/dragonfly/contrib/wpa_supplicant/src/wps/ |
H A D | wps_attr_process.c | 44 if (os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator() 74 if (os_memcmp_const(hash, key_wrap_auth, WPS_KWA_LEN) != 0) { in wps_process_key_wrap_auth()
|
H A D | wps_enrollee.c | 569 if (os_memcmp_const(hash, wps->peer_pubkey_hash, in wps_process_pubkey() 649 if (os_memcmp_const(wps->peer_hash1, hash, WPS_HASH_LEN) != 0) { in wps_process_r_snonce1() 689 if (os_memcmp_const(wps->peer_hash2, hash, WPS_HASH_LEN) != 0) { in wps_process_r_snonce2()
|
/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 577 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_process_response() 594 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r0_name, WPA_PMK_NAME_LEN)) in wpa_ft_process_response() 932 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_validate_reassoc_resp() 948 if (os_memcmp_const(parse.r1kh_id, sm->r1kh_id, FT_R1KH_ID_LEN) != 0) { in wpa_ft_validate_reassoc_resp() 955 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN)) in wpa_ft_validate_reassoc_resp() 990 if (os_memcmp_const(mic, fte_mic, 16) != 0) { in wpa_ft_validate_reassoc_resp()
|
H A D | pmksa_cache.c | 187 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry() 189 os_memcmp_const(pos->pmkid, entry->pmkid, in pmksa_cache_add_entry()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 541 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap() 591 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap() 605 if (os_memcmp_const(hash, password + 1, EAP_TTLS_CHAP_PASSWORD_LEN) == in eap_ttls_process_phase2_chap() 658 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_mschap() 677 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap() 750 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN) in eap_ttls_process_phase2_mschapv2() 796 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { in eap_ttls_process_phase2_mschapv2()
|
H A D | eap_server_pax.c | 291 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) { in eap_pax_check() 427 if (os_memcmp_const(mac, pos, EAP_PAX_MAC_LEN) != 0) { in eap_pax_process_std_2() 453 if (os_memcmp_const(icvbuf, pos, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process_std_2()
|
H A D | eap_server_md5.c | 129 if (os_memcmp_const(hash, pos, CHAP_MD5_LEN) == 0) { in eap_md5_process()
|
H A D | eap_server_sake.c | 362 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_challenge() 402 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_confirm()
|
H A D | eap_server_gtc.c | 177 os_memcmp_const(pos, sm->user->password, rlen) != 0) { in eap_gtc_process()
|
H A D | eap_server_gpsk.c | 452 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_2() 521 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_4()
|
H A D | eap_server_teap.c | 1187 os_memcmp_const(sm->user->password, password, passlen) != 0) { in eap_teap_process_basic_auth_resp() 1298 if (os_memcmp_const(data->crypto_binding_nonce, cb->nonce, in eap_teap_validate_crypto_binding() 1316 if (os_memcmp_const(msk_compound_mac, cb->msk_compound_mac, in eap_teap_validate_crypto_binding() 1338 if (os_memcmp_const(emsk_compound_mac, cb->emsk_compound_mac, in eap_teap_validate_crypto_binding()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 220 os_memcmp_const(mac_s, auts + 6, 8) != 0) in milenage_auts() 315 if (os_memcmp_const(mac_a, autn + 8, 8) != 0) { in milenage_check()
|
H A D | aes-ccm.c | 206 if (os_memcmp_const(x, t, M) != 0) { in aes_ccm_ad()
|
H A D | aes-gcm.c | 313 if (os_memcmp_const(tag, T, 16) != 0) { in aes_gcm_ad()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { in eap_ikev2_validate_icv()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 120 os_memcmp_const(auth_response, recv_response, in mschapv2_verify_auth_response()
|
H A D | eap_pax.c | 288 if (os_memcmp_const(pos, mac, EAP_PAX_MAC_LEN) != 0) { in eap_pax_process_std_3() 428 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process()
|
/dragonfly/contrib/wpa_supplicant/src/utils/ |
H A D | os_none.c | 227 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
|
H A D | os_win32.c | 268 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
|
H A D | os.h | 615 int os_memcmp_const(const void *a, const void *b, size_t len);
|
H A D | os_internal.c | 458 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
|
/dragonfly/contrib/wpa_supplicant/src/radius/ |
H A D | radius.c | 538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() 566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req() 603 return os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0; in radius_msg_verify_das_req() 840 if (os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0) { in radius_msg_verify_msg_auth() 877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify()
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ft.c | 1395 os_memcmp_const(r0->pmk_r0_name, pmk_r0_name, in wpa_ft_fetch_pmk_r0() 1490 os_memcmp_const(r1->pmk_r1_name, pmk_r1_name, in wpa_ft_fetch_pmk_r1() 1558 os_memcmp_const(f_r0kh_id, r0kh->id, f_r0kh_id_len) == 0) in wpa_ft_rrb_lookup_r0kh() 1606 os_memcmp_const(r1kh->id, f_r1kh_id, FT_R1KH_ID_LEN) == 0) in wpa_ft_rrb_lookup_r1kh() 1622 os_memcmp_const(f_r0kh_id, wpa_auth->conf.r0_key_holder, in wpa_ft_rrb_check_r0kh() 1633 if (os_memcmp_const(f_r1kh_id, wpa_auth->conf.r1_key_holder, in wpa_ft_rrb_check_r1kh() 2699 os_memcmp_const(pmk_r1_name, req_pmk_r1_name, in wpa_ft_psk_pmk_r1() 3149 if (os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN) in wpa_ft_validate_reassoc() 3234 if (os_memcmp_const(parse.r1kh_id, sm->wpa_auth->conf.r1_key_holder, in wpa_ft_validate_reassoc() 3280 if (os_memcmp_const(mic, fte_mic, mic_len) != 0) { in wpa_ft_validate_reassoc() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | pkcs1.c | 301 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver()
|
H A D | tlsv1_record.c | 459 os_memcmp_const(hash, out_data + plen, hlen) != 0 || in tlsv1_record_receive()
|