Blame SOURCES/rhbz-1503632-nss.patch
|
|
0fe52e |
diff -up firefox-60.5.0/security/certverifier/NSSCertDBTrustDomain.cpp.1503632-nss firefox-60.5.0/security/certverifier/NSSCertDBTrustDomain.cpp
|
|
|
0fe52e |
--- firefox-60.5.0/security/certverifier/NSSCertDBTrustDomain.cpp.1503632-nss 2019-01-22 11:38:49.484365928 +0100
|
|
|
0fe52e |
+++ firefox-60.5.0/security/certverifier/NSSCertDBTrustDomain.cpp 2019-01-22 11:40:52.694779150 +0100
|
|
|
0fe52e |
@@ -1077,13 +1077,11 @@ SECStatus InitializeNSS(const nsACString
|
|
|
ae11a9 |
if (!loadPKCS11Modules) {
|
|
|
ae11a9 |
flags |= NSS_INIT_NOMODDB;
|
|
|
ae11a9 |
}
|
|
|
ae11a9 |
- nsAutoCString dbTypeAndDirectory("sql:");
|
|
|
ae11a9 |
- dbTypeAndDirectory.Append(dir);
|
|
|
ae11a9 |
MOZ_LOG(gCertVerifierLog, LogLevel::Debug,
|
|
|
ae11a9 |
- ("InitializeNSS(%s, %d, %d)", dbTypeAndDirectory.get(), readOnly,
|
|
|
ae11a9 |
+ ("InitializeNSS(%s, %d, %d)", PromiseFlatCString(dir).get(), readOnly,
|
|
|
ae11a9 |
loadPKCS11Modules));
|
|
|
0fe52e |
SECStatus srv =
|
|
|
0fe52e |
- NSS_Initialize(dbTypeAndDirectory.get(), "", "", SECMOD_DB, flags);
|
|
|
0fe52e |
+ NSS_Initialize(PromiseFlatCString(dir).get(), "", "", SECMOD_DB, flags);
|
|
|
ae11a9 |
if (srv != SECSuccess) {
|
|
|
ae11a9 |
return srv;
|
|
|
ae11a9 |
}
|