Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package mozilla-nss for openSUSE:Factory checked in at 2023-10-29 19:39:28
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/mozilla-nss (Old)
and /work/SRC/openSUSE:Factory/.mozilla-nss.new.17445 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "mozilla-nss"
Sun Oct 29 19:39:28 2023 rev:209 rq:1120733 version:3.94
Changes:
--------
--- /work/SRC/openSUSE:Factory/mozilla-nss/mozilla-nss.changes 2023-09-06 18:57:10.425378073 +0200
+++ /work/SRC/openSUSE:Factory/.mozilla-nss.new.17445/mozilla-nss.changes 2023-10-29 19:39:30.374368879 +0100
@@ -1,0 +2,23 @@
+Tue Oct 24 06:44:18 UTC 2023 - Wolfgang Rosenauer <wr(a)rosenauer.org>
+
+- update to NSS 3.94
+ * bmo#1853737 - Updated code and commit ID for HACL*
+ * bmo#1840510 - update ACVP fuzzed test vector: refuzzed with
+ current NSS
+ * bmo#1827303 - Softoken C_ calls should use system FIPS setting
+ to select NSC_ or FC_ variants
+ * bmo#1774659 - NSS needs a database tool that can dump the low level
+ representation of the database
+ * bmo#1852179 - declare string literals using char in pkixnames_tests.cpp
+ * bmo#1852179 - avoid implicit conversion for ByteString
+ * bmo#1818766 - update rust version for acvp docker
+ * bmo#1852011 - Moving the init function of the mpi_ints before
+ clean-up in ec.c
+ * bmo#1615555 - P-256 ECDH and ECDSA from HACL*
+ * bmo#1840510 - Add ACVP test vectors to the repository
+ * bmo#1849077 - Stop relying on std::basic_string<uint8_t>
+ * bmo#1847845 - Transpose the PPC_ABI check from Makefile to gyp
+- rebased patches
+- added nss-fips-test.patch to fix broken test
+
+-------------------------------------------------------------------
@@ -5,3 +28,3 @@
- + bmo#1849471 - Update zlib in NSS to 1.3.
- + bmo#1848183 - softoken: iterate hashUpdate calls for long inputs.
- + bmo#1813401 - regenerate NameConstraints test certificates (boo#1214980).
+ * bmo#1849471 - Update zlib in NSS to 1.3.
+ * bmo#1848183 - softoken: iterate hashUpdate calls for long inputs.
+ * bmo#1813401 - regenerate NameConstraints test certificates (boo#1214980).
Old:
----
nss-3.93.tar.gz
New:
----
nss-3.94.tar.gz
nss-fips-test.patch
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ mozilla-nss.spec ++++++
--- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.650597210 +0100
+++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.654597355 +0100
@@ -17,14 +17,14 @@
#
-%global nss_softokn_fips_version 3.93
+%global nss_softokn_fips_version 3.94
%define NSPR_min_version 4.35
%define nspr_ver %(rpm -q --queryformat '%%{VERSION}' mozilla-nspr)
%define nssdbdir %{_sysconfdir}/pki/nssdb
Name: mozilla-nss
-Version: 3.93
+Version: 3.94
Release: 0
-%define underscore_version 3_93
+%define underscore_version 3_94
Summary: Network Security Services
License: MPL-2.0
Group: System/Libraries
@@ -77,6 +77,7 @@
Patch45: nss-fips-drbg-libjitter.patch
Patch46: nss-allow-slow-tests.patch
Patch47: nss-fips-pct-pubkeys.patch
+Patch48: nss-fips-test.patch
%if 0%{?sle_version} >= 120000 && 0%{?sle_version} < 150000
# aarch64 + gcc4.8 fails to build on SLE-12 due to undefined references
BuildRequires: gcc9-c++
@@ -231,6 +232,7 @@
%endif
%patch46 -p1
%patch47 -p1
+%patch48 -p1
# additional CA certificates
#cd security/nss/lib/ckfw/builtins
++++++ nss-3.93.tar.gz -> nss-3.94.tar.gz ++++++
/work/SRC/openSUSE:Factory/mozilla-nss/nss-3.93.tar.gz /work/SRC/openSUSE:Factory/.mozilla-nss.new.17445/nss-3.94.tar.gz differ: char 5, line 1
++++++ nss-fips-approved-crypto-non-ec.patch ++++++
--- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.786602157 +0100
+++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.786602157 +0100
@@ -324,7 +324,7 @@
struct NSSLOWInitContextStr {
int count;
-@@ -99,6 +100,15 @@ NSSLOWHASH_NewContext(NSSLOWInitContext
+@@ -69,6 +70,15 @@ NSSLOWHASH_NewContext(NSSLOWInitContext
{
NSSLOWHASHContext *context;
@@ -369,7 +369,7 @@
===================================================================
--- nss.orig/lib/softoken/pkcs11c.c
+++ nss/lib/softoken/pkcs11c.c
-@@ -4792,6 +4792,9 @@ NSC_GenerateKey(CK_SESSION_HANDLE hSessi
+@@ -4821,6 +4821,9 @@ NSC_GenerateKey(CK_SESSION_HANDLE hSessi
goto loser;
}
@@ -379,7 +379,7 @@
/*
* handle the base object stuff
*/
-@@ -4806,6 +4809,7 @@ NSC_GenerateKey(CK_SESSION_HANDLE hSessi
+@@ -4835,6 +4838,7 @@ NSC_GenerateKey(CK_SESSION_HANDLE hSessi
if (crv == CKR_OK) {
*phKey = key->handle;
}
@@ -387,7 +387,7 @@
loser:
PORT_Memset(buf, 0, sizeof buf);
sftk_FreeObject(key);
-@@ -5722,11 +5726,11 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS
+@@ -5751,11 +5755,11 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS
* created and linked.
*/
crv = sftk_handleObject(publicKey, session);
@@ -400,7 +400,7 @@
return crv;
}
if (sftk_isTrue(privateKey, CKA_SENSITIVE)) {
-@@ -5770,13 +5774,19 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS
+@@ -5799,13 +5803,19 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS
sftk_FreeObject(publicKey);
NSC_DestroyObject(hSession, privateKey->handle);
sftk_FreeObject(privateKey);
@@ -420,7 +420,7 @@
return CKR_OK;
}
-@@ -7481,7 +7491,7 @@ NSC_DeriveKey(CK_SESSION_HANDLE hSession
+@@ -7510,7 +7520,7 @@ NSC_DeriveKey(CK_SESSION_HANDLE hSession
} else {
/* now allocate the hash contexts */
md5 = MD5_NewContext();
@@ -429,7 +429,7 @@
PORT_Memset(crsrdata, 0, sizeof crsrdata);
crv = CKR_HOST_MEMORY;
break;
-@@ -7870,6 +7880,7 @@ NSC_DeriveKey(CK_SESSION_HANDLE hSession
+@@ -7899,6 +7909,7 @@ NSC_DeriveKey(CK_SESSION_HANDLE hSession
PORT_Assert(i <= sizeof key_block);
}
@@ -737,7 +737,7 @@
===================================================================
--- nss.orig/lib/softoken/pkcs11.c
+++ nss/lib/softoken/pkcs11.c
-@@ -546,17 +546,17 @@ static const struct mechanismList mechan
+@@ -557,17 +557,17 @@ static const struct mechanismList mechan
{ CKM_TLS_MASTER_KEY_DERIVE, { 48, 48, CKF_DERIVE }, PR_FALSE },
{ CKM_TLS12_MASTER_KEY_DERIVE, { 48, 48, CKF_DERIVE }, PR_FALSE },
{ CKM_NSS_TLS_MASTER_KEY_DERIVE_SHA256,
++++++ nss-fips-combined-hash-sign-dsa-ecdsa.patch ++++++
--- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.810603030 +0100
+++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.814603176 +0100
@@ -68,7 +68,7 @@
===================================================================
--- nss.orig/lib/softoken/pkcs11c.c
+++ nss/lib/softoken/pkcs11c.c
-@@ -2657,7 +2657,7 @@ nsc_DSA_Verify_Stub(void *ctx, void *sig
+@@ -2679,7 +2679,7 @@ nsc_DSA_Verify_Stub(void *ctx, void *sig
static SECStatus
nsc_DSA_Sign_Stub(void *ctx, void *sigBuf,
unsigned int *sigLen, unsigned int maxSigLen,
@@ -77,7 +77,7 @@
{
SECItem signature, digest;
SECStatus rv;
-@@ -2675,6 +2675,22 @@ nsc_DSA_Sign_Stub(void *ctx, void *sigBu
+@@ -2697,6 +2697,22 @@ nsc_DSA_Sign_Stub(void *ctx, void *sigBu
return rv;
}
@@ -100,7 +100,7 @@
static SECStatus
nsc_ECDSAVerifyStub(void *ctx, void *sigBuf, unsigned int sigLen,
void *dataBuf, unsigned int dataLen)
-@@ -2692,7 +2708,7 @@ nsc_ECDSAVerifyStub(void *ctx, void *sig
+@@ -2714,7 +2730,7 @@ nsc_ECDSAVerifyStub(void *ctx, void *sig
static SECStatus
nsc_ECDSASignStub(void *ctx, void *sigBuf,
unsigned int *sigLen, unsigned int maxSigLen,
@@ -109,7 +109,7 @@
{
SECItem signature, digest;
SECStatus rv;
-@@ -2710,6 +2726,22 @@ nsc_ECDSASignStub(void *ctx, void *sigBu
+@@ -2732,6 +2748,22 @@ nsc_ECDSASignStub(void *ctx, void *sigBu
return rv;
}
@@ -132,7 +132,7 @@
/* NSC_SignInit setups up the signing operations. There are three basic
* types of signing:
* (1) the tradition single part, where "Raw RSA" or "Raw DSA" is applied
-@@ -3583,6 +3615,22 @@ NSC_VerifyInit(CK_SESSION_HANDLE hSessio
+@@ -3612,6 +3644,22 @@ NSC_VerifyInit(CK_SESSION_HANDLE hSessio
info->hashOid = SEC_OID_##mmm; \
goto finish_rsa;
@@ -155,7 +155,7 @@
switch (pMechanism->mechanism) {
INIT_RSA_VFY_MECH(MD5)
INIT_RSA_VFY_MECH(MD2)
-@@ -4819,6 +4867,73 @@ loser:
+@@ -4848,6 +4896,73 @@ loser:
#define PAIRWISE_DIGEST_LENGTH SHA224_LENGTH /* 224-bits */
#define PAIRWISE_MESSAGE_LENGTH 20 /* 160-bits */
@@ -229,7 +229,7 @@
/*
* FIPS 140-2 pairwise consistency check utilized to validate key pair.
*
-@@ -4872,8 +4987,6 @@ sftk_PairwiseConsistencyCheck(CK_SESSION
+@@ -4901,8 +5016,6 @@ sftk_PairwiseConsistencyCheck(CK_SESSION
/* Variables used for Signature/Verification functions. */
/* Must be at least 256 bits for DSA2 digest */
@@ -238,7 +238,7 @@
CK_ULONG signature_length;
if (keyType == CKK_RSA) {
-@@ -5027,76 +5140,32 @@ sftk_PairwiseConsistencyCheck(CK_SESSION
+@@ -5056,76 +5169,32 @@ sftk_PairwiseConsistencyCheck(CK_SESSION
}
}
++++++ nss-fips-constructor-self-tests.patch ++++++
--- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.822603467 +0100
+++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.826603613 +0100
@@ -63,9 +63,9 @@
/*********************************************************************/
extern const SECHashObject *HASH_GetRawHashObject(HASH_HashType hashType);
-@@ -1891,6 +1891,9 @@ extern SECStatus EC_CopyParams(PLArenaPo
+@@ -1896,6 +1896,9 @@ extern int EC_GetPointSize(const ECParam
*/
- extern int EC_GetPointSize(const ECParams *params);
+ extern int EC_GetScalarSize(const ECParams *params);
+/* Unconditionally run the integrity check. */
+extern void BL_FIPSRepeatIntegrityCheck(void);
++++++ nss-fips-detect-fips-mode-fixes.patch ++++++
--- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.838604049 +0100
+++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.842604195 +0100
@@ -26,11 +26,10 @@
#include "prtypes.h"
#include "prenv.h"
#include "secerr.h"
-@@ -25,6 +29,23 @@ struct NSSLOWHASHContextStr {
- };
+@@ -27,6 +31,22 @@ struct NSSLOWHASHContextStr {
+ static NSSLOWInitContext dummyContext = { 0 };
+ static PRBool post_failed = PR_TRUE;
- #ifndef NSS_FIPS_DISABLED
-+
+static PRBool
+getFIPSEnv(void)
+{
@@ -47,23 +46,15 @@
+ return PR_FALSE;
+}
+
- static int
- nsslow_GetFIPSEnabled(void)
+ NSSLOWInitContext *
+ NSSLOW_Init(void)
{
-@@ -52,6 +73,7 @@ nsslow_GetFIPSEnabled(void)
- #endif /* LINUX */
- return 1;
- }
-+
- #endif /* NSS_FIPS_DISABLED */
-
- static NSSLOWInitContext dummyContext = { 0 };
-@@ -67,7 +89,7 @@ NSSLOW_Init(void)
+@@ -37,7 +57,7 @@ NSSLOW_Init(void)
#ifndef NSS_FIPS_DISABLED
/* make sure the FIPS product is installed if we are trying to
* go into FIPS mode */
-- if (nsslow_GetFIPSEnabled()) {
-+ if (nsslow_GetFIPSEnabled() || getFIPSEnv()) {
+- if (NSS_GetSystemFIPSEnabled()) {
++ if (NSS_GetSystemFIPSEnabled() || getFIPSEnv()) {
if (BL_FIPSEntryOK(PR_TRUE, PR_FALSE) != SECSuccess) {
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
post_failed = PR_TRUE;
++++++ nss-fips-pairwise-consistency-check.patch ++++++
--- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.858604776 +0100
+++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.862604922 +0100
@@ -14,7 +14,7 @@
===================================================================
--- nss.orig/lib/softoken/pkcs11c.c
+++ nss/lib/softoken/pkcs11c.c
-@@ -4812,8 +4812,8 @@ loser:
+@@ -4841,8 +4841,8 @@ loser:
return crv;
}
@@ -25,7 +25,7 @@
/*
* FIPS 140-2 pairwise consistency check utilized to validate key pair.
-@@ -5761,6 +5761,7 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS
+@@ -5790,6 +5790,7 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS
(PRUint32)crv);
sftk_LogAuditMessage(NSS_AUDIT_ERROR, NSS_AUDIT_SELF_TEST, msg);
}
++++++ nss-fips-test.patch ++++++
Index: nss/tests/cert/cert.sh
===================================================================
--- nss.orig/tests/cert/cert.sh
+++ nss/tests/cert/cert.sh
@@ -1367,8 +1367,8 @@ cert_fips()
echo "$SCRIPTNAME: Enable FIPS mode on database -----------------------"
CU_ACTION="Enable FIPS mode on database for ${CERTNAME}"
- echo "modutil -dbdir ${PROFILEDIR} -fips true "
- ${BINDIR}/modutil -dbdir ${PROFILEDIR} -fips true 2>&1 <<MODSCRIPT
+ echo "modutil -dbdir ${PROFILEDIR} -chkfips true "
+ ${BINDIR}/modutil -dbdir ${PROFILEDIR} -chkfips true 2>&1 <<MODSCRIPT
y
MODSCRIPT
RET=$?
++++++ nss-fips-zeroization.patch ++++++
--- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.898606232 +0100
+++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.902606377 +0100
@@ -107,8 +107,8 @@
===================================================================
--- nss.orig/lib/freebl/ec.c
+++ nss/lib/freebl/ec.c
-@@ -974,7 +974,7 @@ ECDSA_VerifyDigest(ECPublicKey *key, con
- ECParams *ecParams = NULL;
+@@ -1049,7 +1049,7 @@ ECDSA_VerifyDigest(ECPublicKey *key, con
+ mp_int n;
SECItem pointC = { siBuffer, NULL, 0 };
int slen; /* length in bytes of a half signature (r or s) */
- int flen; /* length in bytes of the field size */