mirror of
https://git.proxmox.com/git/proxmox
synced 2025-12-25 21:42:20 +00:00
by using openssl's `memcmp::eq()` we can avoid potential side-channel attack on the csrf token comparison. this comparison's runtime only depends on the length of the two byte vectors, not their contents. Signed-off-by: Stefan Sterz <s.sterz@proxmox.com> |
||
|---|---|---|
| .. | ||
| debian | ||
| examples | ||
| src | ||
| Cargo.toml | ||