false immediately if the arrays have different lengths,
which leaks length information through timing. For cryptographic MAC verification where even the length should be hidden, compare after hashing both values to a fixed length (e.g., using HMAC).
Parameters
a | The first byte array. |
b | The second byte array. |
Returns
true if the arrays are identical, false otherwise.