Index: crypto/nss_util.h |
diff --git a/crypto/nss_util.h b/crypto/nss_util.h |
index 9e09d6db47eb390c2246ed2f3c81d13f3820bab8..f42cbe927739373ef71d447f1c495422fac03c09 100644 |
--- a/crypto/nss_util.h |
+++ b/crypto/nss_util.h |
@@ -36,6 +36,11 @@ CRYPTO_EXPORT void EarlySetupForNSSInit(); |
// thread-safe, and NSPR will only ever be initialized once. |
CRYPTO_EXPORT void EnsureNSPRInit(); |
+// Initialize NSS safely for strict sandboxing. This function makes sure that |
+// NSS is initialized safely and will have proper entropy in a restricted, |
+// sandboxed environment. |
jln (very slow on Chromium)
2012/11/15 23:22:18
I would maybe add a comment here along the lines o
Jorge Lucangeli Obes
2012/11/15 23:52:44
Done.
|
+CRYPTO_EXPORT void WarmUpNSSSafely(); |
+ |
// Initialize NSS if it isn't already initialized. This must be called before |
// any other NSS functions. This function is thread-safe, and NSS will only |
// ever be initialized once. |
@@ -58,7 +63,7 @@ CRYPTO_EXPORT void EnsureNSSInit(); |
// WARNING: Use this with caution. |
CRYPTO_EXPORT void ForceNSSNoDBInit(); |
-// This methods is used to disable checks in NSS when used in a forked process. |
+// This method is used to disable checks in NSS when used in a forked process. |
// NSS checks whether it is running a forked process to avoid problems when |
// using user security modules in a forked process. However if we are sure |
// there are no modules loaded before the process is forked then there is no |