]> git.ipfire.org Git - thirdparty/FORT-validator.git/commit
Verify the signature on a self-signed TA cert against it's own pubkey 138/head
authorJob Snijders <job@sobornost.net>
Fri, 7 Jun 2024 17:09:44 +0000 (17:09 +0000)
committerJob Snijders <job@sobornost.net>
Fri, 7 Jun 2024 17:31:08 +0000 (17:31 +0000)
commit5b707aa041348856d58a7a27992ee4d5a5f43551
tree9229ed96f7111f510905add69f86038150040a76
parentcdf9248f87a93f710f3df710bebe13a159483798
Verify the signature on a self-signed TA cert against it's own pubkey

X509_verify_cert() doesn't check the purported root certificate itself
unless X509_V_FLAG_CHECK_SS_SIGNATURE is set.

The pubkey was compared against the TAL, so check that the signature is
right as required by RFC 6487, section 7, additional condition 1,
applied to self-issued certs.

The error check looks weird, but OpenSSL 3 broke yet another API.

With help from Theo Buehler and Claudio Jeker
src/object/certificate.c