[gnutls-devel] GnuTLS | Implement new tls channel biding types (!1422)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Mon May 3 11:50:50 CEST 2021




Ruslan Marchenko commented on a discussion on tests/tls-channel-binding.c: https://gitlab.com/gnutls/gnutls/-/merge_requests/1422#note_565833675

> +		success("binding fail: fake binding type not supported\n");
> +
> +	/* tls-server-end-point testing, undefined for anon and psk */
> +	if (check_binding_data(client, server, GNUTLS_CB_TLS_SERVER_END_POINT,
> +				"tls-server-end-point", 1) == 0)
> +		success("binding fail: tls-server-end-point invalid for anon\n");
> +
> +	/* tls-exporter testing, take both sides and compare */
> +	if (check_binding_data(client, server, GNUTLS_CB_TLS_EXPORTER,
> +				"tls-exporter", 0) == 0)
> +		success("binding match: tls-exporter\n");
> +
> +	tls_clear_peers(client, server);
> +}
> +
> +void doit(void)

np, I put way too many assumptions/conditions there to feel comfortable without proof :)

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/merge_requests/1422#note_565833675
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20210503/953f9a00/attachment.html>


More information about the Gnutls-devel mailing list