[gnutls-devel] GnuTLS | Do not forbid excess random padding in TLS1.x CBC ciphersuites (!1054)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Thu Sep 5 20:42:49 CEST 2019



Merge request https://gitlab.com/gnutls/gnutls/merge_requests/1054 was reviewed by Hubert Kario (@mention me if you need reply)

--
  
Hubert Kario (@mention me if you need reply) started a new discussion on tests/suite/testcompat-oldgnutls.sh: https://gitlab.com/gnutls/gnutls/merge_requests/1054#note_213085855

> +	echo >>${TMPFILE}
> +	${VALGRIND} "${CLI}" -d 6 ${DEBUG} -p "${PORT}" 127.0.0.1 --priority "NONE:+AES-128-CBC:+SIGN-ALL:+COMP-NULL:+MAC-ALL:+VERS-TLS1.2:+RSA${ADD}" --insecure --x509certfile "${CLI_CERT}" --x509keyfile "${CLI_KEY}" <${TMPFILE} >/dev/null ||
> +		fail ${PID} "Failed"

wouldn't be a good idea to test with cipher that uses SHA258 or SHA384 HMAC?


-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/1054
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190905/6c90eea3/attachment.html>


More information about the Gnutls-devel mailing list