Bug 1327159 - NSS: bring our downstream work upstream
Summary: NSS: bring our downstream work upstream
Keywords:
Status: CLOSED UPSTREAM
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: nss
Version: 7.4
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Kai Engert (:kaie) (inactive account)
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks: 1309231
TreeView+ depends on / blocked
 
Reported: 2016-04-14 11:31 UTC by Nikos Mavrogiannopoulos
Modified: 2016-06-03 08:10 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-06-03 08:10:22 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Nikos Mavrogiannopoulos 2016-04-14 11:31:23 UTC
Description of problem:
Over the years we have accumulated several downstream patches in NSS (for various reasons) which deviate from upstream in very important code paths. That makes our work very difficult on planning and implementing rebases, as well as introduces the risk of downstream bugs introduced due to that process.

This project is about getting our existing FIPS140 and common criteria patches upstream. This is a tracker bug of the process.

Comment 1 Nikos Mavrogiannopoulos 2016-05-04 09:45:48 UTC
"Pick up FIPS-140 certification work done by Red Hat" was completed.

Comment 2 Nikos Mavrogiannopoulos 2016-06-03 08:07:59 UTC
"Support TLS 1.2 PRF with SHA-384 as the hash function" was completed.

Comment 3 Nikos Mavrogiannopoulos 2016-06-03 08:10:22 UTC
"Don't require that the signature method for certificate verify is identical with PRF, support alternatives" was completed.


Note You need to log in before you can comment on or make changes to this bug.