Searched refs:ipad (Results 1 – 12 of 12) sorted by relevance
| /linux/drivers/crypto/marvell/octeontx/ |
| H A D | otx_cptvf_algs.c | 547 ctx->ipad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init() 548 if (!ctx->ipad) { in cpt_aead_init() 555 kfree(ctx->ipad); in cpt_aead_init() 564 kfree(ctx->ipad); in cpt_aead_init() 621 kfree(ctx->ipad); in otx_cpt_aead_exit() 756 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local 792 ipad = ctx->ipad; in aead_hmac_init() 795 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init() 796 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init() 797 memcpy(opad, ipad, bs); in aead_hmac_init() [all …]
|
| H A D | otx_cptvf_algs.h | 115 u8 ipad[64]; member 173 u8 *ipad; member
|
| /linux/drivers/crypto/allwinner/sun8i-ss/ |
| H A D | sun8i-ss-hash.c | 67 tfmctx->ipad = kzalloc(bs, GFP_KERNEL); in sun8i_ss_hmac_setkey() 68 if (!tfmctx->ipad) in sun8i_ss_hmac_setkey() 77 memcpy(tfmctx->ipad, tfmctx->key, tfmctx->keylen); in sun8i_ss_hmac_setkey() 80 tfmctx->ipad[i] ^= HMAC_IPAD_VALUE; in sun8i_ss_hmac_setkey() 91 kfree_sensitive(tfmctx->ipad); in sun8i_ss_hmac_setkey() 137 kfree_sensitive(tfmctx->ipad); in sun8i_ss_hash_exit_tfm() 584 addr_xpad = dma_map_single(ss->dev, tfmctx->ipad, bs, DMA_TO_DEVICE); in sun8i_ss_hash_run()
|
| H A D | sun8i-ss.h | 234 u8 *ipad; member
|
| /linux/drivers/crypto/marvell/octeontx2/ |
| H A D | otx2_cptvf_algs.h | 106 u8 ipad[64]; member 169 u8 *ipad; member
|
| /linux/drivers/crypto/cavium/cpt/ |
| H A D | cptvf_algs.h | 89 u8 ipad[64]; member
|
| /linux/drivers/crypto/ccp/ |
| H A D | ccp-crypto.h | 194 u8 ipad[MAX_SHA_BLOCK_SIZE]; member
|
| H A D | ccp-crypto-sha.c | 199 memcpy(rctx->buf, ctx->u.sha.ipad, block_size); in ccp_sha_init() 302 ctx->u.sha.ipad[i] = ctx->u.sha.key[i] ^ HMAC_IPAD_VALUE; in ccp_sha_setkey()
|
| /linux/drivers/crypto/bcm/ |
| H A D | cipher.h | 215 u8 ipad[MAX_HASH_BLOCK_SIZE]; member
|
| /linux/drivers/crypto/cavium/nitrox/ |
| H A D | nitrox_req.h | 144 u8 ipad[64]; member
|
| /linux/drivers/crypto/inside-secure/ |
| H A D | safexcel_cipher.c | 709 &ctx->base.ipad, ctx->state_sz); in safexcel_send_req() 2540 if (be32_to_cpu(ctx->base.ipad.be[i]) != hashkey[i]) { in safexcel_aead_gcm_setkey() 2548 ctx->base.ipad.be[i] = cpu_to_be32(hashkey[i]); in safexcel_aead_gcm_setkey() 2632 ctx->base.ipad.be[i + 2 * AES_BLOCK_SIZE / sizeof(u32)] = in safexcel_aead_ccm_setkey()
|
| H A D | safexcel.h | 852 } ipad, opad; member
|