[gnutls-devel] GnuTLS | Workaround for SChannel limitations (!1138)

Development of GNU's TLS library gnutls-devel at lists.gnutls.org
Thu Dec 26 20:14:38 CET 2019




Nikos Mavrogiannopoulos started a new discussion on lib/ext/signature.c: https://gitlab.com/gnutls/gnutls/merge_requests/1138#note_265171079

>  					&epriv);
>  	priv = epriv;
>  
> +#ifdef ENABLE_GOST
> +	/* Some (all SChannel) clients fail to send proper SigAlgs due to Micro$oft crazyness.
> +	 * Patch the extension for them.
> +	 */
> +	if (_gnutls_kx_is_vko_gost(kx_algorithm)) {
> +		bool found_gost = false;
> +
> +		/* If there was no SigAlgs at all */
> +		if (ret < 0 && _gnutls_version_has_selectable_sighash(ver)) {
> +			priv = gnutls_calloc(1, sizeof(*priv));

This should not be necessary if handled as fallback similarly to SHA1, right?

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/1138#note_265171079
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20191226/0042a5d2/attachment-0001.html>


More information about the Gnutls-devel mailing list