wp-includes/sodium_compat/src/Compat.php


Lines:

1 to 100 of 148
<?php


if (class_exists('ParagonIE_Sodium_Compat', false)) {
    return;
}

/* class ParagonIE_Sodium_Compat */
/* function ParagonIE_Sodium_Compat::add() – Add two numbers (little-endian unsigned), storing the value in the first
parameter. */
/* function ParagonIE_Sodium_Compat::base642bin() – */
/* function ParagonIE_Sodium_Compat::bin2base64() – */
/* function ParagonIE_Sodium_Compat::bin2hex() – Cache-timing-safe implementation of bin2hex(). */
/* function ParagonIE_Sodium_Compat::compare() – Compare two strings, in constant-time. */
/* function ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_is_available() – Is AES-256-GCM even available to use? */
/* function ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_decrypt() – Authenticated Encryption with Associated Data: Decryption */
/* function ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_encrypt() – Authenticated Encryption with Associated Data: Encryption */
/* function ParagonIE_Sodium_Compat::crypto_aead_aes256gcm_keygen() – Return a secure random key for use with the AES-256-GCM
symmetric AEAD interface. */
/* function ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_decrypt() – Authenticated Encryption with Associated Data: Decryption */
/* function ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_encrypt() – Authenticated Encryption with Associated Data */
/* function ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_decrypt() – Authenticated Encryption with Associated Data: Decryption */
/* function ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_keygen() – Return a secure random key for use with the ChaCha20-Poly1305
symmetric AEAD interface. */
/* function ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_encrypt() – Authenticated Encryption with Associated Data */
/* function ParagonIE_Sodium_Compat::crypto_aead_chacha20poly1305_ietf_keygen() – Return a secure random key for use with the ChaCha20-Poly1305
symmetric AEAD interface. (IETF version) */
/* function ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_decrypt() – Authenticated Encryption with Associated Data: Decryption */
/* function ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_encrypt() – Authenticated Encryption with Associated Data */
/* function ParagonIE_Sodium_Compat::crypto_aead_xchacha20poly1305_ietf_keygen() – Return a secure random key for use with the XChaCha20-Poly1305
symmetric AEAD interface. */
/* function ParagonIE_Sodium_Compat::crypto_auth() – Authenticate a message. Uses symmetric-key cryptography. */
/* function ParagonIE_Sodium_Compat::crypto_auth_keygen() – */
/* function ParagonIE_Sodium_Compat::crypto_auth_verify() – Verify the MAC of a message previously authenticated with crypto_auth. */
/* function ParagonIE_Sodium_Compat::crypto_box() – Authenticated asymmetric-key encryption. Both the sender and recipient
may decrypt messages. */
/* function ParagonIE_Sodium_Compat::crypto_box_seal() – Anonymous public-key encryption. Only the recipient may decrypt messages. */
/* function ParagonIE_Sodium_Compat::crypto_box_seal_open() – Opens a message encrypted with crypto_box_seal(). Requires
the recipient’s keypair (sk || pk) to decrypt successfully. */
/* function ParagonIE_Sodium_Compat::crypto_box_keypair() – Generate a new random X25519 keypair. */
/* function ParagonIE_Sodium_Compat::crypto_box_keypair_from_secretkey_and_publickey() – Combine two keys into a keypair for use in library methods that expect
a keypair. This doesn’t necessarily have to be the same person’s keys. */
/* function ParagonIE_Sodium_Compat::crypto_box_open() – Decrypt a message previously encrypted with crypto_box(). */
/* function ParagonIE_Sodium_Compat::crypto_box_publickey() – Extract the public key from a crypto_box keypair. */
/* function ParagonIE_Sodium_Compat::crypto_box_publickey_from_secretkey() – Calculate the X25519 public key from a given X25519 secret key. */
/* function ParagonIE_Sodium_Compat::crypto_box_secretkey() – Extract the secret key from a crypto_box keypair. */
/* function ParagonIE_Sodium_Compat::crypto_box_seed_keypair() – Generate an X25519 keypair from a seed. */
/* function ParagonIE_Sodium_Compat::crypto_generichash() – Calculates a BLAKE2b hash, with an optional key. */
/* function ParagonIE_Sodium_Compat::crypto_generichash_final() – Get the final BLAKE2b hash output for a given context. */
/* function ParagonIE_Sodium_Compat::crypto_generichash_init() – Initialize a BLAKE2b hashing context, for use in a streaming interface. */
/* function ParagonIE_Sodium_Compat::crypto_generichash_init_salt_personal() – Initialize a BLAKE2b hashing context, for use in a streaming interface. */
/* function ParagonIE_Sodium_Compat::crypto_generichash_update() – Update a BLAKE2b hashing context with additional data. */
/* function ParagonIE_Sodium_Compat::crypto_generichash_keygen() – */
/* function ParagonIE_Sodium_Compat::crypto_kdf_derive_from_key() – */
/* function ParagonIE_Sodium_Compat::crypto_kdf_keygen() – */
/* function ParagonIE_Sodium_Compat::crypto_kx() – Perform a key exchange, between a designated client and a server. */
/* function ParagonIE_Sodium_Compat::crypto_kx_seed_keypair() – */
/* function ParagonIE_Sodium_Compat::crypto_kx_keypair() – */
/* function ParagonIE_Sodium_Compat::crypto_kx_client_session_keys() – */
/* function ParagonIE_Sodium_Compat::crypto_kx_server_session_keys() – */
/* function ParagonIE_Sodium_Compat::crypto_kx_secretkey() – */
/* function ParagonIE_Sodium_Compat::crypto_kx_publickey() – */
/* function ParagonIE_Sodium_Compat::crypto_pwhash() – */
/* function ParagonIE_Sodium_Compat::crypto_pwhash_is_available() – !Exclusive to sodium_compat! */
/* function ParagonIE_Sodium_Compat::crypto_pwhash_str() – */
/* function ParagonIE_Sodium_Compat::crypto_pwhash_str_needs_rehash() – Do we need to rehash this password? */
/* function ParagonIE_Sodium_Compat::crypto_pwhash_str_verify() – */
/* function ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256() – */
/* function ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_is_available() – !Exclusive to sodium_compat! */
/* function ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str() – */
/* function ParagonIE_Sodium_Compat::crypto_pwhash_scryptsalsa208sha256_str_verify() – */
/* function ParagonIE_Sodium_Compat::crypto_scalarmult() – Calculate the shared secret between your secret key and your
recipient’s public key. */
/* function ParagonIE_Sodium_Compat::crypto_scalarmult_base() – Calculate an X25519 public key from an X25519 secret key. */
/* function ParagonIE_Sodium_Compat::crypto_secretbox() – Authenticated symmetric-key encryption. */
/* function ParagonIE_Sodium_Compat::crypto_secretbox_open() – Decrypts a message previously encrypted with crypto_secretbox(). */
/* function ParagonIE_Sodium_Compat::crypto_secretbox_keygen() – Return a secure random key for use with crypto_secretbox */
/* function ParagonIE_Sodium_Compat::crypto_secretbox_xchacha20poly1305() – Authenticated symmetric-key encryption. */
/* function ParagonIE_Sodium_Compat::crypto_secretbox_xchacha20poly1305_open() – Decrypts a message previously encrypted with crypto_secretbox_xchacha20poly1305(). */
/* function ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_init_push() – */
/* function ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_init_pull() – */
/* function ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_push() – */
/* function ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_pull() – */
/* function ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_keygen() – */
/* function ParagonIE_Sodium_Compat::crypto_secretstream_xchacha20poly1305_rekey() – */
/* function ParagonIE_Sodium_Compat::crypto_shorthash() – Calculates a SipHash-2-4 hash of a message for a given key. */
/* function ParagonIE_Sodium_Compat::crypto_shorthash_keygen() – Return a secure random key for use with crypto_shorthash */
/* function ParagonIE_Sodium_Compat::crypto_sign() – Returns a signed message. You probably want crypto_sign_detached()
instead, which only returns the signature. */
/* function ParagonIE_Sodium_Compat::crypto_sign_open() – Validates a signed message then returns the message. */
/* function ParagonIE_Sodium_Compat::crypto_sign_keypair() – Generate a new random Ed25519 keypair. */
/* function ParagonIE_Sodium_Compat::crypto_sign_keypair_from_secretkey_and_publickey() – */
/* function ParagonIE_Sodium_Compat::crypto_sign_seed_keypair() – Generate an Ed25519 keypair from a seed. */
/* function ParagonIE_Sodium_Compat::crypto_sign_publickey() – Extract an Ed25519 public key from an Ed25519 keypair. */
/* function ParagonIE_Sodium_Compat::crypto_sign_publickey_from_secretkey() – Calculate an Ed25519 public key from an Ed25519 secret key. */
/* function ParagonIE_Sodium_Compat::crypto_sign_secretkey() – Extract an Ed25519 secret key from an Ed25519 keypair. */
/* function ParagonIE_Sodium_Compat::crypto_sign_detached() – Calculate the Ed25519 signature of a message and return ONLY the signature. */
/* function ParagonIE_Sodium_Compat::crypto_sign_verify_detached() – Verify the Ed25519 signature of a message. */
/* function ParagonIE_Sodium_Compat::crypto_sign_ed25519_pk_to_curve25519() – Convert an Ed25519 public key to a Curve25519 public key */
/* function ParagonIE_Sodium_Compat::crypto_sign_ed25519_sk_to_curve25519() – Convert an Ed25519 secret key to a Curve25519 secret key */

 View on GitHub View on Trac

Called by

    Invoked by

      Calls

      Call hooks

      API Letters: ,,,