Bläddra i källkod

LibTLS: Remove outdated comment about ECC

PR #18166 introduced the ability to parse ECC certificates. If we
now fail here the reason is mostlikely something new and we should
prevent this rabbit hole from happening.
Fabian Dellwing 2 år sedan
förälder
incheckning
e78db6417a
1 ändrade filer med 0 tillägg och 2 borttagningar
  1. 0 2
      Userland/Libraries/LibTLS/TLSv12.cpp

+ 0 - 2
Userland/Libraries/LibTLS/TLSv12.cpp

@@ -521,8 +521,6 @@ ErrorOr<Vector<Certificate>> DefaultRootCACertificates::parse_pem_root_certifica
 
 
     for (auto& cert : certs) {
     for (auto& cert : certs) {
         auto certificate_result = Certificate::parse_certificate(cert.bytes());
         auto certificate_result = Certificate::parse_certificate(cert.bytes());
-        // If the certificate does not parse it is likely using elliptic curve keys/signatures, which are not
-        // supported right now. It might make sense to cleanup cacert.pem before adding it to the system.
         if (certificate_result.is_error()) {
         if (certificate_result.is_error()) {
             // FIXME: It would be nice to have more informations about the certificate we failed to parse.
             // FIXME: It would be nice to have more informations about the certificate we failed to parse.
             //        Like: Issuer, Algorithm, CN, etc
             //        Like: Issuer, Algorithm, CN, etc