/Linux-v4.19/security/apparmor/ |
D | ipc.c | 53 if (aad(sa)->request & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 55 audit_ptrace_mask(ab, aad(sa)->request); in audit_ptrace_cb() 57 if (aad(sa)->denied & AA_PTRACE_PERM_MASK) { in audit_ptrace_cb() 59 audit_ptrace_mask(ab, aad(sa)->denied); in audit_ptrace_cb() 63 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_ptrace_cb() 75 aad(sa)->peer = peer; in profile_ptrace_perm() 107 aad(sa)->label = &tracer->label; in profile_tracer_perm() 108 aad(sa)->peer = tracee; in profile_tracer_perm() 109 aad(sa)->request = 0; in profile_tracer_perm() 110 aad(sa)->error = aa_capable(&tracer->label, CAP_SYS_PTRACE, 1); in profile_tracer_perm() [all …]
|
D | audit.c | 65 audit_log_string(ab, aa_audit_type[aad(sa)->type]); in audit_pre() 68 if (aad(sa)->op) { in audit_pre() 70 audit_log_string(ab, aad(sa)->op); in audit_pre() 73 if (aad(sa)->info) { in audit_pre() 75 audit_log_string(ab, aad(sa)->info); in audit_pre() 76 if (aad(sa)->error) in audit_pre() 77 audit_log_format(ab, " error=%d", aad(sa)->error); in audit_pre() 80 if (aad(sa)->label) { in audit_pre() 81 struct aa_label *label = aad(sa)->label; in audit_pre() 100 if (aad(sa)->name) { in audit_pre() [all …]
|
D | file.c | 65 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 67 audit_file_mask(ab, aad(sa)->request); in file_audit_cb() 69 if (aad(sa)->denied & AA_AUDIT_FILE_MASK) { in file_audit_cb() 71 audit_file_mask(ab, aad(sa)->denied); in file_audit_cb() 73 if (aad(sa)->request & AA_AUDIT_FILE_MASK) { in file_audit_cb() 77 from_kuid(&init_user_ns, aad(sa)->fs.ouid)); in file_audit_cb() 80 if (aad(sa)->peer) { in file_audit_cb() 82 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in file_audit_cb() 84 } else if (aad(sa)->fs.target) { in file_audit_cb() 86 audit_log_untrustedstring(ab, aad(sa)->fs.target); in file_audit_cb() [all …]
|
D | net.c | 84 if (sock_type_names[aad(sa)->net.type]) in audit_net_cb() 85 audit_log_string(ab, sock_type_names[aad(sa)->net.type]); in audit_net_cb() 87 audit_log_format(ab, "\"unknown(%d)\"", aad(sa)->net.type); in audit_net_cb() 88 audit_log_format(ab, " protocol=%d", aad(sa)->net.protocol); in audit_net_cb() 90 if (aad(sa)->request & NET_PERMS_MASK) { in audit_net_cb() 92 aa_audit_perm_mask(ab, aad(sa)->request, NULL, 0, in audit_net_cb() 95 if (aad(sa)->denied & NET_PERMS_MASK) { in audit_net_cb() 97 aa_audit_perm_mask(ab, aad(sa)->denied, NULL, 0, in audit_net_cb() 101 if (aad(sa)->peer) { in audit_net_cb() 103 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_net_cb()
|
D | resource.c | 39 rlim_names[aad(sa)->rlim.rlim], aad(sa)->rlim.max); in audit_cb() 40 if (aad(sa)->peer) { in audit_cb() 42 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in audit_cb() 62 aad(&sa)->rlim.rlim = resource; in audit_resource() 63 aad(&sa)->rlim.max = value; in audit_resource() 64 aad(&sa)->peer = peer; in audit_resource() 65 aad(&sa)->info = info; in audit_resource() 66 aad(&sa)->error = error; in audit_resource()
|
D | lib.c | 131 aad(&sa)->info = str; in aa_info_message() 268 if (aad(sa)->request) { in aa_audit_perms_cb() 270 aa_audit_perm_mask(ab, aad(sa)->request, aa_file_perm_chrs, in aa_audit_perms_cb() 274 if (aad(sa)->denied) { in aa_audit_perms_cb() 276 aa_audit_perm_mask(ab, aad(sa)->denied, aa_file_perm_chrs, in aa_audit_perms_cb() 281 aa_label_xaudit(ab, labels_ns(aad(sa)->label), aad(sa)->peer, in aa_audit_perms_cb() 403 aad(sa)->label = &profile->label; in aa_profile_label_perm() 404 aad(sa)->peer = &target->label; in aa_profile_label_perm() 405 aad(sa)->request = request; in aa_profile_label_perm() 465 aad(sa)->label = &profile->label; in aa_check_perms() [all …]
|
D | mount.c | 93 if (aad(sa)->mnt.type) { in audit_cb() 95 audit_log_untrustedstring(ab, aad(sa)->mnt.type); in audit_cb() 97 if (aad(sa)->mnt.src_name) { in audit_cb() 99 audit_log_untrustedstring(ab, aad(sa)->mnt.src_name); in audit_cb() 101 if (aad(sa)->mnt.trans) { in audit_cb() 103 audit_log_untrustedstring(ab, aad(sa)->mnt.trans); in audit_cb() 105 if (aad(sa)->mnt.flags) { in audit_cb() 107 audit_mnt_flags(ab, aad(sa)->mnt.flags); in audit_cb() 110 if (aad(sa)->mnt.data) { in audit_cb() 112 audit_log_untrustedstring(ab, aad(sa)->mnt.data); in audit_cb() [all …]
|
D | policy_unpack.c | 85 if (aad(sa)->iface.ns) { in audit_cb() 87 audit_log_untrustedstring(ab, aad(sa)->iface.ns); in audit_cb() 89 if (aad(sa)->name) { in audit_cb() 91 audit_log_untrustedstring(ab, aad(sa)->name); in audit_cb() 93 if (aad(sa)->iface.pos) in audit_cb() 94 audit_log_format(ab, " offset=%ld", aad(sa)->iface.pos); in audit_cb() 115 aad(&sa)->iface.pos = e->pos - e->start; in audit_iface() 116 aad(&sa)->iface.ns = ns_name; in audit_iface() 118 aad(&sa)->name = new->base.hname; in audit_iface() 120 aad(&sa)->name = name; in audit_iface() [all …]
|
D | capability.c | 74 aad(sa)->error = error; in audit_caps() 135 aad(sa)->info = "optional: no audit"; in profile_capable()
|
/Linux-v4.19/net/mac80211/ |
D | aes_gcm.h | 17 u8 *j_0, u8 *aad, u8 *data, in ieee80211_aes_gcm_encrypt() argument 20 return aead_encrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_encrypt() 21 be16_to_cpup((__be16 *)aad), in ieee80211_aes_gcm_encrypt() 26 u8 *j_0, u8 *aad, u8 *data, in ieee80211_aes_gcm_decrypt() argument 29 return aead_decrypt(tfm, j_0, aad + 2, in ieee80211_aes_gcm_decrypt() 30 be16_to_cpup((__be16 *)aad), in ieee80211_aes_gcm_decrypt()
|
D | aes_ccm.h | 25 u8 *b_0, u8 *aad, u8 *data, in ieee80211_aes_ccm_encrypt() argument 28 return aead_encrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_encrypt() 29 be16_to_cpup((__be16 *)aad), in ieee80211_aes_ccm_encrypt() 35 u8 *b_0, u8 *aad, u8 *data, in ieee80211_aes_ccm_decrypt() argument 38 return aead_decrypt(tfm, b_0, aad + 2, in ieee80211_aes_ccm_decrypt() 39 be16_to_cpup((__be16 *)aad), in ieee80211_aes_ccm_decrypt()
|
D | wpa.c | 317 static void ccmp_special_blocks(struct sk_buff *skb, u8 *pn, u8 *b_0, u8 *aad) in ccmp_special_blocks() argument 365 put_unaligned_be16(len_a, &aad[0]); in ccmp_special_blocks() 366 put_unaligned(mask_fc, (__le16 *)&aad[2]); in ccmp_special_blocks() 367 memcpy(&aad[4], &hdr->addr1, 3 * ETH_ALEN); in ccmp_special_blocks() 370 aad[22] = *((u8 *) &hdr->seq_ctrl) & 0x0f; in ccmp_special_blocks() 371 aad[23] = 0; in ccmp_special_blocks() 374 memcpy(&aad[24], hdr->addr4, ETH_ALEN); in ccmp_special_blocks() 375 aad[30] = qos_tid; in ccmp_special_blocks() 376 aad[31] = 0; in ccmp_special_blocks() 378 memset(&aad[24], 0, ETH_ALEN + IEEE80211_QOS_CTL_LEN); in ccmp_special_blocks() [all …]
|
D | aes_cmac.c | 27 void ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad, in ieee80211_aes_cmac() argument 36 crypto_shash_update(desc, aad, AAD_LEN); in ieee80211_aes_cmac() 43 void ieee80211_aes_cmac_256(struct crypto_shash *tfm, const u8 *aad, in ieee80211_aes_cmac_256() argument 51 crypto_shash_update(desc, aad, AAD_LEN); in ieee80211_aes_cmac_256()
|
D | aead_api.c | 21 int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len, in aead_encrypt() argument 35 memcpy(__aad, aad, aad_len); in aead_encrypt() 52 int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, size_t aad_len, in aead_decrypt() argument 70 memcpy(__aad, aad, aad_len); in aead_decrypt()
|
D | aes_cmac.h | 17 void ieee80211_aes_cmac(struct crypto_shash *tfm, const u8 *aad, 19 void ieee80211_aes_cmac_256(struct crypto_shash *tfm, const u8 *aad,
|
D | aead_api.h | 17 int aead_encrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad, 21 int aead_decrypt(struct crypto_aead *tfm, u8 *b_0, u8 *aad,
|
D | aes_gmac.c | 20 int ieee80211_aes_gmac(struct crypto_aead *tfm, const u8 *aad, u8 *nonce, in ieee80211_aes_gmac() argument 37 memcpy(__aad, aad, GMAC_AAD_LEN); in ieee80211_aes_gmac()
|
/Linux-v4.19/drivers/staging/rtl8192e/ |
D | rtllib_crypt_ccmp.c | 118 u8 aad[2 * AES_BLOCK_LEN]; in ccmp_init_blocks() local 157 aad[0] = 0; /* aad_len >> 8 */ in ccmp_init_blocks() 158 aad[1] = aad_len & 0xff; in ccmp_init_blocks() 159 aad[2] = pos[0] & 0x8f; in ccmp_init_blocks() 160 aad[3] = pos[1] & 0xc7; in ccmp_init_blocks() 161 memcpy(aad + 4, hdr->addr1, 3 * ETH_ALEN); in ccmp_init_blocks() 163 aad[22] = pos[0] & 0x0f; in ccmp_init_blocks() 164 aad[23] = 0; /* all bits masked */ in ccmp_init_blocks() 165 memset(aad + 24, 0, 8); in ccmp_init_blocks() 167 memcpy(aad + 24, hdr->addr4, ETH_ALEN); in ccmp_init_blocks() [all …]
|
/Linux-v4.19/drivers/staging/rtl8192u/ieee80211/ |
D | ieee80211_crypt_ccmp.c | 119 u8 aad[2 * AES_BLOCK_LEN]; in ccmp_init_blocks() local 161 aad[0] = 0; /* aad_len >> 8 */ in ccmp_init_blocks() 162 aad[1] = aad_len & 0xff; in ccmp_init_blocks() 163 aad[2] = pos[0] & 0x8f; in ccmp_init_blocks() 164 aad[3] = pos[1] & 0xc7; in ccmp_init_blocks() 165 memcpy(aad + 4, hdr->addr1, 3 * ETH_ALEN); in ccmp_init_blocks() 167 aad[22] = pos[0] & 0x0f; in ccmp_init_blocks() 168 aad[23] = 0; /* all bits masked */ in ccmp_init_blocks() 169 memset(aad + 24, 0, 8); in ccmp_init_blocks() 171 memcpy(aad + 24, hdr->addr4, ETH_ALEN); in ccmp_init_blocks() [all …]
|
/Linux-v4.19/net/wireless/ |
D | lib80211_crypt_ccmp.c | 118 u8 aad[2 * AES_BLOCK_LEN]; in ccmp_init_blocks() local 154 aad[0] = 0; /* aad_len >> 8 */ in ccmp_init_blocks() 155 aad[1] = aad_len & 0xff; in ccmp_init_blocks() 156 aad[2] = pos[0] & 0x8f; in ccmp_init_blocks() 157 aad[3] = pos[1] & 0xc7; in ccmp_init_blocks() 158 memcpy(aad + 4, hdr->addr1, 3 * ETH_ALEN); in ccmp_init_blocks() 160 aad[22] = pos[0] & 0x0f; in ccmp_init_blocks() 161 aad[23] = 0; /* all bits masked */ in ccmp_init_blocks() 162 memset(aad + 24, 0, 8); in ccmp_init_blocks() 164 memcpy(aad + 24, hdr->addr4, ETH_ALEN); in ccmp_init_blocks() [all …]
|
/Linux-v4.19/net/tls/ |
D | tls_device_fallback.c | 49 struct crypto_aead *aead, char *aad, in tls_enc_record() argument 75 tls_make_aad(aad, len - TLS_CIPHER_AES_GCM_128_TAG_SIZE, in tls_enc_record() 83 sg_set_buf(sg_in, aad, TLS_AAD_SPACE_SIZE); in tls_enc_record() 84 sg_set_buf(sg_out, aad, TLS_AAD_SPACE_SIZE); in tls_enc_record() 141 struct scatterlist *sg_out, char *aad, char *iv, in tls_enc_records() argument 151 rc = tls_enc_record(aead_req, aead, aad, iv, in tls_enc_records() 304 void *buf, *iv, *aad, *dummy_buf; in tls_enc_skb() local 325 aad = buf + TLS_CIPHER_AES_GCM_128_SALT_SIZE + in tls_enc_skb() 327 dummy_buf = aad + TLS_AAD_SPACE_SIZE; in tls_enc_skb() 338 if (tls_enc_records(aead_req, ctx->aead_send, sg_in, sg_out, aad, iv, in tls_enc_skb()
|
/Linux-v4.19/security/apparmor/include/ |
D | audit.h | 161 #define aad(SA) ((SA)->apparmor_audit_data) macro 179 aad((SA))->error = (ERROR); \ 181 aad((SA))->error; \
|
D | net.h | 68 aad(&NAME)->net.type = (T); \ 69 aad(&NAME)->net.protocol = (P)
|
/Linux-v4.19/arch/x86/crypto/ |
D | aesni-intel_glue.c | 139 u8 *hash_subkey, const u8 *aad, unsigned long aad_len, 161 u8 *hash_subkey, const u8 *aad, unsigned long aad_len, 168 u8 *hash_subkey, const u8 *aad, 197 const u8 *aad, unsigned long aad_len, 202 const u8 *aad, unsigned long aad_len, 208 u8 *hash_subkey, const u8 *aad, unsigned long aad_len, in aesni_gcm_enc_avx() argument 214 plaintext_len, iv, hash_subkey, aad, in aesni_gcm_enc_avx() 218 aesni_gcm_enc_avx_gen2(ctx, out, in, plaintext_len, iv, aad, in aesni_gcm_enc_avx() 226 u8 *hash_subkey, const u8 *aad, unsigned long aad_len, in aesni_gcm_dec_avx() argument 232 ciphertext_len, iv, hash_subkey, aad, in aesni_gcm_dec_avx() [all …]
|
/Linux-v4.19/drivers/clk/imx/ |
D | clk-imx35.c | 101 struct arm_ahb_div *aad; in _mx35_clocks_init() local 109 aad = &clk_consumer[consumer_sel]; in _mx35_clocks_init() 110 if (!aad->arm) { in _mx35_clocks_init() 116 aad = &clk_consumer[0]; in _mx35_clocks_init() 126 if (aad->sel) in _mx35_clocks_init() 127 clk[arm] = imx_clk_fixed_factor("arm", "mpll_075", 1, aad->arm); in _mx35_clocks_init() 129 clk[arm] = imx_clk_fixed_factor("arm", "mpll", 1, aad->arm); in _mx35_clocks_init() 144 clk[ahb] = imx_clk_fixed_factor("ahb", "arm", 1, aad->ahb); in _mx35_clocks_init()
|