@@ -48,16 +48,16 @@ |
||
48 | 48 | $this->host = $host; |
49 | 49 | |
50 | 50 | // TLS options |
51 | - if(null !== $tlsOptions && is_array($tlsOptions)) { |
|
52 | - if(true === array_key_exists(self::tlsOptionForceHttps, $tlsOptions)) { |
|
51 | + if (null !== $tlsOptions && is_array($tlsOptions)) { |
|
52 | + if (true === array_key_exists(self::tlsOptionForceHttps, $tlsOptions)) { |
|
53 | 53 | $this->tlsOptions[self::tlsOptionForceHttps] = $tlsOptions[self::tlsOptionForceHttps] === true; |
54 | 54 | } |
55 | 55 | |
56 | - if(true === array_key_exists(self::tlsOptionVersion, $tlsOptions)) { |
|
56 | + if (true === array_key_exists(self::tlsOptionVersion, $tlsOptions)) { |
|
57 | 57 | $this->tlsOptions[self::tlsOptionVersion] = $tlsOptions[self::tlsOptionVersion]; |
58 | 58 | } |
59 | 59 | |
60 | - if(true === array_key_exists(self::tlsOptionCipher, $tlsOptions)) { |
|
60 | + if (true === array_key_exists(self::tlsOptionCipher, $tlsOptions)) { |
|
61 | 61 | $this->tlsOptions[self::tlsOptionCipher] = $tlsOptions[self::tlsOptionCipher]; |
62 | 62 | } |
63 | 63 | } |
@@ -42,7 +42,7 @@ discard block |
||
42 | 42 | $this->cryptTool = $cryptTool; |
43 | 43 | $this->privateKey = $privateKey; |
44 | 44 | |
45 | - if(null === $this->cryptTool) { |
|
45 | + if (null === $this->cryptTool) { |
|
46 | 46 | $this->cryptTool = CryptTool::getInstance(); |
47 | 47 | } |
48 | 48 | } |
@@ -84,11 +84,11 @@ discard block |
||
84 | 84 | //analyse the file |
85 | 85 | $fileAnalyzeResult = FileAnalysisTool::analyse($imagePath); |
86 | 86 | |
87 | - if(null === $fileAnalyzeResult) { |
|
87 | + if (null === $fileAnalyzeResult) { |
|
88 | 88 | throw new Exception('could not analyze the file'); |
89 | 89 | } |
90 | 90 | |
91 | - if(false === in_array($fileAnalyzeResult->getMimeType(), array( |
|
91 | + if (false === in_array($fileAnalyzeResult->getMimeType(), array( |
|
92 | 92 | 'image/jpg', |
93 | 93 | 'image/jpeg', |
94 | 94 | 'image/png' ))) { |
@@ -102,9 +102,9 @@ discard block |
||
102 | 102 | |
103 | 103 | //encrypt the image file |
104 | 104 | $encryptionResult = $this->cryptTool->encryptImage(file_get_contents($imagePath), $this->privateKey, $receiverPublicKey); |
105 | - $uploadResult = $this->connection->uploadFile($encryptionResult->getData()); |
|
105 | + $uploadResult = $this->connection->uploadFile($encryptionResult->getData()); |
|
106 | 106 | |
107 | - if($uploadResult == null || !$uploadResult->isSuccess()) { |
|
107 | + if ($uploadResult == null || !$uploadResult->isSuccess()) { |
|
108 | 108 | throw new Exception('could not upload the image ('.$uploadResult->getErrorCode().' '.$uploadResult->getErrorMessage().') '.$uploadResult->getRawResponse()); |
109 | 109 | } |
110 | 110 | |
@@ -134,7 +134,7 @@ discard block |
||
134 | 134 | //analyse the file |
135 | 135 | $fileAnalyzeResult = FileAnalysisTool::analyse($filePath); |
136 | 136 | |
137 | - if(null === $fileAnalyzeResult) { |
|
137 | + if (null === $fileAnalyzeResult) { |
|
138 | 138 | throw new Exception('could not analyze the file'); |
139 | 139 | } |
140 | 140 | |
@@ -145,21 +145,21 @@ discard block |
||
145 | 145 | |
146 | 146 | //encrypt the main file |
147 | 147 | $encryptionResult = $this->cryptTool->encryptFile(file_get_contents($filePath)); |
148 | - $uploadResult = $this->connection->uploadFile($encryptionResult->getData()); |
|
148 | + $uploadResult = $this->connection->uploadFile($encryptionResult->getData()); |
|
149 | 149 | |
150 | - if($uploadResult == null || !$uploadResult->isSuccess()) { |
|
150 | + if ($uploadResult == null || !$uploadResult->isSuccess()) { |
|
151 | 151 | throw new Exception('could not upload the file ('.$uploadResult->getErrorCode().' '.$uploadResult->getErrorMessage().') '.$uploadResult->getRawResponse()); |
152 | 152 | } |
153 | 153 | |
154 | 154 | $thumbnailUploadResult = null; |
155 | 155 | |
156 | 156 | //encrypt the thumbnail file (if exists) |
157 | - if(strlen($thumbnailPath) > 0 && true === file_exists($thumbnailPath)) { |
|
157 | + if (strlen($thumbnailPath) > 0 && true === file_exists($thumbnailPath)) { |
|
158 | 158 | //encrypt the main file |
159 | 159 | $thumbnailEncryptionResult = $this->cryptTool->encryptFileThumbnail(file_get_contents($thumbnailPath), $encryptionResult->getKey()); |
160 | 160 | $thumbnailUploadResult = $this->connection->uploadFile($thumbnailEncryptionResult->getData()); |
161 | 161 | |
162 | - if($thumbnailUploadResult == null || !$thumbnailUploadResult->isSuccess()) { |
|
162 | + if ($thumbnailUploadResult == null || !$thumbnailUploadResult->isSuccess()) { |
|
163 | 163 | throw new Exception('could not upload the thumbnail file ('.$thumbnailUploadResult->getErrorCode().' '.$thumbnailUploadResult->getErrorMessage().') '.$thumbnailUploadResult->getRawResponse()); |
164 | 164 | } |
165 | 165 | } |
@@ -202,14 +202,14 @@ discard block |
||
202 | 202 | $outputFolder = null, |
203 | 203 | \Closure $downloadMessage = null) { |
204 | 204 | |
205 | - if($outputFolder == null || strlen($outputFolder) == 0) { |
|
205 | + if ($outputFolder == null || strlen($outputFolder) == 0) { |
|
206 | 206 | $outputFolder = '.'; |
207 | 207 | } |
208 | 208 | |
209 | 209 | //fetch the public key |
210 | 210 | $receiverPublicKey = $this->connection->fetchPublicKey($threemaId); |
211 | 211 | |
212 | - if(null === $receiverPublicKey || !$receiverPublicKey->isSuccess()) { |
|
212 | + if (null === $receiverPublicKey || !$receiverPublicKey->isSuccess()) { |
|
213 | 213 | throw new Exception('Invalid threema id'); |
214 | 214 | } |
215 | 215 | |
@@ -220,15 +220,15 @@ discard block |
||
220 | 220 | $nonce |
221 | 221 | ); |
222 | 222 | |
223 | - if(null === $message || false === is_object($message)) { |
|
223 | + if (null === $message || false === is_object($message)) { |
|
224 | 224 | throw new Exception('Could not encrypt box'); |
225 | 225 | } |
226 | 226 | |
227 | 227 | $receiveResult = new ReceiveMessageResult($messageId, $message); |
228 | 228 | |
229 | - if($message instanceof ImageMessage) { |
|
229 | + if ($message instanceof ImageMessage) { |
|
230 | 230 | $result = $this->downloadFile($message, $message->getBlobId(), $downloadMessage); |
231 | - if(null !== $result && true === $result->isSuccess()) { |
|
231 | + if (null !== $result && true === $result->isSuccess()) { |
|
232 | 232 | $image = $this->cryptTool->decryptImage( |
233 | 233 | $result->getData(), |
234 | 234 | hex2bin($receiverPublicKey->getPublicKey()), |
@@ -240,7 +240,7 @@ discard block |
||
240 | 240 | throw new Exception('decryption of image failed'); |
241 | 241 | } |
242 | 242 | //save file |
243 | - $filePath = $outputFolder . '/' . $messageId . '.jpg'; |
|
243 | + $filePath = $outputFolder.'/'.$messageId.'.jpg'; |
|
244 | 244 | $f = fopen($filePath, 'w+'); |
245 | 245 | fwrite($f, $image); |
246 | 246 | fclose($f); |
@@ -248,10 +248,10 @@ discard block |
||
248 | 248 | $receiveResult->addFile('image', $filePath); |
249 | 249 | } |
250 | 250 | } |
251 | - else if($message instanceof FileMessage) { |
|
251 | + else if ($message instanceof FileMessage) { |
|
252 | 252 | $result = $this->downloadFile($message, $message->getBlobId(), $downloadMessage); |
253 | 253 | |
254 | - if(null !== $result && true === $result->isSuccess()) { |
|
254 | + if (null !== $result && true === $result->isSuccess()) { |
|
255 | 255 | $file = $this->cryptTool->decryptFile( |
256 | 256 | $result->getData(), |
257 | 257 | hex2bin($message->getEncryptionKey())); |
@@ -261,20 +261,20 @@ discard block |
||
261 | 261 | } |
262 | 262 | |
263 | 263 | //save file |
264 | - $filePath = $outputFolder . '/' . $messageId . '-' . $message->getFilename(); |
|
264 | + $filePath = $outputFolder.'/'.$messageId.'-'.$message->getFilename(); |
|
265 | 265 | file_put_contents($filePath, $file); |
266 | 266 | |
267 | 267 | $receiveResult->addFile('file', $filePath); |
268 | 268 | } |
269 | 269 | |
270 | - if(null !== $message->getThumbnailBlobId() && strlen($message->getThumbnailBlobId()) > 0) { |
|
270 | + if (null !== $message->getThumbnailBlobId() && strlen($message->getThumbnailBlobId()) > 0) { |
|
271 | 271 | $result = $this->downloadFile($message, $message->getThumbnailBlobId(), $downloadMessage); |
272 | - if(null !== $result && true === $result->isSuccess()) { |
|
272 | + if (null !== $result && true === $result->isSuccess()) { |
|
273 | 273 | $file = $this->cryptTool->decryptFileThumbnail( |
274 | 274 | $result->getData(), |
275 | 275 | hex2bin($message->getEncryptionKey())); |
276 | 276 | |
277 | - if(null === $file) { |
|
277 | + if (null === $file) { |
|
278 | 278 | throw new Exception('thumbnail decryption failed'); |
279 | 279 | } |
280 | 280 | //save file |
@@ -301,14 +301,14 @@ discard block |
||
301 | 301 | //fetch the public key |
302 | 302 | $receiverPublicKey = $this->connection->fetchPublicKey($threemaId); |
303 | 303 | |
304 | - if(null === $receiverPublicKey || !$receiverPublicKey->isSuccess()) { |
|
304 | + if (null === $receiverPublicKey || !$receiverPublicKey->isSuccess()) { |
|
305 | 305 | throw new Exception('Invalid threema id'); |
306 | 306 | } |
307 | 307 | |
308 | - if(null !== $capabilityCheck) { |
|
308 | + if (null !== $capabilityCheck) { |
|
309 | 309 | //check capability |
310 | 310 | $capability = $this->connection->keyCapability($threemaId); |
311 | - if(null === $capability || false === $capabilityCheck->__invoke($capability)) { |
|
311 | + if (null === $capability || false === $capabilityCheck->__invoke($capability)) { |
|
312 | 312 | throw new Exception('threema id does not have the capability'); |
313 | 313 | } |
314 | 314 | } |
@@ -324,11 +324,11 @@ discard block |
||
324 | 324 | * @throws Exception |
325 | 325 | */ |
326 | 326 | private final function downloadFile(ThreemaMessage $message, $blobId, \Closure $downloadMessage = null) { |
327 | - if(null === $downloadMessage |
|
327 | + if (null === $downloadMessage |
|
328 | 328 | || true === $downloadMessage->__invoke($message, $blobId)) { |
329 | 329 | //make a download |
330 | 330 | $result = $this->connection->downloadFile($blobId); |
331 | - if(null === $result || false === $result->isSuccess()) { |
|
331 | + if (null === $result || false === $result->isSuccess()) { |
|
332 | 332 | throw new Exception('could not download the file with blob id '.$blobId); |
333 | 333 | } |
334 | 334 |
@@ -57,7 +57,7 @@ discard block |
||
57 | 57 | * @return string |
58 | 58 | */ |
59 | 59 | public function getReceiptTypeName() { |
60 | - if(true === array_key_exists($this->receiptType, self::$receiptTypesToNames)) { |
|
60 | + if (true === array_key_exists($this->receiptType, self::$receiptTypesToNames)) { |
|
61 | 61 | return self::$receiptTypesToNames[$this->receiptType]; |
62 | 62 | } |
63 | 63 | return null; |
@@ -77,7 +77,7 @@ discard block |
||
77 | 77 | * @return string |
78 | 78 | */ |
79 | 79 | function __toString() { |
80 | - $str = "Delivery receipt (" . $this->getReceiptTypeName() . "): "; |
|
80 | + $str = "Delivery receipt (".$this->getReceiptTypeName()."): "; |
|
81 | 81 | $hexMessageIds = array(); |
82 | 82 | foreach ($this->ackedMessageIds as $messageId) { |
83 | 83 | $hexMessageIds[] = bin2hex($messageId); |
@@ -27,12 +27,12 @@ |
||
27 | 27 | * @return string|null |
28 | 28 | */ |
29 | 29 | public final function getPublicKey($threemaId) { |
30 | - if(array_key_exists($threemaId, $this->cache)) { |
|
30 | + if (array_key_exists($threemaId, $this->cache)) { |
|
31 | 31 | return $this->cache[$threemaId]; |
32 | 32 | } |
33 | 33 | |
34 | 34 | $publicKey = $this->findPublicKey($threemaId); |
35 | - if(null !== $publicKey) { |
|
35 | + if (null !== $publicKey) { |
|
36 | 36 | $this->cache[$threemaId] = $publicKey; |
37 | 37 | } |
38 | 38 | return $publicKey; |
@@ -25,7 +25,7 @@ discard block |
||
25 | 25 | * @throws Exception if the file does not exist or not writable |
26 | 26 | */ |
27 | 27 | public function __construct($file) { |
28 | - if(false === is_writable($file)) { |
|
28 | + if (false === is_writable($file)) { |
|
29 | 29 | throw new Exception('file '.$file.' does not exist or is not writable'); |
30 | 30 | } |
31 | 31 | $this->file = $file; |
@@ -39,7 +39,7 @@ discard block |
||
39 | 39 | */ |
40 | 40 | function findPublicKey($threemaId) { |
41 | 41 | $storeHandle = fopen($this->file, 'r'); |
42 | - if(false === $storeHandle) { |
|
42 | + if (false === $storeHandle) { |
|
43 | 43 | throw new Exception('could not open file '.$this->file); |
44 | 44 | } |
45 | 45 | else { |
@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | $publicKey = null; |
48 | 48 | while (!feof($storeHandle)) { |
49 | 49 | $buffer = fgets($storeHandle, 4096); |
50 | - if(substr($buffer, 0, 8) == $threemaId) { |
|
50 | + if (substr($buffer, 0, 8) == $threemaId) { |
|
51 | 51 | $publicKey = str_replace("\n", '', substr($buffer, 8)); |
52 | 52 | continue; |
53 | 53 | } |
@@ -43,10 +43,10 @@ discard block |
||
43 | 43 | public function __construct($file) |
44 | 44 | { |
45 | 45 | if (false === is_writable($file)) { |
46 | - throw new Exception('file ' . $file . ' does not exist or is not writable'); |
|
46 | + throw new Exception('file '.$file.' does not exist or is not writable'); |
|
47 | 47 | } |
48 | 48 | if (pathinfo($file, PATHINFO_EXTENSION) != 'php') { |
49 | - throw new Exception('file ' . $file . ' is not a valid PHP file'); |
|
49 | + throw new Exception('file '.$file.' is not a valid PHP file'); |
|
50 | 50 | } |
51 | 51 | $this->file = $file; |
52 | 52 | } |
@@ -104,12 +104,12 @@ discard block |
||
104 | 104 | |
105 | 105 | //add key |
106 | 106 | $this->keystore[$threemaId] = $publicKey; |
107 | - $content = '$keystore[\'' . $threemaId . '\'] = \'' . $publicKey . '\';' . PHP_EOL; |
|
107 | + $content = '$keystore[\''.$threemaId.'\'] = \''.$publicKey.'\';'.PHP_EOL; |
|
108 | 108 | |
109 | 109 | //write content |
110 | 110 | $fileadd = file_put_contents($this->file, $content, FILE_APPEND); |
111 | 111 | if (!$fileadd) { |
112 | - throw new Exception('could not write to file ' . $this->file); |
|
112 | + throw new Exception('could not write to file '.$this->file); |
|
113 | 113 | } |
114 | 114 | |
115 | 115 | return true; |
@@ -137,28 +137,28 @@ discard block |
||
137 | 137 | |
138 | 138 | //check for success |
139 | 139 | if (null === $fileHandle) { |
140 | - throw new Exception('could not open file ' . $this->file); |
|
140 | + throw new Exception('could not open file '.$this->file); |
|
141 | 141 | } |
142 | 142 | } |
143 | 143 | |
144 | 144 | //create content |
145 | - $content = $this->fileBlocker . PHP_EOL; |
|
145 | + $content = $this->fileBlocker.PHP_EOL; |
|
146 | 146 | $content .= PHP_EOL; |
147 | - $content .= '//Threema MsgApi phpfile keystore' . PHP_EOL; |
|
148 | - $content .= '//DO NOT EDIT THIS FILE!' . PHP_EOL; |
|
147 | + $content .= '//Threema MsgApi phpfile keystore'.PHP_EOL; |
|
148 | + $content .= '//DO NOT EDIT THIS FILE!'.PHP_EOL; |
|
149 | 149 | $content .= PHP_EOL; |
150 | 150 | |
151 | 151 | //write file |
152 | 152 | $fwrite = fwrite($fileHandle, $content); |
153 | 153 | if (!$fwrite) { |
154 | - throw new Exception('could not write to file ' . $this->file); |
|
154 | + throw new Exception('could not write to file '.$this->file); |
|
155 | 155 | } |
156 | 156 | |
157 | 157 | //close file if necessary |
158 | 158 | if ($fileopened) { |
159 | 159 | $fclose = fclose($fileHandle); |
160 | 160 | if (!$fclose) { |
161 | - throw new Exception('error while processing file ' . $this->file); |
|
161 | + throw new Exception('error while processing file '.$this->file); |
|
162 | 162 | } |
163 | 163 | } |
164 | 164 | return true; |
@@ -170,7 +170,7 @@ discard block |
||
170 | 170 | * @return PhpFile |
171 | 171 | */ |
172 | 172 | public static function create($path) { |
173 | - if(false === file_exists($path)) { |
|
173 | + if (false === file_exists($path)) { |
|
174 | 174 | //touch |
175 | 175 | touch($path); |
176 | 176 | } |
@@ -73,7 +73,7 @@ |
||
73 | 73 | * @throws \InvalidArgumentException |
74 | 74 | */ |
75 | 75 | public function getParams() { |
76 | - switch($this->type) { |
|
76 | + switch ($this->type) { |
|
77 | 77 | case self::TYPE_ID: |
78 | 78 | $to = $this->type; |
79 | 79 | $this->value = strtoupper(trim($this->value)); |
@@ -56,7 +56,7 @@ discard block |
||
56 | 56 | |
57 | 57 | $this->assertNotNull($message); |
58 | 58 | $this->assertTrue($message instanceof TextMessage); |
59 | - if($message instanceof TextMessage) { |
|
59 | + if ($message instanceof TextMessage) { |
|
60 | 60 | $this->assertEquals($message->getText(), 'Dies ist eine Testnachricht. äöü'); |
61 | 61 | } |
62 | 62 | }); |
@@ -92,7 +92,7 @@ discard block |
||
92 | 92 | |
93 | 93 | |
94 | 94 | public function testDerivePublicKey() { |
95 | - $this->doTest(function(CryptTool $cryptTool, $prefix){ |
|
95 | + $this->doTest(function(CryptTool $cryptTool, $prefix) { |
|
96 | 96 | $publicKey = $cryptTool->derivePublicKey(hex2bin(Common::getPrivateKey(Constants::myPrivateKey))); |
97 | 97 | $myPublicKey = hex2bin(Common::getPublicKey(Constants::myPublicKey)); |
98 | 98 | |
@@ -120,12 +120,12 @@ discard block |
||
120 | 120 | }); |
121 | 121 | } |
122 | 122 | private function doTest(\Closure $c) { |
123 | - foreach(array( |
|
123 | + foreach (array( |
|
124 | 124 | 'Salt' => CryptTool::createInstance(CryptTool::TYPE_SALT), |
125 | 125 | 'Sodium' => CryptTool::createInstance(CryptTool::TYPE_SODIUM) |
126 | 126 | ) as $key => $instance) { |
127 | 127 | |
128 | - if($instance === null) { |
|
128 | + if ($instance === null) { |
|
129 | 129 | echo $key.": could not instance crypt tool\n"; |
130 | 130 | break; |
131 | 131 | } |
@@ -42,8 +42,8 @@ discard block |
||
42 | 42 | * @return CryptTool |
43 | 43 | */ |
44 | 44 | public static function getInstance() { |
45 | - if(null === self::$instance) { |
|
46 | - foreach(array( |
|
45 | + if (null === self::$instance) { |
|
46 | + foreach (array( |
|
47 | 47 | function() { |
48 | 48 | return self::createInstance(self::TYPE_SODIUM); |
49 | 49 | }, |
@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | return self::createInstance(self::TYPE_SALT); |
52 | 52 | }) as $instanceGenerator) { |
53 | 53 | $i = $instanceGenerator->__invoke(); |
54 | - if(null !== $i) { |
|
54 | + if (null !== $i) { |
|
55 | 55 | self::$instance = $i; |
56 | 56 | break; |
57 | 57 | } |
@@ -66,18 +66,18 @@ discard block |
||
66 | 66 | * @return null|CryptTool null on unknown type |
67 | 67 | */ |
68 | 68 | public static function createInstance($type) { |
69 | - switch($type) { |
|
69 | + switch ($type) { |
|
70 | 70 | case self::TYPE_SODIUM: |
71 | 71 | $instance = new CryptToolSodium(); |
72 | - if(false === $instance->isSupported()) { |
|
72 | + if (false === $instance->isSupported()) { |
|
73 | 73 | //try to instance old version of sodium wrapper |
74 | 74 | /** @noinspection PhpDeprecationInspection */ |
75 | 75 | $instance = new CryptToolSodiumDep(); |
76 | 76 | } |
77 | - return $instance->isSupported() ? $instance :null; |
|
77 | + return $instance->isSupported() ? $instance : null; |
|
78 | 78 | case self::TYPE_SALT: |
79 | 79 | $instance = new CryptToolSalt(); |
80 | - return $instance->isSupported() ? $instance :null; |
|
80 | + return $instance->isSupported() ? $instance : null; |
|
81 | 81 | default: |
82 | 82 | return null; |
83 | 83 | } |
@@ -104,7 +104,7 @@ discard block |
||
104 | 104 | */ |
105 | 105 | final public function encryptMessageText($text, $senderPrivateKey, $recipientPublicKey, $nonce) { |
106 | 106 | /* prepend type byte (0x01) to message data */ |
107 | - $textBytes = "\x01" . $text; |
|
107 | + $textBytes = "\x01".$text; |
|
108 | 108 | |
109 | 109 | /* determine random amount of PKCS7 padding */ |
110 | 110 | $padbytes = mt_rand(1, 255); |
@@ -129,7 +129,7 @@ discard block |
||
129 | 129 | $senderPrivateKey, |
130 | 130 | $recipientPublicKey, |
131 | 131 | $nonce) { |
132 | - $message = "\x02" . hex2bin($uploadFileResult->getBlobId()); |
|
132 | + $message = "\x02".hex2bin($uploadFileResult->getBlobId()); |
|
133 | 133 | $message .= pack('V', $encryptResult->getSize()); |
134 | 134 | $message .= $encryptResult->getNonce(); |
135 | 135 | |
@@ -160,11 +160,11 @@ discard block |
||
160 | 160 | 'i' => 0 |
161 | 161 | ); |
162 | 162 | |
163 | - if($thumbnailUploadFileResult != null && strlen($thumbnailUploadFileResult->getBlobId()) > 0) { |
|
163 | + if ($thumbnailUploadFileResult != null && strlen($thumbnailUploadFileResult->getBlobId()) > 0) { |
|
164 | 164 | $messageContent['t'] = $thumbnailUploadFileResult->getBlobId(); |
165 | 165 | } |
166 | 166 | |
167 | - $message = "\x17" . json_encode($messageContent); |
|
167 | + $message = "\x17".json_encode($messageContent); |
|
168 | 168 | |
169 | 169 | /* determine random amount of PKCS7 padding */ |
170 | 170 | $padbytes = mt_rand(1, 255); |
@@ -237,7 +237,7 @@ discard block |
||
237 | 237 | |
238 | 238 | /* remove padding */ |
239 | 239 | $padbytes = ord($data[strlen($data)-1]); |
240 | - $realDataLength = strlen($data) - $padbytes; |
|
240 | + $realDataLength = strlen($data)-$padbytes; |
|
241 | 241 | if ($realDataLength < 1) { |
242 | 242 | throw new BadMessageException(); |
243 | 243 | } |
@@ -263,7 +263,7 @@ discard block |
||
263 | 263 | return new TextMessage(substr($data, 1)); |
264 | 264 | case DeliveryReceipt::TYPE_CODE: |
265 | 265 | /* Delivery receipt */ |
266 | - if ($realDataLength < (self::MESSAGE_ID_LEN-2) || (($realDataLength - 2) % self::MESSAGE_ID_LEN) != 0) { |
|
266 | + if ($realDataLength < (self::MESSAGE_ID_LEN-2) || (($realDataLength-2)%self::MESSAGE_ID_LEN) != 0) { |
|
267 | 267 | throw new BadMessageException(); |
268 | 268 | } |
269 | 269 | |
@@ -273,7 +273,7 @@ discard block |
||
273 | 273 | return new DeliveryReceipt($receiptType, $messageIds); |
274 | 274 | case ImageMessage::TYPE_CODE: |
275 | 275 | /* Image Message */ |
276 | - if ($realDataLength != 1 + self::BLOB_ID_LEN + self::IMAGE_FILE_SIZE_LEN + self::IMAGE_NONCE_LEN) { |
|
276 | + if ($realDataLength != 1+self::BLOB_ID_LEN+self::IMAGE_FILE_SIZE_LEN+self::IMAGE_NONCE_LEN) { |
|
277 | 277 | throw new BadMessageException(); |
278 | 278 | } |
279 | 279 | |
@@ -284,12 +284,12 @@ discard block |
||
284 | 284 | case FileMessage::TYPE_CODE: |
285 | 285 | /* Image Message */ |
286 | 286 | $decodeResult = json_decode(substr($data, 1), true); |
287 | - if(null === $decodeResult || false === $decodeResult) { |
|
287 | + if (null === $decodeResult || false === $decodeResult) { |
|
288 | 288 | throw new BadMessageException(); |
289 | 289 | } |
290 | 290 | |
291 | 291 | $values = AssocArray::byJsonString(substr($data, 1), array('b', 't', 'k', 'm', 'n', 's')); |
292 | - if(null === $values) { |
|
292 | + if (null === $values) { |
|
293 | 293 | throw new BadMessageException(); |
294 | 294 | } |
295 | 295 | |
@@ -391,7 +391,7 @@ discard block |
||
391 | 391 | * @return null|string |
392 | 392 | */ |
393 | 393 | public final function decryptFile($data, $key) { |
394 | - $result = $this->openSecretBox($data, self::FILE_NONCE, $key); |
|
394 | + $result = $this->openSecretBox($data, self::FILE_NONCE, $key); |
|
395 | 395 | return false === $result ? null : $result; |
396 | 396 | } |
397 | 397 | |
@@ -402,7 +402,7 @@ discard block |
||
402 | 402 | */ |
403 | 403 | public final function encryptFileThumbnail($data, $key) { |
404 | 404 | $box = $this->makeSecretBox($data, self::FILE_THUMBNAIL_NONCE, $key); |
405 | - return new EncryptResult($box, $key, self::FILE_THUMBNAIL_NONCE, strlen($box)); |
|
405 | + return new EncryptResult($box, $key, self::FILE_THUMBNAIL_NONCE, strlen($box)); |
|
406 | 406 | } |
407 | 407 | |
408 | 408 | public final function decryptFileThumbnail($data, $key) { |