Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(91)

Side by Side Diff: net/third_party/nss/README.chromium

Issue 11275240: Update net/third_party/nss/ssl to NSS 3.14. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Upload before commit Created 8 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 Name: Network Security Services (NSS) 1 Name: Network Security Services (NSS)
2 URL: http://www.mozilla.org/projects/security/pki/nss/ 2 URL: http://www.mozilla.org/projects/security/pki/nss/
3 Version: 3.13.4 pre-release snapshot 20120319 3 Version: 3.14
4 Security Critical: Yes 4 Security Critical: Yes
5 License: MPL 1.1/GPL 2.0/LGPL 2.1 5 License: MPL 2
6 License FILE: NOT_SHIPPED 6 License FILE: NOT_SHIPPED
7 7
8 This directory includes a copy of NSS's libssl from the CVS repo at: 8 This directory includes a copy of NSS's libssl from the CVS repo at:
9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot 9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot
10 10
11 The same module appears in crypto/third_party/nss (and third_party/nss on some 11 The same module appears in crypto/third_party/nss (and third_party/nss on some
12 platforms), so we don't repeat the license file here. 12 platforms), so we don't repeat the license file here.
13 13
14 The snapshot was updated to the CVS tag: NSS_SSL_3_13_4_20120319_TAG 14 The snapshot was updated to the CVS tag: NSS_3_14_RTM
15 15
16 Patches: 16 Patches:
17 17
18 * Commenting out a couple of functions because they need NSS symbols 18 * Commenting out a couple of functions because they need NSS symbols
19 which may not exist in the system NSS library. 19 which may not exist in the system NSS library.
20 patches/versionskew.patch 20 patches/versionskew.patch
21 21
22 * Send empty renegotiation info extension instead of SCSV unless TLS is 22 * Send empty renegotiation info extension instead of SCSV unless TLS is
23 disabled. 23 disabled.
24 patches/renegoscsv.patch 24 patches/renegoscsv.patch
25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042 25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042
26 26
27 * Cache the peer's intermediate CA certificates in session ID, so that 27 * Cache the peer's intermediate CA certificates in session ID, so that
28 they're available when we resume a session. 28 they're available when we resume a session.
29 patches/cachecerts.patch 29 patches/cachecerts.patch
30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478
31 31
32 * Add the SSL_PeerCertificateChain function 32 * Add the SSL_PeerCertificateChain function
33 patches/peercertchain.patch 33 patches/peercertchain.patch
34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485 34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485
35 35
36 * Add OCSP stapling support 36 * Add OCSP stapling support
37 patches/ocspstapling.patch 37 patches/ocspstapling.patch
38 https://bugzilla.mozilla.org/show_bug.cgi?id=360420
38 39
39 * Add support for client auth with native crypto APIs on Mac and Windows 40 * Add support for client auth with native crypto APIs on Mac and Windows
40 patches/clientauth.patch 41 patches/clientauth.patch
41 ssl/sslplatf.c 42 ssl/sslplatf.c
42 43
43 * Add a function to export whether the last handshake on a socket resumed a 44 * Add a function to export whether the last handshake on a socket resumed a
44 previous session. 45 previous session.
45 patches/didhandshakeresume.patch 46 patches/didhandshakeresume.patch
46 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 47 https://bugzilla.mozilla.org/show_bug.cgi?id=731798
47 48
48 * Add a function to restart a handshake after a client certificate request. 49 * Add a function to restart a handshake after a client certificate request.
49 patches/restartclientauth.patch 50 patches/restartclientauth.patch
50 51
51 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake 52 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake
52 is finished. 53 is finished.
53 https://bugzilla.mozilla.org/show_bug.cgi?id=681839 54 https://bugzilla.mozilla.org/show_bug.cgi?id=681839
54 patches/negotiatedextension.patch 55 patches/negotiatedextension.patch
55 56
56 * Add function to retrieve TLS client cert types requested by server. 57 * Add function to retrieve TLS client cert types requested by server.
57 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 58 https://bugzilla.mozilla.org/show_bug.cgi?id=51413
58 patches/getrequestedclientcerttypes.patch 59 patches/getrequestedclientcerttypes.patch
59 60
60 * Add DTLS support.
61 https://bugzilla.mozilla.org/show_bug.cgi?id=681065
62 patches/dtls.patch
63
64 * Enable False Start only when the server supports forward secrecy. 61 * Enable False Start only when the server supports forward secrecy.
65 patches/falsestartnpn.patch 62 patches/falsestartnpn.patch
66 63 https://bugzilla.mozilla.org/show_bug.cgi?id=810582
67 * Reject DH generators and public values equal to zero or one. 64 https://bugzilla.mozilla.org/show_bug.cgi?id=810583
68 patches/dhvalues.patch
69 65
70 * Add support for TLS Channel IDs 66 * Add support for TLS Channel IDs
71 patches/channelid.patch 67 patches/channelid.patch
72 68
73 * Add DTLS-SRTP (RFC 5764) support.
74 https://bugzilla.mozilla.org/show_bug.cgi?id=737178
75 patches/dtlssrtp.patch
76
77 * Move SSL keylogging out from behind the TRACE and DEBUG defines and add
78 support for CLIENT_RANDOM keylogging to support ECDHE-RSA and others.
79 patches/keylog.patch
80 https://bugzilla.mozilla.org/show_bug.cgi?id=762763
81
82 * SSL_GetChannelInfo and SSL_GetNegotiatedHostInfo should use cwSpec
83 instead of crSpec to support False Start.
84 https://bugzilla.mozilla.org/show_bug.cgi?id=766137
85 patches/getchannelinfo.patch
86
87 * Add support for extracting the tls-unique channel binding value 69 * Add support for extracting the tls-unique channel binding value
88 patches/tlsunique.patch 70 patches/tlsunique.patch
71 https://bugzilla.mozilla.org/show_bug.cgi?id=563276
89 72
90 * Don't crash when the SSL keylog file cannot be opened. 73 * Don't crash when the SSL keylog file cannot be opened.
91 patches/sslkeylogerror.patch 74 patches/sslkeylogerror.patch
75 https://bugzilla.mozilla.org/show_bug.cgi?id=810579
92 76
93 * Set the record layer version number of the initial ClientHello to at 77 * Define the EC_POINT_FORM_UNCOMPRESSED macro. In NSS 3.13.2 the macro
94 most TLS 1.0 if we don't know what protocol version the server supports. 78 definition was moved from the internal header ec.h to blapit.h. When
95 https://bugzilla.mozilla.org/show_bug.cgi?id=774547 79 compiling against older system NSS headers, we need to define the macro.
96 patches/recordlayerversion.patch 80 patches/ecpointform.patch
97 81
98 * Replace hardcoded ssl_variant_stream by ss->protocolVariant. 82 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock.
99 https://bugzilla.mozilla.org/show_bug.cgi?id=681065 83 This change was made in https://chromiumcodereview.appspot.com/10454066.
100 patches/sslprotocolvariant.patch 84 patches/secretexporterlocks.patch
101
102 * When renegotiating, continue to use the client_version used in the
103 initial ClientHello to work around a Windows SChannel bug.
104 https://bugzilla.mozilla.org/show_bug.cgi?id=783448
105 patches/renegoclientversion.patch
106
107 * Fix remaining crashes when SSL session caching is off.
108 https://bugzilla.mozilla.org/show_bug.cgi?id=770057
109 patches/checkuncache.patch
110 85
111 Apply the patches to NSS by running the patches/applypatches.sh script. Read 86 Apply the patches to NSS by running the patches/applypatches.sh script. Read
112 the comments at the top of patches/applypatches.sh for instructions. 87 the comments at the top of patches/applypatches.sh for instructions.
113 88
114 The ssl/bodge directory contains files taken from the NSS repo that we required 89 The ssl/bodge directory contains files taken from the NSS repo that we required
115 for building libssl outside of its usual build environment. 90 for building libssl outside of its usual build environment.
OLDNEW
« no previous file with comments | « no previous file | net/third_party/nss/patches/applypatches.sh » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698