Hello Christian,

if you are at it, please consider adding GNUTLS_ENABLE_EARLY_DATA as
well. That allows the server to accept 0-RTT packets for TLS 1.3 -
something we would like to test as well with Wget2.

GNUTLS_ENABLE_EARLY_DATA: since 3.6.5
GNUTLS_POST_HANDSHAKE_AUTH: since 3.6.3

Regards, Tim

On 14.04.19 11:24, Kumar Mallikarjuna wrote:
> Hi again,
> 
> It appears that during GnuTLS session initialization, we need to pass a
> flag, namely |GNUTLS_POST_HANDSHAKE_AUTH, so| that the TLS server is
> capable of using the said feature.
> For that, I think for that MHD's code might need to be modified. If
> there is a workaround please let me know.
> 
> Thanking you,
> Kumar Mallikarjuna
> 
> On Sat, Apr 13, 2019 at 9:21 PM Kumar Mallikarjuna
> <[email protected] <mailto:[email protected]>> wrote:
> 
>     image.gif
>     Oh, okay. Thanks!
> 
>     Regards,
>     Kumar Mallikarjuna
> 
>     On Sat, Apr 13, 2019 at 9:03 PM Christian Grothoff
>     <[email protected] <mailto:[email protected]>> wrote:
> 
>         This is TLS-specific, you should ask on the GnuTLS mailinglist.
>         MHD can
>         give you the GnuTLS handle, if GnuTLS has an API for it, then it is
>         supported...
> 
>         Happy hacking!
> 
>         Christian
> 
>         On 4/13/19 5:18 PM, Kumar Mallikarjuna wrote:
>         > Hi everyone,
>         >
>         > Can anyone let me know if libmicrohttpd currently supports
>         > Post-Handshake Authentication
>         > <https://tools.ietf.org/html/draft-ietf-tls-tls13-28#page-78>
>         for TLS 1.3?
>         >
>         > Thank you!
>         >
>         > Best regards,
>         > Kumar Mallikarjuna
> 

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to