}
if (key_len != crypto_shorthash_KEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "key size should be CRYPTO_SHORTHASH_KEYBYTES bytes",
+ "key size should be SODIUM_CRYPTO_SHORTHASH_KEYBYTES bytes",
0);
return;
}
}
if (nonce_len != crypto_secretbox_NONCEBYTES) {
zend_throw_exception(sodium_exception_ce,
- "nonce size should be CRYPTO_SECRETBOX_NONCEBYTES bytes",
+ "nonce size should be SODIUM_CRYPTO_SECRETBOX_NONCEBYTES bytes",
0);
return;
}
if (key_len != crypto_secretbox_KEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "key size should be CRYPTO_SECRETBOX_KEYBYTES bytes",
+ "key size should be SODIUM_CRYPTO_SECRETBOX_KEYBYTES bytes",
0);
return;
}
}
if (nonce_len != crypto_secretbox_NONCEBYTES) {
zend_throw_exception(sodium_exception_ce,
- "nonce size should be CRYPTO_SECRETBOX_NONCEBYTES bytes",
+ "nonce size should be SODIUM_CRYPTO_SECRETBOX_NONCEBYTES bytes",
0);
return;
}
if (key_len != crypto_secretbox_KEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "key size should be CRYPTO_SECRETBOX_KEYBYTES bytes",
+ "key size should be SODIUM_CRYPTO_SECRETBOX_KEYBYTES bytes",
0);
return;
}
}
if (seed_len != crypto_box_SEEDBYTES) {
zend_throw_exception(sodium_exception_ce,
- "seed should be CRYPTO_BOX_SEEDBYTES bytes",
+ "seed should be SODIUM_CRYPTO_BOX_SEEDBYTES bytes",
0);
return;
}
}
if (secretkey_len != crypto_box_SECRETKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "secretkey should be CRYPTO_BOX_SECRETKEYBYTES bytes",
+ "secretkey should be SODIUM_CRYPTO_BOX_SECRETKEYBYTES bytes",
0);
return;
}
if (publickey_len != crypto_box_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "publickey should be CRYPTO_BOX_PUBLICKEYBYTES bytes",
+ "publickey should be SODIUM_CRYPTO_BOX_PUBLICKEYBYTES bytes",
0);
return;
}
if (keypair_len !=
crypto_box_SECRETKEYBYTES + crypto_box_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair should be CRYPTO_BOX_KEYPAIRBYTES bytes",
+ "keypair should be SODIUM_CRYPTO_BOX_KEYPAIRBYTES bytes",
0);
return;
}
if (keypair_len !=
crypto_box_SECRETKEYBYTES + crypto_box_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair should be CRYPTO_BOX_KEYPAIRBYTES bytes",
+ "keypair should be SODIUM_CRYPTO_BOX_KEYPAIRBYTES bytes",
0);
return;
}
}
if (secretkey_len != crypto_box_SECRETKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "key should be CRYPTO_BOX_SECRETKEYBYTES bytes",
+ "key should be SODIUM_CRYPTO_BOX_SECRETKEYBYTES bytes",
0);
return;
}
}
if (nonce_len != crypto_box_NONCEBYTES) {
zend_throw_exception(sodium_exception_ce,
- "nonce size should be CRYPTO_BOX_NONCEBYTES bytes",
+ "nonce size should be SODIUM_CRYPTO_BOX_NONCEBYTES bytes",
0);
return;
}
if (keypair_len != crypto_box_SECRETKEYBYTES + crypto_box_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair size should be CRYPTO_BOX_KEYPAIRBYTES bytes",
+ "keypair size should be SODIUM_CRYPTO_BOX_KEYPAIRBYTES bytes",
0);
return;
}
}
if (nonce_len != crypto_box_NONCEBYTES) {
zend_throw_exception(sodium_exception_ce,
- "nonce size should be CRYPTO_BOX_NONCEBYTES bytes",
+ "nonce size should be SODIUM_CRYPTO_BOX_NONCEBYTES bytes",
0);
return;
}
if (keypair_len != crypto_box_SECRETKEYBYTES + crypto_box_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair size should be CRYPTO_BOX_KEYBYTES bytes",
+ "keypair size should be SODIUM_CRYPTO_BOX_KEYBYTES bytes",
0);
return;
}
}
if (publickey_len != crypto_box_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "public key size should be CRYPTO_BOX_PUBLICKEYBYTES bytes",
+ "public key size should be SODIUM_CRYPTO_BOX_PUBLICKEYBYTES bytes",
0);
return;
}
}
if (keypair_len != crypto_box_SECRETKEYBYTES + crypto_box_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair size should be CRYPTO_BOX_KEYBYTES bytes",
+ "keypair size should be SODIUM_CRYPTO_BOX_KEYBYTES bytes",
0);
return;
}
}
if (seed_len != crypto_sign_SEEDBYTES) {
zend_throw_exception(sodium_exception_ce,
- "seed should be CRYPTO_SIGN_SEEDBYTES bytes",
+ "seed should be SODIUM_CRYPTO_SIGN_SEEDBYTES bytes",
0);
return;
}
}
if (secretkey_len != crypto_sign_SECRETKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "secretkey should be CRYPTO_SIGN_SECRETKEYBYTES bytes",
+ "secretkey should be SODIUM_CRYPTO_SIGN_SECRETKEYBYTES bytes",
0);
return;
}
if (publickey_len != crypto_sign_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "publickey should be CRYPTO_SIGN_PUBLICKEYBYTES bytes",
+ "publickey should be SODIUM_CRYPTO_SIGN_PUBLICKEYBYTES bytes",
0);
return;
}
}
if (secretkey_len != crypto_sign_SECRETKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "secretkey should be CRYPTO_SIGN_SECRETKEYBYTES bytes",
+ "secretkey should be SODIUM_CRYPTO_SIGN_SECRETKEYBYTES bytes",
0);
return;
}
if (keypair_len !=
crypto_sign_SECRETKEYBYTES + crypto_sign_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair should be CRYPTO_SIGN_KEYPAIRBYTES bytes",
+ "keypair should be SODIUM_CRYPTO_SIGN_KEYPAIRBYTES bytes",
0);
return;
}
if (keypair_len !=
crypto_sign_SECRETKEYBYTES + crypto_sign_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair should be CRYPTO_SIGN_KEYPAIRBYTES bytes",
+ "keypair should be SODIUM_CRYPTO_SIGN_KEYPAIRBYTES bytes",
0);
return;
}
}
if (secretkey_len != crypto_sign_SECRETKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "secret key size should be CRYPTO_SIGN_SECRETKEYBYTES bytes",
+ "secret key size should be SODIUM_CRYPTO_SIGN_SECRETKEYBYTES bytes",
0);
return;
}
}
if (publickey_len != crypto_sign_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "public key size should be CRYPTO_SIGN_PUBLICKEYBYTES bytes",
+ "public key size should be SODIUM_CRYPTO_SIGN_PUBLICKEYBYTES bytes",
0);
return;
}
}
if (secretkey_len != crypto_sign_SECRETKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "secret key size should be CRYPTO_SIGN_SECRETKEYBYTES bytes",
+ "secret key size should be SODIUM_CRYPTO_SIGN_SECRETKEYBYTES bytes",
0);
return;
}
}
if (signature_len != crypto_sign_BYTES) {
zend_throw_exception(sodium_exception_ce,
- "signature size should be CRYPTO_SIGN_BYTES bytes",
+ "signature size should be SODIUM_CRYPTO_SIGN_BYTES bytes",
0);
return;
}
if (publickey_len != crypto_sign_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "public key size should be CRYPTO_SIGN_PUBLICKEYBYTES bytes",
+ "public key size should be SODIUM_CRYPTO_SIGN_PUBLICKEYBYTES bytes",
0);
return;
}
return;
}
if (nonce_len != crypto_stream_NONCEBYTES) {
- zend_throw_exception(sodium_exception_ce, "nonce should be CRYPTO_STREAM_NONCEBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "nonce should be SODIUM_CRYPTO_STREAM_NONCEBYTES bytes", 0);
return;
}
if (key_len != crypto_stream_KEYBYTES) {
- zend_throw_exception(sodium_exception_ce, "key should be CRYPTO_STREAM_KEYBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "key should be SODIUM_CRYPTO_STREAM_KEYBYTES bytes", 0);
return;
}
ciphertext = zend_string_alloc((size_t) ciphertext_len, 0);
return;
}
if (nonce_len != crypto_stream_NONCEBYTES) {
- zend_throw_exception(sodium_exception_ce, "nonce should be CRYPTO_STREAM_NONCEBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "nonce should be SODIUM_CRYPTO_STREAM_NONCEBYTES bytes", 0);
return;
}
if (key_len != crypto_stream_KEYBYTES) {
- zend_throw_exception(sodium_exception_ce, "key should be CRYPTO_STREAM_KEYBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "key should be SODIUM_CRYPTO_STREAM_KEYBYTES bytes", 0);
return;
}
ciphertext_len = msg_len;
}
if (salt_len != crypto_pwhash_scryptsalsa208sha256_SALTBYTES) {
zend_throw_exception(sodium_exception_ce,
- "salt should be CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES bytes",
+ "salt should be SODIUM_CRYPTO_PWHASH_SCRYPTSALSA208SHA256_SALTBYTES bytes",
0);
return;
}
zend_error(E_WARNING, "empty password");
}
if (salt_len != crypto_pwhash_SALTBYTES) {
- zend_throw_exception(sodium_exception_ce, "salt should be CRYPTO_PWHASH_SALTBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "salt should be SODIUM_CRYPTO_PWHASH_SALTBYTES bytes", 0);
return;
}
if (opslimit < crypto_pwhash_OPSLIMIT_INTERACTIVE) {
return;
}
if (seed_len != crypto_kx_SEEDBYTES) {
- zend_throw_exception(sodium_exception_ce, "seed must be CRYPTO_KX_SEEDBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "seed must be SODIUM_CRYPTO_KX_SEEDBYTES bytes", 0);
return;
}
(void) sizeof(int[crypto_scalarmult_SCALARBYTES == crypto_kx_PUBLICKEYBYTES ? 1 : -1]);
if (keypair_len !=
crypto_kx_SECRETKEYBYTES + crypto_kx_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair should be CRYPTO_KX_KEYPAIRBYTES bytes",
+ "keypair should be SODIUM_CRYPTO_KX_KEYPAIRBYTES bytes",
0);
return;
}
if (keypair_len !=
crypto_kx_SECRETKEYBYTES + crypto_kx_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "keypair should be CRYPTO_KX_KEYPAIRBYTES bytes",
+ "keypair should be SODIUM_CRYPTO_KX_KEYPAIRBYTES bytes",
0);
return;
}
return;
}
if (keypair_len != crypto_kx_SECRETKEYBYTES + crypto_kx_PUBLICKEYBYTES) {
- zend_throw_exception(sodium_exception_ce, "keypair must be CRYPTO_KX_KEYPAIRBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "keypair must be SODIUM_CRYPTO_KX_KEYPAIRBYTES bytes", 0);
return;
}
if (server_pk_len != crypto_kx_PUBLICKEYBYTES) {
- zend_throw_exception(sodium_exception_ce, "public keys must be CRYPTO_KX_PUBLICKEYBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "public keys must be SODIUM_CRYPTO_KX_PUBLICKEYBYTES bytes", 0);
return;
}
client_sk = &keypair[0];
return;
}
if (keypair_len != crypto_kx_SECRETKEYBYTES + crypto_kx_PUBLICKEYBYTES) {
- zend_throw_exception(sodium_exception_ce, "keypair must be CRYPTO_KX_KEYPAIRBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "keypair must be SODIUM_CRYPTO_KX_KEYPAIRBYTES bytes", 0);
return;
}
if (client_pk_len != crypto_kx_PUBLICKEYBYTES) {
- zend_throw_exception(sodium_exception_ce, "public keys must be CRYPTO_KX_PUBLICKEYBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "public keys must be SODIUM_CRYPTO_KX_PUBLICKEYBYTES bytes", 0);
return;
}
server_sk = &keypair[0];
return;
}
if (key_len != crypto_auth_KEYBYTES) {
- zend_throw_exception(sodium_exception_ce, "key must be CRYPTO_AUTH_KEYBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "key must be SODIUM_CRYPTO_AUTH_KEYBYTES bytes", 0);
return;
}
mac = zend_string_alloc(crypto_auth_BYTES, 0);
return;
}
if (key_len != crypto_auth_KEYBYTES) {
- zend_throw_exception(sodium_exception_ce, "key must be CRYPTO_AUTH_KEYBYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "key must be SODIUM_CRYPTO_AUTH_KEYBYTES bytes", 0);
return;
}
if (mac_len != crypto_auth_BYTES) {
- zend_throw_exception(sodium_exception_ce, "authentication tag must be CRYPTO_AUTH_BYTES bytes", 0);
+ zend_throw_exception(sodium_exception_ce, "authentication tag must be SODIUM_CRYPTO_AUTH_BYTES bytes", 0);
return;
}
if (crypto_auth_verify((const unsigned char *) mac,
}
if (eddsakey_len != crypto_sign_SECRETKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "Ed25519 key should be CRYPTO_SIGN_SECRETKEYBYTES bytes",
+ "Ed25519 key should be SODIUM_CRYPTO_SIGN_SECRETKEYBYTES bytes",
0);
return;
}
}
if (eddsakey_len != crypto_sign_PUBLICKEYBYTES) {
zend_throw_exception(sodium_exception_ce,
- "Ed25519 key should be CRYPTO_SIGN_PUBLICKEYBYTES bytes",
+ "Ed25519 key should be SODIUM_CRYPTO_SIGN_PUBLICKEYBYTES bytes",
0);
return;
}