19 Jun, 2019
1 commit
-
Based on 2 normalized pattern(s):
this program is free software you can redistribute it and or modify
it under the terms of the gnu general public license version 2 as
published by the free software foundationthis program is free software you can redistribute it and or modify
it under the terms of the gnu general public license version 2 as
published by the free software foundation #extracted by the scancode license scanner the SPDX license identifier
GPL-2.0-only
has been chosen to replace the boilerplate/reference in 4122 file(s).
Signed-off-by: Thomas Gleixner
Reviewed-by: Enrico Weigelt
Reviewed-by: Kate Stewart
Reviewed-by: Allison Randal
Cc: linux-spdx@vger.kernel.org
Link: https://lkml.kernel.org/r/20190604081206.933168790@linutronix.de
Signed-off-by: Greg Kroah-Hartman
11 Oct, 2017
1 commit
-
Currently, the aes_ccm.c and aes_gcm.c are almost line by line copy of
each other. This patch reduce code redundancy by moving the code in these
two files to crypto/aead_api.c to make it a higher level aead api. The
file aes_ccm.c and aes_gcm.c are removed and all the functions there are
now implemented in their headers using the newly added aead api.Signed-off-by: Xiang Gao
Signed-off-by: Johannes Berg
17 Oct, 2016
1 commit
-
Some crypto implementations (such as the generic CCM wrapper in crypto/)
use scatterlists to map fields of private data in their struct aead_req.
This means these data structures cannot live in the vmalloc area, which
means that they cannot live on the stack (with CONFIG_VMAP_STACK.)This currently occurs only with the generic software implementation, but
the private data and usage is implementation specific, so move the whole
data structures off the stack into heap by allocating every time we need
to use them.In addition, take care not to put any of our own stack allocations into
scatterlists. This involves reserving some extra room when allocating the
aead_request structures, and referring to those allocations in the scatter-
lists (while copying the data from the stack before the crypto operation)Signed-off-by: Ard Biesheuvel
Signed-off-by: Johannes Berg
27 Jan, 2015
1 commit
-
This allows mac80211 to configure CCMP-256 to the driver and also use
software-implementation within mac80211 when the driver does not support
this with hardware accelaration.Signed-off-by: Jouni Malinen
[squash ccmp256 -> mic_len argument change]
Signed-off-by: Johannes Berg
11 Oct, 2013
1 commit
-
Use the generic CCM aead chaining mode driver rather than a local
implementation that sits right on top of the core AES cipher.This allows the use of accelerated implementations of either
CCM as a whole or the CTR mode which it encapsulates.Signed-off-by: Ard Biesheuvel
Signed-off-by: Johannes Berg
08 Jul, 2011
1 commit
-
mac80211 has a defnition of AES_BLOCK_SIZE and
multiple definitions of AES_BLOCK_LEN. Remove
them all and use crypto/aes.h.Signed-off-by: Johannes Berg
Signed-off-by: John W. Linville
09 Jul, 2008
1 commit
-
Recalculate the offset pointers in the ccmp calculations rather than
in the callers.Signed-off-by: Harvey Harrison
Signed-off-by: John W. Linville
08 May, 2008
1 commit
-
This has some code cleanups (some inspired by checkpatch), I got
bored at probably a third of the output though so if somebody
else wants to...Signed-off-by: Johannes Berg
06 May, 2007
1 commit
-
Add mac80211, the IEEE 802.11 software MAC layer.
Signed-off-by: Jiri Benc
Signed-off-by: John W. Linville