
| 60 | + public function __construct(string $algo, string $passkey, string $cipher, string $ivr, int $cost) |
|
| 61 | + { |
|
| 62 | 62 | // When cost is 0 then we are in key mode |
| 63 | - if ($cost === 0) {
|
|
| 63 | + if ($cost === 0) { |
|
| 64 | 64 | // Attempt to decode the passkey |
| 65 | 65 | $passkey = \base64_decode($passkey); |
| 66 | 66 | |
| 67 | 67 | // Make sure key was properly decoded and meets minimum required length |
| 68 | - if (Str::strlen($passkey) < 256) {
|
|
| 68 | + if (Str::strlen($passkey) < 256) { |
|
| 69 | 69 | throw new InvalidKeyException("Key must be at least 2048 bits long and base64 encoded.");
|
| 70 | 70 | } |
| 71 | 71 | |
| 72 | 72 | // Store the key as what was supplied |
| 73 | 73 | $this->key = $passkey; |
| 74 | - } else {
|
|
| 74 | + } else { |
|
| 75 | 75 | // Make sure that the user is not attempting to use a key in password word mode |
| 76 | - if (Str::strlen($passkey) >= 256) {
|
|
| 76 | + if (Str::strlen($passkey) >= 256) { |
|
| 77 | 77 | throw new InvalidPasswordException("Passwords must be less than 2048 bits (256 bytes) long.");
|
| 78 | 78 | } |
| 79 | 79 | |
@@ -124,7 +124,7 @@ discard block |
||
| 124 | 124 | |
| 125 | 125 | $key = \hash_hkdf($this->algo, $this->key, 0, $info, $this->ivr); |
| 126 | 126 | |
| 127 | - if ($key === false) {
|
|
| 127 | + if ($key === false) { |
|
| 128 | 128 | throw new Exceptions\InvalidAlgoException("Hash algo $this->algo is not supported by hash_hkdf.");
|
| 129 | 129 | } |
| 130 | 130 | |
@@ -140,11 +140,11 @@ discard block |
||
| 140 | 140 | */ |
| 141 | 141 | public static function newKey(int $size = 2048): string |
| 142 | 142 | {
|
| 143 | - if ($size < 2048) {
|
|
| 143 | + if ($size < 2048) { |
|
| 144 | 144 | throw new InvalidKeyException('Key must be at least 2048 bits long.');
|
| 145 | 145 | } |
| 146 | 146 | |
| 147 | - if ($size % 8 !== 0) {
|
|
| 147 | + if ($size % 8 !== 0) { |
|
| 148 | 148 | throw new InvalidKeyException('Key must be divisible by 8.');
|
| 149 | 149 | } |
| 150 | 150 | |
@@ -41,10 +41,10 @@ |
||
| 41 | 41 | |
| 42 | 42 | $length = Str::strlen($input); |
| 43 | 43 | |
| 44 | - $key = new OpensslKeyGenerator($algo, $passkey, '', (string)$length, $cost); |
|
| 44 | + $key = new OpensslKeyGenerator($algo, $passkey, '', (string) $length, $cost); |
|
| 45 | 45 | |
| 46 | 46 | foreach ($chunks as $i => &$chunk) { |
| 47 | - $info = $length . $i . $cost; |
|
| 47 | + $info = $length.$i.$cost; |
|
| 48 | 48 | $chunk = $chunk ^ $key->deriveKey($info); |
| 49 | 49 | } |
| 50 | 50 | |
@@ -2,8 +2,8 @@ |
||
| 2 | 2 | |
| 3 | 3 | namespace Dcrypt\Examples; |
| 4 | 4 | |
| 5 | -class Aes256Base64 extends \Dcrypt\OpensslBridge |
|
| 6 | -{
|
|
| 5 | +class Aes256Base64 extends \Dcrypt\OpensslBridge |
|
| 6 | +{ |
|
| 7 | 7 | const CIPHER = 'aes-256-gcm'; |
| 8 | 8 | |
| 9 | 9 | const ALGO = 'sha256'; |