Searched refs:mbedtls_ct_uint_ne (Results 1 - 5 of 5) sorted by relevance
/third_party/mbedtls/library/ |
H A D | constant_time_impl.h | 397 static inline mbedtls_ct_condition_t mbedtls_ct_uint_ne(mbedtls_ct_uint_t x, mbedtls_ct_uint_t y) in mbedtls_ct_uint_ne() function 507 return ~mbedtls_ct_uint_ne(x, y); in mbedtls_ct_uint_eq()
|
H A D | constant_time_internal.h | 112 static inline mbedtls_ct_condition_t mbedtls_ct_uint_ne(mbedtls_ct_uint_t x, mbedtls_ct_uint_t y); 194 * \note This is more efficient than mbedtls_ct_uint_ne if both arguments are
|
H A D | cipher.c | 862 mbedtls_ct_condition_t different = mbedtls_ct_uint_ne(input[i], padding_len); in get_pkcs_padding() 905 bad = mbedtls_ct_bool_if(hit_first_nonzero, mbedtls_ct_uint_ne(input[i], 0x80), bad); in get_one_and_zeros_padding() 984 done = mbedtls_ct_bool_or(done, mbedtls_ct_uint_ne(input[i-1], 0)); in get_zeros_padding()
|
H A D | ssl_tls12_server.c | 3559 diff = mbedtls_ct_bool_or(diff, mbedtls_ct_uint_ne(peer_pmslen, 48)); in ssl_parse_encrypted_pms() 3560 diff = mbedtls_ct_bool_or(diff, mbedtls_ct_uint_ne(peer_pms[0], ver[0])); in ssl_parse_encrypted_pms() 3561 diff = mbedtls_ct_bool_or(diff, mbedtls_ct_uint_ne(peer_pms[1], ver[1])); in ssl_parse_encrypted_pms()
|
H A D | rsa.c | 477 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(input[1], MBEDTLS_RSA_CRYPT)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 2006 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(*p++, 0x01)); in mbedtls_rsa_rsaes_oaep_decrypt()
|
Completed in 15 milliseconds