[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.56.1.el8_10.x86_64
/
include
/
crypto
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 internal
SET
[ DEL ]
📄 acompress.h
8,120 B
SET
[ EDIT ]
|
[ DEL ]
📄 aead.h
18,729 B
SET
[ EDIT ]
|
[ DEL ]
📄 aes.h
1,058 B
SET
[ EDIT ]
|
[ DEL ]
📄 akcipher.h
11,989 B
SET
[ EDIT ]
|
[ DEL ]
📄 algapi.h
12,163 B
SET
[ EDIT ]
|
[ DEL ]
📄 arc4.h
484 B
SET
[ EDIT ]
|
[ DEL ]
📄 authenc.h
845 B
SET
[ EDIT ]
|
[ DEL ]
📄 b128ops.h
2,471 B
SET
[ EDIT ]
|
[ DEL ]
📄 blowfish.h
415 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast5.h
590 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast6.h
636 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast_common.h
232 B
SET
[ EDIT ]
|
[ DEL ]
📄 cbc.h
3,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 chacha20.h
638 B
SET
[ EDIT ]
|
[ DEL ]
📄 cryptd.h
2,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 crypto_wq.h
161 B
SET
[ EDIT ]
|
[ DEL ]
📄 ctr.h
1,666 B
SET
[ EDIT ]
|
[ DEL ]
📄 des.h
1,403 B
SET
[ EDIT ]
|
[ DEL ]
📄 dh.h
2,784 B
SET
[ EDIT ]
|
[ DEL ]
📄 drbg.h
9,160 B
SET
[ EDIT ]
|
[ DEL ]
📄 ecdh.h
2,733 B
SET
[ EDIT ]
|
[ DEL ]
📄 engine.h
4,202 B
SET
[ EDIT ]
|
[ DEL ]
📄 gcm.h
140 B
SET
[ EDIT ]
|
[ DEL ]
📄 gf128mul.h
9,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 ghash.h
381 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash.h
33,386 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash_info.h
1,153 B
SET
[ EDIT ]
|
[ DEL ]
📄 hmac.h
173 B
SET
[ EDIT ]
|
[ DEL ]
📄 if_alg.h
7,170 B
SET
[ EDIT ]
|
[ DEL ]
📄 kpp.h
9,926 B
SET
[ EDIT ]
|
[ DEL ]
📄 md5.h
497 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus1280_glue.h
4,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus640_glue.h
4,585 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus_common.h
720 B
SET
[ EDIT ]
|
[ DEL ]
📄 null.h
341 B
SET
[ EDIT ]
|
[ DEL ]
📄 padlock.h
649 B
SET
[ EDIT ]
|
[ DEL ]
📄 pcrypt.h
1,435 B
SET
[ EDIT ]
|
[ DEL ]
📄 pkcs7.h
1,388 B
SET
[ EDIT ]
|
[ DEL ]
📄 poly1305.h
920 B
SET
[ EDIT ]
|
[ DEL ]
📄 public_key.h
2,126 B
SET
[ EDIT ]
|
[ DEL ]
📄 rng.h
6,820 B
SET
[ EDIT ]
|
[ DEL ]
📄 scatterwalk.h
3,755 B
SET
[ EDIT ]
|
[ DEL ]
📄 serpent.h
712 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha.h
4,350 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha1_base.h
2,532 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha256_base.h
2,629 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha3.h
879 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha512_base.h
3,271 B
SET
[ EDIT ]
|
[ DEL ]
📄 skcipher.h
23,381 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3.h
833 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3_base.h
3,024 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm4.h
754 B
SET
[ EDIT ]
|
[ DEL ]
📄 speck.h
1,357 B
SET
[ EDIT ]
|
[ DEL ]
📄 twofish.h
755 B
SET
[ EDIT ]
|
[ DEL ]
📄 xts.h
1,385 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: cbc.h
/* * CBC: Cipher Block Chaining mode * * Copyright (c) 2016 Herbert Xu <herbert@gondor.apana.org.au> * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * */ #ifndef _CRYPTO_CBC_H #define _CRYPTO_CBC_H #include <crypto/internal/skcipher.h> #include <linux/string.h> #include <linux/types.h> static inline int crypto_cbc_encrypt_segment( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { unsigned int bsize = crypto_skcipher_blocksize(tfm); unsigned int nbytes = walk->nbytes; u8 *src = walk->src.virt.addr; u8 *dst = walk->dst.virt.addr; u8 *iv = walk->iv; do { crypto_xor(iv, src, bsize); fn(tfm, iv, dst); memcpy(iv, dst, bsize); src += bsize; dst += bsize; } while ((nbytes -= bsize) >= bsize); return nbytes; } static inline int crypto_cbc_encrypt_inplace( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { unsigned int bsize = crypto_skcipher_blocksize(tfm); unsigned int nbytes = walk->nbytes; u8 *src = walk->src.virt.addr; u8 *iv = walk->iv; do { crypto_xor(src, iv, bsize); fn(tfm, src, src); iv = src; src += bsize; } while ((nbytes -= bsize) >= bsize); memcpy(walk->iv, iv, bsize); return nbytes; } static inline int crypto_cbc_encrypt_walk(struct skcipher_request *req, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); struct skcipher_walk walk; int err; err = skcipher_walk_virt(&walk, req, false); while (walk.nbytes) { if (walk.src.virt.addr == walk.dst.virt.addr) err = crypto_cbc_encrypt_inplace(&walk, tfm, fn); else err = crypto_cbc_encrypt_segment(&walk, tfm, fn); err = skcipher_walk_done(&walk, err); } return err; } static inline int crypto_cbc_decrypt_segment( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { unsigned int bsize = crypto_skcipher_blocksize(tfm); unsigned int nbytes = walk->nbytes; u8 *src = walk->src.virt.addr; u8 *dst = walk->dst.virt.addr; u8 *iv = walk->iv; do { fn(tfm, src, dst); crypto_xor(dst, iv, bsize); iv = src; src += bsize; dst += bsize; } while ((nbytes -= bsize) >= bsize); memcpy(walk->iv, iv, bsize); return nbytes; } static inline int crypto_cbc_decrypt_inplace( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { unsigned int bsize = crypto_skcipher_blocksize(tfm); unsigned int nbytes = walk->nbytes; u8 *src = walk->src.virt.addr; u8 last_iv[bsize]; /* Start of the last block. */ src += nbytes - (nbytes & (bsize - 1)) - bsize; memcpy(last_iv, src, bsize); for (;;) { fn(tfm, src, src); if ((nbytes -= bsize) < bsize) break; crypto_xor(src, src - bsize, bsize); src -= bsize; } crypto_xor(src, walk->iv, bsize); memcpy(walk->iv, last_iv, bsize); return nbytes; } static inline int crypto_cbc_decrypt_blocks( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { if (walk->src.virt.addr == walk->dst.virt.addr) return crypto_cbc_decrypt_inplace(walk, tfm, fn); else return crypto_cbc_decrypt_segment(walk, tfm, fn); } #endif /* _CRYPTO_CBC_H */