summaryrefslogtreecommitdiffstats
path: root/third_party/npapi
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-02-24 03:01:31 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-02-24 03:01:31 +0000
commitae5bcd4259d5cc277fd92a363d3bed6575341355 (patch)
tree51ab861fb21df212c550c8a9b429b12b9520ded7 /third_party/npapi
parentb50bb48e2fec7ad0a696e5b4eaafc65bb056d6f8 (diff)
downloadchromium_src-ae5bcd4259d5cc277fd92a363d3bed6575341355.zip
chromium_src-ae5bcd4259d5cc277fd92a363d3bed6575341355.tar.gz
chromium_src-ae5bcd4259d5cc277fd92a363d3bed6575341355.tar.bz2
Request the szOID_PKIX_KP_SERVER_AUTH usage when constructing
the certificate chain so that we reject a root CA certificate whose "Server Authentication" certificate purpose has been disabled. R=rvargas BUG=34231 TEST=On Windows, run certmgr.msc as Administrator. Under "Trusted Root Certification Authorities", open the Properties for the root CA certificate with the friendly name "VeriSign Class 3 Public Primary CA" and disable its "Server Authentication" certificate purpose. Visit https://www.google.com/. Chrome should display the "Invalid Server Certificate" error page. Review URL: http://codereview.chromium.org/652181 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@39851 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'third_party/npapi')
0 files changed, 0 insertions, 0 deletions