Network Security Services

Edit Package mozilla-nss

Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled server
applications. Applications built with NSS can support SSL v2 and v3,
TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
certificates, and other security standards.

Refresh
Refresh
Source Files
Filename Size Changed
baselibs.conf 0000000319 319 Bytes
cert9.db 0000009216 9 KB
key4.db 0000011264 11 KB
malloc.patch 0000000488 488 Bytes
mozilla-nss-rpmlintrc 0000000187 187 Bytes
mozilla-nss.changes 0000073106 71.4 KB
mozilla-nss.spec 0000012967 12.7 KB
nss-3.26.2.tar.gz 0007388390 7.05 MB
nss-config.in 0000002408 2.35 KB
nss-disable-ocsp-test.patch 0000000392 392 Bytes
nss-no-rpath.patch 0000000899 899 Bytes
nss-opt.patch 0000000591 591 Bytes
nss-sqlitename.patch 0000000570 570 Bytes
nss-uninitialized.patch 0000000655 655 Bytes
nss.pc.in 0000000250 250 Bytes
pkcs11.txt 0000000450 450 Bytes
renegotiate-transitional.patch 0000000674 674 Bytes
setup-nsssysinit.sh 0000001255 1.23 KB
system-nspr.patch 0000000706 706 Bytes
Revision 119 (latest revision is 217)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 440230 from Wolfgang Rosenauer's avatar Wolfgang Rosenauer (wrosenauer) (revision 119)
- update to NSS 3.26.2
  * required for Firefox 50.0
  Changes in 3.26
  New Functionality:
  * the selfserv test utility has been enhanced to support ALPN
    (HTTP/1.1) and 0-RTT
  * added support for the System-wide crypto policy available on
    Fedora Linux see http://fedoraproject.org/wiki/Changes/CryptoPolicy
  * introduced build flag NSS_DISABLE_LIBPKIX that allows compilation
    of NSS without the libpkix library
  Notable Changes:
  * The following CA certificate was Added
    CN = ISRG Root X1
  * NPN is disabled and ALPN is enabled by default
  * the NSS test suite now completes with the experimental TLS 1.3
    code enabled
  * several test improvements and additions, including a NIST known answer test
  Changes in 3.26.2
  * MD5 signature algorithms sent by the server in CertificateRequest
    messages are now properly ignored. Previously, with rare server
    configurations, an MD5 signature algorithm might have been selected
    for client authentication and caused the client to abort the
    connection soon after.
Comments 0
openSUSE Build Service is sponsored by