| Index: net/cert/cert_verify_proc_android.cc
|
| diff --git a/net/cert/cert_verify_proc_android.cc b/net/cert/cert_verify_proc_android.cc
|
| index cdc8347a1df5a9acb405c814430b81c0766efaab..f90f5721c3db34209fa0f82d466ed23cefc521e5 100644
|
| --- a/net/cert/cert_verify_proc_android.cc
|
| +++ b/net/cert/cert_verify_proc_android.cc
|
| @@ -79,17 +79,6 @@ bool VerifyFromAndroidTrustManager(const std::vector<std::string>& cert_bytes,
|
| chain.push_back(verify_result->verified_cert->os_cert_handle());
|
| chain.insert(chain.end(), intermediates.begin(), intermediates.end());
|
|
|
| - // If the chain successfully verified, ignore the trust anchor (the last
|
| - // certificate). Otherwise, assume the chain is partial. This is not entirely
|
| - // correct, as a full chain may have been constructed and then failed to
|
| - // validate. However, if that is the case, the more serious error will
|
| - // override any SHA-1 considerations.
|
| - size_t correction_for_root =
|
| - (status == android::CERT_VERIFY_STATUS_ANDROID_OK) ? 1 : 0;
|
| - for (size_t i = 0; i < chain.size() - correction_for_root; ++i) {
|
| - FillCertVerifyResultWeakSignature(chain[i], i == 0, verify_result);
|
| - }
|
| -
|
| // Extract the public key hashes.
|
| for (size_t i = 0; i < verified_chain.size(); i++) {
|
| base::StringPiece spki_bytes;
|
|
|