Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
f6d3348b
Commit
f6d3348b
authored
Nov 17, 2009
by
Juan Lang
Committed by
Alexandre Julliard
Nov 18, 2009
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
crypt32: Partially implement checking name constraints with directory names.
parent
7c44544a
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
25 additions
and
0 deletions
+25
-0
chain.c
dlls/crypt32/chain.c
+25
-0
No files found.
dlls/crypt32/chain.c
View file @
f6d3348b
...
...
@@ -720,6 +720,28 @@ static BOOL ip_address_matches(const CRYPT_DATA_BLOB *constraint,
return
match
;
}
static
BOOL
directory_name_matches
(
const
CERT_NAME_BLOB
*
constraint
,
const
CERT_NAME_BLOB
*
name
)
{
CERT_NAME_INFO
*
constraintName
;
DWORD
size
;
BOOL
match
=
FALSE
;
if
(
CryptDecodeObjectEx
(
X509_ASN_ENCODING
,
X509_NAME
,
constraint
->
pbData
,
constraint
->
cbData
,
CRYPT_DECODE_ALLOC_FLAG
,
NULL
,
&
constraintName
,
&
size
))
{
DWORD
i
;
match
=
TRUE
;
for
(
i
=
0
;
match
&&
i
<
constraintName
->
cRDN
;
i
++
)
match
=
CertIsRDNAttrsInCertificateName
(
X509_ASN_ENCODING
,
CERT_CASE_INSENSITIVE_IS_RDN_ATTRS_FLAG
,
(
CERT_NAME_BLOB
*
)
name
,
&
constraintName
->
rgRDN
[
i
]);
LocalFree
(
constraintName
);
}
return
match
;
}
static
BOOL
alt_name_matches
(
const
CERT_ALT_NAME_ENTRY
*
name
,
const
CERT_ALT_NAME_ENTRY
*
constraint
,
DWORD
*
trustErrorStatus
)
{
...
...
@@ -746,6 +768,9 @@ static BOOL alt_name_matches(const CERT_ALT_NAME_ENTRY *name,
&
name
->
u
.
IPAddress
,
trustErrorStatus
);
break
;
case
CERT_ALT_NAME_DIRECTORY_NAME
:
match
=
directory_name_matches
(
&
constraint
->
u
.
DirectoryName
,
&
name
->
u
.
DirectoryName
);
break
;
default:
ERR
(
"name choice %d unsupported in this context
\n
"
,
constraint
->
dwAltNameChoice
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment