Index: nss/mozilla/security/nss/lib/pki/pki3hack.c |
=================================================================== |
--- nss/mozilla/security/nss/lib/pki/pki3hack.c (revision 55475) |
+++ nss/mozilla/security/nss/lib/pki/pki3hack.c (working copy) |
@@ -35,7 +35,7 @@ |
* ***** END LICENSE BLOCK ***** */ |
#ifdef DEBUG |
-static const char CVS_ID[] = "@(#) $RCSfile: pki3hack.c,v $ $Revision: 1.98 $ $Date: 2009/10/01 17:14:02 $"; |
+static const char CVS_ID[] = "@(#) $RCSfile: pki3hack.c,v $ $Revision: 1.100 $ $Date: 2010/05/18 19:38:40 $"; |
#endif /* DEBUG */ |
/* |
@@ -109,7 +109,7 @@ |
} |
token = nssToken_CreateFromPK11SlotInfo(td, slot); |
PK11Slot_SetNSSToken(slot, token); |
- /* Don't add non-existent token to TD's token list */ |
+ /* Don't add nonexistent token to TD's token list */ |
if (token) { |
NSSRWLock_LockWrite(td->tokensLock); |
nssList_Add(td->tokenList, token); |
@@ -817,7 +817,7 @@ |
/* Assert that it is safe to cast &cc->nsCertType to "PRInt32 *" */ |
PORT_Assert(sizeof(cc->nsCertType) == sizeof(PRInt32)); |
- PR_AtomicSet((PRInt32 *)&cc->nsCertType, nsCertType); |
+ PR_ATOMIC_SET((PRInt32 *)&cc->nsCertType, nsCertType); |
} |
} |