HomeFreeBSD

security/ca_root_nss: Update to 3.83

Description

security/ca_root_nss: Update to 3.83

Changelog:

Network Security Services (NSS) 3.83 was released on 15 September 2022.

The HG tag is NSS_3_83_RTM. This version of NSS requires NSPR 4.34.1 or
newer.

Changes:

  • Bug 1788875 - Remove set-but-unused variables from

SEC_PKCS12DecoderValidateBags

  • Bug 1563221 - remove older oses that are unused part3/ BeOS
  • Bug 1563221 - remove older unix support in NSS part 3 Irix
  • Bug 1563221 - remove support for older unix in NSS part 2 DGUX
  • Bug 1563221 - remove support for older unix in NSS part 1 OSF
  • Bug 1778413 - Set nssckbi version number to 2.58
  • Bug 1785297 - Add two SECOM root certificates to NSS
  • Bug 1787075 - Add two DigitalSign root certificates to NSS
  • Bug 1778412 - Remove Camerfirma Global Chambersign Root from NSS
  • Bug 1771100 - Added bug reference and description to disabled

UnsolicitedServerNameAck bogo ECH test

  • Bug 1779361 - Removed skipping of ECH on equality of private and

public server name

  • Bug 1779357 - Added comment and bug reference to

ECHRandomHRRExtension bogo test

  • Bug 1779370 - Added Bogo shim client HRR test support. Fixed

overwriting of CHInner.random on HRR

  • Bug 1779234 - Added check for server only sending ECH extension

with retry configs in EncryptedExtensions and if not
accepting ECH. Changed config setting behavior to
skip configs with unsupported mandatory extensions
instead of failing

  • Bug 1771100 - Added ECH client support to BoGo shim. Changed

CHInner creation to skip TLS 1.2 only extensions to
comply with BoGo

  • Bug 1771100 - Added ECH server support to BoGo shim. Fixed NSS ECH

server accept_confirmation bugs

  • Bug 1771100 - Update BoGo tests to recent BoringSSL version
  • Bug 1785846 - Bump minimum NSPR version to 4.34.1

NSS 3.83 shared libraries are backwards-compatible with all older NSS
3.x shared libraries. A program linked with older NSS 3.x shared
libraries will work with this new version of the shared libraries
without recompiling or relinking. Furthermore, applications that
restrict their use of NSS APIs to the functions listed in NSS Public
Functions will remain compatible with future versions of the NSS
shared libraries.

Sponsored by: Netzkommune GmbH

Details

Provenance
joneumAuthored on Sep 16 2022, 10:56 AM
Parents
R11:20ef5c847383: x11-toolkits/libadwaita: drop bogus PORTSCOUT limit
Branches
Unknown
Tags
Unknown