An open API service for providing issue and pull request metadata for open source projects.

GitHub / rustls/rustls issues and pull requests

#153 - Print ASCII characters as is when displaying certificate

Pull Request - State: closed - Opened by stepancheg over 7 years ago - 2 comments

#152 - Specify TLS Version

Issue - State: closed - Opened by David-Rumley over 7 years ago - 3 comments

#151 - Stateless handshake support

Issue - State: closed - Opened by Ralith over 7 years ago - 1 comment

#150 - Is it possible to use pkcs12 for client authentication?

Issue - State: closed - Opened by opensourcegeek over 7 years ago - 2 comments

#149 - BadRecordMac when using AES-GCM on ARMv7 (RPi3)

Issue - State: closed - Opened by PAStheLoD over 7 years ago - 18 comments

#148 - ECC PrivateKey support for ServerConfig?

Issue - State: closed - Opened by rrichardson over 7 years ago - 4 comments

#147 - "signing failed" when using client certificate authentication

Issue - State: closed - Opened by ian-p-cooke over 7 years ago - 3 comments

#146 - Add "dangerous" option to disable hostname verification

Pull Request - State: closed - Opened by gh2o over 7 years ago - 2 comments

#145 - rustls does not compile (neigher from master, not from crates)

Issue - State: closed - Opened by stepancheg over 7 years ago - 2 comments

#144 - Make hostname argument optional

Pull Request - State: closed - Opened by gh2o over 7 years ago - 3 comments

#143 - Connecting to server with self-signed certificate

Issue - State: closed - Opened by wrell over 7 years ago - 6 comments

#142 - bump base64 dependency to 0.9

Pull Request - State: closed - Opened by alex over 7 years ago - 1 comment

#141 - TLS1.3 draft 22

Pull Request - State: closed - Opened by ctz over 7 years ago - 6 comments

#140 - helper methods for certificate management

Issue - State: closed - Opened by Geal over 7 years ago - 2 comments

#139 - Add Session::get_negotiated_ciphersuite()

Pull Request - State: closed - Opened by ymjing over 7 years ago - 2 comments

#138 - Build examples on CI

Issue - State: closed - Opened by johnthagen over 7 years ago - 1 comment

#137 - Verify handshake state machine

Issue - State: open - Opened by ctz over 7 years ago - 2 comments

#136 - bump base64 dependency to 0.8

Pull Request - State: closed - Opened by alex over 7 years ago - 2 comments

#135 - Document SAN requirement on certs

Pull Request - State: closed - Opened by sanmai-NL over 7 years ago - 1 comment

#134 - Review whether PR #96 correctly stores SNI in the session state for TLS 1.3

Issue - State: closed - Opened by briansmith over 7 years ago - 1 comment

#133 - Maybe the SNI value shouldn't be stored as part of the session state

Issue - State: open - Opened by briansmith over 7 years ago - 2 comments

#132 - Document SAN requirement on certs

Pull Request - State: closed - Opened by sanmai-NL over 7 years ago

#131 - Add debug log when certificate does not match SNI

Pull Request - State: closed - Opened by matthauck over 7 years ago - 1 comment

#130 - Ignore SNI values entirely when using set_single_cert

Issue - State: closed - Opened by matthauck over 7 years ago - 9 comments

#129 - v0.11.0: Failure to establish connections given custom cert chain

Issue - State: closed - Opened by sanmai-NL over 7 years ago - 4 comments

#128 - Fix a typo

Pull Request - State: closed - Opened by quininer over 7 years ago - 1 comment

#127 - Handshake fails with BadDER

Issue - State: closed - Opened by P-E-Meunier almost 8 years ago - 25 comments

#126 - Don't verify SNI names match the certificate on the server side

Pull Request - State: closed - Opened by bvinc almost 8 years ago - 4 comments

#125 - Add support for disabling SNI

Pull Request - State: closed - Opened by bvinc almost 8 years ago - 1 comment

#124 - Is it possible to use self-signed certs?

Issue - State: closed - Opened by wafflespeanut almost 8 years ago - 8 comments

#123 - Can SNI be disabled on a client or ignored on the server?

Issue - State: closed - Opened by bvinc almost 8 years ago - 7 comments

#122 - bump base64 to 0.7

Pull Request - State: closed - Opened by alex almost 8 years ago - 1 comment

#121 - Lower logging priority

Pull Request - State: closed - Opened by crawford almost 8 years ago

#120 - Avoid else after return.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 1 comment

#119 - Use safer type ascription workaround in bogo_shim.rs.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 1 comment

#118 - Remove obsolete comment about validating DNS name syntax.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 1 comment

#117 - Use *ring* 0.12.1's Eq implementation for digest::Algorithm.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 1 comment

#116 - Expose OCSP response as &[u8], not &Vec<u8>.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 2 comments

#115 - ALPN API is defined in terms of UTF-8 strings, but ALPN isn't necessarily UTF-8.

Issue - State: closed - Opened by briansmith almost 8 years ago - 4 comments

#114 - Avoid cloning ALPN protocol in `get_alpn_protocol()`.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 2 comments

#113 - Avoid cloning peer cert. chain in `get_peer_certificates()`.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 2 comments

#112 - Split and rename WebPKIClientAuth.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 1 comment

#111 - Validate client certificates using the id-kp-clientAuth EKU.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 2 comments

#110 - More flexible and safer client authentication API.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 2 comments

#109 - Support SIDH key exchange

Issue - State: closed - Opened by valarauca almost 8 years ago - 6 comments

#108 - Take the DNS hostname as a webpki::DNSNameRef in ClientSession.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 4 comments

#107 - Give the certificate resolver a webpki::DNSNameRef.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 3 comments

#106 - Use webpki 0.18 to validate SNI hostname before cert selection.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 2 comments

#105 - Lower handshake log level

Issue - State: closed - Opened by pjhades almost 8 years ago - 1 comment

#103 - Avoid "error: non-scalar cast: `T` as `f64`" errors in bench example.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 4 comments

#102 - Server rejects malformed SNI extension with the wrong alert

Issue - State: closed - Opened by briansmith almost 8 years ago - 1 comment

#100 - Some badssl tests fail on Windows (-msvc)

Issue - State: closed - Opened by briansmith almost 8 years ago - 1 comment

#99 - 0.11.0: Update dependencies.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 1 comment

#98 - Webpki no matching version in crates.io

Issue - State: closed - Opened by TheCynosure almost 8 years ago - 4 comments

#97 - client: make ClientSessionImpl Sync-compatible

Pull Request - State: closed - Opened by Keruspe almost 8 years ago - 4 comments

#96 - Add SNI to server session & expose it to the application.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 6 comments

#94 - Use `ok_or_else()` in server-side certificate resolution.

Pull Request - State: closed - Opened by briansmith almost 8 years ago - 2 comments

#93 - Support for encrypted private keys

Issue - State: closed - Opened by JanBerktold almost 8 years ago - 2 comments

#92 - Update docopt to 0.8.

Pull Request - State: closed - Opened by moderation almost 8 years ago - 2 comments

#91 - `complete_io` does not appear to send error alerts

Issue - State: closed - Opened by univerio about 8 years ago - 1 comment

#90 - tlsserver example not working on OCSP commits

Issue - State: closed - Opened by moderation about 8 years ago - 2 comments

#89 - Asynchronous/tokio ResolvesServerCert?

Issue - State: closed - Opened by alex about 8 years ago - 42 comments

#87 - Fix Session::complete_io eof cause infinite loop

Pull Request - State: closed - Opened by quininer about 8 years ago - 4 comments

#86 - Bump ring to 0.11

Issue - State: closed - Opened by SergioBenitez about 8 years ago - 1 comment

#85 - Use deque to avoid shifting entire vector

Pull Request - State: closed - Opened by sevagh about 8 years ago - 3 comments

#84 - 0-RTT ticket usage in TLSv1.3 maybe insecure

Issue - State: closed - Opened by valarauca about 8 years ago - 1 comment

#83 - Typo in PrivateKey doc

Pull Request - State: closed - Opened by stepancheg about 8 years ago - 2 comments

#82 - Tests should dump and validate TLS traces

Issue - State: open - Opened by nbraud about 8 years ago

#81 - Protocol state should use a typed representation

Issue - State: closed - Opened by nbraud about 8 years ago - 4 comments

#80 - Document formats of Certiciate and PrivateKey

Pull Request - State: closed - Opened by stepancheg about 8 years ago - 2 comments

#79 - Cleaned up enums.rs

Pull Request - State: closed - Opened by valarauca about 8 years ago - 2 comments

#78 - impl Clone for ClientConfig

Pull Request - State: closed - Opened by stepancheg about 8 years ago - 7 comments

#77 - How to complete handshake?

Issue - State: closed - Opened by stepancheg about 8 years ago - 5 comments

#76 - Dummy Debug implemnetation for ClientSession and ServerSession

Pull Request - State: closed - Opened by stepancheg about 8 years ago - 2 comments

#75 - Provide socket-like API

Issue - State: closed - Opened by stepancheg about 8 years ago - 2 comments

#74 - RSASigner chokes on a valid private key

Issue - State: closed - Opened by nicklan about 8 years ago - 11 comments

#73 - Support for SCT TLS extension

Issue - State: closed - Opened by alex about 8 years ago - 2 comments

#72 - Malformed Server Hello / BadDER

Issue - State: closed - Opened by maufl about 8 years ago - 5 comments

#71 - Update Google certificate

Pull Request - State: closed - Opened by pantsman0 about 8 years ago - 2 comments

#70 - Add dangerous_configuration feature

Pull Request - State: closed - Opened by ctz about 8 years ago - 3 comments

#69 - Fixes #68 -- first attempt at an API for disable client certificate verification

Pull Request - State: closed - Opened by alex about 8 years ago - 5 comments

#68 - Disable cert verification for client certs?

Issue - State: closed - Opened by alex about 8 years ago - 3 comments

#67 - Update dependencies to work with *ring* 0.9.

Pull Request - State: closed - Opened by briansmith about 8 years ago - 1 comment

#66 - Sever dying with assertion failure in RSA signature

Issue - State: closed - Opened by alex about 8 years ago - 7 comments

#65 - base64 vulnerability (RUSTSEC-2017-0004)

Issue - State: closed - Opened by oherrala about 8 years ago - 1 comment

#64 - Allows disabling of hostname verification.

Pull Request - State: closed - Opened by nicklan about 8 years ago - 3 comments

#63 - TLS1.3 draft 20

Pull Request - State: closed - Opened by ctz over 8 years ago - 2 comments

#62 - Ciphers supported for TLS1.2

Issue - State: closed - Opened by ayoshi over 8 years ago - 1 comment

#61 - Verify client certs with correct EKU

Pull Request - State: closed - Opened by ctz over 8 years ago - 1 comment

#59 - TLS1.3 draft 19

Pull Request - State: closed - Opened by ctz over 8 years ago - 3 comments

#58 - WIP: DTLS Support

Pull Request - State: closed - Opened by manuels over 8 years ago - 6 comments

#57 - Can't compile with Rust 1.17

Issue - State: closed - Opened by e-oz over 8 years ago - 3 comments

#56 - Fails to build with newest nightly (2017-03-15)

Issue - State: closed - Opened by jackpot51 over 8 years ago - 2 comments

#54 - BorrowMessage

Issue - State: closed - Opened by manuels over 8 years ago - 2 comments