I am using the above to build https requests.
Unfortunately, OpenSSL has been changed yet again, insisting on longer keys, which the site that I am connecting to does not support. A common problem, I imagine.
I have been told that using an https switch --ciphers 'DEFAULT:!DH' might fix this.
Whereas I can do this perfectly well when building wget requests manually, the 'very helpful' Request::builder() does not seem to have any facility for setting these switches. At least not one that I can see in the documentation.
Any advice on how to get around this problem? Short of making system calls to shell files, thus, in effect, giving up on Rust?
Usually for things like this I'll reach for something like reqwest which is a high level web client that papers over the annoyances of OpenSSL and the myriad of different ways you can do TLS on the different platforms.
I don't see how this will help...
If you want to not go through hyper and mess about with the various ways OpenSSL is configured, how about using libcurl? It fills the same niche as reqwest (high level wrapper that abstracts over the transport mechanism), and will probably feel familiar if you've used libcurl in C...
It's also been around for ages, so I'm sure there'll be all the knobs and levers you need to tweak how TLS is done.
The --cipher thing is probably a wget specific feature, and reqwest probably handles choosing ciphers differently, so the question is if reqwest can use the specific cipher. Maybe it works by default, but if not, you would configure the tls settings here.