diff --git a/chrome/nsChromeRegistryChrome.cpp b/chrome/nsChromeRegistryChrome.cpp index 45aa5afaec88..1c73257c137e 100644 --- a/chrome/nsChromeRegistryChrome.cpp +++ b/chrome/nsChromeRegistryChrome.cpp @@ -496,7 +496,7 @@ nsChromeRegistryChrome::SendRegisteredChrome( if (!parents.Length()) return; - for (PRUint32 i = 0; i < parents.Length(); i++) { + for (uint32_t i = 0; i < parents.Length(); i++) { DebugOnly success = parents[i]->SendRegisterChrome(packages, resources, overrides, mSelectedLocale, true); diff --git a/content/base/src/nsCrossSiteListenerProxy.cpp b/content/base/src/nsCrossSiteListenerProxy.cpp index f0d7f2614756..6f245911a544 100644 --- a/content/base/src/nsCrossSiteListenerProxy.cpp +++ b/content/base/src/nsCrossSiteListenerProxy.cpp @@ -47,7 +47,7 @@ LogBlockedRequest(nsIRequest* aRequest) nsresult rv = NS_OK; // Get the innerWindowID associated with the XMLHTTPRequest - PRUint64 innerWindowID = 0; + uint64_t innerWindowID = 0; nsCOMPtr loadGroup; aRequest->GetLoadGroup(getter_AddRefs(loadGroup)); diff --git a/content/media/webrtc/MediaEngineDefault.cpp b/content/media/webrtc/MediaEngineDefault.cpp index 6be96392e017..203e4ea4b81c 100644 --- a/content/media/webrtc/MediaEngineDefault.cpp +++ b/content/media/webrtc/MediaEngineDefault.cpp @@ -192,7 +192,7 @@ MediaEngineDefaultVideoSource::Snapshot(uint32_t aDuration, nsIDOMFile** aFile) filePicker->AppendFilters(nsIFilePicker::filterImages); // XXX - This API should be made async - PRInt16 dialogReturn; + int16_t dialogReturn; rv = filePicker->Show(&dialogReturn); NS_ENSURE_SUCCESS(rv, rv); if (dialogReturn == nsIFilePicker::returnCancel) { diff --git a/dom/media/MediaManager.cpp b/dom/media/MediaManager.cpp index 3ad15e1068b5..53a21d11216c 100644 --- a/dom/media/MediaManager.cpp +++ b/dom/media/MediaManager.cpp @@ -130,8 +130,8 @@ HostHasPermission(nsIURI &docURI) return false; } - PRUint32 begin = 0; - PRUint32 end = 0; + uint32_t begin = 0; + uint32_t end = 0; nsCString domainName; /* Test each domain name in the comma separated list @@ -140,7 +140,7 @@ HostHasPermission(nsIURI &docURI) */ do { end = domainWhiteList.FindChar(',', begin); - if (end == (PRUint32)-1) { + if (end == (uint32_t)-1) { // Last or only domain name in the comma separated list end = domainWhiteList.Length(); } diff --git a/dom/workers/RuntimeService.cpp b/dom/workers/RuntimeService.cpp index 0d1d127aa87f..8b7b4964fa1a 100644 --- a/dom/workers/RuntimeService.cpp +++ b/dom/workers/RuntimeService.cpp @@ -1096,7 +1096,7 @@ public: if (gTestPBackground) { // Randomize value to validate workers are not cross-posting messages. uint32_t testValue; - PRSize randomSize = PR_GetRandomNoise(&testValue, sizeof(testValue)); + size_t randomSize = PR_GetRandomNoise(&testValue, sizeof(testValue)); MOZ_RELEASE_ASSERT(randomSize == sizeof(testValue)); nsCString testStr; testStr.AppendInt(testValue); diff --git a/security/apps/AppTrustDomain.cpp b/security/apps/AppTrustDomain.cpp index 96877a2abce5..574495ef5abd 100644 --- a/security/apps/AppTrustDomain.cpp +++ b/security/apps/AppTrustDomain.cpp @@ -172,14 +172,14 @@ AppTrustDomain::GetCertTrust(EndEntityOrCA endEntityOrCA, CERTCertTrust trust; if (CERT_GetCertTrust(candidateCert.get(), &trust) == SECSuccess) { - PRUint32 flags = SEC_GET_TRUST_FLAGS(&trust, trustObjectSigning); + uint32_t flags = SEC_GET_TRUST_FLAGS(&trust, trustObjectSigning); // For DISTRUST, we use the CERTDB_TRUSTED or CERTDB_TRUSTED_CA bit, // because we can have active distrust for either type of cert. Note that // CERTDB_TERMINAL_RECORD means "stop trying to inherit trust" so if the // relevant trust bit isn't set then that means the cert must be considered // distrusted. - PRUint32 relevantTrustBit = endEntityOrCA == EndEntityOrCA::MustBeCA + uint32_t relevantTrustBit = endEntityOrCA == EndEntityOrCA::MustBeCA ? CERTDB_TRUSTED_CA : CERTDB_TRUSTED; if (((flags & (relevantTrustBit | CERTDB_TERMINAL_RECORD))) diff --git a/security/certverifier/NSSCertDBTrustDomain.cpp b/security/certverifier/NSSCertDBTrustDomain.cpp index 5da40f4cbf2f..85fdd40332cf 100644 --- a/security/certverifier/NSSCertDBTrustDomain.cpp +++ b/security/certverifier/NSSCertDBTrustDomain.cpp @@ -182,14 +182,14 @@ NSSCertDBTrustDomain::GetCertTrust(EndEntityOrCA endEntityOrCA, // "We have a trust record." CERTCertTrust trust; if (CERT_GetCertTrust(candidateCert.get(), &trust) == SECSuccess) { - PRUint32 flags = SEC_GET_TRUST_FLAGS(&trust, mCertDBTrustType); + uint32_t flags = SEC_GET_TRUST_FLAGS(&trust, mCertDBTrustType); // For DISTRUST, we use the CERTDB_TRUSTED or CERTDB_TRUSTED_CA bit, // because we can have active distrust for either type of cert. Note that // CERTDB_TERMINAL_RECORD means "stop trying to inherit trust" so if the // relevant trust bit isn't set then that means the cert must be considered // distrusted. - PRUint32 relevantTrustBit = + uint32_t relevantTrustBit = endEntityOrCA == EndEntityOrCA::MustBeCA ? CERTDB_TRUSTED_CA : CERTDB_TRUSTED; if (((flags & (relevantTrustBit|CERTDB_TERMINAL_RECORD)))