Chromium Code Reviews| Index: net/cert/x509_certificate.h |
| diff --git a/net/cert/x509_certificate.h b/net/cert/x509_certificate.h |
| index b75efa70d9a5bd163a5f7a9fb6c256ed649354e1..d12c0ba855ed62d4d2e9d6e7dfe7217ac8d008a8 100644 |
| --- a/net/cert/x509_certificate.h |
| +++ b/net/cert/x509_certificate.h |
| @@ -37,10 +37,6 @@ struct CERTCertificateStr; |
| class Pickle; |
| class PickleIterator; |
| -namespace crypto { |
| -class RSAPrivateKey; |
| -} // namespace crypto |
| - |
| namespace net { |
| class CRLSet; |
| @@ -195,29 +191,6 @@ class NET_EXPORT X509Certificate |
| int length, |
| int format); |
| - // Create a self-signed certificate containing the public key in |key|. |
| - // Subject, serial number and validity period are given as parameters. |
| - // The certificate is signed by the private key in |key|. The hashing |
| - // algorithm for the signature is SHA-1. |
| - // |
| - // |subject| is a distinguished name defined in RFC4514. |
| - // |
| - // An example: |
| - // CN=Michael Wong,O=FooBar Corporation,DC=foobar,DC=com |
| - // |
| - // SECURITY WARNING |
| - // |
| - // Using self-signed certificates has the following security risks: |
| - // 1. Encryption without authentication and thus vulnerable to |
| - // man-in-the-middle attacks. |
| - // 2. Self-signed certificates cannot be revoked. |
| - // |
| - // Use this certificate only after the above risks are acknowledged. |
| - static X509Certificate* CreateSelfSigned(crypto::RSAPrivateKey* key, |
|
wtc
2013/06/20 21:35:56
The removal of the X509Certificate::CreateSelfSign
|
| - const std::string& subject, |
| - uint32 serial_number, |
| - base::TimeDelta valid_duration); |
| - |
| // Appends a representation of this object to the given pickle. |
| void Persist(Pickle* pickle); |