@@ -22,7 +22,7 @@ discard block |
||
| 22 | 22 | * be updated to contain parameters specific to the encryption |
| 23 | 23 | * @return string Ciphertext |
| 24 | 24 | */ |
| 25 | - abstract protected function _encryptKey($key, Header &$header); |
|
| 25 | + abstract protected function _encryptKey($key, Header&$header); |
|
| 26 | 26 | |
| 27 | 27 | /** |
| 28 | 28 | * Decrypt a key. |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | * @throws \RuntimeException For generic errors |
| 46 | 46 | * @return string Encrypted key |
| 47 | 47 | */ |
| 48 | - final public function encrypt($cek, Header &$header = null) { |
|
| 48 | + final public function encrypt($cek, Header&$header = null) { |
|
| 49 | 49 | if (!isset($header)) { |
| 50 | 50 | $header = new Header(); |
| 51 | 51 | } |
@@ -52,7 +52,7 @@ |
||
| 52 | 52 | return $this->_cek; |
| 53 | 53 | } |
| 54 | 54 | |
| 55 | - protected function _encryptKey($key, Header &$header) { |
|
| 55 | + protected function _encryptKey($key, Header&$header) { |
|
| 56 | 56 | if ($key != $this->_cek) { |
| 57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
| 58 | 58 | } |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | * @return self |
| 46 | 46 | */ |
| 47 | 47 | public static function fromBase256($octets) { |
| 48 | - $num = gmp_import($octets, 1, GMP_MSW_FIRST | GMP_BIG_ENDIAN); |
|
| 48 | + $num = gmp_import($octets, 1, GMP_MSW_FIRST|GMP_BIG_ENDIAN); |
|
| 49 | 49 | return new self($num); |
| 50 | 50 | } |
| 51 | 51 | |
@@ -73,7 +73,7 @@ discard block |
||
| 73 | 73 | * @return string |
| 74 | 74 | */ |
| 75 | 75 | public function base256() { |
| 76 | - return gmp_export($this->_num, 1, GMP_MSW_FIRST | GMP_BIG_ENDIAN); |
|
| 76 | + return gmp_export($this->_num, 1, GMP_MSW_FIRST|GMP_BIG_ENDIAN); |
|
| 77 | 77 | } |
| 78 | 78 | |
| 79 | 79 | public function __toString() { |
@@ -69,9 +69,9 @@ |
||
| 69 | 69 | // time_mid |
| 70 | 70 | mt_rand(0, 0xffff), |
| 71 | 71 | // time_hi_and_version |
| 72 | - mt_rand(0, 0x0fff) | 0x4000, |
|
| 72 | + mt_rand(0, 0x0fff)|0x4000, |
|
| 73 | 73 | // clk_seq_hi_res |
| 74 | - mt_rand(0, 0x3f) | 0x80, |
|
| 74 | + mt_rand(0, 0x3f)|0x80, |
|
| 75 | 75 | // clk_seq_low |
| 76 | 76 | mt_rand(0, 0xff), |
| 77 | 77 | // node |
@@ -56,7 +56,7 @@ |
||
| 56 | 56 | "JWK Set must have a 'keys' member."); |
| 57 | 57 | } |
| 58 | 58 | $jwks = array_map( |
| 59 | - function ($jwkdata) { |
|
| 59 | + function($jwkdata) { |
|
| 60 | 60 | return JWK::fromArray($jwkdata); |
| 61 | 61 | }, $members["keys"]); |
| 62 | 62 | unset($members["keys"]); |
@@ -52,7 +52,7 @@ |
||
| 52 | 52 | return $this->_cek; |
| 53 | 53 | } |
| 54 | 54 | |
| 55 | - protected function _encryptKey($key, Header &$header) { |
|
| 55 | + protected function _encryptKey($key, Header&$header) { |
|
| 56 | 56 | if ($key != $this->_cek) { |
| 57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
| 58 | 58 | } |
@@ -52,7 +52,7 @@ |
||
| 52 | 52 | return $this->_cek; |
| 53 | 53 | } |
| 54 | 54 | |
| 55 | - protected function _encryptKey($key, Header &$header) { |
|
| 55 | + protected function _encryptKey($key, Header&$header) { |
|
| 56 | 56 | if ($key != $this->_cek) { |
| 57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
| 58 | 58 | } |
@@ -52,7 +52,7 @@ |
||
| 52 | 52 | return $this->_cek; |
| 53 | 53 | } |
| 54 | 54 | |
| 55 | - protected function _encryptKey($key, Header &$header) { |
|
| 55 | + protected function _encryptKey($key, Header&$header) { |
|
| 56 | 56 | if ($key != $this->_cek) { |
| 57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
| 58 | 58 | } |
@@ -52,7 +52,7 @@ |
||
| 52 | 52 | return $this->_cek; |
| 53 | 53 | } |
| 54 | 54 | |
| 55 | - protected function _encryptKey($key, Header &$header) { |
|
| 55 | + protected function _encryptKey($key, Header&$header) { |
|
| 56 | 56 | if ($key != $this->_cek) { |
| 57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
| 58 | 58 | } |