mirror of
https://github.com/CTCaer/switch-l4t-atf.git
synced 2024-12-11 20:34:39 +00:00
aa050a7bdb
Some side-channel attacks involve an attacker inferring something from the time taken for a memory compare operation to complete, for example when comparing hashes during image authentication. To mitigate this, timingsafe_bcmp() must be used for such operations instead of the standard memcmp(). This function executes in constant time and so doesn't leak any timing information to the caller. Change-Id: I470a723dc3626a0ee6d5e3f7fd48d0a57b8aa5fd Signed-off-by: dp-arm <dimitris.papastamos@arm.com> Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com> |
||
---|---|---|
.. | ||
abort.c | ||
assert.c | ||
exit.c | ||
mem.c | ||
printf.c | ||
putchar.c | ||
puts.c | ||
sscanf.c | ||
stdlib.mk | ||
strchr.c | ||
strcmp.c | ||
strlen.c | ||
strncmp.c | ||
strnlen.c | ||
subr_prf.c | ||
timingsafe_bcmp.c |