OXIESEC PANEL
- Current Dir:
/
/
usr
/
src
/
linux-headers-4.15.0-213
/
include
/
crypto
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
05/09/2024 07:14:15 AM
rwxr-xr-x
📄
ablk_helper.h
773 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
acompress.h
7.89 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
aead.h
18.1 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
aes.h
1.03 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
akcipher.h
11.7 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
algapi.h
11.12 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
authenc.h
845 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
b128ops.h
2.41 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
blake2s.h
2.37 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
blowfish.h
415 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast5.h
590 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast6.h
636 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cast_common.h
232 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
cbc.h
3.48 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
chacha20.h
1.01 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
cryptd.h
2.5 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
crypto_wq.h
161 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
ctr.h
524 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
des.h
542 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
dh.h
2.62 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
drbg.h
9.05 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
ecdh.h
2.67 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
engine.h
4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
gcm.h
140 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
gf128mul.h
9.41 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
ghash.h
381 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
hash.h
31.48 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
hash_info.h
1.13 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
hmac.h
173 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
if_alg.h
7 KB
06/16/2023 05:32:39 PM
rw-r--r--
📁
internal
-
05/09/2024 07:14:16 AM
rwxr-xr-x
📄
kpp.h
9.68 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
lrw.h
1.22 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
mcryptd.h
2.37 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
md5.h
497 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
null.h
569 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
padlock.h
649 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
pcrypt.h
1.4 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
pkcs7.h
1.21 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
poly1305.h
920 bytes
06/16/2023 05:32:39 PM
rw-r--r--
📄
public_key.h
2.08 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
rng.h
6.66 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
scatterwalk.h
3.67 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
serpent.h
712 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha.h
2.88 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha1_base.h
2.47 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha256_base.h
3.03 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha3.h
704 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sha512_base.h
3.19 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
skcipher.h
20.7 KB
06/16/2023 05:32:39 PM
rw-r--r--
📄
sm3.h
833 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
sm3_base.h
2.95 KB
01/28/2018 09:20:33 PM
rw-r--r--
📄
twofish.h
755 bytes
01/28/2018 09:20:33 PM
rw-r--r--
📄
xts.h
1.81 KB
01/28/2018 09:20:33 PM
rw-r--r--
Editing: cryptd.h
Close
/* SPDX-License-Identifier: GPL-2.0 */ /* * Software async crypto daemon * * Added AEAD support to cryptd. * Authors: Tadeusz Struk (tadeusz.struk@intel.com) * Adrian Hoban <adrian.hoban@intel.com> * Gabriele Paoloni <gabriele.paoloni@intel.com> * Aidan O'Mahony (aidan.o.mahony@intel.com) * Copyright (c) 2010, Intel Corporation. */ #ifndef _CRYPTO_CRYPT_H #define _CRYPTO_CRYPT_H #include <linux/kernel.h> #include <crypto/aead.h> #include <crypto/hash.h> #include <crypto/skcipher.h> struct cryptd_ablkcipher { struct crypto_ablkcipher base; }; static inline struct cryptd_ablkcipher *__cryptd_ablkcipher_cast( struct crypto_ablkcipher *tfm) { return (struct cryptd_ablkcipher *)tfm; } /* alg_name should be algorithm to be cryptd-ed */ struct cryptd_ablkcipher *cryptd_alloc_ablkcipher(const char *alg_name, u32 type, u32 mask); struct crypto_blkcipher *cryptd_ablkcipher_child(struct cryptd_ablkcipher *tfm); bool cryptd_ablkcipher_queued(struct cryptd_ablkcipher *tfm); void cryptd_free_ablkcipher(struct cryptd_ablkcipher *tfm); struct cryptd_skcipher { struct crypto_skcipher base; }; struct cryptd_skcipher *cryptd_alloc_skcipher(const char *alg_name, u32 type, u32 mask); struct crypto_skcipher *cryptd_skcipher_child(struct cryptd_skcipher *tfm); /* Must be called without moving CPUs. */ bool cryptd_skcipher_queued(struct cryptd_skcipher *tfm); void cryptd_free_skcipher(struct cryptd_skcipher *tfm); struct cryptd_ahash { struct crypto_ahash base; }; static inline struct cryptd_ahash *__cryptd_ahash_cast( struct crypto_ahash *tfm) { return (struct cryptd_ahash *)tfm; } /* alg_name should be algorithm to be cryptd-ed */ struct cryptd_ahash *cryptd_alloc_ahash(const char *alg_name, u32 type, u32 mask); struct crypto_shash *cryptd_ahash_child(struct cryptd_ahash *tfm); struct shash_desc *cryptd_shash_desc(struct ahash_request *req); /* Must be called without moving CPUs. */ bool cryptd_ahash_queued(struct cryptd_ahash *tfm); void cryptd_free_ahash(struct cryptd_ahash *tfm); struct cryptd_aead { struct crypto_aead base; }; static inline struct cryptd_aead *__cryptd_aead_cast( struct crypto_aead *tfm) { return (struct cryptd_aead *)tfm; } struct cryptd_aead *cryptd_alloc_aead(const char *alg_name, u32 type, u32 mask); struct crypto_aead *cryptd_aead_child(struct cryptd_aead *tfm); /* Must be called without moving CPUs. */ bool cryptd_aead_queued(struct cryptd_aead *tfm); void cryptd_free_aead(struct cryptd_aead *tfm); #endif