[gnutls-devel] GnuTLS | Do not forbid excess random padding in TLS1.x CBC ciphersuites (!1054)
Development of GNU's TLS library
gnutls-devel at lists.gnutls.org
Thu Sep 5 20:42:49 CEST 2019
Merge request https://gitlab.com/gnutls/gnutls/merge_requests/1054 was reviewed by Hubert Kario (@mention me if you need reply)
--
Hubert Kario (@mention me if you need reply) started a new discussion on tests/suite/testcompat-oldgnutls.sh: https://gitlab.com/gnutls/gnutls/merge_requests/1054#note_213085855
> + echo >>${TMPFILE}
> + ${VALGRIND} "${CLI}" -d 6 ${DEBUG} -p "${PORT}" 127.0.0.1 --priority "NONE:+AES-128-CBC:+SIGN-ALL:+COMP-NULL:+MAC-ALL:+VERS-TLS1.2:+RSA${ADD}" --insecure --x509certfile "${CLI_CERT}" --x509keyfile "${CLI_KEY}" <${TMPFILE} >/dev/null ||
> + fail ${PID} "Failed"
wouldn't be a good idea to test with cipher that uses SHA258 or SHA384 HMAC?
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/1054
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190905/6c90eea3/attachment.html>
More information about the Gnutls-devel
mailing list