#566 and #651: update font blacklist, M1754724, M1758062, M1761026+backbugs, M1755555, M1663508, M1719215

This commit is contained in:
Cameron Kaiser 2022-04-30 19:46:57 -07:00
parent 0a9d355bee
commit 700da3e996
7 changed files with 235 additions and 38 deletions

View File

@ -617,9 +617,12 @@ FetchDriver::OnDataAvailable(nsIRequest* aRequest,
// NB: This can be called on any thread! But we're guaranteed that it is // NB: This can be called on any thread! But we're guaranteed that it is
// called between OnStartRequest and OnStopRequest, so we don't need to worry // called between OnStartRequest and OnStopRequest, so we don't need to worry
// about races. // about races.
if (!mResponse) {
MOZ_ASSERT(false);
return NS_ERROR_UNEXPECTED;
}
uint32_t aRead; uint32_t aRead = 0;
MOZ_ASSERT(mResponse);
MOZ_ASSERT(mPipeOutputStream); MOZ_ASSERT(mPipeOutputStream);
nsresult rv = aInputStream->ReadSegments(NS_CopySegmentToStream, nsresult rv = aInputStream->ReadSegments(NS_CopySegmentToStream,

View File

@ -237,9 +237,10 @@ txToFragmentHandlerFactory::createHandlerWith(txOutputFormat* aFormat,
class txVariable : public txIGlobalParameter class txVariable : public txIGlobalParameter
{ {
public: public:
explicit txVariable(nsIVariant* aValue) : mValue(aValue) explicit txVariable(nsIVariant* aValue, txAExprResult* aTxValue)
: mValue(aValue), mTxValue(aTxValue)
{ {
NS_ASSERTION(aValue, "missing value"); NS_ASSERTION(aValue && aTxValue, "missing value");
} }
explicit txVariable(txAExprResult* aValue) : mTxValue(aValue) explicit txVariable(txAExprResult* aValue) : mTxValue(aValue)
{ {
@ -247,12 +248,7 @@ public:
} }
nsresult getValue(txAExprResult** aValue) nsresult getValue(txAExprResult** aValue)
{ {
NS_ASSERTION(mValue || mTxValue, "variablevalue is null"); NS_ASSERTION(mTxValue, "variablevalue is null");
if (!mTxValue) {
nsresult rv = Convert(mValue, getter_AddRefs(mTxValue));
NS_ENSURE_SUCCESS(rv, rv);
}
*aValue = mTxValue; *aValue = mTxValue;
NS_ADDREF(*aValue); NS_ADDREF(*aValue);
@ -269,11 +265,11 @@ public:
{ {
return mValue; return mValue;
} }
void setValue(nsIVariant* aValue) void setValue(nsIVariant* aValue, txAExprResult* aTxValue)
{ {
NS_ASSERTION(aValue, "setting variablevalue to null"); NS_ASSERTION(aValue && aTxValue, "setting variablevalue to null");
mValue = aValue; mValue = aValue;
mTxValue = nullptr; mTxValue = aTxValue;
} }
void setValue(txAExprResult* aValue) void setValue(txAExprResult* aValue)
{ {
@ -282,14 +278,14 @@ public:
mTxValue = aValue; mTxValue = aValue;
} }
static nsresult Convert(nsIVariant* aValue, txAExprResult** aResult);
friend void ImplCycleCollectionUnlink(txVariable& aVariable); friend void ImplCycleCollectionUnlink(txVariable& aVariable);
friend void ImplCycleCollectionTraverse( friend void ImplCycleCollectionTraverse(
nsCycleCollectionTraversalCallback& aCallback, txVariable& aVariable, nsCycleCollectionTraversalCallback& aCallback, txVariable& aVariable,
const char* aName, uint32_t aFlags); const char* aName, uint32_t aFlags);
private: private:
static nsresult Convert(nsIVariant *aValue, txAExprResult** aResult);
nsCOMPtr<nsIVariant> mValue; nsCOMPtr<nsIVariant> mValue;
RefPtr<txAExprResult> mTxValue; RefPtr<txAExprResult> mTxValue;
}; };
@ -949,13 +945,17 @@ txMozillaXSLTProcessor::SetParameter(const nsAString & aNamespaceURI,
nsCOMPtr<nsIAtom> localName = do_GetAtom(aLocalName); nsCOMPtr<nsIAtom> localName = do_GetAtom(aLocalName);
txExpandedName varName(nsId, localName); txExpandedName varName(nsId, localName);
RefPtr<txAExprResult> txValue;
rv = txVariable::Convert(value, getter_AddRefs(txValue));
NS_ENSURE_SUCCESS(rv, rv);
txVariable* var = static_cast<txVariable*>(mVariables.get(varName)); txVariable* var = static_cast<txVariable*>(mVariables.get(varName));
if (var) { if (var) {
var->setValue(value); var->setValue(value, txValue);
return NS_OK; return NS_OK;
} }
var = new txVariable(value); var = new txVariable(value, txValue);
return mVariables.add(varName, var); return mVariables.add(varName, var);
} }

View File

@ -262,6 +262,15 @@ cairo_surface_t* GetAsImageSurface(cairo_surface_t* aSurface)
return nullptr; return nullptr;
} }
// We're creating a subimage from the parent image's data (in aData) without
// altering that data or its stride. This constrains the values in aRect, and
// how they're used. Callers must see to it that the parent fully contains the
// subimage. Here we ensure that no clipping is done in the X dimension at the
// beginning of any line. (To do otherwise would require creating a copy of
// aData from parts of every line in aData (from aRect.Y() to aRect.Height()),
// and setting the copy to a different stride.) A non-zero aRect.X() is used
// only to specify the subimage's location in its parent (via
// cairo_surface_set_device_offset()). This change resolves bug 1719215.
cairo_surface_t* CreateSubImageForData(unsigned char* aData, cairo_surface_t* CreateSubImageForData(unsigned char* aData,
const IntRect& aRect, const IntRect& aRect,
int aStride, int aStride,
@ -271,16 +280,14 @@ cairo_surface_t* CreateSubImageForData(unsigned char* aData,
gfxWarning() << "DrawTargetCairo.CreateSubImageForData null aData"; gfxWarning() << "DrawTargetCairo.CreateSubImageForData null aData";
return nullptr; return nullptr;
} }
unsigned char *data = aData + unsigned char* data = aData + aRect.y * aStride;
aRect.y * aStride +
aRect.x * BytesPerPixel(aFormat);
cairo_surface_t *image = cairo_surface_t *image =
cairo_image_surface_create_for_data(data, cairo_image_surface_create_for_data(data,
GfxFormatToCairoFormat(aFormat), GfxFormatToCairoFormat(aFormat),
aRect.width, aRect.width,
aRect.height, aRect.height,
aStride); aStride);
// Set the subimage's location in its parent
cairo_surface_set_device_offset(image, -aRect.x, -aRect.y); cairo_surface_set_device_offset(image, -aRect.x, -aRect.y);
return image; return image;
} }

View File

@ -345,6 +345,8 @@ gfxPlatformMac::IsFontFormatSupported(nsIURI *aFontURI, uint32_t aFormatFlags)
HTTP_OR_HTTPS_SUBDIR("hartzfacts.de", "/google-fonts/s/notoseriftc/v7/"); HTTP_OR_HTTPS_SUBDIR("hartzfacts.de", "/google-fonts/s/notoseriftc/v7/");
HTTP_OR_HTTPS_SUBDIR("som.yale.edu","/themes/custom/som/fonts/neuehaasunica/NeueHaasUnicaBlack");
// Check hostname and subpatterns (TenFourFox issue 477). // Check hostname and subpatterns (TenFourFox issue 477).
HOST_AND_KEY("www.latimes.com", "/fonts/KisFBDisplay-"); HOST_AND_KEY("www.latimes.com", "/fonts/KisFBDisplay-");
HOST_AND_KEY("www.nerdwallet.com", "Gotham-Book--critical"); HOST_AND_KEY("www.nerdwallet.com", "Gotham-Book--critical");

View File

@ -2719,10 +2719,35 @@ storeAtts(XML_Parser parser, const ENCODING *enc,
/* get the attributes from the tokenizer */ /* get the attributes from the tokenizer */
n = XmlGetAttributes(enc, attStr, attsSize, atts); n = XmlGetAttributes(enc, attStr, attsSize, atts);
/* Detect and prevent integer overflow */
if (n > INT_MAX - nDefaultAtts) {
return XML_ERROR_NO_MEMORY;
}
if (n + nDefaultAtts > attsSize) { if (n + nDefaultAtts > attsSize) {
int oldAttsSize = attsSize; int oldAttsSize = attsSize;
ATTRIBUTE *temp; ATTRIBUTE *temp;
/* Detect and prevent integer overflow */
if ((nDefaultAtts > INT_MAX - INIT_ATTS_SIZE)
|| (n > INT_MAX - (nDefaultAtts + INIT_ATTS_SIZE))) {
return XML_ERROR_NO_MEMORY;
}
attsSize = n + nDefaultAtts + INIT_ATTS_SIZE; attsSize = n + nDefaultAtts + INIT_ATTS_SIZE;
/* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if ((unsigned)parser->m_attsSize > (size_t)(-1) / sizeof(ATTRIBUTE)) {
parser->m_attsSize = oldAttsSize;
return XML_ERROR_NO_MEMORY;
}
#endif
temp = (ATTRIBUTE *)REALLOC((void *)atts, attsSize * sizeof(ATTRIBUTE)); temp = (ATTRIBUTE *)REALLOC((void *)atts, attsSize * sizeof(ATTRIBUTE));
if (temp == NULL) if (temp == NULL)
return XML_ERROR_NO_MEMORY; return XML_ERROR_NO_MEMORY;
@ -2868,10 +2893,17 @@ storeAtts(XML_Parser parser, const ENCODING *enc,
/* END MOZILLA CHANGE */ /* END MOZILLA CHANGE */
int j; /* hash table index */ int j; /* hash table index */
unsigned long version = nsAttsVersion; unsigned long version = nsAttsVersion;
int nsAttsSize = (int)1 << nsAttsPower;
/* Detect and prevent invalid shift */
if (parser->m_nsAttsPower >= sizeof(unsigned int) * 8 /* bits per byte */) {
return XML_ERROR_NO_MEMORY;
}
unsigned int nsAttsSize = 1u << nsAttsPower;
/* BEGIN MOZILLA CHANGE (Include xmlns attributes in attributes array) */ /* BEGIN MOZILLA CHANGE (Include xmlns attributes in attributes array) */
if (nPrefixes) { if (nPrefixes) {
/* END MOZILLA CHANGE */ /* END MOZILLA CHANGE */
unsigned char oldNsAttsPower = parser->m_nsAttsPower;
/* size of hash table must be at least 2 * (# of prefixed attributes) */ /* size of hash table must be at least 2 * (# of prefixed attributes) */
if ((nPrefixes << 1) >> nsAttsPower) { /* true for nsAttsPower = 0 */ if ((nPrefixes << 1) >> nsAttsPower) { /* true for nsAttsPower = 0 */
NS_ATT *temp; NS_ATT *temp;
@ -2879,7 +2911,28 @@ storeAtts(XML_Parser parser, const ENCODING *enc,
while (nPrefixes >> nsAttsPower++); while (nPrefixes >> nsAttsPower++);
if (nsAttsPower < 3) if (nsAttsPower < 3)
nsAttsPower = 3; nsAttsPower = 3;
nsAttsSize = (int)1 << nsAttsPower;
/* Detect and prevent invalid shift */
if (parser->m_nsAttsPower >= sizeof(nsAttsSize) * 8 /* bits per byte */) {
/* Restore actual size of memory in m_nsAtts */
parser->m_nsAttsPower = oldNsAttsPower;
return XML_ERROR_NO_MEMORY;
}
nsAttsSize = 1u << parser->m_nsAttsPower;
/* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if (nsAttsSize > (size_t)(-1) / sizeof(NS_ATT)) {
/* Restore actual size of memory in m_nsAtts */
parser->m_nsAttsPower = oldNsAttsPower;
return XML_ERROR_NO_MEMORY;
}
#endif
temp = (NS_ATT *)REALLOC(nsAtts, nsAttsSize * sizeof(NS_ATT)); temp = (NS_ATT *)REALLOC(nsAtts, nsAttsSize * sizeof(NS_ATT));
if (!temp) if (!temp)
return XML_ERROR_NO_MEMORY; return XML_ERROR_NO_MEMORY;
@ -3065,9 +3118,31 @@ storeAtts(XML_Parser parser, const ENCODING *enc,
tagNamePtr->prefixLen = prefixLen; tagNamePtr->prefixLen = prefixLen;
for (i = 0; localPart[i++];) for (i = 0; localPart[i++];)
; /* i includes null terminator */ ; /* i includes null terminator */
/* Detect and prevent integer overflow */
if (binding->uriLen > INT_MAX - prefixLen
|| i > INT_MAX - (binding->uriLen + prefixLen)) {
return XML_ERROR_NO_MEMORY;
}
n = i + binding->uriLen + prefixLen; n = i + binding->uriLen + prefixLen;
if (n > binding->uriAlloc) { if (n > binding->uriAlloc) {
TAG *p; TAG *p;
/* Detect and prevent integer overflow */
if (n > INT_MAX - EXPAND_SPARE) {
return XML_ERROR_NO_MEMORY;
}
/* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if ((unsigned)(n + EXPAND_SPARE) > (size_t)(-1) / sizeof(XML_Char)) {
return XML_ERROR_NO_MEMORY;
}
#endif
uri = (XML_Char *)MALLOC((n + EXPAND_SPARE) * sizeof(XML_Char)); uri = (XML_Char *)MALLOC((n + EXPAND_SPARE) * sizeof(XML_Char));
if (!uri) if (!uri)
return XML_ERROR_NO_MEMORY; return XML_ERROR_NO_MEMORY;
@ -3164,6 +3239,21 @@ addBinding(XML_Parser parser, PREFIX *prefix, const ATTRIBUTE_ID *attId,
if (freeBindingList) { if (freeBindingList) {
b = freeBindingList; b = freeBindingList;
if (len > b->uriAlloc) { if (len > b->uriAlloc) {
/* Detect and prevent integer overflow */
if (len > INT_MAX - EXPAND_SPARE) {
return XML_ERROR_NO_MEMORY;
}
/* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if ((unsigned)(len + EXPAND_SPARE) > (size_t)(-1) / sizeof(XML_Char)) {
return XML_ERROR_NO_MEMORY;
}
#endif
XML_Char *temp = (XML_Char *)REALLOC(b->uri, XML_Char *temp = (XML_Char *)REALLOC(b->uri,
sizeof(XML_Char) * (len + EXPAND_SPARE)); sizeof(XML_Char) * (len + EXPAND_SPARE));
if (temp == NULL) if (temp == NULL)
@ -3177,6 +3267,21 @@ addBinding(XML_Parser parser, PREFIX *prefix, const ATTRIBUTE_ID *attId,
b = (BINDING *)MALLOC(sizeof(BINDING)); b = (BINDING *)MALLOC(sizeof(BINDING));
if (!b) if (!b)
return XML_ERROR_NO_MEMORY; return XML_ERROR_NO_MEMORY;
/* Detect and prevent integer overflow */
if (len > INT_MAX - EXPAND_SPARE) {
return XML_ERROR_NO_MEMORY;
}
/* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if ((unsigned)(len + EXPAND_SPARE) > (size_t)(-1) / sizeof(XML_Char)) {
return XML_ERROR_NO_MEMORY;
}
#endif
b->uri = (XML_Char *)MALLOC(sizeof(XML_Char) * (len + EXPAND_SPARE)); b->uri = (XML_Char *)MALLOC(sizeof(XML_Char) * (len + EXPAND_SPARE));
if (!b->uri) { if (!b->uri) {
FREE(b); FREE(b);
@ -4458,11 +4563,26 @@ doProlog(XML_Parser parser,
case XML_ROLE_GROUP_OPEN: case XML_ROLE_GROUP_OPEN:
if (prologState.level >= groupSize) { if (prologState.level >= groupSize) {
if (groupSize) { if (groupSize) {
/* Detect and prevent integer overflow */
if (parser->m_groupSize > (unsigned int)(-1) / 2u) {
return XML_ERROR_NO_MEMORY;
}
char *temp = (char *)REALLOC(groupConnector, groupSize *= 2); char *temp = (char *)REALLOC(groupConnector, groupSize *= 2);
if (temp == NULL) if (temp == NULL)
return XML_ERROR_NO_MEMORY; return XML_ERROR_NO_MEMORY;
groupConnector = temp; groupConnector = temp;
if (dtd->scaffIndex) { if (dtd->scaffIndex) {
/* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if (parser->m_groupSize > (size_t)(-1) / sizeof(int)) {
return XML_ERROR_NO_MEMORY;
}
#endif
int *temp = (int *)REALLOC(dtd->scaffIndex, int *temp = (int *)REALLOC(dtd->scaffIndex,
groupSize * sizeof(int)); groupSize * sizeof(int));
if (temp == NULL) if (temp == NULL)
@ -5425,7 +5545,24 @@ defineAttribute(ELEMENT_TYPE *type, ATTRIBUTE_ID *attId, XML_Bool isCdata,
} }
else { else {
DEFAULT_ATTRIBUTE *temp; DEFAULT_ATTRIBUTE *temp;
/* Detect and prevent integer overflow */
if (type->allocDefaultAtts > INT_MAX / 2) {
return 0;
}
int count = type->allocDefaultAtts * 2; int count = type->allocDefaultAtts * 2;
/* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if ((unsigned)count > (size_t)(-1) / sizeof(DEFAULT_ATTRIBUTE)) {
return 0;
}
#endif
temp = (DEFAULT_ATTRIBUTE *) temp = (DEFAULT_ATTRIBUTE *)
REALLOC(type->defaultAtts, (count * sizeof(DEFAULT_ATTRIBUTE))); REALLOC(type->defaultAtts, (count * sizeof(DEFAULT_ATTRIBUTE)));
if (temp == NULL) if (temp == NULL)
@ -6049,8 +6186,20 @@ lookup(HASH_TABLE *table, KEY name, size_t createSize)
/* check for overflow (table is half full) */ /* check for overflow (table is half full) */
if (table->used >> (table->power - 1)) { if (table->used >> (table->power - 1)) {
unsigned char newPower = table->power + 1; unsigned char newPower = table->power + 1;
/* Detect and prevent invalid shift */
if (newPower >= sizeof(unsigned long) * 8 /* bits per byte */) {
return NULL;
}
size_t newSize = (size_t)1 << newPower; size_t newSize = (size_t)1 << newPower;
unsigned long newMask = (unsigned long)newSize - 1; unsigned long newMask = (unsigned long)newSize - 1;
/* Detect and prevent integer overflow */
if (newSize > (size_t)(-1) / sizeof(NAMED *)) {
return NULL;
}
size_t tsize = newSize * sizeof(NAMED *); size_t tsize = newSize * sizeof(NAMED *);
NAMED **newV = (NAMED **)table->mem->malloc_fcn(tsize); NAMED **newV = (NAMED **)table->mem->malloc_fcn(tsize);
if (!newV) if (!newV)
@ -6331,6 +6480,20 @@ nextScaffoldPart(XML_Parser parser)
if (dtd->scaffCount >= dtd->scaffSize) { if (dtd->scaffCount >= dtd->scaffSize) {
CONTENT_SCAFFOLD *temp; CONTENT_SCAFFOLD *temp;
if (dtd->scaffold) { if (dtd->scaffold) {
/* Detect and prevent integer overflow */
if (dtd->scaffSize > UINT_MAX / 2u) {
return -1;
}
/* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if (dtd->scaffSize > (size_t)(-1) / 2u / sizeof(CONTENT_SCAFFOLD)) {
return -1;
}
#endif
temp = (CONTENT_SCAFFOLD *) temp = (CONTENT_SCAFFOLD *)
REALLOC(dtd->scaffold, dtd->scaffSize * 2 * sizeof(CONTENT_SCAFFOLD)); REALLOC(dtd->scaffold, dtd->scaffSize * 2 * sizeof(CONTENT_SCAFFOLD));
if (temp == NULL) if (temp == NULL)
@ -6407,8 +6570,26 @@ build_model (XML_Parser parser)
XML_Content *ret; XML_Content *ret;
XML_Content *cpos; XML_Content *cpos;
XML_Char * str; XML_Char * str;
int allocsize = (dtd->scaffCount * sizeof(XML_Content)
+ (dtd->contentStringLen * sizeof(XML_Char))); /* Detect and prevent integer overflow.
* The preprocessor guard addresses the "always false" warning
* from -Wtype-limits on platforms where
* sizeof(unsigned int) < sizeof(size_t), e.g. on x86_64. */
#if UINT_MAX >= SIZE_MAX
if (dtd->scaffCount > (size_t)(-1) / sizeof(XML_Content)) {
return NULL;
}
if (dtd->contentStringLen > (size_t)(-1) / sizeof(XML_Char)) {
return NULL;
}
#endif
if (dtd->scaffCount * sizeof(XML_Content)
> (size_t)(-1) - dtd->contentStringLen * sizeof(XML_Char)) {
return NULL;
}
const size_t allocsize = (dtd->scaffCount * sizeof(XML_Content)
+ (dtd->contentStringLen * sizeof(XML_Char)));
ret = (XML_Content *)MALLOC(allocsize); ret = (XML_Content *)MALLOC(allocsize);
if (!ret) if (!ret)

View File

@ -11,6 +11,7 @@
#endif /* PKIM_H */ #endif /* PKIM_H */
#include "cert.h" #include "cert.h"
#include "dev3hack.h"
#include "pki3hack.h" #include "pki3hack.h"
#include "pk11pub.h" #include "pk11pub.h"
#include "nssrwlk.h" #include "nssrwlk.h"
@ -61,11 +62,14 @@ static void
token_destructor(void *t) token_destructor(void *t)
{ {
NSSToken *tok = (NSSToken *)t; NSSToken *tok = (NSSToken *)t;
/* The token holds the first/last reference to the slot. /* Remove the token list's reference to the token */
* When the token is actually destroyed (ref count == 0), (void)nssToken_Destroy(tok);
* the slot will also be destroyed.
*/ /* Signal that the slot should not give out any more references to the
nssToken_Destroy(tok); * token. The token might still have a positive refcount after this call.
* The token has a reference to the slot, so the slot will not be destroyed
* until after the token's refcount drops to 0. */
PK11Slot_SetNSSToken(tok->pk11slot, NULL);
} }
NSS_IMPLEMENT PRStatus NSS_IMPLEMENT PRStatus
@ -127,7 +131,6 @@ nssTrustDomain_GetActiveSlots(
return NULL; return NULL;
} }
nssList_GetArray(td->tokenList, (void **)tokens, count); nssList_GetArray(td->tokenList, (void **)tokens, count);
NSSRWLock_UnlockRead(td->tokensLock);
count = 0; count = 0;
for (tp = tokens; *tp; tp++) { for (tp = tokens; *tp; tp++) {
NSSSlot *slot = nssToken_GetSlot(*tp); NSSSlot *slot = nssToken_GetSlot(*tp);
@ -137,6 +140,7 @@ nssTrustDomain_GetActiveSlots(
nssSlot_Destroy(slot); nssSlot_Destroy(slot);
} }
} }
NSSRWLock_UnlockRead(td->tokensLock);
nss_ZFreeIf(tokens); nss_ZFreeIf(tokens);
if (!count) { if (!count) {
nss_ZFreeIf(slots); nss_ZFreeIf(slots);
@ -469,7 +473,7 @@ nssTrustDomain_FindCertificatesByNickname(
numRemaining, numRemaining,
&status); &status);
} }
nssToken_Destroy(token); (void)nssToken_Destroy(token);
if (status != PR_SUCCESS) { if (status != PR_SUCCESS) {
errors++; errors++;
continue; continue;
@ -618,7 +622,7 @@ nssTrustDomain_FindCertificatesBySubject(
numRemaining, numRemaining,
&status); &status);
} }
nssToken_Destroy(token); (void)nssToken_Destroy(token);
if (status != PR_SUCCESS) { if (status != PR_SUCCESS) {
errors++; errors++;
continue; continue;
@ -779,7 +783,7 @@ nssTrustDomain_FindCertificateByIssuerAndSerialNumber(
tokenOnly, tokenOnly,
&status); &status);
} }
nssToken_Destroy(token); (void)nssToken_Destroy(token);
if (status != PR_SUCCESS) { if (status != PR_SUCCESS) {
continue; continue;
} }
@ -1022,7 +1026,7 @@ NSSTrustDomain_TraverseCertificates(
collector, collector,
collection); collection);
} }
nssToken_Destroy(token); (void)nssToken_Destroy(token);
} }
} }
@ -1076,7 +1080,7 @@ nssTrustDomain_FindTrustForCertificate(
nssCryptokiObject_Destroy(to); nssCryptokiObject_Destroy(to);
} }
} }
nssToken_Destroy(token); (void)nssToken_Destroy(token);
} }
} }
if (pkio) { if (pkio) {
@ -1126,7 +1130,7 @@ nssTrustDomain_FindCRLsBySubject(
instances = nssToken_FindCRLsBySubject(token, session, subject, instances = nssToken_FindCRLsBySubject(token, session, subject,
tokenOnly, 0, &status); tokenOnly, 0, &status);
} }
nssToken_Destroy(token); (void)nssToken_Destroy(token);
if (status == PR_SUCCESS) { if (status == PR_SUCCESS) {
/* add the found CRL's to the collection */ /* add the found CRL's to the collection */
status = nssPKIObjectCollection_AddInstances(collection, status = nssPKIObjectCollection_AddInstances(collection,

View File

@ -43,7 +43,7 @@ extern bool gUserCancelledDrag;
// This global makes the transferable array available to Cocoa's promised // This global makes the transferable array available to Cocoa's promised
// file destination callback. // file destination callback.
nsISupportsArray *gDraggedTransferables = nullptr; mozilla::StaticRefPtr<nsISupportsArray> gDraggedTransferables;
NSString* const kWildcardPboardType = @"MozillaWildcard"; NSString* const kWildcardPboardType = @"MozillaWildcard";
NSString* const kCorePboardType_url = @"CorePasteboardFlavorType 0x75726C20"; // 'url ' url NSString* const kCorePboardType_url = @"CorePasteboardFlavorType 0x75726C20"; // 'url ' url