X-Git-Url: https://code.wpia.club/?a=blobdiff_plain;f=src%2Forg%2Fcacert%2Fgigi%2Fpages%2Faccount%2Fcerts%2FCertificateRequest.java;h=91c53bc2dd811dcb611e9e6d843cd6cf7221652d;hb=d7ca3ea303443dbe54163c06c2b097c8d14b6e6f;hp=43e4fbd8205591ef31639689995cc7786f67a8e3;hpb=0b0db3d1f59e3473fad2d8011f75552b7de1671e;p=gigi.git diff --git a/src/org/cacert/gigi/pages/account/certs/CertificateRequest.java b/src/org/cacert/gigi/pages/account/certs/CertificateRequest.java index 43e4fbd8..91c53bc2 100644 --- a/src/org/cacert/gigi/pages/account/certs/CertificateRequest.java +++ b/src/org/cacert/gigi/pages/account/certs/CertificateRequest.java @@ -58,7 +58,7 @@ import sun.security.x509.X500Name; public class CertificateRequest { - public static final String DEFAULT_CN = "CAcert WoT User"; + public static final String DEFAULT_CN = "SomeCA User"; public static final ObjectIdentifier OID_KEY_USAGE_SSL_SERVER = ObjectIdentifier.newInternal(new int[] { 1, 3, 6, 1, 5, 5, 7, 3, 1 @@ -336,18 +336,19 @@ public class CertificateRequest { try { DomainAssessment.checkCertifiableDomain(san.getName(), user.isInGroup(Group.CODESIGNING), false); valid = true; + if ( !valid || !CAA.verifyDomainAccess(owner, p, san.getName()) || (pDNS != null && !domainTemp.isMultiple())) { + // remove + } else { + if (pDNS == null) { + pDNS = san.getName(); + } + filteredSANs.add(san); + continue; + } } catch (GigiApiException e) { + error.mergeInto(e); valid = false; } - if ( !valid || !CAA.verifyDomainAccess(owner, p, san.getName()) || (pDNS != null && !domainTemp.isMultiple())) { - // remove - } else { - if (pDNS == null) { - pDNS = san.getName(); - } - filteredSANs.add(san); - continue; - } } } else if (san.getType() == SANType.EMAIL) { if (emailTemp != null && owner.isValidEmail(san.getName())) {