Bug 1327159

Summary: NSS: bring our downstream work upstream
Product: Red Hat Enterprise Linux 7 Reporter: Nikos Mavrogiannopoulos <nmavrogi>
Component: nssAssignee: Kai Engert (:kaie) (inactive account) <kengert>
Status: CLOSED UPSTREAM QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.4Keywords: Tracking
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-06-03 08:10:22 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On:    
Bug Blocks: 1309231    

Description Nikos Mavrogiannopoulos 2016-04-14 11:31:23 UTC
Description of problem:
Over the years we have accumulated several downstream patches in NSS (for various reasons) which deviate from upstream in very important code paths. That makes our work very difficult on planning and implementing rebases, as well as introduces the risk of downstream bugs introduced due to that process.

This project is about getting our existing FIPS140 and common criteria patches upstream. This is a tracker bug of the process.

Comment 1 Nikos Mavrogiannopoulos 2016-05-04 09:45:48 UTC
"Pick up FIPS-140 certification work done by Red Hat" was completed.

Comment 2 Nikos Mavrogiannopoulos 2016-06-03 08:07:59 UTC
"Support TLS 1.2 PRF with SHA-384 as the hash function" was completed.

Comment 3 Nikos Mavrogiannopoulos 2016-06-03 08:10:22 UTC
"Don't require that the signature method for certificate verify is identical with PRF, support alternatives" was completed.