1000 lines
27 KiB
PHP
1000 lines
27 KiB
PHP
<?php
|
|
namespace Sodium;
|
|
|
|
require_once dirname(dirname(__FILE__)) . '/autoload.php';
|
|
|
|
use ParagonIE_Sodium_Compat;
|
|
|
|
/**
|
|
* This file will monkey patch the pure-PHP implementation in place of the
|
|
* PECL functions, but only if they do not already exist.
|
|
*
|
|
* Thus, the functions just proxy to the appropriate ParagonIE_Sodium_Compat
|
|
* method.
|
|
*/
|
|
if (!is_callable('\\Sodium\\bin2hex')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::bin2hex()
|
|
* @param string $string
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function bin2hex(
|
|
#[\SensitiveParameter]
|
|
$string
|
|
) {
|
|
return ParagonIE_Sodium_Compat::bin2hex($string);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\compare')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::compare()
|
|
* @param string $a
|
|
* @param string $b
|
|
* @return int
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function compare(
|
|
#[\SensitiveParameter]
|
|
$a,
|
|
#[\SensitiveParameter]
|
|
$b
|
|
) {
|
|
return ParagonIE_Sodium_Compat::compare($a, $b);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_aead_aes256gcm_decrypt')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_decrypt()
|
|
* @param string $message
|
|
* @param string $assocData
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string|bool
|
|
*/
|
|
function crypto_aead_aes256gcm_decrypt(
|
|
$message,
|
|
$assocData,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
try {
|
|
return ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_decrypt($message, $assocData, $nonce, $key);
|
|
} catch (\TypeError $ex) {
|
|
return false;
|
|
} catch (\SodiumException $ex) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_aead_aes256gcm_encrypt')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_encrypt()
|
|
* @param string $message
|
|
* @param string $assocData
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_aead_aes256gcm_encrypt(
|
|
#[\SensitiveParameter]
|
|
$message,
|
|
$assocData,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_encrypt($message, $assocData, $nonce, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_aead_aes256gcm_is_available')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_is_available()
|
|
* @return bool
|
|
*/
|
|
function crypto_aead_aes256gcm_is_available()
|
|
{
|
|
return ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_is_available();
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_aead_chacha20poly1305_decrypt')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_decrypt()
|
|
* @param string $message
|
|
* @param string $assocData
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string|bool
|
|
*/
|
|
function crypto_aead_chacha20poly1305_decrypt(
|
|
$message,
|
|
$assocData,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
try {
|
|
return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_decrypt($message, $assocData, $nonce, $key);
|
|
} catch (\TypeError $ex) {
|
|
return false;
|
|
} catch (\SodiumException $ex) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_aead_chacha20poly1305_encrypt')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_encrypt()
|
|
* @param string $message
|
|
* @param string $assocData
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_aead_chacha20poly1305_encrypt(
|
|
#[\SensitiveParameter]
|
|
$message,
|
|
$assocData,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_encrypt($message, $assocData, $nonce, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_aead_chacha20poly1305_ietf_decrypt')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_decrypt()
|
|
* @param string $message
|
|
* @param string $assocData
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string|bool
|
|
*/
|
|
function crypto_aead_chacha20poly1305_ietf_decrypt(
|
|
$message,
|
|
$assocData,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
try {
|
|
return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_decrypt($message, $assocData, $nonce, $key);
|
|
} catch (\TypeError $ex) {
|
|
return false;
|
|
} catch (\SodiumException $ex) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_aead_chacha20poly1305_ietf_encrypt')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_encrypt()
|
|
* @param string $message
|
|
* @param string $assocData
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_aead_chacha20poly1305_ietf_encrypt(
|
|
#[\SensitiveParameter]
|
|
$message,
|
|
$assocData,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_encrypt($message, $assocData, $nonce, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_auth')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_auth()
|
|
* @param string $message
|
|
* @param string $key
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_auth(
|
|
$message,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_auth($message, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_auth_verify')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_auth_verify()
|
|
* @param string $mac
|
|
* @param string $message
|
|
* @param string $key
|
|
* @return bool
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_auth_verify(
|
|
$mac,
|
|
$message,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_auth_verify($mac, $message, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box()
|
|
* @param string $message
|
|
* @param string $nonce
|
|
* @param string $kp
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_box(
|
|
#[\SensitiveParameter]
|
|
$message,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$kp
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_box($message, $nonce, $kp);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box_keypair')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box_keypair()
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_box_keypair()
|
|
{
|
|
return ParagonIE_Sodium_Compat::crypto_box_keypair();
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box_keypair_from_secretkey_and_publickey')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box_keypair_from_secretkey_and_publickey()
|
|
* @param string $sk
|
|
* @param string $pk
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_box_keypair_from_secretkey_and_publickey(
|
|
#[\SensitiveParameter]
|
|
$sk,
|
|
$pk
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_box_keypair_from_secretkey_and_publickey($sk, $pk);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box_open')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box_open()
|
|
* @param string $message
|
|
* @param string $nonce
|
|
* @param string $kp
|
|
* @return string|bool
|
|
*/
|
|
function crypto_box_open(
|
|
#[\SensitiveParameter]
|
|
$message,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$kp
|
|
) {
|
|
try {
|
|
return ParagonIE_Sodium_Compat::crypto_box_open($message, $nonce, $kp);
|
|
} catch (\TypeError $ex) {
|
|
return false;
|
|
} catch (\SodiumException $ex) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box_publickey')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box_publickey()
|
|
* @param string $keypair
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_box_publickey(
|
|
#[\SensitiveParameter]
|
|
$keypair
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_box_publickey($keypair);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box_publickey_from_secretkey')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box_publickey_from_secretkey()
|
|
* @param string $sk
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_box_publickey_from_secretkey(
|
|
#[\SensitiveParameter]
|
|
$sk
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_box_publickey_from_secretkey($sk);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box_seal')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box_seal_open()
|
|
* @param string $message
|
|
* @param string $publicKey
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_box_seal(
|
|
#[\SensitiveParameter]
|
|
$message,
|
|
$publicKey
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_box_seal($message, $publicKey);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box_seal_open')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box_seal_open()
|
|
* @param string $message
|
|
* @param string $kp
|
|
* @return string|bool
|
|
*/
|
|
function crypto_box_seal_open(
|
|
$message,
|
|
#[\SensitiveParameter]
|
|
$kp
|
|
) {
|
|
try {
|
|
return ParagonIE_Sodium_Compat::crypto_box_seal_open($message, $kp);
|
|
} catch (\TypeError $ex) {
|
|
return false;
|
|
} catch (\SodiumException $ex) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_box_secretkey')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_box_secretkey()
|
|
* @param string $keypair
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_box_secretkey(
|
|
#[\SensitiveParameter]
|
|
$keypair
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_box_secretkey($keypair);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_generichash')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_generichash()
|
|
* @param string $message
|
|
* @param string|null $key
|
|
* @param int $outLen
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_generichash(
|
|
$message,
|
|
#[\SensitiveParameter]
|
|
$key = null,
|
|
$outLen = 32
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_generichash($message, $key, $outLen);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_generichash_final')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_generichash_final()
|
|
* @param string|null $ctx
|
|
* @param int $outputLength
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_generichash_final(
|
|
#[\SensitiveParameter]
|
|
&$ctx,
|
|
$outputLength = 32
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_generichash_final($ctx, $outputLength);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_generichash_init')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_generichash_init()
|
|
* @param string|null $key
|
|
* @param int $outLen
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_generichash_init(
|
|
#[\SensitiveParameter]
|
|
$key = null,
|
|
$outLen = 32
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_generichash_init($key, $outLen);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_generichash_update')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_generichash_update()
|
|
* @param string|null $ctx
|
|
* @param string $message
|
|
* @return void
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_generichash_update(
|
|
#[\SensitiveParameter]
|
|
&$ctx,
|
|
$message = ''
|
|
) {
|
|
ParagonIE_Sodium_Compat::crypto_generichash_update($ctx, $message);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_kx')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_kx()
|
|
* @param string $my_secret
|
|
* @param string $their_public
|
|
* @param string $client_public
|
|
* @param string $server_public
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_kx(
|
|
#[\SensitiveParameter]
|
|
$my_secret,
|
|
$their_public,
|
|
$client_public,
|
|
$server_public
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_kx(
|
|
$my_secret,
|
|
$their_public,
|
|
$client_public,
|
|
$server_public,
|
|
true
|
|
);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_pwhash')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_pwhash()
|
|
* @param int $outlen
|
|
* @param string $passwd
|
|
* @param string $salt
|
|
* @param int $opslimit
|
|
* @param int $memlimit
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_pwhash(
|
|
$outlen,
|
|
#[\SensitiveParameter]
|
|
$passwd,
|
|
$salt,
|
|
$opslimit,
|
|
$memlimit
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_pwhash($outlen, $passwd, $salt, $opslimit, $memlimit);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_pwhash_str')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_pwhash_str()
|
|
* @param string $passwd
|
|
* @param int $opslimit
|
|
* @param int $memlimit
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_pwhash_str(
|
|
#[\SensitiveParameter]
|
|
$passwd,
|
|
$opslimit,
|
|
$memlimit
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_pwhash_str($passwd, $opslimit, $memlimit);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_pwhash_str_verify')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_pwhash_str_verify()
|
|
* @param string $passwd
|
|
* @param string $hash
|
|
* @return bool
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_pwhash_str_verify(
|
|
#[\SensitiveParameter]
|
|
$passwd,
|
|
#[\SensitiveParameter]
|
|
$hash
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_pwhash_str_verify($passwd, $hash);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_pwhash_scryptsalsa208sha256')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256()
|
|
* @param int $outlen
|
|
* @param string $passwd
|
|
* @param string $salt
|
|
* @param int $opslimit
|
|
* @param int $memlimit
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_pwhash_scryptsalsa208sha256(
|
|
$outlen,
|
|
#[\SensitiveParameter]
|
|
$passwd,
|
|
#[\SensitiveParameter]
|
|
$salt,
|
|
$opslimit,
|
|
$memlimit
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256($outlen, $passwd, $salt, $opslimit, $memlimit);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_pwhash_scryptsalsa208sha256_str')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str()
|
|
* @param string $passwd
|
|
* @param int $opslimit
|
|
* @param int $memlimit
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_pwhash_scryptsalsa208sha256_str(
|
|
#[\SensitiveParameter]
|
|
$passwd,
|
|
$opslimit,
|
|
$memlimit
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str($passwd, $opslimit, $memlimit);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_pwhash_scryptsalsa208sha256_str_verify')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str_verify()
|
|
* @param string $passwd
|
|
* @param string $hash
|
|
* @return bool
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_pwhash_scryptsalsa208sha256_str_verify(
|
|
#[\SensitiveParameter]
|
|
$passwd,
|
|
#[\SensitiveParameter]
|
|
$hash
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str_verify($passwd, $hash);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_scalarmult')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_scalarmult()
|
|
* @param string $n
|
|
* @param string $p
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_scalarmult(
|
|
#[\SensitiveParameter]
|
|
$n,
|
|
$p
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_scalarmult($n, $p);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_scalarmult_base')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_scalarmult_base()
|
|
* @param string $n
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_scalarmult_base(
|
|
#[\SensitiveParameter]
|
|
$n
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_scalarmult_base($n);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_secretbox')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_secretbox()
|
|
* @param string $message
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_secretbox(
|
|
#[\SensitiveParameter]
|
|
$message,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_secretbox($message, $nonce, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_secretbox_open')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_secretbox_open()
|
|
* @param string $message
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string|bool
|
|
*/
|
|
function crypto_secretbox_open(
|
|
$message,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
try {
|
|
return ParagonIE_Sodium_Compat::crypto_secretbox_open($message, $nonce, $key);
|
|
} catch (\TypeError $ex) {
|
|
return false;
|
|
} catch (\SodiumException $ex) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_shorthash')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_shorthash()
|
|
* @param string $message
|
|
* @param string $key
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_shorthash(
|
|
$message,
|
|
#[\SensitiveParameter]
|
|
$key = ''
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_shorthash($message, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign()
|
|
* @param string $message
|
|
* @param string $sk
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign(
|
|
$message,
|
|
#[\SensitiveParameter]
|
|
$sk
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_sign($message, $sk);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_detached')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_detached()
|
|
* @param string $message
|
|
* @param string $sk
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_detached(
|
|
$message,
|
|
#[\SensitiveParameter]
|
|
$sk
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_sign_detached($message, $sk);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_keypair')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_keypair()
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_keypair()
|
|
{
|
|
return ParagonIE_Sodium_Compat::crypto_sign_keypair();
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_open')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_open()
|
|
* @param string $signedMessage
|
|
* @param string $pk
|
|
* @return string|bool
|
|
*/
|
|
function crypto_sign_open($signedMessage, $pk)
|
|
{
|
|
try {
|
|
return ParagonIE_Sodium_Compat::crypto_sign_open($signedMessage, $pk);
|
|
} catch (\TypeError $ex) {
|
|
return false;
|
|
} catch (\SodiumException $ex) {
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_publickey')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_publickey()
|
|
* @param string $keypair
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_publickey(
|
|
#[\SensitiveParameter]
|
|
$keypair
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_sign_publickey($keypair);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_publickey_from_secretkey')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_publickey_from_secretkey()
|
|
* @param string $sk
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_publickey_from_secretkey(
|
|
#[\SensitiveParameter]
|
|
$sk
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_sign_publickey_from_secretkey($sk);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_secretkey')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_secretkey()
|
|
* @param string $keypair
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_secretkey(
|
|
#[\SensitiveParameter]
|
|
$keypair
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_sign_secretkey($keypair);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_seed_keypair')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_seed_keypair()
|
|
* @param string $seed
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_seed_keypair(
|
|
#[\SensitiveParameter]
|
|
$seed
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_sign_seed_keypair($seed);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_verify_detached')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_verify_detached()
|
|
* @param string $signature
|
|
* @param string $message
|
|
* @param string $pk
|
|
* @return bool
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_verify_detached($signature, $message, $pk)
|
|
{
|
|
return ParagonIE_Sodium_Compat::crypto_sign_verify_detached($signature, $message, $pk);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_ed25519_pk_to_curve25519')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_ed25519_pk_to_curve25519()
|
|
* @param string $pk
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_ed25519_pk_to_curve25519($pk)
|
|
{
|
|
return ParagonIE_Sodium_Compat::crypto_sign_ed25519_pk_to_curve25519($pk);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_sign_ed25519_sk_to_curve25519')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_sign_ed25519_sk_to_curve25519()
|
|
* @param string $sk
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_sign_ed25519_sk_to_curve25519(
|
|
#[\SensitiveParameter]
|
|
$sk
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_sign_ed25519_sk_to_curve25519($sk);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_stream')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_stream()
|
|
* @param int $len
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_stream(
|
|
$len,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_stream($len, $nonce, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\crypto_stream_xor')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::crypto_stream_xor()
|
|
* @param string $message
|
|
* @param string $nonce
|
|
* @param string $key
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function crypto_stream_xor(
|
|
#[\SensitiveParameter]
|
|
$message,
|
|
$nonce,
|
|
#[\SensitiveParameter]
|
|
$key
|
|
) {
|
|
return ParagonIE_Sodium_Compat::crypto_stream_xor($message, $nonce, $key);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\hex2bin')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::hex2bin()
|
|
* @param string $string
|
|
* @return string
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function hex2bin(
|
|
#[\SensitiveParameter]
|
|
$string
|
|
) {
|
|
return ParagonIE_Sodium_Compat::hex2bin($string);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\memcmp')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::memcmp()
|
|
* @param string $a
|
|
* @param string $b
|
|
* @return int
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*/
|
|
function memcmp(
|
|
#[\SensitiveParameter]
|
|
$a,
|
|
#[\SensitiveParameter]
|
|
$b
|
|
) {
|
|
return ParagonIE_Sodium_Compat::memcmp($a, $b);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\memzero')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::memzero()
|
|
* @param string $str
|
|
* @return void
|
|
* @throws \SodiumException
|
|
* @throws \TypeError
|
|
*
|
|
* @psalm-suppress MissingParamType
|
|
* @psalm-suppress MissingReturnType
|
|
* @psalm-suppress ReferenceConstraintViolation
|
|
*/
|
|
function memzero(
|
|
#[\SensitiveParameter]
|
|
&$str
|
|
) {
|
|
ParagonIE_Sodium_Compat::memzero($str);
|
|
}
|
|
}
|
|
if (!is_callable('\\Sodium\\randombytes_buf')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::randombytes_buf()
|
|
* @param int $amount
|
|
* @return string
|
|
* @throws \TypeError
|
|
*/
|
|
function randombytes_buf($amount)
|
|
{
|
|
return ParagonIE_Sodium_Compat::randombytes_buf($amount);
|
|
}
|
|
}
|
|
|
|
if (!is_callable('\\Sodium\\randombytes_uniform')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::randombytes_uniform()
|
|
* @param int $upperLimit
|
|
* @return int
|
|
* @throws \SodiumException
|
|
* @throws \Error
|
|
*/
|
|
function randombytes_uniform($upperLimit)
|
|
{
|
|
return ParagonIE_Sodium_Compat::randombytes_uniform($upperLimit);
|
|
}
|
|
}
|
|
|
|
if (!is_callable('\\Sodium\\randombytes_random16')) {
|
|
/**
|
|
* @see ParagonIE_Sodium_Compat::randombytes_random16()
|
|
* @return int
|
|
*/
|
|
function randombytes_random16()
|
|
{
|
|
return ParagonIE_Sodium_Compat::randombytes_random16();
|
|
}
|
|
}
|
|
|
|
if (!defined('\\Sodium\\CRYPTO_AUTH_BYTES')) {
|
|
require_once dirname(__FILE__) . '/constants.php';
|
|
}
|