Red Hat Bugzilla – Bug 882408
NSS_NO_PKCS11_BYPASS must preserve API compatibility
Last modified: 2013-11-21 01:10:20 EST
Description of problem: With the update to nss-3.14 we acquired the ability to disable the ssl pkcs11 bypass at build time, a feature we requested, by setting a build time variable. A runtime variable allowed, and still does, a user to enable bypass. The upstream code quietly returns success even when the caller has requested bypass and the build doesn't have it. The user will not get the performance improvement the feature was intended to but on the on the other hand it will not break. Backward compatibility takes precedence. Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. set the runtime environment variable SSLBYPASS to 1 2. run any of the ssl client/server tests, selserv and testclnt. Actual results: the test will fail as either the server or the client will trigger an error. Expected results: The test will complete and pass. Additional info: The Test Plan Review allowed us to catch this mistake. This was due to a misunderstanding of guidance given. Revisiting the thread in the upstream, https://bugzilla.mozilla.org/show_bug.cgi?id=745281#c22 states: "... you will need to return SECSuccess in RHEL because you can't change the API in RHEL releases. You can remove Bypass because is doesn't actually change the semantics, only the timing. ... " Having done it via an isolated patch, nss-ssl-enforce-no-pkcs11-bypass.path, makes the fix easy. The fix consist on removing this undesired patch.
Created attachment 655291 [details] changes to spec file in patch form
This request was not resolved in time for the current release. Red Hat invites you to ask your support representative to propose this request, if still desired, for consideration in the next release of Red Hat Enterprise Linux.
Comment on attachment 655291 [details] changes to spec file in patch form r+ rrelyea
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-1558.html