Lines Matching refs:opad
205 &ctx->base.opad, req->state_sz);
274 memcpy(sreq->state, &ctx->base.opad, sreq->digest_sz);
705 &ctx->base.opad, req->state_sz))))
1061 unsigned int keylen, u8 *ipad, u8 *opad)
1097 memcpy(opad, ipad, blocksize);
1101 opad[i] ^= HMAC_OPAD_VALUE;
1147 u8 *ipad, *opad;
1169 opad = ipad + blocksize;
1171 ret = safexcel_hmac_init_pad(areq, blocksize, key, keylen, ipad, opad);
1179 ret = safexcel_hmac_init_iv(areq, blocksize, opad, ostate);
1205 memcmp(&base->opad, ostate.state, state_sz)))
1209 memcpy(&base->opad, &ostate.state, state_sz);
2440 &ctx->base.opad,
2818 * move the rest to opad due to the way our HMAC infra works.
2822 memmove(&ctx->base.opad,
2828 * Copy the key to our ipad & opad buffers
2829 * Note that ipad and opad each contain one half of the key,
2837 memcpy(&ctx->base.opad,
2847 memset(&ctx->base.opad, 0, crypto_ahash_blocksize(tfm) / 2);
2849 memset(ctx->base.opad.byte + keylen -