[Pkg-mozext-commits] [perspectives-extension] 01/72: IDE auto-cleanup (trim trailing spaces, unify tabs/spaces)

David Prévot taffit at moszumanska.debian.org
Thu Dec 11 02:12:44 UTC 2014


This is an automated email from the git hooks/post-receive script.

taffit pushed a commit to branch master
in repository perspectives-extension.

commit 7597a503e30b0e41e37225efc8f9bff887f6e4bc
Author: Gerold Meisinger <gerold.meisinger at gmail.com>
Date:   Sat Jun 14 22:36:40 2014 +0100

    IDE auto-cleanup (trim trailing spaces, unify tabs/spaces)
---
 plugin/chrome/content/notaries.js | 743 +++++++++++++++++++-------------------
 1 file changed, 371 insertions(+), 372 deletions(-)

diff --git a/plugin/chrome/content/notaries.js b/plugin/chrome/content/notaries.js
index c772a47..749979b 100644
--- a/plugin/chrome/content/notaries.js
+++ b/plugin/chrome/content/notaries.js
@@ -19,7 +19,7 @@
 var Perspectives = {
  	MY_ID: "perspectives at cmu.edu",
 	TIMEOUT_SEC: 5,  // this is timeout for each query to the server
-	NUM_TRIES_PER_SERVER: 2, // number of times we query a server before giving up 
+	NUM_TRIES_PER_SERVER: 2, // number of times we query a server before giving up
 	strbundle : null, // this isn't loaded when things are intialized
 
 
@@ -32,9 +32,9 @@ var Perspectives = {
 			/^127\.0\.0\.1$/], // could add many more
 
 	// list of objects representing each notary server's name + port and public
-	// key this list is populated by fillNotaryList() based on a file shipped with the 
+	// key this list is populated by fillNotaryList() based on a file shipped with the
 	// extension
-	all_notaries : [],  
+	all_notaries : [],
 
 	// Data
 
@@ -87,9 +87,9 @@ var Perspectives = {
 
 		return success;
 	},
-	
+
 	state : {
-		STATE_IS_BROKEN : 
+		STATE_IS_BROKEN :
 			Components.interfaces.nsIWebProgressListener.STATE_IS_BROKEN,
 		STATE_IS_INSECURE :
 			Components.interfaces.nsIWebProgressListener.STATE_IS_INSECURE,
@@ -97,16 +97,16 @@ var Perspectives = {
 			Components.interfaces.nsIWebProgressListener.STATE_IS_SECURE
 	},
 
-	is_nonrouted_ip: function(ip_str) { 
+	is_nonrouted_ip: function(ip_str) {
 		for (var i = 0; i < Perspectives.nonrouted_ips.length; i++) {
 			if (ip_str.match(Perspectives.nonrouted_ips[i])) {
-				return true; 
+				return true;
 			}
-		} 
-		return false; 
-	}, 
+		}
+		return false;
+	},
 
-	tab_info_cache : {}, 
+	tab_info_cache : {},
 
 	//Sets the tooltip and the text of the favicon popup on https sites
 	setFaviconText: function(str){
@@ -130,23 +130,23 @@ var Perspectives = {
             		return box.tooltipText;
 	},
 
-	// cached result data 
-	// FIXME: this should be merged with TabInfo, once TabInfo is made into a 
+	// cached result data
+	// FIXME: this should be merged with TabInfo, once TabInfo is made into a
 	// real object
-	SslCert: function(host, port, md5, summary, tooltip, svg, duration, cur_consistent, 
+	SslCert: function(host, port, md5, summary, tooltip, svg, duration, cur_consistent,
 					inconsistent_results,weakly_seen, server_result_list){
 		this.host     = host;  // now saved with ti, so remove this?
-		this.port     = port;  // now saved with ti, so remove this? 
+		this.port     = port;  // now saved with ti, so remove this?
 		this.md5      = md5;
 		this.cur_consistent   = cur_consistent;
-		this.inconsistent_results = inconsistent_results; 
-		this.weakly_seen = weakly_seen, 
+		this.inconsistent_results = inconsistent_results;
+		this.weakly_seen = weakly_seen,
 		this.duration = duration;
 		this.summary  = summary;  // this doesn't really need to be cached
 		this.tooltip  = tooltip;
 		this.svg      = svg;  // this doesn't really need to be cached
-		this.server_result_list = server_result_list; 
-		this.created = Pers_util.get_unix_time(); 
+		this.server_result_list = server_result_list;
+		this.created = Pers_util.get_unix_time();
 	},
 
 	get_invalid_cert_SSLStatus: function(uri){
@@ -188,36 +188,36 @@ var Perspectives = {
 		return gSSLStatus;
 	},
 
-	// gets current certificate, if it FAILED the security check 
-	psv_get_invalid_cert: function(uri) { 
+	// gets current certificate, if it FAILED the security check
+	psv_get_invalid_cert: function(uri) {
 		var gSSLStatus = Perspectives.get_invalid_cert_SSLStatus(uri);
 		if(!gSSLStatus){
 			return null;
 		}
 		return gSSLStatus.QueryInterface(Components.interfaces.nsISSLStatus)
 				.serverCert;
-	}, 
-
-	// gets current certificate, if it PASSED the browser check 
-	psv_get_valid_cert: function(ui) { 
-		try { 
-			ui.QueryInterface(Components.interfaces.nsISSLStatusProvider); 
-			if(!ui.SSLStatus) 
-				return null; 
-			return ui.SSLStatus.serverCert; 
+	},
+
+	// gets current certificate, if it PASSED the browser check
+	psv_get_valid_cert: function(ui) {
+		try {
+			ui.QueryInterface(Components.interfaces.nsISSLStatusProvider);
+			if(!ui.SSLStatus)
+				return null;
+			return ui.SSLStatus.serverCert;
 		}
 		catch (e) {
-			Pers_debug.d_print("error", "Perspectives Error: " + e); 
+			Pers_debug.d_print("error", "Perspectives Error: " + e);
 			return null;
 		}
-	}, 
+	},
 
 	getCertificate: function(browser){
 		var uri = browser.currentURI;
 		var ui  = browser.securityUI;
 		var cert = this.psv_get_valid_cert(ui);
 		if(!cert){
-			cert = this.psv_get_invalid_cert(uri);  
+			cert = this.psv_get_invalid_cert(uri);
 		}
 
 		if(!cert) {
@@ -226,53 +226,53 @@ var Perspectives = {
 		return cert;
 	},
 
-	getNotaryList: function() { 
-		var all_notaries = []; 
+	getNotaryList: function() {
+		var all_notaries = [];
 		try {
 			var list_txt = Perspectives.root_prefs.getCharPref("perspectives.additional_notary_list");
 			var additional_notaries = Pers_util.loadNotaryListFromString(list_txt);
-			all_notaries = all_notaries.concat(additional_notaries); 
-		} catch(e) { 
-			Pers_debug.d_print("error", "Error parsing additional notaries: " + e); 
-		} 		
-		var use_default_notaries = Perspectives.root_prefs.getBoolPref("perspectives.use_default_notary_list"); 
+			all_notaries = all_notaries.concat(additional_notaries);
+		} catch(e) {
+			Pers_debug.d_print("error", "Error parsing additional notaries: " + e);
+		}
+		var use_default_notaries = Perspectives.root_prefs.getBoolPref("perspectives.use_default_notary_list");
 		if(use_default_notaries) {
- 
+
 			var default_notaries = Pers_util.loadNotaryListFromString(
-						this.root_prefs.getCharPref("perspectives.default_notary_list")); 
-			all_notaries = all_notaries.concat(default_notaries); 
-		} 
-		return all_notaries; 
-	}, 
+						this.root_prefs.getCharPref("perspectives.default_notary_list"));
+			all_notaries = all_notaries.concat(default_notaries);
+		}
+		return all_notaries;
+	},
 
 
 	queryNotaries: function(ti){
-		if(!ti.cert) { 
-			Pers_debug.d_print("error","No certificate found for: " + ti.uri.host); 
-			return null; 
-		} 
-
-		if(ti.partial_query_results != null) { 
-			Pers_debug.d_print("main", 
-				"Query already in progress for '" + ti.uri.host + "' not querying again"); 
-			return; 
+		if(!ti.cert) {
+			Pers_debug.d_print("error","No certificate found for: " + ti.uri.host);
+			return null;
 		}
- 
+
+		if(ti.partial_query_results != null) {
+			Pers_debug.d_print("main",
+				"Query already in progress for '" + ti.uri.host + "' not querying again");
+			return;
+		}
+
 		// send a request to each notary
-		ti.partial_query_results = []; 
+		ti.partial_query_results = [];
 		for(var i = 0; i < Perspectives.all_notaries.length; i++) {
-			Pers_debug.d_print("main", "Sending query to notary " + Perspectives.all_notaries[i].host);  
-			this.querySingleNotary(Perspectives.all_notaries[i],ti); 
+			Pers_debug.d_print("main", "Sending query to notary " + Perspectives.all_notaries[i].host);
+			this.querySingleNotary(Perspectives.all_notaries[i],ti);
 		}
-    
-		ti.timeout_id = window.setTimeout(function() { 
-			Perspectives.notaryQueryTimeout(ti,0); 		
-		}, Perspectives.TIMEOUT_SEC * 1000 ); 
+
+		ti.timeout_id = window.setTimeout(function() {
+			Perspectives.notaryQueryTimeout(ti,0);
+		}, Perspectives.TIMEOUT_SEC * 1000 );
 
 	},
 
-	querySingleNotary: function(notary_server, ti) { 
-		var port = (ti.uri.port == -1) ? 443 : ti.uri.port;  
+	querySingleNotary: function(notary_server, ti) {
+		var port = (ti.uri.port == -1) ? 443 : ti.uri.port;
 		var full_url = notary_server.host +
 				"?host=" + ti.uri.host + "&port=" + port + "&service_type=2&";
 		if (full_url.substring(0,4) !== 'http') {
@@ -283,79 +283,79 @@ var Perspectives = {
 		Pers_debug.d_print("query", "sending query: '" + full_url + "'");
 		var req  = new XMLHttpRequest();
 		req.open("GET", full_url, true);
-		req.onreadystatechange = (function(evt) { 
-					Perspectives.notaryAjaxCallback(ti, req, notary_server, ti.has_user_permission); 
-		}); 
+		req.onreadystatechange = (function(evt) {
+					Perspectives.notaryAjaxCallback(ti, req, notary_server, ti.has_user_permission);
+		});
 		req.send(null);
-	}, 
- 
-       
-	notaryQueryTimeout: function(ti, num_timeouts) {  
-			try {  
-				Pers_debug.d_print("query", "timeout #" + num_timeouts + 
+	},
+
+
+	notaryQueryTimeout: function(ti, num_timeouts) {
+			try {
+				Pers_debug.d_print("query", "timeout #" + num_timeouts +
 						" querying for '" + ti.service_id + "'");
-				Pers_debug.d_print("query", ti.partial_query_results); 
- 
-				if (ti.partial_query_results == null) { 
+				Pers_debug.d_print("query", ti.partial_query_results);
+
+				if (ti.partial_query_results == null) {
 					ti.partial_query_results = []; // may have been deleted between now and then
-				} 
-			 
-				// find out which notaries we still need a reply from 
-				var missing_replies = [];  
-				for(var i = 0; i < Perspectives.all_notaries.length; i++) { 
+				}
+
+				// find out which notaries we still need a reply from
+				var missing_replies = [];
+				for(var i = 0; i < Perspectives.all_notaries.length; i++) {
 					var found = false;
-					for(var j = 0; j < ti.partial_query_results.length; j++) { 
-						if(Perspectives.all_notaries[i].host == 
-								ti.partial_query_results[j].server) { 
-							found = true; 
-							break; 
+					for(var j = 0; j < ti.partial_query_results.length; j++) {
+						if(Perspectives.all_notaries[i].host ==
+								ti.partial_query_results[j].server) {
+							found = true;
+							break;
 						}
-					} 
-					if(!found) { 
+					}
+					if(!found) {
 						missing_replies.push(Perspectives.all_notaries[i])
-					} 
-				} 
+					}
+				}
 
-				var is_final_timeout = (num_timeouts == Perspectives.NUM_TRIES_PER_SERVER); 
-				if(is_final_timeout) { 
+				var is_final_timeout = (num_timeouts == Perspectives.NUM_TRIES_PER_SERVER);
+				if(is_final_timeout) {
 					// time is up, so just add empty results for missing
-					// notaries and begin processing results 
-					for(var i = 0; i < missing_replies.length; i++) { 
+					// notaries and begin processing results
+					for(var i = 0; i < missing_replies.length; i++) {
 						// add empty result for this notary
-						var res = { "server" : missing_replies[i].host, 
-								"obs" : [] }; 
-						ti.partial_query_results.push(res); 
-					} 
+						var res = { "server" : missing_replies[i].host,
+								"obs" : [] };
+						ti.partial_query_results.push(res);
+					}
 					Perspectives.notaryQueriesComplete(ti);
 				} else {
 					// send another query to any of the servers we are missing.
 					// reset the timeout, incrementing the count of the number
-					// of timeouts we have seen  
-					for(var i = 0; i < missing_replies.length; i++) { 
+					// of timeouts we have seen
+					for(var i = 0; i < missing_replies.length; i++) {
 						this.querySingleNotary(missing_replies[i],ti);
 					}
-    
-					ti.timeout_id = window.setTimeout(function() { 
-						Perspectives.notaryQueryTimeout(ti, num_timeouts + 1); 		
-					}, Perspectives.TIMEOUT_SEC * 1000 ); 
-				} 
-				
-			} catch (e) { 
-				Pers_debug.d_print("query", "error handling timeout"); 
-				Pers_debug.d_print("query", e); 
-			} 
-	}, 
- 
-	notaryAjaxCallback: function(ti, req, notary_server) {  
-	
-		if (req.readyState == 4) {  
+
+					ti.timeout_id = window.setTimeout(function() {
+						Perspectives.notaryQueryTimeout(ti, num_timeouts + 1);
+					}, Perspectives.TIMEOUT_SEC * 1000 );
+				}
+
+			} catch (e) {
+				Pers_debug.d_print("query", "error handling timeout");
+				Pers_debug.d_print("query", e);
+			}
+	},
+
+	notaryAjaxCallback: function(ti, req, notary_server) {
+
+		if (req.readyState == 4) {
 			if(req.status == 200){
 				try {
 
 					//NOTE: Firefox pre-defines Cc and Ci, but SeaMonkey does not.
 					//We create local variables here so SeaMonkey clients don't throw 'variable not defined' exceptions
 					const Cc = Components.classes, Ci = Components.interfaces;
- 
+
 					Pers_debug.d_print("querylarge", req.responseText);
 					var server_node = req.responseXML.documentElement;
 					var server_result = Pers_xml.
@@ -363,59 +363,59 @@ var Perspectives = {
 					var bin_result = Pers_xml.
 							pack_result_as_binary(server_result,ti.service_id);
 					Pers_debug.d_print("querylarge",
-						Pers_xml.resultToString(server_result,false)); 
-					var verifier = 
+						Pers_xml.resultToString(server_result,false));
+					var verifier =
 						Cc["@mozilla.org/security/datasignatureverifier;1"].
 							createInstance(Ci.nsIDataSignatureVerifier);
-					var result = verifier.verifyData(bin_result, 
+					var result = verifier.verifyData(bin_result,
 							server_result.signature, notary_server.public_key);
-					if(!result) { 
-						Pers_debug.d_print("error", "Invalid signature from : " + 
-							notary_server.host); 
-						return; 
+					if(!result) {
+						Pers_debug.d_print("error", "Invalid signature from : " +
+							notary_server.host);
+						return;
 					}
-					server_result.server = notary_server.host; 
-				
-					var result_list = ti.partial_query_results; 
-					if(result_list == null) { 
+					server_result.server = notary_server.host;
+
+					var result_list = ti.partial_query_results;
+					if(result_list == null) {
 						Pers_debug.d_print("query",
-							"Query reply from '" + notary_server.host + 
-							"' for '" + ti.service_id + 
-								"' has no query result data"); 
-						return; 
-					} 
-				 	var i; 
+							"Query reply from '" + notary_server.host +
+							"' for '" + ti.service_id +
+								"' has no query result data");
+						return;
+					}
+				 	var i;
 					for(i = 0; i < result_list.length; i++) {
-						if(result_list[i].server == server_result.server) { 
-							Pers_debug.d_print("query", 
-							  "Ignoring duplicate reply for '" + 
+						if(result_list[i].server == server_result.server) {
+							Pers_debug.d_print("query",
+							  "Ignoring duplicate reply for '" +
 								ti.service_id + "' from '" +
-								server_result.server + "'"); 
-							return; 
-						} 
-					}   
-					Pers_debug.d_print("query","adding result from: " + 
-							notary_server.host); 
-					result_list.push(server_result); 
-  					 
+								server_result.server + "'");
+							return;
+						}
+					}
+					Pers_debug.d_print("query","adding result from: " +
+							notary_server.host);
+					result_list.push(server_result);
+
 					var num_replies = ti.partial_query_results.length;
-					Pers_debug.d_print("query", "num_replies = " + num_replies + 
-								" total = " + Perspectives.all_notaries.length); 
-					if(num_replies == Perspectives.all_notaries.length) { 
-						Pers_debug.d_print("query","got all server replies"); 	
+					Pers_debug.d_print("query", "num_replies = " + num_replies +
+								" total = " + Perspectives.all_notaries.length);
+					if(num_replies == Perspectives.all_notaries.length) {
+						Pers_debug.d_print("query","got all server replies");
 						window.clearTimeout(ti.timeout_id);
 						Perspectives.notaryQueriesComplete(ti);
 					}
-					  
-				} catch (e) { 
+
+				} catch (e) {
 					Pers_debug.d_print("error", "exception in notaryAjaxCallback: " + e);
-				} 
+				}
 			} else { // HTTP ERROR CODE
-				Pers_debug.d_print("error", 
-					"HTTP Error code '" + req.status + "' when querying notary");  
+				Pers_debug.d_print("error",
+					"HTTP Error code '" + req.status + "' when querying notary");
 			}
-		}  
-	},  
+		}
+	},
 
 	// return the quorum as an integer
 	// e.g. useful for comparing against the number of results
@@ -443,40 +443,40 @@ var Perspectives = {
 				Perspectives.strbundle = document.getElementById("notary_strings");
 			}
 
-			var server_result_list = ti.partial_query_results; 
-			delete ti.partial_query_results; 
-			delete ti.timeout_id; 
-			
+			var server_result_list = ti.partial_query_results;
+			delete ti.partial_query_results;
+			delete ti.timeout_id;
+
 			var test_key = ti.cert.md5Fingerprint.toLowerCase();
 			// 2 days (FIXME: make this a pref)
-			var max_stale_sec = 2 * 24 * 3600; 
+			var max_stale_sec = 2 * 24 * 3600;
 			var q_required = Perspectives.getQuorumAsInt();
-			var unixtime = Pers_util.get_unix_time(); 
-			var quorum_duration = Pers_client_policy.get_quorum_duration(test_key, 
-					server_result_list, q_required, max_stale_sec,unixtime);  
+			var unixtime = Pers_util.get_unix_time();
+			var quorum_duration = Pers_client_policy.get_quorum_duration(test_key,
+					server_result_list, q_required, max_stale_sec,unixtime);
 			var is_cur_consistent = quorum_duration != -1;
-		
-	
+
+
 			var weak_check_time_limit = Perspectives.root_prefs.
 						getIntPref("perspectives.weak_consistency_time_limit");
 			var inconsistent_check_max = Perspectives.root_prefs.
 					getIntPref("perspectives.max_timespan_for_inconsistency_test");
 			var is_inconsistent = Pers_client_policy.inconsistency_check(server_result_list,
 							inconsistent_check_max, weak_check_time_limit);
-			var weakly_seen = Pers_client_policy.key_weakly_seen_by_quorum(test_key, 
-						server_result_list, q_required, weak_check_time_limit); 
-				 
+			var weakly_seen = Pers_client_policy.key_weakly_seen_by_quorum(test_key,
+						server_result_list, q_required, weak_check_time_limit);
+
 			var qd_days =  quorum_duration / (3600 * 24);
 			if(qd_days > 5 || qd_days == 0) {
-				qd_days = Math.round(qd_days); 
-			} else { 
-				qd_days = qd_days.toFixed(1); 
-			}  
-			var obs_text = ""; 
+				qd_days = Math.round(qd_days);
+			} else {
+				qd_days = qd_days.toFixed(1);
+			}
+			var obs_text = "";
 			for(var i = 0; i < server_result_list.length; i++) {
-				obs_text += "\nNotary: " + server_result_list[i].server + "\n"; 
-				obs_text += Pers_xml.resultToString(server_result_list[i]); 
-			}  
+				obs_text += "\nNotary: " + server_result_list[i].server + "\n";
+				obs_text += Pers_xml.resultToString(server_result_list[i]);
+			}
 			var qd_str = (is_cur_consistent) ? qd_days + " days" : "none";
 			var str = Perspectives.strbundle.getString("notaryLookupFor") +
 				": " + ti.service_id + "\n";
@@ -487,32 +487,32 @@ var Perspectives = {
 					": " + qd_str + "\n";
 				str += Perspectives.strbundle.getString("notaryObservations") +
 					": \n" + obs_text + "\n";
-			//Pers_debug.d_print("main","\n" + str + "\n");	
+			//Pers_debug.d_print("main","\n" + str + "\n");
 			var svg = Pers_gen.get_svg_graph(ti.service_id, server_result_list, 30,
 				unixtime,test_key, max_stale_sec);
-			ti.query_results = new Perspectives.SslCert(ti.uri.host, 
-										ti.uri.port, test_key, 
-										str, null,svg, qd_days, 
-										is_cur_consistent, 
-										is_inconsistent, 
-										weakly_seen, 
+			ti.query_results = new Perspectives.SslCert(ti.uri.host,
+										ti.uri.port, test_key,
+										str, null,svg, qd_days,
+										is_cur_consistent,
+										is_inconsistent,
+										weakly_seen,
 										server_result_list);
-			Perspectives.process_notary_results(ti); 
+			Perspectives.process_notary_results(ti);
 
-		} catch (e) { 
+		} catch (e) {
 			Pers_util.pers_alert("Error in notaryQueriesComplete: " + e);
-		} 
+		}
 	},
 
-  
-	do_override: function(browser, cert,isTemp) { 
+
+	do_override: function(browser, cert,isTemp) {
 		var uri = browser.currentURI;
 		Pers_debug.d_print("main", "Do Override\n");
 
 		var gSSLStatus = Perspectives.get_invalid_cert_SSLStatus(uri);
-		if(gSSLStatus == null) { 
-			return false; 
-		} 
+		if(gSSLStatus == null) {
+			return false;
+		}
 		var flags = 0;
 		if(gSSLStatus.isUntrusted)
 			flags |= Perspectives.overrideService.ERROR_UNTRUSTED;
@@ -529,7 +529,7 @@ var Perspectives = {
 	},
 
 
-	// Updates the status of the current page 
+	// Updates the status of the current page
 	updateStatus: function(win, is_forced){
 
 		if(Perspectives.strbundle == null) {
@@ -537,163 +537,163 @@ var Perspectives = {
 		}
 
 		Pers_debug.d_print("main", "Update Status");
-		
-		var error_text = Perspectives.detectInvalidURI(win); 
-		if(error_text) { 	
+
+		var error_text = Perspectives.detectInvalidURI(win);
+		if(error_text) {
 			var text = Perspectives.strbundle.
 				getFormattedString("waitingOnURLData", [ error_text ]);
 			Pers_statusbar.setStatus(null, Pers_statusbar.STATE_NEUT, text);
-			return; 
-		} 
+			return;
+		}
 		var ti = Perspectives.getCurrentTabInfo(win);
 		if(ti.uri.scheme != "https"){
 			var text = Perspectives.strbundle.
 				getFormattedString("nonHTTPSError", [ ti.uri.host, ti.uri.scheme ]);
-			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text); 
+			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text);
 			ti.reason_str = text;
 			return;
-		} 
-		
+		}
+
 		Pers_debug.d_print("main", "Update Status: " + ti.uri.spec);
-		
+
 		ti.cert       = Perspectives.getCertificate(ti.browser);
 		if(!ti.cert){
 			var text = Perspectives.strbundle.
 				getFormattedString("noCertError", [ ti.uri.host ])
-			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text); 
+			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text);
 			ti.reason_str = text;
 			return;
 		}
-  
+
 		var md5        = ti.cert.md5Fingerprint.toLowerCase();
 		ti.state      = ti.browser.securityUI.state;
 
 		ti.is_override_cert = Perspectives.overrideService.isCertUsedForOverrides(ti.cert, true, true);
-		Pers_debug.d_print("main", 
+		Pers_debug.d_print("main",
 			"is_override_cert = " + ti.is_override_cert);
 		var check_good = Perspectives.root_prefs.
-			getBoolPref("perspectives.check_good_certificates"); 
+			getBoolPref("perspectives.check_good_certificates");
+
 
-		
 		// see if the browser has this cert installed prior to this browser session
-		// seems like we can't tell the difference between an exception added by the user 
-		// manually and one we installed permanently during a previous browser run.  
-		ti.already_trusted = !(ti.state & Perspectives.state.STATE_IS_INSECURE) && !(ti.is_override_cert); 
-		
+		// seems like we can't tell the difference between an exception added by the user
+		// manually and one we installed permanently during a previous browser run.
+		ti.already_trusted = !(ti.state & Perspectives.state.STATE_IS_INSECURE) && !(ti.is_override_cert);
+
 		if(Perspectives.is_whitelisted_by_user(ti.uri.host)) {
-			if(! (ti.already_trusted || ti.is_override_cert)) { 		
+			if(! (ti.already_trusted || ti.is_override_cert)) {
 				var isTemp = !Perspectives.root_prefs.getBoolPref("perspectives.exceptions.permanent");
-				setTimeout(function() {  
-					if(Perspectives.do_override(ti.browser, ti.cert, isTemp)) { 
+				setTimeout(function() {
+					if(Perspectives.do_override(ti.browser, ti.cert, isTemp)) {
 						Perspectives.setFaviconText("Certificate trusted based on Perspectives whitelist"); //TODO: localize; can we use configuredToWhitelist to save a string?
 						Pers_notify.do_notify(ti, Pers_notify.TYPE_WHITELIST);
 					}
-				}, 1000); 
-			} 
+				}, 1000);
+			}
 			var text = Perspectives.strbundle.
 				getFormattedString("configuredToWhitelistWithHost", [ ti.uri.host ]);
-			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_SEC, text); 
+			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_SEC, text);
 			ti.reason_str = text;
-			return; 
-		} else { 
+			return;
+		} else {
 
-			// Note: we no longer do a DNS look-up to to see if a DNS name maps 
+			// Note: we no longer do a DNS look-up to to see if a DNS name maps
 			// to an RFC 1918 address, as this 'leaked' DNS info for users running
-			// anonymizers like Tor.  It was always just an insecure guess anyway.  
-			var unreachable = Perspectives.is_nonrouted_ip(ti.uri.host); 
-			if(unreachable) { 
+			// anonymizers like Tor.  It was always just an insecure guess anyway.
+			var unreachable = Perspectives.is_nonrouted_ip(ti.uri.host);
+			if(unreachable) {
 				var text = Perspectives.strbundle.
 					getFormattedString("rfc1918Error", [ ti.uri.host ])
-				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text); 
+				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text);
 				ti.reason_str = text;
 				return;
 			}
-		}   
+		}
 
 		if(!check_good && ti.already_trusted && !is_forced) {
 			var text = Perspectives.strbundle.
-				getString("noProbeRequestedError"); 
-			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text); 
+				getString("noProbeRequestedError");
+			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text);
 			ti.reason_str = text;
 			return;
-		} 
+		}
 
-		// clear cache if it is stale 
+		// clear cache if it is stale
 		var unix_time = Pers_util.get_unix_time();
-		var max_cache_age_sec = Perspectives.root_prefs.getIntPref("perspectives.max_cache_age_sec");  
+		var max_cache_age_sec = Perspectives.root_prefs.getIntPref("perspectives.max_cache_age_sec");
 		if(ti.query_results && ti.query_results.created < (unix_time - max_cache_age_sec)) {
-			Pers_debug.d_print("main", "Cached query results are stale.  Re-evaluate security."); 
-			delete ti.query_results; 
-		}  
-		if(ti.query_results && ti.query_results.md5 != md5) { 
-			Pers_debug.d_print("main", "Current and cached key disagree.  Re-evaluate security."); 
-			delete ti.query_results; 
-		}   
-		
-		if(ti.query_results) { 
+			Pers_debug.d_print("main", "Cached query results are stale.  Re-evaluate security.");
+			delete ti.query_results;
+		}
+		if(ti.query_results && ti.query_results.md5 != md5) {
+			Pers_debug.d_print("main", "Current and cached key disagree.  Re-evaluate security.");
+			delete ti.query_results;
+		}
+
+		if(ti.query_results) {
 			Perspectives.process_notary_results(ti);
-		} else {  
+		} else {
 			Pers_debug.d_print("main", ti.uri.host + " needs a request");
 			var needs_perm = Perspectives.root_prefs
-					.getBoolPref("perspectives.require_user_permission"); 
+					.getBoolPref("perspectives.require_user_permission");
 			if(needs_perm && !ti.has_user_permission) {
 				Pers_debug.d_print("main", "needs user permission");
 				Pers_notify.do_notify(ti, Pers_notify.TYPE_NEEDS_PERMISSION);
-				var text = Perspectives.strbundle.getString("needsPermission"); 
-				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text); 
+				var text = Perspectives.strbundle.getString("needsPermission");
+				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text);
 				ti.reason_str = text;
-				return; 
-			} 
-   
+				return;
+			}
+
 
 			// make sure we're using the most recent notary list
-			Perspectives.all_notaries = this.getNotaryList(); 
-			if(Perspectives.all_notaries.length == 0) { 
+			Perspectives.all_notaries = this.getNotaryList();
+			if(Perspectives.all_notaries.length == 0) {
 				var text = Perspectives.strbundle.
 					getString("listOfNotariesIsEmpty");
 				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, text);
-				return; 
-			} 
- 
+				return;
+			}
+
 			Pers_debug.d_print("main", "Contacting notaries");
-			// this call is asynchronous.  after hearing from the 
-			// notaries, the logic picks up again with the function 
+			// this call is asynchronous.  after hearing from the
+			// notaries, the logic picks up again with the function
 			// 'process_notary_results()' below
 			this.queryNotaries(ti);
 		}
 	},
 
-	process_notary_results: function(ti) {  
+	process_notary_results: function(ti) {
 		try {
 			if(!ti.already_trusted && !ti.query_results.identityText &&
 				Perspectives.getFaviconText().indexOf("Perspectives") < 0){
-				ti.query_results.identityText = 
+				ti.query_results.identityText =
 					Perspectives.setFaviconText(Perspectives.getFaviconText() +
 					"\n\n" + "Perspectives has validated this site"); //TODO: localize
 			}
-			var required_duration   = 
+			var required_duration   =
 				Perspectives.root_prefs.
 					getIntPref("perspectives.required_duration");
 
-			var strong_trust = ti.query_results.cur_consistent && 
-						(ti.query_results.duration >= required_duration); 
+			var strong_trust = ti.query_results.cur_consistent &&
+						(ti.query_results.duration >= required_duration);
 			var pref_https_weak = Perspectives.root_prefs.
 					getBoolPref("perspectives.trust_https_with_weak_consistency");
-			var weak_trust = ti.query_results.inconsistent_results && ti.query_results.weakly_seen; 
-	
+			var weak_trust = ti.query_results.inconsistent_results && ti.query_results.weakly_seen;
+
 			if(strong_trust) {
 				// FIXME: need to clear any contrary banners
-				var mixed_security =  ti.state & Perspectives.state.STATE_IS_BROKEN; 
+				var mixed_security =  ti.state & Perspectives.state.STATE_IS_BROKEN;
 				if(!ti.is_override_cert && (ti.state & Perspectives.state.STATE_IS_INSECURE)){
 					ti.exceptions_enabled = Perspectives.root_prefs.
 						getBoolPref("perspectives.exceptions.enabled")
-					if(ti.exceptions_enabled) { 
-						ti.override_used = true; 
+					if(ti.exceptions_enabled) {
+						ti.override_used = true;
 						var isTemp = !Perspectives.root_prefs.
 							getBoolPref("perspectives.exceptions.permanent");
 						Perspectives.do_override(ti.browser, ti.cert, isTemp);
 						ti.query_results.identityText = Perspectives.strbundle.
-							getString("exceptionAdded");  
+							getString("exceptionAdded");
 						// don't give drop-down if user gave explicit
 						// permission to query notaries
 						if(ti.firstLook && !ti.has_user_permission){
@@ -702,13 +702,13 @@ var Perspectives = {
 					}
 				}
 
-				// Check if this site includes insecure embedded content.  If so, do not 
-				// show a green check mark, as we don't want people to incorrectly assume 
-				// that we imply that the site is secure.  Note: we still will query the 
-				// notary and will override an error page.  This is inline with the fact 
+				// Check if this site includes insecure embedded content.  If so, do not
+				// show a green check mark, as we don't want people to incorrectly assume
+				// that we imply that the site is secure.  Note: we still will query the
+				// notary and will override an error page.  This is inline with the fact
 				// that Firefox still shows an HTTPS page with insecure content, it
-				// just does not show positive security indicators.  
-				if(mixed_security) { 
+				// just does not show positive security indicators.
+				if(mixed_security) {
 					// FIXME: need to clear any contrary banners
 					// TODO: once we have separated calculation of results
 					// from applying the resuts and can add better tests for these,
@@ -719,128 +719,128 @@ var Perspectives = {
 					Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT, ti.query_results.tooltip); //TODO: localize
 					// this will flicker, as we can't rely on just doing it on 'firstLook'
 					// due to Firefox oddness
-					if(ti.override_used) { 	
+					if(ti.override_used) {
 						Pers_notify.do_notify(ti, Pers_notify.TYPE_OVERRIDE_MIXED);
 					}
-				}  else { 
+				}  else {
 
 					ti.query_results.tooltip = Perspectives.strbundle.
-						getFormattedString("verifiedMessage", 
+						getFormattedString("verifiedMessage",
 						[ ti.query_results.duration, required_duration]);
-					Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_SEC, 
+					Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_SEC,
 						ti.query_results.tooltip);
 				}
-			} else if(ti.already_trusted && weak_trust && pref_https_weak) { 
+			} else if(ti.already_trusted && weak_trust && pref_https_weak) {
 				// FIXME: need to clear any contrary banners
-				if(ti.state & Perspectives.state.STATE_IS_BROKEN) { 
+				if(ti.state & Perspectives.state.STATE_IS_BROKEN) {
 					ti.query_results.tooltip =
 						"HTTPS Certificate is weakly trusted, but site contains insecure embedded content." //TODO: localize
 					Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NEUT,
 						ti.query_results.tooltip);
-				}  else { 
+				}  else {
 					ti.query_results.tooltip =
 						"This site uses multiple certificates, including the certificate received and trusted by your browser." //TODO: localize
-					Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_SEC, 
+					Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_SEC,
 						ti.query_results.tooltip);
 
-				} 
-			} else if (ti.query_results.summary.indexOf("ssl key") == -1) { 
+				}
+			} else if (ti.query_results.summary.indexOf("ssl key") == -1) {
 				// FIXME: need to clear any contrary banners
-				ti.query_results.tooltip = 
+				ti.query_results.tooltip =
 					Perspectives.strbundle.getString("noRepliesWarning");
-				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NSEC, 
+				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NSEC,
 					ti.query_results.tooltip);
-				if(!ti.already_trusted) { 
+				if(!ti.already_trusted) {
 					Pers_notify.do_notify(ti, Pers_notify.TYPE_NO_REPLIES);
-				} 
-			} else if(ti.query_results.inconsistent_results && !ti.query_results.weakly_seen) { 
+				}
+			} else if(ti.query_results.inconsistent_results && !ti.query_results.weakly_seen) {
 				// FIXME: need to clear any contrary banners
 				ti.query_results.tooltip = "This site regularly uses multiples certificates, and most Notaries have not recently seen the certificate received by the browser";
 				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NSEC, //TODO: localize
 					ti.query_results.tooltip);
-			} else if(ti.query_results.inconsistent_results) { 
+			} else if(ti.query_results.inconsistent_results) {
 				// FIXME: need to clear any contrary banners
-				ti.query_results.tooltip = "Perspectives is unable to validate this site, because the site regularly uses multiples certificates"; 
+				ti.query_results.tooltip = "Perspectives is unable to validate this site, because the site regularly uses multiples certificates";
 				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NSEC, //TODO: localize
 					ti.query_results.tooltip);
 			} else if(!ti.query_results.cur_consistent){
 				// FIXME: need to clear any contrary banners
-				ti.query_results.tooltip = 
+				ti.query_results.tooltip =
 					Perspectives.strbundle.getString("inconsistentWarning");
-				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NSEC, 
+				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NSEC,
 					ti.query_results.tooltip);
-				// we may reconsider this in the future, but currently we don't do a 
-				// drop-down if things aren't consistent but the browser already trusts the cert. 
+				// we may reconsider this in the future, but currently we don't do a
+				// drop-down if things aren't consistent but the browser already trusts the cert.
 				if(!ti.already_trusted && ti.firstLook){
 					Pers_notify.do_notify(ti, Pers_notify.TYPE_FAILED);
 				}
 			} else if(ti.query_results.duration < required_duration){
 				// FIXME: need to clear any contrary banners
 				ti.query_results.tooltip = Perspectives.strbundle.
-					getFormattedString("thresholdWarning", 
+					getFormattedString("thresholdWarning",
 					[ ti.query_results.duration, required_duration]);
-				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NSEC, 
+				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_NSEC,
 					ti.query_results.tooltip);
 				if(!ti.already_trusted && ti.firstLook){
 					Pers_notify.do_notify(ti, Pers_notify.TYPE_FAILED);
 				}
-			} else { 
+			} else {
 				// FIXME: need to clear any contrary banners
 				ti.query_results.tooltip = "An unknown Error occurred processing Notary results"; //TODO: localize
-				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_ERROR, 
+				Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_ERROR,
 					ti.query_results.tooltip);
-			} 
-		
+			}
+
 
 			if(ti.query_results.identityText){
 				Perspectives.setFaviconText(ti.query_results.identityText);
 			}
 
- 
+
 		} catch (err) {
 			Pers_util.pers_alert("process_notary_results error: " + err);
 		}
 	},
 
 	is_whitelisted_by_user : function(host) {
-		try { 
-			/* be cautious in case we got a bad user edit to the whitelist */  
+		try {
+			/* be cautious in case we got a bad user edit to the whitelist */
 			var whitelist = Perspectives.root_prefs.
 				    getCharPref("perspectives.whitelist").split(",");
 			for(var entry in whitelist) {
-				var e = whitelist[entry]; 
-				if(e.length == 0) { 
-					continue; 
-				} 
+				var e = whitelist[entry];
+				if(e.length == 0) {
+					continue;
+				}
 				var r = RegExp(e);
 				if (host.match(r)) {
-					return true; 
-				} 
-			} 
-		} catch(e) { /* ignore */ } 
-		return false; 
+					return true;
+				}
+			}
+		} catch(e) { /* ignore */ }
+		return false;
 	},
 
-	 
 
-	// See Documentation for nsIWebProgressListener at: 
+
+	// See Documentation for nsIWebProgressListener at:
 	// https://developer.mozilla.org/en/nsIWebProgressListener
 
 	// The current approach is to clear the previous status
-	// icon during onLocationChange.  For each call to 
-	// onSecurityChange, we call updateStatus. 
+	// icon during onLocationChange.  For each call to
+	// onSecurityChange, we call updateStatus.
 	// Then, when onStateChange is called with STATE_STOP
-	// we call updateStatus one last time just for good 
-	// measure, as this should be the last thing that happens. 
+	// we call updateStatus one last time just for good
+	// measure, as this should be the last thing that happens.
 	//
 	// NOTE: this code needs some TLC
 
 	//note can use request to suspend the loading
-	notaryListener : { 
+	notaryListener : {
 
    		// Note: We intentially do NOT call updateStatus from here, as this
    		// was causing a bug that caused us to get the previous website's cert
-   		// instead of the correct cert.  
+   		// instead of the correct cert.
    		onLocationChange: function(aWebProgress, aRequest, aURI) {
 			if(Perspectives.strbundle == null) {
 				Perspectives.strbundle = document.getElementById("notary_strings");
@@ -863,16 +863,16 @@ var Perspectives = {
         			Pers_statusbar.setStatus(aURI, state, tooltip);
       			} catch(err){
         			Pers_debug.d_print("error", "Perspectives had an internal exception: " + err);
-        			Pers_statusbar.setStatus(aURI, Pers_statusbar.STATE_ERROR, 
+        			Pers_statusbar.setStatus(aURI, Pers_statusbar.STATE_ERROR,
 					"Perspectives: an error occurred when attempting to change location: " + err); //TODO: localize
       			}
 
    		},
 
    		// we only call updateStatus on STATE_STOP, as a catch all in case
-   		// onSecurityChange was never called. 
+   		// onSecurityChange was never called.
    		onStateChange: function(aWebProgress, aRequest, aFlag, aStatus) {
-     			
+
 			if(aFlag & Components.interfaces.nsIWebProgressListener.STATE_STOP){
        			  try {
      				var uri = window.gBrowser.currentURI;
@@ -880,14 +880,14 @@ var Perspectives = {
          			Perspectives.updateStatus(window,false);
        			  } catch (err) {
          			Pers_debug.d_print("error", "Perspectives had an internal exception: " + err);
-         			Pers_statusbar.setStatus(Pers_statusbar.STATE_ERROR, 
+         			Pers_statusbar.setStatus(Pers_statusbar.STATE_ERROR,
 					"Perspectives: an internal state change error occurred: " + err); //TODO: localize
        			  }
      			}
   		},
 
   		// this is the main function we key off of.  It seems to work well, even though
-  		// the docs do not explicitly say when it will be called. 
+  		// the docs do not explicitly say when it will be called.
   		onSecurityChange:    function() {
        			var uri = null;
        			try{
@@ -897,11 +897,11 @@ var Perspectives = {
        			} catch(err){
          			Pers_debug.d_print("error", "Perspectives had an internal exception: " + err);
          			if(uri) {
-          				Pers_statusbar.setStatus(uri, Pers_statusbar.STATE_ERROR, 
+          				Pers_statusbar.setStatus(uri, Pers_statusbar.STATE_ERROR,
 						"Perspectives: an internal security change error occurred: " + err); //TODO: localize
          			}
        			}
- 
+
   		},
 
 		onStatusChange:      function() { },
@@ -913,13 +913,13 @@ var Perspectives = {
 
 	requeryAllTabs: function(b){
 		/*
-		alert("requeryAllTabs is disabled"); 
+		alert("requeryAllTabs is disabled");
 		var num = b.browsers.length;
 		for (var i = 0; i < num; i++) {
 			var browser = b.getBrowserAtIndex(i);
 			Perspectives.updateStatus(window,false);
 		}
-		*/ 
+		*/
 	},
 
 	initNotaries: function(){
@@ -927,20 +927,20 @@ var Perspectives = {
 			Pers_debug.d_print("main", "\nPerspectives Initialization\n");
 
 			var auto_update = this.root_prefs.getBoolPref("perspectives.enable_default_list_auto_update");
-			if(auto_update) { 
+			if(auto_update) {
 				Pers_util.update_default_notary_list_from_web(this.root_prefs);
-			} else {  
-				Pers_util.update_default_notary_list_from_file(this.root_prefs); 
-			} 
+			} else {
+				Pers_util.update_default_notary_list_from_file(this.root_prefs);
+			}
 			Pers_debug.d_print("main", Perspectives.notaries);
 			Pers_statusbar.setStatus(null, Pers_statusbar.STATE_NEUT, "");
-			getBrowser().addProgressListener(Perspectives.notaryListener, 
+			getBrowser().addProgressListener(Perspectives.notaryListener,
 			Components.interfaces.nsIWebProgress.NOTIFY_STATE_DOCUMENT);
 			setTimeout(function (){ Perspectives.requeryAllTabs(gBrowser); }, 4000);
 			Pers_debug.d_print("main", "Perspectives Finished Initialization\n\n");
-		} catch(e) { 
+		} catch(e) {
 			Pers_util.pers_alert("Error in initNotaries: " + e);
-		} 
+		}
 	},
 
 	detectInvalidURI : function(win) {
@@ -952,67 +952,67 @@ var Perspectives = {
 			Pers_debug.d_print("error","No Browser!!\n");
 			return Perspectives.strbundle.getString("noBrowserObject");
 		}
-		
-		var uri = win.gBrowser.currentURI; 
-		if(!uri) { 
-			return Perspectives.strbundle.getString("noDataError"); 
+
+		var uri = win.gBrowser.currentURI;
+		if(!uri) {
+			return Perspectives.strbundle.getString("noDataError");
 		}
-		
+
 		// sometimes things blow up because accessing uri.host throws an exception
-		try { 
+		try {
 			var ignore = uri.host;
-			if(!uri.host) throw "";  
+			if(!uri.host) throw "";
 		} catch(e) {
 			return Perspectives.strbundle.getString("notValidRemoteServer");
 		}
-		return null; 
-	}, 
+		return null;
+	},
 
-	getCurrentTabInfo : function(win) { 
-		var uri = win.gBrowser.currentURI; 
-		var port = (uri.port == -1) ? 443 : uri.port;  
-		var service_id = uri.host + ":" + port + ",2"; 
+	getCurrentTabInfo : function(win) {
+		var uri = win.gBrowser.currentURI;
+		var port = (uri.port == -1) ? 443 : uri.port;
+		var service_id = uri.host + ":" + port + ",2";
 
-		var ti = Perspectives.tab_info_cache[service_id]; 
+		var ti = Perspectives.tab_info_cache[service_id];
 		if(!ti) {
 			ti = {};
-			// defaults 
-			ti.firstLook = true; 
+			// defaults
+			ti.firstLook = true;
 			ti.override_used = false;
-			ti.has_user_permission = false; 
-			ti.last_banner_type = null; 
-			Perspectives.tab_info_cache[service_id] = ti; 
+			ti.has_user_permission = false;
+			ti.last_banner_type = null;
+			Perspectives.tab_info_cache[service_id] = ti;
 		}
 		ti.uri = uri;
-		ti.host = uri.host; 
-		ti.service_id = service_id; 
-		ti.browser = win.gBrowser; 
+		ti.host = uri.host;
+		ti.service_id = service_id;
+		ti.browser = win.gBrowser;
 		ti.reason_str = "";
-		return ti; 
-	},  
+		return ti;
+	},
 
 	forceStatusUpdate : function(win) {
 		if(Perspectives.strbundle == null) {
 			Perspectives.strbundle = document.getElementById("notary_strings");
 		}
-		var error_text = Perspectives.detectInvalidURI(win);  
-		if(error_text) { 
+		var error_text = Perspectives.detectInvalidURI(win);
+		if(error_text) {
 			Pers_util.pers_alert(Perspectives.strbundle.getString("invalidURI")
 				+ " (" + error_text + ")");
-			return; 
-		} 
+			return;
+		}
 		var ti = Perspectives.getCurrentTabInfo(win);
-		if(ti) { 		
-			Pers_debug.d_print("main", "Forced request, clearing cache for '" + ti.uri.host + "'"); 
-			delete ti.query_results; 
-			ti.has_user_permission = true; // forcing a check is implicit permission  
+		if(ti) {
+			Pers_debug.d_print("main", "Forced request, clearing cache for '" + ti.uri.host + "'");
+			delete ti.query_results;
+			ti.has_user_permission = true; // forcing a check is implicit permission
 			Pers_statusbar.setStatus(ti.uri, Pers_statusbar.STATE_QUERY,
 				Perspectives.strbundle.getFormattedString("contactingNotariesAbout", [ ti.uri.host ]));
-			Perspectives.updateStatus(win, true); 
-		} else { 
-			Pers_debug.d_print("main", "Requested force check with valid URI, but no tab_info is found"); 
-		} 
-	}, 
+			Perspectives.updateStatus(win, true);
+		} else {
+			Pers_debug.d_print("main", "Requested force check with valid URI, but no tab_info is found");
+		}
+	},
 
 	// In Perspectives v4.0 the default settings were changed to check with notaries for *all* https websites,
 	// rather than only querying for sites that showed a certificate error.
@@ -1074,6 +1074,5 @@ var Perspectives = {
 									false);
 		}
 	}
-			
-}
 
+}

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-mozext/perspectives-extension.git



More information about the Pkg-mozext-commits mailing list