Compare commits

...

65 Commits
master ... f13

Author SHA1 Message Date
Dennis Gilmore 15bb5466dd * Fri May 20 2011 Dennis Gilmore <dennis@ausil.us> - 3.12.9-11
- make testsuite failures non fatal on arm
2011-05-20 09:20:56 -05:00
Elio Maldonado aee457a431 Merge branch 'f14' into f13 2011-04-12 14:42:52 -07:00
Elio Maldonado 1b24056ef7 Fix the relase number 2011-04-12 13:04:06 -07:00
Elio Maldonado 4e9256eccb Merge branch 'f15' into f14, partial merge 2011-04-12 13:01:57 -07:00
Elio Maldonado 11feb7633c Merge branch 'master' into f15
Fix for Bug 695011 - segfaults on pem logging on debug builds
PEM module logging implemented using NSPR logging calls
Update the PayPalEE test certificate to a longer lived one
2011-04-12 12:52:18 -07:00
Elio Maldonado 79ce62fe59 Merge branch 'f14' into f13 2011-03-26 13:53:48 -07:00
Elio Maldonado c400a7a567 Selectively merge branch 'f15' into f14
Update to NSS_3.12.9_WITH_CKBI_1_82_RTM
nss security update for compromised certificates
see: https://bugzilla.mozilla.org/show_bug.cgi?id=642395
2011-03-26 11:55:23 -07:00
Elio Maldonado da8533319e Merge branch 'master' into f15
- Update to NSS_3.12.9_WITH_CKBI_1_82_RTM
- nss security update for compromized certificates
- see mozilla bug: https://bugzilla.mozilla.org/show_bug.cgi?id=642395
2011-03-25 14:54:45 -07:00
Elio Maldonado 85c352f22b Merge branch 'f14' into f13 2011-02-25 09:30:30 -08:00
Elio Maldonado 24fd61e0c1 Bug 539183 - Short-term fix for ssl test suites hangs on ipv6 type connections
Change selfserv to use a dual-stack IPv6 listening socket, which can accept
connections from both IPv4 and IPv6 clients.  NSPR's IPv6 sockets have the
IPV6_V6ONLY socket option default to false.
2011-02-25 09:21:19 -08:00
Elio Maldonado 1b4bbde082 Bug 539183 - Short-term fix for ssl test suites hangs on ipv6 type connections
Change selfserv to use a dual-stack IPv6 listening socket, which can accept
connections from both IPv4 and IPv6 clients.  NSPR's IPv6 sockets have the
IPV6_V6ONLY socket option default to false.
2011-02-24 16:01:12 -08:00
Elio Maldonado 0cac4288f2 Bug 539183 - Short-term fix for ssl test suites hangs on ipv6 type connections
Change selfserv to use a dual-stack IPv6 listening socket, which can accept
connections from both IPv4 and IPv6 clients.  NSPR's IPv6 sockets have the
IPV6_V6ONLY socket option default to false.
2011-02-24 15:34:22 -08:00
Elio Maldonado 4f8c61457c - Run the test suites in the check section (#677809) 2011-02-18 16:08:50 -08:00
Elio Maldonado 83140e6ec3 - Add to pkcs11-devel a requires on nss-softokn-freebl-freebl (#675196)
- Remove a header that now nss-softokn-freebl-devel ships
- Run the test suites in the check section (#677809)
2011-02-18 15:18:50 -08:00
Elio Maldonado 41067b8b40 - Fix to swap internal key slot on fips mode switches, related to #633043
- Fixes a side effect of the fix for #633043 detcted by the JSS test suite
2011-02-11 09:44:12 -08:00
Elio Maldonado 5abae289d8 - Remove a header that now nss-softokn-freebl-devel ships, related to #675196
- Backing out earlier patch until further testing from upstream for 3.12.10
2011-02-07 16:00:36 -08:00
Elio Maldonado c2be9c41be Merge branch 'master' into f14 2011-02-01 17:56:57 -08:00
Elio Maldonado 527750ed60 Merge branch 'master' into f14 2011-01-22 10:04:11 -08:00
Elio Maldonado 92c7fb5676 Merge branch 'master' into f14 2011-01-13 14:04:41 -08:00
Elio Maldonado 576d83be9d - Fix libpnsspem crash when cacert dir contains other directories (#642433)
- Added comments to spec file on how build with optimizations turned off
2010-12-10 08:16:05 -08:00
Elio Maldonado 3aff6cd3be Actually apply all the changes in the commit previous message.
Update pem source tar with fixes for 614532 and 596674
Remove patches that we no longer need
Tell rpm not to verify md5, size, and modtime of configurations file
2010-11-26 12:20:17 -08:00
Elio Maldonado e47aa30734 - Update pem source tar with fixes for 614532 and 596674
- Remove 0001-Add-support-for-PKCS-8-encoded-private-keys.patch, no longer needed
- Remove 0001-Do-not-define-SEC_SkipTemplate.patch, no longer needed
- Tell rpm not to verify md5, size, and modtime of configurations file
2010-11-26 08:57:40 -08:00
Elio Maldonado 6799727d7b Merge branch 'f14' into f13 2010-11-05 09:00:34 -07:00
Elio Maldonado 768a0d5745 Update test certificate which had expired 2010-11-05 08:44:51 -07:00
Elio Maldonado e620cdde80 Merge branch 'f14' into f13 2010-11-04 15:05:50 -07:00
Elio Maldonado 68a35a4e2f Update PayPalEE.cert which had expired 2010-11-04 15:04:05 -07:00
Elio Maldonado 33d3470a50 Merge branch 'f14' into f13 2010-10-07 07:59:23 -07:00
Elio Maldonado c01002e05f Move triggerpostun -n nss-sysinit script ahead of the other ones (#639248) 2010-10-06 20:30:52 -07:00
Elio Maldonado 20dceb30dd Merge branch 'f14' into f13 2010-10-05 13:16:49 -07:00
Elio Maldonado 5775837bbf - Update to 3.12.8
- Fix invalid %postun scriptlet (#639248)
2010-10-05 11:47:36 -07:00
Elio Maldonado 43ee0dde79 Merge branch 'f14' into f13 2010-09-30 15:16:53 -07:00
Elio Maldonado cb9c7979b3 Fix version on triggerpostun scriplet (#636787) 2010-09-30 14:56:51 -07:00
Elio Maldonado 98913cdefd Merge branch 'f14' into f13 2010-09-29 15:48:25 -07:00
Elio Maldonado a3c32434c9 Improve on fixes for bugs #636787, #636792, and #636801
Replace posttrans sysinit scriptlet with a triggerpostun one (#636787)
Fix and cleanup the setup-nsssysinit.sh script (#636792, #636801)
2010-09-29 15:15:00 -07:00
Elio Maldonado c7e7247590 Improve on fixes for bugs #636787, #636792, and #636801
Replace posttrans sysinit scriptlet with a triggerpostun one (#636787)
Fix and cleanup the setup-nsssysinit.sh script (#636792, #636801)
2010-09-29 14:51:02 -07:00
Elio Maldonado 125ad15fa4 Fixes for Bugs 636787, 636792, 636801, and 609612
Prevent of nss-sysinit disabling on package upgrade (#636787):
Change system-pkcs11.txt to have nsssyinit turned on by default and
add posttrans syninit scriplet as replacement to post and preun ones
Create pkcs11.txt with correct permissions regardless of umask (#636792)
Setup-nsssysinit.sh reports whether nss-sysinit is turned on or off (#636801)
Add provides nss-pkcs11-devel-static to comply with packaging guidelines (#609612)
2010-09-28 15:10:47 -07:00
Elio Maldonado 6b07fe83cc Remove {nss_util|nss_softokn}_build_version, BuildRequires must match Requires 2010-09-12 12:41:41 -07:00
Elio Maldonado ebac350c8b Merge branch 'f13' into f14 2010-09-11 16:19:26 -07:00
Elio Maldonado c4f8125ecb Bump nss_util_build_version and nss_softokn_build_version to 3.12.7 2010-09-11 16:10:43 -07:00
Elio Maldonado 9c7cfa3932 Merge branch 'f13' into f14
Fix unclosed comment in renegotiate-transitional.patch
2010-09-07 08:19:12 -07:00
Elio Maldonado c953934393 Fix unclosed comment in renegotiate-transitional.patch 2010-09-07 08:10:16 -07:00
Elio Maldonado 87235aed91 Merge with master to update to 3.12.7 2010-09-03 08:14:29 -07:00
Elio Maldonado fdefa43e4d Update to 3.12.7
Delete nss-nolocalsql.patch and rely on an NSS_USE_SYSTEM_SQL variable instead.
Added BuildRequires on available versions of the development pacakges
Added some comments explaing lack of version on nss-sysinit provides
2010-09-03 08:08:47 -07:00
Elio Maldonado 690f79c8fa Merge branch 'master' into f14 2010-08-30 16:22:04 -07:00
Elio Maldonado 0ade450edc Merge branch 'master' into f14 2010-08-30 09:59:26 -07:00
Elio Maldonado e7079bbf54 Merge branch 'master' into f13 2010-08-25 13:17:58 -07:00
Elio Maldonado b7d02ab064 Merge branch 'master' into f14 2010-08-25 13:14:27 -07:00
Elio Maldonado 94bf03b9c2 Merge branch 'master' into f13 2010-08-14 17:17:39 -07:00
Elio Maldonado 78e9db1518 Merge branch 'master' into f14 2010-08-14 16:17:48 -07:00
Elio Maldonado 9b182d22ed Merge branch 'master' into f13 2010-08-10 09:29:36 -07:00
Elio Maldonado 93c126b227 deleted nss-pem-20100809.tar.bz2 2010-08-09 22:12:03 -07:00
Elio Maldonado 764f26ca9d Merge branch 'master' into f14
Conflicts:
	nss.spec
2010-08-09 22:05:27 -07:00
Elio Maldonado 6e2d989f14 Update source tar to add support for PKCS#8 encoded PEM RSA private key files rhbz#614532 2010-08-09 17:47:13 -07:00
Elio Maldonado 96702ba123 Initial pseudo merge for dist-git setup 2010-08-01 21:08:17 -07:00
Fedora Release Engineering 64fa704d3a dist-git conversion 2010-07-29 04:33:25 +00:00
Elio Maldonado 7cbeb9c7bc Require nss-softoken 3.12.6 2010-06-08 19:00:25 +00:00
Elio Maldonado 3ff6f4da98 Fix SIGSEGV within CreateObject #596674 2010-06-07 03:56:21 +00:00
Elio Maldonado d99a5ee0ec PEM module fixes: Collect objects searches through all objects, CopyObject
returns shallow copy, Fix memory leak in pem_mdCryptoOperationRSAPriv
2010-04-14 20:11:50 +00:00
Elio Maldonado 0a6cda68f8 Retagging 2010-04-08 04:34:16 +00:00
Elio Maldonado 6648a39610 Fix sysinit requires: #576071, update PayPalEE test cert: #580207 2010-04-08 02:15:39 +00:00
Elio Maldonado 6feac515e8 Use updated test cert - #580207 2010-04-08 02:11:54 +00:00
Elio Maldonado d8583442b1 Fix nss.pc to not require nss-softokn - resolves: rhbz#575001 2010-03-19 19:05:26 +00:00
Elio Maldonado c6b2155624 Reenable all tests 2010-03-07 03:46:03 +00:00
Elio Maldonado fbb4c50e05 Update to 3.12.6 2010-03-06 23:05:19 +00:00
Jesse Keating 5333c595c9 Initialize branch F-13 for nss 2010-02-17 02:13:17 +00:00
4 changed files with 32 additions and 2849 deletions

File diff suppressed because it is too large Load Diff

View File

@ -1,460 +0,0 @@
diff -up ./mozilla/security/nss/lib/smime/cmscinfo.c.676036 ./mozilla/security/nss/lib/smime/cmscinfo.c
--- ./mozilla/security/nss/lib/smime/cmscinfo.c.676036 2011-02-09 14:03:55.133296665 -0800
+++ ./mozilla/security/nss/lib/smime/cmscinfo.c 2011-02-09 14:03:55.151294755 -0800
@@ -56,27 +56,27 @@
SECStatus
NSS_CMSContentInfo_Private_Init(NSSCMSContentInfo *cinfo)
{
- if (cinfo->private) {
+ if (cinfo->privateInfo) {
return SECSuccess;
}
- cinfo->private = PORT_ZNew(NSSCMSContentInfoPrivate);
- return (cinfo->private) ? SECSuccess: SECFailure;
+ cinfo->privateInfo = PORT_ZNew(NSSCMSContentInfoPrivate);
+ return (cinfo->privateInfo) ? SECSuccess : SECFailure;
}
static void
-nss_cmsContentInfo_private_destroy(NSSCMSContentInfoPrivate *private)
+nss_cmsContentInfo_private_destroy(NSSCMSContentInfoPrivate *privateInfo)
{
- if (private->digcx) {
+ if (privateInfo->digcx) {
/* must destroy digest objects */
- NSS_CMSDigestContext_Cancel(private->digcx);
- private->digcx = NULL;
+ NSS_CMSDigestContext_Cancel(privateInfo->digcx);
+ privateInfo->digcx = NULL;
}
- if (private->ciphcx) {
- NSS_CMSCipherContext_Destroy(private->ciphcx);
- private->ciphcx = NULL;
+ if (privateInfo->ciphcx) {
+ NSS_CMSCipherContext_Destroy(privateInfo->ciphcx);
+ privateInfo->ciphcx = NULL;
}
- PORT_Free(private);
+ PORT_Free(privateInfo);
}
/*
@@ -106,9 +106,9 @@ NSS_CMSContentInfo_Destroy(NSSCMSContent
/* XXX Anything else that needs to be "manually" freed/destroyed? */
break;
}
- if (cinfo->private) {
- nss_cmsContentInfo_private_destroy(cinfo->private);
- cinfo->private = NULL;
+ if (cinfo->privateInfo) {
+ nss_cmsContentInfo_private_destroy(cinfo->privateInfo);
+ cinfo->privateInfo = NULL;
}
if (cinfo->bulkkey) {
PK11_FreeSymKey(cinfo->bulkkey);
@@ -153,7 +153,7 @@ NSS_CMSContentInfo_GetChildContentInfo(N
}
break;
}
- if (ccinfo && !ccinfo->private) {
+ if (ccinfo && !ccinfo->privateInfo) {
NSS_CMSContentInfo_Private_Init(ccinfo);
}
return ccinfo;
@@ -169,7 +169,7 @@ NSS_CMSContentInfo_SetDontStream(NSSCMSC
/* default is streaming, failure to get ccinfo will not effect this */
return dontStream ? SECFailure : SECSuccess ;
}
- cinfo->private->dontStream = dontStream;
+ cinfo->privateInfo->dontStream = dontStream;
return SECSuccess;
}
diff -up ./mozilla/security/nss/lib/smime/cmsdecode.c.676036 ./mozilla/security/nss/lib/smime/cmsdecode.c
--- ./mozilla/security/nss/lib/smime/cmsdecode.c.676036 2011-02-09 14:03:55.149294968 -0800
+++ ./mozilla/security/nss/lib/smime/cmsdecode.c 2011-02-09 14:03:55.152294649 -0800
@@ -458,7 +458,7 @@ nss_cms_decoder_work_data(NSSCMSDecoderC
goto loser;
}
- if (cinfo->private && cinfo->private->ciphcx != NULL) {
+ if (cinfo->privateInfo && cinfo->privateInfo->ciphcx != NULL) {
/*
* we are decrypting.
*
@@ -472,7 +472,7 @@ nss_cms_decoder_work_data(NSSCMSDecoderC
unsigned int buflen; /* length available for decrypted data */
/* find out about the length of decrypted data */
- buflen = NSS_CMSCipherContext_DecryptLength(cinfo->private->ciphcx, len, final);
+ buflen = NSS_CMSCipherContext_DecryptLength(cinfo->privateInfo->ciphcx, len, final);
/*
* it might happen that we did not provide enough data for a full
@@ -503,7 +503,7 @@ nss_cms_decoder_work_data(NSSCMSDecoderC
* any output (see above), but we still need to call NSS_CMSCipherContext_Decrypt to
* keep track of incoming data
*/
- rv = NSS_CMSCipherContext_Decrypt(cinfo->private->ciphcx, buf, &outlen, buflen,
+ rv = NSS_CMSCipherContext_Decrypt(cinfo->privateInfo->ciphcx, buf, &outlen, buflen,
data, len, final);
if (rv != SECSuccess) {
p7dcx->error = PORT_GetError();
@@ -523,8 +523,8 @@ nss_cms_decoder_work_data(NSSCMSDecoderC
/*
* Update the running digests with plaintext bytes (if we need to).
*/
- if (cinfo->private && cinfo->private->digcx)
- NSS_CMSDigestContext_Update(cinfo->private->digcx, data, len);
+ if (cinfo->privateInfo && cinfo->privateInfo->digcx)
+ NSS_CMSDigestContext_Update(cinfo->privateInfo->digcx, data, len);
/* at this point, we have the plain decoded & decrypted data
** which is either more encoded DER (which we need to hand to the child
diff -up ./mozilla/security/nss/lib/smime/cmsdigdata.c.676036 ./mozilla/security/nss/lib/smime/cmsdigdata.c
--- ./mozilla/security/nss/lib/smime/cmsdigdata.c.676036 2011-02-09 14:03:55.134296559 -0800
+++ ./mozilla/security/nss/lib/smime/cmsdigdata.c 2011-02-09 14:03:55.152294649 -0800
@@ -143,8 +143,8 @@ NSS_CMSDigestedData_Encode_BeforeData(NS
/* set up the digests */
if (digd->digestAlg.algorithm.len != 0 && digd->digest.len == 0) {
/* if digest is already there, do nothing */
- digd->contentInfo.private->digcx = NSS_CMSDigestContext_StartSingle(&(digd->digestAlg));
- if (digd->contentInfo.private->digcx == NULL)
+ digd->contentInfo.privateInfo->digcx = NSS_CMSDigestContext_StartSingle(&(digd->digestAlg));
+ if (digd->contentInfo.privateInfo->digcx == NULL)
return SECFailure;
}
return SECSuccess;
@@ -162,12 +162,12 @@ NSS_CMSDigestedData_Encode_AfterData(NSS
{
SECStatus rv = SECSuccess;
/* did we have digest calculation going on? */
- if (digd->contentInfo.private && digd->contentInfo.private->digcx) {
- rv = NSS_CMSDigestContext_FinishSingle(digd->contentInfo.private->digcx,
+ if (digd->contentInfo.privateInfo && digd->contentInfo.privateInfo->digcx) {
+ rv = NSS_CMSDigestContext_FinishSingle(digd->contentInfo.privateInfo->digcx,
digd->cmsg->poolp,
&(digd->digest));
/* error has been set by NSS_CMSDigestContext_FinishSingle */
- digd->contentInfo.private->digcx = NULL;
+ digd->contentInfo.privateInfo->digcx = NULL;
}
return rv;
@@ -194,8 +194,8 @@ NSS_CMSDigestedData_Decode_BeforeData(NS
return SECFailure;
}
- digd->contentInfo.private->digcx = NSS_CMSDigestContext_StartSingle(&(digd->digestAlg));
- if (digd->contentInfo.private->digcx == NULL)
+ digd->contentInfo.privateInfo->digcx = NSS_CMSDigestContext_StartSingle(&(digd->digestAlg));
+ if (digd->contentInfo.privateInfo->digcx == NULL)
return SECFailure;
return SECSuccess;
@@ -213,12 +213,12 @@ NSS_CMSDigestedData_Decode_AfterData(NSS
{
SECStatus rv = SECSuccess;
/* did we have digest calculation going on? */
- if (digd->contentInfo.private && digd->contentInfo.private->digcx) {
- rv = NSS_CMSDigestContext_FinishSingle(digd->contentInfo.private->digcx,
+ if (digd->contentInfo.privateInfo && digd->contentInfo.privateInfo->digcx) {
+ rv = NSS_CMSDigestContext_FinishSingle(digd->contentInfo.privateInfo->digcx,
digd->cmsg->poolp,
&(digd->cdigest));
/* error has been set by NSS_CMSDigestContext_FinishSingle */
- digd->contentInfo.private->digcx = NULL;
+ digd->contentInfo.privateInfo->digcx = NULL;
}
return rv;
diff -up ./mozilla/security/nss/lib/smime/cmsencdata.c.676036 ./mozilla/security/nss/lib/smime/cmsencdata.c
--- ./mozilla/security/nss/lib/smime/cmsencdata.c.676036 2011-02-09 14:03:55.135296453 -0800
+++ ./mozilla/security/nss/lib/smime/cmsencdata.c 2011-02-09 14:03:55.153294543 -0800
@@ -200,9 +200,9 @@ NSS_CMSEncryptedData_Encode_BeforeData(N
/* this may modify algid (with IVs generated in a token).
* it is therefore essential that algid is a pointer to the "real" contentEncAlg,
* not just to a copy */
- cinfo->private->ciphcx = NSS_CMSCipherContext_StartEncrypt(encd->cmsg->poolp, bulkkey, algid);
+ cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartEncrypt(encd->cmsg->poolp, bulkkey, algid);
PK11_FreeSymKey(bulkkey);
- if (cinfo->private->ciphcx == NULL)
+ if (cinfo->privateInfo->ciphcx == NULL)
return SECFailure;
return SECSuccess;
@@ -214,9 +214,9 @@ NSS_CMSEncryptedData_Encode_BeforeData(N
SECStatus
NSS_CMSEncryptedData_Encode_AfterData(NSSCMSEncryptedData *encd)
{
- if (encd->contentInfo.private && encd->contentInfo.private->ciphcx) {
- NSS_CMSCipherContext_Destroy(encd->contentInfo.private->ciphcx);
- encd->contentInfo.private->ciphcx = NULL;
+ if (encd->contentInfo.privateInfo && encd->contentInfo.privateInfo->ciphcx) {
+ NSS_CMSCipherContext_Destroy(encd->contentInfo.privateInfo->ciphcx);
+ encd->contentInfo.privateInfo->ciphcx = NULL;
}
/* nothing to do after data */
@@ -255,8 +255,8 @@ NSS_CMSEncryptedData_Decode_BeforeData(N
}
rv = SECFailure;
- cinfo->private->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
- if (cinfo->private->ciphcx == NULL)
+ cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
+ if (cinfo->privateInfo->ciphcx == NULL)
goto loser; /* error has been set by NSS_CMSCipherContext_StartDecrypt */
@@ -275,9 +275,9 @@ loser:
SECStatus
NSS_CMSEncryptedData_Decode_AfterData(NSSCMSEncryptedData *encd)
{
- if (encd->contentInfo.private && encd->contentInfo.private->ciphcx) {
- NSS_CMSCipherContext_Destroy(encd->contentInfo.private->ciphcx);
- encd->contentInfo.private->ciphcx = NULL;
+ if (encd->contentInfo.privateInfo && encd->contentInfo.privateInfo->ciphcx) {
+ NSS_CMSCipherContext_Destroy(encd->contentInfo.privateInfo->ciphcx);
+ encd->contentInfo.privateInfo->ciphcx = NULL;
}
return SECSuccess;
diff -up ./mozilla/security/nss/lib/smime/cmsencode.c.676036 ./mozilla/security/nss/lib/smime/cmsencode.c
--- ./mozilla/security/nss/lib/smime/cmsencode.c.676036 2011-02-09 14:03:55.136296347 -0800
+++ ./mozilla/security/nss/lib/smime/cmsencode.c 2011-02-09 14:03:55.154294437 -0800
@@ -332,7 +332,7 @@ nss_cms_before_data(NSSCMSEncoderContext
* Indicate that we are streaming. We will be streaming until we
* get past the contents bytes.
*/
- if (!cinfo->private || !cinfo->private->dontStream)
+ if (!cinfo->privateInfo || !cinfo->privateInfo->dontStream)
SEC_ASN1EncoderSetStreaming(childp7ecx->ecx);
/*
@@ -430,23 +430,23 @@ nss_cms_encoder_work_data(NSSCMSEncoderC
}
/* Update the running digest. */
- if (len && cinfo->private && cinfo->private->digcx != NULL)
- NSS_CMSDigestContext_Update(cinfo->private->digcx, data, len);
+ if (len && cinfo->privateInfo && cinfo->privateInfo->digcx != NULL)
+ NSS_CMSDigestContext_Update(cinfo->privateInfo->digcx, data, len);
/* Encrypt this chunk. */
- if (cinfo->private && cinfo->private->ciphcx != NULL) {
+ if (cinfo->privateInfo && cinfo->privateInfo->ciphcx != NULL) {
unsigned int inlen; /* length of data being encrypted */
unsigned int outlen; /* length of encrypted data */
unsigned int buflen; /* length available for encrypted data */
inlen = len;
- buflen = NSS_CMSCipherContext_EncryptLength(cinfo->private->ciphcx, inlen, final);
+ buflen = NSS_CMSCipherContext_EncryptLength(cinfo->privateInfo->ciphcx, inlen, final);
if (buflen == 0) {
/*
* No output is expected, but the input data may be buffered
* so we still have to call Encrypt.
*/
- rv = NSS_CMSCipherContext_Encrypt(cinfo->private->ciphcx, NULL, NULL, 0,
+ rv = NSS_CMSCipherContext_Encrypt(cinfo->privateInfo->ciphcx, NULL, NULL, 0,
data, inlen, final);
if (final) {
len = 0;
@@ -463,7 +463,7 @@ nss_cms_encoder_work_data(NSSCMSEncoderC
if (buf == NULL) {
rv = SECFailure;
} else {
- rv = NSS_CMSCipherContext_Encrypt(cinfo->private->ciphcx, buf, &outlen, buflen,
+ rv = NSS_CMSCipherContext_Encrypt(cinfo->privateInfo->ciphcx, buf, &outlen, buflen,
data, inlen, final);
data = buf;
len = outlen;
@@ -484,7 +484,7 @@ nss_cms_encoder_work_data(NSSCMSEncoderC
done:
- if (cinfo->private && cinfo->private->ciphcx != NULL) {
+ if (cinfo->privateInfo && cinfo->privateInfo->ciphcx != NULL) {
if (dest != NULL) {
dest->data = buf;
dest->len = len;
@@ -592,7 +592,7 @@ NSS_CMSEncoder_Start(NSSCMSMessage *cmsg
* Indicate that we are streaming. We will be streaming until we
* get past the contents bytes.
*/
- if (!cinfo->private || !cinfo->private->dontStream)
+ if (!cinfo->privateInfo || !cinfo->privateInfo->dontStream)
SEC_ASN1EncoderSetStreaming(p7ecx->ecx);
/*
diff -up ./mozilla/security/nss/lib/smime/cmsenvdata.c.676036 ./mozilla/security/nss/lib/smime/cmsenvdata.c
--- ./mozilla/security/nss/lib/smime/cmsenvdata.c.676036 2011-02-09 14:03:55.137296241 -0800
+++ ./mozilla/security/nss/lib/smime/cmsenvdata.c 2011-02-09 14:03:55.155294331 -0800
@@ -289,9 +289,9 @@ NSS_CMSEnvelopedData_Encode_BeforeData(N
/* this may modify algid (with IVs generated in a token).
* it is essential that algid is a pointer to the contentEncAlg data, not a
* pointer to a copy! */
- cinfo->private->ciphcx = NSS_CMSCipherContext_StartEncrypt(envd->cmsg->poolp, bulkkey, algid);
+ cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartEncrypt(envd->cmsg->poolp, bulkkey, algid);
PK11_FreeSymKey(bulkkey);
- if (cinfo->private->ciphcx == NULL)
+ if (cinfo->privateInfo->ciphcx == NULL)
return SECFailure;
return SECSuccess;
@@ -303,9 +303,9 @@ NSS_CMSEnvelopedData_Encode_BeforeData(N
SECStatus
NSS_CMSEnvelopedData_Encode_AfterData(NSSCMSEnvelopedData *envd)
{
- if (envd->contentInfo.private && envd->contentInfo.private->ciphcx) {
- NSS_CMSCipherContext_Destroy(envd->contentInfo.private->ciphcx);
- envd->contentInfo.private->ciphcx = NULL;
+ if (envd->contentInfo.privateInfo && envd->contentInfo.privateInfo->ciphcx) {
+ NSS_CMSCipherContext_Destroy(envd->contentInfo.privateInfo->ciphcx);
+ envd->contentInfo.privateInfo->ciphcx = NULL;
}
/* nothing else to do after data */
@@ -338,7 +338,7 @@ NSS_CMSEnvelopedData_Decode_BeforeData(N
}
/* look if one of OUR cert's issuerSN is on the list of recipients, and if so, */
- /* get the cert and private key for it right away */
+ /* get the cert and private key for it right away */
recipient_list = nss_cms_recipient_list_create(envd->recipientInfos);
if (recipient_list == NULL)
goto loser;
@@ -390,8 +390,8 @@ NSS_CMSEnvelopedData_Decode_BeforeData(N
goto loser;
}
rv = SECFailure;
- cinfo->private->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
- if (cinfo->private->ciphcx == NULL)
+ cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
+ if (cinfo->privateInfo->ciphcx == NULL)
goto loser; /* error has been set by NSS_CMSCipherContext_StartDecrypt */
@@ -411,9 +411,9 @@ loser:
SECStatus
NSS_CMSEnvelopedData_Decode_AfterData(NSSCMSEnvelopedData *envd)
{
- if (envd && envd->contentInfo.private && envd->contentInfo.private->ciphcx) {
- NSS_CMSCipherContext_Destroy(envd->contentInfo.private->ciphcx);
- envd->contentInfo.private->ciphcx = NULL;
+ if (envd && envd->contentInfo.privateInfo && envd->contentInfo.privateInfo->ciphcx) {
+ NSS_CMSCipherContext_Destroy(envd->contentInfo.privateInfo->ciphcx);
+ envd->contentInfo.privateInfo->ciphcx = NULL;
}
return SECSuccess;
diff -up ./mozilla/security/nss/lib/smime/cms.h.676036 ./mozilla/security/nss/lib/smime/cms.h
--- ./mozilla/security/nss/lib/smime/cms.h.676036 2011-02-09 14:05:46.178513159 -0800
+++ ./mozilla/security/nss/lib/smime/cms.h 2011-02-09 14:35:29.675010023 -0800
@@ -1171,7 +1171,7 @@ NSS_CMSDEREncode(NSSCMSMessage *cmsg, SE
* against that data structure.
*/
SECStatus NSS_CMSType_RegisterContentType(SECOidTag type,
- SEC_ASN1Template *template, size_t size,
+ SEC_ASN1Template *asn1Template, size_t size,
NSSCMSGenericWrapperDataDestroy destroy,
NSSCMSGenericWrapperDataCallback decode_before,
NSSCMSGenericWrapperDataCallback decode_after,
diff -up ./mozilla/security/nss/lib/smime/cmssigdata.c.676036 ./mozilla/security/nss/lib/smime/cmssigdata.c
--- ./mozilla/security/nss/lib/smime/cmssigdata.c.676036 2011-02-09 14:03:55.139296029 -0800
+++ ./mozilla/security/nss/lib/smime/cmssigdata.c 2011-02-09 14:03:55.155294331 -0800
@@ -228,11 +228,11 @@ NSS_CMSSignedData_Encode_BeforeData(NSSC
}
/* set up the digests */
if (sigd->digests && sigd->digests[0]) {
- sigd->contentInfo.private->digcx = NULL; /* don't attempt to make new ones. */
+ sigd->contentInfo.privateInfo->digcx = NULL; /* don't attempt to make new ones. */
} else if (sigd->digestAlgorithms != NULL) {
- sigd->contentInfo.private->digcx =
+ sigd->contentInfo.privateInfo->digcx =
NSS_CMSDigestContext_StartMultiple(sigd->digestAlgorithms);
- if (sigd->contentInfo.private->digcx == NULL)
+ if (sigd->contentInfo.privateInfo->digcx == NULL)
return SECFailure;
}
return SECSuccess;
@@ -272,11 +272,11 @@ NSS_CMSSignedData_Encode_AfterData(NSSCM
cinfo = &(sigd->contentInfo);
/* did we have digest calculation going on? */
- if (cinfo->private && cinfo->private->digcx) {
- rv = NSS_CMSDigestContext_FinishMultiple(cinfo->private->digcx, poolp,
+ if (cinfo->privateInfo && cinfo->privateInfo->digcx) {
+ rv = NSS_CMSDigestContext_FinishMultiple(cinfo->privateInfo->digcx, poolp,
&(sigd->digests));
/* error has been set by NSS_CMSDigestContext_FinishMultiple */
- cinfo->private->digcx = NULL;
+ cinfo->privateInfo->digcx = NULL;
if (rv != SECSuccess)
goto loser;
}
@@ -409,8 +409,8 @@ NSS_CMSSignedData_Decode_BeforeData(NSSC
/* set up the digests */
if (sigd->digestAlgorithms != NULL && sigd->digests == NULL) {
/* if digests are already there, do nothing */
- sigd->contentInfo.private->digcx = NSS_CMSDigestContext_StartMultiple(sigd->digestAlgorithms);
- if (sigd->contentInfo.private->digcx == NULL)
+ sigd->contentInfo.privateInfo->digcx = NSS_CMSDigestContext_StartMultiple(sigd->digestAlgorithms);
+ if (sigd->contentInfo.privateInfo->digcx == NULL)
return SECFailure;
}
return SECSuccess;
@@ -431,11 +431,11 @@ NSS_CMSSignedData_Decode_AfterData(NSSCM
}
/* did we have digest calculation going on? */
- if (sigd->contentInfo.private && sigd->contentInfo.private->digcx) {
- rv = NSS_CMSDigestContext_FinishMultiple(sigd->contentInfo.private->digcx,
+ if (sigd->contentInfo.privateInfo && sigd->contentInfo.privateInfo->digcx) {
+ rv = NSS_CMSDigestContext_FinishMultiple(sigd->contentInfo.privateInfo->digcx,
sigd->cmsg->poolp, &(sigd->digests));
/* error set by NSS_CMSDigestContext_FinishMultiple */
- sigd->contentInfo.private->digcx = NULL;
+ sigd->contentInfo.privateInfo->digcx = NULL;
}
return rv;
}
diff -up ./mozilla/security/nss/lib/smime/cmst.h.676036 ./mozilla/security/nss/lib/smime/cmst.h
--- ./mozilla/security/nss/lib/smime/cmst.h.676036 2011-02-09 14:03:55.141295816 -0800
+++ ./mozilla/security/nss/lib/smime/cmst.h 2011-02-09 14:03:55.156294225 -0800
@@ -182,7 +182,7 @@ struct NSSCMSContentInfoStr {
* (only used by creation code) */
SECOidTag contentEncAlgTag; /* oid tag of encryption algorithm
* (only used by creation code) */
- NSSCMSContentInfoPrivate *private; /* place for NSS private info */
+ NSSCMSContentInfoPrivate *privateInfo; /* place for NSS private info */
void *reserved; /* keep binary compatibility */
};
diff -up ./mozilla/security/nss/lib/smime/cmsudf.c.676036 ./mozilla/security/nss/lib/smime/cmsudf.c
--- ./mozilla/security/nss/lib/smime/cmsudf.c.676036 2011-02-09 14:08:23.907775957 -0800
+++ ./mozilla/security/nss/lib/smime/cmsudf.c 2011-02-09 14:36:56.043841454 -0800
@@ -435,7 +435,7 @@ NSS_CMSGenericWrapperData_Encode_AfterDa
SECStatus
NSS_CMSType_RegisterContentType(SECOidTag type,
- SEC_ASN1Template *template, size_t size,
+ SEC_ASN1Template *asn1Template, size_t size,
NSSCMSGenericWrapperDataDestroy destroy,
NSSCMSGenericWrapperDataCallback decode_before,
NSSCMSGenericWrapperDataCallback decode_after,
@@ -462,10 +462,10 @@ NSS_CMSType_RegisterContentType(SECOidTa
return SECSuccess;
}
typeInfo = PORT_ArenaNew(nsscmstypeArena, nsscmstypeInfo);
- typeInfo->type =type;
+ typeInfo->type = type;
typeInfo->size = size;
typeInfo->isData = isData;
- typeInfo->template = template;
+ typeInfo->template = asn1Template;
typeInfo->destroy = destroy;
typeInfo->decode_before = decode_before;
typeInfo->decode_after = decode_after;

View File

@ -1,17 +0,0 @@
Handle decoding of one CMS structure inside another. Plain data as the
top-level item in a message needs work.
diff -ur ./mozilla/security/nss/lib/smime/cmsdecode.c ./mozilla/security/nss/lib/smime/cmsdecode.c
--- ./mozilla/security/nss/lib/smime/cmsdecode.c 2010-12-23 13:03:41.000000000 -0500
+++ ./mozilla/security/nss/lib/smime/cmsdecode.c 2011-01-12 15:22:22.245908999 -0500
@@ -307,6 +307,9 @@
if (childp7dcx->content.pointer == NULL)
goto loser;
+ /* give the parent a copy of the pointer so that it doesn't get lost */
+ cinfo->content.pointer = childp7dcx->content.pointer;
+
/* start the child decoder */
childp7dcx->dcx = SEC_ASN1DecoderStart(poolp, childp7dcx->content.pointer,
template);

122
nss.spec
View File

@ -6,7 +6,7 @@
Summary: Network Security Services
Name: nss
Version: 3.12.9
Release: 15%{?dist}
Release: 11%{?dist}
License: MPLv1.1 or GPLv2+ or LGPLv2+
URL: http://www.mozilla.org/projects/security/pki/nss/
Group: System Environment/Libraries
@ -44,9 +44,6 @@ Patch6: nss-enable-pem.patch
Patch7: nsspem-642433.patch
Patch8: 0001-Bug-695011-PEM-logging.patch
Patch11: honor-user-trust-preferences.patch
Patch12: allow-content-types-beyond-smime.patch
Patch13: nss-recurse.patch
Patch14: dont-use-cpp-reserved-words.patch
Patch15: swap-internal-key-slot.patch
Patch16: nss-539183.patch
@ -123,9 +120,6 @@ low level services.
%patch7 -p0 -b .642433
%patch8 -p1 -b .695011
%patch11 -p1 -b .643134
%patch12 -p1 -b .contenttypes
%patch13 -p1 -b .recurse
%patch14 -p1 -b .676036
%patch15 -p1 -b .jss
%patch16 -p0 -b .539183
@ -287,12 +281,14 @@ cd ../../../../
killall $RANDSERV || :
TEST_FAILURES=`grep -c FAILED ./mozilla/tests_results/security/localhost.1/output.log` || :
# there is some long standing testsuite failres on arm lets make them non fatal till they can be fixed
%ifnarch %{arm}
if [ $TEST_FAILURES -ne 0 ]; then
echo "error: test suite returned failure(s)"
exit 1
fi
echo "test suite completed"
%endif
%install
@ -385,7 +381,7 @@ rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/secoidt.h
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/secport.h
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/utilrename.h
#remove the nss-softokn-devel and nss-softokn-freebl-devel headers
#remove headers shipped by nss-softokn-devel and nss-softokn-freebl-devel
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/alghmac.h
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/blapit.h
rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/ecl-exp.h
@ -521,109 +517,55 @@ rm -rf $RPM_BUILD_ROOT/%{_includedir}/nss3/nsslowhash.h
%changelog
* Mon Apr 11 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-15
- Implement PEM logging using NSPR's own (#695011)
* Fri May 20 2011 Dennis Gilmore <dennis@ausil.us> - 3.12.9-11
- make testsuite failures non fatal on arm
* Wed Mar 23 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-14
* Mon Apr 11 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-10
- Implement PEM logging using NSPR's own (#695011)
- Update the expired PayPalEE test certificate to one good until April 1, 2013
* Wed Mar 25 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-9
- Update to NSS_3.12.9_WITH_CKBI_1_82_RTM
* Wed Feb 24 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-13
* Wed Feb 24 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-8
- Short-term fix for ssl test suites hangs on ipv6 type connections (#539183)
* Fri Feb 18 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-12
- Add a missing requires for pkcs11-devel (#675196)
* Tue Feb 15 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-11
- Run the test suites in the check section (#677809)
* Thu Feb 10 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-10
- Fix cms headers to not use c++ reserved words (#676036)
- Reenabling Bug 499444 patches
- Fix to swap internal key slot on fips mode switches
* Tue Feb 08 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-9
- Revert patches for 499444 until all c++ reserved words are found and extirpated
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 3.12.9-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
* Tue Feb 08 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-7
- Fix cms header to not use c++ reserved word (#676036)
- Reenable patches for bug 499444
* Tue Feb 08 2011 Christopher Aillon <caillon@redhat.com> - 3.12.9-6
- Revert patches for 499444 as they use a C++ reserved word and
cause compilation of Firefox to fail
* Fri Feb 04 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-5
- Fix the earlier infinite recursion patch (#499444)
- Remove a header that now nss-softokn-freebl-devel ships
* Tue Feb 01 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-4
- Fix infinite recursion when encoding NSS enveloped/digested data (#499444)
* Mon Jan 31 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-3
- Update the cacert trust patch per upstream review requests (#633043)
* Wed Jan 19 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-2
- Fix to swap internal key slot on fips mode switches, related to #633043
- Remove a header that now nss-softokn-freebl-devel ships (#675196)
- Fix to honor the user's cert trust preferences (#633043)
- Remove obsoleted patch
* Wed Jan 12 2011 Elio Maldonado <emaldona@redhat.com> - 3.12.9-1
- Update to 3.12.9
* Mon Dec 27 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.9-0.1.beta2
- Rebuilt according to fedora pre-release package naming guidelines
* Fri Nov 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-3
- Update test certificate which had expired
* Fri Dec 10 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8.99.2-1
- Update to NSS_3_12_9_BETA2
- Fix libpnsspem crash when cacert dir contains other directories (#642433)
* Wed Dec 08 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8.99.1-1
- Update to NSS_3_12_9_BETA1
* Thu Nov 25 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-9
- Update pem source tar with fixes for 614532 and 596674
- Remove no longer needed patches
* Fri Nov 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-8
- Update PayPalEE.cert test certificate which had expired
* Sun Oct 31 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-7
- Tell rpm not to verify md5, size, and modtime of configurations file
* Wed Oct 18 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-6
- Fix certificates trust order (#643134)
- Apply nss-sysinit-userdb-first.patch last
* Wed Oct 06 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-5
* Wed Oct 06 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-2
- Move triggerpostun -n nss-sysinit script ahead of the other ones (#639248)
* Tue Oct 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-4
* Tue Oct 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-1
- Update to 3.12.8
- Fix invalid %postun scriptlet (#639248)
* Wed Sep 29 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-3
* Thu Sep 30 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-9
- Fix version on triggerpostun scriplet (#636787)
* Wed Sep 29 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-8
- Replace posttrans sysinit scriptlet with a triggerpostun one (#636787)
- Fix and cleanup the setup-nsssysinit.sh script (#636792, #636801)
* Mon Sep 27 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-2
- Add posttrans scriptlet (#636787)
* Thu Sep 23 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.8-1
- Update to 3.12.8
- Prevent disabling of nss-sysinit on package upgrade (#636787)
* Tue Sep 28 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-7
- Prevent of nss-sysinit disabling on package upgrade (#636787)
- Create pkcs11.txt with correct permissions regardless of umask (#636792)
- Setup-nsssysinit.sh reports whether nss-sysinit is turned on or off (#636801)
- Added provides pkcs11-devel-static to comply with packaging guidelines (#609612)
- Add provides nss-pkcs11-devel-static to comply with packaging guidelines (#609612)
* Sat Sep 18 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7.99.4-1
- NSS 3.12.8 RC0
* Sun Sep 12 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-6
- Remove {nss_util|nss_softokn}_build_version, BuildRequires must match Requires
* Sun Sep 05 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7.99.3-2
- Fix nss-util_version and nss_softokn_version required to be 3.12.7.99.3
* Sat Sep 11 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-5
- Bump nss_util_build_version and nss_softokn_build_version to 3.12.7
* Sat Sep 04 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7.99.3-1
- NSS 3.12.8 Beta3
* Mon Sep 07 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-4
- Fix unclosed comment in renegotiate-transitional.patch
* Sat Aug 28 2010 Elio Maldonado <emaldona@redhat.com> - 3.12.7-3