Home
last modified time | relevance | path

Searched refs:os_memcmp_const (Results 1 – 25 of 64) sorted by relevance

123

/external/wpa_supplicant_8/src/wps/
Dwps_attr_process.c45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator()
75 os_memcmp_const(hash, key_wrap_auth, WPS_KWA_LEN) != 0) { in wps_process_key_wrap_auth()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_ttls.c542 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap()
592 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap()
606 if (os_memcmp_const(hash, password + 1, EAP_TTLS_CHAP_PASSWORD_LEN) == in eap_ttls_process_phase2_chap()
659 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_mschap()
678 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap()
751 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN) in eap_ttls_process_phase2_mschapv2()
797 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { in eap_ttls_process_phase2_mschapv2()
Deap_server_pax.c291 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) { in eap_pax_check()
427 if (os_memcmp_const(mac, pos, EAP_PAX_MAC_LEN) != 0) { in eap_pax_process_std_2()
453 if (os_memcmp_const(icvbuf, pos, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process_std_2()
Deap_server_md5.c129 if (os_memcmp_const(hash, pos, CHAP_MD5_LEN) == 0) { in eap_md5_process()
Deap_server_gtc.c177 os_memcmp_const(pos, sm->user->password, rlen) != 0) { in eap_gtc_process()
Deap_server_sake.c362 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_challenge()
402 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_confirm()
Deap_server_gpsk.c453 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_2()
522 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_4()
Deap_server_teap.c1309 os_memcmp_const(sm->user->password, password, passlen) != 0) { in eap_teap_process_basic_auth_resp()
1423 if (os_memcmp_const(data->crypto_binding_nonce, cb->nonce, in eap_teap_validate_crypto_binding()
1441 if (os_memcmp_const(msk_compound_mac, cb->msk_compound_mac, in eap_teap_validate_crypto_binding()
1463 if (os_memcmp_const(emsk_compound_mac, cb->emsk_compound_mac, in eap_teap_validate_crypto_binding()
/external/wpa_supplicant_8/src/crypto/
Dmilenage.c220 os_memcmp_const(mac_s, auts + 6, 8) != 0) in milenage_auts()
315 if (os_memcmp_const(mac_a, autn + 8, 8) != 0) { in milenage_check()
Daes-ccm.c206 if (os_memcmp_const(x, t, M) != 0) { in aes_ccm_ad()
Daes-gcm.c313 if (os_memcmp_const(tag, T, 16) != 0) { in aes_gcm_ad()
/external/wpa_supplicant_8/src/utils/
Dos_none.c227 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
Dos_win32.c268 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
Dos.h615 int os_memcmp_const(const void *a, const void *b, size_t len);
Dos_internal.c464 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
/external/wpa_supplicant_8/src/eap_common/
Deap_ikev2_common.c103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { in eap_ikev2_validate_icv()
/external/wpa_supplicant_8/src/eap_peer/
Dmschapv2.c120 os_memcmp_const(auth_response, recv_response, in mschapv2_verify_auth_response()
Deap_pax.c288 if (os_memcmp_const(pos, mac, EAP_PAX_MAC_LEN) != 0) { in eap_pax_process_std_3()
428 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process()
Deap_leap.c254 if (os_memcmp_const(pos, expected, LEAP_RESPONSE_LEN) != 0) { in eap_leap_process_response()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa_ft.c629 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_process_response()
646 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r0_name, WPA_PMK_NAME_LEN)) in wpa_ft_process_response()
1088 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_validate_reassoc_resp()
1104 if (os_memcmp_const(parse.r1kh_id, sm->r1kh_id, FT_R1KH_ID_LEN) != 0) { in wpa_ft_validate_reassoc_resp()
1111 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN)) in wpa_ft_validate_reassoc_resp()
1150 if (os_memcmp_const(mic, fte_mic, 16) != 0) { in wpa_ft_validate_reassoc_resp()
Dpmksa_cache.c189 os_memcmp_const(pos->pmk, entry->pmk, in pmksa_cache_add_entry()
191 os_memcmp_const(pos->pmkid, entry->pmkid, in pmksa_cache_add_entry()
/external/wpa_supplicant_8/src/radius/
Dradius.c538 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req()
566 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req()
603 return os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0; in radius_msg_verify_das_req()
840 if (os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0) { in radius_msg_verify_msg_auth()
877 os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify()
/external/wpa_supplicant_8/src/tls/
Dpkcs1.c305 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver()
Dtlsv1_record.c459 os_memcmp_const(hash, out_data + plen, hlen) != 0 || in tlsv1_record_receive()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ft.c1397 os_memcmp_const(r0->pmk_r0_name, pmk_r0_name, in wpa_ft_fetch_pmk_r0()
1492 os_memcmp_const(r1->pmk_r1_name, pmk_r1_name, in wpa_ft_fetch_pmk_r1()
1560 os_memcmp_const(f_r0kh_id, r0kh->id, f_r0kh_id_len) == 0) in wpa_ft_rrb_lookup_r0kh()
1608 os_memcmp_const(r1kh->id, f_r1kh_id, FT_R1KH_ID_LEN) == 0) in wpa_ft_rrb_lookup_r1kh()
1624 os_memcmp_const(f_r0kh_id, wpa_auth->conf.r0_key_holder, in wpa_ft_rrb_check_r0kh()
1635 if (os_memcmp_const(f_r1kh_id, wpa_auth->conf.r1_key_holder, in wpa_ft_rrb_check_r1kh()
2892 os_memcmp_const(pmk_r1_name, req_pmk_r1_name, in wpa_ft_psk_pmk_r1()
3350 if (os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN) in wpa_ft_validate_reassoc()
3420 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_validate_reassoc()
3436 if (os_memcmp_const(parse.r1kh_id, conf->r1_key_holder, in wpa_ft_validate_reassoc()
[all …]

123