[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.56.1.el8_10.x86_64
/
include
/
crypto
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 internal
SET
[ DEL ]
📄 acompress.h
8,120 B
SET
[ EDIT ]
|
[ DEL ]
📄 aead.h
18,729 B
SET
[ EDIT ]
|
[ DEL ]
📄 aes.h
1,058 B
SET
[ EDIT ]
|
[ DEL ]
📄 akcipher.h
11,989 B
SET
[ EDIT ]
|
[ DEL ]
📄 algapi.h
12,163 B
SET
[ EDIT ]
|
[ DEL ]
📄 arc4.h
484 B
SET
[ EDIT ]
|
[ DEL ]
📄 authenc.h
845 B
SET
[ EDIT ]
|
[ DEL ]
📄 b128ops.h
2,471 B
SET
[ EDIT ]
|
[ DEL ]
📄 blowfish.h
415 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast5.h
590 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast6.h
636 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast_common.h
232 B
SET
[ EDIT ]
|
[ DEL ]
📄 cbc.h
3,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 chacha20.h
638 B
SET
[ EDIT ]
|
[ DEL ]
📄 cryptd.h
2,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 crypto_wq.h
161 B
SET
[ EDIT ]
|
[ DEL ]
📄 ctr.h
1,666 B
SET
[ EDIT ]
|
[ DEL ]
📄 des.h
1,403 B
SET
[ EDIT ]
|
[ DEL ]
📄 dh.h
2,784 B
SET
[ EDIT ]
|
[ DEL ]
📄 drbg.h
9,160 B
SET
[ EDIT ]
|
[ DEL ]
📄 ecdh.h
2,733 B
SET
[ EDIT ]
|
[ DEL ]
📄 engine.h
4,202 B
SET
[ EDIT ]
|
[ DEL ]
📄 gcm.h
140 B
SET
[ EDIT ]
|
[ DEL ]
📄 gf128mul.h
9,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 ghash.h
381 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash.h
33,386 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash_info.h
1,153 B
SET
[ EDIT ]
|
[ DEL ]
📄 hmac.h
173 B
SET
[ EDIT ]
|
[ DEL ]
📄 if_alg.h
7,170 B
SET
[ EDIT ]
|
[ DEL ]
📄 kpp.h
9,926 B
SET
[ EDIT ]
|
[ DEL ]
📄 md5.h
497 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus1280_glue.h
4,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus640_glue.h
4,585 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus_common.h
720 B
SET
[ EDIT ]
|
[ DEL ]
📄 null.h
341 B
SET
[ EDIT ]
|
[ DEL ]
📄 padlock.h
649 B
SET
[ EDIT ]
|
[ DEL ]
📄 pcrypt.h
1,435 B
SET
[ EDIT ]
|
[ DEL ]
📄 pkcs7.h
1,388 B
SET
[ EDIT ]
|
[ DEL ]
📄 poly1305.h
920 B
SET
[ EDIT ]
|
[ DEL ]
📄 public_key.h
2,126 B
SET
[ EDIT ]
|
[ DEL ]
📄 rng.h
6,820 B
SET
[ EDIT ]
|
[ DEL ]
📄 scatterwalk.h
3,755 B
SET
[ EDIT ]
|
[ DEL ]
📄 serpent.h
712 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha.h
4,350 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha1_base.h
2,532 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha256_base.h
2,629 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha3.h
879 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha512_base.h
3,271 B
SET
[ EDIT ]
|
[ DEL ]
📄 skcipher.h
23,381 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3.h
833 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3_base.h
3,024 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm4.h
754 B
SET
[ EDIT ]
|
[ DEL ]
📄 speck.h
1,357 B
SET
[ EDIT ]
|
[ DEL ]
📄 twofish.h
755 B
SET
[ EDIT ]
|
[ DEL ]
📄 xts.h
1,385 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: cryptd.h
/* SPDX-License-Identifier: GPL-2.0 */ /* * Software async crypto daemon * * Added AEAD support to cryptd. * Authors: Tadeusz Struk (tadeusz.struk@intel.com) * Adrian Hoban <adrian.hoban@intel.com> * Gabriele Paoloni <gabriele.paoloni@intel.com> * Aidan O'Mahony (aidan.o.mahony@intel.com) * Copyright (c) 2010, Intel Corporation. */ #ifndef _CRYPTO_CRYPT_H #define _CRYPTO_CRYPT_H #include <linux/kernel.h> #include <crypto/aead.h> #include <crypto/hash.h> #include <crypto/skcipher.h> struct cryptd_ablkcipher { struct crypto_ablkcipher base; }; static inline struct cryptd_ablkcipher *__cryptd_ablkcipher_cast( struct crypto_ablkcipher *tfm) { return (struct cryptd_ablkcipher *)tfm; } /* alg_name should be algorithm to be cryptd-ed */ struct cryptd_ablkcipher *cryptd_alloc_ablkcipher(const char *alg_name, u32 type, u32 mask); struct crypto_blkcipher *cryptd_ablkcipher_child(struct cryptd_ablkcipher *tfm); bool cryptd_ablkcipher_queued(struct cryptd_ablkcipher *tfm); void cryptd_free_ablkcipher(struct cryptd_ablkcipher *tfm); struct cryptd_skcipher { struct crypto_skcipher base; }; struct cryptd_skcipher *cryptd_alloc_skcipher(const char *alg_name, u32 type, u32 mask); struct crypto_skcipher *cryptd_skcipher_child(struct cryptd_skcipher *tfm); /* Must be called without moving CPUs. */ bool cryptd_skcipher_queued(struct cryptd_skcipher *tfm); void cryptd_free_skcipher(struct cryptd_skcipher *tfm); struct cryptd_ahash { struct crypto_ahash base; }; static inline struct cryptd_ahash *__cryptd_ahash_cast( struct crypto_ahash *tfm) { return (struct cryptd_ahash *)tfm; } /* alg_name should be algorithm to be cryptd-ed */ struct cryptd_ahash *cryptd_alloc_ahash(const char *alg_name, u32 type, u32 mask); struct crypto_shash *cryptd_ahash_child(struct cryptd_ahash *tfm); struct shash_desc *cryptd_shash_desc(struct ahash_request *req); /* Must be called without moving CPUs. */ bool cryptd_ahash_queued(struct cryptd_ahash *tfm); void cryptd_free_ahash(struct cryptd_ahash *tfm); struct cryptd_aead { struct crypto_aead base; }; static inline struct cryptd_aead *__cryptd_aead_cast( struct crypto_aead *tfm) { return (struct cryptd_aead *)tfm; } struct cryptd_aead *cryptd_alloc_aead(const char *alg_name, u32 type, u32 mask); struct crypto_aead *cryptd_aead_child(struct cryptd_aead *tfm); /* Must be called without moving CPUs. */ bool cryptd_aead_queued(struct cryptd_aead *tfm); void cryptd_free_aead(struct cryptd_aead *tfm); #endif