| OLD | NEW |
| 1 Name: Network Security Services (NSS) | 1 Name: Network Security Services (NSS) |
| 2 URL: http://www.mozilla.org/projects/security/pki/nss/ | 2 URL: http://www.mozilla.org/projects/security/pki/nss/ |
| 3 Version: 3.13.4 pre-release snapshot 20120319 | 3 Version: 3.14 |
| 4 Security Critical: Yes | 4 Security Critical: Yes |
| 5 License: MPL 1.1/GPL 2.0/LGPL 2.1 | 5 License: MPL 2 |
| 6 License FILE: NOT_SHIPPED | 6 License FILE: NOT_SHIPPED |
| 7 | 7 |
| 8 This directory includes a copy of NSS's libssl from the CVS repo at: | 8 This directory includes a copy of NSS's libssl from the CVS repo at: |
| 9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot | 9 :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot |
| 10 | 10 |
| 11 The same module appears in crypto/third_party/nss (and third_party/nss on some | 11 The same module appears in crypto/third_party/nss (and third_party/nss on some |
| 12 platforms), so we don't repeat the license file here. | 12 platforms), so we don't repeat the license file here. |
| 13 | 13 |
| 14 The snapshot was updated to the CVS tag: NSS_SSL_3_13_4_20120319_TAG | 14 The snapshot was updated to the CVS tag: NSS_3_14_RTM |
| 15 | 15 |
| 16 Patches: | 16 Patches: |
| 17 | 17 |
| 18 * Commenting out a couple of functions because they need NSS symbols | 18 * Commenting out a couple of functions because they need NSS symbols |
| 19 which may not exist in the system NSS library. | 19 which may not exist in the system NSS library. |
| 20 patches/versionskew.patch | 20 patches/versionskew.patch |
| 21 | 21 |
| 22 * Send empty renegotiation info extension instead of SCSV unless TLS is | 22 * Send empty renegotiation info extension instead of SCSV unless TLS is |
| 23 disabled. | 23 disabled. |
| 24 patches/renegoscsv.patch | 24 patches/renegoscsv.patch |
| 25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042 | 25 https://bugzilla.mozilla.org/show_bug.cgi?id=549042 |
| 26 | 26 |
| 27 * Cache the peer's intermediate CA certificates in session ID, so that | 27 * Cache the peer's intermediate CA certificates in session ID, so that |
| 28 they're available when we resume a session. | 28 they're available when we resume a session. |
| 29 patches/cachecerts.patch | 29 patches/cachecerts.patch |
| 30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 | 30 https://bugzilla.mozilla.org/show_bug.cgi?id=731478 |
| 31 | 31 |
| 32 * Add the SSL_PeerCertificateChain function | 32 * Add the SSL_PeerCertificateChain function |
| 33 patches/peercertchain.patch | 33 patches/peercertchain.patch |
| 34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485 | 34 https://bugzilla.mozilla.org/show_bug.cgi?id=731485 |
| 35 | 35 |
| 36 * Add OCSP stapling support | 36 * Add OCSP stapling support |
| 37 patches/ocspstapling.patch | 37 patches/ocspstapling.patch |
| 38 https://bugzilla.mozilla.org/show_bug.cgi?id=360420 |
| 38 | 39 |
| 39 * Add support for client auth with native crypto APIs on Mac and Windows | 40 * Add support for client auth with native crypto APIs on Mac and Windows |
| 40 patches/clientauth.patch | 41 patches/clientauth.patch |
| 41 ssl/sslplatf.c | 42 ssl/sslplatf.c |
| 42 | 43 |
| 43 * Add a function to export whether the last handshake on a socket resumed a | 44 * Add a function to export whether the last handshake on a socket resumed a |
| 44 previous session. | 45 previous session. |
| 45 patches/didhandshakeresume.patch | 46 patches/didhandshakeresume.patch |
| 46 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 | 47 https://bugzilla.mozilla.org/show_bug.cgi?id=731798 |
| 47 | 48 |
| 48 * Add a function to restart a handshake after a client certificate request. | 49 * Add a function to restart a handshake after a client certificate request. |
| 49 patches/restartclientauth.patch | 50 patches/restartclientauth.patch |
| 50 | 51 |
| 51 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake | 52 * Allow SSL_HandshakeNegotiatedExtension to be called before the handshake |
| 52 is finished. | 53 is finished. |
| 53 https://bugzilla.mozilla.org/show_bug.cgi?id=681839 | 54 https://bugzilla.mozilla.org/show_bug.cgi?id=681839 |
| 54 patches/negotiatedextension.patch | 55 patches/negotiatedextension.patch |
| 55 | 56 |
| 56 * Add function to retrieve TLS client cert types requested by server. | 57 * Add function to retrieve TLS client cert types requested by server. |
| 57 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 | 58 https://bugzilla.mozilla.org/show_bug.cgi?id=51413 |
| 58 patches/getrequestedclientcerttypes.patch | 59 patches/getrequestedclientcerttypes.patch |
| 59 | 60 |
| 60 * Add DTLS support. | |
| 61 https://bugzilla.mozilla.org/show_bug.cgi?id=681065 | |
| 62 patches/dtls.patch | |
| 63 | |
| 64 * Enable False Start only when the server supports forward secrecy. | 61 * Enable False Start only when the server supports forward secrecy. |
| 65 patches/falsestartnpn.patch | 62 patches/falsestartnpn.patch |
| 66 | 63 https://bugzilla.mozilla.org/show_bug.cgi?id=810582 |
| 67 * Reject DH generators and public values equal to zero or one. | 64 https://bugzilla.mozilla.org/show_bug.cgi?id=810583 |
| 68 patches/dhvalues.patch | |
| 69 | 65 |
| 70 * Add support for TLS Channel IDs | 66 * Add support for TLS Channel IDs |
| 71 patches/channelid.patch | 67 patches/channelid.patch |
| 72 | 68 |
| 73 * Add DTLS-SRTP (RFC 5764) support. | |
| 74 https://bugzilla.mozilla.org/show_bug.cgi?id=737178 | |
| 75 patches/dtlssrtp.patch | |
| 76 | |
| 77 * Move SSL keylogging out from behind the TRACE and DEBUG defines and add | |
| 78 support for CLIENT_RANDOM keylogging to support ECDHE-RSA and others. | |
| 79 patches/keylog.patch | |
| 80 https://bugzilla.mozilla.org/show_bug.cgi?id=762763 | |
| 81 | |
| 82 * SSL_GetChannelInfo and SSL_GetNegotiatedHostInfo should use cwSpec | |
| 83 instead of crSpec to support False Start. | |
| 84 https://bugzilla.mozilla.org/show_bug.cgi?id=766137 | |
| 85 patches/getchannelinfo.patch | |
| 86 | |
| 87 * Add support for extracting the tls-unique channel binding value | 69 * Add support for extracting the tls-unique channel binding value |
| 88 patches/tlsunique.patch | 70 patches/tlsunique.patch |
| 71 https://bugzilla.mozilla.org/show_bug.cgi?id=563276 |
| 89 | 72 |
| 90 * Don't crash when the SSL keylog file cannot be opened. | 73 * Don't crash when the SSL keylog file cannot be opened. |
| 91 patches/sslkeylogerror.patch | 74 patches/sslkeylogerror.patch |
| 75 https://bugzilla.mozilla.org/show_bug.cgi?id=810579 |
| 92 | 76 |
| 93 * Set the record layer version number of the initial ClientHello to at | 77 * Define the EC_POINT_FORM_UNCOMPRESSED macro. In NSS 3.13.2 the macro |
| 94 most TLS 1.0 if we don't know what protocol version the server supports. | 78 definition was moved from the internal header ec.h to blapit.h. When |
| 95 https://bugzilla.mozilla.org/show_bug.cgi?id=774547 | 79 compiling against older system NSS headers, we need to define the macro. |
| 96 patches/recordlayerversion.patch | 80 patches/ecpointform.patch |
| 97 | 81 |
| 98 * Replace hardcoded ssl_variant_stream by ss->protocolVariant. | 82 * SSL_ExportKeyingMaterial should get the RecvBufLock and SSL3HandshakeLock. |
| 99 https://bugzilla.mozilla.org/show_bug.cgi?id=681065 | 83 This change was made in https://chromiumcodereview.appspot.com/10454066. |
| 100 patches/sslprotocolvariant.patch | 84 patches/secretexporterlocks.patch |
| 101 | |
| 102 * When renegotiating, continue to use the client_version used in the | |
| 103 initial ClientHello to work around a Windows SChannel bug. | |
| 104 https://bugzilla.mozilla.org/show_bug.cgi?id=783448 | |
| 105 patches/renegoclientversion.patch | |
| 106 | |
| 107 * Fix remaining crashes when SSL session caching is off. | |
| 108 https://bugzilla.mozilla.org/show_bug.cgi?id=770057 | |
| 109 patches/checkuncache.patch | |
| 110 | 85 |
| 111 Apply the patches to NSS by running the patches/applypatches.sh script. Read | 86 Apply the patches to NSS by running the patches/applypatches.sh script. Read |
| 112 the comments at the top of patches/applypatches.sh for instructions. | 87 the comments at the top of patches/applypatches.sh for instructions. |
| 113 | 88 |
| 114 The ssl/bodge directory contains files taken from the NSS repo that we required | 89 The ssl/bodge directory contains files taken from the NSS repo that we required |
| 115 for building libssl outside of its usual build environment. | 90 for building libssl outside of its usual build environment. |
| OLD | NEW |