Server IP : 128.199.20.84 / Your IP : 108.162.216.211 Web Server : Apache/2.4.41 (Ubuntu) System : Linux competent-maruti 5.4.0-128-generic #144-Ubuntu SMP Tue Sep 20 11:00:04 UTC 2022 x86_64 User : www-data ( 33) PHP Version : 8.0.20 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF Directory (0755) : /home/../usr/src/linux-headers-5.4.0-128/include/crypto/ |
[ Home ] | [ C0mmand ] | [ Upload File ] |
---|
/* SPDX-License-Identifier: GPL-2.0 */ /* * DES & Triple DES EDE Cipher Algorithms. */ #ifndef __CRYPTO_DES_H #define __CRYPTO_DES_H #include <linux/types.h> #define DES_KEY_SIZE 8 #define DES_EXPKEY_WORDS 32 #define DES_BLOCK_SIZE 8 #define DES3_EDE_KEY_SIZE (3 * DES_KEY_SIZE) #define DES3_EDE_EXPKEY_WORDS (3 * DES_EXPKEY_WORDS) #define DES3_EDE_BLOCK_SIZE DES_BLOCK_SIZE struct des_ctx { u32 expkey[DES_EXPKEY_WORDS]; }; struct des3_ede_ctx { u32 expkey[DES3_EDE_EXPKEY_WORDS]; }; void des_encrypt(const struct des_ctx *ctx, u8 *dst, const u8 *src); void des_decrypt(const struct des_ctx *ctx, u8 *dst, const u8 *src); void des3_ede_encrypt(const struct des3_ede_ctx *dctx, u8 *dst, const u8 *src); void des3_ede_decrypt(const struct des3_ede_ctx *dctx, u8 *dst, const u8 *src); /** * des_expand_key - Expand a DES input key into a key schedule * @ctx: the key schedule * @key: buffer containing the input key * @len: size of the buffer contents * * Returns 0 on success, -EINVAL if the input key is rejected and -ENOKEY if * the key is accepted but has been found to be weak. */ int des_expand_key(struct des_ctx *ctx, const u8 *key, unsigned int keylen); /** * des3_ede_expand_key - Expand a triple DES input key into a key schedule * @ctx: the key schedule * @key: buffer containing the input key * @len: size of the buffer contents * * Returns 0 on success, -EINVAL if the input key is rejected and -ENOKEY if * the key is accepted but has been found to be weak. Note that weak keys will * be rejected (and -EINVAL will be returned) when running in FIPS mode. */ int des3_ede_expand_key(struct des3_ede_ctx *ctx, const u8 *key, unsigned int keylen); #endif /* __CRYPTO_DES_H */