Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

mozilla-nss-3.94-1.1 RPM for s390x

From OpenSuSE Ports Tumbleweed for s390x

Name: mozilla-nss Distribution: openSUSE:Factory:zSystems
Version: 3.94 Vendor: openSUSE
Release: 1.1 Build date: Mon Oct 30 09:25:28 2023
Group: System/Libraries Build host: s390zl25
Size: 2071568 Source RPM: mozilla-nss-3.94-1.1.src.rpm
Packager: https://bugs.opensuse.org
Url: https://www.mozilla.org/projects/security/pki/nss/
Summary: Network Security Services
Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled server
applications. Applications built with NSS can support SSL v3,
TLS v1.0, v1.1, v1.2, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
certificates, and other security standards.

Provides

Requires

License

MPL-2.0

Changelog

* Tue Oct 24 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.94
    * bmo#1853737 - Updated code and commit ID for HACL*
    * bmo#1840510 - update ACVP fuzzed test vector: refuzzed with
      current NSS
    * bmo#1827303 - Softoken C_ calls should use system FIPS setting
      to select NSC_ or FC_ variants
    * bmo#1774659 - NSS needs a database tool that can dump the low level
      representation of the database
    * bmo#1852179 - declare string literals using char in pkixnames_tests.cpp
    * bmo#1852179 - avoid implicit conversion for ByteString
    * bmo#1818766 - update rust version for acvp docker
    * bmo#1852011 - Moving the init function of the mpi_ints before
      clean-up in ec.c
    * bmo#1615555 - P-256 ECDH and ECDSA from HACL*
    * bmo#1840510 - Add ACVP test vectors to the repository
    * bmo#1849077 - Stop relying on std::basic_string<uint8_t>
    * bmo#1847845 - Transpose the PPC_ABI check from Makefile to gyp
  - rebased patches
  - added nss-fips-test.patch to fix broken test
* Tue Sep 05 2023 Dominique Leuenberger <dimstar@opensuse.org>
  - Update to NSS 3.93:
    * bmo#1849471 - Update zlib in NSS to 1.3.
    * bmo#1848183 - softoken: iterate hashUpdate calls for long inputs.
    * bmo#1813401 - regenerate NameConstraints test certificates (boo#1214980).
  - Rebase nss-fips-pct-pubkeys.patch.
* Sun Aug 27 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.92
    * bmo#1822935 - Set nssckbi version number to 2.62
    * bmo#1833270 - Add 4 Atos TrustedRoot Root CA certificates to NSS
    * bmo#1839992 - Add 4 SSL.com Root CA certificates
    * bmo#1840429 - Add Sectigo E46 and R46 Root CA certificates
    * bmo#1840437 - Add LAWtrust Root CA2 (4096)
    * bmo#1822936 - Remove E-Tugra Certification Authority root
    * bmo#1827224 - Remove Camerfirma Chambers of Commerce Root.
    * bmo#1840505 - Remove Hongkong Post Root CA 1
    * bmo#1842928 - Remove E-Tugra Global Root CA ECC v3 and RSA v3
    * bmo#1842937 - Avoid redefining BYTE_ORDER on hppa Linux
* Sat Jul 29 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.91
    * bmo#1837431 - Implementation of the HW support check for ADX instruction
    * bmo#1836925 - Removing the support of Curve25519
    * bmo#1839795 - Fix comment about the addition of ticketSupportsEarlyData
    * bmo#1839327 - Adding args to enable-legacy-db build
    * bmo#1835357 - dbtests.sh failure in "certutil dump keys with explicit
      default trust flags"
    * bmo#1837617 - Initialize flags in slot structures
    * bmo#1835425 - Improve the length check of RSA input to avoid heap overflow
    * bmo#1829112 - Followup Fixes
    * bmo#1784253 - avoid processing unexpected inputs by checking for
      m_exptmod base sign
    * bmo#1826652 - add a limit check on order_k to avoid infinite loop
    * bmo#1834851 - Update HACL* to commit 5f6051d2
    * bmo#1753026 - add SHA3 to cryptohi and softoken
    * bmo#1753026 - HACL SHA3
    * bmo#1836781 - Disabling ASM C25519 for A but X86_64
  - removed upstreamed patch nss-fix-bmo1836925.patch
* Fri Jul 28 2023 Dirk Stoecker <opensuse@dstoecker.de>
  - Fix file conflict for pp manual page [bsc#1213281]
* Tue Jul 04 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.90
    * bmo#1623338 - ride along: remove a duplicated doc page
    * bmo#1623338 - remove a reference to IRC
    * bmo#1831983 - clang-format lib/freebl/stubs.c
    * bmo#1831983 - Add a constant time select function
    * bmo#1774657 - Updating an old dbm with lots of certs with keys to
      sql results in a database that is slow to access.
    * bmo#1830973 - output early build errors by default
    * bmo#1804505 - Update the technical constraints for KamuSM
    * bmo#1822921 - Add BJCA Global Root CA1 and CA2 root certificates
    * bmo#1790763 - Enable default UBSan Checks
    * bmo#1786018 - Add explicit handling of zero length records
    * bmo#1829391 - Tidy up DTLS ACK Error Handling Path
    * bmo#1786018 - Refactor zero length record tests
    * bmo#1829112 - Fix compiler warning via correct assert
    * bmo#1755267 - run linux tests on nss-t/t-linux-xlarge-gcp
    * bmo#1806496 - In FIPS mode, nss should reject RSASSA-PSS salt lengths
      larger than the output size of the hash function used,
      or provide an indicator
    * bmo#1784163 - Fix reading raw negative numbers
    * bmo#1748237 - Repairing unreachable code in clang built with gyp
    * bmo#1783647 - Integrate Vale Curve25519
    * bmo#1799468 - Removing unused flags for Hacl*
    * bmo#1748237 - Adding a better error message
    * bmo#1727555 - Update HACL* till 51a72a953a4ee6f91e63b2816ae5c4e62edf35d6
    * bmo#1782980 - Fall back to the softokn when writing certificate trust
    * bmo#1806010 - FIPS-104-3 requires we restart post programmatically
    * bmo#1826650 - cmd/ecperf: fix dangling pointer warning on gcc 13
    * bmo#1818766 - Update ACVP dockerfile for compatibility with debian
      package changes
    * bmo#1815796 - Add a CI task for tracking ECCKiila code status, update
      whitespace in ECCKiila files
    * bmo#1819958 - Removed deprecated sprintf function and replaced with snprintf
    * bmo#1822076 - fix rst warnings in nss doc
    * bmo#1821997 - Fix incorrect pygment style
    * bmo#1821292 - Change GYP directive to apply across platforms
    * Add libsmime3 abi-check exception for NSS_CMSSignerInfo_GetDigestAlgTag
  - add nss-fix-bmo1836925.patch to fix build-errors
  - Remove nss-fips-tls-allow-md5-prf.patch, since we no longer need
    the workaround in FIPS mode (bsc#1200325)
  - Remove nss-fips-tests-skip.patch. This is no longer needed since
    we removed the code to short-circuit broken hashes and moved to
    using the SLI
  - Add nss-allow-slow-tests.patch, which allows a timed test to run
    longer than 1s. This avoids turning slow builds into broken builds
  - Add nss-fips-drbg-libjitter.patch to use libjitterentropy for
    entropy. This is disabled until we can avoid the inline assembler
    in the latter's header file that relies on GNU extensions
  - Add nss-fips-pct-pubkeys.patch (bsc#1207209) for pairwise consistency
    checks
* Fri Jun 09 2023 Pedro Monreal <pmonreal@suse.com>
  - FIPS: Merge the libfreebl3-hmac and libsoftokn3-hmac packages
    into the respective libraries. [bsc#1185116]
* Sat Jun 03 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.89.1
    * bmo#1804505 - Update the technical constraints for KamuSM.
    * bmo#1822921 - Add BJCA Global Root CA1 and CA2 root certificates.
* Wed May 31 2023 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - Move testsuite to %check-section and move env-variables to
    files for easier chroot-debugging
* Mon Apr 10 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.89
    * bmo#1820834 - revert freebl/softoken RSA_MIN_MODULUS_BITS increase
    * bmo#1820175 - PR_STATIC_ASSERT is cursed
    * bmo#1767883 - Need to add policy control to keys lengths for signatures
    * bmo#1820175 - Fix unreachable code warning in fuzz builds
    * bmo#1820175 - Fix various compiler warnings in NSS
    * bmo#1820175 - Enable various compiler warnings for clang builds
    * bmo#1815136 - set PORT error after sftk_HMACCmp failure
    * bmo#1767883 - Need to add policy control to keys lengths for signatures
    * bmo#1804662 - remove data length assertion in sec_PKCS7Decrypt
    * bmo#1804660 - Make high tag number assertion failure an error
    * bmo#1817513 - CKM_SHA384_KEY_DERIVATION correction maximum key
      length from 284 to 384
    * bmo#1815167 - Tolerate certificate_authorities xtn in ClientHello
    * bmo#1789436 - Fix build failure on Windows
    * bmo#1811337 - migrate Win 2012 tasks to Azure
    * bmo#1810702 - fix title length in doc
    * bmo#1570615 - Add interop tests for HRR and PSK to GREASE suite
    * bmo#1570615 - Add presence/absence tests for TLS GREASE
    * bmo#1804688 - Correct addition of GREASE value to ALPN xtn
    * bmo#1789436 - CH extension permutation
    * bmo#1570615 - TLS GREASE (RFC8701)
    * bmo#1804640 - improve handling of unknown PKCS#12 safe bag types
    * bmo#1815870 - use a different treeherder symbol for each docker
      image build task
    * bmo#1815868 - pin an older version of the ubuntu:18.04 and
      20.04 docker images
    * bmo#1810702 - remove nested table in rst doc
    * bmo#1815246 - Export NSS_CMSSignerInfo_GetDigestAlgTag
    * bmo#1812671 - build failure while implicitly casting SECStatus
      to PRUInt32
* Sat Mar 11 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.88.1
    * bmo#1804640 - improve handling of unknown PKCS#12 safe bag types
  - update to NSS 3.88
    * bmo#1815870 - use a different treeherder symbol for each docker
      image build task
    * bmo#1815868 - pin an older version of the ubuntu:18.04 and
      20.04 docker images
    * bmo#1810702 - remove nested table in rst doc
    * bmo#1815246 - Export NSS_CMSSignerInfo_GetDigestAlgTag.
    * bmo#1812671 - build failure while implicitly casting SECStatus
      to PRUInt32
    * bmo#1212915 - Add check for ClientHello SID max length
    * bmo#1771100 - Added EarlyData ALPN test support to BoGo shim
    * bmo#1790357 - ECH client - Discard resumption TLS < 1.3
      Session(IDs|Tickets) if ECH configs are setup
    * bmo#1714245 - On HRR skip PSK incompatible with negotiated
      ciphersuites hash algorithm
    * bmo#1789410 - ECH client: Send ech_required alert on server
      negotiating TLS 1.2. Fixed misleading Gtest,
      enabled corresponding BoGo test
    * bmo#1771100 - Added Bogo ECH rejection test support
    * bmo#1771100 - Added ECH 0Rtt support to BoGo shim
    * bmo#1747957 - RSA OAEP Wycheproof JSON
    * bmo#1747957 - RSA decrypt Wycheproof JSON
    * bmo#1747957 - ECDSA Wycheproof JSON
    * bmo#1747957 - ECDH Wycheproof JSON
    * bmo#1747957 - PKCS#1v1.5 wycheproof json
    * bmo#1747957 - Use X25519 wycheproof json
    * bmo#1766767 - Move scripts to python3
    * bmo#1809627 - Properly link FuzzingEngine for oss-fuzz.
    * bmo#1805907 - Extending RSA-PSS bltest test coverage
      (Adding SHA-256 and SHA-384)
    * bmo#1804091 - NSS needs to move off of DSA for integrity checks
    * bmo#1805815 - Add initial testing with ACVP vector sets using
      acvp-rust
    * bmo#1806369 - Don't clone libFuzzer, rely on clang instead
* Tue Feb 14 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.87
    * bmo#1803226 - NULL password encoding incorrect
    * bmo#1804071 - Fix rng stub signature for fuzzing builds
    * bmo#1803595 - Updating the compiler parsing for build
    * bmo#1749030 - Modification of supported compilers
    * bmo#1774654 - tstclnt crashes when accessing gnutls server
      without a user cert in the database.
    * bmo#1751707 - Add configuration option to enable source-based
      coverage sanitizer
    * bmo#1751705 - Update ECCKiila generated files.
    * bmo#1730353 - Add support for the LoongArch 64-bit architecture
    * bmo#1798823 - add checks for zero-length RSA modulus to avoid
      memory errors and failed assertions later
    * bmo#1798823 - Additional zero-length RSA modulus checks
  - add man-pages to the tools package (boo#1208242)
* Sun Jan 15 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.86
    * bmo#1803190 - conscious language removal in NSS
    * bmo#1794506 - Set nssckbi version number to 2.60
    * bmo#1803453 - Set CKA_NSS_SERVER_DISTRUST_AFTER and
      CKA_NSS_EMAIL_DISTRUST_AFTER for 3
      TrustCor Root Certificates
    * bmo#1799038 - Remove Staat der Nederlanden EV Root CA from NSS
    * bmo#1797559 - Remove EC-ACC root cert from NSS
    * bmo#1794507 - Remove SwissSign Platinum CA - G2 from NSS
    * bmo#1794495 - Remove Network Solutions Certificate Authority
    * bmo#1802331 - compress docker image artifact with zstd
    * bmo#1799315 - Migrate nss from AWS to GCP
    * bmo#1800989 - Enable static builds in the CI
    * bmo#1765759 - Removing SAW docker from the NSS build system
    * bmo#1783231 - Initialising variables in the rsa blinding code
    * bmo#320582 - Implementation of the double-signing of the message
      for ECDSA
    * bmo#1783231 - Adding exponent blinding for RSA.
* Mon Dec 05 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.85
    * bmo#1792821 - Modification of the primes.c and dhe-params.c in
      order to have better looking tables
    * bmo#1796815 - Update zlib in NSS to 1.2.13
    * bmo#1796504 - Skip building modutil and shlibsign when building
      in Firefox
    * bmo#1796504 - Use __STDC_VERSION__ rather than __STDC__ as a guard
    * bmo#1796407 - Fix -Wunused-but-set-variable warning from clang 15
    * bmo#1796308 - Fix -Wtautological-constant-out-of-range-compare
      and -Wtype-limits warnings
    * bmo#1796281 - Followup: add missing stdint.h include
    * bmo#1796281 - Fix -Wint-to-void-pointer-cast warnings
    * bmo#1796280 - Fix -Wunused-{function,variable,but-set-variable}
      warnings on Windows
    * bmo#1796079 - Fix -Wstring-conversion warnings
    * bmo#1796075 - Fix -Wempty-body warnings
    * bmo#1795242 - Fix unused-but-set-parameter warning
    * bmo#1795241 - Fix unreachable-code warnings
    * bmo#1795222 - Mark _nss_version_c unused on clang-cl
    * bmo#1795668 - Remove redundant variable definitions in lowhashtest
    * Add note about python executable to build instructions.
* Fri Nov 11 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.84
    * bmo#1791699 - Bump minimum NSPR version to 4.35
    * bmo#1792103 - Add a flag to disable building libnssckbi.
* Sun Oct 16 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.83
    * bmo#1788875 - Remove set-but-unused variables from
      SEC_PKCS12DecoderValidateBags
    * bmo#1563221 - remove older oses that are unused part3/ BeOS
    * bmo#1563221 - remove older unix support in NSS part 3 Irix
    * bmo#1563221 - remove support for older unix in NSS part 2 DGUX
    * bmo#1563221 - remove support for older unix in NSS part 1 OSF
    * bmo#1778413 - Set nssckbi version number to 2.58
    * bmp#1785297 - Add two SECOM root certificates to NSS
    * bmo#1787075 - Add two DigitalSign root certificates to NSS
    * bmo#1778412 - Remove Camerfirma Global Chambersign Root from NSS
    * bmo#1771100 - Added bug reference and description to disabled
      UnsolicitedServerNameAck bogo ECH test
    * bmo#1779361 - Removed skipping of ECH on equality of private and
      public server name
    * bmo#1779357 - Added comment and bug reference to
      ECHRandomHRRExtension bogo test
    * bmo#1779370 - Added Bogo shim client HRR test support. Fixed
      overwriting of CHInner.random on HRR
    * bmo#1779234 - Added check for server only sending ECH extension
      with retry configs in EncryptedExtensions and if not
      accepting ECH. Changed config setting behavior to
      skip configs with unsupported mandatory extensions
      instead of failing
    * bmo# 1771100 - Added ECH client support to BoGo shim. Changed
      CHInner creation to skip TLS 1.2 only extensions to
      comply with BoGo
    * bmo#1771100 - Added ECH server support to BoGo shim. Fixed NSS ECH
      server accept_confirmation bugs
    * bmo#1771100 - Update BoGo tests to recent BoringSSL version
    * bmo#1785846 - Bump minimum NSPR version to 4.34.1
* Sat Sep 17 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.82
    * bmo#1330271 - check for null template in sec_asn1{d,e}_push_state
    * bmo#1735925 - QuickDER: Forbid NULL tags with non-zero length
    * bmo#1784724 - Initialize local variables in
      TlsConnectTestBase::ConnectAndCheckCipherSuite
    * bmo#1784191 - Cast the result of GetProcAddress
    * bmo#1681099 - pk11wrap: Tighten certificate lookup based on
      PKCS #11 URI.
* Wed Aug 17 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.81
    * bmo#1762831 - Enable aarch64 hardware crypto support on OpenBSD
    * bmo#1775359 - make NSS_SecureMemcmp 0/1 valued
    * bmo#1779285 - Add no_application_protocol alert handler and
      test client error code is set
    * bmo#1777672 - Gracefully handle null nickname in
      CERT_GetCertNicknameWithValidity
    * required for Firefox 104
  - raised NSPR requirement to 4.34.1
  - changing some Requires from (pre) to generic as (pre) is not
    sufficient (boo#1202118)
* Tue Jul 26 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.80
    * bmo#1774720 - Fix SEC_ERROR_ALGORITHM_MISMATCH entry in SECerrs.h.
    * bmo#1617956 - Add support for asynchronous client auth hooks.
    * bmo#1497537 - nss-policy-check: make unknown keyword check optional.
    * bmo#1765383 - GatherBuffer: Reduced plaintext buffer allocations
      by allocating it on initialization. Replaced
      redundant code with assert. Debug builds: Added
      buffer freeing/allocation for each record.
    * bmo#1773022 - Mark 3.79 as an ESR release.
    * bmo#1764206 - Bump nssckbi version number for June.
    * bmo#1759815 - Remove Hellenic Academic 2011 Root.
    * bmo#1770267 - Add E-Tugra Roots.
    * bmo#1768970 - Add Certainly Roots.
    * bmo#1764392 - Add DigitCert Roots.
    * bmo#1759794 - Protect SFTKSlot needLogin with slotLock.
    * bmo#1366464 - Compare signature and signatureAlgorithm fields in
      legacy certificate verifier.
    * bmo#1771497 - Uninitialized value in cert_VerifyCertChainOld.
    * bmo#1771495 - Unchecked return code in sec_DecodeSigAlg.
    * bmo#1771498 - Uninitialized value in cert_ComputeCertType.
    * bmo#1760998 - Avoid data race on primary password change.
    * bmo#1769063 - Replace ppc64 dcbzl intrinisic.
    * bmo#1771036 - Allow LDFLAGS override in makefile builds.
* Sat Jun 25 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - sync with current SLE
    * latest FIPS changes incl. testsuite fixes (enabled now)
      nss-fips-180-3-csp-clearing.patch
      nss-fips-tests-enable-fips.patch
      nss-fips-tests-skip.patch
      nss-fips-pbkdf-kat-compliance.patch
* Sun Jun 12 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.79
    * bmo#205717 - Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
    * bmo#1766907 - Update mercurial in clang-format docker image.
    * bmo#1454072 - Use of uninitialized pointer in lg_init after alloc fail.
    * bmo#1769295 - selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
    * bmo#1753315 - Add SECMOD_LockedModuleHasRemovableSlots.
    * bmo#1387919 - Fix secasn1d parsing of indefinite SEQUENCE inside
      indefinite GROUP.
    * bmo#1765753 - Added RFC8422 compliant TLS <= 1.2 undefined/compressed
      ECPointFormat extension alerts.
    * bmo#1765753 - TLS 1.3 Server: Send protocol_version alert on
      unsupported ClientHello.legacy_version.
    * bmo#1764788 - Correct invalid record inner and outer content type alerts.
    * bmo#1757075 - NSS does not properly import or export pkcs12 files
      with large passwords and pkcs5v2 encoding.
    * bmo#1766978 - improve error handling after nssCKFWInstance_CreateObjectHandle.
    * bmo#1767590 - Initialize pointers passed to
      NSS_CMSDigestContext_FinishMultiple.
    * bmo#1769302 - NSS 3.79 should depend on NSPR 4.34
* Tue May 31 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.78.1
    * bmo#1767590 - Initialize pointers passed to
      NSS_CMSDigestContext_FinishMultiple
* Mon May 30 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.78
    * bmo#1755264 - Added TLS 1.3 zero-length inner plaintext checks and
      tests, zero-length record/fragment handling tests.
    * bmo#1294978 - Reworked overlong record size checks and added TLS1.3
      specific boundaries.
    * bmo#1763120 - Add ECH Grease Support to tstclnt
    * bmo#1765003 - Add a strict variant of moz::pkix::CheckCertHostname.
    * bmo#1166338 - Change SSL_REUSE_SERVER_ECDHE_KEY default to false.
    * bmo#1760813 - Make SEC_PKCS12EnableCipher succeed
    * bmo#1762489 - Update zlib in NSS to 1.2.12.
* Thu Apr 28 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.77
    * Bug 1762244 - resolve mpitests build failure on Windows.
    * bmo#1761779 - Fix link to TLS page on wireshark wiki
    * bmo#1754890 - Add two D-TRUST 2020 root certificates.
    * bmo#1751298 - Add Telia Root CA v2 root certificate.
    * bmo#1751305 - Remove expired explicitly distrusted certificates
      from certdata.txt.
    * bmo#1005084 - support specific RSA-PSS parameters in mozilla::pkix
    * bmo#1753535 - Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate.
    * bmo#1756271 - Remove token member from NSSSlot struct.
    * bmo#1602379 - Provide secure variants of mpp_pprime and mpp_make_prime.
    * bmo#1757279 - Support UTF-8 library path in the module spec string.
    * bmo#1396616 - Update nssUTF8_Length to RFC 3629 and fix buffer overrun.
    * bmo#1760827 - Add a CI Target for gcc-11.
    * bmo#1760828 - Change to makefiles for gcc-4.8.
    * bmo#1741688 - Update googletest to 1.11.0
    * bmo#1759525 - Add SetTls13GreaseEchSize to experimental API.
    * bmo#1755264 - TLS 1.3 Illegal legacy_version handling/alerts.
    * bmo#1755904 - Fix calculation of ECH HRR Transcript.
    * bmo#1758741 - Allow ld path to be set as environment variable.
    * bmo#1760653 - Ensure we don't read uninitialized memory in ssl gtests.
    * bmo#1758478 - Fix DataBuffer Move Assignment.
    * bmo#1552254 - internal_error alert on Certificate Request with
      sha1+ecdsa in TLS 1.3
    * bmo#1755092 - rework signature verification in mozilla::pkix
* Sun Apr 10 2022 Callum Farmer <gmbr3@opensuse.org>
  - Require nss-util in nss.pc and subsequently remove -lnssutil3
* Sat Apr 02 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.76.1
    NSS 3.76.1
    * bmo#1756271 - Remove token member from NSSSlot struct.
    NSS 3.76
    * bmo#1755555 - Hold tokensLock through nssToken_GetSlot calls in
      nssTrustDomain_GetActiveSlots.
    * bmo#1370866 - Check return value of PK11Slot_GetNSSToken.
    * bmo#1747957 - Use Wycheproof JSON for RSASSA-PSS
    * bmo#1679803 - Add SHA256 fingerprint comments to old
      certdata.txt entries.
    * bmo#1753505 - Avoid truncating files in nss-release-helper.py.
    * bmo#1751157 - Throw illegal_parameter alert for illegal extensions
      in handshake message.
* Fri Mar 25 2022 Callum Farmer <gmbr3@opensuse.org>
  - Add nss-util pkgconfig and config files (copied from RH/Fedora)
* Wed Mar 02 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.75
    * bmo#1749030 - This patch adds gcc-9 and gcc-10 to the CI.
    * bmo#1749794 - Make DottedOIDToCode.py compatible with python3.
    * bmo#1749475 - Avoid undefined shift in SSL_CERT_IS while fuzzing.
    * bmo#1748386 - Remove redundant key type check.
    * bmo#1749869 - Update ABI expectations to match ECH changes.
    * bmo#1748386 - Enable CKM_CHACHA20.
    * bmo#1747327 - check return on NSS_NoDB_Init and NSS_Shutdown.
    * bmo#1747310 - real move assignment operator.
    * bmo#1748245 - Run ECDSA test vectors from bltest as part of the CI tests.
    * bmo#1743302 - Add ECDSA test vectors to the bltest command line tool.
    * bmo#1747772 - Allow to build using clang's integrated assembler.
    * bmo#1321398 - Allow to override python for the build.
    * bmo#1747317 - test HKDF output rather than input.
    * bmo#1747316 - Use ASSERT macros to end failed tests early.
    * bmo#1747310 - move assignment operator for DataBuffer.
    * bmo#1712879 - Add test cases for ECH compression and unexpected
      extensions in SH.
    * bmo#1725938 - Update tests for ECH-13.
    * bmo#1725938 - Tidy up error handling.
    * bmo#1728281 - Add tests for ECH HRR Changes.
    * bmo#1728281 - Server only sends GREASE HRR extension if enabled
      by preference.
    * bmo#1725938 - Update generation of the Associated Data for ECH-13.
    * bmo#1712879 - When ECH is accepted, reject extensions which were
      only advertised in the Outer Client Hello.
    * bmo#1712879 - Allow for compressed, non-contiguous, extensions.
    * bmo#1712879 - Scramble the PSK extension in CHOuter.
    * bmo#1712647 - Split custom extension handling for ECH.
    * bmo#1728281 - Add ECH-13 HRR Handling.
    * bmo#1677181 - Client side ECH padding.
    * bmo#1725938 - Stricter ClientHelloInner Decompression.
    * bmo#1725938 - Remove ECH_inner extension, use new enum format.
    * bmo#1725938 - Update the version number for ECH-13 and adjust
      the ECHConfig size.
* Mon Jan 24 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.74
    * bmo#966856 - mozilla::pkix: support SHA-2 hashes in CertIDs in
      OCSP responses
    * bmo#1553612 - Ensure clients offer consistent ciphersuites after HRR
    * bmo#1721426 - NSS does not properly restrict server keys based on policy
    * bmo#1733003 - Set nssckbi version number to 2.54
    * bmo#1735407 - Replace Google Trust Services LLC (GTS) R4 root certificate
    * bmo#1735407 - Replace Google Trust Services LLC (GTS) R3 root certificate
    * bmo#1735407 - Replace Google Trust Services LLC (GTS) R2 root certificate
    * bmo#1735407 - Replace Google Trust Services LLC (GTS) R1 root certificate
    * bmo#1735407 - Replace GlobalSign ECC Root CA R4
    * bmo#1733560 - Remove Expired Root Certificates - DST Root CA X3
    * bmo#1740807 - Remove Expiring Cybertrust Global Root and GlobalSign root
      certificates
    * bmo#1741930 - Add renewed Autoridad de Certificacion Firmaprofesional
      CIF A62634068 root certificate
    * bmo#1740095 - Add iTrusChina ECC root certificate
    * bmo#1740095 - Add iTrusChina RSA root certificate
    * bmo#1738805 - Add ISRG Root X2 root certificate
    * bmo#1733012 - Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate
    * bmo#1738028 - Avoid a clang 13 unused variable warning in opt build
    * bmo#1735028 - Check for missing signedData field
    * bmo#1737470 - Ensure DER encoded signatures are within size limits
  - enable key logging option (boo#1195040)
* Wed Dec 29 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - update to NSS 3.73.1:
    * Add SHA-2 support to mozilla::pkix's OSCP implementation
* Wed Dec 01 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.73
    * bmo#1735028 - check for missing signedData field.
    * bmo#1737470 - Ensure DER encoded signatures are within size limits.
    * bmo#1729550 - NSS needs FiPS 140-3 version indicators.
    * bmo#1692132 - pkix_CacheCert_Lookup doesn't return cached certs
    * bmo#1738600 - sunset Coverity from NSS
    MFSA 2021-51 (bsc#1193170)
    * CVE-2021-43527 (bmo#1737470)
      Memory corruption via DER-encoded DSA and RSA-PSS signatures
* Sun Nov 28 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.72
    * Remove newline at the end of coreconf.dep
    * bmo#1731911 - Fix nsinstall parallel failure.
    * bmo#1729930 - Increase KDF cache size to mitigate perf
      regression in about:logins
* Sat Oct 23 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.71
    * bmo#1717716 - Set nssckbi version number to 2.52.
    * bmo#1667000 - Respect server requirements of tlsfuzzer/test-tls13-signature-algorithms.py
    * bmo#1373716 - Import of PKCS#12 files with Camellia encryption is not supported
    * bmo#1717707 - Add HARICA Client ECC Root CA 2021.
    * bmo#1717707 - Add HARICA Client RSA Root CA 2021.
    * bmo#1717707 - Add HARICA TLS ECC Root CA 2021.
    * bmo#1717707 - Add HARICA TLS RSA Root CA 2021.
    * bmo#1728394 - Add TunTrust Root CA certificate to NSS.
  - required for Firefox 94
* Fri Oct 01 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.70
    * bmo#1726022 - Update test case to verify fix.
    * bmo#1714579 - Explicitly disable downgrade check in TlsConnectStreamTls13.EchOuterWith12Max
    * bmo#1714579 - Explicitly disable downgrade check in TlsConnectTest.DisableFalseStartOnFallback
    * bmo#1681975 - Avoid using a lookup table in nssb64d.
    * bmo#1724629 - Use HW accelerated SHA2 on AArch64 Big Endian.
    * bmo#1714579 - Change default value of enableHelloDowngradeCheck to true.
    * bmo#1726022 - Cache additional PBE entries.
    * bmo#1709750 - Read HPKE vectors from official JSON.
  - required for Firefox 93
* Fri Sep 03 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - Update to NSS 3.69.1
    * bmo#1722613 (Backout) - Disable DTLS 1.0 and 1.1 by default
    * bmo#1720226 (Backout) - integrity checks in key4.db not happening
      on private components with AES_CBC
    NSS 3.69
    * bmo#1722613 - Disable DTLS 1.0 and 1.1 by default (backed out again)
    * bmo#1720226 - integrity checks in key4.db not happening on private
      components with AES_CBC (backed out again)
    * bmo#1720235 - SSL handling of signature algorithms ignores
      environmental invalid algorithms.
    * bmo#1721476 - sqlite 3.34 changed it's open semantics, causing
      nss failures.
      (removed obsolete nss-btrfs-sqlite.patch)
    * bmo#1720230 - Gtest update changed the gtest reports, losing gtest
      details in all.sh reports.
    * bmo#1720228 - NSS incorrectly accepting 1536 bit DH primes in FIPS mode
    * bmo#1720232 - SQLite calls could timeout in starvation situations.
    * bmo#1720225 - Coverity/cpp scanner errors found in nss 3.67
    * bmo#1709817 - Import the NSS documentation from MDN in nss/doc.
    * bmo#1720227 - NSS using a tempdir to measure sql performance not active
  - add nss-fips-stricter-dh.patch
  - updated existing patches with latest SLE
* Wed Aug 18 2021 Hans Petter Jansson <hpj@suse.com>
  - Update nss-fips-constructor-self-tests.patch to fix crashes
    reported by upstream. This was likely affecting WebRTC calls.
* Thu Aug 05 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.68
    * bmo#1713562 - Fix test leak.
    * bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
    * bmo#1693206 - Implement PKCS8 export of ECDSA keys.
    * bmo#1712883 - DTLS 1.3 draft-43.
    * bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
    * bmo#1713562 - Validate ECH public names.
    * bmo#1717610 - Add function to get seconds from epoch from pkix::Time.
  - required by Firefox 91.0
  - added nss-fips-fix-missing-nspr.patch (via SLE sync)
* Sat Jul 10 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.66
    * no releasenotes available yet
      https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.66_release_notes
  - update to NSS 3.65
    * bmo#1709654 - Update for NetBSD configuration.
    * bmo#1709750 - Disable HPKE test when fuzzing.
    * bmo#1566124 - Optimize AES-GCM for ppc64le.
    * bmo#1699021 - Add AES-256-GCM to HPKE.
    * bmo#1698419 - ECH -10 updates.
    * bmo#1692930 - Update HPKE to final version.
    * bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
    * bmo#1703936 - New coverity/cpp scanner errors.
    * bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
    * bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
    * bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.
  - refreshed patches
  - Firefox 90.0 requires NSS 3.66
* Thu May 27 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - update to NSS 3.64
    * bmo#1705286 - Properly detect mips64.
    * bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
      disable_crypto_vsx.
    * bmo#1698320 - replace __builtin_cpu_supports("vsx") with
      ppc_crypto_support() for clang.
    * bmo#1613235 - Add POWER ChaCha20 stream cipher vector
      acceleration.
* Sun Apr 18 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.63.1
    * no upstream release notes for 3.63.1 (yet)
    Fixed in 3.63
    * bmo#1697380 - Make a clang-format run on top of helpful contributions.
    * bmo#1683520 - ECCKiila P384, change syntax of nested structs
      initialization to prevent build isses with GCC 4.8.
    * bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
      scalar multiplication.
    * bmo#1683520 - ECCKiila P521, change syntax of nested structs
      initialization to prevent build isses with GCC 4.8.
    * bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
      scalar multiplication.
    * bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
    * bmo#1694214 - tstclnt can't enable middlebox compat mode.
    * bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
      profiles.
    * bmo#1685880 - Minor fix to prevent unused variable on early return.
    * bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
      with nss build.
    * bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
      of root CA changes, CA list version 2.48.
    * bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
      'Chambers of Commerce' and 'Global Chambersign' roots.
    * bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
    * bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
    * bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
    * bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
      from NSS.
    * bmo#1687822 - Turn off Websites trust bit for the “Staat der
      Nederlanden Root CA - G3” root cert in NSS.
    * bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
      Root - 2008' and 'Global Chambersign Root - 2008’.
    * bmo#1694291 - Tracing fixes for ECH.
  - required for Firefox 88
* Tue Mar 16 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.62
    * bmo#1688374 - Fix parallel build NSS-3.61 with make
    * bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
      can corrupt "cachedCertTable"
    * bmo#1690583 - Fix CH padding extension size calculation
    * bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
    * bmo#1690421 - Install packaged libabigail in docker-builds image
    * bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
    * bmo#1674819 - Fixup a51fae403328, enum type may be signed
    * bmo#1681585 - Add ECH support to selfserv
    * bmo#1681585 - Update ECH to Draft-09
    * bmo#1678398 - Add Export/Import functions for HPKE context
    * bmo#1678398 - Update HPKE to draft-07
  - required for Firefox 87
* Sun Feb 28 2021 Sasi Olin <hel@lcp.world>
  - Add nss-btrfs-sqlite.patch to address bmo#1690232
* Sun Feb 21 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.61
    * required for Firefox 86
    * bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
      values under certain conditions.
    * bmo#1684300 - Fix default PBE iteration count when NSS is compiled
      with NSS_DISABLE_DBM.
    * bmo#1651411 - Improve constant-timeness in RSA operations.
    * bmo#1677207 - Upgrade Google Test version to latest release.
    * bmo#1654332 - Add aarch64-make target to nss-try.
* Sun Jan 24 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.60.1
    Notable changes in NSS 3.60:
    * TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
      has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
      implementation. See bmo#1654332 for more information.
    * December 2020 batch of Root CA changes, builtins library updated
      to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
      for more information.
  - removed obsolete ppc-old-abi-v3.patch
* Sun Dec 27 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.59.1
    * bmo#1679290 - Fix potential deadlock with certain third-party
      PKCS11 modules
* Tue Dec 01 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.59
    Notable changes
    * Exported two existing functions from libnss:
      CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData
    Bugfixes
    * bmo#1607449 - Lock cert->nssCertificate to prevent a potential data race
    * bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
    * bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
    * bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
    * bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
      root certs when SHA1 signatures are disabled.
    * bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
      solve some test intermittents
    * bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
      our CVE-2020-25648 fix that broke purple-discord
      (boo#1179382)
    * bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
    * bmo#1667989 - Fix gyp linking on Solaris
    * bmo#1668123 - Export CERT_AddCertToListHeadWithData and
      CERT_AddCertToListTailWithData from libnss
    * bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
    * bmo#1663091 - Remove unnecessary assertions in the streaming
      ASN.1 decoder that affected decoding certain PKCS8
      private keys when using NSS debug builds
    * bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.
* Sun Nov 15 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.58
    Bugs fixed:
    * bmo#1641480 (CVE-2020-25648)
      Tighten CCS handling for middlebox compatibility mode.
    * bmo#1631890 - Add support for Hybrid Public Key Encryption
      (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
      (draft-ietf-tls-esni).
    * bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
      extensions.
    * bmo#1668328 - Handle spaces in the Python path name when using
      gyp on Windows.
    * bmo#1667153 - Add PK11_ImportDataKey for data object import.
    * bmo#1665715 - Pass the embedded SCT list extension (if present)
      to TrustDomain::CheckRevocation instead of the notBefore value.
* Thu Nov 12 2020 Ludwig Nussel <lnussel@suse.de>
  - install libraries in %{_libdir} (boo#1029961)
* Mon Oct 12 2020 Dominique Leuenberger <dimstar@opensuse.org>
  - Fix build with RPM 4.16: error: bare words are no longer
    supported, please use "...":  lib64 == lib64.
* Wed Sep 30 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.57
    * The following CA certificates were Added:
      bmo#1663049 - CN=Trustwave Global Certification Authority
      SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
      bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
      SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
      bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
      SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
    * The following CA certificates were Removed:
      bmo#1651211 - CN=EE Certification Centre Root CA
      SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
      bmo#1656077 - O=Government Root Certification Authority; C=TW
      SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
    * Trust settings for the following CA certificates were Modified:
      bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
      Websites (server authentication) trust bit removed.
    * https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes
  - requires NSPR 4.29
  - removed obsolete nss-freebl-fix-aarch64.patch (bmo#1659256)
  - introduced _constraints due to high memory requirements especially
    for LTO on Tumbleweed
* Fri Sep 25 2020 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Add patch to fix build on aarch64 - boo#1176934:
    * nss-freebl-fix-aarch64.patch
* Thu Sep 17 2020 Hans Petter Jansson <hpj@suse.com>
  - Update nss-fips-approved-crypto-non-ec.patch to match RC2 code
    being moved to deprecated/.
  - Remove nss-fix-dh-pkcs-derive-inverted-logic.patch. This was made
    obsolete by upstream changes.
* Tue Sep 08 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.56
    Notable changes
    * bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
    * bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
    * bmo#1654142 - Add CPU feature detection for Intel SHA extension.
    * bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
    * bmo#1656986 - Properly detect arm64 during GYP build architecture
      detection.
    * bmo#1652729 - Add build flag to disable RC2 and relocate to
      lib/freebl/deprecated.
    * bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
    * bmo#1588941 - Send empty certificate message when scheme selection
      fails.
    * bmo#1652032 - Fix failure to build in Windows arm64 makefile
      cross-compilation.
    * bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
    * bmo#1653975 - Fix 3.53 regression by setting "all" as the default
      makefile target.
    * bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
    * bmo#1659814 - Fix interop.sh failures with newer tls-interop
      commit and dependencies.
    * bmo#1656519 - NSPR dependency updated to 4.28
  - do not hard require mozilla-nss-certs-32bit via baselibs
    (boo#1176206)
* Sat Aug 22 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.55
    Notable changes
    * P384 and P521 elliptic curve implementations are replaced with
      verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
    * PK11_FindCertInSlot is added. With this function, a given slot
      can be queried with a DER-Encoded certificate, providing performance
      and usability improvements over other mechanisms. (bmo#1649633)
    * DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)
    Relevant Bugfixes
    * bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
      P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
    * bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
    * bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
    * bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
      ChaCha20 (which was not functioning correctly) and more strictly
      enforce tag length.
    * bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
    * bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
    * bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
    * bmo#1653202 - Fix initialization bug in blapitest when compiled
      with NSS_DISABLE_DEPRECATED_SEED.
    * bmo#1646594 - Fix AVX2 detection in makefile builds.
    * bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
      for a DER-encoded certificate.
    * bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
    * bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
    * bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
    * bmo#1649226 - Add Wycheproof ECDSA tests.
    * bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
    * bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
      RSA_CheckSignRecover.
    * bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
      signature_algorithms extension.
* Thu Jul 23 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.54
    Notable changes
    * Support for TLS 1.3 external pre-shared keys (bmo#1603042).
    * Use ARM Cryptography Extension for SHA256, when available
      (bmo#1528113)
    * The following CA certificates were Added:
      bmo#1645186 - certSIGN Root CA G2.
      bmo#1645174 - e-Szigno Root CA 2017.
      bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
      bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
    * The following CA certificates were Removed:
      bmo#1645199 - AddTrust Class 1 CA Root.
      bmo#1645199 - AddTrust External CA Root.
      bmo#1641718 - LuxTrust Global Root 2.
      bmo#1639987 - Staat der Nederlanden Root CA - G2.
      bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
      bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
      bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.
    * A number of certificates had their Email trust bit disabled.
      See bmo#1618402 for a complete list.
    Bugs fixed
    * bmo#1528113 - Use ARM Cryptography Extension for SHA256.
    * bmo#1603042 - Add TLS 1.3 external PSK support.
    * bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
    * bmo#1645186 - Add "certSIGN Root CA G2" root certificate.
    * bmo#1645174 - Add Microsec's "e-Szigno Root CA 2017" root certificate.
    * bmo#1641716 - Add Microsoft's non-EV root certificates.
    * bmo1621151 - Disable email trust bit for "O=Government
      Root Certification Authority; C=TW" root.
    * bmo#1645199 - Remove AddTrust root certificates.
    * bmo#1641718 - Remove "LuxTrust Global Root 2" root certificate.
    * bmo#1639987 - Remove "Staat der Nederlanden Root CA - G2" root
      certificate.
    * bmo#1618402 - Remove Symantec root certificates and disable email trust
      bit.
    * bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
    * bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
    * bmo#1642153 - Fix infinite recursion building NSS.
    * bmo#1642638 - Fix fuzzing assertion crash.
    * bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
    * bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
    * bmo#1643557 - Fix numerous compile warnings in NSS.
    * bmo#1644774 - SSL gtests to use ClearServerCache when resetting
      self-encrypt keys.
    * bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
    * bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.
* Sat Jun 27 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - add FIPS mode patches from SLE stream
    nss-fips-aes-keywrap-post.patch
    nss-fips-approved-crypto-non-ec.patch
    nss-fips-cavs-dsa-fixes.patch
    nss-fips-cavs-general.patch
    nss-fips-cavs-kas-ecc.patch
    nss-fips-cavs-kas-ffc.patch
    nss-fips-cavs-keywrap.patch
    nss-fips-cavs-rsa-fixes.patch
    nss-fips-combined-hash-sign-dsa-ecdsa.patch
    nss-fips-constructor-self-tests.patch
    nss-fips-detect-fips-mode-fixes.patch
    nss-fips-dsa-kat.patch
    nss-fips-gcm-ctr.patch
    nss-fips-pairwise-consistency-check.patch
    nss-fips-rsa-keygen-strictness.patch
    nss-fips-tls-allow-md5-prf.patch
    nss-fips-use-getrandom.patch
    nss-fips-use-strong-random-pool.patch
    nss-fips-zeroization.patch
    nss-fix-dh-pkcs-derive-inverted-logic.patch
* Tue Jun 23 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.53.1
    * required for Firefox 78
    * CVE-2020-12402 - Use constant-time GCD and modular inversion in MPI.
      (bmo#1631597, bsc#1173032)
* Sun Jun 21 2020 Michel Normand <normand@linux.vnet.ibm.com>
  - Add ppc-old-abi-v3.patch as per upstream bug
    https://bugzilla.mozilla.org/show_bug.cgi?id=1642174
* Thu Jun 11 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.53
    Notable changes
    * SEED is now moved into a new freebl directory freebl/deprecated
      bmo#1636389
    * SEED will be disabled by default in a future release of NSS. At
      that time, users will need to set the compile-time flag
      (bmo#1622033) to disable that deprecation in order to use the
      algorithm.
    * Algorithms marked as deprecated will ultimately be removed
    * Several root certificates in the Mozilla program now set the
      CKA_NSS_SERVER_DISTRUST_AFTER attribute, which NSS consumers
      can query to further refine trust decisions. (bmo#1618404,
      bmo#1621159). If a builtin certificate has a
      CKA_NSS_SERVER_DISTRUST_AFTER timestamp before the SCT or
      NotBefore date of a certificate that builtin issued, then clients
      can elect not to trust it.
* Tue May 26 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.52.1
    * required for Firefox 77.0
    Notable changes
    * Update NSS to support PKCS#11 v3.0 (bmo#1603628)
    * Support new PKCS #11 v3.0 Message Interface for AES-GCM and
      ChaChaPoly (bmo#1623374)
    * Integrate AVX2 ChaCha20, Poly1305, and ChaCha20Poly1305 from HACL*
      (bmo#1612493)
    * CVE-2020-12399 - Force a fixed length for DSA exponentiation
      (bmo#1631576, boo#1171978)
  - removed obsolete nss-kremlin-ppc64le.patch
* Wed Apr 29 2020 Martin Liška <mliska@suse.cz>
  - Set NSS_ENABLE_WERROR=0 in order to fix boo#1169746.
* Sat Apr 11 2020 Andreas Stieger <andreas.stieger@gmx.de>
  - update to NSS 3.51.1:
    * Update Delegated Credentials implementation to draft-07
      (bmo#1617968)
    * Add workaround option to include both DTLS and TLS versions in
      DTLS supported_versions (bmo#1619102)
    * Update README: TLS 1.3 is not experimental anymore
      (bmo#1619056)
    * Don't assert fuzzer behavior in SSL_ParseSessionTicket
      (bmo#1618739)
    * Fix UBSAN issue in ssl_ParseSessionTicket (bmo#1618915)
    * Consistently handle NULL slot/session (bmo#1608245)
    * broken fipstest handling of KI_len (bmo#1608250)
    * Update Delegated Credentials implementation to draft-07
      (bmo#1617968)
* Tue Mar 31 2020 Michel Normand <normand@linux.vnet.ibm.com>
  - Update previous patch nss-kremlin-ppc64le.patch
    slightly modified to support also ppc64 (BE) versus initial
    https://github.com/FStarLang/kremlin/issues/166
* Tue Mar 31 2020 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - Add patch nss-kremlin-ppc64le.patch to fix ppc and s390x builds
* Mon Mar 30 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.51
    * Updated DTLS 1.3 implementation to Draft-34. (bmo#1608892)
    * Correct swapped PKCS11 values of CKM_AES_CMAC and
      CKM_AES_CMAC_GENERAL (bmo#1611209)
    * Complete integration of Wycheproof ECDH test cases (bmo#1612259)
    * Check if PPC __has_include(<sys/auxv.h>) (bmo#1614183)
    * Fix a compilation error for ‘getFIPSEnv’ "defined but not used"
      (bmo#1614786)
    * Send DTLS version numbers in DTLS 1.3 supported_versions extension
      to avoid an incompatibility. (bmo#1615208)
    * SECU_ReadDERFromFile calls strstr on a string that isn't guaranteed
      to be null-terminated (bmo#1538980)
    * Correct a warning for comparison of integers of different signs:
      'int' and 'unsigned long' in security/nss/lib/freebl/ecl/ecp_25519.c:88
      (bmo#1561337)
    * Add test for mp_int clamping (bmo#1609751)
    * Don't attempt to read the fips_enabled flag on the machine unless
      NSS was built with FIPS enabled (bmo#1582169)
    * Fix a null pointer dereference in BLAKE2B_Update (bmo#1431940)
    * Fix compiler warning in secsign.c (bmo#1617387)
    * Fix a OpenBSD/arm64 compilation error: unused variable 'getauxval'
      (bmo#1618400)
    * Fix a crash on unaligned CMACContext.aes.keySchedule when using
      AES-NI intrinsics (bmo#1610687)
* Tue Mar 03 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.50
    * Verified primitives from HACL* were updated, bringing performance
      improvements for several platforms.
      Note that Intel processors with SSE4 but without AVX are currently
      unable to use the improved ChaCha20/Poly1305 due to a build issue;
      such platforms will fall-back to less optimized algorithms.
      See bmo#1609569 for details
    * Updated DTLS 1.3 implementation to Draft-30.
      See bmo#1599514 for details.
    * Added NIST SP800-108 KBKDF - PKCS#11 implementation.
      See bmo#1599603 for details.
    * Several bugfixes and minor changes
* Thu Feb 27 2020 Fridrich Strba <fstrba@suse.com>
  - Package also the cmac.h needed by blapi.h
* Tue Feb 25 2020 Guillaume GARDET <guillaume.gardet@opensuse.org>
  - Disable LTO on %arm as LTO fails on neon errors
* Sat Feb 08 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.49.2
    Fixed bugs:
    * Fix compilation problems with NEON-specific code in freebl
      (bmo#1608327)
    * Fix a taskcluster issue with Python 2 / Python 3 (bmo#1608895)
* Thu Jan 16 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.49.1
    3.49.1
    https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49.1_release_notes
    * Cache the most recent PBKDF2 password hash, to speed up repeated
      SDR operations, important with the increased KDF iteration counts (bmo#1606992)
    3.49
    https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
    * The legacy DBM database, libnssdbm, is no longer built by default
      when using gyp builds (bmo#1594933)
    * several bugfixes
* Tue Jan 07 2020 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.48
    https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.48_release_notes
    Notable Changes
    * TLS 1.3 is the default maximum TLS version (bmo#1573118)
    * TLS extended master secret is enabled by default, where possible
      (bmo#1575411)
    * The master password PBE now uses 10,000 iterations by default when
      using the default sql (key4.db) storage (bmo#1562671)
    Certificate Authority Changes
    * Added Entrust Root Certification Authority - G4 Cert (bmo#1591178)
    Bugfixes
  - requires NSPR 4.24

Files

/usr/lib64/libnss3.so
/usr/lib64/libnssutil3.so
/usr/lib64/libsmime3.so
/usr/lib64/libssl3.so


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jan 9 12:49:40 2024