Index: crypto/nss_util.h |
diff --git a/crypto/nss_util.h b/crypto/nss_util.h |
index 9e09d6db47eb390c2246ed2f3c81d13f3820bab8..a83ac4482bab23a5d50999a73203ad5d744982d3 100644 |
--- a/crypto/nss_util.h |
+++ b/crypto/nss_util.h |
@@ -36,6 +36,16 @@ CRYPTO_EXPORT void EarlySetupForNSSInit(); |
// thread-safe, and NSPR will only ever be initialized once. |
CRYPTO_EXPORT void EnsureNSPRInit(); |
+// Initialize NSS safely for strict sandboxing. This function makes sure that |
+// NSS is initialized safely and will have proper entropy in a restricted, |
+// sandboxed environment. |
+// |
+// As a defense in depth measure, this function should be called in a sandboxed |
+// environment to make sure NSS will not load security modules that could |
+// expose private data and keys. Make sure to get an LGTM from security |
+// if you use this. |
+CRYPTO_EXPORT void WarmUpNSSSafely(); |
+ |
// Initialize NSS if it isn't already initialized. This must be called before |
// any other NSS functions. This function is thread-safe, and NSS will only |
// ever be initialized once. |
@@ -58,7 +68,7 @@ CRYPTO_EXPORT void EnsureNSSInit(); |
// WARNING: Use this with caution. |
CRYPTO_EXPORT void ForceNSSNoDBInit(); |
-// This methods is used to disable checks in NSS when used in a forked process. |
+// This method is used to disable checks in NSS when used in a forked process. |
// NSS checks whether it is running a forked process to avoid problems when |
// using user security modules in a forked process. However if we are sure |
// there are no modules loaded before the process is forked then there is no |