| OLD | NEW |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public | 1 /* This Source Code Form is subject to the terms of the Mozilla Public |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this | 2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 4 #ifndef _PK11PUB_H_ | 4 #ifndef _PK11PUB_H_ |
| 5 #define _PK11PUB_H_ | 5 #define _PK11PUB_H_ |
| 6 #include "plarena.h" | 6 #include "plarena.h" |
| 7 #include "seccomon.h" | 7 #include "seccomon.h" |
| 8 #include "secoidt.h" | 8 #include "secoidt.h" |
| 9 #include "secdert.h" | 9 #include "secdert.h" |
| 10 #include "keyt.h" | 10 #include "keyt.h" |
| (...skipping 684 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 695 */ | 695 */ |
| 696 SECStatus PK11_HashBuf(SECOidTag hashAlg, unsigned char *out, | 696 SECStatus PK11_HashBuf(SECOidTag hashAlg, unsigned char *out, |
| 697 const unsigned char *in, PRInt32 len); | 697 const unsigned char *in, PRInt32 len); |
| 698 SECStatus PK11_DigestOp(PK11Context *context, const unsigned char *in, | 698 SECStatus PK11_DigestOp(PK11Context *context, const unsigned char *in, |
| 699 unsigned len); | 699 unsigned len); |
| 700 SECStatus PK11_CipherOp(PK11Context *context, unsigned char * out, int *outlen, | 700 SECStatus PK11_CipherOp(PK11Context *context, unsigned char * out, int *outlen, |
| 701 int maxout, const unsigned char *in, int inlen); | 701 int maxout, const unsigned char *in, int inlen); |
| 702 SECStatus PK11_Finalize(PK11Context *context); | 702 SECStatus PK11_Finalize(PK11Context *context); |
| 703 SECStatus PK11_DigestFinal(PK11Context *context, unsigned char *data, | 703 SECStatus PK11_DigestFinal(PK11Context *context, unsigned char *data, |
| 704 unsigned int *outLen, unsigned int length); | 704 unsigned int *outLen, unsigned int length); |
| 705 #define PK11_CipherFinal PK11_DigestFinal |
| 705 SECStatus PK11_SaveContext(PK11Context *cx,unsigned char *save, | 706 SECStatus PK11_SaveContext(PK11Context *cx,unsigned char *save, |
| 706 int *len, int saveLength); | 707 int *len, int saveLength); |
| 707 | 708 |
| 708 /* Save the context's state, with possible allocation. | 709 /* Save the context's state, with possible allocation. |
| 709 * The caller may supply an already allocated buffer in preAllocBuf, | 710 * The caller may supply an already allocated buffer in preAllocBuf, |
| 710 * with length pabLen. If the buffer is large enough for the context's | 711 * with length pabLen. If the buffer is large enough for the context's |
| 711 * state, it will receive the state. | 712 * state, it will receive the state. |
| 712 * If the buffer is not large enough (or NULL), then a new buffer will | 713 * If the buffer is not large enough (or NULL), then a new buffer will |
| 713 * be allocated with PORT_Alloc. | 714 * be allocated with PORT_Alloc. |
| 714 * In either case, the state will be returned as a buffer, and the length | 715 * In either case, the state will be returned as a buffer, and the length |
| (...skipping 117 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 832 PK11_GetLowLevelKeyIDForCert(PK11SlotInfo *slot, | 833 PK11_GetLowLevelKeyIDForCert(PK11SlotInfo *slot, |
| 833 CERTCertificate *cert, void *pwarg); | 834 CERTCertificate *cert, void *pwarg); |
| 834 SECItem * | 835 SECItem * |
| 835 PK11_GetLowLevelKeyIDForPrivateKey(SECKEYPrivateKey *key); | 836 PK11_GetLowLevelKeyIDForPrivateKey(SECKEYPrivateKey *key); |
| 836 | 837 |
| 837 PRBool SECMOD_HasRootCerts(void); | 838 PRBool SECMOD_HasRootCerts(void); |
| 838 | 839 |
| 839 SEC_END_PROTOS | 840 SEC_END_PROTOS |
| 840 | 841 |
| 841 #endif | 842 #endif |
| OLD | NEW |