Index: content/browser/ssl/ssl_policy.cc |
diff --git a/content/browser/ssl/ssl_policy.cc b/content/browser/ssl/ssl_policy.cc |
index 18fdde4dfe2bf9823e716ae01e48db73f1641fb8..f2bdd2145cf2bc912468ff5d6d1554a36474aed4 100644 |
--- a/content/browser/ssl/ssl_policy.cc |
+++ b/content/browser/ssl/ssl_policy.cc |
@@ -45,10 +45,9 @@ void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) { |
return; |
} |
- // The judgment is either DENIED or UNKNOWN. |
- // For now we handle the DENIED as the UNKNOWN, which means a blocking |
- // page is shown to the user every time he comes back to the page. |
- |
+ // The judgment must be UNKNOWN because QueryPolicy guarantees that it will |
+ // never return DENIED. For these hosts, a blocking page is shown to the user |
+ // every time he comes back to the page. |
int options_mask = 0; |
switch (handler->cert_error()) { |
case net::ERR_CERT_COMMON_NAME_INVALID: |
@@ -180,13 +179,6 @@ void SSLPolicy::OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
handler->ContinueRequest(); |
} else { |
// Default behavior for rejecting a certificate. |
- // |
- // While DenyCertForHost() executes synchronously on this thread, |
- // CancelRequest() gets posted to a different thread. Calling |
- // DenyCertForHost() first ensures deterministic ordering. |
- backend_->DenyCertForHost(handler->ssl_info().cert.get(), |
- handler->request_url().host(), |
- handler->cert_error()); |
handler->CancelRequest(); |
} |
} |