[gnutls-devel] GnuTLS | Add support for CNT_IMIT TLS 1.2 GOST cipher suite (!920)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Thu Sep 12 14:14:26 CEST 2019




Dmitry Eremin-Solenikov commented on a discussion on tests/tls12-server-kx-neg.c: https://gitlab.com/gnutls/gnutls/merge_requests/920#note_216237651

> +		.server_prio = "NORMAL:-KX-ALL:+VKO-GOST-12:-VERS-ALL:+VERS-TLS1.2",
> +		.client_prio = "NORMAL:-KX-ALL:+VKO-GOST-12:-VERS-ALL:+VERS-TLS1.2"
> +	},
> +	{
> +		.name = "TLS 1.2 VKO-GOST-12 with cred and GOST12-512 cert",
> +		.server_ret = 0,
> +		.client_ret = 0,
> +		.have_cert_cred = 1,
> +		.have_gost12_512_cert = 1,
> +		.not_on_fips = 1,
> +		.server_prio = "NORMAL:-KX-ALL:+VKO-GOST-12:-VERS-ALL:+VERS-TLS1.2",
> +		.client_prio = "NORMAL:-KX-ALL:+VKO-GOST-12:-VERS-ALL:+VERS-TLS1.2"
> +	},
> +	{
> +		.name = "TLS 1.2 VKO-GOST-12 with cred and multiple certs",
> +		.server_ret = 0,

@nmav there are several tests for TLS 1.2 + TLS 1.3 connection using GOST in `tls13-server-kx-neg`. Do they cover usecases you were thinking about? For now I think those usecases represent lesser evil.

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/920#note_216237651
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190912/57b81b80/attachment-0001.html>


More information about the Gnutls-devel mailing list