aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorNIIBE Yutaka <[email protected]>2022-08-26 00:24:00 +0000
committerNIIBE Yutaka <[email protected]>2022-08-26 00:24:00 +0000
commit0662b9444b5be61f6019ec301314f245c8f8fa3f (patch)
tree387a7ec7112be5e425bdde6872081645557a68b2
parentscd: Add npth_unprotect/npth_protect for blocking operations. (diff)
downloadgnupg-0662b9444b5be61f6019ec301314f245c8f8fa3f.tar.gz
gnupg-0662b9444b5be61f6019ec301314f245c8f8fa3f.zip
dirmngr: Reject certificate which is not valid into cache.
* dirmngr/certcache.c (put_cert): When PERMANENT, reject the certificate which is obviously invalid. -- With this change, invalid certificates from system won't be registered into cache. Then, an intermediate certificate which is issued by an entity certified by such an invalid certificate will be also rejected with GPG_ERR_INV_CERT_OBJ. With less invalid certificates in cache, it helps the validate_cert_chain function work better. GnuPG-bug-id: 6142 Signed-off-by: NIIBE Yutaka <[email protected]>
-rw-r--r--dirmngr/certcache.c14
1 files changed, 14 insertions, 0 deletions
diff --git a/dirmngr/certcache.c b/dirmngr/certcache.c
index 7f29ec859..30d4d89fa 100644
--- a/dirmngr/certcache.c
+++ b/dirmngr/certcache.c
@@ -271,6 +271,20 @@ put_cert (ksba_cert_t cert, int permanent, unsigned int trustclass,
cert_item_t ci;
fingerprint_list_t ignored;
+ if (permanent)
+ { /* Do a little validation. */
+ ksba_isotime_t not_after;
+ ksba_isotime_t current_time;
+
+ if (ksba_cert_get_validity (cert, 1, not_after))
+ return gpg_error (GPG_ERR_BAD_CERT);
+
+ gnupg_get_isotime (current_time);
+
+ if (*not_after && strcmp (current_time, not_after) > 0)
+ return gpg_error (GPG_ERR_CERT_EXPIRED);
+ }
+
fpr = fpr_buffer? fpr_buffer : &help_fpr_buffer;
/* If we already reached the caching limit, drop a couple of certs