OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-197
/
include
/
crypto
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/17/2022 06:42:18 AM
rwxr-xr-x
📄
ablk_helper.h
773 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
acompress.h
7.89 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
aead.h
18.1 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
aes.h
1.03 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
akcipher.h
11.7 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
algapi.h
11.12 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
authenc.h
845 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
b128ops.h
2.41 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
blake2s.h
2.37 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
blowfish.h
415 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast5.h
590 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast6.h
636 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast_common.h
232 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cbc.h
3.48 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
chacha20.h
1.01 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
cryptd.h
2.5 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
crypto_wq.h
161 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
ctr.h
524 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
des.h
542 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
dh.h
2.62 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
drbg.h
9.05 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
ecdh.h
2.67 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
engine.h
4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
gcm.h
140 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
gf128mul.h
9.41 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ghash.h
381 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
hash.h
31.48 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
hash_info.h
1.13 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hmac.h
173 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
if_alg.h
7 KB
11/01/2022 04:52:05 PM
rw-r--r--
📁
internal
-
11/17/2022 06:42:23 AM
rwxr-xr-x
📄
kpp.h
9.68 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
lrw.h
1.22 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mcryptd.h
2.37 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
md5.h
497 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
null.h
569 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
padlock.h
649 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pcrypt.h
1.4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pkcs7.h
1.21 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
poly1305.h
920 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
public_key.h
2.08 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
rng.h
6.66 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
scatterwalk.h
3.67 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
serpent.h
712 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha.h
2.88 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha1_base.h
2.47 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha256_base.h
3.03 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha3.h
704 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha512_base.h
3.19 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
skcipher.h
20.7 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
sm3.h
833 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sm3_base.h
2.95 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
twofish.h
755 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
xts.h
1.81 KB
01/28/2018 09:20:33 PM
rw-r--r--
Editing: cbc.h
Close
/* * CBC: Cipher Block Chaining mode * * Copyright (c) 2016 Herbert Xu <herbert@gondor.apana.org.au> * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * */ #ifndef _CRYPTO_CBC_H #define _CRYPTO_CBC_H #include <crypto/internal/skcipher.h> #include <linux/string.h> #include <linux/types.h> static inline int crypto_cbc_encrypt_segment( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { unsigned int bsize = crypto_skcipher_blocksize(tfm); unsigned int nbytes = walk->nbytes; u8 *src = walk->src.virt.addr; u8 *dst = walk->dst.virt.addr; u8 *iv = walk->iv; do { crypto_xor(iv, src, bsize); fn(tfm, iv, dst); memcpy(iv, dst, bsize); src += bsize; dst += bsize; } while ((nbytes -= bsize) >= bsize); return nbytes; } static inline int crypto_cbc_encrypt_inplace( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { unsigned int bsize = crypto_skcipher_blocksize(tfm); unsigned int nbytes = walk->nbytes; u8 *src = walk->src.virt.addr; u8 *iv = walk->iv; do { crypto_xor(src, iv, bsize); fn(tfm, src, src); iv = src; src += bsize; } while ((nbytes -= bsize) >= bsize); memcpy(walk->iv, iv, bsize); return nbytes; } static inline int crypto_cbc_encrypt_walk(struct skcipher_request *req, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req); struct skcipher_walk walk; int err; err = skcipher_walk_virt(&walk, req, false); while (walk.nbytes) { if (walk.src.virt.addr == walk.dst.virt.addr) err = crypto_cbc_encrypt_inplace(&walk, tfm, fn); else err = crypto_cbc_encrypt_segment(&walk, tfm, fn); err = skcipher_walk_done(&walk, err); } return err; } static inline int crypto_cbc_decrypt_segment( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { unsigned int bsize = crypto_skcipher_blocksize(tfm); unsigned int nbytes = walk->nbytes; u8 *src = walk->src.virt.addr; u8 *dst = walk->dst.virt.addr; u8 *iv = walk->iv; do { fn(tfm, src, dst); crypto_xor(dst, iv, bsize); iv = src; src += bsize; dst += bsize; } while ((nbytes -= bsize) >= bsize); memcpy(walk->iv, iv, bsize); return nbytes; } static inline int crypto_cbc_decrypt_inplace( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { unsigned int bsize = crypto_skcipher_blocksize(tfm); unsigned int nbytes = walk->nbytes; u8 *src = walk->src.virt.addr; u8 last_iv[bsize]; /* Start of the last block. */ src += nbytes - (nbytes & (bsize - 1)) - bsize; memcpy(last_iv, src, bsize); for (;;) { fn(tfm, src, src); if ((nbytes -= bsize) < bsize) break; crypto_xor(src, src - bsize, bsize); src -= bsize; } crypto_xor(src, walk->iv, bsize); memcpy(walk->iv, last_iv, bsize); return nbytes; } static inline int crypto_cbc_decrypt_blocks( struct skcipher_walk *walk, struct crypto_skcipher *tfm, void (*fn)(struct crypto_skcipher *, const u8 *, u8 *)) { if (walk->src.virt.addr == walk->dst.virt.addr) return crypto_cbc_decrypt_inplace(walk, tfm, fn); else return crypto_cbc_decrypt_segment(walk, tfm, fn); } #endif /* _CRYPTO_CBC_H */