[ Index ] |
PHP Cross Reference of WordPress |
[Source view] [Print] [Project Stats]
Class ParagonIE_Sodium_Crypto ATTENTION!
File Size: | 1655 lines (55 kb) |
Included or required: | 0 times |
Referenced: | 0 times |
Includes or requires: | 0 files |
aead_chacha20poly1305_decrypt($message = '',$ad = '',$nonce = '',$key = '') X-Ref |
AEAD Decryption with ChaCha20-Poly1305 param: string $message param: string $ad param: string $nonce param: string $key return: string |
aead_chacha20poly1305_encrypt($message = '',$ad = '',$nonce = '',$key = '') X-Ref |
AEAD Encryption with ChaCha20-Poly1305 param: string $message param: string $ad param: string $nonce param: string $key return: string |
aead_chacha20poly1305_ietf_decrypt($message = '',$ad = '',$nonce = '',$key = '') X-Ref |
AEAD Decryption with ChaCha20-Poly1305, IETF mode (96-bit nonce) param: string $message param: string $ad param: string $nonce param: string $key return: string |
aead_chacha20poly1305_ietf_encrypt($message = '',$ad = '',$nonce = '',$key = '') X-Ref |
AEAD Encryption with ChaCha20-Poly1305, IETF mode (96-bit nonce) param: string $message param: string $ad param: string $nonce param: string $key return: string |
aead_xchacha20poly1305_ietf_decrypt($message = '',$ad = '',$nonce = '',$key = '') X-Ref |
AEAD Decryption with ChaCha20-Poly1305, IETF mode (96-bit nonce) param: string $message param: string $ad param: string $nonce param: string $key return: string |
aead_xchacha20poly1305_ietf_encrypt($message = '',$ad = '',$nonce = '',$key = '') X-Ref |
AEAD Encryption with ChaCha20-Poly1305, IETF mode (96-bit nonce) param: string $message param: string $ad param: string $nonce param: string $key return: string |
auth($message, $key) X-Ref |
HMAC-SHA-512-256 (a.k.a. the leftmost 256 bits of HMAC-SHA-512) param: string $message param: string $key return: string |
auth_verify($mac, $message, $key) X-Ref |
HMAC-SHA-512-256 validation. Constant-time via hash_equals(). param: string $mac param: string $message param: string $key return: bool |
box($plaintext, $nonce, $keypair) X-Ref |
X25519 key exchange followed by XSalsa20Poly1305 symmetric encryption param: string $plaintext param: string $nonce param: string $keypair return: string |
box_seal($message, $publicKey) X-Ref |
X25519-XSalsa20-Poly1305 with one ephemeral X25519 keypair. param: string $message param: string $publicKey return: string |
box_seal_open($message, $keypair) X-Ref |
Opens a message encrypted via box_seal(). param: string $message param: string $keypair return: string |
box_beforenm($sk, $pk) X-Ref |
Used by crypto_box() to get the crypto_secretbox() key. param: string $sk param: string $pk return: string |
box_keypair() X-Ref |
return: string |
box_seed_keypair($seed) X-Ref |
param: string $seed return: string |
box_keypair_from_secretkey_and_publickey($sKey, $pKey) X-Ref |
param: string $sKey param: string $pKey return: string |
box_secretkey($keypair) X-Ref |
param: string $keypair return: string |
box_publickey($keypair) X-Ref |
param: string $keypair return: string |
box_publickey_from_secretkey($sKey) X-Ref |
param: string $sKey return: string |
box_open($ciphertext, $nonce, $keypair) X-Ref |
Decrypt a message encrypted with box(). param: string $ciphertext param: string $nonce param: string $keypair return: string |
generichash($message, $key = '', $outlen = 32) X-Ref |
Calculate a BLAKE2b hash. param: string $message param: string|null $key param: int $outlen return: string |
generichash_final($ctx, $outlen = 32) X-Ref |
Finalize a BLAKE2b hashing context, returning the hash. param: string $ctx param: int $outlen return: string |
generichash_init($key = '', $outputLength = 32) X-Ref |
Initialize a hashing context for BLAKE2b. param: string $key param: int $outputLength return: string |
generichash_init_salt_personal($key = '',$outputLength = 32,$salt = '',$personal = '') X-Ref |
Initialize a hashing context for BLAKE2b. param: string $key param: int $outputLength param: string $salt param: string $personal return: string |
generichash_update($ctx, $message) X-Ref |
Update a hashing context for BLAKE2b with $message param: string $ctx param: string $message return: string |
keyExchange($my_sk, $their_pk, $client_pk, $server_pk) X-Ref |
Libsodium's crypto_kx(). param: string $my_sk param: string $their_pk param: string $client_pk param: string $server_pk return: string |
scalarmult($sKey, $pKey) X-Ref |
ECDH over Curve25519 param: string $sKey param: string $pKey return: string |
scalarmult_base($secret) X-Ref |
ECDH over Curve25519, using the basepoint. Used to get a secret key from a public key. param: string $secret return: string |
scalarmult_throw_if_zero($q) X-Ref |
This throws an Error if a zero public key was passed to the function. param: string $q return: void |
secretbox($plaintext, $nonce, $key) X-Ref |
XSalsa20-Poly1305 authenticated symmetric-key encryption. param: string $plaintext param: string $nonce param: string $key return: string |
secretbox_open($ciphertext, $nonce, $key) X-Ref |
Decrypt a ciphertext generated via secretbox(). param: string $ciphertext param: string $nonce param: string $key return: string |
secretbox_xchacha20poly1305($plaintext, $nonce, $key) X-Ref |
XChaCha20-Poly1305 authenticated symmetric-key encryption. param: string $plaintext param: string $nonce param: string $key return: string |
secretbox_xchacha20poly1305_open($ciphertext, $nonce, $key) X-Ref |
Decrypt a ciphertext generated via secretbox_xchacha20poly1305(). param: string $ciphertext param: string $nonce param: string $key return: string |
secretstream_xchacha20poly1305_init_push($key) X-Ref |
param: string $key return: array<int, string> Returns a state and a header. |
secretstream_xchacha20poly1305_init_pull($key, $header) X-Ref |
param: string $key param: string $header return: string Returns a state. |
secretstream_xchacha20poly1305_push(&$state, $msg, $aad = '', $tag = 0) X-Ref |
param: string $state param: string $msg param: string $aad param: int $tag return: string |
secretstream_xchacha20poly1305_pull(&$state, $cipher, $aad = '') X-Ref |
param: string $state param: string $cipher param: string $aad return: bool|array{0: string, 1: int} |
secretstream_xchacha20poly1305_rekey(&$state) X-Ref |
param: string $state return: void |
sign_detached($message, $sk) X-Ref |
Detached Ed25519 signature. param: string $message param: string $sk return: string |
sign($message, $sk) X-Ref |
Attached Ed25519 signature. (Returns a signed message.) param: string $message param: string $sk return: string |
sign_open($signedMessage, $pk) X-Ref |
Opens a signed message. If valid, returns the message. param: string $signedMessage param: string $pk return: string |
sign_verify_detached($signature, $message, $pk) X-Ref |
Verify a detached signature of a given message and public key. param: string $signature param: string $message param: string $pk return: bool |
Generated: Sun Dec 22 01:00:02 2024 | Cross-referenced by PHPXref 0.7.1 |