| Index: net/base/keygen_handler.h
|
| diff --git a/net/base/keygen_handler.h b/net/base/keygen_handler.h
|
| index a6e822c08cfe7681dc855e097a01f1474074b07a..366abcd0a07d51f421e64a0168437bc5ed213047 100644
|
| --- a/net/base/keygen_handler.h
|
| +++ b/net/base/keygen_handler.h
|
| @@ -13,7 +13,7 @@
|
| #include "net/base/net_export.h"
|
|
|
| #if defined(USE_NSS)
|
| -#include "crypto/crypto_module_blocking_password_delegate.h"
|
| +#include "crypto/scoped_nss_types.h"
|
| #endif // defined(USE_NSS)
|
|
|
| namespace net {
|
| @@ -41,12 +41,7 @@ class NET_EXPORT KeygenHandler {
|
| void set_stores_key(bool store) { stores_key_ = store;}
|
|
|
| #if defined(USE_NSS)
|
| - // Register the password delegate to be used if the token is unauthenticated.
|
| - // GenKeyAndSignChallenge runs on a worker thread, so using the blocking
|
| - // password callback is okay here.
|
| - // Takes ownership of the delegate.
|
| - void set_crypto_module_password_delegate(
|
| - crypto::CryptoModuleBlockingPasswordDelegate* delegate);
|
| + void set_key_slot(crypto::ScopedPK11Slot slot);
|
| #endif // defined(USE_NSS)
|
|
|
| private:
|
| @@ -55,9 +50,7 @@ class NET_EXPORT KeygenHandler {
|
| GURL url_; // the URL that requested the key
|
| bool stores_key_; // should the generated key-pair be stored persistently?
|
| #if defined(USE_NSS)
|
| - // The callback for requesting a password to the PKCS#11 token.
|
| - scoped_ptr<crypto::CryptoModuleBlockingPasswordDelegate>
|
| - crypto_module_password_delegate_;
|
| + crypto::ScopedPK11Slot slot_;
|
| #endif // defined(USE_NSS)
|
| };
|
|
|
|
|