Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(131)

Unified Diff: base/nss_util.h

Issue 6684018: Initialize NSS with no DB in the renderer process (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: fixed comments Created 9 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | base/nss_util.cc » ('j') | base/nss_util.cc » ('J')
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: base/nss_util.h
diff --git a/base/nss_util.h b/base/nss_util.h
index 10bbdfb41eb734f6f80ab104cf45cb87cb5fcd53..50623661a8eef1ab0025c42b2ae080dbfb89de38 100644
--- a/base/nss_util.h
+++ b/base/nss_util.h
@@ -37,6 +37,29 @@ void EnsureNSPRInit();
// ever be initialized once. NSS will be properly shut down on program exit.
void EnsureNSSInit();
+// Call this before calling EnsureNSSInit() will force NSS to initialize
+// without a persistent DB. This is used for the special case where access of
+// persistent DB is prohibited.
wtc 2011/03/15 21:37:20 Please document that this function is applicable t
+//
+// NSS will be initialized without loading any user security modules, including
+// the built-in root certificates module. User security modules need to be
+// loaded manually after NSS initialization.
wtc 2011/03/15 21:37:20 I still think omitting the InitDefaultRootCerts ca
+//
+// If EnsureNSSInit() is called before then this function has no effect.
+//
+// WARNING: Use this with caution.
+void ForceNSSNoDBInit();
+
+// This methods is used to disable checks in NSS when used in a forked process.
+// NSS is fork-sensitive to avoid problems when using user security modules in
wtc 2011/03/15 21:37:20 Nit: what does "fork-sensitive" mean? Please rewo
+// a forked process. However if we are sure there are no modules loaded before
+// the process is forked then there is no harm disabling the check.
+//
+// This method must be called before EnsureNSSInit() to take effect.
+//
+// WARNING: Use this with caution.
+void DisableNSSForkCheck();
+
// Check if the current NSS version is greater than or equals to |version|.
// A sample version string is "3.12.3".
bool CheckNSSVersion(const char* version);
« no previous file with comments | « no previous file | base/nss_util.cc » ('j') | base/nss_util.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698