| /drivers/crypto/chelsio/ |
| A D | chcr_algo.h | 145 #define FILL_SEC_CPL_SCMD0_SEQNO(ctrl, seq, cmode, amode, opad, size) \ argument 154 SCMD_HMAC_CTRL_V((opad)) | \ 170 #define FILL_KEY_CTX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument 175 KEY_CONTEXT_OPAD_PRESENT_V((opad)) | \ 179 #define FILL_KEY_CRX_HDR(ck_size, mk_size, d_ck, opad, ctx_len) \ argument
|
| A D | chcr_crypto.h | 246 u8 opad[CHCR_HASH_MAX_BLOCK_SIZE_128]; member
|
| A D | chcr_algo.c | 1618 hmacctx->opad, param->alg_prm.result_size); in create_hash_wr() 2226 unsafe_memcpy(hmacctx->opad, hmacctx->ipad, bs, in chcr_ahash_setkey() 2231 *((unsigned int *)(&hmacctx->opad) + i) ^= OPAD_DATA; in chcr_ahash_setkey() 2245 err = chcr_compute_partial_hash(shash, hmacctx->opad, in chcr_ahash_setkey() 2246 hmacctx->opad, digestsize); in chcr_ahash_setkey() 2249 chcr_change_order(hmacctx->opad, updated_digestsize); in chcr_ahash_setkey()
|
| /drivers/crypto/marvell/octeontx/ |
| A D | otx_cptvf_algs.c | 553 ctx->opad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init() 554 if (!ctx->opad) { in cpt_aead_init() 563 kfree(ctx->opad); in cpt_aead_init() 622 kfree(ctx->opad); in otx_cpt_aead_exit() 756 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local 793 opad = ctx->opad; in aead_hmac_init() 797 memcpy(opad, ipad, bs); in aead_hmac_init() 801 opad[icount] ^= 0x5c; in aead_hmac_init() 821 ret = swap_pad(ctx->mac_type, opad); in aead_hmac_init() 912 if (ctx->opad) in create_aead_ctx_hdr() [all …]
|
| A D | otx_cptvf_algs.h | 116 u8 opad[64]; member 174 u8 *opad; member
|
| /drivers/crypto/allwinner/sun8i-ss/ |
| A D | sun8i-ss-hash.c | 70 tfmctx->opad = kzalloc(bs, GFP_KERNEL); in sun8i_ss_hmac_setkey() 71 if (!tfmctx->opad) { in sun8i_ss_hmac_setkey() 78 memcpy(tfmctx->opad, tfmctx->key, tfmctx->keylen); in sun8i_ss_hmac_setkey() 81 tfmctx->opad[i] ^= HMAC_OPAD_VALUE; in sun8i_ss_hmac_setkey() 89 kfree_sensitive(tfmctx->opad); in sun8i_ss_hmac_setkey() 138 kfree_sensitive(tfmctx->opad); in sun8i_ss_hash_exit_tfm() 611 addr_xpad = dma_map_single(ss->dev, tfmctx->opad, bs, DMA_TO_DEVICE); in sun8i_ss_hash_run()
|
| A D | sun8i-ss.h | 235 u8 *opad; member
|
| /drivers/crypto/marvell/octeontx2/ |
| A D | otx2_cptvf_algs.c | 647 ctx->opad = kzalloc(ss, GFP_KERNEL); in cpt_aead_init() 648 if (!ctx->opad) { in cpt_aead_init() 733 kfree(ctx->opad); in otx2_cpt_aead_exit() 845 u8 *ipad = NULL, *opad = NULL; in aead_hmac_init() local 883 opad = ctx->opad; in aead_hmac_init() 887 memcpy(opad, ipad, bs); in aead_hmac_init() 891 opad[icount] ^= 0x5c; in aead_hmac_init() 910 crypto_shash_export(&ctx->sdesc->shash, opad); in aead_hmac_init() 911 ret = swap_pad(ctx->mac_type, opad); in aead_hmac_init() 998 if (ctx->opad) in create_aead_ctx_hdr() [all …]
|
| A D | otx2_cptvf_algs.h | 107 u8 opad[64]; member 170 u8 *opad; member
|
| /drivers/crypto/inside-secure/ |
| A D | safexcel_hash.c | 207 &ctx->base.opad, req->state_sz); in safexcel_context_control() 705 &ctx->base.opad, req->state_sz)))) in safexcel_ahash_enqueue() 1045 unsigned int keylen, u8 *ipad, u8 *opad) in safexcel_hmac_init_pad() argument 1077 memcpy(opad, ipad, blocksize); in safexcel_hmac_init_pad() 1081 opad[i] ^= HMAC_OPAD_VALUE; in safexcel_hmac_init_pad() 1121 u8 *ipad, *opad; in __safexcel_hmac_setkey() local 1143 opad = ipad + blocksize; in __safexcel_hmac_setkey() 2311 &ctx->base.opad, in safexcel_sha3_fbcheck() 2694 memmove(&ctx->base.opad, in safexcel_hmac_sha3_setkey() 2709 memcpy(&ctx->base.opad, in safexcel_hmac_sha3_setkey() [all …]
|
| /drivers/crypto/inside-secure/eip93/ |
| A D | eip93-common.h | 21 unsigned int hashlen, u8 *ipad, u8 *opad,
|
| A D | eip93-hash.h | 21 u8 opad[SHA256_DIGEST_SIZE] __aligned(sizeof(u32));
|
| A D | eip93-common.c | 708 u8 ipad[SHA256_BLOCK_SIZE], opad[SHA256_BLOCK_SIZE]; in eip93_hmac_setkey() local 765 memcpy(opad, ipad, SHA256_BLOCK_SIZE); in eip93_hmac_setkey() 770 opad[i] ^= HMAC_OPAD_VALUE; in eip93_hmac_setkey() 792 sg_init_one(&sg[0], opad, SHA256_BLOCK_SIZE); in eip93_hmac_setkey()
|
| A D | eip93-hash.c | 195 memcpy(sa_record_hmac->sa_o_digest, ctx->opad, SHA256_DIGEST_SIZE); in __eip93_hash_init() 569 ctx->ipad, ctx->opad, true); in eip93_hash_hmac_setkey()
|
| /drivers/crypto/marvell/cesa/ |
| A D | hash.c | 1136 u8 *ipad, u8 *opad, in mv_cesa_ahmac_pad_init() argument 1170 memcpy(opad, ipad, blocksize); in mv_cesa_ahmac_pad_init() 1174 opad[i] ^= HMAC_OPAD_VALUE; in mv_cesa_ahmac_pad_init() 1188 u8 *opad; in mv_cesa_ahmac_setkey() local 1211 opad = ipad + blocksize; in mv_cesa_ahmac_setkey() 1213 ret = mv_cesa_ahmac_pad_init(req, key, keylen, ipad, opad, blocksize); in mv_cesa_ahmac_setkey() 1221 ret = mv_cesa_ahmac_iv_state_init(req, opad, ostate, blocksize); in mv_cesa_ahmac_setkey()
|
| /drivers/crypto/intel/qat/qat_common/ |
| A D | qat_algs.c | 80 char opad[SHA512_BLOCK_SIZE]; member 124 memset(ctx->opad, 0, block_size); in qat_alg_do_precomputes() 133 memcpy(ctx->opad, ctx->ipad, digest_size); in qat_alg_do_precomputes() 136 memcpy(ctx->opad, auth_key, auth_keylen); in qat_alg_do_precomputes() 141 char *opad_ptr = ctx->opad + i; in qat_alg_do_precomputes() 181 if (crypto_shash_update(shash, ctx->opad, block_size)) in qat_alg_do_precomputes() 214 memzero_explicit(ctx->opad, block_size); in qat_alg_do_precomputes()
|
| /drivers/crypto/ccp/ |
| A D | ccp-crypto-sha.c | 162 rctx->cmd.u.sha.opad = ctx->u.sha.key_len ? in ccp_do_sha_update() 303 ctx->u.sha.opad[i] = ctx->u.sha.key[i] ^ HMAC_OPAD_VALUE; in ccp_sha_setkey() 306 sg_init_one(&ctx->u.sha.opad_sg, ctx->u.sha.opad, block_size); in ccp_sha_setkey()
|
| A D | ccp-crypto.h | 195 u8 opad[MAX_SHA_BLOCK_SIZE]; member
|
| /drivers/crypto/cavium/cpt/ |
| A D | cptvf_algs.h | 90 u8 opad[64]; /* or OPAD */ member
|
| /drivers/crypto/ |
| A D | omap-sham.c | 163 u8 opad[SHA512_BLOCK_SIZE] OMAP_ALIGNED; member 306 u32 *opad = (u32 *)bctx->opad; in omap_sham_copy_hash_omap4() local 310 opad[i] = omap_sham_read(dd, in omap_sham_copy_hash_omap4() 314 opad[i]); in omap_sham_copy_hash_omap4() 1110 crypto_shash_update(shash, bctx->opad, bs) ?: in omap_sham_finish_hmac() 1308 memcpy(bctx->opad, bctx->ipad, bs); in omap_sham_setkey() 1312 bctx->opad[i] ^= HMAC_OPAD_VALUE; in omap_sham_setkey()
|
| A D | atmel-sha.c | 1665 u32 opad[SHA512_BLOCK_SIZE / sizeof(u32)]; member 1772 unsafe_memcpy(hmac->opad, hmac->ipad, bs, in atmel_sha_hmac_compute_ipad_hash() 1776 hmac->opad[i] ^= 0x5c5c5c5c; in atmel_sha_hmac_compute_ipad_hash() 1795 return atmel_sha_cpu_hash(dd, hmac->opad, bs, false, in atmel_sha_hmac_compute_opad_hash() 1809 hmac->opad[i] = atmel_sha_read(dd, SHA_REG_DIGEST(i)); in atmel_sha_hmac_setup_done() 1908 atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]); in atmel_sha_hmac_final() 1990 atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]); in atmel_sha_hmac_digest2() 2319 atmel_sha_write(dd, SHA_REG_DIN(i), hmac->opad[i]); in atmel_sha_authenc_init2()
|
| A D | sa2ul.c | 146 u16 key_sz, __be32 *ipad, __be32 *opad); 436 u16 key_sz, __be32 *ipad, __be32 *opad) in sa_prepare_iopads() argument 460 sa_export_shash(&sha, shash, digest_size, opad); in sa_prepare_iopads() 536 __be32 *opad = (void *)(sc_buf + 64); in sa_set_sc_auth() local 546 ad->prep_iopad(ad, key, key_sz, ipad, opad); in sa_set_sc_auth()
|
| /drivers/crypto/bcm/ |
| A D | cipher.h | 216 u8 opad[MAX_HASH_BLOCK_SIZE]; member
|
| A D | cipher.c | 907 rc = do_shash("md5", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash() 911 rc = do_shash("sha1", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash() 915 rc = do_shash("sha224", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash() 919 rc = do_shash("sha256", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash() 923 rc = do_shash("sha384", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash() 927 rc = do_shash("sha512", req->result, ctx->opad, blocksize, in spu_hmac_outer_hash() 2400 unsafe_memcpy(ctx->opad, ctx->ipad, blocksize, in ahash_hmac_setkey() 2405 ctx->opad[index] ^= HMAC_OPAD_VALUE; in ahash_hmac_setkey() 2409 flow_dump(" opad: ", ctx->opad, blocksize); in ahash_hmac_setkey()
|
| /drivers/crypto/cavium/nitrox/ |
| A D | nitrox_req.h | 147 u8 opad[64]; member
|