OLD | NEW |
1 Index: mozilla/security/nss/lib/certhigh/certvfy.c | 1 Index: mozilla/security/nss/lib/certhigh/certvfy.c |
2 =================================================================== | 2 =================================================================== |
3 RCS file: /cvsroot/mozilla/security/nss/lib/certhigh/certvfy.c,v | 3 RCS file: /cvsroot/mozilla/security/nss/lib/certhigh/certvfy.c,v |
4 retrieving revision 1.69 | 4 retrieving revision 1.71 |
5 diff -p -u -8 -r1.69 certvfy.c | 5 diff -p -u -8 -r1.71 certvfy.c |
6 --- mozilla/security/nss/lib/certhigh/certvfy.c»13 Mar 2009 02:59:04 -0000»
1.69 | 6 --- mozilla/security/nss/lib/certhigh/certvfy.c»30 Apr 2010 07:47:48 -0000»
1.71 |
7 +++ mozilla/security/nss/lib/certhigh/certvfy.c»9 Jan 2010 03:02:21 -0000 | 7 +++ mozilla/security/nss/lib/certhigh/certvfy.c»9 Aug 2010 22:29:25 -0000 |
8 @@ -40,27 +40,71 @@ | 8 @@ -40,27 +40,71 @@ |
9 #include "secoid.h" | 9 #include "secoid.h" |
10 #include "sslerr.h" | 10 #include "sslerr.h" |
11 #include "genname.h" | 11 #include "genname.h" |
12 #include "keyhi.h" | 12 #include "keyhi.h" |
13 #include "cert.h" | 13 #include "cert.h" |
14 #include "certdb.h" | 14 #include "certdb.h" |
15 #include "certi.h" | 15 #include "certi.h" |
16 #include "cryptohi.h" | 16 #include "cryptohi.h" |
17 +#define NO_LIBPKIX | 17 +#define NO_LIBPKIX |
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
76 CERT_CertTimesValid(CERTCertificate *c) | 76 CERT_CertTimesValid(CERTCertificate *c) |
77 { | 77 { |
78 SECCertTimeValidity valid = CERT_CheckCertValidTimes(c, PR_Now(), PR_TRUE); | 78 SECCertTimeValidity valid = CERT_CheckCertValidTimes(c, PR_Now(), PR_TRUE); |
79 return (valid == secCertTimeValid) ? SECSuccess : SECFailure; | 79 return (valid == secCertTimeValid) ? SECSuccess : SECFailure; |
80 Index: mozilla/security/nss/lib/freebl/blapii.h | 80 Index: mozilla/security/nss/lib/freebl/blapii.h |
81 =================================================================== | 81 =================================================================== |
82 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/blapii.h,v | 82 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/blapii.h,v |
83 retrieving revision 1.1 | 83 retrieving revision 1.1 |
84 diff -p -u -8 -r1.1 blapii.h | 84 diff -p -u -8 -r1.1 blapii.h |
85 --- mozilla/security/nss/lib/freebl/blapii.h 3 Feb 2009 05:34:40 -0000
1.1 | 85 --- mozilla/security/nss/lib/freebl/blapii.h 3 Feb 2009 05:34:40 -0000
1.1 |
86 +++ mozilla/security/nss/lib/freebl/blapii.h» 9 Jan 2010 03:02:21 -0000 | 86 +++ mozilla/security/nss/lib/freebl/blapii.h» 9 Aug 2010 22:29:25 -0000 |
87 @@ -39,19 +39,19 @@ | 87 @@ -39,19 +39,19 @@ |
88 #define _BLAPII_H_ | 88 #define _BLAPII_H_ |
89 | 89 |
90 #include "blapit.h" | 90 #include "blapit.h" |
91 | 91 |
92 SEC_BEGIN_PROTOS | 92 SEC_BEGIN_PROTOS |
93 | 93 |
94 #if defined(XP_UNIX) && !defined(NO_CHECK_FORK) | 94 #if defined(XP_UNIX) && !defined(NO_CHECK_FORK) |
95 | 95 |
96 -extern PRBool parentForkedAfterC_Initialize; | 96 -extern PRBool parentForkedAfterC_Initialize; |
97 +extern PRBool bl_parentForkedAfterC_Initialize; | 97 +extern PRBool bl_parentForkedAfterC_Initialize; |
98 | 98 |
99 -#define SKIP_AFTER_FORK(x) if (!parentForkedAfterC_Initialize) x | 99 -#define SKIP_AFTER_FORK(x) if (!parentForkedAfterC_Initialize) x |
100 +#define SKIP_AFTER_FORK(x) if (!bl_parentForkedAfterC_Initialize) x | 100 +#define SKIP_AFTER_FORK(x) if (!bl_parentForkedAfterC_Initialize) x |
101 | 101 |
102 #else | 102 #else |
103 | 103 |
104 #define SKIP_AFTER_FORK(x) x | 104 #define SKIP_AFTER_FORK(x) x |
105 | 105 |
106 #endif | 106 #endif |
107 | 107 |
108 SEC_END_PROTOS | 108 SEC_END_PROTOS |
109 Index: mozilla/security/nss/lib/freebl/rsa.c | 109 Index: mozilla/security/nss/lib/freebl/rsa.c |
110 =================================================================== | 110 =================================================================== |
111 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/rsa.c,v | 111 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/rsa.c,v |
112 retrieving revision 1.39 | 112 retrieving revision 1.39 |
113 diff -p -u -8 -r1.39 rsa.c | 113 diff -p -u -8 -r1.39 rsa.c |
114 --- mozilla/security/nss/lib/freebl/rsa.c 3 Feb 2009 05:34:41 -0000
1.39 | 114 --- mozilla/security/nss/lib/freebl/rsa.c 3 Feb 2009 05:34:41 -0000
1.39 |
115 +++ mozilla/security/nss/lib/freebl/rsa.c» 9 Jan 2010 03:02:22 -0000 | 115 +++ mozilla/security/nss/lib/freebl/rsa.c» 9 Aug 2010 22:29:25 -0000 |
116 @@ -967,18 +967,25 @@ void RSA_Cleanup(void) | 116 @@ -967,18 +967,25 @@ void RSA_Cleanup(void) |
117 * free_bl may have allocated along the way. Currently only RSA does this, | 117 * free_bl may have allocated along the way. Currently only RSA does this, |
118 * so I've put it here for now. | 118 * so I've put it here for now. |
119 */ | 119 */ |
120 void BL_Cleanup(void) | 120 void BL_Cleanup(void) |
121 { | 121 { |
122 RSA_Cleanup(); | 122 RSA_Cleanup(); |
123 } | 123 } |
124 | 124 |
125 -PRBool parentForkedAfterC_Initialize; | 125 -PRBool parentForkedAfterC_Initialize; |
(...skipping 11 matching lines...) Expand all Loading... |
137 */ | 137 */ |
138 void BL_SetForkState(PRBool forked) | 138 void BL_SetForkState(PRBool forked) |
139 { | 139 { |
140 - parentForkedAfterC_Initialize = forked; | 140 - parentForkedAfterC_Initialize = forked; |
141 + bl_parentForkedAfterC_Initialize = forked; | 141 + bl_parentForkedAfterC_Initialize = forked; |
142 } | 142 } |
143 | 143 |
144 Index: mozilla/security/nss/lib/freebl/shvfy.c | 144 Index: mozilla/security/nss/lib/freebl/shvfy.c |
145 =================================================================== | 145 =================================================================== |
146 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/shvfy.c,v | 146 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/shvfy.c,v |
147 retrieving revision 1.11 | 147 retrieving revision 1.13 |
148 diff -p -u -8 -r1.11 shvfy.c | 148 diff -p -u -8 -r1.13 shvfy.c |
149 --- mozilla/security/nss/lib/freebl/shvfy.c» 18 Nov 2008 19:48:24 -0000»
1.11 | 149 --- mozilla/security/nss/lib/freebl/shvfy.c» 29 Apr 2010 00:17:52 -0000»
1.13 |
150 +++ mozilla/security/nss/lib/freebl/shvfy.c» 9 Jan 2010 03:02:22 -0000 | 150 +++ mozilla/security/nss/lib/freebl/shvfy.c» 9 Aug 2010 22:29:25 -0000 |
151 @@ -97,19 +97,29 @@ readItem(PRFileDesc *fd, SECItem *item) | 151 @@ -97,19 +97,29 @@ readItem(PRFileDesc *fd, SECItem *item) |
152 PORT_Free(item->data); | 152 PORT_Free(item->data); |
153 item->data = NULL; | 153 item->data = NULL; |
154 item->len = 0; | 154 item->len = 0; |
155 return SECFailure; | 155 return SECFailure; |
156 } | 156 } |
157 return SECSuccess; | 157 return SECSuccess; |
158 } | 158 } |
159 | 159 |
160 +/* | 160 +/* |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
199 + * If name is NULL, freebl is statically linked into softoken. | 199 + * If name is NULL, freebl is statically linked into softoken. |
200 + * softoken will call BLAPI_SHVerify next to verify itself. | 200 + * softoken will call BLAPI_SHVerify next to verify itself. |
201 + */ | 201 + */ |
202 return PR_TRUE; | 202 return PR_TRUE; |
203 } | 203 } |
204 return BLAPI_SHVerify(name, (PRFuncPtr) decodeInt); | 204 return BLAPI_SHVerify(name, (PRFuncPtr) decodeInt); |
205 } | 205 } |
206 Index: mozilla/security/nss/lib/nss/nssinit.c | 206 Index: mozilla/security/nss/lib/nss/nssinit.c |
207 =================================================================== | 207 =================================================================== |
208 RCS file: /cvsroot/mozilla/security/nss/lib/nss/nssinit.c,v | 208 RCS file: /cvsroot/mozilla/security/nss/lib/nss/nssinit.c,v |
209 retrieving revision 1.103 | 209 retrieving revision 1.106 |
210 diff -p -u -8 -r1.103 nssinit.c | 210 diff -p -u -8 -r1.106 nssinit.c |
211 --- mozilla/security/nss/lib/nss/nssinit.c» 29 Oct 2009 21:33:10 -0000»
1.103 | 211 --- mozilla/security/nss/lib/nss/nssinit.c» 3 Apr 2010 20:06:00 -0000»
1.106 |
212 +++ mozilla/security/nss/lib/nss/nssinit.c» 9 Jan 2010 03:02:22 -0000 | 212 +++ mozilla/security/nss/lib/nss/nssinit.c» 9 Aug 2010 22:29:26 -0000 |
213 @@ -49,19 +49,22 @@ | 213 @@ -47,19 +47,22 @@ |
214 #include "ssl.h" | 214 #include "cert.h" |
215 #include "sslproto.h" | 215 #include "key.h" |
216 #include "secmod.h" | 216 #include "secmod.h" |
217 #include "secoid.h" | 217 #include "secoid.h" |
218 #include "nss.h" | 218 #include "nss.h" |
219 #include "pk11func.h" | 219 #include "pk11func.h" |
220 #include "secerr.h" | 220 #include "secerr.h" |
221 #include "nssbase.h" | 221 #include "nssbase.h" |
222 +#define NO_LIBPKIX | 222 +#define NO_LIBPKIX |
223 +#ifndef NO_LIBPKIX | 223 +#ifndef NO_LIBPKIX |
224 #include "pkixt.h" | 224 #include "pkixt.h" |
225 #include "pkix.h" | 225 #include "pkix.h" |
226 #include "pkix_tools.h" | 226 #include "pkix_tools.h" |
227 +#endif /* NO_LIBPKIX */ | 227 +#endif /* NO_LIBPKIX */ |
228 | 228 |
229 #include "pki3hack.h" | 229 #include "pki3hack.h" |
230 #include "certi.h" | 230 #include "certi.h" |
231 #include "secmodi.h" | 231 #include "secmodi.h" |
232 #include "ocspti.h" | 232 #include "ocspti.h" |
233 #include "ocspi.h" | 233 #include "ocspi.h" |
234 | 234 |
235 /* | 235 /* |
236 @@ -532,18 +535,20 @@ nss_Init(const char *configdir, const ch | 236 @@ -530,18 +533,20 @@ nss_Init(const char *configdir, const ch |
237 NSSInitParameters *initParams, | 237 NSSInitParameters *initParams, |
238 PRBool readOnly, PRBool noCertDB, | 238 PRBool readOnly, PRBool noCertDB, |
239 PRBool noModDB, PRBool forceOpen, PRBool noRootInit, | 239 PRBool noModDB, PRBool forceOpen, PRBool noRootInit, |
240 PRBool optimizeSpace, PRBool noSingleThreadedModules, | 240 PRBool optimizeSpace, PRBool noSingleThreadedModules, |
241 PRBool allowAlreadyInitializedModules, | 241 PRBool allowAlreadyInitializedModules, |
242 PRBool dontFinalizeModules) | 242 PRBool dontFinalizeModules) |
243 { | 243 { |
244 SECStatus rv = SECFailure; | 244 SECStatus rv = SECFailure; |
245 +#ifndef NO_LIBPKIX | 245 +#ifndef NO_LIBPKIX |
246 PKIX_UInt32 actualMinorVersion = 0; | 246 PKIX_UInt32 actualMinorVersion = 0; |
247 PKIX_Error *pkixError = NULL; | 247 PKIX_Error *pkixError = NULL; |
248 +#endif | 248 +#endif |
249 PRBool isReallyInitted; | 249 PRBool isReallyInitted; |
250 char *configStrings = NULL; | 250 char *configStrings = NULL; |
251 char *configName = NULL; | 251 char *configName = NULL; |
252 PRBool passwordRequired = PR_FALSE; | 252 PRBool passwordRequired = PR_FALSE; |
253 | 253 |
254 /* if we are trying to init with a traditional NSS_Init call, maintain | 254 /* if we are trying to init with a traditional NSS_Init call, maintain |
255 * the traditional idempotent behavior. */ | 255 * the traditional idempotent behavior. */ |
256 if (!initContextPtr && nssIsInitted) { | 256 if (!initContextPtr && nssIsInitted) { |
257 @@ -662,28 +667,30 @@ nss_Init(const char *configdir, const ch | 257 @@ -660,28 +665,30 @@ nss_Init(const char *configdir, const ch |
258 nss_FindExternalRoot(dbpath, secmodName); | 258 nss_FindExternalRoot(dbpath, secmodName); |
259 } | 259 } |
260 } | 260 } |
261 } | 261 } |
262 | 262 |
263 pk11sdr_Init(); | 263 pk11sdr_Init(); |
264 cert_CreateSubjectKeyIDHashTable(); | 264 cert_CreateSubjectKeyIDHashTable(); |
265 | 265 |
266 +#ifndef NO_LIBPKIX | 266 +#ifndef NO_LIBPKIX |
267 pkixError = PKIX_Initialize | 267 pkixError = PKIX_Initialize |
(...skipping 10 matching lines...) Expand all Loading... |
278 } | 278 } |
279 +#endif /* NO_LIBPKIX */ | 279 +#endif /* NO_LIBPKIX */ |
280 | 280 |
281 | 281 |
282 } | 282 } |
283 | 283 |
284 /* | 284 /* |
285 * Now mark the appropriate init state. If initContextPtr was passed | 285 * Now mark the appropriate init state. If initContextPtr was passed |
286 * in, then return the new context pointer and add it to the | 286 * in, then return the new context pointer and add it to the |
287 * nssInitContextList. Otherwise set the global nss_isInitted flag | 287 * nssInitContextList. Otherwise set the global nss_isInitted flag |
288 @@ -1026,17 +1033,19 @@ nss_Shutdown(void) | 288 @@ -1024,17 +1031,19 @@ nss_Shutdown(void) |
289 | 289 |
290 rv = nss_ShutdownShutdownList(); | 290 rv = nss_ShutdownShutdownList(); |
291 if (rv != SECSuccess) { | 291 if (rv != SECSuccess) { |
292 shutdownRV = SECFailure; | 292 shutdownRV = SECFailure; |
293 } | 293 } |
294 cert_DestroyLocks(); | 294 cert_DestroyLocks(); |
295 ShutdownCRLCache(); | 295 ShutdownCRLCache(); |
296 OCSP_ShutdownGlobal(); | 296 OCSP_ShutdownGlobal(); |
297 +#ifndef NO_LIBPKIX | 297 +#ifndef NO_LIBPKIX |
298 PKIX_Shutdown(plContext); | 298 PKIX_Shutdown(plContext); |
299 +#endif | 299 +#endif |
300 SECOID_Shutdown(); | 300 SECOID_Shutdown(); |
301 status = STAN_Shutdown(); | 301 status = STAN_Shutdown(); |
302 cert_DestroySubjectKeyIDHashTable(); | 302 cert_DestroySubjectKeyIDHashTable(); |
303 pk11_SetInternalKeySlot(NULL); | 303 pk11_SetInternalKeySlot(NULL); |
304 rv = SECMOD_Shutdown(); | 304 rv = SECMOD_Shutdown(); |
305 if (rv != SECSuccess) { | 305 if (rv != SECSuccess) { |
306 shutdownRV = SECFailure; | 306 shutdownRV = SECFailure; |
307 } | 307 } |
308 Index: mozilla/security/nss/lib/pk11wrap/pk11load.c | 308 Index: mozilla/security/nss/lib/pk11wrap/pk11load.c |
309 =================================================================== | 309 =================================================================== |
310 RCS file: /cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v | 310 RCS file: /cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v |
311 retrieving revision 1.28 | 311 retrieving revision 1.30 |
312 diff -p -u -8 -r1.28 pk11load.c | 312 diff -p -u -8 -r1.30 pk11load.c |
313 --- mozilla/security/nss/lib/pk11wrap/pk11load.c» 30 Oct 2009 09:44:45 -00
00» 1.28 | 313 --- mozilla/security/nss/lib/pk11wrap/pk11load.c» 30 Apr 2010 07:22:54 -00
00» 1.30 |
314 +++ mozilla/security/nss/lib/pk11wrap/pk11load.c» 9 Jan 2010 03:02:22 -000
0 | 314 +++ mozilla/security/nss/lib/pk11wrap/pk11load.c» 9 Aug 2010 22:29:26 -000
0 |
315 @@ -344,46 +344,54 @@ SECMOD_SetRootCerts(PK11SlotInfo *slot, | 315 @@ -344,46 +344,54 @@ SECMOD_SetRootCerts(PK11SlotInfo *slot, |
316 mod->slotInfo = psi_list; | 316 mod->slotInfo = psi_list; |
317 mod->slotInfoCount++; | 317 mod->slotInfoCount++; |
318 | 318 |
319 } | 319 } |
320 psi->hasRootCerts = 1; | 320 psi->hasRootCerts = 1; |
321 } | 321 } |
322 } | 322 } |
323 | 323 |
324 +#if 1 /* STATIC LIBRARIES */ | 324 +#if 1 /* STATIC LIBRARIES */ |
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
415 @@ -587,27 +606,29 @@ SECMOD_UnloadModule(SECMODModule *mod) { | 415 @@ -587,27 +606,29 @@ SECMOD_UnloadModule(SECMODModule *mod) { |
416 } | 416 } |
417 mod->moduleID = 0; | 417 mod->moduleID = 0; |
418 mod->loaded = PR_FALSE; | 418 mod->loaded = PR_FALSE; |
419 | 419 |
420 /* do we want the semantics to allow unloading the internal library? | 420 /* do we want the semantics to allow unloading the internal library? |
421 * if not, we should change this to SECFailure and move it above the | 421 * if not, we should change this to SECFailure and move it above the |
422 * mod->loaded = PR_FALSE; */ | 422 * mod->loaded = PR_FALSE; */ |
423 if (mod->internal) { | 423 if (mod->internal) { |
424 +#if 0 /* STATIC LIBRARIES */ | 424 +#if 0 /* STATIC LIBRARIES */ |
425 if (0 == PR_AtomicDecrement(&softokenLoadCount)) { | 425 if (0 == PR_ATOMIC_DECREMENT(&softokenLoadCount)) { |
426 if (softokenLib) { | 426 if (softokenLib) { |
427 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); | 427 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); |
428 if (!disableUnload) { | 428 if (!disableUnload) { |
429 PRStatus status = PR_UnloadLibrary(softokenLib); | 429 PRStatus status = PR_UnloadLibrary(softokenLib); |
430 PORT_Assert(PR_SUCCESS == status); | 430 PORT_Assert(PR_SUCCESS == status); |
431 } | 431 } |
432 softokenLib = NULL; | 432 softokenLib = NULL; |
433 } | 433 } |
434 loadSoftokenOnce = pristineCallOnce; | 434 loadSoftokenOnce = pristineCallOnce; |
435 } | 435 } |
436 +#endif | 436 +#endif |
437 return SECSuccess; | 437 return SECSuccess; |
438 } | 438 } |
439 | 439 |
440 library = (PRLibrary *)mod->library; | 440 library = (PRLibrary *)mod->library; |
441 /* paranoia */ | 441 /* paranoia */ |
442 if (library == NULL) { | 442 if (library == NULL) { |
443 return SECFailure; | 443 return SECFailure; |
444 } | 444 } |
445 Index: mozilla/security/nss/lib/softoken/lgglue.c | 445 Index: mozilla/security/nss/lib/softoken/lgglue.c |
446 =================================================================== | 446 =================================================================== |
447 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.c,v | 447 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.c,v |
448 retrieving revision 1.13 | 448 retrieving revision 1.13 |
449 diff -p -u -8 -r1.13 lgglue.c | 449 diff -p -u -8 -r1.13 lgglue.c |
450 --- mozilla/security/nss/lib/softoken/lgglue.c 16 Apr 2009 18:19:26 -0000
1.13 | 450 --- mozilla/security/nss/lib/softoken/lgglue.c 16 Apr 2009 18:19:26 -0000
1.13 |
451 +++ mozilla/security/nss/lib/softoken/lgglue.c» 9 Jan 2010 03:02:23 -0000 | 451 +++ mozilla/security/nss/lib/softoken/lgglue.c» 9 Aug 2010 22:29:26 -0000 |
452 @@ -50,16 +50,17 @@ | 452 @@ -50,16 +50,17 @@ |
453 | 453 |
454 static LGOpenFunc legacy_glue_open = NULL; | 454 static LGOpenFunc legacy_glue_open = NULL; |
455 static LGReadSecmodFunc legacy_glue_readSecmod = NULL; | 455 static LGReadSecmodFunc legacy_glue_readSecmod = NULL; |
456 static LGReleaseSecmodFunc legacy_glue_releaseSecmod = NULL; | 456 static LGReleaseSecmodFunc legacy_glue_releaseSecmod = NULL; |
457 static LGDeleteSecmodFunc legacy_glue_deleteSecmod = NULL; | 457 static LGDeleteSecmodFunc legacy_glue_deleteSecmod = NULL; |
458 static LGAddSecmodFunc legacy_glue_addSecmod = NULL; | 458 static LGAddSecmodFunc legacy_glue_addSecmod = NULL; |
459 static LGShutdownFunc legacy_glue_shutdown = NULL; | 459 static LGShutdownFunc legacy_glue_shutdown = NULL; |
460 | 460 |
461 +#if 0 /* STATIC LIBRARIES */ | 461 +#if 0 /* STATIC LIBRARIES */ |
(...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
566 legacy_glue_deleteSecmod = NULL; | 566 legacy_glue_deleteSecmod = NULL; |
567 legacy_glue_addSecmod = NULL; | 567 legacy_glue_addSecmod = NULL; |
568 legacy_glue_libCheckFailed = PR_FALSE; | 568 legacy_glue_libCheckFailed = PR_FALSE; |
569 legacy_glue_libCheckSucceeded = PR_FALSE; | 569 legacy_glue_libCheckSucceeded = PR_FALSE; |
570 Index: mozilla/security/nss/lib/softoken/lgglue.h | 570 Index: mozilla/security/nss/lib/softoken/lgglue.h |
571 =================================================================== | 571 =================================================================== |
572 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.h,v | 572 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.h,v |
573 retrieving revision 1.4 | 573 retrieving revision 1.4 |
574 diff -p -u -8 -r1.4 lgglue.h | 574 diff -p -u -8 -r1.4 lgglue.h |
575 --- mozilla/security/nss/lib/softoken/lgglue.h 16 Apr 2009 18:19:26 -0000
1.4 | 575 --- mozilla/security/nss/lib/softoken/lgglue.h 16 Apr 2009 18:19:26 -0000
1.4 |
576 +++ mozilla/security/nss/lib/softoken/lgglue.h» 9 Jan 2010 03:02:23 -0000 | 576 +++ mozilla/security/nss/lib/softoken/lgglue.h» 9 Aug 2010 22:29:26 -0000 |
577 @@ -65,16 +65,35 @@ typedef SECStatus (*LGDeleteSecmodFunc)( | 577 @@ -65,16 +65,35 @@ typedef SECStatus (*LGDeleteSecmodFunc)( |
578 const char *dbname, char *params, PRBool rw); | 578 const char *dbname, char *params, PRBool rw); |
579 typedef SECStatus (*LGAddSecmodFunc)(const char *appName, | 579 typedef SECStatus (*LGAddSecmodFunc)(const char *appName, |
580 const char *filename, | 580 const char *filename, |
581 const char *dbname, char *params, PRBool rw); | 581 const char *dbname, char *params, PRBool rw); |
582 typedef SECStatus (*LGShutdownFunc)(PRBool forked); | 582 typedef SECStatus (*LGShutdownFunc)(PRBool forked); |
583 typedef void (*LGSetForkStateFunc)(PRBool); | 583 typedef void (*LGSetForkStateFunc)(PRBool); |
584 typedef void (*LGSetCryptFunc)(LGEncryptFunc, LGDecryptFunc); | 584 typedef void (*LGSetCryptFunc)(LGEncryptFunc, LGDecryptFunc); |
585 | 585 |
586 +extern CK_RV legacy_Open(const char *dir, const char *certPrefix, | 586 +extern CK_RV legacy_Open(const char *dir, const char *certPrefix, |
(...skipping 22 matching lines...) Expand all Loading... |
609 const char *keyPrefix, | 609 const char *keyPrefix, |
610 int certVersion, int keyVersion, int flags, PRBool isFIPS, | 610 int certVersion, int keyVersion, int flags, PRBool isFIPS, |
611 SDB **certDB, SDB **keyDB); | 611 SDB **certDB, SDB **keyDB); |
612 char ** sftkdbCall_ReadSecmodDB(const char *appName, const char *filename, | 612 char ** sftkdbCall_ReadSecmodDB(const char *appName, const char *filename, |
613 Index: mozilla/security/nss/lib/util/secport.h | 613 Index: mozilla/security/nss/lib/util/secport.h |
614 =================================================================== | 614 =================================================================== |
615 RCS file: /cvsroot/mozilla/security/nss/lib/util/secport.h,v | 615 RCS file: /cvsroot/mozilla/security/nss/lib/util/secport.h,v |
616 retrieving revision 1.23 | 616 retrieving revision 1.23 |
617 diff -p -u -8 -r1.23 secport.h | 617 diff -p -u -8 -r1.23 secport.h |
618 --- mozilla/security/nss/lib/util/secport.h 30 Oct 2009 09:44:47 -0000
1.23 | 618 --- mozilla/security/nss/lib/util/secport.h 30 Oct 2009 09:44:47 -0000
1.23 |
619 +++ mozilla/security/nss/lib/util/secport.h» 9 Jan 2010 03:02:23 -0000 | 619 +++ mozilla/security/nss/lib/util/secport.h» 9 Aug 2010 22:29:26 -0000 |
620 @@ -238,16 +238,17 @@ sec_port_iso88591_utf8_conversion_functi | 620 @@ -238,16 +238,17 @@ sec_port_iso88591_utf8_conversion_functi |
621 unsigned int maxOutBufLen, | 621 unsigned int maxOutBufLen, |
622 unsigned int *outBufLen | 622 unsigned int *outBufLen |
623 ); | 623 ); |
624 | 624 |
625 extern int NSS_PutEnv(const char * envVarName, const char * envValue); | 625 extern int NSS_PutEnv(const char * envVarName, const char * envValue); |
626 | 626 |
627 extern int NSS_SecureMemcmp(const void *a, const void *b, size_t n); | 627 extern int NSS_SecureMemcmp(const void *a, const void *b, size_t n); |
628 | 628 |
629 +#if 0 /* STATIC LIBRARIES */ | 629 +#if 0 /* STATIC LIBRARIES */ |
(...skipping 12 matching lines...) Expand all Loading... |
642 */ | 642 */ |
643 PRLibrary * | 643 PRLibrary * |
644 PORT_LoadLibraryFromOrigin(const char* existingShLibName, | 644 PORT_LoadLibraryFromOrigin(const char* existingShLibName, |
645 PRFuncPtr staticShLibFunc, | 645 PRFuncPtr staticShLibFunc, |
646 const char *newShLibName); | 646 const char *newShLibName); |
647 +#endif /* STATIC LIBRARIES */ | 647 +#endif /* STATIC LIBRARIES */ |
648 | 648 |
649 SEC_END_PROTOS | 649 SEC_END_PROTOS |
650 | 650 |
651 #endif /* _SECPORT_H_ */ | 651 #endif /* _SECPORT_H_ */ |
OLD | NEW |