| OLD | NEW |
| 1 Index: mozilla/security/nss/lib/certhigh/certvfy.c | 1 Index: mozilla/security/nss/lib/certhigh/certvfy.c |
| 2 =================================================================== | 2 =================================================================== |
| 3 RCS file: /cvsroot/mozilla/security/nss/lib/certhigh/certvfy.c,v | 3 RCS file: /cvsroot/mozilla/security/nss/lib/certhigh/certvfy.c,v |
| 4 retrieving revision 1.69 | 4 retrieving revision 1.71 |
| 5 diff -p -u -8 -r1.69 certvfy.c | 5 diff -p -u -8 -r1.71 certvfy.c |
| 6 --- mozilla/security/nss/lib/certhigh/certvfy.c»13 Mar 2009 02:59:04 -0000»
1.69 | 6 --- mozilla/security/nss/lib/certhigh/certvfy.c»30 Apr 2010 07:47:48 -0000»
1.71 |
| 7 +++ mozilla/security/nss/lib/certhigh/certvfy.c»9 Jan 2010 03:02:21 -0000 | 7 +++ mozilla/security/nss/lib/certhigh/certvfy.c»9 Aug 2010 22:29:25 -0000 |
| 8 @@ -40,27 +40,71 @@ | 8 @@ -40,27 +40,71 @@ |
| 9 #include "secoid.h" | 9 #include "secoid.h" |
| 10 #include "sslerr.h" | 10 #include "sslerr.h" |
| 11 #include "genname.h" | 11 #include "genname.h" |
| 12 #include "keyhi.h" | 12 #include "keyhi.h" |
| 13 #include "cert.h" | 13 #include "cert.h" |
| 14 #include "certdb.h" | 14 #include "certdb.h" |
| 15 #include "certi.h" | 15 #include "certi.h" |
| 16 #include "cryptohi.h" | 16 #include "cryptohi.h" |
| 17 +#define NO_LIBPKIX | 17 +#define NO_LIBPKIX |
| (...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 76 CERT_CertTimesValid(CERTCertificate *c) | 76 CERT_CertTimesValid(CERTCertificate *c) |
| 77 { | 77 { |
| 78 SECCertTimeValidity valid = CERT_CheckCertValidTimes(c, PR_Now(), PR_TRUE); | 78 SECCertTimeValidity valid = CERT_CheckCertValidTimes(c, PR_Now(), PR_TRUE); |
| 79 return (valid == secCertTimeValid) ? SECSuccess : SECFailure; | 79 return (valid == secCertTimeValid) ? SECSuccess : SECFailure; |
| 80 Index: mozilla/security/nss/lib/freebl/blapii.h | 80 Index: mozilla/security/nss/lib/freebl/blapii.h |
| 81 =================================================================== | 81 =================================================================== |
| 82 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/blapii.h,v | 82 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/blapii.h,v |
| 83 retrieving revision 1.1 | 83 retrieving revision 1.1 |
| 84 diff -p -u -8 -r1.1 blapii.h | 84 diff -p -u -8 -r1.1 blapii.h |
| 85 --- mozilla/security/nss/lib/freebl/blapii.h 3 Feb 2009 05:34:40 -0000
1.1 | 85 --- mozilla/security/nss/lib/freebl/blapii.h 3 Feb 2009 05:34:40 -0000
1.1 |
| 86 +++ mozilla/security/nss/lib/freebl/blapii.h» 9 Jan 2010 03:02:21 -0000 | 86 +++ mozilla/security/nss/lib/freebl/blapii.h» 9 Aug 2010 22:29:25 -0000 |
| 87 @@ -39,19 +39,19 @@ | 87 @@ -39,19 +39,19 @@ |
| 88 #define _BLAPII_H_ | 88 #define _BLAPII_H_ |
| 89 | 89 |
| 90 #include "blapit.h" | 90 #include "blapit.h" |
| 91 | 91 |
| 92 SEC_BEGIN_PROTOS | 92 SEC_BEGIN_PROTOS |
| 93 | 93 |
| 94 #if defined(XP_UNIX) && !defined(NO_CHECK_FORK) | 94 #if defined(XP_UNIX) && !defined(NO_CHECK_FORK) |
| 95 | 95 |
| 96 -extern PRBool parentForkedAfterC_Initialize; | 96 -extern PRBool parentForkedAfterC_Initialize; |
| 97 +extern PRBool bl_parentForkedAfterC_Initialize; | 97 +extern PRBool bl_parentForkedAfterC_Initialize; |
| 98 | 98 |
| 99 -#define SKIP_AFTER_FORK(x) if (!parentForkedAfterC_Initialize) x | 99 -#define SKIP_AFTER_FORK(x) if (!parentForkedAfterC_Initialize) x |
| 100 +#define SKIP_AFTER_FORK(x) if (!bl_parentForkedAfterC_Initialize) x | 100 +#define SKIP_AFTER_FORK(x) if (!bl_parentForkedAfterC_Initialize) x |
| 101 | 101 |
| 102 #else | 102 #else |
| 103 | 103 |
| 104 #define SKIP_AFTER_FORK(x) x | 104 #define SKIP_AFTER_FORK(x) x |
| 105 | 105 |
| 106 #endif | 106 #endif |
| 107 | 107 |
| 108 SEC_END_PROTOS | 108 SEC_END_PROTOS |
| 109 Index: mozilla/security/nss/lib/freebl/rsa.c | 109 Index: mozilla/security/nss/lib/freebl/rsa.c |
| 110 =================================================================== | 110 =================================================================== |
| 111 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/rsa.c,v | 111 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/rsa.c,v |
| 112 retrieving revision 1.39 | 112 retrieving revision 1.39 |
| 113 diff -p -u -8 -r1.39 rsa.c | 113 diff -p -u -8 -r1.39 rsa.c |
| 114 --- mozilla/security/nss/lib/freebl/rsa.c 3 Feb 2009 05:34:41 -0000
1.39 | 114 --- mozilla/security/nss/lib/freebl/rsa.c 3 Feb 2009 05:34:41 -0000
1.39 |
| 115 +++ mozilla/security/nss/lib/freebl/rsa.c» 9 Jan 2010 03:02:22 -0000 | 115 +++ mozilla/security/nss/lib/freebl/rsa.c» 9 Aug 2010 22:29:25 -0000 |
| 116 @@ -967,18 +967,25 @@ void RSA_Cleanup(void) | 116 @@ -967,18 +967,25 @@ void RSA_Cleanup(void) |
| 117 * free_bl may have allocated along the way. Currently only RSA does this, | 117 * free_bl may have allocated along the way. Currently only RSA does this, |
| 118 * so I've put it here for now. | 118 * so I've put it here for now. |
| 119 */ | 119 */ |
| 120 void BL_Cleanup(void) | 120 void BL_Cleanup(void) |
| 121 { | 121 { |
| 122 RSA_Cleanup(); | 122 RSA_Cleanup(); |
| 123 } | 123 } |
| 124 | 124 |
| 125 -PRBool parentForkedAfterC_Initialize; | 125 -PRBool parentForkedAfterC_Initialize; |
| (...skipping 11 matching lines...) Expand all Loading... |
| 137 */ | 137 */ |
| 138 void BL_SetForkState(PRBool forked) | 138 void BL_SetForkState(PRBool forked) |
| 139 { | 139 { |
| 140 - parentForkedAfterC_Initialize = forked; | 140 - parentForkedAfterC_Initialize = forked; |
| 141 + bl_parentForkedAfterC_Initialize = forked; | 141 + bl_parentForkedAfterC_Initialize = forked; |
| 142 } | 142 } |
| 143 | 143 |
| 144 Index: mozilla/security/nss/lib/freebl/shvfy.c | 144 Index: mozilla/security/nss/lib/freebl/shvfy.c |
| 145 =================================================================== | 145 =================================================================== |
| 146 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/shvfy.c,v | 146 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/shvfy.c,v |
| 147 retrieving revision 1.11 | 147 retrieving revision 1.13 |
| 148 diff -p -u -8 -r1.11 shvfy.c | 148 diff -p -u -8 -r1.13 shvfy.c |
| 149 --- mozilla/security/nss/lib/freebl/shvfy.c» 18 Nov 2008 19:48:24 -0000»
1.11 | 149 --- mozilla/security/nss/lib/freebl/shvfy.c» 29 Apr 2010 00:17:52 -0000»
1.13 |
| 150 +++ mozilla/security/nss/lib/freebl/shvfy.c» 9 Jan 2010 03:02:22 -0000 | 150 +++ mozilla/security/nss/lib/freebl/shvfy.c» 9 Aug 2010 22:29:25 -0000 |
| 151 @@ -97,19 +97,29 @@ readItem(PRFileDesc *fd, SECItem *item) | 151 @@ -97,19 +97,29 @@ readItem(PRFileDesc *fd, SECItem *item) |
| 152 PORT_Free(item->data); | 152 PORT_Free(item->data); |
| 153 item->data = NULL; | 153 item->data = NULL; |
| 154 item->len = 0; | 154 item->len = 0; |
| 155 return SECFailure; | 155 return SECFailure; |
| 156 } | 156 } |
| 157 return SECSuccess; | 157 return SECSuccess; |
| 158 } | 158 } |
| 159 | 159 |
| 160 +/* | 160 +/* |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 199 + * If name is NULL, freebl is statically linked into softoken. | 199 + * If name is NULL, freebl is statically linked into softoken. |
| 200 + * softoken will call BLAPI_SHVerify next to verify itself. | 200 + * softoken will call BLAPI_SHVerify next to verify itself. |
| 201 + */ | 201 + */ |
| 202 return PR_TRUE; | 202 return PR_TRUE; |
| 203 } | 203 } |
| 204 return BLAPI_SHVerify(name, (PRFuncPtr) decodeInt); | 204 return BLAPI_SHVerify(name, (PRFuncPtr) decodeInt); |
| 205 } | 205 } |
| 206 Index: mozilla/security/nss/lib/nss/nssinit.c | 206 Index: mozilla/security/nss/lib/nss/nssinit.c |
| 207 =================================================================== | 207 =================================================================== |
| 208 RCS file: /cvsroot/mozilla/security/nss/lib/nss/nssinit.c,v | 208 RCS file: /cvsroot/mozilla/security/nss/lib/nss/nssinit.c,v |
| 209 retrieving revision 1.103 | 209 retrieving revision 1.106 |
| 210 diff -p -u -8 -r1.103 nssinit.c | 210 diff -p -u -8 -r1.106 nssinit.c |
| 211 --- mozilla/security/nss/lib/nss/nssinit.c» 29 Oct 2009 21:33:10 -0000»
1.103 | 211 --- mozilla/security/nss/lib/nss/nssinit.c» 3 Apr 2010 20:06:00 -0000»
1.106 |
| 212 +++ mozilla/security/nss/lib/nss/nssinit.c» 9 Jan 2010 03:02:22 -0000 | 212 +++ mozilla/security/nss/lib/nss/nssinit.c» 9 Aug 2010 22:29:26 -0000 |
| 213 @@ -49,19 +49,22 @@ | 213 @@ -47,19 +47,22 @@ |
| 214 #include "ssl.h" | 214 #include "cert.h" |
| 215 #include "sslproto.h" | 215 #include "key.h" |
| 216 #include "secmod.h" | 216 #include "secmod.h" |
| 217 #include "secoid.h" | 217 #include "secoid.h" |
| 218 #include "nss.h" | 218 #include "nss.h" |
| 219 #include "pk11func.h" | 219 #include "pk11func.h" |
| 220 #include "secerr.h" | 220 #include "secerr.h" |
| 221 #include "nssbase.h" | 221 #include "nssbase.h" |
| 222 +#define NO_LIBPKIX | 222 +#define NO_LIBPKIX |
| 223 +#ifndef NO_LIBPKIX | 223 +#ifndef NO_LIBPKIX |
| 224 #include "pkixt.h" | 224 #include "pkixt.h" |
| 225 #include "pkix.h" | 225 #include "pkix.h" |
| 226 #include "pkix_tools.h" | 226 #include "pkix_tools.h" |
| 227 +#endif /* NO_LIBPKIX */ | 227 +#endif /* NO_LIBPKIX */ |
| 228 | 228 |
| 229 #include "pki3hack.h" | 229 #include "pki3hack.h" |
| 230 #include "certi.h" | 230 #include "certi.h" |
| 231 #include "secmodi.h" | 231 #include "secmodi.h" |
| 232 #include "ocspti.h" | 232 #include "ocspti.h" |
| 233 #include "ocspi.h" | 233 #include "ocspi.h" |
| 234 | 234 |
| 235 /* | 235 /* |
| 236 @@ -532,18 +535,20 @@ nss_Init(const char *configdir, const ch | 236 @@ -530,18 +533,20 @@ nss_Init(const char *configdir, const ch |
| 237 NSSInitParameters *initParams, | 237 NSSInitParameters *initParams, |
| 238 PRBool readOnly, PRBool noCertDB, | 238 PRBool readOnly, PRBool noCertDB, |
| 239 PRBool noModDB, PRBool forceOpen, PRBool noRootInit, | 239 PRBool noModDB, PRBool forceOpen, PRBool noRootInit, |
| 240 PRBool optimizeSpace, PRBool noSingleThreadedModules, | 240 PRBool optimizeSpace, PRBool noSingleThreadedModules, |
| 241 PRBool allowAlreadyInitializedModules, | 241 PRBool allowAlreadyInitializedModules, |
| 242 PRBool dontFinalizeModules) | 242 PRBool dontFinalizeModules) |
| 243 { | 243 { |
| 244 SECStatus rv = SECFailure; | 244 SECStatus rv = SECFailure; |
| 245 +#ifndef NO_LIBPKIX | 245 +#ifndef NO_LIBPKIX |
| 246 PKIX_UInt32 actualMinorVersion = 0; | 246 PKIX_UInt32 actualMinorVersion = 0; |
| 247 PKIX_Error *pkixError = NULL; | 247 PKIX_Error *pkixError = NULL; |
| 248 +#endif | 248 +#endif |
| 249 PRBool isReallyInitted; | 249 PRBool isReallyInitted; |
| 250 char *configStrings = NULL; | 250 char *configStrings = NULL; |
| 251 char *configName = NULL; | 251 char *configName = NULL; |
| 252 PRBool passwordRequired = PR_FALSE; | 252 PRBool passwordRequired = PR_FALSE; |
| 253 | 253 |
| 254 /* if we are trying to init with a traditional NSS_Init call, maintain | 254 /* if we are trying to init with a traditional NSS_Init call, maintain |
| 255 * the traditional idempotent behavior. */ | 255 * the traditional idempotent behavior. */ |
| 256 if (!initContextPtr && nssIsInitted) { | 256 if (!initContextPtr && nssIsInitted) { |
| 257 @@ -662,28 +667,30 @@ nss_Init(const char *configdir, const ch | 257 @@ -660,28 +665,30 @@ nss_Init(const char *configdir, const ch |
| 258 nss_FindExternalRoot(dbpath, secmodName); | 258 nss_FindExternalRoot(dbpath, secmodName); |
| 259 } | 259 } |
| 260 } | 260 } |
| 261 } | 261 } |
| 262 | 262 |
| 263 pk11sdr_Init(); | 263 pk11sdr_Init(); |
| 264 cert_CreateSubjectKeyIDHashTable(); | 264 cert_CreateSubjectKeyIDHashTable(); |
| 265 | 265 |
| 266 +#ifndef NO_LIBPKIX | 266 +#ifndef NO_LIBPKIX |
| 267 pkixError = PKIX_Initialize | 267 pkixError = PKIX_Initialize |
| (...skipping 10 matching lines...) Expand all Loading... |
| 278 } | 278 } |
| 279 +#endif /* NO_LIBPKIX */ | 279 +#endif /* NO_LIBPKIX */ |
| 280 | 280 |
| 281 | 281 |
| 282 } | 282 } |
| 283 | 283 |
| 284 /* | 284 /* |
| 285 * Now mark the appropriate init state. If initContextPtr was passed | 285 * Now mark the appropriate init state. If initContextPtr was passed |
| 286 * in, then return the new context pointer and add it to the | 286 * in, then return the new context pointer and add it to the |
| 287 * nssInitContextList. Otherwise set the global nss_isInitted flag | 287 * nssInitContextList. Otherwise set the global nss_isInitted flag |
| 288 @@ -1026,17 +1033,19 @@ nss_Shutdown(void) | 288 @@ -1024,17 +1031,19 @@ nss_Shutdown(void) |
| 289 | 289 |
| 290 rv = nss_ShutdownShutdownList(); | 290 rv = nss_ShutdownShutdownList(); |
| 291 if (rv != SECSuccess) { | 291 if (rv != SECSuccess) { |
| 292 shutdownRV = SECFailure; | 292 shutdownRV = SECFailure; |
| 293 } | 293 } |
| 294 cert_DestroyLocks(); | 294 cert_DestroyLocks(); |
| 295 ShutdownCRLCache(); | 295 ShutdownCRLCache(); |
| 296 OCSP_ShutdownGlobal(); | 296 OCSP_ShutdownGlobal(); |
| 297 +#ifndef NO_LIBPKIX | 297 +#ifndef NO_LIBPKIX |
| 298 PKIX_Shutdown(plContext); | 298 PKIX_Shutdown(plContext); |
| 299 +#endif | 299 +#endif |
| 300 SECOID_Shutdown(); | 300 SECOID_Shutdown(); |
| 301 status = STAN_Shutdown(); | 301 status = STAN_Shutdown(); |
| 302 cert_DestroySubjectKeyIDHashTable(); | 302 cert_DestroySubjectKeyIDHashTable(); |
| 303 pk11_SetInternalKeySlot(NULL); | 303 pk11_SetInternalKeySlot(NULL); |
| 304 rv = SECMOD_Shutdown(); | 304 rv = SECMOD_Shutdown(); |
| 305 if (rv != SECSuccess) { | 305 if (rv != SECSuccess) { |
| 306 shutdownRV = SECFailure; | 306 shutdownRV = SECFailure; |
| 307 } | 307 } |
| 308 Index: mozilla/security/nss/lib/pk11wrap/pk11load.c | 308 Index: mozilla/security/nss/lib/pk11wrap/pk11load.c |
| 309 =================================================================== | 309 =================================================================== |
| 310 RCS file: /cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v | 310 RCS file: /cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v |
| 311 retrieving revision 1.28 | 311 retrieving revision 1.30 |
| 312 diff -p -u -8 -r1.28 pk11load.c | 312 diff -p -u -8 -r1.30 pk11load.c |
| 313 --- mozilla/security/nss/lib/pk11wrap/pk11load.c» 30 Oct 2009 09:44:45 -00
00» 1.28 | 313 --- mozilla/security/nss/lib/pk11wrap/pk11load.c» 30 Apr 2010 07:22:54 -00
00» 1.30 |
| 314 +++ mozilla/security/nss/lib/pk11wrap/pk11load.c» 9 Jan 2010 03:02:22 -000
0 | 314 +++ mozilla/security/nss/lib/pk11wrap/pk11load.c» 9 Aug 2010 22:29:26 -000
0 |
| 315 @@ -344,46 +344,54 @@ SECMOD_SetRootCerts(PK11SlotInfo *slot, | 315 @@ -344,46 +344,54 @@ SECMOD_SetRootCerts(PK11SlotInfo *slot, |
| 316 mod->slotInfo = psi_list; | 316 mod->slotInfo = psi_list; |
| 317 mod->slotInfoCount++; | 317 mod->slotInfoCount++; |
| 318 | 318 |
| 319 } | 319 } |
| 320 psi->hasRootCerts = 1; | 320 psi->hasRootCerts = 1; |
| 321 } | 321 } |
| 322 } | 322 } |
| 323 | 323 |
| 324 +#if 1 /* STATIC LIBRARIES */ | 324 +#if 1 /* STATIC LIBRARIES */ |
| (...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 415 @@ -587,27 +606,29 @@ SECMOD_UnloadModule(SECMODModule *mod) { | 415 @@ -587,27 +606,29 @@ SECMOD_UnloadModule(SECMODModule *mod) { |
| 416 } | 416 } |
| 417 mod->moduleID = 0; | 417 mod->moduleID = 0; |
| 418 mod->loaded = PR_FALSE; | 418 mod->loaded = PR_FALSE; |
| 419 | 419 |
| 420 /* do we want the semantics to allow unloading the internal library? | 420 /* do we want the semantics to allow unloading the internal library? |
| 421 * if not, we should change this to SECFailure and move it above the | 421 * if not, we should change this to SECFailure and move it above the |
| 422 * mod->loaded = PR_FALSE; */ | 422 * mod->loaded = PR_FALSE; */ |
| 423 if (mod->internal) { | 423 if (mod->internal) { |
| 424 +#if 0 /* STATIC LIBRARIES */ | 424 +#if 0 /* STATIC LIBRARIES */ |
| 425 if (0 == PR_AtomicDecrement(&softokenLoadCount)) { | 425 if (0 == PR_ATOMIC_DECREMENT(&softokenLoadCount)) { |
| 426 if (softokenLib) { | 426 if (softokenLib) { |
| 427 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); | 427 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); |
| 428 if (!disableUnload) { | 428 if (!disableUnload) { |
| 429 PRStatus status = PR_UnloadLibrary(softokenLib); | 429 PRStatus status = PR_UnloadLibrary(softokenLib); |
| 430 PORT_Assert(PR_SUCCESS == status); | 430 PORT_Assert(PR_SUCCESS == status); |
| 431 } | 431 } |
| 432 softokenLib = NULL; | 432 softokenLib = NULL; |
| 433 } | 433 } |
| 434 loadSoftokenOnce = pristineCallOnce; | 434 loadSoftokenOnce = pristineCallOnce; |
| 435 } | 435 } |
| 436 +#endif | 436 +#endif |
| 437 return SECSuccess; | 437 return SECSuccess; |
| 438 } | 438 } |
| 439 | 439 |
| 440 library = (PRLibrary *)mod->library; | 440 library = (PRLibrary *)mod->library; |
| 441 /* paranoia */ | 441 /* paranoia */ |
| 442 if (library == NULL) { | 442 if (library == NULL) { |
| 443 return SECFailure; | 443 return SECFailure; |
| 444 } | 444 } |
| 445 Index: mozilla/security/nss/lib/softoken/lgglue.c | 445 Index: mozilla/security/nss/lib/softoken/lgglue.c |
| 446 =================================================================== | 446 =================================================================== |
| 447 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.c,v | 447 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.c,v |
| 448 retrieving revision 1.13 | 448 retrieving revision 1.13 |
| 449 diff -p -u -8 -r1.13 lgglue.c | 449 diff -p -u -8 -r1.13 lgglue.c |
| 450 --- mozilla/security/nss/lib/softoken/lgglue.c 16 Apr 2009 18:19:26 -0000
1.13 | 450 --- mozilla/security/nss/lib/softoken/lgglue.c 16 Apr 2009 18:19:26 -0000
1.13 |
| 451 +++ mozilla/security/nss/lib/softoken/lgglue.c» 9 Jan 2010 03:02:23 -0000 | 451 +++ mozilla/security/nss/lib/softoken/lgglue.c» 9 Aug 2010 22:29:26 -0000 |
| 452 @@ -50,16 +50,17 @@ | 452 @@ -50,16 +50,17 @@ |
| 453 | 453 |
| 454 static LGOpenFunc legacy_glue_open = NULL; | 454 static LGOpenFunc legacy_glue_open = NULL; |
| 455 static LGReadSecmodFunc legacy_glue_readSecmod = NULL; | 455 static LGReadSecmodFunc legacy_glue_readSecmod = NULL; |
| 456 static LGReleaseSecmodFunc legacy_glue_releaseSecmod = NULL; | 456 static LGReleaseSecmodFunc legacy_glue_releaseSecmod = NULL; |
| 457 static LGDeleteSecmodFunc legacy_glue_deleteSecmod = NULL; | 457 static LGDeleteSecmodFunc legacy_glue_deleteSecmod = NULL; |
| 458 static LGAddSecmodFunc legacy_glue_addSecmod = NULL; | 458 static LGAddSecmodFunc legacy_glue_addSecmod = NULL; |
| 459 static LGShutdownFunc legacy_glue_shutdown = NULL; | 459 static LGShutdownFunc legacy_glue_shutdown = NULL; |
| 460 | 460 |
| 461 +#if 0 /* STATIC LIBRARIES */ | 461 +#if 0 /* STATIC LIBRARIES */ |
| (...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 566 legacy_glue_deleteSecmod = NULL; | 566 legacy_glue_deleteSecmod = NULL; |
| 567 legacy_glue_addSecmod = NULL; | 567 legacy_glue_addSecmod = NULL; |
| 568 legacy_glue_libCheckFailed = PR_FALSE; | 568 legacy_glue_libCheckFailed = PR_FALSE; |
| 569 legacy_glue_libCheckSucceeded = PR_FALSE; | 569 legacy_glue_libCheckSucceeded = PR_FALSE; |
| 570 Index: mozilla/security/nss/lib/softoken/lgglue.h | 570 Index: mozilla/security/nss/lib/softoken/lgglue.h |
| 571 =================================================================== | 571 =================================================================== |
| 572 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.h,v | 572 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.h,v |
| 573 retrieving revision 1.4 | 573 retrieving revision 1.4 |
| 574 diff -p -u -8 -r1.4 lgglue.h | 574 diff -p -u -8 -r1.4 lgglue.h |
| 575 --- mozilla/security/nss/lib/softoken/lgglue.h 16 Apr 2009 18:19:26 -0000
1.4 | 575 --- mozilla/security/nss/lib/softoken/lgglue.h 16 Apr 2009 18:19:26 -0000
1.4 |
| 576 +++ mozilla/security/nss/lib/softoken/lgglue.h» 9 Jan 2010 03:02:23 -0000 | 576 +++ mozilla/security/nss/lib/softoken/lgglue.h» 9 Aug 2010 22:29:26 -0000 |
| 577 @@ -65,16 +65,35 @@ typedef SECStatus (*LGDeleteSecmodFunc)( | 577 @@ -65,16 +65,35 @@ typedef SECStatus (*LGDeleteSecmodFunc)( |
| 578 const char *dbname, char *params, PRBool rw); | 578 const char *dbname, char *params, PRBool rw); |
| 579 typedef SECStatus (*LGAddSecmodFunc)(const char *appName, | 579 typedef SECStatus (*LGAddSecmodFunc)(const char *appName, |
| 580 const char *filename, | 580 const char *filename, |
| 581 const char *dbname, char *params, PRBool rw); | 581 const char *dbname, char *params, PRBool rw); |
| 582 typedef SECStatus (*LGShutdownFunc)(PRBool forked); | 582 typedef SECStatus (*LGShutdownFunc)(PRBool forked); |
| 583 typedef void (*LGSetForkStateFunc)(PRBool); | 583 typedef void (*LGSetForkStateFunc)(PRBool); |
| 584 typedef void (*LGSetCryptFunc)(LGEncryptFunc, LGDecryptFunc); | 584 typedef void (*LGSetCryptFunc)(LGEncryptFunc, LGDecryptFunc); |
| 585 | 585 |
| 586 +extern CK_RV legacy_Open(const char *dir, const char *certPrefix, | 586 +extern CK_RV legacy_Open(const char *dir, const char *certPrefix, |
| (...skipping 22 matching lines...) Expand all Loading... |
| 609 const char *keyPrefix, | 609 const char *keyPrefix, |
| 610 int certVersion, int keyVersion, int flags, PRBool isFIPS, | 610 int certVersion, int keyVersion, int flags, PRBool isFIPS, |
| 611 SDB **certDB, SDB **keyDB); | 611 SDB **certDB, SDB **keyDB); |
| 612 char ** sftkdbCall_ReadSecmodDB(const char *appName, const char *filename, | 612 char ** sftkdbCall_ReadSecmodDB(const char *appName, const char *filename, |
| 613 Index: mozilla/security/nss/lib/util/secport.h | 613 Index: mozilla/security/nss/lib/util/secport.h |
| 614 =================================================================== | 614 =================================================================== |
| 615 RCS file: /cvsroot/mozilla/security/nss/lib/util/secport.h,v | 615 RCS file: /cvsroot/mozilla/security/nss/lib/util/secport.h,v |
| 616 retrieving revision 1.23 | 616 retrieving revision 1.23 |
| 617 diff -p -u -8 -r1.23 secport.h | 617 diff -p -u -8 -r1.23 secport.h |
| 618 --- mozilla/security/nss/lib/util/secport.h 30 Oct 2009 09:44:47 -0000
1.23 | 618 --- mozilla/security/nss/lib/util/secport.h 30 Oct 2009 09:44:47 -0000
1.23 |
| 619 +++ mozilla/security/nss/lib/util/secport.h» 9 Jan 2010 03:02:23 -0000 | 619 +++ mozilla/security/nss/lib/util/secport.h» 9 Aug 2010 22:29:26 -0000 |
| 620 @@ -238,16 +238,17 @@ sec_port_iso88591_utf8_conversion_functi | 620 @@ -238,16 +238,17 @@ sec_port_iso88591_utf8_conversion_functi |
| 621 unsigned int maxOutBufLen, | 621 unsigned int maxOutBufLen, |
| 622 unsigned int *outBufLen | 622 unsigned int *outBufLen |
| 623 ); | 623 ); |
| 624 | 624 |
| 625 extern int NSS_PutEnv(const char * envVarName, const char * envValue); | 625 extern int NSS_PutEnv(const char * envVarName, const char * envValue); |
| 626 | 626 |
| 627 extern int NSS_SecureMemcmp(const void *a, const void *b, size_t n); | 627 extern int NSS_SecureMemcmp(const void *a, const void *b, size_t n); |
| 628 | 628 |
| 629 +#if 0 /* STATIC LIBRARIES */ | 629 +#if 0 /* STATIC LIBRARIES */ |
| (...skipping 12 matching lines...) Expand all Loading... |
| 642 */ | 642 */ |
| 643 PRLibrary * | 643 PRLibrary * |
| 644 PORT_LoadLibraryFromOrigin(const char* existingShLibName, | 644 PORT_LoadLibraryFromOrigin(const char* existingShLibName, |
| 645 PRFuncPtr staticShLibFunc, | 645 PRFuncPtr staticShLibFunc, |
| 646 const char *newShLibName); | 646 const char *newShLibName); |
| 647 +#endif /* STATIC LIBRARIES */ | 647 +#endif /* STATIC LIBRARIES */ |
| 648 | 648 |
| 649 SEC_END_PROTOS | 649 SEC_END_PROTOS |
| 650 | 650 |
| 651 #endif /* _SECPORT_H_ */ | 651 #endif /* _SECPORT_H_ */ |
| OLD | NEW |