* (all versions)
From mozilla/supply-chain copy of hg. By Martin Thomson on 2022-08-04.
This review is from cargo-vet. To add your review, set up cargo-vet
and submit your URL to its registry.
* (all versions)
From mozilla/supply-chain copy of hg. By Martin Thomson on 2022-08-04.
cargo-vet does not verify reviewers' identity. You have to fully trust the source the audits are from.
This crate will not introduce a serious security vulnerability to production software exposed to untrusted input. More…
This crate can be compiled, run, and tested on a local workstation or in controlled automation without surprising consequences. More…
Lib.rs has been able to verify that all files in the crate's tarball are in the crate's repository with a git tag matching the version. Please note that this check is still in beta, and absence of this confirmation does not mean that the files don't match.
Crates in the crates.io registry are tarball snapshots uploaded by crates' publishers. The registry is not using crates' git repositories, so there is a possibility that published crates have a misleading repository URL, or contain different code from the code in the repository.
To review the actual code of the crate, it's best to use cargo crev open ohttp
. Alternatively, you can download the tarball of ohttp v0.5.3 or view the source online.
This code contains two cryptographic back ends. No unsafe code is contained if the Rust
hpke
crate is used (therust-hpke
feature). Using NSS (thenss
feature) involves extensive use of bindings to the native code provided by NSS. This interface uses wrappers that attempt to add safety to a fundamentally very dangerous library, but those wrappers have only been validated for use following the needs of this crate.