[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
src
/
kernels
/
4.18.0-553.63.1.el8_10.x86_64
/
include
/
crypto
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 internal
SET
[ DEL ]
📄 acompress.h
8,120 B
SET
[ EDIT ]
|
[ DEL ]
📄 aead.h
18,729 B
SET
[ EDIT ]
|
[ DEL ]
📄 aes.h
1,058 B
SET
[ EDIT ]
|
[ DEL ]
📄 akcipher.h
11,989 B
SET
[ EDIT ]
|
[ DEL ]
📄 algapi.h
12,163 B
SET
[ EDIT ]
|
[ DEL ]
📄 arc4.h
484 B
SET
[ EDIT ]
|
[ DEL ]
📄 authenc.h
845 B
SET
[ EDIT ]
|
[ DEL ]
📄 b128ops.h
2,471 B
SET
[ EDIT ]
|
[ DEL ]
📄 blowfish.h
415 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast5.h
590 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast6.h
636 B
SET
[ EDIT ]
|
[ DEL ]
📄 cast_common.h
232 B
SET
[ EDIT ]
|
[ DEL ]
📄 cbc.h
3,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 chacha20.h
638 B
SET
[ EDIT ]
|
[ DEL ]
📄 cryptd.h
2,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 crypto_wq.h
161 B
SET
[ EDIT ]
|
[ DEL ]
📄 ctr.h
1,666 B
SET
[ EDIT ]
|
[ DEL ]
📄 des.h
1,403 B
SET
[ EDIT ]
|
[ DEL ]
📄 dh.h
2,784 B
SET
[ EDIT ]
|
[ DEL ]
📄 drbg.h
9,160 B
SET
[ EDIT ]
|
[ DEL ]
📄 ecdh.h
2,733 B
SET
[ EDIT ]
|
[ DEL ]
📄 engine.h
4,202 B
SET
[ EDIT ]
|
[ DEL ]
📄 gcm.h
140 B
SET
[ EDIT ]
|
[ DEL ]
📄 gf128mul.h
9,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 ghash.h
381 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash.h
33,386 B
SET
[ EDIT ]
|
[ DEL ]
📄 hash_info.h
1,153 B
SET
[ EDIT ]
|
[ DEL ]
📄 hmac.h
173 B
SET
[ EDIT ]
|
[ DEL ]
📄 if_alg.h
7,170 B
SET
[ EDIT ]
|
[ DEL ]
📄 kpp.h
9,926 B
SET
[ EDIT ]
|
[ DEL ]
📄 md5.h
497 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus1280_glue.h
4,647 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus640_glue.h
4,585 B
SET
[ EDIT ]
|
[ DEL ]
📄 morus_common.h
720 B
SET
[ EDIT ]
|
[ DEL ]
📄 null.h
341 B
SET
[ EDIT ]
|
[ DEL ]
📄 padlock.h
649 B
SET
[ EDIT ]
|
[ DEL ]
📄 pcrypt.h
1,435 B
SET
[ EDIT ]
|
[ DEL ]
📄 pkcs7.h
1,388 B
SET
[ EDIT ]
|
[ DEL ]
📄 poly1305.h
920 B
SET
[ EDIT ]
|
[ DEL ]
📄 public_key.h
2,126 B
SET
[ EDIT ]
|
[ DEL ]
📄 rng.h
6,820 B
SET
[ EDIT ]
|
[ DEL ]
📄 scatterwalk.h
3,755 B
SET
[ EDIT ]
|
[ DEL ]
📄 serpent.h
712 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha.h
4,350 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha1_base.h
2,532 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha256_base.h
2,629 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha3.h
879 B
SET
[ EDIT ]
|
[ DEL ]
📄 sha512_base.h
3,271 B
SET
[ EDIT ]
|
[ DEL ]
📄 skcipher.h
23,381 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3.h
833 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm3_base.h
3,024 B
SET
[ EDIT ]
|
[ DEL ]
📄 sm4.h
754 B
SET
[ EDIT ]
|
[ DEL ]
📄 speck.h
1,357 B
SET
[ EDIT ]
|
[ DEL ]
📄 twofish.h
755 B
SET
[ EDIT ]
|
[ DEL ]
📄 xts.h
1,385 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: xts.h
/* SPDX-License-Identifier: GPL-2.0 */ #ifndef _CRYPTO_XTS_H #define _CRYPTO_XTS_H #include <crypto/b128ops.h> #include <crypto/internal/skcipher.h> #include <linux/fips.h> #define XTS_BLOCK_SIZE 16 #define XTS_TWEAK_CAST(x) ((void (*)(void *, u8*, const u8*))(x)) static inline int xts_check_key(struct crypto_tfm *tfm, const u8 *key, unsigned int keylen) { /* * key consists of keys of equal size concatenated, therefore * the length must be even. */ if (keylen % 2) { crypto_tfm_set_flags(tfm, CRYPTO_TFM_RES_BAD_KEY_LEN); return -EINVAL; } /* * In FIPS mode only a combined key length of either 256 or * 512 bits is allowed, c.f. FIPS 140-3 IG C.I. */ if (fips_enabled && keylen != 32 && keylen != 64) { crypto_tfm_set_flags(tfm, CRYPTO_TFM_RES_BAD_KEY_LEN); return -EINVAL; } /* * Ensure that the AES and tweak key are not identical when * in FIPS mode or the CRYPTO_TFM_REQ_WEAK_KEY flag is set. */ if ((fips_enabled || (crypto_tfm_get_flags(tfm) & CRYPTO_TFM_REQ_WEAK_KEY)) && !crypto_memneq(key, key + (keylen / 2), keylen / 2)) { crypto_tfm_set_flags(tfm, CRYPTO_TFM_RES_WEAK_KEY); return -EINVAL; } return 0; } static inline int xts_verify_key(struct crypto_skcipher *tfm, const u8 *key, unsigned int keylen) { return xts_check_key(crypto_skcipher_tfm(tfm), key, keylen); } #endif /* _CRYPTO_XTS_H */