| Index: net/cert/cert_verify_proc_mac.cc
|
| diff --git a/net/cert/cert_verify_proc_mac.cc b/net/cert/cert_verify_proc_mac.cc
|
| index 15d07f3e2c4ca85bb80c9984121fc2dd85f9c1c3..987eed236e46f14d2f9066ebd9a0ecc87c6d2a57 100644
|
| --- a/net/cert/cert_verify_proc_mac.cc
|
| +++ b/net/cert/cert_verify_proc_mac.cc
|
| @@ -991,10 +991,6 @@ int VerifyWithGivenFlags(X509Certificate* cert,
|
| // Perform hostname verification independent of SecTrustEvaluate. In order to
|
| // do so, mask off any reported name errors first.
|
| verify_result->cert_status &= ~CERT_STATUS_COMMON_NAME_INVALID;
|
| - if (!cert->VerifyNameMatch(hostname,
|
| - &verify_result->common_name_fallback_used)) {
|
| - verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID;
|
| - }
|
|
|
| // TODO(wtc): Suppress CERT_STATUS_NO_REVOCATION_MECHANISM for now to be
|
| // compatible with Windows, which in turn implements this behavior to be
|
|
|