Lines Matching refs:ipad
23 u32 ipad[SHA512_DIGEST_SIZE / sizeof(u32)]; member
142 memcpy(ctx->base.ctxr->data, ctx->ipad, req->state_sz); in safexcel_context_control()
852 unsigned int keylen, u8 *ipad, u8 *opad) in safexcel_hmac_init_pad() argument
860 memcpy(ipad, key, keylen); in safexcel_hmac_init_pad()
869 ahash_request_set_crypt(areq, &sg, ipad, keylen); in safexcel_hmac_init_pad()
888 memset(ipad + keylen, 0, blocksize - keylen); in safexcel_hmac_init_pad()
889 memcpy(opad, ipad, blocksize); in safexcel_hmac_init_pad()
892 ipad[i] ^= HMAC_IPAD_VALUE; in safexcel_hmac_init_pad()
938 u8 *ipad, *opad; in safexcel_hmac_setkey() local
954 ipad = kcalloc(2, blocksize, GFP_KERNEL); in safexcel_hmac_setkey()
955 if (!ipad) { in safexcel_hmac_setkey()
960 opad = ipad + blocksize; in safexcel_hmac_setkey()
962 ret = safexcel_hmac_init_pad(areq, blocksize, key, keylen, ipad, opad); in safexcel_hmac_setkey()
966 ret = safexcel_hmac_init_iv(areq, blocksize, ipad, istate); in safexcel_hmac_setkey()
973 kfree(ipad); in safexcel_hmac_setkey()
997 if (ctx->ipad[i] != le32_to_cpu(istate.state[i]) || in safexcel_hmac_alg_setkey()
1005 memcpy(ctx->ipad, &istate.state, state_sz); in safexcel_hmac_alg_setkey()