diff options
author | aa@chromium.org <aa@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-06-19 22:16:20 +0000 |
---|---|---|
committer | aa@chromium.org <aa@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-06-19 22:16:20 +0000 |
commit | e804e052523e23df3881132ab2e31791e0c0d1b6 (patch) | |
tree | 265c66d614f19e25164be714c94764eeed5e6e0c /chrome/browser/tab_contents/tab_contents_view_gtk.h | |
parent | d53b58c0c7e6e15446fd431e06d8f57c5fdc4734 (diff) | |
download | chromium_src-e804e052523e23df3881132ab2e31791e0c0d1b6.zip chromium_src-e804e052523e23df3881132ab2e31791e0c0d1b6.tar.gz chromium_src-e804e052523e23df3881132ab2e31791e0c0d1b6.tar.bz2 |
Two purify supression changes:
* Supress UMR in RSAPrivateKey::ExportPrivateKey(). From
what I can see, this really is a false positive. The
byte is 0xCD, at the exact place the error is reported
n Purify. Other supporting evidence is that it doesn't
always occur in the same place. Since we are generating
random keys, you'd expect to see the error show up
every so often wherever we are reading that memory.
* Remove supression of MOZ_Z_Deflate. Purify says this no
longer occurs. Not sure why.
Review URL: http://codereview.chromium.org/131097
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@18863 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/tab_contents/tab_contents_view_gtk.h')
0 files changed, 0 insertions, 0 deletions