diff options
-rw-r--r-- | REFLECTION | 607 | ||||
-rw-r--r-- | libsodium-php7.patch | 1035 | ||||
-rw-r--r-- | php-pecl-libsodium.spec | 12 |
3 files changed, 310 insertions, 1344 deletions
@@ -1,352 +1,355 @@ -Extension [ <persistent> extension #114 libsodium version 0.1.3 ] { - - - Classes [1] { - Class [ <internal:libsodium> class Sodium ] { - - - Constants [33] { - Constant [ integer CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES ] { 32 } - Constant [ integer CRYPTO_AEAD_CHACHA20POLY1305_NSECBYTES ] { 0 } - Constant [ integer CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES ] { 8 } - Constant [ integer CRYPTO_AEAD_CHACHA20POLY1305_ABYTES ] { 16 } - Constant [ integer CRYPTO_BOX_SECRETKEYBYTES ] { 32 } - Constant [ integer CRYPTO_BOX_PUBLICKEYBYTES ] { 32 } - Constant [ integer CRYPTO_BOX_KEYPAIRBYTES ] { 64 } - Constant [ integer CRYPTO_BOX_NONCEBYTES ] { 24 } - Constant [ integer CRYPTO_GENERICHASH_BYTES ] { 32 } - Constant [ integer CRYPTO_GENERICHASH_BYTES_MIN ] { 16 } - Constant [ integer CRYPTO_GENERICHASH_BYTES_MAX ] { 64 } - Constant [ integer CRYPTO_GENERICHASH_KEYBYTES ] { 32 } - Constant [ integer CRYPTO_GENERICHASH_KEYBYTES_MIN ] { 16 } - Constant [ integer CRYPTO_GENERICHASH_KEYBYTES_MAX ] { 64 } - Constant [ integer CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES ] { 32 } - Constant [ string CRYPTO_PWHASH_SCRYPTSALSA208SHA256_STRPREFIX ] { $7$ } - Constant [ integer CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_INTERACTIVE ] { 524288 } - Constant [ integer CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_INTERACTIVE ] { 16777216 } - Constant [ integer CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_SENSITIVE ] { 33554432 } - Constant [ integer CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_SENSITIVE ] { 1073741824 } - Constant [ integer CRYPTO_SCALARMULT_BYTES ] { 32 } - Constant [ integer CRYPTO_SCALARMULT_SCALARBYTES ] { 32 } - Constant [ integer CRYPTO_SHORTHASH_BYTES ] { 8 } - Constant [ integer CRYPTO_SHORTHASH_KEYBYTES ] { 16 } - Constant [ integer CRYPTO_SECRETBOX_KEYBYTES ] { 32 } - Constant [ integer CRYPTO_SECRETBOX_NONCEBYTES ] { 24 } - Constant [ integer CRYPTO_SIGN_BYTES ] { 64 } - Constant [ integer CRYPTO_SIGN_SEEDBYTES ] { 32 } - Constant [ integer CRYPTO_SIGN_PUBLICKEYBYTES ] { 32 } - Constant [ integer CRYPTO_SIGN_SECRETKEYBYTES ] { 64 } - Constant [ integer CRYPTO_SIGN_KEYPAIRBYTES ] { 96 } - Constant [ integer CRYPTO_STREAM_NONCEBYTES ] { 24 } - Constant [ integer CRYPTO_STREAM_KEYBYTES ] { 32 } - } - - - Static properties [0] { - } - - - Static methods [38] { - Method [ <internal:libsodium> static public method crypto_aead_chacha20poly1305_decrypt ] { - - - Parameters [4] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $ad ] - Parameter #2 [ <required> $nonce ] - Parameter #3 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_aead_chacha20poly1305_encrypt ] { - - - Parameters [4] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $ad ] - Parameter #2 [ <required> $nonce ] - Parameter #3 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_box ] { - - - Parameters [3] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $nonce ] - Parameter #2 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_box_keypair ] { - - - Parameters [0] { - } - } - - Method [ <internal:libsodium> static public method crypto_box_keypair_from_secretkey_and_publickey ] { - - - Parameters [2] { - Parameter #0 [ <required> $secret_key ] - Parameter #1 [ <required> $public_key ] - } - } - - Method [ <internal:libsodium> static public method crypto_box_open ] { - - - Parameters [3] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $nonce ] - Parameter #2 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_box_publickey ] { - - - Parameters [1] { - Parameter #0 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_box_publickey_from_secretkey ] { - - - Parameters [1] { - Parameter #0 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_box_secretkey ] { - - - Parameters [1] { - Parameter #0 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_generichash ] { - - - Parameters [3] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <optional> $key ] - Parameter #2 [ <optional> $length ] - } - } - - Method [ <internal:libsodium> static public method crypto_pwhash_scryptsalsa208sha256 ] { - - - Parameters [5] { - Parameter #0 [ <required> $length ] - Parameter #1 [ <required> $password ] - Parameter #2 [ <required> $salt ] - Parameter #3 [ <required> $opslimit ] - Parameter #4 [ <required> $memlimit ] - } - } - - Method [ <internal:libsodium> static public method crypto_pwhash_scryptsalsa208sha256_str ] { - - - Parameters [3] { - Parameter #0 [ <required> $password ] - Parameter #1 [ <required> $opslimit ] - Parameter #2 [ <required> $memlimit ] - } - } - - Method [ <internal:libsodium> static public method crypto_pwhash_scryptsalsa208sha256_str_verify ] { - - - Parameters [2] { - Parameter #0 [ <required> $hash ] - Parameter #1 [ <required> $password ] - } - } - - Method [ <internal:libsodium> static public method crypto_scalarmult ] { - - - Parameters [2] { - Parameter #0 [ <required> $string_1 ] - Parameter #1 [ <required> $string_2 ] - } - } - - Method [ <internal:libsodium> static public method crypto_secretbox ] { - - - Parameters [3] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $nonce ] - Parameter #2 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_secretbox_open ] { +Extension [ <persistent> extension #114 libsodium version 0.2.0 ] { + + - Constants [36] { + Constant [ integer Sodium\CRYPTO_AEAD_CHACHA20POLY1305_KEYBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_AEAD_CHACHA20POLY1305_NSECBYTES ] { 0 } + Constant [ integer Sodium\CRYPTO_AEAD_CHACHA20POLY1305_NPUBBYTES ] { 8 } + Constant [ integer Sodium\CRYPTO_AEAD_CHACHA20POLY1305_ABYTES ] { 16 } + Constant [ integer Sodium\CRYPTO_BOX_SECRETKEYBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_BOX_PUBLICKEYBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_BOX_KEYPAIRBYTES ] { 64 } + Constant [ integer Sodium\CRYPTO_BOX_NONCEBYTES ] { 24 } + Constant [ integer Sodium\CRYPTO_KX_BYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_KX_PUBLICKEYBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_KX_SECRETKEYBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_GENERICHASH_BYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_GENERICHASH_BYTES_MIN ] { 16 } + Constant [ integer Sodium\CRYPTO_GENERICHASH_BYTES_MAX ] { 64 } + Constant [ integer Sodium\CRYPTO_GENERICHASH_KEYBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_GENERICHASH_KEYBYTES_MIN ] { 16 } + Constant [ integer Sodium\CRYPTO_GENERICHASH_KEYBYTES_MAX ] { 64 } + Constant [ integer Sodium\CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES ] { 32 } + Constant [ string Sodium\CRYPTO_PWHASH_SCRYPTSALSA208SHA256_STRPREFIX ] { $7$ } + Constant [ integer Sodium\CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_INTERACTIVE ] { 524288 } + Constant [ integer Sodium\CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_INTERACTIVE ] { 16777216 } + Constant [ integer Sodium\CRYPTO_PWHASH_SCRYPTSALSA208SHA256_OPSLIMIT_SENSITIVE ] { 33554432 } + Constant [ integer Sodium\CRYPTO_PWHASH_SCRYPTSALSA208SHA256_MEMLIMIT_SENSITIVE ] { 1073741824 } + Constant [ integer Sodium\CRYPTO_SCALARMULT_BYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_SCALARMULT_SCALARBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_SHORTHASH_BYTES ] { 8 } + Constant [ integer Sodium\CRYPTO_SHORTHASH_KEYBYTES ] { 16 } + Constant [ integer Sodium\CRYPTO_SECRETBOX_KEYBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_SECRETBOX_NONCEBYTES ] { 24 } + Constant [ integer Sodium\CRYPTO_SIGN_BYTES ] { 64 } + Constant [ integer Sodium\CRYPTO_SIGN_SEEDBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_SIGN_PUBLICKEYBYTES ] { 32 } + Constant [ integer Sodium\CRYPTO_SIGN_SECRETKEYBYTES ] { 64 } + Constant [ integer Sodium\CRYPTO_SIGN_KEYPAIRBYTES ] { 96 } + Constant [ integer Sodium\CRYPTO_STREAM_NONCEBYTES ] { 24 } + Constant [ integer Sodium\CRYPTO_STREAM_KEYBYTES ] { 32 } + } - - Parameters [3] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $nonce ] - Parameter #2 [ <required> $key ] - } - } - - Method [ <internal:libsodium> static public method crypto_shorthash ] { - - - Parameters [2] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $key ] - } - } + - Functions { + Function [ <internal:libsodium> function Sodium\crypto_aead_chacha20poly1305_decrypt ] { - Method [ <internal:libsodium> static public method crypto_sign ] { + - Parameters [4] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $ad ] + Parameter #2 [ <required> $nonce ] + Parameter #3 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_aead_chacha20poly1305_encrypt ] { - - Parameters [2] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $key ] - } - } + - Parameters [4] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $ad ] + Parameter #2 [ <required> $nonce ] + Parameter #3 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_box ] { - Method [ <internal:libsodium> static public method crypto_sign_detached ] { + - Parameters [3] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $nonce ] + Parameter #2 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_box_keypair ] { - - Parameters [2] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $key ] - } - } + - Parameters [0] { + } + } + Function [ <internal:libsodium> function Sodium\crypto_box_keypair_from_secretkey_and_publickey ] { - Method [ <internal:libsodium> static public method crypto_sign_keypair ] { + - Parameters [2] { + Parameter #0 [ <required> $secret_key ] + Parameter #1 [ <required> $public_key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_box_open ] { - - Parameters [0] { - } - } + - Parameters [3] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $nonce ] + Parameter #2 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_box_publickey ] { - Method [ <internal:libsodium> static public method crypto_sign_keypair_from_secretkey_and_publickey ] { + - Parameters [1] { + Parameter #0 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_box_publickey_from_secretkey ] { - - Parameters [2] { - Parameter #0 [ <required> $secret_key ] - Parameter #1 [ <required> $public_key ] - } - } + - Parameters [1] { + Parameter #0 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_box_seal ] { - Method [ <internal:libsodium> static public method crypto_sign_open ] { + - Parameters [2] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_box_seal_open ] { - - Parameters [2] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $key ] - } - } + - Parameters [2] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_box_secretkey ] { - Method [ <internal:libsodium> static public method crypto_sign_publickey ] { + - Parameters [1] { + Parameter #0 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_kx ] { - - Parameters [1] { - Parameter #0 [ <required> $key ] - } - } + - Parameters [4] { + Parameter #0 [ <required> $string_1 ] + Parameter #1 [ <required> $string_2 ] + Parameter #2 [ <required> $string_3 ] + Parameter #3 [ <optional> $string_4 ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_generichash ] { - Method [ <internal:libsodium> static public method crypto_sign_secretkey ] { + - Parameters [3] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <optional> $key ] + Parameter #2 [ <optional> $length ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_generichash_init ] { - - Parameters [1] { - Parameter #0 [ <required> $key ] - } - } + - Parameters [2] { + Parameter #0 [ <optional> $key ] + Parameter #1 [ <optional> $length ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_generichash_update ] { - Method [ <internal:libsodium> static public method crypto_sign_seed_keypair ] { + - Parameters [2] { + Parameter #0 [ <required> &$state ] + Parameter #1 [ <required> $string ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_generichash_final ] { - - Parameters [1] { - Parameter #0 [ <required> $key ] - } - } + - Parameters [2] { + Parameter #0 [ <required> &$state ] + Parameter #1 [ <optional> $length ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_pwhash_scryptsalsa208sha256 ] { + + - Parameters [5] { + Parameter #0 [ <required> $length ] + Parameter #1 [ <required> $password ] + Parameter #2 [ <required> $salt ] + Parameter #3 [ <required> $opslimit ] + Parameter #4 [ <required> $memlimit ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_pwhash_scryptsalsa208sha256_str ] { - Method [ <internal:libsodium> static public method crypto_sign_verify_detached ] { + - Parameters [3] { + Parameter #0 [ <required> $password ] + Parameter #1 [ <required> $opslimit ] + Parameter #2 [ <required> $memlimit ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_pwhash_scryptsalsa208sha256_str_verify ] { - - Parameters [3] { - Parameter #0 [ <required> $signature ] - Parameter #1 [ <required> $string ] - Parameter #2 [ <required> $key ] - } - } + - Parameters [2] { + Parameter #0 [ <required> $hash ] + Parameter #1 [ <required> $password ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_scalarmult ] { - Method [ <internal:libsodium> static public method crypto_stream ] { + - Parameters [2] { + Parameter #0 [ <required> $string_1 ] + Parameter #1 [ <required> $string_2 ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_secretbox ] { - - Parameters [3] { - Parameter #0 [ <required> $length ] - Parameter #1 [ <required> $nonce ] - Parameter #2 [ <required> $key ] - } - } + - Parameters [3] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $nonce ] + Parameter #2 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_secretbox_open ] { - Method [ <internal:libsodium> static public method crypto_stream_xor ] { + - Parameters [3] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $nonce ] + Parameter #2 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_shorthash ] { - - Parameters [3] { - Parameter #0 [ <required> $string ] - Parameter #1 [ <required> $nonce ] - Parameter #2 [ <required> $key ] - } - } + - Parameters [2] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign ] { - Method [ <internal:libsodium> static public method randombytes_buf ] { + - Parameters [2] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $keypair ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign_detached ] { - - Parameters [1] { - Parameter #0 [ <required> $length ] - } - } + - Parameters [2] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $keypair ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign_keypair ] { - Method [ <internal:libsodium> static public method randombytes_random16 ] { + - Parameters [0] { + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign_keypair_from_secretkey_and_publickey ] { - - Parameters [0] { - } - } + - Parameters [2] { + Parameter #0 [ <required> $secret_key ] + Parameter #1 [ <required> $public_key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign_open ] { - Method [ <internal:libsodium> static public method randombytes_uniform ] { + - Parameters [2] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $keypair ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign_publickey ] { - - Parameters [1] { - Parameter #0 [ <required> $integer ] - } - } + - Parameters [1] { + Parameter #0 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign_secretkey ] { - Method [ <internal:libsodium> static public method sodium_bin2hex ] { + - Parameters [1] { + Parameter #0 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign_seed_keypair ] { - - Parameters [1] { - Parameter #0 [ <required> $string ] - } - } + - Parameters [1] { + Parameter #0 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_sign_verify_detached ] { - Method [ <internal:libsodium> static public method sodium_hex2bin ] { + - Parameters [3] { + Parameter #0 [ <required> $signature ] + Parameter #1 [ <required> $string ] + Parameter #2 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_stream ] { - - Parameters [2] { - Parameter #0 [ <required> $string_1 ] - Parameter #1 [ <required> $string_2 ] - } - } + - Parameters [3] { + Parameter #0 [ <required> $length ] + Parameter #1 [ <required> $nonce ] + Parameter #2 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\crypto_stream_xor ] { - Method [ <internal:libsodium> static public method sodium_library_version_major ] { + - Parameters [3] { + Parameter #0 [ <required> $string ] + Parameter #1 [ <required> $nonce ] + Parameter #2 [ <required> $key ] + } + } + Function [ <internal:libsodium> function Sodium\randombytes_buf ] { - - Parameters [0] { - } - } + - Parameters [1] { + Parameter #0 [ <required> $length ] + } + } + Function [ <internal:libsodium> function Sodium\randombytes_random16 ] { - Method [ <internal:libsodium> static public method sodium_library_version_minor ] { + - Parameters [0] { + } + } + Function [ <internal:libsodium> function Sodium\randombytes_uniform ] { - - Parameters [0] { - } - } + - Parameters [1] { + Parameter #0 [ <required> $integer ] + } + } + Function [ <internal:libsodium> function Sodium\bin2hex ] { - Method [ <internal:libsodium> static public method sodium_memcmp ] { + - Parameters [1] { + Parameter #0 [ <required> $string ] + } + } + Function [ <internal:libsodium> function Sodium\hex2bin ] { - - Parameters [2] { - Parameter #0 [ <required> $string_1 ] - Parameter #1 [ <required> $string_2 ] - } - } + - Parameters [2] { + Parameter #0 [ <required> $string_1 ] + Parameter #1 [ <required> $string_2 ] + } + } + Function [ <internal:libsodium> function Sodium\library_version_major ] { - Method [ <internal:libsodium> static public method sodium_memzero ] { + - Parameters [0] { + } + } + Function [ <internal:libsodium> function Sodium\library_version_minor ] { - - Parameters [2] { - Parameter #0 [ <required> &$reference ] - Parameter #1 [ <required> $length ] - } - } + - Parameters [0] { + } + } + Function [ <internal:libsodium> function Sodium\memcmp ] { - Method [ <internal:libsodium> static public method sodium_version_string ] { + - Parameters [2] { + Parameter #0 [ <required> $string_1 ] + Parameter #1 [ <required> $string_2 ] + } + } + Function [ <internal:libsodium> function Sodium\memzero ] { - - Parameters [0] { - } - } + - Parameters [2] { + Parameter #0 [ <required> &$reference ] + Parameter #1 [ <required> $length ] } + } + Function [ <internal:libsodium> function Sodium\version_string ] { - - Properties [0] { + - Parameters [0] { } + } + Function [ <internal:libsodium> function Sodium\crypto_scalarmult_base ] { - - Methods [0] { + - Parameters [2] { + Parameter #0 [ <required> $string_1 ] + Parameter #1 [ <required> $string_2 ] } } } diff --git a/libsodium-php7.patch b/libsodium-php7.patch deleted file mode 100644 index 3f4b50b..0000000 --- a/libsodium-php7.patch +++ /dev/null @@ -1,1035 +0,0 @@ -From 4b5dc6986beb959bd08abda4f48aa149b04bd9ce Mon Sep 17 00:00:00 2001 -From: Remi Collet <fedora@famillecollet.com> -Date: Thu, 2 Apr 2015 18:40:41 +0200 -Subject: [PATCH 1/9] fix PHP 7 compatibility - ---- - libsodium.c | 224 +++++++++++++++++++++++++++++--------------------------- - package.xml | 1 - - php_libsodium.h | 12 +++ - run-tests.php | 25 ++++--- - 4 files changed, 143 insertions(+), 119 deletions(-) - -diff --git a/libsodium.c b/libsodium.c -index 0a090d3..97af7d2 100644 ---- a/libsodium.c -+++ b/libsodium.c -@@ -279,7 +279,7 @@ PHP_MINFO_FUNCTION(libsodium) - - PHP_METHOD(Sodium, sodium_version_string) - { -- RETURN_STRING(sodium_version_string(), 1); -+ _RETURN_STRING(sodium_version_string()); - } - - PHP_METHOD(Sodium, sodium_library_version_major) -@@ -296,12 +296,18 @@ PHP_METHOD(Sodium, sodium_memzero) - { - zval *zv; - char *buf; -- int len; -+ strsize_t len; - -- if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, -- "z", &zv) == FAILURE || -- Z_TYPE_P(zv) != IS_STRING) { -- zend_error(E_ERROR, "sodium_memzero: a PHP string is required"); -+ if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "z", &zv) == FAILURE) { -+ return; -+ } -+#if PHP_MAJOR_VERSION >= 7 -+ if (Z_TYPE_P(zv) == IS_REFERENCE) { -+ ZVAL_DEREF(zv); -+ } -+#endif -+ if (Z_TYPE_P(zv) != IS_STRING) { -+ zend_error(E_ERROR, "sodium_memzero: a PHP string is required") ; - } - buf = Z_STRVAL(*zv); - len = Z_STRLEN(*zv); -@@ -315,8 +321,8 @@ PHP_METHOD(Sodium, sodium_memcmp) - { - char *buf1; - char *buf2; -- int len1; -- int len2; -+ strsize_t len1; -+ strsize_t len2; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &buf1, &len1, -@@ -335,7 +341,7 @@ PHP_METHOD(Sodium, sodium_memcmp) - PHP_METHOD(Sodium, randombytes_buf) - { - char *buf; -- long len; -+ zend_long len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l", - &len) == FAILURE || -@@ -346,7 +352,7 @@ PHP_METHOD(Sodium, randombytes_buf) - randombytes_buf(buf, (size_t) len); - buf[len] = 0U; - -- RETURN_STRINGL(buf, (int) len, 0); -+ _RETURN_STRINGL(buf, (int) len); - } - - PHP_METHOD(Sodium, randombytes_random16) -@@ -356,7 +362,7 @@ PHP_METHOD(Sodium, randombytes_random16) - - PHP_METHOD(Sodium, randombytes_uniform) - { -- long upper_bound; -+ zend_long upper_bound; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l", - &upper_bound) == FAILURE || -@@ -371,8 +377,8 @@ PHP_METHOD(Sodium, crypto_shorthash) - unsigned char *hash; - unsigned char *key; - unsigned char *msg; -- int key_len; -- int msg_len; -+ strsize_t key_len; -+ strsize_t msg_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &msg, &msg_len, -@@ -391,7 +397,7 @@ PHP_METHOD(Sodium, crypto_shorthash) - } - hash[crypto_shorthash_BYTES] = 0U; - -- RETURN_STRINGL((char *) hash, crypto_shorthash_BYTES, 0); -+ _RETURN_STRINGL((char *) hash, crypto_shorthash_BYTES); - } - - PHP_METHOD(Sodium, crypto_secretbox) -@@ -400,9 +406,9 @@ PHP_METHOD(Sodium, crypto_secretbox) - unsigned char *key; - unsigned char *msg; - unsigned char *nonce; -- int key_len; -- int msg_len; -- int nonce_len; -+ strsize_t key_len; -+ strsize_t msg_len; -+ strsize_t nonce_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", - &msg, &msg_len, -@@ -432,7 +438,7 @@ PHP_METHOD(Sodium, crypto_secretbox) - } - ciphertext[msg_len + crypto_secretbox_MACBYTES] = 0U; - -- RETURN_STRINGL((char *) ciphertext, msg_len + crypto_secretbox_MACBYTES, 0); -+ _RETURN_STRINGL((char *) ciphertext, msg_len + crypto_secretbox_MACBYTES); - } - - PHP_METHOD(Sodium, crypto_secretbox_open) -@@ -441,9 +447,9 @@ PHP_METHOD(Sodium, crypto_secretbox_open) - unsigned char *ciphertext; - unsigned char *msg; - unsigned char *nonce; -- int key_len; -- int ciphertext_len; -- int nonce_len; -+ strsize_t key_len; -+ strsize_t ciphertext_len; -+ strsize_t nonce_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", - &ciphertext, &ciphertext_len, -@@ -474,8 +480,8 @@ PHP_METHOD(Sodium, crypto_secretbox_open) - RETURN_FALSE; - } else { - msg[ciphertext_len - crypto_secretbox_MACBYTES] = 0U; -- RETURN_STRINGL((char *) msg, -- ciphertext_len - crypto_secretbox_MACBYTES, 0); -+ _RETURN_STRINGL((char *) msg, -+ ciphertext_len - crypto_secretbox_MACBYTES); - } - } - -@@ -484,9 +490,9 @@ PHP_METHOD(Sodium, crypto_generichash) - unsigned char *hash; - unsigned char *key = NULL; - unsigned char *msg; -- long hash_len = crypto_generichash_BYTES; -- int key_len = 0; -- int msg_len; -+ zend_long hash_len = crypto_generichash_BYTES; -+ strsize_t key_len = 0; -+ strsize_t msg_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|sl", - &msg, &msg_len, -@@ -512,7 +518,7 @@ PHP_METHOD(Sodium, crypto_generichash) - } - hash[hash_len] = 0U; - -- RETURN_STRINGL((char *) hash, (int) hash_len, 0); -+ _RETURN_STRINGL((char *) hash, (int) hash_len); - } - - PHP_METHOD(Sodium, crypto_box_keypair) -@@ -529,7 +535,7 @@ PHP_METHOD(Sodium, crypto_box_keypair) - } - keypair[keypair_len] = 0U; - -- RETURN_STRINGL((char *) keypair, (int) keypair_len, 0); -+ _RETURN_STRINGL((char *) keypair, (int) keypair_len); - } - - PHP_METHOD(Sodium, crypto_box_keypair_from_secretkey_and_publickey) -@@ -538,8 +544,8 @@ PHP_METHOD(Sodium, crypto_box_keypair_from_secretkey_and_publickey) - char *publickey; - char *secretkey; - size_t keypair_len; -- int publickey_len; -- int secretkey_len; -+ strsize_t publickey_len; -+ strsize_t secretkey_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &secretkey, &secretkey_len, -@@ -563,14 +569,14 @@ PHP_METHOD(Sodium, crypto_box_keypair_from_secretkey_and_publickey) - crypto_box_PUBLICKEYBYTES); - keypair[keypair_len] = 0U; - -- RETURN_STRINGL(keypair, (int) keypair_len, 0); -+ _RETURN_STRINGL(keypair, (int) keypair_len); - } - - PHP_METHOD(Sodium, crypto_box_secretkey) - { - unsigned char *keypair; - char *secretkey; -- int keypair_len; -+ strsize_t keypair_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", - &keypair, &keypair_len) == FAILURE) { -@@ -586,14 +592,14 @@ PHP_METHOD(Sodium, crypto_box_secretkey) - memcpy(secretkey, keypair, crypto_box_SECRETKEYBYTES); - secretkey[crypto_box_SECRETKEYBYTES] = 0U; - -- RETURN_STRINGL((char *) secretkey, crypto_box_SECRETKEYBYTES, 0); -+ _RETURN_STRINGL((char *) secretkey, crypto_box_SECRETKEYBYTES); - } - - PHP_METHOD(Sodium, crypto_box_publickey) - { - unsigned char *keypair; - char *publickey; -- int keypair_len; -+ strsize_t keypair_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", - &keypair, &keypair_len) == FAILURE) { -@@ -610,14 +616,14 @@ PHP_METHOD(Sodium, crypto_box_publickey) - crypto_box_PUBLICKEYBYTES); - publickey[crypto_box_PUBLICKEYBYTES] = 0U; - -- RETURN_STRINGL((char *) publickey, crypto_box_PUBLICKEYBYTES, 0); -+ _RETURN_STRINGL((char *) publickey, crypto_box_PUBLICKEYBYTES); - } - - PHP_METHOD(Sodium, crypto_box_publickey_from_secretkey) - { - unsigned char *publickey; - unsigned char *secretkey; -- int secretkey_len; -+ strsize_t secretkey_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", - &secretkey, &secretkey_len) == FAILURE) { -@@ -636,7 +642,7 @@ PHP_METHOD(Sodium, crypto_box_publickey_from_secretkey) - crypto_scalarmult_base(publickey, secretkey); - publickey[crypto_box_PUBLICKEYBYTES] = 0U; - -- RETURN_STRINGL((char *) publickey, crypto_box_PUBLICKEYBYTES, 0); -+ _RETURN_STRINGL((char *) publickey, crypto_box_PUBLICKEYBYTES); - } - - PHP_METHOD(Sodium, crypto_box) -@@ -647,9 +653,9 @@ PHP_METHOD(Sodium, crypto_box) - unsigned char *nonce; - unsigned char *publickey; - unsigned char *secretkey; -- int keypair_len; -- int msg_len; -- int nonce_len; -+ strsize_t keypair_len; -+ strsize_t msg_len; -+ strsize_t nonce_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", - &msg, &msg_len, -@@ -680,7 +686,7 @@ PHP_METHOD(Sodium, crypto_box) - } - ciphertext[msg_len + crypto_box_MACBYTES] = 0U; - -- RETURN_STRINGL((char *) ciphertext, msg_len + crypto_box_MACBYTES, 0); -+ _RETURN_STRINGL((char *) ciphertext, msg_len + crypto_box_MACBYTES); - } - - PHP_METHOD(Sodium, crypto_box_open) -@@ -691,9 +697,9 @@ PHP_METHOD(Sodium, crypto_box_open) - unsigned char *nonce; - unsigned char *publickey; - unsigned char *secretkey; -- int ciphertext_len; -- int keypair_len; -- int nonce_len; -+ strsize_t ciphertext_len; -+ strsize_t keypair_len; -+ strsize_t nonce_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", - &ciphertext, &ciphertext_len, -@@ -726,8 +732,8 @@ PHP_METHOD(Sodium, crypto_box_open) - RETURN_FALSE; - } else { - msg[ciphertext_len - crypto_box_MACBYTES] = 0U; -- RETURN_STRINGL((char *) msg, -- ciphertext_len - crypto_box_MACBYTES, 0); -+ _RETURN_STRINGL((char *) msg, -+ ciphertext_len - crypto_box_MACBYTES); - } - } - -@@ -745,7 +751,7 @@ PHP_METHOD(Sodium, crypto_sign_keypair) - } - keypair[keypair_len] = 0U; - -- RETURN_STRINGL((char *) keypair, keypair_len, 0); -+ _RETURN_STRINGL((char *) keypair, keypair_len); - } - - PHP_METHOD(Sodium, crypto_sign_seed_keypair) -@@ -753,7 +759,7 @@ PHP_METHOD(Sodium, crypto_sign_seed_keypair) - unsigned char *keypair; - unsigned char *seed; - size_t keypair_len; -- int seed_len; -+ strsize_t seed_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", - &seed, &seed_len) == FAILURE) { -@@ -773,7 +779,7 @@ PHP_METHOD(Sodium, crypto_sign_seed_keypair) - } - keypair[keypair_len] = 0U; - -- RETURN_STRINGL((char *) keypair, keypair_len, 0); -+ _RETURN_STRINGL((char *) keypair, keypair_len); - } - - PHP_METHOD(Sodium, crypto_sign_keypair_from_secretkey_and_publickey) -@@ -782,8 +788,8 @@ PHP_METHOD(Sodium, crypto_sign_keypair_from_secretkey_and_publickey) - char *publickey; - char *secretkey; - size_t keypair_len; -- int publickey_len; -- int secretkey_len; -+ strsize_t publickey_len; -+ strsize_t secretkey_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &secretkey, &secretkey_len, -@@ -807,14 +813,14 @@ PHP_METHOD(Sodium, crypto_sign_keypair_from_secretkey_and_publickey) - crypto_sign_PUBLICKEYBYTES); - keypair[keypair_len] = 0U; - -- RETURN_STRINGL(keypair, keypair_len, 0); -+ _RETURN_STRINGL(keypair, keypair_len); - } - - PHP_METHOD(Sodium, crypto_sign_secretkey) - { - unsigned char *keypair; - char *secretkey; -- int keypair_len; -+ strsize_t keypair_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", - &keypair, &keypair_len) == FAILURE) { -@@ -830,14 +836,14 @@ PHP_METHOD(Sodium, crypto_sign_secretkey) - memcpy(secretkey, keypair, crypto_sign_SECRETKEYBYTES); - secretkey[crypto_sign_SECRETKEYBYTES] = 0U; - -- RETURN_STRINGL((char *) secretkey, crypto_sign_SECRETKEYBYTES, 0); -+ _RETURN_STRINGL((char *) secretkey, crypto_sign_SECRETKEYBYTES); - } - - PHP_METHOD(Sodium, crypto_sign_publickey) - { - unsigned char *keypair; - char *publickey; -- int keypair_len; -+ strsize_t keypair_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", - &keypair, &keypair_len) == FAILURE) { -@@ -854,7 +860,7 @@ PHP_METHOD(Sodium, crypto_sign_publickey) - crypto_sign_PUBLICKEYBYTES); - publickey[crypto_sign_PUBLICKEYBYTES] = 0U; - -- RETURN_STRINGL((char *) publickey, crypto_sign_PUBLICKEYBYTES, 0); -+ _RETURN_STRINGL((char *) publickey, crypto_sign_PUBLICKEYBYTES); - } - - PHP_METHOD(Sodium, crypto_sign) -@@ -863,9 +869,9 @@ PHP_METHOD(Sodium, crypto_sign) - unsigned char *msg_signed; - unsigned char *secretkey; - unsigned long long msg_signed_real_len; -- int msg_len; -- int msg_signed_len; -- int secretkey_len; -+ strsize_t msg_len; -+ strsize_t msg_signed_len; -+ strsize_t secretkey_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &msg, &msg_len, -@@ -894,7 +900,7 @@ PHP_METHOD(Sodium, crypto_sign) - } - msg_signed[msg_signed_real_len] = 0U; - -- RETURN_STRINGL((char *) msg_signed, (int) msg_signed_real_len, 0); -+ _RETURN_STRINGL((char *) msg_signed, (int) msg_signed_real_len); - } - - PHP_METHOD(Sodium, crypto_sign_open) -@@ -903,9 +909,9 @@ PHP_METHOD(Sodium, crypto_sign_open) - unsigned char *msg_signed; - unsigned char *publickey; - unsigned long long msg_real_len; -- int msg_len; -- int msg_signed_len; -- int publickey_len; -+ strsize_t msg_len; -+ strsize_t msg_signed_len; -+ strsize_t publickey_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &msg_signed, &msg_signed_len, -@@ -935,7 +941,7 @@ PHP_METHOD(Sodium, crypto_sign_open) - } - msg[msg_real_len] = 0U; - -- RETURN_STRINGL((char *) msg, (int) msg_real_len, 0); -+ _RETURN_STRINGL((char *) msg, (int) msg_real_len); - } - - PHP_METHOD(Sodium, crypto_sign_detached) -@@ -944,8 +950,8 @@ PHP_METHOD(Sodium, crypto_sign_detached) - unsigned char *signature; - unsigned char *secretkey; - unsigned long long signature_real_len; -- int msg_len; -- int secretkey_len; -+ strsize_t msg_len; -+ strsize_t secretkey_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &msg, &msg_len, -@@ -969,7 +975,7 @@ PHP_METHOD(Sodium, crypto_sign_detached) - } - signature[signature_real_len] = 0U; - -- RETURN_STRINGL((char *) signature, (int) signature_real_len, 0); -+ _RETURN_STRINGL((char *) signature, (int) signature_real_len); - } - - PHP_METHOD(Sodium, crypto_sign_verify_detached) -@@ -977,9 +983,9 @@ PHP_METHOD(Sodium, crypto_sign_verify_detached) - unsigned char *msg; - unsigned char *publickey; - unsigned char *signature; -- int msg_len; -- int publickey_len; -- int signature_len; -+ strsize_t msg_len; -+ strsize_t publickey_len; -+ strsize_t signature_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", - &signature, &signature_len, -@@ -1010,9 +1016,9 @@ PHP_METHOD(Sodium, crypto_stream) - unsigned char *ciphertext; - unsigned char *key; - unsigned char *nonce; -- long ciphertext_len; -- int key_len; -- int nonce_len; -+ zend_long ciphertext_len; -+ strsize_t key_len; -+ strsize_t nonce_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "lss", - &ciphertext_len, -@@ -1037,7 +1043,7 @@ PHP_METHOD(Sodium, crypto_stream) - } - ciphertext[ciphertext_len] = 0U; - -- RETURN_STRINGL((char *) ciphertext, ciphertext_len, 0); -+ _RETURN_STRINGL((char *) ciphertext, ciphertext_len); - } - - PHP_METHOD(Sodium, crypto_stream_xor) -@@ -1046,9 +1052,9 @@ PHP_METHOD(Sodium, crypto_stream_xor) - unsigned char *key; - unsigned char *msg; - unsigned char *nonce; -- int key_len; -- int msg_len; -- int nonce_len; -+ strsize_t key_len; -+ strsize_t msg_len; -+ strsize_t nonce_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", - &msg, &msg_len, -@@ -1070,7 +1076,7 @@ PHP_METHOD(Sodium, crypto_stream_xor) - } - ciphertext[msg_len] = 0U; - -- RETURN_STRINGL((char *) ciphertext, msg_len, 0); -+ _RETURN_STRINGL((char *) ciphertext, msg_len); - } - - PHP_METHOD(Sodium, crypto_pwhash_scryptsalsa208sha256) -@@ -1078,11 +1084,11 @@ PHP_METHOD(Sodium, crypto_pwhash_scryptsalsa208sha256) - unsigned char *hash; - unsigned char *salt; - char *passwd; -- long hash_len; -- long memlimit; -- long opslimit; -- int passwd_len; -- int salt_len; -+ zend_long hash_len; -+ zend_long memlimit; -+ zend_long opslimit; -+ strsize_t passwd_len; -+ strsize_t salt_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "lssll", - &hash_len, -@@ -1118,16 +1124,16 @@ PHP_METHOD(Sodium, crypto_pwhash_scryptsalsa208sha256) - } - hash[hash_len] = 0U; - -- RETURN_STRINGL((char *) hash, hash_len, 0); -+ _RETURN_STRINGL((char *) hash, hash_len); - } - - PHP_METHOD(Sodium, crypto_pwhash_scryptsalsa208sha256_str) - { - char *hash_str; - char *passwd; -- long memlimit; -- long opslimit; -- int passwd_len; -+ zend_long memlimit; -+ zend_long opslimit; -+ strsize_t passwd_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sll", - &passwd, &passwd_len, -@@ -1157,16 +1163,16 @@ PHP_METHOD(Sodium, crypto_pwhash_scryptsalsa208sha256_str) - } - hash_str[crypto_pwhash_scryptsalsa208sha256_STRBYTES] = 0U; - -- RETURN_STRINGL((char *) hash_str, -- crypto_pwhash_scryptsalsa208sha256_STRBYTES - 1, 0); -+ _RETURN_STRINGL((char *) hash_str, -+ crypto_pwhash_scryptsalsa208sha256_STRBYTES - 1); - } - - PHP_METHOD(Sodium, crypto_pwhash_scryptsalsa208sha256_str_verify) - { - char *hash_str; - char *passwd; -- int hash_str_len; -- int passwd_len; -+ strsize_t hash_str_len; -+ strsize_t passwd_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &hash_str, &hash_str_len, -@@ -1196,11 +1202,11 @@ PHP_METHOD(Sodium, crypto_aead_chacha20poly1305_encrypt) - unsigned char *npub; - unsigned char *secretkey; - unsigned long long ciphertext_real_len; -- int ad_len; -- int ciphertext_len; -- int msg_len; -- int npub_len; -- int secretkey_len; -+ strsize_t ad_len; -+ strsize_t ciphertext_len; -+ strsize_t msg_len; -+ strsize_t npub_len; -+ strsize_t secretkey_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ssss", - &msg, &msg_len, -@@ -1239,7 +1245,7 @@ PHP_METHOD(Sodium, crypto_aead_chacha20poly1305_encrypt) - } - ciphertext[ciphertext_real_len] = 0U; - -- RETURN_STRINGL((char *) ciphertext, (int) ciphertext_real_len, 0); -+ _RETURN_STRINGL((char *) ciphertext, (int) ciphertext_real_len); - } - - PHP_METHOD(Sodium, crypto_aead_chacha20poly1305_decrypt) -@@ -1250,11 +1256,11 @@ PHP_METHOD(Sodium, crypto_aead_chacha20poly1305_decrypt) - unsigned char *npub; - unsigned char *secretkey; - unsigned long long msg_real_len; -- int ad_len; -- int ciphertext_len; -- int msg_len; -- int npub_len; -- int secretkey_len; -+ strsize_t ad_len; -+ strsize_t ciphertext_len; -+ strsize_t msg_len; -+ strsize_t npub_len; -+ strsize_t secretkey_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ssss", - &ciphertext, &ciphertext_len, -@@ -1293,15 +1299,15 @@ PHP_METHOD(Sodium, crypto_aead_chacha20poly1305_decrypt) - } - msg[msg_real_len] = 0U; - -- RETURN_STRINGL((char *) msg, (int) msg_real_len, 0); -+ _RETURN_STRINGL((char *) msg, (int) msg_real_len); - } - - PHP_METHOD(Sodium, sodium_bin2hex) - { - unsigned char *bin; - char *hex; -- int bin_len; -- int hex_len; -+ strsize_t bin_len; -+ strsize_t hex_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", - &bin, &bin_len) == FAILURE) { -@@ -1314,7 +1320,7 @@ PHP_METHOD(Sodium, sodium_bin2hex) - hex = safe_emalloc((size_t) hex_len + 1U, 1U, 0U); - sodium_bin2hex(hex, hex_len + 1U, bin, bin_len); - -- RETURN_STRINGL(hex, hex_len, 0); -+ _RETURN_STRINGL(hex, hex_len); - } - - PHP_METHOD(Sodium, sodium_hex2bin) -@@ -1324,8 +1330,8 @@ PHP_METHOD(Sodium, sodium_hex2bin) - char *ignore = NULL; - size_t bin_real_len; - size_t bin_len; -- int hex_len; -- int ignore_len = 0; -+ strsize_t hex_len; -+ strsize_t ignore_len = 0; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s|s", - &hex, &hex_len, -@@ -1341,7 +1347,7 @@ PHP_METHOD(Sodium, sodium_hex2bin) - } - bin[bin_real_len] = 0U; - -- RETURN_STRINGL((char *) bin, (int) bin_real_len, 0); -+ _RETURN_STRINGL((char *) bin, (int) bin_real_len); - } - - PHP_METHOD(Sodium, crypto_scalarmult) -diff --git a/php_libsodium.h b/php_libsodium.h -index 77c3e4b..d837bef 100644 ---- a/php_libsodium.h -+++ b/php_libsodium.h -@@ -70,6 +70,18 @@ PHP_METHOD(Sodium, sodium_version_string); - #define LIBSODIUM_G(v) (libsodium_globals.v) - #endif - -+#if PHP_MAJOR_VERSION < 7 -+typedef long zend_long; -+typedef int strsize_t; -+#define _RETURN_STRING(a) RETURN_STRING(a,1) -+#define _RETURN_STRINGL(a,l) RETURN_STRINGL(a,l,0) -+#else -+typedef size_t strsize_t; -+#define TSRMLS_CC -+#define _RETURN_STRING(a) RETURN_STRING(a) -+#define _RETURN_STRINGL(a,l) { RETVAL_STRINGL(a, l); efree(a); return; } -+#endif -+ - #endif /* PHP_LIBSODIUM_H */ - - /* -From b0278abcf057b9303530b2537f76316facff317a Mon Sep 17 00:00:00 2001 -From: Remi Collet <fedora@famillecollet.com> -Date: Thu, 2 Apr 2015 19:29:32 +0200 -Subject: [PATCH 3/9] avoid double allocation - ---- - libsodium.c | 12 ++++++++++++ - 1 file changed, 12 insertions(+) - -diff --git a/libsodium.c b/libsodium.c -index 97af7d2..f14ed27 100644 ---- a/libsodium.c -+++ b/libsodium.c -@@ -340,7 +340,11 @@ PHP_METHOD(Sodium, sodium_memcmp) - - PHP_METHOD(Sodium, randombytes_buf) - { -+#if PHP_MAJOR_VERSION < 7 - char *buf; -+#else -+ zend_string *result; -+#endif - zend_long len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l", -@@ -348,11 +352,19 @@ PHP_METHOD(Sodium, randombytes_buf) - len <= 0 || len >= INT_MAX) { - zend_error(E_ERROR, "randombytes_buf(): invalid length"); - } -+#if PHP_MAJOR_VERSION < 7 - buf = safe_emalloc((size_t) len + 1U, 1U, 0U); - randombytes_buf(buf, (size_t) len); - buf[len] = 0U; - - _RETURN_STRINGL(buf, (int) len); -+#else -+ result = zend_string_alloc(len, 0); -+ randombytes_buf(result->val, result->len); -+ result->val[result->len] = '\0'; -+ -+ RETURN_NEW_STR(result); -+#endif - } - - PHP_METHOD(Sodium, randombytes_random16) - -From 8ca9879884b991df15d3b69443015fe95a531b6e Mon Sep 17 00:00:00 2001 -From: Remi Collet <fedora@famillecollet.com> -Date: Fri, 10 Apr 2015 18:34:51 +0200 -Subject: [PATCH 4/9] provide more compat. stuff, and make code more PHP-7-like - ---- - libsodium.c | 12 ------------ - php_libsodium.h | 23 +++++++++++++++++++++++ - 2 files changed, 23 insertions(+), 12 deletions(-) - -diff --git a/libsodium.c b/libsodium.c -index f14ed27..f18905f 100644 ---- a/libsodium.c -+++ b/libsodium.c -@@ -340,11 +340,7 @@ PHP_METHOD(Sodium, sodium_memcmp) - - PHP_METHOD(Sodium, randombytes_buf) - { --#if PHP_MAJOR_VERSION < 7 -- char *buf; --#else - zend_string *result; --#endif - zend_long len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l", -@@ -352,19 +348,11 @@ PHP_METHOD(Sodium, randombytes_buf) - len <= 0 || len >= INT_MAX) { - zend_error(E_ERROR, "randombytes_buf(): invalid length"); - } --#if PHP_MAJOR_VERSION < 7 -- buf = safe_emalloc((size_t) len + 1U, 1U, 0U); -- randombytes_buf(buf, (size_t) len); -- buf[len] = 0U; -- -- _RETURN_STRINGL(buf, (int) len); --#else - result = zend_string_alloc(len, 0); - randombytes_buf(result->val, result->len); - result->val[result->len] = '\0'; - - RETURN_NEW_STR(result); --#endif - } - - PHP_METHOD(Sodium, randombytes_random16) -diff --git a/php_libsodium.h b/php_libsodium.h -index d837bef..50e5134 100644 ---- a/php_libsodium.h -+++ b/php_libsodium.h -@@ -71,13 +71,36 @@ PHP_METHOD(Sodium, sodium_version_string); - #endif - - #if PHP_MAJOR_VERSION < 7 -+struct _zend_string { -+ char *val; -+ int len; -+}; -+typedef struct _zend_string zend_string; - typedef long zend_long; - typedef int strsize_t; -+ -+static zend_always_inline zend_string *zend_string_alloc(int len, int persistent) -+{ -+ /* single alloc, so free the bug, will also free the struct */ -+ char *buf = safe_emalloc(sizeof(zend_string)+len+1,1,0); -+ zend_string *str = (zend_string *)(buf+len+1); -+ -+ str->val = buf; -+ str->len = len; -+ -+ return str; -+} -+/* compatibility macros */ - #define _RETURN_STRING(a) RETURN_STRING(a,1) - #define _RETURN_STRINGL(a,l) RETURN_STRINGL(a,l,0) -+/* new macros */ -+#define RETURN_NEW_STR(s) RETURN_STRINGL(s->val,s->len,0); -+ - #else - typedef size_t strsize_t; -+/* removed/uneeded macros */ - #define TSRMLS_CC -+/* compatibility macros */ - #define _RETURN_STRING(a) RETURN_STRING(a) - #define _RETURN_STRINGL(a,l) { RETVAL_STRINGL(a, l); efree(a); return; } - #endif - -From 458d30b0b6070487a209b810d1f7b5ae695ef37b Mon Sep 17 00:00:00 2001 -From: Remi Collet <fedora@famillecollet.com> -Date: Fri, 10 Apr 2015 18:49:44 +0200 -Subject: [PATCH 5/9] improve crypto_shorthash - ---- - libsodium.c | 10 +++++----- - php_libsodium.h | 2 +- - 2 files changed, 6 insertions(+), 6 deletions(-) - -diff --git a/libsodium.c b/libsodium.c -index f18905f..4181f09 100644 ---- a/libsodium.c -+++ b/libsodium.c -@@ -374,7 +374,7 @@ PHP_METHOD(Sodium, randombytes_uniform) - - PHP_METHOD(Sodium, crypto_shorthash) - { -- unsigned char *hash; -+ zend_string *hash; - unsigned char *key; - unsigned char *msg; - strsize_t key_len; -@@ -390,14 +390,14 @@ PHP_METHOD(Sodium, crypto_shorthash) - "crypto_shorthash(): key size should be " - "CRYPTO_SHORTHASH_KEYBYTES bytes"); - } -- hash = safe_emalloc(crypto_shorthash_BYTES + 1U, 1U, 0U); -- if (crypto_shorthash(hash, msg, (unsigned long long) msg_len, key) != 0) { -+ hash = zend_string_alloc(crypto_shorthash_BYTES, 0U); -+ if (crypto_shorthash((unsigned char *)hash->val, msg, (unsigned long long) msg_len, key) != 0) { - efree(hash); - zend_error(E_ERROR, "crypto_shorthash()"); - } -- hash[crypto_shorthash_BYTES] = 0U; -+ hash->val[crypto_shorthash_BYTES] = 0U; - -- _RETURN_STRINGL((char *) hash, crypto_shorthash_BYTES); -+ RETURN_NEW_STR(hash); - } - - PHP_METHOD(Sodium, crypto_secretbox) -diff --git a/php_libsodium.h b/php_libsodium.h -index 50e5134..5c22c31 100644 ---- a/php_libsodium.h -+++ b/php_libsodium.h -@@ -81,7 +81,7 @@ typedef int strsize_t; - - static zend_always_inline zend_string *zend_string_alloc(int len, int persistent) - { -- /* single alloc, so free the bug, will also free the struct */ -+ /* single alloc, so free the buf, will also free the struct */ - char *buf = safe_emalloc(sizeof(zend_string)+len+1,1,0); - zend_string *str = (zend_string *)(buf+len+1); - - -From dc78bceedfaba33af1886f305ada8b01260acd41 Mon Sep 17 00:00:00 2001 -From: Remi Collet <fedora@famillecollet.com> -Date: Fri, 10 Apr 2015 18:59:53 +0200 -Subject: [PATCH 6/9] improve crypto_secretbox - ---- - libsodium.c | 11 +++++------ - 1 file changed, 5 insertions(+), 6 deletions(-) - -diff --git a/libsodium.c b/libsodium.c -index 4181f09..5a7e594 100644 ---- a/libsodium.c -+++ b/libsodium.c -@@ -402,7 +402,7 @@ PHP_METHOD(Sodium, crypto_shorthash) - - PHP_METHOD(Sodium, crypto_secretbox) - { -- unsigned char *ciphertext; -+ zend_string *ciphertext; - unsigned char *key; - unsigned char *msg; - unsigned char *nonce; -@@ -429,16 +429,15 @@ PHP_METHOD(Sodium, crypto_secretbox) - if (INT_MAX - msg_len <= crypto_secretbox_MACBYTES) { - zend_error(E_ERROR, "arithmetic overflow"); - } -- ciphertext = safe_emalloc((size_t) msg_len + crypto_secretbox_MACBYTES + 1U, -- 1U, 0U); -- if (crypto_secretbox_easy(ciphertext, msg, (unsigned long long) msg_len, -+ ciphertext = zend_string_alloc(msg_len + crypto_secretbox_MACBYTES, 0U); -+ if (crypto_secretbox_easy((unsigned char *)ciphertext->val, msg, (unsigned long long) msg_len, - nonce, key) != 0) { - efree(ciphertext); - zend_error(E_ERROR, "crypto_secretbox()"); - } -- ciphertext[msg_len + crypto_secretbox_MACBYTES] = 0U; -+ ciphertext->val[msg_len + crypto_secretbox_MACBYTES] = 0U; - -- _RETURN_STRINGL((char *) ciphertext, msg_len + crypto_secretbox_MACBYTES); -+ RETURN_NEW_STR(ciphertext); - } - - PHP_METHOD(Sodium, crypto_secretbox_open) - -From 4c3c1b9ff87a0b774a4df103f3938a177c4252e7 Mon Sep 17 00:00:00 2001 -From: Remi Collet <fedora@famillecollet.com> -Date: Fri, 10 Apr 2015 19:12:00 +0200 -Subject: [PATCH 7/9] make persitent option for consitency (not needed) - ---- - php_libsodium.h | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/php_libsodium.h b/php_libsodium.h -index 5c22c31..7f8e02a 100644 ---- a/php_libsodium.h -+++ b/php_libsodium.h -@@ -82,7 +82,7 @@ typedef int strsize_t; - static zend_always_inline zend_string *zend_string_alloc(int len, int persistent) - { - /* single alloc, so free the buf, will also free the struct */ -- char *buf = safe_emalloc(sizeof(zend_string)+len+1,1,0); -+ char *buf = safe_pemalloc(sizeof(zend_string)+len+1,1,0,persistent); - zend_string *str = (zend_string *)(buf+len+1); - - str->val = buf; - -From 268fc84c3f7e8b228768822f2f4cc931277a96d6 Mon Sep 17 00:00:00 2001 -From: Remi Collet <fedora@famillecollet.com> -Date: Sat, 11 Apr 2015 17:32:27 +0200 -Subject: [PATCH 8/9] add zend_string_free and use it for zend_str - ---- - libsodium.c | 4 ++-- - php_libsodium.h | 6 ++++++ - 2 files changed, 8 insertions(+), 2 deletions(-) - -diff --git a/libsodium.c b/libsodium.c -index 5a7e594..474327b 100644 ---- a/libsodium.c -+++ b/libsodium.c -@@ -392,7 +392,7 @@ PHP_METHOD(Sodium, crypto_shorthash) - } - hash = zend_string_alloc(crypto_shorthash_BYTES, 0U); - if (crypto_shorthash((unsigned char *)hash->val, msg, (unsigned long long) msg_len, key) != 0) { -- efree(hash); -+ zend_string_free(hash); - zend_error(E_ERROR, "crypto_shorthash()"); - } - hash->val[crypto_shorthash_BYTES] = 0U; -@@ -432,7 +432,7 @@ PHP_METHOD(Sodium, crypto_secretbox) - ciphertext = zend_string_alloc(msg_len + crypto_secretbox_MACBYTES, 0U); - if (crypto_secretbox_easy((unsigned char *)ciphertext->val, msg, (unsigned long long) msg_len, - nonce, key) != 0) { -- efree(ciphertext); -+ zend_string_free(ciphertext); - zend_error(E_ERROR, "crypto_secretbox()"); - } - ciphertext->val[msg_len + crypto_secretbox_MACBYTES] = 0U; -diff --git a/php_libsodium.h b/php_libsodium.h -index 7f8e02a..8d00ea3 100644 ---- a/php_libsodium.h -+++ b/php_libsodium.h -@@ -74,6 +74,7 @@ PHP_METHOD(Sodium, sodium_version_string); - struct _zend_string { - char *val; - int len; -+ int persistent; - }; - typedef struct _zend_string zend_string; - typedef long zend_long; -@@ -87,9 +88,14 @@ static zend_always_inline zend_string *zend_string_alloc(int len, int persistent - - str->val = buf; - str->len = len; -+ str->persistent = persistent; - - return str; - } -+static zend_always_inline void zend_string_free(zend_string *s) -+{ -+ pefree(s->val, s->persistent); -+} - /* compatibility macros */ - #define _RETURN_STRING(a) RETURN_STRING(a,1) - #define _RETURN_STRINGL(a,l) RETURN_STRINGL(a,l,0) - -From c243a17622e22ba4ccd6e2979470bf6eeeeacff2 Mon Sep 17 00:00:00 2001 -From: Remi Collet <fedora@famillecollet.com> -Date: Wed, 15 Apr 2015 16:17:36 +0200 -Subject: [PATCH 9/9] fix crypto_scalarmult for PHP 7 - ---- - libsodium.c | 14 +++++++------- - 1 file changed, 7 insertions(+), 7 deletions(-) - -diff --git a/libsodium.c b/libsodium.c -index 474327b..43eaeb3 100644 ---- a/libsodium.c -+++ b/libsodium.c -@@ -1353,9 +1353,9 @@ PHP_METHOD(Sodium, crypto_scalarmult) - { - unsigned char *n; - unsigned char *p; -- unsigned char *q; -- int n_len; -- int p_len; -+ zend_string *q; -+ strsize_t n_len; -+ strsize_t p_len; - - if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", - &n, &n_len, &p, &p_len) == FAILURE) { -@@ -1366,11 +1366,11 @@ PHP_METHOD(Sodium, crypto_scalarmult) - zend_error(E_ERROR, "crypto_scalarmult(): scalar and point must be " - "CRYPTO_SCALARMULT_SCALARBYTES bytes"); - } -- q = safe_emalloc(crypto_scalarmult_BYTES + 1U, 1U, 0U); -- if (crypto_scalarmult(q, n, p) != 0) { -+ q = zend_string_alloc(crypto_scalarmult_BYTES, 0); -+ if (crypto_scalarmult((unsigned char *)q->val, n, p) != 0) { - zend_error(E_ERROR, "crypto_scalarmult(): internal error"); - } -- q[crypto_scalarmult_BYTES] = 0; -+ q->val[crypto_scalarmult_BYTES] = 0; - -- RETURN_STRINGL((char *) q, crypto_scalarmult_BYTES, 0); -+ RETURN_NEW_STR(q); - } diff --git a/php-pecl-libsodium.spec b/php-pecl-libsodium.spec index 1c228f9..dd09086 100644 --- a/php-pecl-libsodium.spec +++ b/php-pecl-libsodium.spec @@ -30,15 +30,13 @@ Summary: Wrapper for the Sodium cryptographic library Name: %{?sub_prefix}php-pecl-%{pecl_name} -Version: 0.1.3 -Release: 4%{?dist}%{!?scl:%{!?nophptag:%(%{__php} -r 'echo ".".PHP_MAJOR_VERSION.".".PHP_MINOR_VERSION;')}} +Version: 0.2.0 +Release: 1%{?dist}%{!?scl:%{!?nophptag:%(%{__php} -r 'echo ".".PHP_MAJOR_VERSION.".".PHP_MINOR_VERSION;')}} License: PHP Group: Development/Languages URL: http://pecl.php.net/package/%{pecl_name} Source0: http://pecl.php.net/get/%{pecl_name}-%{version}.tgz -Patch1: %{pecl_name}-php7.patch - BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) %if "%{?vendor}" == "Remi Collet" # Ensure libsodium-last is used @@ -100,9 +98,6 @@ mv %{pecl_name}-%{version} NTS sed -e '/role="test"/d' -i package.xml cd NTS -%if "%{php_version}" > "7" -%patch1 -p1 -b .php7 -%endif # Sanity check, really often broken extver=$(sed -n '/#define PHP_LIBSODIUM_VERSION/{s/.* "//;s/".*$//;p}' php_libsodium.h) @@ -235,6 +230,9 @@ rm -rf %{buildroot} %changelog +* Sun Jul 26 2015 Remi Collet <remi@fedoraproject.org> - 0.2.0-1 +- Update to 0.2.0 + * Wed Jul 22 2015 Remi Collet <remi@fedoraproject.org> - 0.1.3-4 - rebuild against php 7.0.0beta2 |