Lines Matching full:ipad
616 * for calculating ipad and opad in cpt_aead_init()
621 ctx->ipad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init()
622 if (!ctx->ipad) { in cpt_aead_init()
630 kfree(ctx->ipad); in cpt_aead_init()
704 kfree(ctx->ipad); in otx2_cpt_aead_exit()
816 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local
853 ipad = ctx->ipad; in aead_hmac_init()
856 memcpy(ipad, ctx->key, authkeylen); in aead_hmac_init()
857 memset(ipad + authkeylen, 0, bs - authkeylen); in aead_hmac_init()
858 memcpy(opad, ipad, bs); in aead_hmac_init()
861 ipad[icount] ^= 0x36; in aead_hmac_init()
867 * algorithm is retrieved for IPAD & OPAD in aead_hmac_init()
870 /* IPAD Calculation */ in aead_hmac_init()
872 crypto_shash_update(&ctx->sdesc->shash, ipad, bs); in aead_hmac_init()
873 crypto_shash_export(&ctx->sdesc->shash, ipad); in aead_hmac_init()
874 ret = swap_pad(ctx->mac_type, ipad); in aead_hmac_init()
967 if (ctx->ipad) in create_aead_ctx_hdr()
968 memcpy(fctx->hmac.e.ipad, ctx->ipad, ds); in create_aead_ctx_hdr()