Home
last modified time | relevance | path

Searched full:ipad (Results 1 – 25 of 61) sorted by relevance

123

/kernel/linux/linux-5.10/crypto/
Dhmac.c46 char *ipad = crypto_shash_ctx_aligned(parent); in hmac_setkey() local
47 char *opad = ipad + ss; in hmac_setkey()
59 err = crypto_shash_digest(shash, inkey, keylen, ipad); in hmac_setkey()
65 memcpy(ipad, inkey, keylen); in hmac_setkey()
67 memset(ipad + keylen, 0, bs - keylen); in hmac_setkey()
68 memcpy(opad, ipad, bs); in hmac_setkey()
71 ipad[i] ^= HMAC_IPAD_VALUE; in hmac_setkey()
76 crypto_shash_update(shash, ipad, bs) ?: in hmac_setkey()
77 crypto_shash_export(shash, ipad) ?: in hmac_setkey()
/kernel/linux/linux-5.10/drivers/crypto/inside-secure/
Dsafexcel_hash.c123 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz); in safexcel_context_control()
380 u32 *ipad = ctx->base.ipad.word; in safexcel_ahash_send_req() local
383 x = ipad[i] ^ ipad[i + 4]; in safexcel_ahash_send_req()
806 memcpy(areq->result, &ctx->base.ipad, sizeof(u32)); in safexcel_ahash_final()
822 result[i] = swab32(ctx->base.ipad.word[i + 4]); in safexcel_ahash_final()
1017 /* Start from ipad precompute */ in safexcel_hmac_sha1_init()
1018 memcpy(req->state, &ctx->base.ipad, SHA1_DIGEST_SIZE); in safexcel_hmac_sha1_init()
1019 /* Already processed the key^ipad part now! */ in safexcel_hmac_sha1_init()
1061 unsigned int keylen, u8 *ipad, u8 *opad) in safexcel_hmac_init_pad() argument
1069 memcpy(ipad, key, keylen); in safexcel_hmac_init_pad()
[all …]
/kernel/linux/linux-6.6/drivers/crypto/inside-secure/
Dsafexcel_hash.c125 memcpy(ctx->base.ctxr->data, &ctx->base.ipad, ctx->key_sz); in safexcel_context_control()
382 u32 *ipad = ctx->base.ipad.word; in safexcel_ahash_send_req() local
385 x = ipad[i] ^ ipad[i + 4]; in safexcel_ahash_send_req()
808 memcpy(areq->result, &ctx->base.ipad, sizeof(u32)); in safexcel_ahash_final()
824 result[i] = swab32(ctx->base.ipad.word[i + 4]); in safexcel_ahash_final()
1019 /* Start from ipad precompute */ in safexcel_hmac_sha1_init()
1020 memcpy(req->state, &ctx->base.ipad, SHA1_DIGEST_SIZE); in safexcel_hmac_sha1_init()
1021 /* Already processed the key^ipad part now! */ in safexcel_hmac_sha1_init()
1047 unsigned int keylen, u8 *ipad, u8 *opad) in safexcel_hmac_init_pad() argument
1055 memcpy(ipad, key, keylen); in safexcel_hmac_init_pad()
[all …]
/kernel/linux/linux-6.6/crypto/
Dhmac.c47 char *ipad = crypto_shash_ctx_aligned(parent); in hmac_setkey() local
48 char *opad = ipad + ss; in hmac_setkey()
63 err = crypto_shash_digest(shash, inkey, keylen, ipad); in hmac_setkey()
69 memcpy(ipad, inkey, keylen); in hmac_setkey()
71 memset(ipad + keylen, 0, bs - keylen); in hmac_setkey()
72 memcpy(opad, ipad, bs); in hmac_setkey()
75 ipad[i] ^= HMAC_IPAD_VALUE; in hmac_setkey()
80 crypto_shash_update(shash, ipad, bs) ?: in hmac_setkey()
81 crypto_shash_export(shash, ipad) ?: in hmac_setkey()
/kernel/linux/linux-5.10/drivers/crypto/marvell/octeontx/
Dotx_cptvf_algs.c519 * for calculating ipad and opad in cpt_aead_init()
607 kfree(ctx->ipad); in otx_cpt_aead_exit()
746 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
753 ctx->ipad = kzalloc(bs, GFP_KERNEL); in aead_hmac_init()
754 if (!ctx->ipad) { in aead_hmac_init()
765 ipad = kzalloc(state_size, GFP_KERNEL); in aead_hmac_init()
766 if (!ipad) { in aead_hmac_init()
779 authkeylen, ipad); in aead_hmac_init()
785 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
788 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
[all …]
Dotx_cptvf_algs.h115 u8 ipad[64]; member
173 u8 *ipad; member
/kernel/linux/linux-6.6/drivers/crypto/marvell/octeontx/
Dotx_cptvf_algs.c548 * for calculating ipad and opad in cpt_aead_init()
553 ctx->ipad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init()
554 if (!ctx->ipad) { in cpt_aead_init()
561 kfree(ctx->ipad); in cpt_aead_init()
570 kfree(ctx->ipad); in cpt_aead_init()
627 kfree(ctx->ipad); in otx_cpt_aead_exit()
762 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
798 ipad = ctx->ipad; in aead_hmac_init()
801 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
802 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
[all …]
Dotx_cptvf_algs.h115 u8 ipad[64]; member
173 u8 *ipad; member
/kernel/linux/linux-6.6/drivers/crypto/allwinner/sun8i-ss/
Dsun8i-ss-hash.c84 tfmctx->ipad = kzalloc(bs, GFP_KERNEL); in sun8i_ss_hmac_setkey()
85 if (!tfmctx->ipad) in sun8i_ss_hmac_setkey()
94 memcpy(tfmctx->ipad, tfmctx->key, tfmctx->keylen); in sun8i_ss_hmac_setkey()
97 tfmctx->ipad[i] ^= HMAC_IPAD_VALUE; in sun8i_ss_hmac_setkey()
108 kfree_sensitive(tfmctx->ipad); in sun8i_ss_hmac_setkey()
154 kfree_sensitive(tfmctx->ipad); in sun8i_ss_hash_exit_tfm()
510 * 1: IPAD in sun8i_ss_hash_run()
589 /* shift all SG one slot up, to free slot 0 for IPAD */ in sun8i_ss_hash_run()
596 addr_xpad = dma_map_single(ss->dev, tfmctx->ipad, bs, DMA_TO_DEVICE); in sun8i_ss_hash_run()
599 dev_err(ss->dev, "Fail to create DMA mapping of ipad\n"); in sun8i_ss_hash_run()
[all …]
/kernel/linux/linux-6.6/drivers/crypto/marvell/octeontx2/
Dotx2_cptvf_algs.c616 * for calculating ipad and opad in cpt_aead_init()
621 ctx->ipad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init()
622 if (!ctx->ipad) { in cpt_aead_init()
630 kfree(ctx->ipad); in cpt_aead_init()
704 kfree(ctx->ipad); in otx2_cpt_aead_exit()
816 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
853 ipad = ctx->ipad; in aead_hmac_init()
856 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
857 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
858 memcpy(opad, ipad, bs); in aead_hmac_init()
[all …]
Dotx2_cptvf_algs.h105 u8 ipad[64]; member
164 u8 *ipad; member
/kernel/linux/linux-5.10/drivers/crypto/marvell/cesa/
Dhash.c1134 u8 *ipad, u8 *opad, in mv_cesa_ahmac_pad_init() argument
1143 memcpy(ipad, key, keylen); in mv_cesa_ahmac_pad_init()
1154 ahash_request_set_crypt(req, &sg, ipad, keylen); in mv_cesa_ahmac_pad_init()
1172 memset(ipad + keylen, 0, blocksize - keylen); in mv_cesa_ahmac_pad_init()
1173 memcpy(opad, ipad, blocksize); in mv_cesa_ahmac_pad_init()
1176 ipad[i] ^= HMAC_IPAD_VALUE; in mv_cesa_ahmac_pad_init()
1190 u8 *ipad = NULL; in mv_cesa_ahmac_setkey() local
1208 ipad = kcalloc(2, blocksize, GFP_KERNEL); in mv_cesa_ahmac_setkey()
1209 if (!ipad) { in mv_cesa_ahmac_setkey()
1214 opad = ipad + blocksize; in mv_cesa_ahmac_setkey()
[all …]
/kernel/linux/linux-6.6/drivers/crypto/marvell/cesa/
Dhash.c1138 u8 *ipad, u8 *opad, in mv_cesa_ahmac_pad_init() argument
1147 memcpy(ipad, key, keylen); in mv_cesa_ahmac_pad_init()
1157 ahash_request_set_crypt(req, &sg, ipad, keylen); in mv_cesa_ahmac_pad_init()
1171 memset(ipad + keylen, 0, blocksize - keylen); in mv_cesa_ahmac_pad_init()
1172 memcpy(opad, ipad, blocksize); in mv_cesa_ahmac_pad_init()
1175 ipad[i] ^= HMAC_IPAD_VALUE; in mv_cesa_ahmac_pad_init()
1189 u8 *ipad = NULL; in mv_cesa_ahmac_setkey() local
1207 ipad = kcalloc(2, blocksize, GFP_KERNEL); in mv_cesa_ahmac_setkey()
1208 if (!ipad) { in mv_cesa_ahmac_setkey()
1213 opad = ipad + blocksize; in mv_cesa_ahmac_setkey()
[all …]
/kernel/linux/linux-6.6/drivers/crypto/cavium/nitrox/
Dnitrox_req.h139 * @ipad: IPAD or KEY2 for AES-XTS
144 u8 ipad[64]; member
184 * 1 - Authentication IV and KEY, microcode calculates OPAD/IPAD
185 * 0 - Authentication OPAD/IPAD
/kernel/linux/linux-5.10/drivers/crypto/cavium/nitrox/
Dnitrox_req.h139 * @ipad: IPAD or KEY2 for AES-XTS
144 u8 ipad[64]; member
183 * 1 - Authentication IV and KEY, microcode calculates OPAD/IPAD
184 * 0 - Authentication OPAD/IPAD
/kernel/linux/linux-6.6/drivers/crypto/intel/keembay/
Dkeembay-ocs-hcu-core.c63 * artifacts (ipad, opad, etc.).
83 * - ipad (1 block) + a possible partial block of data.
84 * - opad (1 block) + digest of H(k ^ ipad || m)
398 * Prepare IPAD for HMAC. Only done for first block. in prepare_ipad()
399 * HMAC(k,m) = H(k ^ opad || H(k ^ ipad || m)) in prepare_ipad()
400 * k ^ ipad will be first hashed block. in prepare_ipad()
521 * of: H(k ^ ipad || m). in kmb_ocs_hcu_do_one_request()
525 * the digest we just obtained, i.e., H(k ^ ipad || m). in kmb_ocs_hcu_do_one_request()
/kernel/linux/linux-5.10/drivers/crypto/
Datmel-sha.c1665 u32 ipad[SHA512_BLOCK_SIZE / sizeof(u32)]; member
1734 /* Prepare ipad. */ in atmel_sha_hmac_setup()
1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup()
1736 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup()
1757 /* Prepare ipad. */ in atmel_sha_hmac_prehash_key_done()
1759 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done()
1760 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done()
1773 memcpy(hmac->opad, hmac->ipad, bs); in atmel_sha_hmac_compute_ipad_hash()
1775 hmac->ipad[i] ^= 0x36363636; in atmel_sha_hmac_compute_ipad_hash()
1779 return atmel_sha_cpu_hash(dd, hmac->ipad, bs, false, in atmel_sha_hmac_compute_ipad_hash()
[all …]
Domap-sham.c166 u8 ipad[SHA512_BLOCK_SIZE] OMAP_ALIGNED; member
485 (u32 *)bctx->ipad, nr_dr); in omap_sham_write_ctrl_omap4()
487 (u32 *)bctx->ipad + nr_dr, nr_dr); in omap_sham_write_ctrl_omap4()
1017 memcpy(ctx->buffer, bctx->ipad, bs); in omap_sham_init()
1239 * the ipad in the beginning of the buffer if we are going for in omap_sham_final_shash()
1261 * HMAC is always >= 9 because ipad == block size. in omap_sham_final()
1314 bctx->ipad); in omap_sham_setkey()
1319 memcpy(bctx->ipad, key, keylen); in omap_sham_setkey()
1322 memset(bctx->ipad + keylen, 0, bs - keylen); in omap_sham_setkey()
1325 memcpy(bctx->opad, bctx->ipad, bs); in omap_sham_setkey()
[all …]
/kernel/linux/linux-6.6/drivers/crypto/
Datmel-sha.c1665 u32 ipad[SHA512_BLOCK_SIZE / sizeof(u32)]; member
1734 /* Prepare ipad. */ in atmel_sha_hmac_setup()
1735 memcpy((u8 *)hmac->ipad, key, keylen); in atmel_sha_hmac_setup()
1736 memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); in atmel_sha_hmac_setup()
1757 /* Prepare ipad. */ in atmel_sha_hmac_prehash_key_done()
1759 hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_prehash_key_done()
1760 memset((u8 *)hmac->ipad + ds, 0, bs - ds); in atmel_sha_hmac_prehash_key_done()
1773 unsafe_memcpy(hmac->opad, hmac->ipad, bs, in atmel_sha_hmac_compute_ipad_hash()
1776 hmac->ipad[i] ^= 0x36363636; in atmel_sha_hmac_compute_ipad_hash()
1780 return atmel_sha_cpu_hash(dd, hmac->ipad, bs, false, in atmel_sha_hmac_compute_ipad_hash()
[all …]
Domap-sham.c162 u8 ipad[SHA512_BLOCK_SIZE] OMAP_ALIGNED; member
462 (u32 *)bctx->ipad, nr_dr); in omap_sham_write_ctrl_omap4()
464 (u32 *)bctx->ipad + nr_dr, nr_dr); in omap_sham_write_ctrl_omap4()
994 memcpy(ctx->buffer, bctx->ipad, bs); in omap_sham_init()
1223 * the ipad in the beginning of the buffer if we are going for in omap_sham_final_shash()
1245 * HMAC is always >= 9 because ipad == block size. in omap_sham_final()
1298 bctx->ipad); in omap_sham_setkey()
1303 memcpy(bctx->ipad, key, keylen); in omap_sham_setkey()
1306 memset(bctx->ipad + keylen, 0, bs - keylen); in omap_sham_setkey()
1309 memcpy(bctx->opad, bctx->ipad, bs); in omap_sham_setkey()
[all …]
/kernel/linux/linux-6.6/drivers/crypto/intel/qat/qat_common/
Dqat_algs.c79 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */ member
123 memset(ctx->ipad, 0, block_size); in qat_alg_do_precomputes()
129 auth_keylen, ctx->ipad); in qat_alg_do_precomputes()
133 memcpy(ctx->opad, ctx->ipad, digest_size); in qat_alg_do_precomputes()
135 memcpy(ctx->ipad, auth_key, auth_keylen); in qat_alg_do_precomputes()
140 char *ipad_ptr = ctx->ipad + i; in qat_alg_do_precomputes()
149 if (crypto_shash_update(shash, ctx->ipad, block_size)) in qat_alg_do_precomputes()
213 memzero_explicit(ctx->ipad, block_size); in qat_alg_do_precomputes()
/kernel/linux/linux-5.10/drivers/crypto/mediatek/
Dmtk-sha.c100 u8 ipad[SHA512_BLOCK_SIZE] __aligned(sizeof(u32));
413 memcpy(ctx->buffer, bctx->ipad, ctx->bs); in mtk_sha_init()
810 bctx->ipad); in mtk_sha_setkey()
815 memcpy(bctx->ipad, key, keylen); in mtk_sha_setkey()
818 memset(bctx->ipad + keylen, 0, bs - keylen); in mtk_sha_setkey()
819 memcpy(bctx->opad, bctx->ipad, bs); in mtk_sha_setkey()
822 bctx->ipad[i] ^= HMAC_IPAD_VALUE; in mtk_sha_setkey()
/kernel/linux/linux-5.10/drivers/crypto/qat/qat_common/
Dqat_algs.c66 char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */ member
109 memset(ctx->ipad, 0, block_size); in qat_alg_do_precomputes()
115 auth_keylen, ctx->ipad); in qat_alg_do_precomputes()
119 memcpy(ctx->opad, ctx->ipad, digest_size); in qat_alg_do_precomputes()
121 memcpy(ctx->ipad, auth_key, auth_keylen); in qat_alg_do_precomputes()
126 char *ipad_ptr = ctx->ipad + i; in qat_alg_do_precomputes()
135 if (crypto_shash_update(shash, ctx->ipad, block_size)) in qat_alg_do_precomputes()
199 memzero_explicit(ctx->ipad, block_size); in qat_alg_do_precomputes()
/kernel/linux/linux-6.6/drivers/crypto/cavium/cpt/
Dcptvf_algs.h89 u8 ipad[64]; member
/kernel/linux/linux-5.10/drivers/crypto/cavium/cpt/
Dcptvf_algs.h89 u8 ipad[64]; member

123