Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "crypto/nss_util.h" | 5 #include "crypto/nss_util.h" |
| 6 #include "crypto/nss_util_internal.h" | 6 #include "crypto/nss_util_internal.h" |
| 7 | 7 |
| 8 #include <nss.h> | 8 #include <nss.h> |
| 9 #include <plarena.h> | 9 #include <plarena.h> |
| 10 #include <prerror.h> | 10 #include <prerror.h> |
| (...skipping 684 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 695 LOG(ERROR) << "Failed to load NSS libraries."; | 695 LOG(ERROR) << "Failed to load NSS libraries."; |
| 696 } | 696 } |
| 697 #endif | 697 #endif |
| 698 } | 698 } |
| 699 | 699 |
| 700 bool CheckNSSVersion(const char* version) { | 700 bool CheckNSSVersion(const char* version) { |
| 701 return !!NSS_VersionCheck(version); | 701 return !!NSS_VersionCheck(version); |
| 702 } | 702 } |
| 703 | 703 |
| 704 #if defined(USE_NSS) | 704 #if defined(USE_NSS) |
| 705 bool OpenTestNSSDB() { | 705 ScopedTestNSSDB::ScopedTestNSSDB() |
| 706 return g_nss_singleton.Get().OpenTestNSSDB(); | 706 : is_open_(g_nss_singleton.Get().OpenTestNSSDB()) { |
| 707 DCHECK(is_open_); | |
|
Ryan Sleevi
2012/10/16 18:19:02
Do not DCHECK here - this will crash tests in debu
Takashi Toyoshima
2012/10/17 04:58:53
Done.
| |
| 708 } | |
| 709 | |
| 710 ScopedTestNSSDB::~ScopedTestNSSDB() { | |
| 711 // TODO(mattm): Close dababase after | |
| 712 // https://bugzilla.mozilla.org/show_bug.cgi?id=588269 is fixed. | |
|
Ryan Sleevi
2012/10/16 18:19:02
// TODO(mattm): Close the database once NSS 3.14 i
Takashi Toyoshima
2012/10/17 04:58:53
Done.
| |
| 707 } | 713 } |
| 708 | 714 |
| 709 base::Lock* GetNSSWriteLock() { | 715 base::Lock* GetNSSWriteLock() { |
| 710 return g_nss_singleton.Get().write_lock(); | 716 return g_nss_singleton.Get().write_lock(); |
| 711 } | 717 } |
| 712 | 718 |
| 713 AutoNSSWriteLock::AutoNSSWriteLock() : lock_(GetNSSWriteLock()) { | 719 AutoNSSWriteLock::AutoNSSWriteLock() : lock_(GetNSSWriteLock()) { |
| 714 // May be NULL if the lock is not needed in our version of NSS. | 720 // May be NULL if the lock is not needed in our version of NSS. |
| 715 if (lock_) | 721 if (lock_) |
| 716 lock_->Acquire(); | 722 lock_->Acquire(); |
| (...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 772 | 778 |
| 773 PK11SlotInfo* GetPublicNSSKeySlot() { | 779 PK11SlotInfo* GetPublicNSSKeySlot() { |
| 774 return g_nss_singleton.Get().GetPublicNSSKeySlot(); | 780 return g_nss_singleton.Get().GetPublicNSSKeySlot(); |
| 775 } | 781 } |
| 776 | 782 |
| 777 PK11SlotInfo* GetPrivateNSSKeySlot() { | 783 PK11SlotInfo* GetPrivateNSSKeySlot() { |
| 778 return g_nss_singleton.Get().GetPrivateNSSKeySlot(); | 784 return g_nss_singleton.Get().GetPrivateNSSKeySlot(); |
| 779 } | 785 } |
| 780 | 786 |
| 781 } // namespace crypto | 787 } // namespace crypto |
| OLD | NEW |