Closed Bug 401954 Opened 17 years ago Closed 17 years ago

Include latest NSS error strings

Categories

(Core :: Security: PSM, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: KaiE, Assigned: KaiE)

References

Details

Attachments

(1 file, 1 obsolete file)

FF 3 is supposed to ship with NSS 3.12 NSS 3.12 has some new error codes. I used the tool from bug 329017 to produce updated code and strings for PSM. We should add the new strings in time before the localization freeze. (Bob, Julien, Nelson, if you're aware of additional upcoming patches that will add error codes/strings, let's make sure we get them in soon.)
Flags: blocking1.9?
Attached patch Patch v1 (obsolete) — Splinter Review
Attachment #286890 - Flags: review?(rrelyea)
Comment on attachment 286890 [details] [diff] [review] Patch v1 If there will be a string freeze after M9, this should get in.
Attachment #286890 - Flags: approvalM9?
Comment on attachment 286890 [details] [diff] [review] Patch v1 I'm pretty sure this won't compile. Where are these new errors declared? Shouldn't something be added to mozilla/security/nss/lib/util/secerr.h?
Comment on attachment 286890 [details] [diff] [review] Patch v1 SEC_ERROR_OCSP_RESPONDER_CERT_INVALID=OCSP Trusted Responder Cert is invalid. Saying that a cert is both trusted and invalid is a contradiction. I propose to simply drop the word Trusted. I'm going to check the NSS error string for this next. If it also has this contradiction, that's a bug that we should fix right away.
Attachment #286890 - Flags: review?(rrelyea) → review-
I just spoke with mconnor, and he told me that string freeze isn't at M9. M10 will be the slushy string freeze with M11 being hard freeze, most likely.
Attachment #286890 - Flags: approvalM9?
(In reply to comment #4) > SEC_ERROR_OCSP_RESPONDER_CERT_INVALID=OCSP Trusted Responder Cert is invalid. > Saying that a cert is both trusted and invalid is a contradiction. > I propose to simply drop the word Trusted. > > I'm going to check the NSS error string for this next. If it also has > this contradiction, that's a bug that we should fix right away. Nelson, these strings were directly taken from NSS. I didn't change them. The strings are simply a copy for the localization effort. So, if you think these strings don't make sense, they should get fixed in NSS.
Depends on: 338986
Yes, the string is also wrong in NSS. See bug 338986 comment 54
(In reply to comment #3) > (From update of attachment 286890 [details] [diff] [review]) > I'm pretty sure this won't compile. Where are these new errors declared? > Shouldn't something be added to mozilla/security/nss/lib/util/secerr.h? Reed, that header file already contains the new IDs. Did you look in the wrong branch?
Alexei tells me that this error applies only to user-configured OCSP responders. The word "trusted" should be "User-configured" or "configured". So I think the error message should be changed to "Configured OCSP responder's certificate is invalid." I will file an NSS bug about this. I'd say that PSM should feel free to fix this without waiting for NSS's error message to change first.
(In reply to comment #9) > I will file an NSS bug about this. I'd say that PSM should feel free > to fix this without waiting for NSS's error message to change first. Thanks for the quick action, Nelson!
Attached patch Patch v2Splinter Review
Attachment #286890 - Attachment is obsolete: true
Attachment #286947 - Flags: review?(nelson)
Comment on attachment 286947 [details] [diff] [review] Patch v2 r=nelson
Attachment #286947 - Flags: review?(nelson) → review+
Attachment #286947 - Flags: approval1.9?
Flags: blocking1.9? → blocking1.9-
Attachment #286947 - Flags: approval1.9? → approval1.9+
fixed
Status: NEW → RESOLVED
Closed: 17 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: