[gnutls-devel] GnuTLS | Implement new tls channel biding types (!1422)
Read-only notification of GnuTLS library development activities
gnutls-devel at lists.gnutls.org
Mon May 3 11:50:50 CEST 2021
Ruslan Marchenko commented on a discussion on tests/tls-channel-binding.c: https://gitlab.com/gnutls/gnutls/-/merge_requests/1422#note_565833675
> + success("binding fail: fake binding type not supported\n");
> +
> + /* tls-server-end-point testing, undefined for anon and psk */
> + if (check_binding_data(client, server, GNUTLS_CB_TLS_SERVER_END_POINT,
> + "tls-server-end-point", 1) == 0)
> + success("binding fail: tls-server-end-point invalid for anon\n");
> +
> + /* tls-exporter testing, take both sides and compare */
> + if (check_binding_data(client, server, GNUTLS_CB_TLS_EXPORTER,
> + "tls-exporter", 0) == 0)
> + success("binding match: tls-exporter\n");
> +
> + tls_clear_peers(client, server);
> +}
> +
> +void doit(void)
np, I put way too many assumptions/conditions there to feel comfortable without proof :)
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/merge_requests/1422#note_565833675
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20210503/953f9a00/attachment.html>
More information about the Gnutls-devel
mailing list