Lines Matching refs:ipad
125 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz);
382 u32 *ipad = ctx->base.ipad.word;
385 x = ipad[i] ^ ipad[i + 4];
808 memcpy(areq->result, &ctx->base.ipad, sizeof(u32));
824 result[i] = swab32(ctx->base.ipad.word[i + 4]);
1019 /* Start from ipad precompute */
1020 memcpy(req->state, &ctx->base.ipad, SHA1_DIGEST_SIZE);
1021 /* Already processed the key^ipad part now! */
1047 unsigned int keylen, u8 *ipad, u8 *opad)
1055 memcpy(ipad, key, keylen);
1064 ahash_request_set_crypt(areq, &sg, ipad, keylen);
1078 memset(ipad + keylen, 0, blocksize - keylen);
1079 memcpy(opad, ipad, blocksize);
1082 ipad[i] ^= HMAC_IPAD_VALUE;
1123 u8 *ipad, *opad;
1139 ipad = kcalloc(2, blocksize, GFP_KERNEL);
1140 if (!ipad) {
1145 opad = ipad + blocksize;
1147 ret = safexcel_hmac_init_pad(areq, blocksize, key, keylen, ipad, opad);
1151 ret = safexcel_hmac_init_iv(areq, blocksize, ipad, istate);
1158 kfree(ipad);
1180 (memcmp(&base->ipad, istate.state, state_sz) ||
1184 memcpy(&base->ipad, &istate.state, state_sz);
1366 /* Start from ipad precompute */
1367 memcpy(req->state, &ctx->base.ipad, SHA256_DIGEST_SIZE);
1368 /* Already processed the key^ipad part now! */
1438 /* Start from ipad precompute */
1439 memcpy(req->state, &ctx->base.ipad, SHA256_DIGEST_SIZE);
1440 /* Already processed the key^ipad part now! */
1624 /* Start from ipad precompute */
1625 memcpy(req->state, &ctx->base.ipad, SHA512_DIGEST_SIZE);
1626 /* Already processed the key^ipad part now! */
1696 /* Start from ipad precompute */
1697 memcpy(req->state, &ctx->base.ipad, SHA512_DIGEST_SIZE);
1698 /* Already processed the key^ipad part now! */
1818 /* Start from ipad precompute */
1819 memcpy(req->state, &ctx->base.ipad, MD5_DIGEST_SIZE);
1820 /* Already processed the key^ipad part now! */
1890 memset(&ctx->base.ipad, 0, sizeof(u32));
1902 req->state[0] = cpu_to_le32(~ctx->base.ipad.word[0]);
1924 memcpy(&ctx->base.ipad, key, sizeof(u32));
1974 memcpy(req->state, &ctx->base.ipad, ctx->key_sz);
1999 memset(&ctx->base.ipad, 0, 2 * AES_BLOCK_SIZE);
2001 ctx->base.ipad.be[i + 8] = cpu_to_be32(aes.key_enc[i]);
2075 ctx->base.ipad.word[i] = swab32(key_tmp[i]);
2154 ctx->base.ipad.word[i + 8] = swab32(ctx->aes->key_enc[i]);
2177 ctx->base.ipad.be[i] = cpu_to_be32(((u32 *)consts)[i]);
2297 /* Start from ipad precompute */
2298 memcpy(req->state, &ctx->base.ipad, SM3_DIGEST_SIZE);
2299 /* Already processed the key^ipad part now! */
2391 memcpy(key, &ctx->base.ipad,
2769 ctx->base.ipad.byte);
2779 ctx->base.ipad.byte +
2784 * Copy the key to our ipad & opad buffers
2785 * Note that ipad and opad each contain one half of the key,
2789 memcpy(&ctx->base.ipad, key, keylen);
2791 memcpy(&ctx->base.ipad, key,
2801 memset(ctx->base.ipad.byte + keylen, 0,
2824 memcpy(req->state, &ctx->base.ipad, SHA3_224_BLOCK_SIZE / 2);
2895 memcpy(req->state, &ctx->base.ipad, SHA3_256_BLOCK_SIZE / 2);
2966 memcpy(req->state, &ctx->base.ipad, SHA3_384_BLOCK_SIZE / 2);
3037 memcpy(req->state, &ctx->base.ipad, SHA3_512_BLOCK_SIZE / 2);