Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package mozilla-nss for openSUSE:Factory checked in at 2023-10-29 19:39:28 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/mozilla-nss (Old) and /work/SRC/openSUSE:Factory/.mozilla-nss.new.17445 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "mozilla-nss" Sun Oct 29 19:39:28 2023 rev:209 rq:1120733 version:3.94 Changes: -------- --- /work/SRC/openSUSE:Factory/mozilla-nss/mozilla-nss.changes 2023-09-06 18:57:10.425378073 +0200 +++ /work/SRC/openSUSE:Factory/.mozilla-nss.new.17445/mozilla-nss.changes 2023-10-29 19:39:30.374368879 +0100 @@ -1,0 +2,23 @@ +Tue Oct 24 06:44:18 UTC 2023 - Wolfgang Rosenauer <w...@rosenauer.org> + +- update to NSS 3.94 + * bmo#1853737 - Updated code and commit ID for HACL* + * bmo#1840510 - update ACVP fuzzed test vector: refuzzed with + current NSS + * bmo#1827303 - Softoken C_ calls should use system FIPS setting + to select NSC_ or FC_ variants + * bmo#1774659 - NSS needs a database tool that can dump the low level + representation of the database + * bmo#1852179 - declare string literals using char in pkixnames_tests.cpp + * bmo#1852179 - avoid implicit conversion for ByteString + * bmo#1818766 - update rust version for acvp docker + * bmo#1852011 - Moving the init function of the mpi_ints before + clean-up in ec.c + * bmo#1615555 - P-256 ECDH and ECDSA from HACL* + * bmo#1840510 - Add ACVP test vectors to the repository + * bmo#1849077 - Stop relying on std::basic_string<uint8_t> + * bmo#1847845 - Transpose the PPC_ABI check from Makefile to gyp +- rebased patches +- added nss-fips-test.patch to fix broken test + +------------------------------------------------------------------- @@ -5,3 +28,3 @@ - + bmo#1849471 - Update zlib in NSS to 1.3. - + bmo#1848183 - softoken: iterate hashUpdate calls for long inputs. - + bmo#1813401 - regenerate NameConstraints test certificates (boo#1214980). + * bmo#1849471 - Update zlib in NSS to 1.3. + * bmo#1848183 - softoken: iterate hashUpdate calls for long inputs. + * bmo#1813401 - regenerate NameConstraints test certificates (boo#1214980). Old: ---- nss-3.93.tar.gz New: ---- nss-3.94.tar.gz nss-fips-test.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ mozilla-nss.spec ++++++ --- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.650597210 +0100 +++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.654597355 +0100 @@ -17,14 +17,14 @@ # -%global nss_softokn_fips_version 3.93 +%global nss_softokn_fips_version 3.94 %define NSPR_min_version 4.35 %define nspr_ver %(rpm -q --queryformat '%%{VERSION}' mozilla-nspr) %define nssdbdir %{_sysconfdir}/pki/nssdb Name: mozilla-nss -Version: 3.93 +Version: 3.94 Release: 0 -%define underscore_version 3_93 +%define underscore_version 3_94 Summary: Network Security Services License: MPL-2.0 Group: System/Libraries @@ -77,6 +77,7 @@ Patch45: nss-fips-drbg-libjitter.patch Patch46: nss-allow-slow-tests.patch Patch47: nss-fips-pct-pubkeys.patch +Patch48: nss-fips-test.patch %if 0%{?sle_version} >= 120000 && 0%{?sle_version} < 150000 # aarch64 + gcc4.8 fails to build on SLE-12 due to undefined references BuildRequires: gcc9-c++ @@ -231,6 +232,7 @@ %endif %patch46 -p1 %patch47 -p1 +%patch48 -p1 # additional CA certificates #cd security/nss/lib/ckfw/builtins ++++++ nss-3.93.tar.gz -> nss-3.94.tar.gz ++++++ /work/SRC/openSUSE:Factory/mozilla-nss/nss-3.93.tar.gz /work/SRC/openSUSE:Factory/.mozilla-nss.new.17445/nss-3.94.tar.gz differ: char 5, line 1 ++++++ nss-fips-approved-crypto-non-ec.patch ++++++ --- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.786602157 +0100 +++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.786602157 +0100 @@ -324,7 +324,7 @@ struct NSSLOWInitContextStr { int count; -@@ -99,6 +100,15 @@ NSSLOWHASH_NewContext(NSSLOWInitContext +@@ -69,6 +70,15 @@ NSSLOWHASH_NewContext(NSSLOWInitContext { NSSLOWHASHContext *context; @@ -369,7 +369,7 @@ =================================================================== --- nss.orig/lib/softoken/pkcs11c.c +++ nss/lib/softoken/pkcs11c.c -@@ -4792,6 +4792,9 @@ NSC_GenerateKey(CK_SESSION_HANDLE hSessi +@@ -4821,6 +4821,9 @@ NSC_GenerateKey(CK_SESSION_HANDLE hSessi goto loser; } @@ -379,7 +379,7 @@ /* * handle the base object stuff */ -@@ -4806,6 +4809,7 @@ NSC_GenerateKey(CK_SESSION_HANDLE hSessi +@@ -4835,6 +4838,7 @@ NSC_GenerateKey(CK_SESSION_HANDLE hSessi if (crv == CKR_OK) { *phKey = key->handle; } @@ -387,7 +387,7 @@ loser: PORT_Memset(buf, 0, sizeof buf); sftk_FreeObject(key); -@@ -5722,11 +5726,11 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS +@@ -5751,11 +5755,11 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS * created and linked. */ crv = sftk_handleObject(publicKey, session); @@ -400,7 +400,7 @@ return crv; } if (sftk_isTrue(privateKey, CKA_SENSITIVE)) { -@@ -5770,13 +5774,19 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS +@@ -5799,13 +5803,19 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS sftk_FreeObject(publicKey); NSC_DestroyObject(hSession, privateKey->handle); sftk_FreeObject(privateKey); @@ -420,7 +420,7 @@ return CKR_OK; } -@@ -7481,7 +7491,7 @@ NSC_DeriveKey(CK_SESSION_HANDLE hSession +@@ -7510,7 +7520,7 @@ NSC_DeriveKey(CK_SESSION_HANDLE hSession } else { /* now allocate the hash contexts */ md5 = MD5_NewContext(); @@ -429,7 +429,7 @@ PORT_Memset(crsrdata, 0, sizeof crsrdata); crv = CKR_HOST_MEMORY; break; -@@ -7870,6 +7880,7 @@ NSC_DeriveKey(CK_SESSION_HANDLE hSession +@@ -7899,6 +7909,7 @@ NSC_DeriveKey(CK_SESSION_HANDLE hSession PORT_Assert(i <= sizeof key_block); } @@ -737,7 +737,7 @@ =================================================================== --- nss.orig/lib/softoken/pkcs11.c +++ nss/lib/softoken/pkcs11.c -@@ -546,17 +546,17 @@ static const struct mechanismList mechan +@@ -557,17 +557,17 @@ static const struct mechanismList mechan { CKM_TLS_MASTER_KEY_DERIVE, { 48, 48, CKF_DERIVE }, PR_FALSE }, { CKM_TLS12_MASTER_KEY_DERIVE, { 48, 48, CKF_DERIVE }, PR_FALSE }, { CKM_NSS_TLS_MASTER_KEY_DERIVE_SHA256, ++++++ nss-fips-combined-hash-sign-dsa-ecdsa.patch ++++++ --- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.810603030 +0100 +++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.814603176 +0100 @@ -68,7 +68,7 @@ =================================================================== --- nss.orig/lib/softoken/pkcs11c.c +++ nss/lib/softoken/pkcs11c.c -@@ -2657,7 +2657,7 @@ nsc_DSA_Verify_Stub(void *ctx, void *sig +@@ -2679,7 +2679,7 @@ nsc_DSA_Verify_Stub(void *ctx, void *sig static SECStatus nsc_DSA_Sign_Stub(void *ctx, void *sigBuf, unsigned int *sigLen, unsigned int maxSigLen, @@ -77,7 +77,7 @@ { SECItem signature, digest; SECStatus rv; -@@ -2675,6 +2675,22 @@ nsc_DSA_Sign_Stub(void *ctx, void *sigBu +@@ -2697,6 +2697,22 @@ nsc_DSA_Sign_Stub(void *ctx, void *sigBu return rv; } @@ -100,7 +100,7 @@ static SECStatus nsc_ECDSAVerifyStub(void *ctx, void *sigBuf, unsigned int sigLen, void *dataBuf, unsigned int dataLen) -@@ -2692,7 +2708,7 @@ nsc_ECDSAVerifyStub(void *ctx, void *sig +@@ -2714,7 +2730,7 @@ nsc_ECDSAVerifyStub(void *ctx, void *sig static SECStatus nsc_ECDSASignStub(void *ctx, void *sigBuf, unsigned int *sigLen, unsigned int maxSigLen, @@ -109,7 +109,7 @@ { SECItem signature, digest; SECStatus rv; -@@ -2710,6 +2726,22 @@ nsc_ECDSASignStub(void *ctx, void *sigBu +@@ -2732,6 +2748,22 @@ nsc_ECDSASignStub(void *ctx, void *sigBu return rv; } @@ -132,7 +132,7 @@ /* NSC_SignInit setups up the signing operations. There are three basic * types of signing: * (1) the tradition single part, where "Raw RSA" or "Raw DSA" is applied -@@ -3583,6 +3615,22 @@ NSC_VerifyInit(CK_SESSION_HANDLE hSessio +@@ -3612,6 +3644,22 @@ NSC_VerifyInit(CK_SESSION_HANDLE hSessio info->hashOid = SEC_OID_##mmm; \ goto finish_rsa; @@ -155,7 +155,7 @@ switch (pMechanism->mechanism) { INIT_RSA_VFY_MECH(MD5) INIT_RSA_VFY_MECH(MD2) -@@ -4819,6 +4867,73 @@ loser: +@@ -4848,6 +4896,73 @@ loser: #define PAIRWISE_DIGEST_LENGTH SHA224_LENGTH /* 224-bits */ #define PAIRWISE_MESSAGE_LENGTH 20 /* 160-bits */ @@ -229,7 +229,7 @@ /* * FIPS 140-2 pairwise consistency check utilized to validate key pair. * -@@ -4872,8 +4987,6 @@ sftk_PairwiseConsistencyCheck(CK_SESSION +@@ -4901,8 +5016,6 @@ sftk_PairwiseConsistencyCheck(CK_SESSION /* Variables used for Signature/Verification functions. */ /* Must be at least 256 bits for DSA2 digest */ @@ -238,7 +238,7 @@ CK_ULONG signature_length; if (keyType == CKK_RSA) { -@@ -5027,76 +5140,32 @@ sftk_PairwiseConsistencyCheck(CK_SESSION +@@ -5056,76 +5169,32 @@ sftk_PairwiseConsistencyCheck(CK_SESSION } } ++++++ nss-fips-constructor-self-tests.patch ++++++ --- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.822603467 +0100 +++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.826603613 +0100 @@ -63,9 +63,9 @@ /*********************************************************************/ extern const SECHashObject *HASH_GetRawHashObject(HASH_HashType hashType); -@@ -1891,6 +1891,9 @@ extern SECStatus EC_CopyParams(PLArenaPo +@@ -1896,6 +1896,9 @@ extern int EC_GetPointSize(const ECParam */ - extern int EC_GetPointSize(const ECParams *params); + extern int EC_GetScalarSize(const ECParams *params); +/* Unconditionally run the integrity check. */ +extern void BL_FIPSRepeatIntegrityCheck(void); ++++++ nss-fips-detect-fips-mode-fixes.patch ++++++ --- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.838604049 +0100 +++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.842604195 +0100 @@ -26,11 +26,10 @@ #include "prtypes.h" #include "prenv.h" #include "secerr.h" -@@ -25,6 +29,23 @@ struct NSSLOWHASHContextStr { - }; +@@ -27,6 +31,22 @@ struct NSSLOWHASHContextStr { + static NSSLOWInitContext dummyContext = { 0 }; + static PRBool post_failed = PR_TRUE; - #ifndef NSS_FIPS_DISABLED -+ +static PRBool +getFIPSEnv(void) +{ @@ -47,23 +46,15 @@ + return PR_FALSE; +} + - static int - nsslow_GetFIPSEnabled(void) + NSSLOWInitContext * + NSSLOW_Init(void) { -@@ -52,6 +73,7 @@ nsslow_GetFIPSEnabled(void) - #endif /* LINUX */ - return 1; - } -+ - #endif /* NSS_FIPS_DISABLED */ - - static NSSLOWInitContext dummyContext = { 0 }; -@@ -67,7 +89,7 @@ NSSLOW_Init(void) +@@ -37,7 +57,7 @@ NSSLOW_Init(void) #ifndef NSS_FIPS_DISABLED /* make sure the FIPS product is installed if we are trying to * go into FIPS mode */ -- if (nsslow_GetFIPSEnabled()) { -+ if (nsslow_GetFIPSEnabled() || getFIPSEnv()) { +- if (NSS_GetSystemFIPSEnabled()) { ++ if (NSS_GetSystemFIPSEnabled() || getFIPSEnv()) { if (BL_FIPSEntryOK(PR_TRUE, PR_FALSE) != SECSuccess) { PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); post_failed = PR_TRUE; ++++++ nss-fips-pairwise-consistency-check.patch ++++++ --- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.858604776 +0100 +++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.862604922 +0100 @@ -14,7 +14,7 @@ =================================================================== --- nss.orig/lib/softoken/pkcs11c.c +++ nss/lib/softoken/pkcs11c.c -@@ -4812,8 +4812,8 @@ loser: +@@ -4841,8 +4841,8 @@ loser: return crv; } @@ -25,7 +25,7 @@ /* * FIPS 140-2 pairwise consistency check utilized to validate key pair. -@@ -5761,6 +5761,7 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS +@@ -5790,6 +5790,7 @@ NSC_GenerateKeyPair(CK_SESSION_HANDLE hS (PRUint32)crv); sftk_LogAuditMessage(NSS_AUDIT_ERROR, NSS_AUDIT_SELF_TEST, msg); } ++++++ nss-fips-test.patch ++++++ Index: nss/tests/cert/cert.sh =================================================================== --- nss.orig/tests/cert/cert.sh +++ nss/tests/cert/cert.sh @@ -1367,8 +1367,8 @@ cert_fips() echo "$SCRIPTNAME: Enable FIPS mode on database -----------------------" CU_ACTION="Enable FIPS mode on database for ${CERTNAME}" - echo "modutil -dbdir ${PROFILEDIR} -fips true " - ${BINDIR}/modutil -dbdir ${PROFILEDIR} -fips true 2>&1 <<MODSCRIPT + echo "modutil -dbdir ${PROFILEDIR} -chkfips true " + ${BINDIR}/modutil -dbdir ${PROFILEDIR} -chkfips true 2>&1 <<MODSCRIPT y MODSCRIPT RET=$? ++++++ nss-fips-zeroization.patch ++++++ --- /var/tmp/diff_new_pack.UkGHCE/_old 2023-10-29 19:39:36.898606232 +0100 +++ /var/tmp/diff_new_pack.UkGHCE/_new 2023-10-29 19:39:36.902606377 +0100 @@ -107,8 +107,8 @@ =================================================================== --- nss.orig/lib/freebl/ec.c +++ nss/lib/freebl/ec.c -@@ -974,7 +974,7 @@ ECDSA_VerifyDigest(ECPublicKey *key, con - ECParams *ecParams = NULL; +@@ -1049,7 +1049,7 @@ ECDSA_VerifyDigest(ECPublicKey *key, con + mp_int n; SECItem pointC = { siBuffer, NULL, 0 }; int slen; /* length in bytes of a half signature (r or s) */ - int flen; /* length in bytes of the field size */