#oblivious #hpke #nss #primitive #ietf #http #chacha20

bitcoin-ohttp

Oblivious HTTP over secp256k1 and ChaCha20Poly1305

1 unstable release

0.6.0 Sep 4, 2024

#9 in #nss

Download history 75/week @ 2024-08-29 138/week @ 2024-09-05 27/week @ 2024-09-12 17/week @ 2024-09-19 45/week @ 2024-09-26 74/week @ 2024-10-03 119/week @ 2024-10-10 150/week @ 2024-10-17 83/week @ 2024-10-24 46/week @ 2024-10-31 166/week @ 2024-11-07 66/week @ 2024-11-14 129/week @ 2024-11-21 161/week @ 2024-11-28

529 downloads per month
Used in 2 crates

MIT/Apache

140KB
3.5K SLoC

Oblivious HTTP

This is a rust implementation of Oblivious HTTP.

This work is undergoing active revision in the IETF and so are these implementations. Use at your own risk.

This crate uses either hpke or NSS for cryptographic primitives.

Using

The API documentation is currently sparse, but the API is fairly small and descriptive.

The ohttp crate has the following features:

  • client enables the client-side processing of oblivious HTTP messages: encrypting requests and decrypting responses. This is enabled by default.

  • server enables the server-side processing of oblivious HTTP messages: decrypting requests and encrypting responses. This is enabled by default.

  • rust-hpke selects the hpke crate for HPKE encryption. This is enabled by default and cannot be enabled at the same time as nss.

  • nss selects NSS. This is disabled by default and cannot be enabled at the same time as rust-hpke.

Dependencies

~0.4–4.5MB
~59K SLoC