Please note, this is a STATIC archive of website developer.mozilla.org from 03 Nov 2016, cach3.com does not collect or store any user information, there is no "phishing" involved.

NSS_3.12.1_release_notes.html

NSS 3.12.1 Release Notes

2008-09-05

Newsgroup: mozilla.dev.tech.crypto

Contents


Introduction

Network Security Services (NSS) 3.12.1 is a patch release for NSS 3.12. The bug fixes in NSS 3.12.1 are described in the "Bugs Fixed" section below.

NSS 3.12.1 is tri-licensed under the MPL 1.1/GPL 2.0/LGPL 2.1.


Distribution Information

The CVS tag for the NSS 3.12.1 release is NSS_3_12_1_RTM.  NSS 3.12.1 requires NSPR 4.7.1.

See the Documentation section for the build instructions.

NSS 3.12.1 source and binary distributions are also available on ftp.mozilla.org for secure HTTPS download:

You also need to download the NSPR 4.7.1 binary distributions to get the NSPR 4.7.1 header files and shared libraries, which NSS 3.12.1 requires. NSPR 4.7.1 binary distributions are in https://ftp.mozilla.org/pub/mozilla.org/nspr/releases/v4.7.1/.

New in NSS 3.12.1

  • New functions in the nss shared library:
    • CERT_NameToAsciiInvertible (see cert.h)
        Convert an CERTName into its RFC1485 encoded equivalent.
        Returns a string that must be freed with PORT_Free().
        Caller chooses encoding rules.
      CERT_EncodeSubjectKeyID (see cert.h)
        Encode Certificate SKID (Subject Key ID) extension.
      PK11_GetAllSlotsForCert (see pk11pub.h)
        PK11_GetAllSlotsForCert returns all the slots that a given certificate
        exists on, since it's possible for a cert to exist on more than one
        PKCS#11 token.

  • Levels of standards conformance strictness for CERT_NameToAsciiInvertible (see certt.h)
    • CERT_N2A_READABLE (maximum human readability)
      CERT_N2A_STRICT (strict RFC compliance)
      CERT_N2A_INVERTIBLE (maximum invertibility)

Bugs Fixed

The following bugs have been fixed in NSS 3.12.1.
  • Bug 67890: create self-signed cert with existing key that signed CSR
  • Bug 129303: NSS needs to expose interfaces to deal with multiple token sources of certs.
  • Bug 311432: ECC's ECL_USE_FP code (for Linux x86) fails pairwise consistency test
  • Bug 330622: certutil's usage messages incorrectly document certain options
  • Bug 330628: coreconf/Linux.mk should _not_ default to x86 but result in an error if host is not recognized
  • Bug 359302: Remove the sslsample code from NSS source tree
  • Bug 372241: Need more versatile form of CERT_NameToAscii
  • Bug 390296: NSS ignores subject CN even when SAN contains no dNSName
  • Bug 401928: Support generalized PKCS#5 v2 PBEs
  • Bug 403543: pkix: need a way to enable/disable AIA cert fetching
  • Bug 408847: pkix_OcspChecker_Check does not support specified responder (and given signercert)
  • Bug 414003: Crash [[@ CERT_DecodeCertPackage] sometimes with this testcase
  • Bug 415167: Memory leak in certutil
  • Bug 417399: Arena Allocation results are not checked in pkix_pl_InfoAccess_ParseLocation
  • Bug 420644: Improve SSL tracing of key derivation
  • Bug 426886: Use const char* in PK11_ImportCertForKey
  • Bug 428103: CERT_EncodeSubjectKeyID is not defined in any public header file
  • Bug 429716: debug builds of libPKIX unconditionally dump socket traffic to stdout
  • Bug 430368: vfychain -t option is undocumented
  • Bug 430369: vfychain -o succeeds even if -pp is not specified
  • Bug 430399: vfychain -pp crashes
  • Bug 430405: Error log is not produced by CERT_PKIXVerifyCert
  • Bug 430743: Update ssltap to understand the TLS session ticket extension
  • Bug 430859: PKIX: Policy mapping fails verification with error invalid arguments
  • Bug 430875: Document the policy for the order of cipher suites in SSL_ImplementedCiphers.
  • Bug 430916: add sustaining asserts
  • Bug 431805: leak in NSSArena_Destroy()
  • Bug 431929: Memory leaks on error paths in devutil.c
  • Bug 432303: Replace PKIX_PL_Memcpy with memcpy
  • Bug 433177: Fix the GCC compiler warnings in lib/util and lib/freebl
  • Bug 433437: vfychain ignores the -a option
  • Bug 433594: Crash destroying OCSP Cert ID [[@ CERT_DestroyOCSPCertID ]
  • Bug 434099: NSS relies on unchecked PKCS#11 object attribute values
  • Bug 434187: Fix the GCC compiler warnings in nss/lib
  • Bug 434398: libPKIX cannot find issuer cert immediately after checking it with OCSP
  • Bug 434808: certutil -B deadlock when importing two or more roots
  • Bug 434860: Coverity 1150 - dead code in ocsp_CreateCertID
  • Bug 436428: remove unneeded assert from sec_PKCS7EncryptLength
  • Bug 436430: Make NSS public headers compilable with NO_NSPR_10_SUPPORT defined
  • Bug 436577: uninitialized variable in sec_pkcs5CreateAlgorithmID
  • Bug 438685: libpkix doesn't try all the issuers in a bridge with multiple certs
  • Bug 438876: signtool is still using static libraries.
  • Bug 439123: Assertion failure in libpkix at shutdown
  • Bug 440062: incorrect list element count in PKIX_List_AppendItem function
  • Bug 442618: Eliminate dead function CERT_CertPackageType
  • Bug 443755: Extra semicolon in PKM_TLSKeyAndMacDerive makes conditional code unconditional
  • Bug 443760: Extra semicolon in SeqDatabase makes static analysis tool suspicious
  • Bug 448323: certutil -K doesn't report the token and slot names for found keys
  • Bug 448324: ocsp checker returns incorrect error code on request with invalid signing cert
  • Bug 449146: Remove dead libsec function declarations
  • Bug 453227: installation of PEM-encoded certificate without trailing newline fails

Documentation

For a list of the primary NSS documentation pages on mozilla.org, see NSS Documentation. New and revised documents available since the release of NSS 3.11 include the following:

Compatibility

NSS 3.12.1 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.12.1 shared libraries without recompiling or relinking.  Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.

Feedback

Bugs discovered should be reported by filing a bug report with mozilla.org Bugzilla (product NSS).

Document Tags and Contributors

 Contributors to this page: Sheppy, kwilson
 Last updated by: Sheppy,