Mercurial > hg > php_nacl
diff nacl.c @ 0:96c976fb3c3d
Initial commit
author | Ivo Smits <Ivo@UCIS.nl> |
---|---|
date | Sun, 27 Feb 2011 18:58:38 +0100 |
parents | |
children | 84e0f7ead583 |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/nacl.c Sun Feb 27 18:58:38 2011 +0100 @@ -0,0 +1,176 @@ +/* Copyright 2010 Ivo Smits <Ivo@UCIS.nl>. All rights reserved. + Redistribution and use in source and binary forms, with or without modification, are + permitted provided that the following conditions are met: + + 1. Redistributions of source code must retain the above copyright notice, this list of + conditions and the following disclaimer. + + 2. Redistributions in binary form must reproduce the above copyright notice, this list + of conditions and the following disclaimer in the documentation and/or other materials + provided with the distribution. + + THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED + WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND + FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR + CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON + ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING + NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF + ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + + The views and conclusions contained in the software and documentation are those of the + authors and should not be interpreted as representing official policies, either expressed + or implied, of Ivo Smits.*/ + +#ifdef HAVE_CONFIG_H +#include "config.h" +#endif +#include "nacl_crypto_box.h" + +#include "php.h" +#include "php_ini.h" +#include "php_nacl.h" + +static function_entry nacl_functions[] = { + PHP_FE(nacl_crypto_box_curve25519xsalsa20poly1305, NULL) + PHP_FE(nacl_crypto_box_curve25519xsalsa20poly1305_open, NULL) + PHP_FE(nacl_crypto_box_curve25519xsalsa20poly1305_getpublickey, NULL) + PHP_FE(nacl_crypto_box_curve25519xsalsa20poly1305_beforenm, NULL) + PHP_FE(nacl_crypto_box_curve25519xsalsa20poly1305_afternm, NULL) + PHP_FE(nacl_crypto_box_curve25519xsalsa20poly1305_open_afternm, NULL) + {NULL, NULL, NULL} +}; + +zend_module_entry nacl_module_entry = { +#if ZEND_MODULE_API_NO >= 20010901 + STANDARD_MODULE_HEADER, +#endif + PHP_NACL_EXTNAME, + nacl_functions, + PHP_MINIT(nacl), + NULL, + NULL, + NULL, + NULL, +#if ZEND_MODULE_API_NO >= 20010901 + PHP_NACL_VERSION, +#endif + STANDARD_MODULE_PROPERTIES +}; + +#ifdef COMPILE_DL_NACL +ZEND_GET_MODULE(nacl) +#endif + +PHP_MINIT_FUNCTION(nacl) { + REGISTER_LONG_CONSTANT("NACL_CRYPTO_BOX_curve25519xsalsa20poly1305_PUBLICKEYBYTES", crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES, CONST_CS | CONST_PERSISTENT); + REGISTER_LONG_CONSTANT("NACL_CRYPTO_BOX_curve25519xsalsa20poly1305_SECRETKEYBYTES", crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES, CONST_CS | CONST_PERSISTENT); + REGISTER_LONG_CONSTANT("NACL_CRYPTO_BOX_curve25519xsalsa20poly1305_BEFORENMBYTES", crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES, CONST_CS | CONST_PERSISTENT); + REGISTER_LONG_CONSTANT("NACL_CRYPTO_BOX_curve25519xsalsa20poly1305_NONCEBYTES", crypto_box_curve25519xsalsa20poly1305_NONCEBYTES, CONST_CS | CONST_PERSISTENT); + REGISTER_LONG_CONSTANT("NACL_CRYPTO_BOX_curve25519xsalsa20poly1305_ZEROBYTES", crypto_box_curve25519xsalsa20poly1305_ZEROBYTES, CONST_CS | CONST_PERSISTENT); + REGISTER_LONG_CONSTANT("NACL_CRYPTO_BOX_curve25519xsalsa20poly1305_BOXZEROBYTES", crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES, CONST_CS | CONST_PERSISTENT); +} + +PHP_FUNCTION(nacl_crypto_box_curve25519xsalsa20poly1305) { //(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *,const unsigned char *) + char *m, *n, *pk, *sk; + int lm, ln, lpk, lsk; + if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ssss", &m, &lm, &pk, &lpk, &sk, &lsk, &n, &ln) == FAILURE) RETURN_NULL(); + if (ln != crypto_box_curve25519xsalsa20poly1305_NONCEBYTES) RETURN_FALSE; + if (lpk != crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES) RETURN_FALSE; + if (lsk != crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES) RETURN_FALSE; + int mlen = lm + crypto_box_curve25519xsalsa20poly1305_ZEROBYTES; + char* mb = ecalloc(mlen, 1); + char* cb = ecalloc(mlen, 1); + memcpy(mb + crypto_box_curve25519xsalsa20poly1305_ZEROBYTES, m, lm); + int ret = crypto_box_curve25519xsalsa20poly1305(cb, mb, mlen, n, pk, sk); + int clen = mlen - crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES; + char* c = emalloc(clen); + memcpy(c, cb + crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES, clen); + efree(mb); + efree(cb); + if (ret == 0) RETURN_STRINGL(c, clen, 0); + efree(c); + RETURN_FALSE; +} +PHP_FUNCTION(nacl_crypto_box_curve25519xsalsa20poly1305_open) { //(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *,const unsigned char *) + char *c, *n, *pk, *sk; + int lc, ln, lpk, lsk; + if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ssss", &c, &lc, &pk, &lpk, &sk, &lsk, &n, &ln) == FAILURE) RETURN_NULL(); + if (ln != crypto_box_curve25519xsalsa20poly1305_NONCEBYTES) RETURN_FALSE; + if (lpk != crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES) RETURN_FALSE; + if (lsk != crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES) RETURN_FALSE; + int clen = lc + crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES; + char* mb = ecalloc(clen, 1); + char* cb = ecalloc(clen, 1); + memcpy(cb + crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES, c, lc); + int ret = crypto_box_curve25519xsalsa20poly1305_open(mb, cb, clen, n, pk, sk); + int mlen = clen - crypto_box_curve25519xsalsa20poly1305_ZEROBYTES; + char* m = emalloc(mlen); + memcpy(m, mb + crypto_box_curve25519xsalsa20poly1305_ZEROBYTES, mlen); + efree(mb); + efree(cb); + if (ret == 0) RETURN_STRINGL(m, mlen, 0); + efree(m); + RETURN_FALSE; +} +PHP_FUNCTION(nacl_crypto_box_curve25519xsalsa20poly1305_beforenm) { //(unsigned char *,const unsigned char *,const unsigned char *) + char *pk, *sk; + int lpk, lsk; + if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "ss", &pk, &lpk, &sk, &lsk) == FAILURE) RETURN_NULL(); + if (lpk != crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES) RETURN_FALSE; + if (lsk != crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES) RETURN_FALSE; + char* k = emalloc(crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES); + crypto_box_curve25519xsalsa20poly1305_beforenm(k, pk, sk); + RETURN_STRINGL(k, crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES, 0); +} +PHP_FUNCTION(nacl_crypto_box_curve25519xsalsa20poly1305_afternm) { //(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *) + char *m, *n, *k; + int lm, ln, lk; + if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", &m, &lm, &k, &lk, &n, &ln) == FAILURE) RETURN_NULL(); + if (ln != crypto_box_curve25519xsalsa20poly1305_NONCEBYTES) RETURN_FALSE; + if (lk != crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES) RETURN_FALSE; + int mlen = lm + crypto_box_curve25519xsalsa20poly1305_ZEROBYTES; + char* mb = ecalloc(mlen, 1); + char* cb = ecalloc(mlen, 1); + memcpy(mb + crypto_box_curve25519xsalsa20poly1305_ZEROBYTES, m, lm); + int ret = crypto_box_curve25519xsalsa20poly1305_afternm(cb, mb, mlen, n, k); + int clen = mlen - crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES; + char* c = emalloc(clen); + memcpy(c, cb + crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES, clen); + efree(mb); + efree(cb); + if (ret == 0) RETURN_STRINGL(c, clen, 0); + efree(c); + RETURN_FALSE; +} +PHP_FUNCTION(nacl_crypto_box_curve25519xsalsa20poly1305_open_afternm) { //(unsigned char *,const unsigned char *,unsigned long long,const unsigned char *,const unsigned char *) + char *c, *n, *k; + int lc, ln, lk; + if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "sss", &c, &lc, &k, &lk, &n, &ln) == FAILURE) RETURN_NULL(); + if (ln != crypto_box_curve25519xsalsa20poly1305_NONCEBYTES) RETURN_FALSE; + if (lk != crypto_box_curve25519xsalsa20poly1305_BEFORENMBYTES) RETURN_FALSE; + int clen = lc + crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES; + char* mb = ecalloc(clen, 1); + char* cb = ecalloc(clen, 1); + memcpy(cb + crypto_box_curve25519xsalsa20poly1305_BOXZEROBYTES, c, lc); + int ret = crypto_box_curve25519xsalsa20poly1305_open_afternm(mb, cb, clen, n, k); + int mlen = clen - crypto_box_curve25519xsalsa20poly1305_ZEROBYTES; + char* m = emalloc(mlen); + memcpy(m, mb + crypto_box_curve25519xsalsa20poly1305_ZEROBYTES, mlen); + efree(mb); + efree(cb); + if (ret == 0) RETURN_STRINGL(m, mlen, 0); + efree(m); + RETURN_FALSE; +} +PHP_FUNCTION(nacl_crypto_box_curve25519xsalsa20poly1305_getpublickey) { + char base[32] = {9}; + char *sk; + int lsk; + if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "s", &sk, &lsk) == FAILURE) RETURN_NULL(); + if (lsk != crypto_box_curve25519xsalsa20poly1305_SECRETKEYBYTES) RETURN_FALSE; + char* pk = emalloc(crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES); + crypto_scalarmult_curve25519(pk, sk, base); + RETURN_STRINGL(pk, crypto_box_curve25519xsalsa20poly1305_PUBLICKEYBYTES, 0); +}