pr_debug("PubKey Algo: %u\n", ctx->last_oid);
 
        switch (ctx->last_oid) {
-       case OID_md2WithRSAEncryption:
-       case OID_md3WithRSAEncryption:
        default:
                return -ENOPKG; /* Unsupported combination */
 
-       case OID_md4WithRSAEncryption:
-               ctx->cert->sig->hash_algo = "md4";
-               goto rsa_pkcs1;
-
        case OID_sha1WithRSAEncryption:
                ctx->cert->sig->hash_algo = "sha1";
                goto rsa_pkcs1;
 
 
        /* PKCS#1 {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1)} */
        OID_rsaEncryption,              /* 1.2.840.113549.1.1.1 */
-       OID_md2WithRSAEncryption,       /* 1.2.840.113549.1.1.2 */
-       OID_md3WithRSAEncryption,       /* 1.2.840.113549.1.1.3 */
-       OID_md4WithRSAEncryption,       /* 1.2.840.113549.1.1.4 */
        OID_sha1WithRSAEncryption,      /* 1.2.840.113549.1.1.5 */
        OID_sha256WithRSAEncryption,    /* 1.2.840.113549.1.1.11 */
        OID_sha384WithRSAEncryption,    /* 1.2.840.113549.1.1.12 */
        OID_smimeCapabilites,           /* 1.2.840.113549.1.9.15 */
        OID_smimeAuthenticatedAttrs,    /* 1.2.840.113549.1.9.16.2.11 */
 
-       /* {iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2)} */
-       OID_md2,                        /* 1.2.840.113549.2.2 */
-       OID_md4,                        /* 1.2.840.113549.2.4 */
-       OID_md5,                        /* 1.2.840.113549.2.5 */
-
        OID_mskrb5,                     /* 1.2.840.48018.1.2.2 */
        OID_krb5,                       /* 1.2.840.113554.1.2.2 */
        OID_krb5u2u,                    /* 1.2.840.113554.1.2.2.3 */