summaryrefslogtreecommitdiffstats
path: root/net/http/http_stream_parser.cc
diff options
context:
space:
mode:
authorrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-06-13 22:43:37 +0000
committerrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-06-13 22:43:37 +0000
commitc598dbec7db3bbdccc87a66a32c8a683afa976be (patch)
tree9f74f6dc68be0b571660ee11fbb779e555227970 /net/http/http_stream_parser.cc
parent4e5703ba1b7d0e6557e724ac2432b24bad386643 (diff)
downloadchromium_src-c598dbec7db3bbdccc87a66a32c8a683afa976be.zip
chromium_src-c598dbec7db3bbdccc87a66a32c8a683afa976be.tar.gz
chromium_src-c598dbec7db3bbdccc87a66a32c8a683afa976be.tar.bz2
Do not treat weak keys (<1024 bits || MD5) as fatal errors
A pending system update from Microsoft, detailed at http://blogs.technet.com/b/pki/archive/2012/06/12/rsa-keys-under-1024-bits-are-blocked.aspx will change the behaviour of CertGetCertificateChain such that it will appropriately flag weak keys in the CERT_TRUST_STATUS.dwError field. To avoid mapping this to CERT_STATUS_INVALID, handle the new error code and map it to CERT_STATUS_WEAK_KEY. BUG=none TEST=net_unittests continue passing on Win when this change is released. Review URL: https://chromiumcodereview.appspot.com/10537153 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@142008 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/http/http_stream_parser.cc')
0 files changed, 0 insertions, 0 deletions