-
Task
-
Resolution: Done
-
Major
-
None
-
None
There are 2 places in UnixSHACryptPasswordImpl where Arrays#equals is currently used.
Arrays#equals is vulnerable to timing attacks because it uses a non time-constant comparison.
MessageDigest#isEqual uses a time-constant comparison which means that all bytes in the arrays will be compared.
Update UnixSHACryptPasswordImpl so that it uses the MessageDigest#isEqual method instead of Arrays#equals.