You are here

public static function ParagonIE_Sodium_Core_HSalsa20::hsalsa20 in Automatic Updates 8

Same name and namespace in other branches
  1. 7 vendor/paragonie/sodium_compat/src/Core/HSalsa20.php \ParagonIE_Sodium_Core_HSalsa20::hsalsa20()

Calculate an hsalsa20 hash of a single block

HSalsa20 doesn't have a counter and will never be used for more than one block (used to derive a subkey for xsalsa20).

@internal You should not use this directly from another application

Parameters

string $in:

string $k:

string|null $c:

Return value

string

Throws

TypeError

6 calls to ParagonIE_Sodium_Core_HSalsa20::hsalsa20()
ParagonIE_Sodium_Core_XSalsa20::xsalsa20 in vendor/paragonie/sodium_compat/src/Core/XSalsa20.php
Expand a key and nonce into an xsalsa20 keystream.
ParagonIE_Sodium_Crypto::box_beforenm in vendor/paragonie/sodium_compat/src/Crypto.php
Used by crypto_box() to get the crypto_secretbox() key.
ParagonIE_Sodium_Crypto::secretbox in vendor/paragonie/sodium_compat/src/Crypto.php
XSalsa20-Poly1305 authenticated symmetric-key encryption.
ParagonIE_Sodium_Crypto::secretbox_open in vendor/paragonie/sodium_compat/src/Crypto.php
Decrypt a ciphertext generated via secretbox().
ParagonIE_Sodium_File::secretbox_decrypt in vendor/paragonie/sodium_compat/src/File.php
Decrypt a file

... See full list

File

vendor/paragonie/sodium_compat/src/Core/HSalsa20.php, line 26

Class

ParagonIE_Sodium_Core_HSalsa20
Class ParagonIE_Sodium_Core_HSalsa20

Code

public static function hsalsa20($in, $k, $c = null) {
  if ($c === null) {
    $x0 = 0x61707865;
    $x5 = 0x3320646e;
    $x10 = 0x79622d32;
    $x15 = 0x6b206574;
  }
  else {
    $x0 = self::load_4(self::substr($c, 0, 4));
    $x5 = self::load_4(self::substr($c, 4, 4));
    $x10 = self::load_4(self::substr($c, 8, 4));
    $x15 = self::load_4(self::substr($c, 12, 4));
  }
  $x1 = self::load_4(self::substr($k, 0, 4));
  $x2 = self::load_4(self::substr($k, 4, 4));
  $x3 = self::load_4(self::substr($k, 8, 4));
  $x4 = self::load_4(self::substr($k, 12, 4));
  $x11 = self::load_4(self::substr($k, 16, 4));
  $x12 = self::load_4(self::substr($k, 20, 4));
  $x13 = self::load_4(self::substr($k, 24, 4));
  $x14 = self::load_4(self::substr($k, 28, 4));
  $x6 = self::load_4(self::substr($in, 0, 4));
  $x7 = self::load_4(self::substr($in, 4, 4));
  $x8 = self::load_4(self::substr($in, 8, 4));
  $x9 = self::load_4(self::substr($in, 12, 4));
  for ($i = self::ROUNDS; $i > 0; $i -= 2) {
    $x4 ^= self::rotate($x0 + $x12, 7);
    $x8 ^= self::rotate($x4 + $x0, 9);
    $x12 ^= self::rotate($x8 + $x4, 13);
    $x0 ^= self::rotate($x12 + $x8, 18);
    $x9 ^= self::rotate($x5 + $x1, 7);
    $x13 ^= self::rotate($x9 + $x5, 9);
    $x1 ^= self::rotate($x13 + $x9, 13);
    $x5 ^= self::rotate($x1 + $x13, 18);
    $x14 ^= self::rotate($x10 + $x6, 7);
    $x2 ^= self::rotate($x14 + $x10, 9);
    $x6 ^= self::rotate($x2 + $x14, 13);
    $x10 ^= self::rotate($x6 + $x2, 18);
    $x3 ^= self::rotate($x15 + $x11, 7);
    $x7 ^= self::rotate($x3 + $x15, 9);
    $x11 ^= self::rotate($x7 + $x3, 13);
    $x15 ^= self::rotate($x11 + $x7, 18);
    $x1 ^= self::rotate($x0 + $x3, 7);
    $x2 ^= self::rotate($x1 + $x0, 9);
    $x3 ^= self::rotate($x2 + $x1, 13);
    $x0 ^= self::rotate($x3 + $x2, 18);
    $x6 ^= self::rotate($x5 + $x4, 7);
    $x7 ^= self::rotate($x6 + $x5, 9);
    $x4 ^= self::rotate($x7 + $x6, 13);
    $x5 ^= self::rotate($x4 + $x7, 18);
    $x11 ^= self::rotate($x10 + $x9, 7);
    $x8 ^= self::rotate($x11 + $x10, 9);
    $x9 ^= self::rotate($x8 + $x11, 13);
    $x10 ^= self::rotate($x9 + $x8, 18);
    $x12 ^= self::rotate($x15 + $x14, 7);
    $x13 ^= self::rotate($x12 + $x15, 9);
    $x14 ^= self::rotate($x13 + $x12, 13);
    $x15 ^= self::rotate($x14 + $x13, 18);
  }
  return self::store32_le($x0) . self::store32_le($x5) . self::store32_le($x10) . self::store32_le($x15) . self::store32_le($x6) . self::store32_le($x7) . self::store32_le($x8) . self::store32_le($x9);
}