The implementation has different (perhaps: less luxurious) behavior: both username and password must now be set (and must be correct) for checkAuth to succeed; on authentication failure, the attempted username is no longer logged.
In exchange, the implementation is slightly shorter.
The implementation has different (perhaps: less luxurious) behavior: both username and password must now be set (and must be correct) for
checkAuth
to succeed; on authentication failure, the attempted username is no longer logged.In exchange, the implementation is slightly shorter.