[gnutls-devel] GnuTLS | Add GOST-CNT ciphersuite support (!1119)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Wed Nov 13 13:45:34 CET 2019




Dmitry Eremin-Solenikov commented on a discussion on tests/tls13-server-kx-neg.c: https://gitlab.com/gnutls/gnutls/merge_requests/1119#note_243994597

> +	},
> +	{
> +		.name = "TLS 1.2 server TLS 1.3 client with cred and GOST-512 cert",
> +		.server_ret = 0,
> +		.client_ret = 0,
> +		.have_cert_cred = 1,
> +		.have_gost12_512_cert = 1,
> +		.not_on_fips = 1,
> +		.server_prio = "NORMAL:-KX-ALL:+VKO-GOST-12:" "-VERS-ALL:+VERS-TLS1.2",
> +		.client_prio = "NORMAL:-KX-ALL:+VKO-GOST-12:"PVERSION,
> +		.exp_version = GNUTLS_TLS1_2,
> +	},
> +	/* Ideally for the next two test cases we should fallback to TLS 1.2 + GOST
> +	 * but this is unsuppored for now */
> +	{
> +		.name = "TLS 1.3 server and client VKO-GOST-12 with cred and GOST-256 cert",

I have been thinking about this for quite some time. Just disabling TLS1.3 if GOST ciphersuite is enabled leads to lots of failures if/once GOST is a part of default setup. For now I've just failed to create a proper list of all possible setups and 'best' outcomes. I plan to return to that while actually implementing GOST TLS 1.3 support (which will use a completely different ciphersuite).

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/1119#note_243994597
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20191113/d57b2d17/attachment.html>


More information about the Gnutls-devel mailing list