CBS_mem_equal
return header_len == 2 && CBS_mem_equal(contents, eoc, 2);
int CBS_mem_equal(const CBS *cbs, const uint8_t *data, size_t len);
if (CBS_mem_equal(&cbs, key, keylen))
return header_len == 2 && CBS_mem_equal(contents, eoc, 2);
int CBS_mem_equal(const CBS *cbs, const uint8_t *data, size_t len);
if (!CBS_mem_equal(&cbs, s->s3->hs.peer_finished, CBS_len(&cbs))) {
CBS_mem_equal(&server_random, tls13_downgrade_12,
if (CBS_mem_equal(&server_random, tls13_downgrade_11,
CBS_mem_equal(&session_id, s->session->session_id,
if (CBS_mem_equal(&supported_proto,
if (!CBS_mem_equal(&cbs, s->s3->hs.peer_finished, CBS_len(&cbs))) {
if (!CBS_mem_equal(&cookie, s->s3->hs.tls13.cookie,
if (!CBS_mem_equal(&reneg, s->s3->previous_client_finished,
if (!CBS_mem_equal(&prev_client, s->s3->previous_client_finished,
if (!CBS_mem_equal(&prev_server, s->s3->previous_server_finished,
if (!CBS_mem_equal(&host_name, s->session->tlsext_hostname,
if (!CBS_mem_equal(&ticket_name,
if (!CBS_mem_equal(&ticket_hmac, hmac, hlen))
if (CBS_mem_equal(&max_seq_num, tls12_max_seq_num,
return CBS_mem_equal(&server_random, tls13_hello_retry_request_hash,
if (CBS_mem_equal(&server_random, tls13_downgrade_12,
CBS_mem_equal(&server_random, tls13_downgrade_11,
if (CBS_mem_equal(&server_random, tls13_hello_retry_request_hash,
if (!CBS_mem_equal(&session_id, ctx->hs->tls13.legacy_session_id,
if (!CBS_mem_equal(cbs, verify_data, verify_data_len)) {
if (!CBS_mem_equal(cbs, verify_data, verify_data_len)) {
if (!CBS_mem_equal(&compression_methods, tls13_compression_null_only,
return CBS_mem_equal(&content->cbs, buf, n);
if (CBS_mem_equal(want, got, got_len))
return CBS_mem_equal(&cbs, (const uint8_t *)str, len);
return CBS_mem_equal(&cbs, (const uint8_t *)str, len);
if (!CBS_mem_equal(&cbs, testdata, CBS_len(&cbs))) {
if (!CBS_mem_equal(&cbs, rrt->want_data, rrt->want_len)) {
if (!CBS_mem_equal(&cbs, rrt->want_data, TLS13_RECORD_HEADER_LEN)) {
if (!CBS_mem_equal(&cbs, rrt->want_data + TLS13_RECORD_HEADER_LEN,