| Index: net/http/transport_security_state.cc
|
| diff --git a/net/http/transport_security_state.cc b/net/http/transport_security_state.cc
|
| index 508784ea399c53817f1d7f43fb1e2b700c9696e0..d452651f28fe31477e7583a7f02bc30765b06a9c 100644
|
| --- a/net/http/transport_security_state.cc
|
| +++ b/net/http/transport_security_state.cc
|
| @@ -133,14 +133,8 @@ bool TransportSecurityState::CheckPublicKeyPins(
|
| //
|
| // * the server's certificate chain chains up to a known root (i.e. not a
|
| // user-installed trust anchor); and
|
| - // * the build is recent (very old builds should fail open so that users
|
| - // have some chance to recover).
|
| // * the server actually has public key pins.
|
| - //
|
| - // TODO(rsleevi): http://crbug.com/391032 - Only disable static HPKP if the
|
| - // build is not timely.
|
| - if (!is_issued_by_known_root || !IsBuildTimely() ||
|
| - !HasPublicKeyPins(host, sni_available)) {
|
| + if (!is_issued_by_known_root || !HasPublicKeyPins(host, sni_available)) {
|
| return true;
|
| }
|
|
|
|
|