Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(967)

Unified Diff: net/third_party/nss/README.chromium

Issue 9558017: Update net/third_party/nss to NSS 3.13.3. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Upload before checkin Created 8 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/socket/ssl_client_socket_nss.cc ('k') | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/third_party/nss/README.chromium
===================================================================
--- net/third_party/nss/README.chromium (revision 124804)
+++ net/third_party/nss/README.chromium (working copy)
@@ -1,17 +1,15 @@
Name: Network Security Services (NSS)
URL: http://www.mozilla.org/projects/security/pki/nss/
+Version: 3.13.3
+Security Critical: Yes
This directory includes a copy of NSS's libssl from the CVS repo at:
:pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot
-The snapshot was updated to the CVS tag: NSS_3_12_9_RTM
+The snapshot was updated to the CVS tag: NSS_3_13_3_RTM
Patches:
- * Next protocol negotiation support.
- patches/nextproto.patch
- http://codereview.chromium.org/415005
-
* Commenting out a couple of functions because they need NSS symbols
which may not exist in the system NSS library.
patches/versionskew.patch
@@ -22,13 +20,13 @@
https://bugzilla.mozilla.org/show_bug.cgi?id=549042
* Cache the peer's intermediate CA certificates in session ID, so that
- they're available when we resume a session. Add certificates to
- ss->ssl3.peerCertChain in the right order.
+ they're available when we resume a session.
patches/cachecerts.patch
- https://bugzilla.mozilla.org/show_bug.cgi?id=606049
+ https://bugzilla.mozilla.org/show_bug.cgi?id=731478
* Add the SSL_PeerCertificateChain function
patches/peercertchain.patch
+ https://bugzilla.mozilla.org/show_bug.cgi?id=731485
* Add OCSP stapling support
patches/ocspstapling.patch
@@ -37,26 +35,11 @@
patches/clientauth.patch
ssl/sslplatf.c
- * Don't send a client certificate when renegotiating if the peer does not
- request one. This only happened if the previous key exchange algorithm
- was non-RSA.
- patches/clientauth.patch
- https://bugzilla.mozilla.org/show_bug.cgi?id=616757
-
- * Add support for TLS cached info extension.
- patches/cachedinfo.patch
- https://bugzilla.mozilla.org/show_bug.cgi?id=665739
-
* Add a function to export whether the last handshake on a socket resumed a
previous session.
patches/didhandshakeresume.patch
+ https://bugzilla.mozilla.org/show_bug.cgi?id=731798
- * Start each set of CBC encrypted application data records, resulting from
- a single call to ssl3_SendApplicationData, with a one-byte application
- data record in order to randomize the IV in a backward compatible manner.
- https://bugzilla.mozilla.org/show_bug.cgi?id=665814
- patches/cbcrandomiv.patch
-
* Support origin bound certificates.
http://balfanz.github.com/tls-obc-spec/draft-balfanz-tls-obc-00.txt
patches/origin_bound_certs.patch
@@ -66,10 +49,6 @@
https://bugzilla.mozilla.org/show_bug.cgi?id=507359
patches/secret_exporter.patch
- * Send saved write data in the SSL socket in SSL_ForceHandshake.
- patches/handshakeshortwrite.patch
- https://bugzilla.mozilla.org/show_bug.cgi?id=676729
-
* Add a function to restart a handshake after a client certificate request.
patches/restartclientauth.patch
« no previous file with comments | « net/socket/ssl_client_socket_nss.cc ('k') | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698