__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

[email protected]: ~ $
/* SPDX-License-Identifier: GPL-2.0 */

/*
 * Copyright (C) 2021, Stephan Mueller <[email protected]>
 */

#ifndef _CRYPTO_KDF_SELFTEST_H
#define _CRYPTO_KDF_SELFTEST_H

#include <crypto/hash.h>
#include <linux/uio.h>

struct kdf_testvec {
	unsigned char *key;
	size_t keylen;
	unsigned char *ikm;
	size_t ikmlen;
	struct kvec info;
	unsigned char *expected;
	size_t expectedlen;
};

static inline int
kdf_test(const struct kdf_testvec *test, const char *name,
	 int (*crypto_kdf_setkey)(struct crypto_shash *kmd,
				  const u8 *key, size_t keylen,
				  const u8 *ikm, size_t ikmlen),
	 int (*crypto_kdf_generate)(struct crypto_shash *kmd,
				    const struct kvec *info,
				    unsigned int info_nvec,
				    u8 *dst, unsigned int dlen))
{
	struct crypto_shash *kmd;
	int ret;
	u8 *buf = kzalloc(test->expectedlen, GFP_KERNEL);

	if (!buf)
		return -ENOMEM;

	kmd = crypto_alloc_shash(name, 0, 0);
	if (IS_ERR(kmd)) {
		pr_err("alg: kdf: could not allocate hash handle for %s\n",
		       name);
		kfree(buf);
		return -ENOMEM;
	}

	ret = crypto_kdf_setkey(kmd, test->key, test->keylen,
				test->ikm, test->ikmlen);
	if (ret) {
		pr_err("alg: kdf: could not set key derivation key\n");
		goto err;
	}

	ret = crypto_kdf_generate(kmd, &test->info, 1, buf, test->expectedlen);
	if (ret) {
		pr_err("alg: kdf: could not obtain key data\n");
		goto err;
	}

	ret = memcmp(test->expected, buf, test->expectedlen);
	if (ret)
		ret = -EINVAL;

err:
	crypto_free_shash(kmd);
	kfree(buf);
	return ret;
}

#endif /* _CRYPTO_KDF_SELFTEST_H */

Filemanager

Name Type Size Permission Actions
acompress.h File 3.18 KB 0644
aead.h File 4.03 KB 0644
akcipher.h File 3.84 KB 0644
blake2b.h File 3.06 KB 0644
blake2s.h File 586 B 0644
chacha.h File 969 B 0644
cipher.h File 6.77 KB 0644
des.h File 3.25 KB 0644
ecc.h File 9.6 KB 0644
engine.h File 2.19 KB 0644
geniv.h File 702 B 0644
hash.h File 6.25 KB 0644
kdf_selftest.h File 1.5 KB 0644
kpp.h File 7.04 KB 0644
poly1305.h File 1.1 KB 0644
rng.h File 1021 B 0644
rsa.h File 2.24 KB 0644
scompress.h File 3.31 KB 0644
sig.h File 2.32 KB 0644
simd.h File 1.91 KB 0644
skcipher.h File 7.26 KB 0644
Filemanager