| Index: nss/mozilla/security/nss/lib/pki/nsspkit.h
|
| ===================================================================
|
| --- nss/mozilla/security/nss/lib/pki/nsspkit.h (revision 55475)
|
| +++ nss/mozilla/security/nss/lib/pki/nsspkit.h (working copy)
|
| @@ -38,7 +38,7 @@
|
| #define NSSPKIT_H
|
|
|
| #ifdef DEBUG
|
| -static const char NSSPKIT_CVS_ID[] = "@(#) $RCSfile: nsspkit.h,v $ $Revision: 1.6 $ $Date: 2005/01/20 02:25:49 $";
|
| +static const char NSSPKIT_CVS_ID[] = "@(#) $RCSfile: nsspkit.h,v $ $Revision: 1.8 $ $Date: 2010/05/21 00:02:48 $";
|
| #endif /* DEBUG */
|
|
|
| /*
|
| @@ -82,7 +82,7 @@
|
| *
|
| * The current design only weakly distinguishes between certificates
|
| * and user certificates: as far as the compiler goes they're
|
| - * interchangable; debug libraries only have one common pointer-tracker;
|
| + * interchangeable; debug libraries only have one common pointer-tracker;
|
| * etc. However, attempts to do private-key operations on a certificate
|
| * for which the private key is not available will fail.
|
| *
|
| @@ -169,6 +169,15 @@
|
| * fgmr others
|
| */
|
|
|
| +/*
|
| + * OBJECT IDENTIFIER
|
| + *
|
| + * This is the basic OID that crops up everywhere.
|
| + */
|
| +
|
| +struct NSSOIDStr; /* unused opaque structure */
|
| +typedef struct NSSOIDStr NSSOID;
|
| +
|
| /*
|
| * NSSTime
|
| *
|
|
|