Network Security Services
Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled server
applications. Applications built with NSS can support SSL v2 and v3,
TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
certificates, and other security standards.
- Developed at mozilla:Factory
- Sources inherited from project openSUSE:Factory
-
8
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:SLECandidates/mozilla-nss && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
baselibs.conf | 0000000319 319 Bytes | |
cert9.db | 0000009216 9 KB | |
key4.db | 0000011264 11 KB | |
malloc.patch | 0000000488 488 Bytes | |
mozilla-nss-rpmlintrc | 0000000187 187 Bytes | |
mozilla-nss.changes | 0000073106 71.4 KB | |
mozilla-nss.spec | 0000012967 12.7 KB | |
nss-3.26.2.tar.gz | 0007388390 7.05 MB | |
nss-config.in | 0000002408 2.35 KB | |
nss-disable-ocsp-test.patch | 0000000392 392 Bytes | |
nss-no-rpath.patch | 0000000899 899 Bytes | |
nss-opt.patch | 0000000591 591 Bytes | |
nss-sqlitename.patch | 0000000570 570 Bytes | |
nss-uninitialized.patch | 0000000655 655 Bytes | |
nss.pc.in | 0000000250 250 Bytes | |
pkcs11.txt | 0000000450 450 Bytes | |
renegotiate-transitional.patch | 0000000674 674 Bytes | |
setup-nsssysinit.sh | 0000001255 1.23 KB | |
system-nspr.patch | 0000000706 706 Bytes |
Revision 119 (latest revision is 217)
Dominique Leuenberger (dimstar_suse)
accepted
request 440230
from
Wolfgang Rosenauer (wrosenauer)
(revision 119)
- update to NSS 3.26.2 * required for Firefox 50.0 Changes in 3.26 New Functionality: * the selfserv test utility has been enhanced to support ALPN (HTTP/1.1) and 0-RTT * added support for the System-wide crypto policy available on Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation of NSS without the libpkix library Notable Changes: * The following CA certificate was Added CN = ISRG Root X1 * NPN is disabled and ALPN is enabled by default * the NSS test suite now completes with the experimental TLS 1.3 code enabled * several test improvements and additions, including a NIST known answer test Changes in 3.26.2 * MD5 signature algorithms sent by the server in CertificateRequest messages are now properly ignored. Previously, with rare server configurations, an MD5 signature algorithm might have been selected for client authentication and caused the client to abort the connection soon after.
Comments 0