Index: net/base/keygen_handler_nss.cc |
diff --git a/net/base/keygen_handler_nss.cc b/net/base/keygen_handler_nss.cc |
index e5f28ac190830b497c7387e50e8c9f6af7a2cac6..661dabc7710d056aac8d02843b4828e6547c376f 100644 |
--- a/net/base/keygen_handler_nss.cc |
+++ b/net/base/keygen_handler_nss.cc |
@@ -7,7 +7,6 @@ |
#include "base/logging.h" |
#include "crypto/nss_crypto_module_delegate.h" |
#include "crypto/nss_util.h" |
-#include "crypto/nss_util_internal.h" |
#include "crypto/scoped_nss_types.h" |
#include "net/third_party/mozilla_security_manager/nsKeygenHandler.h" |
@@ -17,26 +16,21 @@ namespace psm = mozilla_security_manager; |
namespace net { |
std::string KeygenHandler::GenKeyAndSignChallenge() { |
- // Ensure NSS is initialized. |
crypto::EnsureNSSInit(); |
crypto::ScopedPK11Slot slot; |
- if (crypto_module_delegate_) |
+ if (crypto_module_delegate_) { |
slot = crypto_module_delegate_->RequestSlot().Pass(); |
- else |
- slot.reset(crypto::GetPersistentNSSKeySlot()); |
- if (!slot.get()) { |
- LOG(ERROR) << "Couldn't get private key slot from NSS!"; |
+ } else { |
+ LOG(ERROR) << "Could not get an NSS key slot."; |
return std::string(); |
} |
// Authenticate to the token. |
- if (SECSuccess != |
- PK11_Authenticate( |
- slot.get(), |
- PR_TRUE, |
- crypto_module_delegate_ ? crypto_module_delegate_->wincx() : NULL)) { |
- LOG(ERROR) << "Couldn't authenticate to private key slot!"; |
+ if (SECSuccess != PK11_Authenticate(slot.get(), |
+ PR_TRUE, |
+ crypto_module_delegate_->wincx())) { |
+ LOG(ERROR) << "Could not authenticate to the key slot."; |
return std::string(); |
} |