aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorXan Lopez <xan@gnome.org>2009-09-11 04:01:30 +0800
committerXan Lopez <xan@gnome.org>2009-09-11 04:01:30 +0800
commitba217a89984a7a8af029e88ec774f4e71309d574 (patch)
treee8c234b36dae53b06d5445ea2e53fee43295058c
parent8d08fa859cd2629100da93c089a116e0a76dca3f (diff)
downloadgsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar
gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.gz
gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.bz2
gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.lz
gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.xz
gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.zst
gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.zip
ephy-nss-glue.c: ignore padLength error in the NSS glue code
It seems to be harmless, and if we ignore it we can still decrypt some passwords.
-rw-r--r--src/ephy-nss-glue.c5
1 files changed, 4 insertions, 1 deletions
diff --git a/src/ephy-nss-glue.c b/src/ephy-nss-glue.c
index a5f58cc06..84992e782 100644
--- a/src/ephy-nss-glue.c
+++ b/src/ephy-nss-glue.c
@@ -129,7 +129,10 @@ unpadBlock(SECItem *data, int blockSize, SECItem *result)
PORT_Memcpy(result->data, data->data, result->len);
if (padLength < 2) {
- return SECWouldBlock;
+ /* Chromium returns an error here, but it seems to be harmless and
+ if we continue we'll be able to import the password
+ correctly */
+ /* return SECWouldBlock; */
}
loser: