Compare commits
65 Commits
Author | SHA1 | Date |
---|---|---|
Dennis Gilmore | 15bb5466dd | |
Elio Maldonado | aee457a431 | |
Elio Maldonado | 1b24056ef7 | |
Elio Maldonado | 4e9256eccb | |
Elio Maldonado | 11feb7633c | |
Elio Maldonado | 79ce62fe59 | |
Elio Maldonado | c400a7a567 | |
Elio Maldonado | da8533319e | |
Elio Maldonado | 85c352f22b | |
Elio Maldonado | 24fd61e0c1 | |
Elio Maldonado | 1b4bbde082 | |
Elio Maldonado | 0cac4288f2 | |
Elio Maldonado | 4f8c61457c | |
Elio Maldonado | 83140e6ec3 | |
Elio Maldonado | 41067b8b40 | |
Elio Maldonado | 5abae289d8 | |
Elio Maldonado | c2be9c41be | |
Elio Maldonado | 527750ed60 | |
Elio Maldonado | 92c7fb5676 | |
Elio Maldonado | 576d83be9d | |
Elio Maldonado | 3aff6cd3be | |
Elio Maldonado | e47aa30734 | |
Elio Maldonado | 6799727d7b | |
Elio Maldonado | 768a0d5745 | |
Elio Maldonado | e620cdde80 | |
Elio Maldonado | 68a35a4e2f | |
Elio Maldonado | 33d3470a50 | |
Elio Maldonado | c01002e05f | |
Elio Maldonado | 20dceb30dd | |
Elio Maldonado | 5775837bbf | |
Elio Maldonado | 43ee0dde79 | |
Elio Maldonado | cb9c7979b3 | |
Elio Maldonado | 98913cdefd | |
Elio Maldonado | a3c32434c9 | |
Elio Maldonado | c7e7247590 | |
Elio Maldonado | 125ad15fa4 | |
Elio Maldonado | 6b07fe83cc | |
Elio Maldonado | ebac350c8b | |
Elio Maldonado | c4f8125ecb | |
Elio Maldonado | 9c7cfa3932 | |
Elio Maldonado | c953934393 | |
Elio Maldonado | 87235aed91 | |
Elio Maldonado | fdefa43e4d | |
Elio Maldonado | 690f79c8fa | |
Elio Maldonado | 0ade450edc | |
Elio Maldonado | e7079bbf54 | |
Elio Maldonado | b7d02ab064 | |
Elio Maldonado | 94bf03b9c2 | |
Elio Maldonado | 78e9db1518 | |
Elio Maldonado | 9b182d22ed | |
Elio Maldonado | 93c126b227 | |
Elio Maldonado | 764f26ca9d | |
Elio Maldonado | 6e2d989f14 | |
Elio Maldonado | 96702ba123 | |
Fedora Release Engineering | 64fa704d3a | |
Elio Maldonado | 7cbeb9c7bc | |
Elio Maldonado | 3ff6f4da98 | |
Elio Maldonado | d99a5ee0ec | |
Elio Maldonado | 0a6cda68f8 | |
Elio Maldonado | 6648a39610 | |
Elio Maldonado | 6feac515e8 | |
Elio Maldonado | d8583442b1 | |
Elio Maldonado | c6b2155624 | |
Elio Maldonado | fbb4c50e05 | |
Jesse Keating | 5333c595c9 |
File diff suppressed because it is too large
Load Diff
|
@ -1,460 +0,0 @@
|
|||
diff -up ./mozilla/security/nss/lib/smime/cmscinfo.c.676036 ./mozilla/security/nss/lib/smime/cmscinfo.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmscinfo.c.676036 2011-02-09 14:03:55.133296665 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmscinfo.c 2011-02-09 14:03:55.151294755 -0800
|
||||
@@ -56,27 +56,27 @@
|
||||
SECStatus
|
||||
NSS_CMSContentInfo_Private_Init(NSSCMSContentInfo *cinfo)
|
||||
{
|
||||
- if (cinfo->private) {
|
||||
+ if (cinfo->privateInfo) {
|
||||
return SECSuccess;
|
||||
}
|
||||
- cinfo->private = PORT_ZNew(NSSCMSContentInfoPrivate);
|
||||
- return (cinfo->private) ? SECSuccess: SECFailure;
|
||||
+ cinfo->privateInfo = PORT_ZNew(NSSCMSContentInfoPrivate);
|
||||
+ return (cinfo->privateInfo) ? SECSuccess : SECFailure;
|
||||
}
|
||||
|
||||
|
||||
static void
|
||||
-nss_cmsContentInfo_private_destroy(NSSCMSContentInfoPrivate *private)
|
||||
+nss_cmsContentInfo_private_destroy(NSSCMSContentInfoPrivate *privateInfo)
|
||||
{
|
||||
- if (private->digcx) {
|
||||
+ if (privateInfo->digcx) {
|
||||
/* must destroy digest objects */
|
||||
- NSS_CMSDigestContext_Cancel(private->digcx);
|
||||
- private->digcx = NULL;
|
||||
+ NSS_CMSDigestContext_Cancel(privateInfo->digcx);
|
||||
+ privateInfo->digcx = NULL;
|
||||
}
|
||||
- if (private->ciphcx) {
|
||||
- NSS_CMSCipherContext_Destroy(private->ciphcx);
|
||||
- private->ciphcx = NULL;
|
||||
+ if (privateInfo->ciphcx) {
|
||||
+ NSS_CMSCipherContext_Destroy(privateInfo->ciphcx);
|
||||
+ privateInfo->ciphcx = NULL;
|
||||
}
|
||||
- PORT_Free(private);
|
||||
+ PORT_Free(privateInfo);
|
||||
}
|
||||
|
||||
/*
|
||||
@@ -106,9 +106,9 @@ NSS_CMSContentInfo_Destroy(NSSCMSContent
|
||||
/* XXX Anything else that needs to be "manually" freed/destroyed? */
|
||||
break;
|
||||
}
|
||||
- if (cinfo->private) {
|
||||
- nss_cmsContentInfo_private_destroy(cinfo->private);
|
||||
- cinfo->private = NULL;
|
||||
+ if (cinfo->privateInfo) {
|
||||
+ nss_cmsContentInfo_private_destroy(cinfo->privateInfo);
|
||||
+ cinfo->privateInfo = NULL;
|
||||
}
|
||||
if (cinfo->bulkkey) {
|
||||
PK11_FreeSymKey(cinfo->bulkkey);
|
||||
@@ -153,7 +153,7 @@ NSS_CMSContentInfo_GetChildContentInfo(N
|
||||
}
|
||||
break;
|
||||
}
|
||||
- if (ccinfo && !ccinfo->private) {
|
||||
+ if (ccinfo && !ccinfo->privateInfo) {
|
||||
NSS_CMSContentInfo_Private_Init(ccinfo);
|
||||
}
|
||||
return ccinfo;
|
||||
@@ -169,7 +169,7 @@ NSS_CMSContentInfo_SetDontStream(NSSCMSC
|
||||
/* default is streaming, failure to get ccinfo will not effect this */
|
||||
return dontStream ? SECFailure : SECSuccess ;
|
||||
}
|
||||
- cinfo->private->dontStream = dontStream;
|
||||
+ cinfo->privateInfo->dontStream = dontStream;
|
||||
return SECSuccess;
|
||||
}
|
||||
|
||||
diff -up ./mozilla/security/nss/lib/smime/cmsdecode.c.676036 ./mozilla/security/nss/lib/smime/cmsdecode.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmsdecode.c.676036 2011-02-09 14:03:55.149294968 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmsdecode.c 2011-02-09 14:03:55.152294649 -0800
|
||||
@@ -458,7 +458,7 @@ nss_cms_decoder_work_data(NSSCMSDecoderC
|
||||
goto loser;
|
||||
}
|
||||
|
||||
- if (cinfo->private && cinfo->private->ciphcx != NULL) {
|
||||
+ if (cinfo->privateInfo && cinfo->privateInfo->ciphcx != NULL) {
|
||||
/*
|
||||
* we are decrypting.
|
||||
*
|
||||
@@ -472,7 +472,7 @@ nss_cms_decoder_work_data(NSSCMSDecoderC
|
||||
unsigned int buflen; /* length available for decrypted data */
|
||||
|
||||
/* find out about the length of decrypted data */
|
||||
- buflen = NSS_CMSCipherContext_DecryptLength(cinfo->private->ciphcx, len, final);
|
||||
+ buflen = NSS_CMSCipherContext_DecryptLength(cinfo->privateInfo->ciphcx, len, final);
|
||||
|
||||
/*
|
||||
* it might happen that we did not provide enough data for a full
|
||||
@@ -503,7 +503,7 @@ nss_cms_decoder_work_data(NSSCMSDecoderC
|
||||
* any output (see above), but we still need to call NSS_CMSCipherContext_Decrypt to
|
||||
* keep track of incoming data
|
||||
*/
|
||||
- rv = NSS_CMSCipherContext_Decrypt(cinfo->private->ciphcx, buf, &outlen, buflen,
|
||||
+ rv = NSS_CMSCipherContext_Decrypt(cinfo->privateInfo->ciphcx, buf, &outlen, buflen,
|
||||
data, len, final);
|
||||
if (rv != SECSuccess) {
|
||||
p7dcx->error = PORT_GetError();
|
||||
@@ -523,8 +523,8 @@ nss_cms_decoder_work_data(NSSCMSDecoderC
|
||||
/*
|
||||
* Update the running digests with plaintext bytes (if we need to).
|
||||
*/
|
||||
- if (cinfo->private && cinfo->private->digcx)
|
||||
- NSS_CMSDigestContext_Update(cinfo->private->digcx, data, len);
|
||||
+ if (cinfo->privateInfo && cinfo->privateInfo->digcx)
|
||||
+ NSS_CMSDigestContext_Update(cinfo->privateInfo->digcx, data, len);
|
||||
|
||||
/* at this point, we have the plain decoded & decrypted data
|
||||
** which is either more encoded DER (which we need to hand to the child
|
||||
diff -up ./mozilla/security/nss/lib/smime/cmsdigdata.c.676036 ./mozilla/security/nss/lib/smime/cmsdigdata.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmsdigdata.c.676036 2011-02-09 14:03:55.134296559 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmsdigdata.c 2011-02-09 14:03:55.152294649 -0800
|
||||
@@ -143,8 +143,8 @@ NSS_CMSDigestedData_Encode_BeforeData(NS
|
||||
/* set up the digests */
|
||||
if (digd->digestAlg.algorithm.len != 0 && digd->digest.len == 0) {
|
||||
/* if digest is already there, do nothing */
|
||||
- digd->contentInfo.private->digcx = NSS_CMSDigestContext_StartSingle(&(digd->digestAlg));
|
||||
- if (digd->contentInfo.private->digcx == NULL)
|
||||
+ digd->contentInfo.privateInfo->digcx = NSS_CMSDigestContext_StartSingle(&(digd->digestAlg));
|
||||
+ if (digd->contentInfo.privateInfo->digcx == NULL)
|
||||
return SECFailure;
|
||||
}
|
||||
return SECSuccess;
|
||||
@@ -162,12 +162,12 @@ NSS_CMSDigestedData_Encode_AfterData(NSS
|
||||
{
|
||||
SECStatus rv = SECSuccess;
|
||||
/* did we have digest calculation going on? */
|
||||
- if (digd->contentInfo.private && digd->contentInfo.private->digcx) {
|
||||
- rv = NSS_CMSDigestContext_FinishSingle(digd->contentInfo.private->digcx,
|
||||
+ if (digd->contentInfo.privateInfo && digd->contentInfo.privateInfo->digcx) {
|
||||
+ rv = NSS_CMSDigestContext_FinishSingle(digd->contentInfo.privateInfo->digcx,
|
||||
digd->cmsg->poolp,
|
||||
&(digd->digest));
|
||||
/* error has been set by NSS_CMSDigestContext_FinishSingle */
|
||||
- digd->contentInfo.private->digcx = NULL;
|
||||
+ digd->contentInfo.privateInfo->digcx = NULL;
|
||||
}
|
||||
|
||||
return rv;
|
||||
@@ -194,8 +194,8 @@ NSS_CMSDigestedData_Decode_BeforeData(NS
|
||||
return SECFailure;
|
||||
}
|
||||
|
||||
- digd->contentInfo.private->digcx = NSS_CMSDigestContext_StartSingle(&(digd->digestAlg));
|
||||
- if (digd->contentInfo.private->digcx == NULL)
|
||||
+ digd->contentInfo.privateInfo->digcx = NSS_CMSDigestContext_StartSingle(&(digd->digestAlg));
|
||||
+ if (digd->contentInfo.privateInfo->digcx == NULL)
|
||||
return SECFailure;
|
||||
|
||||
return SECSuccess;
|
||||
@@ -213,12 +213,12 @@ NSS_CMSDigestedData_Decode_AfterData(NSS
|
||||
{
|
||||
SECStatus rv = SECSuccess;
|
||||
/* did we have digest calculation going on? */
|
||||
- if (digd->contentInfo.private && digd->contentInfo.private->digcx) {
|
||||
- rv = NSS_CMSDigestContext_FinishSingle(digd->contentInfo.private->digcx,
|
||||
+ if (digd->contentInfo.privateInfo && digd->contentInfo.privateInfo->digcx) {
|
||||
+ rv = NSS_CMSDigestContext_FinishSingle(digd->contentInfo.privateInfo->digcx,
|
||||
digd->cmsg->poolp,
|
||||
&(digd->cdigest));
|
||||
/* error has been set by NSS_CMSDigestContext_FinishSingle */
|
||||
- digd->contentInfo.private->digcx = NULL;
|
||||
+ digd->contentInfo.privateInfo->digcx = NULL;
|
||||
}
|
||||
|
||||
return rv;
|
||||
diff -up ./mozilla/security/nss/lib/smime/cmsencdata.c.676036 ./mozilla/security/nss/lib/smime/cmsencdata.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmsencdata.c.676036 2011-02-09 14:03:55.135296453 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmsencdata.c 2011-02-09 14:03:55.153294543 -0800
|
||||
@@ -200,9 +200,9 @@ NSS_CMSEncryptedData_Encode_BeforeData(N
|
||||
/* this may modify algid (with IVs generated in a token).
|
||||
* it is therefore essential that algid is a pointer to the "real" contentEncAlg,
|
||||
* not just to a copy */
|
||||
- cinfo->private->ciphcx = NSS_CMSCipherContext_StartEncrypt(encd->cmsg->poolp, bulkkey, algid);
|
||||
+ cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartEncrypt(encd->cmsg->poolp, bulkkey, algid);
|
||||
PK11_FreeSymKey(bulkkey);
|
||||
- if (cinfo->private->ciphcx == NULL)
|
||||
+ if (cinfo->privateInfo->ciphcx == NULL)
|
||||
return SECFailure;
|
||||
|
||||
return SECSuccess;
|
||||
@@ -214,9 +214,9 @@ NSS_CMSEncryptedData_Encode_BeforeData(N
|
||||
SECStatus
|
||||
NSS_CMSEncryptedData_Encode_AfterData(NSSCMSEncryptedData *encd)
|
||||
{
|
||||
- if (encd->contentInfo.private && encd->contentInfo.private->ciphcx) {
|
||||
- NSS_CMSCipherContext_Destroy(encd->contentInfo.private->ciphcx);
|
||||
- encd->contentInfo.private->ciphcx = NULL;
|
||||
+ if (encd->contentInfo.privateInfo && encd->contentInfo.privateInfo->ciphcx) {
|
||||
+ NSS_CMSCipherContext_Destroy(encd->contentInfo.privateInfo->ciphcx);
|
||||
+ encd->contentInfo.privateInfo->ciphcx = NULL;
|
||||
}
|
||||
|
||||
/* nothing to do after data */
|
||||
@@ -255,8 +255,8 @@ NSS_CMSEncryptedData_Decode_BeforeData(N
|
||||
}
|
||||
rv = SECFailure;
|
||||
|
||||
- cinfo->private->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
|
||||
- if (cinfo->private->ciphcx == NULL)
|
||||
+ cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
|
||||
+ if (cinfo->privateInfo->ciphcx == NULL)
|
||||
goto loser; /* error has been set by NSS_CMSCipherContext_StartDecrypt */
|
||||
|
||||
|
||||
@@ -275,9 +275,9 @@ loser:
|
||||
SECStatus
|
||||
NSS_CMSEncryptedData_Decode_AfterData(NSSCMSEncryptedData *encd)
|
||||
{
|
||||
- if (encd->contentInfo.private && encd->contentInfo.private->ciphcx) {
|
||||
- NSS_CMSCipherContext_Destroy(encd->contentInfo.private->ciphcx);
|
||||
- encd->contentInfo.private->ciphcx = NULL;
|
||||
+ if (encd->contentInfo.privateInfo && encd->contentInfo.privateInfo->ciphcx) {
|
||||
+ NSS_CMSCipherContext_Destroy(encd->contentInfo.privateInfo->ciphcx);
|
||||
+ encd->contentInfo.privateInfo->ciphcx = NULL;
|
||||
}
|
||||
|
||||
return SECSuccess;
|
||||
diff -up ./mozilla/security/nss/lib/smime/cmsencode.c.676036 ./mozilla/security/nss/lib/smime/cmsencode.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmsencode.c.676036 2011-02-09 14:03:55.136296347 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmsencode.c 2011-02-09 14:03:55.154294437 -0800
|
||||
@@ -332,7 +332,7 @@ nss_cms_before_data(NSSCMSEncoderContext
|
||||
* Indicate that we are streaming. We will be streaming until we
|
||||
* get past the contents bytes.
|
||||
*/
|
||||
- if (!cinfo->private || !cinfo->private->dontStream)
|
||||
+ if (!cinfo->privateInfo || !cinfo->privateInfo->dontStream)
|
||||
SEC_ASN1EncoderSetStreaming(childp7ecx->ecx);
|
||||
|
||||
/*
|
||||
@@ -430,23 +430,23 @@ nss_cms_encoder_work_data(NSSCMSEncoderC
|
||||
}
|
||||
|
||||
/* Update the running digest. */
|
||||
- if (len && cinfo->private && cinfo->private->digcx != NULL)
|
||||
- NSS_CMSDigestContext_Update(cinfo->private->digcx, data, len);
|
||||
+ if (len && cinfo->privateInfo && cinfo->privateInfo->digcx != NULL)
|
||||
+ NSS_CMSDigestContext_Update(cinfo->privateInfo->digcx, data, len);
|
||||
|
||||
/* Encrypt this chunk. */
|
||||
- if (cinfo->private && cinfo->private->ciphcx != NULL) {
|
||||
+ if (cinfo->privateInfo && cinfo->privateInfo->ciphcx != NULL) {
|
||||
unsigned int inlen; /* length of data being encrypted */
|
||||
unsigned int outlen; /* length of encrypted data */
|
||||
unsigned int buflen; /* length available for encrypted data */
|
||||
|
||||
inlen = len;
|
||||
- buflen = NSS_CMSCipherContext_EncryptLength(cinfo->private->ciphcx, inlen, final);
|
||||
+ buflen = NSS_CMSCipherContext_EncryptLength(cinfo->privateInfo->ciphcx, inlen, final);
|
||||
if (buflen == 0) {
|
||||
/*
|
||||
* No output is expected, but the input data may be buffered
|
||||
* so we still have to call Encrypt.
|
||||
*/
|
||||
- rv = NSS_CMSCipherContext_Encrypt(cinfo->private->ciphcx, NULL, NULL, 0,
|
||||
+ rv = NSS_CMSCipherContext_Encrypt(cinfo->privateInfo->ciphcx, NULL, NULL, 0,
|
||||
data, inlen, final);
|
||||
if (final) {
|
||||
len = 0;
|
||||
@@ -463,7 +463,7 @@ nss_cms_encoder_work_data(NSSCMSEncoderC
|
||||
if (buf == NULL) {
|
||||
rv = SECFailure;
|
||||
} else {
|
||||
- rv = NSS_CMSCipherContext_Encrypt(cinfo->private->ciphcx, buf, &outlen, buflen,
|
||||
+ rv = NSS_CMSCipherContext_Encrypt(cinfo->privateInfo->ciphcx, buf, &outlen, buflen,
|
||||
data, inlen, final);
|
||||
data = buf;
|
||||
len = outlen;
|
||||
@@ -484,7 +484,7 @@ nss_cms_encoder_work_data(NSSCMSEncoderC
|
||||
|
||||
done:
|
||||
|
||||
- if (cinfo->private && cinfo->private->ciphcx != NULL) {
|
||||
+ if (cinfo->privateInfo && cinfo->privateInfo->ciphcx != NULL) {
|
||||
if (dest != NULL) {
|
||||
dest->data = buf;
|
||||
dest->len = len;
|
||||
@@ -592,7 +592,7 @@ NSS_CMSEncoder_Start(NSSCMSMessage *cmsg
|
||||
* Indicate that we are streaming. We will be streaming until we
|
||||
* get past the contents bytes.
|
||||
*/
|
||||
- if (!cinfo->private || !cinfo->private->dontStream)
|
||||
+ if (!cinfo->privateInfo || !cinfo->privateInfo->dontStream)
|
||||
SEC_ASN1EncoderSetStreaming(p7ecx->ecx);
|
||||
|
||||
/*
|
||||
diff -up ./mozilla/security/nss/lib/smime/cmsenvdata.c.676036 ./mozilla/security/nss/lib/smime/cmsenvdata.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmsenvdata.c.676036 2011-02-09 14:03:55.137296241 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmsenvdata.c 2011-02-09 14:03:55.155294331 -0800
|
||||
@@ -289,9 +289,9 @@ NSS_CMSEnvelopedData_Encode_BeforeData(N
|
||||
/* this may modify algid (with IVs generated in a token).
|
||||
* it is essential that algid is a pointer to the contentEncAlg data, not a
|
||||
* pointer to a copy! */
|
||||
- cinfo->private->ciphcx = NSS_CMSCipherContext_StartEncrypt(envd->cmsg->poolp, bulkkey, algid);
|
||||
+ cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartEncrypt(envd->cmsg->poolp, bulkkey, algid);
|
||||
PK11_FreeSymKey(bulkkey);
|
||||
- if (cinfo->private->ciphcx == NULL)
|
||||
+ if (cinfo->privateInfo->ciphcx == NULL)
|
||||
return SECFailure;
|
||||
|
||||
return SECSuccess;
|
||||
@@ -303,9 +303,9 @@ NSS_CMSEnvelopedData_Encode_BeforeData(N
|
||||
SECStatus
|
||||
NSS_CMSEnvelopedData_Encode_AfterData(NSSCMSEnvelopedData *envd)
|
||||
{
|
||||
- if (envd->contentInfo.private && envd->contentInfo.private->ciphcx) {
|
||||
- NSS_CMSCipherContext_Destroy(envd->contentInfo.private->ciphcx);
|
||||
- envd->contentInfo.private->ciphcx = NULL;
|
||||
+ if (envd->contentInfo.privateInfo && envd->contentInfo.privateInfo->ciphcx) {
|
||||
+ NSS_CMSCipherContext_Destroy(envd->contentInfo.privateInfo->ciphcx);
|
||||
+ envd->contentInfo.privateInfo->ciphcx = NULL;
|
||||
}
|
||||
|
||||
/* nothing else to do after data */
|
||||
@@ -338,7 +338,7 @@ NSS_CMSEnvelopedData_Decode_BeforeData(N
|
||||
}
|
||||
|
||||
/* look if one of OUR cert's issuerSN is on the list of recipients, and if so, */
|
||||
- /* get the cert and private key for it right away */
|
||||
+ /* get the cert and private key for it right away */
|
||||
recipient_list = nss_cms_recipient_list_create(envd->recipientInfos);
|
||||
if (recipient_list == NULL)
|
||||
goto loser;
|
||||
@@ -390,8 +390,8 @@ NSS_CMSEnvelopedData_Decode_BeforeData(N
|
||||
goto loser;
|
||||
}
|
||||
rv = SECFailure;
|
||||
- cinfo->private->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
|
||||
- if (cinfo->private->ciphcx == NULL)
|
||||
+ cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
|
||||
+ if (cinfo->privateInfo->ciphcx == NULL)
|
||||
goto loser; /* error has been set by NSS_CMSCipherContext_StartDecrypt */
|
||||
|
||||
|
||||
@@ -411,9 +411,9 @@ loser:
|
||||
SECStatus
|
||||
NSS_CMSEnvelopedData_Decode_AfterData(NSSCMSEnvelopedData *envd)
|
||||
{
|
||||
- if (envd && envd->contentInfo.private && envd->contentInfo.private->ciphcx) {
|
||||
- NSS_CMSCipherContext_Destroy(envd->contentInfo.private->ciphcx);
|
||||
- envd->contentInfo.private->ciphcx = NULL;
|
||||
+ if (envd && envd->contentInfo.privateInfo && envd->contentInfo.privateInfo->ciphcx) {
|
||||
+ NSS_CMSCipherContext_Destroy(envd->contentInfo.privateInfo->ciphcx);
|
||||
+ envd->contentInfo.privateInfo->ciphcx = NULL;
|
||||
}
|
||||
|
||||
return SECSuccess;
|
||||
diff -up ./mozilla/security/nss/lib/smime/cms.h.676036 ./mozilla/security/nss/lib/smime/cms.h
|
||||
--- ./mozilla/security/nss/lib/smime/cms.h.676036 2011-02-09 14:05:46.178513159 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cms.h 2011-02-09 14:35:29.675010023 -0800
|
||||
@@ -1171,7 +1171,7 @@ NSS_CMSDEREncode(NSSCMSMessage *cmsg, SE
|
||||
* against that data structure.
|
||||
*/
|
||||
SECStatus NSS_CMSType_RegisterContentType(SECOidTag type,
|
||||
- SEC_ASN1Template *template, size_t size,
|
||||
+ SEC_ASN1Template *asn1Template, size_t size,
|
||||
NSSCMSGenericWrapperDataDestroy destroy,
|
||||
NSSCMSGenericWrapperDataCallback decode_before,
|
||||
NSSCMSGenericWrapperDataCallback decode_after,
|
||||
diff -up ./mozilla/security/nss/lib/smime/cmssigdata.c.676036 ./mozilla/security/nss/lib/smime/cmssigdata.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmssigdata.c.676036 2011-02-09 14:03:55.139296029 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmssigdata.c 2011-02-09 14:03:55.155294331 -0800
|
||||
@@ -228,11 +228,11 @@ NSS_CMSSignedData_Encode_BeforeData(NSSC
|
||||
}
|
||||
/* set up the digests */
|
||||
if (sigd->digests && sigd->digests[0]) {
|
||||
- sigd->contentInfo.private->digcx = NULL; /* don't attempt to make new ones. */
|
||||
+ sigd->contentInfo.privateInfo->digcx = NULL; /* don't attempt to make new ones. */
|
||||
} else if (sigd->digestAlgorithms != NULL) {
|
||||
- sigd->contentInfo.private->digcx =
|
||||
+ sigd->contentInfo.privateInfo->digcx =
|
||||
NSS_CMSDigestContext_StartMultiple(sigd->digestAlgorithms);
|
||||
- if (sigd->contentInfo.private->digcx == NULL)
|
||||
+ if (sigd->contentInfo.privateInfo->digcx == NULL)
|
||||
return SECFailure;
|
||||
}
|
||||
return SECSuccess;
|
||||
@@ -272,11 +272,11 @@ NSS_CMSSignedData_Encode_AfterData(NSSCM
|
||||
cinfo = &(sigd->contentInfo);
|
||||
|
||||
/* did we have digest calculation going on? */
|
||||
- if (cinfo->private && cinfo->private->digcx) {
|
||||
- rv = NSS_CMSDigestContext_FinishMultiple(cinfo->private->digcx, poolp,
|
||||
+ if (cinfo->privateInfo && cinfo->privateInfo->digcx) {
|
||||
+ rv = NSS_CMSDigestContext_FinishMultiple(cinfo->privateInfo->digcx, poolp,
|
||||
&(sigd->digests));
|
||||
/* error has been set by NSS_CMSDigestContext_FinishMultiple */
|
||||
- cinfo->private->digcx = NULL;
|
||||
+ cinfo->privateInfo->digcx = NULL;
|
||||
if (rv != SECSuccess)
|
||||
goto loser;
|
||||
}
|
||||
@@ -409,8 +409,8 @@ NSS_CMSSignedData_Decode_BeforeData(NSSC
|
||||
/* set up the digests */
|
||||
if (sigd->digestAlgorithms != NULL && sigd->digests == NULL) {
|
||||
/* if digests are already there, do nothing */
|
||||
- sigd->contentInfo.private->digcx = NSS_CMSDigestContext_StartMultiple(sigd->digestAlgorithms);
|
||||
- if (sigd->contentInfo.private->digcx == NULL)
|
||||
+ sigd->contentInfo.privateInfo->digcx = NSS_CMSDigestContext_StartMultiple(sigd->digestAlgorithms);
|
||||
+ if (sigd->contentInfo.privateInfo->digcx == NULL)
|
||||
return SECFailure;
|
||||
}
|
||||
return SECSuccess;
|
||||
@@ -431,11 +431,11 @@ NSS_CMSSignedData_Decode_AfterData(NSSCM
|
||||
}
|
||||
|
||||
/* did we have digest calculation going on? */
|
||||
- if (sigd->contentInfo.private && sigd->contentInfo.private->digcx) {
|
||||
- rv = NSS_CMSDigestContext_FinishMultiple(sigd->contentInfo.private->digcx,
|
||||
+ if (sigd->contentInfo.privateInfo && sigd->contentInfo.privateInfo->digcx) {
|
||||
+ rv = NSS_CMSDigestContext_FinishMultiple(sigd->contentInfo.privateInfo->digcx,
|
||||
sigd->cmsg->poolp, &(sigd->digests));
|
||||
/* error set by NSS_CMSDigestContext_FinishMultiple */
|
||||
- sigd->contentInfo.private->digcx = NULL;
|
||||
+ sigd->contentInfo.privateInfo->digcx = NULL;
|
||||
}
|
||||
return rv;
|
||||
}
|
||||
diff -up ./mozilla/security/nss/lib/smime/cmst.h.676036 ./mozilla/security/nss/lib/smime/cmst.h
|
||||
--- ./mozilla/security/nss/lib/smime/cmst.h.676036 2011-02-09 14:03:55.141295816 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmst.h 2011-02-09 14:03:55.156294225 -0800
|
||||
@@ -182,7 +182,7 @@ struct NSSCMSContentInfoStr {
|
||||
* (only used by creation code) */
|
||||
SECOidTag contentEncAlgTag; /* oid tag of encryption algorithm
|
||||
* (only used by creation code) */
|
||||
- NSSCMSContentInfoPrivate *private; /* place for NSS private info */
|
||||
+ NSSCMSContentInfoPrivate *privateInfo; /* place for NSS private info */
|
||||
void *reserved; /* keep binary compatibility */
|
||||
};
|
||||
|
||||
diff -up ./mozilla/security/nss/lib/smime/cmsudf.c.676036 ./mozilla/security/nss/lib/smime/cmsudf.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmsudf.c.676036 2011-02-09 14:08:23.907775957 -0800
|
||||
+++ ./mozilla/security/nss/lib/smime/cmsudf.c 2011-02-09 14:36:56.043841454 -0800
|
||||
@@ -435,7 +435,7 @@ NSS_CMSGenericWrapperData_Encode_AfterDa
|
||||
|
||||
SECStatus
|
||||
NSS_CMSType_RegisterContentType(SECOidTag type,
|
||||
- SEC_ASN1Template *template, size_t size,
|
||||
+ SEC_ASN1Template *asn1Template, size_t size,
|
||||
NSSCMSGenericWrapperDataDestroy destroy,
|
||||
NSSCMSGenericWrapperDataCallback decode_before,
|
||||
NSSCMSGenericWrapperDataCallback decode_after,
|
||||
@@ -462,10 +462,10 @@ NSS_CMSType_RegisterContentType(SECOidTa
|
||||
return SECSuccess;
|
||||
}
|
||||
typeInfo = PORT_ArenaNew(nsscmstypeArena, nsscmstypeInfo);
|
||||
- typeInfo->type =type;
|
||||
+ typeInfo->type = type;
|
||||
typeInfo->size = size;
|
||||
typeInfo->isData = isData;
|
||||
- typeInfo->template = template;
|
||||
+ typeInfo->template = asn1Template;
|
||||
typeInfo->destroy = destroy;
|
||||
typeInfo->decode_before = decode_before;
|
||||
typeInfo->decode_after = decode_after;
|
|
@ -1,17 +0,0 @@
|
|||
Handle decoding of one CMS structure inside another. Plain data as the
|
||||
top-level item in a message needs work.
|
||||
|
||||
diff -ur ./mozilla/security/nss/lib/smime/cmsdecode.c ./mozilla/security/nss/lib/smime/cmsdecode.c
|
||||
--- ./mozilla/security/nss/lib/smime/cmsdecode.c 2010-12-23 13:03:41.000000000 -0500
|
||||
+++ ./mozilla/security/nss/lib/smime/cmsdecode.c 2011-01-12 15:22:22.245908999 -0500
|
||||
@@ -307,6 +307,9 @@
|
||||
if (childp7dcx->content.pointer == NULL)
|
||||
goto loser;
|
||||
|
||||
+ /* give the parent a copy of the pointer so that it doesn't get lost */
|
||||
+ cinfo->content.pointer = childp7dcx->content.pointer;
|
||||
+
|
||||
/* start the child decoder */
|
||||
childp7dcx->dcx = SEC_ASN1DecoderStart(poolp, childp7dcx->content.pointer,
|
||||
template);
|
||||
|
122
nss.spec
122
nss.spec
|
@ -6,7 +6,7 @@
|
|||
Summary: Network Security Services
|
||||
Name: nss
|
||||
Version: 3.12.9
|
||||
Release: 15%{?dist}
|
||||
Release: 11%{?dist}
|
||||
License: MPLv1.1 or GPLv2+ or LGPLv2+
|
||||
URL: http://www.mozilla.org/projects/security/pki/nss/
|
||||
Group: System Environment/Libraries
|
||||
|
@ -44,9 +44,6 @@ Patch6: nss-enable-pem.patch
|
|||
Patch7: nsspem-642433.patch
|
||||
Patch8: 0001-Bug-695011-PEM-logging.patch
|
||||
Patch11: honor-user-trust-preferences.patch
|
||||
Patch12: allow-content-types-beyond-smime.patch
|
||||
Patch13: nss-recurse.patch
|
||||
Patch14: dont-use-cpp-reserved-words.patch
|
||||
Patch15: swap-internal-key-slot.patch
|
||||
Patch16: nss-539183.patch
|
||||
|
||||
|
@ -123,9 +120,6 @@ low level services.
|
|||
%patch7 -p0 -b .642433
|
||||
%patch8 -p1 -b .695011
|
||||
%patch11 -p1 -b .643134
|
||||
%patch12 -p1 -b .contenttypes
|
||||
%patch13 -p1 -b .recurse
|
||||
%patch14 -p1 -b .676036
|
||||
%patch15 -p1 -b .jss
|
||||
%patch16 -p0 -b .539183
|
||||
|
||||
|
@ -287,12 +281,14 @@ cd ../../../../
|
|||
killall $RANDSERV || :
|
||||
|
||||
TEST_FAILURES=`grep -c FAILED ./mozilla/tests_results/security/localhost.1/output.log` || :
|
||||
# there is some long standing testsuite failres on arm lets make them non fatal till they can be fixed
|
||||
%ifnarch %{arm}
|
||||
if [ $TEST_FAILURES -ne 0 ]; then
|
||||
echo "error: test suite returned failure(s)"
|
||||
exit 1
|
||||
fi
|
||||
echo "test suite completed"
|
||||
|
||||
%endif
|
||||
|
||||
%install
|
||||
|
||||
|
@ -385,7 +381,7 @@ rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/secoidt.h
|
|||
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/secport.h
|
||||
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/utilrename.h
|
||||
|
||||
#remove the nss-softokn-devel and nss-softokn-freebl-devel headers
|
||||
#remove headers shipped by nss-softokn-devel and nss-softokn-freebl-devel
|
||||
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/alghmac.h
|
||||
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/blapit.h
|
||||
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/ecl-exp.h
|
||||
|
@ -521,109 +517,55 @@ rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/nsslowhash.h
|
|||
|
||||
|
||||
%changelog
|
||||
* Mon Apr 11 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-15
|
||||
- Implement PEM logging using NSPR's own (#695011)
|
||||
* Fri May 20 2011 Dennis Gilmore <dennis@ausil.us> - 3.12.9-11
|
||||
- make testsuite failures non fatal on arm
|
||||
|
||||
* Wed Mar 23 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-14
|
||||
* Mon Apr 11 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-10
|
||||
- Implement PEM logging using NSPR's own (#695011)
|
||||
- Update the expired PayPalEE test certificate to one good until April 1, 2013
|
||||
|
||||
* Wed Mar 25 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-9
|
||||
- Update to NSS_3.12.9_WITH_CKBI_1_82_RTM
|
||||
|
||||
* Wed Feb 24 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-13
|
||||
* Wed Feb 24 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-8
|
||||
- Short-term fix for ssl test suites hangs on ipv6 type connections (#539183)
|
||||
|
||||
* Fri Feb 18 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-12
|
||||
- Add a missing requires for pkcs11-devel (#675196)
|
||||
|
||||
* Tue Feb 15 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-11
|
||||
- Run the test suites in the check section (#677809)
|
||||
|
||||
* Thu Feb 10 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-10
|
||||
- Fix cms headers to not use c++ reserved words (#676036)
|
||||
- Reenabling Bug 499444 patches
|
||||
- Fix to swap internal key slot on fips mode switches
|
||||
|
||||
* Tue Feb 08 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-9
|
||||
- Revert patches for 499444 until all c++ reserved words are found and extirpated
|
||||
|
||||
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 3.12.9-8
|
||||
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
|
||||
|
||||
* Tue Feb 08 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-7
|
||||
- Fix cms header to not use c++ reserved word (#676036)
|
||||
- Reenable patches for bug 499444
|
||||
|
||||
* Tue Feb 08 2011 Christopher Aillon <caillon@redhat.com> - 3.12.9-6
|
||||
- Revert patches for 499444 as they use a C++ reserved word and
|
||||
cause compilation of Firefox to fail
|
||||
|
||||
* Fri Feb 04 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-5
|
||||
- Fix the earlier infinite recursion patch (#499444)
|
||||
- Remove a header that now nss-softokn-freebl-devel ships
|
||||
|
||||
* Tue Feb 01 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-4
|
||||
- Fix infinite recursion when encoding NSS enveloped/digested data (#499444)
|
||||
|
||||
* Mon Jan 31 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-3
|
||||
- Update the cacert trust patch per upstream review requests (#633043)
|
||||
|
||||
* Wed Jan 19 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-2
|
||||
- Fix to swap internal key slot on fips mode switches, related to #633043
|
||||
- Remove a header that now nss-softokn-freebl-devel ships (#675196)
|
||||
- Fix to honor the user's cert trust preferences (#633043)
|
||||
- Remove obsoleted patch
|
||||
|
||||
* Wed Jan 12 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-1
|
||||
- Update to 3.12.9
|
||||
|
||||
* Mon Dec 27 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.9-0.1.beta2
|
||||
- Rebuilt according to fedora pre-release package naming guidelines
|
||||
* Fri Nov 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-3
|
||||
- Update test certificate which had expired
|
||||
|
||||
* Fri Dec 10 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8.99.2-1
|
||||
- Update to NSS_3_12_9_BETA2
|
||||
- Fix libpnsspem crash when cacert dir contains other directories (#642433)
|
||||
|
||||
* Wed Dec 08 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8.99.1-1
|
||||
- Update to NSS_3_12_9_BETA1
|
||||
|
||||
* Thu Nov 25 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-9
|
||||
- Update pem source tar with fixes for 614532 and 596674
|
||||
- Remove no longer needed patches
|
||||
|
||||
* Fri Nov 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-8
|
||||
- Update PayPalEE.cert test certificate which had expired
|
||||
|
||||
* Sun Oct 31 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-7
|
||||
- Tell rpm not to verify md5, size, and modtime of configurations file
|
||||
|
||||
* Wed Oct 18 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-6
|
||||
- Fix certificates trust order (#643134)
|
||||
- Apply nss-sysinit-userdb-first.patch last
|
||||
|
||||
* Wed Oct 06 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-5
|
||||
* Wed Oct 06 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-2
|
||||
- Move triggerpostun -n nss-sysinit script ahead of the other ones (#639248)
|
||||
|
||||
* Tue Oct 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-4
|
||||
* Tue Oct 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-1
|
||||
- Update to 3.12.8
|
||||
- Fix invalid %postun scriptlet (#639248)
|
||||
|
||||
* Wed Sep 29 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-3
|
||||
* Thu Sep 30 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-9
|
||||
- Fix version on triggerpostun scriplet (#636787)
|
||||
|
||||
* Wed Sep 29 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-8
|
||||
- Replace posttrans sysinit scriptlet with a triggerpostun one (#636787)
|
||||
- Fix and cleanup the setup-nsssysinit.sh script (#636792, #636801)
|
||||
|
||||
* Mon Sep 27 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-2
|
||||
- Add posttrans scriptlet (#636787)
|
||||
|
||||
* Thu Sep 23 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-1
|
||||
- Update to 3.12.8
|
||||
- Prevent disabling of nss-sysinit on package upgrade (#636787)
|
||||
* Tue Sep 28 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-7
|
||||
- Prevent of nss-sysinit disabling on package upgrade (#636787)
|
||||
- Create pkcs11.txt with correct permissions regardless of umask (#636792)
|
||||
- Setup-nsssysinit.sh reports whether nss-sysinit is turned on or off (#636801)
|
||||
- Added provides pkcs11-devel-static to comply with packaging guidelines (#609612)
|
||||
- Add provides nss-pkcs11-devel-static to comply with packaging guidelines (#609612)
|
||||
|
||||
* Sat Sep 18 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7.99.4-1
|
||||
- NSS 3.12.8 RC0
|
||||
* Sun Sep 12 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-6
|
||||
- Remove {nss_util|nss_softokn}_build_version, BuildRequires must match Requires
|
||||
|
||||
* Sun Sep 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7.99.3-2
|
||||
- Fix nss-util_version and nss_softokn_version required to be 3.12.7.99.3
|
||||
* Sat Sep 11 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-5
|
||||
- Bump nss_util_build_version and nss_softokn_build_version to 3.12.7
|
||||
|
||||
* Sat Sep 04 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7.99.3-1
|
||||
- NSS 3.12.8 Beta3
|
||||
* Mon Sep 07 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-4
|
||||
- Fix unclosed comment in renegotiate-transitional.patch
|
||||
|
||||
* Sat Aug 28 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-3
|
||||
|
|
Loading…
Reference in New Issue