Home
last modified time | relevance | path

Searched refs:ipad (Results 1 – 25 of 27) sorted by relevance

12

/linux/crypto/
H A Dhmac.c43 u8 *ipad = &tctx->pads[0]; in hmac_setkey() local
56 err = crypto_shash_digest(shash, inkey, keylen, ipad); in hmac_setkey()
62 memcpy(ipad, inkey, keylen); in hmac_setkey()
64 memset(ipad + keylen, 0, bs - keylen); in hmac_setkey()
65 memcpy(opad, ipad, bs); in hmac_setkey()
68 ipad[i] ^= HMAC_IPAD_VALUE; in hmac_setkey()
73 crypto_shash_update(shash, ipad, bs) ?: in hmac_setkey()
74 crypto_shash_export(shash, ipad) ?: in hmac_setkey()
261 u8 *ipad = &tctx->pads[0]; in hmac_setkey_ahash() local
270 ahash_request_set_virt(req, inkey, ipad, keylen); in hmac_setkey_ahash()
[all …]
/linux/drivers/crypto/inside-secure/
H A Dsafexcel_hash.c125 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz); in safexcel_context_control()
378 u32 *ipad = ctx->base.ipad.word; in safexcel_ahash_send_req() local
381 x = ipad[i] ^ ipad[i + 4]; in safexcel_ahash_send_req()
806 memcpy(areq->result, &ctx->base.ipad, sizeof(u32)); in safexcel_ahash_final()
822 result[i] = swab32(ctx->base.ipad.word[i + 4]); in safexcel_ahash_final()
1018 memcpy(req->state, &ctx->base.ipad, SHA1_DIGEST_SIZE); in safexcel_hmac_sha1_init()
1045 unsigned int keylen, u8 *ipad, u8 *opad) in safexcel_hmac_init_pad() argument
1053 memcpy(ipad, key, keylen); in safexcel_hmac_init_pad()
1062 ahash_request_set_crypt(areq, &sg, ipad, keylen); in safexcel_hmac_init_pad()
1076 memset(ipad + keylen, 0, blocksize - keylen); in safexcel_hmac_init_pad()
[all …]
H A Dsafexcel_cipher.c709 &ctx->base.ipad, ctx->state_sz); in safexcel_send_req()
2538 if (be32_to_cpu(ctx->base.ipad.be[i]) != hashkey[i]) { in safexcel_aead_gcm_setkey()
2546 ctx->base.ipad.be[i] = cpu_to_be32(hashkey[i]); in safexcel_aead_gcm_setkey()
2630 ctx->base.ipad.be[i + 2 * AES_BLOCK_SIZE / sizeof(u32)] = in safexcel_aead_ccm_setkey()
/linux/drivers/crypto/marvell/octeontx/
H A Dotx_cptvf_algs.c547 ctx->ipad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init()
548 if (!ctx->ipad) { in cpt_aead_init()
555 kfree(ctx->ipad); in cpt_aead_init()
564 kfree(ctx->ipad); in cpt_aead_init()
621 kfree(ctx->ipad); in otx_cpt_aead_exit()
756 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
792 ipad = ctx->ipad; in aead_hmac_init()
795 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
796 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
797 memcpy(opad, ipad, bs); in aead_hmac_init()
[all …]
H A Dotx_cptvf_algs.h115 u8 ipad[64]; member
173 u8 *ipad; member
/linux/drivers/crypto/marvell/octeontx2/
H A Dotx2_cptvf_algs.c640 ctx->ipad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init()
641 if (!ctx->ipad) { in cpt_aead_init()
649 kfree(ctx->ipad); in cpt_aead_init()
732 kfree(ctx->ipad); in otx2_cpt_aead_exit()
845 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
882 ipad = ctx->ipad; in aead_hmac_init()
885 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
886 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
887 memcpy(opad, ipad, bs); in aead_hmac_init()
890 ipad[icount] ^= 0x36; in aead_hmac_init()
[all …]
H A Dotx2_cptvf_algs.h106 u8 ipad[64]; member
169 u8 *ipad; member
/linux/drivers/crypto/inside-secure/eip93/
H A Deip93-common.c708 u8 ipad[SHA256_BLOCK_SIZE], opad[SHA256_BLOCK_SIZE]; in eip93_hmac_setkey() local
753 ahash_request_set_crypt(req, sg, ipad, keylen); in eip93_hmac_setkey()
760 memcpy(ipad, key, keylen); in eip93_hmac_setkey()
764 memset(ipad + keylen, 0, SHA256_BLOCK_SIZE - keylen); in eip93_hmac_setkey()
765 memcpy(opad, ipad, SHA256_BLOCK_SIZE); in eip93_hmac_setkey()
769 ipad[i] ^= HMAC_IPAD_VALUE; in eip93_hmac_setkey()
774 memcpy(dest_ipad, ipad, SHA256_BLOCK_SIZE); in eip93_hmac_setkey()
777 sg_init_one(&sg[0], ipad, SHA256_BLOCK_SIZE); in eip93_hmac_setkey()
H A Deip93-common.h21 unsigned int hashlen, u8 *ipad, u8 *opad,
H A Deip93-hash.h20 u8 ipad[SHA256_BLOCK_SIZE] __aligned(sizeof(u32));
H A Deip93-hash.c301 memcpy(rctx->data, ctx->ipad, SHA256_BLOCK_SIZE); in eip93_hash_init()
569 ctx->ipad, ctx->opad, true); in eip93_hash_hmac_setkey()
/linux/drivers/crypto/marvell/cesa/
H A Dhash.c1136 u8 *ipad, u8 *opad, in mv_cesa_ahmac_pad_init() argument
1145 memcpy(ipad, key, keylen); in mv_cesa_ahmac_pad_init()
1155 ahash_request_set_crypt(req, &sg, ipad, keylen); in mv_cesa_ahmac_pad_init()
1169 memset(ipad + keylen, 0, blocksize - keylen); in mv_cesa_ahmac_pad_init()
1170 memcpy(opad, ipad, blocksize); in mv_cesa_ahmac_pad_init()
1173 ipad[i] ^= HMAC_IPAD_VALUE; in mv_cesa_ahmac_pad_init()
1187 u8 *ipad = NULL; in mv_cesa_ahmac_setkey() local
1205 ipad = kcalloc(2, blocksize, GFP_KERNEL); in mv_cesa_ahmac_setkey()
1206 if (!ipad) { in mv_cesa_ahmac_setkey()
1211 opad = ipad + blocksize; in mv_cesa_ahmac_setkey()
[all …]
/linux/arch/s390/crypto/
H A Dhmac_s390.c272 u8 ipad[SHA512_BLOCK_SIZE]; in s390_hmac_export_zero() local
280 ipad[i] = ctx->key[i] ^ HMAC_IPAD_VALUE; in s390_hmac_export_zero()
282 err = hash_data(ipad, bs, out, crypto_shash_digestsize(tfm), false); in s390_hmac_export_zero()
283 memzero_explicit(ipad, sizeof(ipad)); in s390_hmac_export_zero()
/linux/drivers/crypto/allwinner/sun8i-ss/
H A Dsun8i-ss-hash.c67 tfmctx->ipad = kzalloc(bs, GFP_KERNEL); in sun8i_ss_hmac_setkey()
68 if (!tfmctx->ipad) in sun8i_ss_hmac_setkey()
77 memcpy(tfmctx->ipad, tfmctx->key, tfmctx->keylen); in sun8i_ss_hmac_setkey()
80 tfmctx->ipad[i] ^= HMAC_IPAD_VALUE; in sun8i_ss_hmac_setkey()
91 kfree_sensitive(tfmctx->ipad); in sun8i_ss_hmac_setkey()
137 kfree_sensitive(tfmctx->ipad); in sun8i_ss_hash_exit_tfm()
584 addr_xpad = dma_map_single(ss->dev, tfmctx->ipad, bs, DMA_TO_DEVICE); in sun8i_ss_hash_run()
H A Dsun8i-ss.h234 u8 *ipad; member
/linux/drivers/crypto/
H A Datmel-sha.c1664 u32 ipad[SHA512_BLOCK_SIZE / sizeof(u32)]; member
1734 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup()
1735 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup()
1758 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done()
1759 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done()
1772 unsafe_memcpy(hmac->opad, hmac->ipad, bs, in atmel_sha_hmac_compute_ipad_hash()
1775 hmac->ipad[i] ^= 0x36363636; in atmel_sha_hmac_compute_ipad_hash()
1779 return atmel_sha_cpu_hash(dd, hmac->ipad, bs, false, in atmel_sha_hmac_compute_ipad_hash()
1794 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_compute_opad_hash()
1882 memcpy(ctx->digest, hmac->ipad, hs); in atmel_sha_hmac_init_done()
[all …]
H A Domap-sham.c164 u8 ipad[SHA512_BLOCK_SIZE] OMAP_ALIGNED; member
464 (u32 *)bctx->ipad, nr_dr); in omap_sham_write_ctrl_omap4()
466 (u32 *)bctx->ipad + nr_dr, nr_dr); in omap_sham_write_ctrl_omap4()
996 memcpy(ctx->buffer, bctx->ipad, bs); in omap_sham_init()
1299 bctx->ipad); in omap_sham_setkey()
1304 memcpy(bctx->ipad, key, keylen); in omap_sham_setkey()
1307 memset(bctx->ipad + keylen, 0, bs - keylen); in omap_sham_setkey()
1310 memcpy(bctx->opad, bctx->ipad, bs); in omap_sham_setkey()
1313 bctx->ipad[i] ^= HMAC_IPAD_VALUE; in omap_sham_setkey()
H A Dsa2ul.c146 u16 key_sz, __be32 *ipad, __be32 *opad);
436 u16 key_sz, __be32 *ipad, __be32 *opad) in sa_prepare_iopads() argument
453 sa_export_shash(&sha, shash, digest_size, ipad); in sa_prepare_iopads()
535 __be32 *ipad = (void *)(sc_buf + 32); in sa_set_sc_auth() local
546 ad->prep_iopad(ad, key, key_sz, ipad, opad); in sa_set_sc_auth()
/linux/drivers/crypto/cavium/cpt/
H A Dcptvf_algs.h89 u8 ipad[64]; member
/linux/drivers/crypto/ccp/
H A Dccp-crypto.h194 u8 ipad[MAX_SHA_BLOCK_SIZE]; member
H A Dccp-crypto-sha.c199 memcpy(rctx->buf, ctx->u.sha.ipad, block_size); in ccp_sha_init()
302 ctx->u.sha.ipad[i] = ctx->u.sha.key[i] ^ HMAC_IPAD_VALUE; in ccp_sha_setkey()
/linux/drivers/crypto/chelsio/
H A Dchcr_crypto.h244 u8 ipad[CHCR_HASH_MAX_BLOCK_SIZE_128]; member
/linux/drivers/crypto/bcm/
H A Dcipher.h215 u8 ipad[MAX_HASH_BLOCK_SIZE]; member
H A Dcipher.c2390 memcpy(ctx->ipad, ctx->authkey, ctx->authkeylen); in ahash_hmac_setkey()
2391 memset(ctx->ipad + ctx->authkeylen, 0, in ahash_hmac_setkey()
2394 unsafe_memcpy(ctx->opad, ctx->ipad, blocksize, in ahash_hmac_setkey()
2398 ctx->ipad[index] ^= HMAC_IPAD_VALUE; in ahash_hmac_setkey()
2402 flow_dump(" ipad: ", ctx->ipad, blocksize); in ahash_hmac_setkey()
2432 memcpy(rctx->hash_carry, ctx->ipad, blocksize); in ahash_hmac_init()
2492 memcpy(rctx->hash_carry, ctx->ipad, blocksize); in ahash_hmac_digest()
/linux/drivers/crypto/cavium/nitrox/
H A Dnitrox_req.h144 u8 ipad[64]; member

12