From 477c5fb9f07be9ea0dad63323f5fd2f824bd0335 Mon Sep 17 00:00:00 2001 From: cameronvoell Date: Thu, 4 Apr 2024 07:16:30 -0700 Subject: [PATCH] temporary comment for testing --- openmls/src/group/public_group/validation.rs | 92 ++++++++++---------- 1 file changed, 46 insertions(+), 46 deletions(-) diff --git a/openmls/src/group/public_group/validation.rs b/openmls/src/group/public_group/validation.rs index 039ded3d28..20b127f8c8 100644 --- a/openmls/src/group/public_group/validation.rs +++ b/openmls/src/group/public_group/validation.rs @@ -295,52 +295,52 @@ impl PublicGroup { for leaf_node in leaf_nodes { // Check if the ciphersuite and the version of the group are // supported. - let capabilities = leaf_node.capabilities(); - if !capabilities - .ciphersuites() - .contains(&VerifiableCiphersuite::from(self.ciphersuite())) - || !capabilities.versions().contains(&self.version()) - { - return Err(ProposalValidationError::InsufficientCapabilities); - } - - // If there is a required capabilities extension, check if that one - // is supported. - if let Some(required_capabilities) = - self.group_context().extensions().required_capabilities() - { - // Check if all required capabilities are supported. - capabilities - .supports_required_capabilities(required_capabilities) - .map_err(|_| ProposalValidationError::InsufficientCapabilities)?; - } - - // Check that all extensions are contained in the capabilities. - if !capabilities.contain_extensions(leaf_node.extensions()) { - return Err(ProposalValidationError::InsufficientCapabilities); - } - - // Check that the capabilities contain the leaf node's credential type. - if !capabilities.contains_credential(&leaf_node.credential().credential_type()) { - return Err(ProposalValidationError::InsufficientCapabilities); - } - - // Check that the credential type is supported by all members of the group. - if !group_leaf_nodes.all(|node| { - node.capabilities() - .contains_credential(&leaf_node.credential().credential_type()) - }) { - return Err(ProposalValidationError::InsufficientCapabilities); - } - - // Check that the capabilities field of this LeafNode indicates - // support for all the credential types currently in use by other - // members. - if !group_leaf_nodes - .all(|node| capabilities.contains_credential(&node.credential().credential_type())) - { - return Err(ProposalValidationError::InsufficientCapabilities); - } + // let capabilities = leaf_node.capabilities(); + // if !capabilities + // .ciphersuites() + // .contains(&VerifiableCiphersuite::from(self.ciphersuite())) + // || !capabilities.versions().contains(&self.version()) + // { + // return Err(ProposalValidationError::InsufficientCapabilities); + // } + + // // If there is a required capabilities extension, check if that one + // // is supported. + // if let Some(required_capabilities) = + // self.group_context().extensions().required_capabilities() + // { + // // Check if all required capabilities are supported. + // capabilities + // .supports_required_capabilities(required_capabilities) + // .map_err(|_| ProposalValidationError::InsufficientCapabilities)?; + // } + + // // Check that all extensions are contained in the capabilities. + // if !capabilities.contain_extensions(leaf_node.extensions()) { + // return Err(ProposalValidationError::InsufficientCapabilities); + // } + + // // Check that the capabilities contain the leaf node's credential type. + // if !capabilities.contains_credential(&leaf_node.credential().credential_type()) { + // return Err(ProposalValidationError::InsufficientCapabilities); + // } + + // // Check that the credential type is supported by all members of the group. + // if !group_leaf_nodes.all(|node| { + // node.capabilities() + // .contains_credential(&leaf_node.credential().credential_type()) + // }) { + // return Err(ProposalValidationError::InsufficientCapabilities); + // } + + // // Check that the capabilities field of this LeafNode indicates + // // support for all the credential types currently in use by other + // // members. + // if !group_leaf_nodes + // .all(|node| capabilities.contains_credential(&node.credential().credential_type())) + // { + // return Err(ProposalValidationError::InsufficientCapabilities); + // } } Ok(()) }