diff options
author | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-06-13 22:43:37 +0000 |
---|---|---|
committer | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-06-13 22:43:37 +0000 |
commit | c598dbec7db3bbdccc87a66a32c8a683afa976be (patch) | |
tree | 9f74f6dc68be0b571660ee11fbb779e555227970 /net/http/http_stream_parser.cc | |
parent | 4e5703ba1b7d0e6557e724ac2432b24bad386643 (diff) | |
download | chromium_src-c598dbec7db3bbdccc87a66a32c8a683afa976be.zip chromium_src-c598dbec7db3bbdccc87a66a32c8a683afa976be.tar.gz chromium_src-c598dbec7db3bbdccc87a66a32c8a683afa976be.tar.bz2 |
Do not treat weak keys (<1024 bits || MD5) as fatal errors
A pending system update from Microsoft, detailed at
http://blogs.technet.com/b/pki/archive/2012/06/12/rsa-keys-under-1024-bits-are-blocked.aspx
will change the behaviour of CertGetCertificateChain such that it will
appropriately flag weak keys in the CERT_TRUST_STATUS.dwError field.
To avoid mapping this to CERT_STATUS_INVALID, handle the new error code and
map it to CERT_STATUS_WEAK_KEY.
BUG=none
TEST=net_unittests continue passing on Win when this change is released.
Review URL: https://chromiumcodereview.appspot.com/10537153
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@142008 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/http/http_stream_parser.cc')
0 files changed, 0 insertions, 0 deletions