Hello community, here is the log from the commit of package mozilla-nss for openSUSE:Factory checked in at 2020-10-10 19:00:34 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/mozilla-nss (Old) and /work/SRC/openSUSE:Factory/.mozilla-nss.new.4249 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "mozilla-nss" Sat Oct 10 19:00:34 2020 rev:164 rq:840031 version:3.57 Changes: -------- --- /work/SRC/openSUSE:Factory/mozilla-nss/mozilla-nss.changes 2020-09-29 18:59:04.053574082 +0200 +++ /work/SRC/openSUSE:Factory/.mozilla-nss.new.4249/mozilla-nss.changes 2020-10-10 19:00:44.512375606 +0200 @@ -1,0 +2,25 @@ +Wed Sep 30 21:06:01 UTC 2020 - Wolfgang Rosenauer <w...@rosenauer.org> + +- update to NSS 3.57 + * The following CA certificates were Added: + bmo#1663049 - CN=Trustwave Global Certification Authority + SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8 + bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority + SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4 + bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority + SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097 + * The following CA certificates were Removed: + bmo#1651211 - CN=EE Certification Centre Root CA + SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76 + bmo#1656077 - O=Government Root Certification Authority; C=TW + SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3 + * Trust settings for the following CA certificates were Modified: + bmo#1653092 - CN=OISTE WISeKey Global Root GA CA + Websites (server authentication) trust bit removed. + * https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes +- requires NSPR 4.29 +- removed obsolete nss-freebl-fix-aarch64.patch (bmo#1659256) +- introduced _constraints due to high memory requirements especially + for LTO on Tumbleweed + +------------------------------------------------------------------- Old: ---- nss-3.56.tar.gz nss-freebl-fix-aarch64.patch New: ---- _constraints nss-3.57.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ mozilla-nss.spec ++++++ --- /var/tmp/diff_new_pack.EBWkdT/_old 2020-10-10 19:00:51.380379016 +0200 +++ /var/tmp/diff_new_pack.EBWkdT/_new 2020-10-10 19:00:51.384379018 +0200 @@ -17,14 +17,14 @@ # -%global nss_softokn_fips_version 3.56 -%define NSPR_min_version 4.28 +%global nss_softokn_fips_version 3.57 +%define NSPR_min_version 4.29 %define nspr_ver %(rpm -q --queryformat '%%{VERSION}' mozilla-nspr) %define nssdbdir %{_sysconfdir}/pki/nssdb Name: mozilla-nss -Version: 3.56 +Version: 3.57 Release: 0 -%define underscore_version 3_56 +%define underscore_version 3_57 Summary: Network Security Services License: MPL-2.0 Group: System/Libraries @@ -50,26 +50,25 @@ Patch6: bmo-1400603.patch Patch7: nss-sqlitename.patch Patch8: ppc-old-abi-v3.patch -Patch11: nss-fips-use-getrandom.patch -Patch13: nss-fips-dsa-kat.patch -Patch15: nss-fips-pairwise-consistency-check.patch -Patch16: nss-fips-rsa-keygen-strictness.patch -Patch19: nss-fips-cavs-keywrap.patch -Patch20: nss-fips-cavs-kas-ffc.patch -Patch21: nss-fips-cavs-kas-ecc.patch -Patch22: nss-fips-gcm-ctr.patch -Patch23: nss-fips-constructor-self-tests.patch -Patch24: nss-fips-cavs-general.patch -Patch25: nss-fips-cavs-dsa-fixes.patch -Patch26: nss-fips-cavs-rsa-fixes.patch -Patch27: nss-fips-approved-crypto-non-ec.patch -Patch29: nss-fips-zeroization.patch -Patch30: nss-fips-tls-allow-md5-prf.patch -Patch31: nss-fips-use-strong-random-pool.patch -Patch32: nss-fips-detect-fips-mode-fixes.patch -Patch34: nss-fips-combined-hash-sign-dsa-ecdsa.patch -Patch36: nss-fips-aes-keywrap-post.patch -Patch37: nss-freebl-fix-aarch64.patch +Patch9: nss-fips-use-getrandom.patch +Patch10: nss-fips-dsa-kat.patch +Patch11: nss-fips-pairwise-consistency-check.patch +Patch12: nss-fips-rsa-keygen-strictness.patch +Patch13: nss-fips-cavs-keywrap.patch +Patch14: nss-fips-cavs-kas-ffc.patch +Patch15: nss-fips-cavs-kas-ecc.patch +Patch16: nss-fips-gcm-ctr.patch +Patch17: nss-fips-constructor-self-tests.patch +Patch18: nss-fips-cavs-general.patch +Patch19: nss-fips-cavs-dsa-fixes.patch +Patch20: nss-fips-cavs-rsa-fixes.patch +Patch21: nss-fips-approved-crypto-non-ec.patch +Patch22: nss-fips-zeroization.patch +Patch23: nss-fips-tls-allow-md5-prf.patch +Patch24: nss-fips-use-strong-random-pool.patch +Patch25: nss-fips-detect-fips-mode-fixes.patch +Patch26: nss-fips-combined-hash-sign-dsa-ecdsa.patch +Patch27: nss-fips-aes-keywrap-post.patch %if 0%{?sle_version} >= 120000 && 0%{?sle_version} < 150000 # aarch64 + gcc4.8 fails to build on SLE-12 due to undefined references BuildRequires: gcc9-c++ @@ -206,12 +205,17 @@ %patch6 -p1 %patch7 -p1 %patch8 -p1 - # FIPS patches +%patch9 -p1 +%patch10 -p1 %patch11 -p1 +%patch12 -p1 %patch13 -p1 +%patch14 -p1 %patch15 -p1 %patch16 -p1 +%patch17 -p1 +%patch18 -p1 %patch19 -p1 %patch20 -p1 %patch21 -p1 @@ -221,15 +225,6 @@ %patch25 -p1 %patch26 -p1 %patch27 -p1 -%patch29 -p1 -%patch30 -p1 -%patch31 -p1 -%patch32 -p1 -%patch34 -p1 -%patch36 -p1 - -# Freebl -%patch37 -p1 # additional CA certificates #cd security/nss/lib/ckfw/builtins ++++++ _constraints ++++++ <?xml version="1.0" encoding="UTF-8"?> <constraints> <hardware> <disk> <size unit="G">5</size> </disk> <memory> <size unit="G">6</size> </memory> </hardware> </constraints> ++++++ baselibs.conf ++++++ --- /var/tmp/diff_new_pack.EBWkdT/_old 2020-10-10 19:00:51.464379057 +0200 +++ /var/tmp/diff_new_pack.EBWkdT/_new 2020-10-10 19:00:51.464379057 +0200 @@ -1,5 +1,5 @@ mozilla-nss - requires "mozilla-nspr-<targettype> >= 4.25" + requires "mozilla-nspr-<targettype> >= 4.29" requires "libfreebl3-<targettype>" requires "libsoftokn3-<targettype>" requires "libnssckbi.so" ++++++ nss-3.56.tar.gz -> nss-3.57.tar.gz ++++++ /work/SRC/openSUSE:Factory/mozilla-nss/nss-3.56.tar.gz /work/SRC/openSUSE:Factory/.mozilla-nss.new.4249/nss-3.57.tar.gz differ: char 5, line 1 ++++++ nss-fips-aes-keywrap-post.patch ++++++ --- /var/tmp/diff_new_pack.EBWkdT/_old 2020-10-10 19:00:51.556379103 +0200 +++ /var/tmp/diff_new_pack.EBWkdT/_new 2020-10-10 19:00:51.556379103 +0200 @@ -3,7 +3,7 @@ # Date 1589854460 -7200 # Tue May 19 04:14:20 2020 +0200 # Node ID ce99bba6375432c55a73c1367f619dfef7c7e9fc -# Parent 2b4f407fb1f8824fed4df9c4c3f15a2493e71677 +# Parent 2c820431829b3e5c7e161bd0bf73b48def9d3822 commit e78f5a6a2124ce88002796d6aaefc6232f132526 Author: Hans Petter Jansson <h...@cl.no> AES Keywrap POST. @@ -11,7 +11,12 @@ diff --git a/lib/freebl/fipsfreebl.c b/lib/freebl/fipsfreebl.c --- a/lib/freebl/fipsfreebl.c +++ b/lib/freebl/fipsfreebl.c -@@ -110,6 +110,9 @@ +@@ -107,16 +107,19 @@ BOOL WINAPI DllMain( + #define FIPS_AES_BLOCK_SIZE 16 /* 128-bits */ + #define FIPS_AES_ENCRYPT_LENGTH 16 /* 128-bits */ + #define FIPS_AES_DECRYPT_LENGTH 16 /* 128-bits */ + #define FIPS_AES_CMAC_LENGTH 16 /* 128-bits */ + #define FIPS_AES_128_KEY_SIZE 16 /* 128-bits */ #define FIPS_AES_192_KEY_SIZE 24 /* 192-bits */ #define FIPS_AES_256_KEY_SIZE 32 /* 256-bits */ @@ -21,7 +26,17 @@ /* FIPS preprocessor directives for message digests */ #define FIPS_KNOWN_HASH_MESSAGE_LENGTH 64 /* 512-bits */ -@@ -299,6 +302,9 @@ + /* FIPS preprocessor directives for RSA. */ + #define FIPS_RSA_TYPE siBuffer + #define FIPS_RSA_PUBLIC_EXPONENT_LENGTH 3 /* 24-bits */ + #define FIPS_RSA_PRIVATE_VERSION_LENGTH 1 /* 8-bits */ + #define FIPS_RSA_MESSAGE_LENGTH 256 /* 2048-bits */ +@@ -296,16 +299,19 @@ freebl_fips_AES_PowerUpSelfTest(int aes_ + static const PRUint8 aes_cbc_known_initialization_vector[] = + { "SecurityytiruceS" }; + + /* AES Known Plaintext (128-bits). (blocksize is 128-bits) */ + static const PRUint8 aes_known_plaintext[] = { "NetscapeepacsteN" }; static const PRUint8 aes_gcm_known_aad[] = { "MozillaallizoM" }; @@ -31,8 +46,18 @@ /* AES Known Ciphertext (128-bit key). */ static const PRUint8 aes_ecb128_known_ciphertext[] = { 0x3c, 0xa5, 0x96, 0xf3, 0x34, 0x6a, 0x96, 0xc1, -@@ -353,6 +359,25 @@ - 0xf4, 0xb0, 0xc1, 0x8c, 0x86, 0x51, 0xf5, 0xa1 + 0x03, 0x88, 0x16, 0x7b, 0x20, 0xbf, 0x35, 0x47 + }; + + static const PRUint8 aes_cbc128_known_ciphertext[] = { + 0xcf, 0x15, 0x1d, 0x4f, 0x96, 0xe4, 0x4f, 0x63, +@@ -366,33 +372,56 @@ freebl_fips_AES_PowerUpSelfTest(int aes_ + }; + + static const PRUint8 aes_cmac256_known_ciphertext[] = { + 0xc1, 0x26, 0x69, 0x32, 0x51, 0x13, 0x65, 0xac, + 0x71, 0x23, 0xe4, 0xe7, 0xb9, 0x0c, 0x88, 0x9f + }; + /* AES Keywrap Known Ciphertexts. */ @@ -57,10 +82,15 @@ const PRUint8 *aes_ecb_known_ciphertext = (aes_key_size == FIPS_AES_128_KEY_SIZE) ? aes_ecb128_known_ciphertext : (aes_key_size == FIPS_AES_192_KEY_SIZE) ? aes_ecb192_known_ciphertext : aes_ecb256_known_ciphertext; -@@ -362,10 +387,14 @@ + const PRUint8 *aes_cbc_known_ciphertext = + (aes_key_size == FIPS_AES_128_KEY_SIZE) ? aes_cbc128_known_ciphertext : (aes_key_size == FIPS_AES_192_KEY_SIZE) ? aes_cbc192_known_ciphertext : aes_cbc256_known_ciphertext; + const PRUint8 *aes_gcm_known_ciphertext = (aes_key_size == FIPS_AES_128_KEY_SIZE) ? aes_gcm128_known_ciphertext : (aes_key_size == FIPS_AES_192_KEY_SIZE) ? aes_gcm192_known_ciphertext : aes_gcm256_known_ciphertext; + const PRUint8 *aes_cmac_known_ciphertext = + (aes_key_size == FIPS_AES_128_KEY_SIZE) ? aes_cmac128_known_ciphertext : (aes_key_size == FIPS_AES_192_KEY_SIZE) ? aes_cmac192_known_ciphertext : aes_cmac256_known_ciphertext; + + const PRUint8 *aes_keywrap_known_ciphertext = + (aes_key_size == FIPS_AES_128_KEY_SIZE) ? aes_kw128_known_ciphertext : (aes_key_size == FIPS_AES_192_KEY_SIZE) ? aes_kw192_known_ciphertext : aes_kw256_known_ciphertext; + @@ -68,11 +98,22 @@ PRUint8 aes_computed_ciphertext[FIPS_AES_ENCRYPT_LENGTH * 2]; PRUint8 aes_computed_plaintext[FIPS_AES_DECRYPT_LENGTH * 2]; AESContext *aes_context; + CMACContext *cmac_context; + AESKeyWrapContext *aes_keywrap_context; unsigned int aes_bytes_encrypted; unsigned int aes_bytes_decrypted; CK_NSS_GCM_PARAMS gcmParams; -@@ -554,6 +583,52 @@ + SECStatus aes_status; + + /*check if aes_key_size is 128, 192, or 256 bits */ + if ((aes_key_size != FIPS_AES_128_KEY_SIZE) && + (aes_key_size != FIPS_AES_192_KEY_SIZE) && +@@ -609,16 +638,62 @@ freebl_fips_AES_PowerUpSelfTest(int aes_ + if ((aes_status != SECSuccess) || + (aes_bytes_encrypted != FIPS_AES_CMAC_LENGTH) || + (PORT_Memcmp(aes_computed_ciphertext, aes_cmac_known_ciphertext, + FIPS_AES_CMAC_LENGTH) != 0)) { + PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); return (SECFailure); } @@ -125,3 +166,8 @@ return (SECSuccess); } + /* Known Hash Message (512-bits). Used for all hashes (incl. SHA-N [N>1]). */ + static const PRUint8 known_hash_message[] = { + "The test message for the MD2, MD5, and SHA-1 hashing algorithms." + }; + ++++++ nss-fips-constructor-self-tests.patch ++++++ ++++ 838 lines (skipped) ++++ between /work/SRC/openSUSE:Factory/mozilla-nss/nss-fips-constructor-self-tests.patch ++++ and /work/SRC/openSUSE:Factory/.mozilla-nss.new.4249/nss-fips-constructor-self-tests.patch ++++++ nss-opt.patch ++++++ --- /var/tmp/diff_new_pack.EBWkdT/_old 2020-10-10 19:00:51.640379145 +0200 +++ /var/tmp/diff_new_pack.EBWkdT/_new 2020-10-10 19:00:51.640379145 +0200 @@ -1,19 +1,8 @@ -# HG changeset patch -# Parent 33317adf00d6bc6c3e3499e4b32fca6b899c4b77 -Index: security/coreconf/Linux.mk -=================================================================== -RCS file: /cvsroot/mozilla/security/coreconf/Linux.mk,v -retrieving revision 1.45.2.1 - diff --git a/coreconf/Linux.mk b/coreconf/Linux.mk +index 956f0e4..b3a352a 100644 --- a/coreconf/Linux.mk +++ b/coreconf/Linux.mk -@@ -102,21 +102,17 @@ endif - endif - - - ifneq ($(OS_TARGET),Android) - LIBC_TAG = _glibc +@@ -108,11 +108,7 @@ LIBC_TAG = _glibc endif ifdef BUILD_OPT @@ -26,8 +15,3 @@ ifdef MOZ_DEBUG_SYMBOLS ifdef MOZ_DEBUG_FLAGS OPTIMIZER += $(MOZ_DEBUG_FLAGS) - else - OPTIMIZER += -gdwarf-2 - endif - endif - endif