Cargo Features
[dependencies]
shadowsocks = { version = "1.22.0", default-features = false, features = ["hickory-dns", "trust-dns", "stream-cipher", "aead-cipher", "aead-cipher-extra", "aead-cipher-2022", "aead-cipher-2022-extra", "security-replay-attack-detect"] }
- default = aead-cipher, hickory-dns
-
These default features are set whenever
shadowsocks
is added without
somewhere in the dependency tree.default-features = false - hickory-dns default trust-dns? = arc-swap, hickory-resolver, notify
-
Uses Hickory-DNS instead of tokio's builtin DNS resolver
Affects
resolver::HickoryDnsSystemResolver
… - trust-dns = hickory-dns
-
Hickory-DNS was renamed from Trust-DNS, keep compatibility.
- stream-cipher
-
Enable Stream Cipher Protocol WARN: Stream Cipher Protocol is proved to be insecure https://github.com/shadowsocks/shadowsocks-rust/issues/373 Users should always avoid using these ciphers in practice
Enables ring and v1-stream of shadowsocks-crypto
- aead-cipher default aead-cipher-extra?
-
Enable AEAD ciphers
Enables ring and v1-aead of shadowsocks-crypto
- aead-cipher-extra = aead-cipher
-
Enable extra AEAD ciphers
WARN: These non-standard AEAD ciphers are not officially supported by shadowsocks communityEnables v1-aead-extra of shadowsocks-crypto
- aead-cipher-2022 aead-cipher-2022-extra? = aes, lru_time_cache
-
Enable AEAD 2022
Enables small_rng of rand ^0.8, ring and v2 of shadowsocks-crypto
Affects
config::method_support_eih
,protocol::v2
… - aead-cipher-2022-extra = aead-cipher-2022
-
Enable AEAD 2022 with extra ciphers
Enables v2-extra of shadowsocks-crypto
- security-replay-attack-detect = bloomfilter
-
Enable detection against replay attack
Features from optional dependencies
In crates that don't use the dep:
syntax, optional dependencies automatically become Cargo features. These features may have been created by mistake, and this functionality may be removed in the future.