Loading RELEASE-NOTES +2 −1 Original line number Diff line number Diff line Loading @@ -13,6 +13,7 @@ This release includes the following changes: This release includes the following bugfixes: o nss: allow to use ECC ciphers if NSS implements them [1] o This release includes the following known bugs: Loading @@ -28,4 +29,4 @@ advice from friends like these: References to bug reports and discussions on issues: [1] = [1] = https://bugzilla.redhat.com/1058776 lib/vtls/nss.c +0 −2 Original line number Diff line number Diff line Loading @@ -125,7 +125,6 @@ static const cipher_s cipherlist[] = { /* AES ciphers. */ {"rsa_aes_128_sha", TLS_RSA_WITH_AES_128_CBC_SHA}, {"rsa_aes_256_sha", TLS_RSA_WITH_AES_256_CBC_SHA}, #ifdef NSS_ENABLE_ECC /* ECC ciphers. */ {"ecdh_ecdsa_null_sha", TLS_ECDH_ECDSA_WITH_NULL_SHA}, {"ecdh_ecdsa_rc4_128_sha", TLS_ECDH_ECDSA_WITH_RC4_128_SHA}, Loading @@ -152,7 +151,6 @@ static const cipher_s cipherlist[] = { {"ecdh_anon_3des_sha", TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA}, {"ecdh_anon_aes_128_sha", TLS_ECDH_anon_WITH_AES_128_CBC_SHA}, {"ecdh_anon_aes_256_sha", TLS_ECDH_anon_WITH_AES_256_CBC_SHA}, #endif }; /* following ciphers are new in NSS 3.4 and not enabled by default, therefore Loading Loading
RELEASE-NOTES +2 −1 Original line number Diff line number Diff line Loading @@ -13,6 +13,7 @@ This release includes the following changes: This release includes the following bugfixes: o nss: allow to use ECC ciphers if NSS implements them [1] o This release includes the following known bugs: Loading @@ -28,4 +29,4 @@ advice from friends like these: References to bug reports and discussions on issues: [1] = [1] = https://bugzilla.redhat.com/1058776
lib/vtls/nss.c +0 −2 Original line number Diff line number Diff line Loading @@ -125,7 +125,6 @@ static const cipher_s cipherlist[] = { /* AES ciphers. */ {"rsa_aes_128_sha", TLS_RSA_WITH_AES_128_CBC_SHA}, {"rsa_aes_256_sha", TLS_RSA_WITH_AES_256_CBC_SHA}, #ifdef NSS_ENABLE_ECC /* ECC ciphers. */ {"ecdh_ecdsa_null_sha", TLS_ECDH_ECDSA_WITH_NULL_SHA}, {"ecdh_ecdsa_rc4_128_sha", TLS_ECDH_ECDSA_WITH_RC4_128_SHA}, Loading @@ -152,7 +151,6 @@ static const cipher_s cipherlist[] = { {"ecdh_anon_3des_sha", TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA}, {"ecdh_anon_aes_128_sha", TLS_ECDH_anon_WITH_AES_128_CBC_SHA}, {"ecdh_anon_aes_256_sha", TLS_ECDH_anon_WITH_AES_256_CBC_SHA}, #endif }; /* following ciphers are new in NSS 3.4 and not enabled by default, therefore Loading