Hello Christian, if you are at it, please consider adding GNUTLS_ENABLE_EARLY_DATA as well. That allows the server to accept 0-RTT packets for TLS 1.3 - something we would like to test as well with Wget2.
GNUTLS_ENABLE_EARLY_DATA: since 3.6.5 GNUTLS_POST_HANDSHAKE_AUTH: since 3.6.3 Regards, Tim On 14.04.19 11:24, Kumar Mallikarjuna wrote: > Hi again, > > It appears that during GnuTLS session initialization, we need to pass a > flag, namely |GNUTLS_POST_HANDSHAKE_AUTH, so| that the TLS server is > capable of using the said feature. > For that, I think for that MHD's code might need to be modified. If > there is a workaround please let me know. > > Thanking you, > Kumar Mallikarjuna > > On Sat, Apr 13, 2019 at 9:21 PM Kumar Mallikarjuna > <[email protected] <mailto:[email protected]>> wrote: > > image.gif > Oh, okay. Thanks! > > Regards, > Kumar Mallikarjuna > > On Sat, Apr 13, 2019 at 9:03 PM Christian Grothoff > <[email protected] <mailto:[email protected]>> wrote: > > This is TLS-specific, you should ask on the GnuTLS mailinglist. > MHD can > give you the GnuTLS handle, if GnuTLS has an API for it, then it is > supported... > > Happy hacking! > > Christian > > On 4/13/19 5:18 PM, Kumar Mallikarjuna wrote: > > Hi everyone, > > > > Can anyone let me know if libmicrohttpd currently supports > > Post-Handshake Authentication > > <https://tools.ietf.org/html/draft-ietf-tls-tls13-28#page-78> > for TLS 1.3? > > > > Thank you! > > > > Best regards, > > Kumar Mallikarjuna >
signature.asc
Description: OpenPGP digital signature
