Index: chrome/browser/ui/webui/options2/certificate_manager_handler2.cc |
diff --git a/chrome/browser/ui/webui/options2/certificate_manager_handler2.cc b/chrome/browser/ui/webui/options2/certificate_manager_handler2.cc |
index ea1c9c5aa7a894b46d5d7973e2b3e05ff4dbc4e0..a8ed12492e6d94f9de29b9e783901f4990beecb3 100644 |
--- a/chrome/browser/ui/webui/options2/certificate_manager_handler2.cc |
+++ b/chrome/browser/ui/webui/options2/certificate_manager_handler2.cc |
@@ -976,6 +976,9 @@ void CertificateManagerHandler::PopulateTree(const std::string& tab_name, |
cert_dict->SetBoolean( |
kUntrustedId, |
certificate_manager_model_->cert_db().IsUntrusted(cert)); |
+ // TODO(hshi): This should be determined by testing for PKCS #11 |
+ // CKA_EXTRACTABLE attribute. We may need to use the NSS function |
+ // PK11_ReadRawAttribute to do that. |
cert_dict->SetBoolean( |
kExtractableId, |
!certificate_manager_model_->IsHardwareBacked(cert)); |