Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

mozilla-nss-devel-3.106-2.1 RPM for armv6hl

From OpenSuSE Ports Tumbleweed for armv6hl

Name: mozilla-nss-devel Distribution: openSUSE Tumbleweed
Version: 3.106 Vendor: openSUSE
Release: 2.1 Build date: Wed Dec 11 16:00:16 2024
Group: Development/Libraries/C and C++ Build host: reproducible
Size: 2735314 Source RPM: mozilla-nss-3.106-2.1.src.rpm
Packager: http://bugs.opensuse.org
Url: https://www.mozilla.org/projects/security/pki/nss/
Summary: Network (Netscape) Security Services development files
Network Security Services (NSS) is a set of libraries designed to
support cross-platform development of security-enabled server
applications. Applications built with NSS can support SSL v3,
TLS v1.0, v1.1, v1.2, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3
certificates, and other security standards.

Provides

Requires

License

MPL-2.0

Changelog

* Wed Dec 11 2024 Adrian Schröter <adrian@suse.de>
  - fix build on loongarch64 (setting it as 64bit arch)
* Tue Nov 26 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - Remove upstreamed bmo-1400603.patch
  - Added nss-bmo1930797.patch to fix failing tests in testsuite
* Thu Nov 21 2024 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.106
    * bmo#1925975 - NSS 3.106 should be distributed with NSPR 4.36.
    * bmo#1923767 - pk12util: improve error handling in p12U_ReadPKCS12File.
    * bmo#1899402 - Correctly destroy bulkkey in error scenario.
    * bmo#1919997 - PKCS7 fuzz target, r=djackson,nss-reviewers.
    * bmo#1923002 - Extract certificates with handshake collection script.
    * bmo#1923006 - Specify len_control for fuzz targets.
    * bmo#1923280 - Fix memory leak in dumpCertificatePEM.
    * bmo#1102981 - Fix UBSan errors for SECU_PrintCertificate and
      SECU_PrintCertificateBasicInfo.
    * bmo#1921528 - add new error codes to mozilla::pkix for Firefox to use.
    * bmo#1921768 - allow null phKey in NSC_DeriveKey.
    * bmo#1921801 - Only create seed corpus zip from existing corpus.
    * bmo#1826035 - Use explicit allowlist for for KDF PRFS.
    * bmo#1920138 - Increase optimization level for fuzz builds.
    * bmo#1920470 - Remove incorrect assert.
    * bmo#1914870 - Use libFuzzer options from fuzz/options/\*.options in CI.
    * bmo#1920945 - Polish corpus collection for automation.
    * bmo#1917572 - Detect new and unfuzzed SSL options.
    * bmo#1804646 - PKCS12 fuzzing target.
  - requires NSPR 4.36
* Sat Oct 26 2024 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.105
    * bmo#1915792 - Allow importing PKCS#8 private EC keys missing public key
    * bmo#1909768 - UBSAN fix: applying zero offset to null pointer in sslsnce.c
    * bmo#1919577 - set KRML_MUSTINLINE=inline in makefile builds
    * bmo#1918965 - Don't set CKA_SIGN for CKK_EC_MONTGOMERY private keys
    * bmo#1918767 - override default definition of KRML_MUSTINLINE
    * bmo#1916525 - libssl support for mlkem768x25519
    * bmo#1916524 - support for ML-KEM-768 in softoken and pk11wrap
    * bmo#1866841 - Add Libcrux implementation of ML-KEM 768 to FreeBL
    * bmo#1911912 - Avoid misuse of ctype(3) functions
    * bmo#1917311 - part 2: run clang-format
    * bmo#1917311 - part 1: upgrade to clang-format 13
    * bmo#1916953 - clang-format fuzz
    * bmo#1910370 - DTLS client message buffer may not empty be on retransmit
    * bmo#1916413 - Optionally print config for TLS client and server
      fuzz target
    * bmo#1916059 - Fix some simple documentation issues in NSS.
    * bmo#1915439 - improve performance of NSC_FindObjectsInit when
      template has CKA_TOKEN attr
    * bmo#1912828 - define CKM_NSS_ECDHE_NO_PAIRWISE_CHECK_KEY_PAIR_GEN
* Sun Sep 29 2024 ecsos <ecsos@opensuse.org>
  - Fix build error under Leap by rebasing nss-fips-safe-memset.patch.
* Sat Sep 28 2024 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.104
    * bmo#1910071 - Copy original corpus to heap-allocated buffer
    * bmo#1910079 - Fix min ssl version for DTLS client fuzzer
    * bmo#1908990 - Remove OS2 support just like we did on NSPR
    * bmo#1910605 - clang-format NSS improvements
    * bmo#1902078 - Adding basicutil.h to use HexString2SECItem function
    * bmo#1908990 - removing dirent.c from build
    * bmo#1902078 - Allow handing in keymaterial to shlibsign to make
      the output reproducible
    * bmo#1908990 - remove nec4.3, sunos4, riscos and SNI references
    * bmo#1908990 - remove other old OS (BSDI, old HP UX, NCR,
      openunix, sco, unixware or reliantUnix
    * bmo#1908990 - remove mentions of WIN95
    * bmo#1908990 - remove mentions of WIN16
    * bmo#1913750 - More explicit directory naming
    * bmo#1913755 - Add more options to TLS server fuzz target
    * bmo#1913675 - Add more options to TLS client fuzz target
    * bmo#1835240 - Use OSS-Fuzz corpus in NSS CI
    * bmo#1908012 - set nssckbi version number to 2.70.
    * bmo#1914499 - Remove Email Trust bit from ACCVRAIZ1 root cert.
    * bmo#1908009 - Remove Email Trust bit from certSIGN ROOT CA.
    * bmo#1908006 - Add Cybertrust Japan Roots to NSS.
    * bmo#1908004 - Add Taiwan CA Roots to NSS.
    * bmo#1911354 - remove search by decoded serial in
      nssToken_FindCertificateByIssuerAndSerialNumber
    * bmo#1913132 - Fix tstclnt CI build failure
    * bmo#1913047 - vfyserv: ensure peer cert chain is in db for
      CERT_VerifyCertificateNow
    * bmo#1912427 - Enable all supported protocol versions for UDP
    * bmo#1910361 - Actually use random PSK hash type
    * bmo#1911576 - Initialize NSS DB once
    * bmo#1910361 - Additional ECH cipher suites and PSK hash types
    * bmo#1903604 - Automate corpus file generation for TLS client Fuzzer
    * bmo#1910364 - Fix crash with UNSAFE_FUZZER_MODE
    * bmo#1910605 - clang-format shlibsign.c
  - remove obsolete nss-reproducible-builds.patch
* Tue Aug 13 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - update to NSS 3.103
    * bmo#1908623 - move list size check after lock acquisition in sftk_PutObjectToList.
    * bmo#1899542 - Add fuzzing support for SSL_ENABLE_POST_HANDSHAKE_AUTH,
    * bmo#1909638 - Follow-up to fix test for presence of file nspr.patch.
    * bmo#1903783 - Adjust libFuzzer size limits
    * bmo#1899542 - Add fuzzing support for SSL_SetCertificateCompressionAlgorithm,
      SSL_SetClientEchConfigs, SSL_VersionRangeSet and SSL_AddExternalPsk
    * bmo#1899542 - Add fuzzing support for SSL_ENABLE_GREASE and
      SSL_ENABLE_CH_EXTENSION_PERMUTATION
  - Add nss-reproducible-builds.patch to make the rpms reproducible,
    by using a hardcoded, static key to generate the checksums (*.chk-files)
  - Updated nss-fips-approved-crypto-non-ec.patch to enforce
    approved curves with the CKK_EC_MONTGOMERY key type (bsc#1224113).
* Fri Aug 02 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - update to NSS 3.102.1
    * bmo#1905691 - ChaChaXor to return after the function
  - update to NSS 3.102
    * bmo#1880351 - Add Valgrind annotations to freebl Chacha20-Poly1305.
    * bmo#1901932 - missing sqlite header.
    * bmo#1901080 - GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME.
    * bmo#1615298 - improve certutil keyUsage, extKeyUsage, and nsCertType keyword handling.
    * bmo#1660676 - correct length of raw SPKI data before printing in pp utility.
* Mon Jul 29 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - Require `sed` for mozilla-nss-sysinit, as setup-nsssysinit.sh
    depends on it and will create a broken, empty config, if sed is
    missing (bsc#1227918)
* Wed Jul 10 2024 Hans Petter Jansson <hpj@suse.com>
  - Added nss-fips-safe-memset.patch, fixing bsc#1222811.
  - Removed some dead code from nss-fips-constructor-self-tests.patch.
  - Rebased nss-fips-approved-crypto-non-ec.patch on above changes.
  - Added nss-fips-aes-gcm-restrict.patch, fixing bsc#1222830.
  - Updated nss-fips-approved-crypto-non-ec.patch, fixing bsc#1222813,
    bsc#1222814, bsc#1222821, bsc#1222822, bsc#1224118.
  - Updated nss-fips-approved-crypto-non-ec.patch and
    nss-fips-constructor-self-tests.patch, fixing bsc#1222807,
    bsc#1222828, bsc#1222834.
  - Updated nss-fips-approved-crypto-non-ec.patch, fixing bsc#1222804,
    bsc#1222826, bsc#1222833, bsc#1224113, bsc#1224115, bsc#1224116.
* Mon Jul 01 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - update to NSS 3.101.1
    * bmo#1901932 - missing sqlite header.
    * bmo#1901080 - GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME.
* Mon Jun 10 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - update to NSS 3.101
    * bmo#1900413 - add diagnostic assertions for SFTKObject refcount.
    * bmo#1899759 - freeing the slot in DeleteCertAndKey if authentication failed
    * bmo#1899883 - fix formatting issues.
    * bmo#1889671 - Add Firmaprofesional CA Root-A Web to NSS.
    * bmo#1899593 - remove invalid acvp fuzz test vectors.
    * bmo#1898830 - pad short P-384 and P-521 signatures gtests.
    * bmo#1898627 - remove unused FreeBL ECC code.
    * bmo#1898830 - pad short P-384 and P-521 signatures.
    * bmo#1898825 - be less strict about ECDSA private key length.
    * bmo#1854439 - Integrate HACL* P-521.
    * bmo#1854438 - Integrate HACL* P-384.
    * bmo#1898074 - memory leak in create_objects_from_handles.
    * bmo#1898858 - ensure all input is consumed in a few places in mozilla::pkix
    * bmo#1884444 - SMIME/CMS and PKCS #12 do not integrate with modern NSS policy
    * bmo#1748105 - clean up escape handling
    * bmo#1896353 - Use lib::pkix as default validator instead of the old-one
    * bmo#1827444 - Need to add high level support for PQ signing.
    * bmo#1548723 - Certificate Compression: changing the allocation/freeing of buffer + Improving the documentation
    * bmo#1884444 - SMIME/CMS and PKCS #12 do not integrate with modern NSS policy
    * bmo#1893404 - Allow for non-full length ecdsa signature when using softoken
    * bmo#1830415 - Modification of .taskcluster.yml due to mozlint indent defects
    * bmo#1793811 - Implement support for PBMAC1 in PKCS#12
    * bmo#1897487 - disable VLA warnings for fuzz builds.
    * bmo#1895032 - remove redundant AllocItem implementation.
    * bmo#1893334 - add PK11_ReadDistrustAfterAttribute.
    * bmo#215997  - Clang-formatting of SEC_GetMgfTypeByOidTag update
    * bmo#1895012 - Set SEC_ERROR_LIBRARY_FAILURE on self-test failure
    * bmo#1894572 - sftk_getParameters(): Fix fallback to default variable after error with configfile.
    * bmo#1830415 - Switch to the mozillareleases/image_builder image
  - Follow upstream changes in nss-fips-constructor-self-tests.patch (switch from ec_field_GFp to ec_field_plain)
  - Remove part of nss-fips-zeroization.patch that got removed upstream
* Fri May 24 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - Adding nss-fips-bsc1223724.patch to fix startup crash of Firefox
    when using FIPS-mode (bsc#1223724).
  - Added "Provides: nss" so other RPMs that require 'nss' can
    be installed (jira PED-6358).
* Wed May 08 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - update to NSS 3.100
    - bmo#1893029 - merge pk11_kyberSlotList into pk11_ecSlotList for
      faster Xyber operations.
    - bmo#1893752 - remove ckcapi.
    - bmo#1893162 - avoid a potential PK11GenericObject memory leak.
    - bmo#671060  - Remove incomplete ESDH code.
    - bmo#215997  - Decrypt RSA OAEP encrypted messages.
    - bmo#1887996 - Fix certutil CRLDP URI code.
    - bmo#1890069 - Don't set CKA_DERIVE for CKK_EC_EDWARDS private keys.
    - bmo#676118  - Add ability to encrypt and decrypt CMS messages using ECDH.
    - bmo#676100  - Correct Templates for key agreement in smime/cmsasn.c.
    - bmo#1548723 - Moving the decodedCert allocation to NSS.
    - bmo#1885404 - Allow developers to speed up repeated local execution
      of NSS tests that depend on certificates.
* Thu Apr 04 2024 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - update to NSS 3.99
    * Removing check for message len in ed25519 (bmo#1325335)
    * add ed25519 to SECU_ecName2params. (bmo#1884276)
    * add EdDSA wycheproof tests. (bmo#1325335)
    * nss/lib layer code for EDDSA. (bmo#1325335)
    * Adding EdDSA implementation. (bmo#1325335)
    * Exporting Certificate Compression types (bmo#1881027)
    * Updating ACVP docker to rust 1.74 (bmo#1880857)
    * Updating HACL* to 0f136f28935822579c244f287e1d2a1908a7e552 (bmo#1325335)
    * Add NSS_CMSRecipient_IsSupported. (bmo#1877730)
* Sat Mar 16 2024 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.98
    * bmo#1780432 - (CVE-2023-5388) Timing attack against RSA decryption
      in TLS
    * bmo#1879513 - Certificate Compression: enabling the check that
      the compression was advertised
    * bmo#1831552 - Move Windows workers to nss-1/b-win2022-alpha
    * bmo#1879945 - Remove Email trust bit from OISTE WISeKey
      Global Root GC CA
    * bmo#1877344 - Replace `distutils.spawn.find_executable` with
      `shutil.which` within `mach` in `nss`
    * bmo#1548723 - Certificate Compression: Updating nss_bogo_shim to
      support Certificate compression
    * bmo#1548723 - TLS Certificate Compression (RFC 8879) Implementation
    * bmo#1875356 - Add valgrind annotations to freebl kyber operations
      for constant-time execution tests
    * bmo#1870673 - Set nssckbi version number to 2.66
    * bmo#1874017 - Add Telekom Security roots
    * bmo#1873095 - Add D-Trust 2022 S/MIME roots
    * bmo#1865450 - Remove expired Security Communication RootCA1 root
    * bmo#1876179 - move keys to a slot that supports concatenation in
      PK11_ConcatSymKeys
    * bmo#1876800 - remove unmaintained tls-interop tests
    * bmo#1874937 - bogo: add support for the -ipv6 and -shim-id shim
      flags
    * bmo#1874937 - bogo: add support for the -curves shim flag and
      update Kyber expectations
    * bmo#1874937 - bogo: adjust expectation for a key usage bit test
    * bmo#1757758 - mozpkix: add option to ignore invalid subject
      alternative names
    * bmo#1841029 - Fix selfserv not stripping `publicname:` from -X value
    * bmo#1876390 - take ownership of ecckilla shims
    * bmo#1874458 - add valgrind annotations to freebl/ec.c
    * bmo#864039  - PR_INADDR_ANY needs PR_htonl before assignment to inet.ip
    * bmo#1875965 - Update zlib to 1.3.1
* Thu Feb 29 2024 Pedro Monreal <pmonreal@suse.com>
  - Add crypto-policies support [bsc#1211301]
    deactivated for now
* Fri Feb 23 2024 pgajdos@suse.com
  - Use %patch -P N instead of deprecated %patchN.
* Tue Feb 20 2024 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.97
    * bmo#1875506 - make Xyber768d00 opt-in by policy
    * bmo#1871631 - add libssl support for xyber768d00
    * bmo#1871630 - add PK11_ConcatSymKeys
    * bmo#1775046 - add Kyber and a PKCS#11 KEM interface to softoken
    * bmo#1871152 - add a FreeBL API for Kyber
    * bmo#1826451 - part 2: vendor github.com/pq-crystals/kyber/commit/e0d1c6ff
    * bmo#1826451 - part 1: add a script for vendoring kyber from pq-crystals repo
    * bmo#1835828 - Removing the calls to RSA Blind from loader.*
    * bmo#1874111 - fix worker type for level3 mac tasks
    * bmo#1835828 - RSA Blind implementation
    * bmo#1869642 - Remove DSA selftests
    * bmo#1873296 - read KWP testvectors from JSON
    * bmo#1822450 - Backed out changeset dcb174139e4f
    * bmo#1822450 - Fix CKM_PBE_SHA1_DES2_EDE_CBC derivation
    * bmo#1871219 - Wrap CC shell commands in gyp expansions
* Sun Jan 21 2024 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.96.1
    * bmo#1869408 - Use pypi dependencies for MacOS worker in ./build_gyp.sh
    * bmo#1830978 - p7sign: add -a hash and -u certusage (also p7verify cleanups)
    * bmo#1867408 - add a defensive check for large ssl_DefSend return values
    * bmo#1869378 - Add dependency to the taskcluster script for Darwin
    * bmo#1869378 - Upgrade version of the MacOS worker for the CI
* Tue Dec 26 2023 Christian Boltz <suse-beta@cboltz.de>
  - add nss-allow-slow-tests-s390x.patch: "certutil dump keys with
    explicit default trust flags" test needs longer than the allowed
    6 seconds on s390x
* Sun Dec 17 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.95
    * bmo#1842932 - Bump builtins version number.
    * bmo#1851044 - Remove Email trust bit from Autoridad de Certificacion
      Firmaprofesional CIF A62634068 root cert.
    * bmo#1855318 - Remove 4 DigiCert (Symantec/Verisign) Root Certificates
    * bmo#1851049 - Remove 3 TrustCor Root Certificates from NSS.
    * bmo#1850982 - Remove Camerfirma root certificates from NSS.
    * bmo#1842935 - Remove old Autoridad de Certificacion Firmaprofesional
      Certificate.
    * bmo#1860670 - Add four Commscope root certificates to NSS.
    * bmo#1850598 - Add TrustAsia Global Root CA G3 and G4 root certificates.
    * bmo#1863605 - Include P-384 and P-521 Scalar Validation from HACL*
    * bmo#1861728 - Include P-256 Scalar Validation from HACL*.
    * bmo#1861265 - After the HACL 256 ECC patch, NSS incorrectly encodes
      256 ECC without DER wrapping at the softoken level
    * bmo#1837987 - Add means to provide library parameters to C_Initialize
    * bmo#1573097 - clang format
    * bmo#1854795 - add OSXSAVE and XCR0 tests to AVX2 detection.
    * bmo#1858241 - Typo in ssl3_AppendHandshakeNumber
    * bmo#1858241 - Introducing input check of ssl3_AppendHandshakeNumber
    * bmo#1573097 - Fix Invalid casts in instance.c
* Tue Oct 24 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.94
    * bmo#1853737 - Updated code and commit ID for HACL*
    * bmo#1840510 - update ACVP fuzzed test vector: refuzzed with
      current NSS
    * bmo#1827303 - Softoken C_ calls should use system FIPS setting
      to select NSC_ or FC_ variants
    * bmo#1774659 - NSS needs a database tool that can dump the low level
      representation of the database
    * bmo#1852179 - declare string literals using char in pkixnames_tests.cpp
    * bmo#1852179 - avoid implicit conversion for ByteString
    * bmo#1818766 - update rust version for acvp docker
    * bmo#1852011 - Moving the init function of the mpi_ints before
      clean-up in ec.c
    * bmo#1615555 - P-256 ECDH and ECDSA from HACL*
    * bmo#1840510 - Add ACVP test vectors to the repository
    * bmo#1849077 - Stop relying on std::basic_string<uint8_t>
    * bmo#1847845 - Transpose the PPC_ABI check from Makefile to gyp
  - rebased patches
  - added nss-fips-test.patch to fix broken test
* Tue Sep 05 2023 Dominique Leuenberger <dimstar@opensuse.org>
  - Update to NSS 3.93:
    * bmo#1849471 - Update zlib in NSS to 1.3.
    * bmo#1848183 - softoken: iterate hashUpdate calls for long inputs.
    * bmo#1813401 - regenerate NameConstraints test certificates (boo#1214980).
  - Rebase nss-fips-pct-pubkeys.patch.
* Sun Aug 27 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.92
    * bmo#1822935 - Set nssckbi version number to 2.62
    * bmo#1833270 - Add 4 Atos TrustedRoot Root CA certificates to NSS
    * bmo#1839992 - Add 4 SSL.com Root CA certificates
    * bmo#1840429 - Add Sectigo E46 and R46 Root CA certificates
    * bmo#1840437 - Add LAWtrust Root CA2 (4096)
    * bmo#1822936 - Remove E-Tugra Certification Authority root
    * bmo#1827224 - Remove Camerfirma Chambers of Commerce Root.
    * bmo#1840505 - Remove Hongkong Post Root CA 1
    * bmo#1842928 - Remove E-Tugra Global Root CA ECC v3 and RSA v3
    * bmo#1842937 - Avoid redefining BYTE_ORDER on hppa Linux
* Sat Jul 29 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.91
    * bmo#1837431 - Implementation of the HW support check for ADX instruction
    * bmo#1836925 - Removing the support of Curve25519
    * bmo#1839795 - Fix comment about the addition of ticketSupportsEarlyData
    * bmo#1839327 - Adding args to enable-legacy-db build
    * bmo#1835357 - dbtests.sh failure in "certutil dump keys with explicit
      default trust flags"
    * bmo#1837617 - Initialize flags in slot structures
    * bmo#1835425 - Improve the length check of RSA input to avoid heap overflow
    * bmo#1829112 - Followup Fixes
    * bmo#1784253 - avoid processing unexpected inputs by checking for
      m_exptmod base sign
    * bmo#1826652 - add a limit check on order_k to avoid infinite loop
    * bmo#1834851 - Update HACL* to commit 5f6051d2
    * bmo#1753026 - add SHA3 to cryptohi and softoken
    * bmo#1753026 - HACL SHA3
    * bmo#1836781 - Disabling ASM C25519 for A but X86_64
  - removed upstreamed patch nss-fix-bmo1836925.patch
* Fri Jul 28 2023 Dirk Stoecker <opensuse@dstoecker.de>
  - Fix file conflict for pp manual page [bsc#1213281]
* Tue Jul 04 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.90
    * bmo#1623338 - ride along: remove a duplicated doc page
    * bmo#1623338 - remove a reference to IRC
    * bmo#1831983 - clang-format lib/freebl/stubs.c
    * bmo#1831983 - Add a constant time select function
    * bmo#1774657 - Updating an old dbm with lots of certs with keys to
      sql results in a database that is slow to access.
    * bmo#1830973 - output early build errors by default
    * bmo#1804505 - Update the technical constraints for KamuSM
    * bmo#1822921 - Add BJCA Global Root CA1 and CA2 root certificates
    * bmo#1790763 - Enable default UBSan Checks
    * bmo#1786018 - Add explicit handling of zero length records
    * bmo#1829391 - Tidy up DTLS ACK Error Handling Path
    * bmo#1786018 - Refactor zero length record tests
    * bmo#1829112 - Fix compiler warning via correct assert
    * bmo#1755267 - run linux tests on nss-t/t-linux-xlarge-gcp
    * bmo#1806496 - In FIPS mode, nss should reject RSASSA-PSS salt lengths
      larger than the output size of the hash function used,
      or provide an indicator
    * bmo#1784163 - Fix reading raw negative numbers
    * bmo#1748237 - Repairing unreachable code in clang built with gyp
    * bmo#1783647 - Integrate Vale Curve25519
    * bmo#1799468 - Removing unused flags for Hacl*
    * bmo#1748237 - Adding a better error message
    * bmo#1727555 - Update HACL* till 51a72a953a4ee6f91e63b2816ae5c4e62edf35d6
    * bmo#1782980 - Fall back to the softokn when writing certificate trust
    * bmo#1806010 - FIPS-104-3 requires we restart post programmatically
    * bmo#1826650 - cmd/ecperf: fix dangling pointer warning on gcc 13
    * bmo#1818766 - Update ACVP dockerfile for compatibility with debian
      package changes
    * bmo#1815796 - Add a CI task for tracking ECCKiila code status, update
      whitespace in ECCKiila files
    * bmo#1819958 - Removed deprecated sprintf function and replaced with snprintf
    * bmo#1822076 - fix rst warnings in nss doc
    * bmo#1821997 - Fix incorrect pygment style
    * bmo#1821292 - Change GYP directive to apply across platforms
    * Add libsmime3 abi-check exception for NSS_CMSSignerInfo_GetDigestAlgTag
  - add nss-fix-bmo1836925.patch to fix build-errors
  - Remove nss-fips-tls-allow-md5-prf.patch, since we no longer need
    the workaround in FIPS mode (bsc#1200325)
  - Remove nss-fips-tests-skip.patch. This is no longer needed since
    we removed the code to short-circuit broken hashes and moved to
    using the SLI
  - Add nss-allow-slow-tests.patch, which allows a timed test to run
    longer than 1s. This avoids turning slow builds into broken builds
  - Add nss-fips-drbg-libjitter.patch to use libjitterentropy for
    entropy. This is disabled until we can avoid the inline assembler
    in the latter's header file that relies on GNU extensions
  - Add nss-fips-pct-pubkeys.patch (bsc#1207209) for pairwise consistency
    checks
* Fri Jun 09 2023 Pedro Monreal <pmonreal@suse.com>
  - FIPS: Merge the libfreebl3-hmac and libsoftokn3-hmac packages
    into the respective libraries. [bsc#1185116]
* Sat Jun 03 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.89.1
    * bmo#1804505 - Update the technical constraints for KamuSM.
    * bmo#1822921 - Add BJCA Global Root CA1 and CA2 root certificates.
* Wed May 31 2023 Martin Sirringhaus <martin.sirringhaus@suse.com>
  - Move testsuite to %check-section and move env-variables to
    files for easier chroot-debugging
* Mon Apr 10 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.89
    * bmo#1820834 - revert freebl/softoken RSA_MIN_MODULUS_BITS increase
    * bmo#1820175 - PR_STATIC_ASSERT is cursed
    * bmo#1767883 - Need to add policy control to keys lengths for signatures
    * bmo#1820175 - Fix unreachable code warning in fuzz builds
    * bmo#1820175 - Fix various compiler warnings in NSS
    * bmo#1820175 - Enable various compiler warnings for clang builds
    * bmo#1815136 - set PORT error after sftk_HMACCmp failure
    * bmo#1767883 - Need to add policy control to keys lengths for signatures
    * bmo#1804662 - remove data length assertion in sec_PKCS7Decrypt
    * bmo#1804660 - Make high tag number assertion failure an error
    * bmo#1817513 - CKM_SHA384_KEY_DERIVATION correction maximum key
      length from 284 to 384
    * bmo#1815167 - Tolerate certificate_authorities xtn in ClientHello
    * bmo#1789436 - Fix build failure on Windows
    * bmo#1811337 - migrate Win 2012 tasks to Azure
    * bmo#1810702 - fix title length in doc
    * bmo#1570615 - Add interop tests for HRR and PSK to GREASE suite
    * bmo#1570615 - Add presence/absence tests for TLS GREASE
    * bmo#1804688 - Correct addition of GREASE value to ALPN xtn
    * bmo#1789436 - CH extension permutation
    * bmo#1570615 - TLS GREASE (RFC8701)
    * bmo#1804640 - improve handling of unknown PKCS#12 safe bag types
    * bmo#1815870 - use a different treeherder symbol for each docker
      image build task
    * bmo#1815868 - pin an older version of the ubuntu:18.04 and
      20.04 docker images
    * bmo#1810702 - remove nested table in rst doc
    * bmo#1815246 - Export NSS_CMSSignerInfo_GetDigestAlgTag
    * bmo#1812671 - build failure while implicitly casting SECStatus
      to PRUInt32
* Sat Mar 11 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.88.1
    * bmo#1804640 - improve handling of unknown PKCS#12 safe bag types
  - update to NSS 3.88
    * bmo#1815870 - use a different treeherder symbol for each docker
      image build task
    * bmo#1815868 - pin an older version of the ubuntu:18.04 and
      20.04 docker images
    * bmo#1810702 - remove nested table in rst doc
    * bmo#1815246 - Export NSS_CMSSignerInfo_GetDigestAlgTag.
    * bmo#1812671 - build failure while implicitly casting SECStatus
      to PRUInt32
    * bmo#1212915 - Add check for ClientHello SID max length
    * bmo#1771100 - Added EarlyData ALPN test support to BoGo shim
    * bmo#1790357 - ECH client - Discard resumption TLS < 1.3
      Session(IDs|Tickets) if ECH configs are setup
    * bmo#1714245 - On HRR skip PSK incompatible with negotiated
      ciphersuites hash algorithm
    * bmo#1789410 - ECH client: Send ech_required alert on server
      negotiating TLS 1.2. Fixed misleading Gtest,
      enabled corresponding BoGo test
    * bmo#1771100 - Added Bogo ECH rejection test support
    * bmo#1771100 - Added ECH 0Rtt support to BoGo shim
    * bmo#1747957 - RSA OAEP Wycheproof JSON
    * bmo#1747957 - RSA decrypt Wycheproof JSON
    * bmo#1747957 - ECDSA Wycheproof JSON
    * bmo#1747957 - ECDH Wycheproof JSON
    * bmo#1747957 - PKCS#1v1.5 wycheproof json
    * bmo#1747957 - Use X25519 wycheproof json
    * bmo#1766767 - Move scripts to python3
    * bmo#1809627 - Properly link FuzzingEngine for oss-fuzz.
    * bmo#1805907 - Extending RSA-PSS bltest test coverage
      (Adding SHA-256 and SHA-384)
    * bmo#1804091 - NSS needs to move off of DSA for integrity checks
    * bmo#1805815 - Add initial testing with ACVP vector sets using
      acvp-rust
    * bmo#1806369 - Don't clone libFuzzer, rely on clang instead
* Tue Feb 14 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.87
    * bmo#1803226 - NULL password encoding incorrect
    * bmo#1804071 - Fix rng stub signature for fuzzing builds
    * bmo#1803595 - Updating the compiler parsing for build
    * bmo#1749030 - Modification of supported compilers
    * bmo#1774654 - tstclnt crashes when accessing gnutls server
      without a user cert in the database.
    * bmo#1751707 - Add configuration option to enable source-based
      coverage sanitizer
    * bmo#1751705 - Update ECCKiila generated files.
    * bmo#1730353 - Add support for the LoongArch 64-bit architecture
    * bmo#1798823 - add checks for zero-length RSA modulus to avoid
      memory errors and failed assertions later
    * bmo#1798823 - Additional zero-length RSA modulus checks
  - add man-pages to the tools package (boo#1208242)
* Sun Jan 15 2023 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.86
    * bmo#1803190 - conscious language removal in NSS
    * bmo#1794506 - Set nssckbi version number to 2.60
    * bmo#1803453 - Set CKA_NSS_SERVER_DISTRUST_AFTER and
      CKA_NSS_EMAIL_DISTRUST_AFTER for 3
      TrustCor Root Certificates
    * bmo#1799038 - Remove Staat der Nederlanden EV Root CA from NSS
    * bmo#1797559 - Remove EC-ACC root cert from NSS
    * bmo#1794507 - Remove SwissSign Platinum CA - G2 from NSS
    * bmo#1794495 - Remove Network Solutions Certificate Authority
    * bmo#1802331 - compress docker image artifact with zstd
    * bmo#1799315 - Migrate nss from AWS to GCP
    * bmo#1800989 - Enable static builds in the CI
    * bmo#1765759 - Removing SAW docker from the NSS build system
    * bmo#1783231 - Initialising variables in the rsa blinding code
    * bmo#320582 - Implementation of the double-signing of the message
      for ECDSA
    * bmo#1783231 - Adding exponent blinding for RSA.
* Mon Dec 05 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.85
    * bmo#1792821 - Modification of the primes.c and dhe-params.c in
      order to have better looking tables
    * bmo#1796815 - Update zlib in NSS to 1.2.13
    * bmo#1796504 - Skip building modutil and shlibsign when building
      in Firefox
    * bmo#1796504 - Use __STDC_VERSION__ rather than __STDC__ as a guard
    * bmo#1796407 - Fix -Wunused-but-set-variable warning from clang 15
    * bmo#1796308 - Fix -Wtautological-constant-out-of-range-compare
      and -Wtype-limits warnings
    * bmo#1796281 - Followup: add missing stdint.h include
    * bmo#1796281 - Fix -Wint-to-void-pointer-cast warnings
    * bmo#1796280 - Fix -Wunused-{function,variable,but-set-variable}
      warnings on Windows
    * bmo#1796079 - Fix -Wstring-conversion warnings
    * bmo#1796075 - Fix -Wempty-body warnings
    * bmo#1795242 - Fix unused-but-set-parameter warning
    * bmo#1795241 - Fix unreachable-code warnings
    * bmo#1795222 - Mark _nss_version_c unused on clang-cl
    * bmo#1795668 - Remove redundant variable definitions in lowhashtest
    * Add note about python executable to build instructions.
* Fri Nov 11 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.84
    * bmo#1791699 - Bump minimum NSPR version to 4.35
    * bmo#1792103 - Add a flag to disable building libnssckbi.
* Sun Oct 16 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.83
    * bmo#1788875 - Remove set-but-unused variables from
      SEC_PKCS12DecoderValidateBags
    * bmo#1563221 - remove older oses that are unused part3/ BeOS
    * bmo#1563221 - remove older unix support in NSS part 3 Irix
    * bmo#1563221 - remove support for older unix in NSS part 2 DGUX
    * bmo#1563221 - remove support for older unix in NSS part 1 OSF
    * bmo#1778413 - Set nssckbi version number to 2.58
    * bmp#1785297 - Add two SECOM root certificates to NSS
    * bmo#1787075 - Add two DigitalSign root certificates to NSS
    * bmo#1778412 - Remove Camerfirma Global Chambersign Root from NSS
    * bmo#1771100 - Added bug reference and description to disabled
      UnsolicitedServerNameAck bogo ECH test
    * bmo#1779361 - Removed skipping of ECH on equality of private and
      public server name
    * bmo#1779357 - Added comment and bug reference to
      ECHRandomHRRExtension bogo test
    * bmo#1779370 - Added Bogo shim client HRR test support. Fixed
      overwriting of CHInner.random on HRR
    * bmo#1779234 - Added check for server only sending ECH extension
      with retry configs in EncryptedExtensions and if not
      accepting ECH. Changed config setting behavior to
      skip configs with unsupported mandatory extensions
      instead of failing
    * bmo# 1771100 - Added ECH client support to BoGo shim. Changed
      CHInner creation to skip TLS 1.2 only extensions to
      comply with BoGo
    * bmo#1771100 - Added ECH server support to BoGo shim. Fixed NSS ECH
      server accept_confirmation bugs
    * bmo#1771100 - Update BoGo tests to recent BoringSSL version
    * bmo#1785846 - Bump minimum NSPR version to 4.34.1
* Sat Sep 17 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.82
    * bmo#1330271 - check for null template in sec_asn1{d,e}_push_state
    * bmo#1735925 - QuickDER: Forbid NULL tags with non-zero length
    * bmo#1784724 - Initialize local variables in
      TlsConnectTestBase::ConnectAndCheckCipherSuite
    * bmo#1784191 - Cast the result of GetProcAddress
    * bmo#1681099 - pk11wrap: Tighten certificate lookup based on
      PKCS #11 URI.
* Wed Aug 17 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.81
    * bmo#1762831 - Enable aarch64 hardware crypto support on OpenBSD
    * bmo#1775359 - make NSS_SecureMemcmp 0/1 valued
    * bmo#1779285 - Add no_application_protocol alert handler and
      test client error code is set
    * bmo#1777672 - Gracefully handle null nickname in
      CERT_GetCertNicknameWithValidity
    * required for Firefox 104
  - raised NSPR requirement to 4.34.1
  - changing some Requires from (pre) to generic as (pre) is not
    sufficient (boo#1202118)
* Tue Jul 26 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.80
    * bmo#1774720 - Fix SEC_ERROR_ALGORITHM_MISMATCH entry in SECerrs.h.
    * bmo#1617956 - Add support for asynchronous client auth hooks.
    * bmo#1497537 - nss-policy-check: make unknown keyword check optional.
    * bmo#1765383 - GatherBuffer: Reduced plaintext buffer allocations
      by allocating it on initialization. Replaced
      redundant code with assert. Debug builds: Added
      buffer freeing/allocation for each record.
    * bmo#1773022 - Mark 3.79 as an ESR release.
    * bmo#1764206 - Bump nssckbi version number for June.
    * bmo#1759815 - Remove Hellenic Academic 2011 Root.
    * bmo#1770267 - Add E-Tugra Roots.
    * bmo#1768970 - Add Certainly Roots.
    * bmo#1764392 - Add DigitCert Roots.
    * bmo#1759794 - Protect SFTKSlot needLogin with slotLock.
    * bmo#1366464 - Compare signature and signatureAlgorithm fields in
      legacy certificate verifier.
    * bmo#1771497 - Uninitialized value in cert_VerifyCertChainOld.
    * bmo#1771495 - Unchecked return code in sec_DecodeSigAlg.
    * bmo#1771498 - Uninitialized value in cert_ComputeCertType.
    * bmo#1760998 - Avoid data race on primary password change.
    * bmo#1769063 - Replace ppc64 dcbzl intrinisic.
    * bmo#1771036 - Allow LDFLAGS override in makefile builds.
* Sat Jun 25 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - sync with current SLE
    * latest FIPS changes incl. testsuite fixes (enabled now)
      nss-fips-180-3-csp-clearing.patch
      nss-fips-tests-enable-fips.patch
      nss-fips-tests-skip.patch
      nss-fips-pbkdf-kat-compliance.patch
* Sun Jun 12 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.79
    * bmo#205717 - Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
    * bmo#1766907 - Update mercurial in clang-format docker image.
    * bmo#1454072 - Use of uninitialized pointer in lg_init after alloc fail.
    * bmo#1769295 - selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
    * bmo#1753315 - Add SECMOD_LockedModuleHasRemovableSlots.
    * bmo#1387919 - Fix secasn1d parsing of indefinite SEQUENCE inside
      indefinite GROUP.
    * bmo#1765753 - Added RFC8422 compliant TLS <= 1.2 undefined/compressed
      ECPointFormat extension alerts.
    * bmo#1765753 - TLS 1.3 Server: Send protocol_version alert on
      unsupported ClientHello.legacy_version.
    * bmo#1764788 - Correct invalid record inner and outer content type alerts.
    * bmo#1757075 - NSS does not properly import or export pkcs12 files
      with large passwords and pkcs5v2 encoding.
    * bmo#1766978 - improve error handling after nssCKFWInstance_CreateObjectHandle.
    * bmo#1767590 - Initialize pointers passed to
      NSS_CMSDigestContext_FinishMultiple.
    * bmo#1769302 - NSS 3.79 should depend on NSPR 4.34
* Tue May 31 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.78.1
    * bmo#1767590 - Initialize pointers passed to
      NSS_CMSDigestContext_FinishMultiple
* Mon May 30 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.78
    * bmo#1755264 - Added TLS 1.3 zero-length inner plaintext checks and
      tests, zero-length record/fragment handling tests.
    * bmo#1294978 - Reworked overlong record size checks and added TLS1.3
      specific boundaries.
    * bmo#1763120 - Add ECH Grease Support to tstclnt
    * bmo#1765003 - Add a strict variant of moz::pkix::CheckCertHostname.
    * bmo#1166338 - Change SSL_REUSE_SERVER_ECDHE_KEY default to false.
    * bmo#1760813 - Make SEC_PKCS12EnableCipher succeed
    * bmo#1762489 - Update zlib in NSS to 1.2.12.
* Thu Apr 28 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.77
    * Bug 1762244 - resolve mpitests build failure on Windows.
    * bmo#1761779 - Fix link to TLS page on wireshark wiki
    * bmo#1754890 - Add two D-TRUST 2020 root certificates.
    * bmo#1751298 - Add Telia Root CA v2 root certificate.
    * bmo#1751305 - Remove expired explicitly distrusted certificates
      from certdata.txt.
    * bmo#1005084 - support specific RSA-PSS parameters in mozilla::pkix
    * bmo#1753535 - Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate.
    * bmo#1756271 - Remove token member from NSSSlot struct.
    * bmo#1602379 - Provide secure variants of mpp_pprime and mpp_make_prime.
    * bmo#1757279 - Support UTF-8 library path in the module spec string.
    * bmo#1396616 - Update nssUTF8_Length to RFC 3629 and fix buffer overrun.
    * bmo#1760827 - Add a CI Target for gcc-11.
    * bmo#1760828 - Change to makefiles for gcc-4.8.
    * bmo#1741688 - Update googletest to 1.11.0
    * bmo#1759525 - Add SetTls13GreaseEchSize to experimental API.
    * bmo#1755264 - TLS 1.3 Illegal legacy_version handling/alerts.
    * bmo#1755904 - Fix calculation of ECH HRR Transcript.
    * bmo#1758741 - Allow ld path to be set as environment variable.
    * bmo#1760653 - Ensure we don't read uninitialized memory in ssl gtests.
    * bmo#1758478 - Fix DataBuffer Move Assignment.
    * bmo#1552254 - internal_error alert on Certificate Request with
      sha1+ecdsa in TLS 1.3
    * bmo#1755092 - rework signature verification in mozilla::pkix
* Sun Apr 10 2022 Callum Farmer <gmbr3@opensuse.org>
  - Require nss-util in nss.pc and subsequently remove -lnssutil3
* Sat Apr 02 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.76.1
    NSS 3.76.1
    * bmo#1756271 - Remove token member from NSSSlot struct.
    NSS 3.76
    * bmo#1755555 - Hold tokensLock through nssToken_GetSlot calls in
      nssTrustDomain_GetActiveSlots.
    * bmo#1370866 - Check return value of PK11Slot_GetNSSToken.
    * bmo#1747957 - Use Wycheproof JSON for RSASSA-PSS
    * bmo#1679803 - Add SHA256 fingerprint comments to old
      certdata.txt entries.
    * bmo#1753505 - Avoid truncating files in nss-release-helper.py.
    * bmo#1751157 - Throw illegal_parameter alert for illegal extensions
      in handshake message.
* Fri Mar 25 2022 Callum Farmer <gmbr3@opensuse.org>
  - Add nss-util pkgconfig and config files (copied from RH/Fedora)
* Wed Mar 02 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.75
    * bmo#1749030 - This patch adds gcc-9 and gcc-10 to the CI.
    * bmo#1749794 - Make DottedOIDToCode.py compatible with python3.
    * bmo#1749475 - Avoid undefined shift in SSL_CERT_IS while fuzzing.
    * bmo#1748386 - Remove redundant key type check.
    * bmo#1749869 - Update ABI expectations to match ECH changes.
    * bmo#1748386 - Enable CKM_CHACHA20.
    * bmo#1747327 - check return on NSS_NoDB_Init and NSS_Shutdown.
    * bmo#1747310 - real move assignment operator.
    * bmo#1748245 - Run ECDSA test vectors from bltest as part of the CI tests.
    * bmo#1743302 - Add ECDSA test vectors to the bltest command line tool.
    * bmo#1747772 - Allow to build using clang's integrated assembler.
    * bmo#1321398 - Allow to override python for the build.
    * bmo#1747317 - test HKDF output rather than input.
    * bmo#1747316 - Use ASSERT macros to end failed tests early.
    * bmo#1747310 - move assignment operator for DataBuffer.
    * bmo#1712879 - Add test cases for ECH compression and unexpected
      extensions in SH.
    * bmo#1725938 - Update tests for ECH-13.
    * bmo#1725938 - Tidy up error handling.
    * bmo#1728281 - Add tests for ECH HRR Changes.
    * bmo#1728281 - Server only sends GREASE HRR extension if enabled
      by preference.
    * bmo#1725938 - Update generation of the Associated Data for ECH-13.
    * bmo#1712879 - When ECH is accepted, reject extensions which were
      only advertised in the Outer Client Hello.
    * bmo#1712879 - Allow for compressed, non-contiguous, extensions.
    * bmo#1712879 - Scramble the PSK extension in CHOuter.
    * bmo#1712647 - Split custom extension handling for ECH.
    * bmo#1728281 - Add ECH-13 HRR Handling.
    * bmo#1677181 - Client side ECH padding.
    * bmo#1725938 - Stricter ClientHelloInner Decompression.
    * bmo#1725938 - Remove ECH_inner extension, use new enum format.
    * bmo#1725938 - Update the version number for ECH-13 and adjust
      the ECHConfig size.
* Mon Jan 24 2022 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.74
    * bmo#966856 - mozilla::pkix: support SHA-2 hashes in CertIDs in
      OCSP responses
    * bmo#1553612 - Ensure clients offer consistent ciphersuites after HRR
    * bmo#1721426 - NSS does not properly restrict server keys based on policy
    * bmo#1733003 - Set nssckbi version number to 2.54
    * bmo#1735407 - Replace Google Trust Services LLC (GTS) R4 root certificate
    * bmo#1735407 - Replace Google Trust Services LLC (GTS) R3 root certificate
    * bmo#1735407 - Replace Google Trust Services LLC (GTS) R2 root certificate
    * bmo#1735407 - Replace Google Trust Services LLC (GTS) R1 root certificate
    * bmo#1735407 - Replace GlobalSign ECC Root CA R4
    * bmo#1733560 - Remove Expired Root Certificates - DST Root CA X3
    * bmo#1740807 - Remove Expiring Cybertrust Global Root and GlobalSign root
      certificates
    * bmo#1741930 - Add renewed Autoridad de Certificacion Firmaprofesional
      CIF A62634068 root certificate
    * bmo#1740095 - Add iTrusChina ECC root certificate
    * bmo#1740095 - Add iTrusChina RSA root certificate
    * bmo#1738805 - Add ISRG Root X2 root certificate
    * bmo#1733012 - Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate
    * bmo#1738028 - Avoid a clang 13 unused variable warning in opt build
    * bmo#1735028 - Check for missing signedData field
    * bmo#1737470 - Ensure DER encoded signatures are within size limits
  - enable key logging option (boo#1195040)
* Wed Dec 29 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - update to NSS 3.73.1:
    * Add SHA-2 support to mozilla::pkix's OSCP implementation
* Wed Dec 01 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.73
    * bmo#1735028 - check for missing signedData field.
    * bmo#1737470 - Ensure DER encoded signatures are within size limits.
    * bmo#1729550 - NSS needs FiPS 140-3 version indicators.
    * bmo#1692132 - pkix_CacheCert_Lookup doesn't return cached certs
    * bmo#1738600 - sunset Coverity from NSS
    MFSA 2021-51 (bsc#1193170)
    * CVE-2021-43527 (bmo#1737470)
      Memory corruption via DER-encoded DSA and RSA-PSS signatures
* Sun Nov 28 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.72
    * Remove newline at the end of coreconf.dep
    * bmo#1731911 - Fix nsinstall parallel failure.
    * bmo#1729930 - Increase KDF cache size to mitigate perf
      regression in about:logins
* Sat Oct 23 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.71
    * bmo#1717716 - Set nssckbi version number to 2.52.
    * bmo#1667000 - Respect server requirements of tlsfuzzer/test-tls13-signature-algorithms.py
    * bmo#1373716 - Import of PKCS#12 files with Camellia encryption is not supported
    * bmo#1717707 - Add HARICA Client ECC Root CA 2021.
    * bmo#1717707 - Add HARICA Client RSA Root CA 2021.
    * bmo#1717707 - Add HARICA TLS ECC Root CA 2021.
    * bmo#1717707 - Add HARICA TLS RSA Root CA 2021.
    * bmo#1728394 - Add TunTrust Root CA certificate to NSS.
  - required for Firefox 94
* Fri Oct 01 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.70
    * bmo#1726022 - Update test case to verify fix.
    * bmo#1714579 - Explicitly disable downgrade check in TlsConnectStreamTls13.EchOuterWith12Max
    * bmo#1714579 - Explicitly disable downgrade check in TlsConnectTest.DisableFalseStartOnFallback
    * bmo#1681975 - Avoid using a lookup table in nssb64d.
    * bmo#1724629 - Use HW accelerated SHA2 on AArch64 Big Endian.
    * bmo#1714579 - Change default value of enableHelloDowngradeCheck to true.
    * bmo#1726022 - Cache additional PBE entries.
    * bmo#1709750 - Read HPKE vectors from official JSON.
  - required for Firefox 93
* Fri Sep 03 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - Update to NSS 3.69.1
    * bmo#1722613 (Backout) - Disable DTLS 1.0 and 1.1 by default
    * bmo#1720226 (Backout) - integrity checks in key4.db not happening
      on private components with AES_CBC
    NSS 3.69
    * bmo#1722613 - Disable DTLS 1.0 and 1.1 by default (backed out again)
    * bmo#1720226 - integrity checks in key4.db not happening on private
      components with AES_CBC (backed out again)
    * bmo#1720235 - SSL handling of signature algorithms ignores
      environmental invalid algorithms.
    * bmo#1721476 - sqlite 3.34 changed it's open semantics, causing
      nss failures.
      (removed obsolete nss-btrfs-sqlite.patch)
    * bmo#1720230 - Gtest update changed the gtest reports, losing gtest
      details in all.sh reports.
    * bmo#1720228 - NSS incorrectly accepting 1536 bit DH primes in FIPS mode
    * bmo#1720232 - SQLite calls could timeout in starvation situations.
    * bmo#1720225 - Coverity/cpp scanner errors found in nss 3.67
    * bmo#1709817 - Import the NSS documentation from MDN in nss/doc.
    * bmo#1720227 - NSS using a tempdir to measure sql performance not active
  - add nss-fips-stricter-dh.patch
  - updated existing patches with latest SLE
* Wed Aug 18 2021 Hans Petter Jansson <hpj@suse.com>
  - Update nss-fips-constructor-self-tests.patch to fix crashes
    reported by upstream. This was likely affecting WebRTC calls.
* Thu Aug 05 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.68
    * bmo#1713562 - Fix test leak.
    * bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
    * bmo#1693206 - Implement PKCS8 export of ECDSA keys.
    * bmo#1712883 - DTLS 1.3 draft-43.
    * bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
    * bmo#1713562 - Validate ECH public names.
    * bmo#1717610 - Add function to get seconds from epoch from pkix::Time.
  - required by Firefox 91.0
  - added nss-fips-fix-missing-nspr.patch (via SLE sync)
* Sat Jul 10 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.66
    * no releasenotes available yet
      https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.66_release_notes
  - update to NSS 3.65
    * bmo#1709654 - Update for NetBSD configuration.
    * bmo#1709750 - Disable HPKE test when fuzzing.
    * bmo#1566124 - Optimize AES-GCM for ppc64le.
    * bmo#1699021 - Add AES-256-GCM to HPKE.
    * bmo#1698419 - ECH -10 updates.
    * bmo#1692930 - Update HPKE to final version.
    * bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
    * bmo#1703936 - New coverity/cpp scanner errors.
    * bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
    * bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
    * bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.
  - refreshed patches
  - Firefox 90.0 requires NSS 3.66
* Thu May 27 2021 Andreas Stieger <andreas.stieger@gmx.de>
  - update to NSS 3.64
    * bmo#1705286 - Properly detect mips64.
    * bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
      disable_crypto_vsx.
    * bmo#1698320 - replace __builtin_cpu_supports("vsx") with
      ppc_crypto_support() for clang.
    * bmo#1613235 - Add POWER ChaCha20 stream cipher vector
      acceleration.
* Sun Apr 18 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.63.1
    * no upstream release notes for 3.63.1 (yet)
    Fixed in 3.63
    * bmo#1697380 - Make a clang-format run on top of helpful contributions.
    * bmo#1683520 - ECCKiila P384, change syntax of nested structs
      initialization to prevent build isses with GCC 4.8.
    * bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
      scalar multiplication.
    * bmo#1683520 - ECCKiila P521, change syntax of nested structs
      initialization to prevent build isses with GCC 4.8.
    * bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
      scalar multiplication.
    * bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
    * bmo#1694214 - tstclnt can't enable middlebox compat mode.
    * bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
      profiles.
    * bmo#1685880 - Minor fix to prevent unused variable on early return.
    * bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
      with nss build.
    * bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
      of root CA changes, CA list version 2.48.
    * bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
      'Chambers of Commerce' and 'Global Chambersign' roots.
    * bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
    * bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
    * bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
    * bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
      from NSS.
    * bmo#1687822 - Turn off Websites trust bit for the “Staat der
      Nederlanden Root CA - G3” root cert in NSS.
    * bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
      Root - 2008' and 'Global Chambersign Root - 2008’.
    * bmo#1694291 - Tracing fixes for ECH.
  - required for Firefox 88
* Tue Mar 16 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.62
    * bmo#1688374 - Fix parallel build NSS-3.61 with make
    * bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
      can corrupt "cachedCertTable"
    * bmo#1690583 - Fix CH padding extension size calculation
    * bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
    * bmo#1690421 - Install packaged libabigail in docker-builds image
    * bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
    * bmo#1674819 - Fixup a51fae403328, enum type may be signed
    * bmo#1681585 - Add ECH support to selfserv
    * bmo#1681585 - Update ECH to Draft-09
    * bmo#1678398 - Add Export/Import functions for HPKE context
    * bmo#1678398 - Update HPKE to draft-07
  - required for Firefox 87
* Sun Feb 28 2021 Sasi Olin <hel@lcp.world>
  - Add nss-btrfs-sqlite.patch to address bmo#1690232
* Sun Feb 21 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.61
    * required for Firefox 86
    * bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
      values under certain conditions.
    * bmo#1684300 - Fix default PBE iteration count when NSS is compiled
      with NSS_DISABLE_DBM.
    * bmo#1651411 - Improve constant-timeness in RSA operations.
    * bmo#1677207 - Upgrade Google Test version to latest release.
    * bmo#1654332 - Add aarch64-make target to nss-try.
* Sun Jan 24 2021 Wolfgang Rosenauer <wr@rosenauer.org>
  - update to NSS 3.60.1
    Notable changes in NSS 3.60:
    * TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
      has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
      implementation. See bmo#1654332 for more information.
    * December 2020 batch of Root CA changes, builtins library updated
      to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
      for more information.
  - removed obsolete ppc-old-abi-v3.patch

Files

/usr/bin/nss-config
/usr/bin/nss-util-config
/usr/include/nss3
/usr/include/nss3/alghmac.h
/usr/include/nss3/base64.h
/usr/include/nss3/blapi.h
/usr/include/nss3/blapit.h
/usr/include/nss3/cert.h
/usr/include/nss3/certdb.h
/usr/include/nss3/certt.h
/usr/include/nss3/ciferfam.h
/usr/include/nss3/cmac.h
/usr/include/nss3/cmmf.h
/usr/include/nss3/cmmft.h
/usr/include/nss3/cms.h
/usr/include/nss3/cmsreclist.h
/usr/include/nss3/cmst.h
/usr/include/nss3/crmf.h
/usr/include/nss3/crmft.h
/usr/include/nss3/cryptohi.h
/usr/include/nss3/cryptoht.h
/usr/include/nss3/eccutil.h
/usr/include/nss3/ecl-exp.h
/usr/include/nss3/fips.h
/usr/include/nss3/hasht.h
/usr/include/nss3/jar-ds.h
/usr/include/nss3/jar.h
/usr/include/nss3/jarfile.h
/usr/include/nss3/key.h
/usr/include/nss3/keyhi.h
/usr/include/nss3/keyt.h
/usr/include/nss3/keythi.h
/usr/include/nss3/kyber.h
/usr/include/nss3/lowkeyi.h
/usr/include/nss3/lowkeyti.h
/usr/include/nss3/nss.h
/usr/include/nss3/nssb64.h
/usr/include/nss3/nssb64t.h
/usr/include/nss3/nssbase.h
/usr/include/nss3/nssbaset.h
/usr/include/nss3/nssckbi.h
/usr/include/nss3/nssckepv.h
/usr/include/nss3/nssckft.h
/usr/include/nss3/nssckfw.h
/usr/include/nss3/nssckfwc.h
/usr/include/nss3/nssckfwt.h
/usr/include/nss3/nssckg.h
/usr/include/nss3/nssckmdt.h
/usr/include/nss3/nssckt.h
/usr/include/nss3/nsshash.h
/usr/include/nss3/nssilckt.h
/usr/include/nss3/nssilock.h
/usr/include/nss3/nsslocks.h
/usr/include/nss3/nsslowhash.h
/usr/include/nss3/nssrwlk.h
/usr/include/nss3/nssrwlkt.h
/usr/include/nss3/nssutil.h
/usr/include/nss3/ocsp.h
/usr/include/nss3/ocspt.h
/usr/include/nss3/p12.h
/usr/include/nss3/p12plcy.h
/usr/include/nss3/p12t.h
/usr/include/nss3/pk11func.h
/usr/include/nss3/pk11hpke.h
/usr/include/nss3/pk11pqg.h
/usr/include/nss3/pk11priv.h
/usr/include/nss3/pk11pub.h
/usr/include/nss3/pk11sdr.h
/usr/include/nss3/pkcs11.h
/usr/include/nss3/pkcs11f.h
/usr/include/nss3/pkcs11n.h
/usr/include/nss3/pkcs11p.h
/usr/include/nss3/pkcs11t.h
/usr/include/nss3/pkcs11u.h
/usr/include/nss3/pkcs11uri.h
/usr/include/nss3/pkcs12.h
/usr/include/nss3/pkcs12t.h
/usr/include/nss3/pkcs1sig.h
/usr/include/nss3/pkcs7t.h
/usr/include/nss3/portreg.h
/usr/include/nss3/preenc.h
/usr/include/nss3/secasn1.h
/usr/include/nss3/secasn1t.h
/usr/include/nss3/seccomon.h
/usr/include/nss3/secder.h
/usr/include/nss3/secdert.h
/usr/include/nss3/secdig.h
/usr/include/nss3/secdigt.h
/usr/include/nss3/secerr.h
/usr/include/nss3/sechash.h
/usr/include/nss3/secitem.h
/usr/include/nss3/secmime.h
/usr/include/nss3/secmod.h
/usr/include/nss3/secmodt.h
/usr/include/nss3/secoid.h
/usr/include/nss3/secoidt.h
/usr/include/nss3/secpkcs5.h
/usr/include/nss3/secpkcs7.h
/usr/include/nss3/secport.h
/usr/include/nss3/shsign.h
/usr/include/nss3/smime.h
/usr/include/nss3/ssl.h
/usr/include/nss3/sslerr.h
/usr/include/nss3/sslexp.h
/usr/include/nss3/sslproto.h
/usr/include/nss3/sslt.h
/usr/include/nss3/utilmodt.h
/usr/include/nss3/utilpars.h
/usr/include/nss3/utilparst.h
/usr/include/nss3/utilrename.h
/usr/lib/libcrmf.a
/usr/lib/libfreebl.a
/usr/lib/libnssb.a
/usr/lib/libnssckfw.a
/usr/lib/pkgconfig/nss-util.pc
/usr/lib/pkgconfig/nss.pc


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Dec 21 00:22:59 2024