Issues
- 0
Restore quicMinusNet using everquic-crypto
#255 opened by tahina-pro - 4
Document the roadmap of the project
#252 opened by DemiMarie - 0
Document where the actual work is happening
#251 opened by DemiMarie - 4
Custom setup using Cygwin and Ocaml Issue
#246 opened by KristianOstrup - 2
A memory and data model for miTLS
#240 opened by nikswamy - 17
- 0
Upgrading configurations
#235 opened by nikswamy - 4
- 0
TLS Local Encryption
#236 opened by nikswamy - 1
- 0
Tracking performance issues in the build of miTLS
#230 opened by msprotz - 7
- 0
libquiccrypto build
#223 opened by msprotz - 0
Add a comment near the top of auto-generated files
#222 opened by msprotz - 1
- 0
Plan for low-level Handshake and HandshakeLog
#219 opened by aseemr - 1
Garbage Collection
#215 opened by CarolineMathieson - 0
FFI_mitls_quic_process() fails if the inBuf param is NULL, even if the inBufLen is 0
#188 opened by BarryBo - 1
error handling in dll
#213 opened by CarolineMathieson - 8
Test is not run in the MSVC configuration
#212 opened by msprotz - 0
Alert code path causes app termination
#208 opened by CarolineMathieson - 0
Removing request-context from the encrypted certificate (sent by the server) causes a decode_error on NSS client while it only cause a “bad_certificate” error on miTLS client.
#178 opened by oweisse-msft - 1
miTLS server potentially mishandle "signature_algorithms" extension given by ClientHello
#180 opened by oweisse-msft - 1
Server will always sign CertificateVerify with last given SignatureScheme in ClientHello
#181 opened by oweisse-msft - 1
miTLS server HelloRetryRequest contains server_version=0x0304, hence doesn't work against NSS
#183 opened by oweisse-msft - 2
- 0
fstar --indent
#194 opened by fournet - 1
Debug printing
#156 opened by sishtiaq - 1
Revive TestClient
#157 opened by sishtiaq - 0
No need to ` (defadvice message` anymore
#158 opened by cpitclaudel - 4
Range.fst query takes a long time with z3 4.5.0, while goes through quickly with z3 nightly build (48e37b0e1603)
#164 opened by aseemr - 4
Cannot connect to miTLS
#168 opened by herbertschulz - 0
Cannot connect to miTLS
#167 opened by herbertschulz - 1
- 3
miTLS server responds to bad_certificate alert with encrypted alert of decryption_failed_RESERVED
#177 opened by oweisse-msft - 1
miTLS API may confuse developers to write software which may be vulnerable to replay attacks
#187 opened by oweisse-msft - 1
Re-ordering the "supported_versions" extension in ClientHello causes internal_error alert from the server
#173 opened by oweisse-msft - 1
No alert emitted on decryption failure of server encrypted response after ServerHello
#174 opened by oweisse-msft - 2
miTLS and NSS servers emit different alerts when manipulating EncryptedExtensions
#175 opened by oweisse-msft - 2
- 1
Client will always offer TLS 1.2, regardless of configuration via FFI_mitls_configure
#182 opened by oweisse-msft - 1
- 1
Support NPN Application Extension
#171 opened by BarryBo - 2
miTLS2C: Tracking Issue
#186 opened by jroesch - 2
- 1
Drop10 is missing libmipki.lib
#190 opened by BarryBo - 2
miTLS client send key share of type x22519, regardless of configuration done via FFI_mitls_configure_named_groups
#179 opened by oweisse-msft - 1
Implement Extensions
#163 opened by sishtiaq - 1
Del unused branches
#154 opened by sishtiaq - 0
Separate integrity from confidentiality in AEAD
#153 opened by markulf