diff options
author | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-12-03 21:21:42 +0000 |
---|---|---|
committer | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-12-03 21:21:42 +0000 |
commit | 0d0a1c9d7ebb743f5a1274f9fb79830b6968eb20 (patch) | |
tree | 0f8b27b18ff1e4d78371b6f6158c146648476387 /sync/tools | |
parent | 69d1be9a77ec440191d68ad7877e58beb899a58a (diff) | |
download | chromium_src-0d0a1c9d7ebb743f5a1274f9fb79830b6968eb20.zip chromium_src-0d0a1c9d7ebb743f5a1274f9fb79830b6968eb20.tar.gz chromium_src-0d0a1c9d7ebb743f5a1274f9fb79830b6968eb20.tar.bz2 |
Merge 170193 to M24.
BUG=163227
> net: block Sirefef.gen!C malware key in code.
>
> We have reverted this in the CRLSet temporarily but, in order to reasonably
> test the notification on the dev channel, we need the network stack to consider
> the certificates to be revoked.
>
> It's not possible to test this because NSS rejects the invalid signature on the
> certificate if we give it the intermediate and it returns an unknown authority
> error if we don't. Without a return value from NSS, we don't get a list of
> public key hashes to check against.
>
> BUG=163227
>
> Review URL: https://codereview.chromium.org/11299240
TBR=agl@chromium.org
Review URL: https://codereview.chromium.org/11415269
git-svn-id: svn://svn.chromium.org/chrome/branches/1312/src@170814 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sync/tools')
0 files changed, 0 insertions, 0 deletions