[gnutls-devel] GnuTLS | Workaround for SChannel limitations (!1138)
Development of GNU's TLS library
gnutls-devel at lists.gnutls.org
Thu Dec 26 20:14:38 CET 2019
Nikos Mavrogiannopoulos started a new discussion on lib/ext/signature.c: https://gitlab.com/gnutls/gnutls/merge_requests/1138#note_265171079
> &epriv);
> priv = epriv;
>
> +#ifdef ENABLE_GOST
> + /* Some (all SChannel) clients fail to send proper SigAlgs due to Micro$oft crazyness.
> + * Patch the extension for them.
> + */
> + if (_gnutls_kx_is_vko_gost(kx_algorithm)) {
> + bool found_gost = false;
> +
> + /* If there was no SigAlgs at all */
> + if (ret < 0 && _gnutls_version_has_selectable_sighash(ver)) {
> + priv = gnutls_calloc(1, sizeof(*priv));
This should not be necessary if handled as fallback similarly to SHA1, right?
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/1138#note_265171079
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20191226/0042a5d2/attachment-0001.html>
More information about the Gnutls-devel
mailing list