Use a constant time algorithm to compare signature strings.

This guards against timing attacks of the class outlined
in http://codahale.com/a-lesson-in-timing-attacks/
1 file changed
tree: ebf706d1c25b461673e1cf6a382fb0bb8e50a8fb
  1. ebin/
  2. src/
  3. Emakefile
  4. License.txt
  5. Makefile
  6. README.txt
  7. THANKS.txt