Lines Matching full:ipad
634 * for calculating ipad and opad in cpt_aead_init()
639 ctx->ipad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init()
640 if (!ctx->ipad) { in cpt_aead_init()
648 kfree(ctx->ipad); in cpt_aead_init()
731 kfree(ctx->ipad); in otx2_cpt_aead_exit()
844 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
881 ipad = ctx->ipad; in aead_hmac_init()
884 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
885 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
886 memcpy(opad, ipad, bs); in aead_hmac_init()
889 ipad[icount] ^= 0x36; in aead_hmac_init()
895 * algorithm is retrieved for IPAD & OPAD in aead_hmac_init()
898 /* IPAD Calculation */ in aead_hmac_init()
900 crypto_shash_update(&ctx->sdesc->shash, ipad, bs); in aead_hmac_init()
901 crypto_shash_export(&ctx->sdesc->shash, ipad); in aead_hmac_init()
902 ret = swap_pad(ctx->mac_type, ipad); in aead_hmac_init()
995 if (ctx->ipad) in create_aead_ctx_hdr()
996 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()