| Index: net/cert/cert_verify_proc.cc
|
| diff --git a/net/cert/cert_verify_proc.cc b/net/cert/cert_verify_proc.cc
|
| index 25afb0e9f3caf0fea3ec77def4aea315128c6926..f30033b71d262085a66bdebb43fadae8f9e2ace0 100644
|
| --- a/net/cert/cert_verify_proc.cc
|
| +++ b/net/cert/cert_verify_proc.cc
|
| @@ -262,6 +262,9 @@ int CertVerifyProc::Verify(X509Certificate* cert,
|
| rv = MapCertStatusToNetError(verify_result->cert_status);
|
| }
|
|
|
| + if (verify_result->has_sha1)
|
| + verify_result->cert_status |= CERT_STATUS_SHA1_SIGNATURE_PRESENT;
|
| +
|
| // Flag certificates from publicly-trusted CAs that are issued to intranet
|
| // hosts. While the CA/Browser Forum Baseline Requirements (v1.1) permit
|
| // these to be issued until 1 November 2015, they represent a real risk for
|
|
|