Markus Mäkelä cb8b4546cb
Don't use client SHA1 for fake responses
When a fake handshake response is generated for a connection that hasn't
received the server's handshake, the client's SHA1 would be used with a
static scramble. This, in theory, would weaken the authentication to some
extend so to completely prevent this, a null password is used. This
removes any possibility of the password being exposed.
2020-06-02 10:17:40 +03:00
..
2018-09-10 13:22:49 +03:00
2020-04-23 14:23:57 +03:00
2017-01-16 10:56:33 +02:00