Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
54429016
Commit
54429016
authored
Sep 29, 2010
by
Juan Lang
Committed by
Alexandre Julliard
Sep 30, 2010
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
crypt32/tests: Test more SECURITY_FLAG_IGNORE flags for the SSL policy.
parent
637fd373
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
25 additions
and
0 deletions
+25
-0
chain.c
dlls/crypt32/tests/chain.c
+25
-0
No files found.
dlls/crypt32/tests/chain.c
View file @
54429016
...
...
@@ -3788,11 +3788,21 @@ static const ChainPolicyCheck sslPolicyCheck[] = {
{
0
,
CERT_E_UNTRUSTEDROOT
,
0
,
0
,
NULL
},
NULL
,
0
},
};
static
const
ChainPolicyCheck
ignoredUnknownCAPolicyCheck
=
{
{
sizeof
(
chain0
)
/
sizeof
(
chain0
[
0
]),
chain0
},
{
0
,
CERT_E_EXPIRED
,
0
,
0
,
NULL
},
NULL
,
TODO_ERROR
};
static
const
ChainPolicyCheck
googlePolicyCheckWithMatchingNameExpired
=
{
{
sizeof
(
googleChain
)
/
sizeof
(
googleChain
[
0
]),
googleChain
},
{
0
,
CERT_E_EXPIRED
,
0
,
0
,
NULL
},
NULL
,
0
};
static
const
ChainPolicyCheck
googlePolicyCheckWithMatchingNameIgnoringExpired
=
{
{
sizeof
(
googleChain
)
/
sizeof
(
googleChain
[
0
]),
googleChain
},
{
0
,
0
,
-
1
,
-
1
,
NULL
},
NULL
,
TODO_ERROR
};
static
const
ChainPolicyCheck
googlePolicyCheckWithMatchingName
=
{
{
sizeof
(
googleChain
)
/
sizeof
(
googleChain
[
0
]),
googleChain
},
{
0
,
0
,
-
1
,
-
1
,
NULL
},
NULL
,
0
...
...
@@ -4131,10 +4141,25 @@ static void check_ssl_policy(void)
*/
checkChainPolicyStatus
(
CERT_CHAIN_POLICY_SSL
,
NULL
,
&
iTunesPolicyCheckWithoutMatchingName
,
0
,
&
oct2007
,
&
policyPara
);
/* And again, specifying a chain with an untrusted root, but ignoring
* unknown CAs.
*/
sslPolicyPara
.
fdwChecks
=
SECURITY_FLAG_IGNORE_UNKNOWN_CA
;
checkChainPolicyStatus
(
CERT_CHAIN_POLICY_SSL
,
NULL
,
&
ignoredUnknownCAPolicyCheck
,
0
,
&
oct2007
,
&
policyPara
);
sslPolicyPara
.
fdwChecks
=
0
;
/* And again, but checking the Google chain at a bad date */
sslPolicyPara
.
pwszServerName
=
google_dot_com
;
checkChainPolicyStatus
(
CERT_CHAIN_POLICY_SSL
,
NULL
,
&
googlePolicyCheckWithMatchingNameExpired
,
0
,
&
oct2007
,
&
policyPara
);
/* Again checking the Google chain at a bad date, but ignoring date
* errors.
*/
sslPolicyPara
.
fdwChecks
=
SECURITY_FLAG_IGNORE_CERT_DATE_INVALID
;
checkChainPolicyStatus
(
CERT_CHAIN_POLICY_SSL
,
NULL
,
&
googlePolicyCheckWithMatchingNameIgnoringExpired
,
0
,
&
oct2007
,
&
policyPara
);
sslPolicyPara
.
fdwChecks
=
0
;
/* And again, but checking the Google chain at a good date */
sslPolicyPara
.
pwszServerName
=
google_dot_com
;
checkChainPolicyStatus
(
CERT_CHAIN_POLICY_SSL
,
NULL
,
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment