CRYPTO_memcmp
CRYPTO_memcmp(digest->data, buf, digest_len) == 0);
if (CRYPTO_memcmp(loopargs[i].secret_a,
if (CRYPTO_memcmp(loopargs[i].secret_ff_a,
&& CRYPTO_memcmp(msg->protection->data, protection->data,
j = CRYPTO_memcmp(weak_keys[i], key, sizeof(DES_cblock));
return CRYPTO_memcmp(s, zero, sizeof(zero)) != 0;
res = CRYPTO_memcmp(rcheck, r, sizeof(rcheck)) == 0;
return CRYPTO_memcmp(kZeros, out_shared_key, 32) != 0;
return CRYPTO_memcmp(akey->pubkey, bkey->pubkey, KEYLEN(a)) == 0;
if (CRYPTO_memcmp(gctx->kma.param.t.b, in + len,
if (CRYPTO_memcmp(buf, gctx->kma.param.t.b, gctx->taglen))
if (!CRYPTO_memcmp(cctx->aes.ccm.kmac_param.icv.b, in + len,
if (!CRYPTO_memcmp(cctx->aes.ccm.kmac_param.icv.b, buf,
&& CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
if (CRYPTO_memcmp(EVP_CIPHER_CTX_buf_noconst(ctx), in + len,
&& CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
if (!CRYPTO_memcmp(tag, in + len, cctx->M))
if (!CRYPTO_memcmp(tag, EVP_CIPHER_CTX_buf_noconst(ctx),
&& CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
if (CRYPTO_memcmp(EVP_CIPHER_CTX_buf_noconst(ctx), in + len,
if (!CRYPTO_memcmp(tag, in + len, cctx->M))
if (!CRYPTO_memcmp(tag, EVP_CIPHER_CTX_buf_noconst(ctx),
if (CRYPTO_memcmp(tohash, in, POLY1305_BLOCK_SIZE)) {
if (CRYPTO_memcmp(temp, in, POLY1305_BLOCK_SIZE)) {
if (CRYPTO_memcmp(temp, actx->tag, actx->tag_len))
&& CRYPTO_memcmp(sha1tmp, icv, 8) == 0)
if (CRYPTO_memcmp(out + plen, mac, MD5_DIGEST_LENGTH))
return CRYPTO_memcmp(a, b, sizeof(*a)) == 0;
CRYPTO_memcmp(ctext, tmp_ctext, vinfo->ctext_bytes));
return CRYPTO_memcmp(ctx->Xi.c, tag, len);
return CRYPTO_memcmp(&tmp, tag, len);
if (CRYPTO_memcmp(got_iv, iv, 8)) {
if ((!icv && CRYPTO_memcmp(aiv, default_aiv, 4))
|| (icv && CRYPTO_memcmp(aiv, icv, 4))) {
if (CRYPTO_memcmp(out + ptext_len, zeros, padding_len) != 0) {
|| CRYPTO_memcmp(mac, ASN1_STRING_get0_data(macoct), maclen) != 0)
good &= constant_time_is_zero(CRYPTO_memcmp(db, phash, mdlen));
if (CRYPTO_memcmp(computed_C3, C3, hash_size) != 0) {
if (sizeof(wrap_ct) == outlen && !CRYPTO_memcmp(outbuf, wrap_ct, outlen))
if (sizeof(wrap_pt) == outlen && !CRYPTO_memcmp(outbuf, wrap_pt, outlen))
if (sizeof(cbc_ct) == outlen && !CRYPTO_memcmp(outbuf, cbc_ct, outlen))
if (sizeof(cbc_pt) == outlen && !CRYPTO_memcmp(outbuf, cbc_pt, outlen))
if (CRYPTO_memcmp(digest, known_answer, sizeof(known_answer)) != 0) {
if (CRYPTO_memcmp(msg, decrypted, decrypted_len) != 0) {
if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
if (CRYPTO_memcmp(hkdf_okm, out, sizeof(hkdf_okm)) != 0) {
if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
|| CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secretlen) != 0) {
if (CRYPTO_memcmp(peer1.secret, peer2.secret, peer1.secret_len) != 0) {
if (use_kat && CRYPTO_memcmp(peer1.secret, expected_result, peer1.secret_len) != 0) {
if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
if (CRYPTO_memcmp(expected_output, out, sizeof(expected_output)) != 0) {
return CRYPTO_memcmp(pkt->curr, ptr, num) == 0;
int CRYPTO_memcmp(const void *in_a, const void *in_b, size_t len);
ret = !CRYPTO_memcmp(ctx->tag, ctx->user_tag, sizeof(ctx->tag));
&& CRYPTO_memcmp(key, key + bytes, bytes) == 0) {
if (CRYPTO_memcmp(tohash, in, POLY1305_BLOCK_SIZE)) {
if (CRYPTO_memcmp(temp, in, POLY1305_BLOCK_SIZE)) {
if (CRYPTO_memcmp(temp, ctx->tag, ctx->tag_len))
if (CRYPTO_memcmp(out + plen, mac, MD5_DIGEST_LENGTH))
&& CRYPTO_memcmp(sha1tmp, icv, 8) == 0)
|| CRYPTO_memcmp(tag, expected_tag, taglen) != 0)
if (CRYPTO_memcmp(&key[0], &key[8], 8) == 0 || CRYPTO_memcmp(&key[8], &key[16], 8) == 0) {
&& CRYPTO_memcmp(pa, pb, pal) == 0;
&& CRYPTO_memcmp(pa, pb, pal) == 0;
return CRYPTO_memcmp(ecx->pubkey, pub, ecx->keylen) == 0;
return CRYPTO_memcmp(ecx->pubkey, pub, ecx->keylen) == 0;
|| CRYPTO_memcmp(key1->priv_key, key2->priv_key, key1->priv_key_len) == 0);
return !CRYPTO_memcmp(expected_tag, actual_tag,
if (i == 0 || CRYPTO_memcmp(md, mac, (size_t)mac_size) != 0) {
|| CRYPTO_memcmp(md, macbuf.mac, mac_size) != 0)
} else if (CRYPTO_memcmp(tag, rec->data + rec->length,
if (i == 0 || CRYPTO_memcmp(md, mac, mac_size) != 0) {
|| CRYPTO_memcmp(md, thismb->mac, (size_t)mac_size) != 0)
ret = (CRYPTO_memcmp(binderin, binderout, hashsize) == 0);
if (CRYPTO_memcmp(hmac, mdin, SHA256_DIGEST_LENGTH) != 0) {
ok = CRYPTO_memcmp(PACKET_data(pkt), s->s3.tmp.peer_finish_md,
if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) {
return CRYPTO_memcmp("ab", "cd", 2);
ok = ok & (CRYPTO_memcmp(key1->privkey, key2->privkey, XOR_KEY_SIZE) == 0);
ok = ok & (CRYPTO_memcmp(key1->pubkey, key2->pubkey, XOR_KEY_SIZE) == 0);