Symbol: timingsafe_bcmp
include/string.h
136
int timingsafe_bcmp(const void *, const void *, size_t);
lib/libc/crypt/bcrypt.c
229
timingsafe_bcmp(hash, goodhash, strlen(goodhash)) != 0) {
lib/libc/hidden/string.h
79
PROTO_NORMAL(timingsafe_bcmp);
lib/libc/string/timingsafe_bcmp.c
30
DEF_WEAK(timingsafe_bcmp);
lib/libcrypto/rsa/rsa_pmeth.c
342
if (rslen != tbslen || timingsafe_bcmp(tbs, rctx->tbuf, rslen))
lib/libcrypto/rsa/rsa_pss.c
171
if (timingsafe_bcmp(H_, H, hLen)) {
lib/libcrypto/rsa/rsa_saos.c
135
timingsafe_bcmp(m, sig->data, m_len) != 0) {
lib/libcrypto/rsa/rsa_sign.c
220
if (timingsafe_bcmp(decrypt_buf,
lib/libcrypto/rsa/rsa_sign.c
251
timingsafe_bcmp(encoded, decrypt_buf, encoded_len) != 0) {
lib/libfido2/src/cred.c
223
return (timingsafe_bcmp(authdata_ext, &tmp, sizeof(*authdata_ext)));
lib/libfido2/src/cred.c
239
return (timingsafe_bcmp(expected_hash, obtained_hash,
lib/libfido2/src/largeblob.c
417
return timingsafe_bcmp(expected_hash, array->ptr + body_len,
lib/libfido2/src/tpm.c
253
ok = timingsafe_bcmp(&expected, actual, sizeof(expected));
lib/libfido2/src/tpm.c
290
ok = timingsafe_bcmp(&expected, actual, sizeof(expected));
lib/libfido2/src/tpm.c
334
ok = timingsafe_bcmp(&expected, actual, sizeof(expected));
lib/libradius/radius.c
264
return (timingsafe_bcmp(authenticator, packet->pdata->authenticator,
lib/libradius/radius.c
303
return (timingsafe_bcmp(authenticator, packet->pdata->authenticator,
lib/libradius/radius_msgauth.c
152
return (timingsafe_bcmp(ma0, ma1, sizeof(ma1)));
regress/lib/libc/timingsafe/timingsafe.c
36
ASSERT_EQ(0, timingsafe_bcmp(bufone, bufone, N));
regress/lib/libc/timingsafe/timingsafe.c
37
ASSERT_EQ(0, timingsafe_bcmp(buftwo, buftwo, N));
regress/lib/libc/timingsafe/timingsafe.c
42
ASSERT_EQ(cmp == 0, timingsafe_bcmp(bufone, buftwo, N) == 0);
sys/crypto/chachapoly.c
201
ret = timingsafe_bcmp(b.mac, src + dst_len, CHACHA20POLY1305_AUTHTAG_SIZE);
sys/crypto/curve25519.c
37
if (timingsafe_bcmp(secret, null_point, CURVE25519_KEY_SIZE) == 0)
sys/crypto/curve25519.c
890
return timingsafe_bcmp(out, null_point, CURVE25519_KEY_SIZE);
sys/crypto/key_wrap.c
111
return timingsafe_bcmp(A, IV, 8) != 0;
sys/lib/libkern/libkern.h
169
int timingsafe_bcmp(const void *, const void *, size_t);
sys/net/if_spppsubr.c
3555
timingsafe_bcmp(digest, value, value_len) != 0) {
sys/net/if_wg.c
2328
timingsafe_bcmp(private, iface_o.i_private, WG_KEY_SIZE))) {
sys/net/if_wg.c
478
if (timingsafe_bcmp(peer_key, public, WG_KEY_SIZE) == 0)
sys/net/wg_cookie.c
179
if (timingsafe_bcmp(our_cm.mac1, cm->mac1, COOKIE_MAC_SIZE) != 0)
sys/net/wg_cookie.c
187
if (timingsafe_bcmp(our_cm.mac2, cm->mac2, COOKIE_MAC_SIZE) != 0)
sys/net/wg_noise.c
163
same = !timingsafe_bcmp(r->r_psk, psk, NOISE_SYMMETRIC_KEY_LEN);
sys/net/wg_noise.c
184
ret = timingsafe_bcmp(r->r_psk, null_psk, NOISE_SYMMETRIC_KEY_LEN);
sys/net/wg_noise.c
850
if (timingsafe_bcmp(ss, null_point, NOISE_PUBLIC_KEY_LEN) == 0)
sys/net80211/ieee80211_crypto.c
518
return timingsafe_bcmp(key->mic, mic, EAPOL_KEY_MIC_LEN) != 0;
sys/net80211/ieee80211_crypto_bip.c
202
if (timingsafe_bcmp(mic, mic0, 8) != 0) {
sys/net80211/ieee80211_crypto_ccmp.c
474
if (timingsafe_bcmp(mic0, b, IEEE80211_CCMP_MICLEN) != 0) {
sys/net80211/ieee80211_crypto_tkip.c
481
if (timingsafe_bcmp(mic0, mic, IEEE80211_TKIP_MICLEN) != 0) {
sys/netinet/ip_ah.c
709
if (timingsafe_bcmp(ptr + skip + rplen, calc, ahx->authsize)) {
sys/netinet/ip_carp.c
407
if (!timingsafe_bcmp(md, md2, sizeof(md2)))
sys/netinet/ip_esp.c
525
if (timingsafe_bcmp(abuf, aalg, esph->authsize)) {
sys/netinet/tcp_input.c
2224
if (sigp && timingsafe_bcmp(sigp, cp + 2, 16))
sys/netinet/tcp_input.c
2290
if (timingsafe_bcmp(sig, sigp, 16)) {
usr.bin/dig/dighost.c
3132
if (timingsafe_bcmp(isc_buffer_current(optbuf), sit, 8) == 0) {
usr.bin/dig/lib/isc/hmacsha.c
232
return (timingsafe_bcmp(digest, newdigest, len) == 0);
usr.bin/dig/lib/isc/hmacsha.c
245
return (timingsafe_bcmp(digest, newdigest, len) == 0);
usr.bin/dig/lib/isc/hmacsha.c
258
return (timingsafe_bcmp(digest, newdigest, len) == 0);
usr.bin/dig/lib/isc/hmacsha.c
271
return (timingsafe_bcmp(digest, newdigest, len) == 0);
usr.bin/dig/lib/isc/hmacsha.c
284
return (timingsafe_bcmp(digest, newdigest, len) == 0);
usr.bin/signify/crypto_api.c
28
return timingsafe_bcmp(x, y, 32) ? -1 : 0;
usr.bin/ssh/channels.c
1412
timingsafe_bcmp(ucp + 12 + ((proto_len + 3) & ~3),
usr.bin/ssh/cipher-chachapoly-libcrypto.c
102
if (timingsafe_bcmp(expected_tag, tag, POLY1305_TAGLEN) != 0) {
usr.bin/ssh/cipher-chachapoly.c
85
if (timingsafe_bcmp(expected_tag, tag, POLY1305_TAGLEN) != 0) {
usr.bin/ssh/dns.c
260
if (timingsafe_bcmp(hostkey_digest, dnskey_digest,
usr.bin/ssh/kexc25519.c
68
if (timingsafe_bcmp(zero, shared_key, CURVE25519_SIZE) == 0)
usr.bin/ssh/mac.c
209
if (timingsafe_bcmp(ourmac, theirmac, mac->mac_len) != 0)
usr.bin/ssh/monitor.c
1166
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
usr.bin/ssh/monitor.c
1175
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
usr.bin/ssh/monitor.c
1246
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
usr.bin/ssh/monitor.c
516
timingsafe_bcmp(key_blob, blob, key_bloblen))
usr.bin/ssh/ssh-agent.c
1473
if (timingsafe_bcmp(passwdhash, lock_pwhash, LOCK_SIZE) == 0) {
usr.bin/ssh/ssh-agent.c
827
if (timingsafe_bcmp(sshbuf_ptr(a), sshbuf_ptr(b), sshbuf_len(a)) != 0)
usr.bin/ssh/sshbuf-misc.c
282
if (timingsafe_bcmp(sshbuf_ptr(b) + offset, s, len) != 0)
usr.bin/ssh/sshkey.c
758
if (timingsafe_bcmp(sshbuf_ptr(a->certblob), sshbuf_ptr(b->certblob),
usr.sbin/radiusd/radiusd.c
1050
timingsafe_bcmp(authen_req_auth, client_req_auth, 16) == 0)) {
usr.sbin/radiusd/radiusd_file.c
457
ret = timingsafe_bcmp(idpass + 1, digest, sizeof(digest));
usr.sbin/radiusd/radiusd_file.c
529
if (timingsafe_bcmp(ntresponse, resp.ntresponse, 24) != 0) {