tls
Here are 1,316 public repositories matching this topic...
Just for RSA. Do encrypt and decrypt. Include a bold comment that this should not be used for bulk encryption.
It should be the current best practice (fetch), have proper error handling and resource allocation/deallocation and be in the style of a known answer test.
-
Updated
Apr 9, 2021 - Go
Right now in different places in the SE codebase there are references to /opt and then as well to /usr.
All SE code should reference one place only. Could someone please create a PR that fixes this.
This PR should also take PR #454 into consideration (no conflicts)
Is your feature request related to a problem? Please describe.
In order to address issue #3796, PR #3815 runs the e2e tests in series one after the other. It would be nice to run the tests in parallel again as that would lead to all the tests completing earlier.
Describe the solution you'd like
There's little information about what keys and values are in the output, what it means and how they are related to the screen output. In general that needs to be added. (special topics see #1675, #1674)
-
Updated
Apr 16, 2021 - Go
Problem:
A common pattern is:
GUARD(s2n_stuffer_skip_write(stuffer, bytes_to_write));
uint8_t* ptr = suffer->blob.data + stuffer->write_cursor - bytes_to_write;
which could be simplified.
Solution:
*ptr could be an *out parameter to s2n_stuffer_skip_write
- Does this change what S2N sends over the wire? No.
- Does this change any public APIs? No.
-
Updated
Apr 1, 2021 - JavaScript
-
Updated
Apr 16, 2021 - Go
-
Updated
Apr 9, 2021 - C
-
Updated
Apr 12, 2021 - Go
-
Updated
Apr 6, 2021 - Go
-
Updated
Apr 16, 2021 - Java
What would you like to be added
Add support for a DynamoDB storage backend. Although MySQL is available, it would require to run a RDS Instance for it. Extra costs, backup considerations, etc. Even with Aurora Serverless.
DynamoDB is just there, scales as needed with OnDemand pricing and has fine backup capabilities.
Why this is needed
We plan to run step-ca in AWS ECS on Farga
-
Updated
Apr 16, 2021 - C++
Context
The configuration option MBEDTLS_SSL_MAX_CONTENT_LEN controls the "Maximum length of incoming and outgoing plaintext fragments". Since its introduction two more finer-grained options have been introduced: MBEDTLS_SSL_IN_CONTENT_MAX and MBEDTLS_SSL_OUT_CONTENT_MAX. These two options provide exactly the same functionality as MBEDTLS_SSL_MAX_CONTENT_LEN however allow for more c
-
Updated
Mar 26, 2021 - Go
-
Updated
Feb 27, 2018
Improve this page
Add a description, image, and links to the tls topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the tls topic, visit your repo's landing page and select "manage topics."
I’m trying to script setup and configuration of caddy server based on a custom download that includes additional plugins (caddy-auth-portal, caddy-auth-jwt, caddy-trace, and various caddy-dns modules ).
During setup, the caddy unit file is configured to run caddy as a non priveledged user (by design).
To get certificates configured properly we are attempting to use the caddy trust command