[ Index ] |
PHP Cross Reference of WordPress Trunk (Updated Daily) |
[Source view] [Print] [Project Stats]
(no description)
File Size: | 518 lines (16 kb) |
Included or required: | 0 times |
Referenced: | 0 times |
Includes or requires: | 0 files |
ParagonIE_Sodium_Core_AES:: (12 methods):
sbox()
invSbox()
processInversion()
subWord()
keySchedule()
addRoundKey()
decryptBlockECB()
encryptBlockECB()
bitsliceEncryptBlock()
aesRound()
doubleRound()
bitsliceDecryptBlock()
Class: ParagonIE_Sodium_Core_AES - X-Ref
Bitsliced implementation of the AES block cipher.sbox(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
Mutates the values of $q! param: ParagonIE_Sodium_Core_AES_Block $q return: void |
invSbox(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
Mutates the values of $q! param: ParagonIE_Sodium_Core_AES_Block $q return: void |
processInversion(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
This is some boilerplate code needed to invert an S-box. Rather than repeat the code twice, I moved it to a protected method. Mutates $q param: ParagonIE_Sodium_Core_AES_Block $q return: void |
subWord($x) X-Ref |
param: int $x return: int |
keySchedule($key) X-Ref |
Calculate the key schedule from a given random key param: string $key return: ParagonIE_Sodium_Core_AES_KeySchedule |
addRoundKey(ParagonIE_Sodium_Core_AES_Block $q,ParagonIE_Sodium_Core_AES_KeySchedule $skey,$offset = 0) X-Ref |
Mutates $q param: ParagonIE_Sodium_Core_AES_KeySchedule $skey param: ParagonIE_Sodium_Core_AES_Block $q param: int $offset return: void |
decryptBlockECB($message, $key) X-Ref |
This mainly exists for testing, as we need the round key features for AEGIS. param: string $message param: string $key return: string |
encryptBlockECB($message, $key) X-Ref |
This mainly exists for testing, as we need the round key features for AEGIS. param: string $message param: string $key return: string |
bitsliceEncryptBlock(ParagonIE_Sodium_Core_AES_Expanded $skey,ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
Mutates $q param: ParagonIE_Sodium_Core_AES_Expanded $skey param: ParagonIE_Sodium_Core_AES_Block $q return: void |
aesRound($x, $y) X-Ref |
param: string $x param: string $y return: string |
doubleRound($b0, $rk0, $b1, $rk1) X-Ref |
Process two AES blocks in one shot. param: string $b0 First AES block param: string $rk0 First round key param: string $b1 Second AES block param: string $rk1 Second round key return: string[] |
bitsliceDecryptBlock(ParagonIE_Sodium_Core_AES_Expanded $skey,ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
param: ParagonIE_Sodium_Core_AES_Expanded $skey param: ParagonIE_Sodium_Core_AES_Block $q return: void |
Generated : Wed Dec 25 08:20:01 2024 | Cross-referenced by PHPXref |