| Index: crypto/ec_private_key_nss.cc
|
| diff --git a/crypto/ec_private_key_nss.cc b/crypto/ec_private_key_nss.cc
|
| index 9bb9df124e497ca4a3c6077bbc88575bd6f16729..bbce0f8b61128343523321474191c4ea01f0cb1f 100644
|
| --- a/crypto/ec_private_key_nss.cc
|
| +++ b/crypto/ec_private_key_nss.cc
|
| @@ -36,6 +36,7 @@ class EllipticCurveSupportChecker {
|
| // slot. If we support other slots in the future, checking whether they
|
| // support ECDSA may block NSS, and the value may also change as devices are
|
| // inserted/removed, so we would need to re-check on every use.
|
| + LOG(ERROR) << "HIIIIIIIIIIIIIIIIIIIIIIIIIII";
|
| crypto::EnsureNSSInit();
|
| crypto::ScopedPK11Slot slot(GetKeySlot());
|
| supported_ = PK11_DoesMechanism(slot.get(), CKM_EC_KEY_PAIR_GEN) &&
|
| @@ -328,6 +329,7 @@ ECPrivateKey* ECPrivateKey::CreateFromEncryptedPrivateKeyInfoWithParams(
|
| const std::vector<uint8>& subject_public_key_info,
|
| bool permanent,
|
| bool sensitive) {
|
| + LOG(ERROR) << "HIIIIIIIIIIIIIIIIIIIIIIIIIII";
|
| EnsureNSSInit();
|
|
|
| scoped_ptr<ECPrivateKey> result(new ECPrivateKey);
|
|
|