Lines Matching full:ipad
542 * for calculating ipad and opad in cpt_aead_init()
547 ctx->ipad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init()
548 if (!ctx->ipad) { in cpt_aead_init()
555 kfree(ctx->ipad); in cpt_aead_init()
564 kfree(ctx->ipad); in cpt_aead_init()
621 kfree(ctx->ipad); in otx_cpt_aead_exit()
756 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
792 ipad = ctx->ipad; in aead_hmac_init()
795 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
796 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
797 memcpy(opad, ipad, bs); in aead_hmac_init()
800 ipad[icount] ^= 0x36; in aead_hmac_init()
806 * algorithm is retrieved for IPAD & OPAD in aead_hmac_init()
809 /* IPAD Calculation */ in aead_hmac_init()
811 crypto_shash_update(&ctx->sdesc->shash, ipad, bs); in aead_hmac_init()
812 crypto_shash_export(&ctx->sdesc->shash, ipad); in aead_hmac_init()
813 ret = swap_pad(ctx->mac_type, ipad); in aead_hmac_init()
910 if (ctx->ipad) in create_aead_ctx_hdr()
911 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()