mint icon indicating copy to clipboard operation
mint copied to clipboard

A Minimal TLS 1.3 Implementation in Go

Results 51 mint issues
Sort by recently updated
recently updated
newest added

Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.0.0-20210513164829-c07d793c2f9a to 0.17.0. Commits See full diff in compare view [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=golang.org/x/crypto&package-manager=go_modules&previous-version=0.0.0-20210513164829-c07d793c2f9a&new-version=0.17.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter...

dependencies

Bumps [golang.org/x/net](https://github.com/golang/net) from 0.0.0-20210614182718-04defd469f4e to 0.17.0. Commits See full diff in compare view [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=golang.org/x/net&package-manager=go_modules&previous-version=0.0.0-20210614182718-04defd469f4e&new-version=0.17.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter...

dependencies

Hello, I tried to rest the mint repository using this command : git reset --hard a6080d464fb57a9330c2124ffb62f3c233e3400e but I got this error: fatal: Could not parse object 'a6080d464fb57a9330c2124ffb62f3c233e3400e' could you please...

Main components here: * Definition of the `client_certificate_type` and `server_certificate_type` extensions * Related negotiation logic * Generalization of certificate logic in the handshake to support both raw keys and certificates

Currently, the `CertificateSelection` function calls the `schemeValidForKey` function, which checks if the signature type (RSA_PKCS1, RSA_PSS, or ECDSA) is correct for the given key, but does not check if the...

A new, simpler frame reader that is capable of handling variable-length headers. This should make it possible to implement DTLS compressed headers, and might also provide a way to implement...

Right now, mint sends an individual record for every handshake message, which incurs at least 17 bytes of overhead per handshake message (16-byte tag + content type). With this PR,...

This way you can have structs that marshal / unmarshal as TLS, but also have extra information that is produced locally. The proposed syntax is: ``` type Foo struct {...

Currently, mint uses incorrect context string when creating a CertificateVerify message for client auth. This PR properly switches the context string, in order to conform with the specification.