[arch-commits] Commit in lib32-nss/trunk (PKGBUILD nss-3.47-certdb-temp-cert.patch)
Jan Steffens
heftig at archlinux.org
Tue Jan 7 20:10:44 UTC 2020
Date: Tuesday, January 7, 2020 @ 20:10:44
Author: heftig
Revision: 550077
3.49-1
Modified:
lib32-nss/trunk/PKGBUILD
Deleted:
lib32-nss/trunk/nss-3.47-certdb-temp-cert.patch
---------------------------------+
PKGBUILD | 9 +----
nss-3.47-certdb-temp-cert.patch | 68 --------------------------------------
2 files changed, 2 insertions(+), 75 deletions(-)
Modified: PKGBUILD
===================================================================
--- PKGBUILD 2020-01-07 19:48:40 UTC (rev 550076)
+++ PKGBUILD 2020-01-07 20:10:44 UTC (rev 550077)
@@ -3,7 +3,7 @@
# Contributor: Ionut Biru <ibiru at archlinux dot org>
pkgname=lib32-nss
-pkgver=3.48
+pkgver=3.49
pkgrel=1
pkgdesc="Network Security Services (32-bit)"
url="https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS"
@@ -13,10 +13,8 @@
depends=("lib32-nspr>=${_nsprver}" lib32-sqlite lib32-zlib lib32-p11-kit nss)
makedepends=(perl python2 gyp)
source=("https://ftp.mozilla.org/pub/security/nss/releases/NSS_${pkgver//./_}_RTM/src/nss-${pkgver}.tar.gz"
- nss-3.47-certdb-temp-cert.patch
no-plt.diff)
-sha256sums=('3f9c822a86a4e3e1bfe63e2ed0f922d8b7c2e0b7cafe36774b1c627970d0f8ac'
- 'bd16ba87e5ea736888f76dd54dff18b25ca6608245c0195fb85bad3d782db73c'
+sha256sums=('6738094dc4fd63061118a122bf3999a64fe8c7117fc52f6e81c2279181bde71d'
'ea8e1b871c0f1dd29cdea1b1a2e7f47bf4713e2ae7b947ec832dba7dfcc67daa')
prepare() {
@@ -28,9 +26,6 @@
# https://bugzilla.mozilla.org/show_bug.cgi?id=1382942
patch -Np2 -i ../no-plt.diff
-
- # https://bugzilla.mozilla.org/show_bug.cgi?id=1593167
- patch -d nss -Np1 < ../nss-3.47-certdb-temp-cert.patch
}
build() {
Deleted: nss-3.47-certdb-temp-cert.patch
===================================================================
--- nss-3.47-certdb-temp-cert.patch 2020-01-07 19:48:40 UTC (rev 550076)
+++ nss-3.47-certdb-temp-cert.patch 2020-01-07 20:10:44 UTC (rev 550077)
@@ -1,68 +0,0 @@
-From 9530978d1552674792e281391100269305a38c47 Mon Sep 17 00:00:00 2001
-From: Daiki Ueno <dueno at redhat.com>
-Date: Fri, 6 Dec 2019 10:47:01 +0100
-Subject: [PATCH] Bug 1593167, certdb: propagate trust information if trust
- module is loaded afterwards, r=rrelyea,keeler
-
-Summary:
-When the builtin trust module is loaded after some temp certs being created, these temp certs are usually not accompanied by trust information. This causes a problem in Firefox as it loads the module from a separate thread while accessing the network cache which populates temp certs.
-
-This change makes it properly roll up the trust information, if a temp cert doesn't have trust information.
-
-Reviewers: rrelyea, keeler
-
-Reviewed By: rrelyea, keeler
-
-Subscribers: reviewbot, heftig
-
-Bug #: 1593167
-
-Differential Revision: https://phabricator.services.mozilla.com/D54726
----
- lib/pki/pki3hack.c | 30 ++++++++++++++++++++++--------
- 1 file changed, 22 insertions(+), 8 deletions(-)
-
-diff --git a/lib/pki/pki3hack.c b/lib/pki/pki3hack.c
-index 29d2fb5a40..eac4a5705e 100644
---- a/lib/pki/pki3hack.c
-+++ b/lib/pki/pki3hack.c
-@@ -921,14 +921,28 @@ stan_GetCERTCertificate(NSSCertificate *c, PRBool forceUpdate)
- }
- if (!cc->nssCertificate || forceUpdate) {
- fill_CERTCertificateFields(c, cc, forceUpdate);
-- } else if (CERT_GetCertTrust(cc, &certTrust) != SECSuccess &&
-- !c->object.cryptoContext) {
-- /* if it's a perm cert, it might have been stored before the
-- * trust, so look for the trust again. But a temp cert can be
-- * ignored.
-- */
-- CERTCertTrust *trust = NULL;
-- trust = nssTrust_GetCERTCertTrustForCert(c, cc);
-+ } else if (CERT_GetCertTrust(cc, &certTrust) != SECSuccess) {
-+ CERTCertTrust *trust;
-+ if (!c->object.cryptoContext) {
-+ /* If it's a perm cert, it might have been stored before the
-+ * trust, so look for the trust again.
-+ */
-+ trust = nssTrust_GetCERTCertTrustForCert(c, cc);
-+ } else {
-+ /* If it's a temp cert, it might have been stored before the
-+ * builtin trust module is loaded, so look for the trust
-+ * again, but don't set the empty trust if it is not found.
-+ */
-+ NSSTrust *t = nssTrustDomain_FindTrustForCertificate(c->object.cryptoContext->td, c);
-+ if (!t) {
-+ goto loser;
-+ }
-+ trust = cert_trust_from_stan_trust(t, cc->arena);
-+ nssTrust_Destroy(t);
-+ if (!trust) {
-+ goto loser;
-+ }
-+ }
-
- CERT_LockCertTrust(cc);
- cc->trust = trust;
---
-2.24.0
-
More information about the arch-commits
mailing list