There are a lot of rebase artifacts here, but it looks good.  The PR
does beg the question though: how does one verify the signature and
with what key?

On 29 December 2016 at 02:50, Guballa Jens (ETAS-PSC/ECS)
<[email protected]> wrote:
> Hi,
>
> here is another PR: https://github.com/tlswg/tls13-spec/pull/838
>
> The client should be required to verify the CertificateVerify message. In 
> addition I prefer to specify the alert type in case the verification fails 
> (also for the Finished).
>
> Thanks,
> Jens
>
> _______________________________________________
> TLS mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to