diff options
author | Xan Lopez <xan@gnome.org> | 2009-09-11 04:01:30 +0800 |
---|---|---|
committer | Xan Lopez <xan@gnome.org> | 2009-09-11 04:01:30 +0800 |
commit | ba217a89984a7a8af029e88ec774f4e71309d574 (patch) | |
tree | e8c234b36dae53b06d5445ea2e53fee43295058c /src | |
parent | 8d08fa859cd2629100da93c089a116e0a76dca3f (diff) | |
download | gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.gz gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.bz2 gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.lz gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.xz gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.tar.zst gsoc2013-epiphany-ba217a89984a7a8af029e88ec774f4e71309d574.zip |
ephy-nss-glue.c: ignore padLength error in the NSS glue code
It seems to be harmless, and if we ignore it we can still decrypt some passwords.
Diffstat (limited to 'src')
-rw-r--r-- | src/ephy-nss-glue.c | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/src/ephy-nss-glue.c b/src/ephy-nss-glue.c index a5f58cc06..84992e782 100644 --- a/src/ephy-nss-glue.c +++ b/src/ephy-nss-glue.c @@ -129,7 +129,10 @@ unpadBlock(SECItem *data, int blockSize, SECItem *result) PORT_Memcpy(result->data, data->data, result->len); if (padLength < 2) { - return SECWouldBlock; + /* Chromium returns an error here, but it seems to be harmless and + if we continue we'll be able to import the password + correctly */ + /* return SECWouldBlock; */ } loser: |