<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html lang="en">
<head>
<meta content="text/html; charset=US-ASCII" http-equiv="Content-Type">
<title>
GitLab
</title>


<style>img {
max-width: 100%; height: auto;
}
</style>
</head>
<body>
<div class="content">

<p class="details" style="font-style: italic; color: #777;">
<a href="https://gitlab.com/nmav">Nikos Mavrogiannopoulos</a> created an issue:
</p>
<div></div>
<p dir="auto">According to <a href="https://tools.ietf.org/html/rfc8446#section-4.4.2.1" rel="nofollow noreferrer noopener" target="_blank">TLS1.3</a> a server can request a client to send OCSP staples during the CertificateVerify by sending an empty "status_request" extension. However we seem to be sending such OCSP staples even when this extension is not present (see <code>tests/tls13/ocsp-client.c</code>).</p>

</div>
<div class="footer" style="margin-top: 10px;">
<p style="font-size: small; color: #777;">

<br>
Reply to this email directly or <a href="https://gitlab.com/gnutls/gnutls/issues/876">view it on GitLab</a>.
<br>
You're receiving this email because of your account on gitlab.com.
If you'd like to receive fewer emails, you can
<a href="https://gitlab.com/sent_notifications/caa68633f685ee0ed5e8643e4ef9cab4/unsubscribe">unsubscribe</a>
from this thread or
adjust your notification settings.
<script type="application/ld+json">{"@context":"http://schema.org","@type":"EmailMessage","action":{"@type":"ViewAction","name":"View Issue","url":"https://gitlab.com/gnutls/gnutls/issues/876"}}</script>


</p>
</div>
</body>
</html>