Home
last modified time | relevance | path

Searched refs:os_memcmp_const (Results 1 – 25 of 62) sorted by relevance

123

/dragonfly/contrib/wpa_supplicant/src/wps/
H A Dwps_attr_process.c44 if (os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
74 if (os_memcmp_const(hash, key_wrap_auth, WPS_KWA_LEN) != 0) { in wps_process_key_wrap_auth()
H A Dwps_enrollee.c569 if (os_memcmp_const(hash, wps->peer_pubkey_hash, in wps_process_pubkey()
649 if (os_memcmp_const(wps->peer_hash1, hash, WPS_HASH_LEN) != 0) { in wps_process_r_snonce1()
689 if (os_memcmp_const(wps->peer_hash2, hash, WPS_HASH_LEN) != 0) { in wps_process_r_snonce2()
/dragonfly/contrib/wpa_supplicant/src/rsn_supp/
H A Dwpa_ft.c577 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_process_response()
594 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r0_name, WPA_PMK_NAME_LEN)) in wpa_ft_process_response()
932 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_validate_reassoc_resp()
948 if (os_memcmp_const(parse.r1kh_id, sm->r1kh_id, FT_R1KH_ID_LEN) != 0) { in wpa_ft_validate_reassoc_resp()
955 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN)) in wpa_ft_validate_reassoc_resp()
990 if (os_memcmp_const(mic, fte_mic, 16) != 0) { in wpa_ft_validate_reassoc_resp()
H A Dpmksa_cache.c187 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry()
189 os_memcmp_const(pos->pmkid, entry->pmkid, in pmksa_cache_add_entry()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c541 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap()
591 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
605 if (os_memcmp_const(hash, password + 1, EAP_TTLS_CHAP_PASSWORD_LEN) == in eap_ttls_process_phase2_chap()
658 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_mschap()
677 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap()
750 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN) in eap_ttls_process_phase2_mschapv2()
796 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { in eap_ttls_process_phase2_mschapv2()
H A Deap_server_pax.c291 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) { in eap_pax_check()
427 if (os_memcmp_const(mac, pos, EAP_PAX_MAC_LEN) != 0) { in eap_pax_process_std_2()
453 if (os_memcmp_const(icvbuf, pos, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process_std_2()
H A Deap_server_md5.c129 if (os_memcmp_const(hash, pos, CHAP_MD5_LEN) == 0) { in eap_md5_process()
H A Deap_server_sake.c362 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_challenge()
402 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_confirm()
H A Deap_server_gtc.c177 os_memcmp_const(pos, sm->user->password, rlen) != 0) { in eap_gtc_process()
H A Deap_server_gpsk.c452 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_2()
521 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_4()
H A Deap_server_teap.c1187 os_memcmp_const(sm->user->password, password, passlen) != 0) { in eap_teap_process_basic_auth_resp()
1298 if (os_memcmp_const(data->crypto_binding_nonce, cb->nonce, in eap_teap_validate_crypto_binding()
1316 if (os_memcmp_const(msk_compound_mac, cb->msk_compound_mac, in eap_teap_validate_crypto_binding()
1338 if (os_memcmp_const(emsk_compound_mac, cb->emsk_compound_mac, in eap_teap_validate_crypto_binding()
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dmilenage.c220 os_memcmp_const(mac_s, auts + 6, 8) != 0) in milenage_auts()
315 if (os_memcmp_const(mac_a, autn + 8, 8) != 0) { in milenage_check()
H A Daes-ccm.c206 if (os_memcmp_const(x, t, M) != 0) { in aes_ccm_ad()
H A Daes-gcm.c313 if (os_memcmp_const(tag, T, 16) != 0) { in aes_gcm_ad()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Deap_ikev2_common.c103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { in eap_ikev2_validate_icv()
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c120 os_memcmp_const(auth_response, recv_response, in mschapv2_verify_auth_response()
H A Deap_pax.c288 if (os_memcmp_const(pos, mac, EAP_PAX_MAC_LEN) != 0) { in eap_pax_process_std_3()
428 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process()
/dragonfly/contrib/wpa_supplicant/src/utils/
H A Dos_none.c227 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
H A Dos_win32.c268 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
H A Dos.h615 int os_memcmp_const(const void *a, const void *b, size_t len);
H A Dos_internal.c458 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
/dragonfly/contrib/wpa_supplicant/src/radius/
H A Dradius.c538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req()
566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req()
603 return os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0; in radius_msg_verify_das_req()
840 if (os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0) { in radius_msg_verify_msg_auth()
877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify()
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Dwpa_auth_ft.c1395 os_memcmp_const(r0->pmk_r0_name, pmk_r0_name, in wpa_ft_fetch_pmk_r0()
1490 os_memcmp_const(r1->pmk_r1_name, pmk_r1_name, in wpa_ft_fetch_pmk_r1()
1558 os_memcmp_const(f_r0kh_id, r0kh->id, f_r0kh_id_len) == 0) in wpa_ft_rrb_lookup_r0kh()
1606 os_memcmp_const(r1kh->id, f_r1kh_id, FT_R1KH_ID_LEN) == 0) in wpa_ft_rrb_lookup_r1kh()
1622 os_memcmp_const(f_r0kh_id, wpa_auth->conf.r0_key_holder, in wpa_ft_rrb_check_r0kh()
1633 if (os_memcmp_const(f_r1kh_id, wpa_auth->conf.r1_key_holder, in wpa_ft_rrb_check_r1kh()
2699 os_memcmp_const(pmk_r1_name, req_pmk_r1_name, in wpa_ft_psk_pmk_r1()
3149 if (os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN) in wpa_ft_validate_reassoc()
3234 if (os_memcmp_const(parse.r1kh_id, sm->wpa_auth->conf.r1_key_holder, in wpa_ft_validate_reassoc()
3280 if (os_memcmp_const(mic, fte_mic, mic_len) != 0) { in wpa_ft_validate_reassoc()
[all …]
/dragonfly/contrib/wpa_supplicant/src/tls/
H A Dpkcs1.c301 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver()
H A Dtlsv1_record.c459 os_memcmp_const(hash, out_data + plen, hlen) != 0 || in tlsv1_record_receive()

123