Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-cw
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-cw
Commits
c464875a
Commit
c464875a
authored
Nov 17, 2009
by
Juan Lang
Committed by
Alexandre Julliard
Nov 18, 2009
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
crypt32: Accept a certificate if its name matches any permitted subtree of a name constraint.
parent
d6f7d06c
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
11 additions
and
8 deletions
+11
-8
chain.c
dlls/crypt32/chain.c
+11
-8
No files found.
dlls/crypt32/chain.c
View file @
c464875a
...
@@ -987,18 +987,21 @@ static void compare_subject_with_constraints(const CERT_NAME_BLOB *subjectName,
...
@@ -987,18 +987,21 @@ static void compare_subject_with_constraints(const CERT_NAME_BLOB *subjectName,
*
trustErrorStatus
|=
*
trustErrorStatus
|=
CERT_TRUST_HAS_EXCLUDED_NAME_CONSTRAINT
;
CERT_TRUST_HAS_EXCLUDED_NAME_CONSTRAINT
;
}
}
for
(
i
=
0
;
i
<
nameConstraints
->
cPermittedSubtree
;
i
++
)
if
(
nameConstraints
->
cPermittedSubtree
)
{
{
CERT_ALT_NAME_ENTRY
*
constraint
=
BOOL
match
=
FALSE
;
&
nameConstraints
->
rgPermittedSubtree
[
i
].
Base
;
if
(
constraint
->
dwAltNameChoice
==
CERT_ALT_NAME_DIRECTORY_NAME
)
for
(
i
=
0
;
!
match
&&
i
<
nameConstraints
->
cPermittedSubtree
;
i
++
)
{
{
if
(
!
directory_name_matches
(
&
constraint
->
u
.
DirectoryName
,
CERT_ALT_NAME_ENTRY
*
constraint
=
subjectName
))
&
nameConstraints
->
rgPermittedSubtree
[
i
].
Base
;
*
trustErrorStatus
|=
CERT_TRUST_HAS_NOT_PERMITTED_NAME_CONSTRAINT
;
if
(
constraint
->
dwAltNameChoice
==
CERT_ALT_NAME_DIRECTORY_NAME
)
match
=
directory_name_matches
(
&
constraint
->
u
.
DirectoryName
,
subjectName
);
}
}
if
(
!
match
)
*
trustErrorStatus
|=
CERT_TRUST_HAS_NOT_PERMITTED_NAME_CONSTRAINT
;
}
}
}
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment