Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(17)

Side by Side Diff: net/third_party/nss/README.chromium

Issue 7572043: SSL_ForceHandshake should send the saved write data in the SSL socket. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 9 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 Name: Network Security Services (NSS) 1 Name: Network Security Services (NSS)
2 URL: http://www.mozilla.org/projects/security/pki/nss/ 2 URL: http://www.mozilla.org/projects/security/pki/nss/
3 3
4 This directory includes a copy of NSS's libssl from the CVS repo at: 4 This directory includes a copy of NSS's libssl from the CVS repo at:
5 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot 5 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot
6 6
7 The snapshot was updated to the CVS tag: NSS_3_12_9_RTM 7 The snapshot was updated to the CVS tag: NSS_3_12_9_RTM
8 8
9 Patches: 9 Patches:
10 10
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after
49 49
50 * Add a function to export whether the last handshake on a socket resumed a 50 * Add a function to export whether the last handshake on a socket resumed a
51 previous session. 51 previous session.
52 patches/didhandshakeresume.patch 52 patches/didhandshakeresume.patch
53 53
54 * Precede each set of CBC encrypted application data records, resulting from 54 * Precede each set of CBC encrypted application data records, resulting from
55 a single call to ssl3_SendApplicationData, with an empty application data 55 a single call to ssl3_SendApplicationData, with an empty application data
56 record in order to randomize the IV in a backwards compatible manner. 56 record in order to randomize the IV in a backwards compatible manner.
57 patches/cbcrandomiv.patch 57 patches/cbcrandomiv.patch
58 58
59 * Support origin bound certificates (http://balfanz.github.com/tls-obc-spec/dr aft-balfanz-tls-obc-00.txt) 59 * Support origin bound certificates.
60 http://balfanz.github.com/tls-obc-spec/draft-balfanz-tls-obc-00.txt
60 patches/origin_bound_certs.patch 61 patches/origin_bound_certs.patch
61 62
62 * Add a function to implement RFC 5705: Keying Material Exporters for TLS 63 * Add a function to implement RFC 5705: Keying Material Exporters for TLS
63 This is a reworked version of the patch from 64 This is a reworked version of the patch from
64 https://bugzilla.mozilla.org/show_bug.cgi?id=507359 65 https://bugzilla.mozilla.org/show_bug.cgi?id=507359
65 patches/secret_exporter.patch 66 patches/secret_exporter.patch
66 67
68 * Send saved write data in the SSL socket in SSL_ForceHandshake.
69 patches/handshakeshortwrite.patch
70 https://bugzilla.mozilla.org/show_bug.cgi?id=676729
71
67 Apply the patches to NSS by running the patches/applypatches.sh script. Read 72 Apply the patches to NSS by running the patches/applypatches.sh script. Read
68 the comments at the top of patches/applypatches.sh for instructions. 73 the comments at the top of patches/applypatches.sh for instructions.
69 74
70 The ssl/bodge directory contains files taken from the NSS repo that we required 75 The ssl/bodge directory contains files taken from the NSS repo that we required
71 for building libssl outside of its usual build environment. 76 for building libssl outside of its usual build environment.
OLDNEW
« no previous file with comments | « no previous file | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698