diff options
author | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-04-06 02:37:21 +0000 |
---|---|---|
committer | rsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-04-06 02:37:21 +0000 |
commit | 922899fd889ae914220123b768e14eed79ea9409 (patch) | |
tree | 8ccc26814a2ef63358aac0a8bed73e111b32c278 /gpu/command_buffer/client/gles2_implementation.cc | |
parent | 0a311f79eb90987f2cb418be304705f7262d9de5 (diff) | |
download | chromium_src-922899fd889ae914220123b768e14eed79ea9409.zip chromium_src-922899fd889ae914220123b768e14eed79ea9409.tar.gz chromium_src-922899fd889ae914220123b768e14eed79ea9409.tar.bz2 |
Properly pass NSS parameters when initializing the PKCS#11 module on CrOS
When initializing the CHAPS PKCS#11 module in CrOS, properly
pass the NSS parameters to SECMOD_LoadUserModule. This
ensures that the default flags for the default slot to mark
the slot as friendly, which means it is not necessary to
call C_Login before calling any read-only operations. Any
actions that fail in read-only mode will still call C_Login.
BUG=118206, chromium-os:28842
TEST=See bug
Review URL: http://codereview.chromium.org/9963127
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@131075 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'gpu/command_buffer/client/gles2_implementation.cc')
0 files changed, 0 insertions, 0 deletions