Просмотр исходного кода

LibTLS: Remove outdated comment about ECC

PR #18166 introduced the ability to parse ECC certificates. If we
now fail here the reason is mostlikely something new and we should
prevent this rabbit hole from happening.
Fabian Dellwing 2 лет назад
Родитель
Сommit
e78db6417a
1 измененных файлов с 0 добавлено и 2 удалено
  1. 0 2
      Userland/Libraries/LibTLS/TLSv12.cpp

+ 0 - 2
Userland/Libraries/LibTLS/TLSv12.cpp

@@ -521,8 +521,6 @@ ErrorOr<Vector<Certificate>> DefaultRootCACertificates::parse_pem_root_certifica
 
     for (auto& cert : certs) {
         auto certificate_result = Certificate::parse_certificate(cert.bytes());
-        // If the certificate does not parse it is likely using elliptic curve keys/signatures, which are not
-        // supported right now. It might make sense to cleanup cacert.pem before adding it to the system.
         if (certificate_result.is_error()) {
             // FIXME: It would be nice to have more informations about the certificate we failed to parse.
             //        Like: Issuer, Algorithm, CN, etc