summaryrefslogtreecommitdiffstats
path: root/gpu/command_buffer/client/gles2_implementation.cc
diff options
context:
space:
mode:
authorrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-04-06 02:37:21 +0000
committerrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-04-06 02:37:21 +0000
commit922899fd889ae914220123b768e14eed79ea9409 (patch)
tree8ccc26814a2ef63358aac0a8bed73e111b32c278 /gpu/command_buffer/client/gles2_implementation.cc
parent0a311f79eb90987f2cb418be304705f7262d9de5 (diff)
downloadchromium_src-922899fd889ae914220123b768e14eed79ea9409.zip
chromium_src-922899fd889ae914220123b768e14eed79ea9409.tar.gz
chromium_src-922899fd889ae914220123b768e14eed79ea9409.tar.bz2
Properly pass NSS parameters when initializing the PKCS#11 module on CrOS
When initializing the CHAPS PKCS#11 module in CrOS, properly pass the NSS parameters to SECMOD_LoadUserModule. This ensures that the default flags for the default slot to mark the slot as friendly, which means it is not necessary to call C_Login before calling any read-only operations. Any actions that fail in read-only mode will still call C_Login. BUG=118206, chromium-os:28842 TEST=See bug Review URL: http://codereview.chromium.org/9963127 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@131075 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'gpu/command_buffer/client/gles2_implementation.cc')
0 files changed, 0 insertions, 0 deletions