timingsafe_bcmp
int timingsafe_bcmp(const void *, const void *, size_t);
timingsafe_bcmp(hash, goodhash, strlen(goodhash)) != 0) {
PROTO_NORMAL(timingsafe_bcmp);
DEF_WEAK(timingsafe_bcmp);
if (rslen != tbslen || timingsafe_bcmp(tbs, rctx->tbuf, rslen))
if (timingsafe_bcmp(H_, H, hLen)) {
timingsafe_bcmp(m, sig->data, m_len) != 0) {
if (timingsafe_bcmp(decrypt_buf,
timingsafe_bcmp(encoded, decrypt_buf, encoded_len) != 0) {
return (timingsafe_bcmp(authdata_ext, &tmp, sizeof(*authdata_ext)));
return (timingsafe_bcmp(expected_hash, obtained_hash,
return timingsafe_bcmp(expected_hash, array->ptr + body_len,
ok = timingsafe_bcmp(&expected, actual, sizeof(expected));
ok = timingsafe_bcmp(&expected, actual, sizeof(expected));
ok = timingsafe_bcmp(&expected, actual, sizeof(expected));
return (timingsafe_bcmp(authenticator, packet->pdata->authenticator,
return (timingsafe_bcmp(authenticator, packet->pdata->authenticator,
return (timingsafe_bcmp(ma0, ma1, sizeof(ma1)));
ASSERT_EQ(0, timingsafe_bcmp(bufone, bufone, N));
ASSERT_EQ(0, timingsafe_bcmp(buftwo, buftwo, N));
ASSERT_EQ(cmp == 0, timingsafe_bcmp(bufone, buftwo, N) == 0);
ret = timingsafe_bcmp(b.mac, src + dst_len, CHACHA20POLY1305_AUTHTAG_SIZE);
if (timingsafe_bcmp(secret, null_point, CURVE25519_KEY_SIZE) == 0)
return timingsafe_bcmp(out, null_point, CURVE25519_KEY_SIZE);
return timingsafe_bcmp(A, IV, 8) != 0;
int timingsafe_bcmp(const void *, const void *, size_t);
timingsafe_bcmp(digest, value, value_len) != 0) {
timingsafe_bcmp(private, iface_o.i_private, WG_KEY_SIZE))) {
if (timingsafe_bcmp(peer_key, public, WG_KEY_SIZE) == 0)
if (timingsafe_bcmp(our_cm.mac1, cm->mac1, COOKIE_MAC_SIZE) != 0)
if (timingsafe_bcmp(our_cm.mac2, cm->mac2, COOKIE_MAC_SIZE) != 0)
same = !timingsafe_bcmp(r->r_psk, psk, NOISE_SYMMETRIC_KEY_LEN);
ret = timingsafe_bcmp(r->r_psk, null_psk, NOISE_SYMMETRIC_KEY_LEN);
if (timingsafe_bcmp(ss, null_point, NOISE_PUBLIC_KEY_LEN) == 0)
return timingsafe_bcmp(key->mic, mic, EAPOL_KEY_MIC_LEN) != 0;
if (timingsafe_bcmp(mic, mic0, 8) != 0) {
if (timingsafe_bcmp(mic0, b, IEEE80211_CCMP_MICLEN) != 0) {
if (timingsafe_bcmp(mic0, mic, IEEE80211_TKIP_MICLEN) != 0) {
if (timingsafe_bcmp(ptr + skip + rplen, calc, ahx->authsize)) {
if (!timingsafe_bcmp(md, md2, sizeof(md2)))
if (timingsafe_bcmp(abuf, aalg, esph->authsize)) {
if (sigp && timingsafe_bcmp(sigp, cp + 2, 16))
if (timingsafe_bcmp(sig, sigp, 16)) {
if (timingsafe_bcmp(isc_buffer_current(optbuf), sit, 8) == 0) {
return (timingsafe_bcmp(digest, newdigest, len) == 0);
return (timingsafe_bcmp(digest, newdigest, len) == 0);
return (timingsafe_bcmp(digest, newdigest, len) == 0);
return (timingsafe_bcmp(digest, newdigest, len) == 0);
return (timingsafe_bcmp(digest, newdigest, len) == 0);
return timingsafe_bcmp(x, y, 32) ? -1 : 0;
timingsafe_bcmp(ucp + 12 + ((proto_len + 3) & ~3),
if (timingsafe_bcmp(expected_tag, tag, POLY1305_TAGLEN) != 0) {
if (timingsafe_bcmp(expected_tag, tag, POLY1305_TAGLEN) != 0) {
if (timingsafe_bcmp(hostkey_digest, dnskey_digest,
if (timingsafe_bcmp(zero, shared_key, CURVE25519_SIZE) == 0)
if (timingsafe_bcmp(ourmac, theirmac, mac->mac_len) != 0)
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
(timingsafe_bcmp(p, session_id2, session_id2_len) != 0))
timingsafe_bcmp(key_blob, blob, key_bloblen))
if (timingsafe_bcmp(passwdhash, lock_pwhash, LOCK_SIZE) == 0) {
if (timingsafe_bcmp(sshbuf_ptr(a), sshbuf_ptr(b), sshbuf_len(a)) != 0)
if (timingsafe_bcmp(sshbuf_ptr(b) + offset, s, len) != 0)
if (timingsafe_bcmp(sshbuf_ptr(a->certblob), sshbuf_ptr(b->certblob),
timingsafe_bcmp(authen_req_auth, client_req_auth, 16) == 0)) {
ret = timingsafe_bcmp(idpass + 1, digest, sizeof(digest));
if (timingsafe_bcmp(ntresponse, resp.ntresponse, 24) != 0) {