Index: content/browser/loader/mime_sniffing_resource_handler.cc |
diff --git a/content/browser/loader/mime_sniffing_resource_handler.cc b/content/browser/loader/mime_sniffing_resource_handler.cc |
index fb70d6ef5924a8ba8dff5466487105ea0574db4d..111e3f69ddf970f8245d43d9b3836cdfad835257 100644 |
--- a/content/browser/loader/mime_sniffing_resource_handler.cc |
+++ b/content/browser/loader/mime_sniffing_resource_handler.cc |
@@ -365,16 +365,6 @@ bool MimeSniffingResourceHandler::MaybeStartInterception(bool* defer) { |
ResourceRequestInfoImpl* info = GetRequestInfo(); |
const std::string& mime_type = response_->head.mime_type; |
- // https://crbug.com/568184 - Temporary hack to track servers that aren't |
- // setting Content-Disposition when sending x-x509-user-cert and expecting |
- // the browser to automatically install certificates; this is being |
- // deprecated and will be removed upon full <keygen> removal. |
- if (mime_type == "application/x-x509-user-cert" && response_->head.headers) { |
- UMA_HISTOGRAM_BOOLEAN( |
- "UserCert.ContentDisposition", |
- response_->head.headers->HasHeader("Content-Disposition")); |
- } |
- |
// Allow requests for object/embed tags to be intercepted as streams. |
if (info->GetResourceType() == content::RESOURCE_TYPE_OBJECT) { |
DCHECK(!info->allow_download()); |