ssl
Here are 1,860 public repositories matching this topic...
As noted in #14464, the randomisation used does not need to be cryptographically secure. Any form of randomisation is sufficient.
The project could implement a low quality but fast RNG for the purposes generating this kind of blinding material. There is an existing low quality RNG in impl_cache_flush_cache() in crypto/property/property.c which could be used more widely. There is another
-
Updated
Jul 2, 2021 - JavaScript
Context and Description
The READMEs and any example code in all projects should be updated to reflect the move from the IBM-Swift organization to the Kitura organization.
If anyone wants to take on all or part of this, please comment here so other's know what you're working on and submit PR's. :-)
Thanks!
-
Updated
Jul 19, 2021 - Shell
-
Updated
Jul 14, 2021 - Shell
There's little information about what keys and values are in the output, what it means and how they are related to the screen output. In general that needs to be added. (special topics see #1675, #1674)
Problem:
A common pattern is:
GUARD(s2n_stuffer_skip_write(stuffer, bytes_to_write));
uint8_t* ptr = suffer->blob.data + stuffer->write_cursor - bytes_to_write;
which could be simplified.
Solution:
*ptr could be an *out parameter to s2n_stuffer_skip_write
- Does this change what S2N sends over the wire? No.
- Does this change any public APIs? No.
Running the oauth2-proxy with the "--display-htpasswd-form" and "--htpasswd-file" set to true, using a set of incorrect credentials doesn't show anything to the end user.
The end-user needs to know that his/her attempt failed (due to incorrect username/password) otherwise they don't even know that the attempt was done. For them
-
Updated
Jul 19, 2021 - Java
-
Updated
Jul 14, 2021 - C++
We would like to track code-size to enable us to understand what factors affect code-size, whether the library is growing, etc.
Measurements:
- library size in kB
- (for PRs) difference for each variant c.f. most recent build of development
Variants:
- platforms should be Arm v7-A and Arm v8-A
- a few different build types, probably: all-options-enabled, one or two other more typical con
-
Updated
May 3, 2021 - Python
-
Updated
Jun 5, 2021 - Kotlin
-
Updated
Mar 28, 2021 - Objective-C
-
Updated
Apr 1, 2021 - Go
-
Updated
Jul 16, 2021 - C#
-
Updated
Jun 10, 2021 - Lua
Improve this page
Add a description, image, and links to the ssl topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ssl topic, visit your repo's landing page and select "manage topics."
Checklist
Issue Description
When using the RateLimiter Middleware with a rate between 0 and 1 all events will be rejected instead of applying the specified rate. E.g.:
e.Use(middleware.RateLimiter(middleware.NewRateLimiterMemoryStore(0.5)))I am not saying that it is a common use case to have