Index: net/base/x509_certificate_win.cc |
diff --git a/net/base/x509_certificate_win.cc b/net/base/x509_certificate_win.cc |
index 4905b0bf8265d0e773c6b61446b483435300e1fb..483e78506ad60044771e30afad2b972eb7b7e923 100644 |
--- a/net/base/x509_certificate_win.cc |
+++ b/net/base/x509_certificate_win.cc |
@@ -870,14 +870,6 @@ int X509Certificate::VerifyInternal(const std::string& hostname, |
verify_result->cert_status |= MapCertChainErrorStatusToCertStatus( |
chain_context->TrustStatus.dwErrorStatus); |
- // Treat certificates signed using broken signature algorithms as invalid. |
- if (verify_result->has_md4) |
- verify_result->cert_status |= CERT_STATUS_INVALID; |
- |
- // Flag certificates signed using weak signature algorithms. |
- if (verify_result->has_md2) |
- verify_result->cert_status |= CERT_STATUS_WEAK_SIGNATURE_ALGORITHM; |
- |
// Flag certificates that have a Subject common name with a NULL character. |
if (CertSubjectCommonNameHasNull(cert_handle_)) |
verify_result->cert_status |= CERT_STATUS_INVALID; |