| Index: net/cert/nss_profile_filter_chromeos.h
|
| diff --git a/net/cert/nss_profile_filter_chromeos.h b/net/cert/nss_profile_filter_chromeos.h
|
| index d5ff8186888495c78bf8831a1dd0e1ab4eab194f..3e2be2e217e48ac638881dbc5f78597a1dcb2fbf 100644
|
| --- a/net/cert/nss_profile_filter_chromeos.h
|
| +++ b/net/cert/nss_profile_filter_chromeos.h
|
| @@ -16,17 +16,28 @@ class ResourceContext;
|
|
|
| namespace net {
|
|
|
| +// On ChromeOS each user has separate NSS databases, which are loaded
|
| +// simultaneously when multiple users are logged in at the same time. NSS
|
| +// doesn't have built-in support to partition databases into separate groups, so
|
| +// NSSProfileFilterChromeOS can be used to check if a given slot or certificate
|
| +// should be used for a given user.
|
| +//
|
| +// Objects of this class are thread-safe except for the Init function, which if
|
| +// called must not be called while other threads could access the object.
|
| class NET_EXPORT NSSProfileFilterChromeOS {
|
| public:
|
| + // Create a filter. Until Init is called (or if Init is called with NULL
|
| + // slot handles), the filter will allow only certs/slots from the read-only
|
| + // slots and the root CA module.
|
| NSSProfileFilterChromeOS();
|
| ~NSSProfileFilterChromeOS();
|
|
|
| - // Initialize with slot handles.
|
| + // Initialize with the slot handles to allow. This method is not thread-safe.
|
| void Init(crypto::ScopedPK11Slot public_slot,
|
| crypto::ScopedPK11Slot private_slot);
|
|
|
| bool IsModuleAllowed(PK11SlotInfo* slot) const;
|
| - bool IsCertAllowed(const scoped_refptr<X509Certificate>& cert) const;
|
| + bool IsCertAllowed(CERTCertificate* cert) const;
|
|
|
| class CertNotAllowedForProfilePredicate {
|
| public:
|
|
|