| Index: content/renderer/npapi/webplugin_impl.cc | 
| diff --git a/content/renderer/npapi/webplugin_impl.cc b/content/renderer/npapi/webplugin_impl.cc | 
| index f5b0273fe9ae03a5c394a9d1b75a1f2f71dd158b..7a6b05951137ed7a4ca2d91861d4fffd65c2e8bf 100644 | 
| --- a/content/renderer/npapi/webplugin_impl.cc | 
| +++ b/content/renderer/npapi/webplugin_impl.cc | 
| @@ -763,13 +763,6 @@ void WebPluginImpl::URLRedirectResponse(bool allow, int resource_id) { | 
| } | 
| } | 
|  | 
| -bool WebPluginImpl::CheckIfRunInsecureContent(const GURL& url) { | 
| -  if (!webframe_) | 
| -    return true; | 
| - | 
| -  return webframe_->checkIfRunInsecureContent(url); | 
| -} | 
| - | 
| #if defined(OS_MACOSX) | 
| WebPluginAcceleratedSurface* WebPluginImpl::GetAcceleratedSurface( | 
| gfx::GpuPreference gpu_preference) { | 
| @@ -858,17 +851,6 @@ void WebPluginImpl::willFollowRedirect(WebURLLoader* loader, | 
| // until kDirectNPAPIRequests is the default and we can remove this old path. | 
| WebPluginImpl::ClientInfo* client_info = GetClientInfoFromLoader(loader); | 
| if (client_info) { | 
| -    // Currently this check is just to catch an https -> http redirect when | 
| -    // loading the main plugin src URL. Longer term, we could investigate | 
| -    // firing mixed diplay or scripting issues for subresource loads | 
| -    // initiated by plugins. | 
| -    if (client_info->is_plugin_src_load && | 
| -        webframe_ && | 
| -        !webframe_->checkIfRunInsecureContent(new_request.url())) { | 
| -      loader->cancel(); | 
| -      client_info->client->DidFail(client_info->id); | 
| -      return; | 
| -    } | 
| if (net::HttpResponseHeaders::IsRedirectResponseCode( | 
| response.httpStatusCode())) { | 
| // If the plugin does not participate in url redirect notifications then | 
|  |