[ Index ] |
PHP Cross Reference of WordPress Trunk (Updated Daily) |
[Source view] [Print] [Project Stats]
(no description)
File Size: | 518 lines (16 kb) |
Included or required: | 0 times |
Referenced: | 0 times |
Includes or requires: | 0 files |
ParagonIE_Sodium_Core_AES:: (12 methods):
sbox()
invSbox()
processInversion()
subWord()
keySchedule()
addRoundKey()
decryptBlockECB()
encryptBlockECB()
bitsliceEncryptBlock()
aesRound()
doubleRound()
bitsliceDecryptBlock()
Class: ParagonIE_Sodium_Core_AES - X-Ref
Bitsliced implementation of the AES block cipher.sbox(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
Mutates the values of $q! return: void param: ParagonIE_Sodium_Core_AES_Block $q |
invSbox(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
Mutates the values of $q! return: void param: ParagonIE_Sodium_Core_AES_Block $q |
processInversion(ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
This is some boilerplate code needed to invert an S-box. Rather than repeat the code twice, I moved it to a protected method. Mutates $q return: void param: ParagonIE_Sodium_Core_AES_Block $q |
subWord($x) X-Ref |
return: int param: int $x |
keySchedule($key) X-Ref |
Calculate the key schedule from a given random key return: ParagonIE_Sodium_Core_AES_KeySchedule param: string $key |
addRoundKey(ParagonIE_Sodium_Core_AES_Block $q,ParagonIE_Sodium_Core_AES_KeySchedule $skey,$offset = 0) X-Ref |
Mutates $q return: void param: ParagonIE_Sodium_Core_AES_KeySchedule $skey param: ParagonIE_Sodium_Core_AES_Block $q param: int $offset |
decryptBlockECB($message, $key) X-Ref |
This mainly exists for testing, as we need the round key features for AEGIS. return: string param: string $message param: string $key |
encryptBlockECB($message, $key) X-Ref |
This mainly exists for testing, as we need the round key features for AEGIS. return: string param: string $message param: string $key |
bitsliceEncryptBlock(ParagonIE_Sodium_Core_AES_Expanded $skey,ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
Mutates $q return: void param: ParagonIE_Sodium_Core_AES_Expanded $skey param: ParagonIE_Sodium_Core_AES_Block $q |
aesRound($x, $y) X-Ref |
return: string param: string $x param: string $y |
doubleRound($b0, $rk0, $b1, $rk1) X-Ref |
Process two AES blocks in one shot. return: string[] param: string $b0 First AES block param: string $rk0 First round key param: string $b1 Second AES block param: string $rk1 Second round key |
bitsliceDecryptBlock(ParagonIE_Sodium_Core_AES_Expanded $skey,ParagonIE_Sodium_Core_AES_Block $q) X-Ref |
return: void param: ParagonIE_Sodium_Core_AES_Expanded $skey param: ParagonIE_Sodium_Core_AES_Block $q |
Generated : Sat Nov 23 08:20:01 2024 | Cross-referenced by PHPXref |