| Index: components/gcm_driver/crypto/p256_key_util.cc
|
| diff --git a/components/gcm_driver/crypto/p256_key_util.cc b/components/gcm_driver/crypto/p256_key_util.cc
|
| index daf7e0ff720458d0e1b39349d4607179a542f00a..18f927d27f56deb6b94cb81a4b9d4964480a0e88 100644
|
| --- a/components/gcm_driver/crypto/p256_key_util.cc
|
| +++ b/components/gcm_driver/crypto/p256_key_util.cc
|
| @@ -51,8 +51,7 @@ bool CreateP256KeyPair(std::string* out_private_key,
|
| // Export the encrypted private key with an empty password. This is not done
|
| // to provide any security, but rather to achieve a consistent private key
|
| // storage between the BoringSSL and NSS implementations.
|
| - if (!key_pair->ExportEncryptedPrivateKey(
|
| - "" /* password */, 1 /* iteration */, &private_key)) {
|
| + if (!key_pair->ExportEncryptedPrivateKey(&private_key)) {
|
| DLOG(ERROR) << "Unable to export the private key.";
|
| return false;
|
| }
|
| @@ -100,7 +99,6 @@ bool ComputeSharedP256Secret(const base::StringPiece& private_key,
|
|
|
| std::unique_ptr<crypto::ECPrivateKey> local_key_pair(
|
| crypto::ECPrivateKey::CreateFromEncryptedPrivateKeyInfo(
|
| - "" /* no password */,
|
| std::vector<uint8_t>(private_key.data(),
|
| private_key.data() + private_key.size()),
|
| std::vector<uint8_t>(
|
|
|