Skip to content
This repository was archived by the owner on Jan 8, 2020. It is now read-only.

Conversation

@fredrikt
Copy link
Contributor

note: I haven't actually tested this code ;)

Without this, an attacker might be able to guess the correct hash
value based on difference in response time (using many attempts).
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant