summaryrefslogtreecommitdiffstats
path: root/dirmngr/validate.c
diff options
context:
space:
mode:
authorWerner Koch <wk@gnupg.org>2022-02-27 12:11:23 +0100
committerWerner Koch <wk@gnupg.org>2022-02-27 12:26:38 +0100
commitb901e63b4d8cd5214eb97acfcce0fac532ea5300 (patch)
treea0c0e0fa0ba04a3f6670ac380259167507f9bec0 /dirmngr/validate.c
parentdirmngr: Support ECDSA for CRLs (diff)
downloadgnupg2-b901e63b4d8cd5214eb97acfcce0fac532ea5300.tar.xz
gnupg2-b901e63b4d8cd5214eb97acfcce0fac532ea5300.zip
dimngr: Do not check the self-signature of a root CA cert.
* dirmngr/validate.c (validate_cert_chain): Comment out that code.
Diffstat (limited to 'dirmngr/validate.c')
-rw-r--r--dirmngr/validate.c16
1 files changed, 8 insertions, 8 deletions
diff --git a/dirmngr/validate.c b/dirmngr/validate.c
index 881a982eb..c189ea918 100644
--- a/dirmngr/validate.c
+++ b/dirmngr/validate.c
@@ -551,14 +551,14 @@ validate_cert_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t r_exptime,
/* Is this a self-signed certificate? */
if (is_root_cert (subject_cert, issuer, subject))
{
- /* Yes, this is our trust anchor. */
- if (check_cert_sig (subject_cert, subject_cert) )
- {
- log_error (_("selfsigned certificate has a BAD signature"));
- err = gpg_error (depth? GPG_ERR_BAD_CERT_CHAIN
- : GPG_ERR_BAD_CERT);
- goto leave;
- }
+ /* There is no need to check the signature of the trust anchor. */
+ /* if (check_cert_sig (subject_cert, subject_cert) ) */
+ /* { */
+ /* log_error (_("selfsigned certificate has a BAD signature")); */
+ /* err = gpg_error (depth? GPG_ERR_BAD_CERT_CHAIN */
+ /* : GPG_ERR_BAD_CERT); */
+ /* goto leave; */
+ /* } */
/* Is this certificate allowed to act as a CA. */
err = allowed_ca (subject_cert, NULL);