/linux-4.1.27/crypto/ |
H A D | hmac.c | 50 char *ipad = crypto_shash_ctx_aligned(parent); hmac_setkey() local 51 char *opad = ipad + ss; hmac_setkey() 65 err = crypto_shash_digest(shash, inkey, keylen, ipad); hmac_setkey() 71 memcpy(ipad, inkey, keylen); hmac_setkey() 73 memset(ipad + keylen, 0, bs - keylen); hmac_setkey() 74 memcpy(opad, ipad, bs); hmac_setkey() 77 ipad[i] ^= 0x36; hmac_setkey() 82 crypto_shash_update(shash, ipad, bs) ?: hmac_setkey() 83 crypto_shash_export(shash, ipad) ?: hmac_setkey()
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | key_gen.c | 31 get a split ipad/opad key
|
/linux-4.1.27/drivers/crypto/ |
H A D | mv_cesa.c | 787 /* Can't see a way to extract the ipad/opad from the fallback tfm mv_hash_setkey() 797 char ipad[ss]; mv_hash_setkey() local 808 crypto_shash_digest(shash, key, keylen, ipad); mv_hash_setkey() 814 memcpy(ipad, key, keylen); mv_hash_setkey() 816 memset(ipad + keylen, 0, bs - keylen); mv_hash_setkey() 817 memcpy(opad, ipad, bs); mv_hash_setkey() 820 ipad[i] ^= 0x36; mv_hash_setkey() 825 crypto_shash_update(shash, ipad, bs) ? : mv_hash_setkey() 826 crypto_shash_export(shash, ipad) ? : mv_hash_setkey() 832 mv_hash_init_ivs(ctx, ipad, opad); mv_hash_setkey() 863 /* Allocate a hash to compute the ipad/opad of hmac. */ mv_cra_hash_init()
|
H A D | omap-sham.c | 162 u8 ipad[SHA512_BLOCK_SIZE] OMAP_ALIGNED; 469 (u32 *)bctx->ipad, nr_dr); omap_sham_write_ctrl_omap4() 471 (u32 *)bctx->ipad + nr_dr, nr_dr); omap_sham_write_ctrl_omap4() 891 memcpy(ctx->buffer, bctx->ipad, bs); omap_sham_init() 1149 /* HMAC is always >= 9 because ipad == block size */ omap_sham_final() 1212 key, keylen, bctx->ipad); omap_sham_setkey() 1217 memcpy(bctx->ipad, key, keylen); omap_sham_setkey() 1220 memset(bctx->ipad + keylen, 0, bs - keylen); omap_sham_setkey() 1223 memcpy(bctx->opad, bctx->ipad, bs); omap_sham_setkey() 1226 bctx->ipad[i] ^= 0x36; omap_sham_setkey()
|
/linux-4.1.27/drivers/crypto/qat/qat_common/ |
H A D | qat_algs.c | 164 char ipad[block_size]; qat_alg_do_precomputes() local 170 memset(ipad, 0, block_size); qat_alg_do_precomputes() 177 auth_keylen, ipad); qat_alg_do_precomputes() 181 memcpy(opad, ipad, digest_size); qat_alg_do_precomputes() 183 memcpy(ipad, auth_key, auth_keylen); qat_alg_do_precomputes() 188 char *ipad_ptr = ipad + i; qat_alg_do_precomputes() 197 if (crypto_shash_update(shash, ipad, block_size)) qat_alg_do_precomputes() 258 memzero_explicit(ipad, block_size); qat_alg_do_precomputes()
|
/linux-4.1.27/drivers/crypto/ccp/ |
H A D | ccp-crypto.h | 151 u8 ipad[MAX_SHA_BLOCK_SIZE]; member in struct:ccp_sha_ctx
|
H A D | ccp-crypto-sha.c | 164 memcpy(rctx->buf, ctx->u.sha.ipad, block_size); ccp_sha_init() 276 ctx->u.sha.ipad[i] = ctx->u.sha.key[i] ^ 0x36; ccp_sha_setkey()
|
/linux-4.1.27/arch/mips/boot/ |
H A D | elf2ecoff.c | 551 perror("ipad: write"); main()
|
/linux-4.1.27/drivers/scsi/ |
H A D | eata.c | 703 ushort ipad[247]; member in struct:eata_info 1106 if (read_pio(port_base, (ushort *) & info, (ushort *) & info.ipad[0])) { port_detect()
|