222
schangxiang@126.com
2025-06-13 6a8393408d8cefcea02b7a598967de8dc1e565c2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
# scmp
[![travis][travis-image]][travis-url]
[![npm][npm-image]][npm-url]
[![downloads][downloads-image]][downloads-url]
 
[travis-image]: https://travis-ci.org/freewil/scmp.svg?branch=master
[travis-url]: https://travis-ci.org/freewil/scmp
 
[npm-image]: https://img.shields.io/npm/v/scmp.svg?style=flat
[npm-url]: https://npmjs.org/package/scmp
 
[downloads-image]: https://img.shields.io/npm/dm/scmp.svg?style=flat
[downloads-url]: https://npmjs.org/package/scmp
 
Safe, constant-time comparison of Buffers.
 
## Changes in v2.x
Since scmp 2.x, Buffers are now required to be passed as arguments. In 1.x,
the arguments were assumed to be strings, and were always run through `String()`.
 
Also, there is a new `crypto.timingSafeEqual()` since Node v6.6.0. If this function
is available, then that will be used, otherwise a scmp-internal implementation
will be used.
 
## Install
 
```
npm install scmp
```
 
## Why?
 
To minimize vulnerability against [timing attacks](http://codahale.com/a-lesson-in-timing-attacks/).
 
## Example
 
```js
const scmp = require('scmp');
const Buffer = require('safe-buffer').Buffer;
 
const hash      = Buffer.from('e727d1464ae12436e899a726da5b2f11d8381b26', 'hex');
const givenHash = Buffer.from('e727e1b80e448a213b392049888111e1779a52db', 'hex');
 
if (scmp(hash, givenHash)) {
  console.log('good hash');
} else {
  console.log('bad hash');
}
 
```