Patch checked in on the NSS trunk (NSS 3.14).
Checking in blapit.h;
/cvsroot/mozilla/security/nss/lib/freebl/blapit.h,v -- blapit.h
new revision: 1.29; previous revision: 1.28
done
Checking in dh.c;
/cvsroot/mozilla/security/nss/lib/freebl/dh.c,v -- dh.c
new revision: 1.12; previous revision:
Created attachment 631576
Increase max RSA and DH key sizes to 16K bits. Adjust DH secret key size to
group size
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1002434
Title:
TLS interoperability
bsmith: the Diffie-Hellman private keys generated by NSS
are hardcoded to be 160 bits long:
http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/freebl/dh.crev=1.11mark=24#24
The private key length should be the same as the length of the
q parameter. So for a 2048-bit p, q should
The test
#if __GNUC__ 3
is correct even if __GNUC__ is not defined. The C preprocessor
replaces an undefined macro with 0L in a conditional expression.
So if __GNUC__ is not defined, the test
#if __GNUC__ 3
will fail, which is the expected result.
--
You received this bug notification
Comment on attachment 557158
Patch (v1)
// By request of the Dutch government
I suggest this comment be reworded. This comment
implies we yielded to government pressure. I doubt
that's the case.
How about something like Staat der Nederlanden Root CA
certified their subordinate DigiNotar
This patch comes from NSS 3.12.4 and can be applied to NSS 3.12.3.1 to
fix the console spam that Evan Martin mentioned.
I recommend that you upgrade to NSS 3.12.4 in the latest Ubuntu release.
In Ubuntu releases that must stick with NSS 3.12.3.1, please apply this
patch. Although this is not a
On Sat, Sep 26, 2009 at 3:49 AM, Alexander Sack a...@ubuntu.com wrote:
Hi Wah-Teh,
(feel free to assign me for future bugs directly to get my instant
attention.)
Is there anything we should do here? Maybe chromium doesn't like if an
initially loaded lib goes away? for instance chrome has a
Public bug reported:
Note: Please see Chromium issue 18706 (http://crbug.com/18706) for more
info. Feel free to mark this bug invalid or won't fix. I just wanted to
make
sure you know about this issue.
Shortly after the nss package in Hardy, Intrepid, and Jaunty was updated
on 2009-08-04 for
More info on the timing:
The crashes I cited above were from Chromium version 3.0.196.0,
which was released on 2009-07-30 18:14.
The next version, 3.0.197.11, was released on 2009-08-07 16:40.
Note that we started to see chrome (deleted) in crashes on
2009-08-08. Interesting...
--
Crashes in
This is NSS bug 486537:
https://bugzilla.mozilla.org/show_bug.cgi?id=486537
This bug was introduced in NSS 3.12.3, and fixed in NSS 3.12.4
in the upstream.
There are several ways to fix this bug. Please use the upstream patch:
https://bug486537.bugzilla.mozilla.org/attachment.cgi?id=370674
** Attachment added: NSS patch
http://launchpadlibrarian.net/29763726/nss-patch.txt
--
Update libnss3-1d in Ubuntu 8.04 LTS
https://bugs.launchpad.net/bugs/407549
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs
Public bug reported:
Binary package hint: libnss3-1d
The libnss3-1d package in Ubuntu 8.04 LTS is NSS 3.12.0.3 (package
version 3.12.0.3-0ubuntu0.8.04.5). This is an old NSS release now. The
current NSS release is NSS 3.12.3.1.
The Chromium browser is affected by an NSS bug (one of the issues
One more thing: if you upgrade to NSS 3.12.3.1, the dependent
libnspr4-0d package should be upgraded to NSPR 4.7.5.
--
Update libnss3-1d in Ubuntu 8.04 LTS
https://bugs.launchpad.net/bugs/407549
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Yes, libnss3-1d depends on libsqlite3-0. If libsqlite3-0 is missing,
libnss3-1d is simply broken. This problem may not be apparent at link
time because libsoftokn3.so (the NSS shared library that depends on
libsqlite3-0) is not loaded until you call one of the NSS initialization
functions. If
14 matches
Mail list logo