LibTLS: Remove outdated comment about ECC

PR #18166 introduced the ability to parse ECC certificates. If we
now fail here the reason is mostlikely something new and we should
prevent this rabbit hole from happening.
This commit is contained in:
Fabian Dellwing 2023-04-10 07:06:51 +02:00 committed by Ali Mohammad Pur
parent 93232d4e6d
commit e78db6417a
Notes: sideshowbarker 2024-07-17 04:09:56 +09:00

View file

@ -521,8 +521,6 @@ ErrorOr<Vector<Certificate>> DefaultRootCACertificates::parse_pem_root_certifica
for (auto& cert : certs) {
auto certificate_result = Certificate::parse_certificate(cert.bytes());
// If the certificate does not parse it is likely using elliptic curve keys/signatures, which are not
// supported right now. It might make sense to cleanup cacert.pem before adding it to the system.
if (certificate_result.is_error()) {
// FIXME: It would be nice to have more informations about the certificate we failed to parse.
// Like: Issuer, Algorithm, CN, etc