[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.56.1.el8_10.x86_64
/
include
/
crypto
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 internal
SET
[ DEL ]
📄 acompress.h
8,120 B
SET
[ EDIT ]
|
[ DEL ]
📄 aead.h
18,729 B
SET
[ EDIT ]
|
[ DEL ]
📄 aes.h
1,058 B
SET
[ EDIT ]
|
[ DEL ]
📄 akcipher.h
11,989 B
SET
[ EDIT ]
|
[ DEL ]
📄 algapi.h
12,163 B
SET
[ EDIT ]
|
[ DEL ]
📄 arc4.h
484 B
SET
[ EDIT ]
|
[ DEL ]
📄 authenc.h
845 B
SET
[ EDIT ]
|
[ DEL ]
📄 b128ops.h
2,471 B
SET
[ EDIT ]
|
[ DEL ]
📄 blowfish.h
415 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast5.h
590 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast6.h
636 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast_common.h
232 B
SET
[ EDIT ]
|
[ DEL ]
📄 cbc.h
3,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 chacha20.h
638 B
SET
[ EDIT ]
|
[ DEL ]
📄 cryptd.h
2,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 crypto_wq.h
161 B
SET
[ EDIT ]
|
[ DEL ]
📄 ctr.h
1,666 B
SET
[ EDIT ]
|
[ DEL ]
📄 des.h
1,403 B
SET
[ EDIT ]
|
[ DEL ]
📄 dh.h
2,784 B
SET
[ EDIT ]
|
[ DEL ]
📄 drbg.h
9,160 B
SET
[ EDIT ]
|
[ DEL ]
📄 ecdh.h
2,733 B
SET
[ EDIT ]
|
[ DEL ]
📄 engine.h
4,202 B
SET
[ EDIT ]
|
[ DEL ]
📄 gcm.h
140 B
SET
[ EDIT ]
|
[ DEL ]
📄 gf128mul.h
9,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 ghash.h
381 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash.h
33,386 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash_info.h
1,153 B
SET
[ EDIT ]
|
[ DEL ]
📄 hmac.h
173 B
SET
[ EDIT ]
|
[ DEL ]
📄 if_alg.h
7,170 B
SET
[ EDIT ]
|
[ DEL ]
📄 kpp.h
9,926 B
SET
[ EDIT ]
|
[ DEL ]
📄 md5.h
497 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus1280_glue.h
4,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus640_glue.h
4,585 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus_common.h
720 B
SET
[ EDIT ]
|
[ DEL ]
📄 null.h
341 B
SET
[ EDIT ]
|
[ DEL ]
📄 padlock.h
649 B
SET
[ EDIT ]
|
[ DEL ]
📄 pcrypt.h
1,435 B
SET
[ EDIT ]
|
[ DEL ]
📄 pkcs7.h
1,388 B
SET
[ EDIT ]
|
[ DEL ]
📄 poly1305.h
920 B
SET
[ EDIT ]
|
[ DEL ]
📄 public_key.h
2,126 B
SET
[ EDIT ]
|
[ DEL ]
📄 rng.h
6,820 B
SET
[ EDIT ]
|
[ DEL ]
📄 scatterwalk.h
3,755 B
SET
[ EDIT ]
|
[ DEL ]
📄 serpent.h
712 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha.h
4,350 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha1_base.h
2,532 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha256_base.h
2,629 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha3.h
879 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha512_base.h
3,271 B
SET
[ EDIT ]
|
[ DEL ]
📄 skcipher.h
23,381 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3.h
833 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3_base.h
3,024 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm4.h
754 B
SET
[ EDIT ]
|
[ DEL ]
📄 speck.h
1,357 B
SET
[ EDIT ]
|
[ DEL ]
📄 twofish.h
755 B
SET
[ EDIT ]
|
[ DEL ]
📄 xts.h
1,385 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: ecdh.h
/* * ECDH params to be used with kpp API * * Copyright (c) 2016, Intel Corporation * Authors: Salvatore Benedetto <salvatore.benedetto@intel.com> * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * */ #ifndef _CRYPTO_ECDH_ #define _CRYPTO_ECDH_ /** * DOC: ECDH Helper Functions * * To use ECDH with the KPP cipher API, the following data structure and * functions should be used. * * The ECC curves known to the ECDH implementation are specified in this * header file. * * To use ECDH with KPP, the following functions should be used to operate on * an ECDH private key. The packet private key that can be set with * the KPP API function call of crypto_kpp_set_secret. */ /* Curves IDs */ #define ECC_CURVE_NIST_P192 0x0001 #define ECC_CURVE_NIST_P256 0x0002 /** * struct ecdh - define an ECDH private key * * @curve_id: ECC curve the key is based on. * @key: Private ECDH key * @key_size: Size of the private ECDH key */ struct ecdh { unsigned short curve_id; char *key; unsigned short key_size; }; /** * crypto_ecdh_key_len() - Obtain the size of the private ECDH key * @params: private ECDH key * * This function returns the packet ECDH key size. A caller can use that * with the provided ECDH private key reference to obtain the required * memory size to hold a packet key. * * Return: size of the key in bytes */ unsigned int crypto_ecdh_key_len(const struct ecdh *params); /** * crypto_ecdh_encode_key() - encode the private key * @buf: Buffer allocated by the caller to hold the packet ECDH * private key. The buffer should be at least crypto_ecdh_key_len * bytes in size. * @len: Length of the packet private key buffer * @p: Buffer with the caller-specified private key * * The ECDH implementations operate on a packet representation of the private * key. * * Return: -EINVAL if buffer has insufficient size, 0 on success */ int crypto_ecdh_encode_key(char *buf, unsigned int len, const struct ecdh *p); /** * crypto_ecdh_decode_key() - decode a private key * @buf: Buffer holding a packet key that should be decoded * @len: Length of the packet private key buffer * @p: Buffer allocated by the caller that is filled with the * unpacked ECDH private key. * * The unpacking obtains the private key by pointing @p to the correct location * in @buf. Thus, both pointers refer to the same memory. * * Return: -EINVAL if buffer has insufficient size, 0 on success */ int crypto_ecdh_decode_key(const char *buf, unsigned int len, struct ecdh *p); #endif