Index: net/base/client_cert_store_impl_nss.cc |
diff --git a/net/base/client_cert_store_impl_nss.cc b/net/base/client_cert_store_impl_nss.cc |
deleted file mode 100644 |
index 0cb89ce13176f97534dad810d365eeedd94d63d4..0000000000000000000000000000000000000000 |
--- a/net/base/client_cert_store_impl_nss.cc |
+++ /dev/null |
@@ -1,81 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/base/client_cert_store_impl.h" |
- |
-#include <nss.h> |
-#include <ssl.h> |
- |
-#include "base/logging.h" |
-#include "net/base/x509_util.h" |
- |
-namespace net { |
- |
-namespace { |
- |
-bool GetClientCertsImpl(CERTCertList* cert_list, |
- const SSLCertRequestInfo& request, |
- CertificateList* selected_certs) { |
- DCHECK(cert_list); |
- DCHECK(selected_certs); |
- |
- selected_certs->clear(); |
- for (CERTCertListNode* node = CERT_LIST_HEAD(cert_list); |
- !CERT_LIST_END(node, cert_list); |
- node = CERT_LIST_NEXT(node)) { |
- // Only offer unexpired certificates. |
- if (CERT_CheckCertValidTimes(node->cert, PR_Now(), PR_TRUE) != |
- secCertTimeValid) { |
- continue; |
- } |
- |
- scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( |
- node->cert, X509Certificate::OSCertHandles()); |
- |
- // Check if the certificate issuer is allowed by the server. |
- if (!request.cert_authorities.empty() && |
- !cert->IsIssuedByEncoded(request.cert_authorities)) { |
- continue; |
- } |
- selected_certs->push_back(cert); |
- } |
- |
- std::sort(selected_certs->begin(), selected_certs->end(), |
- x509_util::ClientCertSorter()); |
- return true; |
-} |
- |
-} // namespace |
- |
-bool ClientCertStoreImpl::GetClientCerts(const SSLCertRequestInfo& request, |
- CertificateList* selected_certs) { |
- CERTCertList* client_certs = CERT_FindUserCertsByUsage( |
- CERT_GetDefaultCertDB(), certUsageSSLClient, |
- PR_FALSE, PR_FALSE, NULL); |
- // It is ok for a user not to have any client certs. |
- if (!client_certs) |
- return true; |
- |
- bool rv = GetClientCertsImpl(client_certs, request, selected_certs); |
- CERT_DestroyCertList(client_certs); |
- return rv; |
-} |
- |
-bool ClientCertStoreImpl::SelectClientCerts(const CertificateList& input_certs, |
- const SSLCertRequestInfo& request, |
- CertificateList* selected_certs) { |
- CERTCertList* cert_list = CERT_NewCertList(); |
- if (!cert_list) |
- return false; |
- for (size_t i = 0; i < input_certs.size(); ++i) { |
- CERT_AddCertToListTail( |
- cert_list, CERT_DupCertificate(input_certs[i]->os_cert_handle())); |
- } |
- |
- bool rv = GetClientCertsImpl(cert_list, request, selected_certs); |
- CERT_DestroyCertList(cert_list); |
- return rv; |
-} |
- |
-} // namespace net |