Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-cw
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-cw
Commits
25a8d301
Commit
25a8d301
authored
Oct 05, 2010
by
Juan Lang
Committed by
Alexandre Julliard
Oct 06, 2010
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
crypt32: Set correct error when encountering unsupported critical extensions in…
crypt32: Set correct error when encountering unsupported critical extensions in the base and SSL policy.
parent
5b79eb97
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
19 additions
and
1 deletion
+19
-1
chain.c
dlls/crypt32/chain.c
+18
-0
chain.c
dlls/crypt32/tests/chain.c
+1
-1
No files found.
dlls/crypt32/chain.c
View file @
25a8d301
...
...
@@ -2954,6 +2954,16 @@ static BOOL WINAPI verify_base_policy(LPCSTR szPolicyOID,
CERT_TRUST_IS_NOT_VALID_FOR_USAGE
,
&
pPolicyStatus
->
lChainIndex
,
&
pPolicyStatus
->
lElementIndex
);
}
if
(
!
pPolicyStatus
->
dwError
&&
pChainContext
->
TrustStatus
.
dwErrorStatus
&
CERT_TRUST_HAS_NOT_SUPPORTED_CRITICAL_EXT
&&
!
(
checks
&
CERT_CHAIN_POLICY_IGNORE_NOT_SUPPORTED_CRITICAL_EXT_FLAG
))
{
pPolicyStatus
->
dwError
=
CERT_E_CRITICAL
;
find_element_with_error
(
pChainContext
,
CERT_TRUST_HAS_NOT_SUPPORTED_CRITICAL_EXT
,
&
pPolicyStatus
->
lChainIndex
,
&
pPolicyStatus
->
lElementIndex
);
}
return
TRUE
;
}
...
...
@@ -3377,6 +3387,14 @@ static BOOL WINAPI verify_ssl_policy(LPCSTR szPolicyOID,
CERT_TRUST_IS_OFFLINE_REVOCATION
,
&
pPolicyStatus
->
lChainIndex
,
&
pPolicyStatus
->
lElementIndex
);
}
else
if
(
pChainContext
->
TrustStatus
.
dwErrorStatus
&
CERT_TRUST_HAS_NOT_SUPPORTED_CRITICAL_EXT
)
{
pPolicyStatus
->
dwError
=
CERT_E_CRITICAL
;
find_element_with_error
(
pChainContext
,
CERT_TRUST_HAS_NOT_SUPPORTED_CRITICAL_EXT
,
&
pPolicyStatus
->
lChainIndex
,
&
pPolicyStatus
->
lElementIndex
);
}
else
pPolicyStatus
->
dwError
=
NO_ERROR
;
/* We only need bother checking whether the name in the end certificate
...
...
dlls/crypt32/tests/chain.c
View file @
25a8d301
...
...
@@ -3964,7 +3964,7 @@ static const ChainPolicyCheck stanfordPolicyCheckWithoutMatchingName = {
static
const
ChainPolicyCheck
invalidExtensionPolicyCheck
=
{
{
sizeof
(
chain30
)
/
sizeof
(
chain30
[
0
]),
chain30
},
{
0
,
CERT_E_CRITICAL
,
0
,
1
,
NULL
},
NULL
,
TODO_ERROR
{
0
,
CERT_E_CRITICAL
,
0
,
1
,
NULL
},
NULL
,
0
};
static
const
ChainPolicyCheck
authenticodePolicyCheck
[]
=
{
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment