diff options
author | wiz <wiz@pkgsrc.org> | 2020-10-31 19:36:30 +0000 |
---|---|---|
committer | wiz <wiz@pkgsrc.org> | 2020-10-31 19:36:30 +0000 |
commit | 3bec81c0d36230872faf2caa14a8d1a32a4ddc06 (patch) | |
tree | ee8c7ebbfadb2b9469d23ec05ce7df5c4a694deb /devel/nss | |
parent | 7b80debe6895e6abdda19622407a15dc2b5aa8c0 (diff) | |
download | pkgsrc-3bec81c0d36230872faf2caa14a8d1a32a4ddc06.tar.gz |
nss: update to 3.58nb1.
Add a post-release patch that broke some applications
https://hg.mozilla.org/projects/nss/rev/b03a4fc5b902498414b02640dcb2717dfef9682f
Changes nout found.
Diffstat (limited to 'devel/nss')
-rw-r--r-- | devel/nss/Makefile | 7 | ||||
-rw-r--r-- | devel/nss/PLIST | 3 | ||||
-rw-r--r-- | devel/nss/distinfo | 15 | ||||
-rw-r--r-- | devel/nss/patches/patch-nss_cmd_shlibsign_sign.sh (renamed from devel/nss/patches/patch-security_nss_cmd_shlibsign_sign.sh) | 2 | ||||
-rw-r--r-- | devel/nss/patches/patch-nss_gtests_ssl__gtest_ssl__tls13compat__unittest.cc | 52 | ||||
-rw-r--r-- | devel/nss/patches/patch-nss_lib_ssl_ssl3con.c | 49 | ||||
-rw-r--r-- | devel/nss/patches/patch-nss_lib_ssl_sslimpl.h | 18 |
7 files changed, 135 insertions, 11 deletions
diff --git a/devel/nss/Makefile b/devel/nss/Makefile index 25bb711316f..a242296ddff 100644 --- a/devel/nss/Makefile +++ b/devel/nss/Makefile @@ -1,8 +1,9 @@ -# $NetBSD: Makefile,v 1.192 2020/09/19 23:54:14 ryoon Exp $ +# $NetBSD: Makefile,v 1.193 2020/10/31 19:36:30 wiz Exp $ DISTNAME= nss-${NSS_RELEASE:S/.0$//} -NSS_RELEASE= 3.57.0 -CATEGORIES= security +NSS_RELEASE= 3.58.0 +PKGREVISION= 1 +CATEGORIES= devel security MASTER_SITES= ${MASTER_SITE_MOZILLA_ALL:=security/nss/releases/NSS_${NSS_DIST_DIR_VERSION:S/_0$//}_RTM/src/} MAINTAINER= pkgsrc-users@NetBSD.org diff --git a/devel/nss/PLIST b/devel/nss/PLIST index 4ea4655dba0..c66594c86e1 100644 --- a/devel/nss/PLIST +++ b/devel/nss/PLIST @@ -1,4 +1,4 @@ -@comment $NetBSD: PLIST,v 1.25 2019/12/03 14:29:21 ryoon Exp $ +@comment $NetBSD: PLIST,v 1.26 2020/10/31 19:36:30 wiz Exp $ bin/certutil bin/cmsutil bin/crlutil @@ -80,6 +80,7 @@ include/nss/nss/p12.h include/nss/nss/p12plcy.h include/nss/nss/p12t.h include/nss/nss/pk11func.h +include/nss/nss/pk11hpke.h include/nss/nss/pk11pqg.h include/nss/nss/pk11priv.h include/nss/nss/pk11pub.h diff --git a/devel/nss/distinfo b/devel/nss/distinfo index 7402ef3beb0..ec5f37e9d93 100644 --- a/devel/nss/distinfo +++ b/devel/nss/distinfo @@ -1,9 +1,9 @@ -$NetBSD: distinfo,v 1.118 2020/09/19 23:54:14 ryoon Exp $ +$NetBSD: distinfo,v 1.119 2020/10/31 19:36:30 wiz Exp $ -SHA1 (nss-3.57.tar.gz) = ee150322d22ca2b449b31a9a4188eab156e0a13d -RMD160 (nss-3.57.tar.gz) = d00996339012f73e11eb61d9e162e334921e4082 -SHA512 (nss-3.57.tar.gz) = 7e312d7539a26f57b968548935a7715cfa895aa61da21d0542ae45b71cb16f63167728534cdfd15f8eca68c75753a0df3d05e87b4c5acaabbda63c736e552ea2 -Size (nss-3.57.tar.gz) = 81712830 bytes +SHA1 (nss-3.58.tar.gz) = f0c572b72921690c77d59471fe21cfa811d8b876 +RMD160 (nss-3.58.tar.gz) = 7c6f03a8ca20ec6bcc43435538d84bb940e562f3 +SHA512 (nss-3.58.tar.gz) = 03d2ab1517ac07620ea3f02dcf680cf019e0129006ff2559b2d0a047036340c20b98c9679b17a594e5502aa30e158caf309f046901b9ec7c7adeeaa13ec50b80 +Size (nss-3.58.tar.gz) = 81846254 bytes SHA1 (patch-am) = fea682bf03bc8b645049f93ed58554ca45f47aca SHA1 (patch-an) = 4ab22f2a575676b5b640bc9a760b83eb05c75e69 SHA1 (patch-md) = 8547c9414332c02221b96719dea1e09cb741f4d1 @@ -13,13 +13,16 @@ SHA1 (patch-mg) = 3c878548c98bdea559a3e653e63e0ed22a2a8834 SHA1 (patch-mj) = 08ca1a37afce99e0292a20348fc6855547f44e8a SHA1 (patch-mn) = 5b79783e48249044be1a904a6cfd20ba175b5fd4 SHA1 (patch-nss_cmd_platlibs.mk) = 01f4350de601b29c94e8a791a28daca226866bb6 +SHA1 (patch-nss_cmd_shlibsign_sign.sh) = 7948b7b502a4c148ee185836dde8a84d3aa388af SHA1 (patch-nss_coreconf_NetBSD.mk) = ed95aa1c245c9f2b8fda0a1769f9599223b61dbf SHA1 (patch-nss_coreconf_OpenBSD.mk) = 1a4c3711d5d1f7f9e8d58b36145b15d7e444d754 SHA1 (patch-nss_coreconf_command.mk) = a7b682d367825b48f8802fa30cee83f10680bb74 +SHA1 (patch-nss_gtests_ssl__gtest_ssl__tls13compat__unittest.cc) = 85c61f09a833ae0039294f0475931474d69a913e SHA1 (patch-nss_lib_freebl_aes-armv8.c) = aa698f61dd3d66ba707a9b5425bc15d057244ad7 SHA1 (patch-nss_lib_freebl_gcm-aarch64.c) = 311cfe7ca58e91285052d0ca27bd2df3f325071b SHA1 (patch-nss_lib_freebl_md5.c) = 5cbec40695e296f0713895fb85cd37f6df76b85b +SHA1 (patch-nss_lib_ssl_ssl3con.c) = 04dc8ca7714bb1295ff9b470aed325cac1846950 +SHA1 (patch-nss_lib_ssl_sslimpl.h) = 91f7da0f30469bb81b416431e8f1268edbb82e5f SHA1 (patch-nss_lib_util_utilpars.c) = 5d3000515b01037929730a752b7d7a0f46f06deb SHA1 (patch-nss_tests_all.sh) = b328778b538db66f5447f962f23afd6f650f7071 SHA1 (patch-nss_tests_merge_merge.sh) = 42a4866d226b1076740ba9a5e42c7604f2cb15a7 -SHA1 (patch-security_nss_cmd_shlibsign_sign.sh) = 7948b7b502a4c148ee185836dde8a84d3aa388af diff --git a/devel/nss/patches/patch-security_nss_cmd_shlibsign_sign.sh b/devel/nss/patches/patch-nss_cmd_shlibsign_sign.sh index 36326df7a08..0348519dfc2 100644 --- a/devel/nss/patches/patch-security_nss_cmd_shlibsign_sign.sh +++ b/devel/nss/patches/patch-nss_cmd_shlibsign_sign.sh @@ -1,4 +1,4 @@ -$NetBSD: patch-security_nss_cmd_shlibsign_sign.sh,v 1.2 2013/07/20 09:28:12 ryoon Exp $ +$NetBSD: patch-nss_cmd_shlibsign_sign.sh,v 1.1 2020/10/31 19:36:30 wiz Exp $ This tries to dlopen libsoftokn3.so which is linked against sqlite3, so we need a directory containing libsqlite3.so in the search path, diff --git a/devel/nss/patches/patch-nss_gtests_ssl__gtest_ssl__tls13compat__unittest.cc b/devel/nss/patches/patch-nss_gtests_ssl__gtest_ssl__tls13compat__unittest.cc new file mode 100644 index 00000000000..6e183d9a113 --- /dev/null +++ b/devel/nss/patches/patch-nss_gtests_ssl__gtest_ssl__tls13compat__unittest.cc @@ -0,0 +1,52 @@ +$NetBSD: patch-nss_gtests_ssl__gtest_ssl__tls13compat__unittest.cc,v 1.1 2020/10/31 19:36:30 wiz Exp $ + +https://hg.mozilla.org/projects/nss/rev/b03a4fc5b902498414b02640dcb2717dfef9682f + +--- nss/gtests/ssl_gtest/ssl_tls13compat_unittest.cc.orig 2020-10-16 14:50:49.000000000 +0000 ++++ nss/gtests/ssl_gtest/ssl_tls13compat_unittest.cc +@@ -348,8 +348,8 @@ TEST_F(TlsConnectStreamTls13, ChangeCiph + client_->CheckErrorCode(SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT); + } + +-// The server rejects a ChangeCipherSpec if the client advertises an +-// empty session ID. ++// The server accepts a ChangeCipherSpec even if the client advertises ++// an empty session ID. + TEST_F(TlsConnectStreamTls13, ChangeCipherSpecAfterClientHelloEmptySid) { + EnsureTlsSetup(); + ConfigureVersion(SSL_LIBRARY_VERSION_TLS_1_3); +@@ -358,9 +358,8 @@ TEST_F(TlsConnectStreamTls13, ChangeCiph + client_->Handshake(); // Send ClientHello + client_->SendDirect(DataBuffer(kCannedCcs, sizeof(kCannedCcs))); // Send CCS + +- server_->ExpectSendAlert(kTlsAlertUnexpectedMessage); +- server_->Handshake(); // Consume ClientHello and CCS +- server_->CheckErrorCode(SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER); ++ Handshake(); ++ CheckConnected(); + } + + // The server rejects multiple ChangeCipherSpec even if the client +@@ -381,7 +380,7 @@ TEST_F(Tls13CompatTest, ChangeCipherSpec + server_->CheckErrorCode(SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER); + } + +-// The client rejects a ChangeCipherSpec if it advertises an empty ++// The client accepts a ChangeCipherSpec even if it advertises an empty + // session ID. + TEST_F(TlsConnectStreamTls13, ChangeCipherSpecAfterServerHelloEmptySid) { + EnsureTlsSetup(); +@@ -398,9 +397,10 @@ TEST_F(TlsConnectStreamTls13, ChangeCiph + // send ServerHello..CertificateVerify + // Send CCS + server_->SendDirect(DataBuffer(kCannedCcs, sizeof(kCannedCcs))); +- client_->ExpectSendAlert(kTlsAlertUnexpectedMessage); +- client_->Handshake(); // Consume ClientHello and CCS +- client_->CheckErrorCode(SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER); ++ ++ // No alert is sent from the client. As Finished is dropped, we ++ // can't use Handshake() and CheckConnected(). ++ client_->Handshake(); + } + + // The client rejects multiple ChangeCipherSpec in a row even if the diff --git a/devel/nss/patches/patch-nss_lib_ssl_ssl3con.c b/devel/nss/patches/patch-nss_lib_ssl_ssl3con.c new file mode 100644 index 00000000000..0e0e6547e05 --- /dev/null +++ b/devel/nss/patches/patch-nss_lib_ssl_ssl3con.c @@ -0,0 +1,49 @@ +$NetBSD: patch-nss_lib_ssl_ssl3con.c,v 1.1 2020/10/31 19:36:30 wiz Exp $ + +https://hg.mozilla.org/projects/nss/rev/b03a4fc5b902498414b02640dcb2717dfef9682f + +--- nss/lib/ssl/ssl3con.c.orig 2020-10-16 14:50:49.000000000 +0000 ++++ nss/lib/ssl/ssl3con.c +@@ -6645,11 +6645,7 @@ ssl_CheckServerSessionIdCorrectness(sslS + + /* TLS 1.3: We sent a session ID. The server's should match. */ + if (!IS_DTLS(ss) && (sentRealSid || sentFakeSid)) { +- if (sidMatch) { +- ss->ssl3.hs.allowCcs = PR_TRUE; +- return PR_TRUE; +- } +- return PR_FALSE; ++ return sidMatch; + } + + /* TLS 1.3 (no SID)/DTLS 1.3: The server shouldn't send a session ID. */ +@@ -8696,7 +8692,6 @@ ssl3_HandleClientHello(sslSocket *ss, PR + errCode = PORT_GetError(); + goto alert_loser; + } +- ss->ssl3.hs.allowCcs = PR_TRUE; + } + + /* TLS 1.3 requires that compression include only null. */ +@@ -13066,15 +13061,14 @@ ssl3_HandleRecord(sslSocket *ss, SSL3Cip + ss->ssl3.hs.ws != idle_handshake && + cText->buf->len == 1 && + cText->buf->buf[0] == change_cipher_spec_choice) { +- if (ss->ssl3.hs.allowCcs) { +- /* Ignore the first CCS. */ +- ss->ssl3.hs.allowCcs = PR_FALSE; ++ if (!ss->ssl3.hs.rejectCcs) { ++ /* Allow only the first CCS. */ ++ ss->ssl3.hs.rejectCcs = PR_TRUE; + return SECSuccess; ++ } else { ++ alert = unexpected_message; ++ PORT_SetError(SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER); + } +- +- /* Compatibility mode is not negotiated. */ +- alert = unexpected_message; +- PORT_SetError(SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER); + } + + if ((IS_DTLS(ss) && !dtls13_AeadLimitReached(spec)) || diff --git a/devel/nss/patches/patch-nss_lib_ssl_sslimpl.h b/devel/nss/patches/patch-nss_lib_ssl_sslimpl.h new file mode 100644 index 00000000000..982d3e966f2 --- /dev/null +++ b/devel/nss/patches/patch-nss_lib_ssl_sslimpl.h @@ -0,0 +1,18 @@ +$NetBSD: patch-nss_lib_ssl_sslimpl.h,v 1.1 2020/10/31 19:36:30 wiz Exp $ + +https://hg.mozilla.org/projects/nss/rev/b03a4fc5b902498414b02640dcb2717dfef9682f + +--- nss/lib/ssl/sslimpl.h.orig 2020-10-16 14:50:49.000000000 +0000 ++++ nss/lib/ssl/sslimpl.h +@@ -710,10 +710,7 @@ typedef struct SSL3HandshakeStateStr { + * or received. */ + PRBool receivedCcs; /* A server received ChangeCipherSpec + * before the handshake started. */ +- PRBool allowCcs; /* A server allows ChangeCipherSpec +- * as the middlebox compatibility mode +- * is explicitly indicarted by +- * legacy_session_id in TLS 1.3 ClientHello. */ ++ PRBool rejectCcs; /* Excessive ChangeCipherSpecs are rejected. */ + PRBool clientCertRequested; /* True if CertificateRequest received. */ + PRBool endOfFlight; /* Processed a full flight (DTLS 1.3). */ + ssl3KEADef kea_def_mutable; /* Used to hold the writable kea_def |