| Index: net/cert/cert_status_flags.cc
|
| diff --git a/net/cert/cert_status_flags.cc b/net/cert/cert_status_flags.cc
|
| index d278ea47b453b689842f41a289b2e4fa36144d16..4df4d26241dcd9a1e4289aa20a140ba7fec9072f 100644
|
| --- a/net/cert/cert_status_flags.cc
|
| +++ b/net/cert/cert_status_flags.cc
|
| @@ -49,6 +49,8 @@ CertStatus MapNetErrorToCertStatus(int error) {
|
| return CERT_STATUS_PINNED_KEY_MISSING;
|
| case ERR_CERT_NAME_CONSTRAINT_VIOLATION:
|
| return CERT_STATUS_NAME_CONSTRAINT_VIOLATION;
|
| + case ERR_CERT_DEPRECATED_SIGNATURE_ALGORITHM:
|
| + return CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM;
|
| default:
|
| return 0;
|
| }
|
| @@ -81,6 +83,8 @@ int MapCertStatusToNetError(CertStatus cert_status) {
|
| return ERR_CERT_WEAK_KEY;
|
| if (cert_status & CERT_STATUS_DATE_INVALID)
|
| return ERR_CERT_DATE_INVALID;
|
| + // CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM is intentionally not mapped to
|
| + // an error. It is treated as just a warning and used to degrade the SSL UI.
|
|
|
| // Unknown status. Give it the benefit of the doubt.
|
| if (cert_status & CERT_STATUS_UNABLE_TO_CHECK_REVOCATION)
|
|
|