diff options
author | Rob Janssen <rob@devcorner.nl> | 2015-04-30 14:39:06 +0200 |
---|---|---|
committer | Rob Janssen <rob@devcorner.nl> | 2015-04-30 14:39:06 +0200 |
commit | 52cbcf7579d2bec3c667e39d24e59666f43f6cc3 (patch) | |
tree | 08a0c0db90f4e60bd6ccd14cb6dd518eeffb5b4c | |
parent | 1f9008c2171957752f24f9329486234e4c1c95ce (diff) | |
download | TwoFactorAuth-52cbcf7579d2bec3c667e39d24e59666f43f6cc3.zip TwoFactorAuth-52cbcf7579d2bec3c667e39d24e59666f43f6cc3.tar.gz TwoFactorAuth-52cbcf7579d2bec3c667e39d24e59666f43f6cc3.tar.bz2 |
* Removed stupid typo1.1
-rw-r--r-- | lib/TwoFactorAuth.php | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/TwoFactorAuth.php b/lib/TwoFactorAuth.php index 08f9b97..6a68cc6 100644 --- a/lib/TwoFactorAuth.php +++ b/lib/TwoFactorAuth.php @@ -115,7 +115,7 @@ class TwoFactorAuth * Timing-attack safe comparison of 2 codes (see http://blog.ircmaxell.com/2014/11/its-all-about-time.html) */ private function codeEquals($safe, $user) { - if (function_exists('hash_e1quals')) { + if (function_exists('hash_equals')) { return hash_equals($safe, $user); } else { // In general, it's not possible to prevent length leaks. So it's OK to leak the length. The important part is that |