./devel/nss, Libraries to support development of security-enabled applications

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 3.37.3, Package name: nss-3.37.3, Maintainer: pkgsrc-users

Network Security Services (NSS) is a set of libraries designed to support
cross-platform development of security-enabled server applications.
Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7,
PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security
standards.


Required to run:
[databases/sqlite3] [devel/nspr]

Required to build:
[pkgtools/cwrappers]

Master sites:

SHA1: 8bef50b806fee13da9133cd12c2608685c4ed916
RMD160: 5881c09b9a5b36f066925ffe0009b7a85ab2e34b
Filesize: 22494.374 KB

Version history: (Expand)


CVS history: (Expand)


   2018-06-07 21:04:59 by Ryo ONODERA | Files touched by this commit (2) | Package updated
Log message:
Update to 3.37.3

Changelog:
No new functionality is introduced in these releases.

The following compatibility fixes are included. Users are encouraged to upgrade.

* Bug 1462303 - Connecting to a server that was recently upgraded to
  TLS 1.3 would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
* Bug 1460673 - Fix a rare bug with PKCS#12 files.
   2018-06-01 14:18:03 by Ryo ONODERA | Files touched by this commit (2) | Package updated
Log message:
Update to 3.37.1

Changelog:
No new functionality is introduced in these releases.

The following compatibility fixes are included. Users are encouraged
to upgrade.

* Bug 1462303 - Connecting to a server that was recently upgraded to TLS 1.3
  would result in a SSL_RX_MALFORMED_SERVER_HELLO error.
* Bug 1460673 - Fix a rare bug with PKCS#12 files.
   2018-05-10 22:20:41 by Ryo ONODERA | Files touched by this commit (2) | Package updated
Log message:
Update to 3.37

Changelog:
* The TLS 1.3 implementation was updated to Draft 28.
* An issue where NSS erroneously accepted HRR requests was resolved.
* Added HACL* Poly1305 32-bit
* The code to support the NPN protocol has been fully removed.
* NSS allows servers now to register ALPN handling callbacks to
  select a protocol.
* NSS supports opening SQL databases in read-only mode.
* On Linux, some build configurations can use glibc's function
  getentropy(), which uses the kernel's getrandom() function.
* The CA list was updated to version 2.24, which removed the
  following CA certificates:
  - CN = S-TRUST Universal Root CA
  - CN = TC TrustCenter Class 3 CA II
  - CN = TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5
   2018-04-14 09:34:46 by Adam Ciarcinski | Files touched by this commit (681) | Package updated
Log message:
revbump after icu update
   2018-04-12 16:32:51 by Manuel Bouyer | Files touched by this commit (2)
Log message:
Ajust patch for 3.36.1
   2018-04-12 12:37:11 by Manuel Bouyer | Files touched by this commit (2)
Log message:
!defined(__ANDROID__) doens't mean this is a linux host.
Check defined(__linux__) instead.

XXX do other systems have <sys/auxv.h> ?
   2018-04-10 17:21:30 by Maya Rashish | Files touched by this commit (2) | Package updated
Log message:
nss: update to 3.36.1

No new functionality is introduced in this release.  This is a patch release to \ 
fix regression bugs.

In NSS version 3.35 the iteration count in optimized builds, which is used for \ 
password based encryption algorithm related to encrypted PKCS#7 or PKCS#12 data, \ 
was increased to one million iterations. That change had caused an \ 
interoperability regression with operating systems that are limited to 600 K \ 
iterations. NSS 3.36.1 has been changed to use the same 600 K limit.

Certain smartcard operations could result in a deadlock

This Bugzilla query returns all the bugs fixed in NSS 3.36.1:

https://bugzilla.mozilla.org/buglist.cg … one=3.36.1
   2018-03-17 02:07:15 by Ryo ONODERA | Files touched by this commit (3) | Package updated
Log message:
Update to 3.36

* Require devel/nspr-4.19

Changelog:
The NSS team has released Network Security Services (NSS) 3.36,
which is a minor release.

Summary of the major changes included in this release:
- Replaced existing vectorized ChaCha20 code with verified
  HACL* implementation.
- Experimental APIs for TLS session cache handling.