Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(62)

Side by Side Diff: net/third_party/nss/README.chromium

Issue 6538005: Update the NSS patches. Add snapstart2.patch and peercertchain.patch.... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Upload before checkin Created 9 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 Name: Network Security Services (NSS) 1 Name: Network Security Services (NSS)
2 URL: http://www.mozilla.org/projects/security/pki/nss/ 2 URL: http://www.mozilla.org/projects/security/pki/nss/
3 3
4 This directory includes a copy of NSS's libssl from the CVS repo at: 4 This directory includes a copy of NSS's libssl from the CVS repo at:
5 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot 5 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot
6 6
7 The snapshot was updated to the CVS tag: NSS_3_12_7_RTM 7 The snapshot was updated to the CVS tag: NSS_3_12_7_RTM
8 8
9 Patches: 9 Patches:
10 10
(...skipping 22 matching lines...) Expand all
33 https://bugzilla.mozilla.org/show_bug.cgi?id=606049 33 https://bugzilla.mozilla.org/show_bug.cgi?id=606049
34 34
35 * Add the SSL_ERROR_WEAK_SERVER_KEY error code for a weak server key in 35 * Add the SSL_ERROR_WEAK_SERVER_KEY error code for a weak server key in
36 the Server Key Exchange handshake message. 36 the Server Key Exchange handshake message.
37 patches/weakserverkey.patch 37 patches/weakserverkey.patch
38 http://crbug.com/51694 38 http://crbug.com/51694
39 https://bugzilla.mozilla.org/show_bug.cgi?id=587234 39 https://bugzilla.mozilla.org/show_bug.cgi?id=587234
40 40
41 * Add Snap Start support 41 * Add Snap Start support
42 patches/snapstart.patch 42 patches/snapstart.patch
43 patches/snapstart2.patch
43 http://tools.ietf.org/html/draft-agl-tls-snapstart-00 44 http://tools.ietf.org/html/draft-agl-tls-snapstart-00
44 45
46 * Add the SSL_PeerCertificateChain function
47 patches/peercertchain.patch
48
45 * Add OCSP stapling support 49 * Add OCSP stapling support
46 patches/ocspstapling.patch 50 patches/ocspstapling.patch
47 51
48 * Add support for client auth with native crypto APIs on Mac and Windows 52 * Add support for client auth with native crypto APIs on Mac and Windows
49 patches/clientauth.patch 53 patches/clientauth.patch
50 ssl/sslplatf.c 54 ssl/sslplatf.c
51 55
52 * Don't send a client certificate when renegotiating if the peer does not 56 * Don't send a client certificate when renegotiating if the peer does not
53 request one. This only happened if the previous key exchange algorithm 57 request one. This only happened if the previous key exchange algorithm
54 was non-RSA. 58 was non-RSA.
55 patches/clientauth.patch 59 patches/clientauth.patch
56 https://bugzilla.mozilla.org/show_bug.cgi?id=616757 60 https://bugzilla.mozilla.org/show_bug.cgi?id=616757
57 61
62 Apply the patches to NSS by running the patches/applypatches.sh script. Read
63 the comments at the top of patches/applypatches.sh for instructions.
64
58 The ssl/bodge directory contains files taken from the NSS repo that we required 65 The ssl/bodge directory contains files taken from the NSS repo that we required
59 for building libssl outside of its usual build environment. 66 for building libssl outside of its usual build environment.
OLDNEW
« no previous file with comments | « no previous file | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698