Skip to content

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Sign in / Register
GnuTLS
GnuTLS
  • Project
    • Project
    • Details
    • Activity
    • Cycle Analytics
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Charts
    • Locked Files
  • Issues 118
    • Issues 118
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 9
    • Merge Requests 9
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
    • Charts
  • Wiki
    • Wiki
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Charts
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • gnutls
  • GnuTLSGnuTLS
  • Milestones
  • gnutls 3.6.x with TLS 1.3

Closed
Milestone Jun 15, 2017–Jul 25, 2018

gnutls 3.6.x with TLS 1.3

The tasks required to be completed to bring TLS 1.3 (1rtt) in GnuTLS.

https://tools.ietf.org/html/draft-ietf-tls-tls13-28

Some issues can’t be shown in the burndown chart, as they were closed on an older GitLab version before data was recorded. About burndown charts

Burndown chart

The tabs below will be removed in a future version

Learn more about issue boards, to keep track of issues in multiple lists, using labels, assignees, and milestones. If you’re missing something from issue boards, please create an issue on GitLab’s issue tracker.

  • Issues 81
  • Merge Requests 60
  • Participants 4
  • Labels 3
Unstarted Issues (open and unassigned)
0
Ongoing Issues (open and assigned)
0
Completed Issues (closed)
81
  • handle fragmented asynchronous handshake messages
    #510
  • post-handshake auth: test no re-authentication
    #507
  • post handshake authentication: verify that we tolerate application data before certificate is received
    #490
  • post-handshake authentication: verify that it works over PSK (and resumption) if allowed by the protocol
    #489
  • post-handshake authentication: interop test with openssl fails
    #488
  • key update: interop test with openssl fails
    #485
  • go through implementation notes
    #483
  • supplemental data: address operation under TLS1.3
    #479
  • session resumption: ensure that follow up sessions don't happen indefinitely
    #476
  • tls1.3: the pre-shared-key extension may not be the last
    #473
  • in HRR handshake CCS is sent at wrong time by gnutls
    #469
  • TLS1.3 safe removal of the padding imposes a significant performance penalty
    #466
  • TLS1.3: rename extension supported ECC to supported groups
    #451
  • psk: add deterministic detection of session tickets
    #450
  • handshake: there are no callbacks for asynchronous handshake messages
    #441
  • do not send TLS1.3 extensions under DTLS
    #440
  • Investigate TLS1.3 psk interop issue with openssl
    #427
  • reference counting of key material is incorrect under TLS1.3
    #421
  • TLS1.3 draft 26 interop
    #419
  • support PSK without DH or ECDH key exchange
    #414
  • testsuite: generic tests are split into TLS1.2 and TLS1.3 version
    #413
  • update to tlsfuzzer with tls1.3
    #411
  • draft-ietf-tls-tls13-26: supported_versions must not negotiate pre-TLS1.3
    #410
  • draft-ietf-tls-tls13-25: new AEAD data form
    #409
  • draft-ietf-tls-tls-24: hello retry request must retain supported_versions version
    #408
  • draft-ietf-tls-tls13-24: require the presence of supported versions
    #407
  • draft-ietf-tls-tls13-23: signature_algorithms: support rsa_pss_pss
    #400
  • draft-ietf-tls-tls13-23: renumber the key_share extension
    #398
  • draft-ietf-tls-tls13-24: follow the backwards compatibility appendix when needed
    #397
  • draft-ietf-tls-tls13-22: record legacy_record_version is for TLS1.2
    #396
  • draft-ietf-tls-tls13-22: add support for changecipherspec
    #395
  • draft-ietf-tls-tls13-22: resumption should not enforce SNI match
    #394
  • draft-ietf-tls-tls13-22: supported_versions extension is sent by server
    #393
  • draft-ietf-tls-tls13-22: supported versions should be sent in HelloRetryRequest
    #392
  • draft-ietf-tls-tls13-22: HelloRetryRequest has the format of serverhello
    #391
  • draft-ietf-tls-tls13-22: HelloRetryRequest random is fixed
    #390
  • draft-ietf-tls-tls13-22: add support for new server hello format
    #389
  • draft-ietf-tls-tls13-22: allow session resumption with different SNI
    #388
  • RFC: Enabling the various key exchange methods under TLS1.3
    #387
  • Rethink internal function _gnutls_psk_pwd_find_entry()
    #385
  • Elliptic curve group server precedence not possible
    #378
  • Add support for the latest/last TLS1.3 draft
    #343
  • Move the session ticket buffer outside of the TLS 1.2 session ticket extension
    #340 TLS
  • nss keylog file: write keys after key update
    #335
  • PRF backwards compatibility functions behavior under TLS1.3
    #330
  • enhance automated test suite against openssl 1.1.1
    #328
  • optional: ocsp transparent retrieval of responses
    #326
  • certificate message: generate OCSP status extension
    #307
  • Provide a consistent set of default ciphers across supported protocols
    #303
  • Verify that second client hello keeps the same random value
    #299
  • Support SSLKEYFILE env variable for tls 1.3
    #298
  • add test cases for received RDN sequence
    #297
  • create tests for TLS1.3 version rollback detection
    #293
  • certificate message: parse OCSP status extension
    #291
  • session resumption under TLS1.3
    #290
  • add rfc5705 key generation
    #289
  • reduce the need for multiple buffer structs
    #288
  • handle hello retry request
    #285
  • key share: add API to restrict/set the sent shares
    #284
  • handshake: reduce memory usage
    #281
  • handle extensions locally
    #279
  • add client certificate authentication
    #278 TLS
  • length hiding with TLS 1.3
    #276
  • add TLS 1.3 key derivation
    #273
  • add support for TLS 1.3 handshake process
    #254
  • add support for encrypted extensions
    #253
  • Continuously verify Ed25519 support in TLS
    #228
  • improve server/client fuzzying infrastructure
    #224
  • Add support for TLS 1.3 ECDSA signature algorithms
    #221
  • optional: Add support for post-handshake authentication
    #220
  • Add support for TLS Certificate Authorities extension [CertificateRequest]
    #219
  • Add support for TLS 1.3 cookie extension
    #218 TLS
  • Add support for TLS 1.3 basic extensions
    #217
  • Support TLS 1.3 Key and IV Update
    #131 DTLSTLS
  • Handle the key usage limits
    #130 DTLSTLS
  • Add support for TLS 1.3 Record format
    #129 DTLSTLS
  • Add support for TLS 1.3 Diffie-Hellman-PSK combo key exchange mode
    #126 DTLSTLS
  • Add support for TLS 1.3 PSK key exchange mode
    #125 DTLSTLS
  • Add support for TLS 1.3 Diffie-Hellman key exchange mode
    #124 DTLSTLS
  • Add support for HKDF in nettle
    #123 TLSnettle
  • Add support for draft-jay-tls-psk-identity-extension
    #66 DTLSTLS
100% complete
100%
Start date
Jun 15, 2017
Jun 15 2017
-
Jul 25 2018
Due date
Jul 25, 2018 (Past due)
81
Issues 81 New issue
Open: 0 Closed: 81
Time tracking
149
Total issue weight
149
60
Merge requests 60
Open: 0 Closed: 14 Merged: 46
Reference: gnutls/gnutls%"gnutls 3.6.x with TLS 1.3"