| Index: nss/lib/certdb/certdb.h
|
| diff --git a/nss/lib/certdb/certdb.h b/nss/lib/certdb/certdb.h
|
| index d358dfd822fe3cfc49a6539548f9f345a6c867e3..cb39b9800f1bf0103dd240599f73026deba54cf9 100644
|
| --- a/nss/lib/certdb/certdb.h
|
| +++ b/nss/lib/certdb/certdb.h
|
| @@ -5,18 +5,17 @@
|
| #ifndef _CERTDB_H_
|
| #define _CERTDB_H_
|
|
|
| -
|
| /* common flags for all types of certificates */
|
| -#define CERTDB_TERMINAL_RECORD (1u<<0)
|
| -#define CERTDB_TRUSTED (1u<<1)
|
| -#define CERTDB_SEND_WARN (1u<<2)
|
| -#define CERTDB_VALID_CA (1u<<3)
|
| -#define CERTDB_TRUSTED_CA (1u<<4) /* trusted for issuing server certs */
|
| -#define CERTDB_NS_TRUSTED_CA (1u<<5)
|
| -#define CERTDB_USER (1u<<6)
|
| -#define CERTDB_TRUSTED_CLIENT_CA (1u<<7) /* trusted for issuing client certs */
|
| -#define CERTDB_INVISIBLE_CA (1u<<8) /* don't show in UI */
|
| -#define CERTDB_GOVT_APPROVED_CA (1u<<9) /* can do strong crypto in export ver */
|
| +#define CERTDB_TERMINAL_RECORD (1u << 0)
|
| +#define CERTDB_TRUSTED (1u << 1)
|
| +#define CERTDB_SEND_WARN (1u << 2)
|
| +#define CERTDB_VALID_CA (1u << 3)
|
| +#define CERTDB_TRUSTED_CA (1u << 4) /* trusted for issuing server certs */
|
| +#define CERTDB_NS_TRUSTED_CA (1u << 5)
|
| +#define CERTDB_USER (1u << 6)
|
| +#define CERTDB_TRUSTED_CLIENT_CA (1u << 7) /* trusted for issuing client certs */
|
| +#define CERTDB_INVISIBLE_CA (1u << 8) /* don't show in UI */
|
| +#define CERTDB_GOVT_APPROVED_CA (1u << 9) /* can do strong crypto in export ver */
|
|
|
| /* old usage, to keep old programs compiling */
|
| /* On Windows, Mac, and Linux (and other gcc platforms), we can give compile
|
| @@ -26,54 +25,48 @@
|
| #if (__GNUC__ == 4) && (__GNUC_MINOR__ < 5)
|
| typedef unsigned int __CERTDB_VALID_PEER __attribute__((deprecated));
|
| #else
|
| -typedef unsigned int __CERTDB_VALID_PEER __attribute__((deprecated
|
| - ("CERTDB_VALID_PEER is now CERTDB_TERMINAL_RECORD")));
|
| +typedef unsigned int __CERTDB_VALID_PEER __attribute__((
|
| + deprecated("CERTDB_VALID_PEER is now CERTDB_TERMINAL_RECORD")));
|
| #endif
|
| -#define CERTDB_VALID_PEER ((__CERTDB_VALID_PEER) CERTDB_TERMINAL_RECORD)
|
| +#define CERTDB_VALID_PEER ((__CERTDB_VALID_PEER)CERTDB_TERMINAL_RECORD)
|
| #else
|
| #ifdef _WIN32
|
| #pragma deprecated(CERTDB_VALID_PEER)
|
| #endif
|
| -#define CERTDB_VALID_PEER CERTDB_TERMINAL_RECORD
|
| +#define CERTDB_VALID_PEER CERTDB_TERMINAL_RECORD
|
| #endif
|
|
|
| SEC_BEGIN_PROTOS
|
|
|
| -CERTSignedCrl *
|
| -SEC_FindCrlByKey(CERTCertDBHandle *handle, SECItem *crlKey, int type);
|
| -
|
| -CERTSignedCrl *
|
| -SEC_FindCrlByName(CERTCertDBHandle *handle, SECItem *crlKey, int type);
|
| +CERTSignedCrl *SEC_FindCrlByKey(CERTCertDBHandle *handle, SECItem *crlKey,
|
| + int type);
|
|
|
| -CERTSignedCrl *
|
| -SEC_FindCrlByDERCert(CERTCertDBHandle *handle, SECItem *derCrl, int type);
|
| +CERTSignedCrl *SEC_FindCrlByName(CERTCertDBHandle *handle, SECItem *crlKey,
|
| + int type);
|
|
|
| -PRBool
|
| -SEC_CertNicknameConflict(const char *nickname, const SECItem *derSubject,
|
| - CERTCertDBHandle *handle);
|
| -CERTSignedCrl *
|
| -SEC_NewCrl(CERTCertDBHandle *handle, char *url, SECItem *derCrl, int type);
|
| +CERTSignedCrl *SEC_FindCrlByDERCert(CERTCertDBHandle *handle, SECItem *derCrl,
|
| + int type);
|
|
|
| -SECStatus
|
| -SEC_DeletePermCRL(CERTSignedCrl *crl);
|
| +PRBool SEC_CertNicknameConflict(const char *nickname, const SECItem *derSubject,
|
| + CERTCertDBHandle *handle);
|
| +CERTSignedCrl *SEC_NewCrl(CERTCertDBHandle *handle, char *url, SECItem *derCrl,
|
| + int type);
|
|
|
| +SECStatus SEC_DeletePermCRL(CERTSignedCrl *crl);
|
|
|
| -SECStatus
|
| -SEC_LookupCrls(CERTCertDBHandle *handle, CERTCrlHeadNode **nodes, int type);
|
| +SECStatus SEC_LookupCrls(CERTCertDBHandle *handle, CERTCrlHeadNode **nodes,
|
| + int type);
|
|
|
| -SECStatus
|
| -SEC_DestroyCrl(CERTSignedCrl *crl);
|
| +SECStatus SEC_DestroyCrl(CERTSignedCrl *crl);
|
|
|
| -CERTSignedCrl* SEC_DupCrl(CERTSignedCrl* acrl);
|
| +CERTSignedCrl *SEC_DupCrl(CERTSignedCrl *acrl);
|
|
|
| -SECStatus
|
| -CERT_AddTempCertToPerm(CERTCertificate *cert, char *nickname,
|
| - CERTCertTrust *trust);
|
| +SECStatus CERT_AddTempCertToPerm(CERTCertificate *cert, char *nickname,
|
| + CERTCertTrust *trust);
|
|
|
| SECStatus SEC_DeletePermCertificate(CERTCertificate *cert);
|
|
|
| -PRBool
|
| -SEC_CrlIsNewer(CERTCrl *inNew, CERTCrl *old);
|
| +PRBool SEC_CrlIsNewer(CERTCrl *inNew, CERTCrl *old);
|
|
|
| /*
|
| ** Extract the validity times from a CRL
|
| @@ -81,8 +74,7 @@ SEC_CrlIsNewer(CERTCrl *inNew, CERTCrl *old);
|
| ** "notBefore" is the start of the validity period (last update)
|
| ** "notAfter" is the end of the validity period (next update)
|
| */
|
| -SECStatus
|
| -SEC_GetCrlTimes(CERTCrl *crl, PRTime *notBefore, PRTime *notAfter);
|
| +SECStatus SEC_GetCrlTimes(CERTCrl *crl, PRTime *notBefore, PRTime *notAfter);
|
|
|
| /*
|
| ** Check the validity times of a crl vs. time 't', allowing
|
| @@ -90,8 +82,7 @@ SEC_GetCrlTimes(CERTCrl *crl, PRTime *notBefore, PRTime *notAfter);
|
| ** "crl" is the certificate to be checked
|
| ** "t" is the time to check against
|
| */
|
| -SECCertTimeValidity
|
| -SEC_CheckCrlTimes(CERTCrl *crl, PRTime t);
|
| +SECCertTimeValidity SEC_CheckCrlTimes(CERTCrl *crl, PRTime t);
|
|
|
| SEC_END_PROTOS
|
|
|
|
|