GitHub Access Token became invalid

It seems like the GitHub access token used for retrieving details about this repository from GitHub became invalid. This might prevent certain types of inspections from being run (in particular, everything related to pull requests).
Please ask an admin of your repository to re-new the access token on this website.
Completed
Push — master ( 1f9c3d...35fc1b )
by sebastian
03:29
created
src/jwe/impl/JWE.php 2 patches
Unused Use Statements   -1 removed lines patch added patch discarded remove patch
@@ -16,7 +16,6 @@
 block discarded – undo
16 16
 
17 17
 use jwa\cryptographic_algorithms\ContentEncryptionAlgorithms_Registry;
18 18
 use jwa\cryptographic_algorithms\EncryptionAlgorithm;
19
-use jwa\cryptographic_algorithms\exceptions\InvalidAuthenticationTagException;
20 19
 use jwa\cryptographic_algorithms\exceptions\InvalidKeyTypeAlgorithmException;
21 20
 use jwa\cryptographic_algorithms\key_management\modes\DirectEncryption;
22 21
 use jwa\cryptographic_algorithms\key_management\modes\DirectKeyAgreement;
Please login to merge, or discard this patch.
Spacing   +40 added lines, -60 removed lines patch added patch discarded remove patch
@@ -98,7 +98,7 @@  discard block
 block discarded – undo
98 98
     protected function __construct(IJWEJOSEHeader $header, IJWSPayloadSpec $payload = null)
99 99
     {
100 100
         $this->header = $header;
101
-        if(!is_null($payload))
101
+        if (!is_null($payload))
102 102
             $this->setPayload($payload);
103 103
     }
104 104
 
@@ -184,7 +184,7 @@  discard block
 block discarded – undo
184 184
          * the result be the JWE Encrypted Key.
185 185
          */
186 186
          $key_management_mode = $this->getKeyManagementMode($alg);
187
-         switch($key_management_mode){
187
+         switch ($key_management_mode) {
188 188
              case KeyManagementModeValues::KeyEncryption:
189 189
              case KeyManagementModeValues::KeyWrapping:
190 190
              case KeyManagementModeValues::KeyAgreementWithKeyWrapping:
@@ -212,15 +212,15 @@  discard block
 block discarded – undo
212 212
      */
213 213
     private function getKeyManagementMode(EncryptionAlgorithm $alg)
214 214
     {
215
-        if($alg instanceof KeyEncryption)
215
+        if ($alg instanceof KeyEncryption)
216 216
             return KeyManagementModeValues::KeyEncryption;
217
-        if($alg instanceof KeyWrapping)
217
+        if ($alg instanceof KeyWrapping)
218 218
             return KeyManagementModeValues::KeyWrapping;
219
-        if($alg instanceof DirectKeyAgreement)
219
+        if ($alg instanceof DirectKeyAgreement)
220 220
             return KeyManagementModeValues::DirectKeyAgreement;
221
-        if($alg instanceof KeyAgreementWithKeyWrapping)
221
+        if ($alg instanceof KeyAgreementWithKeyWrapping)
222 222
             return KeyManagementModeValues::KeyAgreementWithKeyWrapping;
223
-        if($alg instanceof DirectEncryption)
223
+        if ($alg instanceof DirectEncryption)
224 224
             return KeyManagementModeValues::DirectEncryption;
225 225
     }
226 226
 
@@ -239,11 +239,9 @@  discard block
 block discarded – undo
239 239
         if (is_null($this->jwk))
240 240
             throw new JWEInvalidRecipientKeyException;
241 241
 
242
-        if($this->jwk->getAlgorithm()->getValue()!== $this->header->getAlgorithm()->getString())
243
-            throw new InvalidJWKAlgorithm
244
-            (
245
-                sprintf
246
-                (
242
+        if ($this->jwk->getAlgorithm()->getValue() !== $this->header->getAlgorithm()->getString())
243
+            throw new InvalidJWKAlgorithm(
244
+                sprintf(
247 245
                     'mismatch between algorithm intended for use with the key %s and the cryptographic algorithm used to encrypt or determine the value of the CEK %s',
248 246
                     $this->jwk->getAlgorithm()->getValue(),
249 247
                     $this->header->getAlgorithm()->getString()
@@ -257,27 +255,22 @@  discard block
 block discarded – undo
257 255
         if (is_null($key_management_algorithm))
258 256
             throw new JWEUnsupportedKeyManagementAlgorithmException(sprintf('alg %s', $this->header->getAlgorithm()->getString()));
259 257
 
260
-        if($key_management_algorithm->getKeyType() !== $recipient_public_key->getAlgorithm())
261
-            throw new InvalidKeyTypeAlgorithmException
262
-            (
263
-                sprintf
264
-                (
258
+        if ($key_management_algorithm->getKeyType() !== $recipient_public_key->getAlgorithm())
259
+            throw new InvalidKeyTypeAlgorithmException(
260
+                sprintf(
265 261
                     'key should be for alg %s, %s instead.',
266 262
                     $key_management_algorithm->getKeyType(),
267 263
                     $recipient_public_key->getAlgorithm()
268 264
                 )
269 265
             );
270 266
 
271
-        $content_encryption_algorithm = ContentEncryptionAlgorithms_Registry::getInstance()->get
272
-        (
267
+        $content_encryption_algorithm = ContentEncryptionAlgorithms_Registry::getInstance()->get(
273 268
             $this->header->getEncryptionAlgorithm()->getString()
274 269
         );
275 270
 
276 271
         if (is_null($content_encryption_algorithm))
277
-            throw new JWEUnsupportedContentEncryptionAlgorithmException
278
-            (
279
-                sprintf
280
-                (
272
+            throw new JWEUnsupportedContentEncryptionAlgorithmException(
273
+                sprintf(
281 274
                     'enc %s',
282 275
                     $this->header->getEncryptionAlgorithm()->getString()
283 276
                 )
@@ -285,8 +278,7 @@  discard block
 block discarded – undo
285 278
 
286 279
         $key_management_mode = $this->getKeyManagementMode($key_management_algorithm);
287 280
 
288
-        $this->cek     = ContentEncryptionKeyFactory::build
289
-        (
281
+        $this->cek = ContentEncryptionKeyFactory::build(
290 282
             $recipient_public_key,
291 283
             $key_management_mode,
292 284
             $content_encryption_algorithm
@@ -300,7 +292,7 @@  discard block
 block discarded – undo
300 292
          * algorithm); otherwise, let the JWE Initialization Vector be the
301 293
          * empty octet sequence.
302 294
          */
303
-        $this->iv      = '';
295
+        $this->iv = '';
304 296
 
305 297
         if (!is_null($iv_size = $content_encryption_algorithm->getIVSize()))
306 298
         {
@@ -317,10 +309,10 @@  discard block
 block discarded – undo
317 309
          * sequence representing the compressed plaintext; otherwise, let M
318 310
          * be the octet sequence representing the plaintext.
319 311
          */
320
-        if(!is_null($zip))
312
+        if (!is_null($zip))
321 313
         {
322 314
             $compression__algorithm = CompressionAlgorithms_Registry::getInstance()->get($zip->getValue());
323
-            $payload  = $compression__algorithm->compress($payload);
315
+            $payload = $compression__algorithm->compress($payload);
324 316
         }
325 317
 
326 318
         /**
@@ -330,8 +322,7 @@  discard block
 block discarded – undo
330 322
          * JWE Authentication Tag (which is the Authentication Tag output
331 323
          * from the encryption operation).
332 324
          */
333
-        list($this->cipher_text, $this->tag) = $content_encryption_algorithm->encrypt
334
-        (
325
+        list($this->cipher_text, $this->tag) = $content_encryption_algorithm->encrypt(
335 326
             $payload,
336 327
             $this->cek->getEncoded(),
337 328
             $this->iv,
@@ -349,23 +340,21 @@  discard block
 block discarded – undo
349 340
      * @throws InvalidKeyTypeAlgorithmException
350 341
      * @throws \Exception
351 342
      */
352
-    private function decryptJWEEncryptedKey(EncryptionAlgorithm $alg){
343
+    private function decryptJWEEncryptedKey(EncryptionAlgorithm $alg) {
353 344
 
354 345
         $key_management_mode   = $this->getKeyManagementMode($alg);
355 346
         $recipient_private_key = $this->jwk->getKey(JSONWebKeyKeyOperationsValues::DecryptContentAndValidateDecryption);
356 347
 
357
-        if($alg->getKeyType() !== $recipient_private_key->getAlgorithm())
358
-            throw new InvalidKeyTypeAlgorithmException
359
-            (
360
-                sprintf
361
-                (
348
+        if ($alg->getKeyType() !== $recipient_private_key->getAlgorithm())
349
+            throw new InvalidKeyTypeAlgorithmException(
350
+                sprintf(
362 351
                     'key should be for alg %s, %s instead.',
363 352
                     $alg->getKeyType(),
364 353
                     $recipient_private_key->getAlgorithm()
365 354
                 )
366 355
             );
367 356
 
368
-        switch($key_management_mode){
357
+        switch ($key_management_mode) {
369 358
             /**
370 359
              * When Key Wrapping, Key Encryption, or Key Agreement with Key
371 360
              * Wrapping are employed, decrypt the JWE Encrypted Key to produce
@@ -387,12 +376,12 @@  discard block
 block discarded – undo
387 376
              * symmetric key.
388 377
              */
389 378
             case KeyManagementModeValues::DirectEncryption:
390
-                if(!empty($this->enc_cek))
379
+                if (!empty($this->enc_cek))
391 380
                     throw new JWEInvalidCompactFormatException('JWE Encrypted Key value is not an empty octetsequence.');
392 381
                 return $recipient_private_key;
393 382
             break;
394 383
             case KeyManagementModeValues::DirectKeyAgreement:
395
-                if(!empty($this->enc_cek))
384
+                if (!empty($this->enc_cek))
396 385
                     throw new JWEInvalidCompactFormatException('JWE Encrypted Key value is not an empty octetsequence.');
397 386
                 throw new \Exception('unsupported Key Management Mode!');
398 387
             break;
@@ -417,42 +406,34 @@  discard block
 block discarded – undo
417 406
 
418 407
         if (!$this->should_decrypt) return $this;
419 408
 
420
-        if($this->jwk->getAlgorithm()->getValue()!== $this->header->getAlgorithm()->getString())
421
-            throw new InvalidJWKAlgorithm
422
-            (
423
-                sprintf
424
-                (
409
+        if ($this->jwk->getAlgorithm()->getValue() !== $this->header->getAlgorithm()->getString())
410
+            throw new InvalidJWKAlgorithm(
411
+                sprintf(
425 412
                     'mismatch between algorithm intended for use with the key %s and the cryptographic algorithm used to encrypt or determine the value of the CEK %s',
426 413
                     $this->jwk->getAlgorithm()->getValue(),
427 414
                     $this->header->getAlgorithm()->getString()
428 415
                 )
429 416
             );
430 417
 
431
-        $key_management_algorithm = KeyManagementAlgorithms_Registry::getInstance()->get
432
-        (
418
+        $key_management_algorithm = KeyManagementAlgorithms_Registry::getInstance()->get(
433 419
             $this->header->getAlgorithm()->getString()
434 420
         );
435 421
 
436 422
         if (is_null($key_management_algorithm))
437
-            throw new JWEUnsupportedKeyManagementAlgorithmException
438
-            (
439
-                sprintf
440
-                (
423
+            throw new JWEUnsupportedKeyManagementAlgorithmException(
424
+                sprintf(
441 425
                     'alg %s',
442 426
                     $this->header->getAlgorithm()->getString()
443 427
                 )
444 428
             );
445 429
 
446
-        $content_encryption_algorithm = ContentEncryptionAlgorithms_Registry::getInstance()->get
447
-        (
430
+        $content_encryption_algorithm = ContentEncryptionAlgorithms_Registry::getInstance()->get(
448 431
             $this->header->getEncryptionAlgorithm()->getString()
449 432
         );
450 433
 
451 434
         if (is_null($content_encryption_algorithm))
452
-            throw new JWEUnsupportedContentEncryptionAlgorithmException
453
-            (
454
-                sprintf
455
-                (
435
+            throw new JWEUnsupportedContentEncryptionAlgorithmException(
436
+                sprintf(
456 437
                     'enc %s',
457 438
                     $this->header->getEncryptionAlgorithm()->getString()
458 439
                 )
@@ -473,8 +454,7 @@  discard block
 block discarded – undo
473 454
          * rejecting the input without emitting any decrypted output if the
474 455
          * JWE Authentication Tag is incorrect.
475 456
          */
476
-        $plain_text = $content_encryption_algorithm->decrypt
477
-        (
457
+        $plain_text = $content_encryption_algorithm->decrypt(
478 458
             $this->cipher_text,
479 459
             $this->cek->getEncoded(),
480 460
             $this->iv,
@@ -482,12 +462,12 @@  discard block
 block discarded – undo
482 462
             $this->tag
483 463
         );
484 464
 
485
-        $zip     = $this->header->getCompressionAlgorithm();
465
+        $zip = $this->header->getCompressionAlgorithm();
486 466
         /**
487 467
          * If a "zip" parameter was included, uncompress the decrypted
488 468
          * plaintext using the specified compression algorithm.
489 469
          */
490
-        if(!is_null($zip))
470
+        if (!is_null($zip))
491 471
         {
492 472
             $compression__algorithm = CompressionAlgorithms_Registry::getInstance()->get($zip->getValue());
493 473
             $plain_text = $compression__algorithm->uncompress($plain_text);
Please login to merge, or discard this patch.
src/jws/impl/JWS.php 2 patches
Unused Use Statements   -1 removed lines patch added patch discarded remove patch
@@ -39,7 +39,6 @@
 block discarded – undo
39 39
 use jwt\utils\JOSEHeaderSerializer;
40 40
 use jwt\utils\JWTClaimSetSerializer;
41 41
 use jwt\utils\JWTRawSerializer;
42
-use utils\json_types\JsonArray;
43 42
 use utils\json_types\JsonValue;
44 43
 use utils\json_types\StringOrURI;
45 44
 
Please login to merge, or discard this patch.
Spacing   +38 added lines, -50 removed lines patch added patch discarded remove patch
@@ -72,14 +72,14 @@  discard block
 block discarded – undo
72 72
 
73 73
         $claim_set = null;
74 74
 
75
-        if(!is_null($payload) && $payload->isClaimSet() && $payload instanceof IJWSPayloadClaimSetSpec) {
75
+        if (!is_null($payload) && $payload->isClaimSet() && $payload instanceof IJWSPayloadClaimSetSpec) {
76 76
             $header->addHeader(new JOSEHeaderParam(RegisteredJOSEHeaderNames::Type, new StringOrURI('JWT')));
77 77
             $claim_set = $payload->getClaimSet();
78 78
         }
79 79
 
80 80
         parent::__construct($header, $claim_set);
81 81
 
82
-        if(!is_null($payload))
82
+        if (!is_null($payload))
83 83
             $this->setPayload($payload);
84 84
 
85 85
         $this->signature = $signature;
@@ -100,21 +100,18 @@  discard block
 block discarded – undo
100 100
      */
101 101
     public function toCompactSerialization()
102 102
     {
103
-        if(!is_null($this->jwk->getId()))
103
+        if (!is_null($this->jwk->getId()))
104 104
             $this->header->addHeader(new JOSEHeaderParam(RegisteredJOSEHeaderNames::KeyID, $this->jwk->getId()));
105 105
 
106
-        if($this->jwk instanceof IAsymmetricJWK)
106
+        if ($this->jwk instanceof IAsymmetricJWK)
107 107
         {
108 108
             // we should add the public key on the header
109 109
             $public_key = clone $this->jwk;
110 110
 
111
-            $this->header->addHeader
112
-            (
113
-                new JOSEHeaderParam
114
-                (
111
+            $this->header->addHeader(
112
+                new JOSEHeaderParam(
115 113
                     RegisteredJOSEHeaderNames::JSONWebKey,
116
-                    new JsonValue
117
-                    (
114
+                    new JsonValue(
118 115
                         $public_key->setVisibility(JSONWebKeyVisibility::PublicOnly)
119 116
                     )
120 117
                 )
@@ -134,32 +131,32 @@  discard block
 block discarded – undo
134 131
     public function sign()
135 132
     {
136 133
 
137
-        if(is_null($this->jwk))
134
+        if (is_null($this->jwk))
138 135
             throw new JWSInvalidJWKException;
139 136
 
140
-        if($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
137
+        if ($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
141 138
             throw new JWSInvalidJWKException(sprintf('use %s not supported.', $this->jwk->getKeyUse()->getString()));
142 139
 
143 140
         $alg = DigitalSignatures_MACs_Registry::getInstance()->get($this->header->getAlgorithm()->getString());
144 141
 
145
-        if(is_null($alg))
146
-            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.',$this->header->getAlgorithm()->getString()));
142
+        if (is_null($alg))
143
+            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.', $this->header->getAlgorithm()->getString()));
147 144
 
148
-        $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header) . IBasicJWT::SegmentSeparator .$this->getEncodedPayload();
145
+        $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header).IBasicJWT::SegmentSeparator.$this->getEncodedPayload();
149 146
 
150
-        $key  = $this->jwk->getKey(JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC);
147
+        $key = $this->jwk->getKey(JSONWebKeyKeyOperationsValues::ComputeDigitalSignatureOrMAC);
151 148
 
152
-        if($alg instanceof DigitalSignatureAlgorithm)
149
+        if ($alg instanceof DigitalSignatureAlgorithm)
153 150
         {
154 151
             $this->signature = $alg->sign($key, $secured_input_bytes);
155 152
         }
156
-        else if($alg instanceof MAC_Algorithm )
153
+        else if ($alg instanceof MAC_Algorithm)
157 154
         {
158 155
             $this->signature = $alg->digest($key, $secured_input_bytes);
159 156
         }
160 157
         else
161 158
         {
162
-            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.',$this->header->getAlgorithm()->getString()));
159
+            throw new JWSNotSupportedAlgorithm(sprintf('alg %s.', $this->header->getAlgorithm()->getString()));
163 160
         }
164 161
 
165 162
         return $this;
@@ -171,11 +168,11 @@  discard block
 block discarded – undo
171 168
      */
172 169
     public function getEncodedPayload()
173 170
     {
174
-        if(is_null($this->payload))
171
+        if (is_null($this->payload))
175 172
             throw new JWSInvalidPayloadException('payload is not set!');
176 173
 
177 174
         $enc_payload = '';
178
-        if($this->payload->isClaimSet() && $this->payload instanceof IJWSPayloadClaimSetSpec)
175
+        if ($this->payload->isClaimSet() && $this->payload instanceof IJWSPayloadClaimSetSpec)
179 176
         {
180 177
             $enc_payload = JWTClaimSetSerializer::serialize($this->payload->getClaimSet());
181 178
         }
@@ -233,27 +230,23 @@  discard block
 block discarded – undo
233 230
      */
234 231
     public function verify($original_alg)
235 232
     {
236
-        if(is_null($this->jwk))
233
+        if (is_null($this->jwk))
237 234
             throw new JWSInvalidJWKException;
238 235
 
239
-        if($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
240
-            throw new JWSInvalidJWKException
241
-            (
242
-                sprintf
243
-                (
236
+        if ($this->jwk->getKeyUse()->getString() !== JSONWebKeyPublicKeyUseValues::Signature)
237
+            throw new JWSInvalidJWKException(
238
+                sprintf(
244 239
                     'use %s not supported ',
245 240
                     $this->jwk->getKeyUse()->getString()
246 241
                 )
247 242
             );
248 243
 
249
-        if(is_null($this->jwk->getAlgorithm()))
244
+        if (is_null($this->jwk->getAlgorithm()))
250 245
             throw new InvalidJWKAlgorithm('algorithm intended for use with the key is not set! ');
251 246
 
252
-        if(!is_null($this->jwk->getId()) && !is_null($this->header->getKeyID()) && $this->header->getKeyID()->getValue() != $this->jwk->getId()->getValue())
253
-            throw new JWSInvalidJWKException
254
-            (
255
-                sprintf
256
-                (
247
+        if (!is_null($this->jwk->getId()) && !is_null($this->header->getKeyID()) && $this->header->getKeyID()->getValue() != $this->jwk->getId()->getValue())
248
+            throw new JWSInvalidJWKException(
249
+                sprintf(
257 250
                     'original kid %s - current kid %s',
258 251
                     $this->header->getKeyID()->getValue(),
259 252
                     $this->jwk->getId()->getValue()
@@ -262,34 +255,30 @@  discard block
 block discarded – undo
262 255
 
263 256
         $alg = DigitalSignatures_MACs_Registry::getInstance()->get($original_alg);
264 257
 
265
-        if(is_null($alg))
258
+        if (is_null($alg))
266 259
             throw new JWSNotSupportedAlgorithm(sprintf('algo %s', $original_alg));
267 260
 
268 261
         $former_alg = $this->header->getAlgorithm()->getString();
269 262
 
270
-        if($former_alg != $original_alg)
271
-            throw new JWSNotSupportedAlgorithm
272
-            (
273
-                sprintf
274
-                (
263
+        if ($former_alg != $original_alg)
264
+            throw new JWSNotSupportedAlgorithm(
265
+                sprintf(
275 266
                     'former alg %s - original alg %s',
276 267
                     $former_alg,
277 268
                     $original_alg
278 269
                 )
279 270
             );
280 271
 
281
-        if($this->jwk->getAlgorithm()->getValue() !==  $original_alg)
282
-            throw new InvalidJWKAlgorithm
283
-            (
284
-                sprintf
285
-                (
272
+        if ($this->jwk->getAlgorithm()->getValue() !== $original_alg)
273
+            throw new InvalidJWKAlgorithm(
274
+                sprintf(
286 275
                     'mismatch between algorithm intended for use with the key %s and the cryptographic algorithm used to secure the JWS %s',
287 276
                     $this->jwk->getAlgorithm()->getValue(),
288 277
                     $original_alg
289 278
                 )
290 279
             );
291 280
 
292
-        $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header) . IBasicJWT::SegmentSeparator .$this->getEncodedPayload();
281
+        $secured_input_bytes = JOSEHeaderSerializer::serialize($this->header).IBasicJWT::SegmentSeparator.$this->getEncodedPayload();
293 282
 
294 283
         // use public key / secret
295 284
         $key = $this->jwk->getKey(JSONWebKeyKeyOperationsValues::VerifyDigitalSignatureOrMAC);
@@ -310,9 +299,9 @@  discard block
 block discarded – undo
310 299
      * @param string $signature
311 300
      * @return IJWS
312 301
      */
313
-    static public function fromHeaderClaimsAndSignature(IJOSEHeader $header, IJWSPayloadSpec $payload = null , $signature = '')
302
+    static public function fromHeaderClaimsAndSignature(IJOSEHeader $header, IJWSPayloadSpec $payload = null, $signature = '')
314 303
     {
315
-        return new JWS($header, $payload, $signature );
304
+        return new JWS($header, $payload, $signature);
316 305
     }
317 306
 
318 307
     /**
@@ -320,10 +309,9 @@  discard block
 block discarded – undo
320 309
      */
321 310
     public function take()
322 311
     {
323
-        $payload = $this->payload->isClaimSet() ?  $this->claim_set : $this->payload->getRaw();
312
+        $payload = $this->payload->isClaimSet() ? $this->claim_set : $this->payload->getRaw();
324 313
 
325
-        return array
326
-        (
314
+        return array(
327 315
             $this->header,
328 316
             $payload,
329 317
             $this->signature
Please login to merge, or discard this patch.
src/jwa/cryptographic_algorithms/KeyManagementAlgorithms_Registry.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -43,14 +43,14 @@  discard block
 block discarded – undo
43 43
         $this->algorithms[JSONWebSignatureAndEncryptionAlgorithms::Dir] = new DirAlgorithm;
44 44
     }
45 45
 
46
-    private function __clone(){}
46
+    private function __clone() {}
47 47
 
48 48
     /**
49 49
      * @return KeyManagementAlgorithms_Registry
50 50
      */
51 51
     public static function getInstance()
52 52
     {
53
-        if(!is_object(self::$instance))
53
+        if (!is_object(self::$instance))
54 54
         {
55 55
             self::$instance = new KeyManagementAlgorithms_Registry();
56 56
         }
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
      */
73 73
     public function get($alg)
74 74
     {
75
-        if(!$this->isSupported($alg)) return null;
75
+        if (!$this->isSupported($alg)) return null;
76 76
         return $this->algorithms[$alg];
77 77
     }
78 78
 }
79 79
\ No newline at end of file
Please login to merge, or discard this patch.
src/jwa/cryptographic_algorithms/DigitalSignatures_MACs_Registry.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -40,7 +40,7 @@  discard block
 block discarded – undo
40 40
 
41 41
     private $algorithms = array();
42 42
 
43
-    private function __construct(){
43
+    private function __construct() {
44 44
 
45 45
         $this->algorithms[JSONWebSignatureAndEncryptionAlgorithms::HS256] = new HS256_Algorithm;
46 46
         $this->algorithms[JSONWebSignatureAndEncryptionAlgorithms::HS384] = new HS384_Algorithm;
@@ -56,13 +56,13 @@  discard block
 block discarded – undo
56 56
 
57 57
     }
58 58
 
59
-    private function __clone(){}
59
+    private function __clone() {}
60 60
 
61 61
     /**
62 62
      * @return DigitalSignatures_MACs_Registry
63 63
      */
64
-    public static function getInstance(){
65
-        if(!is_object(self::$instance)){
64
+    public static function getInstance() {
65
+        if (!is_object(self::$instance)) {
66 66
             self::$instance = new DigitalSignatures_MACs_Registry();
67 67
         }
68 68
         return self::$instance;
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
      * @param string $alg
73 73
      * @return bool
74 74
      */
75
-    public function isSupported($alg){
75
+    public function isSupported($alg) {
76 76
         return array_key_exists($alg, $this->algorithms);
77 77
     }
78 78
 
@@ -80,8 +80,8 @@  discard block
 block discarded – undo
80 80
      * @param $alg
81 81
      * @return null|DigitalSignatureAlgorithm|MAC_Algorithm
82 82
      */
83
-    public function get($alg){
84
-        if(!$this->isSupported($alg)) return null;
83
+    public function get($alg) {
84
+        if (!$this->isSupported($alg)) return null;
85 85
         return $this->algorithms[$alg];
86 86
     }
87 87
 }
88 88
\ No newline at end of file
Please login to merge, or discard this patch.
src/jwa/cryptographic_algorithms/macs/HSMAC_Algorithm.php 1 patch
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -35,10 +35,10 @@  discard block
 block discarded – undo
35 35
      * @return string
36 36
      * @throws InvalidKeyLengthAlgorithmException
37 37
      */
38
-    public function digest(SharedKey $key, $message){
38
+    public function digest(SharedKey $key, $message) {
39 39
 
40
-        if($this->getMinKeyLen() > $key->getBitLength())
41
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $key->getBitLength()));
40
+        if ($this->getMinKeyLen() > $key->getBitLength())
41
+            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.', $this->getMinKeyLen(), $key->getBitLength()));
42 42
 
43 43
         return hash_hmac($this->getHashingAlgorithm(), $message, $key->getSecret(), true);
44 44
     }
@@ -51,8 +51,8 @@  discard block
 block discarded – undo
51 51
      * @throws InvalidKeyLengthAlgorithmException
52 52
      * @throws InvalidKeyTypeAlgorithmException
53 53
      */
54
-    public function verify(Key $key, $message, $digest){
55
-        if(!($key instanceof SharedKey)) throw new InvalidKeyTypeAlgorithmException;
54
+    public function verify(Key $key, $message, $digest) {
55
+        if (!($key instanceof SharedKey)) throw new InvalidKeyTypeAlgorithmException;
56 56
 
57 57
         return $digest === $this->digest($key, $message);
58 58
     }
Please login to merge, or discard this patch.
src/jwa/cryptographic_algorithms/digital_signatures/rsa/RSA_Algorithm.php 1 patch
Spacing   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -45,14 +45,14 @@  discard block
 block discarded – undo
45 45
      */
46 46
     public function sign(PrivateKey $private_key, $message)
47 47
     {
48
-        if(!($private_key instanceof RSAPrivateKey)) throw new InvalidKeyTypeAlgorithmException;
48
+        if (!($private_key instanceof RSAPrivateKey)) throw new InvalidKeyTypeAlgorithmException;
49 49
 
50
-        if($this->getMinKeyLen() > $private_key->getBitLength())
51
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $private_key->getBitLength()));
50
+        if ($this->getMinKeyLen() > $private_key->getBitLength())
51
+            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.', $this->getMinKeyLen(), $private_key->getBitLength()));
52 52
 
53 53
         $res = $this->rsa_impl->loadKey($private_key->getEncoded());
54 54
 
55
-        if(!$res) throw new InvalidKeyTypeAlgorithmException;
55
+        if (!$res) throw new InvalidKeyTypeAlgorithmException;
56 56
 
57 57
         $this->rsa_impl->setHash($this->getHashingAlgorithm());
58 58
         $this->rsa_impl->setMGFHash($this->getHashingAlgorithm());
@@ -70,14 +70,14 @@  discard block
 block discarded – undo
70 70
      */
71 71
     public function verify(Key $key, $message, $signature)
72 72
     {
73
-        if(!($key instanceof RSAPublicKey)) throw new InvalidKeyTypeAlgorithmException;
73
+        if (!($key instanceof RSAPublicKey)) throw new InvalidKeyTypeAlgorithmException;
74 74
 
75
-        if($this->getMinKeyLen() > $key->getBitLength())
76
-            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.',$this->getMinKeyLen(), $key->getBitLength()));
75
+        if ($this->getMinKeyLen() > $key->getBitLength())
76
+            throw new InvalidKeyLengthAlgorithmException(sprintf('min len %s - cur len %s.', $this->getMinKeyLen(), $key->getBitLength()));
77 77
 
78 78
         $res = $this->rsa_impl->loadKey($key->getEncoded());
79 79
 
80
-        if(!$res) throw new InvalidKeyTypeAlgorithmException;
80
+        if (!$res) throw new InvalidKeyTypeAlgorithmException;
81 81
 
82 82
         $this->rsa_impl->setHash($this->getHashingAlgorithm());
83 83
         $this->rsa_impl->setMGFHash($this->getHashingAlgorithm());
Please login to merge, or discard this patch.
cryptographic_algorithms/key_management/rsa/RSA_KeyManagementAlgorithm.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -30,7 +30,7 @@  discard block
 block discarded – undo
30 30
     extends Abstract_RSA_Algorithm
31 31
     implements EncryptionAlgorithm, KeyEncryption {
32 32
 
33
-    public function __construct(){
33
+    public function __construct() {
34 34
 
35 35
         parent::__construct();
36 36
         //configuration ...
@@ -47,18 +47,18 @@  discard block
 block discarded – undo
47 47
      */
48 48
     public function encrypt(Key $key, $message)
49 49
     {
50
-        if(!($key instanceof RSAPublicKey))
50
+        if (!($key instanceof RSAPublicKey))
51 51
             throw new InvalidKeyTypeAlgorithmException('key is not public');
52 52
 
53
-        if($key->getFormat() !== 'PKCS8')
53
+        if ($key->getFormat() !== 'PKCS8')
54 54
             throw new InvalidKeyTypeAlgorithmException('keys is not on PKCS1 format');
55 55
 
56 56
         $res = $this->rsa_impl->loadKey($key->getEncoded());
57 57
 
58
-        if(!$res)
58
+        if (!$res)
59 59
             throw new InvalidKeyTypeAlgorithmException('could not parse the key');
60 60
 
61
-        if($this->rsa_impl->getSize() < $this->getMinKeyLen())
61
+        if ($this->rsa_impl->getSize() < $this->getMinKeyLen())
62 62
             throw new InvalidKeyTypeAlgorithmException('len is invalid');
63 63
 
64 64
         return $this->rsa_impl->encrypt($message);
@@ -70,21 +70,21 @@  discard block
 block discarded – undo
70 70
      * @return string
71 71
      * @throws InvalidKeyTypeAlgorithmException
72 72
      */
73
-    public function decrypt(Key $key, $enc_message){
73
+    public function decrypt(Key $key, $enc_message) {
74 74
 
75
-        if(!($key instanceof RSAPrivateKey))
75
+        if (!($key instanceof RSAPrivateKey))
76 76
             throw new InvalidKeyTypeAlgorithmException('key is not private');
77 77
 
78 78
 
79
-        if($key->getFormat() !== 'PKCS1')
79
+        if ($key->getFormat() !== 'PKCS1')
80 80
             throw new InvalidKeyTypeAlgorithmException('keys is not on PKCS1 format');
81 81
 
82 82
         $res = $this->rsa_impl->loadKey($key->getEncoded());
83 83
 
84
-        if(!$res)
84
+        if (!$res)
85 85
             throw new InvalidKeyTypeAlgorithmException('could not parse the key');
86 86
 
87
-        if($this->rsa_impl->getSize() < $this->getMinKeyLen())
87
+        if ($this->rsa_impl->getSize() < $this->getMinKeyLen())
88 88
             throw new InvalidKeyTypeAlgorithmException('len is invalid');
89 89
 
90 90
         return $this->rsa_impl->decrypt($enc_message);
Please login to merge, or discard this patch.
content_encryption/AES_CBC_HS/AES_CBC_HMAC_SHA2_Algorithm.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -60,7 +60,7 @@  discard block
 block discarded – undo
60 60
     {
61 61
         $key_len = strlen($key);
62 62
 
63
-        if($this->getMinKeyLen() > ByteUtil::bitLength($key_len))
63
+        if ($this->getMinKeyLen() > ByteUtil::bitLength($key_len))
64 64
             throw new InvalidKeyLengthAlgorithmException;
65 65
 
66 66
         $enc_key_len = $key_len / 2;
@@ -133,7 +133,7 @@  discard block
 block discarded – undo
133 133
      */
134 134
     public function decrypt($cypher_text, $key, $iv, $aad, $tag)
135 135
     {
136
-        if(!$this->checkAuthenticationTag($cypher_text, $key, $iv, $aad, $tag))
136
+        if (!$this->checkAuthenticationTag($cypher_text, $key, $iv, $aad, $tag))
137 137
             throw new InvalidAuthenticationTagException;
138 138
 
139 139
         $enc_key_len = strlen($key) / 2;
Please login to merge, or discard this patch.
src/jwa/JSONWebSignatureAndEncryptionAlgorithms.php 1 patch
Spacing   +13 added lines, -15 removed lines patch added patch discarded remove patch
@@ -129,7 +129,7 @@  discard block
 block discarded – undo
129 129
     /**
130 130
      *  AES Key Wrap using 256-bit key
131 131
      */
132
-    const A256KW= 'A256KW';
132
+    const A256KW = 'A256KW';
133 133
 
134 134
     /**
135 135
      *   Direct use of a shared symmetric key
@@ -216,43 +216,41 @@  discard block
 block discarded – undo
216 216
      */
217 217
     const A256GCM = 'A256GCM';
218 218
 
219
-    public static $header_location_alg = array
220
-    (
219
+    public static $header_location_alg = array(
221 220
         self::HS256,
222 221
         self::HS384,
223 222
         self::HS512,
224 223
         self::RS256,
225 224
         self::RS384,
226 225
         self::RS512,
227
-        self::ES256 ,
226
+        self::ES256,
228 227
         self::ES384,
229
-        self::ES512 ,
228
+        self::ES512,
230 229
         self::PS256,
231
-        self::PS384 ,
230
+        self::PS384,
232 231
         self::PS512,
233 232
         self::None,
234 233
         self::RSA1_5,
235
-        self::RSA_OAEP ,
234
+        self::RSA_OAEP,
236 235
         self::RSA_OAEP_256,
237
-        self::A128KW ,
236
+        self::A128KW,
238 237
         self::A192KW,
239 238
         self::A192KW,
240 239
         self::A256KW,
241 240
         self::Dir,
242 241
         self::ECDH_ES,
243
-        self::ECDH_ES_A128KW ,
242
+        self::ECDH_ES_A128KW,
244 243
         self::ECDH_ES_A192KW,
245
-        self::ECDH_ES_A256KW ,
246
-        self::A128GCMKW ,
244
+        self::ECDH_ES_A256KW,
245
+        self::A128GCMKW,
247 246
         self::A192GCMKW,
248
-        self::A256GCMKW ,
249
-        self::PBES2_HS256_A128KW ,
247
+        self::A256GCMKW,
248
+        self::PBES2_HS256_A128KW,
250 249
         self::PBES2_HS384_A192KW,
251 250
         self::PBES2_HS512_A256KW,
252 251
     );
253 252
 
254
-    public static $header_location_enc = array
255
-    (
253
+    public static $header_location_enc = array(
256 254
         self::A128CBC_HS256,
257 255
         self::A192CBC_HS384,
258 256
         self::A256CBC_HS512,
Please login to merge, or discard this patch.