forked from proxmox-mirrors/proxmox
![]() by using openssl's `memcmp::eq()` we can avoid potential side-channel attack on the csrf token comparison. this comparison's runtime only depends on the length of the two byte vectors, not their contents. Signed-off-by: Stefan Sterz <s.sterz@proxmox.com> |
||
---|---|---|
.. | ||
debian | ||
examples | ||
src | ||
Cargo.toml |