[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.64.1.el8_10.x86_64
/
include
/
crypto
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 internal
SET
[ DEL ]
📄 acompress.h
8,120 B
SET
[ EDIT ]
|
[ DEL ]
📄 aead.h
18,729 B
SET
[ EDIT ]
|
[ DEL ]
📄 aes.h
1,058 B
SET
[ EDIT ]
|
[ DEL ]
📄 akcipher.h
11,989 B
SET
[ EDIT ]
|
[ DEL ]
📄 algapi.h
12,163 B
SET
[ EDIT ]
|
[ DEL ]
📄 arc4.h
484 B
SET
[ EDIT ]
|
[ DEL ]
📄 authenc.h
845 B
SET
[ EDIT ]
|
[ DEL ]
📄 b128ops.h
2,471 B
SET
[ EDIT ]
|
[ DEL ]
📄 blowfish.h
415 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast5.h
590 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast6.h
636 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast_common.h
232 B
SET
[ EDIT ]
|
[ DEL ]
📄 cbc.h
3,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 chacha20.h
638 B
SET
[ EDIT ]
|
[ DEL ]
📄 cryptd.h
2,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 crypto_wq.h
161 B
SET
[ EDIT ]
|
[ DEL ]
📄 ctr.h
1,666 B
SET
[ EDIT ]
|
[ DEL ]
📄 des.h
1,403 B
SET
[ EDIT ]
|
[ DEL ]
📄 dh.h
2,784 B
SET
[ EDIT ]
|
[ DEL ]
📄 drbg.h
9,160 B
SET
[ EDIT ]
|
[ DEL ]
📄 ecdh.h
2,733 B
SET
[ EDIT ]
|
[ DEL ]
📄 engine.h
4,202 B
SET
[ EDIT ]
|
[ DEL ]
📄 gcm.h
140 B
SET
[ EDIT ]
|
[ DEL ]
📄 gf128mul.h
9,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 ghash.h
381 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash.h
33,386 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash_info.h
1,153 B
SET
[ EDIT ]
|
[ DEL ]
📄 hmac.h
173 B
SET
[ EDIT ]
|
[ DEL ]
📄 if_alg.h
7,170 B
SET
[ EDIT ]
|
[ DEL ]
📄 kpp.h
9,926 B
SET
[ EDIT ]
|
[ DEL ]
📄 md5.h
497 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus1280_glue.h
4,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus640_glue.h
4,585 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus_common.h
720 B
SET
[ EDIT ]
|
[ DEL ]
📄 null.h
341 B
SET
[ EDIT ]
|
[ DEL ]
📄 padlock.h
649 B
SET
[ EDIT ]
|
[ DEL ]
📄 pcrypt.h
1,435 B
SET
[ EDIT ]
|
[ DEL ]
📄 pkcs7.h
1,388 B
SET
[ EDIT ]
|
[ DEL ]
📄 poly1305.h
920 B
SET
[ EDIT ]
|
[ DEL ]
📄 public_key.h
2,126 B
SET
[ EDIT ]
|
[ DEL ]
📄 rng.h
6,820 B
SET
[ EDIT ]
|
[ DEL ]
📄 scatterwalk.h
3,755 B
SET
[ EDIT ]
|
[ DEL ]
📄 serpent.h
712 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha.h
4,350 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha1_base.h
2,532 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha256_base.h
2,629 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha3.h
879 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha512_base.h
3,271 B
SET
[ EDIT ]
|
[ DEL ]
📄 skcipher.h
23,381 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3.h
833 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3_base.h
3,024 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm4.h
754 B
SET
[ EDIT ]
|
[ DEL ]
📄 speck.h
1,357 B
SET
[ EDIT ]
|
[ DEL ]
📄 twofish.h
755 B
SET
[ EDIT ]
|
[ DEL ]
📄 xts.h
1,385 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: sha256_base.h
/* * sha256_base.h - core logic for SHA-256 implementations * * Copyright (C) 2015 Linaro Ltd <ard.biesheuvel@linaro.org> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. */ #include <crypto/internal/hash.h> #include <crypto/sha.h> #include <linux/crypto.h> #include <linux/module.h> #include <asm/unaligned.h> typedef void (sha256_block_fn)(struct sha256_state *sst, u8 const *src, int blocks); static inline int sha224_base_init(struct shash_desc *desc) { struct sha256_state *sctx = shash_desc_ctx(desc); return sha224_init(sctx); } static inline int sha256_base_init(struct shash_desc *desc) { struct sha256_state *sctx = shash_desc_ctx(desc); return sha256_init(sctx); } static inline int sha256_base_do_update(struct shash_desc *desc, const u8 *data, unsigned int len, sha256_block_fn *block_fn) { struct sha256_state *sctx = shash_desc_ctx(desc); unsigned int partial = sctx->count % SHA256_BLOCK_SIZE; sctx->count += len; if (unlikely((partial + len) >= SHA256_BLOCK_SIZE)) { int blocks; if (partial) { int p = SHA256_BLOCK_SIZE - partial; memcpy(sctx->buf + partial, data, p); data += p; len -= p; block_fn(sctx, sctx->buf, 1); } blocks = len / SHA256_BLOCK_SIZE; len %= SHA256_BLOCK_SIZE; if (blocks) { block_fn(sctx, data, blocks); data += blocks * SHA256_BLOCK_SIZE; } partial = 0; } if (len) memcpy(sctx->buf + partial, data, len); return 0; } static inline int sha256_base_do_finalize(struct shash_desc *desc, sha256_block_fn *block_fn) { const int bit_offset = SHA256_BLOCK_SIZE - sizeof(__be64); struct sha256_state *sctx = shash_desc_ctx(desc); __be64 *bits = (__be64 *)(sctx->buf + bit_offset); unsigned int partial = sctx->count % SHA256_BLOCK_SIZE; sctx->buf[partial++] = 0x80; if (partial > bit_offset) { memset(sctx->buf + partial, 0x0, SHA256_BLOCK_SIZE - partial); partial = 0; block_fn(sctx, sctx->buf, 1); } memset(sctx->buf + partial, 0x0, bit_offset - partial); *bits = cpu_to_be64(sctx->count << 3); block_fn(sctx, sctx->buf, 1); return 0; } static inline int sha256_base_finish(struct shash_desc *desc, u8 *out) { unsigned int digest_size = crypto_shash_digestsize(desc->tfm); struct sha256_state *sctx = shash_desc_ctx(desc); __be32 *digest = (__be32 *)out; int i; for (i = 0; digest_size > 0; i++, digest_size -= sizeof(__be32)) put_unaligned_be32(sctx->state[i], digest++); *sctx = (struct sha256_state){}; return 0; }