/linux-4.4.14/crypto/ |
D | hmac.c | 50 char *ipad = crypto_shash_ctx_aligned(parent); in hmac_setkey() local 51 char *opad = ipad + ss; in hmac_setkey() 65 err = crypto_shash_digest(shash, inkey, keylen, ipad); in hmac_setkey() 71 memcpy(ipad, inkey, keylen); in hmac_setkey() 73 memset(ipad + keylen, 0, bs - keylen); in hmac_setkey() 74 memcpy(opad, ipad, bs); in hmac_setkey() 77 ipad[i] ^= 0x36; in hmac_setkey() 82 crypto_shash_update(shash, ipad, bs) ?: in hmac_setkey() 83 crypto_shash_export(shash, ipad) ?: in hmac_setkey()
|
/linux-4.4.14/drivers/crypto/marvell/ |
D | hash.c | 1097 u8 *ipad, u8 *opad, in mv_cesa_ahmac_pad_init() argument 1106 memcpy(ipad, key, keylen); in mv_cesa_ahmac_pad_init() 1117 ahash_request_set_crypt(req, &sg, ipad, keylen); in mv_cesa_ahmac_pad_init() 1136 memset(ipad + keylen, 0, blocksize - keylen); in mv_cesa_ahmac_pad_init() 1137 memcpy(opad, ipad, blocksize); in mv_cesa_ahmac_pad_init() 1140 ipad[i] ^= 0x36; in mv_cesa_ahmac_pad_init() 1154 u8 *ipad = NULL; in mv_cesa_ahmac_setkey() local 1173 ipad = kzalloc(2 * blocksize, GFP_KERNEL); in mv_cesa_ahmac_setkey() 1174 if (!ipad) { in mv_cesa_ahmac_setkey() 1179 opad = ipad + blocksize; in mv_cesa_ahmac_setkey() [all …]
|
/linux-4.4.14/drivers/crypto/ |
D | mv_cesa.c | 802 char ipad[ss]; in mv_hash_setkey() local 813 crypto_shash_digest(shash, key, keylen, ipad); in mv_hash_setkey() 819 memcpy(ipad, key, keylen); in mv_hash_setkey() 821 memset(ipad + keylen, 0, bs - keylen); in mv_hash_setkey() 822 memcpy(opad, ipad, bs); in mv_hash_setkey() 825 ipad[i] ^= 0x36; in mv_hash_setkey() 830 crypto_shash_update(shash, ipad, bs) ? : in mv_hash_setkey() 831 crypto_shash_export(shash, ipad) ? : in mv_hash_setkey() 837 mv_hash_init_ivs(ctx, ipad, opad); in mv_hash_setkey()
|
D | omap-sham.c | 162 u8 ipad[SHA512_BLOCK_SIZE] OMAP_ALIGNED; member 475 (u32 *)bctx->ipad, nr_dr); in omap_sham_write_ctrl_omap4() 477 (u32 *)bctx->ipad + nr_dr, nr_dr); in omap_sham_write_ctrl_omap4() 897 memcpy(ctx->buffer, bctx->ipad, bs); in omap_sham_init() 1218 key, keylen, bctx->ipad); in omap_sham_setkey() 1223 memcpy(bctx->ipad, key, keylen); in omap_sham_setkey() 1226 memset(bctx->ipad + keylen, 0, bs - keylen); in omap_sham_setkey() 1229 memcpy(bctx->opad, bctx->ipad, bs); in omap_sham_setkey() 1232 bctx->ipad[i] ^= 0x36; in omap_sham_setkey()
|
/linux-4.4.14/drivers/crypto/qat/qat_common/ |
D | qat_algs.c | 155 char ipad[block_size]; in qat_alg_do_precomputes() local 161 memset(ipad, 0, block_size); in qat_alg_do_precomputes() 168 auth_keylen, ipad); in qat_alg_do_precomputes() 172 memcpy(opad, ipad, digest_size); in qat_alg_do_precomputes() 174 memcpy(ipad, auth_key, auth_keylen); in qat_alg_do_precomputes() 179 char *ipad_ptr = ipad + i; in qat_alg_do_precomputes() 188 if (crypto_shash_update(shash, ipad, block_size)) in qat_alg_do_precomputes() 249 memzero_explicit(ipad, block_size); in qat_alg_do_precomputes()
|
/linux-4.4.14/drivers/crypto/ccp/ |
D | ccp-crypto.h | 151 u8 ipad[MAX_SHA_BLOCK_SIZE]; member
|
D | ccp-crypto-sha.c | 177 memcpy(rctx->buf, ctx->u.sha.ipad, block_size); in ccp_sha_init() 289 ctx->u.sha.ipad[i] = ctx->u.sha.key[i] ^ 0x36; in ccp_sha_setkey()
|
/linux-4.4.14/drivers/scsi/ |
D | eata.c | 703 ushort ipad[247]; member 1106 if (read_pio(port_base, (ushort *) & info, (ushort *) & info.ipad[0])) { in port_detect()
|