From: Jouni Malinen Date: Sat, 10 Jan 2015 22:57:33 +0000 (+0200) Subject: schannel: Reject subject_match, altsubject_match, suffix_match X-Git-Tag: hostap_2_4~457 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=d16694761a87ebb43b4af3d2b1ec40888c81f42f;p=thirdparty%2Fhostap.git schannel: Reject subject_match, altsubject_match, suffix_match Validation of these parameters has not been implemented with schannel. Instead of ignoring them silently, reject the configuration to avoid giving incorrect impression of the parameters being used if wpa_supplicant is built with schannel instead of the default OpenSSL. Signed-off-by: Jouni Malinen --- diff --git a/src/crypto/tls_schannel.c b/src/crypto/tls_schannel.c index 2c2daa8a8..e1d0f597f 100644 --- a/src/crypto/tls_schannel.c +++ b/src/crypto/tls_schannel.c @@ -692,6 +692,21 @@ int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn, if (conn == NULL) return -1; + if (params->subject_match) { + wpa_printf(MSG_INFO, "TLS: subject_match not supported"); + return -1; + } + + if (params->altsubject_match) { + wpa_printf(MSG_INFO, "TLS: altsubject_match not supported"); + return -1; + } + + if (params->suffix_match) { + wpa_printf(MSG_INFO, "TLS: suffix_match not supported"); + return -1; + } + if (global->my_cert_store == NULL && (global->my_cert_store = CertOpenSystemStore(0, TEXT("MY"))) == NULL) {