__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

[email protected]: ~ $
/* SPDX-License-Identifier: GPL-2.0 */
/*
 * Common values for AES algorithms
 */

#ifndef _CRYPTO_AES_H
#define _CRYPTO_AES_H

#include <linux/types.h>
#include <linux/crypto.h>

#define AES_MIN_KEY_SIZE	16
#define AES_MAX_KEY_SIZE	32
#define AES_KEYSIZE_128		16
#define AES_KEYSIZE_192		24
#define AES_KEYSIZE_256		32
#define AES_BLOCK_SIZE		16
#define AES_MAX_KEYLENGTH	(15 * 16)
#define AES_MAX_KEYLENGTH_U32	(AES_MAX_KEYLENGTH / sizeof(u32))

/*
 * Please ensure that the first two fields are 16-byte aligned
 * relative to the start of the structure, i.e., don't move them!
 */
struct crypto_aes_ctx {
	u32 key_enc[AES_MAX_KEYLENGTH_U32];
	u32 key_dec[AES_MAX_KEYLENGTH_U32];
	u32 key_length;
};

extern const u32 crypto_ft_tab[4][256] ____cacheline_aligned;
extern const u32 crypto_it_tab[4][256] ____cacheline_aligned;

/*
 * validate key length for AES algorithms
 */
static inline int aes_check_keylen(unsigned int keylen)
{
	switch (keylen) {
	case AES_KEYSIZE_128:
	case AES_KEYSIZE_192:
	case AES_KEYSIZE_256:
		break;
	default:
		return -EINVAL;
	}

	return 0;
}

int crypto_aes_set_key(struct crypto_tfm *tfm, const u8 *in_key,
		unsigned int key_len);

/**
 * aes_expandkey - Expands the AES key as described in FIPS-197
 * @ctx:	The location where the computed key will be stored.
 * @in_key:	The supplied key.
 * @key_len:	The length of the supplied key.
 *
 * Returns 0 on success. The function fails only if an invalid key size (or
 * pointer) is supplied.
 * The expanded key size is 240 bytes (max of 14 rounds with a unique 16 bytes
 * key schedule plus a 16 bytes key which is used before the first round).
 * The decryption key is prepared for the "Equivalent Inverse Cipher" as
 * described in FIPS-197. The first slot (16 bytes) of each key (enc or dec) is
 * for the initial combination, the second slot for the first round and so on.
 */
int aes_expandkey(struct crypto_aes_ctx *ctx, const u8 *in_key,
		  unsigned int key_len);

/**
 * aes_encrypt - Encrypt a single AES block
 * @ctx:	Context struct containing the key schedule
 * @out:	Buffer to store the ciphertext
 * @in:		Buffer containing the plaintext
 */
void aes_encrypt(const struct crypto_aes_ctx *ctx, u8 *out, const u8 *in);

/**
 * aes_decrypt - Decrypt a single AES block
 * @ctx:	Context struct containing the key schedule
 * @out:	Buffer to store the plaintext
 * @in:		Buffer containing the ciphertext
 */
void aes_decrypt(const struct crypto_aes_ctx *ctx, u8 *out, const u8 *in);

extern const u8 crypto_aes_sbox[];
extern const u8 crypto_aes_inv_sbox[];

void aescfb_encrypt(const struct crypto_aes_ctx *ctx, u8 *dst, const u8 *src,
		    int len, const u8 iv[AES_BLOCK_SIZE]);
void aescfb_decrypt(const struct crypto_aes_ctx *ctx, u8 *dst, const u8 *src,
		    int len, const u8 iv[AES_BLOCK_SIZE]);

#endif

Filemanager

Name Type Size Permission Actions
internal Folder 0755
acompress.h File 7.7 KB 0644
aead.h File 18.89 KB 0644
aes.h File 2.74 KB 0644
akcipher.h File 11.32 KB 0644
algapi.h File 7.55 KB 0644
arc4.h File 484 B 0644
aria.h File 16.71 KB 0644
authenc.h File 635 B 0644
b128ops.h File 2.26 KB 0644
blake2b.h File 1.57 KB 0644
blake2s.h File 2.62 KB 0644
blowfish.h File 415 B 0644
cast5.h File 590 B 0644
cast6.h File 607 B 0644
cast_common.h File 232 B 0644
chacha.h File 3.32 KB 0644
chacha20poly1305.h File 1.66 KB 0644
cryptd.h File 2 KB 0644
ctr.h File 1.42 KB 0644
curve25519.h File 2.02 KB 0644
des.h File 1.68 KB 0644
dh.h File 3.03 KB 0644
drbg.h File 9.02 KB 0644
ecc_curve.h File 1.36 KB 0644
ecdh.h File 2.46 KB 0644
engine.h File 3.72 KB 0644
gcm.h File 1.48 KB 0644
gf128mul.h File 9.25 KB 0644
ghash.h File 388 B 0644
hash.h File 33.06 KB 0644
hash_info.h File 1023 B 0644
hmac.h File 173 B 0644
if_alg.h File 6.5 KB 0644
kdf_sp800108.h File 2.07 KB 0644
kpp.h File 9.53 KB 0644
md5.h File 497 B 0644
nhpoly1305.h File 2.18 KB 0644
null.h File 346 B 0644
padlock.h File 438 B 0644
pcrypt.h File 821 B 0644
pkcs7.h File 1.15 KB 0644
poly1305.h File 2.44 KB 0644
polyval.h File 445 B 0644
public_key.h File 3.39 KB 0644
rng.h File 6.61 KB 0644
scatterwalk.h File 2.74 KB 0644
serpent.h File 696 B 0644
sha1.h File 1.18 KB 0644
sha1_base.h File 2.46 KB 0644
sha2.h File 3.75 KB 0644
sha256_base.h File 3.12 KB 0644
sha3.h File 879 B 0644
sha512_base.h File 3.18 KB 0644
sig.h File 8.2 KB 0644
skcipher.h File 32.47 KB 0644
sm3.h File 1.6 KB 0644
sm3_base.h File 2.55 KB 0644
sm4.h File 1.22 KB 0644
streebog.h File 949 B 0644
twofish.h File 743 B 0644
utils.h File 1.89 KB 0644
xts.h File 978 B 0644
Filemanager