From 1f336830a183f7d6fe5e997e0eb920e409538930 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Andr=C3=A9=20Fabian=20Silva=20Delgado?= Date: Mon, 13 Oct 2014 05:33:28 -0200 Subject: icedove-1:31.1.2.deb1-1{,.nonprism1}: updating version --- libre/icedove/rhbz-966424.patch | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 libre/icedove/rhbz-966424.patch (limited to 'libre/icedove/rhbz-966424.patch') diff --git a/libre/icedove/rhbz-966424.patch b/libre/icedove/rhbz-966424.patch new file mode 100644 index 000000000..c4c332e9e --- /dev/null +++ b/libre/icedove/rhbz-966424.patch @@ -0,0 +1,23 @@ +--- a/toolkit/modules/CertUtils.jsm ++++ b/toolkit/modules/CertUtils.jsm +@@ -170,17 +170,19 @@ this.checkCert = + issuerCert = issuerCert.QueryInterface(Ci.nsIX509Cert3); + var tokenNames = issuerCert.getAllTokenNames({}); + + if (!tokenNames || !tokenNames.some(isBuiltinToken)) + throw new Ce(certNotBuiltInErr, Cr.NS_ERROR_ABORT); + } + + function isBuiltinToken(tokenName) { +- return tokenName == "Builtin Object Token"; ++ return tokenName == "Builtin Object Token" || ++ tokenName == "Default Trust" || ++ tokenName == "System Trust"; + } + + /** + * This class implements nsIBadCertListener. Its job is to prevent "bad cert" + * security dialogs from being shown to the user. It is better to simply fail + * if the certificate is bad. See bug 304286. + * + * @param aAllowNonBuiltInCerts (optional) -- cgit v1.2.3-2-g168b