| Index: net/cert/cert_verify_proc.h
|
| diff --git a/net/cert/cert_verify_proc.h b/net/cert/cert_verify_proc.h
|
| index f60ed6d9232631f1ae2e0fcefb27a373bfe20d08..95e464e1595b97fe627c33fee9cfa39a095489f8 100644
|
| --- a/net/cert/cert_verify_proc.h
|
| +++ b/net/cert/cert_verify_proc.h
|
| @@ -73,7 +73,6 @@ class NET_EXPORT CertVerifyProc
|
| private:
|
| friend class base::RefCountedThreadSafe<CertVerifyProc>;
|
| FRIEND_TEST_ALL_PREFIXES(CertVerifyProcTest, DigiNotarCerts);
|
| - FRIEND_TEST_ALL_PREFIXES(CertVerifyProcTest, TestHasTooLongValidity);
|
|
|
| // Performs the actual verification using the desired underlying
|
| // cryptographic library.
|
| @@ -100,18 +99,6 @@ class NET_EXPORT CertVerifyProc
|
| const std::vector<std::string>& dns_names,
|
| const std::vector<std::string>& ip_addrs);
|
|
|
| - // The CA/Browser Forum's Baseline Requirements specify maximum validity
|
| - // periods (https://cabforum.org/Baseline_Requirements_V1.pdf):
|
| - //
|
| - // For certificates issued after 1 July 2012: 60 months.
|
| - // For certificates issued after 1 April 2015: 39 months.
|
| - //
|
| - // For certificates issued before the BRs took effect, there were no
|
| - // guidelines, but clamp them at a maximum of 10 year validity, with the
|
| - // requirement they expire within 7 years after the effective date of the BRs
|
| - // (i.e. by 1 July 2019).
|
| - static bool HasTooLongValidity(const X509Certificate& cert);
|
| -
|
| DISALLOW_COPY_AND_ASSIGN(CertVerifyProc);
|
| };
|
|
|
|
|