arm-trusted-firmware/drivers/auth/mbedtls
Antonio Nino Diaz b621fb503c tbbr: Use constant-time bcmp() to compare hashes
To avoid timing side-channel attacks, it is needed to use a constant
time memory comparison function when comparing hashes. The affected
code only cheks for equality so it isn't needed to use any variant of
memcmp(), bcmp() is enough.

Also, timingsafe_bcmp() is as fast as memcmp() when the two compared
regions are equal, so this change incurrs no performance hit in said
case. In case they are unequal, the boot sequence wouldn't continue as
normal, so performance is not an issue.

Change-Id: I1c7c70ddfa4438e6031c8814411fef79fd3bb4df
Signed-off-by: Antonio Nino Diaz <antonio.ninodiaz@arm.com>
2017-01-24 14:42:13 +00:00
..
mbedtls_common.c Move up to mbed TLS 2.x 2015-12-10 15:58:29 +00:00
mbedtls_common.mk Always build with '-pedantic' 2016-01-05 11:41:08 +00:00
mbedtls_crypto.c tbbr: Use constant-time bcmp() to compare hashes 2017-01-24 14:42:13 +00:00
mbedtls_crypto.mk TBB: fix comment about MBEDTLS_KEY_ALG default 2017-01-06 16:58:34 +09:00
mbedtls_x509.mk TBB: add mbedTLS authentication related libraries 2015-06-25 08:53:27 +01:00
mbedtls_x509_parser.c tbbr: Use constant-time bcmp() to compare hashes 2017-01-24 14:42:13 +00:00