Home
last modified time | relevance | path

Searched full:rustls (Results 1 – 25 of 94) sorted by relevance

1234

/external/curl/docs/
DRUSTLS.md7 # Rustls
9 [Rustls is a TLS backend written in Rust](https://docs.rs/rustls/). Curl can
11 the [rustls-ffi C bindings](https://github.com/rustls/rustls-ffi/). This
12 version of curl depends on version v0.13.0 of rustls-ffi.
14 # Building with rustls
18 Next, check out, build, and install the appropriate version of rustls-ffi:
20 % git clone https://github.com/rustls/rustls-ffi -b v0.13.0
21 % cd rustls-ffi
23 % make DESTDIR=${HOME}/rustls-ffi-built/ install
25 Now configure and build curl with rustls:
[all …]
/external/curl/m4/
Dcurl-rustls.m427 dnl check for rustls
51 dnl --with-rustls (without path) used
56 dnl check the provided --with-rustls path
65 if test -f "$RUSTLS_PCDIR/rustls.pc"; then
73 if test -f "$RUSTLS_PCDIR/rustls.pc"; then
81 dnl via --with-rustls
91 AC_CHECK_LIB(rustls, rustls_connection_read,
93 AC_DEFINE(USE_RUSTLS, 1, [if rustls is enabled])
97 ssl_msg="rustls"
98 test rustls != "$DEFAULT_SSL_BACKEND" || VALID_DEFAULT_SSL_BACKEND=yes
[all …]
/external/rust/crates/tungstenite/src/
Dstream.rs19 use rustls::StreamOwned;
52 S: Deref<Target = rustls::ConnectionCommon<SD>>,
53 SD: rustls::SideData,
70 /// Encrypted socket stream using `rustls`.
71 Rustls(rustls::StreamOwned<rustls::ClientConnection, S>), enumerator
81 Self::Rustls(s) => { in fmt()
83 &'a rustls::StreamOwned<rustls::ClientConnection, S>, in fmt()
95 f.debug_tuple("MaybeTlsStream::Rustls").field(&RustlsStreamDebug(s)).finish() in fmt()
108 MaybeTlsStream::Rustls(ref mut s) => s.read(buf), in read()
120 MaybeTlsStream::Rustls(ref mut s) => s.write(buf), in write()
[all …]
Dtls.rs14 /// `native-tls` or `rustls` is used to create a TLS connection. Or TLS can be disabled with the
24 /// `rustls` TLS connector.
26 Rustls(std::sync::Arc<rustls::ClientConfig>), enumerator
72 pub mod rustls { module
73 use rustls::{ClientConfig, ClientConnection, RootCertStore, StreamOwned};
106 #[cfg(feature = "rustls-tls-native-roots")] in wrap_stream()
114 #[cfg(feature = "rustls-tls-webpki-roots")] in wrap_stream()
129 let client = ClientConnection::new(config, domain).map_err(TlsError::Rustls)?; in wrap_stream()
132 Ok(MaybeTlsStream::Rustls(stream)) in wrap_stream()
206 Connector::Rustls(conn) => { in client_tls_with_config()
[all …]
Derror.rs263 /// Note that even if you enable only the rustls-based TLS support, the error at runtime could still
273 /// Rustls error.
275 #[error("rustls error: {0}")]
276 Rustls(#[from] rustls::Error), enumerator
/external/bazelbuild-rules_rust/examples/crate_universe/multi_package/sub_pkgs/pkg_b/src/
Dlib.rs1 //! A reimplementation of https://github.com/rustls/rustls/blob/v/0.20.8/rustls/tests/client_cert_v…
6 use rustls::client::WebPkiVerifier;
7 use rustls::server::{ClientCertVerified, ClientCertVerifier};
8 use rustls::PrivateKey;
9 use rustls::{Certificate, DistinguishedNames, Error, ServerConfig, SignatureScheme};
166 use rustls::internal::msgs::base::PayloadU16;
167 use rustls::server::ClientCertVerified;
168 use rustls::{
182 config: rustls::ConfigBuilder<ClientConfig, rustls::WantsVerifier>, in finish_client_config_with_creds()
196 versions: &[&'static rustls::SupportedProtocolVersion], in make_client_config_with_versions_with_auth()
[all …]
/external/rust/crates/tungstenite/
DCHANGELOG.md59 - Update of dependencies (primarily `rustls`, `webpki-roots`, `rustls-native-certs`).
65 - Allow selecting the method of loading root certificates if `rustls` is used as TLS implementation.
66 - Two new feature flags `rustls-tls-native-roots` and `rustls-tls-webpki-roots` have been added
68 - The `rustls-tls` flag was removed to raise awareness of this change. Otherwise, compilation
77 - Use `rustls-native-certs` instead of `webpki-root` when `rustls-tls` feature is enabled.
87 - Add support for `rustls` as TLS backend. The previous `tls` feature flag is now removed in favor
88 of `native-tls` and `rustls-tls`, which allows to pick the TLS backend. The error API surface had
89 to be changed to support the new error types coming from rustls related crates.
DCargo.toml.orig25 rustls-tls-native-roots = ["__rustls-tls", "rustls-native-certs"]
26 rustls-tls-webpki-roots = ["__rustls-tls", "webpki-roots"]
27 __rustls-tls = ["rustls", "rustls-pki-types"]
47 [dependencies.rustls]
51 [dependencies.rustls-pki-types]
55 [dependencies.rustls-native-certs]
DCargo.toml109 [dependencies.rustls]
113 [dependencies.rustls-native-certs]
117 [dependencies.rustls-pki-types]
156 "rustls",
157 "rustls-pki-types",
172 rustls-tls-native-roots = [
174 "rustls-native-certs",
176 rustls-tls-webpki-roots = [
DCargo.lock757 name = "rustls"
764 "rustls-pki-types",
765 "rustls-webpki",
771 name = "rustls-native-certs"
777 "rustls-pemfile",
778 "rustls-pki-types",
784 name = "rustls-pemfile"
790 "rustls-pki-types",
794 name = "rustls-pki-types"
800 name = "rustls-webpki"
[all …]
DREADME.md62 TLS is supported on all platforms using `native-tls` or `rustls`. The following
67 * `rustls-tls-native-roots`
68 * `rustls-tls-webpki-roots`
/external/rust/crates/tonic/
DCargo.toml.orig31 tls = ["dep:rustls-pki-types", "dep:rustls-pemfile", "transport", "dep:tokio-rustls", "tokio/rt", "…
32 tls-roots = ["tls-roots-common", "dep:rustls-native-certs"]
79 # rustls
81 rustls-pki-types = { version = "1.0", optional = true }
82 rustls-pemfile = { version = "2.0", optional = true }
83 rustls-native-certs = { version = "0.7", optional = true }
84 tokio-rustls = { version = "0.25", optional = true }
DCargo.toml103 [dependencies.rustls-native-certs]
107 [dependencies.rustls-pemfile]
111 [dependencies.rustls-pki-types]
118 [dependencies.tokio-rustls]
194 "dep:rustls-pki-types",
195 "dep:rustls-pemfile",
197 "dep:tokio-rustls",
203 "dep:rustls-native-certs",
DREADME.md28 - TLS backed by [`rustls`]
142 [`rustls`]: https://github.com/rustls/rustls
/external/curl/lib/vtls/
Drustls.c33 #include <rustls.h>
176 * - Read a chunk of bytes from the socket into rustls' TLS input buffer.
177 * - Tell rustls to process any new packets.
178 * - Read out as many plaintext bytes from rustls as possible, until hitting
182 * In that case, it will copy bytes from the socket into rustls' TLS input
183 * buffer, and process packets, but won't consume bytes from rustls' plaintext
222 failf(data, "rustls: peer closed TCP connection " in cr_recv()
307 * - Copy `plainlen` bytes into rustls' plaintext input buffer (if > 0).
308 * - Fully drain rustls' plaintext output buffer into the socket until
312 * In that case, it won't read anything into rustls' plaintext input buffer.
[all …]
/external/curl/.github/workflows/
Dlinux.yml58 …# renovate: datasource=github-tags depName=rustls/rustls-ffi versioning=semver registryUrl=https:/…
59 rustls-version: 0.13.0
164 - name: rustls
165 install_steps: rust rustls pytest valgrind libpsl-dev
166 configure: --with-rustls=$HOME/rustls --enable-debug
348 - name: cache rustls
349 if: contains(matrix.build.install_steps, 'rustls')
351 id: cache-rustls
353 cache-name: cache-rustls
355 path: /home/runner/rustls
[all …]
/external/rust/crates/tonic/src/transport/
Dmod.rs5 //! `rustls` tls backend when the respective feature flag is enabled, and
10 //! - TLS support via [rustls].
21 //! # #[cfg(feature = "rustls")]
27 //! # #[cfg(feature = "rustls")]
49 //! # #[cfg(feature = "rustls")]
52 //! # #[cfg(feature = "rustls")]
88 //! [rustls]: https://docs.rs/rustls/0.16.0/rustls/
/external/rust/crates/tonic/src/
Dlib.rs25 //! - `tls`: Enables the `rustls` based TLS options for the `transport` feature. Not
27 //! - `tls-roots`: Adds system trust roots to `rustls`-based gRPC clients using the
28 //! `rustls-native-certs` crate. Not enabled by default. `tls` must be enabled to use
31 //! `rustls`-based gRPC clients. Not enabled by default.
54 //! enable TLS using [`rustls`], via the `tls` feature flag.
75 //! [`rustls`]: https://docs.rs/rustls
/external/bazelbuild-rules_rust/examples/crate_universe/multi_package/pkg_a/
DCargo.toml10 reqwest = { default-features = false, version = "0.11.4", features = ["blocking", "json", "rustls-t…
13 # Pin to a version of `httmock` that supports `rustls`.
15 httpmock = { default-features = false, features = ["rustls"], git = "https://github.com/alexliesenf…
DCargo.lock315 "rustls-ffi",
601 name = "hyper-rustls"
608 "rustls",
610 "tokio-rustls",
1045 "hyper-rustls",
1055 "rustls",
1056 "rustls-pemfile 1.0.2",
1062 "tokio-rustls",
1102 name = "rustls"
1114 name = "rustls-ffi"
[all …]
/external/curl/tests/data/
DDISABLED88 # The CRL test (313) doesn't work with rustls because rustls doesn't support
91 # rustls doesn't support IP address certificates yet. That's the 400 series of
93 %if rustls
/external/bazelbuild-rules_rust/examples/crate_universe/multi_package/
DCargo.Bazel.lock302 "rustls-ffi",
577 name = "hyper-rustls"
584 "rustls",
586 "tokio-rustls",
867 "rustls",
868 "rustls-pemfile 1.0.2",
953 "hyper-rustls",
961 "rustls",
962 "rustls-pemfile 1.0.2",
967 "tokio-rustls",
[all …]
/external/bazelbuild-rules_rust/examples/crate_universe/multi_package/sub_pkgs/pkg_b/
DCargo.toml9 rustls = "0.20.8"
10 rustls-pemfile = "1.0.2"
/external/oss-fuzz/projects/rustls/
Dproject.yaml1 homepage: "https://github.com/ctz/rustls"
2 main_repo: "https://github.com/ctz/rustls"
/external/curl/docs/libcurl/opts/
DCURLOPT_CAINFO_BLOB.md18 - rustls
84 7.81.0), rustls (since 7.82.0), wolfSSL (since 8.2.0), OpenSSL, Secure

1234