Lines Matching full:ipad
515 * for calculating ipad and opad in cpt_aead_init()
603 kfree(ctx->ipad); in otx_cpt_aead_exit()
742 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
749 ctx->ipad = kzalloc(bs, GFP_KERNEL); in aead_hmac_init()
750 if (!ctx->ipad) { in aead_hmac_init()
761 ipad = kzalloc(state_size, GFP_KERNEL); in aead_hmac_init()
762 if (!ipad) { in aead_hmac_init()
775 authkeylen, ipad); in aead_hmac_init()
781 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
784 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
785 memcpy(opad, ipad, bs); in aead_hmac_init()
788 ipad[icount] ^= 0x36; in aead_hmac_init()
794 * algorithm is retrieved for IPAD & OPAD in aead_hmac_init()
797 /* IPAD Calculation */ in aead_hmac_init()
799 crypto_shash_update(&ctx->sdesc->shash, ipad, bs); in aead_hmac_init()
800 crypto_shash_export(&ctx->sdesc->shash, ipad); in aead_hmac_init()
801 ret = copy_pad(ctx->mac_type, ctx->ipad, ipad); in aead_hmac_init()
813 kfree(ipad); in aead_hmac_init()
819 kfree(ctx->ipad); in aead_hmac_init()
820 ctx->ipad = NULL; in aead_hmac_init()
823 kfree(ipad); in aead_hmac_init()
985 if (ctx->ipad) in create_aead_ctx_hdr()
986 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()