Index: chrome/common/net/x509_certificate_model_nss.cc |
diff --git a/chrome/common/net/x509_certificate_model_nss.cc b/chrome/common/net/x509_certificate_model_nss.cc |
index bc0785c7ac6c3856f312d0149e31e8cffcf465f9..3fccdc092e0d82aba8dfc1eeea0d7be1f0a23ce8 100644 |
--- a/chrome/common/net/x509_certificate_model_nss.cc |
+++ b/chrome/common/net/x509_certificate_model_nss.cc |
@@ -258,29 +258,6 @@ void GetNicknameStringsFromCertList( |
CERT_DestroyCertList(cert_list); |
} |
-// For background see this discussion on dev-tech-crypto.lists.mozilla.org: |
-// http://web.archiveorange.com/archive/v/6JJW7E40sypfZGtbkzxX |
-// |
-// NOTE: This function relies on the convention that the same PKCS#11 ID |
-// is shared between a certificate and its associated private and public |
-// keys. I tried to implement this with PK11_GetLowLevelKeyIDForCert(), |
-// but that always returns NULL on Chrome OS for me. |
-std::string GetPkcs11Id(net::X509Certificate::OSCertHandle cert_handle) { |
- std::string pkcs11_id; |
- SECKEYPrivateKey *priv_key = PK11_FindKeyByAnyCert(cert_handle, |
- NULL /* wincx */); |
- if (priv_key) { |
- // Get the CKA_ID attribute for a key. |
- SECItem* sec_item = PK11_GetLowLevelKeyIDForPrivateKey(priv_key); |
- if (sec_item) { |
- pkcs11_id = base::HexEncode(sec_item->data, sec_item->len); |
- SECITEM_FreeItem(sec_item, PR_TRUE); |
- } |
- SECKEY_DestroyPrivateKey(priv_key); |
- } |
- return pkcs11_id; |
-} |
- |
void GetExtensions( |
const string& critical_label, |
const string& non_critical_label, |