summaryrefslogtreecommitdiff
path: root/mozilla-1290037.patch
diff options
context:
space:
mode:
authorMartin Stransky <stransky@redhat.com>2017-01-18 12:42:27 +0100
committerMartin Stransky <stransky@redhat.com>2017-01-18 12:42:27 +0100
commita25c5d4d7c756218220ca3052e42a4d007b31b26 (patch)
tree4ebb43c9f1d00920ae5b352ec54bdfdd68d7ee86 /mozilla-1290037.patch
parentEnable telemetry (diff)
downloadlibrewolf-fedora-ff-a25c5d4d7c756218220ca3052e42a4d007b31b26.tar.gz
librewolf-fedora-ff-a25c5d4d7c756218220ca3052e42a4d007b31b26.tar.bz2
librewolf-fedora-ff-a25c5d4d7c756218220ca3052e42a4d007b31b26.zip
Update to 51.0 (B1)
Diffstat (limited to 'mozilla-1290037.patch')
-rw-r--r--mozilla-1290037.patch34
1 files changed, 0 insertions, 34 deletions
diff --git a/mozilla-1290037.patch b/mozilla-1290037.patch
deleted file mode 100644
index 508d580..0000000
--- a/mozilla-1290037.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-# HG changeset patch
-# User Franziskus Kiefer <franziskuskiefer@gmail.com>
-# Date 1469717280 -7200
-# Thu Jul 28 16:48:00 2016 +0200
-# Node ID 95aa61f1e3562e526bf88179d9d078fd90ad1bda
-# Parent d42aacfe34af25e2f5110e2ca3d24a210eabeb33
-Update keybits in H2, r=mt
-
-MozReview-Commit-ID: 35oWoDMqe1Y
-
-diff --git a/netwerk/protocol/http/Http2Session.cpp b/netwerk/protocol/http/Http2Session.cpp
---- a/netwerk/protocol/http/Http2Session.cpp
-+++ b/netwerk/protocol/http/Http2Session.cpp
-@@ -3544,18 +3544,18 @@ Http2Session::ConfirmTLSProfile()
- RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY);
- }
-
- uint32_t keybits = ssl->GetKEAKeyBits();
- if (kea == ssl_kea_dh && keybits < 2048) {
- LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to DH %d < 2048\n",
- this, keybits));
- RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY);
-- } else if (kea == ssl_kea_ecdh && keybits < 256) { // 256 bits is "security level" of 128
-- LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 256\n",
-+ } else if (kea == ssl_kea_ecdh && keybits < 224) { // see rfc7540 9.2.1.
-+ LOG3(("Http2Session::ConfirmTLSProfile %p FAILED due to ECDH %d < 224\n",
- this, keybits));
- RETURN_SESSION_ERROR(this, INADEQUATE_SECURITY);
- }
-
- int16_t macAlgorithm = ssl->GetMACAlgorithmUsed();
- LOG3(("Http2Session::ConfirmTLSProfile %p MAC Algortihm (aead==6) %d\n",
- this, macAlgorithm));
- if (macAlgorithm != nsISSLSocketControl::SSL_MAC_AEAD) {
bgstack15