On 11/19/2013 10:40 AM, Wan-Teh Chang wrote:
> Bob's answer is accurate.
>
> Note that CAs are more interested in SHA-2 based signature support
> rather than plain SHA-2 support. So another way to track down the NSS
> version is to look at the CVS history of the secvfy.c file:
>
> http://bonsai.mozilla.org/cvslog.cgi?file=mozilla/security/nss/lib/cryptohi/secvfy.c&rev=HEAD&mark=1.30
>
> The relevant revisions are:
>
> 1.7 nelsonb%netscape.com2002-12-11 22:05 Support SHA256, SHA384, and
> SHA512 hashes in NSS.
>
> 1.14 wtchang%redhat.com2005-08-12 16:50 Bugzilla Bug 296410: enlarge
> the buffer size for message digest so that we can generate and verify
> signatures that use SHA-512.
>
> 1.17 rrelyea%redhat.com2006-02-07 22:14 Bug 320583 Support for
> SHA256/384/512 with ECC signing
>
> So it is safe to say that by mid 2006 (NSS 3.11.1, released on
> 2006-05-05) the support of SHA-2 based signatures in NSS was already
> stable and complete, covering both RSA and ECDSA signatures. 
This would map to*:
  Firefox  2.0.0.1
  Thunderbird 1.5.0.10
  Mozilla 1.9a1
  Seamonkey 1.0.8

> Another
> evidence of mature support is the FIPS 140-2 validation of NSS 3.11.4
> (http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2007.htm#814).
>
> A very conservative response would be NSS 3.11.4
> (http://www-archive.mozilla.org/projects/security/pki/nss/nss-3.11.4/nss-3.11.4-release-notes.html)
> and later.

This yields the same list (it looks like mozilla picked up 3.11.5 as the
first nss 3.11 build it shipped).


* Source, the cvs log for nss.h, the one file known to change for every
release (because it has the NSS version numbers).
>
> Wan-Teh


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to