The provided information describes a timing attack vulnerability caused by insufficiently randomized execution time in authentication logic. However, no specific code snippets, commit diffs, or file paths are provided in the advisory or references. While the vulnerability stems from non-constant-time authentication handling (likely in user existence checks or password verification), the lack of concrete implementation details makes it impossible to identify exact function names and their file paths with high confidence. The fix introduces a 'constant_auth_time' parameter, suggesting the original vulnerability resided in time-sensitive authentication logic, but without code context, we cannot definitively map this to specific functions.