| Index: net/cert/cert_verify_proc.cc
|
| diff --git a/net/cert/cert_verify_proc.cc b/net/cert/cert_verify_proc.cc
|
| index a32173c9162258146d820924a210061596277a12..6846e5e05bf25282d50949ac2dfdb52e9572476b 100644
|
| --- a/net/cert/cert_verify_proc.cc
|
| +++ b/net/cert/cert_verify_proc.cc
|
| @@ -21,7 +21,6 @@
|
| #include "net/cert/asn1_util.h"
|
| #include "net/cert/cert_status_flags.h"
|
| #include "net/cert/cert_verifier.h"
|
| -#include "net/cert/cert_verify_proc_whitelist.h"
|
| #include "net/cert/cert_verify_result.h"
|
| #include "net/cert/crl_set.h"
|
| #include "net/cert/internal/parse_ocsp.h"
|
| @@ -582,12 +581,6 @@ int CertVerifyProc::Verify(X509Certificate* cert,
|
| rv = MapCertStatusToNetError(verify_result->cert_status);
|
| }
|
|
|
| - if (IsNonWhitelistedCertificate(*verify_result->verified_cert,
|
| - verify_result->public_key_hashes, hostname)) {
|
| - verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
|
| - rv = MapCertStatusToNetError(verify_result->cert_status);
|
| - }
|
| -
|
| // Check for weak keys in the entire verified chain.
|
| bool weak_key = ExaminePublicKeys(verify_result->verified_cert,
|
| verify_result->is_issued_by_known_root);
|
|
|