Index: net/cert/cert_verify_proc.h |
diff --git a/net/cert/cert_verify_proc.h b/net/cert/cert_verify_proc.h |
index f60ed6d9232631f1ae2e0fcefb27a373bfe20d08..95e464e1595b97fe627c33fee9cfa39a095489f8 100644 |
--- a/net/cert/cert_verify_proc.h |
+++ b/net/cert/cert_verify_proc.h |
@@ -73,7 +73,6 @@ class NET_EXPORT CertVerifyProc |
private: |
friend class base::RefCountedThreadSafe<CertVerifyProc>; |
FRIEND_TEST_ALL_PREFIXES(CertVerifyProcTest, DigiNotarCerts); |
- FRIEND_TEST_ALL_PREFIXES(CertVerifyProcTest, TestHasTooLongValidity); |
// Performs the actual verification using the desired underlying |
// cryptographic library. |
@@ -100,18 +99,6 @@ class NET_EXPORT CertVerifyProc |
const std::vector<std::string>& dns_names, |
const std::vector<std::string>& ip_addrs); |
- // The CA/Browser Forum's Baseline Requirements specify maximum validity |
- // periods (https://cabforum.org/Baseline_Requirements_V1.pdf): |
- // |
- // For certificates issued after 1 July 2012: 60 months. |
- // For certificates issued after 1 April 2015: 39 months. |
- // |
- // For certificates issued before the BRs took effect, there were no |
- // guidelines, but clamp them at a maximum of 10 year validity, with the |
- // requirement they expire within 7 years after the effective date of the BRs |
- // (i.e. by 1 July 2019). |
- static bool HasTooLongValidity(const X509Certificate& cert); |
- |
DISALLOW_COPY_AND_ASSIGN(CertVerifyProc); |
}; |