diff options
author | Werner Koch <wk@gnupg.org> | 2022-02-27 12:11:23 +0100 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2022-02-27 12:26:38 +0100 |
commit | b901e63b4d8cd5214eb97acfcce0fac532ea5300 (patch) | |
tree | a0c0e0fa0ba04a3f6670ac380259167507f9bec0 /dirmngr/validate.c | |
parent | dirmngr: Support ECDSA for CRLs (diff) | |
download | gnupg2-b901e63b4d8cd5214eb97acfcce0fac532ea5300.tar.xz gnupg2-b901e63b4d8cd5214eb97acfcce0fac532ea5300.zip |
dimngr: Do not check the self-signature of a root CA cert.
* dirmngr/validate.c (validate_cert_chain): Comment out that code.
Diffstat (limited to 'dirmngr/validate.c')
-rw-r--r-- | dirmngr/validate.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/dirmngr/validate.c b/dirmngr/validate.c index 881a982eb..c189ea918 100644 --- a/dirmngr/validate.c +++ b/dirmngr/validate.c @@ -551,14 +551,14 @@ validate_cert_chain (ctrl_t ctrl, ksba_cert_t cert, ksba_isotime_t r_exptime, /* Is this a self-signed certificate? */ if (is_root_cert (subject_cert, issuer, subject)) { - /* Yes, this is our trust anchor. */ - if (check_cert_sig (subject_cert, subject_cert) ) - { - log_error (_("selfsigned certificate has a BAD signature")); - err = gpg_error (depth? GPG_ERR_BAD_CERT_CHAIN - : GPG_ERR_BAD_CERT); - goto leave; - } + /* There is no need to check the signature of the trust anchor. */ + /* if (check_cert_sig (subject_cert, subject_cert) ) */ + /* { */ + /* log_error (_("selfsigned certificate has a BAD signature")); */ + /* err = gpg_error (depth? GPG_ERR_BAD_CERT_CHAIN */ + /* : GPG_ERR_BAD_CERT); */ + /* goto leave; */ + /* } */ /* Is this certificate allowed to act as a CA. */ err = allowed_ca (subject_cert, NULL); |