security/certverifier/moz.build

Tue, 06 Jan 2015 21:39:09 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 06 Jan 2015 21:39:09 +0100
branch
TOR_BUG_9701
changeset 8
97036ab72558
permissions
-rw-r--r--

Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.

     1 # -*- Mode: python; c-basic-offset: 4; indent-tabs-mode: nil; tab-width: 40 -*-
     2 # vim: set filetype=python:
     3 # This Source Code Form is subject to the terms of the Mozilla Public
     4 # License, v. 2.0. If a copy of the MPL was not distributed with this
     5 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
     7 UNIFIED_SOURCES += [
     8     'CertVerifier.cpp',
     9     'NSSCertDBTrustDomain.cpp',
    10     'OCSPCache.cpp',
    11     'OCSPRequestor.cpp',
    12 ]
    14 if not CONFIG['NSS_NO_EV_CERTS']:
    15     UNIFIED_SOURCES += [
    16         'ExtendedValidation.cpp',
    17     ]
    19 LOCAL_INCLUDES += [
    20     '../manager/boot/src',
    21     '../manager/ssl/src',
    22     '../pkix/include',
    23 ]
    25 DIRS += [
    26     '../pkix',
    27 ]
    29 FAIL_ON_WARNINGS = True
    31 LIBRARY_NAME = 'certverifier'
    33 FINAL_LIBRARY = 'xul'

mercurial