Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(461)

Side by Side Diff: nss/patches/nss-static.patch

Issue 3135002: Update to NSS 3.12.7 and NSPR 4.8.6.... (Closed) Base URL: svn://chrome-svn/chrome/trunk/deps/third_party/
Patch Set: Created 10 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 Index: mozilla/security/nss/lib/certhigh/certvfy.c 1 Index: mozilla/security/nss/lib/certhigh/certvfy.c
2 =================================================================== 2 ===================================================================
3 RCS file: /cvsroot/mozilla/security/nss/lib/certhigh/certvfy.c,v 3 RCS file: /cvsroot/mozilla/security/nss/lib/certhigh/certvfy.c,v
4 retrieving revision 1.69 4 retrieving revision 1.71
5 diff -p -u -8 -r1.69 certvfy.c 5 diff -p -u -8 -r1.71 certvfy.c
6 --- mozilla/security/nss/lib/certhigh/certvfy.c»13 Mar 2009 02:59:04 -0000» 1.69 6 --- mozilla/security/nss/lib/certhigh/certvfy.c»30 Apr 2010 07:47:48 -0000» 1.71
7 +++ mozilla/security/nss/lib/certhigh/certvfy.c»9 Jan 2010 03:02:21 -0000 7 +++ mozilla/security/nss/lib/certhigh/certvfy.c»9 Aug 2010 22:29:25 -0000
8 @@ -40,27 +40,71 @@ 8 @@ -40,27 +40,71 @@
9 #include "secoid.h" 9 #include "secoid.h"
10 #include "sslerr.h" 10 #include "sslerr.h"
11 #include "genname.h" 11 #include "genname.h"
12 #include "keyhi.h" 12 #include "keyhi.h"
13 #include "cert.h" 13 #include "cert.h"
14 #include "certdb.h" 14 #include "certdb.h"
15 #include "certi.h" 15 #include "certi.h"
16 #include "cryptohi.h" 16 #include "cryptohi.h"
17 +#define NO_LIBPKIX 17 +#define NO_LIBPKIX
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after
76 CERT_CertTimesValid(CERTCertificate *c) 76 CERT_CertTimesValid(CERTCertificate *c)
77 { 77 {
78 SECCertTimeValidity valid = CERT_CheckCertValidTimes(c, PR_Now(), PR_TRUE); 78 SECCertTimeValidity valid = CERT_CheckCertValidTimes(c, PR_Now(), PR_TRUE);
79 return (valid == secCertTimeValid) ? SECSuccess : SECFailure; 79 return (valid == secCertTimeValid) ? SECSuccess : SECFailure;
80 Index: mozilla/security/nss/lib/freebl/blapii.h 80 Index: mozilla/security/nss/lib/freebl/blapii.h
81 =================================================================== 81 ===================================================================
82 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/blapii.h,v 82 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/blapii.h,v
83 retrieving revision 1.1 83 retrieving revision 1.1
84 diff -p -u -8 -r1.1 blapii.h 84 diff -p -u -8 -r1.1 blapii.h
85 --- mozilla/security/nss/lib/freebl/blapii.h 3 Feb 2009 05:34:40 -0000 1.1 85 --- mozilla/security/nss/lib/freebl/blapii.h 3 Feb 2009 05:34:40 -0000 1.1
86 +++ mozilla/security/nss/lib/freebl/blapii.h» 9 Jan 2010 03:02:21 -0000 86 +++ mozilla/security/nss/lib/freebl/blapii.h» 9 Aug 2010 22:29:25 -0000
87 @@ -39,19 +39,19 @@ 87 @@ -39,19 +39,19 @@
88 #define _BLAPII_H_ 88 #define _BLAPII_H_
89 89
90 #include "blapit.h" 90 #include "blapit.h"
91 91
92 SEC_BEGIN_PROTOS 92 SEC_BEGIN_PROTOS
93 93
94 #if defined(XP_UNIX) && !defined(NO_CHECK_FORK) 94 #if defined(XP_UNIX) && !defined(NO_CHECK_FORK)
95 95
96 -extern PRBool parentForkedAfterC_Initialize; 96 -extern PRBool parentForkedAfterC_Initialize;
97 +extern PRBool bl_parentForkedAfterC_Initialize; 97 +extern PRBool bl_parentForkedAfterC_Initialize;
98 98
99 -#define SKIP_AFTER_FORK(x) if (!parentForkedAfterC_Initialize) x 99 -#define SKIP_AFTER_FORK(x) if (!parentForkedAfterC_Initialize) x
100 +#define SKIP_AFTER_FORK(x) if (!bl_parentForkedAfterC_Initialize) x 100 +#define SKIP_AFTER_FORK(x) if (!bl_parentForkedAfterC_Initialize) x
101 101
102 #else 102 #else
103 103
104 #define SKIP_AFTER_FORK(x) x 104 #define SKIP_AFTER_FORK(x) x
105 105
106 #endif 106 #endif
107 107
108 SEC_END_PROTOS 108 SEC_END_PROTOS
109 Index: mozilla/security/nss/lib/freebl/rsa.c 109 Index: mozilla/security/nss/lib/freebl/rsa.c
110 =================================================================== 110 ===================================================================
111 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/rsa.c,v 111 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/rsa.c,v
112 retrieving revision 1.39 112 retrieving revision 1.39
113 diff -p -u -8 -r1.39 rsa.c 113 diff -p -u -8 -r1.39 rsa.c
114 --- mozilla/security/nss/lib/freebl/rsa.c 3 Feb 2009 05:34:41 -0000 1.39 114 --- mozilla/security/nss/lib/freebl/rsa.c 3 Feb 2009 05:34:41 -0000 1.39
115 +++ mozilla/security/nss/lib/freebl/rsa.c» 9 Jan 2010 03:02:22 -0000 115 +++ mozilla/security/nss/lib/freebl/rsa.c» 9 Aug 2010 22:29:25 -0000
116 @@ -967,18 +967,25 @@ void RSA_Cleanup(void) 116 @@ -967,18 +967,25 @@ void RSA_Cleanup(void)
117 * free_bl may have allocated along the way. Currently only RSA does this, 117 * free_bl may have allocated along the way. Currently only RSA does this,
118 * so I've put it here for now. 118 * so I've put it here for now.
119 */ 119 */
120 void BL_Cleanup(void) 120 void BL_Cleanup(void)
121 { 121 {
122 RSA_Cleanup(); 122 RSA_Cleanup();
123 } 123 }
124 124
125 -PRBool parentForkedAfterC_Initialize; 125 -PRBool parentForkedAfterC_Initialize;
(...skipping 11 matching lines...) Expand all
137 */ 137 */
138 void BL_SetForkState(PRBool forked) 138 void BL_SetForkState(PRBool forked)
139 { 139 {
140 - parentForkedAfterC_Initialize = forked; 140 - parentForkedAfterC_Initialize = forked;
141 + bl_parentForkedAfterC_Initialize = forked; 141 + bl_parentForkedAfterC_Initialize = forked;
142 } 142 }
143 143
144 Index: mozilla/security/nss/lib/freebl/shvfy.c 144 Index: mozilla/security/nss/lib/freebl/shvfy.c
145 =================================================================== 145 ===================================================================
146 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/shvfy.c,v 146 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/shvfy.c,v
147 retrieving revision 1.11 147 retrieving revision 1.13
148 diff -p -u -8 -r1.11 shvfy.c 148 diff -p -u -8 -r1.13 shvfy.c
149 --- mozilla/security/nss/lib/freebl/shvfy.c» 18 Nov 2008 19:48:24 -0000» 1.11 149 --- mozilla/security/nss/lib/freebl/shvfy.c» 29 Apr 2010 00:17:52 -0000» 1.13
150 +++ mozilla/security/nss/lib/freebl/shvfy.c» 9 Jan 2010 03:02:22 -0000 150 +++ mozilla/security/nss/lib/freebl/shvfy.c» 9 Aug 2010 22:29:25 -0000
151 @@ -97,19 +97,29 @@ readItem(PRFileDesc *fd, SECItem *item) 151 @@ -97,19 +97,29 @@ readItem(PRFileDesc *fd, SECItem *item)
152 PORT_Free(item->data); 152 PORT_Free(item->data);
153 item->data = NULL; 153 item->data = NULL;
154 item->len = 0; 154 item->len = 0;
155 return SECFailure; 155 return SECFailure;
156 } 156 }
157 return SECSuccess; 157 return SECSuccess;
158 } 158 }
159 159
160 +/* 160 +/*
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after
199 + * If name is NULL, freebl is statically linked into softoken. 199 + * If name is NULL, freebl is statically linked into softoken.
200 + * softoken will call BLAPI_SHVerify next to verify itself. 200 + * softoken will call BLAPI_SHVerify next to verify itself.
201 + */ 201 + */
202 return PR_TRUE; 202 return PR_TRUE;
203 } 203 }
204 return BLAPI_SHVerify(name, (PRFuncPtr) decodeInt); 204 return BLAPI_SHVerify(name, (PRFuncPtr) decodeInt);
205 } 205 }
206 Index: mozilla/security/nss/lib/nss/nssinit.c 206 Index: mozilla/security/nss/lib/nss/nssinit.c
207 =================================================================== 207 ===================================================================
208 RCS file: /cvsroot/mozilla/security/nss/lib/nss/nssinit.c,v 208 RCS file: /cvsroot/mozilla/security/nss/lib/nss/nssinit.c,v
209 retrieving revision 1.103 209 retrieving revision 1.106
210 diff -p -u -8 -r1.103 nssinit.c 210 diff -p -u -8 -r1.106 nssinit.c
211 --- mozilla/security/nss/lib/nss/nssinit.c» 29 Oct 2009 21:33:10 -0000» 1.103 211 --- mozilla/security/nss/lib/nss/nssinit.c» 3 Apr 2010 20:06:00 -0000» 1.106
212 +++ mozilla/security/nss/lib/nss/nssinit.c» 9 Jan 2010 03:02:22 -0000 212 +++ mozilla/security/nss/lib/nss/nssinit.c» 9 Aug 2010 22:29:26 -0000
213 @@ -49,19 +49,22 @@ 213 @@ -47,19 +47,22 @@
214 #include "ssl.h" 214 #include "cert.h"
215 #include "sslproto.h" 215 #include "key.h"
216 #include "secmod.h" 216 #include "secmod.h"
217 #include "secoid.h" 217 #include "secoid.h"
218 #include "nss.h" 218 #include "nss.h"
219 #include "pk11func.h" 219 #include "pk11func.h"
220 #include "secerr.h" 220 #include "secerr.h"
221 #include "nssbase.h" 221 #include "nssbase.h"
222 +#define NO_LIBPKIX 222 +#define NO_LIBPKIX
223 +#ifndef NO_LIBPKIX 223 +#ifndef NO_LIBPKIX
224 #include "pkixt.h" 224 #include "pkixt.h"
225 #include "pkix.h" 225 #include "pkix.h"
226 #include "pkix_tools.h" 226 #include "pkix_tools.h"
227 +#endif /* NO_LIBPKIX */ 227 +#endif /* NO_LIBPKIX */
228 228
229 #include "pki3hack.h" 229 #include "pki3hack.h"
230 #include "certi.h" 230 #include "certi.h"
231 #include "secmodi.h" 231 #include "secmodi.h"
232 #include "ocspti.h" 232 #include "ocspti.h"
233 #include "ocspi.h" 233 #include "ocspi.h"
234 234
235 /* 235 /*
236 @@ -532,18 +535,20 @@ nss_Init(const char *configdir, const ch 236 @@ -530,18 +533,20 @@ nss_Init(const char *configdir, const ch
237 NSSInitParameters *initParams, 237 NSSInitParameters *initParams,
238 PRBool readOnly, PRBool noCertDB, 238 PRBool readOnly, PRBool noCertDB,
239 PRBool noModDB, PRBool forceOpen, PRBool noRootInit, 239 PRBool noModDB, PRBool forceOpen, PRBool noRootInit,
240 PRBool optimizeSpace, PRBool noSingleThreadedModules, 240 PRBool optimizeSpace, PRBool noSingleThreadedModules,
241 PRBool allowAlreadyInitializedModules, 241 PRBool allowAlreadyInitializedModules,
242 PRBool dontFinalizeModules) 242 PRBool dontFinalizeModules)
243 { 243 {
244 SECStatus rv = SECFailure; 244 SECStatus rv = SECFailure;
245 +#ifndef NO_LIBPKIX 245 +#ifndef NO_LIBPKIX
246 PKIX_UInt32 actualMinorVersion = 0; 246 PKIX_UInt32 actualMinorVersion = 0;
247 PKIX_Error *pkixError = NULL; 247 PKIX_Error *pkixError = NULL;
248 +#endif 248 +#endif
249 PRBool isReallyInitted; 249 PRBool isReallyInitted;
250 char *configStrings = NULL; 250 char *configStrings = NULL;
251 char *configName = NULL; 251 char *configName = NULL;
252 PRBool passwordRequired = PR_FALSE; 252 PRBool passwordRequired = PR_FALSE;
253 253
254 /* if we are trying to init with a traditional NSS_Init call, maintain 254 /* if we are trying to init with a traditional NSS_Init call, maintain
255 * the traditional idempotent behavior. */ 255 * the traditional idempotent behavior. */
256 if (!initContextPtr && nssIsInitted) { 256 if (!initContextPtr && nssIsInitted) {
257 @@ -662,28 +667,30 @@ nss_Init(const char *configdir, const ch 257 @@ -660,28 +665,30 @@ nss_Init(const char *configdir, const ch
258 nss_FindExternalRoot(dbpath, secmodName); 258 nss_FindExternalRoot(dbpath, secmodName);
259 } 259 }
260 } 260 }
261 } 261 }
262 262
263 pk11sdr_Init(); 263 pk11sdr_Init();
264 cert_CreateSubjectKeyIDHashTable(); 264 cert_CreateSubjectKeyIDHashTable();
265 265
266 +#ifndef NO_LIBPKIX 266 +#ifndef NO_LIBPKIX
267 pkixError = PKIX_Initialize 267 pkixError = PKIX_Initialize
(...skipping 10 matching lines...) Expand all
278 } 278 }
279 +#endif /* NO_LIBPKIX */ 279 +#endif /* NO_LIBPKIX */
280 280
281 281
282 } 282 }
283 283
284 /* 284 /*
285 * Now mark the appropriate init state. If initContextPtr was passed 285 * Now mark the appropriate init state. If initContextPtr was passed
286 * in, then return the new context pointer and add it to the 286 * in, then return the new context pointer and add it to the
287 * nssInitContextList. Otherwise set the global nss_isInitted flag 287 * nssInitContextList. Otherwise set the global nss_isInitted flag
288 @@ -1026,17 +1033,19 @@ nss_Shutdown(void) 288 @@ -1024,17 +1031,19 @@ nss_Shutdown(void)
289 289
290 rv = nss_ShutdownShutdownList(); 290 rv = nss_ShutdownShutdownList();
291 if (rv != SECSuccess) { 291 if (rv != SECSuccess) {
292 shutdownRV = SECFailure; 292 shutdownRV = SECFailure;
293 } 293 }
294 cert_DestroyLocks(); 294 cert_DestroyLocks();
295 ShutdownCRLCache(); 295 ShutdownCRLCache();
296 OCSP_ShutdownGlobal(); 296 OCSP_ShutdownGlobal();
297 +#ifndef NO_LIBPKIX 297 +#ifndef NO_LIBPKIX
298 PKIX_Shutdown(plContext); 298 PKIX_Shutdown(plContext);
299 +#endif 299 +#endif
300 SECOID_Shutdown(); 300 SECOID_Shutdown();
301 status = STAN_Shutdown(); 301 status = STAN_Shutdown();
302 cert_DestroySubjectKeyIDHashTable(); 302 cert_DestroySubjectKeyIDHashTable();
303 pk11_SetInternalKeySlot(NULL); 303 pk11_SetInternalKeySlot(NULL);
304 rv = SECMOD_Shutdown(); 304 rv = SECMOD_Shutdown();
305 if (rv != SECSuccess) { 305 if (rv != SECSuccess) {
306 shutdownRV = SECFailure; 306 shutdownRV = SECFailure;
307 } 307 }
308 Index: mozilla/security/nss/lib/pk11wrap/pk11load.c 308 Index: mozilla/security/nss/lib/pk11wrap/pk11load.c
309 =================================================================== 309 ===================================================================
310 RCS file: /cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v 310 RCS file: /cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v
311 retrieving revision 1.28 311 retrieving revision 1.30
312 diff -p -u -8 -r1.28 pk11load.c 312 diff -p -u -8 -r1.30 pk11load.c
313 --- mozilla/security/nss/lib/pk11wrap/pk11load.c» 30 Oct 2009 09:44:45 -00 00» 1.28 313 --- mozilla/security/nss/lib/pk11wrap/pk11load.c» 30 Apr 2010 07:22:54 -00 00» 1.30
314 +++ mozilla/security/nss/lib/pk11wrap/pk11load.c» 9 Jan 2010 03:02:22 -000 0 314 +++ mozilla/security/nss/lib/pk11wrap/pk11load.c» 9 Aug 2010 22:29:26 -000 0
315 @@ -344,46 +344,54 @@ SECMOD_SetRootCerts(PK11SlotInfo *slot, 315 @@ -344,46 +344,54 @@ SECMOD_SetRootCerts(PK11SlotInfo *slot,
316 mod->slotInfo = psi_list; 316 mod->slotInfo = psi_list;
317 mod->slotInfoCount++; 317 mod->slotInfoCount++;
318 318
319 } 319 }
320 psi->hasRootCerts = 1; 320 psi->hasRootCerts = 1;
321 } 321 }
322 } 322 }
323 323
324 +#if 1 /* STATIC LIBRARIES */ 324 +#if 1 /* STATIC LIBRARIES */
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after
415 @@ -587,27 +606,29 @@ SECMOD_UnloadModule(SECMODModule *mod) { 415 @@ -587,27 +606,29 @@ SECMOD_UnloadModule(SECMODModule *mod) {
416 } 416 }
417 mod->moduleID = 0; 417 mod->moduleID = 0;
418 mod->loaded = PR_FALSE; 418 mod->loaded = PR_FALSE;
419 419
420 /* do we want the semantics to allow unloading the internal library? 420 /* do we want the semantics to allow unloading the internal library?
421 * if not, we should change this to SECFailure and move it above the 421 * if not, we should change this to SECFailure and move it above the
422 * mod->loaded = PR_FALSE; */ 422 * mod->loaded = PR_FALSE; */
423 if (mod->internal) { 423 if (mod->internal) {
424 +#if 0 /* STATIC LIBRARIES */ 424 +#if 0 /* STATIC LIBRARIES */
425 if (0 == PR_AtomicDecrement(&softokenLoadCount)) { 425 if (0 == PR_ATOMIC_DECREMENT(&softokenLoadCount)) {
426 if (softokenLib) { 426 if (softokenLib) {
427 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); 427 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD");
428 if (!disableUnload) { 428 if (!disableUnload) {
429 PRStatus status = PR_UnloadLibrary(softokenLib); 429 PRStatus status = PR_UnloadLibrary(softokenLib);
430 PORT_Assert(PR_SUCCESS == status); 430 PORT_Assert(PR_SUCCESS == status);
431 } 431 }
432 softokenLib = NULL; 432 softokenLib = NULL;
433 } 433 }
434 loadSoftokenOnce = pristineCallOnce; 434 loadSoftokenOnce = pristineCallOnce;
435 } 435 }
436 +#endif 436 +#endif
437 return SECSuccess; 437 return SECSuccess;
438 } 438 }
439 439
440 library = (PRLibrary *)mod->library; 440 library = (PRLibrary *)mod->library;
441 /* paranoia */ 441 /* paranoia */
442 if (library == NULL) { 442 if (library == NULL) {
443 return SECFailure; 443 return SECFailure;
444 } 444 }
445 Index: mozilla/security/nss/lib/softoken/lgglue.c 445 Index: mozilla/security/nss/lib/softoken/lgglue.c
446 =================================================================== 446 ===================================================================
447 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.c,v 447 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.c,v
448 retrieving revision 1.13 448 retrieving revision 1.13
449 diff -p -u -8 -r1.13 lgglue.c 449 diff -p -u -8 -r1.13 lgglue.c
450 --- mozilla/security/nss/lib/softoken/lgglue.c 16 Apr 2009 18:19:26 -0000 1.13 450 --- mozilla/security/nss/lib/softoken/lgglue.c 16 Apr 2009 18:19:26 -0000 1.13
451 +++ mozilla/security/nss/lib/softoken/lgglue.c» 9 Jan 2010 03:02:23 -0000 451 +++ mozilla/security/nss/lib/softoken/lgglue.c» 9 Aug 2010 22:29:26 -0000
452 @@ -50,16 +50,17 @@ 452 @@ -50,16 +50,17 @@
453 453
454 static LGOpenFunc legacy_glue_open = NULL; 454 static LGOpenFunc legacy_glue_open = NULL;
455 static LGReadSecmodFunc legacy_glue_readSecmod = NULL; 455 static LGReadSecmodFunc legacy_glue_readSecmod = NULL;
456 static LGReleaseSecmodFunc legacy_glue_releaseSecmod = NULL; 456 static LGReleaseSecmodFunc legacy_glue_releaseSecmod = NULL;
457 static LGDeleteSecmodFunc legacy_glue_deleteSecmod = NULL; 457 static LGDeleteSecmodFunc legacy_glue_deleteSecmod = NULL;
458 static LGAddSecmodFunc legacy_glue_addSecmod = NULL; 458 static LGAddSecmodFunc legacy_glue_addSecmod = NULL;
459 static LGShutdownFunc legacy_glue_shutdown = NULL; 459 static LGShutdownFunc legacy_glue_shutdown = NULL;
460 460
461 +#if 0 /* STATIC LIBRARIES */ 461 +#if 0 /* STATIC LIBRARIES */
(...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after
566 legacy_glue_deleteSecmod = NULL; 566 legacy_glue_deleteSecmod = NULL;
567 legacy_glue_addSecmod = NULL; 567 legacy_glue_addSecmod = NULL;
568 legacy_glue_libCheckFailed = PR_FALSE; 568 legacy_glue_libCheckFailed = PR_FALSE;
569 legacy_glue_libCheckSucceeded = PR_FALSE; 569 legacy_glue_libCheckSucceeded = PR_FALSE;
570 Index: mozilla/security/nss/lib/softoken/lgglue.h 570 Index: mozilla/security/nss/lib/softoken/lgglue.h
571 =================================================================== 571 ===================================================================
572 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.h,v 572 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.h,v
573 retrieving revision 1.4 573 retrieving revision 1.4
574 diff -p -u -8 -r1.4 lgglue.h 574 diff -p -u -8 -r1.4 lgglue.h
575 --- mozilla/security/nss/lib/softoken/lgglue.h 16 Apr 2009 18:19:26 -0000 1.4 575 --- mozilla/security/nss/lib/softoken/lgglue.h 16 Apr 2009 18:19:26 -0000 1.4
576 +++ mozilla/security/nss/lib/softoken/lgglue.h» 9 Jan 2010 03:02:23 -0000 576 +++ mozilla/security/nss/lib/softoken/lgglue.h» 9 Aug 2010 22:29:26 -0000
577 @@ -65,16 +65,35 @@ typedef SECStatus (*LGDeleteSecmodFunc)( 577 @@ -65,16 +65,35 @@ typedef SECStatus (*LGDeleteSecmodFunc)(
578 const char *dbname, char *params, PRBool rw); 578 const char *dbname, char *params, PRBool rw);
579 typedef SECStatus (*LGAddSecmodFunc)(const char *appName, 579 typedef SECStatus (*LGAddSecmodFunc)(const char *appName,
580 const char *filename, 580 const char *filename,
581 const char *dbname, char *params, PRBool rw); 581 const char *dbname, char *params, PRBool rw);
582 typedef SECStatus (*LGShutdownFunc)(PRBool forked); 582 typedef SECStatus (*LGShutdownFunc)(PRBool forked);
583 typedef void (*LGSetForkStateFunc)(PRBool); 583 typedef void (*LGSetForkStateFunc)(PRBool);
584 typedef void (*LGSetCryptFunc)(LGEncryptFunc, LGDecryptFunc); 584 typedef void (*LGSetCryptFunc)(LGEncryptFunc, LGDecryptFunc);
585 585
586 +extern CK_RV legacy_Open(const char *dir, const char *certPrefix, 586 +extern CK_RV legacy_Open(const char *dir, const char *certPrefix,
(...skipping 22 matching lines...) Expand all
609 const char *keyPrefix, 609 const char *keyPrefix,
610 int certVersion, int keyVersion, int flags, PRBool isFIPS, 610 int certVersion, int keyVersion, int flags, PRBool isFIPS,
611 SDB **certDB, SDB **keyDB); 611 SDB **certDB, SDB **keyDB);
612 char ** sftkdbCall_ReadSecmodDB(const char *appName, const char *filename, 612 char ** sftkdbCall_ReadSecmodDB(const char *appName, const char *filename,
613 Index: mozilla/security/nss/lib/util/secport.h 613 Index: mozilla/security/nss/lib/util/secport.h
614 =================================================================== 614 ===================================================================
615 RCS file: /cvsroot/mozilla/security/nss/lib/util/secport.h,v 615 RCS file: /cvsroot/mozilla/security/nss/lib/util/secport.h,v
616 retrieving revision 1.23 616 retrieving revision 1.23
617 diff -p -u -8 -r1.23 secport.h 617 diff -p -u -8 -r1.23 secport.h
618 --- mozilla/security/nss/lib/util/secport.h 30 Oct 2009 09:44:47 -0000 1.23 618 --- mozilla/security/nss/lib/util/secport.h 30 Oct 2009 09:44:47 -0000 1.23
619 +++ mozilla/security/nss/lib/util/secport.h» 9 Jan 2010 03:02:23 -0000 619 +++ mozilla/security/nss/lib/util/secport.h» 9 Aug 2010 22:29:26 -0000
620 @@ -238,16 +238,17 @@ sec_port_iso88591_utf8_conversion_functi 620 @@ -238,16 +238,17 @@ sec_port_iso88591_utf8_conversion_functi
621 unsigned int maxOutBufLen, 621 unsigned int maxOutBufLen,
622 unsigned int *outBufLen 622 unsigned int *outBufLen
623 ); 623 );
624 624
625 extern int NSS_PutEnv(const char * envVarName, const char * envValue); 625 extern int NSS_PutEnv(const char * envVarName, const char * envValue);
626 626
627 extern int NSS_SecureMemcmp(const void *a, const void *b, size_t n); 627 extern int NSS_SecureMemcmp(const void *a, const void *b, size_t n);
628 628
629 +#if 0 /* STATIC LIBRARIES */ 629 +#if 0 /* STATIC LIBRARIES */
(...skipping 12 matching lines...) Expand all
642 */ 642 */
643 PRLibrary * 643 PRLibrary *
644 PORT_LoadLibraryFromOrigin(const char* existingShLibName, 644 PORT_LoadLibraryFromOrigin(const char* existingShLibName,
645 PRFuncPtr staticShLibFunc, 645 PRFuncPtr staticShLibFunc,
646 const char *newShLibName); 646 const char *newShLibName);
647 +#endif /* STATIC LIBRARIES */ 647 +#endif /* STATIC LIBRARIES */
648 648
649 SEC_END_PROTOS 649 SEC_END_PROTOS
650 650
651 #endif /* _SECPORT_H_ */ 651 #endif /* _SECPORT_H_ */
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698