diff options
author | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-02-24 03:01:31 +0000 |
---|---|---|
committer | wtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-02-24 03:01:31 +0000 |
commit | ae5bcd4259d5cc277fd92a363d3bed6575341355 (patch) | |
tree | 51ab861fb21df212c550c8a9b429b12b9520ded7 /third_party/npapi | |
parent | b50bb48e2fec7ad0a696e5b4eaafc65bb056d6f8 (diff) | |
download | chromium_src-ae5bcd4259d5cc277fd92a363d3bed6575341355.zip chromium_src-ae5bcd4259d5cc277fd92a363d3bed6575341355.tar.gz chromium_src-ae5bcd4259d5cc277fd92a363d3bed6575341355.tar.bz2 |
Request the szOID_PKIX_KP_SERVER_AUTH usage when constructing
the certificate chain so that we reject a root CA certificate
whose "Server Authentication" certificate purpose has been
disabled.
R=rvargas
BUG=34231
TEST=On Windows, run certmgr.msc as Administrator. Under
"Trusted Root Certification Authorities", open the Properties
for the root CA certificate with the friendly name "VeriSign
Class 3 Public Primary CA" and disable its "Server Authentication"
certificate purpose. Visit https://www.google.com/. Chrome
should display the "Invalid Server Certificate" error page.
Review URL: http://codereview.chromium.org/652181
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@39851 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'third_party/npapi')
0 files changed, 0 insertions, 0 deletions