Searched refs:mbedtls_ct_memcmp (Results 1 – 15 of 15) sorted by relevance
/third_party/mbedtls/tests/suites/ |
D | test_suite_constant_time.data | 13 mbedtls_ct_memcmp NULL 16 mbedtls_ct_memcmp len 1 17 mbedtls_ct_memcmp:-1:1:0 19 mbedtls_ct_memcmp len 3 20 mbedtls_ct_memcmp:-1:3:0 22 mbedtls_ct_memcmp len 4 23 mbedtls_ct_memcmp:-1:4:0 25 mbedtls_ct_memcmp len 5 26 mbedtls_ct_memcmp:-1:5:0 28 mbedtls_ct_memcmp len 15 [all …]
|
D | test_suite_constant_time.function | 22 TEST_ASSERT(mbedtls_ct_memcmp(&x, NULL, 0) == 0); 23 TEST_ASSERT(mbedtls_ct_memcmp(NULL, &x, 0) == 0); 24 TEST_ASSERT(mbedtls_ct_memcmp(NULL, NULL, 0) == 0); 29 void mbedtls_ct_memcmp(int same, int size, int offset) 52 int actual = mbedtls_ct_memcmp(a + offset, b + offset, size);
|
/third_party/mbedtls/include/mbedtls/ |
D | constant_time.h | 42 int mbedtls_ct_memcmp(const void *a,
|
/third_party/mbedtls/library/ |
D | nist_kw.c | 365 diff = mbedtls_ct_memcmp(NIST_KW_ICV1, A, KW_SEMIBLOCK_LENGTH); in mbedtls_nist_kw_unwrap() 409 diff = mbedtls_ct_memcmp(NIST_KW_ICV2, A, KW_SEMIBLOCK_LENGTH / 2); in mbedtls_nist_kw_unwrap()
|
D | ssl_cookie.c | 357 if (mbedtls_ct_memcmp(cookie + 4, ref_hmac, sizeof(ref_hmac)) != 0) { in mbedtls_ssl_cookie_check()
|
D | cipher.c | 1174 if (mbedtls_ct_memcmp(tag, check_tag, tag_len) != 0) { in mbedtls_cipher_check_tag() 1195 if (mbedtls_ct_memcmp(tag, check_tag, tag_len) != 0) { in mbedtls_cipher_check_tag()
|
D | constant_time.c | 88 int mbedtls_ct_memcmp(const void *a, in mbedtls_ct_memcmp() function
|
D | ssl_tls13_server.c | 306 mbedtls_ct_memcmp(ssl->conf->psk_identity, in ssl_tls13_offered_psks_check_identity_match() 363 if (mbedtls_ct_memcmp(server_computed_binder, binder, binder_len) == 0) { in ssl_tls13_offered_psks_check_binder_match()
|
D | rsa.c | 2007 if (mbedtls_ct_memcmp(verif, sig, ctx->len) != 0) { in mbedtls_rsa_rsassa_pkcs1_v15_sign() 2253 if ((ret = mbedtls_ct_memcmp(encoded, encoded_expected, in mbedtls_rsa_rsassa_pkcs1_v15_verify()
|
D | ssl_tls13_generic.c | 1156 if (mbedtls_ct_memcmp(buf, in ssl_tls13_parse_finished_message()
|
D | ssl_tls12_client.c | 628 mbedtls_ct_memcmp(buf + 1, in ssl_parse_renegotiation_info() 630 mbedtls_ct_memcmp(buf + 1 + ssl->verify_data_len, in ssl_parse_renegotiation_info()
|
D | ssl_tls12_server.c | 120 mbedtls_ct_memcmp(buf + 1, ssl->peer_verify_data, in ssl_parse_renegotiation_info() 3573 mbedtls_ct_memcmp(ssl->conf->psk_identity, *p, n) != 0) { in ssl_parse_client_psk_identity()
|
D | ssl_msg.c | 1577 if (mbedtls_ct_memcmp(data + rec->data_len, mac_expect, in mbedtls_ssl_decrypt_buf() 1850 if (mbedtls_ct_memcmp(mac_peer, mac_expect, in mbedtls_ssl_decrypt_buf()
|
D | ssl_tls.c | 8113 if (mbedtls_ct_memcmp(ssl->in_msg + mbedtls_ssl_hs_hdr_len(ssl), in mbedtls_ssl_parse_finished()
|
/third_party/mbedtls/ |
D | ChangeLog | 748 * Add new API mbedtls_ct_memcmp for constant time buffer comparison.
|