Results 132 issues of David Benjamin

Here are a bunch of patches to upstream from Chromium. As with previous ones, these fall under the "The Chromium Authors" section of the LICENSE file. They include: - Minor...

As discussed in #14838, the SIGILL-based feature detection that OpenSSL uses on Arm is incorrect and causes problems. On Apple platforms, the API to use is `sysctlbyname`: https://developer.apple.com/documentation/kernel/1387446-sysctlbyname/determining_instruction_set_characteristics OpenSSL broadly...

help wanted
triaged: feature

A typo I noticed in the section header for {{flag}} in draft-nottingham-binary-structured-headers: `BINARY_STRUCTRED` should say `BINARY_STRUCTURED`

binary-structured-headers

### gopls version golang.org/x/tools/gopls v0.14.2 ### go env ```shell GO111MODULE='' GOARCH='amd64' GOBIN='' GOCACHE='/usr/local/google/home/davidben/.cache/go-build' GOENV='/usr/local/google/home/davidben/.config/go/env' GOEXE='' GOEXPERIMENT='fieldtrack,boringcrypto' GOFLAGS='' GOHOSTARCH='amd64' GOHOSTOS='linux' GOINSECURE='' GOMODCACHE='/usr/local/google/home/davidben/go/pkg/mod' GONOPROXY='' GONOSUMDB='' GOOS='linux' GOPATH='/usr/local/google/home/davidben/go' GOPRIVATE='' GOPROXY='https://proxy.golang.org,direct' GOROOT='/usr/lib/google-golang' GOSUMDB='sum.golang.org' GOTMPDIR=''...

Documentation
gopls
Tools

I started looking at porting BorinSSL to the testvectors_v1 format, but it looks like there's no equivalent of rsa_sig_gen_misc_test.json (type RsassaPkcs1Generate) in the testvectors_v1 set. The only tests I can...

(CC @tiran and @tniessen for CPython and Node, respectively. Please correct me if I've misunderstood what your projects are trying to do here!) Given a value like `SSL_R_THING_WENT_WRONG`, `ERR_reason_error_string` returns...

triaged: feature

### Input C/C++ Header ```C++ void new_function_name(void); #define old_function_name new_function_name ``` ### Bindgen Invocation ``` $ bindgen header.h ``` ### Actual Results ```rust /* automatically generated by rust-bindgen 0.65.1 */...

A-macros

These correspond to the configurations deprecated by RFC 9155. I've marked MD5 as "bad" because it really should have been out of clients by now. I've marked SHA-1 as "dubious"...

https://github.com/cloudflare/quiche/blob/master/quiche/src/tls.rs#L1255 contains a pile of hand-written bindings for BoringSSL functions. BoringSSL is not ABI-stable, so this is not a supported way to use the library. This will result in subtle...

**Describe the bug** The generated I2P emails contain all this extra stuff: > TAG review > None > > TAG review status > Pending > > Risks > > Interoperability...

bug