fork of boring2 with prefix patch
Go to file
Ivan Nikulin 4ce9c50b63
Merge pull request #116 from nox/clippy
Fix all clippy lints
2023-05-05 09:44:30 +01:00
.github/workflows Use ubuntu-20.04 image for FIPS build 2023-03-27 12:59:13 +02:00
boring Fix lints 2023-03-27 13:15:12 +02:00
boring-sys Fix lints 2023-03-27 13:15:12 +02:00
hyper-boring Fix google test 2023-03-27 13:14:40 +02:00
scripts Add publish script 2020-11-12 13:08:13 +00:00
tokio-boring bump version number for tokio-boring 2022-09-16 13:13:08 -05:00
.gitignore Rename stuff 2020-11-11 17:47:30 +00:00
.gitmodules Add fips-3678 feature (#52) 2022-01-31 16:11:33 -06:00
.rusty-hook.toml Add tokio-boring 2020-11-11 19:26:22 +00:00
CHANGELOG.md Update changelogs and bump version numbers 2022-09-16 13:03:26 -05:00
Cargo.toml Use bindgen to automatically generate boring-sys 2021-02-12 15:03:45 +01:00
README.md Add fips-3678 feature (#52) 2022-01-31 16:11:33 -06:00
THIRD_PARTY Rename stuff 2020-11-11 17:47:30 +00:00

README.md

boring

crates.io

BoringSSL bindings for the Rust programming language and TLS adapters for tokio and hyper built on top of it.

Documentation.

Release Support

By default, the crate statically links with the latest BoringSSL master branch.

Support for pre-built binaries

While this crate can build BoringSSL on its own, you may want to provide pre-built binaries instead. To do so, specify the environment variable BORING_BSSL_PATH with the path to the binaries.

You can also provide specific headers by setting BORING_BSSL_INCLUDE_PATH.

Notes: The crate will look for headers in the $BORING_BSSL_INCLUDE_PATH/openssl/ folder, make sure to place your headers there.

Warning: When providing a different version of BoringSSL make sure to use a compatible one, the crate relies on the presence of certain functions.

Building with a FIPS-validated module

Only BoringCrypto module version ae223d6138807a13006342edfeef32e813246b39, as certified with certificate 3678 is supported by this crate. Support is enabled by this crate's fips feature.

boring-sys comes with a test that FIPS is enabled/disabled depending on the feature flag. You can run it as follows:

$ cargo test --features fips fips::is_enabled

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed under the terms of both the Apache License, Version 2.0 and the MIT license without any additional terms or conditions.

Accolades

The project is based on a fork of rust-openssl.