~ubuntu-branches/ubuntu/karmic/nss/karmic-updates

« back to all changes in this revision

Viewing changes to mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_ocsprequest.c

  • Committer: Bazaar Package Importer
  • Author(s): Alexander Sack
  • Date: 2009-06-16 13:23:47 UTC
  • mfrom: (1.1.9 upstream)
  • Revision ID: james.westby@ubuntu.com-20090616132347-311ysb8oep74b98y
Tags: 3.12.3-0ubuntu1
* new upstream release 3.12.3 RTM (NSS_3_12_3_RTM) (LP: #387751)
* adjust patches to changed upstream code base
  - update debian/patches/38_kbsd.patch
* needs nspr >= 4.7.4
  - update debian/control
* update 85_security_load.patch to latest debian version
  - update debian/patches/85_security_load.patch
* add new symbols for 3.12.3
  - update debian/libnss3-1d.symbols

Show diffs side-by-side

added added

removed removed

Lines of Context:
288
288
        PKIX_PL_OcspCertID *cid,
289
289
        PKIX_PL_Date *validity,
290
290
        PKIX_PL_Cert *signerCert,
 
291
        PKIX_UInt32 methodFlags,
291
292
        PKIX_Boolean *pURIFound,
292
293
        PKIX_PL_OcspRequest **pRequest,
293
294
        void *plContext)
304
305
        CERTCertificate *nssSignerCert = NULL;
305
306
        char *location = NULL;
306
307
        PRErrorCode locError = 0;
 
308
        PKIX_Boolean canUseDefaultSource = PKIX_FALSE;
307
309
 
308
310
        PKIX_ENTER(OCSPREQUEST, "pkix_pl_OcspRequest_Create");
309
311
        PKIX_NULLCHECK_TWO(cert, pRequest);
337
339
         * the URI of an OCSP responder?
338
340
         */
339
341
        handle = CERT_GetDefaultCertDB();
 
342
 
 
343
        if (!(methodFlags & PKIX_REV_M_IGNORE_IMPLICIT_DEFAULT_SOURCE)) {
 
344
            canUseDefaultSource = PKIX_TRUE;
 
345
        }
340
346
        location = ocsp_GetResponderLocation(handle, nssCert,
 
347
                                             canUseDefaultSource,
341
348
                                             &addServiceLocatorExtension);
342
349
        if (location == NULL) {
343
350
                locError = PORT_GetError();