From 3a4f577de022b6d8ae94edd4e730691cef80fb14 Mon Sep 17 00:00:00 2001 From: Otavio Salvador Date: Sat, 15 Nov 2008 08:02:55 -0200 Subject: firefox: add 3.0.4 --- .../mozilla/firefox-3.0.4/random_to_urandom.diff | 26 ++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 packages/mozilla/firefox-3.0.4/random_to_urandom.diff (limited to 'packages/mozilla/firefox-3.0.4/random_to_urandom.diff') diff --git a/packages/mozilla/firefox-3.0.4/random_to_urandom.diff b/packages/mozilla/firefox-3.0.4/random_to_urandom.diff new file mode 100644 index 0000000000..f969752381 --- /dev/null +++ b/packages/mozilla/firefox-3.0.4/random_to_urandom.diff @@ -0,0 +1,26 @@ +# Component manager should not use /dev/random for generation ranodm numbers +# It cause hangs on embedding platforms,which does not have enough devices for generation required entropy +# Bug somewhere exists but it is very old +Index: nsprpub/pr/src/md/unix/uxrng.c +=================================================================== +--- mozilla/nsprpub/pr/src/md/unix/uxrng.c.orig ++++ mozilla/nsprpub/pr/src/md/unix/uxrng.c +@@ -144,17 +144,17 @@ + #include + #include + + static int fdDevRandom; + static PRCallOnceType coOpenDevRandom; + + static PRStatus OpenDevRandom( void ) + { +- fdDevRandom = open( "/dev/random", O_RDONLY ); ++ fdDevRandom = open( "/dev/urandom", O_RDONLY ); + return((-1 == fdDevRandom)? PR_FAILURE : PR_SUCCESS ); + } /* end OpenDevRandom() */ + + static size_t GetDevRandom( void *buf, size_t size ) + { + int bytesIn; + int rc; + -- cgit v1.2.3