diff options
author | dcheng <dcheng@chromium.org> | 2015-12-31 08:11:45 -0800 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2015-12-31 16:13:37 +0000 |
commit | cf738a94eb3c1ff82f1e5f8868574358a88344ec (patch) | |
tree | 607fab64c289ee0cac52fb088ea968a30bce8329 /crypto | |
parent | 49d16ffa11e8ff863ce4815fd45afaa21f7131f0 (diff) | |
download | chromium_src-cf738a94eb3c1ff82f1e5f8868574358a88344ec.zip chromium_src-cf738a94eb3c1ff82f1e5f8868574358a88344ec.tar.gz chromium_src-cf738a94eb3c1ff82f1e5f8868574358a88344ec.tar.bz2 |
Global conversion of Pass()→std::move(): CrOS edition
(╯^□^)╯︵ ❄☃❄
BUG=557422
R=avi@chromium.org
TBR=jam@chromium.org
Review URL: https://codereview.chromium.org/1552863003
Cr-Commit-Position: refs/heads/master@{#367249}
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/nss_util.cc | 18 |
1 files changed, 10 insertions, 8 deletions
diff --git a/crypto/nss_util.cc b/crypto/nss_util.cc index 8e378f4..a7cb9e8 100644 --- a/crypto/nss_util.cc +++ b/crypto/nss_util.cc @@ -3,7 +3,6 @@ // found in the LICENSE file. #include "crypto/nss_util.h" -#include "crypto/nss_util_internal.h" #include <nss.h> #include <pk11pub.h> @@ -12,6 +11,9 @@ #include <prinit.h> #include <prtime.h> #include <secmod.h> +#include <utility> + +#include "crypto/nss_util_internal.h" #if defined(OS_OPENBSD) #include <sys/mount.h> @@ -215,7 +217,7 @@ void CrashOnNSSInitFailure() { class ChromeOSUserData { public: explicit ChromeOSUserData(ScopedPK11Slot public_slot) - : public_slot_(public_slot.Pass()), + : public_slot_(std::move(public_slot)), private_slot_initialization_started_(false) {} ~ChromeOSUserData() { if (public_slot_) { @@ -241,7 +243,7 @@ class ChromeOSUserData { void SetPrivateSlot(ScopedPK11Slot private_slot) { DCHECK(!private_slot_); - private_slot_ = private_slot.Pass(); + private_slot_ = std::move(private_slot); SlotReadyCallbackList callback_list; callback_list.swap(tpm_ready_callback_list_); @@ -422,7 +424,7 @@ class NSSInitSingleton { << ", got tpm slot: " << !!tpm_args->tpm_slot; chaps_module_ = tpm_args->chaps_module; - tpm_slot_ = tpm_args->tpm_slot.Pass(); + tpm_slot_ = std::move(tpm_args->tpm_slot); if (!chaps_module_ && test_system_slot_) { // chromeos_unittests try to test the TPM initialization process. If we // have a test DB open, pretend that it is the TPM slot. @@ -500,7 +502,7 @@ class NSSInitSingleton { "%s %s", kUserNSSDatabaseName, username_hash.c_str()); ScopedPK11Slot public_slot(OpenPersistentNSSDBForPath(db_name, path)); chromeos_user_map_[username_hash] = - new ChromeOSUserData(public_slot.Pass()); + new ChromeOSUserData(std::move(public_slot)); return true; } @@ -553,7 +555,7 @@ class NSSInitSingleton { DVLOG(2) << "Got tpm slot for " << username_hash << " " << !!tpm_args->tpm_slot; chromeos_user_map_[username_hash]->SetPrivateSlot( - tpm_args->tpm_slot.Pass()); + std::move(tpm_args->tpm_slot)); } void InitializePrivateSoftwareSlotForChromeOSUser( @@ -615,7 +617,7 @@ class NSSInitSingleton { // Ensure that a previous value of test_system_slot_ is not overwritten. // Unsetting, i.e. setting a NULL, however is allowed. DCHECK(!slot || !test_system_slot_); - test_system_slot_ = slot.Pass(); + test_system_slot_ = std::move(slot); if (test_system_slot_) { tpm_slot_.reset(PK11_ReferenceSlot(test_system_slot_.get())); RunAndClearTPMReadyCallbackList(); @@ -944,7 +946,7 @@ ScopedPK11Slot GetSystemNSSKeySlot( } void SetSystemKeySlotForTesting(ScopedPK11Slot slot) { - g_nss_singleton.Get().SetSystemKeySlotForTesting(slot.Pass()); + g_nss_singleton.Get().SetSystemKeySlotForTesting(std::move(slot)); } void EnableTPMTokenForNSS() { |