forked from proxmox-mirrors/proxmox
		
	
				by using openssl's `memcmp::eq()` we can avoid potential side-channel attack on the csrf token comparison. this comparison's runtime only depends on the length of the two byte vectors, not their contents. Signed-off-by: Stefan Sterz <s.sterz@proxmox.com>  | 
			||
|---|---|---|
| .. | ||
| debian | ||
| examples | ||
| src | ||
| Cargo.toml | ||