Home
last modified time | relevance | path

Searched full:aad (Results 1 – 25 of 87) sorted by relevance

1234

/linux-6.14.4/net/mac80211/
Dwpa.c315 * Calculate AAD for CCMP/GCMP, returning qos_tid since we
318 static u8 ccmp_gcmp_aad(struct sk_buff *skb, u8 *aad, bool spp_amsdu) in ccmp_gcmp_aad() argument
357 /* AAD (extra authenticate-only data) / masked 802.11 header in ccmp_gcmp_aad()
359 put_unaligned_be16(len_a, &aad[0]); in ccmp_gcmp_aad()
360 put_unaligned(mask_fc, (__le16 *)&aad[2]); in ccmp_gcmp_aad()
361 memcpy(&aad[4], &hdr->addrs, 3 * ETH_ALEN); in ccmp_gcmp_aad()
364 aad[22] = *((u8 *) &hdr->seq_ctrl) & 0x0f; in ccmp_gcmp_aad()
365 aad[23] = 0; in ccmp_gcmp_aad()
368 memcpy(&aad[24], hdr->addr4, ETH_ALEN); in ccmp_gcmp_aad()
369 aad[30] = qos_tid; in ccmp_gcmp_aad()
[all …]
Daes_ccm.h22 u8 *b_0, u8 *aad, u8 *data, in ieee80211_aes_ccm_encrypt() argument
25 return aead_encrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_encrypt()
26 be16_to_cpup((__be16 *)aad), in ieee80211_aes_ccm_encrypt()
32 u8 *b_0, u8 *aad, u8 *data, in ieee80211_aes_ccm_decrypt() argument
35 return aead_decrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_decrypt()
36 be16_to_cpup((__be16 *)aad), in ieee80211_aes_ccm_decrypt()
Daes_gcm.h14 u8 *j_0, u8 *aad, u8 *data, in ieee80211_aes_gcm_encrypt() argument
17 return aead_encrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_encrypt()
18 be16_to_cpup((__be16 *)aad), in ieee80211_aes_gcm_encrypt()
23 u8 *j_0, u8 *aad, u8 *data, in ieee80211_aes_gcm_decrypt() argument
26 return aead_decrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_decrypt()
27 be16_to_cpup((__be16 *)aad), in ieee80211_aes_gcm_decrypt()
Daes_cmac.c25 void ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad, in ieee80211_aes_cmac() argument
35 crypto_shash_update(desc, aad, AAD_LEN); in ieee80211_aes_cmac()
36 fc = (const __le16 *)aad; in ieee80211_aes_cmac()
49 void ieee80211_aes_cmac_256(struct crypto_shash *tfm, const u8 *aad, in ieee80211_aes_cmac_256() argument
58 crypto_shash_update(desc, aad, AAD_LEN); in ieee80211_aes_cmac_256()
59 fc = (const __le16 *)aad; in ieee80211_aes_cmac_256()
Daead_api.c18 int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len, in aead_encrypt() argument
33 memcpy(__aad, aad, aad_len); in aead_encrypt()
50 int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len, in aead_decrypt() argument
68 memcpy(__aad, aad, aad_len); in aead_decrypt()
Daes_gmac.c17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument
36 memcpy(__aad, aad, GMAC_AAD_LEN); in ieee80211_aes_gmac()
38 fc = (const __le16 *)aad; in ieee80211_aes_gmac()
Daes_cmac.h14 void ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad,
16 void ieee80211_aes_cmac_256(struct crypto_shash *tfm, const u8 *aad,
Daead_api.h13 int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
17 int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
/linux-6.14.4/Documentation/devicetree/bindings/memory-controllers/
Dti,gpmc-child.yaml54 gpmc,adv-aad-mux-on-ns:
55 description: Assertion time for AAD
58 gpmc,adv-aad-mux-rd-off-ns:
59 description: Read deassertion time for AAD
62 gpmc,adv-aad-mux-wr-off-ns:
63 description: Write deassertion time for AAD
84 gpmc,oe-aad-mux-on-ns:
85 description: Assertion time for AAD
88 gpmc,oe-aad-mux-off-ns:
89 description: Deassertion time for AAD
/linux-6.14.4/drivers/net/wireless/intel/ipw2x00/
Dlibipw_crypto_ccmp.c88 const u8 *pn, u8 *iv, u8 *aad) in ccmp_init_iv_and_aad() argument
122 /* AAD: in ccmp_init_iv_and_aad()
130 aad[0] = pos[0] & 0x8f; in ccmp_init_iv_and_aad()
131 aad[1] = pos[1] & 0xc7; in ccmp_init_iv_and_aad()
132 memcpy(aad + 2, &hdr->addrs, 3 * ETH_ALEN); in ccmp_init_iv_and_aad()
134 aad[20] = pos[0] & 0x0f; in ccmp_init_iv_and_aad()
135 aad[21] = 0; /* all bits masked */ in ccmp_init_iv_and_aad()
136 memset(aad + 22, 0, 8); in ccmp_init_iv_and_aad()
138 memcpy(aad + 22, hdr->addr4, ETH_ALEN); in ccmp_init_iv_and_aad()
140 aad[a4_included ? 28 : 22] = qc; in ccmp_init_iv_and_aad()
[all …]
/linux-6.14.4/sound/soc/codecs/
Dda7219-aad.c3 * da7219-aad.c - Dialog DA7219 ALSA SoC AAD Driver
24 #include "da7219-aad.h"
35 da7219->aad->jack = jack; in da7219_aad_jack_det()
36 da7219->aad->jack_inserted = false; in da7219_aad_jack_det()
766 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_handle_pdata()
899 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_handle_gnd_switch_time()
930 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_suspend()
964 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_resume()
993 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_init()
1008 da7219_aad->aad_wq = create_singlethread_workqueue("da7219-aad"); in da7219_aad_init()
[all …]
Dda7219-aad.h3 * da7219-aad.h - DA7322 ASoC AAD Driver
17 #include <sound/da7219-aad.h>
208 /* AAD control */
/linux-6.14.4/net/tls/
Dtls_device_fallback.c52 struct crypto_aead *aead, char *aad, in tls_enc_record() argument
85 tls_make_aad(aad, len - cipher_desc->tag, (char *)&rcd_sn, buf[0], prot); in tls_enc_record()
91 sg_set_buf(sg_in, aad, TLS_AAD_SPACE_SIZE); in tls_enc_record()
92 sg_set_buf(sg_out, aad, TLS_AAD_SPACE_SIZE); in tls_enc_record()
149 struct scatterlist *sg_out, char *aad, char *iv, in tls_enc_records() argument
159 rc = tls_enc_record(aead_req, aead, aad, iv, in tls_enc_records()
327 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local
348 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb()
349 dummy_buf = aad + TLS_AAD_SPACE_SIZE; in tls_enc_skb()
360 if (tls_enc_records(aead_req, ctx->aead_send, sg_in, sg_out, aad, iv, in tls_enc_skb()
/linux-6.14.4/include/linux/platform_data/
Dgpmc-omap.h43 u32 adv_aad_mux_on; /* ADV assertion time for AAD */
44 u32 adv_aad_mux_rd_off; /* ADV read deassertion time for AAD */
45 u32 adv_aad_mux_wr_off; /* ADV write deassertion time for AAD */
54 u32 oe_aad_mux_on; /* OE assertion time for AAD */
55 u32 oe_aad_mux_off; /* OE deassertion time for AAD */
/linux-6.14.4/arch/powerpc/crypto/
Daes-gcm-p10-glue.c44 unsigned char *aad, unsigned int alen);
91 * Compute aad if any.
92 * - Hash aad and copy to Xi.
95 unsigned char *aad, int alen) in set_aad() argument
103 gcm_ghash_p10(nXi, hash->Htable+32, aad, i); in set_aad()
104 aad += i; in set_aad()
109 nXi[i] ^= aad[i]; in set_aad()
168 * hash (AAD len and len) in finish_tag()
/linux-6.14.4/drivers/clk/imx/
Dclk-imx35.c88 struct arm_ahb_div *aad; in _mx35_clocks_init() local
96 aad = &clk_consumer[consumer_sel]; in _mx35_clocks_init()
97 if (!aad->arm) { in _mx35_clocks_init()
103 aad = &clk_consumer[0]; in _mx35_clocks_init()
113 if (aad->sel) in _mx35_clocks_init()
114 clk[arm] = imx_clk_fixed_factor("arm", "mpll_075", 1, aad->arm); in _mx35_clocks_init()
116 clk[arm] = imx_clk_fixed_factor("arm", "mpll", 1, aad->arm); in _mx35_clocks_init()
131 clk[ahb] = imx_clk_fixed_factor("ahb", "arm", 1, aad->ahb); in _mx35_clocks_init()
/linux-6.14.4/crypto/
Dalgif_aead.c56 * the AAD and in case of decryption the tag. in aead_sufficient_data()
200 * Copy of AAD from source to destination in _aead_recvmsg()
202 * The AAD is copied to the destination buffer without change. Even in _aead_recvmsg()
220 * TX SGL: AAD || PT in _aead_recvmsg()
224 * RX SGL: AAD || PT || Tag in _aead_recvmsg()
237 * TX SGL: AAD || CT || Tag in _aead_recvmsg()
241 * RX SGL: AAD || CT ----+ in _aead_recvmsg()
244 /* Copy AAD || CT to RX SGL buffer for in-place operation. */ in _aead_recvmsg()
/linux-6.14.4/drivers/crypto/bcm/
Dcipher.h169 /* SPU request msg padding for GCM AAD */
204 * context. For SPU-M, the payload is the combination of AAD and data.
282 * API src scatterlist for AEAD starts with AAD, if present. For first
283 * chunk, src_sg is sg entry at beginning of input data (after AAD).
291 * Same for destination. For AEAD, if there is AAD, output data must
292 * be written at offset following AAD.
/linux-6.14.4/include/sound/
Dda7219-aad.h3 * da7219-aad.h - DA7322 ASoC Codec AAD Driver Platform Data
/linux-6.14.4/Documentation/crypto/
Duserspace-if.rst235 - specification of the associated authentication data (AAD) with the
236 flag ALG_SET_AEAD_ASSOCLEN. The AAD is sent to the kernel together
265 - associated authentication data (AAD)
269 The sizes of the AAD and the authentication tag are provided with the
277 - AEAD encryption input: AAD \|\| plaintext
279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
/linux-6.14.4/drivers/crypto/intel/keembay/
Dkeembay-ocs-aes-core.c74 * @aad_src_dll: OCS DMA linked list for input AAD data.
75 * @aad_dst_dll: OCS DMA linked list for output AAD data.
738 * - src sg list is: AAD|CT|tag in kmb_ocs_aead_dma_prepare()
739 * - dst sg list expects: AAD|PT in kmb_ocs_aead_dma_prepare()
750 /* len(dst_sg) == len(AAD) + len(PT) */ in kmb_ocs_aead_dma_prepare()
764 * src sg list is: AAD|PT in kmb_ocs_aead_dma_prepare()
765 * dst sg list expects: AAD|CT|tag in kmb_ocs_aead_dma_prepare()
777 /* len(dst_sg) == len(AAD) + len(CT) + len(tag) */ in kmb_ocs_aead_dma_prepare()
799 /* Create AAD DST list: maps dst[0:AAD_SIZE-1]. */ in kmb_ocs_aead_dma_prepare()
831 * SRC and AAD SRC lists, even for the in-place case. in kmb_ocs_aead_dma_prepare()
[all …]
Docs-aes.c714 /* If aad present ensure aad linked list is created */ in ocs_aes_validate_inputs()
738 /* If aad present ensure aad linked list is created */ in ocs_aes_validate_inputs()
918 * @aad_dma_list: The OCS DMA list mapping input AAD data.
967 /* Write aad bit length */ in ocs_aes_gcm_op()
977 /* Process AAD. */ in ocs_aes_gcm_op()
979 /* If aad present, configure DMA to feed it to the engine. */ in ocs_aes_gcm_op()
983 /* Instructs engine to pad last block of aad, if needed. */ in ocs_aes_gcm_op()
1071 /* If there is AAD data, set the Adata flag. */ in ocs_aes_ccm_write_b0()
1165 /* Since no aad the LAST_GCX bit can be set now */ in ocs_aes_ccm_do_adata()
/linux-6.14.4/arch/s390/include/asm/
Dcpacf.h177 #define CPACF_KMA_LAAD 0x200 /* Last-AAD */
694 * @aad: address of additional authenticated data memory area
695 * @aad_len: length of aad operand in bytes
699 const u8 *aad, unsigned long aad_len) in cpacf_kma() argument
706 a.even = (unsigned long)aad; in cpacf_kma()
711 "0: .insn rrf,%[opc] << 16,%[dst],%[src],%[aad],0\n" in cpacf_kma()
714 [aad] "+&d" (a.pair) in cpacf_kma()
/linux-6.14.4/drivers/crypto/nx/
Dnx-aes-ccm.c172 * Note: RFC3610 allows the AAD data to be up to 2^64 -1 bytes in generate_pat()
174 * restricts the maximum AAD length to 2^32 -1 bytes. in generate_pat()
176 * 2^64 -1 bytes maximum AAD length. in generate_pat()
181 * Thus the AAD is further constrained by this and is never in generate_pat()
230 /* now copy any remaining AAD to scatterlist and call nx... */ in generate_pat()
/linux-6.14.4/security/apparmor/include/
Daudit.h168 #define aad(SA) (container_of(SA, struct apparmor_audit_data, common)) macro
169 #define aad_of_va(VA) aad((struct common_audit_data *)(VA))

1234