Coda Hale 5e6dab8b34 Fix timing attack vulnerability in ActiveSupport::MessageVerifier.
Use a constant-time comparison algorithm to compare the candidate HMAC with the calculated HMAC to prevent leaking information about the calculated HMAC.

Signed-off-by: Michael Koziarski <michael@koziarski.com>
2009-09-04 09:25:38 +12:00
2008-06-22 10:38:25 -07:00
2009-09-03 11:18:57 -07:00
2009-08-11 23:44:44 -07:00
Description
No description provided
85 MiB
Languages
Ruby 97.9%
CSS 1.5%
HTML 0.5%