ssl
Here are 1,886 public repositories matching this topic...
I know this is going to sound trivial... but hopefully it's *SO* trivial that it's easy to implement! «grin»
I was using openssl s_client to debug an issue that turned out to be the result of having multiple DNS (round-robin) 'A' records defined...
It would have helped tremendously if s_client had logged the IP address to which it actually connected at the top. (And running {dig/
Feature request
Feature description
The generated and installed config files permission are too open, any user logined on the system can read and write them. So i suggest append a chmod command into Extract tar step to keep config files more safty.
How the feature is useful
A fullstack but simple mail server (SMTP, IMAP, LDAP, Antispam, Antivirus, etc.) using Docker.
-
Updated
Aug 16, 2021 - Shell
Context and Description
The READMEs and any example code in all projects should be updated to reflect the move from the IBM-Swift organization to the Kitura organization.
If anyone wants to take on all or part of this, please comment here so other's know what you're working on and submit PR's. :-)
Thanks!
Automated ACME SSL certificate generation for nginx-proxy
-
Updated
Aug 8, 2021 - Shell
Can somebody give a hand here?
I am referring to this line in the readme: [](https://travis-ci.org/drwetter/testssl.sh)
Problem:
A common pattern is:
GUARD(s2n_stuffer_skip_write(stuffer, bytes_to_write));
uint8_t* ptr = suffer->blob.data + stuffer->write_cursor - bytes_to_write;
which could be simplified.
Solution:
*ptr could be an *out parameter to s2n_stuffer_skip_write
- Does this change what S2N sends over the wire? No.
- Does this change any public APIs? No.
When closing the browser after a successful user sign in, the session is still alive for the time the oauth2-proxy cookie has not expired and tokens in session are still valid.
Expected Behavior
There could be an additional "browser session enabled" configuration. When the browser is closed (or when the browser defines the "current session" ends), the oauth2-proxy user session should also
Share your terminal over the web
-
Updated
Aug 16, 2021 - C
Eclipse Jetty® - Web Container & Clients - supports HTTP/2, HTTP/1.1, HTTP/1.0, websocket, servlets, and more
-
Updated
Aug 16, 2021 - Java
The definition and the comment about PSA_KEY_EXPORT_ECC_PUBLIC_KEY_MAX_SIZE in include/psa/crypto_sizes.h apply to Weierstrass curves only: 0x04, x, y. This happens to work for Montgomery and Edwards curves as well (because those only use one coordinates, which takes less room), so it's no big deal, but the documentation there is misleading and the definition is suboptimal.
The goal of this
HTTP and WebSocket built on Boost.Asio in C++11
-
Updated
Aug 14, 2021 - C++
Websockify is a WebSocket to TCP proxy/bridge. This allows a browser to connect to any application/server/service. Implementations in Python, C, Node.js and Ruby.
-
Updated
Jul 23, 2021 - Python
Easily upload files (Multipart/Binary/FTP out of the box) in the background with progress notification. Support for persistent upload requests, customizations and custom plugins.
-
Updated
Aug 1, 2021 - Kotlin
Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and macOS applications.
-
Updated
Mar 28, 2021 - Objective-C
-
Updated
Apr 1, 2021 - Go
An FTP and FTPS client for .NET & .NET Standard, optimized for speed. Provides extensive FTP commands, File uploads/downloads, SSL/TLS connections, Automatic directory listing parsing, File hashing/checksums, File permissions/CHMOD, FTP proxies, FXP support, UTF-8 support, Async/await support, Powershell support and more. Written entirely in C#, with no external dependencies.
-
Updated
Aug 10, 2021 - C#
Improve this page
Add a description, image, and links to the ssl topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ssl topic, visit your repo's landing page and select "manage topics."


Checklist
Issue Description
When using the RateLimiter Middleware with a rate between 0 and 1 all events will be rejected instead of applying the specified rate. E.g.:
e.Use(middleware.RateLimiter(middleware.NewRateLimiterMemoryStore(0.5)))I am not saying that it is a common use case to have