зеркало из https://github.com/mozilla/gecko-dev.git
Bug 1523969 part 21 - Move method definition inline comments to new line in 'security/'. r=ehsan
Differential Revision: https://phabricator.services.mozilla.com/D21122 --HG-- extra : rebase_source : cceafd5ad497236b2ce532727ad3435b8ea49fa7 extra : histedit_source : 630de35708f3a312d4b286a94d92536d086c4c9c
This commit is contained in:
Родитель
3091198ef3
Коммит
a6457a95be
|
@ -1376,7 +1376,8 @@ SECStatus AuthCertificate(CertVerifier& certVerifier,
|
|||
return rv == Success ? SECSuccess : SECFailure;
|
||||
}
|
||||
|
||||
/*static*/ SECStatus SSLServerCertVerificationJob::Dispatch(
|
||||
/*static*/
|
||||
SECStatus SSLServerCertVerificationJob::Dispatch(
|
||||
const RefPtr<SharedCertVerifier>& certVerifier, const void* fdForLogging,
|
||||
nsNSSSocketInfo* infoObject, const UniqueCERTCertificate& serverCert,
|
||||
const UniqueCERTCertList& peerCertChain, const SECItem* stapledOCSPResponse,
|
||||
|
|
|
@ -158,14 +158,16 @@ bool SharedSSLState::SocketCreated() {
|
|||
return mSocketCreated;
|
||||
}
|
||||
|
||||
/*static*/ void SharedSSLState::GlobalInit() {
|
||||
/*static*/
|
||||
void SharedSSLState::GlobalInit() {
|
||||
MOZ_ASSERT(NS_IsMainThread(), "Not on main thread");
|
||||
gPublicState = new SharedSSLState();
|
||||
gPrivateState = new SharedSSLState();
|
||||
gPrivateState->NotePrivateBrowsingStatus();
|
||||
}
|
||||
|
||||
/*static*/ void SharedSSLState::GlobalCleanup() {
|
||||
/*static*/
|
||||
void SharedSSLState::GlobalCleanup() {
|
||||
MOZ_ASSERT(NS_IsMainThread(), "Not on main thread");
|
||||
|
||||
if (gPrivateState) {
|
||||
|
@ -181,7 +183,8 @@ bool SharedSSLState::SocketCreated() {
|
|||
}
|
||||
}
|
||||
|
||||
/*static*/ void SharedSSLState::NoteCertOverrideServiceInstantiated() {
|
||||
/*static*/
|
||||
void SharedSSLState::NoteCertOverrideServiceInstantiated() {
|
||||
sCertOverrideSvcExists = true;
|
||||
}
|
||||
|
||||
|
|
|
@ -588,8 +588,8 @@ TransportSecurityInfo::GetClassIDNoAlloc(nsCID* aClassIDNoAlloc) {
|
|||
|
||||
// RememberCertErrorsTable
|
||||
|
||||
/*static*/ RememberCertErrorsTable* RememberCertErrorsTable::sInstance =
|
||||
nullptr;
|
||||
/*static*/
|
||||
RememberCertErrorsTable* RememberCertErrorsTable::sInstance = nullptr;
|
||||
|
||||
RememberCertErrorsTable::RememberCertErrorsTable()
|
||||
: mErrorHosts(), mMutex("RememberCertErrorsTable::mMutex") {}
|
||||
|
|
|
@ -80,7 +80,8 @@ class nsNSSCertListEnumerator : public nsSimpleEnumerator {
|
|||
|
||||
NS_IMPL_ISUPPORTS(nsNSSCertificate, nsIX509Cert, nsISerializable, nsIClassInfo)
|
||||
|
||||
/*static*/ nsNSSCertificate* nsNSSCertificate::Create(CERTCertificate* cert) {
|
||||
/*static*/
|
||||
nsNSSCertificate* nsNSSCertificate::Create(CERTCertificate* cert) {
|
||||
if (cert)
|
||||
return new nsNSSCertificate(cert);
|
||||
else
|
||||
|
|
|
@ -989,10 +989,11 @@ static const CipherPref sCipherPrefs[] = {
|
|||
// This function will convert from pref values like 1, 2, ...
|
||||
// to the internal values of SSL_LIBRARY_VERSION_TLS_1_0,
|
||||
// SSL_LIBRARY_VERSION_TLS_1_1, ...
|
||||
/*static*/ void nsNSSComponent::FillTLSVersionRange(SSLVersionRange& rangeOut,
|
||||
uint32_t minFromPrefs,
|
||||
uint32_t maxFromPrefs,
|
||||
SSLVersionRange defaults) {
|
||||
/*static*/
|
||||
void nsNSSComponent::FillTLSVersionRange(SSLVersionRange& rangeOut,
|
||||
uint32_t minFromPrefs,
|
||||
uint32_t maxFromPrefs,
|
||||
SSLVersionRange defaults) {
|
||||
rangeOut = defaults;
|
||||
// determine what versions are supported
|
||||
SSLVersionRange supported;
|
||||
|
@ -1998,7 +1999,8 @@ nsNSSComponent::Observe(nsISupports* aSubject, const char* aTopic,
|
|||
return NS_OK;
|
||||
}
|
||||
|
||||
/*static*/ nsresult nsNSSComponent::GetNewPrompter(nsIPrompt** result) {
|
||||
/*static*/
|
||||
nsresult nsNSSComponent::GetNewPrompter(nsIPrompt** result) {
|
||||
NS_ENSURE_ARG_POINTER(result);
|
||||
*result = nullptr;
|
||||
|
||||
|
|
|
@ -84,9 +84,8 @@ GetPlainFileName(const wchar_t* aNTFileName, std::wstring* aFolder=nullptr)
|
|||
return nameCopy;
|
||||
}
|
||||
|
||||
/* static */ PermissionsService*
|
||||
PermissionsService::GetInstance()
|
||||
{
|
||||
/* static */
|
||||
PermissionsService* PermissionsService::GetInstance() {
|
||||
static PermissionsService sPermissionsService;
|
||||
return &sPermissionsService;
|
||||
}
|
||||
|
|
|
@ -34,9 +34,9 @@ const char* SandboxBrokerCommon::OperationDescription[] = {
|
|||
"open", "access", "stat", "chmod", "link", "symlink",
|
||||
"mkdir", "rename", "rmdir", "unlink", "readlink", "connect"};
|
||||
|
||||
/* static */ ssize_t SandboxBrokerCommon::RecvWithFd(int aFd, const iovec* aIO,
|
||||
size_t aNumIO,
|
||||
int* aPassedFdPtr) {
|
||||
/* static */
|
||||
ssize_t SandboxBrokerCommon::RecvWithFd(int aFd, const iovec* aIO,
|
||||
size_t aNumIO, int* aPassedFdPtr) {
|
||||
struct msghdr msg = {};
|
||||
msg.msg_iov = const_cast<iovec*>(aIO);
|
||||
msg.msg_iovlen = aNumIO;
|
||||
|
@ -93,9 +93,9 @@ const char* SandboxBrokerCommon::OperationDescription[] = {
|
|||
return rv;
|
||||
}
|
||||
|
||||
/* static */ ssize_t SandboxBrokerCommon::SendWithFd(int aFd, const iovec* aIO,
|
||||
size_t aNumIO,
|
||||
int aPassedFd) {
|
||||
/* static */
|
||||
ssize_t SandboxBrokerCommon::SendWithFd(int aFd, const iovec* aIO,
|
||||
size_t aNumIO, int aPassedFd) {
|
||||
struct msghdr msg = {};
|
||||
msg.msg_iov = const_cast<iovec*>(aIO);
|
||||
msg.msg_iovlen = aNumIO;
|
||||
|
|
|
@ -13,8 +13,9 @@
|
|||
|
||||
namespace mozilla {
|
||||
|
||||
/* static */ ContentProcessSandboxParams
|
||||
ContentProcessSandboxParams::ForThisProcess(const dom::MaybeFileDesc& aBroker) {
|
||||
/* static */
|
||||
ContentProcessSandboxParams ContentProcessSandboxParams::ForThisProcess(
|
||||
const dom::MaybeFileDesc& aBroker) {
|
||||
ContentProcessSandboxParams params;
|
||||
params.mLevel = GetEffectiveContentSandboxLevel();
|
||||
|
||||
|
|
|
@ -74,7 +74,8 @@ SandboxReporter::~SandboxReporter() {
|
|||
close(mClientFd);
|
||||
}
|
||||
|
||||
/* static */ SandboxReporter* SandboxReporter::Singleton() {
|
||||
/* static */
|
||||
SandboxReporter* SandboxReporter::Singleton() {
|
||||
static StaticMutex sMutex;
|
||||
StaticMutexAutoLock lock(sMutex);
|
||||
|
||||
|
|
|
@ -12,7 +12,8 @@ namespace mozilla {
|
|||
|
||||
// We need to define this function out of line so that clang-cl doesn't inline
|
||||
// it.
|
||||
/* static */ SandboxTarget* SandboxTarget::Instance() {
|
||||
/* static */
|
||||
SandboxTarget* SandboxTarget::Instance() {
|
||||
static SandboxTarget sb;
|
||||
return &sb;
|
||||
}
|
||||
|
|
Загрузка…
Ссылка в новой задаче