Home
last modified time | relevance | path

Searched refs:opad (Results 1 – 22 of 22) sorted by relevance

/drivers/crypto/marvell/octeontx/
Dotx_cptvf_algs.c609 kfree(ctx->opad); in otx_cpt_aead_exit()
747 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
760 ctx->opad = kzalloc(bs, GFP_KERNEL); in aead_hmac_init()
761 if (!ctx->opad) { in aead_hmac_init()
772 opad = kzalloc(state_size, GFP_KERNEL); in aead_hmac_init()
773 if (!opad) { in aead_hmac_init()
790 memcpy(opad, ipad, bs); in aead_hmac_init()
794 opad[icount] ^= 0x5c; in aead_hmac_init()
812 crypto_shash_update(&ctx->sdesc->shash, opad, bs); in aead_hmac_init()
813 crypto_shash_export(&ctx->sdesc->shash, opad); in aead_hmac_init()
[all …]
Dotx_cptvf_algs.h116 u8 opad[64]; member
174 u8 *opad; member
/drivers/crypto/chelsio/
Dchcr_algo.h145 #define FILL_SEC_CPL_SCMD0_SEQNO(ctrl, seq, cmode, amode, opad, size) \ argument
154 SCMD_HMAC_CTRL_V((opad)) | \
170 #define FILL_KEY_CTX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument
175 KEY_CONTEXT_OPAD_PRESENT_V((opad)) | \
179 #define FILL_KEY_CRX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument
Dchcr_crypto.h244 u8 opad[CHCR_HASH_MAX_BLOCK_SIZE_128]; member
Dchcr_algo.c1618 hmacctx->opad, param->alg_prm.result_size); in create_hash_wr()
2219 memcpy(hmacctx->opad, hmacctx->ipad, bs); in chcr_ahash_setkey()
2223 *((unsigned int *)(&hmacctx->opad) + i) ^= OPAD_DATA; in chcr_ahash_setkey()
2237 err = chcr_compute_partial_hash(shash, hmacctx->opad, in chcr_ahash_setkey()
2238 hmacctx->opad, digestsize); in chcr_ahash_setkey()
2241 chcr_change_order(hmacctx->opad, updated_digestsize); in chcr_ahash_setkey()
/drivers/crypto/marvell/octeontx2/
Dotx2_cptvf_algs.c687 kfree(ctx->opad); in otx2_cpt_aead_exit()
802 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
815 ctx->opad = kzalloc(bs, GFP_KERNEL); in aead_hmac_init()
816 if (!ctx->opad) { in aead_hmac_init()
827 opad = kzalloc(state_size, GFP_KERNEL); in aead_hmac_init()
828 if (!opad) { in aead_hmac_init()
845 memcpy(opad, ipad, bs); in aead_hmac_init()
849 opad[icount] ^= 0x5c; in aead_hmac_init()
867 crypto_shash_update(&ctx->sdesc->shash, opad, bs); in aead_hmac_init()
868 crypto_shash_export(&ctx->sdesc->shash, opad); in aead_hmac_init()
[all …]
Dotx2_cptvf_algs.h106 u8 opad[64]; member
165 u8 *opad; member
/drivers/crypto/inside-secure/
Dsafexcel_hash.c207 &ctx->base.opad, req->state_sz); in safexcel_context_control()
276 memcpy(sreq->state, &ctx->base.opad, sreq->digest_sz); in safexcel_handle_req_result()
707 &ctx->base.opad, req->state_sz)))) in safexcel_ahash_enqueue()
1063 unsigned int keylen, u8 *ipad, u8 *opad) in safexcel_hmac_init_pad() argument
1099 memcpy(opad, ipad, blocksize); in safexcel_hmac_init_pad()
1103 opad[i] ^= HMAC_OPAD_VALUE; in safexcel_hmac_init_pad()
1149 u8 *ipad, *opad; in __safexcel_hmac_setkey() local
1171 opad = ipad + blocksize; in __safexcel_hmac_setkey()
1173 ret = safexcel_hmac_init_pad(areq, blocksize, key, keylen, ipad, opad); in __safexcel_hmac_setkey()
1181 ret = safexcel_hmac_init_iv(areq, blocksize, opad, ostate); in __safexcel_hmac_setkey()
[all …]
Dsafexcel.h846 } ipad, opad; member
Dsafexcel_cipher.c707 ctx->state_sz) / sizeof(u32), &ctx->base.opad, in safexcel_send_req()
/drivers/crypto/marvell/cesa/
Dhash.c1158 u8 *ipad, u8 *opad, in mv_cesa_ahmac_pad_init() argument
1197 memcpy(opad, ipad, blocksize); in mv_cesa_ahmac_pad_init()
1201 opad[i] ^= HMAC_OPAD_VALUE; in mv_cesa_ahmac_pad_init()
1215 u8 *opad; in mv_cesa_ahmac_setkey() local
1238 opad = ipad + blocksize; in mv_cesa_ahmac_setkey()
1240 ret = mv_cesa_ahmac_pad_init(req, key, keylen, ipad, opad, blocksize); in mv_cesa_ahmac_setkey()
1248 ret = mv_cesa_ahmac_iv_state_init(req, opad, ostate, blocksize); in mv_cesa_ahmac_setkey()
/drivers/crypto/cavium/cpt/
Dcptvf_algs.h90 u8 opad[64]; /* or OPAD */ member
/drivers/crypto/ccp/
Dccp-crypto-sha.c162 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? in ccp_do_sha_update()
303 ctx->u.sha.opad[i] = ctx->u.sha.key[i] ^ HMAC_OPAD_VALUE; in ccp_sha_setkey()
306 sg_init_one(&ctx->u.sha.opad_sg, ctx->u.sha.opad, block_size); in ccp_sha_setkey()
Dccp-crypto.h195 u8 opad[MAX_SHA_BLOCK_SIZE]; member
Dccp-ops.c1761 if (sha->final && sha->opad) { in ccp_run_sha_cmd()
1779 scatterwalk_map_and_copy(hmac_buf, sha->opad, 0, block_size, 0); in ccp_run_sha_cmd()
1811 hmac_cmd.u.sha.opad = NULL; in ccp_run_sha_cmd()
/drivers/crypto/qat/qat_common/
Dqat_algs.c79 char opad[SHA512_BLOCK_SIZE]; member
124 memset(ctx->opad, 0, block_size); in qat_alg_do_precomputes()
133 memcpy(ctx->opad, ctx->ipad, digest_size); in qat_alg_do_precomputes()
136 memcpy(ctx->opad, auth_key, auth_keylen); in qat_alg_do_precomputes()
141 char *opad_ptr = ctx->opad + i; in qat_alg_do_precomputes()
181 if (crypto_shash_update(shash, ctx->opad, block_size)) in qat_alg_do_precomputes()
214 memzero_explicit(ctx->opad, block_size); in qat_alg_do_precomputes()
/drivers/crypto/
Domap-sham.c167 u8 opad[SHA512_BLOCK_SIZE] OMAP_ALIGNED; member
311 u32 *opad = (u32 *)bctx->opad; in omap_sham_copy_hash_omap4() local
315 opad[i] = omap_sham_read(dd, in omap_sham_copy_hash_omap4()
319 opad[i]); in omap_sham_copy_hash_omap4()
1111 crypto_shash_update(shash, bctx->opad, bs) ?: in omap_sham_finish_hmac()
1310 memcpy(bctx->opad, bctx->ipad, bs); in omap_sham_setkey()
1314 bctx->opad[i] ^= HMAC_OPAD_VALUE; in omap_sham_setkey()
Datmel-sha.c1666 u32 opad[SHA512_BLOCK_SIZE / sizeof(u32)]; member
1773 memcpy(hmac->opad, hmac->ipad, bs); in atmel_sha_hmac_compute_ipad_hash()
1776 hmac->opad[i] ^= 0x5c5c5c5c; in atmel_sha_hmac_compute_ipad_hash()
1795 return atmel_sha_cpu_hash(dd, hmac->opad, bs, false, in atmel_sha_hmac_compute_opad_hash()
1809 hmac->opad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_setup_done()
1908 atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]); in atmel_sha_hmac_final()
1972 atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]); in atmel_sha_hmac_digest2()
2293 atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]); in atmel_sha_authenc_init2()
Dsa2ul.c145 u16 key_sz, __be32 *ipad, __be32 *opad);
435 u16 key_sz, __be32 *ipad, __be32 *opad) in sa_prepare_iopads() argument
459 sa_export_shash(&sha, shash, digest_size, opad); in sa_prepare_iopads()
535 __be32 *opad = (void *)(sc_buf + 64); in sa_set_sc_auth() local
545 ad->prep_iopad(ad, key, key_sz, ipad, opad); in sa_set_sc_auth()
/drivers/crypto/bcm/
Dcipher.h216 u8 opad[MAX_HASH_BLOCK_SIZE]; member
Dcipher.c907 rc = do_shash("md5", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash()
911 rc = do_shash("sha1", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash()
915 rc = do_shash("sha224", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash()
919 rc = do_shash("sha256", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash()
923 rc = do_shash("sha384", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash()
927 rc = do_shash("sha512", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash()
2400 memcpy(ctx->opad, ctx->ipad, blocksize); in ahash_hmac_setkey()
2404 ctx->opad[index] ^= HMAC_OPAD_VALUE; in ahash_hmac_setkey()
2408 flow_dump(" opad: ", ctx->opad, blocksize); in ahash_hmac_setkey()
/drivers/crypto/cavium/nitrox/
Dnitrox_req.h147 u8 opad[64]; member