You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
BoringSSL has a fork of golang's tls implementation as well that it uses as a runner for it's test suite. There are a number of potential holes in uTls that could be plugged with implementations already written in this wrapper (certificate compression, channel ids, upcoming quic, etc). I'm still trying to understand exactly how this could work (still poking through utls to understand it), but it seems like a promising option to keep in sync as tls signatures change.
The text was updated successfully, but these errors were encountered:
blakebyrnes
changed the title
Consider forking/merging strategy for BoringSsl test runner
Consider forking/merging strategy for BoringSSL test runner
Apr 9, 2020
BoringSSL has a fork of golang's tls implementation as well that it uses as a runner for it's test suite. There are a number of potential holes in uTls that could be plugged with implementations already written in this wrapper (certificate compression, channel ids, upcoming quic, etc). I'm still trying to understand exactly how this could work (still poking through utls to understand it), but it seems like a promising option to keep in sync as tls signatures change.
The text was updated successfully, but these errors were encountered: