schannel: Reject subject_match, altsubject_match, suffix_match
Validation of these parameters has not been implemented with schannel. Instead of ignoring them silently, reject the configuration to avoid giving incorrect impression of the parameters being used if wpa_supplicant is built with schannel instead of the default OpenSSL. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
59051f8ecf
commit
d16694761a
1 changed files with 15 additions and 0 deletions
|
@ -692,6 +692,21 @@ int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
|
||||||
if (conn == NULL)
|
if (conn == NULL)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
|
if (params->subject_match) {
|
||||||
|
wpa_printf(MSG_INFO, "TLS: subject_match not supported");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (params->altsubject_match) {
|
||||||
|
wpa_printf(MSG_INFO, "TLS: altsubject_match not supported");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (params->suffix_match) {
|
||||||
|
wpa_printf(MSG_INFO, "TLS: suffix_match not supported");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
if (global->my_cert_store == NULL &&
|
if (global->my_cert_store == NULL &&
|
||||||
(global->my_cert_store = CertOpenSystemStore(0, TEXT("MY"))) ==
|
(global->my_cert_store = CertOpenSystemStore(0, TEXT("MY"))) ==
|
||||||
NULL) {
|
NULL) {
|
||||||
|
|
Loading…
Reference in a new issue