Giters
rustls
/
rustls
A modern TLS library in Rust
Geek Repo:
Geek Repo
Github PK Tool:
Github PK Tool
Stargazers:
5618
Watchers:
86
Issues:
751
Forks:
595
rustls/rustls Issues
from_subject_spki_name_constraints on rustls 0.23.9
Closed
in 5 hours
Comments count
7
Dependency Dashboard
Updated
19 hours ago
Reqwest Connection reset by peer, on a Microsoft-IIS/10.0
Closed
2 days ago
Comments count
5
X25519 might not be FIPS compliant for use in key exchange
Closed
6 days ago
Comments count
1
Poll-based encrypt/decrypt/sign API support in asynchronous and synchronous call
Updated
8 days ago
Comments count
7
Suggest registering for OpenSSF Best Practices badge
Closed
10 days ago
Comments count
9
Server-side Encrypted Client Hello (ECH) support
Updated
13 days ago
Rustls w/ aws-lc-rs on Windows requires NASM
Updated
13 days ago
Comments count
33
Compile error when target is watchos
Closed
2 months ago
Comments count
6
`UnknownIssuer` with self-signed certificate
Closed
17 days ago
Comments count
2
Ensuring that a provider based on the one built-in is used
Updated
18 days ago
Comments count
8
build failure due to aws-lc-sys v0.16.0
Closed
21 days ago
Comments count
1
Unbuffered process_tls_records does not mach usage scenario
Updated
24 days ago
Comments count
2
Clean up crate feature naming
Updated
24 days ago
UnbufferedConnectionState
Closed
25 days ago
Comments count
2
How I use CryptoProvider::install_default() ?
Closed
a month ago
Comments count
3
Build rustls v0.23.5 with musl
Closed
25 days ago
Comments count
2
Making impl ClientHelloPayload public ?
Closed
a month ago
Comments count
21
Expose ability to customize ClientHello message
Updated
a month ago
Comments count
4
Feature Request: Avoid panicking when ring and aws_lc_rs are both specified
Updated
a month ago
Comments count
19
Add RustCrypto cryptographic backend
Closed
a month ago
Comments count
5
Error: badRecordMac
Closed
a month ago
Comments count
4
Verify that SigningKey matches public key within certificate
Updated
a month ago
Comments count
6
Illegal instruction on arm-a72
Closed
a month ago
Comments count
3
AWS LC fails against golang TLS server while ring works fine
Closed
a month ago
Comments count
6
GHSA-6g7w-8wpp-frhj and CVE-2024-32650 don't make it clear that async rustls servers aren't susceptible
Closed
2 months ago
Comments count
2
Question. Does rustls have something to hide cert (as it is sensitive data ) in binary and memory
Closed
2 months ago
Comments count
3
Pass ClientHello by reference to ResolvesServerCert
Updated
2 months ago
Comments count
2
Side-Channel Attack Mitigations in Rustls
Closed
2 months ago
Comments count
2
unbuffered: After `Closed` no `WriteTraffic` state arrives
Updated
2 months ago
Comments count
4
Linux compilation is slow and seems unable to store compilation results
Closed
2 months ago
Comments count
3
Incompatible License
Closed
2 months ago
Comments count
1
Option to Relax SNI Host Name Validation for IP Addresses
Closed
2 months ago
Comments count
7
Io(Custom { kind: InvalidData, error: AlertReceived(HandshakeFailure) })
Closed
2 months ago
Comments count
6
unbuffered: B: `CapacityBuffer` for `output_tls.capacity()`
Updated
2 months ago
Comments count
9
The support for "mipsel-unknown-linux-musl" has failed.
Closed
2 months ago
Comments count
2
Feature request: a way to set/get default ticketer dynamically
Updated
3 months ago
Comments count
6
US Export control information
Closed
3 months ago
Comments count
4
Support using rustls without using specific ring or aws-lc-rs apis
Closed
3 months ago
Comments count
2
doc: AcceptedAlert::write doesn't necessarily write all bytes
Closed
3 months ago
Comments count
7
No common ciphersuit when FFDHE and ECDHE ciphersuites are available on server and client using TLS 1.2
Closed
3 months ago
Comments count
4
expose more information in ClientHello
Closed
3 months ago
Comments count
4
rand_core::RngCore & CryptoRng support for CryptoProvider
Closed
3 months ago
Comments count
7
optimize receiving data with TLS 1.2 and aes-128-gcm
Updated
3 months ago
Comments count
1
Cipher suites configured through WebPkiServerVerifier::builder_with_provider is not working. Client hello contains more cipher suites then it configured.
Closed
3 months ago
Comments count
6
Connection::dangerous_extract_secrets returns ConnectionTrafficSecrets::Aes128Gcm even when AES-256-GCM is negotiated
Closed
3 months ago
0.23 docs build is broken
Closed
3 months ago
Comments count
2
optimize server-side full handshakes for TLS 1.2 and 1.3
Updated
3 months ago
Comments count
1
optimize receiving data with TLS 1.3 and aes-256-gcm
Updated
3 months ago
Profile-Guided Optimization (PGO) benchmark results
Updated
3 months ago
Previous
Next