GitHub / rustls/rustls issues and pull requests
#153 - Print ASCII characters as is when displaying certificate
Pull Request -
State: closed - Opened by stepancheg over 7 years ago
- 2 comments
#152 - Specify TLS Version
Issue -
State: closed - Opened by David-Rumley over 7 years ago
- 3 comments
#151 - Stateless handshake support
Issue -
State: closed - Opened by Ralith over 7 years ago
- 1 comment
#150 - Is it possible to use pkcs12 for client authentication?
Issue -
State: closed - Opened by opensourcegeek over 7 years ago
- 2 comments
#149 - BadRecordMac when using AES-GCM on ARMv7 (RPi3)
Issue -
State: closed - Opened by PAStheLoD over 7 years ago
- 18 comments
#148 - ECC PrivateKey support for ServerConfig?
Issue -
State: closed - Opened by rrichardson over 7 years ago
- 4 comments
#147 - "signing failed" when using client certificate authentication
Issue -
State: closed - Opened by ian-p-cooke over 7 years ago
- 3 comments
#146 - Add "dangerous" option to disable hostname verification
Pull Request -
State: closed - Opened by gh2o over 7 years ago
- 2 comments
#145 - rustls does not compile (neigher from master, not from crates)
Issue -
State: closed - Opened by stepancheg over 7 years ago
- 2 comments
#144 - Make hostname argument optional
Pull Request -
State: closed - Opened by gh2o over 7 years ago
- 3 comments
#143 - Connecting to server with self-signed certificate
Issue -
State: closed - Opened by wrell over 7 years ago
- 6 comments
#142 - bump base64 dependency to 0.9
Pull Request -
State: closed - Opened by alex over 7 years ago
- 1 comment
#141 - TLS1.3 draft 22
Pull Request -
State: closed - Opened by ctz over 7 years ago
- 6 comments
#140 - helper methods for certificate management
Issue -
State: closed - Opened by Geal over 7 years ago
- 2 comments
#139 - Add Session::get_negotiated_ciphersuite()
Pull Request -
State: closed - Opened by ymjing over 7 years ago
- 2 comments
#138 - Build examples on CI
Issue -
State: closed - Opened by johnthagen over 7 years ago
- 1 comment
#137 - Verify handshake state machine
Issue -
State: open - Opened by ctz over 7 years ago
- 2 comments
#136 - bump base64 dependency to 0.8
Pull Request -
State: closed - Opened by alex over 7 years ago
- 2 comments
#135 - Document SAN requirement on certs
Pull Request -
State: closed - Opened by sanmai-NL over 7 years ago
- 1 comment
#134 - Review whether PR #96 correctly stores SNI in the session state for TLS 1.3
Issue -
State: closed - Opened by briansmith over 7 years ago
- 1 comment
#133 - Maybe the SNI value shouldn't be stored as part of the session state
Issue -
State: open - Opened by briansmith over 7 years ago
- 2 comments
#132 - Document SAN requirement on certs
Pull Request -
State: closed - Opened by sanmai-NL over 7 years ago
#131 - Add debug log when certificate does not match SNI
Pull Request -
State: closed - Opened by matthauck over 7 years ago
- 1 comment
#130 - Ignore SNI values entirely when using set_single_cert
Issue -
State: closed - Opened by matthauck over 7 years ago
- 9 comments
#129 - v0.11.0: Failure to establish connections given custom cert chain
Issue -
State: closed - Opened by sanmai-NL over 7 years ago
- 4 comments
#128 - Fix a typo
Pull Request -
State: closed - Opened by quininer over 7 years ago
- 1 comment
#127 - Handshake fails with BadDER
Issue -
State: closed - Opened by P-E-Meunier almost 8 years ago
- 25 comments
#126 - Don't verify SNI names match the certificate on the server side
Pull Request -
State: closed - Opened by bvinc almost 8 years ago
- 4 comments
#125 - Add support for disabling SNI
Pull Request -
State: closed - Opened by bvinc almost 8 years ago
- 1 comment
#124 - Is it possible to use self-signed certs?
Issue -
State: closed - Opened by wafflespeanut almost 8 years ago
- 8 comments
#123 - Can SNI be disabled on a client or ignored on the server?
Issue -
State: closed - Opened by bvinc almost 8 years ago
- 7 comments
#122 - bump base64 to 0.7
Pull Request -
State: closed - Opened by alex almost 8 years ago
- 1 comment
#121 - Lower logging priority
Pull Request -
State: closed - Opened by crawford almost 8 years ago
#120 - Avoid else after return.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#119 - Use safer type ascription workaround in bogo_shim.rs.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#118 - Remove obsolete comment about validating DNS name syntax.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#117 - Use *ring* 0.12.1's Eq implementation for digest::Algorithm.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#116 - Expose OCSP response as &[u8], not &Vec<u8>.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 2 comments
#115 - ALPN API is defined in terms of UTF-8 strings, but ALPN isn't necessarily UTF-8.
Issue -
State: closed - Opened by briansmith almost 8 years ago
- 4 comments
#114 - Avoid cloning ALPN protocol in `get_alpn_protocol()`.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 2 comments
#113 - Avoid cloning peer cert. chain in `get_peer_certificates()`.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 2 comments
#112 - Split and rename WebPKIClientAuth.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#111 - Validate client certificates using the id-kp-clientAuth EKU.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 2 comments
#110 - More flexible and safer client authentication API.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 2 comments
#109 - Support SIDH key exchange
Issue -
State: closed - Opened by valarauca almost 8 years ago
- 6 comments
#108 - Take the DNS hostname as a webpki::DNSNameRef in ClientSession.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 4 comments
#107 - Give the certificate resolver a webpki::DNSNameRef.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 3 comments
#106 - Use webpki 0.18 to validate SNI hostname before cert selection.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 2 comments
#105 - Lower handshake log level
Issue -
State: closed - Opened by pjhades almost 8 years ago
- 1 comment
#104 - Server does not reject client hello SNI extension containing multiple hostnames
Issue -
State: closed - Opened by briansmith almost 8 years ago
#103 - Avoid "error: non-scalar cast: `T` as `f64`" errors in bench example.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 4 comments
#102 - Server rejects malformed SNI extension with the wrong alert
Issue -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#101 - Invalid SNI extension generated in client hello when caller does not pass in a valid DNS name
Issue -
State: closed - Opened by briansmith almost 8 years ago
- 2 comments
#100 - Some badssl tests fail on Windows (-msvc)
Issue -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#99 - 0.11.0: Update dependencies.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#98 - Webpki no matching version in crates.io
Issue -
State: closed - Opened by TheCynosure almost 8 years ago
- 4 comments
#97 - client: make ClientSessionImpl Sync-compatible
Pull Request -
State: closed - Opened by Keruspe almost 8 years ago
- 4 comments
#96 - Add SNI to server session & expose it to the application.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 6 comments
#95 - Validate that the resolved certificate is valid for the given SNI name in the server
Issue -
State: closed - Opened by briansmith almost 8 years ago
- 1 comment
#94 - Use `ok_or_else()` in server-side certificate resolution.
Pull Request -
State: closed - Opened by briansmith almost 8 years ago
- 2 comments
#93 - Support for encrypted private keys
Issue -
State: closed - Opened by JanBerktold almost 8 years ago
- 2 comments
#92 - Update docopt to 0.8.
Pull Request -
State: closed - Opened by moderation almost 8 years ago
- 2 comments
#91 - `complete_io` does not appear to send error alerts
Issue -
State: closed - Opened by univerio about 8 years ago
- 1 comment
#90 - tlsserver example not working on OCSP commits
Issue -
State: closed - Opened by moderation about 8 years ago
- 2 comments
#89 - Asynchronous/tokio ResolvesServerCert?
Issue -
State: closed - Opened by alex about 8 years ago
- 42 comments
#88 - rustls chooses "ECDSA_NISTP256_SHA256" as the signature scheme, but is unable to sign messages that way
Issue -
State: closed - Opened by wfraser about 8 years ago
- 4 comments
#87 - Fix Session::complete_io eof cause infinite loop
Pull Request -
State: closed - Opened by quininer about 8 years ago
- 4 comments
#86 - Bump ring to 0.11
Issue -
State: closed - Opened by SergioBenitez about 8 years ago
- 1 comment
#85 - Use deque to avoid shifting entire vector
Pull Request -
State: closed - Opened by sevagh about 8 years ago
- 3 comments
#84 - 0-RTT ticket usage in TLSv1.3 maybe insecure
Issue -
State: closed - Opened by valarauca about 8 years ago
- 1 comment
#83 - Typo in PrivateKey doc
Pull Request -
State: closed - Opened by stepancheg about 8 years ago
- 2 comments
#82 - Tests should dump and validate TLS traces
Issue -
State: open - Opened by nbraud about 8 years ago
#81 - Protocol state should use a typed representation
Issue -
State: closed - Opened by nbraud about 8 years ago
- 4 comments
#80 - Document formats of Certiciate and PrivateKey
Pull Request -
State: closed - Opened by stepancheg about 8 years ago
- 2 comments
#79 - Cleaned up enums.rs
Pull Request -
State: closed - Opened by valarauca about 8 years ago
- 2 comments
#78 - impl Clone for ClientConfig
Pull Request -
State: closed - Opened by stepancheg about 8 years ago
- 7 comments
#77 - How to complete handshake?
Issue -
State: closed - Opened by stepancheg about 8 years ago
- 5 comments
#76 - Dummy Debug implemnetation for ClientSession and ServerSession
Pull Request -
State: closed - Opened by stepancheg about 8 years ago
- 2 comments
#75 - Provide socket-like API
Issue -
State: closed - Opened by stepancheg about 8 years ago
- 2 comments
#74 - RSASigner chokes on a valid private key
Issue -
State: closed - Opened by nicklan about 8 years ago
- 11 comments
#73 - Support for SCT TLS extension
Issue -
State: closed - Opened by alex about 8 years ago
- 2 comments
#72 - Malformed Server Hello / BadDER
Issue -
State: closed - Opened by maufl about 8 years ago
- 5 comments
#71 - Update Google certificate
Pull Request -
State: closed - Opened by pantsman0 about 8 years ago
- 2 comments
#70 - Add dangerous_configuration feature
Pull Request -
State: closed - Opened by ctz about 8 years ago
- 3 comments
#69 - Fixes #68 -- first attempt at an API for disable client certificate verification
Pull Request -
State: closed - Opened by alex about 8 years ago
- 5 comments
#68 - Disable cert verification for client certs?
Issue -
State: closed - Opened by alex about 8 years ago
- 3 comments
#67 - Update dependencies to work with *ring* 0.9.
Pull Request -
State: closed - Opened by briansmith about 8 years ago
- 1 comment
#66 - Sever dying with assertion failure in RSA signature
Issue -
State: closed - Opened by alex about 8 years ago
- 7 comments
#65 - base64 vulnerability (RUSTSEC-2017-0004)
Issue -
State: closed - Opened by oherrala about 8 years ago
- 1 comment
#64 - Allows disabling of hostname verification.
Pull Request -
State: closed - Opened by nicklan about 8 years ago
- 3 comments
#63 - TLS1.3 draft 20
Pull Request -
State: closed - Opened by ctz over 8 years ago
- 2 comments
#62 - Ciphers supported for TLS1.2
Issue -
State: closed - Opened by ayoshi over 8 years ago
- 1 comment
#61 - Verify client certs with correct EKU
Pull Request -
State: closed - Opened by ctz over 8 years ago
- 1 comment
#60 - Client authentication is expecting `id-kp-serverAuth` instead of `id-kp-clientAuth`
Issue -
State: closed - Opened by tjamaan over 8 years ago
- 2 comments
#59 - TLS1.3 draft 19
Pull Request -
State: closed - Opened by ctz over 8 years ago
- 3 comments
#58 - WIP: DTLS Support
Pull Request -
State: closed - Opened by manuels over 8 years ago
- 6 comments
#57 - Can't compile with Rust 1.17
Issue -
State: closed - Opened by e-oz over 8 years ago
- 3 comments
#56 - Fails to build with newest nightly (2017-03-15)
Issue -
State: closed - Opened by jackpot51 over 8 years ago
- 2 comments
#55 - Compilation fail using Rust nightly: The attribute `export_macro` is currently unknown to the compiler and may have meaning added to it in the future
Issue -
State: closed - Opened by oherrala over 8 years ago
#54 - BorrowMessage
Issue -
State: closed - Opened by manuels over 8 years ago
- 2 comments