Projects
Mega:23.09
nss
_service:tar_scm:Feature-nss-support-SM3-digest...
Sign Up
Log In
Username
Password
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _service:tar_scm:Feature-nss-support-SM3-digest-algorithm.patch of Package nss
From 5cf8e813cd5c765f09e368f0b5f2dbd4e4c430b1 Mon Sep 17 00:00:00 2001 From: Huaxin Lu <luhuaxin1@huawei.com> Date: Sat, 20 Aug 2022 00:49:51 +0800 Subject: [PATCH 2/4] nss support SM3 digest algorithm Co-authored-by: godcansee <liu332084460@foxmail.com> Signed-off-by: Huaxin Lu <luhuaxin1@huawei.com> diff --git a/lib/cryptohi/sechash.c b/lib/cryptohi/sechash.c index 5c592df..b288145 100644 --- a/lib/cryptohi/sechash.c +++ b/lib/cryptohi/sechash.c @@ -85,6 +85,12 @@ sha512_NewContext(void) return (void *)PK11_CreateDigestContext(SEC_OID_SHA512); } +static void * +sm3_NewContext(void) +{ + return (void *)PK11_CreateDigestContext(SEC_OID_SM3); +} + static void * sha3_224_NewContext(void) { @@ -190,6 +196,16 @@ const SECHashObject SECHashObjects[] = { PK11_DigestFinal, SHA224_BLOCK_LENGTH, HASH_AlgSHA224 }, + { SM3_LENGTH, + (void *(*)(void))sm3_NewContext, + (void *(*)(void *))PK11_CloneContext, + (void (*)(void *, PRBool))PK11_DestroyContext, + (void (*)(void *))PK11_DigestBegin, + (void (*)(void *, const unsigned char *, unsigned int))PK11_DigestOp, + (void (*)(void *, unsigned char *, unsigned int *, unsigned int)) + PK11_DigestFinal, + SM3_BLOCK_LENGTH, + HASH_AlgSM3 }, { SHA3_224_LENGTH, (void *(*)(void))sha3_224_NewContext, (void *(*)(void *))PK11_CloneContext, @@ -265,6 +281,9 @@ HASH_GetHashTypeByOidTag(SECOidTag hashOid) case SEC_OID_SHA512: ht = HASH_AlgSHA512; break; + case SEC_OID_SM3: + ht = HASH_AlgSM3; + break; case SEC_OID_SHA3_224: ht = HASH_AlgSHA3_224; break; diff --git a/lib/freebl/blapi.h b/lib/freebl/blapi.h index b8bc4d3..a06544e 100644 --- a/lib/freebl/blapi.h +++ b/lib/freebl/blapi.h @@ -1584,6 +1584,24 @@ extern SECStatus SHAKE_256_HashBuf(unsigned char *dest, unsigned int dest_len, const unsigned char *src, PRUint32 src_length); extern SECStatus SHAKE_256_Hash(unsigned char *dest, unsigned int dest_len, const char *src); +/******************************************/ + +extern SM3Context *SM3_NewContext(void); +extern void SM3_DestroyContext(SM3Context *cx, PRBool freeit); +extern void SM3_Begin(SM3Context *cx); +extern void SM3_Update(SM3Context *cx, const unsigned char *input, + unsigned int inputLen); +extern void SM3_End(SM3Context *cx, unsigned char *digest, + unsigned int *digestLen, unsigned int maxDigestLen); +extern SECStatus SM3_HashBuf(unsigned char *dest, const unsigned char *src, + PRUint32 src_length); +extern SECStatus SM3_Hash(unsigned char *dest, const char *src); +extern void SM3_TraceState(SM3Context *cx); +extern unsigned int SM3_FlattenSize(SM3Context *cx); +extern SECStatus SM3_Flatten(SM3Context *cx, unsigned char *space); +extern SM3Context *SM3_Resurrect(unsigned char *space, void *arg); +extern void SM3_Clone(SM3Context *dest, SM3Context *src); + /**************************************** * implement TLS 1.0 Pseudo Random Function (PRF) and TLS P_hash function */ diff --git a/lib/freebl/blapit.h b/lib/freebl/blapit.h index 8cba3ec..cbd6b79 100644 --- a/lib/freebl/blapit.h +++ b/lib/freebl/blapit.h @@ -102,6 +102,7 @@ typedef int __BLAPI_DEPRECATED __attribute__((deprecated)); #define SHA3_384_LENGTH 48 /* bytes */ #define SHA3_512_LENGTH 64 /* bytes */ #define BLAKE2B512_LENGTH 64 /* Bytes */ +#define SM3_LENGTH 32 /* bytes */ #define HASH_LENGTH_MAX SHA512_LENGTH /* @@ -120,6 +121,7 @@ typedef int __BLAPI_DEPRECATED __attribute__((deprecated)); #define SHA3_384_BLOCK_LENGTH 104 /* bytes */ #define SHA3_512_BLOCK_LENGTH 72 /* bytes */ #define BLAKE2B_BLOCK_LENGTH 128 /* Bytes */ +#define SM3_BLOCK_LENGTH 64 /* bytes */ #define HASH_BLOCK_LENGTH_MAX SHA3_224_BLOCK_LENGTH #define AES_BLOCK_SIZE 16 /* bytes */ @@ -255,6 +257,7 @@ struct MD5ContextStr; struct SHA1ContextStr; struct SHA256ContextStr; struct SHA512ContextStr; +struct SM3ContextStr; struct SHA3ContextStr; struct SHAKEContextStr; struct AESKeyWrapContextStr; @@ -278,6 +281,7 @@ typedef struct SHA256ContextStr SHA224Context; typedef struct SHA512ContextStr SHA512Context; /* SHA384Context is really a SHA512ContextStr. This is not a mistake. */ typedef struct SHA512ContextStr SHA384Context; +typedef struct SM3ContextStr SM3Context; /* All SHA3_*Contexts are the same. This is not a mistake. */ typedef struct SHA3ContextStr SHA3_224Context; typedef struct SHA3ContextStr SHA3_256Context; diff --git a/lib/freebl/freebl_base.gypi b/lib/freebl/freebl_base.gypi index d2e16f2..920d613 100644 --- a/lib/freebl/freebl_base.gypi +++ b/lib/freebl/freebl_base.gypi @@ -60,6 +60,7 @@ 'rsapkcs.c', 'sha_fast.c', 'shvfy.c', + 'sm3.c', 'sysrand.c', 'tlsprfalg.c', 'secmpi.c', diff --git a/lib/freebl/ldvector.c b/lib/freebl/ldvector.c index ff0a5f8..bf41759 100644 --- a/lib/freebl/ldvector.c +++ b/lib/freebl/ldvector.c @@ -379,6 +379,18 @@ static const struct FREEBLVectorStr vector = { /* End of version 3.025 */ + SM3_NewContext, + SM3_DestroyContext, + SM3_Begin, + SM3_Update, + SM3_End, + SM3_HashBuf, + SM3_Hash, + SM3_TraceState, + SM3_FlattenSize, + SM3_Flatten, + SM3_Resurrect, + SHA3_224_NewContext, SHA3_224_DestroyContext, SHA3_224_FlattenSize, diff --git a/lib/freebl/loader.c b/lib/freebl/loader.c index c44343f..8e4b542 100644 --- a/lib/freebl/loader.c +++ b/lib/freebl/loader.c @@ -2447,6 +2447,96 @@ CMAC_Destroy(CMACContext *ctx, PRBool free_it) (vector->p_CMAC_Destroy)(ctx, free_it); } +SECStatus +SM3_Hash(unsigned char *dest, const char *src) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return SECFailure; + return (vector->p_SM3_Hash)(dest, src); +} + +SECStatus +SM3_HashBuf(unsigned char *dest, const unsigned char *src, PRUint32 src_length) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return SECFailure; + return (vector->p_SM3_HashBuf)(dest, src, src_length); +} + +SM3Context * +SM3_NewContext(void) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return NULL; + return (vector->p_SM3_NewContext)(); +} + +void +SM3_DestroyContext(SM3Context *cx, PRBool freeit) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return; + (vector->p_SM3_DestroyContext)(cx, freeit); +} + +void +SM3_Begin(SM3Context *cx) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return; + (vector->p_SM3_Begin)(cx); +} + +void +SM3_Update(SM3Context *cx, const unsigned char *input, + unsigned int inputLen) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return; + (vector->p_SM3_Update)(cx, input, inputLen); +} + +void +SM3_End(SM3Context *cx, unsigned char *digest, + unsigned int *digestLen, unsigned int maxDigestLen) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return; + (vector->p_SM3_End)(cx, digest, digestLen, maxDigestLen); +} + +void +SM3_TraceState(SM3Context *cx) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return; + (vector->p_SM3_TraceState)(cx); +} + +unsigned int +SM3_FlattenSize(SM3Context *cx) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return 0; + return (vector->p_SM3_FlattenSize)(cx); +} + +SECStatus +SM3_Flatten(SM3Context *cx, unsigned char *space) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return SECFailure; + return (vector->p_SM3_Flatten)(cx, space); +} + +SM3Context * +SM3_Resurrect(unsigned char *space, void *arg) +{ + if (!vector && PR_SUCCESS != freebl_RunLoaderOnce()) + return NULL; + return (vector->p_SM3_Resurrect)(space, arg); +} + /* ============== New for 3.0026 =============================== */ SHA3_224Context * diff --git a/lib/freebl/loader.h b/lib/freebl/loader.h index cab96ba..b949e9f 100644 --- a/lib/freebl/loader.h +++ b/lib/freebl/loader.h @@ -831,6 +831,20 @@ struct FREEBLVectorStr { void (*p_ChaCha20_DestroyContext)(ChaCha20Context *ctx, PRBool freeit); /* Version 3.025 came to here */ + SM3Context *(*p_SM3_NewContext)(void); + void (*p_SM3_DestroyContext)(SM3Context *cx, PRBool freeit); + void (*p_SM3_Begin)(SM3Context *cx); + void (*p_SM3_Update)(SM3Context *cx, const unsigned char *input, + unsigned int inputLen); + void (*p_SM3_End)(SM3Context *cx, unsigned char *digest, + unsigned int *digestLen, unsigned int maxDigestLen); + SECStatus (*p_SM3_HashBuf)(unsigned char *dest, const unsigned char *src, + PRUint32 src_length); + SECStatus (*p_SM3_Hash)(unsigned char *dest, const char *src); + void (*p_SM3_TraceState)(SM3Context *cx); + unsigned int (*p_SM3_FlattenSize)(SM3Context *cx); + SECStatus (*p_SM3_Flatten)(SM3Context *cx, unsigned char *space); + SM3Context *(*p_SM3_Resurrect)(unsigned char *space, void *arg); SHA3_224Context *(*p_SHA3_224_NewContext)(void); void (*p_SHA3_224_DestroyContext)(SHA3_224Context *cx, PRBool freeit); diff --git a/lib/freebl/manifest.mn b/lib/freebl/manifest.mn index 6ac8fcd..3214369 100644 --- a/lib/freebl/manifest.mn +++ b/lib/freebl/manifest.mn @@ -160,6 +160,7 @@ CSRCS = \ $(STUBS_SRCS) \ $(LOWHASH_SRCS) \ $(EXTRA_SRCS) \ + sm3.c \ $(NULL) ifndef NSS_DISABLE_DEPRECATED_SEED @@ -189,6 +190,7 @@ ALL_HDRS = \ shsign.h \ vis_proto.h \ seed.h \ + sm3.h \ $(NULL) diff --git a/lib/freebl/rawhash.c b/lib/freebl/rawhash.c index 07a34cf..0e4e2e3 100644 --- a/lib/freebl/rawhash.c +++ b/lib/freebl/rawhash.c @@ -141,6 +141,17 @@ const SECHashObject SECRawHashObjects[] = { HASH_AlgSHA224, (void (*)(void *, unsigned char *, unsigned int *, unsigned int))SHA224_EndRaw }, + { SM3_LENGTH, + (void *(*)(void))SM3_NewContext, + (void *(*)(void *))null_hash_clone_context, + (void (*)(void *, PRBool))SM3_DestroyContext, + (void (*)(void *))SM3_Begin, + (void (*)(void *, const unsigned char *, unsigned int))SM3_Update, + (void (*)(void *, unsigned char *, unsigned int *, + unsigned int))SM3_End, + SM3_BLOCK_LENGTH, + HASH_AlgSM3, + NULL }, { SHA3_224_LENGTH, (void *(*)(void))SHA3_224_NewContext, (void *(*)(void *))null_hash_clone_context, diff --git a/lib/pk11wrap/pk11pars.c b/lib/pk11wrap/pk11pars.c index 0243a93..5c4408e 100644 --- a/lib/pk11wrap/pk11pars.c +++ b/lib/pk11wrap/pk11pars.c @@ -342,6 +342,8 @@ static const oidValDef hashOptList[] = { { CIPHER_NAME("SHA384"), SEC_OID_SHA384, NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, { CIPHER_NAME("SHA512"), SEC_OID_SHA512, + NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, + { CIPHER_NAME("SM3"), SEC_OID_SM3, NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE } }; diff --git a/lib/pk11wrap/pk11slot.c b/lib/pk11wrap/pk11slot.c index fb05ba6..e29cb26 100644 --- a/lib/pk11wrap/pk11slot.c +++ b/lib/pk11wrap/pk11slot.c @@ -51,6 +51,7 @@ const PK11DefaultArrayEntry PK11_DefaultArray[] = { { "SHA512", SECMOD_SHA512_FLAG, CKM_SHA512 }, { "MD5", SECMOD_MD5_FLAG, CKM_MD5 }, { "MD2", SECMOD_MD2_FLAG, CKM_MD2 }, + { "SM3", SECMOD_SM3_FLAG, CKM_NSS_SM3 }, { "SSL", SECMOD_SSL_FLAG, CKM_SSL3_PRE_MASTER_KEY_GEN }, { "TLS", SECMOD_TLS_FLAG, CKM_TLS_MASTER_KEY_DERIVE }, { "SKIPJACK", SECMOD_FORTEZZA_FLAG, CKM_SKIPJACK_CBC64 }, @@ -93,7 +94,8 @@ static PK11SlotList pk11_tlsSlotList, pk11_randomSlotList, pk11_sha256SlotList, - pk11_sha512SlotList; /* slots do SHA512 and SHA384 */ + pk11_sha512SlotList, /* slots do SHA512 and SHA384 */ + pk11_sm3SlotList; /************************************************************ * Generic Slot List and Slot List element manipulations @@ -848,6 +850,7 @@ PK11_InitSlotLists(void) pk11_InitSlotListStatic(&pk11_randomSlotList); pk11_InitSlotListStatic(&pk11_sha256SlotList); pk11_InitSlotListStatic(&pk11_sha512SlotList); + pk11_InitSlotListStatic(&pk11_sm3SlotList); return SECSuccess; } @@ -874,6 +877,7 @@ PK11_DestroySlotLists(void) pk11_FreeSlotListStatic(&pk11_randomSlotList); pk11_FreeSlotListStatic(&pk11_sha256SlotList); pk11_FreeSlotListStatic(&pk11_sha512SlotList); + pk11_FreeSlotListStatic(&pk11_sm3SlotList); return; } @@ -925,6 +929,8 @@ PK11_GetSlotList(CK_MECHANISM_TYPE type) return &pk11_md5SlotList; case CKM_MD2: return &pk11_md2SlotList; + case CKM_NSS_SM3: + return &pk11_sm3SlotList; case CKM_RC2_ECB: case CKM_RC2_CBC: return &pk11_rc2SlotList; @@ -2385,7 +2391,8 @@ PK11_GetBestSlotMultipleWithAttributes(CK_MECHANISM_TYPE *type, (type[i] != CKM_SHA384) && (type[i] != CKM_SHA512) && (type[i] != CKM_MD5) && - (type[i] != CKM_MD2)) { + (type[i] != CKM_MD2) && + (type[i] != CKM_NSS_SM3)) { listNeedLogin = PR_TRUE; break; } diff --git a/lib/pk11wrap/secmod.h b/lib/pk11wrap/secmod.h index 53181f0..5ebc86f 100644 --- a/lib/pk11wrap/secmod.h +++ b/lib/pk11wrap/secmod.h @@ -29,6 +29,7 @@ #define PUBLIC_MECH_CAMELLIA_FLAG 0x00010000ul #define PUBLIC_MECH_SEED_FLAG 0x00020000ul #define PUBLIC_MECH_ECC_FLAG 0x00040000ul +#define PUBLIC_MECH_SM3_FLAG 0x00080000ul #define PUBLIC_MECH_RANDOM_FLAG 0x08000000ul #define PUBLIC_MECH_FRIENDLY_FLAG 0x10000000ul diff --git a/lib/softoken/pkcs11.c b/lib/softoken/pkcs11.c index 8e7872f..75985ab 100644 --- a/lib/softoken/pkcs11.c +++ b/lib/softoken/pkcs11.c @@ -475,6 +475,7 @@ static const struct mechanismList mechanisms[] = { { CKM_NSS_TLS_PRF_GENERAL_SHA256, { 0, 512, CKF_SN_VR }, PR_FALSE }, + { CKM_NSS_SM3, { 0, 0, CKF_DIGEST }, PR_FALSE }, /* ------------------------- HKDF Operations -------------------------- */ { CKM_HKDF_DERIVE, { 1, 255 * 64, CKF_DERIVE }, PR_TRUE }, { CKM_HKDF_DATA, { 1, 255 * 64, CKF_DERIVE }, PR_TRUE }, diff --git a/lib/softoken/pkcs11c.c b/lib/softoken/pkcs11c.c index f99f114..4a1e44b 100644 --- a/lib/softoken/pkcs11c.c +++ b/lib/softoken/pkcs11c.c @@ -1919,6 +1919,8 @@ NSC_DigestInit(CK_SESSION_HANDLE hSession, INIT_MECH(SHA3_256) INIT_MECH(SHA3_384) INIT_MECH(SHA3_512) +#define CKM_SM3 CKM_NSS_SM3 + INIT_MECH(SM3) default: crv = CKR_MECHANISM_INVALID; diff --git a/lib/util/hasht.h b/lib/util/hasht.h index b70b94f..26506c3 100644 --- a/lib/util/hasht.h +++ b/lib/util/hasht.h @@ -28,6 +28,7 @@ typedef enum { HASH_AlgSHA3_256 = 9, HASH_AlgSHA3_384 = 10, HASH_AlgSHA3_512 = 11, + HASH_AlgSM3 = 12, HASH_AlgTOTAL } HASH_HashType; @@ -45,6 +46,7 @@ typedef enum { #define SHA3_256_LENGTH 32 #define SHA3_384_LENGTH 48 #define SHA3_512_LENGTH 64 +#define SM3_LENGTH 32 #define HASH_LENGTH_MAX SHA512_LENGTH /* diff --git a/lib/util/pkcs11n.h b/lib/util/pkcs11n.h index cb76720..5027847 100644 --- a/lib/util/pkcs11n.h +++ b/lib/util/pkcs11n.h @@ -258,6 +258,10 @@ #define CKM_NSS_SP800_108_FEEDBACK_KDF_DERIVE_DATA (CKM_NSS + 43) #define CKM_NSS_SP800_108_DOUBLE_PIPELINE_KDF_DERIVE_DATA (CKM_NSS + 44) +/* SM algorithm (to be proposed to PKCS #11) */ +#define CKM_NSS_SM3 (CKM_NSS + 45) + + /* * HISTORICAL: * Do not attempt to use these. They are only used by NSS's internal diff --git a/lib/util/secoid.c b/lib/util/secoid.c index 5026d4b..2060429 100644 --- a/lib/util/secoid.c +++ b/lib/util/secoid.c @@ -612,6 +612,11 @@ CONST_OID evIncorporationCountry[] = { EV_NAME_ATTRIBUTE, 3 }; */ CONST_OID curve25519[] = { 0x2B, 0x06, 0x01, 0x04, 0x01, 0xDA, 0x47, 0x0F, 0x01 }; +/* https://datatracker.ietf.org/doc/html/draft-oscca-cfrg-sm3-02 + * 1.2.156.197.1.401 + */ +CONST_OID sm3[] = { 0x2A, 0x81, 0x1C, 0xCF, 0x55, 0x01, 0x83, 0x11 }; + #define OI(x) \ { \ siDEROID, (unsigned char *)x, sizeof x \ @@ -1806,6 +1811,8 @@ const static SECOidData oids[SEC_OID_TOTAL] = { "IPsec User", CKM_INVALID_MECHANISM, INVALID_CERT_EXTENSION), + OD(sm3, SEC_OID_SM3, "SM3", CKM_NSS_SM3, INVALID_CERT_EXTENSION), + OD(sha3_224, SEC_OID_SHA3_224, "SHA3-224", CKM_SHA3_224, INVALID_CERT_EXTENSION), OD(sha3_256, SEC_OID_SHA3_256, "SHA3-256", CKM_SHA3_256, INVALID_CERT_EXTENSION), OD(sha3_384, SEC_OID_SHA3_384, "SHA3-384", CKM_SHA3_384, INVALID_CERT_EXTENSION), diff --git a/lib/util/secoidt.h b/lib/util/secoidt.h index 788bed0..b6a98a2 100644 --- a/lib/util/secoidt.h +++ b/lib/util/secoidt.h @@ -512,6 +512,8 @@ typedef enum { SEC_OID_HMAC_SHA3_384 = 370, SEC_OID_HMAC_SHA3_512 = 371, + SEC_OID_SM3 = 372, + SEC_OID_TOTAL } SECOidTag; diff --git a/lib/util/utilmodt.h b/lib/util/utilmodt.h index e1555f3..cc927dd 100644 --- a/lib/util/utilmodt.h +++ b/lib/util/utilmodt.h @@ -28,6 +28,7 @@ #define SECMOD_CAMELLIA_FLAG 0x00010000L /* = PUBLIC_MECH_CAMELLIA_FLAG */ #define SECMOD_SEED_FLAG 0x00020000L #define SECMOD_ECC_FLAG 0x00040000L +#define SECMOD_SM3_FLAG 0x00080000L /* reserved bit for future, do not use */ #define SECMOD_RESERVED_FLAG 0X08000000L #define SECMOD_FRIENDLY_FLAG 0x10000000L diff --git a/lib/util/utilpars.c b/lib/util/utilpars.c index dd3d232..97c6fe2 100644 --- a/lib/util/utilpars.c +++ b/lib/util/utilpars.c @@ -607,6 +607,7 @@ static struct nssutilArgSlotFlagTable nssutil_argSlotFlagTable[] = { NSSUTIL_ARG_ENTRY(AES, SECMOD_AES_FLAG), NSSUTIL_ARG_ENTRY(Camellia, SECMOD_CAMELLIA_FLAG), NSSUTIL_ARG_ENTRY(SEED, SECMOD_SEED_FLAG), + NSSUTIL_ARG_ENTRY(SM3, SECMOD_SM3_FLAG), NSSUTIL_ARG_ENTRY(PublicCerts, SECMOD_FRIENDLY_FLAG), NSSUTIL_ARG_ENTRY(RANDOM, SECMOD_RANDOM_FLAG), NSSUTIL_ARG_ENTRY(Disable, SECMOD_DISABLE_FLAG), diff --git a/lib/util/utilparst.h b/lib/util/utilparst.h index 5dda090..7a4c9f7 100644 --- a/lib/util/utilparst.h +++ b/lib/util/utilparst.h @@ -43,7 +43,7 @@ #define NSSUTIL_DEFAULT_INTERNAL_INIT3 \ " askpw=any timeout=30})\"" #define NSSUTIL_DEFAULT_SFTKN_FLAGS \ - "slotFlags=[ECC,RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512]" + "slotFlags=[ECC,RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512,SM3]" #define NSSUTIL_DEFAULT_CIPHER_ORDER 0 #define NSSUTIL_DEFAULT_TRUST_ORDER 50
Locations
Projects
Search
Status Monitor
Help
Open Build Service
OBS Manuals
API Documentation
OBS Portal
Reporting a Bug
Contact
Mailing List
Forums
Chat (IRC)
Twitter
Open Build Service (OBS)
is an
openSUSE project
.
浙ICP备2022010568号-2