Index: nss/lib/cryptohi/keyhi.h |
diff --git a/nss/lib/cryptohi/keyhi.h b/nss/lib/cryptohi/keyhi.h |
index 0ed3698ebf2dae2bb259a424eb440ae6baf43769..180990049ba02b825e26542e3564f6847db6c9e7 100644 |
--- a/nss/lib/cryptohi/keyhi.h |
+++ b/nss/lib/cryptohi/keyhi.h |
@@ -16,7 +16,6 @@ |
SEC_BEGIN_PROTOS |
- |
/* |
** Destroy a subject-public-key-info object. |
*/ |
@@ -27,15 +26,15 @@ extern void SECKEY_DestroySubjectPublicKeyInfo(CERTSubjectPublicKeyInfo *spki); |
** appropriately (memory is allocated for each of the sub objects). |
*/ |
extern SECStatus SECKEY_CopySubjectPublicKeyInfo(PLArenaPool *arena, |
- CERTSubjectPublicKeyInfo *dst, |
- CERTSubjectPublicKeyInfo *src); |
+ CERTSubjectPublicKeyInfo *dst, |
+ CERTSubjectPublicKeyInfo *src); |
/* |
** Update the PQG parameters for a cert's public key. |
** Only done for DSA certs |
*/ |
extern SECStatus |
-SECKEY_UpdateCertPQG(CERTCertificate * subjectCert); |
+SECKEY_UpdateCertPQG(CERTCertificate *subjectCert); |
/* |
** Return the number of bits in the provided big integer. This assumes that the |
@@ -77,19 +76,19 @@ extern SECKEYPublicKey *SECKEY_ConvertToPublicKey(SECKEYPrivateKey *privateKey); |
* create a new RSA key pair. The private Key is returned... |
*/ |
SECKEYPrivateKey *SECKEY_CreateRSAPrivateKey(int keySizeInBits, |
- SECKEYPublicKey **pubk, void *cx); |
- |
+ SECKEYPublicKey **pubk, void *cx); |
+ |
/* |
* create a new DH key pair. The private Key is returned... |
*/ |
SECKEYPrivateKey *SECKEY_CreateDHPrivateKey(SECKEYDHParams *param, |
- SECKEYPublicKey **pubk, void *cx); |
+ SECKEYPublicKey **pubk, void *cx); |
/* |
* create a new EC key pair. The private Key is returned... |
*/ |
SECKEYPrivateKey *SECKEY_CreateECPrivateKey(SECKEYECParams *param, |
- SECKEYPublicKey **pubk, void *cx); |
+ SECKEYPublicKey **pubk, void *cx); |
/* |
** Create a subject-public-key-info based on a public key. |
@@ -103,11 +102,11 @@ SECKEY_CreateSubjectPublicKeyInfo(const SECKEYPublicKey *k); |
*/ |
extern CERTSubjectPublicKeyInfo * |
SECKEY_ConvertAndDecodePublicKeyAndChallenge(char *pkacstr, char *challenge, |
- void *cx); |
+ void *cx); |
/* |
** Encode a CERTSubjectPublicKeyInfo structure. into a |
-** DER encoded subject public key info. |
+** DER encoded subject public key info. |
*/ |
SECItem * |
SECKEY_EncodeDERSubjectPublicKeyInfo(const SECKEYPublicKey *pubk); |
@@ -139,7 +138,6 @@ SECKEY_ExtractPublicKey(const CERTSubjectPublicKeyInfo *); |
*/ |
extern void SECKEY_DestroyPrivateKey(SECKEYPrivateKey *key); |
- |
/* |
** Destroy a public key object. |
** "key" the object |
@@ -147,54 +145,54 @@ extern void SECKEY_DestroyPrivateKey(SECKEYPrivateKey *key); |
extern void SECKEY_DestroyPublicKey(SECKEYPublicKey *key); |
/* Destroy and zero out a private key info structure. for now this |
- * function zero's out memory allocated in an arena for the key |
- * since PORT_FreeArena does not currently do this. |
+ * function zero's out memory allocated in an arena for the key |
+ * since PORT_FreeArena does not currently do this. |
* |
- * NOTE -- If a private key info is allocated in an arena, one should |
- * not call this function with freeit = PR_FALSE. The function should |
- * destroy the arena. |
+ * NOTE -- If a private key info is allocated in an arena, one should |
+ * not call this function with freeit = PR_FALSE. The function should |
+ * destroy the arena. |
*/ |
extern void |
SECKEY_DestroyPrivateKeyInfo(SECKEYPrivateKeyInfo *pvk, PRBool freeit); |
/* Destroy and zero out an encrypted private key info. |
* |
- * NOTE -- If a encrypted private key info is allocated in an arena, one should |
- * not call this function with freeit = PR_FALSE. The function should |
- * destroy the arena. |
+ * NOTE -- If a encrypted private key info is allocated in an arena, one should |
+ * not call this function with freeit = PR_FALSE. The function should |
+ * destroy the arena. |
*/ |
extern void |
SECKEY_DestroyEncryptedPrivateKeyInfo(SECKEYEncryptedPrivateKeyInfo *epki, |
- PRBool freeit); |
+ PRBool freeit); |
-/* Copy private key info structure. |
+/* Copy private key info structure. |
* poolp is the arena into which the contents of from is to be copied. |
* NULL is a valid entry. |
* to is the destination private key info |
* from is the source private key info |
- * if either from or to is NULL or an error occurs, SECFailure is |
+ * if either from or to is NULL or an error occurs, SECFailure is |
* returned. otherwise, SECSuccess is returned. |
*/ |
extern SECStatus |
SECKEY_CopyPrivateKeyInfo(PLArenaPool *poolp, |
- SECKEYPrivateKeyInfo *to, |
- const SECKEYPrivateKeyInfo *from); |
+ SECKEYPrivateKeyInfo *to, |
+ const SECKEYPrivateKeyInfo *from); |
extern SECStatus |
-SECKEY_CacheStaticFlags(SECKEYPrivateKey* key); |
+SECKEY_CacheStaticFlags(SECKEYPrivateKey *key); |
-/* Copy encrypted private key info structure. |
+/* Copy encrypted private key info structure. |
* poolp is the arena into which the contents of from is to be copied. |
* NULL is a valid entry. |
* to is the destination encrypted private key info |
* from is the source encrypted private key info |
- * if either from or to is NULL or an error occurs, SECFailure is |
+ * if either from or to is NULL or an error occurs, SECFailure is |
* returned. otherwise, SECSuccess is returned. |
*/ |
extern SECStatus |
SECKEY_CopyEncryptedPrivateKeyInfo(PLArenaPool *poolp, |
- SECKEYEncryptedPrivateKeyInfo *to, |
- const SECKEYEncryptedPrivateKeyInfo *from); |
+ SECKEYEncryptedPrivateKeyInfo *to, |
+ const SECKEYEncryptedPrivateKeyInfo *from); |
/* |
* Accessor functions for key type of public and private keys. |
*/ |
@@ -205,10 +203,10 @@ KeyType SECKEY_GetPublicKeyType(const SECKEYPublicKey *pubKey); |
* Creates a PublicKey from its DER encoding. |
* Currently only supports RSA, DSA, and DH keys. |
*/ |
-SECKEYPublicKey* |
+SECKEYPublicKey * |
SECKEY_ImportDERPublicKey(const SECItem *derKey, CK_KEY_TYPE type); |
-SECKEYPrivateKeyList* |
+SECKEYPrivateKeyList * |
SECKEY_NewPrivateKeyList(void); |
void |
@@ -218,14 +216,14 @@ void |
SECKEY_RemovePrivateKeyListNode(SECKEYPrivateKeyListNode *node); |
SECStatus |
-SECKEY_AddPrivateKeyToListTail( SECKEYPrivateKeyList *list, |
- SECKEYPrivateKey *key); |
+SECKEY_AddPrivateKeyToListTail(SECKEYPrivateKeyList *list, |
+ SECKEYPrivateKey *key); |
-#define PRIVKEY_LIST_HEAD(l) ((SECKEYPrivateKeyListNode*)PR_LIST_HEAD(&l->list)) |
+#define PRIVKEY_LIST_HEAD(l) ((SECKEYPrivateKeyListNode *)PR_LIST_HEAD(&l->list)) |
#define PRIVKEY_LIST_NEXT(n) ((SECKEYPrivateKeyListNode *)n->links.next) |
-#define PRIVKEY_LIST_END(n,l) (((void *)n) == ((void *)&l->list)) |
+#define PRIVKEY_LIST_END(n, l) (((void *)n) == ((void *)&l->list)) |
-SECKEYPublicKeyList* |
+SECKEYPublicKeyList * |
SECKEY_NewPublicKeyList(void); |
void |
@@ -235,12 +233,12 @@ void |
SECKEY_RemovePublicKeyListNode(SECKEYPublicKeyListNode *node); |
SECStatus |
-SECKEY_AddPublicKeyToListTail( SECKEYPublicKeyList *list, |
- SECKEYPublicKey *key); |
+SECKEY_AddPublicKeyToListTail(SECKEYPublicKeyList *list, |
+ SECKEYPublicKey *key); |
-#define PUBKEY_LIST_HEAD(l) ((SECKEYPublicKeyListNode*)PR_LIST_HEAD(&l->list)) |
+#define PUBKEY_LIST_HEAD(l) ((SECKEYPublicKeyListNode *)PR_LIST_HEAD(&l->list)) |
#define PUBKEY_LIST_NEXT(n) ((SECKEYPublicKeyListNode *)n->links.next) |
-#define PUBKEY_LIST_END(n,l) (((void *)n) == ((void *)&l->list)) |
+#define PUBKEY_LIST_END(n, l) (((void *)n) == ((void *)&l->list)) |
/* |
* Length in bits of the EC's field size. This is also the length of |
@@ -266,7 +264,7 @@ extern int SECKEY_ECParamsToBasePointOrderLen(const SECItem *params); |
* |
* Return 0 on failure (unknown EC domain parameters). |
*/ |
-SECOidTag SECKEY_GetECCOid(const SECKEYECParams * params); |
+SECOidTag SECKEY_GetECCOid(const SECKEYECParams *params); |
SEC_END_PROTOS |