diff options
author | Lars Wendler <polynomial-c@gentoo.org> | 2017-01-07 02:09:28 +0100 |
---|---|---|
committer | Lars Wendler <polynomial-c@gentoo.org> | 2017-01-07 02:10:42 +0100 |
commit | ace7925507486ba6c86397c82f8bd9184599d81d (patch) | |
tree | 250d83d7d5ced3e6e4d7614214de9935fd5e8e43 /www-client/seamonkey/files/firefox-52-curve.patch | |
parent | media-video/vlc: Added sub-slot dep for media-libs/libass. (diff) | |
download | gentoo-ace7925507486ba6c86397c82f8bd9184599d81d.tar.gz gentoo-ace7925507486ba6c86397c82f8bd9184599d81d.tar.bz2 gentoo-ace7925507486ba6c86397c82f8bd9184599d81d.zip |
www-client/seamonkey: Added a fix for an configure issue with sed-4.3
This fixes Gentoo bug #604696
Furthermore added a patch so the package works reliably with nss-3.28
This fixes Gentoo bug #603622
Both fixes don't affect stable so no revbump necessary.
Package-Manager: Portage-2.3.3, Repoman-2.3.1
Diffstat (limited to 'www-client/seamonkey/files/firefox-52-curve.patch')
-rw-r--r-- | www-client/seamonkey/files/firefox-52-curve.patch | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/www-client/seamonkey/files/firefox-52-curve.patch b/www-client/seamonkey/files/firefox-52-curve.patch new file mode 100644 index 000000000000..508d580524d7 --- /dev/null +++ b/www-client/seamonkey/files/firefox-52-curve.patch @@ -0,0 +1,34 @@ +# HG changeset patch +# User Franziskus Kiefer <franziskuskiefer@gmail.com> +# Date 1469717280 -7200 +# Thu Jul 28 16:48:00 2016 +0200 +# Node ID 95aa61f1e3562e526bf88179d9d078fd90ad1bda +# Parent d42aacfe34af25e2f5110e2ca3d24a210eabeb33 +Update keybits in H2, r=mt + +MozReview-Commit-ID: 35oWoDMqe1Y + +diff --git a/netwerk/protocol/http/Http2Session.cpp b/netwerk/protocol/http/Http2Session.cpp +--- a/netwerk/protocol/http/Http2Session.cpp ++++ b/netwerk/protocol/http/Http2Session.cpp +@@ -3544,18 +3544,18 @@ Http2Session::ConfirmTLSProfile() + RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY); + } + + uint32_t keybits = ssl->GetKEAKeyBits(); + if (kea == ssl_kea_dh && keybits < 2048) { + LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to DH %d < 2048\n", + this, keybits)); + RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY); +- } else if (kea == ssl_kea_ecdh && keybits < 256) { // 256 bits is "security level" of 128 +- LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 256\n", ++ } else if (kea == ssl_kea_ecdh && keybits < 224) { // see rfc7540 9.2.1. ++ LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 224\n", + this, keybits)); + RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY); + } + + int16_t macAlgorithm = ssl->GetMACAlgorithmUsed(); + LOG3(("Http2Session::ConfirmTLSProfile %p MAC Algortihm (aead==6) %d\n", + this, macAlgorithm)); + if (macAlgorithm != nsISSLSocketControl::SSL_MAC_AEAD) { |