| /external/curl/docs/ |
| D | RUSTLS.md | 7 # Rustls 9 [Rustls is a TLS backend written in Rust](https://docs.rs/rustls/). Curl can 11 the [rustls-ffi C bindings](https://github.com/rustls/rustls-ffi/). This 12 version of curl depends on version v0.13.0 of rustls-ffi. 14 # Building with rustls 18 Next, check out, build, and install the appropriate version of rustls-ffi: 20 % git clone https://github.com/rustls/rustls-ffi -b v0.13.0 21 % cd rustls-ffi 23 % make DESTDIR=${HOME}/rustls-ffi-built/ install 25 Now configure and build curl with rustls: [all …]
|
| /external/curl/m4/ |
| D | curl-rustls.m4 | 27 dnl check for rustls 51 dnl --with-rustls (without path) used 56 dnl check the provided --with-rustls path 65 if test -f "$RUSTLS_PCDIR/rustls.pc"; then 73 if test -f "$RUSTLS_PCDIR/rustls.pc"; then 81 dnl via --with-rustls 91 AC_CHECK_LIB(rustls, rustls_connection_read, 93 AC_DEFINE(USE_RUSTLS, 1, [if rustls is enabled]) 97 ssl_msg="rustls" 98 test rustls != "$DEFAULT_SSL_BACKEND" || VALID_DEFAULT_SSL_BACKEND=yes [all …]
|
| /external/rust/crates/tungstenite/src/ |
| D | stream.rs | 19 use rustls::StreamOwned; 52 S: Deref<Target = rustls::ConnectionCommon<SD>>, 53 SD: rustls::SideData, 70 /// Encrypted socket stream using `rustls`. 71 Rustls(rustls::StreamOwned<rustls::ClientConnection, S>), enumerator 81 Self::Rustls(s) => { in fmt() 83 &'a rustls::StreamOwned<rustls::ClientConnection, S>, in fmt() 95 f.debug_tuple("MaybeTlsStream::Rustls").field(&RustlsStreamDebug(s)).finish() in fmt() 108 MaybeTlsStream::Rustls(ref mut s) => s.read(buf), in read() 120 MaybeTlsStream::Rustls(ref mut s) => s.write(buf), in write() [all …]
|
| D | tls.rs | 14 /// `native-tls` or `rustls` is used to create a TLS connection. Or TLS can be disabled with the 24 /// `rustls` TLS connector. 26 Rustls(std::sync::Arc<rustls::ClientConfig>), enumerator 72 pub mod rustls { module 73 use rustls::{ClientConfig, ClientConnection, RootCertStore, StreamOwned}; 106 #[cfg(feature = "rustls-tls-native-roots")] in wrap_stream() 114 #[cfg(feature = "rustls-tls-webpki-roots")] in wrap_stream() 129 let client = ClientConnection::new(config, domain).map_err(TlsError::Rustls)?; in wrap_stream() 132 Ok(MaybeTlsStream::Rustls(stream)) in wrap_stream() 206 Connector::Rustls(conn) => { in client_tls_with_config() [all …]
|
| D | error.rs | 263 /// Note that even if you enable only the rustls-based TLS support, the error at runtime could still 273 /// Rustls error. 275 #[error("rustls error: {0}")] 276 Rustls(#[from] rustls::Error), enumerator
|
| /external/bazelbuild-rules_rust/examples/crate_universe/multi_package/sub_pkgs/pkg_b/src/ |
| D | lib.rs | 1 //! A reimplementation of https://github.com/rustls/rustls/blob/v/0.20.8/rustls/tests/client_cert_v… 6 use rustls::client::WebPkiVerifier; 7 use rustls::server::{ClientCertVerified, ClientCertVerifier}; 8 use rustls::PrivateKey; 9 use rustls::{Certificate, DistinguishedNames, Error, ServerConfig, SignatureScheme}; 166 use rustls::internal::msgs::base::PayloadU16; 167 use rustls::server::ClientCertVerified; 168 use rustls::{ 182 config: rustls::ConfigBuilder<ClientConfig, rustls::WantsVerifier>, in finish_client_config_with_creds() 196 versions: &[&'static rustls::SupportedProtocolVersion], in make_client_config_with_versions_with_auth() [all …]
|
| /external/rust/crates/tungstenite/ |
| D | CHANGELOG.md | 59 - Update of dependencies (primarily `rustls`, `webpki-roots`, `rustls-native-certs`). 65 - Allow selecting the method of loading root certificates if `rustls` is used as TLS implementation. 66 - Two new feature flags `rustls-tls-native-roots` and `rustls-tls-webpki-roots` have been added 68 - The `rustls-tls` flag was removed to raise awareness of this change. Otherwise, compilation 77 - Use `rustls-native-certs` instead of `webpki-root` when `rustls-tls` feature is enabled. 87 - Add support for `rustls` as TLS backend. The previous `tls` feature flag is now removed in favor 88 of `native-tls` and `rustls-tls`, which allows to pick the TLS backend. The error API surface had 89 to be changed to support the new error types coming from rustls related crates.
|
| D | Cargo.toml.orig | 25 rustls-tls-native-roots = ["__rustls-tls", "rustls-native-certs"] 26 rustls-tls-webpki-roots = ["__rustls-tls", "webpki-roots"] 27 __rustls-tls = ["rustls", "rustls-pki-types"] 47 [dependencies.rustls] 51 [dependencies.rustls-pki-types] 55 [dependencies.rustls-native-certs]
|
| D | Cargo.toml | 109 [dependencies.rustls] 113 [dependencies.rustls-native-certs] 117 [dependencies.rustls-pki-types] 156 "rustls", 157 "rustls-pki-types", 172 rustls-tls-native-roots = [ 174 "rustls-native-certs", 176 rustls-tls-webpki-roots = [
|
| D | Cargo.lock | 757 name = "rustls" 764 "rustls-pki-types", 765 "rustls-webpki", 771 name = "rustls-native-certs" 777 "rustls-pemfile", 778 "rustls-pki-types", 784 name = "rustls-pemfile" 790 "rustls-pki-types", 794 name = "rustls-pki-types" 800 name = "rustls-webpki" [all …]
|
| D | README.md | 62 TLS is supported on all platforms using `native-tls` or `rustls`. The following 67 * `rustls-tls-native-roots` 68 * `rustls-tls-webpki-roots`
|
| /external/rust/crates/tonic/ |
| D | Cargo.toml.orig | 31 tls = ["dep:rustls-pki-types", "dep:rustls-pemfile", "transport", "dep:tokio-rustls", "tokio/rt", "… 32 tls-roots = ["tls-roots-common", "dep:rustls-native-certs"] 79 # rustls 81 rustls-pki-types = { version = "1.0", optional = true } 82 rustls-pemfile = { version = "2.0", optional = true } 83 rustls-native-certs = { version = "0.7", optional = true } 84 tokio-rustls = { version = "0.25", optional = true }
|
| D | Cargo.toml | 103 [dependencies.rustls-native-certs] 107 [dependencies.rustls-pemfile] 111 [dependencies.rustls-pki-types] 118 [dependencies.tokio-rustls] 194 "dep:rustls-pki-types", 195 "dep:rustls-pemfile", 197 "dep:tokio-rustls", 203 "dep:rustls-native-certs",
|
| D | README.md | 28 - TLS backed by [`rustls`] 142 [`rustls`]: https://github.com/rustls/rustls
|
| /external/curl/lib/vtls/ |
| D | rustls.c | 33 #include <rustls.h> 176 * - Read a chunk of bytes from the socket into rustls' TLS input buffer. 177 * - Tell rustls to process any new packets. 178 * - Read out as many plaintext bytes from rustls as possible, until hitting 182 * In that case, it will copy bytes from the socket into rustls' TLS input 183 * buffer, and process packets, but won't consume bytes from rustls' plaintext 222 failf(data, "rustls: peer closed TCP connection " in cr_recv() 307 * - Copy `plainlen` bytes into rustls' plaintext input buffer (if > 0). 308 * - Fully drain rustls' plaintext output buffer into the socket until 312 * In that case, it won't read anything into rustls' plaintext input buffer. [all …]
|
| /external/curl/.github/workflows/ |
| D | linux.yml | 58 …# renovate: datasource=github-tags depName=rustls/rustls-ffi versioning=semver registryUrl=https:/… 59 rustls-version: 0.13.0 164 - name: rustls 165 install_steps: rust rustls pytest valgrind libpsl-dev 166 configure: --with-rustls=$HOME/rustls --enable-debug 348 - name: cache rustls 349 if: contains(matrix.build.install_steps, 'rustls') 351 id: cache-rustls 353 cache-name: cache-rustls 355 path: /home/runner/rustls [all …]
|
| /external/rust/crates/tonic/src/transport/ |
| D | mod.rs | 5 //! `rustls` tls backend when the respective feature flag is enabled, and 10 //! - TLS support via [rustls]. 21 //! # #[cfg(feature = "rustls")] 27 //! # #[cfg(feature = "rustls")] 49 //! # #[cfg(feature = "rustls")] 52 //! # #[cfg(feature = "rustls")] 88 //! [rustls]: https://docs.rs/rustls/0.16.0/rustls/
|
| /external/rust/crates/tonic/src/ |
| D | lib.rs | 25 //! - `tls`: Enables the `rustls` based TLS options for the `transport` feature. Not 27 //! - `tls-roots`: Adds system trust roots to `rustls`-based gRPC clients using the 28 //! `rustls-native-certs` crate. Not enabled by default. `tls` must be enabled to use 31 //! `rustls`-based gRPC clients. Not enabled by default. 54 //! enable TLS using [`rustls`], via the `tls` feature flag. 75 //! [`rustls`]: https://docs.rs/rustls
|
| /external/bazelbuild-rules_rust/examples/crate_universe/multi_package/pkg_a/ |
| D | Cargo.toml | 10 reqwest = { default-features = false, version = "0.11.4", features = ["blocking", "json", "rustls-t… 13 # Pin to a version of `httmock` that supports `rustls`. 15 httpmock = { default-features = false, features = ["rustls"], git = "https://github.com/alexliesenf…
|
| D | Cargo.lock | 315 "rustls-ffi", 601 name = "hyper-rustls" 608 "rustls", 610 "tokio-rustls", 1045 "hyper-rustls", 1055 "rustls", 1056 "rustls-pemfile 1.0.2", 1062 "tokio-rustls", 1102 name = "rustls" 1114 name = "rustls-ffi" [all …]
|
| /external/curl/tests/data/ |
| D | DISABLED | 88 # The CRL test (313) doesn't work with rustls because rustls doesn't support 91 # rustls doesn't support IP address certificates yet. That's the 400 series of 93 %if rustls
|
| /external/bazelbuild-rules_rust/examples/crate_universe/multi_package/ |
| D | Cargo.Bazel.lock | 302 "rustls-ffi", 577 name = "hyper-rustls" 584 "rustls", 586 "tokio-rustls", 867 "rustls", 868 "rustls-pemfile 1.0.2", 953 "hyper-rustls", 961 "rustls", 962 "rustls-pemfile 1.0.2", 967 "tokio-rustls", [all …]
|
| /external/bazelbuild-rules_rust/examples/crate_universe/multi_package/sub_pkgs/pkg_b/ |
| D | Cargo.toml | 9 rustls = "0.20.8" 10 rustls-pemfile = "1.0.2"
|
| /external/oss-fuzz/projects/rustls/ |
| D | project.yaml | 1 homepage: "https://github.com/ctz/rustls" 2 main_repo: "https://github.com/ctz/rustls"
|
| /external/curl/docs/libcurl/opts/ |
| D | CURLOPT_CAINFO_BLOB.md | 18 - rustls 84 7.81.0), rustls (since 7.82.0), wolfSSL (since 8.2.0), OpenSSL, Secure
|