@@ -71,7 +71,9 @@ |
||
| 71 | 71 | |
| 72 | 72 | $res = $this->rsa_imp->loadKey($this->pem_format, RSA::PRIVATE_FORMAT_PKCS1); |
| 73 | 73 | |
| 74 | - if(!$res) throw new RSABadPEMFormat(sprintf('pem %s',$pem_format )); |
|
| 74 | + if(!$res) { |
|
| 75 | + throw new RSABadPEMFormat(sprintf('pem %s',$pem_format )); |
|
| 76 | + } |
|
| 75 | 77 | |
| 76 | 78 | $this->n = $this->rsa_imp->modulus; |
| 77 | 79 | } |
@@ -37,8 +37,9 @@ |
||
| 37 | 37 | |
| 38 | 38 | parent::__construct($pem_format, $password); |
| 39 | 39 | $this->d = $this->rsa_imp->exponent; |
| 40 | - if($this->d->toString() === $this->e->toString()) |
|
| 41 | - throw new RSABadPEMFormat(sprintf('pem %s is a public key!', $pem_format)); |
|
| 40 | + if($this->d->toString() === $this->e->toString()) { |
|
| 41 | + throw new RSABadPEMFormat(sprintf('pem %s is a public key!', $pem_format)); |
|
| 42 | + } |
|
| 42 | 43 | } |
| 43 | 44 | |
| 44 | 45 | /** |