Chromium Code Reviews| Index: net/base/keygen_handler.h |
| diff --git a/net/base/keygen_handler.h b/net/base/keygen_handler.h |
| index 8262775505ceb3b7726c59ca85a8198f5cb0b0e3..caeddaf0d93120078ec22891dec5aa14112c983b 100644 |
| --- a/net/base/keygen_handler.h |
| +++ b/net/base/keygen_handler.h |
| @@ -13,8 +13,12 @@ |
| #include "net/base/net_export.h" |
| #include "url/gurl.h" |
| +#if defined(USE_NSS) |
| +#include "crypto/scoped_nss_types.h" |
|
pneubeck (no reviews)
2014/07/15 14:07:28
hmpf. This leaks nss includes into content/shell w
|
| +#endif |
| + |
| namespace crypto { |
| -class NSSCryptoModuleDelegate; |
| +class CryptoModuleBlockingPasswordDelegate; |
| } |
| namespace net { |
| @@ -42,12 +46,14 @@ class NET_EXPORT KeygenHandler { |
| void set_stores_key(bool store) { stores_key_ = store;} |
| #if defined(USE_NSS) |
| + void set_key_slot(PK11SlotInfo* slot); |
| + |
| // Register the delegate to be used to get the token to store the key in, and |
| // to get the password if the token is unauthenticated. |
| // GenKeyAndSignChallenge runs on a worker thread, so using a blocking |
| // password callback is okay here. |
| void set_crypto_module_delegate( |
| - scoped_ptr<crypto::NSSCryptoModuleDelegate> delegate); |
| + scoped_ptr<crypto::CryptoModuleBlockingPasswordDelegate> delegate); |
| #endif // defined(USE_NSS) |
| private: |
| @@ -56,8 +62,10 @@ class NET_EXPORT KeygenHandler { |
| GURL url_; // the URL that requested the key |
| bool stores_key_; // should the generated key-pair be stored persistently? |
| #if defined(USE_NSS) |
| + crypto::ScopedPK11Slot slot_; |
| // The callback for requesting a password to the PKCS#11 token. |
| - scoped_ptr<crypto::NSSCryptoModuleDelegate> crypto_module_delegate_; |
| + scoped_ptr<crypto::CryptoModuleBlockingPasswordDelegate> |
| + crypto_module_delegate_; |
| #endif // defined(USE_NSS) |
| }; |