@@ -22,7 +22,7 @@ discard block |
||
| 22 | 22 | * be updated to contain parameters specific to the encryption |
| 23 | 23 | * @return string Ciphertext |
| 24 | 24 | */ |
| 25 | - abstract protected function _encryptKey($key, Header &$header); |
|
| 25 | + abstract protected function _encryptKey($key, Header&$header); |
|
| 26 | 26 | |
| 27 | 27 | /** |
| 28 | 28 | * Decrypt a key. |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | * @throws \RuntimeException For generic errors |
| 46 | 46 | * @return string Encrypted key |
| 47 | 47 | */ |
| 48 | - final public function encrypt($cek, Header &$header = null) { |
|
| 48 | + final public function encrypt($cek, Header&$header = null) { |
|
| 49 | 49 | if (!isset($header)) { |
| 50 | 50 | $header = new Header(); |
| 51 | 51 | } |
@@ -121,7 +121,7 @@ |
||
| 121 | 121 | return new $cls($jwk->key(), $iv); |
| 122 | 122 | } |
| 123 | 123 | |
| 124 | - protected function _encryptKey($key, Header &$header) { |
|
| 124 | + protected function _encryptKey($key, Header&$header) { |
|
| 125 | 125 | list($ciphertext, $auth_tag) = $this->_getGCM()->encrypt($key, "", |
| 126 | 126 | $this->_kek, $this->_iv); |
| 127 | 127 | // insert authentication tag to the header |
@@ -106,7 +106,7 @@ |
||
| 106 | 106 | return $this->_kw; |
| 107 | 107 | } |
| 108 | 108 | |
| 109 | - protected function _encryptKey($key, Header &$header) { |
|
| 109 | + protected function _encryptKey($key, Header&$header) { |
|
| 110 | 110 | return $this->_kw()->wrap($key, $this->_kek); |
| 111 | 111 | } |
| 112 | 112 | |
@@ -106,7 +106,7 @@ |
||
| 106 | 106 | return $this->_privateKey; |
| 107 | 107 | } |
| 108 | 108 | |
| 109 | - protected function _encryptKey($key, Header &$header) { |
|
| 109 | + protected function _encryptKey($key, Header&$header) { |
|
| 110 | 110 | $pubkey = openssl_pkey_get_public( |
| 111 | 111 | $this->publicKey() |
| 112 | 112 | ->toPEM() |
@@ -186,7 +186,7 @@ |
||
| 186 | 186 | return $this->_derivedKey; |
| 187 | 187 | } |
| 188 | 188 | |
| 189 | - protected function _encryptKey($key, Header &$header) { |
|
| 189 | + protected function _encryptKey($key, Header&$header) { |
|
| 190 | 190 | return $this->_kwAlgo()->wrap($key, $this->_derivedKey()); |
| 191 | 191 | } |
| 192 | 192 | |
@@ -52,7 +52,7 @@ |
||
| 52 | 52 | return $this->_cek; |
| 53 | 53 | } |
| 54 | 54 | |
| 55 | - protected function _encryptKey($key, Header &$header) { |
|
| 55 | + protected function _encryptKey($key, Header&$header) { |
|
| 56 | 56 | if ($key != $this->_cek) { |
| 57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
| 58 | 58 | } |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | * @return self |
| 46 | 46 | */ |
| 47 | 47 | public static function fromBase256($octets) { |
| 48 | - $num = gmp_import($octets, 1, GMP_MSW_FIRST | GMP_BIG_ENDIAN); |
|
| 48 | + $num = gmp_import($octets, 1, GMP_MSW_FIRST|GMP_BIG_ENDIAN); |
|
| 49 | 49 | return new self($num); |
| 50 | 50 | } |
| 51 | 51 | |
@@ -73,7 +73,7 @@ discard block |
||
| 73 | 73 | * @return string |
| 74 | 74 | */ |
| 75 | 75 | public function base256() { |
| 76 | - return gmp_export($this->_num, 1, GMP_MSW_FIRST | GMP_BIG_ENDIAN); |
|
| 76 | + return gmp_export($this->_num, 1, GMP_MSW_FIRST|GMP_BIG_ENDIAN); |
|
| 77 | 77 | } |
| 78 | 78 | |
| 79 | 79 | public function __toString() { |
@@ -69,9 +69,9 @@ |
||
| 69 | 69 | // time_mid |
| 70 | 70 | mt_rand(0, 0xffff), |
| 71 | 71 | // time_hi_and_version |
| 72 | - mt_rand(0, 0x0fff) | 0x4000, |
|
| 72 | + mt_rand(0, 0x0fff)|0x4000, |
|
| 73 | 73 | // clk_seq_hi_res |
| 74 | - mt_rand(0, 0x3f) | 0x80, |
|
| 74 | + mt_rand(0, 0x3f)|0x80, |
|
| 75 | 75 | // clk_seq_low |
| 76 | 76 | mt_rand(0, 0xff), |
| 77 | 77 | // node |
@@ -56,7 +56,7 @@ |
||
| 56 | 56 | "JWK Set must have a 'keys' member."); |
| 57 | 57 | } |
| 58 | 58 | $jwks = array_map( |
| 59 | - function ($jwkdata) { |
|
| 59 | + function($jwkdata) { |
|
| 60 | 60 | return JWK::fromArray($jwkdata); |
| 61 | 61 | }, $members["keys"]); |
| 62 | 62 | unset($members["keys"]); |