| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | constant_time.h | 32 int mbedtls_ct_memcmp(const void *a,
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | nist_kw.c | 358 diff = mbedtls_ct_memcmp(NIST_KW_ICV1, A, KW_SEMIBLOCK_LENGTH); in mbedtls_nist_kw_unwrap() 402 diff = mbedtls_ct_memcmp(NIST_KW_ICV2, A, KW_SEMIBLOCK_LENGTH / 2); in mbedtls_nist_kw_unwrap()
|
| H A D | constant_time.c | 68 int mbedtls_ct_memcmp(const void *a, in mbedtls_ct_memcmp() function
|
| H A D | ssl_cookie.c | 354 if (mbedtls_ct_memcmp(cookie + 4, ref_hmac, sizeof(ref_hmac)) != 0) { in mbedtls_ssl_cookie_check()
|
| H A D | chachapoly.c | 311 diff = mbedtls_ct_memcmp(tag, check_tag, sizeof(check_tag)); in mbedtls_chachapoly_auth_decrypt()
|
| H A D | psa_crypto_mac.c | 445 if (mbedtls_ct_memcmp(mac, actual_mac, mac_length) != 0) { in mbedtls_psa_mac_verify_finish()
|
| H A D | cipher.c | 1317 if (mbedtls_ct_memcmp(tag, check_tag, tag_len) != 0) { in mbedtls_cipher_check_tag() 1338 if (mbedtls_ct_memcmp(tag, check_tag, tag_len) != 0) { in mbedtls_cipher_check_tag()
|
| H A D | ccm.c | 577 int diff = mbedtls_ct_memcmp(tag1, tag2, tag_len); in mbedtls_ccm_compare_tags()
|
| H A D | rsa.c | 1999 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool(mbedtls_ct_memcmp(lhash, p, hlen))); in mbedtls_rsa_rsaes_oaep_decrypt() 2483 if (mbedtls_ct_memcmp(verif, sig, ctx->len) != 0) { in mbedtls_rsa_rsassa_pkcs1_v15_sign() 2727 if ((ret = FTMN_CALLEE_DONE_MEMCMP(mbedtls_ct_memcmp, encoded, in mbedtls_rsa_rsassa_pkcs1_v15_verify()
|
| H A D | gcm.c | 760 diff = mbedtls_ct_memcmp(tag, check_tag, tag_len); in mbedtls_gcm_auth_decrypt()
|
| H A D | ssl_tls13_server.c | 383 mbedtls_ct_memcmp(ssl->conf->psk_identity, in ssl_tls13_offered_psks_check_identity_match() 451 if (mbedtls_ct_memcmp(server_computed_binder, in ssl_tls13_offered_psks_check_binder_match()
|
| H A D | ssl_tls13_generic.c | 1113 if (mbedtls_ct_memcmp(buf, in ssl_tls13_parse_finished_message()
|
| H A D | ssl_tls12_client.c | 626 mbedtls_ct_memcmp(buf + 1, in ssl_parse_renegotiation_info() 628 mbedtls_ct_memcmp(buf + 1 + ssl->verify_data_len, in ssl_parse_renegotiation_info()
|
| H A D | ssl_tls12_server.c | 116 mbedtls_ct_memcmp(buf + 1, ssl->peer_verify_data, in ssl_parse_renegotiation_info() 3623 mbedtls_ct_memcmp(ssl->conf->psk_identity, *p, n) != 0) { in ssl_parse_client_psk_identity()
|
| H A D | psa_crypto_driver_wrappers.h | 2131 mbedtls_ct_memcmp( tag, check_tag, tag_length ) in psa_driver_wrapper_aead_verify()
|
| H A D | ssl_msg.c | 1796 if (mbedtls_ct_memcmp(data + rec->data_len, mac_expect, in mbedtls_ssl_decrypt_buf() 2069 if (mbedtls_ct_memcmp(mac_peer, mac_expect, in mbedtls_ssl_decrypt_buf()
|
| H A D | psa_crypto.c | 2511 if (mbedtls_ct_memcmp(hash, actual_hash, actual_hash_length) != 0) { in psa_hash_verify() 2581 if (mbedtls_ct_memcmp(hash, actual_hash, actual_hash_length) != 0) { in psa_hash_compare() 3010 if (mbedtls_ct_memcmp(mac, actual_mac, actual_mac_length) != 0) { in psa_mac_verify()
|
| H A D | ssl_tls.c | 8518 if (mbedtls_ct_memcmp(ssl->in_msg + mbedtls_ssl_hs_hdr_len(ssl), in mbedtls_ssl_parse_finished()
|
| /optee_os/lib/libmbedtls/mbedtls/ |
| H A D | ChangeLog | 1709 * Add new API mbedtls_ct_memcmp for constant time buffer comparison.
|