#11823: nss-3.43
-------------------------+-----------------------
 Reporter:  bdubbs       |       Owner:  bdubbs
     Type:  enhancement  |      Status:  assigned
 Priority:  normal       |   Milestone:  8.5
Component:  BOOK         |     Version:  SVN
 Severity:  normal       |  Resolution:
 Keywords:               |
-------------------------+-----------------------

Comment (by bdubbs):

 New in NSS 3.43
 Section
 New Functionality
 Section
 New Functions
 {{{
     in sechash.h
         HASH_GetHashOidTagByHashType - convert type HASH_HashType to type
 SECOidTag
     in sslexp.h
         SSL_SendCertificateRequest - allow server to request post-
 handshake client authentication. To use this both peers need to enable the
 SSL_ENABLE_POST_HANDSHAKE_AUTH option. Note that while the mechanism is
 present, post-handshake authentication is currently not TLS 1.3 compliant
 due to Bug 1532312
 }}}

 Notable Changes in NSS 3.43
 {{{
     The following CA certificates were Added:
         CN = emSign Root CA - G1
             SHA-256 Fingerprint:
 40F6AF0346A99AA1CD1D555A4E9CCE62C7F9634603EE406615833DC8C8D00367
         CN = emSign ECC Root CA - G3
             SHA-256 Fingerprint:
 86A1ECBA089C4A8D3BBE2734C612BA341D813E043CF9E8A862CD5C57A36BBE6B
         CN = emSign Root CA - C1
             SHA-256 Fingerprint:
 125609AA301DA0A249B97A8239CB6A34216F44DCAC9F3954B14292F2E8C8608F
         CN = emSign ECC Root CA - C3
             SHA-256 Fingerprint:
 BC4D809B15189D78DB3E1D8CF4F9726A795DA1643CA5F1358E1DDB0EDC0D7EB3
         CN = Hongkong Post Root CA 3
             SHA-256 Fingerprint:
 5A2FC03F0C83B090BBFA40604B0988446C7636183DF9846E17101A447FB8EFD6
     The following CA certificates were Removed:
         None
 }}}

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/11823#comment:2>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to