From: Roland Haeder Date: Thu, 30 Mar 2017 18:30:23 +0000 (+0200) Subject: it is ... SPACE TIME! ;-) X-Git-Url: https://git.mxchange.org/?a=commitdiff_plain;h=9c056d0bf0a8102b021d8c96d21e7fe1484d0677;p=friendica.git it is ... SPACE TIME! ;-) Signed-off-by: Roland Haeder --- diff --git a/mod/dfrn_notify.php b/mod/dfrn_notify.php index 84d589a217..ddb6afe4e4 100644 --- a/mod/dfrn_notify.php +++ b/mod/dfrn_notify.php @@ -160,15 +160,15 @@ function dfrn_notify_post(App $a) { if ($dfrn_version >= 2.1) { if ((($importer['duplex']) && strlen($importer['cprvkey'])) || (! strlen($importer['cpubkey']))) { - openssl_private_decrypt($rawkey,$final_key,$importer['cprvkey']); + openssl_private_decrypt($rawkey, $final_key, $importer['cprvkey']); } else { - openssl_public_decrypt($rawkey,$final_key,$importer['cpubkey']); + openssl_public_decrypt($rawkey, $final_key, $importer['cpubkey']); } } else { if ((($importer['duplex']) && strlen($importer['cpubkey'])) || (! strlen($importer['cprvkey']))) { - openssl_public_decrypt($rawkey,$final_key,$importer['cpubkey']); + openssl_public_decrypt($rawkey, $final_key, $importer['cpubkey']); } else { - openssl_private_decrypt($rawkey,$final_key,$importer['cprvkey']); + openssl_private_decrypt($rawkey, $final_key, $importer['cprvkey']); } } @@ -181,11 +181,11 @@ function dfrn_notify_post(App $a) { * we got a key. old code send only the key, without RINO version. * we assume RINO 1 if key and no RINO version */ - $data = aes_decrypt(hex2bin($data),$final_key); + $data = aes_decrypt(hex2bin($data), $final_key); break; case 2: try { - $data = Crypto::decrypt(hex2bin($data),$final_key); + $data = Crypto::decrypt(hex2bin($data), $final_key); } catch (InvalidCiphertext $ex) { // VERY IMPORTANT /* * Either: @@ -195,13 +195,13 @@ function dfrn_notify_post(App $a) { * Assume the worst. */ logger('The ciphertext has been tampered with!'); - xml_status(0,'The ciphertext has been tampered with!'); + xml_status(0, 'The ciphertext has been tampered with!'); } catch (Ex\CryptoTestFailed $ex) { logger('Cannot safely perform dencryption'); - xml_status(0,'CryptoTestFailed'); + xml_status(0, 'CryptoTestFailed'); } catch (Ex\CannotPerformOperation $ex) { logger('Cannot safely perform decryption'); - xml_status(0,'Cannot safely perform decryption'); + xml_status(0, 'Cannot safely perform decryption'); } break; default: