/openbmc/linux/net/mac80211/ |
H A D | wpa.c | 315 * Calculate AAD for CCMP/GCMP, returning qos_tid since we 318 static u8 ccmp_gcmp_aad(struct sk_buff *skb, u8 *aad) in ccmp_gcmp_aad() argument 350 /* AAD (extra authenticate-only data) / masked 802.11 header in ccmp_gcmp_aad() 352 put_unaligned_be16(len_a, &aad[0]); in ccmp_gcmp_aad() 353 put_unaligned(mask_fc, (__le16 *)&aad[2]); in ccmp_gcmp_aad() 354 memcpy(&aad[4], &hdr->addrs, 3 * ETH_ALEN); in ccmp_gcmp_aad() 357 aad[22] = *((u8 *) &hdr->seq_ctrl) & 0x0f; in ccmp_gcmp_aad() 358 aad[23] = 0; in ccmp_gcmp_aad() 361 memcpy(&aad[24], hdr->addr4, ETH_ALEN); in ccmp_gcmp_aad() 362 aad[30] = qos_tid; in ccmp_gcmp_aad() [all …]
|
H A D | aes_gcm.h | 14 u8 *j_0, u8 *aad, u8 *data, in ieee80211_aes_gcm_encrypt() argument 17 return aead_encrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_encrypt() 18 be16_to_cpup((__be16 *)aad), in ieee80211_aes_gcm_encrypt() 23 u8 *j_0, u8 *aad, u8 *data, in ieee80211_aes_gcm_decrypt() argument 26 return aead_decrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_decrypt() 27 be16_to_cpup((__be16 *)aad), in ieee80211_aes_gcm_decrypt()
|
H A D | aes_ccm.h | 22 u8 *b_0, u8 *aad, u8 *data, in ieee80211_aes_ccm_encrypt() argument 25 return aead_encrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_encrypt() 26 be16_to_cpup((__be16 *)aad), in ieee80211_aes_ccm_encrypt() 32 u8 *b_0, u8 *aad, u8 *data, in ieee80211_aes_ccm_decrypt() argument 35 return aead_decrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_decrypt() 36 be16_to_cpup((__be16 *)aad), in ieee80211_aes_ccm_decrypt()
|
H A D | aes_cmac.c | 25 void ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad, in ieee80211_aes_cmac() argument 35 crypto_shash_update(desc, aad, AAD_LEN); in ieee80211_aes_cmac() 36 fc = (const __le16 *)aad; in ieee80211_aes_cmac() 49 void ieee80211_aes_cmac_256(struct crypto_shash *tfm, const u8 *aad, in ieee80211_aes_cmac_256() argument 58 crypto_shash_update(desc, aad, AAD_LEN); in ieee80211_aes_cmac_256() 59 fc = (const __le16 *)aad; in ieee80211_aes_cmac_256()
|
H A D | aead_api.c | 18 int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len, in aead_encrypt() argument 33 memcpy(__aad, aad, aad_len); in aead_encrypt() 50 int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len, in aead_decrypt() argument 68 memcpy(__aad, aad, aad_len); in aead_decrypt()
|
H A D | aes_gmac.c | 17 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 36 memcpy(__aad, aad, GMAC_AAD_LEN); in ieee80211_aes_gmac() 38 fc = (const __le16 *)aad; in ieee80211_aes_gmac()
|
H A D | aead_api.h | 13 int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, 17 int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
|
H A D | aes_cmac.h | 14 void ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad, 16 void ieee80211_aes_cmac_256(struct crypto_shash *tfm, const u8 *aad,
|
/openbmc/linux/drivers/staging/rtl8192u/ieee80211/ |
H A D | ieee80211_crypt_ccmp.c | 93 u8 *pn, u8 *iv, u8 *aad) in ccmp_init_iv_and_aad() argument 134 /* AAD: in ccmp_init_iv_and_aad() 142 aad[0] = pos[0] & 0x8f; in ccmp_init_iv_and_aad() 143 aad[1] = pos[1] & 0xc7; in ccmp_init_iv_and_aad() 144 memcpy(&aad[2], &hdr->addr1, ETH_ALEN); in ccmp_init_iv_and_aad() 145 memcpy(&aad[8], &hdr->addr2, ETH_ALEN); in ccmp_init_iv_and_aad() 146 memcpy(&aad[14], &hdr->addr3, ETH_ALEN); in ccmp_init_iv_and_aad() 148 aad[20] = pos[0] & 0x0f; in ccmp_init_iv_and_aad() 149 aad[21] = 0; /* all bits masked */ in ccmp_init_iv_and_aad() 150 memset(aad + 22, 0, 8); in ccmp_init_iv_and_aad() [all …]
|
/openbmc/linux/drivers/staging/rtl8192e/ |
H A D | rtllib_crypt_ccmp.c | 87 u8 *pn, u8 *iv, u8 *aad) in ccmp_init_iv_and_aad() argument 124 /* AAD: in ccmp_init_iv_and_aad() 132 aad[0] = pos[0] & 0x8f; in ccmp_init_iv_and_aad() 133 aad[1] = pos[1] & 0xc7; in ccmp_init_iv_and_aad() 134 memcpy(&aad[2], &hdr->addr1, ETH_ALEN); in ccmp_init_iv_and_aad() 135 memcpy(&aad[8], &hdr->addr2, ETH_ALEN); in ccmp_init_iv_and_aad() 136 memcpy(&aad[14], &hdr->addr3, ETH_ALEN); in ccmp_init_iv_and_aad() 138 aad[20] = pos[0] & 0x0f; in ccmp_init_iv_and_aad() 139 aad[21] = 0; /* all bits masked */ in ccmp_init_iv_and_aad() 140 memset(aad + 22, 0, 8); in ccmp_init_iv_and_aad() [all …]
|
/openbmc/linux/Documentation/devicetree/bindings/memory-controllers/ |
H A D | ti,gpmc-child.yaml | 54 gpmc,adv-aad-mux-on-ns: 55 description: Assertion time for AAD 58 gpmc,adv-aad-mux-rd-off-ns: 59 description: Read deassertion time for AAD 62 gpmc,adv-aad-mux-wr-off-ns: 63 description: Write deassertion time for AAD 84 gpmc,oe-aad-mux-on-ns: 85 description: Assertion time for AAD 88 gpmc,oe-aad-mux-off-ns: 89 description: Deassertion time for AAD
|
/openbmc/linux/net/wireless/ |
H A D | lib80211_crypt_ccmp.c | 95 const u8 *pn, u8 *iv, u8 *aad) in ccmp_init_iv_and_aad() argument 129 /* AAD: in ccmp_init_iv_and_aad() 137 aad[0] = pos[0] & 0x8f; in ccmp_init_iv_and_aad() 138 aad[1] = pos[1] & 0xc7; in ccmp_init_iv_and_aad() 139 memcpy(aad + 2, &hdr->addrs, 3 * ETH_ALEN); in ccmp_init_iv_and_aad() 141 aad[20] = pos[0] & 0x0f; in ccmp_init_iv_and_aad() 142 aad[21] = 0; /* all bits masked */ in ccmp_init_iv_and_aad() 143 memset(aad + 22, 0, 8); in ccmp_init_iv_and_aad() 145 memcpy(aad + 22, hdr->addr4, ETH_ALEN); in ccmp_init_iv_and_aad() 147 aad[a4_included ? 28 : 22] = qc; in ccmp_init_iv_and_aad() [all …]
|
/openbmc/linux/sound/soc/codecs/ |
H A D | da7219-aad.c | 3 * da7219-aad.c - Dialog DA7219 ALSA SoC AAD Driver 24 #include "da7219-aad.h" 35 da7219->aad->jack = jack; in da7219_aad_jack_det() 36 da7219->aad->jack_inserted = false; in da7219_aad_jack_det() 766 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_handle_pdata() 899 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_handle_gnd_switch_time() 930 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_suspend() 961 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_resume() 988 struct da7219_aad_priv *da7219_aad = da7219->aad; in da7219_aad_init() 1003 da7219_aad->aad_wq = create_singlethread_workqueue("da7219-aad"); in da7219_aad_init() [all …]
|
H A D | da7219-aad.h | 3 * da7219-aad.h - DA7322 ASoC AAD Driver 17 #include <sound/da7219-aad.h> 208 /* AAD control */
|
/openbmc/linux/arch/powerpc/crypto/ |
H A D | aes-gcm-p10-glue.c | 42 unsigned char *aad, unsigned int alen); 84 * Compute aad if any. 85 * - Hash aad and copy to Xi. 88 unsigned char *aad, int alen) in set_aad() argument 96 gcm_ghash_p10(nXi, hash->Htable+32, aad, i); in set_aad() 97 aad += i; in set_aad() 102 nXi[i] ^= aad[i]; in set_aad() 161 * hash (AAD len and len) in finish_tag()
|
/openbmc/linux/net/tls/ |
H A D | tls_device_fallback.c | 51 struct crypto_aead *aead, char *aad, in tls_enc_record() argument 90 tls_make_aad(aad, len - cipher_desc->tag, (char *)&rcd_sn, buf[0], prot); in tls_enc_record() 96 sg_set_buf(sg_in, aad, TLS_AAD_SPACE_SIZE); in tls_enc_record() 97 sg_set_buf(sg_out, aad, TLS_AAD_SPACE_SIZE); in tls_enc_record() 154 struct scatterlist *sg_out, char *aad, char *iv, in tls_enc_records() argument 164 rc = tls_enc_record(aead_req, aead, aad, iv, in tls_enc_records() 332 void *buf, *iv, *aad, *dummy_buf, *salt; in tls_enc_skb() local 360 aad = buf + cipher_desc->salt + cipher_desc->iv; in tls_enc_skb() 361 dummy_buf = aad + TLS_AAD_SPACE_SIZE; in tls_enc_skb() 372 if (tls_enc_records(aead_req, ctx->aead_send, sg_in, sg_out, aad, iv, in tls_enc_skb()
|
/openbmc/linux/include/linux/platform_data/ |
H A D | gpmc-omap.h | 43 u32 adv_aad_mux_on; /* ADV assertion time for AAD */ 44 u32 adv_aad_mux_rd_off; /* ADV read deassertion time for AAD */ 45 u32 adv_aad_mux_wr_off; /* ADV write deassertion time for AAD */ 54 u32 oe_aad_mux_on; /* OE assertion time for AAD */ 55 u32 oe_aad_mux_off; /* OE deassertion time for AAD */
|
/openbmc/linux/drivers/clk/imx/ |
H A D | clk-imx35.c | 88 struct arm_ahb_div *aad; in _mx35_clocks_init() local 96 aad = &clk_consumer[consumer_sel]; in _mx35_clocks_init() 97 if (!aad->arm) { in _mx35_clocks_init() 103 aad = &clk_consumer[0]; in _mx35_clocks_init() 113 if (aad->sel) in _mx35_clocks_init() 114 clk[arm] = imx_clk_fixed_factor("arm", "mpll_075", 1, aad->arm); in _mx35_clocks_init() 116 clk[arm] = imx_clk_fixed_factor("arm", "mpll", 1, aad->arm); in _mx35_clocks_init() 131 clk[ahb] = imx_clk_fixed_factor("ahb", "arm", 1, aad->ahb); in _mx35_clocks_init()
|
/openbmc/linux/arch/x86/crypto/ |
H A D | aesni-intel_asm.S | 249 .macro GCM_INIT Iv SUBKEY AAD AADLEN 267 CALC_AAD_HASH %xmm13, \AAD, \AADLEN, %xmm0, %xmm1, %xmm2, %xmm3, \ 594 .macro CALC_AAD_HASH HASHKEY AAD AADLEN TMP1 TMP2 TMP3 TMP4 TMP5 \ 597 mov \AAD, %r10 # %r10 = AAD 606 pshufb %xmm14, \TMP7 # byte-reflect the AAD data 616 /* read the last <16B of AAD */ 622 pshufb %xmm14, \TMP7 # byte-reflect the AAD data 1521 * const u8 *aad, // Additional Authentication Data (AAD) 1522 * u64 aad_len, // Length of AAD in bytes. With RFC4106 this is going to be … 1548 * AAD: [all …]
|
/openbmc/linux/crypto/ |
H A D | algif_aead.c | 56 * the AAD and in case of decryption the tag. in aead_sufficient_data() 200 * Copy of AAD from source to destination in _aead_recvmsg() 202 * The AAD is copied to the destination buffer without change. Even in _aead_recvmsg() 220 * TX SGL: AAD || PT in _aead_recvmsg() 224 * RX SGL: AAD || PT || Tag in _aead_recvmsg() 237 * TX SGL: AAD || CT || Tag in _aead_recvmsg() 241 * RX SGL: AAD || CT ----+ in _aead_recvmsg() 244 /* Copy AAD || CT to RX SGL buffer for in-place operation. */ in _aead_recvmsg()
|
/openbmc/linux/drivers/crypto/bcm/ |
H A D | cipher.h | 169 /* SPU request msg padding for GCM AAD */ 204 * context. For SPU-M, the payload is the combination of AAD and data. 282 * API src scatterlist for AEAD starts with AAD, if present. For first 283 * chunk, src_sg is sg entry at beginning of input data (after AAD). 291 * Same for destination. For AEAD, if there is AAD, output data must 292 * be written at offset following AAD.
|
/openbmc/linux/include/sound/ |
H A D | da7219-aad.h | 3 * da7219-aad.h - DA7322 ASoC Codec AAD Driver Platform Data
|
/openbmc/linux/Documentation/crypto/ |
H A D | userspace-if.rst | 235 - specification of the associated authentication data (AAD) with the 236 flag ALG_SET_AEAD_ASSOCLEN. The AAD is sent to the kernel together 265 - associated authentication data (AAD) 269 The sizes of the AAD and the authentication tag are provided with the 277 - AEAD encryption input: AAD \|\| plaintext 279 - AEAD decryption input: AAD \|\| ciphertext \|\| authentication tag
|
/openbmc/linux/arch/s390/include/asm/ |
H A D | cpacf.h | 164 #define CPACF_KMA_LAAD 0x200 /* Last-AAD */ 594 * @aad: address of additional authenticated data memory area 595 * @aad_len: length of aad operand in bytes 599 const u8 *aad, unsigned long aad_len) in cpacf_kma() argument 606 a.even = (unsigned long)aad; in cpacf_kma() 611 "0: .insn rrf,%[opc] << 16,%[dst],%[src],%[aad],0\n" in cpacf_kma() 614 [aad] "+&d" (a.pair) in cpacf_kma()
|
/openbmc/linux/drivers/crypto/intel/keembay/ |
H A D | keembay-ocs-aes-core.c | 74 * @aad_src_dll: OCS DMA linked list for input AAD data. 75 * @aad_dst_dll: OCS DMA linked list for output AAD data. 738 * - src sg list is: AAD|CT|tag in kmb_ocs_aead_dma_prepare() 739 * - dst sg list expects: AAD|PT in kmb_ocs_aead_dma_prepare() 750 /* len(dst_sg) == len(AAD) + len(PT) */ in kmb_ocs_aead_dma_prepare() 764 * src sg list is: AAD|PT in kmb_ocs_aead_dma_prepare() 765 * dst sg list expects: AAD|CT|tag in kmb_ocs_aead_dma_prepare() 777 /* len(dst_sg) == len(AAD) + len(CT) + len(tag) */ in kmb_ocs_aead_dma_prepare() 799 /* Create AAD DST list: maps dst[0:AAD_SIZE-1]. */ in kmb_ocs_aead_dma_prepare() 831 * SRC and AAD SRC lists, even for the in-place case. in kmb_ocs_aead_dma_prepare() [all …]
|