summaryrefslogtreecommitdiffstats
path: root/net/base/cert_status_flags.cc
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-08-14 23:49:19 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-08-14 23:49:19 +0000
commit0374b299997a8bd265a7f79cc06f79e7892a0ac7 (patch)
treee6df89d8a3dd741026b39442ffed95b30835b075 /net/base/cert_status_flags.cc
parentb31844be04ffac8e67d5f302c3bad5b28e1dec79 (diff)
downloadchromium_src-0374b299997a8bd265a7f79cc06f79e7892a0ac7.zip
chromium_src-0374b299997a8bd265a7f79cc06f79e7892a0ac7.tar.gz
chromium_src-0374b299997a8bd265a7f79cc06f79e7892a0ac7.tar.bz2
Add new certificate error code
ERR_CERT_WEAK_SIGNATURE_ALGORITHM and certificate status flag CERT_STATUS_WEAK_SIGNATURE_ALGORITHM. Note that I didn't add new load flag LOAD_IGNORE_CERT_WEAK_SIGNATURE_ALGORITHM. Allow users to accept MD2 certificates as certificates signed using a weak signature algorithm. MD4 certificates are still treated as invalid certificates. R=jar,jcampan BUG=http://crbug.com/18725 TEST=none Review URL: http://codereview.chromium.org/165504 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@23497 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/cert_status_flags.cc')
-rw-r--r--net/base/cert_status_flags.cc4
1 files changed, 4 insertions, 0 deletions
diff --git a/net/base/cert_status_flags.cc b/net/base/cert_status_flags.cc
index a0ddc13..7cf4b3e 100644
--- a/net/base/cert_status_flags.cc
+++ b/net/base/cert_status_flags.cc
@@ -31,6 +31,8 @@ int MapNetErrorToCertStatus(int error) {
// Falls through.
case ERR_CERT_INVALID:
return CERT_STATUS_INVALID;
+ case ERR_CERT_WEAK_SIGNATURE_ALGORITHM:
+ return CERT_STATUS_WEAK_SIGNATURE_ALGORITHM;
default:
return 0;
}
@@ -51,6 +53,8 @@ int MapCertStatusToNetError(int cert_status) {
return ERR_CERT_AUTHORITY_INVALID;
if (cert_status & CERT_STATUS_COMMON_NAME_INVALID)
return ERR_CERT_COMMON_NAME_INVALID;
+ if (cert_status & CERT_STATUS_WEAK_SIGNATURE_ALGORITHM)
+ return ERR_CERT_WEAK_SIGNATURE_ALGORITHM;
if (cert_status & CERT_STATUS_DATE_INVALID)
return ERR_CERT_DATE_INVALID;