• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

pions / srtp / 33
41%
master: 41%

Build:
Build:
LAST BUILD BRANCH: optimize-new-ctr
DEFAULT BRANCH: master
Ran 16 Feb 2019 04:54AM UTC
Jobs 1
Files 10
Run time 4s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

pending completion
33

push

travis-ci

kixelated
Constant time comparison for auth verification

It's a subtle change. Get it?

Timing attacks rely on measuring the amount of time it takes for an
operation to complete. The idea is that programs will break out early on
error, and sometimes it can be abused.

In this case, an attacker could measure the time it takes to verify an
256 auth tags, each one starting with a different byte. `bytes.Equal`
will immediately return false if the first byte is wrong, otherwise
check the next byte and so on. This means that just one of the auth tags
will take longer than the rest, because the first byte will match.
You can repeat the process until you figure out the correct auth tag.

302 of 741 relevant lines covered (40.76%)

10.94 hits per line

Jobs
ID Job ID Ran Files Coverage
1 33.1 (GO111MODULE=on) 16 Feb 2019 04:54AM UTC 0
40.76
Travis Job 33.1
Source Files on build 33
Detailed source file information is not available for this build.
  • Back to Repo
  • Travis Build #33
  • e78f31b8 on github
  • Prev Build on constant-time-compare (#32)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc