Index: base/nss_init.cc |
=================================================================== |
--- base/nss_init.cc (revision 6192) |
+++ base/nss_init.cc (working copy) |
@@ -9,31 +9,76 @@ |
// Work around https://bugzilla.mozilla.org/show_bug.cgi?id=455424 |
// until NSS 3.12.2 comes out and we update to it. |
#define Lock FOO_NSS_Lock |
+#include <secmod.h> |
#include <ssl.h> |
#undef Lock |
+#include "base/file_util.h" |
#include "base/logging.h" |
#include "base/singleton.h" |
namespace { |
+// Load nss's built-in root certs. |
+SECMODModule *InitDefaultRootCerts() { |
+ const char* kModulePath = "libnssckbi.so"; |
wtc
2008/12/02 02:10:39
Why can you get rid of the possible_locations arra
|
+ char modparams[1024]; |
+ snprintf(modparams, sizeof(modparams), |
+ "name=\"Root Certs\" library=\"%s\"", kModulePath); |
+ SECMODModule *root = SECMOD_LoadUserModule(modparams, NULL, PR_FALSE); |
+ if (root) |
+ return root; |
+ |
+ // Aw, snap. Can't find/load root cert shared library. |
+ // This will make it hard to talk to anybody via https. |
+ NOTREACHED(); |
+ return NULL; |
+} |
+ |
class NSSInitSingleton { |
public: |
NSSInitSingleton() { |
+ |
+ // Initialize without using a persistant database (e.g. ~/.netscape) |
CHECK(NSS_NoDB_Init(".") == SECSuccess); |
- // Enable ciphers |
+ |
+ root_ = InitDefaultRootCerts(); |
+ |
NSS_SetDomesticPolicy(); |
+ |
+ // Explicitly enable exactly those ciphers with keys of at least 80 bits |
+ for (int i = 0; i < SSL_NumImplementedCiphers; i++) { |
+ SSLCipherSuiteInfo info; |
+ if (SSL_GetCipherSuiteInfo(SSL_ImplementedCiphers[i], &info, |
+ sizeof(info)) == SECSuccess) { |
+ SSL_CipherPrefSetDefault(SSL_ImplementedCiphers[i], |
+ (info.effectiveKeyBits >= 80)); |
+ } |
+ } |
+ |
// Enable SSL |
SSL_OptionSetDefault(SSL_SECURITY, PR_TRUE); |
+ |
+ // All other SSL options are set per-session by SSLClientSocket |
} |
~NSSInitSingleton() { |
+ if (root_) { |
+ SECMOD_UnloadUserModule(root_); |
+ SECMOD_DestroyModule(root_); |
+ root_ = NULL; |
+ } |
+ |
// Have to clear the cache, or NSS_Shutdown fails with SEC_ERROR_BUSY |
SSL_ClearSessionCache(); |
SECStatus status = NSS_Shutdown(); |
- DCHECK(status == SECSuccess); |
+ if (status != SECSuccess) |
+ LOG(ERROR) << "NSS_Shutdown failed, leak? See " |
+ "http://code.google.com/p/chromium/issues/detail?id=4609"; |
} |
+ private: |
+ SECMODModule *root_; |
}; |
} // namespace |