eric6/Documentation/Source/eric6.Utilities.crypto.py3AES.html

changeset 7989
a21d673a8f99
parent 7631
2c7ccb4484bf
child 8215
fc5d68a6889e
equal deleted inserted replaced
7988:c4c17121eff8 7989:a21d673a8f99
193 <dd> 193 <dd>
194 key to be used for the modification (bytearray) 194 key to be used for the modification (bytearray)
195 </dd> 195 </dd>
196 </dl> 196 </dl>
197 <dl> 197 <dl>
198 <dt>Returns:</dt> 198 <dt>Return:</dt>
199 <dd> 199 <dd>
200 modified state (bytearray) 200 modified state (bytearray)
201 </dd> 201 </dd>
202 </dl> 202 </dl>
203 <a NAME="AES.__aes_invMain" ID="AES.__aes_invMain"></a> 203 <a NAME="AES.__aes_invMain" ID="AES.__aes_invMain"></a>
226 <dd> 226 <dd>
227 number of rounds to be done (integer) 227 number of rounds to be done (integer)
228 </dd> 228 </dd>
229 </dl> 229 </dl>
230 <dl> 230 <dl>
231 <dt>Returns:</dt> 231 <dt>Return:</dt>
232 <dd> 232 <dd>
233 modified state (bytearray) 233 modified state (bytearray)
234 </dd> 234 </dd>
235 </dl> 235 </dl>
236 <a NAME="AES.__aes_invRound" ID="AES.__aes_invRound"></a> 236 <a NAME="AES.__aes_invRound" ID="AES.__aes_invRound"></a>
251 <dd> 251 <dd>
252 round key to be used (bytearray) 252 round key to be used (bytearray)
253 </dd> 253 </dd>
254 </dl> 254 </dl>
255 <dl> 255 <dl>
256 <dt>Returns:</dt> 256 <dt>Return:</dt>
257 <dd> 257 <dd>
258 modified state (bytearray) 258 modified state (bytearray)
259 </dd> 259 </dd>
260 </dl> 260 </dl>
261 <a NAME="AES.__aes_main" ID="AES.__aes_main"></a> 261 <a NAME="AES.__aes_main" ID="AES.__aes_main"></a>
284 <dd> 284 <dd>
285 number of rounds to be done (integer) 285 number of rounds to be done (integer)
286 </dd> 286 </dd>
287 </dl> 287 </dl>
288 <dl> 288 <dl>
289 <dt>Returns:</dt> 289 <dt>Return:</dt>
290 <dd> 290 <dd>
291 modified state (bytearray) 291 modified state (bytearray)
292 </dd> 292 </dd>
293 </dl> 293 </dl>
294 <a NAME="AES.__aes_round" ID="AES.__aes_round"></a> 294 <a NAME="AES.__aes_round" ID="AES.__aes_round"></a>
309 <dd> 309 <dd>
310 round key to be used (bytearray) 310 round key to be used (bytearray)
311 </dd> 311 </dd>
312 </dl> 312 </dl>
313 <dl> 313 <dl>
314 <dt>Returns:</dt> 314 <dt>Return:</dt>
315 <dd> 315 <dd>
316 modified state (bytearray) 316 modified state (bytearray)
317 </dd> 317 </dd>
318 </dl> 318 </dl>
319 <a NAME="AES.__core" ID="AES.__core"></a> 319 <a NAME="AES.__core" ID="AES.__core"></a>
333 <dd> 333 <dd>
334 iteration counter (integer) 334 iteration counter (integer)
335 </dd> 335 </dd>
336 </dl> 336 </dl>
337 <dl> 337 <dl>
338 <dt>Returns:</dt> 338 <dt>Return:</dt>
339 <dd> 339 <dd>
340 modified data (bytearray) 340 modified data (bytearray)
341 </dd> 341 </dd>
342 </dl> 342 </dl>
343 <a NAME="AES.__createRoundKey" ID="AES.__createRoundKey"></a> 343 <a NAME="AES.__createRoundKey" ID="AES.__createRoundKey"></a>
357 <dd> 357 <dd>
358 position within the expanded key (integer) 358 position within the expanded key (integer)
359 </dd> 359 </dd>
360 </dl> 360 </dl>
361 <dl> 361 <dl>
362 <dt>Returns:</dt> 362 <dt>Return:</dt>
363 <dd> 363 <dd>
364 round key (bytearray) 364 round key (bytearray)
365 </dd> 365 </dd>
366 </dl> 366 </dl>
367 <a NAME="AES.__expandKey" ID="AES.__expandKey"></a> 367 <a NAME="AES.__expandKey" ID="AES.__expandKey"></a>
388 <dd> 388 <dd>
389 size of the expanded key (integer) 389 size of the expanded key (integer)
390 </dd> 390 </dd>
391 </dl> 391 </dl>
392 <dl> 392 <dl>
393 <dt>Returns:</dt> 393 <dt>Return:</dt>
394 <dd> 394 <dd>
395 expanded key (bytearray) 395 expanded key (bytearray)
396 </dd> 396 </dd>
397 </dl> 397 </dl>
398 <a NAME="AES.__galois_multiplication" ID="AES.__galois_multiplication"></a> 398 <a NAME="AES.__galois_multiplication" ID="AES.__galois_multiplication"></a>
413 <dd> 413 <dd>
414 second factor (byte) 414 second factor (byte)
415 </dd> 415 </dd>
416 </dl> 416 </dl>
417 <dl> 417 <dl>
418 <dt>Returns:</dt> 418 <dt>Return:</dt>
419 <dd> 419 <dd>
420 result (byte) 420 result (byte)
421 </dd> 421 </dd>
422 </dl> 422 </dl>
423 <a NAME="AES.__getRconValue" ID="AES.__getRconValue"></a> 423 <a NAME="AES.__getRconValue" ID="AES.__getRconValue"></a>
433 <dd> 433 <dd>
434 position of the value (integer) 434 position of the value (integer)
435 </dd> 435 </dd>
436 </dl> 436 </dl>
437 <dl> 437 <dl>
438 <dt>Returns:</dt> 438 <dt>Return:</dt>
439 <dd> 439 <dd>
440 Rcon value (integer) 440 Rcon value (integer)
441 </dd> 441 </dd>
442 </dl> 442 </dl>
443 <a NAME="AES.__getSBoxInvert" ID="AES.__getSBoxInvert"></a> 443 <a NAME="AES.__getSBoxInvert" ID="AES.__getSBoxInvert"></a>
453 <dd> 453 <dd>
454 position of the value (integer) 454 position of the value (integer)
455 </dd> 455 </dd>
456 </dl> 456 </dl>
457 <dl> 457 <dl>
458 <dt>Returns:</dt> 458 <dt>Return:</dt>
459 <dd> 459 <dd>
460 value of the Inverted S-Box (integer) 460 value of the Inverted S-Box (integer)
461 </dd> 461 </dd>
462 </dl> 462 </dl>
463 <a NAME="AES.__getSBoxValue" ID="AES.__getSBoxValue"></a> 463 <a NAME="AES.__getSBoxValue" ID="AES.__getSBoxValue"></a>
473 <dd> 473 <dd>
474 position of the value (integer) 474 position of the value (integer)
475 </dd> 475 </dd>
476 </dl> 476 </dl>
477 <dl> 477 <dl>
478 <dt>Returns:</dt> 478 <dt>Return:</dt>
479 <dd> 479 <dd>
480 value of the S-Box (integer) 480 value of the S-Box (integer)
481 </dd> 481 </dd>
482 </dl> 482 </dl>
483 <a NAME="AES.__mixColumn" ID="AES.__mixColumn"></a> 483 <a NAME="AES.__mixColumn" ID="AES.__mixColumn"></a>
498 <dd> 498 <dd>
499 flag indicating an inverse operation (boolean) 499 flag indicating an inverse operation (boolean)
500 </dd> 500 </dd>
501 </dl> 501 </dl>
502 <dl> 502 <dl>
503 <dt>Returns:</dt> 503 <dt>Return:</dt>
504 <dd> 504 <dd>
505 modified column (bytearray) 505 modified column (bytearray)
506 </dd> 506 </dd>
507 </dl> 507 </dl>
508 <a NAME="AES.__mixColumns" ID="AES.__mixColumns"></a> 508 <a NAME="AES.__mixColumns" ID="AES.__mixColumns"></a>
522 <dd> 522 <dd>
523 flag indicating an inverse operation (boolean) 523 flag indicating an inverse operation (boolean)
524 </dd> 524 </dd>
525 </dl> 525 </dl>
526 <dl> 526 <dl>
527 <dt>Returns:</dt> 527 <dt>Return:</dt>
528 <dd> 528 <dd>
529 modified state (bytearray) 529 modified state (bytearray)
530 </dd> 530 </dd>
531 </dl> 531 </dl>
532 <a NAME="AES.__rotate" ID="AES.__rotate"></a> 532 <a NAME="AES.__rotate" ID="AES.__rotate"></a>
546 <dd> 546 <dd>
547 data of size 4 (bytearray) 547 data of size 4 (bytearray)
548 </dd> 548 </dd>
549 </dl> 549 </dl>
550 <dl> 550 <dl>
551 <dt>Returns:</dt> 551 <dt>Return:</dt>
552 <dd> 552 <dd>
553 rotated data (bytearray) 553 rotated data (bytearray)
554 </dd> 554 </dd>
555 </dl> 555 </dl>
556 <a NAME="AES.__shiftRow" ID="AES.__shiftRow"></a> 556 <a NAME="AES.__shiftRow" ID="AES.__shiftRow"></a>
578 <dd> 578 <dd>
579 flag indicating an inverse operation (boolean) 579 flag indicating an inverse operation (boolean)
580 </dd> 580 </dd>
581 </dl> 581 </dl>
582 <dl> 582 <dl>
583 <dt>Returns:</dt> 583 <dt>Return:</dt>
584 <dd> 584 <dd>
585 modified state (bytearray) 585 modified state (bytearray)
586 </dd> 586 </dd>
587 </dl> 587 </dl>
588 <a NAME="AES.__shiftRows" ID="AES.__shiftRows"></a> 588 <a NAME="AES.__shiftRows" ID="AES.__shiftRows"></a>
603 <dd> 603 <dd>
604 flag indicating an inverse operation (boolean) 604 flag indicating an inverse operation (boolean)
605 </dd> 605 </dd>
606 </dl> 606 </dl>
607 <dl> 607 <dl>
608 <dt>Returns:</dt> 608 <dt>Return:</dt>
609 <dd> 609 <dd>
610 modified state (bytearray) 610 modified state (bytearray)
611 </dd> 611 </dd>
612 </dl> 612 </dl>
613 <a NAME="AES.__subBytes" ID="AES.__subBytes"></a> 613 <a NAME="AES.__subBytes" ID="AES.__subBytes"></a>
628 <dd> 628 <dd>
629 flag indicating an inverse operation (boolean) 629 flag indicating an inverse operation (boolean)
630 </dd> 630 </dd>
631 </dl> 631 </dl>
632 <dl> 632 <dl>
633 <dt>Returns:</dt> 633 <dt>Return:</dt>
634 <dd> 634 <dd>
635 modified state (bytearray) 635 modified state (bytearray)
636 </dd> 636 </dd>
637 </dl> 637 </dl>
638 <a NAME="AES.decrypt" ID="AES.decrypt"></a> 638 <a NAME="AES.decrypt" ID="AES.decrypt"></a>
657 <dd> 657 <dd>
658 key size (16, 24 or 32) 658 key size (16, 24 or 32)
659 </dd> 659 </dd>
660 </dl> 660 </dl>
661 <dl> 661 <dl>
662 <dt>Returns:</dt> 662 <dt>Return:</dt>
663 <dd> 663 <dd>
664 decrypted data (bytes) 664 decrypted data (bytes)
665 </dd> 665 </dd>
666 </dl> 666 </dl>
667 <dl> 667 <dl>
693 <dd> 693 <dd>
694 key size (16, 24 or 32) 694 key size (16, 24 or 32)
695 </dd> 695 </dd>
696 </dl> 696 </dl>
697 <dl> 697 <dl>
698 <dt>Returns:</dt> 698 <dt>Return:</dt>
699 <dd> 699 <dd>
700 encrypted data (bytes) 700 encrypted data (bytes)
701 </dd> 701 </dd>
702 </dl> 702 </dl>
703 <dl> 703 <dl>
776 <dd> 776 <dd>
777 mode of operation (0, 1, 2) 777 mode of operation (0, 1, 2)
778 </dd> 778 </dd>
779 </dl> 779 </dl>
780 <dl> 780 <dl>
781 <dt>Returns:</dt> 781 <dt>Return:</dt>
782 <dd> 782 <dd>
783 extracted bytes (bytearray) 783 extracted bytes (bytearray)
784 </dd> 784 </dd>
785 </dl> 785 </dl>
786 <a NAME="AESModeOfOperation.decrypt" ID="AESModeOfOperation.decrypt"></a> 786 <a NAME="AESModeOfOperation.decrypt" ID="AESModeOfOperation.decrypt"></a>
817 <dd> 817 <dd>
818 initialisation vector (bytearray) 818 initialisation vector (bytearray)
819 </dd> 819 </dd>
820 </dl> 820 </dl>
821 <dl> 821 <dl>
822 <dt>Returns:</dt> 822 <dt>Return:</dt>
823 <dd> 823 <dd>
824 decrypted data (bytes) 824 decrypted data (bytes)
825 </dd> 825 </dd>
826 </dl> 826 </dl>
827 <dl> 827 <dl>
860 <dd> 860 <dd>
861 initialisation vector (bytearray) 861 initialisation vector (bytearray)
862 </dd> 862 </dd>
863 </dl> 863 </dl>
864 <dl> 864 <dl>
865 <dt>Returns:</dt> 865 <dt>Return:</dt>
866 <dd> 866 <dd>
867 tuple with mode of operation, length of the input data and 867 tuple with mode of operation, length of the input data and
868 the encrypted data (integer, integer, bytes) 868 the encrypted data (integer, integer, bytes)
869 </dd> 869 </dd>
870 </dl> 870 </dl>
891 <dd> 891 <dd>
892 data to be padded (bytes) 892 data to be padded (bytes)
893 </dd> 893 </dd>
894 </dl> 894 </dl>
895 <dl> 895 <dl>
896 <dt>Returns:</dt> 896 <dt>Return:</dt>
897 <dd> 897 <dd>
898 padded data (bytes) 898 padded data (bytes)
899 </dd> 899 </dd>
900 </dl> 900 </dl>
901 <div align="right"><a href="#top">Up</a></div> 901 <div align="right"><a href="#top">Up</a></div>
923 <dd> 923 <dd>
924 mode of operations (0, 1 or 2) 924 mode of operations (0, 1 or 2)
925 </dd> 925 </dd>
926 </dl> 926 </dl>
927 <dl> 927 <dl>
928 <dt>Returns:</dt> 928 <dt>Return:</dt>
929 <dd> 929 <dd>
930 decrypted data (bytes) 930 decrypted data (bytes)
931 </dd> 931 </dd>
932 </dl> 932 </dl>
933 <dl> 933 <dl>
961 <dd> 961 <dd>
962 mode of operations (0, 1 or 2) 962 mode of operations (0, 1 or 2)
963 </dd> 963 </dd>
964 </dl> 964 </dl>
965 <dl> 965 <dl>
966 <dt>Returns:</dt> 966 <dt>Return:</dt>
967 <dd> 967 <dd>
968 encrypted data prepended with the initialization vector (bytes) 968 encrypted data prepended with the initialization vector (bytes)
969 </dd> 969 </dd>
970 </dl> 970 </dl>
971 <dl> 971 <dl>
991 <dd> 991 <dd>
992 data to be stripped (bytes) 992 data to be stripped (bytes)
993 </dd> 993 </dd>
994 </dl> 994 </dl>
995 <dl> 995 <dl>
996 <dt>Returns:</dt> 996 <dt>Return:</dt>
997 <dd> 997 <dd>
998 stripped data (bytes) 998 stripped data (bytes)
999 </dd> 999 </dd>
1000 </dl> 1000 </dl>
1001 <dl> 1001 <dl>

eric ide

mercurial