forked from pool/ca-certificates-mozilla
Marcus Meissner
7a4b756f81
- updated to 2.11 state of the Mozilla NSS Certificate store. - removed CAs: - Buypass_Class_2_CA_1:2.1.1.crt serverAuth - EBG_Elektronik_Sertifika_Hizmet_Sağlayıcısı:2.8.76.175.115.66.28.142.116.2.crt codeSigning emailProtection serverAuth - Equifax_Secure_CA:2.4.53.222.244.207.crt emailProtection - Equifax_Secure_eBusiness_CA_1:2.1.4.crt emailProtection - Equifax_Secure_Global_eBusiness_CA:2.1.1.crt emailProtection - IGC_A:2.5.57.17.69.16.148.crt codeSigning emailProtection serverAuth - Juur-SK:2.4.59.142.75.252.crt codeSigning serverAuth - Root_CA_Generalitat_Valenciana:2.4.59.69.229.104.crt codeSigning emailProtection serverAuth - RSA_Security_2048_v3:2.16.10.1.1.1.0.0.2.124.0.0.0.10.0.0.0.2.crt codeSigning emailProtection serverAuth - Sonera_Class_1_Root_CA:2.1.36.crt emailProtection - S-TRUST_Authentication_and_Encryption_Root_CA_2005_PN:2.16.55.25.24.230.83.84.124.26.181.184.203.89.90.219.53.183.crt emailProtection - Verisign_Class_1_Public_Primary_Certification_Authority:2.16.63.105.30.129.156.240.154.74.243.115.255.185.72.162.228.221.crt emailProtection - Verisign_Class_2_Public_Primary_Certification_Authority_-_G2:2.17.0.185.47.96.204.136.159.161.122.70.9.184.91.112.108.138.175.crt emailProtection - Verisign_Class_3_Public_Primary_Certification_Authority:2.16.112.186.228.29.16.217.41.52.182.56.202.123.3.204.186.191.crt emailProtection OBS-URL: https://build.opensuse.org/request/show/452186 OBS-URL: https://build.opensuse.org/package/show/Base:System/ca-certificates-mozilla?expand=0&rev=79
61 lines
2.1 KiB
C
61 lines
2.1 KiB
C
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef NSSCKBI_H
|
|
#define NSSCKBI_H
|
|
|
|
/*
|
|
* NSS BUILTINS Version numbers.
|
|
*
|
|
* These are the version numbers for the builtins module packaged with
|
|
* this release on NSS. To determine the version numbers of the builtin
|
|
* module you are using, use the appropriate PKCS #11 calls.
|
|
*
|
|
* These version numbers detail changes to the PKCS #11 interface. They map
|
|
* to the PKCS #11 spec versions.
|
|
*/
|
|
#define NSS_BUILTINS_CRYPTOKI_VERSION_MAJOR 2
|
|
#define NSS_BUILTINS_CRYPTOKI_VERSION_MINOR 20
|
|
|
|
/* These version numbers detail the changes
|
|
* to the list of trusted certificates.
|
|
*
|
|
* The NSS_BUILTINS_LIBRARY_VERSION_MINOR macro needs to be bumped
|
|
* for each NSS minor release AND whenever we change the list of
|
|
* trusted certificates. 10 minor versions are allocated for each
|
|
* NSS 3.x branch as follows, allowing us to change the list of
|
|
* trusted certificates up to 9 times on each branch.
|
|
* - NSS 3.5 branch: 3-9
|
|
* - NSS 3.6 branch: 10-19
|
|
* - NSS 3.7 branch: 20-29
|
|
* - NSS 3.8 branch: 30-39
|
|
* - NSS 3.9 branch: 40-49
|
|
* - NSS 3.10 branch: 50-59
|
|
* - NSS 3.11 branch: 60-69
|
|
* ...
|
|
* - NSS 3.12 branch: 70-89
|
|
* - NSS 3.13 branch: 90-99
|
|
* - NSS 3.14 branch: 100-109
|
|
* ...
|
|
* - NSS 3.29 branch: 250-255
|
|
*
|
|
* NSS_BUILTINS_LIBRARY_VERSION_MINOR is a CK_BYTE. It's not clear
|
|
* whether we may use its full range (0-255) or only 0-99 because
|
|
* of the comment in the CK_VERSION type definition.
|
|
*/
|
|
#define NSS_BUILTINS_LIBRARY_VERSION_MAJOR 2
|
|
#define NSS_BUILTINS_LIBRARY_VERSION_MINOR 11
|
|
#define NSS_BUILTINS_LIBRARY_VERSION "2.11"
|
|
|
|
/* These version numbers detail the semantic changes to the ckfw engine. */
|
|
#define NSS_BUILTINS_HARDWARE_VERSION_MAJOR 1
|
|
#define NSS_BUILTINS_HARDWARE_VERSION_MINOR 0
|
|
|
|
/* These version numbers detail the semantic changes to ckbi itself
|
|
* (new PKCS #11 objects), etc. */
|
|
#define NSS_BUILTINS_FIRMWARE_VERSION_MAJOR 1
|
|
#define NSS_BUILTINS_FIRMWARE_VERSION_MINOR 0
|
|
|
|
#endif /* NSSCKBI_H */
|