OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-197
/
include
/
crypto
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
11/17/2022 06:42:18 AM
rwxr-xr-x
📄
ablk_helper.h
773 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
acompress.h
7.89 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
aead.h
18.1 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
aes.h
1.03 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
akcipher.h
11.7 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
algapi.h
11.12 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
authenc.h
845 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
b128ops.h
2.41 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
blake2s.h
2.37 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
blowfish.h
415 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast5.h
590 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast6.h
636 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast_common.h
232 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cbc.h
3.48 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
chacha20.h
1.01 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
cryptd.h
2.5 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
crypto_wq.h
161 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
ctr.h
524 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
des.h
542 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
dh.h
2.62 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
drbg.h
9.05 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
ecdh.h
2.67 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
engine.h
4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
gcm.h
140 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
gf128mul.h
9.41 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ghash.h
381 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
hash.h
31.48 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
hash_info.h
1.13 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hmac.h
173 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
if_alg.h
7 KB
11/01/2022 04:52:05 PM
rw-r--r--
📁
internal
-
11/17/2022 06:42:23 AM
rwxr-xr-x
📄
kpp.h
9.68 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
lrw.h
1.22 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mcryptd.h
2.37 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
md5.h
497 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
null.h
569 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
padlock.h
649 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pcrypt.h
1.4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pkcs7.h
1.21 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
poly1305.h
920 bytes
11/01/2022 04:52:05 PM
rw-r--r--
📄
public_key.h
2.08 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
rng.h
6.66 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
scatterwalk.h
3.67 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
serpent.h
712 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha.h
2.88 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha1_base.h
2.47 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha256_base.h
3.03 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha3.h
704 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha512_base.h
3.19 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
skcipher.h
20.7 KB
11/01/2022 04:52:05 PM
rw-r--r--
📄
sm3.h
833 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sm3_base.h
2.95 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
twofish.h
755 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
xts.h
1.81 KB
01/28/2018 09:20:33 PM
rw-r--r--
Editing: dh.h
Close
/* * Diffie-Hellman secret to be used with kpp API along with helper functions * * Copyright (c) 2016, Intel Corporation * Authors: Salvatore Benedetto <salvatore.benedetto@intel.com> * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * */ #ifndef _CRYPTO_DH_ #define _CRYPTO_DH_ /** * DOC: DH Helper Functions * * To use DH with the KPP cipher API, the following data structure and * functions should be used. * * To use DH with KPP, the following functions should be used to operate on * a DH private key. The packet private key that can be set with * the KPP API function call of crypto_kpp_set_secret. */ /** * struct dh - define a DH private key * * @key: Private DH key * @p: Diffie-Hellman parameter P * @g: Diffie-Hellman generator G * @key_size: Size of the private DH key * @p_size: Size of DH parameter P * @g_size: Size of DH generator G */ struct dh { void *key; void *p; void *g; unsigned int key_size; unsigned int p_size; unsigned int g_size; }; /** * crypto_dh_key_len() - Obtain the size of the private DH key * @params: private DH key * * This function returns the packet DH key size. A caller can use that * with the provided DH private key reference to obtain the required * memory size to hold a packet key. * * Return: size of the key in bytes */ unsigned int crypto_dh_key_len(const struct dh *params); /** * crypto_dh_encode_key() - encode the private key * @buf: Buffer allocated by the caller to hold the packet DH * private key. The buffer should be at least crypto_dh_key_len * bytes in size. * @len: Length of the packet private key buffer * @params: Buffer with the caller-specified private key * * The DH implementations operate on a packet representation of the private * key. * * Return: -EINVAL if buffer has insufficient size, 0 on success */ int crypto_dh_encode_key(char *buf, unsigned int len, const struct dh *params); /** * crypto_dh_decode_key() - decode a private key * @buf: Buffer holding a packet key that should be decoded * @len: Length of the packet private key buffer * @params: Buffer allocated by the caller that is filled with the * unpacked DH private key. * * The unpacking obtains the private key by pointing @p to the correct location * in @buf. Thus, both pointers refer to the same memory. * * Return: -EINVAL if buffer has insufficient size, 0 on success */ int crypto_dh_decode_key(const char *buf, unsigned int len, struct dh *params); #endif