| Index: net/base/x509_certificate_win.cc
|
| diff --git a/net/base/x509_certificate_win.cc b/net/base/x509_certificate_win.cc
|
| index 73090211265d7e486ff2fc1feb3e91ea79e9dfe4..6da033b43b1c33116fb71dc51d0d3a9c9d22ae35 100644
|
| --- a/net/base/x509_certificate_win.cc
|
| +++ b/net/base/x509_certificate_win.cc
|
| @@ -870,14 +870,6 @@ int X509Certificate::VerifyInternal(const std::string& hostname,
|
| verify_result->cert_status |= MapCertChainErrorStatusToCertStatus(
|
| chain_context->TrustStatus.dwErrorStatus);
|
|
|
| - // Treat certificates signed using broken signature algorithms as invalid.
|
| - if (verify_result->has_md4)
|
| - verify_result->cert_status |= CERT_STATUS_INVALID;
|
| -
|
| - // Flag certificates signed using weak signature algorithms.
|
| - if (verify_result->has_md2)
|
| - verify_result->cert_status |= CERT_STATUS_WEAK_SIGNATURE_ALGORITHM;
|
| -
|
| // Flag certificates that have a Subject common name with a NULL character.
|
| if (CertSubjectCommonNameHasNull(cert_handle_))
|
| verify_result->cert_status |= CERT_STATUS_INVALID;
|
|
|