aad
gcm_ghash_p10(nXi, hash->Htable+32, aad, i);
aad += i;
nXi[i] ^= aad[i];
unsigned char *aad, unsigned int alen);
unsigned char *aad, int alen)
const u8 *aad, unsigned long aad_len)
a.even = (unsigned long)aad;
[aad] "+&d" (a.pair)
u8 ghash_acc[16], const u8 *aad, int aadlen);
u8 ghash_acc[16], const u8 *aad, int aadlen);
u8 ghash_acc[16], const u8 *aad, int aadlen);
u8 ghash_acc[16], const u8 *aad, int aadlen);
const u8 *aad, int aadlen, int flags)
ghash_acc, aad, aadlen);
ghash_acc, aad, aadlen);
aad, aadlen);
aad, aadlen);
aad = &clk_consumer[0];
if (aad->sel)
clk[arm] = imx_clk_fixed_factor("arm", "mpll_075", 1, aad->arm);
clk[arm] = imx_clk_fixed_factor("arm", "mpll", 1, aad->arm);
clk[ahb] = imx_clk_fixed_factor("ahb", "arm", 1, aad->ahb);
struct arm_ahb_div *aad;
aad = &clk_consumer[consumer_sel];
if (!aad->arm) {
struct ccp_data aad;
ret = ccp_init_data(&wa->aad, cmd_q, p_aad, aes->aad_len,
while (wa->aad.sg_wa.bytes_left) {
ccp_prepare_data(&wa->aad, NULL, &wa->op, AES_BLOCK_SIZE, true);
ccp_process_data(&wa->aad, NULL, &wa->op);
ccp_free_data(&wa->aad, cmd_q);
struct sa_cmdl_param_info aad;
aad[0] = pos[0] & 0x8f;
aad[1] = pos[1] & 0xc7;
memcpy(aad + 2, &hdr->addrs, 3 * ETH_ALEN);
aad[20] = pos[0] & 0x0f;
aad[21] = 0; /* all bits masked */
memset(aad + 22, 0, 8);
memcpy(aad + 22, hdr->addr4, ETH_ALEN);
aad[a4_included ? 28 : 22] = qc;
u8 *aad = key->tx_aad;
aad_len = ccmp_init_iv_and_aad(hdr, key->tx_pn, iv, aad);
sg_set_buf(&sg[0], aad, aad_len);
u8 *aad = key->rx_aad;
aad_len = ccmp_init_iv_and_aad(hdr, pn, iv, aad);
sg_set_buf(&sg[0], aad, aad_len);
const u8 *pn, u8 *iv, u8 *aad)
int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len,
memcpy(__aad, aad, aad_len);
int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len,
memcpy(__aad, aad, aad_len);
int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
u8 *b_0, u8 *aad, u8 *data,
return aead_encrypt(tfm, b_0, aad + 2,
be16_to_cpup((__be16 *)aad),
u8 *b_0, u8 *aad, u8 *data,
return aead_decrypt(tfm, b_0, aad + 2,
be16_to_cpup((__be16 *)aad),
int ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad,
err = crypto_shash_update(desc, aad, AAD_LEN);
fc = (const __le16 *)aad;
int ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad,
u8 *j_0, u8 *aad, u8 *data,
return aead_encrypt(tfm, j_0, aad + 2,
be16_to_cpup((__be16 *)aad),
u8 *j_0, u8 *aad, u8 *data,
return aead_decrypt(tfm, j_0, aad + 2,
be16_to_cpup((__be16 *)aad),
int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
memcpy(__aad, aad, GMAC_AAD_LEN);
fc = (const __le16 *)aad;
int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce,
bip_aad(skb, aad);
if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce,
static u8 ccmp_gcmp_aad(struct sk_buff *skb, u8 *aad, bool spp_amsdu)
put_unaligned_be16(len_a, &aad[0]);
put_unaligned(mask_fc, (__le16 *)&aad[2]);
memcpy(&aad[4], &hdr->addrs, 3 * ETH_ALEN);
aad[22] = *((u8 *) &hdr->seq_ctrl) & 0x0f;
aad[23] = 0;
memcpy(&aad[24], hdr->addr4, ETH_ALEN);
aad[30] = qos_tid;
aad[31] = 0;
memset(&aad[24], 0, ETH_ALEN + IEEE80211_QOS_CTL_LEN);
aad[24] = qos_tid;
static void ccmp_special_blocks(struct sk_buff *skb, u8 *pn, u8 *b_0, u8 *aad,
u8 qos_tid = ccmp_gcmp_aad(skb, aad, spp_amsdu);
u8 aad[CCM_AAD_LEN];
ccmp_special_blocks(skb, pn, b_0, aad,
return ieee80211_aes_ccm_encrypt(key->u.ccmp.tfm, b_0, aad, pos, len,
u8 aad[2 * AES_BLOCK_SIZE];
ccmp_special_blocks(skb, pn, b_0, aad,
key->u.ccmp.tfm, b_0, aad,
static void gcmp_special_blocks(struct sk_buff *skb, u8 *pn, u8 *j_0, u8 *aad,
ccmp_gcmp_aad(skb, aad, spp_amsdu);
u8 aad[GCM_AAD_LEN];
gcmp_special_blocks(skb, pn, j_0, aad,
return ieee80211_aes_gcm_encrypt(key->u.gcmp.tfm, j_0, aad, pos, len,
u8 aad[2 * AES_BLOCK_SIZE];
gcmp_special_blocks(skb, pn, j_0, aad,
key->u.gcmp.tfm, j_0, aad,
static void bip_aad(struct sk_buff *skb, u8 *aad)
put_unaligned(mask_fc, (__le16 *) &aad[0]);
memcpy(aad + 2, &hdr->addrs, 3 * ETH_ALEN);
u8 aad[20];
bip_aad(skb, aad);
if (ieee80211_aes_cmac(key->u.aes_cmac.tfm, aad,
u8 aad[20], mic[IEEE80211_CMAC_256_MIC_LEN], ipn[6];
bip_aad(skb, aad);
if (ieee80211_aes_cmac(key->u.aes_cmac.tfm, aad,
u8 aad[GMAC_AAD_LEN];
bip_aad(skb, aad);
if (ieee80211_aes_gmac(key->u.aes_gmac.tfm, aad, nonce,
u8 aad[GMAC_AAD_LEN], *mic, ipn[6], nonce[GMAC_NONCE_LEN];
struct scatterlist *sg_out, char *aad, char *iv,
rc = tls_enc_record(aead_req, aead, aad, iv,
void *buf, *iv, *aad, *dummy_buf, *salt;
aad = buf + cipher_desc->salt + cipher_desc->iv;
dummy_buf = aad + TLS_AAD_SPACE_SIZE;
if (tls_enc_records(aead_req, ctx->aead_send, sg_in, sg_out, aad, iv,
struct crypto_aead *aead, char *aad,
tls_make_aad(aad, len - cipher_desc->tag, (char *)&rcd_sn, buf[0], prot);
sg_set_buf(sg_in, aad, TLS_AAD_SPACE_SIZE);
sg_set_buf(sg_out, aad, TLS_AAD_SPACE_SIZE);
tls_make_aad(dctx->aad, rxm->full_len - prot->overhead_size +
sg_set_buf(&sgin[0], dctx->aad, prot->aad_size);
sg_set_buf(&sgout[0], dctx->aad, prot->aad_size);
sg_set_buf(&sgout[0], dctx->aad, prot->aad_size);
u8 aad[TLS_MAX_AAD_SIZE];
struct apparmor_audit_data *ad = aad(sa);
#define aad_of_va(VA) aad((struct common_audit_data *)(VA))
struct apparmor_audit_data *ad = aad(sa);
struct apparmor_audit_data *ad = aad(sa);
struct apparmor_audit_data *ad = aad(sa);
struct apparmor_audit_data *ad = aad(sa);
struct apparmor_audit_data *ad = aad(sa);
struct apparmor_audit_data *ad = aad(sa);
struct apparmor_audit_data *ad = aad(sa);
struct da7219_aad_priv *da7219_aad = da7219->aad;
da7219->aad = da7219_aad;
da7219->aad->jack = jack;
da7219->aad->jack_inserted = false;
struct da7219_aad_priv *da7219_aad = da7219->aad;
struct da7219_aad_priv *da7219_aad = da7219->aad;
struct da7219_aad_priv *da7219_aad = da7219->aad;
struct da7219_aad_priv *da7219_aad = da7219->aad;
struct da7219_aad_priv *da7219_aad = da7219->aad;
struct da7219_aad_priv *aad;