Welcome to the wolfSSL Forums. Could you tell us a bit about your project using wolfSSL and where you are located for our support records?
>> answered in PM
Thanks for quick response.
Can you please give me some details on item #1/2. I see TLS1.2/1.3 RFC. It says rootCA on server response is a "MAY" but it has underlying assumption that client device already possess root CA in order to validate.
so you are saying that by enabling " WOLFSSL_ALT_CERT_CHAINS" we technically avoid storing "A(root cert)" and store either B or C in our device and and still validate the chain. Is that correct? (though it is not default logic and not as stringent).
Are there any security issues with doing this?
certificate_list
This is a sequence (chain) of certificates. The sender's
certificate MUST come first in the list. Each following
certificate MUST directly certify the one preceding it. Because
certificate validation requires that root keys be distributed
independently, the self-signed certificate that specifies the root
certificate authority MAY be omitted from the chain, under the
assumption that the remote end must already possess it in order to
validate it in any case.