/** * Sets the key-size for encryption/decryption in number of bits * @param mixed $newsize The new key size. The valid integer values are: 128, 192, 256 (default) * $newsize may be NULL or may be omited - in this case * this method is just a getter of the current key size value. * @return integer Returns the old key size value. */ public static function size($newsize = null) { $result = self::$key_size; if (is_null($newsize)) { return $result; } $newsize = (string) $newsize; if ($newsize == '') { return $result; } $valid_integer = ctype_digit($newsize); $newsize = (int) $newsize; if (!$valid_integer || !in_array($newsize, self::$valid_key_sizes)) { trigger_error('GibberishAES: Invalid key size value was to be set. It should be an integer value (number of bits) amongst: ' . implode(', ', self::$valid_key_sizes) . '.', E_USER_WARNING); } else { self::$key_size = $newsize; } return $result; }
/** * Sets the key-size for encryption/decryption in number of bits * @param mixed $newsize The new key size. The valid integer values are: 128, 192, 256 (default) * $newsize may be NULL or may be omited - in this case * this method is just a getter of the current key size value. * @return integer Returns the old key size value. */ public static function size($newsize = null) { $result = self::$key_size; if (is_null($newsize)) { return $result; } $newsize = (string) $newsize; if ($newsize == '') { return $result; } $valid_integer = ctype_digit($newsize); $newsize = (int) $newsize; if (!$valid_integer || !in_array($newsize, self::$valid_key_sizes)) { trigger_error('Invalid key size value was to be set. It should be integer value (number of bits) amongst: 128, 192, 256.', E_WARNING); } self::$key_size = $newsize; return $result; }