tls
Here are 1,559 public repositories matching this topic...
BN_mod_exp2_mont accesses the data field of the modulus without checking if it is allocated:
So calling BN_mod_exp2_mont with a zero modulus can lead to a NULL pointer dereference.
Internally, this function is only used by DSA verification:
-
Updated
Feb 11, 2022 - Go
Right now in different places in the SE codebase there are references to /opt and then as well to /usr.
All SE code should reference one place only. Could someone please create a PR that fixes this.
This PR should also take PR #454 into consideration (no conflicts)
Describe the bug:
Which version are you referring to
3.1dev
We list not all RFCs in ~/doc/ which we refer to in testssl.sh.
List used RFCs: grep RFC -w ./testssl.sh | grep -v TLS_CIPHER | grep RFC | sed 's/^.*RFC/RFC/' | sort -u
List RFCs referred to: grep -w RFC doc/testssl.1
-
Updated
Feb 3, 2022 - Go
-
Updated
Feb 6, 2022 - JavaScript
-
Updated
Dec 8, 2021 - Go
-
Updated
Feb 11, 2022 - Go
Problem:
A common pattern is:
GUARD(s2n_stuffer_skip_write(stuffer, bytes_to_write));
uint8_t* ptr = suffer->blob.data + stuffer->write_cursor - bytes_to_write;
which could be simplified.
Solution:
*ptr could be an *out parameter to s2n_stuffer_skip_write
- Does this change what S2N sends over the wire? No.
- Does this change any public APIs? No.
The recommendation is to set Cache-Control: private, no-store on any endpoint with sensitive information. Because while you can protect the traffic with TLS, you also need to keep sensitive information out of a client's (unencrypted) HTTP cache. I'm not sure how relevant this is to the API context of step-ca though—I've never seen an HTTP client library that caches content. But I guess the poi
-
Updated
Feb 11, 2022 - Go
-
Updated
Feb 1, 2022 - C
Suggested enhancement
Either a direct accessor function to retrieve the public component of an mbedtls_ecp_keypair, or a function to write out the public key to a binary buffer. Similarly, a way to create an mbedtls_ecp_keypair structure containing only the public part of the key.
Justification
Mbed TLS needs this because the public key component was made private.
-
Updated
Feb 9, 2022 - C++
-
Updated
Feb 11, 2022 - Java
-
Updated
Oct 27, 2021 - Go
-
Updated
Feb 11, 2022 - C#
-
Updated
Feb 27, 2018
Improve this page
Add a description, image, and links to the tls topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the tls topic, visit your repo's landing page and select "manage topics."


Context: https://caddy.community/t/including-files-scripts/15050/4
Right now, the
templatesmodule is inflexible in that only functions the functions registered by Caddy itself are available.A good refactor would be to make it possible to pass an optional array of modules in the
http.handlers.templates.functions.*namespace which get invoked atProvision()time to register additional