Skip to content
Avatar
:shipit:
Ship it
:shipit:
Ship it

Highlights

Organizations

@rubinius @celluloid @cryptosphere @httprb @RustCrypto @RustSec @Ristretto @rust-secure-code @jmse-json

Sponsors

@tvi @emschwartz @nat

Sponsoring

@lcnr

Pinned

  1. Authenticated Encryption with Associated Data Algorithms: high-level encryption ciphers

    Rust 201 20

  2. Audit Cargo.lock files for crates with security vulnerabilities

    Rust 729 34

  3. Application microframework with command-line option parsing, configuration, error handling, logging, and shell interactions

    Rust 444 28

  4. Hardware private key storage for next-generation cryptography (e.g. BLS) supporting USB armory MkII devices

    Rust 100 2

  5. Signed/Encrypted ARchive: always-encrypted tar-like archive tool with optional signature support

    Rust 335 6

  6. Security-oriented protobuf-like serialization format with "Merkleized" content hashing support

    Rust 101 6

Contribution activity

March 1, 2021

tarcieri has no activity yet for this period.

February 2021

Created 1 repository

Created a pull request in RustCrypto/hashes that received 12 comments

[WIP] blake2: integrate `blake2b_simd`/`blake2s_simd` crates

Integrates original sources from these crates, which provide AVX2-accelerated SIMD backends: https://github.com/oconnor663/blake2_simd Taken from t…

+27,604 −1,380 12 comments
Opened 157 other pull requests in 14 repositories
RustCrypto/utils
68 merged
RustCrypto/traits
28 merged 1 open
RustCrypto/elliptic-curves
20 merged
RustCrypto/password-hashes
16 merged 1 closed
RustCrypto/signatures
9 merged
RustSec/rustsec-crate
2 merged
RustCrypto/hashes
2 merged
RustCrypto/KDFs
2 merged
RustCrypto/block-ciphers
2 merged
RustSec/advisory-db
2 merged
miscreant/miscreant.rs
1 merged
RustCrypto/AEADs
1 merged
httprb/http
1 merged
hacspec/hacspec
1 merged

Created an issue in rust-lang/rust that received 14 comments

Add allow-by-default lints for all attributes with unsafe behaviors

In #72188, an allow-by-default lint was added against #[no_mangle], which previously permitted unsafety even in the event that #![forbid(unsafe_code)]

5 of 8 14 comments
1 contribution in private repositories Feb 16

Seeing something unexpected? Take a look at the GitHub profile guide.