tls
Here are 1,369 public repositories matching this topic...
Just for RSA. Do encrypt and decrypt. Include a bold comment that this should not be used for bulk encryption.
It should be the current best practice (fetch), have proper error handling and resource allocation/deallocation and be in the style of a known answer test.
-
Updated
Jun 22, 2021 - Go
Right now in different places in the SE codebase there are references to /opt and then as well to /usr.
All SE code should reference one place only. Could someone please create a PR that fixes this.
This PR should also take PR #454 into consideration (no conflicts)
Is your feature request related to a problem? Please describe.
In order to address issue #3796, PR #3815 runs the e2e tests in series one after the other. It would be nice to run the tests in parallel again as that would lead to all the tests completing earlier.
Describe the solution you'd like
There's little information about what keys and values are in the output, what it means and how they are related to the screen output. In general that needs to be added. (special topics see #1675, #1674)
-
Updated
Jun 23, 2021 - Go
-
Updated
May 20, 2021 - JavaScript
Problem:
A common pattern is:
GUARD(s2n_stuffer_skip_write(stuffer, bytes_to_write));
uint8_t* ptr = suffer->blob.data + stuffer->write_cursor - bytes_to_write;
which could be simplified.
Solution:
*ptr could be an *out parameter to s2n_stuffer_skip_write
- Does this change what S2N sends over the wire? No.
- Does this change any public APIs? No.
-
Updated
Jun 24, 2021 - Go
-
Updated
Jun 17, 2021 - Go
-
Updated
Jun 18, 2021 - C
-
Updated
Jun 25, 2021 - Go
-
Updated
Jun 27, 2021 - Java
Description
If a provisioner cannot be accessed, e.g. OAuth server is down, allow step-ca to boot up with the remaining functioning provisioners. Probably this is already in the new management revamp but it's worth keeping an issue for this. @dopey could you confirm this?
Use case
This is part of my recent hiccups when bootstrapping a fully integrated server after a long power outag
-
Updated
Jun 11, 2021 - C++
Suggested enhancement
Make the error handling in some psa_cipher_xxx() and psa_mac_xxx() functions more robust by aborting the operation before returning with and error.
The impacted functions are:
psa_mac_verify_finish(), psa_mac_sign_finish(), psa_cipher_generate_iv(), psa_cipher_set_iv(), psa_cipher_update(), psa_cipher_finish()
Justification
Mbed TLS needs
-
Updated
May 25, 2021 - Go
-
Updated
Feb 27, 2018
-
Updated
May 30, 2021 - C#
Improve this page
Add a description, image, and links to the tls topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the tls topic, visit your repo's landing page and select "manage topics."
I'm managing a bunch of servers and they're running Caddy v2. The upgrade command works great for upgrading with the packages previously chosen. In the future, it's likely I'll want to add/remove packages from that list over time.
Would it make sense to add flags to add and remove packages from the caddy build on upgrade?