/hal_espressif-latest/components/wpa_supplicant/src/wps/ |
D | wps_attr_process.c | 45 os_memcmp_const(hash, authenticator, WPS_AUTHENTICATOR_LEN) != 0) { in wps_process_authenticator() 75 os_memcmp_const(hash, key_wrap_auth, WPS_KWA_LEN) != 0) { in wps_process_key_wrap_auth()
|
D | wps_enrollee.c | 580 if (os_memcmp_const(hash, wps->peer_pubkey_hash, in wps_process_pubkey() 660 if (os_memcmp_const(wps->peer_hash1, hash, WPS_HASH_LEN) != 0) { in wps_process_r_snonce1() 700 if (os_memcmp_const(wps->peer_hash2, hash, WPS_HASH_LEN) != 0) { in wps_process_r_snonce2()
|
D | wps_registrar.c | 893 os_memcmp_const(dev_pw, pin->pin, dev_pw_len) != 0)) in wps_registrar_invalidate_wildcard_pin() 2334 if (os_memcmp_const(wps->peer_hash1, hash, WPS_HASH_LEN) != 0) { in wps_process_e_snonce1() 2374 if (os_memcmp_const(wps->peer_hash2, hash, WPS_HASH_LEN) != 0) { in wps_process_e_snonce2() 2725 if (os_memcmp_const(hash, in wps_process_m1()
|
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa_ft.c | 485 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) in wpa_ft_process_response() 502 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r0_name, WPA_PMK_NAME_LEN)) in wpa_ft_process_response() 779 os_memcmp_const(parse.r0kh_id, sm->r0kh_id, parse.r0kh_id_len) != 0) 795 if (os_memcmp_const(parse.r1kh_id, sm->r1kh_id, FT_R1KH_ID_LEN) != 0) { 802 os_memcmp_const(parse.rsn_pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN)) 829 if (os_memcmp_const(mic, ftie->mic, 16) != 0) {
|
D | pmksa_cache.c | 149 os_memcmp_const(pos->pmk, pmk, pmk_len) == 0 && in pmksa_cache_add() 150 os_memcmp_const(pos->pmkid, entry->pmkid, in pmksa_cache_add()
|
D | wpa.c | 418 os_memcmp_const(pmkid, sm->cur_pmksa->pmkid, PMKID_LEN) == 0) { in wpa_supplicant_get_pmk() 1709 if (os_memcmp_const(mic, key->key_mic, mic_len) != 0) { in wpa_supplicant_verify_eapol_key_mic() 1724 if (os_memcmp_const(mic, key->key_mic, mic_len) != 0) { in wpa_supplicant_verify_eapol_key_mic()
|
/hal_espressif-latest/components/wpa_supplicant/port/include/ |
D | os.h | 265 #ifndef os_memcmp_const 266 #define os_memcmp_const(s1, s2, n) memcmp((s1), (s2), (n)) macro
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | comeback_token.c | 61 os_memcmp_const(token + 2, &mac[2], SHA256_MAC_LEN - 2) != 0) { in check_comeback_token()
|
D | wpa_auth.c | 1237 os_memcmp_const(mic, key->key_mic, mic_len) != 0) in wpa_verify_key_mic()
|
/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | aes-ccm.c | 207 if (os_memcmp_const(x, t, M) != 0) { in aes_ccm_ad()
|
D | aes-gcm.c | 313 if (os_memcmp_const(tag, T, 16) != 0) { in aes_gcm_ad()
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | pkcs1.c | 319 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver()
|
D | tlsv1_record.c | 459 os_memcmp_const(hash, out_data + plen, hlen) != 0 || in tlsv1_record_receive()
|
D | tlsv1_common.c | 515 os_memcmp_const(decrypted, data, data_len) != 0) { in tls_verify_signature()
|
D | tlsv1_server_read.c | 1246 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { in tls_process_client_finished()
|
D | tlsv1_client_read.c | 1439 if (os_memcmp_const(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) { in tls_process_server_finished()
|
D | x509v3.c | 2082 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in x509_check_signature()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | sae_pk.c | 597 res = os_memcmp_const(hash, tmp->fingerprint, tmp->fingerprint_bytes); in sae_pk_valid_fingerprint()
|
D | sae.c | 2307 if (os_memcmp_const(verifier, data + 2, hash_len) != 0) { in sae_check_confirm()
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_fast.c | 776 res = os_memcmp_const(cmac, _bind->compound_mac, sizeof(cmac)); in eap_fast_process_crypto_binding()
|