forked from Qortal/Brooklyn
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
23 lines
652 B
C
23 lines
652 B
C
#ifndef _XOR_H
|
|
#define _XOR_H
|
|
|
|
#define MAX_XOR_BLOCKS 4
|
|
|
|
extern void xor_blocks(unsigned int count, unsigned int bytes,
|
|
void *dest, void **srcs);
|
|
|
|
struct xor_block_template {
|
|
struct xor_block_template *next;
|
|
const char *name;
|
|
int speed;
|
|
void (*do_2)(unsigned long, unsigned long *, unsigned long *);
|
|
void (*do_3)(unsigned long, unsigned long *, unsigned long *,
|
|
unsigned long *);
|
|
void (*do_4)(unsigned long, unsigned long *, unsigned long *,
|
|
unsigned long *, unsigned long *);
|
|
void (*do_5)(unsigned long, unsigned long *, unsigned long *,
|
|
unsigned long *, unsigned long *, unsigned long *);
|
|
};
|
|
|
|
#endif
|