1 .\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
3 .\" %%%LICENSE_START(VERBATIM)
4 .\" Permission is granted to make and distribute verbatim copies of this
5 .\" manual provided the copyright notice and this permission notice are
6 .\" preserved on all copies.
8 .\" Permission is granted to copy and distribute modified versions of this
9 .\" manual under the conditions for verbatim copying, provided that the
10 .\" entire resulting derived work is distributed under the terms of a
11 .\" permission notice identical to this one.
13 .\" Since the Linux kernel and libraries are constantly changing, this
14 .\" manual page may be incorrect or out-of-date. The author(s) assume no
15 .\" responsibility for errors or omissions, or for damages resulting from
16 .\" the use of the information contained herein. The author(s) may not
17 .\" have taken the same level of care in the production of this manual,
18 .\" which is licensed free of charge, as they might when working
21 .\" Formatted or processed versions of this manual, if unaccompanied by
22 .\" the source, must acknowledge the copyright and authors of this work.
25 .\" References consulted:
26 .\" Linux libc source code
27 .\" Lewine's _POSIX Programmer's Guide_ (O'Reilly & Associates, 1991)
29 .\" Modified Sat Jul 24 18:55:27 1993 by Rik Faith (faith@cs.unc.edu)
30 .TH MEMCMP 3 2021-03-22 "" "Linux Programmer's Manual"
32 memcmp \- compare memory areas
35 .B #include <string.h>
37 .BI "int memcmp(const void *" s1 ", const void *" s2 ", size_t " n );
42 function compares the first \fIn\fP bytes (each interpreted as
44 of the memory areas \fIs1\fP and \fIs2\fP.
48 function returns an integer less than, equal to, or
49 greater than zero if the first \fIn\fP bytes of \fIs1\fP is found,
50 respectively, to be less than, to match, or be greater than the first
51 \fIn\fP bytes of \fIs2\fP.
53 For a nonzero return value, the sign is determined by the sign of
54 the difference between the first pair of bytes (interpreted as
63 is zero, the return value is zero.
65 For an explanation of the terms used in this section, see
73 Interface Attribute Value
76 T} Thread safety MT-Safe
82 POSIX.1-2001, POSIX.1-2008, C89, C99, SVr4, 4.3BSD.
86 to compare security critical data, such as cryptographic secrets,
87 because the required CPU time depends on the number of equal bytes.
88 Instead, a function that performs comparisons in constant time is required.
89 Some operating systems provide such a function (e.g., NetBSD's
90 .BR consttime_memequal ()),
91 but no such function is specified in POSIX.
92 On Linux, it may be necessary to implement such a function oneself.