[PATCH] tls_openssl: Enable leaf certficate time validity check when no CA is configured

Rathan Appana rathanappana at gmail.com
Thu Sep 25 09:17:45 PDT 2025


When ca_cert_verify=0 (CA is not configured) the callback overrides all OpenSSL errors,
including time validity. Add an explicit leaf (depth 0) check and do not overrides X509_V_ERR_CERT_HAS_EXPIRED/NOT_YET_VALID, unless TLS_CONN_DISABLE_TIME_CHECKS is set.

This preserves the existing behavior of ignoring chain/issuer errors in no-CA mode; pinning/CRL/OCSP/name checks are unchanged.

Signed-off-by: Rathan Appana <rathanappana at gmail.com>
---
 src/crypto/tls_openssl.c | 18 +++++++++++++++++-
 1 file changed, 17 insertions(+), 1 deletion(-)

diff --git a/src/crypto/tls_openssl.c b/src/crypto/tls_openssl.c
index eab43df39..518d06ae8 100644
--- a/src/crypto/tls_openssl.c
+++ b/src/crypto/tls_openssl.c
@@ -2694,7 +2694,23 @@ static int tls_verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx)
 	suffix_match = conn->suffix_match;
 	domain_match = conn->domain_match;
 
-	if (!preverify_ok && !conn->ca_cert_verify)
+	if(!conn->ca_cert_verify && depth == 0 &&
+		!(conn->flags & TLS_CONN_DISABLE_TIME_CHECKS)) {
+        if (X509_cmp_current_time(X509_get_notBefore(err_cert)) > 0) {
+            wpa_printf(MSG_WARNING, "TLS: Server certificate is not valid at the current time");
+            err = X509_V_ERR_CERT_NOT_YET_VALID;
+            preverify_ok = 0;
+            X509_STORE_CTX_set_error(x509_ctx, err);
+        } else if (X509_cmp_current_time(X509_get_notAfter(err_cert)) < 0) {
+            wpa_printf(MSG_WARNING, "TLS: Server certificate has expired");
+            err = X509_V_ERR_CERT_HAS_EXPIRED;
+            X509_STORE_CTX_set_error(x509_ctx, err);
+            preverify_ok = 0;
+        }
+    }
+
+	if (!preverify_ok && !conn->ca_cert_verify &&
+		!(err == X509_V_ERR_CERT_HAS_EXPIRED || err == X509_V_ERR_CERT_NOT_YET_VALID))
 		preverify_ok = 1;
 	if (!preverify_ok && depth > 0 && conn->server_cert_only)
 		preverify_ok = 1;
-- 
2.51.0




More information about the Hostap mailing list