/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ft.c | 445 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_process_response() 462 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r0_name, WPA_PMK_NAME_LEN)) in wpa_ft_process_response() 732 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_validate_reassoc_resp() 748 if (os_memcmp_const(parse.r1kh_id, sm->r1kh_id, FT_R1KH_ID_LEN) != 0) { in wpa_ft_validate_reassoc_resp() 755 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN)) in wpa_ft_validate_reassoc_resp() 782 if (os_memcmp_const(mic, ftie->mic, 16) != 0) { in wpa_ft_validate_reassoc_resp()
|
D | pmksa_cache.c | 155 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && in pmksa_cache_add() 156 os_memcmp_const(pos->pmkid, entry->pmkid, in pmksa_cache_add()
|
D | peerkey.c | 677 if (os_memcmp_const(ie.pmkid, peerkey->smkid, PMKID_LEN) != 0) { in wpa_supplicant_process_stk_1_of_4() 781 if (os_memcmp_const(kde.pmkid, peerkey->smkid, PMKID_LEN) != 0) { in wpa_supplicant_process_stk_2_of_4() 932 if (os_memcmp_const(mic, key->key_mic, 16) != 0) { in peerkey_verify_eapol_key_mic() 948 if (os_memcmp_const(mic, key->key_mic, 16) != 0) { in peerkey_verify_eapol_key_mic()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_process.c | 44 if (os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator() 74 if (os_memcmp_const(hash, key_wrap_auth, WPS_KWA_LEN) != 0) { in wps_process_key_wrap_auth()
|
D | wps_enrollee.c | 528 if (os_memcmp_const(hash, wps->peer_pubkey_hash, in wps_process_pubkey() 608 if (os_memcmp_const(wps->peer_hash1, hash, WPS_HASH_LEN) != 0) { in wps_process_r_snonce1() 648 if (os_memcmp_const(wps->peer_hash2, hash, WPS_HASH_LEN) != 0) { in wps_process_r_snonce2()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_ttls.c | 512 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap() 561 if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_chap() 575 if (os_memcmp_const(hash, password + 1, EAP_TTLS_CHAP_PASSWORD_LEN) == in eap_ttls_process_phase2_chap() 621 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN) in eap_ttls_process_phase2_mschap() 637 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap() 709 if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN) in eap_ttls_process_phase2_mschapv2() 743 if (os_memcmp_const(nt_response, rx_resp, 24) == 0) { in eap_ttls_process_phase2_mschapv2()
|
D | eap_server_pax.c | 271 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) { in eap_pax_check() 398 if (os_memcmp_const(mac, pos, EAP_PAX_MAC_LEN) != 0) { in eap_pax_process_std_2() 420 if (os_memcmp_const(icvbuf, pos, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process_std_2()
|
D | eap_server_md5.c | 129 if (os_memcmp_const(hash, pos, CHAP_MD5_LEN) == 0) { in eap_md5_process()
|
D | eap_server_gtc.c | 178 os_memcmp_const(pos, sm->user->password, rlen) != 0) { in eap_gtc_process()
|
D | eap_server_sake.c | 354 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_challenge() 391 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_confirm()
|
D | eap_server_gpsk.c | 436 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_2() 505 if (os_memcmp_const(mic, pos, miclen) != 0) { in eap_gpsk_process_gpsk_4()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ft.c | 238 os_memcmp_const(r0->pmk_r0_name, pmk_r0_name, in wpa_ft_fetch_pmk_r0() 288 os_memcmp_const(r1->pmk_r1_name, pmk_r1_name, in wpa_ft_fetch_pmk_r1() 313 os_memcmp_const(r0kh->id, sm->r0kh_id, sm->r0kh_id_len) == in wpa_ft_pull_pmk_r1() 1017 if (os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN) in wpa_ft_validate_reassoc() 1064 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_validate_reassoc() 1080 if (os_memcmp_const(parse.r1kh_id, sm->wpa_auth->conf.r1_key_holder, in wpa_ft_validate_reassoc() 1092 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN)) in wpa_ft_validate_reassoc() 1119 if (os_memcmp_const(mic, ftie->mic, 16) != 0) { in wpa_ft_validate_reassoc() 1474 if (os_memcmp_const(f.r1kh_id, wpa_auth->conf.r1_key_holder, in wpa_ft_rrb_rx_resp() 1550 if (os_memcmp_const(f.r1kh_id, wpa_auth->conf.r1_key_holder, in wpa_ft_rrb_rx_push()
|
/external/wpa_supplicant_8/src/crypto/ |
D | milenage.c | 220 os_memcmp_const(mac_s, auts + 6, 8) != 0) in milenage_auts() 315 if (os_memcmp_const(mac_a, autn + 8, 8) != 0) { in milenage_check()
|
D | aes-ccm.c | 206 if (os_memcmp_const(x, t, M) != 0) { in aes_ccm_ad()
|
D | aes-gcm.c | 313 if (os_memcmp_const(tag, T, 16) != 0) { in aes_gcm_ad()
|
/external/wpa_supplicant_8/src/utils/ |
D | os_none.c | 221 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
|
D | os_win32.c | 249 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
|
D | os.h | 602 int os_memcmp_const(const void *a, const void *b, size_t len);
|
D | os_internal.c | 466 int os_memcmp_const(const void *a, const void *b, size_t len) in os_memcmp_const() function
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | mschapv2.c | 120 os_memcmp_const(auth_response, recv_response, in mschapv2_verify_auth_response()
|
D | eap_pax.c | 281 if (os_memcmp_const(pos, mac, EAP_PAX_MAC_LEN) != 0) { in eap_pax_process_std_3() 418 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) { in eap_pax_process()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_ikev2_common.c | 103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { in eap_ikev2_validate_icv()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.c | 522 return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0; in radius_msg_verify_acct_req() 549 if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0) in radius_msg_verify_das_req() 582 return os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0; in radius_msg_verify_das_req() 815 if (os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0) { in radius_msg_verify_msg_auth() 852 if (os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) { in radius_msg_verify()
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs1.c | 301 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver()
|
D | tlsv1_record.c | 459 os_memcmp_const(hash, out_data + plen, hlen) != 0 || in tlsv1_record_receive()
|