Index: chrome/browser/ssl/security_state_tab_helper.cc |
diff --git a/chrome/browser/ssl/security_state_tab_helper.cc b/chrome/browser/ssl/security_state_tab_helper.cc |
index cf28ba997466d936409b622cf306c0dccf49d54f..5c9bde9616d6812d645398c355fe0c7bd0c9c1fb 100644 |
--- a/chrome/browser/ssl/security_state_tab_helper.cc |
+++ b/chrome/browser/ssl/security_state_tab_helper.cc |
@@ -201,16 +201,5 @@ SecurityStateTabHelper::GetVisibleSecurityState() const { |
// information is still being initialized, thus no need to check for that. |
state->malicious_content_status = GetMaliciousContentStatus(); |
- // If the chain contains SHA1, populate the display policy field. |
- // In M56, we want to display a Neutral security state if the SHA1 |
- // certificate was not blocked because the kCertEnableSha1LocalAnchors |
- // policy has been set. |
- // TODO(elawrence): remove this in M57, https://crbug.com/676826 |
- if (state->cert_status & net::CERT_STATUS_SHA1_SIGNATURE_PRESENT) { |
- state->display_sha1_from_local_anchors_as_neutral = |
- g_browser_process->local_state()->GetBoolean( |
- ssl_config::prefs::kCertEnableSha1LocalAnchors); |
- } |
- |
return state; |
} |