Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(853)

Issue 6250008: net: lookup OCSP cache function with dlsym. (Closed)

Created:
9 years, 11 months ago by agl
Modified:
9 years, 7 months ago
Reviewers:
wtc
CC:
chromium-reviews, cbentzel+watch_chromium.org, darin-cc_chromium.org
Visibility:
Public.

Description

net: lookup OCSP cache function with dlsym. Weak symbols are either broken or they don't work the way that we need. Either way, the current weak symbol based scheme is causing runtime-linker aborts on systems without NSS 3.12.6. This change switches to using dlsym to lookup the symbol at runtime. BUG=69345 TEST=Run chrome on systems with libnss.so < 3.12.6

Patch Set 1 #

Total comments: 6

Patch Set 2 : g try #

Total comments: 2
Unified diffs Side-by-side diffs Delta from patch set Stats (+49 lines, -16 lines) Patch
M net/socket/ssl_client_socket_nss.cc View 1 5 chunks +49 lines, -16 lines 2 comments Download

Messages

Total messages: 4 (0 generated)
agl
9 years, 11 months ago (2011-01-18 19:15:22 UTC) #1
wtc
LGTM. There is a Windows (and perhaps Mac) compilation error noted with "BUG" below. Also, ...
9 years, 11 months ago (2011-01-18 19:57:01 UTC) #2
agl
I think Singleton is correct here. LazyInstance<X> means that there can be several X's but ...
9 years, 11 months ago (2011-01-18 20:29:45 UTC) #3
wtc
9 years, 11 months ago (2011-01-18 20:43:48 UTC) #4
LGTM!

http://codereview.chromium.org/6250008/diff/5001/net/socket/ssl_client_socket...
File net/socket/ssl_client_socket_nss.cc (right):

http://codereview.chromium.org/6250008/diff/5001/net/socket/ssl_client_socket...
net/socket/ssl_client_socket_nss.cc:100: #if defined(USE_SYSTEM_SSL)
Hmm... let's combine the #include <dlfcn.h> you added with
this one.

http://codereview.chromium.org/6250008/diff/5001/net/socket/ssl_client_socket...
net/socket/ssl_client_socket_nss.cc:2030: if (!predicted_cert_chain_correct_ &&
cache_ocsp_response) {
I assume predicted_cert_chain_correct_ is likely to be true,
so it is fine to call GetCacheOCSPResponseFromSideChannelFunction()
first even though its result may not be used in some cases.

Powered by Google App Engine
This is Rietveld 408576698