Mats Erik Andersson scrisse: > I recently adopted the package and I have now implemented the > desired use of GnuTLS, but I could use a pointer as to the best > methods of provoking a failed TLS-handshake. I need this for the > in-depth testing of the new patch, but I do not find myself knowledged > in how one produces defective SSL/TLS exchanges. The successful ones > are easy enough using gnutls-cli or 'openssl s_client'. You may be interested in Mozilla's ssl test-suite: http://www.mozilla.org/projects/security/pki/pkcs11/netscape/ssltest.html Cheers, Luca -- .''`. ** Debian GNU/Linux ** | Luca Bruno (kaeso) : :' : The Universal O.S. | lucab (AT) debian.org `. `'` | GPG Key ID: 3BFB9FB3 `- http://www.debian.org | Debian GNU/Linux Developer
Attachment:
pgpwD5S8zdOHe.pgp
Description: PGP signature