@@ -22,7 +22,7 @@ discard block |
||
22 | 22 | * be updated to contain parameters specific to the encryption |
23 | 23 | * @return string Ciphertext |
24 | 24 | */ |
25 | - abstract protected function _encryptKey($key, Header &$header); |
|
25 | + abstract protected function _encryptKey($key, Header&$header); |
|
26 | 26 | |
27 | 27 | /** |
28 | 28 | * Decrypt a key. |
@@ -45,7 +45,7 @@ discard block |
||
45 | 45 | * @throws \RuntimeException For generic errors |
46 | 46 | * @return string Encrypted key |
47 | 47 | */ |
48 | - final public function encrypt($cek, Header &$header = null) { |
|
48 | + final public function encrypt($cek, Header&$header = null) { |
|
49 | 49 | if (!isset($header)) { |
50 | 50 | $header = new Header(); |
51 | 51 | } |
@@ -52,7 +52,7 @@ |
||
52 | 52 | return $this->_cek; |
53 | 53 | } |
54 | 54 | |
55 | - protected function _encryptKey($key, Header &$header) { |
|
55 | + protected function _encryptKey($key, Header&$header) { |
|
56 | 56 | if ($key != $this->_cek) { |
57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
58 | 58 | } |
@@ -45,7 +45,7 @@ discard block |
||
45 | 45 | * @return self |
46 | 46 | */ |
47 | 47 | public static function fromBase256($octets) { |
48 | - $num = gmp_import($octets, 1, GMP_MSW_FIRST | GMP_BIG_ENDIAN); |
|
48 | + $num = gmp_import($octets, 1, GMP_MSW_FIRST|GMP_BIG_ENDIAN); |
|
49 | 49 | return new self($num); |
50 | 50 | } |
51 | 51 | |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | * @return string |
74 | 74 | */ |
75 | 75 | public function base256() { |
76 | - return gmp_export($this->_num, 1, GMP_MSW_FIRST | GMP_BIG_ENDIAN); |
|
76 | + return gmp_export($this->_num, 1, GMP_MSW_FIRST|GMP_BIG_ENDIAN); |
|
77 | 77 | } |
78 | 78 | |
79 | 79 | public function __toString() { |
@@ -69,9 +69,9 @@ |
||
69 | 69 | // time_mid |
70 | 70 | mt_rand(0, 0xffff), |
71 | 71 | // time_hi_and_version |
72 | - mt_rand(0, 0x0fff) | 0x4000, |
|
72 | + mt_rand(0, 0x0fff)|0x4000, |
|
73 | 73 | // clk_seq_hi_res |
74 | - mt_rand(0, 0x3f) | 0x80, |
|
74 | + mt_rand(0, 0x3f)|0x80, |
|
75 | 75 | // clk_seq_low |
76 | 76 | mt_rand(0, 0xff), |
77 | 77 | // node |
@@ -56,7 +56,7 @@ |
||
56 | 56 | "JWK Set must have a 'keys' member."); |
57 | 57 | } |
58 | 58 | $jwks = array_map( |
59 | - function ($jwkdata) { |
|
59 | + function($jwkdata) { |
|
60 | 60 | return JWK::fromArray($jwkdata); |
61 | 61 | }, $members["keys"]); |
62 | 62 | unset($members["keys"]); |
@@ -52,7 +52,7 @@ |
||
52 | 52 | return $this->_cek; |
53 | 53 | } |
54 | 54 | |
55 | - protected function _encryptKey($key, Header &$header) { |
|
55 | + protected function _encryptKey($key, Header&$header) { |
|
56 | 56 | if ($key != $this->_cek) { |
57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
58 | 58 | } |
@@ -52,7 +52,7 @@ |
||
52 | 52 | return $this->_cek; |
53 | 53 | } |
54 | 54 | |
55 | - protected function _encryptKey($key, Header &$header) { |
|
55 | + protected function _encryptKey($key, Header&$header) { |
|
56 | 56 | if ($key != $this->_cek) { |
57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
58 | 58 | } |
@@ -52,7 +52,7 @@ |
||
52 | 52 | return $this->_cek; |
53 | 53 | } |
54 | 54 | |
55 | - protected function _encryptKey($key, Header &$header) { |
|
55 | + protected function _encryptKey($key, Header&$header) { |
|
56 | 56 | if ($key != $this->_cek) { |
57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
58 | 58 | } |
@@ -52,7 +52,7 @@ |
||
52 | 52 | return $this->_cek; |
53 | 53 | } |
54 | 54 | |
55 | - protected function _encryptKey($key, Header &$header) { |
|
55 | + protected function _encryptKey($key, Header&$header) { |
|
56 | 56 | if ($key != $this->_cek) { |
57 | 57 | throw new \LogicException("Content encryption key doesn't match."); |
58 | 58 | } |