Index: net/cert/internal/cert_issuer_source_nss.cc |
diff --git a/net/cert/internal/cert_issuer_source_nss.cc b/net/cert/internal/cert_issuer_source_nss.cc |
deleted file mode 100644 |
index 24218e88ca0bf5963e6b3e3877891b8223cc9142..0000000000000000000000000000000000000000 |
--- a/net/cert/internal/cert_issuer_source_nss.cc |
+++ /dev/null |
@@ -1,65 +0,0 @@ |
-// Copyright 2016 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/cert/internal/cert_issuer_source_nss.h" |
- |
-#include <cert.h> |
-#include <certdb.h> |
- |
-#include "crypto/nss_util.h" |
-#include "net/cert/internal/cert_errors.h" |
-#include "net/cert/internal/parsed_certificate.h" |
-#include "net/cert/x509_util.h" |
- |
-namespace net { |
- |
-CertIssuerSourceNSS::CertIssuerSourceNSS() = default; |
-CertIssuerSourceNSS::~CertIssuerSourceNSS() = default; |
- |
-void CertIssuerSourceNSS::SyncGetIssuersOf(const ParsedCertificate* cert, |
- ParsedCertificateList* issuers) { |
- crypto::EnsureNSSInit(); |
- |
- SECItem name; |
- // Use the original issuer value instead of the normalized version. NSS does a |
- // less extensive normalization in its Name comparisons, so our normalized |
- // version may not match the unnormalized version. |
- name.len = cert->tbs().issuer_tlv.Length(); |
- name.data = const_cast<uint8_t*>(cert->tbs().issuer_tlv.UnsafeData()); |
- // |validOnly| in CERT_CreateSubjectCertList controls whether to return only |
- // certs that are valid at |sorttime|. Including expired certs could lead to |
- // more useful error messages in the case where a valid path can't be found, |
- // so request all matches. |
- CERTCertList* found_certs = CERT_CreateSubjectCertList( |
- nullptr /* certList */, CERT_GetDefaultCertDB(), &name, |
- PR_Now() /* sorttime */, PR_FALSE /* validOnly */); |
- if (!found_certs) |
- return; |
- |
- for (CERTCertListNode* node = CERT_LIST_HEAD(found_certs); |
- !CERT_LIST_END(node, found_certs); node = CERT_LIST_NEXT(node)) { |
- CertErrors errors; |
- scoped_refptr<ParsedCertificate> issuer_cert = ParsedCertificate::Create( |
- x509_util::CreateCryptoBuffer(node->cert->derCert.data, |
- node->cert->derCert.len), |
- {}, &errors); |
- if (!issuer_cert) { |
- // TODO(crbug.com/634443): return errors better. |
- LOG(ERROR) << "Error parsing issuer certificate:\n" |
- << errors.ToDebugString(); |
- continue; |
- } |
- |
- issuers->push_back(std::move(issuer_cert)); |
- } |
- CERT_DestroyCertList(found_certs); |
-} |
- |
-void CertIssuerSourceNSS::AsyncGetIssuersOf(const ParsedCertificate* cert, |
- std::unique_ptr<Request>* out_req) { |
- // CertIssuerSourceNSS never returns asynchronous results. |
- out_req->reset(); |
-} |
- |
-} // namespace net |