/third_party/mbedtls/include/mbedtls/ |
H A D | constant_time.h | 42 int mbedtls_ct_memcmp(const void *a,
|
/third_party/mbedtls/library/ |
H A D | constant_time.c | 68 int mbedtls_ct_memcmp(const void *a, in mbedtls_ct_memcmp() function 106 #error "mbedtls_ct_memcmp() requires minimum 32-bit ints" in mbedtls_ct_memcmp()
|
H A D | nist_kw.c | 354 diff = mbedtls_ct_memcmp(NIST_KW_ICV1, A, KW_SEMIBLOCK_LENGTH); in mbedtls_nist_kw_unwrap() 398 diff = mbedtls_ct_memcmp(NIST_KW_ICV2, A, KW_SEMIBLOCK_LENGTH / 2); in mbedtls_nist_kw_unwrap()
|
H A D | ssl_cookie.c | 350 if (mbedtls_ct_memcmp(cookie + 4, ref_hmac, sizeof(ref_hmac)) != 0) { in mbedtls_ssl_cookie_check()
|
H A D | psa_crypto_mac.c | 445 if (mbedtls_ct_memcmp(mac, actual_mac, mac_length) != 0) { in mbedtls_psa_mac_verify_finish()
|
H A D | chachapoly.c | 311 diff = mbedtls_ct_memcmp(tag, check_tag, sizeof(check_tag)); in mbedtls_chachapoly_auth_decrypt()
|
H A D | cipher.c | 1269 if (mbedtls_ct_memcmp(tag, check_tag, tag_len) != 0) { in mbedtls_cipher_check_tag() 1290 if (mbedtls_ct_memcmp(tag, check_tag, tag_len) != 0) { in mbedtls_cipher_check_tag()
|
H A D | rsa.c | 1993 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool(mbedtls_ct_memcmp(lhash, p, hlen))); in mbedtls_rsa_rsaes_oaep_decrypt() 2475 if (mbedtls_ct_memcmp(verif, sig, ctx->len) != 0) { in mbedtls_rsa_rsassa_pkcs1_v15_sign() 2719 if ((ret = mbedtls_ct_memcmp(encoded, encoded_expected, in mbedtls_rsa_rsassa_pkcs1_v15_verify()
|
H A D | ccm.c | 576 int diff = mbedtls_ct_memcmp(tag1, tag2, tag_len); in mbedtls_ccm_compare_tags()
|
H A D | ssl_tls13_server.c | 382 mbedtls_ct_memcmp(ssl->conf->psk_identity, in ssl_tls13_offered_psks_check_identity_match() 450 if (mbedtls_ct_memcmp(server_computed_binder, in ssl_tls13_offered_psks_check_binder_match()
|
H A D | ssl_tls12_server.c | 116 mbedtls_ct_memcmp(buf + 1, ssl->peer_verify_data, in ssl_parse_renegotiation_info() 3638 mbedtls_ct_memcmp(ssl->conf->psk_identity, *p, n) != 0) { in ssl_parse_client_psk_identity()
|
H A D | ssl_tls12_client.c | 625 mbedtls_ct_memcmp(buf + 1, in ssl_parse_renegotiation_info() 627 mbedtls_ct_memcmp(buf + 1 + ssl->verify_data_len, in ssl_parse_renegotiation_info()
|
H A D | ssl_tls13_generic.c | 1214 if (mbedtls_ct_memcmp(buf, in ssl_tls13_parse_finished_message()
|
H A D | ssl_msg.c | 1735 * mbedtls_ct_memcmp() below. in mbedtls_ssl_decrypt_buf() 1795 if (mbedtls_ct_memcmp(data + rec->data_len, mac_expect, in mbedtls_ssl_decrypt_buf() 2068 if (mbedtls_ct_memcmp(mac_peer, mac_expect, in mbedtls_ssl_decrypt_buf()
|
H A D | psa_crypto_driver_wrappers.c | 1756 if (tag_length != check_tag_length || mbedtls_ct_memcmp(tag, check_tag, tag_length) != 0) in psa_driver_wrapper_aead_verify()
|
H A D | gcm.c | 760 diff = mbedtls_ct_memcmp(tag, check_tag, tag_len); in mbedtls_gcm_auth_decrypt()
|
H A D | psa_crypto.c | 2413 if (mbedtls_ct_memcmp(hash, actual_hash, actual_hash_length) != 0) { in psa_hash_verify() 2483 if (mbedtls_ct_memcmp(hash, actual_hash, actual_hash_length) != 0) { in psa_hash_compare() 2898 if (mbedtls_ct_memcmp(mac, actual_mac, actual_mac_length) != 0) { in psa_mac_verify()
|
H A D | ssl_tls.c | 8680 if (mbedtls_ct_memcmp(ssl->in_msg + mbedtls_ssl_hs_hdr_len(ssl), in mbedtls_ssl_parse_finished()
|
/third_party/mbedtls/tests/src/drivers/ |
H A D | test_driver_aead.c | 424 mbedtls_ct_memcmp(tag, check_tag, tag_length) in mbedtls_test_transparent_aead_verify()
|