mirror of
https://git.proxmox.com/git/proxmox
synced 2025-06-14 00:04:55 +00:00
![]() by using openssl's `memcmp::eq()` we can avoid potential side-channel attack on the csrf token comparison. this comparison's runtime only depends on the length of the two byte vectors, not their contents. Signed-off-by: Stefan Sterz <s.sterz@proxmox.com> |
||
---|---|---|
.. | ||
debian | ||
examples | ||
src | ||
Cargo.toml |