Lines Matching refs:opad
207 &ctx->base.opad, req->state_sz);
276 memcpy(sreq->state, &ctx->base.opad, sreq->digest_sz);
707 &ctx->base.opad, req->state_sz))))
1047 unsigned int keylen, u8 *ipad, u8 *opad)
1079 memcpy(opad, ipad, blocksize);
1083 opad[i] ^= HMAC_OPAD_VALUE;
1123 u8 *ipad, *opad;
1145 opad = ipad + blocksize;
1147 ret = safexcel_hmac_init_pad(areq, blocksize, key, keylen, ipad, opad);
1155 ret = safexcel_hmac_init_iv(areq, blocksize, opad, ostate);
1181 memcmp(&base->opad, ostate.state, state_sz)))
1185 memcpy(&base->opad, &ostate.state, state_sz);
2395 &ctx->base.opad,
2774 * move the rest to opad due to the way our HMAC infra works.
2778 memmove(&ctx->base.opad,
2784 * Copy the key to our ipad & opad buffers
2785 * Note that ipad and opad each contain one half of the key,
2793 memcpy(&ctx->base.opad,
2803 memset(&ctx->base.opad, 0, crypto_ahash_blocksize(tfm) / 2);
2805 memset(ctx->base.opad.byte + keylen -