timingsafe_bcmp
timingsafe_bcmp(ucp + 12 + ((proto_len + 3) & ~3),
if (timingsafe_bcmp(expected_tag, tag, POLY1305_TAGLEN) != 0) {
if (timingsafe_bcmp(expected_tag, tag, POLY1305_TAGLEN) != 0) {
if (timingsafe_bcmp(hostkey_digest, dnskey_digest,
if (timingsafe_bcmp(zero, shared_key, CURVE25519_SIZE) == 0)
if (timingsafe_bcmp(ourmac, theirmac, mac->mac_len) != 0)
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
timingsafe_bcmp(key_blob, blob, key_bloblen))
int timingsafe_bcmp(const void *, const void *, size_t);
if (timingsafe_bcmp(passwdhash, lock_pwhash, LOCK_SIZE) == 0) {
if (timingsafe_bcmp(sshbuf_ptr(a), sshbuf_ptr(b), sshbuf_len(a)) != 0)
if (timingsafe_bcmp(sshbuf_ptr(b) + offset, s, len) != 0)
if (timingsafe_bcmp(sshbuf_ptr(a->certblob), sshbuf_ptr(b->certblob),
int timingsafe_bcmp(const void *, const void *, size_t);
__weak_reference(__timingsafe_bcmp, timingsafe_bcmp);
#define MEMCMP timingsafe_bcmp
if (timingsafe_bcmp(res, res2, ses->mlen) != 0)
if (timingsafe_bcmp(&staging_block, tag, tag_length) != 0) {
if (timingsafe_bcmp(tag, s.Xi.c, GMAC_DIGEST_LEN) != 0) {
if (timingsafe_bcmp(res, res2, ses->mlen) != 0)
if (timingsafe_bcmp(s->hmac.res, ihash, s->hmac.hash_len) != 0)
if (timingsafe_bcmp(tag, s->gmac.final_block, s->gmac.hash_len) != 0)
result = (timingsafe_bcmp(u.tag, src + resid, POLY1305_HASH_LEN) == 0);
result = (timingsafe_bcmp(u.tag, src + resid, POLY1305_HASH_LEN) == 0);
return timingsafe_bcmp(ctx->gcm.Xi.c, tag, len);
return timingsafe_bcmp(ctx->gcm.Xi.c, tag, len);
if (timingsafe_bcmp(digest, digest2, s->hash.mlen) != 0)
return timingsafe_bcmp(ctx->gcm.Xi.c, tag, len);
if (timingsafe_bcmp(tag, tag2, mlen) != 0) {
if (timingsafe_bcmp(hash, hash2, ses->ses_mlen) != 0)
if (timingsafe_bcmp(hash, cr->cr_csd->csd_hash,
if (timingsafe_bcmp((cpl + 1), hash, s->hmac.hash_len) != 0)
if (timingsafe_bcmp(hash, hash2, ses->ses_mlen) != 0)
if (timingsafe_bcmp(icv,
if (timingsafe_bcmp(icv, qsc->qsc_auth_res,
if (timingsafe_bcmp(re->re_sastate.sa_saved_indigest,
if (timingsafe_bcmp(
timingsafe_bcmp(private, key, WG_KEY_SIZE) != 0) {
if (timingsafe_bcmp(our_macs.mac1, macs->mac1, COOKIE_MAC_SIZE) != 0)
if (timingsafe_bcmp(our_macs.mac2, macs->mac2, COOKIE_MAC_SIZE) != 0)
if (timingsafe_bcmp(ss, null_point, NOISE_PUBLIC_KEY_LEN) == 0)
if (timingsafe_bcmp(r->r_public, public, NOISE_PUBLIC_KEY_LEN) == 0) {
ret = timingsafe_bcmp(r->r_psk, null_psk, NOISE_SYMMETRIC_KEY_LEN);
if (timingsafe_bcmp(digest, computed_digest, digestlen) != 0) {
if (timingsafe_bcmp(calc_sig, sig, SCTP_SIGNATURE_SIZE) != 0) {
if (timingsafe_bcmp(calc_sig, sig, SCTP_SIGNATURE_SIZE) == 0)
if (timingsafe_bcmp(ptr + skip + rplen, calc, authsize)) {
r = timingsafe_bcmp(s.tag, s.tag2, swa->sw_mlen);
if (timingsafe_bcmp(s.aalg, s.uaalg, sw->sw_mlen) != 0)
if (timingsafe_bcmp(s.tag, s.tag2, swa->sw_mlen) != 0)
r = timingsafe_bcmp(s.tag, s.tag2, swa->sw_mlen);
if (timingsafe_bcmp(s.tag, s.tag2, swa->sw_mlen) != 0)
r = timingsafe_bcmp(s.tag, s.tag2, swa->sw_mlen);
int timingsafe_bcmp(const void *, const void *, size_t);