| [ Index ] |
PHP Cross Reference of WordPress Trunk (Updated Daily) |
[Source view] [Print] [Project Stats]
(no description)
| File Size: | 518 lines (16 kb) |
| Included or required: | 0 times |
| Referenced: | 0 times |
| Includes or requires: | 0 files |
ParagonIE_Sodium_Core_AES:: (12 methods):
sbox()
invSbox()
processInversion()
subWord()
keySchedule()
addRoundKey()
decryptBlockECB()
encryptBlockECB()
bitsliceEncryptBlock()
aesRound()
doubleRound()
bitsliceDecryptBlock()
Class: ParagonIE_Sodium_Core_AES - X-Ref
Bitsliced implementation of the AES block cipher.| sbox(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
| Mutates the values of $q! param: ParagonIE_Sodium_Core_AES_Block $q return: void |
| invSbox(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
| Mutates the values of $q! param: ParagonIE_Sodium_Core_AES_Block $q return: void |
| processInversion(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
| This is some boilerplate code needed to invert an S-box. Rather than repeat the code twice, I moved it to a protected method. Mutates $q param: ParagonIE_Sodium_Core_AES_Block $q return: void |
| subWord($x) X-Ref |
param: int $x return: int |
| keySchedule($key) X-Ref |
| Calculate the key schedule from a given random key param: string $key return: ParagonIE_Sodium_Core_AES_KeySchedule |
| addRoundKey(ParagonIE_Sodium_Core_AES_Block $q,ParagonIE_Sodium_Core_AES_KeySchedule $skey,$offset = 0) X-Ref |
| Mutates $q param: ParagonIE_Sodium_Core_AES_KeySchedule $skey param: ParagonIE_Sodium_Core_AES_Block $q param: int $offset return: void |
| decryptBlockECB($message, $key) X-Ref |
| This mainly exists for testing, as we need the round key features for AEGIS. param: string $message param: string $key return: string |
| encryptBlockECB($message, $key) X-Ref |
| This mainly exists for testing, as we need the round key features for AEGIS. param: string $message param: string $key return: string |
| bitsliceEncryptBlock(ParagonIE_Sodium_Core_AES_Expanded $skey,ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
| Mutates $q param: ParagonIE_Sodium_Core_AES_Expanded $skey param: ParagonIE_Sodium_Core_AES_Block $q return: void |
| aesRound($x, $y) X-Ref |
param: string $x param: string $y return: string |
| doubleRound($b0, $rk0, $b1, $rk1) X-Ref |
| Process two AES blocks in one shot. param: string $b0 First AES block param: string $rk0 First round key param: string $b1 Second AES block param: string $rk1 Second round key return: string[] |
| bitsliceDecryptBlock(ParagonIE_Sodium_Core_AES_Expanded $skey,ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
param: ParagonIE_Sodium_Core_AES_Expanded $skey param: ParagonIE_Sodium_Core_AES_Block $q return: void |
| Generated : Sun Apr 19 08:20:11 2026 | Cross-referenced by PHPXref |