crypto_memneq
if (crypto_memneq(mac, orig_iv, authsize))
if (crypto_memneq(authtag, mac, authsize))
if (crypto_memneq(authtag, ghash, authsize))
if (crypto_memneq(otag, hash->Htable, auth_tag_len)) {
if (crypto_memneq(tag, param.t, taglen))
return crypto_memneq(tag.bytes, zeros.bytes, authsize) ? -EBADMSG : 0;
if (unlikely(crypto_memneq(tag.bytes, zeros, authsize))) {
if (crypto_memneq(ihash, ahreq->result, authsize))
if (crypto_memneq(ihash, ohash, authsize))
if (!err && crypto_memneq(pctx->auth_tag, pctx->odata, authsize))
if (crypto_memneq(authtag, odata, authsize))
if (crypto_memneq(tag, rctx->tag, sizeof(tag)))
return crypto_memneq(iauth_tag, auth_tag, authsize) ? -EBADMSG : 0;
if (crypto_memneq(msg_hash, calc_hash, authsize))
if (crypto_memneq(out_buf + pos, hash_prefix->data, hash_prefix->size))
if (crypto_memneq(rphash, &buf->data[offset_s], SHA256_DIGEST_SIZE)) {
if (crypto_memneq(icv, pd_uinfo->sr_va->save_digest, cp_len))
err = crypto_memneq(itag, otag, authsize) ? -EBADMSG : 0;
if (crypto_memneq(idigest, odigest, authsize))
if (crypto_memneq(req_ctx->decryption_tag,
ret = crypto_memneq(wa->tag.address, wa->final.address,
cmp = crypto_memneq(&fw6_pld->data[2], (fw6_pld + 1), authsize);
cmp = crypto_memneq(temp, (fw6_pld + 1), authsize);
rc = crypto_memneq(csbcpb->cpb.aes_ccm.out_pat_or_mac, priv->oauth_tag,
rc = crypto_memneq(itag, otag,
if (crypto_memneq(cryp->tag_in, cryp->tag_out, cryp->authsize))
if (crypto_memneq(in_tag, out_tag, cryp->authsize))
err = crypto_memneq(oicv, icv, authsize) ? -EBADMSG : 0;
ret = crypto_memneq(rctx->authdata, result, rctx->authsize);
if (crypto_memneq(rctx->outbuf.buf, mac, rctx->authsize))
if (crypto_memneq(dp, tag, to_copy)) {
if (unlikely(crypto_memneq(dp, tag, to_copy)))
if (unlikely(crypto_memneq(digest, dio->integrity_payload, min(ic->internal_hash_digestsize, ic->tag_size)))) {
if (unlikely(crypto_memneq(digest, dio->integrity_payload + pos,
if (unlikely(crypto_memneq(test_tag, journal_entry_tag(ic, je2), ic->tag_size))) {
if (crypto_memneq(mac, actual_mac, mac_size)) {
if (crypto_memneq(&js->mac, result + (j * JOURNAL_MAC_PER_SECTOR), JOURNAL_MAC_PER_SECTOR)) {
if (crypto_memneq(computed_mac, macs->mac1, COOKIE_LEN))
if (crypto_memneq(computed_mac, macs->mac2, COOKIE_LEN))
if (!crypto_memneq(wg->static_identity.static_private,
if (unlikely(!crypto_memneq(precomputed, zero_point, NOISE_PUBLIC_KEY_LEN)))
if (crypto_memneq(response, hmac, sizeof(hmac)))
if (crypto_memneq(raw_key, dk->dk_raw, ci->ci_mode->keysize))
if (crypto_memneq(server_response_sig, what_we_think_sig_should_be, 8))
if (crypto_memneq(server_response_sig, shdr->Signature,
if (crypto_memneq(ntlmv2->ntlmv2_hash, ntlmv2_rsp,
if (crypto_memneq(signature, signature_req, SMB2_SIGNATURE_SIZE)) {
if (crypto_memneq(signature, signature_req, SMB2_SIGNATURE_SIZE)) {
err = crypto_memneq(hmac, node + ofs_hmac, hmac_len);
return crypto_memneq(expected, got, c->hash_len);
return crypto_memneq(expected, got, c->hmac_desc_len);
!crypto_memneq(key, key + (keylen / 2), keylen / 2))
if (crypto_memneq(authtag, tagbuf, ctx->authsize)) {
ret = crypto_memneq(b.mac, src + dst_len, POLY1305_DIGEST_SIZE);
ret = !crypto_memneq(b.mac[0],
!crypto_memneq(b.mac[0], b.mac[1], POLY1305_DIGEST_SIZE);
return crypto_memneq(mypublic, curve25519_null_point,
if (unlikely(!crypto_memneq(secret, curve25519_null_point,
return crypto_memneq(pub, curve25519_null_point, CURVE25519_KEY_SIZE);
if (!crypto_memneq(ev->link_key, ZERO_KEY, HCI_LINK_KEY_SIZE)) {
if (!crypto_memneq(data->rand256, ZERO_KEY, 16) ||
!crypto_memneq(data->hash256, ZERO_KEY, 16))
if (!crypto_memneq(data->rand192, ZERO_KEY, 16) ||
!crypto_memneq(data->hash192, ZERO_KEY, 16))
if (crypto_memneq(smp->pcnf, cfm, 16))
if (crypto_memneq(smp->local_pk, debug_pk, 64))
if (crypto_memneq(smp->pcnf, cfm, 16))
!crypto_memneq(key, smp->local_pk, 64)) {
if (crypto_memneq(cfm.confirm_val, smp->pcnf, 16))
if (!crypto_memneq(debug_pk, smp->remote_pk, 64))
if (crypto_memneq(check->e, e, 16))
if (crypto_memneq(pk, debug_pk, 64))
if (crypto_memneq(res, exp, 3))
if (crypto_memneq(res, exp, 16))
if (crypto_memneq(res, exp, 16))
if (crypto_memneq(res, exp, 16))
if (crypto_memneq(mackey, exp_mackey, 16))
if (crypto_memneq(ltk, exp_ltk, 16))
if (crypto_memneq(res, exp, 16))
if (crypto_memneq(res, exp, 16))
return !crypto_memneq(bdaddr->b, hash, 3);
if (crypto_memneq(smp->local_pk, debug_pk, 64))
if (crypto_memneq(smp->pcnf, confirm, sizeof(smp->pcnf))) {
if (crypto_memneq(p, hmac, SHA256_DIGEST_SIZE)) {
err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0;
err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0;
if (crypto_memneq(hash_location, newhash, 16)) {
if (crypto_memneq(phash, hash_buf, maclen)) {
if (crypto_memneq(md5_hash_location, newhash, 16))
err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0;
err = crypto_memneq(icv, auth_data, ahp->icv_trunc_len) ? -EBADMSG : 0;
if (crypto_memneq(hmac_output, tlv->hmac, SEG6_HMAC_FIELD_LEN))
if (crypto_memneq(md5_hash_location, newhash, 16))
return !crypto_memneq(tk_old, tk_new, new->conf.keylen);
crypto_memneq(mic, mmie->mic, sizeof(mmie->mic))) {
if (crypto_memneq(mic, data + data_len, MICHAEL_MIC_LEN))
if (crypto_memneq(mic, mmie->mic, mic_len)) {
return !crypto_memneq(hmac, mp_opt->hmac, MPTCPOPT_HMAC_LEN);
if (crypto_memneq(mac, cookie->mac, sizeof(mac))) {
if (crypto_memneq(save_digest, digest, sig_len)) {
if (crypto_memneq(pkt_hmac, our_hmac, kctx->gk5e->cksumlength) != 0) {
if (crypto_memneq(pkt_hmac, our_hmac, kctx->gk5e->cksumlength) != 0) {
rc = crypto_memneq(xattr_data->data, digest.digest,
ret = crypto_memneq(digest, epayload->format + epayload->datablob_len,
if (crypto_memneq(testhmac, authdata, SHA1_DIGEST_SIZE))
if (crypto_memneq(testhmac1, authdata1, SHA1_DIGEST_SIZE))
if (crypto_memneq(testhmac2, authdata2, SHA1_DIGEST_SIZE))