| Index: net/base/keygen_handler.h
|
| diff --git a/net/base/keygen_handler.h b/net/base/keygen_handler.h
|
| index 4895dacb57e655d4e26360d761483fbe5cc15e1f..90cce5a80a9d9af2379d67da2ce2d4fe5bc92297 100644
|
| --- a/net/base/keygen_handler.h
|
| +++ b/net/base/keygen_handler.h
|
| @@ -13,7 +13,7 @@
|
| #include "url/gurl.h"
|
|
|
| #if defined(USE_NSS)
|
| -#include "crypto/crypto_module_blocking_password_delegate.h"
|
| +#include "crypto/scoped_nss_types.h"
|
| #endif // defined(USE_NSS)
|
|
|
| namespace net {
|
| @@ -41,12 +41,7 @@ class NET_EXPORT KeygenHandler {
|
| void set_stores_key(bool store) { stores_key_ = store;}
|
|
|
| #if defined(USE_NSS)
|
| - // Register the password delegate to be used if the token is unauthenticated.
|
| - // GenKeyAndSignChallenge runs on a worker thread, so using the blocking
|
| - // password callback is okay here.
|
| - // Takes ownership of the delegate.
|
| - void set_crypto_module_password_delegate(
|
| - crypto::CryptoModuleBlockingPasswordDelegate* delegate);
|
| + void set_key_slot(crypto::ScopedPK11Slot slot);
|
| #endif // defined(USE_NSS)
|
|
|
| private:
|
| @@ -55,9 +50,7 @@ class NET_EXPORT KeygenHandler {
|
| GURL url_; // the URL that requested the key
|
| bool stores_key_; // should the generated key-pair be stored persistently?
|
| #if defined(USE_NSS)
|
| - // The callback for requesting a password to the PKCS#11 token.
|
| - scoped_ptr<crypto::CryptoModuleBlockingPasswordDelegate>
|
| - crypto_module_password_delegate_;
|
| + crypto::ScopedPK11Slot slot_;
|
| #endif // defined(USE_NSS)
|
| };
|
|
|
|
|