ipad 46 crypto/hmac.c char *ipad = crypto_shash_ctx_aligned(parent); ipad 47 crypto/hmac.c char *opad = ipad + ss; ipad 59 crypto/hmac.c err = crypto_shash_digest(shash, inkey, keylen, ipad); ipad 65 crypto/hmac.c memcpy(ipad, inkey, keylen); ipad 67 crypto/hmac.c memset(ipad + keylen, 0, bs - keylen); ipad 68 crypto/hmac.c memcpy(opad, ipad, bs); ipad 71 crypto/hmac.c ipad[i] ^= HMAC_IPAD_VALUE; ipad 76 crypto/hmac.c crypto_shash_update(shash, ipad, bs) ?: ipad 77 crypto/hmac.c crypto_shash_export(shash, ipad) ?: ipad 1731 drivers/crypto/atmel-sha.c u32 ipad[SHA512_BLOCK_SIZE / sizeof(u32)]; ipad 1801 drivers/crypto/atmel-sha.c memcpy((u8 *)hmac->ipad, key, keylen); ipad 1802 drivers/crypto/atmel-sha.c memset((u8 *)hmac->ipad + keylen, 0, bs - keylen); ipad 1825 drivers/crypto/atmel-sha.c hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); ipad 1826 drivers/crypto/atmel-sha.c memset((u8 *)hmac->ipad + ds, 0, bs - ds); ipad 1839 drivers/crypto/atmel-sha.c memcpy(hmac->opad, hmac->ipad, bs); ipad 1841 drivers/crypto/atmel-sha.c hmac->ipad[i] ^= 0x36363636; ipad 1845 drivers/crypto/atmel-sha.c return atmel_sha_cpu_hash(dd, hmac->ipad, bs, false, ipad 1860 drivers/crypto/atmel-sha.c hmac->ipad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); ipad 1948 drivers/crypto/atmel-sha.c memcpy(ctx->digest, hmac->ipad, hs); ipad 2034 drivers/crypto/atmel-sha.c atmel_sha_write(dd, SHA_REG_DIN(i), hmac->ipad[i]); ipad 2430 drivers/crypto/atmel-sha.c atmel_sha_write(dd, SHA_REG_DIN(i), hmac->ipad[i]); ipad 2459 drivers/crypto/bcm/cipher.c memcpy(ctx->ipad, ctx->authkey, ctx->authkeylen); ipad 2460 drivers/crypto/bcm/cipher.c memset(ctx->ipad + ctx->authkeylen, 0, ipad 2463 drivers/crypto/bcm/cipher.c memcpy(ctx->opad, ctx->ipad, blocksize); ipad 2466 drivers/crypto/bcm/cipher.c ctx->ipad[index] ^= HMAC_IPAD_VALUE; ipad 2470 drivers/crypto/bcm/cipher.c flow_dump(" ipad: ", ctx->ipad, blocksize); ipad 2497 drivers/crypto/bcm/cipher.c memcpy(rctx->hash_carry, ctx->ipad, blocksize); ipad 2557 drivers/crypto/bcm/cipher.c memcpy(rctx->hash_carry, ctx->ipad, blocksize); ipad 212 drivers/crypto/bcm/cipher.h u8 ipad[MAX_HASH_BLOCK_SIZE]; ipad 89 drivers/crypto/cavium/cpt/cptvf_algs.h u8 ipad[64]; ipad 142 drivers/crypto/cavium/nitrox/nitrox_req.h u8 ipad[64]; ipad 197 drivers/crypto/ccp/ccp-crypto-sha.c memcpy(rctx->buf, ctx->u.sha.ipad, block_size); ipad 307 drivers/crypto/ccp/ccp-crypto-sha.c ctx->u.sha.ipad[i] = ctx->u.sha.key[i] ^ HMAC_IPAD_VALUE; ipad 190 drivers/crypto/ccp/ccp-crypto.h u8 ipad[MAX_SHA_BLOCK_SIZE]; ipad 2116 drivers/crypto/chelsio/chcr_algo.c hmacctx->ipad); ipad 2121 drivers/crypto/chelsio/chcr_algo.c memcpy(hmacctx->ipad, key, keylen); ipad 2123 drivers/crypto/chelsio/chcr_algo.c memset(hmacctx->ipad + keylen, 0, bs - keylen); ipad 2124 drivers/crypto/chelsio/chcr_algo.c memcpy(hmacctx->opad, hmacctx->ipad, bs); ipad 2127 drivers/crypto/chelsio/chcr_algo.c *((unsigned int *)(&hmacctx->ipad) + i) ^= IPAD_DATA; ipad 2136 drivers/crypto/chelsio/chcr_algo.c err = chcr_compute_partial_hash(shash, hmacctx->ipad, ipad 2137 drivers/crypto/chelsio/chcr_algo.c hmacctx->ipad, digestsize); ipad 2140 drivers/crypto/chelsio/chcr_algo.c chcr_change_order(hmacctx->ipad, updated_digestsize); ipad 2215 drivers/crypto/chelsio/chcr_algo.c memcpy(req_ctx->partial_hash, hmacctx->ipad, ipad 2218 drivers/crypto/chelsio/chcr_algo.c memcpy(req_ctx->partial_hash, hmacctx->ipad, ipad 2221 drivers/crypto/chelsio/chcr_algo.c memcpy(req_ctx->partial_hash, hmacctx->ipad, ipad 241 drivers/crypto/chelsio/chcr_crypto.h u8 ipad[CHCR_HASH_MAX_BLOCK_SIZE_128]; ipad 54 drivers/crypto/inside-secure/safexcel_cipher.c u32 ipad[SHA512_DIGEST_SIZE / sizeof(u32)]; ipad 386 drivers/crypto/inside-secure/safexcel_cipher.c (memcmp(ctx->ipad, istate.state, ctx->state_sz) || ipad 394 drivers/crypto/inside-secure/safexcel_cipher.c memcpy(ctx->ipad, &istate.state, ctx->state_sz); ipad 583 drivers/crypto/inside-secure/safexcel_cipher.c ctx->ipad, ctx->state_sz); ipad 2112 drivers/crypto/inside-secure/safexcel_cipher.c if (ctx->ipad[i] != cpu_to_be32(hashkey[i])) { ipad 2120 drivers/crypto/inside-secure/safexcel_cipher.c ctx->ipad[i] = cpu_to_be32(hashkey[i]); ipad 2211 drivers/crypto/inside-secure/safexcel_cipher.c ctx->ipad[i + 2 * AES_BLOCK_SIZE / sizeof(u32)] = ipad 23 drivers/crypto/inside-secure/safexcel_hash.c u32 ipad[SHA512_DIGEST_SIZE / sizeof(u32)]; ipad 884 drivers/crypto/inside-secure/safexcel_hash.c memcpy(req->state, ctx->ipad, SHA1_DIGEST_SIZE); ipad 926 drivers/crypto/inside-secure/safexcel_hash.c unsigned int keylen, u8 *ipad, u8 *opad) ipad 934 drivers/crypto/inside-secure/safexcel_hash.c memcpy(ipad, key, keylen); ipad 943 drivers/crypto/inside-secure/safexcel_hash.c ahash_request_set_crypt(areq, &sg, ipad, keylen); ipad 962 drivers/crypto/inside-secure/safexcel_hash.c memset(ipad + keylen, 0, blocksize - keylen); ipad 963 drivers/crypto/inside-secure/safexcel_hash.c memcpy(opad, ipad, blocksize); ipad 966 drivers/crypto/inside-secure/safexcel_hash.c ipad[i] ^= HMAC_IPAD_VALUE; ipad 1012 drivers/crypto/inside-secure/safexcel_hash.c u8 *ipad, *opad; ipad 1028 drivers/crypto/inside-secure/safexcel_hash.c ipad = kcalloc(2, blocksize, GFP_KERNEL); ipad 1029 drivers/crypto/inside-secure/safexcel_hash.c if (!ipad) { ipad 1034 drivers/crypto/inside-secure/safexcel_hash.c opad = ipad + blocksize; ipad 1036 drivers/crypto/inside-secure/safexcel_hash.c ret = safexcel_hmac_init_pad(areq, blocksize, key, keylen, ipad, opad); ipad 1040 drivers/crypto/inside-secure/safexcel_hash.c ret = safexcel_hmac_init_iv(areq, blocksize, ipad, istate); ipad 1047 drivers/crypto/inside-secure/safexcel_hash.c kfree(ipad); ipad 1070 drivers/crypto/inside-secure/safexcel_hash.c (memcmp(ctx->ipad, istate.state, state_sz) || ipad 1074 drivers/crypto/inside-secure/safexcel_hash.c memcpy(ctx->ipad, &istate.state, state_sz); ipad 1243 drivers/crypto/inside-secure/safexcel_hash.c memcpy(req->state, ctx->ipad, SHA256_DIGEST_SIZE); ipad 1313 drivers/crypto/inside-secure/safexcel_hash.c memcpy(req->state, ctx->ipad, SHA256_DIGEST_SIZE); ipad 1493 drivers/crypto/inside-secure/safexcel_hash.c memcpy(req->state, ctx->ipad, SHA512_DIGEST_SIZE); ipad 1563 drivers/crypto/inside-secure/safexcel_hash.c memcpy(req->state, ctx->ipad, SHA512_DIGEST_SIZE); ipad 1681 drivers/crypto/inside-secure/safexcel_hash.c memcpy(req->state, ctx->ipad, MD5_DIGEST_SIZE); ipad 1121 drivers/crypto/marvell/hash.c u8 *ipad, u8 *opad, ipad 1130 drivers/crypto/marvell/hash.c memcpy(ipad, key, keylen); ipad 1141 drivers/crypto/marvell/hash.c ahash_request_set_crypt(req, &sg, ipad, keylen); ipad 1159 drivers/crypto/marvell/hash.c memset(ipad + keylen, 0, blocksize - keylen); ipad 1160 drivers/crypto/marvell/hash.c memcpy(opad, ipad, blocksize); ipad 1163 drivers/crypto/marvell/hash.c ipad[i] ^= HMAC_IPAD_VALUE; ipad 1177 drivers/crypto/marvell/hash.c u8 *ipad = NULL; ipad 1195 drivers/crypto/marvell/hash.c ipad = kcalloc(2, blocksize, GFP_KERNEL); ipad 1196 drivers/crypto/marvell/hash.c if (!ipad) { ipad 1201 drivers/crypto/marvell/hash.c opad = ipad + blocksize; ipad 1203 drivers/crypto/marvell/hash.c ret = mv_cesa_ahmac_pad_init(req, key, keylen, ipad, opad, blocksize); ipad 1207 drivers/crypto/marvell/hash.c ret = mv_cesa_ahmac_iv_state_init(req, ipad, istate, blocksize); ipad 1214 drivers/crypto/marvell/hash.c kfree(ipad); ipad 100 drivers/crypto/mediatek/mtk-sha.c u8 ipad[SHA512_BLOCK_SIZE] __aligned(sizeof(u32)); ipad 413 drivers/crypto/mediatek/mtk-sha.c memcpy(ctx->buffer, bctx->ipad, ctx->bs); ipad 813 drivers/crypto/mediatek/mtk-sha.c err = crypto_shash_digest(shash, key, keylen, bctx->ipad); ipad 818 drivers/crypto/mediatek/mtk-sha.c memcpy(bctx->ipad, key, keylen); ipad 821 drivers/crypto/mediatek/mtk-sha.c memset(bctx->ipad + keylen, 0, bs - keylen); ipad 822 drivers/crypto/mediatek/mtk-sha.c memcpy(bctx->opad, bctx->ipad, bs); ipad 825 drivers/crypto/mediatek/mtk-sha.c bctx->ipad[i] ^= HMAC_IPAD_VALUE; ipad 163 drivers/crypto/omap-sham.c u8 ipad[SHA512_BLOCK_SIZE] OMAP_ALIGNED; ipad 477 drivers/crypto/omap-sham.c (u32 *)bctx->ipad, nr_dr); ipad 479 drivers/crypto/omap-sham.c (u32 *)bctx->ipad + nr_dr, nr_dr); ipad 985 drivers/crypto/omap-sham.c memcpy(ctx->buffer, bctx->ipad, bs); ipad 1327 drivers/crypto/omap-sham.c key, keylen, bctx->ipad); ipad 1332 drivers/crypto/omap-sham.c memcpy(bctx->ipad, key, keylen); ipad 1335 drivers/crypto/omap-sham.c memset(bctx->ipad + keylen, 0, bs - keylen); ipad 1338 drivers/crypto/omap-sham.c memcpy(bctx->opad, bctx->ipad, bs); ipad 1341 drivers/crypto/omap-sham.c bctx->ipad[i] ^= HMAC_IPAD_VALUE; ipad 121 drivers/crypto/qat/qat_common/qat_algs.c char ipad[SHA512_BLOCK_SIZE]; /* sufficient for SHA-1/SHA-256 as well */ ipad 163 drivers/crypto/qat/qat_common/qat_algs.c memset(ctx->ipad, 0, block_size); ipad 169 drivers/crypto/qat/qat_common/qat_algs.c auth_keylen, ctx->ipad); ipad 173 drivers/crypto/qat/qat_common/qat_algs.c memcpy(ctx->opad, ctx->ipad, digest_size); ipad 175 drivers/crypto/qat/qat_common/qat_algs.c memcpy(ctx->ipad, auth_key, auth_keylen); ipad 180 drivers/crypto/qat/qat_common/qat_algs.c char *ipad_ptr = ctx->ipad + i; ipad 189 drivers/crypto/qat/qat_common/qat_algs.c if (crypto_shash_update(shash, ctx->ipad, block_size)) ipad 253 drivers/crypto/qat/qat_common/qat_algs.c memzero_explicit(ctx->ipad, block_size);