-
Running testssl.sh version 3.0.9. The hexcode is weird:
```
Testing 370 ciphers via OpenSSL plus sockets against the server, ordered by encryption strength
Hexcode Cipher Suite Name (OpenSSL) …
-
When the 32 bit block counter overflows, the nonce is incremented in some of the implementations.
This isn't a problem for OpenSSL's use of the algorithm but applications that set the counter to a va…
-
### Description
We support both ChaCha20, XChaCha20, and Poly1305, but we lack a type that implements the combinations of the ChaCha and Poly1305 algorithms. These algorithms are used for TLS, so w…
-
The title says it all,
other AES modes and bare CHACHA20 are already supported by wolfcrypt-py, but not these (or AES-XTS either) B-)
Thanks for the nice crypto lib!
-
It's because charcha20 is in the defaults. It should be automatically stripped out when it isn't supported.
-
-
### The problem
I cloned the repo on a Raspberry Pi 4 and followed the instructions to build with Docker but I am unable to run the built image.
```bash
git clone https://github.com/openairplay/a…
-
Looking at the nginx schema I see following defaults:
```
"ciphersuite" : cipherstring[] = list("TLSv1")
"protocol" : sslprotocol[] = list("TLSv1", "TLSv1.1", "TLSv1.2", "TLSv1.3")
```
…
-
First I tried just running the cipherscan script on it's own ( I copied just this file from this repo, and ran it).
```
$ ./cs redacted
...../cs: line 1589: ./cscan.sh: No such file or directory
…
-
@tarcieri has recently [implemented ChaCha*Rng via the `chacha20` crate](https://github.com/rust-random/rand/issues/872#issuecomment-575242181). [docs are here](https://docs.rs/chacha20/0.3.1/chacha20…