| Index: nss/mozilla/security/nss/lib/pki/pki3hack.c
|
| ===================================================================
|
| --- nss/mozilla/security/nss/lib/pki/pki3hack.c (revision 55475)
|
| +++ nss/mozilla/security/nss/lib/pki/pki3hack.c (working copy)
|
| @@ -35,7 +35,7 @@
|
| * ***** END LICENSE BLOCK ***** */
|
|
|
| #ifdef DEBUG
|
| -static const char CVS_ID[] = "@(#) $RCSfile: pki3hack.c,v $ $Revision: 1.98 $ $Date: 2009/10/01 17:14:02 $";
|
| +static const char CVS_ID[] = "@(#) $RCSfile: pki3hack.c,v $ $Revision: 1.100 $ $Date: 2010/05/18 19:38:40 $";
|
| #endif /* DEBUG */
|
|
|
| /*
|
| @@ -109,7 +109,7 @@
|
| }
|
| token = nssToken_CreateFromPK11SlotInfo(td, slot);
|
| PK11Slot_SetNSSToken(slot, token);
|
| - /* Don't add non-existent token to TD's token list */
|
| + /* Don't add nonexistent token to TD's token list */
|
| if (token) {
|
| NSSRWLock_LockWrite(td->tokensLock);
|
| nssList_Add(td->tokenList, token);
|
| @@ -817,7 +817,7 @@
|
|
|
| /* Assert that it is safe to cast &cc->nsCertType to "PRInt32 *" */
|
| PORT_Assert(sizeof(cc->nsCertType) == sizeof(PRInt32));
|
| - PR_AtomicSet((PRInt32 *)&cc->nsCertType, nsCertType);
|
| + PR_ATOMIC_SET((PRInt32 *)&cc->nsCertType, nsCertType);
|
| }
|
| }
|
|
|
|
|