From 10ec8e0186337669fde524b026b13227aa2dbc2f Mon Sep 17 00:00:00 2001 From: Jacob Wang Date: Fri, 21 Nov 2025 09:41:02 +0800 Subject: [PATCH 1/2] [CVE]update to thunderbird-140.5.0-2 to #ID7PRG update to thunderbird-140.5.0-2 for CVE-2025-13012 CVE-2025-13013 CVE-2025-13014 CVE-2025-13015 CVE-2025-13016 CVE-2025-13017 CVE-2025-13018 CVE-2025-13019 CVE-2025-13020 Project: TC2024080204 Signed-off-by: Jacob Wang --- av1-else-condition-add.patch | 14 + build-ffvpx.patch | 24 - build-libaom.patch | 7 +- build-rhel7-lower-node-min-version.patch | 9 +- build-rhel7-nasm-dwarf.patch | 16 +- build-system-nss.patch | 20 + build-tb-system-nss.patch | 20 + download | 12 +- ...-system-nss-replace-xyber-with-mlkem.patch | 507 ------------- mozilla-bmo1170092.patch | 34 +- mozilla-bmo1670333.patch | 32 +- mozilla-bmo1789216-disable-av1.patch | 36 +- process-official-tarball | 3 + rhbz-1173156.patch | 22 +- rust-file-removal.patch | 29 +- ...ird-adapt-ml-dsa-support-to-rhel-nss.patch | 59 ++ ...sa-certificate-support-to-certviewer.patch | 323 +++++++++ ...rbird-add-mlkem768-secp256r1-support.patch | 190 +++++ ...derbird-enable-ml-dsa-in-manager-ssl.patch | 48 ++ ...ion-for-certificate-chain-validation.patch | 239 +++++++ ...or-pkix-certificate-chain-validation.patch | 247 +++++++ ...an8 => thunderbird-redhat-default-prefs.js | 10 +- ...-system-nss-replace-xyber-with-mlkem.patch | 105 --- thunderbird.appdata.xml.in | 50 ++ thunderbird.spec | 674 ++++++++++-------- 25 files changed, 1676 insertions(+), 1054 deletions(-) create mode 100644 av1-else-condition-add.patch delete mode 100644 build-ffvpx.patch create mode 100644 build-system-nss.patch create mode 100644 build-tb-system-nss.patch delete mode 100644 firefox-system-nss-replace-xyber-with-mlkem.patch create mode 100644 thunderbird-adapt-ml-dsa-support-to-rhel-nss.patch create mode 100644 thunderbird-add-ml-dsa-certificate-support-to-certviewer.patch create mode 100644 thunderbird-add-mlkem768-secp256r1-support.patch create mode 100644 thunderbird-enable-ml-dsa-in-manager-ssl.patch create mode 100644 thunderbird-enable-ml-dsa-signature-verification-for-certificate-chain-validation.patch create mode 100644 thunderbird-integrate-ml-dsa-signature-verification-for-pkix-certificate-chain-validation.patch rename thunderbird-anolis-default-prefs.js.an8 => thunderbird-redhat-default-prefs.js (81%) delete mode 100644 thunderbird-system-nss-replace-xyber-with-mlkem.patch create mode 100644 thunderbird.appdata.xml.in diff --git a/av1-else-condition-add.patch b/av1-else-condition-add.patch new file mode 100644 index 0000000..4dc7763 --- /dev/null +++ b/av1-else-condition-add.patch @@ -0,0 +1,14 @@ +diff --git a/modules/libpref/init/StaticPrefList.yaml b/modules/libpref/init/StaticPrefList.yaml +index acadd3a2cc..11b217174d 100644 +--- a/modules/libpref/init/StaticPrefList.yaml ++++ b/modules/libpref/init/StaticPrefList.yaml +@@ -12561,6 +12561,8 @@ + type: RelaxedAtomicBool + #if defined(MOZ_AV1) + value: true ++#else ++ value: false + #endif + mirror: always + + diff --git a/build-ffvpx.patch b/build-ffvpx.patch deleted file mode 100644 index 09e60bb..0000000 --- a/build-ffvpx.patch +++ /dev/null @@ -1,24 +0,0 @@ -diff -up thunderbird-128.0/media/ffvpx/libavcodec/av1dec.c.build-ffvpx thunderbird-128.0/media/ffvpx/libavcodec/av1dec.c ---- thunderbird-128.0/media/ffvpx/libavcodec/av1dec.c.build-ffvpx 2024-06-24 22:43:40.000000000 +0200 -+++ thunderbird-128.0/media/ffvpx/libavcodec/av1dec.c 2024-07-10 11:20:23.200948767 +0200 -@@ -887,7 +887,7 @@ static av_cold int av1_decode_init(AVCod - ff_cbs_fragment_reset(&s->current_obu); - } - -- s->dovi.logctx = avctx; -+ s->dovi.logctx = (AVContext *) avctx; - s->dovi.dv_profile = 10; // default for AV1 - sd = ff_get_coded_side_data(avctx, AV_PKT_DATA_DOVI_CONF); - if (sd && sd->size > 0) -diff -up thunderbird-128.0/media/ffvpx/libavcodec/libdav1d.c.build-ffvpx thunderbird-128.0/media/ffvpx/libavcodec/libdav1d.c ---- thunderbird-128.0/media/ffvpx/libavcodec/libdav1d.c.build-ffvpx 2024-07-10 12:46:57.005539959 +0200 -+++ thunderbird-128.0/media/ffvpx/libavcodec/libdav1d.c 2024-07-10 12:47:19.067507705 +0200 -@@ -289,7 +289,7 @@ static av_cold int libdav1d_init(AVCodec - c->delay = res > 1 ? res : 0; - #endif - -- dav1d->dovi.logctx = c; -+ dav1d->dovi.logctx = (AVContext *) c; - dav1d->dovi.dv_profile = 10; // default for AV1 - sd = ff_get_coded_side_data(c, AV_PKT_DATA_DOVI_CONF); - if (sd && sd->size > 0) diff --git a/build-libaom.patch b/build-libaom.patch index cab71b5..09ffdbb 100644 --- a/build-libaom.patch +++ b/build-libaom.patch @@ -1,12 +1,13 @@ diff -up firefox-128.0/config/external/moz.build.libaom firefox-128.0/config/external/moz.build --- firefox-128.0/config/external/moz.build.libaom 2024-07-31 15:32:39.460374047 +0200 +++ firefox-128.0/config/external/moz.build 2024-07-31 15:34:41.646064796 +0200 -@@ -39,8 +39,8 @@ if CONFIG["MOZ_VORBIS"]: +@@ -39,9 +39,9 @@ if CONFIG["MOZ_VORBIS"]: + if not CONFIG["MOZ_SYSTEM_LIBVPX"]: external_dirs += ["media/libvpx"] - +external_dirs += ["media/libaom"] - if CONFIG["MOZ_AV1"]: + + if not CONFIG["MOZ_SYSTEM_AV1"]: - external_dirs += ["media/libaom"] external_dirs += ["media/libdav1d"] diff --git a/build-rhel7-lower-node-min-version.patch b/build-rhel7-lower-node-min-version.patch index 398cbc3..a167271 100644 --- a/build-rhel7-lower-node-min-version.patch +++ b/build-rhel7-lower-node-min-version.patch @@ -1,8 +1,9 @@ ---- firefox-115.8.0/python/mozbuild/mozbuild/nodeutil.py.lower-node-min-version 2024-02-12 21:53:56.000000000 +0200 -+++ firefox-115.8.0/python/mozbuild/mozbuild/nodeutil.py 2024-02-14 16:48:12.476182627 +0200 -@@ -13,7 +13,7 @@ from mozboot.util import get_tools_dir +diff -up firefox-140.0/python/mozbuild/mozbuild/nodeutil.py.build-rhel7-lower-node-min-version firefox-140.0/python/mozbuild/mozbuild/nodeutil.py +--- firefox-140.0/python/mozbuild/mozbuild/nodeutil.py.build-rhel7-lower-node-min-version 2025-06-02 15:26:51.000000000 +0200 ++++ firefox-140.0/python/mozbuild/mozbuild/nodeutil.py 2025-06-12 11:54:37.075505124 +0200 +@@ -10,7 +10,7 @@ from mozboot.util import get_tools_dir + from mozfile import which from packaging.version import Version - from six import PY3 -NODE_MIN_VERSION = Version("12.22.12") +NODE_MIN_VERSION = Version("10.24.0") diff --git a/build-rhel7-nasm-dwarf.patch b/build-rhel7-nasm-dwarf.patch index 5e2ba4a..e8b48e0 100644 --- a/build-rhel7-nasm-dwarf.patch +++ b/build-rhel7-nasm-dwarf.patch @@ -1,12 +1,12 @@ -diff -up firefox-91.0.1/python/mozbuild/mozbuild/frontend/context.py.rhel7-nasm firefox-91.0.1/python/mozbuild/mozbuild/frontend/context.py ---- firefox-91.0.1/python/mozbuild/mozbuild/frontend/context.py.rhel7-nasm 2021-08-31 08:02:10.814740774 +0200 -+++ firefox-91.0.1/python/mozbuild/mozbuild/frontend/context.py 2021-08-31 08:04:03.967146994 +0200 -@@ -420,7 +420,7 @@ class AsmFlags(BaseCompileFlags): +diff -up firefox-140.0/python/mozbuild/mozbuild/frontend/context.py.build-rhel7-nasm-dwarf firefox-140.0/python/mozbuild/mozbuild/frontend/context.py +--- firefox-140.0/python/mozbuild/mozbuild/frontend/context.py.build-rhel7-nasm-dwarf 2025-06-02 15:26:51.000000000 +0200 ++++ firefox-140.0/python/mozbuild/mozbuild/frontend/context.py 2025-06-12 12:09:56.398728745 +0200 +@@ -417,7 +417,7 @@ class AsmFlags(BaseCompileFlags): if self._context.config.substs.get("OS_ARCH") == "WINNT": debug_flags += ["-F", "cv8"] elif self._context.config.substs.get("OS_ARCH") != "Darwin": - debug_flags += ["-F", "dwarf"] -+ debug_flags += ["-f", "elf32"] - elif ( - self._context.config.substs.get("OS_ARCH") == "WINNT" - and self._context.config.substs.get("CPU_ARCH") == "aarch64" ++ debug_flags += ["-F", "elf32"] + elif self._context.config.substs.get("CC_TYPE") == "clang-cl": + if self._context.config.substs.get("TARGET_CPU") == "aarch64": + # armasm64 accepts a paucity of options compared to ml/ml64. diff --git a/build-system-nss.patch b/build-system-nss.patch new file mode 100644 index 0000000..ce3ec4e --- /dev/null +++ b/build-system-nss.patch @@ -0,0 +1,20 @@ +diff -up firefox-140.0/third_party/rust/neqo-crypto/.cargo-checksum.json.system-nss firefox-140.0/third_party/rust/neqo-crypto/.cargo-checksum.json +--- firefox-140.0/third_party/rust/neqo-crypto/.cargo-checksum.json.system-nss 2025-07-25 10:17:19.112202464 +0200 ++++ firefox-140.0/third_party/rust/neqo-crypto/.cargo-checksum.json 2025-07-25 10:17:55.824333955 +0200 +@@ -1 +1 @@ +-{"files":{"Cargo.toml":"a57adef48614a58209447e8bd115a2de3d8a42917a0b9a2ae9a97cabc3400c6a","bindings/bindings.toml":"e7e4b75736cfcf4d52febacb99a6f6c6c7b1d648ed8bdc424648be876c850e91","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"2f54f79958878ed7988441955344dd1a2a079b1bb409e8f12a70284fd7e351ef","min_version.txt":"0f9ddf9ddaeb5137a5ab3d238d06286822f9579b1f46ba76312a8c6d76176500","src/aead.rs":"08d7cad82e3bec32661cfd1689e6611b30ae328ec88481cb32201dd255777365","src/aead_null.rs":"a766e2f71fd8b77a8f81bc60aaaafcffb6aef1f0a1f39ea07fef45b3696718ce","src/agent.rs":"ec90d7556231c57da3a191f508eaf1f820f22d6b7912ee45d1a594eb0fea7a82","src/agentio.rs":"1baecfb725b54717a6a74bb4664692d187f62747cc5e0495f59b06729f96dea2","src/auth.rs":"7a1524bef0a0c71616f5ee8b3976d66201210b809271bcf5d06c0e560ae482af","src/cert.rs":"4fdaa3834d8a72f41198449010fd5c3f6be6a54e429427c37bde5aab9421585c","src/constants.rs":"83606aeb646b2833a8094f9d980c266ecc3e8cb40c93a4820da221988319dd1a","src/ech.rs":"19d16af5a30e2060a8942a72487bd820c0d9c62ff1d3c490871752c56781c44b","src/err.rs":"4c7d0b46955b58aa9375210c2c5d24012056c3ad8a856b72d2c7c9542cc97046","src/exp.rs":"cd864fb5a61cd1472baa5b1d0951fc712753c22d21af83ebed09a01585f33b48","src/ext.rs":"a5676f8b9815cc7f6ed1da6fea091cf8754d8b80e90d37b726e905abe18930f8","src/hkdf.rs":"76c5abc8b2d6ee12d8a86cd730af2cf47a59b2fbfd3b8a635a1826636156794d","src/hp.rs":"6adf4ad78b5a065ab7310c69ad239eec156256043e2c185bf60b9d1f12ab1be4","src/lib.rs":"3ab979c264a909e663c5ef140cd57013180745b99937671c73a9003ca6347f41","src/min_version.rs":"c6e1f98b9f56db0622ac38c1be131c55acf4a0f09ed0d6283f4d6308e2d1301a","src/p11.rs":"49bcde067e55228dab483bd11b70dc29d40dc3c59fa60136daccb205dc468df0","src/prio.rs":"1858088afd2668e8fbff56959765b7d4df09342371b9282ade27bb4d7bd6ce69","src/replay.rs":"594ce92f368cbc5fb71ebfb62214f07d1e86df8e5ce94255d5593ffabb91cd03","src/result.rs":"5a76688787741de7a935dbbab4bcb917d481d1c9c50a34df7e510036feb3da17","src/secrets.rs":"5d85b1e15f47cd267fe70fa8ea7e4ebc4b07eab7713f451afeefcf15f146f8a5","src/selfencrypt.rs":"4f106465f582c38d3bb04cb5cbcbf65a349e3186784726d9f2bf511a4a4a35ee","src/ssl.rs":"04950bb534b5304eb417909a3a39ebaa9be234c7c13eacdc41c00a8edab1b09f","src/time.rs":"22989caf3dab85cfe955cc279fcca98a6df02d14fcd0e93cac7b39374b8b5763","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"fb95a2d5c86ce3fafcb127cd0a2a163e5ee70baf09b2c8483e4d1fb25644cee2","tests/ext.rs":"57af4e2df211fa8afdb73125d4344ef5c70c1ea4579107c3e6f5746308ee3e7b","tests/handshake.rs":"df8a901048268a390785e05e28cbc97b82e41e47d7eab2d5c0a57e434ca1adcf","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"7ee5d7290a3f61af67ad2c94670cba376027136370d9784948db655b7e00fe54","tests/init.rs":"3cfe8411ca31ad7dfb23822bb1570e1a5b2b334857173bdd7df086b65b81d95a","tests/selfencrypt.rs":"b65aed70e83dce660017159fc8a956d3b52e0807b590ad8d0a3a4265caa8c1fa"},"package":null} +\ No newline at end of file ++{"files":{"Cargo.toml":"a57adef48614a58209447e8bd115a2de3d8a42917a0b9a2ae9a97cabc3400c6a","bindings/bindings.toml":"e7e4b75736cfcf4d52febacb99a6f6c6c7b1d648ed8bdc424648be876c850e91","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"2f54f79958878ed7988441955344dd1a2a079b1bb409e8f12a70284fd7e351ef","min_version.txt":"0f9ddf9ddaeb5137a5ab3d238d06286822f9579b1f46ba76312a8c6d76176500","src/aead.rs":"08d7cad82e3bec32661cfd1689e6611b30ae328ec88481cb32201dd255777365","src/aead_null.rs":"a766e2f71fd8b77a8f81bc60aaaafcffb6aef1f0a1f39ea07fef45b3696718ce","src/agent.rs":"ec90d7556231c57da3a191f508eaf1f820f22d6b7912ee45d1a594eb0fea7a82","src/agentio.rs":"1baecfb725b54717a6a74bb4664692d187f62747cc5e0495f59b06729f96dea2","src/auth.rs":"7a1524bef0a0c71616f5ee8b3976d66201210b809271bcf5d06c0e560ae482af","src/cert.rs":"4fdaa3834d8a72f41198449010fd5c3f6be6a54e429427c37bde5aab9421585c","src/constants.rs":"50c1b84e06cd9a71bb9199f2518947a4d4ad3e5c33c1b86c585486dc43e872a0","src/ech.rs":"19d16af5a30e2060a8942a72487bd820c0d9c62ff1d3c490871752c56781c44b","src/err.rs":"4c7d0b46955b58aa9375210c2c5d24012056c3ad8a856b72d2c7c9542cc97046","src/exp.rs":"cd864fb5a61cd1472baa5b1d0951fc712753c22d21af83ebed09a01585f33b48","src/ext.rs":"a5676f8b9815cc7f6ed1da6fea091cf8754d8b80e90d37b726e905abe18930f8","src/hkdf.rs":"76c5abc8b2d6ee12d8a86cd730af2cf47a59b2fbfd3b8a635a1826636156794d","src/hp.rs":"6adf4ad78b5a065ab7310c69ad239eec156256043e2c185bf60b9d1f12ab1be4","src/lib.rs":"3ab979c264a909e663c5ef140cd57013180745b99937671c73a9003ca6347f41","src/min_version.rs":"c6e1f98b9f56db0622ac38c1be131c55acf4a0f09ed0d6283f4d6308e2d1301a","src/p11.rs":"49bcde067e55228dab483bd11b70dc29d40dc3c59fa60136daccb205dc468df0","src/prio.rs":"1858088afd2668e8fbff56959765b7d4df09342371b9282ade27bb4d7bd6ce69","src/replay.rs":"594ce92f368cbc5fb71ebfb62214f07d1e86df8e5ce94255d5593ffabb91cd03","src/result.rs":"5a76688787741de7a935dbbab4bcb917d481d1c9c50a34df7e510036feb3da17","src/secrets.rs":"5d85b1e15f47cd267fe70fa8ea7e4ebc4b07eab7713f451afeefcf15f146f8a5","src/selfencrypt.rs":"4f106465f582c38d3bb04cb5cbcbf65a349e3186784726d9f2bf511a4a4a35ee","src/ssl.rs":"04950bb534b5304eb417909a3a39ebaa9be234c7c13eacdc41c00a8edab1b09f","src/time.rs":"22989caf3dab85cfe955cc279fcca98a6df02d14fcd0e93cac7b39374b8b5763","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"fb95a2d5c86ce3fafcb127cd0a2a163e5ee70baf09b2c8483e4d1fb25644cee2","tests/ext.rs":"57af4e2df211fa8afdb73125d4344ef5c70c1ea4579107c3e6f5746308ee3e7b","tests/handshake.rs":"df8a901048268a390785e05e28cbc97b82e41e47d7eab2d5c0a57e434ca1adcf","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"7ee5d7290a3f61af67ad2c94670cba376027136370d9784948db655b7e00fe54","tests/init.rs":"3cfe8411ca31ad7dfb23822bb1570e1a5b2b334857173bdd7df086b65b81d95a","tests/selfencrypt.rs":"b65aed70e83dce660017159fc8a956d3b52e0807b590ad8d0a3a4265caa8c1fa"},"package":null} +\ No newline at end of file +diff -up firefox-140.0/third_party/rust/neqo-crypto/src/constants.rs.system-nss firefox-140.0/third_party/rust/neqo-crypto/src/constants.rs +--- firefox-140.0/third_party/rust/neqo-crypto/src/constants.rs.system-nss 2025-07-25 10:16:27.299270237 +0200 ++++ firefox-140.0/third_party/rust/neqo-crypto/src/constants.rs 2025-07-25 10:16:39.698529915 +0200 +@@ -83,7 +83,7 @@ remap_enum! { + TLS_GRP_EC_SECP521R1 = ssl_grp_ec_secp521r1, + TLS_GRP_EC_X25519 = ssl_grp_ec_curve25519, + TLS_GRP_KEM_XYBER768D00 = ssl_grp_kem_xyber768d00, +- TLS_GRP_KEM_MLKEM768X25519 = ssl_grp_kem_mlkem768x25519, ++ TLS_GRP_KEM_MLKEM768X25519 = ssl_grp_kem_x25519mlkem768, + } + } + diff --git a/build-tb-system-nss.patch b/build-tb-system-nss.patch new file mode 100644 index 0000000..a325246 --- /dev/null +++ b/build-tb-system-nss.patch @@ -0,0 +1,20 @@ +diff -up thunderbird-140.0/comm/third_party/rust/neqo-crypto/.cargo-checksum.json.tb-system-nss thunderbird-140.0/comm/third_party/rust/neqo-crypto/.cargo-checksum.json +--- thunderbird-140.0/comm/third_party/rust/neqo-crypto/.cargo-checksum.json.tb-system-nss 2025-06-25 13:13:16.000000000 +0200 ++++ thunderbird-140.0/comm/third_party/rust/neqo-crypto/.cargo-checksum.json 2025-08-15 09:08:49.676977167 +0200 +@@ -1 +1 @@ +-{"files":{"Cargo.toml":"a57adef48614a58209447e8bd115a2de3d8a42917a0b9a2ae9a97cabc3400c6a","bindings/bindings.toml":"e7e4b75736cfcf4d52febacb99a6f6c6c7b1d648ed8bdc424648be876c850e91","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"2f54f79958878ed7988441955344dd1a2a079b1bb409e8f12a70284fd7e351ef","min_version.txt":"0f9ddf9ddaeb5137a5ab3d238d06286822f9579b1f46ba76312a8c6d76176500","src/aead.rs":"08d7cad82e3bec32661cfd1689e6611b30ae328ec88481cb32201dd255777365","src/aead_null.rs":"a766e2f71fd8b77a8f81bc60aaaafcffb6aef1f0a1f39ea07fef45b3696718ce","src/agent.rs":"ec90d7556231c57da3a191f508eaf1f820f22d6b7912ee45d1a594eb0fea7a82","src/agentio.rs":"1baecfb725b54717a6a74bb4664692d187f62747cc5e0495f59b06729f96dea2","src/auth.rs":"7a1524bef0a0c71616f5ee8b3976d66201210b809271bcf5d06c0e560ae482af","src/cert.rs":"4fdaa3834d8a72f41198449010fd5c3f6be6a54e429427c37bde5aab9421585c","src/constants.rs":"83606aeb646b2833a8094f9d980c266ecc3e8cb40c93a4820da221988319dd1a","src/ech.rs":"19d16af5a30e2060a8942a72487bd820c0d9c62ff1d3c490871752c56781c44b","src/err.rs":"4c7d0b46955b58aa9375210c2c5d24012056c3ad8a856b72d2c7c9542cc97046","src/exp.rs":"cd864fb5a61cd1472baa5b1d0951fc712753c22d21af83ebed09a01585f33b48","src/ext.rs":"a5676f8b9815cc7f6ed1da6fea091cf8754d8b80e90d37b726e905abe18930f8","src/hkdf.rs":"76c5abc8b2d6ee12d8a86cd730af2cf47a59b2fbfd3b8a635a1826636156794d","src/hp.rs":"6adf4ad78b5a065ab7310c69ad239eec156256043e2c185bf60b9d1f12ab1be4","src/lib.rs":"3ab979c264a909e663c5ef140cd57013180745b99937671c73a9003ca6347f41","src/min_version.rs":"c6e1f98b9f56db0622ac38c1be131c55acf4a0f09ed0d6283f4d6308e2d1301a","src/p11.rs":"49bcde067e55228dab483bd11b70dc29d40dc3c59fa60136daccb205dc468df0","src/prio.rs":"1858088afd2668e8fbff56959765b7d4df09342371b9282ade27bb4d7bd6ce69","src/replay.rs":"594ce92f368cbc5fb71ebfb62214f07d1e86df8e5ce94255d5593ffabb91cd03","src/result.rs":"5a76688787741de7a935dbbab4bcb917d481d1c9c50a34df7e510036feb3da17","src/secrets.rs":"5d85b1e15f47cd267fe70fa8ea7e4ebc4b07eab7713f451afeefcf15f146f8a5","src/selfencrypt.rs":"4f106465f582c38d3bb04cb5cbcbf65a349e3186784726d9f2bf511a4a4a35ee","src/ssl.rs":"04950bb534b5304eb417909a3a39ebaa9be234c7c13eacdc41c00a8edab1b09f","src/time.rs":"22989caf3dab85cfe955cc279fcca98a6df02d14fcd0e93cac7b39374b8b5763","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"fb95a2d5c86ce3fafcb127cd0a2a163e5ee70baf09b2c8483e4d1fb25644cee2","tests/ext.rs":"57af4e2df211fa8afdb73125d4344ef5c70c1ea4579107c3e6f5746308ee3e7b","tests/handshake.rs":"df8a901048268a390785e05e28cbc97b82e41e47d7eab2d5c0a57e434ca1adcf","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"7ee5d7290a3f61af67ad2c94670cba376027136370d9784948db655b7e00fe54","tests/init.rs":"3cfe8411ca31ad7dfb23822bb1570e1a5b2b334857173bdd7df086b65b81d95a","tests/selfencrypt.rs":"b65aed70e83dce660017159fc8a956d3b52e0807b590ad8d0a3a4265caa8c1fa"},"package":null} +\ No newline at end of file ++{"files":{"Cargo.toml":"a57adef48614a58209447e8bd115a2de3d8a42917a0b9a2ae9a97cabc3400c6a","bindings/bindings.toml":"e7e4b75736cfcf4d52febacb99a6f6c6c7b1d648ed8bdc424648be876c850e91","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"2f54f79958878ed7988441955344dd1a2a079b1bb409e8f12a70284fd7e351ef","min_version.txt":"0f9ddf9ddaeb5137a5ab3d238d06286822f9579b1f46ba76312a8c6d76176500","src/aead.rs":"08d7cad82e3bec32661cfd1689e6611b30ae328ec88481cb32201dd255777365","src/aead_null.rs":"a766e2f71fd8b77a8f81bc60aaaafcffb6aef1f0a1f39ea07fef45b3696718ce","src/agent.rs":"ec90d7556231c57da3a191f508eaf1f820f22d6b7912ee45d1a594eb0fea7a82","src/agentio.rs":"1baecfb725b54717a6a74bb4664692d187f62747cc5e0495f59b06729f96dea2","src/auth.rs":"7a1524bef0a0c71616f5ee8b3976d66201210b809271bcf5d06c0e560ae482af","src/cert.rs":"4fdaa3834d8a72f41198449010fd5c3f6be6a54e429427c37bde5aab9421585c","src/constants.rs":"50c1b84e06cd9a71bb9199f2518947a4d4ad3e5c33c1b86c585486dc43e872a0","src/ech.rs":"19d16af5a30e2060a8942a72487bd820c0d9c62ff1d3c490871752c56781c44b","src/err.rs":"4c7d0b46955b58aa9375210c2c5d24012056c3ad8a856b72d2c7c9542cc97046","src/exp.rs":"cd864fb5a61cd1472baa5b1d0951fc712753c22d21af83ebed09a01585f33b48","src/ext.rs":"a5676f8b9815cc7f6ed1da6fea091cf8754d8b80e90d37b726e905abe18930f8","src/hkdf.rs":"76c5abc8b2d6ee12d8a86cd730af2cf47a59b2fbfd3b8a635a1826636156794d","src/hp.rs":"6adf4ad78b5a065ab7310c69ad239eec156256043e2c185bf60b9d1f12ab1be4","src/lib.rs":"3ab979c264a909e663c5ef140cd57013180745b99937671c73a9003ca6347f41","src/min_version.rs":"c6e1f98b9f56db0622ac38c1be131c55acf4a0f09ed0d6283f4d6308e2d1301a","src/p11.rs":"49bcde067e55228dab483bd11b70dc29d40dc3c59fa60136daccb205dc468df0","src/prio.rs":"1858088afd2668e8fbff56959765b7d4df09342371b9282ade27bb4d7bd6ce69","src/replay.rs":"594ce92f368cbc5fb71ebfb62214f07d1e86df8e5ce94255d5593ffabb91cd03","src/result.rs":"5a76688787741de7a935dbbab4bcb917d481d1c9c50a34df7e510036feb3da17","src/secrets.rs":"5d85b1e15f47cd267fe70fa8ea7e4ebc4b07eab7713f451afeefcf15f146f8a5","src/selfencrypt.rs":"4f106465f582c38d3bb04cb5cbcbf65a349e3186784726d9f2bf511a4a4a35ee","src/ssl.rs":"04950bb534b5304eb417909a3a39ebaa9be234c7c13eacdc41c00a8edab1b09f","src/time.rs":"22989caf3dab85cfe955cc279fcca98a6df02d14fcd0e93cac7b39374b8b5763","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"fb95a2d5c86ce3fafcb127cd0a2a163e5ee70baf09b2c8483e4d1fb25644cee2","tests/ext.rs":"57af4e2df211fa8afdb73125d4344ef5c70c1ea4579107c3e6f5746308ee3e7b","tests/handshake.rs":"df8a901048268a390785e05e28cbc97b82e41e47d7eab2d5c0a57e434ca1adcf","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"7ee5d7290a3f61af67ad2c94670cba376027136370d9784948db655b7e00fe54","tests/init.rs":"3cfe8411ca31ad7dfb23822bb1570e1a5b2b334857173bdd7df086b65b81d95a","tests/selfencrypt.rs":"b65aed70e83dce660017159fc8a956d3b52e0807b590ad8d0a3a4265caa8c1fa"},"package":null} +\ No newline at end of file +diff -up thunderbird-140.0/comm/third_party/rust/neqo-crypto/src/constants.rs.tb-system-nss thunderbird-140.0/comm/third_party/rust/neqo-crypto/src/constants.rs +--- thunderbird-140.0/comm/third_party/rust/neqo-crypto/src/constants.rs.tb-system-nss 2025-06-25 13:13:16.000000000 +0200 ++++ thunderbird-140.0/comm/third_party/rust/neqo-crypto/src/constants.rs 2025-08-15 09:08:35.941135895 +0200 +@@ -83,7 +83,7 @@ remap_enum! { + TLS_GRP_EC_SECP521R1 = ssl_grp_ec_secp521r1, + TLS_GRP_EC_X25519 = ssl_grp_ec_curve25519, + TLS_GRP_KEM_XYBER768D00 = ssl_grp_kem_xyber768d00, +- TLS_GRP_KEM_MLKEM768X25519 = ssl_grp_kem_mlkem768x25519, ++ TLS_GRP_KEM_MLKEM768X25519 = ssl_grp_kem_x25519mlkem768, + } + } + diff --git a/download b/download index 6fd98d8..6bcfbfa 100644 --- a/download +++ b/download @@ -1,6 +1,6 @@ -fc25f988b87b5187d4e2f006efa699a3 cbindgen-vendor.tar.xz -1bbfea93579dba1385955fb1946831eb thunderbird-128.14.0esr.b2.processed-source.tar.xz -23a7a363b4eb38a19df98272274aa0c5 thunderbird-langpacks-128.14.0esr-20250819.tar.xz -7b35b9a003996b1f1dbc3cd936a609f2 nspr-4.35.0-1.el8_1.src.rpm -ab085bce989de91681f48fdd05be4c0f nss-3.101.0-7.el8_2.src.rpm -dbf6357877e3e1042de1a95cdfb61507 nss-3.101.0-7.el9_2.src.rpm +bbd51396c9f1f79afb128af28627b207 cbindgen-vendor.tar.xz +ff43c8604af5b227e3b7d54a80b44f56 thunderbird-140.5.0esr.processed-source.tar.xz +edd46411322adfd19a6d974affd50008 thunderbird-langpacks-140.5.0esr-20251111.tar.xz +eac5020733316a7fb17c9da54eeabf69 nspr-4.36.0-2.el8_2.src.rpm +60707f45d08ead54b4372ab1d4b5184f nss-3.112.0-1.el9_4.src.rpm +8a4e44bfb05ea8d724a6d8646f0353ab nss-3.112.0-4.el8_2.src.rpm diff --git a/firefox-system-nss-replace-xyber-with-mlkem.patch b/firefox-system-nss-replace-xyber-with-mlkem.patch deleted file mode 100644 index 655c3f5..0000000 --- a/firefox-system-nss-replace-xyber-with-mlkem.patch +++ /dev/null @@ -1,507 +0,0 @@ -diff --git a/modules/libpref/init/StaticPrefList.yaml b/modules/libpref/init/StaticPrefList.yaml -index 031ed0344d..4c652235d2 100644 ---- a/modules/libpref/init/StaticPrefList.yaml -+++ b/modules/libpref/init/StaticPrefList.yaml -@@ -13380,7 +13380,7 @@ - mirror: always - rust: true - --# Whether to send a Xyber768 key share in HTTP/3 TLS handshakes. -+# Whether to send an mlkem768x25519 key share in HTTP/3 TLS handshakes. - # Has no effect unless security.tls.enable_kyber is true. - - name: network.http.http3.enable_kyber - type: RelaxedAtomicBool -diff --git a/netwerk/socket/neqo_glue/src/lib.rs b/netwerk/socket/neqo_glue/src/lib.rs -index 9d1fa68ed2..216a95553c 100644 ---- a/netwerk/socket/neqo_glue/src/lib.rs -+++ b/netwerk/socket/neqo_glue/src/lib.rs -@@ -202,7 +202,7 @@ impl NeqoHttp3Conn { - { - // These operations are infallible when conn.state == State::Init. - let _ = conn.set_groups(&[ -- neqo_crypto::TLS_GRP_KEM_XYBER768D00, -+ neqo_crypto::TLS_GRP_KEM_MLKEM768X25519, - neqo_crypto::TLS_GRP_EC_X25519, - neqo_crypto::TLS_GRP_EC_SECP256R1, - neqo_crypto::TLS_GRP_EC_SECP384R1, -diff --git a/netwerk/test/unit/test_http3_kyber.js b/netwerk/test/unit/test_http3_kyber.js -index 4b3f1cbc50..e3b77cce9b 100644 ---- a/netwerk/test/unit/test_http3_kyber.js -+++ b/netwerk/test/unit/test_http3_kyber.js -@@ -62,7 +62,11 @@ function makeChan(uri) { - - add_task(async function test_kyber_success() { - let listener = new Http3Listener(); -- listener.expectedKeaGroup = "xyber768d00"; -+ // Bug 1918532: change this from x25519 to mlkem768x25519. -+ // neqo_glue currently tries to negotiate xyber768d00, which is -+ // disabled by NSS policy. As such we expect to receive x25519 -+ // here. -+ listener.expectedKeaGroup = "x25519"; - let chan = makeChan("https://foo.example.com"); - await chanPromise(chan, listener); - }); -diff --git a/security/manager/ssl/NSSSocketControl.cpp b/security/manager/ssl/NSSSocketControl.cpp -index 64c999701a..c7abe78da8 100644 ---- a/security/manager/ssl/NSSSocketControl.cpp -+++ b/security/manager/ssl/NSSSocketControl.cpp -@@ -39,7 +39,7 @@ NSSSocketControl::NSSSocketControl(const nsCString& aHostName, int32_t aPort, - mIsFullHandshake(false), - mNotedTimeUntilReady(false), - mEchExtensionStatus(EchExtensionStatus::kNotPresent), -- mSentXyberShare(false), -+ mSentMlkemShare(false), - mHasTls13HandshakeSecrets(false), - mIsShortWritePending(false), - mShortWritePendingByte(0), -diff --git a/security/manager/ssl/NSSSocketControl.h b/security/manager/ssl/NSSSocketControl.h -index 9afae1926c..2701b7346e 100644 ---- a/security/manager/ssl/NSSSocketControl.h -+++ b/security/manager/ssl/NSSSocketControl.h -@@ -117,14 +117,14 @@ class NSSSocketControl final : public CommonSocketControl { - return mEchExtensionStatus; - } - -- void WillSendXyberShare() { -+ void WillSendMlkemShare() { - COMMON_SOCKET_CONTROL_ASSERT_ON_OWNING_THREAD(); -- mSentXyberShare = true; -+ mSentMlkemShare = true; - } - -- bool SentXyberShare() { -+ bool SentMlkemShare() { - COMMON_SOCKET_CONTROL_ASSERT_ON_OWNING_THREAD(); -- return mSentXyberShare; -+ return mSentMlkemShare; - } - - void SetHasTls13HandshakeSecrets() { -@@ -307,7 +307,7 @@ class NSSSocketControl final : public CommonSocketControl { - bool mIsFullHandshake; - bool mNotedTimeUntilReady; - EchExtensionStatus mEchExtensionStatus; // Currently only used for telemetry. -- bool mSentXyberShare; -+ bool mSentMlkemShare; - bool mHasTls13HandshakeSecrets; - - // True when SSL layer has indicated an "SSL short write", i.e. need -diff --git a/security/manager/ssl/metrics.yaml b/security/manager/ssl/metrics.yaml -index e25ab6a7e5..ce0177b384 100644 ---- a/security/manager/ssl/metrics.yaml -+++ b/security/manager/ssl/metrics.yaml -@@ -68,7 +68,7 @@ tls: - xyber_intolerance_reason: - type: labeled_counter - description: > -- The error that was returned from a failed TLS 1.3 handshake in which the client sent a Xyber key share (see tlsIntoleranceTelemetryBucket() in nsNSSIOLayer.cpp). -+ The error that was returned from a failed TLS 1.3 handshake in which the client sent a mlkem768x25519 key share (see tlsIntoleranceTelemetryBucket() in nsNSSIOLayer.cpp). - data_sensitivity: - - technical - bugs: -diff --git a/security/manager/ssl/nsNSSCallbacks.cpp b/security/manager/ssl/nsNSSCallbacks.cpp -index c3a23213c5..cb37603782 100644 ---- a/security/manager/ssl/nsNSSCallbacks.cpp -+++ b/security/manager/ssl/nsNSSCallbacks.cpp -@@ -656,8 +656,8 @@ nsCString getKeaGroupName(uint32_t aKeaGroup) { - case ssl_grp_ec_curve25519: - groupName = "x25519"_ns; - break; -- case ssl_grp_kem_xyber768d00: -- groupName = "xyber768d00"_ns; -+ case ssl_grp_kem_mlkem768x25519: -+ groupName = "mlkem768x25519"_ns; - break; - case ssl_grp_ffdhe_2048: - groupName = "FF 2048"_ns; -@@ -1045,7 +1045,6 @@ void HandshakeCallback(PRFileDesc* fd, void* client_data) { - channelInfo.keaKeyBits); - break; - case ssl_kea_ecdh_hybrid: -- // Bug 1874963: Add probes for Xyber768d00 - break; - default: - MOZ_CRASH("impossible KEA"); -@@ -1146,7 +1145,8 @@ void SecretCallback(PRFileDesc* fd, PRUint16 epoch, SSLSecretDirection dir, - if (epoch == 2 && dir == ssl_secret_read) { - // |secret| is the server_handshake_traffic_secret. Set a flag to indicate - // that the Server Hello has been processed successfully. We use this when -- // deciding whether to retry a connection in which a Xyber share was sent. -+ // deciding whether to retry a connection in which an mlkem768x25519 share -+ // was sent. - infoObject->SetHasTls13HandshakeSecrets(); - } - } -diff --git a/security/manager/ssl/nsNSSComponent.cpp b/security/manager/ssl/nsNSSComponent.cpp -index 5f3792fd52..1fff6de2d6 100644 ---- a/security/manager/ssl/nsNSSComponent.cpp -+++ b/security/manager/ssl/nsNSSComponent.cpp -@@ -1084,9 +1084,9 @@ void SetDeprecatedTLS1CipherPrefs() { - // static - void SetKyberPolicy() { - if (StaticPrefs::security_tls_enable_kyber()) { -- NSS_SetAlgorithmPolicy(SEC_OID_XYBER768D00, NSS_USE_ALG_IN_SSL_KX, 0); -+ NSS_SetAlgorithmPolicy(SEC_OID_MLKEM768X25519, NSS_USE_ALG_IN_SSL_KX, 0); - } else { -- NSS_SetAlgorithmPolicy(SEC_OID_XYBER768D00, 0, NSS_USE_ALG_IN_SSL_KX); -+ NSS_SetAlgorithmPolicy(SEC_OID_MLKEM768X25519, 0, NSS_USE_ALG_IN_SSL_KX); - } - } - -diff --git a/security/manager/ssl/nsNSSIOLayer.cpp b/security/manager/ssl/nsNSSIOLayer.cpp -index c31f3064ee..24ca99d0f4 100644 ---- a/security/manager/ssl/nsNSSIOLayer.cpp -+++ b/security/manager/ssl/nsNSSIOLayer.cpp -@@ -448,14 +448,15 @@ bool retryDueToTLSIntolerance(PRErrorCode err, NSSSocketControl* socketInfo) { - } - - if (!socketInfo->IsPreliminaryHandshakeDone() && -- !socketInfo->HasTls13HandshakeSecrets() && socketInfo->SentXyberShare()) { -+ !socketInfo->HasTls13HandshakeSecrets() && socketInfo->SentMlkemShare()) { - nsAutoCString errorName; - const char* prErrorName = PR_ErrorToName(err); - if (prErrorName) { - errorName.AppendASCII(prErrorName); - } - mozilla::glean::tls::xyber_intolerance_reason.Get(errorName).Add(1); -- // Don't record version intolerance if we sent Xyber, just force a retry. -+ // Don't record version intolerance if we sent mlkem768x25519, just force a -+ // retry. - return true; - } - -@@ -1561,7 +1562,7 @@ static nsresult nsSSLIOLayerSetOptions(PRFileDesc* fd, bool forSTARTTLS, - !(infoObject->GetProviderFlags() & - (nsISocketProvider::BE_CONSERVATIVE | nsISocketProvider::IS_RETRY))) { - const SSLNamedGroup namedGroups[] = { -- ssl_grp_kem_xyber768d00, ssl_grp_ec_curve25519, ssl_grp_ec_secp256r1, -+ ssl_grp_kem_mlkem768x25519, ssl_grp_ec_curve25519, ssl_grp_ec_secp256r1, - ssl_grp_ec_secp384r1, ssl_grp_ec_secp521r1, ssl_grp_ffdhe_2048, - ssl_grp_ffdhe_3072}; - if (SECSuccess != SSL_NamedGroupConfig(fd, namedGroups, -@@ -1573,12 +1574,12 @@ static nsresult nsSSLIOLayerSetOptions(PRFileDesc* fd, bool forSTARTTLS, - if (SECSuccess != SSL_SendAdditionalKeyShares(fd, 2)) { - return NS_ERROR_FAILURE; - } -- infoObject->WillSendXyberShare(); -+ infoObject->WillSendMlkemShare(); - } else { - const SSLNamedGroup namedGroups[] = { - ssl_grp_ec_curve25519, ssl_grp_ec_secp256r1, ssl_grp_ec_secp384r1, - ssl_grp_ec_secp521r1, ssl_grp_ffdhe_2048, ssl_grp_ffdhe_3072}; -- // Skip the |ssl_grp_kem_xyber768d00| entry. -+ // Skip the |ssl_grp_kem_mlkem768x25519| entry. - if (SECSuccess != SSL_NamedGroupConfig(fd, namedGroups, - mozilla::ArrayLength(namedGroups))) { - return NS_ERROR_FAILURE; -diff --git a/security/manager/ssl/tests/unit/test_faulty_server.js b/security/manager/ssl/tests/unit/test_faulty_server.js -index f617908e28..7e476a9688 100644 ---- a/security/manager/ssl/tests/unit/test_faulty_server.js -+++ b/security/manager/ssl/tests/unit/test_faulty_server.js -@@ -72,28 +72,28 @@ add_task( - { - skip_if: () => AppConstants.MOZ_SYSTEM_NSS, - }, -- async function testRetryXyber() { -- const retryDomain = "xyber-net-interrupt.example.com"; -+ async function testRetryMlkem768x25519() { -+ const retryDomain = "mlkem768x25519-net-interrupt.example.com"; - - Services.prefs.setBoolPref("security.tls.enable_kyber", true); - Services.prefs.setCharPref("network.dns.localDomains", [retryDomain]); - Services.prefs.setIntPref("network.http.speculative-parallel-limit", 0); - -- // Get the number of xyber / x25519 callbacks prior to making the request -- // ssl_grp_kem_xyber768d00 = 25497 -+ // Get the number of mlkem768x25519 and x25519 callbacks prior to making the request -+ // ssl_grp_kem_mlkem768x25519 = 4588 - // ssl_grp_ec_curve25519 = 29 -- let countOfXyber = handlerCount("/callback/25497"); -+ let countOfMlkem = handlerCount("/callback/4588"); - let countOfX25519 = handlerCount("/callback/29"); - let chan = makeChan(`https://${retryDomain}:8443`); - let [, buf] = await channelOpenPromise(chan, CL_ALLOW_UNKNOWN_CL); - ok(buf); -- // The server will make a xyber768d00 callback for the initial request, and -+ // The server will make a mlkem768x25519 callback for the initial request, and - // then an x25519 callback for the retry. Both callback counts should - // increment by one. - equal( -- handlerCount("/callback/25497"), -- countOfXyber + 1, -- "negotiated xyber768d00" -+ handlerCount("/callback/4588"), -+ countOfMlkem + 1, -+ "negotiated mlkem768x25519" - ); - equal(handlerCount("/callback/29"), countOfX25519 + 1, "negotiated x25519"); - if (!mozinfo.socketprocess_networking) { -@@ -111,27 +111,28 @@ add_task( - { - skip_if: () => AppConstants.MOZ_SYSTEM_NSS, - }, -- async function testNoRetryXyber() { -- const retryDomain = "xyber-alert-after-server-hello.example.com"; -+ async function testNoRetryMlkem768x25519() { -+ const retryDomain = "mlkem768x25519-alert-after-server-hello.example.com"; - - Services.prefs.setBoolPref("security.tls.enable_kyber", true); - Services.prefs.setCharPref("network.dns.localDomains", [retryDomain]); - Services.prefs.setIntPref("network.http.speculative-parallel-limit", 0); - -- // Get the number of xyber / x25519 / p256 callbacks prior to making the request -- // ssl_grp_kem_xyber768d00 = 25497 -+ // Get the number of mlkem768x25519 and x25519 callbacks prior to making -+ // the request -+ // ssl_grp_kem_mlkem768x25519 = 4588 - // ssl_grp_ec_curve25519 = 29 -- let countOfXyber = handlerCount("/callback/25497"); -+ let countOfMlkem = handlerCount("/callback/4588"); - let countOfX25519 = handlerCount("/callback/29"); - let chan = makeChan(`https://${retryDomain}:8443`); - let [req] = await channelOpenPromise(chan, CL_EXPECT_FAILURE); - equal(req.status, 0x805a2f4d); // psm::GetXPCOMFromNSSError(SSL_ERROR_HANDSHAKE_FAILED) -- // The server will make a xyber768d00 callback for the initial request and -+ // The server will make a mlkem768x25519 callback for the initial request and - // the client should not retry. - equal( -- handlerCount("/callback/25497"), -- countOfXyber + 1, -- "negotiated xyber768d00" -+ handlerCount("/callback/4588"), -+ countOfMlkem + 1, -+ "negotiated mlkem768x25519" - ); - equal( - handlerCount("/callback/29"), -diff --git a/security/manager/ssl/tests/unit/tlsserver/cmd/FaultyServer.cpp b/security/manager/ssl/tests/unit/tlsserver/cmd/FaultyServer.cpp -index 4764ed921d..ba48016f58 100644 ---- a/security/manager/ssl/tests/unit/tlsserver/cmd/FaultyServer.cpp -+++ b/security/manager/ssl/tests/unit/tlsserver/cmd/FaultyServer.cpp -@@ -21,7 +21,7 @@ enum FaultType { - None = 0, - ZeroRtt, - UnknownSNI, -- Xyber, -+ Mlkem768x25519, - }; - - struct FaultyServerHost { -@@ -38,9 +38,10 @@ const char* kHostZeroRttAlertVersion = - const char* kHostZeroRttAlertUnexpected = "0rtt-alert-unexpected.example.com"; - const char* kHostZeroRttAlertDowngrade = "0rtt-alert-downgrade.example.com"; - --const char* kHostXyberNetInterrupt = "xyber-net-interrupt.example.com"; --const char* kHostXyberAlertAfterServerHello = -- "xyber-alert-after-server-hello.example.com"; -+const char* kHostMlkem768x25519NetInterrupt = -+ "mlkem768x25519-net-interrupt.example.com"; -+const char* kHostMlkem768x25519AlertAfterServerHello = -+ "mlkem768x25519-alert-after-server-hello.example.com"; - - const char* kCertWildcard = "default-ee"; - -@@ -55,8 +56,8 @@ const FaultyServerHost sFaultyServerHosts[]{ - {kHostZeroRttAlertVersion, kCertWildcard, ZeroRtt}, - {kHostZeroRttAlertUnexpected, kCertWildcard, ZeroRtt}, - {kHostZeroRttAlertDowngrade, kCertWildcard, ZeroRtt}, -- {kHostXyberNetInterrupt, kCertWildcard, Xyber}, -- {kHostXyberAlertAfterServerHello, kCertWildcard, Xyber}, -+ {kHostMlkem768x25519NetInterrupt, kCertWildcard, Mlkem768x25519}, -+ {kHostMlkem768x25519AlertAfterServerHello, kCertWildcard, Mlkem768x25519}, - {nullptr, nullptr}, - }; - -@@ -168,21 +169,22 @@ SECStatus FailingWriteCallback(PRFileDesc* fd, PRUint16 epoch, - return SECFailure; - } - --void SecretCallbackFailXyber(PRFileDesc* fd, PRUint16 epoch, -- SSLSecretDirection dir, PK11SymKey* secret, -- void* arg) { -- fprintf(stderr, "Xyber handler epoch=%d dir=%d\n", epoch, (uint32_t)dir); -+void SecretCallbackFailMlkem768x25519(PRFileDesc* fd, PRUint16 epoch, -+ SSLSecretDirection dir, -+ PK11SymKey* secret, void* arg) { -+ fprintf(stderr, "Mlkem768x25519 handler epoch=%d dir=%d\n", epoch, -+ (uint32_t)dir); - FaultyServerHost* host = static_cast(arg); - - if (epoch == 2 && dir == ssl_secret_write) { - sslSocket* ss = ssl_FindSocket(fd); - if (!ss) { -- fprintf(stderr, "Xyber handler, no ss!\n"); -+ fprintf(stderr, "Mlkem768x25519 handler, no ss!\n"); - return; - } - - if (!ss->sec.keaGroup) { -- fprintf(stderr, "Xyber handler, no ss->sec.keaGroup!\n"); -+ fprintf(stderr, "Mlkem768x25519 handler, no ss->sec.keaGroup!\n"); - return; - } - -@@ -190,17 +192,18 @@ void SecretCallbackFailXyber(PRFileDesc* fd, PRUint16 epoch, - SprintfLiteral(path, "/callback/%u", ss->sec.keaGroup->name); - DoCallback(path); - -- if (ss->sec.keaGroup->name != ssl_grp_kem_xyber768d00) { -+ if (ss->sec.keaGroup->name != ssl_grp_kem_mlkem768x25519) { - return; - } - -- fprintf(stderr, "Xyber handler, configuring alert\n"); -- if (strcmp(host->mHostName, kHostXyberNetInterrupt) == 0) { -+ fprintf(stderr, "Mlkem768x25519 handler, configuring alert\n"); -+ if (strcmp(host->mHostName, kHostMlkem768x25519NetInterrupt) == 0) { - // Install a record write callback that causes the next write to fail. - // The client will see this as a PR_END_OF_FILE / NS_ERROR_NET_INTERRUPT - // error. - ss->recordWriteCallback = FailingWriteCallback; -- } else if (!strcmp(host->mHostName, kHostXyberAlertAfterServerHello)) { -+ } else if (!strcmp(host->mHostName, -+ kHostMlkem768x25519AlertAfterServerHello)) { - SSL3_SendAlert(ss, alert_fatal, close_notify); - } - } -@@ -219,17 +222,17 @@ int32_t DoSNISocketConfig(PRFileDesc* aFd, const SECItem* aSrvNameArr, - fprintf(stderr, "found pre-defined host '%s'\n", host->mHostName); - } - -- const SSLNamedGroup xyberTestNamedGroups[] = {ssl_grp_kem_xyber768d00, -+ const SSLNamedGroup mlkemTestNamedGroups[] = {ssl_grp_kem_mlkem768x25519, - ssl_grp_ec_curve25519}; - - switch (host->mFaultType) { - case ZeroRtt: - SSL_SecretCallback(aFd, &SecretCallbackFailZeroRtt, (void*)host); - break; -- case Xyber: -- SSL_SecretCallback(aFd, &SecretCallbackFailXyber, (void*)host); -- SSL_NamedGroupConfig(aFd, xyberTestNamedGroups, -- mozilla::ArrayLength(xyberTestNamedGroups)); -+ case Mlkem768x25519: -+ SSL_SecretCallback(aFd, &SecretCallbackFailMlkem768x25519, (void*)host); -+ SSL_NamedGroupConfig(aFd, mlkemTestNamedGroups, -+ mozilla::ArrayLength(mlkemTestNamedGroups)); - break; - case None: - break; -diff --git a/security/manager/ssl/tests/unit/tlsserver/lib/TLSServer.cpp b/security/manager/ssl/tests/unit/tlsserver/lib/TLSServer.cpp -index e4aeda0e82..401b982346 100644 ---- a/security/manager/ssl/tests/unit/tlsserver/lib/TLSServer.cpp -+++ b/security/manager/ssl/tests/unit/tlsserver/lib/TLSServer.cpp -@@ -553,8 +553,6 @@ int StartServer(int argc, char* argv[], SSLSNISocketConfig sniSocketConfig, - return 1; - } - -- NSS_SetAlgorithmPolicy(SEC_OID_XYBER768D00, NSS_USE_ALG_IN_SSL_KX, 0); -- - if (SSL_ConfigServerSessionIDCache(0, 0, 0, nullptr) != SECSuccess) { - PrintPRError("SSL_ConfigServerSessionIDCache failed"); - return 1; -diff --git a/third_party/rust/neqo-crypto/.cargo-checksum.json b/third_party/rust/neqo-crypto/.cargo-checksum.json -index 188160d135..bea265565f 100644 ---- a/third_party/rust/neqo-crypto/.cargo-checksum.json -+++ b/third_party/rust/neqo-crypto/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"Cargo.toml":"fa915d4cac0a051c77107dd6f74514915fe2924fe3eecaad10e995062767fbbb","bindings/bindings.toml":"56921b753535f899b8095df3e8af04b1dc2213c4808dfb39734a3c554454d01d","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"6c3e94359395cce5cb29bc0063ff930ffcd7edd50c040cb459acce6c80aa4ef4","min_version.txt":"7e98f86c69cddb4f65cf96a6de1f4297e3ce224a4c4628609e29042b6c4dcfb9","src/aead.rs":"fc42bc20b84d2e5ccfd56271ae2d2db082e55586ea2926470c102da177f22296","src/aead_null.rs":"3a553f21126c9ca0116c2be81e5a777011b33c159fd88c4f384614bbdb06bb2e","src/agent.rs":"0ef7b488480d12c01a122050e82809bc784443ef6277d75fce21d706fbf5eaaf","src/agentio.rs":"415f70b95312d3ee6d74ba6f28094246101ab6d535aa9df880c38d8bb5a9279e","src/auth.rs":"ced1a18f691894984244088020ea25dc1ee678603317f0c7dfc8b8842fa750b4","src/cert.rs":"8942cb3ce25a61f92b6ffc30fb286052ed6f56eeda3be12fd46ea76ceba6c1cf","src/constants.rs":"f5c779db128a8b0607841ca18c376971017eb327e102e5e6959a7d8effe4b3a6","src/ech.rs":"9d322fcc01c0886f1dfe9bb6273cb9f88a746452ac9a802761b1816a05930c1f","src/err.rs":"ae979f334604aba89640c4491262641910033f0bd790d58671f649f5039b291c","src/exp.rs":"cec59d61fc95914f9703d2fb6490a8507af993c9db710dde894f2f8fd38123c7","src/ext.rs":"cbf7d9f5ecabf4b8c9efd6c334637ab1596ec5266d38ab8d2d6ceae305283deb","src/hkdf.rs":"ef32f20e30a9bd7f094199536d19c87c4231b7fbbe4a9c54c70e84ca9c6575be","src/hp.rs":"644f1bed67f1c6189a67c8d02ab3358aaa7f63af4b913dd7395becbc01a84291","src/lib.rs":"1f2c171e76f353c99cebe66f9812d3021ab2914eb015fed6a07409b7cfa426e6","src/min_version.rs":"89b7ef6f9d2301db4f689f4d963b58375d577f705b92003a804048441e00cfd1","src/p11.rs":"704c5f164c4f195c8051c5bf1e69a912c34b613a8cf6bed5f577dc5674eea34e","src/prio.rs":"e5e169296c0ac69919c59fb6c1f8bd6bf079452eaa13d75da0edd41d435d3f6f","src/replay.rs":"96b7af8eff9e14313e79303092018b12e8834f780c96b8e247c497fdc680c696","src/result.rs":"0587cbb6aace71a7f9765ef7c01dcd9f73a49dcc6331e1d8fe4de2aef6ca65b6","src/secrets.rs":"4ffaa66f25df47dadf042063bff5953effa7bf2f4920cafe827757d6a659cb58","src/selfencrypt.rs":"b7cc1c896c7661c37461fc3a8bcbfdf2589433b907fa5f968ae4f6907704b441","src/ssl.rs":"c83baa5518b81dd06f2e4072ea3c2d666ccdeb8b1ff6e3746eea9f1af47023a6","src/time.rs":"c71a01ff8aa2c0e97fb16ad620df4ed6b7cc1819ff93f46634e2f1c9551627ec","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"824735f88e487a3748200844e9481e81a72163ad74d82faa9aa16594d9b9bb25","tests/ext.rs":"1b047d23d9b224ad06eb65d8f3a7b351e263774e404c79bbcbe8f43790e29c18","tests/handshake.rs":"e892a2839b31414be16e96cdf3b1a65978716094700c1a4989229f7edbf578a0","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"b24fec53771c169be788772532d2617a5349196cf87d6444dc74214f7c73e92c","tests/init.rs":"616313cb38eac44b8c71a1d23a52a7d7b4c7c07d4c20dc9ea6600c3317f92613","tests/selfencrypt.rs":"8d10840b41629bf449a6b3a551377315e8a05ca26c6b041548748196652c5909"},"package":null} -\ No newline at end of file -+{"files":{"Cargo.toml":"fa915d4cac0a051c77107dd6f74514915fe2924fe3eecaad10e995062767fbbb","bindings/bindings.toml":"56921b753535f899b8095df3e8af04b1dc2213c4808dfb39734a3c554454d01d","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"6c3e94359395cce5cb29bc0063ff930ffcd7edd50c040cb459acce6c80aa4ef4","min_version.txt":"7e98f86c69cddb4f65cf96a6de1f4297e3ce224a4c4628609e29042b6c4dcfb9","src/aead.rs":"fc42bc20b84d2e5ccfd56271ae2d2db082e55586ea2926470c102da177f22296","src/aead_null.rs":"3a553f21126c9ca0116c2be81e5a777011b33c159fd88c4f384614bbdb06bb2e","src/agent.rs":"0ef7b488480d12c01a122050e82809bc784443ef6277d75fce21d706fbf5eaaf","src/agentio.rs":"415f70b95312d3ee6d74ba6f28094246101ab6d535aa9df880c38d8bb5a9279e","src/auth.rs":"ced1a18f691894984244088020ea25dc1ee678603317f0c7dfc8b8842fa750b4","src/cert.rs":"8942cb3ce25a61f92b6ffc30fb286052ed6f56eeda3be12fd46ea76ceba6c1cf","src/constants.rs":"78df03f9209ff36279b75f88f6d3d15fed4a0fdd1f6edc8ea8100ed9ae34320f","src/ech.rs":"9d322fcc01c0886f1dfe9bb6273cb9f88a746452ac9a802761b1816a05930c1f","src/err.rs":"ae979f334604aba89640c4491262641910033f0bd790d58671f649f5039b291c","src/exp.rs":"cec59d61fc95914f9703d2fb6490a8507af993c9db710dde894f2f8fd38123c7","src/ext.rs":"cbf7d9f5ecabf4b8c9efd6c334637ab1596ec5266d38ab8d2d6ceae305283deb","src/hkdf.rs":"ef32f20e30a9bd7f094199536d19c87c4231b7fbbe4a9c54c70e84ca9c6575be","src/hp.rs":"644f1bed67f1c6189a67c8d02ab3358aaa7f63af4b913dd7395becbc01a84291","src/lib.rs":"f0d0b14c7330fa4040166953c4a428918ce78967fe500bfeaa5f2c10b64567b3","src/min_version.rs":"89b7ef6f9d2301db4f689f4d963b58375d577f705b92003a804048441e00cfd1","src/p11.rs":"704c5f164c4f195c8051c5bf1e69a912c34b613a8cf6bed5f577dc5674eea34e","src/prio.rs":"e5e169296c0ac69919c59fb6c1f8bd6bf079452eaa13d75da0edd41d435d3f6f","src/replay.rs":"96b7af8eff9e14313e79303092018b12e8834f780c96b8e247c497fdc680c696","src/result.rs":"0587cbb6aace71a7f9765ef7c01dcd9f73a49dcc6331e1d8fe4de2aef6ca65b6","src/secrets.rs":"4ffaa66f25df47dadf042063bff5953effa7bf2f4920cafe827757d6a659cb58","src/selfencrypt.rs":"b7cc1c896c7661c37461fc3a8bcbfdf2589433b907fa5f968ae4f6907704b441","src/ssl.rs":"c83baa5518b81dd06f2e4072ea3c2d666ccdeb8b1ff6e3746eea9f1af47023a6","src/time.rs":"c71a01ff8aa2c0e97fb16ad620df4ed6b7cc1819ff93f46634e2f1c9551627ec","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"824735f88e487a3748200844e9481e81a72163ad74d82faa9aa16594d9b9bb25","tests/ext.rs":"1b047d23d9b224ad06eb65d8f3a7b351e263774e404c79bbcbe8f43790e29c18","tests/handshake.rs":"e892a2839b31414be16e96cdf3b1a65978716094700c1a4989229f7edbf578a0","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"b24fec53771c169be788772532d2617a5349196cf87d6444dc74214f7c73e92c","tests/init.rs":"616313cb38eac44b8c71a1d23a52a7d7b4c7c07d4c20dc9ea6600c3317f92613","tests/selfencrypt.rs":"8d10840b41629bf449a6b3a551377315e8a05ca26c6b041548748196652c5909"},"package":null} -diff --git a/third_party/rust/neqo-crypto/src/constants.rs b/third_party/rust/neqo-crypto/src/constants.rs -index daef3d3c56..7e6823fd01 100644 ---- a/third_party/rust/neqo-crypto/src/constants.rs -+++ b/third_party/rust/neqo-crypto/src/constants.rs -@@ -62,7 +62,7 @@ remap_enum! { - TLS_GRP_EC_SECP384R1 = ssl_grp_ec_secp384r1, - TLS_GRP_EC_SECP521R1 = ssl_grp_ec_secp521r1, - TLS_GRP_EC_X25519 = ssl_grp_ec_curve25519, -- TLS_GRP_KEM_XYBER768D00 = ssl_grp_kem_xyber768d00, -+ TLS_GRP_KEM_MLKEM768X25519 = ssl_grp_kem_mlkem768x25519, - } - } - -diff --git a/third_party/rust/neqo-crypto/src/lib.rs b/third_party/rust/neqo-crypto/src/lib.rs -index 9b8a478294..cb94d1f32b 100644 ---- a/third_party/rust/neqo-crypto/src/lib.rs -+++ b/third_party/rust/neqo-crypto/src/lib.rs -@@ -122,13 +122,6 @@ pub fn init() -> Res<()> { - - secstatus_to_res(unsafe { nss::NSS_NoDB_Init(null()) })?; - secstatus_to_res(unsafe { nss::NSS_SetDomesticPolicy() })?; -- secstatus_to_res(unsafe { -- p11::NSS_SetAlgorithmPolicy( -- p11::SECOidTag::SEC_OID_XYBER768D00, -- p11::NSS_USE_ALG_IN_SSL_KX, -- 0, -- ) -- })?; - - Ok(NssLoaded::NoDb) - }); -diff --git a/third_party/rust/neqo-transport/.cargo-checksum.json b/third_party/rust/neqo-transport/.cargo-checksum.json -index 79d2126b4a..a67d56971b 100644 ---- a/third_party/rust/neqo-transport/.cargo-checksum.json -+++ b/third_party/rust/neqo-transport/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"Cargo.toml":"2c18e43bca0b6e963cd3c169ed4b1dbf21de7e420b71be1d9cf1bf1bfcaa8d01","benches/range_tracker.rs":"590dd1f81c92e89ce28af1efdda583d85240438bd9c4c68767286d22a299ad4b","benches/rx_stream_orderer.rs":"53a008357703251a18100521a12d8fa9443c5601ddc3cbd1b3c2899074da4c4f","benches/transfer.rs":"94eb0ec1a0a7d0a4863ddc1c6d006521e52c1f2e7f03c69428b18f7eb827d33f","build.rs":"78ec79c93bf13c3a40ceef8bba1ea2eada61c8f2dfc15ea7bf117958d367949c","src/ackrate.rs":"4bb882e1069a0707dc85338b75327e2910c93ee5f36575767a0d58c4c41c9d4f","src/addr_valid.rs":"03c0b2ff85254179c5d425b12acfdcc6b1ea5735aeb0f604b9b3603451b3ef0a","src/cc/classic_cc.rs":"bd4999f21b6b7d754c8694345f40d0e99c1c3caba3d23a90bd9eb12798ef4979","src/cc/cubic.rs":"24c6913cc6346e5361007221c26e8096ece51583431fc3ab9c99e4ce4b0a9f5d","src/cc/mod.rs":"8031ed3d37bf780dd1364114149b1a1327656e7f481768548ad77db7006daf60","src/cc/new_reno.rs":"25d0921005688e0f0666efd0a4931b4f8cd44363587d98e5b6404818c5d05dd4","src/cc/tests/cubic.rs":"25ee2c60549bb8b3c1e9a915f148928a26b3f1c51e5f7fe6b646a437f520954c","src/cc/tests/mod.rs":"44f8df551e742ae1037cd1cdb85b2c1334c2e5ab3c23ed63d856dbc6b8743afc","src/cc/tests/new_reno.rs":"3cd7373063a3afecb6dfae7894edf959641d87d3de55d4abfa7742cd115fa358","src/cid.rs":"9686a3070c593cfca846d7549863728e31211b304b9fa876220f79bff5e24173","src/connection/dump.rs":"bd4fb55785fe42f5c94f7bcc14ccf4ae377d28b691fb55dbf1139ae9412b0ea9","src/connection/idle.rs":"6f588bab950620df322033abea5f8a731f5b6d88cbe68694b69ab8acea0745ae","src/connection/mod.rs":"72ab734a8d368b2f2d430899a65f5a8c64a21d797a0c3e6d3e53666ef8e0e740","src/connection/params.rs":"38e0b47c8cc5fbe602e3174d7a70df410829bc240b42f21cebd10818e606ef7c","src/connection/saved.rs":"97eb19792be3c4d721057021a43ea50a52f89a3cfa583d3d3dcf5d9144b332f5","src/connection/state.rs":"b1d4bdda3479e7957d1949a969281ecd8a3d88f4fbaff6dcf7ebbb576759339c","src/connection/test_internal.rs":"f3ebfe97b25c9c716d41406066295e5aff4e96a3051ef4e2b5fb258282bbc14c","src/connection/tests/ackrate.rs":"4a2b835575850ae4a14209d3e51883ecb1e69afb44ef91b5e13a5e6cb7174fab","src/connection/tests/cc.rs":"d9a0f00a8f439c4ea8d4b6fa689fbde8bd283256afdd68ec4a27f6638b729704","src/connection/tests/close.rs":"5f245fd134bc0759ef0c83a6d53e0a8d5a8e58dcdf203c750ec9121940272461","src/connection/tests/datagram.rs":"7d89e5293d5b50c7a54c9b48949c2c4c8ef5dc08f3e7e5f51654586578d65602","src/connection/tests/ecn.rs":"3ff05893154fb6a895fe4453db7cc54684ba3bdf268a36b69c36c4070768d7b4","src/connection/tests/handshake.rs":"67a6f090ed89ef6c63129f7e662dc1cfff3f291711a866dff3d779caa40e51c7","src/connection/tests/idle.rs":"2d588bd6570172ca08974931273b6c4645af3edca9ccac78499d7d2d5ecec86c","src/connection/tests/keys.rs":"7c58b255e9732711e13f2a3e1daa13ac9481d8c919a32ca62e70c850845a6b38","src/connection/tests/migration.rs":"40d4feba9957de7eef7391009996016af1a3052fabc7659680b64796cf9fb8bf","src/connection/tests/mod.rs":"43b7745e9722333f7bc851c70ccdfdd1dc4da3991a4b821fac677664719e760f","src/connection/tests/null.rs":"38f76a4ea15e6b11634d4374cb0f2a68bd250e5d35831edfce0fa48deeaa420d","src/connection/tests/priority.rs":"dd3504f52d3fce7a96441624bc1c82c733e6bb556b9b79d24d0f4fb4efaf5a9e","src/connection/tests/recovery.rs":"7f28767f3cca2ff60e3dcfa803e12ef043486a222f54681a8faf2ea2fee564a1","src/connection/tests/resumption.rs":"1a0de0993cd325224fc79a3c094d22636d5b122ab1123d16265d4fafb23574bd","src/connection/tests/stream.rs":"3a6b23be63e1901ea479749d8132db86959279329121fe5d51b34c3fef4d4d05","src/connection/tests/vn.rs":"92f61cfe4ccbb88f4f7c14f0e791bdece5368012922714d3dbd6a75bedb1b5a1","src/connection/tests/zerortt.rs":"139f25b992ee6f7e3cc31448f81e511386bb3b0e6691180c7f616b70c4864883","src/crypto.rs":"a0ff9053a13350e34aec02241eb2ae3e86d9f5af21065d5b8d71b7b229e00ced","src/ecn.rs":"2e54e0a57842070a80da61315b601085876351ef0272eaf65b8a59e32ecc4db8","src/events.rs":"3cdd7d5496b2745626db4ceb863b5a91ae943090a43a5816a1f9bcf873fba2be","src/fc.rs":"c8d10909912b6770e644aaec02cff6f89f557d5f40a246aa86654cf88c91d26e","src/frame.rs":"4262717662f155e62bb29c9f0cac295bbae96076eb2d92c27052a35f979aa196","src/lib.rs":"a8ab9b2204d50a3b6f6c1250ed0d47daafaef00c040b93dfa3c60195eeb07624","src/pace.rs":"86a674ac4d086148ea297214910458c3705918bd627b996ba8bbb12f2c4bf99e","src/packet/mod.rs":"16385a097363d3af6452c6dcb7f14fbd86e410dd42fa59435c5beea1699f77e9","src/packet/retry.rs":"d5f999485f21b388a7383cd011fc6e96109c1a9fb5aef79b19017df6844271ff","src/path.rs":"6a49a8a1cad609873f2cacca6489ba1a7a18cf238f7b8f6df2d0b0923edde3fd","src/qlog.rs":"07ea3a3e31ebf3819d40ff0dc4e4a88861db59f761542e9bc2e9e773eb555242","src/quic_datagrams.rs":"3d33ecb9e6e80c77b812e8260fc807352300fb2305a29b797259ae34c52b67c5","src/recovery/mod.rs":"4b1e45db1793785cda67fe804d1e6bc99b5f1a3ed3ff0f82e8164bc0aab11f8e","src/recovery/sent.rs":"959b70ed80b1061acf36bdd007f2b1baefbc8647c3a315d6fbd317884757beca","src/recovery/token.rs":"c1e4190c6733afd2bf5e60060d8ba3ab9fb136e02252e2480b281871a54d6066","src/recv_stream.rs":"f21ae0bb786901bb7d726a94cb3352607b0057128beaa331808137f2f57a330b","src/rtt.rs":"4635dc0c401b78a1fd9d34da6f9bf7f6e7f5be3a57ed9716e0efc8f0f94f1e47","src/send_stream.rs":"5b12a5543dd55d0d506eb64f828883b9761722a1558f16ecb90ce5a43587a2ff","src/sender.rs":"043be47e97d050532f12a564e78605cff7ff23e07639ea06059ebd85e0748f2f","src/server.rs":"3ededa0afd5e6b6888fc5ac9ce48e35e12974c338c7985f2b840e9dc76af0062","src/stats.rs":"257ab1242ea2e6bfac0900e6c4bdad794bc67b666930323d24e022e46b9be82b","src/stream_id.rs":"fd07cbb81709a54bdb0659f676ef851cd145c004b817044ede5b21e54fdb60e4","src/streams.rs":"f2e393dc73cc85c8339cb94daf6a09d3bde4d33d820fd6623ddd6b3d727d5fd5","src/tparams.rs":"592f29c9e2d2a63ff68b024ce23274896ed8ae83192b76b91f5e2991246682cd","src/tracking.rs":"c8581318cd7be3ca94ef4482341cfc1fdb70f934966c63a69335cb0bf5bd292a","src/version.rs":"182484ed9ecc2e17cab73cc61914a86a2d206936cab313825ae76fd37eeade77","tests/common/mod.rs":"7f9437d5efc38f4b9cabfece575e9168580e78e8638f46e538de58607f46ebb8","tests/conn_vectors.rs":"997702f4d8b8fa3b987b33077a0eb325e968b25b61fb4703532f8d97e1d4c98c","tests/connection.rs":"1c14853d61dad5f228a3e1a0becebb0c6826405de59ff601f43d5cb2fdb3f8ea","tests/network.rs":"04921aa5af583e842e6d2176a898fbfea747e831bbe292b5ef8441eaf546b93a","tests/retry.rs":"ace4a0baa36f7218c9942abc2b45b58f8c2dbd2b6004b469751e41b50f6f99d0","tests/server.rs":"9724460d7ac2f9d6af94baf6b3cf950900ae489412edc55d62609bacfcf02b09"},"package":null} -\ No newline at end of file -+{"files":{"Cargo.toml":"2c18e43bca0b6e963cd3c169ed4b1dbf21de7e420b71be1d9cf1bf1bfcaa8d01","benches/range_tracker.rs":"590dd1f81c92e89ce28af1efdda583d85240438bd9c4c68767286d22a299ad4b","benches/rx_stream_orderer.rs":"53a008357703251a18100521a12d8fa9443c5601ddc3cbd1b3c2899074da4c4f","benches/transfer.rs":"94eb0ec1a0a7d0a4863ddc1c6d006521e52c1f2e7f03c69428b18f7eb827d33f","build.rs":"78ec79c93bf13c3a40ceef8bba1ea2eada61c8f2dfc15ea7bf117958d367949c","src/ackrate.rs":"4bb882e1069a0707dc85338b75327e2910c93ee5f36575767a0d58c4c41c9d4f","src/addr_valid.rs":"03c0b2ff85254179c5d425b12acfdcc6b1ea5735aeb0f604b9b3603451b3ef0a","src/cc/classic_cc.rs":"bd4999f21b6b7d754c8694345f40d0e99c1c3caba3d23a90bd9eb12798ef4979","src/cc/cubic.rs":"24c6913cc6346e5361007221c26e8096ece51583431fc3ab9c99e4ce4b0a9f5d","src/cc/mod.rs":"8031ed3d37bf780dd1364114149b1a1327656e7f481768548ad77db7006daf60","src/cc/new_reno.rs":"25d0921005688e0f0666efd0a4931b4f8cd44363587d98e5b6404818c5d05dd4","src/cc/tests/cubic.rs":"25ee2c60549bb8b3c1e9a915f148928a26b3f1c51e5f7fe6b646a437f520954c","src/cc/tests/mod.rs":"44f8df551e742ae1037cd1cdb85b2c1334c2e5ab3c23ed63d856dbc6b8743afc","src/cc/tests/new_reno.rs":"3cd7373063a3afecb6dfae7894edf959641d87d3de55d4abfa7742cd115fa358","src/cid.rs":"9686a3070c593cfca846d7549863728e31211b304b9fa876220f79bff5e24173","src/connection/dump.rs":"bd4fb55785fe42f5c94f7bcc14ccf4ae377d28b691fb55dbf1139ae9412b0ea9","src/connection/idle.rs":"6f588bab950620df322033abea5f8a731f5b6d88cbe68694b69ab8acea0745ae","src/connection/mod.rs":"72ab734a8d368b2f2d430899a65f5a8c64a21d797a0c3e6d3e53666ef8e0e740","src/connection/params.rs":"38e0b47c8cc5fbe602e3174d7a70df410829bc240b42f21cebd10818e606ef7c","src/connection/saved.rs":"97eb19792be3c4d721057021a43ea50a52f89a3cfa583d3d3dcf5d9144b332f5","src/connection/state.rs":"b1d4bdda3479e7957d1949a969281ecd8a3d88f4fbaff6dcf7ebbb576759339c","src/connection/test_internal.rs":"f3ebfe97b25c9c716d41406066295e5aff4e96a3051ef4e2b5fb258282bbc14c","src/connection/tests/ackrate.rs":"4a2b835575850ae4a14209d3e51883ecb1e69afb44ef91b5e13a5e6cb7174fab","src/connection/tests/cc.rs":"d9a0f00a8f439c4ea8d4b6fa689fbde8bd283256afdd68ec4a27f6638b729704","src/connection/tests/close.rs":"5f245fd134bc0759ef0c83a6d53e0a8d5a8e58dcdf203c750ec9121940272461","src/connection/tests/datagram.rs":"7d89e5293d5b50c7a54c9b48949c2c4c8ef5dc08f3e7e5f51654586578d65602","src/connection/tests/ecn.rs":"3ff05893154fb6a895fe4453db7cc54684ba3bdf268a36b69c36c4070768d7b4","src/connection/tests/handshake.rs":"67a6f090ed89ef6c63129f7e662dc1cfff3f291711a866dff3d779caa40e51c7","src/connection/tests/idle.rs":"2d588bd6570172ca08974931273b6c4645af3edca9ccac78499d7d2d5ecec86c","src/connection/tests/keys.rs":"7c58b255e9732711e13f2a3e1daa13ac9481d8c919a32ca62e70c850845a6b38","src/connection/tests/migration.rs":"40d4feba9957de7eef7391009996016af1a3052fabc7659680b64796cf9fb8bf","src/connection/tests/mod.rs":"43b7745e9722333f7bc851c70ccdfdd1dc4da3991a4b821fac677664719e760f","src/connection/tests/null.rs":"38f76a4ea15e6b11634d4374cb0f2a68bd250e5d35831edfce0fa48deeaa420d","src/connection/tests/priority.rs":"dd3504f52d3fce7a96441624bc1c82c733e6bb556b9b79d24d0f4fb4efaf5a9e","src/connection/tests/recovery.rs":"7f28767f3cca2ff60e3dcfa803e12ef043486a222f54681a8faf2ea2fee564a1","src/connection/tests/resumption.rs":"1a0de0993cd325224fc79a3c094d22636d5b122ab1123d16265d4fafb23574bd","src/connection/tests/stream.rs":"3a6b23be63e1901ea479749d8132db86959279329121fe5d51b34c3fef4d4d05","src/connection/tests/vn.rs":"92f61cfe4ccbb88f4f7c14f0e791bdece5368012922714d3dbd6a75bedb1b5a1","src/connection/tests/zerortt.rs":"139f25b992ee6f7e3cc31448f81e511386bb3b0e6691180c7f616b70c4864883","src/crypto.rs":"033db48824fa541db728b43f25d5852d4c4de735c35d89151336649dd8d2429a","src/ecn.rs":"2e54e0a57842070a80da61315b601085876351ef0272eaf65b8a59e32ecc4db8","src/events.rs":"3cdd7d5496b2745626db4ceb863b5a91ae943090a43a5816a1f9bcf873fba2be","src/fc.rs":"c8d10909912b6770e644aaec02cff6f89f557d5f40a246aa86654cf88c91d26e","src/frame.rs":"4262717662f155e62bb29c9f0cac295bbae96076eb2d92c27052a35f979aa196","src/lib.rs":"a8ab9b2204d50a3b6f6c1250ed0d47daafaef00c040b93dfa3c60195eeb07624","src/pace.rs":"86a674ac4d086148ea297214910458c3705918bd627b996ba8bbb12f2c4bf99e","src/packet/mod.rs":"16385a097363d3af6452c6dcb7f14fbd86e410dd42fa59435c5beea1699f77e9","src/packet/retry.rs":"d5f999485f21b388a7383cd011fc6e96109c1a9fb5aef79b19017df6844271ff","src/path.rs":"6a49a8a1cad609873f2cacca6489ba1a7a18cf238f7b8f6df2d0b0923edde3fd","src/qlog.rs":"07ea3a3e31ebf3819d40ff0dc4e4a88861db59f761542e9bc2e9e773eb555242","src/quic_datagrams.rs":"3d33ecb9e6e80c77b812e8260fc807352300fb2305a29b797259ae34c52b67c5","src/recovery/mod.rs":"4b1e45db1793785cda67fe804d1e6bc99b5f1a3ed3ff0f82e8164bc0aab11f8e","src/recovery/sent.rs":"959b70ed80b1061acf36bdd007f2b1baefbc8647c3a315d6fbd317884757beca","src/recovery/token.rs":"c1e4190c6733afd2bf5e60060d8ba3ab9fb136e02252e2480b281871a54d6066","src/recv_stream.rs":"f21ae0bb786901bb7d726a94cb3352607b0057128beaa331808137f2f57a330b","src/rtt.rs":"4635dc0c401b78a1fd9d34da6f9bf7f6e7f5be3a57ed9716e0efc8f0f94f1e47","src/send_stream.rs":"5b12a5543dd55d0d506eb64f828883b9761722a1558f16ecb90ce5a43587a2ff","src/sender.rs":"043be47e97d050532f12a564e78605cff7ff23e07639ea06059ebd85e0748f2f","src/server.rs":"3ededa0afd5e6b6888fc5ac9ce48e35e12974c338c7985f2b840e9dc76af0062","src/stats.rs":"257ab1242ea2e6bfac0900e6c4bdad794bc67b666930323d24e022e46b9be82b","src/stream_id.rs":"fd07cbb81709a54bdb0659f676ef851cd145c004b817044ede5b21e54fdb60e4","src/streams.rs":"f2e393dc73cc85c8339cb94daf6a09d3bde4d33d820fd6623ddd6b3d727d5fd5","src/tparams.rs":"592f29c9e2d2a63ff68b024ce23274896ed8ae83192b76b91f5e2991246682cd","src/tracking.rs":"c8581318cd7be3ca94ef4482341cfc1fdb70f934966c63a69335cb0bf5bd292a","src/version.rs":"182484ed9ecc2e17cab73cc61914a86a2d206936cab313825ae76fd37eeade77","tests/common/mod.rs":"7f9437d5efc38f4b9cabfece575e9168580e78e8638f46e538de58607f46ebb8","tests/conn_vectors.rs":"997702f4d8b8fa3b987b33077a0eb325e968b25b61fb4703532f8d97e1d4c98c","tests/connection.rs":"c6755968255fb68795d9f1ae4ece73d7b674d8616d3512757309efd2c42c39d1","tests/network.rs":"04921aa5af583e842e6d2176a898fbfea747e831bbe292b5ef8441eaf546b93a","tests/retry.rs":"ace4a0baa36f7218c9942abc2b45b58f8c2dbd2b6004b469751e41b50f6f99d0","tests/server.rs":"9724460d7ac2f9d6af94baf6b3cf950900ae489412edc55d62609bacfcf02b09"},"package":null} -diff --git a/third_party/rust/neqo-transport/src/crypto.rs b/third_party/rust/neqo-transport/src/crypto.rs -index aca76b8bb9..3bfe7057bc 100644 ---- a/third_party/rust/neqo-transport/src/crypto.rs -+++ b/third_party/rust/neqo-transport/src/crypto.rs -@@ -21,7 +21,7 @@ use neqo_crypto::{ - TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_CT_HANDSHAKE, - TLS_EPOCH_APPLICATION_DATA, TLS_EPOCH_HANDSHAKE, TLS_EPOCH_INITIAL, TLS_EPOCH_ZERO_RTT, - TLS_GRP_EC_SECP256R1, TLS_GRP_EC_SECP384R1, TLS_GRP_EC_SECP521R1, TLS_GRP_EC_X25519, -- TLS_GRP_KEM_XYBER768D00, TLS_VERSION_1_3, -+ TLS_GRP_KEM_MLKEM768X25519, TLS_VERSION_1_3, - }; - - use crate::{ -@@ -78,9 +78,10 @@ impl Crypto { - ])?; - match &mut agent { - Agent::Server(c) => { -- // Clients do not send xyber shares by default, but servers should accept them. -+ // Clients do not send mlkem768x25519 shares by default, but servers should accept -+ // them. - c.set_groups(&[ -- TLS_GRP_KEM_XYBER768D00, -+ TLS_GRP_KEM_MLKEM768X25519, - TLS_GRP_EC_X25519, - TLS_GRP_EC_SECP256R1, - TLS_GRP_EC_SECP384R1, -diff --git a/third_party/rust/neqo-transport/tests/connection.rs b/third_party/rust/neqo-transport/tests/connection.rs -index 35167d0abd..7f9304e9c8 100644 ---- a/third_party/rust/neqo-transport/tests/connection.rs -+++ b/third_party/rust/neqo-transport/tests/connection.rs -@@ -279,12 +279,12 @@ fn overflow_crypto() { - } - - #[test] --fn test_handshake_xyber() { -+fn handshake_mlkem768x25519() { - let mut client = default_client(); - let mut server = default_server(); - - client -- .set_groups(&[neqo_crypto::TLS_GRP_KEM_XYBER768D00]) -+ .set_groups(&[neqo_crypto::TLS_GRP_KEM_MLKEM768X25519]) - .ok(); - client.send_additional_key_shares(0).ok(); - -@@ -293,10 +293,10 @@ fn test_handshake_xyber() { - assert_eq!(*server.state(), State::Confirmed); - assert_eq!( - client.tls_info().unwrap().key_exchange(), -- neqo_crypto::TLS_GRP_KEM_XYBER768D00 -+ neqo_crypto::TLS_GRP_KEM_MLKEM768X25519 - ); - assert_eq!( - server.tls_info().unwrap().key_exchange(), -- neqo_crypto::TLS_GRP_KEM_XYBER768D00 -+ neqo_crypto::TLS_GRP_KEM_MLKEM768X25519 - ); - } diff --git a/mozilla-bmo1170092.patch b/mozilla-bmo1170092.patch index 36d2b00..66dacbf 100644 --- a/mozilla-bmo1170092.patch +++ b/mozilla-bmo1170092.patch @@ -1,6 +1,6 @@ -diff -up firefox-115.0.2/extensions/pref/autoconfig/src/nsReadConfig.cpp.1170092 firefox-115.0.2/extensions/pref/autoconfig/src/nsReadConfig.cpp ---- firefox-115.0.2/extensions/pref/autoconfig/src/nsReadConfig.cpp.1170092 2023-07-10 21:08:53.000000000 +0200 -+++ firefox-115.0.2/extensions/pref/autoconfig/src/nsReadConfig.cpp 2023-07-17 10:33:23.443355156 +0200 +diff -up firefox-140.0/extensions/pref/autoconfig/src/nsReadConfig.cpp.mozilla-bmo1170092 firefox-140.0/extensions/pref/autoconfig/src/nsReadConfig.cpp +--- firefox-140.0/extensions/pref/autoconfig/src/nsReadConfig.cpp.mozilla-bmo1170092 2025-06-02 15:26:44.000000000 +0200 ++++ firefox-140.0/extensions/pref/autoconfig/src/nsReadConfig.cpp 2025-06-04 13:24:00.344728697 +0200 @@ -263,8 +263,20 @@ nsresult nsReadConfig::openAndEvaluateJS if (NS_FAILED(rv)) return rv; @@ -23,10 +23,10 @@ diff -up firefox-115.0.2/extensions/pref/autoconfig/src/nsReadConfig.cpp.1170092 } else { nsAutoCString location("resource://gre/defaults/autoconfig/"); location += aFileName; -diff -up firefox-115.0.2/modules/libpref/Preferences.cpp.1170092 firefox-115.0.2/modules/libpref/Preferences.cpp ---- firefox-115.0.2/modules/libpref/Preferences.cpp.1170092 2023-07-10 21:09:00.000000000 +0200 -+++ firefox-115.0.2/modules/libpref/Preferences.cpp 2023-07-17 10:33:23.444355156 +0200 -@@ -4825,6 +4825,9 @@ nsresult Preferences::InitInitialObjects +diff -up firefox-140.0/modules/libpref/Preferences.cpp.mozilla-bmo1170092 firefox-140.0/modules/libpref/Preferences.cpp +--- firefox-140.0/modules/libpref/Preferences.cpp.mozilla-bmo1170092 2025-06-02 15:26:51.000000000 +0200 ++++ firefox-140.0/modules/libpref/Preferences.cpp 2025-06-04 13:24:00.345430064 +0200 +@@ -4914,6 +4914,9 @@ nsresult Preferences::InitInitialObjects // // Thus, in the omni.jar case, we always load app-specific default // preferences from omni.jar, whether or not `$app == $gre`. @@ -36,10 +36,10 @@ diff -up firefox-115.0.2/modules/libpref/Preferences.cpp.1170092 firefox-115.0.2 nsresult rv = NS_ERROR_FAILURE; UniquePtr find; -diff -up firefox-115.0.2/toolkit/xre/nsXREDirProvider.cpp.1170092 firefox-115.0.2/toolkit/xre/nsXREDirProvider.cpp ---- firefox-115.0.2/toolkit/xre/nsXREDirProvider.cpp.1170092 2023-07-10 22:57:20.000000000 +0200 -+++ firefox-115.0.2/toolkit/xre/nsXREDirProvider.cpp 2023-07-17 10:56:25.309692121 +0200 -@@ -72,6 +72,7 @@ +diff -up firefox-140.0/toolkit/xre/nsXREDirProvider.cpp.mozilla-bmo1170092 firefox-140.0/toolkit/xre/nsXREDirProvider.cpp +--- firefox-140.0/toolkit/xre/nsXREDirProvider.cpp.mozilla-bmo1170092 2025-06-02 15:27:00.000000000 +0200 ++++ firefox-140.0/toolkit/xre/nsXREDirProvider.cpp 2025-06-04 15:44:09.413562326 +0200 +@@ -76,6 +76,7 @@ #endif #ifdef XP_UNIX # include @@ -47,7 +47,7 @@ diff -up firefox-115.0.2/toolkit/xre/nsXREDirProvider.cpp.1170092 firefox-115.0. #endif #ifdef XP_IOS # include "UIKitDirProvider.h" -@@ -478,6 +479,17 @@ nsXREDirProvider::GetFile(const char* aP +@@ -462,6 +463,17 @@ nsXREDirProvider::GetFile(const char* aP rv = file->AppendNative(nsLiteralCString(PREF_OVERRIDE_DIRNAME)); NS_ENSURE_SUCCESS(rv, rv); rv = EnsureDirectoryExists(file); @@ -60,12 +60,12 @@ diff -up firefox-115.0.2/toolkit/xre/nsXREDirProvider.cpp.1170092 firefox-115.0. + appInfo->GetName(appName); + ToLowerCase(appName); + sysConfigDir.Append(appName); -+ NS_NewNativeLocalFile(sysConfigDir, false, getter_AddRefs(file)); ++ NS_NewNativeLocalFile(sysConfigDir, getter_AddRefs(file)); + rv = EnsureDirectoryExists(file); } else { // We don't know anything about this property. Fail without warning, because // otherwise we'll get too much warning spam due to -@@ -694,6 +706,16 @@ nsXREDirProvider::GetFiles(const char* a +@@ -518,6 +530,16 @@ nsXREDirProvider::GetFiles(const char* a } #endif @@ -82,9 +82,9 @@ diff -up firefox-115.0.2/toolkit/xre/nsXREDirProvider.cpp.1170092 firefox-115.0. rv = NS_NewArrayEnumerator(aResult, directories, NS_GET_IID(nsIFile)); } else if (!strcmp(aProperty, NS_APP_CHROME_DIR_LIST)) { // NS_APP_CHROME_DIR_LIST is only used to get default (native) icons -diff -up firefox-115.0.2/xpcom/io/nsAppDirectoryServiceDefs.h.1170092 firefox-115.0.2/xpcom/io/nsAppDirectoryServiceDefs.h ---- firefox-115.0.2/xpcom/io/nsAppDirectoryServiceDefs.h.1170092 2023-07-10 21:09:13.000000000 +0200 -+++ firefox-115.0.2/xpcom/io/nsAppDirectoryServiceDefs.h 2023-07-17 10:33:23.444355156 +0200 +diff -up firefox-140.0/xpcom/io/nsAppDirectoryServiceDefs.h.mozilla-bmo1170092 firefox-140.0/xpcom/io/nsAppDirectoryServiceDefs.h +--- firefox-140.0/xpcom/io/nsAppDirectoryServiceDefs.h.mozilla-bmo1170092 2025-06-02 15:27:01.000000000 +0200 ++++ firefox-140.0/xpcom/io/nsAppDirectoryServiceDefs.h 2025-06-04 13:24:00.346423861 +0200 @@ -58,6 +58,7 @@ #define NS_APP_PREFS_DEFAULTS_DIR_LIST "PrefDL" #define NS_APP_PREFS_OVERRIDE_DIR \ diff --git a/mozilla-bmo1670333.patch b/mozilla-bmo1670333.patch index 4d29f5d..3b6bfb6 100644 --- a/mozilla-bmo1670333.patch +++ b/mozilla-bmo1670333.patch @@ -1,7 +1,7 @@ -diff -up firefox-128.0/dom/media/mp4/MP4Demuxer.cpp.mozilla-bmo1670333 firefox-128.0/dom/media/mp4/MP4Demuxer.cpp ---- firefox-128.0/dom/media/mp4/MP4Demuxer.cpp.mozilla-bmo1670333 2024-07-04 18:20:27.000000000 +0200 -+++ firefox-128.0/dom/media/mp4/MP4Demuxer.cpp 2024-07-16 13:49:10.475630426 +0200 -@@ -33,6 +33,8 @@ mozilla::LogModule* GetDemuxerLog() { re +diff -up firefox-140.0/dom/media/mp4/MP4Demuxer.cpp.mozilla-bmo1670333 firefox-140.0/dom/media/mp4/MP4Demuxer.cpp +--- firefox-140.0/dom/media/mp4/MP4Demuxer.cpp.mozilla-bmo1670333 2025-06-17 18:15:13.000000000 +0200 ++++ firefox-140.0/dom/media/mp4/MP4Demuxer.cpp 2025-06-18 10:17:47.394794429 +0200 +@@ -32,6 +32,8 @@ mozilla::LogModule* GetDemuxerLog() { re DDMOZ_LOG(gMediaDemuxerLog, mozilla::LogLevel::Debug, "::%s: " arg, \ __func__, ##__VA_ARGS__) @@ -11,9 +11,9 @@ diff -up firefox-128.0/dom/media/mp4/MP4Demuxer.cpp.mozilla-bmo1670333 firefox-1 using TimeUnit = media::TimeUnit; @@ -419,6 +421,12 @@ already_AddRefed MP4TrackD - [[fallthrough]]; case H264::FrameType::OTHER: { - bool keyframe = type == H264::FrameType::I_FRAME; + bool keyframe = type == H264::FrameType::I_FRAME_OTHER || + type == H264::FrameType::I_FRAME_IDR; + if (gUseKeyframeFromContainer) { + if (sample->mKeyframe && sample->mKeyframe != keyframe) { + sample->mKeyframe = keyframe; @@ -23,10 +23,10 @@ diff -up firefox-128.0/dom/media/mp4/MP4Demuxer.cpp.mozilla-bmo1670333 firefox-1 if (sample->mKeyframe != keyframe) { NS_WARNING(nsPrintfCString("Frame incorrectly marked as %skeyframe " "@ pts:%" PRId64 " dur:%" PRId64 -diff -up firefox-128.0/dom/media/platforms/PDMFactory.cpp.mozilla-bmo1670333 firefox-128.0/dom/media/platforms/PDMFactory.cpp ---- firefox-128.0/dom/media/platforms/PDMFactory.cpp.mozilla-bmo1670333 2024-07-04 18:20:26.000000000 +0200 -+++ firefox-128.0/dom/media/platforms/PDMFactory.cpp 2024-07-16 14:16:04.635809901 +0200 -@@ -62,6 +62,8 @@ +diff -up firefox-140.0/dom/media/platforms/PDMFactory.cpp.mozilla-bmo1670333 firefox-140.0/dom/media/platforms/PDMFactory.cpp +--- firefox-140.0/dom/media/platforms/PDMFactory.cpp.mozilla-bmo1670333 2025-06-17 18:15:13.000000000 +0200 ++++ firefox-140.0/dom/media/platforms/PDMFactory.cpp 2025-06-18 10:10:29.209789856 +0200 +@@ -61,6 +61,8 @@ #include @@ -35,7 +35,7 @@ diff -up firefox-128.0/dom/media/platforms/PDMFactory.cpp.mozilla-bmo1670333 fir using DecodeSupport = mozilla::media::DecodeSupport; using DecodeSupportSet = mozilla::media::DecodeSupportSet; using MediaCodec = mozilla::media::MediaCodec; -@@ -543,7 +545,7 @@ void PDMFactory::CreateRddPDMs() { +@@ -573,7 +575,7 @@ void PDMFactory::CreateRddPDMs() { #ifdef MOZ_FFMPEG if (StaticPrefs::media_ffmpeg_enabled() && StaticPrefs::media_rdd_ffmpeg_enabled() && @@ -44,7 +44,7 @@ diff -up firefox-128.0/dom/media/platforms/PDMFactory.cpp.mozilla-bmo1670333 fir mFailureFlags += GetFailureFlagBasedOnFFmpegStatus( FFmpegRuntimeLinker::LinkStatusCode()); } -@@ -719,7 +721,7 @@ void PDMFactory::CreateDefaultPDMs() { +@@ -749,7 +751,7 @@ void PDMFactory::CreateDefaultPDMs() { StartupPDM(AgnosticDecoderModule::Create(), StaticPrefs::media_prefer_non_ffvpx()); @@ -53,10 +53,10 @@ diff -up firefox-128.0/dom/media/platforms/PDMFactory.cpp.mozilla-bmo1670333 fir !StartupPDM(GMPDecoderModule::Create(), StaticPrefs::media_gmp_decoder_preferred())) { mFailureFlags += DecoderDoctorDiagnostics::Flags::GMPPDMFailedToStartup; -diff -up firefox-128.0/dom/media/platforms/PDMFactory.h.mozilla-bmo1670333 firefox-128.0/dom/media/platforms/PDMFactory.h ---- firefox-128.0/dom/media/platforms/PDMFactory.h.mozilla-bmo1670333 2024-07-04 18:20:26.000000000 +0200 -+++ firefox-128.0/dom/media/platforms/PDMFactory.h 2024-07-16 13:49:10.476630421 +0200 -@@ -98,6 +98,7 @@ class PDMFactory final { +diff -up firefox-140.0/dom/media/platforms/PDMFactory.h.mozilla-bmo1670333 firefox-140.0/dom/media/platforms/PDMFactory.h +--- firefox-140.0/dom/media/platforms/PDMFactory.h.mozilla-bmo1670333 2025-06-17 18:15:13.000000000 +0200 ++++ firefox-140.0/dom/media/platforms/PDMFactory.h 2025-06-18 10:10:29.210054963 +0200 +@@ -105,6 +105,7 @@ class PDMFactory final { RefPtr mNullPDM; DecoderDoctorDiagnostics::FlagsSet mFailureFlags; diff --git a/mozilla-bmo1789216-disable-av1.patch b/mozilla-bmo1789216-disable-av1.patch index 432b306..8b15872 100644 --- a/mozilla-bmo1789216-disable-av1.patch +++ b/mozilla-bmo1789216-disable-av1.patch @@ -42,32 +42,26 @@ diff -up firefox-128.0/media/ffvpx/libavcodec/codec_list.c.mozilla-bmo1789216-di diff -up firefox-128.0/media/ffvpx/libavcodec/moz.build.mozilla-bmo1789216-disable-av1 firefox-128.0/media/ffvpx/libavcodec/moz.build --- firefox-128.0/media/ffvpx/libavcodec/moz.build.mozilla-bmo1789216-disable-av1 2024-06-13 11:40:12.669924118 +0200 +++ firefox-128.0/media/ffvpx/libavcodec/moz.build 2024-06-13 11:45:22.867304151 +0200 -@@ -94,7 +94,6 @@ if not CONFIG['MOZ_FFVPX_AUDIOONLY']: - 'imgconvert.c', - 'libaom.c', - 'libaomenc.c', -- 'libdav1d.c', - 'libvpxdec.c', - 'libvpxenc.c', - 'mathtables.c', -@@ -119,10 +118,16 @@ if not CONFIG['MOZ_FFVPX_AUDIOONLY']: - 'vp9recon.c', +@@ -120,16 +120,15 @@ if not CONFIG['MOZ_FFVPX_AUDIOONLY']: 'vpx_rac.c', ] -- USE_LIBS += [ -- 'dav1d', -- 'media_libdav1d_asm', -- ] -+ if CONFIG['MOZ_AV1']: -+ USE_LIBS += [ -+ 'dav1d', -+ 'media_libdav1d_asm', -+ ] + +- if CONFIG["MOZ_SYSTEM_AV1"]: +- CFLAGS += CONFIG['MOZ_SYSTEM_LIBDAV1D_CFLAGS'] +- CFLAGS += CONFIG['MOZ_SYSTEM_LIBAOM_CFLAGS'] +- OS_LIBS += CONFIG['MOZ_SYSTEM_LIBDAV1D_LIBS'] +- OS_LIBS += CONFIG['MOZ_SYSTEM_LIBAOM_LIBS'] +- else: ++ if CONFIG["MOZ_AV1"]: + USE_LIBS += [ + 'dav1d', + 'media_libdav1d_asm', + ] + SOURCES += [ + 'libdav1d.c', + ] + -+ + if CONFIG["MOZ_WIDGET_TOOLKIT"] == "gtk": LOCAL_INCLUDES += ['/media/mozva'] - SOURCES += [ + diff --git a/process-official-tarball b/process-official-tarball index 9b6e82c..e17ae69 100755 --- a/process-official-tarball +++ b/process-official-tarball @@ -12,13 +12,16 @@ rm -vf ./process-tarball-dir/*/testing/web-platform/tests/css/css-ui/support/cur rm -vf ./process-tarball-dir/*/testing/web-platform/tests/conformance-checkers/html-rdfa/0230-novalid.html rm -vf ./process-tarball-dir/*/testing/web-platform/tests/conformance-checkers/html-rdfa/0231-isvalid.html rm -vf ./process-tarball-dir/*/layout/inspector/tests/chrome/test_fontVariationsAPI.css +rm -vr ./process-tarball-dir/*/third_party/rust/wast/tests/parse-fail/confusing* # A forbidden code point was found in: rm -vf ./process-tarball-dir/*/mobile/android/android-components/components/browser/errorpages/src/main/res/values-ar/strings.xml rm -vf ./process-tarball-dir/*/mobile/android/android-components/components/feature/addons/src/main/res/values-ur/strings.xml rm -vf ./process-tarball-dir/*/third_party/webkit/PerformanceTests/Speedometer3/resources/editors/dist/assets/codemirror-521de7ab.js rm -vf ./process-tarball-dir/*/third_party/python/pip/pip-24.0.dist-info/AUTHORS.txt +rm -vf ./process-tarball-dir/*/dom/locks/test/crashtests/1908240.js rm -vf ./process-tarball-dir/*/comm/third_party/rust/idna/tests/IdnaTestV2.txt rm -vr ./process-tarball-dir/*/comm/third_party/rust/wast/tests/parse-fail/confusing* +rm -vr ./process-tarball-dir/*/third_party/rust/wast/tests/parse-fail/confusing* # We uses system freetype2 rm -vrf ./process-tarball-dir/*/modules/freetype2 diff --git a/rhbz-1173156.patch b/rhbz-1173156.patch index c35d901..abd2efe 100644 --- a/rhbz-1173156.patch +++ b/rhbz-1173156.patch @@ -1,12 +1,12 @@ -diff -up firefox-60.5.0/extensions/auth/nsAuthSambaNTLM.cpp.rhbz-1173156 firefox-60.5.0/extensions/auth/nsAuthSambaNTLM.cpp ---- firefox-60.5.0/extensions/auth/nsAuthSambaNTLM.cpp.rhbz-1173156 2019-01-22 10:36:09.284069020 +0100 -+++ firefox-60.5.0/extensions/auth/nsAuthSambaNTLM.cpp 2019-01-22 10:37:12.669757744 +0100 -@@ -161,7 +161,7 @@ nsresult nsAuthSambaNTLM::SpawnNTLMAuthH - const char* username = PR_GetEnv("USER"); - if (!username) return NS_ERROR_FAILURE; +diff -up firefox-140.0/extensions/auth/nsAuthSambaNTLM.cpp.rhbz-1173156 firefox-140.0/extensions/auth/nsAuthSambaNTLM.cpp +--- firefox-140.0/extensions/auth/nsAuthSambaNTLM.cpp.rhbz-1173156 2025-06-02 15:26:45.000000000 +0200 ++++ firefox-140.0/extensions/auth/nsAuthSambaNTLM.cpp 2025-06-12 11:02:37.183715940 +0200 +@@ -153,7 +153,7 @@ nsresult nsAuthSambaNTLM::SpawnNTLMAuthH + options.fds_to_remap.push_back( + std::pair{fromChildPipeWrite.get(), STDOUT_FILENO}); + +- std::vector argvVec{"ntlm_auth", "--helper-protocol", ++ std::vector argvVec{"/usr/bin/ntlm_auth", "--helper-protocol", + "ntlmssp-client-1", "--use-cached-creds", + "--username", username}; -- const char* const args[] = {"ntlm_auth", -+ const char* const args[] = {"/usr/bin/ntlm_auth", - "--helper-protocol", - "ntlmssp-client-1", - "--use-cached-creds", diff --git a/rust-file-removal.patch b/rust-file-removal.patch index 7a56ae0..035c5f6 100644 --- a/rust-file-removal.patch +++ b/rust-file-removal.patch @@ -1,15 +1,24 @@ -diff -up thunderbird-128.1.1/comm/third_party/rust/idna/.cargo-checksum.json.rust-file-removal thunderbird-128.1.1/comm/third_party/rust/idna/.cargo-checksum.json ---- thunderbird-128.1.1/comm/third_party/rust/idna/.cargo-checksum.json.rust-file-removal 2024-08-20 19:55:17.000000000 +0200 -+++ thunderbird-128.1.1/comm/third_party/rust/idna/.cargo-checksum.json 2024-09-02 15:13:25.328335180 +0200 +diff -up thunderbird-140.0/comm/third_party/rust/idna/.cargo-checksum.json.rust-file-removal thunderbird-140.0/comm/third_party/rust/idna/.cargo-checksum.json +--- thunderbird-140.0/comm/third_party/rust/idna/.cargo-checksum.json.rust-file-removal 2025-06-25 13:13:16.000000000 +0200 ++++ thunderbird-140.0/comm/third_party/rust/idna/.cargo-checksum.json 2025-07-17 10:43:05.334819272 +0200 @@ -1 +1 @@ --{"files":{"Cargo.toml":"8be30a9748419aed461ce333e260ff4a461bf8166dfc7768307f32fcfc4fbea1","LICENSE-APACHE":"a60eea817514531668d7e00765731449fe14d059d3249e0bc93b36de45f759f2","LICENSE-MIT":"76e972ac0f4ddb116e86e10100132a783931a596e7b9872eaa31be15cd4d751d","benches/all.rs":"e734b9c9092ed66986725f86cfe90f3756cfddb058af308b796ba494f9beefc2","src/IdnaMappingTable.txt":"87d6553a4b86bc49dcade38bf26b745cd81800eb8af295dc3fb99b4729eaea38","src/lib.rs":"e7fd80070a7e52dfd1e9fe785bf092eddc9fb421fd0f9a1ba1c2189b8d40d3ed","src/make_uts46_mapping_table.py":"917055fa841f813de2bcf79cc79b595da3d5551559ee768db8660ab77cb26c34","src/punycode.rs":"3697674a70647d200853ac9d1910ffcb4796534332fe328de16c4bb1283e2ec1","src/uts46.rs":"4eee036b6448489002ac5190f3ac28834a4caa063c7cc77474ea6256199619ae","src/uts46_mapping_table.rs":"942fff78147c61da942f5f3a7ff4e90f9d7a00a29285733ac3fc3357eb2ed06f","tests/IdnaTestV2.txt":"c6f3778b0545fd150c8063286c7f5adc901e16557eddccc3751213646d07593d","tests/bad_punycode_tests.json":"ff0a15479ed2cb08f7b4b39465160da66d1ac7575e5d76990c17e7b76cb5e0f5","tests/punycode.rs":"0b0f315a8b124c1275a423a69169b13b19bcd7e9e6a5158bd0d642d01c6db145","tests/punycode_tests.json":"3d4ac0cf25984c37b9ce197f5df680a0136f728fb8ec82bc76624e42139eb3a8","tests/tests.rs":"d205a2bfb29dfee73e014faebd3207a55ef0d40121e6dbd52f5d611b37ac111e","tests/unit.rs":"be025a7d9bab3bd1ce134c87f9d848269e157b31ca5ba0ea03426c1ac736b69e","tests/uts46.rs":"06c97bf7dc20f5372b542fa46922d6dd63fe15e0aa34d799d08df9e3a241aa21"},"package":"634d9b1461af396cad843f47fdba5597a4f9e6ddd4bfb6ff5d85028c25cb12f6"} +-{"files":{"Cargo.toml":"4b63930f833beebdd51043e4435625638e39f804f172914ee4da834bfd18ac68","LICENSE-APACHE":"a60eea817514531668d7e00765731449fe14d059d3249e0bc93b36de45f759f2","LICENSE-MIT":"76e972ac0f4ddb116e86e10100132a783931a596e7b9872eaa31be15cd4d751d","README.md":"b95f383f35d2677a4aace5f816837357dca4b85f9c8cbed76d106c18faaca7e5","benches/all.rs":"cb99d454de05c3a72df82d2fca230757595ad25493e790eeb93a44ad43725cb8","src/deprecated.rs":"bdba5a73432d9755c831ec01edf4d512f9390b351dba0eb8ce7b0430fa1073ad","src/lib.rs":"6d0a03cd07e652974dd73a57b7505c9840c7b8afd84d7e223926515b99216bb4","src/punycode.rs":"86b8496e0b9fa807b456b74586d2c1bbd7dad832c67c3864e726e442646b34b3","src/uts46.rs":"f96ab9d27140a546f882200febc0bea8678d7ec320d35da9ef757045cf3d7309","tests/IdnaTestV2.txt":"d668c4ea58d60fe04e6c011df98e0b317da6abaa1273d58f42b581eb0dd7adda","tests/bad_punycode_tests.json":"ff0a15479ed2cb08f7b4b39465160da66d1ac7575e5d76990c17e7b76cb5e0f5","tests/deprecated.rs":"cce256f6616a19314330a06003d6308138aae8257136431d143f062f14ab17c7","tests/punycode.rs":"75fa73b6429ccacaeb5d72fab0b927cdf9f2173a9fc5fb366697bf7002b73921","tests/punycode_tests.json":"50859b828d14d5eeba5ab930de25fb72a35310a0b46f421f65d64c7c3e54d08a","tests/tests.rs":"ecee59f0b0be27ba1e7b24bb449c681024253d0275065f0f0e258e7ec2977d12","tests/unit.rs":"7e450599b52900baa51ea26ff0cb55a830456f60642985abbc87ec671a91b8e1","tests/unitbis.rs":"545259b767cd045aed01c1515c3b092d1b3f6b3366ce88d1593a2c8e3ffcd2af","tests/uts46.rs":"0a1c339708f1ab845d726b1f55dc1be8a423a1304b0399234391d0bd419e3fe0"},"package":"686f825264d630750a544639377bae737628043f20d38bbc029e8f29ea968a7e"} \ No newline at end of file -+{"files":{"Cargo.toml":"8be30a9748419aed461ce333e260ff4a461bf8166dfc7768307f32fcfc4fbea1","LICENSE-APACHE":"a60eea817514531668d7e00765731449fe14d059d3249e0bc93b36de45f759f2","LICENSE-MIT":"76e972ac0f4ddb116e86e10100132a783931a596e7b9872eaa31be15cd4d751d","benches/all.rs":"e734b9c9092ed66986725f86cfe90f3756cfddb058af308b796ba494f9beefc2","src/IdnaMappingTable.txt":"87d6553a4b86bc49dcade38bf26b745cd81800eb8af295dc3fb99b4729eaea38","src/lib.rs":"e7fd80070a7e52dfd1e9fe785bf092eddc9fb421fd0f9a1ba1c2189b8d40d3ed","src/make_uts46_mapping_table.py":"917055fa841f813de2bcf79cc79b595da3d5551559ee768db8660ab77cb26c34","src/punycode.rs":"3697674a70647d200853ac9d1910ffcb4796534332fe328de16c4bb1283e2ec1","src/uts46.rs":"4eee036b6448489002ac5190f3ac28834a4caa063c7cc77474ea6256199619ae","src/uts46_mapping_table.rs":"942fff78147c61da942f5f3a7ff4e90f9d7a00a29285733ac3fc3357eb2ed06f","tests/bad_punycode_tests.json":"ff0a15479ed2cb08f7b4b39465160da66d1ac7575e5d76990c17e7b76cb5e0f5","tests/punycode.rs":"0b0f315a8b124c1275a423a69169b13b19bcd7e9e6a5158bd0d642d01c6db145","tests/punycode_tests.json":"3d4ac0cf25984c37b9ce197f5df680a0136f728fb8ec82bc76624e42139eb3a8","tests/tests.rs":"d205a2bfb29dfee73e014faebd3207a55ef0d40121e6dbd52f5d611b37ac111e","tests/unit.rs":"be025a7d9bab3bd1ce134c87f9d848269e157b31ca5ba0ea03426c1ac736b69e","tests/uts46.rs":"06c97bf7dc20f5372b542fa46922d6dd63fe15e0aa34d799d08df9e3a241aa21"},"package":"634d9b1461af396cad843f47fdba5597a4f9e6ddd4bfb6ff5d85028c25cb12f6"} ++{"files":{"Cargo.toml":"4b63930f833beebdd51043e4435625638e39f804f172914ee4da834bfd18ac68","LICENSE-APACHE":"a60eea817514531668d7e00765731449fe14d059d3249e0bc93b36de45f759f2","LICENSE-MIT":"76e972ac0f4ddb116e86e10100132a783931a596e7b9872eaa31be15cd4d751d","README.md":"b95f383f35d2677a4aace5f816837357dca4b85f9c8cbed76d106c18faaca7e5","benches/all.rs":"cb99d454de05c3a72df82d2fca230757595ad25493e790eeb93a44ad43725cb8","src/deprecated.rs":"bdba5a73432d9755c831ec01edf4d512f9390b351dba0eb8ce7b0430fa1073ad","src/lib.rs":"6d0a03cd07e652974dd73a57b7505c9840c7b8afd84d7e223926515b99216bb4","src/punycode.rs":"86b8496e0b9fa807b456b74586d2c1bbd7dad832c67c3864e726e442646b34b3","src/uts46.rs":"f96ab9d27140a546f882200febc0bea8678d7ec320d35da9ef757045cf3d7309","tests/bad_punycode_tests.json":"ff0a15479ed2cb08f7b4b39465160da66d1ac7575e5d76990c17e7b76cb5e0f5","tests/deprecated.rs":"cce256f6616a19314330a06003d6308138aae8257136431d143f062f14ab17c7","tests/punycode.rs":"75fa73b6429ccacaeb5d72fab0b927cdf9f2173a9fc5fb366697bf7002b73921","tests/punycode_tests.json":"50859b828d14d5eeba5ab930de25fb72a35310a0b46f421f65d64c7c3e54d08a","tests/tests.rs":"ecee59f0b0be27ba1e7b24bb449c681024253d0275065f0f0e258e7ec2977d12","tests/unit.rs":"7e450599b52900baa51ea26ff0cb55a830456f60642985abbc87ec671a91b8e1","tests/unitbis.rs":"545259b767cd045aed01c1515c3b092d1b3f6b3366ce88d1593a2c8e3ffcd2af","tests/uts46.rs":"0a1c339708f1ab845d726b1f55dc1be8a423a1304b0399234391d0bd419e3fe0"},"package":"686f825264d630750a544639377bae737628043f20d38bbc029e8f29ea968a7e"} \ No newline at end of file -diff -up thunderbird-128.1.1/comm/third_party/rust/wast/.cargo-checksum.json.rust-file-removal thunderbird-128.1.1/comm/third_party/rust/wast/.cargo-checksum.json ---- thunderbird-128.1.1/comm/third_party/rust/wast/.cargo-checksum.json.rust-file-removal 2024-08-20 19:55:18.000000000 +0200 -+++ thunderbird-128.1.1/comm/third_party/rust/wast/.cargo-checksum.json 2024-09-02 15:16:39.390457125 +0200 +diff -up thunderbird-140.0/comm/third_party/rust/wast/.cargo-checksum.json.rust-file-removal thunderbird-140.0/comm/third_party/rust/wast/.cargo-checksum.json +--- thunderbird-140.0/comm/third_party/rust/wast/.cargo-checksum.json.rust-file-removal 2025-06-25 13:13:16.000000000 +0200 ++++ thunderbird-140.0/comm/third_party/rust/wast/.cargo-checksum.json 2025-07-17 10:44:01.422610099 +0200 @@ -1 +1 @@ --{"files":{"Cargo.toml":"3e223e7ed5faa9b3eaf4893e03596e1e40688df9dc2e0863fc3c44e443d88ef9","LICENSE":"268872b9816f90fd8e85db5a28d33f8150ebb8dd016653fb39ef1f94f2686bc5","README.md":"5a0d2b894a3ac74ee2be74715a2f22c40a08520cb4ac59183f4e7356f34ac566","src/component.rs":"23a62f4f2774ccfaf60f68e9d9416e68ba203eea782ce0c39cf553ad293f1df4","src/component/alias.rs":"5ec26333e179dc3778dead489f1273815fe9c1c808ba6a7e60eff54072fad795","src/component/binary.rs":"310940e2c455129c5e2a4219e64fca51121755818269306f943792216810c8b2","src/component/component.rs":"0c49ff1c1c4b8fe6d330eb41bce8ad176c7208c4178090b7325e9994e83c1f20","src/component/custom.rs":"f5b23c34b73a716a986fd999fc8d8c9e24c341e83292088fe83325cd82dab4f5","src/component/expand.rs":"71b2e23f50957b4a15d758df7f8651fdbaf5cf8f44fbfeb134b412318dbd8921","src/component/export.rs":"f51e824c839d8bb0884eca509622f376c8cce3335be324b2b25033af6216fd2a","src/component/func.rs":"4f69de6c38cc6fe77b638ed7d8000c8a170d7053a11a6585dcd5b4877a06804c","src/component/import.rs":"ffe6e4ab8f2cec68b1022c753135d675ab27ecd1315bd38517472ceaffd0610c","src/component/instance.rs":"e550a7ee9af092ae084dd41e2c0ae756b7dca8da4b91d672d90265a6a15dff83","src/component/item_ref.rs":"e9c426ccc0210dc0c37bb0448468f5f4d9e52656b72d4ff0f2dc65c89957fe60","src/component/module.rs":"d27a28199d1dea1c64294a514329a524432319288515b0a0e3091fa7d3a33f74","src/component/resolve.rs":"6454c289407e9e0c904c4e27af0cc5a40fbcd9a0d874ac5a64475b08264d2f39","src/component/types.rs":"65b2250f147f8b132e7d13ee809cf72d4fa5ed26a55f1a35f1ef665421b7e750","src/component/wast.rs":"aa39db0ea0acd38744dc3cbd35903c9b00b5de90a5bfc8b76e6b6a7581d7c4c0","src/core.rs":"24b71d1ab2ad874c4e37b4dd709b6532989b60e6bc503194434f95029cc1cda7","src/core/binary.rs":"2e7e1145273582d149398991a26c8252a9b6e325be8c277ab597b3be581fc795","src/core/custom.rs":"edd6044b75d79ec873c28d803fb8dc9a53724f1bba474bcdef2bc77196e0a4d2","src/core/export.rs":"1322a120d9e1dd6f3aa1485ee0bbc4294961028ae8a7584a24170af5823b73b1","src/core/expr.rs":"e521d86433d30b0669a160a913e0638e3bb78d8233fa570173b75e04b56abe26","src/core/func.rs":"f87239645e45b7e40ecf7f8f2b707a7cfc0620cd2632cfdaca3cb155a06da732","src/core/global.rs":"dec0abecadd2fde9298acb729259deba1ef3c4733ae5afcb4fe8cd4a633f5349","src/core/import.rs":"602a13aed2fd5fa63e2562246586546199861df57f304c2906561ab77810cadd","src/core/memory.rs":"be4b5067c4febb0e5718186e59ffee69305b01801f3133730a9933e2e7193bc1","src/core/module.rs":"2b608a3cfee4df1ceeefaa046863dc964172bd6f52f6678d96078091fae7657a","src/core/resolve/deinline_import_export.rs":"696b58d4b4267210e6453b7617c521b57f8c768970b740665c5b475575fc2160","src/core/resolve/mod.rs":"9b2680b00a1cafad2dbbfdac86aa1c135ea67203bbc4dee939302b27f4aff6d0","src/core/resolve/names.rs":"d869983d60e36b432a38edf60f53900f230cc5ab6248d3368ced229e69a259f0","src/core/resolve/types.rs":"6099b59c44aec7879996d6cdcb0d0ac2e25991a52291c5b15ab23b8d7e07cde9","src/core/table.rs":"6b611622d7d4f83cbe8e1a82139937c0294996d5f8208ade0886d680d8ef0b5d","src/core/tag.rs":"8a3d4fcdb86dedd68cdaf25abd930ef52a461cf2a0e9393bb9cb6f425afaaf2e","src/core/types.rs":"1d4afbeb9ed8a465d9c727e5bdc5be798216505fc4034d3fef64859808ff6e0a","src/core/wast.rs":"dda114d05e1b1fcf65a1ca6124786261cf0b885eb61ad10ab258f80ff6dd2c2e","src/encode.rs":"0b165176db54fb9136202c54180adabda843a88e5436b96c19be9d41623912a3","src/error.rs":"4526260299c7983696a49ffe30a80139beb0d081fa8f42decc5e3283b361b1cb","src/gensym.rs":"b5e02e34443085f01deb5b657e541be7dc5d6dc952304e434a0b08320ea6c185","src/lexer.rs":"bc65c4d71c6f16a55670585a31ee615c9fcfc40a4bfa165e020ed03a9a27930d","src/lib.rs":"bcf1814d97dca75bbd6f49123f5811472a3ca1e93788dfe23cb079804e9294d0","src/names.rs":"81d49fecbff3b2abbbc323595271f32d912f03cd55a5685b7216d7cead32c420","src/parser.rs":"fe6a3727c68c8075c38422de545eb189fd8f5747ca681f6704982ed5c8ea4476","src/token.rs":"292d0cc8871990ba7a757d49edcbe5a9c94c346131f10df2ce517789f25e7fd8","src/wast.rs":"692dc20c1912acd2ed1db7427d305a5c9eab31dfc8675f037ffc475b6db15d58","src/wat.rs":"2ff97b6af77da19b0a8e0dfd136f58dbfa8247896c476726d1c9f88a3630cac2","tests/annotations.rs":"06294077550600f93a5a8c0d7e3ac38b47f00bb8933f9dc390ff31868e873afb","tests/comments.rs":"694e8a3467e9c837f723a43c729be0c6f6dfe3441ad9692759b1d55fd63055a2","tests/parse-fail.rs":"162023ac21f74ea856ec5916f4925a762d769b425eaf721c223c54b3efec6a53","tests/parse-fail/bad-core-func-alias.wat":"b71372064c3fce9d4a616418605040fe5e1356030a709b798b4769d3619cbbfb","tests/parse-fail/bad-core-func-alias.wat.err":"bb63274c26d3a21209bad794767f48372834bdc10cfbebf568a0c65d52803c90","tests/parse-fail/bad-func-alias.wat":"237c07149e1e74afe3b991a1fee6acb63167c1ca8931341614c435000339b887","tests/parse-fail/bad-func-alias.wat.err":"4a4bfc691b06d20fdf71e1dbac04649a52c76787048415599978987d761308fa","tests/parse-fail/bad-index.wat":"d21489daeec3a35327dcc9e2ba2d0acdd05f4aeaff2272cca608fda4d2338497","tests/parse-fail/bad-index.wat.err":"dc11070de0c9160573006ea4e5fa3c4d28e71bc39b24b1938cf6ff3b03ea7154","tests/parse-fail/bad-name.wat":"e5ff5d410007779a0de6609ea4cc693f0e603d36a106b8f5098c1980dd9f8124","tests/parse-fail/bad-name.wat.err":"fb5638476c1b85d9d1919e3dbcb0f16f82d088a4a22d4a0c186d7b8ba6e1902b","tests/parse-fail/bad-name2.wat":"5a6a4d0c19e5f2e48d7cebf361aca9b9000b7ef0c652997b5bd0ffaadbd2ca8a","tests/parse-fail/bad-name2.wat.err":"129707cce45f1e3cfb3e2ca5c702182e16ca5eeb2dbb2edd0710b004a8e194a5","tests/parse-fail/bad-name3.wat":"c19133d738cc84e9174301f27d4050c216bda81c7e9918d03ac792b088f24a05","tests/parse-fail/bad-name3.wat.err":"84ea63d40a619a0782ec6e94fce63921188ab87b1c3875eacae0a371144ed83a","tests/parse-fail/block1.wat":"91e74b5c3b43be692e7a6ae74fbfa674c4b6197299eb61338c4eccf282b18f17","tests/parse-fail/block1.wat.err":"40a083ae496b41dee7002cc6a664c5db0c5e4d904ae03b815773a769c4493fca","tests/parse-fail/block2.wat":"a8c07b4c09d51f10a8ffdf19806586022552398701cd90eb6d09816d45df06e5","tests/parse-fail/block2.wat.err":"33c842ec5dd0f2fdd3a9ce8187dd98b45ceee48c12810802af809d05b9cd25e9","tests/parse-fail/block3.wat":"29739abfbabd7c55f00ddfbbb9ebd818b4a114ef2336d50514f0842f7e075905","tests/parse-fail/block3.wat.err":"fc667ae2e71a260f62a3c7393bc97272e7c0ff38b17594f4370847b8a5019060","tests/parse-fail/confusing-block-comment0.wat":"8f27c9d0d212bbb1862ea89ffd7cbeafde5dfd755d695c1ba696cd520aba1a1d","tests/parse-fail/confusing-block-comment0.wat.err":"b53cbaef7bcec3862c64e09c084b92cd61bd29b954125482b2d083db250cd9e2","tests/parse-fail/confusing-block-comment1.wat":"b1a0447c9a8eaab8938d15cd33bd4adbb8bb69c2d710209b604023991a4347cb","tests/parse-fail/confusing-block-comment1.wat.err":"2fc3b3e4f98416326e1e5ec034026301069b6a98fa24451bc7573e16b8cb3811","tests/parse-fail/confusing-block-comment2.wat":"e3f49c7a388fba81081beb25d87bbd7db0acce5dd8e3eaa04574905ed7ec420c","tests/parse-fail/confusing-block-comment2.wat.err":"2183231d6acd0b5a117f9aea747c3d5c12e758450a6cd74027bb954a3134cf19","tests/parse-fail/confusing-block-comment3.wat":"d83f89c582501eb8833e772b8462c8974984a2f7fbb80b1452dc399fac74e5ed","tests/parse-fail/confusing-block-comment3.wat.err":"8b2096a4833627905c63f49cdabe44be24336646578dcfbdc67e9bfb35cbc601","tests/parse-fail/confusing-block-comment4.wat":"b7c6c68844d918e9ef6dd5ab9c40c7de7b38f04f94fadad630eda4e596f3e0f8","tests/parse-fail/confusing-block-comment4.wat.err":"2f790cc511edfcd89a12c9207901be16039fc1a06a584d73095e77a52f861cd9","tests/parse-fail/confusing-block-comment5.wat":"a159808032638cc914fa80ac4354a68b0af4f435a09cbe3e2d577582e183eb0a","tests/parse-fail/confusing-block-comment5.wat.err":"6fe0d99894307442f83fe93beaa5da706e06c9bdaf8e39d7cbae4c4fffafcb94","tests/parse-fail/confusing-block-comment6.wat":"abe48bcba2587dca98bc80ddde4e813f94fbc8a3538704a0775ea85bca0f8466","tests/parse-fail/confusing-block-comment6.wat.err":"3c97b9bf1112bbb7335d7fe4be5befb6f91eea7bec7dd3e6b543792231003c56","tests/parse-fail/confusing-block-comment7.wat":"e125c416ea5fa0ac35a58295a83a6f345438e2d7ddc6a39bd76c8e89885b3f0e","tests/parse-fail/confusing-block-comment7.wat.err":"5c34528ff2019cd3f0b3df34fd42523c0b66120706321da2c88ec05793478d2e","tests/parse-fail/confusing-block-comment8.wat":"200cc4c0e5af21a25529d7a81633a03642cff807255d6cd72eb45cdccc605cec","tests/parse-fail/confusing-block-comment8.wat.err":"9b81237d150a784b71791eee88fb6264a8bd6412862660f7392945203809e517","tests/parse-fail/confusing-line-comment0.wat":"bcec4c5a1e52b3e392e07c6711c979aa8d7db8baaf2bcdf270ba16d1aa528d26","tests/parse-fail/confusing-line-comment0.wat.err":"41ec5a075dc6b73afe1aec6b3198c5c4ae3a1a900e1610115879058ce034d6f6","tests/parse-fail/confusing-line-comment1.wat":"a2afbcab00ec957dfd9e9bf21fa4238852247b27f0b054f4a00f6b172dddf853","tests/parse-fail/confusing-line-comment1.wat.err":"f19a645e6fb5cbd7a0dd2308732741edcf83dbae0ef62549972029856a9e7fc6","tests/parse-fail/confusing-line-comment2.wat":"7f2a68229d02aac56ec4dfccf139bf2d617a0e89430357b30444dc4239d8aa89","tests/parse-fail/confusing-line-comment2.wat.err":"08add3d33e10e1ab6b4f3ae431f5db61d6f6c0a2b7d6828482a1e51b3a2d3851","tests/parse-fail/confusing-line-comment3.wat":"61173ae54782f6de86685f9555ffb94bbe2cf20b234daf660abb69ba3326f1ff","tests/parse-fail/confusing-line-comment3.wat.err":"4a5333dc02efa3c1eeab9cafa7c707f78abe92defdb01a71d6fe20944e4785f0","tests/parse-fail/confusing-line-comment4.wat":"9ecbbbe82c750e6475af1bfb46fe7a06115e4446a437d19fc08ca3d002f2a1c9","tests/parse-fail/confusing-line-comment4.wat.err":"ddb8aee8006265253b09c313cf5eb5c2dc4da66f502b4f6d3e2e1de77b35aec9","tests/parse-fail/confusing-line-comment5.wat":"8a4c8d342111bc9d37c16dbdf67c52027e1a42632abc9f359b3e4f07a85748b5","tests/parse-fail/confusing-line-comment5.wat.err":"34e368719fc0eab2f1a43c9f8e6f1b31aa9be9f971085d72374e49bde39cbfe5","tests/parse-fail/confusing-line-comment6.wat":"15f0dcdec23736ce92db84b3a7cdfe8689c97f2a7d0b9b0bfb0dcd2675163ed1","tests/parse-fail/confusing-line-comment6.wat.err":"0570be2ede803f071925d249f3858d3a417b5a6d678c9da40fc851d788d12983","tests/parse-fail/confusing-line-comment7.wat":"c7ee59301a701dd52d56cad02df78b0ad3584460bc18efa42ee137fe0c35aef6","tests/parse-fail/confusing-line-comment7.wat.err":"feebbeee8c85d8b3b85cec89435ae18f3ade9f754ca180d747a41406b64ca07a","tests/parse-fail/confusing-line-comment8.wat":"17632a8142154624de88b3cf93516147ed3419d785200bcd7049499eca8e8f04","tests/parse-fail/confusing-line-comment8.wat.err":"9c209285f2295cd2bc999aa7a9534a654932493308ab1f102839ed15a4d04d17","tests/parse-fail/confusing-string0.wat":"497b679b32baddcd6a158f4cadd3d9a9dea3457bac2a8c2c3d4e09b7c2d80842","tests/parse-fail/confusing-string0.wat.err":"cb3d737f2319346675a038716694354cd3b272453daa8a96e32e9861a9277f7b","tests/parse-fail/confusing-string1.wat":"46654cbed1ea6aab5019aef3d20098a391e40dacafa1ad5e83bf4ec384109fce","tests/parse-fail/confusing-string1.wat.err":"de7e7da516dc6c244bd0e4f012577b69f0cacbcc10f727fadb4b50bb04e0e2b4","tests/parse-fail/confusing-string2.wat":"11938f217c14387c05312735130f00c91d9df2d3ff9df7f13395e0f2b81dad54","tests/parse-fail/confusing-string2.wat.err":"e7bd08b146a855d681fefaf9e0576a9c333a2d10044f8e268b916b22a54227c9","tests/parse-fail/confusing-string3.wat":"e0ca4903fcafb9a54a91cf99e5eac95d25c6d2eb67b076f88191ad396f839cb6","tests/parse-fail/confusing-string3.wat.err":"b88d5db9e445c798eb24f95b7661b9c0368934d27ee8208477cd1c99351b939a","tests/parse-fail/confusing-string4.wat":"3ee2aee7f77604d051519c6f1795634469c12e98ae347a98f0c8445eecf1ff3d","tests/parse-fail/confusing-string4.wat.err":"1edc65bb09d8d3eed6ff69e7d9a7a4b5941dc823fa3436fa375657510255f6f4","tests/parse-fail/confusing-string5.wat":"024e50943128840d53f17e31a9b9332ce4f0ee70a847a043015f435b1c3c6e76","tests/parse-fail/confusing-string5.wat.err":"a0f13ec40d596ea2d8b0c4292b0d28775a5116ab7e11d7de88b295d25428c661","tests/parse-fail/confusing-string6.wat":"79cf157e29319800d2652c5a7f3dc90e07ebe2145c9904a70fc12027cdee84b7","tests/parse-fail/confusing-string6.wat.err":"860555e7aa13e3de3639cc2a530d6a42b974b629c4659593e972cbb0f306abae","tests/parse-fail/confusing-string7.wat":"7d8e403766dfb4e569754160d31ed0f9a27f908ed6cff96be43ab3d37f5975d5","tests/parse-fail/confusing-string7.wat.err":"658b6a02ba6d769254485f35c20984e7135d914b4266929963d723f26a40be4a","tests/parse-fail/confusing-string8.wat":"5a9b222e578655d57ee6e9f19bc1ea8e29aa52d652975fac685213444ed6458f","tests/parse-fail/confusing-string8.wat.err":"9a4e1a510330c800a1df7966998ebc3cde931eda20b249e5360f5e9a905dce11","tests/parse-fail/inline1.wat":"4e9767d67207aace2ac5e6f63a30e7510e4aa245ba35420539509e2254470272","tests/parse-fail/inline1.wat.err":"0143017a9825e518baa6009bae2c8d63520051dedd3437705bbe36b038a57f41","tests/parse-fail/newline-in-string.wat":"5c01cf709544ade0a6cdfcc39a3836a3bc018b633dc42a6cd872b6defc763ea7","tests/parse-fail/newline-in-string.wat.err":"1504209cc37a78b2aee778f23eacf78606daf964cf7bff251f5700efcd27ffd7","tests/parse-fail/string1.wat":"620d46d585ce94b382b5fde628c1399f3e562014b7a44af46e92f7bd045ca86e","tests/parse-fail/string1.wat.err":"fc53f3a1c4a65d8f25e5af51dec7699f45cecba114ca9c7871781bc70f664320","tests/parse-fail/string10.wat":"f7409dd45e153a1b11cb23e38f4ed87da12bedde38f8f0ccfe91037b0a4d97bd","tests/parse-fail/string10.wat.err":"ce677db5e37e0ed81ca357ed6b5edb21d85c27303ee194855bea7a88457efb6a","tests/parse-fail/string11.wat":"f6e0400b8c6a2014efa1ac676c567e140d8f86b5f4d5129773e6d67af537b615","tests/parse-fail/string11.wat.err":"4c6a550d29eda38a4e1bf7a589596f11655dc779479d7b8d466cfc53f815a742","tests/parse-fail/string12.wat":"23e30070eef22271651cce096a801fc4f79f3c37343c88bb8d2fc99b32d3b8b9","tests/parse-fail/string12.wat.err":"b5ec59f2996b88b2ee157e22d1774dc3e36fc08ed5bfc621aea830d30f66f586","tests/parse-fail/string13.wat":"81a305b981159ee10e140749ea3220c9edaaff53605e63c21995de47382b5faf","tests/parse-fail/string13.wat.err":"959f26c6b54e0d367b51d11d1addd8a53b5b8ff3caf70ebdd46bbea8ccfa2418","tests/parse-fail/string14.wat":"c45c2cc9f7afbfbd4be8e513106d22f7e5e817091448576c6bdf0701b81d95dd","tests/parse-fail/string14.wat.err":"50b5bccba905ddbe275938edb7ed0b09a5ca53dcdad36a7ff736ce9bc8e7a338","tests/parse-fail/string15.wat":"b5e0d5ade40de53b2d767a132e28376bb8c7a6f6238c4d8c248ae717c41d7f1f","tests/parse-fail/string15.wat.err":"0e9fc502cc90f96d1f592a3f63369fd2a3574bc4a2345a70365dbb76804e870f","tests/parse-fail/string16.wat":"38c3688cee80a9d089d239aa06eb1d27c5364ad2bd270aca57d05997c20aa682","tests/parse-fail/string16.wat.err":"4274b3bbe4df4cf0373619b1fcd082d0c802990817d2aca26ed885168c80e489","tests/parse-fail/string2.wat":"1172964aed31537b8c466d1f045f3e756926e7b221f80b2aff4a9a6721ea0beb","tests/parse-fail/string2.wat.err":"4618d3b20a78a077337eb5d6cae14ac39d9853762f011fbd23cff8921618dbde","tests/parse-fail/string3.wat":"07e0fbcd6270c1db100917c151ee4ac3f935e4ee1b27bce3c453b22b4b74f4d6","tests/parse-fail/string3.wat.err":"08ffc6158a9e030b2e211d53bdb8aeacfd879815c7b284d6a83b030566e35928","tests/parse-fail/string4.wat":"c970da2051b0613bdd1de4664f10424e14f2ebabe604175d4fb9b763b37af577","tests/parse-fail/string4.wat.err":"406706594d305c560fabd66417ad4fc276939990b5e701bd9d13fc223d207219","tests/parse-fail/string5.wat":"386cf314bb05acdaaabdf4da1caf140167271a26bd08bf34c3a7427d4bc4431f","tests/parse-fail/string5.wat.err":"1e56b44a23a37b2b2ad05aa9dd7e1e18191b5cc22151f93bbcf9d618779a57bd","tests/parse-fail/string6.wat":"8f1fe2825ff96f2acee9130a7721f86fcc93c221baa9411bf1fb6f0870d38ccb","tests/parse-fail/string6.wat.err":"d55dfd84d94e893f167ae73b7a080aefb2bfb05cc8a1ec201c4d3066fb8549b4","tests/parse-fail/string7.wat":"b12f8c75313d7f834489d3c353422f90bc945b37139586446eda82e334a97cde","tests/parse-fail/string7.wat.err":"4cee0ca61992c249dd0faaf2529a073cf8deeb36111a3f69b43695e5682560a2","tests/parse-fail/string8.wat":"4c2e0e1f883bb4e8cba9313497ed792130e5848e62bde7716102788d7467be10","tests/parse-fail/string8.wat.err":"840c6def7c60dd7c2b7261549cab435ba78c9b3a937adf6d5d9595ff8af01c91","tests/parse-fail/string9.wat":"2b7670caed2b0688d535de6e4e416f35fa717cfbe096a6cc764a669085c8f52f","tests/parse-fail/string9.wat.err":"37b5a9c3af9631500f31f9e5e3efa821b8d96063c57d60fd01df6be6a5c323e1","tests/parse-fail/unbalanced.wat":"f664fbef53a0308f864ba496d38044eb90482636e32586512939d4930729f3fe","tests/parse-fail/unbalanced.wat.err":"aba579f7b836856e69afe05da8328aabe0643d94e369898e686aa7bb0b07e9c9","tests/recursive.rs":"ad8a2b07bf955121a7c9e326ed35f9b2bc56b440c8cc0bbde24d423a79945c1a"},"package":"441a6a195b3b5245e26d450bbcc91366c6b652382a22f63cbe3c73240e13b2bb"} +-{"files":{"Cargo.toml":"cad0c4af427ed3e97965ee33e0e475adc4280638defe1530df50ec29fd15abfc","README.md":"5a0d2b894a3ac74ee2be74715a2f22c40a08520cb4ac59183f4e7356f34ac566","src/component.rs":"154cdef2003b1607ab21a50a821b455da854b78d353d573586351c2593ed70a2","src/component/alias.rs":"5ec26333e179dc3778dead489f1273815fe9c1c808ba6a7e60eff54072fad795","src/component/binary.rs":"e7eefd2bae6eb00803cc6d9eba5dd124c36667c7673fa04baaf0806af2b02336","src/component/component.rs":"90002d2dbe9a5665e637c04b81c1cb700025e9389cdae5417fd9b3a2e49f91a1","src/component/custom.rs":"f5b23c34b73a716a986fd999fc8d8c9e24c341e83292088fe83325cd82dab4f5","src/component/expand.rs":"28fa091aac599bde4e1bd8cf1e41f24d10da1683453b3e65f3bb877bbf890b10","src/component/export.rs":"f51e824c839d8bb0884eca509622f376c8cce3335be324b2b25033af6216fd2a","src/component/func.rs":"cafdbe418fe5c5dee68b2b7245b4f00bf3bea7a4a686846bfde2e5c85bde0601","src/component/import.rs":"add63978787f5bfad1faeb1ce6b121fa60bbcd9a736afd7ae81ddc9f5b031107","src/component/instance.rs":"e550a7ee9af092ae084dd41e2c0ae756b7dca8da4b91d672d90265a6a15dff83","src/component/item_ref.rs":"e9c426ccc0210dc0c37bb0448468f5f4d9e52656b72d4ff0f2dc65c89957fe60","src/component/module.rs":"d27a28199d1dea1c64294a514329a524432319288515b0a0e3091fa7d3a33f74","src/component/resolve.rs":"93affa62d621b2f06b2c78cd98fe98d48f7832f02a9f87d3b48388b7d570387b","src/component/types.rs":"3af82844f27a472c45058ea6a2cc3a6ffa1ac2eb9625041c435085f9ef74fedd","src/component/wast.rs":"aa39db0ea0acd38744dc3cbd35903c9b00b5de90a5bfc8b76e6b6a7581d7c4c0","src/component_disabled.rs":"dde798aabc109d12de7e169bdd67a945274cfec1c1f4d6e097ecac9e5cff23e2","src/core.rs":"c82d7356515f675f9173f9bf5d7c0f4e56ca7a3eebc92b5f95a2d04882ca470c","src/core/binary.rs":"609f752b3ba6cfa9d9604d82d4e87c9ffb5a35984a28f44155b14faaa830369a","src/core/binary/dwarf.rs":"bc0662cbdc58c83abc153490f7c47e2ae5998a1dedf42b7058606ce7edcb04b7","src/core/binary/dwarf_disabled.rs":"182ee888617357835decd08c68fe8dfdef9fe0665ece9b1550794fea9dcb1486","src/core/custom.rs":"edd6044b75d79ec873c28d803fb8dc9a53724f1bba474bcdef2bc77196e0a4d2","src/core/export.rs":"1322a120d9e1dd6f3aa1485ee0bbc4294961028ae8a7584a24170af5823b73b1","src/core/expr.rs":"0451cba0e516c4ccd68afb7df70617d143f5eb042d301d8d106673db2366ffff","src/core/func.rs":"4625e75e050a4e3b22fe08e8fc39379e66420f1bbe499b6965d51ae92299823d","src/core/global.rs":"dec0abecadd2fde9298acb729259deba1ef3c4733ae5afcb4fe8cd4a633f5349","src/core/import.rs":"602a13aed2fd5fa63e2562246586546199861df57f304c2906561ab77810cadd","src/core/memory.rs":"b828b5686cfa562e4cf9c5d1a718cb823b90a6e6b637bfd17e364e68a4f79a55","src/core/module.rs":"1635ff9d4b4634a0cd18e12df281ce03c8f000edc07aae846d03ce8714f0393e","src/core/resolve/deinline_import_export.rs":"2338bc87bf19a095007bbb9598f7eab7773cf04644714761eb1aeecc5372cf79","src/core/resolve/mod.rs":"230283f528eb98b861d331e9fb5bddc3b2baa09e020ea5aa8849dfb970e0e26e","src/core/resolve/names.rs":"bf1c1a70d9b1216fa763d0f604c8789cd97f7211ac3187b4237eb41fed1cbe41","src/core/resolve/types.rs":"fbb2bcfcdb232d5bfb90cd563e7026d1a18fd0dd75bafaa25a95011216db53d5","src/core/table.rs":"4e31c8e187062abece9fd07fe28de730f2b037fa7c25571e7321a30755e0f6ec","src/core/tag.rs":"8a3d4fcdb86dedd68cdaf25abd930ef52a461cf2a0e9393bb9cb6f425afaaf2e","src/core/types.rs":"231d54c06eb2c02c83edba6e4b9b7410b7719b4a51b3d9f039d86003994f6eea","src/core/wast.rs":"7d505f0b906a2cd2df79976844a1d1026199fb7aa1d9528e1cc7117ef2d49c43","src/encode.rs":"0b165176db54fb9136202c54180adabda843a88e5436b96c19be9d41623912a3","src/error.rs":"4526260299c7983696a49ffe30a80139beb0d081fa8f42decc5e3283b361b1cb","src/gensym.rs":"b5e02e34443085f01deb5b657e541be7dc5d6dc952304e434a0b08320ea6c185","src/lexer.rs":"f4626c9893049af2419101d7af1d1ced4da6637b1a147f5fc29d562edf9d81d4","src/lib.rs":"016946ce4c00d42d95f8752b78a3d4a661a2d0335029ff891b8c3303a26d0aa4","src/names.rs":"888654ba6c95ee44b0041dd211889ae7a96f1f51e40f09b7246e28c1c497be51","src/parser.rs":"1b65e89ff099549421b2313e63984465785ed3e79fce359a77a4e7d29ba25fe1","src/token.rs":"5378856440f993dc7cfd1a5b86b78290fd6b150c493ec55314afe7f92b2cfd04","src/wast.rs":"3161c1eabe0f5cc7702d16ca3e527ddf1d5b65e5400661709507b06f83c6f4d4","src/wat.rs":"5c2002f4904ce2f33fc547c2d7ee916a56f4551522c7a4b21e34df5d49289374","tests/annotations.rs":"de6ab2a4e15c0bc683482436bed27e37ab45bc374d99f2fcc031c7947506e581","tests/comments.rs":"c068034817774cc94aa06fa09de453132d063335775002aa694fc60889a4ee04","tests/parse-fail.rs":"60cf90f0bb29c5648d803629c2614140be7746c6bc4858e2be318641382f9429","tests/parse-fail/bad-core-func-alias.wat":"b71372064c3fce9d4a616418605040fe5e1356030a709b798b4769d3619cbbfb","tests/parse-fail/bad-core-func-alias.wat.err":"bb63274c26d3a21209bad794767f48372834bdc10cfbebf568a0c65d52803c90","tests/parse-fail/bad-func-alias.wat":"237c07149e1e74afe3b991a1fee6acb63167c1ca8931341614c435000339b887","tests/parse-fail/bad-func-alias.wat.err":"4a4bfc691b06d20fdf71e1dbac04649a52c76787048415599978987d761308fa","tests/parse-fail/bad-index.wat":"d21489daeec3a35327dcc9e2ba2d0acdd05f4aeaff2272cca608fda4d2338497","tests/parse-fail/bad-index.wat.err":"dc11070de0c9160573006ea4e5fa3c4d28e71bc39b24b1938cf6ff3b03ea7154","tests/parse-fail/bad-name.wat":"e5ff5d410007779a0de6609ea4cc693f0e603d36a106b8f5098c1980dd9f8124","tests/parse-fail/bad-name.wat.err":"fb5638476c1b85d9d1919e3dbcb0f16f82d088a4a22d4a0c186d7b8ba6e1902b","tests/parse-fail/bad-name2.wat":"5a6a4d0c19e5f2e48d7cebf361aca9b9000b7ef0c652997b5bd0ffaadbd2ca8a","tests/parse-fail/bad-name2.wat.err":"129707cce45f1e3cfb3e2ca5c702182e16ca5eeb2dbb2edd0710b004a8e194a5","tests/parse-fail/bad-name3.wat":"c19133d738cc84e9174301f27d4050c216bda81c7e9918d03ac792b088f24a05","tests/parse-fail/bad-name3.wat.err":"84ea63d40a619a0782ec6e94fce63921188ab87b1c3875eacae0a371144ed83a","tests/parse-fail/block1.wat":"91e74b5c3b43be692e7a6ae74fbfa674c4b6197299eb61338c4eccf282b18f17","tests/parse-fail/block1.wat.err":"40a083ae496b41dee7002cc6a664c5db0c5e4d904ae03b815773a769c4493fca","tests/parse-fail/block2.wat":"a8c07b4c09d51f10a8ffdf19806586022552398701cd90eb6d09816d45df06e5","tests/parse-fail/block2.wat.err":"33c842ec5dd0f2fdd3a9ce8187dd98b45ceee48c12810802af809d05b9cd25e9","tests/parse-fail/block3.wat":"29739abfbabd7c55f00ddfbbb9ebd818b4a114ef2336d50514f0842f7e075905","tests/parse-fail/block3.wat.err":"fc667ae2e71a260f62a3c7393bc97272e7c0ff38b17594f4370847b8a5019060","tests/parse-fail/confusing-block-comment0.wat":"8f27c9d0d212bbb1862ea89ffd7cbeafde5dfd755d695c1ba696cd520aba1a1d","tests/parse-fail/confusing-block-comment0.wat.err":"b53cbaef7bcec3862c64e09c084b92cd61bd29b954125482b2d083db250cd9e2","tests/parse-fail/confusing-block-comment1.wat":"b1a0447c9a8eaab8938d15cd33bd4adbb8bb69c2d710209b604023991a4347cb","tests/parse-fail/confusing-block-comment1.wat.err":"2fc3b3e4f98416326e1e5ec034026301069b6a98fa24451bc7573e16b8cb3811","tests/parse-fail/confusing-block-comment2.wat":"e3f49c7a388fba81081beb25d87bbd7db0acce5dd8e3eaa04574905ed7ec420c","tests/parse-fail/confusing-block-comment2.wat.err":"2183231d6acd0b5a117f9aea747c3d5c12e758450a6cd74027bb954a3134cf19","tests/parse-fail/confusing-block-comment3.wat":"d83f89c582501eb8833e772b8462c8974984a2f7fbb80b1452dc399fac74e5ed","tests/parse-fail/confusing-block-comment3.wat.err":"8b2096a4833627905c63f49cdabe44be24336646578dcfbdc67e9bfb35cbc601","tests/parse-fail/confusing-block-comment4.wat":"b7c6c68844d918e9ef6dd5ab9c40c7de7b38f04f94fadad630eda4e596f3e0f8","tests/parse-fail/confusing-block-comment4.wat.err":"2f790cc511edfcd89a12c9207901be16039fc1a06a584d73095e77a52f861cd9","tests/parse-fail/confusing-block-comment5.wat":"a159808032638cc914fa80ac4354a68b0af4f435a09cbe3e2d577582e183eb0a","tests/parse-fail/confusing-block-comment5.wat.err":"6fe0d99894307442f83fe93beaa5da706e06c9bdaf8e39d7cbae4c4fffafcb94","tests/parse-fail/confusing-block-comment6.wat":"abe48bcba2587dca98bc80ddde4e813f94fbc8a3538704a0775ea85bca0f8466","tests/parse-fail/confusing-block-comment6.wat.err":"3c97b9bf1112bbb7335d7fe4be5befb6f91eea7bec7dd3e6b543792231003c56","tests/parse-fail/confusing-block-comment7.wat":"e125c416ea5fa0ac35a58295a83a6f345438e2d7ddc6a39bd76c8e89885b3f0e","tests/parse-fail/confusing-block-comment7.wat.err":"5c34528ff2019cd3f0b3df34fd42523c0b66120706321da2c88ec05793478d2e","tests/parse-fail/confusing-block-comment8.wat":"200cc4c0e5af21a25529d7a81633a03642cff807255d6cd72eb45cdccc605cec","tests/parse-fail/confusing-block-comment8.wat.err":"9b81237d150a784b71791eee88fb6264a8bd6412862660f7392945203809e517","tests/parse-fail/confusing-line-comment0.wat":"bcec4c5a1e52b3e392e07c6711c979aa8d7db8baaf2bcdf270ba16d1aa528d26","tests/parse-fail/confusing-line-comment0.wat.err":"41ec5a075dc6b73afe1aec6b3198c5c4ae3a1a900e1610115879058ce034d6f6","tests/parse-fail/confusing-line-comment1.wat":"a2afbcab00ec957dfd9e9bf21fa4238852247b27f0b054f4a00f6b172dddf853","tests/parse-fail/confusing-line-comment1.wat.err":"f19a645e6fb5cbd7a0dd2308732741edcf83dbae0ef62549972029856a9e7fc6","tests/parse-fail/confusing-line-comment2.wat":"7f2a68229d02aac56ec4dfccf139bf2d617a0e89430357b30444dc4239d8aa89","tests/parse-fail/confusing-line-comment2.wat.err":"08add3d33e10e1ab6b4f3ae431f5db61d6f6c0a2b7d6828482a1e51b3a2d3851","tests/parse-fail/confusing-line-comment3.wat":"61173ae54782f6de86685f9555ffb94bbe2cf20b234daf660abb69ba3326f1ff","tests/parse-fail/confusing-line-comment3.wat.err":"4a5333dc02efa3c1eeab9cafa7c707f78abe92defdb01a71d6fe20944e4785f0","tests/parse-fail/confusing-line-comment4.wat":"9ecbbbe82c750e6475af1bfb46fe7a06115e4446a437d19fc08ca3d002f2a1c9","tests/parse-fail/confusing-line-comment4.wat.err":"ddb8aee8006265253b09c313cf5eb5c2dc4da66f502b4f6d3e2e1de77b35aec9","tests/parse-fail/confusing-line-comment5.wat":"8a4c8d342111bc9d37c16dbdf67c52027e1a42632abc9f359b3e4f07a85748b5","tests/parse-fail/confusing-line-comment5.wat.err":"34e368719fc0eab2f1a43c9f8e6f1b31aa9be9f971085d72374e49bde39cbfe5","tests/parse-fail/confusing-line-comment6.wat":"15f0dcdec23736ce92db84b3a7cdfe8689c97f2a7d0b9b0bfb0dcd2675163ed1","tests/parse-fail/confusing-line-comment6.wat.err":"0570be2ede803f071925d249f3858d3a417b5a6d678c9da40fc851d788d12983","tests/parse-fail/confusing-line-comment7.wat":"c7ee59301a701dd52d56cad02df78b0ad3584460bc18efa42ee137fe0c35aef6","tests/parse-fail/confusing-line-comment7.wat.err":"feebbeee8c85d8b3b85cec89435ae18f3ade9f754ca180d747a41406b64ca07a","tests/parse-fail/confusing-line-comment8.wat":"17632a8142154624de88b3cf93516147ed3419d785200bcd7049499eca8e8f04","tests/parse-fail/confusing-line-comment8.wat.err":"9c209285f2295cd2bc999aa7a9534a654932493308ab1f102839ed15a4d04d17","tests/parse-fail/confusing-string0.wat":"497b679b32baddcd6a158f4cadd3d9a9dea3457bac2a8c2c3d4e09b7c2d80842","tests/parse-fail/confusing-string0.wat.err":"cb3d737f2319346675a038716694354cd3b272453daa8a96e32e9861a9277f7b","tests/parse-fail/confusing-string1.wat":"46654cbed1ea6aab5019aef3d20098a391e40dacafa1ad5e83bf4ec384109fce","tests/parse-fail/confusing-string1.wat.err":"de7e7da516dc6c244bd0e4f012577b69f0cacbcc10f727fadb4b50bb04e0e2b4","tests/parse-fail/confusing-string2.wat":"11938f217c14387c05312735130f00c91d9df2d3ff9df7f13395e0f2b81dad54","tests/parse-fail/confusing-string2.wat.err":"e7bd08b146a855d681fefaf9e0576a9c333a2d10044f8e268b916b22a54227c9","tests/parse-fail/confusing-string3.wat":"e0ca4903fcafb9a54a91cf99e5eac95d25c6d2eb67b076f88191ad396f839cb6","tests/parse-fail/confusing-string3.wat.err":"b88d5db9e445c798eb24f95b7661b9c0368934d27ee8208477cd1c99351b939a","tests/parse-fail/confusing-string4.wat":"3ee2aee7f77604d051519c6f1795634469c12e98ae347a98f0c8445eecf1ff3d","tests/parse-fail/confusing-string4.wat.err":"1edc65bb09d8d3eed6ff69e7d9a7a4b5941dc823fa3436fa375657510255f6f4","tests/parse-fail/confusing-string5.wat":"024e50943128840d53f17e31a9b9332ce4f0ee70a847a043015f435b1c3c6e76","tests/parse-fail/confusing-string5.wat.err":"a0f13ec40d596ea2d8b0c4292b0d28775a5116ab7e11d7de88b295d25428c661","tests/parse-fail/confusing-string6.wat":"79cf157e29319800d2652c5a7f3dc90e07ebe2145c9904a70fc12027cdee84b7","tests/parse-fail/confusing-string6.wat.err":"860555e7aa13e3de3639cc2a530d6a42b974b629c4659593e972cbb0f306abae","tests/parse-fail/confusing-string7.wat":"7d8e403766dfb4e569754160d31ed0f9a27f908ed6cff96be43ab3d37f5975d5","tests/parse-fail/confusing-string7.wat.err":"658b6a02ba6d769254485f35c20984e7135d914b4266929963d723f26a40be4a","tests/parse-fail/confusing-string8.wat":"5a9b222e578655d57ee6e9f19bc1ea8e29aa52d652975fac685213444ed6458f","tests/parse-fail/confusing-string8.wat.err":"9a4e1a510330c800a1df7966998ebc3cde931eda20b249e5360f5e9a905dce11","tests/parse-fail/inline1.wat":"4e9767d67207aace2ac5e6f63a30e7510e4aa245ba35420539509e2254470272","tests/parse-fail/inline1.wat.err":"0143017a9825e518baa6009bae2c8d63520051dedd3437705bbe36b038a57f41","tests/parse-fail/newline-in-string.wat":"5c01cf709544ade0a6cdfcc39a3836a3bc018b633dc42a6cd872b6defc763ea7","tests/parse-fail/newline-in-string.wat.err":"1504209cc37a78b2aee778f23eacf78606daf964cf7bff251f5700efcd27ffd7","tests/parse-fail/string1.wat":"620d46d585ce94b382b5fde628c1399f3e562014b7a44af46e92f7bd045ca86e","tests/parse-fail/string1.wat.err":"fc53f3a1c4a65d8f25e5af51dec7699f45cecba114ca9c7871781bc70f664320","tests/parse-fail/string10.wat":"f7409dd45e153a1b11cb23e38f4ed87da12bedde38f8f0ccfe91037b0a4d97bd","tests/parse-fail/string10.wat.err":"ce677db5e37e0ed81ca357ed6b5edb21d85c27303ee194855bea7a88457efb6a","tests/parse-fail/string11.wat":"f6e0400b8c6a2014efa1ac676c567e140d8f86b5f4d5129773e6d67af537b615","tests/parse-fail/string11.wat.err":"4c6a550d29eda38a4e1bf7a589596f11655dc779479d7b8d466cfc53f815a742","tests/parse-fail/string12.wat":"23e30070eef22271651cce096a801fc4f79f3c37343c88bb8d2fc99b32d3b8b9","tests/parse-fail/string12.wat.err":"b5ec59f2996b88b2ee157e22d1774dc3e36fc08ed5bfc621aea830d30f66f586","tests/parse-fail/string13.wat":"81a305b981159ee10e140749ea3220c9edaaff53605e63c21995de47382b5faf","tests/parse-fail/string13.wat.err":"959f26c6b54e0d367b51d11d1addd8a53b5b8ff3caf70ebdd46bbea8ccfa2418","tests/parse-fail/string14.wat":"c45c2cc9f7afbfbd4be8e513106d22f7e5e817091448576c6bdf0701b81d95dd","tests/parse-fail/string14.wat.err":"50b5bccba905ddbe275938edb7ed0b09a5ca53dcdad36a7ff736ce9bc8e7a338","tests/parse-fail/string15.wat":"b5e0d5ade40de53b2d767a132e28376bb8c7a6f6238c4d8c248ae717c41d7f1f","tests/parse-fail/string15.wat.err":"0e9fc502cc90f96d1f592a3f63369fd2a3574bc4a2345a70365dbb76804e870f","tests/parse-fail/string16.wat":"38c3688cee80a9d089d239aa06eb1d27c5364ad2bd270aca57d05997c20aa682","tests/parse-fail/string16.wat.err":"4274b3bbe4df4cf0373619b1fcd082d0c802990817d2aca26ed885168c80e489","tests/parse-fail/string2.wat":"1172964aed31537b8c466d1f045f3e756926e7b221f80b2aff4a9a6721ea0beb","tests/parse-fail/string2.wat.err":"4618d3b20a78a077337eb5d6cae14ac39d9853762f011fbd23cff8921618dbde","tests/parse-fail/string3.wat":"07e0fbcd6270c1db100917c151ee4ac3f935e4ee1b27bce3c453b22b4b74f4d6","tests/parse-fail/string3.wat.err":"08ffc6158a9e030b2e211d53bdb8aeacfd879815c7b284d6a83b030566e35928","tests/parse-fail/string4.wat":"c970da2051b0613bdd1de4664f10424e14f2ebabe604175d4fb9b763b37af577","tests/parse-fail/string4.wat.err":"406706594d305c560fabd66417ad4fc276939990b5e701bd9d13fc223d207219","tests/parse-fail/string5.wat":"386cf314bb05acdaaabdf4da1caf140167271a26bd08bf34c3a7427d4bc4431f","tests/parse-fail/string5.wat.err":"1e56b44a23a37b2b2ad05aa9dd7e1e18191b5cc22151f93bbcf9d618779a57bd","tests/parse-fail/string6.wat":"8f1fe2825ff96f2acee9130a7721f86fcc93c221baa9411bf1fb6f0870d38ccb","tests/parse-fail/string6.wat.err":"d55dfd84d94e893f167ae73b7a080aefb2bfb05cc8a1ec201c4d3066fb8549b4","tests/parse-fail/string7.wat":"b12f8c75313d7f834489d3c353422f90bc945b37139586446eda82e334a97cde","tests/parse-fail/string7.wat.err":"4cee0ca61992c249dd0faaf2529a073cf8deeb36111a3f69b43695e5682560a2","tests/parse-fail/string8.wat":"4c2e0e1f883bb4e8cba9313497ed792130e5848e62bde7716102788d7467be10","tests/parse-fail/string8.wat.err":"840c6def7c60dd7c2b7261549cab435ba78c9b3a937adf6d5d9595ff8af01c91","tests/parse-fail/string9.wat":"2b7670caed2b0688d535de6e4e416f35fa717cfbe096a6cc764a669085c8f52f","tests/parse-fail/string9.wat.err":"37b5a9c3af9631500f31f9e5e3efa821b8d96063c57d60fd01df6be6a5c323e1","tests/parse-fail/unbalanced.wat":"f664fbef53a0308f864ba496d38044eb90482636e32586512939d4930729f3fe","tests/parse-fail/unbalanced.wat.err":"aba579f7b836856e69afe05da8328aabe0643d94e369898e686aa7bb0b07e9c9","tests/recursive.rs":"ad8a2b07bf955121a7c9e326ed35f9b2bc56b440c8cc0bbde24d423a79945c1a"},"package":"4f79a9d9df79986a68689a6b40bcc8d5d40d807487b235bebc2ac69a242b54a1"} +\ No newline at end of file ++{"files":{"Cargo.toml":"cad0c4af427ed3e97965ee33e0e475adc4280638defe1530df50ec29fd15abfc","README.md":"5a0d2b894a3ac74ee2be74715a2f22c40a08520cb4ac59183f4e7356f34ac566","src/component.rs":"154cdef2003b1607ab21a50a821b455da854b78d353d573586351c2593ed70a2","src/component/alias.rs":"5ec26333e179dc3778dead489f1273815fe9c1c808ba6a7e60eff54072fad795","src/component/binary.rs":"e7eefd2bae6eb00803cc6d9eba5dd124c36667c7673fa04baaf0806af2b02336","src/component/component.rs":"90002d2dbe9a5665e637c04b81c1cb700025e9389cdae5417fd9b3a2e49f91a1","src/component/custom.rs":"f5b23c34b73a716a986fd999fc8d8c9e24c341e83292088fe83325cd82dab4f5","src/component/expand.rs":"28fa091aac599bde4e1bd8cf1e41f24d10da1683453b3e65f3bb877bbf890b10","src/component/export.rs":"f51e824c839d8bb0884eca509622f376c8cce3335be324b2b25033af6216fd2a","src/component/func.rs":"cafdbe418fe5c5dee68b2b7245b4f00bf3bea7a4a686846bfde2e5c85bde0601","src/component/import.rs":"add63978787f5bfad1faeb1ce6b121fa60bbcd9a736afd7ae81ddc9f5b031107","src/component/instance.rs":"e550a7ee9af092ae084dd41e2c0ae756b7dca8da4b91d672d90265a6a15dff83","src/component/item_ref.rs":"e9c426ccc0210dc0c37bb0448468f5f4d9e52656b72d4ff0f2dc65c89957fe60","src/component/module.rs":"d27a28199d1dea1c64294a514329a524432319288515b0a0e3091fa7d3a33f74","src/component/resolve.rs":"93affa62d621b2f06b2c78cd98fe98d48f7832f02a9f87d3b48388b7d570387b","src/component/types.rs":"3af82844f27a472c45058ea6a2cc3a6ffa1ac2eb9625041c435085f9ef74fedd","src/component/wast.rs":"aa39db0ea0acd38744dc3cbd35903c9b00b5de90a5bfc8b76e6b6a7581d7c4c0","src/component_disabled.rs":"dde798aabc109d12de7e169bdd67a945274cfec1c1f4d6e097ecac9e5cff23e2","src/core.rs":"c82d7356515f675f9173f9bf5d7c0f4e56ca7a3eebc92b5f95a2d04882ca470c","src/core/binary.rs":"609f752b3ba6cfa9d9604d82d4e87c9ffb5a35984a28f44155b14faaa830369a","src/core/binary/dwarf.rs":"bc0662cbdc58c83abc153490f7c47e2ae5998a1dedf42b7058606ce7edcb04b7","src/core/binary/dwarf_disabled.rs":"182ee888617357835decd08c68fe8dfdef9fe0665ece9b1550794fea9dcb1486","src/core/custom.rs":"edd6044b75d79ec873c28d803fb8dc9a53724f1bba474bcdef2bc77196e0a4d2","src/core/export.rs":"1322a120d9e1dd6f3aa1485ee0bbc4294961028ae8a7584a24170af5823b73b1","src/core/expr.rs":"0451cba0e516c4ccd68afb7df70617d143f5eb042d301d8d106673db2366ffff","src/core/func.rs":"4625e75e050a4e3b22fe08e8fc39379e66420f1bbe499b6965d51ae92299823d","src/core/global.rs":"dec0abecadd2fde9298acb729259deba1ef3c4733ae5afcb4fe8cd4a633f5349","src/core/import.rs":"602a13aed2fd5fa63e2562246586546199861df57f304c2906561ab77810cadd","src/core/memory.rs":"b828b5686cfa562e4cf9c5d1a718cb823b90a6e6b637bfd17e364e68a4f79a55","src/core/module.rs":"1635ff9d4b4634a0cd18e12df281ce03c8f000edc07aae846d03ce8714f0393e","src/core/resolve/deinline_import_export.rs":"2338bc87bf19a095007bbb9598f7eab7773cf04644714761eb1aeecc5372cf79","src/core/resolve/mod.rs":"230283f528eb98b861d331e9fb5bddc3b2baa09e020ea5aa8849dfb970e0e26e","src/core/resolve/names.rs":"bf1c1a70d9b1216fa763d0f604c8789cd97f7211ac3187b4237eb41fed1cbe41","src/core/resolve/types.rs":"fbb2bcfcdb232d5bfb90cd563e7026d1a18fd0dd75bafaa25a95011216db53d5","src/core/table.rs":"4e31c8e187062abece9fd07fe28de730f2b037fa7c25571e7321a30755e0f6ec","src/core/tag.rs":"8a3d4fcdb86dedd68cdaf25abd930ef52a461cf2a0e9393bb9cb6f425afaaf2e","src/core/types.rs":"231d54c06eb2c02c83edba6e4b9b7410b7719b4a51b3d9f039d86003994f6eea","src/core/wast.rs":"7d505f0b906a2cd2df79976844a1d1026199fb7aa1d9528e1cc7117ef2d49c43","src/encode.rs":"0b165176db54fb9136202c54180adabda843a88e5436b96c19be9d41623912a3","src/error.rs":"4526260299c7983696a49ffe30a80139beb0d081fa8f42decc5e3283b361b1cb","src/gensym.rs":"b5e02e34443085f01deb5b657e541be7dc5d6dc952304e434a0b08320ea6c185","src/lexer.rs":"f4626c9893049af2419101d7af1d1ced4da6637b1a147f5fc29d562edf9d81d4","src/lib.rs":"016946ce4c00d42d95f8752b78a3d4a661a2d0335029ff891b8c3303a26d0aa4","src/names.rs":"888654ba6c95ee44b0041dd211889ae7a96f1f51e40f09b7246e28c1c497be51","src/parser.rs":"1b65e89ff099549421b2313e63984465785ed3e79fce359a77a4e7d29ba25fe1","src/token.rs":"5378856440f993dc7cfd1a5b86b78290fd6b150c493ec55314afe7f92b2cfd04","src/wast.rs":"3161c1eabe0f5cc7702d16ca3e527ddf1d5b65e5400661709507b06f83c6f4d4","src/wat.rs":"5c2002f4904ce2f33fc547c2d7ee916a56f4551522c7a4b21e34df5d49289374","tests/annotations.rs":"de6ab2a4e15c0bc683482436bed27e37ab45bc374d99f2fcc031c7947506e581","tests/comments.rs":"c068034817774cc94aa06fa09de453132d063335775002aa694fc60889a4ee04","tests/parse-fail.rs":"60cf90f0bb29c5648d803629c2614140be7746c6bc4858e2be318641382f9429","tests/parse-fail/bad-core-func-alias.wat":"b71372064c3fce9d4a616418605040fe5e1356030a709b798b4769d3619cbbfb","tests/parse-fail/bad-core-func-alias.wat.err":"bb63274c26d3a21209bad794767f48372834bdc10cfbebf568a0c65d52803c90","tests/parse-fail/bad-func-alias.wat":"237c07149e1e74afe3b991a1fee6acb63167c1ca8931341614c435000339b887","tests/parse-fail/bad-func-alias.wat.err":"4a4bfc691b06d20fdf71e1dbac04649a52c76787048415599978987d761308fa","tests/parse-fail/bad-index.wat":"d21489daeec3a35327dcc9e2ba2d0acdd05f4aeaff2272cca608fda4d2338497","tests/parse-fail/bad-index.wat.err":"dc11070de0c9160573006ea4e5fa3c4d28e71bc39b24b1938cf6ff3b03ea7154","tests/parse-fail/bad-name.wat":"e5ff5d410007779a0de6609ea4cc693f0e603d36a106b8f5098c1980dd9f8124","tests/parse-fail/bad-name.wat.err":"fb5638476c1b85d9d1919e3dbcb0f16f82d088a4a22d4a0c186d7b8ba6e1902b","tests/parse-fail/bad-name2.wat":"5a6a4d0c19e5f2e48d7cebf361aca9b9000b7ef0c652997b5bd0ffaadbd2ca8a","tests/parse-fail/bad-name2.wat.err":"129707cce45f1e3cfb3e2ca5c702182e16ca5eeb2dbb2edd0710b004a8e194a5","tests/parse-fail/bad-name3.wat":"c19133d738cc84e9174301f27d4050c216bda81c7e9918d03ac792b088f24a05","tests/parse-fail/bad-name3.wat.err":"84ea63d40a619a0782ec6e94fce63921188ab87b1c3875eacae0a371144ed83a","tests/parse-fail/block1.wat":"91e74b5c3b43be692e7a6ae74fbfa674c4b6197299eb61338c4eccf282b18f17","tests/parse-fail/block1.wat.err":"40a083ae496b41dee7002cc6a664c5db0c5e4d904ae03b815773a769c4493fca","tests/parse-fail/block2.wat":"a8c07b4c09d51f10a8ffdf19806586022552398701cd90eb6d09816d45df06e5","tests/parse-fail/block2.wat.err":"33c842ec5dd0f2fdd3a9ce8187dd98b45ceee48c12810802af809d05b9cd25e9","tests/parse-fail/block3.wat":"29739abfbabd7c55f00ddfbbb9ebd818b4a114ef2336d50514f0842f7e075905","tests/parse-fail/block3.wat.err":"fc667ae2e71a260f62a3c7393bc97272e7c0ff38b17594f4370847b8a5019060","tests/parse-fail/inline1.wat":"4e9767d67207aace2ac5e6f63a30e7510e4aa245ba35420539509e2254470272","tests/parse-fail/inline1.wat.err":"0143017a9825e518baa6009bae2c8d63520051dedd3437705bbe36b038a57f41","tests/parse-fail/newline-in-string.wat":"5c01cf709544ade0a6cdfcc39a3836a3bc018b633dc42a6cd872b6defc763ea7","tests/parse-fail/newline-in-string.wat.err":"1504209cc37a78b2aee778f23eacf78606daf964cf7bff251f5700efcd27ffd7","tests/parse-fail/string1.wat":"620d46d585ce94b382b5fde628c1399f3e562014b7a44af46e92f7bd045ca86e","tests/parse-fail/string1.wat.err":"fc53f3a1c4a65d8f25e5af51dec7699f45cecba114ca9c7871781bc70f664320","tests/parse-fail/string10.wat":"f7409dd45e153a1b11cb23e38f4ed87da12bedde38f8f0ccfe91037b0a4d97bd","tests/parse-fail/string10.wat.err":"ce677db5e37e0ed81ca357ed6b5edb21d85c27303ee194855bea7a88457efb6a","tests/parse-fail/string11.wat":"f6e0400b8c6a2014efa1ac676c567e140d8f86b5f4d5129773e6d67af537b615","tests/parse-fail/string11.wat.err":"4c6a550d29eda38a4e1bf7a589596f11655dc779479d7b8d466cfc53f815a742","tests/parse-fail/string12.wat":"23e30070eef22271651cce096a801fc4f79f3c37343c88bb8d2fc99b32d3b8b9","tests/parse-fail/string12.wat.err":"b5ec59f2996b88b2ee157e22d1774dc3e36fc08ed5bfc621aea830d30f66f586","tests/parse-fail/string13.wat":"81a305b981159ee10e140749ea3220c9edaaff53605e63c21995de47382b5faf","tests/parse-fail/string13.wat.err":"959f26c6b54e0d367b51d11d1addd8a53b5b8ff3caf70ebdd46bbea8ccfa2418","tests/parse-fail/string14.wat":"c45c2cc9f7afbfbd4be8e513106d22f7e5e817091448576c6bdf0701b81d95dd","tests/parse-fail/string14.wat.err":"50b5bccba905ddbe275938edb7ed0b09a5ca53dcdad36a7ff736ce9bc8e7a338","tests/parse-fail/string15.wat":"b5e0d5ade40de53b2d767a132e28376bb8c7a6f6238c4d8c248ae717c41d7f1f","tests/parse-fail/string15.wat.err":"0e9fc502cc90f96d1f592a3f63369fd2a3574bc4a2345a70365dbb76804e870f","tests/parse-fail/string16.wat":"38c3688cee80a9d089d239aa06eb1d27c5364ad2bd270aca57d05997c20aa682","tests/parse-fail/string16.wat.err":"4274b3bbe4df4cf0373619b1fcd082d0c802990817d2aca26ed885168c80e489","tests/parse-fail/string2.wat":"1172964aed31537b8c466d1f045f3e756926e7b221f80b2aff4a9a6721ea0beb","tests/parse-fail/string2.wat.err":"4618d3b20a78a077337eb5d6cae14ac39d9853762f011fbd23cff8921618dbde","tests/parse-fail/string3.wat":"07e0fbcd6270c1db100917c151ee4ac3f935e4ee1b27bce3c453b22b4b74f4d6","tests/parse-fail/string3.wat.err":"08ffc6158a9e030b2e211d53bdb8aeacfd879815c7b284d6a83b030566e35928","tests/parse-fail/string4.wat":"c970da2051b0613bdd1de4664f10424e14f2ebabe604175d4fb9b763b37af577","tests/parse-fail/string4.wat.err":"406706594d305c560fabd66417ad4fc276939990b5e701bd9d13fc223d207219","tests/parse-fail/string5.wat":"386cf314bb05acdaaabdf4da1caf140167271a26bd08bf34c3a7427d4bc4431f","tests/parse-fail/string5.wat.err":"1e56b44a23a37b2b2ad05aa9dd7e1e18191b5cc22151f93bbcf9d618779a57bd","tests/parse-fail/string6.wat":"8f1fe2825ff96f2acee9130a7721f86fcc93c221baa9411bf1fb6f0870d38ccb","tests/parse-fail/string6.wat.err":"d55dfd84d94e893f167ae73b7a080aefb2bfb05cc8a1ec201c4d3066fb8549b4","tests/parse-fail/string7.wat":"b12f8c75313d7f834489d3c353422f90bc945b37139586446eda82e334a97cde","tests/parse-fail/string7.wat.err":"4cee0ca61992c249dd0faaf2529a073cf8deeb36111a3f69b43695e5682560a2","tests/parse-fail/string8.wat":"4c2e0e1f883bb4e8cba9313497ed792130e5848e62bde7716102788d7467be10","tests/parse-fail/string8.wat.err":"840c6def7c60dd7c2b7261549cab435ba78c9b3a937adf6d5d9595ff8af01c91","tests/parse-fail/string9.wat":"2b7670caed2b0688d535de6e4e416f35fa717cfbe096a6cc764a669085c8f52f","tests/parse-fail/string9.wat.err":"37b5a9c3af9631500f31f9e5e3efa821b8d96063c57d60fd01df6be6a5c323e1","tests/parse-fail/unbalanced.wat":"f664fbef53a0308f864ba496d38044eb90482636e32586512939d4930729f3fe","tests/parse-fail/unbalanced.wat.err":"aba579f7b836856e69afe05da8328aabe0643d94e369898e686aa7bb0b07e9c9","tests/recursive.rs":"ad8a2b07bf955121a7c9e326ed35f9b2bc56b440c8cc0bbde24d423a79945c1a"},"package":"4f79a9d9df79986a68689a6b40bcc8d5d40d807487b235bebc2ac69a242b54a1"} +\ No newline at end of file +diff -up thunderbird-140.0/third_party/rust/wast/.cargo-checksum.json.rust-file-removal thunderbird-140.0/third_party/rust/wast/.cargo-checksum.json +--- thunderbird-140.0/third_party/rust/wast/.cargo-checksum.json.rust-file-removal 2025-07-17 10:44:41.588841964 +0200 ++++ thunderbird-140.0/third_party/rust/wast/.cargo-checksum.json 2025-07-17 10:47:06.121570121 +0200 +@@ -1 +1 @@ +-{"files":{"Cargo.toml":"cad0c4af427ed3e97965ee33e0e475adc4280638defe1530df50ec29fd15abfc","README.md":"5a0d2b894a3ac74ee2be74715a2f22c40a08520cb4ac59183f4e7356f34ac566","src/component.rs":"154cdef2003b1607ab21a50a821b455da854b78d353d573586351c2593ed70a2","src/component/alias.rs":"5ec26333e179dc3778dead489f1273815fe9c1c808ba6a7e60eff54072fad795","src/component/binary.rs":"e7eefd2bae6eb00803cc6d9eba5dd124c36667c7673fa04baaf0806af2b02336","src/component/component.rs":"90002d2dbe9a5665e637c04b81c1cb700025e9389cdae5417fd9b3a2e49f91a1","src/component/custom.rs":"f5b23c34b73a716a986fd999fc8d8c9e24c341e83292088fe83325cd82dab4f5","src/component/expand.rs":"28fa091aac599bde4e1bd8cf1e41f24d10da1683453b3e65f3bb877bbf890b10","src/component/export.rs":"f51e824c839d8bb0884eca509622f376c8cce3335be324b2b25033af6216fd2a","src/component/func.rs":"cafdbe418fe5c5dee68b2b7245b4f00bf3bea7a4a686846bfde2e5c85bde0601","src/component/import.rs":"add63978787f5bfad1faeb1ce6b121fa60bbcd9a736afd7ae81ddc9f5b031107","src/component/instance.rs":"e550a7ee9af092ae084dd41e2c0ae756b7dca8da4b91d672d90265a6a15dff83","src/component/item_ref.rs":"e9c426ccc0210dc0c37bb0448468f5f4d9e52656b72d4ff0f2dc65c89957fe60","src/component/module.rs":"d27a28199d1dea1c64294a514329a524432319288515b0a0e3091fa7d3a33f74","src/component/resolve.rs":"93affa62d621b2f06b2c78cd98fe98d48f7832f02a9f87d3b48388b7d570387b","src/component/types.rs":"3af82844f27a472c45058ea6a2cc3a6ffa1ac2eb9625041c435085f9ef74fedd","src/component/wast.rs":"aa39db0ea0acd38744dc3cbd35903c9b00b5de90a5bfc8b76e6b6a7581d7c4c0","src/component_disabled.rs":"dde798aabc109d12de7e169bdd67a945274cfec1c1f4d6e097ecac9e5cff23e2","src/core.rs":"c82d7356515f675f9173f9bf5d7c0f4e56ca7a3eebc92b5f95a2d04882ca470c","src/core/binary.rs":"609f752b3ba6cfa9d9604d82d4e87c9ffb5a35984a28f44155b14faaa830369a","src/core/binary/dwarf.rs":"bc0662cbdc58c83abc153490f7c47e2ae5998a1dedf42b7058606ce7edcb04b7","src/core/binary/dwarf_disabled.rs":"182ee888617357835decd08c68fe8dfdef9fe0665ece9b1550794fea9dcb1486","src/core/custom.rs":"edd6044b75d79ec873c28d803fb8dc9a53724f1bba474bcdef2bc77196e0a4d2","src/core/export.rs":"1322a120d9e1dd6f3aa1485ee0bbc4294961028ae8a7584a24170af5823b73b1","src/core/expr.rs":"0451cba0e516c4ccd68afb7df70617d143f5eb042d301d8d106673db2366ffff","src/core/func.rs":"4625e75e050a4e3b22fe08e8fc39379e66420f1bbe499b6965d51ae92299823d","src/core/global.rs":"dec0abecadd2fde9298acb729259deba1ef3c4733ae5afcb4fe8cd4a633f5349","src/core/import.rs":"602a13aed2fd5fa63e2562246586546199861df57f304c2906561ab77810cadd","src/core/memory.rs":"b828b5686cfa562e4cf9c5d1a718cb823b90a6e6b637bfd17e364e68a4f79a55","src/core/module.rs":"1635ff9d4b4634a0cd18e12df281ce03c8f000edc07aae846d03ce8714f0393e","src/core/resolve/deinline_import_export.rs":"2338bc87bf19a095007bbb9598f7eab7773cf04644714761eb1aeecc5372cf79","src/core/resolve/mod.rs":"230283f528eb98b861d331e9fb5bddc3b2baa09e020ea5aa8849dfb970e0e26e","src/core/resolve/names.rs":"bf1c1a70d9b1216fa763d0f604c8789cd97f7211ac3187b4237eb41fed1cbe41","src/core/resolve/types.rs":"fbb2bcfcdb232d5bfb90cd563e7026d1a18fd0dd75bafaa25a95011216db53d5","src/core/table.rs":"4e31c8e187062abece9fd07fe28de730f2b037fa7c25571e7321a30755e0f6ec","src/core/tag.rs":"8a3d4fcdb86dedd68cdaf25abd930ef52a461cf2a0e9393bb9cb6f425afaaf2e","src/core/types.rs":"231d54c06eb2c02c83edba6e4b9b7410b7719b4a51b3d9f039d86003994f6eea","src/core/wast.rs":"7d505f0b906a2cd2df79976844a1d1026199fb7aa1d9528e1cc7117ef2d49c43","src/encode.rs":"0b165176db54fb9136202c54180adabda843a88e5436b96c19be9d41623912a3","src/error.rs":"4526260299c7983696a49ffe30a80139beb0d081fa8f42decc5e3283b361b1cb","src/gensym.rs":"b5e02e34443085f01deb5b657e541be7dc5d6dc952304e434a0b08320ea6c185","src/lexer.rs":"f4626c9893049af2419101d7af1d1ced4da6637b1a147f5fc29d562edf9d81d4","src/lib.rs":"016946ce4c00d42d95f8752b78a3d4a661a2d0335029ff891b8c3303a26d0aa4","src/names.rs":"888654ba6c95ee44b0041dd211889ae7a96f1f51e40f09b7246e28c1c497be51","src/parser.rs":"1b65e89ff099549421b2313e63984465785ed3e79fce359a77a4e7d29ba25fe1","src/token.rs":"5378856440f993dc7cfd1a5b86b78290fd6b150c493ec55314afe7f92b2cfd04","src/wast.rs":"3161c1eabe0f5cc7702d16ca3e527ddf1d5b65e5400661709507b06f83c6f4d4","src/wat.rs":"5c2002f4904ce2f33fc547c2d7ee916a56f4551522c7a4b21e34df5d49289374","tests/annotations.rs":"de6ab2a4e15c0bc683482436bed27e37ab45bc374d99f2fcc031c7947506e581","tests/comments.rs":"c068034817774cc94aa06fa09de453132d063335775002aa694fc60889a4ee04","tests/parse-fail.rs":"60cf90f0bb29c5648d803629c2614140be7746c6bc4858e2be318641382f9429","tests/parse-fail/bad-core-func-alias.wat":"b71372064c3fce9d4a616418605040fe5e1356030a709b798b4769d3619cbbfb","tests/parse-fail/bad-core-func-alias.wat.err":"bb63274c26d3a21209bad794767f48372834bdc10cfbebf568a0c65d52803c90","tests/parse-fail/bad-func-alias.wat":"237c07149e1e74afe3b991a1fee6acb63167c1ca8931341614c435000339b887","tests/parse-fail/bad-func-alias.wat.err":"4a4bfc691b06d20fdf71e1dbac04649a52c76787048415599978987d761308fa","tests/parse-fail/bad-index.wat":"d21489daeec3a35327dcc9e2ba2d0acdd05f4aeaff2272cca608fda4d2338497","tests/parse-fail/bad-index.wat.err":"dc11070de0c9160573006ea4e5fa3c4d28e71bc39b24b1938cf6ff3b03ea7154","tests/parse-fail/bad-name.wat":"e5ff5d410007779a0de6609ea4cc693f0e603d36a106b8f5098c1980dd9f8124","tests/parse-fail/bad-name.wat.err":"fb5638476c1b85d9d1919e3dbcb0f16f82d088a4a22d4a0c186d7b8ba6e1902b","tests/parse-fail/bad-name2.wat":"5a6a4d0c19e5f2e48d7cebf361aca9b9000b7ef0c652997b5bd0ffaadbd2ca8a","tests/parse-fail/bad-name2.wat.err":"129707cce45f1e3cfb3e2ca5c702182e16ca5eeb2dbb2edd0710b004a8e194a5","tests/parse-fail/bad-name3.wat":"c19133d738cc84e9174301f27d4050c216bda81c7e9918d03ac792b088f24a05","tests/parse-fail/bad-name3.wat.err":"84ea63d40a619a0782ec6e94fce63921188ab87b1c3875eacae0a371144ed83a","tests/parse-fail/block1.wat":"91e74b5c3b43be692e7a6ae74fbfa674c4b6197299eb61338c4eccf282b18f17","tests/parse-fail/block1.wat.err":"40a083ae496b41dee7002cc6a664c5db0c5e4d904ae03b815773a769c4493fca","tests/parse-fail/block2.wat":"a8c07b4c09d51f10a8ffdf19806586022552398701cd90eb6d09816d45df06e5","tests/parse-fail/block2.wat.err":"33c842ec5dd0f2fdd3a9ce8187dd98b45ceee48c12810802af809d05b9cd25e9","tests/parse-fail/block3.wat":"29739abfbabd7c55f00ddfbbb9ebd818b4a114ef2336d50514f0842f7e075905","tests/parse-fail/block3.wat.err":"fc667ae2e71a260f62a3c7393bc97272e7c0ff38b17594f4370847b8a5019060","tests/parse-fail/confusing-block-comment0.wat":"8f27c9d0d212bbb1862ea89ffd7cbeafde5dfd755d695c1ba696cd520aba1a1d","tests/parse-fail/confusing-block-comment0.wat.err":"b53cbaef7bcec3862c64e09c084b92cd61bd29b954125482b2d083db250cd9e2","tests/parse-fail/confusing-block-comment1.wat":"b1a0447c9a8eaab8938d15cd33bd4adbb8bb69c2d710209b604023991a4347cb","tests/parse-fail/confusing-block-comment1.wat.err":"2fc3b3e4f98416326e1e5ec034026301069b6a98fa24451bc7573e16b8cb3811","tests/parse-fail/confusing-block-comment2.wat":"e3f49c7a388fba81081beb25d87bbd7db0acce5dd8e3eaa04574905ed7ec420c","tests/parse-fail/confusing-block-comment2.wat.err":"2183231d6acd0b5a117f9aea747c3d5c12e758450a6cd74027bb954a3134cf19","tests/parse-fail/confusing-block-comment3.wat":"d83f89c582501eb8833e772b8462c8974984a2f7fbb80b1452dc399fac74e5ed","tests/parse-fail/confusing-block-comment3.wat.err":"8b2096a4833627905c63f49cdabe44be24336646578dcfbdc67e9bfb35cbc601","tests/parse-fail/confusing-block-comment4.wat":"b7c6c68844d918e9ef6dd5ab9c40c7de7b38f04f94fadad630eda4e596f3e0f8","tests/parse-fail/confusing-block-comment4.wat.err":"2f790cc511edfcd89a12c9207901be16039fc1a06a584d73095e77a52f861cd9","tests/parse-fail/confusing-block-comment5.wat":"a159808032638cc914fa80ac4354a68b0af4f435a09cbe3e2d577582e183eb0a","tests/parse-fail/confusing-block-comment5.wat.err":"6fe0d99894307442f83fe93beaa5da706e06c9bdaf8e39d7cbae4c4fffafcb94","tests/parse-fail/confusing-block-comment6.wat":"abe48bcba2587dca98bc80ddde4e813f94fbc8a3538704a0775ea85bca0f8466","tests/parse-fail/confusing-block-comment6.wat.err":"3c97b9bf1112bbb7335d7fe4be5befb6f91eea7bec7dd3e6b543792231003c56","tests/parse-fail/confusing-block-comment7.wat":"e125c416ea5fa0ac35a58295a83a6f345438e2d7ddc6a39bd76c8e89885b3f0e","tests/parse-fail/confusing-block-comment7.wat.err":"5c34528ff2019cd3f0b3df34fd42523c0b66120706321da2c88ec05793478d2e","tests/parse-fail/confusing-block-comment8.wat":"200cc4c0e5af21a25529d7a81633a03642cff807255d6cd72eb45cdccc605cec","tests/parse-fail/confusing-block-comment8.wat.err":"9b81237d150a784b71791eee88fb6264a8bd6412862660f7392945203809e517","tests/parse-fail/confusing-line-comment0.wat":"bcec4c5a1e52b3e392e07c6711c979aa8d7db8baaf2bcdf270ba16d1aa528d26","tests/parse-fail/confusing-line-comment0.wat.err":"41ec5a075dc6b73afe1aec6b3198c5c4ae3a1a900e1610115879058ce034d6f6","tests/parse-fail/confusing-line-comment1.wat":"a2afbcab00ec957dfd9e9bf21fa4238852247b27f0b054f4a00f6b172dddf853","tests/parse-fail/confusing-line-comment1.wat.err":"f19a645e6fb5cbd7a0dd2308732741edcf83dbae0ef62549972029856a9e7fc6","tests/parse-fail/confusing-line-comment2.wat":"7f2a68229d02aac56ec4dfccf139bf2d617a0e89430357b30444dc4239d8aa89","tests/parse-fail/confusing-line-comment2.wat.err":"08add3d33e10e1ab6b4f3ae431f5db61d6f6c0a2b7d6828482a1e51b3a2d3851","tests/parse-fail/confusing-line-comment3.wat":"61173ae54782f6de86685f9555ffb94bbe2cf20b234daf660abb69ba3326f1ff","tests/parse-fail/confusing-line-comment3.wat.err":"4a5333dc02efa3c1eeab9cafa7c707f78abe92defdb01a71d6fe20944e4785f0","tests/parse-fail/confusing-line-comment4.wat":"9ecbbbe82c750e6475af1bfb46fe7a06115e4446a437d19fc08ca3d002f2a1c9","tests/parse-fail/confusing-line-comment4.wat.err":"ddb8aee8006265253b09c313cf5eb5c2dc4da66f502b4f6d3e2e1de77b35aec9","tests/parse-fail/confusing-line-comment5.wat":"8a4c8d342111bc9d37c16dbdf67c52027e1a42632abc9f359b3e4f07a85748b5","tests/parse-fail/confusing-line-comment5.wat.err":"34e368719fc0eab2f1a43c9f8e6f1b31aa9be9f971085d72374e49bde39cbfe5","tests/parse-fail/confusing-line-comment6.wat":"15f0dcdec23736ce92db84b3a7cdfe8689c97f2a7d0b9b0bfb0dcd2675163ed1","tests/parse-fail/confusing-line-comment6.wat.err":"0570be2ede803f071925d249f3858d3a417b5a6d678c9da40fc851d788d12983","tests/parse-fail/confusing-line-comment7.wat":"c7ee59301a701dd52d56cad02df78b0ad3584460bc18efa42ee137fe0c35aef6","tests/parse-fail/confusing-line-comment7.wat.err":"feebbeee8c85d8b3b85cec89435ae18f3ade9f754ca180d747a41406b64ca07a","tests/parse-fail/confusing-line-comment8.wat":"17632a8142154624de88b3cf93516147ed3419d785200bcd7049499eca8e8f04","tests/parse-fail/confusing-line-comment8.wat.err":"9c209285f2295cd2bc999aa7a9534a654932493308ab1f102839ed15a4d04d17","tests/parse-fail/confusing-string0.wat":"497b679b32baddcd6a158f4cadd3d9a9dea3457bac2a8c2c3d4e09b7c2d80842","tests/parse-fail/confusing-string0.wat.err":"cb3d737f2319346675a038716694354cd3b272453daa8a96e32e9861a9277f7b","tests/parse-fail/confusing-string1.wat":"46654cbed1ea6aab5019aef3d20098a391e40dacafa1ad5e83bf4ec384109fce","tests/parse-fail/confusing-string1.wat.err":"de7e7da516dc6c244bd0e4f012577b69f0cacbcc10f727fadb4b50bb04e0e2b4","tests/parse-fail/confusing-string2.wat":"11938f217c14387c05312735130f00c91d9df2d3ff9df7f13395e0f2b81dad54","tests/parse-fail/confusing-string2.wat.err":"e7bd08b146a855d681fefaf9e0576a9c333a2d10044f8e268b916b22a54227c9","tests/parse-fail/confusing-string3.wat":"e0ca4903fcafb9a54a91cf99e5eac95d25c6d2eb67b076f88191ad396f839cb6","tests/parse-fail/confusing-string3.wat.err":"b88d5db9e445c798eb24f95b7661b9c0368934d27ee8208477cd1c99351b939a","tests/parse-fail/confusing-string4.wat":"3ee2aee7f77604d051519c6f1795634469c12e98ae347a98f0c8445eecf1ff3d","tests/parse-fail/confusing-string4.wat.err":"1edc65bb09d8d3eed6ff69e7d9a7a4b5941dc823fa3436fa375657510255f6f4","tests/parse-fail/confusing-string5.wat":"024e50943128840d53f17e31a9b9332ce4f0ee70a847a043015f435b1c3c6e76","tests/parse-fail/confusing-string5.wat.err":"a0f13ec40d596ea2d8b0c4292b0d28775a5116ab7e11d7de88b295d25428c661","tests/parse-fail/confusing-string6.wat":"79cf157e29319800d2652c5a7f3dc90e07ebe2145c9904a70fc12027cdee84b7","tests/parse-fail/confusing-string6.wat.err":"860555e7aa13e3de3639cc2a530d6a42b974b629c4659593e972cbb0f306abae","tests/parse-fail/confusing-string7.wat":"7d8e403766dfb4e569754160d31ed0f9a27f908ed6cff96be43ab3d37f5975d5","tests/parse-fail/confusing-string7.wat.err":"658b6a02ba6d769254485f35c20984e7135d914b4266929963d723f26a40be4a","tests/parse-fail/confusing-string8.wat":"5a9b222e578655d57ee6e9f19bc1ea8e29aa52d652975fac685213444ed6458f","tests/parse-fail/confusing-string8.wat.err":"9a4e1a510330c800a1df7966998ebc3cde931eda20b249e5360f5e9a905dce11","tests/parse-fail/inline1.wat":"4e9767d67207aace2ac5e6f63a30e7510e4aa245ba35420539509e2254470272","tests/parse-fail/inline1.wat.err":"0143017a9825e518baa6009bae2c8d63520051dedd3437705bbe36b038a57f41","tests/parse-fail/newline-in-string.wat":"5c01cf709544ade0a6cdfcc39a3836a3bc018b633dc42a6cd872b6defc763ea7","tests/parse-fail/newline-in-string.wat.err":"1504209cc37a78b2aee778f23eacf78606daf964cf7bff251f5700efcd27ffd7","tests/parse-fail/string1.wat":"620d46d585ce94b382b5fde628c1399f3e562014b7a44af46e92f7bd045ca86e","tests/parse-fail/string1.wat.err":"fc53f3a1c4a65d8f25e5af51dec7699f45cecba114ca9c7871781bc70f664320","tests/parse-fail/string10.wat":"f7409dd45e153a1b11cb23e38f4ed87da12bedde38f8f0ccfe91037b0a4d97bd","tests/parse-fail/string10.wat.err":"ce677db5e37e0ed81ca357ed6b5edb21d85c27303ee194855bea7a88457efb6a","tests/parse-fail/string11.wat":"f6e0400b8c6a2014efa1ac676c567e140d8f86b5f4d5129773e6d67af537b615","tests/parse-fail/string11.wat.err":"4c6a550d29eda38a4e1bf7a589596f11655dc779479d7b8d466cfc53f815a742","tests/parse-fail/string12.wat":"23e30070eef22271651cce096a801fc4f79f3c37343c88bb8d2fc99b32d3b8b9","tests/parse-fail/string12.wat.err":"b5ec59f2996b88b2ee157e22d1774dc3e36fc08ed5bfc621aea830d30f66f586","tests/parse-fail/string13.wat":"81a305b981159ee10e140749ea3220c9edaaff53605e63c21995de47382b5faf","tests/parse-fail/string13.wat.err":"959f26c6b54e0d367b51d11d1addd8a53b5b8ff3caf70ebdd46bbea8ccfa2418","tests/parse-fail/string14.wat":"c45c2cc9f7afbfbd4be8e513106d22f7e5e817091448576c6bdf0701b81d95dd","tests/parse-fail/string14.wat.err":"50b5bccba905ddbe275938edb7ed0b09a5ca53dcdad36a7ff736ce9bc8e7a338","tests/parse-fail/string15.wat":"b5e0d5ade40de53b2d767a132e28376bb8c7a6f6238c4d8c248ae717c41d7f1f","tests/parse-fail/string15.wat.err":"0e9fc502cc90f96d1f592a3f63369fd2a3574bc4a2345a70365dbb76804e870f","tests/parse-fail/string16.wat":"38c3688cee80a9d089d239aa06eb1d27c5364ad2bd270aca57d05997c20aa682","tests/parse-fail/string16.wat.err":"4274b3bbe4df4cf0373619b1fcd082d0c802990817d2aca26ed885168c80e489","tests/parse-fail/string2.wat":"1172964aed31537b8c466d1f045f3e756926e7b221f80b2aff4a9a6721ea0beb","tests/parse-fail/string2.wat.err":"4618d3b20a78a077337eb5d6cae14ac39d9853762f011fbd23cff8921618dbde","tests/parse-fail/string3.wat":"07e0fbcd6270c1db100917c151ee4ac3f935e4ee1b27bce3c453b22b4b74f4d6","tests/parse-fail/string3.wat.err":"08ffc6158a9e030b2e211d53bdb8aeacfd879815c7b284d6a83b030566e35928","tests/parse-fail/string4.wat":"c970da2051b0613bdd1de4664f10424e14f2ebabe604175d4fb9b763b37af577","tests/parse-fail/string4.wat.err":"406706594d305c560fabd66417ad4fc276939990b5e701bd9d13fc223d207219","tests/parse-fail/string5.wat":"386cf314bb05acdaaabdf4da1caf140167271a26bd08bf34c3a7427d4bc4431f","tests/parse-fail/string5.wat.err":"1e56b44a23a37b2b2ad05aa9dd7e1e18191b5cc22151f93bbcf9d618779a57bd","tests/parse-fail/string6.wat":"8f1fe2825ff96f2acee9130a7721f86fcc93c221baa9411bf1fb6f0870d38ccb","tests/parse-fail/string6.wat.err":"d55dfd84d94e893f167ae73b7a080aefb2bfb05cc8a1ec201c4d3066fb8549b4","tests/parse-fail/string7.wat":"b12f8c75313d7f834489d3c353422f90bc945b37139586446eda82e334a97cde","tests/parse-fail/string7.wat.err":"4cee0ca61992c249dd0faaf2529a073cf8deeb36111a3f69b43695e5682560a2","tests/parse-fail/string8.wat":"4c2e0e1f883bb4e8cba9313497ed792130e5848e62bde7716102788d7467be10","tests/parse-fail/string8.wat.err":"840c6def7c60dd7c2b7261549cab435ba78c9b3a937adf6d5d9595ff8af01c91","tests/parse-fail/string9.wat":"2b7670caed2b0688d535de6e4e416f35fa717cfbe096a6cc764a669085c8f52f","tests/parse-fail/string9.wat.err":"37b5a9c3af9631500f31f9e5e3efa821b8d96063c57d60fd01df6be6a5c323e1","tests/parse-fail/unbalanced.wat":"f664fbef53a0308f864ba496d38044eb90482636e32586512939d4930729f3fe","tests/parse-fail/unbalanced.wat.err":"aba579f7b836856e69afe05da8328aabe0643d94e369898e686aa7bb0b07e9c9","tests/recursive.rs":"ad8a2b07bf955121a7c9e326ed35f9b2bc56b440c8cc0bbde24d423a79945c1a"},"package":"4f79a9d9df79986a68689a6b40bcc8d5d40d807487b235bebc2ac69a242b54a1"} +\ No newline at end of file ++{"files":{"Cargo.toml":"cad0c4af427ed3e97965ee33e0e475adc4280638defe1530df50ec29fd15abfc","README.md":"5a0d2b894a3ac74ee2be74715a2f22c40a08520cb4ac59183f4e7356f34ac566","src/component.rs":"154cdef2003b1607ab21a50a821b455da854b78d353d573586351c2593ed70a2","src/component/alias.rs":"5ec26333e179dc3778dead489f1273815fe9c1c808ba6a7e60eff54072fad795","src/component/binary.rs":"e7eefd2bae6eb00803cc6d9eba5dd124c36667c7673fa04baaf0806af2b02336","src/component/component.rs":"90002d2dbe9a5665e637c04b81c1cb700025e9389cdae5417fd9b3a2e49f91a1","src/component/custom.rs":"f5b23c34b73a716a986fd999fc8d8c9e24c341e83292088fe83325cd82dab4f5","src/component/expand.rs":"28fa091aac599bde4e1bd8cf1e41f24d10da1683453b3e65f3bb877bbf890b10","src/component/export.rs":"f51e824c839d8bb0884eca509622f376c8cce3335be324b2b25033af6216fd2a","src/component/func.rs":"cafdbe418fe5c5dee68b2b7245b4f00bf3bea7a4a686846bfde2e5c85bde0601","src/component/import.rs":"add63978787f5bfad1faeb1ce6b121fa60bbcd9a736afd7ae81ddc9f5b031107","src/component/instance.rs":"e550a7ee9af092ae084dd41e2c0ae756b7dca8da4b91d672d90265a6a15dff83","src/component/item_ref.rs":"e9c426ccc0210dc0c37bb0448468f5f4d9e52656b72d4ff0f2dc65c89957fe60","src/component/module.rs":"d27a28199d1dea1c64294a514329a524432319288515b0a0e3091fa7d3a33f74","src/component/resolve.rs":"93affa62d621b2f06b2c78cd98fe98d48f7832f02a9f87d3b48388b7d570387b","src/component/types.rs":"3af82844f27a472c45058ea6a2cc3a6ffa1ac2eb9625041c435085f9ef74fedd","src/component/wast.rs":"aa39db0ea0acd38744dc3cbd35903c9b00b5de90a5bfc8b76e6b6a7581d7c4c0","src/component_disabled.rs":"dde798aabc109d12de7e169bdd67a945274cfec1c1f4d6e097ecac9e5cff23e2","src/core.rs":"c82d7356515f675f9173f9bf5d7c0f4e56ca7a3eebc92b5f95a2d04882ca470c","src/core/binary.rs":"609f752b3ba6cfa9d9604d82d4e87c9ffb5a35984a28f44155b14faaa830369a","src/core/binary/dwarf.rs":"bc0662cbdc58c83abc153490f7c47e2ae5998a1dedf42b7058606ce7edcb04b7","src/core/binary/dwarf_disabled.rs":"182ee888617357835decd08c68fe8dfdef9fe0665ece9b1550794fea9dcb1486","src/core/custom.rs":"edd6044b75d79ec873c28d803fb8dc9a53724f1bba474bcdef2bc77196e0a4d2","src/core/export.rs":"1322a120d9e1dd6f3aa1485ee0bbc4294961028ae8a7584a24170af5823b73b1","src/core/expr.rs":"0451cba0e516c4ccd68afb7df70617d143f5eb042d301d8d106673db2366ffff","src/core/func.rs":"4625e75e050a4e3b22fe08e8fc39379e66420f1bbe499b6965d51ae92299823d","src/core/global.rs":"dec0abecadd2fde9298acb729259deba1ef3c4733ae5afcb4fe8cd4a633f5349","src/core/import.rs":"602a13aed2fd5fa63e2562246586546199861df57f304c2906561ab77810cadd","src/core/memory.rs":"b828b5686cfa562e4cf9c5d1a718cb823b90a6e6b637bfd17e364e68a4f79a55","src/core/module.rs":"1635ff9d4b4634a0cd18e12df281ce03c8f000edc07aae846d03ce8714f0393e","src/core/resolve/deinline_import_export.rs":"2338bc87bf19a095007bbb9598f7eab7773cf04644714761eb1aeecc5372cf79","src/core/resolve/mod.rs":"230283f528eb98b861d331e9fb5bddc3b2baa09e020ea5aa8849dfb970e0e26e","src/core/resolve/names.rs":"bf1c1a70d9b1216fa763d0f604c8789cd97f7211ac3187b4237eb41fed1cbe41","src/core/resolve/types.rs":"fbb2bcfcdb232d5bfb90cd563e7026d1a18fd0dd75bafaa25a95011216db53d5","src/core/table.rs":"4e31c8e187062abece9fd07fe28de730f2b037fa7c25571e7321a30755e0f6ec","src/core/tag.rs":"8a3d4fcdb86dedd68cdaf25abd930ef52a461cf2a0e9393bb9cb6f425afaaf2e","src/core/types.rs":"231d54c06eb2c02c83edba6e4b9b7410b7719b4a51b3d9f039d86003994f6eea","src/core/wast.rs":"7d505f0b906a2cd2df79976844a1d1026199fb7aa1d9528e1cc7117ef2d49c43","src/encode.rs":"0b165176db54fb9136202c54180adabda843a88e5436b96c19be9d41623912a3","src/error.rs":"4526260299c7983696a49ffe30a80139beb0d081fa8f42decc5e3283b361b1cb","src/gensym.rs":"b5e02e34443085f01deb5b657e541be7dc5d6dc952304e434a0b08320ea6c185","src/lexer.rs":"f4626c9893049af2419101d7af1d1ced4da6637b1a147f5fc29d562edf9d81d4","src/lib.rs":"016946ce4c00d42d95f8752b78a3d4a661a2d0335029ff891b8c3303a26d0aa4","src/names.rs":"888654ba6c95ee44b0041dd211889ae7a96f1f51e40f09b7246e28c1c497be51","src/parser.rs":"1b65e89ff099549421b2313e63984465785ed3e79fce359a77a4e7d29ba25fe1","src/token.rs":"5378856440f993dc7cfd1a5b86b78290fd6b150c493ec55314afe7f92b2cfd04","src/wast.rs":"3161c1eabe0f5cc7702d16ca3e527ddf1d5b65e5400661709507b06f83c6f4d4","src/wat.rs":"5c2002f4904ce2f33fc547c2d7ee916a56f4551522c7a4b21e34df5d49289374","tests/annotations.rs":"de6ab2a4e15c0bc683482436bed27e37ab45bc374d99f2fcc031c7947506e581","tests/comments.rs":"c068034817774cc94aa06fa09de453132d063335775002aa694fc60889a4ee04","tests/parse-fail.rs":"60cf90f0bb29c5648d803629c2614140be7746c6bc4858e2be318641382f9429","tests/parse-fail/bad-core-func-alias.wat":"b71372064c3fce9d4a616418605040fe5e1356030a709b798b4769d3619cbbfb","tests/parse-fail/bad-core-func-alias.wat.err":"bb63274c26d3a21209bad794767f48372834bdc10cfbebf568a0c65d52803c90","tests/parse-fail/bad-func-alias.wat":"237c07149e1e74afe3b991a1fee6acb63167c1ca8931341614c435000339b887","tests/parse-fail/bad-func-alias.wat.err":"4a4bfc691b06d20fdf71e1dbac04649a52c76787048415599978987d761308fa","tests/parse-fail/bad-index.wat":"d21489daeec3a35327dcc9e2ba2d0acdd05f4aeaff2272cca608fda4d2338497","tests/parse-fail/bad-index.wat.err":"dc11070de0c9160573006ea4e5fa3c4d28e71bc39b24b1938cf6ff3b03ea7154","tests/parse-fail/bad-name.wat":"e5ff5d410007779a0de6609ea4cc693f0e603d36a106b8f5098c1980dd9f8124","tests/parse-fail/bad-name.wat.err":"fb5638476c1b85d9d1919e3dbcb0f16f82d088a4a22d4a0c186d7b8ba6e1902b","tests/parse-fail/bad-name2.wat":"5a6a4d0c19e5f2e48d7cebf361aca9b9000b7ef0c652997b5bd0ffaadbd2ca8a","tests/parse-fail/bad-name2.wat.err":"129707cce45f1e3cfb3e2ca5c702182e16ca5eeb2dbb2edd0710b004a8e194a5","tests/parse-fail/bad-name3.wat":"c19133d738cc84e9174301f27d4050c216bda81c7e9918d03ac792b088f24a05","tests/parse-fail/bad-name3.wat.err":"84ea63d40a619a0782ec6e94fce63921188ab87b1c3875eacae0a371144ed83a","tests/parse-fail/block1.wat":"91e74b5c3b43be692e7a6ae74fbfa674c4b6197299eb61338c4eccf282b18f17","tests/parse-fail/block1.wat.err":"40a083ae496b41dee7002cc6a664c5db0c5e4d904ae03b815773a769c4493fca","tests/parse-fail/block2.wat":"a8c07b4c09d51f10a8ffdf19806586022552398701cd90eb6d09816d45df06e5","tests/parse-fail/block2.wat.err":"33c842ec5dd0f2fdd3a9ce8187dd98b45ceee48c12810802af809d05b9cd25e9","tests/parse-fail/block3.wat":"29739abfbabd7c55f00ddfbbb9ebd818b4a114ef2336d50514f0842f7e075905","tests/parse-fail/block3.wat.err":"fc667ae2e71a260f62a3c7393bc97272e7c0ff38b17594f4370847b8a5019060","tests/parse-fail/inline1.wat":"4e9767d67207aace2ac5e6f63a30e7510e4aa245ba35420539509e2254470272","tests/parse-fail/inline1.wat.err":"0143017a9825e518baa6009bae2c8d63520051dedd3437705bbe36b038a57f41","tests/parse-fail/newline-in-string.wat":"5c01cf709544ade0a6cdfcc39a3836a3bc018b633dc42a6cd872b6defc763ea7","tests/parse-fail/newline-in-string.wat.err":"1504209cc37a78b2aee778f23eacf78606daf964cf7bff251f5700efcd27ffd7","tests/parse-fail/string1.wat":"620d46d585ce94b382b5fde628c1399f3e562014b7a44af46e92f7bd045ca86e","tests/parse-fail/string1.wat.err":"fc53f3a1c4a65d8f25e5af51dec7699f45cecba114ca9c7871781bc70f664320","tests/parse-fail/string10.wat":"f7409dd45e153a1b11cb23e38f4ed87da12bedde38f8f0ccfe91037b0a4d97bd","tests/parse-fail/string10.wat.err":"ce677db5e37e0ed81ca357ed6b5edb21d85c27303ee194855bea7a88457efb6a","tests/parse-fail/string11.wat":"f6e0400b8c6a2014efa1ac676c567e140d8f86b5f4d5129773e6d67af537b615","tests/parse-fail/string11.wat.err":"4c6a550d29eda38a4e1bf7a589596f11655dc779479d7b8d466cfc53f815a742","tests/parse-fail/string12.wat":"23e30070eef22271651cce096a801fc4f79f3c37343c88bb8d2fc99b32d3b8b9","tests/parse-fail/string12.wat.err":"b5ec59f2996b88b2ee157e22d1774dc3e36fc08ed5bfc621aea830d30f66f586","tests/parse-fail/string13.wat":"81a305b981159ee10e140749ea3220c9edaaff53605e63c21995de47382b5faf","tests/parse-fail/string13.wat.err":"959f26c6b54e0d367b51d11d1addd8a53b5b8ff3caf70ebdd46bbea8ccfa2418","tests/parse-fail/string14.wat":"c45c2cc9f7afbfbd4be8e513106d22f7e5e817091448576c6bdf0701b81d95dd","tests/parse-fail/string14.wat.err":"50b5bccba905ddbe275938edb7ed0b09a5ca53dcdad36a7ff736ce9bc8e7a338","tests/parse-fail/string15.wat":"b5e0d5ade40de53b2d767a132e28376bb8c7a6f6238c4d8c248ae717c41d7f1f","tests/parse-fail/string15.wat.err":"0e9fc502cc90f96d1f592a3f63369fd2a3574bc4a2345a70365dbb76804e870f","tests/parse-fail/string16.wat":"38c3688cee80a9d089d239aa06eb1d27c5364ad2bd270aca57d05997c20aa682","tests/parse-fail/string16.wat.err":"4274b3bbe4df4cf0373619b1fcd082d0c802990817d2aca26ed885168c80e489","tests/parse-fail/string2.wat":"1172964aed31537b8c466d1f045f3e756926e7b221f80b2aff4a9a6721ea0beb","tests/parse-fail/string2.wat.err":"4618d3b20a78a077337eb5d6cae14ac39d9853762f011fbd23cff8921618dbde","tests/parse-fail/string3.wat":"07e0fbcd6270c1db100917c151ee4ac3f935e4ee1b27bce3c453b22b4b74f4d6","tests/parse-fail/string3.wat.err":"08ffc6158a9e030b2e211d53bdb8aeacfd879815c7b284d6a83b030566e35928","tests/parse-fail/string4.wat":"c970da2051b0613bdd1de4664f10424e14f2ebabe604175d4fb9b763b37af577","tests/parse-fail/string4.wat.err":"406706594d305c560fabd66417ad4fc276939990b5e701bd9d13fc223d207219","tests/parse-fail/string5.wat":"386cf314bb05acdaaabdf4da1caf140167271a26bd08bf34c3a7427d4bc4431f","tests/parse-fail/string5.wat.err":"1e56b44a23a37b2b2ad05aa9dd7e1e18191b5cc22151f93bbcf9d618779a57bd","tests/parse-fail/string6.wat":"8f1fe2825ff96f2acee9130a7721f86fcc93c221baa9411bf1fb6f0870d38ccb","tests/parse-fail/string6.wat.err":"d55dfd84d94e893f167ae73b7a080aefb2bfb05cc8a1ec201c4d3066fb8549b4","tests/parse-fail/string7.wat":"b12f8c75313d7f834489d3c353422f90bc945b37139586446eda82e334a97cde","tests/parse-fail/string7.wat.err":"4cee0ca61992c249dd0faaf2529a073cf8deeb36111a3f69b43695e5682560a2","tests/parse-fail/string8.wat":"4c2e0e1f883bb4e8cba9313497ed792130e5848e62bde7716102788d7467be10","tests/parse-fail/string8.wat.err":"840c6def7c60dd7c2b7261549cab435ba78c9b3a937adf6d5d9595ff8af01c91","tests/parse-fail/string9.wat":"2b7670caed2b0688d535de6e4e416f35fa717cfbe096a6cc764a669085c8f52f","tests/parse-fail/string9.wat.err":"37b5a9c3af9631500f31f9e5e3efa821b8d96063c57d60fd01df6be6a5c323e1","tests/parse-fail/unbalanced.wat":"f664fbef53a0308f864ba496d38044eb90482636e32586512939d4930729f3fe","tests/parse-fail/unbalanced.wat.err":"aba579f7b836856e69afe05da8328aabe0643d94e369898e686aa7bb0b07e9c9","tests/recursive.rs":"ad8a2b07bf955121a7c9e326ed35f9b2bc56b440c8cc0bbde24d423a79945c1a"},"package":"4f79a9d9df79986a68689a6b40bcc8d5d40d807487b235bebc2ac69a242b54a1"} \ No newline at end of file -+{"files":{"Cargo.toml":"3e223e7ed5faa9b3eaf4893e03596e1e40688df9dc2e0863fc3c44e443d88ef9","LICENSE":"268872b9816f90fd8e85db5a28d33f8150ebb8dd016653fb39ef1f94f2686bc5","README.md":"5a0d2b894a3ac74ee2be74715a2f22c40a08520cb4ac59183f4e7356f34ac566","src/component.rs":"23a62f4f2774ccfaf60f68e9d9416e68ba203eea782ce0c39cf553ad293f1df4","src/component/alias.rs":"5ec26333e179dc3778dead489f1273815fe9c1c808ba6a7e60eff54072fad795","src/component/binary.rs":"310940e2c455129c5e2a4219e64fca51121755818269306f943792216810c8b2","src/component/component.rs":"0c49ff1c1c4b8fe6d330eb41bce8ad176c7208c4178090b7325e9994e83c1f20","src/component/custom.rs":"f5b23c34b73a716a986fd999fc8d8c9e24c341e83292088fe83325cd82dab4f5","src/component/expand.rs":"71b2e23f50957b4a15d758df7f8651fdbaf5cf8f44fbfeb134b412318dbd8921","src/component/export.rs":"f51e824c839d8bb0884eca509622f376c8cce3335be324b2b25033af6216fd2a","src/component/func.rs":"4f69de6c38cc6fe77b638ed7d8000c8a170d7053a11a6585dcd5b4877a06804c","src/component/import.rs":"ffe6e4ab8f2cec68b1022c753135d675ab27ecd1315bd38517472ceaffd0610c","src/component/instance.rs":"e550a7ee9af092ae084dd41e2c0ae756b7dca8da4b91d672d90265a6a15dff83","src/component/item_ref.rs":"e9c426ccc0210dc0c37bb0448468f5f4d9e52656b72d4ff0f2dc65c89957fe60","src/component/module.rs":"d27a28199d1dea1c64294a514329a524432319288515b0a0e3091fa7d3a33f74","src/component/resolve.rs":"6454c289407e9e0c904c4e27af0cc5a40fbcd9a0d874ac5a64475b08264d2f39","src/component/types.rs":"65b2250f147f8b132e7d13ee809cf72d4fa5ed26a55f1a35f1ef665421b7e750","src/component/wast.rs":"aa39db0ea0acd38744dc3cbd35903c9b00b5de90a5bfc8b76e6b6a7581d7c4c0","src/core.rs":"24b71d1ab2ad874c4e37b4dd709b6532989b60e6bc503194434f95029cc1cda7","src/core/binary.rs":"2e7e1145273582d149398991a26c8252a9b6e325be8c277ab597b3be581fc795","src/core/custom.rs":"edd6044b75d79ec873c28d803fb8dc9a53724f1bba474bcdef2bc77196e0a4d2","src/core/export.rs":"1322a120d9e1dd6f3aa1485ee0bbc4294961028ae8a7584a24170af5823b73b1","src/core/expr.rs":"e521d86433d30b0669a160a913e0638e3bb78d8233fa570173b75e04b56abe26","src/core/func.rs":"f87239645e45b7e40ecf7f8f2b707a7cfc0620cd2632cfdaca3cb155a06da732","src/core/global.rs":"dec0abecadd2fde9298acb729259deba1ef3c4733ae5afcb4fe8cd4a633f5349","src/core/import.rs":"602a13aed2fd5fa63e2562246586546199861df57f304c2906561ab77810cadd","src/core/memory.rs":"be4b5067c4febb0e5718186e59ffee69305b01801f3133730a9933e2e7193bc1","src/core/module.rs":"2b608a3cfee4df1ceeefaa046863dc964172bd6f52f6678d96078091fae7657a","src/core/resolve/deinline_import_export.rs":"696b58d4b4267210e6453b7617c521b57f8c768970b740665c5b475575fc2160","src/core/resolve/mod.rs":"9b2680b00a1cafad2dbbfdac86aa1c135ea67203bbc4dee939302b27f4aff6d0","src/core/resolve/names.rs":"d869983d60e36b432a38edf60f53900f230cc5ab6248d3368ced229e69a259f0","src/core/resolve/types.rs":"6099b59c44aec7879996d6cdcb0d0ac2e25991a52291c5b15ab23b8d7e07cde9","src/core/table.rs":"6b611622d7d4f83cbe8e1a82139937c0294996d5f8208ade0886d680d8ef0b5d","src/core/tag.rs":"8a3d4fcdb86dedd68cdaf25abd930ef52a461cf2a0e9393bb9cb6f425afaaf2e","src/core/types.rs":"1d4afbeb9ed8a465d9c727e5bdc5be798216505fc4034d3fef64859808ff6e0a","src/core/wast.rs":"dda114d05e1b1fcf65a1ca6124786261cf0b885eb61ad10ab258f80ff6dd2c2e","src/encode.rs":"0b165176db54fb9136202c54180adabda843a88e5436b96c19be9d41623912a3","src/error.rs":"4526260299c7983696a49ffe30a80139beb0d081fa8f42decc5e3283b361b1cb","src/gensym.rs":"b5e02e34443085f01deb5b657e541be7dc5d6dc952304e434a0b08320ea6c185","src/lexer.rs":"bc65c4d71c6f16a55670585a31ee615c9fcfc40a4bfa165e020ed03a9a27930d","src/lib.rs":"bcf1814d97dca75bbd6f49123f5811472a3ca1e93788dfe23cb079804e9294d0","src/names.rs":"81d49fecbff3b2abbbc323595271f32d912f03cd55a5685b7216d7cead32c420","src/parser.rs":"fe6a3727c68c8075c38422de545eb189fd8f5747ca681f6704982ed5c8ea4476","src/token.rs":"292d0cc8871990ba7a757d49edcbe5a9c94c346131f10df2ce517789f25e7fd8","src/wast.rs":"692dc20c1912acd2ed1db7427d305a5c9eab31dfc8675f037ffc475b6db15d58","src/wat.rs":"2ff97b6af77da19b0a8e0dfd136f58dbfa8247896c476726d1c9f88a3630cac2","tests/annotations.rs":"06294077550600f93a5a8c0d7e3ac38b47f00bb8933f9dc390ff31868e873afb","tests/comments.rs":"694e8a3467e9c837f723a43c729be0c6f6dfe3441ad9692759b1d55fd63055a2","tests/parse-fail.rs":"162023ac21f74ea856ec5916f4925a762d769b425eaf721c223c54b3efec6a53","tests/parse-fail/bad-core-func-alias.wat":"b71372064c3fce9d4a616418605040fe5e1356030a709b798b4769d3619cbbfb","tests/parse-fail/bad-core-func-alias.wat.err":"bb63274c26d3a21209bad794767f48372834bdc10cfbebf568a0c65d52803c90","tests/parse-fail/bad-func-alias.wat":"237c07149e1e74afe3b991a1fee6acb63167c1ca8931341614c435000339b887","tests/parse-fail/bad-func-alias.wat.err":"4a4bfc691b06d20fdf71e1dbac04649a52c76787048415599978987d761308fa","tests/parse-fail/bad-index.wat":"d21489daeec3a35327dcc9e2ba2d0acdd05f4aeaff2272cca608fda4d2338497","tests/parse-fail/bad-index.wat.err":"dc11070de0c9160573006ea4e5fa3c4d28e71bc39b24b1938cf6ff3b03ea7154","tests/parse-fail/bad-name.wat":"e5ff5d410007779a0de6609ea4cc693f0e603d36a106b8f5098c1980dd9f8124","tests/parse-fail/bad-name.wat.err":"fb5638476c1b85d9d1919e3dbcb0f16f82d088a4a22d4a0c186d7b8ba6e1902b","tests/parse-fail/bad-name2.wat":"5a6a4d0c19e5f2e48d7cebf361aca9b9000b7ef0c652997b5bd0ffaadbd2ca8a","tests/parse-fail/bad-name2.wat.err":"129707cce45f1e3cfb3e2ca5c702182e16ca5eeb2dbb2edd0710b004a8e194a5","tests/parse-fail/bad-name3.wat":"c19133d738cc84e9174301f27d4050c216bda81c7e9918d03ac792b088f24a05","tests/parse-fail/bad-name3.wat.err":"84ea63d40a619a0782ec6e94fce63921188ab87b1c3875eacae0a371144ed83a","tests/parse-fail/block1.wat":"91e74b5c3b43be692e7a6ae74fbfa674c4b6197299eb61338c4eccf282b18f17","tests/parse-fail/block1.wat.err":"40a083ae496b41dee7002cc6a664c5db0c5e4d904ae03b815773a769c4493fca","tests/parse-fail/block2.wat":"a8c07b4c09d51f10a8ffdf19806586022552398701cd90eb6d09816d45df06e5","tests/parse-fail/block2.wat.err":"33c842ec5dd0f2fdd3a9ce8187dd98b45ceee48c12810802af809d05b9cd25e9","tests/parse-fail/block3.wat":"29739abfbabd7c55f00ddfbbb9ebd818b4a114ef2336d50514f0842f7e075905","tests/parse-fail/block3.wat.err":"fc667ae2e71a260f62a3c7393bc97272e7c0ff38b17594f4370847b8a5019060","tests/parse-fail/inline1.wat":"4e9767d67207aace2ac5e6f63a30e7510e4aa245ba35420539509e2254470272","tests/parse-fail/inline1.wat.err":"0143017a9825e518baa6009bae2c8d63520051dedd3437705bbe36b038a57f41","tests/parse-fail/newline-in-string.wat":"5c01cf709544ade0a6cdfcc39a3836a3bc018b633dc42a6cd872b6defc763ea7","tests/parse-fail/newline-in-string.wat.err":"1504209cc37a78b2aee778f23eacf78606daf964cf7bff251f5700efcd27ffd7","tests/parse-fail/string1.wat":"620d46d585ce94b382b5fde628c1399f3e562014b7a44af46e92f7bd045ca86e","tests/parse-fail/string1.wat.err":"fc53f3a1c4a65d8f25e5af51dec7699f45cecba114ca9c7871781bc70f664320","tests/parse-fail/string10.wat":"f7409dd45e153a1b11cb23e38f4ed87da12bedde38f8f0ccfe91037b0a4d97bd","tests/parse-fail/string10.wat.err":"ce677db5e37e0ed81ca357ed6b5edb21d85c27303ee194855bea7a88457efb6a","tests/parse-fail/string11.wat":"f6e0400b8c6a2014efa1ac676c567e140d8f86b5f4d5129773e6d67af537b615","tests/parse-fail/string11.wat.err":"4c6a550d29eda38a4e1bf7a589596f11655dc779479d7b8d466cfc53f815a742","tests/parse-fail/string12.wat":"23e30070eef22271651cce096a801fc4f79f3c37343c88bb8d2fc99b32d3b8b9","tests/parse-fail/string12.wat.err":"b5ec59f2996b88b2ee157e22d1774dc3e36fc08ed5bfc621aea830d30f66f586","tests/parse-fail/string13.wat":"81a305b981159ee10e140749ea3220c9edaaff53605e63c21995de47382b5faf","tests/parse-fail/string13.wat.err":"959f26c6b54e0d367b51d11d1addd8a53b5b8ff3caf70ebdd46bbea8ccfa2418","tests/parse-fail/string14.wat":"c45c2cc9f7afbfbd4be8e513106d22f7e5e817091448576c6bdf0701b81d95dd","tests/parse-fail/string14.wat.err":"50b5bccba905ddbe275938edb7ed0b09a5ca53dcdad36a7ff736ce9bc8e7a338","tests/parse-fail/string15.wat":"b5e0d5ade40de53b2d767a132e28376bb8c7a6f6238c4d8c248ae717c41d7f1f","tests/parse-fail/string15.wat.err":"0e9fc502cc90f96d1f592a3f63369fd2a3574bc4a2345a70365dbb76804e870f","tests/parse-fail/string16.wat":"38c3688cee80a9d089d239aa06eb1d27c5364ad2bd270aca57d05997c20aa682","tests/parse-fail/string16.wat.err":"4274b3bbe4df4cf0373619b1fcd082d0c802990817d2aca26ed885168c80e489","tests/parse-fail/string2.wat":"1172964aed31537b8c466d1f045f3e756926e7b221f80b2aff4a9a6721ea0beb","tests/parse-fail/string2.wat.err":"4618d3b20a78a077337eb5d6cae14ac39d9853762f011fbd23cff8921618dbde","tests/parse-fail/string3.wat":"07e0fbcd6270c1db100917c151ee4ac3f935e4ee1b27bce3c453b22b4b74f4d6","tests/parse-fail/string3.wat.err":"08ffc6158a9e030b2e211d53bdb8aeacfd879815c7b284d6a83b030566e35928","tests/parse-fail/string4.wat":"c970da2051b0613bdd1de4664f10424e14f2ebabe604175d4fb9b763b37af577","tests/parse-fail/string4.wat.err":"406706594d305c560fabd66417ad4fc276939990b5e701bd9d13fc223d207219","tests/parse-fail/string5.wat":"386cf314bb05acdaaabdf4da1caf140167271a26bd08bf34c3a7427d4bc4431f","tests/parse-fail/string5.wat.err":"1e56b44a23a37b2b2ad05aa9dd7e1e18191b5cc22151f93bbcf9d618779a57bd","tests/parse-fail/string6.wat":"8f1fe2825ff96f2acee9130a7721f86fcc93c221baa9411bf1fb6f0870d38ccb","tests/parse-fail/string6.wat.err":"d55dfd84d94e893f167ae73b7a080aefb2bfb05cc8a1ec201c4d3066fb8549b4","tests/parse-fail/string7.wat":"b12f8c75313d7f834489d3c353422f90bc945b37139586446eda82e334a97cde","tests/parse-fail/string7.wat.err":"4cee0ca61992c249dd0faaf2529a073cf8deeb36111a3f69b43695e5682560a2","tests/parse-fail/string8.wat":"4c2e0e1f883bb4e8cba9313497ed792130e5848e62bde7716102788d7467be10","tests/parse-fail/string8.wat.err":"840c6def7c60dd7c2b7261549cab435ba78c9b3a937adf6d5d9595ff8af01c91","tests/parse-fail/string9.wat":"2b7670caed2b0688d535de6e4e416f35fa717cfbe096a6cc764a669085c8f52f","tests/parse-fail/string9.wat.err":"37b5a9c3af9631500f31f9e5e3efa821b8d96063c57d60fd01df6be6a5c323e1","tests/parse-fail/unbalanced.wat":"f664fbef53a0308f864ba496d38044eb90482636e32586512939d4930729f3fe","tests/parse-fail/unbalanced.wat.err":"aba579f7b836856e69afe05da8328aabe0643d94e369898e686aa7bb0b07e9c9","tests/recursive.rs":"ad8a2b07bf955121a7c9e326ed35f9b2bc56b440c8cc0bbde24d423a79945c1a"},"package":"441a6a195b3b5245e26d450bbcc91366c6b652382a22f63cbe3c73240e13b2bb"} diff --git a/thunderbird-adapt-ml-dsa-support-to-rhel-nss.patch b/thunderbird-adapt-ml-dsa-support-to-rhel-nss.patch new file mode 100644 index 0000000..fc1a42f --- /dev/null +++ b/thunderbird-adapt-ml-dsa-support-to-rhel-nss.patch @@ -0,0 +1,59 @@ +diff --git a/security/nss/lib/mozpkix/lib/pkixnss.cpp b/security/nss/lib/mozpkix/lib/pkixnss.cpp +index 31aa1ddd67..93ab402bfd 100644 +--- a/security/nss/lib/mozpkix/lib/pkixnss.cpp ++++ b/security/nss/lib/mozpkix/lib/pkixnss.cpp +@@ -303,6 +303,28 @@ DigestBufNSS(Input item, + return Success; + } + ++static SECOidTag ++findOIDByName(const char *cipherString) ++{ ++ SECOidTag tag; ++ SECOidData *oid; ++ ++ for (int i = 1; ; i++) { ++ SECOidTag tag = static_cast(i); ++ oid = SECOID_FindOIDByTag(tag); ++ ++ if (oid == NULL) { ++ break; ++ } ++ ++ if (strcasecmp(oid->desc, cipherString) == 0) { ++ return tag; ++ } ++ } ++ ++ return SEC_OID_UNKNOWN; ++} ++ + Result + VerifyMLDSASignedDataNSS(Input data, + Input signature, +@@ -323,17 +345,14 @@ VerifyMLDSASignedDataNSS(Input data, + SECItem dataItem(UnsafeMapInputToSECItem(data)); + CK_MECHANISM_TYPE mechanism; + +- switch (pubk->u.mldsa.paramSet) { +- case SEC_OID_ML_DSA_44: +- case SEC_OID_ML_DSA_65: +- case SEC_OID_ML_DSA_87: +- mechanism = CKM_ML_DSA; +- signaturePolicyTag = pubk->u.mldsa.paramSet; +- hashPolicyTag = SEC_OID_UNKNOWN; +- break; +- default: +- return Result::ERROR_UNSUPPORTED_KEYALG; +- break; ++ if (pubk->u.mldsa.params == findOIDByName("ML-DSA-44") || ++ pubk->u.mldsa.params == findOIDByName("ML-DSA-65") || ++ pubk->u.mldsa.params == findOIDByName("ML-DSA-87")) { ++ hashPolicyTag = SEC_OID_UNKNOWN; ++ mechanism = CKM_ML_DSA; ++ signaturePolicyTag = pubk->u.mldsa.params; ++ } else { ++ return Result::ERROR_UNSUPPORTED_KEYALG; + } + + SECOidTag policyTags[2] = {signaturePolicyTag, hashPolicyTag}; diff --git a/thunderbird-add-ml-dsa-certificate-support-to-certviewer.patch b/thunderbird-add-ml-dsa-certificate-support-to-certviewer.patch new file mode 100644 index 0000000..a61d2b3 --- /dev/null +++ b/thunderbird-add-ml-dsa-certificate-support-to-certviewer.patch @@ -0,0 +1,323 @@ +diff --git a/toolkit/components/certviewer/content/certDecoder.mjs b/toolkit/components/certviewer/content/certDecoder.mjs +--- a/toolkit/components/certviewer/content/certDecoder.mjs ++++ b/toolkit/components/certviewer/content/certDecoder.mjs +@@ -5,10 +5,11 @@ + import { + Certificate, + ECNamedCurves, + ECPublicKey, + RSAPublicKey, ++ MLDSAPublicKey, + } from "./vendor/pkijs.js"; + + const getTimeZone = () => { + let timeZone = new Date().toString().match(/\(([A-Za-z\s].*)\)/); + if (timeZone === null) { +@@ -45,10 +46,19 @@ + x, // x coordinate + y, // y coordinate + xy: `04:${x}:${y}`, // 04 (uncompressed) public key + }; + } ++ if (publicKey instanceof MLDSAPublicKey) { ++ let keyHex = publicKey.rhoT1.valueBlock.valueHex; ++ let keyBytes = new Uint8Array(keyHex); ++ return { ++ kty: publicKey.alg, ++ keysize: keyBytes.length, ++ rhoT1: hashify(keyHex), ++ }; ++ } + return { kty: "Unknown" }; + }; + + const getX509Ext = (extensions, v) => { + for (var extension in extensions) { +@@ -1132,10 +1142,13 @@ + "2.16.840.1.101.3.4.3.2": "DSA with SHA-256", + "1.2.840.10045.4.1": "ECDSA with SHA-1", + "1.2.840.10045.4.3.2": "ECDSA with SHA-256", + "1.2.840.10045.4.3.3": "ECDSA with SHA-384", + "1.2.840.10045.4.3.4": "ECDSA with SHA-512", ++ "2.16.840.1.101.3.4.3.17": "ML-DSA-44", ++ "2.16.840.1.101.3.4.3.18": "ML-DSA-65", ++ "2.16.840.1.101.3.4.3.19": "ML-DSA-87", + }, + + aia: { + "1.3.6.1.5.5.7.48.1": "Online Certificate Status Protocol (OCSP)", + "1.3.6.1.5.5.7.48.2": "CA Issuers", +diff --git a/toolkit/components/certviewer/content/certviewer.mjs b/toolkit/components/certviewer/content/certviewer.mjs +--- a/toolkit/components/certviewer/content/certviewer.mjs ++++ b/toolkit/components/certviewer/content/certviewer.mjs +@@ -74,10 +74,23 @@ + } + } + return result ? result : false; + }; + ++const getMLDSASecurityLevel = signatureName => { ++ switch (signatureName) { ++ case "ML-DSA-44": ++ return "Level 2 (NIST)"; ++ case "ML-DSA-65": ++ return "Level 3 (NIST)"; ++ case "ML-DSA-87": ++ return "Level 5 (NIST)"; ++ default: ++ return null; ++ } ++}; ++ + export const adjustCertInformation = cert => { + let certItems = []; + let tabName = cert?.subject?.cn || ""; + if (cert && !tabName) { + // No common name, use the value of the last item in the cert's entries. +@@ -173,10 +186,15 @@ + createEntryItem("key-size", cert.subjectPublicKeyInfo.keysize), + createEntryItem("curve", cert.subjectPublicKeyInfo.crv), + createEntryItem("public-value", cert.subjectPublicKeyInfo.xy, true), + createEntryItem("exponent", cert.subjectPublicKeyInfo.e), + createEntryItem("modulus", cert.subjectPublicKeyInfo.n, true), ++ createEntryItem( ++ "mldsa-public-value", ++ cert.subjectPublicKeyInfo.rhoT1, ++ true ++ ), + ].filter(elem => elem != null); + } + return items; + }, + certItems, +@@ -190,14 +208,23 @@ + createEntryItem("serial-number", cert.serialNumber, true), + createEntryItem( + "signature-algorithm", + cert.signature ? cert.signature.name : null + ), ++ ]; ++ ++ const secLvl = getMLDSASecurityLevel(cert.signature?.name); ++ if (secLvl) { ++ items.push(createEntryItem("security-level", secLvl)); ++ } ++ ++ items.push( + createEntryItem("version", cert.version), +- createEntryItem("download", cert.files ? cert.files.pem : null), +- ].filter(elem => elem != null); +- return items; ++ createEntryItem("download", cert.files ? cert.files.pem : null) ++ ); ++ ++ return items.filter(elem => elem != null); + }, + certItems, + "miscellaneous", + false + ); +diff --git a/toolkit/components/certviewer/content/vendor/pkijs.js b/toolkit/components/certviewer/content/vendor/pkijs.js +--- a/toolkit/components/certviewer/content/vendor/pkijs.js ++++ b/toolkit/components/certviewer/content/vendor/pkijs.js +@@ -8609,10 +8609,90 @@ + this.publicExponent = new Integer({ valueHex: stringToArrayBuffer(fromBase64(json.e, true)).slice(0, 3) }); + } + } + RSAPublicKey.CLASS_NAME = "RSAPublicKey"; + ++/* @see https://www.ietf.org/archive/id/draft-ietf-lamps-dilithium-certificates-11.html */ ++const RHO_T1 = "rhoT1"; ++const ALG = "alg"; ++const CLEAR_PROPS_MLDSA = [RHO_T1, ALG]; ++const MLDSA_MIN_LENGTH = 32; ++class MLDSAPublicKey extends PkiObject { ++ constructor(parameters = {}) { ++ super(); ++ ++ this.rhoT1 = getParametersValue(parameters, RHO_T1, MLDSAPublicKey.defaultValues(RHO_T1)); ++ this.alg = getParametersValue(parameters, ALG, MLDSAPublicKey.defaultValues(ALG)); ++ ++ if (parameters.json) { ++ this.fromJSON(parameters.json); ++ } ++ ++ if (parameters.schema) { ++ this.fromSchema(parameters.schema); ++ } ++ } ++ ++ static defaultValues(memberName) { ++ switch (memberName) { ++ case RHO_T1: ++ return new BitString(); ++ case ALG: ++ return ""; ++ default: ++ return super.defaultValues(memberName); ++ } ++ } ++ ++ static schema(parameters = {}) { ++ const names = getParametersValue(parameters, "names", {}); ++ return new BitString({ name: names.rhoT1 || RHO_T1 }); ++ } ++ ++ fromSchema(schema) { ++ clearProps(schema, CLEAR_PROPS_MLDSA); ++ ++ const asn1 = compareSchema(schema, schema, MLDSAPublicKey.schema({ ++ names: { rhoT1: RHO_T1 } ++ })); ++ ++ AsnError.assertSchema(asn1, this.className); ++ ++ const bitString = asn1.result.rhoT1; ++ const length = bitString.valueBlock.valueHexView.length; ++ ++ if (length < MLDSA_MIN_LENGTH || (length - MLDSA_MIN_LENGTH) % 320 !== 0) { ++ throw new Error(`Invalid ML-DSA key length: ${length} bytes`); ++ } ++ ++ this.rhoT1 = bitString; ++ } ++ ++ toSchema() { ++ return this.rhoT1; ++ } ++ ++ toJSON() { ++ return { ++ rhoT1: Convert.ToBase64Url(this.rhoT1.valueBlock.valueHexView), ++ alg: this.alg ++ }; ++ } ++ ++ fromJSON(json) { ++ ParameterError.assert("json", json, "rhoT1"); ++ const rawBuffer = stringToArrayBuffer(fromBase64(json.rhoT1, true)); ++ ++ if (rawBuffer.byteLength < MLDSA_MIN_LENGTH || (rawBuffer.byteLength - MLDSA_MIN_LENGTH) % 320 !== 0) { ++ throw new Error(`Invalid ML-DSA key length: ${rawBuffer.byteLength} bytes`); ++ } ++ ++ this.rhoT1 = new BitString({ valueHex: rawBuffer }); ++ } ++} ++MLDSAPublicKey.CLASS_NAME = "MLDSAPublicKey"; ++ + const ALGORITHM$1 = "algorithm"; + const SUBJECT_PUBLIC_KEY = "subjectPublicKey"; + const CLEAR_PROPS$1a = [ALGORITHM$1, SUBJECT_PUBLIC_KEY]; + class PublicKeyInfo extends PkiObject { + constructor(parameters = {}) { +@@ -8657,10 +8737,22 @@ + catch (ex) { + } + } + } + break; ++ case "2.16.840.1.101.3.4.3.17": ++ /* Already a bitstring */ ++ this._parsedKey = new MLDSAPublicKey({ rhoT1: this.subjectPublicKey, alg: "ML-DSA-44" }); ++ break; ++ case "2.16.840.1.101.3.4.3.18": ++ /* Already a bitstring */ ++ this._parsedKey = new MLDSAPublicKey({ rhoT1: this.subjectPublicKey, alg: "ML-DSA-65" }); ++ break; ++ case "2.16.840.1.101.3.4.3.19": ++ /* Already a bitstring */ ++ this._parsedKey = new MLDSAPublicKey({ rhoT1: this.subjectPublicKey, alg: "ML-DSA-87" }); ++ break; + } + this._parsedKey || (this._parsedKey = null); + } + return this._parsedKey || undefined; + } +@@ -8724,10 +8816,19 @@ + jwk.kty = "EC"; + break; + case "1.2.840.113549.1.1.1": + jwk.kty = "RSA"; + break; ++ case "2.16.840.1.101.3.4.3.17": ++ jwk.kty = "ML-DSA-44"; ++ break; ++ case "2.16.840.1.101.3.4.3.18": ++ jwk.kty = "ML-DSA-65"; ++ break; ++ case "2.16.840.1.101.3.4.3.19": ++ jwk.kty = "ML-DSA-87"; ++ break; + } + const publicKeyJWK = this.parsedKey.toJSON(); + Object.assign(jwk, publicKeyJWK); + return jwk; + } +@@ -8746,10 +8847,31 @@ + this.algorithm = new AlgorithmIdentifier({ + algorithmId: "1.2.840.113549.1.1.1", + algorithmParams: new Null() + }); + break; ++ case "ML-DSA-44": ++ this.parsedKey = new MLDSAPublicKey({ json }); ++ this.algorithm = new AlgorithmIdentifier({ ++ algorithmId: "2.16.840.1.101.3.4.3.17", ++ algorithmParams: new Null() ++ }); ++ break; ++ case "ML-DSA-65": ++ this.parsedKey = new MLDSAPublicKey({ json }); ++ this.algorithm = new AlgorithmIdentifier({ ++ algorithmId: "2.16.840.1.101.3.4.3.18", ++ algorithmParams: new Null() ++ }); ++ break; ++ case "ML-DSA-87": ++ this.parsedKey = new MLDSAPublicKey({ json }); ++ this.algorithm = new AlgorithmIdentifier({ ++ algorithmId: "2.16.840.1.101.3.4.3.19", ++ algorithmParams: new Null() ++ }); ++ break; + default: + throw new Error(`Invalid value for "kty" parameter: ${json.kty}`); + } + this.subjectPublicKey = new BitString({ valueHex: this.parsedKey.toSchema().toBER(false) }); + } +@@ -24078,6 +24200,6 @@ + } + } + + initCryptoEngine(); + +-export { AbstractCryptoEngine, AccessDescription, Accuracy, AlgorithmIdentifier, AltName, ArgumentError, AsnError, AttCertValidityPeriod, Attribute, AttributeCertificateInfoV1, AttributeCertificateInfoV2, AttributeCertificateV1, AttributeCertificateV2, AttributeTypeAndValue, AuthenticatedSafe, AuthorityKeyIdentifier, BasicConstraints, BasicOCSPResponse, CAVersion, CRLBag, CRLDistributionPoints, CertBag, CertID, Certificate, CertificateChainValidationEngine, CertificatePolicies, CertificateRevocationList, CertificateSet, CertificateTemplate, CertificationRequest, ChainValidationCode, ChainValidationError, ContentInfo, CryptoEngine, DigestInfo, DistributionPoint, ECCCMSSharedInfo, ECNamedCurves, ECPrivateKey, ECPublicKey, EncapsulatedContentInfo, EncryptedContentInfo, EncryptedData, EnvelopedData, ExtKeyUsage, Extension, ExtensionValueFactory, Extensions, GeneralName, GeneralNames, GeneralSubtree, HASHED_MESSAGE, HASH_ALGORITHM, Holder, InfoAccess, IssuerAndSerialNumber, IssuerSerial, IssuingDistributionPoint, KEKIdentifier, KEKRecipientInfo, KeyAgreeRecipientIdentifier, KeyAgreeRecipientInfo, KeyBag, KeyTransRecipientInfo, MICROS, MILLIS, MacData, MessageImprint, NameConstraints, OCSPRequest, OCSPResponse, ObjectDigestInfo, OriginatorIdentifierOrKey, OriginatorInfo, OriginatorPublicKey, OtherCertificateFormat, OtherKeyAttribute, OtherPrimeInfo, OtherRecipientInfo, OtherRevocationInfoFormat, PBES2Params, PBKDF2Params, PFX, PKCS8ShroudedKeyBag, PKIStatus, PKIStatusInfo, POLICY_IDENTIFIER, POLICY_QUALIFIERS, ParameterError, PasswordRecipientinfo, PkiObject, PolicyConstraints, PolicyInformation, PolicyMapping, PolicyMappings, PolicyQualifierInfo, PrivateKeyInfo, PrivateKeyUsagePeriod, PublicKeyInfo, QCStatement, QCStatements, RDN, RSAESOAEPParams, RSAPrivateKey, RSAPublicKey, RSASSAPSSParams, RecipientEncryptedKey, RecipientEncryptedKeys, RecipientIdentifier, RecipientInfo, RecipientKeyIdentifier, RelativeDistinguishedNames, Request, ResponseBytes, ResponseData, RevocationInfoChoices, RevokedCertificate, SECONDS, SafeBag, SafeBagValueFactory, SafeContents, SecretBag, Signature, SignedAndUnsignedAttributes, SignedCertificateTimestamp, SignedCertificateTimestampList, SignedData, SignedDataVerifyError, SignerInfo, SingleResponse, SubjectDirectoryAttributes, TBSRequest, TSTInfo, TYPE$4 as TYPE, TYPE_AND_VALUES, Time, TimeStampReq, TimeStampResp, TimeType, V2Form, VALUE$5 as VALUE, VALUE_BEFORE_DECODE, checkCA, createCMSECDSASignature, createECDSASignatureFromCMS, engine, getAlgorithmByOID, getAlgorithmParameters, getCrypto, getEngine, getHashAlgorithm, getOIDByAlgorithm, getRandomValues, id_AnyPolicy, id_AuthorityInfoAccess, id_AuthorityKeyIdentifier, id_BaseCRLNumber, id_BasicConstraints, id_CRLBag_X509CRL, id_CRLDistributionPoints, id_CRLNumber, id_CRLReason, id_CertBag_AttributeCertificate, id_CertBag_SDSICertificate, id_CertBag_X509Certificate, id_CertificateIssuer, id_CertificatePolicies, id_ContentType_Data, id_ContentType_EncryptedData, id_ContentType_EnvelopedData, id_ContentType_SignedData, id_ExtKeyUsage, id_FreshestCRL, id_InhibitAnyPolicy, id_InvalidityDate, id_IssuerAltName, id_IssuingDistributionPoint, id_KeyUsage, id_MicrosoftAppPolicies, id_MicrosoftCaVersion, id_MicrosoftCertTemplateV1, id_MicrosoftCertTemplateV2, id_MicrosoftPrevCaCertHash, id_NameConstraints, id_PKIX_OCSP_Basic, id_PolicyConstraints, id_PolicyMappings, id_PrivateKeyUsagePeriod, id_QCStatements, id_SignedCertificateTimestampList, id_SubjectAltName, id_SubjectDirectoryAttributes, id_SubjectInfoAccess, id_SubjectKeyIdentifier, id_ad, id_ad_caIssuers, id_ad_ocsp, id_eContentType_TSTInfo, id_pkix, id_sha1, id_sha256, id_sha384, id_sha512, kdf, setEngine, stringPrep, verifySCTsForCertificate }; ++export { AbstractCryptoEngine, AccessDescription, Accuracy, AlgorithmIdentifier, AltName, ArgumentError, AsnError, AttCertValidityPeriod, Attribute, AttributeCertificateInfoV1, AttributeCertificateInfoV2, AttributeCertificateV1, AttributeCertificateV2, AttributeTypeAndValue, AuthenticatedSafe, AuthorityKeyIdentifier, BasicConstraints, BasicOCSPResponse, CAVersion, CRLBag, CRLDistributionPoints, CertBag, CertID, Certificate, CertificateChainValidationEngine, CertificatePolicies, CertificateRevocationList, CertificateSet, CertificateTemplate, CertificationRequest, ChainValidationCode, ChainValidationError, ContentInfo, CryptoEngine, DigestInfo, DistributionPoint, ECCCMSSharedInfo, ECNamedCurves, ECPrivateKey, ECPublicKey, EncapsulatedContentInfo, EncryptedContentInfo, EncryptedData, EnvelopedData, ExtKeyUsage, Extension, ExtensionValueFactory, Extensions, GeneralName, GeneralNames, GeneralSubtree, HASHED_MESSAGE, HASH_ALGORITHM, Holder, InfoAccess, IssuerAndSerialNumber, IssuerSerial, IssuingDistributionPoint, KEKIdentifier, KEKRecipientInfo, KeyAgreeRecipientIdentifier, KeyAgreeRecipientInfo, KeyBag, KeyTransRecipientInfo, MICROS, MILLIS, MacData, MessageImprint, NameConstraints, OCSPRequest, OCSPResponse, ObjectDigestInfo, OriginatorIdentifierOrKey, OriginatorInfo, OriginatorPublicKey, OtherCertificateFormat, OtherKeyAttribute, OtherPrimeInfo, OtherRecipientInfo, OtherRevocationInfoFormat, PBES2Params, PBKDF2Params, PFX, PKCS8ShroudedKeyBag, PKIStatus, PKIStatusInfo, POLICY_IDENTIFIER, POLICY_QUALIFIERS, ParameterError, PasswordRecipientinfo, PkiObject, PolicyConstraints, PolicyInformation, PolicyMapping, PolicyMappings, PolicyQualifierInfo, PrivateKeyInfo, PrivateKeyUsagePeriod, PublicKeyInfo, QCStatement, QCStatements, RDN, RSAESOAEPParams, RSAPrivateKey, RSAPublicKey, RSASSAPSSParams, RecipientEncryptedKey, RecipientEncryptedKeys, RecipientIdentifier, RecipientInfo, RecipientKeyIdentifier, RelativeDistinguishedNames, Request, ResponseBytes, ResponseData, RevocationInfoChoices, RevokedCertificate, SECONDS, SafeBag, SafeBagValueFactory, SafeContents, SecretBag, Signature, SignedAndUnsignedAttributes, SignedCertificateTimestamp, SignedCertificateTimestampList, SignedData, SignedDataVerifyError, SignerInfo, SingleResponse, SubjectDirectoryAttributes, TBSRequest, TSTInfo, TYPE$4 as TYPE, TYPE_AND_VALUES, Time, TimeStampReq, TimeStampResp, TimeType, V2Form, VALUE$5 as VALUE, VALUE_BEFORE_DECODE, checkCA, createCMSECDSASignature, createECDSASignatureFromCMS, engine, getAlgorithmByOID, getAlgorithmParameters, getCrypto, getEngine, getHashAlgorithm, getOIDByAlgorithm, getRandomValues, id_AnyPolicy, id_AuthorityInfoAccess, id_AuthorityKeyIdentifier, id_BaseCRLNumber, id_BasicConstraints, id_CRLBag_X509CRL, id_CRLDistributionPoints, id_CRLNumber, id_CRLReason, id_CertBag_AttributeCertificate, id_CertBag_SDSICertificate, id_CertBag_X509Certificate, id_CertificateIssuer, id_CertificatePolicies, id_ContentType_Data, id_ContentType_EncryptedData, id_ContentType_EnvelopedData, id_ContentType_SignedData, id_ExtKeyUsage, id_FreshestCRL, id_InhibitAnyPolicy, id_InvalidityDate, id_IssuerAltName, id_IssuingDistributionPoint, id_KeyUsage, id_MicrosoftAppPolicies, id_MicrosoftCaVersion, id_MicrosoftCertTemplateV1, id_MicrosoftCertTemplateV2, id_MicrosoftPrevCaCertHash, id_NameConstraints, id_PKIX_OCSP_Basic, id_PolicyConstraints, id_PolicyMappings, id_PrivateKeyUsagePeriod, id_QCStatements, id_SignedCertificateTimestampList, id_SubjectAltName, id_SubjectDirectoryAttributes, id_SubjectInfoAccess, id_SubjectKeyIdentifier, id_ad, id_ad_caIssuers, id_ad_ocsp, id_eContentType_TSTInfo, id_pkix, id_sha1, id_sha256, id_sha384, id_sha512, kdf, setEngine, stringPrep, verifySCTsForCertificate, MLDSAPublicKey }; +diff --git a/toolkit/locales/en-US/toolkit/about/certviewer.ftl b/toolkit/locales/en-US/toolkit/about/certviewer.ftl +--- a/toolkit/locales/en-US/toolkit/about/certviewer.ftl ++++ b/toolkit/locales/en-US/toolkit/about/certviewer.ftl +@@ -45,20 +45,22 @@ + certificate-viewer-organization = Organization + certificate-viewer-organizational-unit = Organizational Unit + certificate-viewer-policy = Policy + certificate-viewer-protocol = Protocol + certificate-viewer-public-value = Public Value ++certificate-viewer-mldsa-public-value = Public Value + certificate-viewer-purposes = Purposes + certificate-viewer-qualifier = Qualifier + certificate-viewer-qualifiers = Qualifiers + certificate-viewer-required = Required + certificate-viewer-unsupported = <unsupported> + # Inc. means Incorporated, e.g GitHub is incorporated in Delaware + certificate-viewer-inc-state-province = Inc. State/Province + certificate-viewer-state-province = State/Province + certificate-viewer-sha-1 = SHA-1 + certificate-viewer-sha-256 = SHA-256 ++certificate-viewer-security-level = Security Level + certificate-viewer-serial-number = Serial Number + certificate-viewer-signature-algorithm = Signature Algorithm + certificate-viewer-signature-scheme = Signature Scheme + certificate-viewer-timestamp = Timestamp + certificate-viewer-value = Value + diff --git a/thunderbird-add-mlkem768-secp256r1-support.patch b/thunderbird-add-mlkem768-secp256r1-support.patch new file mode 100644 index 0000000..bea8377 --- /dev/null +++ b/thunderbird-add-mlkem768-secp256r1-support.patch @@ -0,0 +1,190 @@ +diff --git a/comm/third_party/rust/neqo-crypto/.cargo-checksum.json b/comm/third_party/rust/neqo-crypto/.cargo-checksum.json +index 85f14fe2f4..b7af45a5de 100644 +--- a/comm/third_party/rust/neqo-crypto/.cargo-checksum.json ++++ b/comm/third_party/rust/neqo-crypto/.cargo-checksum.json +@@ -1 +1 @@ +-{"files":{"Cargo.toml":"a57adef48614a58209447e8bd115a2de3d8a42917a0b9a2ae9a97cabc3400c6a","bindings/bindings.toml":"e7e4b75736cfcf4d52febacb99a6f6c6c7b1d648ed8bdc424648be876c850e91","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"2f54f79958878ed7988441955344dd1a2a079b1bb409e8f12a70284fd7e351ef","min_version.txt":"0f9ddf9ddaeb5137a5ab3d238d06286822f9579b1f46ba76312a8c6d76176500","src/aead.rs":"08d7cad82e3bec32661cfd1689e6611b30ae328ec88481cb32201dd255777365","src/aead_null.rs":"a766e2f71fd8b77a8f81bc60aaaafcffb6aef1f0a1f39ea07fef45b3696718ce","src/agent.rs":"ec90d7556231c57da3a191f508eaf1f820f22d6b7912ee45d1a594eb0fea7a82","src/agentio.rs":"1baecfb725b54717a6a74bb4664692d187f62747cc5e0495f59b06729f96dea2","src/auth.rs":"7a1524bef0a0c71616f5ee8b3976d66201210b809271bcf5d06c0e560ae482af","src/cert.rs":"4fdaa3834d8a72f41198449010fd5c3f6be6a54e429427c37bde5aab9421585c","src/constants.rs":"50c1b84e06cd9a71bb9199f2518947a4d4ad3e5c33c1b86c585486dc43e872a0","src/ech.rs":"19d16af5a30e2060a8942a72487bd820c0d9c62ff1d3c490871752c56781c44b","src/err.rs":"4c7d0b46955b58aa9375210c2c5d24012056c3ad8a856b72d2c7c9542cc97046","src/exp.rs":"cd864fb5a61cd1472baa5b1d0951fc712753c22d21af83ebed09a01585f33b48","src/ext.rs":"a5676f8b9815cc7f6ed1da6fea091cf8754d8b80e90d37b726e905abe18930f8","src/hkdf.rs":"76c5abc8b2d6ee12d8a86cd730af2cf47a59b2fbfd3b8a635a1826636156794d","src/hp.rs":"6adf4ad78b5a065ab7310c69ad239eec156256043e2c185bf60b9d1f12ab1be4","src/lib.rs":"3ab979c264a909e663c5ef140cd57013180745b99937671c73a9003ca6347f41","src/min_version.rs":"c6e1f98b9f56db0622ac38c1be131c55acf4a0f09ed0d6283f4d6308e2d1301a","src/p11.rs":"49bcde067e55228dab483bd11b70dc29d40dc3c59fa60136daccb205dc468df0","src/prio.rs":"1858088afd2668e8fbff56959765b7d4df09342371b9282ade27bb4d7bd6ce69","src/replay.rs":"594ce92f368cbc5fb71ebfb62214f07d1e86df8e5ce94255d5593ffabb91cd03","src/result.rs":"5a76688787741de7a935dbbab4bcb917d481d1c9c50a34df7e510036feb3da17","src/secrets.rs":"5d85b1e15f47cd267fe70fa8ea7e4ebc4b07eab7713f451afeefcf15f146f8a5","src/selfencrypt.rs":"4f106465f582c38d3bb04cb5cbcbf65a349e3186784726d9f2bf511a4a4a35ee","src/ssl.rs":"04950bb534b5304eb417909a3a39ebaa9be234c7c13eacdc41c00a8edab1b09f","src/time.rs":"22989caf3dab85cfe955cc279fcca98a6df02d14fcd0e93cac7b39374b8b5763","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"fb95a2d5c86ce3fafcb127cd0a2a163e5ee70baf09b2c8483e4d1fb25644cee2","tests/ext.rs":"57af4e2df211fa8afdb73125d4344ef5c70c1ea4579107c3e6f5746308ee3e7b","tests/handshake.rs":"df8a901048268a390785e05e28cbc97b82e41e47d7eab2d5c0a57e434ca1adcf","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"7ee5d7290a3f61af67ad2c94670cba376027136370d9784948db655b7e00fe54","tests/init.rs":"3cfe8411ca31ad7dfb23822bb1570e1a5b2b334857173bdd7df086b65b81d95a","tests/selfencrypt.rs":"b65aed70e83dce660017159fc8a956d3b52e0807b590ad8d0a3a4265caa8c1fa"},"package":null} +\ No newline at end of file ++{"files":{"Cargo.toml":"a57adef48614a58209447e8bd115a2de3d8a42917a0b9a2ae9a97cabc3400c6a","bindings/bindings.toml":"e7e4b75736cfcf4d52febacb99a6f6c6c7b1d648ed8bdc424648be876c850e91","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"2f54f79958878ed7988441955344dd1a2a079b1bb409e8f12a70284fd7e351ef","min_version.txt":"0f9ddf9ddaeb5137a5ab3d238d06286822f9579b1f46ba76312a8c6d76176500","src/aead.rs":"08d7cad82e3bec32661cfd1689e6611b30ae328ec88481cb32201dd255777365","src/aead_null.rs":"a766e2f71fd8b77a8f81bc60aaaafcffb6aef1f0a1f39ea07fef45b3696718ce","src/agent.rs":"ec90d7556231c57da3a191f508eaf1f820f22d6b7912ee45d1a594eb0fea7a82","src/agentio.rs":"1baecfb725b54717a6a74bb4664692d187f62747cc5e0495f59b06729f96dea2","src/auth.rs":"7a1524bef0a0c71616f5ee8b3976d66201210b809271bcf5d06c0e560ae482af","src/cert.rs":"4fdaa3834d8a72f41198449010fd5c3f6be6a54e429427c37bde5aab9421585c","src/constants.rs":"fb3b6353c0ed4683a1489e7c730b480e8c1895800bd024376165f722d8211d47","src/ech.rs":"19d16af5a30e2060a8942a72487bd820c0d9c62ff1d3c490871752c56781c44b","src/err.rs":"4c7d0b46955b58aa9375210c2c5d24012056c3ad8a856b72d2c7c9542cc97046","src/exp.rs":"cd864fb5a61cd1472baa5b1d0951fc712753c22d21af83ebed09a01585f33b48","src/ext.rs":"a5676f8b9815cc7f6ed1da6fea091cf8754d8b80e90d37b726e905abe18930f8","src/hkdf.rs":"76c5abc8b2d6ee12d8a86cd730af2cf47a59b2fbfd3b8a635a1826636156794d","src/hp.rs":"6adf4ad78b5a065ab7310c69ad239eec156256043e2c185bf60b9d1f12ab1be4","src/lib.rs":"3ab979c264a909e663c5ef140cd57013180745b99937671c73a9003ca6347f41","src/min_version.rs":"c6e1f98b9f56db0622ac38c1be131c55acf4a0f09ed0d6283f4d6308e2d1301a","src/p11.rs":"49bcde067e55228dab483bd11b70dc29d40dc3c59fa60136daccb205dc468df0","src/prio.rs":"1858088afd2668e8fbff56959765b7d4df09342371b9282ade27bb4d7bd6ce69","src/replay.rs":"594ce92f368cbc5fb71ebfb62214f07d1e86df8e5ce94255d5593ffabb91cd03","src/result.rs":"5a76688787741de7a935dbbab4bcb917d481d1c9c50a34df7e510036feb3da17","src/secrets.rs":"5d85b1e15f47cd267fe70fa8ea7e4ebc4b07eab7713f451afeefcf15f146f8a5","src/selfencrypt.rs":"4f106465f582c38d3bb04cb5cbcbf65a349e3186784726d9f2bf511a4a4a35ee","src/ssl.rs":"04950bb534b5304eb417909a3a39ebaa9be234c7c13eacdc41c00a8edab1b09f","src/time.rs":"22989caf3dab85cfe955cc279fcca98a6df02d14fcd0e93cac7b39374b8b5763","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"fb95a2d5c86ce3fafcb127cd0a2a163e5ee70baf09b2c8483e4d1fb25644cee2","tests/ext.rs":"57af4e2df211fa8afdb73125d4344ef5c70c1ea4579107c3e6f5746308ee3e7b","tests/handshake.rs":"df8a901048268a390785e05e28cbc97b82e41e47d7eab2d5c0a57e434ca1adcf","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"7ee5d7290a3f61af67ad2c94670cba376027136370d9784948db655b7e00fe54","tests/init.rs":"3cfe8411ca31ad7dfb23822bb1570e1a5b2b334857173bdd7df086b65b81d95a","tests/selfencrypt.rs":"b65aed70e83dce660017159fc8a956d3b52e0807b590ad8d0a3a4265caa8c1fa"},"package":null} +\ No newline at end of file +diff --git a/comm/third_party/rust/neqo-crypto/src/constants.rs b/comm/third_party/rust/neqo-crypto/src/constants.rs +index c3cb109c6f..e0bdc5c3f4 100644 +--- a/comm/third_party/rust/neqo-crypto/src/constants.rs ++++ b/comm/third_party/rust/neqo-crypto/src/constants.rs +@@ -84,6 +84,7 @@ remap_enum! { + TLS_GRP_EC_X25519 = ssl_grp_ec_curve25519, + TLS_GRP_KEM_XYBER768D00 = ssl_grp_kem_xyber768d00, + TLS_GRP_KEM_MLKEM768X25519 = ssl_grp_kem_x25519mlkem768, ++ TLS_GRP_KEM_MLKEM768SECP256R1 = ssl_grp_kem_secp256r1mlkem768, + } + } + +diff --git a/comm/third_party/rust/neqo-transport/.cargo-checksum.json b/comm/third_party/rust/neqo-transport/.cargo-checksum.json +index 2ab6177fb5..17c7e641ee 100644 +--- a/comm/third_party/rust/neqo-transport/.cargo-checksum.json ++++ b/comm/third_party/rust/neqo-transport/.cargo-checksum.json +@@ -1 +1 @@ +-{"files":{"Cargo.toml":"b112e3e53a47e19caa358f4f77cbe1fea81dbceffbe03dd97823295726819a84","benches/min_bandwidth.rs":"11eeb817276c10522159662d1112acae00facbf6a0c8da1d94d0a50583fdf38c","benches/range_tracker.rs":"754871ef02608efab05f00c7dc6ad8ac559d0c2feb2072ea0f036c26b6285a8d","benches/rx_stream_orderer.rs":"2e15891b1db102ed7abdd07d1524acf6d5c0e0c32d935c735c04c40becda5718","benches/sent_packets.rs":"4f32d5c64d6b168b224e928abb647a3b42d54ed18cdec81e6ba6eae61be569bd","benches/transfer.rs":"933cf28a499e1376ce3d9c3130bd2ee69f0da9a99606a95e96328068640d6179","build.rs":"78ec79c93bf13c3a40ceef8bba1ea2eada61c8f2dfc15ea7bf117958d367949c","src/ackrate.rs":"e826470adf7f050bc217fd78df30a4e962787a1621a9116448c142e3a16ca909","src/addr_valid.rs":"53a301a3ab717ef78a886a54611bdcc324b21f1dd4f59e2943ae3978c5980990","src/cc/classic_cc.rs":"c2705695ce42cfdd43dc6f0e908d78b5e0ce20fde38c9033708b060330ac1f31","src/cc/cubic.rs":"1c8eb0a0945874be26a3c144d01fa8427a384c2e1aebafb1d293041811039e24","src/cc/mod.rs":"b290fcda18bc0fab2808a57dc0136b1e8721459175d12de5cf81164920f9b6fb","src/cc/new_reno.rs":"f438b5ab39413f8a9dad3575c6229bbae12140a316d8da34b5dcd9397551d5f7","src/cc/tests/cubic.rs":"79f17c380626b8ec26a8b4e070d2da1c9dd973890f1939afa5c606183a7d7a34","src/cc/tests/mod.rs":"017bf402a9a8c71b5c43343677635644babb57a849d81d0affc328b4b4b9cebb","src/cc/tests/new_reno.rs":"de2919e8c7e7e07fb8e14bb643518180ecf21de11fe76a6a84face9e38fc2122","src/cid.rs":"c20083329534206551c0a7b84bf677af1145d4af25b78640c4e92f37ae89ff52","src/connection/idle.rs":"a7d261859f3b62a2c9dc786367371dd114d6d2060bd32eba221177c07d2c8032","src/connection/mod.rs":"b31177e05d11516c02c983019d44531a2d56b15ccb5c25713e3bf5f5212e23bd","src/connection/params.rs":"ef23708f9b0a7f526e5224ed489055a499909384ef501cb96503e4e98c66dd1b","src/connection/saved.rs":"db677a12e4528a97c4d27e31f0f08d70b8fed0bfad460bbc84c42fa0941b0db3","src/connection/state.rs":"0be17df5d535f4c704d685a439054e7a9f3070ee080d778f4b89a5ae79ff5335","src/connection/test_internal.rs":"f3ebfe97b25c9c716d41406066295e5aff4e96a3051ef4e2b5fb258282bbc14c","src/connection/tests/ackrate.rs":"3a242d85de100dc7500074969fab12a64e62f6a48994a5486d28e15c27c4faa1","src/connection/tests/cc.rs":"e32a5e435435584147a832ef8af610b42e79650d2e3b23dcfea96a2056ca4311","src/connection/tests/close.rs":"c3b858cb403391879f7ed1d46790c65ff3fe05f80ace2cdb8b7128f974537fe7","src/connection/tests/datagram.rs":"7941f1917a78cfabb6f3d1b5fb010215c9278b75a39a2f568c1780304d5e98af","src/connection/tests/ecn.rs":"247cbc07eef9a39ca7c64e092f8237e91e264abd9b10e4e23a1d816c899f59c8","src/connection/tests/handshake.rs":"806bbc8386591276beefcfffeeee7de9da7caf7d97ae59368fda7021aaa948e4","src/connection/tests/idle.rs":"0ddcd7d736e45bc81e25b18e344753d00d53dba06b305006f7150d2446f63687","src/connection/tests/keys.rs":"6ced623655b18fbbd00a6b34663be8eccad0fd7b869029e11b71da3d731f63f6","src/connection/tests/migration.rs":"0c3499c6bb89cb2a89ad4252603292f00339142ce5236fc282351c01fd090886","src/connection/tests/mod.rs":"0b4e2385d376a08e37c4294b12c23e59fffaf973ce8931c4d37f5db03d83cc54","src/connection/tests/null.rs":"d39d34c895c40ea88bcc137cba43c34386ef9759c6f66f3487ffd41a5099feb8","src/connection/tests/priority.rs":"2f9ef42512cd05f5a3b7194b70ba0c25738b6f75901e4ca2258bf2cf2568d23a","src/connection/tests/recovery.rs":"fbc2353b6f9cbe4b047ec782c3a1108552f6f16e19bff29f3d41e7a42aa78060","src/connection/tests/resumption.rs":"1ff6b7005673f3bc9b791059946fbb4bf2b1f2677c737fa215e335e65bd0d582","src/connection/tests/stream.rs":"777e372827632172c5ceb1598f9b18bccf2a0a1ceba442ae09263dda58f0673e","src/connection/tests/vn.rs":"75127c42d20243ad553871b64a22b8c6953ca4d26bc0de898dfab34928d1e647","src/connection/tests/zerortt.rs":"94a5a705283c31f50f68a74c49d4bba4ba2a51d8122d9e50a14a831a902f8578","src/crypto.rs":"312d27efcb6ce334143f1c62ae821e2915f06b18284312de5af41adb9555b513","src/ecn.rs":"1f0ee1cee631ecf08f6db73c909e29609ab513a58d3c7e7a6f3622486dcb8477","src/events.rs":"2c5d9ddef25e7547c9aff9688f4489bcb1788453293692c5bf0681e09d88b685","src/fc.rs":"7fc2a8eaf99235d1dc3734c04c37d8a0b14fe2463d71fbbc9ce2d946ebd0ee3a","src/frame.rs":"a085a0adf7dc319958d49c91462d2c661a547f902d82448fc55c7df86fb6817a","src/lib.rs":"2bfcf602f5a9d83fcd8c90daee6d38403c341a6974dca0347dde057141b6e8e7","src/pace.rs":"a6c6754a21b59b7955a570162f12015bdc65c5f0e497ce650062a5a92d5abb06","src/packet/metadata.rs":"68ee0b9350bcb8bc1078de728e49695cd784a48d106da0128c1006c371d49b84","src/packet/mod.rs":"b68c79515d8ff76cc693fba9b945596ef8b2227a3baccd1c49bccc6b51b4950e","src/packet/retry.rs":"12d4564f9fa682e82fb9604bcace35b478efdd35407c884cff839d9e02d7fadf","src/path.rs":"96c1fedd5c701905112e9aa586efd4bbc2d858b36abc5be12cca1319165c1590","src/pmtud.rs":"304433d6a905946481a04fc765becbfc33ff120f28a96d71d59a3034c39e642d","src/qlog.rs":"0011e04e264032de77470b6dcf57d49aa5d69572c080670e0d8a10f522874f42","src/quic_datagrams.rs":"8c3ad548a184ab8e7039bf180a983815daf490821b98bcd1211fd29eab41f3d6","src/recovery/mod.rs":"852bd9cc8e72ccf059e9ae7600977c024b5c2cca847d08cbac1052075f657229","src/recovery/sent.rs":"f6d4e90c99cf3c77d990748825f65a638bbdfe170d0d09774000ec3b705243e1","src/recovery/token.rs":"5a274b0587c7754344c270d06627b8dd42f556cae0e957a6855a709d130cb4ac","src/recv_stream.rs":"c4feed193f84de9f944d8102b3d49206a3dc52da8c86ca882f41588934e4c5c4","src/rtt.rs":"cbfa57cf7c258126a00d1bc5584cd3ead8a0f6f85be893c4a86497d6cfbe2323","src/send_stream.rs":"baa24dcf37b77e840b40937ae5b1b48692db8632c7e07c22bdbae23056e7bea0","src/sender.rs":"070077996bd07c25abd63d3cf26bee94fd53bbca951ae1e987a7d50558685e53","src/server.rs":"6a5dbfb1115905bda3c98238f9d4bbf6d7f661c3363c2ef0578eef865af6aef6","src/sni.rs":"1cbfd737226ad9b28887fb96793056e1f9e747b3769aea6cfd77da986d8cf2e1","src/stats.rs":"072f7afc190fc9eaf7db05ba84f8a76243d50602c61efece56fde14605012966","src/stream_id.rs":"8b7827e84a77de8107259c68060d095fbdc3fe434eb21eb9f044faedf0c9cbf8","src/streams.rs":"663688d56ddf556276c39c42aa20058d41dafda3458bfc1dc8e3683787853fbb","src/tparams.rs":"2188aea252e52d9a5bbfe05719dac9644af7aacb77a2a8ed1ed3ce865d35c6a2","src/tracking.rs":"53547e384b72175da0ea8cab25dfaa2c4b377ee0c2280c091f097b2aad5781f1","src/version.rs":"3676e8d34211599f344e4b9daa21d3897b3ce56b2cae738bbc6552db03d4bdad","tests/common/mod.rs":"8a2f781a16e74760ea57a09c4fc9adfe6a8ce56a6ecb7b1e9445e37125ea8d88","tests/conn_vectors.rs":"0e4a1b92c02b527842c127b789e70f6c4372c2b61b1a59a8e695f744ce155e2a","tests/connection.rs":"46be10c37090516c2fc4837059b3e5c8caf5ed7db9bc379ecf996a2f6e6b101a","tests/network.rs":"2e49aeca3dd1457758a13a56f48ddcd0d5af921e9aca59ed831b95ef4311dc1b","tests/retry.rs":"4306a4fd1d02449f1675882af1f09901a8ed4fe744a1daae189090292c81711c","tests/server.rs":"327880d12d84c3d164461888bc22311634a28eb0b559583a0126cbca0771fb59","tests/sni.rs":"2cbcfe218f43fa8c0a8da0497d8aed1ca2e590f41071428d85e3c3bca6135063","tests/stats.rs":"af8c1da46e984b55b172118aff4ad33be2375443f405e297d40981e65eb4d0cf"},"package":null} +\ No newline at end of file ++{"files":{"Cargo.toml":"b112e3e53a47e19caa358f4f77cbe1fea81dbceffbe03dd97823295726819a84","benches/min_bandwidth.rs":"11eeb817276c10522159662d1112acae00facbf6a0c8da1d94d0a50583fdf38c","benches/range_tracker.rs":"754871ef02608efab05f00c7dc6ad8ac559d0c2feb2072ea0f036c26b6285a8d","benches/rx_stream_orderer.rs":"2e15891b1db102ed7abdd07d1524acf6d5c0e0c32d935c735c04c40becda5718","benches/sent_packets.rs":"4f32d5c64d6b168b224e928abb647a3b42d54ed18cdec81e6ba6eae61be569bd","benches/transfer.rs":"933cf28a499e1376ce3d9c3130bd2ee69f0da9a99606a95e96328068640d6179","build.rs":"78ec79c93bf13c3a40ceef8bba1ea2eada61c8f2dfc15ea7bf117958d367949c","src/ackrate.rs":"e826470adf7f050bc217fd78df30a4e962787a1621a9116448c142e3a16ca909","src/addr_valid.rs":"53a301a3ab717ef78a886a54611bdcc324b21f1dd4f59e2943ae3978c5980990","src/cc/classic_cc.rs":"c2705695ce42cfdd43dc6f0e908d78b5e0ce20fde38c9033708b060330ac1f31","src/cc/cubic.rs":"1c8eb0a0945874be26a3c144d01fa8427a384c2e1aebafb1d293041811039e24","src/cc/mod.rs":"b290fcda18bc0fab2808a57dc0136b1e8721459175d12de5cf81164920f9b6fb","src/cc/new_reno.rs":"f438b5ab39413f8a9dad3575c6229bbae12140a316d8da34b5dcd9397551d5f7","src/cc/tests/cubic.rs":"79f17c380626b8ec26a8b4e070d2da1c9dd973890f1939afa5c606183a7d7a34","src/cc/tests/mod.rs":"017bf402a9a8c71b5c43343677635644babb57a849d81d0affc328b4b4b9cebb","src/cc/tests/new_reno.rs":"de2919e8c7e7e07fb8e14bb643518180ecf21de11fe76a6a84face9e38fc2122","src/cid.rs":"c20083329534206551c0a7b84bf677af1145d4af25b78640c4e92f37ae89ff52","src/connection/idle.rs":"a7d261859f3b62a2c9dc786367371dd114d6d2060bd32eba221177c07d2c8032","src/connection/mod.rs":"b31177e05d11516c02c983019d44531a2d56b15ccb5c25713e3bf5f5212e23bd","src/connection/params.rs":"ef23708f9b0a7f526e5224ed489055a499909384ef501cb96503e4e98c66dd1b","src/connection/saved.rs":"db677a12e4528a97c4d27e31f0f08d70b8fed0bfad460bbc84c42fa0941b0db3","src/connection/state.rs":"0be17df5d535f4c704d685a439054e7a9f3070ee080d778f4b89a5ae79ff5335","src/connection/test_internal.rs":"f3ebfe97b25c9c716d41406066295e5aff4e96a3051ef4e2b5fb258282bbc14c","src/connection/tests/ackrate.rs":"3a242d85de100dc7500074969fab12a64e62f6a48994a5486d28e15c27c4faa1","src/connection/tests/cc.rs":"e32a5e435435584147a832ef8af610b42e79650d2e3b23dcfea96a2056ca4311","src/connection/tests/close.rs":"c3b858cb403391879f7ed1d46790c65ff3fe05f80ace2cdb8b7128f974537fe7","src/connection/tests/datagram.rs":"7941f1917a78cfabb6f3d1b5fb010215c9278b75a39a2f568c1780304d5e98af","src/connection/tests/ecn.rs":"247cbc07eef9a39ca7c64e092f8237e91e264abd9b10e4e23a1d816c899f59c8","src/connection/tests/handshake.rs":"806bbc8386591276beefcfffeeee7de9da7caf7d97ae59368fda7021aaa948e4","src/connection/tests/idle.rs":"0ddcd7d736e45bc81e25b18e344753d00d53dba06b305006f7150d2446f63687","src/connection/tests/keys.rs":"6ced623655b18fbbd00a6b34663be8eccad0fd7b869029e11b71da3d731f63f6","src/connection/tests/migration.rs":"0c3499c6bb89cb2a89ad4252603292f00339142ce5236fc282351c01fd090886","src/connection/tests/mod.rs":"0b4e2385d376a08e37c4294b12c23e59fffaf973ce8931c4d37f5db03d83cc54","src/connection/tests/null.rs":"d39d34c895c40ea88bcc137cba43c34386ef9759c6f66f3487ffd41a5099feb8","src/connection/tests/priority.rs":"2f9ef42512cd05f5a3b7194b70ba0c25738b6f75901e4ca2258bf2cf2568d23a","src/connection/tests/recovery.rs":"fbc2353b6f9cbe4b047ec782c3a1108552f6f16e19bff29f3d41e7a42aa78060","src/connection/tests/resumption.rs":"1ff6b7005673f3bc9b791059946fbb4bf2b1f2677c737fa215e335e65bd0d582","src/connection/tests/stream.rs":"777e372827632172c5ceb1598f9b18bccf2a0a1ceba442ae09263dda58f0673e","src/connection/tests/vn.rs":"75127c42d20243ad553871b64a22b8c6953ca4d26bc0de898dfab34928d1e647","src/connection/tests/zerortt.rs":"94a5a705283c31f50f68a74c49d4bba4ba2a51d8122d9e50a14a831a902f8578","src/crypto.rs":"3ea51742021e6c4d3b7f69747a80baf35a1166f0a3caac521dc8aa5c3181e40b","src/ecn.rs":"1f0ee1cee631ecf08f6db73c909e29609ab513a58d3c7e7a6f3622486dcb8477","src/events.rs":"2c5d9ddef25e7547c9aff9688f4489bcb1788453293692c5bf0681e09d88b685","src/fc.rs":"7fc2a8eaf99235d1dc3734c04c37d8a0b14fe2463d71fbbc9ce2d946ebd0ee3a","src/frame.rs":"a085a0adf7dc319958d49c91462d2c661a547f902d82448fc55c7df86fb6817a","src/lib.rs":"2bfcf602f5a9d83fcd8c90daee6d38403c341a6974dca0347dde057141b6e8e7","src/pace.rs":"a6c6754a21b59b7955a570162f12015bdc65c5f0e497ce650062a5a92d5abb06","src/packet/metadata.rs":"68ee0b9350bcb8bc1078de728e49695cd784a48d106da0128c1006c371d49b84","src/packet/mod.rs":"b68c79515d8ff76cc693fba9b945596ef8b2227a3baccd1c49bccc6b51b4950e","src/packet/retry.rs":"12d4564f9fa682e82fb9604bcace35b478efdd35407c884cff839d9e02d7fadf","src/path.rs":"96c1fedd5c701905112e9aa586efd4bbc2d858b36abc5be12cca1319165c1590","src/pmtud.rs":"304433d6a905946481a04fc765becbfc33ff120f28a96d71d59a3034c39e642d","src/qlog.rs":"0011e04e264032de77470b6dcf57d49aa5d69572c080670e0d8a10f522874f42","src/quic_datagrams.rs":"8c3ad548a184ab8e7039bf180a983815daf490821b98bcd1211fd29eab41f3d6","src/recovery/mod.rs":"852bd9cc8e72ccf059e9ae7600977c024b5c2cca847d08cbac1052075f657229","src/recovery/sent.rs":"f6d4e90c99cf3c77d990748825f65a638bbdfe170d0d09774000ec3b705243e1","src/recovery/token.rs":"5a274b0587c7754344c270d06627b8dd42f556cae0e957a6855a709d130cb4ac","src/recv_stream.rs":"c4feed193f84de9f944d8102b3d49206a3dc52da8c86ca882f41588934e4c5c4","src/rtt.rs":"cbfa57cf7c258126a00d1bc5584cd3ead8a0f6f85be893c4a86497d6cfbe2323","src/send_stream.rs":"baa24dcf37b77e840b40937ae5b1b48692db8632c7e07c22bdbae23056e7bea0","src/sender.rs":"070077996bd07c25abd63d3cf26bee94fd53bbca951ae1e987a7d50558685e53","src/server.rs":"6a5dbfb1115905bda3c98238f9d4bbf6d7f661c3363c2ef0578eef865af6aef6","src/sni.rs":"1cbfd737226ad9b28887fb96793056e1f9e747b3769aea6cfd77da986d8cf2e1","src/stats.rs":"072f7afc190fc9eaf7db05ba84f8a76243d50602c61efece56fde14605012966","src/stream_id.rs":"8b7827e84a77de8107259c68060d095fbdc3fe434eb21eb9f044faedf0c9cbf8","src/streams.rs":"663688d56ddf556276c39c42aa20058d41dafda3458bfc1dc8e3683787853fbb","src/tparams.rs":"2188aea252e52d9a5bbfe05719dac9644af7aacb77a2a8ed1ed3ce865d35c6a2","src/tracking.rs":"53547e384b72175da0ea8cab25dfaa2c4b377ee0c2280c091f097b2aad5781f1","src/version.rs":"3676e8d34211599f344e4b9daa21d3897b3ce56b2cae738bbc6552db03d4bdad","tests/common/mod.rs":"8a2f781a16e74760ea57a09c4fc9adfe6a8ce56a6ecb7b1e9445e37125ea8d88","tests/conn_vectors.rs":"0e4a1b92c02b527842c127b789e70f6c4372c2b61b1a59a8e695f744ce155e2a","tests/connection.rs":"46be10c37090516c2fc4837059b3e5c8caf5ed7db9bc379ecf996a2f6e6b101a","tests/network.rs":"2e49aeca3dd1457758a13a56f48ddcd0d5af921e9aca59ed831b95ef4311dc1b","tests/retry.rs":"4306a4fd1d02449f1675882af1f09901a8ed4fe744a1daae189090292c81711c","tests/server.rs":"327880d12d84c3d164461888bc22311634a28eb0b559583a0126cbca0771fb59","tests/sni.rs":"2cbcfe218f43fa8c0a8da0497d8aed1ca2e590f41071428d85e3c3bca6135063","tests/stats.rs":"af8c1da46e984b55b172118aff4ad33be2375443f405e297d40981e65eb4d0cf"},"package":null} +\ No newline at end of file +diff --git a/comm/third_party/rust/neqo-transport/src/crypto.rs b/comm/third_party/rust/neqo-transport/src/crypto.rs +index f0ffbc40fa..219d005946 100644 +--- a/comm/third_party/rust/neqo-transport/src/crypto.rs ++++ b/comm/third_party/rust/neqo-transport/src/crypto.rs +@@ -22,7 +22,7 @@ use neqo_crypto::{ + PrivateKey, PublicKey, Record, RecordList, ResumptionToken, SymKey, ZeroRttChecker, + TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_CT_HANDSHAKE, + TLS_GRP_EC_SECP256R1, TLS_GRP_EC_SECP384R1, TLS_GRP_EC_SECP521R1, TLS_GRP_EC_X25519, +- TLS_GRP_KEM_MLKEM768X25519, TLS_VERSION_1_3, ++ TLS_GRP_KEM_MLKEM768X25519, TLS_GRP_KEM_MLKEM768SECP256R1, TLS_VERSION_1_3, + }; + + use crate::{ +@@ -81,6 +81,7 @@ impl Crypto { + ])?; + agent.set_groups(if conn_params.mlkem_enabled() { + &[ ++ TLS_GRP_KEM_MLKEM768SECP256R1, + TLS_GRP_KEM_MLKEM768X25519, + TLS_GRP_EC_X25519, + TLS_GRP_EC_SECP256R1, +diff --git a/dom/media/webrtc/transport/transportlayerdtls.cpp b/dom/media/webrtc/transport/transportlayerdtls.cpp +index f242eeacf4..119a94ebae 100644 +--- a/dom/media/webrtc/transport/transportlayerdtls.cpp ++++ b/dom/media/webrtc/transport/transportlayerdtls.cpp +@@ -603,7 +603,7 @@ bool TransportLayerDtls::Setup() { + + // Mlkem must stay the last in the list because if we don't support it + // the amount of supported_groups will be sent without it. +- ssl_grp_kem_mlkem768x25519}; ++ ssl_grp_kem_mlkem768x25519, ssl_grp_kem_secp256r1mlkem768}; + + size_t numGroups = std::size(namedGroups); + if (!(StaticPrefs::security_tls_enable_kyber() && +diff --git a/netwerk/socket/neqo_glue/src/lib.rs b/netwerk/socket/neqo_glue/src/lib.rs +index 21e82b920d..7392ac377c 100644 +--- a/netwerk/socket/neqo_glue/src/lib.rs ++++ b/netwerk/socket/neqo_glue/src/lib.rs +@@ -330,6 +330,7 @@ impl NeqoHttp3Conn { + // These operations are infallible when conn.state == State::Init. + conn.set_groups(&[ + neqo_crypto::TLS_GRP_KEM_MLKEM768X25519, ++ neqo_crypto::TLS_GRP_KEM_MLKEM768SECP256R1, + neqo_crypto::TLS_GRP_EC_X25519, + neqo_crypto::TLS_GRP_EC_SECP256R1, + neqo_crypto::TLS_GRP_EC_SECP384R1, +@@ -338,7 +339,7 @@ impl NeqoHttp3Conn { + .map_err(|_| NS_ERROR_UNEXPECTED)?; + additional_shares += 1; + } +- // If additional_shares == 2, send mlkem768x25519, x25519, and p256. ++ // If additional_shares == 2, send mlkem768x25519, mlkem768secp256r1, x25519, and p256. + // If additional_shares == 1, send {mlkem768x25519, x25519} or {x25519, p256}. + // If additional_shares == 0, send x25519. + conn.send_additional_key_shares(additional_shares) +diff --git a/security/manager/ssl/nsNSSCallbacks.cpp b/security/manager/ssl/nsNSSCallbacks.cpp +index 2dc48c9f4c..4acdd6b177 100644 +--- a/security/manager/ssl/nsNSSCallbacks.cpp ++++ b/security/manager/ssl/nsNSSCallbacks.cpp +@@ -658,6 +658,9 @@ nsCString getKeaGroupName(uint32_t aKeaGroup) { + case ssl_grp_kem_mlkem768x25519: + groupName = "mlkem768x25519"_ns; + break; ++ case ssl_grp_kem_secp256r1mlkem768: ++ groupName = "secp256r1mlkem768"_ns; ++ break; + case ssl_grp_ffdhe_2048: + groupName = "FF 2048"_ns; + break; +diff --git a/security/manager/ssl/nsNSSIOLayer.cpp b/security/manager/ssl/nsNSSIOLayer.cpp +index b1a5f5c2df..dae326baa9 100644 +--- a/security/manager/ssl/nsNSSIOLayer.cpp ++++ b/security/manager/ssl/nsNSSIOLayer.cpp +@@ -450,7 +450,7 @@ bool retryDueToTLSIntolerance(PRErrorCode err, NSSSocketControl* socketInfo) { + errorName.AppendASCII(prErrorName); + } + mozilla::glean::tls::xyber_intolerance_reason.Get(errorName).Add(1); +- // Don't record version intolerance if we sent mlkem768x25519, just force a ++ // Don't record version intolerance if we sent mlkem768x25519/secp256r1mlkem768, just force a + // retry. + return true; + } +@@ -1561,7 +1561,8 @@ static nsresult nsSSLIOLayerSetOptions(PRFileDesc* fd, bool forSTARTTLS, + !(infoObject->GetProviderFlags() & + (nsISocketProvider::BE_CONSERVATIVE | nsISocketProvider::IS_RETRY))) { + const SSLNamedGroup namedGroups[] = { +- ssl_grp_kem_mlkem768x25519, ssl_grp_ec_curve25519, ssl_grp_ec_secp256r1, ++ ssl_grp_kem_mlkem768x25519, ssl_grp_kem_secp256r1mlkem768, ++ ssl_grp_ec_curve25519, ssl_grp_ec_secp256r1, + ssl_grp_ec_secp384r1, ssl_grp_ec_secp521r1, ssl_grp_ffdhe_2048, + ssl_grp_ffdhe_3072}; + if (SECSuccess != +@@ -1574,14 +1575,14 @@ static nsresult nsSSLIOLayerSetOptions(PRFileDesc* fd, bool forSTARTTLS, + const SSLNamedGroup namedGroups[] = { + ssl_grp_ec_curve25519, ssl_grp_ec_secp256r1, ssl_grp_ec_secp384r1, + ssl_grp_ec_secp521r1, ssl_grp_ffdhe_2048, ssl_grp_ffdhe_3072}; +- // Skip the |ssl_grp_kem_mlkem768x25519| entry. ++ // Skip the |ssl_grp_kem_mlkem768x25519| and |ssl_grp_kem_secp256r1mlkem768| entries. + if (SECSuccess != + SSL_NamedGroupConfig(fd, namedGroups, std::size(namedGroups))) { + return NS_ERROR_FAILURE; + } + } + +- // If additional_shares == 2, send mlkem768x25519, x25519, and p256. ++ // If additional_shares == 2, send mlkem768x25519, secp256r1mlkem768, x25519, and p256. + // If additional_shares == 1, send {mlkem768x25519, x25519} or {x25519, p256}. + // If additional_shares == 0, send x25519. + if (SECSuccess != SSL_SendAdditionalKeyShares(fd, additional_shares)) { +diff --git a/third_party/rust/neqo-crypto/.cargo-checksum.json b/third_party/rust/neqo-crypto/.cargo-checksum.json +index 85f14fe2f4..b7af45a5de 100644 +--- a/third_party/rust/neqo-crypto/.cargo-checksum.json ++++ b/third_party/rust/neqo-crypto/.cargo-checksum.json +@@ -1 +1 @@ +-{"files":{"Cargo.toml":"a57adef48614a58209447e8bd115a2de3d8a42917a0b9a2ae9a97cabc3400c6a","bindings/bindings.toml":"e7e4b75736cfcf4d52febacb99a6f6c6c7b1d648ed8bdc424648be876c850e91","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"2f54f79958878ed7988441955344dd1a2a079b1bb409e8f12a70284fd7e351ef","min_version.txt":"0f9ddf9ddaeb5137a5ab3d238d06286822f9579b1f46ba76312a8c6d76176500","src/aead.rs":"08d7cad82e3bec32661cfd1689e6611b30ae328ec88481cb32201dd255777365","src/aead_null.rs":"a766e2f71fd8b77a8f81bc60aaaafcffb6aef1f0a1f39ea07fef45b3696718ce","src/agent.rs":"ec90d7556231c57da3a191f508eaf1f820f22d6b7912ee45d1a594eb0fea7a82","src/agentio.rs":"1baecfb725b54717a6a74bb4664692d187f62747cc5e0495f59b06729f96dea2","src/auth.rs":"7a1524bef0a0c71616f5ee8b3976d66201210b809271bcf5d06c0e560ae482af","src/cert.rs":"4fdaa3834d8a72f41198449010fd5c3f6be6a54e429427c37bde5aab9421585c","src/constants.rs":"50c1b84e06cd9a71bb9199f2518947a4d4ad3e5c33c1b86c585486dc43e872a0","src/ech.rs":"19d16af5a30e2060a8942a72487bd820c0d9c62ff1d3c490871752c56781c44b","src/err.rs":"4c7d0b46955b58aa9375210c2c5d24012056c3ad8a856b72d2c7c9542cc97046","src/exp.rs":"cd864fb5a61cd1472baa5b1d0951fc712753c22d21af83ebed09a01585f33b48","src/ext.rs":"a5676f8b9815cc7f6ed1da6fea091cf8754d8b80e90d37b726e905abe18930f8","src/hkdf.rs":"76c5abc8b2d6ee12d8a86cd730af2cf47a59b2fbfd3b8a635a1826636156794d","src/hp.rs":"6adf4ad78b5a065ab7310c69ad239eec156256043e2c185bf60b9d1f12ab1be4","src/lib.rs":"3ab979c264a909e663c5ef140cd57013180745b99937671c73a9003ca6347f41","src/min_version.rs":"c6e1f98b9f56db0622ac38c1be131c55acf4a0f09ed0d6283f4d6308e2d1301a","src/p11.rs":"49bcde067e55228dab483bd11b70dc29d40dc3c59fa60136daccb205dc468df0","src/prio.rs":"1858088afd2668e8fbff56959765b7d4df09342371b9282ade27bb4d7bd6ce69","src/replay.rs":"594ce92f368cbc5fb71ebfb62214f07d1e86df8e5ce94255d5593ffabb91cd03","src/result.rs":"5a76688787741de7a935dbbab4bcb917d481d1c9c50a34df7e510036feb3da17","src/secrets.rs":"5d85b1e15f47cd267fe70fa8ea7e4ebc4b07eab7713f451afeefcf15f146f8a5","src/selfencrypt.rs":"4f106465f582c38d3bb04cb5cbcbf65a349e3186784726d9f2bf511a4a4a35ee","src/ssl.rs":"04950bb534b5304eb417909a3a39ebaa9be234c7c13eacdc41c00a8edab1b09f","src/time.rs":"22989caf3dab85cfe955cc279fcca98a6df02d14fcd0e93cac7b39374b8b5763","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"fb95a2d5c86ce3fafcb127cd0a2a163e5ee70baf09b2c8483e4d1fb25644cee2","tests/ext.rs":"57af4e2df211fa8afdb73125d4344ef5c70c1ea4579107c3e6f5746308ee3e7b","tests/handshake.rs":"df8a901048268a390785e05e28cbc97b82e41e47d7eab2d5c0a57e434ca1adcf","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"7ee5d7290a3f61af67ad2c94670cba376027136370d9784948db655b7e00fe54","tests/init.rs":"3cfe8411ca31ad7dfb23822bb1570e1a5b2b334857173bdd7df086b65b81d95a","tests/selfencrypt.rs":"b65aed70e83dce660017159fc8a956d3b52e0807b590ad8d0a3a4265caa8c1fa"},"package":null} +\ No newline at end of file ++{"files":{"Cargo.toml":"a57adef48614a58209447e8bd115a2de3d8a42917a0b9a2ae9a97cabc3400c6a","bindings/bindings.toml":"e7e4b75736cfcf4d52febacb99a6f6c6c7b1d648ed8bdc424648be876c850e91","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"2f54f79958878ed7988441955344dd1a2a079b1bb409e8f12a70284fd7e351ef","min_version.txt":"0f9ddf9ddaeb5137a5ab3d238d06286822f9579b1f46ba76312a8c6d76176500","src/aead.rs":"08d7cad82e3bec32661cfd1689e6611b30ae328ec88481cb32201dd255777365","src/aead_null.rs":"a766e2f71fd8b77a8f81bc60aaaafcffb6aef1f0a1f39ea07fef45b3696718ce","src/agent.rs":"ec90d7556231c57da3a191f508eaf1f820f22d6b7912ee45d1a594eb0fea7a82","src/agentio.rs":"1baecfb725b54717a6a74bb4664692d187f62747cc5e0495f59b06729f96dea2","src/auth.rs":"7a1524bef0a0c71616f5ee8b3976d66201210b809271bcf5d06c0e560ae482af","src/cert.rs":"4fdaa3834d8a72f41198449010fd5c3f6be6a54e429427c37bde5aab9421585c","src/constants.rs":"fb3b6353c0ed4683a1489e7c730b480e8c1895800bd024376165f722d8211d47","src/ech.rs":"19d16af5a30e2060a8942a72487bd820c0d9c62ff1d3c490871752c56781c44b","src/err.rs":"4c7d0b46955b58aa9375210c2c5d24012056c3ad8a856b72d2c7c9542cc97046","src/exp.rs":"cd864fb5a61cd1472baa5b1d0951fc712753c22d21af83ebed09a01585f33b48","src/ext.rs":"a5676f8b9815cc7f6ed1da6fea091cf8754d8b80e90d37b726e905abe18930f8","src/hkdf.rs":"76c5abc8b2d6ee12d8a86cd730af2cf47a59b2fbfd3b8a635a1826636156794d","src/hp.rs":"6adf4ad78b5a065ab7310c69ad239eec156256043e2c185bf60b9d1f12ab1be4","src/lib.rs":"3ab979c264a909e663c5ef140cd57013180745b99937671c73a9003ca6347f41","src/min_version.rs":"c6e1f98b9f56db0622ac38c1be131c55acf4a0f09ed0d6283f4d6308e2d1301a","src/p11.rs":"49bcde067e55228dab483bd11b70dc29d40dc3c59fa60136daccb205dc468df0","src/prio.rs":"1858088afd2668e8fbff56959765b7d4df09342371b9282ade27bb4d7bd6ce69","src/replay.rs":"594ce92f368cbc5fb71ebfb62214f07d1e86df8e5ce94255d5593ffabb91cd03","src/result.rs":"5a76688787741de7a935dbbab4bcb917d481d1c9c50a34df7e510036feb3da17","src/secrets.rs":"5d85b1e15f47cd267fe70fa8ea7e4ebc4b07eab7713f451afeefcf15f146f8a5","src/selfencrypt.rs":"4f106465f582c38d3bb04cb5cbcbf65a349e3186784726d9f2bf511a4a4a35ee","src/ssl.rs":"04950bb534b5304eb417909a3a39ebaa9be234c7c13eacdc41c00a8edab1b09f","src/time.rs":"22989caf3dab85cfe955cc279fcca98a6df02d14fcd0e93cac7b39374b8b5763","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"fb95a2d5c86ce3fafcb127cd0a2a163e5ee70baf09b2c8483e4d1fb25644cee2","tests/ext.rs":"57af4e2df211fa8afdb73125d4344ef5c70c1ea4579107c3e6f5746308ee3e7b","tests/handshake.rs":"df8a901048268a390785e05e28cbc97b82e41e47d7eab2d5c0a57e434ca1adcf","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"7ee5d7290a3f61af67ad2c94670cba376027136370d9784948db655b7e00fe54","tests/init.rs":"3cfe8411ca31ad7dfb23822bb1570e1a5b2b334857173bdd7df086b65b81d95a","tests/selfencrypt.rs":"b65aed70e83dce660017159fc8a956d3b52e0807b590ad8d0a3a4265caa8c1fa"},"package":null} +\ No newline at end of file +diff --git a/third_party/rust/neqo-crypto/src/constants.rs b/third_party/rust/neqo-crypto/src/constants.rs +index c3cb109c6f..e0bdc5c3f4 100644 +--- a/third_party/rust/neqo-crypto/src/constants.rs ++++ b/third_party/rust/neqo-crypto/src/constants.rs +@@ -84,6 +84,7 @@ remap_enum! { + TLS_GRP_EC_X25519 = ssl_grp_ec_curve25519, + TLS_GRP_KEM_XYBER768D00 = ssl_grp_kem_xyber768d00, + TLS_GRP_KEM_MLKEM768X25519 = ssl_grp_kem_x25519mlkem768, ++ TLS_GRP_KEM_MLKEM768SECP256R1 = ssl_grp_kem_secp256r1mlkem768, + } + } + +diff --git a/third_party/rust/neqo-transport/.cargo-checksum.json b/third_party/rust/neqo-transport/.cargo-checksum.json +index 2ab6177fb5..17c7e641ee 100644 +--- a/third_party/rust/neqo-transport/.cargo-checksum.json ++++ b/third_party/rust/neqo-transport/.cargo-checksum.json +@@ -1 +1 @@ +-{"files":{"Cargo.toml":"b112e3e53a47e19caa358f4f77cbe1fea81dbceffbe03dd97823295726819a84","benches/min_bandwidth.rs":"11eeb817276c10522159662d1112acae00facbf6a0c8da1d94d0a50583fdf38c","benches/range_tracker.rs":"754871ef02608efab05f00c7dc6ad8ac559d0c2feb2072ea0f036c26b6285a8d","benches/rx_stream_orderer.rs":"2e15891b1db102ed7abdd07d1524acf6d5c0e0c32d935c735c04c40becda5718","benches/sent_packets.rs":"4f32d5c64d6b168b224e928abb647a3b42d54ed18cdec81e6ba6eae61be569bd","benches/transfer.rs":"933cf28a499e1376ce3d9c3130bd2ee69f0da9a99606a95e96328068640d6179","build.rs":"78ec79c93bf13c3a40ceef8bba1ea2eada61c8f2dfc15ea7bf117958d367949c","src/ackrate.rs":"e826470adf7f050bc217fd78df30a4e962787a1621a9116448c142e3a16ca909","src/addr_valid.rs":"53a301a3ab717ef78a886a54611bdcc324b21f1dd4f59e2943ae3978c5980990","src/cc/classic_cc.rs":"c2705695ce42cfdd43dc6f0e908d78b5e0ce20fde38c9033708b060330ac1f31","src/cc/cubic.rs":"1c8eb0a0945874be26a3c144d01fa8427a384c2e1aebafb1d293041811039e24","src/cc/mod.rs":"b290fcda18bc0fab2808a57dc0136b1e8721459175d12de5cf81164920f9b6fb","src/cc/new_reno.rs":"f438b5ab39413f8a9dad3575c6229bbae12140a316d8da34b5dcd9397551d5f7","src/cc/tests/cubic.rs":"79f17c380626b8ec26a8b4e070d2da1c9dd973890f1939afa5c606183a7d7a34","src/cc/tests/mod.rs":"017bf402a9a8c71b5c43343677635644babb57a849d81d0affc328b4b4b9cebb","src/cc/tests/new_reno.rs":"de2919e8c7e7e07fb8e14bb643518180ecf21de11fe76a6a84face9e38fc2122","src/cid.rs":"c20083329534206551c0a7b84bf677af1145d4af25b78640c4e92f37ae89ff52","src/connection/idle.rs":"a7d261859f3b62a2c9dc786367371dd114d6d2060bd32eba221177c07d2c8032","src/connection/mod.rs":"b31177e05d11516c02c983019d44531a2d56b15ccb5c25713e3bf5f5212e23bd","src/connection/params.rs":"ef23708f9b0a7f526e5224ed489055a499909384ef501cb96503e4e98c66dd1b","src/connection/saved.rs":"db677a12e4528a97c4d27e31f0f08d70b8fed0bfad460bbc84c42fa0941b0db3","src/connection/state.rs":"0be17df5d535f4c704d685a439054e7a9f3070ee080d778f4b89a5ae79ff5335","src/connection/test_internal.rs":"f3ebfe97b25c9c716d41406066295e5aff4e96a3051ef4e2b5fb258282bbc14c","src/connection/tests/ackrate.rs":"3a242d85de100dc7500074969fab12a64e62f6a48994a5486d28e15c27c4faa1","src/connection/tests/cc.rs":"e32a5e435435584147a832ef8af610b42e79650d2e3b23dcfea96a2056ca4311","src/connection/tests/close.rs":"c3b858cb403391879f7ed1d46790c65ff3fe05f80ace2cdb8b7128f974537fe7","src/connection/tests/datagram.rs":"7941f1917a78cfabb6f3d1b5fb010215c9278b75a39a2f568c1780304d5e98af","src/connection/tests/ecn.rs":"247cbc07eef9a39ca7c64e092f8237e91e264abd9b10e4e23a1d816c899f59c8","src/connection/tests/handshake.rs":"806bbc8386591276beefcfffeeee7de9da7caf7d97ae59368fda7021aaa948e4","src/connection/tests/idle.rs":"0ddcd7d736e45bc81e25b18e344753d00d53dba06b305006f7150d2446f63687","src/connection/tests/keys.rs":"6ced623655b18fbbd00a6b34663be8eccad0fd7b869029e11b71da3d731f63f6","src/connection/tests/migration.rs":"0c3499c6bb89cb2a89ad4252603292f00339142ce5236fc282351c01fd090886","src/connection/tests/mod.rs":"0b4e2385d376a08e37c4294b12c23e59fffaf973ce8931c4d37f5db03d83cc54","src/connection/tests/null.rs":"d39d34c895c40ea88bcc137cba43c34386ef9759c6f66f3487ffd41a5099feb8","src/connection/tests/priority.rs":"2f9ef42512cd05f5a3b7194b70ba0c25738b6f75901e4ca2258bf2cf2568d23a","src/connection/tests/recovery.rs":"fbc2353b6f9cbe4b047ec782c3a1108552f6f16e19bff29f3d41e7a42aa78060","src/connection/tests/resumption.rs":"1ff6b7005673f3bc9b791059946fbb4bf2b1f2677c737fa215e335e65bd0d582","src/connection/tests/stream.rs":"777e372827632172c5ceb1598f9b18bccf2a0a1ceba442ae09263dda58f0673e","src/connection/tests/vn.rs":"75127c42d20243ad553871b64a22b8c6953ca4d26bc0de898dfab34928d1e647","src/connection/tests/zerortt.rs":"94a5a705283c31f50f68a74c49d4bba4ba2a51d8122d9e50a14a831a902f8578","src/crypto.rs":"312d27efcb6ce334143f1c62ae821e2915f06b18284312de5af41adb9555b513","src/ecn.rs":"1f0ee1cee631ecf08f6db73c909e29609ab513a58d3c7e7a6f3622486dcb8477","src/events.rs":"2c5d9ddef25e7547c9aff9688f4489bcb1788453293692c5bf0681e09d88b685","src/fc.rs":"7fc2a8eaf99235d1dc3734c04c37d8a0b14fe2463d71fbbc9ce2d946ebd0ee3a","src/frame.rs":"a085a0adf7dc319958d49c91462d2c661a547f902d82448fc55c7df86fb6817a","src/lib.rs":"2bfcf602f5a9d83fcd8c90daee6d38403c341a6974dca0347dde057141b6e8e7","src/pace.rs":"a6c6754a21b59b7955a570162f12015bdc65c5f0e497ce650062a5a92d5abb06","src/packet/metadata.rs":"68ee0b9350bcb8bc1078de728e49695cd784a48d106da0128c1006c371d49b84","src/packet/mod.rs":"b68c79515d8ff76cc693fba9b945596ef8b2227a3baccd1c49bccc6b51b4950e","src/packet/retry.rs":"12d4564f9fa682e82fb9604bcace35b478efdd35407c884cff839d9e02d7fadf","src/path.rs":"96c1fedd5c701905112e9aa586efd4bbc2d858b36abc5be12cca1319165c1590","src/pmtud.rs":"304433d6a905946481a04fc765becbfc33ff120f28a96d71d59a3034c39e642d","src/qlog.rs":"0011e04e264032de77470b6dcf57d49aa5d69572c080670e0d8a10f522874f42","src/quic_datagrams.rs":"8c3ad548a184ab8e7039bf180a983815daf490821b98bcd1211fd29eab41f3d6","src/recovery/mod.rs":"852bd9cc8e72ccf059e9ae7600977c024b5c2cca847d08cbac1052075f657229","src/recovery/sent.rs":"f6d4e90c99cf3c77d990748825f65a638bbdfe170d0d09774000ec3b705243e1","src/recovery/token.rs":"5a274b0587c7754344c270d06627b8dd42f556cae0e957a6855a709d130cb4ac","src/recv_stream.rs":"c4feed193f84de9f944d8102b3d49206a3dc52da8c86ca882f41588934e4c5c4","src/rtt.rs":"cbfa57cf7c258126a00d1bc5584cd3ead8a0f6f85be893c4a86497d6cfbe2323","src/send_stream.rs":"baa24dcf37b77e840b40937ae5b1b48692db8632c7e07c22bdbae23056e7bea0","src/sender.rs":"070077996bd07c25abd63d3cf26bee94fd53bbca951ae1e987a7d50558685e53","src/server.rs":"6a5dbfb1115905bda3c98238f9d4bbf6d7f661c3363c2ef0578eef865af6aef6","src/sni.rs":"1cbfd737226ad9b28887fb96793056e1f9e747b3769aea6cfd77da986d8cf2e1","src/stats.rs":"072f7afc190fc9eaf7db05ba84f8a76243d50602c61efece56fde14605012966","src/stream_id.rs":"8b7827e84a77de8107259c68060d095fbdc3fe434eb21eb9f044faedf0c9cbf8","src/streams.rs":"663688d56ddf556276c39c42aa20058d41dafda3458bfc1dc8e3683787853fbb","src/tparams.rs":"2188aea252e52d9a5bbfe05719dac9644af7aacb77a2a8ed1ed3ce865d35c6a2","src/tracking.rs":"53547e384b72175da0ea8cab25dfaa2c4b377ee0c2280c091f097b2aad5781f1","src/version.rs":"3676e8d34211599f344e4b9daa21d3897b3ce56b2cae738bbc6552db03d4bdad","tests/common/mod.rs":"8a2f781a16e74760ea57a09c4fc9adfe6a8ce56a6ecb7b1e9445e37125ea8d88","tests/conn_vectors.rs":"0e4a1b92c02b527842c127b789e70f6c4372c2b61b1a59a8e695f744ce155e2a","tests/connection.rs":"46be10c37090516c2fc4837059b3e5c8caf5ed7db9bc379ecf996a2f6e6b101a","tests/network.rs":"2e49aeca3dd1457758a13a56f48ddcd0d5af921e9aca59ed831b95ef4311dc1b","tests/retry.rs":"4306a4fd1d02449f1675882af1f09901a8ed4fe744a1daae189090292c81711c","tests/server.rs":"327880d12d84c3d164461888bc22311634a28eb0b559583a0126cbca0771fb59","tests/sni.rs":"2cbcfe218f43fa8c0a8da0497d8aed1ca2e590f41071428d85e3c3bca6135063","tests/stats.rs":"af8c1da46e984b55b172118aff4ad33be2375443f405e297d40981e65eb4d0cf"},"package":null} +\ No newline at end of file ++{"files":{"Cargo.toml":"b112e3e53a47e19caa358f4f77cbe1fea81dbceffbe03dd97823295726819a84","benches/min_bandwidth.rs":"11eeb817276c10522159662d1112acae00facbf6a0c8da1d94d0a50583fdf38c","benches/range_tracker.rs":"754871ef02608efab05f00c7dc6ad8ac559d0c2feb2072ea0f036c26b6285a8d","benches/rx_stream_orderer.rs":"2e15891b1db102ed7abdd07d1524acf6d5c0e0c32d935c735c04c40becda5718","benches/sent_packets.rs":"4f32d5c64d6b168b224e928abb647a3b42d54ed18cdec81e6ba6eae61be569bd","benches/transfer.rs":"933cf28a499e1376ce3d9c3130bd2ee69f0da9a99606a95e96328068640d6179","build.rs":"78ec79c93bf13c3a40ceef8bba1ea2eada61c8f2dfc15ea7bf117958d367949c","src/ackrate.rs":"e826470adf7f050bc217fd78df30a4e962787a1621a9116448c142e3a16ca909","src/addr_valid.rs":"53a301a3ab717ef78a886a54611bdcc324b21f1dd4f59e2943ae3978c5980990","src/cc/classic_cc.rs":"c2705695ce42cfdd43dc6f0e908d78b5e0ce20fde38c9033708b060330ac1f31","src/cc/cubic.rs":"1c8eb0a0945874be26a3c144d01fa8427a384c2e1aebafb1d293041811039e24","src/cc/mod.rs":"b290fcda18bc0fab2808a57dc0136b1e8721459175d12de5cf81164920f9b6fb","src/cc/new_reno.rs":"f438b5ab39413f8a9dad3575c6229bbae12140a316d8da34b5dcd9397551d5f7","src/cc/tests/cubic.rs":"79f17c380626b8ec26a8b4e070d2da1c9dd973890f1939afa5c606183a7d7a34","src/cc/tests/mod.rs":"017bf402a9a8c71b5c43343677635644babb57a849d81d0affc328b4b4b9cebb","src/cc/tests/new_reno.rs":"de2919e8c7e7e07fb8e14bb643518180ecf21de11fe76a6a84face9e38fc2122","src/cid.rs":"c20083329534206551c0a7b84bf677af1145d4af25b78640c4e92f37ae89ff52","src/connection/idle.rs":"a7d261859f3b62a2c9dc786367371dd114d6d2060bd32eba221177c07d2c8032","src/connection/mod.rs":"b31177e05d11516c02c983019d44531a2d56b15ccb5c25713e3bf5f5212e23bd","src/connection/params.rs":"ef23708f9b0a7f526e5224ed489055a499909384ef501cb96503e4e98c66dd1b","src/connection/saved.rs":"db677a12e4528a97c4d27e31f0f08d70b8fed0bfad460bbc84c42fa0941b0db3","src/connection/state.rs":"0be17df5d535f4c704d685a439054e7a9f3070ee080d778f4b89a5ae79ff5335","src/connection/test_internal.rs":"f3ebfe97b25c9c716d41406066295e5aff4e96a3051ef4e2b5fb258282bbc14c","src/connection/tests/ackrate.rs":"3a242d85de100dc7500074969fab12a64e62f6a48994a5486d28e15c27c4faa1","src/connection/tests/cc.rs":"e32a5e435435584147a832ef8af610b42e79650d2e3b23dcfea96a2056ca4311","src/connection/tests/close.rs":"c3b858cb403391879f7ed1d46790c65ff3fe05f80ace2cdb8b7128f974537fe7","src/connection/tests/datagram.rs":"7941f1917a78cfabb6f3d1b5fb010215c9278b75a39a2f568c1780304d5e98af","src/connection/tests/ecn.rs":"247cbc07eef9a39ca7c64e092f8237e91e264abd9b10e4e23a1d816c899f59c8","src/connection/tests/handshake.rs":"806bbc8386591276beefcfffeeee7de9da7caf7d97ae59368fda7021aaa948e4","src/connection/tests/idle.rs":"0ddcd7d736e45bc81e25b18e344753d00d53dba06b305006f7150d2446f63687","src/connection/tests/keys.rs":"6ced623655b18fbbd00a6b34663be8eccad0fd7b869029e11b71da3d731f63f6","src/connection/tests/migration.rs":"0c3499c6bb89cb2a89ad4252603292f00339142ce5236fc282351c01fd090886","src/connection/tests/mod.rs":"0b4e2385d376a08e37c4294b12c23e59fffaf973ce8931c4d37f5db03d83cc54","src/connection/tests/null.rs":"d39d34c895c40ea88bcc137cba43c34386ef9759c6f66f3487ffd41a5099feb8","src/connection/tests/priority.rs":"2f9ef42512cd05f5a3b7194b70ba0c25738b6f75901e4ca2258bf2cf2568d23a","src/connection/tests/recovery.rs":"fbc2353b6f9cbe4b047ec782c3a1108552f6f16e19bff29f3d41e7a42aa78060","src/connection/tests/resumption.rs":"1ff6b7005673f3bc9b791059946fbb4bf2b1f2677c737fa215e335e65bd0d582","src/connection/tests/stream.rs":"777e372827632172c5ceb1598f9b18bccf2a0a1ceba442ae09263dda58f0673e","src/connection/tests/vn.rs":"75127c42d20243ad553871b64a22b8c6953ca4d26bc0de898dfab34928d1e647","src/connection/tests/zerortt.rs":"94a5a705283c31f50f68a74c49d4bba4ba2a51d8122d9e50a14a831a902f8578","src/crypto.rs":"3ea51742021e6c4d3b7f69747a80baf35a1166f0a3caac521dc8aa5c3181e40b","src/ecn.rs":"1f0ee1cee631ecf08f6db73c909e29609ab513a58d3c7e7a6f3622486dcb8477","src/events.rs":"2c5d9ddef25e7547c9aff9688f4489bcb1788453293692c5bf0681e09d88b685","src/fc.rs":"7fc2a8eaf99235d1dc3734c04c37d8a0b14fe2463d71fbbc9ce2d946ebd0ee3a","src/frame.rs":"a085a0adf7dc319958d49c91462d2c661a547f902d82448fc55c7df86fb6817a","src/lib.rs":"2bfcf602f5a9d83fcd8c90daee6d38403c341a6974dca0347dde057141b6e8e7","src/pace.rs":"a6c6754a21b59b7955a570162f12015bdc65c5f0e497ce650062a5a92d5abb06","src/packet/metadata.rs":"68ee0b9350bcb8bc1078de728e49695cd784a48d106da0128c1006c371d49b84","src/packet/mod.rs":"b68c79515d8ff76cc693fba9b945596ef8b2227a3baccd1c49bccc6b51b4950e","src/packet/retry.rs":"12d4564f9fa682e82fb9604bcace35b478efdd35407c884cff839d9e02d7fadf","src/path.rs":"96c1fedd5c701905112e9aa586efd4bbc2d858b36abc5be12cca1319165c1590","src/pmtud.rs":"304433d6a905946481a04fc765becbfc33ff120f28a96d71d59a3034c39e642d","src/qlog.rs":"0011e04e264032de77470b6dcf57d49aa5d69572c080670e0d8a10f522874f42","src/quic_datagrams.rs":"8c3ad548a184ab8e7039bf180a983815daf490821b98bcd1211fd29eab41f3d6","src/recovery/mod.rs":"852bd9cc8e72ccf059e9ae7600977c024b5c2cca847d08cbac1052075f657229","src/recovery/sent.rs":"f6d4e90c99cf3c77d990748825f65a638bbdfe170d0d09774000ec3b705243e1","src/recovery/token.rs":"5a274b0587c7754344c270d06627b8dd42f556cae0e957a6855a709d130cb4ac","src/recv_stream.rs":"c4feed193f84de9f944d8102b3d49206a3dc52da8c86ca882f41588934e4c5c4","src/rtt.rs":"cbfa57cf7c258126a00d1bc5584cd3ead8a0f6f85be893c4a86497d6cfbe2323","src/send_stream.rs":"baa24dcf37b77e840b40937ae5b1b48692db8632c7e07c22bdbae23056e7bea0","src/sender.rs":"070077996bd07c25abd63d3cf26bee94fd53bbca951ae1e987a7d50558685e53","src/server.rs":"6a5dbfb1115905bda3c98238f9d4bbf6d7f661c3363c2ef0578eef865af6aef6","src/sni.rs":"1cbfd737226ad9b28887fb96793056e1f9e747b3769aea6cfd77da986d8cf2e1","src/stats.rs":"072f7afc190fc9eaf7db05ba84f8a76243d50602c61efece56fde14605012966","src/stream_id.rs":"8b7827e84a77de8107259c68060d095fbdc3fe434eb21eb9f044faedf0c9cbf8","src/streams.rs":"663688d56ddf556276c39c42aa20058d41dafda3458bfc1dc8e3683787853fbb","src/tparams.rs":"2188aea252e52d9a5bbfe05719dac9644af7aacb77a2a8ed1ed3ce865d35c6a2","src/tracking.rs":"53547e384b72175da0ea8cab25dfaa2c4b377ee0c2280c091f097b2aad5781f1","src/version.rs":"3676e8d34211599f344e4b9daa21d3897b3ce56b2cae738bbc6552db03d4bdad","tests/common/mod.rs":"8a2f781a16e74760ea57a09c4fc9adfe6a8ce56a6ecb7b1e9445e37125ea8d88","tests/conn_vectors.rs":"0e4a1b92c02b527842c127b789e70f6c4372c2b61b1a59a8e695f744ce155e2a","tests/connection.rs":"46be10c37090516c2fc4837059b3e5c8caf5ed7db9bc379ecf996a2f6e6b101a","tests/network.rs":"2e49aeca3dd1457758a13a56f48ddcd0d5af921e9aca59ed831b95ef4311dc1b","tests/retry.rs":"4306a4fd1d02449f1675882af1f09901a8ed4fe744a1daae189090292c81711c","tests/server.rs":"327880d12d84c3d164461888bc22311634a28eb0b559583a0126cbca0771fb59","tests/sni.rs":"2cbcfe218f43fa8c0a8da0497d8aed1ca2e590f41071428d85e3c3bca6135063","tests/stats.rs":"af8c1da46e984b55b172118aff4ad33be2375443f405e297d40981e65eb4d0cf"},"package":null} +\ No newline at end of file +diff --git a/third_party/rust/neqo-transport/src/crypto.rs b/third_party/rust/neqo-transport/src/crypto.rs +index f0ffbc40fa..219d005946 100644 +--- a/third_party/rust/neqo-transport/src/crypto.rs ++++ b/third_party/rust/neqo-transport/src/crypto.rs +@@ -22,7 +22,7 @@ use neqo_crypto::{ + PrivateKey, PublicKey, Record, RecordList, ResumptionToken, SymKey, ZeroRttChecker, + TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_CT_HANDSHAKE, + TLS_GRP_EC_SECP256R1, TLS_GRP_EC_SECP384R1, TLS_GRP_EC_SECP521R1, TLS_GRP_EC_X25519, +- TLS_GRP_KEM_MLKEM768X25519, TLS_VERSION_1_3, ++ TLS_GRP_KEM_MLKEM768X25519, TLS_GRP_KEM_MLKEM768SECP256R1, TLS_VERSION_1_3, + }; + + use crate::{ +@@ -81,6 +81,7 @@ impl Crypto { + ])?; + agent.set_groups(if conn_params.mlkem_enabled() { + &[ ++ TLS_GRP_KEM_MLKEM768SECP256R1, + TLS_GRP_KEM_MLKEM768X25519, + TLS_GRP_EC_X25519, + TLS_GRP_EC_SECP256R1, diff --git a/thunderbird-enable-ml-dsa-in-manager-ssl.patch b/thunderbird-enable-ml-dsa-in-manager-ssl.patch new file mode 100644 index 0000000..f130b7f --- /dev/null +++ b/thunderbird-enable-ml-dsa-in-manager-ssl.patch @@ -0,0 +1,48 @@ +diff --git a/security/manager/ssl/nsNSSCallbacks.cpp b/security/manager/ssl/nsNSSCallbacks.cpp +index 2dc48c9f4c..0a7b84d787 100644 +--- a/security/manager/ssl/nsNSSCallbacks.cpp ++++ b/security/manager/ssl/nsNSSCallbacks.cpp +@@ -722,6 +722,15 @@ nsCString getSignatureName(uint32_t aSignatureScheme) { + case ssl_sig_rsa_pkcs1_sha1md5: + signatureName = "RSA-PKCS1-SHA1MD5"_ns; + break; ++ case ssl_sig_mldsa44: ++ signatureName = "ML-DSA-44"_ns; ++ break; ++ case ssl_sig_mldsa65: ++ signatureName = "ML-DSA-65"_ns; ++ break; ++ case ssl_sig_mldsa87: ++ signatureName = "ML-DSA-87"_ns; ++ break; + // All other groups are not enabled in Firefox. See sEnabledSignatureSchemes + // in nsNSSIOLayer.cpp. + default: +@@ -1061,6 +1070,13 @@ void HandshakeCallback(PRFileDesc* fd, void* client_data) { + glean::ssl::auth_ecdsa_curve_full.AccumulateSingleSample( + ECCCurve(channelInfo.authKeyBits)); + break; ++ case ssl_auth_mldsa44: ++ case ssl_auth_mldsa65: ++ case ssl_auth_mldsa87: ++ /* TODO: add auth_mldsa_key_size_full in ssl/metrics.yaml ++ glean::ssl::auth_mldsa_key_size_full.AccumulateSingleSample( ++ NonECCKeySize(channelInfo.authKeyBits)); */ ++ break; + default: + MOZ_CRASH("impossible auth algorithm"); + break; +diff --git a/security/manager/ssl/nsNSSIOLayer.cpp b/security/manager/ssl/nsNSSIOLayer.cpp +index b1a5f5c2df..7443011b13 100644 +--- a/security/manager/ssl/nsNSSIOLayer.cpp ++++ b/security/manager/ssl/nsNSSIOLayer.cpp +@@ -1300,6 +1300,9 @@ static PRFileDesc* nsSSLIOLayerImportFD(PRFileDesc* fd, + // Please change getSignatureName in nsNSSCallbacks.cpp when changing the list + // here. See NOTE at SSL_SignatureSchemePrefSet call site. + static const SSLSignatureScheme sEnabledSignatureSchemes[] = { ++ ssl_sig_mldsa87, ++ ssl_sig_mldsa65, ++ ssl_sig_mldsa44, + ssl_sig_ecdsa_secp256r1_sha256, + ssl_sig_ecdsa_secp384r1_sha384, + ssl_sig_ecdsa_secp521r1_sha512, diff --git a/thunderbird-enable-ml-dsa-signature-verification-for-certificate-chain-validation.patch b/thunderbird-enable-ml-dsa-signature-verification-for-certificate-chain-validation.patch new file mode 100644 index 0000000..a14a70e --- /dev/null +++ b/thunderbird-enable-ml-dsa-signature-verification-for-certificate-chain-validation.patch @@ -0,0 +1,239 @@ +diff --git a/security/nss/lib/mozpkix/include/pkix/pkixder.h b/security/nss/lib/mozpkix/include/pkix/pkixder.h +index ac1ec24393..40eb5027af 100644 +--- a/security/nss/lib/mozpkix/include/pkix/pkixder.h ++++ b/security/nss/lib/mozpkix/include/pkix/pkixder.h +@@ -488,7 +488,7 @@ inline Result OptionalExtensions(Reader& input, uint8_t tag, + Result DigestAlgorithmIdentifier(Reader& input, + /*out*/ DigestAlgorithm& algorithm); + +-enum class PublicKeyAlgorithm { RSA_PKCS1, RSA_PSS, ECDSA }; ++enum class PublicKeyAlgorithm { RSA_PKCS1, RSA_PSS, ECDSA, MLDSA }; + + Result SignatureAlgorithmIdentifierValue( + Reader& input, +diff --git a/security/nss/lib/mozpkix/include/pkix/pkixnss.h b/security/nss/lib/mozpkix/include/pkix/pkixnss.h +index 6711959e71..b87e88a599 100644 +--- a/security/nss/lib/mozpkix/include/pkix/pkixnss.h ++++ b/security/nss/lib/mozpkix/include/pkix/pkixnss.h +@@ -50,6 +50,13 @@ Result VerifyECDSASignedDataNSS(Input data, DigestAlgorithm digestAlgorithm, + Input signature, Input subjectPublicKeyInfo, + void* pkcs11PinArg); + ++// Verifies the ML-DSA signature on the given data using the given ML-DSA ++// public key ++Result VerifyMLDSASignedDataNSS(Input data, ++ Input signature, ++ Input subjectPublicKeyInfo, ++ void* pkcs11PinArg); ++ + // Computes the digest of the given data using the given digest algorithm. + // + // item contains the data to hash. +diff --git a/security/nss/lib/mozpkix/include/pkix/pkixtypes.h b/security/nss/lib/mozpkix/include/pkix/pkixtypes.h +index 6a07d6e885..f24bd546e4 100644 +--- a/security/nss/lib/mozpkix/include/pkix/pkixtypes.h ++++ b/security/nss/lib/mozpkix/include/pkix/pkixtypes.h +@@ -334,6 +334,10 @@ class TrustDomain { + Input signature, + Input subjectPublicKeyInfo) = 0; + ++ virtual Result VerifyMLDSASignedData(Input data, ++ Input signature, ++ Input subjectPublicKeyInfo) = 0; ++ + // Check that the validity duration is acceptable. + // + // Return Success if the validity duration is acceptable, +diff --git a/security/nss/lib/mozpkix/lib/pkixc.cpp b/security/nss/lib/mozpkix/lib/pkixc.cpp +index 5dea13c43e..f797a3b3a1 100644 +--- a/security/nss/lib/mozpkix/lib/pkixc.cpp ++++ b/security/nss/lib/mozpkix/lib/pkixc.cpp +@@ -143,6 +143,15 @@ class CodeSigningTrustDomain final : public TrustDomain { + subjectPublicKeyInfo, nullptr); + } + ++ virtual Result VerifyMLDSASignedData(Input data, ++ Input signature, ++ Input subjectPublicKeyInfo) override { ++ return VerifyMLDSASignedDataNSS(data, ++ signature, ++ subjectPublicKeyInfo, ++ nullptr); ++ } ++ + virtual Result CheckValidityIsAcceptable(Time notBefore, Time notAfter, + EndEntityOrCA endEntityOrCA, + KeyPurposeId keyPurpose) override { +diff --git a/security/nss/lib/mozpkix/lib/pkixcheck.cpp b/security/nss/lib/mozpkix/lib/pkixcheck.cpp +index 8b7e1bf73e..4ce73f3944 100644 +--- a/security/nss/lib/mozpkix/lib/pkixcheck.cpp ++++ b/security/nss/lib/mozpkix/lib/pkixcheck.cpp +@@ -118,6 +118,9 @@ CheckSignatureAlgorithm(TrustDomain& trustDomain, + // for any curve that we support, the chances of us encountering a curve + // during path building is too low to be worth bothering with. + break; ++ ++ case der::PublicKeyAlgorithm::MLDSA: ++ break; + MOZILLA_PKIX_UNREACHABLE_DEFAULT_ENUM + } + +@@ -248,6 +251,24 @@ CheckSubjectPublicKeyInfoContents(Reader& input, TrustDomain& trustDomain, + 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01 + }; + ++ // Params for pure ML-DSA-44 signature ++ // python DottedOIDToCode.py id-ml-dsa-44 2.16.840.1.101.3.4.3.17 ++ static const uint8_t id_ml_dsa_44[] = { ++ 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x03, 0x11 ++ }; ++ ++ // Params for pure ML-DSA-65 signature ++ // python DottedOIDToCode.py id-ml-dsa-65 2.16.840.1.101.3.4.3.18 ++ static const uint8_t id_ml_dsa_65[] = { ++ 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x03, 0x12 ++ }; ++ ++ // Params for pure ML-DSA-87 signature ++ // python DottedOIDToCode.py id-ml-dsa-87 2.16.840.1.101.3.4.3.19 ++ static const uint8_t id_ml_dsa_87[] = { ++ 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x03, 0x13 ++ }; ++ + if (algorithmOID.MatchRest(id_ecPublicKey)) { + // An id-ecPublicKey AlgorithmIdentifier has a parameter that identifes + // the curve being used. Although RFC 5480 specifies multiple forms, we +@@ -361,6 +382,30 @@ CheckSubjectPublicKeyInfoContents(Reader& input, TrustDomain& trustDomain, + if (rv != Success) { + return rv; + } ++ } else if (algorithmOID.MatchRest(id_ml_dsa_44) || ++ algorithmOID.MatchRest(id_ml_dsa_65) || ++ algorithmOID.MatchRest(id_ml_dsa_87)) { ++ ++ /* ++ * The ML-DSA AlgorithmIdentifier is expected to contain only the OID, ++ * with no parameters field present. According to the Internet-Draft ++ * https://www.ietf.org/archive/id/draft-ietf-lamps-dilithium-certificates-11.html ++ * (Section 3), the AlgorithmIdentifier for ML-DSA variants must omit the `parameters` ++ * field entirely. ++ * In DER encoding, the absence of the parameters field means that after parsing the ++ * OID, no additional bytes should remain. Calling `der::End(algorithm)` confirms that ++ * this constraint is satisfied and that the structure is correctly encoded. ++ */ ++ rv = der::End(algorithm); ++ if (rv != Success) { ++ return rv; ++ } ++ ++ Input rawPublicKey; ++ rv = subjectPublicKeyReader.SkipToEnd(rawPublicKey); ++ if (rv != Success) { ++ return rv; ++ } + } else { + return Result::ERROR_UNSUPPORTED_KEYALG; + } +diff --git a/security/nss/lib/mozpkix/lib/pkixder.cpp b/security/nss/lib/mozpkix/lib/pkixder.cpp +index 59454c7d3c..4ff45ed566 100644 +--- a/security/nss/lib/mozpkix/lib/pkixder.cpp ++++ b/security/nss/lib/mozpkix/lib/pkixder.cpp +@@ -211,6 +211,24 @@ SignatureAlgorithmIdentifierValue(Reader& input, + 0x00, 0xa2, 0x03, 0x02, 0x01, 0x40 + }; + ++ // Params for pure ML-DSA-44 signature ++ // python DottedOIDToCode.py id-ml-dsa-44 2.16.840.1.101.3.4.3.17 ++ static const uint8_t id_ml_dsa_44[] = { ++ 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x03, 0x11 ++ }; ++ ++ // Params for pure ML-DSA-65 signature ++ // python DottedOIDToCode.py id-ml-dsa-65 2.16.840.1.101.3.4.3.18 ++ static const uint8_t id_ml_dsa_65[] = { ++ 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x03, 0x12 ++ }; ++ ++ // Params for pure ML-DSA-87 signature ++ // python DottedOIDToCode.py id-ml-dsa-87 2.16.840.1.101.3.4.3.19 ++ static const uint8_t id_ml_dsa_87[] = { ++ 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x03, 0x13 ++ }; ++ + // Matching is attempted based on a rough estimate of the commonality of the + // algorithm, to minimize the number of MatchRest calls. + if (algorithmID.MatchRest(sha256WithRSAEncryption)) { +@@ -252,6 +270,10 @@ SignatureAlgorithmIdentifierValue(Reader& input, + } else { + return Result::ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED; + } ++ } else if (algorithmID.MatchRest(id_ml_dsa_44) || ++ algorithmID.MatchRest(id_ml_dsa_65) || ++ algorithmID.MatchRest(id_ml_dsa_87)) { ++ publicKeyAlgorithm = PublicKeyAlgorithm::MLDSA; + } else { + return Result::ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED; + } +diff --git a/security/nss/lib/mozpkix/lib/pkixnss.cpp b/security/nss/lib/mozpkix/lib/pkixnss.cpp +index 606ef708d8..31aa1ddd67 100644 +--- a/security/nss/lib/mozpkix/lib/pkixnss.cpp ++++ b/security/nss/lib/mozpkix/lib/pkixnss.cpp +@@ -303,6 +303,44 @@ DigestBufNSS(Input item, + return Success; + } + ++Result ++VerifyMLDSASignedDataNSS(Input data, ++ Input signature, ++ Input subjectPublicKeyInfo, ++ void* pkcs11PinArg) ++{ ++ ScopedSECKEYPublicKey publicKey; ++ SECKEYPublicKey *pubk = NULL; ++ SECOidTag signaturePolicyTag, hashPolicyTag; ++ Result rv = SubjectPublicKeyInfoToSECKEYPublicKey(subjectPublicKeyInfo, ++ publicKey); ++ if (rv != Success) { ++ return rv; ++ } ++ ++ pubk = publicKey.get(); ++ SECItem signatureItem(UnsafeMapInputToSECItem(signature)); ++ SECItem dataItem(UnsafeMapInputToSECItem(data)); ++ CK_MECHANISM_TYPE mechanism; ++ ++ switch (pubk->u.mldsa.paramSet) { ++ case SEC_OID_ML_DSA_44: ++ case SEC_OID_ML_DSA_65: ++ case SEC_OID_ML_DSA_87: ++ mechanism = CKM_ML_DSA; ++ signaturePolicyTag = pubk->u.mldsa.paramSet; ++ hashPolicyTag = SEC_OID_UNKNOWN; ++ break; ++ default: ++ return Result::ERROR_UNSUPPORTED_KEYALG; ++ break; ++ } ++ ++ SECOidTag policyTags[2] = {signaturePolicyTag, hashPolicyTag}; ++ return VerifySignedData(pubk, mechanism, nullptr, &signatureItem, ++ &dataItem, policyTags, pkcs11PinArg); ++} ++ + Result + MapPRErrorCodeToResult(PRErrorCode error) + { +diff --git a/security/nss/lib/mozpkix/lib/pkixverify.cpp b/security/nss/lib/mozpkix/lib/pkixverify.cpp +index 8cb58bf7de..ff132d89df 100644 +--- a/security/nss/lib/mozpkix/lib/pkixverify.cpp ++++ b/security/nss/lib/mozpkix/lib/pkixverify.cpp +@@ -53,6 +53,9 @@ VerifySignedData(TrustDomain& trustDomain, + case der::PublicKeyAlgorithm::RSA_PSS: + return trustDomain.VerifyRSAPSSSignedData(signedData.data, + digestAlgorithm, signedData.signature, signerSubjectPublicKeyInfo); ++ case der::PublicKeyAlgorithm::MLDSA: ++ return trustDomain.VerifyMLDSASignedData(signedData.data, ++ signedData.signature, signerSubjectPublicKeyInfo); + MOZILLA_PKIX_UNREACHABLE_DEFAULT_ENUM + } + } diff --git a/thunderbird-integrate-ml-dsa-signature-verification-for-pkix-certificate-chain-validation.patch b/thunderbird-integrate-ml-dsa-signature-verification-for-pkix-certificate-chain-validation.patch new file mode 100644 index 0000000..9cb4553 --- /dev/null +++ b/thunderbird-integrate-ml-dsa-signature-verification-for-pkix-certificate-chain-validation.patch @@ -0,0 +1,247 @@ +diff --git a/netwerk/protocol/http/WebTransportCertificateVerifier.cpp b/netwerk/protocol/http/WebTransportCertificateVerifier.cpp +index cc778640a1..298d6a61e8 100644 +--- a/netwerk/protocol/http/WebTransportCertificateVerifier.cpp ++++ b/netwerk/protocol/http/WebTransportCertificateVerifier.cpp +@@ -53,6 +53,10 @@ class ServerCertHashesTrustDomain : public mozilla::pkix::TrustDomain { + mozilla::pkix::Input signature, + mozilla::pkix::Input subjectPublicKeyInfo) override; + ++ virtual mozilla::pkix::Result VerifyMLDSASignedData( ++ mozilla::pkix::Input data, mozilla::pkix::Input signature, ++ mozilla::pkix::Input subjectPublicKeyInfo) override; ++ + virtual mozilla::pkix::Result DigestBuf( + mozilla::pkix::Input item, mozilla::pkix::DigestAlgorithm digestAlg, + /*out*/ uint8_t* digestBuf, size_t digestBufLen) override; +@@ -151,6 +155,14 @@ mozilla::pkix::Result ServerCertHashesTrustDomain::VerifyECDSASignedData( + return mozilla::pkix::Result::FATAL_ERROR_LIBRARY_FAILURE; + } + ++mozilla::pkix::Result ServerCertHashesTrustDomain::VerifyMLDSASignedData( ++ mozilla::pkix::Input data, mozilla::pkix::Input signature, ++ mozilla::pkix::Input subjectPublicKeyInfo) { ++ MOZ_ASSERT_UNREACHABLE("not expecting this to be called"); ++ ++ return mozilla::pkix::Result::FATAL_ERROR_LIBRARY_FAILURE; ++} ++ + mozilla::pkix::Result ServerCertHashesTrustDomain::DigestBuf( + mozilla::pkix::Input item, mozilla::pkix::DigestAlgorithm digestAlg, + /*out*/ uint8_t* digestBuf, size_t digestBufLen) { +diff --git a/security/certverifier/CertVerifier.cpp b/security/certverifier/CertVerifier.cpp +index ca330770fb..1e8f1d4996 100644 +--- a/security/certverifier/CertVerifier.cpp ++++ b/security/certverifier/CertVerifier.cpp +@@ -7,6 +7,7 @@ + #include "CertVerifier.h" + + #include ++#include + + #include "AppTrustDomain.h" + #include "CTKnownLogs.h" +@@ -1010,7 +1011,7 @@ Result CertVerifier::VerifySSLServerCert( + void HashSignatureParams(pkix::Input data, pkix::Input signature, + pkix::Input subjectPublicKeyInfo, + pkix::der::PublicKeyAlgorithm publicKeyAlgorithm, +- pkix::DigestAlgorithm digestAlgorithm, ++ std::optional digestAlgorithm, + /*out*/ Maybe>& sha512Hash) { + sha512Hash.reset(); + Digest digest; +@@ -1048,10 +1049,14 @@ void HashSignatureParams(pkix::Input data, pkix::Input signature, + sizeof(publicKeyAlgorithm)))) { + return; + } +- if (NS_FAILED( +- digest.Update(reinterpret_cast(&digestAlgorithm), +- sizeof(digestAlgorithm)))) { +- return; ++ // There is no fallback digest algorithm when it's empty. ++ // Check that digestAlgorithm actually contains a value. ++ if (digestAlgorithm) { ++ pkix::DigestAlgorithm value = digestAlgorithm.value(); ++ if (NS_FAILED(digest.Update(reinterpret_cast(&value), ++ sizeof(value)))) { ++ return; ++ } + } + nsTArray result; + if (NS_FAILED(digest.End(result))) { +@@ -1064,10 +1069,17 @@ Result VerifySignedDataWithCache( + der::PublicKeyAlgorithm publicKeyAlg, + mozilla::glean::impl::DenominatorMetric telemetryDenominator, + mozilla::glean::impl::NumeratorMetric telemetryNumerator, Input data, +- DigestAlgorithm digestAlgorithm, Input signature, ++ std::optional digestAlgorithm, Input signature, + Input subjectPublicKeyInfo, SignatureCache* signatureCache, void* pinArg) { + telemetryDenominator.Add(1); + Maybe> sha512Hash; ++ ++ // Currently, it is only acceptable for `digestAlgorithm` to be null when the ++ // public key algorithm is pure ML-DSA. Fail immediately otherwise. ++ if ((publicKeyAlg != der::PublicKeyAlgorithm::MLDSA) && !digestAlgorithm) { ++ return Result::ERROR_INVALID_ALGORITHM; ++ } ++ + HashSignatureParams(data, signature, subjectPublicKeyInfo, publicKeyAlg, + digestAlgorithm, sha512Hash); + // If hashing the signature parameters succeeded, see if this signature is in +@@ -1080,16 +1092,23 @@ Result VerifySignedDataWithCache( + Result result; + switch (publicKeyAlg) { + case der::PublicKeyAlgorithm::ECDSA: +- result = VerifyECDSASignedDataNSS(data, digestAlgorithm, signature, +- subjectPublicKeyInfo, pinArg); ++ result = ++ VerifyECDSASignedDataNSS(data, digestAlgorithm.value(), signature, ++ subjectPublicKeyInfo, pinArg); + break; + case der::PublicKeyAlgorithm::RSA_PKCS1: +- result = VerifyRSAPKCS1SignedDataNSS(data, digestAlgorithm, signature, +- subjectPublicKeyInfo, pinArg); ++ result = ++ VerifyRSAPKCS1SignedDataNSS(data, digestAlgorithm.value(), signature, ++ subjectPublicKeyInfo, pinArg); + break; + case der::PublicKeyAlgorithm::RSA_PSS: +- result = VerifyRSAPSSSignedDataNSS(data, digestAlgorithm, signature, +- subjectPublicKeyInfo, pinArg); ++ result = ++ VerifyRSAPSSSignedDataNSS(data, digestAlgorithm.value(), signature, ++ subjectPublicKeyInfo, pinArg); ++ break; ++ case der::PublicKeyAlgorithm::MLDSA: ++ result = VerifyMLDSASignedDataNSS(data, signature, subjectPublicKeyInfo, ++ pinArg); + break; + default: + MOZ_ASSERT_UNREACHABLE("unhandled public key algorithm"); +diff --git a/security/certverifier/CertVerifier.h b/security/certverifier/CertVerifier.h +index 6432547c8a..6e09e6fcdd 100644 +--- a/security/certverifier/CertVerifier.h ++++ b/security/certverifier/CertVerifier.h +@@ -331,7 +331,8 @@ mozilla::pkix::Result VerifySignedDataWithCache( + mozilla::pkix::der::PublicKeyAlgorithm publicKeyAlg, + mozilla::glean::impl::DenominatorMetric telemetryDenominator, + mozilla::glean::impl::NumeratorMetric telemetryNumerator, +- mozilla::pkix::Input data, mozilla::pkix::DigestAlgorithm digestAlgorithm, ++ mozilla::pkix::Input data, ++ std::optional digestAlgorithm, + mozilla::pkix::Input signature, mozilla::pkix::Input subjectPublicKeyInfo, + SignatureCache* signatureCache, void* pinArg); + +diff --git a/security/certverifier/NSSCertDBTrustDomain.cpp b/security/certverifier/NSSCertDBTrustDomain.cpp +index 70ba17d70f..a3ace3cee7 100644 +--- a/security/certverifier/NSSCertDBTrustDomain.cpp ++++ b/security/certverifier/NSSCertDBTrustDomain.cpp +@@ -1541,6 +1541,15 @@ Result NSSCertDBTrustDomain::VerifyECDSASignedData( + signature, subjectPublicKeyInfo, mSignatureCache, mPinArg); + } + ++Result NSSCertDBTrustDomain::VerifyMLDSASignedData(Input data, Input signature, ++ Input subjectPublicKeyInfo) { ++ return VerifySignedDataWithCache( ++ der::PublicKeyAlgorithm::MLDSA, ++ mozilla::glean::cert_signature_cache::total, ++ mozilla::glean::cert_signature_cache::hits, data, std::nullopt, signature, ++ subjectPublicKeyInfo, mSignatureCache, mPinArg); ++} ++ + Result NSSCertDBTrustDomain::CheckValidityIsAcceptable( + Time notBefore, Time notAfter, EndEntityOrCA endEntityOrCA, + KeyPurposeId keyPurpose) { +diff --git a/security/certverifier/NSSCertDBTrustDomain.h b/security/certverifier/NSSCertDBTrustDomain.h +index fc210f3254..6178201758 100644 +--- a/security/certverifier/NSSCertDBTrustDomain.h ++++ b/security/certverifier/NSSCertDBTrustDomain.h +@@ -197,6 +197,10 @@ class NSSCertDBTrustDomain : public mozilla::pkix::TrustDomain { + mozilla::pkix::Input signature, + mozilla::pkix::Input subjectPublicKeyInfo) override; + ++ virtual Result VerifyMLDSASignedData( ++ mozilla::pkix::Input data, mozilla::pkix::Input signature, ++ mozilla::pkix::Input subjectPublicKeyInfo) override; ++ + virtual Result DigestBuf(mozilla::pkix::Input item, + mozilla::pkix::DigestAlgorithm digestAlg, + /*out*/ uint8_t* digestBuf, +diff --git a/security/ct/CTLogVerifier.cpp b/security/ct/CTLogVerifier.cpp +index d5e665aaca..471213745d 100644 +--- a/security/ct/CTLogVerifier.cpp ++++ b/security/ct/CTLogVerifier.cpp +@@ -99,6 +99,10 @@ class SignatureParamsTrustDomain final : public TrustDomain { + return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE; + } + ++ pkix::Result VerifyMLDSASignedData(Input, Input, Input) override { ++ return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE; ++ } ++ + pkix::Result CheckValidityIsAcceptable(Time, Time, EndEntityOrCA, + KeyPurposeId) override { + return pkix::Result::FATAL_ERROR_LIBRARY_FAILURE; +diff --git a/security/ct/tests/gtest/CTTestUtils.cpp b/security/ct/tests/gtest/CTTestUtils.cpp +index 6a25307ec3..dbec7adc91 100644 +--- a/security/ct/tests/gtest/CTTestUtils.cpp ++++ b/security/ct/tests/gtest/CTTestUtils.cpp +@@ -807,6 +807,12 @@ class OCSPExtensionTrustDomain : public TrustDomain { + subjectPublicKeyInfo, nullptr); + } + ++ pkix::Result VerifyMLDSASignedData(Input data, Input signature, ++ Input subjectPublicKeyInfo) override { ++ return VerifyMLDSASignedDataNSS(data, signature, subjectPublicKeyInfo, ++ nullptr); ++ } ++ + pkix::Result CheckValidityIsAcceptable(Time, Time, EndEntityOrCA, + KeyPurposeId) override { + ADD_FAILURE(); +diff --git a/security/manager/ssl/AppTrustDomain.cpp b/security/manager/ssl/AppTrustDomain.cpp +index ab49d7eb1f..3963f90eb1 100644 +--- a/security/manager/ssl/AppTrustDomain.cpp ++++ b/security/manager/ssl/AppTrustDomain.cpp +@@ -322,6 +322,12 @@ pkix::Result AppTrustDomain::VerifyECDSASignedData( + subjectPublicKeyInfo, nullptr); + } + ++pkix::Result AppTrustDomain::VerifyMLDSASignedData(Input data, Input signature, ++ Input subjectPublicKeyInfo) { ++ return VerifyMLDSASignedDataNSS(data, signature, subjectPublicKeyInfo, ++ nullptr); ++} ++ + pkix::Result AppTrustDomain::CheckValidityIsAcceptable( + Time /*notBefore*/, Time /*notAfter*/, EndEntityOrCA /*endEntityOrCA*/, + KeyPurposeId /*keyPurpose*/) { +diff --git a/security/manager/ssl/AppTrustDomain.h b/security/manager/ssl/AppTrustDomain.h +index 4b0212ede0..85fdff5f13 100644 +--- a/security/manager/ssl/AppTrustDomain.h ++++ b/security/manager/ssl/AppTrustDomain.h +@@ -80,6 +80,9 @@ class AppTrustDomain final : public mozilla::pkix::TrustDomain { + mozilla::pkix::DigestAlgorithm digestAlg, + /*out*/ uint8_t* digestBuf, + size_t digestBufLen) override; ++ virtual Result VerifyMLDSASignedData( ++ mozilla::pkix::Input data, mozilla::pkix::Input signature, ++ mozilla::pkix::Input subjectPublicKeyInfo) override; + + private: + nsTArray> mTrustedRoots; +diff --git a/security/manager/ssl/TLSClientAuthCertSelection.cpp b/security/manager/ssl/TLSClientAuthCertSelection.cpp +index 3a84b15ee6..a3dc5a1af1 100644 +--- a/security/manager/ssl/TLSClientAuthCertSelection.cpp ++++ b/security/manager/ssl/TLSClientAuthCertSelection.cpp +@@ -217,6 +217,11 @@ class ClientAuthCertNonverifyingTrustDomain final : public TrustDomain { + pkix::Input subjectPublicKeyInfo) override { + return pkix::Success; + } ++ virtual mozilla::pkix::Result VerifyMLDSASignedData( ++ pkix::Input data, pkix::Input signature, ++ pkix::Input subjectPublicKeyInfo) override { ++ return pkix::Success; ++ } + virtual mozilla::pkix::Result CheckValidityIsAcceptable( + pkix::Time notBefore, pkix::Time notAfter, + pkix::EndEntityOrCA endEntityOrCA, diff --git a/thunderbird-anolis-default-prefs.js.an8 b/thunderbird-redhat-default-prefs.js similarity index 81% rename from thunderbird-anolis-default-prefs.js.an8 rename to thunderbird-redhat-default-prefs.js index e54f49c..f13ee5b 100644 --- a/thunderbird-anolis-default-prefs.js.an8 +++ b/thunderbird-redhat-default-prefs.js @@ -1,19 +1,17 @@ pref("app.update.enabled", false); pref("app.update.autoInstallEnabled", false); -/* Allow users to set custom colors */ -/* pref("browser.display.use_system_colors", true); */ -pref("general.useragent.vendor", "Anolis OS"); +/* Allow users to set custom colors*/ +/* pref("browser.display.use_system_colors", true);*/ +pref("general.useragent.vendor", "Red Hat"); pref("general.useragent.vendorSub", "THUNDERBIRD_RPM_VR"); pref("intl.locale.matchOS", true); pref("mail.shell.checkDefaultClient", false); pref("toolkit.networkmanager.disable", false); pref("offline.autoDetect", true); -/* Disable global indexing by default */ +/* Disable global indexing by default*/ pref("mailnews.database.global.indexer.enabled", false); -/* Do not switch to Smart Folders after upgrade to 3.0b4 */ -pref("mail.folder.views.version", "1"); pref("extensions.shownSelectionUI", true); pref("extensions.autoDisableScopes", 0); diff --git a/thunderbird-system-nss-replace-xyber-with-mlkem.patch b/thunderbird-system-nss-replace-xyber-with-mlkem.patch deleted file mode 100644 index 26db8ba..0000000 --- a/thunderbird-system-nss-replace-xyber-with-mlkem.patch +++ /dev/null @@ -1,105 +0,0 @@ -diff --git a/comm/third_party/rust/neqo-crypto/.cargo-checksum.json b/comm/third_party/rust/neqo-crypto/.cargo-checksum.json -index 188160d135..bea265565f 100644 ---- a/comm/third_party/rust/neqo-crypto/.cargo-checksum.json -+++ b/comm/third_party/rust/neqo-crypto/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"Cargo.toml":"fa915d4cac0a051c77107dd6f74514915fe2924fe3eecaad10e995062767fbbb","bindings/bindings.toml":"56921b753535f899b8095df3e8af04b1dc2213c4808dfb39734a3c554454d01d","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"6c3e94359395cce5cb29bc0063ff930ffcd7edd50c040cb459acce6c80aa4ef4","min_version.txt":"7e98f86c69cddb4f65cf96a6de1f4297e3ce224a4c4628609e29042b6c4dcfb9","src/aead.rs":"fc42bc20b84d2e5ccfd56271ae2d2db082e55586ea2926470c102da177f22296","src/aead_null.rs":"3a553f21126c9ca0116c2be81e5a777011b33c159fd88c4f384614bbdb06bb2e","src/agent.rs":"0ef7b488480d12c01a122050e82809bc784443ef6277d75fce21d706fbf5eaaf","src/agentio.rs":"415f70b95312d3ee6d74ba6f28094246101ab6d535aa9df880c38d8bb5a9279e","src/auth.rs":"ced1a18f691894984244088020ea25dc1ee678603317f0c7dfc8b8842fa750b4","src/cert.rs":"8942cb3ce25a61f92b6ffc30fb286052ed6f56eeda3be12fd46ea76ceba6c1cf","src/constants.rs":"f5c779db128a8b0607841ca18c376971017eb327e102e5e6959a7d8effe4b3a6","src/ech.rs":"9d322fcc01c0886f1dfe9bb6273cb9f88a746452ac9a802761b1816a05930c1f","src/err.rs":"ae979f334604aba89640c4491262641910033f0bd790d58671f649f5039b291c","src/exp.rs":"cec59d61fc95914f9703d2fb6490a8507af993c9db710dde894f2f8fd38123c7","src/ext.rs":"cbf7d9f5ecabf4b8c9efd6c334637ab1596ec5266d38ab8d2d6ceae305283deb","src/hkdf.rs":"ef32f20e30a9bd7f094199536d19c87c4231b7fbbe4a9c54c70e84ca9c6575be","src/hp.rs":"644f1bed67f1c6189a67c8d02ab3358aaa7f63af4b913dd7395becbc01a84291","src/lib.rs":"1f2c171e76f353c99cebe66f9812d3021ab2914eb015fed6a07409b7cfa426e6","src/min_version.rs":"89b7ef6f9d2301db4f689f4d963b58375d577f705b92003a804048441e00cfd1","src/p11.rs":"704c5f164c4f195c8051c5bf1e69a912c34b613a8cf6bed5f577dc5674eea34e","src/prio.rs":"e5e169296c0ac69919c59fb6c1f8bd6bf079452eaa13d75da0edd41d435d3f6f","src/replay.rs":"96b7af8eff9e14313e79303092018b12e8834f780c96b8e247c497fdc680c696","src/result.rs":"0587cbb6aace71a7f9765ef7c01dcd9f73a49dcc6331e1d8fe4de2aef6ca65b6","src/secrets.rs":"4ffaa66f25df47dadf042063bff5953effa7bf2f4920cafe827757d6a659cb58","src/selfencrypt.rs":"b7cc1c896c7661c37461fc3a8bcbfdf2589433b907fa5f968ae4f6907704b441","src/ssl.rs":"c83baa5518b81dd06f2e4072ea3c2d666ccdeb8b1ff6e3746eea9f1af47023a6","src/time.rs":"c71a01ff8aa2c0e97fb16ad620df4ed6b7cc1819ff93f46634e2f1c9551627ec","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"824735f88e487a3748200844e9481e81a72163ad74d82faa9aa16594d9b9bb25","tests/ext.rs":"1b047d23d9b224ad06eb65d8f3a7b351e263774e404c79bbcbe8f43790e29c18","tests/handshake.rs":"e892a2839b31414be16e96cdf3b1a65978716094700c1a4989229f7edbf578a0","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"b24fec53771c169be788772532d2617a5349196cf87d6444dc74214f7c73e92c","tests/init.rs":"616313cb38eac44b8c71a1d23a52a7d7b4c7c07d4c20dc9ea6600c3317f92613","tests/selfencrypt.rs":"8d10840b41629bf449a6b3a551377315e8a05ca26c6b041548748196652c5909"},"package":null} -\ No newline at end of file -+{"files":{"Cargo.toml":"fa915d4cac0a051c77107dd6f74514915fe2924fe3eecaad10e995062767fbbb","bindings/bindings.toml":"56921b753535f899b8095df3e8af04b1dc2213c4808dfb39734a3c554454d01d","bindings/nspr_err.h":"2d5205d017b536c2d838bcf9bc4ec79f96dd50e7bb9b73892328781f1ee6629d","bindings/nspr_error.h":"e41c03c77b8c22046f8618832c9569fbcc7b26d8b9bbc35eea7168f35e346889","bindings/nspr_io.h":"085b289849ef0e77f88512a27b4d9bdc28252bd4d39c6a17303204e46ef45f72","bindings/nspr_time.h":"2e637fd338a5cf0fd3fb0070a47f474a34c2a7f4447f31b6875f5a9928d0a261","bindings/nss_ciphers.h":"95ec6344a607558b3c5ba8510f463b6295f3a2fb3f538a01410531045a5f62d1","bindings/nss_init.h":"ef49045063782fb612aff459172cc6a89340f15005808608ade5320ca9974310","bindings/nss_p11.h":"0b81e64fe6db49b2ecff94edd850be111ef99ec11220e88ceb1c67be90143a78","bindings/nss_secerr.h":"713e8368bdae5159af7893cfa517dabfe5103cede051dee9c9557c850a2defc6","bindings/nss_ssl.h":"af222fb957b989e392e762fa2125c82608a0053aff4fb97e556691646c88c335","bindings/nss_sslerr.h":"24b97f092183d8486f774cdaef5030d0249221c78343570d83a4ee5b594210ae","bindings/nss_sslopt.h":"b7807eb7abdad14db6ad7bc51048a46b065a0ea65a4508c95a12ce90e59d1eea","build.rs":"6c3e94359395cce5cb29bc0063ff930ffcd7edd50c040cb459acce6c80aa4ef4","min_version.txt":"7e98f86c69cddb4f65cf96a6de1f4297e3ce224a4c4628609e29042b6c4dcfb9","src/aead.rs":"fc42bc20b84d2e5ccfd56271ae2d2db082e55586ea2926470c102da177f22296","src/aead_null.rs":"3a553f21126c9ca0116c2be81e5a777011b33c159fd88c4f384614bbdb06bb2e","src/agent.rs":"0ef7b488480d12c01a122050e82809bc784443ef6277d75fce21d706fbf5eaaf","src/agentio.rs":"415f70b95312d3ee6d74ba6f28094246101ab6d535aa9df880c38d8bb5a9279e","src/auth.rs":"ced1a18f691894984244088020ea25dc1ee678603317f0c7dfc8b8842fa750b4","src/cert.rs":"8942cb3ce25a61f92b6ffc30fb286052ed6f56eeda3be12fd46ea76ceba6c1cf","src/constants.rs":"78df03f9209ff36279b75f88f6d3d15fed4a0fdd1f6edc8ea8100ed9ae34320f","src/ech.rs":"9d322fcc01c0886f1dfe9bb6273cb9f88a746452ac9a802761b1816a05930c1f","src/err.rs":"ae979f334604aba89640c4491262641910033f0bd790d58671f649f5039b291c","src/exp.rs":"cec59d61fc95914f9703d2fb6490a8507af993c9db710dde894f2f8fd38123c7","src/ext.rs":"cbf7d9f5ecabf4b8c9efd6c334637ab1596ec5266d38ab8d2d6ceae305283deb","src/hkdf.rs":"ef32f20e30a9bd7f094199536d19c87c4231b7fbbe4a9c54c70e84ca9c6575be","src/hp.rs":"644f1bed67f1c6189a67c8d02ab3358aaa7f63af4b913dd7395becbc01a84291","src/lib.rs":"f0d0b14c7330fa4040166953c4a428918ce78967fe500bfeaa5f2c10b64567b3","src/min_version.rs":"89b7ef6f9d2301db4f689f4d963b58375d577f705b92003a804048441e00cfd1","src/p11.rs":"704c5f164c4f195c8051c5bf1e69a912c34b613a8cf6bed5f577dc5674eea34e","src/prio.rs":"e5e169296c0ac69919c59fb6c1f8bd6bf079452eaa13d75da0edd41d435d3f6f","src/replay.rs":"96b7af8eff9e14313e79303092018b12e8834f780c96b8e247c497fdc680c696","src/result.rs":"0587cbb6aace71a7f9765ef7c01dcd9f73a49dcc6331e1d8fe4de2aef6ca65b6","src/secrets.rs":"4ffaa66f25df47dadf042063bff5953effa7bf2f4920cafe827757d6a659cb58","src/selfencrypt.rs":"b7cc1c896c7661c37461fc3a8bcbfdf2589433b907fa5f968ae4f6907704b441","src/ssl.rs":"c83baa5518b81dd06f2e4072ea3c2d666ccdeb8b1ff6e3746eea9f1af47023a6","src/time.rs":"c71a01ff8aa2c0e97fb16ad620df4ed6b7cc1819ff93f46634e2f1c9551627ec","tests/aead.rs":"e36ae77802df1ea6d17cfd1bd2178a3706089577d6fd1554ca86e748b8b235b9","tests/agent.rs":"824735f88e487a3748200844e9481e81a72163ad74d82faa9aa16594d9b9bb25","tests/ext.rs":"1b047d23d9b224ad06eb65d8f3a7b351e263774e404c79bbcbe8f43790e29c18","tests/handshake.rs":"e892a2839b31414be16e96cdf3b1a65978716094700c1a4989229f7edbf578a0","tests/hkdf.rs":"1d2098dc8398395864baf13e4886cfd1da6d36118727c3b264f457ee3da6b048","tests/hp.rs":"b24fec53771c169be788772532d2617a5349196cf87d6444dc74214f7c73e92c","tests/init.rs":"616313cb38eac44b8c71a1d23a52a7d7b4c7c07d4c20dc9ea6600c3317f92613","tests/selfencrypt.rs":"8d10840b41629bf449a6b3a551377315e8a05ca26c6b041548748196652c5909"},"package":null} -diff --git a/comm/third_party/rust/neqo-crypto/src/constants.rs b/comm/third_party/rust/neqo-crypto/src/constants.rs -index daef3d3c56..7e6823fd01 100644 ---- a/comm/third_party/rust/neqo-crypto/src/constants.rs -+++ b/comm/third_party/rust/neqo-crypto/src/constants.rs -@@ -62,7 +62,7 @@ remap_enum! { - TLS_GRP_EC_SECP384R1 = ssl_grp_ec_secp384r1, - TLS_GRP_EC_SECP521R1 = ssl_grp_ec_secp521r1, - TLS_GRP_EC_X25519 = ssl_grp_ec_curve25519, -- TLS_GRP_KEM_XYBER768D00 = ssl_grp_kem_xyber768d00, -+ TLS_GRP_KEM_MLKEM768X25519 = ssl_grp_kem_mlkem768x25519, - } - } - -diff --git a/comm/third_party/rust/neqo-crypto/src/lib.rs b/comm/third_party/rust/neqo-crypto/src/lib.rs -index 9b8a478294..cb94d1f32b 100644 ---- a/comm/third_party/rust/neqo-crypto/src/lib.rs -+++ b/comm/third_party/rust/neqo-crypto/src/lib.rs -@@ -122,13 +122,6 @@ pub fn init() -> Res<()> { - - secstatus_to_res(unsafe { nss::NSS_NoDB_Init(null()) })?; - secstatus_to_res(unsafe { nss::NSS_SetDomesticPolicy() })?; -- secstatus_to_res(unsafe { -- p11::NSS_SetAlgorithmPolicy( -- p11::SECOidTag::SEC_OID_XYBER768D00, -- p11::NSS_USE_ALG_IN_SSL_KX, -- 0, -- ) -- })?; - - Ok(NssLoaded::NoDb) - }); -diff --git a/comm/third_party/rust/neqo-transport/.cargo-checksum.json b/comm/third_party/rust/neqo-transport/.cargo-checksum.json -index 79d2126b4a..a67d56971b 100644 ---- a/comm/third_party/rust/neqo-transport/.cargo-checksum.json -+++ b/comm/third_party/rust/neqo-transport/.cargo-checksum.json -@@ -1 +1 @@ --{"files":{"Cargo.toml":"2c18e43bca0b6e963cd3c169ed4b1dbf21de7e420b71be1d9cf1bf1bfcaa8d01","benches/range_tracker.rs":"590dd1f81c92e89ce28af1efdda583d85240438bd9c4c68767286d22a299ad4b","benches/rx_stream_orderer.rs":"53a008357703251a18100521a12d8fa9443c5601ddc3cbd1b3c2899074da4c4f","benches/transfer.rs":"94eb0ec1a0a7d0a4863ddc1c6d006521e52c1f2e7f03c69428b18f7eb827d33f","build.rs":"78ec79c93bf13c3a40ceef8bba1ea2eada61c8f2dfc15ea7bf117958d367949c","src/ackrate.rs":"4bb882e1069a0707dc85338b75327e2910c93ee5f36575767a0d58c4c41c9d4f","src/addr_valid.rs":"03c0b2ff85254179c5d425b12acfdcc6b1ea5735aeb0f604b9b3603451b3ef0a","src/cc/classic_cc.rs":"bd4999f21b6b7d754c8694345f40d0e99c1c3caba3d23a90bd9eb12798ef4979","src/cc/cubic.rs":"24c6913cc6346e5361007221c26e8096ece51583431fc3ab9c99e4ce4b0a9f5d","src/cc/mod.rs":"8031ed3d37bf780dd1364114149b1a1327656e7f481768548ad77db7006daf60","src/cc/new_reno.rs":"25d0921005688e0f0666efd0a4931b4f8cd44363587d98e5b6404818c5d05dd4","src/cc/tests/cubic.rs":"25ee2c60549bb8b3c1e9a915f148928a26b3f1c51e5f7fe6b646a437f520954c","src/cc/tests/mod.rs":"44f8df551e742ae1037cd1cdb85b2c1334c2e5ab3c23ed63d856dbc6b8743afc","src/cc/tests/new_reno.rs":"3cd7373063a3afecb6dfae7894edf959641d87d3de55d4abfa7742cd115fa358","src/cid.rs":"9686a3070c593cfca846d7549863728e31211b304b9fa876220f79bff5e24173","src/connection/dump.rs":"bd4fb55785fe42f5c94f7bcc14ccf4ae377d28b691fb55dbf1139ae9412b0ea9","src/connection/idle.rs":"6f588bab950620df322033abea5f8a731f5b6d88cbe68694b69ab8acea0745ae","src/connection/mod.rs":"72ab734a8d368b2f2d430899a65f5a8c64a21d797a0c3e6d3e53666ef8e0e740","src/connection/params.rs":"38e0b47c8cc5fbe602e3174d7a70df410829bc240b42f21cebd10818e606ef7c","src/connection/saved.rs":"97eb19792be3c4d721057021a43ea50a52f89a3cfa583d3d3dcf5d9144b332f5","src/connection/state.rs":"b1d4bdda3479e7957d1949a969281ecd8a3d88f4fbaff6dcf7ebbb576759339c","src/connection/test_internal.rs":"f3ebfe97b25c9c716d41406066295e5aff4e96a3051ef4e2b5fb258282bbc14c","src/connection/tests/ackrate.rs":"4a2b835575850ae4a14209d3e51883ecb1e69afb44ef91b5e13a5e6cb7174fab","src/connection/tests/cc.rs":"d9a0f00a8f439c4ea8d4b6fa689fbde8bd283256afdd68ec4a27f6638b729704","src/connection/tests/close.rs":"5f245fd134bc0759ef0c83a6d53e0a8d5a8e58dcdf203c750ec9121940272461","src/connection/tests/datagram.rs":"7d89e5293d5b50c7a54c9b48949c2c4c8ef5dc08f3e7e5f51654586578d65602","src/connection/tests/ecn.rs":"3ff05893154fb6a895fe4453db7cc54684ba3bdf268a36b69c36c4070768d7b4","src/connection/tests/handshake.rs":"67a6f090ed89ef6c63129f7e662dc1cfff3f291711a866dff3d779caa40e51c7","src/connection/tests/idle.rs":"2d588bd6570172ca08974931273b6c4645af3edca9ccac78499d7d2d5ecec86c","src/connection/tests/keys.rs":"7c58b255e9732711e13f2a3e1daa13ac9481d8c919a32ca62e70c850845a6b38","src/connection/tests/migration.rs":"40d4feba9957de7eef7391009996016af1a3052fabc7659680b64796cf9fb8bf","src/connection/tests/mod.rs":"43b7745e9722333f7bc851c70ccdfdd1dc4da3991a4b821fac677664719e760f","src/connection/tests/null.rs":"38f76a4ea15e6b11634d4374cb0f2a68bd250e5d35831edfce0fa48deeaa420d","src/connection/tests/priority.rs":"dd3504f52d3fce7a96441624bc1c82c733e6bb556b9b79d24d0f4fb4efaf5a9e","src/connection/tests/recovery.rs":"7f28767f3cca2ff60e3dcfa803e12ef043486a222f54681a8faf2ea2fee564a1","src/connection/tests/resumption.rs":"1a0de0993cd325224fc79a3c094d22636d5b122ab1123d16265d4fafb23574bd","src/connection/tests/stream.rs":"3a6b23be63e1901ea479749d8132db86959279329121fe5d51b34c3fef4d4d05","src/connection/tests/vn.rs":"92f61cfe4ccbb88f4f7c14f0e791bdece5368012922714d3dbd6a75bedb1b5a1","src/connection/tests/zerortt.rs":"139f25b992ee6f7e3cc31448f81e511386bb3b0e6691180c7f616b70c4864883","src/crypto.rs":"a0ff9053a13350e34aec02241eb2ae3e86d9f5af21065d5b8d71b7b229e00ced","src/ecn.rs":"2e54e0a57842070a80da61315b601085876351ef0272eaf65b8a59e32ecc4db8","src/events.rs":"3cdd7d5496b2745626db4ceb863b5a91ae943090a43a5816a1f9bcf873fba2be","src/fc.rs":"c8d10909912b6770e644aaec02cff6f89f557d5f40a246aa86654cf88c91d26e","src/frame.rs":"4262717662f155e62bb29c9f0cac295bbae96076eb2d92c27052a35f979aa196","src/lib.rs":"a8ab9b2204d50a3b6f6c1250ed0d47daafaef00c040b93dfa3c60195eeb07624","src/pace.rs":"86a674ac4d086148ea297214910458c3705918bd627b996ba8bbb12f2c4bf99e","src/packet/mod.rs":"16385a097363d3af6452c6dcb7f14fbd86e410dd42fa59435c5beea1699f77e9","src/packet/retry.rs":"d5f999485f21b388a7383cd011fc6e96109c1a9fb5aef79b19017df6844271ff","src/path.rs":"6a49a8a1cad609873f2cacca6489ba1a7a18cf238f7b8f6df2d0b0923edde3fd","src/qlog.rs":"07ea3a3e31ebf3819d40ff0dc4e4a88861db59f761542e9bc2e9e773eb555242","src/quic_datagrams.rs":"3d33ecb9e6e80c77b812e8260fc807352300fb2305a29b797259ae34c52b67c5","src/recovery/mod.rs":"4b1e45db1793785cda67fe804d1e6bc99b5f1a3ed3ff0f82e8164bc0aab11f8e","src/recovery/sent.rs":"959b70ed80b1061acf36bdd007f2b1baefbc8647c3a315d6fbd317884757beca","src/recovery/token.rs":"c1e4190c6733afd2bf5e60060d8ba3ab9fb136e02252e2480b281871a54d6066","src/recv_stream.rs":"f21ae0bb786901bb7d726a94cb3352607b0057128beaa331808137f2f57a330b","src/rtt.rs":"4635dc0c401b78a1fd9d34da6f9bf7f6e7f5be3a57ed9716e0efc8f0f94f1e47","src/send_stream.rs":"5b12a5543dd55d0d506eb64f828883b9761722a1558f16ecb90ce5a43587a2ff","src/sender.rs":"043be47e97d050532f12a564e78605cff7ff23e07639ea06059ebd85e0748f2f","src/server.rs":"3ededa0afd5e6b6888fc5ac9ce48e35e12974c338c7985f2b840e9dc76af0062","src/stats.rs":"257ab1242ea2e6bfac0900e6c4bdad794bc67b666930323d24e022e46b9be82b","src/stream_id.rs":"fd07cbb81709a54bdb0659f676ef851cd145c004b817044ede5b21e54fdb60e4","src/streams.rs":"f2e393dc73cc85c8339cb94daf6a09d3bde4d33d820fd6623ddd6b3d727d5fd5","src/tparams.rs":"592f29c9e2d2a63ff68b024ce23274896ed8ae83192b76b91f5e2991246682cd","src/tracking.rs":"c8581318cd7be3ca94ef4482341cfc1fdb70f934966c63a69335cb0bf5bd292a","src/version.rs":"182484ed9ecc2e17cab73cc61914a86a2d206936cab313825ae76fd37eeade77","tests/common/mod.rs":"7f9437d5efc38f4b9cabfece575e9168580e78e8638f46e538de58607f46ebb8","tests/conn_vectors.rs":"997702f4d8b8fa3b987b33077a0eb325e968b25b61fb4703532f8d97e1d4c98c","tests/connection.rs":"1c14853d61dad5f228a3e1a0becebb0c6826405de59ff601f43d5cb2fdb3f8ea","tests/network.rs":"04921aa5af583e842e6d2176a898fbfea747e831bbe292b5ef8441eaf546b93a","tests/retry.rs":"ace4a0baa36f7218c9942abc2b45b58f8c2dbd2b6004b469751e41b50f6f99d0","tests/server.rs":"9724460d7ac2f9d6af94baf6b3cf950900ae489412edc55d62609bacfcf02b09"},"package":null} -\ No newline at end of file -+{"files":{"Cargo.toml":"2c18e43bca0b6e963cd3c169ed4b1dbf21de7e420b71be1d9cf1bf1bfcaa8d01","benches/range_tracker.rs":"590dd1f81c92e89ce28af1efdda583d85240438bd9c4c68767286d22a299ad4b","benches/rx_stream_orderer.rs":"53a008357703251a18100521a12d8fa9443c5601ddc3cbd1b3c2899074da4c4f","benches/transfer.rs":"94eb0ec1a0a7d0a4863ddc1c6d006521e52c1f2e7f03c69428b18f7eb827d33f","build.rs":"78ec79c93bf13c3a40ceef8bba1ea2eada61c8f2dfc15ea7bf117958d367949c","src/ackrate.rs":"4bb882e1069a0707dc85338b75327e2910c93ee5f36575767a0d58c4c41c9d4f","src/addr_valid.rs":"03c0b2ff85254179c5d425b12acfdcc6b1ea5735aeb0f604b9b3603451b3ef0a","src/cc/classic_cc.rs":"bd4999f21b6b7d754c8694345f40d0e99c1c3caba3d23a90bd9eb12798ef4979","src/cc/cubic.rs":"24c6913cc6346e5361007221c26e8096ece51583431fc3ab9c99e4ce4b0a9f5d","src/cc/mod.rs":"8031ed3d37bf780dd1364114149b1a1327656e7f481768548ad77db7006daf60","src/cc/new_reno.rs":"25d0921005688e0f0666efd0a4931b4f8cd44363587d98e5b6404818c5d05dd4","src/cc/tests/cubic.rs":"25ee2c60549bb8b3c1e9a915f148928a26b3f1c51e5f7fe6b646a437f520954c","src/cc/tests/mod.rs":"44f8df551e742ae1037cd1cdb85b2c1334c2e5ab3c23ed63d856dbc6b8743afc","src/cc/tests/new_reno.rs":"3cd7373063a3afecb6dfae7894edf959641d87d3de55d4abfa7742cd115fa358","src/cid.rs":"9686a3070c593cfca846d7549863728e31211b304b9fa876220f79bff5e24173","src/connection/dump.rs":"bd4fb55785fe42f5c94f7bcc14ccf4ae377d28b691fb55dbf1139ae9412b0ea9","src/connection/idle.rs":"6f588bab950620df322033abea5f8a731f5b6d88cbe68694b69ab8acea0745ae","src/connection/mod.rs":"72ab734a8d368b2f2d430899a65f5a8c64a21d797a0c3e6d3e53666ef8e0e740","src/connection/params.rs":"38e0b47c8cc5fbe602e3174d7a70df410829bc240b42f21cebd10818e606ef7c","src/connection/saved.rs":"97eb19792be3c4d721057021a43ea50a52f89a3cfa583d3d3dcf5d9144b332f5","src/connection/state.rs":"b1d4bdda3479e7957d1949a969281ecd8a3d88f4fbaff6dcf7ebbb576759339c","src/connection/test_internal.rs":"f3ebfe97b25c9c716d41406066295e5aff4e96a3051ef4e2b5fb258282bbc14c","src/connection/tests/ackrate.rs":"4a2b835575850ae4a14209d3e51883ecb1e69afb44ef91b5e13a5e6cb7174fab","src/connection/tests/cc.rs":"d9a0f00a8f439c4ea8d4b6fa689fbde8bd283256afdd68ec4a27f6638b729704","src/connection/tests/close.rs":"5f245fd134bc0759ef0c83a6d53e0a8d5a8e58dcdf203c750ec9121940272461","src/connection/tests/datagram.rs":"7d89e5293d5b50c7a54c9b48949c2c4c8ef5dc08f3e7e5f51654586578d65602","src/connection/tests/ecn.rs":"3ff05893154fb6a895fe4453db7cc54684ba3bdf268a36b69c36c4070768d7b4","src/connection/tests/handshake.rs":"67a6f090ed89ef6c63129f7e662dc1cfff3f291711a866dff3d779caa40e51c7","src/connection/tests/idle.rs":"2d588bd6570172ca08974931273b6c4645af3edca9ccac78499d7d2d5ecec86c","src/connection/tests/keys.rs":"7c58b255e9732711e13f2a3e1daa13ac9481d8c919a32ca62e70c850845a6b38","src/connection/tests/migration.rs":"40d4feba9957de7eef7391009996016af1a3052fabc7659680b64796cf9fb8bf","src/connection/tests/mod.rs":"43b7745e9722333f7bc851c70ccdfdd1dc4da3991a4b821fac677664719e760f","src/connection/tests/null.rs":"38f76a4ea15e6b11634d4374cb0f2a68bd250e5d35831edfce0fa48deeaa420d","src/connection/tests/priority.rs":"dd3504f52d3fce7a96441624bc1c82c733e6bb556b9b79d24d0f4fb4efaf5a9e","src/connection/tests/recovery.rs":"7f28767f3cca2ff60e3dcfa803e12ef043486a222f54681a8faf2ea2fee564a1","src/connection/tests/resumption.rs":"1a0de0993cd325224fc79a3c094d22636d5b122ab1123d16265d4fafb23574bd","src/connection/tests/stream.rs":"3a6b23be63e1901ea479749d8132db86959279329121fe5d51b34c3fef4d4d05","src/connection/tests/vn.rs":"92f61cfe4ccbb88f4f7c14f0e791bdece5368012922714d3dbd6a75bedb1b5a1","src/connection/tests/zerortt.rs":"139f25b992ee6f7e3cc31448f81e511386bb3b0e6691180c7f616b70c4864883","src/crypto.rs":"033db48824fa541db728b43f25d5852d4c4de735c35d89151336649dd8d2429a","src/ecn.rs":"2e54e0a57842070a80da61315b601085876351ef0272eaf65b8a59e32ecc4db8","src/events.rs":"3cdd7d5496b2745626db4ceb863b5a91ae943090a43a5816a1f9bcf873fba2be","src/fc.rs":"c8d10909912b6770e644aaec02cff6f89f557d5f40a246aa86654cf88c91d26e","src/frame.rs":"4262717662f155e62bb29c9f0cac295bbae96076eb2d92c27052a35f979aa196","src/lib.rs":"a8ab9b2204d50a3b6f6c1250ed0d47daafaef00c040b93dfa3c60195eeb07624","src/pace.rs":"86a674ac4d086148ea297214910458c3705918bd627b996ba8bbb12f2c4bf99e","src/packet/mod.rs":"16385a097363d3af6452c6dcb7f14fbd86e410dd42fa59435c5beea1699f77e9","src/packet/retry.rs":"d5f999485f21b388a7383cd011fc6e96109c1a9fb5aef79b19017df6844271ff","src/path.rs":"6a49a8a1cad609873f2cacca6489ba1a7a18cf238f7b8f6df2d0b0923edde3fd","src/qlog.rs":"07ea3a3e31ebf3819d40ff0dc4e4a88861db59f761542e9bc2e9e773eb555242","src/quic_datagrams.rs":"3d33ecb9e6e80c77b812e8260fc807352300fb2305a29b797259ae34c52b67c5","src/recovery/mod.rs":"4b1e45db1793785cda67fe804d1e6bc99b5f1a3ed3ff0f82e8164bc0aab11f8e","src/recovery/sent.rs":"959b70ed80b1061acf36bdd007f2b1baefbc8647c3a315d6fbd317884757beca","src/recovery/token.rs":"c1e4190c6733afd2bf5e60060d8ba3ab9fb136e02252e2480b281871a54d6066","src/recv_stream.rs":"f21ae0bb786901bb7d726a94cb3352607b0057128beaa331808137f2f57a330b","src/rtt.rs":"4635dc0c401b78a1fd9d34da6f9bf7f6e7f5be3a57ed9716e0efc8f0f94f1e47","src/send_stream.rs":"5b12a5543dd55d0d506eb64f828883b9761722a1558f16ecb90ce5a43587a2ff","src/sender.rs":"043be47e97d050532f12a564e78605cff7ff23e07639ea06059ebd85e0748f2f","src/server.rs":"3ededa0afd5e6b6888fc5ac9ce48e35e12974c338c7985f2b840e9dc76af0062","src/stats.rs":"257ab1242ea2e6bfac0900e6c4bdad794bc67b666930323d24e022e46b9be82b","src/stream_id.rs":"fd07cbb81709a54bdb0659f676ef851cd145c004b817044ede5b21e54fdb60e4","src/streams.rs":"f2e393dc73cc85c8339cb94daf6a09d3bde4d33d820fd6623ddd6b3d727d5fd5","src/tparams.rs":"592f29c9e2d2a63ff68b024ce23274896ed8ae83192b76b91f5e2991246682cd","src/tracking.rs":"c8581318cd7be3ca94ef4482341cfc1fdb70f934966c63a69335cb0bf5bd292a","src/version.rs":"182484ed9ecc2e17cab73cc61914a86a2d206936cab313825ae76fd37eeade77","tests/common/mod.rs":"7f9437d5efc38f4b9cabfece575e9168580e78e8638f46e538de58607f46ebb8","tests/conn_vectors.rs":"997702f4d8b8fa3b987b33077a0eb325e968b25b61fb4703532f8d97e1d4c98c","tests/connection.rs":"c6755968255fb68795d9f1ae4ece73d7b674d8616d3512757309efd2c42c39d1","tests/network.rs":"04921aa5af583e842e6d2176a898fbfea747e831bbe292b5ef8441eaf546b93a","tests/retry.rs":"ace4a0baa36f7218c9942abc2b45b58f8c2dbd2b6004b469751e41b50f6f99d0","tests/server.rs":"9724460d7ac2f9d6af94baf6b3cf950900ae489412edc55d62609bacfcf02b09"},"package":null} -diff --git a/comm/third_party/rust/neqo-transport/src/crypto.rs b/comm/third_party/rust/neqo-transport/src/crypto.rs -index aca76b8bb9..3bfe7057bc 100644 ---- a/comm/third_party/rust/neqo-transport/src/crypto.rs -+++ b/comm/third_party/rust/neqo-transport/src/crypto.rs -@@ -21,7 +21,7 @@ use neqo_crypto::{ - TLS_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384, TLS_CHACHA20_POLY1305_SHA256, TLS_CT_HANDSHAKE, - TLS_EPOCH_APPLICATION_DATA, TLS_EPOCH_HANDSHAKE, TLS_EPOCH_INITIAL, TLS_EPOCH_ZERO_RTT, - TLS_GRP_EC_SECP256R1, TLS_GRP_EC_SECP384R1, TLS_GRP_EC_SECP521R1, TLS_GRP_EC_X25519, -- TLS_GRP_KEM_XYBER768D00, TLS_VERSION_1_3, -+ TLS_GRP_KEM_MLKEM768X25519, TLS_VERSION_1_3, - }; - - use crate::{ -@@ -78,9 +78,10 @@ impl Crypto { - ])?; - match &mut agent { - Agent::Server(c) => { -- // Clients do not send xyber shares by default, but servers should accept them. -+ // Clients do not send mlkem768x25519 shares by default, but servers should accept -+ // them. - c.set_groups(&[ -- TLS_GRP_KEM_XYBER768D00, -+ TLS_GRP_KEM_MLKEM768X25519, - TLS_GRP_EC_X25519, - TLS_GRP_EC_SECP256R1, - TLS_GRP_EC_SECP384R1, -diff --git a/comm/third_party/rust/neqo-transport/tests/connection.rs b/comm/third_party/rust/neqo-transport/tests/connection.rs -index 35167d0abd..7f9304e9c8 100644 ---- a/comm/third_party/rust/neqo-transport/tests/connection.rs -+++ b/comm/third_party/rust/neqo-transport/tests/connection.rs -@@ -279,12 +279,12 @@ fn overflow_crypto() { - } - - #[test] --fn test_handshake_xyber() { -+fn handshake_mlkem768x25519() { - let mut client = default_client(); - let mut server = default_server(); - - client -- .set_groups(&[neqo_crypto::TLS_GRP_KEM_XYBER768D00]) -+ .set_groups(&[neqo_crypto::TLS_GRP_KEM_MLKEM768X25519]) - .ok(); - client.send_additional_key_shares(0).ok(); - -@@ -293,10 +293,10 @@ fn test_handshake_xyber() { - assert_eq!(*server.state(), State::Confirmed); - assert_eq!( - client.tls_info().unwrap().key_exchange(), -- neqo_crypto::TLS_GRP_KEM_XYBER768D00 -+ neqo_crypto::TLS_GRP_KEM_MLKEM768X25519 - ); - assert_eq!( - server.tls_info().unwrap().key_exchange(), -- neqo_crypto::TLS_GRP_KEM_XYBER768D00 -+ neqo_crypto::TLS_GRP_KEM_MLKEM768X25519 - ); - } diff --git a/thunderbird.appdata.xml.in b/thunderbird.appdata.xml.in new file mode 100644 index 0000000..16c6ca8 --- /dev/null +++ b/thunderbird.appdata.xml.in @@ -0,0 +1,50 @@ + + + thunderbird + CC0-1.0 + Thunderbird + Thunderbird is a free and open source email, newsfeed, chat, and calendaring client + + +

+ Thunderbird is a free and open source email, newsfeed, chat, and + calendaring client, that’s easy to set up and customize. One of the core + principles of Thunderbird is the use and promotion of open standards - + this focus is a rejection of our world of closed platforms and services + that can’t communicate with each other. We want our users to have freedom + and choice in how they communicate. +

+

+ Thunderbird is an open source project, which means anyone can contribute + ideas, designs, code, and time helping fellow users. +

+
+ + Calendar + Email + Office + + + https://www.thunderbird.net/ + https://bugzilla.mozilla.org/ + https://support.mozilla.org/kb/thunderbird-faq/ + https://support.mozilla.org/products/thunderbird/ + https://www.thunderbird.net/donate/ + https://www.thunderbird.net/participate/ + + Mozilla + MPL-2.0 + Thunderbird Project + + + message/rfc822 + x-scheme-handler/mailto + text/calendar + text/vcard + text/x-vcard + + + + + jhorak@redhat.com +
diff --git a/thunderbird.spec b/thunderbird.spec index 049b9a8..2c7b1f2 100644 --- a/thunderbird.spec +++ b/thunderbird.spec @@ -1,4 +1,3 @@ -%define anolis_release .0.1 # Set for local builds only %global disable_toolsets 0 @@ -14,17 +13,17 @@ %{lua: function dist_to_rhel_minor(str, start) - match = string.match(str, ".module%+an8.%d+") + match = string.match(str, ".module%+el8.%d+") if match then return string.sub(match, 13) end - match = string.match(str, ".an8_%d+") + match = string.match(str, ".el8_%d+") if match then return string.sub(match, 6) end - match = string.match(str, ".an8") + match = string.match(str, ".el8") if match then - return 8 + return 10 end match = string.match(str, ".module%+el9.%d+") if match then @@ -56,14 +55,14 @@ end} %global bundle_nss 0 %if 0%{?rhel} == 8 - %if %{rhel_minor_version} < 8 + %if %{rhel_minor_version} <= 8 %global bundle_nss 1 %global system_nss 1 %global _build_id_links none %endif %endif %if 0%{?rhel} == 9 - %if %{rhel_minor_version} < 2 + %if %{rhel_minor_version} < 6 %global bundle_nss 1 %global system_nss 1 %global _build_id_links none @@ -72,11 +71,11 @@ end} %global dts_version 11 %global llvm_version 7.0 -%global nspr_version 4.35 -%global nspr_version_max 4.36 -%global nss_version 3.101 -%global nss_version_max 3.102 -%global rust_version 1.66 +%global nspr_version 4.36 +%global nspr_version_max 4.37 +%global nss_version 3.112 +%global nss_version_max 3.113 +%global rust_version 1.84 %global system_libvpx 0 # Toolsets setup @@ -93,7 +92,7 @@ end} # clang depends on gcc-toolset-14-gcc-c++ %global gts_version 14 %else - %global gts_version 13 + %global gts_version 14 %endif %endif @@ -128,7 +127,7 @@ end} # If set to .b2 or .b3 ... the processed source file needs to be renamed before upload, e.g. # thunderbird-102.8.0.b2.processed-source.tar.xz # When unset use processed source file name as is. -%global buildnum .b2 +#global buildnum .b2 %bcond_without langpacks @@ -138,8 +137,8 @@ end} Summary: Mozilla Thunderbird mail/newsgroup client Name: thunderbird -Version: 128.14.0 -Release: 3%{anolis_release}%{?dist} +Version: 140.5.0 +Release: 2%{?dist} URL: http://www.mozilla.org/projects/thunderbird/ License: MPLv1.1 or GPLv2+ or LGPLv2+ @@ -158,7 +157,6 @@ ExcludeArch: %{ix86} %endif %endif %endif -ExcludeArch: loongarch64 # We can't use the official tarball as it contains some test files that use # licenses that are rejected by Red Hat Legal. @@ -167,23 +165,24 @@ ExcludeArch: loongarch64 #Source0: https://archive.mozilla.org/pub/thunderbird/releases/%%{version}%%{?pre_version}/source/thunderbird-%%{version}%%{?pre_version}.processed-source.tar.xz Source0: thunderbird-%{version}%{?pre_version}%{?buildnum}.processed-source.tar.xz %if %{with langpacks} -Source1: thunderbird-langpacks-%{version}%{?pre_version}-20250819.tar.xz +Source1: thunderbird-langpacks-%{version}%{?pre_version}-20251111.tar.xz %endif Source2: cbindgen-vendor.tar.xz Source3: process-official-tarball Source10: thunderbird-mozconfig -Source12: thunderbird-anolis-default-prefs.js.an8 +Source12: thunderbird-redhat-default-prefs.js Source20: thunderbird.desktop Source21: thunderbird.sh.in Source24: mozilla-api-key Source25: thunderbird-symbolic.svg Source27: google-api-key Source32: node-stdout-nonblocking-wrapper +Source33: thunderbird.appdata.xml.in Source35: google-loc-api-key Source401: nss-setup-flags-env.inc -Source402: nspr-4.35.0-1.el8_1.src.rpm -Source403: nss-3.101.0-7.el8_2.src.rpm -Source404: nss-3.101.0-7.el9_2.src.rpm +Source402: nspr-4.36.0-2.el8_2.src.rpm +Source403: nss-3.112.0-4.el8_2.src.rpm +Source404: nss-3.112.0-1.el9_4.src.rpm # ---- RHEL specific patches --- # -- Downstream only -- @@ -194,15 +193,12 @@ Patch05: build-rhel7-lower-node-min-version.patch Patch06: build-ppc64-abiv2.patch Patch07: build-rhel7-nasm-dwarf.patch Patch09: disable-openpgp-in-thunderbird.patch -Patch10: build-ffvpx.patch # Due to some failed rpminspect unicode test we had to remove some test files from the tarball # To remove the files checksum from .cargo-checksums we need to add this patch Patch11: rust-file-removal.patch -# Patch a few and third_party/rust/neqo-crypto/ like in Firefox. -Patch12: firefox-system-nss-replace-xyber-with-mlkem.patch -# Thunderbird has a copy of third_party/rust/neqo-crypto/ in comm/third_party/rust/neqo-crypto/ -Patch13: thunderbird-system-nss-replace-xyber-with-mlkem.patch Patch14: build-cargo-lock-version.patch +Patch15: build-system-nss.patch +Patch16: build-tb-system-nss.patch # -- Upstreamed patches -- Patch51: mozilla-bmo1170092.patch @@ -221,6 +217,21 @@ Patch107: mozilla-bmo1716707-swizzle.patch Patch108: mozilla-bmo1716707-svg.patch Patch109: mozilla-bmo1789216-disable-av1.patch Patch110: build-libaom.patch +Patch111: av1-else-condition-add.patch + +# ML-DSA support +# https://phabricator.services.mozilla.com/D262395 +Patch120: thunderbird-integrate-ml-dsa-signature-verification-for-pkix-certificate-chain-validation.patch +# https://phabricator.services.mozilla.com/D262397 +Patch121: thunderbird-add-ml-dsa-certificate-support-to-certviewer.patch +# https://phabricator.services.mozilla.com/D264144 +Patch122: thunderbird-enable-ml-dsa-signature-verification-for-certificate-chain-validation.patch +# RHEL downstream only - adapts to ML-DSA support in NSS from RHEL 10 +Patch123: thunderbird-adapt-ml-dsa-support-to-rhel-nss.patch +# RHEL downstream only - enable ML-DSA in manager/ssl +Patch124: thunderbird-enable-ml-dsa-in-manager-ssl.patch +# RHEL downstream only - add mlkem768-secp256r1 support +Patch125: thunderbird-add-mlkem768-secp256r1-support.patch # ---- Fedora specific patches ---- Patch151: firefox-enable-addons.patch @@ -334,7 +345,6 @@ BuildRequires: zlib-devel BuildRequires: gcc-toolset-%{gts_version}-runtime BuildRequires: gcc-toolset-%{gts_version}-binutils BuildRequires: gcc-toolset-%{gts_version}-gcc -BuildRequires: gcc-toolset-%{gts_version}-gcc-c++ BuildRequires: gcc-toolset-%{gts_version}-gcc-plugin-annobin # Do not explicitly require gcc-toolset-%%{gts_version}-gcc-c++ instead fail # when clang is upgraded to depend on a later toolset and adjust version. @@ -362,134 +372,110 @@ Provides: webclient Provides: bundled(angle) Provides: bundled(aom) Provides: bundled(asn1js) -Provides: bundled(audioipc-2) Provides: bundled(bergamot-translator) Provides: bundled(brotli) Provides: bundled(bspatch) -Provides: bundled(bzip2) -Provides: bundled(cairo) Provides: bundled(cfworker) +Provides: bundled(chromium) Provides: bundled(cld2) Provides: bundled(content) Provides: bundled(content_analysis_sdk) -Provides: bundled(cubeb) -Provides: bundled(cups) +Provides: bundled(cts) Provides: bundled(d3) -Provides: bundled(d3.js) Provides: bundled(double-conversion) Provides: bundled(drm) Provides: bundled(expat) -Provides: bundled(fastText) Provides: bundled(fathom) Provides: bundled(fdlibm) -Provides: bundled(ffvpx) Provides: bundled(fluent.migratetb) +Provides: bundled(fmt) Provides: bundled(function2) Provides: bundled(gbm) Provides: bundled(gemmology) +Provides: bundled(glibc_hack) Provides: bundled(googletest) Provides: bundled(graphite2) Provides: bundled(harfbuzz) Provides: bundled(highway) Provides: bundled(hunspell) Provides: bundled(icaljs) -Provides: bundled(intgemm) Provides: bundled(irregexp) -Provides: bundled(jpeg-xl) +Provides: bundled(java) Provides: bundled(json-c) -Provides: bundled(kissfft) Provides: bundled(libaom) Provides: bundled(libcubeb) Provides: bundled(libdav1d) -Provides: bundled(libdrm) Provides: bundled(libepoxy) Provides: bundled(libfuzzer) -Provides: bundled(libgbm) -Provides: bundled(libjpeg) Provides: bundled(libjxl) -Provides: bundled(libmar) Provides: bundled(libmkv) Provides: bundled(libnestegg) Provides: bundled(libogg) Provides: bundled(libopus) Provides: bundled(libpng) -Provides: bundled(libprio) Provides: bundled(libsoundtouch) Provides: bundled(libspeex_resampler) Provides: bundled(libsrtp) -Provides: bundled(libtheora) -Provides: bundled(libtremor) Provides: bundled(libvorbis) Provides: bundled(libvpx) Provides: bundled(libwebp) -Provides: bundled(libwebrtc) Provides: bundled(libyuv) Provides: bundled(lit) Provides: bundled(MotionMark) -Provides: bundled(mp4parse-rust) Provides: bundled(msgpack) -Provides: bundled(msgpack-c) -Provides: bundled(mtransport) -Provides: bundled(nestegg) Provides: bundled(nICEr) -Provides: bundled(nimbus) -Provides: bundled(openmax_dl) -Provides: bundled(openmax_il) +Provides: bundled(opentelemetry-cpp) Provides: bundled(openvr) Provides: bundled(ots) -Provides: bundled(pdf.js) Provides: bundled(pdfjs) Provides: bundled(perfetto) Provides: bundled(picosha2) -Provides: bundled(PKI) Provides: bundled(PKI.js) Provides: bundled(puppeteer) Provides: bundled(pywebsocket3) -Provides: bundled(qcms) +Provides: bundled(qrcode) Provides: bundled(reader) Provides: bundled(rlbox) -Provides: bundled(rlbox_sandboxing_api) Provides: bundled(rlbox_wasm2c_sandbox) Provides: bundled(rnp) +Provides: bundled(sax-js) Provides: bundled(schemas) -Provides: bundled(sfntly) Provides: bundled(simde) -Provides: bundled(sipcc) -Provides: bundled(skia) -Provides: bundled(soundtouch) Provides: bundled(source-map) Provides: bundled(Speedometer3) Provides: bundled(sqlite3) +Provides: bundled(sqlite-vec) Provides: bundled(src) -Provides: bundled(thebes) -Provides: bundled(theora) -Provides: bundled(usrsctp) +Provides: bundled(transformers) Provides: bundled(vendor) Provides: bundled(vsdownload) -Provides: bundled(wabt) -Provides: bundled(wasm2c) Provides: bundled(wasm2c_sandbox_compiler) Provides: bundled(webaudio) Provides: bundled(webgl-conf) -Provides: bundled(WebRender) -Provides: bundled(wgpu) Provides: bundled(wgpu_bindings) +Provides: bundled(widevine-adapter) +Provides: bundled(wllama) Provides: bundled(woff2) Provides: bundled(xsimd) -Provides: bundled(xsimd) Provides: bundled(xz-embedded) -Provides: bundled(ycbcr) +Provides: bundled(zlib) Provides: bundled(zstd) Provides: bundled(Zycore) Provides: bundled(Zydis) # Thunderbird third party libraries -Provides: bundled(ANS1.js) -Provides: bundled(bzip2) + +Provides: bundled(asn1js) +Provides: bundled(fluent.migratetb) +Provides: bundled(icaljs) Provides: bundled(json-c) Provides: bundled(libgcrypt) Provides: bundled(libgpg-error) Provides: bundled(libotr) +Provides: bundled(qrcode) +Provides: bundled(rnp) +Provides: bundled(sax-js) +Provides: bundled(zlib) %if 0%{?bundle_nss} Provides: bundled(nss) = %{nss_version} @@ -500,159 +486,168 @@ Provides: bundled(nspr) = %{nspr_version} # List obtained by `get_rust_bundled_provides.sh build.log` script:: Provides: bundled(crate(aa-stroke)) = 0.1.0 Provides: bundled(crate(adler)) = 1.0.2 -Provides: bundled(crate(ahash)) = 0.8.11 Provides: bundled(crate(aho-corasick)) = 1.1.0 -Provides: bundled(crate(alsa)) = 0.8.1 +Provides: bundled(crate(allocator-api2)) = 0.2.999 Provides: bundled(crate(alsa-sys)) = 0.3.1 +Provides: bundled(crate(alsa)) = 0.8.1 +Provides: bundled(crate(ansi_term)) = 0.12.1 Provides: bundled(crate(anyhow)) = 1.0.69 Provides: bundled(crate(app_services_logger)) = 0.1.0 -Provides: bundled(crate(app_units)) = 0.7.3 +Provides: bundled(crate(app_units)) = 0.7.8 Provides: bundled(crate(arrayref)) = 0.3.6 -Provides: bundled(crate(arrayvec)) = 0.7.2 +Provides: bundled(crate(arraystring)) = 0.3.0 +Provides: bundled(crate(arrayvec)) = 0.7.6 Provides: bundled(crate(ash)) = 0.38.0+1.3.281 -Provides: bundled(crate(askama)) = 0.12.0 -Provides: bundled(crate(askama_derive)) = 0.12.1 -Provides: bundled(crate(askama_escape)) = 0.10.3 +Provides: bundled(crate(askama_derive)) = 0.13.1 +Provides: bundled(crate(askama_parser)) = 0.13.0 +Provides: bundled(crate(askama)) = 0.13.1 Provides: bundled(crate(async-task)) = 4.3.0 Provides: bundled(crate(async-trait)) = 0.1.68 Provides: bundled(crate(atomic_refcell)) = 0.1.9 Provides: bundled(crate(atty)) = 0.2.14 -Provides: bundled(crate(audioipc2)) = 0.6.0 Provides: bundled(crate(audioipc2-client)) = 0.6.0 Provides: bundled(crate(audioipc2-server)) = 0.6.0 +Provides: bundled(crate(audioipc2)) = 0.6.0 Provides: bundled(crate(audio_thread_priority)) = 0.32.0 -Provides: bundled(crate(authenticator)) = 0.4.0-alpha.24 +Provides: bundled(crate(authenticator)) = 0.4.1 Provides: bundled(crate(authrs_bridge)) = 0.1.0 Provides: bundled(crate(autocfg)) = 1.1.0 -Provides: bundled(crate(autocfg)) = 1.1.0 -Provides: bundled(crate(base64)) = 0.21.3 +Provides: bundled(crate(base64)) = 0.21.999 +Provides: bundled(crate(base64)) = 0.22.1 Provides: bundled(crate(basic-toml)) = 0.1.2 Provides: bundled(crate(bhttp)) = 0.3.1 Provides: bundled(crate(binary_http)) = 0.1.0 Provides: bundled(crate(bincode)) = 1.3.3 -Provides: bundled(crate(bindgen)) = 0.63.999 +Provides: bundled(crate(bindgen)) = 0.64.999 Provides: bundled(crate(bindgen)) = 0.69.4 -Provides: bundled(crate(bitflags)) = 1.3.2 Provides: bundled(crate(bitflags)) = 1.999.999 -Provides: bundled(crate(bitflags)) = 2.5.0 +Provides: bundled(crate(bitflags)) = 2.9.0 Provides: bundled(crate(bitreader)) = 0.3.6 -Provides: bundled(crate(bit-set)) = 0.5.3 -Provides: bundled(crate(bit-vec)) = 0.6.3 +Provides: bundled(crate(bit-set)) = 0.8.0 +Provides: bundled(crate(bit-vec)) = 0.8.0 Provides: bundled(crate(block-buffer)) = 0.10.3 Provides: bundled(crate(bookmark_sync)) = 0.1.0 +Provides: bundled(crate(buildid_reader_ffi)) = 0.1.0 Provides: bundled(crate(buildid_reader)) = 0.1.0 Provides: bundled(crate(build-parallel)) = 0.1.2 -Provides: bundled(crate(builtins-static)) = 0.1.0 Provides: bundled(crate(bumpalo)) = 3.15.4 +Provides: bundled(crate(bytemuck_derive)) = 1.9.3 +Provides: bundled(crate(bytemuck)) = 1.22.0 Provides: bundled(crate(byteorder)) = 1.5.0 Provides: bundled(crate(bytes)) = 1.4.0 Provides: bundled(crate(cache-padded)) = 1.2.0 +Provides: bundled(crate(calendrical_calculations)) = 0.1.1 Provides: bundled(crate(camino)) = 1.1.2 -Provides: bundled(crate(cargo_metadata)) = 0.15.3 +Provides: bundled(crate(cargo_metadata)) = 0.19.2 Provides: bundled(crate(cargo-platform)) = 0.1.2 Provides: bundled(crate(cascade_bloom_filter)) = 0.1.0 -Provides: bundled(crate(cbindgen)) = 0.26.0 -Provides: bundled(crate(cc)) = 1.0.89 +Provides: bundled(crate(cc)) = 1.2.12 Provides: bundled(crate(cert_storage)) = 0.0.1 Provides: bundled(crate(cexpr)) = 0.6.0 -Provides: bundled(crate(cfg_aliases)) = 0.1.1 +Provides: bundled(crate(cfg_aliases)) = 0.2.1 Provides: bundled(crate(cfg-if)) = 1.0.0 -Provides: bundled(crate(chardetng)) = 0.1.9 Provides: bundled(crate(chardetng_c)) = 0.1.2 -Provides: bundled(crate(chrono)) = 0.4.19 +Provides: bundled(crate(chardetng)) = 0.1.9 +Provides: bundled(crate(chrono)) = 0.4.40 Provides: bundled(crate(chunky-vec)) = 0.1.0 Provides: bundled(crate(clang-sys)) = 1.7.0 -Provides: bundled(crate(clap)) = 3.2.25 -Provides: bundled(crate(clap_lex)) = 0.2.4 +Provides: bundled(crate(clap)) = 2.34.0 +Provides: bundled(crate(clubcard-crlite)) = 0.3.0 +Provides: bundled(crate(clubcard)) = 0.3.2 Provides: bundled(crate(cmake)) = 0.1.999 -Provides: bundled(crate(codespan-reporting)) = 0.11.1 +Provides: bundled(crate(codespan-reporting)) = 0.12.0 +Provides: bundled(crate(context_id)) = 0.1.0 Provides: bundled(crate(core_maths)) = 0.1.0 -Provides: bundled(crate(cose)) = 0.1.4 Provides: bundled(crate(cose-c)) = 0.1.5 +Provides: bundled(crate(cose)) = 0.1.4 Provides: bundled(crate(cpufeatures)) = 0.2.8 -Provides: bundled(crate(crc32fast)) = 1.3.2 -Provides: bundled(crate(crossbeam-channel)) = 0.5.6 +Provides: bundled(crate(crc32fast)) = 1.4.2 +Provides: bundled(crate(crossbeam-channel)) = 0.5.13 Provides: bundled(crate(crossbeam-deque)) = 0.8.2 Provides: bundled(crate(crossbeam-epoch)) = 0.9.14 Provides: bundled(crate(crossbeam-queue)) = 0.3.8 -Provides: bundled(crate(crossbeam-utils)) = 0.8.14 +Provides: bundled(crate(crossbeam-utils)) = 0.8.20 Provides: bundled(crate(crypto-common)) = 0.1.6 Provides: bundled(crate(crypto_hash)) = 0.1.0 -Provides: bundled(crate(cssparser)) = 0.34.0 Provides: bundled(crate(cssparser-macros)) = 0.6.1 +Provides: bundled(crate(cssparser)) = 0.34.1 Provides: bundled(crate(cstr)) = 0.2.11 -Provides: bundled(crate(cubeb)) = 0.13.0 Provides: bundled(crate(cubeb-backend)) = 0.13.0 Provides: bundled(crate(cubeb-core)) = 0.13.0 Provides: bundled(crate(cubeb-pulse)) = 0.5.0 Provides: bundled(crate(cubeb-sys)) = 0.13.0 +Provides: bundled(crate(cubeb)) = 0.13.0 Provides: bundled(crate(dap_ffi)) = 0.1.0 -Provides: bundled(crate(darling)) = 0.20.1 -Provides: bundled(crate(darling_core)) = 0.20.1 -Provides: bundled(crate(darling_macro)) = 0.20.1 -Provides: bundled(crate(data-encoding)) = 2.3.3 +Provides: bundled(crate(darling_core)) = 0.20.10 +Provides: bundled(crate(darling_macro)) = 0.20.10 +Provides: bundled(crate(darling)) = 0.20.10 Provides: bundled(crate(data-encoding-ffi)) = 0.1.0 +Provides: bundled(crate(data-encoding)) = 2.3.3 Provides: bundled(crate(data_storage)) = 0.0.1 +Provides: bundled(crate(dbus-codegen)) = 0.9.1 +Provides: bundled(crate(dbus-tree)) = 0.9.2 Provides: bundled(crate(dbus)) = 0.6.5 +Provides: bundled(crate(dbus)) = 0.9.6 +Provides: bundled(crate(debug_tree)) = 0.4.0 Provides: bundled(crate(deranged)) = 0.3.11 -Provides: bundled(crate(derive_common)) = 0.0.1 +Provides: bundled(crate(derive_more-impl)) = 1.0.0-beta.2 Provides: bundled(crate(derive_more)) = 0.99.999 Provides: bundled(crate(derive_more)) = 1.0.0-beta.2 -Provides: bundled(crate(derive_more-impl)) = 1.0.0-beta.2 -Provides: bundled(crate(digest)) = 0.10.6 -Provides: bundled(crate(diplomat)) = 0.7.0 -Provides: bundled(crate(diplomat_core)) = 0.7.0 -Provides: bundled(crate(diplomat-runtime)) = 0.7.0 -Provides: bundled(crate(dirs)) = 4.0.0 +Provides: bundled(crate(digest)) = 0.10.7 +Provides: bundled(crate(diplomat_core)) = 0.8.0 +Provides: bundled(crate(diplomat-runtime)) = 0.8.0 +Provides: bundled(crate(diplomat)) = 0.8.0 Provides: bundled(crate(dirs-sys)) = 0.3.7 +Provides: bundled(crate(dirs)) = 4.0.0 Provides: bundled(crate(displaydoc)) = 0.2.4 Provides: bundled(crate(dns-parser)) = 0.8.0 -Provides: bundled(crate(document-features)) = 0.2.8 +Provides: bundled(crate(document-features)) = 0.2.11 Provides: bundled(crate(dogear)) = 0.5.0 -Provides: bundled(crate(dom)) = 0.1.0 Provides: bundled(crate(dom_fragmentdirectives)) = 0.1.0 -Provides: bundled(crate(dtoa)) = 0.4.8 +Provides: bundled(crate(dom)) = 0.1.0 Provides: bundled(crate(dtoa-short)) = 0.3.3 +Provides: bundled(crate(dtoa)) = 0.4.8 Provides: bundled(crate(either)) = 1.8.1 -Provides: bundled(crate(encoding_c)) = 0.9.8 Provides: bundled(crate(encoding_c_mem)) = 0.2.6 +Provides: bundled(crate(encoding_c)) = 0.9.8 Provides: bundled(crate(encoding_glue)) = 0.1.0 -Provides: bundled(crate(encoding_rs)) = 0.8.34 -Provides: bundled(crate(enum-map)) = 2.7.3 +Provides: bundled(crate(encoding_rs)) = 0.8.35 Provides: bundled(crate(enum-map-derive)) = 0.17.0 -Provides: bundled(crate(enumset)) = 1.1.2 +Provides: bundled(crate(enum-map)) = 2.7.3 Provides: bundled(crate(enumset_derive)) = 0.8.1 +Provides: bundled(crate(enumset)) = 1.1.2 Provides: bundled(crate(env_logger)) = 0.10.0 Provides: bundled(crate(equivalent)) = 1.0.1 Provides: bundled(crate(error-chain)) = 0.12.4 -Provides: bundled(crate(error-support)) = 0.1.0 Provides: bundled(crate(error-support-macros)) = 0.1.0 -Provides: bundled(crate(etagere)) = 0.2.7 +Provides: bundled(crate(error-support)) = 0.1.0 +Provides: bundled(crate(etagere)) = 0.2.13 Provides: bundled(crate(euclid)) = 0.22.10 Provides: bundled(crate(ews)) = 0.1.0 Provides: bundled(crate(ews_xpcom)) = 0.1.0 +Provides: bundled(crate(extend)) = 1.2.0 Provides: bundled(crate(fallible_collections)) = 0.4.9 Provides: bundled(crate(fallible-iterator)) = 0.3.0 Provides: bundled(crate(fallible-streaming-iterator)) = 0.1.9 -Provides: bundled(crate(fastrand)) = 1.9.0 -Provides: bundled(crate(fastrand)) = 2.0.0 +Provides: bundled(crate(fastrand)) = 2.1.1 Provides: bundled(crate(ffi-support)) = 0.4.4 Provides: bundled(crate(firefox-on-glean)) = 0.1.0 -Provides: bundled(crate(flate2)) = 1.0.26 -Provides: bundled(crate(fluent)) = 0.16.0 +Provides: bundled(crate(firefox-versioning)) = 0.1.0 +Provides: bundled(crate(flate2)) = 1.0.30 Provides: bundled(crate(fluent-bundle)) = 0.15.2 Provides: bundled(crate(fluent-fallback)) = 0.7.0 Provides: bundled(crate(fluent-ffi)) = 0.1.0 -Provides: bundled(crate(fluent-langneg)) = 0.13.0 Provides: bundled(crate(fluent-langneg-ffi)) = 0.1.0 +Provides: bundled(crate(fluent-langneg)) = 0.13.0 Provides: bundled(crate(fluent-pseudo)) = 0.3.1 Provides: bundled(crate(fluent-syntax)) = 0.11.0 +Provides: bundled(crate(fluent)) = 0.16.0 Provides: bundled(crate(fnv)) = 1.0.7 Provides: bundled(crate(fog_control)) = 0.1.0 +Provides: bundled(crate(foldhash)) = 0.1.5 Provides: bundled(crate(form_urlencoded)) = 1.2.1 Provides: bundled(crate(freetype)) = 0.7.0 Provides: bundled(crate(fs-err)) = 2.9.0 -Provides: bundled(crate(futures)) = 0.3.28 Provides: bundled(crate(futures-channel)) = 0.3.28 Provides: bundled(crate(futures-core)) = 0.3.28 Provides: bundled(crate(futures-executor)) = 0.3.28 @@ -661,119 +656,139 @@ Provides: bundled(crate(futures-macro)) = 0.3.28 Provides: bundled(crate(futures-sink)) = 0.3.28 Provides: bundled(crate(futures-task)) = 0.3.28 Provides: bundled(crate(futures-util)) = 0.3.28 +Provides: bundled(crate(futures)) = 0.3.28 Provides: bundled(crate(fxhash)) = 0.2.1 Provides: bundled(crate(gecko_logger)) = 0.1.0 Provides: bundled(crate(gecko-profiler)) = 0.1.0 Provides: bundled(crate(geckoservo)) = 0.0.1 Provides: bundled(crate(generic-array)) = 0.14.6 -Provides: bundled(crate(gethostname)) = 0.4.3 -Provides: bundled(crate(getrandom)) = 0.2.14 -Provides: bundled(crate(gkrust)) = 0.1.0 +Provides: bundled(crate(getrandom)) = 0.2.999 +Provides: bundled(crate(getrandom)) = 0.3.3 Provides: bundled(crate(gkrust-shared)) = 0.1.0 +Provides: bundled(crate(gkrust-uniffi-components)) = 0.1.0 Provides: bundled(crate(gkrust_utils)) = 0.1.0 +Provides: bundled(crate(gkrust)) = 0.1.0 Provides: bundled(crate(gleam)) = 0.15.0 -Provides: bundled(crate(glean)) = 60.1.1 -Provides: bundled(crate(glean-core)) = 60.1.1 +Provides: bundled(crate(glean-core)) = 64.3.1 +Provides: bundled(crate(glean)) = 64.3.1 Provides: bundled(crate(gl_generator)) = 0.14.0 Provides: bundled(crate(glob)) = 0.3.1 -Provides: bundled(crate(glsl)) = 6.0.2 -Provides: bundled(crate(glslopt)) = 0.1.10 +Provides: bundled(crate(glslopt)) = 0.1.11 Provides: bundled(crate(glsl-to-cxx)) = 0.1.0 -Provides: bundled(crate(goblin)) = 0.8.1 +Provides: bundled(crate(glsl)) = 6.0.2 +Provides: bundled(crate(goblin)) = 0.8.999 +Provides: bundled(crate(goblin)) = 0.9.2 Provides: bundled(crate(golden_gate)) = 0.1.0 -Provides: bundled(crate(gpu-alloc)) = 0.6.0 Provides: bundled(crate(gpu-alloc-types)) = 0.3.0 -Provides: bundled(crate(gpu-descriptor)) = 0.3.0 +Provides: bundled(crate(gpu-alloc)) = 0.6.0 Provides: bundled(crate(gpu-descriptor-types)) = 0.2.0 -Provides: bundled(crate(half)) = 1.8.2 -Provides: bundled(crate(hashbrown)) = 0.12.3 +Provides: bundled(crate(gpu-descriptor)) = 0.3.0 +Provides: bundled(crate(half)) = 1.999.999 +Provides: bundled(crate(half)) = 2.5.0 Provides: bundled(crate(hashbrown)) = 0.13.999 -Provides: bundled(crate(hashbrown)) = 0.14.5 -Provides: bundled(crate(hashlink)) = 0.9.1 -Provides: bundled(crate(heck)) = 0.4.1 -Provides: bundled(crate(hex)) = 0.4.3 +Provides: bundled(crate(hashbrown)) = 0.14.999 +Provides: bundled(crate(hashbrown)) = 0.15.2 +Provides: bundled(crate(hashlink)) = 0.10.0 +Provides: bundled(crate(heck)) = 0.5.0 Provides: bundled(crate(hexf-parse)) = 0.2.1 +Provides: bundled(crate(hex)) = 0.4.3 Provides: bundled(crate(http_sfv)) = 0.1.0 -Provides: bundled(crate(icu_capi)) = 1.4.0 -Provides: bundled(crate(icu_collections)) = 1.4.0 -Provides: bundled(crate(icu_locid)) = 1.4.0 -Provides: bundled(crate(icu_locid_transform)) = 1.4.0 -Provides: bundled(crate(icu_locid_transform_data)) = 1.4.0 -Provides: bundled(crate(icu_properties)) = 1.4.0 -Provides: bundled(crate(icu_properties_data)) = 1.4.0 -Provides: bundled(crate(icu_provider)) = 1.4.0 -Provides: bundled(crate(icu_provider_adapters)) = 1.4.0 -Provides: bundled(crate(icu_provider_macros)) = 1.4.0 -Provides: bundled(crate(icu_segmenter)) = 1.4.0 -Provides: bundled(crate(icu_segmenter_data)) = 1.4.0 +Provides: bundled(crate(iana-time-zone)) = 0.1.63 +Provides: bundled(crate(icu_calendar_data)) = 1.5.0 +Provides: bundled(crate(icu_calendar)) = 1.5.2 +Provides: bundled(crate(icu_capi)) = 1.5.0 +Provides: bundled(crate(icu_collections)) = 1.5.0 +Provides: bundled(crate(icu_locid_transform_data)) = 1.5.0 +Provides: bundled(crate(icu_locid_transform)) = 1.5.0 +Provides: bundled(crate(icu_locid)) = 1.5.0 +Provides: bundled(crate(icu_normalizer_data)) = 1.5.0 +Provides: bundled(crate(icu_normalizer)) = 1.5.0 +Provides: bundled(crate(icu_properties_data)) = 1.5.0 +Provides: bundled(crate(icu_properties)) = 1.5.0 +Provides: bundled(crate(icu_provider_adapters)) = 1.5.0 +Provides: bundled(crate(icu_provider_macros)) = 1.5.0 +Provides: bundled(crate(icu_provider)) = 1.5.0 +Provides: bundled(crate(icu_segmenter_data)) = 1.5.0 +Provides: bundled(crate(icu_segmenter)) = 1.5.0 Provides: bundled(crate(id-arena)) = 2.2.1 Provides: bundled(crate(ident_case)) = 1.0.1 -Provides: bundled(crate(idna)) = 0.5.0 -Provides: bundled(crate(indexmap)) = 1.9.3 -Provides: bundled(crate(indexmap)) = 2.2.6 +Provides: bundled(crate(idna_adapter)) = 1.2.0 +Provides: bundled(crate(idna_glue)) = 0.1.0 +Provides: bundled(crate(idna)) = 1.0.3 +Provides: bundled(crate(indexmap)) = 2.8.0 Provides: bundled(crate(inherent)) = 1.0.7 Provides: bundled(crate(interrupt-support)) = 0.1.0 Provides: bundled(crate(intl-memoizer)) = 0.5.1 Provides: bundled(crate(intl_pluralrules)) = 7.0.2 -Provides: bundled(crate(io-lifetimes)) = 1.0.10 Provides: bundled(crate(iovec)) = 0.1.4 -Provides: bundled(crate(ipcclientcerts-static)) = 0.1.0 -Provides: bundled(crate(itertools)) = 0.10.5 -Provides: bundled(crate(itoa)) = 1.0.5 -Provides: bundled(crate(itoa)) = 1.0.6 -Provides: bundled(crate(jobserver)) = 0.1.25 +Provides: bundled(crate(ipcclientcerts)) = 0.1.0 +Provides: bundled(crate(ipdl_utils)) = 0.1.0 +Provides: bundled(crate(itertools)) = 0.10.999 +Provides: bundled(crate(itertools)) = 0.14.0 +Provides: bundled(crate(itoa)) = 1.0.15 +Provides: bundled(crate(jexl-eval)) = 0.3.0 +Provides: bundled(crate(jexl-parser)) = 0.3.0 +Provides: bundled(crate(jobserver)) = 0.1.33 Provides: bundled(crate(jog)) = 0.1.0 -Provides: bundled(crate(jsrust)) = 0.1.0 Provides: bundled(crate(jsrust_shared)) = 0.1.0 +Provides: bundled(crate(jsrust)) = 0.1.0 Provides: bundled(crate(keccak)) = 0.1.4 Provides: bundled(crate(khronos_api)) = 3.1.0 +Provides: bundled(crate(ksni)) = 0.2.2 Provides: bundled(crate(kvstore)) = 0.1.0 -Provides: bundled(crate(l10nregistry)) = 0.3.0 Provides: bundled(crate(l10nregistry-ffi)) = 0.1.0 +Provides: bundled(crate(l10nregistry)) = 0.3.0 +Provides: bundled(crate(lalrpop-util)) = 0.19.12 Provides: bundled(crate(lazycell)) = 1.3.0 Provides: bundled(crate(lazy_static)) = 1.4.0 Provides: bundled(crate(leb128)) = 0.2.5 -Provides: bundled(crate(libc)) = 0.2.144 -Provides: bundled(crate(libc)) = 0.2.153 +Provides: bundled(crate(libc)) = 0.2.171 Provides: bundled(crate(libdbus-sys)) = 0.2.2 -Provides: bundled(crate(libloading)) = 0.8.3 +Provides: bundled(crate(libloading)) = 0.8.6 Provides: bundled(crate(libm)) = 0.2.6 -Provides: bundled(crate(libsqlite3-sys)) = 0.28.0 -Provides: bundled(crate(libudev)) = 0.2.0 +Provides: bundled(crate(libsqlite3-sys)) = 0.31.0 Provides: bundled(crate(libudev-sys)) = 0.1.3 -Provides: bundled(crate(linux-raw-sys)) = 0.3.7 -Provides: bundled(crate(linux-raw-sys)) = 0.4.12 -Provides: bundled(crate(litemap)) = 0.7.2 +Provides: bundled(crate(libudev)) = 0.2.0 +Provides: bundled(crate(linux-raw-sys)) = 0.4.14 +Provides: bundled(crate(litemap)) = 0.7.3 Provides: bundled(crate(litrs)) = 0.4.1 -Provides: bundled(crate(lmdb-rkv)) = 0.14.0 Provides: bundled(crate(lmdb-rkv-sys)) = 0.11.2 Provides: bundled(crate(localization-ffi)) = 0.1.0 Provides: bundled(crate(lock_api)) = 0.4.9 -Provides: bundled(crate(log)) = 0.4.17 -Provides: bundled(crate(log)) = 0.4.20 -Provides: bundled(crate(log)) = 0.4.22 -Provides: bundled(crate(mail-builder)) = 0.3.1 -Provides: bundled(crate(malloc_size_of)) = 0.0.1 +Provides: bundled(crate(log)) = 0.4.26 +Provides: bundled(crate(mail-builder)) = 0.3.2 +Provides: bundled(crate(mail-parser)) = 0.9.4 Provides: bundled(crate(malloc_size_of_derive)) = 0.1.3 +Provides: bundled(crate(malloc_size_of)) = 0.0.1 Provides: bundled(crate(mapped_hyph)) = 0.4.3 Provides: bundled(crate(matches)) = 0.1.10 +Provides: bundled(crate(maybe-async)) = 0.2.10 Provides: bundled(crate(md-5)) = 0.10.5 Provides: bundled(crate(mdns_service)) = 0.1.1 Provides: bundled(crate(memalloc)) = 0.1.0 -Provides: bundled(crate(memchr)) = 2.5.0 -Provides: bundled(crate(memmap2)) = 0.5.999 -Provides: bundled(crate(memmap2)) = 0.8.999 +Provides: bundled(crate(memchr)) = 2.7.4 Provides: bundled(crate(memmap2)) = 0.9.3 Provides: bundled(crate(memoffset)) = 0.8.999 Provides: bundled(crate(memoffset)) = 0.9.0 -Provides: bundled(crate(midir)) = 0.7.0 Provides: bundled(crate(midir_impl)) = 0.1.0 -Provides: bundled(crate(mime)) = 0.3.16 -Provides: bundled(crate(mime_guess)) = 2.0.4 +Provides: bundled(crate(midir)) = 0.7.0 Provides: bundled(crate(mime-guess-ffi)) = 0.1.0 +Provides: bundled(crate(mime_guess)) = 2.0.4 +Provides: bundled(crate(mime)) = 0.3.16 Provides: bundled(crate(minimal-lexical)) = 0.2.1 Provides: bundled(crate(miniz_oxide)) = 0.7.1 -Provides: bundled(crate(mio)) = 0.8.8 +Provides: bundled(crate(mio)) = 1.0.1 +Provides: bundled(crate(mls_gk)) = 0.1.0 +Provides: bundled(crate(mls-platform-api)) = 0.1.0 +Provides: bundled(crate(mls-rs-codec-derive)) = 0.2.0 +Provides: bundled(crate(mls-rs-codec)) = 0.6.0 +Provides: bundled(crate(mls-rs-core)) = 0.21.0 +Provides: bundled(crate(mls-rs-crypto-hpke)) = 0.14.0 +Provides: bundled(crate(mls-rs-crypto-nss)) = 0.1.0 +Provides: bundled(crate(mls-rs-crypto-traits)) = 0.15.0 +Provides: bundled(crate(mls-rs-identity-x509)) = 0.15.0 +Provides: bundled(crate(mls-rs-provider-sqlite)) = 0.15.0 +Provides: bundled(crate(mls-rs)) = 0.45.0 Provides: bundled(crate(moz_asserts)) = 0.1.0 Provides: bundled(crate(mozbuild)) = 0.1.0 Provides: bundled(crate(moz_cbor)) = 0.1.2 @@ -783,53 +798,53 @@ Provides: bundled(crate(mozilla-central-workspace-hack)) = 0.1.0 Provides: bundled(crate(mozilla-central-workspace-hack)) = 0.1.0 Provides: bundled(crate(moz_task)) = 0.1.0 Provides: bundled(crate(mozurl)) = 0.0.1 -Provides: bundled(crate(mp4parse)) = 0.17.0 Provides: bundled(crate(mp4parse_capi)) = 0.17.0 +Provides: bundled(crate(mp4parse)) = 0.17.0 +Provides: bundled(crate(mtu)) = 0.2.6 Provides: bundled(crate(murmurhash3)) = 0.0.5 -Provides: bundled(crate(naga)) = 0.20.0 -Provides: bundled(crate(neqo-common)) = 0.7.9 -Provides: bundled(crate(neqo-crypto)) = 0.7.9 +Provides: bundled(crate(naga)) = 25.0.0 +Provides: bundled(crate(neqo-common)) = 0.13.4 +Provides: bundled(crate(neqo-crypto)) = 0.13.4 Provides: bundled(crate(neqo_glue)) = 0.1.0 -Provides: bundled(crate(neqo-http3)) = 0.7.9 -Provides: bundled(crate(neqo-qpack)) = 0.7.9 -Provides: bundled(crate(neqo-transport)) = 0.7.9 +Provides: bundled(crate(neqo-http3)) = 0.13.4 +Provides: bundled(crate(neqo-qpack)) = 0.13.4 +Provides: bundled(crate(neqo-transport)) = 0.13.4 +Provides: bundled(crate(neqo-udp)) = 0.13.4 Provides: bundled(crate(netwerk_helper)) = 0.0.1 Provides: bundled(crate(new_debug_unreachable)) = 1.0.4 Provides: bundled(crate(nix)) = 0.26.99 -Provides: bundled(crate(nix)) = 0.28.0 +Provides: bundled(crate(nix)) = 0.29.0 Provides: bundled(crate(nom)) = 7.1.3 Provides: bundled(crate(nserror)) = 0.1.0 -Provides: bundled(crate(nss_build_common)) = 0.1.0 Provides: bundled(crate(nss-gk-api)) = 0.3.0 Provides: bundled(crate(nsstring)) = 0.1.0 Provides: bundled(crate(num-conv)) = 0.1.0 -Provides: bundled(crate(num_cpus)) = 1.15.0 +Provides: bundled(crate(num_cpus)) = 1.16.0 Provides: bundled(crate(num-derive)) = 0.4.2 Provides: bundled(crate(num-integer)) = 0.1.45 -Provides: bundled(crate(num-traits)) = 0.2.15 -Provides: bundled(crate(object)) = 0.32.0 +Provides: bundled(crate(num-traits)) = 0.2.19 +Provides: bundled(crate(object)) = 0.36.4 Provides: bundled(crate(oblivious_http)) = 0.1.0 -Provides: bundled(crate(ohttp)) = 0.3.1 -Provides: bundled(crate(once_cell)) = 1.19.0 -Provides: bundled(crate(oneshot-uniffi)) = 0.1.6 +Provides: bundled(crate(ohttp)) = 0.5.1 +Provides: bundled(crate(once_cell)) = 1.21.3 Provides: bundled(crate(ordered-float)) = 3.4.0 Provides: bundled(crate(origin-trials-ffi)) = 0.1.0 Provides: bundled(crate(origin-trial-token)) = 0.1.1 -Provides: bundled(crate(os_str_bytes)) = 6.5.0 -Provides: bundled(crate(oxilangtag)) = 0.1.3 Provides: bundled(crate(oxilangtag-ffi)) = 0.1.0 -Provides: bundled(crate(parking_lot)) = 0.12.1 -Provides: bundled(crate(parking_lot_core)) = 0.9.9 +Provides: bundled(crate(oxilangtag)) = 0.1.3 +Provides: bundled(crate(parking_lot_core)) = 0.9.10 +Provides: bundled(crate(parking_lot)) = 0.12.3 Provides: bundled(crate(paste)) = 1.0.11 -Provides: bundled(crate(peek-poke)) = 0.3.0 +Provides: bundled(crate(payload-support)) = 0.1.0 Provides: bundled(crate(peek-poke-derive)) = 0.3.0 +Provides: bundled(crate(peek-poke)) = 0.3.0 Provides: bundled(crate(percent-encoding)) = 2.3.1 -Provides: bundled(crate(phf)) = 0.11.2 Provides: bundled(crate(phf_codegen)) = 0.11.2 Provides: bundled(crate(phf_generator)) = 0.11.2 Provides: bundled(crate(phf_macros)) = 0.11.2 Provides: bundled(crate(phf_shared)) = 0.11.2 -Provides: bundled(crate(pin-project-lite)) = 0.2.9 +Provides: bundled(crate(phf)) = 0.11.2 +Provides: bundled(crate(pin-project-lite)) = 0.2.14 Provides: bundled(crate(pin-utils)) = 0.1.0 Provides: bundled(crate(pkcs11-bindings)) = 0.1.5 Provides: bundled(crate(pkg-config)) = 0.3.26 @@ -841,75 +856,77 @@ Provides: bundled(crate(precomputed-hash)) = 0.1.1 Provides: bundled(crate(prefs_parser)) = 0.0.1 Provides: bundled(crate(prio)) = 0.16.2 Provides: bundled(crate(processtools)) = 0.1.0 -Provides: bundled(crate(proc-macro2)) = 1.0.74 -Provides: bundled(crate(proc-macro2)) = 1.0.85 +Provides: bundled(crate(proc-macro2)) = 1.0.86 Provides: bundled(crate(profiler_helper)) = 0.1.0 Provides: bundled(crate(profiler-macros)) = 0.1.0 Provides: bundled(crate(profiling)) = 1.0.7 -Provides: bundled(crate(prost)) = 0.12.1 Provides: bundled(crate(prost-derive)) = 0.12.1 -Provides: bundled(crate(pulse)) = 0.3.0 +Provides: bundled(crate(prost)) = 0.12.1 Provides: bundled(crate(pulse-ffi)) = 0.1.0 +Provides: bundled(crate(pulse)) = 0.3.0 Provides: bundled(crate(qcms)) = 0.3.0 -Provides: bundled(crate(qlog)) = 0.13.0 +Provides: bundled(crate(qlog)) = 0.15.2 Provides: bundled(crate(quick-error)) = 1.2.3 Provides: bundled(crate(quick-xml)) = 0.31.0 -Provides: bundled(crate(quote)) = 1.0.27 +Provides: bundled(crate(quinn-udp)) = 0.5.12 Provides: bundled(crate(quote)) = 1.0.35 -Provides: bundled(crate(rand)) = 0.8.5 Provides: bundled(crate(rand_chacha)) = 0.3.1 Provides: bundled(crate(rand_core)) = 0.6.4 -Provides: bundled(crate(raw-window-handle)) = 0.6.0 -Provides: bundled(crate(rayon)) = 1.6.1 -Provides: bundled(crate(rayon-core)) = 1.12.0 -Provides: bundled(crate(regex)) = 1.9.4 +Provides: bundled(crate(rand_distr)) = 0.4.3 +Provides: bundled(crate(rand)) = 0.8.5 +Provides: bundled(crate(raw-window-handle)) = 0.6.2 +Provides: bundled(crate(rayon-core)) = 1.12.1 +Provides: bundled(crate(rayon)) = 1.10.0 Provides: bundled(crate(regex-automata)) = 0.3.7 Provides: bundled(crate(regex-syntax)) = 0.7.5 +Provides: bundled(crate(regex)) = 1.9.4 Provides: bundled(crate(relevancy)) = 0.1.0 Provides: bundled(crate(remote_settings)) = 0.1.0 Provides: bundled(crate(remove_dir_all)) = 0.5.3 Provides: bundled(crate(replace_with)) = 0.1.7 Provides: bundled(crate(ringbuf)) = 0.2.8 Provides: bundled(crate(rkv)) = 0.19.0 -Provides: bundled(crate(ron)) = 0.8.1 +Provides: bundled(crate(rmp-serde)) = 1.3.0 +Provides: bundled(crate(rmp)) = 0.8.14 +Provides: bundled(crate(ron)) = 0.10.1 Provides: bundled(crate(rsclientcerts)) = 0.1.0 Provides: bundled(crate(rsdparsa_capi)) = 0.1.0 Provides: bundled(crate(runloop)) = 0.1.0 Provides: bundled(crate(rure)) = 0.2.2 -Provides: bundled(crate(rusqlite)) = 0.31.0 +Provides: bundled(crate(rusqlite)) = 0.31.999 +Provides: bundled(crate(rusqlite)) = 0.33.0 Provides: bundled(crate(rust_cascade)) = 1.5.0 Provides: bundled(crate(rustc-demangle)) = 0.1.21 -Provides: bundled(crate(rustc-hash)) = 1.1.0 +Provides: bundled(crate(rustc-hash)) = 1.999.999 +Provides: bundled(crate(rustc-hash)) = 2.1.1 Provides: bundled(crate(rustc_version)) = 0.4.0 Provides: bundled(crate(rust_decimal)) = 1.28.1 -Provides: bundled(crate(rustix)) = 0.37.19 -Provides: bundled(crate(rustix)) = 0.38.28 +Provides: bundled(crate(rustix)) = 0.38.39 +Provides: bundled(crate(rustversion)) = 1.0.19 Provides: bundled(crate(ryu)) = 1.0.12 -Provides: bundled(crate(ryu)) = 1.0.13 Provides: bundled(crate(same-file)) = 1.0.6 Provides: bundled(crate(scopeguard)) = 1.1.0 -Provides: bundled(crate(scroll)) = 0.12.0 Provides: bundled(crate(scroll_derive)) = 0.12.0 -Provides: bundled(crate(selectors)) = 0.22.0 +Provides: bundled(crate(scroll)) = 0.12.0 +Provides: bundled(crate(search)) = 0.1.0 +Provides: bundled(crate(selectors)) = 0.26.0 Provides: bundled(crate(self_cell)) = 0.10.2 Provides: bundled(crate(semver)) = 1.0.16 -Provides: bundled(crate(serde)) = 1.0.163 -Provides: bundled(crate(serde)) = 1.0.203 Provides: bundled(crate(serde_bytes)) = 0.11.9 Provides: bundled(crate(serde_cbor)) = 0.11.2 -Provides: bundled(crate(serde_derive)) = 1.0.163 -Provides: bundled(crate(serde_derive)) = 1.0.203 -Provides: bundled(crate(serde_json)) = 1.0.116 -Provides: bundled(crate(serde_json)) = 1.0.96 +Provides: bundled(crate(serde_derive)) = 1.0.219 +Provides: bundled(crate(serde_json)) = 1.0.140 Provides: bundled(crate(serde_path_to_error)) = 0.1.11 -Provides: bundled(crate(serde_with)) = 3.0.0 -Provides: bundled(crate(serde_with_macros)) = 3.0.0 -Provides: bundled(crate(servo_arc)) = 0.1.1 +Provides: bundled(crate(serde)) = 1.0.219 +Provides: bundled(crate(serde_with_macros)) = 3.12.0 +Provides: bundled(crate(serde_with)) = 3.12.0 +Provides: bundled(crate(servo_arc)) = 0.4.0 Provides: bundled(crate(sfv)) = 0.9.4 Provides: bundled(crate(sha1)) = 0.10.5 -Provides: bundled(crate(sha2)) = 0.10.6 +Provides: bundled(crate(sha2)) = 0.10.8 Provides: bundled(crate(sha3)) = 0.10.8 -Provides: bundled(crate(shlex)) = 1.1.0 +Provides: bundled(crate(shlex)) = 1.3.0 +Provides: bundled(crate(signature_cache)) = 0.1.0 Provides: bundled(crate(siphasher)) = 0.3.10 Provides: bundled(crate(slab)) = 0.4.8 Provides: bundled(crate(smallbitvec)) = 2.5.1 @@ -924,111 +941,118 @@ Provides: bundled(crate(static_assertions)) = 1.1.0 Provides: bundled(crate(static_prefs)) = 0.1.0 Provides: bundled(crate(storage)) = 0.1.0 Provides: bundled(crate(storage_variant)) = 0.1.0 -Provides: bundled(crate(strck)) = 0.1.2 Provides: bundled(crate(strck_ident)) = 0.1.2 -Provides: bundled(crate(strsim)) = 0.10.0 -Provides: bundled(crate(style)) = 0.0.1 +Provides: bundled(crate(strck)) = 0.1.2 +Provides: bundled(crate(strsim)) = 0.11.1 +Provides: bundled(crate(strsim)) = 0.8.0 +Provides: bundled(crate(strum_macros)) = 0.27.1 +Provides: bundled(crate(strum)) = 0.27.1 Provides: bundled(crate(style_derive)) = 0.0.1 Provides: bundled(crate(style_traits)) = 0.0.1 +Provides: bundled(crate(style)) = 0.0.1 Provides: bundled(crate(subtle)) = 2.5.0 Provides: bundled(crate(suggest)) = 0.1.0 Provides: bundled(crate(svg_fmt)) = 0.4.1 Provides: bundled(crate(swgl)) = 0.1.0 -Provides: bundled(crate(syn)) = 1.0.109 -Provides: bundled(crate(syn)) = 2.0.16 -Provides: bundled(crate(syn)) = 2.0.46 Provides: bundled(crate(sync15)) = 0.1.0 Provides: bundled(crate(sync-guid)) = 0.1.0 Provides: bundled(crate(synstructure)) = 0.13.1 +Provides: bundled(crate(syn)) = 2.0.87 +Provides: bundled(crate(sys_tray)) = 0.1.0 Provides: bundled(crate(tabs)) = 0.1.0 -Provides: bundled(crate(tempfile)) = 3.5.0 -Provides: bundled(crate(tempfile)) = 3.9.0 -Provides: bundled(crate(termcolor)) = 1.2.0 +Provides: bundled(crate(tempfile)) = 3.16.0 Provides: bundled(crate(termcolor)) = 1.4.1 -Provides: bundled(crate(textwrap)) = 0.16.0 +Provides: bundled(crate(textwrap)) = 0.11.0 Provides: bundled(crate(textwrap)) = 0.16.1 Provides: bundled(crate(thin-vec)) = 0.2.12 -Provides: bundled(crate(thiserror)) = 1.0.61 -Provides: bundled(crate(thiserror-impl)) = 1.0.61 +Provides: bundled(crate(thiserror-impl)) = 2.0.9 +Provides: bundled(crate(thiserror)) = 1.999.999 +Provides: bundled(crate(thiserror)) = 2.0.9 Provides: bundled(crate(threadbound)) = 0.1.5 +Provides: bundled(crate(time-core)) = 0.1.2 Provides: bundled(crate(time)) = 0.1.45 Provides: bundled(crate(time)) = 0.3.36 -Provides: bundled(crate(time-core)) = 0.1.2 -Provides: bundled(crate(tinystr)) = 0.7.4 -Provides: bundled(crate(tinyvec)) = 1.999.999 +Provides: bundled(crate(tinystr)) = 0.7.6 +Provides: bundled(crate(tinyvec_macros)) = 0.1.1 +Provides: bundled(crate(tinyvec)) = 1.9.0 Provides: bundled(crate(toml)) = 0.5.11 Provides: bundled(crate(topological-sort)) = 0.1.0 -Provides: bundled(crate(to_shmem)) = 0.0.1 -Provides: bundled(crate(to_shmem_derive)) = 0.0.1 +Provides: bundled(crate(to_shmem_derive)) = 0.1.0 +Provides: bundled(crate(to_shmem)) = 0.1.0 Provides: bundled(crate(tracy-rs)) = 0.1.2 +Provides: bundled(crate(trust-anchors)) = 0.1.0 Provides: bundled(crate(typed-arena-nomut)) = 0.1.0 Provides: bundled(crate(type-map)) = 0.4.0 Provides: bundled(crate(typenum)) = 1.16.0 Provides: bundled(crate(types)) = 0.1.0 Provides: bundled(crate(uluru)) = 3.0.0 Provides: bundled(crate(unicase)) = 2.6.0 -Provides: bundled(crate(unic-langid)) = 0.9.5 Provides: bundled(crate(unic-langid-ffi)) = 0.1.0 Provides: bundled(crate(unic-langid-impl)) = 0.9.5 -Provides: bundled(crate(unicode-bidi)) = 0.3.15 +Provides: bundled(crate(unic-langid)) = 0.9.5 Provides: bundled(crate(unicode-bidi-ffi)) = 0.1.0 +Provides: bundled(crate(unicode-bidi)) = 0.3.15 Provides: bundled(crate(unicode-ident)) = 1.0.6 -Provides: bundled(crate(unicode-ident)) = 1.0.8 -Provides: bundled(crate(unicode-linebreak)) = 0.1.5 -Provides: bundled(crate(unicode-normalization)) = 0.1.22 -Provides: bundled(crate(unicode-width)) = 0.1.10 -Provides: bundled(crate(unicode-xid)) = 0.2.4 -Provides: bundled(crate(uniffi)) = 0.27.1 -Provides: bundled(crate(uniffi_bindgen)) = 0.27.1 -Provides: bundled(crate(uniffi_build)) = 0.27.1 -Provides: bundled(crate(uniffi_checksum_derive)) = 0.27.1 -Provides: bundled(crate(uniffi_core)) = 0.27.1 -Provides: bundled(crate(uniffi_macros)) = 0.27.1 -Provides: bundled(crate(uniffi_meta)) = 0.27.1 -Provides: bundled(crate(uniffi_testing)) = 0.27.1 -Provides: bundled(crate(uniffi_udl)) = 0.27.1 -Provides: bundled(crate(url)) = 2.5.0 -Provides: bundled(crate(utf8_iter)) = 1.0.3 +Provides: bundled(crate(unicode-normalization)) = 0.1.24 +Provides: bundled(crate(unicode-width)) = 0.1.999 +Provides: bundled(crate(unicode-width)) = 0.2.0 +Provides: bundled(crate(uniffi_bindgen)) = 0.29.2 +Provides: bundled(crate(uniffi_build)) = 0.29.2 +Provides: bundled(crate(uniffi_core)) = 0.29.2 +Provides: bundled(crate(uniffi_internal_macros)) = 0.29.2 +Provides: bundled(crate(uniffi_macros)) = 0.29.2 +Provides: bundled(crate(uniffi_meta)) = 0.29.2 +Provides: bundled(crate(uniffi_pipeline)) = 0.29.2 +Provides: bundled(crate(uniffi_udl)) = 0.29.2 +Provides: bundled(crate(uniffi)) = 0.29.2 +Provides: bundled(crate(url)) = 2.5.4 +Provides: bundled(crate(utf16_iter)) = 1.0.5 +Provides: bundled(crate(utf8_iter)) = 1.0.4 Provides: bundled(crate(uuid)) = 1.3.0 Provides: bundled(crate(vcpkg)) = 0.2.999 +Provides: bundled(crate(vec_map)) = 0.8.2 Provides: bundled(crate(version_check)) = 0.9.4 Provides: bundled(crate(viaduct)) = 0.1.0 Provides: bundled(crate(void)) = 1.0.2 Provides: bundled(crate(walkdir)) = 2.3.2 -Provides: bundled(crate(wasm-encoder)) = 0.205.0 -Provides: bundled(crate(wast)) = 205.0.0 +Provides: bundled(crate(wasm-encoder)) = 0.219.1 +Provides: bundled(crate(wast)) = 219.0.1 Provides: bundled(crate(webext-storage)) = 0.1.0 -Provides: bundled(crate(webext_storage_bridge)) = 0.1.0 -Provides: bundled(crate(webrender)) = 0.62.0 Provides: bundled(crate(webrender_api)) = 0.62.0 Provides: bundled(crate(webrender_bindings)) = 0.1.0 Provides: bundled(crate(webrender_build)) = 0.0.2 -Provides: bundled(crate(webrtc-sdp)) = 0.3.11 +Provides: bundled(crate(webrender)) = 0.62.0 +Provides: bundled(crate(webrtc-sdp)) = 0.3.13 Provides: bundled(crate(weedle2)) = 5.0.0 Provides: bundled(crate(wgpu_bindings)) = 0.1.0 -Provides: bundled(crate(wgpu-core)) = 0.20.0 -Provides: bundled(crate(wgpu-hal)) = 0.20.0 -Provides: bundled(crate(wgpu-types)) = 0.20.0 +Provides: bundled(crate(wgpu-core-deps-windows-linux-android)) = 25.0.0 +Provides: bundled(crate(wgpu-core)) = 25.0.0 +Provides: bundled(crate(wgpu-hal)) = 25.0.0 +Provides: bundled(crate(wgpu-types)) = 25.0.0 Provides: bundled(crate(whatsys)) = 0.3.1 +Provides: bundled(crate(winnow)) = 0.7.9 Provides: bundled(crate(wpf-gpu-raster)) = 0.1.0 Provides: bundled(crate(wr_glyph_rasterizer)) = 0.1.0 -Provides: bundled(crate(writeable)) = 0.5.4 -Provides: bundled(crate(wr_malloc_size_of)) = 0.0.2 +Provides: bundled(crate(write16)) = 1.0.0 +Provides: bundled(crate(writeable)) = 0.5.5 +Provides: bundled(crate(wr_malloc_size_of)) = 0.2.1 Provides: bundled(crate(xmldecl)) = 0.2.0 Provides: bundled(crate(xml-rs)) = 0.8.4 -Provides: bundled(crate(xml_struct)) = 0.1.0 Provides: bundled(crate(xml_struct_derive)) = 0.1.0 -Provides: bundled(crate(xpcom)) = 0.1.0 +Provides: bundled(crate(xml_struct)) = 0.1.0 Provides: bundled(crate(xpcom_async)) = 0.1.0 Provides: bundled(crate(xpcom_macros)) = 0.1.0 -Provides: bundled(crate(yoke)) = 0.7.3 -Provides: bundled(crate(yoke-derive)) = 0.7.3 +Provides: bundled(crate(xpcom)) = 0.1.0 +Provides: bundled(crate(yoke-derive)) = 0.7.4 +Provides: bundled(crate(yoke)) = 0.7.4 Provides: bundled(crate(zeitstempel)) = 0.1.1 Provides: bundled(crate(zerocopy)) = 0.7.32 -Provides: bundled(crate(zerofrom)) = 0.1.2 Provides: bundled(crate(zerofrom-derive)) = 0.1.3 -Provides: bundled(crate(zerovec)) = 0.10.1 -Provides: bundled(crate(zerovec-derive)) = 0.10.1 +Provides: bundled(crate(zerofrom)) = 0.1.4 +Provides: bundled(crate(zeroize_derive)) = 1.4.2 +Provides: bundled(crate(zeroize)) = 1.8.1 +Provides: bundled(crate(zerovec-derive)) = 0.10.3 +Provides: bundled(crate(zerovec)) = 0.10.4 %description Mozilla Thunderbird is a standalone mail and newsgroup client. @@ -1068,15 +1092,10 @@ echo "--------------------------------------------" %if !%{?use_openssl_for_librnp} %patch -P9 -p1 -b .disable-openpgp-in-thunderbird %endif -%patch -P10 -p1 -b .build-ffvpx %patch -P11 -p1 -b .rust-file-removal -%if 0%{?rhel} == 10 -%patch -P12 -p1 -b .firefox-system-nss-replace-xyber-with-mlkem -%patch -P13 -p1 -b .thunderbird-system-nss-replace-xyber-with-mlkem -%endif -%if 0%{?rhel} == 8 %patch -P14 -p1 -b .cargo-lock-version -%endif +%patch -P15 -p1 -b .build-system-nss +%patch -P16 -p1 -b .tb-build-system-nss # -- Upstreamed patches -- %patch -P51 -p1 -b .mozilla-bmo1170092 @@ -1089,8 +1108,21 @@ echo "--------------------------------------------" %patch -P106 -p1 -b .mozilla-bmo998749 %patch -P107 -p1 -b .mozilla-bmo1716707-swizzle %patch -P108 -p1 -b .mozilla-bmo1716707-svg +%if 0%{?rhel} == 7 || (0%{?rhel} == 8 && %{rhel_minor_version} < 4) %patch -P109 -p1 -b .mozilla-bmo1789216-disable-av1 +%endif %patch -P110 -p1 -b .libaom +%patch -P111 -p1 -b .av1-else-condition-add + +%if 0%{?rhel} >= 10 +# ML-DSA support +%patch -P120 -p1 -b .integrate-ml-dsa-signature-verification-for-pkix-certificate-chain-validation +%patch -P121 -p1 -b .add-ml-dsa-certificate-support-to-certviewer +%patch -P122 -p1 -b .enable-ml-dsa-signature-verification-for-certificate-chain-validation +%patch -P123 -p1 -b .adapt-ml-dsa-support-to-rhel-nss +%patch -P124 -p1 -b .enable-ml-dsa-in-manager-ssl +%patch -P125 -p1 -b .add-mlkem768-secp256r1-support +%endif # ---- Fedora specific patches ---- %patch -P151 -p1 -b .addons @@ -1157,7 +1189,10 @@ echo "ac_add_options --with-librnp-backend=openssl" >> .mozconfig echo "ac_add_options --disable-webrtc" >> .mozconfig echo "ac_add_options --disable-lto" >> .mozconfig %endif -echo "ac_add_options --disable-lto" >> .mozconfig + +%if 0%{?rhel} < 10 + echo "ac_add_options --disable-lto" >> .mozconfig +%endif # AV1 requires newer nasm that was rebased in 8.4 %if 0%{?rhel} == 7 || (0%{?rhel} == 8 && %{rhel_minor_version} < 4) @@ -1352,7 +1387,7 @@ MOZ_LINK_FLAGS="-Wl,--no-keep-memory -Wl,--reduce-memory-overheads" # __global_ldflags that normally sets this. MOZ_LINK_FLAGS="$MOZ_LINK_FLAGS -L%{_libdir}" %endif -%ifarch %{ix86} %{s390x} +%ifarch %{ix86} s390x export RUSTFLAGS="-Cdebuginfo=0" echo 'export RUSTFLAGS="-Cdebuginfo=0"' >> .mozconfig %endif @@ -1375,6 +1410,8 @@ echo "export CXX=g++" >> .mozconfig echo "export AR=\"gcc-ar\"" >> .mozconfig echo "export NM=\"gcc-nm\"" >> .mozconfig echo "export RANLIB=\"gcc-ranlib\"" >> .mozconfig +#Workaround for rust SIGABRT/SIGSEGV +echo "export MALLOC_MMAP_MAX_=0" >> .mozconfig MOZ_SMP_FLAGS=-j1 # On x86_64 architectures, Mozilla can build up to 4 jobs at once in parallel, @@ -1557,15 +1594,10 @@ touch $RPM_BUILD_ROOT%{mozappdir}/components/xpti.dat %endif # Register as an application to be visible in the software center -mkdir -p $RPM_BUILD_ROOT%{_datadir}/metainfo -%{__cp} -p comm/mail/branding/%{name}/net.thunderbird.Thunderbird.appdata.xml $RPM_BUILD_ROOT%{_datadir}/metainfo/thunderbird.appdata.xml -%if 0%{?flatpak} -# don't specify icon for flatpak appdata, icons are correctly named and packaged already -# as org.mozilla.Thunderbird.png -sed -i -e 's|thunderbird|' "$RPM_BUILD_ROOT%{_datadir}/metainfo/thunderbird.appdata.xml" -%endif +mkdir -p %{buildroot}%{_datadir}/metainfo +%{__sed} -e "s/__VERSION__/%{version}/" \ + -e "s/__DATE__/$(date '+%Y-%m-%d')/" \ + %{SOURCE33} > %{buildroot}%{_datadir}/metainfo/thunderbird.appdata.xml # Clean the created bundled rpms. rm -rf %{_srcrpmdir}/libffi*.src.rpm @@ -1579,6 +1611,11 @@ find %{_rpmdir} -name "nspr*.rpm" -delete #=============================================================================== +%check +appstream-util validate-relax --nonet %{buildroot}%{_datadir}/metainfo/*.appdata.xml + +#=============================================================================== + %post update-desktop-database &> /dev/null || : touch --no-create %{_datadir}/icons/hicolor &>/dev/null || : @@ -1663,9 +1700,14 @@ gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || : #=============================================================================== %changelog -* Thu Aug 28 2025 Liwei Ge - 128.14.0-3.0.1 -- Rebrand to Anolis -- Remove loongarch64 arch(Zhao Hang) +* Tue Nov 11 2025 Jan Horak - 140.5.0-2 +- Update to 140.5.0 ESR + +* Mon Oct 13 2025 Jan Horak - 140.4.0-2 +- Update to 140.4.0 ESR + +* Fri Sep 12 2025 Jan Horak - 140.3.0-1 +- Update to 140.3.0 ESR * Tue Aug 19 2025 Jan Grulich - 128.14.0-3 - Update to 128.14.0 build2 -- Gitee From 4a5b0e586a32435dc6431c8f904204e3d71f405c Mon Sep 17 00:00:00 2001 From: Zhao Hang Date: Mon, 20 Dec 2021 03:27:54 +0000 Subject: [PATCH 2/2] rebrand: rename js file and update vendor --- ...=> thunderbird-anolis-default-prefs.js.an8 | 8 +++---- thunderbird.spec | 23 ++++++++++++------- 2 files changed, 19 insertions(+), 12 deletions(-) rename thunderbird-redhat-default-prefs.js => thunderbird-anolis-default-prefs.js.an8 (87%) diff --git a/thunderbird-redhat-default-prefs.js b/thunderbird-anolis-default-prefs.js.an8 similarity index 87% rename from thunderbird-redhat-default-prefs.js rename to thunderbird-anolis-default-prefs.js.an8 index f13ee5b..e332272 100644 --- a/thunderbird-redhat-default-prefs.js +++ b/thunderbird-anolis-default-prefs.js.an8 @@ -1,15 +1,15 @@ pref("app.update.enabled", false); pref("app.update.autoInstallEnabled", false); -/* Allow users to set custom colors*/ -/* pref("browser.display.use_system_colors", true);*/ -pref("general.useragent.vendor", "Red Hat"); +/* Allow users to set custom colors */ +/* pref("browser.display.use_system_colors", true); */ +pref("general.useragent.vendor", "Anolis OS"); pref("general.useragent.vendorSub", "THUNDERBIRD_RPM_VR"); pref("intl.locale.matchOS", true); pref("mail.shell.checkDefaultClient", false); pref("toolkit.networkmanager.disable", false); pref("offline.autoDetect", true); -/* Disable global indexing by default*/ +/* Disable global indexing by default */ pref("mailnews.database.global.indexer.enabled", false); pref("extensions.shownSelectionUI", true); diff --git a/thunderbird.spec b/thunderbird.spec index 2c7b1f2..d9d2870 100644 --- a/thunderbird.spec +++ b/thunderbird.spec @@ -1,3 +1,4 @@ +%define anolis_release .0.1 # Set for local builds only %global disable_toolsets 0 @@ -13,17 +14,17 @@ %{lua: function dist_to_rhel_minor(str, start) - match = string.match(str, ".module%+el8.%d+") + match = string.match(str, ".module%+an8.%d+") if match then return string.sub(match, 13) end - match = string.match(str, ".el8_%d+") + match = string.match(str, ".an8_%d+") if match then return string.sub(match, 6) end - match = string.match(str, ".el8") + match = string.match(str, ".an8") if match then - return 10 + return 8 end match = string.match(str, ".module%+el9.%d+") if match then @@ -90,9 +91,9 @@ end} %global use_gcc_ts 1 %if (0%{?rhel} == 9 && %{rhel_minor_version} >= 6) || (0%{?rhel} == 8 && %{rhel_minor_version} >= 10) # clang depends on gcc-toolset-14-gcc-c++ - %global gts_version 14 + %global gts_version 13 %else - %global gts_version 14 + %global gts_version 13 %endif %endif @@ -138,7 +139,7 @@ end} Summary: Mozilla Thunderbird mail/newsgroup client Name: thunderbird Version: 140.5.0 -Release: 2%{?dist} +Release: 2%{anolis_release}%{?dist} URL: http://www.mozilla.org/projects/thunderbird/ License: MPLv1.1 or GPLv2+ or LGPLv2+ @@ -157,6 +158,7 @@ ExcludeArch: %{ix86} %endif %endif %endif +ExcludeArch: loongarch64 # We can't use the official tarball as it contains some test files that use # licenses that are rejected by Red Hat Legal. @@ -170,7 +172,7 @@ Source1: thunderbird-langpacks-%{version}%{?pre_version}-20251111.tar.xz Source2: cbindgen-vendor.tar.xz Source3: process-official-tarball Source10: thunderbird-mozconfig -Source12: thunderbird-redhat-default-prefs.js +Source12: thunderbird-anolis-default-prefs.js.an8 Source20: thunderbird.desktop Source21: thunderbird.sh.in Source24: mozilla-api-key @@ -345,6 +347,7 @@ BuildRequires: zlib-devel BuildRequires: gcc-toolset-%{gts_version}-runtime BuildRequires: gcc-toolset-%{gts_version}-binutils BuildRequires: gcc-toolset-%{gts_version}-gcc +BuildRequires: gcc-toolset-%{gts_version}-gcc-c++ BuildRequires: gcc-toolset-%{gts_version}-gcc-plugin-annobin # Do not explicitly require gcc-toolset-%%{gts_version}-gcc-c++ instead fail # when clang is upgraded to depend on a later toolset and adjust version. @@ -1700,6 +1703,10 @@ gtk-update-icon-cache %{_datadir}/icons/hicolor &>/dev/null || : #=============================================================================== %changelog +* Fri Nov 21 2025 Liwei Ge - 140.5.0-2.0.1 +- Rebrand to Anolis +- Remove loongarch64 arch(Zhao Hang) + * Tue Nov 11 2025 Jan Horak - 140.5.0-2 - Update to 140.5.0 ESR -- Gitee