Pro@programming.dev to Programming@programming.devEnglish · 21 hours agoCursed knowledge we have learned as a result of building Immich that we wish we never knew.immich.appexternal-linkmessage-square35fedilinkarrow-up194arrow-down11
arrow-up193arrow-down1external-linkCursed knowledge we have learned as a result of building Immich that we wish we never knew.immich.appPro@programming.dev to Programming@programming.devEnglish · 21 hours agomessage-square35fedilink
minus-squarePhen@lemmy.eco.brlinkfedilinkarrow-up3·15 hours agoImagine getting a multi byte character at the right position to get it split so that one byte gets in and the other doesn’t.
minus-squareMaestro@fedia.iolinkfedilinkarrow-up4·12 hours agoIt doesn’t matter. That will happen for both the stored hash and the entered password, so it still matches.
minus-squarePhen@lemmy.eco.brlinkfedilinkarrow-up1·2 hours agoAs long as it runs the same code, yes. But things may change, clients may pre-emptively split the string or stuff like that.
Imagine getting a multi byte character at the right position to get it split so that one byte gets in and the other doesn’t.
It doesn’t matter. That will happen for both the stored hash and the entered password, so it still matches.
As long as it runs the same code, yes. But things may change, clients may pre-emptively split the string or stuff like that.