|
System | : | Linux MiraNet 3.0.0-14-generic-pae #23-Ubuntu SMP Mon Nov 21 22:07:10 UTC 2011 i686 |
Software | : | Apache. PHP/5.3.6-13ubuntu3.10 |
ID | : | uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
|
|
Safe Mode | : | OFF |
Open_Basedir | : | OFF |
Freespace | : | 25.5 GB of 70.42 GB (36.21%) |
|
MySQL: ON MSSQL: OFF Oracle: OFF PostgreSQL: OFF Curl: OFF Sockets: ON Fetch: OFF Wget: ON Perl: ON |
Disabled Functions: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
|
[ System Info ]
[ Processes ]
[ SQL Manager ]
[ Eval ]
[ Encoder ]
[ Mailer ]
[ Back Connection ]
[ Backdoor Server ]
[ Kernel Exploit Search ]
[ MD5 Decrypter ]
[ Reverse IP ]
[ Kill Shell ]
[ FTP Brute-Force ]
|
|
/
usr/
src/
linux-headers-3.0.0-14/
include/
crypto/
- drwxr-xr-x
|
Viewing file: skcipher.h (2.74 KB) -rw-r--r--Select action/file-type:  ( +) |  ( +) |  ( +) | Code ( +) | Session ( +) |  ( +) | SDB ( +) |  ( +) |  ( +) |  ( +) |  ( +) |  ( +) |
/* * Symmetric key ciphers. * * Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au> * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the Free * Software Foundation; either version 2 of the License, or (at your option) * any later version. * */
#ifndef _CRYPTO_SKCIPHER_H #define _CRYPTO_SKCIPHER_H
#include <linux/crypto.h> #include <linux/kernel.h> #include <linux/slab.h>
/** * struct skcipher_givcrypt_request - Crypto request with IV generation * @seq: Sequence number for IV generation * @giv: Space for generated IV * @creq: The crypto request itself */ struct skcipher_givcrypt_request { u64 seq; u8 *giv;
struct ablkcipher_request creq; };
static inline struct crypto_ablkcipher *skcipher_givcrypt_reqtfm( struct skcipher_givcrypt_request *req) { return crypto_ablkcipher_reqtfm(&req->creq); }
static inline int crypto_skcipher_givencrypt( struct skcipher_givcrypt_request *req) { struct ablkcipher_tfm *crt = crypto_ablkcipher_crt(skcipher_givcrypt_reqtfm(req)); return crt->givencrypt(req); };
static inline int crypto_skcipher_givdecrypt( struct skcipher_givcrypt_request *req) { struct ablkcipher_tfm *crt = crypto_ablkcipher_crt(skcipher_givcrypt_reqtfm(req)); return crt->givdecrypt(req); };
static inline void skcipher_givcrypt_set_tfm( struct skcipher_givcrypt_request *req, struct crypto_ablkcipher *tfm) { req->creq.base.tfm = crypto_ablkcipher_tfm(tfm); }
static inline struct skcipher_givcrypt_request *skcipher_givcrypt_cast( struct crypto_async_request *req) { return container_of(ablkcipher_request_cast(req), struct skcipher_givcrypt_request, creq); }
static inline struct skcipher_givcrypt_request *skcipher_givcrypt_alloc( struct crypto_ablkcipher *tfm, gfp_t gfp) { struct skcipher_givcrypt_request *req;
req = kmalloc(sizeof(struct skcipher_givcrypt_request) + crypto_ablkcipher_reqsize(tfm), gfp);
if (likely(req)) skcipher_givcrypt_set_tfm(req, tfm);
return req; }
static inline void skcipher_givcrypt_free(struct skcipher_givcrypt_request *req) { kfree(req); }
static inline void skcipher_givcrypt_set_callback( struct skcipher_givcrypt_request *req, u32 flags, crypto_completion_t complete, void *data) { ablkcipher_request_set_callback(&req->creq, flags, complete, data); }
static inline void skcipher_givcrypt_set_crypt( struct skcipher_givcrypt_request *req, struct scatterlist *src, struct scatterlist *dst, unsigned int nbytes, void *iv) { ablkcipher_request_set_crypt(&req->creq, src, dst, nbytes, iv); }
static inline void skcipher_givcrypt_set_giv( struct skcipher_givcrypt_request *req, u8 *giv, u64 seq) { req->giv = giv; req->seq = seq; }
#endif /* _CRYPTO_SKCIPHER_H */
|