Lines Matching full:ipad
604 * for calculating ipad and opad in cpt_aead_init()
714 kfree(ctx->ipad); in otx2_cpt_aead_exit()
831 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
838 ctx->ipad = kzalloc(bs, GFP_KERNEL); in aead_hmac_init()
839 if (!ctx->ipad) { in aead_hmac_init()
850 ipad = kzalloc(state_size, GFP_KERNEL); in aead_hmac_init()
851 if (!ipad) { in aead_hmac_init()
864 authkeylen, ipad); in aead_hmac_init()
870 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
873 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
874 memcpy(opad, ipad, bs); in aead_hmac_init()
877 ipad[icount] ^= 0x36; in aead_hmac_init()
883 * algorithm is retrieved for IPAD & OPAD in aead_hmac_init()
886 /* IPAD Calculation */ in aead_hmac_init()
888 crypto_shash_update(&ctx->sdesc->shash, ipad, bs); in aead_hmac_init()
889 crypto_shash_export(&ctx->sdesc->shash, ipad); in aead_hmac_init()
890 ret = copy_pad(ctx->mac_type, ctx->ipad, ipad); in aead_hmac_init()
902 kfree(ipad); in aead_hmac_init()
908 kfree(ctx->ipad); in aead_hmac_init()
909 ctx->ipad = NULL; in aead_hmac_init()
912 kfree(ipad); in aead_hmac_init()
1069 if (ctx->ipad) in create_aead_ctx_hdr()
1070 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()