1436 lines
		
	
	
		
			42 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			1436 lines
		
	
	
		
			42 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
| <?php
 | |
| 
 | |
| require_once dirname(dirname(__FILE__)) . '/autoload.php';
 | |
| 
 | |
| /**
 | |
|  * This file will monkey patch the pure-PHP implementation in place of the
 | |
|  * PECL functions and constants, but only if they do not already exist.
 | |
|  *
 | |
|  * Thus, the functions or constants just proxy to the appropriate
 | |
|  * ParagonIE_Sodium_Compat method or class constant, respectively.
 | |
|  */
 | |
| foreach (array(
 | |
|     'BASE64_VARIANT_ORIGINAL',
 | |
|     'BASE64_VARIANT_ORIGINAL_NO_PADDING',
 | |
|     'BASE64_VARIANT_URLSAFE',
 | |
|     'BASE64_VARIANT_URLSAFE_NO_PADDING',
 | |
|     'CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES',
 | |
|     'CRYPTO_AEAD_CHACHA20POLY1305_NSECBYTES',
 | |
|     'CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES',
 | |
|     'CRYPTO_AEAD_CHACHA20POLY1305_ABYTES',
 | |
|     'CRYPTO_AEAD_AES256GCM_KEYBYTES',
 | |
|     'CRYPTO_AEAD_AES256GCM_NSECBYTES',
 | |
|     'CRYPTO_AEAD_AES256GCM_NPUBBYTES',
 | |
|     'CRYPTO_AEAD_AES256GCM_ABYTES',
 | |
|     'CRYPTO_AEAD_CHACHA20POLY1305_IETF_KEYBYTES',
 | |
|     'CRYPTO_AEAD_CHACHA20POLY1305_IETF_NSECBYTES',
 | |
|     'CRYPTO_AEAD_CHACHA20POLY1305_IETF_NPUBBYTES',
 | |
|     'CRYPTO_AEAD_CHACHA20POLY1305_IETF_ABYTES',
 | |
|     'CRYPTO_AEAD_XCHACHA20POLY1305_IETF_KEYBYTES',
 | |
|     'CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NSECBYTES',
 | |
|     'CRYPTO_AEAD_XCHACHA20POLY1305_IETF_NPUBBYTES',
 | |
|     'CRYPTO_AEAD_XCHACHA20POLY1305_IETF_ABYTES',
 | |
|     'CRYPTO_AUTH_BYTES',
 | |
|     'CRYPTO_AUTH_KEYBYTES',
 | |
|     'CRYPTO_BOX_SEALBYTES',
 | |
|     'CRYPTO_BOX_SECRETKEYBYTES',
 | |
|     'CRYPTO_BOX_PUBLICKEYBYTES',
 | |
|     'CRYPTO_BOX_KEYPAIRBYTES',
 | |
|     'CRYPTO_BOX_MACBYTES',
 | |
|     'CRYPTO_BOX_NONCEBYTES',
 | |
|     'CRYPTO_BOX_SEEDBYTES',
 | |
|     'CRYPTO_KDF_BYTES_MIN',
 | |
|     'CRYPTO_KDF_BYTES_MAX',
 | |
|     'CRYPTO_KDF_CONTEXTBYTES',
 | |
|     'CRYPTO_KDF_KEYBYTES',
 | |
|     'CRYPTO_KX_BYTES',
 | |
|     'CRYPTO_KX_KEYPAIRBYTES',
 | |
|     'CRYPTO_KX_PRIMITIVE',
 | |
|     'CRYPTO_KX_SEEDBYTES',
 | |
|     'CRYPTO_KX_PUBLICKEYBYTES',
 | |
|     'CRYPTO_KX_SECRETKEYBYTES',
 | |
|     'CRYPTO_KX_SESSIONKEYBYTES',
 | |
|     'CRYPTO_GENERICHASH_BYTES',
 | |
|     'CRYPTO_GENERICHASH_BYTES_MIN',
 | |
|     'CRYPTO_GENERICHASH_BYTES_MAX',
 | |
|     'CRYPTO_GENERICHASH_KEYBYTES',
 | |
|     'CRYPTO_GENERICHASH_KEYBYTES_MIN',
 | |
|     'CRYPTO_GENERICHASH_KEYBYTES_MAX',
 | |
|     'CRYPTO_PWHASH_SALTBYTES',
 | |
|     'CRYPTO_PWHASH_STRPREFIX',
 | |
|     'CRYPTO_PWHASH_ALG_ARGON2I13',
 | |
|     'CRYPTO_PWHASH_ALG_ARGON2ID13',
 | |
|     'CRYPTO_PWHASH_MEMLIMIT_INTERACTIVE',
 | |
|     'CRYPTO_PWHASH_OPSLIMIT_INTERACTIVE',
 | |
|     'CRYPTO_PWHASH_MEMLIMIT_MODERATE',
 | |
|     'CRYPTO_PWHASH_OPSLIMIT_MODERATE',
 | |
|     'CRYPTO_PWHASH_MEMLIMIT_SENSITIVE',
 | |
|     'CRYPTO_PWHASH_OPSLIMIT_SENSITIVE',
 | |
|     'CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES',
 | |
|     'CRYPTO_PWHASH_SCRYPTSALSA208SHA256_STRPREFIX',
 | |
|     'CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_INTERACTIVE',
 | |
|     'CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_INTERACTIVE',
 | |
|     'CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_SENSITIVE',
 | |
|     'CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_SENSITIVE',
 | |
|     'CRYPTO_SCALARMULT_BYTES',
 | |
|     'CRYPTO_SCALARMULT_SCALARBYTES',
 | |
|     'CRYPTO_SHORTHASH_BYTES',
 | |
|     'CRYPTO_SHORTHASH_KEYBYTES',
 | |
|     'CRYPTO_SECRETBOX_KEYBYTES',
 | |
|     'CRYPTO_SECRETBOX_MACBYTES',
 | |
|     'CRYPTO_SECRETBOX_NONCEBYTES',
 | |
|     'CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_ABYTES',
 | |
|     'CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_HEADERBYTES',
 | |
|     'CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_KEYBYTES',
 | |
|     'CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_PUSH',
 | |
|     'CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_PULL',
 | |
|     'CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_REKEY',
 | |
|     'CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_TAG_FINAL',
 | |
|     'CRYPTO_SECRETSTREAM_XCHACHA20POLY1305_MESSAGEBYTES_MAX',
 | |
|     'CRYPTO_SIGN_BYTES',
 | |
|     'CRYPTO_SIGN_SEEDBYTES',
 | |
|     'CRYPTO_SIGN_PUBLICKEYBYTES',
 | |
|     'CRYPTO_SIGN_SECRETKEYBYTES',
 | |
|     'CRYPTO_SIGN_KEYPAIRBYTES',
 | |
|     'CRYPTO_STREAM_KEYBYTES',
 | |
|     'CRYPTO_STREAM_NONCEBYTES',
 | |
|     'CRYPTO_STREAM_XCHACHA20_KEYBYTES',
 | |
|     'CRYPTO_STREAM_XCHACHA20_NONCEBYTES',
 | |
|     'LIBRARY_MAJOR_VERSION',
 | |
|     'LIBRARY_MINOR_VERSION',
 | |
|     'LIBRARY_VERSION_MAJOR',
 | |
|     'LIBRARY_VERSION_MINOR',
 | |
|     'VERSION_STRING'
 | |
|     ) as $constant
 | |
| ) {
 | |
|     if (!defined("SODIUM_$constant") && defined("ParagonIE_Sodium_Compat::$constant")) {
 | |
|         define("SODIUM_$constant", constant("ParagonIE_Sodium_Compat::$constant"));
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_add')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::add()
 | |
|      * @param string $string1
 | |
|      * @param string $string2
 | |
|      * @return void
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_add(&$string1, $string2)
 | |
|     {
 | |
|         ParagonIE_Sodium_Compat::add($string1, $string2);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_base642bin')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::bin2base64()
 | |
|      * @param string $string
 | |
|      * @param int $variant
 | |
|      * @param string $ignore
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_base642bin($string, $variant, $ignore ='')
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::base642bin($string, $variant, $ignore);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_bin2base64')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::bin2base64()
 | |
|      * @param string $string
 | |
|      * @param int $variant
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_bin2base64($string, $variant)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::bin2base64($string, $variant);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_bin2hex')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::hex2bin()
 | |
|      * @param string $string
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_bin2hex($string)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::bin2hex($string);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_compare')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::compare()
 | |
|      * @param string $string1
 | |
|      * @param string $string2
 | |
|      * @return int
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_compare($string1, $string2)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::compare($string1, $string2);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_aes256gcm_decrypt')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_decrypt()
 | |
|      * @param string $ciphertext
 | |
|      * @param string $additional_data
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string|bool
 | |
|      */
 | |
|     function sodium_crypto_aead_aes256gcm_decrypt($ciphertext, $additional_data, $nonce, $key)
 | |
|     {
 | |
|         try {
 | |
|             return ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_decrypt(
 | |
|                 $ciphertext,
 | |
|                 $additional_data,
 | |
|                 $nonce,
 | |
|                 $key
 | |
|             );
 | |
|         } catch (Error $ex) {
 | |
|             return false;
 | |
|         } catch (Exception $ex) {
 | |
|             if (($ex instanceof SodiumException) && ($ex->getMessage() === 'AES-256-GCM is not available')) {
 | |
|                 throw $ex;
 | |
|             }
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_aes256gcm_encrypt')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_encrypt()
 | |
|      * @param string $message
 | |
|      * @param string $additional_data
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_aead_aes256gcm_encrypt($message, $additional_data, $nonce, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_encrypt($message, $additional_data, $nonce, $key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_aes256gcm_is_available')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_is_available()
 | |
|      * @return bool
 | |
|      */
 | |
|     function sodium_crypto_aead_aes256gcm_is_available()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_is_available();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_chacha20poly1305_decrypt')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_decrypt()
 | |
|      * @param string $ciphertext
 | |
|      * @param string $additional_data
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string|bool
 | |
|      */
 | |
|     function sodium_crypto_aead_chacha20poly1305_decrypt($ciphertext, $additional_data, $nonce, $key)
 | |
|     {
 | |
|         try {
 | |
|             return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_decrypt(
 | |
|                 $ciphertext,
 | |
|                 $additional_data,
 | |
|                 $nonce,
 | |
|                 $key
 | |
|             );
 | |
|         } catch (Error $ex) {
 | |
|             return false;
 | |
|         } catch (Exception $ex) {
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_chacha20poly1305_encrypt')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_encrypt()
 | |
|      * @param string $message
 | |
|      * @param string $additional_data
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_aead_chacha20poly1305_encrypt($message, $additional_data, $nonce, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_encrypt(
 | |
|             $message,
 | |
|             $additional_data,
 | |
|             $nonce,
 | |
|             $key
 | |
|         );
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_chacha20poly1305_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_aead_chacha20poly1305_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_chacha20poly1305_ietf_decrypt')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_decrypt()
 | |
|      * @param string $message
 | |
|      * @param string $additional_data
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string|bool
 | |
|      */
 | |
|     function sodium_crypto_aead_chacha20poly1305_ietf_decrypt($message, $additional_data, $nonce, $key)
 | |
|     {
 | |
|         try {
 | |
|             return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_decrypt(
 | |
|                 $message,
 | |
|                 $additional_data,
 | |
|                 $nonce,
 | |
|                 $key
 | |
|             );
 | |
|         } catch (Error $ex) {
 | |
|             return false;
 | |
|         } catch (Exception $ex) {
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_chacha20poly1305_ietf_encrypt')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_encrypt()
 | |
|      * @param string $message
 | |
|      * @param string $additional_data
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_aead_chacha20poly1305_ietf_encrypt($message, $additional_data, $nonce, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_encrypt(
 | |
|             $message,
 | |
|             $additional_data,
 | |
|             $nonce,
 | |
|             $key
 | |
|         );
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_chacha20poly1305_ietf_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_aead_chacha20poly1305_ietf_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_xchacha20poly1305_ietf_decrypt')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_decrypt()
 | |
|      * @param string $ciphertext
 | |
|      * @param string $additional_data
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string|bool
 | |
|      */
 | |
|     function sodium_crypto_aead_xchacha20poly1305_ietf_decrypt($ciphertext, $additional_data, $nonce, $key)
 | |
|     {
 | |
|         try {
 | |
|             return ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_decrypt(
 | |
|                 $ciphertext,
 | |
|                 $additional_data,
 | |
|                 $nonce,
 | |
|                 $key,
 | |
|                 true
 | |
|             );
 | |
|         } catch (Error $ex) {
 | |
|             return false;
 | |
|         } catch (Exception $ex) {
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_xchacha20poly1305_ietf_encrypt')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_encrypt()
 | |
|      * @param string $message
 | |
|      * @param string $additional_data
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_aead_xchacha20poly1305_ietf_encrypt(
 | |
|         $message,
 | |
|         $additional_data,
 | |
|         $nonce,
 | |
|         $key
 | |
|     ) {
 | |
|         return ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_encrypt(
 | |
|             $message,
 | |
|             $additional_data,
 | |
|             $nonce,
 | |
|             $key,
 | |
|             true
 | |
|         );
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_aead_xchacha20poly1305_ietf_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_aead_xchacha20poly1305_ietf_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_auth')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_auth()
 | |
|      * @param string $message
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_auth($message, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_auth($message, $key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_auth_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_auth_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_auth_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_auth_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_auth_verify')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_auth_verify()
 | |
|      * @param string $mac
 | |
|      * @param string $message
 | |
|      * @param string $key
 | |
|      * @return bool
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_auth_verify($mac, $message, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_auth_verify($mac, $message, $key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box()
 | |
|      * @param string $message
 | |
|      * @param string $nonce
 | |
|      * @param string $key_pair
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_box($message, $nonce, $key_pair)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_box($message, $nonce, $key_pair);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_keypair')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_keypair()
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_box_keypair()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_box_keypair();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_keypair_from_secretkey_and_publickey')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_keypair_from_secretkey_and_publickey()
 | |
|      * @param string $secret_key
 | |
|      * @param string $public_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_box_keypair_from_secretkey_and_publickey($secret_key, $public_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_box_keypair_from_secretkey_and_publickey($secret_key, $public_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_open')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_open()
 | |
|      * @param string $ciphertext
 | |
|      * @param string $nonce
 | |
|      * @param string $key_pair
 | |
|      * @return string|bool
 | |
|      */
 | |
|     function sodium_crypto_box_open($ciphertext, $nonce, $key_pair)
 | |
|     {
 | |
|         try {
 | |
|             return ParagonIE_Sodium_Compat::crypto_box_open($ciphertext, $nonce, $key_pair);
 | |
|         } catch (Error $ex) {
 | |
|             return false;
 | |
|         } catch (Exception $ex) {
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_publickey')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_publickey()
 | |
|      * @param string $key_pair
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_box_publickey($key_pair)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_box_publickey($key_pair);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_publickey_from_secretkey')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_publickey_from_secretkey()
 | |
|      * @param string $secret_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_box_publickey_from_secretkey($secret_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_box_publickey_from_secretkey($secret_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_seal')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_seal()
 | |
|      * @param string $message
 | |
|      * @param string $public_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_box_seal($message, $public_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_box_seal($message, $public_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_seal_open')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_seal_open()
 | |
|      * @param string $message
 | |
|      * @param string $key_pair
 | |
|      * @return string|bool
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_crypto_box_seal_open($message, $key_pair)
 | |
|     {
 | |
|         try {
 | |
|             return ParagonIE_Sodium_Compat::crypto_box_seal_open($message, $key_pair);
 | |
|         } catch (SodiumException $ex) {
 | |
|             if ($ex->getMessage() === 'Argument 2 must be CRYPTO_BOX_KEYPAIRBYTES long.') {
 | |
|                 throw $ex;
 | |
|             }
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_secretkey')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_secretkey()
 | |
|      * @param string $key_pair
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_box_secretkey($key_pair)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_box_secretkey($key_pair);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_box_seed_keypair')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_box_seed_keypair()
 | |
|      * @param string $seed
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_box_seed_keypair($seed)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_box_seed_keypair($seed);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_generichash')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_generichash()
 | |
|      * @param string $message
 | |
|      * @param string|null $key
 | |
|      * @param int $length
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_generichash($message, $key = null, $length = 32)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_generichash($message, $key, $length);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_generichash_final')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_generichash_final()
 | |
|      * @param string|null $state
 | |
|      * @param int $outputLength
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_generichash_final(&$state, $outputLength = 32)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_generichash_final($state, $outputLength);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_generichash_init')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_generichash_init()
 | |
|      * @param string|null $key
 | |
|      * @param int $length
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_generichash_init($key = null, $length = 32)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_generichash_init($key, $length);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_generichash_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_generichash_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_generichash_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_generichash_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_generichash_update')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_generichash_update()
 | |
|      * @param string|null $state
 | |
|      * @param string $message
 | |
|      * @return void
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_generichash_update(&$state, $message = '')
 | |
|     {
 | |
|         ParagonIE_Sodium_Compat::crypto_generichash_update($state, $message);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kdf_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_kdf_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_kdf_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kdf_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kdf_derive_from_key')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_kdf_derive_from_key()
 | |
|      * @param int $subkey_length
 | |
|      * @param int $subkey_id
 | |
|      * @param string $context
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_kdf_derive_from_key($subkey_length, $subkey_id, $context, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kdf_derive_from_key(
 | |
|             $subkey_length,
 | |
|             $subkey_id,
 | |
|             $context,
 | |
|             $key
 | |
|         );
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kx')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_kx()
 | |
|      * @param string $my_secret
 | |
|      * @param string $their_public
 | |
|      * @param string $client_public
 | |
|      * @param string $server_public
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_kx($my_secret, $their_public, $client_public, $server_public)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kx(
 | |
|             $my_secret,
 | |
|             $their_public,
 | |
|             $client_public,
 | |
|             $server_public
 | |
|         );
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kx_seed_keypair')) {
 | |
|     /**
 | |
|      * @param string $seed
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_kx_seed_keypair($seed)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kx_seed_keypair($seed);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kx_keypair')) {
 | |
|     /**
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_kx_keypair()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kx_keypair();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kx_client_session_keys')) {
 | |
|     /**
 | |
|      * @param string $client_key_pair
 | |
|      * @param string $server_key
 | |
|      * @return array{0: string, 1: string}
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_crypto_kx_client_session_keys($client_key_pair, $server_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kx_client_session_keys($client_key_pair, $server_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kx_server_session_keys')) {
 | |
|     /**
 | |
|      * @param string $server_key_pair
 | |
|      * @param string $client_key
 | |
|      * @return array{0: string, 1: string}
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_crypto_kx_server_session_keys($server_key_pair, $client_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kx_server_session_keys($server_key_pair, $client_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kx_secretkey')) {
 | |
|     /**
 | |
|      * @param string $key_pair
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_kx_secretkey($key_pair)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kx_secretkey($key_pair);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_kx_publickey')) {
 | |
|     /**
 | |
|      * @param string $key_pair
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_kx_publickey($key_pair)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_kx_publickey($key_pair);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_pwhash')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_pwhash()
 | |
|      * @param int $length
 | |
|      * @param string $passwd
 | |
|      * @param string $salt
 | |
|      * @param int $opslimit
 | |
|      * @param int $memlimit
 | |
|      * @param int|null $algo
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_pwhash($length, $passwd, $salt, $opslimit, $memlimit, $algo = null)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_pwhash($length, $passwd, $salt, $opslimit, $memlimit, $algo);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_pwhash_str')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_pwhash_str()
 | |
|      * @param string $passwd
 | |
|      * @param int $opslimit
 | |
|      * @param int $memlimit
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_pwhash_str($passwd, $opslimit, $memlimit)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_pwhash_str($passwd, $opslimit, $memlimit);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_pwhash_str_needs_rehash')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_pwhash_str_needs_rehash()
 | |
|      * @param string $hash
 | |
|      * @param int $opslimit
 | |
|      * @param int $memlimit
 | |
|      * @return bool
 | |
|      *
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_crypto_pwhash_str_needs_rehash($hash, $opslimit, $memlimit)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_pwhash_str_needs_rehash($hash, $opslimit, $memlimit);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_pwhash_str_verify')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_pwhash_str_verify()
 | |
|      * @param string $passwd
 | |
|      * @param string $hash
 | |
|      * @return bool
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_pwhash_str_verify($passwd, $hash)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_pwhash_str_verify($passwd, $hash);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_pwhash_scryptsalsa208sha256')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256()
 | |
|      * @param int $length
 | |
|      * @param string $passwd
 | |
|      * @param string $salt
 | |
|      * @param int $opslimit
 | |
|      * @param int $memlimit
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_pwhash_scryptsalsa208sha256($length, $passwd, $salt, $opslimit, $memlimit)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256(
 | |
|             $length,
 | |
|             $passwd,
 | |
|             $salt,
 | |
|             $opslimit,
 | |
|             $memlimit
 | |
|         );
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_pwhash_scryptsalsa208sha256_str')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str()
 | |
|      * @param string $passwd
 | |
|      * @param int $opslimit
 | |
|      * @param int $memlimit
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_pwhash_scryptsalsa208sha256_str($passwd, $opslimit, $memlimit)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str($passwd, $opslimit, $memlimit);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_pwhash_scryptsalsa208sha256_str_verify')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str_verify()
 | |
|      * @param string $passwd
 | |
|      * @param string $hash
 | |
|      * @return bool
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_pwhash_scryptsalsa208sha256_str_verify($passwd, $hash)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str_verify($passwd, $hash);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_scalarmult')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_scalarmult()
 | |
|      * @param string $n
 | |
|      * @param string $p
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_scalarmult($n, $p)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_scalarmult($n, $p);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_scalarmult_base')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_scalarmult_base()
 | |
|      * @param string $n
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_scalarmult_base($n)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_scalarmult_base($n);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretbox')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_secretbox()
 | |
|      * @param string $message
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_secretbox($message, $nonce, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_secretbox($message, $nonce, $key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretbox_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_secretbox_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_secretbox_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_secretbox_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretbox_open')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_secretbox_open()
 | |
|      * @param string $ciphertext
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string|bool
 | |
|      */
 | |
|     function sodium_crypto_secretbox_open($ciphertext, $nonce, $key)
 | |
|     {
 | |
|         try {
 | |
|             return ParagonIE_Sodium_Compat::crypto_secretbox_open($ciphertext, $nonce, $key);
 | |
|         } catch (Error $ex) {
 | |
|             return false;
 | |
|         } catch (Exception $ex) {
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretstream_xchacha20poly1305_init_push')) {
 | |
|     /**
 | |
|      * @param string $key
 | |
|      * @return array<int, string>
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_crypto_secretstream_xchacha20poly1305_init_push($key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_init_push($key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretstream_xchacha20poly1305_push')) {
 | |
|     /**
 | |
|      * @param string $state
 | |
|      * @param string $message
 | |
|      * @param string $additional_data
 | |
|      * @param int $tag
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_crypto_secretstream_xchacha20poly1305_push(
 | |
|         &$state,
 | |
|         $message,
 | |
|         $additional_data = '',
 | |
|         $tag = 0
 | |
|     ) {
 | |
|         return ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_push(
 | |
|             $state,
 | |
|             $message,
 | |
|             $additional_data,
 | |
|             $tag
 | |
|         );
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretstream_xchacha20poly1305_init_pull')) {
 | |
|     /**
 | |
|      * @param string $header
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_secretstream_xchacha20poly1305_init_pull($header, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_init_pull($header, $key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretstream_xchacha20poly1305_pull')) {
 | |
|     /**
 | |
|      * @param string $state
 | |
|      * @param string $ciphertext
 | |
|      * @param string $additional_data
 | |
|      * @return bool|array{0: string, 1: int}
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_crypto_secretstream_xchacha20poly1305_pull(&$state, $ciphertext, $additional_data = '')
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_pull(
 | |
|             $state,
 | |
|             $ciphertext,
 | |
|             $additional_data
 | |
|         );
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretstream_xchacha20poly1305_rekey')) {
 | |
|     /**
 | |
|      * @param string $state
 | |
|      * @return void
 | |
|      * @throws SodiumException
 | |
|      */
 | |
|     function sodium_crypto_secretstream_xchacha20poly1305_rekey(&$state)
 | |
|     {
 | |
|         ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_rekey($state);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_secretstream_xchacha20poly1305_keygen')) {
 | |
|     /**
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_secretstream_xchacha20poly1305_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_shorthash')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_shorthash()
 | |
|      * @param string $message
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_shorthash($message, $key = '')
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_shorthash($message, $key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_shorthash_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_shorthash_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_shorthash_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_shorthash_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign()
 | |
|      * @param string $message
 | |
|      * @param string $secret_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign($message, $secret_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign($message, $secret_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_detached')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_detached()
 | |
|      * @param string $message
 | |
|      * @param string $secret_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_detached($message, $secret_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_detached($message, $secret_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_keypair_from_secretkey_and_publickey')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_keypair_from_secretkey_and_publickey()
 | |
|      * @param string $secret_key
 | |
|      * @param string $public_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_keypair_from_secretkey_and_publickey($secret_key, $public_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_keypair_from_secretkey_and_publickey($secret_key, $public_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_keypair')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_keypair()
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_keypair()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_keypair();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_open')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_open()
 | |
|      * @param string $signedMessage
 | |
|      * @param string $public_key
 | |
|      * @return string|bool
 | |
|      */
 | |
|     function sodium_crypto_sign_open($signedMessage, $public_key)
 | |
|     {
 | |
|         try {
 | |
|             return ParagonIE_Sodium_Compat::crypto_sign_open($signedMessage, $public_key);
 | |
|         } catch (Error $ex) {
 | |
|             return false;
 | |
|         } catch (Exception $ex) {
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_publickey')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_publickey()
 | |
|      * @param string $key_pair
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_publickey($key_pair)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_publickey($key_pair);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_publickey_from_secretkey')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_publickey_from_secretkey()
 | |
|      * @param string $secret_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_publickey_from_secretkey($secret_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_publickey_from_secretkey($secret_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_secretkey')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_secretkey()
 | |
|      * @param string $key_pair
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_secretkey($key_pair)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_secretkey($key_pair);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_seed_keypair')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_seed_keypair()
 | |
|      * @param string $seed
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_seed_keypair($seed)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_seed_keypair($seed);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_verify_detached')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_verify_detached()
 | |
|      * @param string $signature
 | |
|      * @param string $message
 | |
|      * @param string $public_key
 | |
|      * @return bool
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_verify_detached($signature, $message, $public_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_verify_detached($signature, $message, $public_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_ed25519_pk_to_curve25519')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_ed25519_pk_to_curve25519()
 | |
|      * @param string $public_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_ed25519_pk_to_curve25519($public_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_ed25519_pk_to_curve25519($public_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_sign_ed25519_sk_to_curve25519')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_sign_ed25519_sk_to_curve25519()
 | |
|      * @param string $secret_key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_sign_ed25519_sk_to_curve25519($secret_key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_sign_ed25519_sk_to_curve25519($secret_key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_stream')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_stream()
 | |
|      * @param int $length
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_stream($length, $nonce, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_stream($length, $nonce, $key);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_stream_keygen')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_stream_keygen()
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_crypto_stream_keygen()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_stream_keygen();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_crypto_stream_xor')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::crypto_stream_xor()
 | |
|      * @param string $message
 | |
|      * @param string $nonce
 | |
|      * @param string $key
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_crypto_stream_xor($message, $nonce, $key)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::crypto_stream_xor($message, $nonce, $key);
 | |
|     }
 | |
| }
 | |
| require_once dirname(__FILE__) . '/stream-xchacha20.php';
 | |
| if (!is_callable('sodium_hex2bin')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::hex2bin()
 | |
|      * @param string $string
 | |
|      * @param string $ignore
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_hex2bin($string, $ignore = '')
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::hex2bin($string, $ignore);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_increment')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::increment()
 | |
|      * @param string $string
 | |
|      * @return void
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_increment(&$string)
 | |
|     {
 | |
|         ParagonIE_Sodium_Compat::increment($string);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_library_version_major')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::library_version_major()
 | |
|      * @return int
 | |
|      */
 | |
|     function sodium_library_version_major()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::library_version_major();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_library_version_minor')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::library_version_minor()
 | |
|      * @return int
 | |
|      */
 | |
|     function sodium_library_version_minor()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::library_version_minor();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_version_string')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::version_string()
 | |
|      * @return string
 | |
|      */
 | |
|     function sodium_version_string()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::version_string();
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_memcmp')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::memcmp()
 | |
|      * @param string $string1
 | |
|      * @param string $string2
 | |
|      * @return int
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_memcmp($string1, $string2)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::memcmp($string1, $string2);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_memzero')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::memzero()
 | |
|      * @param string $string
 | |
|      * @return void
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      *
 | |
|      * @psalm-suppress ReferenceConstraintViolation
 | |
|      */
 | |
|     function sodium_memzero(&$string)
 | |
|     {
 | |
|         ParagonIE_Sodium_Compat::memzero($string);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_pad')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::pad()
 | |
|      * @param string $unpadded
 | |
|      * @param int $block_size
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_pad($unpadded, $block_size)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::pad($unpadded, $block_size, true);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_unpad')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::pad()
 | |
|      * @param string $padded
 | |
|      * @param int $block_size
 | |
|      * @return string
 | |
|      * @throws SodiumException
 | |
|      * @throws TypeError
 | |
|      */
 | |
|     function sodium_unpad($padded, $block_size)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::unpad($padded, $block_size, true);
 | |
|     }
 | |
| }
 | |
| if (!is_callable('sodium_randombytes_buf')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::randombytes_buf()
 | |
|      * @param int $amount
 | |
|      * @return string
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_randombytes_buf($amount)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::randombytes_buf($amount);
 | |
|     }
 | |
| }
 | |
| 
 | |
| if (!is_callable('sodium_randombytes_uniform')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::randombytes_uniform()
 | |
|      * @param int $upperLimit
 | |
|      * @return int
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_randombytes_uniform($upperLimit)
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::randombytes_uniform($upperLimit);
 | |
|     }
 | |
| }
 | |
| 
 | |
| if (!is_callable('sodium_randombytes_random16')) {
 | |
|     /**
 | |
|      * @see ParagonIE_Sodium_Compat::randombytes_random16()
 | |
|      * @return int
 | |
|      * @throws Exception
 | |
|      */
 | |
|     function sodium_randombytes_random16()
 | |
|     {
 | |
|         return ParagonIE_Sodium_Compat::randombytes_random16();
 | |
|     }
 | |
| }
 |