tls
Here are 1,279 public repositories matching this topic...
Just for RSA. Do encrypt and decrypt. Include a bold comment that this should not be used for bulk encryption.
It should be the current best practice (fetch), have proper error handling and resource allocation/deallocation and be in the style of a known answer test.
-
Updated
Feb 23, 2021 - Go
Right now in different places in the SE codebase there are references to /opt and then as well to /usr.
All SE code should reference one place only. Could someone please create a PR that fixes this.
This PR should also take PR #454 into consideration (no conflicts)
Add a simple integration test that checks that the certificate readiness controller starts and that in a standard scenario a Certificate's Ready condition is updated- similar to our [existing integration tests for some of the other Certificate controllers](https://github.com/jetstack/cert-manager/tree/mas
There's little information about what keys and values are in the output, what it means and how they are related to the screen output. In general that needs to be added. (special topics see #1675, #1674)
-
Updated
Feb 28, 2021 - Go
Problem:
A common pattern is:
GUARD(s2n_stuffer_skip_write(stuffer, bytes_to_write));
uint8_t* ptr = suffer->blob.data + stuffer->write_cursor - bytes_to_write;
which could be simplified.
Solution:
*ptr could be an *out parameter to s2n_stuffer_skip_write
- Does this change what S2N sends over the wire? No.
- Does this change any public APIs? No.
-
Updated
Feb 11, 2021 - JavaScript
-
Updated
Feb 28, 2021 - Go
-
Updated
Jan 31, 2021 - C
-
Updated
Feb 24, 2021 - Go
-
Updated
Feb 27, 2021 - Java
-
Updated
Feb 27, 2021 - Go
-
Updated
Feb 27, 2021 - C++
What would you like to be added
Add support for a DynamoDB storage backend. Although MySQL is available, it would require to run a RDS Instance for it. Extra costs, backup considerations, etc. Even with Aurora Serverless.
DynamoDB is just there, scales as needed with OnDemand pricing and has fine backup capabilities.
Why this is needed
We plan to run step-ca in AWS ECS on Farga
The header file include/mbedtls/compat-1.3.h was meant to somewhat ease the transition from PolarSSL/Mbed TLS 1.3 to Mbed TLS 2.0 (especially as 100% of the public symbols were renamed to include an mbedtls_ prefix).
It no longer makes sense to have it around in Mbed TLS 3.0.
-
Updated
Nov 18, 2020 - Go
-
Updated
Feb 27, 2018
Improve this page
Add a description, image, and links to the tls topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the tls topic, visit your repo's landing page and select "manage topics."
Currently the
install_trustoption for CAs from thepkimodule can only be configured via JSON/API.Setting TLS to
internalwith optionon_demandis easily possible with a Caddyfile and allows for a quick and simple internal setup. Trust store installation on the machine itself is not necessary and only leads to startup errors being logged from bothsudoandcaddy.Therefore it w