Network Security Services

Edit Package mozilla-nss

Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled server
applications. Applications built with NSS can support SSL v2 and v3,
TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
certificates, and other security standards.

Refresh
Refresh
Source Files
Filename Size Changed
baselibs.conf 0000000319 319 Bytes
bmo-1400603.patch 0000012981 12.7 KB
cert9.db 0000009216 9 KB
key4.db 0000011264 11 KB
malloc.patch 0000000488 488 Bytes
mozilla-nss-rpmlintrc 0000000187 187 Bytes
mozilla-nss.changes 0000094415 92.2 KB
mozilla-nss.spec 0000012800 12.5 KB
nss-3.35.tar.gz 0009620041 9.17 MB
nss-config.in 0000002408 2.35 KB
nss-disable-ocsp-test.patch 0000000392 392 Bytes
nss-no-rpath.patch 0000000899 899 Bytes
nss-opt.patch 0000000591 591 Bytes
nss-sqlitename.patch 0000000570 570 Bytes
nss.pc.in 0000000250 250 Bytes
pkcs11.txt 0000000450 450 Bytes
renegotiate-transitional.patch 0000000674 674 Bytes
setup-nsssysinit.sh 0000001255 1.23 KB
system-nspr.patch 0000000405 405 Bytes
Revision 133 (latest revision is 218)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 574217 from Wolfgang Rosenauer's avatar Wolfgang Rosenauer (wrosenauer) (revision 133)
- update to NSS 3.35
  New functionality
  * TLS 1.3 support has been updated to draft -23. This includes a
    large number of changes since 3.34, which supported only draft
    -18. See below for details.
  New Types
  * SSLHandshakeType - The type of a TLS handshake message.
  * For the SSLSignatureScheme enum, the enumerated values
    ssl_sig_rsa_pss_sha* are deprecated in response to a change in
    TLS 1.3.  Please use the equivalent ssl_sig_rsa_pss_rsae_sha*
    for rsaEncryption keys, or ssl_sig_rsa_pss_pss_sha* for PSS keys.
    Note that this release does not include support for the latter.
  Notable Changes
  * Previously, NSS used the DBM file format by default. Starting
    with version 3.35, NSS uses the SQL file format by default.
    Additional information can be found on this Fedora Linux project
    page: https://fedoraproject.org/wiki/Changes/NSSDefaultFileFormatSql
  * Added formally verified implementations of non-vectorized Chacha20
    and non-vectorized Poly1305 64-bit.
  * For stronger security, when creating encrypted PKCS#7 or PKCS#12 data,
    the iteration count for the password based encryption algorithm
    has been increased to one million iterations. Note that debug builds
    will use a lower count, for better performance in test environments.
  * NSS 3.30 had introduced a regression, preventing NSS from reading
    some AES encrypted data, produced by older versions of NSS.
    NSS 3.35 fixes this regression and restores the ability to read
    affected data.
  * The following CA certificates were Removed:
    OU = Security Communication EV RootCA1
    CN = CA Disig Root R1
Comments 0
openSUSE Build Service is sponsored by