Source code
Revision control
Copy as Markdown
Other Tools
.. _mozilla_projects_nss_nss_3_15_1_release_notes:
NSS 3.15.1 release notes
========================
`Introduction <#introduction>`__
--------------------------------
.. container::
Network Security Services (NSS) 3.15.1 is a patch release for NSS 3.15. The bug fixes in NSS
3.15.1 are described in the "Bugs Fixed" section below.
`Distribution Information <#distribution_information>`__
--------------------------------------------------------
.. container::
NSS 3.15.1 source distributions are also available on ftp.mozilla.org for secure HTTPS download:
- Source tarballs:
.. _new_in_nss_3.15.1:
`New in NSS 3.15.1 <#new_in_nss_3.15.1>`__
------------------------------------------
.. _new_functionality:
`New Functionality <#new_functionality>`__
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. container::
be used without MD5 and SHA-1. Note the following limitations.
- The hash function used in the signature for TLS 1.2 client authentication must be the hash
function of the TLS 1.2 PRF, which is always SHA-256 in NSS 3.15.1.
- AES GCM cipher suites are not yet supported.
.. rubric:: New Functions
:name: new_functions
None.
.. rubric:: New Types
:name: new_types
- *in sslprot.h*
- **SSL_LIBRARY_VERSION_TLS_1_2** - The protocol version of TLS 1.2 on the wire, value
0x0303.
- **TLS_DHE_RSA_WITH_AES_256_CBC_SHA256**, **TLS_RSA_WITH_AES_256_CBC_SHA256**,
**TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256**, **TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256**,
**TLS_DHE_RSA_WITH_AES_128_CBC_SHA256**, **TLS_RSA_WITH_AES_128_CBC_SHA256**,
**TLS_RSA_WITH_NULL_SHA256** - New TLS 1.2 only HMAC-SHA256 cipher suites.
- *in sslerr.h*
- **SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM**, **SSL_ERROR_DIGEST_FAILURE**,
**SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM** - New error codes for TLS 1.2.
- *in sslt.h*
- **ssl_hmac_sha256** - A new value in the SSLMACAlgorithm enum type.
- **ssl_signature_algorithms_xtn** - A new value in the SSLExtensionType enum type.
.. rubric:: New PKCS #11 Mechanisms
:name: new_pkcs_11_mechanisms
None.
.. _notable_changes_in_nss_3.15.1:
`Notable Changes in NSS 3.15.1 <#notable_changes_in_nss_3.15.1>`__
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. container::
constraints on the common name in libpkix when no subjectAltName is present.
function arguments of SEC_CertNicknameConflict.
certificate_status handshake message correctly.
initialization fails if NSS cannot call the RtlGenRandom function.
SECMOD_CloseUserDB/SECMOD_OpenUserDB fails to reset the token delay, leading to spurious
failures.
header include guard macro of secmod.h.
importing a PEM file that contains a private key.
shlibsign exited with status 0 even though it failed.
- The NSS_SURVIVE_DOUBLE_BYPASS_FAILURE build option is removed.
.. _bugs_fixed_in_nss_3.15.1:
`Bugs fixed in NSS 3.15.1 <#bugs_fixed_in_nss_3.15.1>`__
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
.. container::
`Compatibility <#compatibility>`__
----------------------------------
.. container::
NSS 3.15.1 shared libraries are backward compatible with all older NSS 3.x shared libraries. A
program linked with older NSS 3.x shared libraries will work with NSS 3.15.1 shared libraries
without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs
to the functions listed in NSS Public Functions will remain compatible with future versions of
the NSS shared libraries.
`Feedback <#feedback>`__
------------------------
.. container::
Bugs discovered should be reported by filing a bug report with