ace06232cfa0e99ecca1040e8553b3216d025768 |
|
11-Apr-2017 |
Timo Sirainen <timo.sirainen@dovecot.fi> |
auth: Use mem_equals_timing_safe() for all password hash comparisons.
It's unlikely these could be used to perform timing attacks, since the
attacker would have to have broken MD5/SHA badly enough to be able to
quickly generate string that result in wanted hashes. Still, the extra
cost is almost nothing and it's always better to be super paranoid! |