• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

pions / srtp / 35 / 1
41%
master: 41%

Build:
Build:
LAST BUILD BRANCH: optimize-new-ctr
DEFAULT BRANCH: master
Ran 16 Feb 2019 05:06AM UTC
Files 10
Run time 1s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

16 Feb 2019 04:51AM UTC coverage: 40.756%. Remained the same
GO111MODULE=on

Pull #7

travis-ci

web-flow
Constant time comparison for auth verification

It's a subtle change. Get it?

Timing attacks rely on measuring the amount of time it takes for an
operation to complete. The idea is that programs will break out early on
error, and sometimes it can be abused.

In this case, an attacker could measure the time it takes to verify an
256 auth tags, each one starting with a different byte. `bytes.Equal`
will immediately return false if the first byte is wrong, otherwise
check the next byte and so on. This means that just one of the auth tags
will take longer than the rest, because the first byte will match.
You can repeat the process until you figure out the correct auth tag.
Pull Request #7: Use constant time comparison for auth verification

302 of 741 relevant lines covered (40.76%)

10.94 hits per line

Source Files on job 35.1 (GO111MODULE=on)
  • Tree
  • List 0
  • Changed 1
  • Source Changed 1
  • Coverage Changed 1
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 30
  • Travis Job 35.1
  • 7a3d2d81 on github
  • Prev Job for GO111MODULE=on on constant-time-compare (#27.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc