| /linux/lib/crypto/ |
| H A D | curve25519.c | 45 return crypto_memneq(mypublic, curve25519_null_point, in curve25519() 54 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public() 58 return crypto_memneq(pub, curve25519_null_point, CURVE25519_KEY_SIZE); in curve25519_generate_public()
|
| /linux/include/crypto/ |
| H A D | xts.h | 34 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_verify_key()
|
| H A D | utils.h | 68 static inline int crypto_memneq(const void *a, const void *b, size_t size) in crypto_memneq() function
|
| /linux/net/bluetooth/ |
| H A D | smp.c | 513 return !crypto_memneq(bdaddr->b, hash, 3); in smp_irk_matches() 566 if (crypto_memneq(smp->local_pk, debug_pk, 64)) in smp_generate_oob() 992 if (crypto_memneq(smp->pcnf, confirm, sizeof(smp->pcnf))) { in smp_random() 1520 if (crypto_memneq(smp->pcnf, cfm, 16)) in sc_passkey_round() 1915 if (crypto_memneq(smp->local_pk, debug_pk, 64)) in sc_send_public_key() 2186 if (crypto_memneq(smp->pcnf, cfm, 16)) in smp_cmd_pairing_random() 2745 !crypto_memneq(key, smp->local_pk, 64)) { in smp_cmd_public_key() 2758 if (crypto_memneq(cfm.confirm_val, smp->pcnf, 16)) in smp_cmd_public_key() 2808 if (!crypto_memneq(debug_pk, smp->remote_pk, 64)) in smp_cmd_public_key() 2907 if (crypto_memneq(check->e, e, 16)) in smp_cmd_dhkey_check() [all …]
|
| H A D | hci_event.c | 4743 if (!crypto_memneq(ev->link_key, ZERO_KEY, HCI_LINK_KEY_SIZE)) { in hci_link_key_notify_evt() 5285 if (!crypto_memneq(data->rand256, ZERO_KEY, 16) || in bredr_oob_data_present() 5286 !crypto_memneq(data->hash256, ZERO_KEY, 16)) in bredr_oob_data_present() 5296 if (!crypto_memneq(data->rand192, ZERO_KEY, 16) || in bredr_oob_data_present() 5297 !crypto_memneq(data->hash192, ZERO_KEY, 16)) in bredr_oob_data_present()
|
| /linux/drivers/net/wireguard/ |
| H A D | cookie.c | 132 if (crypto_memneq(computed_mac, macs->mac1, COOKIE_LEN)) in wg_cookie_validate_packet() 143 if (crypto_memneq(computed_mac, macs->mac2, COOKIE_LEN)) in wg_cookie_validate_packet()
|
| H A D | noise.c | 424 if (unlikely(!crypto_memneq(precomputed, zero_point, NOISE_PUBLIC_KEY_LEN))) in mix_precomputed_dh()
|
| /linux/fs/smb/client/ |
| H A D | smb1encrypt.c | 135 if (crypto_memneq(server_response_sig, what_we_think_sig_should_be, 8)) in cifs_verify_signature()
|
| H A D | smb2transport.c | 583 if (crypto_memneq(server_response_sig, shdr->Signature, in smb2_verify_signature()
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_tpm1.c | 226 if (crypto_memneq(testhmac, authdata, SHA1_DIGEST_SIZE)) in TSS_checkhmac1() 298 if (crypto_memneq(testhmac1, authdata1, SHA1_DIGEST_SIZE)) in TSS_checkhmac2() 305 if (crypto_memneq(testhmac2, authdata2, SHA1_DIGEST_SIZE)) in TSS_checkhmac2()
|
| /linux/net/ipv4/ |
| H A D | ah4.c | 291 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah_input_done() 429 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah_input()
|
| /linux/net/ipv6/ |
| H A D | seg6_hmac.c | 216 if (crypto_memneq(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN)) in seg6_hmac_validate_skb()
|
| H A D | ah6.c | 492 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah6_input_done() 641 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah6_input()
|
| /linux/arch/arm64/crypto/ |
| H A D | sm4-ce-gcm-glue.c | 213 if (crypto_memneq(authtag, ghash, authsize)) in gcm_decrypt()
|
| H A D | sm4-ce-ccm-glue.c | 245 if (crypto_memneq(authtag, mac, authsize)) in ccm_decrypt()
|
| /linux/net/sunrpc/auth_gss/ |
| H A D | gss_krb5_crypto.c | 700 if (crypto_memneq(pkt_hmac, our_hmac, kctx->gk5e->cksumlength) != 0) { in gss_krb5_aes_decrypt() 936 if (crypto_memneq(pkt_hmac, our_hmac, kctx->gk5e->cksumlength) != 0) { in krb5_etm_decrypt()
|
| /linux/fs/ubifs/ |
| H A D | auth.c | 464 err = crypto_memneq(hmac, node + ofs_hmac, hmac_len); in __ubifs_node_verify_hmac()
|
| /linux/crypto/ |
| H A D | authenc.c | 246 if (crypto_memneq(ihash, ahreq->result, authsize)) in crypto_authenc_decrypt_tail()
|
| H A D | authencesn.c | 226 if (crypto_memneq(ihash, ohash, authsize)) in crypto_authenc_esn_decrypt_tail()
|
| /linux/drivers/thunderbolt/ |
| H A D | domain.c | 738 if (crypto_memneq(response, hmac, sizeof(hmac))) in tb_domain_challenge_switch_key()
|
| /linux/security/integrity/evm/ |
| H A D | evm_main.c | 253 rc = crypto_memneq(xattr_data->data, digest.digest, in evm_verify_hmac()
|
| /linux/security/keys/encrypted-keys/ |
| H A D | encrypted.c | 513 ret = crypto_memneq(digest, epayload->format + epayload->datablob_len, in datablob_hmac_verify()
|
| /linux/fs/smb/server/ |
| H A D | auth.c | 169 if (crypto_memneq(ntlmv2->ntlmv2_hash, ntlmv2_rsp, in ksmbd_auth_ntlmv2()
|
| /linux/drivers/char/tpm/ |
| H A D | tpm2-sessions.c | 849 if (crypto_memneq(rphash, &buf->data[offset_s], SHA256_DIGEST_SIZE)) { in tpm_buf_check_hmac_response()
|
| /linux/drivers/crypto/tegra/ |
| H A D | tegra-se-aes.c | 837 if (crypto_memneq(rctx->outbuf.buf, mac, rctx->authsize)) in tegra_gcm_do_verify() 1068 ret = crypto_memneq(rctx->authdata, result, rctx->authsize); in tegra_ccm_mac_result()
|