/kernel/linux/linux-5.10/include/crypto/ |
H A D | curve25519.h | 9 #include <crypto/algapi.h> // For crypto_memneq. 40 return crypto_memneq(mypublic, curve25519_null_point, in curve25519() 48 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public() 56 return crypto_memneq(pub, curve25519_null_point, CURVE25519_KEY_SIZE); in curve25519_generate_public()
|
H A D | xts.h | 22 if (fips_enabled && !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_check_key() 41 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_verify_key()
|
H A D | algapi.h | 269 * crypto_memneq - Compare two areas of memory without leaking 278 static inline int crypto_memneq(const void *a, const void *b, size_t size) in crypto_memneq() function
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | curve25519.h | 9 #include <crypto/algapi.h> // For crypto_memneq. 42 return crypto_memneq(mypublic, curve25519_null_point, in curve25519() 50 if (unlikely(!crypto_memneq(secret, curve25519_null_point, in curve25519_generate_public() 58 return crypto_memneq(pub, curve25519_null_point, CURVE25519_KEY_SIZE); in curve25519_generate_public()
|
H A D | xts.h | 34 !crypto_memneq(key, key + (keylen / 2), keylen / 2)) in xts_verify_key()
|
H A D | utils.h | 59 * crypto_memneq - Compare two areas of memory without leaking 68 static inline int crypto_memneq(const void *a, const void *b, size_t size) in crypto_memneq() function
|
/kernel/linux/linux-5.10/net/bluetooth/ |
H A D | smp.c | 513 return !crypto_memneq(bdaddr->b, hash, 3); in smp_irk_matches() 566 if (crypto_memneq(smp->local_pk, debug_pk, 64)) in smp_generate_oob() 991 if (crypto_memneq(smp->pcnf, confirm, sizeof(smp->pcnf))) { in smp_random() 1523 if (crypto_memneq(smp->pcnf, cfm, 16)) in sc_passkey_round() 1916 if (crypto_memneq(smp->local_pk, debug_pk, 64)) in sc_send_public_key() 2186 if (crypto_memneq(smp->pcnf, cfm, 16)) in smp_cmd_pairing_random() 2755 !crypto_memneq(key, smp->local_pk, 64)) { in smp_cmd_public_key() 2768 if (crypto_memneq(cfm.confirm_val, smp->pcnf, 16)) in smp_cmd_public_key() 2818 if (!crypto_memneq(debug_pk, smp->remote_pk, 64)) in smp_cmd_public_key() 2917 if (crypto_memneq(chec in smp_cmd_dhkey_check() [all...] |
/kernel/linux/linux-6.6/net/bluetooth/ |
H A D | smp.c | 514 return !crypto_memneq(bdaddr->b, hash, 3); in smp_irk_matches() 567 if (crypto_memneq(smp->local_pk, debug_pk, 64)) in smp_generate_oob() 992 if (crypto_memneq(smp->pcnf, confirm, sizeof(smp->pcnf))) { in smp_random() 1529 if (crypto_memneq(smp->pcnf, cfm, 16)) in sc_passkey_round() 1922 if (crypto_memneq(smp->local_pk, debug_pk, 64)) in sc_send_public_key() 2192 if (crypto_memneq(smp->pcnf, cfm, 16)) in smp_cmd_pairing_random() 2761 !crypto_memneq(key, smp->local_pk, 64)) { in smp_cmd_public_key() 2774 if (crypto_memneq(cfm.confirm_val, smp->pcnf, 16)) in smp_cmd_public_key() 2824 if (!crypto_memneq(debug_pk, smp->remote_pk, 64)) in smp_cmd_public_key() 2923 if (crypto_memneq(chec in smp_cmd_dhkey_check() [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | curve25519-generic.c | 17 crypto_memneq(buf, curve25519_null_point, CURVE25519_KEY_SIZE)) in curve25519_set_secret()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | curve25519-generic.c | 17 crypto_memneq(buf, curve25519_null_point, CURVE25519_KEY_SIZE)) in curve25519_set_secret()
|
/kernel/linux/linux-5.10/lib/crypto/ |
H A D | chacha20poly1305.c | 159 ret = crypto_memneq(b.mac, src + dst_len, POLY1305_DIGEST_SIZE); in __chacha20poly1305_decrypt() 311 ret = !crypto_memneq(b.mac[0], in chacha20poly1305_crypt_sg_inplace() 324 !crypto_memneq(b.mac[0], b.mac[1], POLY1305_DIGEST_SIZE); in chacha20poly1305_crypt_sg_inplace()
|
/kernel/linux/linux-6.6/lib/crypto/ |
H A D | chacha20poly1305.c | 159 ret = crypto_memneq(b.mac, src + dst_len, POLY1305_DIGEST_SIZE); in __chacha20poly1305_decrypt() 311 ret = !crypto_memneq(b.mac[0], in chacha20poly1305_crypt_sg_inplace() 324 !crypto_memneq(b.mac[0], b.mac[1], POLY1305_DIGEST_SIZE); in chacha20poly1305_crypt_sg_inplace()
|
/kernel/linux/linux-5.10/drivers/net/wireguard/ |
H A D | cookie.c | 132 if (crypto_memneq(computed_mac, macs->mac1, COOKIE_LEN)) in wg_cookie_validate_packet() 143 if (crypto_memneq(computed_mac, macs->mac2, COOKIE_LEN)) in wg_cookie_validate_packet()
|
/kernel/linux/linux-6.6/drivers/net/wireguard/ |
H A D | cookie.c | 132 if (crypto_memneq(computed_mac, macs->mac1, COOKIE_LEN)) in wg_cookie_validate_packet() 143 if (crypto_memneq(computed_mac, macs->mac2, COOKIE_LEN)) in wg_cookie_validate_packet()
|
/kernel/linux/linux-5.10/arch/arm/crypto/ |
H A D | curve25519-glue.c | 57 crypto_memneq(buf, curve25519_null_point, CURVE25519_KEY_SIZE)) in curve25519_set_secret()
|
/kernel/linux/linux-6.6/arch/arm/crypto/ |
H A D | curve25519-glue.c | 57 crypto_memneq(buf, curve25519_null_point, CURVE25519_KEY_SIZE)) in curve25519_set_secret()
|
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | wpa.c | 163 if (crypto_memneq(mic, data + data_len, MICHAEL_MIC_LEN)) in ieee80211_rx_h_michael_mic_verify() 1070 if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_cmac_decrypt() 1120 if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_cmac_256_decrypt() 1227 crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_gmac_decrypt()
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | wpa.c | 163 if (crypto_memneq(mic, data + data_len, MICHAEL_MIC_LEN)) in ieee80211_rx_h_michael_mic_verify() 947 if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_cmac_decrypt() 997 if (crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_cmac_256_decrypt() 1104 crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) { in ieee80211_crypto_aes_gmac_decrypt()
|
/kernel/linux/linux-5.10/net/ipv4/ |
H A D | ah4.c | 284 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah_input_done() 422 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah_input()
|
/kernel/linux/linux-5.10/net/ipv6/ |
H A D | ah6.c | 476 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah6_input_done() 625 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah6_input()
|
/kernel/linux/linux-6.6/net/ipv6/ |
H A D | ah6.c | 473 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah6_input_done() 622 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah6_input()
|
/kernel/linux/linux-6.6/net/ipv4/ |
H A D | ah4.c | 284 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah_input_done() 422 err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0; in ah_input()
|
/kernel/linux/linux-5.10/arch/x86/crypto/ |
H A D | aegis128-aesni-glue.c | 227 return crypto_memneq(tag.bytes, zeros.bytes, authsize) ? -EBADMSG : 0; in crypto_aegis128_aesni_decrypt()
|
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | sm4-ce-gcm-glue.c | 236 if (crypto_memneq(authtag, ghash, authsize)) in gcm_decrypt()
|
/kernel/linux/linux-6.6/arch/powerpc/crypto/ |
H A D | aes-gcm-p10-glue.c | 296 if (crypto_memneq(otag, hash->Htable, auth_tag_len)) { in p10_aes_gcm_crypt()
|