security/certverifier/ExtendedValidation.h

Tue, 06 Jan 2015 21:39:09 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 06 Jan 2015 21:39:09 +0100
branch
TOR_BUG_9701
changeset 8
97036ab72558
permissions
-rw-r--r--

Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.

michael@0 1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
michael@0 2 * This Source Code Form is subject to the terms of the Mozilla Public
michael@0 3 * License, v. 2.0. If a copy of the MPL was not distributed with this
michael@0 4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
michael@0 5
michael@0 6 #ifndef mozilla_psm_ExtendedValidation_h
michael@0 7 #define mozilla_psm_ExtendedValidation_h
michael@0 8
michael@0 9 #include "certt.h"
michael@0 10 #include "prtypes.h"
michael@0 11
michael@0 12 namespace mozilla { namespace psm {
michael@0 13
michael@0 14 #ifndef MOZ_NO_EV_CERTS
michael@0 15 void EnsureIdentityInfoLoaded();
michael@0 16 void CleanupIdentityInfo();
michael@0 17 SECStatus GetFirstEVPolicy(CERTCertificate* cert, SECOidTag& outOidTag);
michael@0 18
michael@0 19 // CertIsAuthoritativeForEVPolicy does NOT evaluate whether the cert is trusted
michael@0 20 // or distrusted.
michael@0 21 bool CertIsAuthoritativeForEVPolicy(const CERTCertificate* cert,
michael@0 22 SECOidTag policyOidTag);
michael@0 23 #endif
michael@0 24
michael@0 25 #ifndef NSS_NO_LIBPKIX
michael@0 26 CERTCertList* GetRootsForOid(SECOidTag oid_tag);
michael@0 27 #endif
michael@0 28
michael@0 29 } } // namespace mozilla::psm
michael@0 30
michael@0 31 #endif // mozilla_psm_ExtendedValidation_h

mercurial