~ubuntu-branches/ubuntu/raring/nss/raring-security

« back to all changes in this revision

Viewing changes to mozilla/security/nss/lib/certdb/certt.h

  • Committer: Bazaar Package Importer
  • Author(s): Chris Coulson
  • Date: 2010-03-25 13:46:06 UTC
  • mfrom: (1.1.11 upstream)
  • Revision ID: james.westby@ubuntu.com-20100325134606-bl6liuok2w9l7snv
Tags: 3.12.6-0ubuntu1
* New upstream release 3.12.6 RTM (NSS_3_12_6_RTM)
  - fixes CVE-2009-3555 aka US-CERT VU#120541
* Adjust patches to changed upstream code base
  - update debian/patches/38_kbsd.patch
  - update debian/patches/38_mips64_build.patch
  - update debian/patches/85_security_load.patch
* Remove patches that are merged upstream
  - delete debian/patches/91_nonexec_stack.patch
  - update debian/patches/series
* Bump nspr dependency to 4.8
  - update debian/control
* Add new symbols for 3.12.6
  - update debian/libnss3-1d.symbols

Show diffs side-by-side

added added

removed removed

Lines of Context:
36
36
/*
37
37
 * certt.h - public data structures for the certificate library
38
38
 *
39
 
 * $Id: certt.h,v 1.49 2009/03/21 01:40:34 nelson%bolyard.com Exp $
 
39
 * $Id: certt.h,v 1.52 2009/05/29 18:10:38 alexei.volkov.bugs%sun.com Exp $
40
40
 */
41
41
#ifndef _CERTT_H_
42
42
#define _CERTT_H_
940
940
   cert_pi_certStores      = 10,/* Bitmask of Cert Store flags (see below)
941
941
                                 * Set in value.scalar.ui */
942
942
   cert_pi_trustAnchors    = 11,/* Specify the list of trusted roots to 
943
 
                                 * validate against. If the list in NULL all
944
 
                                 * default trusted roots are used.
 
943
                                 * validate against. 
 
944
                                 * The default set of trusted roots, these are
 
945
                                 * root CA certs from libnssckbi.so or CA
 
946
                                 * certs trusted by user, are used in any of
 
947
                                 * the following cases:
 
948
                                 *      * when the parameter is not set.
 
949
                                 *      * when the list of trust anchors is empty.
945
950
                                 * Specified in value.pointer.chain */
946
951
   cert_pi_useAIACertFetch = 12, /* Enables cert fetching using AIA extension.
947
 
                                 * Default is off.
948
 
                                     * Value is in value.scalar.b */
 
952
                                 * In NSS 3.12.1 or later. Default is off.
 
953
                                 * Value is in value.scalar.b */
949
954
   cert_pi_max                  /* SPECIAL: signifies maximum allowed value,
950
955
                                 *  can increase in future releases */
951
956
} CERTValParamInType;
1111
1116
 *     After the individual tests have been executed, we must have
1112
1117
 *     been able to find fresh information using at least one method.
1113
1118
 *     If we were unable to find fresh info, it's a failure.
 
1119
 *     This setting overrides the CERT_REV_M_FAIL_ON_MISSING_FRESH_INFO
 
1120
 *     flag on all methods.
1114
1121
 */
1115
1122
#define CERT_REV_MI_NO_OVERALL_INFO_REQUIREMENT       0L
1116
1123
#define CERT_REV_MI_REQUIRE_SOME_FRESH_INFO_AVAILABLE 2L