summaryrefslogtreecommitdiffstats
path: root/sync/tools
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-12-03 21:21:42 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-12-03 21:21:42 +0000
commit0d0a1c9d7ebb743f5a1274f9fb79830b6968eb20 (patch)
tree0f8b27b18ff1e4d78371b6f6158c146648476387 /sync/tools
parent69d1be9a77ec440191d68ad7877e58beb899a58a (diff)
downloadchromium_src-0d0a1c9d7ebb743f5a1274f9fb79830b6968eb20.zip
chromium_src-0d0a1c9d7ebb743f5a1274f9fb79830b6968eb20.tar.gz
chromium_src-0d0a1c9d7ebb743f5a1274f9fb79830b6968eb20.tar.bz2
Merge 170193 to M24.
BUG=163227 > net: block Sirefef.gen!C malware key in code. > > We have reverted this in the CRLSet temporarily but, in order to reasonably > test the notification on the dev channel, we need the network stack to consider > the certificates to be revoked. > > It's not possible to test this because NSS rejects the invalid signature on the > certificate if we give it the intermediate and it returns an unknown authority > error if we don't. Without a return value from NSS, we don't get a list of > public key hashes to check against. > > BUG=163227 > > Review URL: https://codereview.chromium.org/11299240 TBR=agl@chromium.org Review URL: https://codereview.chromium.org/11415269 git-svn-id: svn://svn.chromium.org/chrome/branches/1312/src@170814 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sync/tools')
0 files changed, 0 insertions, 0 deletions