From ba217a89984a7a8af029e88ec774f4e71309d574 Mon Sep 17 00:00:00 2001 From: Xan Lopez Date: Thu, 10 Sep 2009 23:01:30 +0300 Subject: ephy-nss-glue.c: ignore padLength error in the NSS glue code It seems to be harmless, and if we ignore it we can still decrypt some passwords. --- src/ephy-nss-glue.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) (limited to 'src/ephy-nss-glue.c') diff --git a/src/ephy-nss-glue.c b/src/ephy-nss-glue.c index a5f58cc06..84992e782 100644 --- a/src/ephy-nss-glue.c +++ b/src/ephy-nss-glue.c @@ -129,7 +129,10 @@ unpadBlock(SECItem *data, int blockSize, SECItem *result) PORT_Memcpy(result->data, data->data, result->len); if (padLength < 2) { - return SECWouldBlock; + /* Chromium returns an error here, but it seems to be harmless and + if we continue we'll be able to import the password + correctly */ + /* return SECWouldBlock; */ } loser: -- cgit v1.2.3