@@ -8,7 +8,7 @@ discard block |
||
| 8 | 8 | * Displays supported ciphers and algos |
| 9 | 9 | */ |
| 10 | 10 | |
| 11 | -require __DIR__ . '/../vendor/autoload.php'; |
|
| 11 | +require __DIR__.'/../vendor/autoload.php'; |
|
| 12 | 12 | |
| 13 | 13 | $key = \Dcrypt\OpensslKey::create(); |
| 14 | 14 | |
@@ -27,7 +27,7 @@ discard block |
||
| 27 | 27 | $d = \Dcrypt\OpensslStatic::decrypt($e, $key, $meth, 'sha256'); |
| 28 | 28 | |
| 29 | 29 | echo " [pass] "; |
| 30 | - } catch (\Exception|\Error $e) { |
|
| 30 | + } catch (\Exception | \Error $e) { |
|
| 31 | 31 | $m = $e->getMessage(); |
| 32 | 32 | echo " [fail] [!!!]"; |
| 33 | 33 | } finally { |
@@ -50,7 +50,7 @@ discard block |
||
| 50 | 50 | $d = \Dcrypt\OpensslStatic::decrypt($e, $key, 'aes-256-gcm', $algo); |
| 51 | 51 | |
| 52 | 52 | echo " [pass] "; |
| 53 | - } catch (\Exception|\Error $e) { |
|
| 53 | + } catch (\Exception | \Error $e) { |
|
| 54 | 54 | $m = $e->getMessage(); |
| 55 | 55 | echo " [fail] [!!!]"; |
| 56 | 56 | } finally { |
@@ -44,7 +44,7 @@ |
||
| 44 | 44 | |
| 45 | 45 | foreach ($chunks as $i => &$chunk) { |
| 46 | 46 | // Create the info key based on counter |
| 47 | - $info = $length . $i; |
|
| 47 | + $info = $length.$i; |
|
| 48 | 48 | |
| 49 | 49 | // Xor the derived key with the data chunk |
| 50 | 50 | $chunk = $chunk ^ $key->deriveKey($info); |
@@ -2,8 +2,8 @@ |
||
| 2 | 2 | |
| 3 | 3 | namespace Dcrypt\Examples; |
| 4 | 4 | |
| 5 | -class Aes256Base64 extends \Dcrypt\Aes256Gcm |
|
| 6 | -{
|
|
| 5 | +class Aes256Base64 extends \Dcrypt\Aes256Gcm |
|
| 6 | +{ |
|
| 7 | 7 | public static function decrypt(string $data, string $key): string |
| 8 | 8 | {
|
| 9 | 9 | return parent::decrypt(\base64_decode($data), $key); |
@@ -7,8 +7,8 @@ |
||
| 7 | 7 | * |
| 8 | 8 | * This is useful for medium security situations where minimal space consumption is important. |
| 9 | 9 | */ |
| 10 | -class TinyFish extends \Dcrypt\OpensslBridge |
|
| 11 | -{
|
|
| 10 | +class TinyFish extends \Dcrypt\OpensslBridge |
|
| 11 | +{ |
|
| 12 | 12 | /** |
| 13 | 13 | * Specify using blowfish ofb cipher method |
| 14 | 14 | * |
@@ -82,7 +82,7 @@ discard block |
||
| 82 | 82 | */ |
| 83 | 83 | public function authenticationKey(string $info): string |
| 84 | 84 | { |
| 85 | - return $this->deriveKey(__FUNCTION__ . '|' . $info); |
|
| 85 | + return $this->deriveKey(__FUNCTION__.'|'.$info); |
|
| 86 | 86 | } |
| 87 | 87 | |
| 88 | 88 | /** |
@@ -94,7 +94,7 @@ discard block |
||
| 94 | 94 | */ |
| 95 | 95 | public function encryptionKey(string $info): string |
| 96 | 96 | { |
| 97 | - return $this->deriveKey(__FUNCTION__ . '|' . $info); |
|
| 97 | + return $this->deriveKey(__FUNCTION__.'|'.$info); |
|
| 98 | 98 | } |
| 99 | 99 | |
| 100 | 100 | /** |
@@ -6,9 +6,9 @@ discard block |
||
| 6 | 6 | |
| 7 | 7 | use \Dcrypt\OpensslStatic; |
| 8 | 8 | |
| 9 | -require __DIR__ . '/../vendor/autoload.php'; |
|
| 9 | +require __DIR__.'/../vendor/autoload.php'; |
|
| 10 | 10 | |
| 11 | -$vectors = __DIR__ . '/../tests/.vectors.json'; |
|
| 11 | +$vectors = __DIR__.'/../tests/.vectors.json'; |
|
| 12 | 12 | |
| 13 | 13 | if (file_exists($vectors)) {
|
| 14 | 14 | $key = json_decode(file_get_contents($vectors))->key; |
@@ -31,7 +31,7 @@ discard block |
||
| 31 | 31 | |
| 32 | 32 | try {
|
| 33 | 33 | $out['ciphers'][$cipher] = base64_encode(OpensslStatic::encrypt('a secret', $key, $cipher, 'sha3-256'));
|
| 34 | - } catch (\Exception|\Error $e) {
|
|
| 34 | + } catch (\Exception | \Error $e) {
|
|
| 35 | 35 | |
| 36 | 36 | } |
| 37 | 37 | } |
@@ -44,7 +44,7 @@ discard block |
||
| 44 | 44 | $out['algos'][$algo] = base64_encode(OpensslStatic::encrypt('a secret', $key, 'aes-256-gcm', $algo));
|
| 45 | 45 | } |
| 46 | 46 | |
| 47 | -foreach(['Gcm', 'Ctr', 'Ofb', 'Cbc', 'Ecb', 'Ccm', 'Cfb'] as $mode){
|
|
| 47 | +foreach (['Gcm', 'Ctr', 'Ofb', 'Cbc', 'Ecb', 'Ccm', 'Cfb'] as $mode) {
|
|
| 48 | 48 | $c = "\\Dcrypt\\Aes256$mode"; |
| 49 | 49 | $out['aes256'][$c] = base64_encode($c::encrypt('a secret', $key));
|
| 50 | 50 | } |
@@ -55,6 +55,6 @@ discard block |
||
| 55 | 55 | $out['otp'][$mult] = \base64_encode(\Dcrypt\OneTimePad::crypt(str_repeat('A', $mult), $key));
|
| 56 | 56 | } |
| 57 | 57 | |
| 58 | -file_put_contents(__DIR__ . '/../tests/.vectors.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
| 58 | +file_put_contents(__DIR__.'/../tests/.vectors.json', \json_encode($out, JSON_PRETTY_PRINT)); |
|
| 59 | 59 | |
| 60 | 60 | var_dump($out); |
| 61 | 61 | \ No newline at end of file |
@@ -10,9 +10,9 @@ discard block |
||
| 10 | 10 | |
| 11 | 11 | $vectors = __DIR__ . '/../tests/.vectors.json'; |
| 12 | 12 | |
| 13 | -if (file_exists($vectors)) {
|
|
| 13 | +if (file_exists($vectors)) { |
|
| 14 | 14 | $key = json_decode(file_get_contents($vectors))->key; |
| 15 | -} else {
|
|
| 15 | +} else { |
|
| 16 | 16 | $key = \Dcrypt\OpensslKey::create(); |
| 17 | 17 | } |
| 18 | 18 | |
@@ -25,7 +25,7 @@ discard block |
||
| 25 | 25 | ]; |
| 26 | 26 | |
| 27 | 27 | foreach (\Dcrypt\OpensslSupported::ciphers() as $cipher) {
|
| 28 | - if (strtolower($cipher) !== $cipher) {
|
|
| 28 | + if (strtolower($cipher) !== $cipher) { |
|
| 29 | 29 | continue; |
| 30 | 30 | } |
| 31 | 31 | |
@@ -37,7 +37,7 @@ discard block |
||
| 37 | 37 | } |
| 38 | 38 | |
| 39 | 39 | foreach (\Dcrypt\OpensslSupported::algos() as $algo) {
|
| 40 | - if (strtolower($algo) !== $algo) {
|
|
| 40 | + if (strtolower($algo) !== $algo) { |
|
| 41 | 41 | continue; |
| 42 | 42 | } |
| 43 | 43 | |
@@ -119,6 +119,6 @@ |
||
| 119 | 119 | $chk = \hash_hmac($algo, $msg, $key->authenticationKey($cipher), true); |
| 120 | 120 | |
| 121 | 121 | // Return concatenation of iv + checksum + tag + ciphertext |
| 122 | - return $ivr . $chk . $tag . $msg; |
|
| 122 | + return $ivr.$chk.$tag.$msg; |
|
| 123 | 123 | } |
| 124 | 124 | } |