As detailed in the paper "Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure" https://eprint.iacr.org/2018/747