security/manager/boot/src/PublicKeyPinningService.cpp.rej

Tue, 06 Jan 2015 21:39:09 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 06 Jan 2015 21:39:09 +0100
branch
TOR_BUG_9701
changeset 8
97036ab72558
permissions
-rw-r--r--

Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.

     1 diff a/security/manager/boot/src/PublicKeyPinningService.cpp b/security/manager/boot/src/PublicKeyPinningService.cpp	(rejected hunks)
     2 @@ -296,7 +296,8 @@ PublicKeyPinningService::ChainHasValidPins(const CERTCertList* certList,
     3    if (!certList) {
     4      return false;
     5    }
     6 -  if (time > TimeFromElapsedSecondsAD(kPreloadPKPinsExpirationTime)) {
     7 +  if (time > TimeFromEpochInSeconds(kPreloadPKPinsExpirationTime /
     8 +                                    PR_USEC_PER_SEC)) {
     9      return true;
    10    }
    11    if (!hostname || hostname[0] == 0) {

mercurial