| Index: chrome/common/net/x509_certificate_model_nss.cc
|
| diff --git a/chrome/common/net/x509_certificate_model_nss.cc b/chrome/common/net/x509_certificate_model_nss.cc
|
| index 3fccdc092e0d82aba8dfc1eeea0d7be1f0a23ce8..7bd6918b45fe58adfaae00500b4cd8a7447f58da 100644
|
| --- a/chrome/common/net/x509_certificate_model_nss.cc
|
| +++ b/chrome/common/net/x509_certificate_model_nss.cc
|
| @@ -66,9 +66,20 @@ std::string ProcessExtension(
|
| std::string criticality =
|
| extension->critical.data && extension->critical.data[0] ?
|
| critical_label : non_critical_label;
|
| - return criticality + "\n" +
|
| - psm::ProcessExtensionData(SECOID_FindOIDTag(&extension->id),
|
| - &extension->value);
|
| + return criticality + "\n" + psm::ProcessExtensionData(extension);
|
| +}
|
| +
|
| +std::string GetNickname(net::X509Certificate::OSCertHandle cert_handle) {
|
| + std::string name;
|
| + if (cert_handle->nickname) {
|
| + name = cert_handle->nickname;
|
| + // Hack copied from mozilla: Cut off text before first :, which seems to
|
| + // just be the token name.
|
| + size_t colon_pos = name.find(':');
|
| + if (colon_pos != std::string::npos)
|
| + name = name.substr(colon_pos + 1);
|
| + }
|
| + return name;
|
| }
|
|
|
| ////////////////////////////////////////////////////////////////////////////////
|
| @@ -104,19 +115,6 @@ string GetCertNameOrNickname(X509Certificate::OSCertHandle cert_handle) {
|
| return GetNickname(cert_handle);
|
| }
|
|
|
| -string GetNickname(X509Certificate::OSCertHandle cert_handle) {
|
| - string name;
|
| - if (cert_handle->nickname) {
|
| - name = cert_handle->nickname;
|
| - // Hack copied from mozilla: Cut off text before first :, which seems to
|
| - // just be the token name.
|
| - size_t colon_pos = name.find(':');
|
| - if (colon_pos != string::npos)
|
| - name = name.substr(colon_pos + 1);
|
| - }
|
| - return name;
|
| -}
|
| -
|
| string GetTokenName(X509Certificate::OSCertHandle cert_handle) {
|
| return psm::GetCertTokenName(cert_handle);
|
| }
|
| @@ -136,28 +134,11 @@ net::CertType GetType(X509Certificate::OSCertHandle cert_handle) {
|
| return psm::GetCertType(cert_handle);
|
| }
|
|
|
| -string GetEmailAddress(X509Certificate::OSCertHandle cert_handle) {
|
| - if (cert_handle->emailAddr)
|
| - return cert_handle->emailAddr;
|
| - return std::string();
|
| -}
|
| -
|
| void GetUsageStrings(X509Certificate::OSCertHandle cert_handle,
|
| std::vector<string>* usages) {
|
| psm::GetCertUsageStrings(cert_handle, usages);
|
| }
|
|
|
| -string GetKeyUsageString(X509Certificate::OSCertHandle cert_handle) {
|
| - SECItem key_usage;
|
| - key_usage.data = NULL;
|
| - string key_usage_str;
|
| - if (CERT_FindKeyUsageExtension(cert_handle, &key_usage) == SECSuccess) {
|
| - key_usage_str = psm::ProcessKeyUsageBitString(&key_usage, ',');
|
| - PORT_Free(key_usage.data);
|
| - }
|
| - return key_usage_str;
|
| -}
|
| -
|
| string GetSerialNumberHexified(X509Certificate::OSCertHandle cert_handle,
|
| const string& alternative_text) {
|
| return Stringize(CERT_Hexify(&cert_handle->serialNumber, true),
|
| @@ -218,46 +199,6 @@ string GetSubjectName(X509Certificate::OSCertHandle cert_handle) {
|
| return psm::ProcessName(&cert_handle->subject);
|
| }
|
|
|
| -void GetEmailAddresses(X509Certificate::OSCertHandle cert_handle,
|
| - std::vector<string>* email_addresses) {
|
| - for (const char* addr = CERT_GetFirstEmailAddress(cert_handle);
|
| - addr; addr = CERT_GetNextEmailAddress(cert_handle, addr)) {
|
| - // The first email addr (from Subject) may be duplicated in Subject
|
| - // Alternative Name, so check subsequent addresses are not equal to the
|
| - // first one before adding to the list.
|
| - if (!email_addresses->size() || (*email_addresses)[0] != addr)
|
| - email_addresses->push_back(addr);
|
| - }
|
| -}
|
| -
|
| -void GetNicknameStringsFromCertList(
|
| - const std::vector<scoped_refptr<X509Certificate> >& certs,
|
| - const string& cert_expired,
|
| - const string& cert_not_yet_valid,
|
| - std::vector<string>* nick_names) {
|
| - CERTCertList* cert_list = CERT_NewCertList();
|
| - for (size_t i = 0; i < certs.size(); ++i) {
|
| - CERT_AddCertToListTail(
|
| - cert_list,
|
| - CERT_DupCertificate(certs[i]->os_cert_handle()));
|
| - }
|
| - // Would like to use CERT_GetCertNicknameWithValidity on each cert
|
| - // individually instead of having to build a CERTCertList for this, but that
|
| - // function is not exported.
|
| - CERTCertNicknames* cert_nicknames = CERT_NicknameStringsFromCertList(
|
| - cert_list,
|
| - const_cast<char*>(cert_expired.c_str()),
|
| - const_cast<char*>(cert_not_yet_valid.c_str()));
|
| - DCHECK_EQ(cert_nicknames->numnicknames,
|
| - static_cast<int>(certs.size()));
|
| -
|
| - for (int i = 0; i < cert_nicknames->numnicknames; ++i)
|
| - nick_names->push_back(cert_nicknames->nicknames[i]);
|
| -
|
| - CERT_FreeNicknames(cert_nicknames);
|
| - CERT_DestroyCertList(cert_list);
|
| -}
|
| -
|
| void GetExtensions(
|
| const string& critical_label,
|
| const string& non_critical_label,
|
| @@ -383,8 +324,4 @@ string ProcessRawBitsSignatureWrap(X509Certificate::OSCertHandle cert_handle) {
|
| cert_handle->signatureWrap.signature.len);
|
| }
|
|
|
| -void RegisterDynamicOids() {
|
| - psm::RegisterDynamicOids();
|
| -}
|
| -
|
| } // namespace x509_certificate_model
|
|
|