356ae4
diff -up firefox-84.0.2/security/certverifier/NSSCertDBTrustDomain.cpp.nss-hack firefox-84.0.2/security/certverifier/NSSCertDBTrustDomain.cpp
356ae4
--- firefox-84.0.2/security/certverifier/NSSCertDBTrustDomain.cpp.nss-hack      2021-01-11 12:12:02.585514543 +0100
356ae4
+++ firefox-84.0.2/security/certverifier/NSSCertDBTrustDomain.cpp       2021-01-11 12:47:50.345984582 +0100
356ae4
@@ -1619,6 +1619,15 @@ SECStatus InitializeNSS(const nsACString
356ae4
     return srv;
356ae4
   }
356ae4

356ae4
+  /* Sets the NSS_USE_ALG_IN_ANY_SIGNATURE bit.
356ae4
+   * does not change NSS_USE_ALG_IN_CERT_SIGNATURE,
356ae4
+   * so policy will still disable use of sha1 in
356ae4
+   * certificate related signature processing. */
356ae4
+  srv = NSS_SetAlgorithmPolicy(SEC_OID_SHA1, NSS_USE_ALG_IN_ANY_SIGNATURE, 0);
356ae4
+  if (srv != SECSuccess) {
356ae4
+    NS_WARNING("Unable to use SHA1 for Add-ons, expect broken/disabled Add-ons. See https://bugzilla.redhat.com/show_bug.cgi?id=1908018 for details.");
356ae4
+  }
356ae4
+
356ae4
   if (nssDbConfig == NSSDBConfig::ReadWrite) {
356ae4
     UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
356ae4
     if (!slot) {