Index: net/base/mime_sniffer.cc |
diff --git a/net/base/mime_sniffer.cc b/net/base/mime_sniffer.cc |
index 608f870cfed21ec047be1ea799c5c1aa898ba299..0da501ef4d650efcc436d00fe8f4e5a466420506 100644 |
--- a/net/base/mime_sniffer.cc |
+++ b/net/base/mime_sniffer.cc |
@@ -80,15 +80,6 @@ |
// compatibility if we don't sniff from application/octet stream at all. |
// => Chrome: Download as application/octet-stream |
// |
-// XHTML payload, Content-Type: "text/xml": |
-// * IE 7: Render as XML |
-// * Firefox 2: Render as HTML |
-// * Safari 3: Render as HTML |
-// * Opera 9: Render as HTML |
-// The layout tests rely on us rendering this as HTML. |
-// But we're conservative in XHTML detection, as this runs afoul of the |
-// "don't detect dangerous mime types" rule. |
-// |
// Note that our definition of HTML payload is much stricter than IE's |
// definition and roughly the same as Firefox's definition. |
@@ -542,12 +533,6 @@ static bool SniffForInvalidOfficeDocs(const char* content, |
// Byte order marks |
static const MagicNumber kMagicXML[] = { |
- // We want to be very conservative in interpreting text/xml content as |
- // XHTML -- we just want to sniff enough to make unit tests pass. |
- // So we match explicitly on this, and don't match other ways of writing |
- // it in semantically-equivalent ways. |
- MAGIC_STRING("application/xhtml+xml", |
- "<html xmlns=\"http://www.w3.org/1999/xhtml\""), |
MAGIC_STRING("application/atom+xml", "<feed"), |
MAGIC_STRING("application/rss+xml", "<rss"), // UTF-8 |
}; |