Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(36)

Side by Side Diff: third_party/tlslite/README.chromium

Issue 1336143002: Implement Token Binding Negotiation in tlslite (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: check version number Created 5 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | third_party/tlslite/patches/token_binding_negotiation.patch » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 Name: tlslite 1 Name: tlslite
2 URL: http://trevp.net/tlslite/ 2 URL: http://trevp.net/tlslite/
3 Version: 0.4.8 3 Version: 0.4.8
4 Security Critical: No 4 Security Critical: No
5 License: Public domain and BSD 5 License: Public domain and BSD
6 6
7 Description: Python TLS implementation for use with test server. 7 Description: Python TLS implementation for use with test server.
8 8
9 Source: https://pypi.python.org/packages/source/t/tlslite/tlslite-0.4.8.tar.gz 9 Source: https://pypi.python.org/packages/source/t/tlslite/tlslite-0.4.8.tar.gz
10 MD5: 36c13858ea63f262c4e4291c2f9ae38f 10 MD5: 36c13858ea63f262c4e4291c2f9ae38f
(...skipping 23 matching lines...) Expand all
34 - patches/save_client_hello.patch: Save the parsed ClientHello on TLSConnection 34 - patches/save_client_hello.patch: Save the parsed ClientHello on TLSConnection
35 so tests can query it. 35 so tests can query it.
36 - patches/certificate_request.patch: Fix client auth for TLS 1.2. 36 - patches/certificate_request.patch: Fix client auth for TLS 1.2.
37 - patches/aes_gcm.patch: Implement AES-GCM and never select TLS 1.2 ciphers 37 - patches/aes_gcm.patch: Implement AES-GCM and never select TLS 1.2 ciphers
38 unless >= TLS 1.2 is negotiated. 38 unless >= TLS 1.2 is negotiated.
39 - patches/alert_after_handshake.patch: Add an option to send a fatal alert 39 - patches/alert_after_handshake.patch: Add an option to send a fatal alert
40 immediately after the handshake completes. 40 immediately after the handshake completes.
41 - patches/ecdhe_rsa.patch: Implement ECDHE_RSA-based ciper suites on the server. 41 - patches/ecdhe_rsa.patch: Implement ECDHE_RSA-based ciper suites on the server.
42 - patches/extended_master_secret.patch: Add server support for extended 42 - patches/extended_master_secret.patch: Add server support for extended
43 master secret. 43 master secret.
44 - patches/token_binding_negotiation.patch: Add server support for token
45 binding negotiation TLS extension (draft-ietf-tokbind-negotiation-00)
OLDNEW
« no previous file with comments | « no previous file | third_party/tlslite/patches/token_binding_negotiation.patch » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698