[gnutls-devel] GnuTLS | Apparent failure to accept SHA1 signature of root CA when using SECURE256 (#1348)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Wed Mar 30 13:08:31 CEST 2022




Richard Frith-Macdonald commented:


Running under gdb I find that after the log
  issuer in verification was not found or insecure; trying against trust list
the code calls
                *voutput =
                    _gnutls_verify_crt_status(list, cert_list, cert_list_size,
                                              list->node[hash].trusted_cas,
                                              list->node[hash].trusted_ca_size,
                                              flags, purpose, func);
but in that function tcas_size is 1 and trusted_cas[0]->raw_dn show's it's not the the root certificate we are interested in, so I don't understand how this can be trying against the trust list.

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1348#note_894293704
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20220330/0b5d741d/attachment.html>


More information about the Gnutls-devel mailing list