| Index: net/base/cert_database_openssl.cc
|
| diff --git a/net/base/cert_database_openssl.cc b/net/base/cert_database_openssl.cc
|
| index 7459b078c8868a1bcdedd173e00dda15b96aa093..4e61f6182d35da5b8811abe2447606f738823087 100644
|
| --- a/net/base/cert_database_openssl.cc
|
| +++ b/net/base/cert_database_openssl.cc
|
| @@ -21,21 +21,21 @@ CertDatabase::CertDatabase()
|
|
|
| CertDatabase::~CertDatabase() {}
|
|
|
| -int CertDatabase::CheckUserCert(X509Certificate* cert) {
|
| - if (!cert)
|
| - return ERR_CERT_INVALID;
|
| - if (cert->HasExpired())
|
| - return ERR_CERT_DATE_INVALID;
|
| -
|
| - if (!OpenSSLPrivateKeyStore::GetInstance()->FetchPrivateKey(
|
| - X509_PUBKEY_get(X509_get_X509_PUBKEY(cert->os_cert_handle()))))
|
| - return ERR_NO_PRIVATE_KEY_FOR_CERT;
|
| +// NOTE: On Android, these two methods should _never_ be called.
|
| +//
|
| +// They are only used by the SSLAddCertHandler class on other platforms,
|
| +// to handle veritication and installation of downloaded certificates.
|
| +//
|
| +// On Android, the certificate data is passed directly to the system's
|
| +// CertInstaller activity, which handles verification, naming,
|
| +// installation and UI (for success/failure).
|
|
|
| - return OK;
|
| +int CertDatabase::CheckUserCert(X509Certificate* cert) {
|
| + NOTIMPLEMENTED();
|
| + return ERR_NOT_IMPLEMENTED;
|
| }
|
|
|
| int CertDatabase::AddUserCert(X509Certificate* cert) {
|
| - // TODO(bulach): implement me.
|
| NOTIMPLEMENTED();
|
| return ERR_NOT_IMPLEMENTED;
|
| }
|
|
|